DataMuseum.dk

Presents historical artifacts from the history of:

RegneCentralen RC759 "Piccoline"

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about RegneCentralen RC759 "Piccoline"

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 5 A B C D G I L M N P R S T V X

⟦83018c2fb⟧ Bits:30004537/disk2.imd SW1400 Piccoline Distributions system 2.2, 5¼" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1261568 (0x134000)
    Description: Bits:30004537/disk2.imd SW1400 Piccoline Distributions system 2.2
    Types: 5¼" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CP/M-fs(1024_2048_0x0_*1+1_2:0_76:1_128)

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 8] {1024: 1232}
Signature:         1024_2048_0x0_*1+1_2:0_76:1_128
Confidence score:  +114/-0 
Sector size:       1024
Block size:        2048
Directory entries: 128
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0012544ADDNET.CMD⟦5b727c266⟧
0015744BDOS.CON⟦c6238f917⟧
00133632CCPM.SYS⟦6c4cddac6⟧
0094848CCPM1.SYS⟦56afd7d58⟧
00104448CCPM4.SYS⟦ac2e674ac⟧
005504CIO.CON⟦a0e22260b⟧
00640CLOCK.RSP⟦9b24ff61d⟧
0024192CPADDNET.CMD⟦2230ef36d⟧
0041344CPGENNET.CMD⟦32cb584f7⟧
0029312DRNET.CMD⟦812b320da⟧
0012800DSP.CMD⟦acf6871d9⟧
0052608GENCCPM.CMD⟦10bdc9af3⟧
0012544GENNET.CMD⟦cb9d43b50⟧
0011392LOCAL.CMD⟦df81e6a32⟧
0016512LOGOFF.CMD⟦054f6893e⟧
0018432LOGON.CMD⟦5c08fe7ab⟧
006144MEM.CON⟦b337452b1⟧
0016000NAMES.CMD⟦003bd88d2⟧
0022912NAMESMOD.CMD⟦ea69a1aa9⟧
0017536NET.CMD⟦4f982e6be⟧
0017664NETDRV.RSP⟦6de4aef19⟧
0016384NETOFF.CMD⟦8243b6545⟧
0016384NETON.CMD⟦e8a524556⟧
0017920NETSTAT.CMD⟦c67d05638⟧
0038272NETVEDL.CMD⟦28ea7c0bf⟧
001792NIOS.CMD⟦ff28041a4⟧
003328PIN.RSP⟦65c9cbd7d⟧
001152R.CMD⟦fda426646⟧
00128RDEF1⟦6ffaa521c⟧ TextFile
00128RDEF4⟦49338253a⟧ TextFile
0027264RNET.CMD⟦ac6b840a8⟧
00128RSDEF1⟦304ce49ff⟧ TextFile
00128RSDEF4⟦7f3f51e99⟧ TextFile
0033408RSNET.CMD⟦d9b9ed1a0⟧
007552RTM.CON⟦ed2a3426e⟧
00640SCROLL.RSP⟦a29593a77⟧
00128SDEF⟦4eb454ef9⟧ TextFile
0019712SNET.CMD⟦2d48a0550⟧
0021120SPL.CMD⟦ffcd99468⟧
0033664SPOOL.CMD⟦9eb13831a⟧
00256STDKONF⟦5ddf5f22d⟧ TextFile
005632SUP.CON⟦0997a105a⟧
003328SYSDAT.CON⟦13f8b41e3⟧
007168TMP759.RSP⟦f6e807852⟧
002944VOUT.RSP⟦f665ed891⟧
0025472XIOS1.CON⟦91e0053ed⟧
0029056XIOS4.CON⟦5ad68f681⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 8]]

First credible dirsect is: (2, 0, 1) at 0x8000 with 0x8 attribute records

Credible directory tracks:
   (2, 0)  0x8000 25-25-25-20-1-1-1-1
   (2, 1)  0xa000 1-1-1-1-1-1-1-1

Total credibility: 91

Block number width: ok16

   8   290     1   254   210  False
  16     0     8   510     0  False

Block Sizes:
    2048 0x00 +90 -0
    1024 0x00 +11 -79
    4096 0x01 +10 -80
    8192 0x03 +10 -80
   16384 0x07 +10 -80
   32768 0x0f +10 -80
   65536 0x1f +10 -80
     256 0x00 +7 -83
     512 0x00 +7 -83
     128 0x00 +6 -84

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8)                                                         [24, 24, 24, 19]   +114/-0
     26  normal-2     (1-3-5-7-2-4-6-8)                                                         [24, 24, 0, 0, 24, 19]   +97/-20
     51  normal-3     (1-4-7-2-5-8-3-6)                                                         [24, 19, 0, 24, 0, 0, 24]   +103/-16
From the beastiarium: CpmFSCr16   +0/-0
From the beastiarium: CpmFSJames   +0/-0

File & label names found:
  0x0008000 (2, 0, 1)
    ProbeDirEnt {status=0x20, name=»PIC2-2  2-3«, xl=0x31, bc=0x00, xh=0x00, rc=0x00, al=0000000000000000a10821010f0a2110}
    ProbeDirEnt {status=0x00, name=»ADDNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=080009000a000b000c000d000e000000}
    ProbeDirEnt {status=0x00, name=»BDOS    CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x7b, al=0f001000110012001300140015001600}
    ProbeDirEnt {status=0x00, name=»CIO     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2b, al=17001800190000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CLOCK   RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=1a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1b001c001d001e001f00200021002200}
    ProbeDirEnt {status=0x00, name=»CPADDNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x3d, al=23002400250026000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2700280029002a002b002c002d002e00}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=2f003000310032003300340035003600}
    ProbeDirEnt {status=0x00, name=»CPGENNETCMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x43, al=3700380039003a003b00000000000000}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3c003d003e003f004000410042004300}
    ProbeDirEnt {status=0x00, name=»DRNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x65, al=4400450046004700480049004a000000}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4b004c004d004e004f00500051005200}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5300540055005600570058005900eb00}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5a005b005c005d005e005f0060006100}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=62006300640065006600670068006900}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6a006b006c006d006e006f0070007100}
    ProbeDirEnt {status=0x00, name=»GENCCPM CMD«, xl=0x03, bc=0x00, xh=0x00, rc=0x1b, al=72007300000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»GENNET  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x62, al=7400750076007700780079007a000000}
    ProbeDirEnt {status=0x00, name=»MEM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=7b007c007d0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500}
    ProbeDirEnt {status=0x00, name=»NETDRV  RSP«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=86000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8700880089008a008b008c008d008e00}
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=8f009000910092009300940095009600}
  0x0008400 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»NETVEDL CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x2b, al=97009800990000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIN     RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=9a009b00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»R       CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=9c000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9d009e009f00a000a100a200a300a400}
    ProbeDirEnt {status=0x00, name=»RNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x55, al=a500a600a700a800a900aa0000000000}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ab00ac00ad00ae00af00b000b100b200}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b300b400b500b600b700b800b900ba00}
    ProbeDirEnt {status=0x00, name=»RSNET   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x05, al=bb000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=bc00bd00be00bf00c000c100c200c300}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=c400c500c600c700c800c900ca00cb00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=cc00cd00ce00cf00d000d100d200d300}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=d400d500d600d700d800d900da00db00}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=dc00dd00de00df00e000e100e200e300}
    ProbeDirEnt {status=0x00, name=»CCPM1   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x65, al=e400e500e600e700e800e900ea000000}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=ec00ed00ee00ef00f000f100f200f300}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=f400f500f600f700f800f900fa00fb00}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=fc00fd00fe00ff000001010102010301}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=0401050106010701080109010a010b01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x80, al=0c010d010e010f011001110112011301}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x07, bc=0x00, xh=0x00, rc=0x80, al=1401150116011701180119011a011b01}
    ProbeDirEnt {status=0x00, name=»CCPM    SYS«, xl=0x08, bc=0x00, xh=0x00, rc=0x14, al=1c011d01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1e011f01200121012201230124012501}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=26012701280129012a012b012c012d01}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=2e012f01300131013201330134013501}
  0x0008800 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x03, bc=0x00, xh=0x00, rc=0x80, al=36013701380139013a013b013c013d01}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x04, bc=0x00, xh=0x00, rc=0x80, al=3e013f01400141014201430144014501}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x05, bc=0x00, xh=0x00, rc=0x80, al=46014701480149014a014b014c014d01}
    ProbeDirEnt {status=0x00, name=»CCPM4   SYS«, xl=0x06, bc=0x00, xh=0x00, rc=0x30, al=4e014f01500100000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=51015201530154015501560157015801}
    ProbeDirEnt {status=0x00, name=»XIOS4   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x63, al=59015a015b015c015d015e015f010000}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60016101620163016401650166016701}
    ProbeDirEnt {status=0x00, name=»SNET    CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x1a, al=68016901000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SUP     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=6a016b016c0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»SYSDAT  CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=6d016e01000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VOUT    RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x17, al=6f017001000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RTM     CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x3b, al=71017201730174010000000000000000}
    ProbeDirEnt {status=0x00, name=»TMP759  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=75017601770178010000000000000000}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=79017a017b017c017d017e017f018001}
    ProbeDirEnt {status=0x00, name=»LOGOFF  CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x01, al=81010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x7d, al=82018301840185018601870188018901}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8a018b018c018d018e018f0190019101}
    ProbeDirEnt {status=0x00, name=»NET     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x09, al=92010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NETON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=93019401950196019701980199019a01}
    ProbeDirEnt {status=0x00, name=»SPL     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=9b019c019d019e019f01a001a101a201}
    ProbeDirEnt {status=0x00, name=»SPL     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x25, al=a301a401a50100000000000000000000}
    ProbeDirEnt {status=0x00, name=»LOCAL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=a601a701a801a901aa01ab0100000000}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=ac01ad01ae01af01b001b101b201b301}
    ProbeDirEnt {status=0x00, name=»LOGON   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=b4010000000000000000000000000000}
  0x0008c00 (2, 0, 4)
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=b501b601b701b801b901ba01bb01bc01}
    ProbeDirEnt {status=0x00, name=»NAMESMODCMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x33, al=bd01be01bf01c0010000000000000000}
    ProbeDirEnt {status=0x00, name=»NETOFF  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c101c201c301c401c501c601c701c801}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=c901ca01cb01cc01cd01ce01cf01d001}
    ProbeDirEnt {status=0x00, name=»NETSTAT CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x0c, al=d1010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=d201d301d401d501d601d701d801d901}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=da01db01dc01dd01de01df01e001e101}
    ProbeDirEnt {status=0x00, name=»SPOOL   CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x07, al=e2010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NIOS    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=e3010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DSP     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x64, al=e401e501e601e701e801e901ea010000}
    ProbeDirEnt {status=0x00, name=»SDEF       «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=eb010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RDEF4      «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ec010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RDEF1      «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ed010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSDEF4     «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ee010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»RSDEF1     «, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=ef010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=f001f101f201f301f401f501f601f701}
    ProbeDirEnt {status=0x00, name=»XIOS1   CON«, xl=0x01, bc=0x00, xh=0x00, rc=0x47, al=f801f901fa01fb01fc01000000000000}
    ProbeDirEnt {status=0x00, name=»STDKONF    «, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=fd010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SCROLL  RSP«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=fe010000000000000000000000000000}
* 114 -   0 [1, 2, 3, 4, 5, 6, 7, 8]
+ 103 -  16 [1, 4, 7, 2, 5, 8, 3, 6]
+  97 -  20 [1, 3, 5, 7, 2, 4, 6, 8]

Full view