QUESTIONS REGARDING SAFE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP84-00933R000500120001-5
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
85
Document Creation Date:
December 9, 2016
Document Release Date:
March 26, 2001
Sequence Number:
1
Case Number:
Publication Date:
March 18, 1980
Content Type:
MF
File:
Attachment | Size |
---|---|
CIA-RDP84-00933R000500120001-5.pdf | 3.68 MB |
Body:
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
OFFICIAL USE ONLY
APPENDIX I AND II (T9 srPle
7
Approved For Release 2001/07f2J:cCtITT86,-\0,0933R000500120001-5
?
14A rITT,.?.ilag, fill
Approved For Release 2tQl/t0702,.:CIA*4RIDF'88i-uou3ixo
' elDENDIX I.
500120001-
DIRECTOR OF CENTRAL INTELLIGENCE
Science and Technology Advisory Panel
?
?
18 MAR 1983
MEMORANDUM FOR: Director of Central Intelligence
.?
Deputy Director of Central Intelligence .
STATINTL FROM:
STATI NTL
JU Lflalrman
SUBJECT: Questions Regarding SAFE
1. In response to your request of March 14, 1980,
--
for comments on the current status of SAFE, I attach a
list of eight questions and brief comments that STAP
believes should be addressed.
?/
ft
STAP is continuing its analysis of the SAFE
problem and will prepare an options paper within the next
two weeks for your consideration.
WI ?
Attachments:
.As Stated
Vir
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
L.?-)1-
I I I
01EP oxrf:nH.,,it. USE alio
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
1.0 What steps are being taken to ensure that the Agency,
rather than the contractor is in control of the technical
aspects of the design of the system?
The geographic remoteness of the contractor, and the
lack of continuing contractor-user interaction can lead to
a situation in which the builder of the system also becomes
the architect. The absence of reciprocal technical
representation, like resident engineers, delays every
routine decision and makes larger ones unresponsive
Agency/community needs or technological constraints. Striang
Agency technical management is absolutely essential if the
system is to satisfy real and evolving agency needs and if
it is to be integrated with other Agency and community
resources.
2.0 How is SAFE management ensuring that a final working
system has been developed from the continuing evolution of
an operationally valid pilot system? Now has SAFE take'
advantage of the experience of similar, very large systems
in their:
1)%System architecture,
2r'communication and control, and
3) changing performance requirements?
How is SAFE management ensuring that the system will:
1) make available data on operation and usage of the
pilot system to guide development;
2)..be able to modify both system functions and
interaction capabilities so as to meet changing and evolving
requirements; and
3) be able to add new functions and interactions so as
to meet new requirements?
Relevant Experience -- It is well agreed that an
information handling system cannot be achieved by a simple
Design-Build-Use cycle, no matter how brillant the design
or faithful the building. Consider three (out of many)
currently operating very large nets with requirements at
least comparable in size and complexity with the Agency/
community's:
1) the ARPA net,
2) the airlines reservation system, and
3) the IBM in-house computing net.
Approved For Release 2001/07/12 : CIA-RDP84-00933R0001500120001-5
001.,
Approved For Releas
1/%717121), VA-R
044000500120001-5
All of these systems evolved - that is, they started
as soon as possible with operating pilot systems, so that
there was always an operational- evaluation of effectiveness.
Furthermore, in each case, a primary purpose of the original
plans was drastically altered as experience was gained. Even
so, developments in concept, hardware, software, and practice
are continuing now in greater volume than ever.
2.1 The ARPA Net
The ARPA net was originally conceived by
at the ARPA IPO (Information Processing Office) as a means
of netting research computers in order to do distributed
computing. The message facility was then a minor function.
As Message usage rose, packet switching became a powerful
tool with wide application elsewhere in the technology. The
separate centers in the ARPA net have much independence,
subject to some fairly strict requirements for communications
protocols and access. This allows competitive development
and a common evaluation of new technological developments -
e.g., the intelligent terminal is being subjected to widespread
experimentation and development.
4,
2.2 Airlines Reservation System
STATI NTL
The first automated electronic airfare reservations 'and
ticketing systems were disasters - e.g., SABER, the
American Airlines/IBM effort was predesigned and built to
an apparently reasonable set of specifications that turned
out not at all to match the operational needs. The first
successful ones were ad hoc temporary devices (e.g., UNITED)
that worked just well enough to be improved.
Note that the requirement for fast and accurate inter-
line communications, backed up by automatic'commitments for
seats and equipment was a much later development; it is, however,
by now one of the most valuable and cost-effective facilities.
2.3 The IBM In-House Computing Net
Virtually all the on-line computers at IBM company
.installations world-wide are netted together by communication
-2-
g
rntt
Approved For Release 2001/0t/A : ORpR434.100:532R000500120001-5
srensermirreemr.m.? _ ? .
I I I
???????.1?11111~....."1"61"110110.161110.00010011.0.11
?
CA ---------"---Approved-Forikeiease-2001/0711-2-telMRDP64-009-35R0005001-200-----
'
. ,
PULL UL
1
facilities, making them, we believe, the largest net in
the world. Admirable new functions exhibited by their
systems are: ,
1) a modifiable macro command language,
2), a consistent, speedy and flexible data transmission/
translation scheme.
3.0 The SAFE user community consists of Intelligence
Community analysts covering the full spectrum of research
into foreign political, military, economic, scientific,
and technological activity. Their effective use of this
system and, ultimately, the quality of intelligence they
produce rest on whether their real needs can be identified
and satisfied by the system. To that end, what actions
will be taken to ensure that:
1) all elements of the intended user community
are actually involved in the system's continuing development,
?
2) the broadest of the present analytical requirements
are ideiatified,
3) these present requirements can be validated by a
consistent method,
*.
4) the validated present requirements will be met,
5) modifications and new requirements can be accepted
as they,are identified,
6) all analytical users will acquire the necessary
skills and familiarization with SAFE on an interim basis so
they are ready to begin broad utilization when system IOC is
reached,
7) :this interim SAFE test-phase acquires continuing
comprehensive experimental data on user experience with the
system, and
8) .the acquired data on user experience is actually
utilized in the architecture and development of the system?
-3-
A IHLY
--"'""rx4tj;'Piiefwet"?O,i44a614iass.2aO1/07l12 CIA-RDP84-00933R000500120001-5
Approved For Release 201,074ig7tPtitiS4-094)/1110500120001-5
4.0 How can the Agency make a reasonable evaluation of the
current status of SAFE with major portions of the proposed
operational capabilities either unspecified or uncommunicated
to the Agency? For example,
1). the user command language and its parsing,
2) the user programming languages,
3) the user editing languages, and
4) procedures for backup, including regeneration
derived files lost in crashes.
Note the above have to be ari2Laypes capable of continuing
responsive evolution, rather than final imposed prescriptions.
5.0 What actions are under way to insure that the Intelligence
Community has access to CIA SAFE and that CIA SAFE has access
to DIA SAFE as well as such systems as COINS and SOLIS?
GIL
The absence of appropriate linkages with other IC systems
makes it highly probable that duplicate facilities and files
will be acquired and constructed with higher costs and lessened
capabiLity for the total IC system. Provisions for such
linkages should be built into SAFE from the start, otherwise
itwill be difficult if not impossible to.backfit these
linkages. STATSPEC
p.
6.0 How will SAFE deal with open source material? Will
material, either finished publications or field reporting,
be made-available to the analyst through SAFE? How will SAFE
deal wiEh current newspaper and journal entries?
Several of the offices that will use SAFE, in particular
OPA and OSWR, make extensive use of open source material.
Their analytical efforts will be seriously hampered if their
files do not include open source materials.
7.0 What steps are being taken to ensure that SAFE will be
designed,to allow collaborative usage?
Examination of other similar systems, such as Stanford
University's SUMEX system or the internal IBM system, shows
Approved For Release 2001Va12d iA i:C084-1!; 31461Cid00120001-5
I I I
? ? ? ?? ? - " .
CA NTEIINAL USE LY
that user-to-user interactions comprise a significant
fraction of the total use of these systems and greatly
enhance the overall analytical capability of its users.
8.0 What steps' are under way to ensure that in the
procure.ment of major hardware items, these items will be
compatible with existing Agency systems?
The Agency has made very substantial investment
ADP equipment that currently serves a wide variety of.
users. This investment should be capitalized on in order
to enhance the future capabilities and particularly the
flexibility of SAFE. If the interoperability of SAFE and
existing ODP hardware is going to be dependent on software,
then provisions should be made:
1) for the development of the needed
it will be a major undertaking; and
2) for the establishment of evolving
protocols for interconnection.
,
N.
-5-
software since
standards and
CAA INTEM.IA.1 USE ONLY ?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
I I I
ApprOV-e-d For Release 2001/07%12 : CIA-RDP84-00-93-311-600-5-0012-6001-5
MANAGING VM/CMS SYSTEMS FOR USER EFFECTIVENESS
APPENDIX II
Walter J. Doherty and Richard P. Kelisky, IBM Thomas J. Watson Research Center,
Yorktown Heights, New York. USA
Abstract
Management of the VM/CMS systems at IBM's Thomas J. Watson Research Center is based on assumptions
that the user's time and work product are valuable, and the system being used should be managed so that the
user's ability to work is enhanced with least inconvenience to the user. Within the financial limits on
Computing Center hardware and personnel it is possible to provide user-effective interactive computing
services which approach these objectives by placing highest priority on system reliability and availability
followed by performance improvements and introduction of new functions. Because our studies show that
user productivity is well correlated with system response we are convinced, first, that it is essential to maintain
a management commitment to the goal of good service to the laboratory, and second, that published service
schedules must be adhered to. At the same time,, it is necessary to realize that users will have spezial
problems, and management must be willing to work out solutions for these users. The goal of the computer -
operator is to keep the system up, and system programmers must introduce necessary system changes in a way
which does not jeopardize stability. We realize that the computing system is a tool which enhances both the
usei's memory and reasoning power. We have, therefore, assumed responsibility for preserving our users'
data. We have also developed data migration mechanisms to aid the user in managing data.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
'vERstotsT 53 --LEvr 32?DOC R5cr-TDS- lines - -18
S
ApprO-ved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Introduction
This paper describes the evolution of VM/CMS interactive computing services at the IBM Thomas J. Watson
Research Center, and the necessary changes in viewpoint needed to manage interactive computing services
effectively for the user community. Benefits deriving from alternative strategies have been evaluated against
the following criteria:
(1) The computer user's time and work product are valuable. Therefore, the interactive systems on which
the user works should be managed so that his ability to work is enhanced with least inconvenience to
him.
In fact, for most interactive computing the aggregate user time is more costly than the computer time. Figure
1 shows the cumulative percentage of people using computers at Yorktown vs. the cumulative CPU cycles
consumed by those people. Similar curves characterize the distribution of computing usage in many other
installations. (I) In general, about five percent of the people consume about seventy five percent of the
computing resource. If we focus on the top five percent of the computer users we find that a small fraction of
their interactions dominates their demand for computing. The computer user's technical management, not the
Computing Center, must determine whether or not the machine intensive computing to be done is technically
justified. Machine intensive computing occurs for about 5 percent or less of the interactions. The remainder
of the interactions involve immediate, ongoing communications between people and the computer. If we use a
figure of $800 per hour for the cost of a large computer today, the 25 percent used for 95 percent of the
interactions costs $200 per hour. One hundred simultaneous users, whose own time might be worth at least
$20 per hour, cost $2,000 per hour. These figures are only for illustration. In fact,. our computer costs are
less, our users' time is worth more, and we normally have many more than 100 simultaneous users on each of
two VM/370 systems at Yorktown. Therefore, for more than 95 percent of the computer interactions, the
user's time is much more costly than the computer's. Furthermore, these costs are diverging. The Computing
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
!VERSION- 53 -11:WEL 52 ?0C3C.# 8859 PD5linen 19 -
Approved For Release 2001/07112 : CIA-RDP84-00933R000500120001-5
Center at IBM's Thomas J. Watson Research Center attempts to provide an environment in which the
computer user can then make effective use of his time, and efficient use of the computing resources provided.
Figure 2 shows the growth in the interactive use of computing E. Yorktown from 1973 through 1977. It is
clear that the aggregate cost of the users' time is greater than our computer costs, and this difference
continues to grow. Therefore, the Computing Center seeks maintenance and enhancement strategies which,
within budget limits, help the user to get work done and which tend to give highest priority to the user's
requirements for service. This means that in so far as possible we must isolate changes from each other and
allow both old and new versions of functions to coexist so that the user is not forced to change his ways of
working.
An essential tool for our maintenance and enhancement strategy is the virtual machine in VM/370. In virtual
machines we are able to test new versions of most subsystems or applications without disturbing existing
versions. We can isolate many special functions to separate virtual machines which gives us the ability to
tailor the appearance of that function and simplify the user interface without fear of "contamination" from
other non-related function. When CMS is the operating system in the virtual machine, we find that we often
have least system overhead for performing that function.
(2) Complexity in the man-machine interface is wasteful of users' time, but complexity can be reduced by
the judicious use of procedures (2).
In April, 1978, the Yorktown Computing Center processed more than 10 million interactions. An interaction
is any user input and its accompanying system response. If the information content per interaction is too
O.
small, people could be decreasing the rate at which they work rather than increasing it. Or, viewed another
way if we can decrease the amount of work the user has to do to derive, a useful result from an interaction,
then we have made the system more effective for that user.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
VERSEOW 53 LV[ 52 -DOC-..4 tig59 PDS -lines 42 -
v? ?
6
TF DOHERFY YFL V006 WJDRPK
Approved-Fac--Release-20
PAGE 4 HIS I. Oti/l/// 15 11:11
.2-:, e:? -es:
We find that often our computer users will take great care to determine how to use some combination of
computing functions for a task performed repetitively. Once they have done this the combination of functions
is given a name and stored on secondary storage. After the computer has stored this information, the person
need not repeat those thought processes again. These procedures (EXEC's) may include useful default values
for parameters as well as logic to make the computer adapt to the user's environment, rather than requiring
the person to adapt to the machine.. Once a user has constructed an EXEC, others can, and do take
advantage of it. For example, EXEC's exist to simplify the business of using IBM's internal computer
network. The user normally doesn't have to concern himself with the kind of data involved, the protocols, or
the ways of addressing the person or group to whom data is sent or from whom it is received. Good default
actions have been determined by one of our users, and the EXEC's which he developed are now routinely
used by most of our network users at Yorktown. The naive user need not even be aware of the existence of
the commands or parameters inside these EXEC's. By this process complexity is reduced, typing errors are
avoided, and the user-effectiveness of the interaction increases.
From examining twenty percent of the users on one of the VM/CMS systems at Yorktown, we find that there
are twice as many EXEC's as all other source programs in conventional programming languages combined. (3)
In 1977, the Stanford Linear Accelerator Center (SLAC) installation observed an average of twenty five
commands executed per command typed at a terminal (4), when using the Wylbur interface. Wylbur is an
editing interface for interactive computing. Wylbur was about ten years old at that time. In 1971, we found
at Yorktown that the number of commands executed per person, counted at execution time after procedure
expansion, doubled in just five months. 'Thus, our experience indicates that there is continued growth in
function as users learn to adapt the system to their requirements. We can think of this growth as arising from
captured intelligence. In the early 60's the computing industry speculated on the notion of artificial
gence whereby the computer would heuristically determine the solution to some problem. In practice, we find
the concept of captured intelligence to be extremely useful for raising the man-machine interface to a
meaningful level for many people.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
'UtluCtriTZ- r rvtly 1II5 itS lines 4 -
TTF DOHERTY YFL V006 WJDRPK PAGE 5 HIST 08/07/78 17:17
Approm_erilor Releas- 2001/07/12 ? CIA-RD7114=011913130.0.1510.120.01t5____
(3) Display terminals are able to provide a user more information in a given time than typewriters. They
can be especially valuable to the user as an aid to how to use the system.
Where justified by the user's work in the view of the user's management, it is our objective to place an IBM
' 3277 display terminal on each user's desk. In general, we find terminal usage of an hour or more per day is a
reasonable prerequisite to installation of a terminal in a user's office. An example of the value of the display
terminal in accelerating the user's work is provided by our documentation practices on EXEC's. It has
become customary, at Yorktown, to include comments on how to use any EXEC directly inline with the
EXEC code. Thus, each user can determine what functions the EXEC does for him, what its syntax is, and
what the default values of parameters are by simply typing the name of the EXEC followed by a "?". By
having the comments included inline with the EXEC, these comments are usually changed whenever the
EXEC is changed, which maintains currency between the documentation and the code, and they are there
whenever needed. Our Yorktown user community has told us that these "self-defining" commands are
regarded very much more favorably than all other forms of documentation or education. This facility was
simply not feasible with the slower data rates of typewriter terminals.
(4) System programming is costly; therefore, management seeks solutions to user problems which do not
lead to growing commitments in system programming time.
System programmers are a scarce and costly resource. Strategies which increase system programming
requirements are to,be,avoided. Imgeneral, a local change to an operating systemcarries with it an obligation
to reevaluate that change everytime there is another change to that part of the operating system, e.g., PLC,
SU, PTF, etc. Such local changes, then, represent a kind of promissory note on which one pays interest
-?
(system programming time) indefinitely. The Yorktown Computing Center seeks strategies to reduce this
cost. For example, the Computing Center selected a strategy to attach new devices which avoids repeated
reprogramming as the underlying operating system changes. This subsystem, called the Advanced Terminal
Subsystem, attaches non-IBM terminals to an IBM System/7 which has been programmed so that the
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
TFF DON ERTY YFL V006 WIDRPK PAGE 6 HIST 08/07/78 17:17
Apprbved For Release 2001/07/12 . CIA-R
Ap-;-,,- 'Iui ii uii
underlying operating systems (VM/CMS, MVS/TSO, and formerly, TSS) on the 370/168 are unchanged.
Change is localized to the System/7, and new terminal types are introduced by means of table entry rather
than by modifications to MVS or VM.
. We have also distributed the responsibility for change to the people who most need it. By giving them special
virtual machines, and access to whatever source code they needed, together with good tools for debugging
?
changes and for finding out who else might be interestetk in any given function, we provide an environment in
which changes take place but reliability remains high. Special libraries exist to allow users to make their
changes available to others. By simply typing the command OWNER followed by a command name, any
person can determine who the current owner of that version of the function is, and communicate directly with
that person through the system for describing problems or new ideas for enhancement. Once such functions
have proven to have broad value to many people, they can readily be incorporated into the central Library
with little effort by the systems programmers.
(5) The development of new computing services is costly; therefore installation management develops new
services incrementally in order to evaluate these services before the next step is taken.
We avoid large development proi.,ccts which must span several years before their benefits are available to the z
users. Not only are such projectr. costly, but there is the great risk that the problem to be solved will change
or disappear during the lengthy development process. Because program development is a very complex
process, we find that feedback is required -continually throughout the development cycle. By bringing the
computer to the person who has the greatest knowledge of the problem to be solved, and providing that
person with adequate computing resource and an appropriate set of tools, we find that he can build a
prototype solution, try it personally, get others to try it, and iterate ma; times in this fashion until the
prototype is perfected to yield the required function. We find that this is the fastest way to produce high
quality function for the least cost. We also find that very skillful programmers absolutely require such
feedback throughout the development cycle. There is accumulated evidence to show that most errors have
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
' tVrki:tt)1,4-I IVI?K, rine, -44 "Ile.
eie-a=rairmirasalas mamma tosis Was
1TF DOfiERTY YFL V006 WIDRPK PAGE 7 HIST 08/07/78 17:17
Apprpveri For Release 2001/07/12 ? CIA-RDP84-00933R000500120001-5
???????
?1
occurred in the design stage (5), and that individual skills are the major factor in determining the quality of
programming projects of less than 50,000 lines of executable source code in size.
By developing new services in this iterative fashion, we are more likely to be sure that we are solving the right
problem, that the perceived solution is indeed a solution, and that the function can be readily changed as
future needs dictate. VM/CMS and the virtual machine available under VM give us the basic environment we
need to work in this fashion. Our experience provides evidence that this iterative method of program
development is an improvement over the traditional programming development process.
(6) User need for asynchronous computing grows proportionally to interactive computing; therefore the
availability of well-planned distributed function is increasingly important.
The load distribution curve of Figure 1 is the same for interactive computing as it is for traditional batch
processing. Because of the growth that has continued for the past ten years in interactive computing, there is
pressure to off-load that part of people's work which is large in computing resource demand, or which has
reached some logical stage of completion. If this were not done, long running processes would act as a block
at the terminal preventing a person from accessing his or her other data while that long running process
completed. By packaging special functions in special purpose virtual machines, it becomes easier to off-load
work whenever appropriate. These special purpose virtual machines need not run on the same real machine,
and in many cases, do not. However, to facilitate communication between such special purpose virtual
machines, A. N. Chandra developed an experimental mechanism which greatly facilitates communication
between different virtual machines running on the same real machine. We have employed this in our text
processing work, our laboratory automation work (6), our MSS data migration work, etc. The Virtual
Machine Communication Facility (VMCF) portion of VM/CMS is an outgrowth of Chandra's work. The
Network Job Entry and Network Job Interface software products have given us the necessary communication
facilities between different real machines. By being able to communicate with other machines, whether virtual
or real, we can permit new and old functions to coexist. Our users communicate with old function as needed
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
p.
tr L/l./1111: K. 1 I 1 ri. vu,o VVJ Littr
r atJC 111.11 1.10/ VI/ 10 11.11
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
rather than convert old functions to new environments. By insisting on having most of our terminals locally
attached, we minimize response time delays, reduce security problems associated with remote access, and
reduce the number of separate components required to be available simultaneously. Thus we find that
networking data rather than people is a more effective way to promote collaboration and avoid replication of
work.
?
In the following sections, management actions will be discussed as they affected the Growth of Interactive
Computing, Availability and Reliability, Response Time, Expansion Factors, and Visibility of Service, Data
Management, and Distributed Function. ?
The Growth of Interactive Computing at the Watson Research Center
The computer user at the IBM Thomas J. Watson Research Center has available a variety of computing
services. VM/370 is provided on two (six megabyte and seven, megabyte) 370/168'5 and OS/VS2 release
3.7 (MVS) together with TSO is provided on an eight megabyte 370/168-3. With their manager's concur-
rence, employees at the laboratory are urged to employ these computing facilities in order to do creative and
innovative work. Usage of the computer is not restricted to the scientist; secretaries and other non-technical
people use computers if management determines that it is cost-effective for them to do so. Since nearly all
computing services are accessed interactively from terminals in user's offices, terminal rooms or, in some cases
home terminals, we have attempted to develop management policies and practices which make interactive
computing services effective for the user. Some of these policies will be described in the following sections.
In what follows, prime shift means the period 08:00 to 18:00 Monday through Friday excluding holidays.
Second shift is 18:00 to 24:00 Monday through Friday and 08:00 to 18:00 Saturday, Sunday, and .holidays.
Third shift is all remaining time.
Interactive computing began, as a service, at the Thomas J. Watson Research Center with the introduction of
APL in 1965. To the computer user APL presented a fundamentally new interface different from the
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
, 1CILRSION? 53 I r VET 51-1)0C.# f0.131) FDS- lines To I - 181
TiF DOHERI Y Y1 L VUL/O WJURP1( PACA:, 9 IllS1 05/W/ 1: /
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
interface of batch computing. Clearly, most of the strong user acceptance of APL resulted from the APL
language and the APL system, but these positive characteristics might not have sufficed for user acceptance if
at the same time the APL group had not recognized that this new way of computing required a new way of
managing computing services. Simply stated, they recognized that interactive computing must be available in
order to be useful. The user must be able to turn on his terminal at any time he is ready to work and, with a
high degree of confidence, find the interactive system ready to serve him. APL service was provided on an
IBM 360/50 essentially twenty-four hours a day, seven days a week. Preventive maintenance of the 360/50
was limited to a few hours every three peeks, and because of the intrinsic reliability of the APL system and
the machine, the computer user was able to assume that APL would be available whenever he was ready to
work: in the evening, in the middle of the night, on weekends, holidays, etc. While Computing Center
management may not have realized it at the time, criteria for user effectiveness, system availability and system
reliability were being established for interactive computing services. These criteria have strongly influenced
subsequent management practices of the Watson Research Computing Center.
In 1967, TSS/360 was introduced at the Watson Research Center on an IBM 360/67. On TSS we began to
experiment with and to understand the effect on user productivity of variations in response time, the value of
indicating to the user a measure of system load prior to his logging on, the importance of scheduling controls
in order to distribute system resources equitably, and the need for "transparent" management of a growing
on-line user data base. TSS has been terminated at the Watson Research Center, but the experience gained
from TSS suggested new extensions to VM/370 and TS() so that these systems might become more effective
for the user.
In 1969, CP/67, the predecessor of VM/370 was introduced on a second 360/67 to serve as a software
development facility for operating systems. The irresistible user demand for CMS, which was not offered at
first to the computer users, showed the importance of providing an easy-to-use system for the non-specialist.
The increased load on the system resulting from demand for CMS showed that it was necessary to give the
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
VERSION-53- /.EVEL-52 -D005I-8859-113Slifies VW- -207?
I It? ULIIALK 1 Y Y L V UM" WJUKI-IC..
PAUL 1U 1-11S1 08/1.3// /8 11:1/
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
programmers, who had responsibility to maintain CP/67 (and later VM/370 which replace CP/67 in 1972)
toots to enable them to understand what is taking place inside the system so that a few users could not usurp
system resources to the detriment of system performance for the entire user community. In particular, we
learned that interactive system users are reluctant to accept the loss of a useful function or facility which they
used on an earlier interactive system, e.g., something equivalent to the ease of data management provided on
TSS must be made available on VM/370.
In the following sections we will examine in more detail results of our experience with managing interactive
systems.
Availability and Reliability
Computing services at the Watson Research Center are available, insofar as possible, twenty-four hours a
days wad seven days a week. Clearly, one must ask if such a schedule is accessary. Does the Computing
Center have cost-justified requirements from computer users for such a schedule? Technical management has
authorized computing which requires more than prime shift, but there are other reasons why such a schedule
was established: the requirement for computer availability by the experimentalists, the necessity that system
maintenance be done after prime shift, and the relatively low incremental cost to provide these added services.
There are, however, impediments to such a schedule: unscheduled software or hardware failures, scheduled
software changes or tests, scheduled hardware shutdowns for engineering changes, preventive hardware
maintenance, hardware relocation, and finally, the unavailability of personnel to operate the systems on
weekends and holidays.
On the question whether such extreme availability is necessary we note that researchers (computer scientists,
chemists, physicists, engineers, etc.) expect and require a degree of flexibility in working conditions.
Experiments cannot be constrained to the normal eight hour working day, and there are experimentalists who
may extend or shift their working hours to coincide with the requirements of their experiments. There are
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
. ? ./r.iksiotsr f EVEC 52 DOC.# 89-1W lines 20g - ?De
1TF DOHERTY YFI, V006 WJDRPK PAGE II HIST 08/07/78 17:17
ApprovecFFor-Release 2001/07/12-:--et-A-Repaiveo93-3-Reees- e01 2Oeff1=5-
also scientists who work more than eight hours, or are simply more productive if given access to the tools they
need in the middle of the night, on weekends and on holidays. Finally, we realized that if users are to entrust
all of their programs, procedures, documents, and data to the interactive systems then that information must
be available at least in the same way as from a locked file in the user's office. To limit the user's access to his
files is simply not satisfactory from his point of view. Consequently, Computing Center management made
the decision to offer computer services, insofar as possible, around the clock. This policy is at times
incompatible with the needs of the Computing Center to test new software at night, modify or repair
hardware or carry out necessary housekeeping tasks such as making copies of the on-line data base as a
safeguard against destruction. But, given a commitment to provide service around the clock, compromises can
be worked out so that many hardware changes are postponed to third shift or to weekends. Together with
our users we have evolved a strategy for software testing so that changes to the software system are
introduced on pre-scheduled days, usually during a shutdown at 18:00 lasting 15 to 20 minutes. The period
from 18:00 to 08:00 the next day is then designated as a User Risk Session which informs our users that new
and possibly unstable software is being tested. The Computing Center is then allowed two system crashes.
After the second crash, the standard prime shift system is restarted, and the users know that no more testing
will be done that night. Housekeeping tasks can usually be designed to run in a time-shared mode so that
back-up of the data base can be done after 18:00 even though users are on the systems. Such tasks take
longer to complete when executed time shared rather than stand-alone, but stand-alone use of the computer is
employed very rarely because it limits user access to the systems.
When new software changes to the operating systems have been tested for about a month on second and third
shifts, they are then introduced on prime shift, usually on a Friday so that we have the weekend to solve new
problems which may appear. In general, after one prime shift failure of the new software we return to the
older standard system. If the new software runs for a week without prime shift failures it becomes the new
standard system.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
" -fie'Ser as e A 1,i^ser - 571-1 ott
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Unscheduled hardware failures normally call for immediate repair in many computing centers. In general, our
policy is to restart the system and maintain service even if it is degraded. Only if the failures become so
frequent that the user cannot proceed with his work, or if we cannot restart the system, will we give up the
system for service on prime shift. Relocation of hardware and the addition of engineering changes is
constrained to second and third shift periods or on weekends, excluding 08:00 to 18:00 on Saturday if
possible.
Despite our intentions to provide around the clock service, a major difficulty is that of operator availability.
Because we always operate under manpower limitations, we were led to seek new ways to increase operator
availability with a fixed number of computer operators. We realized that we could not operate each machine
from its own console and continue to mount tapes and disks on demand with the operations staff we have.
We, therefore, designed a central ''operations bridge" from which all three 370/168's could be operated by
means of IBM 7412's and 3277's, and made changes to the operating system where necessary so that systems
could be started and controlled remotely. Since all of the operators must be trained to operate all of the
systems, it is much more difficult to develop operators highly skilled on all systems. Consequently, we have
an MVS/TSO/JES3 operator team with a lead operator and a VM/370 operator team with its lead operator.
Members of one team can operate the other system, but do not necessarily hav? specialized knowledge of
their secondary system. This strategy does allow the Computing Center to operate on weekdays with six
operators on prime shift, five operators on second shift and three operators on third shift. On weekends and
holidays there is ione operator on each of two 12 hour periods per day. On certain holidays, such as
Christmas, New Year's Day and special IBM work holidays the interactive systems run unattended with the
understanding that private tapes and disks cannot be mounted. Nevertheless, there are people who come into
??
the laboratory on holidays to use the computers, or who, in a limited number of cases, dial in from home
terminals which represent yet another way to extend system availability.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
\TRSION- 33 -LEVEL- 52- - DOC.#. g859 Siiiie253---- 277
TF DOHERTY YFL V006 WJDRPK PAGE 13 HIST 08/07/78 1717
Approved Fur Release 2001/07/12 . CIA-RDP84-00933R000 00120001 5
Another important aspect of system avails blility is that of management flexibility. Computing Center
management must be willing to make compromises in schedules in order to serve special needs of users.
When Computing Center schedules are published each week, or when sudden changes to those schedules must
be published by means of logon messages to the users, we invite users with special needs to contact us. If a
user is attempting to finish a paper to meet a deadline, or simply needs to get an urgent piece of work done
by a certain time, it is important that the Computing Center try to adapt its needs to the user rather than
insisting that users always adapt to the Computing Center. On the other hand, it is important that schedules
promising service at specified hours be adhered to. It is extremely frustrating for a computer user to come
into the laboratory on a weekend or holiday expecting to use the computer and find that the Computing
Center has changed the schedule even though the reasons may be good ones. We have also established a
special telephone number from which the user can obtain a recorded message on the status of the systems.
This message is changed and time-stamped whenever a system failure or other emergency changes the service
schedule. The main disadvantage of the recorded message is that it is just not accurate enough for brief
system failures although it is useful for failures lasting more than five minutes. Our users tell us it is accurate
no more than 70 percent of the time, and we are seeking a better way of informing users of the status of the
systems.
Performance Management and Visibility of Service
System response time is the time measured from the user's signal to the system that there is work to be done
to the point at which the system begins to present those results to the user. It is time the user had to wait for
results and is important to his ability to continue effectively with his work. Figure 3 shows a picture of the
-?
response time to a single small program which ran every 20 seconds in the spring of 1971. Each 20 seconds, it
awakened, and recorded the number of logged on users and the response time that it received from the
system. Figure 3 is really a 3 dimensional graph. Each plot position is a number indicating the number of
times a specific response time occurred.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
1-11- 1)011111-CI Y Y1 L V006 WIDRPK
PAGE 14 HIST 08/07/78 17:17
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Notice that as the number of simultaneous users increases, the response time steadily and sharply degrades.
Thus, if we simply try to maximize the number of simultaneous users, we find that we are maximizing the
number of people to whom we are presenting a sharply degraded picture of service. This means that the
number of simultaneous system users is a misleading measure of system load. The system expansion facto...,
rather than the number of simultaneous users is a meaningful measure to the Computing Center and the users.
It is defined to be the ratio of the actual time to do a unit of computer-limited work to the minimum time to
do that work in a stand-alone environment. We will discuss the expansion factor in more detail below.
We find that significant performance improvements lead to a reduction in the number of simultaneous system
users, perhaps because the user gets done with his planned work sooner. This is accompanied by an increase
in the number of interactions processed, but the overhead needed to do that work tends to decrease.
Figure 4 shows the profound influence that system response time degradation can have on user behavior. If
we break an interaction into two parts, the system response time (SRT) during which the system is processing
a request for the user, and a user response time (URT) during which a user is keying-in his or her next
request to the system; then each second of system response degradation leads to a similar degradation added
to the user's time for the following request.
This phenomenon seems to be related to an individual's attention span. The traditional model of a person
thinking after each system response appears to be inaccurate. Instead, people seem to have a sequence of
actions in mind contained in a short term memory buffer . Increases in SRT seem to disrupt their thought
processes, and this may result in a time consuming reloading or alteration orthe short term memory buffer.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
? ? 'VERSION 53 invEu 52 Doc# 88s9-rns (Ines 302- - 32C -
1 11- 1iIM1.12.1{ Y YIL V000 NV.IIJKYK.
FACJI:: 13 1-1131 U25/0// /8 11:1
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
This phenomenon was first discovered by S.J. Boies (7) at Yorktown in 1971 While doing normative studies of
interactive computing. We had recorded every interaction on TSS for three years, and this data base included
a wide range of human tasks. Boles' phenomenon was detected during most types of work.
. It is interesting to note that controlled behavior studies going back to 1938 (8) showed that three things
happened to people in a stimulus-response situation when the stimulus became both tong and erratic. First,
they slowed down in their work, second, they became emotionally upset; third, they made more mistakes.
If we were to tolerate a system responce time as long as two seconds in our laboratory and assume Boles'
phenomenon occurs, it would cost us a minimum of 36 million seconds per month of lost human time. That is
10,000 man-hours, or 60 people lost full time for the month. It is our objective to keep 90 percent of our
interactions to a response time of .5 seconds or less. Subsecond response time is an important human
requirement.
Figure 5 shows the distribution of user response time (URT). Others have called this think time. The mode
of this distribution is 2 seconds. The median is 8.5 seconds and the mean is 12 to 15 seconds, depending on
when one terminates the data points. If all end points, such as the two hour lunch break, or the time when
users forgot to log off, are included then nearly any average is conceivable. In the extreme case what is really
being measured is how long the system stayed up. But, by truncating after two minutes we find an average
URT of 12 to 15 seconds, and we have observed that average for the past several years. The high frequency
of points in the two second range may reflect the fact that people scan far more information than they read,
and read more than they write.
Figure 6 highlights the impact of scheduling on the man-machine interface. It shows the impact of the
Resource Management PRPQ for VM/370 in a benchmark environment as it would affect users. The
columns titled RM PRPQ show the results of running with the PRPQ in an heavily loaded environment. The
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
? 'VERSION- 53 -LEVEL 52- DOC.0-8859 Mg lines 321 -
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
1
columns titled RELEASE 3 show that same heavily loaded environment without the PRPQ. Notice that even
in this heavily loaded environment 50 percent more interactions can be handled by the system with the PRPQ.
And the response time at the 90th percentile is 20 times better. Notice also, that the base system handles
more interactions with 60 people than with 80. By allowing those extra 20 users onto the system in that
overloaded environment we observe that we have effectively lost the 20 people and slowed the other 60
down. In other words, without a knowledge of the expansion factor the number of simultaneous users being
served is a poor measure of the load on the system.
Figure 7 shows computer cost on the vertical axis and the expansion factor on the horizontal axis. If the
machine is underused, then most of its cost may be lost dollars. As the demand for computing services grow,
the expansion factor also grows. At some range of expansion factors, the system is being optimally used in
the sense that as the load builds beyond that to higher expansion factors a significant portion of the hardware
usage goes into unproductive work.
Figure 8 shows the lost hardware dollars per hour due to underload and overload on one of the VM/CMS
systems at Yorktown. The V shaped curve is an envelope containing the actual operating points. The
expansion factor used here is an actual elapsed time expansion factor. It is the actual time to do some typical
unit of computer-limited work divided by the minimum time to do that work in a stand-alone environment.
Figure 9 shows the cost of the lost end user .time per hour on the vertical axis. The horizontal axis shows the
expansion factor. The expansion factor grows together with the number of simultaneous users, and the
number of people being slowed down by the delivery of poorer service to each also grows.
Figure 10 shows the combination of the hardware operating points and the end user costs as a combined loss.
Note that there is indeed an optimal operating range, having expansion factors in the range of 4 to 6. This
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
. VERSION ?53 LEVEL 52 DOC:4 8/459 EDS fines ?341 - 361
TTF DOI IERTY YR_ V006 WJDRPK
PAGE 17 HIST 08/07/78 17:17
Approved For Retedbe 2001/07t12-.-er-A-Riape4-e0930005 1
optimal operating range is dependent on both the operating system and the machine speed. The cost of
overload is far greater than the cost of underload when the end user's time is considered.
We use VM Monitor to monitor the daily use of our VM/CMS systems in Yorktown, and we attempt to
maintain the operating point very close to an expansion factor of 5. Note that this definition of an expansion
factor, using elapsed time to stand-alone time, differs by about a factor of three from that reported via the
IND command in VM/370. The IND command normally reports a number that considers all users in a single
server environment.
W. H. Tetzlaff has developed a very sharp set of analysis programs to analyze the service each user receives
each day. These programs are run each night, and give us a clear indication of the quality of service, what
caused problems, and what the relative pressure is on each system resource. His programs calculate the
expansion factor for each hour of the day. These programs make the business of tuning, capacity planning,
and service analysis a fairly straightforward task. They are described in his paper 'State sampling of
Interactive computer users'.
W. J. Doherty [9] has studied these issues extensively and has defined the performance of an entity (a
function, a system, etc.) as the degree to which the behavior that entity meets the observer's expectations.
More precisely, performance is the difference between the observed behavior of an entity and the observer's
expectations of behavior. We have found that if we can give the computer user some notion of the current
state of the system he is planning to use, his expectations are modified accordingly and he can make sensible
decisions in planning his work. For example, he may elect not to log on to the loaded system but .to do his
computing later when the expansion factor is lower. This decision on his part avoids making unsatisfactory
service even worse. In TSS we introduced a numerical measure called the THI (based on the U. S. Weather
Bureau's Temperature-Humidity Index of human comfort) which was an averaged value of the time needed to
perform a standard task. The TI-Il was available to the user before he logged-on, and he interpreted that
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
? ? ? ...eva &LEN,. 1 itt. V VV,I VYJLflfl AfltiC. 10 1-113 I U0/ 111/10 11;11
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
number in terms of what he was planning to do, e.g., editing would get reasonable response even with a
relatively high THI, but a PL/1 compilation and execution might be unacceptably slow under the same
conditions.
' It was reasonable to carry to VM/370 our experience with the THI but it was also desirable to give VM users
more information about the status of VM than the simple THI of TSS. Accordingly, P. H. Callaway [10]
implemented a THI for VM. The user must logon to VM/370 to obtain this information, but VM logon is
usually very rapid and consumes very little resource. The components of this THI are available to both the
control program and a user program executing in virtual storage. Thus, certain maintenance tasks such as
data base back-up or data migration can check for low system activity before proceeding, which tends to
minimize their impact on the user community. We have also found that by giving the operator information
about system overloads derived from this THI, he can ask dominating users to postpone or moderate their
activities, and he has been able to detect program looping not apparent to the user. The Watson Research
Center version of the VM/370 THI together with other information collecting facilities we had implemented
were made part of VM/370 Release 2 as the VM/370 Measurement Facility. VM/370 THI is now known as
the Load Indicator.
Data Management
In 1965, APL on the Yorktown Computing Center's 360/50 imposed rigid constraints on the size of the
user's data base: 36K bytes of working space of which about 32K were available to the user, who constantly
protested against those limits. At that time the only way to increase work space size in APL was to provide
more main memory and/or reduce the number of workspaces in main memory simultaneously (thereby usually
increasing response time). Until APL/CMS became available, APL work space limitation was an annoyance
to many users. On TSS/360 the situation was radically different because to its users TSS appeared to be a
one level store. To the limits of allocated disk space, the TSS user could create data sets and file them and
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
?Ci.funct,,?Io tit tor neNr 4 00411- Une Arlo
masa tobakv.A.:
TTF DOHERTY YR. V006 WJDRPK
Appro
1 1 1 1 1 1 1
PAGE 19 HIST 08/07/78 17:17
84-00933R000500120001-5_
retrieve them by data set name. The system managed all direct access storage space for the user. We could
not continue to add on-line disk storage to TSS, but we also wanted to avoid requiring the user to spend time
moving data sets to and from private tape or disk volumes. We developed a data set migration facility for
TSS which became operational in April 1969, and had the following characteristics:
(1) Data sets were marked with a date last referred to.
(2) Data sets not referred to for more than N days (the value of N determined to keep a safe amount of
on-line space available) would be compressed and migrated from the on-line disk volumes to
demountable disk volumes stored off-line.
(3) If the user referred to a migrated data set, the system informed him it was migrated and told him how
to get it back.
(4) The user could list the names of all migrated data sets, voluntarily migrate a data set not needed for a
while, and erase unneeded data sets.
TSS Data Migration met many of the user's data management requirements but had some limitations. There
was no mechanism by which a user could specify that any migrated data set to which he referred be restored
automatically without additional action. This was an annoyance even though the user was given a message
containing the name of the migrated data set. If the user knew that he must restore a migrated data set, he
still was required to initiate the restoration 'process and to wait until restoration was complete. Most users
preferred that restoration proceed without locking the terminal so that other work could be done. We have
learned that for future data migration systems, when restoration is completed the user should be informed.
With the introduction of CP/67 and later VM/370 at the Watson Research Computing Center, the interactive
system user found that the burden of on-line space management was transferred back from the system to the
User.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
D011ER1 Y YFL V006 WJDRPK PAGE 20 HIST 08/07/78 17:17
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
(1) Because he is given a fixed allocation of disk space, the user might have to stop in the middle of his
work to decide which files to erase or move to tape in order to make room for new files being created.
(2) As his files grow, the user must try to persuade installation management to give him more space; on
the other hand he is pressed to give up space he is not actually using.
(3) When the user is given more 'space, his previous allocation must be copied by the Computing Center
into the new space. This is an overnight operation, and usually requires that many users' space
allocations be copied even if the}, are not changed in size.
By late 1972, the Computing Center had more requests to add new users than we had available disk space.
Since user disk space on VM is frequently only partially used, and since on-line disk space is only fractionally
active at any point in time, rather than invest heavily in additional disk storage devices, management explored
two strategies. First, and least acceptable to the user community, we imposed an external schedule which
distributed the available system time among the users by mounting only certain subsets of users' disk files at
certain times. This not only constrained each user to specific hours, but, frequently made it impossible for him
to access files of a colleague if those files were only available at a different time.
Second, we began a one man development effort to determine whether or not user files could be managed by
the system so that only "active" files occupied on-line disk space. This design was very promising and by
1973, we decided to carry our experience from TSS to the VM minidisk concept in VM. The most convenient
unit of space on VM is not the user's file (although we subsequently implemented file migration) but his
minidisk, a specific number of contiguous cylinders of on-line disk space. VM Data Migration as implemented,
at the Watson Research Computing Center moves and compresses an .ntire inactive minidisk on to a
demountable disk, thereby leaving an "empty slot" on-line into which an active minidisk of that size can be
moved on demand. As in the case of TSS, the decision to migrate a minidisk is made on the basis of a
specified number of days elapsed since the minidisk was last accessed. The user whose minidisk has been
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
ttirtiVahr 1TVvrr-cl -rm
'TTF DOHERTY YFL V006 WJDRPK PAGE 21 HIST 08/07/78 17:17
ApprovedFOr Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
migrated experiences a longer than normal delay during his first logon while the minidisk is located, decom-
pressed and moved into an empty slot on-line. Subsequent logons will proceed normally unless the user again
fails to logon within the specified number of days.
? Since the minidisk migration task must be available at all times, we implemented an AUTOLOGON facility
which automatically logs on specified tasks after a system restart. AUTOLOGON has had value far beyond
its role in minidisk migration; as a result of demands for asynchronous processing mentioned earlier, we find
there are many special tasks which carry out important services for our users, e.g., the NETWORK task
?
enabling users to send work between systems, and which required manual restart by the operator. Now they
are automatically started at system load time. If the operator failed to restart these special tasks, the user
found these important functions unavailable.
The file migration capability which we have added to 'VM/CMS enables the user to migrate a file by file name
from his minidisk to a demountable disk. In this way he can save and retrieve CMS files.
A valuable consequence of VM migration is the back up capability it affords the installation. On third shift,
copies are made of all minidisks accessed on the previous day, and are stored on a second set of on-line disks
which are copied to tape. If a user inadvertently erases his files, within four hours the Computing Center is
able to produce a copy of his minidisk which is no more than twenty-four hours old. The Computing Center
has very rarely lost a user's data; nearly all data losses take place when the user erases or inadvertently writes
over his own files. We believe that the Computing Center has a continuing responsibility to safeguard the
user's data against both accidental and unauthorized access or destruction.
Another major benefit of the data migration facility is the reduction in cost for managing on-line data. Just
before the introduction of these facilities for VM/CMS in 1973, there were about 350 tape mounts per day
and 200 disk mounts per day across the whole installation. By early 1978, when the use of computing had
grown by a factor of 8 times, we were processing 30 tape mounts per day and 5 disk mounts per day. Thus
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
If ? ? gal " ??? a 15, ? "Oi
TTF DOHERTY YFL V006 WIDRPK PAGE 22 HIST 08/07/78 17:17
Approved For Release 2001/07/12 . CIA=Riapazroonancro5oatmert-
- -5-
an effective reduction of at least a factor of 80 times was achieved in the frequency of tape and disk
mounting.
Distributed Function
A user's CMS vitrual machine in VM is well isolated from other CMS virtual machines in the sense that a user
may cause his CMS machine to "crash", but does not affect others. Therefore it was our belief that the CMS
machine would be an excellent vehicle for the development of special functions which could then be tailored
for ease of use, ease of maintenance, and good performance. The strength of VM lies mainly in the strong
isolation provided by virtual machines.
Because we could use CMS to isolate a particular function from all other functions, the user need learn only
that function to use that function. Thus, complexity in the end user interface is lessened. As a function
evolves over time, tradeoffs in efficiency and ease of use can evolve together without being clouded by other,
non-related issues.
Because the function is isolated to a virtual machine, it becomes easy to add new versions either as copies or
replacements. This greatly reduces the sensitivity of the whole system to changes. In addition, the VM/370
system automatically re-IPLs itself in most cases if it should fail. It then automatically re-IPLs all such special
purpose virtual machines. This is normally done without operator intervention and typically takes about 30
seconds of elapsed time.
Because the users of interactive systems grow in what they use the system to do, we find that interactive
growth results in a proportional requirement for asynchronous processing, i.e., the ability to do computing
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
TTF DOHERTY YFL V006 WJDRPK
Approved --For
PAGE 23 HIST 08/07/78 17:17
-iii iv 'Vie
which is separated in time from the user's interaction with the system. This had often been called batch
processing in the past. By grouping special purpose functions in special machines, we can apply better
controls to those functions. i This includes special scheduling controls, grouping of requests to reduce
overhead of initialization, and tailoring of the function over time in accordance with the user's evolving needs.
Also, by giving the user the ability to submit work to asynchronous virtual machines, we remove bottlenecks
from the user's interface to the system and his data. It is important to note that these special purpose
functions need not run on the same real machine as the user is currently using.
Thus, the virtual machine concept directly applies to distributed processing. The gains to be had for load
distribution are real, but they are small in comparison to the gains in reduced complexity, ease of mainte-
nance, and improved service to the end user.
Our experience with distributed function leads us to the conclusion that we have now seen three distinct
stages of computing center activities. The first occurred in the early sixties, when the computing center
provided computing services and served as a pool of applications programmers allocated to help scientists
develop their programs to use the computer to solve problems that were machine limited. This was because
computing was about 100 times more costly at that time, and so only a few applications were cost justifiable.
It was also due to the lack of data management and primitive user interface then in existence.
The second stage was that of the system programmer, when most computing centers grew rapidly in size and
the systems did also. Highly skilled people were required and change management grew increasingly complex.
The computing center personnel were devoted to make the systems more manageable. However, their time no
??
longer went directly to the end user. He became a direct user of the systems.
The third stage is our current environment in which the systems personnel are primarily involved in some
basic system changes and the management of tools for distributing he responsibility of change control to the
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
TTF DOI IERTY YR. V006 WIDRPK PAGE 24 HIST 08/07/78 17:17
Approved For Release 2001/117/12 : GIA-RDP84-00933R000500120001-5
users who have the strongest need for the changes. In this way the end users themselves can better control
their own environment. Our networking capability allows our users to communicate freely between one
another and send new tunctions directly to each other in machine readable form. Our users send an average
of the 3,000 files a day in and out of Yorktown computing systems. The typical file size is 50,000 characters,
which is the equivalent of a 20 page paper. That is a measure of the communication among users on
physically different real machines. In fact, the communication among users of the same physical machine, but
different virtual machines is probably far greater.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
? a ir-ar? Soi ? un tic
?
DOHERTY YFL V006 WIDRPK
Approved ForRetease-200-tfOttt2-.
Summary
PAGE 25 HIST 08/07/78 17:17
? 11
III
Appropriate management actions can significantly enhance the effectiveness of an interactive system from the
user's point of view. During more than ten years experience with interactive systems at the IBM Thomas J.
? Watson Research Center, we have made management decisions which extend the capability of these systems
to work for the user by enabling him to make sensible decisions about how he will use his time, and by
selectively adding to the systems facilities which enable him to spend less time compensating for system
limitations and more of his time on his problem. Increased emphasis has been placed on using the computer
as a tool to extend the users' memory as well as their reasoning power. Our computing systems are adapted
by experienced users, via EXEC's, so that the effectiveness of man-machine communication is increased with
time. This is of special benefit to the inexperienced user who then takes advantage of the experienced user's
evolutionary growth. Issues of availability, distributed change management, data management, inline
documentation, response time, expansion factors, distributed function, and effective user to user communica-
tion have been key to our success. VM/370 and CMS are the primary vehicles that our users have found to
be effective for our rapidly evolving interactive environment.
Acknowledgements
The managers of VM/CMS at Yorktown Heights have contributed much to the IBM product in addition to
effectively providing excellent service for the Yorktown users. These include W. M. Buco, A. N. Chandra, B.
Lie, and N. J. Pass. W. H. Tetzlaff and P. H. Callaway have contributed much to the performance manage-
ment of VM/CMS and their work is gratefully acknowledged. L. H. Wheeler has developed scheduling and
resource management strategies that have sharply increased our ability to provide interactive computing
service to a large number of people at Yorktown.
REFERENCES
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
? ? ???? 11--F4 IL, f?CONT, 01b en 1-es0 11? - ?/ ? A
Approved For Release 2001/07%12 : CIA-RDP84-00933R000500120001-5
[1] A.W. Luehrmann and J.M. Nevison, Computer Use under a Free-Access Policy, Science 184, 957-961
(1974)
[2] W.E. Daniels and R.W. Ryniker, EXEC 2, A Computer Language for Word Programming, IBM
Research Report RC 6292, November 17, 1976
[3] W.J. Doherty, Human Factors: Impact on Interactive Computing, Proceedings of SHARE 50, vol. 2,
1244-1266, March 1978.
[4] Private communication between t. Johnston (SLAC) and W. J. Doherty, Feb. 1978.
[6] T. R. Bell,
[6] A. Guido and J. P. Considine NCC paper on TPVM
[7] S. L Boles and J. D. Gould, User Performance in an Interactive Computer System, Proceedings of the
Fifth Annual Conference on Information Sciences and Systems, Pg. 122, 1971
[8] R. S. Woodworth, Experimental Psychology, Henry Holt and Co., Inc., 1938
[9] W. J. Doherty, Measurement and Management of Interactive Computing, Proceedings of SHARE
XLIV, vol. 3, 1587-1598, March 1975.
[10] P. H. Callaway, A Performance Measurement Approach for VM/370, IBM Research Report RC
4666, January 4, 1974.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
VERSION-53- LEvEL 52 ---DOC:if rDS lines 540 - 334-
- - Approved For-Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
100
80
0-0 70
60
>50
-I 40
2
F., 30
YORKTOWN. eiCZ
20
10
romMIIMI?
1???11/11011
*111111111110
???????Ir
100
90
80
60
50
40
30
2.0
10
1 1 I 1 I f
0 10 20 30 40 50 60 70 80 .90 (00
CUMULATIVE % - USERS*80,' (1)&00
-,
'
FIGURE JO
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
0.0.0 ????? ????? mn?
:-1,,... , ?
-I ...
7:
. ? I . '
.
' 'APO
Ved
.
Ftit:ROteate
..-
20611
7112: '
; , ,
CIA:-FiDP,84
? 1 ' ? ?
0206[12496)05001.12:b
'0.1i-5 ;
....... .......
I
' ; : ;I: ; ?
.....
-;;;;::.
.
.
..
I
, ? ?
. ' ....
..
1
.
.
.... ; . .... ....
? ' : : 1: : " I 1
:: ..... ::
.;::.-
, . , , .
-?-:+:-:-:
" ' ' ? "
:::1::".
- ; ? ?
. .1..
.?. ... ::
?
: -
1
...., .
?
....... ?
77:7 : . ? -- I 7: 7'1 :
"?"...' ......
.,
T
'
:..i::::
::::: . ;,..:;?;..;
: :. :-. :1-7,1
, : ? : ?
'.. ........... ' :
,i-:. - - I' -71
' ? :1'
_I ...
'7: ' 17 ' -
? ? , . ? ? ?
... t .
i ''-- '
? . ? ? , ....
.........
7 7771: 7 ::
.... : ....
... '
I
? I' ? I
1
1
,
'
.
1
.,. ..
1
.. ; .............. .
? I
, ... ,....
1
- 1" "
.,
99,
- .....
,..., .. ?
099::?:
1
???
.........
::.:::,::::
I
. ..
.
....,....
::::i::::
'
.-71-71-77 ..
:::1::::;::::1::::
....
1
::.....,!:?::-:
...........:-
' -
..
'
'
-.-
?
.....
??i,
.......................
'
? ? ' ? ' '
f
l? ?
.
7
?
..r. . :
-
,
?
? . ::ti:
...
.. ? :
? t. ..
. : :1
-
.... ... _
MONTH
. .. .
Y .: ......... 'I ? ?? ?
... .
...
? ? ? ;:- ?: i i ?
. ......
? ?? / /: '?
.......
.. ......
?????-??
....... ??
.... ; ....
. .
???.:::_.
I .1.
.. . .. .
.
:::: ::::
.. . ...
.. ... ...
.... .
. .... . ......
.-.:_:.:::.: ........
? - ? -
. .. .
,.
' CO tI1JECT
s'
?.
=:_:.:?:.:-:_:1::...-::
.80,000---
-?-????--
-- ...... ?
,
??::???: : . :-::?-
?-- .....
-----
t ?
: 7 .... ? ?
. I..". .. -
.1.. 1
.. - OURS
- .......
:.. . ........ .
....... ... ::: i
.. . ..... ..... _
1,:. . . .
. ...
.....
...
...; ....
....1......
.
.. -t::::
--,---7:..:::
..:: _: . : ..
....
:_ : I:77.7:71:7: '
: ::-..-:-.::::-tzr: ::: ? -
..t...-.:::.
- -4.
? - --- -.:.r=::::::.:
r ?
- if.-_,?_-- . .? :
i- -'
,
- -7J-:_:::::::::::
:::.:.:_::::::..1-=___
_
-- ? --- ? --
---:::::_t:-_:-_,-:-.7.z.
t -::71:-.:.::"7:::
_-_?-:_-_--...;___---::::_::_:_-
4.._._.---_:,:_,- _ .
" 1;-.
-
70; 000.7-.7-
.7_,:-_:_:-::-...-..-_- : t :-.:_--:
_ . . :.--....- - -
' -
-
-_ . ....... ...,....
.4 ----:::==----7-=7---.-..=
-
.-"-7.--..t.7---':--1-
. ......
? -----`
.. .. -- ..
-
..:...1.:...:_:'
+--
. - .......
. -
-- - --
----- =....-- --
-1.
-= : _' =
----*---- - --
T
--- ----1-:::-.--
-_-_-z...4...
--
,-1
-- ---
,
*
--- '' --- . ---
. !"
__
-__
:-=:: . _
........ ...
____.
_____ _ _ _ _ ..,__
,
?
60 ;00 a.?
f ______.
.,.........
,..'1{OUR3--- r
-E-----
.__.I.
1 1 '1
--,
4.
.=--- .
-{.--
- . i......::.. YEAR
,
:
? 50; 000. MONTH --
-__ ____.
., ...-
._t___________
-
i----
MON 1-tL.T__-_.=_.
71 -...::.7. : :::: -_-?.=_-_
_, _ - _ - _- . _ .
.------=.'=--t-P'-----
--.:-. ?-=
1
7771.tSER
,
.___.,...... _ . _
-
t
140.; 000_
?_,
i1
- .--'--
- --? -71
.I
_
,
_,,,..
.
-- - -- -
---
-^''
4
__
--.,.
'?--- -
- --
-----,
?
_
----"------'
------
--:----*-- -
---4------?-- -t
. 30"; 000?
_
47.-...*..-
I. 4
I
- - =t
. '...
L . ''-.
-44...4.44
444.44.4..4, .4...4.
4-.4444I
-4.-44.44.4.44..44=7.:
-.-......-4.: . ...-.-
.
T
? --
....
z.: =:=:-...= -
:_..-=::: 7 : :
=7_1 : ==-...==
.7" ...-_:=1--.._ _7.
=17. 4.:::: : : . ?
' 0,i 00
0
-T
I
, L
.-,-.- ..
----7.=--
. .-
'
.
D
-- .-
---
__
, _:.:TOTAL
_
- -
- - __..._
?
...7..: -"...: : : : i:
F-
:::::-.? ::-.---.7.:-.:=..
T
?
-.I.-----* ,
" ::::_:#=-._;.:'__
'
_:
- ? -
-?
DP HARDWARE.
.S.
?.......--.1"4
10,000E:
11_
?
, ,__
?..-
.:
i.:.:
__. ...... .
.....eir.......-:.,
..
... ..
- :._:?- 4-_::::::-----
_ :-.I. _,
- -
---.:-.:-?
...........
_
I
--
...
. .. , , .
......
1
_
- ..-
...
---:7--.......:
. - .
'''''. ..:*-:..
? ......... : .....
. -.
- .. -
.....-
7 ---;.:Z
-7.1-7:::?.7 1 1: - :--.77 -7.=l :-
...t-,..... .
. ? .
:t.. ..
,...:17:_. ,
: 7: 71 7:--7
7:7.11.7-4.7:
-..:' ? 1 ' - ? --..7 1
-:-. '''
":-:.:7'..:7"
. ' ,
19 3 : . .... 1..9 ' 1915 ? ? ? 19'i6 " V ' 1977
.... ...., ....
--
.
- '''''
:::::.:-::
1;:.:1-:.?- .. :: : : :::1::::
:::.....,....z..-1:... ._....-
"" ?? 7:
:::7::::::.
...... ?? ?? ? ? -?? - -:.?1::?: r ?? ?'
::t:. .. ? .... ...... ...
r
,
.......
7 ...............
: .. ....1?.-...
- - -.. ........... . - .
I 1 , . , ...... .
,
..-- ::.1:77.::: .... . .. . ? '
? - . IBM.: T .J. WATSON COMPUTING CENTER:::.
-.v.:::
,
..... -
' '' " ? i
,:t::::
--..
' -"" ? - ? ....... : : 1 : '
::::1:::;
,- ,
?-.1.'
. ,....
.... : .
...., 7".
?
: . '.'. ?
...
........ :.. .? r ? ? ................
? ?--i? .-
..:... .1 ? . .. ..1.....: .. : .
.. ,...
.' .
....;
....
COMPLIT-I?NG-COST-S--srs-r-USER-?
, ; ,
1 1 ,
COSTS
. t .
. .
...
L.....4.1:: ? t- ? ???
" "
.... .. 1 . ; .........
:????1;:?? ..... ?
..:
... ....
??:::::-::
..................
?
_...
-
1
. 4. 4 4
___
* ,*
-r
,
......... I ...... . . . ! . 1 '
r
? ? 1 ...
I I'
-
.J...J..... ... : ....
? *, '.
. .
... . . l? ..
... .: . ... . ....:.1.: ... :I.::: ??.
1
? ? : ? ?
I
: : :
.. ? ..
. ? -
. C :
... . . .....
..........:-.:::?
......r.::?
? ? W
' '
i...
?1 7 ....
.:::,...;
!.
1.?;:',. .1:.::',....
y.....i:"..... ... .. .....
? .
....1:.:..7"---::;:..?....,
... ...
.
..... ....
..-
...I.
? ? 1. ' .. ....
.....
1.
,
,: .
NO. OF SIMULTANEOUS USERS
Approved For Release 2001/07/(12 : CIA-RDP84-00933R000500120001-5
13k- 68A25111 1 I
- 8A3262123
-136535331
,, - 3536432
1 f - 1272523
r 125 1211
21111
4 1
1
2 11 1112 1
2
2 121111
11
2 21121
2
- 13125 41132 1 2 I 2 1 11 I
- 143121 3 2 I 1
,,,,,, - 1213 21 431 1221 311 I
LL - 241 311321 1 2 II 2 1 1 11 "
L1 131326231 12 22 33 1 1 1 1
-11111331 111314331 2 I
- 11332333411123241 2 3 II 1
- 12 23 136231 1112313 1 1 1 I I
27- 12542 3 III 211 1 1 1 1 1
- 1421114 1541213 6121 2 2 1 ? 1
- 442213323132323132121 23 I 1 1
- 1224 23442134213 41531 1 1 1 I
- 171334184222455546116 1 ? 11 2 1
32- 11322 22414324572332 51 11 1 11 1
- 1331 341223323335313346111 211 I 11 I
- 111122 343 5731363425 1121 1 1 1 1 1
- 22 2133 1 2423C68142221331 II 1
? - 212243132224541923 212 1 2 2 1 1 1
Of - 11112 1112463624A69A25234 1 31 1 $22 121 1
22541 1 22316383754382 22423 2111 I
- 2 223322377655453 2113131121 1 1 I
332132377324985342241 12 1 II 1 1 i
2 113 221433647331352 12 12 1 1 111
42"- I I I 212458534 335241 14 12 221 11
1 1 52 441273333752415114111 2 1111 4 1
3 3212213412 112113 1221 23 21' 1 1
l-- 1 2213812544244311231413 21 2
1
1
1.
? 1 II 1 1
1 1 1 I
1 II 1
1
1 1
2
2 ? 1
Ill
I
I I I
21 1
II
1 111 4112 22 31122221111211 1 1
47r- 1 11 11 1. 11 2 2 1 I
52
0 1.2 3 4 5 6 7
:RESPONSE TIME DISTRIBUTION (SECONDS) ?
1
I 1 i . I II
1 1 I II I 2 1 1
I I
1 1 21 1 i I I I 11
1
1 1
1 1
1
II I
?
?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
??????
?????
USER RESPONSE TWE IS DIRECTLY INFLUENCED
BY SYSTEll RESPONSE TINE (SRT)
cn
30
25
20
15
10
5
10 15 SECONDS
SRI
FIGURE .0- zi
? ?
Approygd For Release. 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
FREQUENCY
FREQUENCY OF USER RESPONSE TIME
TIME (SEC.)
FIGURE 46, trs
??
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
? 158 CAMBRIDGE BENCHMARKS (40 MIN,)
?
WHEELER RELEASE 3 -
MEMORY 2*MEG 1 MEG 2 MEG. I MEG
RESPONSE 0.146 0.624 2,2 0,537 1.6 0.601
TRANSACTIONS 12,374. 11,149 7,921 9,176 7,319 8,062
PROBLEM CPU 60,4% 50.3% 33.6% " 37.1% '23,8% 43.5'L
TOTAL CPU 95.5%. 88.8% 66.6% 97.4% 51.2%
?
DRUM I/O 95% 95% 65%
DISK I/O 570 57, 35% ------------- ...
r?
;
USERS .49 ' . 80 80 60 80 60
FIGURE tla!
?
6.?
??
?
a?-?
Approved For Release 2001/07/12 : CIA-RDP84-0093313200001200015,
?
Cosr
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
4o.
+11011.011.11111?00
OVCIVialo
4:9 si a Ai
4 cop
FIGURE Cr .7
??
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
rp 6c6- 7
itL.4,1434,4*
CpJ
/6
App
14a0
Lor
SYSTM7o
ved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
?
/0.
wt.
????????
. ? :
? i
.- ? I ... _
R itt . /c2
? .?
Mi??????
7 ?'
-
Y
FIGURE *CM
??
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
ApifiRel
/400
? /30 0
? /ZOO
_bra'
_ .
- ? - (76o
Lo5 T Tca
0...7aC)
600
I- .7 76-75-c
?
. ?4100
Hooie
. Joe)
?-?11::16.0
For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
- . -
????
?:????? ? ? ? ??????? ? owns ? ???? ? ???? ? ???? ??? ? ? ? ??
------- 10 g c.c. 1k 11
? ?????
? ?????????????? ??? ??? +so ??????????b? ? ????? ? ? ? ? ????? .m.00 ?
??
???...
.tsy sr./k1 .
??????? ??????? ???? ? ? ??????? ?? ? ?I? ???? ? ???????? ?1111 ????????
? ??? ? NI ?????? ? ? ? ? ??? ? ? P
FIGURE
? ?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
ed For Release 2001107/12 : CIA-RDP84-00933R000500120001-5
. . .
???? ? ?Ii? ????????? 4??? ???? ???? 41.? *IMO ????????:?????????????M????????????? ???????Mi ?
?????????? CNN.,
??????
???????? ???
a.
S /4 /V- . 16 . ow 074.7 g/74 (24
? ???? ? Y. 1=????????? ? ? ? .?? ??? ????????? ?? ? ww. ?? ? ? ??? ????????? ?????;? ?????? ? ? 0. ? ? y ? ?? ? ? ? ?
SYSTEM EXPANS ION FAcTOR I
???????? ????? ?? mm?? ? ?? ????? ???? .??. ? ? ? 0..40 ? ? 0 ?
? ?'FIGURE ?
?
? ? .
. ? -
? ?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
-Approved For Release 2001/07/12 : CIA-RbP84-00933R0005001200011
HUMAN FACTORS: IMPACT ON INTERACTIVE COMPUTING
APPENDIX II
5 Page
W.J. Doherty, IBM Research, Box 218, Yorktown Hgts, N.Y., 10598, U.S.A.
This presentation will describe the human side of interactive computing as seen in the Comput-
ing Center at IBM's T. J. Watson Research Laboratory in Yorktown Heights, N. Y. This
computing center has been a SHARE member (PK) since 1958.
Figure 1 describes the mission of this computing center. We find that complexity is the single
biggest problem facing the end user today. Since 1968, we have looped on the last two items in
our mission. We made the decision at that time to stand at the man-machine interface and
look outward to study the impact on people of the computing function which has evolved over
time. We learned of a number of technical and administrative barriers which got in people's
way. We worked hard to remove those barriers.
Upon removal of these barriers, we can make the following observations:
The value of today's computing systems to their end users is in their DATA, PROGRAMS,
and PROCEDURES. Libraries of thousands of programs exist in all major installations. The
user interface is simplified by combining programs together and burying default parameter
specifications inside PROCEDURES. PROCEDURES outnumber all ? programs written in
conventional programming languages.
The issue of integrating the DATA RESOURCE into the enterprise, (building bridges to tie
the different subsystems together) will probably be the dominant driving force in computing
over the next ten years. (See Dick Nolan's paper 'Thoughts about the fifth stage'.)
Figure 3 shows the current picture of the computing configurations at Yorktown. Notice that
all systems can communicate with each other and use the MSS as a common back end.
Terminal growth has been rapid, especially since the advent of the IBM 3270. Laboratory
automation, program development, and text processing have all grown rapidly as well.
VM/CMS is the interactive interface which is the most popular in our laboratory.
At Yorktown, the computing systems have moved from being specific tools to solve specific
problems to a general resource which extends people's memory and reasoning power across the
entire spectrum of tasks they do. This is a NEW DIMENSION of computing use. It requires
the removal of the barriers we encountered to achieve the levels of productivity we have today.
Figure 3A slows the growth in end user time relative to computing costs from 1973 through
1977 at Yorktown. The uppermost line shows the growth by a factor of 8 in monthly 'connect'
hours. This includes dormant end user time, active end user time and special function virtual
machine time. The next two lines down show the growth in end user time at the terminal.
The uppermost tine shows a growth from 8,000 to 64,000 hours per month. It is a reasonable
upper limit on the amount of time that the interactive systems were influencing our people in
their work. The lower line, showing a,growth from 5,000 to 38,000 hours per month, is an
estimated lower bound on the amount of time that our interactive systems had a direct
influence on people's work. The next two lines down show the total computing cost relative to
the end user cost, and the hardware cost relative to the end user cost.
Thus, small errors in DP equipment planning can result in sharp losses of end user time due to
overload.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Page 2
Figure 4 shows how complete the growth of interactive computing has been in penetrating the
different departments we have in Yorktown. It shows the number of people in each department
who spent many hours of their time working interactively in Nov. 1973, and again in Novem-
ber, 1976. For example, the first column shows that department 41X, our administration
department, had three people in 1973 who spent from 20 to 40 hours per month of their time
working interactively. It also shows that there were 38 people in that department who spent
from 20 to 40 hours per month of their time working interactively in November, 1976.
Yorktown processed at least 7,000,000 and at most 11,500,000 interactions per month in
November, 1976. By November, 1977 that range had grown to at least 9,000,000 and at
most, 15,000,000 interactions per month.
Figure 5 shows the number of people in the Laboratory who spent different amounts of their
time working interactively in the month of November 1976. Today, over 25 percent of our
Laboratory is working interactively at each instant throughout the day. Over 75 percent of
our Laboratory works interactively in each week.
Figure 6 shows the difference in intensity between an interactive and a batch environment.
Because interactive computing is so much more intimate in its impact on the end user, we have
learned that functional availability must be targeted for 24 hours per day and 7 days per week.
If information is not available from a computing system when it is needed, then people do not
keep all their data online. This also implies that maintenance must be done time-shared.
In 1971, we saw that the number of commands per person doubled in just 5 months, when
counted after procedure expansion.
At the SLAC (Stanford Linear Accelerator Center) installation today, using the Wylbur
interface, there are an average of 25 commands executed for each command typed at the
terminal.
People learn how to use a computer to perform some function for them. They then ask the
computer to remember how to do that. As people grow in experience with such a system, they
combine functions to raise' the information processing. bandwidth between themselves and the
computer. It is hard to forecast how long this.growth will, continue. It seems evident that the
quality of the command procedure facility,'Which is the software glue to help this growth, is
critical to user growth.
Figure 8 shows the. number of different file types on one of the VM/CMS systems at York-
town. Of the 800 people who use this system, this chart shows the files belonging to 164 of
them. In some sense, that's about 20 percent of the users of this system at Yorktown. Notice
that 162 of le 164 users had a total of 6074 EXEC riles. If we look at all other forms of
programming' language we get a total of 3000 programs in source form. EXECs are used' to
raise the level of the man-machine interface by combining programs together They reduce
complexity by allowing many parameter' values to be decided automatically. They redute
errors by eliminating the need for people to reenter the same commands and parameters time
and again.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Page 3
As people learn how to do more and more things with computers, EXECs help that growth.
EXECs are probably the single most important facility in the system to aid user growth.
Figure 9 show.s the importance of the software component known as the editor. Editors are
the single system component where the computer user spends the most time. Estimates are
that 50 to 80 percent of people's time is spent editing text, data, or programs.
Editing programs have historically not received much attention as formal computer software
products. However, we find ourselves with a great proliferation of EDITORS today. Carol
Thompson's USER'S GUIDE TO THE RESEARCH CONTEXT EDITOR--REDIT, IBM
Research report No. RA 28A, contains an excellent history of the evolution of one such editor
program.
It seems that the human factors associated with editor programs are therefore of great
importance.
Figure 10 shows a picture of the response time to a single small program which ran every 20
seconds in the spring of 1971. Each 20 seconds, it woke up, looked around at the other users
on the system, and recorded the response time that it received from the system. This is really
a 3 dimensional graph. Each plot position is a number indicating the number of times that
operating condition was found to exist.
Notice that as the number of simultaneous users increases, the response time steadily, and
sharply degrades. Thus, if we simply try to maximize the number of simultaneous users, we
find that we are maximizing the number of people to whom we are presenting a sharply
degrading picture of service.
Remembering how rapidly people grow in their use of programs, it is clear that a given number
of people will seldom ask for the same work to be done.
If we recall that user growth results in a sharply increasing number of programs invoked per
person, and that service degrades beyond some load threshold, we should realize that the
number of simultaneous system users is a misleading measure. It is indeed a measure of
potential liability. It is not clear what else it measures.
We find that most genuine performance improvements lead to a direct reduction in the number
of simultaneous system users. This is accompanied by an increase in the number of interac-
tions processed. There is also an increase in the number of people served over a longer time
such as a day or week. The simultaneous congestion has decreased.
Figure 12 shows the profound influence that system response time degradation can have on
user behavior. If we break an interaction into two parts, the system response time (SRT)
where the system is processing a request for the user, and a user response time (URT) where a
user is inputting his or her next request to the system; we find that each second of system
response degradation leads to a similar degradation added onto the user's time for the follow-
ing request.
This phenomenon seems to come from people's attention span. The traditional model of a
person thinking after each system response appears to be inaccurate. Instead, people seem to
have a whole series of actions in mind, contained in a short term buffer in their heads. In fact,
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Page 4
they are continually thinking. Disruptions to their thought processes are generated by delays
in SRT. This results in their short term memory buffer being reset.
It was first discovered by S.J. Boies at Yorktown in 1971 while doing normative studies of
interactive computing. We had recorded every interaction on TSS for 3 years. It included a
wide range of human tasks. The phenomenon was consistently repeatable across most types of
work.
In 1936, controlled behavioral studies showed that three things happened to people in a
stimulus response situation when the stimulus became both long and erratic.
First, they slowed down in their work.
Second, they became emotionally upset.
Third, they made more mistakes.
If we were to tolerate a system response time as long as two seconds in our Laboratory today,
it would cost us a minimum of 36 million seconds per month of lost people time. That is
10,000 man-hours, or 60 people lost full time for the month. It is our objective to keep 90
percent of our interactions to a response time of .5 seconds or less. Subsecond response time
is an important human requirement.
Figure 13 shows the distribution of user response time (URT). Others have called this MINK
time. The mode of this distribution is 2 seconds. The median is 8.5 seconds and the mean is
12 to 15 seconds, depending on when you terminate the data points. If all end points, such as
the two hour lunch break, or the time when people forgot to log off, are included then any
average is conceivable. What is really being measured then however is how long the system
stayed up. By truncating after two minutes we find an average URT of 12 to 15 seconds.
This distribution has held up for twelve years now. The high frequency of points in the two
second range reflect the fact that people scan far more information than they read, and read
more than they write. There is a real need for computing system response times on the order
of one or two tenths of a second.
Figures 14 and 15 show the load on a S/360 Model 67 from running a few programs. They
are a conservative two dimensional picture of load. CPU time is on the horizontal axis and
main storage requirements in 4096 byte pages are on the vertical axis. The shaded area is
supervisor state time, and the clear area is problem state time. The area under each rectangle
is a conservative measure of load. It is conservative because the I/O dimension and the paging
overhead dimension is missing. The difference in area varies by five orders of magnitude from
the smallest to the largest. Almost all the variation in load comes from the amount of data
being processed and not from the kind of processing.
A classic problem in our industry has been the problem of benchmarking. This has arisen as a
problem by the confusion between load and function measures. For example, one installation
said that they had characterized their load. They had a beautiful functional distribution of
their work, but had only accounted for 2 percent of their load.
Load, that is, demand on the CPU, I/O, and main storage, arises mainly from the amount of
data being processed rather than from the nature of the processing. Variations in load on the
order of five orders of magnitude are regularly seen for editing as well as compiling.
Measures of function are useful for productivity studies. They are of very Little use in capacity
planning.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Page 5
Figure 16 shows service measures for two classes of work as seen on a S/370 Model 158 in
one afternoon in July 1974 at Yorktown.
The horizontal axis shows the level of multiprogramming. It is the sum of the ELIGIBLE and
DISPATCHABLE lists in VM. It is the parallelism in the input stream of requests. The
vertical axis shows two different classes of service measures, depending on the nature of the
work being done. For those interactions which could be completed within 200 ms. of 158
CPU time, the service measure is RESPONSE TIME, and it ranges from 0 to 2 seconds. For
those interactions which were bigger, we use the EXPANSION FACTOR as the service
measure. This is a multiplier that measures how much longer the work takes due to the sharing
of the machine than it would in a stand-alone environment. The numbers across the top are
the number of interactions in each class of work at each level of multiprogramming.
Notice that most of the interactions took place at a level of multiprogramming between 15 and
21. There is more simultaneity in the input stream than in the hardware.
Notice also that 97 to 98 percent of the interactions fell in the light load class of work. That
is 97 to 98 percent of the people time, the most expensive commodity. The remaining two to
three percent of the interactions accounted for 80 percent of the total demand on the CPU,
I/O, and main storage.
By selectively detecting and scheduling the few large tasks, we can assure the remaining 98
percent of the interactions will have excellent response.
This has been done in the Resource Management PRPQ in VM/CMS.
Figures 17 and 18 show the distribution of CPU time over the user population at Dartmouth
and in a pure batch environment at Yorktown. The horizontal axis shows the cumulative
percent of the people using each system. The vertical axis shows the cumulative percent of
CPU consumed by those users over a month. Notice that 95 percent of the users use a total of
25 percent of the resource. If we further examine the top 5 percent of the users we find that
5 percent of the programs and data they run account for 85 percent of their load. Again, a
very small percent of the interactions account for the overwhelming majority of the load.
By putting a small effort into tuning these few users' large programs, we find large service
gains can be achieved in short time periods. This seldom results in less overall load since you
are taking a machine limited activity and making it less so. Most people simply, run their
programs more then. However, their service is improved sharply, and the granularity of the
load they impose on others is smaller thus giving others better service as well.
It turns out that I/O has a similar distribution while main storage is slightly flatter.
Again, scheduling can be, and is effective in taking advantage of this load distribution.
I have seen many different systems in many different environments. All of them, except ACP,
have the same load distribution. This is a reliable and repeatable load curve distribution.
Figure 19 highlights the impact of scheduling on the man-machine interface. It shows the
impact of the Resource Management PRPQ for VM/370 in a benchmark environment as it
would apply to people. The columns titled WHEELER show the results of running with the
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Page 6
PRPQ in an overloaded environment. The columns titled RELEASE 3 show that same
overloaded environment without the PRPQ. Notice that 50 percent more interactions can be
handled by the PRPQ in this overloaded environment. And the response time at the 90th
percentile is 20 times better. Notice also, that the base system handles more interactions with
60 people than with 80. By allowing those extra 20 users onto the system in that overloaded
environment we observe that we have effectively lost the 20 people and slowed the other 60
down.
Since people currently cost more than computers do, it seems that such measures should be
incorporated into evaluations of systems.
Figure 19a shows computer cost on the vertical axis and the service measure called the
expansion factor on the horizontal axis. If the machine is underused, then most of its cost may
be lost dollars. As the demand for computing services grow, the expansion factor also grows.
At some point, the system is being optimally used. As the load builds beyond that point, much
of the hardware usage goes into unproductive work.
The next foil shows the lost hardware dollars per hour due to underload and overload on one
of the VM/CMS systems at Yorktown. The V shaped curve is an envelope containing the
actual operating points. The expansion factor used here is an actual elapsed time expansion
factor. It is the actual time to do some typical unit of computer-limited work divided by the
minimum time to do that work in a stand-alone environment.
Foil 19c shows the cost of the lost end user time per hour on the vertical axis. The horizontal
axis shows the expansion factor. As the expansion factor grows the number of simultaneous
users is also growing, and the number of simultaneous people being simultaneously slowed
down by a slowly decreasing service to each also grows.
Figure 19d shows the combination of the hardware operating points and the end user costs as
a combined loss. Note that there is indeed an optimal operating point, having expansion factors
in the range of 4 to 6. The cost of overload is far greater than the cost of underload when the
end user's time is considered.
We use measures like these to monitor the daily use of our VM/CMS systems in Yorktown on
our two 1688. We find that we can normally maintain the operating point very close to an
expansion factor of 5 for most days.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Page 7
Figures 20 and 21 show the five layers of storage in today's systems and the problems
addressed by managing each boundary in a better way.
By observation we have learned that data lives usefully in the cache for about 10 ms., in main
storage for about 10 secs., on drum or fixed head file for about 10 minutes, on disk for about
10 days, and on archival storage, such as MSS, for many years.
The cache-main storage boundary has to do with CPU speed. Differences ranging from 2 tol
up to 5 to 1 are achieved by proper cache management. This is because the locality of
reference of most programs is such that a very small part of the storage receives 95 percent or
more of the action.
The main storage - drum or fixed head file boundary has to do mainly with system response
time. The issues here are the working set characteristics of programs to be run, the page
replacement algorithms of the operating system, the parachor characteristics of the combina-
tion of these two, and the management of the paging device channel program. Differences
greater than 10 to 1 in interactive response time can be achieved by proper combinations of
these four functions.
The drum - disk boundary has to do with the management of virtual storage. If there are 200
simultaneous users of an operating system, and each one has 2 megabytes of virtual storage,
that is 600 megabytes of virtual storage. The 2305-2 fixed head files (drums) hold 11 mega-
bytes of virtual storage on each drum. It clearly doesn't all fit on even 4 drums. However, the
same locality of reference properties apply here as in all other levels of this hierarchy, only the
time scale is on the order of ten minutes. Once again differences ranging from 2 to 1 up to 5
to 1 are achievable by a good drum-disk migration scheme.
Finally, the boundary between online disk storage and online archival storage is the key to user
growth and user productivity savings. Again the locality of reference properties apply and we
find that 95 percent of online disk storage is never referenced for periods of time greater than
a day. Furthermore, it has been found that users who fill their allocated online disk space
spend a fair amount of time being data space managers from then on. The gating factor is not
the amount of disk space they have. It is the users themselves. They inevitably free up just
enough disk space to do what they have to each day. This is counter productive on their part.
However, the most important problem of all is the issue of user growth. By automating the
disk - archive boundary an open ended secondary store effect is created. This opens up many
new kinds of applications and a whole new way of using computers. At Yorktown the
computing systems are treated as open ended extensions of peoples' memory and reasoning
power. This applies across the entire spectrum of tasks they do. It includes a wide spread of
people.
The previous Figures provide insight to the barriers and problems we have found and correct-
ed. Motivated by what we have learned in terms of placing people productivity ahead of
machine productivity we have realized that the need for asynchronous processing becomes very
much stronger. If people are to grow in the use of computers to extend their memory and
reasoning power, then obstacles in the path of that growth must be removed.
At Yorktown we use 5100s and the IBM 7406 for many Lab Automation problems. We built
TPVM to interface System 7s for bigger Lab Automation problems. Computer Networking is
used extensively to interconnect many different computing systems within IBM. In this way we
can sharply reduce most conversion problems since we can nearly always find a site to run old
programs. The message of COMMUNICATE DON'T CONVERT is powerful.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Page 8
We have developed many special function virtual machines to address those functions which
we found to be very common. In this way the special function evolves in an environment
which is uncontaminated by other non related function. This sharply reduces complexity while
simultaneously allowing the user to do other work at his or her terminal While the asynchro-
nous processing of the special function goes on.
Some examples of this special purpose function are listed on Figure 22.
The rate at which our users increase their ability to work in this environment is most impres-
sive. They first show improved quality of what they do. Second they show improved quantity.
In general the quantity shows an increase in the neighborhood of a factor of 10 in Lab
automation, document production, and program development.
Figures 23, 24, and 25 show a picture of the Research Device Coupler and several ways in
which it can be interfaced to the systems. The RDC. which acts with, or as, a terminal, brings
digital and analog input and output facilities to interactive terminal-oriented systems or to
stand-alone systems such as the IBM 5100 Portable Computer. It is designed to provide those
experiments with modest requirements access to high level language facilities, such as APL,
FORTRAN, BASIC, PL/1, etc., for direct experiment control. This accounts for 70 to 80
percent of lab experiments. It eliminates the complexities of learning other operating systems.
Figure 26 shows some of the distributed function which we have in place today.
The lab scientist, using Labs/7 (EDX) as the operating system in his System 7 can control
multiple experiments. When the need arises to use a more powerful computing system either
for processing or for accessing a data base, a simple mechanism called TPVM provides remote
intelligent sub-systems with the ability to access and utilize the power of the IBM VM/370
environment. The scientist can directly access and edit data in VM/CMS from his terminal on
the System 7. He can also initiate asynchronous processing of data either totally independent
from what he is doing, or in a way whereby he can monitor the progress of the number
crunching while doing other things. The speed of the interfaces are such that we have seen
response times ranging from 7 to 40 ms. for the user at the System 7 terminal.
As the need arose to interconnect the different computing systems with different operating
systems within IBM, the Subsystems Unified Network (SUN) was developed. This has
recently become a series of IBM products, known collectively as NJ! and NJE. We now have
the ability for users of more than 190 internal IBM systems to communicate data to each
other, run jobs remotely, and disseminate the results to as many diverse systems and terminals
as they need to.
By having locally attached display devices as terminals, our users can normally achieve
sub-second response time for almost all that they do. At the same time they can communicate
results, interchange technical documents, and freely communicate with colleagues all over the
world. This communication takes place asynchronously from whatever they are doing at the
terminal. A special function virtual machine manages the networking in our VM/CMS
systems. Currently, VM/CMS systems constitute just over 2/3 of the systems in our SUN
network. At Yorktown, about 500 people use the network to send and receive about 17,000
files amongst themselves and their colleagues on other systems each week.
The message COMMUNICATE DATA, NOT PEOPLE is powerful for interactive computing
where the sub-second response time requirements are so strong.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Page 9
Figures 27 and 28 show the early growth of the SUN network.
We have seen in earlier studies that editing accounts for 50 to 80 percent of what people do at
terminals. One of the uses for editing is text processing. A special purpose virtual machine
called TTF handles our text processing requirements at Yorktown. It provides the user with
many useful facilities for composing documents. SCRIPT/370 is the primary formatting
language used by our community. We have a compiler called STC (SCRIPT to TERMTEXT
converter) which gives the user access to the more powerful TERMTEXT facilities, including
over 400 separate fonts at the Yorktown computing center. Figures 29 and 30 show the sharp
growth of the TTF service machine at Yorktown over the past year.
In summary, we have realized that the user at the terminal needs distributed function. In some
cases this means special purpose virtual machines. In others it means interconnected computing
systems. While in still others it means independently operating computing systems which may
only be interconnected occasionally.
We have learned that users steadily and rapidly increase the number of diverse functions they
perform and that the requirements for better asynchronous processing grow proportionally to
the interactive growth.
For the past ten years we have studied the way our people used interactive systems and
observed the barriers they encountered. They have been described in this presentation. The
resulting working environment we have created for our Yorktown Research laboratory is highly
productive and exciting.
Computer availability must be targeted for 24 hours per day and 7 days per week. If informa-
tion is not available from a computing system when it is needed, then people do not keep all
their data online. This implies that maintenance will have to be done time-shared.
Computer response time must usually be sub-second. This directly impacts people perform-
ance. Response time delays can lead to people delays, irritation, and more mistakes by people.
Sub-second computer response time also opens up broad new areas of applications.
Data space management barriers, especially across main-drum, drum-disk, and disk-archive
must be minimized. They are major barriers to economies of service and limits to user growth.
Complexity is the major problem facing the user today. By the use of EXECs we can sharply
reduce complexity while increasing function. Also, by using virtual machines for special
purpose function, we minimize contamination of the function, thus reducing complexity.
The VM/CMS systems at Yorktown are the major interactive interface to all forms of
computing for the Yorktown user community.
Today, over 25 percent of our laboratory is working interactively at any time throughout the
day. Over 75 percent of our laboratory works interactively each week. There has been, aL
factor of 8 growth in the time our people spend working interactively in the past four years
alone. Over 98,000 hours of 'connect' time is measured in a month today. The users are
present, and subject to system influence at least 38,000 hours per month, and at most 64,000
hours per month. Most of the remainder is for the special function virtual machines.
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
MISS 1 oN
PROVIDE ADVANCED COMPUTER SERVICES
ENCOURAGE INNOVATIVE USES OF COMPUTERS
MA.KE COMPUTERS EASY TO USE
EDUCATE USERS:
WHAT IS AVAILABLE
HOW IT CAN BE USED
UNDERTAZZ SELECTED DEVELOPMENT PROJECTS
MEASURE, ANALYZE, AND EVALUATE COMPUTER SERVICES
IN ORDER TO IMPROVE AND EXTEND THEM
FIGURE 1
ENVIRONMENT
INTERACTIVE USAGE GROWS RAPIDLY
MULTIPLE SERVICES AND LANGUAGES ARE ROUTINELY- REQUIRED
REQUIRED FUNCTIONS MAY RESIDE IN DIFFERENT. SYSTEMS_
.FIGURE 2
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
THOMAS J. WATSON RESEARCH CENTER
COMPUTING SYSTEMS DEPAP:INEr
TERMNALS ?
3277s,2741' s
OTHER TERMINAL TYPES
,--,--,--------
I 370/!68-3 , I 370466
'
OS/\'S2 ?1:2=d VM/370
ISO MS
JES 3 VS APL
1:11
)!
RUE (FRMOTE)
4 1 ; 3'0 c.
?
EXPgiiMENTALi
PRINTER
ti?S?C:4020
3 A68
VW371)
OtS
- VS AR.
RUE (LOCAL)
2922
2/1977
MSS
3850 82
DEVICE
COUPLERS
TIME /NDEPENCENT
EXPERINENTS,..
TIME DEPENDENT
EXPERIMENTS
FIGURE 3
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
a 11.
14-
" / 1
i
, . .
. ? : : : ? ::
. . .
..... '..
? : : t : : ?
,
?
.
,,,,
. : I '
..)/00:.Qpr,.IS'Eplp4?e
. ?
: . . 1 ::: :: ?
? . ? ... .
gP01.1.
...
7/12:
.C.I.AFkDF'84,2pig34Rooso01:AogiZ
?
. ,
, . .
?
:
.
:::-
.
-?,.;.:.:
to
......
7.1::::-,::
.......
, .
... ; .
. ::::::
..... . .. !::::
::::::::: ::::;!:::
I ? ..
.:;:i1:::"
:I" ::
_Li ...1,,...: :
:' ::I .
i .::; : : :
. .....
.; : . ?
....; ...
' ; ..1...
.. : .:
' .....
: . :;::: .
-?.'7 ''::?
'I,
' ?
:: .
'7?
..... ::::
::::! .
? i ...
::: . ::::
? ....
? ? ? 1" ? ?
:::t:::;
???1??"..
.? .? .? .? ., ...? ?.
..-...... _
... ?
....I ...
? ....
:::: . ::::
....
::::
.........
......:-? 7:7'77
7.7.7.
:?: 7:.1:." :?:
": ?:.
1?
....:,.:.{....;:
-T?
Il
i:.-
:?"
.:: . :::
.....
":. .
:....
...
::::;::::
.........
:::::::::
;::::: . : .
:::!::::
???1:??:
:::::-::::
:.:?;?:??
...... .. !"??
... : . : . i?
....
90,000;:::
,.....
,. ? 1 -
-?-?
?:::t:????
?-: -
?:...:
. :: ;:??
.
:.: .-:. :_.
:.7:..' ,::.
.:.?.. :." :..:.- I:.. :.-:. :. :.
: .: :- : :. .:.: :.
2. . :? 4..;...:._:...:..
..:.:.. .. f,
.? ... . I
:?:?:::.: : ........I
:.:.:.:.::.7:..
.....
.....
...... .?
::..
..:...::..
7
-:
MONTHLY
-2.::.
....
.2...
,...4.....
.. ...
.. .
:.......
. .
..
.
.. ..
' CONNECT
.":---
? - - ?
...
. ? . ' . ; : .:
; 1 !". ?:: ..........
:1 ,
....
? ? ...:::::.:1
? ....
.: .. ..?
.. .,.
?????,??????4
? .. ? ? ? ......? ?
? ..1.
I : .
?:1:1.:::. ..;
...
........:2:. *
.
4.1.1.:???:.?
. : ' ...
1.0:??:??????
30,000 ... .... :::.:1 ,
? . . : . :::
:
:7. :.: :7....:
? 1. . ?
.." "-"'"'...".
....
???? ...????? o.p...
? ..? ? ? . ?
-
. .
. . ? "
tiOURS-
.,
.... .
. .....
-
... . . .. .
. ..... .
:::::
.. . ..
:::-.1:::: . : . ?????4
..... ? ..
".......?417...7. ?
..4.?????.
.
:
... :. :.
... ......
..... ....... .
.... ...?
..............
..,-.........., ......
:: .1.7????.**.
..?
i'... I...:...-I...
i ????:. .
. .....-:. ror
. ????????????*
..... .................
.::Z7..=:.
.:
.... ...
-
.. ..
::.... ::: :.::::f:
..... . ..m.7.L.?
:::::.:-1.77.--.::i.--...........-F"'"
...2:E..._.....
...../.........4...........r.
.. .1 . ? ... .
L: i. ...- a: : :. - i Z.. :. . i . 7. ? .?? . i . ..?. ?.. ? . ? i :
,...-......
/
...
..
.
.-.
. i
--... r
-'
. .
:- . " ..
*70r.o.
. . - -
-.
.
. .. .
' -:
. --'?-?
-: :-::::-.:7-. -
_ ....
.1
..:7 7. "7. :..
0 a T'r li 7="
:
7. ; i ' : - :-
77' A . - . ?
1 " .
1 ?"?-? ..r.=.
.
.. ..
' '-''
........
----.-...?_...._.:.......I.T.r...74:.:::
...,...-
?-??+ i
a
,....
1-.
I
4-..........
4
.1
I
.
'
\ -
.4
...-7-..- . - t ..:::: ::-
- ,77--'
- " .=.....
r
?
--.......... ...
7-. !.
?????-.-
-.a- I
? r
..1........-........... .L.
1
.-.7---
,-_-60.000-_-_,
n .
-,...=?}
-,-.--
,
,.
I
.................
''.._ ..,.........
..-?
.......,.????????
____-_-1---
.? ' Hourts-----
_. . .__.
,___...
1t
?
1.?
.__. PER
r
, .
-
PER-,.-
L*
?-?
- ? -..rz.,_______
7----7--....---:
YEAR.
- -
-r----
- -- -T.
0; ooa MONTH
:
..,--
=--....-
........-,---.
...
-.
.
.....-,
t I'
-
-....
'..."'It
4.........
-,
...................
,...,..,
--,.............
7'
?
?
-,
-----
HOU
40, GOO
.,--...._ ,
-..--,...
.....
4
.0=????4.
?...1.do?
??????+.1.1....
?
I...".
.......?."?
....,=?...:::
\.
........??.????
????.????1??1??
own?????
?
....mi...
1=:iii
.1
.............t....
50., i
....
...
.. rr. t. i? , A
.00
m?.._..
11MIENEMS.
=Er....
i
......
1..........
..."...........
...E...
y
izT
"...0......
..
I
::=.........
L.
...... NIIIIIMMIIIIIIIIIIMOMMINIII
....
-77'.....7.-.1...-....-.....
?
=
lemoloom?
4...
. ?
27,0001
11111111--111511'
....-..
..-_..........._.............._..
::
--.........
'
TO TA fO
P
...--,-.....
- ? ,o,..........?_,
----
?????,...?????
_......
..........,....,..
..: Li-
-----.
...
. ? .1?
. ....
-.74'..... .7....... .... .
............. . . ... -
- "
'' I.
.
...........*.
..... Amin
....
................. ? v.
........? ? we... ...me ? ..... ....................-..
...........,.....
? .:17...17...:::?;w
P
HARDWARE
r
.,.."."'t41:....-`4.
no 001
...- ,..........-=
. ..... - .....
...... I ,.. ?...
1.?
moms. ? ? ??? ?
...1.11..-..
. .....
1....1 :Z. ?
. .
..
. ....
......
...,...,........_?_?...
. ........
?=7.........;:
...
...?=...:.
...........
.......: .......
.......
.????????????......?
-,
...............-
.........???...
?????.:
.:. =o: .?
.....:==:::.?
? :
:.... 4.::.:
......... ..
*
7.,....-........L=i,--,..--
- --. ..--
,--
&
,--
. ...L.::: . : .. .
. ,.......-
-r= :L........
?.........7..1..=
.:7.-..........
---.
--:::t
zzz.
:::::::
=.:::::.
,..... _
.
: .......... ::::.' :I= : : : : : :.
--"':': :::-: I 7: -:: . " '
. : 7.7.:::?:= ..:......:::::=
... ! r ' ? ' t ' ' ? ' ...
=:..........
""*"''''''''''""
???........
"' - ' ' ? -
/
''. I
=4....
' '
7::i ::: :
...I
::-:.r.
........;- ..
=:-.7......
...........-.......
1400.o?
...
19 3 :.: 197k --.'74:?
' ? ? 19
.
: -... t:: ? 19
.... . ..... ?
..--F-1::-.77.??=1.:*
r.-- - riz. i :-----.-. !:- - -
:-----1-:::- '-'-
:
*---"?*^-17::::"::;
--*-.:?:-1::::::::
:2.3 -.:::::2-.?-_,-:
-?
?.? .....
--2".:::: . 2 :::1--:?:44-.7.:.:
..- ? - - "----::
:-.-.:::::...2:-: _=?-.4Z-2--?
t 2 ** ' :2 --- -
" ? .... ? . ? ? ? -? - "-? '
- IBM? : ? T .'? J.
... ? ? ? ? ? '
WATSON. COMPbT I N
..-.
CENTER ; :::
. ......
;!: :I ;-:
..,.
:F:1. F. :7?17-:_117:
ME_
..... ..
.:.....
----
....
..... 4
. , . ...... .. .......
...'". ?
. '`" ? ' ? ? ? . : . ' !" ' ? ? ::::: :
"
....
...... .. . . .
C0t4PU1ti
NC COS
-TS '4,
.. VSER-O0S-T
....? mil
Effiglos
? ..
rr,::::
, --
---:1:--- - -
---.L.-
. :'.-"1::.?:::
:::11::::
.:.::
.
.:-_-:--.J.:::?.1:::::::.::::
::::n:::
i -
L::::::::+::?!:;;:
..1
?
::. .. .... :.FF,...:.:?.::.::::
F.:.:..i::, ? -. .
, ?
: ri'-'.. i : : ?.
' ' .. .. : .. ?
;:.:: . .
.
.
.
; ; : ; :
..? :,:...
; ? : : t : :1: ?
.
.. ' .. ':'1 ... :1:.
1 ?
i?i: 1 .:. ''" ? : ; . ' . .
: : : I: !:
?
? .....
I
, .... ..
.., .... .-.4.
...4.1221; ::4.2.
.... , ? : . , .....
-.
42.2;
???
: .: I : .
...... "?2.?
1
fFP_uved.
.. ...
."".1".
"
'Y i - R
... ..
.6ase,
,.. ,
200
? , ?
- le - ? '
? .1
_.......
..... ..
b. boa
............. o.v.
....I.."
...ht.". .1"
..,..
I
till
?
flit
WI
-
IIII
11
:if
!lit
'1
;.11
fr.
1. '
:::
,.
-.
'......:
'.
,
; .'
.
'
H
.
, .
i
.1' .
.
:
i -
"i?
: ..:
. ...,,
?I'
. .
.--
.,
Ii.
fli,
" r,
1
COMPUTER'r.
5C1 Et
I
C ?
.
11 .
,
!. '
Ifr.
1:-
!II'.
-
.
' !I
': . ".
. f!
PilYSIOA
-.H..,"
St 1 E
.
,, .
":;'
?---;
CE
:,
1
.:
.
1.1,
'''
.i '
im?
GENE
.-.1.-.
SC
-lilts
. .
AL
:?
ENCE
'?
;L:
Is
_
-
.
?
..-.11-::
,
H!
...,
!
1; ,:?,
:.1::::
.....
..
::1
. ...
7
.. ..
-'
MATH.
SC1
E
--:
? :
CF '
fPA:LIED
JIESEARCli
..
:':
i
COMP
:.:.1:
SYST
TING.
MS!.?
.
.
.
- :::::-
.
? .
::.
...
...
...
..; ,;--
.. ....
:-.? ,- ..
.... . ...
",. .
:.? --.?
... t .... ,.. -
........ .
........ .
'' ,
4,,.
;;.::
.i..
I: .
:iti
,,,,
:!1!
:::
I.,.
:::
..;
..-.
?,. :
i,,,
"
,.
? 1
111
::
r.
::
.,
tit
!! 1
Li
i ''
;
1.: !
?
i 1.
':
'
:
.
?
1
,,
t
:
;
. I-1
!
:
?
-
i
:::.
P.::
`,-*-1.
.1, ;
., ;
I '
..i
iiii
' '
;
.
...
,.
1
:11
I,:
'';
All
::'-'
-
1,
. :
,, :
:
*
:4;
I:''
:i; .'
.-::-.
.
'
....
1,,.
.
,
'.
. 1::
..
..
I
. ..
? ?
. .
.
.
1
.
...
.
....,.
--""
-:
......1::..
.:..,....
... ; ... : ..
........ -
. ....... I:.
:::::::::::-
? a.
1 :
:I!,
PI
1 ,
i
I
.
1
11
I,
11,,
1 1.
i 1.1
.
:
: t
:
!
.t! t
1
i
III!
4
--i-
:I
li
I
1 III!
! 111!
. ,
'I
it
if
1 fr; !Iv
I IIII
: ? t'
1.i:
.... ....
I::::
..,,...r.-7.77
,! T
...,
.
. .
.. 1
? Ai
iT
t iti; ,..
W.
P.':
....
........
....
::::I::::
.................
.. .......
..
.. ....... ...
'
;
'...t..
.1:1:
.0';
.1:1:.
il
.::.
A
ili
. 1
II
-.-ii
1M
' 1
.
:tl
1 ji?
1.11
i li '111
i t
'
1 ,
, i
4 :
:
i
!
;
1
i
j
Ili:
t'
tft;
..1
:I
!
..
.1
.1
I ill,
' Il.:
f
?
?
,.
'..
:. 1 1
.
1: !
71 -:-
If :
.i ,
t!li 1
I ,
'Of i -
1
'
..:.
!t;:
::::
?
1:-
?
?-?
...
.
.
-
???
...
....,
-
....
-.
...L.,-
....................
.........
..... -
........ ?
- ---- --- - --
... ; .... I ..
...,.... ...
t."
......?_t.i
r-,-
ir
'
r
1 I ..
I.
,
.
.
if
I. .
'III
:
1 i
1
.
lir
.
I:.
:
I
_
1 1
/
i.
.
li ;
.. 1
ti
II f
.
-41-
f 1 :i.
1 fif
..
1 :
li
: ii
"
,??
tt,
I.::
17?.
fft'
'7'....7:
.
?
.
.
..
,.
.. . ..
?
. .,
4_4dt.;*
1111
:III
::::
i_ti_i
III,
...
LI'.
-.11!
. I
if
1, I
'
ft 1 .
,
+
ri.i;o
I/
!,
_.
/
-I
.
a '
.
.
?
,
.
:;:,....
: .?
,
,.
i .
1
,
.
:
1
i
1
.
, .
.:
1 0
.. ''
11
'
if,..,
t
' I
'I,. :::
.
::::
1.',::
-:-1'....:.:7
::
....
,
' .
. .
. ..
. -?
: ... ; ... .
...::::.:
....t ..-
: . ::
,1...._,...
? _ __.
........
. ,...
.. .
?
.
i *
??
III
I
.!
I
I ,
?
1
,.
.
.
:
:
1
,
:It
I,
'T.
,
.
;
' -.
:
,
1-ff,
,I :
.,
_....,
.":
.?, ..
:!!! :
.
,
?
. ?
. .
...... .
.".""
NUMB
?
OF
::.
-
:
_ 1
::!
11.
-
;
I
4 li
; . III
0
..
1
.
'
I
1 II':
1.
:
1.
,
.
, 1
1
I
.
i
i
)
,
0,
;
1.4:
'
'
? '
I?
,.
17
.1
.1
:,
?
I
1
,
.
il ..i
..I1
.,,
II!
. 11
11
.
11
411
i i..
. 1,
.,
''''t,
:;. I
,
'.1:1-i
.1
. 1
.
il'i
li .1
it.:
.-.I
lip
1..41
''',
;:!:
7 7
li '
i47 '
;..1?
1,1
'i,,
7??
:::
...L>T20
...
,...7
:
_____......
7"
:;',..;??-...14-0
;NON
TY:
777
ZERO
:
-HOURS
tIME
-
HOURS
...
- -
PER
. . ...
PER
.
....... .
. . ... ....
MONTH 1.::.;
.. _
.1.. . .
MONTH -:?----
.....
..
.. ......
........-
7.:.::::LH
. ......
- ----.--
7 -
..
--
pcort.
-.
77
-...
?
'
I?
tii
:tt
.
t
' it ii.
i, 77i
1?,-...
'rU "'
::.. ::-
.- .
'
II
ir
"
1!
,.
,.
[
,
it
''
7
.1 r,
; 11:1
''.T-
: .
.
1
i.:t::::.;
till
:.I.:
. '
?
....;
it
Li
,,? ?
?
iil
1
.
.
1
I'
_11-1-1.
i,
i.
?
,
r
1
f
;t.
,
I
1;
,-
?
;
,
:
1'1-
, ,
?,?
,
I
i
,.
, ?
?
.
;
.
:I.;
..t;
::
.
..
;:-..
:.
...;.-..-1
.
'
. . , ...
.,.
--
..; . . .
'Li
iili
:it
:'
.
?
?
-.
:
::
.
.::
..
..
.
.
?
...., i
11:1
tr;
1:!:
::;!
i::
.:1 .
?
? .
r
.
1
,ii
1,'
? -
i '
"0
Il.
'
1
..
?
1
.
,.
,'I
11
,,
, I
?
? '
,
,'
..
.
' i'
..1 -
1
;
:11.4111111-I:.
.
,. ,,
1
fil:'
?
'':
ifff
:::
::I:
:::: ,!:
.i::
;
.......
--?!.. ::'':
, _
:
1#..
..
.: ?
?
1
' 1:
?
.... ,i.
Ifi 1,',
-
?
1 I iii
; ? ,ri
. I.:
06
.,..
WI
iiii
..,.
I,-
.".
ii
.
.
--
?
. . .
....?...
........ ,
...
.......
.. -
-_,
7-?
: ?
7
'
7.
-. .
;7:
..
7
3
.
7 :7 7:
1 3....
'4
7 t--:
RACT
:7.
6
ti
:1
7
-7
T:
yE'-cOMPU
.
1.
11
71
3.11
-1'
?
.
i7
..
.
7.
. ? 1
NO
7
1 .
1
?
,
T ip
P Ft:
,
;
1
'..7. r
,
?EPA
i
7.
'
7
3
r
-MEN
i
'
!
1 1
T-1.
t
.
I
ll
rr
i,
1
,
1
7,
'
7 ?
:
,
.
11
1. 7 T.,
,1 . ?
:
?,4-..?",-,41
. ? -...,:
.1 ; : '
:::.? ?I
.,,, .-I.
hi: .4.1
.
r:7
....
--..--1 -
.... ..
.
.
,,,
i:1:
" 7
: i:
,
it
:7!
..:
kil'f.':
.
...-
ROWTH
..
.:
OF
. :
-.r. T
? ?
1 i :T..
r ? 1 1 ii
4r,
' ? '. .11
.1 . , :'
:t : :IT!
. 't-i-t-tril.
: 1IN
: :: ....
:11: .:::: ::::
!t:-:. F.::
Ott : ?
..:
::.
-
-
- '
- .
....
..
11:1
..,
.
....
...1-.
1:-::-:.
I.:
1-:-..
,
! .i
I....
11!
MON
".'t
Ti
1
'"
r
I 1
?I
tr,4
ilt1
1.tr
II!!
cil:
itil
"II
liti
11,;
'J4
III!
IT
1.! 1
!1i,
.-;7"
.t:
14.17
;1.97
77"..i.i
i II It
-
197
II
--
D.'
fc
-
I
11.
LL
1
;
'
,_ ,_
I
1
III,
ii
i
t.:,...
I
,
1
f
il : :: ' '
. ,.
1.1 i 14_, -
i
:I ! :tit
!, . 7,1,
hi-,.. ii2_:_,31.:?.....,_-
ii : Hi!,
:I- "- ' ?
,t,, 7.77 ?
',1:i '1i: ;:::
-
--?!----
.. .... .
-.
--,-
-'-'
.
?
?-?!? ??1--7777-
.. ',..
,,..
......
:;.:i
"-'3
:!li
'''.
.,
? ?
ili_.4,_::
,-,
?-:',
t:2,.:'
_t_:_?,'
IP'
..!!
i
11
1 i
.1:
' 1.1
1
t..t?-i
--i"
11
li
.
i 1iii
1111
1 1T1!
"
-'-!-1------1-?---'4.-=--'
1:ir
.
: ,
1
t
1 i
! I
h ,
4'
"( i
1
91--, i
i_
, ! TT1:
:0, 1 . I 1
'
11'
hrt
ii 1 -711--i,-io
ii 1 If
' ' .::
II1rott
.,..1
:..-
00 1111 ,::
r-4 i-: -
ititiT. ::
0;1 : :: ..
,
:
.. .
-.
-
?
-
::
--'
::I.t....
::::.
: . ..... -
-.7-i-..--:-..
.....
III
n
I.,.
0 I
101
II 1 II
1
I
I
I
1 :t
t
I I t ..
t. . ttsr
t.t. ;
. .
???
? rO4VPd
4017 ? !O.!! ? ???1?;; ?
? ; ? ???::
? .42,
? ? i. ?
?
? ? ?????????
? ?
??? ? . ??
?
? / JO SO.
1 0:
".,
? I ?
? . ?
+am ??????????..I.... ? .
.. ..:*.t. ',*t?*.
....I::: ::
i?!
?-? "-:. epiimi
. (,(ti..
? ;
Fort Rel
?-? ;??!.?
? .1, ? : ? :
;
84-0093iR000500120001-5
,
. .
I
/4/eftori v.,
1 .
? 0
. 1.7:1 ? le:.041 .. I a
/ ;
? I. ? ..? / ? . '.;' i
???????...14... ...... IL:1 .'...1: . .
. .
. . . :
.. ' I ?
1
.. ?1 ? ? . ' .;''
I ' a
.
t
? ?
a. !...11.++,1, ? ? ? :JI... +of . ? ?... r.?
I ? i I
? ?
?
? ?????????.11.
:::.11:
? I e
m ? ?
????????r? 4:?40 ????
? ? ? ? ? ;
? I. I ?
4?Mi.
bib
tvi? 50 '77/1/i/-
?
? 1:?''I.
?
: '? .1 1
!... ::: '
'. .1.41 ::.. .
. ? ?
I
:* r:.tt
? ? ? ? ?
+ ? +ma
? ? ?
:i;;
4.44
.??. ':'!
1...
I.rt,;
Ti^ 1"i
:Ilt':
. ...
I 4 ?
!!!.
41:11114
0 4 0
004,0 is.
?0 480.
?*.?
t...
:t.
: .
I . ? 1 ? ?
? ?????? ? ????
60 hfeCileS
; ? . ? . ? ? i
? I
ee
HOMO/
o:':1
.... ? Ovs .; v. (762A/
0 ? . ; ?
? 0 ? ??:4 ? 4
ihiiii "C.1...: t.7.t..1;10?r. .0::..?.*:
;.itc:: . ..!:' 4..,: .i?. ;,:: LI?. '-- t*:. * ...1'... '
....
;
i
'
?
I
? ? ow+ sr +door+ +a .6.00+1++4, oleo ++.0ormr
I ..e
LWO 0 0 -4.- ?
!.
? ;1.0
m
ApproviIR Releasa
e 1/07/12 : A- DP84-0041 0050012 75 t
? FIGURE-- 5-
04. ?????. ow
: ? I: ? ;
? ?
? ? ?
.?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
INTERACTIVE BATCH
CONTINUOUS
5 HOURS / DAY
EVOLUTIONARY
200 COMMANDS / DAY
LOAD RANGE 100,000 : 1
FIGURE 6
DISCRETE
1/4 HOUR / DAY
STATIC
9 STEPS / DAY
LOAD RANGE 100,000 : 1
THE NUMBER OF COMMANDS
DOUBLED IN FIVE MONTHS
THE NUMBER OF COMMANDS
TERMINAL IS 25 : 1 IN 1
USER GROWTH
EXECUTED PER PERSON
IN 1971 AT YORKTOWN
EXECUTED PER COMMAND TYPED AT A
977 AT STANFORD
COMMAND PROCEDURES (30,000) OUTNUMBER PROGRAMS IN
CONVENTIONAL LANGUAGES (15,000) AT YORKTOWN IN -1-77-7
FIGURE 7
?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
e
Appattl For Release994/07/1ii Rilfirqr84-oo933R00059o122oo4A-713049
7
SCRIPT
2397
9.322132
1 1s
72.56097
TEXT
1758
6.037008
1 14
69.51219
10
NODULE
728
2.831252
99
60.36584
ASSEMBLE
656
2.551238
73
44.51219-
20
MAIL
261
1.01505
68
41.46341
45
PLI
1496
5.825v47
64
39.02433
16
UEFAUL1S
72
0.280014
? ?
58
35.361,84
127
FORTRAN
723
2.811607
56
34.14033
19
$016ECT,
68
0.2644576
49
'.:9.37604
52
MACLIE
0.320663
44
26.02925
22
VMAPLwS
350
1.361178
4.?
25.60974
95
8E110
198
0.7700385
41
25.
?
15
ARCHIVES
5b
0.2177880
40
24.39024
21
SYNONYM
140
0.1555633
40
24.39024
14
CONSOLE
52
U.202232J
36
23.17073
104
SYSIN
1.73453
36
21.95122
?
193
TERMTEXT
99
0.3650192
30
16.29268
53
TXTLIB
48
0.1e6676
30
18.29268
17
VSAPLwS
14.7
0.5716952
30
1R.29268
148
JCL
253
0.96.1930
e8
17.07317
277
PLIOPT
14u
0.5076061
17.(.7317
23
OLDMAIL
27
0.1050052
25
15.2439
? ?
84
PLS2
272
1.05783
20
12.19512
22o
DIAG
24
0.9333795E-01
16
9.756097
Se?
96
MACRO
177
0.6883677
12
7.317073
25
LISP
104
0.037E:096
9
5.487804
451
PIC
4U
0.1555633
9
5.487804
480
MYS
ou
0.2644576
4.678046
112
OS
35
0.1301179
B
4.8.7d048
,
144
424
PICTURE
GRIN
35
56
0.1361179.
0.2177886
(3
4.878048-
3.658.536
450
LABEL
39
0.1516742
-b
3.618536
18
LISP370
70
0.2955703
b
3.658538
719
KGRAPN
85
G.J305721
4
2.4390F44
UM ? ?
345
KSCRIPT
27
0.1050052 ?
4
2.439024
499
INCLUDE
28
0.1068943
3
1.629260
?? ?????
110
SHS
305
1.18617
3
1.029268
94
BCPL
63
0.2450122
2
1.219512
????? ?
723
CLIST
115
0.4472445
2
1.219512'
743
FTO5F001
94
0.3055730
1.219512
????
24
LISPLIE
31
0.1205615
2
1.2191112
1668
BoaoFF
36
0.140007
1.'2191,12
210
FIsLIB
51
0.1983432
1
0.8097561
1557
Fun
34
0.132228d
1
0.6097561
285
'7
0.272235dE-01
0.
223
.SMONUANS
15
0.5833624E-01
0.
? A
82
0.3189048
O.
123
ACCESS
7
0.2722358E-01
0.
119
AEL
33
0.1283397.
0.
781
.APAR
9
0.3500174E-01
(1.
1669
AREAUESC
52
02-022323
U..
1670
AREADUMP
52
0.2022323
O.
565
.ASM
43
0.1672305
0.
782
ASSEMBSV
25
0.9722704E-01
0.
? IP
.04111.10 ? 1???
?AIA. ?
FIGURE 8
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
EDITORS
75 PERCENT OF COMMANDS TYPED ARE FOR EDITING
MAJOR EDITING PROGRAMS HAVE HISTORICALLY BEEN
NEGLECTED BY SYSTEM DEVELOPMENT GROUPS
MANY EDITORS DEVELOPED AND EVOLVED AT YORKTOWN
FIGURE 9
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
alitIDLE
NO. OF SIMULTANEOUS USERS ON TSS/360
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
13? 0A25111 I 1
- 843262123 21111 1
-136535331 4 I I
...?.- 3536432 2 II 1112 I 2 I
I( - 1272523 2 121111 II I
- 125 1211 2 21121 2 1 I
- $3125 41132 I 2 1 2$ II
- 143121 32 I I
- 1213 21 431 1221 311
- 241 311321 I 2 II 2 1
-I 131326231 12 22 33 I I
-11111331 111314331 2 1
- 11-332333411123241 2 3 II I
' 1223 136231 1112313 I I I
12542 3 III 211 I I I
- 1421114 1541213 6121 2 2 1
442213323132323132121 23 1 I 1
_ 1224 23442134213 41531 1 I I
_ 171334184222455546116 1 - II
11322 22414324572332 51 II I II
- 1331 341223323335313346111 211
- 111122 343 5731363425 1121 I 1
- 22 2133 I 2423C68142221331 11 I
- 212243132224541923 212 I 2 2 I
11112 1112463624A69A25234 I 31 I 122
_ 225411 22316383754382 22423 2111
- 2 223322377655453 2113131121 1
- 332132377324985342241 12 I II I I I
I- 2 113 221433647331352 12 12 I I III
42? I I 1 212458534 335241 14 12 221 11 1 1
I 1 52 441273333752415114111 2 1111 4 I 2
I 2213812544244311231413 21 2 1
- 3 3212213412 112113 1221 23 21' I
1 111 4112 22 31122221111211 1 1 I
- 1 II 11 I. II 2 2 1 1
I I ; .1 II
,... ; I ; Is ; 2 I 1
1 i
a-...
-.I I 21 I I I 1 I II
22
27
32
37
2 I
1 II I
1 1
12
1 1
I II
I I I I
47-
52
0
Ii
1
1
2 3 4 5 6
,RESPONSE TIME DISTRIBUTION (SECONDS)
Approved For Rele. e 2001/07/12 : Cl'A-RDP84-00933R00050010001-5
8 9
Approved For Release'2001/07/12 : CIA-RDP84-00933R000500120001-5
THE NUMBER OF SIMULTANEOUS SYSTEM
USERS IS A MISLEADING MEASURE,
FIGURE 1 1
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
?????
USER RESPONSE TPE IS DIRECTLY INFLUENCED
BY SYSTEll RESPONSE TIME (SRT)
L-3
30
25
cr- 20
15
10
5
41=11?.
10 15 SECONDS
SRI
FIGURE 12
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
FREQUENCY
FREQUENCY OF USER ;it:SPONSE TIME
FIGURE 13
TIME (SEC..)
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
70
? AVERAGE CMS WORKING SET SIZES
CP/67
LCC(5)
(200)
FORTRAN
EDIT LOCATE
FILE
LIST(2)
0
0 10 20
K c?
30 40
ASSEMBLE (600)
50 60 70
CPU TIME (SECS) ?
FIGURE 14
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
I I
90 100
? 4* ??? ? ???? .P0
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
AVERAGE LISP WORKING SET SIZES
CP/67
LARGE ALGEBRAIC SYSTEM (CC..t1PILE CI1RYBD8)
TYPICAL
COMPILATION
LOAD SMALL
LISP
TYPICAL
COMPILATION
GARBAGE LOAD
COLLECTION ALGEBRAICLISP
L.!
ozt
CC
L.L.1
10 20 30 40 50 60 70 80 90 100
CPU TIME (SECS)
FIGURE 15
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
O 0: 04 -. 04 ml tm eg C2 WI OW WI 01 0 0 C, cm cm um u) h. cm um h. h. I.. c) u)
-- 0 04 OA U2 ml M... 01 0) V) 43 42 0) M. CD C) CD -- 0 04 -- -" 04 C) 0) 0) 0 r?
126 ??? U2 WI WI CM 44 er CD C) f4 U2 er 03 CD -- cl 03 rm u, 04 04 (43 pi
??? 04 04 e4 C4 MI er a, r. Cm -- NI 01 el. rm rft ler 0) "
O 0 C) mm 04 1..? 101 -? -? C) C4 /1 M. 04 ?? 0 U) ?? 01 a3 om mr1 cu m1 $1
M. 111 WI 04 -- C2 CY rm er CD 4 CD 04 Cm 0 ?0 o3
ca. C4 ml M1 MI ml ml C4 C11
CD
40
VM/370 (158)
R -RESPONSE TIME (0-2SECS)
C- EXPANSION FACTORS (1-40)
z.)
0
cs
CD ac
cc c
CC
?
C3
0
O LC
U.
(.3. =
0 CC
42 = =i1lltitC111111,111tiltitt
W?CC-CC '
5 10 15 20 25
MULTIPROGRAMMING BANDWI MIL
FIGURE 16
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
30>--
I00
90
80
00.- 70
60
0
". 50
-1 40
.72
8 30
20
10
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
DARTMOUTH
(BASIC)
????????
mommisol
ROMEO
100
90
80
70
60
50
40
30
20
?10
1 1 1 1 1 1 1 I
0 10 20 30 40 50 60 70 80 90 100
CUMULATIVE % - USERS (4000)
FIGURE 17
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84:00933R000500120001-5
100
99
80
tolo
YORKTOWN BATCH
(0S/91)
0.110,
INMONS
Minna,
??=1/11,
OW
20
10
100
90
80
60
50
40
30
20
10
o 10 20 30 40 50 60 70 80 SO (00
CUMULATIVE % - USERS (300)
FIGURE 18
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12: CIA-RDP84-00933R000500120001-5
Am.
?
FEEDBACK TO USERS ENABLES INDIVIDUAL
IMPROVEMENTS BY FACTORS OF 2 TO 20
IN SYSTEM USAGE,
FIGURE 18a
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
- 158 CAMBRIDGE BENCHMARKS (40 MIN,)
WHEELER . RELEASE 3
?
MEMORY 2'11EG 1 MEG 2 MEG 1 MEG
RESPONSE 0,146 0.624 2,2 0.537 1.6 0.60:
TRANSACTIONS 12,374 11,149 7,921 9,176 7,319 8,06e,
? PROBLEM CPU 60.4% 50.3%. 33.6% 37,1% 23,3% 43.5
TOTAL CPU 95% 88.8% 66.6% 97.4% 51. 2x.
DRUM I/0 95% 95% 65%
DISK I/O 57. 5,70 35%
USERS 80 80 60 80 60
FIGURE. 1 9
? ?
?
.1
Approved For Release 2001/07/12 : CIA-RDP84-00933R0005001200U1-5
. . r.
eirp
em,
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
x72,89,usi o Aj
oc
Loot)
FIQUE. 192
Approved For Release 2001/07/12 : 1_
u1A-NuP84-00933R000500120001-5
/6C
Approved For Release 2001/07/12.: CIA-RDP84-00933R000500120001-5
/5Z,
?. f()
?? 1 loi6
.._. TAO_ ???????
-
???????? :OM. 0 ???/1???
? .1?????1
????
???????
??111,0 ?????=??
????
ap? ?????1?????
? ?????? ??????????
????????? ??????????
? r??? ???? 00.14?1, ?I????? ???? ?????????0
MI, 0. ????? ? ?MIO MOM ??10.
???? ? ? ? ? ? ? I ? ? ..1.1?01??????
?? ? ? ?
? 0??????? ?
??? ??????=? ????????
????1?1????????? ????=1. *I/ ???111??????? ?????????????
0?1?????1???????????
??? ??M, ?
???????
?? M. ??????/?/??????????????=...????? 61/M ????? ?? ????? ?
0E1 ? ? ?I? ???????????? ?0 ? ? ? 01 ?????? 01=?? ??=???
? ?????? ? ?? ? ? ? ?
.- ? t -
?
??? ?,????-, ? ??????? ??? ? ...um.*
??
??????
?
?????? ? I ? ??
rgti ? X A/ 5/ Q4/
? ?
FIGURE .1.9-13
Os. ?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Itioo
I3oo
. goo
lot
1oo
1_05 Tc
S 700
6o0
C
goo
Ho O1
3400
_ 0200
0 ??????
For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
" ......01??????????? ?
?
*
??
f
? ? .. ? .
' I
FIGURE 19C
? ???
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
ed For Release 2001/07/12 CIA-RDP84-00933R000500120001-5
Pico
IJa7
1A0D
/evo
. ...Mho
LoST 6'O
t'outi .......?????????=w4or??????dik.mr?mm
. 1/4" ?
am. 4?Emr gsmom .mmss 40 410 ow,
? ? ?????? ??? ??? ?????? ??????? ea MD ??? ????????????
????
????????
. - .
740o.
??????
-
??? ?? ? /0 0
???????????? ?????????????????
NIP AM
???? ????????? ?M?
?? ? ?????? ? ????????
?
abo????? ???? ? ?????? ?
- - ? - ? ? ? ? - ? ? ?
?? ??????? ?????? ? rime rep mim????????? ? ??????
??????
? ? An. ?????? ???????/?? ? ...........???????r ???????????? ?????
? ? .1. ????????????????.
. ? ??? .?? ????? ? ?? ? ? ?r ? ?????? r?billior???? ,?????e ? row.. ????=, to.
. tet . r. _ i. Ic6./6 . Jr...ga V/74 02
I
????....???? ??,....00 ? r ? ??????????? 11.????????? ???=. ?
0????? ???????? ? ? '? ;??
, SYSTEM EXPANSION FACTOR
?-- Amor a* ????????? ??????
?
FIGURE '19b
?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
? ???r, - ? rm. - ? ? ?
??? ???????? r ? r
?
ApLoved Fo1r Release 20(iltib2 : CIALIRDP84-01901:1114-11-
BOLLIOPPY. FRD3LE17 s
CACHE (10ni
MAIN Cio sec)
nh,4 ?mil
)iSiclelacW
. FIGURE 20
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
CeLL
WTE (11. CT V EsPcnis
V 12.-TuAL M GM ofQ,'
MI4 nIA-qe-meATT-
? FIGURE 21
?
uts era 1E0 WTH
LI M 1i-A T1 oil
Approved For Release 2001/07/12 : CIA-R0P84-00933R000500120001-5
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
LAB AUTOMATION 5100 - 7406 (DEVICE COUPLER).
LAB AUTOMATION SYSTEM 7s TPVM
NETWORKING VNET (RSCS)
NETWORKING DATA STAGE
.TEXT PROCESSING TTF
INFORMATION BULLETIN BOARD
INFORMATION NATURAL LANGUAGE INQUIRY
MACHINE TOOLING VS1 - APT
SPEECH FILING SYSTEM SFS
DATA SPACE MANAGEMENT MIGRATE - ARCHIVE
CMS BATCH NEW BATCH. MONITOR
DATA SPACE MANAGEMENT ? CPDIR
LIBRARIES
19D - 19E - 19?
FIGURE 22
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
0
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5 ?
?
?
? ?? ? ? 4' ' .1 . k.
??? ..-4 .4,?Ir i; $ L.-, ? .
' .. ? ...V.,/
.. ;.'s .e. ...!
? t-k?,.;.;
I . ? ? t '
It-
if - ? ;?-;
, %II' .-. ? ,,.. 4
i - f'?? ???? 4 . I ' I .
..t e? ft, :et.
? ......t. 1 ii
? ? ' . ' %.4.114.,V.
. - .? 911.1
:=:.4.'.47.:41?;''' -
....s ,e)
- f .
? ?. -4 -.! l'r
? i, ,,,:p1 ?
RESEARCH DEVICE COUPLER
PIGURE 23
?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
? ..?
!
I Approved For Release 2001/07/12.: CIA-RDP84-00933R000500120001-5
? ? .
:? ?
135-1200 BAUD
HOST d MODEM
? ?
RESEARCH
DEVICE COUPLER
SDS
PD
A
D
H
C
I
PS
I
IOS
MMMMMIVIMM
? .;
?
?
FIGURE 2L
??
?
?
?
USER
DEVICES
?
?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
? ..
Approved For'Release 2001/07/12 :*CIA-RDP84-00933R00050012000.1 -5
? ?
?
?
?
?
?4
?
? ?
. . . .
NO
. . -
?
?????
? ? .
?12%
? ?
?
ONO ??111 ???? ????????1
? =rum
11. I
?P ???????1
TAPC CASSETTE
? FIGURE 25
Cd
IZEPt Ectammv4T
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
?
atSG.
5 Y 5TEM/7
PT'S.
V1t1-LA05/7
pprov
ase 2001/07/12 : CIA-RDP84-009
(usGtC.60/
el
12000175
user_ 'V
SYST-0A/1
Vfil -Li1-135(7,
SBak
P TO Ai 5his CAA1'8&-
_ ;41 17/1-cFt 51) )
r
? 1 MP4 E
4,4
.YA;5;1?
LA OSI-15 OtACCE
FOg,TZ-lAt So fC6
NETWOKK
#PAT4 F" I 1,.6.5
STAT us FILE'S
exec FU Es
Loh 1) Avr ("Int ES., sm(4.1eY eicoq go4Pts
ocu g -rn o
4.04*.t...",12".? ?
?
???11.1?1?11110?1???????????
????????????????????
MV5 M/X1-1 id&
fiSs em BL.G
comp(LE
L NM.- EDIT
FoRMAT'
FIGURE 26
...111???????
? ? ?
(vi VS DR-T4 5Ers6A3si
Mg. it...4 LA:r Tull. es,
1,16gA-zz
511 co hi Ficu. eh Tt
(oVE egit Stri
7/0 copl(cicAf./9-rio.
(NI& gKPT.)
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
? Approved Far Release 2001/07/12 : CIA-RDP84-00933R000500120001.-5
41.61111m?
$4 $1
I $11.$$$? I
its ?
11??????.?????????1
tt.
?
t s ?
??=??????????,-
s
??????????????1?????
I
t $ IA
:34:tt? I
_
$ KOLAS I
???????? II
1
1111/1/11:31.
4?????????????????
???????????mm????
??????=?????=??????
??????=????=??
ft4.01
??=??????????????i d?m???????????,?
en II 1141
? ? s ? $ until. ? ?
FOSess I ? 1.1,...0.1? I
11???????pm????=.1 11.????,????????
SON *OWN
poi sisommormutomolt Tit ??????
I S. ??????????????? I
I I
I I t
irmitimmtil?????4 ft?????????????????, 1??????????????????? ????????111,
Ws tot we toss tie I t?S isms vitt
? mosso 4 mom ? 1,1/41:/:3 $???????.$ j
I#.,.$. I $11113?114 tit" 1 ? Irle?1t I lPdep
-
111M11?1??.??=???=1 Im?m????=1?1=1?101 . 11/eNEN?1 thmlnlimi???????????
?????????mommEmIt
8
ommomrssommoi?
OW, SW
?
?
?
?
fp?Pwommbotem????
I ? vs Of ?
MOW SO
titoo?Or
?
CO I 3140
.1111????dinnl?mmti. ??????.?,?????????
i Mi ST, I int
II Org:111$141 ?????^???????????4 i u.osu ? g
Mk $ i ? s I
i?.............. 4..........,...?
IMO
???????????????????????
1$ tuts ??????=mmo4
? $ ? ? ? I
????????????????? ???????=????????????? .
omit.
? ?
?
1.11A?4
e8.611/l4 I
emittmtumm???=???????? ?
?????p???????1,
$
ostimm?mm.
?
4 *woo
11.?????&????????????
11.4 I
??^????1 111=115/ 0????
II I ro
toil ?
?
1?3111,10I rIte ?
$ 14?11?940. I lettloo
I WI ? 1?2/1,1
Illoommoomm,??? Iltmoniontmomm?
?
?
"NIP
?
OPAL IS?WIle
?
,t?
SUN NETWORK APRIL 1 9.75
FIGURE 27
? ' ? ? Ilt?
?
ISO BP ICT
?tt? 1. .? ? - -
? nom** s
? vs 1 ? st
11?1?44
WM/
I I
? mut a
mew.
Immum???????
omoOmmoommo,
'MO 14 Se
trts11
I nine ? I
1$11?0?1?????=?????11=1$
????? .11?Pill? 40 .0.
?
?
'
?
?
? ? ?
? ? ????
?
?
?
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
Ap
,a1 IN?66.6.64
I 1.6 I
? 411MMIVIMONMENNOM111.
ra
I'.J.4?$ I p 6?6?1.666
06 I I I Oft? e? 660
?44.444.???????? 6
11614 1 1 1 1 1, I
IC. 1 ? 4 88480
rdlieritTrizRelease 2001/074+2-.-QA-R14p84-43=3R0CI0i00120001-5
14.4 ???????? I ? 4.410 I ???? ?
118 80 I .
*W:6 6 ?
#616"4/0 I
?????
888
488
4114
I..
O. 1.??????????? 44.4?44.44
I. ? 616?6??? 4
????? tr.. 4............? ......? in.:
8 80.4.44. I
:I. ?./....r...? ?mr...........?
.41
1446
P? i! .
1184
I.1 4
1?14 .
? 4 44................. ..1............?
11141 MOO 1 .01
8844, 1.640 ? I 4 .416004 ?
8,84?40 4 410 1
u. :14.............. ???????????
II. 8444.
004 ..............r. ?
4
14.80 4
?
8840
...*?????
?
^ ??????? ?
?
????=0??? #mmemmemmwom.
I l???
. maps? ? .........? I./. ? ?
??? 491466064 I
????????? .bommommtammea
1 144$ 1.6
I 64.0111
001141??? 1
?
104
4 064.044 ? ?
1.
a.r....r...? .............ra
?
. 8841* ? ????
? ?
???????????????6# .....?????????=.11.#
? 1614 IAA* 6 6464
$.04646 0..........., ??????? ??????
0114/680 i I #41 # 1
*0 ?
I.
#??????????., $1?6????????????=m, vammrimmmo666.# #60.romm?????? a
?????????? ? 8.14 5 /61. NM* ? VIsb? 6
?????? Pr..I *04. I ????? I I 00468 I 111
ww ? or 8 1104.08.4 $ ? 406 8 I'
f#44,44444?4
4.4 4 4 I I 11116166
466............. ....../....., )4144 #1mm?=6?????? # $.#1=.41.?????????? ????????=6.:,
14.80 6664. ?? 1 10.......? , #4#4 1 ???? ???????11 ???611
II... b64$ I 46.66???????4 6641110 #6......mommn$ 04115 ? .......? WO. .......... 11.66 WO 4
?4848 ???????? I $10 WU III 1 ....4. 0..... ??? ? I
Me 41??????????????????? 11,0?0?????
84 114 I 611.0 It 1 'T1117."..
11?811 41.........r. # I 4
4464 41 be MN I
1$444..... .111111MOMIIIIMMIIIMI.P. ,IMMIN????ft.
4.4.1 *Ma .????? 8 14664 P?14 1 1146.1
????? 0414. 4..........0 666.111?4 116?6?????????? ??????? I
MI POP ? PIO I ?????116. I
1$$ #0.1?411* ???=4?4?44444=144
6.11
14?4
to./ 6441101411
SO 1 ??
61:6
4
144 OWN
884
??? es???????????ft
.4. 044
???? 141411154
*44p.4
I ??=ftwmg/.???????
1444
14 ???????????
114
84.8
804, ???????? 1
8+4.4
$4661.????????
???????.????.,
1.4
000000 1
60.
17.:1114140
MOB 14..4.
? 1 1
??????
10.411 4141
???????????????
????? 11.
Mb. ?
? 1.1
??,#I#
?
?
ii............... ,,MIIINIAVIIIIIIIIII. $1.111?61,0111$????????#
I ???4 .44 4 048 8 1461
1 44410 0...........4. 144166 fr.,* ? 04144 4
0???????? 6?.?????????? 6111 II?????? ? 414. ?
.......r........ / ....r........ ? ?
I 8? .................,
4"...... ? I I
? 6 0~ 46.6.?????????
.?????????? I OW 6???????????????? 4 1
1 46644.4446?04-_? 4114.... 1
4 4044.6 4,....4 44080 /
????????? ? 4.? Or ? t4
mr...... ............ 4
4 4 6 a
? $ 1 14
1.14111 ? 84014 114
#11MININ#110?110.1m. #01.1..bilimm##$$ I r.....d. .
1 ????????? ? 86.4 8 444 14
/ ese14141 .............? ,???? 4 1 ..1 wow* 1 1 I.
? ?? 1 44 ? * 8.4 ? 14
............. ...........11 I 1............... .
I
vo? Amil??????????? $41//1 II
I I II
1 v??????????? 14
4.???? ? 4 ????? 11/
"."...... ? es. 4 $ $ $,.
6064 660 I II
?????????????????? $ #
6mmeamm6?????# ?????????6?????? ???????=nonm?????
l 61666666w 0 ????????? ????
4
1 ....? 016 ??????????????? ?????? ?????????? I 60.4 ?
I
8?1 600
????????????? ???????????????
? OMNI. 66.
V
^W*
MON.. 1 14.4
? 1604 I I ????? I
??? 1 ????I
toommemarems? ?mmemengra4
44010
I ????????
twast ???????? I
14.~... ?
Ihmleammol
110
a
?
?
1
4.4.4 ?
1 1 1.4 ?
I 1..4 114511415
Ss
????????????????
?I_ I
? ?
I 4011.1
1 I?441
? 4.00.44 1
1
?????????????
I 0444108
??????
?
441446
.1i1OMIIMINN$
1004
844 14406411 ?
1?11
1114?
1 IMMO 1
1?? ?
oss ?
???????
64010
1
4444.4????44=4?4.
????
?
I 010.?
810 1
??
?
???
44???.m4???????4.
4#410
? ????? ?
I P.A..
???????44
01410
1 1?6I
1 b. ?
????
1,4 ?
?
# ??????
??? 1
?
MN 1
1
$11?06???????=m, $1:??????????mm$
1644 ???? 1 1640
??? W. I
??? ? W.440 ? 1
.1?1???=11..,,11
I
It
#???????????????$ la
1
41461 lin 66
? ???????? I 160
6 IVO I 16
1 .............. ? ?
6 V 84
g On. 41
? i Ii
?????............ I ?
? M. 44
? 64.6144141 $ 11.1
40444104 11. 16
.............? $ ?
10
411
? ? ....
................. II
I 14.04 11
? 1450418$ 1 $4.
???????64 I 11
gle....m.....??????? 0$
6 l?
OS. 41114 41
? II
? /. ..
.......... ? ?
? 4.0,4?414 11
.....4 ?4 44444 4 880
4.24/?44 1 11
*....'".r"...."1. ? 14
........,-......? It
:14 SO gbh 41. II
8 Ili
???=???????? ?????????=.=???? $ $
6 4???????? ? 1???? NAN II
I 16?1106 ? 11????????????11 h. 8.41 ? I 8*
14?11444 1 14
$???????????#!$/$ I,
CO
teen* 4 ?
'I/........... I ?
? ft.. ???? 11
r...6 ?? 644.? ? I 1*.
4.1040.44 V 11$
?imatimompmvarama. 88
I 44444+????????
? Is 11,........A I, 4444
0484 1 ? 1......... II ???? II/I ?
?? 1......4 06..4 I
1............. 1...".........
1 ? ? .4. ?
1 1 4 ?
armor.. ? 14.4
I $.66?????????????
1 1 1644
? 4 0014.411 I
? 41
8,."11114
?
1?14. 64010
?
????????????=6.#
6E64 1646
$46101?66 I
??????
4.1rmr.?????
????? ftddl?
6m.$ ???????? f
4440.4?16 ? $
la
?
?446.
foomaimmomm. 4444444444 444.444,44444444
1 i.4;.04
44.010.1111 I I 06044
4I? 0.r O.
4...???????????..
1
.................? 4
11444 II..
,...4., ...ft...4,
? 1444 1 14.0
? ??????? 1 8 ?11?1611 I
ION l 160 #
114?44444=4444414 44.4444?44,,44m4.4
:15.
4
#1?11?011,11.011???????# fl?MINO.161.1=???##
i 16400.4 1 1111.1
4 4484. ......4.....4 ????? e
....... I 4-. ?
?
NM. m ?
,smows??????66, #.66???????????.66,,
84
04????10 I 6649
I 111411 66641 I I
8.6 I ??? 1
? SUN NETWORK NOVEMBER 1976
FIGURE 28
Approved For Release 2001/07/12 : CIA-RDP84-00933R000500120001-5
?
?
-0
TTF SERVICE MACHINE St'MMARY USAGE sTA risTics laage
1
n
n
Approved For Release 2001/071W 6CIA-RDP84-00933R000500120001-5
August September October November December
January
Total Monthly Job Counts
I
1:.
Total
3054
3494
3354
3652
3724
4354
:
i..
TI EXT
Non-TTEXT
2454
600
2688
306
302$
329
3087
545
293 I
743
3579
775
First Shift
2568
2739
2926
.2854
2999
3694
Normal Workday JOb Counts
Total
132
161
134
176
171
199
TTIEXT
107
. 124-
14$
151
139
163
Non-TTExT
26
37
39
' 24
32
36
First Shift
114
127
141
? 133
139
170
First Shift Small Jobs ? ?
95
102
112
113
1 1 2
134
First Shift Large Jobs . . ?
20
25
.29
2.5
- 27
36
' ? '
Percent Jobs From
..
v . . . .. .
66
67
56
52
46
43
T . . . . . . -
22
23
32
3X .
40
46
NI . . . . ? ... . .
9
8
11
9
14
12
Percent Jobs Run On
T
100
81
92
62
100
100
v.
0
19
8
33
0
0
User Counts
.
Total
152
185
190
193
175
184
TTEXT
128
ISO
154
153
146
156
Non-TTExT
47
51
60
70
' 54
59
Normal Workday Total . .
40
43
54
56
52,
59
Normal Workday Trt:XT . .
35
41
45
50
44
52
Normal Workday Non-TTEXT
6
9
10
X
9
9:
Monthly CPU Minutes
-
Total
403
452
53X
641 -
620
660
TTEXT
379
422
498
611
' 5.32
620
Non-TTEXT
24-
31
39
29
.
33
40
First Shift
331
339
409
456.
479
557
Normal Workday CPU Minutes
Total
1$
21
26
31
19
30
TIFXT
17
20
24
30
27
23
Non-TTENT
1
1
2
?
1
2
2
First Shift
15
16
20
22
22
26
First Shift Small Jobs .
9
9
11
12
12
12
First Shift Large Jobs .
6
7
9
11
11 -
13
TurnaroUnd Minutes
First Shift Small Jobs . .
21
27
26
?
23
16
12
First Shift Large lobs . .
22
24-
30
? 54
' 34
23
DRAFT vs. FINAL
TTFN I'
Percent DRAFT ( only)
69
53
64
. 67
61 '
61.
Percent FINAL 0-rvxr only)
31
40
35
32
37
- 34
Total Monthly DRAFT . .
1688
1557
1922
2060
1326
2172
Total Monthly-FINAL . .
1356
1330
1870
1551
11134
2063
Normal Workday DRAFT .101
.
73
71
91
84
97
Normal Workday FINAL .
59 .
117
. 90
73
X3
, 96
RTC vs. STC (TtExT only)
?
Percent RTC ..... .
73
63
- 64
52
49
47
Percent STC
24
28
32 ?
43
47
49
LATE Option Usage
Total
25
93
li5
151
170
84
W
Normal Workday Percent
1
4
3
? 5
6
? 2
Approved For Release 2001/07/12 : CliZaral4a933R000500120001-5
?