D             <<< SPCVXA::$1$DUA2:[NOTES$LIBRARY]X-NUTWORKS.NOTE;2 >>>0                                 -< X-NUTWORKS >-P ================================================================================P Note 4.0                             Issue 3                          No repliesP SPCVXA::TERRY "Terry Kennedy"                       691 lines  20-JUL-1989 08:09P --------------------------------------------------------------------------------F **********************************************************************F **********************************************************************F ***                                                                ***F ***                          NutWorks                              ***F ***                         ----------                             ***F ***         The Inter-Net Virtual Magazine which Prides            ***F ***               Itself on its Pride in Itself                    ***F ***                                                                ***F ***                      ================                          ***F ***                                                                ***F ***                                                                ***F ***          March, 1985. Issue003, (Volume I, Number 3).          ***F *** NutWorks is published monthly.  Brent CJ Britton (BRENT@MAINE) ***F *** virtual Editor and Publisher.                                  ***F ***                                                                ***F **********************************************************************F **********************************************************************   F *--------------------------------------------------------------------*F * Note:  BRENT@MAINE is on vacation as of this day, Friday, March 8, *F *        1985.  He will be traveling (incognito) throughout Florida, *F *        land of sun, citrus, and hot oily bodies.  Please refer all *F *        comminication concerning NutWorks to Marvin (xxxxx@xxxxxx)  *F *        for approximately the next two weeks.  Thank you very much. *F *        I'll think of you when I'm tanning... hee hee.              *F *--------------------------------------------------------------------*   <           ==  "To Whose Moral Majority Do YOU Belong ??"  ==   <          Fundamentalists are aggravating computer evolution.   F    Mankind, as a race, is forever adopting new attitudes, new "ways ofF doing things."  If a function is performed  in the same manner for anyF reasonable amount of  time,  the means through which it  has been per-F performed will surely  be altered in some   way as to make  the entireF situation seem  different and new.    This is exemplified  by entitiesF such  as  constantly  changing  styles  of  dresswear,   the  physicalF appearance of automobiles,   and the frequent passage  of "fads."  ForF the most part,   though,  there are a  finite number of ways  in whichF things can  feasibly be changed.   That  is,  once something  has beenF altered  a  certain  number  of  times,   there  are  simply  no  moreF possibilities left for change.   As a result, patterns of change beginF to form cycles.   We do function X in manner A; soon, A becomes boringF so we advance to manner B; realizing that B is equally mundane, we seeF manner  A   as  being  the   best  way   after  all  and   once  againF advance(/revert(?))  to doing function X the  way we did before.   The& cycle continues, in time, ad absurdum.F    Ever  since  binary_1  was  added with  binary_1  to  result  quiteF properly  in  binary_2  by  the roomfull  of  machinery  named  ENIAC,F computers have  by far been the  most consistent creatures  of change.F Moreover,  the attitudes  held by those responsible  for directing andF managing the use of computer facilities have done the same.  And theseF attitudes are the very type which eternally change in unending cycles.F    One fine day,   someone wearing Coke-bottle eye-glasses  and a longF white lab  coat--in the pocket of  which he kept several  thousand inkF pens-- said,  "Holy catfish!" and went on  to explain at length how heF had figured that  if THIS computer were rigged up  with THAT computer,F the two  could be "linked" so  that folks using either  computer couldF interact with one another.  And so began the glorious days of computerF communication...  The days  when operations managers boasted  of theirF ability to  send and  receive files to  and from  half way  across theF country...   The days  when System  Programmers  worked diligently  onF producing  CHAT machines...   And  on the  eighth  day,  Man  inventedC computer network links, and man saw the network that it was good... F    The   fact   that   the  "Computer   System   Alpha-Numeric   LogonF Identification  Code" is  much  more  realisticly called  an  "accountF number" stems from  the inevitable change that began to  take place inF proportion with the  availability of computer services  to the public.F Those  people whose  minds  are  geared to  do  so  started to  ponderF questions  of   payment.    Operations  Managers,    Computing  CenterF Directors, they are all good people.  For the most part, they are veryF intelligent and  truly concerned about the  needs of their  system andF those who make use  of it.   And they all have  superiors to whom they. must answer and from whom they obtain funding.F    The fascination with  communication via computer networks  has longF since dwindled in the minds of those who pay for it.   The trend amongF them lately  is to  closely monitor,  if  not restrict  computer usageF which they feel  to be nonproductive or unnecessary.    In many cases,F this includes  any and  all participation  in electronic  conferencingF (chatting), making use of system printers for anything other than trueF blue output (in  the programming sense of  the word),  and the  use ofF file sending/receiving capabilities  for anything other than  mail andE batch processing.  This magazine, of course, is in violation of that. F    These people  have legitimate  complaints.   Someone  out there  isF paying for  vast amounts of  CPU time,   and that someone  should haveF every right to be sure that his money is not being wasted.  It is alsoF completely  up  to that  someone  to  decide  just what  qualifies  as "waste".F    Perhaps the problems with restrictions would be alleviated if usersF paid  for their own machines.   Students and employees could be issuedF machines for  classwork and  work-work respectively.    These machinesF could be monitored  and restricted from any  unnecessary usage.   EachF person could have the option of  purchasing ANOTHER machine to be usedF for anything  else.   Users who  wanted to  do things other  than thatF which was deemed "necessary" would be free  to do so on their very ownF accounts.  Many centers offer a limited number of logon id's to anyoneF who requests one,   for a modest price.    Many people on the  Net are already paying to be there. F    It's  difficult to  speculate whether  these restrictive  attitudesF will fall into the cycle of recurrence.   In a few years,  as computerF time becomes less expensive, perhaps the restrictive grip will loosen.F Or perhaps things will worsen until the  web of the network is severedB completely at the cutting hands of those who no longer support it.   -                          ====================    9           COMPUTER COMMUNICATION: DEVELOPMENT OR DISEASE?    9             BY MARVIN RAAB    xxxxx@xxxxxx    FEB 20 1985 F    Having majored in  communication arts with computer  and journalismF background (not to  mention being a ''ferret''),  I'd  like to discussF the latest craze to sweep not only the United States,  but a number ofF other countries as well.  This craze, although it has yet to be linkedF to cancer,  affects it's victims with  symptoms such as lack of sleep,F greater telephone usage,   greater typing speed and  accuracy,  and anF emotional attachment to a person or  group of persons which the victim has never met.F    You guessed it: BITNET/EARNET CHATTING.  Victims of this relativelyF new affliction are known as BITNAUTS. No one knows the exact number ofF BITNAUTS since many of them do not wish to declare themselves as such,F but estimates  range from  500-1500.  The  typical BITNAUT  is a  maleF college student between the ages of 17 and 25.  His grades are averageF and he is extremely computer  literate.  These statistics were derivedF solely from observation and they do not describe EVERY bitnaut.  ThereF are Bitnauts of every age,   sex,  race,  educational background,  and
 career goals.*F    Let's  examine   the  facets  to   Chatting.   For   this  article,F ''chatting'' refers  to one-on-one discussions  as well  as electronic
 conferencing. F    The Basics:  Almost everyone at most of the 200 nodes has access toF BITNET.   Most nodes have over 500 users of which 200 are logged on atF any one time.   Doing some quick math,  we find that 40,000 people areF logged on at any one time.  Of course,  time zones come into play hereF add,  while CUNYVM may have 250 people logged on at 8pm EST,  WEIZMANNF may have  only 10  at that hour.   In any  case,  there  are literallyF thousands of people logged on at any  one time;  each one of them able9 to communicate with any other; relatively free of charge. F    After the  original novelty  of talking to  someone who  is sittingF many  miles   away  diminishes,   semi-serious   conversation  occurs.F Schoolwork  and leisure  activities  are the  common  topics.  If  theF Bitnauts continue at  this rate for more  than a few days,   they willF usually become  closer friends and  discuss items which  close friendsD usually discuss (personal problems, serious political beliefs, etc.)F    Electronic conferencing  is slightly  different.  The  Bitnauts areF familiar to eachother.  An individual's unique nickname along with hisF chatting  technique  contribute  to  bonds  between  chatters.   TheseF chatters will usually extend their newly found friendship to the level% of one-on-one in the following weeks.nF    Electronic conferencing also serves the  need for ''company''.  HowF many chatters actually think they hear  the voices of the others whileF reading the screen?   The more lines of conversation,   the louder theF little voice in your head reads.  In addition, no one can see you.  IfF you are  the ugliest  person in your  city,  no  one will  know.  ThisF provides an excellent opportunity to the otherwise shy individual. ForF the obnoxious individual,  electronic conferencing  is also ideal.  HeF can talk (type)  while others are also typing and no one needs to wait( till someone else finishes his sentence.F    The extroverted individual  is also given the chance  of a lifetimeF since he has a captive audience. Females are able to openly flirt withF strangers  where  they  are  normally  prohibited  from  doing  so  inF contemporary society.   Males are provided  access to girls like never before.pF    One would never go up to a stranger  in the street and ask what theF weather is like in  a particular city.  If he did,   he would be givenF ridiculous  stares and  be  greatly  embarrassed.  BITNET,   with  itsG characteristic of almost total anonymity, allows us to cross the bound-lF ary of embarrassment. (When was the last time you were  embarrassed on BITNET?)F    The CPQ  NAMES command greatly  resembles a  conventional telephoneF directory. The major difference between that book and the command liesF in the  intrinsic recognition of ID's  or BITNET addresses.  An  id ofF CS11124@ANYWHERE announces to  the BITNAUT that the user  is a studentF taking computer science,  probably the first class in the field.  This; is quite different from seeing J. Doe  15-15 Cherry Street.sF    Another analogy to  telephone calls is the  instinctive response toF an unknown caller, "Sorry, wrong number" and the receiver hangs up theF phone.   Using BITNET however,  receiving a message from an unknown IDF will yield opposite results.  The fear of a "crank call" is eliminatedF and a  conversation often  results unless  of course  the receiver  is
 preoccupied).hF    A  major  flaw in  BITNET  relationships  is  the obvious  lack  ofF physical contact.  Eye contact is very essential to the development ofF friendships.    BITNAUTS  have  succeeded in  remedying  this  to  theF greatest possible extent.   The smile (  :-)  ),  the kiss (**kiss**),F the simulated laughter  (tee hee,  hee hee)  and many  others serve toF paint an accurate  picture of nonverbal communication in  the minds ofF the receivers.  However,  the lack of close proxemics never leaves the conscious thoughts. F    In any system of human interaction,  soap opera situations develop,F and BITNET is not immune.  There are countless situations of this typeF occuring between BITNAUTS at any time and they have become the threadsF to  the fabric  of  the BITNET  society.  As  the  number of  BITNAUTSF increases,  so will the number of characters in these soaps as well as the number of these soaps.F    Another  observation  relates  to   actual  meetings  of  Bitnauts.F Sometimes it clicks and sometimes it  doesn't.  There is absolutely noF possible way  to predict  which relationship  will retain  and further7 develop it's on-line roots, and which will wither away.nF    BITNAUTS from North America are unlikely to meet their counterpartsF in other countries, although a few travellers will have this pleasure.F However, one must consider the plight of BITNAUTS from the west coast.F The majority of nodes are within 1000  miles of the Atlantic Ocean andF almost all are  within 2-8 hours driving time  from neighboring nodes.F This has resulted in many meetings,  not to mention the convention(s).A How do the BITNAUTS from the State of California feel about this? F    The results (positive as well as negative)  of BITNET relations hasF yet to  be seen.  There are  undoubtedly dangers involved  (imagine anF emotionally unstable  BITNAUT)  but  to restrict  users at  nodes fromF BITNET use is not the answer.  BITNET has become an important additionF to the  lives of college students  of this world,  just  as televisionF entered the lives  of society almost 50  years ago.  And just  as thatF medium has had it's share of  problems and positive products,  so willF computer networks.   What better  way to start  than with  the college students of the world?-                         =====================c  n)                              ** A Joke **h   C    (Try not to fall out of your chair over this one... go on, try.) F    There was,  in  Italy,  a certain vampire,  looking for  a place toE live.  He finally settled upon a bridge between two cities, since thehF heavy foot  traffic would make  it very easy  for him to  find victims when he was hungry.nF    Several weeks passed....the vampire was taking young women from theF bridge,  drinking their blood,  and throwing them over the side of theF bridge.   Strangely, though, there had been no outcry over the missingF girls or any kind  of search for them.   The vampire  began to wonder,@ what happened to the bodies after he threw them over the bridge?F    So,  the next time  he took a woman from the  bridge and tossed herF over the  side,  he looked  over to see  what happened to  her.   VeryF shortly, a large troll came out from under the bridge,  slung the girlF over his shoulder, and walked away, singing "Drained Wops Keep Falling on my Head".....   -                         =====================R  M  I(         Virtually Unanswerable Questions)            compiled & executed by MarissaE3                                   (xxxxxxxx@xxxxxx)w   4  Why are some Bitnetters so hung up on knowing their     virtual friends' last names??3  Why are some Bitnetters so determined to keep evene3    their FIRST names secret?? (Mr. X, I mean you!!) 0  Why do people from halfway across the continent5    include their phone numbers on their Bitnet mail??k  Am I supposed to call them???$  Does Bitnet mail cost 22 cents now?2  Speaking of cents, why doesn't my keyboard have a    cents sign???4  When a link is disconnected, why does your own node%    always blame it on the other guy??e.  Why is there a LOGMSG if all it ever says is:)    TYPE NEWS FOR SYSTEM INFORMATION   ???s%  Is software tangible or intangible??e2  Why does VMBACKUP take longer than recreating all    your files from scratch??7  Why doesn't the virtually impossible machine at CUNYVM.;    save a copy of the file I was editing when it crashed???a    (WYLBUR does!!!) (  Does anyone use CP?  Does anyone care??3  If CUNYVM does accounting twice daily, why does myu0    account balance remain the same for a week???)  Why the hell am I asking you all this???n   -                         =====================l     hF Problem:   The question  arose while  poring over  the following  cashF register  receipt  from  Burger  King,  "Why  is  the  word  'WHOPPER'
 misspelled?":N   '             ,-------------------------, '             |                         |n'             |     BR KING   1909      |e'             |  16 F E B    13:18      |c'             |                         |d'             |                         |e'             |   1 WHOPER       1.40   |y'             |  *** ONL Y              | '             |         K   O           |d'             |   1 CHICKEN      1.79   |b'             |   1  EAT IN       .00   |v'             |   1 FRIES         .52   |n'             |   1  PEPS L       .70   |s'             |   1 DIET  L       .70   | '             |      TX           .31   |c'             |   32 TOTAL   5   5.42   |e'             |                         |i'             |                         |y'             |                         |i'             |     CASH         6.00   |n'             |     RET URN       .58   |e'             |                         |o'             '-------------------------'  Hypotheses:s- 1. Fields are a maximum of 6 characters long.n-    rejected; 'CHICKEN' extends into column 7.u6 2. Whoever programmed the system can't spell properly.F    rejected; Burger King management would damn well make sure that theF names of their products were spelled correctly.  Also, other anomaliesF exist, i.e., the blanks in the words "ONLY" and "RETURN," and the left margin is ragged. F 3.  Burger  King cash registers can  only print certain  characters inF certain  columns,  forcing  the  odd spelling  and  odd format.   ThisF hypothesis seems to  have the most merit.  The  original receipt showsF that  the  printing  mechanism  prints  characters  from  fully-formedF images,  not  in a dot-matrix form.   Thus we can visualize  the printF mechanism as consisting of a rotating wheel for each column.  Since toF fit all 36 alphamers on each wheel  would probably give them too greatF a diameter to be practical,  only a selected subset of the letters areF put on each wheel,  and the spelling and positioning of the item names& has to be adjusted to fit this scheme.F    It would  appear that Burger  King even  chooses the names  for newF products  with the  design  of their  cash  registers  in mind.    ForF example,  their fish sandwich is called the "Whaler",  which is easilyF printed using the W, H,  E,  and R from 'WHOPER',  the A from 'EAT IN'F and the 'L'  from 'ONL Y'.  However,   it could just have  easily beenF called 'FISH' by taking the F in 'FRIES',  the I in 'DIET',  and the SF and H from 'CASH', so it appears that even this hypothesis is a little weak.sF    Any  other hypotheses  and  further research  by  readers would  be	 welcomed. O +++++++ +++++++ +++++++ +++++++ +++++++ +++++++ +++++++ +++++++ +++++++ +++++++ < Received: by MAINE      id 1110; Fri, 01 Mar 85 05:59:35 EST4 Subject:   The reason why WHOPPER is spelled WHOPER.+ To:        Brent C.J. Britton <BRENT@MAINE>i) From:      Barry D. Gates <xxxxxxx@MAINE>r$ Date:      Fri, 1 Mar 1985 04:53 EST  oF    It has come to my attention that  a great furor has been aroused inF the field of  computer academia over the spelling of  the word WHOPPERF on receipts from Burger King.   First of all, it should be pointed outF that I do not, as a normal matter of habit,  frequent such substandardF eateries as this when a choice does  exist,  but at one occasion I didF happen to stop into one of fast food establishments with several of myF academic colleagues during this past summer  and we happened to notice" these strange encryptic printouts.F    After  staring at  these  strange writings  for  a  few minutes  weF noticed the similarity  between our cash receipts and  xediting a fileF that had  been sent  from a  Vax (small  mainframe computer,   usuallyF dedicated to tasks such  as graphics which deserve to be  done on suchF machines) using the SEND/FILE/BINARY command.  The Vax, as most of youF should  know,  communicates  with  an extended  version  of the  ASCIIF character set,  whereas the IBM uses  the EBCDIC character set.   ThisF translation  from one  set to  another  allows some  characters to  beF translated the into gibberish,  others into different characters,  and! still others to remain unchanged.wF    It is from this observation that I was able to determine the reasonF for  the  strange  and  somewhat  cryptic  spellings  on  Burger  KingF receipts.  As you all know,  the EBCDIC character set is the successorF to an older character set called BCD.  This BCD character set was usedF by IBM in its computers back in  the late 1950s/early 1960s in the IBMF 1400-series computers.   From a back  issue of the Scientific AmericanF (December 1962 to  be exact),  I discovered  a company by the  name ofF Inter-Code Business Machine Company who had  built an extension to theF BCD character set for use in their computer,  the SS-20.   The companyF was declared bankrupt after selling less  than 12 computers,  and theyF were left with over 12,000 more of these machines in stock.   The nameF of their character set was called BCDCB.    One of the best aspects ofF their computer was that it was all capable of being housed in a box no larger than a terminal.aF    At the same time that ICBM was going bankrupt, Burger King had justF come into the fast food market and was in need of tax shelters.   In aF deal  to help  pay  ICBM's creditors,   they  agreed  to purchase  theF remaining stock  of SS-20s  from ICBM for  the cost  of $20  (a dollarF could buy a lot more back in the old days).   As time went on,  BurgerF King never  really did  anything with their  $20 investment,   and the? SS-20s remained stockpiled in one of Burger King's wharehouses.nD        ----- Then came the age of Computerized Cash Registers! -----F    Burger King  was in bad economic  straights back in 1973  when theyF were  losing  massive  numbers  of   customers  to  an  Irish-AmericanF hamburger chain (which shall also remain nameless).   They also wishedF to get some new electronic cash registers for their counters.   An oldF janitor at Burger King happened to stumble  on the old SS-20s one day,F and one of  the head programmers at  Burger King came up  with a greatF idea.   Why not take an old SS-20,   put an aluminum box around it andF put a keypad  on top and use the  device as a cash  register (you willD remember that ICBM was ahead of its time in making computers small).F    The idea worked;  it worked fabulously in fact.   However,  severalF years later they decided to add a  receipt printer to the whole combo.F Here is where  our trouble is.   As  I had mentioned before,   BCD andF BCDCB were not quite the same.   Burger King, however, did not realizeF this until after they had bought  the 12,000 BCD receipt printers theyF thought they needed.   They also did not realize this fact until after? they had mounted all 12,000 printers onto their cash registers.xF    The SS-20s  had a  rather odd  character-out routine,   which wouldF switch to graphics mode whenever to  identical characters were sent inF succession.   The letter 'R' also  could cause problems,  because thatF was  how you  returned from  graphics mode  back into  text mode  (theF process  of converting  back  to text  mode is  rather  slow on  theseF machines however,  and usually takes about as much time as it takes to send another 5 characters).kF    So,  as you can see the word  WHOPPER is actually what the SS-20 isF printing,  but  the second  'P' would  put the  SS-20s normal  displayF device (the GLCM)  into graphics mode.    Since a receipt printer doesF not have a  graphics mode,  it just  ignores the strange code  it getsF entirely.   The second problem I just  mentioned also explains why theF string 'FRENCH  FRIES' appears  as 'FFRIES' on  a Burger  King receipt tape.DF    I have, over this past break,  worked out the translation code fromF BCDCB into either BCD,  EBCDIC or  ASCII.   If anyone should happen toF want this program,  I will be glad  to send the source code along.   IF also have  developed the  code to  make a  Visual 550  act as  a GLCM.F Together,  these are the start of a really excellent graphics package.F If you wish to know how to make your Vs550 act as a GLCM,  please giveF me a call  and I will drive  to your installation and  personally give your Visual it's 'test flight'. F    Oh,  well.  I have to run now.   I hope this clears up any problems that might have developed. Later, Barry... -                         =====================y   9                 Meanwhile,  Back at the Ranch  --  Part I    F As the Lone Ranger  rode down the gully he felt  a shiver of impendingF doom run down his spine to the very roots of his ingrown toenails.  AsF he turned the corner on a narrow bend in the horse track, he yelled inF fear as  great black  swarms of  bats smoking  Rum and  Tapioka Cigars descended in a rush.*                             **************F    Meanwhile,  back at the ranch,  Goldilocks roused sleepily from bedF and shuffled downstairs, pulling on a thin robe as she went.   Much toF her surprise she  discovered a band of rowdy,  foul  orcs making shortF work of  what remained in the  larder.  She screamed daintily  and ranF toward the living room, the loose folds of her robe flapping about herF rather well-developed  physique,  pursued by  12 Orcs who  had decidedF they had  found something  better to  eat than  powdered cake  mix and instant coffee.e*                             **************F    Meanwhile, in an old slum tenement house deep in the thriving urbanF center of New York, Illinois,  Marvin Teeble decided he had had enoughF of crime  and rape and  began waging his  private war by  shorting the blind newspaper man 15 cents.s*                             **************F    Meanwhile,   back in  the gully,   TLR was  slowly recovering  fromF various venomous bites and several cigar-burns, shook his muddled headF and rose shakily  to his feet.   It  had been a rough  fight,  but theF Goodie-Goodies always win.  It was then he noticed Butch Cavendish andG twenty top marksmen, all aiming assorted deadly weaponry in his generaltF direction.    "Looks like  it's going  to be  one of  those days,"  he thought wearily.*                             **************F    Meanwhile,  back at the ranch,   three large and ill-disposed bearsF walked in on the scene in the living room.   Yelling with rage,  fury,F and  lust,    they  waded  into  the   midst  of  the   orcs  slashingF indiscriminately  at  vital  areas.   The  ensuing  confusion  allowedF Goldilocks, tired but satisfied,  to make good her escape out the backF door unnoticed,   covered with  blood and  various parts  of orcs  who( wouldn't be needing them anymore anyway.,                          To Be Continued ...  s-                         =====================   c  d,                           Hackers Take Note!  +F Below is  an IBM product  announcement that I  have cooked up  that is" becoming quite popular within IBM.C TITLE     VIRTUAL MACHINE / EXTENDED MIGRATION AID SYSTEM (VM/XMAS)tE ABSTRACT       The IBM Extended Migration Aid System (VM/XMAS), along @       with the newly announced System Advanced Network TailoringI       Architecture (SANTA), is the new base for all Extended ArchitecturerA       developments and is to become the only supported VM system. G OVERVIEW    VM/XMAS, on a triadic processor, allows a production MVS/XA G       to be run, while keeping idle 70% of the total processor.  System C       analysis screens will display 100% busy so that you can claimoC       that you need a larger CPU.  This is accomplished via the new G       370 instruction, Start Increased Execution (SIE) which will cause.C       all instructions to take approximately 60% longer (individual I       benchmarks may vary according to the tailored load of your system).        VM/XMAS HILIGHTSB       o   Automatic PSAR submission via RSF.  PSAR submission willC           occur whenever the system recognizes that is has suppliedh'           an INCORROUT reply to a user.mD       o   Support for full-duplex ASCII terminals.  Users must learnE           to type in reverse ASCII in order to use this new function.rC           3270 will currently still be supported but may be removeda*           at any given time in the future.A       o   Randomization after failure mode.  Dumps are consideredu>           too boring, so this added function allows the system?           maintainer to determine how much randomization occurse@           between the time VM/XMAS fails and between the time itC           produces a dump.  IBM Internal Use documentation suggests E           that a randomization factor higher than 10% maybe hazardousl+           to the system programmers health. A       o   Hierarchical dump file system.  Work is currently undereB           way for a dump file retrieval facility.  System planners<           are suggested to allocate a bank of 3380's for the(           hierarchical dump file system.?       o   Ability to upgrade to a Cray XMP.  Program testing iseC           under way to see whether this will indeed work as stated.m>       o   Variable resource accounting.  This means that it is?           variable whether VM/XMAS will do resource accounting.r CUSTINFO  PUBLICATIONSE                One copy of each of the documents listed below will beaH         supplied automatically with the basic machine-readable material.4           o   VM/XMAS Licensed Program Specification(           o   VM/XMAS Installation Guide(           o   VM/XMAS Messages and Codes%           o   VM/XMAS Program Summaryc0           o   VM/XMAS General Information Manual"           o   VM/XMAS CP Reference)           o   VM/XMAS Customization Guidew%           o   VM/XMAS SANTA ReferenceS0           o   VM/XMAS SANTA Messages and ClausesB           o   VM/XMAS Operating Systems in a Virtual Machine Guide)           o   VM/XMAS Technical ReferenceeI                  All documentation will be available according to general F           availability schedule. The Program Summary is available now.           SCHEDULE6                  Planned general availability is 5Q86.           EDUCATIONeI             VM/XMAS planning and installation education will be available &           starting on April 1st, 1985. TECHINFO  TECHNICAL INFORMATIONaF       PROGRAM INTERFACES: VM/XMAS is designed to support the following,       operating systems as virtual machines:F          MVS/SP Version 1 (JES2 or JES3) in a V=R preferred area in UP
          modem2          MVS/XA in a V=R preferred area in AP mode1          VM/SP in a V=R preferred area in MT modeyI          VM/SP High Performance Option in a V=R preferred area in UP modet@          OS/VS1 in a V=R preferred area (but only on Wednesdays)(          DOS/VSE in a V=R preferred areaA          MVS/SP Version 1 (JES2 or JES3) in a V=V area in UP modec6          MVS/XA in a V=V area in UP or virtual MP mode)          VM/XMAS in a R=V area in AP moded'          VM/SP in a V=V area in UP modea?          VM/SP High Performance Option in a V=V area in UP modeo(          OS/VS1 in a V=V area in MP modeA          DOS/VSE in a V=V area in UP mode (read over Planning andh@            Installation Guide for limitations of this particular&            configuration during 2Q86).C          VM/XA Migration Aid in a V=V area in UP or virtual MP mode D          VM/XA Migration Aid CMS in a V=V area (planned availability            is 4Q88).I      DEVICE SUPPORT: VM/XMAS provides for three levels of device support:iG          Fully-supported devices are those devices that are known to betB          used and may be used by but not exclusively used by, with.          prior consent by a responsible adult.H          Dedicated-only devices are devices that are recognized, but notC          only used by VM/XMAS but used sometimes by guest operating           systems.'@          Extended devices are those devices that are used by theD          system but not always by the system, to provide an extendedA          facility base to advanced SANTA user.  Read over VM/XMASaC          Planning and Installation Guide for the clause that statesv@          that SANTA users must be experienced Eunuchs (*) users.8          (*) - Eunuchs is a Trademark of Ball Lavatories      HARDWARE REQUIREMENTS: E      o   Enough DASD, terminals, tapes, and other I/O devices to pushr-          IBM stock above the $500/share mark. ?      o   A minimum processor real memory size of 512 megabytes.wB          Statement of intent: IBM intends to create a 512 megabyte<          real storage processor sometime in the near future.>      o   One Series/1 per locally attached 3270 type terminal./          The minimum Series/1 configuration is:eE        -   IBM Series/1 4956 or 4955 Processor with at least 128Kb of             memorya"        -   IBM Timex Clock (#7840)B        -   IBM Programmer Console (#5655 for 4956; #5650 for 4955)9        -   IBM 4993 System/370 Channel Attachment (#1200) '        -   IBM Teletype Adapter (#7850)*4        -   IBM 4964 Rockette Unit Attachment (#3581))        -   IBM 4964 Model 1 Rockette Unitd<        -   IBM 3101 Terminal in reverse ASCII character mode              (console);        -   IBM 4993 System/370 Channel Interface Check Carde=        -   IBM 4997 Rack Enclosure and Screw assembly (#9197)tC        -   IBM Feature-Programmable Multiline 4-line Communicationsr                Adapter (#2096)A        -   IBM Feature-Programmable 8-line Communications Control                 (#2095).k    SECURITY AND INTEGRITY::          With every purchased version of VM/XMAS, a bonded?   security agent is supplied to watch that no violations occur.o?   In addition, an integrity diploma is issued for every versionf6   of VM/XMAS stating it's virtue and integrity to IBM.=   INSTALLATION AND SERVICE: Due to a misunderstanding at PID, A   VM/XMAS will be distributed on magnets that are taped together. >   Corrective service, in the form of randomized object modules=   will possibly be made available.  Refresh frequency will bef<   every 90 minutes and customers will be notified when a new   refresh magnet is available. ORDERING INFORMATIONB           VM/XMAS can be ordered from any of the following places:           o Macy's           o Two-Guys           o Caldorsh8           o Duane Reade (free case of Anacin-3 supplied)(           CHARGES, TERMS, AND CONDITIONS           CHARGES            ONE-TIME CHARGE:B           $35,000 plus one first born child from each installation            YEARLY LICENSE CHARGE:            $65,000 plus baksheesh           QUANTITY DISCOUNTS: (           Quantity              Discount%           5 -  9                   9%,%           10 - 14                  3% &           15 - 19                  23%&           20 or more               15%           TERMS AND CONDITIONS           WARRANTED:B           For one year unless opened or tampered with by customer.2           LICENSED PROGRAM MATERIALS AVAILABILITY:I           This licensed program will be available without source licenseduH           program materials. It will be available with object code only.>           MONTHLY LICENSED PROGRAM SUPPORT CHARGE: no support.  E-                         =====================      i,                           IMPURE MATHEMATICS  iF    Wherein it  is related how that  paragon of womanly  virtue,  youngF Polly Nomial  (our heroine),   is accosted  by the  notorious villian,% Curly Pi, and factored (oh, Horror!).iF    Once Upon a time (1/t),  pretty Polly Nomial was strolling across aF field  of vectors  when  she  came to  the  boundary  of a  singularlyF matrix..   Now Polly  was convergent  and her  mother had  made it  anF absolute condition  that she  never enter  such an  array without  herF brackets on.    Polly,  however,  who  had changed her  variables thatF morning  and was  feeling particularly  badly  behaved,  ignored  thisF condition on the basis that is was  insufficient,  and make her way inF among the complex elements.   Rows and  columns closed in on here fromF all sides.   Tangents approached her  surface.   She became tensor andF tensor.   Quite suddenly, two branches of a hyperbola touched her at aF single point.   She oscillated violently, lost all sense of directrix,F and went completely divergent.   As she  reached a turning point,  sheF tripped  over a  square  root that  was protruding  from  the erf  andF plunged headlong  down a steed gradient.    When she rounded  off onceF more, she found herself inverted, apparently aline, in a non-euclidian space.F    She was being watched,  however.   That smooth operator,  Curly Pi,F was  lurking innerproduct.    As  his  eyes devoured  her  curvilinearF coordinates, a singular expression crossed his face,  He wondered, wasF she still  convergent?   He decided  to integrate improperly  at once,F Hearing a common  fraction behind her,  Polly rotated an  saw Curly PiF approaching with his power series extrapolated.. She could see at onceF by his degenerate  conic an dissipative terms  that he was bent  on no good,r    'Arcsinh', she gasped. F    'Ho, Ho,' he said.  'What a symmetric little asymptote you have.  I( can see your angels have a lit of secs.'F    'Oh sir,' she  protested.   'Keep away form me.   I  haven't got my
 brackets on.' F    'Calm yourself,  my dear.'  said  our suave operator.   'Your fears are purely imaginary.'B    'I...I' she thought.  'Perhaps he's not normal but homologous.'-    'What order are your?' the brute demanded.n     'Seventeen.' replied Polly. <     Curly leared, 'I suppose you've never been operated on.'F    'Of course  not,' Polly replied  quite properly.    'I'm absolutely convergent.'F    'Come, come,' said Curly.   'Let's go to a decimal place I know and I'll take you to the limit.'    'Never!' gasped Polly.tF    'Abscissa.' he swore, using the vilest oath he know.   His patienceF was gone.   Cohsing her over the coefficient  with a log until she wasF powerless,   Curly removed  her discontinuities.    He  stared at  herE significant places, and began smoothing out her points of inflection.eF    Poor Polly.   The  algorithmic method was now her  only hope.   SheF felt his hand tending to her asymptotic limit,   Her convergence would soon be gone forever!DF    There was no mercy,  for Curly was a heavysided operator.   Curly'sF radius squared  itself.   Polly's  loci quivered.    He integrated  byF parts,  he integrated by partial fractions.   After he cofactored,  heF performed runge-kutta on  here.   The complex beast even  went all theF way around  and did a contour  integration.   Curly went  on operationF until he  had satisfied her  hypothesis.   Then  he  exponentiated and became completed orthogonal.F    When Polly got home that night,  her mother noticed that she was noF longer  piecewise continuous,    and  had  been truncated  in  severalF places,  But is was too late to differentiate how.   A the months wentF by, Polly's denominator increased monotonically,   Finally she went toF L'hospital and generated a small  but pathological function which left5 surds all over the place an drove Polly to deviation.P&    The moral of our sad story is this:<            'If you want to keep your expressions convergent,:              never allow them a single degree of freedom.'        I-                         =====================c  r5                  "To err is human -- to moo, bovine."A  g-                         =====================d