Category : Windows 3.X Files
Archive   : NTEVAL.ZIP
Filename : NTEVAL.HLP

 
Output of file : NTEVAL.HLP contained in archive : NTEVAL.ZIP
?_Ä ÿÿÿÿñ,(´ « lp3CA ÞO‚ ‚ÿ‚‡ Š ƒ…'ÿÿ‡ Ðóøƒ‚ÿ‚‚ …'ÿÿ‡ î ¾ÿƒ‚ÿ‚‚ „ûbÿ‚¼Š"Arial>…-…û ‚¼"System…-…'ÿÿƒ…-‚ÿ‚‚ ‹¾ÿ¶î ¾ÿ…-…'ÿÿƒ…-‚ÿ‚‚ ‹üÿx° üÿƒüƒ)…-ƒú …-…
…™$ò–ÐÐvò™$Ж–ÐÐ…ú…-…ð‡Ð–‡Ð‡c–‡c‡õ–‡õ‡‡–‡‡‡–‡‚ú
…-„üÿ…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹üÿx° üÿƒüƒ)…-…ðƒú …-…ð‚…
…™$ò–ÐÐvò™$Ж–ÐÐ…ú…-…ð‡Ð‚ÿ‚‡Ð–‡Ð‡±‡ÐC ‡±C ‡Ðm‡±m‡Ð–‡±–…‡2
Š9 £Subnotebookj````5V```V‡2
Šð ™Notebookn`5V```V ‡2
Šà‹PDAenn…ú…-…ð…üƒ)…-…ð‚ ‚ƒ…™$õõ›™U™Ðõ…üÿƒ)…-…ð‚ ÿ‚ƒÿ™$™Ð™UŠUŠÐ™Ð…ü½ƒ)…-…ð‚ ½‚ƒ½™$õ›™UŠUç›õ›‚ü†)…-…ð‚ ‚‡™$0§ê§Ð‚ü†ÿ)…-…ð‚ ÿ‚‡ÿ™$§Ð§ê™ê™Ð§Ð‚ü†½)…-…ð‚ ½‚‡½™$0§ê™êõ00‚ü…)…-…ð‚ ‚‡™$  µ×µÐ ‚ü…ÿ)…-…ð‚ ÿ‚‡ÿ™$µÐµ×§×§ÐµÐ‚ü…½)…-…ð‚ ½‚‡½™$ µ×§× ‹ü)…-…ð‚ ‚‡™$

Ä ÅÄ Ð
‹üÿÿ)…-…ð‚ ÿ‚‡ÿÿ™$Ä ÐÄ ÅµÅµÐÄ Ð‹ü½½)…-…ð‚ ½‚‡½½™$
Ä ÅµÅ 
‹ü)…-…ð‚ ‚‡™$/ / ‰Ò
CÒ
Ð/ ‹üÿÿ)…-…ð‚ ÿ‚‡ÿÿ™$Ò
ÐÒ
CÄ CÄ ÐÒ
Ћü½½)…-…ð‚ ½‚‡½½™$/ ‰Ò
CÄ C
‰/ ‰…üƒ)…-…ð‚ ‚ƒ™$

ƒ = Ð
…üÿƒ)…-…ð‚ ÿ‚ƒÿ™$ Ð =´ =´ РЅü½ƒ)…-…ð‚ ½‚ƒ½™$
ƒ =´ = ƒ
ƒ‚ü†)…-…ð‚ ‚‡™$--4Ñ
îÑ
Ð-‚ü†ÿ)…-…ð‚ ÿ‚‡ÿ™$Ñ
ÐÑ
î î ÐÑ
Ђü†½)…-…ð‚ ½‚‡½™$-4Ñ
î î
4-4‚ü…)…-…ð‚ ‚‡™$;;±ßkßÐ;‚ü…ÿ)…-…ð‚ ÿ‚‡ÿ™$ßÐßkÑ
kÑ
ÐßЂü…½)…-…ð‚ ½‚‡½™$;±ßkÑ
k-±;±‹ü)…-…ð‚ ‚‡™$JJíÀíÐJ‹üÿÿ)…-…ð‚ ÿ‚‡ÿÿ™$íÐíÀßÀßÐíЋü½½)…-…ð‚ ½‚‡½½™$JíÀßÀ;J‹ü)…-…ð‚ ‚‡™$XX
üÄüÐX‹üÿÿ)…-…ð‚ ÿ‚‡ÿÿ™$üÐüÄíÄíÐüЋü½½)…-…ð‚ ½‚‡½½™$X
üÄíÄJ
X
…üƒ)…-…ð‚ ‚ƒ™$HH3ìíìÐH…üÿƒ)…-…ð‚ ÿ‚ƒÿ™$ìÐìíÝíÝÐìÐ…ü½ƒ)…-…ð‚ ½‚ƒ½™$H3ìíÝí:3H3‚ü†)…-…ð‚ ‚‡™$VV£ú]úÐV‚ü†ÿ)…-…ð‚ ÿ‚‡ÿ™$úÐú]ì]ìÐúЂü†½)…-…ð‚ ½‚‡½™$V£ú]ì]H£V£‚ü…)…-…ð‚ ‚‡™$eel&Ðe‚ü…ÿ)…-…ð‚ ÿ‚‡ÿ™$Ð&ú&úÐЂü…½)…-…ð‚ ½‚‡½™$el&ú&Vlel‹ü)…-…ð‚ ‚‡™$ss?ùÐs‹üÿÿ)…-…ð‚ ÿ‚‡ÿÿ™$ÐùùÐЋü½½)…-…ð‚ ½‚‡½½™$s?ùùe?s?‹ü)…-…ð‚ ‚‡™$‚‚Ç%%Ђ‹üÿÿ)…-…ð‚ ÿ‚‡ÿÿ™$%Ð%Ð%Ћü½½)…-…ð‚ ½‚‡½½™$‚Ç%sǂDžú…-…ð‡Ð‚ ‚ÿ‚‡‡Ð‡Ðû‡c‡cû‡õ‡õû‡‡‡‡û‡‡û… ‡2
/…0V ‡2
…1V ‡2
T…2V ‡2
捅3V ‡2
y…4V…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹iH€À…
…‡2
TÝ™Millions‹++++``V…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹üÿx° üÿ‡Ð…
…‡Ð–‡Ð‡±‡ÐC ‡±C ‡Ðm‡±m‡Ð–‡±–…‡2
Š9 £Subnotebookj````5V```V‡2
Šð ™Notebookn`5V```V ‡2
Šà‹PDAenn…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹¾ÿ¶î ¾ÿ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹y )Y Ž…
…O‡2
, ª0ÿUnit Shipments of Portable PCs over next 4 yearsn`+5+j`+`‹V`5V+`5+e`>5V`+V+esV+`[V>+`VV5’+V+[VV>V-‡2
d
 ÍSource: DataQuest 10\993j``>VV5++nV5Vx`VV5+VV+VVV…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹¾ÿ¶î ¾ÿ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹¾ÿ¶î ¾ÿ„üÿ„)…-…ð…
…‹$aó…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹3Vþ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹>ö…ú…-…ð…üÿƒ)…-…ð‚ ÿ‚ƒÿ…
…‹M¯³I‚ ‚ÿ‚…….
‡2
M֍1993VVVV….…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹3Vþ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹)>‚ü†ÿ)…-…ð‚ ÿ‚‡ÿ…
…‹X¯¾I‚ ‚ÿ‚…….
‡2
X֍1994VVVV….…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹3Vþ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹4> ‚ü…ÿ)…-…ð‚ ÿ‚‡ÿ…
…‹c¯ÉI‚ ‚ÿ‚…….
‡2
c֍1995VVVV….…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹3Vþ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹@>‹üÿÿ)…-…ð‚ ÿ‚‡ÿÿ…
…‹n¯ÔI‚ ‚ÿ‚…….
‡2
n֍1996VVVV….…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹3Vþ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹K>#‹üÿÿ)…-…ð‚ ÿ‚‡ÿÿ…
…‹y¯ßI‚ ‚ÿ‚…….
‡2
y֍1997VVVV….…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹3Vþ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹¾ÿ¶î ¾ÿ‚ü…-…ð…-…ð…'ÿÿ¥‹a¾’økýÌGF3IW‰ˆ}&Wh%
O¢Ç‰cà°ªŒª\p‚ @à·ÿÖǸÿÕȹÿÕɹÿÕʺÿÕË»ðÿÿðÿÿðÿÿÀÿÿÀÿÿà?ÿÿðÿÿøÿÿ followedOut pointer interfac§(   ÿÿ‚ÿÿ¦ÿHPJ ¦q:–‡APPSERV.RTFLE –$j@C:\WINDOWS\S° „ »»°  not a Windows Help file.(This /&;)z4ÿÿa%aÿÿÿÿ|CONTEXTk |CTXOMAP@|FONTí |KWBTREE
+|KWDATAK|KWMAPä*|SYSTEM|TOPIC)ˆ|TTLBTREE<[|bm0šs|bm1;æ|bm10¹|bm11ÅÏ|bm12€% |bm13÷@ |bm14ØM |bm15µ_ |bm16Qg |bm17mw |bm18i€ |bm19|bm2ä÷|bm20ó$|bm21¹3|bm22ʐ |bm23Z¦ |bm24ª |bm25 ¹ |bm26áÉ |bm27ßE|bm28Wß |bm29+ê |bm3J|bm30
ö |bm317ý |bm32h!|bm33#!|bm34˜T|bm35 X|bm36q|bm37
!|bm38JQ!|bm39¿º!|bm4ú
|bm40Ú1"|bm41N"|bm42í­"|bm43ž#|bm44óg#|bm45¸³#|bm46ú#|bm47½j$|bm48¯£$|bm49Õ$|bm5æ|bm50ò%|bm51µt%|bm52×·%|bm53-¿%|bm54KË%|bm55jÒ%|bm56Ù%|bm57ß%|bm581æ%|bm59‚í%|bm6ÿ`|bm60×5&|bm612>&|bm62¤E&|bm63^M&|bm64ÌU&|bm65']&|bm66Qf&|bm67n&|bm68
v&|bm69Ù}&|bm7í{|bm70…&|bm71N&|bm72^”&|bm73œ&|bm74d¤&|bm75~ó&|bm76ú4'|bm77*='|bm78}D'|bm79eP'|bm8_—|bm80‘'|bm81Z'|bm82G¥'|bm83†À'|bm84vó'|bm85z (|bm86~ (|bm87|"(|bm9‹¦Æ½lpé:5%@@ ¨ F‚ ‚ÿ‚‡ eõƒ…'ÿÿ‡ èêe!ƒ‚ÿ‚‚ …'ÿÿ‡ Õ½ÿƒ‚ÿ‚‚ „ûbÿ‚¼Š"Arial”…-„ûÿ‚¼Š"ArialK‘…-„û7ÿ‚¼Š"Arial÷ž…-…-…-…û‚¼"System…-…'ÿÿƒ…-‚ÿ‚‚ ‹½ÿ"!Õ½ÿ…-…'ÿÿƒ…-‚ÿ‚‚ ‹ûÿ㠗ûÿ„ü€„)…-ƒú …-‚ ÿ‚‚€‚…
…™$úæ– Ìݺ
, úæƒüƒ)…-…ð‚ ‚ÿ‚™$Ìݤ
>º
, ÌÝ™$º
, 
>Ù?úæº
, ‚ú
…-„üÿ…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹ûÿ㠗ûÿƒüƒ)…-…ð…ú…-…ð‚…
…™$úæ– Ìݺ
, úæ™$Ìݤ
>º
, ÌÝ™$º
, 
>Ù?úæº
, ‡ÝÌ‚ÿ‚‡ –‡Ý̇ŸÌ‡²3 ‡t3 ‡_ë
‡!ë
‡Ý‡Ÿ‡ –‡â–…-…
‡2
ÈF‡25††
‡2
­
‡50†† ‡2
J"
‹100††† ‡2
È;‹500†††
‡2
‰10‰††††‡æú…‡ –‡ –‡ Ô‡+ö‡+4‡æú‡æ8…-…‡2
¬û £Windows NT »:}}}žn:‚:‡2
Œ* £Netware 4.xnCžnMn:n:n…ú…-…ð‚ü†½)…-…ð‚ ½‚‡½…™$Ó V
\
 º)
5] Ó V
™$5] º)
]- âH5] ™$âH]- côòûâH‚ü†)…-…ð‚ ‚‡™$ á zº
©¡Rz á ‚ü†ÿ)…-…ð‚ ÿ‚‡ÿ¥$Ô H
Ó V
5] âHòû á RzÔ H
…ü½ƒ)…-…ð‚ ½‚ƒ½™$B   ï f
å© úB  ™$© úf
åº_°© ú™$_°º!|wN_°™$wN!|¢G
ïwN…üƒ)…-…ð‚ ‚ƒ™$
ï¢G˜Ú}
ï…üÿƒ)…-…ð‚ ÿ‚ƒÿ¥$C  B  © ú_°wN
ï}C  …ú…-…ð‡ÝÌ‚ ‚ÿ‚‡¤‡Ý̇ݎ‡!
«‡!
m‡o ˆ‡o J‡É d‡É &‡0>‡0‡¤‡¤Ù…-… ‡2
n ‹$0 ††C‡2
²
 …$100,0• ††††C†††C‡2
ö …$200,0• ††††C†††C‡2
Z
Ò …$300,0• ††††C†††C‡2
Á¬ …$400,0• ††††C†††C‡2
5… …$500,0• ††††C†††C…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹m
RÓ …
…ŒûÿŒ
Œ
¼Œ"Arial •…- ‡2
“
Þ…Cost…-…ð…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹ûÿ㠗ûÿ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹½ÿ"!Õ½ÿ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹HËø…
…F‡2
°=*ÿThe Larger Your Network, The More You Saveš†C•†[•†[Cž•[C­†R»•[†CCš†Cŕ[†Cž•Cž†‚†…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹½ÿ"!Õ½ÿ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹½ÿ"!Õ½ÿ‚ü…-…ð…-…ð…'ÿÿ…?ÿà@ƒ=‚ ½‚‡½½™$X
üíÄJ
X
…üƒ)„…ð‚ ‚ƒ™$HH3ìíìÐH„ÿƒ)…-…ð‡ ÿÿƒÿ™$ìÐìíÝÝÐìÐ…ü½ƒ)ƒ-…ð‚ ½‚ƒ½˜H3ìíÝí:3H3‚ü†)…-…ð‚ ‡™$VV£ú]úV‚ü†ÿ)…-ŠÿÿÿÿO ’¼ÿÿÿÿSystem&lp;@%$ h 4‚ ‚ÿ‚…
…‡ jàƒ…'ÿÿ‚ ƒ‚ÿ‚‚ ƒú …-„üÀ„…-‚ À‚‚‚…
…†k၂ú
…-„üÿ…-…'ÿÿ‚ ƒ…-…-‚‚‚ À‚…-…-…'ÿÿ‚ ƒ…-…-‚‚‚ À‚„ûïÿ‚¼‰ArialûÎ…-„ûìÿ‚¼‰ArialŒÊ…-…-„ûïÿ‚…Arial…-…-…-…û ‚¼"System…-…'ÿÿƒ…-…-…-‚‚‚ À‚‡jà…-…-…-…'ÿÿƒ…-…-…-‚‚‚ À‚‡jà„üã„ÿÿ…-…ðƒú …-…ð‚ ã‚‚ÿ‚…
…™$feÏeÏffe‚ú
…-…ð…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ã‚‹Ïaf‡÷f‚ÿ‚…
…‡÷χÚf‡Úχ½f‡½Ï‡Ÿf‡ŸÏ‡‚f‡‚χef‡eÏ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ょjà…ú€‚…-…ð‡ef…
…‡eχχf‡ef…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ã‚‹cÙ…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ã‚‹Ðef…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ã‚‹Ñcf…ú‚…-…ð‚ü…`ÿÿ…-…ð‡ `‚ÿ‚…
…™$”ÒÒ””™$.ÒmÒm..Ò™$É££ÉÉ£™$c¡¡cc…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‡ `‹Ðef…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‡ `‡jà‚ú
…-…ð‡ef‚ÿ‚…
…‡f‡a‡f‡÷a‡÷f‡Úa‡Úf‡½a‡½f‡Ÿa‡Ÿf‡‚a‡‚f‡ea‡ef‡f‡Ï‡f‡f‡‡‡›‡›‡5‡5‡Ï‡Ï…-…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‡ `‹EÌ‚ ‚‚ÿ‚…
…4‡2
%ÓÛThe Range of Chip Performances
    
  …-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‚‡jà…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‚‡jà…-…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‚‡jà…
… ‡2
L…0
‡2
îC‡25
‡2
ÑC‡50
‡2
´C‡75 ‡2
–:‹100 ‡2
y:‹125 ‡2
\:‹150 …-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‚‡jà…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‚‡jà…
…‡2
&š“66MHz
‡2
<‘™i486 DX2  ‡2
&5“66MHz
‡2
<0—Pentium 
‡2
&Ë—100MHz
‡2
<Å—R4400SC ‡2
&b™150 MHz 
‡2
<n‘Alpha  …-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‚‡jà…-…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‚‹í3Œ…
…Œûïÿ„„¼ŒArial?Ê…- ‡2
æ ‹SPECfp 92…-…ð…-…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‚‡jàƒüƒÿÿ…-…ð‚ü…-…ð…-…ð…'ÿÿ‡ jàƒ‚ÿ‚‚ ‚…'ÿÿ‚ ƒ‚ÿ‚‚ ‚…'ÿÿƒ‚ÿ‚‚ ‚†jà‚ú
…-ƒü…-‚ À‚‚‚…
…†jà…-…ð…-…ð…'ÿÿˆ*‡µµ‚*›Ø×Ž 4æªÆ}
ï…üÿƒ)ƒ-‡¤‡Ý̆ݎ‡!
«‡!
m‡o ˆ‡o J‡É d‡É &
ø ÿ…‹üÿÿ)…-ð$0 ††C‡2
²
 $100,00 ††††C†††C†2
ö…$200,0“ ††††C†††C‡2
Z
Ò …$300,0‰ ††††‰†††C‡2
Á¬ …$400,0 öȪbªª-„S`*?à© ¹°lp,ö!& ôZ†&ÿƒ—MrEdMicrosoft DrawZ&©MrEdŸ„ÿƒÿÿ… ¤ SystemŠÿ)_ ¯
ÿÀ€‚ÿ€†ÿÿ€€ÿ€†ÿÿ€€ÿŒ€ÿÿ€€&MrEd‰)úÿG
/‡ úÿ)‡ 5
ƒ…‚ÿ‚‚ ……
……ƒ†&ÿƒ‰¢ˆ6è&MrEd‰¢’6è„üÿ„ÿÿ…-ƒúÿ‚…-‹è6’¢….…„û¿ÿ‚"Arial Narrow÷…- ‡2
˹…TDI
†&
ÿ&MrEd‰¡1ô Ÿ‚ü†€€ÿÿ…-…ð…‡ú…-‹ õ 0 …„û°ÿ‚¼‰Arialר…-…ð
‡2
3‡NWRDR & MrEd%o¶?
¶&MrEd‰¢çô U…ü€ƒÿÿ…-…ð…‹Võ æ¡‚ ÿ‚…
‡2
99‡NWLink†&ÿƒ‰Š`LÀ&MrEd‰ŠjLÀ„üÿ„ÿÿ…-…ð……-…ð‹ÀLjŠ‚ …„û¿ÿ‚"Arial Narrow÷…-…ð ‡2
£¡…NDIS
†&
ÿ‡ú…- & MrEd%oŽ?
ކ&ÿƒ‰qÜb<&MrEd‰qåb<……-…ð‹<båq…
‡2
ˆ‡FSCTL
†&
ÿ‡ú…- & MrEd%o
?

 & MrEd%1G?
G„ûÆÿ‚"Arial Narrow÷…-…ð
‡2
ˆ? Kernel Mode ‡2
2? ‹User Mode&MrEd‰¢»ô '‚ü…€ÿÿ…-…ð…‡úƒ€…-…ð‹(õ º¡‡ ÿÿ…„û°ÿ‚¼‰Arial稅-…ð ‡2
5‰Network&MrEd‰hgþ ê„üÿ„ÿÿ…-…ð…‡ú…-…ð‹ëÿ fg‚ …„ûÆÿ‚‰Arial+¨…-…ð‡2
†—Multiple UNC Provider†&ÿƒ‰œ¿6<&MrEd‰¤Ç.4…‹5/Æ£…
‡2
Ò‡NWWKST
†&
ÿ†&ÿƒ‰œ>6»&MrEd‰¤F.³…‹´/E£… ‡2
Œ§‰NWPROVAU
†&
ÿ&MrEd‰¦™.1…‹2/˜¥…„ûÔÿ‚‰Arial©…-…ð ‡2
‰Multiple ‡2
ó
‰Provider
‡2
"‡Router†&ÿƒ‰úÿ–&MrEd‰˜Ž……‹†—…„ûÍÿ‚‰Arial¼…-…ð ‡2
Q°‰Printing
†&
ÿ†&ÿƒ‰œúÿ‰&MrEd‰¤……‹†‚£…
‡2
QʇLogin
†&
ÿ†&ÿƒ‰¿|<&MrEd‰‰Çt4…‹5uƈ…„ûÆÿ‚‰Arial©…-…ð ‡2
"…NW16
†&
ÿ†&ÿƒ‰úÿ|&MrEd‰‰t……‹†uˆ…„ûÍÿ‚‰Arial¼…-…ð ‡2
Qø‰SETPASS
†&
ÿ†&ÿƒ‰žúÿ6&MrEd‰¦.……‹†/¥…„ûÔÿ‚‰Arial©…-…ð ‡2
5á ‹WNET Apps‡2
hÇ‘(e.g. “net use”)
†&
ÿ†&ÿƒ‰V¿ü <&MrEd‰^Çô 4…‹5õ Æ]…„ûÆÿ‚"Arial Narrow÷…-…ð‡2
Í•“dir \\server\share”
†&
ÿ…û ‚¼"System…-…ð…-…ðƒü…-…ð…'ÿÿ…'ÿÿ‡2
±š‰SETPASS
‚&‚&ÿ66†ll%‚ø‚ø ‚‚À‹ÇG ‹>höu8FøP‹^þ‹‹_ Ñã.   ! ÿ‚ (…! ˆAntiquaArial Narrow„ÿ,“ÿÿ vržqÄMn ́ $tions.cCannot create or modify !Ž@^@‚Ÿ —\BUILD\11_4\*.*
Save S!‚ÿÿlp=* Àč óZ†&ÿƒ—MrEdMicrosoft DrawZ&©MrEdŸ„ÿƒ€ÿ…¤ SystemŠÿ)_ ¯
ÿÀ€‚ÿ€†ÿÿ€€ÿ€†ÿÿ€€ÿŒ€ÿÿ€€&MrEd‰øÿøÿŒ ·‡ øÿøÿ‡ ¿” ƒ…‚ÿ‚‚ ……
……ƒ†&ÿƒ‰øÿøÿŒ W&MrEd…¿ …üÿƒÿÿ…-‡ú…-‹$Ãüÿüÿ&MrEd‰0o ‚ü…€ÿÿ…-…ð‹$süÿ,….…„û ÿ‚Š System…- ‡2
ÀÀ‰OLE 1.0‚ ÿ‚ ‡2
ÀP‰OLE 2.0‚  ‡2
€‰Linking ‡2
à ‹Embedding‡2
€0 ¡Simplified Linking and Embedding‡2
à0‘In-Place Editing‡2
@0
Drag and Drop
†&
ÿ‡2
 0OLE Automation…û ‚¼"System…-…ðƒúÿ‚…-…ðƒü…-…ð…'ÿÿ…'ÿÿ‚ÿ{šFÿ{HÿÖOÿ¢µµ‚2„ðß-ø‚wnlpª:ž3¢0 m Z†&ÿƒ—MrEdMicrosoft DrawZ&©MrEdŸƒ„|˜ƒÿÿ…¤ Systemoÿçÿðuÿ„ÿÀ€‚ÿ€†ÿÿ€€ÿ€†ÿÿ€€ÿŒ€ÿÿ€€&MrEd‰ùÿøÿú
‚‡ øÿùÿ‡ Šƒ…‚ÿ‚‚ ……
……ƒ&MrEd‰Ú• ,‚üƒÿÿ…-ƒú …-‹,• ڍ&MrEd‰»v „üÿ„ÿÿ…-…ðƒúÿ…-…ð‹v »&MrEd‰ˆx &ƒúÿ‚…-…ð‹& xˆ….…„û¯ÿ‚—Times New Roman…-
‡2
я Sales Report&MrEd‰Ö&Ú‚üƒÿÿ…-…ð…‹Ú&֏†&ÿƒ‰ípXۍ&MrEd‰õxPÓ„ü„ÿÿ…-…ðƒúƒÿ…-‹ÓPxõ&MrEd‰•’
‚üƒÿÿ…-…ð‡ú…-…ð‹ ”“&MrEd‰þsö„ü„ÿÿ…-…ðúÿÿ…-…ð‹øuü&MrEd‰86uÊ‚üƒÿÿ…-…ð‡ú…-…ð‹Ìw46&MrEd‰#V¶„ü„ÿÿ…-…ðúÿÿ…-…ð‹¸X!&MrEd‰¸¢Cµ‚üƒÿÿ…-…ð‡ú…-…ð‹·E ¶&MrEd‰š$¢„ü„ÿÿ…-…ðúÿÿ…-…ð‹¤&˜&MrEd‰ô΂üƒÿÿ…-…ð‡ú…-…ð‹Ä Ìò&MrEd‰Õ»è¯„ü„ÿÿ…-…ðúÿÿ…-…ð‹±ê¹Ó
†&
ÿ&MrEd‰ˆ~ f„üÿ„ÿÿ…-…ð‡úƒÿ…-…ð‹h |†ˆúÀ‚…-…ð & MrEd%è ü»
üˆú ²‚…-…ð & MrEd%ˆ   & MrEd%ˆD D & MrEd%ˆž ž & MrEd%ˆ× × & MrEd%ˆ  & MrEd%ˆK K & MrEd%ˆ„ „ & MrEd%ˆ¾ ¾ˆúÀ‚…-…ð & MrEd%è V»
V & MrEd%í ¶À
¶ & MrEd%í À
 & MrEd%í qÀ
qƒúÀ‚…-…ð & MrEd% x ñ & MrEd%( x( ñ&MrEd‰ˆ÷ àƒúƒÿ…-…ð‹à ÷ˆƒú‚…-…ð & MrEd%NxÕ & MrEd%NÑÕñ & MrEd%õÑñ & MrEd%õx†&ÿƒ‰ùÿý&MrEd‰ 1õ‚üƒÿÿ…-…ð‡ú…-…ð‹÷/&MrEd‰Öó„ü„ÿÿ…-…ð‡úƒÿ…-…ð‹õØÿÿ&MrEd‰(9½Î‚üƒÿÿ…-…ð‡ú…-…ð‹Ð¿7&&MrEd‰ &ž»„ü„ÿÿ…-…ðúÿÿ…-…ð‹½ $&MrEd‰Zþ|Í‚üƒÿÿ…-…ð‡ú…-…ð‹Ï~üX&MrEd‰;ë]¹„ü„ÿÿ…-…ðúÿÿ…-…ð‹»_é9&MrEd‰ík¼¦‚üƒÿÿ…-…ð‡ú…-…ð‹¨¾ië&MrEd‰ÎX“„ü„ÿÿ…-…ðúÿÿ…-…ð‹•ŸV̍&MrEd‰¸èôÖ‚üƒÿÿ…-…ð‡ú…-…ð‹Øö涍&MrEd‰šÕÕÄü„ÿÿ…-…ðúÿÿ…-…ð‹Å×Ә
†&
ÿƒú‚…-…ð & MrEd%ˆ~è x & MrEd%ˆdè ñ & MrEd% d»
ñ & MrEd% ~»
x & MrEd% ÷»
× & MrEd% Þ»
 & MrEd%ˆÞè  & MrEd%ˆ÷è ׍&MrEd‰
ëÛ
,‚üƒÿÿ…-…ðƒú …-…ð‹,Û
ë
&MrEd‰è ×½
„üÿ„ÿÿ…-…ðƒúƒÿ…-…ð‹½
×è …‡2
D
‘Name: John Smith‡2
¤
Title: Sales Representative‡2

“Hire Date: 10/3/89‡2
d
™Supervisor: Prakesh Kahn‡2
Ä
Area: Central&MrEd‰
‹Û
‚üƒÿÿ…-…ð…‡ú…-…ð‹Ý
‰
&MrEd‰è x½
ó„üÿ„ÿÿ…-…ð‡úƒÿ…-…ð‹õ¿
væ … ‡2
æ
…Rep. ‡2
æ$ …1992 ‡2
æD …1993 ‡2
F
…John ‡2
F$ …536 ‡2
FD …654 ‡2
¦
…Jane ‡2
¦$ …345 ‡2
¦D …457
‡2

‡Seema ‡2
$ …672 ‡2
D …873 ‡2
f
…Bob ‡2
f$ …423 ‡2
fD …510 ‡2
Æ
‰Soo-lin ‡2
Æ$ …367 ‡2
ÆD …490&MrEd‰€{½…‡ú…-…ð‹ÄÉty & MrEd
‘%–ºHkîk‚üƒÿÿ…-…ðƒú …-…ð & MrEd
‘${¼©Í¡˜…
‡2
î¡ Double-click‡2
N¡
here and edit
‡2
®¡ your logo in ‡2
¡
‹Corel Draw&MrEd‰£ ë
@„üÿ„ÿÿ…-…ð…‡ú…-…ð‹Gò
œ & MrEd
‘%é•«Xt X‚üƒÿÿ…-…ðƒú …-…ð & MrEd
‘$Ö„ḅ‡2
zà ¡Double-click here and edit your‡2
Úà ›sales figures in Lotus 123&MrEd‰¼s½
s„üÿ„ÿÿ…-…ð…‡ú…-…ð‹zÄ
lµ & MrEd
‘%³ÄŽÄ‚üƒÿÿ…-…ðƒú …-…ð & MrEd
‘$  Î‘¨k…‡2
æÝ¡Double-click here and edit your‡2
FÝŸemployee database in MS Access…û‚¼"System…-…ð…-…ðƒü…-…ð…'ÿÿ…'ÿÿ‡maxlenƒo`ˆD_.7 of d:\viper\ntq&a.rtf : Unƒøø†  %ÿÿÿÿúñlpý£@$¨ 灂 ‚ÿ‚‡ R僅'ÿÿ‡ Ýô²ƒ‚ÿ‚‚ …'ÿÿ‡ ß
½ÿƒ‚ÿ‚‚ „ûbÿ‚¼Š"Arial—P…-…û‚¼"System…-…'ÿÿƒ…-‚ÿ‚‚ ‹¼ÿoß
½ÿ…-…'ÿÿƒ…-‚ÿ‚‚ ‹úÿ0¡
ûÿ„üÀ„)…-ƒú …-‚ À‚‚À‚…
…‹GßK
Q„ü€„)…-…ðƒú …-…ð‚ ÿ‚‚€‚™$^xáÇál^^ƒüƒ)…-…ð‚ ‚ÿ‚™$ÇáÇúlwl^Çá™$l^lww^l^‚ú
…-„üÿ…-…-…'ÿÿƒ…-…-…-‚ÿ‚‚ ‹úÿ0¡
ûÿƒüƒ)…-…ð…ú…-…ð‚…
…™$^xáÇál^^™$ÇáÇúlwl^Çá™$l^lww^l^…ú…-…ð‚ü…)…-…ð‚ ‚‡™$ ^ CsÆsá ^‚ü…ÿ)…-…ð‚ ÿ‚‡ÿ™$sásƐƐásá‚ü…½)…-…ð‚ ½‚‡½™$ CsƐÆ5C C…-…-…-…'ÿÿƒ…-…-…-‡½‚ ½‚‹?M Z [‚ ‚À‚…
…‡2
+ |—Windows•+```xV…-…-…-…'ÿÿƒ…-…-…-‚À‚‚ ‹úÿ0¡
ûÿ‚ü…)…-…ð‚ ‚‡…
…™$q^qxÌ
ûÌ
áq^‚ü…ÿ)…-…ð‚ ÿ‚‡ÿ™$Ì
áÌ
ûé ûé áÌ
á‚ü…½)…-…ð‚ ½‚‡½™$qxÌ
ûé ûŽ xqx…-…-…-…'ÿÿƒ…-…-…-‡½‚ ½‚‹t[ ‚ ‚À‚…
…
‡2
`| OS/2xj+V…-…-…-…'ÿÿƒ…-…-…-‚À‚‚ ‹úÿ0¡
ûÿ…ú…-…ð‡áÇ‚ÿ‚…
…‡úLJáLJᤇåLJ备éLJ餇íÇ‡í¤‡òLJò¤‡öLJö¤‡úLJú¤‚À‚… ‡2
A®‹$0 VV+‡2
E‘$500 VVVV+‡2
I€ƒ$1,0‘ VV+VVV+‡2
M€—$1,500 VV+VVV+‡2
R€ƒ$2,0‘ VV+VVV+‡2
V€—$2,500 VV+VVV+‡2
Z€ƒ$3,0‘ VV+VVV+…-…-…-…'ÿÿƒ…-…-…-‚À‚‚ ‹”5G£…
…‡2
)‘1992 VVVV+‡2
MÄ™Sales injV+VV++`‡2
Ä™Millions‹++++``V…-…-…-…'ÿÿƒ…-…-…-‚À‚‚ ‹úÿ0¡
ûÿ…-…-…-…'ÿÿƒ…-…-…-‚À‚‚ ‹¼ÿoß
½ÿ…-…-…-…'ÿÿƒ…-…-…-‚À‚‚ ‹¼ÿoß
½ÿ‚ü…-…ð…-…ð…'ÿÿÒserved byBAKSeriWT=L *L§€€ÿà€€€ÿà€€€ÿà€€€ÿàAƒƒ‚^ƒeŸ@ï=4Aï=hAï=–Aï=ÄAï=žCï=®Dï=ŒEï=$Ù‡Eˆ¨ˆ7<c‚,ÿƒÿÿ)Ÿragraph.
Warning 4753: topic..n ˆ ÖWindows Help.>> Untitled TopicÀã»ÿ¾Ã;÷s
OO‹
ãöÿÑëòÃ;÷sòLH°h 8¡ ¹ÿÿÿÿALFEATURÿÿÿÿCURSORm an End-User Perspectiveð62G22.,**.*u 3À™^_ÉÊ‹FPWš²DERP‹FøPV‹øš WinHelp and delete WINHELP.BMKrning 4113: topic.ÿ2 of d:\vip(+À£Ü.£Þ.^MM‹å]MÊ ŒÐEU‹ìŽØragraph.
Warning 4792: topic..r dialog box.:Pasted text too l to load a specifie®d resource.?ÿ*¢ÿ*|ÿ*ªÿ* ÿ*†ÿ*&‚¤ÜD܈€ÜD€ˆ€ÿ€D܇½‚ ½‚t¢M¾¢ExecProgramSuEm an End-User Per…-…-…-‚'$‡Ïa((‡XŸ˜
¢of Multitasking Under OS/2 and ÿ
ÿ
ÿÿ¾F&ÿu&ÿ5šB
WĀ
ö~éqÿÿvWšÄê

¢P ­lbn UNIX5.BMP ®lbƒƒ*ƒ8ƒBƒLÿ!ÿžBANY.RTF ™k9¡RELIABLEÿ!!KERNELSYSTEMŒÿÿOÿlªâR- The Windows NT Evaluation Guide§&Send comments to [email protected]3® 1994 Microsoft Corporation. All Rights Reserved.þ è( @€€€€€€€€€€€€ÀÀÀÿÿÿÿÿÿÿÿÿÿÿÿÀ Ì Ì @° À Ì ÌÀ »° À ÌÀ »° ÌÀ »° ÌÀ »°LÀ ³  ™ ™ ™"  ™ ™"  ™" ™" $ê´æ§â¥Z7ê•Z¯ê´æ§ÿÿÿÿêŠe·êf²—âjª·ê³$ƒÿÿÿÿÿoÿÿû"çù¢‡íúïnû"ù¢íúïnû"ù¢íúïnû"ù¢íúïnû"ù¢íûïÿÀ?ÿÿÿÿBCreateButton("btn_topic_index", "|<<", "GoToMark(`topic_index')")BrowseButtons()ACreateButton("btn_next_index", ">>|", "GoToMark(`topic_index')")gCreateButton("btn_gloss", "&Glossary", "JumpId(`nteval.hlp>gloss', `GLOSSARY_OF_TERMS_AND_ACRONYMS')")!DisableButton("btn_topic_index")FCreateButton("btn_toolhelp", "?", "PopupID(`nteval.hlp',`toolhelp')")BCBB("btn_contents", "JumpId(`nteval.hlp', `understanding_main')"):AA(0x20, 0, "JumpId(`nteval.hlp', `understanding_main')")YInsertItem("mnu_help","itm_about","About This &Guide","JI(`nteval.hlp',`about_main')",0)ZÿmainŸmain„The Windows NT Evaluation GuideOm##ÌO,ÿlÿÿÀÀÀÀÀÀZÿsecondarygloss„Windows NT Glossaryation GuideOg##ÌO,ÿl ôÿÀÀÀÀÀÀZÿsecondaryw32cat„32 bit Applications for Windows NTw##ÌO,ÿlº0pÀÀÀÀÀÀ⻁ÿÿÿÿ Y(ÿÿÿÿe1Ä ÿÿÿÿÿÿÿÿe0
Creating the Windows NT Evaluation Guide8 % €&€°Œ€‚ÿAbout This Guideìe²) €Ù€˜˜€€‚ÿThis hypertext guide contains over 1000 pages of information and over 100 separate graphics. It consolidates most of the available Windows NT marketing materials as well as strategic whitepapers on Microsofts Open Services Architecture, Object Linking and Embedding and other important computing technologies. It took two individuals approximately five months to develop this guide. This included the development of content as well as the creation and production of the interactive media.ౝ’/ ,€c€˜˜€€ãÛP26‰‚ÿThis guide was created using Microsoft products including Microsoft Word for Windows 6.0, the Microsoft Windows Help Compiler, Microsoft Access, Microsoft Project and the Microsoft Hot Spot Editor. To expedite many of the tedious and repetitive processes, we employed several of the Microsoft Office Automation components. One specific example was creation of the Solution Provider Guide. (which has about 300 entries)The Mail Merge automation between Microsoft Access and Microsoft Word 6.0 made this process both flexible(since as the database changes it is reflected in the document) and intelligent - we were able to use the Microsoft Word Macros to generate the helpfile format.8²Ê) €€˜˜€€‚ÿHelpfiles require no run-time license and are easy to create. Their interactive nature facilitates quick information retrieval and the ability to browse and scan topics at a pace compatible with ones level of time and interest. Like most Microsoft products, the help compiler allows you to start external applications and access Dynamic Link Libraries (DLLs) through a macro language. Creating a help file does not require previous programming experience and thus provides powerful functions to a broad base of individuals.µŒ’ ) €€˜°€€‚ÿInternally, Microsoft uses Helpfiles to provide quick, informative information on tools and processes. For instance, in the search for editors and technical writers, for this project we consulted a helpfile developed by Microsofts Corporate Communications Group. This tool provides detailed information on contracting external resources and generally simplifies what can be a tedious process.±‡Ê0
* "€€˜˜€‚€‚ÿAny Questions or comments on this guide, the content or its construction may be directed over the Internet to:[email protected]² â
1ùÿÿÿÿ9 â
- õManaging The Windows NT SystemCBB("btn_next_index", "PI(`nteval.hlp', `next_17')");SaveMark("topic_index");EB("btn_topic_index")K"0
- ) "€D€°°˜€€‚ÿManaging The Windows NT SystemÖ¤â
2 2€I€°˜€€€€ €‚ÿBecause administration is critical to the deployment of any system solution, one of the primary design goals for the Microsoft® Windows NT™ operating system was to ensure that it was extensively yet easily managed in an enterprise environment. As a result, Windows NT provides one of the most comprehensive set of management facilities ever offered in an operating system. Graphical tools help administrators centrally configure both systems and users quickly and easily. Every management tool provided with Windows NT is fully remoteable, optimizing the effectiveness of administrators and help desk personnel, and making their talents available across the enterprise.ò¡- õQ p€C€°˜ãcA€
‰‚ã?Àã×8b>‰€‚ãò$ôà€
‰‚ã-À褉€‚ÿThe Graphical, Remote Administration ToolsRemote Administration in Windows NTAccount Management and DomainsAuditingFrequently Asked QuestionsS"H1ïÒHœfBThe Graphical Administration ToolsT-õœ' €Z€˜ŒR˜€‚ÿThe Graphical, Remote Administration ToolsH¹At ¶€;€°˜€‚âW×É€
‰€‚ã!Ìސ€
‰€ ‚ã‘Qi‘€
‰€‚ãKûá€
‰€‚ã ={̀
‰€ œ¹Aõ‚ã"ô€
‰€‚ÿWindows NT provides a wide variety of services which can be accessed using any of a number of intuitive graphical tools. Every management tool--from the Registry Editor to the Performance Monitor--can be accessed directly by applications and all are fully remoteable across the enterprise.Windows NT SetupUser ManagerUser Profile EditorPerformance MonitorEvent ViewerControl Panel­[œfBR t€¶€°˜ã9fVl€
‰€ ‚ãÈc»€
‰€ ‚ãÊ+‡€
‰€‚㟊€
‰‚ÿServer Manager and ServicesThe Registry EditorFile ManagerPrint ManagerF¹A¬B1• €qˆÿÿÿÿ¬BûKRemote Administration?fBëB' €0€ČR˜€‚ÿRemote Administrationšt¬B…D& €é€°˜€‚ÿA commonly used feature of UNIX is the capability to login remotely. You can connect to any machine and perform administrative tasks remotely. Likewise, you can use any of the Windows NT and Windows NT Advanced Server administration tools remotely but without logging in to the remote machine. Here are some examples of things that you can do without leaving your desk:¶CëB;Es#¶€† €€°˜ÿ €€°˜€‚ÿ€R€°˜ÿ,€T€°˜âÆÑà€
‰€ ‚ÿÿÿMonitor a remote desktops performancePerformance Monitor»H…DöEs#¶€ €€°˜ÿ €€°˜€‚ÿ€h€°˜ÿ,€j€°˜â‘ˆÚò€
‰€ ‚ÿÿÿMonitor a remote print job and adjust prioritiesPrint Manager¿L;EµFs#¶€˜ €€°˜ÿ €€°˜€‚ÿ€Z€°˜ÿ,€\€°˜â£
Ú?€
‰€ ‚ÿÿÿCreate local accounts on a remote machineUser Manager for Domains­:öEbGs#¶€t €€°˜ÿ €€°˜€‚ÿ€T€°˜ÿ,€V€°˜âbÜȀ
‰€ ‚ÿÿÿView System events on a remote machineEvent Log¹RµFHg#ž€¤ €€°˜ÿ €€°˜€‚ÿ€‚€°˜ÿ€„€°˜‚ÿÿÿRedirect system alerts from other systems to your own desktopServer Manager¾KbGÙHs#¶€– €€°˜ÿ €€°˜€‚ÿ€h€°˜ÿ,€j€°˜â.߁Ÿ€
‰€ ‚ÿÿÿInspect the connections to any Windows NT systemNetwork Watcher*²?H‹Is#¶€~ €€°˜ÿ €€°˜€‚ÿ€R€°˜ÿ,€T€°˜âyoQ€
‰€ ‚ÿÿÿEdit the Registry on a remote machineRegistry EditorÉVÙHTJs#¶€¬ €€°˜ÿ €€°˜€‚ÿ€†€°˜ÿ,€ˆ€°˜âŽÚՀ
‰€ ‚ÿÿÿBuild directories and set access privileges on a remote machineFile Manager¼I‹IKs#¶€’ €€°˜ÿ €€°˜€‚ÿ€h€°˜ÿ,€j€°˜â¯Æ€
‰€ ‚ÿÿÿSend network messages to popup on users' screensServer ManagerÃPTJÓKs#¶€  €€°˜ÿ €€°˜€‚ÿ€l€°˜ÿ,€n€°˜âÇÑà€
‰€ ‚ÿÿÿCheck the free hard disk space on a remote machinePerformance Monitor(KûK% €€°˜€‚ÿ= ÓK8L1¢€Œ‰8LnLë„Event Viewer6ûKnL' €€˜ŒR˜€‚ÿEvent Viewerp=8LÞN3 4€{€°˜˜€âbÜȀ
‰€‚ÿThe Event Viewer, as its name implies, is used to record and view Windows NT events. An event is any significant occurrence, in the system or in an application, that warrants notification of the user. For critical events, Windows NT can notify users with an alert on the screen. For those events that do not require immediate attention, Windows NT can add information to an event log file. Event logs can be viewed in real-time, or can be saved for later analysis. The Event Viewer is the single facility for logging events by system and Windows-based applications. ûÒnLå€) €¥€˜˜€
€‚ÿThe Event Viewer has three defined logs: System, Security, and Application. The System Log records all events relating to the base operating system, device drivers, and services. For example, if a driver or system component fails to load on bootinÞNå€ûKg, this generates an event in the log. The Security Log records events relating to system security, such as failed logons. The Application Log records events generated by applications, such as "log file too large." ÖÞNë„0 .€­€°˜€
€‚€
€‚ÿThe Event Viewer has five defined event types: Error, Warning, Information, Success Audit, and Fail Audit (the last two are used for the security log). The Event Viewer supports various combinations of log "retention wrapping." You set the log size and choose what you want it to do when the log is full. You can tell it to overwrite as needed, overwrite events older than a specified number of days, or not to overwrite events at all, so you can clear the log manually.The Event Viewer supports comprehensive filtering. You can filter by event types, date and time of events, source, category, user, computer, or event ID. Event logs can be saved in archive log format to be later reopened in the Event Viewer, or saved as text format or comma-delimited text for later analysis (on a spreadsheet, for example). As with many of the administrative tools, the Event Viewer is fully remoteable and can be used to view events on remote Windows NT machines and down-level servers.Då€/…1„æ/…l…¿‰The Registry Editor=ë„l…' €,€˜ŒR˜€‚ÿThe Registry Editor¤q/…ˆ3 4€ã€°°˜€âyoQ€
‰€‚ÿThe Registry Editor is a tool for viewing and manipulating the configuration registry. The registry is a database that contains secure configuration information. It is structured as a disjointed set of multi-way trees. Each node in the tree is named, and each tree is rooted at a pre-defined, known node called a pre-defined key handle. The registry works very much like a hierarchical file system where each node is called a "key." Each key can contain zero or more data items, called "value entries", that are associated with the key. Keys are analogous to directories, and the value entries are analogous to files. ¯‰l…¿‰& €€°˜€‚ÿThe registry looks very much like the File Manager, and as with File Manager, security can be applied to registry keys to prevent users from modifying registry entries. The registry is used mainly for troubleshooting and problem resolution. Sections of the registry can be saved to disk and transported to another computer for analysis, and configuration information can be viewed remotely.?ˆþ‰1ÆŒ‰Öþ‰CŠ ÀServer ManagerE¿‰CŠ' €<€˜ŒR˜€‚ÿServer Manager and Services×°þ‰‹' €a€°˜˜€‚ÿAll Windows NT machines can act as servers or workstations. On a Windows NT workstation, the server component is controlled with Server Manager, Services, and File Manager. „UCŠž/ ,€«€˜˜âzþ€
‰€‚ÿServer Manager makes it possible for you to monitor who is connected to your machine, check who is using its shared resources, and set directory replication and administrative alerts. Through Server Manager, you have complete control over the users who are connected to your machine and over the resources they are using. If there are several users connected to a particular resource, you can either disconnect each user individually, or simply close the resource. A Windows NT server can use Server Manager to remotely control another Windows NT server, or a down-level LAN Manager server. :‹ À2 2€€°˜€€
€€
€‚ÿWindows NT networking is built from discrete components known as services. These services are the components that bind together to provide the full-featured networking environment. Services have certain properties--they can be started, stopped, paused, and made to continue. You can also set up a service to replicate a set of files and directories from one machine to multiple machines on the network. For the benefit of the administrator, these services can be controlled individually, using the Services tool. ž À¿‰DžPÀ1Ë[ ƄPÀÀ'ÁPerformance Monitor= ÀÀ' €,€˜ŒR˜€‚ÿPerformance Monitor2PÀ¿À. ,€€°˜€†"€‚ÿhCÀ'Á% €†€°˜€‚ÿClick on the diagram to find out more about Performance Monitor.1¿ÀXÁ1éÿÿÿÿÿÿÿÿÿÿÿÿXÁÅI"'Á¡Á' €D€ČR˜€‚ÿPerformance Monitor DescriptionG!XÁèÃ& €C€°˜€‚ÿPerformance Monitor is a graphical tool which can be used to measure the performance of any Windows NT computer accessible over the network. You can monitor several aspects of your computer's performance, including CPU utilization, disk reads and writes/second, number of processes, and number of threads. Performance Monitor provides real-time charting, alerting, and reporting capabilities, and a logging facility. Logs can be saved for further analysis. Performance Monitor is particularly useful for cost management and planning purposes.(¡ÁÅ& €€°˜€‚ÿPerformance Monitor can also be used by many applications to measure vital information. For example, both SQL Server for Windows NT and SNA Server use Performance Monitor to measure statistics such as transactions per second and workstation response time.1èÃAÅ1ÿÿÿÿÿÿÿÿ ÿÿÿÿAÅÈG ňÅ' €@€ČR˜€‚ÿPerformance Monitor Data AreaóAÅ¡Ç& €ç€°˜€‚ÿPerformance Monitor is fully remoteable and can be used to measure activity on several computers simultaneously. The real-time charts can be changed dynamically to provide more or less information on the screen. Performance Monitor can be set to provide an alert when a given threshold is reached, or to execute a program when a counter goes over or under a certain user-defined value. You can also present the information as a table, for example, to present a list of alerts for a given machine.uPˆÅÈ% € €°˜€‚ÿIn this example, three different computers with six CPUs are being monitored.1¡ÇGÈ1@ÿÿÿÿÿÿÿÿ
ÿÿÿÿGÈVÉM&ȔÈ' €L€ČR˜€‚ÿPerformance Monitor Statistics AreaœGÈVÉ& €9€°˜€‚ÿThis bar shows a numerical summary of one particular object that is being measured. In this case the fourth processor (CPU3) in a machine called EBC-NCR.1”ȇÉ1uÿÿÿÿÿÿÿÿ ÿÿÿÿ‡ÉËÊI"VÉÐÉ' €D€ČR˜€‚ÿPerformance Monitor Object ListûՇÉËÊ& €«€°˜€‚ÿThe object list gives you information about each object that you are monitoring. This line shows that you are monitoring the processor time on a single CPU machine called BRETOR4 and that its plot color is red.1ÐÉüÊ1ÿÿÿÿÿÿÿÿ ÿÿÿÿüÊZÌI"ËÊEË' €D€ČR˜€‚ÿPerformance Monitor Object ListïüÊZÌ& €ß€°˜€‚ÿThis section of the object list shows that you are monitoring processor time on a four processor machine called EBC-NCR. Each processor has a different color on the chart so that you can observe the load balancing of the remote machine.1EˋÌ14ÿÿÿÿÿÿÿÿ
ÿÿÿÿ‹ÌŽÍEZÌÐÌ' €<€ČR˜€‚ÿPerformance Monitor Toolbar¾˜‹ÌŽÍ& €1€°˜€‚ÿThe toolbar is a convenient way to control Performance Monitor. You can change views, add or delete traces and insert bookmarks for future reference.FÐÌÔÍ1’ ƄæÔÍ Î Control Panel Applets7ŽÍ Î' € €˜ŒR˜€‚ÿControl Panel¹hÔÍÐQ p€Ñ€°˜€âYc€
‰€‚âzþ€
‰€âf×þ€
‰€€
€‚ÿThe Control Panel contains many useful tools for controlling different components of Windows NT. Server Manager is for monitoring who is connected to your machine and seeing which shared resources are in use. This tool is also used for setup, directory replication, and administrative alerts. Services controls Windows NT Networking services individually. Services can be started, stopped, paused, and cont ÎÐŽÍinued. For example, you can stop the messenger service if you don't want to receive messages from other users. With Devices, you can stop, start, and set the startup value for system drivers. S ÎO, &€§€°˜€€
€‚ÿThe Windows NT Boot Loader feature allows you to have more than one operating system installed on your computer. With System, you can tell Boot Loader which operating system to use as the default. That is, if you have multiple operating systems on your computer and you reboot, Boot Loader will automatically boot the default if you don't intervene. Boot Loader has a delay timer that counts down before it boots the default operating system--you set this timer with System. System is also the place where you set user environment variables, which are added to the system environment variables. Environment variables are available in each command shell. Windows NT supports multiple paging files, and you can gain a substantial improvement in performance by using this capability. You set the size and location of your paging file(s) from System.½‘Ð , &€#€°˜€€
€‚ÿThe networking architecture within Windows NT lets you support multiple simultaneous network cards and multiple simultaneous protocols in a single machine. You can have one card and multiple protocol stacks, or one protocol stack and multiple cards. Network is the tool you use to install and configure your network cards, and to install and configure network protocol stacks. This is also the tool you would use to join a work group or a domain. The process of associating a protocol stack with a network card is called "binding." In order to support multiple network cards and protocol stacks, Network supports the configuration of multiple bindings.AOM1ÃÿÿÿÿÿÿÿÿÿÿÿÿMÏ Windows NT Setup: ‡' €&€ČR˜€‚ÿWindows NT SetupH"MÏ & €E€°˜€‚ÿWindows NT system maintenance is handled through Windows NT Setup. System maintenance is a privileged operation, and requires high-level access rights for uninhibited access to the system. The Windows NT setup program is similar to the Windows 3.x setup program, with some additional options. You can still change your display, mouse, and keyboard settings, and add or delete components such as readme files and games groups. The new options allow you to add new SCSI disk and tape devices, add drivers to the system, and delete user profiles.H‡
1÷Ö€
X
*@Windows NT File ManagerAÏ X
' €4€˜ŒR˜€‚ÿWindows NT File Manager×
g 8 >€¯€°˜€⎏ÚՀ
‰€€ €‚ÿThe Windows NT File Manager has more features than the Windows 3.1 File Manager, and is similar to the one contained in Windows for Workgroups. As with Windows 3.1, the Windows NT File Manager can be used for file copying, moving, renaming, and deleting. In addition, it allows users to browse, connect, and disconnect from different types of networks. That is, you can browse Advanced Server, LAN Manager and Novell® networks simultaneously with a single tool. ·iX
*@N j€Ó€°˜€
‚€â¤E÷
€
‰€âáe’b€
‰€âÒ¯€
‰€‚ÿWorking with different file typesThe Windows NT File Manager shows the name of the file system (FAT, HPFS, CDFS, NTFS) for the current working directory. On NTFS (NT File System) partitions, you can view the long filename and the MS-DOS filename at the same time. File Manager can be used to share part or all of your disk with other users on the network. A share is created by selecting the directory to share and giving it a "share name." Shares can be protected from unauthorized access by setting permissions on the share name. You can share information on FAT (File Allocation Table), HPFS (High-Performance File System), or NTFS partitions, but note that permissions on FAT and HPFS apply only to the share name for remote network access--if a user is sitting at the source, he or she has unrestricted access to all files g *@Ï on FAT and HPFS partitions. Ig s@1é[€s@µ@mIWindows NT Print ManagerB*@µ@' €6€˜ŒR˜€‚ÿWindows NT Print Manager¥ms@ZD8 >€Û€°˜€⑈Úò€
‰€€ €‚ÿAs with Windows 3.1, Print Manager is used to install printers and modify print properties on a Windows NT network. In addition, Print Manager allows you to browse all of the printers that are physically connected to your network and, even more conveniently, browse them from the Print Setup dialog box of Windows-based applications. Apart from the new user interface, the biggest change is in the way printing is handled in an all-Windows NT environment (that is, an environment with a Windows NT print server and a Windows NT client). In this situation, the client is not required to install a printer driver for the printer device to which the client is printing--the device needs only to be installed on the print server. For example, you can print to a PostScript® printer connected to a print server, without having a PostScript driver installed on your machine.éµ@mI* "€Ó €°˜€
‚€‚ÿPrint Manager Remote FunctionsPrint Manager is fully remoteable and can be used to remotely administer print servers, printers, and print jobs on other network workstations or servers. Any Windows NT machine can be a print server. Traditionally, many LAN (Local Area Network) operating systems have used the term "queue" to represent the logical device that you print to. Windows NT uses the term "logical printer" for the logical printing device. Logical printers and physical printers can be arranged in a number of flexible combinations: one-one--one logical printer for every physical printer, one-many--one logical printer for many physical printers, and many-one--many logical printers to one physical printer. You can also define times when the printer is available. For example, a certain printer can be configured to be available only between the hours of 9:00 pm and 12:00 pm. The print spooler will accept jobs at all times, but will only print between 9:00 pm to 12:00 pm. Logical printers can have different priority levels. For example, you can set up a situation in which the print jobs of one group of users takes precedence over those of everyone else. Windows NT supports printing from parallel, serial, or network-attached printers. OZD¼I1›[€ð‚¼IJo€Account Management and DomainsH!mIJ' €B€˜ŒR˜€‚ÿAccount Management and DomainsؼIL, &€±€°˜€€
€‚ÿWindows NT servers support managing accounts by domains, a set of servers together in a logical group. Within each domain, one server is the Primary Domain Controller (PDC), which holds the master user account database. All other servers within the domain are Backup Domain Controllers (BDCs) and maintain a copy of the PDC user account database. All servers within the domain function as logon servers; but new user accounts for the domain must be added to the PDC. ÁJÉN2 2€€°˜€â{]vì€
‰€‚ÿThe domain model is effective because an enterprise can include hundreds of servers and thousands of users, and yet require only a single account in the entire domain. This is achieved by creating trust relationships between domains. Suppose an organization has two domains that trust each other, so that domain 1 trusts domain 2, and domain 2 trusts domain 1. Users in either domain could have access to resources in the other domain. However, trust relationships do not have to be bi-directional--domain 2 might trust domain 1 but conversely, domain 1 might not trust domain 2. It is left to the administrator to set up these trust relationships.štLo€& €é€°˜€‚ÿOnce the trust relationship is established, you can, for example, take the domain2\userY account and give it permissions to use objects within domain 1. This is exactly how the accounts are represented within the permissions editor, meaning that if an account belongs in aÉNo€mInother domain, you see the account name preceded by the domain name to which the account belongs.1ÉN €1dÿÿÿÿÿÿÿÿÿÿÿÿ €Ӏ3o€Ӏ/ .€
€°°˜€†"€‚ÿ=  €1i
9 [ F~‹User Manager6ӀF' €€˜ŒR˜€‚ÿUser Manager€NƂ2 2€€°˜€â£
Ú?€
‰€‚ÿTo access a Windows NT machine, you must log onto that machine with a valid user account. All user and group accounts are managed by a tool called User Manager, which can be used to add or delete user and group account information, set user account security policy (account and user rights), and modify user account properties.8Fþ‚$ €(€˜€
‚ÿConfiguring Users˜rƂ–…& €å€°˜€‚ÿThere are two ways to add new accounts to the user account database: create one from scratch; or copy (clone) an existing account. When you create a new account through User Manager, you can set the user account properties, including group membership, user profile, logon hours, account expiration date, and valid logon workstations. After setting the properties, you can set the security policy for the account (maximum/minimum password age, minimum password length, and password uniqueness). For example, you might want to specify that users must change their passwords after one month, and set password uniqueness to 4. ?þ‚Յ% €4€R˜€
‚ÿConfiguring User Rights>–…ˆ& €1€°˜€‚ÿA system administrator can use the User Manager to grant users' rights or privileges. User rights are granted for operations for which normal discretionary access control does not provide a mechanism--for example, setting the system time. It is undesirable to let anybody or everybody change the system time, so Windows NT requires that the user be granted the privilege to perform that action. Other rights include the ability to remotely shut down a Windows NT workstation or server, and the ability to log on locally to a machine.kAՅ~‹* "€ƒ€°˜€
‚€‚ÿAuditing User ActionsIf you want to audit user actions, you would do so from this interface. Auditing can be enabled for such things as successful or failed logon/logoff, file and object access, and use of user rights. Note: for very secure environments, you can halt the system when the event log is full, which is exactly what you want to do when you can't expand the event log any further. When using the User Manager for domains, you can establish trust relationships with other domains. Trust relationships are links between domains that allow one to set up pass-through authentication, in which a user has one account for the entire enterprise. This is possible in part because, like other administration tools for Windows NT, the User Manager is fully remoteable and configurable for any Windows NT workstation or server.Dˆ‹1Q €‹ÿ‹¿ÅUser Profile Editor=~‹ÿ‹' €,€˜ŒR˜€‚ÿUser Profile Editor¥m‹¤8 >€Û€°˜€â+ǹ%€
‰€€
€‚ÿThe User Profile Editor is a tool that allows you to set up and maintain environment profiles for users on a per-user basis. Environment profiles include personal groups and the program items in those groups¾screen colors, window size, and more. A user profile can be assigned to one user or a group of users. When a user logs on, the user profile is loaded and the Windows NT environment specified in that profile is loaded. There are two types of profiles, mandatory and personal. Mandatory profiles allow users to change their environments for the current session, but it does not save the changes when the user logs off. Personal profiles allow users to make changes and have their changes saved for their next logon session. The User Profile Editor can be used to create default user profiles for new user accounts and to change the default profile of the system.øÎÿ‹¨Â* "€€°˜€
‚€‚ÿCreating and Maintaining User ConfigurationsThe¤¨Â~‹ User Profile Editor allows the system administrator to centrally manage user accounts. The desktop's profile and access to application and network resources can be stored and carried with users as they move throughout the enterprise. For instance, it could be useful to establish standard desktops by department, with access to specific applications and files. Using the Profile Editor, the administrator can establish pools of standard desktops and assign them to users. In turn, these profiles can be configured to keep the user from making any changes to the desktop. This prevents unnecessary configuration maintenance and significantly reduces help desk calls.𤏿Å' €á€°˜€‚‚ÿThe User Manager is also an excellent tool for maintaining account information for users who move from one machine to another. These users can access Windows NT in a uniform manner with the same desktop and access to resources.Finally, the User Manager is an excellent way to manage a scarce number of workstations. In environments with several shifts of users, more than one user can share a single PC. The User Manager gives an administrator the ability to establish multiple desktops on the same PC--this means that user A and user B can use the same machine at different times, with desktop and security tailored to their specific needs. When user A logs off and user B logs on, the security and access to resources can be completely different.K¨Â
Æ1ˆ qˆ†‰
Æ<Æ“ÏWindows NT System Auditing2 ¿Å<Æ' €€˜ŒR˜€‚ÿAuditing z
ÆÜÈ& €õ€°˜€‚ÿThe Windows NT auditing system provides useful system, network, and user information, which administrators can use to make intelligent decisions concerning the enterprise computing environment. Audit entries can be written to the security event log whenever certain actions are performed or files are accessed. The audit entry displays the action performed, the user who performed it, and the date and time of the action. Both successful and failed attempts at actions can be audited, so the audit trail shows both those users who actually performed the actions on the network and those who tried to perform actions unsuccessfully.,<ÆÊ& €
€°˜€‚ÿThis table lists the categories of events you can audit and the events covered by each category. For each of the categories listed, you can choose whether to audit only successful actions in that category, failed attempts to perform actions, both, or neither.[ÜÈcÊH#`€&H> €€°˜€‚ÿ€€°˜€
‚ÿÿÿCategoryEvent´lÊËH#`€ØH> €€°˜€‚ÿ€&€°˜€‚ÿÿÿLogon and LogoffLogon/Logoff attempts, and the creating and breaking of network connections to servers”LcÊ«ËH#`€˜H> €€°˜€‚ÿ€2€°˜€‚ÿÿÿFile and Object AccessAccesses of a file or directory set for auditingµmË`ÌH#`€ÚH> €€°˜€‚ÿ€*€°˜€‚ÿÿÿUse of User RightsSuccessful use of user rights, and failed attempts to use rights not assigned to useré «ËIÍI#`€AH> €€°˜€‚ÿ€4€°˜€‚ÿÿÿSecurity Policy ChangesGranting or revoking of user rights to users and groups and the establishing and breaking of trust relationships with other domains׎`Ì ÎI#`€H> €€°˜€‚ÿ€>€°˜€‚ÿÿÿRestart, Shutdown and SystemShutdowns and restarts of the computer. The filling up of the audit log and the discarding of audit entries.‹CIÍ«ÎH#`€†H> €€°˜€‚ÿ€&€°˜€‚ÿÿÿProcess TrackingStarts and stops of processes on the computerÄ` ÎoÏd#˜€ÀH> €€°˜ÿ€€˜€‚ÿ€&€°˜‚ÿ€>€°˜€‚ÿÿÿUser and Group ManagementCreation, deletion and modification of user and group accounts$«Î“Ï" €€€ ÿj9oÏ 1Òð‚ÿÿÿÿ PñFrequently Asked Question about Windows NT Administration“Ï “ÏD“ÏP' €:€˜ŒR˜€‚ÿFrequently Asked QuestionsoB ¿- *€„€V°°È:€
âI
'¸‰‚ÿQ: To what extent does Windows NT integrate with IBM NetView?2ðPñB R€á€T°È:€
âJ
'¸‰‚âK
'¸‰‚âL
'¸‰‚âM
'¸‰‚ÿQ: Windows NT Advanced Server has several group administration tools that do not appear in Windows NT. How do I administrate my network from my Windows NT desktop?Q: Can I use RAS (Remote Access Services) to configure users on a remote Advanced Server?Q: Windows NT Advanced Server uses Mandatory and User Profiles. What is the difference between the two, and why would I choose to use profiles?Q: Can I limit where and when a user can log on to a Windows NT Advanced Server Domain?1¿"1°ÿÿÿÿÿÿÿÿÿÿÿÿ"¡Qñ¡. *€£€V°°‘€s€
€ƒ‚ÿA:Through the use of SNA Server, Windows NT provides comprehensive integration with NetView. SNA Server for Windows NT is designed to maximize administrative flexibility by notifying NetView of communications problems through automatic data-link alerts. Alerts can be sent to NetView from either a third party emulator or from the Windows NT Event Log. SNA Server also provides support for NetView RUNCMDs, which allows administrators to issue Windows NT commands from the NetView Console. Any command, application or Windows NT management utility can be managed from the NetView Console.1"Ò1ŒÿÿÿÿÿÿÿÿÿÿÿÿÒ- Š]¡\- *€º€V°˜‘€s€
ƒ€‚ÿA:The Windows NT Resource Guide includes several tools to address this specific problem.YÒµQ p€€T˜‘€s€
ƒ€€‚€
ƒ€€‚€
ƒ€€‚€
ƒ€€‚ÿUser Manager for Remote Computers is a graphical configuration management tool, similar to the version found on Advanced Server, which provides the ability to manage Advanced Server domains remotely.Server Manager for Remote Computers is for remote administration of replication, services, shared and open resources, etc.NetWatcher shows which users are connected to shared resources.Command Scheduler provides the ability to easily schedule commands and programs to run at a specific time and date.xI\- / .€’€T°‘€s€
ƒ€€‚ÿRemote is used to start and control command line programs remotely.1µ^ 1Wÿÿÿÿÿÿÿÿÿÿÿÿ^ „
&ø- „
. *€ñ€V°°‘€s€
€ƒ‚ÿA:Absolutely. Because RAS users are actually participating members of the network, provided a remote user has proper security, he or she can use any of the administration tools to manage the network including User Manager for Remote Computers.1^ µ
1Uÿÿÿÿÿÿÿÿÿÿÿÿµ
 @1„
æ . *€€V°˜‘€s€
€ƒ‚ÿA:Profiles are an excellent way to centralize user configurations. Each Windows NT computer records certain configuration information on a per-user basis. This information includes the saved desktop, personal program groups, network connections, shared printers, etc. When a user logs on to the domain, the appropriate profile is loaded so that the Windows NT desktop reflects that of its user. The advantage of this system is that the user can log in from any Windows NT machine and maintain the same desktop.óɵ
 @* "€“€T˜‘€s€ƒ‚ÿMandatory profiles are for organizations that require a higher degree of security or control over the user desktop. They differ from User profiles in that the desktop remains the same from one logon session to the next. Once the administrator creates a mandatory profile, it can be distributed to a number of users. The mandatory profile describes the desktop, its content, file permissions and any of a range of options set by the administrator. Conversely, the User Profile, while subject to permissions set by the administrator, can change from one logon session to the next. For example, a user may have the freedom to completely change his or her desktop, but not to delete files or shut down the system.æ  @„
1æ =@1yÿÿÿÿÿÿÿÿÿÿÿÿ=@€AC @€A. *€+€V°°‘€s€
€ƒ‚ÿA:Yes, within the User Manager for Domains, the administrator can choose to limit both the computer and specific times the user may log on. If the user exceeds the specific time set forth by the administrator they will be given a warning and then logged off automatically.Á=@AB1'ÿÿÿÿa†AB˜BŽHEvaluating Windows NT as an application serverEB("btn_topic_index");SaveMark("topic_index");CBB("btn_next_index", "PI(`nteval.hlp',`next_12')")W1€A˜B& €b€°°˜€‚ÿEvaluating Windows NT as an Application Serveru<AB
E9 @€y€˜˜˜€€
€€
€€€‚ÿAlthough the database is considered a fundamental building block in most organizations, the underlying hardware on which databases run is changing. Many medium to large businesses that have been using minicomputers or mainframes for database solutions, are turning to client-server computing and the increased processing power of servers for their database requirements. Accordingly, user-base expansion in client-server Database Management Systems (DBMS) is expected to increase by 40% per year over the next 24 months. (Source: Datamation projects: June, 1993) 빘BøF2 2€s€°˜€€€€ €‚ÿThe Microsoft® Windows NT™ operating system runs RDBMS cost-effectively and reliably, while providing maximum power and increased manageability to your client-server computing environment. In addition, Windows NT is scalable. It runs on hardware ranging from a single Intel 486 50MHz chip, to a 100MHz Digital Alpha chip, to a 16-processor Sequent or NCR server. This flexibility helps you adapt quickly to changing market conditions.–&
EŽHp ®€M€˜˜ãÿpŸ€
‰€‚ã+€dv€
‰€‚ãÊЊ›€
‰€‚ã?˜–c€
‰€‚ãøYç€
‰€‚ã ¥ ‹€
‰€‚ÿMore on Client-Server ComputingWindows NT Provides Maximum CapacityWindows NT is the Most Cost-Effective Client-Server PlatformThe Scalability of Windows NT will Protect Your InvestmentWindows NT is ReliableWindows NT is the Most Manageable Client-Server PlatformU$øFãH1݁ևãH4IàJWindows NT Provides Maximum CapacityQ*ŽH4I' €T€˜ŒR˜€‚ÿWindows NT Provides Maximum ScalabilityY&ãHJ3 4€M€°°˜€ã1쯀
‰€‚ÿWhether you are considering a workgroup project, or, like AT&T, you wish to run a large-scale application with millions of records, Windows NT can handle your data. Using the 64-bit Windows NT File System (NTFS), your organization can access up to 16 TB of disk space and 4 GB of memory.S%4IàJ. ,€J€˜˜ã҈
€
‰€‚ÿHardware Support for Windows NTm<JMK1Oa†7MK³K €Windows NT is the Most Cost-Effective Client Server Platformf?àJ³K' €~€˜ŒR˜€‚ÿWindows NT is the Most Cost-Effective Client-Server Platform·xMKjM? L€ñ€°°˜€ãóÉ»Œ€
‰€ãÕD4â€
‰€‚ÿWindows NT has both the speed and the power you need at competitive prices. It delivers the power of mini and mainframe systems, on hardware that is significantly less expensive, and easier to manage. This was the conclusion of The National League for Health Care and Chevron Canada, both of whom evaluated a number of platforms including UNIX, OS/2 and Windows NT.dzK€OO l€€˜˜€â<;K€
‰€ã7óO€
‰€‚€‚ãQÚN›€
‰€‚ÿIn audited benchmark testing, we compared Windows NT to similar platforms, running Sun Microsystem Solaris with the Sybase RDBMS, as well as Oracle running on IBM AIX. See Graph From the beginning, the significant cost advantage of Windows NT Advanced Server and SQL Server was clear. As the graph shows, the transactions per second scale as the underlying hardware is increased. Benchmark DetailsRelated Topics:Windows NT Delivers ValueQ#jM €. ,€F€˜˜ãã¾Ñ³€
‰€‚ÿThe Windows NT Cost Advantage€O €àJ8€OD€1™ÿÿÿÿÿÿÿÿ ÿÿÿÿD€Ÿ€graph 1) €m€& €€˜R˜€‚ÿ2D€Ÿ€. ,€
€°˜€†"€‚ÿY(m€ø€1×ÿÿÿÿÿÿÿÿ!ø€3وTransaction Processing Benchmark Results;Ÿ€3' €(€˜ŒR˜€‚ÿBenchmark Details¯ˆø€â‚' €€°°˜€‚ÿThe TPC-B is a standard benchmark created and maintained by the Transaction Processing Performance Council. Using this benchmark, you can compare the performance and cost of different systems. System speed is measured in transactions per second, while system cost is the total five-year cost of ownership. Dividing the system cost by the speed yields the price/performance measure ($/TPS). æ3îƒ& €Í€˜˜€‚ÿThe following TPC-B benchmarks represent audited results of the five-year costs to run Microsoft SQL Server for Windows NT on two different Compaq ProLiant systems: a dual Pentium™ processor system, and a single-CPU 486 system.æGâ‚ԄŸ#Ž!ë Ú • €€ŽŽ˜ÿ$€€ŽŽ˜€‚ÿ€€ŽŽ˜ÿ€€ ŽŽ˜‚ÿ€V€ ŽŽ˜‚ÿ€~€ ŽŽ˜‚ÿÿÿSystemTransactions per Second (TPS)Total System Cost$/TPSÛE…–#ü€Š!ë Ú • €€ ŽŽ˜@ÿ€€ŽŽ˜€‚ÿ€X€ŽŽ˜ÿ€Z€ŽŽ˜€‚ÿ€j€ŽŽ˜‚ÿ€|€ŽŽ˜€‚ÿÿÿWindows NT on a Compaq ProLiant, 486/50*93.84$52,828$563ßLԄކ“#ö€˜!ë Ú • €€ŽŽ˜ÿ€€ŽŽ˜€‚ÿ€d€ŽŽ˜ÿ€f€ŽŽ˜€‚ÿ€x€ŽŽ˜‚ÿ€Š€ŽŽ˜€‚ÿÿÿWindows NT on a Compaq ProLiant, dual Pentium*226.32$99,780$441ßL¯…m‡“#ö€˜!ë Ú • €€ŽŽ˜ÿ€€ŽŽ˜€‚ÿ€^€ŽŽ˜ÿ€`€ŽŽ˜€‚ÿ€r€ŽŽ˜‚ÿ€†€ŽŽ˜€‚ÿÿÿUNIX (SunOS) on a SPARC™ server 690MP c/s**134.90$372,832$2,764Ò?ކ?ˆ“#ö€~!ë Ú • €€ŽŽ˜ÿ€€ŽŽ˜€‚ÿ€D€ŽŽ˜ÿ€F€ŽŽ˜€‚ÿ€X€ŽŽ˜‚ÿ€l€ŽŽ˜€‚ÿÿÿUNIX (AIX) on a RS/6000/970***110.32$307,639$2,789šJm‡وP p€”€˜°ž‰Ña©ñ9ÉY¡é1y€€€€€‚ÿ* Microsoft SQL Server, ** SYBASE® SQL Server, *** INFORMIX® OnLineJ?ˆ#‰1Xև˜"#‰f‰ŽWindows NT Delivers ValueCوf‰' €8€˜ŒR˜€‚ÿWindows NT Delivers Value­†#‰‹' €
€°˜˜€‚ÿWhen you purchase an application server product what is included in the purchase price? Are you able to link all of your MS-DOS, Windows, Macintosh and remote dial-in clients? Are there built-in fault-tolerance and back-up features or must you purchase those separately? Finally, does the cost of the shrink-wrapped package include the ability to grow or change with your business needs?N(f‰a‹& €P€˜˜˜€‚ÿWindows NT offers you these features:Pò‹±^ Š€å€R˜ñ€„ð9€
€ƒ€
€‚€
€ƒ€
€‚€
€ƒ€
€ãžz€
‰€‚ÿ·Unlimited Client Support: At $2,995, Windows NT Advanced Server includes unlimited client licensing, with no additional software components to acquire or license fees incurred.·Built-in Advanced Fault Tolerance: With Windows NT you get every major fault tolerance technology right out of the box.·Integration with Macintosh Clients: Windows NT Advanced Server allows Macintosh users to connect with no interruption or changes to their environment. More on Macintosh Support Ü¥a‹Ž7 <€K€V˜°ñ€„ð9€
€ƒ€
€‚ÿ·Excellent Connectivity and Interoperability: Windows NT is protocol independent, and includes TCP/IP, NETBEUI, AppleTalk, DLC, and IPX in the purchase price.V%±ãŽ1Ø7ƒ#ãŽ*“ÇApplication Server - Cost ComparisonsG Ž*' €@€°ŒR˜€‚ÿThe Windows NT Cost Advantage(ãŽR% €€°˜€‚ÿæh*DÀ~#̀Ðþ¶„‡Ž€€°˜€‚ÿ€€°˜‚ÿ€V€°˜‚ÿ€v€°˜‚ÿ€¨€°˜‚ÿÿÿSolutionAdvanced Server and SQL ServerOS/2 RDÀŽand DB2/2NetWare 4.01 and SybaseSolaris and SybaseëPR/Á›# þ¶„‡Ž€€°˜ÿ€€°˜€‚ÿ€<€°˜ÿ€>€°˜‚ÿ€V€°˜‚ÿ€n€°˜‚ÿ€ˆ€°˜‚ÿÿÿLAN Operating System Cost$2,995.00 $2,544.00 $12,495.00 $5,995.00 .wDÀ]·#>îþ¶„‡Ž€€°˜ÿ€€°˜€‚ÿ€†€°˜ÿ€ˆ€°˜‚ÿ€–€°˜ÿ€˜€°˜‚ÿ€¶€°˜‚ÿ€Ô€°˜ÿ€Ö€°˜‚‚ÿÿÿSoftware Cost Of Adding Additional Hardware Processor To Server$0.00Not SupportedNot Supported$3,750.00óX/ÁPÛ#°þ¶„‡Ž€€°˜ÿ€€°˜€‚ÿ€H€°˜ÿ€J€°˜‚ÿ€d€°˜‚ÿ€|€°˜‚ÿ€–€°˜‚ÿÿÿDBMS Server (Unlimited license)$14,995.00 $2,495.00 $17,995.00 $52,100.00 åJ]Â5Ä›#”þ¶„‡Ž€€°˜ÿ€€°˜€‚ÿ€F€°˜ÿ€H€°˜‚ÿ€X€°˜‚ÿ€l€°˜‚ÿ€€€°˜‚ÿÿÿPer Client Cost(if applicable)$0.00 $150.00 $200.00 $218.00 ßEPÃÅš#Šþ¶„‡Ž€€°˜ÿ€€°˜€‚ÿ€*€°˜ÿ€,€°˜‚ÿ€<€°˜‚ÿ€V€°˜‚ÿ€p€°˜‚ÿÿÿTotal Client Cost$0.00 $37,500.00 $50,000.00 $54,500.00 ìR5ÄÆš#¤þ¶„‡Ž€€°˜ÿ€€°˜€‚ÿ€8€°˜ÿ€:€°˜‚ÿ€T€°˜‚ÿ€n€°˜‚ÿ€ˆ€°˜‚ÿÿÿTotal Cost for 250 Users$17,990.00 $42,539.00 $80,490.00 $112,595.00 ’LÅ’ÆF \€˜€2˜‘€Èž‰Ña©ñ9ÉY¡é1y€‚ÿPricing on Microsoft products comes from Latest Microsoft Pricing sheet; ¹Æ“ÇH ^€s€0‘€Èž‰Ña©ñ9ÉY¡é1y€‚‚‚ÿPricing on IBM comes from Computerland;Pricing on NetWare comes from "The LocalNetter Newsletter" June, 1993; Pricing on Sun comes from DataPro Report on SunSoft Inc. Solaris, 1993k:’ÆþÇ1j˜»‡$þÇbÈ›ÍThe Scalability of Windows NT will Protect Your Investmentd=“ÇbÈ' €z€˜ŒR˜€‚ÿThe Scalability of Windows NT will Protect Your Investment¡zþÇÊ' €õ€°°˜€‚ÿWindows NT has the ability to deliver maximum power at significantly lower costs than other operating systems. An example is its compatibility with symmetric multiprocessing (SMP) machines. The idea behind SMP is that two or more equivalent processors on one machine will deliver better price/performance than a single processor machine with twice the rated processing power.™abÈœÌ8 >€Ã€°˜€ãÕD4â€
‰€€€‚ÿBecause Windows NT is able to schedule system and application threads over multiple processors, applications such as RDBMS run very well with it. With an SMP system, you can significantly increase the performance of your servers for much less than the cost of adding machines. An SMP system reduces administration, because there are fewer servers to manage. With Windows NT, you can purchase as much processing power as you need now, while ensuring a smooth migration path for the future. Companies such as Chevron Canada, Nordstrom, 3M, and NASA are already developing solutions using this strategy.7ÊÓÌ% €$€°˜€‚ÿRelated Topics:ȌœÌ›Í< F€€˜˜ããk2€
‰€‚ã6·É~€
‰€‚ÿSMP is More Viable Under Windows NT Than Under Other SystemsWindows NT Does Not Force Your Organization To Take Unnecessary Risksg6ÓÌÎ13
ƒ³%ÎhÎäSMP is More Viable Under Windows NT Than Other Systemsf?›ÍhÎ' €~€˜ŒR˜€‚ÿSMP is More Viable Under Windows NT Than Under Other SystemsLÎ 3 4€™€°˜˜€ãèE€
‰€‚ÿSMP support is not unique to Windows NT. In fact, several versions of UNIX currently support SMP. The difference in the way SMP extensions are implemented with the two systems depends on whether the hardware and applications need to be modified in order to take advantage of multiprocessors. More Technical Information on SMPhÎ ›ÍJ hÎV? L€€°˜€âÃÙE€
‰€‚â=;K€
‰€‚ÿWith Windows NT Advanced Server, any multithreaded application can be distributed over multiple processors. Applications written to Solaris 2 or HP UX, however, must be written specifically to those systems, and are not portable across UNIX versions. Additionally, the threading itself is less reliable and robust under Solaris than Windows NT. UNIX graphic systems, such as X Windows and Motif, do not support multiple threads, nor are they thread-safe.Another limitation with UNIX in terms of SMP is cost. In most cases, there are no hardware substitutes for machines that run systems such as Solaris 2 or HP UX, which means that you must accept the market limitations of having only a single hardware provider. Windows NT, however, supports hardware from many competitors. See graph Similarly, because Windows NT supports a broad range of multithreaded applications and can run on a wider array of hardware, software vendors are more likely to apply resources to Windows NT because their potential market is much larger.ŽS ä; F€¦€˜˜ã¡ß*%€
‰€‚ãrƒ€
‰€ ‚ÿHow Windows NT Architecture Supports SMPSupported Windows NT SMP Systems< V 1ÿÿÿÿÿÿÿÿ&ÿÿÿÿ õthread safe4äT& €€˜R˜€‚ÿthread safe¡| õ% €ø€°˜€‚ÿa method that the system employs to ensure system integrity when code segments are used by multiple threads of execution 8T-1|ÿÿÿÿÿÿÿÿ'ÿÿÿÿ-qgraph 2)õV& €€˜R˜€‚ÿ2-ˆ. ,€
€°˜€†"€‚ÿéÃVq& €‡€°˜€‚ÿThis graph shows the projected growth for specialized network servers in existing NetWare environments. Currently, Windows NT comes pre-installed on all of these SMP servers except Sun and HP.vEˆç1{»‡:€(çV  Windows NT Does not Force Your Organization to Take Unnecessary RisksoHqV' €€˜Œ:˜€‚ÿWindows NT Does Not Force Your Organization to Take Unnecessary RisksÔ¡ç*
3 4€C€°°˜€â(·¾n€
‰€‚ÿBecause of its portable design, Windows NT Advanced Server is able to run not only on Intel processor machines, but also on those supporting RISC, such as the MIPS R4000 and R4400, the Intergraph Clipper, and the new Digital Alpha chip. This is important because with new technologies from Digital, Intel, IBM and MIPS, it is not clear which chip architecture will deliver the best price performance. See TablevPV  & €¡€°˜€‚ÿWhether your choice is Intel, Alpha, MIPS, or another chip architecture, however, Windows NT will provide consistent functionality and access to applications. Unlike UNIX and OS/2, hardware decisions with Windows NT do not limit access to applications, leaving you free to choose the best hardware and software for your organization.^-*
þ 1ÿÿÿÿÿÿÿÿ)ÿÿÿÿþ œ@What is the most Effective Chip Architecture?Y5  W $ €j€°€
‚ÿWhat is the Most Cost-Effective Chip Architecture?jþ Z
™#Ô”£ Ê — ‹ €€ ˜R€‚ÿ€€ ˜Rÿ€€ ˜R‚ÿ€>€ ˜R‚ÿ€ˆ€ ˜R‚ÿ€¬€ ˜R‚ÿÿÿChipDEC Alpha 21064A-225Integrated Device Technology R 4600IBM Power PC 603Intel Pentium P54CÅ3W ’#ô€f”£ Ê — ‹ €€ ˜RÝÿ€€ ˜R€‚ÿ€€ ˜R€‚ÿ€2€ ˜R‚ÿ€D€ ˜R‚ÿ€T€ ˜R‚ÿÿÿClock Speed225 MHz100 MHz66 MHz100 MHzžZ
½#Ҁ:”£ Ê — ‹ €€ ˜R€‚ÿ€€ ˜R€‚ÿ€"€ ˜R‚ÿ€*€ ˜R‚ÿ€2€ ˜R‚ÿÿÿSPECfp92205607085¯.l#Ҁ\”£ Ê — ‹ €€ ˜R€‚ÿ€€ ˜R€‚ÿ€,€ ˜R‚ÿ€<€ ˜R‚ÿ€L€ ˜R‚ÿÿÿSystem DueQ4 '94Q2 '92Q4 '94Q2 '94¤#½@#ҀF”£ Ê — ‹ €€ ˜R€‚ÿ€€ ˜R€‚ÿ€€ ˜R‚ÿ€*€ ˜R‚ÿ€8€ ˜R‚ÿÿÿPrice$877$240l@  $300*$900*€:lœ@F \€t€°°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿSource: PC Week * Estimates: Actual Price not yet setG@ã@1_³Mƒ*ã@#AQEWindows NT is Reliable@œ@#A' €2€˜ŒR˜€‚ÿWindows NT is Reliable¡nã@ÄB3 4€Ý€°˜˜€ãꟀ
‰€‚ÿApplication Servers must be reliable--there is no compromise when vital company information is at stake. When the National Fuel Gas Supply Corporation became concerned about the long term reliability of its OS/2 system, Windows NT provided a solution. Windows NT is designed to preserve data integrity, and includes these critical operating system components:W##AC4 8€F€Pñ€„ð9€€ƒ€
€‚ÿ·Complete hardware isolationå¡ÄBDD V€C€R˜ñ€„ð9€€ƒ€
€‚€€ƒ€
€‚ÿ·Memory isolation: at no time do 32-bit applications share memory with themselves or the operating system·Full government-standard C2-level security¸jC¸DN l€Ô€V˜°ñ€„ð9€€ƒ€
€âjšÛM€
‰€âÎ_
€€
‰€‚ÿ·Built-in support for disk mirroring, duplexing, disk striping with parity, and UPS support™^DQE; F€¼€˜˜ãøµìŽ€
‰€‚ãw¹ÝR€
‰€‚ÿMore on Windows NT System ReliabilityHow SQL Server Uses Windows NT Thread Securityi8¸DºE1b:€k†+ºEFMIWindows NT is the Most Manageable Client-Server Platformb;QEF' €v€˜ŒR˜€‚ÿWindows NT is the Most Manageable Client-Server PlatformLºE›H3 4€™€°°˜€â>;K€
‰€‚ÿRecently, a Gartner Group study revealed the disproportionate costs of administration and training in delivering a solution to users. See Graph Windows NT is designed to facilitate system administration, providing one of the most comprehensive set of management facilities ever offered in an operating system. Graphical tools help administrators to centrally configure systems and users quickly and easily, and every management tool provided with Windows NT is fully remoteable across the enterprise, thus maximizing the talents and costs of administrators and help desk personnel.²wFMI; F€î€˜˜ãDæR"€
‰€ ‚ãþÿWH€
‰€‚ÿWhat Makes Windows NT the Most Manageable Platform?Why Applications Are More Easily Managed Under Windows NT8›H…I1ðÿÿÿÿÿÿÿÿ,ÿÿÿÿ…I=Jgraph 3)MI®I& €€˜R˜€‚ÿ2…IàI. ,€
€°˜€†"€‚ÿ]®I=JE Z€0€°3ž‰Ña©ñ9ÉY¡é1y€‚ÿSource: Gartner Groupd3àI¡J1÷Mƒ,Š-¡JþJÄNWhat Makes Windows NT the Most Manageable Platform?]6=JþJ' €l€˜ŒR˜€‚ÿWhat Makes Windows NT the Most Manageable Platform?c0¡JaN3 4€a€°°˜€â"ÀbS€
‰€‚ÿWindows NT is easily managed from anywhere in the enterprise. It includes comprehensive graphical utilities to make this an intuitive process. The Performance Monitor is an excellent example. You can use this graphical tool to observe and record any significant measurable event or condition that exists within the Windows NT system. Because any management tool within the Windows NT system can examine both local and remote systems simultaneously, it is possible to track system performance of an entire enterprise. The resulting information logs are useful for capacity planning and hardware forecasting. Additionally, because management is inherent in the Win32 programming interface, any application can use these existing tools--there is no need to rewrite the same functions into the application itself.c5þJÄN. ,€j€°˜ãïð[ñ€
‰€‚ÿMore Information on Managing Windows NT SystemsOaNO1Èÿÿÿÿÿÿÿÿ.ÿÿÿÿOŒOWindows NT Performance MonitorG!ÄNZO& €B€˜R˜€‚ÿWindows NT Performance Monitor2OŒO. ,€
€°˜€†"€‚ÿj9ZO €1k†ÿÿÿÿ/ €o€F†Why Applications are More Easily Managed Under Windows NTŒO €ŒOc<ŒOo€' €x€˜ŒR˜€‚ÿWhy Applications Are More Easily Managed Under Windows NTuB €ä‚3 4€…€°˜˜€ãÂQ€
‰€‚ÿWhile it is imperative that the operating system provide comprehensive management facilities, it is equally important for the actual applications, such as RDBMS, to have intuitive and powerful tools. Because management is integrated into the Windows 32 programming interface, any application can use these tools. For instance, SQL Server for Windows NT uses both the Performance Monitor and Event Viewer to communicate valuable information to administrators. More On SQL Server The benefit of providing management functions in the Win32 programming interface is two-fold.é½o€̓, &€{€Pñ€„ð9€ƒ‚ÿ1.Administrators do not need to learn many different tools for each application, virtually eliminating the need to reconcile differences or limitations from one application to another. pä‚j„- *€à€V˜˜ñ€„ð9€ƒ‚ÿ2.Applications vendors will be less likely to re-invent management tools when efficient tools already exist.…^̓ï…' €½€˜˜€‚‚ÿIn either case, the consumer is the ultimate beneficiary.Windows NT provides a wide variety of services which can be accessed using any of a number of intuitive graphical tools. Every management tool, from the Registry Editor to the Performance Monitor, can be accessed directly by applications and all are fully remoteable across the enterprise.W)j„F†. ,€R€°˜ãcA€
‰€ ‚ÿMore on Windows NT Management Tools1ï…w†1Yÿÿÿÿÿÿÿÿ0ÿÿÿÿw†Ÿ†(F†Ÿ†% €€°˜€‚ÿªyw†I‡1·ÿÿÿÿÿÿÿÿ1I‡‡ˆWindows NT ArchitectureEB("btn_topic_index");SaveMark("topic_index");CBB("btn_next_index", "PI(`nteval.hlp',`next_16')")DŸ†‡) "€6€˜˜˜€€‚ÿWindows NT Architecture2I‡¿‡. ,€.€°˜€†"€&‚ÿT'‡ˆ- *€N€˜ã%Ü-ú€
‰€‚ÿComplete architecture description\+¿‡oˆ1-ÿÿÿÿÿÿÿÿ2oˆ¸ˆ´‹More About Architecture - Inside Windows NTI%ˆ¸ˆ$ €J€°€‚ÿInside the Windows NT ArchitectureþÌoˆ¶‰2 2€™€˜˜€€€€ €‚ÿThe Microsoft® Windows NT™ operating system uses sophisticated techniques, such as a microkernel architecture, structured exception handling, an internationalization model, and memory-mapped files."û¸ˆ؊' €÷€°°˜€‚ÿThe internationalization model provides an efficient way for developers to create multilingual applications. Structured exception handling is generally accepted to be one of the most effective and intuitive methods of dealing with error conditions.܈¶‰´‹T v€€˜˜€‚ã‡`h€
‰‚ã<³¥‹‰€‚ã8Yá3€
‰€‚ã0
#À
‰€‚ÿFor Additional Information:Windows NT ConceptsWindows NT StructureInternationalizationStructured Exception Handling_.؊Œ1yÿÿÿÿŸ
3ŒQŒ™More About Architecture - Windows NT Structure>´‹QŒ' €.€˜ŒR˜€‚ÿWindows NT Structure’;ŒãW |€w€°°˜€â¶ÃnL€
‰€ã•CHŀ
‰€âÄÕª€
‰€âêKÀ·€
‰€‚ÿWindows NT has two modes of execution: the user mode (the Windows NT protected subsystems) and the kernel mode (the Windows NT Executive). The user mode servers give the Windows NT Executive its user and programming interfaces and provide execution environments for various types of applications.3QŒ, &€€°˜€€ €‚ÿWith minor exceptions, Windows NT does not appear to be a unique new operating system from a user's point of view. It looks like the Windows™ operating system and runs Windows-based programs. Underneath its user interface, however, it is radically different.ƒD㍙? N€ˆ€˜˜€‚ã¤0€
‰€‚ãÒHr(€
‰€‚ÿFor Additional Information:Logon SessionNative Servicesi8À1i«‚4À[À“ÃMore About Architecture - System Overview - Introducti™À™onM&™[À' €L€˜ŒR˜€‚ÿIntroduction to Windows NT Concepts<À—Â9 @€€°°˜€€€€€€€‚ÿAn operating system model is a broad framework that unifies the many features and services the system provides, and the tasks it performs. Windows NT uses a client-server model to provide multiple operating system environments (initially, Windows, MS-DOS®, OS/2®, and POSIX), and it uses an object model to uniformly manage operating system resources and dispense them to users. A third model, symmetric multiprocessing (SMP), allows Windows NT to achieve maximum performance from multiprocessor computers.C[ÀÚÂ% €<€°˜€‚ÿFor Additional Information:¹d—“ÃU z€È€˜˜ãЬÉ€
‰€‚ãV˜û€
‰€‚ãrÐ̅€
‰€‚ã¡ß*%€
‰€‚ÿThe Client-Server ModelWindows NT ApproachObject ModelSymmetric MultiprocessingU$ÚÂèÃ1QŸ
l‡5èÃ-ÄMÉMore About Architecture - MonolithicE“Ã-Ä' €<€˜ŒR˜€‚ÿMonolithic Operating SystemîèÃBÆ' €Ý€°°˜€‚ÿOne structure, particularly common in smaller operating systems such as MS-DOS, organizes the operating system as a set of procedures and allows any procedure to call any other. This monolithic structure does not enforce data hiding in the operating system, and it embeds assumptions about how the system fits together throughout the operating system code. Extending such a system can be difficult, because modifying a procedure can introduce bugs in seemingly unrelated parts of the system.6-ÄxÆ1 2€ €°˜€†"€€‚ÿÕ¯BÆMÉ& €_€°˜€‚ÿIn all but the simplest monolithic operating systems, applications are separated from the operating system itself. That is, the operating system code runs in a privileged processor mode (referred to here as kernel mode), with access to system data and to the hardware; applications run in a non-privileged processor mode (called user mode), with a limited set of interfaces available and with limited access to system data. When a user-mode program calls a system service, the processor traps the call and then switches the calling thread to kernel mode. When the system service completes, the operating system switches the thread back to user mode and allows the caller to continue. R!xÆŸÉ1+«‚ûŠ6ŸÉáÉÛÍMore About Architecture - LayeredBMÉáÉ' €6€˜ŒR˜€‚ÿLayered Operating System‘^ŸÉrË3 4€½€°˜˜€€€€€‚ÿA layered operating system is divided into modules that are layered on top of each other. Each module provides a set of functions that other modules can call. Code in any particular layer calls code only in lower layers. On some systems, such as VAX® or VMS®, hardware even enforces the layering (using multiple, hierarchical processor modes).2áɤË. ,€
€°˜€†"€‚ÿ7rËÛÍ& €#€°˜€‚ÿOne advantage of a layered operating system structure is that each layer of code is only given access to the lower level interfaces (and data structures) that it requires, thus reducing the amount of code that has unlimited power. This structure also allows the operating system to be debugged starting at the lowest layer, adding one layer at a time until the whole system works correctly. Layering makes it easier to enhance the operating system; one entire layer can be replaced without affecting other parts of the system.X'¤Ë3Î1šl‡73Î{ΛMore About Architecture - Client ServerH!ÛÍ{Î' €B€˜ŒR˜€‚ÿClient-Server Operating Systemá3΃Ï' €Ã€°˜˜€‚ÿA client-server operating system is made up of several processes, each of which implements a single set of services. Each process can supply or demand services from other processes by making requests through the Executive.C{ÎÆÏ% €<€°˜€‚ÿFor Additional Information:ÉtƒÏ›U z€è€˜˜âÒüä€
‰€ ‚ã#+5§€
‰€‚ÆÏ›ÛÍã„M?¯€
‰€‚ãã%Y?€
‰€‚ÿView GraphicAn Example of Client-Server Architecture ModelThe Monolithic ModelThe Layered Model1ÆÏÌ1cÿÿÿÿÿÿÿÿ8ÿÿÿÿÌþ2›þ. ,€
€°˜€†"€ ‚ÿd3Ìb1ûŠt9b¿”An Example of the Client Server Architectural Model]6þ¿' €l€˜°R˜€‚ÿAn Example of the Client-Server Architectural Model=æbüW |€Í€°°˜€â~¦“€
‰€â6 Õ€
‰€â­"öú€
‰€âÄÕª€
‰€‚ÿEach server runs in user mode, executing a loop that checks whether a client has requested one of its services. The client, which can be either another operating system component or an application program, requests a service by sending a message to the server. An operating system kernel (or microkernel) running in kernel mode delivers the message to the server; the server performs the operation; and the kernel returns the results to the client in another message.ç¿2 2€Ï€°˜€â¶ÃnL€
‰€‚ÿThe client-server approach results in an operating system whose components are small and self-contained. Because each server runs in a separate user mode process, a single server can fail (and perhaps be restarted) without crashing or corrupting the rest of the operating system. Furthermore, different servers can run on different processors in a multiprocessor computer or even on different computers, making the operating system suitable for distributed computing environments.?
üT2 2€€°˜€â¸7€
‰€‚ÿThis theoretical model is an idealized depiction of a client-server system in which the kernel acts as a message-passing facility. In reality, client-server systems fall within a spectrum, some doing very little work in kernel mode and others doing more. Example@”. ,€$€˜˜âÒüä€
‰€ ‚ÿView Graphic8TÌ1Òÿÿÿÿÿÿÿÿ:ÿÿÿÿÌf Example1
”ý' €€ČR˜€‚ÿExampleiCÌf & €‡€°˜€‚ÿThe Mach operating system, a contemporary example of the client-server architecture, implements a minimal kernel offering thread scheduling, message passing, virtual memory, and device drivers. Everything else, including various application programming interfaces (APIs), file systems, and networking, runs in user mode.^-ýÄ 1¢
€;Ä 
bBMore About Architecture - Windows NT Approach=f 
' €,€˜ŒR˜€‚ÿWindows NT Approach äÄ  ' €É€°˜˜€‚ÿWindows NT uses concepts from both the layered model and the client-server model. The kernel-mode part of Windows NT is called the Windows NT Executive, which is a series of components that implements all of these functions: 9Ä
E u ¸€‰€T˜9s„´9€€ƒâ:eÈê€
‰€‚€€ƒâjýJπ
‰€‚€€ƒâОF¨€
‰€‚€€ƒ‚€€ƒ‚ÿ·Virtual memory management·Object (resource) management·I/O and file systems (including network drivers)·Interprocess communication·Portions of the security system2 w . ,€
€˜˜€†"€
‚ÿä¾E [
& €}€°˜€‚ÿGenerally, these components interact with one another in a modular, rather than a layered, fashion. Each component calls the others through a set of carefully specified internal routines.¢dw ý> J€É€˜˜€â­"öú€
‰€â°!7€
‰€‚ÿThe layered operating system model is used in the Windows NT Executive I/O system and in the lowest parts of the Windows NT Executive: the kernel and the hardware abstraction layer (HAL). All other parts of the Windows NT Executive are layered on these two components. The Windows NT kernel performs low-level operating system functions such as:¢b[
Ÿ@ P€Ä€T˜9s„´9€€
ƒ‚€€
ƒ‚€€
ƒ‚ÿ·Thread scheduling·Interrupt and exception dispatching·Multiprocessor synchronization·ýbB' €!€°˜€‚‚ÿIt also provides a set of routines and basic objects thatŸbBf  the rest of the Executive uses to implement higher-level constructs. The HAL manipulates hardware directly.Windows NT uses the client-server model primarily to provide APIs and the facilities associated with an operating system environment. Although the Win32 protected subsystem (server) provides the user interface and is fundamental to the system's operation, the other servers "plug into" the Executive and can be loaded at will, with several in operation at a time. The servers communicate with application processes through a message-passing facility provided in the Windows NT Executive.W&Ÿ¹B1t <¹BïBÔHMore About Architecture - Object Model6bBïB' €€˜ŒR˜€‚ÿObject Model‚[¹BqD' €·€°°˜€‚ÿIt is difficult to identify a single "main program" that drives an operating system. Therefore, instead of attempting to design from the top down, object-oriented methods focus initially on the data that the software must manipulate to do its job. For an operating system, this means system resources like files, processes and blocks of memory.ßïBG? L€¿€°˜€‚âÊ¢òo€
‰€â¹7€
‰€‚ÿThe primary goal of designing a system around data is to create software that is easy to maintain. Because around 70 percent of software cost is attributable to maintenance, dramatic savings can be made if this goal is achieved.One way in which object-oriented software helps maintenance is by hiding the physical representation of data within objects. Although not strictly an object-oriented system, Windows NT uses objects to represent system resources. Any system resource that can be shared by more than one process, including files, shared memory, and physical devices, is implemented as an object and manipulated by using object services. This lessens the impact of potential changes in the system over time. Example£~qD2H% €ü€˜˜€‚ÿIn addition to limiting the effects of change, building an operating system based on objects has some distinct advantages: ¢>GÔHd ˜€|€T˜9s„´9€€ƒâՃºÝ€
‰€‚€€ƒâèÙV€
‰€‚€€ƒâÙª²€
‰€‚ÿ·Uniformity·Security·Resource Sharing82H I1ÿÿÿÿÿÿÿÿ=ÿÿÿÿ IìJExample1
ÔH=I' €€ČR˜€‚ÿExample¯‰ IìJ& €€°˜€‚ÿIf a hardware change forces a change in the operating system, the only elements that must change are the object that represents the hardware resource, and the services that operate on the object; code that merely uses the object remains the same. Likewise, when the system needs to support new resources, a new object is created and added to the system without disturbing the existing code.U$=IAK1õÿÿÿÿÿÿÿÿ>ÿÿÿÿAKáLMore About Architecture - Uniformity4
ìJuK' €€ČR˜€‚ÿUniformitylFAKáL& €€°˜€‚ÿWhen the operating system accesses and manipulates its resources uniformly, it creates, deletes, and refers to an event object in the same way it does a process object: by using object handles. Additionally, because each resource is an object, the system tracks resource usage by monitoring the creation and use of objects.S"uK4M1¿ÿÿÿÿÿÿÿÿ?ÿÿÿÿ4M NMore About Architecture - Security2 áLfM' €€ČR˜€‚ÿSecurity:4M N& €)€°˜€‚ÿSecurity is simplified because all objects are protected in the same way. When someone tries to access an object, the security system intervenes and validates the operation, regardless of whether the object is a process, a section of shared memory, or a communication port.[*fMûN1öÿÿÿÿÿÿÿÿ@ÿÿÿÿûNoMore About Architecture - Resource Sharing: N5O' €&€ČR˜€‚ÿResource SharingjûNÄO% €Ô€˜˜€‚ÿObjects provide a convenient and uniform paradigm for sharing resources between two or more processes. ŸV5OoI `€­€T˜9s„´9€€ƒ‚€€ƒ‚€€ÄOo Nƒ‚€€ƒ‚ÿ·Object handles are used to manipulate all types of objects. ·Two processes share an object when they each open a handle to it. ·The operating system can track how many handles are open to an object to determine whether the object is still in use. ·The operating system can then delete the object when it is no longer in use.d3ÄOӁ1B€ˆ AӁ‚'…More About Architecture - Symmetric MultiprocessingCo‚' €8€˜ŒR˜€‚ÿSymmetric MultiprocessingžkӁ´ƒ3 4€×€°°˜€â¥ZÒ€
‰€‚ÿMultitasking is a way of running multiple tasks on a single processor. However, when a computer has more than one processor, the multitasking model must be upgraded to a multiprocessing model. A computer that has two processors can execute two threads simultaneously. In theory, the threads would finish executing twice as quickly as on a single processor.W2‚ „% €d€°˜€‚ÿThere are two types of multiprocessing systems:Y+´ƒd„. ,€V€˜˜€
ãÌâ
#‰€‚ÿ1. Asymmetric Multiprocessing (ASMP)W) „»„. ,€R€°˜€
㚉4>‰€‚ÿ2. Symmetric Multiprocessing (SMP)l=d„'…/ .€z€˜˜˜âjê €
‰€‚ÿComparison of Symmetric and Asymmetric Multiprocessing.R!»„y…1äÿÿÿÿÿÿÿÿBÿÿÿÿy… †More About Architecture - Graphic`9'…م' €r€ĘR˜€‚ÿComparison of Symmetric and Asymmetric Multiprocessing2y… †. ,€
€°˜€†"€ ‚ÿOمZ†1 @ CZ†¥†ŽŠMore About Architecture - ASMPK$ †¥†' €H€˜ŒR˜€‚ÿAsymmetric Multiprocessing (ASMP)–oZ†;Š' €ß€°°˜€‚ÿASMP operating systems typically select the same processor to execute operating system code while other processors run only user jobs. Because operating system code runs on a single processor, ASMP operating systems are relatively easy to create by extending existing single-processor operating systems. ASMP operating systems are especially well suited to running on asymmetric hardware, such as a processor with an attached coprocessor or two processors that don't share all available memory. However, it is difficult to make ASMP operating systems portable. Hardware from different vendors (and even different versions of hardware from the same vendor) tends to vary in its type and degree of asymmetry. Either the hardware vendors must target their hardware for specific operating systems or the operating system must be substantially rewritten for each hardware platform.S%¥†ŽŠ. ,€J€˜˜ãš‰4>€
‰€‚ÿSymmetric Multiprocessing (SMP)N;Š܊1^ˆ îƒ D܊%‹³ÁMore About Architecture - SMPI"ŽŠ%‹' €D€˜ŒR˜€‚ÿSymmetric Multiprocessing (SMP)À™܊åŽ' €3€°°˜€‚ÿSMP systems, including Windows NT, allow the operating system to run on any free processor or on all processors simultaneously, sharing memory among them. This approach better exploits the power of multiple processors, because the operating system itself can use a significant percentage of a computer's processing time, depending on the applications it is running. Executing the operating system on only one processor can tax that processor, leave others idle, and decrease the system's throughput. As the number of processors on the system increases, operating system activities are more likely to become a bottleneck. In addition to balancing the system load, SMP systems reduce downtime because operating system code can execute on other processors if one processor fails. Finally, because symmetric hardware is implemented similarly from vendor to vendor, it is possible to create a portable SMP operating system.öÏ%‹çÀ' €Ÿ€°˜€‚‚ÿUnlike ASMP systems, SMP systems are usually designed and written from the ground up because they must adhere to strict coding guidelines to ensure correct operation. Resource contention and other performance issues are more complicated in mulåŽçÀŽŠtiprocessing systems than in ordinary operating systems and must be accounted for in the system's design.Windows NT incorporates several features that are crucial to its success as a multiprocessing operating system:Ìw厳ÁU z€î€˜˜â¹’€
‰€‚âb/. €
‰€‚â %À
‰€‚ãÌâ

‰€‚ÿPreemptive Multitasking MultithreadingInterprocess CommunicationsAsymmetric Multiprocessing (ASMP)c2çÀÂ1ÿÿÿÿÿÿÿÿEÿÿÿÿÂÈÃMore About Architecture - Pre-emptive MultitaskingA³ÁWÂ' €4€ČR˜€‚ÿPreemptive MultitaskingqLÂÈÃ% €™€˜€‚ÿThis is the ability to run operating system code on any available processor and on multiple processors at one time. With the exception of its kernel component, which handles thread scheduling and interrupts, all operating system code can be preempted (forced to give up a processor) when a higher-priority thread needs attention.Y(WÂ!Ä1âÿÿÿÿÿÿÿÿFÿÿÿÿ!ĪÅMore About Architecture - Multithreading8ÈÃYÄ' €"€ČR˜€‚ÿMultithreadingQ,!ĪÅ% €Y€˜€‚ÿUsing multiple threads of execution within a single process is called multithreading. Threads allow one process to execute different parts of its program on different processors simultaneously. Server processes can use multiple threads to process requests from more than one client simultaneously.f5YÄÆ1†ÿÿÿÿÿÿÿÿGÿÿÿÿÆ0ÇMore About Architecture - Interprocess CommunicationsEªÅUÆ' €<€ČR˜€‚ÿInterprocess CommunicationsÛ¶Æ0Ç% €m€˜€‚ÿConvenient mechanisms for sharing objects between processes and flexible interprocess communication capabilities, including shared memory and an optimized message-passing facility_.UƏÇ1Ê@ ú† HÇÍÇfËMore About Architecture - Protected Subsystems>0ÇÍÇ' €.€˜ŒR˜€‚ÿProtected Subsystems!úÇîÈ' €õ€°°˜€‚ÿWindows NT servers are called protected subsystems because each one is a separate process whose memory is protected from other processes by the Windows NT Executive. Because the subsystems do not share memory, they communicate by passing messages. ÇÍÇ÷ÊB R€€°˜€âSKo!€
‰€âNº€
‰€‚€‚ÿAs the term "server" implies, each protected subsystem provides an API that programs can call. When an application (or another server) calls an API routine, a message is sent to the server that implements the API routine via the Windows NT Executive local procedure call (LPC) facility, a locally optimized message-passing mechanism. The server replies by sending a message back to the caller.Windows NT has two types of protected subsystems:o4îÈfË; F€h€˜˜ãg:"®€
‰€‚ãs-¥5€
‰€‚ÿEnvironment SubsystemsIntegral Subsystemsa0÷ÊÇË1Hîƒ ¼
IÇËÌ*More About Architecture - Environment subsystems@fËÌ' €2€˜ŒR˜€‚ÿEnvironment Subsystems¿tÇËÆÍK d€é€°°˜€âʅ:€
‰€âSKo!€
‰€âNº€
‰€‚ÿAn environment subsystem is a user-mode server that provides an API, which is specific to an operating system. When an application calls an API routine, the call is delivered through the local procedure call (LPC) facility to the environment subsystem, which executes the API routine and returns the result to the application process by sending another LPC.n<Ì4Ï2 2€y€˜˜€âEŽW€
‰€‚ÿThe most important environment subsystem is the Win32 subsystem, which makes the Microsoft 32-bit Windows API available to application programs. The Win32 environment subsystem also provides the Windows NT graphical user interface and controls all user input and application output. Windows NT also supplies: ¥eÆÍÙÏ@ P€Ê€T˜9s„´9€€ƒ‚€€ƒ‚€€ƒ‚ÿ·A POSIX environment subsystem·An OS/2 environment subsystem ·A 16-bit Windows subsystemI4Ï.0 0€2€T°9s„´9ÙÏ.fË€€ƒ‚ÿ·An MS-DOS subsystemü¼ÙÏ*@ N€y€˜˜€‚ãdS׀
‰€‚ã0×: €
‰€‚ÿThese subsystems provide APIs but use the Win32 subsystem to receive user input and display output.More on Environment SubsystemsEnvironment Subsystems and Client Applicationsi8.“1ÿú† Ù
J“Û©More About Architecture - More on Environment SubsystemsH!*Û' €B€˜ŒR˜€‚ÿMore on Environment SubsystemsôÁ“Ï3 4€ƒ€°˜˜€âEŽW€
‰€‚ÿThe environment subsystem provides the Windows NT user interface. It controls the video display, the keyboard, the mouse, and other input devices. In addition, it provides the Win32 API.2Û. ,€
€°˜€†"€ ‚ÿ¨vÏ©2 2€í€°˜€âº7€
‰€‚ÿThe Win32 subsystem does not control the execution of non-Win32 applications. When the user runs an application that the Win32 subsystem does not recognize, the subsystem determines what type of application it is and then either calls another subsystem to run the application, or calls code to initialize an MS-DOS environment in which to run the application. Example\+1iÿÿÿÿÿÿÿÿKÿÿÿÿMore About Architecture - Subsystem Example1
©6' €€ČR˜€‚ÿExampleܶ& €m€°˜€‚ÿThe Win32 subsystem supplies 32-bit Windows API routines, and the OS/2 subsystem supplies OS/2 API routines. Applications cannot mix API routines from different subsystems because each environment subsystem operates differently. A file handle created by the Win32 subsystem does not translate to the POSIX subsystem, for example. Furthermore, such hybrid applications would not run on MS-DOS, Windows, POSIX, or OS/2 operating systems.p?6‚15¼
ƒ
L‚ÚÞ More Architecture - Environment Subsystems, Client ApplicationsX1Ú' €b€˜ŒR˜€‚ÿEnvironment Subsystems and Client ApplicationsùƂÓ3 4€€°°˜€âg–Lˀ
‰€‚ÿMS-DOS and 16-bit Windows run inside an environment subsystem called a Virtual DOS Machine (VDM). VDMs are unlike other environment subsystems in that many of them can be running at one time.p>ÚC 2 2€}€°˜€â¸g(—€
‰€‚ÿBecause the Win32 subsystem handles all video output, the other environment subsystems must direct the output of their applications to the Win32 subsystem for display. The VDM running 16-bit applications for Windows translates the applications' output calls into Win32 calls and sends them in a message to the Win32 subsystem for display. The OS/2 and POSIX subsystems, as well as any VDMs running MS-DOS-based applications, direct their applications' character-mode output to the Win32 subsystem, which displays the output in character-mode windows, called consoles.›uÓÞ & €ë€°˜€‚ÿAn environment subsystem can support many client applications. Each subsystem keeps track of its clients and maintains any global information that all the client applications share. Although several subsystems and VDMs might be running, Win32 is the only environment subsystem that makes itself visible. To the user, it appears that Windows NT runs all the applications.^-C <
1"Ù
€
M<
y
Ù@More About Architecture - Integral subsystems=Þ y
' €,€˜ŒR˜€‚ÿIntegral Subsystems̙<
E3 4€3€°°˜€â PP>€
‰€‚ÿIntegral subsystems are servers that perform important operating system functions. An example of an integral subsystem is the security subsystem. ˆy
Ù@n ª€5€°˜€â
8¯€
‰€â⫪р
‰€âžZầ
‰€âZ‰’ï€
‰€â~¦“€
‰€âZ‰’ï€
‰€‚ÿSeveral components of the Windows NT networking software are also implemented as integral subsystems. Two such components are the workstation service and the server service. Both of these services are user-mode processes that implement an API to access and manage the LAN Manager network redirector and server, respeEÙ@Þ ctively. The server sits on the remote machine and receives remote requests from the redirector. Both the LAN Manager redirector and the LAN Manager server are implemented as file system drivers._.E8A1âƒ
؆
N8AvA'HMore About Architecture - Windows NT Executive>Ù@vA' €.€˜ŒR˜€‚ÿWindows NT ExecutiveDù8AºBK d€ó€°°˜€âÄÕª€
‰€â-äÄM€
‰€â²¶Å/€
‰€‚ÿThe Windows NT Executive is the kernel mode part of Windows NT and is a complete operating system without a user interface. The Executive is a series of components, each performing two functions: system services and internal routines.2vAìB. ,€
€°˜€†"€
‚ÿŒYºBxF3 4€³€°˜€â»7€
‰€‚‚ÿAlthough the Executive provides API-like system services, it is fundamentally different from the environment subsystems. It does not run continually in a process of its own, but instead runs in the context of an existing process by taking over an executing thread when important system events occur. ExampleExecutive components maintain independence from one another, each creating and manipulating the system data structures it requires. Because the interfaces between components are carefully controlled, it is possible to completely remove a component from the operating system and replace it. As long as the new version implements all the system services and internal interfaces correctly, the operating system runs as before. Maintaining the operating system is also an easier task because the Executive components interact in predictable ways.W2ìBÏF% €d€°˜€‚ÿThe Executive Manages the Following Components:XÎxF'HŠ ”€˜˜â­"öú€
‰€‚âr `€
‰€‚â ­í´€
‰€‚âNº€
‰€‚ã'
µ€
‰€‚ãéӂ€
‰€‚ã%Èâ€
‰€‚ãù\äv€
‰€‚ÿKernelSecurity Reference MonitorProcess ManagerLocal Procedure Call (LPC) facilityVirtual Memory (VM) ManagerObject ManagerI/O SystemHardware Abstraction Layer (HAL)Y(ÏF€H1ÿÿÿÿÿÿÿÿOÿÿÿÿ€H7JMore About Architecture - Kernel Example1
'H±H' €€ČR˜€‚ÿExample†`€H7J& €Á€°˜€‚ÿWhen a thread calls a system service and is trapped by the processor or when an external device interrupts the processor, the Windows NT kernel gains control of the thread that was running. The kernel calls the appropriate system code to handle the event, executes it, and then returns control to the code that was executing before the interruption.Y(±HJ1u €
º PJÈJ„More About Architecture - Object manager87JÈJ' €"€˜ŒR˜€‚ÿObject Manager¬UJtLW |€«€°°˜€â]i€
‰€â®ñóǀ
‰€âÉ1€
‰€âƒm2€
‰€‚ÿThe Object Manager creates, manages, and deletes Windows NT Executive objects. Many Windows NT native services are object services, meaning that they perform some action on an object in the Windows NT Executive. A thread opens a handle to an object and then uses that handle when calling services to operate on the object.X2ÈJÌN& €e€°˜€‚ÿShareable resources, including processes, threads, files, and shared memory, are implemented as objects in the Windows NT Executive. This allows the operating system to take advantage of the similarities among resources and to use common code wherever possible to manage them. The Windows NT object system is a focal point for several resource management tasks, such as resource naming, placing limits (called quotas) on the amount of resources each process can use, sharing resources between two processes, and securing resources against unauthorized access..ütL €2 2€ù€°˜€â¼7€
‰€‚ÿEnvironment subsystems frequently call object services to create, open a handle to, manipulate, or delete objects. Example Much of the Windows NT resource management takes place when some process creates an object or opens a handle to an object.ÌN €7J2ÌN>€. ,€
€°˜€†"€‚ÿµ €>ƒK d€k€°˜€‚â PP>€
‰€âœØRu€
‰€â½7€
‰€‚ÿObjects are allocated from operating system memory. To keep any one process from using too much system memory, processes are given quotas that limit how much memory they can use.As well as managing and sharing resources, the Windows NT object system is a focal point for resource security. When a process opens a handle to a Windows NT object, the Windows NT security subsystem is activated. Each object has attached to it a small database, called an access control list (ACL), containing information regarding which processes can access the object and what they can do to it. When a process opens a handle to an object, it specifies the operations it wants to perform. Exampleà¹>€„' €s€˜°˜€‚ÿBecause a process must open a handle to an object before it can do anything to it and because opening a handle invokes the security system, no process can bypass Windows NT security.T#>ƒr„1ÅÿÿÿÿÿÿÿÿQÿÿÿÿr„ã†More About Architecture - Example 31
„£„' €€ČR˜€‚ÿExample@r„ã†& €5€°˜€‚ÿIf the user starts a Win32-based application, the Win32 subsystem calls the Windows NT Process Manager to create a process and open a handle to it. The Process Manager, in turn, calls the Object Manager to create a process object and a thread object. Similarly, if the user saves data from the application, the Win32 subsystem calls the Windows NT I/O Manager to create a file object that represents the file in which the spreadsheet is stored and to open a handle to the object. The I/O Manager calls the Object Manager to do the job.T#£„7‡1ÄÿÿÿÿÿÿÿÿRÿÿÿÿ7‡§ˆMore About Architecture - Example 41
ã†h‡' €€ČR˜€‚ÿExample?7‡§ˆ& €3€°˜€‚ÿA process opens a file for read access. The security system checks whether the process is allowed read access to the file object, and if so, the Object Manager returns an object handle containing read access. The caller can then use the handle to read from that particular file.U$h‡üˆ1Z
؆
€ SüˆA‰ÜÁMore About Architecture - VM managerE§ˆA‰' €<€˜ŒR˜€‚ÿVirtual Memory (VM) Manager›hüˆ܊3 4€Ñ€°˜˜€âË~x€
‰€‚ÿWindows NT implements virtual memory (VM), a memory management scheme that provides a large, private address space for each process and protects it from other processes. When more memory is needed than there is available RAM, the VM manager transfers selected RAM contents to disk and reloads the contents when they are used again.This is called paging.2A‰‹. ,€
€˜˜€†"€‚ÿ^7܊l' €o€°˜€‚‚ÿIn Windows NT, application programs run in an operating system environment that behaves like Windows, MS-DOS, POSIX, or OS/2. The challenge is to allow all the different types of applications to run without being rewritten and without bumping into each other in memory.Each of the Windows NT environment subsystems provides a view of memory that corresponds to what its applications expect. Underneath the environment subsystems, the Windows NT Executive has its own memory structure, which the environment subsystems access by calling Windows NT native services.W‹Ï8 >€?€°˜€â¼;e€
‰€€€‚ÿThe Windows NT memory architecture is a virtual memory system based on 32-bit addresses in a flat (linear) address space. A process's virtual address space is the set of addresses available for the process's threads to use. At runtime, the VM manager, with assistance from hardware, translates, or maps, the virtual addresses into physical addresses, where the data is actually stored. By controlling the mapping, the operating system can ensure that individual processes don't bump into one another or overwrite the operating system.
ÎlÜÁ? L€€°˜€‚â9§€
‰€âŽÙ€
‰€ÏÜÁ§ˆ‚ÿThe Windows NT operating system resides in high virtual memory and the user's code and data reside in low virtual memory. A user-mode thread cannot read or write to system memory directly.A portion of the system memory, called nonpaged pool, is never paged to disk and is used to store some Windows NT objects and other important data structures. Another portion of system memory, called paged pool, is paged to disk. All of user memory can be paged.U$Ï1Â1Úº ހ Tÿÿÿÿ1¶ÃMore About Architecture - I/O SystemDÜÁuÂ' €:€ČR˜€‚ÿI/O System and I/O Managerµ1Â*Ã& €€˜˜€‚ÿA group of components that process input and output between a variety of devices. The I/O system includes the I/O Manager, and File Systems.2uÂ\Ã. ,€
€˜˜€†"€‚ÿZ-*öÃ- *€Z€ČR˜ãa²Ô€
‰‚ÿMore on the I/O Manager and File Systemsd3\ÃÄ1Ë €
‰ UÄlÄÎMore About Architecture - I/O Manager, File SystemsR+¶ÃlÄ' €V€˜˜R˜€‚ÿMore on the I/O Manager and File SystemsáºÄMÅ' €u€°°˜€‚ÿAs with memory, environment subsystems provide whatever I/O facilities their applications expect. They implement those individual facilities by calling native Windows NT I/O services.ß­lÄ,Æ2 2€[€°˜€âÁ:p€
‰€‚ÿThe native I/O system uses an asynchronous I/O model, but it provides system services that allow environment subsystems to use either synchronous or asynchronous I/O.f"MÅ’ÇD V€E€˜˜€€
€€
âÒ¯‰€â¤E÷
€
‰€‚ÿWindows NT supports multiple file systems, including the file allocation table (FAT), the high performance file system (HPFS), and a new file system called the Windows NT file system (NTFS). NTFS extends the capabilities present in both the FAT file system and the HPFS to add:¡2,Æ3Êo ¬€e€T˜9s„´9€€ƒ€
€‚€€ƒ€
€‚€€ƒ€
€‚€€ƒ€
€‚€€ƒ€
€‚ÿ·File System Recovery, that allows for quick restoration of disk-based data after a system failure.·The Ability to Handle Large Storage Media: approximately 17 billion gigabytes in size.·Security Features, including execute-only files.·Unicode Filenames, which allow documents to be transferred from one computer to another internationally, without disrupting filenames and pathnames.·Support for the POSIX Operating System Environment, including hard links, case-sensitive names, and information about when a file was last opened.›H’ÇÎÌS t€‘€T˜9s„´9€€ƒ€
€‚€€ƒ€
€‚€€ƒ€
€‚ÿ·Features for Future Extensibility, such as transaction-based operations to support fault tolerant applications, user-controlled version numbers for files, multiple data streams per file, flexible options for file naming and file attributes, and support for popular file servers.·Network Redirector and Network Server are file system drivers that send and receive remote I/O requests to a machine on the network.·Executive Device Drivers are low-level drivers that directly manipulate hardware to write output to or retrieve input from a physical device or network.83ÊÎ7 <€€T˜9s„´9€€ƒ€
€‚ÿ·Cache Manager improves the performance of file-based I/O by storing the most recently read disk information in system memory. The cache manager uses the VM manager's paging facility to automatically write modifications to the disk in the background.NÎÌTÎ1[ހ VTΞΠMore About Architecture - HALJ#ΞÎ' €F€˜˜R˜€‚ÿHardware Abstraction Layer (HAL)a6TÎ + $€m€°˜€‚€‚‚ÿThe HAL isolates the Windows NT Executive from the hardware platform on which Windows NT is running.Rather than access hardware directly, Windows NT Executive components maintain maximum portability by calling the HAL routines when they need platform-dependent information.Platform-dependent code (code thatžÎ Î relies on a particular manufacturer's hardware implementation) is located in the HAL and is provided by individual computer manufacturers. Device drivers avoid processor-dependent and platform-dependent code by calling kernel routines and HAL routines.X'žÎc1¢
‰ £ Wcš
More About Architecture - Logon Session7 š' € €˜ŒR˜€‚ÿLogon Session§tcA3 4€é€°°˜€â PP>€
‰€‚ÿWindows NT is a secure operating system that requires each user to establish an account and to logon to that account before they can use the system. Each user account has a security profile, which is a collection of security-related information stored in a system database. The security subsystem uses this information to verify that users are who they claim to be.2šs. ,€
€°˜€†"€‚ÿSAÆK d€€°˜€â*ý—î€
‰€âÉ1€
‰€‚â;ù€V€
‰€‚ÿA security system process, called a logon process, waits for user input. Several logon processes can be active, each one monitoring a separate class of logon devices like a keyboard/mouse combination or a network connection. A thread in the process detects when a user attempts to access the system and prompts the user for an account name and a password.The logon process then passes the user's information to the security subsystem, which checks the information against a security database. If the logon is authentic, the subsystem creates an object that uniquely identifies this user in all subsequent transactions. The object, called an access token, is the key to security in Windows NT: It determines which system resources the user's threads can access.Es
3 4€%€°˜€âÀâ¾Ó€
‰€‚‚ÿAfter the user's identity is established, the security subsystem creates a process, attaches the user's access token to it, and then passes the process to the Win32 subsystem, which runs the Win32 Program Manager in the process's address space. With that, the user has established a logon session. Windows NT supports both local and remote logons, and a server machine running Windows NT is likely to have numerous logon sessions active at the same time.As soon as an interactive user successfully logs onto Windows NT, the Win32 subsystem takes control of the screen. Windows NT looks like, and is compatible with, Windows 3.1. With Windows NT, users can transparently run Win32-based programs and 16-bit Windows-based programs, as well as programs for MS-DOS, OS/2, and POSIX.Z)Æe
1Ê € Xe

7More About Architecture - Native Services9

' €$€˜ŒR˜€‚ÿNative Services]e
û ? L€=€°°˜€âb÷ƒ˜€
‰€âÄÕª€
‰€‚ÿEnvironment subsystems implement their API routines by calling Windows NT native services (the system services provided by individual components of the Windows NT Executive). The virtual memory (VM) manager supplies memory allocation and deallocation services, for example, while the Process Manager provides services to create and terminate processes and threads. When a subsystem calls a Windows NT native service, hardware detects the call and transfers control to the Windows NT Executive. The service then runs in kernel mode.< ž
73 4€€°˜€â¾7€
‰€‚‚ÿBecause the native services are used by different environment subsystems, they must be: general, flexible and without side effects that might conflict with the environment subsystems. One way in which the native services are flexible is in their ability to act on any process the caller specifies. The caller supplies a handle to a process, and the service operates on that process. ExampleProtected subsystems, DLLs, and components of the Windows NT Executive are the primary users of Windows NT native services.T#û ‹1›ÿÿÿÿÿÿÿÿYÿÿÿÿ‹AMore About Architecture - Example 52 7½' €€ČR˜€‚ÿExample G!‹A& €C€°˜€‚ÿThe subsystem can call a nat½A7ive service to create a thread or allocate memory for one of its client processes, because most normal processes cannot perform such operations on other processes. Environment subsystems have powerful access tokens that grant them control over their clients._.½oA1´£ 1‚ ZoA­A0DMore About Architecture - Internationalization>A­A' €.€˜ŒR˜€‚ÿInternationalizationÓoA®C. *€§€°˜€‚€‚€‚ÿThe goal for developers was to create a truly multilingual operating system, one that provides a solid foundation for developing and using international applications.International support is streamlined in Windows NT, providing modular facilities for applications as well as for important system components such as the Win32 subsystem. The user interface to internationalization facilities will continue to evolve in future releases.For Additional Information:‚G­A0D; F€Ž€˜˜ã°<\j€
‰€‚ã
½w€
‰€‚ÿWindows NT Support for LocalesWindows NT Support for UnicodeR!®C‚D1A
€ ¥‹ [‚DÊDÚNMore About Architecture - LocalesH!0DÊD' €B€˜ŒR˜€‚ÿWindows NT Support for Locales›\‚DeF? L€¹€°°˜€â!±FX€
‰€âI½9 €
‰€‚ÿA locale consists of a language, a country, and a code set. When installing Windows NT, you will select a language to use, after which you will be assigned a default locale. The default locale gives you culturally correct defaults for keyboard layout, sorting order, currency, and date and time formatting, any of which you can override.hBÊDÍH& €…€°˜€‚ÿIn multilingual countries such as Canada, Switzerland, and Belgium, users require the ability to switch among two or more languages on a regular basis. Moreover, some companies have divisions in which several different languages are routinely spoken. Ideally, each user should be able to switch among locales at any time or to send data among locales without losing information. To accomplish this, applications (and in this case, Windows NT) must be separated into two pieces: code, which can be used in all locales, and data, which must be translated for different locales.ä¾eF±K& €}€°˜€‚ÿIn Windows NT, the data category consists of resources such as menus and messages. These resources are separated from the main body of the code and can be attached to or detached from Windows NT. When the user switches locales, the resource set changes to represent the new locale. Because the set of resources is much smaller than Windows NT itself, many different resource sets can be loaded at installation time--the user can switch between locales easily without loading new files from floppy disks. Moreover, a single Windows NT package can be shipped to all countries with localization support already built in. The only remaining task is to translate the resource files and the documentation.)÷ÍHÚN2 2€ï€°˜€âÚ€
‰€‚ÿTo facilitate localization, the Windows NT Win32 subsystem provides a national language support (NLS) API that gives applications (and Windows NT) access to: culturally correct string comparisons, collation tables for sorting the characters of different languages, date, time, and currency formatting routines and routines for determining the locale that is in effect and the other locales present on the system. In addition, the NLS API provides routines to convert between the international code set used by Windows NT and other commonly used code sets. Both the Win32 subsystem and the C runtime library provide their own API routines based on NLS. Using these facilities allows applications to support localization with the minimum possible effort.R!±K,O1~1‚ Õ
\,OtO÷More About Architecture - UnicodeH!ÚNtO' €B€˜ŒR˜€‚ÿWindows NT Support for Unicode’k,O' €×€°˜˜€‚ÿThe lowest layer of localization support is in the representation of individual characters, the codetOÚN sets. The United States has traditionally employed the ASCII (American Standard Code for Information Interchange) standard for representing data. For European and other countries, however, ASCII is not adequate because it lacks common symbols and punctuation.2tOD. ,€
€˜˜€†"€‚ÿ€6ăJ b€m€°˜€âI½9 €
‰€â5“’â€
‰€âP=“€
‰€‚ÿThe International Standards Organization (ISO) established a standard code set called Latin1 (ISO standard 8859-1), which defines codes for all the European characters omitted by ASCII. Windows 3.1 uses a slight modification of Latin1 called the Windows ANSI code set. Windows ANSI is a single-byte coding scheme. The maximum number of characters that can be expressed using 8 bits is 256 (2 to the 8th power). The same script is often used for several languages. For example, the Cyrillic script is used for both the Russian and Ukrainian languages. L&D‡& €M€°˜€‚ÿWindows ANSI and other single-byte coding schemes can encode enough characters to express the letters of Western scripts. However, Eastern scripts such as Japanese and Chinese, which need thousands of separate characters, cannot be encoded using a single byte. These scripts are typically stored using a double-byte coding scheme, or a multibyte coding scheme, in which some characters are represented by an 8-bit sequence and others are represented by a 16-bit, 24-bit, or 32-bit sequence. The latter scheme requires complicated parsing algorithms to determine the storage width of a particular character. Furthermore, a proliferation of different code sets means that a particular code might yield entirely different characters on two different computers, depending on the code set each computer uses.ª„ăº‰& € €°˜€‚ÿTo solve the problem of multiple coding schemes and to accommodate a more comprehensive set of scripts, Windows NT employs the new Unicode standard for data representation. Unicode, a 16-bit character-coding scheme, can represent 65,536 (216) characters. This is enough to include all languages in computer commerce today, as well as several archaic or arcane languages with limited applications (such as Sanskrit and, eventually, Egyptian hieroglyphics). Unicode also includes representations for punctuation marks, mathematical symbols, and a set of graphical characters called dingbats, with plenty of room remaining for future expansion.÷Ї±Œ' €¡€°˜€‚‚ÿUnicode separates the "essence" of a character from the font and formatting information used to display it. Each code corresponds to one (and only one) character; font information is applied to Unicode characters to display them in various styles and shapes.Although the Win32 subsystem provides both ANSI and Unicode string API routines, Unicode is the Windows NT native code set. All character strings in the system, including object names, pathnames, filenames, and directory names, are represented with 16-bit Unicode characters. Even the Win32 subsystem converts any ANSI characters it receives to Unicode strings before manipulating them; it converts them back to ANSI, if necessary, upon exit from the system.F º‰÷& €A€°˜€‚ÿUsing Unicode removes all limitations on the set of characters that Windows NT can represent. Because Unicode establishes a unique code for every character of every script, Windows NT can ensure that the round-trip character translation, into and out of the system, is always accurate.h7±Œ_Ž1´¥‹ 
]_ަŽúÁMore About Architecture - Structured Exception HandlingG ÷¦Ž' €@€˜ŒR˜€‚ÿStructured Exception HandlingÅ’_ŽwÀ3 4€%€°°˜€âÀâ’€
‰€‚ÿThe second special architecture supported and used by Windows NT is called structured exception handling. Exceptions are synchronous errors or atypical events that cause the execution of code outside the normal flow of control. Unlike interrupts, which are generated from an external source¦ŽwÀ÷, exceptions occur when a program executes a particular code sequence. Exceptions can also be reproduced.年Á* "€ß€°˜€‚€‚ÿException handlers and termination handlers can be used separately or in combination to achieve robust behavior in any application. Windows NT uses both to ensure robust behavior at all levels of the system.For Additional Information:j/wÀúÁ; F€^€˜˜ã¿@É¥€
‰€‚ã1Àaç€
‰€‚ÿException HandlerTermination Handler\+ÁVÂ1íÕ
 †
^V‘ÂMÈMore About Architecture - Exception Handler;úÁ‘Â' €(€˜ŒR˜€‚ÿException HandlerEVÂÖÃ' €=€°°˜€‚ÿStructured exception handling is the way Windows NT processes hardware and software exceptions. With this technique, any block of code can determine which exceptions to guard against and register a special code sequence (the exception handler) to be executed if the exceptions occur.wP‘ÂMÈ' €¡€°˜€‚‚ÿEach block of code can have a separate exception handler, and exception handlers can even be nested within one another. When an exception occurs, the exception filter can test the type of exception and conditionally tell the operating system to execute the exception handler, continue the program, terminate the program, or look for an exception handler in an enclosing block of code.Operating system exceptions aren't the only exceptions to which applications might want to respond. Applications can generate an exception using the Win32 API routine RaiseException(), causing control to transfer to a registered exception handler. The operating system supports this operation by registering exception handlers and searching for them in the proper order when exceptions are raised. If no exception handler takes care of the problem, the operating system terminates the program that caused the error. The Windows NT exception-handling facility is not language specific; a single mechanism is used across all languages, each language defining how the underlying exception-handling mechanism is exposed.^-ÖëÈ1µ
ÿÿÿÿ_«ÈèÈlÊMore About Architecture - Termination Handler=MÈèÈ' €,€˜ŒR˜€‚ÿTermination Handler„Q«ÈlÊ3 4€£€°°˜€â¿7€
‰€‚ÿA termination handler ensures that a particular block of code always executes, even if a guarded block of code terminates in an unexpected way. Termination handlers often contain code that frees allocated resources so that if a procedure terminates unexpectedly, the resources it allocated are released back to the system. ExampleT#èÈÀÊ1@ÿÿÿÿÿÿÿÿ`ÿÿÿÿÀʬÍMore About Architecture - Example 82 lÊòÊ' €€ČR˜€‚ÿExample ºˆÀʬÍ2 2€€°˜€â–c|!€
‰€‚ÿA thread gains access to the critical section, allocates a buffer, and then modifies the buffer. If something goes wrong (an unhandled exception, perhaps) and causes the routine to terminate while the thread is in the critical section, any other thread waiting for the resource will be perpetually blocked. Furthermore, the buffer that the thread allocated will be lost, with the operating system unable to recover it. These errors are sometimes called memory leaks because If too many occur, available memory gradually "drains away". The termination handler ensures that the thread releases the critical section object and frees the buffer.·†òÊcÎ1ÚÿÿÿÿacίÎ5Windows NT: Background and CreationEB("btn_topic_index");SaveMark("topic_index"); CBB("btn_next_index", "PI(`nteval.hlp',`next_14')")L&¬Í¯Î& €L€°°˜€‚ÿWindows NT: History and Development°kcÎkE X€×€°°˜€€ €€ €€€€ €€ €‚ÿDevelopment of the Microsoft® Windows NT™ operating system began in 1988. This section examines the creation of Windows NT itself, the strategic move away from OS/2® Presentation Manager®, and how Dave Cutler and his development team built a modern 32-bit ope¯Îk¬Írating system based on a number of proven technologies, including VMS® and the Mach Kernel.ʁ¯Î5I `€€˜˜ãFÙ¹€
‰€‚ãJ¼̀
‰€‚ãt¡êB€
‰€‚ÿDesigning an Operating System for the 1990sThe Creation of Windows NTThe Move from Presentation Manager to Win 32^-k“1ŠšŠ
ðb“éBBackground - Differing Hardware ArchitecturesV/5é' €^€˜ŒR˜€‚ÿ Designing an Operating System for the 1990sŸ`“ˆ? L€Á€°°˜€┕¼x€
‰€â1ÈÎx€
‰€‚ÿAs hardware technology advances, new computers with faster processors, more memory, and multiple processors are being introduced in swift succession, prompting operating system developers to extend their systems to take advantage of new hardware features. Innovative processor technology has rapidly emerged in both the CISC and RISC arenas.ºŽéB, &€€°˜€€€‚ÿIn 1988, Microsoft recognized that it needed to produce an operating system that would exploit the ongoing advances of hardware technology. It needed to produce an operating system for the 1990s--one that was portable and moved easily between hardware platforms. Although Microsoft and IBM created the OS/2 operating system in the 1980s, Microsoft understood that the system had many shortcomings. For example, OS/2 is not portable. It was written in assembly language to run on single-processor, Intel® 80286 computers. Instead of overhauling the OS/2 system software, Microsoft decided to build a new, portable operating system from the ground up.Bˆ„1Pÿÿÿÿÿÿÿÿcÿÿÿÿ„’Background - CISC.B²' €€ČR˜€‚ÿCISCຄ’& €u€°˜€‚ÿThe Intel 80386 and 80486 chips, along with many other popular processors, are known as Complex Instruction Set Computer (CISC) chips. Their chief characteristic is a large number of machine instructions, each of which is elaborate and powerful. In the last few years, Intel has made major advances in the speed and power of its processors, and other manufacturers have developed multiprocessor machines based on the Intel CISC technology.5²Ç1ÿÿÿÿÿÿÿÿdÿÿÿÿÇ¥
RISC.’õ' €€ČR˜€‚ÿRISC°ŠÇ¥
& €€°˜€‚ÿIn the mid-1980s, the hardware industry created another type of processor architecture called Reduced Instruction Set Computer (RISC) chips. RISC chips differ from CISC chips primarily in the small number of simple machine instructions they provide. Because of the simplicity of their instruction sets, the RISC processors run at increased clock speeds and achieve very fast execution times.X'õý
1b‹‰eý
B sBackground - The Creation of Windows NTE¥
B ' €<€˜ŒR˜€‚ÿ The Creation of Windows NTFý

3 4€'€°°˜€âÐ €
‰€‚ÿIn the fall of 1988, Microsoft hired David N. Cutler to lead a new software development effort to create Microsoft's operating system for the 1990s. Cutler, a well-known architect of minicomputer systems, assembled a team of engineers to design the Microsoft's New Technology (NT) operating system. Early in 1989, Bill Gates and key Microsoft strategists met to review the operating system specifications that Cutler's group had defined. Their plans identified these primary market requirements for the new operating system:ëˆB sc ”€€˜˜âw~WA€
‰€‚âîä0l€
‰€‚â܉'Ÿ€
‰€‚âïœZç€
‰€‚ã=¹©1€
‰€‚ÿPortabilityMultiprocessing and ScalabilityDistributed ComputingPOSIX ComplianceGovernment-Certifiable Security< ˆ
¯1­ÿÿÿÿÿÿÿÿfÿÿÿÿ¯´@Dave Cutler5sä' €€ČR˜€‚ÿDave CutlerÄ’¯´@2 2€%€°˜€€ €€€‚ÿPrior to his work at Microsoft, Dave Cutler was a senior corporate consultant at Digital Equipment Corporation and had spent 17 years there developing a number of operating systems and compilers, including the VAX®/VMS® operatingä´@s system, the MicroVAX I workstation and operating system, the RSX-11M operating system running on DEC's PDP-11 machine, and the VAX PL/1 and VAX C language compilers.Iäý@1¯ÿÿÿÿÿÿÿÿgÿÿÿÿý@cBBackground - Portability6´@3A' €€ČR˜€‚ÿPortability 0
ý@cB& €€°˜€‚ÿHardware advances occur quickly and often unpredictably. For example, RISC processors represent a great departure from traditional CISC technology. Writing Windows NT in a portable language would allow it to move freely from one processor architecture to another.],3AÀB18ÿÿÿÿÿÿÿÿhÿÿÿÿÀB›EBackground - Multiprocessing and ScalabilityI"cB C' €D€ČR˜€‚ÿMultiprocessing and Scalability’lÀB›E& €Ù€°˜€‚ÿApplications should be able to take advantage of the broad range of computers available today. For example, computers with more than one processor appear on the market regularly, but few existing operating systems can fully employ them. Making Windows NT a scalable, multiprocessing operating system would make it possible for a user to run the same application on single-processor and multiprocessor computers. At the high end, the user could run several applications simultaneously at full speed, and compute-intensive applications could deliver improved performance by dividing their work among several processors.S" CîE1¿ÿÿÿÿÿÿÿÿiÿÿÿÿîEZIBackground - Distributed Computing?›E-F' €0€ČR˜€‚ÿDistributed Computing-îEZI& €€°˜€‚ÿThe increasing availability of personal computers has irrevocably altered the nature of computing. Where once a single, large mainframe computer served an entire company, smaller and cheaper microcomputers have proliferated and are now standard issue for rank-and-file employees. Enhanced networking capabilities now make it possible for the smaller computers to communicate with one another, often sharing hardware resources such as disk space or processing power (in the form of file servers, print servers, or compute servers). To accommodate this change, developers of the Windows NT operating system would build networking capabilities directly into the operating system and would provide the means for applications to distribute their work across multiple computers.N-F¨I1`ÿÿÿÿÿÿÿÿjÿÿÿÿ¨IºLBackground - POSIX Compliance:ZIâI' €&€ČR˜€‚ÿPOSIX Complianceز¨IºL& €e€°˜€‚ÿIn the mid-to-late 1980s, U.S. government agencies began specifying POSIX as a procurement standard for government computing contracts. POSIX, an acronym rather loosely defined as "a portable operating system interface based on UNIX," refers to a collection of international standards for UNIX-style operating system interfaces. The POSIX standard (IEEE Standard 1003.1-1988) encourages vendors implementing UNIX-style interfaces to make them compatible, so that programmers can move their applications easily from one system to another. To meet the government's POSIX procurement requirements, Windows NT would be designed to provide an optional POSIX application execution environment.],âIM1=ðkkM`MځBackground - Government-Certifiable SecurityI"ºL`M' €D€˜ŒR˜€‚ÿGovernment-Certifiable SecurityK$M«O' €I€°°˜€‚ÿIn addition to POSIX compliance, the U.S. government also specifies computer security guidelines for government applications. Achieving a government-approved security rating makes an operating system competitive in that arena. Of course, many of these required capabilities are advantageous features for any multi-user system. The security guidelines specify required capabilities such as protecting one user's resources from another's and establishing resource quotas to prevent one user from garnering all the system resources, such as memory.#ì`Mځ7 <€Ù€°˜€‚€‚âa{ñ€
‰€‚ÿThe initial target for Window«OځºLs NT security is the Class C2 level, defined by the U.S. Department of Defense as providing "discretionary (need-to-know) protection and, through the inclusion of audit capabilities, for accountability of subjects and the actions they initiate." This means that the owner of a system resource has the right to decide who can access it, and that the operating system can detect when data is accessed and by whom. See Also:U.S. Government Security Levels],«O7‚1ÿÿÿÿÿÿÿÿlÿÿÿÿ7‚ïƒBackground - U.S. government security levelsI"ځ€‚' €D€ČR˜€‚ÿU.S. Government Security LevelsoI7‚ïƒ& €“€°˜€‚ÿThese classifications extend from level D (least stringent) to level A (most stringent), with levels B and C each containing several sublevels. Although Windows NT would initially be written to support the C2 security level, enhancements in future releases could meet the more stringent requirements of higher security levels.j9€‚Y„1ù‹‰ÿÿÿÿmY„·„ŠBackground - The Move from Presentation Manager to Win 32^1„- *€b€˜ŒR˜€€€‚ÿThe Move from Presentation Manager to Win32®`3Y„‡- (€g€°°˜€€
€‚ÿOriginally, the plan for the creation of Windows NT called for an OS/2-style user interface and the OS/2 application programming interface (API). However, midway through the development of the system, Microsoft Windows version 3.0 finally achieved the critical mass from both users and developers lacking in OS/2. Recognizing this marketplace mandate and the complexities involved in enhancing and supporting two incompatible operating systems, Microsoft decided to alter its course and direct its energy toward a single, coherent operating system strategy. “[·„ª‰8 >€·€˜˜€€ €âEŽW€
‰€‚ÿThis strategy was to produce a family of Windows™-based operating systems that supported computers from the smallest notebooks to the largest multiprocessor workstations. Windows NT, as the next-generation Windows operating system is named, takes its place at the high end of the Windows family. It has a Windows graphical user interface and is Microsoft's first Windows-based operating system to supply the Win32 API, a 32-bit programming interface for new application development. The Win32 API makes advanced operating system capabilities available to applications through features such as: Õg‡Šn ¬€Î€T˜·€L‚´€€
ƒâ¶¯+މ‚€€
ƒâ]Ô5‰‚€€
ƒâ"ÞZ ‰‚€€
ƒâОF¨‰‚€€
ƒâjýJω€ ‚ÿ·Multithreaded processes·Synchronization·Security·I/O·Object management1ª‰°Š1]ÿÿÿÿÿÿÿÿnÿÿÿÿ°Š܊,Š܊) "€€T˜·€L‚´€
‚ÿÓ¢°Š¯‹1oÿÿÿÿÿÿÿÿo¯‹ŒãÂIntegrating Windows NT and Banyan VinesPW(0,0,675,850,3,"MAIN");EB("btn_topic_index");SaveMark("topic_index"); CBB("btn_next_index", "PI(`nteval.hlp',`next_4')")Q+܊Œ& €V€°°˜€‚ÿIntegrating Windows NT with Banyan VinesˆU¯‹ˆŽ3 4€«€°˜€€€€ €‚‚ÿThe Microsoft® Windows NT™ operating system integrates seamlessly as either a client or server into a Banyan Vines network. Banyan's networking software provides access to information from any desktop to any network resource in a global enterprise. With Windows NT, it integrates hosts, terminals and workstations into a single, manageable network over which information can be transparently exchanged across the globe.A Windows NT-based client, can take advantage of Banyan's enterprise network services including the Global Directory (StreetTalk III), Intelligent Messaging and Security.茣Á' €Ñ€°˜€‚‚ÿAs an applications server, Windows NT can run client-server applications such as Microsoft SQL Server. Because Windows NT was designed to use the VINES Internet Protocol, a Banyan client workstation can access server applications running on Windows NT workstations on the same network.In general, a Banyan client running Windows NT is ˆŽ£Á܊integrated into a Banyan network in the same way as a Windows 3.1 client. Specifically, a Banyan client running Windows NT can take advantage of Common Login, giving you the ability to use a single username/password to automatically log on to the Banyan network through your Windows NT login. A single Banyan/Windows NT workstation provides complete access to multinetwork vendor print and file resources.AˆŽäÁ( €2€°˜€€‚ÿFor More Information:|9£Á`ÂC#V€rU0 €€°€
‚ÿ€R€°‚ÿÿÿBanyan Systems Bulletin Board Service:(508) 836-1834[äÁ»ÂC#V€0U0 €€°€
‚ÿ€€°‚ÿÿÿCompuServeGo Banyan(`ÂãÂ% €€°˜€
‚ÿ‚Q»ÂeÃ1Pÿÿÿÿ€peëÃÊÅBaxter Healthcare CorporationCBB("btn_next_index", "PI(`nteval.hlp', `next_5')")F ã«Ã& €@€°°˜€‚ÿBaxter Healthcare CorporationÆeÃÊÅY €€€°˜€€€€ €‚ãO$@T€‰€‚ãòj\€‰€‚âÌ€‚ÿIntending to provide the best distribution in the business, Baxter Healthcare Corporation teamed up with a Microsoft Solution Provider to develop an innovative Warehouse Management System built around the Microsoft® Windows NT™ operating system. The system is expected to help Baxter respond better to its customers' changing needs, which should improve the company's competitiveness.Solution SummaryCase DetailsFor More Informationi8«Ã3Æ1Á€ÿÿÿÿq3ƇÆfABackground on Baxter Healthcare Corporation - Case StudyT-ÊŇÆ' €Z€˜ŒR˜€‚ÿBaxter Healthcare Corporation Case Detailsê3ƘÉ' €Õ€°˜€‚‚ÿBaxter Healthcare Corporation provides hospitals with 120,000 different products--from sheets to heart valves. The company estimates that it supplies 70 percent of what a typical U.S. hospital buys.As part of Baxter International, the world's largest health care supplier, Baxter's strategy is to provide the "undisputed best service" to hospitals by satisfying their needs better than anyone else. One critical need all hospitals share is cost control, especially in light of the national move for health care reform. Don Schoen, Baxter's manager of Distribution Operating Systems, says improved distribution is one way Baxter can help its customers control costs. "By making our distribution more efficient, we can keep costs low," he says.1 ‡ÆÉÊ& €€°˜€‚ÿAs part of a bold move to enhance its distribution processes, Baxter developed a plan to improve its warehouse facilities, operating concepts, and system tools. Next, the company looked for the computing solution that would make the system it envisioned a reality._8˜É(Ë' €p€ČR˜€‚ÿBusiness Objectives Dictate High-Performance Solution©}ÉÊÑÍ, &€û€°˜€€
€‚ÿBaxter had several goals for the new generation of system tools that would support its 60 nonautomated distribution centers across the country. These goals included improving the centers' abilities to respond flexibly to customer requirements for enhanced distribution services; managing and controlling inventory; effectively utilizing space; improving material handling efficiency; and facilitating the monitoring and management of quality throughout the distribution process. Excellent goals--but how could Baxter achieve them without sacrificing its existing investment in its growing enterprise-wide LAN-based computing system?h>(Ë9Î* $€|€ČR˜€€ ‚ÿMicrosoft Solution Provider Contributes Specialized Skills–^ÑÍÛ8 >€½€°˜€â2²€
‰€€€‚ÿThat's the question Schoen brought to MIDAK International, a Microsoft Solution Provider. The Tucson, Arizona-based systems developer specializes in Windows-based client-server computing. MIDAK's vice president of Development, Armand Sperduti, says his company had been doing its own strategic evaluations. "Our goal as developers is to do everything under a common architecture," says Sperduti9ÎÛÊÅ. "We need the integrity of a server-based operating system we can work with into the future. After much testing and research, we decided Windows NT is that operating system." MIDAK had been using OS/2®.Ò9Îß2 2€¥€°˜€ât9€
‰€‚ÿBaxter was also pursuing the Windows NT operating system, so the two companies enjoyed an immediate rapport. Baxter and MIDAK agreed the Windows NT architecture offered them a number of appealing features, including remote supportability of the servers; integration between SQL Server for Windows NT, Windows NT Advanced Server, and Windows NT Remote Access Service (RAS) support; multiple domain administration; and compatibility with Baxter's existing LANs.®ˆÛ& €€°˜€‚ÿ"If the system went down for a day, we'd be out of business. Obviously, we're placing a lot of trust in the stability of Windows NT."¼—ßI% €/€˜€‚ÿ"Being the best in distribution commits you to effective integration with the rest of your business. This system gives us this kind of integration."œWåE Z€®€°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿDon Schoen, Manager of Distribution Operating Systems, Baxter Healthcare CorporationCI(* $€2€ČR˜€€ ‚ÿA Multifaceted Systemʝåò- (€;€°˜€‚€€‚ÿMIDAK and Baxter split the project into two phases. The first phase was an inbound system that would track products as they arrive at each regional warehouse and are moved into storage locations. The second phase involved streamlining the process of shipping products to customers.In the first phase, product information from Baxter's IBM® 3090 mainframe is downloaded to the warehouse's LAN running Microsoft LAN Manager, Windows NT, and SQL Server for Windows NT. MIDAK is providing a radio-frequency terminal interface to the database, so Baxter warehouse personnel can receive and enter information from anywhere in the warehouse--a wireless computer network. Ë(û > J€—€°˜€⶯+Ž€
‰€â·ý\j€
‰€‚ÿEach time a remote radio-frequency terminal is turned on inside the warehouse, MIDAK's RF multiplexer software receives a code and becomes that client's server--in effect, all remote units each have their own "server," thanks to the multithreading and multitasking capabilities of the Windows NT operating system. Warehouse workers use these remote units to scan product bar codes and send the information to the SQL Server for Windows NT database.FòA
* $€8€ČR˜€€ ‚ÿConfidence in Windows NT,û m & €
€°˜€‚ÿSince Baxter was making a substantial investment--the distribution system would ultimately be installed in 60 warehouses nationwide--the company wanted to be certain of a good return on that investment. MIDAK's confidence in Windows NT helped convince Schoen's group at Baxter that the operating system would offer years of pay-back, and would provide a long-term strategic platform. The company has been extremely satisfied with the performance and stability of Windows NT during the initial stages of the project.P)A
½ ' €R€ČR˜€‚ÿBenefits Expected to Exceed Objectives¶m s' €€°˜€‚‚ÿBaxter is confident that its distribution system will meet its objectives--and then some. "We believe the system will allow us to provide improved service, reduced turnaround times, and lower costs," says Schoen.Beyond these core benefits, Baxter expects the system to allow the company to improve its response to special requests while fulfilling a number of warehouse administrative functions.Y2½ Ì' €d€ČR˜€‚ÿDeveloping a Company's Future Around Windows NTŽfsfA( €Í€°˜€‚‚‚ÿWith the first phase of the distribution system set to go into a pilot location, Baxter has started work on the second phase. It will focus on optimizing product storage and shipping.And Schoen says the company is already planning to apply Windows NT and SQL Server ÌfAÊÅfor Windows NT technology in other areas.Schoen says Baxter is committed to leading the health care industry in its distribution capabilities. "It's clear to me that our Windows NT-based Warehouse Management System is a key element in accomplishing what weve set out to do--provide the best distribution services in the business," says Schoen.A̧A1&m€S‚r§AÿAôFSolution SummaryX1fAÿA' €b€˜ŒR˜€‚ÿBaxter Healthcare Corporation Solution Summary0 §A/B% €€°˜€
‚ÿIndustry3ÿAbB% €€°˜€‚ÿHealth care8/BšB$ €(€˜€
‚ÿBusiness SolutionCbBÝB% €<€°˜€‚ÿWarehouse Management System3šBC$ €€˜€
‚ÿArchitectureº”ÝBÊC& €)€°˜€‚ÿWireless computer network using radio frequency input devices to report product information to Microsoft SQL Server for Windows NT and Windows NTº‚C„D8 >€€˜€
‚€‚€ €‚€ €‚‚ÿProducts UsedMicrosoft SQL Server for Windows NTMicrosoft Visual Basic(TM)Microsoft Visual C++(TM)Microsoft Windows NTL'ÊCÐD% €N€°˜€‚ÿMicrosoft Windows NT Advanced Server<„D E$ €0€˜€
‚ÿDevelopment ResourceskÐDœE% €Ö€°˜€‚ÿMIDAK International, a Microsoft Solution Provider specializing in Windows-based client-server computing7 EÓE$ €&€˜€
‚ÿDevelopment Time{VœENF% €¬€°˜€‚ÿDesign process, three months; first phase of development, approximately five months/ ÓE}F$ €€˜€
‚ÿBenefitswRNFôF% €¤€°˜€‚ÿImproved customer service, reduced delivery times, and lower distribution costs1}F%G1Yÿÿÿÿÿÿÿÿsÿÿÿÿ%GMG(ôFMG% €€°˜€‚ÿO%GœG1`"ÿÿÿÿÿÿÿÿtœGâG÷ÇReference Books for Windows NTF!MGâG% €B€°˜€‚ÿReference Books For Windows NTëœGóI& €×€°˜€‚ÿMicrosoft Press provides a range of books on programming and technical topics that assist technical professionals through the planning, design, and implementation phases of the development project life cycle. Microsoft Press books provide systems integrators and solution developers with useful information that sharpens programming skills and helps reduce development and debugging time. For support professionals, Microsoft Press provides comprehensive reference and how to information.éâGL* "€Ó€°˜€‚€‚ÿMicrosoft Press publishes over 100 titles that contain thorough, reliable, and timely information on Microsoft applications, operating systems, and languages. These books provide a direct connection to the best and most reliable technical information sources: Microsoft development teams, programming experts, and some of the most capable writers in the industry. Many Microsoft Press books include disks with online reference information, utilities, and source code.Inside Windows NT—oóIL( €Þ€˜€‚‚‚‚‚ÿBy: Helen CusterForeword by: David CutlerPrice: $24.95 ($32.95 Can.)Length: 416 pagesISBN: 1-55615-481-XöÌL“N* "€™€°˜€‚€‚ÿAn accessible, inside look at the design, philosophy, and architecture of the revolutionary next-generation operating system that will bring into mainstream computing once-exotic concepts: microkernel architecture, object-based security, built-in networking, and client-server subsystems. Written by a member of the Windows NT development team, this book reads like a wide-ranging, in-depth discussion with the Windows NT developers.Windows NT Answer BookzSL
O' €¦€˜€‚‚‚‚ÿBy: Jim GrovesPrice: $16.95 ($21.95 Can.)Length: 224 pagesISBN: 1-55615-562-XuO“NŽ€& €Ÿ€°˜€‚ÿA fact-filled guide that provides complete, straightforward answers to the most commonly asked questions about Microsoft Windows NT. The question-and-answer format provides accessible coverage of all rele
OŽ€MGvant topics for making the decision to move to Windows NT, installing Windows NT, and implementing Windows NT. Topics include: ¢t
O0‚. *€é€°‘€€‚‚‚‚‚‚‚‚ÿHardware requirements File format systems Compatibility with other operating systems What happens to existing files and applications when Windows NT is installed The differences between Windows NT, Windows 3.1, UNIX, and OS/2 How to use Windows NT security features How to plan a Windows NT network How to share resources How to revoke a user's privilegeI$Ž€y‚% €H€°˜€‚ÿMicrosoft Windows NT Step by Step‘j0‚
ƒ' €Ô€˜€‚‚‚‚ÿBy: Catapult, Inc.Price: 29.95 ($39.95 Can.)Length: 300 pages with one 3.5" diskISBN: 1-55615-573-5Cy‚M…& €;€°˜€‚ÿSelf-paced training developed by professional trainers, for those who don't have the time for instructor-led training. With disk-based tutorials, follow-along lessons, and practice exercises, this book-and-disk package is a complete self-training course for beginners and a guide to learning specific skills for intermediate users. Lessons include starting NT, working at the desktop, running applications, managing files, using built-in accessories, securing your system, and sharing information within a group. Available September 1993.:
ƒ‡…% €*€°˜€‚ÿRunning Windows NT~WM…†' €®€˜€‚‚‚‚ÿBy: Craig StinsonPrice: $27.95 ($37.95 Can.)Length: 600 pagesISBN: 1-55615-572-79‡…>ˆ& €'€°˜€‚ÿComprehensive reference to the features and compatibilities of Windows NT, from installation to customization. Running Windows NT is truly a "look under the hood" for the new Windows NT user with helpful tutorials, great examples, advanced information, and insightful tips on running Windows NT. Useful workgroup solutions are also featured throughout the book, including using Mail to send electronic documents, sharing documents, using NT on a network, and using NT security features to protect data. Available September 1993.;†yˆ% €,€°˜€‚ÿAdvanced Windows NTÝ´>ˆV‰) €i€˜€‚‚‚‚‚ÿThe Developer's Guide to the Win32 Application Programming InterfaceBy: Jeffrey M. RichterPrice: $39.95 ($53.95 Can.)Length: 660 pages with one 3.5" diskISBN: 1-55615-567-0ÅŸyˆŒ& €?€°˜€‚ÿAdvanced Windows NT is the reference for Windows programmers who want to make the jump to Windows NT programming. It concentrates on the core areas of Windows NT programming, insightfully analyzes what's new and different about Windows NT, and provides programs that put those insights into action. Each chapter tackles a specific Windows NT programming topic and how programmers can exploit the feature or mechanism in their programs. Most chapters include a full sample program in C that demonstrates the pertinent programming techniques. This book will transform any experienced Windows programmer into a ready-to-roll Windows NT programmer. Available October 1993.I$V‰dŒ% €H€°˜€‚ÿMicrosoft Windows NT Resource KituOŒٌ& €ž€˜€‚‚‚ÿBy: Microsoft CorporationPrice: $109.95 ($148.95 Can.)ISBN: 1-55615-602-2óÇdŒ̎, &€€°˜€‚‚‚€‚ÿThe Microsoft Windows NT Resource Kit is the one-stop solution resource packed with the technical information and tools you need to support installation of Windows NT in your office. The kit includes the Resource Guide, Messages, and Optimizing Windows NT.Three-volume set boxed with eight 3.5" disks and one CD-ROM Available October 1993. Each volume is also available separately.Microsoft Windows NT Resource Kit Vol. 1: Windows NT Resource Guide›tٌg' €è€˜€‚‚‚‚ÿBy: Microsoft CorporationPrice: $49.95 ($67.95 Can.)Length: 950 pages with four 3.5" disksISBN: 1-55615-598-0©ƒ̎Â& €€°˜€‚ÿThis complete technical guide to Windows NT includes information about installing, configuring, customizing, and tgÂMGroubleshooting Windows NT. It also includes information on applications compatibility and migration from Windows 3.1, MS-DOS, OS/2, and LAN Manager using the built-in accessories; networking; and using database services with Windows NT. The four disks include a number of tools, utilities, and value-added software, including tools to manage users and groups of servers, a computer profile setup to easily set up large groups of workstations, an adapter card Help file, and an online registry database. Available October 1993.e@gÂ% €€€°˜€‚ÿMicrosoft Windows NT Resource Kit Vol. 2: Windows NT MessagesœuÂÃ' €ê€˜€‚‚‚‚ÿBy: Microsoft CorporationPrice: $39.95 ($53.95 Can.)Length: 600 pages with three 3.5" disksISBN: 1-55615-600-68ÂUÅ& €%€°˜€‚ÿAn alphabetical reference and online database that provides in-depth, accessible discussions about Windows NT and Windows NT Advanced Server messages. The messages have been loaded into a Microsoft Access database with a simple user interface. This enables the user to search the database, add personal notes under a message, back up the database, and print a selected group of messages. Included with the book are three disks containing a run-time version of Microsoft Access and the Messages database. Available October 1993.gBüÅ% €„€°˜€‚ÿMicrosoft Windows NT Resource Kit Vol. 3: Optimizing Windows NT™rUÅUÆ' €ä€˜€‚‚‚‚ÿBy: Microsoft CorporationPrice: $34.95 ($46.95 Can.)Length: 350 pages with one 3.5" diskISBN: 1-55615-619-7¢|¼Å÷Ç& €ù€°˜€‚ÿThe complete guide to Windows NT bottleneck detection and capacity planning for the desktop and network. Also includes information on designing and tuning your Windows NT applications for high performance. Included with the book is one 3.5" disk full of software accessories and utilities for troubleshooting, fine-tuning, and optimizing PC performance. Available October 1993.€OUÆwÈ1ùÿÿÿÿ††uwÈ®ÈvÊChevron Canada - Case StudyCBB("btn_next_index", "PI(`nteval.hlp', `next_5')")7÷Ç®È& €"€°°˜€‚ÿChevron CanadaÈ~wÈvÊJ b€ý€°˜€â2²€
‰€‚ãEOF“€
‰‚ã—䉂âÌÿChevron Canada designed a streamlined client-server-based pricing system to keep the company competitive in the oil industry. Today, a pricing process that used to take days to complete can be wrapped up in less than an hour. And the improvement in communication between departments and sites was another key benefit.Solution SummaryCase DetailsFor More InformationR!®ÈÈÊ1Š÷„vÈÊËY Chevron Canada - Solution SummaryI"vÊË' €D€˜ŒR˜€‚ÿChevron Canada Solution Summary0 ÈÊAË% €€°˜€
‚ÿIndustryB˃Ë% €:€°˜€‚ÿOil refining and marketing8AË»Ë$ €(€˜€
‚ÿBusiness Solution/
ƒËêË% €€°˜€‚ÿPricing3»ËÌ$ €€˜€
‚ÿArchitecture5êËRÌ% € €°˜€‚ÿClient-server4̆Ì$ € €˜€
‚ÿProducts Used{2RÌÎI `€e€°˜€€€€€€€€€‚ÿMicrosoft Access®Microsoft Windows NT Advanced ServerDCA®/Microsoft Communications ServerMicrosoft LAN ManagerMicrosoft MS-DOS®Microsoft SQL ServerMicrosoft SQL Server for Windows NTMicrosoft Visual BasicMicrosoft WindowsMicrosoft Windows NTSNA ServersSybase® APT Programming Language<†Ì=Î$ €0€˜€
‚ÿDevelopment ResourcesN)΋Î% €R€°˜€‚ÿTen-person development team; two years7=ÎÂÎ$ €&€˜€
‚ÿDevelopment Cost€[‹ÎBÏ% €¶€°˜€‚ÿ$2 million Canadian for development costs, $600,000 of which was spent on pricing system/ ÂÎqÏ$ €€˜€
‚ÿBenefitsܶBÏY & €m€°˜€‚ÿChevron Canada reduced the time necessary to make global pricing changes from 10 days to 55 minutes. MarqÏY vÊketing is more aware and accountable for the profitability of each account.Nqϧ 1z/††ÿÿÿÿw§ 𠙎 Chevron Canada - Case DetailsIY ð * $€>€˜ŒR˜€€‚ÿChevron Canada Case DetailsÞ§ ô & €½€°˜€‚ÿSince the 1960s, Chevron Canada had relied on their parent company's mainframe in San Francisco to help determine prices for the Canadian market. The British Columbia-based oil refining and marketing company calculated pricing for each transaction manually, factoring in customer history, the competitive situation, and the crude oil rate established by the Canadian government. After a profit analysis was completed on paper, order-entry people wrote the suggested number on an unpriced invoice. Then it was keyed in by the Finance Department and batched to San Francisco that night for processing. Though the process was slow and the resulting prices inconsistent, in a regulated marketplace there was little incentive to change.9ð - & €'€°˜€‚ÿDeregulation came in 1985. Suddenly, Chevron Canada faced a new set of competitive pressures. Under the regulated system, rates had been both artificially low and comfortably stable, changing only once every quarter. Now, as prices shot up six dollars a barrel or more, conservation efforts intensified; Chevron and its competitors had to scramble for a share of the smaller pie. What's more, their customers rapidly became more sophisticated as world pricing took effect. Chevron was fighting for its place in a global market. :ô g & €)€°˜€‚ÿIt was this intense competition that caused Chevron to streamline its pricing system to be more cost-effective. Because it lacked flexibility, the remote mainframe could not handle the overheated information climate of the post-1985 oil business: prices that changed by the hour; a diverse customer base that included farming, forestry, mining, trucking, airlines, and marine industries, each with a unique set of needs; and a service area that stretched from Alberta to the Yukon, requiring flexible, localized decision making. ã½- J
& €{€°˜€‚ÿChevron Canada developed a two-tiered response to the crisis. The short-term fix was to hire more clerks to handle pricing exceptions and retroactive price adjustments. Then, in early 1989 the company launched a long-term program that they hoped would dramatically reduce the need for exceptions and adjustments: they formed a task force to select and implement a new computer system designed to take Chevron Canada into the '90s and beyond. jDg ´
& €ˆ€Ϙ€‚ÿA Client-Server System That Rethinks Conventional Ways of WorkingÁšJ
u
' €5€°˜€‚‚ÿThe task force knew that finding ways to streamline the existing pricing process was critical to the success of any new information system. There was a benefit in starting with such an outdated system: since the company hadn't invested in the existing system in 20 years, the task force now had the luxury of starting virtually from scratch and building the ideal solution. As the task force began its research, a distinct personality trait began to emerge: the group was not afraid to challenge conventional wisdom. They began to look for a system that would not only solve their immediate needs, but would also give them a competitive advantage in the future. p7´
ñA 9 @€o€°˜€‚€€€€€ €‚ÿThe task force itself consisted of end users, such as marketing and finance representatives, who would actually be using the new system, as well as technical staff who would be supporting it. Therefore, the task force focused on issues like usability, interface intuitiveness, reporting simplicity, and decision-support capabilities, while still considering critical issues like raw power, reliability, and compatibility. The solution they chose is a client-server system running three Microsoft® SQL Servers on a Microsoft network. An IBM® 295 "super server" handles all transaction procu
ñA Y essing, including the pricing module. A second super server is dedicated to decision support, covering the reporting and query side of the sales system. It maintains a database that acts as a snapshot of all historical transactions that took place up to the previous day. The design of this overall solution makes up-to-the-minute information from either super server easily accessible by all 200 users--regardless of their department or location--from any Windows™ client desktop.جu
ÉD , &€Y€°˜€€!€‚ÿWhen the system first went live in 1992, it ran OS/2® on both clients and servers, with the plan to evolve toward Microsoft's future system strategy. As the technology community began to focus more on the Microsoft Windows operating system, it was easy for Chevron Canada to migrate to Windows, with no interruption in service. Today, the system configuration shows OS/2 and SQL Server running on the database servers, Microsoft LAN Manager on multiple departmental file servers, and Microsoft Windows on most of the clients. In order to implement the next step in its planned migration, Chevron will move to the Windows NT operating system platform on the server side this year.LñA H 2 2€5€°˜€€€€ €‚ÿWhen the project first started, Chevron received advice from consultants that it would take at least 50 person years to complete the work. But from the time they started writing code, it took a ten-person development team two years (approximately 20 person years) to put the pricing and order-entry components of the system into place, along with the Customer Master, the kernel of the system that contains all account information. Chevron's internal IS people worked with two Calgary, Alberta, consulting firms to develop the system. The primary development tools were Sybase® APT and the Microsoft Visual Basic™ programming system. Development costs were $2 million Canadian ($1.55 million U.S.) of which the pricing component required approximately $600,000 Canadian ($465,000 U.S.).J#ÉD _H ' €F€ČR˜€‚ÿFaster Pricing, Greater AccuracyÿÚH ^I % €µ€˜€‚ÿ"Marketing can look at the current status of a customer's pricing online, so they are more aware and accountable for an account's profit history. They are empowered with the information they need to make decisions."s._H ÑI E Z€\€°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿBill Soper, Manager of Information ServicesÙ^I ÒM ( €³€°˜€‚‚‚ÿ"Designing this new system was critical for us to remain the market leader in our industry," says Bill Soper, Chevron Canada's manager of Information Services. Today, pricing for 300 products at 70 supply points is all handled online by seven people in the marketing department at Chevron's Vancouver-area headquarters. The profitability analysis that used to be done on paper and batched to the mainframe is now done on-site.There, the marketing group can access a customer's pricing status instantly, online. This crucial information could only be found in paper reports under the old system. Prices can now be changed globally or selectively, by supply point. And because new prices are now input by the people responsible for the account, there are fewer delays and fewer errors in transposition. What's more, the shift in responsibility from finance to marketing puts information and accountability in the hands of people who affect the company's profitability most directly.H!ÑI &€ ' €C€°˜€‚‚ÿThe numbers showed that the new system gave Chevron a competitive advantage. Moving to a client-server system resulted in an estimated 65 percent overall reduction in paper handling for Chevron Canada.Shortening the billing cycle puts money in the bank for any company. Chevron Canada's billing cycle used to be 14 days long. The task force forecasts that they will reduce it to 12 days by the end of summer '93. Their goal is to tighten it even more, estimating that a one-third reduction would save $170,000 per monÒM &€ Y th in carrying charges. ˝ÒM ñ‚ . *€;€°˜€‚‚€€‚ÿThe numbers in the pricing area are equally impressive. When the system depended on handwritten information, a global price change on some products took 10 days to complete. Today, under the client-server system, those same changes take just 55 minutes. Similarly, tax changes that took 15 days under the old system are now done in just two days.Fewer transposition errors and faster pricing updates mean fewer retroactive price adjustments. While customer demand will always require some adjustments, they are handled with maximum efficiency today: where it once took half an hour apiece to do 90 price adjustments, the staff now completes 90 in half an hour. S&&€ Dƒ - *€L€ČR˜€€
€‚ÿThe Future Looks Like Windows NT™ªƒñ‚ î… ' €€°˜€‚‚ÿTo ensure that Chevron's information system would keep working for them well into the future, the task force had to build in flexibility. They designed a system that could take advantage of technological advances as they happen, including a planned migration to Windows NT. As a beta test site for Windows NT, Chevron Canada experienced many of the advances Windows NT offers. For instance, creating a database took 25 minutes under Windows NT, versus 45 minutes in OS/2--a productivity increase of 180 percent. A 250-MB sales database took one hour to load in OS/2, but only 13 minutes with Windows NT--a 462 percent productivity gain. Ö¤Dƒ Ĉ 2 2€I€°˜€â·ý\j€
‰€‚ÿAnother demonstrated advantage of the Windows NT platform is its ability to double the number of users served (compared to OS/2's capacity) with no deterioration in performance. Moreover, the multitasking capability built into Windows NT speeds up information processing and enhances efficiency. For example, Windows NT allows an end user to run more than one productivity application at the same time--in this case Microsoft Word for Windows and Microsoft Excel. That user can achieve better application integration performance particularly cutting and pasting and "hot linking" information between the applications--than when running the same two programs under OS/2.áî… ØŒ 3 4€Ã€°˜€ãcA€
‰€‚‚ÿFor the database administrator, SQL Server for Windows NT brings a new level of manageability to Chevron's servers. For example, Chevron uses the built-in administration tools in Windows NT to monitor SQL Server connections and to centrally manage security for all servers.Chevron Canada's migration from OS/2 to Microsoft Windows on the client side has already demonstrated the system's ability to adapt to changing technology. The move to Windows NT is the next logical step in a planned evolution, as business needs are redefined and the industry continues to offer new options. Chevron will be implementing scaled-down versions of its head-office LAN at other sites in the future. Some sites will have single Windows NT machines that will run SQL Server and business applications simultaneously. Other sites will have a combination of Windows NT and servers based on the Windows NT platform that will communicate with the central enterprise servers and keep all databases in sync. Á•Ĉ ™Ž , &€+€°˜€€€‚ÿIn 1989, Chevron Canada had the vision to redesign their pricing system in order to remain at the forefront of their industry. Today, because of the task force's hard work and the open-minded response of their peers, the company is a leader in the shift to a technology that helps people work together more intelligently. What's more, it remains the leading retailer of gasoline in British Columbia. 1، ʎ 1Yÿÿÿÿÿÿÿÿxÿÿÿÿʎ òŽ (™Ž òŽ % €€°˜€‚ÿ¹ˆÊŽ « 1¢ÿÿÿÿÿÿÿÿy« À tÅ An Overview of Client-Server ComputingEB("btn_topic_index");SaveMark("topic_index");CBB("btn_next_index", "PI(`nteval.hlp',`next_25')")O)òŽ À & €R€°°˜€‚ÿAn Overview of Client-Server Computing« À òŽ  a« ¬Ã ? L€Ã€˜˜€‚€€€ €€€€ €‚ÿA range of emerging business needs has placed new demands on computing systems in recent years. Businesses want to improve enterprise-wide access, management, and distribution of information to maintain their competitive advantage. In an effort to improve price/performance ratios, they are using smaller, less-expensive, networked personal computers to take over tasks traditionally performed by larger, more costly minicomputers and mainframes.At the same time, new technologies such as the Intel® Pentium™, MIPS R4x00, and DEC® Alpha AXP microprocessors have made more powerful computing models possible. Advances in communication devices, such as fiber optics, eliminate potential network bottlenecks. Graphical user interfaces (GUIs), like Microsoft Windows™, make computers more accessible and easier to use, minimizing training and support costs.Ȉ À tÅ @ N€€˜˜€‚ã¿5ú1€
‰€‚ã2Ýlã€
‰€‚ÿClient-server computing offers a key to solving the enterprise-wide computing needs of corporate, government and other organizational computer users. It offers flexible integration of disparate systems, and it provides organizations with an effective solution for a smooth upgrade path to the future.The Benefits of Client-Server ComputingRequirements for Client-Server Computing_.¬Ã ÓÅ 1NÿÿÿÿŠzÓÅ $Æ AÊ Increasingly Competitive Business EnvironmentsQ*tÅ $Æ ' €T€˜ŒR˜€‚ÿThe Benefits of Client-Server Computingé†ÓÅ
È c ”€
€°°˜€â'ôHƀ
‰€â:‘€
‰€âAkË߀
‰€â6N؀
‰€âÎkû€
‰€‚ÿBusinesses are moving to client-server systems for increased productivity, lower operating costs, the enabling of new applications, efficient management, and enhanced network performance. A Forrester Research survey lists the leading business-critical, client-server applications as: customer service, inventory, human resources, sales and marketing, and order entry.`;$Æ mÉ % €w€˜€‚ÿSixty-nine percent of corporate computing respondents in a 1992 Dataquest survey said that they already have PC-based servers in place for client-server computing. Two-thirds of corporate computing professionals said they have implemented or intend to implement client-server computing within the next two years.ԍ
È AÊ G \€€°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿ(Source: May 1993 survey by the Business Research Group (BRG) Business Research Group,User Implementations of Client-Server Computing). `/mÉ ¡Ê 1Åÿÿÿÿÿÿÿÿ{ÿÿÿÿ¡Ê Í Client-Server Computing: Increased Productivity@AÊ áÊ ' €2€ČR˜€‚ÿIncreased Productivity%ÿ¡Ê Í & €ÿ€°˜€‚ÿYou gain immediate access to up-to-date corporate data when you need it, without compromising security. In addition, you can use familiar tools, such as spreadsheets and database systems, to access data. A consistent graphical user interface reduces training and learning time. By integrating client-server applications with personal productivity applications, you can quickly build customized solutions to meet changing needs. Client-server systems are quicker to deploy than mainframe/minicomputer systems._.áÊ eÍ 1:ÿÿÿÿÿÿÿÿ|ÿÿÿÿeÍ Ç
Client-Server Computing: Lower Operating CostsCÍ ¨Í * $€2€ČR˜€€‚ÿLower Operating CostsŽfeÍ 6Î ( €Ì€˜˜€
€‚ÿAccording to BRG, cost is the greatest motivator for businesses moving to client-server computing.…G¨Í Ç
> J€€T˜‘€:‚€€ƒ‚€€ƒ‚€€ƒ‚ÿ·Client-server systems are less expensive to deploy than traditional mainframes and minicomputers. They reduce hardware, system, and software maintenance costs.·User-friendly graphical interfaces implemented with client-server systems reduce training costs.·Existing systems can be incorporated into a client-server system. For example, older PCs can add processing power to the networ6Î Ç
Í k; expensive servers and peripheral devices (printers, for example) can be shared across a large base of clients, and collections of PCs can do the work of minicomputers and mainframes.„S6Î K
1–ÿÿÿÿÿÿÿÿ}ÿÿÿÿK
]
Client-Server Computing: Power, Scalability And Portability Enable New ApplicationsrHÇ
½
* $€€ČR˜€€‚ÿPower, Scalability and Portability: the Enabling of New ApplicationséK
Ó
- (€Ó€P‘€:‚€€ƒ‚ÿ·Client-server systems are scalable and flexible. New processors, servers, and clients can be added as needs increase. Benchmark studies show the per-transaction cost of PC platforms to be less than one-tenth that of mainframes.^½
1
H `€,€T˜‘€: ‰Ña©ñ9ÉY¡é1y€ƒ‚ÿSource: Datamationh2Ó
™
6 :€e€T˜‘€:‚€€ƒ‚€€ƒ‚ÿ·A rich set of tools and APIs are available, facilitating client-server system development.·Client-server systems are very efficient. Back-end services (for example, database services) can be shared by several front-end applications at once (for example, a spreadsheet and a custom ordering tool).ė1
]
- (€/€P‘€:‚€€ƒ‚ÿ·Client-server systems help companies consolidate their information systems. 55% of those surveyed by BRG considered this to be a primary benefit.^-™
»
1ÿÿÿÿÿÿÿÿ~ÿÿÿÿ»
u
Client-Server Computing: Efficient ManagementB]
ý
* $€0€ČR˜€€‚ÿEfficient Management s»

- *€æ€T˜‘€L‚€€ƒ‚ÿ·Administrators can centrally control user access to critical, corporate information and resources on servers.Ø«ý
u
- (€W€P‘€L‚€€ƒ‚ÿ·Administrators can change desktop and server configurations, maintain security, update user permissions or troubleshoot problems from any workstation on the network.f5
Û
1úÿÿÿÿÿÿÿÿÿÿÿÿÛ
o

Client-Server Computing: Enhanced Network PerformanceJ u
%
* $€@€ČR˜€€‚ÿEnhanced Network PerformanceJ$Û
o

& €I€°˜€‚ÿClient-server architecture eliminates the need to move large blocks of information over the network to the PC for processing. The server controls data and processes requests, transferring only requested data to the desktop machine. The desktop machine then presents the requested data in an understandable fashion to the user. This process reduces network traffic and results in a network that can support more users. It is especially important for new remote and wireless technologies that connect users with limited bandwidth network channels.Y(%
È

1Öé„ÿÿÿÿ€È


¿
Requirements for Client-Server ComputingR+o


' €V€˜ŒR˜€‚ÿRequirements for Client-Server Computingƒ]È


& €º€°°˜€‚ÿClient-server computing requires an operating system that is powerful, reliable, and open.ë¬
ˆ
? L€Y€°˜€âÂcÁP€
‰€‚âR°¯ù€
‰€‚ÿYou require a system that can grow as your needs change and new options develop. A powerful operating system reduces the burden on users, administrators and developers, while offering the ability to run any type of application--from simple, stand-alone applications to sophisticated, integrated applications.You require a reliable system to maintain your competitive advantage. Downtime of business-critical applications can mean lost orders and customers, delayed communications and decision making, or manufacturing problems. A reliable operating system reduces downtime and its costs, ensures that work gets done, and always delivers the powerful solutions it promises.7
¿
2 2€ €°˜€âBäwZ€
‰€‚ÿYou want the flexibility to evolve and adopt new technology while maintaining consistency with your existing systems. An open operating system gives you the freedom to choose from a range of new options while protecting your investment in legacy systems.f5ˆ
1@
1;ÿÿÿÿÿÿÿÿÿÿÿÿ1@
D
Client-Server Co¿
1@
¿
mputing: Power For Business Solutions=¿
n@
' €,€ČR˜€‚ÿAttributes of PowerxL1@
æ@
, (€˜€P‘€4‚€€ƒ‚ÿ·Multiple applications can run simultaneously in an integrated fashion. Ún@
C
F Z€µ€RŒ‘€4‚€€ƒ‚€€ƒ‚€€ƒ‚€€ƒ‚ÿ·Both simple and complex operations are quickly handled using powerful features that are readily accessible.·Process-oriented (as opposed to task-oriented) applications are directly integrated and customized.·Applications can run on a range of computing platforms, including pen-based and notebook computers, desktop PCs, x86 and RISC-based workstations, servers and multiprocessing systems, as well as future platforms.·The system has complete scalability.Êæ@
D
6 :€•€RŒ‘€4‚€€ƒ‚€€ƒ‚ÿ·The system accesses and integrates with enterprise computing resources.·The system thrives in heterogeneous, multi-vendor environments that include a range of systems, standards and protocols.l;C
rD
1²ÿÿÿÿÿÿÿÿ‚ÿÿÿÿrD
¸I
Client-Server Computing: Reliability For Business SolutionsDD
¶D
* $€4€ČR˜€€‚ÿAspects of Reliability
ÌrD
ÀF
> J€™€RŒ‘€:‚€€ƒ‚€€ƒ‚€€ƒ‚ÿ·Monitoring tools minimize failure through early detection and correction of potential problems.·Fault tolerance features protect power supplies, disks, and applications. In the event of failure, much of the system continues to operate (for example, through application and system isolation), and full recovery happens quickly.·Integrated data backup features are extensible and hardware independent. Data is protected against loss and corruption.*ܶD
êH
N j€¹€RŒ‘€:‚€€ƒ‚€€ƒ‚€€ƒ‚€€ƒ‚€€ƒ‚ÿ·The system offers high security against theft and tampering.·Security features prevent inadvertent and malicious interference with the system, while providing seamless access to authorized information.·Implementation of security is flexible and changes to user or system requirements are simple to do.·Management functions are centralized.·Administrators can monitor system performance and availability, and correct problems from anywhere on the network.ΠÀF
¸I
. *€A€RŒ‘€:‚€€ƒ‚ÿ·The underlying technology is backed by sufficient testing and design expertise, and has strong industry support from hardware and applications developers.i8êH
!J
1ûÿÿÿÿÿÿÿÿƒÿÿÿÿ!J
³N
Client-Server Computing: Openness for business solutionsN!¸I
oJ
- *€B€ČR˜€
€€‚ÿ Characteristics of Opennessk!J
ÚL
V z€+€RŒ‘€:‚€€ƒ‚€€ƒ‚€€ƒ‚€€ƒ‚€€ƒ‚€€ƒ‚ÿ·Works with a broad range of rich applications.·Offers a wide selection of powerful, cost-effective development tools.·Interoperates with legacy systems.·Supports industry-standard protocols, networks, and network management systems to connect and access information and services already deployed on other systems.·Is hardware independent.·Gives users the flexibility to implement solutions on their hardware platform of choice, and the ability to increase the power of that platform as their needs increase.Ù“oJ
³N
F Z€'€RŒ‘€:‚€€ƒ‚€€ƒ‚€€ƒ‚€€ƒ‚ÿ·Provides a large number of vendors, solution providers and integrators from which to choose.·Integrates personal productivity applications with business-critical applications on the same platform.·Gives users the ability to update systems, peripherals, applications, and tools without learning new skills or incurring further training and support costs.·Offers cost-effective upgrades.1ÚL
äN
1Zÿÿÿÿÿÿÿÿ„äN
ÿÿÿÿ
O
)³N

O
& €€¼˜˜€"‚ÿ‡VäN
”O
1ùÿÿÿÿ…”O
ÒO
–
AT&T Inbound Services - Case StudyCBB("btn_next_index", "PI(`nteval.hlp', `next_5')")>
O
ÒO
& €0€°°˜€‚ÿAT&T Inbound Servicest1”O

C T€c€°˜€€€€ €ÒO


O
‚ãÞô–™€
‰‚ãiªÐ‰‚ÿTo provide a more cost-effective and easier-to-use platform for its telecommunications management software, AT&T moved to the Microsoft® Windows NT™ operating system to give its business customers greater power and flexibility in managing their vital 800 numbers.Solution SummaryCase DetailsDÒO
–
+ &€2€˜˜âÌï€
‰‚ÿFor More InformationHR
ށ
1 4‹^†Þ

÷…
AT&T - Solution Summary?–

' €0€˜ŒR˜€‚ÿAT&T Solution Summary4 ށ

( €€°˜€€‚ÿIndustry:‚
‹‚
% €*€°˜€‚ÿTelecommunications8Q‚
Â
$ €(€˜€‚ÿBusiness SolutionH#‹‚
ƒ
% €F€°˜€‚ÿInbound call-management software3Â

$ €€˜€‚ÿArchitecturek ƒ
΃
% €Ö€°˜€‚ÿCustom Windows-based applications running on Windows NT linked over a wide area network to host machines8>ƒ

' €"€˜€€‚ÿProducts Used‡_΃
„
( €¾€°˜€‚ÿMicrosoft Visual BasicMicrosoft Windows NTMicrosoft Windows NT Advanced ServerBorland C++3 „
À„
' €€˜€€‚ÿBenefitsšn„

, (€Ü€T˜ÚH‚Z€
€ƒ‚ÿ·Eliminated extensive, specialized customer training requirements for operating systems and applications.qÀ„
÷…
, (€â€T°ÚF‚Z€
€ƒ‚ÿ·Lowered hardware entry price point for mission-critical solutions by at least 80 percent, to roughly $3000.DZ…

10ÿÿÿÿ‡;†

ÊB AT&T - Case Details;÷…

' €(€˜ŒR˜€‚ÿAT&T Case DetailssM;†
é‡
& €›€°˜€‚ÿ"Some of our customers have in excess of half-a-million phone calls a day, which vary in length from six seconds to hours. The way AT&T sees it, every single call is vital to that customer's business. We don't just complete the call--the Inbound mission is to provide for the successful completion of our customers' transactions."{7v†

D X€n€‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿJoe Aiuto, product manager for AT&T Inbound Services yé‡

' €ó€°°˜€‚ÿBusinesses today depend on "800" numbers (and now "900" numbers) more than ever before as a core part of their operations. For example, every time a credit card purchase is made at a local store, the clerk slides the card through an automated reader that dials the credit card vendor via an 800 number. Computers answer the line and process the transaction without human intervention. And there's the nationwide retailer with hundreds of customer service representatives taking catalog orders over phones at seven sites across the country. Or the 900 number that the buyer of a new computer might call to get technical assistance.¹Œdˆ
½
- (€€°˜€‚€€‚ÿIn all these cases it is imperative that the calls reach their destination and that the callers aren't left waiting. Too long a wait or a misdirected call can result in a lost sale or an angry customer. Moreover, companies today are looking at their phone calls as a source of strategic business information--from how well a regional advertisement worked to the immediate spotting of high-demand products in order to adjust manufacturing and inventory volumes.AT&T® Inbound Services provides these 800- and 900-number services to over 1 million businesses, ranging from small shops such as a local auto parts dealer to every Fortune 500 company. n;‹

3 4€w€°˜€‚€€€€‚ÿ"Some of our customers have in excess of half-a-million phone calls a day, which vary in length from six seconds to hours. The way AT&T sees it, every single call is vital to that customer's business. We don't just complete the call, the Inbound mission is to provide for the successful completion of our customers' transactions," explains Joe Aiuto, product manager for AT&T Inbound Services.For the last several years, AT&T has offered a high-end family of products that telecommunications managers in each business can use ½

÷…
to monitor call activity, route calls to their different sites, and identify key trends and warning signs. Called the ACCUMASTER® Services Family of Network Management Software, these telecommunication management systems are UNIX®-based, requiring workstation hardware and customized training.F½

' €>€ČR˜€‚ÿGrowth Required New PlatformöÃ7Á

3 4€‡€°˜€‚€ €€€‚ÿAs demand for AT&T's 800-number services grew to include a wide range of businesses and customers, the need became evident for an additional systems platform. "As more customers needed access to these network management tools, it was necessary to develop them on a platform that supported a common interface that was already widely accepted in the marketplace, one that a business user is typically working with in his or her daily environment," says Aiuto. To address this need, AT&T had begun to offer its telecommunications network management software on Windows™ 3.1 running with MS-DOS®, calling these applications the ACCUMASTER Services Personal Computer Software. While this solution provided a standard graphical environment, many of AT&T's larger customer sites needed additional system power. Aiuto sought an alternative that would give users a standard interface and that had the power and sophistication for large mission-critical situations.Y2}Á
ÌÅ
' €d€ČR˜€‚ÿWindows NT Provides Strong Application PlatformÈ‚sÅ
Ӄ
F Z€€°˜€‚‚â·ý\j€
‰€€€€ €€ €‚ÿAT&T Inbound Development is targeting Windows NT as the optimum platform for many of its 800-number customers and their network management software applications. One of the key ACCUMASTER applications originally developed for UNIX is Routing Manager, which is what telecommunications managers use to direct calls to various locations in real time. Grant Smith, development team leader for AT&T, is creating a version of this application for Windows NT, as well as creating entirely new telecommunication applications that will take advantage of the 32-bit, multitasking, and networking strengths of Windows NT. Currently, the AT&T programming staff are using Borland® C++ and the Microsoft Visual Basic™ programming system for the bulk of the development, while evaluating Microsoft Visual C++™ development system, WATCOM C/386 for Windows NT, and the 32-bit version of Borland C++. 7ÌÅ
ËË
& €#€°˜€‚ÿMoving to Windows NT will not require a change in the basic way AT&T delivers the information to telecommunications managers. The raw data on the phone calls will still be downloaded from AT&T host systems that manage the initial calls, to the customer's local computer network over high-speed transmission lines. This link is a two-way street. Not only do telecommunications managers receive the data in real time, they are also able to give "orders" to the hosts, such as redirecting calls to another customer service site. è¶”É
³Í
2 2€m€°˜€â
£ÅC€
‰€‚ÿAiuto expects that each of his ACCUMASTER Services Personal Computer Software customers that use Windows NT on the desktop will have at least one local network running Windows NT Advanced Server. This network takes advantage of the domain name services and TCP/IP protocols of Windows NT for the wide-area-network link to the AT&T hosts. "That would be our point of presence with the customer," notes Development Team Leader Smith.K$ËË
þÍ
' €H€ČR˜€‚ÿCustomers Benefit in Several Waysƒ^³Í
Ï
% €½€˜€‚ÿ"Under Windows NT, we look forward to being able to say that our same applications now have a mission- critical capability by virtue of the fact that Windows NT offers us a C2 level of security--multitasking, multithreaded security--that will not take that machine out of service, which is a requirement. Its a measurement of quality within AT&T."q-þÍ
D X€Z€‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿGrant Smith, Development Team Leader, AT&TÏ
÷…
}VÏ
‰ ' €­€°°˜€‚ÿAccording to Aiuto, by expanding the ACCUMASTER Services software to Windows NT, AT&T customers will be able to take advantage of a large base of existing technology while benefiting significantly in the areas of reduced training, reliable networking and security, and a lower entry price for mission-critical network management solutions.Z3 ã ' €g€°˜€‚‚ÿ"The applications that we are developing around the Microsoft Windows and Windows NT operating systems don't require extensive customized training for users," explains Tom Hicks, development manager on the project. "Once they install the software, our customers can be up and running right away because it's a graphical user interface they're used to working on." While security is a traditional weak point with PCs, says Smith, Windows NT offers surprising strength. "Security is a key issue with AT&T and with our customers because we value and respect the privacy of their information. We wanted to be able to talk to UNIX workstations. We wanted to be able to talk to other PCs. So what we needed was the capability of securing an application, securing an executable file. And Windows NT allows me to do that." Üž‰ ¿ > J€=€°˜€â2²€
‰€⶯+Ž€
‰€‚ÿSmith points out that the real benefit comes from a network perspective. "In a networking environment, I feel Windows NT provides enhanced security," he explains. "Both from an administrative standpoint and a user's standpoint, because of the way that Windows NT was developed with a client-server model in mind. Under Windows NT, we look forward to being able to say that our same applications now have a mission-critical capability by virtue of the fact that Windows NT offers us a C2 level of security--multitasking, multithreaded security--that will not take that machine out of service, which is a requirement. It's a measurement of quality within AT&T."ŒMã K ? L€›€°˜€‚€€€ €€€€ €‚ÿCost is also a key customer benefit in expanding to Windows NT. At the time AT&T Inbound Services made the decision to develop solutions for its customers on Windows NT, "We were looking for a lower entry price point for delivering mission-critical, high-performance solutions, and sufficient power and scalability for growing with our customer needs," explains Aiuto. "Windows NT provides the capability for us to deliver robust applications on systems costing roughly $3000, and the cross-platform capability enhances its value. Customers needing more power can take our Windows NT-based applications with them onto hardware platforms such as MIPS® and Pentium™ chips, DEC® Alpha's, and SPARC™ systems." The new entry-level price point, according to Aiuto, is at least one-fifth the hardware price of traditional high-end systems. {U¿ Æ
& €«€°˜€‚ÿOf course, the standard environment of Windows provides benefits to the customer as well. Development Manager Hicks cites an example of a hypothetical telecommunications manager whose New Jersey customer service office was closed by a gas leak. From a standard desktop PC, the manager could use AT&T's Windows-based Routing Manager software to divert calls to the Florida office. Then, without having to change operating environments or move to a different system, that manager could simply bring up another window and send an e-mail message to the Florida office, notifying them of the change.V/K  ' €^€ČR˜€‚ÿFuture Services Will Demand New Applications­€Æ
ÕA - (€€°˜€€ €‚‚ÿ"As new AT&T inbound services and advanced features are developed, we will develop new applications and new tools to allow our customers to be able to manage those services. We will utilize Windows NT to develop applications that will be deployed on systems running Windows, Windows™ for Workgroups, and--especially--on Windows NT," says Aiuto. "Those applications will involve distributed computing, networking, and client-server techn ÕA ÷…
ology."One of those planned applications is called the Online Call Detail Manager (OCDM), which will run under Microsoft SQL Server for Windows NT. According to Aiuto, OCDM is a master database that will store detailed information on every call placed to a company's 800 number--where it came from, the duration, who answered it, and so on. The company can analyze this data from many different views for marketing planning, staffing decisions, and more.õÏ ÊB & €Ÿ€°˜€‚ÿWhen each phone call can mean dollars lost or profit earned, the OCDM database and all the ACCUMASTER Services software for Windows NT can add up to a significant competitive advantage for AT&T customers.1ÕA ûB 1YÿÿÿÿÿÿÿÿˆÿÿÿÿûB #C (ÊB #C % €€°˜€‚ÿŠYûB ­C 1Mÿÿÿÿ‚‰­C îC
F Freightliner Corporation - Case StudyCBB("btn_next_index", "PI(`nteval.hlp', `next_5')")A#C îC & €6€°°˜€‚ÿFreightliner CorporationÔˆ­C ÂE L f€€°˜€€€€ €‚ãùðžV€
‰€‚ãôØ©c€
‰€‚ÿFreightliner's Microsoft® Windows NT™-based information system, ServicePro, integrates several independent systems and applications to help the company maintain a leadership position in an increasingly competitive industry. ServicePro helps technicians repair trucks faster and more efficiently, while reducing customer downtime and repair costs. Solution SummaryCase DetailsHîC
F . ,€4€˜˜âÌï€
‰€‚ÿFor More Information\+ÂE fF 1¼Ҁ®‡ŠfF ¹F DK Freightliner Corporation - Solution SummaryS,
F ¹F ' €X€˜ŒR˜€‚ÿFreightliner Corporation Solution Summary4 fF íF ( €€°˜€€‚ÿIndustry:¹F 'G % €*€°˜€‚ÿTruck manufacturer8íF _G $ €(€˜€‚ÿBusiness Solution\7'G »G % €n€°˜€‚ÿTruck dealership and fleet service and repair system3_G îG $ €€˜€‚ÿArchitectureΨ»G ¼H & €Q€°˜€‚ÿServer based on the Windows NT platform, providing a single graphical client interface that integrates mainframe, minicomputers, and other Windows-based applications4îG ðH $ € €˜€‚ÿProducts Used½’¼H ­I + $€%€°˜€‚ÿMicrosoft SNA ServerMicrosoft SQL Server for Windows NTMicrosoft Visual BasicMicrosoft Visual C++Microsoft Windows 3.1Microsoft Windows NT7ðH äI $ €&€˜€‚ÿDevelopment TimeZ5­I >J % €j€°˜€‚ÿTwelve months from initial design to system launch/ äI mJ $ €€˜€‚ÿBenefitsד>J DK D V€'€T˜ÚF€€
ƒ€‚€€
ƒ€‚€€
ƒ€‚ÿ·Faster, more accurate truck repairs·More profitable service operations·Lower vehicle operating costs through better record-keeping`/mJ ¤K 1ÿÿÿÿÿÿÿÿ‹ÿÿÿÿ¤K WN Freightliner Corporation - For More Information>DK âK ' €.€ČR˜€‚ÿFor More Informationu1¤K WN D V€c€°˜€€€€€€€€€€€‚ÿFor Microsoft Consulting Services in the United States, call (800) 922-9446.For more information about Microsoft products and Solution Providers, in the 50 United States call Microsoft Inside Sales at (800) 227-4679. In Canada, call the Microsoft Canada Customer Support Centre at (800) 563-9048. If you require Text Telephone (TT/TDD) services for people who are deaf or hard of hearing, call (800) 892-5234 in the United States and (416) 568-9641 in Canada. Outside the 50 United States and Canada, please contact your local Microsoft subsidiary.LâK £N 129‚ÿÿÿÿŒ£N òN TB Freightliner - Case DetailsO(WN òN ' €P€˜ŒR˜€‚ÿFreightliner Corporation Case DetailsöÏ£N ô€ ' €Ÿ€°°˜€‚ÿFreightliner Corporation, a wholly owned subsidiary of Daimler-Benz, is North America's leading manufacturer of heavy-duty trucks, and is determined to stay ahead of the pack. With more than 23 percent of the market in 1992, the còN ô€ WN ompany ranked first in retail sales. But to gain equal footing in the critical aftermarket service business, Freightliner needed to give its dealers a better way to manage the enormous quantities of information they use every day.“[òN ‡ƒ 8 >€·€°˜€€€€€€ €‚ÿTo run their businesses, the 250 Freightliner dealers throughout North America previously contended with an assortment of disparate computer systems. For accounting, invoicing, tracking inventory, and recording repair orders, they used several kinds of stand-alone minicomputers from a variety of service bureaus running systems based on RISC, AS/400®, and UNIX®. For specifying and ordering truck parts, they used a Windows™- and LAN-based electronic parts catalog called PartsPro. And to obtain truck warranty information, they accessed the Freightliner mainframe using 3270 terminals or PCs.W1ô€ ޅ & €c€°˜€‚ÿThis conglomeration of systems, not to mention the shelves of manuals and microfiche in every dealership, "was a Tower of Babel," according to Freightliners Director of Technical Service Systems, Doug Vakoc. "Every kind of information was on a different system, each with its own format, interface, sign-on procedure, and so on. This made it very difficult for people to find information and to stay up-to-date. Ultimately, the confusion cost us money--in lost service opportunities and the erosion of customer confidence when there were delays or mistakes."Y2‡ƒ 7† ' €d€ČR˜€‚ÿPoor Information Access Hampers Service Effortsòޅ O‡ & €å€˜˜€‚ÿBecause the computer systems were based on various platforms, and because some of Freightliner's business areas were not automated, dealers and fleet technicians faced the following issues--all of which are common in the trucking industry:¬]7† û‰ O l€»€T˜î:‚l€€ƒ€€‚€€ƒ€€‚€€ƒ€€‚ÿ·Training. With so many different systems in use, training the technicians and dealer personnel on warranty, parts, and diagnostic services was costly and potentially confusing to employees.·Information access. Service information, stored on paper or microfiche, often had to be located before repairs could be done. Finding the right information was time-consuming, and the information itself was sometimes out-of-date.·Diagnostics. Technicians found the information available to properly diagnose and repair problems limited, and sometimes too simplistic for some service procedures. ëªO‡ æ‹ A P€U€T˜î:‚l€€ƒ€€‚€€ƒ€€‚ÿ·Maintenance. Without an easy way to access service updates, recall campaigns, and maintenance schedules for each truck, dealers missed opportunities to "piggyback" this work with repair service.·Warranties. Unlike automobiles, truck service warranties can be custom-configured for each vehicle from a wide variety of options. Dealers had difficulty figuring out whether specific repairs were covered by warranty.Üû‰ è & €¹€°˜€‚ÿThese problems were compounded by the increasing sophistication of today's trucks which, designed to meet environmental regulations and competitive pressures, have grown more complex to diagnose and repair. Moreover, today's truck fleet operators have very little tolerance for downtime. In an industry that has seen more than 60 percent of truck carriers go out of business since it was deregulated in 1980, lowering the cost of fleet operation is a competitive necessity.W0æ‹ ?Ž ' €`€ČR˜€‚ÿIntegrated System Brings Information to UsersæÁè % % €ƒ€˜€‚ÿ"Our customers expect a reliable place to have truck repair and maintenance done, with consistent, high-quality service. We built ServicePro to raise the overall performance of our dealers."“N?Ž ¸ E Z€œ€°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿDoug Vakoc, Director of Technical Service Systems, Freightliner Corporationõ% ß & €ë€°˜€‚ÿWith a corporate goal to be the i¸ ß WN ndustry's leading provider of support services as well as premium vehicles, Freightliner set about addressing these challenges. The company's sophisticated solution, called ServicePro, is an integrated information system that will be installed on servers running the Microsoft Windows NT operating system at all Freightliner dealerships. Designed and developed with the assistance of Microsoft Consulting Services (MCS), ServicePro incorporates state-of-the-art technology with point-and-click simplicity. It allows dealer service writers to perform their daily work--diagnosing truck problems, looking up warranty and service information, generating repair orders, and selling parts and service--at the push of a button.'⸏ Ç E X€Å€°˜€â2²€
‰€€ €‚€ €€ €‚ÿServicePro achieves this simplicity through a client-server architecture that allows client applications running with Microsoft Windows™ for Workgroups or Windows 3.1 to access any information--whether it is located on the server based on the Windows NT platform, the Freightliner mainframe, or the dealer's minicomputer-based business system.ServicePro's graphical front end, prototyped with the Microsoft Visual Basic™ programming system and developed with the Microsoft Visual C++™ development system, provides menu access to Windows 3.1-based client applications developed by third parties. These applications supply parts information, service literature, and diagnostic assistance. Because they are based on the Windows operating system, the applications--several of which were purchased specifically for integration into the ServicePro system--were able to be used without modification both on the Windows-based PC clients and on the server based on the Windows NT platform.Y3ß _Ê & €g€°˜€‚ÿThe centerpiece of the ServicePro system is each dealer's server, which provides communication, data management, and file server capabilities. Through SNA Server, the server communicates with Freightliner's Amdahl mainframe, where information on warranty coverage, components, and service campaigns is stored. In addition, a custom-designed application on the server communicates directly with the business applications running on dealers' minicomputers, giving users access to customer information each dealer stores there. In ServicePro's distributed database architecture, each dealer's server runs Microsoft SQL Server for Windows NT. The SQL Server database stores all information necessary to create a repair order. This information can be customized to reflect the dealer's individual shop repair procedures. €6Ç ßÌ J b€m€°˜€ât8 ‰€âp.ÍØ€
‰€â÷îym€
‰€‚ÿFreightliner's decision to implement ServicePro on the Windows NT operating system was based on several key technical features of the operating system. These include its scalability and portability; high performance for disk caching; support for symmetric multiprocessing machines; support for applications that require more than 16 MB of memory; support for hard-disk striping, database management services, and connectivity services; and the ability to run existing 16-bit applications for Windows seamlessly on the server's 32-bit operating system.T-_Ê 3Í ' €Z€ČR˜€‚ÿConsultants Share Knowledge in PartnershipôÎßÌ 'Ï & €€°˜€‚ÿFor several reasons, Freightliner management decided early that ServicePro would be a Windows-based system. One of the key applications in the ServicePro system ran under Windows. Moreover, other Windows-based applications were available from specialized software vendors---there was no reason to coauthor or cofund the development of new applications. "We chose the Windows operating system because we knew the software we needed was available," says Vakoc. sM3Í ¦ & €›€˜˜€‚ÿFreightliner also knew from the outset that it would need outside resources to help develop ServicePro. Not having in-house expertise to write Windows-based applications to integ'Ï ¦ WN rate the new system, Freightliner evaluated several consulting firms. Microsoft Consulting Services was selected on the basis of the following criteria:“R'Ï 9 A P€¥€T˜ì:‚l€€ƒ€€‚€€ƒ€€‚ÿ·Knowledge of programming for Windows. "Since we had already decided that ServicePro would be Windows-based, our consultants' familiarity with programming and applications for Windows was a must," says Vakoc. "We also wanted a strong, real, client-server environment. We thought Microsoft was in the best position to get us up to speed on Windows NT early." ·Skills transfer. Freightliner chose MCS for its ability to convey knowledge about Windows NT and client-server technology, putting Freightliner in a stronger position to manage ServicePro on its own and, down the road, to design other client-server systems and applications for Windows NT. "We also wanted a partner who generates ideas," explains Vakoc. "In our experience, we've worked with other consultants who were mostly executing our ideas, but MCS shared the creative work with us. This was a very sophisticated project--especially in the communications area--and we knew that, with complex projects, there are always setbacks. It's easy to get discouraged. Because we clicked with the MCS people, it kept our motivation high."ͦ 9 3 4€›€T°ì:‚l€€ƒ€€‚ÿ·Partnership. "Our priority was to choose who we viewed to be the best long-term partner," says Vakoc, "who can help us develop our ideas into long-range strategies and implement them most quickly."[49 ” ' €h€ČR˜€‚ÿServicePro Increases Efficiency and ProfitabilityX29 ì & €e€°˜€‚ÿServicePro makes daily operations dramatically easier and more efficient for Freightliner dealers. For example, instead of wading through piles of microfiche or service binders, dealers can call up service bulletins and work instructions, including illustrations, to view on-screen or to print. CasePoint, the Windows-based artificial intelligence application integrated into ServicePro, guides service writers through diagnostic questions that help isolate the cause of a problem before the technician begins work. The service writer can then instantly determine if the needed part is in stock and whether the repair is covered by warranty. At the same time, the system alerts the user to other work that may be performed along with the repair--whether it be routine maintenance or an outstanding service campaign.rL” ^ & €™€°˜€‚ÿServicePro will help dealers work more cost-effectively by reducing faulty repairs, and it will help them receive faster reimbursement for warranty work through better record-keeping. Moreover, ServicePro's guided procedures will make it easier for dealers to train technicians and advisers; eventually, ServicePro will include special training modules, as well. As ServicePro improves the overall quality of customer service, Freightliner expects to see higher customer loyalty after warranties expire. In turn, this will create more parts and service business for the dealer network.òì w ' €å€°˜€‚‚ÿ"Through ServicePro, we can help our customers use their trucks more profitably, while helping our dealers achieve higher profitability too," says Vakoc. "We estimate that ServicePro will help our dealers substantially increase their nonwarranty service business."For customers, ServicePro will contribute to faster, more accurate truck repairs, less downtime, and lower repair costs. Scheduled maintenance and service campaigns also will be done in a more efficient way, saving time and money.þØ^ u & €±€°˜€‚ÿCompanywide, ServicePro will reduce warranty costs by helping dealers avoid unnecessary repairs. In addition, ServicePro will capture reliable repair histories that enhance the value of vehicles for future owners.L%w Á ' €J€ČR˜€‚ÿDoing It Right, Today and Tomorrow‡`u TB ' €Á€°˜€‚‚ÿIn future versions of SÁ TB WN ervicePro, Freightliner sees an important role for pen-based tablets and wireless LANs that will allow technicians to take diagnostic programs right to the truck. The company hopes to introduce a pen-based ServicePro system in 1994.For now, as it introduces ServicePro at dealerships across the country, Freightliner expects to see tangible benefits right away. By providing instant access to information, ServicePro helps dealers and fleet technicians do repairs more efficiently. Says Vakoc: "It's mind-boggling what benefits ServicePro can deliver to our dealers and customers."1Á …B 1Yÿÿÿÿÿÿÿÿÿÿÿÿ…B ­B (TB ­B % €€°˜€‚ÿyH…B &C 1ãÿÿÿÿEŽ&C ZC E Reuters - Case StudyCBB("btn_next_index", "PI(`nteval.hlp', `next_5')")4 ­B ZC ) "€€°°˜€€‚ÿReuters*÷&C „D 3 4€ï€°°˜€€€€ €‚ÿWith the Reuter Terminal service moving to the Microsoft® Windows NT™ platform, securities brokers and dealers around the world gain the critical advantage of faster desktop performance while analyzing global real-time news and market data.ˆ@ZC E H `€€€°˜ã%‡U“€
‰€‚ãà„5J€
‰€‚âÌï€
‰€‚ÿSolution SummaryCase DetailsFor More InformationK„D WE 1ö€rƒWE ™E ^I Reuters - Solution SummaryB E ™E ' €6€˜ŒR˜€‚ÿReuters Solution Summary4 WE ÍE ( €€°˜€€‚ÿIndustryF!™E F % €B€°˜€‚ÿNews and financial information8ÍE KF $ €(€˜€‚ÿBusiness Solution[6F ¦F % €l€°˜€‚ÿWorld news and financial market information service3KF ÙF $ €€˜€‚ÿArchitecture‹f¦F dG % €Ì€°˜€‚ÿPC workstations and servers delivering real-time information from mainframes over worldwide network4ÙF ˜G $ € €˜€‚ÿProducts Used¯„dG GH + $€ €°˜€‚ÿMicrosoft ExcelMicrosoft Windows NTMicrosoft Windows NT Advanced ServerBorland BriefIntersolv PVCSPrimia Software Codewright/ ˜G vH $ €€˜€‚ÿBenefitsxIGH îH / .€’€T˜ÚH‚Z€ƒ€€
‚ÿ·Increased workstation performance for math-intensive computations p>vH ^I 2 4€|€T°ÚF‚Z€€
ƒ€€
‚ÿ·Substantially reduced hardware costs for workstations GîH ¥I 1ïEÿÿÿÿ¥I ãI ¬Æ Reuters - Case Details>^I ãI ' €.€˜ŒR˜€‚ÿReuters Case DetailsúÇ¥I ÝL 3 4€€°°˜€€ €€!€‚ÿTo maintain its position as the world's leading electronic information publisher, Reuters is committed to taking advantage of the latest technology to deliver news and financial market information in real-time to a worldwide network of over 200,000 terminals. With securities brokers and foreign exchange dealers depending on up-to-the-second information to make financial transactions, Reuters is constantly looking for ways to give its customers a performance edge. Since 1990 the company has offered its core product--the Reuter Terminal--as a Windows™-based PC workstation running Microsoft Excel for financial calculations. Reuter services are also offered for dumb terminals and UNIX® workstations."üãI ÿN & €ù€°˜€‚ÿ"The process of establishing price and risk is called financial engineering. It has a tremendous amount of math in it and the math has to be done very quickly," explains Buford Smith, president of Reuters Information Technology. "Often a dealer has a client on the telephone and needs to quote a price to him and has to figure out what the price should be. The underlying financial instrument may be changing value as often as several times a second, so you have to have quite a bit of system capability."‡ZÝL ’ - (€µ€°˜€‚€!€‚ÿAccording to Smith, the Windows PC platform is very popular with Reuters customers, with the installed base of Windows-based Reuter Terminals growing at a rate of thousands per year.While the ease of use of a PÿN ’ ^I C graphical environment was a decided advantage for traders and brokers around the world, there were still areas to improve. Smith notes that many of their customers needed greater performance than a PC running the Windows operating system under MS-DOS® could provide: "Basically we had to limit some of the math you could do in order not to overrun the broadcast network," notes Smith.hBÿN ú & €„€Ș€‚ÿWindows NT-based Solution Impacts Both Workstations and Servers6’ 0… ' €€°˜€‚‚ÿTo provide greater performance while maintaining the graphical ease of use of Windows, Reuters adopted the Microsoft Windows NT operating system as a new standard for the Reuter Terminal. "We definitely see a demand for being able to do more computations on the desktop and up until now, in order to satisfy that, basically we would have had to supply a much more expensive workstation," explains Smith.Reuters is applying Windows NT and Windows NT Advanced Server in two areas--on the client workstations that deliver and customize the data on the desktops of the traders, and as the primary back-end server operating system that makes the bridge between the terminals and Reuters's constant data downloads from their three worldwide data centers in Tokyo, London, and New York.#ýú Sˆ & €û€°˜€‚ÿThe mainframes at these data centers receive constantly updated information throughout the day from about 150 stock and commodities exchanges as well as over 3000 firms around the world that contribute prices on other tradable financial instruments such as foreign currencies. This information is transmitted over satellite and cable to 25,000-plus customer sites in over 110 countries. At customer sites with computer networks, this information is received and stored on a PC server running Reuters proprietary database software. Until recently, some of the servers associated with Reuter Terminals ran under UNIX. According to Smith, Reuters is converting its server database software and all of its PC network servers to run under Windows NT Advanced Server. ?
0… ’‰ 2 2€€°˜€€€€ €‚ÿThe development staff at Reuters is using several tools to create the Windows NT-based versions of its terminal and server software. These include Borland® Brief, Primia Codewright, Intersolv™ PVCS, and the tools in the Windows NT Software Development Kit (SDK).K$Sˆ ݉ ' €H€ČR˜€‚ÿWorkstation Performance, PC PriceÓ®’‰ °Š % €]€˜€‚ÿ"The bottom line is that Windows NT will enable us to significantly increase the mathematical capabilities of our terminals, and will broaden the appeal of our services." …@݉ 5‹ E Z€€€°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿBuford Smith, President, Reuters Information Technology, Inc.™Z°Š ΍ ? L€µ€°˜€â•õì€
‰€â¥ZÒ€
‰€‚‚ÿWhat are the benefits of this move to Windows NT? "For us, performance is the primary reason for making the transition to Windows NT," says Smith. Specifically, he identifies the 32-bit capability of Windows NT and its support for RISC workstations and multiple processors. "We can envision having Reuter Terminals with a tremendous improvement in mathematical capability for people doing financial engineering work."Cost savings will play a role as well. Smith explains that Windows NT allows Reuters to offer high-end networked workstations at a lower cost than traditional workstations. ó5‹ óÀ & €ç€°˜€‚ÿThe move to Windows NT and Windows NT Advanced Server on the back-end server also provides a benefit to the many Reuters customers who do not have a network. "One of the things the Windows NT-based platform will give us is a much more simplified approach to bringing the server and the workstation applications together on a single piece of hardware," notes Smith. "We can't do that right now and a lot of our clients have a single key station. So instead of having to supply them with a UNIX server and a Windows-based PC ΍ óÀ ^I we'll be able to supply them one Windows NT-based set of hardware that actually runs the server application and the workstation application both. That will be a significant cost reduction for us. And ultimately for the customer."^8΍ Q & €q€°˜€‚ÿReuters is committed to supplying the tools that best fit their customers' needs. "We still have lots of UNIX customers and will continue to expand upon and improve our UNIX offerings, but for the customers who want to use PCs and stay in the Windows graphical environment, this will be a tremendous benefit."^7óÀ ¯Â ' €n€ČR˜€‚ÿAdditional Services Look to Windows NT in the FutureÐQ ²Å 3 4€¡€°˜€€!€€!€‚‚ÿSmith points out that Windows NT gives Reuters and its customers tremendous flexibility in the future to choose from a wide range of computing platforms. The version of Reuter Terminal software for Windows NT has already been run successfully on two different hardware platforms--Intel®-based PCs and MIPS® workstations--and will be tested on additional platforms in the near future. Beyond the Reuter Terminal services, Smith notes that Reuters is looking at moving some of its other online information services to the Windows NT platform as well. The goal is to provide a single, easy-to-use screen that gives traders all the information tools they need to successfully complete crucial financial transactions.úԯ ¬Æ & €©€°˜€‚ÿWith Windows NT-based workstations on their desktops, these traders will be able to get up-to-the-second market information while communicating online with financial institutions, simultaneously and reliably. 1²Å ÝÆ 1Yÿÿÿÿÿÿÿÿ‘ÿÿÿÿÝÆ Ç (¬Æ Ç % €€°˜€‚ÿÃ’ÝÆ ÈÇ 1ÙÿÿÿÿXˆ’ÈÇ È °Ë Windows NT Design GoalsPW(0,0,580,750,3,"MAIN");EB("btn_topic_index");SaveMark("topic_index");CBB("btn_next_index", "PI(`nteval.hlp',`next_14')")@Ç È & €4€°°˜€‚ÿWindows NT Design GoalsþËÈÇ Ë 3 4€—€˜˜€€€€ €‚‚ÿMicrosoft® Windows NT™ operating system software design required some serious thinking. For the system to fulfill its market requirements, it was crucial that complex features such as symmetric multiprocessing and security be incorporated from the beginning.Before they began writing the several hundred thousand lines of code that Windows NT would eventually comprise, the system's designers carefully constructed a set of software design goals to facilitate making the thousands of ancillary decisions that determine the internal structure of a large software project. When two proposed design options conflict, the design goals help establish which is best. The following are the Windows NT design goals:ª]È °Ë M j€º€˜˜ã9ߋ €
‰‚ãÍ;‰‚ã¿·*‰‚ãD#œ‰€‚ã\d2E€
‰‚ÿExtensibilityPortabilityReliability and RobustnessCompatibilityPerformance>
Ë îË 1Ú …!
“îË %Ì ü
Extensibility7°Ë %Ì ' € €˜ŒR˜€‚ÿExtensibility€ZîË ¥Ì & €´€°°˜€‚ÿThe code must be written to comfortably grow and change as market requirements change. µ%Ì ZÎ & €€°˜€‚ÿOperating systems invariably change over time, those changes usually presenting themselves incrementally in the form of new features. Examples include support for a new hardware device, such as a CD-ROM reader; the ability to communicate over a new type of network; or support for up-and-coming software technologies, such as graphical user interfaces or object-oriented programming environments.7¥Ì ‘Î $ €&€˜€
‚ÿSystem Integrity}WZÎ 
& €¯€°˜€‚ÿEnsuring the integrity of the Windows NT code as the operating system changes over time was a primary design goal. For the Mach operating system developed at Carnegie-Mellon University, Dr. Richard Rashid and his colleagues took a unique approach to this problem by creating an operating system base that provides primitive oper‘Î 
°Ë ating system capabilities. Application programs called servers provide additional operating system capabilities, including full-featured APIs. The base portion of the system remains stable, while the servers are enhanced or new ones are created as requirements change.<‘Î V
$ €0€˜€
‚ÿUser and Kernel ModesÁ_

b ’€¿€°˜€â|ôKç€
‰€âeÖ¿À€
‰€â•2 L€
‰€âÄÕª€
‰€â¶ÃnL€
‰€‚ÿWindows NT borrows from this design and consists of a privileged executiveand a set of nonprivileged servers called protected subsystems. The term privileged refers to a processor's modes of operation. Most processors have a privileged mode (or perhaps several), in which all machine instructions are allowed and system memory is accessible, and a nonprivileged mode, in which certain instructions are disallowed and system memory is inaccessible. In Windows NT terminology, the privileged processor mode is called kernel mode and the nonprivileged processor mode is called user mode.^8V
u
& €q€°˜€‚ÿUsually an operating system executes only in kernel mode, and application programs execute only in user mode except when they call operating system services (This type of server refers to a process on a local computer and should not be confused with separate computers on a network that provide file services or network services). The Windows NT design is unique, however, because its protected subsystems execute in user mode like applications do. This structure allows protected subsystems to be modified or added without affecting the integrity of the executive.>
³
$ €4€˜€
‚ÿOther System ComponentsIïu
ü
Z ‚€ß€°˜€‚â¡2@€
‰€‚âLzÍĀ
‰€‚â¡°~T€
‰€‚âr€
‰€‚ÿIn addition to protected subsystems, Windows NT includes numerous other features to ensure its extensibility:Modular StructureUse of Objects to Represent System ResourcesLoadable DriversRemote Procedure Call FacilityD³
@
1¿ÿÿÿÿÿÿÿÿ”ÿÿÿÿ@
»
A Modular Structure=ü
}
' €,€ČR˜€‚ÿA Modular Structure>@
»
& €1€°˜€‚ÿThe executive comprises a discrete set of individual components that interact with one another only through functional interfaces. New components can be added to the executive in a modular way, accomplishing their work by calling the interfaces supplied by existing components.],}

1Âÿÿÿÿÿÿÿÿ•ÿÿÿÿ
}
Use of Objects to Represent System ResourcesV/»
n
' €^€ČR˜€‚ÿUse of Objects to Represent System Resourcesé
}
& €Ó€°˜€‚ÿObjects, abstract data types that are manipulated only by a special set of object services, allow system resources to be managed uniformly. Adding new objects does not undermine existing objects or require existing code to change.An
¾
1˜ÿÿÿÿÿÿÿÿ–ÿÿÿÿ¾


Loadable Drivers:}
ø
' €&€ČR˜€‚ÿLoadable Drivers÷¾


& €ï€°˜€‚ÿThe Windows NT I/O system supports drivers that can be added to the system as it runs. New file systems, devices, and networks can be supported by writing a device driver, file system driver, or transport driver and loading it into the system. Fø
[

1¬ÿÿÿÿÿÿÿÿ—ÿÿÿÿ[

Á
Remote Procedure CallN'

©

' €N€ČR˜€‚ÿRemote Procedure Call (RPC) Facilityò[

Á
& €å€°˜€‚ÿThis allows an application to call remote services without regard to their locations on the network. New services can be added to any machine on the network and can be immediately available to applications on other machines on the network.< ©

ý
1ï XˆÁ˜ý
2
J
Portability5Á
2
' €€˜ŒR˜€‚ÿPortabilityYý
±
& €²€°°˜€‚ÿAs dictated by market goals, the code must move easily from one processor to another. \62
B
& €m€°˜€‚ÿThe second design goal, code portability±
B
Á
, is closely related to extensibility. Extensibility allows an operating system to be easily enhanced, whereas portability enables the entire operating system to move to a machine based on a different processor or configuration, with as little recoding as possible. Although operating systems are often described as either "portable" or "nonportable," portability is not a binary state, but a matter of degree. The crucial question is not whether software will port (most will, eventually), but how difficult it is to port.nH±
‡D
& €‘€°˜€‚ÿWriting an operating system that is easy to port is similar to writing any portable code--you must follow certain guidelines. First, as much of the code as possible must be written in a language that is available on all machines to which you want to port. Usually this means that you must write your code in a high-level language, preferably one that has been standardized. Assembly language code is inherently nonportable, unless you plan to port only to machines with upwardly compatible machine instructions (such as moving from the Intel 80386 to the Intel 80486, for example).«„B
2G
' € €°˜€‚‚ÿSecond, you should consider to which physical environments you want to port your software. Different hardware imposes different constraints on an operating system. For example, an operating system built on 32-bit addresses could not be ported (except with enormous difficulty) to a machine with 16-bit addresses.Third, it's important to minimize, or eliminate wherever possible, the amount of code that interacts directly with the hardware. Hardware dependencies can take many forms. Some obvious dependencies include directly manipulating registers and other hardware structures or assuming a particular hardware configuration or capacity.e?‡D
—I
& €€°˜€‚ÿFourth, whenever hardware-dependent code cannot be avoided, it should be isolated to a few easy-to-locate modules. Hardware-dependent code should not be spread throughout the operating system. These last two guidelines work hand in hand. For example, you can hide a hardware-dependent structure within a software-defined, abstract data type. Other modules of the system manipulate the data type rather than the hardware by using a set of generic routines. When the operating system is ported, only the data type and the generic routines that manipulate it must be changed.ˆK2G
J
= J€–€°˜€â(ô7L€
‰€âðȀ
‰€‚ÿSome of its features include Portable C and Processor Isolation.;
—I
ZJ
1„ÿÿÿÿÿÿÿÿ™ÿÿÿÿZJ
£M
Portable C4
J
ŽJ
' €€ČR˜€‚ÿPortable CïZJ
£M
& €ß€°˜€‚ÿWindows NT is written primarily in the C language, with extensions for the Windows NT structured exception handling architecture. The developers selected C because it is standardized and because C compilers and software development tools are widely available. In addition to C, small portions of the system were written in C++, including the graphics component of the Windows environment and portions of the networking user interface. Assembly language is used only for parts of the system that must communicate directly with the hardware (the trap handler, for example) and for components that require optimum speed (such as multiple precision integer arithmetic). However, nonportable code is carefully isolated within the components that use it.DŽJ
çM
1ÿÿÿÿÿÿÿÿšÿÿÿÿçM
÷
Processor Isolation=£M
$N
' €,€ČR˜€‚ÿProcessor Isolationà¹çM

' €s€°˜€‚‚ÿCertain low-level portions of the operating system must access processor-dependent data structures and registers. However, the code that does so is contained in small modules that can be replaced by analogous modules for other processors.Windows NT encapsulates platform-dependent code inside a dynamic-link library known as the Hardware Abstraction Layer (HAL). Platform dependencies are those that vary between two vendors' workstati$N

£M
ons built around the same processor--for example, the MIPS R4000. The HAL abstracts hardware, such as caches and I/O interrupt controllers, with a layer of low-level software so that higher-level code need not change when moving from one platform to another.çÁ$N
÷
& €ƒ€°˜€‚ÿWindows NT was written for ease of porting to machines that use 32-bit linear addresses and provide virtual memory capabilities. It can move to other machines as well, but at a greater cost.K

1“!
P
›B‚
†‚
è…
Reliability and RobustnessD÷
†‚
' €:€˜ŒR˜€‚ÿReliability and RobustnessÜB‚
‰ƒ
' €¹€°°˜€‚ÿThe system should protect itself from both internal malfunction and external tampering. It should behave predictably at all times, and applications should not be able to harm the operating system or its functioning. Æ‚
¦…
Z ‚€‡€°˜€‚âD:6€
‰€‚âlZ %€
‰€‚âúÓòހ
‰€‚â_rAN€
‰€‚ÿReliability was a third design goal for the Windows NT code. Reliability refers to two different but related ideas. First, an operating system should be robust, responding predictably to error conditions, even those caused by hardware failures. Second, the operating system should actively protect itself and its users from accidental or deliberate damage by user programs.Structured Exception HandlingModular DesignNTFSSecurityB‰ƒ
è…
. ,€(€°˜â&Tè€
‰€‚ÿVirtual MemoryN¦…

1~ÿÿÿÿÿÿÿÿœÿÿÿÿ6†

Structured Exception HandlingG è…

' €@€ČR˜€‚ÿStructured Exception HandlingéÃ6†

& €‡€°˜€‚ÿThis method for capturing error conditions and responding to them uniformly is the primary defense against errors in software or hardware. Either the operating system or the processor issues an exception whenever an abnormal event occurs; exception handling code, which exists throughout the system, is then automatically invoked in response to the condition, ensuring that no undetected error wreaks havoc on user programs or on the system itself.?}†
¥ˆ
1õÿÿÿÿÿÿÿÿÿÿÿÿ¥ˆ

Modular Design8fˆ
݈
' €"€ČR˜€‚ÿModular Design~X¥ˆ

& €±€°˜€‚ÿThis function divides the executive into a series of orderly packages, the individual system components interacting with one another through carefully specified programming interfaces. A component such as the memory manager, for example, could be removed in one piece and replaced by a new memory manager that implements the same interfaces.5݈
Š
1€ÿÿÿÿÿÿÿÿžÿÿÿÿŠ
ۋ
NTFS.[Š
¾Š
' €€ČR˜€‚ÿNTFS÷Š
ۋ
& €ï€°˜€‚ÿA new file system designed for Windows NT, NTFS can recover from all types of disk errors, including errors that occur in critical disk sectors. It uses redundant storage and a transaction-based scheme for storing data to ensure recoverability.9¾Š

1JÿÿÿÿÿÿÿÿŸÿÿÿÿŒ

Security2 ۋ

' €€ČR˜€‚ÿSecurityß¹Œ

& €s€°˜€‚ÿWindows NT comprises a U.S. government-certifiable security architecture, which provides a variety of security mechanisms, such as user logon, resource quotas, and object protection.?FŒ

1=ÿÿÿÿÿÿÿÿ ÿÿÿÿd

Virtual Memory8%
œ
' €"€ČR˜€‚ÿVirtual MemoryÆ d

& €A€°˜€‚ÿThis function furnishes every program with a large set of addresses that it can use. When a program accesses these virtual addresses, the memory manager maps, or translates them into actual memory locations. Because it controls the placement of every program in memory, the operating system prevents one user from reading or modifying memory occupied by another user, unless the two users explicitly share memory.>
œ
 
1ÁÁC¡ 
׏

Compatibility7b
׏
' € €˜ŒR˜€‚ÿCompatibility³Œ 
–À
' €€°°˜€‚ÿA׏
–À

lthough Windows NT should extend existing technology, its user interface and APIs should be compatible with existing Microsoft systems. ƒC׏

@ N€‡€°˜€‚ãáyà€
‰€‚ãÏKê€
‰€‚ÿSoftware compatibility, the fourth design goal for Windows NT code, is a complicated subject. In general, compatibility refers to an operating system's ability to execute programs written for other operating systems or for earlier versions of the same system. Binary and Source CompatibilityApplication SupportP–À

1ÇP
®…¢iÂ
²Â

Binary and Source CompatibilityI"Â
²Â
' €D€˜ŒR˜€‚ÿBinary and Source Compatibility‚[iÂ

' €·€°°˜€‚ÿBinary compatibility is achieved when you can take an executable program and run it successfully on a different operating system. Source-level compatibility requires you to recompile your program before you can run it on the new system. Whether a new operating system is binary compatible or source-code compatible with an existing system depends on several things. Foremost among them is the architecture of the new system's processor. If the processor uses the same instruction set (with extensions, perhaps) and the same size memory addresses as the old, then binary compatibility can be achieved.î²Â

& €Ý€°˜€‚ÿBinary compatibility is not as easy, however, between processors based on different architectures. Each processor architecture ordinarily carries with it a unique machine language. This means that with cross-architecture, binary compatibility can be achieved only if an emulation program is provided to convert one set of machine instructions to another. Without an emulator, all applications moving from the old architecture to the new must be recompiled and relinked (and likely debugged).D4Å
΂
1%Ck‰£ŒÇ
ÉÇ
½Ë
Application Support=HÇ
ÉÇ
' €,€˜ŒR˜€‚ÿApplication Support›ŒÇ
‹Ê
' €7€°°˜€‚ÿThrough use of protected subsystems, Windows NT provides execution environments for applications other than its primary programming interface--the Win32 API. When running on Intel processors, the Windows NT protected subsystems supply binary compatibility with existing Microsoft applications, including MS-DOS, 16-bit Windows, OS/2, and LAN Manager. On the MIPS RISC processors, binary-level compatibility is achieved for MS-DOS, 16-bit Windows, and LAN Manager-based applications (using an emulator). Windows NT also provides source-level compatibility with POSIX applications that adhere to the POSIX operating system interfaces defined in IEEE Standard 1003.1.2 ÉÇ
½Ë
& €€°˜€‚ÿIn addition to compatibility with programming interfaces, Windows NT supports existing file systems, including the MS-DOS file system (FAT), the OS/2 high performance file system (HPFS), the CD-ROM file system (CDFS), and the new, recoverable NT File System (NTFS).< ‹Ê
ùË
1g®…ÿÿÿÿ¤ùË


Performance5½Ë

' €€˜ŒR˜€‚ÿPerformance¯ˆùË
ÝÌ
' €€°°˜€‚ÿWithin the constraints of the other design goals, the system should be as fast and responsive as possible on each hardware platform. !á.Ì
þÎ
@ N€Ã€°˜€‚âä¤U€
‰€‚âiù(½€
‰€‚ÿThe final Windows NT design goal was to achieve great performance. Compute-intensive applications such as graphics packages, simulation packages, and financial analysis packages require rapid processing in order to give the user good response times. Fast hardware is not enough to achieve good performance, however. The operating system must also be fast and efficient. The following process helped achieve this performance goal:Performance TestingLocal Procedure Callf+ÝÌ

; F€V€°˜âÙ=¬€
‰€‚âÃDW%€
‰€‚ÿEnvironment SubsystemsNetworkingDþÎ
¨Ï
1üÿÿÿÿÿÿÿÿ¥ÿÿÿÿ¨Ï
oPerformance Testing=dÏ
' €,€ČR˜€‚ÿPerformance Testing¨Ï
dÏ
c=¨Ï
o& €{€°˜€‚ÿEach component of Windows NT was designed with an eye toward performance. Performance testing and modeling were done for the parts of the system that are critical to performance. System calls, page faults, and other crucial execution paths were carefully optimized to ensure the fastest possible processing speeds.E ´1(ÿÿÿÿÿÿÿÿ¦ÿÿÿÿ´—Local Procedure Call>oò' €.€ČR˜€‚ÿLocal Procedure Call¥y´—, &€ó€°˜€€€‚ÿThe protected subsystems (servers) that perform operating system functions must frequently communicate with one another and with client applications. To guarantee that this communication does not hinder the servers' performance, a high-speed message-passing mechanism called the local procedure call (LPC) facility was included as an integral part of the operating system.GòÞ1Gÿÿÿÿÿÿÿÿ§ÿÿÿÿÞÞEnvironment Subsystems@—' €2€ČR˜€‚ÿEnvironment SubsystemsÀšÞÞ& €5€°˜€‚ÿEach protected subsystem that provides an operating system environment was carefully designed to maximize the speed of frequently-used system services.;
1¤ÿÿÿÿÿÿÿÿ¨ÿÿÿÿ‚Networking4
ÞM' €€ČR˜€‚ÿNetworking5‚& €€°˜€‚ÿCrucial components of the Windows NT networking software were built into the privileged portion of the operating system to achieve the best possible performance. Although they are built-in, these components can also be loaded and unloaded from the system dynamically. 1M³1Yÿÿÿÿÿÿÿÿ©ÿÿÿÿ³Û(‚Û% €€°˜€‚ÿē³Ÿ1ÿÿÿÿªŸÜÅ
Evaluating Windows Windows NT - System Road TestsEB("btn_topic_index");SaveMark("topic_index");CBB("btn_next_index", "PI(`nteval.hlp',`next_24')")=ÛÜ& €.€°°˜€‚ÿWindows NT Road TestÛ©Ÿ· 2 2€S€°˜€€€€ €‚ÿWhen reviewing the Microsoft® Windows NT™ operating system or any other advanced operating system, it is important to consider how you will use it. Your tests should focus on the functionality and performance required to support business solutions. There is no universal test suite that accurately grades operating systems--your choice should depend entirely on your requirements and how each candidate addresses them.±ÜÅ
] ˆ€c€˜˜ãý^¤Â€
‰‚ã„m¯‰‚ã*©•‰‚ã}¹Gž‰‚ãŒPó‰‚ã)³z‰‚ãsòuI‰‚ãÞRމ‚ÿPower, Scalability and PortabilityApplication IntegrationNetworkingSecurityFault ToleranceManagement FacilitiesInteroperabilityApplication AvailabilityS"·  1ËŸàƒ« d þ Power, Scalability and PortabilityL%Å
d ' €J€˜ŒR˜€‚ÿPower, Scalability and PortabilityR- ¶ % €Z€°˜€‚ÿAn advanced operating system must provide:w+d - L h€V€˜˜‚™‡âeKº0€
‰€‚â´h^ë€
‰€‚âgJƒN€
‰€‚ÿPowerScalabilityPortability3
¶ ` & €€˜˜˜€‚ÿTests for:> - ž 3 6€€˜˜˜‚™‡ãiKº0€
‰€‚ÿPower`!` þ ? N€B€˜˜‚™‡ã¸h^ë€
‰€‚ã€~

‰€‚ÿScalabilityPortabilityR!ž P
1­ÿÿÿÿÿÿÿÿ¬ÿÿÿÿP
«How to Compare Windows NT - Power.þ ~
& €€°R˜€‚ÿPower-P
«, &€€°˜€€€‚ÿAn operating system is critical in realizing performance advantages from powerful hardware. For example, many CPUs, including the Intel® x86 family, offer the ability to run several tasks concurrently by switching between them. However, most users of x86-based computers never gain access to this feature because they are using DOS which is not a multi-tasking operating system. An advanced operating system provides features like multi-tasking so that you can get the maximum performance from your hardware.X'~
@1×ÿÿÿÿÿÿÿÿ­ÿÿÿÿ@‰BHow to Compare Windows NT - Scalabil«@«ity4«C@& €€°R˜€‚ÿScalabilityF @‰B& €A€°˜€‚ÿOne responsibility of the operating system is to provide resources like processing, memory, and mass storage for applications. Scalability is the capability of an operating system to automatically accommodate additional resources as they are added to the system. For example, if you use a single processor machine, you can get better performance by adding processors. However, you can only gain the performance advantage you need if the operating system you choose can automatically find the new processors and schedule tasks to run on them.X'C@áB1Vÿÿÿÿÿÿÿÿ®ÿÿÿÿáBßDHow to Compare Windows NT - Portability4‰BC& €€°R˜€‚ÿPortabilityʤáBßD& €I€°˜€‚ÿIn an ideal world, you would choose the best hardware for your needs. Unfortunately, in reality, your options are often limited because your existing operating system can only run on certain hardware. Modern, advanced operating systems overcome this limitation by being portable so that they can run on several different types of machine. An advanced operating system gives you the widest possible choice of hardware.@CE1— ¯ENE6ƒTests for Power/ßDNE' €€˜ŒR˜€‚ÿPower3EE% €€°˜€‚ÿTrue 32-bitU.NEÖG' €]€°˜€‚‚ÿWindows NT delivers power as a result of its 32-bit design. For compute-intensive applications, performance improves because computations are 32-bit instead of 16-bit. Consider the simple case of multiplying two 32-bit integers together--you will see the advantage. On a 32-bit operating system this operation takes one instruction. On a 16-bit operating system, seven instructions are needed: four multiplications and three additions.Test the performance of compute-intensive 32-bit applications such as modeling or recalculation of a large spreadsheet.AEH% €8€R˜€
‚ÿHigh Performance Graphics÷ÐÖGJ' €¡€°˜€‚‚ÿThe 32-bit design also accounts for the superior graphics power of Windows NT. Graphics are very demanding computationally. A 32-bit graphics subsystem combined with 32-bit graphics device drivers enable very fast rendering of graphics images.Test graphics-intensive applications and compare performance to other platforms that support these applications. We recommend using the 256-color video drivers for maximum performance with these advanced applications.4HBJ% €€R˜€
‚ÿMultitaskingÛµJK& €k€°˜€‚ÿWhen comparing multitasking capabilities, you should confirm that the operating system design really delivers the benefits of running multiple processes. Points to watch for are:ABJ^K' €4€¬‚R˜€#‚ÿPreemptive MultitaskingBK L& €9€°˜€‚ÿCan one process interrupt another one? If not, it is possible for the system to be "hogged" by a single process that refuses to give up the processor. Preemptive multi-tasking allows the operating system to remove, or preempt, any process so that all processes get a chance to run.:^KÚL( €$€R˜€#€
‚ÿMultithreadingoB LIO- (€…€°˜€‚€
€‚ÿEven within a process, there may be tasks that can run independently. This is multithreading. For example, your word processor could assign a long printout to one thread while continuing interactive operation with another thread. You can then continue working while the print compiles in the background.Note: It is important to note that because Windows NT provides a high level of compatibility for 16-bit, Windows-based applications, they cannot preemptively multitask. Instead, these applications multitask cooperatively so that features like DDE and OLE are available.ŒfÚLá€& €Í€°˜€‚ÿWhen you test Windows NT, run the Performance Monitor and notice that applications share CPU time according to their needs. Physical memory pageIOá€ßDs are also allocated based on the need of the application. Parameters such as working set size are important to review as well, since they are good indicators of how individual applications are using the system.8IO% €&€R˜€#‚ÿAsynchronous I/Oöá€6ƒ' €í€°˜€‚‚ÿGenerally, the CPU in your computer is much faster than the peripheral devices such as memory, hard disk or CDR. Asynchronous I/O allows the processor to request access to peripherals and then get on with something else while the peripheral fulfills the request. This technique makes very efficient use of modern, high performance CPUs.You should test disk-intensive applications including databases (both single-users and multi-user). Also try large reads and writes to verify the I/O performance.F|ƒ1oàƒø°|ƒ±ƒï†Tests for Scalability56ƒ±ƒ' €€˜ŒR˜€‚ÿScalabilityë¸|ƒœ…3 4€q€°°˜€ât8 ‰€‚ÿYou should test the scalability of an operating system with respect to various hardware parameters that can bottleneck system performance. Using Windows NT, for example, load the system until Performance Monitor indicates that the CPU resource is fully extended. This bottleneck can be eliminated by adding an additional CPU, or moving the application to a more powerful microprocessor, perhaps one based on a different architecture.S)±ƒï†* "€S€°˜€‚‚‚‚‚ÿThese same kinds of tests can also be run to create and then overcome memory or disk bottlenecks. Simply adding more memory or a faster disk drive can increase performance quickly and efficiently.Windows NT can support:Memory: 4GB (2GB per application)Mass Storage: 2^64 bytesProcessors: 32X'œ…G‡1í d ±G‡|‡8How to Compare Windows NT - Portability5ï†|‡' €€˜ŒR˜€‚ÿPortability­†G‡)ˆ' €
€°°˜€‚ÿBoth operating system portability and application portability are needed to provide a flexible hardware choice. You should compare:D|‡mˆ% €>€R˜€
‚ÿCISC Architectures SupportedíÇ)ˆZ‰& €€°˜€‚ÿFor Windows NT this means Intel 80386, 80486 and Pentium support, including multiprocessor machines. Over 800 manufacturers of Intel based PCs have been certified to be compatible with Windows NT.Dmˆž‰% €>€R˜€
‚ÿRISC Architectures SupportedQZ‰ïŠ8 >€3€°˜€€€€€€€‚ÿMost users of RISC machines use the hardware vendors operating system. Windows NT is available on Digital® Alpha architecture, MIPS® R3000 and R4000 family and Intergraph® Clipper. These new architectures are providing the ultimate desktop performance at PC market prices.?ž‰.‹% €4€R˜€
‚ÿApplication portability‡ïŠð; D€€°˜€‚€€‚€€‚€€‚ÿIf you want to use applications on different architectures, the operating system must provide application level portability. You should check for:Binary Compatibility - applications run in binary form, unmodified.Source Level Compatibility - applications can be re-compiled without modification of the source code.API level Compatibility - applications can be re-compiled providing the source code does not make use of special vendor extensions. This is the most common level of compatibility between UNIX-based systems and in practice, it is very unlikely that an application designed for Solaris 2 will simply re-compile under HP-UX.H.‹8/ ,€3€°˜€
€€€‚ÿNote: Windows NT provides binary-compatible support for 16-bit Windows- and MS-DOS®-based applications across all implementations. 32-bit Windows-based applications are binary-compatible for a particular CPU architecture and 100% source-compatible between CPU architectures.d3ðœ1$ø~ˆ²œݏ(ÄHow to Compare Windows NT - Application IntegrationA8ݏ' €4€˜ŒR˜€‚ÿApplication Integration"ûœ Â' €÷€°°˜€Ý Â8‚ÿThe operating system not only exposes system resources to the user, it also provides a backplane for applications to run and communicate. Application integration allows you to combine information and functionality from multiple applications. For example, you may want to write a document with graphics, a sales forecast and a personnel list. The operating system provides links between your document processor, graphics package, spreadsheet and database so that each can contribute to the final document.H"ݏSÃ& €E€°˜€‚ÿLinking applications together makes it easy to build custom solutions with off-the-shelf software. Often a business solution can be enhanced by integrating the features of standard personal productivity applications. The result is a powerful solution that makes end users more effective.Õy Â(Ä\ ˆ€ò€˜˜‚™‡€
€âïQ¾€
‰€â!pf€
‰€â0Ҁ
‰€âÚ -@€
‰€‚ÿTests for Application Integration: Common User Interface, Cut and Paste, Linked Data, Linked Objects.FSÃnÄ1Iÿÿÿÿÿÿÿÿ³ÿÿÿÿnÄqÅCommon User Interface>(ĬÄ& €0€°R˜€‚ÿCommon User InterfaceşnÄqÅ& €?€°˜€‚ÿThe Windows user interface is the most widely used GUI available. Windows NT is the only platform that provides this user interface for 32-bit applications.>
¬Ä¯Å1ƒÿÿÿÿÿÿÿÿ´ÿÿÿÿ¯ÅôÆCut and Paste6qÅåÅ& € €°R˜€‚ÿCut and Pasteé¯ÅôÆ& €Ó€°˜€‚ÿMost operating systems provide a buffer known as the Clipboard that applications can use to exchange data. A less common capability is to enable applications to exchange data over the network using a network-transparent clipboard.< åÅ0Ç1*ÿÿÿÿÿÿÿÿµÿÿÿÿ0ÇÊLinked Data4ôÆdÇ& €€°R˜€‚ÿLinked Dataº“0ÇÊ' €'€°˜€‚‚ÿAn extension of cut and paste is the ability to form a permanent link between the source and destination of the data. For example, if you write a report that contains data from a sales spreadsheet, you can create a link so that the report is automatically updated whenever the spreadsheet changes. Very useful for monthly sales reports!In Windows NT, this is known as Dynamic Data Exchange (DDE). The system also includes NetDDE which allows you to create the same links over a network. When testing DDE or an equivalent with Windows applications, be sure to create links between both 16-bit and 32-bit applications. You should also try nesting DDE links.?dÇ]Ê1ÿÿÿÿÿÿÿÿ¶ÿÿÿÿ]Ê<ÍLinked Objects7Ê”Ê& €"€°R˜€‚ÿLinked Objects¨]Ê<Í' €€°˜€‚‚ÿObject linking extends inter-application links so that applications can share functionality. For example, if you want a project proposal to include a diagram, you can insert a graphical object from your favorite drawing program and edit the graphic without leaving the original proposal. You see a single editing window whose functionality (menus, toolbar, ruler etc.) changes according to whether you select the text or the diagram.Windows NT provides object linking through a technology called Object Linking and Embedding (OLE). You should look for the same things as in DDE: OLE between 16-bit and 32-bit applications and nested OLE.W&”Ê“Í1&d £ ·“ÍÇÍÆHow to Compare Windows NT - Networking4
<ÍÇÍ' €€˜ŒR˜€‚ÿNetworkingkD“Í>' €‰€°°˜€‚ÿCountless business users are recognizing the benefits of networking: better use of resources, better communication and better distribution of information. Networking is therefore a requirement of any advanced operating system. But how the operating system implements networking is critical to its success. You should be able to access resources over the network transparently and independently of your protocol choice. Your applications should be able to interoperate over the network. Your system administration tools should keeÇÍ><Íp the cost of supporting a network to a minimum.d4ÇÍ¢0 .€i€°˜€‚€‚€‚‚‚ÿWhen testing network capabilities, focus on your own particular needs. Decide whether you are mainly interested in performance, security, reliability, ease of administration or network functionality. Then compare the features that specifically address your objective.Standard features for networking:Windows NT includes support to access remote resources.Windows NT includes tools for managing distributed resources.Windows NT includes functionality necessary to create distributed applications based on the client-server model including distributed IPCs.‚S>$/ ,€§€°˜€‚‚‚€€‚ÿWindows NT is extensible, enabling third parties to create additional connectivity options.Windows NT Advanced Server enables a single network logon to the enterprise with domains.Windows NT Advanced Server allows remote clients to access Windows NT-based resources over Remote Access Service (RAS). RAS supports connectivity options including telephone line via standard modems, ISDN connections and X.25 networks.Windows NT Advanced Server includes Services for Macintosh® enabling Macintosh systems to be fully interoperate with PCs and be full clients to Windows NT Advanced Servers.¢R¢ÆP p€¤€˜˜‚™‡€
€âÐ^ü€
‰€â¦T4¤€
‰€ã´vDf€
‰€‚ÿNetworking tests: File Sharing, Network Access, Application Server= $1]ÿÿÿÿÿÿÿÿ¸ÿÿÿÿ#File Sharing5Æ8& €€°R˜€‚ÿFile SharingëÄ#' €‰€°˜€‚‚ÿConnect multiple MS-DOS-, Windows- and Windows NT-based clients to the server system. Measure maximum data transfer rate for reads and writes of reasonable length.You will find that Windows NT, as a file server, performs especially well for large data access and for in-cache access. With disk striping without parity, you will notice a significant performance advantage compared to the same test run on disks of the same type that are not striped.?8b1äÿÿÿÿÿÿÿÿ¹ÿÿÿÿb Network Access7#™& €"€°R˜€‚ÿNetwork AccesshCb % €†€°˜€‚ÿBe sure to set-up multiple domains to test single network logon.¢|™£
& €ù€˜˜€‚ÿAs you consider an advanced operating system's capabilities as a server, it is important to look well beyond its capabilities as a file and print server, and focus instead on its capabilities as an application server. Applications based on the client-server architecture provide the highest level of power and reliability when they can take advantage of the following features:d'  = H€O€T˜ì:‚l€€
ƒ‚€€
ƒ‚€€
ƒ‚ÿ·Pre-emptive multitasking with multi-threading for increased responsiveness.·Protected virtual memory for increased software fault tolerance and extra capacity.·Integrated, open networking for easy access to distributed resources independent of the type of server on which they run.X'£
_ 1C ~ˆô‚º_ › ‘DTesting Windows NT - Application Server< › ' €*€˜ŒR˜€‚ÿApplication Server¶_ Q' €€°°˜€‚ÿA good example of a server application is Microsoft SQL Server for Windows NT. Tests against SQL Server should include multiple MS-DOS-, Windows-, Windows for Workgroups- or Windows NT-based clients. Because Sybase markets SQL Server as a NetWare NLM and as a UNIX application, it is easy to compare the performance of Windows NT Advanced Server as an application server to these other platforms.Ô› dA3 4€©€°˜€‚ât8 ‰€‚ÿLoad each of the three platforms to capacity using realistic queries from multiple clients. Avoid averaging results of extremely large or small queries. These results will reflect the unique implementations of a single component of one operating system, but will not be a good estimate of how the system will perform.Verify the scalability of the system. When any one of theQdA  system's resources is loaded to capacity, use performance monitoring tools to isolate the bottleneck and correct it by adding additional resources. Scalable resources include: virtual memory, disk space and processors. The operating system and server application should automatically take advantage of the new resources as they are provided.-ôQ‘D9 @€é€°˜€âµ~~C€
‰€‚€€‚ÿTo demonstrate the importance of preemptive multitasking, set up several workstations with normal queries against the SQL Server database and a single client making an extremely long query. You will find that with Windows NT Advanced Server, the short queries will still make progress, even though the longer query is still in the system.Finally, it is important to test Windows NT Advanced Server in NetWare environments. Install NWLink IPX/SPX support in Windows NT network set-up. Install the ODBC drivers for SPX in SQL Server set-up. Using ODBC on an MS-DOS- or Windows-based client with Novell client software (NetX) installed, you can use front-end applications such as FoxPro or Microsoft Access® to connect to Windows NT Advanced Server.U$dAæD1£ ˆ»æDEIHow to Compare Windows NT - Security2 ‘DE' €€˜ŒR˜€‚ÿSecurityüÕæDG' €«€°°˜€‚ÿSystem security is needed to provide a common way to protect resources from tampering and accidental damage. This is particularly important for resources like enterprise databases that your business relies on. Also, an effective security system must to be easy to use to be successful. You should look for powerful features like C2 compliance, but be careful to find a system that is easy enough to administer so that it will actually get used. Some points to check:˜mE¬H+ $€Û€°˜€‚‚‚‚‚‚ÿ1. Does the system enforce full security with authentication required?2. Can users be managed as groups?3. Do users have to maintain multiple user accounts to gain enterprise access?4. Does the system support security auditing?5. Can the system control what operations various users can and cannot perform?6. Do security capabilities extend to applications?V%GI1 2€J€˜‚™‡âßï¿ç€
‰€$‚ÿSecurity Features in Windows NTP¬HRI1¼ÿÿÿÿÿÿÿÿ¼ÿÿÿÿRI¾KSecurity Features in Windows NTH"IšI& €D€°R˜€‚ÿSecurity Features in Windows NT$ùRI¾K+ $€ó€°˜€‚‚‚‚‚‚ÿWindows NT provides user-level security, with authentication required, designed to comply with US Government security standards.Windows NT supports local user groups, and Windows NT Advanced Server supports global user groups.Windows NT Advanced Server enables a single network logon to the enterprise per user.Windows NT supports full security auditing.All operations on a Windows NT-based system require a privilege.The Windows NT security model includes APIs to extend security to applications.\+šIL1ßô‚½LSL
€How to Compare Windows NT - Fault Tolerance9¾KSL' €$€˜ŒR˜€‚ÿFault Tolerance±ŠLN' €€°°˜€‚ÿThe two most common causes of system crashes are bugs in applications and power failures. Another, less common cause is hard disk failure. In each case, an advanced operating system can protect you from data and productivity loss. Techniques like structured exception handling, hardware isolation, UPS support, disk mirroring, duplexing and striping all help to make a system fault tolerant.£lSL§O7 <€Ù€°˜€⻍ÑF€
‰€‚‚‚‚‚‚ÿIn comparing the fault tolerance of advanced operating systems, consider:1. The level of protection between applications.2. The level of protection of the system from applications.3. Support for uninterruptable power supplies (UPS).4. Ease of recoverability of hard disks after system failure.5. Protection of information from failure of the hard disk.Z)N
€1 2€R€˜‚™‡㢡‚:€
‰€‚ÿWindows NT Provides Fault Tolerance§O
€¾KT#§Oa€1³ˆ¾a€®€0†Windows NT Provides Fault ToleranceM&
€®€' €L€˜ŒR˜€‚ÿWindows NT Provides Fault Toleranceèa€½' €Ñ€°°˜€‚ÿWindows NT provides a completely protected 2GB virtual address space per application. This means that applications cannot interfere with each other or the system. If an application crashes, other applications can continue to run.ñ®€׃) €ã€°˜€‚‚‚‚ÿWindows NT runs all system-wide operations in a protected micro-kernel that runs in a separate address space.Windows NT includes full support for UPS systems.Windows NT's NTFS file system is transaction-based and does not require the hard disk to be scanned after system failure. Windows NT also includes an integrated tape backup system.Windows NT Advanced Server supports hard disk fault tolerance options including disk mirroring and striping with parity (RAID5) without special hardware.Y½0†B R€/€°˜€‚âÑÛo!€
‰€‚âîˆÁ€
‰€‚‚‚ÿTest these things:Install a UPS on the system and then simulate a power failure.Shut off the system while it is running and notice how quickly NTFS partitions recover when the system is rebooted. Compare this to systems that require CHKDSK or a similar utility.Set up a disk mirror and/or stripe set and then power off one of the drives (Windows NT Advanced Server only).Back up a hard disk to tape using the Windows NT tape backup facility. Delete a file or directory and then try to recover the deleted file from tape.b1׃’†1'K ¿’†цljHow to Compare Windows NT - Management Facilities?0†ц' €0€˜ŒR˜€‚ÿManagement Facilities 咆݇' €Ë€°°˜€‚ÿSystem management is a major part of the cost of running a network. When evaluating business platforms it is important to compare the facilities available to manage both server systems and desktop systems. Management includes:ºÑ†—ˆ* "€!€˜€‚‚‚‚‚‚ÿsystem installationcontrol of usersapplication installationsystem performance monitoringnetwork resource managementconfiguration controlȡ݇_‰' €C€°˜€‚‚ÿhardware supportA powerful set of management facilities should be "remotable" so that systems can be managed remotely, from a central administration station.h6—ˆlj2 4€l€˜˜âlbF€
‰‚ã"¤~‰‚ÿManagement Features in Windows NTThings to tryF_‰
Š1fÿÿÿÿÿÿÿÿÀÿÿÿÿ
Š-ŒManagement FacilitiesJ$ljWŠ& €H€°R˜€‚ÿManagement Features in Windows NTÖ­
Š-Œ) €[€°˜€‚‚‚‚ÿWindows NT installation is graphical.Windows NT includes a remotable Performance Monitor that is extensible to applications.Windows NT includes comprehensive, graphical administrative tools including User Manager, Disk Administrator, Performance Monitor, Backup Utility and Event Viewer.Windows NT Advanced Server includes tools for centralized management of server resources including share points and server applications.[*WŠˆŒ1¼±€ÁˆŒیäÀTesting Windows NT - Management FacilitiesS,-Œی' €X€˜ŒR˜€‚ÿTesting Management Features in Windows NTÔ­ˆŒ¯' €[€°°˜€‚ÿStart by actually installing the system. You'll find that Windows NT requires only a few simple steps for installation using the express set-up option off a CD-ROM drive.Dی À- (€/€°˜€‚‚‚‚‚‚‚‚ÿTry changing the video driver for Windows NT.Try adding a new user account on Windows NT with the User Manager.Create a new disk partition using the Disk Administrator.Create a new group of users.Use the Performance Monitor to study CPU utilization for the system and for individual processes.Assign permissions to files and directories over the network.Use the Disk Administrator to view and manage disk partitions.Use the File Manager (or the Server Manager on Windows NT Advanced Server) to share resources on the network.¯ À-Œر¯äÀ' €c€°˜€‚‚ÿUse the Server Manager on Windows NT Advanced Server to start and stop services running on the system.Use the Event View to examine the system, security or application logs.], ÀAÁ1%K 4ƒÂAÁ{ÁoÄHow to Compare Windows NT - Interoperability:äÀ{Á' €&€˜ŒR˜€‚ÿInteroperability&ÿAÁ¡Â' €ÿ€°°˜€‚ÿIntegration with existing information systems is a key success factor for any business solution platform. Ultimately, existing solutions may be migrated to the new platform, but in the short term, the new solutions must interoperate with existing ones.yM{ÁÄ, &€›€°˜€‚‚‚‚‚‚‚ÿSome key factors for practical interoperability are:Hardware compatibility - with the current machines, options and peripherals.Protocol compatibility.Communications - to exchange files for example.Remote access - terminal access to remote legacy systems is useful.Messaging services.Resource re-direction to legacy systems.U$¡ÂoÄ1 2€H€˜‚™‡ãbF€
‰€‚ÿInteroperability in Windows NTˆWÄ÷Ä18±€V†Ãÿÿÿÿ÷ħÈHow to Compare Windows NT - Interoperability - Windows NT addresses these requirements:G!oÄ>Å& €B€°R˜€‚ÿInteroperability in Windows NT3ø÷ÄqÇ; D€ñ€°˜€‚‚€€‚€€€€‚ÿWindows NT is based on an open networking designWindows NT includes standard networking transports including TCP/IP, IPX/SPX and Data Link Control (DLC) in the packageWindows NT enables client-server interoperability with UNIX over TCP/IP, Sockets and OSF/DCE-compatible remote procedure calls (RPCs). Windows NT is a full Telenet® client and also includes support for FTP client and server.Windows NT is a full client to Novell® NetWare® servers with Novell's NetWare Client for Windows NT.6 >ŧÈ- (€€°˜€‚€€‚ÿWindows NT Advanced Servers can be application servers in existing NetWare environments without additional networking software on the NetWare client.With Microsoft SNA Server for Windows NT, Windows NT-based systems become full clients to IBM® hosts over SNA.IqÇðÈ1T4ƒÿÿÿÿÄðÈ2ÉUÌApplication AvailabilityB§È2É' €6€˜ŒR˜€‚ÿApplication Availability½–ðÈïË' €-€°˜€‚‚ÿIn many cases, your choice of operating system is driven by the applications that you need to run. You should satisfy yourself that all the applications you need are available for your choice of operating system. Furthermore, you need to be confident that you will get good application support from your software vendors in the future.Thousands of software vendors are committed to supplying applications written for the Win32 API. Furthermore, Windows NT supports all 16-bit Windows- and MS-DOS-based applications as well as 16-bit character mode OS/2 applications and POSIX applications. This guarantees the widest range of application support you can get.f82ÉUÌ. ,€p€°˜ãôeaö€
‰€‚ÿ32 bit Applications for Windows NT Available TodayȗïËÍ1UÿÿÿÿM ÅÍuÍ”Evaluating Windows NT as a File and Print ServerEB("btn_topic_index");CBB("btn_next_index", "PopupId(`nteval.hlp',`next_11')");SaveMark("topic_index")X3UÌuÍ% €f€°˜€‚ÿEvaluating Windows NT as a File and Print ServerÉÍ|Ï> J€“€°˜€€ €€ €€ €€ €‚ÿMicrosoft® Windows NT™ is an advanced, modern operating system capable of many different functions. One service that it provides is file and print sharing. However, because Windows NT is a high performance, client-server operating system with built in networking, it offers many compelling advantages over the leading file and print system, Novell® NetWare® 3.11. As you evaluate file and print sharing products, think about what is necessary to:g8uÍ / .€p€˜°˜ã8Sð€
‰€‚ÿGet The Most Value From Your File And Print Server|Ï ÜM|Ï”; F€š€°˜ã£ø˜Ó€
‰€‚ã9?€
‰€‚ÿReduce Your Administration CostsMaximize Your Enterprise Resourcesc2 ÷1J?‰š Æ÷RkGet The Most Value From Your File And Print Server[5”R& €j€°R˜€‚ÿGet the Most Value From Your File and Print Servere@÷·% €€€°˜€‚ÿGetting the most value from a file and print server requires:ý·R´F Z€o€T˜ì:‚l€€
ƒ€‚€€
ƒ€‚€€
ƒ€‚ÿ·Leveraging your existing investment in hardware, software and skills·Reducing administration costs·Protecting your investment in mission critical data and information4·è& €€˜°˜€‚ÿKey issues:ƒ´kp ®€'€˜˜ã8>(;€
‰€‚ãë¡Ǹ
‰€‚㉕á€
‰€‚ãƒ[«Ö€
‰€‚フ»~€
‰€‚ãj)a€
‰€‚ÿChoose a System that Delivers ValueWhat You Can Get For $20,000Are You Saving Money As Your Network Grows?Don't Let Your Operating System Limit Your Choice of HardwareWhy Not Use Your Server As A Workstation?Simplifying Access To Your MainframeJèµ1ÖM  ǵ¦ Windows NT Delivers ValueL&k& €L€°R˜€‚ÿChoose a System that Delivers ValueTµU8 >€9€°˜€€ €€ €€ €‚ÿWhen you acquire a file or print server product, what is included in the purchase price? Are you able to link all of your MS-DOS®-based, Windows™-based, Macintosh® and remote dial-in clients? Are there built-in fault tolerance and back-up features or must you purchase those separately? Finally, does the cost of the shrink-wrapped package include the ability to grow or change with your business needs? For example, what if the demands on your server increase significantly? Does your file and print server provide the flexibility to support multiple processors, thus paying only for the additional processor and not another system? Windows NT Advanced Server provides all of these components in the purchase price, and will be able to grow and expand with your changing business needs.Qê¦ g œ€Õ€˜˜€‚âr Q€
‰€ ‚âMp:q€
‰€‚ã€S¯Q€
‰€‚ãROá€
‰€‚ãÍ\\€
‰€‚ÿWindows NT Standard Features:Unlimited Client SupportExcellent Connectivity And InteroperabilityBuilt-In Advanced Fault ToleranceWindows NT Makes Your Remote Users More ProductiveIntegrate Macintosh ClientsKUñ 1ÿÿÿÿÿÿÿÿÿÈÿÿÿÿñ ¥ No limit on Client Support@¦ 1
% €6€ °R€‚ÿUnlimited Client Support…_ñ ¶
& €¾€°°˜€‚ÿThe $2,995 purchase price of Windows NT Advanced Server includes unlimited client licensing.ïÉ1
¥ & €“€°˜€‚ÿThis means that any client running MS-DOS, Windows, Macintosh, or OS/2 can utilize the unique features of Windows NT. There are no additional software components to obtain, or license fees incurred.R!¶
÷ 1Ëš —€ É÷ A çABuilt-in Advanced Fault toleranceJ$¥ A & €H€°R˜€‚ÿBuilt-In Advanced Fault Tolerance“S÷ Ô
@ N€§€°˜€‚€€€⻍ÑF€
‰€‚€
‚ÿWith Windows NT you get every major fault tolerance technology right out of the box.When you use your file server for mission critical information, you need a server you can trust. There are many fault tolerance features available today that give you peace of mind, but how much do they cost? Standard Fault Tolerant Features:¾2A ’Œ#è€d39 ½ €€˜€
‚ÿ€€˜ÿ€€˜€‚ÿ€B€˜ÿ€D€˜€%‚ÿ€J€˜‚ÿÿÿWindows NT Advanced ServerNetware 4.x¤6Ô
6n#¬€l39 ½ €€˜Vÿ€€˜˜€
‚ÿ€@€˜˜€‚ÿ€V€˜˜€%‚ÿÿÿDisk Mirroring and DuplexingIncludedIncluded›2’Ñi#¢€d39 ½ €€˜˜ÿ€€˜€
‚ÿ€2€˜€‚ÿ€H€˜€%‚ÿÿÿDisk Striping (RAID5)IncludedUnavailable$6\@[#†€H39 ½ €€Ñ\@¥ ˜€
‚ÿ€€˜€‚ÿ€2€˜€%‚ÿÿÿUPS SupportIncludedIncluded‹0Ñç@[#†€`39 ½ €€˜€
‚ÿ€4€˜€‚ÿ€J€˜€%‚ÿÿÿJournalling File SystemIncludedIncluded¢7\@‰Ak#¦€n39 ½ €€˜ÿ€€°˜€
‚ÿ€B€°˜€‚ÿ€X€°˜€%‚ÿÿÿBackup Profiler and SchedulerIncludedIncluded^0ç@çA. ,€`€°˜ãøµìŽ€
‰€‚ÿMore Details on Windows NT Fault ToleranceW&‰A>B1˜  }„ Ê>B™BGMake Your Remote Users More productive[5çA™B& €j€°R˜€‚ÿWindows NT Makes Your Remote Users More Productive“m>B,D& €Û€°˜€‚ÿDoes your network operating system connect all of your users, both local and remote? The graph below shows how demand for smaller, more mobile computers will increase over the next four years. As your users spend more time computing outside the office, it will be essential to provide them the same network access remotely that they get with a direct connection.6™BbD1 2€ €˜˜€†"€€‚ÿ8,DšF2 2€
€°˜€⟙’”€
‰€‚ÿBecause Windows NT Advanced Server is protocol independent, remote users are treated exactly as if they were locally connected. Thus, daily tasks such as E-Mail, mainframe emulation, and server application use can all be accomplished remotely under Advanced Server. All security and administration issues are retained without additional overhead. Additionally, because of the power and reliability of Windows NT, you need not dedicate a separate machine for dial-in services, as is the case with other systems. f8bDG. ,€p€°˜ãî™ï€
‰€‚ÿMore Information About Remote Access Service (RAS)LšFLG1‹—€ +‰ ËLGGêIIntegrate Macintosh ClientsDGG& €<€°R˜€‚ÿIntegrate Macintosh Clients¤xLG4H, (€ð€°°˜€€&€‚ÿWindows NT Advanced Server allows Macintosh® users to connect with no interruption or changes to their environment.¶ƒGêI3 4€€°˜€‚ãžz€
‰€‚ÿBehind PCs, Apple's Macintosh is the most widely used desktop computer. The flexibility of sharing printers, physical disks and a common security and fault tolerant model greatly leverages hardware, software and human resources. It also preserves the respective environments, allowing users to focus on productivity, not interoperability. More Information About Macintosh Support\+4HFJ1µÿÿÿÿÿÿÿÿÌÿÿÿÿFJŸMExcellent Connectivity and InteroperabilityS.êI™J% €\€ °R€‚ÿExcellent Connectivity And Interoperability,úFJÅK2 2€õ€°˜€⟙’”€
‰€‚ÿWindows NT is protocol independent. This is important because most larger businesses must support a variety of network protocols for a number of specific purposes. Recognizing that fact, Microsoft includes, in the purchase price, support for: q*™J6LG ^€T€T˜ñ€„ð9€ƒ€
‚€ƒ€
‚€ƒ€
‚€ƒ€
‚ÿ·TCP/IP ·NETBEUI ·DLC·IPXiCÅKŸM& €‡€°˜€‚ÿThis means that if your environment currently supports TCP/IP, a Windows NT Advanced Server could be installed and run natively in that environment with no additional cost. This is an important and unique distinction of Advanced Server because it separates the network operating system decision from the protocol issues.R!6LñM1ñ
}„ 9!ÍñM6N܈Comparing Costs: a $20,000 ServerEŸM6N& €>€°R˜€‚ÿWhat You Can Get for $20,000ŽhñMÄN& €Ð€˜˜˜€‚ÿFor $20,000, this is what you could acquire with either Microsoft Advanced Server or Novell NetWare. ¼6NŒ€- (€€°˜€‚€
€‚ÿSuppose you are responsible for making the purchasing decision for a network infrastructure in your department. You must provide a powerful and reliable file and print services to all your users including both Macintosh and remote users, and you must also allow users inÄNŒ€ŸM other departments or areas of your company to share information. $20,000 with Microsoft Advanced Server and Novell NetWare£FÄN/]#Š€Œßm ó €€˜€
‚ÿ€€˜€‚ÿ€R€˜€%‚ÿÿÿComponentWindows NTAdvanced ServerNovell NetWareVersion 4.xŽŒ€3‚v#º€ßm ó €€˜€‚ÿF€€˜€€&€€€€€&€‚ÿ€¼€˜€%€'‚ÿÿÿHardwareDual Pentium™/66 + 64Mb RAM orR4400/75 RISC + 64Mb RAM orAlpha AXP™/150Single Processor 486 66MHz with 16Mbytes RAM$/²‚[#†€Hßm ó €€˜€‚ÿ€$€˜€‚ÿ€<€˜€'‚ÿÿÿNumber of UsersUnlimited100½a3‚oƒ\#ˆ€Âßm ó €€˜€‚ÿ€(€˜€‚ÿ€f€˜€'‚ÿÿÿMacintosh ClientsUnlimited clients - included5 clients - included1,000 clients - $1,195¢G²‚„[#†€Žßm ó €€˜€‚ÿ€ €˜€‚ÿ€X€˜€'‚ÿÿÿRemote Access64 connections - included16 connections - $2,395 ·VoƒȄa#’€¬ßm ó €€˜€‚ÿ$€*€˜€€(€‚ÿ€–€˜€'‚ÿÿÿProtocols IncludedTCP/IP, IPX, NETBEUI, AsynchBEUI, DLC, AppleTalk®IPX only±F„y…k#¦€Œßm ó €€˜ÿ€€˜˜€‚ÿ€0€˜˜€‚ÿ€\€˜˜€'‚ÿÿÿProcessors SupportedUp to 16 ProcessorsSingle processor onlyjEȄã…% €Š€°˜€‚ÿThere are two very important factors to consider with this chart: ù¸y…܈A P€q€T˜ñ€„ð9€ƒ€
€€ €‚ƒ€
€‚ÿ1.Only Advanced Server gives you the flexibility to utilize these advanced hardware platforms, such as the Digital Alpha AXP, MIPS® or symmetric multiprocessing machines that are either Intel- or RISC-based, letting you predicate your hardware decision on the specific needs of your organization and not on the network operating system.2.Only Advanced Server provides seamless access of network resources to all users regardless of whether they are PC or Macintosh users or whether they are locally or remotely connected. Additionally, Advanced Server provides an unlimited license to all potential clients, unlike the NetWare solution, which incurs additional costs for adding users.Q ã…-‰1õ +‰ ð€!Î-‰‰ÃSave Money As Your Network GrowsT.܈‰& €\€°R˜€‚ÿAre You Saving Money As Your Network Grows?Ò¬-‰S‹& €Y€°˜€‚ÿOne of the largest hidden costs with network operating systems is the licensing of clients. Some vendors of networking products charge a per client cost while others provide licensing on a 10, 50, 100, or 1000 user basis. When Microsoft created the unlimited license cost structure for the Windows NT Advanced Server, we based the decision on customer suggestions. The biggest complaints about per client cost structure were:»ƒ‰Œ8 >€€T˜ñ€„ð9€€ƒ‚€€ƒ‚ÿ·It imposes restrictions. ·It forces network managers to (sometimes arbitrarily) limit information availability to users. ê»S‹øŒ/ ,€w€°¤€€€€‚ÿThe following chart compares client licensing charges of Microsoft Advanced Server and Novell NetWare (Note: These are suggested retail prices from 10/1/93. Actual prices may vary).ïkŒç„#؀Ö_i Ú É Ä €€˜˜€‚ÿ€€˜˜‚ÿ€&€˜˜€‚ÿ€`€˜˜€‚ÿ€œ€˜˜‚ÿÿÿServersClientsWindows NT Advanced ServerNovell NetWare Version 4.01Novell NetWare Version 3.1xÄ7øŒ«Ž#ê€n_i Ú É Ä €€˜˜ÿ€€˜€‚ÿ€
€˜‚ÿ€€˜€)‚ÿ€*€˜€*‚ÿ€B€˜‚ÿÿÿ125$2,995.00$4,695.00$3,495.00 (20 users)ª+çU#΀V_i Ú É Ä €€˜€‚ÿ€€˜‚ÿ€€˜€)‚ÿ€(€˜€*‚ÿ€@€˜‚ÿÿÿ150$2,995.00$6,295.00$4,995.00«,«Ž À#΀X_i Ú É Ä €€˜€‚ÿ€€˜‚ÿ€€˜€)‚ÿ€*€˜€*‚ÿ€B€˜‚ÿÿÿ1100$2,995.00$8,795.00$6,995.00U À܈°1U¼À#΀b_i Ú É Ä €€˜€‚ÿ€€˜‚ÿ€€˜€)‚ÿ€*€˜€*‚ÿ€D€˜‚ÿÿÿ1500$2,995.00$26,395.00Not supported°1 ÀlÁ#΀b_i Ú É Ä €€˜€‚ÿ€€˜‚ÿ€€˜€)‚ÿ€*€˜€*‚ÿ€D€˜‚ÿÿÿ3500$8,985.00$79,185.00Not supported²3¼ÀÂ#΀f_i Ú É Ä €€˜€‚ÿ€€˜‚ÿ€€˜€)‚ÿ€,€˜€*‚ÿ€H€˜‚ÿÿÿ31000$8,985.00$143,985.00Not supported´5lÁÒÂ#΀j_i Ú É Ä €€˜€‚ÿ€
€˜‚ÿ€€˜€)‚ÿ€0€˜€*‚ÿ€L€˜‚ÿÿÿ101000$29,950.00$479,950.00Not supportedMÂÃ/ .€<€°°˜â$*wO€
‰€‚ÿGraphical Representation1ÒÂPÃ1mÿÿÿÿÿÿÿÿÏÿÿÿÿPÃŒÃ<ÃŒÃ5 :€€°˜€‚€†"€€‚ÿn=PÃúÃ1è9!"ÐúÃ`ÄÈDon't Let your operating system limit your choice of hardwaref@ŒÃ`Ä& €€€°R˜€‚ÿDon't Let Your Operating System Limit Your Choice of Hardwared>úÃÄÅ& €}€°˜€‚ÿOne of the biggest challenges in any Information Technology (IT) group is getting the most use out of hardware resources. As new technology becomes available, the dangers are that existing systems may become obsolete, or that the lack of return on investment may not justify the purchase of the latest technology. 6`ÄúÅ1 2€ €°˜€†"€€‚ÿaÄÅ[ÆE Z€8€˜‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿSource:Open Systems Today6úÅ‘Ç& €!€˜˜€‚ÿUnlike other operating systems, however, Windows NT Advanced Server protects your investment by minimizing these dangers. For example, compare the hardware choices available with Windows NT Advanced Server against those available with NetWare, specifically in terms of:†7[ÆÈO n€n€T˜ñ€„ð9€
€ƒâ™%ʘ€
‰€‚€
€ƒâP„¤Ä€
‰€+‚ÿ·Symmetric Multiprocessing·Portability^-‘ÇuÈ1ÀÿÿÿÿÿÿÿÿÑÿÿÿÿuÈ×ÊFileprint - Symmetric Multiprocessing - popupAȶÈ% €8€ °R€‚ÿSymmetric Multiprocessing!ûuÈ×Ê& €÷€°˜€‚ÿSymmetric Multiprocessing allows purchasers to significantly increase processing power by purchasing only additional processors, not entire systems. It thereby doubles the processing power at roughly one third the price. However, no benefit accrues unless the operating system software natively supports SMP. Since Windows NT Advanced Server does support SMP, the cost savings is clearly applicable. Novell NetWare, however, does not support SMP, and therefore cannot take advantage of this cost savings.P¶È'Ë1ûÿÿÿÿÿÿÿÿÒÿÿÿÿ'Ë Fileprint - Portability - popup3×ÊZË% €€ °R€‚ÿPortabilityI'Ë£Í2 2€/€°˜€€ €€ €‚ÿThrough its portable design, Windows NT Advanced Server is able to run not only on Intel processor machines, but also those supporting RISC, such as the MIPS R4000® and R4400, the Intergraph Clipper™ and the new Digital Alpha AXP chip. This is important for two reasons. First, with new technologies from Digital, Intel, IBM and MIPS, it is not clear which chip architecture will deliver the best price performance. Portable operating systems such as Windows NT help minimize the risk since it will run on any of these systems. / ZË & €€°˜€‚ÿSecond, because customers have strategic relationships with their hardware vendors, it is advantageous to separate the hardware from the operating system and applications decision. Unlike NetWare, which only supports a single processor type, Windows NT Advanced Server does not force or limit the customer to choose according to the requirements of a specific type of processor. Windows NT Advanced Server is both sold and supported by a variety of chip manufacturers, providing a broad range of choices for customers.£Í ×ÊG£ÍS18ð€!t"ÓS¬³Fileprint - Save MoneyY3 ¬& €f€°R˜€‚ÿSave Money by Using Your Server as a Workstationº“Sf' €'€˜˜˜€‚ÿWhy purchase an additional PC when Windows NT can run popular applications for MS-DOS and Windows, and support hundreds of users simultaneously?%þ¬‹' €ý€˜˜€‚‚ÿUnlike NetWare, Windows NT Advanced Server need not be dedicated solely to file and print sharing. In small and mid-size work environments, the ability to use the file and print server as a workstation means empowering another user. NetWare cannot do this because it does not run desktop applications: it neither provides protection, nor does it employ the type of desktop security necessary to allow a server to function simultaneously as a workstation.Windows NT, however, delivers on these requirements:OýfÚR r€û€T˜ñ€„ð9€
€ƒ€
€‚€
€ƒ€
€‚€
€ƒ€
€‚ÿ·It runs MS-DOS-based, Windows-based 16bit, Windows-based 32-bit, POSIX, and OS/2 character-based applications.·It supports integration functions such as OLE and WOSA.·It uses the same Windows interface used by over 30 million users. Ù³‹³& €g€°˜€‚ÿAdditionally, Windows NT is secure. Windows NT Advanced Server enables the administrator to configure a personality or customized configuration on a per user basis, which has the effect of limiting or restricting access to various components of the operating system. It also ensures that companies who wish to get the most out of the file and print servers can without the traditional fear that it would compromise system integrity.U$Ú1ó" "ÔU Simplifying Access To Your MainframeM'³U& €N€°R˜€‚ÿSimplifying Access To Your MainframeŸzô% €ô€°˜€‚ÿThere are several important criteria to consider when implementing a communications server into networking environment:(àU H ^€Á€T˜ñ€„ð9€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚ÿ1.The gateway must be stable and reliable.2.Administration must be intuitive and easy to manage.3.The gateway must have support from industry leading client providers.4.The gateway should be cost effective. 1ôM
* "€€°˜€‚€‚ÿSNA Server for Windows NT and Windows NT Advanced Server meets each of these criteria and provides administrators with a reliable and easy to manage integration platform for LAN users and their mainframe.SNA Server for Windows NT simplifies mainframe access:ʁ  I `€€˜˜â}ʔ=€
‰€‚ãÊXH €
‰€‚ãa•-€
‰€‚ÿSNA Server is Stable and ReliableSNA Server Is Easy To Install and ManageSNA Server Is Supported By Third PartiesR!M
i 15ÿÿÿÿÿÿÿÿÕÿÿÿÿi LSNA Server is Stable and ReliableI$ ² % €H€ °R€‚ÿSNA Server is Stable and Reliablešti L& €é€°˜€‚ÿA fully 32-bit server application, SNA server runs fully protected on Windows NT and Windows NT Advanced Server. Unlike Novell's NetWare for SAA which usually runs on a separate server, SNA Server can utilize the same hardware as your file and print server. Like Windows NT itself, it is both scalable and portable, and thus it can take advantage of multiprocessing or RISC servers. And, unlike NetWare 3.1x, all applications are protected from the operating system. This, combined with the flexibility to run on more powerful hardware allows departments to consolidate servers, which in turn reduces administration overhead.Y(² ¥1Kt" ‡"Ö¥öBSna Server Is Easy To Install and ManageQ+Lö& €V€°R˜€‚ÿSNA Server is Easy to Install and Manage®‡¥¤' €€°°˜€‚ÿOne administrator can easily configure several SNA Servers, add users, and establish security without ever leaving his or her desk. ŸzöO@% €ô€°˜€‚ÿWindows NT Advanced Server accommodates the needs of b¤O@Loth administrators and end users for flexibility and ease of use:ÁO¤Br ²€Ÿ€T˜ñ€„ð9€
€ƒ€
⠘Љ€‚€
€ƒ€
€‚€
€ƒ€
âkëá|‰€‚€
€ƒ€
ât牀‚ÿ·It is easy to install. ·It can support simultaneous sessions from multiple mainframes.·It allows remote users to run mainframe sessions and applications (including client-server APPC applications) just as they would locally on the network. Example·It provides excellent integration with IBM's NetView®. Q O@aB1;ÿÿÿÿÿÿÿÿ×ÿÿÿÿaBKDFileprint - More on InstallationêÄBKD& €‰€°˜€‚ÿBecause it is tightly integrated with Windows NT Advanced Server, SNA Server uses the same graphical administration tools and the same security model, and it can be remotely monitored, configured and managed. Additionally, SNA Server inherits the same users' rights that have been established under Windows NT Advanced Server, significantly reducing repetitive administrative tasks that would be necessary using Novell's NetWare for SAA and NetWare.R!aBD1ÏÿÿÿÿÿÿÿÿØÿÿÿÿDGFileprint - Logon Example - Popup}WKDG& €¯€°˜€‚ÿUnder Windows NT Advanced Server, an administrator establishes a single logon and security profile for each user. That security and user profile is automatically mapped to additional servers, including SNA Server. Under NetWare 2.x and 3.x, the administrator must configure security and profile administration for each server. Additionally, since NetWare for SAA must run on a separate server, additional and redundant configuration is necessary. This type of additional administrative overhead directly translates into expensive and unnecessary costs which most organizations can hardly justify.LDfG1(ÿÿÿÿÿÿÿÿÙÿÿÿÿfGBIFileprint - More on NetViewܶGBI& €m€°˜€‚ÿAside from supporting such functions as RTM, administrators can map any number of user-defined system alerts to notify NetView. Similarly, the completely bi-directional NetView support allows an MIS administrator to manage a Windows NT Advanced Server from the NetView console. This level of integration ensures that investment in mainframe applications and information can be shared, and even enhanced, with Windows NT Advanced ServerY(fG›I1" " ‰"ڛIìIÝKSna Server Is Supported By Third PartiesQ+BIìI& €V€°R˜€‚ÿSNA Server Is Supported By Third Partiesñ¾›IÝK3 4€}€°˜€‚ã¯Ð/J€
‰€‚ÿSNA Server enjoys broad support from third parties. Aside from supporting the WOSA services for SNA, SNA Server supports most third party 3270 and 5250 emulation products for Windows, MS-DOS, OS/2 and the Macintosh. This helps ensure that investments made in those products will be preserved, while adding significant value in the form of lower administration costs, better performance and enhanced reliability. Details on SNA IntegrationPìI-L1Á ‡"#Û-LvL¾€Reduce Your Adminstration CostsI#ÝKvL& €F€°R˜€‚ÿReduce Your Administration Costs°‰-L&M' €€˜°˜€‚ÿLess than 15 percent of the five-year total cost of a personal computer ownership is represented by capitalized hardware and software.R+vLxO' €W€°˜€‚‚ÿThe remaining 85 percent is dominated by such personnel costs as support, training and so on. Clearly, making system administration easier reduces these personnel costs. (Statistic provided by Gartner Group)Compared with Windows NT, NetWare 2.x and 3.x simply don't provide the features you need to set up an enterprise network. There is no way to link servers and provide the single network login that you need for centralized administration and practical user access. There is also no provision for WAN capability through inter-domain relationships.:à&M¾€Z ‚€Á€˜˜€‚ã*ŒPæ€
‰€‚ã¹5'€
‰€‚ã’²~„€
‰€‚ãV­ìŀ
‰€‚ÿTo cut administration costs, consider the folxO¾€ÝKlowing suggestions:Centralize Your Enterprise ManagementSecure Your InformationAdminister Your System From AnywhereControl the Distribution of Your SoftwareV%xO1o ‰"#܁b …Centralize Your Enterprise ManagementN(¾€b& €P€°R˜€‚ÿCentralize Your Enterprise Management—qù& €â€°°˜€‚ÿOne big drawback with many local area networks is that each new server you add needs its own security system. §€b …' €€°˜€‚‚ÿAs the administrator, you have to duplicate effort for each new server. As a user, you have to login separately to each server that you need to access. To solve this problem, Windows NT allows servers to work together and provide a common, enterprise-wide security system. Windows NT allows you to set up wide area networks, so you can get access to resources anywhere in the world with a single network login.Implementation of this management feature is easy. By replicating a database of users on each server, you can establish a "domain" of multiple servers with a single entry point. Domains can then be assigned trust relationships, which allow either unilateral or bilateral access between two or more domains. Once you log in to one of the servers, you are automatically recognized by all the others. This makes both security administration and enterprise access much more convenient. W&ù÷…19#À#Ý÷…7†?‰Keep Your Information Where It Belongs@ …7†& €4€°R˜€‚ÿSecure Your Information‡a÷…¾†& €Â€°°˜€‚ÿWindows NT is designed to meet government-certifiable, C2 level security as standard feature. 1
7†ïˆ' €€°˜€‚‚ÿAs information spreads across your network, so does the potential for security breaches. A good security system needs to be unobtrusive for legitimate users, impenetrable by hackers and easy enough to set up so that it will actually be used. This security is administered using a simple, graphical interface.NetWare does not include C2 level security as a standard feature, and because of the lack of server-to-server integration in NetWare 2.x and 3.x, administering security in multi-server networks is complicated .P"¾†?‰. ,€D€°˜ãSN¶o€
‰€ ‚ÿMore Information on SecurityU$‰1°#ô
#ޔ‰á‰`ŽAdminister Your System From AnywhereM'?‰á‰& €N€°R˜€‚ÿAdminister Your System From AnywhereY”‰`Š& €²€°°˜€‚ÿWith Windows NT, you can administer any server from any Windows NT-based workstation. DቤŒ& €=€°˜€‚ÿFor example, you might want to monitor a remote server's event log and check the file activity that has been occurring. With Event Viewer, you can check any Windows NT host on the network without leaving your seat. This includes tracking such things as: logins, logouts, file or object accesses, system shutdowns and user rights. The same is true for the Performance Monitor. It can be used not only for checking system functions like processor activity, hard disk accesses and I/O, but also to monitor server applications like SQL Server.¼–`Š`Ž& €-€°˜€‚ÿA third feature of Windows NT that helps you administer large networks centrally is its support for the simple network management protocol (SNMP). This standard protocol allows you to setup "agents" that report network activity to your central management station through management information bases (MIBs). Windows NT provides several network administration tools for SNMP that you can use immediately.Q ¤Œ±Ž1ðÀ#ï#ß±ŽÁStay In Control Of Your SoftwareR,`Ž& €X€°R˜€‚ÿControl the Distribution of Your Software–p±Ž™& €à€°°˜€‚ÿA major problem facing companies with large networks is controlling software distribution across the clients.wEÁ2 2€‹€°˜€âWî€
‰€‚ÿMicrosoft has demonstrated a product that revolution™Á`Žizes this aspect of network administration. Code-named Hermes, it can remotely audit, install and upgrade software across any network. This technology is supported by several independent vendors who plan to ship enhanced software distribution and auditing packages. J™fÁ1·ÿÿÿÿÿÿÿÿàÿÿÿÿfÁÓÇVendors Supporting HermesAÁ§Á% €8€ °R€‚ÿVendors Supporting Hermesr$fÁÂN#l€H¡§ €€€‚ÿ€2€ÿ€4€~‚ÿÿÿAttachmate CorporationMicrocom5§Á©Â[#†€j¡§ €€~ÿ€€€‚ÿ€F€ÿ€H€~‚ÿÿÿAutomated Designs Systems, Inc.NCR Corporation…*Â.Ã[#†€T¡§ €€~ÿ€€€‚ÿ€@€ÿ€B€~‚ÿÿÿBrightwork Development, Inc.Netlabs‡,©ÂµÃ[#†€X¡§ €€~ÿ€€€‚ÿ€2€ÿ€4€~‚ÿÿÿCompaq Computer Corp.NetWork Managers5.ÃEÄ[#†€j¡§ €€~ÿ€€€‚ÿ€T€ÿ€V€~‚ÿÿÿComputer Associates International Inc.Olivetti—<µÃÜÄ[#†€x¡§ €€~ÿ€€€‚ÿ€,€ÿ€.€~‚ÿÿÿCorporate SoftwareSiemens Nixdorf Information Systems‡,EÄcÅ[#†€X¡§ €€~ÿ€€€‚ÿ€B€ÿ€D€~‚ÿÿÿDigital Equipment CorporationSoftmart$ÜÄâÅ[#†€H¡§ €€~ÿ€€€‚ÿ€ €ÿ€"€~‚ÿÿÿ800-SoftwareSoftware SpectrumncÅPÆ[#†€&¡§ €€~ÿ€€€‚ÿ€€ÿ€€~‚ÿÿÿHDCSynoptics†+âÅÖÆ[#†€V¡§ €€~ÿ€€€‚ÿ€6€ÿ€8€~‚ÿÿÿHewlett-Packard CompanyTally SystemsqPÆGÇ[#†€,¡§ €€~ÿ€€€‚ÿ€€ÿ€€~‚ÿÿÿInfonetVisiSofth
ÖÆ¯Ç[#†€¡§ €€~ÿ€€€‚ÿ€€ÿ€€~‚ÿÿÿLegent$GÇÓÇ" €€€ ÿS"¯Ç&È1„ô
#у#á&ÈqÈÄÊMaximize Your Enterprise ResourcesK%ÓÇqÈ& €J€°R˜€‚ÿMaximize Your Enterprise Resources߸&ÈPÉ' €q€°°˜€‚ÿOne of the reasons you installed a network in the first place was to get better use from your resources by sharing them between users. But are you really maximizing your resources? ©ƒqÈùÉ& €€°˜€‚ÿCheck these points against NetWare and the others and you will see how Windows NT delivers the best enterprise resource-sharing:˂PÉÄÊI `€€˜˜ãî3F“€
‰€‚ãƖM€
‰€‚ã{Ïþ€
‰€‚ÿDon't Let Your Operating System Limit Your ConnectivityGet Everyone ConnectedKeep In Touch From Outside The Officeh7ùÉ,Ë1úï#!$â,ËŒË_Don't Let Your Operating System Limit Your Connectivity`:ÄÊŒË& €t€°R˜€‚ÿDon't Let Your Operating System Limit Your ConnectivityÔ­,Ë`Î' €[€°˜˜€‚ÿIn many cases, your choice of network protocol has been determined by your choice of network operating system. Consequently, you have implicitly standardized on a particular protocol that restricts your future choices for network software and hardware. Many customers, however, are now rejecting the inherent link between network products and the underlying protocol in favor of protocol independent systems, like Windows NT Advanced Server. The benefit of protocol independence to you is simple: you get freedom of choice. By avoiding protocol "lock in", you can choose whatever network products emerge in the next few years according to your needs, not your system's requirements.Z5ŒËºÎ% €j€˜˜€‚ÿProtocols supported by Windows NT Advanced Server:‰;`ÎCÏN l€v€Pñ€„ð9€€
ƒ‚€€
ƒ‚€€
ƒ‚€€
ƒ‚€€
ƒ‚ÿ·NetBEUI·AsynchBEUI·TCP/IP·IPX/SPX·DLC>ºÎÏ/ .€€T˜ñ€„ð9€€
ƒ‚ÿ·AppleTalkG"CÏÈÏ% €D€˜˜€‚ÿProtocols supported by NetWare:;
Ï. ,€€Pñ€„ð9€€
ƒ‚ÿ·IPX/SPÈÏÄÊXP!ÈÏ_/ .€B€T˜ñ€„ð9€€
ƒ‚ÿ·TCP/IP (using tunneled IPX)G¦1Ëу#F$ã¦í‡Get Everyone ConnectedG_í, (€6€°R˜€€,€‚ÿGet Everyone ConnectedðæÝ- (€‡€°˜˜€€ €‚ÿMost networks are heterogeneous. Even if 99% of your clients are PCs running MS-DOS and Windows, you may still need heterogeneous support just to add a few UNIX® workstations or Macintoshes.œwíy% €î€°˜€‚ÿWindows NT Advanced Server has standard features to connect to Macintoshes and UNIX networks. Compared with NetWare: BÝ^#Œ€„H  €€°˜€‚ÿ€6€°˜€‚ÿ€p€°˜€'‚ÿÿÿInteroperability with...Windows NT Advanced ServerNetWare¢y_#Œ€EH  €€°˜€‚ÿ€€°˜€‚ÿ€Ø€°˜€'‚ÿÿÿMacintoshAppleTalk, long filenames, transparent file and print access from Chooser. Unlimited clients.AppleTalk NLM, 5 users, transparent file and print.Iêc_#Œ€ÕH  €€°˜€‚ÿ€€°˜€‚ÿ€Ò€°˜€'‚ÿÿÿUNIXTCP/IP protocol and utilities are standard. DCE compatible RPC allows distributed applications.No standard support. NFS and FTP/print are available at extra cost. TCP/IP is tunneled into IPX so IP routing is not possible.$‡" €€€ÿV%cÝ1o!$ÿÿÿÿäÝ+i Keep In Touch From Outside The OfficeN(‡+& €P€°R˜€‚ÿKeep in Touch from Outside the OfficeÛ´Ý' €i€°°˜€‚ÿPortable computers have had a huge impact on work styles. This new trend also has implications for networking, since remote access capability is now an important feature that lets you use the network even when you are away from the office. Windows NT includes remote access capabilities as a standard feature. Both desktop and server versions can be accessed by modem. Windows NT Advanced Server supports up to 64 serial connections.c=+i & €{€°˜€‚ÿNetWare by comparison does not allow you to login to a server remotely. Instead, another machine must be dedicated as a communications server. Remote users then connect to the communications server with dumb terminal software. You cannot download files, your connection is slow, and running Windows is impractical.a0Ê 1)ÿÿÿÿÿÿÿÿåÊ 1
) Microsoft Fortran PowerStation 32 for Windows NTgBi 1
% €„€‚H€‚ÿMicrosoft® FORTRAN PowerStation 32 for Windows NT™ - Fact Sheet9Ê j
) "€ €V°˜È:‚H€
‚ÿMain Features¿ 1
) ´ 6€P‘€:‚HâI‚p~€
‰€ ‚âk6b¿€
‰€ ‚âZôT$€
‰€ ‚âÀ0öR€
‰€ ‚âäj.ä€
‰€ ‚â«Ç±”€
‰€ ‚â—]ÑH€
‰€ ‚âÖE“v€
‰€ ‚â>wó€
‰€ ‚â½€2š€
‰€ ‚âª>+@€
‰€ ‚ÿIncreased PowerIncreased CapacityDownsizing and PortingVisual WorkbenchEditor FeaturesProject Maintenance CapabilitiesCode BrowserDebuggerProduct Assistance and SupportGraphics Library SupportSystem Requirements1j
Z 1rÿÿÿÿÿÿÿÿæÿÿÿÿZ ›
:) ” ( €$€T˜È:‚H€
‚ÿIncreased Power¿Z ›
H ^€€PÈ:‚H€
€ƒ‚€
ƒ€€
€€
€‚€
ƒ€‚ÿ·32-bit executables for the Microsoft® Windows NT™ operating system yield mainframe-class performance·Advanced IntelÒ i486Ô and Pentium™ optimizations·32-bit graphics support1” Ì
1AÿÿÿÿÿÿÿÿçÿÿÿÿÌ
Ü=›
 ( €*€T˜È:‚H€
‚ÿIncreased CapacityӗÌ
Ü< F€/€PÈ:‚H€
ƒ€‚€
€ƒ‚€
ƒ€‚ÿ·32-bit compiler for Windows NT avoids capacity limitations·4 gigabytes of addressable memory·80387 math coprocessor support and emulation1 
1¦ÿÿÿÿÿÿÿÿèÿÿÿÿ
å@AÜN( €2€T˜È:‚H€
‚ÿDownsizing and Porting‹5
å@V z€k€PÈ:‚H€
ƒ€€
€€
€‚€
ƒ€‚€
ƒ€€
€‚€
ƒ€‚ÿ·Large suite of VAXÒ, IBMÒ and Microsoft's own extensions allows easy porting of mainNå@Üframe and minicomputer code·Key subset of FORTRAN 90·Mixed-language programming with the Microsoft Visual C++Ô development system and MASM·Assembly language listings allow finer hand-tuned optimization1NA1žÿÿÿÿÿÿÿÿéÿÿÿÿAƒC;å@QA( €&€T˜È:‚H€
‚ÿVisual Workbench2ÒAƒC` Ž€¥€PÈ:‚H€
ƒ€€
€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€€
€‚€
ƒ€‚ÿ·WindowsÔ-hosted Visual Workbench·Toolbar allows quick interaction with Editor functions·Icons for commonly used operations·Multiple document interface allows easier and more consistent management of multiple windows·Access to the clipboard in the Microsoft WindowsÔ operating system provides convenient cut and paste from other Windows-based applications·Full access to the printing functionality of Windows from within Visual Workbench1QA´C1Sÿÿÿÿÿÿÿÿêÿÿÿÿ´CÖE:ƒCîC( €$€T˜È:‚H€
‚ÿEditor Featuresè”´CÖET v€)€PÈ:‚H€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚ÿ·Syntax coloring for easier maintenance of new and existing code·Bookmark facility for editing large files efficiently and returning to positions set in a previous editing session·Customizable colors and fonts for easier viewing·Multiple levels of "undo" ·Parenthesis balancing makes typing complicated expressions easier·Saving and restoring work spaces makes maintenance easier1îCF1AÿÿÿÿÿÿÿÿëÿÿÿÿFHK#ÖERF( €F€T˜È:‚H€
‚ÿProject Maintenance CapabilitiesÅqFHT v€ã€PÈ:‚H€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚ÿ·Automated "make" file generation·Flexible graphical selection of options for compile and link stages·Ability to create both libraries and executable files·Alternate project environments supported from within Visual Workbench·Ability to add tools and commands to the Tools menu·Conditional compile, full project and build facilities using icons1RFHH1‡ÿÿÿÿÿÿÿÿìÿÿÿÿHHžI7HH( €€T˜È:‚H€
‚ÿCode BrowserãHHžI< F€Ç€PÈ:‚H€
ƒ€‚€
ƒ€‚€
ƒ€‚ÿ·Seamless integration of Browser with Editor·Graphical call-tree display makes code structure easy to visualize·Ability to identify all locations in the code where a variable or subroutine is defined or referenced 1HÏI19ÿÿÿÿÿÿÿÿíÿÿÿÿÏI×K3 žIJ( €€T˜È:‚H€
‚ÿDebuggerÕ‰ÏI×KL f€€PÈ:‚H€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚ÿ·Integrated debugging, including single-stepping, step-in and step-over functions and step-to line·Toolbar allows easy access to Debugger functionality·Set and release breakpoints with a simple Mouse click·Ability to expand and view multidimensional array values in Local and Watch windows ·Assembly instructions along with the Register window simplify low-level debugging1JL1 ÿÿÿÿÿÿÿÿîÿÿÿÿLãNI!×KQL( €B€T˜È:‚H€
‚ÿProduct Assistance and Support"ÈLsNZ ‚€‘€PÈ:‚H€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€€
€‚€
ƒ€‚ÿ·Context-sensitive Windows online Help allows instant help on language and features·Sophisticated "hot links" allow easy browsing through Help·Numerous examples for syntax usage online that can be copied and pasted·List of commonly asked questions available online·CompuServeÒ support with dedicated FORTRAN forum allows other serious programmers to assist with problems·90-day telephone support at no charge for setup assistancep?QLãN1 2€~€PÈ:‚H€
ƒ€€
€‚ÿ·Continuing support for previous versions of MSÒ-FORTRAN1sNO1êÿÿÿÿÿÿÿÿïÿÿÿÿO €CãNWO( €6€T˜È:‚H€
‚ÿGraphics Library SupportvCO €3 6€†€PÈ:‚H€
ƒ€‚€
ƒ€‚ÿ·32-bit graphics libraries·VGA, Super VGA and VESA supportWO €ãN1WO=€1Qÿÿÿÿÿÿÿÿðÿÿÿÿ=€Q‚> €{€( €,€T˜È:‚H€
‚ÿSystem RequirementsQ&=€̀+ &€L€PÈ:‚H€
ƒ€‚ÿ·Microsoft Windows NT version 3.1uH{€A- *€€PÈ:„H €
ƒ€‚ÿ·IBM 100-percent-compatible PC using a 80386/25 or higher processorÌ̀Q‚D V€™€PÈ:‚H€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚ÿ·16MB of memory·One 3.5-inch high-density disk drive with 12MB of available disk space·Microsoft Mouse or compatible pointing device (optional)·80387 or higher math coprocessor (optional)–eAç‚1~ÿÿÿÿ?%ñç‚8ƒ……National Fuel Gas Supply Corporation - Case StudyCBB("btn_next_index", "PI(`nteval.hlp', `next_5')")Q(Q‚8ƒ) "€P€°°˜€€-‚ÿNational Fuel Gas Supply Corporation­ç‚=…X ~€[€°˜€€€€ €€ €€ €‚ã¶䵀
‰€‚ãÉ] ‰€‚ÿWith deregulation of the natural gas industry creating a new, more competitive business environment, National Fuel Gas Supply Corporation decided to upgrade its OS/2®-based mission-critical computerized control system to one that would allow better, faster access to information. The new system is based on the Microsoft® Windows NT™ and Windows™ for Workgroups operating systems.Solution SummaryCase DetailsH8ƒ……. ,€4€˜˜âÌ,¼€
‰€‚ÿFor More InformationA=…ƅ1P%\%òƅ)†øŠSolution Summaryc9……)†* $€r€˜ŒR˜€€‚ÿNational Fuel Gas Supply Corporation Solution Summary4 ƅ]†( €€°˜€€‚ÿIndustry;)†˜†% €,€°˜€‚ÿNatural gas utility<]†Ԇ' €*€˜€€‚ÿBusiness Solution`;˜†4‡% €v€°˜€‚ÿSupervisory Control and Data Acquisition (SCADA) system 3Ԇg‡$ €€˜€‚ÿArchitecture·‹4‡ˆ, &€€°˜€€ €‚ÿCustom application for Windows NT™ ported from OS/2 running on a Microsoft LAN Manager network and a satellite-based wide area networkÄXg‡â‰l ¦€±€˜€€‚€.€‚€.€‚‚‚€.€‚€.€‚€.€‚‚€.€€.€‚‚€€‚‚‚‚‚‚€‚ÿProducts UsedMicrosoft Access®Microsoft Excel for Windows™Microsoft LAN ManagerMicrosoft SQL ServerMicrosoft Visual Basic®Microsoft Windows NT™Microsoft Windows™ for WorkgroupsMicrosoft Word for WindowsNovell® NetWare®Development ResourcesIn-housePanData8 Main Street, Flemington, NJ 08822Development Time 1 ˆŠ% €€°˜€‚ÿTwo years2 â‰EŠ' €€˜€€‚ÿBenefit³ŠøŠ& €€°˜€‚ÿProvides faster access to mission-critical data, positioning the company to do business in the highly competitive deregulated environment.EEŠ=‹1Œÿÿÿÿÿÿÿÿóÿÿÿÿ=‹„For More Information>øŠ{‹' €.€ČR˜€‚ÿFor More Information Å=‹„D V€‹€°˜€€€€€€€€€€€‚ÿTo learn more about Microsoft products, call the Microsoft Sales Information Center at (800) 426-9400. In Canada, call the Microsoft Canada Customer Support Centre at (800) 563-9048. If you require text telephone services (TT/TDD), call (800) 892-5234 in the U.S.A. or (905) 568-9641 in Canada. Outside the 50 United States and Canada, please contact your local Microsoft subsidiary. For more information about PanData, call (908) 782-5003.b1{‹æ1î7?%ÿÿÿÿôæAŽD€National Fuel Gas Supply Corporation Case Details[4„AŽ' €h€˜ŒR˜€‚ÿNational Fuel Gas Supply Corporation Case Details§€æèŽ' €€°°˜€‚ÿThe National Fuel Gas Supply Corporation can sum up the reason it changed its computer system in a single word: deregulation.رAŽÌÂ' €c€°˜€‚‚ÿPart of the 90-year-old National Fuel Gas Company, National Fuel Gas Supply Corporation purchases, gathers, transports, or stores natural gas in markets throughout the United States. More than 700,000 customers in western New York and westeèŽÌ„rn Pennsylvania depend on National Fuel Gas for their natural gas.For much of its existence, the company's operations--like those of all other natural gas companies in the country--were closely regulated by the federal government. That changed in 1985 when the natural gas industry began to evolve toward a more competitive environment. The evolution was completed in 1992 when the Federal Energy Regulatory Commission issued Order 636, a restructuring mandate that requires all interstate pipeline companies such as National Fuel Gas to "unbundle" and separately market the components of their traditional merchant function. These components include transportation, storage, and sales of natural gas.óÀ莿Å3 4€€°˜€‚ât8 ‰€‚ÿThe company uses computers to control the movement of gas throughout a network of pipelines, compression facilities, and storage sites from its headquarters in Buffalo, New York. Recently, National Fuel Gas made the transition from a minicomputer-based control system to one running the OS/2 operating system on PCs. But the added competitive requirements created by Order 636 put pressure on National Fuel Gas to have a system that would provide the increased power, speed, reliability, and scalability it would need to respond effectively in a changing environment. Management grew increasingly concerned about the ability of the OS/2 system to withstand the demands that would be placed on it.O(ÌÂÆ' €P€ČR˜€‚ÿDeveloping a Response to Deregulationj=¿ÅxÉ- (€{€°˜€‚€ €‚ÿNational Fuel Gas Supply Corporation's first minicomputers were a big improvement over the manual systems they replaced. But they had limited control and data handling capabilities, and the company soon grew to the point where the computer could no longer effectively handle the amount of data required to run the system.The OS/2-based system was a further improvement. It replaced three minicomputers with a PC-based system that provides real-time measurement of gas flows and manages remote control valves and compressors. And the corporation recently installed a series of Supervisory Control and Data Acquisition (SCADA) systems running under OS/2. The software, called ScadaNet™, was developed by PanData, a company that has been providing vertical control software to the natural gas industry for more than 20 years. ôÍÆlÌ' €›€°˜€‚‚ÿIn National Fuel Gas's system, a main control center in Buffalo centrally manages gas flow from five interstate pipelines, 31 underground gas storages, remotely starts and shuts down compressor stations, and monitors and controls the distribution systems. All of this is accomplished through the communication by remote field points with the central dispatching center through a network of satellites and fiber optic links.But deregulation meant more people would need access to data on gas capacity--and they would need it quickly. That's because each gas company owns a certain amount of capacity in a pipeline. If the company doesn't need the capacity, it can be packaged and sold to customers who do need it. O(xÉ»Î' €Q€°˜€‚‚ÿWalt DeForest, National Fuel Gas senior vice president, says as the company was analyzing how to use its computer systems to respond to deregulation, it learned from PanData that the developer would be porting ScadaNet to the Microsoft Windows NT operating system and would no longer provide enhancements to the OS/2 version. National Fuel Gas became convinced to move to Windows NT as well because the operating system would enhance the company's ability to respond to increased competition and best prepare National Fuel for a deregulated future.8lÌóÎ' €"€ČR˜€‚ÿWhy Windows NT |»Î“Ï$ €ø€˜€‚ÿ"There were a lot of reasons to move to Windows NT, but they came down to power, ease of use, reliability, and security."’MóÎ1E Z€š€°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿWalt DeForest, Senior Vice President, N“Ï1„ational Fuel Gas Supply Corporation/“Ï`, &€€°˜€€ €‚ÿGiven the mission-critical nature of its control system, National Fuel Gas Supply Corporation required an operating system platform that was absolutely reliable and secure--a computer system failure in the middle of winter could have severe consequences for National Fuel. "There were a lot of reasons to move to Windows NT," says DeForest. "But they came down to power, ease of use, reliability, and security." Another factor in the decision was the company's existing investment in Windows™-based computing. æ¾1F( €}€°˜€‚‚‚ÿJust as important, says DeForest, is compatibility with the future. "Windows NT is our best chance to be part of what's going to happen over the next decade," he says.PanData agrees. "We consider Windows NT to be the future," says Mike Alfano, PanData president. "We're putting all of our development dollars into Windows NT--in fact, we're licensing the rights to our OS/2 code." Alfano adds that his company was pleased with the support it received from Microsoft as it developed its application for Windows NT. "We can get answers to specific technical questions in a meaningful time frame. The beta program has enabled us to begin development more than a year before Windows NT began to ship."R+`˜' €V€ČR˜€‚ÿMeeting the Needs of an Evolving CompanyÅ F]% €A€˜€‚ÿ"We like the fact that Windows NT is geared to be used on different hardware platforms. Parallel processing, multiple networks--it's all taken into account."’M˜ïE Z€š€°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿWalt DeForest, Senior Vice President, National Fuel Gas Supply Corporation\]~ 3 4€¹€°˜€‚€€€€‚ÿThe new demands on National Fuel Gas Supply Corporation to gather, analyze, and distribute information about its pipeline capacity mean more people need real time access to the SCADA data. Windows NT enables the company to provide that data in a number of ways."We like the fact that Windows NT is geared to be used on different hardware platforms," says DeForest. "Parallel processing, multiple networks--it's all taken into account. We can run office applications on our Novell® NetWare® LAN and ScadaNet at the same time. That means we can get a variety of information to more people at once."BïÀ & €9€°˜€‚ÿScadaNet information from field operations, such as statistics on the movement of natural gas and storage operations, is stored in a SQL Server for Windows NT database, providing improved access to the information. National Fuel Gas personnel can integrate data from the ScadaNet system into Microsoft Excel worksheets for analysis and planning. The company also uses Microsoft Word for Windows to consolidate ScadaNet information in management reports. Both applications run under Windows for Workgroups on PCs across the company's LAN.œv~ \& €í€°˜€‚ÿDeForest says the Windows NT operating system will help National Fuel work with information in another way, too. The pipeline companies that supply National Fuel with natural gas also post product information on electronic bulletin boards. This information may include when gas supplies or transport capacity is available, on which pipelines, and at what cost. Most of these bulletin boards have a Windows-based interface, making them extremely easy to use--especially for people who are unfamiliar with bulletin board systems. National Fuel's Windows NT-based system will enable the company to transfer data from a bulletin board to a spreadsheet, analyze it, and repackage excess capacity as a product that can then be sold to others. For example, if the highest prices are for one-day blocks during peak usage periods, the available capacity can be sold at market clearing prices.R+À ®' €V€ČR˜€‚ÿMore Information, Delivered More QuicklyI"\B' €E€°˜€‚‚ÿDeForest says critical information can now®B„ be delivered quickly in a format that makes decision-making easier and faster. That puts National Fuel Supply in a much better position to react quickly and flexibly to market changes, such as variances in the supply and prices of natural gas.Since Windows NT also allows low-end and high-end systems to share the same software, National Fuel can have the same software running a station with a single compressor or the complete pipeline. That cuts training costs and reduces hardware requirements. 'õ®*D2 2€ë€°˜€€ €€€‚ÿPanData's Alfano says that scalability allows his company to easily size its core SCADA system to accommodate the needs of its various customers in gas, electric, water, and waste water treatment utilities, and manufacturing and train control industries. And, he says, Windows NT offers access to a richer application base than OS/2. "Windows™-based productivity applications are available at a lower cost and provide greater functionality than those now available for OS/2 or UNIX®," he says. Á›BëE& €7€°˜€‚ÿThis was critical to making SCADA data available throughout the organization. Otherwise, every time a user wanted to incorporate operating statistics into a worksheet, he or she would have to move from a UNIX machine to one running the Windows operating system, or leave OS/2 and reboot with the Windows operating system. Both of these options were considered to be too disruptive to the company's workflow. G *D2F' €@€ČR˜€‚ÿThe Need for Greater SecurityÖ¯ëEI' €_€°˜€‚‚ÿBefore deregulation was fully imposed, security wasn't a big concern at National Fuel Gas because the SCADA system was closed. As a result, only 15 people had access to the system. These people had the ability to control the flow of gas by opening and closing valves remotely.With deregulation, as many as 100 people throughout the company will need gas supply information so they can analyze and respond to market conditions. That creates a need for much greater security. As DeForest put it, "Once we open the system up to the rest of the company to pull data out, we have to make sure that if someone connects to the SCADA part of the system, they can't open or close any valves."{T2FƒK' €©€°˜€‚‚ÿAccording to PanData's Alfano, the version of ScadaNet for Windows NT adds security by using Microsoft SQL Server as a gateway to SCADA information. "SCADA sends data to the SQL Server database," he says. "That way, non-operational people can still access SCADA data without actually getting onto the SCADA system. They just log on to SQL Server and the data is right there."DeForest was impressed with the ability of Windows NT to provide high-end security down to the file level. This feature was vital to the company's goal of delivering pipeline information to as many people as possible.`9IãK' €r€ČR˜€‚ÿLooking Ahead--Greater Integration, More EffectivenesszVƒK]L$ €¬€˜€‚ÿ"Ultimately, data from any database will be accessible through the same interface."’MãKïLE Z€š€°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿWalt DeForest, Senior Vice President, National Fuel Gas Supply CorporationJ#]L9O' €G€°˜€‚‚ÿNational Fuel Supply Corporation envisions combining all individual SCADA systems at the various company sites as well as internal departments into one large, integrated system based on Windows NT. "Data from any database will be accessible through the same interface," explains DeForest. "Different computer operators will be able to take their machines and gather all the information they need to put together."DeForest says this kind of integration is vital because he wants to avoid people rekeying information they don't have in their PC.ÿÙïLD€& €³€°˜€‚ÿAs the full effects of deregulation hit the natural gas industry, National Fuel Gas Supply Corporation is confident it has positioned itself to react in the mos9OD€„t effective way possible to dynamic market conditions.19Ou€1Yÿÿÿÿÿÿÿÿõÿÿÿÿu€€(D€€% €€°˜€‚ÿOu€ì€1d2ÿÿÿÿÿÿÿÿöì€KgCGlossary of Terms and Acronyms_
€KU z€L€˜€‡"€6ÈCloseWindow("gloss")€/ˆ"€‰€‚ÿ )ì€t% €€°˜€
‚ÿA+-KŸƒþ ʁ[€˜âNä{À
‰€‚âœØRu€
‰€‚â
@V€
‰€‚â;ù€V€
‰€‚â Io!€
‰€‚â'Io!€
‰€‚âêÓ«D€
‰€‚â%Ò|€
‰€‚â¤ðµV€
‰€‚âJaeŠ€
‰€‚â¶G“€
‰€‚âMKo!€
‰€‚âc&9Ÿ€
‰€‚â•€]€
‰€‚âSKo!€
‰€‚â1¨±€
‰€‚âé{s€
‰€‚ÿaccess control entry (ACE)access control list (ACL)access rightaccess tokenACEACLaddress spacealertalertable threadalerter servicealerting a threadAPCAPC objectAPC queueAPIAPPCapplication programming interface (API)Ùtx…Á P1€˜âh½±€
‰€‚â‚<‹€
‰€‚âš.®€
‰€‚âFP5€
‰€‚âÛ %€
‰€‚âÁ:p€
‰€‚âÕÇ%»€
‰€‚âç7O€
‰€‚â®gŠK€
‰€‚âKÊ¡€
‰€‚✭ʀ
‰€‚âWºª¬€
‰€‚€
‚ÿASMPassociated IRPsassociativityasymmetric multiprocessing (ASMP)asynchronousasynchronous I/Oasynchronous procedure call (APC)attribute cachingauditingauthenticationauthentication packageautomatic working set trimming)Ÿƒ¡…% €€°˜€
‚ÿBZ x…û…: D€@€˜â”Û%ŀ
‰€‚âÅu°€
‰€‚ÿbacking storebatching+¡…&†& €
€°˜€
‚‚ÿC!û…+ˆä –C€˜â‡mä+€
‰€‚â¸þе€
‰€‚â
½³€
‰€‚â3ª%3€
‰€‚âI㳝€
‰€‚â6 Õ€
‰€‚â2²€
‰€‚âÁ+Ҁ
‰€ ‚âI½9 €
‰€‚âÉ€
‰€‚â>º̀
‰€‚â²¶Å/€
‰€‚âé€
‰€ ‚â/hd€
‰€‚âëtÑü€
‰€‚ÿcache managercallbackCDFSchild processCISCclientclient-server modelclone upgradecode setcommitted memorycomplex instruction set computer (CISC)componentcomponent softwareconcurrent applicationconfiguration managerM³&†x‰š g€˜âd쎀
‰€‚âk?ªV€
‰€‚â¸g(—€
‰€‚â$X)—€
‰€‚â•¥ûµ€
‰€‚â–©Úƀ
‰€‚ââVك€
‰€‚âb?}€
‰€‚â–c|!€
‰€‚€
‚ÿconfiguration registryconnecting an interrupt objectconsolecontextcontext switchingcontrol objectcopy-on-writeCPI-Ccritical section)+ˆ¡‰% €€°˜€
‚ÿD
Cx‰®‹Ê b‡€˜â‰ ã€
‰€‚âóó׀
‰€‚âF ¡r€
‰€‚â#µé¼€
‰€‚â{€
‰€‚âH‰
€
‰€‚âjšÛM€
‰€‚â÷îym€
‰€‚âÎ_
€€
‰€‚âÊ^›€
‰€‚âò֎þ€
‰€‚âúƒÜ¢€
‰€‚‾;€
‰€‚ÿdeferred procedure call (DPC)demand pagingdesired access rightsdevice objectdisconnecting an interrupt objectdiscretionary access controldisk mirroringdisk stripingdisk striping with paritydispatcherdispatcher databasedispatcher objectdispatcher ready queueU»¡‰š w€˜ây¯g€
‰€ ‚ât9€
‰€ ‚â.$˜€
‰€‚âø`o!€
‰€‚âD冁€
‰€‚â@@”z€
‰€‚âMÿuä€
‰€‚â©X6º€
‰€‚âČ~#€
‰€‚€
‚ÿdistributed object computingdomaindomain controllerDPCDPC objectDPC queuedriver objectDynamic Data Exchange (DDE)dynamic-link library (DLL))®‹,% €€°˜€
‚ÿE‡3Ž€ ΀€˜â’â£}€
‰€ ‚âʅ:€
‰€‚â8´µl€
‰€‚âäNž€
‰€‚âᩍ§€
‰€‚â-äÄM€
‰€‚â]i€
‰€‚€
‚ÿembedenvironment subsystemexceptionexception dispatcherexception handlerexecutiveexecutive object),\Ž% €€°˜€
‚ÿFI¯3Ž¥š _€˜âölo!€
‰€‚âáe’b€
‰€‚⻍ÑF€
‰€‚âûÓ<€
‰€‚âúÝË €
‰€‚â±K=€
‰€‚âAfQJ€
‰€‚âš<>*€
‰€‚âÃĎ4€
‰€‚€
‚ÿFATFAT file systemfault tolerancefetch policyfile handlefile-mapping objectfile objectfile systemsframe-based exception handler)\ŽΏ% €€°˜€
‚ÿGy4¥SÀE Z€h€˜âІ§<€
‰€‚âgíC“€ÎSÀ€
‰€‚â€wo!€
‰‚‚ÿglobal groupgranted access rightsGUI)Ώ|À% €€°˜€
‚ÿHéwSÀeÁr ´€î€˜â`{o!€
‰€‚âƒm2€
‰€‚â°!7€
‰€‚âußB3€
‰€ ‚âÒ¯€
‰€‚â˜$º€
‰€‚€
‚ÿHALhandlehardware abstraction layer (HAL)Hermeshigh performance file system (HPFS)HPFS)|ÀŽÁ% €€°˜€
‚ÿIGeÁ¬Ã× |€˜â”qñ«€
‰€‚â"ƒo!€
‰€‚âwƒo!€
‰€‚â}Ñtr€
‰€‚â*qk€
‰€‚â{Mu‹€
‰€‚â)˜ÊÀ€
‰€‚âš?¢Y€
‰€‚âp‹ÿ
€
‰€‚â ÓÒN€
‰€‚â¬ÛSž€
‰€‚⬧!€
‰€‚âhwï€
‰€‚âþ¾£H€
‰€‚ÿidle threadIDTIFSimpersonationinstallable file system (IFS)instruction execution unitintegral subsystemInteractive logoninterruptinterrupt dispatcherinterrupt dispatch table (IDT)interrupt objectinterrupt request level (IRQL)interrupt service routine (ISR)e±ŽÁÅ´ 6c€˜âÀ¨âZ€
‰€‚â
°€
‰€‚âОF¨€
‰€‚âÒé'€
‰€‚âV»€
‰€‚âÛË?õ€
‰€‚âx…o!€
‰€‚âÃՎ¡€
‰€‚âok»€
‰€‚⥅o!€
‰€ ‚â©…o!€
‰€‚€
‚ÿinvalid pageI/O completionI/O ManagerI/O request packet (IRP)IOSBI/O status block (IOSB)IRPIRP stack locationIRQLISRISV)¬Ã:Å% €€°˜€
‚ÿKärÅÆr ´€ä€˜âØiŒM€
‰€‚âÄÕª€
‰€‚âäkÉՀ
‰€‚âv®cµ€
‰€‚âå‡é€
‰€‚â(ãJ{€
‰€‚€
‚ÿkernelkernel modekernel objectkernel process objectkernel thread objectkey object):ÅGÆ% €€°˜€
‚ÿL?²Æ†Ç è€e€˜âÿÎ=æ€
‰€ ‚â?C9Ȁ
‰€‚â¥Í¾€
‰€ ‚â!±FX€
‰€‚âNº€
‰€‚âvÃǀ
‰€‚â*ý—î€
‰€‚âÀšo!€
‰€‚€
‚ÿlayered operating systemlazy evaluation algorithmslinklocalelocal procedure call (LPC) facilitylocal replacement policylogon processLPC)GƯÇ% €€°˜€
‚ÿM †Ç»Éñ °7€˜â“nø€
‰€‚ o!€
‰€‚âsr€
‰€‚âÙ{¸®€
‰€‚âûíՀ
‰€‚âlJX€
‰€‚âUó€
‰€‚â,k­€
‰€ ‚âì-J€
‰€‚âÄ_€
‰€‚â‹À€
‰€‚âPáz€
‰€‚â<À€
‰€ ‚⺳G€
‰€‚â°Ía{€
‰€‚â£ê·€
‰€ ‚ÿmandatory access controlmapmapped filemapped file I/Omarshalmasking interruptsmaster/slave systemmaster domainmessenger servicemethodMIDLMIDL compilerMIBsmodelmodified page writermonolithic applicationsR¸¯Ç
Ëš q€˜â¢o!€
‰€‚âÕæF€
‰€‚â‰ì0݀
‰€‚â¥ZÒ€
‰€‚â¿Á/€
‰€‚â·ý\j€
‰€‚⶯+Ž€
‰€‚âÝ¢o!€
‰€‚âœO°€
‰€‚€
‚ÿMPRmultiple provider router (MPR)multiple UNC provider (MUP)multiprocessingmultiprogrammingmultitaskingmultithreadingMUPmutual exclusion)»É6Ë% €€°˜€
‚ÿN:
ËGÍ× |u€˜â!¨ŽÒ€
‰€‚âûfÏۀ
‰€‚âÚ€
‰€‚â%ûУ€
‰€‚âßÁ€
‰€‚â%ÈW€
‰€‚â‘=Ðå€
‰€‚â¶Ÿëe€
‰€‚âñ!€
‰€‚âQÅẦ
‰€‚â¥,Xç€
‰€‚â–¨o!€
‰€‚â9§€
‰€‚⢆øé€
‰€‚ÿnamed pipename retentionnational language support (NLS)native servicesNDISNetBEUI transportNetBIOS interfacenetwork domainnetwork driver interface specification (NDIS)network redirectornetwork serverNLSnonpaged poolnonprivileged processor modeÕc6ËÎr ´€Æ€˜â1 ‘€
‰€‚â©o!€
‰€ ‚â|ôKç€
‰€‚â¤E÷
€
‰€‚âîˆÁ€
‰€‚â­"öú€
‰€‚€
‚ÿnonsignaled stateNOSNT executiveNT file system (NTFS)NTFSNT kernel)GÍEÎ% €€°˜€
‚ÿO*Î_ä –U€˜âÊ¢òo€
‰€‚â}”À¡€
‰€‚â]5¦€
‰€‚âÎ)¢|€
‰€‚â¿¡Wô€
‰€‚â³G‹€
‰€‚âjýJπ
‰€‚âJsB¨€
‰€‚â3dš/€
‰€‚â®ñóǀ
‰€‚â˔ž©€
‰€‚âÍÜEڀ
‰€‚â¹ã߀
‰€ ‚âM°o!€
‰€ ‚âÃ]„·€
‰€‚ÿobjectobject attributeobject classobject directory objectobject domainobject handleobject managerobject modelobject retentionobject serviceobject tableobject EÎ_€typeODINSUPOOPOpen Systems Interconnection (OSI) reference model^ Eν> L€@€˜â¢×ý0€
‰€‚âò°o!€
‰€‚€
‚ÿoperating systemOSI)_æ% €€°˜€
‚ÿP½öþ ʁ%€˜âöl݀
‰€‚âŽÙ€
‰€‚âsÔFɀ
‰€‚âÞãZɀ
‰€‚âÎC€
‰€‚âtMÓ€
‰€‚â×  ̀
‰€‚⒍X€
‰€‚âË~x€
‰€‚âB,¯€
‰€‚âk9V¸€
‰€‚âM€çۀ
‰€‚âÜ ä€
‰€ ‚âüÓ݀
‰€‚âl° ¿€
‰€‚âû#ÊÀ
‰€‚â|Û݀
‰€‚ÿpagepaged poolpage faultpage framepage frame databasepagerpage tablepage table entry (PTE)pagingpaging fileparent processplacement policyPOSIXportpower notify objectpower status objectPPTE8æä –q€˜âD޷р
‰€‚âµ~~C€
‰€‚ânÿ€
‰€‚â•2 L€
‰€‚âÀâ¾Ó€
‰€‚âjŸÝw€
‰€‚â ­í´€
‰€‚âÞ7ö¯€
‰€‚Ⳙw€
‰€‚âeÖ¿À€
‰€‚⟙’”€
‰€‚âªã^Z€
‰€‚âk?€
‰€‚â ­ó”€
‰€‚âÐåyq€
‰€‚ÿpreemptpreemptive multitaskingprimary domainprivileged processor modeprocessprocess contextprocess managerprocessor affinityprocess treeprotected subsystemprotocolprotocol stackprototype page table entry (PPTE)providerprovider interface< öN1 2€€˜âR¸o!€
‰€‚€
‚ÿPTE)w% €€°˜€
‚ÿQYNÐ> L€6€˜âüçƀ
‰€‚âÝ÷€€
‰€‚€
‚ÿquick LPCquota)wù% €€°˜€
‚ÿR¡íК´ 6Û€˜â3°eπ
‰€‚âqÚŝ€
‰€ ‚â¡Ão!€
‰€ ‚âZ‰’ï€
‰€‚â•õì€
‰€‚âP8؀
‰€‚âÀù5Ѐ
‰€‚âg~ÀT€
‰€‚â‹#Éǀ
‰€‚âÆo!€
‰€‚âÄbT€
‰€‚€
‚ÿraise an exceptionRAIDRASredirectorreduced instruction set computer (RISC)remote procedure call (RPC)replacement policyreserved memoryrobustnessRPCRPC transport provider interface)ùÃ% €€°˜€
‚ÿS.šÈ × |]€˜âࡅZ€
‰€‚ât8 ‰€ ‚âP=“€
‰€‚âŽêÎ%€
‰€‚âhÄPÀ
‰€‚â"ÞZ €
‰€‚âÍsº3€
‰€‚â$Lπ
‰€‚âr `€
‰€‚â PP>€
‰€‚â~¦“€
‰€‚âRޏ€
‰€‚â⫪р
‰€‚âžZầ
‰€‚ÿSAM databasescalabilityscriptsection objectsecure logon facilitysecurity accounts manager (SAM)security descriptorsecurity IDsecurity reference monitorsecurity subsystemserverserver message block (SMB) protocolserver serviceservice
&ÃÒ ä –M€˜â«9ëe€
‰€‚â#Ìo!€
‰€‚âò¦J=€
‰€‚â5“’â€
‰€‚âÍÌo!€
‰€‚âÛÌo!€
‰€‚â¡oǝ€
‰€ ‚â –€q€
‰€‚âÄ=P€
‰€‚âÀâ’€
‰€‚⟀±€
‰€‚âÖØ)€
‰€‚âp.ÍØ€
‰€‚â]Ô5€
‰€‚âÔAH´€
‰€‚ÿservice controllerSIDsignaled statesingle-byte coding schemeSMBSMPSNMPspin lockSTREAMSstructured exception handlingstub proceduresymbolic link objectsymmetric multiprocessing (SMP)synchronizationsynchronization objectse'È 7 > L€N€˜ân®Ö†€
‰€‚âd"uá€
‰€‚€
‚ÿsynchronoussynchronous I/O)Ò ` % €€°˜€
‚ÿT"17 ‚ñ °c€˜â
£ÅC€
‰€‚âŠÒo!€
‰€‚âú\ês€
‰€‚âÉ1€
‰€‚âӏŽì€
‰€‚â<>Ãe€
‰€‚âWr0€
‰€‚â‚Hó€
‰€‚â !GŽ€
‰€‚â'ã¯6€
‰€ ‚âqlkS€
‰€‚â¶ø€
‰€‚âÛÓo!€
‰€‚âªur€
‰€‚âÞþX€
‰€‚â`;g€
‰€‚ÿTCP/IP transportTDItermination handlerthreadthread contextthread dispatchingthread objectthread of executionthread schedulingthunkingtightly coupled systemtime quantumTLBtoken objecttopologytranslation lookaside buffer (TLB)˜` š€ ΀1€˜âS=Ý€
‰€‚âÁȝ€
‰€‚â,´äg€
‰€‚â=‘€
‰€‚âŒe¤â€
‰€‚â@
{P€
‰€‚âÓ8ûà€
‰€‚€
‚ÿtransport driver interface (TDI)traptrap frametrap handlertrusted domain relationshiptrust relationshiptype object)‚Ã% €€°˜€
‚ÿUê|š¹@n ¬€ø€˜âkÛo!€
‰€‚âb3c €
‰€‚â‚ö]ù@€€
‰€‚ârª
§€
‰€‚âÑÛo!€
‰€‚â¶ÃnL€
‰€‚ÿUNCUnicodeuniform naming convention (UNC) namesuninterruptible power supply (UPS)UPSuser mode+Ãä@& €
€°˜€
‚‚ÿVwÔ¹@[B£ ©€˜â/GØ€
‰€‚âáo!€
‰€‚âìíʝ€
‰€‚â¼;e€
‰€‚âÐ잀
‰€‚âg–Lˀ
‰€‚â
ú'†€
‰€‚âÂ/5à€
‰€‚â:eÈê€
‰€‚âb÷ƒ˜€
‰€‚ÿvalid pageVDMviewvirtual address spacevirtual circuitvirtual DOS machine (VDM)virtual filevirtual memory (VM)virtual memory managementvirtual memory (VM) manager5 ä@B, (€€°˜â2Ž`€
‰‚‚ÿVMW×i[BgCn ¬€Ò€˜âEŽW€
‰€‚âÏ\=¨€
‰€‚â¸Fû1€
‰€‚âçÆ“`€
‰€‚â
8¯€
‰€‚âêo!€
‰€‚ÿWin32 APIWindows NTWindows on Win32 (WOW)working setworkstation serviceWOW1B˜C1“ÿÿÿÿÿÿÿÿ÷ÿÿÿÿ˜CúDDgCÜC' €:€˜ŒR˜€
‚ÿaccess control entry (ACE)à˜CúD> J€Á€°˜€âœØRu€
‰€â®gŠK€
‰€‚ÿAn entry in an access control list. It contains a security ID (SID) and a set of access rights. A process with a matching SID is either allowed the listed access rights, denied them, or allowed them with auditing.1ÜC+E1ÿÿÿÿÿÿÿÿøÿÿÿÿ+EûFCúDnE' €8€˜ŒR˜€
‚ÿaccess control list (ACL)C+EûFJ b€‡€°˜€âÍsº3€
‰€âH‰
€
‰€âNä{À
‰€‚ÿThe part of a security descriptor that enumerates the protections applied to an object. The owner of an object has discretionary access control of the object and can change the object's ACL to allow or disallow others access to the object. Access control lists are made up of access control entries (ACEs). 1nE,G1Öÿÿÿÿÿÿÿÿùÿÿÿÿ,GÑH6ûFbG' €€˜ŒR˜€
‚ÿaccess righto1,GÑH> J€c€°˜€âNä{À
‰€âœØRu€
‰€‚ÿA permission granted to a process to manipulate a particular object in a particular way (for example, by calling a service). Different object types support different access rights, which are stored in an object's access control list (ACL). See also access control entry and access control list.1bGI1BÿÿÿÿÿÿÿÿúÿÿÿÿIK6ÑH8I' €€˜ŒR˜€
‚ÿaccess token۝IK> J€;€°˜€â$Lπ
‰€âœØRu€
‰€‚ÿAn object that uniquely identifies a user who has logged on. An access token is attached to all the user's processes and contains the user's security ID (SID), the names of any groups to which the user belongs, any privileges the user owns, the default owner of any objects the user's processes create, and the default access control list (ACL) to be applied to any objects the user's processes create.18IDK1šÿÿÿÿÿÿÿÿûÿÿÿÿDK­K-KqK' € €˜ŒR˜€
‚ÿACE<DK­K% €.€°˜€‚ÿAccess Control Entry1qKÞK1™ÿÿÿÿÿÿÿÿüÿÿÿÿÞKFL-­K L' € €˜ŒR˜€
‚ÿACL;ÞKFL% €,€°˜€‚ÿAccess Control List1 LwL1ºÿÿÿÿÿÿÿÿýÿÿÿÿwLM7FL®L' € €˜ŒR˜€
‚ÿaddress spaceR!wLM1 2€B€°˜€â¼;e€
‰€‚ÿSee virtual address space.1®L1M1£ÿÿÿÿÿÿÿÿþÿÿÿÿ1M£N/M`M' €€˜ŒR˜€
‚ÿalertCù1M£NJ b€ó€°˜€âÛ %€
‰€âÕÇ%»€
‰€â¤ðµV€
‰€‚ÿAn asynchronous notification that one thread sends to another. The alert interrupts the recipient thread at well-defined points in its execution and causes it to execute an asynchronous procedure call (APC). See also alertable thread.1`MÔN1ÙÿÿÿÿÿÿÿÿÿÿÿÿÿÔNb€:£NO' €&€˜ŒR˜€
‚ÿalertable threadH
ÔNb€> J€€°˜€âÕÇ%»€
‰€â%Ò|€
‰€‚ÿA thread that has declared itself ready to execute an asynchronous procedure call (APC). A thread becomes alertable either by waiting on an object handle and specifying that iOb€£Nts wait is alertable or by testing whether it has a pending APC. See also alert.1O“€1Ùÿÿÿÿÿÿÿÿÿÿÿÿ“€;9b€̀' €$€˜ŒR˜€
‚ÿalerter serviceo>“€;1 2€|€°˜€âžZầ
‰€‚ÿA network service that sends system messages to a user.1̀l1®ÿÿÿÿÿÿÿÿÿÿÿÿlé;;§' €(€˜ŒR˜€
‚ÿalerting a threadBlé1 2€"€°˜€â%Ò|€
‰€‚ÿSee alert.1§‚1¡ÿÿÿÿÿÿÿÿÿÿÿÿ‚Š‚-éG‚' € €˜ŒR˜€
‚ÿAPCC‚Š‚% €<€°˜€‚ÿAsynchronous Procedure Call1G‚»‚1xÿÿÿÿÿÿÿÿÿÿÿÿ»‚„4
Š‚ï‚' €€˜ŒR˜€
‚ÿAPC objectÕ»‚„> J€«€°˜€âÕÇ%»€
‰€â•€]€
‰€‚ÿThe kernel's representation of an asynchronous procedure call (APC). It is a control object, containing the address of an APC and a pointer to the thread object that will execute it. See also APC queue.1ï‚3„1Þÿÿÿÿÿÿÿÿÿÿÿÿ3„à…3 „f„' €€˜ŒR˜€
‚ÿAPC queuez63„à…D V€m€°˜€âÕÇ%»€
‰€âc&9Ÿ€
‰€âhwÿA list of asynchronous procedure call (APC) objects to be executed by a particular thread. The presence of an APC object in a thread's APC queue causes a software interrupt to occur at APC interrupt request level (IRQL) the next time the thread executes (if other enabling conditions are present).1f„†1§ÿÿÿÿÿÿÿÿÿÿÿÿ†‡†-à…>†' € €˜ŒR˜€
‚ÿAPII$†‡†% €H€°˜€‚ÿApplication Programming Interface1>†¸†1£ÿÿÿÿÿÿÿÿÿÿÿÿ¸†*ˆ.‡†æ†' €€˜ŒR˜€
‚ÿAPPCD¸†*ˆ& €=€°˜€‚ÿAdvanced Program to Program Communications - A set of protocols designed by IBM that enable application programs to interact directly with each other on a peer-to-peer basis (not necessarily required to go through a host), even when programs are on separate and/or remote processors.1æ†[ˆ1-ÿÿÿÿÿÿÿÿÿÿÿÿ[ˆW‰Q**ˆ¬ˆ' €T€˜ŒR˜€
‚ÿapplication programming interface (API)«…[ˆW‰& € €°˜€‚ÿA set of routines that an application program uses to request and carry out lower-level services performed by an operating system.1¬ˆˆ‰1­ÿÿÿÿÿÿÿÿÿÿÿÿˆ‰Š.W‰¶‰' €€˜ŒR˜€
‚ÿASMPN ˆ‰Š. ,€@€°˜âFP5€
‰€‚ÿasymmetric multiprocessing1¶‰5Š1{ÿÿÿÿÿÿÿÿ ÿÿÿÿ5Š‹9ŠnŠ' €$€˜ŒR˜€
‚ÿassociated IRPsß5Š‹2 2€¿€°˜€âÒé'€
‰€‚ÿA set of I/O request packets (IRPs) created to process a single I/O request. Each associated IRP causes some part of the request to be fulfilled. When all the associated IRPs are processed, the I/O request completes.1nа‹1Èÿÿÿÿÿÿÿÿ
ÿÿÿÿ°‹G7‹ç‹' € €˜ŒR˜€
‚ÿassociativity`:°‹G& €u€°˜€‚ÿRefers to the number of data entries available on a per-line basis in the cache. This means that a 128K 2-way set associative cache has 256K worth of available data entries. A direct-mapped cache is name commonly given to a 1-way set associative cache--a cache in which there is one data entry per cache line.1ç‹x1“ÿÿÿÿÿÿÿÿ ÿÿÿÿxڎK$GÍ' €H€˜ŒR˜€
‚ÿasymmetric multiprocessing (ASMP)Ùxڎ> J€³€°˜€â¥ZÒ€
‰€âp.ÍØ€
‰€‚ÿA multiprocessing operating system that always selects the same processor to execute operating system code while other processors run only user jobs. See also multiprocessing and symmetric multiprocessing.1Í 1ÿÿÿÿÿÿÿÿ ÿÿÿÿ  À6ڎA' €€˜ŒR˜€
‚ÿasynchronous³  À2 2€€°˜€ân®Ö†€
‰€‚ÿOccurring at any time without regard to the main flow of a program (for example, a device interrupt). Compare synchronous.A Àڎ1A=À1²ÿÿÿÿÿÿÿÿ
ÿÿÿÿ=À¾Á: ÀwÀ' €&€˜ŒR˜€
‚ÿasynchronous I/OG=À¾Á2 2€+€°˜€âd"uá€
‰€‚ÿA model for I/O in which an application issues an I/O request and then continues executing while the device transfers the data. The application synchronizes with the completion of the data transfer by waiting on a file handle or an event handle. Compare synchronous I/O.1wÀïÁ1ÌÿÿÿÿÿÿÿÿÿÿÿÿïÁŠÃK$¾Á:Â' €H€˜ŒR˜€
‚ÿasynchronous procedure call (APC)PïÁŠÃ> J€%€°˜€âc&9Ÿ€
‰€â•€]€
‰€‚ÿA function that executes asynchronously in the context of a particular thread. The kernel issues a software interrupt when the thread executes (if other enabling conditions are present) and directs the thread to execute the APC. See also APC object and APC queue.1:»Ã1ÿÿÿÿÿÿÿÿÿÿÿÿ»ÃŽÅ;ŠÃöÃ' €(€˜ŒR˜€
‚ÿattribute caching˜f»ÃŽÅ2 2€Í€°˜€âÅu°€
‰€‚ÿA technique used in the Win32 subsystem to achieve performance gains when a Win32 application calls drawing functions. The client-side dynamic-link library (DLL) remembers when an application changes some attribute of the screen display and sends the data to the Win32 server only when the application draws something on the screen. See also batching.1öÿÅ1šÿÿÿÿÿÿÿÿÿÿÿÿ¿Å(Ç2 ŽÅñÅ' €€˜ŒR˜€
‚ÿauditing7¿Å(Ç2 2€ €°˜€â$Lπ
‰€‚ÿThe ability to detect and record important security-related events, particularly any attempt to create, access, or delete objects. The Windows NT security system uses security IDs (SIDs) to record which process performed the action. See also security ID.1ñÅYÇ1)ÿÿÿÿÿÿÿÿÿÿÿÿYÇQÈ8(Ç‘Ç' €"€˜ŒR˜€
‚ÿauthenticationÀŽYÇQÈ2 2€€°˜€✭ʀ
‰€‚ÿValidation of a user's logon information. Performed by an authentication package in conjunction with the Windows NT security subsystem.1‘Ç‚È1Cÿÿÿÿÿÿÿÿÿÿÿÿ‚È”É@QÈÂÈ' €2€˜ŒR˜€
‚ÿauthentication packageÒ ‚È”É2 2€A€°˜€âKÊ¡€
‰€‚ÿA software module that can be plugged into the Windows NT security system to authenticate user logons for various input devices. See also authentication.1ÂÈÅÉ1ÿÿÿÿÿÿÿÿÿÿÿÿÅÉ!ËH!”É
Ê' €B€˜ŒR˜€
‚ÿautomatic working set trimmingâÅÉ!Ë2 2€Å€°˜€âçÆ“`€
‰€‚ÿA technique used by the Windows NT virtual memory (VM) manager to increase the amount of free memory available in the system. It decreases each process's working-set size when free memory runs low. See also working set.1
ÊRË1ÿÿÿÿÿÿÿÿÿÿÿÿRË/Ì7!ˉË' € €˜ŒR˜€
‚ÿbacking store¦uRË/Ì1 2€ê€°˜€âË~x€
‰€‚ÿA storage medium, such as a disk, that serves as backup "memory" for paging when physical memory becomes full.1‰Ë`Ì1 ÿÿÿÿÿÿÿÿÿÿÿÿ`Ì8Î2 /Ì’Ì' €€˜ŒR˜€
‚ÿbatching¦t`Ì8Î2 2€é€°˜€âç7O€
‰€‚ÿA technique used in the Win32 subsystem to achieve performance gains when a Win32 application calls drawing functions. The client-side dynamic-link library (DLL) stores drawing application programming interface (API) calls in a queue, sending them in a single message to the server when the queue gets full or when the user enters input. See also attribute caching.1’ÌiÎ1ŸÿÿÿÿÿÿÿÿÿÿÿÿiÎ 78ΠÎ' € €˜ŒR˜€
‚ÿcache manager7iÎ 2 2€ €°˜€âZ‰’ï€
‰€‚ÿA component in the I/O system that provides file-caching services to file systems and the Windows NT redirector. It uses the paging mechanisms of the virtual memory (VM) manager to bring pages into memory from disk and to write cached pages back to disk. Î 8Î1 Î=1lÿÿÿÿÿÿÿÿÿÿÿÿ=x2 o' €€˜ŒR˜€
‚ÿcallback ×=x2 2€¯€°˜€âNº€
‰€‚ÿA request message that a server sends to a client in response to a request from the client. A server sends a callback to a client to get more information about a client request. See also local procedure call.1o©1™ÿÿÿÿÿÿÿÿÿÿÿÿ©.x×' €€˜ŒR˜€
‚ÿCDFS:©% €*€°˜€‚ÿCD-ROM File System1×B10ÿÿÿÿÿÿÿÿÿÿÿÿBA7y' € €˜ŒR˜€
‚ÿchild processȖBA2 2€-€°˜€âk9V¸€
‰€‚ÿA process created by another process that is called a parent process. The child process inherits some or all of the parent process's resources.1yr1§ÿÿÿÿÿÿÿÿÿÿÿÿrè.A ' €€˜ŒR˜€
‚ÿCISCH#rè% €F€°˜€‚ÿComplex Instruction Set Computer1 1Èÿÿÿÿÿÿÿÿÿÿÿÿ°0 èI' €€˜ŒR˜€
‚ÿclientg°J b€;€°˜€âNº€
‰€âP8؀
‰€â2²€
‰€‚ÿA process whose threads call services provided by either a local or a remote server process. In Windows NT, communication between a client and a server occurs through the local procedure call (LPC) or remote procedure call (RPC) facilities. See also client-server model.1Iá1hÿÿÿÿÿÿÿÿÿÿÿÿá=°' €,€˜ŒR˜€
‚ÿclient-server modelúÔá& €©€°˜€‚ÿA model for structuring applications or operating systems. The system is divided into processes (servers), each of which provides a set of specialized services to other processes (clients). Client processes request service by sending messages to server processes, and servers return results through another message. Systems built on a strict client-server model are appropriate for distributed computing environments in which servers can run on different computers.1I1^ÿÿÿÿÿÿÿÿÿÿÿÿIv 7€' € €˜ŒR˜€
‚ÿclone upgradeöÐIv & €¡€°˜€‚ÿImplemented by installing Windows NT Advanced Server on a separate computer and transferring (cloning) the LAN Manager server data and services from an existing server to the new Windows NT Advanced Server1€§ 1üÿÿÿÿÿÿÿÿÿÿÿÿ§ r
2 v Ù ' €€˜ŒR˜€
‚ÿcode set™t§ r
% €è€°˜€‚ÿThe binary codes used to represent the characters of a particular language. (Windows ANSI is one such code set.)1Ù £
1cÿÿÿÿÿÿÿÿÿÿÿÿ£
Õ :r

' €&€˜ŒR˜€
‚ÿcommitted memoryø½£
Õ ; D€{€°˜âÂ/5à€
‰€âg~ÀT€
‰€‚ÿVirtual memory (VM) for which space in the paging file has been set aside. The process that commits the memory is charged paging file quota at that time. See also reserved memory.1Ý
 1‡ÿÿÿÿÿÿÿÿ ÿÿÿÿ \
Q*Õ W ' €T€˜ŒR˜€
‚ÿcomplex instruction set computer (CISC)Ó \
2 2€§€°˜€â•õì€
‰€‚ÿA processor that employs powerful, often elaborate, machine instructions. Because of the instructions' complexity, each can take several clock cycles to complete. Compare reduced instruction set computer.1W 
1±ÿÿÿÿÿÿÿÿ!ÿÿÿÿ

3 \

' €€˜ŒR˜€
‚ÿcomponentM'

& €O€°˜€‚ÿA reusable piece of software that can be "plugged into" other components from other vendors with relatively little effort. For example, a component might be a spelling checker, sold by one vendor, that can be plugged into several different word processing applications from multiple vendors.1À
>1–ÿÿÿÿÿÿÿÿ"ÿÿÿÿ>A<
z' €*€˜ŒR˜€
‚ÿcomponent softwareŠd>A& €É€°˜€‚ÿSoftware that is based on the notion of a component which is a reusable piece of software that zA
can be "plugged into" other components from other vendors with relatively little effort. For example, a component might be a spelling checker, sold by one vendor, that can be plugged into several different word processing applications from multiple vendors.1zAA1¬ÿÿÿÿÿÿÿÿ#ÿÿÿÿAA¼B@AA' €2€˜ŒR˜€
‚ÿconcurrent application;ýAA¼B> J€û€°˜€âÀâ¾Ó€
‰€âÉ1€
‰€‚ÿAn application that can execute in two or more locations. In Windows NT, a concurrent application is one that has created more than one thread of execution, either within a single process or in separate processes. See also process and thread.1AíB1‚ÿÿÿÿÿÿÿÿ$ÿÿÿÿíB>D?¼B,C' €0€˜ŒR˜€
‚ÿconfiguration manageràíB>D2 2€Á€°˜€âd쎀
‰€‚ÿA set of software components that simplifies storage and retrieval of system configuration information. It includes the configuration registry, the graphical Registry Editor, and hardware recognizer firmware/software.1,CoD1²ÿÿÿÿÿÿÿÿ%ÿÿÿÿoDðE@>D¯D' €2€˜ŒR˜€
‚ÿconfiguration registryAoDðE2 2€€°˜€â(ãJ{€
‰€‚ÿA database repository for information about a computer's configuration--for example, the computer hardware, the software installed on the system, and environment settings and other information entered by the person or persons using the system. See also key object.1¯D!F1ÿÿÿÿÿÿÿÿ&ÿÿÿÿ!FHH!ðEiF' €B€˜ŒR˜€
‚ÿconnecting an interrupt objectŸF!FHY €€€°˜€âhwï€
‰€â{€
‰€⬧!€
‰€€âþ¾£H€
‰€‚ÿAssociating an interrupt service routine (ISR) with a particular interrupt request level (IRQL). A device driver calls the system to connect an interrupt object, which "turns on" interrupt handling for the device. See also disconnecting an interrupt object, interrupt object, and interrupt service routine.1iF9H1ÿÿÿÿÿÿÿÿ'ÿÿÿÿ9HI1
HjH' €€˜ŒR˜€
‚ÿconsole±‹9HI& €€°˜€‚ÿA text-based window managed by the Win32 subsystem. Environment subsystems direct the output of character-mode applications to consoles.1jHLI1­ÿÿÿÿÿÿÿÿ(ÿÿÿÿLIÈI1
I}I' €€˜ŒR˜€
‚ÿcontextKLIÈI1 2€4€°˜€âӏŽì€
‰€‚ÿSee thread context.1}IùI1ÿÿÿÿÿÿÿÿ)ÿÿÿÿùIXK;ÈI4J' €(€˜ŒR˜€
‚ÿcontext switching$æùIXK> J€Í€°˜€âÊ^›€
‰€âӏŽì€
‰€‚ÿSaving the context of an executing thread, loading another thread's context, and transferring control to the new thread. Context switching is performed by the kernel's dispatcher. See also dispatcher and thread context.14J‰K1»ÿÿÿÿÿÿÿÿ*ÿÿÿÿ‰KM8XKÁK' €"€˜ŒR˜€
‚ÿcontrol objectR ‰KM2 2€A€°˜€âäkÉՀ
‰€‚ÿA kernel object that provides a portable method for controlling various system tasks. The set of control objects includes the asynchronous procedure call (APC) object, the deferred procedure call (DPC) object, the kernel process object, and several objects used by the I/O system. 1ÁKDM1ÿÿÿÿÿÿÿÿ+ÿÿÿÿDM¢N7M{M' € €˜ŒR˜€
‚ÿcopy-on-write'DM¢N& €€°˜€‚ÿPage-based (as opposed to object-based) memory protection that allows two processes to share a page until one of them writes to it. At that time, the process whose thread modified the page is given a private copy of the page in its virtual address space.1{MÓN1ÿÿÿÿÿÿÿÿ,ÿÿÿÿÓN¼O/¢NO' €€˜ŒR˜€
‚ÿCPI-CºˆÓN¼O2 2€€°˜€â1¨±€
‰€‚ÿCommon Programming Interface for Communications - A peer-to-peer protocol for communications in an SAA environment see also APPC.1O €1ëÿÿÿÿÿÿÿÿ-ÿÿÿÿ €%¼O €¼O:¼OF€' €&€˜ŒR˜€
‚ÿcritical sectionß­ €%2 2€[€°˜€âœO°€
‰€‚ÿA block of code that accesses a nonshareable resource. To ensure correct code, only one thread can execute in a critical section at a time. See also mutual exclusion.1F€V1âÿÿÿÿÿÿÿÿ.ÿÿÿÿVƒG %' €@€˜ŒR˜€
‚ÿdeferred procedure call (DPC)j VƒJ b€A€°˜€âhwï€
‰€âD冁€
‰€â@@”z€
‰€‚ÿA function that executes asynchronously, interrupting the execution of the thread that is currently running. DPCs perform system tasks that have been deferred until the processor's interrupt request level (IRQL) drops below dispatch IRQL. See also DPC object and DPC queue.18ƒ1ÿÿÿÿÿÿÿÿ/ÿÿÿÿ8ƒ„7ƒoƒ' € €˜ŒR˜€
‚ÿdemand paging¯r8ƒ„= J€ä€°˜€âûÓ<€
‰€âsÔFɀ
‰€‚ÿA fetch policy for paging that postpones loading pages into physical memory until a page fault occurs. 1oƒO„1ÿÿÿÿÿÿÿÿ0ÿÿÿÿO„4…?„Ž„' €0€˜ŒR˜€
‚ÿdesired access rights¦uO„4…1 2€ê€°˜€âgíC“€
‰€‚ÿThe set of access rights a thread requests when opening a handle to an object. See also granted access rights.1Ž„e…1>ÿÿÿÿÿÿÿÿ1ÿÿÿÿe…r†74…œ…' € €˜ŒR˜€
‚ÿdevice objectÖ¤e…r†2 2€I€°˜€âMÿuä€
‰€‚ÿA system object that represents a physical, logical, or virtual device and describes its characteristics. A device object is associated with a driver object.1œ…£†1ÿÿÿÿÿÿÿÿ2ÿÿÿÿ£†ˆK$r†î†' €H€˜ŒR˜€
‚ÿdisconnecting an interrupt object¡H£†ˆY €€‘€°˜€âhwï€
‰€âk?ªV€
‰€⬧!€
‰€€âþ¾£H€
‰€‚ÿDissociating an interrupt service routine (ISR) from a particular interrupt request level (IRQL). A device driver calls the system to disconnect an interrupt object, which "turns off" interrupt handling for the device. See also connecting an interrupt object, interrupt object, and interrupt service routine.1î†Àˆ1ÿÿÿÿÿÿÿÿ3ÿÿÿÿÀˆŠFˆ‰' €>€˜ŒR˜€
‚ÿdiscretionary access controlçÀˆŠ2 2€Ï€°˜€â“nø€
‰€‚ÿThe protection the owner of an object applies to the object by assigning various access rights to various users or groups of users. Discretionary protections can be limited by mandatory access controls applied to the object.1‰PŠ1†ÿÿÿÿÿÿÿÿ4ÿÿÿÿPŠ¥‹8ŠˆŠ' €"€˜ŒR˜€
‚ÿdisk mirroringëPŠ¥‹2 2€×€°˜€⻍ÑF€
‰€‚ÿThe procedure of duplicating a disk partition on two or more disks, preferably on disks attached to separate disk controllers so that data remains accessible if either a disk or a disk controller fails. See also fault tolerance.1ˆŠ֋1¾ÿÿÿÿÿÿÿÿ5ÿÿÿÿ֋c7¥‹
Œ' € €˜ŒR˜€
‚ÿdisk stripingV$֋c2 2€I€°˜€âÎ_
€€
‰€‚ÿThe procedure of combining a set of same-size disk partitions that reside on separate disks into a single volume, forming a virtual "stripe" across the disks. This technique enables multiple I/O operations in the same volume to proceed concurrently. See also disk striping with parity.1
Œ”1Õÿÿÿÿÿÿÿÿ6ÿÿÿÿ”8Cc׍' €8€˜ŒR˜€
‚ÿdisk striping with paritya#”8> J€G€°˜€â÷îym€
‰€⻍ÑF€
‰€‚ÿThe procedure of maintaining parity information across a disk stripe so that if one disk partition fails, the data on that disk can be recreated by performing an exclusive-OR operation across the remaining partitions in the disk stripe. See also disk striping and fault tolerance.1׍i1`ÿÿÿÿÿÿÿÿ7ÿÿÿÿiŽÀ4
8' €€˜ŒR˜€
‚ÿdispatcherå³iŽÀ2 2€g€°˜€╥ûµ€
‰€‚ÿA kernel module that keeps track of threads thatŽÀ8 are ready to execute, selects the order in which they will run, and initiates context switching from one thread to another.1¿À1˜ÿÿÿÿÿÿÿÿ8ÿÿÿÿ¿À&Â=ŽÀüÀ' €,€˜ŒR˜€
‚ÿdispatcher database*ì¿À&Â> J€Ù€°˜€â€¾;€
‰€âÊ^›€
‰€‚ÿA set of global data structures that the kernel uses to keep track of which threads are ready to execute and which processors are executing which threads. The database includes the dispatcher ready queue. See also dispatcher.1üÀWÂ1¡ÿÿÿÿÿÿÿÿ9ÿÿÿÿWÂÇÃ;&Â’Â' €(€˜ŒR˜€
‚ÿdispatcher object5ÜWÂÇÃY €€¹€°˜€â]Ô5€
‰€âäkÉՀ
‰€âò¦J=€
‰€€â1 ‘€
‰€‚ÿA kernel object that supports synchronization. The kernel's dispatcher implements the signaled and nonsignaled synchronization semantics. See also kernel object, signaled state, and nonsignaled state.1’ÂøÃ1mÿÿÿÿÿÿÿÿ:ÿÿÿÿøÃ4Å@ÇÃ8Ä' €2€˜ŒR˜€
‚ÿdispatcher ready queueü¾øÃ4Å> J€}€°˜€âò֎þ€
‰€âÊ^›€
‰€‚ÿThe data structure in the dispatcher database that tracks threads that are ready to execute. It is a series of queues, one queue for each scheduling priority. See also dispatcher.18ÄeÅ1êÿÿÿÿÿÿÿÿ;ÿÿÿÿeÅÉF4Å«Å' €>€˜ŒR˜€
‚ÿdistributed object computingsMeÅÉ& €›€°˜€‚ÿThis new computing method allows an application to be split into a number of components that can run on different machines and transparently connect to another application's components on other machines. As a result, the entire network appears to be one large computer with enormous processing power and capacity. For example, a database system could be built as a set of components: a query engine, a report engine, a forms builder, and a transaction manager. Each of these components could run on a machine suited to the amount of processing power, I/O bandwidth, and disk capacity required for it. Since inter-component communication is handled by the operating system, building such an application does not take significantly more effort than building a monolithic application, but the benefits of the component approach are numerous.1«ÅOÉ1&ÿÿÿÿÿÿÿÿ<ÿÿÿÿOÉDÊ;ÉŠÉ' €(€˜ŒR˜€
‚ÿdomain controllerº}OÉDÊ= J€ú€°˜€⶟ëe€
‰€âKÊ¡€
‰€‚ÿA server in a network domain that accepts user logons and initiates their authentication. See also authentication.1ŠÉuÊ1ÿÿÿÿÿÿÿÿ=ÿÿÿÿuÊáÊ-DÊ¢Ê' € €˜ŒR˜€
‚ÿDPC?uÊáÊ% €4€°˜€‚ÿDeferred Procedure Call1¢ÊË1—ÿÿÿÿÿÿÿÿ>ÿÿÿÿËxÌ4
áÊFË' €€˜ŒR˜€
‚ÿDPC object2ôËxÌ> J€é€°˜€≠ã€
‰€â@@”z€
‰€‚ÿA kernel object used to asynchronously execute a system function. It is a control object that contains the address of a deferred procedure call (DPC) to execute. The kernel places DPC objects in a global DPC queue to await execution.1FË©Ì1ÿÿÿÿÿÿÿÿ?ÿÿÿÿ©Ì–Î3 xÌÜÌ' €€˜ŒR˜€
‚ÿDPC queueºp©Ì–ÎJ b€á€°˜€≠ã€
‰€âD冁€
‰€âhwï€
‰€‚ÿA kernel-managed data structure that contains deferred procedure calls (DPCs) waiting to execute. The presence of a DPC object in the DPC queue causes the kernel to issue a software interrupt at dispatch/DPC interrupt request level (IRQL). The processor that takes the interrupt transfers control to the kernel, which executes all the DPCs in the queue.1ÜÌÇÎ1œÿÿÿÿÿÿÿÿ@ÿÿÿÿÇÎ>7–ÎþÎ' € €˜ŒR˜€
‚ÿdriver object4ÇÎ>2 2€€°˜€â#µé¼€
‰€‚ÿA system object that represents an individual driver on the system and tells the I/O manager the address of the driver's entry points. A driver object can be associated with multiple device objects (eachþÎ>–Î one representing a device the driver operates).1þÎo1§ÿÿÿÿÿÿÿÿAÿÿÿÿoåE>´' €<€˜ŒR˜€
‚ÿDynamic Data Exchange (DDE)1 oå& €€°˜€‚ÿThe ability to form a permanent link between the source and destination of the data. For example, if you write a report that contains data from a sales spreadsheet, you can create a link so that the report is automatically updated whenever the spreadsheet changes.1´1ÓÿÿÿÿÿÿÿÿBÿÿÿÿ¸DåZ' €:€˜ŒR˜€
‚ÿDynamic-link Library (DLL)^8¸& €q€°˜€‚ÿAn application programming interface (API) routine that user-mode applications access through ordinary procedure calls. The code for the API routine is not included in the user's executable image. Instead, the operating system automatically modifies the executable image to point to DLL procedures at runtime.1Zé1øÿÿÿÿÿÿÿÿCÿÿÿÿé°/¸' €€˜ŒR˜€
‚ÿembed˜ré°& €å€°˜€‚ÿTo insert an object in a document by either creating a new object by using the Insert Object command or inserting an existing object by using copying and pasting operations. The object appears in its original format and can subsequently be edited by using the application that created it--or, in the case of sound, video, or macros, can subsequently be played or run.1á1øÿÿÿÿÿÿÿÿDÿÿÿÿá¨?° ' €0€˜ŒR˜€
‚ÿenvironment subsystemˆ>á¨J b€}€°˜€âeÖ¿À€
‰€â)˜ÊÀ€
‰€âeÖ¿À€
‰€‚ÿA protected subsystem (server) that provides an application programming interface (API) and environment--such as Win32, MS-DOS, POSIX, or OS/2--on Windows NT. The subsystem captures API calls and implements them by calling native Windows NT services. See also integral subsystem and protected subsystem.1 Ù1ÌÿÿÿÿÿÿÿÿEÿÿÿÿÙt
3 ¨ ' €€˜ŒR˜€
‚ÿexceptionhÙt
V z€%€°˜€âᩍ§€
‰€âÀâ’€
‰€âp‹ÿ
€
‰€â=‘€
‰€‚ÿA synchronous error condition or atypical event that causes the execution of code outside the normal flow of control. Exceptions can be either hardware-detected errors, such as division by zero, or software-detected errors, such as a guard page violation. Unlike interrupts, which are generated from an external source, exceptions occur when a program executes a particular code sequence. Exceptions can also be reproduced.See also exception handler, structured exception handling, interrupt and trap handler.1 ¥
1`ÿÿÿÿÿÿÿÿFÿÿÿÿ¥
Ô >t

' €.€˜ŒR˜€
‚ÿexception dispatcherñ³¥
Ô > J€g€°˜€â8´µl€
‰€âᩍ§€
‰€‚ÿA kernel module that fields exceptions, transferring control to caller-supplied exception handlers or, if none are present, executing system default exception handlers.1ã
 1¯ÿÿÿÿÿÿÿÿGÿÿÿÿ ƒ
;Ô @ ' €(€˜ŒR˜€
‚ÿexception handlerCö ƒ
M h€í€°˜€â8´µl€
‰€âÀâ’€
‰€€âú\ês€
‰€‚ÿCode that responds to exceptions. The two types are frame-based exception handlers (including termination handlers) and system default exception handlers. See also exception, structured exception handling, and termination handler.1@ ´
1±ÿÿÿÿÿÿÿÿHÿÿÿÿ´
43 ƒ

' €€˜ŒR˜€
‚ÿexecutiveM´
44 8€2€°˜€€â|ôKç€
‰€‚ÿSee NT executive.1ç
e1DÿÿÿÿÿÿÿÿIÿÿÿÿex:4Ÿ' €&€˜ŒR˜€
‚ÿexecutive objectÙ³ex& €g€°˜€‚ÿA Windows NT object made visible to user mode by a component of the Windows NT executive. The executive exports object services, which are used to manipulate executive objects.1Ÿ©1›ÿÿÿÿÿÿÿÿJÿÿÿÿ©@-xÖ' € €˜ŒR˜€
‚ÿFAT=©@% €0€°˜€‚ÿFileÖ@x Allocation Table1ÖP@1ÇÿÿÿÿÿÿÿÿKÿÿÿÿP@æ@9@‰@' €$€˜ŒR˜€
‚ÿFAT file system]8P@æ@% €p€°˜€‚ÿThe file system traditionally used on MS-DOS systems.1‰@A1òÿÿÿÿÿÿÿÿLÿÿÿÿAØB9æ@PA' €$€˜ŒR˜€
‚ÿfault toleranceˆbAØB& €Å€°˜€‚ÿA computer and operating system's ability to respond gracefully to catastrophic events such as power outage or hardware failure. Usually, fault tolerance implies the ability either to continue the system's operation without loss of data or to shut the system down and restart it, recovering all processing that was in progress when the fault occurred.1PA C1ZÿÿÿÿÿÿÿÿMÿÿÿÿ C2D6ØB?C' €€˜ŒR˜€
‚ÿfetch policyóµ C2D> J€k€°˜€âÂ/5à€
‰€âóó׀
‰€‚ÿThe algorithm a virtual memory (VM) system uses to determine when the pager should bring a page from disk into memory. Windows NT uses a modified demand paging algorithm.1?CcD1¸ÿÿÿÿÿÿÿÿNÿÿÿÿcDêD52D˜D' €€˜ŒR˜€
‚ÿfile handleR!cDêD1 2€B€°˜€âAfQJ€
‰€‚ÿA handle to a file object.1˜DE1ÿÿÿÿÿÿÿÿOÿÿÿÿEíE=êDXE' €,€˜ŒR˜€
‚ÿfile-mapping object•dEíE1 2€È€°˜€âsr€
‰€‚ÿThe Win32 subsystem's version of a Windows NT section object that is backed by a mapped file.1XEF1óÿÿÿÿÿÿÿÿPÿÿÿÿFàF5íESF' €€˜ŒR˜€
‚ÿfile object\FàF1 2€¸€°˜€â]i€
‰€‚ÿAn executive object that represents an open file, a directory, a volume, or a device.1SFG1
ÿÿÿÿÿÿÿÿQÿÿÿÿGíG6àFGG' €€˜ŒR˜€
‚ÿfile systems¦€GíG& €€°˜€‚ÿWindows NT drivers that accept file-oriented I/O requests and translate them into I/O requests bound for a particular device.1GGH1—ÿÿÿÿÿÿÿÿRÿÿÿÿH„JG íGeH' €@€˜ŒR˜€
‚ÿframe-based exception handlerÏH„JP n€Ÿ€°˜€â8´µl€
‰€€âÀâ’€
‰€€âú\ês€
‰€‚ÿAn exception handler that is associated with a particular procedure or part of a procedure. The kernel invokes a frame-based exception handler when an exception occurs within that block of code. A frame-based exception handler can either resolve the exception, resignal the exception to a higher layer of code, or ignore the exception and resume the program's execution. See also exception, structured exception handling, and termination handler.1eHµJ1ùÿÿÿÿÿÿÿÿSÿÿÿÿµJ}L6„JëJ' €€˜ŒR˜€
‚ÿglobal group’lµJ}L& €Ù€°˜€‚ÿA global group is a number of user accounts from one domain who are grouped together under one group name on a Windows NT Advanced Server. A global group can contain only user accounts from a single domain. Local groups on a workstation or server can contain global groups. Hence, Windows NT workstation users don't have to manage their own groups and users.1ëJ®L1ËÿÿÿÿÿÿÿÿTÿÿÿÿ®LHN?}LíL' €0€˜ŒR˜€
‚ÿgranted access rights[)®LHN2 2€S€°˜€âF ¡r€
‰€‚ÿThe set of access rights the security system gives a thread that opens a handle to an object. The granted access rights are a nonproper subset of the requester's desired access. The object manager stores granted access rights in the object handle it returns. See also desired access rights.1íLyN1žÿÿÿÿÿÿÿÿUÿÿÿÿyNæN-HN¦N' € €˜ŒR˜€
‚ÿGUI@yNæN% €6€°˜€‚ÿGraphical User Interface1¦NO1 ÿÿÿÿÿÿÿÿVÿÿÿÿO†O-æNDO' € €˜ŒR˜€
‚ÿHALBO†O% €:€°˜€‚ÿHardware Abstraction Layer1DO·O1¬ÿÿÿÿÿÿÿÿWÿÿÿÿ·OV€0 †O €' €€˜ŒR˜€
‚ÿhandle·O €†OJ·OV€1 2€2€°˜€â³G‹€
‰€‚ÿSee object handle.1 €‡€1!ÿÿÿÿÿÿÿÿXÿÿÿÿ‡€wJ#V€р' €F€˜ŒR˜€
‚ÿhardware abstraction layer (HAL)¦€‡€w& €€°˜€‚ÿA layer of code that protects the kernel and the rest of the Windows NT executive from platform-specific hardware differences1р¨1ãÿÿÿÿÿÿÿÿYÿÿÿÿ¨Z‚0 w؁' €€˜ŒR˜€
‚ÿHermes‚]¨Z‚% €º€°˜€‚ÿA Microsoft tool that can remotely audit, install and upgrade software across any network.1؁‹‚1ÒÿÿÿÿÿÿÿÿZÿÿÿÿ‹‚,„M&Z‚؂' €L€˜ŒR˜€
‚ÿhigh performance file system (HPFS)T.‹‚,„& €]€°˜€‚ÿA file system designed for OS/2, version 1.2, which was created to address the limitations of the file allocation table (FAT) file system used by MS-DOS. It added features such as longer filenames, the ability to associate attributes with a file, faster searching for files, and other optimizations.1؂]„1£ÿÿÿÿÿÿÿÿ[ÿÿÿÿ]„τ.,„‹„' €€˜ŒR˜€
‚ÿHPFSD]„τ% €>€°˜€‚ÿHigh Performance File System1‹„…1³ÿÿÿÿÿÿÿÿ\ÿÿÿÿ…‚†5τ5…' €€˜ŒR˜€
‚ÿidle threadM…‚†2 2€7€°˜€╥ûµ€
‰€‚ÿA system thread that executes when no other thread is ready to execute. The idle thread executes deferred procedure calls (DPCs) and initiates context switching when another thread becomes ready to execute. One idle thread exists for each processor in a multiprocessor system.15…³†1Ÿÿÿÿÿÿÿÿÿ]ÿÿÿÿ³†!‡-‚†à†' € €˜ŒR˜€
‚ÿIDTA³†!‡% €8€°˜€‚ÿInterrupt Dispatch Table.1à†R‡1žÿÿÿÿÿÿÿÿ^ÿÿÿÿR‡¿‡-!‡‡' € €˜ŒR˜€
‚ÿIFS@R‡¿‡% €6€°˜€‚ÿInstallable File System.1‡ð‡1“ÿÿÿÿÿÿÿÿ_ÿÿÿÿð‡R‰7¿‡'ˆ' € €˜ŒR˜€
‚ÿimpersonation+ð‡R‰& € €°˜€‚ÿThe ability of a thread in one process to take on the security identity of a thread in another process and perform operations on the thread's behalf. Used by environment subsystems and network services when accessing remote resources for client applications.1'ˆƒ‰1Sÿÿÿÿÿÿÿÿ`ÿÿÿÿƒ‰¥‹G R‰ʉ' €@€˜ŒR˜€
‚ÿinstallable file system (IFS)Ûµƒ‰¥‹& €k€°˜€‚ÿA file system that can be loaded into the operating system dynamically. Windows NT can support multiple installable file systems at one time, including the file allocation table (FAT) file system, the Windows NT file system (NTFS), the high performance file system (HPFS), and the CD-ROM file system (CDFS). The operating system automatically determines the format of a storage medium and reads and writes files in the correct format.1ʉ֋1lÿÿÿÿÿÿÿÿaÿÿÿÿ֋D¥‹Œ' €:€˜ŒR˜€
‚ÿinstruction execution unit÷¹Ö‹> J€s€°˜€âg–Lˀ
‰€â=‘€
‰€‚ÿA processor-dependent block of code in a virtual DOS machine (VDM). It acts as a trap handler on Intel processors and as an Intel instruction emulator on the MIPS processors.1ŒB1~ÿÿÿÿÿÿÿÿbÿÿÿÿBŽ<~' €*€˜ŒR˜€
‚ÿintegral subsystemÓBŽ> J€§€°˜€âʅ:€
‰€âeÖ¿À€
‰€‚ÿA protected subsystem (server) that performs an essential operating system task. This group includes network servers and the security subsystem. See also environment subsystem and protected subsystem.1~ÀŽ1¿ÿÿÿÿÿÿÿÿcÿÿÿÿÀŽN;ŽûŽ' €(€˜ŒR˜€
‚ÿinteractive logonS.ÀŽN% €\€°˜€‚ÿA logon at the attached keyboard and screen1ûŽ1eÿÿÿÿÿÿÿÿdÿÿÿÿ
Á3 N²' €€˜ŒR˜€
‚ÿinterruptL
ÁJ b€€°˜€âÛ %€
‰€â8´µl€
‰€â=‘€
‰€‚ÿAn ²
ÁNasynchronous operating system condition that disrupts normal execution and transfers control to an interrupt handler. Interrupts are usually initiated by I/O devices requiring service from the processor. See also exception and trap handler.1²;Á1Iÿÿÿÿÿÿÿÿeÿÿÿÿ;ÁSÂ>
ÁyÁ' €.€˜ŒR˜€
‚ÿinterrupt dispatcherڜ;ÁSÂ> J€9€°˜€â=‘€
‰€âp‹ÿ
€
‰€‚ÿA submodule of the kernel's trap handler. It determines the source of an interrupt and transfers control to a routine that handles the interrupt.1yÁ„Â1Fÿÿÿÿÿÿÿÿfÿÿÿÿ„™ÃH!SÂÌÂ' €B€˜ŒR˜€
‚ÿinterrupt dispatch table (IDT)͛„™Ã2 2€7€°˜€â ÓÒN€
‰€‚ÿA per-processor data structure that the kernel uses to locate an interrupt-handling routine when an interrupt occurs. See also interrupt dispatcher.1ÌÂÊÃ1-ÿÿÿÿÿÿÿÿgÿÿÿÿÊÃÆÅ:™ÃÄ' €&€˜ŒR˜€
‚ÿinterrupt objectÂlÊÃÆÅV z€Ù€°˜€âk?ªV€
‰€âþ¾£H€
‰€âhwï€
‰€â¬ÛSž€
‰€‚ÿA kernel object that allows a device driver to associate ("connect") an interrupt service routine (ISR) with an interrupt request level (IRQL). It is a control object, containing the address of the ISR, the IRQL at which the device interrupts, and the entry in the kernel's interrupt dispatch table (IDT) with which the ISR should be associated.1Ä÷Å1öÿÿÿÿÿÿÿÿhÿÿÿÿ÷żÇH!ÆÅ?Æ' €B€˜ŒR˜€
‚ÿinterrupt request level (IRQL)}K÷żÇ2 2€—€°˜€âlJX€
‰€‚ÿA ranking of interrupts by priority. A processor has an interrupt request level (IRQL) setting that threads can raise or lower. Interrupts that occur at or below the processor's IRQL setting are blocked, or masked, whereas interrupts that occur above the processor's IRQL setting are not masked. See also masking interrupts.1?ÆíÇ1ÐÿÿÿÿÿÿÿÿiÿÿÿÿíÇŒÉI"¼Ç6È' €D€˜ŒR˜€
‚ÿinterrupt service routine (ISR)V$íÇŒÉ2 2€I€°˜€≠ã€
‰€‚ÿA device driver routine that the kernel's interrupt handler calls when a device issues an interrupt. The routine stops the device from generating interrupts, saves device status information, and then queues a device driver deferred procedure call (DPC) to complete interrupt servicing.16ȽÉ1ºÿÿÿÿÿÿÿÿjÿÿÿÿ½ÉFË6ŒÉóÉ' €€˜ŒR˜€
‚ÿinvalid pageS½ÉFË> J€+€°˜€âsÔFɀ
‰€â/GØ€
‰€‚ÿA virtual page that causes a page fault if an address from it is referenced. The page is either loaded from disk and made valid or recovered from the standby or modified page list and made valid; otherwise, the reference was an access violation. See also valid page.1óÉwË1XÿÿÿÿÿÿÿÿkÿÿÿÿwËžÍ8F˯Ë' €"€˜ŒR˜€
‚ÿI/O completionï¥wËžÍJ b€K€°˜€âAfQJ€
‰€âò¦J=€
‰€âÕÇ%»€
‰€‚ÿThe final step in the I/O system's processing of an I/O request. Typical operations include deleting internal data structures associated with the request, returning data to the caller, recording the final status of the operation in an I/O status block, setting a file object and/or event to the signaled state, and perhaps queuing an asynchronous procedure call (APC). See also asynchronous procedure call.1¯ËÏÍ1›ÿÿÿÿÿÿÿÿlÿÿÿÿÏÍ9Ï5žÍÎ' €€˜ŒR˜€
‚ÿI/O Manager5ÏÍ9Ï& €€°˜€‚ÿThe Windows NT executive component that unifies the various pieces of the I/O system. It defines an orderly framework within which I/O requests are accepted and delivered to file systems and device drivers. It also provides code that is common to more than one driver.1ÎjÏ1ªÿÿÿÿÿÿÿÿmÿÿÿÿjÏ"B9ϬÏ' €6€˜ŒR˜€
‚ÿI/O request packet (IRP)j8jÏ"2 2€q€°˜€â
°€
‰€‚ÿA data structure used to represen¬Ï"9Ït an I/O request and to control its processing. The I/O manager creates the IRP and then passes it to one or more drivers in succession. When the drivers are finished performing the operation, the I/O manager completes the I/O and deletes the IRP. See also I/O completion.1¬ÏS1—ÿÿÿÿÿÿÿÿnÿÿÿÿS¹."' €€˜ŒR˜€
‚ÿIOSB8S¹% €&€°˜€‚ÿI/O Status Block1ê1Sÿÿÿÿÿÿÿÿoÿÿÿÿê A¹+' €4€˜ŒR˜€
‚ÿI/O status block (IOSB)á»ê & €w€°˜€‚ÿA data structure that a caller supplies as a parameter to an I/O service. The I/O manager records the final status of the operation in the I/O status block when processing is complete.1+=1™ÿÿÿÿÿÿÿÿpÿÿÿÿ=¥- j' € €˜ŒR˜€
‚ÿIRP;=¥% €,€°˜€‚ÿI/O Request Packet.1jÖ1uÿÿÿÿÿÿÿÿqÿÿÿÿÖ<¥' €*€˜ŒR˜€
‚ÿIRP stack locationÖÖ2 2€­€°˜€âÒé'€
‰€‚ÿA data area in an I/O request packet that contains information a particular driver needs to perform its part of an I/O request. Each driver that works on the request has a separate stack location in the IRP.1K1ŸÿÿÿÿÿÿÿÿrÿÿÿÿK¹.y' €€˜ŒR˜€
‚ÿIRQL@K¹% €6€°˜€‚ÿInterrupt Request Level.1yê1 ÿÿÿÿÿÿÿÿsÿÿÿÿêY-¹' € €˜ŒR˜€
‚ÿISRBêY% €:€°˜€‚ÿInterrupt Service Routine.1Š1¢ÿÿÿÿÿÿÿÿtÿÿÿÿŠû-Y·' € €˜ŒR˜€
‚ÿISVDŠû% €>€°˜€‚ÿIndependent Software Vendors1·,1§ÿÿÿÿÿÿÿÿuÿÿÿÿ,¢0 û\' €€˜ŒR˜€
‚ÿkernelF,¢1 2€*€°˜€â­"öú€
‰€‚ÿSee NT kernel.1\Ó1BÿÿÿÿÿÿÿÿvÿÿÿÿÓä5¢' €€˜ŒR˜€
‚ÿkernel modeܪÓä2 2€U€°˜€â¶ÃnL€
‰€‚ÿThe privileged processor mode in which Windows NT system code runs. A thread running in kernel mode has access to system memory and to hardware. Compare user mode.1 1Tÿÿÿÿÿÿÿÿwÿÿÿÿ 8 7äL ' € €˜ŒR˜€
‚ÿkernel objectì¢ 8 J b€E€°˜€â–©ÚÆ€
‰€âúƒÜ¢€
‰€â]i€
‰€‚ÿA runtime instance of a kernel-defined abstract data type. The kernel defines special semantics for the behavior of kernel objects and implements kernel routines that the Windows NT executive can call to manipulate kernel objects. Kernel objects fall into one of two categories: control objects and dispatcher objects. Both types of kernel objects are used as a basis for Windows NT executive objects. 1L i 1uÿÿÿÿÿÿÿÿxÿÿÿÿi ­ ?8 ¨ ' €0€˜ŒR˜€
‚ÿkernel process objectÓi ­ 2 2€§€°˜€â–©ÚÆ€
‰€‚ÿThe kernel's representation of a process. It is a control object that contains the information necessary to load the process's address space and to keep track of process resources and default attributes. 1¨ Þ 1CÿÿÿÿÿÿÿÿyÿÿÿÿÞ ð
>­ 
' €.€˜ŒR˜€
‚ÿkernel thread objectÔ¢Þ ð
2 2€E€°˜€âúƒÜ¢€
‰€‚ÿThe kernel's representation of a thread. It is a dispatcher object that contains the elemental information necessary to dispatch the thread for execution. 1
!1ÿÿÿÿÿÿÿÿzÿÿÿÿ!4
ð
U' €€˜ŒR˜€
‚ÿkey object²u!= J€ê€°˜€â]i€
‰€âd쎀
‰€‚ÿAn executive object that represents system configuration information stored in the configuration registry.1U814ÿÿÿÿÿÿÿÿ{ÿÿÿÿ8NABz' €6€˜ŒR˜€
‚ÿlayered operating systemÈ–8NA2 2€-€°˜€âã%Y?€
‰€‚ÿA structuring approach that divides the operating system into modules and layerszNA them one on top of the other. Each module provides a set of functions that other modules can call. Code in any particular layer calls code only in lower layers. On some systems, such as VAX/VMS or the old Multics operating system, hardware even enforces the layering (using multiple, hierarchical processor modes). 1zA1¦ÿÿÿÿÿÿÿÿ|ÿÿÿÿAôCDNAÃA' €:€˜ŒR˜€
‚ÿlazy evaluation algorithms1ÛAôCV z€·€°˜€âÉ€
‰€ââVك€
‰€âóó׀
‰€âg~ÀT€
‰€‚ÿA general category of algorithms that avoid performing an expensive operation until it is required. If the operation is never required, no processing time is wasted. The Windows NT virtual memory (VM) manager uses lazy evaluation algorithms to improve memory performance. Demand paging, copy-on-write page protection, and reserving and committing memory separately are examples. See also committed memory, copy-on-write, demand paging, and reserved memory.1ÃA%D1žÿÿÿÿÿÿÿÿ}ÿÿÿÿ%D’E.ôCSD' €€˜ŒR˜€
‚ÿlink?%D’E& €3€°˜€‚ÿTo insert a copy of information from a source document into a destination, or container, document while maintaining a connection between the two documents. When the information changes in the source document, the changes are reflected in the destination, or container, document.1SDÃE1{ÿÿÿÿÿÿÿÿ~ÿÿÿÿÃE
G0 ’EóE' €€˜ŒR˜€
‚ÿlocaleôÃE
G& €é€°˜€‚ÿThe national and/or cultural environment in which a system or a program is running. The locale determines the language used for messages and menus, the sorting order of strings, the keyboard layout, and date and time formatting conventions. 1óE>G1­ÿÿÿÿÿÿÿÿÿÿÿÿ>GºHM&
G‹G' €L€˜ŒR˜€
‚ÿlocal procedure call (LPC) facility/ý>GºH2 2€û€°˜€âP8؀
‰€‚ÿPasses messages between a client process and a server process on the same computer. LPC is a flexible, optimized version of remote procedure call (RPC), an industry-standard communication facility for client and server processes across a network.1‹GëH1øÿÿÿÿÿÿÿÿ€ÿÿÿÿëH²JBºH-I' €6€˜ŒR˜€
‚ÿlocal replacement policy…GëH²J> J€€°˜€âçÆ“`€
‰€âÀù5Ѐ
‰€‚ÿA page replacement algorithm that allocates a fixed number of page frames to each process. When a process exceeds its allotment, the virtual memory (VM) manager begins transferring pages in the process's working set to disk to free space for additional page faults the process generates. See also replacement policy.1-IãJ1^ÿÿÿÿÿÿÿÿÿÿÿÿãJL7²JK' € €˜ŒR˜€
‚ÿlogon processöÐãJL& €¡€°˜€‚ÿA Windows NT process whose threads detect a user's attempt to log onto the operating system. It verifies the user's logon information with the security system before granting the user access to the system.1KAL1šÿÿÿÿÿÿÿÿ‚ÿÿÿÿALªL-LnL' € €˜ŒR˜€
‚ÿLPC<ALªL% €.€°˜€‚ÿLocal Procedure Call1nLÛL1£ÿÿÿÿÿÿÿÿƒÿÿÿÿÛLMM.ªL M' €€˜ŒR˜€
‚ÿMIBsDÛLMM% €>€°˜€‚ÿManagement Information Bases1 M~M1ÿÿÿÿÿÿÿÿ„ÿÿÿÿ~MNOBMMÀM' €6€˜ŒR˜€
‚ÿmandatory access controlŽ\~MNO2 2€¹€°˜€âH‰
€
‰€‚ÿProtection assigned to an object by a system administrator. Mandatory access controls typically label objects with a level, such as "Secret" or "Top Secret." Users wanting to access the objects must be cleared at the appropriate level. Mandatory access control supersedes any discretionary access controls that an owner applies to an object.1ÀMO1½ÿÿÿÿÿÿÿÿ…ÿÿÿÿO€-NO¬O' € €˜ŒR˜€
‚ÿmap_:O€% €t€°˜€‚ÿTo translate a virtual address into a physical¬O€NO address.1¬OH€1@ÿÿÿÿÿÿÿÿ†ÿÿÿÿH€W‚5€}€' €€˜ŒR˜€
‚ÿmapped fileڐH€W‚J b€!€°˜€âÂ/5à€
‰€ o!€
‰€âB,¯€
‰€‚ÿA file that is loaded into a section object in memory. By mapping views of the section into its address space, a process can access the file as a large array stored in virtual memory (VM). The virtual memory (VM) manager automatically pages to and from the file, loading pages from disk when they are used and writing pages to disk when they are modified. See also map and paging file.1}€ˆ‚1"ÿÿÿÿÿÿÿÿ‡ÿÿÿÿˆ‚yƒ9W‚Á‚' €$€˜ŒR˜€
‚ÿmapped file I/O¸{ˆ‚yƒ= J€ö€°˜€âÂ/5à€
‰€âsr€
‰€‚ÿFile I/O performed by reading and writing to virtual memory (VM) that is backed by a file. See also mapped file.1Á‚ªƒ1ÿÿÿÿÿÿÿÿˆÿÿÿÿªƒ”„1
yƒۃ' €€˜ŒR˜€
‚ÿmarshal¹‡ªƒ”„2 2€€°˜€âP8؀
‰€‚ÿTo order and package procedure parameters in a particular format for sending across the network. See also remote procedure call.1ۃń1ÿÿÿÿÿÿÿÿ‰ÿÿÿÿńœ…<”„…' €*€˜ŒR˜€
‚ÿmasking interrupts›jńœ…1 2€Ô€°˜€âhwï€
‰€‚ÿRaising a processor's interrupt request level (IRQL) to block interrupts at and below the new IRQL.1…ͅ1ÅÿÿÿÿÿÿÿÿŠÿÿÿÿͅa†=œ…
†' €,€˜ŒR˜€
‚ÿmaster/slave systemW&ͅa†1 2€L€°˜€âFP5€
‰€‚ÿSee asymmetric multiprocessing.1
†’†1‰ÿÿÿÿÿÿÿÿ‹ÿÿÿÿ’†ê‡7a†Ɇ' € €˜ŒR˜€
‚ÿmaster domain!û’†ê‡& €÷€°˜€‚ÿA Windows NT Advanced Server domain controller designated as a principle domain that contains the user accounts database. All other domains on the network have trust relationships with the master domain. You can also have multiple master domains. 1Ɇˆ1òÿÿÿÿÿÿÿÿŒÿÿÿÿˆ܈;ê‡Vˆ' €(€˜ŒR˜€
‚ÿmessenger service†Uˆ܈1 2€ª€°˜€âžZầ
‰€‚ÿA network service that receives messages from other systems and displays them.1Vˆ
‰1#ÿÿÿÿÿÿÿÿÿÿÿÿ
‰ÿ‰0 ܈=‰' €€˜ŒR˜€
‚ÿmethod
‰ÿ‰2 2€!€°˜€âÍÜEڀ
‰€‚ÿA function associated with an object type that the object manager calls automatically at well-defined points during an object's lifetime.1=‰0Š1®ÿÿÿÿÿÿÿÿŽÿÿÿÿ0Š­Š.ÿ‰^Š' €€˜ŒR˜€
‚ÿMIDLO*0Š­Š% €T€°˜€‚ÿMicrosoft Interface Definition Language1^Šފ1bÿÿÿÿÿÿÿÿÿÿÿÿފŒ7­Š‹' € €˜ŒR˜€
‚ÿMIDL compilerú¼ÞŠŒ> J€y€°˜€âP8؀
‰€âŸ€±€
‰€‚ÿA compiler that takes files written in Microsoft interface definition language and produces stub routines for use in remote procedure call applications. See also stub procedure.1‹@Œ1Pÿÿÿÿÿÿÿÿÿÿÿÿ@Œ_/ŒoŒ' €€˜ŒR˜€
‚ÿmodelðÊ@Œ_& €•€°˜€‚ÿA tentative description of a system or theory that accounts for all its known properties; a broad framework that unifies the many features and services the system provides, and the tasks it performs.1oŒ13ÿÿÿÿÿÿÿÿ‘ÿÿÿÿ’Ž>_΍' €.€˜ŒR˜€
‚ÿmodified page writerА’Ž& €=€°˜€‚ÿA thread in the virtual memory (VM) manager that asynchronously writes modified virtual pages to disk, thus increasing the number of available page frames.1΍Î1Hÿÿÿÿÿÿÿÿ’ÿÿÿÿÎ ÀA’Ž' €4€˜ŒR˜€
‚ÿmonolithic applications֤Î À2 2€I€°˜€âé€
‰€‚ÿApplications that come pre-packaged with a wide range of features, most of which can't be removed or replaced with alternatives. Compare component software. À’Ž1=À1 ÿÿÿÿÿÿÿÿ“ÿÿÿÿ=ÀªÀ- ÀjÀ' € €˜ŒR˜€
‚ÿMPR@=ÀªÀ% €6€°˜€‚ÿMultiple Provider Router1jÀÛÀ1uÿÿÿÿÿÿÿÿ”ÿÿÿÿÛÀÂH!ªÀ#Á' €B€˜ŒR˜€
‚ÿmultiple provider router (MPR)üÖÛÀÂ& €­€°˜€‚ÿA dynamic-link library (DLL) that determines which network (and thus which file system) to access when an application uses the Win32 WNet application programming interface (API) for browsing remote file systems.1#ÁPÂ1Qÿÿÿÿÿÿÿÿ•ÿÿÿÿPÂpÃE•Â' €<€˜ŒR˜€
‚ÿmultiple UNC provider (MUP)ÛµPÂpÃ& €k€°˜€‚ÿA driver that determines which network (and thus which file system) to access when an application uses the Win32 I/O application programming interface (API) to open remote files.1•¡Ã1µÿÿÿÿÿÿÿÿ–ÿÿÿÿ¡Ã%Å9pÃÚÃ' €$€˜ŒR˜€
‚ÿmultiprocessingK¡Ã%Å2 2€3€°˜€â·ý\j€
‰€‚ÿAn operating system's simultaneous execution of two or more threads on different processors. Only multiprocessing operating systems can exploit the extra processors in a multiprocessor computer. As a general rule, multiprocessing operating systems also perform multitasking.1ÚÃVÅ1´ÿÿÿÿÿÿÿÿ—ÿÿÿÿVÅÙÅ:%ŐÅ' €&€˜ŒR˜€
‚ÿmultiprogrammingIVÅÙÅ1 2€0€°˜€â·ý\j€
‰€‚ÿSee multitasking.1Å
Æ1sÿÿÿÿÿÿÿÿ˜ÿÿÿÿ
ÆLÇ6ÙÅ@Æ' €€˜ŒR˜€
‚ÿmultitasking Î
ÆLÇ> J€€°˜€╥ûµ€
‰€âµ~~C€
‰€‚ÿA processor's execution of more than one thread by context switching from one to the other, providing the illusion that all threads are executing simultaneously. See also preemptive multitasking.1@Æ}Ç1xÿÿÿÿÿÿÿÿ™ÿÿÿÿ}ÇÄÈ8LǵÇ' €"€˜ŒR˜€
‚ÿmultithreadingÝ}ÇÄÈ2 2€»€°˜€â·ý\j€
‰€‚ÿThe capability of an application to execute in two or more locations using multiple threads. The term is sometimes used inter- changeably with multitasking in reference to an operating system that supports threads.1µÇõÈ1·ÿÿÿÿÿÿÿÿšÿÿÿÿõÈ{É-ÄÈ"É' € €˜ŒR˜€
‚ÿMUPY4õÈ{É% €h€°˜€‚ÿMultiple Uniform naming convention (UNC) Provider1"ɬÉ1‡ÿÿÿÿÿÿÿÿ›ÿÿÿÿ¬ÉË:{ÉæÉ' €&€˜ŒR˜€
‚ÿmutual exclusionê¬ÉË2 2€Õ€°˜€â–c|!€
‰€‚ÿAllowing only one thread at a time to access a resource. Mutual exclusion is necessary when a system resource does not lend itself to shared access or when sharing might produce unpredictable results. See also critical section.1æÉ3Ë1ýÿÿÿÿÿÿÿÿœÿÿÿÿ3ËÿË4
ËgË' €€˜ŒR˜€
‚ÿnamed pipe˜s3ËÿË% €æ€°˜€‚ÿAn interprocess communication mechanism that allows one process to send data to another local or remote process.1gË0Ì1´ÿÿÿÿÿÿÿÿÿÿÿÿ0̳Í8ÿËhÌ' €"€˜ŒR˜€
‚ÿname retentionK0̳Í2 2€3€°˜€â3dš/€
‰€‚ÿThe procedure by which the object manager keeps an object's name in its namespace. When the last handle to the object is closed, the object manager deletes the object's name from its namespace, preventing subsequent open operations on that object. See also object retention.1hÌäÍ1-ÿÿÿÿÿÿÿÿžÿÿÿÿäÍàÎI"³Í-Î' €D€˜ŒR˜€
‚ÿnational language support (NLS)³äÍàÎ2 2€€°˜€â!±FX€
‰€‚ÿAn application programming interface (API) that gives applications access to locale-specific information. See also locale.1-ÎÏ1>ÿÿÿÿÿÿÿÿŸÿÿÿÿÏ*9àÎJÏ' €$€˜ŒR˜€
‚ÿnative servicesÔ®Ï*& €]€°˜€‚ÿSystem services that the Windows NT executive makes available to user mode for use by environment subsystems, dynamic-link libraries (DLLs), anJÏ*àÎd other system applications.1JÏ[1®ÿÿÿÿÿÿÿÿ ÿÿÿÿ[Ø.*‰' €€˜ŒR˜€
‚ÿNDISO*[Ø% €T€°˜€‚ÿNetwork Driver Interface Specification.1‰ 1Qÿÿÿÿÿÿÿÿ¡ÿÿÿÿ );ØD' €(€˜ŒR˜€
‚ÿNetBEUI transportå§ )> J€O€°˜€⟙’”€
‰€â‘=Ðå€
‰€‚ÿNetBIOS (Network Basic Input/Output System) Extended User Interface. Windows NT's primary local area network transport protocol. See also NetBIOS interface.1DZ1(ÿÿÿÿÿÿÿÿ¢ÿÿÿÿZQ;)•' €(€˜ŒR˜€
‚ÿNetBIOS interface¼–ZQ& €-€°˜€‚ÿA programming interface that allows I/O requests to be sent to and received from a remote computer. It hides networking hardware from applications.1•‚1®ÿÿÿÿÿÿÿÿ£ÿÿÿÿ‚ÿ8Qº' €"€˜ŒR˜€
‚ÿnetwork domainE‚ÿ> J€€°˜€âࡅZ€
‰€⶟ëe€
‰€‚ÿA set of workstations and servers that share a security accounts manager (SAM) database and can be administered as a group. A user with an account in a particular network domain can log onto and access his or her account from any system in the domain.1º01ëÿÿÿÿÿÿÿÿ¤ÿÿÿÿ0êW0ÿ‡' €`€˜ŒR˜€
‚ÿnetwork driver interface specification (NDIS)c=0ê& €{€°˜€‚ÿA Windows NT interface for network card drivers. It provides transport independence for network card vendors because all transport drivers call the NDIS interface to access network cards. Network drivers written to the NDIS interface (NDIS drivers) will be portable to the MS-DOS virtual device driver environment.1‡1‡ÿÿÿÿÿÿÿÿ¥ÿÿÿÿq<êW' €*€˜ŒR˜€
‚ÿnetwork redirectorèq2 2€Ñ€°˜€â¥,Xç€
‰€‚ÿNetworking software that accepts I/O requests for remote files, named pipes, or mailslots and sends ("redirects") them to a network server on another machine. Redirectors are implemented as file system drivers in Windows NT. 1W¢1hÿÿÿÿÿÿÿÿ¦ÿÿÿÿ¢Ù 8qÚ' €"€˜ŒR˜€
‚ÿnetwork serverÿÍ¢Ù 2 2€›€°˜€âeÖ¿À€
‰€‚ÿNetwork software that responds to I/O or compute requests from a client machine. Windows NT network servers can be implemented either as server processes or as drivers. See also protected subsystem.1Ú

1 ÿÿÿÿÿÿÿÿ§ÿÿÿÿ

y
-Ù 7
' € €˜ŒR˜€
‚ÿNLSB

y
% €:€°˜€‚ÿNational Language Support.17

1îÿÿÿÿÿÿÿÿ¨ÿÿÿÿª
g 7y

' € €˜ŒR˜€
‚ÿnonpaged pool†Uª
g 1 2€ª€°˜€âŽÙ€
‰€‚ÿThe portion of system memory that cannot be paged to disk. Compare paged pool.1á
˜ 1½ÿÿÿÿÿÿÿÿ©ÿÿÿÿ˜ $ Fg Þ ' €>€˜ŒR˜€
‚ÿnonprivileged processor modeF˜ $ 1 2€*€°˜€â¶ÃnL€
‰€‚ÿSee user mode.1Þ U 1†ÿÿÿÿÿÿÿÿªÿÿÿÿU ª
;$  ' €(€˜ŒR˜€
‚ÿnonsignaled stateÜU ª
> J€¹€°˜€â]Ô5€
‰€âò¦J=€
‰€‚ÿAn attribute of every object whose object type supports synchronization. A thread waiting on an object that is in the nonsignaled state continues to wait until the kernel sets the object to the signaled state.1 Û
1@ÿÿÿÿÿÿÿÿ«ÿÿÿÿÛ
,A-ª
' € €˜ŒR˜€
‚ÿNOSòÛ
,A& €å€°˜€‚ÿThe Banyan VINES Networking Operating System (NOS) line. VINES NOS is a fully featured, pre-configured enterprise-wide network operating system designed for large-scale, complex networks that support numerous users at many sites.VINES NOS provides Banyan's basic suite of network services--Directory, Network and System Management, Security, and Messaging. These distributed services interoperate across any size environment to create a single, integrated system,Aª
. As a result, users never have to worry about where resources are located and administrators never have to update multiple services or servers when users and resources are relocated, added or removed from the network. It's all done automatically by these cooperative network services.1]A1oÿÿÿÿÿÿÿÿ¬ÿÿÿÿ]A›A>,A›A) "€*€°˜€
€‚‚ÿNTNew Technology1]AÌA1*ÿÿÿÿÿÿÿÿ­ÿÿÿÿÌAÅC>›A
B' €.€˜ŒR˜€
‚ÿWindows NT executive»}ÌAÅC> J€û€°˜€âÄÕª€
‰€âeÖ¿À€
‰€‚ÿThe portion of the Windows NT operating system that runs in kernel mode. It provides process structure, interprocess communication, memory management, object management, thread scheduling, interrupt processing, I/O capabilities, networking, and object security. Application programming interfaces (APIs) and other features are provided in user-mode protected subsystems.1
BöC1ãÿÿÿÿÿÿÿÿ®ÿÿÿÿöC¨E?ÅC5D' €0€˜ŒR˜€
‚ÿNT file system (NTFS)sMöC¨E& €›€°˜€‚ÿAn advanced file system designed for use specifically with the Windows NT operating system. It supports file system recovery, extremely large storage media, and various features for the POSIX subsystem. It also supports object-oriented applications by treating all files as objects with user-defined and system-defined attributes.15DÙE1ãÿÿÿÿÿÿÿÿ¯ÿÿÿÿÙE‹G?¨EF' €0€˜ŒR˜€
‚ÿNT file system (NTFS)sMÙE‹G& €›€°˜€‚ÿAn advanced file system designed for use specifically with the Windows NT operating system. It supports file system recovery, extremely large storage media, and various features for the POSIX subsystem. It also supports object-oriented applications by treating all files as objects with user-defined and system-defined attributes.1F¼G1²ÿÿÿÿÿÿÿÿ°ÿÿÿÿ¼G=I3 ‹GïG' €€˜ŒR˜€
‚ÿNT kernelN¼G=I2 2€9€°˜€â]Ô5€
‰€‚ÿThe component of the Windows NT executive that manages the processor. It performs thread scheduling and dispatching, interrupt and exception handling, multiprocessor synchronization, and provides primitive objects that the Windows NT executive uses to create user-mode objects.1ïGnI1ÿÿÿÿÿÿÿÿ±ÿÿÿÿnINK0 =IžI' €€˜ŒR˜€
‚ÿobject°rnINK> J€å€°˜€âÍÜEڀ
‰€â}”À¡€
‰€‚ÿA single runtime instance of a Windows  NT-defined object type. The physical format of the object's data structure is hidden behind a type definition. It contains data that can be manipulated only by using a set of services provided for objects of its type. It embodies a set of formal properties (called attributes) and is manipulated by a set of services.1žIK1ÿÿÿÿÿÿÿÿ²ÿÿÿÿKcL:NK¹K' €&€˜ŒR˜€
‚ÿobject attributeª„KcL& € €°˜€‚ÿA field of data in an object that defines or records the object's state and that can be manipulated by calling an object service.1¹K”L1¯ÿÿÿÿÿÿÿÿ³ÿÿÿÿ”LM6cLÊL' €€˜ŒR˜€
‚ÿobject classH”LM1 2€.€°˜€âÍÜEڀ
‰€‚ÿSee object type.1ÊLCM1Pÿÿÿÿÿÿÿÿ´ÿÿÿÿCMbNAM„M' €4€˜ŒR˜€
‚ÿobject directory objectÞ¸CMbN& €q€°˜€‚ÿAn object that stores the names of other objects, much as a file directory stores filenames. It provides the means to support a hierarchical naming structure for Windows NT objects.1„M“N1Sÿÿÿÿÿÿÿÿµÿÿÿÿ“NµO7bNÊN' € €˜ŒR˜€
‚ÿobject domainëœNµO& €‹€°˜€‚ÿA self-contained set of objects that is accessible through the Windows NT object manager's object name hierarchy but is managed by a secondary object manager (such as the Windows NT I/O system).1ÊN €1“ÿÿÿÿÿÿÿÿ¶ÿÿÿÿ €õµO €µO7µOC€' € €˜ŒR˜€
‚ÿobject handle²€ €õ2 2€€°˜€â˔ž©€
‰€‚ÿAn index into a process-specific object table. It is used to refer to an opened object and incorporates a set of access rights granted to the process that owns the handle. It also contains an inheritance designation that determines whether the handle is inherited by child processes. Programs use handles to refer to objects when calling object services. See also object table.1C€&‚1ÿÿÿÿÿÿÿÿ·ÿÿÿÿ&‚
ƒ8õ^‚' €"€˜ŒR˜€
‚ÿobject manager¬†&‚
ƒ& €
€°˜€‚ÿThe component of the Windows NT executive that creates, deletes, and names operating system resources, which are stored as objects.1^‚;ƒ1²ÿÿÿÿÿÿÿÿ¸ÿÿÿÿ;ƒ¼„6
ƒqƒ' €€˜ŒR˜€
‚ÿobject modelK;ƒ¼„2 2€3€°˜€âÊ¢òo€
‰€‚ÿA model for structuring programs around the data they manipulate. The format of data structures is hidden inside objects, and programs must use specially defined services to manipulate object data. The primary goal of the object model is to maximize the reusability of code.1qƒí„1mÿÿÿÿÿÿÿÿ¹ÿÿÿÿí„)†:¼„'…' €&€˜ŒR˜€
‚ÿobject retentionÐí„)†2 2€¡€°˜€âûfÏۀ
‰€‚ÿThe procedure by which the object manager keeps an object in memory. When the last reference to an object is removed, the object manager deletes a temporary object from memory. See also name retention.1'…Z†1RÿÿÿÿÿÿÿÿºÿÿÿÿZ†{‡8)†’†' €"€˜ŒR˜€
‚ÿobject serviceéÃZ†{‡& €‡€°˜€‚ÿA user-mode-visible system service for manipulating an object. In Windows NT, an object service generally reads or changes an object's attributes and is used primarily by protected subsystems.1’†¬‡1%ÿÿÿÿÿÿÿÿ»ÿÿÿÿ¬‡ ˆ6{‡â‡' €€˜ŒR˜€
‚ÿobject table¾Œ¬‡ ˆ2 2€€°˜€â³G‹€
‰€‚ÿA process-specific data structure that contains handles to all the objects the process's threads have opened. See also object handle.1â‡ш1Uÿÿÿÿÿÿÿÿ¼ÿÿÿÿшõ‰5 ˆ‰' €€˜ŒR˜€
‚ÿobject typeï±Ñˆõ‰> J€c€°˜€â}”À¡€
‰€âÓ8ûà€
‰€‚ÿAn abstract data type, a set of services that operate on instances of the data type, and a set of object attributes. An object type is defined by using a type object.1‰&Š1Üÿÿÿÿÿÿÿÿ½ÿÿÿÿ&Šъ1
õ‰WŠ' €€˜ŒR˜€
‚ÿODINSUPzU&Šъ% €ª€°˜€‚ÿA conversion program that allows NDIS protocols to run one card using ODI drivers.1WŠ‹1¡ÿÿÿÿÿÿÿÿ¾ÿÿÿÿ‹r‹-ъ/‹' € €˜ŒR˜€
‚ÿOOPC‹r‹% €<€°˜€‚ÿObject-Oriented Programming1/‹£‹1¿ÿÿÿÿÿÿÿÿ¿ÿÿÿÿ£‹1\5r‹ÿ‹' €j€˜ŒR˜€
‚ÿOpen Systems Interconnection (OSI) reference model2 £‹1& €€°˜€‚ÿA software model defined by the International Standards Organization that standardizes levels of service and types of interaction for networked computers. The OSI reference model defines seven layers of computer communication and what each layer is responsible for.1ÿ‹b1IÿÿÿÿÿÿÿÿÀÿÿÿÿbzŽ:1œ' €&€˜ŒR˜€
‚ÿoperating systemÞ¸bzŽ& €q€°˜€‚ÿA computer program that provides an environment in which other computer programs can run, allowing them to easily take advantage of the processor and of I/O devices such as disks. 1œ«Ž1¢ÿÿÿÿÿÿÿÿÁÿÿÿÿ«Ž-zŽ؎' € €˜ŒR˜€
‚ÿOSID«Ž% €>€°˜€‚ÿOpen Systems Interconnection1؎M1dÿÿÿÿÿÿÿÿÂÿÿÿÿMqÀ.{' €€˜ŒR˜€
‚ÿpageê¬MqÀ> J€Y€°˜€âË~x€
‰€âÞãZɀ
‰€‚ÿBlocks of contiguous virtual addresses that the virtual memory (VM) ma{qÀnager copies from memory to disk and back during its paging operation. See also page frame.1{¢À1ëÿÿÿÿÿÿÿÿÃÿÿÿÿ¢À\Á4
qÀÖÀ' €€˜ŒR˜€
‚ÿpaged pool†U¢À\Á1 2€ª€°˜€â9§€
‰€‚ÿThe portion of system memory that can be paged to disk. Compare nonpaged pool.1ÖÀÁ11ÿÿÿÿÿÿÿÿÄÿÿÿÿÁÂ4
\ÁÁÁ' €€˜ŒR˜€
‚ÿpage fault̎ÁÂ> J€€°˜€âÀ¨âZ€
‰€âË~x€
‰€‚ÿA processor trap that occurs when an executing thread refers to a virtual address that resides on an invalid page. See also paging.1ÁÁ¾Â1¤ÿÿÿÿÿÿÿÿÅÿÿÿÿ¾Â1Ä4
ÂòÂ' €€˜ŒR˜€
‚ÿpage frame?¾Â1Ä> J€€°˜€âöl݀
‰€âË~x€
‰€‚ÿA block of contiguous physical addresses used to store the contents of a virtual page. Page frame size (and often page size) are dictated by the processor. On most systems, the page size and page frame size are the same. See also page and paging.1òÂbÄ1ÿÿÿÿÿÿÿÿÆÿÿÿÿbÄCÅ=1ÄŸÄ' €,€˜ŒR˜€
‚ÿpage frame database¤sbÄCÅ1 2€æ€°˜€âÞãZɀ
‰€‚ÿA data structure that the virtual memory (VM) manager uses to record the status of all physical page frames.1ŸÄtÅ1êÿÿÿÿÿÿÿÿÇÿÿÿÿtÅ-Æ/CÅ£Å' €€˜ŒR˜€
‚ÿpagerŠYtÅ-Æ1 2€²€°˜€âË~x€
‰€‚ÿA component of the virtual memory (VM) manager that performs the paging operation.1£Å^Æ1¨ÿÿÿÿÿÿÿÿÈÿÿÿÿ^ÆÕÇ4
-Æ’Æ' €€˜ŒR˜€
‚ÿpage tableCù^ÆÕÇJ b€ó€°˜€â×  ̀
‰€â’X€
‰€âË~x€
‰€‚ÿA process-specific table that the virtual memory (VM) manager uses to map virtual addresses to physical memory addresses or to disk locations. A page table is made up of page table entries (PTEs). See also page table entry and paging.1’ÆÈ1ÉÿÿÿÿÿÿÿÿÉÿÿÿÿÈžÉ@ÕÇFÈ' €2€˜ŒR˜€
‚ÿpage table entry (PTE)XÈžÉJ b€€°˜€âÂ/5à€
‰€âÀ¨âZ€
‰€â×  ̀
‰€‚ÿAn entry in a process's page table. It contains the information necessary for the virtual memory (VM) system to locate a page when a thread uses an invalid address. The size and format of PTEs are processor dependent. See also invalid page and page table.1FÈÏÉ19ÿÿÿÿÿÿÿÿÊÿÿÿÿÏÉ×Ë0 žÉÿÉ' €€˜ŒR˜€
‚ÿpagingØÏÉ×ËY €€ÿ€°˜€âÂ/5à€
‰€âÀ¨âZ€
‰€âsÔFɀ
‰€€â×  ̀
‰€‚ÿA virtual memory (VM) operation in which memory management software transfers pages from memory to disk when physical memory becomes full. When a thread accesses a page that is not in memory, a page fault occurs and the memory manager uses page tables to locate the required page on disk and load it into memory. See also invalid page, page fault, and page table.1ÿÉÌ11ÿÿÿÿÿÿÿÿËÿÿÿÿÌÍ5×Ë=Ì' €€˜ŒR˜€
‚ÿpaging fileˍÌÍ> J€€°˜€â”Û%ŀ
‰€âsr€
‰€‚ÿA system file containing the contents of virtual pages that have been paged out of memory. See also backing store and mapped file.1=Ì9Í1/ÿÿÿÿÿÿÿÿÌÿÿÿÿ9Í7Î8ÍqÍ' €"€˜ŒR˜€
‚ÿparent processƔ9Í7Î2 2€)€°˜€â3ª%3€
‰€‚ÿA process that has created another process, called a child process. The child process inherits some or all of the parent process's resources.1qÍhÎ1 ÿÿÿÿÿÿÿÿÍÿÿÿÿhÎL:7΢Î' €&€˜ŒR˜€
‚ÿplacement policyž`hÎL> J€Á€°˜€âÂ/5à€
‰€âsÔFɀ
‰€‚ÿThe algorithm a virtual memory (VM) system uses to decide where in physical memory to put data it is paging in from disk. The Windows NT virtual memory (VM) manager uses a series of first in, first out (FIFO) page lists to keep track of free pages and to retrieve a free page when lo¢ÎL7Îading information from the disk after a page fault occurs.1¢Î}1SÿÿÿÿÿÿÿÿÎÿÿÿÿ}Ÿ.L«' €€˜ŒR˜€
‚ÿportô¶}Ÿ> J€m€°˜€âeÖ¿À€
‰€âNº€
‰€‚ÿA communication channel through which a client process communicates with a protected subsystem. Ports are implemented as Windows NT objects. See also local procedure call.1«Ð1ÿÿÿÿÿÿÿÿÏÿÿÿÿЧ/Ÿÿ' €€˜ŒR˜€
‚ÿPOSIX¨‚Ч& €€°˜€‚ÿLoosely defined as "a portable operating system interface based on UNIX," POSIX refers to a collection of international standards for UNIX-style operating system interfaces. The POSIX standard (IEEE Standard 1003.1-1988) encourages vendors implementing UNIX-style interfaces to make them compatible so that programmers can move their applications easily from one system to another. 1ÿØ1‡ÿÿÿÿÿÿÿÿÐÿÿÿÿØ.=§' €,€˜ŒR˜€
‚ÿpower notify objectóØ.& €ç€°˜€‚ÿA kernel object that allows device drivers to register a power recovery routine with the kernel. It is a control object that contains a pointer to a device driver routine, which the kernel calls when the power returns after a power failure.1_1¾ÿÿÿÿÿÿÿÿÑÿÿÿÿ_ì=.œ' €,€˜ŒR˜€
‚ÿpower status objectP*_ì& €U€°˜€‚ÿA kernel object that allows device drivers to determine whether the power has failed. It is a control object containing a Boolean variable that a device driver can test before proceeding with an uninterruptible operation. If the power has already failed, the driver does not start the operation.1œ1¡ÿÿÿÿÿÿÿÿÒÿÿÿÿ.ìK' €€˜ŒR˜€
‚ÿPPTEB% €:€°˜€‚ÿPrototype Page Table Entry1K¾1KÿÿÿÿÿÿÿÿÓÿÿÿÿ¾Ø1
ï' €€˜ŒR˜€
‚ÿpreempté·¾Ø2 2€o€°˜€âµ~~C€
‰€‚ÿTo interrupt the execution of a thread when a higher-priority thread becomes ready to execute and to context-switch to the higher- priority thread. See preemptive multitasking.1ï 1»ÿÿÿÿÿÿÿÿÔÿÿÿÿ “
AØJ ' €4€˜ŒR˜€
‚ÿpreemptive multitaskingI  “
> J€€°˜€â·ý\j€
‰€â¶ø€
‰€‚ÿA form of multitasking in which the operating system periodically interrupts the execution of a thread and executes other waiting threads. Preemption prevents a thread from monopolizing the processor and allows another thread to run. See also time quantum.1J Ä
1ÿÿÿÿÿÿÿÿÕÿÿÿÿÄ
“ 8“

' €"€˜ŒR˜€
‚ÿprimary domain—fÄ
“ 1 2€Ì€°˜€⶟ëe€
‰€‚ÿThe network domain with which a particular user account is associated. See also network domain.1ü
Ä 1¼ÿÿÿÿÿÿÿÿÖÿÿÿÿÄ O C“  ' €8€˜ŒR˜€
‚ÿprivileged processor modeHÄ O 1 2€.€°˜€âÄÕª€
‰€‚ÿSee kernel mode.1 € 1ãÿÿÿÿÿÿÿÿ×ÿÿÿÿ€ 21
O ± ' €€˜ŒR˜€
‚ÿprocessO€ 22 2€Ÿ€°˜€âÉ1€
‰€‚ÿA logical division of labor in an operating system. In Windows NT, it comprises a virtual address space, an executable program, one or more threads of execution, some portion of the user's resource quotas, and the system resources that the operating system has allocated to the process's threads. It is implemented as an object.1± c1µÿÿÿÿÿÿÿÿØÿÿÿÿcç92œ' €$€˜ŒR˜€
‚ÿprocess contextKcç1 2€4€°˜€âӏŽì€
‰€‚ÿSee thread context.1œ1CÿÿÿÿÿÿÿÿÙÿÿÿÿ6@9çQ' €$€˜ŒR˜€
‚ÿprocess managerÙ³6@& €g€°˜€‚ÿCreates and terminates processes and threads. It also suspends and resumes the execution of threads and stores and retrieves informationQ6@ç about Windows NT processes and threads.1Qg@1ÕÿÿÿÿÿÿÿÿÚÿÿÿÿg@ A<6@£@' €*€˜ŒR˜€
‚ÿprocessor affinityh7g@ A1 2€n€°˜€âÉ1€
‰€‚ÿThe set of processors on which a thread can run.1£@ ‚ÿprocess tree~Y ‚ÿprotected subsystemÔ!BpC> J€©€°˜€âʅ:€
‰€â)˜ÊÀ€
‰€‚ÿA server process that performs operating system functions. Each Windows NT protected subsystem operates in user mode with a private address space. See also environment subsystem and integral subsystem.1^B¡C1MÿÿÿÿÿÿÿÿÝÿÿÿÿ¡C½D2 pCÓC' €€˜ŒR˜€
‚ÿprotocolêÄ¡C½D& €‰€°˜€‚ÿA set of rules and conventions by which two computers pass messages across a network medium. Networking software generally implements multiple levels of protocols layered one on top of another.1ÓCîD1ÿÿÿÿÿÿÿÿÞÿÿÿÿîDÎE8½D&E' €"€˜ŒR˜€
‚ÿprotocol stack¨wîDÎE1 2€î€°˜€⟙’”€
‰€‚ÿThe collection and sequence of network protocols used to transmit a network request from one machine to another.1&EÿE1pÿÿÿÿÿÿÿÿßÿÿÿÿÿE>GK$ÎEJF' €H€˜ŒR˜€
‚ÿprototype page table entry (PPTE)ôªÿE>GJ b€U€°˜€â’X€
‰€âÞãZɀ
‰€âŽêÎ%€
‰€‚ÿA data structure that looks similar to a normal page table entry (PTE) but points to a page frame shared by more than one process. See also section object.1JFoG1úÿÿÿÿÿÿÿÿàÿÿÿÿoG8H2 >G¡G' €€˜ŒR˜€
‚ÿprovider—foG8H1 2€Ì€°˜€â¥,Xç€
‰€‚ÿA generic name for software that establishes Windows NT as a client of a remote network server.1¡GiH1‚ÿÿÿÿÿÿÿÿáÿÿÿÿiHºI<8H¥H' €*€˜ŒR˜€
‚ÿprovider interfaceãiHºI2 2€Ç€°˜€âÕæF€
‰€‚ÿA programming interface that allows network vendors to make their remote file systems available for browsing by applications using Windows' WNet application programming interface (API). See also multiple provider router.1¥HëI1–ÿÿÿÿÿÿÿÿâÿÿÿÿëIPJ-ºIJ' € €˜ŒR˜€
‚ÿPTE8ëIPJ% €&€°˜€‚ÿPage Table Entry1JJ1ãÿÿÿÿÿÿÿÿãÿÿÿÿJ3L3 PJ´J' €€˜ŒR˜€
‚ÿquick LPC5J3LJ b€k€°˜€â]Ô5€
‰€âNº€
‰€âüÓ݀
‰€‚ÿA form of local procedure call (LPC) used by portions of the Win32 subsystem and its clients. Quick LPC increases the speed of passing a message by bypassing port objects, storing messages in shared memory, and using a built-in synchronization mechanism. See also local procedure call and port.1´JdL1ÙÿÿÿÿÿÿÿÿäÿÿÿÿdL N/3L“L' €€˜ŒR˜€
‚ÿquotaySdL N& €§€°˜€‚ÿA resource limit imposed on user accounts. The object manager charges a process some portion of the user's quota each time one of the process's threads creates or opens a handle to an object. When the quota is depleted, the user's processes can no longer create objects or open object handles until the processes release some resources.1“L=N1Qÿÿÿÿÿÿÿÿåÿÿÿÿ=N]O< NyN' €*€˜ŒR˜€
‚ÿraise an exceptionä¦=N]O> J€M€°˜€âᩍ§€
‰€â8´µl€
‰€‚ÿTo deliberately transfer control to an exception handler when an exception occurs. Software raises an exception when errors or unexpected conditions occur.1yNŽO1ÅÿÿÿÿÿÿÿÿæÿÿÿÿŽORU.]O €' €\€˜ŒR˜€
‚ÿRAID - Redundant Array of Inexpensive DisksŽO €]OFŽOR' €?€°˜˜€‚ÿA number of different partitions on different disks are combined to make one large logical drive. The partitions are used and arranged to allow multiple single points of failure in the array. This is known as "disk striping with parity" and is supported by Windows NT Advanced Server.1 €ƒ1–ÿÿÿÿÿÿÿÿçÿÿÿÿƒè‚ERȁ' €<€˜ŒR˜€
‚ÿRAS - Remote Access Service 탁è‚3 4€Û€°˜˜€€ €€ €‚ÿRemote Access Service for the Microsoft® Windows NT™ operating system enables users to participate fully as a network client from remote locations. With RAS, several functions can be performed transparently on remote workstations.1ȁƒ1~ÿÿÿÿÿÿÿÿèÿÿÿÿƒf„4
è‚Mƒ' €€˜ŒR˜€
‚ÿredirectorçƒf„2 2€Ï€°˜€â¥,Xç€
‰€‚ÿNetworking software that accepts I/O requests for remote files, named pipes, or mailslots and sends ("redirects") them to a network server on another machine. Redirectors are implemented as file system drivers in Windows NT.1Mƒ—„1Zÿÿÿÿÿÿÿÿéÿÿÿÿ—„À†Q*f„è„' €T€˜ŒR˜€
‚ÿreduced instruction set computer (RISC)ئ—„À†2 2€M€°˜€â>º̀
‰€‚ÿA processor that employs a small number of simple instructions that are used in conjunction to perform more powerful operations. Because of the instructions' simplicity and their use of large numbers of registers, each generally takes only one clock cycle to execute, and the processor can run at higher clock speeds than can most complex instruction set computers (CISCs). Compare complex instruction set computer.1è„ñ†1ÿÿÿÿÿÿÿÿêÿÿÿÿñ†ˆEÀ†6‡' €<€˜ŒR˜€
‚ÿremote procedure call (RPC)ŒZñ†ˆ2 2€µ€°˜€âNº€
‰€‚ÿA message-passing facility that allows a distributed application to call services available on various machines in a network without regard to their locations. Remote network operations are handled automatically. RPC provides a procedural view, rather than a transport- centered view, of networked operations. Compare local procedure call.16‡óˆ1¶ÿÿÿÿÿÿÿÿëÿÿÿÿóˆxŠ<ˆ/‰' €*€˜ŒR˜€
‚ÿreplacement policyI óˆxŠ> J€€°˜€âÂ/5à€
‰€âvÃǀ
‰€‚ÿThe algorithm used by a virtual memory (VM) system to decide which virtual page must be removed from memory to make room for data being paged in from disk. Windows NT adopts a least-recently-used local replacement policy. See also local replacement policy.1/‰©Š1 ÿÿÿÿÿÿÿÿìÿÿÿÿ©Š˜‹9xŠâŠ' €$€˜ŒR˜€
‚ÿreserved memory¶m©Š˜‹I b€Ú€°˜€âÂ/5à€
‰€âÉ1€
‰€âÉ€
‰€‚ÿA set of virtual memory (VM) addresses that a thread has allocated. See also committed memory.1âŠɋ1ðÿÿÿÿÿÿÿÿíÿÿÿÿɋˆŒ4
˜‹ý‹' €€˜ŒR˜€
‚ÿrobustness‹fɋˆŒ% €Ì€°˜€‚ÿThe ability of a program to function well or to continue functioning well in unexpected situations.1ý‹¹Œ1›ÿÿÿÿÿÿÿÿîÿÿÿÿ¹Œ#-ˆŒæŒ' € €˜ŒR˜€
‚ÿRPC=¹Œ#% €0€°˜€‚ÿRemote Procedure Call1æŒT1QÿÿÿÿÿÿÿÿïÿÿÿÿTtŽJ##ž' €F€˜ŒR˜€
‚ÿRPC transport provider interfaceÖ¤TtŽ2 2€I€°˜€âP8؀
‰€‚ÿA DLL that acts as an interface between the remote procedure call facility and network transport software. It allows RPCs to be sent over various transports.1ž¥Ž1Fÿÿÿÿÿÿÿÿðÿÿÿÿ¥Žº6tŽێ' €€˜ŒR˜€
‚ÿSAM databaseß­¥Žº2 2€[€°˜€â"ÞZ €
‰€‚ÿA database of security information that includes user account names and passwords. It is administered by the Windows User Manager. See also security accounts manager.< ێ À1ùÿÿÿÿÿÿÿÿñÿÿÿÿ À–Àscalabilityº ÀºŠaº–À) "€Â€°˜€
‚€‚ÿscalabilityThe ability to adjust an operating system to a broad range of hardware platforms.1 ÀÇÀ1ÇÿÿÿÿÿÿÿÿòÿÿÿÿÇÀ]Á0 –À÷À' €€˜ŒR˜€
‚ÿscriptfAÇÀ]Á% €‚€°˜€‚ÿA system of characters used to write in one or more languages.1÷ÀŽÁ1RÿÿÿÿÿÿÿÿóÿÿÿÿŽÁ¯Â8]ÁÆÁ' €"€˜ŒR˜€
‚ÿsection object鷎Á¯Â2 2€o€°˜€âìíʝ€
‰€‚ÿAn object that represents memory potentially shared by two or more processes. A process can also create an unnamed section object that represents private memory. See also view.1ÆÁàÂ1RÿÿÿÿÿÿÿÿôÿÿÿÿàÂÄ?¯ÂÃ' €0€˜ŒR˜€
‚ÿsecure logon facilityâ¼àÂÄ& €y€°˜€‚ÿSoftware in a secure operating system that monitors a particular class of logon devices to ensure that all users enter valid identification before they are allowed access to the system.1Ã2Ä1Wÿÿÿÿÿÿÿÿõÿÿÿÿ2ÄXÅI"Ä{Ä' €D€˜ŒR˜€
‚ÿsecurity accounts manager (SAM)ݟ2ÄXÅ> J€?€°˜€âeÖ¿À€
‰€âࡅZ€
‰€‚ÿA Windows NT protected subsystem that maintains the SAM database and provides an application programming interface (API) for accessing the database.1{ĉÅ1^ÿÿÿÿÿÿÿÿöÿÿÿÿ‰Å¶Æ=XÅÆÅ' €,€˜ŒR˜€
‚ÿsecurity descriptorð²‰Å¶Æ> J€e€°˜€âœØRu€
‰€â®gŠK€
‰€‚ÿA data structure attached to an object that protects the object from unauthorized access. It contains an access control list (ACL) and controls auditing on the object.1ÆÅçÆ1‰ÿÿÿÿÿÿÿÿ÷ÿÿÿÿçÆ?È5¶ÆÇ' €€˜ŒR˜€
‚ÿsecurity ID#ýçÆ?È& €û€°˜€‚ÿA name, unique across time and space, that identifies a logged-on user to the security system. Security IDs (SIDs) can identify either an individual user or a group of users. An individual security ID usually corresponds to a user's logon identifier.1ÇpÈ1ŒÿÿÿÿÿÿÿÿøÿÿÿÿpÈËÉD?È´È' €:€˜ŒR˜€
‚ÿsecurity reference monitoråpÈËÉ2 2€Ë€°˜€âœØRu€
‰€‚ÿA component of the Windows NT executive that compares the access token of a process to the access control list (ACL) of an object to determine whether the process's threads should be allowed to open a handle to the object.1´ÈüÉ1%ÿÿÿÿÿÿÿÿùÿÿÿÿüÉðÊ<ËÉ8Ê' €*€˜ŒR˜€
‚ÿsecurity subsystem¸†üÉðÊ2 2€
€°˜€â)˜ÊÀ€
‰€‚ÿAn integral subsystem that records the security policies in effect for the local computer and participates in logging on users.18Ê!Ë1ÿÿÿÿÿÿÿÿúÿÿÿÿ!ËÍ0 ðÊQË' €€˜ŒR˜€
‚ÿserver°W!ËÍY €€¯€°˜€â6 Õ€
‰€âNº€
‰€â¥,Xç€
‰€€âP8؀
‰€‚ÿA process with one or more threads that accept requests from client processes. It implements a set of services that it makes available to clients running either on the same computer or possibly on various computers in a distributed network. See also client, local procedure call, network server, and remote procedure call.1QË2Í1Sÿÿÿÿÿÿÿÿûÿÿÿÿ2ÍTÏM&ÍÍ' €L€˜ŒR˜€
‚ÿserver message block (SMB) protocolÕˆ2ÍTÏM h€€°˜€â¥,Xç€
‰€⟙’”€
‰€€âZ‰’ï€
‰€‚ÿA network protocol used originally in Microsoft Networks and subsequently adopted in PC networking software. It defines a specific format for packets of data to be transmitted across the network. The Windows NT redirector and built-in server use SMBs to communicate with each other and with computers on LAN Manager networks. See also network server, protocol, and redirector.1Í…Ï1Yÿÿÿÿÿÿÿÿüÿÿÿÿ…ÏŽ8TϽÏ' €"€˜ŒR˜€
‚ÿserver service҅ÏŽ> J€€°˜€âžZầ
‰€â¥,Xç€
‰€‚ÿA ne½ÏŽTÏtwork service that supplies a user-mode application programming interface (API) to manage the Windows NT network server.1½Ï¿1ˆÿÿÿÿÿÿÿÿýÿÿÿÿ¿1
Žð' €€˜ŒR˜€
‚ÿservice&¿& €€°˜€‚ÿA server process that performs a specific system function and often provides an application programming interface (API) for other processes to call. Windows NT services are RPC-enabled, meaning that their API routines can be called from remote machines.1ðG1gÿÿÿÿÿÿÿÿþÿÿÿÿG}<ƒ' €*€˜ŒR˜€
‚ÿservice controllerúÈG}2 2€‘€°˜€âžZầ
‰€‚ÿThe networking component that loads and starts Windows NT services. It also loads and unloads many Windows NT drivers, including device drivers and network transport drivers. See also service.1ƒ®1‘ÿÿÿÿÿÿÿÿÿÿÿÿÿ®-}Û' € €˜ŒR˜€
‚ÿSID3®% €€°˜€‚ÿSecurity ID1Û?1õÿÿÿÿÿÿÿÿÿÿÿÿ?8w' €"€˜ŒR˜€
‚ÿsignaled stateŒB?J b€…€°˜€â]Ô5€
‰€âúƒÜ¢€
‰€â1 ‘€
‰€‚ÿAn attribute of every object whose object type supports synchronization. When the kernel sets an object to the signaled state, threads waiting on the object are released from their waiting states (according to a set of rules) and become eligible for execution. See also dispatcher object, nonsignaled state.1w41.ÿÿÿÿÿÿÿÿÿÿÿÿ41Cw' €8€˜ŒR˜€
‚ÿsingle-byte coding schemeºˆ412 2€€°˜€âb3c €
‰€‚ÿA character encoding scheme (code set), such as Windows ANSI, that uses eight bits to represent each character. See also Unicode.1wb1šÿÿÿÿÿÿÿÿÿÿÿÿbË-1' € €˜ŒR˜€
‚ÿSMB<bË% €.€°˜€‚ÿServer Message Block1ü1Ÿÿÿÿÿÿÿÿÿÿÿÿÿüj-Ë)' € €˜ŒR˜€
‚ÿSMPAüj% €8€°˜€‚ÿSymmetric MultiProcessing1)›1©ÿÿÿÿÿÿÿÿÿÿÿÿ› .jÉ' €€˜ŒR˜€
‚ÿSNMPJ%› % €J€°˜€‚ÿSimple Network Management Protocol1ÉD 1ïÿÿÿÿÿÿÿÿÿÿÿÿD  3  w ' €€˜ŒR˜€
‚ÿspin lock‹AD  J b€ƒ€°˜€â]Ô5€
‰€âÉ1€
‰€âœO°€
‰€‚ÿA synchronization mechanism used by the kernel and parts of the executive that guarantees mutually exclusive access to a global system data structure across multiple processors. A thread waiting to acquire a spin lock effectively stalls the processor until it gets the spin lock. See also mutual exclusion.1w 3 1öÿÿÿÿÿÿÿÿÿÿÿÿ3 ø 1
 d ' €€˜ŒR˜€
‚ÿSTREAMS”o3 ø % €Þ€°˜€‚ÿA driver-development environment that Windows NT supplies for creating or porting network transport drivers.1d ) 1×ÿÿÿÿÿÿÿÿÿÿÿÿ) Ï
G ø p ' €@€˜ŒR˜€
‚ÿstructured exception handling_!) Ï
> J€C€°˜€â8´µl€
‰€âᩍ§€
‰€‚ÿA method for capturing unexpected conditions and responding to them consistently throughout the operating system. The operating system (or hardware) issues an exception when an abnormal system event occurs, and the kernel automatically transfers control to an exception handler.1p 1Pÿÿÿÿÿÿÿÿÿÿÿÿ+@8Ï
8' €"€˜ŒR˜€
‚ÿstub procedureç+@J b€;€°˜€âNº€
‰€âûíՀ
‰€âP8؀
‰€‚ÿA procedure in a dynamic-link library (DLL) that serves as an entry point for an application programming interface (API). When a client application calls the API routine, the stub procedure marshals the API parameters it receives into a message and sends them to either a local server (subsystem) or a remote server on the network. See also local procedure call, marshal, a8+@Ï
nd remote procedure call.18\@1âÿÿÿÿÿÿÿÿ ÿÿÿÿ\@
A>+@š@' €.€˜ŒR˜€
‚ÿsymbolic link objectsN\@
A% €œ€°˜€‚ÿA Windows NT executive object that translates one object name into another.1š@>A1Ôÿÿÿÿÿÿÿÿ
ÿÿÿÿ>AáBI"
A‡A' €D€˜ŒR˜€
‚ÿsymmetric multiprocessing (SMP)Z>AáB> J€9€°˜€â¥ZÒ€
‰€âFP5€
‰€‚ÿA multiprocessing operating system that allows operating system code to run on any free processor in a multiprocessor computer. Symmetric multiprocessing systems generally provide better throughput and greater availability than do asymmetric multiprocessing (ASMP) systems.1‡AC1“ÿÿÿÿÿÿÿÿ ÿÿÿÿCtD9áBKC' €$€˜ŒR˜€
‚ÿsynchronization)ßCtDJ b€¿€°˜€âÉ1€
‰€âÔAH´€
‰€âò¦J=€
‰€‚ÿThe ability of one thread to pause during execution and wait until another thread performs an operation. In Windows NT, a thread waits for another thread to set a synchronization object to the signaled state.1KC¥D1Bÿÿÿÿÿÿÿÿ ÿÿÿÿ¥D¶FAtDæD' €4€˜ŒR˜€
‚ÿsynchronization objectsІ¥D¶FJ b€
€°˜€â]Ô5€
‰€âò¦J=€
‰€âúƒÜ¢€
‰€‚ÿThe collection of user-mode-visible Windows NT executive objects whose object types support synchronization. They include threads, processes, events, event pairs, semaphores, timers, mutants, and files. A thread can wait for a synchronization object to be set to the signaled state by another thread. Each synchronization object contains within it a kernel dispatcher object.1æDçF1ÿÿÿÿÿÿÿÿ
ÿÿÿÿçFÒG5¶FG' €€˜ŒR˜€
‚ÿsynchronous¶„çFÒG2 2€ €°˜€âÛ %€
‰€‚ÿOccurring at a particular time as a direct result of the execution of a particular machine instruction. Compare asynchronous.1GH1YÿÿÿÿÿÿÿÿÿÿÿÿH+I9ÒG ‚ÿsynchronous I/Oï½H+I2 2€{€°˜€âÁ:p€
‰€‚ÿA model for I/O in which an application issues an I/O request and the I/O system does not return control to the application until the I/O request completes. Compare asynchronous I/O.1 ‚ÿTCP/IP transportC\IÙJ2 2€#€°˜€⟙’”€
‰€‚ÿTransport Control Protocol/Internet Protocol. Windows NT's primary wide area network transport protocol. It allows Windows NT to communicate with systems on TCP/IP networks and to participate in popular UNIX-based bulletin board, news, and electronic mail services. 1–I
K1 ÿÿÿÿÿÿÿÿÿÿÿÿ
KyK-ÙJ7K' € €˜ŒR˜€
‚ÿTDIB
KyK% €:€°˜€‚ÿTransport Driver Interface17KªK1äÿÿÿÿÿÿÿÿÿÿÿÿªK]M=yKçK' €,€˜ŒR˜€
‚ÿtermination handlervDªK]M2 2€‰€°˜€âᩍ§€
‰€‚ÿAn exception handler that lets an application ensure that a particular block of code always executes, even if the code terminates in an unexpected way. Termination handlers often contain code that frees allocated resources so that if a procedure terminates unexpectedly, the resources are released back to the system.1çKŽM1ÔÿÿÿÿÿÿÿÿÿÿÿÿŽM1O0 ]M¾M' €€˜ŒR˜€
‚ÿthreadsAŽM1O2 2€ƒ€°˜€âÀâ¾Ó€
‰€‚ÿAn executable entity that belongs to one (and only one) process. It comprises a program counter, a user-mode stack, a kernel-mode stack, and a set of register values. All threads in a process have equal access to the process's address space, object handles, and other resources. Threads are implemented as objects.1¾MbO1ÉÿÿÿÿÿÿÿÿÿÿÿÿbO¦€81OšO' €"€˜ŒR˜€
‚ÿthread contextÎbO¦€2 2€€°˜€╥ûµ€
‰€‚ÿThe volatile data associated with the execution of šO¦€1Oa thread. It includes the contents of system registers and the virtual address space belonging to the thread's process. See also context switching.1šO׀1»ÿÿÿÿÿÿÿÿÿÿÿÿ׀a<¦€' €*€˜ŒR˜€
‚ÿthread dispatchingN׀a1 2€:€°˜€╥ûµ€
‰€‚ÿSee context switching.1’1Íÿÿÿÿÿÿÿÿÿÿÿÿ’.‚7aɁ' € €˜ŒR˜€
‚ÿthread objecte4’.‚1 2€h€°˜€âÉ1€
‰€‚ÿThe implementation of a thread in Windows NT.1Ɂ_‚1±ÿÿÿÿÿÿÿÿÿÿÿÿ_‚߂=.‚œ‚' €,€˜ŒR˜€
‚ÿthread of executionC_‚߂1 2€$€°˜€âÉ1€
‰€‚ÿSee thread.1œ‚ƒ1Pÿÿÿÿÿÿÿÿÿÿÿÿƒ/„;߂Kƒ' €(€˜ŒR˜€
‚ÿthread scheduling䲃/„2 2€e€°˜€âÊ^›€
‰€‚ÿThe process of examining the queue of threads that are ready to execute and selecting one to run next. This task is performed by the Windows NT kernel's dispatcher module.1Kƒ`„1Vÿÿÿÿÿÿÿÿÿÿÿÿ`„……2 /„’„' €€˜ŒR˜€
‚ÿthunkingóÍ`„……& €›€°˜€‚ÿThe process of converting a 16-bit API call into a 32-bit call (or vice versa). Thunking is required on systems with both 16- and 32-bit components. Thunks add system overhead and degrade performance.1’„¶…1=ÿÿÿÿÿÿÿÿÿÿÿÿ¶…†@……ö…' €2€˜ŒR˜€
‚ÿtightly coupled system̦¶…†& €M€°˜€‚ÿA multiprocessor computer in which all processors share global memory. The operating system must synchronize its access to data structures stored in global memory.1ö…ó†1ÿÿÿÿÿÿÿÿÿÿÿÿó†܇6†)‡' €€˜ŒR˜€
‚ÿtime quantum³ó†܇2 2€€°˜€âD޷р
‰€‚ÿA preset amount of time that an operating system kernel allows a thread to execute before preempting it. See also preempt.1)‡
ˆ1¢ÿÿÿÿÿÿÿÿÿÿÿÿ
ˆ~ˆ-܇:ˆ' € €˜ŒR˜€
‚ÿTLBD
ˆ~ˆ% €>€°˜€‚ÿTranslation Lookaside Buffer1:ˆ¯ˆ1°ÿÿÿÿÿÿÿÿÿÿÿÿ¯ˆ.‰6~ˆåˆ' €€˜ŒR˜€
‚ÿtoken objectI¯ˆ.‰1 2€0€°˜€â;ù€V€
‰€‚ÿSee access token.1åˆ_‰1Ãÿÿÿÿÿÿÿÿÿÿÿÿ_‰ñ‰2 .‰‘‰' €€˜ŒR˜€
‚ÿtopology`;_‰ñ‰% €v€°˜€‚ÿThe physical configuration of the machines in a network.1‘‰"Š1‡ÿÿÿÿÿÿÿÿÿÿÿÿ"Šx‹L%ñ‰nŠ' €J€˜ŒR˜€
‚ÿtranslation lookaside buffer (TLB)
ä"Šx‹& €É€°˜€‚ÿAn array of memory containing the virtual-to-physical address mappings of the pages most recently used systemwide. Both MIPS processors and Intel processors have TLBs, but their structure and operation are hardware dependent.1nŠ©‹1ÿÿÿÿÿÿÿÿÿÿÿÿ©‹J#x‹ó‹' €F€˜ŒR˜€
‚ÿtransport driver interface (TDI)& €Ý€°˜€‚ÿA Windows NT interface for network redirectors and servers to use in sending network-bound requests to transport drivers. The interface provides transport independence for these components by abstracting transport-specific information.1ó‹81aÿÿÿÿÿÿÿÿ ÿÿÿÿ8hŽ.f' €€˜ŒR˜€
‚ÿtrapÐ8hŽ2 2€¡€°˜€â=‘€
‰€‚ÿA processor's mechanism for capturing an executing thread when an unusual event (such as an exception or interrupt) occurs and transferring control to a fixed location in memory. See also trap handler.1f™Ž1¦ÿÿÿÿÿÿÿÿ!ÿÿÿÿ™ŽÀ4
hŽ͎' €€˜ŒR˜€
‚ÿtrap frameA™ŽÀ2 2€€°˜€â=‘€
‰€‚ÿA data structure that the kernel's trap handler creates when an interrupt or exception occurs. It records the state of the processor, which allows the kernel to continue executing the thread that was interrupted after handling the condition. See also tra͎ÀhŽp handler.1͎KÀ1Yÿÿÿÿÿÿÿÿ"ÿÿÿÿKÀsÁ6ÀÀ' €€˜ŒR˜€
‚ÿtrap handleròÀKÀsÁ2 2€€°˜€âÁȝ€
‰€‚ÿA body of code that hardware invokes when an interrupt or exception occurs. It determines the type of condition that occurred and transfers control to a handling routine. See also trap.1À¤Á1ûÿÿÿÿÿÿÿÿ#ÿÿÿÿ¤ÁnÂEsÁéÁ' €<€˜ŒR˜€
‚ÿtrusted domain relationship…H¤ÁnÂ= J€€°˜€â@
{P€
‰€⶟ëe€
‰€‚ÿA trust relationship that exists between two network domains.1éÁŸÂ1Ÿÿÿÿÿÿÿÿÿ$ÿÿÿÿŸÂ
Ä<nÂÛÂ' €*€˜ŒR˜€
‚ÿtrust relationship2ôŸÂ
Ä> J€é€°˜€â¥,Xç€
‰€â.$˜€
‰€‚ÿA security term meaning that one workstation or network server trusts a domain controller to authenticate a user logon on its behalf. One domain controller can also trust a domain controller in another domain to authenticate a logon.1ÛÂ>Ä1Pÿÿÿÿÿÿÿÿ%ÿÿÿÿ>Ä]Å5
ÄsÄ' €€˜ŒR˜€
‚ÿtype objectê¸>Ä]Å2 2€q€°˜€âÍÜEڀ
‰€‚ÿAn internal system object that defines common attributes for a class of objects. Every object instance contains a pointer to its corresponding type object. See also object type.1sÄŽÅ1Ÿÿÿÿÿÿÿÿÿ&ÿÿÿÿŽÅüÅ-]Å»Å' € €˜ŒR˜€
‚ÿUNCAŽÅüÅ% €8€°˜€‚ÿUniform Naming Convention1»Å-Æ1
ÿÿÿÿÿÿÿÿ'ÿÿÿÿ-Æ Ç1
üÅ^Æ' €€˜ŒR˜€
‚ÿUnicode«z-Æ Ç1 2€ô€°˜€âP=“€
‰€‚ÿA fixed-width, 16-bit character encoding standard capable of representing all the world's scripts. See also script.1^Æ:Ç1 ÿÿÿÿÿÿÿÿ(ÿÿÿÿ:Ç)ÈO( ljÇ' €P€˜ŒR˜€
‚ÿuniform naming convention (UNC) names u:Ç)È+ &€ê€°˜€€€‚ÿFilenames or other resource names that begin with the string \\, indicating that they exist on a remote machine.1‰ÇZÈ1fÿÿÿÿÿÿÿÿ)ÿÿÿÿZȏÉL%)ȦÈ' €J€˜ŒR˜€
‚ÿuninterruptible power supply (UPS)éÃZȏÉ& €‡€°˜€‚ÿA backup battery module attached to a computer that allows memory contents to remain intact long enough for the operating system to perform an orderly system shutdown if a power outage occurs.1¦ÈÀÉ1¢ÿÿÿÿÿÿÿÿ*ÿÿÿÿÀÉ1Ê-ÉíÉ' € €˜ŒR˜€
‚ÿUPSDÀÉ1Ê% €>€°˜€‚ÿUninterruptible Power Supply1íÉbÊ1Oÿÿÿÿÿÿÿÿ+ÿÿÿÿbÊ€Ë3 1Ê•Ê' €€˜ŒR˜€
‚ÿuser modeë¹bÊ€Ë2 2€s€°˜€âÄÕª€
‰€‚ÿThe nonprivileged processor mode in which application code runs. A thread running in user mode can gain access to the system only by calling system services. Compare kernel mode.1•ʱË1ÿÿÿÿÿÿÿÿ,ÿÿÿÿ±Ë‘Ì4
€ËåË' €€˜ŒR˜€
‚ÿvalid page¬o±Ë‘Ì= J€Þ€°˜€âÀ¨âZ€
‰€âöl݀
‰€‚ÿA virtual page that is in physical memory and immediately available. See also invalid page and page.1åËÂÌ1™ÿÿÿÿÿÿÿÿ-ÿÿÿÿÂÌ*Í-‘ÌïÌ' € €˜ŒR˜€
‚ÿVDM;ÂÌ*Í% €,€°˜€‚ÿVirtual DOS Machine1ïÌ[Í1bÿÿÿÿÿÿÿÿ.ÿÿÿÿ[ÍŒÎ.*͉Í' €€˜ŒR˜€
‚ÿviewÅ[ÍŒÎ> J€‹€°˜€ o!€
‰€âŽêÎ%€
‰€‚ÿThe portion of a section object that a process maps into its virtual address space. A process can map multiple, and even overlapping, views of a section. See also map and section object.1‰Í½Î1Zÿÿÿÿÿÿÿÿ/ÿÿÿÿ½Î ?ŒÎüÎ' €0€˜ŒR˜€
‚ÿvirtual address space긽Î 2 2€q€°˜€âÂ/5à€
‰€‚ÿThe set of addresses available for a process's threads to use. In Windows NT, every process has a unique virtual address space of 232 bytes (4 GB). See also virtual memory (VM).üÎ ŒÎ1üÎ=1ÿÿÿÿÿÿÿÿ0ÿÿÿÿ=9 v' €$€˜ŒR˜€
‚ÿvirtual circuit©ƒ=& €€°˜€‚ÿA virtual communication channel between two machines. Multiple network sessions are multiplexed across a single virtual circuit.1vP1vÿÿÿÿÿÿÿÿ1ÿÿÿÿP•C“' €8€˜ŒR˜€
‚ÿvirtual DOS machine (VDM)ÄP•> J€‰€°˜€âeÖ¿À€
‰€â¸g(—€
‰€‚ÿA protected subsystem that supplies a complete MS-DOS environment and a console in which to run an MS-DOS-based application. Any number of VDMs can run simultaneously. See also console.1“Æ1jÿÿÿÿÿÿÿÿ2ÿÿÿÿÆÿ6•ü' €€˜ŒR˜€
‚ÿvirtual fileÑÆÿ2 2€£€°˜€âAfQJ€
‰€‚ÿAny source or destination for I/O that is accessed like a file. In the Windows NT executive, all I/O is performed on virtual files, which are represented by file objects and accessed using file handles.1ü01(ÿÿÿÿÿÿÿÿ3ÿÿÿÿ0'=ÿm' €,€˜ŒR˜€
‚ÿvirtual memory (VM)ºˆ0'2 2€€°˜€â:eÈê€
‰€‚ÿA logical view of memory that does not necessarily correspond to memory's physical structure. See also virtual memory management.1mX1>ÿÿÿÿÿÿÿÿ4ÿÿÿÿXeC'›' €8€˜ŒR˜€
‚ÿvirtual memory managementÊ€XeJ b€€°˜€âÂ/5à€
‰€ o!€
‰€âË~x€
‰€‚ÿA memory management system that provides a large address space to each process by mapping the process's virtual addresses onto physical addresses as the process's threads use them. When physical memory becomes full, it swaps selected memory contents to disk, reloading them from disk on demand. Virtual memory management allows programmers to create and run programs that use more memory than is physically present on their computers. Because the placement of data in memory is controlled by the virtual memory (VM) system, each process's address space can be separated and protected from the others. See also map and paging.1›–1õÿÿÿÿÿÿÿÿ5ÿÿÿÿ–Z EeÛ' €<€˜ŒR˜€
‚ÿvirtual memory (VM) managerN–Z 1 2€œ€°˜€âÂ/5à€
‰€‚ÿThe Windows NT executive component that implements virtual memory (VM).1Û‹ 1“ÿÿÿÿÿÿÿÿ6ÿÿÿÿ‹ í ,Z · ' €
€˜ŒR˜€
‚ÿVM6‹ í % €"€°˜€‚ÿVirtual Memory1· 
1´ÿÿÿÿÿÿÿÿ7ÿÿÿÿ
¡ 3 í Q
' €€˜ŒR˜€
‚ÿWin32 APIP*
¡ & €U€°˜€‚ÿA 32-bit application programming interface for both MS-DOS/ Windows and Windows NT. It updates earlier versions of the Windows application programming interface (API) with sophisticated operating system capabilities, security, and API routines for displaying text-based applications in a window.1Q
Ò 1Lÿÿÿÿÿÿÿÿ8ÿÿÿÿÒ í
4
¡  ' €€˜ŒR˜€
‚ÿWindows NTçµÒ í
2 2€k€°˜€âeÖ¿À€
‰€‚ÿThe high-end Windows operating system in a family of Windows operating systems. Along with Pen Windows and 16-bit Windows, this system allows Windows-based applications to run on computers ranging from the smallest notebooks to large multiprocessor workstations and server machines. Windows NT also runs MS-DOS, POSIX, and OS/2 applications by employing user-mode servers called protected subsystems. See also protected subsystem.1 1jÿÿÿÿÿÿÿÿ9ÿÿÿÿW@í
^' €2€˜ŒR˜€
‚ÿWindows on Win32 (WOW)ùÇW2 2€€°˜€âeÖ¿À€
‰€‚ÿA protected subsystem that runs within a virtual DOS machine (VDM) process. It provides a 16-bit Windows environment capable of running any number of 16-bit Windows applications on Windows NT.1^ˆ1êÿÿÿÿÿÿÿÿ:ÿÿÿÿˆM@5W½' €€˜ŒR˜€
‚ÿworking set„_ˆM@% €¾€°˜€‚ÿThe set of virtual pages that½M@W are in physical memory at any moment for a particular process.1½~@16ÿÿÿÿÿÿÿÿ;ÿÿÿÿ~@ƒA=M@»@' €,€˜ŒR˜€
‚ÿworkstation serviceȊ~@ƒA> J€€°˜€âžZầ
‰€âZ‰’ï€
‰€‚ÿA network service that supplies user-mode application programming interface (API) routines to manage the Windows NT redirector.1»@´A1–ÿÿÿÿÿÿÿÿ<ÿÿÿÿ´AB-ƒAáA' € €˜ŒR˜€
‚ÿWOW8´AB% €&€˜˜€‚ÿWindows on Win321áAJB1¾ÿÿÿÿÿÿÿÿ=ÿÿÿÿJB×B+BuB' €€˜ŒR˜€
‚ÿXb=JB×B% €z€°˜€‚ÿThere are no glossary entries beginning with the letter X.1uBC1¾ÿÿÿÿÿÿÿÿ>ÿÿÿÿC•C+×B3C' €€˜ŒR˜€
‚ÿYb=C•C% €z€°˜€‚ÿThere are no glossary entries beginning with the letter Y.13CÆC1¾ÿÿÿÿÿÿÿÿ?ÿÿÿÿÆCSD+•CñC' €€˜ŒR˜€
‚ÿZb=ÆCSD% €z€°˜€‚ÿThere are no glossary entries beginning with the letter Z.1ñC„D1…ÿÿÿÿÿÿÿÿ@ÿÿÿÿ„DØE0 SD´D' €€˜ŒR˜€
‚ÿDomain$þ„DØE& €ý€°˜€‚ÿA group of servers that share a common database of users and group accounts and security policy guidelines. You need to type in account information for a user only once for all the servers in the domain to recognize the account and allow access to it.F´DF1eÿÿÿÿ&†6AF\FJHow to Use This Guide>ØE\F& €0€°°˜€‚ÿHow to Use This Guide¾—FG' €/€°˜˜€‚ÿThis guide is intended to help you evaluate your advanced operating system needs, and to explain how Windows NT can fit into your enterprise goals. Ò¬\FìH& €Y€˜˜€‚ÿTo make this kit useful to the greatest number of people, we have included a large amount of information. Using the mouse, you can take a multilevel tour of the Windows NT operating system, extracting only the information that you want, whether it be a broad overview or a detailed technical analysis of a particular feature. We hope that this guide is a helpful tool for learning about Windows NT and how it can benefit you.#ýGJ& €û€°’€‚ÿIf at any time you want more information about green highlighted text, a click with the mouse will provide more detail. Also, be aware that charts and graphs often contain another layer of detail which can be accessed by clicking on specified areas. KìHJ6 <€–€˜’‚™‡ãôåé€0‰‚ã^êbЉ‚ÿHow to Navigate through the Guide: Using HelpCustomizing this GuideY(JéJ1Sƒ‚6ˆ6BéJ4KVMHow to Use the Information in this GuideK$J4K' €H€˜Œà˜€‚ÿHow to Navigate Through the Guide¡zéJÕL' €õ€°°˜€‚ÿYour tour through the Windows NT Evaluation Guide can be general, detailed, or a combination of the two, depending on how you manipulate the information on the screen. Because everybody has different reading patterns, Help gives you several ways to navigate through the text: Click on one of the topics below or use the TAB button and press ENTER to see more information on:C4KVM> L€†€˜©€‚™‡ã—€0‰‚⺲J8‰‚ã¿[ÐՉ‚ÿChoosing Help TopicsIcons and GraphicsUsing Help ButtonsEÕL›M1¦&†6v7C›MÙMƒChoosing Help Topics>VMÙM' €.€˜ŒR˜€‚ÿChoosing Help TopicsI"›M"O' €E€°°˜€‚ÿHelp topics can include graphics and text that link to other Help topics or to more information about the current topic. These are called jumps. Jumps are usually colored green and underlined (unless the jump is a graphic). When you point to a jump, the pointer changes to a hand shape. ;ÙM]O' €(€˜€1€‚ÿTo Choose a JumpxF"OÕO2 4€Œ€R˜ñ€„ð9€€
ƒ€‚ÿ·Point to the text or graphic, and click with the mouse button. ±{]O’€6 <€ö€V˜°ñ€„ð9€€ÕO’€VMƒ€
€‚ÿ·Or press TAB to select the jump, and then press ENTER. You can press SHIFT+TAB to move backward and select a jump. &ÕO¸& €€°˜€‚ÿIf the jump you choose is linked to another topic, that topic appears in the Help window. Sometimes a jump is linked to information that appears in a pop-up window. Pop-up windows contain brief explanations of topics, glossary definitions, and examples.C’€û' €8€˜€1€‚ÿTo Close a Pop-Up Windowf6¸a‚0 0€l€V˜°ñ€„ð9€€ƒ‚ÿ·Click anywhere on the screen, or press any key. O%û°‚* $€J€˜‚á€1€‚ÿTo Go Back to the Previous Screenn<a‚ƒ2 4€x€R˜ñ€„ð9€€
ƒ€‚ÿ·Click on the "Back" button at the top of your screen.C°‚aƒ1TÿÿÿÿÿÿÿÿDÿÿÿÿaƒr…Icons and Graphics<ƒƒ' €*€ČR˜€‚ÿIcons and GraphicsÕ®aƒr…' €]€°°˜€‚ÿMost of the icons in this guide have information underneath them (i.e. they are "hot"), which you can access by clicking on the icon itself. An example of a "hot" icon would be any icon in the main menu. Similarly, some of the diagrams and graphs in this guide have "hot" spots, which will yield details and explanations when you click on them. An example of this can be found within the topic called "Windows NT Architecture".Cƒµ…1a
ˆ6€7Eµ…ñ…-ÀUsing Help Buttons<r…ñ…' €*€˜ŒR˜€‚ÿUsing Help Buttonsݵ…õ†' €»€°°˜€‚ÿHelp buttons are located along the top of the Help window and enable you to move around easily in Help. If a feature is not available, its button name is dimmed. Below is a list of the Help buttons and their functions:hñ…]‡N#l€4 ¼  €€°˜€€‚ÿ €€°˜€2€‚ÿÿÿ[Button][Function]Rõ†ú‡K#f€¤ ¼  €€°˜€€‚ÿ€€°˜€3‚ÿÿÿContentsJumps to the main menu. Pressing the spacebar has the same effect. öª]‡ðˆL#f€U ¼  €€°˜€€‚ÿ€€°˜€3‚ÿÿÿSearchLists all the words you can use to search for topics in the Guide. By typing or selecting one of these words, you can search for and go to a specific topic. Àuú‡°‰K#f€ê ¼  €€°˜€€‚ÿ€€°˜€3‚ÿÿÿBackDisplays the last topic you viewed. You move back one topic at a time in the order you viewed the topics. ñ¥ðˆ¡ŠL#f€K ¼  €€°˜€€‚ÿ€€°˜€3‚ÿÿÿHistoryDisplays the last 40 topics you have viewed in the Windows session. The most recent topic viewed is listed first. To revisit a topic, double-click it. ŽC°‰/‹K#f€† ¼  €€°˜€€‚ÿ€€°˜€3‚ÿÿÿGlossaryA complete glossary of terms relating to Windows NT.´¡Š/ŒL#f€i ¼  €€°˜€€‚ÿ€€°˜€3‚ÿÿÿ|<<Jumps to the top of the subject that you are currently viewing. This is helpful when you jump to another subject for reference and wish to return to your original subjectÎ/‹FI#`€ ¼ €€°˜€‚ÿ€ €°˜€3‚ÿÿÿ>>|Recommended Next Subject. Recognizing that there is an extensive amount of material we included this function to suggest two to three subjects you may wish to view after completing a given subject.Nü/Œ”ŽR#r€ù ¼ €€°˜€‚ÿ,€€°˜€2€3€2€3‚ÿÿÿ<< or >>Browse Buttons. These buttons will jump to the next screen within a given subject. They facilitate the quick viewing of any subject. Note However, they do not include the popup descriptions or definitions that may exist in any subject.}2FK#f€d ¼ €€°˜€‚ÿ €€°˜€3€2‚ÿÿÿSpacebarReturn to the main contents screen.C”ŽT( €6€°˜€1€‚ÿTo choose a Help buttonU&©/ .€L€R˜ñ€„ð9€€ƒ‚ÿ·Click the Help button you want. xBT-À6 <€„€V˜°ñ€„ð9€€ƒ€
€‚ÿ·Or type the letter that is ©-Àr…underlined in the Help button. G©tÀ1Åv7ÿÿÿÿFtÀ³ÀGÂCustomizing this Guide?-À³À' €0€˜ŒR˜€‚ÿCustomizing the GuideðtÀÊÁ' €á€°°˜€‚ÿWhile you are reading through the Guide, you may want to mark, copy, or print parts of it for future reference. To help you do this, Help provides tools for marking and copying within the Guide, so that you can customize it to your needs}2³ÀGÂK f€d€˜©€‚™‡⃬Í€0‰‚â™™ÿ‰€4‚âóû§r€0‰‚â–‚*‰‚ÿBookmarksAnnotationCopyingPrinting: ÊÁÂ1øÿÿÿÿÿÿÿÿGÿÿÿÿÂ?ÆBookmarks3 G´Â' €€ČR˜€‚ÿBookmarks‡bÂ;Ã% €Ä€°˜€‚ÿYou can mark text in the Guide by placing "bookmarks" in front of subtopics that interest you. >´ÂyÃ' €.€˜€1€‚ÿTo Place a Bookmarkä;ÍÄ0 .€É€R˜ñ€„ð9€€ƒ‚ÿ·Choose "Bookmark" from the pull-down menu at the top of your screen, and select "Define". You will see the title of your selected subtopic highlighted in the dialogue box, along with a list of previously placed bookmarks. W'yÃäÄ0 0€N€V˜°ñ€„ð9€€ƒ‚ÿ·Choose OK to place the bookmark. }XÄaÅ% €°€°˜€‚ÿTo return to that subtopic, choose "Bookmark" and select it from the pull-down menu. ?äÄ Å' €0€˜€1€‚ÿTo Delete a BookmarkŸoaÅ?Æ0 0€Þ€R˜ñ€„ð9€€ƒ‚‚ÿ·Choose "Bookmark", and then choose "Define". Select the bookmark you wish to remove, and click "Delete".;
 ÅzÆ1¦ÿÿÿÿÿÿÿÿHÿÿÿÿzÆåÉAnnotation4
?Æ®Æ' €€ČR˜€‚ÿAnnotationuPzÆ#Ç% € €°˜€‚ÿYou can add notes of your own to the Guide by using the "Annotate" function. >®ÆaÇ' €.€˜€1€‚ÿTo Annotate a Topic’c#ÇóÇ/ .€Æ€R˜ñ€„ð9€€ƒ‚ÿ·Choose "Edit" from the pull-down menu at the top of your screen, and then choose "Annotate". maǐÈ0 0€Ú€V˜°ñ€„ð9€€ƒ‚ÿ·In the dialogue box, type in your note, and then click the "Save" button to put it into the help file. ™tóÇ)É% €è€°˜€‚ÿA green paper clip will appear next to the first line of text. To view your notes, just click on the paper clip. BÈkÉ' €6€˜€1€‚ÿTo Remove an AnnotationzJ)ÉåÉ0 0€”€R˜ñ€„ð9€€ƒ‚‚ÿ·Choose "Annotate" from the Edit menu, and click the delete button. 8kÉÊ1”ÿÿÿÿÿÿÿÿIÿÿÿÿÊyÌCopying1
åÉNÊ' €€ČR˜€‚ÿCopyingkFʹÊ% €Œ€°˜€‚ÿYou can copy text out of the Guide and paste it into another file. @NÊùÊ' €2€˜€1€‚ÿTo Copy Selected Textê¹¹ÊãË1 0€s€V˜°ñ€„ð9€€ƒ‚ÿ·Choose Edit from the pull-down menu and select "Copy". A dialogue box will appear, with the text from that screen. Highlight the text to be copied and click on the "Copy" button. –qùÊyÌ% €â€°˜€‚ÿThis will copy the selected text and place it on the clipboard, after which you can paste it into a new file. 9ã˲Ì1€ÿÿÿÿÿÿÿÿJÿÿÿÿ²ÌùÎPrinting2 yÌäÌ' €€ČR˜€‚ÿPrintingë²ÌõÍ& €×€°˜€‚ÿYou can print any topic from this Guide. A topic prints on the default printer, but if you have installed more than one printer, you can make any of them the default printer. You can also change the options for the default printer. ;äÌ0Î' €(€˜€1€‚ÿTo Print a Topic¡kõÍÑÎ6 <€Ö€V˜°ñ€„ð9€€ƒ€
€‚ÿ·Go to the topic that you want to print, choose "File" from the pull-down menu, and select "Print". (0ÎùÎ% €€°˜€‚ÿf5ÑÎ_Ï13ÿÿÿÿÿÿÿÿK_ÏÉϺÂMicrosoft Solution Providers - international coveragejFùÎÉÏ$ €Œ€°€‚ÿMicrosoft Solution Providers for Windows NT - International SupportE _Ï% €@€°Œ€‚ÿACCELERATED COMPUÉÏùÎTER TRAININGxSÉÏ’% €¦€€‚‚‚ÿ3255 WILSHIRE BLVD, SUITE 903LOS ANGELES, CA 90010-1413Telephone: 213-388-0551G"Ù% €D€°Œ€‚ÿACCOUNTING CONTROL TECHNOLOGIESyT’R% €¨€€‚‚‚ÿ661 MIDDLE NECK RD, PO BOX 4020GREAT NECK, NY 11023-1216Telephone: 212-631-1052;ٍ% €,€°Œ€‚ÿADAPTIVE STRATEGIES\R% €¸€€‚‚‚ÿ200 LAKE DR E STE 101, LAKE DR STE 206CHERRY HILL, NJ 08002-1171Telephone: 609-256-0329H#V% €F€°Œ€‚ÿADVANCED MEDICAL INFO TECH, INC.xSÎ% €¦€€‚‚‚ÿ1891 N GAFFEY STREET, SUITE 230SAN PEDRO, CA 90731-1270Telephone: 310-521-05209V% €(€°Œ€‚ÿAGENA CORPORATIONfAÎm% €‚€€‚‚‚ÿ9709 3RD AVE NESEATTLE, WA 98115-2027Telephone: 206-547-52284¡% €€°Œ€‚ÿALLERION INCmHm% €€€‚‚‚ÿ717 RIDGEDALE AVEEAST HANOVER, NJ 07936-3125Telephone: 201-887-10003¡A% €€°Œ€‚ÿANDREW CORPgB¨% €„€€‚‚‚ÿ19021 120 AVE NEBOTHELL, WA 98011-9505Telephone: 206-485-8200AAé% €8€°Œ€‚ÿAPPLIED COMPUTER SERVICESmH¨V% €€€‚‚‚ÿ15511 S 70TH COURTORLAND PARK, IL 60462-5105Telephone: 708-614-4900F!éœ% €B€°Œ€‚ÿAT&T NCR FEDERAL SYSTEMS DIVISkFV% €Œ€€‚‚‚ÿ2301 RESEARCH BLVDROCKVILLE, MD 20850-3204Telephone: 301-258-4102O*œV% €T€°Œ€‚ÿAUTOMATION PARTNERS INTERNATIONAL, INC.mHÃ% €€€‚‚‚ÿ227 W MONROE, STE 3500CHICAGO, IL 60606-5016Telephone: 312-578-89006Vù% €"€°Œ€‚ÿBASE ONE, INC.|WÃu% €®€€‚‚‚ÿ8220 STATE ROAD 84, SUITE 200FORT LAUDERDALE, FL 33324-4625Telephone: 305-472-4077F!ù»% €B€°Œ€‚ÿBUSINESS INFORMATION TECHNOLOGnIu)% €’€€‚‚‚ÿ1800 SUTTER ST, STE 770CONCORD, CA 94520-2562Telephone: 510-671-0595N)»w% €R€°Œ€‚ÿCOMMUNICATIONS TECHNOLOGY FOR BUSINESSfA)Ý% €‚€€‚‚‚ÿ24 WAMPUM RDPARK RIDGE, NJ 07656-2152Telephone: 201-573-0682K&w( % €L€°Œ€‚ÿCOMPUTER RESOURCES & TRAINING, INC.wRÝŸ % €¤€€‚‚‚ÿONE PENN CENTER, SUITE 1690PHILADELPHIA, PA 19103-1816Telephone: 215-569-9100?( Þ % €4€°Œ€‚ÿCOMPUTER TASK GROUP INCc>Ÿ A
% €|€€‚‚‚ÿ246 MARKET STLOWELL, MA 01852-1849Telephone: 508-934-8939<Þ }
% €.€°Œ€‚ÿCOMPUTER TRAINING COmHA

% €€€‚‚‚ÿ506 HILLSBORO DRSILVER SPRING, MD 20902-3131Telephone: 301-593-2212C}
- % €<€°Œ€‚ÿCOROMANDEL INDUSTRIES, INC.tOê
¡ % €ž€€‚‚‚ÿ70-15 AUSTIN STREET, FLOOR 3FLUSHING, NY 11375-4722Telephone: 718-793-7963>- ß % €2€°Œ€‚ÿCORPORATE SOFTWARE INC`;¡ ? % €v€€‚‚‚ÿ275 DAN RDCANTON, MA 02021-2826Telephone: 617-821-4500+ß j % € €°Œ€‚ÿCWCsN? Ý % €œ€€‚‚‚ÿ1983 PREMIER DR, PO BOX 4459MANKATO, MN 56002-4459Telephone: 507-388-5000;j 
% €,€°Œ€‚ÿDATA-TECH INSTITUTEgBÝ 
% €„€€‚‚‚ÿ429 GETTY AVENUECLIFTON, NJ 07011-2123Telephone: 201-478-27006

% €"€°Œ€‚ÿDATAFOCUS INC.yT
.% €¨€€‚‚‚ÿ12450 FAIR LAKES CIRCLE, SUITE 400FAIRFAX, VA 22033-3810Telephone: 703-631-67707µ
e% €$€°Œ€‚ÿDATAWIZ CENTERSzU.ß% €ª€€‚‚‚ÿ1500 FASHION ISLAND BLVD, STE 209SAN MATEO, CA 94404-1556Telephone: 415-571-1300+e
% € €°Œ€‚ÿDGSd?ßn% €~€€‚‚‚ÿ4 PINE W PLAZAALBANY, NY 12205-5515Telephone: 518-869-1305E
³% €@€°Œ€‚ÿDIGITAL SYSTEMS INTERNATIONALhCn'@% €†€€‚‚‚ÿ6464 185TH AVE NEREDMOND, WA 98052-673³'@ùÎ6Telephone: 206-556-8084S.³z@% €\€°Œ€‚ÿDISTRIBUTION ARCHITECTS INTERNATIONAL, INC.fA'@à@% €‚€€‚‚‚ÿ905 E WESTCHESTERTEMPE, AZ 85283-3000Telephone: 602-897-9576F!z@&A% €B€°Œ€‚ÿDIVERGENT TECHNOLOGIES LIMITEDd?à@ŠA% €~€€‚‚‚ÿ6425 PENNY RDRALEIGH, NC 27606-9049Telephone: 919-821-1866=&AÇA% €0€°Œ€‚ÿEXCEL LEARNING CENTERoJŠA6B% €”€€‚‚‚ÿ2355 TAPO ST, UNIT 2SIMI VALLEY, CA 93063-3011Telephone: 805-584-6222CÇAyB% €<€°Œ€‚ÿEXECUTRAIN OF WASHINGTON DCzU6BóB% €ª€€‚‚‚ÿ1593 SPRING HILL RD STE 610, STE 220VIENNA, VA 22182-2245Telephone: 703-506-9800F!yB9C% €B€°Œ€‚ÿFOURTH WAVE TECHNOLOGIES, INC.mHóB¦C% €€€‚‚‚ÿ560 KIRTS BLVD, SUITE 105TROY, MI 48084-4141Telephone: 313-362-2288@9CæC% €6€°Œ€‚ÿFULTON COMPUTER PRODUCTSnI¦CTD% €’€€‚‚‚ÿ212 MERRICK RDROCKVILLE CENTRE, NY 11570-5748Telephone: 516-764-2822<æCD% €.€°Œ€‚ÿGILBERT & ASSOCIATES{VTD E% €¬€€‚‚‚ÿ875 VIA DE LA PAZ, SUITE HPACIFIC PALISADES, CA 90272-3618Telephone: 310-454-7679<DGE% €.€°Œ€‚ÿGILBERT & ASSOCIATESoJ E¶E% €”€€‚‚‚ÿ1205 SECOND AVE, STE 200SEATTLE, WA 98101-2959Telephone: 206-583-8989;GEñE% €,€°Œ€‚ÿGLOBAL CONCEPTS INCpK¶EaF% €–€€‚‚‚ÿ4711 SW HUBERT ST STE 6EPORTLAND, OR 97219-6862Telephone: 503-768-47408ñE™F% €&€°Œ€‚ÿGREGORY COOLEDGEd?aFýF% €~€€‚‚‚ÿ314 10TH AVEKIRKLAND, WA 98033-5520Telephone: 206-822-7355,™F)G% €€°Œ€‚ÿHFSIgBýFG% €„€€‚‚‚ÿ7900 WESTPARK DRMC LEAN, VA 22102-4203Telephone: 703-827-3384B)GÒG% €:€°Œ€‚ÿHILTON COMPUTER STRATEGIESjEG ÒGkH% €€°Œ€‚ÿHTR INCwR8OÝO% €2€°Œ€‚ÿMARGOLIN WINER & EVENSyTŸOb€% €¨€€‚‚ÝOb€ù΂ÿ400 GARDEN CITY PLAZA, STE 210GARDEN CITY, NY 11530-3336Telephone: 516-747-6665DÝO¦€% €>€°Œ€‚ÿMCCLURE CONSULTANTS LIMITEDiDb€% €ˆ€€‚‚‚ÿ135 PARK AVENUEBARRINGTON, IL 60010-4354Telephone: 708-382-6233=¦€L% €0€°Œ€‚ÿMICRO ENDEAVORS, INC.pK¼% €–€€‚‚‚ÿ8001 LANSDOWNE AVENUEUPPER DARBY, PA 19082-5407Telephone: 215-449-4680:Lö% €*€°Œ€‚ÿMICROBANK SOFTWAREgB¼]‚% €„€€‚‚‚ÿ80 BROAD STREETNEW YORK, NY 10004-2209Telephone: 212-363-5600E ö¢‚% €@€°Œ€‚ÿMICROCOMPUTER RESOURCES, INC.}X]‚ƒ% €°€€‚‚‚ÿ6499 POWERLINE ROAD, SUITE 205FORT LAUDERDALE, FL 33309-2044Telephone: 305-776-4900?¢‚^ƒ% €4€°Œ€‚ÿNETBASE COMPUTING, INC.rMƒЃ% €š€€‚‚‚ÿ3625 DEL AMO BLVD, STE 220TORRANCE, CA 90503-1691Telephone: 310-214-8181C^ƒ„% €<€°Œ€‚ÿNETWORK COMPATIBILITY GROUPwRЃŠ„% €¤€€‚‚‚ÿ130 E WILSON BRIDGE RD, STE 100COLUMBUS, OH 43085-2327Telephone: 614-436-29629„Ä% €(€°Œ€‚ÿPC ETCETERA, INC.sNŠ„6…% €œ€€‚‚‚ÿ690 MARKET ST, STE 205SAN FRANCISCO, CA 94104-5103Telephone: 415-291-8585E Ä{…% €@€°Œ€‚ÿPLATINUM SOFTWARE CORPORATIONnI6…é…% €’€€‚‚‚ÿ15615 ALTON PKY, STE 300IRVINE, CA 92718-3307Telephone: 714-727-12509{…"†% €(€°Œ€‚ÿPRISM GROUP, INC.yTé…›†% €¨€€‚‚‚ÿ10131 COORS ROAD NW, SUITE 520ALBUQUERQUE, NM 87114-4045Telephone: 505-897-7800H#"†ã†% €F€°Œ€‚ÿPRODUCTIVITY POINT INTERNATIONALŠe›†m‡% €Ê€€‚‚‚ÿCORPORATE OFFICE FOR 53 CITIES, 15 SALT CREEK LANEHINSDALE, IL 60521-2926Telephone: 708-920-0980E ㆲ‡% €@€°Œ€‚ÿRDI SOFTWARE TECHNOLOGIES INCkFm‡ˆ% €Œ€€‚‚‚ÿ1400 E TOUHY AVEDES PLAINES, IL 60018-3305Telephone: 708-294-0300D²‡aˆ% €>€°Œ€‚ÿSEQUENT COMPUTER SYSTEM, INCvQˆ׈% €¢€€‚‚‚ÿ15450 SW KOLL PKWY M/S C2-844BEAVERTON, OR 97006-6024Telephone: 503-578-3897E aˆ‰% €@€°Œ€‚ÿSOLOMON SOFTWARE TECHNOLOGIESc>׈‰% €|€€‚‚‚ÿ20 HUNTERS LNNASHUA, NH 03063-2245Telephone: 603-595-9059/
‰®‰% €€°Œ€‚ÿSQLSOFT‹f‰9Š% €Ì€€‚‚‚ÿ10635 NE 38TH PL BLDG 24 STE B, BUIDLING 24 SUITE BKIRKLAND, WA 98033-7927Telephone: 206-822-12877®‰pŠ% €$€°Œ€‚ÿSRA CORPORATIONgB9Š׊% €„€€‚‚‚ÿ2000 15TH ST NARLINGTON, VA 22201-2627Telephone: 703-558-47003pŠ
‹% €€°Œ€‚ÿSYSNET CORPlG׊v‹% €Ž€€‚‚‚ÿ8000 TOWER CRESCENT DRVIENNA, VA 22182-2700Telephone: 703-273-0033R-
‹ȋ% €Z€°Œ€‚ÿTANGENT INTERNATIONAL COMPUTER CONSULTANTSkFv‹3Œ% €Œ€€‚‚‚ÿ30 BROAD ST, 44 FLRNEW YORK, NY 10004-2304Telephone: 212-809-82009ȋlŒ% €(€°Œ€‚ÿTHE CIMTECH GROUPgB3Œӌ% €„€€‚‚‚ÿPO BOX 10155CASA GRANDE, AZ 85230-0155Telephone: 602-421-2285:lŒ
% €*€°Œ€‚ÿTHE COMPUTER GROUPjEӌw% €Š€€‚‚‚ÿ1230 ST ANDREWS RDCOLUMBIA, SC 29210-5822Telephone: 803-798-34245
¬% € €°Œ€‚ÿTIMELINE, INCrMwŽ% €š€€‚‚‚ÿ3055 112TH AVE NE, STE 106BELLEVUE, WA 98004-2067Telephone: 206-822-3140@¬^Ž% €6€°Œ€‚ÿTRIWARE NETWORLD SYSTEMSjEŽȎ% €Š€€‚‚‚ÿ1554 LA PRADERA DRCAMPBELL, CA 95008-1547Telephone: 408-554-28286^ŽþŽ% €"€°Œ€‚ÿUNGERMANN-BASSnIȎl% €’€€‚‚‚ÿ3900 FREEDOM CIRCLESANTA CLARA, CA 95054-1204Telephone: 408-562-5516K&þŽ·% €L€°Œ€‚ÿUNITED INFORMATION TECHNOLOGIES INCxSl;À% €¦€€‚‚‚ÿ350 S MAIN ST STE 303, STE 303DOYL·;ÀùÎESTOWN, PA 18901-4874Telephone: 215-340-93007·rÀ% €$€°Œ€‚ÿWALL DATA, INC.gB;ÀÙÀ% €„€€‚‚‚ÿ17769 NE 78TH PLREDMOND, WA 98052-4962Telephone: 206-883-47779rÀÁ% €(€°Œ€‚ÿWANG LABORATORIESnIÙÀ€Á% €’€€‚‚‚ÿ7500 OLD GEORGETOWN RDBETHESDA, MD 20814-6133Telephone: 301-657-5000:ÁºÁ% €*€°Œ€‚ÿWJM COMPUTER SALESjE€Á$Â% €Š€€‚‚‚ÿ510 E FORT LOWELL RDTUCSON, AZ 85705-3965Telephone: 602-792-42205ºÁYÂ% € €°Œ€‚ÿWORLDATA CORPa<$ºÂ% €x€€‚‚‚ÿ563 MAIN STBOLTON, MA 01740-1300Telephone: 508-779-8383·†YÂqÃ1ïÿÿÿÿ­ :LqÃÂÀÆWindows NT and Microsoft LAN ManagerEB("btn_topic_index");SaveMark("topic_index"); CBB("btn_Next_index", "PI(`nteval.hlp',`next_7')")Q(ºÂÂÃ) "€P€°°˜€€-‚ÿWindows NT and Microsoft LAN ManagerõÃq÷Å2 2€‡€°˜€€€€ €‚ÿIf you currently have a Microsoft® LAN Manager™ network, integrating with the Microsoft Windows NT operating system and upgrading to Windows NT Advanced Server are both reasonably simple, with worthwhile benefits. Windows NT integrates seamlessly with LAN Manager, letting you move at your own pace; Windows NT Advanced Server reduces network administration and increases the capacity and fault tolerance capabilities of your Domain Controller.ɀÂÀÆI `€€˜˜ãõ7…ü€
‰€‚ã(€
‰€‚ãèó/€
‰€‚ÿIntegrating Windows NT with LAN ManagerWhy Upgrade?How to Upgrade from LAN Manager to Windows NT Advanced Servera0·ÅáÆ1¥ÿÿÿÿÿÿÿÿMáÆ9Ç­ÎIntegrating Windows NT and Microsoft LAN ManagerX.€Æ9Ç* $€\€˜ŒR˜€€‚ÿIntegrating Windows NT with MS LAN Managerñ¾áÆ*È3 4€}€°°˜€⶟ëe€
‰€‚ÿDepending on your requirements, there are several ways to incorporate a Windows NT client or server into a LAN Manager network domain. No additional software or licensing is required.<9ÇfÈ% €.€°˜€‚ÿIntegration Options:M#*ȳÈ* $€F€ČR˜€€‚ÿAdding a Windows NT Workstation³fÈfÊ& €€°˜€‚ÿTo make a Windows NT workstation a member of the LAN Manager domain, you can add it to the LAN Manager user account, as you would another LAN Manager user. You can then set up permission on the Windows NT workstation to help other clients within the LAN Manager domain share resources, such as printers, CD ROMs, and folders. This permission exists independently of domain administration rules.H³È®Ê* $€<€ČR˜€€‚ÿAdding a Windows NT ServerÁ›fÊoÌ& €7€°˜€‚ÿYou can access the new Windows NT server in the same straightforward that way you access your LAN Manager servers, letting you test the power of Windows NT without making changes to your existing infrastructure, and set benchmarks against other server operating systems. A Windows for Workgroups client, for instance, can access other types of servers such as NetWare, LAN Server, LAN Manager, or Windows NT.O%®Ê¾Ì* $€J€ČR˜€€‚ÿAdding Windows NT Advanced ServerïÉoÌ­Î& €“€°˜€‚ÿThe power and portability of Windows NT Advanced Server, combined with its intuitive administration model, makes it an excellent application server. Demonstrate this by adding it to a small department server in which Advanced Server is the primary domain controller, with knowledge of all user accounts. You will quickly experience the advantage of using its built-in monitoring and administrative functions to centrally manage both clients and servers. i8¾ÌÏ1¾„:N‡:NÏ€ÏîUpgrading From LAN Manager to Windows NT Advanced ServerjA­Î€Ï) "€‚€˜Œ˜€€‚ÿHow to Upgrade from LAN Manager to Windows NT Advanced ServerÛ´Ïg' €i€˜˜˜€‚ÿWindows NT Advanced Servers and LAN Manager servers can coexist and share resources in t€Ïg­Îhe same domain or network, allowing you to upgrade your network as your schedule permits.Z(€ÏÁ2 2€Q€˜˜€ã!çր
‰€‚ÿThe Windows NT Advanced Server Upgrade provides a complete set of automated, robust utilities, available for use from the command line, to intuitively walk you through the process and keep you informed. In addition, you can create batch files for customized work. List of upgrade utilitiesY5g$ €j€˜€‚ÿThe Windows NT Advanced Server Upgrade preserves: BÁ\/ .€&€R˜ñ€„ð9€
€ƒ‚ÿ·user accounts%Ɓ_ Œ€€Pñ€„ð9€
€ƒ‚€
€ƒ‚€
€ƒ‚€
€ƒ‚€
€ƒ‚€
€ƒ‚€
€ƒ‚ÿ·file and group permissions·logon scripts·shared directories·connections to shared resources·protocol settings that are applied globally·country codes·scheduled commandsS$\Ô/ .€H€T˜ñ€„ð9€
€ƒ‚ÿ·time source server designationó́Ç& €›€˜˜€‚ÿIn addition, the upgrade records settings for workstation, server, messenger, alerter, netlogon, replicator, Uninterruptible Power Supply, Remote Access Services, and Simple Network Management Protocol.¨‚Ôo& €€°˜€‚ÿThere are two types of upgrades and five domain implementations to consider in planning the move to Windows NT Advanced Server.DÇî; F€ˆ€˜˜ã1“åd€
‰€‚ãPÒH_€
‰€‚ÿThe two types of upgrades The five domain implementations],oK1ñÿÿÿÿÿÿÿÿOK¡a
Windows NT Advanced Server Upgrade UtilitiesV/î¡' €^€˜ŒR˜€‚ÿWindows NT Advanced Server Upgrade UtilitiesÀKa3 4€€R°ñ€„ð9€€
ƒ€‚ÿ·Backup Environment (Backenv) saves server configurations by scanning server configuration files and detecting hardware configurations.#Ï¡„ T v€Ÿ€R˜ñ€„ð9€€
ƒ€‚€€
ƒ€‚€€
ƒ€‚€€
ƒ€‚ÿ·Back AT (Backat) reads scheduled commands stored in the SCHED.LOG file and writes them to a batch file as a series of commands.·Hcopy copies files on the LAN Manager server to another server on the network.·Backacc backs up user accounts database including file permissions (includes Remote Access accounts).·ACL List (Acllist) records file permissions and other characteristics in a text file, which is checked by Aclcomp for discrepancies.WøaÛ _ Œ€ñ€R˜ñ€„ð9€€
ƒ€‚€€
ƒ€‚€€
ƒ€‚€€
ƒ€‚€€
ƒ€‚ÿ·Backup backs up data to a network share or tape using Sytos Plus.·Convert converts FAT, HPFS, HPFS 386 to NTFS without losing data.·PortUAS restores LAN Manager user account database and merges/converts it to the Windows NT Advanced Server security account database.·User Convert (Userconv) merges multiple domain user accounts and maps file security along with user account changes to achieve single network logon.·ACL Convert (Aclconv) restores file security and permissions.†=„ a
I `€{€R˜ñ€„ð9€€
ƒ€‚€€
ƒ€‚€€
ƒ€‚ÿ·Restore Environment (Restenv) restores server configurations, network services, and provides intelligent feedback.·ACL Compare (Aclcomp) compares file security and permissions of server before and after conversion and flags any changes.·Macintosh Conversion (Sfmconv) restores Macintosh file volumes.U$Û ¶
1XW9„:P¶

vELAN Manager: Upgrading to Windows NT6a

' €€˜ŒR˜€‚ÿWhy Upgrade?¯ˆ¶
›' €€˜˜˜€‚ÿIf you use LAN Manager for OS/2, Windows NT Advanced Server will introduce significant technological advances into your MIS solution.>ì
å@> J€€˜˜€ãRÙï#€
‰€ãIlG¸€
‰€‚ÿWindows NT Advanced Server is a powerful application, file, and print server that bypasses the system limitations imposed on LAN Manager by OS/2. In addition, the Windows NT Advanced Server Upgrade includes automated tools that help reduce disruptions to current network activity without co›å@a
mpromising the availability of network resources. Only the servers need to be upgraded--it is not necessary to change the networking software on each desktop. (For more information comparing Windows NT and OS/2)¥~›ŠC' €ý€˜˜€‚‚ÿWith Windows NT Advanced Server, management and administration overhead can be reduced in several ways. For example, users can access resources in multiple domains with a single user ID and password. Also, administrators can use its comprehensive set of administration and monitoring tools to better deploy resources and dramatically increase awareness of the system's organization and use.Windows NT Advanced Server adds advanced protocol support for environments such as NetWare, 32-bit TCP/IP, and DLC stacks, and supports RPC and SNMP for client-server integration with UNIX. It also includes Macintosh and Remote Access Services.ìŠå@vEb ’€€˜˜€⻍ÑF€
‰€âjšÛM€
‰€âÎ_
€€
‰€âš<>*€
‰€âµ~~C€
‰€‚ÿWindows NT Advanced Server comes with extensive fault tolerance features such as disk duplexing, disk mirroring and built-in backup. Its support of RAID 5 (disk striping with parity) and the Windows NT file systems gives you high availability and reliability. The underlying Windows NT operating system is fully 32-bit, with preemptive multitasking and memory protection.k:ŠCáE1®­ :Š9QáE7F´ILAN Manager - Powerful Application, File, and Print ServerV/vE7F' €^€˜ŒR˜€‚ÿPowerful Application, File, and Print Serverp1áE§G? L€c€°°˜€âÛÌo!€
‰€â•õì€
‰€‚ÿBecause Windows NT Advanced Server supports SMP and RISC systems, your organization can benefit from new, more cost-effective hardware, without changing important applications and development investments. Windows NT Advanced Server is able to address 4 GB of RAM and up to 17m TB of disk space.
æ7F´I' €Í€°˜€‚‚ÿWindows NT Advanced Server provides a comprehensive security model that can be adapted for your specific needs. The security system is powerful, takes little effort to implement, and is simple to administer.Windows NT Advanced Server supports both 32-bit Windows applications and 16-bit OS/2 applications, enabling them to run many of the older LAN Manager server applications while providing access to new, faster, and more powerful applications, such as SQL Server for Windows NT.@§GôI1DŠ9;RôI-JĀUpgrade Options9´I-J' €$€˜ŒR˜€‚ÿUpgrade Options“môIÀJ& €Ú€°˜˜€‚ÿThere are two methods of upgrading to Windows NT Advanced Server: a clone upgrade and an in-place upgrade.5 -JõK, &€€Œ˜€€
€‚ÿFor a clone upgrade, install Windows NT Advanced Server on a separate computer and transfer (clone) the LAN Manager server data and services from an existing server to the new Windows NT Advanced Server. This method is recommended for your evaluation, because:ÀŒÀJµL4 6€€TŒñ€†ðü9€€
ƒ€‚ÿ·It is useful for upgrades to Windows NT-compatible x86, Pentium, R4000 and R4400, DEC Alpha AXP systems, and multiprocessor machines.͜õK‚M1 0€9€V˜Œñ€„ð9€€ƒ‚ÿ·It preserves your source server in its original state. If you encounter problems with the upgrade, you can reinstate the source server on the network.͵L„N5 8€›€V˜˜ñ€†ðü9€€
ƒ€‚ÿ·Using a second computer is less disruptive to network operations. The source server can remain on-line during the upgrade process, and two separate networks can be maintained during your evaluation.4‚MĀ, &€€°˜€€
€‚ÿIf space permits, an in-place upgrade can be used to upgrade an existing LAN Manager server in place, on the same machine. This method preserves a dual-boot and dual-partition configuration with OS/2 while providing full access to Windows NT Advanced Server. If your source server does not have sufficient space, back up your files t„NĀ´Io a network server or tape, from which you can restore or archive at any time. Install Windows NT Advanced Server and restore the LAN Manager environment using the upgrade utilities.T#„N1‚N‡:ÿÿÿÿS[¬ƒLAN Manager - Planning Your UpgradeCĀ[* $€2€˜ŒR˜€€‚ÿPlanning Your UpgradeF¡‚6 :€!€°°˜€â@
{P€
‰€€
‚ÿThe addition of trust relationships provides a significant number of opportunities for setting up enterprise-wide domains. Although LAN Manager allows only simple domain-wide administration, Windows NT Advanced Server offers several flexible administration models: ¨[¬ƒc ”€Q€˜˜âÔ&9i€
‰€‚â¬:€
‰€‚ãàc‰'€
‰€‚⡨¸;€
‰€‚ââ„஀
‰€‚ÿSingle Domain ModelSeparate Domains Without Trust Relationships ModelMaster Domain ModelMultiple Master Domain ModelUsing Complete Trust ModelR!¡‚þƒ1yÿÿÿÿÿÿÿÿTÿÿÿÿþƒ%‡LAN Manager - Single Domain ModelA¬ƒ?„* $€.€ČR˜€€‚ÿSingle Domain ModelæÀþƒ%‡& €€°˜€‚ÿWhen the LAN Manager primary domain controller (PDC) is upgraded to Windows NT Advanced Server, all the users in the domain immediately benefit from the new functionality and resources on the network. The other servers in the domain can be a combination of different types, such as LAN Manager for OS/2 server, LAN Manager for UNIX systems, and Windows NT Advanced Servers. When LAN Manager servers and Windows NT Advanced Servers are in the same domain, users from the Windows NT Advanced Server domain can interoperate with the LAN Manager servers. If Windows NT Advanced Server is the primary domain controller and LAN Manager is the backup domain controller, both can provide logon authentication.q@?„–‡1 ÿÿÿÿÿÿÿÿUÿÿÿÿ–‡.ŠLAN Manager - Separate Domains Without Trust Relationships Model`6%‡ö‡* $€l€ČR˜€€‚ÿSeparate Domains Without Trust Relationships Model8–‡.Š& €%€°˜€‚ÿThis restrictive model closely mirrors LAN Manager domains, in which no domain trusts any other domain. It is possible to run both LAN Manager and Windows NT Advanced Server domains, giving Windows NT Advanced Server functions to at least one domain. However, this requires more administrative effort, because two user database accounts must be maintained. Users can still access resources from both domains with a single logon, but because the domains don't trust each other, user accounts must be established in both domains.R!ö‡€Š1sÿÿÿÿÿÿÿÿV€ŠÁŠÀLAN Manager - Master Domain ModelA.ŠÁŠ* $€.€˜ŒR˜€€‚ÿMaster Domain ModelS€ŠŒ> J€+€˜˜€â,k­€
‰€ât8 ‰€‚ÿWindows NT Advanced Server supports the concept of master domains, which enable single-network logon across an enterprise. The master domain is effective for small to medium networks that require centralized account control and scalability. A master domain provides:=õÁŠQH ^€ë€R˜‘€:„ð9€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚ÿ·Single user accounts for secure access to all corporate resources.·Centralized control of user accounts.·Control of resource permissions at the local administrative level.·One way trust relationships with other network domains.wQŒȎ& €£€˜˜€‚ÿBoth Windows NT Advanced Servers and LAN  Manager servers can provide logon authentication. When a master domain is in place, existing LAN Manager primary domain controllers can be upgraded to Windows NT Advanced Server domain controllers. Remaining Windows NT Advanced Servers or LAN Manager servers act as backup domain controllers.;QÀ, &€€°˜€
€€
‚ÿNote: For this model, a master domain must be created, using Windows NT Advanced Server. The primary domain controller from each LAN Manager domain must be upgraded, and trust relationships established with the master domain storing the master user account database.ȎÀ.Š[*ȎjÀ1(ÿÿÿÿÿÿÿÿWÿÿÿÿjÀ7ÃLAN Manager - Multiple Master Domain ModelJ À´À* $€@€ČR˜€€‚ÿMultiple Master Domain Modelƒ]jÀ7Ã& €»€°˜€‚ÿThis model is appropriate for larger organizations. It takes the benefits of the single master domain model one step further, using several Windows NT Advanced Server master domains. All master domains have trust relationships with each other. Other domains on the network trust each of the master domains, providing a single user logon from any domain in the enterprise. This model is a way to break very large user account databases into smaller, more manageable ones. It is highly scalable, supporting tens of thousands of users, and provides a great deal of flexibility for large, growing networks.Y(´ÀÃ1äÿÿÿÿÿÿÿÿXÿÿÿÿÃÆLAN Manager - Using Complete Trust ModelH7ÃØÃ* $€<€ČR˜€€‚ÿUsing Complete Trust ModelCÃÆ& €;€°˜€‚ÿIn this model, each domain is locally administered. The domain administrator sets up trust relationships with all other known domains. For security reasons, establishing this trust requires the assistance of the administrators from those domains. This model eliminates the need for central administration of user accounts and is very flexible. However, as the enterprise grows, it can become more difficult to manage. Although this model provides a single logon for users, it carries a higher administrative burden than the other options.1ØÃLÆ1\ÿÿÿÿÿÿÿÿYÿÿÿÿLÆwÆ+ÆwÆ( €€°˜‚-€‚ÿR!LÆÉÆ1@ÿÿÿÿU‡;ZÉÆÇ"ÊWindows NT Services for MacintoshJ$wÆÇ& €H€°°˜€‚ÿWindows NT Services for Macintoshî«ÉÆÉC T€W€°°˜€€ €€ €€ €€ €‚€‚ÿAn integral part of the Microsoft® Windows NT™ Advanced Server, the Windows NT™ Services for Macintosh® offer you excellent connectivity and integration between your Macintosh desktops and the Windows NT operating system. Not only do they preserve the unique and important elements of each environment, they also incorporate important new components, such as manageability and security. For Additional Information:!ËÇ"ÊV z€—€˜˜ãÇa’¥€
‰€‚ã.…¡€
‰€‚ãíÉDZ€
‰€‚ã,ñúa€
‰€‚ÿWhat are Windows NT Services for Macintosh?Windows NT Services for Macintosh File ServerWindows NT Services for Macintosh Print ServerWindows NT Services for Macintosh Administration_.ɁÊ1Ễ;<[ÊÖʆÎWhat are Windows NT Services for the MacintoshU."ÊÖÊ' €\€˜ŒR˜€‚ÿWhat are Windows NT Services for Macintosh?妁ʻÍ? L€M€°˜˜€€ €âˆAá€
€€
‰€‚ÿWindows NT Services for Macintosh is a set of integrated tools facilitating better productivity and integration with Macintosh users. These include the AFP-compatible file server which allows Macintosh users to connect to a Windows NT server the same way they would connect to an AppleShare® server, a Print Server, and Print Monitor, which allows Macintosh users on the network to spool their print jobs to a Windows NT server. Finally, the services include a complete AppleTalk® Stack, providing seamless connectivity between Macintosh clients and Windows NT Advanced Servers. As with other system components, the Windows NT Services for Macintosh are designed for:?ÖÊúÍ. ,€"€Pñ€„ð9€€
ƒ‚ÿ·PerformanceŒE»Í†ÎG ^€Š€R˜ñ€„ð9€€
ƒ‚€€
ƒ‚€€
ƒ‚€€
ƒ‚ÿ·Capacity·Ease of configuration·Ease of use·SecurityEúÍËÎ1ÿÿÿÿÿÿÿÿ\ÿÿÿÿËÎhThe Appletalk Stack.B†Î
Ï* $€0€ČR˜€€‚ÿThe AppleTalk stack OËÎh2 2€;€°˜€âSKo!€
‰€‚ÿThis component is the underlying mechanism that permits these Windows NT services to talk to the Macintosh network and vice-versa. In addition, developers can use protocol independent APIs
Ïh†Î to the AppleTalk stack (for example, Windows Sockets) within cross-platform applications.^-
ÏÆ1U‡;'<]ÆðWindows NT Services for Macintosh File ServerW0h' €`€˜ŒR˜€‚ÿWindows NT Services for Macintosh File Server¨iÆÅ? L€Ó€°°˜€â¤E÷
€
‰€ãTBÀ
‰€‚ÿThis service allows you to share an NTFS directory tree as a volume on the Macintosh network. The Windows NT Services for Macintosh File Server is Apple File Protocol- (AFP) 2.1 compliant, and compatible with AFP 2.0-and-above clients running System 6.0.7 or higher. Because of its implementation, administrators gain access to File Services SecurityÞ¬£2 2€Y€˜˜€âÄ=P€
‰€‚ÿThe file server uses NTFS STREAMS to store the resource fork and the Finder information for each Macintosh file, so that the Windows NT Administrator sees each Macintosh file as a single Windows NT file that can be used by PCs and Macintoshes. Another convenience is that each server maintains a user-configurable database that maps MS-DOS 8.3 file name extensions to Macintosh creator/type pairs. This database enables the Finder to display the files residing in the Windows NT resident folders with the correct Macintosh icons. Also, since the correct creator/type information is associated with the files, the Finder can launch the correct application for a given document. MÅð. ,€>€˜˜â:²4W€
‰€‚ÿHow the File Server WorksV%£F1rÿÿÿÿÿÿÿÿ^ÿÿÿÿFbMacintosh - How the File Server WorksCð‰' €8€ČR˜€‚ÿHow the File Server WorksÙ§Fb2 2€O€°˜€âNä{À
‰€‚ÿNTFS supports long names, which means that the file server can preserve a 31-character Macintosh name. Windows NT Services for Macintosh has a conversion tool that converts 2- or 3-part LAN Manager Services for Macintosh Mac files into single (but multiple stream) Windows NT Services for Macintosh files. This helps preserve security information and volume parameters, which become part of the Access Control Entry.G‰©17<£‹<_©éï File Services Security@bé' €2€˜ŒR˜€‚ÿFile Services Security~X©g & €°€°°˜€‚ÿWindows NT Services for Macintosh fully support and comply with Windows NT security. ˆ>éï J b€}€°˜€âQŽ1±€
‰€â'‘€
‰€âóÄ÷ô€
‰€‚ÿThe Services will present the AFP (Apple File Protocol) security model to your Macintosh users and allow them to access files on volumes that reside on CD-ROM or other read-only media. Because of the secure file system of NTFS, file-sharing folder privileges are stored as Windows NT permissions, so that only one set of permissions on a folder or file is required. This function is enforced for users of both Windows NT and Macintosh desktops. No users will be able to access files if they do not have the required permissions.Additional security informationR!g A 1õÿÿÿÿÿÿÿÿ`ÿÿÿÿA ä Macintosh - permission definition4
ï u ' €€ČR˜€‚ÿpermissionoJA ä % €”€°˜€‚ÿA set of commands that provide access to a particular file or directoryHu ,
1Ûÿÿÿÿÿÿÿÿaÿÿÿÿ,
¿Added Security with UAMEä q
' €<€ČR˜€‚ÿAdded Security with the UAMN',
¿' €O€°˜€‚‚ÿA new component of Windows NT Services for Macintosh is the client-side Microsoft User Authentication Module (UAM). This AppleShare extension permits a more secure login session with a Windows NT server, while sending an encrypted, rather than clear text, password over the network. The UAM also allows a user to specify a domain or change the user password at login time. This permits the Macintosh user to participate in the enterprise-wide login, which can be supported by the Windows NT Advanced Server features as domains and trusted domains.j9q
5@1ñ£‹<Մ<b5@˜@XDHow Windows NT P¿5@¿ermissions are Granted to Macintosh Usersc<¿˜@' €x€˜ŒR˜€‚ÿHow Windows NT Permissions are Granted to Macintosh Users y5@8B' €ó€°°˜€‚ÿThe same user account database authenticates Macintosh users and Windows NT users alike, and both types of users respect the same permissions on files and directories. Windows NT file and directory permissions are automatically translated into corresponding Macintosh permissions. When a user is created, the administrator may specify a Macintosh Primary Group for the user. î˜@XD2 2€Ý€°˜€â'‘€
‰€‚ÿFrom the Windows NT File Manager, you can create Macintosh-accessible volumes and manage user/group accounts. An additional menu, labeled the AFP Server, appears in the File Manager, and from this menu, you can create and delete shared volumes, change volume parameters, edit the Type-Extension database, and set folder privileges. The Windows NT Services for Macintosh automatically creates a "Public Files" volume at installation time on an NTFS or CDFS (CD-ROM file system) partition.18B‰D1°ÿÿÿÿÿÿÿÿcÿÿÿÿ‰DF0 XD¹D' €€ČR˜€‚ÿfolderO)‰DF& €S€°˜€‚ÿIn graphical user interfaces, a container for programs and files, symbolized on the screen by an icon of a file folder. A folder is equivalent to a directory in that it can hold both files and additional folders and, like a directory, is a means of organizing programs and documents on a disk._.¹DgF1Ar <.=dgF¿FÏJWindows NT Services for Macintosh Print ServerX1F¿F' €b€˜ŒR˜€‚ÿWindows NT Services for Macintosh Print ServerZgFLH3 4€µ€°°˜€€ €€ €‚ÿThe Windows NT Services for Macintosh has a PostScript®-compatible engine that allows Macintosh desktop machines to print to any printer connected to Windows NT-based systems, as if they were printing to a LaserWriter®. The Windows NT Printer Services support the standard Apple LaserWriter driver; special client software is not required.¹“¿FJ& €'€°˜€‚ÿTightly integrated with the Windows NT Print Manager, the Windows NT Services for Macintosh Print Server advertises all printers connected to Windows NT-based systems that are connected directly to the server on the AppleTalk network. It then spools all incoming jobs from the Macintoshes to the queues of those printers. AppleTalk despooling errors are corrected by the Windows NT print subsystem. 2 LH7J& €€˜°˜€‚ÿSee Also:˜]JÏJ; F€º€˜˜â°÷œ€
‰€‚âj¶ë¯€
‰€‚ÿSelecting PrintersThe Windows NT Services for Macintosh Postscript Print ProcessorO7JK1ÿÿÿÿÿÿÿÿeÿÿÿÿK×LMacintosh - selecting printers<ÏJZK' €*€ČR˜€‚ÿSelecting Printers}WK×L& €¯€°˜€‚ÿPrinters connected to Windows NT-based systems will appear in the zone that you specify in the configuration dialog for the AppleTalk stack. You can configure the AppleTalk stack using the graphical user interface within Windows NT, which allows Macintosh users to select printers connected to Windows NT-based systems through the Chooser. m<ZKDM1•ÿÿÿÿÿÿÿÿfÿÿÿÿDMlOWindows NT Services for Macintosh Postscript Print Processorf?×LªM' €~€ČR˜€‚ÿWindows NT Services for Macintosh Postscript Print ProcessorœDMlO& €9€°˜€‚ÿIf the printer connected to Windows NT-based systems is not a Postscript printer, the Print Manager will mark the incoming Postscript file so that it will be processed by the Services for Macintosh Postscript Print Processor before it goes to the printer. This Print Processor rasterizes the Postscript file and sends the resulting high-resolution image to the specific printer to which the user is attached. IªMµO1·'<r <gµO €ó‚Macintosh Administration8lO €' €"€˜ŒR˜€‚ÿAdministrationµO €lO⻵Oî' €w€°°˜€‚ÿSetup and administration of the Windows NT Services for Macintosh is fully integrated with Windows NT through a graphical interface that is integrated with existing Windows NT administration tools. Remote administration of the Windows NT Services for Macintosh is also supported from Windows NT workstations, and Windows NT Services for Macintosh can be started transparently if the administrator configures the server to use this facility.2 € ‚& €€˜°˜€‚ÿSee Also:l1‚; F€b€˜˜ãÎØõ€
‰€‚ã¾B—€
‰€‚ÿServer AdministrationThe Control Panelg6 ‚ó‚1 2€l€°˜‚% ã m½€
‰€‚ÿGranting Security Permissions to Macintosh UsersFŒ‚9ƒ1þՄ<ì=h9ƒxƒE†Server Administration?ó‚xƒ' €0€˜ŒR˜€‚ÿServer Administrationͦ9ƒE†' €M€°˜€‚‚ÿThe Server Manager, which is part of the Windows NT Advanced Server, allows administration of local and remote servers, and is installed into the Administrative Tools group in the Program Manager. This additional tool gives the administrator access to the volume list, the server parameters, and information about the current state of the server. Using this same interface, administrators can send messages to users, disconnect users, and close files.All setup and administration of printers is done using the Windows NT Print Manager. This interface allows you to browse for AppleTalk printers and view all print queues, including print jobs sent to the AppleTalk printers.Bxƒ‡†1(.=ÿÿÿÿi‡††¹ŠThe Control Panel;E††' €(€˜ŒR˜€‚ÿThe Control Panel懆ӈ+ $€Í€°°˜€‚€‚ÿThe Windows NT Services for Macintosh can be administered from the Control Panel within Windows NT. The Network application allows the user to install, remove, update, and configure Windows NT Services for Macintosh. The File Server parameters set within this application are the server name that the Macintosh network will see and the default creation of the User Authentication Module volume. The desired zone and routing parameters of the AppleTalk stack can also be configured.æÁ†¹Š% €ƒ€°˜€ÿThe Services application within the Windows NT Control Panel permits the user to set the startup mode for all services. For the Services for Macintosh, the file and print servers can be set to either Automatic or Manual startup mode. This application also provides the ability to specify what user account you want the Print Server to run under. All print jobs from Macintosh users will be listed in the Print Manager as belonging to this account.1ӈêŠ1Yÿÿÿÿÿÿÿÿjÿÿÿÿꊋ(¹Š‹% €€°˜€‚ÿW&êŠi‹1_ÿÿÿÿÿÿÿÿki‹´‹ÔÃMicrosoft Services and Office ListingsK%‹´‹& €J€°°˜€‚ÿMicrosoft Offices: General NumbersQ+i‹Œ& €V€°°¦€‚ÿMicrosoft Certified Professional ProgramX-´‹]Œ+ &€Z€R¤‚A€ƒ‚ƒ‚ÿU.S.(800) 426-9400Canada (800) 563-9048I Œ¦Œ) "€@€°°¤‚A€‚ÿMicrosoft Consulting Servicesâ°]Œˆ2 2€a€R¤‚A€ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿU.S. toll-free number(800) 922-9446U.S. West Region(206) 828-2940U.S. Central Region(708) 495-5550U.S. South Region(214) 458-1739U.S. Northeast Region(617) 487-6500C¦Œˍ* $€2€°R¦‚A€ƒ‚ÿAustralia(2) 870-2200Eˆ> J€€R¤‚A€ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿBrazil(11) 530-4455Canada (905) 568-0434France(1) 6986-4480Germany(89) 3176-3019Hong Kong(852) 804-4200Italy(2) 210-7361Mexico(5) 325-09-10New Zealand(64) (9) 358-3724Singapore(65) 227-6833Sweden(46) (8) 752-5600United Kingdom(734) 270-001HˍX) "€>€°°¤‚A€‚ÿMicrosoft Education Servicesi>Á+ &€|€R¤‚A€ƒ‚ƒ‚ÿU.S. toll free number(800) 426-9400Canada (905) 568-0434J!XÀ) "€B€°°¤‚A€‚ÿMicrosoft InformationÁÀ‹ NetworksR)ÁiÀ) "€R€R¤‚A€ƒ‚ÿMicrosoft TechNet(800) 344-2121 x115GÀ°À) "€<€˜R¦‚A€‚ÿMicrosoft Developer NetworkX-iÀÁ+ &€Z€R¤‚A€ƒ‚ƒ‚ÿU.S.(800) 759-5474Canada (800) 563-9048€T°ÀˆÁ, (€¨€˜R¦‚A€ƒ‚‚ÿMicrosoft InternationalCustomer Service(206) 936-8661Microsoft Online ServicesX-ÁàÁ+ &€Z€R¤‚A€ƒ‚ƒ‚ÿU.S.(800) 936-3500Canada (800) 563-9048;ˆÁÂ) "€$€˜R¦‚A€‚ÿMicrosoft Pressi>àÁ„Â+ &€|€R¤‚A€ƒ‚ƒ‚ÿU.S.(800) MS-PRESS (677-7377)Canada (905) 293-8464, x340O&ÂÓÂ) "€L€˜R¦‚A€‚ÿMicrosoft Solution Provider ProgramX-„Â+Ã+ &€Z€R¤‚A€ƒ‚ƒ‚ÿU.S.(800) 426-9400Canada (800) 563-9048Q(ÓÂ|Ã) "€P€˜R¦‚A€‚ÿMicrosoft Support Network Sales GroupX-+ÃÔÃ+ &€Z€R¤‚A€ƒ‚ƒ‚ÿU.S.(800) 936-3500Canada (905) 568-35031|ÃÄ1ZÿÿÿÿÿÿÿÿlÄÿÿÿÿ.Ä)ÔÃ.Ä& €€¼˜˜€"‚ÿa0ďÄ1iFÿÿÿÿÿÿÿÿmÄôÄKËMicrosoft Solution Providers - national coverageeA.ÄôÄ$ €‚€°€‚ÿMicrosoft Solution Providers for Windows NT - National SupportE Ä9Å% €@€°Œ€‚ÿ4TH GENERATION SERVICES, INC.xSôıÅ% €¦€€‚‚‚ÿ2692 BEACON HILL DR, STE 102AUBURN HILLS, MI 48326-3747Telephone: 313-373-9388@9ÅñÅ% €6€°Œ€‚ÿADVANCED PARADIGMS, INC.wR±ÅhÆ% €¤€€‚‚‚ÿ4900 SEMINARY ROAD, SUITE 210ALEXANDRIA, VA 22311-1811Telephone: 703-578-1400BñŪÆ% €:€°Œ€‚ÿADVANTA TECHNOLOGIES, INC.mHhÆÇ% €€€‚‚‚ÿ1 WEST LOOP S, STE 801HOUSTON, TX 77027-9009Telephone: 713-622-9841J%ªÆaÇ% €J€°Œ€‚ÿAMERICAN COMPUTER INNOVATORS, INC.jEÇËÇ% €Š€€‚‚‚ÿ259 TRIANGLE STREETAMHERST, MA 01002-2144Telephone: 413-549-0701<aÇÈ% €.€°Œ€‚ÿAMERICAN TECH CENTERwRËÇ~È% €¤€€‚‚‚ÿ7929 BROOK RIVER STE 550, STE 550DALLAS, TX 75247-4948Telephone: 214-630-04447ȵÈ% €$€°Œ€‚ÿAMERIDATA, INC.hC~ÈÉ% €†€€‚‚‚ÿ10200 51ST AVE NPLYMOUTH, MN 55442-3206Telephone: 612-557-2500F!µÈcÉ% €B€°Œ€‚ÿAPPLIED COMPUTER TECHNIQUES, Ic>ÉÆÉ% €|€€‚‚‚ÿ1309 44TH STORLANDO, FL 32839-1228Telephone: 407-423-1188Q,cÉÊ% €X€°Œ€‚ÿBARRISTER INFORMATION SYSTEMS CORPORATIONfAÆÉ}Ê% €‚€€‚‚‚ÿ465 MAIN STREETBUFFALO, NY 14203-1713Telephone: 716-845-50109ʶÊ% €(€°Œ€‚ÿBOHDAN ASSOCIATESmH}Ê#Ë% €€€‚‚‚ÿ220 GIRARD STREETGAITHERSBURG, MD 20877-3467Telephone: 301-258-74294¶ÊWË% €€°Œ€‚ÿBULETTE PLUSpK#ËÇË% €–€€‚‚‚ÿ925 LAKEVILLE ST STE 300PETALUMA, CA 94952-3329Telephone: 707-769-1553AWËÌ% €8€°Œ€‚ÿBUSINESS COMPUTER SYSTEMShCÇËpÌ% €†€€‚‚‚ÿ204 E 900 SSALT LAKE CTY, UT 84111-4215Telephone: 801-532-3972H#̸Ì% €F€°Œ€‚ÿBUSINESS SYSTEMS SOLUTIONS, INC.}XpÌ5Í% €°€€‚‚‚ÿ1400 E LAKE COOK ROAD, SUITE 125BUFFALO GROVE, IL 60089-1865Telephone: 708-459-3800,¸ÌaÍ% €€°Œ€‚ÿCACIhC5ÍÉÍ% €†€€‚‚‚ÿ1100 N GLEBE RDARLINGTON, VA 22201-4798Telephone: 703-841-7800:aÍÎ% €*€°Œ€‚ÿCCH COMPUTAX, INC.zUÉÍ}Î% €ª€€‚‚‚ÿ21250 HAWTHORNE BLVD, MAIL STOP 61TORRANCE, CA 90503-5506Telephone: 310-543-6294=κÎ% €0€°Œ€‚ÿCEDAR COMPUTER CENTERe@}ÎÏ% €€€€‚‚‚ÿ2733 NW PARK LNANKENY, IA 50021-1055Telephone: 515-965-03579ºÎXÏ% €(€°Œ€‚ÿCGI SYSTEMS, INC.nIÏÆÏ% €’€€‚‚‚ÿ300 BERWYN PARK, STE 100BERWYN, PA 19312-1179Telephone: 215-993-08706XÏ % €"€°Œ€‚ÿCHEMSOFT, INC.ÆÏ .ÄtOÆÏ€% €ž€€‚‚‚ÿ1556 HALFORD AVE, STE 285SANTA CLARA, CA 95051-2694Telephone: 408-985-52316 ¶% €"€°Œ€‚ÿCOMPUNET, INC.wR€-% €¤€€‚‚‚ÿ8080 MADISON AVENUE, SUITE 202FAIR OAKS, CA 95628-3759Telephone: 916-965-31124¶a% €€°Œ€‚ÿCOMPUTER BAYqL-Ò% €˜€€‚‚‚ÿ22 CRYSTAL LAKE PLAZACRYSTAL LAKE, IL 60014-7929Telephone: 815-455-2223;a
% €,€°Œ€‚ÿCOMPUTER TASK GROUPgBÒt% €„€€‚‚‚ÿ1224 MILL STEAST BERLIN, CT 06023-1152Telephone: 203-828-2029@
´% €6€°Œ€‚ÿCONCEPT AUTOMATION, INC.e@t% €€€€‚‚‚ÿ1319 MORAN RDSTERLING, VA 20166-9301Telephone: 703-450-6000C´\% €<€°Œ€‚ÿCONTINENTAL RESOURCES, INC.mHÉ% €€€‚‚‚ÿ175 MIDDLESEX TURNPIKEBEDFORD, MA 01730-1409Telephone: 617-275-0850>\% €2€°Œ€‚ÿCONTRACT SOLUTIONS INCc>Éj% €|€€‚‚‚ÿ2 KEEWAYDIN DRSALEM, NH 03079-2839Telephone: 603-893-67768¢% €&€°Œ€‚ÿCONTROL DATA INCqLj% €˜€€‚‚‚ÿ959 S COAST DR, STE 450COSTA MESA, CA 92626-1786Telephone: 714-850-7500<¢O% €.€°Œ€‚ÿCTR BUSINESS SYSTEMSnI½% €’€€‚‚‚ÿ6420 SW MACADAM AVENUEPORTLAND, OR 97201-3507Telephone: 503-293-24148Oõ% €&€°Œ€‚ÿCYBERMEDIX, INC.vQ½k% €¢€€‚‚‚ÿ1945 OLD GALLOWS ROAD, SUITE 700VIENNA, VA 22182-3931Telephone: 703-761-6550F!õ±% €B€°Œ€‚ÿDATABASE COMPUTER SYSTEMS, INCqLk"% €˜€€‚‚‚ÿRR 1 BOX 228, PO BOX 228LYNCHBURG, VA 24502-9701Telephone: 804-385-6020E ±g% €@€°Œ€‚ÿDATABASE SERVER SYSTEMS, INC.ƒ^"ê% €¼€€‚‚‚ÿ400 OYSTER POINT BLVD, SUITE 114SOUTH SAN FRANCISCO, CA 94080-1917Telephone: 415-583-3000G"g1% €D€°Œ€‚ÿDECARLO PATERNITE & ASSOC. INC.vQê§% €¢€€‚‚‚ÿ6133 ROCKSIDE ROAD, SUITE 400CLEVELAND, OH 44131-2220Telephone: 216-524-2121:1á% €*€°Œ€‚ÿEDGE SYSTEMS, INC.pK§Q % €–€€‚‚‚ÿ1245 CORPORATE BLVD, 4 FLRAURORA, IL 60504-6407Telephone: 708-898-00213á„ % €€°Œ€‚ÿEDUTECH INCtOQ ø % €ž€€‚‚‚ÿ11211 KATY FREEWAY, SUITE 604HOUSTON, TX 77079-2125Telephone: 713-827-1314L'„ D
% €N€°Œ€‚ÿEMPOWER TRAINERS & CONSULTANTS, INC.wRø »
% €¤€€‚‚‚ÿ4717 GRAND AVENUE, SUITE 220KANSAS CITY, MO 64112-2209Telephone: 816-753-8880E D
 % €@€°Œ€‚ÿERUDITE SOFTWARE & CONSULTINGyT»
y % €¨€€‚‚‚ÿ2474 N UNIVERSITY AVE STE 100, STE 1PROVO, UT 84604-3808Telephone: 801-373-61005 ® % € €°Œ€‚ÿFOXFIRE, INC.iDy  % €ˆ€€‚‚‚ÿRR # 1, BOX 198HINDSVILLE, AR 72738-9801Telephone: 501-789-2122@® W % €6€°Œ€‚ÿFUTURE ENTERPRISES, INC.\ Ø % €¸€€‚‚‚ÿ1331 PENNSYLVANIA AVENUE NW, SUITE 1301WASHINGTON, DC 20004-1703Telephone: 202-662-76103W 
% €€°Œ€‚ÿGA SULLIVANqLØ |
% €˜€€‚‚‚ÿ77 W PORT PLZ STE 218, STE 265ST LOUIS, MO 63146Telephone: 314-434-6422H#

% €F€°Œ€‚ÿGOVERNMENT MICRO RESOURCES, INC.zU|
>% €ª€€‚‚‚ÿ14121 PARKE-LONG COURT, SUITE 104CHANTILLY, VA 22021-1647Telephone: 703-263-91466Ä
t% €"€°Œ€‚ÿGRANT THORNTONvQ>ê% €¢€€‚‚‚ÿ500 WASHINGTON AVE STE 1200SAINT LOUIS, MO 63101-1261Telephone: 314-241-3240=t'% €0€°Œ€‚ÿGTE VANTAGE SOLUTIONSvQê% €¢€€‚‚‚ÿ15000 CONFERENCE CENTER DRIVECHANTILLY, VA 22021-3819Telephone: 703-818-5150/
'Ì% €€°Œ€‚ÿHTR INCtOL@% €ž€€‚‚‚ÿ6110 EXECUTIVEÌL@.Ä BLVD STE 810ROCKVILLE, MD 20852-3903Telephone: 301-881-6420/
Ì{@% €€°Œ€‚ÿHTR INC„_L@ÿ@% €¾€€‚‚‚ÿNORTH PARK 500, 1000 ABERNATHY RD NE STE 1017ATLANTA, GA 30328-5651Telephone: 800-882-6420/
{@.A% €€°Œ€‚ÿHTR INC|Wÿ@ªA% €®€€‚‚‚ÿPROSPECT PL, 9 HILLSIDE AVE 5TH FLOORWALTHAM, MA 02154-7556Telephone: 617-890-1900/
.AÙA% €€°Œ€‚ÿHTR INCyTªARB% €¨€€‚‚‚ÿ6701 CENTER DRIVE W, 5TH FLOORLOS ANGELES, CA 90045-1536Telephone: 310-645-9195/
ÙAB% €€°Œ€‚ÿHTR INCnIRBïB% €’€€‚‚‚ÿ2000 CORPORATE RIDGE RDMC LEAN, VA 22102-7805Telephone: 703-556-6420/
BC% €€°Œ€‚ÿHTR INCqLïBC% €˜€€‚‚‚ÿ1150 18TH ST NW STE 765WASHINGTON, DC 20036-3816Telephone: 202-822-91113CÂC% €€°Œ€‚ÿI-NET, INC.qLC3D% €˜€€‚‚‚ÿ6430 ROCKLEDGE DR STE 400BETHESDA, MD 20817-1805Telephone: 301-564-6729@ÂCsD% €6€°Œ€‚ÿIDEAS COMMERCIAL SYSTEMSsN3DæD% €œ€€‚‚‚ÿ15000 CONFERENCE CENTER DRCHANTILLY, VA 22021-3819Telephone: 703-818-5179CsD)E% €<€°Œ€‚ÿINTEGRATED VESSEL INFO CORPrMæD›E% €š€€‚‚‚ÿ671 VIA ALONDRA, UNIT 805CAMARILLO, CA 93012-8098Telephone: 805-389-6870?)EÚE% €4€°Œ€‚ÿINTELLIGENT ELECTRONICSnI›EHF% €’€€‚‚‚ÿ5613 DTC PKWY STE 350ENGLEWOOD, CO 80111-3031Telephone: 303-220-9931M(ÚE•F% €P€°Œ€‚ÿINTERGRATED INFORMATION SYSTEMS, INC.wRHF G% €¤€€‚‚‚ÿ1130 E UNIVERSITY DRIVE, SUITE 109TEMPE, AZ 85281-8403Telephone: 602-470-1630<•FHG% €.€°Œ€‚ÿISC COMP & COMM, INCqL G¹G% €˜€€‚‚‚ÿ23 GREAT OAKS BLVD, STE ESAN JOSE, CA 95119-1364Telephone: 408-227-22863HGìG% €€°Œ€‚ÿKEANE, INC.qL¹G]H% €˜€€‚‚‚ÿ19 OLD KINGS HWY, BLDG 23BWDARIEN, CT 06820-4526Telephone: 203-978-1162:ìG—H% €*€°Œ€‚ÿKELTEX CORPORATIONjE]HI% €Š€€‚‚‚ÿ1748 N STREET NWWASHINGTON, DC 20036-2907Telephone: 202-296-7622D—HEI% €>€°Œ€‚ÿKIRKWOOD INFORMATION SYSTEMSjEI¯I% €Š€€‚‚‚ÿ15952 PRELL CTFOUNTAIN VLY, CA 92708-1155Telephone: 714-839-28388EIçI% €&€°Œ€‚ÿMCE SERVICES INCgB¯INJ% €„€€‚‚‚ÿ1409 ALLEN DR STE CTROY, MI 48083-4003Telephone: 313-588-46401 çIJ% €€°Œ€‚ÿMEDIASERVŠeNJ K% €Ê€€‚‚‚ÿA DIVISION OF MARK TOTHE MARKE, 444 CENTRAL PARK WNEW YORK, NY 10025-4378Telephone: 212-666-5661G"JPK% €D€°Œ€‚ÿMICRO MODELING ASSOCIATES, INC.yT KÉK% €¨€€‚‚‚ÿ111 BROADWAY 18TH FLOOR, FLOOR 18NEW YORK, NY 10006-1901Telephone: 212-233-9890APK
L% €8€°Œ€‚ÿMICRO RESEARCH INDUSTRIESwRÉKL% €¤€€‚‚‚ÿ4900 SEMINARY ROAD, SUITE 800ALEXANDRIA, VA 22311-1811Telephone: 703-824-0161A
LÂL% €8€°Œ€‚ÿMIDAK INTERNATIONAL, INC.oJL1M% €”€€‚‚‚ÿ3561 E SUNRISE, SUITE 235TUCSON, AZ 85718-3204Telephone: 602-577-26618ÂLiM% €&€°Œ€‚ÿMIDAK UNIVERSITYqL1MÚM% €˜€€‚‚‚ÿ2800 N CENTRAL AVE STE 100PHOENIX, AZ 85004-1033Telephone: 602-266-9029>iMN% €2€°Œ€‚ÿMINERVA TECHNOLOGY INCvQÚMŽN% €¢€€‚‚‚ÿ3102 MAPLE AVE STE 240, STE 2410DALLAS, TX 75201-1233Telephone: 214-871-7033?NÍN% €4€°Œ€‚ÿMTX INTERNATIONAL, INC.sNŽN@O% €œ€€‚‚‚ÿ98 INVERNESS DR E, STE 110ENGLEWOOD, CO 80112-5108Telephone: 303-790-1400;ÍN{O% €,€°Œ€‚ÿNETBASE CORPORATIONuP@O €% € €€‚‚‚ÿ2214 ROCK HILL ROAD, SUITE 300HERNDON, VA 22070-4214Telephone: 703-478-7260{O €.Ä?{OK€% €4€°Œ€‚ÿNETWORK SOLUTIONS, INC.mH €¸€% €€€‚‚‚ÿ505 HUNTMAR PARK DRIVEHERNDON, VA 22070-5100Telephone: 703-742-48437K€ï€% €$€°Œ€‚ÿNM PRO DATA LTDlG¸€[% €Ž€€‚‚‚ÿ1212 6TH AVE 9TH FLRNEW YORK, NY 10036-1602Telephone: 212-679-7966;% €,€°Œ€‚ÿPARADIGM TECH, INC.qL[‚% €˜€€‚‚‚ÿTWO PARK AVENUE, FLOOR 22NEW YORK, NY 10016-9301Telephone: 212-685-4865:–A‚% €*€°Œ€‚ÿPARIAN DEVELOPMENTsN‚´‚% €œ€€‚‚‚ÿ641 W LAKE STREET, SUITE 100CHICAGO, IL 60661-1012Telephone: 312-655-39003A‚ç‚% €€°Œ€‚ÿPC ETCETERAmH´‚Tƒ% €€€‚‚‚ÿ462 SEVENTH AVE, FL 4NEW YORK, NY 10018-7606Telephone: 212-736-58708炌ƒ% €&€°Œ€‚ÿPRACTI COM, INC.vQTƒ„% €¢€€‚‚‚ÿ2385 DELHI COMMERCE DRIVE, SUITE 4HOLT, MI 48842-2181Telephone: 517-699-0307<Œƒ>„% €.€°Œ€‚ÿPRE-PAGE SYSTEMS INClG„ª„% €Ž€€‚‚‚ÿ406 FARMINGTON AVEFARMINGTON, CT 06032-1964Telephone: 203-678-0858@>„ê„% €6€°Œ€‚ÿPREMIUM CONNECTING POINTgBª„Q…% €„€€‚‚‚ÿ18872 BARDEEN WAYIRVINE, CA 92715-1521Telephone: 714-251-1550=ꄎ…% €0€°Œ€‚ÿPRINCETON INFORMATIONd?Q…ò…% €~€€‚‚‚ÿ2 PENN PLAZANEW YORK, NY 10121-0001Telephone: 212-563-5030F!Ž…8†% €B€°Œ€‚ÿPROFESSIONAL COMPUTER SOLUTIONqLò…©†% €˜€€‚‚‚ÿ383 NORDHOFF PL, STE 100ENGLEWOOD, NJ 07631-4622Telephone: 201-816-8002I$8†ò†% €H€°Œ€‚ÿPROGRAMMING & SYSTEMS CONSULTANTS|W©†n‡% €®€€‚‚‚ÿ12977 N OUTER 40 DRIVE, SUITE 310SAINT LOUIS, MO 63141-8656Telephone: 314-878-47776ò†¤‡% €"€°Œ€‚ÿPROLIFIX, INC.b=n‡ˆ% €z€€‚‚‚ÿ8809 LONG STLENEXA, KS 66215-3585Telephone: 913-492-7300?¤‡Eˆ% €4€°Œ€‚ÿQUICKSTART TECHNOLOGIES‚]ˆLj% €º€€‚‚‚ÿ1500 QUAIL ST 6TH FLOOR, BUILDING 103NEWPORT BEACH, CA 92660-2733Telephone: 714-894-1448/
Eˆöˆ% €€°Œ€‚ÿQUOTRON}XLjs‰% €°€€‚‚‚ÿ12731 W JEFFERSON BLVD, BLDG C2-75LOS ANGELES, CA 90066-7077Telephone: 310-302-3912=öˆ°‰% €0€°Œ€‚ÿSCHULCO TRAINING CORPZs‰/Š% €´€€‚‚‚ÿ100 FOUR FALLS CORPORATE CENTEWEST CONSHOHOCKEN, PA 19428-2950Telephone: 215-940-01006°‰eŠ% €"€°Œ€‚ÿSEMIOTIX, INC.…`/ŠêŠ% €À€€‚‚‚ÿFOUNTAINHEAD PLAZA SEVEN, 10620 E BETHANY DRIVEAURORA, CO 80014-2602Telephone: 303-743-1400=eŠ'‹% €0€°Œ€‚ÿSNELLING AND SNELLINGsNꊚ‹% €œ€€‚‚‚ÿ12801 N CENTRAL EXPY, STE 650DALLAS, TX 75243-1725Telephone: 214-239-75756'‹Ћ% €"€°Œ€‚ÿSOFT-TRAIN INCpKš‹@Œ% €–€€‚‚‚ÿ15991 RED HILL AVE STE 100TUSTIN, CA 92680-7320Telephone: 714-566-0100DЋ„Œ% €>€°Œ€‚ÿSOFTWARE HOUSE INTERNATIONALiD@ŒíŒ% €ˆ€€‚‚‚ÿ2 RIVERVIEW DRIVESOMERSET, NJ 08873-1150Telephone: 908-805-9160:„Œ'% €*€°Œ€‚ÿSOFTWARE MADE EASYwR팞% €¤€€‚‚‚ÿ3145 GEARY BLVD, SUITE 504SAN FRANCISCO, CA 94118-3300Telephone: 415-381-9639@'ލ% €6€°Œ€‚ÿSQL BUSINESS SYSTEMS INCxSžVŽ% €¦€€‚‚‚ÿ17171 PARK ROW STE 350, SUITE 350HOUSTON, TX 77084-4927Telephone: 713-578-74100 ލ†Ž% €€°Œ€‚ÿSSDS INCrMVŽøŽ% €š€€‚‚‚ÿ6595 S DAYTON ST STE 3000ENGLEWOOD, CO 80111-6145Telephone: 303-790-0660@†Ž8% €6€°Œ€‚ÿSTRATEGIC SOLUTIONS CORPpKøŽ¨% €–€€‚‚‚ÿ5025 S MCCARRAN BLVD STE 354RENO, NV 89502-6501Telephone: 702-851-8200<8 À% €.€°Œ€‚ÿSYNTREX TECHNOLOGIES¨ À.ÄpK¨|À% €–€€‚‚‚ÿ100 1ST ST, STE 320SAN FRANCISCO, CA 94105-2635Telephone: 415-442-0250B À¾À% €:€°Œ€‚ÿSYNTREX TECHNOLOGIES, INC.mH|À+Á% €€€‚‚‚ÿ246 INDUSTRIAL WAY WEATONTOWN, NJ 07724-2206Telephone: 908-542-15006¾ÀaÁ% €"€°Œ€‚ÿTECHSMITH CORPsN+ÁÔÁ% €œ€€‚‚‚ÿ3451 DUNCKEL ROAD, SUITE 200LANSING, MI 48911-4216Telephone: 517-393-08006aÁ
Â% €"€°Œ€‚ÿTEXAS SOFTWAREiDÔÁsÂ% €ˆ€€‚‚‚ÿ10165 PHELAN BLVDBEAUMONT, TX 77713-9669Telephone: 409-866-9765<
¯Â% €.€°Œ€‚ÿTHE APEX GROUP, INC.wRsÂ&Ã% €¤€€‚‚‚ÿ7151 COLUMBIA GATEWAY DR, STE FCOLUMBIA, MD 21046-2139Telephone: 410-312-2665F!¯ÂlÃ% €B€°Œ€‚ÿTHE COMPASS COMPUTER GROUP INCƒ^&ÃïÃ% €¼€€‚‚‚ÿ1445 HUNTINGTON DR STE 200, SUITE 200SOUTH PASADENA, CA 91030-4553Telephone: 818-403-8000>lÃ-Ä% €2€°Œ€‚ÿTHE COMPUTER PROFESSORpKïÝÄ% €–€€‚‚‚ÿ18162 VESTRY CIRCLEHUNTINGTON BH, CA 92648-1082Telephone: 714-842-7227:-Ä×Ä% €*€°Œ€‚ÿTHE SPECTRUM GROUPpKÄGÅ% €–€€‚‚‚ÿ2001 SPRING RD, STE 350OAK BROOK, IL 60521-1879Telephone: 708-368-7090F!×čÅ% €B€°Œ€‚ÿTHE WINDOWS SUPPORT GROUP, INCe@GÅòÅ% €€€€‚‚‚ÿ150 W 22ND STNEW YORK, NY 10011-2421Telephone: 212-675-2500:Å,Æ% €*€°Œ€‚ÿTRAINING SOLUTIONSlGòŘÆ% €Ž€€‚‚‚ÿ2121 S 48TH ST, STE 106TEMPE, AZ 85282-1015Telephone: 602-431-1100+,ÆÃÆ% € €°Œ€‚ÿUCIkF˜Æ.Ç% €Œ€€‚‚‚ÿ40 ORCHARD HILL RDGREENLAND, NH 03840-2138Telephone: 603-430-9541DÃÆrÇ% €>€°Œ€‚ÿUNIFIED COMMUNICATIONS, INC.zU.ÇìÇ% €ª€€‚‚‚ÿ2051 KILLEBREW DRIVE, SUITE 300MINNEAPOLIS, MN 55425-1896Telephone: 612-851-1710J%rÇ6È% €J€°Œ€‚ÿUNISYS CORPORATION FEDERAL SYSTEMSgBìǝÈ% €„€€‚‚‚ÿ8008 WESTPARK DRMC LEAN, VA 22102-3106Telephone: 703-556-5361:6È×È% €*€°Œ€‚ÿUS CONNECT-ATLANTAoJÈFÉ% €”€€‚‚‚ÿSIX PIEDMONT CENTER STE 300, STE 580ATLANTA, GA 30305-1515Telephone: B×ȈÉ% €:€°Œ€‚ÿUS LAN SYSTEMS CORPORATIONiDFÉñÉ% €ˆ€€‚‚‚ÿ728 VIRGINIA AVEBLUEFIELD, VA 24605-1456Telephone: 703-326-3186;ˆÉ,Ê% €,€°Œ€‚ÿWISMER MARTIN, INC.gBñÉ“Ê% €„€€‚‚‚ÿN 12828 NEWPORT HWYMEAD, WA 99021-9600Telephone: 509-466-0396G",ÊÚÊ% €D€°Œ€‚ÿXL/PROTEUS SOFTWARE SYSTEMS INCqL“ÊKË% €˜€€‚‚‚ÿ313 BOSTON POST ROAD WMARLBOROUGH, MA 01752-4612Telephone: 508-485-9990\ÚÊØË1ÿÿÿÿç‡?nØËÌÎNationwide Building Society - Case StudyCBB("btn_next_index", "PI(`nteval.hlp', `next_5')")DKËÌ& €<€°°˜€‚ÿNationwide Building Society;ØËWÍ- (€€°°˜€€€‚ÿWhen one of the United Kingdom's largest financial institutions decided to make a major change in the way it manages its business, its search for a technology to enhance its competitiveness and improve its customer service led it to the Windows NT operating system.b'̹Í; F€N€°˜ã'­yã€
‰€‚ã–Ï3€
‰€‚ÿSolution SummaryCase DetailsHWÍÎ. ,€4€˜˜âÌï€
‰€‚ÿFor More Information],¹Í^Î13z†?Q@o^δΊ Nationwide Building Society Solution SummaryV/δÎ' €^€˜ŒR˜€‚ÿNationwide Building Society Solution Summary4 ^ÎèÎ( €€°˜€€‚ÿIndustry:´Î"Ï% €*€°˜€‚ÿFinancial services8èÎZÏ$ €(€˜€‚ÿBusiness Solution[6"ϵÏ% €l€°˜€‚ÿEnterprise-wide client-server computing environment3ZÏ $ €€˜€‚ÿArchitectureµÏ ÎǵÏÐ 2 2€%€°˜€€€€€‚ÿServers based on the Microsoft Windows NT platform linked to mainframes on wide area network with Windows running on a total of 10,000 PCs 8  ' €"€˜€€‚ÿProducts Used>Ð F < F€€°˜€€€€5€‚ÿMicrosoft Visual BasicMicrosoft Visual C++Microsoft Windows NTMicrosoft Windows NT Advanced ServerMicrosoft WindowsTM for WorkgroupsPowerBuilderDevelopment ResourcesIn-house development staffSiemens NixdorfUnisysMicrosoft Consulting Services;  ' €(€˜€€‚ÿDevelopment TimeoJF ð % €”€°˜€‚ÿApproximately 18 months from initial proposal to first system prototype3  # ' €€˜€€‚ÿBenefitsgBð Š % €„€°˜€‚ÿEnhanced customer service, increased flexibility, reduced costsY(# ã 1,ç‡?ÿÿÿÿpã 5
 Nationwide Building Society Case DetailsR+Š 5 ' €V€˜ŒR˜€‚ÿNationwide Building Society Case DetailsBã w ' €7€°°˜€‚ÿNationwide Building Society was at a crossroads. The growth of the British financial institution was quickly outpacing the capabilities of the proprietary Siemens Nixdorf minicomputer system that ran its branch operations, among others. Management decided to look at alternatives.ïÈ5 f ' €‘€°˜€‚‚ÿThe second largest financial institution of its kind in the United Kingdom, Nationwide serves some six million retail customers through more than 700 branches. The company has approximately 13,000 employees and assets of more than £34 billion ($50 billion U.S.).In the highly competitive retail financial services business, the success of a financial institution is largely determined by the quality of its customer service. That is why Nationwide's senior management decided to turn the need to replace its aging minicomputer system into an opportunity to improve the company's customer service. Management's plan: invest in technology that would allow it to respond more quickly to changing customer needs.±‹w  & €€°˜€‚ÿThe multimillion-pound decision would affect 10,000 PCs over three years, and literally change the way the company manages its business.Df [ ' €:€ČR˜€‚ÿA Commitment to Windows NTA œ 3 4€€°˜€â2²€
‰€‚‚ÿAccording to Dr. Paul Feldman, Nationwide's head of Technology Management Services, management's decision evolved into a clear computing direction: a client-server environment with a graphical user interface throughout the organization. The move to a client-server architecture would allow Nationwide to place data and processing of that data where it is most appropriate. For example, customer and account information may be kept on a mainframe where it is centrally secure and facilitates easy access from a distributed environment. At the same time, transaction data could be placed on PCs in front of the customer for the duration of the transaction. This change offers at least two advantages--better customer service, and streamlined business processes for Nationwide.R,[ î & €Y€°˜€‚ÿThe choice of a graphical user interface was also critical. Dr. Feldman believes Nationwide will increase productivity by making it easier for the staff to navigate the system and integrate data. He adds that the interface also presents a more attractive image to customers than character-based screens. "We see ourselves moving to a more open environment where branch personnel could work through a loan application with a customer--right on-screen," says Dr. Feldman. "A graphical user interface looks and works better--and that makes us look better."a:œ O ' €t€ČR˜€‚ÿWindows NT Platform Selected as Server Operating System\î øA A P€¹€°˜€€€6€€€€€€!€‚ÿBased on a thorough analysis of the available options, Nationwide decided to base its future on the Windows NTO øA Š ™ operating system. "All of Nationwide's business systems will either run within, or interface to, Windows NT," says Dr. Feldman. Eventually, Windows NT will run all distributed systems in the organization, from branches to headquarters, providing both network services and data management, as well as vital end-to-end security. Dr. Feldman says that, while OS/2® had some of the features the company was looking for, "the applications and development tools we needed aren't there."q3O iC > J€g€°˜€€!€€!€âußB3€
‰€‚ÿNationwide's long-range plan is to consolidate mainframe operations onto Unisys® machines, which will act as large data servers to Windows NT-based servers at the next level. Nationwide expects to implement a new Microsoft® product in development code-named Hermes as its systems management tool.FøA ¯C ' €>€ČR˜€‚ÿPartners Help Develop System6ýiC åF 9 @€û€°˜€‚€ €€ €€ €‚ÿNationwide is working with several partners as they migrate to a client-server environment. Siemens Nixdorf is participating in the move from its minicomputer system to PCs, and may provide the PC systems. Unisys is working with Nationwide to ensure an effective link between its mainframes and the Windows NT-based servers. Microsoft Consulting Services is also teaming up with Nationwide, working with the organization's in-house development staff to create prototypes of custom applications that will be used in the branches to store and process customer information. The company plans to develop the applications internally using PowerBuilder™, the Microsoft Visual Basic™ programming system, and possibly the Microsoft Visual C++™ development system.[4¯C @G ' €h€ČR˜€‚ÿFlexibility, Productivity Among Expected Benefitsl?åF ¬I - (€€°˜€€€‚‚ÿNationwide expects greater flexibility to be a major benefit of its Windows NT-based system. "The more flexible we are in our technological infrastructure, the more Nationwide can concentrate on developing competitive products and services," Dr. Feldman points out.Nationwide also believes the system will make it easier to manage data, enhancing the productivity of the company's staff. "In a client-server environment," says Dr. Feldman, "data are not hidden in large mainframe applications." The result: people can accomplish more with less effort--and in less time.=@G éJ , &€#€°˜€€ €‚ÿAnd Nationwide is looking forward to extending the advantages of the Windows™ platform to its entire organization. According to Dr. Feldman, these advantages include reduced training costs and time, greater ease of use, and an improved image to Nationwide's customers.Q*¬I :K ' €T€ČR˜€‚ÿLooking Ahead: A World of PossibilitiesسéJ L % €g€˜€‚ÿ"Nationwide is planning to put Microsoft's technologies at the core of our next-generation client-server systems and, therefore, at the core of our future business strategies.";:K ‘L D X€v€‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿDr. Paul Feldman, Head of Technology Management Servicesu0L M E Z€`€°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿNationwide Building Society, Swindon, EnglandÑ‘L € 4 6€£€°˜€€€‚€€‚‚ÿWhile Nationwide's immediate objective is to get its Windows NT-based client-server system in place, the Building Society is already examining additional ways it can use the technology once it's implemented."We're talking to our automated teller machine vendors about putting Windows NT on our ATMs," says Dr. Feldman. Nationwide is also exploring the use of multimedia, voice recognition, and other advanced technologies. "Nationwide is focused on its customers as a fair organization to deal with, and one of the largest, safest places for their money," says Dr. Feldman. "We feel this system will help us do that by providing the very best technology to support our customers using our products and sM € Š ervices."óÇM
 , &€€°˜€€€‚ÿNationwide's choice of Windows NT is an extension of the company's belief in Microsoft products. "They're based on the very best technology," says Dr. Feldman. "You know they are going to work."1€ ; 1Zÿÿÿÿÿÿÿÿqÿÿÿÿ; d )
 d & €€¼˜˜€"‚ÿc2; ǁ 15ÿÿÿÿ|Arǁ "‚ &… Overview of the Windows NT Networking Architecture[5d "‚ & €j€°°˜€‚ÿOverview of the Windows NT Networking ArchitectureÖǁ *„ 2 2€­€°˜€€€€€‚ÿBecause most new personal computers are installed on networks, the Microsoft® Windows NT™ operating system has been designed to integrate the essential components for managing a network and the applications running on it. Modular network architecture makes the Windows NT built-in networking services protocol-independent, so Windows NT can be implemented in any environment. Networking in Windows NT includes built-in peer file, print, and distributed services. ü¦"‚ &… V z€M€˜˜âålv€
‰€‚ãý1SJ€
‰€+‚ãâ! €
‰€‚ã\¥µ½€
‰€‚ÿDiagram of Windows NT Networking ArchitectureMore About the Windows NT Networking ArchitectureMicrosoft TCP/IP StrategyFrequently Asked QuestionsS"*„ y… 1Îÿÿÿÿÿÿÿÿsÿÿÿÿy… ô† Diagram of Windows NT ArchitectureI"&… … ' €D€ČR˜€‚ÿWindows NT Network Architecture2y… ô… . ,€
€°˜€†"€‚ÿÚ… ô† & €µ€°˜€‚ÿThe Windows NT architecture provides a plug-and-play framework for networking protocols. TCP/IP represents just one of several protocols which can be used to offer the capabilities of Windows NT Networking services.b1ô… V‡ 1 ÊAñ†AtV‡ ±‡ ~Á More About the Windows NT Networking Architecture[4ô† ±‡ ' €h€˜ŒR˜€‚ÿMore About the Windows NT Networking ArchitectureߣV‡ ‰ < F€G€°°˜â# ?²€
‰€â
£ÅC€
‰€‚ÿSTREAMS is a mechanism for building portable networking protocols in a modular fashion, allowing them to be ported to Windows NT quickly and easily. The Windows NT TCP/IP protocol and the Windows NT built-in NWLink software (IPX/SPX protocol support) are both based on the STREAMS architecture. Several vendors and researchers are moving other networking protocols to Windows NT using the STREAMS environment.m;±‡ ý‹ 2 2€w€°˜€â=ͯ€
‰€‚ÿIn addition to offering transparent access to Windows NT, Windows for Workgroups, and LAN Manager systems, TCP/IP protocol software is shared by applications used to access non-Microsoft systems in the enterprise. Using the standard built-in Windows Sockets, RPC, and NetBIOS interfaces, TCP/IP can also be used to access hundreds of different types of systems supporting various TCP/IP-based applications. Windows NT comes with thirteen TCP/IP-based utilities, facilitating basic terminal emulation, file transfer, and remote process execution on remote systems. j>‰ gŽ , &€}€°˜€€ €‚ÿThe Windows Sockets, RPC, and NetBIOS interfaces make Windows NT a great platform for heterogeneous client-server computing. For example, you could use Windows Sockets to write a Windows-based front end for your SunOS-based inventory system. The OSF/DCE RPC interface could be used to give an Ultrix® client to access your Windows NT-based market analysis system over TCP/IP. NetBIOS could provide a solution to a PC document-routing dilemma. By providing industry-standard network programming interfaces, Windows NT is the ideal participant in your enterprise network. Ùý‹ ~Á 2 2€³€°˜€â0œ=€
‰€‚ÿThe inclusion of TCP/IP with Windows NT makes it an excellent scalable internetworking framework for enterprise networks. The Windows NT transport-independent architecture makes Windows NT Networking services available over TCP/IP without encapsulation. Windows NT includes common TCP/IP utilities, allowing users to connect to non-Microsoft TCP/IP-basedgŽ ~Á ô† systems. Additionally, Microsoft is working with dozens of independent software vendors through a development relations group offering development support of advanced TCP/IP networking applications and utilities which will be made readily available to Windows NT customers later this year. Products to be released include X Windows, NFS, terminal emulators, and more.T#gŽ ÒÁ 1™ÿÿÿÿÿÿÿÿuÿÿÿÿÒÁ Ä Networking: The Streams Environment1
~Á  ' €€ČR˜€‚ÿStreamsîÒÁ Ä & €Ý€°˜€‚ÿThe STREAMS environment interacts on two levels of network service abstraction: the Transport Driver Interface (or TDI) at the top, and the Network Driver Interface (or NDIS) at the bottom. These standard interfaces make a true mix-and-match networking environment. Network protocols are written to the NDIS interface exposed by network drivers. By exposing the TDI interface, network protocols (such as TCP/IP) can be used to support the built-in networking services offered by Windows NT. @ WÄ 1:ÿÿÿÿÿÿÿÿvÿÿÿÿWÄ QÆ Windows Sockets9Ä Ä ' €$€ČR˜€‚ÿWindows SocketsÁ›WÄ QÆ & €7€°˜€‚ÿThe Windows Sockets interface is compatible with Windows-based TCP/IP utilities from more than thirty vendors, including X Windows, sophisticated terminal emulation, NFS (client and server), and electronic mail packages. Windows NT offers both 16- and 32-bit Windows Sockets compatibility, so applications written for Windows 3.x Windows Sockets can run over Windows NT without modification or recompilation.JÄ ›Æ 1 ÿÿÿÿÿÿÿÿwÿÿÿÿ›Æ ]Ê Networking: Encapsulation7QÆ ÒÆ ' € €ČR˜€‚ÿEncapsulation›u›Æ mÉ & €ë€˜˜€‚ÿOther network operating systems are often designed in a "monolithic" fashion, which means that their networking services are tightly coupled with a specific set of networking protocols. For example, Apple Computer AppleShare services are tied into the family of AppleTalk protocols, and Novell NetWare relies on the presence of IPX/SPX. To be effective in routed TCP/IP internetworks, these network operating systems must "encapsulate" their proprietary protocols into TCP/IP packets for reliable delivery. Encapsulation schemes treat the native protocols as data by TCP/IP, "wrapped" and "unwrapped" by specialized software. ðÇÒÆ ]Ê ) €€°˜€€ ‚ÿThe process of encapsulation degrades throughput and performance of networking services, and scales poorly in internetworked environments. Windows NT Networking services have no such restriction.JmÉ §Ê 1 |AÌBx§Ê êÊ !Microsoft TCP/IP StrategyC]Ê êÊ ' €8€˜ŒR˜€‚ÿMicrosoft TCP/IP Strategy²‹§Ê œË ' €€°°˜€‚ÿMicrosoft has adopted the TCP/IP protocol suite as its strategic enterprise-internetworking protocol for Windows NT Networking services.N êÊ êË . ,€@€°˜âjU©¢€
‰€‚ÿDiagram of TCP/IP Strategy!ûœË Í & €÷€˜˜€‚ÿMicrosoft offers TCP/IP support with its Windows NT, Windows for Workgroups, and LAN Manager networking products today, and will continue to integrate this technology with future products as appropriate. There are many ways to use Microsoft TCP/IP:(óêË 3Ï 5 8€ç€T˜‘€4„Æ€€ƒ€
€‚ÿ·Scalable Windows NT Networking services: Microsoft TCP/IP provides Windows NT Networking services with a set of proven network protocols based on open standards. TCP/IP offers a scalable internetworking technology widely supported by networking hardware and software vendors. Because TCP/IP is the enterprise networking protocol, Windows NT, Windows for Workgroups and LAN Manager customers are able to integrate Microsoft networking solutions in their existing internetwork infrastructures.°{ Í ï!5 8€÷€T˜‘€4„Æ€€ƒ€
€‚ÿ·Connectivity in mixed environments: Microsoft TCP/IP provides an interoperable heterogeneous networking framework. Most modern operating systems s3Ï ï!]Ê upport the TCP/IP protocols. Mixed systems can share information using simple networking applications and utilities. Thirteen of these common connectivity applications come bundled with Windows NT offering file transfer, remote process execution, and terminal emulation. Additional TCP/IP applications are available in the public domain and through third parties both as 16- and 32-bit Windows-based applications taking advantage of the industry-standard Windows Sockets interface..ù3Ï !5 8€ó€T°‘€4„Æ€€ƒ€
€‚ÿ·Client-Server application development: Microsoft TCP/IP and Windows Sockets offer an excellent cross-platform client-server development framework. TCP/IP is present in enterprise networks across dozens of operating systems. Applications written to the Windows Sockets standard enable TCP/IP-aware network applications to run over any compliant vendor's TCP/IP implementation. Windows Sockets is part of the Microsoft WOSA initiative and is supported by over thirty vendors in the TCP/IP community.Kï!h!1˜ÿÿÿÿÿÿÿÿyÿÿÿÿh!µ!Diagram of TCP/IP StrategyD!¬!' €:€ČR˜€‚ÿDiagram of TCP/IP Strategy×±h!ƒ!& €c€°˜€‚ÿMicrosoft TCP/IP strategy centers on providing a solid foundation of core protocol technology on which a wide variety of applications and connectivity utilities can be built.2¬!µ!. ,€
€°˜€†"€‚ÿm<ƒ!"!1*ñ†Aÿÿÿÿz"!f!_ !Frequently Asked Questions About Microsoft's TCP/IP StrategyDµ!f!' €:€˜ŒR˜€‚ÿFrequently Asked Questions”d"!ú!0 0€È€V°°È:€
âÚ¬µú‰€‚ÿQ: I've heard that Microsoft is developing a TCP/IP VxD (virtual device driver), is this true?eðf!_ !u ¸€á€T°È:€
âÛ¬µú‰‚âܬµú‰€‚€
âݬµú‰€‚€
âÞ¬µú‰€‚€
â߬µú‰€‚€
âଵú€€
‰‚âᬵú‰‚ÿQ: Does Windows NT come with NFS support?Q: When will Microsoft provide Windows-based TCP/IP utilities?Q: When will Microsoft deliver the common UNIX-style TCP/IP servers (daemons) such as FTPd and Telnetd on Windows NT?Q: What does Windows Sockets offer the Windows NT user?Q: Can I use BOOTP with my Windows NT system?Q: Can I use my Windows NT system as an IP router?Q: Our engineering department uses X Windows heavily, can I run X applications on Windows NT?Eú!¤ !1
ÿÿÿÿÿÿÿÿ{ÿÿÿÿ¤ !i !Networking Answer #1Å•_ !i !0 .€+€T°‘€s€
ƒ€€
‚ÿA:Yes, Microsoft has been developing a TCP/IP VxD for over a year now, and plans to make this technology available to Windows for  Workgroups 3.11 and Chicago users as soon as it is ready. The new stack will enter preliminary beta by year-end '93 and plans to ship in the first half of '94. Packaging plans have not been formalized, but we will make this technology available as soon as it is ready.E¤ !® !1µÿÿÿÿÿÿÿÿ|ÿÿÿÿ® !!Networking Answer #2p@i !!0 .€€T°‘€s€
ƒ€€
‚ÿA:Windows NT, with its built-in TCP/IP support, provides a great framework for NFS, although we have chosen not to offer NFS support in the product. Microsoft is cooperating with third parties to provide quality NFS clients and servers under Windows NT this year. Our open networking architecture makes it easier for third parties to bring existing NFS implementations to Windows NT. We support their efforts, and will communicate the availability and details of their products as they become available. Both SunSelect and FTP Software, leaders in PC-based NFS solutions, are committed to providing NFS solutions on Windows NT and have demonstrated initial technologies at several trade events. Other TCP/IP solution companies such as Frontier Technologies, Beame and Whiteside, and NetManage have announced similar solutions.E® !c!1ÿÿÿÿÿÿÿÿ}ÿÿÿÿc!5B!Networking Answer #3Æ™!5B!- (€3€T°‘€s€
€ƒ‚ÿA:Microsoft has no firm plans to package graphical TCP/IP utilities with its products at this time. Users havc!5B!!e different needs, preferences and demands from their connectivity applications. With over thirty vendors committed to the Windows Sockets effort and several quality applications and utilities emerging every month, we feel that these vendors are addressing our customers' needs effectively. In the event our customers indicate otherwise, we will re-evaluate our decision. We will remain focused on providing an extremely reliable and compatible TCP/IP transport and Windows Sockets interface so that these applications run seamlessly on our platforms.Ec!zB!1)ÿÿÿÿÿÿÿÿ~ÿÿÿÿzB!^G!Networking Answer #4ôÇ5B!nE!- (€€T˜‘€s€
€ƒ‚ÿA:Flexibility was the most important requirement of our Windows NT networking design. Our primary focus was to build excellent transport-independent networking services into the system and to offer a suitable framework to facilitate connectivity to non-Microsoft systems. In its initial release, Windows NT offers an extremely flexible TCP/IP architecture, and basic utilities to connect to other system. Our framework, coupled with the Windows Sockets interface, makes it extremely easy for third parties to port their existing services into this environment, or to develop new ones. As the operating system matures, we will increase our support for the networking applications that our customers demand. ðÉzB!^G!' €“€°‘€€‚ÿWindows NT and Windows NT Advanced Server do come with the Microsoft FTP Server service. This service supports all of the common FTP commands documented in RFC 959, and has some nice feature enhancements such as directory annotation and a graphical User Manager tool. The Microsoft support organization (PSS) is using this multithreaded FTP Server to provide updates and access to the Microsoft Knowledgeable to users on the Internet. (ftp.microsoft.com)EnE!£G!1gÿÿÿÿÿÿÿÿÿÿÿÿ£G!ÅJ!Networking Answer #5"é^G!ÅJ!9 @€Ó€T°‘€s€
€ƒ€€€
€‚ÿA:Windows Sockets is an open standard which provides a binary compatible interface for networking applications. This standard allows network application vendors to write their application to a single common interface and build a single executable (or binary) which can run over many vendors' TCP/IP implementations. Windows NT offers both 16- and 32-bit Windows Sockets support. Applications written to Win32 should take advantage of the native Windows Sockets 32-bit interface. Applications written to Windows Sockets under Windows 3.1 can run unmodified under Windows NT. In fact, a 16-bit X Windows server written to Windows Sockets under Windows 3.1, has been demonstrated running unmodified under Windows NT on a MIPS R4000 system!E£G!
K!1ãÿÿÿÿÿÿÿÿ€ÿÿÿÿ
K!¨O!Networking Answer #6žqÅJ!¨O!- (€ã€T°‘€s€
€ƒ‚ÿA:We recognize that the maintenance of IP addresses and TCP/IP configuration is cumbersome for both users and network administrators. However, the BOOTP protocol (the bootstrap protocol) was designed primarily as a facility to boot an operating system remotely from a diskless workstation. TCP/IP configuration is only a part of the remote boot procedure. As a result, BOOTP merely shifts the entire management burden of IP addresses from end-user to administrators. Although a step in the right direction, we feel that BOOTP does not adequately satisfy our goals for simplifying network management. We are working with the IETF (Internet Engineering Task Force) to help establish the Dynamic Host Configuration Protocol (or DHCP). This open standard is designed with the explicit goal of truly simple TCP/IP configuration management for the enterprise. We plan to implement and offer this technology as the details become finalized. In fact, Microsoft organized an interoperability event at this year's Interop to test the interoperability of preliminary DHCP implementations between different vendors which met with great success.E
K! €!1:ÿÿÿÿÿÿÿÿÿÿÿÿ €!(ƒ!Networking Answer #7¨O! €!¨O!é¨O!(ƒ!3 4€Ó€T°‘€s€
€ƒ€#€‚ÿA:Windows NT supports IP routing in systems with multiple network adapters attached to separate physical networks (generally called multihomed systems). Although the initial release of Windows NT will not support router-router protocols like RIP (Routing Information Protocol) or OSPF (Open Shortest Path First), it can route IP packets between locally attached networks on multihomed systems. Microsoft has prepared a technical document entitled "Advanced Internetworking with Windows NT" for network administrators who want this functionality from Windows NT today, and we are investigating router-router protocols for future releases. The document can be acquired through PSS and has been incorporated into the Windows NT Resource Kit.E €!mƒ!1ïÿÿÿÿÿÿÿÿ‚ÿÿÿÿmƒ!‡!Networking Answer #8ªw(ƒ!‡!3 4€ï€T°‘€s€
ƒ€€€‚ÿA:X Windows is a graphical distributed computing model developed at MIT. With X Windows, an application which runs on a server system is called the client, which sends commands over the network to display its results on the X Windows server. In many networks, dedicated hardware systems known as X Terminals provide the X display software and hardware to display remote X clients on a user's desk. Third parties are developing X Windows server solutions for Windows NT. This software will enable users to use Windows NT as a high-powered X server platform while retaining compatibility with Windows NT, Windows 3.1 and MS-DOS applications on the same system. Other third parties are developing X Windows client libraries for Windows NT, so developers can write X client applications on Windows NT which can be run and displayed remotely on systems providing X server capabilities.1mƒ!H‡!1YÿÿÿÿÿÿÿÿƒÿÿÿÿH‡!p‡!(‡!p‡!% €€°˜€‚ÿ1H‡!¡‡!1Eÿÿÿÿÿÿÿÿ„ÿÿÿÿ¡‡!µˆ!H p‡!é‡!( €@€˜°€7€8‚ÿ>>| Suggested Next Subject̂¡‡!µˆ!J b€€˜˜˜ã¯Ð/J€
‰€ ‚ã|0j€
‰€ ‚ã5*ù€€
‰€ ‚ÿIntegrating Windows NT and SNA EnviornmentsIntegrating Windows NT and Host DBMSWindows NT as an Application Server1é‡!æˆ!1Iÿÿÿÿÿÿÿÿ…ÿÿÿÿæˆ!þ‰!H µˆ!.‰!( €@€˜°€7€8‚ÿ>>| Suggested Next SubjectІæˆ!þ‰!J b€
€˜˜˜ã
>…€
‰€ ‚ãì­Ô¦€
‰€ ‚ã5*ù€€
‰€ ‚ÿIntegrating Windows Digital Equipment Corp PathworksIntegrating Windows NT and UNIXWindows NT as an Application Server1.‰!/Š!1ÿÿÿÿÿÿÿÿ†ÿÿÿÿ/Š!‹!H þ‰!wŠ!( €@€˜°€7€8‚ÿ>>| Suggested Next SubjectŸV/Š!‹!I b€¬€˜˜˜ãì­Ô¦€
‰€ ‚ãÔÂS€
‰€ ‚ãƑÄÀ€
‰€ ‚ÿIntegrating Windows NT and UNIXWindows NT ArchitectureSystem Roadtests1wŠ!G‹!17ÿÿÿÿÿÿÿÿ‡ÿÿÿÿG‹!MŒ!H ‹!‹!( €@€˜°€7€8‚ÿ>>| Suggested Next Subject¾uG‹!MŒ!I b€ê€˜˜˜ãâqŒ€
‰€ ‚ã5*ù€€
‰€ ‚ã@ %݀
‰€ ‚ÿComparing Windows NT and UNIXWindows NT as an Application ServerWindows NT as a File and Print Server1‹!~Œ!1ÿÿÿÿÿÿÿÿˆÿÿÿÿ~Œ!U!H MŒ!ƌ!( €@€˜°€7€8‚ÿ>>| Suggested Next SubjectS~Œ!U!< H€¦€˜˜˜ã5*ù€€
‰€ ‚ã@ %݀
‰€ ‚ÿWindows NT as an Application ServerWindows NT as a File and Print Server1ƌ!†!16ÿÿÿÿÿÿÿÿ‰ÿÿÿÿ†!‹Ž!GU!͍!( €>€˜°€7€8‚ÿ>>| Suggested Next Subject¾u†!‹Ž!I b€ê€˜˜˜ã5*ù€€
‰€ ‚ã@ %݀
‰€ ‚ãâqŒ€
‰€ ‚ÿWindows NT as an Application ServerWindows NT as a File and Print ServerComparing Windows NT and UNIX1͍!¼Ž!12ÿÿÿÿÿÿÿÿŠÿÿÿÿ¼Ž!½!G‹Ž!!( €>€˜°€7€8‚ÿ>>| Suggested Next Subjectºq¼Ž!½!I b€â€˜˜˜ã5*ù€€
‰€ ‚ã@ %݀
‰€ ‚ãÂQ€
‰€ ‚ÿWindows NT as an Application ServerWindows NT as a File and Print ServerSQL Server for Windows NT1! À!14ÿÿÿÿÿÿÿÿ‹ÿÿÿÿ À!Á!½! À!½!G½!SÀ!( €>€˜°€7€8‚ÿ>>| Suggested Next Subject¼s À!Á!I b€æ€˜˜˜ã5*ù€€
‰€ ‚ã@ %݀
‰€ ‚ãx€
‰€ ‚ÿWindows NT as an Application ServerWindows NT as a File and Print ServerComparing Windows NT to VMS1SÀ!@Á!1ÿÿÿÿÿÿÿÿÿŒÿÿÿÿ@Á!Â!GÁ!‡Á!( €>€˜°€7€8‚ÿ>>| Suggested Next Subject‡K@Á!Â!< H€–€˜˜˜ã|0j€
‰€ ‚ãIlG¸€
‰€ ‚ÿIntegrating Windows NT and Host DBMSComparing Windows NT to OS/21‡Á!?Â!1=ÿÿÿÿÿÿÿÿÿÿÿÿ?Â!KÃ!GÂ!†Â!( €>€˜°€7€8‚ÿ>>| Suggested Next SubjectÅ|?Â!KÃ!I b€ø€˜˜˜ã|0j€
‰€ ‚ãÂQ€
‰€ ‚ã¯Ð/J€
‰€ ‚ÿIntegrating Windows NT and Host DBMSSQL Server for Windows NtIntegrating Windows NT and IBM SNA Enviornments1†Â!|Ã!14ÿÿÿÿÿÿÿÿŽÿÿÿÿ|Ã!Ä!GKÃ!ÃÃ!( €>€˜°€7€8‚ÿ>>| Suggested Next Subject¼s|Ã!Ä!I b€æ€˜˜˜ã5*ù€€
‰€ ‚ã®Ñ¡¼€
‰€ ‚ãœh¤w€
‰€ ‚ÿWindows NT as an Application ServerIntegrating Windows NT and Novell NetWareWindows NT Key Features1ÃÃ!°Ä!1.ÿÿÿÿÿÿÿÿÿÿÿÿ°Ä!­Å!GÄ!÷Ä!( €>€˜°€7€8‚ÿ>>| Suggested Next Subject¶m°Ä!­Å!I b€Ú€˜˜˜ãâqŒ€
‰€ ‚ã®Ñ¡¼€
‰€ ‚ãœh¤w€
‰€ ‚ÿComparing Windows NT and UNIXIntegrating Windows NT and Novell NetWareWindows NT Key Features1÷Ä!ÞÅ!10ÿÿÿÿÿÿÿÿÿÿÿÿÞÅ!ÝÆ!G­Å!%Æ!( €>€˜°€7€8‚ÿ>>| Suggested Next Subject¸oÞÅ!ÝÆ!I b€Þ€˜˜˜ã5*ù€€
‰€ ‚ã@ %݀
‰€ ‚ãœh¤w€
‰€ ‚ÿWindows NT as an Application ServerWindows NT as a File and Print ServerWindows NT Key Features1%Æ!Ç!1íÿÿÿÿÿÿÿÿ‘ÿÿÿÿÇ!ÊÇ!GÝÆ!UÇ!( €>€˜°€7€8‚ÿ>>| Suggested Next Subjectu9Ç!ÊÇ!< H€r€˜˜˜ãÔÂS€
‰€ ‚ãœh¤w€
‰€ ‚ÿWindows NT ArchitectureWindows NT Key Features1UÇ!ûÇ!1ñÿÿÿÿÿÿÿÿ’ÿÿÿÿûÇ!»È!GÊÇ!BÈ!( €>€˜°€7€8‚ÿ>>| Suggested Next Subjecty=ûÇ!»È!< H€z€˜˜˜ãœh¤w€
‰€ ‚ã@ì¿]€
‰€ ‚ÿWindows NT Key FeaturesWindows NT Key Technologies1BÈ!ìÈ!1ÿÿÿÿÿÿÿÿ“ÿÿÿÿìÈ!×É!G»È!3É!( €>€˜°€7€8‚ÿ>>| Suggested Next Subject¤[ìÈ!×É!I b€¶€˜˜˜ãœh¤w€
‰€ ‚ã@ì¿]€
‰€ ‚ãÂQ€
‰€ ‚ÿWindows NT Key FeaturesWindows NT Key TechnologiesSQL Server for Windows Nt13É!Ê!1õÿÿÿÿÿÿÿÿ”ÿÿÿÿÊ!ÌÊ!G×É!OÊ!( €>€˜°€7€8‚ÿ>>| Suggested Next Subject}AÊ!ÌÊ!< H€‚€˜˜˜ãœh¤w€
‰€ ‚ãƑÄÀ€
‰€ ‚ÿWindows NT Key FeaturesSystem Road Test for Evaluation1OÊ!ýÊ!1-ÿÿÿÿÿÿÿÿ•ÿÿÿÿýÊ!ùË!GÌÊ!DË!( €>€˜°€7€8‚ÿ>>| Suggested Next SubjectµlýÊ!ùË!I b€Ø€˜˜˜ãÂQ€
‰€ ‚ã7MôĀ
‰€ ‚ã|0j€
‰€ ‚ÿSQL Server for Windows NtOther Microsoft Server ProductsIntegrating Windows NT and Host DBMS1DË!*Ì!11ÿÿÿÿÿÿÿÿ–ÿÿÿÿ*Ì!*Í!GùË!qÌ!( €>€˜°€7€8‚ÿ>>| Suggested Next Subject¹p*Ì!*Í!I b€à€˜˜˜ã5*ù€€
‰€ ‚ã|0j€
‰€ ‚ãïð[ñ€
‰€ ‚ÿWindows NT as an Application ServerIntegrating Windows NT and Host DBMSWindows NT Administration1qÌ![Í!1>ÿÿÿÿÿÿÿÿ—ÿÿÿÿ[Í!hÎ!H *Í!£Í!( €@€˜°€7€8‚ÿ>>| Suggested Next SubjectÅ|[Í!hÎ!I b€ø€˜˜˜ã¯Ð/J€
‰€ ‚ã|0j€
‰€ ‚ãIlG¸€
‰€ ‚ÿIntegrating Windows NT and SNA EnviornmentsIntegrating Windows NT and Host DBMSComparing Windows NT and OS/21£Í!™Î!1ÿÿÿÿÿÿÿÿ˜ÿÿÿÿ™Î!mÏ!H hÎ!áÎ!( €@€˜°€7€8‚ÿ>>| Suggested Next SubjectŒP™Î!mÏ!< H€ €˜˜˜ã@ì¿]€
‰€ ‚㥪ê€
‰€ ‚ÿWindows NT Key TechnologiesOther Sources of Information on Windows NT1áÎ!žÏ!1fÿÿÿÿÿÿÿÿ™ÿÿÿÿžÏ!»"GmÏ! "( €>€˜°€7€8‚ÿ>>| Suggested Next SubjectžÏ! "mÏ!¯fžÏ!»"I b€Ì€˜˜˜ãâqŒ€
‰€ ‚ãIlG¸€
‰€ ‚ãx€
‰€ ‚ÿComparing Windows NT and UNIXComparing Windows NT and OS/2Comparing Windows NT and VMS1 "ì"1ÿÿÿÿÿÿÿÿÿšÿÿÿÿì"º"G»"3"( €>€˜°€7€8‚ÿ>>| Suggested Next Subject‡Kì"º"< H€–€˜˜˜ãâW€€
‰€ ‚ã½cÞ¿€
‰€ ‚ÿWindows Open Services ArchitectureAn Overview of Windows Objects13"ë"1ÿÿÿÿÿÿÿÿÿ›ÿÿÿÿë"¹"Gº"2"( €>€˜°€7€8‚ÿ>>| Suggested Next Subject‡Në"¹"9 B€œ€˜˜˜ã½cÞ¿€
‰€ ‚ãÿpŸ€
‰‚ÿAn Overview of Windows ObjectsAn Overview of Client Server Computing12"ê"1"ÿÿÿÿÿÿÿÿœÿÿÿÿê"Û"G¹"1"( €>€˜°€7€8‚ÿ>>| Suggested Next Subjectªaê"Û"I b€Â€˜˜˜ãÂQ€
‰€ ‚ãYJe,€
‰€ ‚ã7MôĀ
‰€ ‚ÿSQL Server for Windows NtSNA Server for Windows NTOther Microsoft Server Products11" "1Zÿÿÿÿÿÿÿÿÿÿÿÿ "5")Û"5"& €€˜˜˜€ ‚ÿ‘` "Æ"1ÿÿÿÿ#DžÆ""â"National League For Health Care - Case StudyCBB("btn_next_index", "PI(`nteval.hlp', `next_5')")H"5""& €D€°°˜€‚ÿNational League for Health Care6Æ"D"3 4€€°°˜€€!€€ €‚ÿIn a pioneering use of the Microsoft® Windows NT™ operating system, the National League for Health Care has developed the first automated system for nursing school accreditation--and in the process is leading the way to more cost-effective health care.V$"š"2 4€H€°˜ãfš>¯€
‰‚ãqú/¡‰‚ÿSolution SummaryCase DetailsHD"â". ,€4€˜˜âÌï€
‰€‚ÿFor More Informationc2š"E"1ÀDtDŸE"Ÿ"„ "National League For Health Care - Solution SummaryZ3â"Ÿ"' €f€˜ŒR˜€‚ÿNational League For Health Care Solution Summary0 E"Ï"% €€°˜€‚ÿIndustry3Ÿ""% €€°˜€‚ÿHealth care8Ï":"$ €(€˜€‚ÿBusiness SolutionN)"ˆ"% €R€°˜€‚ÿAutomated information retrieval system3:"»"$ €€˜€‚ÿArchitecture^9ˆ" "% €r€°˜€‚ÿWindows NT-based network accessing SQL Server database8»"Q "' €"€˜€€‚ÿProducts Usedm@ "¾ "- *€€€°˜€€ €‚ÿMicrosoft Access®Microsoft SQL ServerMicrosoft Windows NT@Q "þ "' €2€˜€
€‚ÿDevelopment Resources£}¾ "¡
"& €ú€°˜€‚ÿMediaServ, New York network consultantMicrosoft Solution Provider; PCSI, New Jersey-based database and network consultant/ þ "Ð
"$ €€˜€‚ÿBenefits´Ž¡
"„ "& €€°˜€‚ÿReduced day-long information search to less than 10 minutes; potential for expanding system to nationwide health care information resource._.Ð
"ã "1‹!#Dÿÿÿÿ ã "9 "‹"National League For Health Care - Case DetailsV/„ "9 "' €^€˜ŒR˜€‚ÿNational League For Health Care Case Details˜qã "Ñ
"' €ã€°°˜€‚ÿThe National League for Nursing accredits some 2000 schools of nursing in the United States. A division of the National League for Health Care (NLHC), the National League for Nursing periodically inspects each nursing school and publishes the information it compiles in a large book that is used by NLHC staffers to answer telephone questions about nursing programs.hA9 "E@"' €ƒ€°˜€‚‚ÿRecently, the need for alternative, more affordable forms of health care has caused a renewed interest in nursing schools. As a result, NLHC's job has grown more complex, so the organization decided to make its operation more efficient than the manual book-based approach allowed."We wanted to automate the process," says Arthur Tisi, NLHC director of Information Systems. "Our goal was to take a lot of free-form text and turn it into logic--to create fields that would allow us to do fast searches and queries on speÑ
"E@"„ "cific categories of information about various schools."àºÑ
"%A"& €u€°˜€‚ÿTisi says automation will enable NLHC to reduce the amount of time between accreditation interviews, allowing it to present more up-to-date information about the schools it accredits.g@E@"ŒA"' €€€ČR˜€‚ÿCriteria for a Solution: Cost, Performance, and ExpandabilityÊs%A"VD"W |€ç€°˜€€!€‚€!€€!€â•õì€
‰€€!€€!€€!€‚ÿWorking with a $2.2 million grant, Tisi was most concerned about the cost of NLHC's computerized database. He also wanted a system that would offer high performance, easy updating and expansion, reliability, and compatibility with the organizations existing OS/2®-Microsoft LAN Manager network. With these criteria in mind, Tisi soon narrowed his search to four choices: a mainframe database, SYBASE® running on a UNIX® or RISC Hewlett-Packard® computer, a 16-bit version of Paradox® or FoxBASE® running on the existing LAN, or a Windows NT-based network with a customized front end and a database back end.(üŒA"~E", &€ù€°˜€€!€‚ÿTisi ultimately decided the mainframe would be too limiting, UNIX too expensive, and the standard LAN too slow. The solution: the Windows NT operating system with a Microsoft Access® front end directing queries to a Microsoft SQL Server database. N'VD"ÌE"' €N€ČR˜€‚ÿWindows NT: The Lowest-Cost Solutionf~E"YH"' €Í€°˜€‚‚ÿAccording to Tisi, NLHC determined that Windows NT would save 40 per-cent on the server side and 30 percent to 35 percent per client compared to UNIX, the leading alternative choice. He says NLHC plans to use eight servers based on the Windows NT platform connected to 500 workstations.The organization was also swayed by the large development support for Windows NT. "It [Windows NT] obviously has more support than OS/2 and other alternatives," says Tisi. Usability was also a factor. "It's important that users can switch back and forth between our application and other productivity applications," he says.5ÌE"ŽJ"2 2€€°˜€ât9€
‰€‚ÿTisi says another major issue was training. "One of the biggest strengths of Windows NT is that it mirrors what we've been doing in the Windows operating system. There isn't a learning curve because the interface is the same on both platforms," he says, pointing out that Windows NT also "hides" the network functionality with a friendly front end. "Users aren't concerned with things like multiple domains. They just care that they can easily access the information they need to do their jobs," he explains.åYH"žK"+ $€Ë€˜€€9€‚ÿ"Next to cost, our chief concern is performance. That's why we're experimenting with running Windows NT on a Sequent® multiprocessor unit. We think that will give us the high-speed processing we'll need as the system grows."z5ŽJ"L"E Z€j€°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿArthur Tisi, Director of Information Systems, NLHCa:žK"yL"' €t€ČR˜€‚ÿMicrosoft Solution Provider Supplies Crucial AssistanceïL"O"' €ß€°˜€‚‚ÿThe National League for Health Care worked with MediaServ, a New York network consulting firm and Microsoft Solution Provider, to integrate Windows NT into the organization's existing OS/2-Microsoft LAN Manager network. MediaServ provided guidance on the overall installation of Windows NT, helped connect servers based on the Windows NT platform with the rest of the enterprise, and trained NLHC people on Microsoft products.NLHC also worked closely with New Jersey-based database applications developer PCSI from the onset of this development cycle. PCSI President Ben Tandowski and his team were integral in developing the project's functional specifications and recommending the foundation technology of a SQL Server-based relational database.ByL"ÑO"' €6€ČR˜€‚ÿSaved by Computing PowerwQO"T‚"& €£€°˜€‚ÿThe beneÑO"T‚"„ "fits of the National League for Health Care's automated information system were immediate and dramatic. Tisi says the system's increased speed and greater efficiency literally makes it possible for NLHC to continue as a service organization. "The accreditation process is integral to our mission," says Tisi. "Continuing with a manual system would have been a disservice to the schools that put their trust in us." An information search that could take as long as an entire day with the organization's manual reference book-based method can now be performed in less than 10 minutes.Û´ÑO"/„"' €i€°˜€‚‚ÿ"Now when a caller asks which nursing schools in the Northeast are best suited to a student interested in pediatric oncology, we can not only provide several options immediately, but also related information, such as admission requirements and tuition," explains Tisi.The new ability to provide this added value to callers has prompted NLHC to consider turning the service into a revenue generator by charging per query or per item.e>T‚"”„"' €|€ČR˜€‚ÿA System That Can Help Make Health Care More Cost-EffectiveêÅ/„"~…"% €‹€˜€‚ÿ"Ultimately, we want the public to be able to call us for information on health care alternatives, no different from the way they might call their bar association for information about lawyers."•P”„"†"E Z€ €°‘€ž‰Ña©ñ9ÉY¡é1y€‚ÿArthur Tisi, Director of Information Systems, National League for Health Care~…"Ո"3 4€€°˜€‚€!€€ €‚ÿThe advantages of computerized information access, combined with a critical need for affordable health care, may lead NLHC to extend its database to consumers, providing them with a simple way to get current information about alternative means of health care.Tisi says NLHC is exploring a number of methods to deliver that information. For example, its database may be available on electronic information services such as CompuServe® and Prodigy™. "People could call in and find a nurse practitioner in their area," says Tisi. "Or a major employer could locate alternative medical insured programs that enable it to avoid paying high deductibles."B†"‹"' €7€°˜€‚‚ÿThe federal government is also interested in the system. "As the government gets more involved in health care and ways to fund programs, it's performing thorough cost-benefit analyses of equal care options," notes Tisi.What began as a way to automate nursing school accreditation data has expanded into a health care information system with far-reaching implications. The instant, easy-to-access information it provides may go a long way toward creating a more cost-effective health care system for people throughout the United States.1Ո"H‹"1Yÿÿÿÿÿÿÿÿ¡ÿÿÿÿH‹"p‹"(‹"p‹"% €€°˜€‚ÿ1H‹"¡‹"1Òÿÿÿÿÿÿÿÿ¢ÿÿÿÿ¡‹"BŒ"¡yp‹"BŒ"( €ò€PÈ:‚H€:ƒ‚ÿ1This device requires a driver from the \DRVLIB directory on the Windows NT CD-ROM, or the Windows NT Driver Library.1¡‹"sŒ"1Öÿÿÿÿÿÿÿÿ£ÿÿÿÿsŒ""¥}BŒ""( €ú€PÈ:‚H€:ƒ‚ÿ2This device requires a driver from the Windows NT driver library. See the following section on accessing these drivers.1sŒ"I"1¸ÿÿÿÿÿÿÿÿ¤ÿÿÿÿI"Ѝ"‡_"Ѝ"( €¾€PÈ:‚H€:ƒ‚ÿ3Refer to SETUP.TXT for information on configuring this machine/device before installation.1I"Ž"1¤ÿÿÿÿÿÿÿÿ¥ÿÿÿÿŽ"tŽ"sKЍ"tŽ"( €–€PÈ:‚H€:ƒ‚ÿ4Windows NT does not currently support Advanced Power Management (APM).1Ž"¥Ž"1ñÿÿÿÿÿÿÿÿ¦ÿÿÿÿ¥Ž"e"À—tŽ"e") €/€PÈ:‚H€:ƒ‚ÿ5This system requires an ABIOS.SYS driver dated after 11/1/93 to support IDE drives. Call Microsoft Product Support Services to obtain this update.1¥Ž"–"1­ÿÿÿÿÿÿÿÿ§ÿÿÿÿ–"À"|Te"À"( €¨€PÈ:‚H€:ƒ‚ÿ6Contact the manufacturer for information on running Windows NT –"À"e"on this machine.1–"OÀ"1Üÿÿÿÿÿÿÿÿ¨ÿÿÿÿOÀ"úÀ"«‚À"úÀ") €€PÈ:‚H€:ƒ‚ÿ7IDE drives greater than 500Mb are only supported with BIOS Version 1.23 or later, with BIOS setting for IDE in standard mode.1OÀ"+Á"1¡ÿÿÿÿÿÿÿÿ©ÿÿÿÿ+Á"›Á"pHúÀ"›Á"( €€PÈ:‚H€:ƒ‚ÿ8Only the NCR 53c710 SCSI Host Adapter is supported in this machine.1+Á"ÌÁ"1‹ÿÿÿÿÿÿÿÿªÿÿÿÿÌÁ"&Â"Z2›Á"&Â"( €d€PÈ:‚H€:ƒ‚ÿ9Tested with firmware revisions 3.10 and 3.20.1ÌÁ"WÂ"1Êÿÿÿÿÿÿÿÿ«ÿÿÿÿWÂ"ðÂ"™q&Â"ðÂ"( €â€PÈ:‚H€:ƒ‚ÿ10Problems may be encountered using SCSI Removable Media (cartridge) drives on this adapter on this platform.1WÂ"!Ã"1¡ÿÿÿÿÿÿÿÿ¬ÿÿÿÿ!Ã"‘Ã"pHðÂ"‘Ã"( €€PÈ:‚H€:ƒ‚ÿ11This adapter requires an active terminator for proper performance.1!Ã"ÂÃ"1Ëÿÿÿÿÿÿÿÿ­ÿÿÿÿÂÃ"\Ä"šr‘Ã"\Ä"( €ä€PÈ:‚H€:ƒ‚ÿ12This adapter must be configured for 5 MB/second asynchronous I/O to work with listed CD-ROM drives from NEC.1ÂÃ"Ä"1àÿÿÿÿÿÿÿÿ®ÿÿÿÿÄ"<Å"¯†\Ä"<Å") €
€PÈ:‚H€:ƒ‚ÿ13This adapter must be configured for 5 MB/second asynchronous I/O to work with listed CD-ROM drives from Chinon, Hitachi and NEC.1Ä"mÅ"1–ÿÿÿÿÿÿÿÿ¯ÿÿÿÿmÅ"ÒÅ"e=<Å"ÒÅ"( €z€PÈ:‚H€:ƒ‚ÿ14Tested with the Unisys PW2 Advantage 3256 (Flemington).1mÅ"Æ"1’ÿÿÿÿÿÿÿÿ°ÿÿÿÿÆ"dÆ"a9ÒÅ"dÆ"( €r€PÈ:‚H€:ƒ‚ÿ15Tested with the Unisys PW2 Advantage Plus MPE 4668.1Æ"•Æ"1Œÿÿÿÿÿÿÿÿ±ÿÿÿÿ•Æ"ðÆ"[3dÆ"ðÆ"( €f€PÈ:‚H€:ƒ‚ÿ16Scanners are not supported with this adapter.1•Æ"!Ç"1¤ÿÿÿÿÿÿÿÿ²ÿÿÿÿ!Ç"”Ç"sKðÆ"”Ç"( €–€PÈ:‚H€:ƒ‚ÿ17Removable media drives are not supported with cache module installed.1!Ç"ÅÇ"1§ÿÿÿÿÿÿÿÿ³ÿÿÿÿÅÇ";È"vN”Ç";È"( €œ€PÈ:‚H€:ƒ‚ÿ18CD-audio, tape drives and scanners are not supported on this controller.1ÅÇ"lÈ"1²ÿÿÿÿÿÿÿÿ´ÿÿÿÿlÈ"íÈ"Y;È"íÈ"( €²€PÈ:‚H€:ƒ‚ÿ19To use this adapter, at least one device on the bus must provide termination power.1lÈ"É"1žÿÿÿÿÿÿÿÿµÿÿÿÿÉ"‹É"mEíÈ"‹É"( €Š€PÈ:‚H€:ƒ‚ÿ20Refer to SETUP.TXT for information on configuring this adapter.1É"¼É"1²ÿÿÿÿÿÿÿÿ¶ÿÿÿÿ¼É"=Ê"Y‹É"=Ê"( €²€PÈ:‚H€:ƒ‚ÿ21SCSI BIOS dated before 1991 requires PS/2 Reference Diskette version 1.21 or later.1¼É"nÊ"1Ñÿÿÿÿÿÿÿÿ·ÿÿÿÿnÊ"Ë" x=Ê"Ë"( €ð€PÈ:‚H€:ƒ‚ÿ22This adapter cannot be used for CD Setup. To install Windows NT with this adapter, use the WINNT.EXE Setup method.1nÊ"?Ë"1€ÿÿÿÿÿÿÿÿ¸ÿÿÿÿ?Ë"ŽË"O'Ë"ŽË"( €N€PÈ:‚H€:ƒ‚ÿ23Tested with COMPAQ Portable 486c.1?Ë"¿Ë"1†ÿÿÿÿÿÿÿÿ¹ÿÿÿÿ¿Ë"Ì"U-ŽË"Ì"( €Z€PÈ:‚H€:ƒ‚ÿ24Tested with NCR System 3000 Model 3350.1¿Ë"EÌ"1‡ÿÿÿÿÿÿÿÿºÿÿÿÿEÌ"›Ì"V.Ì"›Ì"( €\€PÈ:‚H€:ƒ‚ÿ25This adapter is only supported on IRQ-5.1EÌ"ÌÌ"1¦ÿÿÿÿÿÿÿÿ»ÿÿÿÿÌÌ"AÍ"uM›Ì"AÍ"( €š€PÈ:‚H€:ƒ‚ÿ26This adapter is only supported for use with scanners and CD-ROM drives.1ÌÌ"rÍ"1ÿÿÿÿÿÿÿÿ¼ÿÿÿÿrÍ"ÂÍ"P(AÍ"ÂÍ"( €P€PÈ:‚H€:ƒ‚ÿ27Tested with firmware revision 005.1rÍ"óÍ"1ÿÿÿÿÿÿÿÿ½ÿÿÿÿóÍ"CÎ"P(ÂÍ"CÎ"( €P€PÈ:‚H€:ƒ‚ÿ28Tested with firmware revision 008.1óÍ"tÎ"1žÿÿÿÿÿÿÿÿ¾ÿÿÿÿtÎ"áÎ"mECÎ"áÎ"( €Š€PÈ:‚H€:ƒ‚ÿ29This drive is not supported for use with the Adaptec AHA-1542c.1tÎ"Ï"1¹ÿÿÿÿÿÿÿÿ¿ÿÿÿÿÏ"šÏ"ˆ`áÎ"šÏ"( €À€PÈ:‚H€:ƒ‚ÿ30This drive is not supported for use with the Future Domain TMC-850M and TMC-1670 adapters.1Ï"ËÏ"1ÀÿÿÿÿÿÿÿÿÀÿÿÿÿËÏ"Q#zRšÏ"Q#( €¤€PÈ:‚H€:ƒ‚ÿ31This drivËÏ"Q#šÏ"e requires double-termination when used with the Adaptec AHA-1742A.1ËÏ"‚#1 ÿÿÿÿÿÿÿÿÁÿÿÿÿ‚#Z#دQ#Z#) €_€PÈ:‚H€:ƒ‚ÿ32The Adaptec AHA-1640 and Ultrastor 24f support only a single disk when used with this drive. This drive is not supported for use with the Future Domain MCS-600 adapter.1‚#‹#1¥ÿÿÿÿÿÿÿÿÂÿÿÿÿ‹#ÿ#tLZ#ÿ#( €˜€PÈ:‚H€:ƒ‚ÿ33Requires firmware revision 1.10C to function properly with Windows NT.1‹#0#1­ÿÿÿÿÿÿÿÿÃÿÿÿÿ0#¬#|Tÿ#¬#( €¨€PÈ:‚H€:ƒ‚ÿ34Supported with CD-ROM drives based on Panasonic CR-52x and CR-56x models only.10#Ý#1ÿÿÿÿÿÿÿÿÄÿÿÿÿÝ#I#lD¬#I#( €ˆ€PÈ:‚H€:ƒ‚ÿ35This drive is not supported with the Adaptec AHA-1640 adapter.1Ý#z#1›ÿÿÿÿÿÿÿÿÅÿÿÿÿz#ä#jBI#ä#( €„€PÈ:‚H€:ƒ‚ÿ36Requires firmware version 484 or later for proper operation.1z##1¹ÿÿÿÿÿÿÿÿÆÿÿÿÿ##ˆ`ä##( €À€PÈ:‚H€:ƒ‚ÿ37This drive is not supported with the IBM PS/2 Microchannel SCSI Host Adapter (with cache).1#Î#1ŸÿÿÿÿÿÿÿÿÇÿÿÿÿÎ#<#nF#<#( €Œ€PÈ:‚H€:ƒ‚ÿ38This drive is not supported with the Future Domain TMC-850M(ER).1Î#m#1›ÿÿÿÿÿÿÿÿÈÿÿÿÿm#×#jB<#×#( €„€PÈ:‚H€:ƒ‚ÿ39This drive is not supported with the UltraStor 24fa adapter.1m##1žÿÿÿÿÿÿÿÿÉÿÿÿÿ#u#mE×#u#( €Š€PÈ:‚H€:ƒ‚ÿ40This drive is not supported with the Adaptec AHA-1742A adapter.1#¦#1ËÿÿÿÿÿÿÿÿÊÿÿÿÿ¦#@#šru#@#( €ä€PÈ:‚H€:ƒ‚ÿ41For use with floppy controllers. Separate interface controllers for these types of drives are not supported.1¦#q#1¨ÿÿÿÿÿÿÿÿËÿÿÿÿq#è#wO@#è#( €ž€PÈ:‚H€:ƒ‚ÿ42Requires that 512-byte sector-sized media be mounted during installation.1q##1uÿÿÿÿÿÿÿÿÌÿÿÿÿ#]#Dè#]#( €8€PÈ:‚H€:ƒ‚ÿ43Supported on x86 only.1#Ž#1®ÿÿÿÿÿÿÿÿÍÿÿÿÿŽ# #}U]# #( €ª€PÈ:‚H€:ƒ‚ÿ44This adapter is currently supported in its ESC-1/ESC-2 compatibility mode only.1Ž#< #1‘ÿÿÿÿÿÿÿÿÎÿÿÿÿ< #œ #`8 #œ #( €p€PÈ:‚H€:ƒ‚ÿ45Not supported with the the Future Domain TMC-850m.1< #Í #1¬ÿÿÿÿÿÿÿÿÏÿÿÿÿÍ #H
#{Sœ #H
#( €¦€PÈ:‚H€:ƒ‚ÿ46This has been Fault-Tolerance (RAID) tested using Windows NT Advanced Server.1Í #y
#1±ÿÿÿÿÿÿÿÿÐÿÿÿÿy

#€XH

#( €°€PÈ:‚H€:ƒ‚ÿ47Tested with HP C2225B tape drive, HP C2229B disk drive and HP C2226A CD-ROM drive.1y
#* #1©ÿÿÿÿÿÿÿÿÑÿÿÿÿ* #¢ #xPù
#¢ #( € €PÈ:‚H€:ƒ‚ÿ48HP Storage Systems were tested with the appropriate HP SCSI Host Adapters.1* #Ó #1³ÿÿÿÿÿÿÿÿÒÿÿÿÿÓ #U #‚Z¢ #U #( €´€PÈ:‚H€:ƒ‚ÿ49Tested with appropriate StorageWorks options including CD-ROM, Tape and Hard Drives.1Ó #† #1ÿÿÿÿÿÿÿÿÓÿÿÿÿ† #Ö #P(U #Ö #( €P€PÈ:‚H€:ƒ‚ÿ50Also supported on Alpha platforms.1† #
#1pÿÿÿÿÿÿÿÿÔÿÿÿÿ
#F
#?Ö #F
#( €.€PÈ:‚H€:ƒ‚ÿ51FDDI tested only.1
#w
#1‘ÿÿÿÿÿÿÿÿÕÿÿÿÿw

#`8F

#( €p€PÈ:‚H€:ƒ‚ÿ52Supported in Sound Blaster 1.x compatibility mode.1w
##1•ÿÿÿÿÿÿÿÿÖÿÿÿÿ#l#d<×
#l#( €x€PÈ:‚H€:ƒ‚ÿ53Not supported in Sound Blaster 1.x compatibility mode.1##1ˆÿÿÿÿÿÿÿÿ×ÿÿÿÿ#ô#W/l#ô#( €^€PÈ:‚H€:ƒ‚ÿ54Error control and flow control forced on.1#%#1zÿÿÿÿÿÿÿÿØÿÿÿÿ%#n#I!ô#n#( €B€PÈ:‚H€:ƒ‚ÿ55Advanced features disabled.1%#Ÿ#1€ÿÿÿÿÿÿÿÿÙÿÿÿÿŸ# @#O'n# @#( €N€PÈ:‚H€:ƒ‚ÿ56Supported as a client modem only.Ÿ# @#n#1Ÿ#=@#1vÿÿÿÿÿÿÿÿÚÿÿÿÿ=@#‚@#E @#‚@#( €:€PÈ:‚H€:ƒ‚ÿ57Flow control forced on.1=@#³@#1}ÿÿÿÿÿÿÿÿÛÿÿÿÿ³@#ÿ@#L$‚@#ÿ@#( €H€PÈ:‚H€:ƒ‚ÿ58Maximum DTE speed set to 2400.1³@#0A#1}ÿÿÿÿÿÿÿÿÜÿÿÿÿ0A#|A#L$ÿ@#|A#( €H€PÈ:‚H€:ƒ‚ÿ59Maximum DTE speed set to 9600.10A#­A#1{ÿÿÿÿÿÿÿÿÝÿÿÿÿ­A#÷A#J"|A#÷A#( €D€PÈ:‚H€:ƒ‚ÿ60Modem compression forced on.1­A#(B#1„ÿÿÿÿÿÿÿÿÞÿÿÿÿ(B#{B#S+÷A#{B#( €V€PÈ:‚H€:ƒ‚ÿ61Tested as standard serial ports only.1(B#¬B#1©ÿÿÿÿÿÿÿÿßÿÿÿÿ¬B#$C#xP{B#$C#( € €PÈ:‚H€:ƒ‚ÿ62In the UPS applet, check the box "Remote UPS Shutdown" and set it to high.1¬B#UC#1øÿÿÿÿÿÿÿÿàÿÿÿÿUC#D#ǜ$C#D#+ $€9€PÈ:‚H€:ƒ‚ƒ‚ÿ 8Only the NCR 53c710 SCSI Host Adapter is supported in this machine. 6Contact the manufacturer for information on running Windows NT on this machine.1UC#MD#1úÿÿÿÿÿÿÿÿáÿÿÿÿMD#E#ɞD#E#+ $€=€PÈ:‚H€:ƒ‚ƒ‚ÿ 19To use this adapter, at least one device on the bus must provide termination power. 20Refer to SETUP.TXT for information on configuring this adapter.1MD#GE#1ÿÿÿÿÿÿÿÿâÿÿÿÿGE#F#Ö«E#F#+ $€W€PÈ:‚H€:ƒ‚ƒ‚ÿ 16Scanners are not supported with this adapter. 22This adapter cannot be used for CD Setup. To install Windows NT with this adapter, use the WINNT.EXE Setup method.1GE#NF#1)ÿÿÿÿÿÿÿÿãÿÿÿÿNF#FG#øËF#FG#- (€—€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ÿ 19To use this adapter, at least one device on the bus must provide termination power. 20Refer to SETUP.TXT for information on configuring this adapter. 25This adapter is only supported on IRQ-5.1NF#wG#1ÁÿÿÿÿÿÿÿÿäÿÿÿÿwG#I#aFG#I#/ ,€Ã€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ƒ‚ÿ 19To use this adapter, at least one device on the bus must provide termination power. 20Refer to SETUP.TXT for information on configuring this adapter. 22This adapter cannot be used for CD Setup. To install Windows NT with this adapter, use the WINNT.EXE Setup method. 26This adapter is only supported for use with scanners and CD-ROM drives.1wG#8I#1ãÿÿÿÿÿÿÿÿåÿÿÿÿ8I#êI#²‡I#êI#+ $€€PÈ:‚H€:ƒ‚ƒ‚ÿ 19To use this adapter, at least one device on the bus must provide termination power. 25This adapter is only supported on IRQ-5.18I#J#1çÿÿÿÿÿÿÿÿæÿÿÿÿJ#ÑJ#¶‹êI#ÑJ#+ $€€PÈ:‚H€:ƒ‚ƒ‚ÿ 45Not supported with the the Future Domain TMC-850m. 46This has been Fault-Tolerance (RAID) tested using Windows NT Advanced Server.1J#K#1ÿÿÿÿÿÿÿÿçÿÿÿÿK#ÕK#Ó¨ÑJ#ÕK#+ $€Q€PÈ:‚H€:ƒ‚ƒ‚ÿ 47Tested with HP C2225B tape drive, HP C2229B disk drive and HP C2226A CD-ROM drive. 48HP Storage Systems were tested with the appropriate HP SCSI Host Adapters.1K#L#1ðÿÿÿÿÿÿÿÿèÿÿÿÿL#ÅL#¿”ÕK#ÅL#+ $€)€PÈ:‚H€:ƒ‚ƒ‚ÿ 2This device requires a driver from the Windows NT driver library. See the following section on accessing these drivers. 51FDDI tested only.…TL#JM#1ž ÿÿÿÿØGéJM#±M##‡#Windows NT hardware compatibility listSaveMark("topic_index");EB("btn_topic_index")g@ÅL#±M#' €€€€;€<‚ÿMicrosoft Windows NT Version 3.1Hardware Compatibility Listd7JM#!€#- (€o€"O€=€>€=‚ÿThe following computers and peripherals have passed Microsoft® Windows NTTM 3.1 Operating System compatibility testing as of November, 1993. Some computers may be sold with additional peripherals that are not yet supported by the Windows NT operating system. If your computer or device is not listed below, contact the manufacturer for more information. We have not tested every computer and/or device in all possible configurations. Please refer to the file SETUP.TXT on the install media for additional compatibility information when ins±M#!€#ÅL#talling Windows NT.Å‘±M#æ#4 6€#€€=‚€?€=‚‚€?€=‚‚ÿItems listed with footnote number 1 require one of the device drivers available in the \DRVLIB directory on the Windows NT CD-ROM. These drivers are also available in the Windows NT Driver Library.Items listed with footnote number 2 are supported with device drivers available in the Windows NT Driver Library. Please see the section at the end of this document on accessing this library.ˤ!€#±‚#' €I€(O€@‚ÿUpdates to this list will appear in Library 1 of the WINNT forum (GO WINNT) or Library 17 of the MSWin32 forum (GO MSWIN32) on CompuServe® Information Services.
Ræ#¾„#» D¥€€:‚ãʞƒ€A‰€B‚ãrƒ€A‰€B‚ã҃F߀A‰€B‚ãëÅi~€A‰‚‚ã–}«×‰€B‚ãJŠŒ€€A‰€B‚ãfɀ„€A‰€B‚㿤¬µ€A‰€B‚ã¸ÿ—€A‰€B‚ãÍå8€A‰€B‚ã"z«µ€A‰€B‚ã#I€A‰€B‚ÿx86 Architecture Uniprocessor Computersx86 Architecture Multiprocessor ComputersMIPS® ARC/R4000™ Series ComputersDigital Alpha AXP™ SystemsSCSI Host AdaptersSCSI CD-ROM DrivesOther CD-ROM DrivesSCSI Tape DrivesOther Tape DrivesSCSI Removable MediaSCSI ScannersDisk Controllers
3±‚#Ȇ#× |g€ã[@s¬€A‰€B‚ãBp9C€A‰€B‚ã˜K­‚€A‰€B‚ã"þn#€A‰€B‚㢠Úä€A‰€B‚ãè(x¥€A‰€B‚ãæ’V‘€A‰€B‚ã7qb|€A‰€B‚ã‹qPˆ€A‰€B‚ã…1€A‰€B‚ã_wB†€A‰€B‚ã1z+€A‰€B‚ãlƒÚ•€A‰€B‚€A‚ã\Tã߉€B‚ÿHard DrivesStorage CabinetsVideo Display SupportNetwork AdaptersMultimedia Audio AdaptersModemsHardware Security HostsISDN AdaptersMulti-port Serial AdaptersUninterruptible Power SuppliesKeyboardsPointing DevicesPrintersTechnical Notes[¾„##‡#= J€<€ã$0š€C‰€D‚â†ÒÀ߀C‰€D‚€A‚ÿUpdatesDisclaimerKȆ#n‡#1‹a‡F“ Oên‡#è‡#LŽ'x86 Uniprocessor ComputerszS#‡#è‡#' €¦€€E€F‚ÿx86 Architecture Uniprocessor ComputersThe following systems have been tested.ên‡#Š#3 4€Õ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿAbsolute Computer 486/66 VL/EISAACD OPTIMA 486 DX 33 VLACD OPTIMA 486 DX 50 VLACD OPTIMA 486 DX2 66 VLACER AcerAcros 486DX2/66 (Model PT66DB)ACER AcerAltos 7000/F433TUACER AcerAltos 7000/FT66TUACER AcerFrame 1000 (Model 1733)ACER AcerFrame 1000 (Model 1766)ACER AcerFrame 300 (Model F433T)ACER AcerFrame 500 (Model F433TE)ACER AcerFrame 500 (Model FT50TE)ACER AcerFrame 500 (Model FT66TE)ACER AcerFrame 700ACER AcerMate 466d (Model MT66D3)ACER AcerPower 425s (Model PZ25D)Êè‡#Œ#8 >€•€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿACER AcerPower 433ACER AcerPower 433e/P433EACER AcerPower 433sACER AcerPower 433vACER AcerPower 450dACER AcerPower 450de/PT50EACER AcerPower 466dACER AcerPower 466de/PT66EACER AcerPower 466dvACER AcerPower 486/33ACER AcerPower 560e/P560EACER AcerPower 566eACMA 486/33 TI-VLBACMA 486/50 TS-EACMA 486/50-2 TI-VLBACMA 486/66-2 TI-VLBACMA 486/66-2 TS-EACMA 486/66-2 TS-VLBACS Meritel 486-50SFACS Meritel 486-66SFActech ACTion EISA 486DX-50$ñŠ#+Ž#3 4€ã€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿActech ACTion EISA 486DX/2-66Actech ACTion ISA 486DX-33Actech ACTion ISA 486DX-50Actech ACTion ISA 486DX/2-50Actech ACTion ISA 486DX/2-66Actech ACTion ISA 486SX-25Actech ACTion VLB 486DX-33Actech ACTion VLB 486DX-50Actech ACTion VLB 486DX/2-50Actech ACTion VLB 486DX/2-66Actech ACTion VLB 486SX-25Adaptive Data System Pro 3/486-40Adaptive Data System Pro 486/33 VESAAdaptive Data System Pro 486/33DXAdaptive Data System Pro Series 486/50Adaptive Data System TAI 386DX/40CF System êŒ#WÀ#6 :€Õ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿAdaptive Data System TAI 486DX/50CS SystemADD-X 486 All In One 33 MHzADD-X Systemes 486/33Mhz ISA busADPS 486 Power Notebook 486DX2-50MhzADPS 486 Power Notebook Color 486-33MhzADPS AmbassadorADPS Bat Computer-33MHzADPS Bat Computer-50MHzADPS Local Bus 33ADPS MedallionADPS Multimedia Power HouseADPS Power Notebook 486-33MhzADPS System 3000ADPS System 4000ADPS System 5000ADPS System 6000 EISAADPS +Ž#WÀ##‡#System 6000 PlusADPS System 6000 Plus EISAADS 486 EISA+VESA UPGRADEABLE
Ú+Ž#dÂ#3 4€µ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿADS 486VL UPGRADEABLEADS UPGRADEABLE 3/486Advance Interface EISA VESA 486DX-50Advance Interface EISA VESA 486DX2-66Advance Interface VL-BUS 486DX-50Advance Interface VL-BUS 486DX2-66Advanced Computer SPIRAL 386DX/40Advanced Computer SPIRAL 486/33Advanced Computer SPIRAL 486DX2/50AIC STM 386DX-33MhzAIC STM 486DX-33MhzAIC STM 486DX2-66MhzAIC STM 486DX2-66Mhz Local BusAlcotini AmiTech 386DX-40 STDAlcotini AmiTech 486DX-33 STDAlcotini AmiTech 486DX2-50 STDÍWÀ#gÄ#6 :€›€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿAlcotini AmiTech 486DX2-66 STDAlcotini AmiTech 486SX-25 STDAlcotini Weston 486DX-66 TFTAlfa DELTACOM VESA 486DX2-66Alfa DELTACOM 486-33Alfa DELTACOM 486-50Alfa DELTACOM 486SX-25Alfa DELTACOM EISA 486-50AllWare 466-EVALR BusinessVEISA 3/33ALR BusinessVEISA 4/33DALR BusinessVEISA 4/66DALR Evolution IV 4/25sALR Evolution IV 4/33ALR Evolution IV 4/33sALR Evolution IV 4/66dALR Evolution IV 4E/25sALR Evolution IV 4E/33ALR Evolution IV 4E/33s ÓdÂ#rÆ#8 >€§€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿALR Evolution IV 4E/66dALR Evolution V-Q/60ALR Evolution V-Q/66ALR Evolution V/60ALR Evolution V/66ALR Flyer 32LCT 4/50DALR Flyer 32LCT 4/66DALR Flyer 32LCT 4DX/33ALR Flyer SD32 4/33ALR Flyer SD32 4/66dALR Flyer VL 4/33dALR Flyer VL 4/66dALR Modular Processor system 486DX2/66ALR PowerCache 4 33eALR POWERPRO/MC SMP 4/50DALR PROVEISA V/66ALR RANGER M4/25ALR RANGER MC4/25SALR RANGER MC4DX/25ALR RANGER MCT4/25AMAX 486/2-50 VESAmax Power StationÏgÄ#wÈ#6 :€Ÿ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿAMAX 486/33 VESAmax Power StationAMAX 486/50 EISAmax Power StationAMAX 486/66 EISAmax Power StationAMAX 486/66 VESAmax Power StationAmbra 486DX/50Ambra D466E/VLAmbra DP66E/VLAmbra T466E/VLAMI Enterprise IIIAMI Enterprise IVAMI Omni Business PartnerAMI Super Voyager LCAMI Super Voyager PCIAMI Super Voyager VLBAMI Super Voyager VLB IIAmPAQ Ultimate 466 VLB/S2AMS TravelPro 5300AMSYS UPG VLbus DX2-50 DTAnnabelle Bits ASI 486/33 Vesa Local BusÇrÆ#|Ê#> J€€€:‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿAOX Kingston Technology Corp. MC Master 486Applied Computer ACT 486/33 DX Apricot® FTe 486DX2/66Apricot FTs 486DX2/66Apricot XEN-LS IIAquiline NT 466c SystemAres 486-33 VLBAriel 486DX2-66EVSAriel 486DX2-66VLS2Asem DP 486/66 IIAsem DS 486/33 IIAsem ECO-PC 4/33Asem ECO-PC 4/66Asem MID-SERVER 4/33Asem PROSERVER 5/60ASL 433Aspect 3/486 386DX-40 ISAAspect 3/486DX-33 ISAAspect 3/486DX-50 ISAAspect 3/486DX2-66 ISAAspect EISA 486DX-33
ÇwÈ#†Ì#C T€€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:€G€:‚‚‚‚‚‚ÿAspect EISA 486DX-50Aspect EISA 486DX2-66Aspect ISA 486DX-33Aspect ISA 486DX-50Aspect ISA 486DX2-66Aspect ISA 486SX-33Aspect VESA 486DX-33Aspect VESA 486DX-33FAspect VESA 486DX-50Aspect VESA 486DX-50FAspect VESA 486DX2-66Aspect VESA 486DX2-66FAspect VESA 486SX-33Aspect VESA 486SX-33FAST® Advantage!TM Plus 486DX/33AST Advantage! Pro 486SX/25 Model 173AST Bravo 3/25s Model 3VAST Bravo LC 4/25sAST Bravo LC 4/33AST Bravo LC 4/33sÙ|Ê#˜Î#9 @€³€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿAST Bravo LC 4/50dAST Bravo LC 4/66dAST Bravo LP 4/25sAST Bravo LP 4/33AST Bravo LP 4/66dAST Bravo MT4/66dAST Power Premium 4/33 EISAAST Power Premium 4/50dAST PowerExec 4/25SLAST Premium 386/33TAST Premium II 386/33 Model 213VAST Premium II 486/33AST Premium SE 4/33 Model 333AST Premium SE 4/50AST Premium SE 4/50dAST Premium SE 4/66dAST Premium SE 486/33AST Premmia 4/33AST Premmia 4/33SXAST Premmia 4/66dAST Premmia MTE 4/66dAST Premmia SE 4/66dφÌ#§$4 6€Ÿ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿAthena ALM 486 DX 33Athena ALM 486 DX 50Athena ALM 486 DX 66Athena HQ / ISA 486DLC 40Athena HQ / ISA 486DX 33Athena HQ / ISA 486DX 50Athena HQ / ISA 486DX2 66Athena HQ / VESA 486DX 33Athena HQ / VESA 486DX2 50Athena HQ / VESA 486DX2 66Austin 486/50 EISA Tower PATRIOTAustin 486/50 VESA-LB PATRIOT˜Î#§$#‡#Austin 486/50 VESA-LB PATRIOT PLUSAustin 486DLCAustin 486DX/33 EISA Tower PATRIOTAustin 486DX/33 VESA-LB PATRIOTAustin 486DX/33 VESA-LB PATRIOT PLUSá˜Î#¾$6 :€Ã€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿAustin 486DX2/50 EISA Tower PATRIOTAustin 486DX2/66 EISA Tower PATRIOTAustin 486DX2/66 VESA-LB PATRIOT PLUSAustin Winstation 486DX2/66Axik Ace Cache 486DX-33VAxik Ace Cache 486DX-33VGAxik Ace Cache 486DX2-50VGAxik Ace Cache 486DX2-66VAxik Ace Cache 486DX2-66VGAxik Ace Cache 486SX-33VGBear 486/50 DesktopBrett ExecEISABrett ExecutiveBrett Pro VLBBrett Station NTe EISAC&S Computer E III 486/VLBC. THIIM 486DX33CAF CT-02 L737/486DX-33Caliber 3/486 386DX-40 ISAͧ$Ã$8 >€›€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿCaliber 3/486DX-33 ISACaliber 3/486DX-50 ISACaliber 3/486DX2-66 ISACaliber EISA 486DX-33Caliber EISA 486DX-50Caliber EISA 486DX2-66Caliber ISA 486DX-33Caliber ISA 486DX-50Caliber ISA 486DX2-66Caliber ISA 486SX-33Caliber VESA 486DX-33Caliber VESA 486DX-33F Caliber VESA 486DX-50Caliber VESA 486DX-50F Caliber VESA 486DX2-66Caliber VESA 486DX2-66F Caliber VESA 486SX-33Caliber VESA 486SX-33FCelem 486DX/33 VLCelem 486DX/33CCelem 486DX/50 MCþ$È$B R€‡€€:‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚€G€:‚ÿCelem 486DX/50 VLChaplet HALIKAN NBD-486T/25MChicony Electronics 486 33PChicony Electronics Subnote 486SX/25Cinet EVL Series 486DX2/66Cinet HI Series 486DX2/66Cinet VL Series 486DX2/66Clone 9433Colfax P1-486 EISA/VLBCommodore® 486DX-33CCommodore 486SLC-25Commodore 486SX-25Commodore DT 486SX-20Commodore LB 486DX-33CCommodore LB 486DX2-66CCommodore LB 486SX-33CCommodore LB T486DX2-66CCommodore T486DX-50CCOMPAQ® Concerto 4/25ÅÃ$Ü$O l€‹€€:‚€G€:‚‚€G€:‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚ÿCOMPAQ Contura 4/25CCOMPAQ Deskpro 386/25®COMPAQ Deskpro 386/25eCOMPAQ Deskpro 386/33®COMPAQ Deskpro 386/33LCOMPAQ Deskpro® 4/66iCOMPAQ Deskpro 486/25COMPAQ Deskpro 486/25iCOMPAQ Deskpro 486/33iCOMPAQ Deskpro 486/33LCOMPAQ Deskpro 486/33MCOMPAQ Deskpro 486/50LCOMPAQ Deskpro 486/50MCOMPAQ Deskpro 5/60MCOMPAQ Deskpro 5/66MCOMPAQ Deskpro 66MCOMPAQ LTE® Lite 4/25COMPAQ LTE Lite 4/25CCOMPAQ LTE Lite 4/33CCOMPAQ Portable 486c¿È$â
$G \€€€:‚‚‚‚€G€:‚‚‚‚‚‚€G€:‚‚‚‚‚‚€G€:‚‚ÿCOMPAQ Portable 486C/66COMPAQ Presario 425COMPAQ ProLiant 1000 486DX2/66COMPAQ ProLiant 1000 Model 5/60COMPAQ ProLineaTM 3/25sCOMPAQ ProLinea 4/50COMPAQ ProLinea 4/66COMPAQ ProSignia 486DX/33COMPAQ ProSignia 486DX2/66COMPAQ ProSignia 5/60COMPAQ Systempro/LTTM 386/25COMPAQ Systempro/LT 486/33COMPAQ Systempro/LT 486DX2/50COMPAQ Systempro/LT 486DX2/66COMPAQ Systempro/LT 486SX/25Comper DC486-662VCompuAdd® 420sCompuAdd 433.öÜ$
$8 >€í€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿCompuAdd 433 ELBCompuAdd 433 LBCompuAdd 433 LPCompuAdd 433DLC LPCompuAdd 433ECompuAdd 450CompuAdd 450DX2 LPCompuAdd 466/DX2CompuAdd 466DX2 LBCompuAdd 466DX2E LBCompuAdd 486-33DLCCompuAdd MC466EDX2COMPUCON 386DX/40COMPUCON 486DX/33COMPUCON 486DX/33 ISA/VLCOMPUCON 486DX/50COMPUCON 486DX/50 EISA/VLCOMPUCON 486DX/50 VLCOMPUCON 486DX2/66 EISA/VLCompudyne 4DX2/50 EISA16340 DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne 4DX2/50 VLB16340 DESKTOP (incl. MINITOWER and SERVERTOWER)0â
$@$+ $€ €€:‚‚‚‚‚‚‚‚ÿCompudyne 4DX2/66 EISA16245 DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne 4DX2/66 SlimnoteCompudyne 4DX2/66 VLB16245 DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne 4DX33 EISA16245 DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne 4DX33 VLB16245 DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne 4DX50 EISA16340 DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne 4DX50 VLB16340 DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne UM486V AIO DX2/50 2VLB DIP DESKTOP (incl. MINITOWER and SERVERTOWER)Å 
$@$% €A€€:‚‚ÿCompudyne UM486V AIO DX2/50 2VLB SMT DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne UM486V AIO DX2/66 2VLB DIP DESKTOP (incl. MINITOWER and SERVERTOW@$@$#‡#ER)K@$\B$, &€?€‚H€:‚‚‚‚‚‚‚ÿCompudyne UM486V AIO DX2/66 2VLB SMT DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne UM486V AIO DX33 2VLB DIP DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne UM486V AIO DX33 2VLB SMT DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne UM486V AIO DX50 2VLB DIP DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne UM486V AIO DX50 2VLB SMT DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne UM486V AIO SX25 2VLB DIP DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne UM486V AIO SX25 2VLB SMT DESKTOP (incl. MINITOWER and SERVERTOWER)Ü@$C$' €9€‚H€:‚‚ÿCompudyne UM486V AIO SX33 2VLB DIP DESKTOP (incl. MINITOWER and SERVERTOWER)Compudyne UM486V AIO SX33 2VLB SMT DESKTOP (incl. MINITOWER and SERVERTOWER)Ô\B$%E$2 2€©€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿCompuPartner 4D250CompuPartner 4D33CompuPartner 4DV266Computer Extension CESI 486 66Computer Resources 486DX266 ISAComputer Resources 486DX33 FULL TOWERComputer Resources 486DX33 LOCAL BUSComputer Resources 486DX50 EISAComputer Sales Prof. 486DX/33 VLComputer Sales Prof. 486DX2/50 VLComputer Sales Prof. 486DX2/66 EISA/VLComputer Sales Prof. 486DX2/66 VLComputer Sales Prof. 486SX/25 VLComputer Sonics CSI EISA/VL 486/33Computer Sonics CSI ISA 486/33™sC$¾E$& €æ€€:‚‚‚‚ÿComputer Sonics CSI VL/ISA 486Computrend PREMIO 486DX-33Computrend PREMIO 486DX-50Computrend PREMIO 486DX2-66«~%E$iG$- (€ý€‚H€:‚‚‚‚‚‚‚‚ÿCornell Computer Systems EISA_VESA PAK 486/33Cornell Computer Systems EISA_VESA PAK 486/66Cornell Computer Systems HOME OFFICE PAK 486/33 VLBCornell Computer Systems HOME OFFICE PAK 486/66 VLBCornell Computer Systems POWER PAK 486/33 VLBCornell Computer Systems POWER PAK 486/66 VLBCornell Computer Systems VALUE PAK 486/33 VLBCornell Computer Systems VALUE PAK 486/66 VLBѾE$qI$7 <€£€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿCPU Sir Henry NTCrescent 486-33/33VLCrescent 486-66VLCSS Labs MaxSys 433MTACSS Labs MaxSys 433MTMGECSS Labs MaxSys 433TACSS Labs MaxSys 433TMGECSS Labs MaxSys 450MTMGECSS Labs MaxSys 450TMGECSS Labs MaxSys 452MTMGECSS Labs MaxSys 452TMGECSS Labs MaxSys 462MTACSS Labs MaxSys 462MTECSS Labs MaxSys 462MTMGECSS Labs MaxSys 462TACSS Labs MaxSys 462TECSS Labs MaxSys 462TMGECSS Labs Preferred 433GACSS Labs Preferred 433GECSS Labs Preferred 433MGEÝiG$†K$8 >€»€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿCSS Labs Preferred 450MGECSS Labs Preferred 452MGECSS Labs Preferred 462GACSS Labs Preferred 462GECSS Labs Preferred 462MGECTM Fontek 486DX2-50 VLCTM Fontek 486DX2-66 VLCTM Fontek 486DX33 VLCube 340 ATXCube 433 ATXCube 450 ATXCube 466 ATXCube 466 ATX Local BusCube 486/40CyberStar Alliance DX2/50CyberStar FilePro 1000CyberStar FilePro 2000CyberStar FilePro 2000 5/60Daewoo 486VESA System/2700(33)Daewoo 486VESA System/2900(33)Daewoo Modular Desktop/2300=
qI$ÃL$0 .€€€:‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDaewoo Modular Mini Tower/2400DAN for Windows 25DAN for Windows 33DAN for Windows 50DAN for Windows 66DAN Vantage/25DAN Vantage/33DAN Vantage/50DAN Vantage/66Danjen 486DLC 33 MHzDanjen 486DX 33 MHz Local BusDanjen 486DX 50 MHz EISADanjen 486DX 50 MHz ISAT/†K$M$% €^€‚H€:‚ÿDassault AT CUSTOMER ACTIVATED TERMINAL D633ÑÃL$O$1 0€£€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿData Stor 386-33DX Desktop/TowerData Stor 386-33SX Desktop/TowerData Stor 486-25SX Desktop/TowerData Stor 486-33DX Desktop/TowerData Stor 486-33SX Desktop/TowerData Stor 486-50DX Desktop/TowerData Stor 486-66DX2 Desktop/TowerData Stor 486-66DX2E Desktop/TowerDATAFILEN PROFF 386DX-40DATAFILEN PROFF 486DX-33 VLDATAFILEN PROFF 486DX2-66 VLDatavarehuset BRICK 486 DX2-50 LocalBusDatavarehuset BRICK 486DX-33 EISADatavarehuset BRICK 486DX2-66 Local Bus
ÇM$/$C T€€€:‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDDK Soft DDK-4066/2LVDebis DCS Minitower 486 EISADebis DCS Tower 486 MCDebis DCS Tower 486 MP EISADeico 486DLCDeico Predator IIIDELL® 325 N NotebookDELL 3O$/$#‡#25 NC NotebookDELL 4033/XEDELL 4050/XEDELL 4066/XEDELL 425s/LDELL 433/LDELL 433/MDELL 433/MEDELL 433/TDELL 450/MDELL 450s/LDELL 4560/XEDELL 466/MDELL 466/MEDELL Dimension 466/TDELL Dimension 486DX/33 DELL Dimension 486DX/50DELL Dimension 486DX2/50sDELL Dimension 486SX/25ÙO$=ƒ$5 8€³€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDELL OptiPlex 425s/MXVDELL OptiPlex 433/MXVDELL OptiPlex 433s/MXVDELL OptiPlex 450/MXVDELL OptiPlex 466/MXVDELL PowerLine 466DEDELL PowerLine 466SEDELL PowerLine System 325DELL PowerLine System 433DEDELL PowerLine System 433EDELL PowerLine System 433SEDELL PowerLine System 450/TDELL PowerLine System 450DEDELL PowerLine System 450DE/2 DGXDELL PowerLine System 450SEDELL PowerLine System 486D/33DELL PowerLine System 486D/50DELL PowerLine System 486P/25Û/$R…$: B€·€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDELL PowerLine System 486P/33Delphi OlympusDelta Micro Systems Gold Line 4D33VDelta Micro Systems Gold Line 4D50CDFI CCV 486-25SXDFI CCV 486-DX2-50DFI CCV 486DX-33DFI CCV 486DX2-66DFI TN 486DX-33DFI TN 486DX2-50DFI TN 486DX2-66DFI TN 486SX-25DFI UCE 486DX-33DFI UCE 486DX-50DFI UCE 486DX2-50DFI UCE 486DX2-66DFI UCE 486SX-25DFI UCF 486DX-33DFI UCF 486DX-50DFI UCF 486DX2-50DFI UCF 486DX2-66DFI UCF 486SX-25Digital Equipment Corp. applicationDEC 400xPî=ƒ$p‡$0 .€Ý€€:‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDigital Equipment Corp. DECpc 333Digital Equipment Corp. DECpc 425Digital Equipment Corp. DECpc 425 STDigital Equipment Corp. DECpc 425iDigital Equipment Corp. DECpc 425i DX2Digital Equipment Corp. DECpc 433Digital Equipment Corp. DECpc 433 STDigital Equipment Corp. DECpc 433 WorkstationDigital Equipment Corp. DECpc 433dx DTDigital Equipment Corp. DECpc 433dx LPDigital Equipment Corp. DECpc 433dx MTDigital Equipment Corp. DECpc 433dx MTEDigital Equipment Corp. DECpc 433sx DT$ôR…$”‰$0 .€é€€:‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDigital Equipment Corp. DECpc 433TDigital Equipment Corp. DECpc 450 STDigital Equipment Corp. DECpc 450d2 LPDigital Equipment Corp. DECpc 450d2 MTDigital Equipment Corp. DECpc 452 STDigital Equipment Corp. DECpc 466 STDigital Equipment Corp. DECpc 466d2 DTDigital Equipment Corp. DECpc 466d2 LPDigital Equipment Corp. DECpc 466d2 LPxDigital Equipment Corp. DECpc 466d2 MTDigital Equipment Corp. DECpc 466d2 MTEDigital Equipment Corp. DECpc 560 STDigital Equipment Corp. DECpc LPv 425sx
Óp‡$ž‹$7 <€§€€:‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚ÿDigital Equipment Corp. DECpc LPv 433dxDigital Equipment Corp. DECpc LPv 433sxDigital Equipment Corp. DECpc LPv 450d2Digital Equipment Corp. DECpc LPv 466d2 Digital Equipment Corp. DECpc LPx 433dxDigital Equipment Corp. DECpc LPx 433sxDigital Equipment Corp. DECpc LPx 450d2Digital Equipment Corp. DECstation® 425cDolch C.P.A.C. 486-33CDolch C.P.A.C. 486-33EDolch C.P.A.C. 486-50 EISADolch C.P.A.C. 486-66CDolch C.P.A.C. 486-66EDolch M.A.C.H. 486-33Å”‰$¡$> J€‹€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDolch M.A.C.H. 486-66Dolch V.P.A.C. 486-33CDolch V.P.A.C. 486-33EDolch V.P.A.C. 486-66CDolch V.P.A.C. 486-66EDTK 486VLDTK FEAT03-D33DTK FEAT03-D40DTK FEAT03-D50DTK FEAT03-T66DTK FEAT04-D33DTK FEAT33-D33DTK FEAT33-D40DTK FEAT33-D50DTK FEAT33-T66DTK FEAT34-D33DTK FEAT34-D40DTK FEAT34-D50DTK FEAT34-T66DTK FEAT35-D33DTK FEAT36-D33DTK FEAT5030-D33DTK FEAT5030-D50DTK FEAT5030-T66DTK FEAT5031-D33DTK FEAT5031-D50DTK FEAT5031-T66Æž‹$¤$= H€€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDTK FEAT62-D33DTK FEAT62-T66DTK Grafika 4ADTK Grafika 4CDTK Grafika 4DDTK Grafika 4EDTK Grafika 4FDTK Grafika 4GDTK Grafika 4IDTK Grafika 4JDTK Grafika 4V2D-D3DTK Grafika 4V2D-T6DTK Grafika 4V2T-D3DTK Grafika 4V2T-T6DTK Grafika 5V1T-60DTK Grafika 5VID-60DTK PENT-01 (incl. -31, -32 Models)DTK SPAN0030DTK SPAN01-D33DTK SPAN01-D50DTK SPAN01-T66DTK SPAN3330DTK SPAN5030Duracom 486/25SX-CCVDuracom 486/25SX-TNDuracom 486/25SX-UCFxH¡$(Á$0 .€‘€€:‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDuracom 486/33-CCVDuracom 486/33-TNDuraco¤$(Á$#‡#m 486/33-UCFDuracom 486/50DX-UCFDuracom 486/50DX2-CCVDuracom 486/50DX2-TNDuracom 486/50DX2-UCFDuracom 486/66DX2-CCVDuracom 486/66DX2-TNDuracom 486/66DX2-UCFDynamic Decisions DYNEX EXEC-50 EISADynamic Decisions EXECUTIVE 486-33 ISADynamic Decisions EXECUTIVE 486-33 ISA/PCI㤏$;Ã$0 .€Ç€‚H€:‚‚‚‚‚‚‚‚‚‚‚ÿDynamic Decisions EXECUTIVE 486-33 VL/EISADynamic Decisions EXECUTIVE 486-33 VL/ISADynamic Decisions EXECUTIVE 486-33SXDynamic Decisions EXECUTIVE 486-50 VL/EISADynamic Decisions EXECUTIVE 486-66 DX2 VL/ISADynamic Decisions EXECUTIVE 486-66 VL/EISADynamic Decisions EXECUTIVE ISA-486-33 SV2Dynamic Decisions EXECUTIVE ISA-486-50 SV2Dynamic Decisions EXECUTIVE ISA-486-66D2 SV2Dynamic Decisions PROFESSIONAL 486-33 VL/ISADynamic Decisions PROFESSIONAL 486-33DX VL/EISA E3Û(Á$þÃ$( €7€‚H€:‚‚‚ÿDynamic Decisions PROFESSIONAL 486-33DX VL/EISA E4Dynamic Decisions PROFESSIONAL 486-50DX VL/EISA E4Dynamic Decisions PROFESSIONAL 486DX66 EISA VLB E4Ç;Ã$Æ$< F€€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚ÿECE DATA i486/VLBECG Unitron 340ECG Unitron 425ECG Unitron 433ECG Unitron 450ECG Unitron 450 DX/2ECG Unitron 466 DX/2ECG Unitron 466 DX/2 EISAElite Industries MB-1433AEA-V 486/33Elite Industries MB-1433AEA-V 486/50Elite Industries MB-1433AEA-V 486DX2/66Elitegroup UC4917-GElitegroup UM4910Elitegroup VL486Elonex PC-400 Series ComputerEltech Model 4660VBEpson® ActionDesk 4000 (4DX2/66-LB)Epson Endeavor VL66Epson Endeavor WG 4DX2/50ÖþÃ$È$= H€­€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚ÿEpson Endeavor WG 4DX2/66Epson Endeavor WG 4SX33Epson Equity 4DX/33Epson Equity 4DX2/50Epson Equity 4SX/25Epson PowerSpan 486DX2/66Epson Progression 486DX/33Epson Progression 486DX2/66Epson Progression 486SX/25Epson Progression 4DX2/50Epson Progression 4SX/33Ergo Ultra Moby Brick 486/66ERIDAN Onyx DE433Erre 486DX2-66 VLBEverCom ISA 486SR/33EverCom VL 486SV2/66EverexTM Cube DX/33Everex Step 486/33 ISAEverex Step DPEverex Step VL EISA 486DX2/50
ׯ$Ê$3 4€¯€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿEverex Step VL EISA 486DX2/66Everex Step VL ISA 486DX2/50Everex Step VL ISA 486DX2/66Everex Tempo 486/33Everex Tempo 486/33EEverex Tempo 486DX2/50Everex Tempo 486SX/25Evergreen Systems CAPcard 425eEvesham Micros VALE PREMIER + 486DX2-66Evesham Micros VALE PREMIER 486DX2-66Evesham Micros VALE PRESTIGE 486DX2-66Expo-Tech 386 Ultra SlimExpo-Tech 486DX/3 DesktopExpo-Tech 486DX/3 Desktop (w/LBVGA)Expo-Tech 486DX/3 Desktop (w/VLBUS)Expo-Tech 486DX/3 Tower ÙÈ$)Ì$2 2€³€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿExpo-Tech 486DX/3 Tower (w/VLBUS)Expo-Tech 486DX2/4 DesktopExpo-Tech 486DX2/4 Desktop (w/LBVGA)Expo-Tech 486DX2/4 Desktop (w/VLBUS)Expo-Tech 486DX2/4 TowerExpo-Tech 486DX2/4 Tower (w/VLBUS)Expo-Tech 486DX2/6 DesktopExpo-Tech 486DX2/6 Desktop (w/LBVGA)Expo-Tech 486DX2/6 Desktop (w/VLBUS)Expo-Tech 486DX2/6 TowerExpo-Tech 486DX2/6 Tower (w/VLBUS)Expo-Tech 486SX/3 DesktopExpo-Tech 486SX/3 Desktop (w/LBVGA)Expo-Tech 486SX/3 TowerExpo-Tech 486SX/3 Ultra SlimÛªÊ$Î$1 0€U€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿExpo-Tech 486SX/3 Ultra Slim (w/LBVGA)Expo-Tech 486SX/4 DesktopExpo-Tech 486SX/4 Desktop (w/LBVGA)Expo-Tech 486SX/4 Desktop (w/VLBUS)Expo-Tech 486SX/4 TowerExpo-Tech 486SX/4 Ultra SlimExpo-Tech 486SX/4 Ultra Slim (w/LBVGA)Expo-Tech LT322 NotebookExpo-Tech LT421 NotebookExpress Micro EISA VESA 486DX-50Express Micro EISA VESA 486DX2-66Express Micro VL-BUS 486DX-50Express Micro VL-BUS 486DX2-66Fast 486DY66S520X3)Ì$\Î$% €f€‚H€:‚ÿFederal Technologies Guardian WinMaster 486/33SXçÎ$ƒ%4 6€Ï€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿFirst Jupiter 486DX66 All In One ISA BusFirst Krypton 486DX50 VL-BusFirst LEO 4386VCV DX33First LEO 486DX66-VLFirst LEO 486VC DX/50First LEO 486VC DX2/66First LEO DESKTOP 486/33First LEO DESKTOP 486/50First LEO DESKTOP 486/66First LEO MINITOWER 486/33First LEO MINITOWER 486/50First LEO MINITOWER 486/66First Venus 486DX2/66 EISA and VL-BusFirst Venus 48\Î$ƒ%#‡#6DX2/66 VL-BusFountain Technology 486DX/33 VLFountain Technology 486DX2-66 EISA/VLFountain Technology 486DX2/50 VL
È\Î$%B R€‘€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚â¸1€G‰€:‚ÿFountain Technology 486DX2/66 VLFountain Technology 486SX/25 VLFree VESA23X50Fujitech 486DX/50 EFujitech 486DX2/50 VLFUTURE COMPUTERS 486 Eisa/Vesa NTPCGain TITON WORKSTATIONGateway 2000 386/33Gateway 2000 486/33CGateway 2000 486/33EGateway 2000 486DX2/50Gateway 2000 486DX2/50EGateway 2000 486DX2/50VGateway 2000 486DX2/66VGateway 2000 4DX/33Gateway 2000 4DX2/66EGateway 2000 4SX/25Gateway 2000 4SX/33VGateway 2000 Nomad 425DXL 3Ã%›%K d€‡€â¸1€:€G‰€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚ÿGateway 2000 Nomad 450DXL 3GCH AEGIS 433GCH AEGIS 466GCH EasyData 433HIGCH EasyData 466HIGCH EasyDate 466HI VLGCH EiSYS Ei433DXGCH EiSYS Ei466DXGenitech Capricorn JF/33Genitech Capricorn JF2/66GES DATAMINI MF 486DX-33GES DATAMINI MF 486DX2-66GES DATAMINI MF 486SX-25Getek 486 DX 50 LOCAL BUSGMX EISAMB 486DX2/66GoldStar 425SXEGoldStar GS425SXGoldStar GS466DXGoldStar GS466DXEGRiD® 486ei-25 SVRGRiD 486ei-33GRiD APT/425se
Ս%¨%8 >€«€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿGRiD APT/450eGRiD MFP 425s+GRiD MFP 433+GRiD MFP 433s+GRiD MFP 450+GRiD MFP 466+GRiD MFP/420sGRiD MFP/425sGRiD MFP/450GRiD MFP/540GVH 486DX2 66 Vesa BusHacker 486DX2/66 for NTHancke & Peter 386w ProfessionalHancke & Peter 486/33w ProfessionalHancke & Peter 486/50w ProfessionalHancke & Peter 486/66w ProfessionalHancke & Peter 486w EISA ProfessionalHarris Epoch 486/33 VESAHarris Epoch 486/50 EISAHarris Epoch 486/50 ISAHauppauge 4860 EISA DX2-66Ô›%»%? L€©€€:‚‚‚‚‚€G€:‚‚‚‚‚‚€G€:‚‚‚‚‚ÿHauppauge 486M Local Bus DX2-66Hertz 486/D50eHertz 486/D50EeHertz 486/D66X2eHertz 486/D66X2EeHewlett-Packard® NetServer 4/33 LEHewlett-Packard NetServer 4/33 LMHewlett-Packard NetServer 4d/66 LEHewlett-Packard NetServer 4d/66 LMHewlett-Packard NetServer 4s/33 LEHewlett-Packard NetServer 5/60 LMHewlett-Packard Vectra® 386/25Hewlett-Packard Vectra 486/25THewlett-Packard Vectra 486/25UHewlett-Packard Vectra 486/33NHewlett-Packard Vectra 486/33STûȨ%¶
%3 4€‘€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿHewlett-Packard Vectra 486/33THewlett-Packard Vectra 486/33UHewlett-Packard Vectra 486/50UHewlett-Packard Vectra 486/66 XMHewlett-Packard Vectra 486/66STHewlett-Packard Vectra 486/66UHewlett-Packard Vectra 486S/20Hewlett-Packard Vectra 486s/25 MIHewlett-Packard Vectra EtherLite 386Hewlett-Packard Vectra EtherLite 486Hewlett-Packard Vectra RS/25CHM Systems Minstrel Xpresso 486Hyundai 425sHyundai 433DDVHyundai 466d2Hyundai Prestige 433de4»% %1 2€h€‚H€:€G€:€G€:‚ÿIBM® EduquestTM Model 50 486DX/33 (9605-040)˜¶
%1
%~ ʀ1€€:€G€:‚‚â¹1€G‰€:‚â¹1€G‰€:‚â¹1€G‰€:‚â¹1€G‰€:‚‚‚‚‚‚â¹1€G‰€:‚â¹1€G‰€:‚ÿIBM PS/1® 2133-xxx 486SX/25IBM PS/1 2133-xxx 486SX/33IBM PS/1 2133A-xxx 486DX/33 4IBM PS/1 2133A-xxx 486DX2/66 4IBM PS/1 2133A-xxx 486SX/25 4IBM PS/1 2133A-xxx 486SX/33 4IBM PS/1 2155-xxx 486DX/33IBM PS/1 2155-xxx 486DX2/50IBM PS/1 2155-xxx 486DX2/66IBM PS/1 2155-xxx 486SX/25IBM PS/1 2155-xxx 486SX/33IBM PS/1 2155A-xxx 486DX2/66 4IBM PS/1 2155A-xxx 486SX/25 4t %¥%\ †€1€â¹1€:€G‰€:‚‚‚‚‚‚â¹1€G‰€:‚â¹1€G‰€:‚â¹1€G‰€:‚ÿIBM PS/1 2155A-xxx 486SX/33 4IBM PS/1 2168-xxx 486DX/33IBM PS/1 2168-xxx 486DX2/50IBM PS/1 2168-xxx 486DX2/66IBM PS/1 2168-xxx 486SX/25IBM PS/1 2168-xxx 486SX/33IBM PS/1 2168A-xxx 486DX2/66 4IBM PS/1 2168A-xxx 486SX/25 4IBM PS/1 2168A-xxx 486SX/33 42Í1
%ã@%e ˜€›€‚Hâº1€:€G€:€G‰€:‚âº1€G‰€:‚‚‚‚‚âº1€G‰€:‚‚‚âº1€G‰€:‚ÿIBM PS/2® Model 50/50Z System Board Upgrade 486SLC2/50 5IBM PS/2 Model 55/55SX System Board Upgrade 486SX/25 5IBM PS/2 Model 56 8556-xxx 486SLC/20IBM PS/2 Model 56 9556-xxx 486SLC2/50IBM PS/2 Model 57 8557-xxx 486SLC/20IBM PS/2 ¥%ã@%#‡#Model 57 9557-xxx 486SLC2/50IBM PS/2 Model 60/80 System Board Upgrade 486DX/33 5IBM PS/2 Model 70 8570-xxx 386DX/25IBM PS/2 Model 70 8570-xxx 486DX/25IBM PS/2 Model 70 System Board Upgrade 486DX/33 5#ó¥%C%0 .€ç€‚H€:‚‚‚‚‚‚‚‚‚‚‚ÿIBM PS/2 Model 76 9576-xxx 486DX2/66IBM PS/2 Model 76 9576-xxx 486SX/33IBM PS/2 Model 77 9577-xxx 486DX2/66IBM PS/2 Model 77 9577-xxx 486SX/33IBM PS/2 Model 80 8580-xxx 386DX/25IBM PS/2 Model 90 XP 486 8590-0H* 486SX/25IBM PS/2 Model 90 XP 486 8590-0J* 486DX/25IBM PS/2 Model 90 XP 486 8590-0K* 486DX/33IBM PS/2 Model 90 XP 486 8590-0L* 486DX2/50IBM PS/2 Model 90 XP 486 8590-xxx with 486DX2/66 processor upgradeIBM PS/2 Model 90 XP 486 8590-xxx with Enhanced 486DX/50 processor upgrade,úã@%2E%2 2€õ€‚H€:‚€G€:‚‚‚‚‚‚ÿIBM PS/2 Model 90 XP 486 8590-xxx with Enhanced 486DX2/66 processor upgradeIBM PS/2 Model 90 XP 486 8590-xxx with processor upgrade with PentiumTM TechnologyIBM PS/2 Model 90 XP 486 9590-0L* 486DX2/50IBM PS/2 Model 90 XP 486 9590-xxx with 486DX2/66 processor upgradeIBM PS/2 Model 90 XP 486 9590-xxx with Enhanced 486DX/50 processor upgradeIBM PS/2 Model 90 XP 486 9590-xxx with Enhanced 486DX2/66 processor upgradeIBM PS/2 Model 90 XP 486 9590-xxx with processor upgrade with Pentium Technology3C%eG%. *€ €‚H€:‚‚‚‚‚‚‚‚‚ÿIBM PS/2 Model 95 XP 486 8595-0H* 486SX/25IBM PS/2 Model 95 XP 486 8595-0J* 486DX/25IBM PS/2 Model 95 XP 486 8595-0K* 486DX/33IBM PS/2 Model 95 XP 486 8595-0L* 486DX2/50IBM PS/2 Model 95 XP 486 8595-0M* 486DX/50IBM PS/2 Model 95 XP 486 8595-xxx with 486DX2/66 processor upgradeIBM PS/2 Model 95 XP 486 8595-xxx with Enhanced 486DX/50 processor upgradeIBM PS/2 Model 95 XP 486 8595-xxx with Enhanced 486DX2/66 processor upgradeIBM PS/2 Model 95 XP 486 8595-xxx with processor upgrade with Pentium Technologyé2E%|I%. *€Ó€‚H€:‚‚‚‚‚‚‚‚‚ÿIBM PS/2 Model 95 XP 486 9595-0L* 486DX2/50IBM PS/2 Model 95 XP 486 9595-0M* 486DX/50IBM PS/2 Model 95 XP 486 9595-xxx with 486DX2/66 processor upgradeIBM PS/2 Model 95 XP 486 9595-xxx with Enhanced 486DX/50 processor upgradeIBM PS/2 Model 95 XP 486 9595-xxx with Enhanced 486DX2/66 processor upgradeIBM PS/2 Model 95 XP 486 9595-xxx with processor upgrade with Pentium TechnologyIBM PS/2 Model P75 8573-xxx 486DX/33IBM PS/2 Server 85 433 9585-0K*IBM PS/2 Server 85 466 9585-0N*ÖeG%‚J%0 .€­€‚H€:‚‚‚‚€G€:‚ÿIBM PS/2 Server 85 9585-0X* 486SX/33IBM PS/2 Server 85 9585-0X* with 486DX2/66 processor upgradeIBM PS/2 Server 95 466 9595-1N*IBM PS/2 Server 95 560 9595-0PTIBM PS/2 UltimediaTM DV M57 9557-xxx 486SLC2/50ç|I%™L%0 .€Ï€€:‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIBM PS/2 Ultimedia M57 8557-xxx 486SLC/20IBM PS/2 Ultimedia M57 9557-xxx 486SLC2/50IBM PS/2 Ultimedia M77 9577-xxx 486DX2/66IBM PS/2 Ultimedia M77 9577-xxx 486SX/33IBM PS/ValuePoint 425SX/D 6384-FxxIBM PS/ValuePoint 425SX/S 6382-FxxIBM PS/ValuePoint 433DX/D 6384-MxxIBM PS/ValuePoint 433DX/S 6382-MxxIBM PS/ValuePoint 433DX/T 6387-MxxIBM PS/ValuePoint 433SX/D 6384-KxxIBM PS/ValuePoint 433SX/S 6382-KxxIBM PS/ValuePoint 466DX2/D 6384-WxxIBM PS/ValuePoint 466DX2/T 6387-Wxxÿ¬‚J%˜N%S t€Y€€:€G€:‚â¸1€G‰€:‚â¸1€G‰€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIBM ThinkPadTM 300IBM ThinkPad 700C 3IBM ThinkPad 720C 3ICL Alfaskop Deskside m458ICL ErgoPRO C4/33ICL ErgoPRO D4/25ICL ErgoPRO D4/33dICL ErgoPRO D4/66d XGICL ErgoPRO D5/60ICL ErgoPRO E4/66dICL System Platform CXe486/66ICL System Platform CXe486iICL System Platform CXe486sICL System Platform FX486/33ICL System Platform FX486/50ICL System Platform FX486/66Image 486DX/50 EISAImage 486DX2/66 VESAR-™L%êN%% €Z€‚H€:‚ÿIndex INDEXPORT 486 OVD 66 LOCAL BUS CACHEݘN%
%: B€»€€:‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIndex INDEXPORT 486/33Index INDEXPORT 486/33 VL VESA CACHEIndex INDEXPORT 486/50 I CACHEIndex INDEXPORT 486/50 VL VESA CACHEInelco INTEL® XPRESS 50MHZInnovax Aurora 486DX/33Insight 66 MHz EISA/VESA 486DX2InsighêN%
%#‡#t 66 MHz ISA/VESA 486DX2Intel Classic R-SeriesIntel L486 Series Professional WorkstationIntel L486-Series/Professional GXIntel X486/50EIntel Xpress 486Intelicom 486DX/33 EISAIntelicom 486DX/33 ISAIntelicom 486DX/33 VESA EISAIntelicom 486DX/33 VLBàêN%#ƒ%6 :€Á€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIntelicom 486DX/50 EISAIntelicom 486DX/50 ISAIntelicom 486DX/50 VESA EISAIntelicom 486DX/50 VLBIntelicom 486DX2/50 EISAIntelicom 486DX2/50 ISAIntelicom 486DX2/50 VESA EISAIntelicom 486DX2/50 VLBIntelicom 486DX2/66 EISAIntelicom 486DX2/66 ISAIntelicom 486DX2/66 VESA EISAIntelicom 486DX2/66 VLBIntelicom 486SX/25 ISAIntelicom 486SX/25 VLBIntelicom 486SX/33 ISAINTERCOMP Digit 486SLC/25INTERCOMP Entry 486/33INTERCOMP Master 486DX/50INTERCOMP Planet 486/50 EISAê
%A…%4 6€Õ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿINTERCOMP Planet 486DX2/66 EISAINTERCOMP Planet LC 486/33 EISAINTERCOMP Target 486/33INTERCOMP Target 486/50 VLBINTERCOMP Target 486DX/50Intergraph PC 433Intergraph PC 466Intergraph Technical Desktop 1220International Data DGI 486DX-66International Data DGI ISA O/D 20Investronica INVES BS-486Investronica INVES BS-486 VLInvestronica INVES IFS-486Investronica INVES IFS-900Investronica INVES MP-900 XM UniProcessorInvestronica INVES WS-900 EVLInvestronica INVES WS-900 VLÕ#ƒ%I‡%3 4€«€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIPC DYNASTY G-PC 486DX-33CVIPC DYNASTY G-PC 486DX2-50CVIPC DYNASTY G-PC 486DX2-66CVIPC DYNASTY G-PC 486SX-25CVIPC DYNASTY HE 486DX-33CIPC DYNASTY HE 486DX2-66CIPC DYNASTY HE 486DX2-50CIPC DYNASTY HE 486SX-25CIPC DYNASTY LE 486DX-33 (incl. 33C)IPC DYNASTY LE 486DX2-50 (incl. 50C)IPC DYNASTY LE 486DX2-66 (incl. 66C)IPC DYNASTY LE 486SX-25 (incl. 25C)IPC DYNASTY S-PC 586DX-60CVIPC DYNASTY SE 486DX-33CIPC DYNASTY SE 486DX2-50CIPC DYNASTY SE 486DX2-66C ÚA…%T‰%1 0€µ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIPC DYNASTY SE 486SX-25CIpex 486DX2-66 Centra 1000Ipex 486DX2-66 Centra 1000 EISAIpex 486DX2-66 Centra 1000 EISA (Entry Level)Ipex 486DX2-66 Centra 1000 EISA/VL-BUSIpex 486DX2-66 Centra 1000 VESAIpex 486DX2-66 Centra 2000Ipex 486DX2-66 Centra 2000 EISAIpex 486DX2-66 Centra 2000 EISA (Entry Level)Ipex 486DX2-66 Centra 2000 EISA/VL-BUSIpex 486DX2-66 Centra 2000 VESAIpex 486DX2-66 DesktopIpex 486DX2-66 Desktop (EISA)Ipex 486DX2-66 Desktop EISA (Entry Level)ÓI‡%X‹%1 0€§€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIpex 486DX2-66 Desktop EISA/VL-BUSIpex 486DX2-66 Desktop VESAIpex 486DX2-66 Mini TowerIpex 486DX2-66 Mini Tower EISAIpex 486DX2-66 Mini Tower EISA (Entry Level)Ipex 486DX2-66 Mini Tower EISA/VL-BUSIpex 486DX2-66 Mini-Tower VESAIpex 486DX2-66 SlimlineIpex 486DX2-66 Slimline (WD Form Factor)Ipex 486DX33 Centra 1000Ipex 486DX33 Centra 1000 EISAIpex 486DX33 Centra 1000 EISA (Entry Level)Ipex 486DX33 Centra 1000 EISA/VL-BUSIpex 486DX33 Centra 1000 VESA
ÛT‰%e%2 2€·€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIpex 486DX33 Centra 2000Ipex 486DX33 Centra 2000 EISAIpex 486DX33 Centra 2000 EISA (Entry Level)Ipex 486DX33 Centra 2000 EISA/VL-BUSIpex 486DX33 Centra 2000 VESAIpex 486DX33 DesktopIpex 486DX33 Desktop EISAIpex 486DX33 Desktop EISA (Entry Level)Ipex 486DX33 Desktop EISA/VL-BUSIpex 486DX33 Desktop VESAIpex 486DX33 Mini TowerIpex 486DX33 Mini Tower EISAIpex 486DX33 Mini Tower EISA (Entry Level)Ipex 486DX33 Mini Tower VESAIpex 486DX33 Mini-Tower EISA/VL-BUSâX‹%y%2 2€Å€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIpex 486DX33 SlimlineIpex 486DX33 Slimline (WD Form Factor)Ipex 486DX50 Centra 1000Ipex 486DX50 Centra 1000 EISAIpex 486DX50 Centra 1000 EISA (Entry Level)Ipex 486DX50 Centra 1000 EISA/VL-BUSIpex 486DX50 Centra 1000 VESAIpex 486DX50 Centra 2000Ipex 486DX50 Centra 2000 EISAIpex 486DX50 Centra 2000 EISA (Entry Level)Ipex 486DX50 Centra 2000 EISA/VL-BUSIpex 486DX50 Centra 2000 VESAIpex 486DX50 DesktopIpex 486DX50 Desktop EISAIpex 486DX50 Desktop EISA (Entry Level) Úe%‘Á%2 2€µ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIpex 486DX50 Desktop EISA/VL-BUSIpex 486DX50 Desktop VESAIpex 486DX50 Mini TowerIy%‘Á%#‡#pex 486DX50 Mini Tower EISAIpex 486DX50 Mini Tower EISA (Entry Level)Ipex 486DX50 Mini Tower VESAIpex 486DX50 Mini-Tower EISA/VL-BUSIpex 486DX50 SlimlineIpex 486DX50 Slimline (WD Form Factor)Ipex 486SX25 Centra 1000Ipex 486SX25 Centra 1000 EISAIpex 486SX25 Centra 1000 EISA (Entry Level)Ipex 486SX25 Centra 1000 EISA/VL-BUSIpex 486SX25 Centra 1000 VESAIpex 486SX25 Centra 2000 Úy%Ã%2 2€µ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIpex 486SX25 Centra 2000 EISAIpex 486SX25 Centra 2000 EISA (Entry Level)Ipex 486SX25 Centra 2000 EISA/VL-BUSIpex 486SX25 Centra 2000 VESAIpex 486SX25 DesktopIpex 486SX25 Desktop EISAIpex 486SX25 Desktop EISA (Entry Level)Ipex 486SX25 Desktop EISA/VL-BUSIpex 486SX25 Desktop VESAIpex 486SX25 Mini TowerIpex 486SX25 Mini Tower (EISA)Ipex 486SX25 Mini Tower EISA (Entry Level)Ipex 486SX25 Mini Tower VESAIpex 486SX25 Mini-Tower EISA/VL-BUSIpex 486SX25 SlimlineÔ‘Á%¢Å%1 0€©€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIpex 486SX25 Slimline (WD Form Factor)Ipex 486SX33 Centra 1000 EISAIpex 486SX33 Centra 1000 EISA (Entry Level)Ipex 486SX33 Centra 1000 EISA/VL-BUSIpex 486SX33 Centra 1000 ISAIpex 486SX33 Centra 1000 VESAIpex 486SX33 Centra 2000 EISAIpex 486SX33 Centra 2000 EISA (Entry Level)Ipex 486SX33 Centra 2000 EISA/VL-BUSIpex 486SX33 Centra 2000 ISAIpex 486SX33 Centra 2000 VESAIpex 486SX33 DesktopIpex 486SX33 Desktop EISAIpex 486SX33 Desktop EISA (Entry Level)
םÃ%¯Ç%6 :€¯€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿIpex 486SX33 Desktop EISA/VL-BUSIpex 486SX33 Desktop VESAIpex 486SX33 Mini Tower EISAIpex 486SX33 Mini Tower EISA (Entry Level)Ipex 486SX33 Mini Tower ISAIpex 486SX33 Mini Tower VESAIpex 486SX33 Mini-Tower EISA/VL-BUSIpex 486SX33 SlimlineIpex 486SX33 Slimline (WD Form Factor)ITG NT 486DX-50 ISAITOS KT 486/33ITOS MT 386DX/40JAI PC 845-66-32VLJDR V486-33JDR V486-66JDR V486SX-33KT Technology KT386DX-33KT Technology KT386DX-40KT Technology KT486DX-33Ù¢Å%¿É%7 <€³€€:‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚ÿKT Technology KT486DX-50KT Technology KT486DX2-50 VESAKT Technology KT486DX2-66 VESA LBL.E.M. Technologies Sys38640/MLeading Edge® D4/DX-33 Plus DeskTopLeading Edge D4/DX-50 Plus DeskTopLeading Edge D4/DX2-50 Plus DeskTopLeading Edge D4/MTDX-33 MiniTowerLeading Edge D4/MTDX-50 MiniTowerLeading Edge D4/MTDX2-50 MiniTowerLeading Edge D4/MTDX2-66 MiniTowerLeading Edge D4/MTSX-25 MiniTowerLeading Edge D4/MTSX-33 MiniTowerLeading Edge D4/SX-25 Plus DeskTopæ¯Ç%×Ë%2 2€Í€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿLeading Edge D4/SX-33 Plus DeskTopLeading Edge WinPro 486/SLC33Leading Edge WinPro 486/SX-25Leading Edge WinPro 486e/DX-33Leading Edge WinPro 486e/DX-33(VL)Leading Edge WinPro 486e/DX-50Leading Edge WinPro 486e/DX2-50Leading Edge WinPro 486e/DX2-50(VL)Leading Edge WinPro 486e/DX2-66Leading Edge WinPro 486e/DX2-66(VL)Leading Edge WinPro 486e/SX-25Leading Edge WinPro 486e/SX-25(VL)Leading Edge WinPro 486e/SX-33Leading Edge WinPro 486e/SX-33(VL)Legacy 486DLC-33 SYSTEMá¿É%ëÍ%3 4€Ã€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿLegacy VLB 486DX-33Lucky Star System w/ Cyrix 486S-33Lundin 400 Series 486 EISA w/ 486DX/50Lundin 400 Series 486 ISA w/ 486DX/33Lundin 400 Series 486 VESA w/ 486DX/33Magitronic G-MD433L-170-4MMagitronic G-MD440G-130-4MMagitronic G-MD466L-210-4MMagitronic G-MS466L-10-16MMaster Cascade 386-40 Small DesktopMaster Cascade 486-33 Mini-TowerMaximus 486-50MHz Maxi-CADMaximus Cyrix 486/40 VESA Local BusMetaTech 486DX/33 ISAMetaTech 486DX/33 VESAMetaTech 486DX/50 EISAÌ×Ë% &8 >€™€€:‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚ÿMicrobyte Lyrebird Model 451Microbyte Lyrebird Model 455Microbyte Lyrebird Model 457Micron 486VL Magnum 433 DXMicron 486VL Magnum 433 SXMicron 486VL Magnum 450 DX2Micron 486VL Magnum 466 DX2Micron 486VL MagServer 433 DXMicron 486VL MagServer 450 DX2Micron 486VL MagServer 466 DX2Micron 486VL PowerStationTM 433 DXMicron 486VL PowerStation 433 SXMicron 486VL PowerStation 450 DX2Micron 486VL PowerStation 466 DX2Micron 486VL ValueLine 466 DX2ëÍ% &#‡#çëÍ%&&3 4€Ï€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿMicron 486VL WinServer 433 DXMicron 486VL WinServer 450 DX2Micron 486VL WinServer 466 DX2Micron 486VL WinStation 433 DXMicron 486VL WinStation 433 SXMicron 486VL WinStation 450 DX2Micron 486VL WinStation 466 DX2Midgards Micro ISA 486DX-33Midwest Micro 486DX2/50 Vesa/ISAMIKROLOG OY Osborne 4280G-66MIKROLOG OY Osborne IX5-60EMIKROLOG OY Osborne LP4D-33CLBMIKROLOG OY Osborne LP4D-33NMIKROLOG OY Osborne LP4D-50CMIKROLOG OY Osborne LP4D-50CLBMIKROLOG OY Osborne LP4D-50NÛ &5&4 6€·€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿMIKROLOG OY Osborne LP4D-66CLBMIKROLOG OY Osborne LP4D-66NMIKROLOG OY Osborne LP4S-25NMIKROLOG OY Osborne LP4S-33CLBMIKROLOG OY Osborne LP4S-33NMIKROLOG OY Osborne MT4D-33CLBMIKROLOG OY Osborne MT4D-33NMIKROLOG OY Osborne MT4D-50CLBMIKROLOG OY Osborne MT4D-50NMIKROLOG OY Osborne MT4D-66CLBMIKROLOG OY Osborne MT4D-66NMIKROLOG OY Osborne MT4S-25NMIKROLOG OY Osborne MT4S-33CLBMIKROLOG OY Osborne MT4S-33NMIND 386DX/33 ISAMIND 486DX/33 EISAMIND 486DX/33 ISAÕ&&H&> J€«€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚ÿMIND 486DX/50 EISAMIND 486DX/50 ISAMIND 486DX2/50 EISAMIND 486DX2/50 ISAMIND 486DX2/66 EISAMIND 486DX2/66 ISAMIND 486SX/25 EISAMIND 486SX/25 ISAMIND 486SX/33 EISAMIND 486SX/33 ISAMiTAC DM4066Modular MST/200Monydata Entry 486/33Monydata Modula 200/80Monydata Station 486/80Multitech ProSpec 486DX-50 PS450DE-STMustek BROTHER BCM3486DX2-VLMustek BROTHER BCM4486DX-VLMustek MECER3486-VLMustek MECER7486-VLNational InstrumentsTM VXIpc-486 Model 200È5&L&< F€‘€€:‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚ÿNational Instruments VXIpc-486 Model 500NCR StarStationNCR System 3000 Model 3230NCR System 3000 Model 3314NCR System 3000 Model 3330NCR System 3000 Model 3333NCR System 3000 Model 3335NCR System 3000 Model 3345NCR System 3000 Model 3350NCR System 3000 Model 3355NCR System 3000 Model 3410NCR System 3000 Model 3445NCR System 3000 Model 3447NEC® Express IINEC Image 425NEC Image 433NEC Image 466NEC PowerMate 386/25SNEC PowerMate 425×H&b
&? L€¯€€:‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿNEC PowerMate 433NEC PowerMate 466NEC PowerMate 486/33eNEC PowerMate 486/33iNEC PowerMate 486/50eNEC PowerMate 486/50iNEC PowerMate 486sx/25eNEC PowerMate DX2/66eNEC UltraLiteTM VersaNETiS 386DX/40 ISANETiS 486DX/33 ISANETiS 486DX/33 VLNETiS 486DX/33 VL EISANETiS 486DX/50 VLNETiS 486DX/50 VL EISANETiS 486DX2/50 VL EISANETiS 486DX2/66 ISANETiS 486DX2/66 VLNETiS 486DX2/66 VL EISANETiS 486SX/33 VLNETiS Ultra 486DX/33 ISANETiS Ultra 486DX/50 ISAßL&u &4 6€¿€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿNETiS Ultra 486DX2/66 ISANETiS Ultra 486DX2/66 VLNETiS Ultra 486SX/25 ISANETiS Ultra N433VLNETiS Ultra N450VLNetwork Connection M2Network Connection T-3000Network Connection T-4000Network Connection TNXNetwork Connection Triumph T.R.A.C.Network Connection Triumph T.S.C.VNimrod DESKTOP 486DX/33 VESA VLNimrod DESKTOP 486DX2/66 ISANimrod LC-DESKTOP 486DX/33 VESA VLNimrod LC-DESKTOP 486DX2/66 ISANimrod MINI-TOWER 486DX/33 VESA VLNimrod MINI-TOWER 486DX2/66 ISA×b
&‡&; D€¯€€:‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚ÿNimrod TOWER 486DX/33 VESA VLNimrod TOWER 486DX2/66 ISANORTH-EAST NE Micro 433LVNORTH-EAST NE Micro 450LVNORTH-EAST NE Micro 466LVNorthern Micro NM486/66VLNorthgate® 486/33Northgate 486/33 Slimline ZXPNorthgate 486/33 VESA ISANorthgate 486/33e Baby ATNorthgate Elegance 333Northgate Elegance 425iNorthgate Elegance 433eNorthgate Elegance 433iNorthgate Elegance SP 386/33Northgate Elegance SP 433Northgate Elegance ZXPNorthwest Micro Signature I 4/33
Èu &@&B R€‘€€:‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿNorthwest Micro Signature II 4/33 VLBOKI if Server 466/SLOKI if Station 425/DLOKI if Station 433/DEOKI if486VX550DOlidata P/60Olivetti® LSX5010Olivetti LSX5015Olivetti LSX5020Olivetti LSX5025Olivetti LSX5025 EOlivetti M300-28Olivetti M300-30Olivetti M300-30POlivetti M380-40Olivetti M4-46Oliv‡&@&#‡#etti M4-62Olivetti M4-65Olivetti M4-66Olivetti M400-10Olivetti M400-40Olivetti M400-60Olivetti M480-10 Olivetti M480-20Olivetti M480-40Þ‡&³B&8 >€½€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿOlivetti M6-420Olivetti M6-440Olivetti M6-460Olivetti M6-620Olivetti M6-860Olympia Olystar 300D-33Olympia Olystar 400D-33Olympia Olystar 400D-33 EISAOlympia Olystar 400D-50Olympia Olystar 400D-66Olympia Olystar 400D-66 EISAOlympia Olystar 400S-25Olympia Olystar 400S-33SLOmni Tech 9600 486DX2-66Optima OCT 486DX2-50 VLOptima OCT 486DX250 EISAOptima OCT 486DX266 EISAOptima OCT 486DX266 VLOptima OCT 486DX33 EISAOptima OCT 486DX33 VLOptima OCT 486DX50 EISA
ԝ@&½D&6 :€©€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿOptima OCT 486DX50 VLOptima OCT 486SX25 EISAOptima OCT 486SX25 VLOptima SPRINTER 486DX250 EISAOptima SPRINTER 486SX25 EISAOptimus 486DX/50 EISAOptimus 486DX/50 LocalBusOptimus 486DX2/50 VLOptimus 486DX2/66Optimus 486SX/25 VLOsborne EISA 486DX50 FileserverOsborne Mpower 486DX2-66Osborne Mpower3 486DX33Osborne Mpower3 486SX33Osborne Mpower4 486DX33Osborne Mpower4 486SX33Osicom 4133L 486/DX266 VESA LBOsicom 4133L 486/DX33 VESA LBPackard Bell 1110ͳB&ÄF&: B€›€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿPackard Bell 1120Packard Bell 1150Packard Bell 2050Packard Bell 400TPackard Bell 470Packard Bell 485Packard Bell 486CDMPackard Bell 486DX/33Packard Bell 486SX/25Packard Bell 495Packard Bell 515EPackard Bell 525EPackard Bell 545EPackard Bell 550Packard Bell 560Packard Bell 565EPackard Bell AXCEL 1033Packard Bell AXCEL 105Packard Bell AXCEL 1066Packard Bell AXCEL 130Packard Bell AXCEL 2005Packard Bell AXCEL 2015Packard Bell AXCEL 2033¸½D&|G&( €!€€:‚‚‚‚‚ÿPackard Bell AXCEL 205Packard Bell AXCEL 2066 MINITOWERPackard Bell AXCEL 230Packard Bell AXCEL 405 (incl. H model)Packard Bell AXCEL 410¨€ÄF&$H&( €€‚H€:‚‚‚ÿPackard Bell AXCEL 410E (incl. H, F and W G models)Packard Bell AXCEL 420Packard Bell AXCEL 450G (incl. H, J and TJ models)‰Z|G&­I&/ ,€µ€€:‚‚‚‚‚‚‚‚‚‚‚‚ÿPackard Bell AXCEL 460Packard Bell AXCEL 460H (incl. TJ model)Packard Bell AXCEL 486/33Packard Bell AXCEL 486A66Packard Bell AXCEL 486SXPackard Bell AXCEL 530Packard Bell AXCEL 533H (incl. J and TJ models)Packard Bell AXCEL 533STJPackard Bell AXCEL 550Packard Bell AXCEL 550MT/JPackard Bell AXCEL 570Packard Bell AXCEL 630 MINITOWER&ö$H&ÓK&0 .€í€‚H€:‚‚‚‚‚‚‚‚‚‚‚ÿPackard Bell AXCEL 666J (incl. TJ and TL models)Packard Bell AXCEL 850Packard Bell EXECUTIVE 486/33 (incl. ELITE model)Packard Bell EXECUTIVE 486/33 G (incl. J model)Packard Bell EXECUTIVE 486DX2/JW (incl. TY model)Packard Bell EXECUTIVE 486SX (incl. -2F and -G models)Packard Bell EXECUTIVE 486SX ELITE (incl. SERIES SI model)Packard Bell EXECUTIVE 486SX-ECPackard Bell EXECUTIVE 486SX/FW (incl. /HW model)Packard Bell EXECUTIVE 486SX250Packard Bell EXECUTIVE 486XE (incl. C and S models) Õ­I&ÜM&4 6€«€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿPackard Bell EXECUTIVE Elite Series 486SXCCPackard Bell FORCE 1066Packard Bell FORCE 107Packard Bell FORCE 110Packard Bell FORCE 1135Packard Bell FORCE 1137Packard Bell FORCE 117Packard Bell FORCE 200Packard Bell FORCE 2010Packard Bell FORCE 2020Packard Bell FORCE 2040 MINITOWERPackard Bell FORCE 2233 MINITOWERPackard Bell FORCE 2376 (incl. F model)Packard Bell FORCE 2386 MINITOWERPackard Bell FORCE 250Packard Bell FORCE 405Packard Bell FORCE 425éÓK& €&/ ,€Ó€‚H€:‚‚‚‚‚‚‚‚‚‚ÿPackard Bell FORCE 486 SX (incl. E, -M1, and -M130 models)Packard Bell FORCE 486/25Packard Bell FORCE 486/33 (incl. +, E, -M1, and -M210 models)Packard Bell FORCE 486/33G (incl. J, JW, and PLUS models)Packard Bell FORCE 48625 (incl. EX model)Packard Bell FORCE 486CDM-1/TVPackard Bell FORCE 486DX/DJ-W (incl. G-W, H, H2, J and JT-W models)Packard Bell FORCE 486DX2 -WGPackard Bell FORCE 486DX2/EJT (incl. W model)Packard Bell FORCE 486DX2/F JT (incl. JT-W, J-W and LT-W models)ÜM& €&#‡#;ÜM&G&+ $€!€‚H€:‚‚‚‚‚‚ÿPackard Bell FORCE 486DX2/G-WPackard Bell FORCE 486MT50JPackard Bell FORCE 486SX (incl. /20, /20G, E, M1, and M130 models)Packard Bell FORCE 486SX-WGPackard Bell FORCE 486SX/25 (incl. G and W models)Packard Bell FORCE 486SX/BE (incl. FW, FW-2, M, MM and H2 models)Ò €&Iƒ&0 .€¥€€:‚‚‚‚‚‚‚‚‚‚‚‚‚ÿPackard Bell FORCE 486SX/OH-WPackard Bell FORCE 515Packard Bell FORCE 515S (incl. PLUS model)Packard Bell FORCE 525 (incl. B and S models)Packard Bell FORCE 545 (incl. B and S models)Packard Bell FORCE 565 (incl. S model)Packard Bell FORCE 600 (incl. B and S models)Packard Bell FORCE 715 MINITOWERPackard Bell FORCE T66Packard Bell LEGEND 102H (incl. ELITE model)Packard Bell LEGEND 1066 WG ELITEPackard Bell LEGEND 1133Packard Bell LEGEND 1134 ELITEàG&^…&5 8€Á€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿPackard Bell LEGEND 1135Packard Bell LEGEND 1136Packard Bell LEGEND 115Packard Bell LEGEND 1166Packard Bell LEGEND 1176Packard Bell LEGEND 120Packard Bell LEGEND 125Packard Bell LEGEND 126 ELITEPackard Bell LEGEND 127Packard Bell LEGEND 128Packard Bell LEGEND 135 (incl. H model)Packard Bell LEGEND 140Packard Bell LEGEND 1900Packard Bell LEGEND 1910Packard Bell LEGEND 2000Packard Bell LEGEND 2001Packard Bell LEGEND 2002 ELITEPackard Bell LEGEND 2011 SUPREMEÅ•Iƒ&#‡&0 .€+€€:‚‚‚‚‚‚‚‚‚‚‚‚‚ÿPackard Bell LEGEND 2025Packard Bell LEGEND 207Packard Bell LEGEND 2133 MINITOWERPackard Bell LEGEND 2135 MINITOWERPackard Bell LEGEND 2176 ELITE MTPackard Bell LEGEND 2266 MINITOWERPackard Bell LEGEND 2270 MINITOWERPackard Bell LEGEND 2276 MINITOWERPackard Bell LEGEND 2300 MINITOWERPackard Bell LEGEND 233Packard Bell LEGEND 234 ELITEPackard Bell LEGEND 245Packard Bell LEGEND 33T SUPREMEÜ^…&1‰&2 2€¹€‚H€:‚‚‚‚‚‚‚‚‚‚‚‚‚ÿPackard Bell LEGEND 33T SUPREME MINITOWERPackard Bell LEGEND 430 G (incl. WG and F models)Packard Bell LEGEND 430 WG ELITEPackard Bell LEGEND 430E (incl. E2 and EL models)Packard Bell LEGEND 435E ELITE (incl. 2 ELITE model)Packard Bell LEGEND 440GPackard Bell LEGEND 445 G ELITE (incl. G 2 ELITE model)Packard Bell LEGEND 486CDM-1/TVPackard Bell LEGEND 486T/50Packard Bell LEGEND 510HPackard Bell LEGEND 605H ELITEPackard Bell LEGEND 625Packard Bell LEGEND 635J{U#‡&¬‰&& €ª€‚H€:‚‚ÿPackard Bell LEGEND 635TJ ELITEPackard Bell LEGEND 660 (incl. H and ELITE models)ß1‰&½‹&2 2€¿€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿPackard Bell LEGEND 660HPackard Bell LEGEND 660TJ (incl. H model)Packard Bell LEGEND 66D SUPREMEPackard Bell LEGEND 66T SUPREMEPackard Bell LEGEND 670Packard Bell LEGEND 695 SUPREMEPackard Bell LEGEND 700 (incl. ELITE model)Packard Bell LEGEND 740Packard Bell LEGEND 747 MINITOWERPackard Bell LEGEND 750 SUPREMEPackard Bell LEGEND 760 SUPREMEPackard Bell LEGEND 770 (incl. ELITE model)Packard Bell LEGEND 780Packard Bell LEGEND 780 SUPREMEPackard Bell LEGEND 790‰&«&/ ,€€‚H€:‚‚‚‚‚‚‚‚‚‚ÿPackard Bell LEGEND 800 SUPREME (incl. 800+)Packard Bell LEGEND 800 SUPREME/50Packard Bell LEGEND 840 MINITOWERPackard Bell LEGEND 845 MINITOWERPackard Bell LEGEND 848 MINITOWERPackard Bell LEGEND 900 F (incl. F-ELITE and G models)Packard Bell LEGEND 920SX SUPREMEPackard Bell LEGEND 925 G (incl. G ELITE and J model)Packard Bell LEGEND 933 G (incl. G ELITE, J, J ELITE and J+)Packard Bell LEGEND 950 ELITE (incl. J and J ELITE models)mI½‹&Ž&$ €’€€:‚‚ÿPackard Bell LEGEND 960TJPackard Bell LEGEND 966J (incl. ELITE model)R«&—&- (€¥€‚H€:‚‚‚‚‚‚‚‚ÿPackard Bell LEGEND 966TJ (incl. TJ ELITE, TJ2 ELITE, TJ-W ELITE, WG and TZ models)Packard Bell LEGEND M950Packard Bell LEGEND MT950 (incl. J model)Packard Bell LEGEND T66Packard Bell PACKMATE 486/33G (incl. J model)Packard Bell PACKMATE 486/EPackard Bell PACKMATE 48625Packard Bell PACKMATE 486DX/33 Y (incl. Y-W and X models)ÚŽ&ªÁ&- (€µ€€:‚‚‚‚‚‚‚‚‚‚ÿPackard Bell PACKMATE 486DX2/50TY (incl. TY-W model)Packar—&ªÁ&#‡#d Bell PACKMATE 486DX2/T Z - W (incl. Y model)Packard Bell PACKMATE 486DX33/T Y (incl. /TY-W model)Packard Bell PACKMATE 486SXPackard Bell PACKMATE 486SX/20 E (incl. F, and G models)Packard Bell PACKMATE 486SX/25GPackard Bell PACKMATE 486SX/25W (incl. TG model)Packard Bell PACKMATE 486SX/33X (incl. X2 and TM models)Packard Bell PACKMATE 486SX25U (incl. U2 and X models)Packard Bell PACKMATE 733 C MT З&¶Ã&< F€¡€€:‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚ÿPackard Bell PACKMATE X225Packard Bell PACKMATE X230Packard Bell PACKMATE X233Packard Bell PACKMATE X240Packard Bell PACKMATE X250 (incl. Y model)Packard Bell PACKMATE XT266PC House Micro Q 486dx2-66PC Tech Zeos® UpgradablePC-Brand Leader 486dx/33 CachePC-Brand Leader 486dx2/66 CachePC-Brand NB 486slcPeacock 486DX 50Pionex 486DX/33 VLPionex 486DX2/50 VLPionex 486DX2/66 EISA/VLPionex 486DX2/66 VLPionex 486SX/25 VLPoly 486-33VZPoly 486-50EâªÁ&ÓÅ&; D€Å€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿPoly 486-66EPoly 486-66EVPoly 486-66VIPoly 486-66VLPoly 486SX-25YPoly 486SX-33VLPositive by Tandon 486dx/33Positive by Tandon 486dx2/66Precision 486/50 EISAPrecision 486/50FPrecision 486/66 EISA VL-BusPrecision 486/66 VL-BusPrecision 486/66EPrimax 425SVIPrimax 433VIPrimax 450VEPrimax 450VIPrimax 466VIPrimax 486/33EPrimax 486/66EProcomp TW 9300Professional Concepts Beeker 4-33/VL2Professional Concepts Beeker 4-50/VL2Professional Concepts Beeker 4-66/VL2ç¶Ã&íÇ&3 4€Ï€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿProfessional Concepts Beeker 6900Professional Concepts Quinn 4-33/VLEProfessional Concepts Quinn 4-50/VLEProfessional Concepts Quinn 4-66/VLEProfessional Concepts Saavij 4-33/VL3Professional Concepts Saavij 4-50/VL3Professional Concepts Saavij 4-66/VL3Progen 466Protech 486-66Mhz EISAProtech 486-66Mhz EISA/VLProtech 486-66Mhz ISAProtech 486-66Mhz ISA/VLQNIX OMNI486DX2/66Quadrant 486DX/33 VESA LOCAL BUSQuadrant 486DX/50 VESA LOCAL BUSQuadrant 486DX2/66 VESA LOCAL BUSGÓÅ&4Ê&E X€€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚âº1€G‰€:‚ÿQuadrant 486SX/25 VESA LOCAL BUSQuadrant 486SX/33 VESA LOCAL BUSQuantex 486DX/33 VLQuantex 486DX2/50 VLQuantex 486DX2/66 EISA/VLQuantex 486DX2/66 VLQuantex 486SX/25 VLQuattro Prompt4Radisys EPC-23Radisys EPC-4Radisys EPC-5Radisys EPC-7Rask REC 486-50FRDIpc i486DX2/66c EisaRDIpc i486DX2/66c IsaRDIpc i486DX2/66c VL BusRepco Data R33B486Repco Data Turbo APM-420 DXRepco Data Turbo APM-425 DXRepco Data Turbo APM-433Reply Model 32Reply PS/2 Model 50/50Z System Board Upgrade 486SLC2/50 5ÅíÇ&KÌ&R r€‹€âº1€:€G‰€:‚âº1€G‰€:‚âº1€G‰€:‚‚‚‚‚‚‚‚‚ÿReply PS/2 Model 55/55SX System Board Upgrade 486/25 5Reply PS/2 Model 60/80 System Board Upgrade 486/33 5Reply PS/2 Model 70 System Board Upgrade 486/33 5Research Machines RM E Series QE-486/33Research Machines RM S Series PC-486/25SXResearch Machines RM SystemBase 486/33Research Machines RM V Series V466Rolta ROLTASTATION 433ERose Computer Cidex 386DX-40 ISA(AMD)Rose Computer Cidex 486DX-40 ISASamsung DeskMaster 486/33P¸4Ê&aÎ&^ Š€q€€:‚‚‚‚‚‚‚‚‚â»1€G€:€G‰€:‚â»1€G‰€:‚â»1€G‰€:‚‚‚‚‚‚ÿSamsung DeskMaster 486D2/66ESamsung DeskMaster 486S/25NSanyo MBC-19teSCA Professional 3486DX2/66 VLBSCA Professional 486DX 50 VLB SCA Professional 486DX2/66 VLBSeanix ASI 948633VMSeanix ASI 948650VMSeanix ASI 9DX266VMSequent® WinServer 1000up 6Sequent WinServer 1500up 6Sequent WinServer 3000up 6Shuttle 486VL 50Sidus Formula 486/33iSidus Formula 486/50eSiemens-Nixdorf PCD-3M/25Siemens-Nixdorf PCD-3T/33ÚKÌ&|'5 8€µ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿSiemens-Nixdorf PCD-4G/33Siemens-Nixdorf PCD-4G/66Siemens-Nixdorf PCD-4GSX/25Siemens-Nixdorf PCD-4H/66Siemens-Nixdorf PCD-4HSXSiemens-Nixdorf PCD-4LSLSiemens-Nixdorf PCD-4LSXSiemens-Nixdorf PCD-4T/33Siemens-Nixdorf PCD-4T/66Siemens-Nixdorf PCE-4C/DX2-66Siemens-Nixdorf PCE-4C/SX25Siemens-Nixdorf PCE-4R/33Siemens-Nixdorf PCE-4RSX/25Siemens-Nixdorf aÎ&|'#‡#PCE-4T/66Siemens-Nixdorf PCE-5S/60Silicon Star AV4 486DX2/66Silicon Star AV4 486DX33Silicon Star AV4 50MHzàaÎ&Ž'2 2€Á€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿSirex Eaton 486DX-33 EISA/LocalBusSirex PowerMaster 486DX-33 EISA/VLBSirex PowerMaster 486DX2-50 EISA/VLBSirex PowerMaster 486DX2-66 EISA/VLBSirex SpeedMaster 486DX-33 ISASirex SpeedMaster 486DX-33 LocalBusSirex SpeedMaster 486DX-50 ISASirex SpeedMaster 486DX2-50 ISASirex SpeedMaster 486DX2-50 LocalBusSirex SpeedMaster 486DX2-66 ISASirex SpeedMaster 486DX2-66 LocalBusSirex SpeedMaster 486SX-33 LocalBusSKAI 486DX/50VLSKAI 486DX2/66EVLSoftworks Citus MDC 386-33Ô|'–'4 6€©€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿSoftworks Citus MDC 486DX-33Softworks Citus MDC 486DX-50Softworks Citus MDC 486DX2-50Softworks Citus MDC 486DX2-66Softworks Citus MDC X 486 50SRC Systems 486DX2/66 VESA LOCAL BUSSRC Systems GRAPHICSTATIONSRC Systems High Performance SCSI 66MHz Standard Computronics HIPPO-VL 486DX2-66 VESA LOCAL BUSSTD 4D250STD 4D33STD 4DV266SuperCom Touch TI433SuperCom Touch TI450SuperCom Touch TI466Svensk LAPLINE DeskTop 462 (incl. MiniTower Model)Swan 486/33DBËŽ'™'8 >€—€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿSwan 486/33VSwan 486/50ESSwan 486/66ESSwan 486DX/33 EISA-DBSwan 486DX2/50DBSwan 486DX2/66 EISA-DBSwan 486DX2/66DBSwan 486SX/25DBSwan 486SX/25VSyncomp Mega+386i 40 PCSyncomp Mega+486DX2/50e PCSyncomp Mega+486DX2/50i PCSyncomp Mega+486DX2/66e PCSyncomp Mega+486DX2/66i PCSyncomp Mega+486e-33 PCSyncomp Mega+486e-50 PCSyncomp Mega+486i-33 PCSyncomp Mega+486i-50 PCSyncomp Mega+486SXe-25 PCSyncomp Mega+486SXi 33 PCSyncomp Mega+486SXi-25 PCÍ–'›'5 8€›€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿSyncomp Micro 386i 40 PCSyncomp Micro 486DX2/50i PCSyncomp Micro 486i-33 PCSyncomp Micro 486i-50 PCSyncomp Micro 486SXi-25 PCSyncomp Mini 386i-40PCSyncomp Mini 486-50i PCSyncomp Mini 486DX2/50e PCSyncomp Mini 486DX2/50i PCSyncomp Mini 486DX2/66e PCSyncomp Mini 486DX2/66i PCSyncomp Mini 486e-33 PCSyncomp Mini 486e-50 PCSyncomp Mini 486i-33 PCSyncomp Mini 486SXe-25 PCSyncomp Mini 486SXi-25 PCSyncomp Mini 486SXi-33 PCSyncomp Mini+386i 40 PCÜ™'®
'7 <€¹€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿSyncomp Mini+486DX2/50e PCSyncomp Mini+486DX2/50i PCSyncomp Mini+486DX2/66e PCSyncomp Mini+486DX2/66i PCSyncomp Mini+486e-33 PCSyncomp Mini+486e-50 PCSyncomp Mini+486i 33 PCSyncomp Mini+486i-50 PCSyncomp Mini+486SXe-25 PCSyncomp Mini+486SXi 33 PCSyncomp Mini+486SXi-25 PCSys Technology ST486DX-33VMT-DATA LIN 486-33 DXT-DATA LIN 486-50 DXTandon 486dx/33Tandon 486dx2/66Tandon MCSII 486dx/33Tandon MCSII 486dx/33cTandon MCSII 486dx2/66cTandon NII 486dx/33É›'¶ '? L€“€€:‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿTandon PACII plus 486dx2/66Tandon PCAII 486dx2/66Tandon PCAII 486sx/25Tandon Profile 486dx/33Tandon TargetII 486dx2/66Tandon TargetII 486sx/25Tandon Tower 486dx2/66eTandon TowerII 486dx2/66Tandy® 3100Tandy 425 SXTandy 433 DXTandy 433 SXTandy 450 DX2Tandy 466 DX2Tandy 4825 SXTandy 4833 LX/TTandy 4850 EPTandy 4866 LX/TTandy Omni Profile II 425 SXTandy Omni Profile II 433 DXTandy Omni Profile II 433 SXTandy Omni Profile II 450 DX2â®
'Î'6 :€Å€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿTandy Omni Profile II 466 DX2Tandy Onmi II MT 425 SXTandy Onmi II MT 433 DXTandy Onmi II MT 433 SXTandy Onmi II MT 450 DX2Tandy Onmi II MT 466 DX2Tangent 486DX/33 EISATangent 486DX/33 ISATatung TCS-8460S 386SX/25Tatung TCS-9300T 486DX2/66Tatung TCS-9360T 486DX/33Tatung TCS-9370T 486DX2/66Tatung TCS-9510 486DX/33Tatung TCS-9540 486DX/33Tatung TCS-9620E 486DX2/66Tatung TCS-9650E 486DX2/66Tatung TCS-9700 486DLC/40Tatung TCS-9910S 486SLC/33Techway Endeavour E62 ¶ 'á@'g œ€A€€:‚‚‚‚‚‚‚â¸1€G€:€G€:€G‰€:‚â¸1€G‰€:‚â¸1€G‰€:‚‚‚€G€:‚‚ÿTechway Endeavour E62VLTechway Endeavour E77Techway Endeavour E77VLTechway Endeavour E84Techway Endeavour E84VLTELEMECANIQUE FTX507-6BTELEMECANIQUE FTX507-8CTexas Instruments® TravelMateTM 4Î'á@'#‡#000 Color Series 3Texas Instruments TravelMate 4000 Series 3Texas Instruments TravelMate 4000 WinDX2 3TFE Atlantic 486 DX 50MhzTiki-Data PC UNIVERSALToshiba® Satellite T1900CToshiba T4400SXËÎ'ïB'C T€—€€:‚‚‚â¼1€G‰€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿToshiba T4500Toshiba T4600CToshiba T6400SXToshiba T6600C Multimedia Computer 7Tri-Star Tri-Win StationTri-Star TriCAD 486/66TriGem 486/33MM (incl. 486 /P (Type 30) model)TriGem 486/50FTriGem 486/66FTriGem 486/66VCTriGem 486DX2/50MM (incl. 486 /P (Type 40) model)TriGem 486DX2/66MM (incl. 486 /P (Type 50) model)TriGem 486P/T15VTriGem 486P/T25VTriGem 486P/T35VTriGem 486P/T55VTriGem 486VCTriGem 4DX/33 MLTriGem 4DX/33METriGem 4DX2/50 Ñá@'úD': B€£€€:‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚ÿTriGem 4DX2/50METriGem 4DX2/66 MLTriGem 4DX2/66METriGem 4SX/25 MLTriGem 4SX/25METriGem 4SX/33 MLTriGem 4SX/33METriGem 586TTriGem SX486/25CTriGem SX486/25MM (incl. 486 /P (Type 10 and 12) models)TriGem SX486/33MM (incl. 486 /P (Type 20) model)Tulip® Vision Line DS 486 dx/50iTulip Vision Line DS/DE 486 dx/33iTulip Vision Line DT/DC 486 DX/33iTulip Vision Line DT/DC 486 DX/50iTulip Vision Line DT/DC 486 DX/66iTulip Vision Line series 486DX-33iäïB'G'5 8€É€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿTulip Vision Line series 486DX-50iTulip Vision Line series 486DX-66eTulip Vision Line Series 486DX-66iTWINHEAD Superset 700U.S. Micro Jet 386-33U.S. Micro Jet 386-40U.S. Micro Jet 486-33U.S. Micro Jet 486-50U.S. Micro Jet 486DLC-33U.S. Micro Jet 486DX2-50U.S. Micro Jet 486DX2-66U.S. Micro Jet 486SX-25U.S. Micro Jet EISA 486-33U.S. Micro Jet EISA 486-50U.S. Micro Jet EISA 486DX2-50U.S. Micro Jet EISA 486DX2-66U.S. Micro Jet EISA 486SX-25U.S. Micro Jet VL 486-50ÝúD',I'< F€»€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚ÿU.S. Micro Jet VL 486DX2-50U.S. Micro Jet VL 486DX2-66U.S. Micro Jet VL 486SX-25U.S. Micro Jet VL486-33Ultra-Comp 486DX-33Ultra-Comp 486DX-33 EISA VLBUltra-Comp 486DX-33 VLBUltra-Comp 486DX-50Ultra-Comp 486DX-50 EISA VLBUltra-Comp 486DX-50 VLBUltra-Comp 486DX2-66Ultra-Comp 486DX2-66 EISA VLBUltra-Comp 486DX2-66 VLBUnidata 486 66 Mhz ISAUnisys® PW2 3336Unisys PW2 Advantage 3256Unisys PW2 Advantage 3336Unisys PW2 Advantage 4163Unisys PW2 Advantage 4253 ÔG'5K'5 8€©€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿUnisys PW2 Advantage 4256Unisys PW2 Advantage 4336Unisys PW2 Advantage 4506Unisys PW2 Advantage 46662Unisys PW2 Advantage Plus 4668Unisys PW2 Advantage Plus 5606Unisys PW2 Advantage Plus 5608US Logic Falcon II Single Board ComputerVektron VL 486DX/33Vektron VL 486DX2/50 Business MultimediaVektron VL 486DX2/66 Professional MultimediaVictor 400 DX/50Victor 400 SX/25Victor 486 DX/66Victor 486DX/33Victor DX/50Victor V486DSX/25Viglen Contender 4DX33Ñ,I'9M'3 4€£€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿViglen EX-Series 4DX50Viglen Genie 4DX66Vobis 4386 VIO SX25Vobis 486 VC-HD 33Vobis 486 VC-HD 50Vobis 486 VIO 66Vtech Expo-Tech 486DX/3 Mini (w/VLBUS)Vtech Expo-Tech 486DX2/6 Mini (w/VLBUS)Vtech Expo-Tech 486SX/4 Mini (w/VLBUS)Vtech LASER 386 Ultra SlimVtech LASER 486DX/3 DesktopVtech LASER 486DX/3 Desktop (w/LBVGA)Vtech LASER 486DX/3 Desktop (w/VLBUS)Vtech LASER 486DX/3 Mini (w/VLBUS)Vtech LASER 486DX/3 TowerVtech LASER 486DX/3 Tower (w/VLBUS)ä5K'NO'1 0€É€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿVtech LASER 486DX2/4 DesktopVtech LASER 486DX2/4 Desktop (w/LBVGA)Vtech LASER 486DX2/4 Desktop (w/VLBUS)Vtech LASER 486DX2/4 TowerVtech LASER 486DX2/4 Tower (w/VLBUS)Vtech LASER 486DX2/6 DesktopVtech LASER 486DX2/6 Desktop (w/LBVGA)Vtech LASER 486DX2/6 Desktop (w/VLBUS)Vtech LASER 486DX2/6 Mini (w/VLBUS)Vtech LASER 486DX2/6 TowerVtech LASER 486DX2/6 Tower (w/VLBUS)Vtech LASER 486SX/3 DesktopVtech LASER 486SX/3 Desktop (w/LBVGA)Vtech LASER 486SX/3 Desktop (w/VLBUS)
Õ9M'g'8 >€«€€:‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚ÿVtech LASER 486SX/3 TowerVtech LASER 486SX/3 Ultra SlimVtech LASER 486SX/3 Ultra Slim (w/LBVGA)Vtech LASER 486SX/4 DesNO'g'#‡#ktopVtech LASER 486SX/4 Desktop (w/LBVGA)Vtech LASER 486SX/4 Desktop (w/VLBUS)Vtech LASER 486SX/4 Mini (w/VLBUS)Vtech LASER 486SX/4 TowerVtech LASER 486SX/4 Ultra SlimVtech LASER 486SX/4 Ultra Slim (w/LBVGA)Vtech LASER LT322 NotebookVtech LASER LT421 NotebookVtech Platinum SMPWang® Microsystems ASI-CPU-E266Wang Microsystems DTE-33ëNO'†ƒ'4 6€×€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿWang Microsystems PC 350/40CWestern 486V25 SX VESA LOCAL BUSWestern 486V33 DX EISAWestern 486V33 DX ISAWestern 486V50 DX EISAWestern 486V50 DX ISAWestern 486V50 DX2 ISAWestern 486V66 DX2 EISAWestern 486V66 DX2 ISAWIPRO LANDMARK EWIPRO LANDMARK E SQUARE MODEL - 560WIPRO Super Genius 386DXWIPRO Super Genius 386SXWIPRO Super Genius 486DXWIPRO Super Genius 486SXWyle Laboratories Intel Xpress Deskside w/486DX-50MHzWyle Laboratories Intel Xpress DeskTop w/486DX2-66MHz Ñg'’…'; D€£€€:‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿWyle Laboratories Intel Xpress DeskTop w/486DX-50MHzWyse® Decision 386/25Wyse Decision 386/40Wyse Decision 386SX/25CWyse Decision 486/25Wyse Decision 486/33Wyse Decision 486/33EWyse Decision 486/33TWyse Decision 486DX2/50Wyse Decision 486se-25SXWyse Decision 486se-33DXWyse Decision 486se-33SXWyse Decision 486se-50DX2Wyse Decision 486se-66DX2Wyse Decision 486si-25SXWyse Decision 486si-33DXWyse Decision 486si-33SXWyse Decision 486si-50DX2Ô†ƒ'™‡'3 4€©€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿWyse Decision 486si-66DX2Wyse Series 6000i Model 640Wyse Series 6000i Model 645Wyse Series 7000i Model 740Xycom XVME-674Zenith Data Systems Z-386/33EZenith Data Systems Z-425/SXZenith Data Systems Z-425S+Zenith Data Systems Z-433/DXZenith Data Systems Z-450X+Zenith Data Systems Z-486/33ETZenith Data Systems Z-486SX/20Zenith Data Systems Z-486SX/25EZenith Data Systems Z-Note 425LnZenith Data Systems Z-SERVER 425SEZenith Data Systems Z-SERVER 433DE:’…'Ӊ'+ $€€€:‚‚‚‚‚‚‚‚ÿZenith Data Systems Z-SERVER 450DEZenith Data Systems Z-SERVER EX 433DE Model 1000A (incl. Model 2000A)Zenith Data Systems Z-SERVER EX 433DE Model 500 (incl. Model 1000)Zenith Data Systems Z-SERVER EX 450DE Model 1000A (incl. Model 2000A)Zenith Data Systems Z-SERVER EX 450DE Model 500 (incl. Model 1000)Zenith Data Systems Z-SERVER EX P60E Model 1000A (incl. Model 2000A)Zenith Data Systems Z-SERVER EX P60E Model 500 (incl. Model 1000)Zenith Data Systems Z-SERVER LT 433DE Model 245 (incl. Model 1000)$ö™‡'÷‹'. *€í€€:‚‚‚‚‚‚‚‚‚‚‚ÿZenith Data Systems Z-SERVER LT 466XE Model 500 (incl. Model 1000)Zenith Data Systems Z-SERVER LT P60E Model 1000A (incl. Model 2000A)Zenith Data Systems Z-SERVER LT P60E Model 500 (incl. Model 1000)Zenith Data Systems Z-Station 420SEhZenith Data Systems Z-Station 420SEnZenith Data Systems Z-Station 420ShZenith Data Systems Z-Station 420SnZenith Data Systems Z-Station 425ShZenith Data Systems Z-Station 425SnZenith Data Systems Z-Station 433DEhZenith Data Systems Z-Station 433DEn
ÚӉ'Ž'3 4€µ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿZenith Data Systems Z-Station 433DhZenith Data Systems Z-Station 433SEhZenith Data Systems Z-Station 450XEhZenith Data Systems Z-Station 450XhZenith Data Systems Z-Station 450XnZenith/INTEQ TEMPEST 486 WORKSTATION / SERVERZenon Z-Dream IIII EISA/VESA 486DX/66ZEOS 486DX/33CDTZEOS 486DX/33EISAZEOS 486DX/33ISAZEOS 486DX/50ZEOS 486SX/20DTZEOS Freestyle 386SL 25ZEOS Upgradable 486 DX/33 CacheZEOS Upgradable 486 DX2/66 CacheZEOS Upgradable 486 SX/33 CacheH$÷‹'LŽ'$ €H€€:‚‚ÿZEOS Upgradable Local Bus DX2/66MŽ'™Ž'1¾ØGҁO뙎'5'½Ã'x86 Multiprocessor ComputersœuLŽ'5'' €ê€€E€F‚ÿx86 Architecture Multiprocessor ComputersThe following x86 architecture multiprocessor systems have been tested. ™Ž'MÁ'J b€…€â¸1€:€G‰€:‚â¸1€G‰€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿACER AcerFrame 3000MP 33 (Model 3255) 3ACER AcerFrame 3000MP 50 (Model 3257) 3ALR POWERPRO DMP 4/66DALR PROVEISA DM5'MÁ'LŽ'P 4/33ALR PROVEISA DMP 4/50DALR PROVEISA DMP 4/66DAST Manhattan SMPAST Manhattan SMP (Pentium)COMPAQ ProLiant 2000 Model 5/66COMPAQ ProLiant 4000 Model 5/66COMPAQ Systempro Dual 386/25COMPAQ Systempro Dual 486/33COMPAQ Systempro Dual 486/50 XLCOMPAQ Systempro Dual 486DX2/66Corollary Extended C-bus 486DX2/66 5'VÃ'y À€!€€:‚‚â½1€G‰€:‚‚âöYp€G‰€:‚‚‚â»1€G‰€:‚â»1€G‰€:‚â»1€G‰€:‚â»1€G‰€:‚‚‚‚ÿICL System Platform MX486/50NCR System 3000 Model 3360NCR System 3000 Model 3450 8NCR System 3000 Model 3455NCR System 3000 Model 3550 8,6Olivetti LSX5030Olivetti LSX5040Sequent WinServer 1000 6Sequent WinServer 1500 6Sequent WinServer 3000 6Sequent WinServer 5000 6Siemens-Nixdorf PCE-4T/33Siemens-Nixdorf PCE-4T/50(Dual)Wyse Series 7000i Model 740MP/33gBMÁ'½Ã'% €„€€:‚‚‚ÿWyse Series 7000i model 740MP/66Wyse Series 7000i Model 760MPLVÃ' Ä'1T“ OƒOì Ä'‹Ä'®Å'MIPS® ARC/R4000TM Computers‚X½Ã'‹Ä'* $€°€€E€F€?‚ÿMIPS® ARC/R4000™ Series ComputersThe following ARC R4000 systems have been tested.#ó Ä'®Å'0 .€ç€€:‚‚‚‚‚‚‚‚‚‚‚‚‚ÿACER ARC1AcerFormulaCarerra R4000DESKStation Evolution RISC PCMIPS ArcSystem Magnum PC-50MIPS ArcSystem Magnum SC-50MIPS Millenium PC-50MIPS Millenium SC-50NeTPower RISCpc Series 100Olivetti M700-10Olivetti PWS4000Shuttle RiscPCL‹Ä'úÅ'13ҁOQ„OíúÅ'}Æ'Ç'Digital Alpha AXPTM SystemsƒY®Å'}Æ'* $€²€€E€F€?‚ÿDigital Alpha AXP™ SystemsThe Following Digital Alpha AXP systems have been tested.ÛúÅ'Ç'' €·€€:‚‚‚‚ÿDigital Equipment Corporation DECpc AXP 150Digital Equipment Corporation DECpc AXP 150 Universal PlatformDigital Equipment Corporation DECpc 2000-500 AXP ServerDigital Equipment Corporation DEC 2000-300 AXP ServerC}Æ'ÂÇ'1Ö+ƒOõQîÂÇ'ŒÉ'ф(SCSI Host AdaptersÊ¢Ç'ŒÉ'( €E€€E€F‚ÿSCSI Host AdaptersThe following SCSI adapters have been tested on the indicated platforms with the following scanner, CD-ROM, tape, fixed and removable drives (except as noted): ArchiveST 4000 DAT, CD-Technologies CD Porta-DriveTM T-3401, Hewlett-Packard ScanJet® IIc, NEC Intersect CDR-74, Micropolis 1924, Peripheral Land Infinity 88, Procom Technology MCD-DS, Syquest® 5110, Toshiba TXM-3401E, WangTek 5150es.³(ÂÇ'?Ê'‹#æ€PGVlø€€ÿ€€ €<‚ÿ€€ ‚ÿ€€ ‚ÿ€(€ ÿ€*€ †‚ÿÿÿx86MIPSALPHASCSI Host Adapter¦ ŒÉ'åÊ'†#܀@GVlø€€ †xÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †€G€:‚ÿÿÿXAdaptecTM AHA-1510œ?Ê'Ë'}#ʀ>GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXAdaptec AHA-1520 ›åÊ'Ì'}#ʀ<GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXAdaptec AHA-1522À+Ë'ÜÌ'•#ú€VGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ(€€âœ$>߀G‰€:‚ÿ€"€ÿ*€$€ †â¾1€G‰€:‚ÿÿÿXXX10Adaptec AHA-1540B 9À+Ì'œÍ'•#ú€VGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ(€€âœ$>߀G‰€:‚ÿ€ €ÿ*€"€ †â“$>߀G‰€:‚ÿÿÿXX10Adaptec AHA-1540C 11À+ÜÌ'\Î'•#ú€VGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ(€€âœ$>߀G‰€:‚ÿ€"€ÿ*€$€ †â¾1€G‰€:‚ÿÿÿXXX10Adaptec AHA-1542B 9À+œÍ'Ï'•#ú€VGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ(€€âœ$>߀G‰€:‚ÿ€ €ÿ*€"€ †â“$>߀G‰€:‚ÿÿÿXX10Adaptec AHA-1542C 11™\Î'µÏ'}#ʀ8GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXAdaptec AHA-1640¬#Ï'm(‰#â€FGVlø€€ †ÿ€€€:‚ÿµÏ'm(Ç'€
€‚ÿ€€‚ÿ€€ÿ*€€ †â”$>߀G‰€:‚ÿÿÿXAdaptec AHA-1740 12¬#µÏ'(‰#â€FGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â”$>߀G‰€:‚ÿÿÿXAdaptec AHA-1742 12¯&m(È(‰#â€LGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â•$>߀G‰€:‚ÿÿÿXXXAdaptec AHA-1740A 13¯&(w(‰#â€LGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â•$>߀G‰€:‚ÿÿÿXXXAdaptec AHA-1742A 13›È((}#ʀ<GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXAdaptec AHA-2740›w(­(}#ʀ<GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXAdaptec AHA-2742«"(X(‰#â€DGVlø€€ †ÿ.€€â–$>߀:€G‰€:‚ÿ€€‚ÿ€€‚ÿ€€ÿ€ € †‚ÿÿÿX14Adaptec AIC-6260«"­((‰#â€DGVlø€€ †ÿ.€€â—$>߀:€G‰€:‚ÿ€€‚ÿ€€‚ÿ€€ÿ€ € †‚ÿÿÿX15Adaptec AIC-7770—X(š(}#ʀ4GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXAlways IN-2000™(3(}#ʀ8GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXBusLogic BT-445S›š(Î(}#ʀ<GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXBusLogic BT-542Bš3(h(}#ʀ:GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXBusLogic BT-545S™Î((}#ʀ8GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXBusLogic BT-640A¬#h(­(‰#â€FGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â˜$>߀G‰€:‚ÿÿÿXBusLogic BT-646S 16™(F (}#ʀ8GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXBusLogic BT-742A›­(á (}#ʀ<GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXBusLogic BT-747S¦)F (‡
(}#ʀRGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXCOMPAQ Fast SCSI-2 Controller¦)á (- (}#ʀRGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXCOMPAQ 6260 SCSI-2 Controller”‡
(Á (}#ʀ.GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXDPT PM2011b´+- (u (‰#â€VGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â™$>߀G‰€:‚ÿÿÿXDPT PM2011b (with cache) 17•Á (
(}#ʀ0GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXDPT PM2012bµ,u (¿
(‰#â€XGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â™$>߀G‰€:‚ÿÿÿXXDPT PM2012b (with cache) 17·.
(v(‰#â€\GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ(€€âœ$>߀G‰€:‚ÿ€"€ÿ€$€ †‚ÿÿÿXXX10Data Technology Corp. 3290¶-¿
(,(‰#â€ZGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †âš$>߀G‰€:‚ÿÿÿXData Technology Corp. 3292 18ž!v(Ê(}#ʀBGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXFuture Domain MCS-600ž!,(t@(}#ʀBGVlø€€ †Ê(t@(Ç'ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXFuture Domain MCS-700´+Ê((A(‰#â€VGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â*2q€G‰€:‚ÿÿÿXFuture Domain TMC-845 19,20¶-t@(ÞA(‰#â€ZGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â*2q€G‰€:‚ÿÿÿXXXFuture Domain TMC-850 19,20¸/(A(–B(‰#â€^GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †âÇ$>߀G‰€:‚ÿÿÿXXXFuture Domain TMC-850M(ER) 20´+ÞA(JC(‰#â€VGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â*2q€G‰€:‚ÿÿÿXFuture Domain TMC-860 19,20²)–B(üC(‰#â€RGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †âÇ$>߀G‰€:‚ÿÿÿXFuture Domain TMC-860M 20´+JC(°D(‰#â€VGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â*2q€G‰€:‚ÿÿÿXFuture Domain TMC-885 19,20²)üC(bE(‰#â€RGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †âÇ$>߀G‰€:‚ÿÿÿXFuture Domain TMC-885M 20¡$°D(F(}#ʀHGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXFuture Domain TMC-1650¡$bE(¤F(}#ʀHGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXFuture Domain TMC-1660¡$F(EG(}#ʀHGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXFuture Domain TMC-1670¡$¤F(æG(}#ʀHGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXFuture Domain TMC-1680£&EG(‰H(}#ʀLGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXXFuture Domain TMC-7000EXÂ9æG(KI(‰#â€rGVlø€€ †ÿ.€€â¾$>߀:€G‰€:‚ÿ€€‚ÿ€€‚ÿ€€ÿ€ € †‚ÿÿÿX21IBM PS/2 Microchannel SCSI Host AdapterÑH‰H(J(‰#‐GVlø€€ †ÿ.€€â¾$>߀:€G‰€:‚ÿ€€‚ÿ€€‚ÿ€€ÿ€ € †‚ÿÿÿX21IBM PS/2 Microchannel SCSI Host Adapter (with cache)º1KI(ÖJ(‰#â€bGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †âiŽÿp€G‰€:‚ÿÿÿXMaynard 16-bit SCSI Adapter 16,22ª-J(€K(}#ʀZGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXMediaVision Pro Audio Spectrum-16 #ÖJ( L(}#ʀFGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXNCR 53C700 SCSI Adapter #€K(ÀL(}#ʀFGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXNCR 53C710 SCSI Adapter´+ L(tM(‰#â€VGVlø€€ †ÿ.€€âÀ$>߀:€G‰€:‚ÿ€€‚ÿ€€‚ÿ€€ÿ€ € †‚ÿÿÿX23NCR 53C90 SCSI Controllerµ,ÀL()N(‰#â€XGVlø€€ †ÿ.€€âÁ$>߀:€G‰€:‚ÿ€€‚ÿ€€‚ÿ€ €ÿ€"€ †‚ÿÿÿX24XNCR 53C94 SCSI Controller—tM(ÀN(}#ʀ4GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXOlivetti ESC-1—)N(WO(}#ʀ4GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXOlivetti ESC-2¯&ÀN(€(‰#â€LGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †âB%•ÀG‰€:‚ÿÿÿXTrantor T-128 19,20,WO(€(Ç'25²)WO(Ā(‰#â€RGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †âR(¿é€G‰€:‚ÿÿÿXTrantor T-228 19,20,22,26­$€(q(‰#â€HGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â%2q€G‰€:‚ÿÿÿXTrantor T-130B 19,25¶-Ā('‚(‰#â€ZGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †â¶1€G‰€:‚ÿÿÿXTrantor T-348 MiniSCSI Plus 1«"q(҂(‰#â€DGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †âÄ$>߀G‰€:‚ÿÿÿXXXUltraStor 14f 27«"'‚(}ƒ(‰#â€DGVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ*€€ †âÅ$>߀G‰€:‚ÿÿÿXXXUltraStor 24f 28˜҂(„(}#ʀ6GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXXUltraStor 24fa–}ƒ(«„(}#ʀ2GVlø€€ †ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€ †‚ÿÿÿXUltraStor 34f&„(ф(# €€€:‚ÿC«„(…(1šQ„O;‚Qï…(¥†(Ë(SCSI CD-ROM Drives‘iф(¥†(( €Ó€€E€F‚ÿSCSI CD-ROM DrivesThe following SCSI CD-ROM drives have been tested with the following adapters: Adaptec AHA-1510, AHA-1542C, AHA-1640 and AHA-1742A; Future Domain TMC-1670, TMC-850M and MCS-600; IBM PS/2 Microchannel SCSI Host Adapter (with cache); Ultrastor 24fa. Drives have been tested for data access as well as for the audio capabilities indicated.}…("‡(^#Œ€>Œo€€€<‚ÿ€ €‚ÿ€8€ÿ€:€‚ÿÿÿStandard (CD)MultiMediaš$¥†(¼‡(v#¼€HŒo€€ÿ€€ €<‚ÿ€€ ‚ÿ€ € ÿ€"€‚ÿÿÿAudioAudioSCSI CD-ROM Drive›."‡(Wˆ(m#ª€\Œo€€øÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXCD-Technology CD Porta-Drive T-3301˜.¼‡(ïˆ(j#¤€\Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXCD-Technology CD Porta-Drive T-3401}Wˆ(l‰(j#¤€&Œo€€ÿ€€€:‚ÿ€€‚ÿ€ €ÿ€€‚ÿÿÿChinon 431ïˆ(ë‰(j#¤€*Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXChinon 535’(l‰(}Š(j#¤€PŒo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXCOMPAQ DualSpeed CD-ROM Drive~ë‰(ûŠ(j#¤€(Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXDEC RRD42!}Š(˜‹(|#ȀBŒo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ4€€âÆ$>߀G€:€G‰€:‚ÿÿÿXDenon® DRD 253 29ŽûŠ(&Œ(p#°€<Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€€G€:‚ÿÿÿXHitachi® CDR-1750S†˜‹(¬Œ(j#¤€8Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXHitachi CDR-3750S{&Œ('(j#¤€"Œo€€ÿ€€€:‚ÿ€€‚ÿ€ €ÿ€€‚ÿÿÿIBM 3510¡7¬Œ(ȍ(j#¤€nŒo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXIBM Enhanced Internal CDROM II Drive 32G2958¡7'(iŽ(j#¤€nŒo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXIBM Enhanced External CDROM II Drive 3510005Œ"ȍ(õŽ(j#¤€DŒo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXIBM PS/2 CDROM II Drive¥/iŽ(š(v#¼€^Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ(€€âò$>߀G‰€:‚ÿÿÿXXLaser Magnetic Storage CM-215 30'õŽ(CÀ(v#¼€NŒo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ(€€š(CÀ(ф(âé$>߀G‰€:‚ÿÿÿXXNEC Intersect CDR-73M 31Š š(ÍÀ(j#¤€@Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXNEC Intersect CDR-83M‰CÀ(VÁ(j#¤€>Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXNEC Intersect CDR-74‰ÍÀ(ßÁ(j#¤€>Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXNEC Intersect CDR-84‹!VÁ(jÂ(j#¤€BŒo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXNEC Intersect CDR-74-1‹!ßÁ(õÂ(j#¤€BŒo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXNEC Intersect CDR-84-1ŒjÂ(Ã(p#°€8Œo€€ÿ€€€:‚ÿ€€‚ÿ€ €ÿ€€€G€:‚ÿÿÿPanasonic® CR-501 $õÂ(!Ä(|#ȀHŒo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ4€€âê$>߀G€:€G‰€:‚ÿÿÿXXPioneer® DRM-600 32#Ã(®Ä(j#¤€FŒo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXProcom Technology MCD-DSŠ!Ä(8Å(p#°€4Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€€G€:‚ÿÿÿXXSony® CDU-541®Ä(¹Å(j#¤€.Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXSony CDU-561‚8Å(;Æ(j#¤€0Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXSony CDU-6211‚¹Å(½Æ(j#¤€0Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXSony CDU-7211‚;Æ(?Ç(j#¤€0Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXSony CDU-7811€½Æ(¿Ç(j#¤€,Œo€€ÿ€€€:‚ÿ€€‚ÿ€ €ÿ€€‚ÿÿÿTexel DM-5021•?Ç(TÈ(v#¼€>Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ(€€âë$>߀G‰€:‚ÿÿÿXXTexel DM-5024 33ƒ¿Ç(×È(j#¤€2Œo€€ÿ€€€:‚ÿ€€‚ÿ€ €ÿ€€‚ÿÿÿToshiba TXM-3201†TÈ(]É(j#¤€8Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXToshiba TXM-3301E…×È(âÉ(j#¤€6Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXToshiba XM-3301B†]É(hÊ(j#¤€8Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXToshiba TXM-3401E…âÉ(íÊ(j#¤€6Œo€€ÿ€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿÿÿXXToshiba XM-3401B&hÊ(Ë(# €€€:‚ÿDíÊ(WË(10õQRðWË(ŠÌ(ˆ)Other CD-ROM Drives3 Ë(ŠÌ(( €€€E€F‚ÿOther CD-ROM DrivesThe following CD-ROM drives with proprietary interfaces have been tested. All drives listed support Standard (CD) Audio and MultiMedia Audio. All drives listed require drivers supplied in the driver library (\DRVLIB) on the Windows NT CD-ROM.­#WË(7Í(Š#ä€Feed€€ÿ€€ €<‚ÿ€€ ‚ÿ€€ ‚ÿ€(€ ÿ€*€‚ÿÿÿx86MIPSALPHACD-ROM DriveÆ6ŠÌ(ýÍ(#ð€leed€€qÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ4€€âì$>߀G€:€G‰€:‚ÿÿÿXCreative Labs Sound Blaster ProTM 34—7Í(”Î({#ƀ8eed€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXPanasonic CR-521—ýÍ(+Ï({#ƀ8eed€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXPanasonic CR-523—”Î(ÂÏ({#ƀ8eed€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXPanasonic CR-563”+Ï(b){#ƀ2eed€€ÿ€€ÂÏ(b)Ë(€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXSony CDU 31a&ÂÏ(ˆ)# €€€H‚ÿAb)É)1´;‚QURñÉ)_)â )SCSI Tape Drives–nˆ)_)( €Ý€€E€F‚ÿSCSI Tape DrivesThe following SCSI tape drives have been tested with the following adapters using the Windows NT Backup program: Adaptec AHA-1510, AHA-1542C, AHA-1640 and AHA-1742A; Future Domain TMC-1670, TMC-850M and MCS-600; IBM PS/2 Microchannel SCSI Host Adapter (with cache); Ultrastor 24fa. Drives are listed under their appropriate Tape entry in SETUP. §É)k)e ˜€O€€H‚€:‚âí$>߀G‰€:‚‚‚âî$>߀G‰€:‚âï$>߀G‰€:‚âð$>߀G‰€:‚‚‚‚‚‚‚‚ÿ4 Millimeter DAT ArchiveST 2000DAT (4520NT) ArchiveST 2000DAT (EAX4350) 35 ArchiveST 4000DAT (4324NP) ArchiveST 4000DAT (4352XP) DEC TLZ06 36 Exabyte 4200 37 Exabyte 4200c 38 Hewlett-Packard JetStor 2000 Hewlett-Packard JetStor 5000 Hewlett-Packard 35470a Hewlett-Packard 35480a Hewlett-Packard C1503a Hewlett-Packard C1504a Hewlett-Packard C2224c_)n)t ¶€€€:‚â¶1€G‰€:‚âí$>߀G‰€:‚âí$>߀G‰€:‚€G€:‚‚‚‚‚‚€H€I€H‚âñ$>߀:€G‰€:‚‚‚‚ÿ Hewlett-Packard C2225b IBM 2.0Gb 4mm Tape Drive Option (part number 8191192) 1 Maynard Maynstream 1300DAT 35 Maynard 2000 DAT 35 Tecmar® DataVault 2000 Tecmar DataVault 4000 WangDAT Model 1300XL WangDAT Model 3100 WangDAT Model 3200Archive® 2150S, 2525S, 2750 Archive 2150/2250 39 Archive 2525 Archive 2750 Archive 2800!šk))‡ ܀5€€:‚€H‚â%>߀:€G‰€:‚â%>߀G‰€:‚âï$>߀G‰€:‚âï$>߀G‰€:‚‚€H‚€:‚‚â%>߀G‰€:‚â%>߀G‰€:‚‚‚‚‚ÿExabyte 8200 Series (SCSI-1) Exabyte EXB-8200 40 Exabyte EXB-8200ST 40 Exabyte EXB-8205 37 Exabyte EXB-8205ST 37Exabyte 8500 Series (SCSI-2) Exabyte EXB-8500 Exabyte EXB-8500ST Exabyte EXB-8500c 40 Exabyte EXB-8500cST 40 Exabyte EXB-8505 Exabyte EXB-8505ST IBM 5.0Gb 8mm Tape Drive Option IBM 3445 Model 001 5.0Gb 8mm Tape DriveSn)â )? L€)€€:‚€H‚€:‚‚‚‚‚‚‚‚€H‚€:‚‚‚‚‚ÿTandberg 3660, 3820, 4120, 4220 DEC TZK10 DEC TZK12 IBM 3450 1.2Gb Tape Drive Model 001 Tandberg 3660 Tandberg 3820 Tandberg 4120 Tandberg 4220Wangtek 525, 250 Tecmar QT-525ES Wangtek 5150ES Wangtek 5525ES Wangtek 51000ESB)$
)1iRµRò$

)è )Other Tape DrivesŒeâ )°
)' €Ê€€E€F‚ÿOther Tape DrivesThe following tape drives have been tested using the Windows NT Backup program.8û$
)è )= H€÷€â%>߀H€I‰€H‚€:‚‚‚‚‚‚‚‚‚‚ÿQIC-40/QIC-80 Floppy Tape Drive 41 Archive 5150Q (SuperHornet) Archive 5540 Archive 5580 Colorado Memory Systems Jumbo 250 Iomega Tape 250 Summit Express SE120 Summit Express SE250 WangTek 3040 WangTek 3080E°
)- )1ªUR€Ró- )©
).@)SCSI Removable Media|Tè )©
)( €©€€E€F‚ÿSCSI Removable MediaThe following removable media (cartridge) drives have been tested with the following adapters: Adaptec AHA-1510, AHA-1542C, AHA-1640 and AHA-1742A; Future Domain TMC-1670, TMC-850M and MCS-600; IBM PS/2 Microchannel SCSI Host Adapter (with cache); Ultrastor 24fa. Media must be mounted when installing Windows NT. ¦- )´)e ˜€M€€?‚â%>߀:€G‰€:‚‚â%>߀G‰€:‚‚‚‚‚‚‚‚âï$>߀G‰€:‚‚‚â%>߀G‰€:‚ÿHewlett-Packard Series 6300 650/C 42Hewlett-Packard 1300T Rewritable Optical driveIBM 0632 Model C2* 42Insite 21mb FlopticalIomega 21mb FlopticalIomega Bernoulli Transportable 90 ProIomega Bernoulli Transportable 150Maxtor TMT 2m MO drive Peripheral Land Infinity 40 TurboPeripheral Land Infinity 88Pinacle Micro PMO-650 37Quantum Passport XL 85Quantum Passport XL 127Sony SMO-S511A-11 42nH©
).@)& €€€:‚‚‚‚ÿSony RMO-S350Syquest 555 44mb cartri´).@)è )dgeSyquest 5110 88mb cartridge>
´)l@)1¦µR2Rôl@)”A) B)SCSI Scanners(.@)”A)( €€€E€F‚ÿSCSI ScannersThe following scanners have been tested with the following adapters: Adaptec AHA-1510, AHA-1542c, AHA-1640 and AHA-1742A; Future Domain TMC-1670, TMC-850M and MCS-600; IBM PS/2 Microchannel SCSI Host Adapter (with cache); Ultrastor 24fa.u2l@) B)C V€d€â%>߀:€G€:€G‰€:‚â%>߀G‰€:‚‚ÿHP® ScanJet IIc 43HP ScanJet IIp 43A”A)JB)1”€R‚RõJB)¶B)D)Disk ControllerslE B)¶B)' €Š€€E€F‚ÿDisk ControllersThe following disk controllers have been tested.cJB)D)J b€3€€:‚‚‚‚â¸1€G‰€:‚â%>߀G‰€:‚‚€G€:‚‚ÿCOMPAQ Intelligent Drive Array ControllerCOMPAQ Intelligent Drive Array Controller-2COMPAQ SMART Array ControllerDELL Drive Array ControllerDELL SCSI Array Controller 3Olivetti EFP-2 44UltraStor 124f EISA Disk Array ControllerWestern DigitalTM 1003 (ESDI, IDE)< ¶B)UD)1Ó2R…RöUD)©E)KG)Hard DrivesT,D)©E)( €Y€€E€F‚ÿHard DrivesThe following hard drives have been tested. SCSI hard drives have been tested with the following SCSI adapters: Adaptec AHA-1510, AHA-1542C, AHA-1640 and AHA-1742A; Future Domain TMC-1670, TMC-850M and MCS-600; IBM PS/2 Microchannel SCSI Host Adapter (with cache); Ultrastor 24fa. ¢WUD)KG)K d€¯€€H‚€:‚‚‚‚‚‚‚âCؚq€G‰€:‚‚€H‚€:‚‚‚‚‚‚‚‚ÿSCSI Hard Drives Maxtor 7120SR Maxtor 7213SR Maxtor 7245SR Maxtor 7345SR Maxtor LXT340SY Maxtor MXT1240S Micropolis 1924 Micropolis Raidion LT 2100 45,46IDE Hard Drives Maxtor LXT340A Maxtor 7345AT Maxtor 7245AT Maxtor 7213AT Maxtor 7131AT Maxtor MXT-540AL Maxtor 7120ATA©E)ŒG)1V‚R0†R÷ŒG)H)(I)Storage CabinetswPKG)H)' € €€E€F‚ÿStorage CabinetsThe following peripheral storage cabinets have been tested.%͌G)(I)X ~€›€âkEq€:€G‰€:‚âkEq€G‰€:‚â%>߀G‰€:‚â%>߀G‰‚€:‚ÿHewlett-Packard Storage System with HP EISA HBA 47,48Hewlett-Packard Storage System with HP MCA HBA 47,48StorageWorks Deskside Expansion Unit 49StorageWorks Desktop Expansion Unit 49FH)nI)1`S…RUønI)·J)çŒ*Video Display SupportI!(I)·J)( €C€€E€F‚ÿVideo Display SupportThe following display adapters have been tested. Most common scan frequencies are supported. Your video monitor should support the same resolutions and scan frequencies as your display adapter. Please refer to README.WRI for more information on display support.¯#nI)fK)Œ#è€F‚ssn€€€<‚ÿ€€ÿ€€‚ÿ€€‚ÿ€,€‚ÿ€@€ÿ€B€‚ÿÿÿ640x480800x6001024x768IL·J)¯L)ý#ʁ˜ ‚9H+H,Hn€€ÿ€€€<‚ÿ€&€‚ÿ€6€ÿ€8€ ‚ÿ€B€ ‚ÿ€N€ ‚ÿ€X€ ‚ÿ€d€ ‚ÿ€n€ ‚ÿ€z€ ÿ€|€‚ÿÿÿDisplay AdapterDriverx16x256x16x256x16x256 Other Modes3fK)ÁM)ß#ށf ‚9H+H,Hn€€öÿ€€€:‚ÿ€2€‚ÿ€:€ÿ€<€‚ÿ€@€‚ÿ€H€‚ÿ€L€‚ÿ€T€‚ÿ€X€‚ÿ€`€ÿ€b€‚ÿÿÿACTIX GRAPHICS ENGINES3NININI
:¯L)ËN)Ð#pt ‚9H+H,Hn€€€:‚ÿ€@€‚ÿ€H€ÿ€J€‚ÿ€N€‚ÿ€V€‚ÿ€Z€‚ÿ€b€‚ÿ€f€‚ÿ€n€ÿ€p€‚ÿÿÿACTIX GRAPHICS ENGINE 32 PLUSS3NININIü,ÁM)ÇO)Ð#pX ‚9H+H,Hn€€€:‚ÿ€"€‚ÿ€,€ÿ€.€‚ÿ€2€‚ÿ€:€‚ÿ€>€‚ÿ€F€‚ÿ€J€‚ÿ€R€ÿ€T€‚ÿÿÿATI 8514 ULTRAATINININIBËN)å€)Ð#p„ ‚9H+H,HÇO)å€)(I)n€€€:‚ÿ€2€‚ÿ€<€ÿ€>€‚ÿ€B€‚ÿ€J€‚ÿ€N€‚ÿ€V€‚ÿ€Z€‚ÿ€b€ÿ€d€‚ÿÿÿATI GRAPHICS ULTRA PROATINININI2,3,4,5,6,7,11FÇO)û)Ð#pŒ ‚9H+H,Hn€€€:‚ÿ€:€‚ÿ€D€ÿ€F€‚ÿ€J€‚ÿ€R€‚ÿ€V€‚ÿ€^€‚ÿ€b€‚ÿ€j€ÿ€l€‚ÿÿÿATI GRAPHICS ULTRA PRO VLBATINININI2,3,4,5,6,7,11Cå€)ƒ)Ð#p† ‚9H+H,Hn€€€:‚ÿ€4€‚ÿ€>€ÿ€@€‚ÿ€D€‚ÿ€L€‚ÿ€P€‚ÿ€X€‚ÿ€\€‚ÿ€d€ÿ€f€‚ÿÿÿATI GRAPHICS ULTRA PLUSATINININI2,3,4,5,6,7,110û)„)Ð#p` ‚9H+H,Hn€€€:‚ÿ€*€‚ÿ€4€ÿ€6€‚ÿ€:€‚ÿ€B€‚ÿ€F€‚ÿ€N€‚ÿ€R€‚ÿ€Z€ÿ€\€‚ÿÿÿATI GRAPHICS ULTRAATINININI2ƒ)…)Ð#pd ‚9H+H,Hn€€€:‚ÿ€.€‚ÿ€8€ÿ€:€‚ÿ€>€‚ÿ€F€‚ÿ€J€‚ÿ€R€‚ÿ€V€‚ÿ€^€ÿ€`€‚ÿÿÿATI GRAPHICS VANTAGEATINININI /„)†)Ü#ˆ^ ‚9H+H,Hn€€€:‚ÿ(€€â¶1€G‰€:‚ÿ€2€ÿ€4€‚ÿ€<€‚ÿ€D€‚ÿ€L€‚ÿ€P€‚ÿ€T€‚ÿ€X€ÿ€Z€‚ÿÿÿCOMPAQ AVGAAVGA1NININI2…)‡)Ð#pd ‚9H+H,Hn€€€:‚ÿ€0€‚ÿ€8€ÿ€:€‚ÿ€>€‚ÿ€F€‚ÿ€J€‚ÿ€R€‚ÿ€V€‚ÿ€^€ÿ€`€‚ÿÿÿCOMPAQ QVISION 1024/IQVNININI9†)2ˆ)Ü#ˆr ‚9H+H,Hn.€€âH%>߀:€G‰€:‚ÿ€>€‚ÿ€F€ÿ€H€‚ÿ€L€‚ÿ€T€‚ÿ€X€‚ÿ€`€‚ÿ€d€‚ÿ€l€ÿ€n€‚ÿÿÿCOMPAQ QVISION 1024/E 50QVNININI
=‡)?‰)Ð#pz ‚9H+H,Hn€€€:‚ÿ€F€‚ÿ€N€ÿ€P€‚ÿ€T€‚ÿ€\€‚ÿ€`€‚ÿ€h€‚ÿ€l€‚ÿ€t€ÿ€v€‚ÿÿÿCOMPAQ QVISION 1024/I (ENHANCED)QVNININI
=2ˆ)LŠ)Ð#pz ‚9H+H,Hn€€€:‚ÿ€F€‚ÿ€N€ÿ€P€‚ÿ€T€‚ÿ€\€‚ÿ€`€‚ÿ€h€‚ÿ€l€‚ÿ€t€ÿ€v€‚ÿÿÿCOMPAQ QVISION 1024/E (ENHANCED)QVNININI4?‰)P‹)Ð#ph ‚9H+H,Hn€€€:‚ÿ€0€‚ÿ€8€ÿ€:€‚ÿ€>€‚ÿ€F€‚ÿ€J€‚ÿ€R€‚ÿ€V€‚ÿ€^€ÿ€`€‚ÿÿÿCOMPAQ QVISION 1280/IQVNININI114LŠ)TŒ)Ð#ph ‚9H+H,Hn€€€:‚ÿ€0€‚ÿ€8€ÿ€:€‚ÿ€>€‚ÿ€F€‚ÿ€J€‚ÿ€R€‚ÿ€V€‚ÿ€^€ÿ€`€‚ÿÿÿCOMPAQ QVISION 1280/EQVNININI113P‹)W)Ð#pf ‚9H+H,Hn€€€:‚ÿ€€‚ÿ€ €ÿ€"€‚ÿ€&€‚ÿ€.€‚ÿ€2€‚ÿ€:€‚ÿ€>€‚ÿ€F€ÿ€H€‚ÿÿÿDELL DGXDGXNININI2,5,7,9,10,116TŒ)]Ž)Ð#pl ‚9H+H,Hn€€€:‚ÿ€(€‚ÿ€8€ÿ€:€‚ÿ€B€‚ÿ€J€‚ÿ€R€‚ÿ€Z€‚ÿ€`€‚ÿ€f€ÿ€h€‚ÿÿÿDIAMOND SPEEDSTARET4000NINININIBB6W)c)Ð#pl ‚9H+H,Hn€€€:‚ÿ€0€‚ÿ€8€ÿ€:€‚ÿ€B€‚ÿ€J€‚ÿ€R€‚ÿ€Z€‚ÿ€`€‚ÿ€f€ÿ€h€‚ÿÿÿDIAMOND SPEEDSTAR 24XWDNINININIBB <]Ž){À)Ð#px ‚9H+H,Hn€€€:‚ÿ€0€‚ÿ€@€ÿ€B€‚ÿ€J€‚ÿ€R€‚ÿ€Z€‚ÿc){À)(I)€b€‚ÿ€j€‚ÿ€r€ÿ€t€‚ÿÿÿDIAMOND SPEEDSTAR PROCIRRUSNINININININI@c)‹Á)Ð#p€ ‚9H+H,Hn€€€:‚ÿ€8€‚ÿ€H€ÿ€J€‚ÿ€R€‚ÿ€Z€‚ÿ€b€‚ÿ€j€‚ÿ€r€‚ÿ€z€ÿ€|€‚ÿÿÿDIAMOND SPEEDSTAR PRO VLBCIRRUSNINININININIÿ/{À)ŠÂ)Ð#p^ ‚9H+H,Hn€€€:‚ÿ€*€‚ÿ€2€ÿ€4€‚ÿ€8€‚ÿ€@€‚ÿ€D€‚ÿ€L€‚ÿ€P€‚ÿ€X€ÿ€Z€‚ÿÿÿDIAMOND STEALTH 24S3NININI3‹Á)Ã)Ð#pf ‚9H+H,Hn€€€:‚ÿ€2€‚ÿ€:€ÿ€<€‚ÿ€@€‚ÿ€H€‚ÿ€L€‚ÿ€T€‚ÿ€X€‚ÿ€`€ÿ€b€‚ÿÿÿDIAMOND STEALTH 24 VLBS3NININI0ŠÂ)Ä)Ð#p` ‚9H+H,Hn€€€:‚ÿ€,€‚ÿ€4€ÿ€6€‚ÿ€:€‚ÿ€B€‚ÿ€F€‚ÿ€N€‚ÿ€R€‚ÿ€Z€ÿ€\€‚ÿÿÿDIAMOND STEALTH PROS3NININI4Ã)‘Å)Ð#ph ‚9H+H,Hn€€€:‚ÿ€4€‚ÿ€<€ÿ€>€‚ÿ€B€‚ÿ€J€‚ÿ€N€‚ÿ€V€‚ÿ€Z€‚ÿ€b€ÿ€d€‚ÿÿÿDIAMOND STEALTH PRO VLBS3NININI1Ä)’Æ)Ð#pb ‚9H+H,Hn€€€:‚ÿ€.€‚ÿ€6€ÿ€8€‚ÿ€<€‚ÿ€D€‚ÿ€H€‚ÿ€P€‚ÿ€T€‚ÿ€\€ÿ€^€‚ÿÿÿDIAMOND STEALTH VRAMS3NININIý-‘Å)Ç)Ð#pZ ‚9H+H,Hn€€€:‚ÿ€&€‚ÿ€.€ÿ€0€‚ÿ€4€‚ÿ€<€‚ÿ€@€‚ÿ€H€‚ÿ€L€‚ÿ€T€ÿ€V€‚ÿÿÿELSA WINNER 1000S3NININI0’Æ)È)Ð#p` ‚9H+H,Hn€€€:‚ÿ€€‚ÿ€(€ÿ€*€‚ÿ€2€‚ÿ€:€‚ÿ€B€‚ÿ€J€‚ÿ€R€‚ÿ€Z€ÿ€\€‚ÿÿÿGENOA VLBCIRRUSNINININININIû%Ç)ŠÉ)Ö#|J ‚9H+H,Hn€€€:‚ÿ€€€G€:‚ÿ€$€ÿ€&€‚ÿ€*€‚ÿ€2€‚ÿ€6€‚ÿ€:€‚ÿ€>€‚ÿ€D€ÿ€F€‚ÿÿÿIBM XGAXGA®NIIù)È)ƒÊ)Ð#pR ‚9H+H,Hn€€€:‚ÿ€€‚ÿ€"€ÿ€$€‚ÿ€(€‚ÿ€0€‚ÿ€4€‚ÿ€<€‚ÿ€@€‚ÿ€F€ÿ€H€‚ÿÿÿIBM XGA-2XGANINIB1,8FŠÉ)™Ë)Ð#pŒ ‚9H+H,Hn€€€:‚ÿ€D€‚ÿ€T€ÿ€V€‚ÿ€^€‚ÿ€f€‚ÿ€n€‚ÿ€v€‚ÿ€~€‚ÿ€†€ÿ€ˆ€‚ÿÿÿMEDIAVISION THUNDER & LIGHTNINGCIRRUSNINININININI0ƒÊ)™Ì)Ð#p` ‚9H+H,Hn€€€:‚ÿ€,€‚ÿ€4€ÿ€6€‚ÿ€:€‚ÿ€B€‚ÿ€F€‚ÿ€N€‚ÿ€R€‚ÿ€Z€ÿ€\€‚ÿÿÿMETHEUS PREMIER 928S3NININI7™Ë) Í)Ð#pn ‚9H+H,Hn€€€:‚ÿ€:€‚ÿ€B€ÿ€D€‚ÿ€H€‚ÿ€P€‚ÿ€T€‚ÿ€\€‚ÿ€`€‚ÿ€h€ÿ€j€‚ÿÿÿMETHEUS PREMIER VL-BUS 928S3NININIý-™Ì)Î)Ð#pZ ‚9H+H,Hn€€€:‚ÿ€&€‚ÿ€.€ÿ€0€‚ÿ€4€‚ÿ€<€‚ÿ€@€‚ÿ€H€‚ÿ€L€‚ÿ€T€ÿ€V€‚ÿÿÿMICRONICS VL-BUSS3NININI0 Í)Ï)Ð#p` ‚9H+H,Hn€€€:‚ÿ€€‚ÿ€,€ÿ€.€‚ÿ€6€‚ÿ€>€‚ÿ€F€‚ÿ€N€‚ÿ€V€‚ÿ€Z€ÿ€\€‚ÿÿÿNCR 77C22NCR77C22NININININI3Î)¬*Ð#pf ‚9H+H,Hn€€€:‚ÿ€€‚ÿ€.€Ï)¬*(I)ÿ€0€‚ÿ€8€‚ÿ€@€‚ÿ€H€‚ÿ€P€‚ÿ€X€‚ÿ€`€ÿ€b€‚ÿÿÿNCR 77C22ENCR77C22NINININININI2Ï)º*Ü#ˆd ‚9H+H,Hn.€€âH%>߀:€G‰€:‚ÿ€,€‚ÿ€4€ÿ€6€‚ÿ€:€‚ÿ€B€‚ÿ€F€‚ÿ€N€‚ÿ€R€‚ÿ€Z€ÿ€\€‚ÿÿÿNUMBER 9 GXE 50S3NININI113¬*½*Ð#pf ‚9H+H,Hn€€€:‚ÿ€2€‚ÿ€:€ÿ€<€‚ÿ€@€‚ÿ€H€‚ÿ€L€‚ÿ€T€‚ÿ€X€‚ÿ€`€ÿ€b€‚ÿÿÿORCHID FAHRENHEIT 1280S3NININI1º*¾*Ð#pb ‚9H+H,Hn€€€:‚ÿ€.€‚ÿ€6€ÿ€8€‚ÿ€<€‚ÿ€D€‚ÿ€H€‚ÿ€P€‚ÿ€T€‚ÿ€\€ÿ€^€‚ÿÿÿORCHID FAHRENHEIT VAS3NININI5½*Ã*Ð#pj ‚9H+H,Hn€€€:‚ÿ€6€‚ÿ€>€ÿ€@€‚ÿ€D€‚ÿ€L€‚ÿ€P€‚ÿ€X€‚ÿ€\€‚ÿ€d€ÿ€f€‚ÿÿÿORCHID FAHRENHEIT VA/VLBS3NININI 9¾*Ì*Ð#pr ‚9H+H,Hn€€€:‚ÿ€.€‚ÿ€>€ÿ€@€‚ÿ€H€‚ÿ€P€‚ÿ€X€‚ÿ€`€‚ÿ€f€‚ÿ€l€ÿ€n€‚ÿÿÿORCHID PRODESIGNER 2ET4000NINININIBB ;Ã*×*Ð#pv ‚9H+H,Hn€€€:‚ÿ€2€‚ÿ€B€ÿ€D€‚ÿ€L€‚ÿ€T€‚ÿ€\€‚ÿ€d€‚ÿ€j€‚ÿ€p€ÿ€r€‚ÿÿÿORCHID PRODESIGNER IISET4000NINININIBBFÌ*í*Ð#pŒ ‚9H+H,Hn€€€:‚ÿ€P€‚ÿ€X€ÿ€Z€‚ÿ€b€‚ÿ€j€‚ÿ€r€‚ÿ€z€‚ÿ€€€‚ÿ€†€ÿ€ˆ€‚ÿÿÿPARADISE WINDOWS GRAPHICS ACCELERATORWDNINININIBB0×*í*Ð#p` ‚9H+H,Hn€€€:‚ÿ€,€‚ÿ€4€ÿ€6€‚ÿ€:€‚ÿ€B€‚ÿ€F€‚ÿ€N€‚ÿ€R€‚ÿ€Z€ÿ€\€‚ÿÿÿSTB POWERGRAPH X-24S3NININI1í*î *Ð#pb ‚9H+H,Hn€€€:‚ÿ€.€‚ÿ€6€ÿ€8€‚ÿ€<€‚ÿ€D€‚ÿ€H€‚ÿ€P€‚ÿ€T€‚ÿ€\€ÿ€^€‚ÿÿÿSTB POWERGRAPH VL-24S3NININIú*í*è
*Ð#pT ‚9H+H,Hn€€€:‚ÿ€ €‚ÿ€(€ÿ€*€‚ÿ€.€‚ÿ€6€‚ÿ€:€‚ÿ€B€‚ÿ€F€‚ÿ€N€ÿ€P€‚ÿÿÿSTB WIND/X HCS3NININI3î *ë *Ð#pf ‚9H+H,Hn€€€:‚ÿ€ €‚ÿ€2€ÿ€4€‚ÿ€<€‚ÿ€D€‚ÿ€L€‚ÿ€T€‚ÿ€Z€‚ÿ€`€ÿ€b€‚ÿÿÿTRIDENT 8900CTRIDENTNINININIBBý-è
*è *Ð#pZ ‚9H+H,Hn€€€:‚ÿ€€‚ÿ€0€ÿ€2€‚ÿ€:€‚ÿ€>€‚ÿ€F€‚ÿ€J€‚ÿ€P€‚ÿ€T€ÿ€V€‚ÿÿÿTRIDENT 9000TRIDENTNINIB
7ë *õ
*Ö#|n ‚9H+H,Hn"€€€:€G€:‚ÿ€.€‚ÿ€>€ÿ€@€‚ÿ€H€‚ÿ€P€‚ÿ€X€‚ÿ€\€‚ÿ€d€‚ÿ€h€ÿ€j€‚ÿÿÿVIDEO SEVENTM VRAMVIDEO7NINININI
:è *ÿ*Ð#pt ‚9H+H,Hn€€€:‚ÿ€,€‚ÿ€<€ÿ€>€‚ÿ€F€‚ÿ€N€‚ÿ€V€‚ÿ€^€‚ÿ€f€‚ÿ€n€ÿ€p€‚ÿÿÿVIDEO SEVEN VRAM IIVIDEO7NINININININI(õ
*'*$ €€€:‚‚ÿµ6ÿ*Ü*#΀l 6X€€ÿ€€€<‚ÿ€>€ÿ€@€‚ÿ€D€ÿ€F€‚ÿÿÿCommon Modes in Table AboveOther ResolutionsJ'*ù@*Ç#^” $ü6Ü*ù@*(I)+»,œ+‚€€qÿ€€€:‚ÿ€ €‚ÿ€,€‚ÿ€0€‚ÿ€6€‚ÿ€P€‚ÿ€V€‚ÿ€n€‚ÿ€x€‚ÿÿÿNINon-Interlaced1640x400x2565800x60065k 91152x900x256üDÜ*õA*¸#@ˆ $ü6+»,œ+‚€€€:‚ÿ€€‚ÿ€ €‚ÿ€$€‚ÿ€*€‚ÿ€D€‚ÿ€J€‚ÿ€d€‚ÿ€l€‚ÿÿÿIInterlaced2640x480x65k6800x600x16m101152x900x65k^ù@* C*¸#@¼ $ü6+»,œ+‚€€€:‚ÿ€€‚ÿ€P€‚ÿ€T€‚ÿ€Z€‚ÿ€t€‚ÿ€z€‚ÿ€–€‚ÿ€ž€‚ÿÿÿBBoth Interlaced and Non-Interlaced3640x480x16m71024x768x65k111280x1024x256ì4õA*÷C*¸#@h $ü6+»,œ+‚€€€:‚ÿ€€‚ÿ€
€‚ÿ€€‚ÿ€€‚ÿ€>€‚ÿ€D€‚ÿ€`€‚ÿ€d€‚ÿÿÿ4640x480, true color81040x768x256
á C*E*) €Ã€€:‚‚‚‚‚‚ÿDisplay adapters not listed above are expected to work if they use the following supported chip sets. Install first as Standard VGA, then select the corresponding driver from the Setup application in Program Manager.—÷C*˜E*#΀0 0¸€€ÿ€€€<‚ÿ€€ÿ€€‚ÿ€€ÿ€ €‚ÿÿÿChip SetDrivervE*F*a#’€* 0¸€€Œÿ€€€:‚ÿ€€‚ÿ€ €‚ÿÿÿATI Mach 8ATIg˜E*uF*R#t€* 0¸€€€:‚ÿ€€‚ÿ€ €‚ÿÿÿATI Mach 32ATIiF*ÞF*R#t€. 0¸€€€:‚ÿ€"€‚ÿ€&€‚ÿÿÿCompaq QVisionQVeuF*CG*R#t€& 0¸€€€:‚ÿ€€‚ÿ€€‚ÿÿÿET4000ET4000{)ÞF*¾G*R#t€R 0¸€€€:‚ÿ€F€‚ÿ€J€‚ÿÿÿS3 801, 805, 911, 911A, 924, 928S3x&CG*6H*R#t€L 0¸€€€:‚ÿ€€‚ÿ€€‚ÿÿÿWD90C30Western Digital/Paradisex&¾G*®H*R#t€L 0¸€€€:‚ÿ€€‚ÿ€€‚ÿÿÿWD90C31Western Digital/Paradise_
6H*
I*R#t€ 0¸€€€:‚ÿ€ €‚ÿ€€‚ÿÿÿVGAVGAÝ®H*J*) €»€€:‚‚‚‚‚‚ÿThe following table shows the maximum display and color resolutions available with each video driver using different amounts of video RAM. Most display adapters can use the standard VGA driver for 16-color modes.L
I*_J*A#R€æ €€€<‚ÿ€€‚ÿÿÿColorsü6J*[K*Æ#\l~joundh€€ÿ€€€<‚ÿ€€‚ÿ€,€ÿ€.€ ‚ÿ€6€ ‚ÿ€@€ ‚ÿ€J€ ‚ÿ€T€ ‚ÿÿÿDriversVideo RAM1625665k16mTrue Colorß._J*:L*±#2\~joundh€€ ·ÿ€€€:‚ÿ€€‚ÿ€€ÿ€€‚ÿ€€‚ÿ€2€‚ÿ€D€‚ÿ€V€‚ÿÿÿATI1Mb1024x768640x480640x480 á3[K*M*®#,f~joundh€€ÿ€€€:‚ÿ€€‚ÿ€€ÿ€€‚ÿ€€‚ÿ€.€‚ÿ€B€‚ÿ€T€‚ÿÿÿ2Mb1280x10241024x768800x600640x480å+:L*N*º#DV~joundh€€ÿ€€€:‚ÿ€€‚ÿ€€ÿ€ €‚ÿ€4€‚ÿ€H€‚ÿ€L€‚ÿ€P€ÿ€R€‚ÿÿÿCirrus1Mb1024x7681024x768Ö(M*ÖN*®#,P~joundh€€€:‚ÿ€€‚ÿ€€ÿ€€‚ÿ€0€‚ÿ€B€‚ÿ€F€‚ÿ€J€ÿ€L€‚ÿÿÿAVGA512Kb800x600640x480ÍN*£O*®#,>~joundh€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿ€€‚ÿ€0€‚ÿ€4€‚ÿ€8€ÿ€:€‚ÿÿÿQV512Kb640x480ÊÖN*y€*®#,8~joundh€€€:‚ÿ€€‚ÿ€€£O*y€*(I)ÿ€€‚ÿ€€‚ÿ€*€‚ÿ€.€‚ÿ€2€ÿ€4€‚ÿÿÿ1Mb1024x768Ë£O*D*®#,:~joundh€€€:‚ÿ€€‚ÿ€€ÿ€€‚ÿ€€‚ÿ€,€‚ÿ€0€‚ÿ€4€ÿ€6€‚ÿÿÿ2Mb1280x1024Ö(y€*‚*®#,P~joundh€€€:‚ÿ€ €‚ÿ€€ÿ€€‚ÿ€€‚ÿ€2€‚ÿ€F€‚ÿ€J€ÿ€L€‚ÿÿÿDGX2Mb1280x10241152x900Ù+D*ó‚*®#,V~joundh€€€:‚ÿ€€‚ÿ€ €ÿ€"€‚ÿ€6€‚ÿ€H€‚ÿ€L€‚ÿ€P€ÿ€R€‚ÿÿÿET4000512Kb1024x768640x480Ò$‚*Ń*®#,H~joundh€€€:‚ÿ€€‚ÿ€€ÿ€€‚ÿ€&€‚ÿ€:€‚ÿ€>€‚ÿ€B€ÿ€D€‚ÿÿÿ1Mb1024x7681024x768Û-ó‚* „*®#,Z~joundh€€€:‚ÿ€€‚ÿ€"€ÿ€$€‚ÿ€8€‚ÿ€L€‚ÿ€P€‚ÿ€T€ÿ€V€‚ÿÿÿNCR 77C221Mb1024x7681024x768ÌŃ*l…*®#,<~joundh€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿ€€‚ÿ€.€‚ÿ€2€‚ÿ€6€ÿ€8€‚ÿÿÿS31Mb1024x768Ë „*7†*®#,:~joundh€€€:‚ÿ€€‚ÿ€€ÿ€€‚ÿ€€‚ÿ€,€‚ÿ€0€‚ÿ€4€ÿ€6€‚ÿÿÿ3Mb1280x1024Ó%l…*
‡*®#,J~joundh€€€:‚ÿ€€‚ÿ€"€ÿ€$€‚ÿ€8€‚ÿ€<€‚ÿ€@€‚ÿ€D€ÿ€F€‚ÿÿÿTrident512Kb1024x768Ò$7†*܇*®#,H~joundh€€€:‚ÿ€€‚ÿ€€ÿ€€‚ÿ€&€‚ÿ€:€‚ÿ€>€‚ÿ€B€ÿ€D€‚ÿÿÿ1Mb1024x7681024x768Ù+
‡*µˆ*®#,V~joundh€€€:‚ÿ€€‚ÿ€ €ÿ€"€‚ÿ€6€‚ÿ€H€‚ÿ€L€‚ÿ€P€ÿ€R€‚ÿÿÿVideo7512Kb1024x768640x480Ò$܇*‡‰*®#,H~joundh€€€:‚ÿ€€‚ÿ€€ÿ€€‚ÿ€&€‚ÿ€:€‚ÿ€>€‚ÿ€B€ÿ€D€‚ÿÿÿ1Mb1024x7681024x768Î µˆ*UŠ*®#,@~joundh€€€:‚ÿ€ €‚ÿ€€ÿ€€‚ÿ€.€‚ÿ€2€‚ÿ€6€‚ÿ€:€ÿ€<€‚ÿÿÿVGA256Kb640x480ˇ‰* ‹*®#,:~joundh€€€:‚ÿ€€‚ÿ€€ÿ€€‚ÿ€(€‚ÿ€,€‚ÿ€0€‚ÿ€4€ÿ€6€‚ÿÿÿ512Kb800x600Ô&UŠ*ô‹*®#,L~joundh€€€:‚ÿ€
€‚ÿ€€ÿ€€‚ÿ€*€‚ÿ€>€‚ÿ€B€‚ÿ€F€ÿ€H€‚ÿÿÿWD1Mb1024x7681024x768Í ‹*ÁŒ*®#,>~joundh€€€:‚ÿ€ €‚ÿ€€ÿ€€‚ÿ€€‚ÿ€0€‚ÿ€4€‚ÿ€8€ÿ€:€‚ÿÿÿXGA1Mb1040x768&ô‹*çŒ*# €€€:‚ÿAÁŒ*(*1|;0†R¾Wù(*´*ïˆ+Network AdaptersŒbçŒ*´** $€Ä€€J€E€F‚ÿ Network AdaptersThe following network adapters have been tested on the indicated platforms.°&(*dŽ*Š#ä€LeedB€€ÿ€€ €<‚ÿ€€ ‚ÿ€€ ‚ÿ€(€ ÿ€*€‚ÿÿÿx86MIPSALPHANetwork AdapterÁ7´*%*Š#ä€needB€€iÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€€G€:€G€:‚ÿÿÿXXX3Com® 3C503 EtherLink II® (Coax & TP)»:dŽ*à*#ҀteedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€€G€:‚ÿÿÿXXX3Com 3C503/16 EtherLink® II/16 (Coax & TP)«0%*—À*{#ƀ`eeà*—À*çŒ*dB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXX3Com 3C507 EtherLink 16 (Coax & TP)ÕZà*lÁ*{#ƀ´eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXX3Com 3C509 EtherLink III Parallel Tasking Adapter - ISA (Coax, TP and Combo)ª/—À*Â*{#ƀ^eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿX3Com 3C523 EtherLink/MC (Coax & TP)ÉBlÁ*ßÂ*‡#ހ„eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿX3Com 3C527 EtherLink/MC 32 Bus Mastering Adapter 2ÊOÂ*©Ã*{#ƀžeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿX3Com 3C529 EtherLink III Parallel Tasking Adapter - MCA (Coax & TP)ÍRßÂ*vÄ*{#ƀ¤eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXX3Com 3C579 EtherLink III Parallel Tasking Adapter - EISA (Coax & TP)ÈA©Ã*>Å*‡#ހ‚eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â¶Ô×g€G‰€:‚ÿÿÿX3Com 3C770 FDDILink-F for Optical, UTP & STP 2,51¶;vÄ*ôÅ*{#ƀveedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXAdvanced Micro Devices Am1500T Ethernet Adapterµ:>Å*©Æ*{#ƀteedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXAdvanced Micro Devices Am2100 Ethernet Adapter£(ôÅ*LÇ*{#ƀPeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXAdvanced Micro Devices PCnetÇL©Æ*È*{#ƀ˜eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXAdvanced Micro Devices PCnet-ISA Single Chip Ethernet Controller¶;LÇ*ÉÈ*{#ƀveedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXCOMPAQ 32-Bit Dualspeed Token Ring Controller¨-È*qÉ*{#ƀZeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXCOMPAQ 32-Bit Netflex Controller¿DÉÈ*0Ê*{#ƀˆeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXCOMPAQ 32-Bit Netflex Controller with Token Ring Module¦+qÉ*ÖÊ*{#ƀVeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXCOMPAQ Ethernet 16TP Controller“0Ê*iË*{#ƀ0eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXCOPS LTI ISAÃ<ÖÊ*,Ì*‡#ހxeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â¶Ô×g€G‰€:‚ÿÿÿXCrescendo C321M-PC EISA FDDI ADAPTER/PC 2,51 %iË*ÌÌ*{#ƀJeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXDEC DE100 EtherWORKS LC£(,Ì*oÍ*{#ƀPeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXDEC DE101 EtherWORKS LC/TP£(ÌÌ*Î*{#ƀPeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXDEC DE200 EtherWORKS Turbo¦+oÍ*¸Î*{#ƀVeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXDEC DE201 EtherWORKS Turbo/TPª/Î*bÏ*{#ƀ^eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXDEC DE202 EtherWORKS Turbo TP/BNC©.¸Î*+{#ƀ\eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXDEC DE422 EtherWORKS EIbÏ*+çŒ*SA TP/BNCÄ=bÏ*Û+‡#ހzeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXHewlett-Packard 27246A MC LAN Adapter/16 TP 2Ã<+ž+‡#ހxeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXHewlett-Packard 27245A PC LAN Adapter/8 TP 2Ã<Û+a+‡#ހxeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXHewlett-Packard 27250A PC LAN Adapter/8 TL 2Ä=ž+%+‡#ހzeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXHewlett-Packard 27247A PC LAN Adapter/16 TP 2ÉBa+î+‡#ހ„eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXHewlett-Packard 27247B PC LAN Adapter/16 TP Plus 2ÉB%+·+‡#ހ„eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXHewlett-Packard 27252A PC LAN Adapter/16 TL Plus 2¤)î+[+{#ƀReedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXIBM Token Ring Adapter 16/4¥*·++{#ƀTeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXIBM Token Ring Adapter 16/4 /Aµ.[+µ+‡#ހ\eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXIntel 82595 Ethernet Adapter 2³2+h+#ҀdeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€€G€:‚ÿÿÿXIntel EtherExpressTM 16 MCA PCLA8110¬1µ++{#ƀbeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXIntel EtherExpress 16 MCA TP PCLA8120§,h+»+{#ƀXeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXIntel EtherExpress 16 PCLA8110¨-+c +{#ƀZeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXIntel EtherExpress 16C PCLA8100©.»+
+{#ƀ\eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXIntel EtherExpress 16TP PCLA8120«0c +·
+{#ƀ`eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXIntel EtherExpress FlashC PCLA8105½0
+t +#ê€`eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ4€€â·1€G€:€G‰€:‚ÿÿÿXIntel TokenExpressTM ISA/16S 2´-·
+( +‡#ހZeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXIntel TokenExpress MCA 16/4 2µ.t +Ý +‡#ހ\eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXIntel TokenExpress EISA 16/4 2³,( +
+‡#ހXeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXIntel TokenExpress EISA/32 2µ.Ý +E+‡#ހ\eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXMadge Smart 16/4 AT Ringnode 2·0
+ü+‡#ހ`eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXMadge Smart 16/4 EISA Ringnode 2µ.E+±+‡#ހ\eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXMadge Smart 16/4 MC Ringnode 2·0ü+t@+‡#ހ`eedB€€ÿ€€€:‚ÿ€
€±+t@+çŒ*‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXMadge Smart 16/4 MC32 Ringnode 2çl±+[A+{#ƀØeedB€€ÿ€€€:‚ÿ€€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXNational Semiconductor DP83932 (SONIC) Motherboard Ethernet Controller on MIPS ARC/R4000 systems§ t@+B+‡#ހ@eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXNCR WaveLAN/AT 2§ [A+©B+‡#ހ@eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXNCR WaveLAN/MC 2«0B+TC+{#ƀ`eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXNetwork Peripherals NP-EISA/S FDDI¨-©B+üC+{#ƀZeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXNetwork Peripherals NP-MCA/S FDDI®-TC+ªD+#ҀZeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€€G€:‚ÿÿÿXNovell®/Eagle Technology NE1000§,üC+QE+{#ƀXeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXNovell/Eagle Technology NE2000§,ªD+øE+{#ƀXeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXNovell/Eagle Technology NE3200®3QE+¦F+{#ƀfeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXProteon ProNET-4/16 p1390 ISA AdapterÂ;øE+hG+‡#ހveedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXOlicom Token-Ring,PowerMAC MCA WS,OC-3129 2Ã<¦F++H+‡#ހxeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXOlicom Token-Ring,PowerMAC EISA WS,OC-3133 2Â;hG+íH+‡#ހveedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXOlicom Token-Ring,PowerMAC ISA WS,OC-3117 2&+H+I+# €€€K‚ÿ°&íH+ÃI+Š#ä€LeedB€€ÿ€€ €<‚ÿ€€ ‚ÿ€€ ‚ÿ€(€ ÿ€*€‚ÿÿÿx86MIPSALPHANetwork AdapterÇ=I+ŠJ+Š#ä€zeedB€€¼ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXOlicom Token-Ring,PowerMAC EISA SRV,OC-3135 2²+ÃI+ €‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXProteon ProNET-4/16 p1390 2²+ŠJ+îK+‡#ހVeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXProteon ProNET-4/16 p1392 2¶/ €‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXProteon ProNET-4/16 p1392plus 2²+îK+VM+‡#ހVeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXProteon ProNET-4/16 p1892 2·6¤L+
N+#ҀleedB€€ÿ"€€€:€G€:‚ÿ€€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿX2XProteon ProNET-4/16 p1990 EISA Adapter¶/VM+ÃN+‡#ހ^eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â·1€G‰€:‚ÿÿÿXProteon ProNET-4/16 p1990plus 2¾=
N+O+#ҀzeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€€G€:‚ÿÿÿXXXStandard Microsystems 8003EP EtherCardTM PLUS·<ÃN+D€+{#ƀxeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXO+D€+çŒ*XXStandard Microsystems 8013EBT EtherCard PLUS16¼AO++{#ƀ‚eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXStandard Microsystems 8013EP EtherCard PLUS Elite16¼AD€+¼+{#ƀ‚eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXStandard Microsystems 8013EP/A EtherCard PLUS Elite/A½B+y‚+{#ƀ„eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXStandard Microsystems 8013EPC EtherCard PLUS Elite16¿D¼+8ƒ+{#ƀˆeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXStandard Microsystems 8013EW EtherCard PLUS EliteComboÀEy‚+øƒ+{#ƀŠeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXStandard Microsystems 8013EWC EtherCard PLUS EliteCombo¼A8ƒ+´„+{#ƀ‚eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXStandard Microsystems 8013W EtherCard PLUS Elite16T´9øƒ+h…+{#ƀreedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXStandard Microsystems 8013WB EtherCard PLUS½B´„+%†+{#ƀ„eedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXXStandard Microsystems 8013WC EtherCard PLUS Elite16T¿Dh…+ä†+{#ƀˆeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXStandard Microsystems 8013WP/A EtherCard PLUS Elite10T/A¤#%†+ˆ‡+#ҀFeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€€G€:‚ÿÿÿXUngermann-Bass® NIUpc¡&ä†+)ˆ+{#ƀLeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXXUngermann-Bass NIUpc/EOTP %ˆ‡+Ɉ+{#ƀJeedB€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXUngermann-Bass NIUps/EOTP&)ˆ+ïˆ+# €€€:‚ÿJɈ+9‰+1¹U€Wú9‰+¼‰+PÀ+Multimedia Audio AdaptersƒYïˆ+¼‰+* $€²€€J€E€F‚ÿ Multimedia Audio AdaptersThe following multimedia audio adapters have been tested.¹/9‰+uŠ+Š#ä€^eedv€€ÿ€€ €<‚ÿ€€ ‚ÿ€€ ‚ÿ€(€ ÿ€*€‚ÿÿÿx86MIPSALPHAMultimedia Audio AdapterŸ!¼‰+‹+~#̀Beedv€€‡ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXCOMPAQ Business Audio²1uŠ+Ƌ+#Ҁbeedv€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€€G€:‚ÿÿÿXXXCreative Labs Sound BlasterTM 1.x»4‹+Œ+‡#ހheedv€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â@%>߀G‰€:‚ÿÿÿXXXCreative Labs Sound Blaster Pro 52Ç:Ƌ+H+#ê€teedv€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ4€€âA%>߀G€:€G‰€:‚ÿÿÿXXXMedia VisionTM Pro AudioSpectrum-16 53¸1Œ+Ž+‡#ހbeedv€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€âA%>߀G‰€:‚ÿÿÿXXXMedia Vision Pro AudioStudio 53¶/H+¶Ž+‡#ހ^eedv€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ(€€â@%>߀G‰€:‚ÿÿÿXXXMedia Vision Thunder Board 52±0Ž+g+#Ҁ`eedv€€ÿ€€€:‚ÿ€
€‚ÿ€€‚ÿ€€ÿ€€€G€:‚ÿÿÿXXXMicrosoft WindowsTM Sound System·<¶Ž+*À+{#ƀxeedv€€ÿ€€€:‚ÿ€€‚ÿ€€‚ÿ€€ÿ€€‚ÿÿÿXBuilt-in audio adaptg+*À+ïˆ+er on MIPS ARC/R4000 systems&g+PÀ+# €€€:‚ÿ7*À+‡À+1$
¾W¾ŠWû‡À+Á+÷Í+Modems}VPÀ+Á+' €¬€€E€F‚ÿModemsThe following modems have been tested for use with Remote Access Services.̇À+"Ã+R r€™€€:‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚âB%>߀G‰€:‚ÿATI 2400 etc/eATI 9600 etc/eAT&T® 2224 CEOAT&T Comsphere 3810AT&T Comsphere 3811AT&T Comsphere 3820AT&T Comsphere 3830AT&T DataportAT&T 4024Bocamodem M1440Cardinal 2400eCardinal 9600Cardinal 14400Cardinal 14400 InternalCodex 2264Codex 3220Codex 3260Codex 3261Codex 3262Codex 3263Codex 3265Codex 3260 FastCodex 3261 FastCodex 3262 FastCodex 3263 FastCodex 3265 FastCodex 3220 PlusCXR Telcom 1445DataRace RediModem V.32bis 54¹Á+0Å+U x€s€€:‚âC%>߀G‰€:‚âD%>߀G‰€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚ÿDatatrek 2424AMHDatatrek Elite 624D 55Datatrek V.32 56DEC PCXBF-AA 2400/9600FAX, V.42+BIS (Data only)DEC PCXCF-AA 2400/9600FAX, V.42+BIS (Data only)DEC PCXDF-AA 2400/9600FAX, V.42+BIS (Data only)Digicom ScoutDigicom Scout PlusDSI 9624LE PlusDSI 9624EETech UFOMATE P1496MXEvercom 24Evercom 24EEvercom 24E+Gateway 2000 Telepath InternalGVC SM2400GVC SM96GVC FM14400Hayes® Compatible 1200Hayes Compatible 2400)Î"Ã+YÇ+[ „€€€:‚€G€:‚€G€:‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚âC%>߀G€:€G‰€:‚ÿHayes Compatible 9600Hayes Pocket Modem® 2400Hayes SmartmodemTM 2400Hayes Smartmodem 9600Hayes Optima 9600Hayes Optima 14400Hayes Ultra 9600Hayes Ultra 14400Hayes V Series 9600Intel SatisFaxtion® 100Intel SatisFaxtion 400eIntel 9600EXIntel 14400EXMacronix Maxlite Fax 9696Macronix VOMAX 2000Megahertz P2144 Pocket FaxmodemMegahertz T3144 for ToshibaMegahertz Z3144 for ZenithMegahertz C5144 for COMPAQ LTEMicroCom® QX 4232bis 55 ‚0Å+bÉ+‡ ܀€€:‚âB%>߀G‰€:‚âB%>߀G‰€:‚‚âE%>߀G‰€:‚‚‚âB%>߀G‰€:‚‚âD%>߀G‰€:‚‚âD%>߀G‰€:‚âC%>߀G‰€:‚‚‚‚ÿMicroCom QX 4232HSMicroGate MG96 54MicroGate MG144 54MicroPorte 1042MultiTech MultiModem 224 57MultiTech MultiModem MT932NEC 9635E PlusOctocom 8324 54Octocom 8396PDI-1000 56Practical Peripherals 2400 PocketPractical Peripherals 2400SA 56Practical Peripherals 2400MNP 55Practical Peripherals 9600SAPractical Peripherals 14400SARacal-RMD 2412©YÇ+tË+i  €S€âF%>߀:€G‰€:‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚âD%>߀G‰€:‚âC%>߀G‰€:‚‚‚‚€G€:‚‚‚ÿRacal-RMD 2412/2 58Racal-RMD 3221Racal-RMD 3222Racal-RMD 3226Racal-RMD 3223Racal-RMD 9632PARacal-RMD 9642PASupraModem 2400Supra Fax Modem 9624 InternalSupra Fax Modem V32Supra Fax Modem V32bisSupra Fax Modem PlusTelebit® QBlazerTelebit T1000Telebit T1500 56Telebit T1600 55Telebit T2000Telebit T2500Telebit T3000Telebit TrailBlazer® PlusTelebit WorldBlazerTelebit WorldBlazer-Rackmount¡bÉ+‰Í+t ¶€C€âC%>߀:€G€:€G‰€:‚âG%>߀G‰€:‚‚âG%>߀G‰€:‚‚‚‚‚‚‚âs%>߀G‰€:‚‚‚‚âD%>߀G‰€:‚ÿUDS Motorola® V.3225 55UDS Motorola V.3227 59UDS Motorola V.3229UDS Motorola FasTalk V.32/42b 59US Robotics Courier DualUS Robotics Courier HSTUS Robotics Courier V.32bisUS Robotics Sportster 2400US Robotics Sportster 9600US Robotics Sportster 14400Ven-Tel 9600 Plus II 60Ven-Tel Pocket 24 V.42bis FAXVen-Tel 14400 FaxVen-Tel 14400 Fax InternalWestern Datacom Worldcom V32bis 56nFtË+÷Í+( €Œ€€:‚‚‚‚‚‚ÿZoom AFXZoom FX 9624VZoom VFX V.32bisZyXel U-1496ZyXel U-1496EH‰Í+?Î+1¦€W„‹Wü?Î+ÝÎ+RÏ+Hardware Security Hostsžw÷Í+ÝÎ+' €î€€E€F‚ÿHardware Security HostsThe following hardware security hosts have been tested for use with Remote Access Services.uO?Î+RÏ+& €ž€€:‚‚‚‚ÿDigital Pathways Defender 1000DRacal Gaurdata GSMSecurity Dynamics ACM400>
ÝÎ+Ï+1“¾ŠW;XýÏ+&,†,ISDN AdaptersŠcRÏ+&,' €Æ€€E€F‚ÿISDN AdaptersThe following ISDN adapters have been tested for use withÏ+&,RÏ+ Remote Access Services.`;Ï+†,% €v€€:‚‚‚ÿDigiBoard PCIMAC ISA AdapterDigiBoard PCIMAC/4 AdapterK&,Ñ,1§„‹WÛXþÑ,u,ë,Multi-port Serial Adapters¤}†,u,' €ú€€E€F‚ÿMulti-port Serial AdaptersThe following multi-port serial adapters have been tested for use with Remote Access Services.v#Ñ,ë,S t€G€âj%>߀:€G‰€:‚‚‚‚‚âj%>߀G‰€:‚‚‚‚‚âj%>߀G‰€:‚‚ÿComtrol Hostess 550 61DigiBoard 2PortDigiBoard 4PortDigiBoard 8PortDigiBoard CX AdapterDigiBoard DigiCHANNEL PC/X Host Adapter for ISA bus 61DigiBoard PC/4e AdapterDigiBoard PC/8e AdapterDigiBoard PC/8i AdapterDigiBoard PC/Xem AdapterStargate Technologies Plus 8 61Ou,:,1;XØXÿ:,Â,“,Uninterruptible Power Suppliesˆaë,Â,' €Â€€E€F‚ÿUninterruptible Power SuppliesThe following uninterruptible power supplies have been tested.ќ:,“,5 8€9€€:‚‚‚âk%>߀G‰€:‚‚‚ÿAmerican Power Conversion Back-UPSAmerican Power Conversion Smart-UPSPara Systems MinuteManTripp Lite BC800LAN 62Unison (Tripp Lite) UNIPower PS: Â,Í,1‰ÛXJXÍ,?,—,KeyboardsrK“,?,' €–€€E€F‚ÿKeyboardsAny keyboard that is 100% compatible with those listed below.X'Í,—,1 2€N€€:‚â%>߀G‰€:‚‚ÿ101/102-key IBM AT (84-key) 43A?,Ø,1áØX"XØ,Ë,{ ,Pointing Devicesóȗ,Ë,+ $€‘€€E€F€?‚ÿPointing DevicesThe following pointing devices have been tested. The Alpha platform supports mouseport-based pointing devices. The MIPS platform supports mouseport and serial pointing devices.ÉØ,Ó,? L€“€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚ÿA4 Tech Serial MouseAcer M-SG14AT&T 320 Mouse CA-93-6MDCompuAdd Serial MouseDexxa MF21-9FDigital Equipment PCXAS-AAHewlett-Packard C1413AHoneywell 2HW53-3EIBM 33G3835IBM 33G5430ICL M-SF14-6MDKensington Expert Mouse Ver. 2.0Kensington Expert Mouse Ver. 4.0Key Tronic Trak101LogitechTM CA-93-6MDLogitech M-MD14-2Logitech M-MD14-9FLogitech M-MD15LLogitech M-SF14-6MDLogitech M-SF15-6MDLogitech Mouseman, BusLogitech Mouseman, CordlessÖË,â
,9 @€­€€:‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚ÿLogitech Mouseman, SerialLogitech PA-82-9MILogitech Series 9 CC-93-9FLogitech Trackman MouseLogitech Trackman Portable MouseLogitech Trackman Stationary MouseMicrosoft Bus Mouse (Original - Green Buttons)Microsoft Mouse, BallPoint®Microsoft Mouse, InportMicrosoft Mouse, PS/2 CompatibleMicrosoft Mouse, SerialMicrosoft Mouse, Serial / PS/2Microsoft Mouse 2.0, BallPointMicrosoft Mouse 2.0, BusMicrosoft Mouse 2.0, MousePortMicrosoft Mouse 2.0, Serial™qÓ,{ ,( €â€€:‚‚‚‚‚‚ÿMicrosoft Mouse 2.0, Serial-MousePortMotorMouseOlivetti M-SE9-6MDSejin Electronics SWB-200Ultra Mouse 2609â
,´ ,1âDJX‡
Z´ ,: ,µ
-Printers†_{ ,: ,' €¾€€E€F‚ÿPrintersDrivers are included for the following printers. Tested models are listed with *.É´ ,X,U x€“€€:€G€:€G€:‚‚‚€G€:‚€G€:‚‚€G€:€G€:‚‚‚‚‚‚‚‚ÿAdobe® LaserJet® II Cartridge v52.3Agfa Compugraphic 400PSAgfa Compugraphic GenicsAgfa Matrix® ChromaScript v51.8Agfa TabScript C500 PostScript® Printer v50.3Agfa-Compugraphic 9400P v49.3Apple® LaserWriter® II NT v47.0*Apple LaserWriter II NTX v47.0Apple LaserWriter II NTX v51.8Apple LaserWriter II NTX-J v50.5Apple LaserWriter IIf v2010.113Apple LaserWriter IIg v2010.113Apple LaserWriter Plus v38.0Apple LaserWriter Plus v42.2Ç: ,i@,> J€€€:‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚ÿApple LaserWriter v23.0Apple Personal LaserWriter NTR v2010.129Apricot LaserAPS-PS PIP with APS-6-108 v49.3 or 52.2APS-PS PIP with APS-6-80 v49.3 or 52.2APS-PS PIP with LZR 1200 v49.3 or 52.2APS-PS PIP with LZR 2600 v49.3 or 52.2AST TurboLaser-PS v47.0AT&T 470/475AT&T 473/478Brother® HJ-100Brother HJ-100iBrother HJ-770Brother HL-10DVBrother HLX,i@,{ ,-10V*Brother HL-4Brother HL-4VBrother HL-4Ve*Brother HL-8*Brother HL-8D*Brother HL-8eØX,€B,? L€±€€:‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚ÿBrother HL-8VBrother M-1309Brother M-1324Brother M-1809Brother M-1818Brother M-1824LBrother M-1909Brother M-1918Brother M-1924L*Bull Compuprint PageMaster 1025Bull Compuprint PageMaster 413Bull Compuprint PM 201Canon® Bubble-Jet BJ-10eCanon Bubble-Jet BJ-10exCanon Bubble-Jet BJ-10sxCanon Bubble-Jet BJ-130Canon Bubble-Jet BJ-130eCanon Bubble-Jet BJ-20Canon Bubble-Jet BJ-200*Canon Bubble-Jet BJ-230Canon Bubble-Jet BJ-300*Canon Bubble-Jet BJ-330
Ði@,ŠD,: B€¡€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿCanon Bubble-Jet BJC-800Canon LBP-4 PS-2 v51.4Canon LBP-8III PS-1 v51.4Canon LBP-8IIIR PS-1 v51.4Canon LBP-8IIIT PS-1 v51.4Canon PS-IPU Color Laser Copier v52.3Canon PS-IPU Kanji Color Laser Copier v52.3Citizen 120DCitizen 120D+Citizen 124DCitizen 180DCitizen 200GXCitizen 200GX/15Citizen 224Citizen GSX 240 Scalable FontCitizen GSX-130Citizen GSX-140Citizen GSX-140+Citizen GSX-145Citizen GSX-230Citizen HSP-500Citizen HSP-550Citizen PN48Ê€B,ŒF,8 >€•€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿCitizen Prodot 24Citizen Prodot 9Citizen Prodot 9xCitizen PROjetCitizen Swift 200Citizen Swift 24Citizen Swift 240 Scalable FontCitizen Swift 24eCitizen Swift 24xCitizen Swift 9Citizen Swift 9xC-Itoh 8510Colormate PS v51.9COMPAQ PAGEMARQ 15 v2012.015COMPAQ PAGEMARQ 20 v2012.015Dataproducts LZR 1260 v47.0Dataproducts LZR 1560 v2010.127Dataproducts LZR 960 v2010.106Dataproducts LZR-2665 v46.2Diconix 150 PlusDigital Colormate PS v51.9ÛŠD,›H,4 6€·€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDigital DEClaser 1100 (LJ)*Digital DEClaser 1100Digital DEClaser 1150 v51.4Digital DEClaser 1152 17 fontsDigital DEClaser 1152 43 fonts*Digital DEClaser 2100Digital DEClaser 2100 plus (LJ)Digital DEClaser 2150 plus v51.4Digital DEClaser 2150 v51.4*Digital DEClaser 2200Digital DEClaser 2200 plus (LJ)Digital DEClaser 2250 plus v51.4Digital DEClaser 2250 v51.4Digital DEClaser 3200 (LJ)*Digital DEClaser 3200Digital DEClaser 3250 v47Digital DECmultiJET 1000ÐŒF,¢J,7 <€¡€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿDigital DECmultiJET 2000Digital DECwriter 95Digital LA310Digital LA324Digital LA424Digital LA70Digital LA75Digital LA75 PlusDigital LN03R ScriptPrinterDigital PrintServer 17 v48.3Digital PrintServer 20 v48.3Digital PrintServer 32 v48.3Digital PrintServer 40 Plus v48.3Digital turbo PrintServer 20EPSON ActionLaser IIEPSON AP-3250 Scalable FontEPSON AP-5000 Scalable FontEPSON AP-5500 Scalable FontEPSON Compatible 24 PinEPSON Compatible 9 Pin
È›H,¬L,B R€‘€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿEPSON DFX-5000EPSON DLQ-2000EPSON EPL-4000EPSON EPL-4300EPSON EPL-6000EPSON EPL-7000EPSON EPL-7500 v52.3EPSON EPL-8000EPSON EPL-8100EPSON EX-1000EPSON EX-800EPSON FX-100EPSON FX-100+EPSON FX-1000EPSON FX-105EPSON FX-1050EPSON FX-185EPSON FX-286EPSON FX-286eEPSON FX-80EPSON FX-80+EPSON FX-800*EPSON FX-85EPSON FX-850EPSON FX-86eEPSON GQ-3500EPSON JX-80EPSON L-1000EPSON L-750EPSON LP-3000PS F2 v52.3EPSON LP-3000PS F5 v52.3΢J,ºN,@ N€€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿEPSON LQ-100 Scalable FontEPSON LQ-1000EPSON LQ-1010EPSON LQ-1050EPSON LQ-1060EPSON LQ-1070 Scalable FontEPSON LQ-1170 Scalable FontEPSON LQ-1500EPSON LQ-200*EPSON LQ-2500*EPSON LQ-2550EPSON LQ-400EPSON LQ-450EPSON LQ-500*EPSON LQ-510EPSON LQ-550EPSON LQ-570 Scalable FontEPSON LQ-800EPSON LQ-850EPSON LQ-850+EPSON LQ-860EPSON LQ-870 Scalable FontEPSON LQ-950EPSON LX-1050EPSON LX-400EPSON LX-80EPSON LX-800EPSON LX-810EPSON LX-850À¬L,ʀ,D V€€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚ÿEPSON LX-850+EPSON LX-86EPSON MX-100EPSON MX-80EPSON MX-80 F/TEPSON PostScript CARD v52.5EPSON RX-100EPSON RX-100+EPSON RX-80EPSON RX-80 F/TEPSON RX-80 F/T+EPSON SQ-1170 Scalable FontEPSON SQ-2000EPSON SQ-2500EPSON SQ-2550EPSON SQ-850EPSON SºN,ʀ,{ ,Q-870 Scalable FontEPSON T-750EPSON T-1000Fujitsu® Breeze 100Fujitsu Breeze 200Fujitsu DL 1100Fujitsu DL 1100 ColourFujitsu DL 1150Fujitsu DL 1200Fujitsu DL 1250Fujitsu DL 2400àºN,å‚,; D€Á€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿFujitsu DL 2600Fujitsu DL 3300Fujitsu DL 3350Fujitsu DL 3400Fujitsu DL 3450Fujitsu DL 3600Fujitsu DL 4400Fujitsu DL 4600Fujitsu DL 5600Fujitsu DL 900Fujitsu DX 2100Fujitsu DX 2200Fujitsu DX 2300Fujitsu DX 2400Fujitsu RX7100PS v50.3GCC BLP Elite v52.3GCC BLP II v52.3GCC BLP IIS v52.3GCC Business LaserPrinter v49.2GCC Business LaserPrinter v51.4Generic IBM Graphics 9pin wideGeneric IBM Graphics 9pinGestetner GLP800-Scout v52.3Hermes H 606 PS (13 Fonts)Þʀ,…,? L€½€€:‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿHermes H 606 PS (35 fonts)*Hermes H 606HP DeskJet®*HP DeskJet 1200C*HP DeskJet 500HP DeskJet 510HP DeskJet 500CHP DeskJet 500C (Monochrome)HP DeskJet 550CHP DeskJet PlusHP DeskJet PortableHP LaserJetHP LaserJet 2000*HP LaserJet 4HP LaserJet 4 PostScript v2011.110*HP LaserJet 4SiHP LaserJet 4Si/4Si MX PSHP LaserJet 500+HP LaserJet ELI PostScript v52.3HP LaserJet IID PostScript Cartridge v52.2*HP LaserJet IIDHP LaserJet III PostScript Cartridge v52.2
Ñå‚, ‡,9 @€£€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚ÿHP LaserJet III PostScript Plus v2010.118*HP LaserJet IIIHP LaserJet IIID PostScript Cartridge v52.2HP LaserJet IIID PostScript Plus v2010.118*HP LaserJet IIID*HP LaserJet IIIP PostScript Cartridge v52.2HP LaserJet IIIP PostScript Plus v2010.118*HP LaserJet IIIP*HP LaserJet IIISi PostScript v52.3*HP LaserJet IIISiHP LaserJet IIP Plus*HP LaserJet IIP PostScript Cartridge v52.2*HP LaserJet IIPHP LaserJet Plus*HP LaserJet Series II*HP PaintJet®Ç…,‰,I `€€€:‚‚‚€G€:‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚ÿ*HP PaintJet XLHP PaintJet XL 300HP PaintJet XL 300 v2011.112HP QuietJet®HP QuietJet PlusHP ThinkJet® (2225 C-D)IBM 4019 LaserPriner PS17*IBM 4019 LaserPrinter PS39IBM 4029 LaserPrinter PS17IBM 4029 LaserPrinter PS39*IBM 4039 LaserPrinterIBM 4039 LaserPrinter PS39IBM 4070 IJIBM 4079 Color Jetprinter PSIBM 4216-020 v47.0IBM 4216-030 v50.5IBM ExecJet® 4072IBM GraphicsIBM Personal Page Printer II-31IBM Personal Printer II 2380¸ ‡,*‹,V z€q€€:‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚€G€:‚€G€:‚€G€:‚€G€:‚‚‚ÿIBM Personal Printer II 2381IBM Personal Printer II 2390IBM Personal Printer II 2391IBM Portable 5183*IBM Proprinter®*IBM Proprinter IIIBM Proprinter IIIIBM Proprinter X24IBM Proprinter X24e*IBM Proprinter XLIBM Proprinter XL IIIBM Proprinter XL IIIIBM Proprinter XL24IBM Proprinter XL24eIBM PS/1 2205*IBM QuickWriter® 5204IBM QuietWriter® IIIKodak® EktaPlus 7016Kyocera® F-1000Kyocera F-1000AKyocera F-1010ĉ,/,A P€‰€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚ÿKyocera F-1200SKyocera F-1800Kyocera F-1800AKyocera F-2000AKyocera F-2010Kyocera F-2200Kyocera F-2200SKyocera F-3000Kyocera F-3000AKyocera F-3010Kyocera F-3300Kyocera F-5000Kyocera F-800Kyocera F-800AKyocera F-820Kyocera FS-1500 / FS-1500AKyocera FS-3500 / FS-3500AKyocera FS-5500 / FS-5500AKyocera FS-850 / FS-850ALaserWriter Personal NT v51.8LinotronicTM 100 v42.5Linotronic 200 v47.1Linotronic 200 v49.3Linotronic 200/230Ô*‹,?,< F€©€€:‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚ÿLinotronic 300 v47.1Linotronic 300 v49.3Linotronic 330 v52.3Linotronic 330-RIP 30 v52.3Linotronic 500 v49.3Linotronic 530 v52.3Linotronic 530-RIP 30 v52.3Linotronic 630 v52.3Mannesmann Tally® MT 130/24Mannesmann Tally MT 131/24Mannesmann Tally MT 150/24Mannesmann Tally MT 151/24Mannesmann Tally MT 230/24Mannesmann Tally MT 330Mannesmann Tally MT 350Mannesmann Tally MT 360Mannesmann Tally MT 730/735Mannesmann Tally MT 82Mannesmann Tally MT 90Ö/,_Á,> J€­€€:‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚ÿMannesmann Tally MT 904 PlusMannesmann Tally MT 908Mannesmann Tally MT 91Mannesmann Tally MT 92Mannesmann Tally MT 92CMannesm?,_Á,{ ,ann Tally MT 93Mannesmann Tally MT 94Mannesmann Tally MT 98/99Microtek TrueLaserMinolta SP 3000Minolta SP 3500Monotype® ImageMaster 1200 v52.3Monotype Imagesetter v52.2NEC Colormate PS/40 v51.9NEC Colormate PS/80 v51.9*NEC Jetmate 400*NEC Jetmate 800NEC Pinwriter CP6NEC Pinwriter CP7NEC Pinwriter P20NEC Pinwriter P2200 Ð?,hÃ,9 @€¡€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿNEC Pinwriter P2plusNEC Pinwriter P30NEC Pinwriter P3200NEC Pinwriter P3300NEC Pinwriter P5200*NEC Pinwriter P5300NEC Pinwriter P5XLNEC Pinwriter P6NEC Pinwriter P60NEC Pinwriter P6200NEC Pinwriter P6300NEC Pinwriter P6plusNEC Pinwriter P7NEC Pinwriter P70NEC Pinwriter P7plusNEC Pinwriter P90NEC Pinwriter P9300NEC Pinwriter P9XLNEC SilentWriter 95 v2010.119NEC Silentwriter 95 v2011.111NEC Silentwriter 97 v2011.111NEC Silentwriter LC 860Í_Á,jÅ,5 8€›€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿNEC Silentwriter LC 860 PlusNEC Silentwriter LC890 v47.0NEC Silentwriter LC890XL v50.5NEC Silentwriter S102NEC Silentwriter2 290 v52.0NEC Silentwriter2 90 v52.2NEC Silentwriter2 990 v52.3OceColor G5241 PSOceColor G5242 PostScript Printer v50.3Oki MICROLINE 801PS+F v52.3Oki ML 182 Elite (IBM)Oki ML 192 Elite (IBM)Oki ML 193 Elite (IBM)Oki ML 280 Elite (IBM)Oki ML 320 Elite (IBM)Oki ML 321 Elite (IBM)Oki ML 3410 Elite (IBM)Oki ML 380 EliteÄhÃ,rÇ,D V€‰€€:‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿOki ML 390 EliteOki ML 391 EliteOki ML 393 EliteOki ML 393C EliteOki ML 590Oki ML 591Oki OL-400Oki OL-410Oki OL-800/840Oki OL-810Oki OL830-PS v52.5Oki OL840-PS v51.8Okidata® LaserLine 6Okidata ML 192*Okidata ML 192-IBMOkidata ML 192 PlusOkidata ML 193*Okidata ML 193-IBMOkidata ML 193 PlusOkidata ML 292*Okidata ML 292-IBMOkidata ML 293*Okidata ML 293-IBMOkidata ML 320*Okidata ML 320-IBMOkidata ML 321*Okidata ML 321-IBMÕjÅ,…É,> J€«€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿOkidata ML 380Okidata ML 390Okidata ML 390 PlusOkidata ML 391Okidata ML 391 PlusOkidata ML 393Okidata ML 393 PlusOkidata ML 393COkidata ML 393C PlusOkidata ML 92-IBMOkidata ML 93-IBMOkidata OL-400Okidata OL-800Olivetti DM 109Olivetti DM 124Olivetti DM 124 COlivetti DM 124 LOlivetti DM 309Olivetti DM 309 LOlivetti DM 309 SOlivetti DM 309 SLOlivetti DM 324Olivetti DM 324 LOlivetti DM 324 SOlivetti DM 324 SLOlivetti DM 600Olivetti DM 600 S ÑrÇ,‘Ë,; D€£€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿOlivetti DM 624Olivetti ETV 5000Olivetti JP 150Olivetti JP 350Olivetti JP 350SOlivetti PG 108Olivetti PG 208 M2Olivetti PG 306Olivetti PG 306 PS (13 Fonts)Olivetti PG 306 PS (35 Fonts)Olivetti PG 308Olivetti PG 308 HSOlivetti PG 308 HS PostScriptOlivetti PG 404Olivetti PG 408Panasonic KX-P1081Panasonic KX-P1123Panasonic KX-P1124Panasonic KX-P1124iPanasonic KX-P1180Panasonic KX-P1624Panasonic KX-P1695Panasonic KX-P2123Panasonic KX-P2124Ý…É,ªÍ,< F€»€€:‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚ÿPanasonic KX-P2180Panasonic KX-P2624Panasonic KX-P4410Panasonic KX-P4420Panasonic KX-P4430*Panasonic KX-P4450Panasonic KX-P4450iPanasonic KX-P4451Panasonic KX-P4455 v51.4QMS® 1725 Print SystemQMS 2025 Print SystemQMS 3225 Print SystemQMS 420 Print System v2011.22 r15QMS 4525 Print SystemQMS 860 Print System v2011.22 r15*QMS ColorScript 100 Model 10 v50.3QMS ColorScript 100 Model 20 v50.3QMS ColorScript 100 Model 30 v50.3QMS ColorScript 100 Model 30siÈ‘Ë,°Ï,> J€‘€€:‚‚‚‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿQMS ColorScript 100 v49.4QMS ColorScript 210 v2011.22QMS ColorScript 230 v2011.22QMS PS Jet Plus v46.1QMS PS Jet v46.1QMS-PS® 1700 v52.4QMS-PS 2000 v52.4QMS-PS 2200 v51.0 or 52.3QMS-PS 2210 v51.0 or 52.3QMS-PS 2220 v51.0 or 52.3QMS-PS 410 v52.4QMS-PS 800 Plus v46.1QMS-PS 800 v46.1*QMS-PS 810 Turbo v. 51.7*QMS-PS 810 v47.0QMS-PS 815 MR v52.4QMS-PS 815 v52.4QMS-PS 820 Turbo v51.7QMS-PS 820 v51.7QMS-PS 825 MR v52.4QMS-PS 825 v52.4ϪÍ,Ä-9 @€Ÿ€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿQuadLaser IQume Scrip°Ï,Ä-{ ,TEN v47.0Ricoh LP-1200Ricoh PC Laser 6000-PS v50.5*Royal CJP 450Scantext 2030-51 v49.3 or 52.2Schlumberger 5232 Color PostScript Printer v50.3Seiko ColorPoint PS Model 04Seiko ColorPoint PS Model 14*Seiko Professional ColorPoint 8BPPSeikosha LT-20Seikosha SL-80 IPSeikosha SL-92Seikosha SL-92 PlusSeikosha SP-1900Seikosha SP-1900+Seikosha SP-2000Seikosha SP-2400Seikosha SP-2415Sharp JX-9300Sharp JX-9500Sharp JX-9500EÒ°Ï,Ó-= H€¥€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿSharp JX-9500HSharp JX-9600Sharp JX-9700Sharp JX-9700EShinko Color CHC-746PSJ PostScript Printer v52.2Star FR-10Star FR-15Star LaserPrinter 4Star LaserPrinter 4 IIIStar LaserPrinter 5Star LaserPrinter 5 EXStar LaserPrinter 8Star LaserPrinter 8 DBStar LaserPrinter 8 DXStar LaserPrinter 8 IIStar LaserPrinter 8 IIIStar LC-10Star LC-10 ColourStar LC-100 ColourStar LC-15Star LC-20Star LC-200Star LC24-10Star LC24-100Star LC24-15Star LC24-20ÀÄ-Ö-C T€€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿStar LC24-200Star LC24-200 ColourStar NB24-10Star NB24-15Star NL-10Star NX-1000Star NX-1000 RainbowStar NX-1001Star NX-1020 RainbowStar NX-1500Star NX-2400Star NX-2410Star NX-2415Star NX-2420Star NX-2420 RainbowStar NX-2430Star SJ-48Star XB-2410Star XB-2415Star XB-2420Star XB-2425Star XB24-10Star XB24-15Star XB24-200Star XB24-250Star XR-1000Star XR-1020Star XR-1500Star XR-1520Star ZA-200Star ZA-250Tandy LP-1000!åÓ-÷-< F€Ë€€:‚€G€:€G€:‚‚‚‚‚‚‚‚‚‚‚‚ÿTegra GenesisTektronix® PhaserTM 200e with 17 fonts v2011.108(3)Tektronix Phaser 200e with 39 fonts v2011.108(3)Tektronix Phaser 200i v2011.108(3)Tektronix Phaser II PXTektronix Phaser II PXe v2010.128 with 17 fontsTektronix Phaser II PXe v2010.128 with 39 fontsTektronix Phaser II PXi v2010.116Tektronix Phaser II PXi v2011.108Tektronix Phaser II PXiJ v2011.108Tektronix Phaser III PXi v2010.116*Tektronix Phaser III PXi v2011.108Tektronix Phaser III PXiJ v2011.108àÖ-
-< F€Á€€:‚‚€G€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿTektronix Phaser IISD v2011.108Tektronix Phaser PXTI® 2115 13 fonts v47.0TI 2115 35 fonts v47.0TI 850/855TI microLaser PS17 v.52.1TI microLaser PS35 v.52.1TI microLaser XL PS17 v.52.1TI microLaser XL PS35 v.52.1TI microLaser16 Turbo v2010.119TI microLaser6 Turbo v2010.119TI microLaser9 Turbo v2010.119TI OmniLaser 2108 v45.0TI Omnilaser 2115 v47.0Toshiba GX-400Toshiba PageLaser12Triumph Adler SDR 7706Triumph Adler SDR 7706 PS13Triumph Adler SDR 7706 PS35Ò÷- -4 6€¥€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚ÿUnisys AP9210Unisys AP9210 17 Fonts v52.1Unisys AP9210 39 Fonts v52.1Unisys AP9415 v47.0Varityper 4000-L300 v52.3Varityper 4000-L330 v52.3Varityper 4000-L500 v52.3Varityper 4000-L530 v52.3Varityper 4200B-P v49.3 or 52.2Varityper 4300P v49.3 or 52.2Varityper Series 4000-5300 v49.3 or 52.2Varityper Series 4000-5330 v49.3 or 52.2Varityper Series 4000-5500 v52.2Varityper VT-600PVarityper VT 600P v48.0Varityper VT 600W v48.0Varityper VT4_510A v52.3œ^

-> J€½€€:‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚‚€G€:‚‚‚‚ÿVarityper VT4990 v52.3VT4_530A v52.3VT4_530B v52.3VT4_530C v52.3VT4_533B v52.3VT4_533C v52.3VT4_53EA v52.3VT4_53EB v52.3VT4_550A v52.3VT4_550B v52.3VT4_550C v52.3VT4_551A v52.3VT4_563A v52.3VT4_563B v52.3Wang LCS15 FontPlusWang LCS15Wang LDP8Xerox® DocuTech 135 v2010.130Xerox DocuTech 85 v2010.130Xerox DocuTech 90 v2010.130@ -õ
-1Ù"X¦[õ
-L-é‚-Technical NotesW/µ
-L-( €_€€E€F‚ÿTechnical NotesThe Windows NT Driver Library is provided on the Windows NT CD-ROM in the \DRVLIB directory, as well as several locations for electronic transmission. Please see the section at the end of this document for instructions on downloading and accessing Windows NT Driver Library drivers.`/õ
-¸A-1 0€_€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿ1This device requires a driver from the \DRVLIB directory on the Windows NT CD-ROM, or the Windows NT Driver Library.2This deviL-¸A-µ
-ce requires a driver from the Windows NT driver library. See the following section on accessing these drivers.3Refer to SETUP.TXT for information on configuring this machine/device before installation.4Windows NT does not currently support Advanced Power Management (APM).5This system requires an ABIOS.SYS driver dated after 11/1/93 to support IDE drives. Call Microsoft Product Support Services to obtain this update.2ÿL-êC-3 4€ÿ€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿ6Contact the manufacturer for information on running Windows NT on this machine.7IDE drives greater than 500Mb are only supported with BIOS Version 1.23 or later, with BIOS setting for IDE in standard mode.8Only the NCR 53c710 SCSI Host Adapter is supported in this machine.9Tested with firmware revisions 3.10 and 3.20.10Problems may be encountered using SCSI Removable Media (cartridge) drives on this adapter on this platform.11This adapter requires an active terminator for proper performance.â¸A-ÿE-3 4€Å€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿ12This adapter must be configured for 5 MB/second asynchronous I/O to work with listed CD-ROM drives from NEC.13This adapter must be configured for 5 MB/second asynchronous I/O to work with listed CD-ROM drives from Chinon, Hitachi and NEC.14Tested with the Unisys PW2 Advantage 3256 (Flemington).15Tested with the Unisys PW2 Advantage Plus MPE 4668.16Scanners are not supported with this adapter.17Removable media drives are not supported with cache module installed.
ÚêC- H-3 4€µ€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿ18CD-audio, tape drives and scanners are not supported on this controller.19To use this adapter, at least one device on the bus must provide termination power.20Refer to SETUP.TXT for information on configuring this adapter.21SCSI BIOS dated before 1991 requires PS/2 Reference Diskette version 1.21 or later.22This adapter cannot be used for CD Setup. To install Windows NT with this adapter, use the WINNT.EXE Setup method.23Tested with COMPAQ Portable 486c.áÿE-$J-7 <€Ã€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿ24Tested with NCR System 3000 Model 3350.25This adapter is only supported on IRQ-5.26This adapter is only supported for use with scanners and CD-ROM drives.27Tested with firmware revision 005.28Tested with firmware revision 008.29This drive is not supported for use with the Adaptec AHA-1542c.30This drive is not supported for use with the Future Domain TMC-850M and TMC-1670 adapters.31This drive requires double-termination when used with the Adaptec AHA-1742A.^+ H-‚L-3 4€W€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿ32The Adaptec AHA-1640 and Ultrastor 24f support only a single disk when used with this drive. This drive is not supported for use with the Future Domain MCS-600 adapter.33Requires firmware revision 1.10C to function properly with Windows NT.34Supported with CD-ROM drives based on Panasonic CR-52x and CR-56x models only.35This drive is not supported with the Adaptec AHA-1640 adapter.36Requires firmware version 484 or later for proper operation.37This drive is not supported with the IBM PS/2 Microchannel SCSI Host Adapter (with cache).(ó$J-ªN-5 8€ç€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿ38This drive is not supported with the Future Domain TMC-850M(ER).39This drive is not supported with the UltraStor 24fa adapter.40This drive is not supported with the Adaptec AHA-1742A adapter.41For use with floppy controllers. Separate interface controllers for these types of drives are not supported.42Requires that 512-byte sector-sized media be mounted during installation.43Supported on x86 only.44This adapter is currently supported in its ESC-1/ESC-2 compatibility mode only.-ö‚L-ã€-7 <€í€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿ45Not supported with the the Future Domain TMC-850m.46This has been Fault-Tolerance (RAID) tested using Windows NT Advanced Server.47Tested with HP C2225B tape drive, HP C2229B disk drive and HP C2226A CD-ROM drive.48HP Storage Systems were tested with the appropriate HP SCSI HoªN-ã€-µ
-st Adapters.49Tested with appropriate StorageWorks options including CD-ROM, Tape and Hard Drives.50Also supported on Alpha platforms.51FDDI tested only.52Supported in Sound Blaster 1.x compatibility mode.Þ£ªN-Á‚-; D€G€PÈ:‚H€:ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ƒ‚ÿ53Not supported in Sound Blaster 1.x compatibility mode.54Error control and flow control forced on.55Advanced features disabled.56Supported as a client modem only.57Flow control forced on.58Maximum DTE speed set to 2400.59Maximum DTE speed set to 9600.60Modem compression forced on.61Tested as standard serial ports only.62In the UPS applet, check the box "Remote UPS Shutdown" and set it to high.(ã€-é‚-% €€PÈ:€:‚ÿ8Á‚-!ƒ-1* ‡
ZO[!ƒ-‡ƒ-€Œ-UpdatesfCé‚-‡ƒ-# €†€€E‚ÿHow To Find New Drivers in the Windows NT Driver Library (WNTDL)6!ƒ-½ƒ-' €€€H‚€<‚ÿCOMPUSERVEF‡ƒ-„-( €<€PÈ:‚H€:ƒ‚ÿA.If you are using WinCIM:ôÀ½ƒ-÷„-4 6€€Pþ„H~€:ƒƒ‚ƒƒ‚ƒƒ‚ƒƒ‚ÿ1.From the Services Menu, select GO.2.Type MSL in the GO dialog box.3.Select 2 to scan.4.Search for WNTDL to view the whole WNTDL list or another key word to view specific files.•l„-Œ…-) "€Ø€PÈ:„H~€:ƒ‚ÿB.If you are not using WinCIM, log onto CompuServe, type GO MSL, then follow instructions 3 and 4 above.*÷„-¶…-' €€PÈ:‚H€:‚ÿ. Œ…-ä…-% €€‚H€<‚ÿONLINE>¶…-"†-( €,€PÈ:‚H€:ƒ‚ÿA.Log onto OnLine.Kä…-m‡-4 6€/€Pþ„H~€:ƒƒ‚ƒƒ‚ƒƒ‚ƒƒ‚ÿ1.From the Database Menu, select the option to Select DB.2.Choose the Software Library option.3.From the Software Library option, select the option Host Items.4.In the Query box, type WNTDL to review the whole WNTDL list or another key word to view a specific file.¼“"†-)ˆ-) €'€PÈ:‚H€:ƒ‚ÿB.To get more information on a specific file, highlight the file with the cursor and press . This brings up more details about the file.Rm‡-{ˆ-3 6€>€‚H€:‚€<€L€<‚€:‚ÿGENieTMLog onto Genie.ԝ)ˆ-OŠ-7 <€;€Pþ„H~€:ƒƒ‚ƒƒ‚ƒƒ‚ƒƒ‚ƒƒ‚ÿ1.From the main menu, select option 5 - Computing Services.2.From the Computing Services menu, select option 6 - IBM PC/TANDY Roundtables.3.From the IBM PC/TANDY Roundtables menu, select option 3 - Software Libraries.4.From the Software Libraries Menu, select option 3 - Search File Directory.5.Type WNTDL as the search string to view the WNTDL list or any other key word to view a specific file.xK{ˆ-NJ-- *€–€‚H€:‚€<‚€:‚ÿMICROSOFT DOWN LOAD SERVICESLog onto MSDL by calling (206) 936-6735.˚OŠ-’‹-1 0€5€Pþ„H~€:ƒƒ‚ƒƒ‚ƒƒ‚ÿ1.Enter name and location.2.From the main menu, press F for File index.3.Select L to list the whole WNTDL list or E to examine a specific file.(NJ-º‹-% €€‚H€:‚ÿƝ’‹-€Œ-) €;€€<‚€:‚‚ÿIF YOU DO NOT HAVE A MODEMYou can obtain an individual driver from the WNTDL on a disk by calling Microsoft Product Support Services at (206) 637-7098.;
º‹-»Œ-12¦[ÿÿÿÿÿÿÿÿ»Œ-²Ž-Disclaimer3 €Œ-î-* "€€€:‚‚€M‚‚ÿWhile we have endeavored to supply as complete and accurate a list as possible, MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE COMPLETENESS AND ACCURACY OF THIS LIST. This list does not constitute an endorsement of any particular manufacturer.žx»Œ-ŒŽ-& €ð€(O€N‚ÿMicrosoft and BallPoint are registered trademarks and Windows and Windows NT are trademarks of Microsoft Corporation.&î-²Ž-# €€€N‚ÿKŒŽ-ýŽ-1‡-ÿÿÿÿÿÿÿÿýŽ-i-TL.Windows NT Reference Booksl5²Ž-i-7 >€ €°Œ€€€"€†"€6‚ÿWindows NT Reference Books (listed by Author) <ýŽ-¥-% €.€°˜€‚ÿWindows NT UnleashedoJi- À-% €”€€‚‚‚ÿSams : 01/1994 (940101)Trade - $39.95 incl. CD ROMI¥- À-²Ž-SBN: 0-672-30380-9I$¥-iÀ-% €H€°˜€‚ÿProgramming Windows NT with C & CnH À-×À-& €€€‚‚‚‚ÿAndrews, MarkMIS Press : 11/1993 (931101)$29.95ISBN: 1-55828-300-5=iÀ-Á-% €0€°˜€‚ÿOptimizing Windows NTlF×À-€Á-& €Œ€€‚‚‚‚ÿBlake, RussMicrosoft : 10/1993 (931001)$34.95ISBN: 1-55615-619-7<Á-¼Á-% €.€°˜€‚ÿWindows NT CompanionqK€Á--Â-& €–€€‚‚‚‚ÿBorland, RussellMicrosoft : 06/1993 (930601)$27.95ISBN: 1-55615-554-9kF¼Á-˜Â-% €Œ€°˜€‚ÿWindows NT Administration: Single Systems to Heterogeneous NetworkstN-Â- Ã-& €œ€€‚‚‚‚ÿBrain, MarshallPRENTICE HALL : 10/1993 (931001)$40.00ISBN: 0-13-176694-5a<˜Â-mÃ-% €x€°˜€‚ÿWindows NT Programming: An Introduction Using C Plus Plus–p Ã-Ä-& €à€€‚‚‚‚ÿBrain, Marshall; Campbell, KellyPRENTICE HALL : 01/1994 (940101)Trade - write for info.ISBN: 0-13-097833-7Z5mÃ-]Ä-% €j€°˜€‚ÿUsing Windows NT: The Essentials for Professionals–pÄ-óÄ-& €à€€‚‚‚‚ÿBrain, Marshall; Campbell, KellyPRENTICE HALL : 01/1994 (940101)Trade - write for info.ISBN: 0-13-091977-2I$]Ä-<Å-% €H€°˜€‚ÿMicrosoft Windows NT Step by SteptNóÄ-°Å-& €œ€€‚‚‚‚ÿCatapult Inc. StaffMicrosoft : 10/1993 (931001)$29.95ISBN: 1-55615-573-5R-<Å-Æ-% €Z€°˜€‚ÿWindows NT Client-Server Developer's GuiderL°Å-tÆ-& €˜€€‚‚‚‚ÿClark, JeffreySams : 08/1993 (930801)Trade - $39.95ISBN: 0-672-30302-7AÆ-µÆ-% €8€°˜€‚ÿLearn Windows NT In a Day~XtÆ-3Ç-& €°€€‚‚‚‚ÿColumbus, LouisPUBLISHER: Wordware Pub : 06/1993 (930601)$14.95ISBN: 1-55622-365-X?µÆ-rÇ-% €4€°˜€‚ÿOS/2 2.X vs. Windows NTi3Ç-È-& €Ò€€‚‚‚‚ÿComputer Technology Research Corp. StaffComputer Tech Res : 1994 (940101)$180.00ISBN: 1-56607-021-XtOrÇ-uÈ-% €ž€°˜€‚ÿMicrosoft Foundation Class Primer: Programming Windows & Windows NT with MFCqKÈ-æÈ-& €–€€‚‚‚‚ÿConger, JimWaite Group Pr : 03/1993 (930301)$29.95ISBN: 1-878739-31-XY4uÈ-?É-% €h€°˜€‚ÿDistributing Applications across DCE & Windows NT‘kæÈ-ÐÉ-& €Ö€€‚‚‚‚ÿDCE Staff; Rosenberry, Ward; Teague, JimO'Reilly & Assocs : 09/1993 (930901)$25.00ISBN: 1-56592-047-3I$?É-Ê-% €H€°˜€‚ÿPC Magazine Windows NT NetworkingpJÐÉ-‰Ê-& €”€€‚‚‚‚ÿDerfler, FrankZiff-Davis : 02/1993 (930201)$29.95ISBN: 1-56276-114-5`;Ê-éÊ-% €v€°˜€‚ÿNetwork Remote Procedure Calls: Windows NT, Windows, DOSoI‰Ê-XË-& €’€€‚‚‚‚ÿEddon, GuyPRENTICE HALL : 11/1993 (931101)$30.00ISBN: 0-13-100223-6K&éÊ-£Ë-% €L€°˜€‚ÿWindows NT 3.1 Graphics ProgrammingwQXË-Ì-& €¢€€‚‚‚‚ÿEzell, BenZiff-Davis : 07/1993 (930701)$34.95 incl. diskISBN: 1-56276-113-7;£Ë-UÌ-% €,€°˜€‚ÿHelp Windows NT 3.1mGÌ-ÂÌ-& €Ž€€‚‚‚‚ÿEzzell, BenZiff-Davis : 10/1993 (931001)$29.95ISBN: 1-56276-151-XBUÌ-Í-% €:€°˜€‚ÿWindows NT 3.1 ProgrammingxRÂÌ-|Í-& €¤€€‚‚‚‚ÿEzzell, BenZiff-Davis : 06/1993 (930601)$34.95 incl. diskISBN: 1-56276-112-9Y4Í-ÕÍ-% €h€°˜€‚ÿVoodoo Windows NT: Tips & Tricks with an AttitudenH|Í-CÎ-& €€€‚‚‚‚ÿFeldman, LenVentana Press : 1994 (940101)$24.95ISBN: 1-56604-069-8G"ÕÍ-ŠÎ-% €D€°˜€‚ÿWindows NT: The Next GenerationlFCÎ-öÎ-& €Œ€€‚‚‚‚ÿFeldman, LeonardSams : 03/1993 (930301)$22.95ISBN: 0-672-30298-5CŠÎ-9Ï-% €<€°˜€‚ÿWindows NT: Making the MovehBöÎ-¡Ï-& €„€€‚‚‚‚ÿForney, JimTAB Bks 02/1993 (930201)$24.95ISBN: 0-8306-4391-5G"9Ï- .% €D€°˜€‚ÿWindows NT: A Developer's Guide¡Ï- .²Ž-xR¡Ï-„.& €¤€€‚‚‚‚ÿGoodman, KevinM&T Bks : 09/1993 (930901)$39.95 incl. diskISBN: 1-55851-306-X> .Â.% €2€°˜€‚ÿWindows NT Answer Book‚\„.D.& €¸€€‚‚‚‚ÿGroves, James A.Microsoft : 04/1993 (930401)Trade - write for info.ISBN: 1-55615-562-XI$Â..% €H€°˜€‚ÿSeven Keys to Learning Windows NTwQD..& €¢€€‚‚‚‚ÿHoulette, ForrestNew Riders Pub : 06/1993 (930601)$12.95ISBN: 1-56205-156-3`;.d.% €v€°˜€‚ÿMigrating to Windows NT: The Insider's Integration GuidezT.Þ.& €¨€€‚‚‚‚ÿKennedy, Randall C.Brady Compu Bks : 09/1993 (930901)$26.95ISBN: 1-56686-103-9;d..% €,€°˜€‚ÿWindows NT in a DaypJÞ.‰.& €”€€‚‚‚‚ÿKnox, WeberWeber Systems : 01/1994 (940101)$27.95ISBN: 0-929704-25-8J%.Ó.% €J€°˜€‚ÿMoving into Windows NT ProgrammingtN‰.G.& €œ€€‚‚‚‚ÿLeavens, AlexSams : 05/1993 (930501)$39.95 incl. diskISBN: 0-672-30295-0>Ó.….% €2€°˜€‚ÿWindows NT Power ToolskEG.ð.& €Š€€‚‚‚‚ÿLeblond GroupBantam : 07/1993 (930701)$49.95ISBN: 0-553-37206-8>…...% €2€°˜€‚ÿWindows NT Power Tools‚\ð.°.& €¸€€‚‚‚‚ÿLeblond Group StaffRandom House : 07/1993 (930701)$50.00 incl. diskISBN: 0-679-79142-6L'..ü.% €N€°˜€‚ÿWindows NT Developers Treasure ChesttN°.p.& €œ€€‚‚‚‚ÿMcCord, JamesSams : 03/1993 (930301)$49.95 incl. diskISBN: 0-672-30294-2K&ü.».% €L€°˜€‚ÿMicrosoft Windows NT Resource GuidevPp.1.& € €€‚‚‚‚ÿMicrosoftMicrosoft : 08/1993 (930801)$49.95 incl. disksISBN: 1-55615-598-0O*».€.% €T€°˜€‚ÿMicrosoft Windows NT Messages Reference{U1.û.& €ª€€‚‚‚‚ÿMicrosoft Microsoft Press 09/1993 (930901)$39.95 incl. disksISBN: 1-55615-600-6I$€.D.% €H€°˜€‚ÿMicrosoft Windows NT TCP-IP GuideqKû.µ.& €–€€‚‚‚‚ÿMicrosoftMicrosoft Press : 07/1993 (930701)$19.95 ISBN: 1-55615-601-4I$D.þ.% €H€°˜€‚ÿMicrosoft Windows NT Resource Kit…_µ.ƒ .& €¾€€‚‚‚‚ÿMicrosoftMicrosoft Press 09/1993 (930901)$99.99 incl. 6 disks & CD-ROMISBN: 1-55615-602-2L'þ.Ï .% €N€°˜€‚ÿMicroSoft LAN Manager for Windows NTpJƒ .?
.& €”€€‚‚‚‚ÿMicroSoft StaffMicrosoft : 02/1993 (930201)$39.95ISBN: 1-55615-543-3N)Ï .
.% €R€°˜€‚ÿApplication Programming for Windows NT€Z?
.
.& €´€€‚‚‚‚ÿMurray, WilliamOsborne-McGraw : 05/1993 (930501)Text ed. - $39.95ISBN: 0-07-881933-4H#
.U .% €F€°˜€‚ÿMastering Windows NT ProgrammingvP
.Ë .& € €€‚‚‚‚ÿMyers, Brian; Hamer, EricSybex : 08/1993 (930801)$44.99ISBN: 0-7821-1264-1;U . .% €,€°˜€‚ÿUltimate Windows NTgË .“ .& €Î€€‚‚‚‚ÿNew Riders Development StaffNew Riders Pub : 01/1993 (930101)$39.95 incl. diskISBN: 1-56205-135-0K& .Þ .% €L€°˜€‚ÿCustomizing & Optimizing Windows NT–p“ .t
.& €à€€‚‚‚‚ÿPappas, Chris H.; Murray, William H.Addison-Wesley : 01/1993 (930101)Call for more infoISBN: 0-201-62624-1„_Þ .ø
.% €¾€°˜€‚ÿCross-Platform Power Tools: Application Development for the Macintosh, Windows, & Windows NTwQt
.o.& €¢€€‚‚‚‚ÿPetrucci, Steven J.Random House : 12/1993 (931201)$45.00ISBN: 0-679-79147-7Dø
.³.% €>€°˜€‚ÿWindows NT Instant ReferencemGo. .& €Ž€€‚‚‚‚ÿPowell, James E.Sybex : 09/1993 (930901)$12.95ISBN: 0-7821-1219-6<³.\.% €.€°˜€‚ÿMultitask Windows NT}W .Ù.& €®€€‚‚‚‚ÿPowell, JoelWaite Group Pr : 10/1993 (931001)$34.95 incl. diskISBN: 1-878739-57-3I$\..@.% €H€°˜€‚ÿUÙ..@.²Ž-sing Windows NT: Special Edition™sÙ.Ç@.& €æ€€‚‚‚‚ÿQue Development Group Staff; Columbus; Eidoson; Woeher; PersonQue : 05/1993 (930501)$29.95ISBN: 1-56529-101-8F!.@.
A.% €B€°˜€‚ÿTeach Yourself. . . Windows NThBÇ@.uA.& €„€€‚‚‚‚ÿRao, HyMIS Press : 07/1993 (930701)$21.95ISBN: 1-55828-269-6;
A.°A.% €,€°˜€‚ÿAdvanced Windows NTqKuA.!B.& €–€€‚‚‚‚ÿRichter, JeffreyMicrosoft : 10/1993 (931001)$39.95ISBN: 1-55615-567-0=°A.^B.% €0€°˜€‚ÿNetworking Windows NTkE!B.ÉB.& €Š€€‚‚‚‚ÿRuley, John D.Wiley : 11/1993 (931101)$27.95ISBN: 0-471-31072-7H#^B.C.% €F€°˜€‚ÿWindows NT: Programming HandbooksMÉB.„C.& €š€€‚‚‚‚ÿSchildt, HerbOsborne-McGraw : 04/1993 (930401)$29.95ISBN: 0-07-881873-72
C.¶C.% €€°˜€‚ÿWindows NTlF„C."D.& €Œ€€‚‚‚‚ÿSchwartz, KarlDDC Pub : 06/1993 (930601)$8.95ISBN: 1-56243-114-5?¶C.aD.% €4€°˜€‚ÿWindows NT Inside & OutrL"D.ÓD.& €˜€€‚‚‚‚ÿSheldon, TomOsborne-McGraw : 07/1993 (930701)$27.95ISBN: 0-07-881826-5<aD.E.% €.€°˜€‚ÿMastering Windows NTjDÓD.yE.& €ˆ€€‚‚‚‚ÿSimpson, AlanSybex : 05/1993 (930501)$29.99ISBN: 0-7821-1352-4L'E.ÅE.% €N€°˜€‚ÿMastering Windows NT Special EditionjDyE./F.& €ˆ€€‚‚‚‚ÿSimpson, AlanSybex : 01/1994 (940101)$29.99ISBN: 0-7821-1128-9BÅE.qF.% €:€°˜€‚ÿWindows NT Advanced ServeruO/F.æF.& €ž€€‚‚‚‚ÿSpencer, KennethPRENTICE HALL : 06/1994 (940601)$30.00ISBN: 0-13-107046-0E qF.+G.% €@€°˜€‚ÿPractical Guide to Windows NTˆbæF.³G.& €Ä€€‚‚‚‚ÿSpencer, Kenneth L.; Schoeniger, Eric-EditorCBM Bks : 1994 (940101)$25.00ISBN: 1-878956-39-6:+G.íG.% €*€°˜€‚ÿRunning Windows NToI³G.\H.& €’€€‚‚‚‚ÿStinson, CraigMicrosoft : 08/1993 (930801)$27.95ISBN: 1-55615-572-79íG.•H.% €(€°˜€‚ÿInside Windows NTtN\H. I.& €œ€€‚‚‚‚ÿStoddard StaffNew Riders Pub : 08/1993 (930801)$34.95ISBN: 1-56205-124-5rM•H.{I.% €š€°˜€‚ÿVan Wolverton's Guide to Windows NT: Easy Directions for Immediate ResultsqK I.ìI.& €–€€‚‚‚‚ÿVan WolvertonRandom House : 09/1993 (930901)$16.00ISBN: 0-685-66618-2]8{I.IJ.% €p€°˜€‚ÿWindows NT: Microsoft's New Operating System Strategy‚\ìI.ËJ.& €¸€€‚‚‚‚ÿVarhol, Peter D.Computer Tech Res : 02/1993 (930201)Trade - $190.00ISBN: 1-56607-007-4J%IJ.K.% €J€°˜€‚ÿWindows NT: The Complete ReferencerLËJ.‡K.& €˜€€‚‚‚‚ÿWyatt, AllenOsborne-McGraw : 06/1993 (930601)$29.95ISBN: 0-07-881832-X]8K.äK.% €p€°˜€‚ÿBorland C ++ 4.0 Programming for Windows & Windows NTpK‡K.TL.% €–€€‚‚‚ÿYao, PaulRandom House House: 01/1994 (940101)$34.00ISBN: 0-679-75146-71äK.…L.1†ÿÿÿÿÿÿÿÿÿÿÿÿ…L.ÚL.U3TL.ÚL." €f€€
ÿThere are no entries that begin with the letter I1…L. M.1†ÿÿÿÿÿÿÿÿÿÿÿÿ M.`M.U3ÚL.`M." €f€€
ÿThere are no entries that begin with the letter J1 M.‘M.1†ÿÿÿÿÿÿÿÿ ÿÿÿÿ‘M.æM.U3`M.æM." €f€€
ÿThere are no entries that begin with the letter O1‘M.N.1†ÿÿÿÿÿÿÿÿ
ÿÿÿÿN.lN.U3æM.lN." €f€€
ÿThere are no entries that begin with the letter T1N.N.1†ÿÿÿÿÿÿÿÿ ÿÿÿÿN.òN.U3lN.òN." €f€€
ÿThere are no entries that begin with the letter U1N.#O.1†ÿÿÿÿÿÿÿÿ ÿÿÿÿ#O.xO.U3òN.xO." €f€€
ÿThere are no entries that begin with the letter X1#O.©O.1†ÿÿÿÿÿÿÿÿ
ÿÿÿÿ©O. €.U3xO. €." €f€€
ÿThere are no entries that begin with the letter Z©O. €.xO.1©O.=€.1\ÿÿÿÿÿÿÿÿÿÿÿÿ=€.c€.& €.c€.# €€€‚ÿp?=€.Ӏ.1ÁÿÿÿÿÿÿÿÿӀ..®‡.Questions and Answers from Microsofts Executive Briefing CenterK&c€..% €L€°Œ€‚ÿQuestions and Answers on Windows NT ²Ӏ.*ƒ.Z ‚€e€˜˜€‚âì…(€
‰€ ‚âî…(€
‰€ ‚âð…(€
‰€ ‚âñ…(€
‰€ ‚ÿThese questions were compiled from customers visiting Microsofts Executive Briefing Center in 1993.What is the difference between Windows NT and Windows NT Advanced Server?If I run a 16-bit Windows-based application on Windows NT and it crashes, can I re-run it without restarting Windows NT?Can I use the Windows NT administration tools across the network?Does Windows NT Advanced Server support X.25 and ISDN?*­.T….} Ȁ[€˜˜âò…(€
‰€ ‚âó…(€
‰€ ‚âô…(€
‰€ ‚â®~΀
‰€ ‚âÓ~΀
‰€ ‚â§~΀
‰€ ‚â¨~΀
‰€ ‚ÿDoes Windows for NT support RPC (Remote Procedure Calls)?Does Windows NT support a MAC file server?How many 32-Bit applications currently ship for Windows NT?Can Windows NT use IPX instead of NETBEUI?When will there be production NetWare Connectivity for Windows NT?Can you log events to a different machine on an Windows NT-based system?How can server utilization be determined and maximized?ZÝ*ƒ.®‡.} Ȁ»€˜˜â©~΀
‰€ ‚â­~΀
‰€ ‚âÙ~΀
‰€ ‚âÐ~΀
‰€ ‚âÑ~΀
‰€ ‚âÒ~΀
‰€ ‚âÕ~΀
‰€ ‚ÿWhat is the maximum number of processor supported by Windows NT ?Does Windows NT come with NFS support?Does Windows NT support X applications?What are the recommended hardware resources for a Windows NT workstation?Is it true that some MS-DOS and Windows-based applications will not run on Windows NT?How compatible is Windows NT with DCE?When Will Windows NT incorporate a scripting language such as REXX, the Korn Shell or Hamilton C-Shell‚QT….0ˆ.1Ãÿÿÿÿÿÿÿÿÿÿÿÿ0ˆ.q‹.What is the difference between Windows NT and Windows NT Advanced Server - AnsweryO®‡.©ˆ.* $€ž€˜€€
€‚ÿ- What is the difference between Windows NT and Windows NT Advanced Server:0ˆ.ã‰.) €#€˜˜€€‚ÿAnswer: Microsoft® Windows NT Advanced Server is a superset of the Windows NT, operating system, and is designed to be the best solution for file, print, and application servers. Components included in Windows NT Advanced Server that are not part of Windows NT include:yP©ˆ.\Š.) "€ €PÈ:€
ƒ€‚ÿ·Advanced fault tolerance (disk mirroring, disk duplexing, RAID 5, and UPS)K"ã‰.§Š.) "€D€PÈ:€
ƒ€‚ÿ·Centralized user management ¢s\Š.I‹./ .€æ€€
ƒ€‚€
ƒ€‚ÿ·Enterprise directory and naming and replication services·Multi-user Remote Access Services for Macintosh®(§Š.q‹.% €€˜˜€‚ÿ“bI‹.Œ.1¤ÿÿÿÿÿÿÿÿÿÿÿÿŒ..If I run a 16-bit Windows application on NT and it crashes, can I re-run it without restarting NT?.þq‹.2Ž.0 .€ý€˜˜€
€‚€€‚ÿIf I run a 16-bit Windows-based application on Windows NT and it crashes, can I re-run it without restarting Windows NT?Answer: Yes - Because the Windows subsystem runs 16-bit applications in the same address space it is possible for one application to bring down the subsystem. However, the subsystem itself runs as a protected process separate from other subsystems or system components. One can shut down the Windows Subsystem and restart it. This should enable the user to restart their application.㽌..& €{€˜˜€‚ÿIn the next version of Windows NT, users can elect to run 16-bit Windows-based applications in their own virtual machine. This effectively isolates each 16-bit Windows-based application.k:2Ž.€.1éÿÿÿÿÿÿÿÿÿÿÿÿ€.»Á.$ # Are the Windows NT system tools remotely controllable?iD. À.% €ˆ€°Œ€
‚ÿCan I use the Windows NT administration tools across the network?€. À..¯y€.»Á.6 :€ó€˜˜€€‚ãïð[ñ€
‰€ ‚ÿAnswer: All Administration tools except Disk Manager can be used remotely to control remote networked-connected Windows NT-based workstations or servers -provided the individual has security access to that machine. The administration tools can even be used over dial-up connections initiated through Remote Access Services.More Information on Windows NT Administrationm< À.(Â.1Ìÿÿÿÿÿÿÿÿÿÿÿÿ(Â.‡Ã.Does Windows NT Advanced Server offer X.25 and ISDN support?d?»Á.ŒÂ.% €~€°Œ€
‚ÿDoes Windows NT Advanced Server offer X.25 and ISDN support?ûÅ(Â.‡Ã.6 :€‹€˜˜€€‚ã'Š3€
‰€ ‚ÿAnswer: Windows NT supports both ISDN and X.25 for network and host connectivity. Both can be utilized for Remote Access Services or SNA Server for Windows NT.More on Windows NT Networkingn=ŒÂ.õÃ.1áÿÿÿÿÿÿÿÿÿÿÿÿõÃ.hÅ.Does Windows for NT support RPC (Remote Procedure Calls)?qa_7a9‡Ã.VÄ.( €r€°Œ€
€‚ÿDoes Windows NT support RPC (Remote Procedure Calls) æõÃ.hÅ., &€Í€˜˜€€
€‚ÿAnswer: Yes. It is built in natively to Windows NT; It complies with the DCE (Distributed Computing Environment) specifications. The administration tools in Windows NT use RPC to derive system information from remote systems.[*VÄ.ÃÅ.1¿ÿÿÿÿÿÿÿÿÿÿÿÿÃÅ.'É.Does Windows NT support a MAC file server?R-hÅ.Æ.% €Z€°Œ€
‚ÿDoes Windows NT support a MAC file server?±…ÃÅ.ÆÈ., &€ €˜˜€€
€‚ÿAnswer: Windows NT Services for Macintosh (included with Windows NT Advanced Server) is a set of integrated tools facilitating better productivity and integration with Macintosh users. These include the AFP-compatible file server which allows Macintosh users to connect to a Windows NT-based server the same way they would connect to an AppleShare® server, a Print Server, and Print Monitor, which allows Macintosh users on the network to spool their print jobs to a Windows NT-based server. Finally, the services include a complete AppleTalk® Stack, providing seamless connectivity between Macintosh clients and Windows NT Advanced Serversa3Æ.'É.. ,€f€˜˜ãžz€
‰€ ‚ÿMore on Windows NT services for the Macintoshc2ÆÈ.ŠÉ.1pÿÿÿÿÿÿÿÿÿÿÿÿŠÉ.—Ê.How many applications are shipping for Windows NT?Z5'É.äÉ.% €j€°Œ€
‚ÿHow many applications are shipping for Windows NT?³{ŠÉ.—Ê.8 @€ö€˜˜€€
€‚ãôeaö€
‰€ ‚ÿAnswer: There are currently over 200 32-bit applications for Windows NT.32-Bit Application catalog for Windows NTW&äÉ.îÊ.1ÿÿÿÿÿÿÿÿÿÿÿÿîÊ.²Ì.Does Windows NT have an IPX transport?N)—Ê.<Ë.% €R€°Œ€
‚ÿDoes Windows NT have an IPX transport?v=îÊ.²Ì.9 @€{€˜˜€€
€‚ã®Ñ¡¼€
‰€ ‚ÿAnswer: Windows NT includes an IPX transport for both peer sharing and the ability to access NetWare servers for file and print sharing. redirectors for Windows NT-based client access to NetWare file and print services are available from both Novell and Microsoft.More on integrating Windows NT with NetWarek:<Ë.Í.1âÿÿÿÿÿÿÿÿÿÿÿÿÍ.”Î.Can you log events to a different machine on an NT system?jE²Ì.‡Í.% €Š€°Œ€
‚ÿCan you log events to a different machine on an Windows NT system?
ÔÍ.”Î.9 @€©€˜˜€€
€‚ãïð[ñ€
‰€‚ÿAnswer: Yes, since the Event Viewer can track remote machines, an administrator can track multiple Windows NT-based clients or servers and log system events.More Information on Windows NT Administrationh7‡Í.üÎ.1±ÿÿÿÿÿÿÿÿÿÿÿÿüÎ.S/How can server utilization be determined and maximized?_:”Î.[Ï.% €t€°Œ€
‚ÿHow can server utilization be determined and maximized?ì²üÎ.S/: B€e€˜˜€€
€‚‚ãïð[ñ€
‰€‚ÿAnswer: Using Performance Monitor one can graphically analyze over 200 system functions. You can then u[Ï.S/”Î.se the remote capabilities of the Windows NT administration tools to manually adjust the necessary system settings remotely.The Windows NT Resource Kit also provides a tool called PView. This examines individual processes and allows administrators to end a specific process.More Information on Windows NT Administrationf5[Ï.¹/1˜ÿÿÿÿÿÿÿÿÿÿÿÿ¹/ë/How many processors can Windows NT take advantage of?f;S//+ &€v€°Œ€
€€‚ÿHow many processors can Windows NT take advantage of? }R¹/œ/+ &€¤€˜˜€€
€‚ÿAnswer: Currently Windows NT Advanced Server can address up to 32 processors.O%/ë/* $€J€°ŒãèE€
‰ÿMore on Symmetric Multiprocessing_.œ/J/1gÿÿÿÿÿÿÿÿÿÿÿÿJ/R/Can I run X Windows applications on Windows NTW2ë/¡/% €d€°Œ€
‚ÿCan I run X Windows applications on Windows NT?±‚J/R// ,€€˜˜€€€€‚ÿAnswer: X Windows is a graphical distributed computing model developed at MIT. With X Windows, an application which runs on a server system is called the client, which sends commands over the network to display its results on the X Windows server. In many networks, dedicated hardware systems known as X Terminals provide the X display software and hardware to display remote X clients on a user's desk. Third parties are developing X Windows server solutions for Windows NT. This software will enable users to use Windows NT as a high-powered X server platform while retaining compatibility with Windows NT, Windows 3.1 and MS-DOS-based applications on the same system. Other third parties are developing X Windows client libraries for Windows NT, so developers can write X client applications on Windows NT which can be run and displayed remotely on systems providing X server capabilities.[*¡/­/1ÿÿÿÿÿÿÿÿÿÿÿÿ­/h /13. Does Windows NT come with NFS support?N)R/û/% €R€°Œ€
‚ÿDoes Windows NT come with NFS support?mD­/h /) €‰€˜˜€€‚ÿAnswer: Windows NT, with its built-in TCP/IP support, provides a great framework for NFS, although we have chosen not to offer NFS support in the product. Microsoft is cooperating with third parties to provide quality NFS clients and servers under Windows NT this year. Our open networking architecture makes it easier for third parties to bring existing NFS implementations to Windows NT. We support their efforts, and will communicate the availability and details of their products as they become available. Both SunSelect and FTP Software, leaders in PC-based NFS solutions, are committed to providing NFS solutions on Windows NT and have demonstrated initial technologies at several trade events. Other TCP/IP solution companies such as Frontier Technologies, Beame and Whiteside, and NetManage have announced similar solutions.~Mû/æ /1\ÿÿÿÿÿÿÿÿÿÿÿÿæ /Ä
/14. What are the recommended hardware resources for a Windows NT workstation?qLh /W /% €˜€°Œ€
‚ÿWhat are the recommended hardware resources for a Windows NT workstation?zRæ /Ñ /( €¤€˜˜€€‚ÿAnswer: To run Windows NT as a workstation Microsoft recommends the following:ËmW /œ
/^#Œ€Úÿf  €€˜˜€‚ÿ€.€˜˜‚ÿ €h€˜˜€O€‚ÿÿÿ486 25MHz or greater150 MB Hard drive 16 MB RAMRecommended: high resolution monitor and CD ROM Drive(Ñ /Ä
/% €€˜˜€‚ÿ‚Qœ
/F/1YÿÿÿÿÿÿÿÿÿÿÿÿF/¿@/15. Is it true that some DOS and Windows applications will not run on Windows NT?~YÄ
/Ä/% €²€°Œ€
‚ÿIs it true that some MS-DOS and Windows-based applications will not run on Windows NT?ïÆF/¿@/) €€˜˜€€‚ÿAnswer: Yes. In order to fully protect the operating system, Windows NT isolates application subsystem from the hardware. Any MS-DOS or Windows-based application that makes direct hardware calls will need some adaptation to run under Windows NT. Some of the more notable apÄ/¿@/Ä
/plications were 3270 emulation or FAX products that directly call hardware adapters. In many cases, the third party developers wrote Windows NT device drivers for the hardware. W&Ä/A/1œÿÿÿÿÿÿÿÿÿÿÿÿA/[C/How compatible is Windows NT with DCE?rN¿@/ˆA/$ €œ€Ā‚ÿHow compatible is Windows NT with DCE? What is your compatibility with DCE?Ó©A/[C/* "€S€˜˜€€‚‚ÿAnswer: Windows NT 3.1 includes RPC that is compatible with DCE. This is not a complete implementation of the DCE/RPC but it is fully interoperable with DCE/RPC and Windows NT has been demonstrated interoperating with RPC running under VMS as an example of the potential for heterogeneous connectivity.In future releases of Windows NT, support for DCE will be strengthened to include name services and kerberos security.vEˆA/ÑC/1ÿÿÿÿÿÿÿÿ ÿÿÿÿÑC/wF/9. When will there be production NetWare Connectivity for Windows NT?jE[C/;D/% €Š€°Œ€
‚ÿWhen will there be production NetWare Connectivity for Windows NT?<
ÑC/wF// ,€€˜˜€€€€‚ÿAnswer: Currently, both the Novell and Microsoft redirectors for Windows NT are in beta testing. Microsoft currently plans to ship the NetWare Workstation Compatible Services (NWCS) in May 1994. The prolonged beta test period is designed to address the vast number of environments and to ensure excellent bug-free delivery of the redirector. Novell is taking the same steps and announced a similar delivery time frame. Both redirectors are available on CompuServe. See Integrating Windows NT and Novell NetWare section.—f;D/G/1Cÿÿÿÿÿÿÿÿ!ÿÿÿÿG/ºJ/When Will Windows NT incorporate a scripting language such as REXX, the Korn Shell or Hamilton C-ShellŽiwF/œG/% €Ò€°Œ€
‚ÿWhen Will Windows NT incorporate a scripting language such as REXX, the Korn Shell or Hamilton C-ShellôG/ºJ/* "€é€˜˜€€‚‚ÿAnswer: The Windows NT operating system and shell are programatically exposed through the WIN32 API. While Windows NT, itself, does not include a scripting language Microsoft plans to introduce a 32-Bit version of Visual Basic which will be tightly integrated into the Windows NT operating system.Today, the Korn Shell the Hamilton C-Shell and REXX are all available for Windows NT. While preserving the expertise in these specific environments, they provide access to the system and its customization, configuration and administrative functions. These tools can be used to automate both end-user and administrative functions such as starting and running applications or configuring user accounts or compiling performance benchmarks of remote servers.Õ¤œG/K/1þÿÿÿÿ‹^"K/åK/²O/Integrating Windows NT and Novell NetWarePW(0,0,675,850,3,"MAIN");EB("btn_topic_index");SaveMark("topic_index"); CBB("btn_next_index", "PI(`nteval.hlp',`next_5')")V-ºJ/åK/) "€Z€°°˜€€-‚ÿIntegrating Windows NT and Novell NetWare™ZK/~N/? L€µ€°°˜€€ €€ €€ €€ €‚ÿThe Microsoft® Windows NT™ operating system can act as a client, a server, or both to an existing Novell® NetWare® environment. As a client, it allows developers or "power users" seamless access to NetWare file and print servers through an intuitive yet flexible interface. For current NetWare users, Windows NT Advanced Server provides the advanced performance and fault tolerance components necessary for mission-critical client server applications. Microsoft helps you get the most out of your existing investment in NetWare, while using or evaluating the advanced features of Windows NT.4äåK/²O/P n€É€˜˜ã/yB€
‰€‚ãâ*Qj€
‰€‚ã db€
‰‚â‚å†6‰€‚ÿUsing Windows NT-based Clients in a NetWare EnvironmentWindows NT Advanced Server as an Application ServerWindows NT Advanced Server in NetWare EnvironmentsGetting More Information about Windows NT and NetWareh7~N/&€/1`¦‡^¬_#&€/‹€/º„/Using Windows NT-based Client²O/&€/²O/s in a NetWare Environmente;²O/‹€/* $€v€˜ŒR˜€€‚ÿUsing Windows NT-based Clients in a NetWare EnvironmentÊ…&€/U‚/E X€ €°°˜€€ €€ €€ €€ €€ €‚ÿBecause networking is a fundamental part of the Windows NT operating system, access to department or enterprise resources such as file servers and printers is transparent. Consequently, the architecture of Windows NT allows users to connect to many different server resources such as Banyan® Vines®, IBM® LAN Server, Windows™ for Workgroups, and UNIX® servers simultaneously. pD‹€/Ń/, &€‰€°˜€€ €‚ÿThis transparency allows you to focus on information and problem-solving, rather than the underlying network operating system. It also means that as you evaluate Windows NT you can easily attach to NetWare servers, Map drives and access NetWare print queues as you would under the MS-DOS® or Windows™ operating systems.õ¨U‚/º„/M h€Q€˜˜€‚ãç!îR€
‰€‚ã¤\ö\€
‰€‚ã/L]ž€
‰€‚ÿFor Additional Information:The Novell NetWare Redirector for Windows NTThe Microsoft NetWare-Compatible Redirector for Windows NTNWLink for Windows NT],Ń/…/1³‹^®`$…/m…/ïŠ/The Novell NetWare Redirector for Windows NTV/º„/m…/' €^€˜ŒR˜€‚ÿThe Novell NetWare Redirector for Windows NTÓ¦…/@†/- (€M€˜˜˜€€ €‚ÿNovell currently supports a beta version of their redirector for Windows NT. Like similar requestors for MS-DOS, Windows and OS/2®, the client software supports:ð¢m…/0‡/N j€E€R˜·€:‚´€ƒ€
‚€ƒ€
‚€ƒ€
‚€ƒ€
‚€ƒ€
‚ÿ·Connectivity to NetWare servers·NetWare server drive maps·Use of NetWare file services·Access to NetWare print queues·Access to NetWare APIsT&@†/„‡/. ,€L€V˜˜·€:‚´€ƒ€
‚ÿ·Support for NDIS and ODI DriversH!0‡/̇/' €B€˜˜R˜€‚ÿSupport Specific to Windows NTË}„‡/—‰/N j€û€R˜·€:‚´€ƒ€
‚€ƒ€
‚€ƒ€
‚€ƒ€
‚€ƒ€
‚ÿ·Support for DEC Alpha and MIPs version of Windows NT·Username and password from MS Windows NT machine login may be used to authenticate to a NetWare server.·Uses the Windows NT Network Settings Control Panel installation interface.·Unlimited number of concurrent connections·Enables communication to future NetWare servers running on protocols other than IPX.V-̇/í‰/) "€Z€°˜˜€€‚ÿMore about the Novell Netware Redirector:¬—‰/ïŠ/V z€Y€˜˜ãü»*–€
‰€‚ãh/«¦€
‰€‚ã½?l‚€
‰€ ‚ãfä’E€
‰€‚ÿInstalling the NetWare Redirector for Windows NTAccessing NetWare ServicesSupported Network AdaptersLimitations in the current Novell NetWare Requestor_.í‰/N‹/1Îÿÿÿÿÿÿÿÿ%N‹/»‹/cÌ/Supported Network Cards for NetWare RedirectormAïŠ/»‹/, (€‚€˜˜˜€€
€‚ÿSupported Network Cards for NetWare Redirector as of 11/3/93p=N‹/+Œ/3#6€z†&€€°°˜€‚ÿÿÿODI drivers for the following network cards are supported:†4»‹/±Œ/R#t€hÈ&³ €€°°˜ÿ€€R€‚ÿ€6€R‚ÿÿÿ3Com EtherLink II (DIX)3Com EtherLink II (BNC)|9+Œ/-/C#V€rÈ&³ €€R€‚ÿ€:€R‚ÿÿÿ3Com EtherLink II/16 (DIX)3Com EtherLink II/16 (BNC)o,±Œ/œ/C#V€XÈ&³ €€R€‚ÿ€*€R‚ÿÿÿ3Com EtherLink III3Com EtherLink III TP]-/ù/C#V€4È&³ €€R€‚ÿ€€R‚ÿÿÿAMD AM2100AMD AM1500TŠGœ/ƒŽ/C#V€ŽÈ&³ €€R€‚ÿ€H€R‚ÿÿÿAnsel M1500 All-In-One-NetworkingAnsel M2100 All-In-One-Networkingbù/åŽ/C#V€>È&³ €€R€‚ÿ€*€R‚ÿÿÿMicrodyne EXOS 105HP J2405c ƒŽ/H/C#V€@È&³ €€R€‚ÿ€"€R‚ÿÿÿIBM Token RingNovell NE1000q.åŽ/¹/C#V€\È&³ €€R€‚ÿ€ €R‚ÿÿÿNovell NE2000Novell NE2000PLUS (I/O Mode)x5H/=À/C#V€jÈ&³ €€R€‚ÿ€L€R‚ÿÿÿNov¹/=À/ïŠ/ell NE2000PLUS (Shared RAM Mode)Novell NE2100d!¹/¡À/C#V€BÈ&³ €€R€‚ÿ€"€R‚ÿÿÿNovell NE1500TNovell NTR2000x5=À/Á/C#V€jÈ&³ €€R€‚ÿ€6€R‚ÿÿÿProteon p1391 RapiDriverProteon p1392 RapiDriverk(¡À/„Á/C#V€PÈ&³ €€R€‚ÿ€(€R‚ÿÿÿPure Data PDI8023Pure Data PDI8023Tq.Á/õÁ/C#V€\È&³ €€R€‚ÿ€.€R‚ÿÿÿPure Data PDI8023-16Pure Data PDI8023T-16y6„Á/nÂ/C#V€lÈ&³ €€R€‚ÿ€6€R‚ÿÿÿPure Data PDI8023PLUS-16Pure Data PDI8023TPLUS-16f#õÁ/ÔÂ/C#V€FÈ&³ €€R€‚ÿ€$€R‚ÿÿÿSMC (WD) 8003EPSMC (WD) 8003WCi&nÂ/=Ã/C#V€LÈ&³ €€R€‚ÿ€(€R‚ÿÿÿSMC Elite 8013EWCSMC Elite 8013WCi&ÔÂ/¦Ã/C#V€LÈ&³ €€R€‚ÿ€(€R‚ÿÿÿSMC Elite 8013EPCSMC Elite 8013EWg$=Ã/
Ä/C#V€HÈ&³ €€R€‚ÿ€&€R‚ÿÿÿSMC Elite 8013EPSMC Elite 8013Wq.¦Ã/~Ä/C#V€\È&³ €€R€‚ÿ€.€R‚ÿÿÿSMC Elite Ultra 8216SMC Elite Ultra 8216Cj'
Ä/èÄ/C#V€NÈ&³ €€R€‚ÿ€0€R‚ÿÿÿSMC Elite Ultra 8216TWearnes 2110T]~Ä/EÅ/C#V€4È&³ €€R€‚ÿ€ €R‚ÿÿÿWearnes 2107CWD 8003E[èÄ/ Å/C#V€0È&³ €€R€‚ÿ€€R‚ÿÿÿWD 8003EBTWD 8003WTYEÅ/ùÅ/C#V€,È&³ €€R€‚ÿ€€R‚ÿÿÿWD 8003WWD 8003EBR Å/KÆ/C#V€È&³ €€R€‚ÿ€€R‚ÿÿÿWD 8013EBT(ùÅ/sÆ/% €€R˜€‚ÿX!KÆ/ËÆ/7#>€B†&$€€R˜€€‚‚‚ÿÿÿMicro Channel Architecture:‚1sÆ/MÇ/Q#r€bÈ&³ €€R˜ÿ€€R€‚ÿ€0€R‚ÿÿÿ3Com EtherLink 16 MC3Com EtherLink 16 MC TPu2ËÆ/ÂÇ/C#V€dÈ&³ €€R€‚ÿ€0€R‚ÿÿÿ3Com EtherLink III MC3Com EtherLink III MC TPf#MÇ/(È/C#V€FÈ&³ €€R€‚ÿ€(€R‚ÿÿÿIBM Token Ring MCNovell NE2 MC~;ÂÇ/¦È/C#V€vÈ&³ €€R€‚ÿ€&€R‚ÿÿÿNovell NE2_32 MCProteon p1892 RapiDriver Token-Ring MCs0(È/É/C#V€`È&³ €€R€‚ÿ€6€R‚ÿÿÿPure Data PDuC8023-16 MCSMC (WD) 8003E/A MCj'¦È/ƒÉ/C#V€NÈ&³ €€R€‚ÿ€,€R‚ÿÿÿSMC (WD) 8003W/A MCSMC 8013EP/A MCWÉ/ÚÉ/C#V€(È&³ €€R€‚ÿ€$€R‚ÿÿÿSMC 8013WP/A MCM ƒÉ/'Ê/B#T€†&€€Rÿ €€R€€
‚‚ÿÿÿEISA ?ÚÉ/¶Ê/P#p€~È&³ €€Rÿ€€R€‚ÿ€>€R‚ÿÿÿODI 3Com EtherLink III EISAODI 3Com EtherLink III EISA TPy6'Ê//Ë/C#V€lÈ&³ €€R€‚ÿ€<€R‚ÿÿÿODI DEC FDDIcontroller/EISAODI Novell NE3200 EISAM¶Ê/¿Ë/C#V€šÈ&³ €€R€‚ÿ€>€R‚ÿÿÿODI Novell NF32000 FDDI EISAODI Proteon p199X RapiDriver Token-Ring EISA€=/Ë/?Ì/C#V€zÈ&³ €€R€‚ÿ€@€R‚ÿÿÿODI INTEL EtherExpress32 EISAODI Microdyne EXOS235T EISA$¿Ë/cÌ/" €€€ ÿd3?Ì/ÇÌ/1£®`8`&ÇÌ/$Í/ð0Limitations in the Current Novell NetWare Requester]6cÌ/$Í/' €l€˜˜R˜€‚ÿLimitations in the Current Novell NetWare Requester åÇÌ//Î/& €Ë€R˜€‚ÿAs of this writing (November 3 release of NetWare Requester), the NetWare Requester available on CompuServe fixes a number of problems in previous releases. However, there are still some limitations in this release including:í$Í/JÏ/. *€Û€R˜Ÿ€:‚¢€
ƒ€‚ÿ·The NetWare Requester cannot map a drive letter to a NetWare volume and then reshare it to other clients on the network. This makes it virtually impossible to use a Windows NT-based machine as gateway to a group of NetWare servers.˜^/Î/î0: B€½€V˜˜Ÿ€:‚¢€
ƒ€‚€
ƒ€€
‚ÿ·The NetWare Requester is not able to redirect print queues from a Windows NT-based machine shared by others to existing JÏ/î0cÌ/print servers on NetWare.·This version of the NetWare Client does not include support for MS-DOS-based applications which use NetWare APIs, such as SYSCON, MAP, FILER, etc. This support will be added in future versions.”nJÏ/‚0& €Ü€˜°˜€‚ÿWhile NWCS has some limitations in its support of NetWare APIs, it will support all of the above functions.n@î0ð0. ,€€€R˜ã¤\ö\€
‰€‚ÿThe Microsoft NetWare-Compatible Redirector for Windows NTa0‚0Q01u¬_}„_'Q0«0ï0Installing the NetWare Redirector for Windows NTZ3ð0«0' €f€˜ŒR˜€‚ÿInstalling the NetWare Redirector for Windows NTƟQ0q0' €?€°°˜€‚ÿBefore you can proceed, you must download the software from CompuServe onto your machine running Windows NT, putting it either on a disk or in a directory. D«0µ0, &€1€°˜€€ €‚ÿIncluded with the software that you will download from CompuServe® is a NWTI.TXT file. If you follow its instructions, you should encounter no problems installing the products. Unlike previous versions, you are not required to make registry changes, and many bugs were fixed.Q*q00' €T€ČR˜€‚ÿHow to Download the Redirector Software1 µ070& €€°˜€‚ÿGo to NOVFILES and select the client kits. Under this you will find the option to download the Windows NT-based client software. You will be downloading one large file, named NWTI.EXE. Executing this file will expose a variety of files needed for the installation.80o0' €"€ČR˜€‚ÿPassword Hints€Z70ï0& €µ€°˜€‚ÿWe strongly suggest that you use the same word for your username and password on Windows NT as it exists in NetWare. By doing this you will be able to log into Windows NT and then connect to a NetWare server, without further validation from NetWare. Windows NT will pass through your user name and password when requesting connection services.U$o0D01A}„_ `(D0ˆ0˜ 0Netware - Accessing NetWare ServicesDï0ˆ0' €:€˜ŒR˜€‚ÿAccessing NetWare Services„^D0 0& €¼€°°˜€‚ÿNetWare Services are available through the Control Panel, Print Manager, and File Manager. Œeˆ0˜ 0' €Ë€°˜€‚‚ÿThe NetWare icon in the Control Panel lists your connections, username, and connection ID. You can add network connections by selecting "NetWare" from the Control Panel and hitting "Insert." Type in Username, Password, and Server, then choose "Login." To delete a network connection, simply select the connection and hit "Delete." That connection will be logged out.Redirection of a local printer port to a NetWare print queue is now supported. The NetWare Requester allows you to print directly to NetWare print queues or redirect from the command line. To print to a NetWare queue, choose "Print Manager" from the "Main" window. Then from the "Printer" menu, choose "Connect Printer." Browse the NetWare servers for the queue to which you wish to print. The redirector now allows you to drag and drop documents from the file manager directly to the NetWare queue.p? 0
01ó8`b)
0g
0bD0Netware - Netware Workstation Compatible Service for Windows NT_8˜ 0g
0' €p€˜ŒR˜€‚ÿNetWare Workstation Compatible Service for Windows NTìÅ
0S0' €‹€°°˜€‚ÿThe NetWare Workstation Compatible Service (NWCS) for Windows NT is Microsoft's solution for allowing Windows NT-based workstations to access files, directories, and printers on NetWare servers.ág
0f02 2€Ã€°˜€€€€€‚ÿAfter NWCS is installed, the service can be configured, or it can be used immediately for accessing the files, directories and print queues that reside on NetWare 2.x, 3.x and 4.0 (with bindery emulation) file servers.qS0A0, &€ã€˜˜â…Wj¾€‰‚ÿNWCS is a fully native implementation of a NetWare-compatible redirector for Windows NT. It is implemented f0A0˜ 0as a 32-bit service, taking full advantage of the advanced communications architecture of Windows NT. As a native, Windows NT-based networking application, it provides a well-integrated and seamless extension of the Windows NT native networking environment.¶f0C0L f€m€˜‚ó€âáe’b€
‰€â¤E÷
€
‰€âäm_€
‰€‚ÿIn addition to supporting an unlimited number of connections, NWCS also supports an auto-reconnect feature, which remembers previously-established connections for you. Like the default Windows NT Redirector, NWCS is implemented as a file system driver, giving it access to other file system drivers such as FAT and NTFS. NWCS takes advantage of several file-system services offered by Windows NT, such as cache management. QA0bD0K d€
€°˜€âÒþŸ€
‰€â÷…Ø÷€
‰€‚ã¬z‡€
‰€ ‚ÿNWCS communicates with transport protocols through TDI. It also supports both IPX and SPX II protocols, which use the Open Driver Interface (ODI). The Windows NT default protocols, including TCP/IP, NBF, and DLC, use NDIS.How to Get the NWCS BetaKC0­D01Áÿÿÿÿÿÿÿÿ*ÿÿÿÿ­D0#E0Netware - Diagramatic Viewv>bD0#E08 @€~€°˜€†"€€‚€€‚ÿNetWare Compatible Service for Windows NT ArchitectureA­D0dE01Lÿÿÿÿÿÿÿÿ+ÿÿÿÿdE0oF0cache management;#E0ŸE0' €(€ČR˜€‚ÿCache Management ЪdE0oF0& €U€°˜€‚ÿhelps increase the performance of your system by reading ahead during sequential file access and buffering multiple operations to reduce the amount of network traffic.n=ŸE0ÝF01Ublˆ`,ÝF0AG0eL0Netware - Windows NT Advanced Server as an Application Serverd>oF0AG0& €|€˜˜˜€‚ÿWhy Use Windows NT Advanced Server as an Application ServeráÝF0IH0' €Ã€°°˜€‚ÿWindows NT Advanced Server is a high-end operating system that offers the advanced features that MIS managers, software developers, and systems integrators have come to expect on platforms designed for business solutions. R%AG0›K0- (€K€˜˜€€ €‚‚ÿWindows NT Advanced Server includes all of the networking capabilities found in network operating systems such as NetWare, without actually being a network operating system. Instead, it is a high-end server operating system with built-in networking, designed to provide the best features of UNIX, VMS®, and other high-end operating systems in a package that is consistent and compatible across a variety of hardware implementations.Novell NetWare includes support for server-based applications, called NetWare Loadable Modules (NLMs), but the NLM-running environment is based on the functions that Novell used to build its file and print server product. Consequently, while Novell NetWare is well designed for file and print services, its architecture is not optimal for running server applications.d6IH0ÿK0. ,€l€˜˜ãßì1€
‰€‚ÿNetWare Has Limitations as an Application Serverf9›K0eL0- *€r€˜ã—t`L€
‰€‚ÿThe Advanced Features of Windows NT Advanced Serverb1ÿK0ÇL01r¹ƒ`a-ÇL0!M0Հ0NetWare Has Limitations as an Applications ServerZ3eL0!M0' €f€˜ŒR˜€‚ÿNetWare Has Limitations as an Application ServeruOÇL0–M0& €ž€°°˜€‚ÿNetWare's limitations as an application server stem from these shortcomings:Ö¤!M0lN02 2€I€R˜Ù€†Øð9€
ƒ‚ƒ‚ƒ‚ÿ1.NetWare does not scale beyond single CPU Intel based systems.2.NetWare does not provide preemptive multitasking.3.NetWare does not provide virtual memory.•g–M0O0. ,€Î€V˜°Ù€†Øð9€
ƒ‚ÿ4.NetWare provides only limited memory protection in NetWare 4.0 and no protection in NetWare 3.11.È¢lN0Հ0& €E€°˜€‚ÿBusiness solutions based on the client-server model require these features, which are standard on most advanced operating systems designed to support mini-computers and mainframes. However, Novell's focus with NetWarO0Հ0eL0e is on the network, not on the operating system. Like other network operating systems, NetWare is effective at adding networking capabilities to operating systems that do not include these services.n=O0C01,lˆ`Ia.C0 0›†0Netware - The Advanced Features of Windows NT Advanced Server]6Հ0 0' €l€˜ŒR˜€‚ÿThe Advanced Features of Windows NT Advanced Serverc=C0‚0& €z€°°˜€‚ÿWindows NT Advanced Server offers these advanced features:µ 0„0a €k€R˜Ù€†Øð9€
€ƒ€
€‚€
€ƒ€
€‚€
€ƒ€
€‚€
€ƒ€
€‚ÿ1.Preemptive multitasking, to provide the responsiveness required to support multiple applications and multiple users on a single server2.Multithreading, to facilitate the design and development of complex applications3.Symmetric multiprocessing, to build solutions that benefit from scalable power effectively without limits4.Portability to RISC-based systems, which gives you a choice of hardware architectures‚!‚0›†0a €C€R˜Ù€†Øð9€
€ƒ€
€‚€
€ƒ€
€‚€
€ƒ€
€‚€
€ƒ€
€‚ÿ5.Advanced fault tolerance, to provide the data integrity required for important business information6.Virtual memory with protection, so that multiple applications can run on a server without corrupting each other or the system7.Distributed inter-process communications mechanisms, which enable client-server applications to be written easily and independently of the underlying network8.Security model, which provides full discretionary access so that business data can be accessed by the right people in the right wayd3„0ÿ†01wa7a/ÿ†0Z‡0 Š0Windows NT Advanced Servers in NetWare Environments[5›†0Z‡0& €j€˜Œ˜€‚ÿWindows NT Advanced Server in NetWare EnvironmentsðÃÿ†0Jˆ0- (€‡€°°˜€€
€‚ÿTo facilitate the integration of Windows NT Advanced Server with existing NetWare clients, Microsoft has included its own transport fully compatible with the IPX/SPX transport called NWLink.áZ‡0]Š02 2€Ã€°˜€€P€€ €‚ÿWith NWLink, your clients that are in a NetWare LAN environment can have easy access to the Windows NT Advanced Servers and the server applications running on them, without any additional software. You can also access Windows NT Advanced Servers client systems running MS-DOS, Microsoft Windows, Microsoft WindowsTM for Workgroups, Windows NT, OS/2, and Macintosh® systems. Access to the Windows NT Advanced Server does not conflict with access to Novell NetWare in any way.CJˆ0 Š0. ,€*€°˜ã/L]ž€
‰€‚ÿMore on NW LinkF]Š0æŠ01¥Ia…†a0æŠ0%‹0™Ž0NWLink for Windows NT? Š0%‹0' €0€˜ŒR˜€‚ÿNWLink for Windows NTwQæŠ0œŒ0& €£€°˜€‚ÿThe NetWare Link (NWLink) is compatible with IPX, SPX, and NetBIOS, which are used in Novell NetWare networks. NWLink provides communication between a Windows NT-based computer and either another Windows NT-based computer, or a NetWare workstation. Two networking Application Programming Interfaces (APIs) are supported to allow this:T%‹0ðŒ0; F€2€R˜ñ€„ð9€€ƒãÕµnï€
‰€‚ÿ·Windows SocketsMœŒ0=0< H€"€V˜˜ñ€„ð9€€ƒãQ"{Ž€
‰€‚ÿ·NetBIOS\ðŒ0™Ž0J b€%€°˜€⌀om€
‰€âÒþŸ€
‰€â÷…Ø÷€
‰€‚ÿSimilar to the Windows NT TCP/IP implementation, NWLink is a STREAMS-based protocol. Because the STREAMS environment on Windows NT supports TDI at the top, and NDIS on the bottom, NWLink can seamlessly coexist with other protocols on the same network adapter.>
=0׎01/ÿÿÿÿÿÿÿÿ1ÿÿÿÿ׎0 À0Netware - TDI-™Ž00' € €ČR˜€‚ÿTDIĞ׎0 À0& €=€°˜€‚ÿTransport Driver Interface: a 32-bit interface to which Windows NT transports adhere, to isolate networking applications from the specifics of a transport.0 À0™Ž0?0KÀ01xÿÿÿÿÿÿÿÿ2ÿÿÿÿKÀ0Á0Netware - NDIS. À0yÀ0' €€ČR˜€‚ÿNDISàKÀ0Á0& €Á€°˜€‚ÿNetwork Driver Interface Specification: a standard interface that network adapter drivers and transports follow to isolate each other from the specifics of the card or the transport. NDIS 3.0 is implemented on Windows NT.8yÀ0·Á01{ÿÿÿÿÿÿÿÿ3ÿÿÿÿ·Á0úÂ0STREAMS1
Á0èÁ0' €€ČR˜€‚ÿSTREAMSì·Á0úÂ0& €Ù€°˜€‚ÿA protocol interface and environment, originally developed for UNIX systems, that standardizes communication with adjacent software layers. By implementing STREAMS within Windows NT, transports can be easily ported from UNIX systems.BèÁ0<Ã01 ÿÿÿÿÿÿÿÿ4<Ã0mÃ0ÜÈ0Netware - NetBIOS1
úÂ0mÃ0' €€˜ŒR˜€‚ÿNetBIOS„]<Ã0ñÄ0' €»€°°˜€‚ÿThe NetBIOS support can be used to send and receive NetBIOS packets either between a NetWare workstation and a computer running Windows NT, or between two Windows NT-based computers. You will see a significant performance gain in cases where all computers are Windows NT-based computers, because of Microsoft enhancements to the NetBIOS protocol.=mÃ0.Æ0& €/€˜˜€‚ÿThe Microsoft-enhanced NetBIOS protocol not only conforms to the standard single request/reply implementation, but also uses to its advantage the knowledge that it is conversing with another computer that understands the enhancements. The enhancements increase efficiency by: žpñÄ0ÌÆ0. ,€à€Pñ€„ð9€€ƒ‚ÿ·Allowing the sender to send multiple NetBIOS packets before receiving an acknowledgment (a sliding window)n>.Æ0:Ç00 0€|€V˜°ñ€„ð9€€ƒ‚ÿ·Supporting the "piggybacking" of NetBIOS acknowledgments¢|ÌÆ0ÜÈ0& €ù€°˜€‚ÿNetBIOS acknowledgments are sent by the receiver after receiving the last packet of a NetBIOS message, and "piggybacking" of acknowledgments saves network bandwidth and processing time on the computers, since a separate acknowledgment frame does not need to be processed and sent. This is especially noticeable during times of heavy two-way traffic between sender and receiver.J:Ç0&É01¯7aÿÿÿÿ5&É0_É0ÝË0Netware - Windows Sockets9ÜÈ0_É0' €$€˜ŒR˜€‚ÿWindows Sockets]&É0ïÊ03 4€»€°°˜€âüuo¢€
‰€‚ÿThe Windows Sockets interface is ideal for supporting existing NetWare applications written to comply with the NetWare IPX/SPX Sockets interface. The Windows NT-based computer acts as an application server responding to the IPX or SPX packets, which are sent to or received from workstations running MS-DOS, Windows, or OS/2 NetWare. Example îÂ_É0ÝË0, &€…€°˜€€ €‚ÿExamples of programming, using the Windows Sockets interface for sending and receiving IPX and or SPX packets through NWLink, are available through the Win32® Software Developers Kit (SDK).BïÊ0Ì01Åÿÿÿÿÿÿÿÿ6ÿÿÿÿÌ0¢Í0Netware - Example1
ÝË0PÌ0' €€ČR˜€‚ÿExampleR,Ì0¢Í0& €Y€R˜€‚ÿSQL Server running on Windows NT takes advantage of the Windows Sockets interface to SPX, to allow existing NetWare SQL Server clients using the NetWare Redirector and IPX transport supplied by Novell, to communicate with the server that is listening to requests via the Windows Sockets interface.i8PÌ0 Î01@ÿÿÿÿÿÿÿÿ7ÿÿÿÿ Î0F1How to Get More Information about Windows NT and NetWarea;¢Í0lÎ0& €v€˜˜˜€‚ÿHow to Get More Information about Windows NT and NetWare‘j Î0ýÎ0' €Ô€˜˜R˜€‚ÿThere are several locations for the latest information on Windows NT/NetWare Integration. They include:«AlÎ0¨Ï0j#¤€‚œ €€˜˜R€
‚ÿ€@€˜˜Rÿ€B€˜˜R˜€‚ÿ€~€˜˜R‚ÿÿÿThe Windows NT Resource GuideVolume 1 Chapters 16 and 20hýÎ01N#j€5œ "€€˜˜R€
€‚ÿ€€˜˜R€
‚ÿÿÿCompuServ¨Ï01¢Í0e:Go to NOVFILES and select the client kits. Under this you will find the option to download the Windows NT-based client software. You will be downloading one large file, named NWTI.EXE. Executing this file will expose a variety of files needed for the installation.*¨Ï0F1' €€˜˜R˜€‚ÿI111Š `¹ƒ`81Ñ1*
1How to Get the NWCS BetaBF1Ñ1' €6€˜˜R˜€‚ÿHow to Get the NWCS BetaðÁ1Á1/ ,€ƒ€˜˜R˜€‚€€‚ÿYou must first install the Microsoft Windows NT and Windows NT Advanced Server Service Pack 1 before installing the Microsoft NetWare Workstation Compatible Service software. You may obtain the U.S. Version of Service Pack 1 electronically from the following locations.Internet: FTP to ftp.microsoft.com. Login as Anonymous and please use your email address as your password. Service Pack 1 can be found in \advsys\winnt\sup-ed\fixes\ussp1.vKÑ171+ $€—€R˜€€‚‚‚ÿCompuServe: Connect via Compuserve and go to the WINNT Forum (see "CompuServe Support" details below) where Service Pack 1 can be found.You may also obtain the Microsoft Windows NT and Windows NT Advanced Server (U.S. Version) Service Pack 1 (update to build 528: CSD002) in the United States, by calling Microsoft Sales and Service at (800) 426-9400. The Service Pack is available for $14.95 including shipping and handling. In Canada, please call (800) 563-9048. Outside the United States and Canada, please contact your local Microsoft Subsidiary. If you are utilizing a localized installation of Windows NT or Windows NT Advanced Server, your system will require a localized version of Service Pack 1. Please contact your local Microsoft Subsidiary for additional information concerning localized versions of the Service Pack.óÊÁ1*
1) €•€R˜€‚‚‚‚ÿInstalling Service Pack 1 is quickly and easily accomplished and will maintain previous system settings and user groups. Simply insert Disk 1 and at the Windows NT command prompt, execute UPDATE.EXE from the floppy disk. The Setup program will be invoked to guide you through the update procedure, prompting for each disk until the update is complete. This entire process will take approximately 5 minutes.If you require a CD-ROM update for MIPS systems, please contact Microsoft Sales and Service as specified above. DEC Alpha AXP systems do not require this update and should already be running the Alpha AXP retail release. Please note README.TXT on Disk 1 of Service Pack 1 for further information.Ŕ71ï
11àÿÿÿÿ‰e9ï
1L 1 @1Extending and Enhancing Mainframe DBMS to the LANEB("btn_topic_index");SaveMark("topic_index"); CBB("btn_next_index", "PI(`nteval.hlp',`next_10')")]5*
1L 1( €j€°Œ€€‚ÿExtending and Enhancing Mainframe DBMS to the LAN—`ï

17 <€Á€˜€€ €€ €€ €‚ÿWhile Windows NT™ provides excellent connectivity to mainframe applications, it also facilitates better cooperative processing between mainframe databases and the desktop. Through ODBC or Open Database Connectivity, Windows NT allows DBAs on the LAN to more easily access and manipulate mainframe data and provides integration with Windows™ or Windows NT based-applications. This section outlines the various methods of integrating Windows desktops with host DBMS. It highlights both Microsoft® Windows NT as a communications and databse gateway as well as the use of ODBC to integrate applications.¦L 1 @1r ²€M€˜ã:Ì€
‰€‚ã;Ì€
‰€‚ãM߀
‰‚ãM߉‚ãM߉‚ãM߉‚ãW+Jr‰‚ãX+Jr‰‚ãØ¦×‰€‚ÿClient Server Architecture for Distributed Database ApplicationsApproaches to Database ConnectivityExtending Decision Support and ad-hoc Query to the DesktopOn-line Transaction Processing from Desktop to HostUsing Windows NT as a Communications and Database GatewayEmpowering Decision Makers Through Client Server ImplementationsODBC Drivers ODBC Drivers that Support DB2ODBC Driver Toolsã
1 @1*
1d3ã
1p@11Eÿÿÿÿÿÿÿÿ:ÿÿÿÿp@1QD1The Gateway Component of Host Database Connectivity[6 @1Ë@1% €l€˜˜€
‚ÿThe Gateway Component of Host Database Connectivity†Vp@1QD10 .€¯€˜€†"€‚‚‚ÿThe diagram above represents two methods of host integration. In the first scenario, the gateway or ODBC driver communicates via APPC to CICS transaction program. The SQL translation occurs on the client and the request is issued by the CICS transaction program. If the requirements include making queries that return very large result sets, or if there is a need to invoke stored procedures this method provides a high degree of reliability and flexibility.The second part of the diagram illustrates the connectivity where the host contains IBMs DRDA. DRDA facilitates the retrieval and integration from a variety of IBM relational data sources. While this solution does not provide the high degree of flexibility as the former method, it does not require the customer to purchase additional host code if they have DB2/MVS ver 2.3, DB2/VM ver 3.3.k:Ë@1¼D11o fƊb;ÿÿÿÿ¼D1ÀM1Extending decision support and ad-hoc query to the desktopb=QD1E1% €z€˜˜€
‚ÿExtending Decision Support and ad-hoc Query to the Desktop/ñ¼D1MH1> J€ã€˜€‚€ €€ €€ €€ €‚ÿAs connectivity and integration of host and LAN-based RDBMS improves, customers benefit in terms of costs and flexibility. By distributing host data to LAN RDBMS organizations can increase response time, reduce expensive network traffic and provide decision-makers with a greater variety of information. The diagram below shows how users can read, write and query LAN-based RDBMS during the day, reconciling tables with respective hosts at night.Additionally, by using ODBC, developers can easily integrate database sources into both desktop applications like Microsoft® Excel and Lotus® 1-2-3, as well as high level development tools like Microsoft® Visual Basic®. It also improves IS department responsiveness by reducing development time.1E1~H1- *€
€°€†"€‚ÿæÁMH1dK1% €ƒ€˜€‚ÿThe client can use any application which supports ODBC to communicate either with a LAN RDBMS or mainframe database. The database gateway interprets the request or command and sends it to the host. The gateway approach to receiving host data is especially effective if there is a lot of information to be moved to the LAN. Most database gateways provide advanced functions such as the ability to run remote stored procedures on the host. A user may request some information that is stored in several sources. By using the gateway, a SQL request may be initiated against a DB2 host, and then a remote stored procedure is launched against a non-relational source such as IMS or a proprietary application.Ú~H1jL1, &€µ€˜€‚€€
‚ÿMany companies use database gateways both to access host data in real time and to move some subset of the database down to a local level for decision support.For More information on Host DBMS integration contact:j'dK1ÔL1C#V€Në¿ €€˜€‚ÿ€.€˜‚ÿÿÿInformation Builders(800) 969 INFOg$jL1;M1C#V€Hë¿ €€˜€‚ÿ€(€˜‚ÿÿÿMicroDecisionware(303) 443-2706aÔL1œM1C#V€<ë¿ €€˜€‚ÿ€€˜‚ÿÿÿXDB Systems(301) 317-6800$;M1ÀM1" €€€ÿd3œM1$N11ùƒb…d<$N1N1¯†1On-Line Transaction Processing from Desktop to Host[6ÀM1N1% €l€°Œ€‚ÿOn-Line Transaction Processing from Desktop to Host’m$N11% €Û€˜€‚ÿOften, there is a need for direct host database access with real-time data. Reservation systems, for example, need to read and write against the latest table information. Until recently, there were few effective methods of directly accessing DB2 data from the desktop. However, through the use of ODBC, any application can now incorporate live DB2N11ÀM1 information from Windows or Windows NT desktops. The diagram below illustrates a powerful implementation of an ODBC driver that incorporates both APPC communications and SQL translation at the desktop so the PC can communicate directly with DB2 using IBMs DRDA protocol.1N1N1- *€
€˜€†"€‚ÿ|V1ʃ1& €­€˜€‚‚ÿObviously, the direct connection method is more viable in less transaction intensive scenarios, or where the economies of scale derived from a gateway implementation would not be recouped from a small number of workstations. Examples include travel agencies or branch offices that need real-time access at minimal resource costs.Wall Data, a leading mainframe connectivity ISV provides an ODBC driver, APPC engine and DRDA Application Requester in a single package. This solution requires no additional host code other than that supplied by IBM for DB2/MVS ver 2.3, DB2/VM ver 3.3 or OS400 2.1..ýN1ø…11 0€û€˜€€ €€ €‚ÿBecause the driver is ODBC-compliant, it integrates easily with applications like Microsoft Excel, Microsoft Word, Microsoft Visual Basic® and Microsoft Access® as well as Lotus 1-2-3 and other productivity and development applications. This significantly reduces development time for front-end applications and allows users to integrate information from various sources. Unlike terminal emulation, direct DBMS access simplifies access to the data and allows users to focus on working with information.wPʃ1o†1' € €˜€€‚ÿFor more information on direct Client/Host DRDA connectivity please contact:@ø…1¯†1% €6€°Œ€‚ÿWall Data (206)-881-5995= o†1ì†11ê"‡„d|d=ì†1*‡1Ë 2ODBC Drivers>¯†1*‡1% €2€°Œ€‚ÿAvailable ODBC Drivers'ì†1Q‡1$ €€˜€‚ÿ¯3*‡1ˆ1|#ȀfÙ  €€˜ÿ€€˜
€‚ÿ€ €˜
‚ÿ€:€˜
ÿ€<€$˜Ž
‚ÿÿÿCompany NameSales PhoneDatabases Supported¥.Q‡1¥ˆ1w#¾€\Ù  €€$˜Ž
uÿ€€˜€
‚ÿ€€˜€‚ÿ€6€˜ÿ€8€$˜Ž‚ÿÿÿASK Group800 4INGRESor 1-800-4INGRES¤0ˆ1I‰1t#¸€`Ù  €€$˜Žÿ€€˜€
‚ÿ€.€˜€‚ÿ€L€˜ÿ€N€$˜Ž‚ÿÿÿBeneteau Consulting514-486-5534Allbase¯;¥ˆ1ø‰1t#¸€vÙ  €€$˜Žÿ€€˜€
‚ÿ€F€˜€‚ÿ€d€˜ÿ€f€$˜Ž‚ÿÿÿBorn Software Development Group800-624-5102AS/400²>I‰1ªŠ1t#¸€|Ù  €€$˜Žÿ€€˜€
‚ÿ€L€˜€‚ÿ€j€˜ÿ€l€$˜Ž‚ÿÿÿBull Worldwide Information Systems602-862-6062OracleÏ[ø‰1y‹1t#¸€¶Ù  €€$˜Žÿ€€˜€
‚ÿ€€€˜€‚ÿ€ž€˜ÿ€ €$˜Ž‚ÿÿÿCCA - Computer Corporation of America (PRAXIS International)617-492-8860Model 204¤0ªŠ1Œ1t#¸€`Ù  €€$˜Žÿ€€˜€
‚ÿ€$€˜€‚ÿ€B€˜ÿ€D€$˜Ž‚ÿÿÿCincom Systems800-662-2300SUPRA Server¯;y‹1̌1t#¸€vÙ  €€$˜Žÿ€€˜€
‚ÿ€R€˜€‚ÿ€p€˜ÿ€r€$˜Ž‚ÿÿÿCNA Computer Systems Engineering Inc.206-861-4736«7Œ1w1t#¸€nÙ  €€$˜Žÿ€€˜€
‚ÿ€.€˜€‚ÿ€L€˜ÿ€N€$˜Ž‚ÿÿÿComputer Associates800-CALL-CAIIDMS & DatacomŸ+̌1Ž1t#¸€VÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€:€˜ÿ€<€$˜Ž‚ÿÿÿCoromandel718-793-7963Integra-SQL¥1w1»Ž1t#¸€bÙ  €€$˜Žÿ€€˜€
‚ÿ€8€˜€‚ÿ€V€˜ÿ€X€$˜Ž‚ÿÿÿCROSS ACCESS Corporation703-684-2345DB2§3Ž1b1t#¸€fÙ  €€$˜Žÿ€€˜€
‚ÿ€&€˜€‚ÿ€J€˜ÿ€L€$˜Ž‚ÿÿÿDatafit Limited+44-480-454-604Datafit DP4“»Ž1 À1t#¸€>Ù  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€*€˜ÿ€,€$˜Ž‚ÿÿÿDEC800-DIGITALDEC Rdbb1 À1¯†1¡-b1­À1t#¸€ZÙ  €€$˜Žÿ€€˜€
‚ÿ€$€˜€‚ÿ€B€˜ÿ€D€$˜Ž‚ÿÿÿDharma Systems603-886-1400BASISplusž* À1KÁ1t#¸€TÙ  €€$˜Žÿ€€˜€
‚ÿ€ €˜€‚ÿ€>€˜ÿ€@€$˜Ž‚ÿÿÿFFE Software510-232-6800FirstSQLÁG­À1 Â1z#ĀŽÙ  €€$˜Žÿ$€€˜€
€€
‚ÿ€`€˜€‚ÿ€ˆ€˜ÿ€Š€$˜Ž‚ÿÿÿgfs - Gesellschaft für Informationssysteme+49-40/48-06-32-0£/KÁ1¯Â1t#¸€^Ù  €€$˜Žÿ€€˜€
‚ÿ€&€˜€‚ÿ€D€˜ÿ€F€$˜Ž‚ÿÿÿHewlett Packard800-637-7740HP AllBase¡- Â1PÃ1t#¸€ZÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€H€˜ÿ€J€$˜Ž‚ÿÿÿIBMContact local sales officeAS/400¦2¯Â1öÃ1t#¸€dÙ  €€$˜Žÿ€€˜€
‚ÿ€:€˜€‚ÿ€X€˜ÿ€Z€$˜Ž‚ÿÿÿIndependence Technologies510-438-2000DB2¡-PÃ1—Ä1t#¸€ZÙ  €€$˜Žÿ€€˜€
‚ÿ€0€˜€‚ÿ€N€˜ÿ€P€$˜Ž‚ÿÿÿInformation Builders800-969-INFODB2š&öÃ11Å1t#¸€LÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€6€˜ÿ€8€$˜Ž‚ÿÿÿInformix415-926-6688Informix¯;—Ä1àÅ1t#¸€vÙ  €€$˜Žÿ€€˜€
‚ÿ€@€˜€‚ÿ€^€˜ÿ€`€$˜Ž‚ÿÿÿLiberty Software Corporation604-682-8239PICK DBMS•!1Å1uÆ1t#¸€BÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€.€˜ÿ€0€$˜Ž‚ÿÿÿMDBS317-447-1122MDBS IVàÅ1Ç1t#¸€8Ù  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€,€˜ÿ€.€$˜Ž‚ÿÿÿMDI800-221-3634DB2˜$uÆ1Ç1t#¸€HÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€6€˜ÿ€8€$˜Ž‚ÿÿÿMicrorim800-628-6990R:BASE)Ç1:È1t#¸€RÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€8€˜ÿ€:€$˜Ž‚ÿÿÿMicrosoft800-227-4679SQL Serverš&Ç1ÔÈ1t#¸€LÙ  €€$˜Žÿ€€˜€
‚ÿ€"€˜€‚ÿ€@€˜ÿ€B€$˜Ž‚ÿÿÿMust Software800-441-MUSTDB2ÍY:È1¡É1t#¸€²Ù  €€$˜Žÿ€€˜€
‚ÿ€&€˜€‚ÿ€|€˜ÿ€~€$˜Ž‚ÿÿÿNCR CorporationContact NCR Representative or NCR officeTeradata Database System™%ÔÈ1:Ê1t#¸€JÙ  €€$˜Žÿ€€˜€
‚ÿ€ €˜€‚ÿ€>€˜ÿ€@€$˜Ž‚ÿÿÿNeon Systems800-466-2990DB2£/¡É1ÝÊ1t#¸€^Ù  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€<€˜ÿ€>€$˜Ž‚ÿÿÿObjectivity415-688-0939Objectivity/DB¦2:Ê1ƒË1t#¸€dÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€N€˜ÿ€P€$˜Ž‚ÿÿÿOracle800-633-0583; 415-506-7000Oracle 7ÊVÝÊ1MÌ1t#¸€¬Ù  €€$˜Žÿ€€˜€
‚ÿ€6€˜€‚ÿ€T€˜ÿ€V€$˜Ž‚ÿÿÿPageAhead Software Corp800-967-9671Software kits for developing ODBC Drivers£/ƒË1ðÌ1t#¸€^Ù  €€$˜Žÿ€€˜€
‚ÿ€*€˜€‚ÿ€H€˜ÿ€J€$˜Ž‚ÿÿÿOpenLink Software313-642-1890Progress®:MÌ1žÍ1t#¸€tÙ  €€$˜Žÿ€€˜€
‚ÿ€*€˜€‚ÿ€H€˜ÿ€J€$˜Ž‚ÿÿÿProgress Software617-280-4000Progress RDBMS v7.0·CðÌ1UÎ1t#¸€†Ù  €€$˜Žÿ€€˜€
‚ÿ€2€˜€‚ÿ€P€˜ÿ€R€$˜Ž‚ÿÿÿQuadbase Systems Inc.408-738-6989Quadbase-SQL for Windows¡-žÍ1öÎ1t#¸€ZÙ  €€$˜Žÿ€€˜€
‚ÿ€$€˜€‚ÿ€B€˜ÿ€D€$˜Ž‚ÿÿÿQuark Research203-666-3870DBase III£/UÎ1™Ï1t#¸€^Ù  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€0€˜ÿ€2€$˜Ž‚ÿÿÿRaima800-327-2462Raima DBS Server 1.1®:öÎ1S2t#¸€tÙ  €€$˜Žÿ€€˜€
‚ÿ€*€˜€‚ÿ€H€˜ÿ™Ï1S2¯†1€J€$˜Ž‚ÿÿÿRed Brick Systems408-399-3277Red Brick Warehouseš&™Ï1í2t#¸€LÙ  €€$˜Žÿ€€˜€
‚ÿ€"€˜€‚ÿ€@€˜ÿ€B€$˜Ž‚ÿÿÿSAS Institute919-677-8000SAS¥1S2’2t#¸€bÙ  €€$˜Žÿ€€˜€
‚ÿ€2€˜€‚ÿ€P€˜ÿ€R€$˜Ž‚ÿÿÿShowCase Corporatioin800-829-3555AS/400¸Dí2J2t#¸€ˆÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€,€˜ÿ€.€$˜Ž‚ÿÿÿSMC612-452-9270DMS-1100 on Unisys 1100 & 2200 series hosts›'’2å2t#¸€NÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€<€˜ÿ€>€$˜Ž‚ÿÿÿSoftware AG800-423-2227ADABASš&J22t#¸€LÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€2€˜ÿ€4€$˜Ž‚ÿÿÿSybase800-879-2273SQL Server£/å2"2t#¸€^Ù  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€2€˜ÿ€4€$˜Ž‚ÿÿÿTandem800-482-6336Tandem Non-stop SQL™%2»2t#¸€JÙ  €€$˜Žÿ€€˜€
‚ÿ€&€˜€‚ÿ€D€˜ÿ€F€$˜Ž‚ÿÿÿTechgnosis Inc.617-229-6100˜$"2S2t#¸€HÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€4€˜ÿ€6€$˜Ž‚ÿÿÿTrinzic617-891-6500CA-IDMS˜$»2ë2t#¸€HÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€2€˜ÿ€4€$˜Ž‚ÿÿÿUniSQL800-451-DBMSUniSQL/M¡-S2Œ2t#¸€ZÙ  €€$˜Žÿ€€˜€
‚ÿ€6€˜€‚ÿ€T€˜ÿ€V€$˜Ž‚ÿÿÿVertisoft Research Inc.416-321-0933ž*ë2*2t#¸€TÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€>€˜ÿ€@€$˜Ž‚ÿÿÿVisionware+44-532-788858Informix–"Œ2À2t#¸€DÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€8€˜ÿ€:€$˜Ž‚ÿÿÿWall Data800-881-5995DB2œ(*2\2t#¸€PÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€6€˜ÿ€8€$˜Ž‚ÿÿÿWATCOM1-800-265-4555Watcom SQL¤0À2 2t#¸€`Ù  €€$˜Žÿ€€˜€
‚ÿ€8€˜€‚ÿ€Z€˜ÿ€\€$˜Ž‚ÿÿÿWhite Cross Systems Inc.+44-344-700700¤$\2¤ 2€#ЀHÙ  €€$˜Žÿ€€˜€
‚ÿ€€˜€‚ÿ€<€˜ÿ€>€$˜Ž‚ÿÿÿXDB Systems301-317-6800XDB' 2Ë 2$ €€˜€‚ÿN¤ 2
21µ Ãcf>
2^
2ËC2ODBC Drivers that Support DB2E Ë 2^
2% €@€°Œ€‚ÿODBC Drivers that Support DB2w

2X#€€>ÿ© ù €€˜€‚ÿ€€˜€‚ÿ€*€˜‚ÿÿÿCompanyShippingComments8^
2e 2X#€€pÿ© ù €€˜€
‚ÿ€€˜€‚ÿ€>€˜‚ÿÿÿCross AccessAvailable NowHost Component RequiredšBÕ
2ÿ 2X#€€„ÿ© ù €€˜€
‚ÿ€2€˜€‚ÿ€R€˜‚ÿÿÿDigital Equipment CorpAvailable NowHost Component Required˜@e 2— 2X#€€€ÿ© ù €€˜€
‚ÿ€.€˜€‚ÿ€N€˜‚ÿÿÿInformation BuildersAvailable NowHost Component Required‹3ÿ 2"
2X#€€fÿ© ù €€˜€
‚ÿ€€˜€‚ÿ€4€˜‚ÿÿÿIngressAvailable NowHost Component Required£K— 2Å
2X#€€–ÿ© ù €€˜€
‚ÿ€*€˜€‚ÿ€>€˜‚ÿÿÿMicro DecisionwareQ 3 '94DRDA Compliant: No Host Component Required•="
2Z2X#€€zÿ© ù €€˜€
‚ÿ€(€˜€‚ÿ€H€˜‚ÿÿÿMicroDecisionwareAvailable NowHost Component Required‘9Å
2ë2X#€€rÿ© ù €€˜€
‚ÿ€ €˜€‚ÿ€@€˜‚ÿÿÿMust SoftwareAvailable NowHost Component Required8Z2{2X#€€pÿ© ù €€˜€
‚ÿ€€˜€‚ÿ€>€˜‚ÿÿÿNeon SystemsAvailable NowHost Component Required‹3ë2@2X#€€fÿ© ù €€˜€
‚ÿ€€˜€‚ÿ€4€˜‚ÿÿÿNetwiseAvailable NowHost Component Requ{2@2Ë 2ired£K{2µ@2X#€€–ÿ© ù €€˜€
‚ÿ€€˜€‚ÿ€>€˜‚ÿÿÿQ+E SoftwareAvailable NowNo Host Component Required w/ DRDA versionžF@2SA2X#€€Œÿ© ù €€˜€
‚ÿ€$€˜€‚ÿ€6€˜‚ÿÿÿRocket SoftwareQ3 '94No Host Component Required; Supports DRDA“;µ@2æA2X#€€vÿ© ù €€˜€
‚ÿ€2€˜€‚ÿ€D€˜‚ÿÿÿSybase OmniSQL GatewayQ1 '94Host Component Required“;SA2yB2X#€€vÿ© ù €€˜€
‚ÿ€$€˜€‚ÿ€D€˜‚ÿÿÿTrinzic InfoHubAvailable NowHost Component Required‰1æA2C2X#€€bÿ© ù €€˜€
‚ÿ€€˜€‚ÿ€*€˜‚ÿÿÿWall DataQ1 '94No Host Component Required¢JyB2¤C2X#€€”ÿ© ù €€˜€
‚ÿ€€˜€‚ÿ€<€˜‚ÿÿÿXDB SystemsAvailable NowNo Host Component required w/ DRDA version'C2ËC2$ €€˜€‚ÿj9¤C25D21ÞƊb‡„d?5D2–D2CH2Using Windows NT as a Communications and Database Gatewaya<ËC2–D2% €x€°Œ€‚ÿUsing Windows NT as a Communications and Database Gateway05D2ÆD2, (€€€†"€ ‚ÿJ&–D2E2$ €L€˜€‚ÿ(Click on diagram for more details)“oÆD2£E2$ €Þ€˜€‚ÿThere are several advantages of using Windows NT as the platform for host-DBMS connectivity and integration.!ÔE2ÄG2M h€©€T˜È:‚H€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚ÿ·Flexible connectivity options provide a range of concurrent host connections.·You can easily integrate both communications services (APPC) and database gateway functions on to single machine.·Centralized administration and performance monitoring of all components.·Scalability - Ability to utilize SMP hardware and scale as demands increase.·Ease of configuration. Windows NT has a graphical configuration utility that simplifies user management.S£E2CH2, (€¦€T˜È:‚H€
ƒ€‚ÿ·Can be easily integrated with NetWare, LAN Manager or LAN Server environment.q@ÄG2´H21Ÿ…dÃc@´H2I2ŠM2Empowering Decision Makers through Client Server ImplementationshCCH2I2% €†€°Œ€‚ÿEmpowering Decision Makers Through Client Server Implementations1´H2MI2- *€
€˜€†"€ ‚ÿ=I2ŠM2+ $€%€˜€€#€‚ÿIn this banking scenario, most of the key customer information is stored in non-relational sources. In a given down-sizing program, mission critical data is seldom the first to move to client server implementations. Instead, firms will look to newer, more profitable programs or services such as personal banking. By creating a RDBMS that contains customer information, the bank can migrate relevant information from non-relational sources to create a comprehensive set of views on a particular customer. Using graphical Executive Information System tools, the personal banker can obtain detailed reports on specific customer segments. Using components such as database gateways. The user can obtain information from both relational and non-relational sources. The database gateway can launch remote stored procedures to query non-relational applications and handle the complexity of information retrieval. The user is fed valuable data which, when presented in graphical format, can dramatically improve productivity and responsiveness.a0MI2ëM21wÿÿÿÿÿÿÿÿAÿÿÿÿëM2
€2APPC Transport for Database Gateway ConnectivityX3ŠM2CN2% €f€˜˜€
‚ÿAPPC Transport for Database Gateway Connectivity¾™ëM2
€2% €3€˜€‚ÿAdvanced Program to Program Communications is the transport mechanism most database gateways use to communicate to either IBMs DRDA host component or their own proprietary host component which usually runs as a CICS transaction program. SNA Server for Windows NT provides this transport both at the gateway but also at the client. In the case of the latter, no emulation software is required at the client.CN2
€2ŠM2h7CN2u€21ÿÿÿÿÿÿÿÿBÿÿÿÿu€2ú2LAN Protocols Supported from Client to Database Gateway_:
€2Ԁ2% €t€˜˜€
‚ÿLAN Protocols Supported from Client to Database Gatewayˆdu€2\2$ €È€˜€‚ÿBecause Windows NT is protocol independent, it can support all major network protocols including:žBԀ2ú2\ ˆ€„€T˜¤^‚$€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚€
ƒ€‚ÿ·TCP/IP·IPX·NETBEUI·DecNet·IP·XNS·OSI^-\2X‚21êÿÿÿÿÿÿÿÿCÿÿÿÿX‚2ä†2Client Architecture for Host DBMS IntegrationU0ú2­‚2% €`€˜˜€
‚ÿClient Architecture for Host DBMS Integration3X‚2à‚2. ,€ €˜˜€†"€!‚ÿ X2­‚28…2& €e€˜˜€‚ÿBecause most database gateways work in conjunction with LAN RDBMS, there are numerous methods of accessing host data. In this case we have illustrated two interfaces for Microsoft SQL Server. Using either ODBC or DB-Library™, applications can access SQL Server. Database gateways such as MicroDecisionware interpret both ODBC and DB-Library™ calls (as well as others from other RDBMS vendors). The gateway is intelligent and determines if the client request is bound for the host. If so, it makes the syntactical changes and forwards the request to the host. ¬‡à‚2ä†2% €€˜€‚ÿODBC is currently supported by a number of applications and programming languages including Microsoft Visual Basic and Microsoft Visual C++. By Using ODBC, the developer removes much of the complexity of host communication from the development effort. It helps companies get more use from productivity applications such as spreadsheets and word processors which are familiar to end-users.`/8…2D‡21eÿÿÿÿÿÿÿÿDÿÿÿÿD‡2IŠ2Host Components of Client/Host DBMS IntegrationW2ä†2›‡2% €d€˜˜€
‚ÿHost Components of Client/Host DBMS Integration®ˆD‡2IŠ2& €€˜€‚‚ÿIn most database gateway configurations, there is both a server and host component. The host component often runs as a CICS transaction program that in turn communicates with the database. The advantage of this implementation is the speed and throughput especially where large transactions are necessary. In some case such as the Micro Decisionware Access Server (their host component to the MDI gateway), the host software enables the host to take on a proactive role and launch remote stored procedures on other hosts or on LAN-based RDBMS. This is effective both in decision support where the host can update LAN sources, and in distributed.q@›‡2ºŠ21£ôb‚eEºŠ2"‹2ƒÂ2Client Server Architecture for Distributed Database ApplicationshCIŠ2"‹2% €†€°Œ€‚ÿClient Server Architecture for Distributed Database Applications#ñºŠ2EŽ22 2€ã€˜€‚€€€€‚ÿThe basic architecture for client-server systems consists of separate client and server platforms. The platforms can have different machine architectures and operating systems; however, the interfaces and protocol linking the platforms together must be compatible.On the client platform, the application is programmed to a client interface (also known as an API). The client interface accepts requests from the application, usually in the format of SQL statements, and emits a specific protocol over the network transport. For example, a Microsoft SQL Server application programmed to the DB-Library™ API, accepts requests in the format of Transact-SQL™, and emits the tabular data stream (TDS) protocol over a named pipe to the server platform.ã"‹2YÀ2% €Ç€˜€‚ÿOn the server platform, requests are received by the server interface and processed by the server engine. Results are then returned to the client using the same protocol. The server interface is usually considered to be an integral part of the database system, but it can be used separately (as in the case of database gateways). Continuing with the above example, the Open Data Services component of SQL EŽ2YÀ2IŠ2Server receives the requests and returns results, both in the TDS protocol.*EŽ2ƒÂ2& € €˜€‚‚ÿNote the differences between the client and server interfaces. The client interface is the typical API consisting of a set of procedural calls; the server interface is highly eventdriven, involving procedures within the server as needed. Also note the differences between the interfaces and the protocol. The interfaces provide the mechanism to emit and receive the protocol; the protocol is simply a set of data structures (or control blocks) that flow between the platforms over some communications transport.T#YÀ2×Â21Ήe.‡eF×Â2"Ã2¿È2Approaches to Database ConnectivityK&ƒÂ2"Ã2% €L€°Œ€‚ÿApproaches to Database Connectivityµ×Â2×Å2& €€˜€‚‚ÿAs you scale client-server systems up to the enterprise level, the problem of database connectivity becomes critical. Enterprise data exists in a heterogeneous environment. There are many different databases, servers, interfaces, and protocols that must interconnect with client applications. How can you minimize the effort of developing client applications but still use enterprise data in whatever environment its in?Problems with connectivity with SQL database servers occur because of differences in SQL dialects, system catalog tables, datatype definitions and conversions, status codes and messages, and collating sequences of ORDER BY clauses.I"Ã2 È2, &€;€˜€‚ƒ‚ƒ‚ƒ‚‚ÿThere are three basic approaches to solving these connectivity problems (described in Hackathorn, 1993):Common interfaceCommon gatewayCommon protocolThe goal for all three approaches is to localize the knowledge of specific database servers so that the application code does not change as different database servers are used. In these three approaches, this knowledge should be embedded in the interface, gateway, and protocol, respectively. In most real situations, these approaches are often used in combination with one another.ŸX×Å2¿È2G ^€°€˜ãŽà€
‰€ ‚ãà€
‰€ ‚ãà€
‰€‚ÿCommon-interface approachCommon-gateway approachCommon protocol approachJ È2 É21p‚e2ŒeG É2JÉ2‰Î2Common-Interface ApproachA¿È2JÉ2% €8€°Œ€‚ÿCommon-Interface Approach;
 É2…Ë21 0€€˜€ãâW€€
‰€‚ÿThe common-interface approach separates the client interface into two layers, similar to the Microsoft Windows Open Services Architecture. The API in front of the client interface is the set of procedures that the application sees; the SPI in back of the client interface (also called the driver manager) is the set of procedures that the client driver sees. The client drivers contain the code that is unique to a specific database server. The application code need not change as different client drivers are used.ÞJÉ2‰Î2& €½€˜€‚‚ÿWithin the Microsoft Windows NT based architecture, the common-interface approach is used for the WOSA component of Open Database Connectivity (ODBC). Evolved from the call-level interface specification of the SQL Access Group, ODBC supports a vendor-neutral means for accessing heterogeneous databases in the enterprise. Using the SQL language as a connectivity language, ODBC can access both relational and non-relational data.Note that ODBC itself is independent of the protocol used by client drivers. Each ODBC driver can send its requests to various database servers using different protocol and gateway configurations. ODBC with drivers using the DRDA common protocol are a plausible (and maybe even desirable) combination.H…Ë2ÑÎ21Á.‡efHÑÎ2Ï2ô3Common Gateway Approach?‰Î2Ï2% €4€°Œ€‚ÿCommon Gateway ApproachزÑÎ2ô3& €e€˜€‚‚ÿThe common-gateway approach adds a new layer to the client-server architecture the database gateway. By combining a server interface with a client interface, a database gateway can add value with codeÏ2ô3‰Î2 unique to a specific database server. Again, the application code need not change as different gateways connect to various servers.Within the Microsoft-based architecture, the common-gateway approach is used by the Microsoft Open Data Services package that extends WOSA to multilevel architectures. Applications that use ODBC to access enterprise data can be interconnected with various gateways using Open Data Services, as shown in the following illustration. These gateways can be developed and marketed by independent software vendors to support important databases, such as the Database Gateway family by Micro Decisionware, Inc. Or custom gateways can be developed by corporate developers to support functions unique to their systems.IÏ2=31d2ŒeƒbI=3}3°3Common Protocol Approach@ô3}3% €6€°Œ€‚ÿCommon Protocol Approach%=3¢3% €€˜€‚ÿThe common-protocol approach, uses a protocol in common with various database servers. As long as client interfaces and server interfaces emit and receive the same protocol, applications can plug and play with various database servers. Again, the application code need not change as different database servers are used. The common-protocol approach has the greatest potential for greater database connectivity, but a good protocol for database connectivity is very difficult to correctly define and implement.é}3°3% €Ó€˜€‚ÿDRDA is an excellent example of a common-protocol approach. As such, DRDA can have numerous interconnects with common-interface approaches (such as ODBC) and with common-gateway approaches (such as those using Open Data Services).B¢3ò31ö|dÿÿÿÿJò3+3ð3ODBC Driver Tools9°3+3% €(€°Œ€‚ÿODBC Driver ToolsÅò3ð3F \€þ€˜°€‚ãó4«€
‰‚ãw,ê>‰€ ‚㆏52€
‰€ ‚ÿThe following Represent a list of driver tools for developing custom ODBC Drivers:Dharma SystemsPageAheadSywareX'+3H31ßÿÿÿÿÿÿÿÿKH3—3E3ODBC Development Tools - Dharma SystemsO*ð3—3% €T€˜°€
‚ÿODBC Development Tools - Dharma Systems£zH3: 3) "€ô€€‚‚‚‚‚‚‚ÿ15 Trafalgar SquareNashua, NH 03063Phone: 603-886-1400Fax: 603-883-6904Outside of the U.S.Phone: 603-886-1400 x21žt—3Ø 3* "€é€˜€
‚€‚‚ÿDharma SQL Product FamilyThe Dharma SQL Product Family is available to DBMS providers, corporate end-users and vertical application vendors utilizing proprietary DBMS technology. Users of proprietary DBMS's can now maintain high performance and specialized functionality while gaining openness and accessibility to industry standard database technologies. Dharma's products comply with international SQL standards including ANSI SQL, Oracle SQL, and National Institute of Standards (NIST) FIPS 127-1. Dharma Systems' products will conform to emerging standards such as SQL 92, SQL III, SQL Access Group, X/Open and ODBC.mG: 3E3& €€˜€‚‚ÿThe Dharma SQL interface transforms proprietary DBMS through its portability across diverse proprietary DBMS storage environments, its capability to work in client/server environments, sophisticated SQL optimization technology, and modular implementation in object-oriented C++.The Dharma SQL Product Family is ideally suited to transform proprietary DBMS's, including on-line transaction processing (OLTP), PICK, engineering, textual, and object-oriented databases. With Dharma, users can continue to use mature proprietary database systems along with industry standard RDBMS's.S"Ø 3˜31> ÿÿÿÿÿÿÿÿL˜3â3¦H3ODBC Development Tools - PageAheadJ%E3â3% €J€˜°€‚ÿODBC Development Tools - PageAheadšs˜3|3' €æ€€‚‚‚‚‚ÿ2125 Western Avenue, Suite 301Seattle, WA 98121 USAPhone: 206-441-0340Fax: 206-441-9876Sales: 1-800-967-9671 ãâ3‘A3& €Ç€˜€‚‚ÿPageAhead Software's Simba ODBC Driver Tools provide you with all of the source code you nee|3‘A3E3d to quickly develop your own high-quality, fully-functional ODBC driver. With the Simba tools, you can build an ODBC driver in less time and at less cost than drivers developed in-house or using another vendor. Companies like IBM, Apple, Hewlett-Packard, Bull HN, Microsoft, Oracle, Ingres, Timberline, and Red Brick have all chosen to use the Simba tools to produce their ODBC drivers.‰`|3E3) €Á€˜€
‚€‚ÿSimba SQL Engine for ODBCIf you have a non-SQL data source, you will need to add SQL functionality in order to implement ODBC. The Simba SQL Engine for ODBC Software Development Kit provides the fully-optimized SQL engine and related components needed to create high-performance ODBC drivers for non-SQL data sources. The Simba SQL Engine was specially designed to add SQL capabilities to a variety of non-SQL data sources such as accounting data, VAX/VMS information, COBOL data, and project management data. More than eight person years of testing went into the Simba SQL Engine, so you can be sure that you are getting the most reliable ODBC technology available today. The Simba SQL Engine also protects your investment in SQL technology. Using the Simba SQL Engine SDK, you can have a fully-functional, high-performance ODBC driver in just a few months.£y‘A3½G3* "€ó€˜€
‚€‚‚ÿSimba Interface for ODBCIf you have a SQL data source, you may want to use the Simba Interface for ODBC to create your ODBC driver. The Simba Interface provides a comprehensive driver development framework and all the source code needed to quickly develop an ODBC driver for a SQL data source.If you prefer, PageAhead's ODBC Development Services Group can build your driver for you. Whether you use the Simba ODBC Driver Tools to create your ODBC driver in-house or have PageAhead build it for you, you'll have a finished ODBC driver faster, at significantly less cost, and of higher quality than through any other alternative.éÀE3¦H3) €€˜€
‚€‚ÿThe PageAhead MissionPageAhead Software provides connectivity and data access software and services for users and developers with multiple data sources in desktop and server environments.P½G3öH313ÿÿÿÿÿÿÿÿMöH3=I3?L3ODBC Development Tools - SywareG"¦H3=I3% €D€˜˜€‚ÿODBC Development Tools - Syware^9öH3›I3% €r€€‚‚‚ÿP.O. Box 91 KendallCambridge, MA 02142(617) 497-1376¤}=I3?L3' €û€˜€‚‚‚ÿDr. Deebee is a RE-DISTRIBUTABLE utility that generates trace logs that are 100% compatible with ODBC Spy.(see ODBC SDK v2.0) Dr. DeeBee was developed by SYWARE, inc., the same company that developed ODBC Spy for Microsoft.Your customer support organization will find Dr. DeeBee invaluable as an aid to tracking down problems your customers are having with your ODBC applications and drivers. Dr. DeeBee monitors the activity between an ODBC enabled application and an ODBC driver, and creates a log of the calls. Your customer support organization can then examine these logs and replay them using ODBC Spy's replay capabilities.¨w›I3çL31tÿÿÿÿgNçL3M3I3OLE - Windows ObjectsEB("btn_topic_index");SaveMark("topic_index");CBB("btn_next_index", "PI(`nteval.hlp',`Next_27')")8?L3M3& €$€˜˜˜€‚ÿWindows Objects•oçL3´M3& €Þ€°°˜€‚ÿThe key to an effective object technology is simplicity. Objects are merely reusable components designed to:ªlM3^N3> L€Ø€Pñ€„ð9€€
ƒ‚€€
ƒ‚€€
ƒ‚ÿ·Create cost effective reusable components·Deliver customized solutions·Reduce development timeN´M3¬N3/ .€>€T°ñ€„ð9€€
ƒ‚ÿ·Simplify code maintenance©e^N3a€3D V€Ë€˜˜€€ €âé€
‰€â²¶Å/€
‰€‚ÿThe Windows™ Objects Strategy describes a long term component software strategy that includes a general model for how components cooperate with one another. It also encompasses the operating system, programming tools, and programming interfaces through which th¬N3a€3?L3e vision of component software can be achieved and delivered to users and creators.菬N3I3Y €€€˜ãðÀ®;€
‰€‚ã@ØÞì€
‰€‚ã‚&U€
‰€‚ãž'¼‚€
‰€‚€ ‚ÿWhat is Component Software?Benefits of a Component Software MarketBenefits for End-UsersObject Linking and Embedding 2.0Q a€3š31Îq‰fQgOš3߁3|…3OLE - Component Software DefinedEI3߁3' €<€˜ŒR˜€‚ÿWhat is Component Software?蚁3ú‚33 4€Ñ€°°˜€âzÝÌ­€
‰€‚ÿAs its name suggests, component software is based on the notion of a component, which is a reusable piece of software that you can "plug into" other components from other vendors, with relatively little effort. (See Example) Õ߁3…33 4€«€°˜€â£ê·€
‰€‚‚ÿIn contrast, traditional applications are monolithic, which means that they come pre-packaged with a wide range of features, most of which can't be removed or replaced with alternatives.If different software packages could talk to one another, it would not only be possible for one application to use another application's data, but applications could automatically control the actions of other packages, and automate many tasks that users now perform manually.z?ú‚3|…3; F€~€˜˜ã·Ì â€
‰€‚ã æ§þ€
‰€‚ÿBenefits for CorporationsBuilding Component SoftwareK…3Dž31@ÿÿÿÿÿÿÿÿPÿÿÿÿDž3¼†3OLE - Components - Example1
|…3ø…3' €€ČR˜€‚ÿExampleĞDž3¼†3& €=€°˜€‚ÿA component might be a spelling checker, sold by one vendor, that can be plugged into several different word processing applications from multiple vendors.>
ø…3ú†31ýgWgQú†3D‡3‹3OLE - OLE 2.0J#¼†3D‡3' €F€˜ŒR˜€‚ÿObject Linking and Embedding 2.0£pú†3çˆ33 4€á€°°˜€âÊ¢òo€
‰€‚ÿOLE 2.0 is a breakthrough for component software, because it provides a standard way of defining what an object is and how objects can interact with each other. With OLE 2.0, objects written by programmers from different companies can interact with each other in a synergistic manner--without knowing anything about the specifics of how individual objects work.6D‡3‰31 2€ €°˜€†"€"€‚ÿ8çˆ3UŠ3% €'€˜€‚ÿAlthough an evolutionary step, component software represents a "quiet revolution" that will transform the way software is produced and used. The concept is similar to networking, which allows two computers to exchange data without having to know anything about each other.2 ‰3‡Š3& €€°˜˜€‚ÿSee Also:‰NUŠ3‹3; F€œ€˜˜ã^)Öɀ
‰€‚ãÔeڕ€
‰€‚ÿAn Evolutionary Path to the FutureThird Party Supporters of OLE 2.0L‡Š3\‹31Qg_
gR\‹3¡‹3ñŽ3Building Component SoftwareE‹3¡‹3' €<€˜˜R˜€‚ÿBuilding Component Softwareáª\‹3‚37 <€U€°°˜€â£ê·€
‰€‚€‚ÿComponent software offers a more efficient and productive model for the software industry. It is a superior alternative to building monolithic applications, enabling vendors to construct software, with the aid of readily available building blocks, that can be plugged into current applications that support the same standard for component communications.Using components, building an application consists of two jobs:o@¡‹3ñŽ3/ ,€€R˜ñ€„ð9€ƒ‚ƒ‚ÿ1.Creating the software engine and unique application features that differentiate the product from all others (this is usually done from scratch)2.Integrating off-the-shelf components into the application to provide all the "extras" that most customers expect, but which are not necessary to implement from scratchb1‚3S31žWg „gSS3¨3Å3OLE - The Benefits of a Component Software MarketU.ñŽ3¨3' €\€˜ŒR˜€‚ÿThe Benefits of a Component Software Market’mS3FÀ3% €Ú€°˜€‚ÿThe "componentization" of the software market will¨3FÀ3ñŽ3 benefit all vendors, from the smallest to the largest. iC¨3¯À3& €†€°°˜€‚ÿJust a few of the advantages of a component software market are:ë‰FÀ3šÁ3b ’€€˜âì7ð’€
‰€‚â(ÔK€
‰€‚â¡é:€
‰€‚âüÍåé€
‰€‚âWD
¨€
‰€‚ÿDecreased Development CostsBetter Industry EfficiencyFaster Time-to-MarketMore Niche MarketsBetter Maintainance}@¯À3Å3= H€€°˜âI/͝€
‰€‚ãÔeڕ€
‰€‚‚ÿOpen Programming ArchitectureA large number of vendors are already supporting Windows Objects by incorporating OLE 2.0 capabilities into their applications. These vendors will be able to take advantage of a large quantity of off-the-shelf component software from third party vendors as it becomes available. Third Party Supporters of OLE 2Significantly, Windows Objects allows programmers to plug their applications or components into other components without knowing the details of how these components were built. Instead, it is only necessary to know something about the capabilities supported by a component for an application to communicate with it. As a result, the new generation of applications will be more modular, more easily revised, more easily customized, and much better able to meet the demands of users.MšÁ3dÅ31~_
gRˆgTdÅ3¤Å3ñÊ3OLE - Benefits for End-Users@Å3¤Å3' €2€˜ŒR˜€‚ÿBenefits for End-Users
ædÅ3±Ç3' €Í€°˜˜€‚ÿObjects eliminate many of the current boundaries between applications, allowing you as a user to perceive your computing environment as a single, large application that looks and acts in a consistent manner. In most cases, you will not even realize that you are using several applications from different vendors. The document-centric approach provides a more natural and intuitive way to work with computers, increasing your productivity while decreasing training and support costs. mG¤Å3È3& €Ž€˜°˜€‚ÿA sampling of some of the new features offered by OLE 2.0 includes: ‡@±Ç3¥È3G ^€€€˜âÄ÷]€
‰€‚âYˇ•€
‰€‚âjÜy€
‰€‚ÿVisual EditingDrag and DropNested Object Support:È3ßÈ3+ &€€˜˜âøókˆ€
‰‚ÿAutomationÀ¥È3ŸÊ33 4€€˜°˜€âJsB¨€
‰€‚ÿThe document-centric approach is an excellent method for combining productivity applcations; the object model is extensible and includes interfaces for services, such as vendors, to extend the object model and include useful features, such as real time stock quotes. By standardizing the interface to these services, any application can be extended to include external value-added services.R$ßÈ3ñÊ3. ,€H€°˜ã½Xᝀ
‰€‚ÿExample of a Compound DocumentPŸÊ3AË31´ „ghUAË3„Ë34OLE - Benefits for CorporationsCñÊ3„Ë3' €8€˜˜R˜€‚ÿBenefits for Corporations˜sAË3Ì3% €æ€°˜€‚ÿWindows Objects will improve the way corporations purchase, distribute, manage, and maintain software packages. …_„Ë3¡Ì3& €¾€°°˜€‚ÿHere are just a few ways that Windows Objects will improve the state of corporate computing:ÚyÌ3{Í3a ’€ò€˜âo©n¨€
‰€‚â;¤Ô€
‰€‚âdùˆë€
‰€‚â?=?m€
‰€‚âÖæSw€
‰€‚ÿMore ChoicesBetter QualityBetter IntegrationEasier Custom SolutionsReduced Training And SupportK ¡Ì3ÆÍ3+ &€@€˜˜âì1w—€
‰‚ÿBetter Return On InvestmentA{Í34, &€+€°˜€€ €‚ÿThe "glue" that holds these systems together is OLE 2.0, which provides a standard means of communication among all the modules, and offers a layer of "insulation" between modules, which allows them to be flexibly plugged and unplugged from the system. As a result, future modules can be added without disrupting the system or modifying existing modules. Also, since OLE 2.0 is the standard for object linking and embedding in the Microsoft® Windows environment, a wide range of off-the-shelf OLE 2.0 products will be availÆÍ34ñÊ3able.X'ÆÍ3k41(RˆgÆhVk4¶4­4OLE - Cairo: Advanced Object TechnologyK$4¶4' €H€˜ŒR˜€‚ÿCairo: Advanced Object Technology¶k4l4' €€°°˜€‚ÿThe next step after the distributed version of OLE 2.0 will be an operating system known as "Cairo." Based on the recently released Microsoft Windows NT operating system, Cairo is a new operating environment that is designed to make creating, accessing, manipulating, organizing, and sharing information easier for computer users. It offers an advanced, object-oriented environment that lets you focus on manipulating information, not on manipulating applications or navigating networks. To do this, Cairo integrates a number of new and existing technologies that change the way people use computers while making computers much more intuitive to use. A¶4­4. ,€&€°˜ã)¥‘€
‰€‚ÿMore on CairoDl4ñ41qhÉhWñ4(4h 4OLE - More on Cairo7­4(4' € €˜ŒR˜€‚ÿMore on Cairo^8ñ4†4& €p€°°˜€‚ÿWith Cairo, the complexity of networking disappears. â»(4h 4' €w €°˜€‚‚ÿCairo completely hides the boundaries between physical objects, such as computers and disk drives, allowing you to easily and confidently locate or access any information anywhere in your organization--even on non-Cairo machines. With Cairo, an organization's entire computing resources appear as if they were contained locally within every user's computer.Cairo also offers a new paradigm for accessing data. Instead of searching for information, Cairo users "ask" for it, supplementing the traditional "search and browse" paradigm that most computers employ today. To enable this, powerful query capabilities are built directly into Cairo's file system, allowing you to find objects anywhere in your organization by entering a few simple search criteria. For example, you could query for all documents written by Jill Smith after June 11, 1994 that contain the text "ray tracing on spherical surfaces." This kind of searching is made possible by the way in which Cairo stores information--as objects, rather than as simple streams of data commonly found in traditional files. It is therefore possible to query for documents, printers, services, users, machines, and almost everything else in this manner.Y(†4Á 41DÆh|‚iXÁ 4
4 4OLE - An Evolutionary Path to the FutureL%h 4
4' €J€˜ŒR˜€‚ÿAn Evolutionary Path to the FutureG Á 4T 4' €A€°°˜€‚ÿCurrently, OLE 2.0 offers integration within the boundaries of a single machine. Soon, Microsoft plans to release a new version of OLE that will work across networks, allowing you to tie information together on different personal computers no matter where those computers reside. This new "distributed" version of OLE will require no changes to existing OLE 2.0-based applications. An existing OLE 2.0 application can immediately begin connecting to other applications on other machines, in a manner that is completely transparent to users. @
4”4& €5€˜˜€‚ÿAlthough the evolution from the current version of OLE 2.0 to Cairo offers dramatic changes in the way computers will be used, it will not require changes to existing applications. Much of the advanced technology that will be available in the future will simply be "inherited" by existing applications, with no changes to the applications themselves. Independent software vendors and corporate IS engineers can begin implementing solutions today using OLE 2.0 and be assured that this solution can tap into the power of future systems.8T 4Ì4& €$€°°˜€‚ÿRelated Topics:T'”4 4- *€N€˜ãu’
‰€‚ÿCairo: Advanced Object TechnologyBÌ4b41àÿÿÿÿÿÿÿÿYÿÿÿÿb4¤@4OLE - For vendors5 4—4' €€ČR˜€‚ÿFor VendorsÛb4¤@4& €·€°˜€‚ÿComponent software will reduce the skyrocketing complexity of soft—4¤@4 4ware development, reduce software development costs, and create a more diverse set of market segments and niches for small, medium, and large vendors.@—4ä@41ÁÿÿÿÿÿÿÿÿZÿÿÿÿä@4eB4OLE - For users3 ¤@4A4' €€ČR˜€‚ÿFor UsersN(ä@4eB4& €Q€°˜€‚ÿComponent software means a much greater range of software choices, and better productivity. As users recognize the possibilities of component software, demand is likely to increase for specialized components that you can purchase at a local software retail outlet and "plug into" applications.GA4¬B41áÿÿÿÿÿÿÿÿ[ÿÿÿÿ¬B4FD4OLE - For Corporations:eB4æB4' €&€ČR˜€‚ÿFor Corporations`:¬B4FD4& €u€°˜€‚ÿComponent software means lowering the cost of corporate computing, helping IS departments work more efficiently, and enabling your users to be more productive. This is likely to drive an even greater demand for software among businesses, especially for specialized components that solve business-specific needs.CæB4‰D41‡ÿÿÿÿÿÿÿÿ\ÿÿÿÿ‰D4ÍE4OLE - More Choices6FD4¿D4' €€ČR˜€‚ÿMore Choicesè‰D4ÍE4& €Ñ€°˜€‚ÿSince Windows Objects enables the proliferation of a large number of components from all vendors, corporations will be able to choose from a larger pool of technologies that can be tailored to meet highly specific business needs.E¿D4F41xÿÿÿÿÿÿÿÿ]ÿÿÿÿF4EG4OLE - Better quality8ÍE4JF4' €"€ČR˜€‚ÿBetter QualityûÕF4EG4& €«€°˜€‚ÿBroad-based participation in the component software market by small, medium, and large vendors will increase competition for discrete functions, which should produce more innovative and higher quality software.IJF4ŽG41"ÿÿÿÿÿÿÿÿ^ÿÿÿÿŽG4gI4OLE - Better integration<EG4ÊG4' €*€ČR˜€‚ÿBetter IntegrationwŽG4gI4& €ï€°˜€‚ÿBecause software will support a standard method of component-level communication, products from a wide range of vendors will interoperate more fully than today's applications. As a result, your users will find it easier to exchange data between applications, and systems analysts will be able to more easily build custom business solutions with off-the-shelf applications.NÊG4µI41ºÿÿÿÿÿÿÿÿ_ÿÿÿÿµI4!M4OLE - Easier custom solutionsAgI4öI4' €4€ČR˜€‚ÿEasier Custom SolutionséµI4ßJ4' €…€°°˜€‚ÿThe Windows Objects framework will enable you to easily plug a wide range of components into applications, allowing a much greater range of application customization than is available today. BöI4!M4& €9€°˜€‚ÿFor example, you will be able to plug custom modules into a database application to provide a range of custom functions such as specialized financial modules, equation editing, scientific analysis, run-time tutorials, charting, and data compression. You will be able to get the functions that you need, in a more cost-effective manner. Likewise, IS technical staff will be able to build custom solutions in far less time by taking advantage of capabilities such as cross-application macro languages, which are enabled by OLE automation. S"ßJ4tM41×ÿÿÿÿÿÿÿÿ`ÿÿÿÿtM4 €4OLE - Reduced Training and SupportF!M4ºM4' €>€ČR˜€‚ÿReduced Training and Supportf@tM4 N4& €€€°°˜€‚ÿOLE 2.0 ushers in a new era of ease-of-use for applications. زºM4 €4& €e€°˜€‚ÿAlthough users will always need some level of support, OLE 2.0 applications will be more intuitive for your users, enabling them to be less reliant on training and support resources. The greater integration among applications will also allow you to more easily build your own integrated business solutions using off-the-shelf products, an advantage that will remove some of the workload from already overburdened IS support staffs. N4 €4!M4R! N4^€41†ÿÿÿÿÿÿÿÿaÿÿÿÿ^€4x‚4OLE - Better Return On InvestmentE €4£€4' €<€ČR˜€‚ÿBetter Return on InvestmentÕ¯^€4x‚4& €_€°˜€‚ÿCorporate software investments will not be wasted. Most larger corporations spend millions of dollars on software, only to use it in a highly inefficient manner. Since component software allows you to get the functions you need in a cost-efficient manner, software budgets are not wasted on capabilities that you won't use. As a result, corporate software investments will yield a higher rate of return than today's investments.R!£€4ʂ41Öÿÿÿÿÿÿÿÿbÿÿÿÿʂ4N„4OLE - Decreased Development CostsEx‚4ƒ4' €<€ČR˜€‚ÿDecreased Development Costs?ʂ4N„4& €3€°˜€‚ÿAs more components become available, the complexity (and hence the cost) of software development and maintenance should drop, especially for larger vendors with complex products. Component software allows vendors to more effectively tap into the vast resources of other vendors.Q ƒ4Ÿ„41ÿÿÿÿÿÿÿÿcÿÿÿÿŸ„4U†4OLE - Better Industry EfficiencyDN„4ã„4' €:€ČR˜€‚ÿBetter Industry EfficiencyrLŸ„4U†4& €™€°˜€‚ÿWith a large quantity of readily available components, the burden of reinventing common technologies will be lifted, allowing vendors to concentrate on new, and more innovative features. As a result, advances in technology can occur at a faster pace, and vendors can be more productive and selective in their development efforts.Lã„4¡†41­ÿÿÿÿÿÿÿÿdÿÿÿÿ¡†4ˆ4OLE - Faster Time-To-Market?U†4à†4' €0€ČR˜€‚ÿFaster Time-to-Market"ü¡†4ˆ4& €ù€°˜€‚ÿIn addition to the more rapid turn-around for new product versions, the functions available to you should increase because of the greater number of compatible components that can be supplied with the application or purchased at their local retailer.Ià†4Kˆ41@ÿÿÿÿÿÿÿÿeÿÿÿÿKˆ4B‰4OLE - More Niche Markets<ˆ4‡ˆ4' €*€ČR˜€‚ÿMore Niche Markets»•Kˆ4B‰4& €+€°˜€‚ÿAll vendors should experience a new renaissance by building innovative components that can be licensed to other vendors or sold directly to users.M‡ˆ4‰41ÿÿÿÿÿÿÿÿfÿÿÿÿ‰4U‹4OLE - Better Maintainability=B‰4̉4' €,€ČR˜€‚ÿBetter Maintainance‰b‰4U‹4' €Å€°˜€‚‚ÿBecause component-based applications are built using plug-in elements, it is possible to upgrade part of an application instead of replacing the entire application with a completely new version. This means that vendors can deliver upgrades to you on a component basis--without waiting for the "next version" of the entire application to be completed.T#̉4©‹41/ÿÿÿÿÿÿÿÿgÿÿÿÿ©‹4„4OLE - Open Programming ArchitectureG U‹4ð‹4' €@€ČR˜€‚ÿOpen Programming Architecture”m©‹4„4' €Û€°˜€‚‚ÿComponents can be created using different programming languages such as C++, FORTRAN, COBOL, and Assembly, and then combined to form a complete application. This gives vendors and users much greater flexibility to combine different types of software from various sources, and also enables programmers with different areas of expertise to cooperate more closely.Eð‹4ɍ41Mÿÿÿÿÿÿÿÿhÿÿÿÿɍ4 À4OLE - Visual Editing8„4Ž4' €"€ČR˜€‚ÿVisual EditingЩɍ4 À4' €S€°˜€‚‚ÿThis feature allows you to directly activate objects within documents without switching to a different window. This includes operations such as editing, displaying, recording, and playing. For example, you can double-click on a spreadsheet in a document and edit it right there, without switching to a new window. All the menus and buttons necessary to edit the object are merged with the controls of the document window.Ž4 À4„4DŽ4PÀ41 ÿÿÿÿÿÿÿÿiÿÿÿÿPÀ4(Á4OLE - Drag and Drop7 À4‡À4' € €ČR˜€‚ÿDrag and Drop¡|PÀ4(Á4% €ø€°˜€‚ÿThis feature enables you to drag objects from one application window to another, or to drop objects inside other objects.L‡À4tÁ41—ÿÿÿÿÿÿÿÿjÿÿÿÿtÁ4¿Â4OLE - Nested Object Support?(Á4³Á4' €0€ČR˜€‚ÿNested Object Support åtÁ4¿Â4' €Ë€°˜€‚‚ÿThis feature allows you to build new objects from existing ones by embedding objects within other objects. For example, you could embed a graphic within a range of cells in a spreadsheet that is itself embedded in a document.A³Á4Ã41‚ÿÿÿÿÿÿÿÿkÿÿÿÿÃ4AÄ4OLE - Automation4
¿Â44Ã4' €€ČR˜€‚ÿAutomation
æÃ4AÄ4' €Í€°˜€‚‚ÿThis feature enables the creation of command sets that operate across applications, as well as within them. For example, a you could invoke a command from a word processing program that sorts a range of cells in a spreadsheet.S"4Ã4”Ä41êÉhþƒil”Ä4ÜÄ4•Æ4OLE - Example of Compound DocumentH!AÄ4ÜÄ4' €B€˜ŒR˜€‚ÿExample of a Compound Document‚[”Ä4^Æ4' €·€°˜˜€‚ÿThe compound document metaphor is excellent if you are working with productivity applications. It represents the information and applications that created or retrieved that data as a single application. This simplifies your interaction with the application, and can abstract the details associated with data retrival, or even data manipulation.7ÜÄ4•Æ42 4€ €˜°˜€†"€#€‚ÿX'^Æ4íÆ41|‚iÿÿÿÿmíÆ48Ç45OLE - Third Party Supporters of OLE 2.0K$•Æ48Ç4' €H€˜˜R˜€‚ÿThird Party Supporters of OLE 2.0¾—íÆ4öÇ4' €/€°°˜€‚ÿThe following independent software vendors (ISVs) are either currently shipping products supporting OLE 2.0 or plan to release before Spring Comdex.Ë`8Ç4ÁÈ4k#¦€ÀÄÌÌÕ€€°˜€‚ÿ€.€°˜‚ÿ€T€°˜‚ÿ€Ž€°˜‚ÿÿÿAbove Software, Inc.Future Labs, Inc.Lenel Systems InternationalReportSmith Corporation¿TöÇ4€É4k#¦€¨ÄÌÌÕ€€°˜€‚ÿ€€°˜‚ÿ€D€°˜‚ÿ€€€°˜‚ÿÿÿAudioFileGilbert & AssociatesLooking Glass Software, Inc.Saqqara TechnologyÕjÁÈ4UÊ4k#¦€ÔÄÌÌÕ€€°˜€‚ÿ€*€°˜‚ÿ€f€°˜‚ÿ€¢€°˜‚ÿÿÿBlue Sky SoftwareGold Software Engineering CoLooking Glass Software, Inc.Scopus Technology, Inc.ÂW€É4Ë4k#¦€®ÄÌÌÕ€€°˜€‚ÿ€$€°˜‚ÿ€@€°˜‚ÿ€z€°˜‚ÿÿÿBrio TechnologyGST SoftwareLPC, A Pitney Bowes CompanySequoia Software Systems»PUÊ4ÒË4k#¦€ ÄÌÌÕ€€°˜€‚ÿ€@€°˜‚ÿ€j€°˜‚ÿ€Š€°˜‚ÿÿÿBuzzwords International, Inc.Helix Systems, Inc.McLain ImagingShapeware¼QË4ŽÌ4k#¦€¢ÄÌÌÕ€€°˜€‚ÿ€,€°˜‚ÿ€P€°˜‚ÿ€d€°˜‚ÿÿÿCaliper CorporationIdentiTech, Inc.MetaphorSimulation Technologies, Inc.ÎcÒË4\Í4k#¦€ÆÄÌÌÕ€€°˜€‚ÿ€4€°˜‚ÿ€x€°˜‚ÿ€¢€°˜‚ÿÿÿChrisalan Designs, Inc.ImageFast Software Systems, Inc.METZ Software, Inc.Softbridge, Inc.ßtŽÌ4;Î4k#¦€èÄÌÌÕ€€°˜€‚ÿ€B€°˜‚ÿ€v€°˜‚ÿ€œ€°˜‚ÿÿÿCimmetry Systems Inc. (C.S.I.)ImageWave Software, Inc.Micro Logic, Inc.SoftSolutions Technology Corporation¬A\Í4çÎ4k#¦€‚ÄÌÌÕ€€°˜€‚ÿ€€°˜‚ÿ€L€°˜‚ÿ€l€°˜‚ÿÿÿClaris Corp.InfoPower CorporationMicrocom, Inc.SPSS Inc.¸M;Î4ŸÏ4k#¦€šÄÌÌÕ€€°˜€‚ÿ€€°˜‚ÿ€\€°˜‚ÿ€t€°˜‚ÿÿÿCompuHelpInformative Graphics CorporationMicrografxSTEFRA Enterprise¹NçÎ4d5k#¦€œÄÌÌÕ€€°˜€‚ÿ€8€°˜‚ÿ€N€°˜‚ÿ€r€ŸÏ4d5•Æ4°˜‚ÿÿÿCorel Systems CorporationInterleafMicroLogic, Inc.Straylight SoftwareÅZŸÏ4)5k#¦€´ÄÌÌÕ€€°˜€‚ÿ€&€°˜‚ÿ€b€°˜‚ÿ€‚€°˜‚ÿÿÿCrystal ServicesInterlinear Technology, Inc.Microsoft CorpSummit Software CompanyÑfd5ú5k#¦€ÌÄÌÌÕ€€°˜€‚ÿ€€°˜‚ÿ€J€°˜‚ÿ€†€°˜‚ÿÿÿDCA, Inc.InterTech Imaging Corp.Morrison Knudsen CorporationSystems Compatibility Corporation¸M)5²5k#¦€šÄÌÌÕ€€°˜€‚ÿ€"€°˜‚ÿ€D€°˜‚ÿ€z€°˜‚ÿÿÿDesign ScienceIris AssociatesObject Productivity, Inc.TeleFile, Inc.ÀUú5r5k#¦€ªÄÌÌÕ€€°˜€‚ÿ€.€°˜‚ÿ€X€°˜‚ÿ€†€°˜‚ÿÿÿDigital Design, Inc.JetForm CorporationPatrick Consult, Inc.The Athena GroupÀU²525k#¦€ªÄÌÌÕ€€°˜€‚ÿ€@€°˜‚ÿ€V€°˜‚ÿ€j€°˜‚ÿÿÿDigital Equipment CorporationKaseworksPC QuoteThuridion Software EngineeringºOr5ì5k#¦€žÄÌÌÕ€€°˜€‚ÿ€,€°˜‚ÿ€\€°˜‚ÿ€z€°˜‚ÿÿÿDigiVox CorporationKedwell Software, Inc.PCvoice, Inc.Traffic Software·L25£5k#¦€˜ÄÌÌÕ€€°˜€‚ÿ€*€°˜‚ÿ€<€°˜‚ÿ€l€°˜‚ÿÿÿDynaware USA, Inc.KeyfilePectronics CorporationTrax Softworks, Inc.È]ì5k5k#¦€ºÄÌÌÕ€€°˜€‚ÿ€*€°˜‚ÿ€X€°˜‚ÿ€€€°˜‚ÿÿÿDynaware USA, Inc.KIDASA Software, Inc.PenKnowledge, Inc.Walker Richer & Quinn, Inc.Ùn£5D5k#¦€ÜÄÌÌÕ€€°˜€‚ÿ€F€°˜‚ÿ€˜€°˜‚ÿ€´€°˜‚ÿÿÿFeith Systems and Software, Inc.LABTECH (Laboratory Technologies Corp.)Q+E SoftwareWatermark Softwareª?k5î5k#¦€~ÄÌÌÕ€€°˜€‚ÿ€€°˜‚ÿ€
€°˜‚ÿ€F€°˜‚ÿÿÿQ/Media Software CorporationWK Information Systems Ltd(D55% €€°˜€‚ÿh7î5~51ºÿÿÿÿÿÿÿÿn~5È5ˆ5OnLine Services for Windows NTPW(0,0,675,850,3,"MAIN")J!5È5) "€B€°°˜‚û€‚ÿOnline Services for Windows NT«…~5s 5& € €°˜€‚ÿMicrosoft provides a variety of online services for end users and developers. In addition to the Microsoft TechNet and Developer Network forums on CompuServe, Microsoft sponsors the Microsoft Connection: 24 CompuServe forums that provide information and support for Microsoft products. Facilitated by Microsoft, these forums provide the means for interactive dialog with a large community of other Microsoft customers worldwide, as well as remote access to product information, sample programs, utilities, drivers, and developer tools. Microsoft also supports electronic service requests and provides product support information via modem.•pÈ5 5% €à€°˜€‚ÿThe options described below are available for users who need unlimited access to technical support via modem.O)s 5W 5& €R€°°˜€‚ÿThe Microsoft Connection on CompuServeqJ 5È
5' €•€°˜€‚‚ÿCurrent CompuServe users can access the Microsoft Connection by typing GO MICROSOFT at any "!" prompt. To connect to a specific forum or area, type GO . For more information on the CompuServe information service, call (800) 848-8199.The Microsoft Connection on CompuServe provides the following services:P)W 55' €R€¬‚R˜€#‚ÿThe Microsoft Developer Services Area ¨‚È
5À5& €€°˜€‚ÿThis centralized area provides developers with technical support and information services for all Microsoft developer products.tM545' €š€¬‚R˜€#‚ÿEnd User Services, Networking, MS Windows and MS-DOS, and Developer ForumsvPÀ5¶@5& €¡€°˜€‚ÿTechnical support is available on more than 24 CompuServe forums that allow an interactive dialog between users as well as remote access to the Microsoft Knowledge B45¶@55ase of product information, which is updated daily. Microsoft support engineers monitor and participate in all forums to ensure complete and accurate information flow.@45ö@5' €2€¬‚R˜€#‚ÿWindows Vendors forumsšu¶@5A5% €ê€°˜€‚ÿThis set of forums provides customers with access to more than 40 companies that produce applications for Windows.G ö@5×A5' €@€¬‚R˜€#‚ÿThe Microsoft Knowledge Base Ç¡A5žB5& €C€°˜€‚ÿThis database of technical information on Microsoft products includes bug lists, fix lists, records of documentation errors, and common questions and answers.H!×A5æB5' €B€¬‚R˜€#‚ÿThe Microsoft Software Library¯‰žB5•C5& €€°˜€‚ÿThis library includes binary files, sample code, technical notes, and utilities that users can search by keyword and download locally.CæB5ØC5' €8€¬‚R˜€#‚ÿSuggestion/Problem ReportÑ«•C5©D5& €W€°˜€‚ÿClients use this form to make product suggestions or to report bugs in Microsoft products. There is no connect-time charge for providing this information to Microsoft.L%ØC5õD5' €J€¬‚R˜€#‚ÿThe Microsoft Central Europe Forumb=©D5WE5% €z€°˜€‚ÿThis unique forum provides support for localized products.EõD5œE5' €<€¬‚R˜€#‚ÿThe Microsoft Benelux Forumb=WE5þE5% €z€°˜€‚ÿThis unique forum provides support for localized products.CœE5AF5' €8€¬‚R˜€#‚ÿThe Microsoft Italy Forumb=þE5£F5% €z€°˜€‚ÿThis unique forum provides support for localized products.7AF5ÚF5& €"€°°˜€‚ÿOther ServicesH!£F5"G5' €B€ČR˜€‚ÿThe Microsoft Download Service÷ÑÚF5H5& €£€°˜€‚ÿThis service provides access to printer drivers, technical notes, and supplementary files covering common Microsoft product support issues via modem, 24 hours a day, seven days a week. Call (206) 936-6735.8"G5QH5' €"€ČR˜€‚ÿAmerica OnlineÒ¬H5#I5& €Y€°˜€‚ÿUsers can access the Microsoft Knowledge Base database of technical product information via America Online. For more information on America Online, call (800) 827-6364.AQH5dI5' €4€ČR˜€‚ÿGE Information Services æ#I5pJ5& €Í€°˜€‚ÿUsers can also access the Microsoft Knowledge Base database of technical product information and the Microsoft Software Library via GE Information Services. For more information on GE Information Services, call (800) 334-2255.2 dI5¢J5' €€ČR˜€‚ÿInternet*pJ5ÌK5& € €°˜€‚ÿUsers can access the Microsoft Knowledge Base and the Microsoft Software Library. The Microsoft Internet FTP archive host FTP.MICROSOFT.COM supports anonymous log-in. When logging on as anonymous, please provide your complete e-mail name as your password.J#¢J5L5' €F€ČR˜€‚ÿMicrosoft Network Product Forums4
ÌK5JL5' €€¬‚R˜€#‚ÿMSNETWORKS~YL5ÈL5% €²€°˜€‚ÿClient-server computing forum with sections on LAN Manager and other networking issues/JL5÷L5' €€¬‚R˜€#‚ÿMSSQLgÈL5„M5& €Î€°˜€‚‚ÿSupport for Microsoft SQL Server Users can also access this forum from the developer services area.2 ÷L5¶M5' €€¬‚R˜€#‚ÿMSWRKGRPµŽ„M5kN5' €€°˜€‚‚ÿSupport for Microsoft Windows for Workgroups and Microsoft MailTopics include setup, connectivity, sharing, accessories, and File Manager.M&¶M5¸N5' €L€ČR˜€‚ÿMicrosoft Windows and MS-DOS Forums/kN5çN5' €€¬‚R˜€#‚ÿWINNTb=¸N5IO5% €z€°˜€‚ÿInformation on Windows NT and support for the beta program2 çN5{O5' €€¬‚R˜€#‚ÿWINSHARE·IO5>€5' €!€°˜€‚‚ÿUtilities and general information about Windows for new usersSupport topics include installa{O5>€55tion, running MS-DOS applications, and printing.M&{O5‹€5' €L€ČR˜€‚ÿMicrosoft Developer Services Forums1
>€5¼€5' €€¬‚R˜€#‚ÿMSDNLIB“n‹€5O5% €Ü€°˜€‚ÿMicrosoft Developer Network technical library forum with a collection of technical articles and sample code.¼€5}5' €€¬‚R˜€#‚ÿMSDR…_O5‚5& €¾€°˜€‚‚ÿMicrosoft Developer Relations forumDiscussion of a variety of developer topics; no support.0 }52‚5' €€¬‚R˜€#‚ÿMSLANGwR‚5©‚5% €¤€°˜€‚ÿLanguage support for C/C++, COBOL, FORTRAN, Macro Assembler, Pascal, and QuickC2 2‚5ۂ5' €€¬‚R˜€#‚ÿMSLANG32e@©‚5@ƒ5% €€€°˜€‚ÿTimely and useful information on the 32-bit language products0 ۂ5pƒ5' €€¬‚R˜€#‚ÿWINOBJ›v@ƒ5 „5% €ì€°˜€‚ÿProvides an open platform for discussion and technical assistance on Microsoft Windows Object products, such as OLE4
pƒ5?„5' €€¬‚R˜€#‚ÿMSNETWORKS~Y „5½„5% €²€°˜€‚ÿClient-Server Computing forum with sections on LAN Manager and other networking issues/?„5ì„5' €€¬‚R˜€#‚ÿMSSQLj½„5|…5& €Ô€°˜€‚‚ÿSupport for Microsoft SQL ServerEnd users can also access this forum from the developer services area.1
ì„5­…5' €€¬‚R˜€#‚ÿMSWin32E |…5ò…5% €@€°˜€‚ÿMicrosoft Win32 support forum1
­…5#†5' €€¬‚R˜€#‚ÿPROGSMA³Œò…5ֆ5' €€°˜€‚‚ÿSupport for WordBasic and the Excel Software Developer's Kit (SDK)End users can also access this forum from the developer services area.0 #†5‡5' €€¬‚R˜€#‚ÿWINEXTzUֆ5€‡5% €ª€°˜€‚ÿWindows Extensions forum with support for the Pen Software Developer's Kit and OLE0 ‡5°‡5' €€¬‚R˜€#‚ÿWINSDKV1€‡5ˆ5% €b€°˜€‚ÿWindows Software Development Kit support forum­|°‡5³ˆ51Èÿÿÿÿqko³ˆ5öˆ5Œ5Windows NT Compared to OS/2EB("btn_topic_index");SaveMark("topic_index");CBB("btn_next_index", "PI(`nteval.hlp',`Next_2')")Cˆ5öˆ5% €<€°˜€‚ÿWindows NT Compared to OS/2"ü³ˆ5‹5& €ù€°˜€‚ÿIf you are considering purchasing an OS/2® 2.1 system or expanding your present system to include OS/2 2.1, it is worthwhile to evaluate how OS/2 2.1 compares with the Windows NT™ operating system. Although they do share some design and implementation goals to solve common business problems, Windows NT and OS/2 2.1 are very different architecturally. This subject discusses both the similarities and the differences between the two systems and examines their suitability for key roles in the enterprise.uþöˆ5Œ5w ¼€ý€˜˜ãAP-F€
‰€ ‚ã]Yze€
‰€‚ãßđ‰€
‰€ ‚ãw¯BR€
‰€ ‚ã|n”€
‰€‚ã7L?"€
‰‚㸢ôʉ€ ‚ÿPerspective on Windows NT and OS/2Why Windows NT is of Special Interest to OS/2 CustomersEnd-User PerspectiveSystem Administrators PerspectiveFeatures In CommonWindows NT Unique FeaturesFeatures of OS/2 not In Windows NTZ)‹5çŒ51YkI‡opçŒ5F5°Ä5Comparing Windows NT to OS/2 - Background_:Œ5F5% €t€˜˜€‚ÿWhy Windows NT is of Special Interest to OS/2 CustomersT.çŒ5š5& €\€°°˜€‚ÿWindows NT and OS/2 share a common lineage.WF55À58 >€¯€°˜€€ €âÐ €
‰€‚ÿIn 1988, Microsoft and IBM made the strategic decision to completely rewrite OS/2 and create a portable, scaleable, and powerful new operating system for the 1990s and beyond. This was the beginning of the project to design Windows NT. Unlike OS/2 2.1, which is based largely on its OS/2 1.x predecessors, Windows NT would leave behind the legacy 16-bit code written primarily for the Intel® 286 processor. Former VMS architect, Dave Cutler, and his development team were brought in to develop a modern, 32-bit, portable operating system. At one time,š55À5Œ5 Windows NT was to be OS/2 version 3.0.óš5SÂ5+ $€ç€°˜€‚‚€‚ÿDevelopment for OS/2 3.0 began in 1988. While design specifications were submitted by both IBM and Microsoft, development for the product was done at Microsoft.For OS/2 1.X users, the Presentation Manager user interface is similar in many ways to Windows NT, making it easy for users to navigate through the system. Additionally, character-based and presentation manager programs written for OS/2 1.X are supported under the OS/2 subsystem in Windows NT.Key Support for OS/2 1.X users Include:]5À5°Ä5> J€?€°˜€
€‚€
€‚€
€‚€
€‚ÿSingle Command Prompt - This command prompt supports all OS/2, LAN Manager and most LAN Server commands.OS/2 application Support - Support for OS/2 1.X character and PRESENTATION MANAGER-based applications.Migration Tools - Microsoft offers a complete set of migration tools to move LAN Manager users easily to Windows NT Advanced Server.Support for HPFS -Windows NT supports existing HPFS Volumes. Should you wish to migrate to the Windows NT File System (NTFS) Windows NT provides graphical migration utilities for this process.\+SÂ5 Å51£o™lq Å5_Å5ÑÈ5Features Common to Both Windows NT and OS/2S.°Ä5_Å5% €\€˜˜€‚ÿFeatures Common to Both Windows NT and OS/2j Å5ïÅ5& €Ô€°°˜€‚ÿThe goal of both Windows NT and OS/2 2.1 is to improve your productivity through innovative technology.‡a_Å5vÇ5& €Ã€°˜€‚ÿThis allows you to focus on information and results, not the process of gathering that information, or the tools necessary to manipulate it. However, the implementation of Windows NT gives you greater flexibility to choose from a wider range of hardware and software, as well as better access to data that may exist in legacy systems or on other PCs.[ëïÅ5ÑÈ5p ®€×€˜˜ãæwHӀ
‰€‚ãpXph€
‰€‚㻥2 €
‰€‚㞃°ñ€
‰€ ‚â®c-ë€
‰€‚â
Úb€
‰€‚ÿMultithreading and Preemptive MultitaskingRobust SystemSupport for MS-DOS, 16bit Windows-based and OS/2 1.X ApplicationsIntegration with SNA EnvironmentsFlat Memory ModelSupport for FAT, HPFS File Systems^-vÇ5/É51ÈI‡oàƒnr/É5„É5Î5Comparing Windows NT to OS/2 - MultithreadingU0ÑÈ5„É5% €`€˜˜€‚ÿMultithreading: Comparing Windows NT and OS/2kE/É5ïÉ5& €Š€°°˜€‚ÿBoth OS/2 and Windows NT support multithreading and multitasking. <ò„É5+Ì5J b€å€°˜€âӏŽì€
‰€âÀâ¾Ó€
‰€â“]r€
‰€‚ÿThis means that you can design an application, a spreadsheet for instance, to simultaneously recalculate a large volume of cells, print a large report, and rearrange cells. Windows NT can distribute each thread context of each process over multiple processors, allowing applications to scale over multiple processors for efficient capacity planning. (See Example) OS/2 cannot provide the same multithreading capability because it only supports single processor, Intel-based machines.ð½ïÉ5Î53 4€{€°˜€‚㠏
‰€‚ÿThe multitasking capabilities of Windows NT are also designed to prevent message queues from monopolizing the processor. Because OS/2 employs a synchronous input queue, the system can freeze or appear to halt due to the fact that input queue must wait for an application to finish its routine. An ill-behaved application may not give back processor time to other applications.Why Multitasking is More Effective Under Windows NT Than OS/2h7+Ì5ƒÎ51ÿÿÿÿÿÿÿÿsÿÿÿÿƒÎ5x6Comparing Windows NT to OS/2 - Multithreading - Example.
Î5±Î5$ €€˜€‚ÿExample»•ƒÎ5x6& €+€°˜€‚ÿAn excellent example of this is SQL Server for Windows NT. SQL Server creates a new thread for each user on the system, allowing Windows NT to schedule the threads to use whichever processor is available, improving response time from the database server. Windows NT handles the thread-scheduling ±Î5x6Î5of all applications, thus eliminating many of complexities that arise with multi-user server applications.a0±Î5Ù61×àƒnotÙ6>6ä6OS/2 - How Multitasking Can Cause a System Crashe@x6>6% €€€˜˜€‚ÿWhy Multitasking is More Effective Under Windows NT than OS/2ˆaÙ6Æ6' €Ã€°°˜€‚ÿMultitasking operating systems with windowing capabilities manage messages from simultaneously-running applications with message queues. Problems can occur, however, if one single message queue manages both internal system tasks and application tasks, which is the situation with OS/2. In this case, an application can monopolize, and even crash the system by blocking the message queue. Busy applications can also freeze the system (when printing a long document, for example), and make you wait for them to finish. When this happens, the main benefit of multitasking, namely higher productivity, is lost.ø>6ä6& €ñ€°˜€‚ÿTo prevent this, Windows NT separates the system message queue from the application/window queue. The operating system can then shut down any application that no longer responds to system requests, and the user's service continues uninterrupted.],Æ6A61΄k¥
luA6•626Comparing Windows NT to OS/2 - Robust SystemT/ä6•6% €^€˜˜€‚ÿRobust System: Comparing Windows NT and OS/2 ßA6 6, &€¿€°˜€€ €‚ÿBoth OS/2 and Windows NT offer better reliability than the MS-DOS® operating environment. However, because Windows NT is a completely new, modular 32-bit operating system built on the experience of OS/2, it offers you:¨b•6H6F \€Ä€V˜°¶L‚6€ƒ€
€‚€ƒ€
€‚€ƒ€
€‚ÿ·Better protection·Better performance·Higher reliability for business applicationsP* 6˜6& €T€˜°˜€‚ÿHow Windows NT achieves these benefits:šRH626H `€¤€˜˜ãÜÖ{m€
‰€‚âtŠ0€
‰€‚ã–†’ø€
‰€‚ÿ32bit operating environmentHardware IsolationApplication Isolation[*˜661p¥
lĈlv6ß66Application Isolation: Windows NT and OS/2R-26ß6% €Z€˜˜€‚ÿApplication Isolation: Windows NT and OS/2št6y 6& €é€°˜€‚ÿBy running each application in its own protected subsystem, Windows NT ensures that no application can crash the system. 32-Bit applications run in their own protected address space and therefore cannot cras