University of Southwestern Louisiana, Lafayette, LA
Now (2003) known as the University of Louisiana at Lafayette.
3 L68 CPUs, 12 MSU0451, 4 MSU0501
Jim Hildebrand, Pat Lyon, Larry Merritt
Warren Johnson, James Dugal, Steve Landry
Bill Haga, Bill Watt, and Ken Byrd.
Peter Bahrs, Rose Carinhas, Stan Chesnutt, Ken Clement, Matt Delcambre, Brian Doré, Bryan Durio, Edmund Gallizzi, Ken Horton, Randall Jouett, Craig Martin, Sammy Migues, Lane Robert, Paul Rogers, Robert Sonnier, Johnnie Stafford, Jim Stephens, Bill Tims, Mary Tims, Scott Sheppard, Julie Jackson
One of the main selling points for Multics was that both university administration and student computing took place on the same machine.
When IBM PCs became available, there was a project at USL funded by NASA to see how to distribute function between PCs and Multics. Wayne D. Dominick THE USL NASA PC R&D PROJECT: GENERAL SPECIFICATIONS OF OBJECTIVES, 1984. http://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa.gov/19890005603.pdf Dennis Moreau, THE USL NASA PC R&D DEVELOPMENT ENVIRONMENTT STANDARDS, 1984. http://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa.gov/19890005604.pdf Spiros Triantafyllopoulos, A PERFORMANCE EVALUATION OF THE IBM 370/XT PERSONAL COMPUTER, 1984. http://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa.gov/19890005611.pdf
An application called Dataflow Simulation System (DFSS) was written at USL and used to analyze software fault tolerance (SIFT) coded in Pascal in the 1980s. The Multics version was written in PL/I. http://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa.gov/19840014162.pdf
I-Hsiung Liu's Concepts and implementations of natural language query systems, 1984. used the MADAM (Multics Approach to Data Access and Management) system. http://ntrs.nasa.gov/search.jsp?R=19890005583
One of the first university Multics sales after MIT. USL had a swamp on campus with real alligators.
See Ron Riedesel's story about Installing USL.
Also see the (untrue, but funny) Louisiana State Trooper Story.
[Jim Stephens] Much work on the DN355 there, there were more terminals on that system than previous systems sold.
[Jim Stephens] I broke the Ring 1 security used for mail and caused a minor panic by using it to get into Ring 1 w/o authorization.
[Jim Stephens] I had a program that was stolen from the send messages command, called "send command". Once you did an "accept command" for some unknowing user, you could go to another terminal and do a "send command" to that user and have it executed w/o any indication to the user that you were doing it. The star trek game that was run locally had a log facility that I read, and if I were to have been a bad user, could have been used as an early "trojan" to do an "accept command" for any user, just by setting a trap for him / her. I do know that one of the Honeywell SA's saw the log and reamed some of the sys admin users for running the game on their SA accounts. Since I was an employee of the University, I did all this mischief as a "good" guy and never did any nasty stuff to anyone (not even cookie).
[Julie Jackson Sibert] I was assigned to the computer center for my work-study job and while there, I taught many Multics User classes to both faculty and students. I also developed several user guides.
[Ron Riedesel] Here is a USL Site Profile (Honeywell marketing document) salvaged from the Great Garage Clean up of '03. This was a Honeywell promotional profile of the USL site, probably from 1976 or 1977.
(Click any image for a larger view)
Information from Ron Riedesel, Bryan Durio, Jim Stephens, and Julie Sibert.