Cray-Cyber Logo

General Links:
Start Page
Make a donation
Result of the Logo contest 
Links Page
Contact us
Frequently asked questions
Thanks

Live Information:
Webcams
Diary

Access:
Access Request
Terms of usage
A/Detaching sessions
Transfering files

Information area:
Press
History

About the systems:
Cray Y-MP EL (yel)
Cyber 960 (cy960)
Cyber 860 (cy860)
Cyber 830 (phoenix)
Desktop Cyber (dtcyber)
Control Data Net (cdcnet)
SGI Origin 2000 (o2000)
CData 4680 (majestix)
Sun Enterprise 10000 (e10k)
Cray T3E (t3e)
NEC SX-4B (sx4b)
NEC UP4800/675 (siox)
Cray J916 (uhu)
Cray J932 (huh)
Cray C90
Cray T3D
Fujitsu VPP300 (vpp)
Bull DPS 6000
Login server (server)
Successful SW-Ports
System Logbooks

Documentation:
Search engine
List of all books
Suggested reading
CDC Models
Papers & Talks
On German Computers

Pictures:
General pictures
Deinstallation of CY830s
CDC Cyber Boards
Tours day on Nov 23rd 2002
Tours day on Nov 29th 2003
Tours day on Nov 27th 2004
Picking up a Cray J932
Acquisition of IPPs Cray J916
The move
The renovation
Vintage computer rooms
Operating a DEC10
Screenshots CC545
Air Conditioning
Cyber 2000 from Zurich (external)
Moving to datArena (external, short overview)
Moving to datArena (external, long version)

Hardware Projects
Cyber Disk Emulator
MUNIAC Vacuum Tube Computer

Team Members:
John G. Zabolitzky
Alexander Mann
Freddy Meerwaldt
Wolfgang Stief

In memory of:
Seymour Cray
Control Data Corp
Cray Research
Cray Computer Corp
ERA
 

RSS Feed
 
Make a donation
 

Terms of usage:

Preface: In order to use the cray-cyber-network you have to agree to the following terms of usage. NOTE: By logging in (even to a guest account) you are agreeing to these terms. Doing anything which is against these rules will have consequences such as the deletion of your account or even the ban of your IP (-range).

0. Persons authorized to use the systems:
Our computer systems may not be used by citizens coming from one of the following states (or from a national resident of): Cuba, Iraq, Libya, Sudan, North Korea, Iran, Syria or any other country to which the U.S. has embargoed goods.
The usage of our computing systems for military purposes (especially the research of nuclear, chemical and biological weapons or their rocket carrier systems) is also prohibited.
Furthermore, only non-commercial use of the systems is allowed. The usage of our systems is forbidden if you plan to make money with your work where you used (even one) of our systems for.

1. Security:
You are not allowed to give away your password to any third party - it's no problem to get an account, so better obtain an own one.
Furthermore, we advice the logon via SSH (encrypted connection) but telnet login is still possible. There is a SSH client for almost every operating system - see http://www.freessh.org.
For more information about logging in, see how to access the systems.

2. Take care of other users:
You are not the only user of the systems, so please take care.
Do not cause heavy traffic such as uploading/downloading huge files etc. as we only have a limited bandwidth of 768 kBit down and 384 kBit up.
If you have large files to transfer, don't transfer them on saturdays, but better during the other days.
Do not run prewritten CPU-intensive procesess such as Seti@Home - other users want some time, too.
This rule doesn't include selfwritten programs - if you have a project you want to be computed on one of our computers, feel free to start it, but if you do please keep in mind that these are vector-computers and so don't run a program which doesn't make any use of the vector-features.

3. Take care about the operators:
Remember that it's our time we are spending in order to give you the opportunety to play with this old iron.
So please always provide your real information if you're asked to do so (especially guest logins)
Do not use these systems for commercial use, or if you plan to do so, please contact us at mail@cray-cyber.org so we can vote about your plan - you will hear from us, but without explicit permission, commercial use is forbidden.
If you try to do something bad to a machine, or try to gain more privileges than you were given, or try to abuse the privileges you were given, your account will be deleted instantly and if you continue, your IP(-range) will be banned (think about other users of the same network - they won't like it ;))
Don't use these machines as a free storage - disk space at these times was expansive, and we only have a limited number of HDDs available.
If you request an account, make sure you use it from time to time, too - nothing is more annoying than creating an account which is never being used.

Generally: Think before you act!!!

The administrators preserve the right to ban a user from the network without a certain reason (they normally won't do so, but you know youself what's stupid and what is not).
These machines are originally intended to preserve the old culture and machines and make them available for everyone who just wants to play around, do software developing or whatever.
Everyone is welcome, have a great time and do not hestitate to contact us if you have questions.

These terms are subject to change at any time without further notice.

All content on www.cray-cyber.org and all subsites of www.cray-cyber.org are Copyright © 2002-2007 by the Cray-Cyber Team
Cray is a registered trademark of Cray Inc.

Document last modified on: Sun, 12.October.2014 16:07:00