text stringlengths 1 160k | label class label 20
classes |
|---|---|
I have a question for y'all:
I'm looking at an ad for the new 3.5" FAST SCSI-2 drives from Micropolis
in the June, 1993, MacWorld. (I have seen similar ads for the IDE versions
in IBM PC magazines)
Well, the ad says that all three drives have a FAST SCSI-2 interface,
but then it says that the DTR rate for each drive is 5 megabytes/second,
*max*.
How can this be? I thought that if a drive was to be FAST SCSI-2 it
had to have a DTR of 10megs a second?
(I am assuming the 5megs/sec claim by Micropolis is from the 512k cache.
I admit that I would be very impressed if the drive can *read/write* data
at 5megs a second!)
Thank you.
| 4comp.sys.mac.hardware |
In article <1993Apr16.205724.26258@mnemosyne.cs.du.edu> smace@nyx.cs.du.edu (Scott Mace) writes:
>
>Have you ever seen what happens when you hook a busmaster controller to
>a vesa local bus. It actually slows down your system.....
>
>If you don't belive what I said about busmastering and vlbus then pick
>up a back issue of PC-week in whihc they tested vlbus, eisa and isa
>busmastering cards.
Is VLB busmastering bad because it stops the processor fetching from
external cache as well as main memory while the VLB card has the bus?
How significant is the slowing effect?
| 3comp.sys.ibm.pc.hardware |
<RVESTERM@vma.cc.nd.edu> writes:
[Some discussion about whether Elias is money grubbing deleted]
>funny, it seems to me that the stats major league and minor league handbooks,
>which are nothing BUT collections of statistics, are authored by "bill james
>and stats inc. (and howe, for the minor league handbook)".
>and i am not sure how the 1993 bill james player ratings book qualifies
>as a "book with statistics", while the elias analyst is a "statistics book".
>the analyst contains more stats, sure, but it also contains more dialogue.
>finally, the point was not about the word "statistics". it was about
>"money-grubbing". i don't see how anyone who has looked at the bill
>james player ratings book cannot consider him money-grubbing.
>bob vesterman.
Some thoughts and facts,
1.) Bill James is a partial owner of STATS, inc. However he has almost
nothing to do with the day-to-day operations of the company, although he
does have significant input into the design of the books that bear his name.
(The handbook, but not the scoreboard). To the best of my knowledge, the
only things that Bill actually writes for STATS are the predictions section
of the handbook, and the Bill James Fantasy Baseball rulebook.
2.) The debate over Elias goes way back. Bill James' early stuff was hampered
by the fact that Elias would not give access to their stats at any price.
Project Scoresheet, and later, STATS were founded to fill this void. You
can call STATS, and ask them for a report on just about anything in their
database, and they will provide it -- for a price, of course. Or you could
just log into their online system and look at the data yourself. Having
attempted to pry numbers from Elias in the past (football, not baseball), they
just don't do that. In STATS eyes, the high ground comes from making the
information available at all.
3.) That being said, I'm pretty dissapointed by Bill's book this year, too.
I am given to understant that it was mostly a response to the publishers
desire to have the book come out sooner than April.
Hope this makes things just a little bit clearer.
(Bias alert. I am a former part-time employee of STATS.)
Noel Rappin
noel@chaos.cs.brandeis.edu
| 9rec.sport.baseball |
In article <TOM.93Apr20125808@amber.ssd.csd.harris.com> tom@ssd.csd.harris.com (Tom Horsley) writes:
>The *real* way to speed up ballgames is for each home park owner to offer the
>following schedule of bonuses to players on *both* teams:
>
[...details deleted...]
>I suspect you could finance this the same way Presidential campaigns are
>paid for. Offer each fan a checkoff on his or her ticket that says "I want
>5% of the price of this ticket to go towards fast game bonuses"...
Oh, great. We fans can subsidize the cost of speeding up the games
that we don't want to see sped up. Terrific.
Oh. I forgot. Checking off that box to finance Presidential campaigns
doesn't cost us taxpayers anything.
Do you believe in the Tooth Fairy, too?
-- The Beastmaster
(sorry. I hate to be so sarcastic on such a beautiful day.)
--
Mark Singer
mss@netcom.com
| 9rec.sport.baseball |
In a message of <Apr 19 04:55>, jgarland@kean.ucs.mun.ca writes:
>In article <1993Apr19.020359.26996@sq.sq.com>, msb@sq.sq.com (Mark Brader)
>writes:
MB> So the
MB> 1970 figure seems unlikely to actually be anything but a perijove.
JG>Sorry, _perijoves_...I'm not used to talking this language.
Couldn't we just say periapsis or apoapsis?
--- msged 2.07
| 14sci.space |
stubbs@hawk.cs.ukans.edu (Jerry Stubbs) writes:
> The electricy consumption will go down if you turn them off overnight,
> along with heat.
I wonder how hard it would be (i.e. what it would add to the cost)
to design desktop machines with a power saver feature built in which would
reduce power consumption automatically if the machine is idle for more than
some amount of time. This is pretty standard in portable machines, and the
same kinds of tricks could be played; spinning down disks, turning off
screens, reducing clock speed, etc. The advantage of this over just turning
the thing off would be 1) you don't have to remember to do anything and 2)
the machine is still available over the network.
The tricky part might be in defining what constitutes inactivity.
Certainly, you don't want to wake up from sleep mode just because somebody
pinged you, but you do want to wake up (at least the CPU) if somebody
logs in via a telnet connection.
I wouldn't worry too much about wasting electricity in the winter
months; that energy is just getting turned into heat. It may not be as
efficient a way to heat a building as the central heating plant, but it's
not too bad. In the summer though, it's a disaster. Not only are you
wasting that power, but you're probably also running the air conditioning to
get rid of the waste heat.
--
Roy Smith <roy@nyu.edu>
Hippocrates Project, Department of Microbiology, Coles 202
NYU School of Medicine, 550 First Avenue, New York, NY 10016
"This never happened to Bart Simpson."
| 4comp.sys.mac.hardware |
In article <1993Apr25.013013.13717@cronkite.ocis.temple.edu>, camter28@astro.ocis.temple.edu (Carter Ames) writes:
>
> I thought the first thread was hilarious, so here goes another post.
>
> Some more background information on what has happened to my poor batteries.
>
> One year, I left the batteries in the garage. The garage is Unheated.
> They were left in their places that they needed to be. One in the riding
> lawnmower (what a lux) and one in each motorcycle. The battery in the
> riding lawnmower was about 3-4 years old, and one of the cycle batteries
> was new, and one was around 5 years old. Upon spring time, I discovered
> that all of the batteries were dead, and needed to be recharged. They all
> worked properly, except for the older ones, and they had to be replaced
> about halfway through the summer. (they had originally been stored
> in the garage, and I think I remember my dad charging them in spring)
> Last year, I decided to bring them in to the basement, which has two parts.
> one is dirt and brick, and the other is concrete. I brought in all three, and
> discovered in the spring, (about 15 days ago) that not only were the batteries
> dead, but when I put the charger on them, the charger said "HMMMMMMMM" and
> the amp-meter read around 1,000,000,000 (In other words, it was pinned)
> the internal circut tripped, and I went on to the other batteries. They
> were the same.
> Realizing that we still had 2 GIGANTIC sailboat batteries, also lead
> acid, I decided to put the charger on them. (these had been sitting for around 1 and a half years, on the brick and dirt part) and noticed that they only
> needed a small charge, around 2 hours or so on trickle. I tested them
> by using them at the local gas station for giving jump starts, and they
> worked fine for around 25 of 'em.
> This leads me to believe one of several things.
> 1) I bought really #$%tty batteries last year. (sorta true)
> 2) the concrete has something to do with the discharge of the
> batteries.
> 3) There was enough moisture to short out the terminals in the
> room where the concrete is,
> 4) The dirt room was able to absorb the moisture in the air
> better than concrete.
>
> (BTW, I can almost waterski in the dirt room)
>
> Any other ideas?
> *could be the aliens, anything is possible.*
>
The lead-acid secondary cell releases energy (electricity) with the following
chemical reaction:
Pb + PbO2 + 2H2SO4 --> 2PbSO4 + 2H20
Lead and Lead (IV) Oxide and Sulfuric Acid produce Lead Sulfate and Water
The standard heats of formation at 25 C (77 F) of the various compounds are:
Heat of formation
Compound at 25 C, kcal/mole
-------- ------------------
Pb 0.00
PbO2 -65.0
H2SO4 -193.69
PbSO4 -218.5
H20 -68.3174
The heat of reaction at 25 C is therefore -60.6 kcal per mole PbSO4 produced.
Note that lead sulfate is not very soluble (0.0048 grams per 100 grams water
at 25 C), and it will thus precipitate out of solution where the reaction is
occurring, or the cathode (positive terminal) of the battery. (I am almost
sure it is the positive terminal where the precipitate forms, but I may be
wrong. Oh well, I don't have a corroded battery to corrobate, and I don't feel
like thinking through it right now.)
What is important to notice here is that the reaction, as you knew it would be,
is exothermic, or energy discharging. If moisture with dissolved electrolytes
(acid rain) condenses on the battery, a conductive path between the terminals
may form. This will discharge the battery as the chemical reaction proceeds.
The reaction is reversible, if electricity (from an alternator or battery
charger) is put back into the battery.
Lead-acid batteries must change in chemical composition to discharge. Each
cell has all the reactants necessary for the reaction. The non-reacting posts
(terminals) of the lead-acid battery are there to remove (or add) electric
energy during a discharge (or charge). Because the reaction is exothermic, it
has a tendency to happen, though quite slowly under normal circumstances. So
while keeping the battery dry is a good idea, it is not a total solution.
To understand why lead-acid batteries DO INDEED discharge faster when stored on
concrete as opposed to wood or earth (dirt), one should recall LeChatelier's
Principle, which can be paraphrased as: anything subjected to some stress will
act to move to a more comfortable position. Here are the thermal conductivities
of a some selected materials:
thermal conductivity
material Temperature, C (F) BTU/(hr-ft-ft)(F/ft)
-------- ------------------ --------------------
diatomaceous earth, 204 0.051
natural, across strata 871 0.077
diatomaceous, natural, 204 0.081
parallel to strata 871 0.106
diatomaceous earth powder (100) 0.039
(density, 18 lb/cu.ft) (200) 0.042
(300) 0.044
(400) 0.048
(500) 0.051
concrete (cinder) --- 0.20
(stone) --- 0.54
(1:4 dry) --- 0.44
pine (across grain) 15 0.087
(parallel to grain) 21 0.20
oak (across grain) 15 0.12
maple (across grain) 50 0.11
Note that the thermal conductivity for "dirt" (diatomaceous earth) goes down
with temperature. Also, 204 C is about 400 K, and the values for earth powder
are on the same order of magnitude as natural earth. The thermal conductivity
of concrete is around a factor of 10 greater than that of dirt, and is 2-4
times greater than wood.
It is these differences in thermal conductivity that cause the battery on
concrete to discharge faster than that on dirt or wood. At any instant the
discharge reaction is occurring, energy is being released, either as electricity
or heat. (Thermal conductivity of air is about 0.015 BTU/(hr-ft-ft)(F/ft).)
During storage, except for the trickle that passes through any condensate on
the battery, this energy is mostly released as heat. The higher conductivity
surface will remove the heat proportionately faster than the lower conductivity
surface. Thus, if you perfectly insulated a dry battery on all but the bottom
surface, at any given battery temperature above the storage surface temperature,
the battery on a concrete surface will be discharging about 10 times faster
than that on dirt.
This is where LeChatelier's principle comes into play. Removing energy from
the exothermic reaction will drive the reaction further to completion. If the
reaction normally occurs at room temperature, keeping the battery at that
temperature requires the removal of any heat produced. A concrete surface is
a better heat sink than a dirt or wood surface. Store a battery in the corner
of a poured concrete basement, and you have 3 surfaces removing energy, which
"pulls" the reaction along.
Also, if water evaporates from the battery, that elevates the ratio of sulfuric
acid to water. This will tend to drive the discharge reaction.
Jeff White jhwhit01@ulkyvx.louisville.edu
"How do I get the ketchup out of my pocket protector?" French fries!
| 12sci.electronics |
In article <1993Apr2.170955.1749@cmkrnl.com>, jeh@cmkrnl.com writes:
|> I might add that collecting last year's data books (or even ones two years out
|> of date) is usually pretty cheap, and has benefits besides: You usually DON'T
|> want to base a design on a brand-new chip. There may be bugs; availability may
|> be limited; the data sheets may be missing critical information that will show
|> up in the ap notes in next year's data books. Kinda like buying Version 1.0 of
|> a major new software package: Sometimes you get lucky, but don't count on it.
There are two more reasons to save old databooks and then beyond two
years--obsoleted parts and better application notes and tutorials.
When a part is dropped from future production planning, such as the
National MM-series white noise generators, camera sync generators, etc.,
it will disappear from current databooks although it still may be produced
for a short time (or be available from stock somewhere). Now, if you
have some old plans calling for such a device, or you have a dead
gadget on your workbench and it has such a part in it, you'll know
the functions so you can troubleshoot and substitute as necessary.
The old GE thyristor data books contain real good tutorials on
SCR and triac applications that are not found elsewhere, for
example.
|> > In summary, read. READ! ****READ!!!**** That's how you'll know what to
|> > design in, which parts to use, and how to solve the intractable problem
|> > that your boss has presented you with.
|>
|> It helps to have a prodigous memory for details...
Here, here!...
--
--------------------------------------------------------------------
Dave Medin Phone: (205) 730-3169 (w)
SSD--Networking (205) 837-1174 (h)
Intergraph Corp.
M/S GD3004 Internet: dtmedin@catbyte.b30.ingr.com
Huntsville, AL 35894 UUCP: ...uunet!ingr!b30!catbyte!dtmedin
******* Everywhere You Look (at least around my office) *******
* The opinions expressed here are mine (or those of my machine)
| 12sci.electronics |
In article <1qnupd$jpm@news.intercon.com> amanda@intercon.com (Amanda Walker) writes:
>jhesse@netcom.com (John Hesse) writes:
>> Oh great. Wonderful news. Nobody can listen in--except the feds.
>
>Hey, it's better than the status quo.
>
>I am far less worried about "the feds" tapping my phone than high school
>scanner surfers who get their kicks out of eavesdropping on cellular and
>cordless phone calls.
>
Really? Why are so you worried about high school kids "getting their kicks"
with scanners, as compared to what the feds can do, and have done, to their
targets?
"Better than the status quo" isn't good enough, I'd say. The same
technology could be implemented WITHOUT a back door open to the state.
We all know about power and corruption. But we all know that abuse is
something that only happens to the other guy.
>
>Amanda Walker
>InterCon Systems Corporation
>
>
--
------------------------------------------------------------------------------
John Hesse | A man,
jhesse@netcom.com | a plan,
Moss Beach, Calif | a canal, Bob.
------------------------------------------------------------------------------
| 11sci.crypt |
Dale sez;
>Mr. Hathaway's post is right on the money, if a little lengthy. In short,
>an orbiting billboard would be trash, in the same way that a billboard on
>the Earth is trash. Billboards make a place look trashy. That is why there
>are laws in many places prohibiting their use. The light pollution
>complaints are mainly an attempt to find some tangible reason to be against
>orbiting billboards because people don't feel morally justified to complain
>on the grounds that these things would defile the beauty of the sky.
I don't buy it. If the things had no value at all, people wouldn't
spend money to make them. So their lack of value is just your
opinion, not an actual fact, which is neither a philisophical or
legal basis for prohibiting them.
On the other hand, I lived in OakBrook IL for a while, where zoning
laws prohibit billboards, as you mention above. I think it was a
fine law, despite it's contradictory basis.
I would guess that the best legal and moral basis for protest would
be violation of private property. "I bought this house, out in
the boondocks, specifically to enjoy my hobby, amateur astronomy. Now
this billboard has made that investment worthless, so I want the
price of the property, in damages." It wouldn't take too many
succesful cases like that to make bill-sats prohibitively expensive.
-Tommy Mac
-------------------------------------------------------------------------
Tom McWilliams 517-355-2178 wk \ They communicated with the communists,
18084tm@ibm.cl.msu.edu 336-9591 hm \ and pacified the pacifists. -TimBuk3
-------------------------------------------------------------------------
| 14sci.space |
>>>>> On Tue, 27 Apr 1993 00:39:20 GMT, sarfatti@netcom.com (Jack Sarfatti) said:
js> Question: what is the power spectrum of the bursts. Are their sharp lines?
js> If so, can they be interpreted as blue-shifted atomic or molecular lines?
Don't remember the spectra, but have seen some autocorrelation functions
recently. The ACFs show correlation times of milliseconds to 10s of
seconds; interestingly, the higher energies show a shorter correlation
time.
js> Can electron-positron annihilation gammas be seen in the bursts? Are they
js> red shifted or blue shifted?
I believe there were claims from an earlier satellite (Ginga?) of
detection of cyclotron absorption lines. These lines were taken as
strong evidence for neutron stars being the objects responsible for
GRBs since the magnetic field indicated was 1.0E12, fairly typical
for a neutron star. However, Compton GRO has not seen any of these
lines and I get the impression that many are beginning to doubt whether
these lines were ever real.
js> Since the bursts are isotropic and maybe in the galactic halo they may
js> be saying something about dark matter in the halo.
*If* the bursts are in the halo, they most certainly are saying something
about dark matter there. However, if they are in the halo, in order
that they appear isotropic, the "core radius" of the halo (i.e. the
innermost region of the halo) has to be greater than about 50 kpc.
The halo itself would stretch much further than this. Since the
Andromeda Galaxy is only 700 kpc away, we should be seeing bursts
from that galaxy's halo, which we aren't.
js> If the bursts are something like the cosmic black body radiation from
js> way back then where are the red shifts - I mean cosmological red shifts?
Remember to get a redshift, one needs some type of emission or
absorption line so one can compare the observed line frequency
to the rest line frequency. Since no lines are seen in GRB spectra,
that comparison cannot be made.
--
| e-mail: lazio@astrosun.tn.cornell.edu
T. Joseph Lazio | phone: (607) 255-6420
| ICBM: 42 deg. 20' 08" N 76 deg. 28' 48" W
Cornell knows I exist?!? | STOP RAPE
| 14sci.space |
In article <C4zA0H.IHD@wetware.com> drieux@wetware.com writes:
>In article 1pamhpINN7d3@geraldo.cc.utexas.edu, taite@ccwf.cc.utexas.edu () writes:
>>I'm prepared to instruct individuals in the proper use and
>>handling of firearms.
>>As a Desert Storm vet with six years in the National Guard, I have a
>>great deal of experience in handling weapons and tactical training.
>ps: anyone up for a discussion of counter sniper operations?
>Security drills, Your Friend the Counter Terrorist Operation.....
If twit promises to train them in tactics and weapons handlings, I doubt
any of them will last long enough to become terrorists. Look for a sudden
rise in firearms accidents among the Fiends of the Fetus, though.
| 18talk.politics.misc |
In article <C5ovFr.C0u@dscomsa.desy.de> hallam@dscomsa.desy.de (Phill Hallam-Baker) writes:
>
>In article <VEAL.740.735074621@utkvm1.utk.edu>, VEAL@utkvm1.utk.edu (David Veal) writes:
>
>|>>|> If the Senate was less powerful than the House of Lords, than
>|>>|>we'd almost have to state that the House of Representatives was also.
>|>>|>(In fact, they both were, because the British government had much
>|>>|>greater power than did the American system).
>|>>
>|>>In principle no, in practice yes.
>|>
>|> In principle no? That they had less power of that they should have
>|>had less power?
>
>The British parliament in principle has absolute power. So does the Monarch.
>Much of the stability of the system rests on what is not defined clearly.
>In the case of a clear abuse by one side or the other the other side
>can act to remedy the situation.
Two institutions with absolute power. Cute.
Let's talk practicality, shall we? If the Monarch tried to
do something, what would happen?
>|>>If they were to start from a social welfare model instead of the current
>|>>"no state subsidy motto" they would be better placed. As it is there is
>|>>plenty of state money being handed out. The problem is that it is
>|>>distributed on the basis of power in congress and not on the basis of
>|>>actual need.
>|>
>|> Bingo. The higher up the governmental ladder the less actual
>|>need matters, because political power can be concentrated at higher
>|>levels, while people with less cloud only find themselves reduced to
>|>in effectiveness.
>
>That was not my point.
But you illustrated the problem very well.
>|>>In order to set up a school project in New York state you have to pay off the
>|>>other 49 states with pork - defense contracts, agricultural subsidies etc.
>|>>Or to be precise 30 of the states since you need 60 to beat the filibuster.
>|>
>|> Then why not simply leave New York's education to New York? I
>|>remain unconcinved that there is any state in the Union which is not capable
>|>of educating its own children if that's what they want to do.
>
>The point is of redistribution of cash from the poor areas of the ecconomy
>to the rich ones.
I am contending that there is no state in the Union which does
not have ample wealth, if they choose to spend it, to run a perfectly
acceptable Education system. (I further contend that the amount of money
being spent now is more then sufficient, but is being spent badly.)
>Or vice versa if you aren't a Republican.
So, tell me Phill. Were the Republicans also responsible for some
of the *huge* increases in social programs? Or were they *only*
responsible for what you don't like. (I contend it is Congress which
is to blame. Democrat and Republican alike.)
>If society
>simply writes off any areas of the country that is ecconomically weak you
>end up with a basket case ecconomy. There are inevitable cycles in any
>business. Some of these act in phase to produce the "business cycle".
>Others are countercyclic. Localities can experience boom to bust cycles
>outside the national trend. To produce a strong ecconomy you need to
>ensure that the bust areas do not fall bellow the level where they
>cannot be ecconomically rebuilt.
Most of our worst areas are still better off than most of Europe.
In any case, we're talking about *education*.
>If the industry in an area collapses
>the US as a whole still has a responsibility to ensure that the children
>in that area get a good education. In some areas of the US schools are closing
>halfway through the year for lack of money.
Yes, I live in once such area. You're woefully ignorant of the
situation.
At the same time some of Tennessee's school districts are closing
down, the Governor asked for 7.5 million dollars for bicentenntial
celebration license plats. In almost the same breath he wanted to raise
unemployment compensation and reduce taxes which paid into it.
I don't know about the rest of the country, but *our* education
problems stem directly from two problems, neither of which are a lack
of money in the state. (BTW, Tennessee is considered a "tax heaven"
and our economy is one of the strongest in the country. *I* see
a correlation.) 1) What money we spend goes primarly to administration.
The average administrator makes two and a half times what the average
teacher makes, and sucks up an enormous amount of revenue. And 2)
the Governor is making a concerted effort to create an "Education crisis"
in order to push for his pet income tax. Some of the most idiotic
programs get funded (like State funds for new art in the county seat)
while schools are closing. It's not a lack of funds. It's an
unwillingness to spend them on what is more appropriate. Education
is *the* parental hot-button. Education is *always* the first to
but cut, because it's easier to get people to pay for their children
than ugly art.
>|> The U.S. Constitution is a nuts-and-bolts document. The Delcaration
>|>of Independence was the high-brow reasoning. (There are a couple of other
>|>examples, though, such as the reasoning for the power to tax, and the
>|>reasoning for the power to grant permits, both in Article I, Section 8.)
>
>The Declaration on independence cam a decade earlier and has not a line
>of justification for the US constitution. You could argue that it went
>into the broad concepts but little more.
It spoke very eloquently on government being based on the
consent of the governed.
>In fact it is little more than
>a protracted whinge. More to do with the price of tea than the design of
>a government. It would be a pretty daft idea for a bunch of guys to
>sit arround designing the structure of the new government while the little
>matter of the British army remained to be settled.
They did it anyway. The Continental Congress had its own set of
bylaws. It wasn't quite a government, but a means of making decisions
had to be created. (However low George Washington's opinion of them were.)
>|> To a certain extend I do believe the veto has become something
>|>it wasn't intended. However, I also believe it is inevitable considering
>|>the Congress' own abuse of their power to make bills say whatever they
>|>want them to say. Unlike most people I think we shouldn't be worrying
>|>about the veto, which is fine, but of the problem in Congress which
>|>almost necessitates its abuse.
>
>The Congress is the most democratic body in the whole system.
Allow me again to speak heresy against the Holy Democratic Orders.
So what? The government was built with a very non-democratic Presidency
with fairly broad powers, including the veto.
>It has not only
>the fairest system of election but the two year term means that the
>members have always got a recent mandate.
Yes, and the Senate was intended to act as a balance to this.
Too much democracy was intentionally avoided. It was considered a good
thing to place non-democratic blocks to impulsive action.
>On the other hand if the period of election were to be made 4 years in
>antiphase to the Presidential cycle there would be much less dependence
>on fund raising from special interests than there is at present.
So long as Congress has something to sell, people will pay for
it. Most congressmen rake in more money than they need.
>|> Why not? What is inherently wrong with biasing the system
>|>against action? Historically governemnt action in the U.S. when
>|>dealing with issues with a bare minority and a large minority have
>|>not been successful. When you're in a position of imposing federal
>|>power on diverse people, why should the federal government not have to
>|>got through something more than a bare majority
>
>In other words David thinks that the reactionaries should need only 41
>votes while progressives should need 61.
No, if the "progressives" don't want the "reactionaries" to move
backward, they get the same benefit. 41% of the states is a *lot* of
people. And historically laws with that sort of minority arent'
very effective, especially since it is usually geographically
concentrated.
When wielding the Federal Big Stick I don't see why they shouldn't
have to make a better argument than, "more people than not," agree.
>Now we know why nobody calls the Republicans democrats.
I'm not a Republican. I'm a republican. :-)
And no, I'm neither a Democrat nor a democrat.
Now, I've asked several times, and all you've done is answer
"It isn't democratic," which I knew before I said it. Why *should*
it be democratic? We don't have a true direct democracy, and few
people advocate one. Why, then, is this other modification of
democracy to bias it against action so much worse?
------------------------------------------------------------------------
David Veal Univ. of Tenn. Div. of Cont. Education Info. Services Group
PA146008@utkvm1.utk.edu - "I still remember the way you laughed, the day
your pushed me down the elevator shaft; I'm beginning to think you don't
love me anymore." - "Weird Al"
| 18talk.politics.misc |
He sounds really cute, Morte! Kinds like _pete's dragon_, maybe smaller,
maybe a different species.. winge'd? (shakespear wing-ED)
I've always hat a horde of mice to turn to for fun & sort of that kind of
mouse in Cinderella (walt disney). I grew up sort of as an only child,
part time.. my siblings were 10-8-6 years older than me, so i was pretty
commonly a different sort of charater in their games (read: non speaking
hot cocoa-goffer, stand in (still silent) bad guy/good guy/etc), so my
mice were playmates, more than advisors.
Could curt, or whomever has a good list of books please post such list,
in all sorts of fields, like jungian, condensed buddist/etc philosophies,
multiple personailty disorders, or good fiction that has well worked
imaginary friends?
thanks,
sheilagh, wanting a bunch of library catalouge topics to search thru
| 19talk.religion.misc |
I am working on a program to display 3d wireframe models with the user
being able to arbitrarily change any of the viewing parameters. Also,
the wireframe objects are also going to have dynamic attributes so
that they can move around while the user is "exploring" the wireframe
world.
To do this, I am thinking of using the SRGP package described in the
Van Dam, Foley and Feiner book, but I was wondering if there was
another PD graphics package out there which was faster. I would like
to make the program as fast as possible so that it provides
satisfactory real time performance on a Sun IPX.
Ideally, I'm looking for a PD graphics package which will allow me to
open a new window under X, and allow me to draw lines within the
window. Also, it would also need to have some sort of event driven
interaction handling since the user is going to move around the
wireframe models using the keyboard.
If you know or wrote such a package, I would be grateful if you could
direct me to a ftp site which contains the package.
Thank you.
--
===============================================================================
Yong Su Kim, Class of 1993 | Internet: yk4@cunixb.cc.columbia.edu
Columbia College, Columbia University | or ykim@cs.columbia.edu
| 1comp.graphics |
Briefly, StarNet Communications has four PC X server packages.
Micro X-lite $ 75.00
Includes integrated tcp/ip, runs in 640KB, no arcs().
Micro X-enlite $150.00
Includes integrated tcp/ip, runs under DOS, shape extension
" interface to Novell tcp/ip
Micro X-DOS $345.00 ($225 ea. in a 5-pack)
Includes integrated tcp/ip, runs under DOS, shape extension
" interface to Novell tcp/ip, FTP's PC/TCP, & PC-NFS.
Micro X-WIN $425.00 ($300 ea. in a 5-pack)
Includes Lanera TCPOpen tcp/ip stack & utilities
" interface to FTP's PC/TCP, Sun's PC-NFS, & WinSock.
For more information contact:
----------------------------------------------------------------
StarNet Communications FAX: 1-408-739-0936
3073 Lawrence Expressway Voice: 1-408-739-0881
Santa Clara, Ca. 95051 E-mail microx@starnet.com
----------------------------------------------------------------
| 5comp.windows.x |
There's this old SE here. It's got the older-style fans that remind
me of a house-ventilator. A cylindrical drum instead of the bladed rotor
I usually see. Anyway, the SE makes this loud buzzing noise due
to vibration somewheres. If I remove the screws and loosen the front
from the back, it quiets down. I can only assume that the fan housing
from this goofy thing is touching the back of the case and vibrating
against it.
Anyway, any suggestions for where to get replacement fans and how to
"stealth" this guy? Your experiences welcome.....
--
"If everything had gone as planned, everything would have been perfect."
-BATF spokesperson on CNN 3/2/93, regarding failed raid attempt in TX.
| 4comp.sys.mac.hardware |
In <92.2bd1cd0c@axolotl> Steed.Bell@macrocosm.omahug.org (Steed Bell) writes:
>networked together using Appletalk and PhoneNet connectors. To chat we use a
>program called 'Broadcast'. With it we can send brief messages to all or
>selected machines within the network.
If you use System 7, you can use my application Zing which has
a 30 kB footprint (meaning you can have it running all the time
without losing memory)
It is also compatible with the chat program "FishBomb" which allows
sounds and pictures as well.
Both are, as far as I know, freeware (I dustribute Zing with source)
and should be available on the normal services (mac.archive.umich.edu
for instance)
Cheers,
/ h+
--
-- Jon W{tte, h+@nada.kth.se, Mac Hacker Deluxe --
This signature is kept shorter than 4 lines in the interests of UseNet
S/N ratio.
| 4comp.sys.mac.hardware |
brown@ftms.UUCP (Vidiot) writes:
>In article <1993Apr4.183419.584@vms.huji.ac.il> klony@vms.huji.ac.il writes:
><I've had several requests to post any information I've gathered regarding my
><search for ansi mouse/color xterm source.
><
><My only response was from Larry W. Virden who writes:
><
><> the mit x11 r4 and r5 both provide mouse escape sequences now. There
><> are several color xterm enhancements on export.lcs.mit.edu:/contrib .
><
><Indeed I found color_xterm.tar.Z in that directory along with lots of other
><FUN stuff for X. Thanks Larry.
>I also found it on uunet in /pub/window-sys/X/contrib, for those that can
>only do anonuucp (like me). But I noticed that the thing is dated 9/12/90,
>making it over two years old. Is this really the latest version?
Are we talking about an xterm which would accept the same escape sequences
as that for VT340 (or colour decterm/dxterm)? I thought that was called
colxterm (and my testing of it shows some oddities that might be bugs or
might be my program going wrong).
I'm also unsure of what is meant by "ansi mouse xterm"!
| 5comp.windows.x |
In article <6023@npg-sd.SanDiegoCA.NCR.COM> claborne@npg-sd.SanDiegoCA.NCR.COM (Chris Claborne) writes:
>Has anyone used the Number Nine (# 9) Video Graphics adaptor with Windows
>or Windows NT? What do you think???
I just put one in my machine last week. I have an AST 486/66. I was
getting ~10million winmarks with my Diamond SS24, and the #9 board is
doing ~20million winmarks. From my brief experiences with it, i'm very
satisfied. BTW, this is with Win 3.1.
--
Marc Snyder UUCP: ...philabs!crpmks!marcs
System Administrator
Ciba-Geigy Corporation
Hawthorne, New York Work: 914.785.2284 Play: 914.347.6440
| 2comp.os.ms-windows.misc |
In article <16BB7A1DE.V2110A@VM.TEMPLE.EDU> V2110A@VM.TEMPLE.EDU (Richard Hoenes) writes:
...
>
>Such a hostage situation has taken place on numerous occasions
>with the result of the police trying to take the place by
>force and the result being the death of the hostages and the
>gunmen. However, this is the first time I've heard of
>the blame landing squarely on the police.
>
>In this country we have a policy of not negotiating a back down
>from terrorists and hostage takers since that only encourages
>other terrorists and hostage takers.
>
>Richard
That people are at risk and that some die during a hostage situation might
be considered an acceptable scenario in storming a compound.
When EVERYONE dies (save for nine people), including twenty children, the
outcome must be considered a failure.
Now was the failure due to unforseeable circumstances, incompetence, or
negligence? From the double talk and multiple stories I've seen on the news
coming from the FBI and Reno I find "it was an honest mistake" hard to swallow
Let's hope they get their stories straight for the second round of questions.
Joseph Stiehm
| 18talk.politics.misc |
As it says, I'm interested in buying one of the little
label-makers, and I can't afford a new one. Anybody
tired of theirs?
E-mail Maureen gt1706a@prism.gatech.edu
--
Maureen L. Eagle
Georgia Institute of Technology, Atlanta Georgia, 30332
uucp: ...!{decvax,hplabs,ncar,purdue,rutgers}!gatech!prism!gt1706a
Internet: gt1706a@prism.gatech.edu
| 6misc.forsale |
Archive-name: cryptography-faq/part02
Last-modified: 1993/4/15
FAQ for sci.crypt, part 2: Net Etiquette
This is the second of ten parts of the sci.crypt FAQ. The parts are
mostly independent, but you should read the first part before the rest.
We don't have the time to send out missing parts by mail, so don't ask.
Notes such as ``[KAH67]'' refer to the reference list in the last part.
The sections of this FAQ are available via anonymous FTP to rtfm.mit.edu
as /pub/usenet/news.answers/cryptography-faq/part[xx]. The Cryptography
FAQ is posted to the newsgroups sci.crypt, sci.answers, and news.answers
every 21 days.
Contents:
* What groups are around? What's a FAQ? Who am I? Why am I here?
* Do political discussions belong in sci.crypt?
* How do I present a new encryption scheme in sci.crypt?
* What groups are around? What's a FAQ? Who am I? Why am I here?
Read news.announce.newusers and news.answers for a few weeks. Always
make sure to read a newsgroup for some time before you post to it.
You'll be amazed how often the same question can be asked in the same
newsgroup. After a month you'll have a much better sense of what the
readers want to see.
* Do political discussions belong in sci.crypt?
No. In fact some newsgroups (notably misc.legal.computing) were
created exactly so that political questions like ``Should RSA be
patented?'' don't get in the way of technical discussions. Many
sci.crypt readers also read misc.legal.computing, comp.org.eff.talk,
comp.patents, sci.math, comp.compression, et al.; for the benefit of
people who don't care about those other topics, try to put your
postings in the right group.
Questions about microfilm and smuggling and other non-cryptographic
``spy stuff'' don't belong in sci.crypt either.
* How do I present a new encryption scheme in sci.crypt?
``I just came up with this neat method of encryption. Here's some
ciphertext: FHDSIJOYW^&%$*#@OGBUJHKFSYUIRE. Is it strong?'' Without a
doubt questions like this are the most annoying traffic on sci.crypt.
If you have come up with an encryption scheme, providing some
ciphertext from it is not adequate. Nobody has ever been impressed by
random gibberish. Any new algorithm should be secure even if the
opponent knows the full algorithm (including how any message key is
distributed) and only the private key is kept secret. There are some
systematic and unsystematic ways to take reasonably long ciphertexts
and decrypt them even without prior knowledge of the algorithm, but
this is a time-consuming and possibly fruitless exercise which most
sci.crypt readers won't bother with.
So what do you do if you have a new encryption scheme? First of all,
find out if it's really new. Look through this FAQ for references and
related methods. Familiarize yourself with the literature and the
introductory textbooks.
When you can appreciate how your cryptosystem fits into the world at
large, try to break it yourself! You shouldn't waste the time of tens
of thousands of readers asking a question which you could have easily
answered on your own.
If you really think your system is secure, and you want to get some
reassurance from experts, you might try posting full details of your
system, including working code and a solid theoretical explanation, to
sci.crypt. (Keep in mind that the export of cryptography is regulated
in some areas.)
If you're lucky an expert might take some interest in what you posted.
You can encourage this by offering cash rewards---for instance, noted
cryptographer Ralph Merkle is offering $1000 to anyone who can break
Snefru-4---but there are no guarantees. If you don't have enough
experience, then most likely any experts who look at your system will
be able to find a flaw. If this happens, it's your responsibility to
consider the flaw and learn from it, rather than just add one more
layer of complication and come back for another round.
A different way to get your cryptosystem reviewed is to have the NSA
look at it. A full discussion of this procedure is outside the scope
of this FAQ.
Among professionals, a common rule of thumb is that if you want to
design a cryptosystem, you have to have experience as a cryptanalyst.
| 11sci.crypt |
sp1marse@lina (Marco Seirio) writes:
>I have a problem with intersections between two surfaces.
>Does anybody have a easy to understand algorithm for that or maybe
>even C source??
> Marco Seirio - In real life sp1marse@caligula.his.s
You also have a severe problem with news headers.
FTP to cs.purdue.edu:pub/vanecek and pull proxima.tar.Z
and proxima.ps.Z. Tres spif.
--
Lance Norskog
thinman@netcom.com
Data is not information is not knowledge is not wisdom.
| 1comp.graphics |
prb@access.digex.net (Pat) writes:
>In article <C6A2At.E9z@zoo.toronto.edu> henry@zoo.toronto.edu (Henry Spencer) writes:
>>
>>No, the thing is designed to be retrievable, in a pinch. Indeed, this
>>dictated a rather odd design for the solar arrays, since they had to be
>>retractable as well as extendable, and may thus have indirectly contributed
>>to the array-flapping problems.
>Why not design the solar arrays to be detachable. if the shuttle is going
>to retunr the HST, what bother are some arrays. just fit them with a quick
> release. one space walk, or use the second canadarm to remove the arrays.
You may want to put Hubble back in the payload bay for a reboost,
and you don't want to clip off the panels each time.
For the Gamma-Ray Observatory, one of the design requirements was that
there be no stored-energy mecahnisms (springs, explosive squibs, gas shocks,
etc.) used for deployment. This was partially so that everything could
be reeled back in to put it back in the payload bay, and partially for
safety considerations. (I've heard that the wings on a cruise missile
would cut you in half if you were standing in their swath when they opened.)
Back when the shuttle would be going up every other day with a cost to
orbit of $3.95 per pound :-), everybody designed things for easy servicing.
--
David M. Palmer palmer@alumni.caltech.edu
palmer@tgrs.gsfc.nasa.gov
| 14sci.space |
In article <OAF.93May11231227@klosters.ai.mit.edu> oaf@zurich.ai.mit.edu writes:
> In message: <C6MnAD.MxD@ucdavis.edu> Some nameless geek <szljubi@chip.ucdavis.edu> writes:
> > To Oded Feingold:
> >
> > Call off the dogs, babe. It's me, in the flesh. And no, I'm not
> > Wayne either, so you might just want to tuck your quivering erection
> > back into your M.I.T. slacks and catch up on your Woody Allen.
> >
> This is an outrage! I don't even own a dog.
>
Of course you do. You married it a while ago, remember?
--
_/ _/ _/_/_/_/ _/ _/ _/_/_/ _/ _/
_/_/_/ _/_/ _/ _/ _/ _/_/ _/ Professor Kevin Walsh
_/ _/ _/ _/ _/ _/ _/ _/_/ kevin@cursor.demon.co.uk
_/ _/ _/_/_/_/ _/ _/_/_/ _/ _/
| 17talk.politics.mideast |
===== This is a posting for my friend who does not have USENET access ========
===== Please contact him (not me) directly, thank you ========================
1. The Mac II is supposed to have a socket for the MC68851 PMMU chip. Could
anyone let me know where that socket is on the motherboard. I have obtained
a PMMU chip (16 Mhz) from a surplus store, and would like to install it onto
my Mac II (circa 1987). But I cannot see the socket myself when I tried to
install it.
2. Could anyone send me the pinouts for the Mac II SCSI DB-25 interface?
Thank you.
Contact: David Chan, bzone@attmail.com
| 4comp.sys.mac.hardware |
In article <May.6.00.35.45.1993.15465@geneva.rutgers.edu>,
marka@hcx1.ssd.csd.harris.com (Mark Ashley) wrote:
>
>countries. That event is "approved" by the Pope. Currently,
>images of Mary in Japan, Korea, Yugoslavia, Philippines, Africa
>are showing tears (natural or blood).
...
>If you have the resources, go to one of the countries I mentioned.
In article <May.9.05.40.20.1993.27478@athos.rutgers.edu>,
mdw33310@uxa.cso.uiuc.edu (Michael D. Walker) wrote:
>
>1. As far as current investigations, the Church recently declared the
> crying statue and corresponding messages from Mary at Akita,
> Japan as approved (I found this out about a month ago.)
I'm in Japan.
(Michael, could you give me more info about where Akita is: nearest city
would be good)
If I find it, I'll get pictures and post a digitised version if enough
people are interested.
--------------------------------
..Marty.!
Lost in Space! (or is it Japan?)
<pauley@tai.jkj.sii.co.jp>
| 15soc.religion.christian |
Consumer Reports once wrote about the S-10 Blazer that it "shook and rattled
like a tired taxi cab". There is one noise that is expecially irritating -
the back window squeaks. I believe its because the whole tailgate assembly
and window are not solid. Anyway, has anyone had the same problem, and have
you found any fixes?
Arlen Martin
AT&T Microelectronics
att!attme!stcarm
(215)391-2531
| 7rec.autos |
In article <strnlghtC5M2Cv.8Hx@netcom.com> strnlght@netcom.com (David Sternlight) writes:
Here's a simple way to convert the Clipper proposal to an unexceptionable
one: Make it voluntary.
That is--you get high quality secure NSA classified technology if you agree
to escrow your key. Otherwise you are on your own.
That's the disturbing part - use of other products IS voluntary, for now,
and the press releases talk about the White House's unwillingness to
decide that citizens have a right to good commercial crypto gear,
and about how commercial alternatives will be permitted as long as
they provide key escrow services. That's a clear implication that
they're considering banning alternatives.
Additionally, use of real alternatives ISN'T totally legal -
you're not allowed to export really good crypto equipment except to
the government's friends (e.g. the Australian government)
you can only export even BAD crypto equipment with their permission,
and the regulators who control the cellular telephone companies make
sure there are only two competitors, so Joe's Garage Cellular can't
start offering a secure service.
--
# Pray for peace; Bill
# Bill Stewart 1-908-949-0705 wcs@anchor.att.com AT&T Bell Labs 4M312 Holmdel NJ
# No, I'm *from* New Jersey, I only *work* in cyberspace....
# White House Commect Line 1-202-456-1111 fax 1-202-456-2461
| 11sci.crypt |
Hello,
My friend is interested in collecting information of the X window
application areas.
Say X window in Banking system/Real-estate/traffic information
system /postal service etc on any world 8-). I would appreciate
any information which is a pointer to find any such documents.
Thank you very much in advance,
---
J. Park
| 1comp.graphics |
-------------------------------------------------------------------------
CALL FOR PAPERS
The Eighth International Symposium on Computer and Information Sciences
ISCIS VIII
November 3 - 5, 1993, Antalya, Turkey
Organized by
EHEI
Ecole des Hautes Etudes en Informatique, Paris, France
METU
Middle East Technical University, Ankara, Turkey
in cooperation with
IEEE Computer Society Turkey Chapter,
IEEE Turkey Section
and the following universities:
Bogazici, Ege, Hacettepe, Istanbul Teknik, Yildiz.
ISCIS Advisory Board:
E.Arkun, E.Gelenbe, U.Halici, E.Harmanci, K.Inan,
Y.Karsligil, S.Kuru, N.Yalabik, U. Yarimagan, S.Yilmaz
Conference Chair Program Co-Chairs Publicity Chair
-------------------- ------------------------ ----------------------
Erol Gelenbe, L. Gun, IBM, USA Ugur Halici, METU
Duke University, USA R. Onvural,IBM, USA halici@vm.cc.metu.edu.tr
erol@egr.duke.edu P. Quinton,IRISA, France halici@trmetu.bitnet
Program Committee
-----------------
V. Akman, Turkey, E. Alpaydin, Turkey, E. Arkun, Turkey, I. Aybay, Turkey,
S. Bilgen, Turkey, A. Dogac, Turkey, A. Dogramaci, Turkey, S. Fdida, France,
J.M. Fourneau, France, E. Gelenbe, USA, G. Gonenc, Turkey, U. Halici, Turkey,
E. Harmanci, Turkey, K. Inan, Turkey, S. Jaehnischen,Germany, S. Kuru, Turkey,
M. Nivat, France, V. Paschos, France, N.Pekergin, France, J.F. Perrot, France,
M. Raynal,France, A. Stafylopatis, Greece, G. Stamon,France, G. Ucoluk, Turkey,
N. Yalabik, Turkey
Publicity Committee
-------------------
Isik Aybay, Osman Basbugoglu, Semih Bilgen, Emin Germen, Mert Sungur
ISCIS VIII is the eighth of a series of meetings which have brought together
computer scientists and engineers from about twenty countries. This year's
conference will be held in the beautiful Mediterranean resort city of
Antalya, in a region rich in natural as well as historical sites.
RESEARCH PAPERS ARE SOUGHT IN THE FOLLOWING AREAS:
--------------------------------------------------
Theory of Computer Science - Computer Architecture & Systems
Artificial Intelligence - Neural Networks
Graphics and Image Processing - Computational Mathematics
Operations Research Applications - Databases
Performance Evaluation - Software Engineering
Computer Networks - Parallelism
Paper Submission: Full papers are limited to 8 pages and short
communications are limited to 4 pages. Submit five camera ready copies
(one original and four copies) of the paper and an accompanying letter by
postal mail only, so as to arrive by June 30, 1993 to:
ISCIS VIII, Attn Drs Levent Gun and Raif Onvural,
IBM E95/B 673, P.O. Box 12195, Research Triangle Park, NC 27709, USA
Selected papers from ISCIS VIII will be published in the journal Information
Sciences (Elsevier - North Holland).
Poster Submission: Submit five camera ready copies of 1 page extended
abstract with an accompanying letter by July 30, 1993 to the address given
above.
Information: For required writing format, further information and
announcements, contact:
ISCIS VIII, Ugur Halici,
Dept. of Electrical and Electronics Eng., METU, 06531 Ankara, Turkey
Tel: (90 4) 210 10 00 Ext: 2301 Fax:(90 4) 210 12 61
Email: iscis@vm.cc.metu.edu.tr or iscis@trmetu.bitnet
| 1comp.graphics |
Yet again,
the escape sequences you are speaking about here are non standard and
dangerous. In fact, an ANSI compliant sequence parser HANGS on them.
Why are there such strange ESC sequences instead of compatible DSC ?
--
+-o-+--------------------------------------------------------------+-o-+
| o | \\\- Brain Inside -/// | o |
| o | ^^^^^^^^^^^^^^^ | o |
| o | Andre' Beck (ABPSoft) mehl: Andre_Beck@IRS.Inf.TU-Dresden.de | o |
+-o-+--------------------------------------------------------------+-o-+
| 5comp.windows.x |
>In article <VNci2B7w165w@inqmind.bison.mb.ca> victor@inqmind.bison.mb.ca (Victor Laking) writes:
>>From: victor@inqmind.bison.mb.ca (Victor Laking)
>>Subject: Vulcan? (No, not the guy with the ears!)
>>Date: Sun, 04 Apr 93 19:31:54 CDT
>>Does anyone have any info on the apparent sightings of Vulcan?
>>
>>All that I know is that there were apparently two sightings at
>>drastically different times of a small planet that was inside Mercury's
>>orbit. Beyond that, I have no other info.
>>
>>Does anyone know anything more specific?
>>
As I heard the story, before Albert came up the the theory
o'relativity and warped space, nobody could account for
Mercury's orbit. It ran a little fast (I think) for simple
Newtonian physics. With the success in finding Neptune to
explain the odd movments of Uranus, it was postulated that there
might be another inner planet to explain Mercury's orbit.
It's unlikely anything bigger than an asteroid is closer to the
sun than Mercury. I'm sure we would have spotted it by now.
Perhaps some professionals can confirm that.
/~~~(-: James T. Green :-)~~~~(-: jgreen@oboe.calpoly.edu :-)~~~\
| Heaven, n.: |
| A place where the wicked cease from troubling you with talk |
| of their own personal affairs, and the good listen with |
| attention while you expound your own. |
| Ambrose Bierce, "The Devil's Dictionary" |
| 14sci.space |
How about changing team names!
Post your choices!
Here I'll start:
How about the
Baltimore Baseblazers
San Francisco Quakes
Shawn - Go Rangers!!!!!!!!!!!!!!!!!!!
| 9rec.sport.baseball |
In article <04.17.93b@eecs.nwu.edu> ptownson <ptownson@eecs.nwu.edu> writes:
>So ... the Jury will be making its announcement at 7:00 AM Saturday
>morning Pacific Time .... 10:00 AM Eastern Time. Why such an ungodly
>hour?
>
>I guess its because the news is not what the government wanted to hear;
>Either the police officers have been found innocent - or - after a week,
>the jury is hung ... neither good news from the government's point of
>view, as they desparately needed some scapegoats in Los Angeles.
Wrong on both accounts.
>Maybe by making the announcement at 7:00 AM on the west coast, they
>figure all the rioters will be asleep, giving the troops time to move
>into place.
No one is a "rioter" until they participate in a "riot", which is
unlikely to happen, now.
Most of the *people* in L.A. are likely to have gotten up early to
listen to the court announcement.
>I guess we can look forward to a weekend of rioting, eh?
Sorry to disappoint you, but this seems unlikely.
>The Mayor of
>Los Angeles, in a press conference about 3:00 AM Saturday morning, in
>announcing that the jury would give its verdict later this morning
>(just an hour away as I write this) would not say what that verdict
>is, but I think he was told ... in his press conference he said
>"anyone rioting will be stopped dead in their tracks ..."
I don't think he was told.
However, his statement was still appropriate.
>Meanwhile, following the announcement of the jury's verdict, the
>judge, jury and assorted court personnel will be evacuated from the
>building via helicopters landing on the roof of the courthouse. They
>can't even walk out through the front door with their heads held
>high.
Jury duty is a solemn duty to be taken seriously. It is not meant
to be a source of pride or instant fame.
>Won't the rioters have a surprise waiting for them when they wake up
>later today!
Well, the many *people* who got up early to go to the court to hear
the verdict found that justice was served. Given your dire and
cynical predictions, I imagine that it is you who will be surprised. :-)
>
>
>Patrick Townson
--
| 18talk.politics.misc |
In <1r3efjINN3jj@gap.caltech.edu> arc@cco.caltech.edu writes:
> Thomas Parsli <thomasp@ifi.uio.no> writes:
> >I also believe Texas has some of the most liberal 'gun-laws' in USA......
>
> In Texas, you cannot carry a handgun. Period. Either concealed or open.
Currently, there is a bill before the Texas legislature that would make it
legal for some ordinary folks to carry concealed weapons. I don't have the
details, sorry.
semper fi,
Jammer Jim Miller
Texas A&M University '89 and '91
________________________________________________________________________________
I don't speak for UH, which is too bad, because they could use the help.
"Become one with the Student Billing System. *BE* the Student Billing System."
"Power finds its way to those who take a stand. Stand up, Ordinary Man."
---Rik Emmet, Gil Moore, Mike Levine: Triumph
| 16talk.politics.guns |
randy@msc.cornell.edu writes:
>Do all SCSI cards for DOS systems require a separate device driver to
>be loaded into memory for each SCSI device hooked up?
No. All that I've seen have also an on-board BIOS which enables you to
use up to 2 hard drives directly under DOS (2 drives is a DOS
limitation and you have the same problem with IDE and all other
standards for that matter). Software drivers often allow for better
performance, though. You have to use them if you want to use other
devices besides hard disks or have more than 2 disks.
>Will this also be true of the 32-bit OS's?
Obviously these are not able to use the 16-bit real mode BIOSes that
are written for DOS, so you need software drivers. That's not a big
deal (as long as the drivers are available), because you won't have to
fight with any low memory problems either.
--
Segmented Memory Helps Structure Software
| 3comp.sys.ibm.pc.hardware |
Enclosed are the rules, guidelines and related information for the 10th
International Obfuscated C Code Contest. (This is part 2 of a 2 part
shar file).
Enjoy!
chongo <Landon Curt Noll> /\oo/\
Larry Bassel
=-=
#!/bin/sh
# This is part 02 of a multipart archive
# ============= mkentry.c ==============
echo "x - extracting mkentry.c (Text)"
sed 's/^X//' << 'SHAR_EOF' > mkentry.c &&
X/* @(#)mkentry.c 1.24 3/1/93 02:28:49 */
X/*
X * Copyright (c) Landon Curt Noll & Larry Bassel, 1993.
X * All Rights Reserved. Permission for personal, education or non-profit use
X * is granted provided this this copyright and notice are included in its
X * entirety and remains unaltered. All other uses must receive prior
X * permission in writing from both Landon Curt Noll and Larry Bassel.
X */
X/*
X * mkentry - make an International Obfuscated C Code Contest entry
X *
X * usage:
X * mkentry -r remarks -b build -p prog.c -o ioccc.entry
X *
X * -r remarks file with remarks about the entry
X * -b build file containing how prog.c should be built
X * -p prog.c the obfuscated program source file
X * -o ioccc.entry ioccc entry output file
X *
X * compile by:
X * cc mkentry.c -o mkentry
X */
X/*
X * Placed in the public domain by Landon Curt Noll, 1992.
X *
X * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
X * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
X * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
X */
X/*
X * WARNING:
X *
X * This program attempts to implement the IOCCC rules. Every attempt
X * has been made to make sure that this program produces an entry that
X * conforms to the contest rules. In all cases, where this program
X * differs from the contest rules, the contest rules will be used. Be
X * sure to check with the contest rules before submitting an entry.
X *
X * Send questions or comments (but not entries) about the contest, to:
X *
X * ...!{sun,pacbell,uunet,pyramid}!hoptoad!judges
X * judges@toad.com
X * The rules and the guidelines may (and often do) change from year to
X * year. You should be sure you have the current rules and guidelines
X * prior to submitting entries. To obtain all 3 of them, send Email
X * to the address above and use the subject 'send rules'.
X *
X * Because contest rules change from year to year, one should only use this
X * program for the year that it was intended. Be sure that the RULE_YEAR
X * define below matches this current year.
X */
X
X#include <stdio.h>
X#include <ctype.h>
X#include <time.h>
X#include <sys/types.h>
X#include <sys/stat.h>
X
X/* logic */
X#ifndef TRUE
X# define TRUE 1
X#endif /* TRUE */
X#ifndef FALSE
X# define FALSE 0
X#endif /* FALSE */
X#define EOF_OK TRUE
X#define EOF_NOT_OK FALSE
X
X/* global limits */
X#define RULE_YEAR 1993 /* NOTE: should match the current year */
X#define START_DATE "1Mar92 0:00 UTC" /* first confirmation received */
X#define MAX_COL 79 /* max column a line should hit */
X#define MAX_BUILD_SIZE 256 /* max how to build size */
X#define MAX_PROGRAM_SIZE 3217 /* max program source size */
X#define MAX_PROGRAM_SIZE2 1536 /* max program source size not counting
X whitespace and {}; not followed by
X whitespace or EOF */
X#define MAX_TITLE_LEN 12 /* max chars in the title */
X#define MAX_ENTRY_LEN 1 /* max length in the entry input line */
X#define MAX_ENTRY 8 /* max number of entries per person per year */
X#define MAX_FILE_LEN 1024 /* max filename length for a info file */
X
X/* where to send entries */
X#define ENTRY_ADDR1 "...!{apple,pyramid,sun,uunet}!hoptoad!obfuscate"
X#define ENTRY_ADDR2 "obfuscate@toad.com"
X
X/* uuencode process - assumes ASCII */
X#define UUENCODE(c) (encode_str[(int)(c)&0xff])
X#define UUENCODE_LEN 45 /* max uuencode chunk size */
X#define UUINFO_MODE 0444 /* mode of an info file's uuencode file */
X#define UUBUILD_MODE 0444 /* mode of the build file's uuencode file */
X#define UUBUILD_NAME "build" /* name for the build file's uuencode file */
X#define UUPROG_MODE 0444 /* mode of the program's uuencode file */
X#define UUPROG_NAME "prog.c" /* name for the program's uuencode file */
X
X/* encode_str[(char)val] is the uuencoded character of val */
Xchar encode_str[256+1] = "`!\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_ !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_ !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_ !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_";
X
X/* global declarations */
Xchar *program; /* our name */
Xlong start_time; /* the startup time */
X
X/* forward declarations */
Xvoid parse_args();
Xvoid usage();
XFILE *open_remark();
XFILE *open_build();
XFILE *open_program();
XFILE *open_output();
Xvoid output_entry();
Xvoid output_remark();
Xvoid output_author();
Xvoid output_info();
Xvoid output_build();
Xvoid output_program();
Xvoid output_end();
Xint get_line();
Xvoid output_till_dot();
Xint col_len();
Xvoid check_io();
Xvoid uuencode();
X
Xmain(argc, argv)
X int argc; /* arg count */
X char **argv; /* the args */
X{
X FILE *remark=NULL; /* open remarks stream */
X FILE *build=NULL; /* open build file stream */
X FILE *prog=NULL; /* open program stream */
X FILE *output=NULL; /* open output stream */
X char *rname=NULL; /* file with remarks about the entry */
X char *bname=NULL; /* file containing how prog.c should be built */
X char *pname=NULL; /* the obfuscated program source file */
X char *oname=NULL; /* ioccc entry output file */
X struct tm *tm; /* startup time structure */
X
X /*
X * check on the year
X */
X start_time = time((long *)0);
X tm = gmtime(&start_time);
X if (tm->tm_year != RULE_YEAR-1900) {
X fprintf(stderr,
X "%s: WARNING: this program applies to %d, which may differ from %d\n\n",
X argv[0], RULE_YEAR, 1900+tm->tm_year);
X }
X
X /*
X * parse the command line args
X */
X parse_args(argc, argv, &rname, &bname, &pname, &oname);
X
X /*
X * open/check the input and output files
X *
X * We open and truncate the output file first, in case it is the same
X * as one of the input files.
X */
X output = open_output(oname);
X remark = open_remark(rname);
X build = open_build(bname);
X prog = open_program(pname);
X if (output==NULL || remark==NULL || build==NULL || prog==NULL) {
X exit(1);
X }
X
X /*
X * output each section
X */
X output_entry(output, oname);
X output_remark(output, oname, remark, rname);
X output_author(output, oname);
X output_info(output, oname);
X output_build(output, oname, build, bname);
X output_program(output, oname, prog, pname);
X output_end(output, oname);
X
X /*
X * flush the output
X */
X if (fflush(output) == EOF) {
X fprintf(stderr, "%s: flush error in %s: ", program, oname);
X perror("");
X exit(2);
X }
X
X /*
X * final words
X */
X printf("\nYour entry can be found in %s. You should check this file\n",
X oname);
X printf("correct any problems and verify that the uudecode utility will\n");
X printf("correctly decode your build file and program.\n\n");
X printf("This program has been provided as a guide for submitters. In\n");
X printf("cases where it conflicts with the rules, the rules shall apply.\n");
X printf("It is your responsibility to ensure that your entry conforms to\n");
X printf("the current rules.\n\n");
X printf("Email your entries to:\n");
X printf("\t%s\n", ENTRY_ADDR1);
X printf("\t%s\n\n", ENTRY_ADDR2);
X printf("Please use the following subject when you Email your entry:\n");
X printf("\tioccc entry\n\n");
X /* all done */
X exit(0);
X}
X
X/*
X * parse_args - parse the command line args
X *
X * Given the command line args, this function parses them and sets the
X * required name flags. This function will return only if the command
X * line syntax is correct.
X */
Xvoid
Xparse_args(argc, argv, rname, bname, pname, oname)
X int argc; /* arg count */
X char **argv; /* the args */
X char **rname; /* file with remarks about the entry */
X char **bname; /* file containing how prog.c should be built */
X char **pname; /* the obfuscated program source file */
X char **oname; /* ioccc entry output file */
X{
X char *optarg; /* -flag option operand */
X int flagname; /* the name of the -flag */
X int i;
X
X /*
X * Not everyone has getopt, so we must parse args by hand.
X */
X program = argv[0];
X for (i=1; i < argc; ++i) {
X
X /* determine the flagname */
X if (argv[i][0] != '-') {
X usage(1);
X /*NOTREACHED*/
X }
X flagname = (int)argv[i][1];
X
X /* determine the flag's operand */
X if (flagname != '\0' && argv[i][2] != '\0') {
X optarg = &argv[i][2];
X } else {
X if (i+1 >= argc) {
X usage(2);
X /*NOTREACHED*/
X } else {
X optarg = argv[++i];
X }
X }
X
X /* save the flag's operand in the correct global variable */
X switch (flagname) {
X case 'r':
X *rname = optarg;
X break;
X case 'b':
X *bname = optarg;
X break;
X case 'p':
X *pname = optarg;
X break;
X case 'o':
X *oname = optarg;
X break;
X default:
X usage(3);
X /*NOTREACHED*/
X }
X }
X
X /*
X * verify that we have all of the required flags
X */
X if (*rname == NULL || *bname == NULL || *pname == NULL || *oname == NULL) {
X usage(4);
X /*NOTREACHED*/
X }
X return;
X}
X
X/*
X * usage - print a usage message and exit
X *
X * This function does not return.
X */
Xvoid
Xusage(exitval)
X int exitval; /* exit with this value */
X{
X fprintf(stderr,
X "usage: %s -r remarks -b build -p prog.c -o ioccc.entry\n\n", program);
X fprintf(stderr, "\t-r remarks\tfile with remarks about the entry\n");
X fprintf(stderr, "\t-b build\tfile containing how prog.c should be built\n");
X fprintf(stderr, "\t-p prog.c\tthe obfuscated program source file\n");
X fprintf(stderr, "\t-o ioccc.entry\tioccc entry output file\n");
X exit(exitval);
X}
X
X/*
X * open_remark - open/check the remark file
X *
X * The remark file should be indented by 4 spaces, and should not extend
X * beyond column MAX_COL. These are not requirements, so we only warn.
X *
X * This function returns NULL on I/O or format error.
X */
XFILE *
Xopen_remark(filename)
X char *filename;
X{
X FILE *stream; /* the opened file stream */
X char buf[BUFSIZ+1]; /* input buffer */
X int toolong=0; /* number of lines that are too long */
X int non_indent=0; /* number of lines not indented by 4 spaces */
X
X /*
X * open the remark input file
X */
X stream = fopen(filename, "r");
X if (stream == NULL) {
X fprintf(stderr, "%s: cannot open remark file: %s: ",
X program, filename);
X perror("");
X return(NULL);
X }
X
X /*
X * look at each line
X */
X while (fgets(buf, BUFSIZ, stream) != NULL) {
X
X /* count lines that do not start with 4 spaces */
X if (buf[0] != '\n' && strncmp(buf, " ", 4) != 0) {
X ++non_indent;
X }
X
X /* count long lines */
X if (col_len(buf) > MAX_COL) {
X /* found a line that is too long */
X ++toolong;
X }
X }
X
X /* watch for I/O errors */
X check_io(stream, filename, EOF_OK);
X
X /* note long lines if needed */
X if (toolong > 0) {
X fprintf(stderr,
X "%s: WARNING: %d line(s) from %s extend beyond the 80th column\n",
X program, toolong, filename);
X fprintf(stderr,
X "%s: This is ok, but it would be nice to avoid\n\n",
X program);
X }
X
X /* note non-indented lines, if needed */
X if (non_indent > 0) {
X fprintf(stderr,
X "%s: WARNING: %d line(s) from %s are not indented by 4 spaces\n",
X program, non_indent, filename);
X fprintf(stderr,
X "%s: This is ok, but it would be nice to avoid\n\n",
X program);
X }
X
X /* return the open file */
X rewind(stream);
X return(stream);
X}
X
X/*
X * open_build - open/check the build file
X *
X * The how to build file must not be longer than MAX_BUILD_SIZE bytes.
X *
X * This function returns NULL on I/O or size error.
X */
XFILE *
Xopen_build(filename)
X char *filename;
X{
X FILE *stream; /* the opened file stream */
X struct stat statbuf; /* the status of the open file */
X
X /*
X * open the how to build input file
X */
X stream = fopen(filename, "r");
X if (stream == NULL) {
X fprintf(stderr, "%s: cannot open how to build file: %s: ",
X program, filename);
X perror("");
X return(NULL);
X }
X
X /*
X * determine the size of the file
X */
X if (fstat(fileno(stream), &statbuf) < 0) {
X fprintf(stderr, "%s: cannot stat how to build file: %s: ",
X program, filename);
X perror("");
X return(NULL);
X }
X if (statbuf.st_size > MAX_BUILD_SIZE) {
X fprintf(stderr,
X "%s: FATAL: the how to build file: %s, is %d bytes long\n",
X program, filename, statbuf.st_size);
X fprintf(stderr,
X "%s: it may not be longer than %d bytes\n",
X program, MAX_BUILD_SIZE);
X return(NULL);
X }
X
X /* return the open file */
X return(stream);
X}
X
X/*
X * open_program - open/check the program source file
X *
X * The program source file must be <= 3217 bytes. The number of
X * non-whitespace and }{; chars not followed by whitespace must
X * be <= 1536 bytes.
X *
X * This function returns NULL on I/O or size error.
X */
XFILE *
Xopen_program(filename)
X char *filename;
X{
X FILE *stream; /* the opened file stream */
X struct stat statbuf; /* the status of the open file */
X int count; /* special count size */
X int c; /* the character read */
X
X /*
X * open the program source input file
X */
X stream = fopen(filename, "r");
X if (stream == NULL) {
X fprintf(stderr, "%s: cannot open program source file: %s: ",
X program, filename);
X perror("");
X exit(7);
X }
X
X /*
X * determine the size of the file
X */
X if (fstat(fileno(stream), &statbuf) < 0) {
X fprintf(stderr, "%s: cannot stat program source file: %s: ",
X program, filename);
X perror("");
X return(NULL);
X }
X if (statbuf.st_size > MAX_PROGRAM_SIZE) {
X fprintf(stderr,
X "%s: FATAL: the program source file: %s, is %d bytes long\n",
X program, filename, statbuf.st_size);
X fprintf(stderr,
X "%s: it may not be longer than %d bytes\n",
X program, MAX_PROGRAM_SIZE);
X return(NULL);
X }
X
X /*
X * count the non-whitespace, non {}; followed by whitespace chars
X */
X count = 0;
X c = 0;
X while ((c=fgetc(stream)) != EOF) {
X /* look at non-whitespace */
X if (!isascii(c) || !isspace(c)) {
X switch (c) {
X case '{': /* count if not followed by EOF or whitespace */
X case '}':
X case ';':
X /* peek at next char */
X c = fgetc(stream);
X if (c != EOF && isascii(c) && !isspace(c)) {
X /* not followed by whitespace or EOF, count it */
X ungetc(c, stream);
X ++count;
X }
X break;
X default:
X ++count;
X break;
X }
X }
X }
X
X /* watch for I/O errors */
X check_io(stream, filename, EOF_OK);
X
X /* look at the special size */
X if (count > MAX_PROGRAM_SIZE2) {
X fprintf(stderr,
X "%s: FATAL: the number of bytes that are non-whitespace, and\n",
X program);
X fprintf(stderr,
X "%s: that are not '{', '}', ';' followed by whitespace\n",
X program);
X fprintf(stderr,
X "%s: or EOF must be <= %d bytes\n",
X program, MAX_PROGRAM_SIZE2);
X fprintf(stderr,
X "%s: in %s, %d bytes were found\n",
X program, filename, count);
X return(NULL);
X }
X
X /* return the open file */
X rewind(stream);
X return(stream);
X}
X
X/*
X * open_output - open/check the entry output file
X *
X * This function returns NULL on open error.
X */
XFILE *
Xopen_output(filename)
X char *filename;
X{
X FILE *stream; /* the opened file stream */
X
X /*
X * open the ioccc entry output file
X */
X stream = fopen(filename, "w");
X if (stream == NULL) {
X fprintf(stderr, "%s: cannot open ioccc entry file for output: %s: ",
X program, filename);
X perror("");
X exit(8);
X }
X
X /* return the open file */
X return(stream);
X}
X
X/*
X * output_entry - output the ---entry--- section
X *
X * Read the needed information form stdin, and write the entry section.
X */
Xvoid
Xoutput_entry(output, oname)
X FILE *output; /* entry's output file stream */
X char *oname; /* name of the output file */
X{
X char title[MAX_TITLE_LEN+1+1]; /* the entry's title */
X char buf[MAX_COL+1+1]; /* I/O buffer */
X int entry=0; /* entry number */
X int ret; /* fields processed by fscanf */
X int ok_line=0; /* 0 => the line is not ok */
X char skip; /* input to skip */
X FILE *date_pipe; /* pipe to a date command */
X time_t epoch_sec; /* seconds since the epoch */
X char *p;
X
X /*
X * write the start of the section
X */
X fprintf(output, "---entry---\n");
X check_io(output, oname, EOF_NOT_OK);
X
X /*
X * write the rule year
X */
X fprintf(output, "rule:\t%d\n", RULE_YEAR);
X check_io(output, oname, EOF_NOT_OK);
X
X /* determine if this is a fix */
X printf("Is this a fix, update or resubmittion to a ");
X printf("previous entry (enter y or n)? ");
X while (get_line(buf, 1+1, 0) <= 0 || !(buf[0]=='y' || buf[0]=='n')) {
X printf("\nplease answer y or n: ");
X }
X if (buf[0] == 'y') {
X fprintf(output, "fix:\ty\n");
X check_io(output, oname, EOF_NOT_OK);
X printf("\nBe sure that the title and entry number that you give\n");
X printf("are the same of as the entry you are replacing\n");
X } else {
X fprintf(output, "fix:\tn\n");
X check_io(output, oname, EOF_NOT_OK);
X }
X
X /*
X * write the title
X */
X printf("\nYour title must match expression be a [a-zA-Z0-9_=] character\n");
X printf("followed by 0 to %d more [a-zA-Z0-9_=+-] characters.\n\n",
X MAX_TITLE_LEN-1);
X printf("It is suggested, but not required, that the title should\n");
X printf("incorporate your username; in the\n");
X printf("case of multiple authors, consider using parts of the usernames\n");
X printf("of the authors.\n\n");
X printf("enter your title: ");
X do {
X /* prompt and read a line */
X if ((ok_line = get_line(title, MAX_TITLE_LEN+1, MAX_COL-9)) <= 0) {
X printf("\ntitle is too long, please re-enter: ");
X continue;
X }
X
X /* verify the pattern, not everyone has regexp, so do it by hand */
X if (!isascii((int)title[0]) ||
X !(isalnum((int)title[0]) || title[0] == '_' || title[0] == '=')) {
X printf("\ninvalid first character in the title\n\n");
X printf("enter your title: ");
X ok_line = 0;
X } else {
X for (p=(&title[1]); *p != '\0' && *p != '\n'; ++p) {
X if (!isascii((int)*p) ||
X !(isalnum((int)*p) ||
X *p == '_' || *p == '=' || *p == '+' || *p == '-')) {
X printf("\ninvalid character in the title\n\n");
X printf("enter your title: ");
X ok_line = 0;
X }
X }
X }
X } while (ok_line <= 0);
X fprintf(output, "title:\t%s", title);
X check_io(output, oname, EOF_NOT_OK);
X
X /*
X * write the entry number
X */
X printf("\nEach person may submit up to %d entries per year.\n\n",
X MAX_ENTRY);
X printf("enter an entry number from 0 to %d inclusive: ", MAX_ENTRY-1);
X do {
X /* get a valid input line */
X fflush(stdout);
X ret = fscanf(stdin, "%d[\n]", &entry);
X check_io(stdin, "stdin", EOF_NOT_OK);
X /* skip over input until newline is found */
X do {
X skip = fgetc(stdin);
X check_io(stdin, "stdin", EOF_NOT_OK);
X if (skip != '\n') {
X /* bad text in input, invalidate entry number */
X entry = -1;
X }
X } while (skip != '\n');
X
X /* check if we have a number, and if it is in range */
X if (ret != 1 || entry < 0 || entry > MAX_ENTRY-1) {
X printf(
X "\nThe entry number must be between 0 and %d inclusive\n\n",
X MAX_ENTRY-1);
X printf("enter the entry number: ");
X }
X } while (ret != 1 || entry < 0 || entry > MAX_ENTRY-1);
X fprintf(output, "entry:\t%d\n", entry);
X check_io(output, oname, EOF_NOT_OK);
X
X /*
X * write the submission date
X */
X /* returns a newline */
X epoch_sec = time(NULL);
X fprintf(output, "date:\t%s", asctime(gmtime(&epoch_sec)));
X check_io(output, oname, EOF_NOT_OK);
X
X /*
X * write the OS/machine host information
X */
X printf(
X "\nEnter the machine(s) and OS(s) under which your entry was tested.\n");
X output_till_dot(output, oname, "host:");
X}
X
X/*
X * output_remark - output the ---remark--- section
X *
X * Read the needed information form stdin, and write the entry section.
X */
Xvoid
Xoutput_remark(output, oname, remark, rname)
X FILE *output; /* entry's output file stream */
X char *oname; /* name of the output file */
X FILE *remark; /* stream to the file containing remark text */
X char *rname; /* name of the remark file */
X{
X char buf[BUFSIZ+1]; /* input/output buffer */
X
X /*
X * write the start of the section
X */
X fprintf(output, "---remark---\n");
X check_io(output, oname, EOF_NOT_OK);
X
X /*
X * copy the remark file to the section
X */
X while (fgets(buf, BUFSIZ, remark) != NULL) {
X fputs(buf, output);
X check_io(output, oname, EOF_NOT_OK);
X }
X check_io(remark, rname, EOF_OK);
X
X /* be sure that the remark section ends with a newline */
X if (buf[strlen(buf)-1] != '\n') {
X fputc('\n', output);
X check_io(output, oname, EOF_NOT_OK);
X }
X}
X
X/*
X * output_author - output the ---author--- section
X *
X * Read the needed information from stdin, and write the author section.
X * If multiple authors exist, multiple author sections will be written.
X */
Xvoid
Xoutput_author(output, oname)
X FILE *output; /* entry's output file stream */
X char *oname; /* name of the output file */
X{
X char buf[MAX_COL+1+1]; /* I/O buffer */
X int more_auths; /* TRUE => more authors to note */
X int auth_cnt=0; /* number of authors processed */
X
X /*
X * prompt the user for the author section
X */
X printf("\nEnter information about each author. If your entry is after\n");
X printf("%s and before the contest deadline, the judges\n", START_DATE);
X printf("will attempt to Email back a confirmation to the first author\n");
X
X /*
X * place author information for each author in an individual section
X */
X do {
X
X /* write the start of the section */
X fprintf(output, "---author---\n");
X check_io(output, oname, EOF_NOT_OK);
X
X /* write the author */
X printf("\nAuthor #%d name: ", ++auth_cnt);
X while (get_line(buf, MAX_COL+1, MAX_COL-9) <= 0) {
X printf("\nname too long, please re-enter: ");
X }
X fprintf(output, "name:\t%s", buf);
X check_io(output, oname, EOF_NOT_OK);
X
X /* write the organization */
X printf("\nEnter the School/Company/Organization of author #%d\n",
X auth_cnt);
X printf("\nAuthor #%d org: ", auth_cnt);
X while (get_line(buf, MAX_COL+1, MAX_COL-9) <= 0) {
X printf("\nline too long, please re-enter: ");
X }
X fprintf(output, "org:\t%s", buf);
X check_io(output, oname, EOF_NOT_OK);
X
X /* write the address */
X printf(
X "\nEnter the postal address for author #%d. Be sure to include\n",
X auth_cnt);
X printf("your country and do not include your name.\n");
X output_till_dot(output, oname, "addr:");
X
X /* write the Email address */
X printf(
X "\nEnter the Email address for author #%d. Use an address from\n",
X auth_cnt);
X printf(
X "a registered domain or well known site. If you give several\n");
X printf("forms, list them one per line.\n");
X output_till_dot(output, oname, "email:");
X
X /* write the anonymous status */
X printf("\nShould author #%d remain anonymous (enter y or n)? ",
X auth_cnt);
X while (get_line(buf, 1+1, 0) <= 0 || !(buf[0]=='y' || buf[0]=='n')) {
X printf("\nplease answer y or n: ");
X }
X fprintf(output, "anon:\t%s", buf);
X check_io(output, oname, EOF_NOT_OK);
X
X /* determine if there is another author */
X printf("\nIs there another author (enter y or n)? ");
X while (get_line(buf, 1+1, 0) <= 0 || !(buf[0]=='y' || buf[0]=='n')) {
X printf("\nplease answer y or n: ");
X }
X if (buf[0] == 'y') {
X more_auths = TRUE;
X } else {
X more_auths = FALSE;
X }
X } while (more_auths == TRUE);
X return;
X}
X
X/*
X * output_info - output the ---info--- section(s)
X *
X * Read the needed information from stdin, and write the info section.
X * If multiple info files exist, multiple info sections will be written.
X */
Xvoid
Xoutput_info(output, oname)
X FILE *output; /* entry's output file stream */
X char *oname; /* name of the output file */
X{
X char infoname[MAX_FILE_LEN+1]; /* filename buffer */
X char yorn[1+1]; /* y or n answer */
X char *uuname; /* name to uuencode as */
X FILE *infile; /* info file stream */
X
X /*
X * prompt the user for info information
X */
X printf("\nInfo files should be used only to supplement your entry.\n");
X printf("For example, info files may provide sample input or detailed\n");
X printf("information about your entry. Because they are supplemental,\n");
X printf("the entry should not require them to exist.\n\n");
X
X /*
X * while there is another info file to save, uuencode it
X */
X printf("Do you have a info file to include (enter y or n)? ");
X while (get_line(yorn, 1+1, 0) <= 0 || !(yorn[0]=='y' || yorn[0]=='n')) {
X printf("\nplease answer y or n: ");
X }
X while (yorn[0] == 'y') {
X
X /* read the filename */
X printf("\nEnter the info filename: ");
X while (get_line(infoname, MAX_FILE_LEN+1, 0) <= 0) {
X printf("\nInfo filename too long, please re-enter: ");
X }
X
X /* compute the basename of the info filename */
X /* remove the trailing newline */
X uuname = &infoname[strlen(infoname)-1];
X *uuname = '\0';
X /* avoid rindex/shrrchr compat issues, do it by hand */
X for (--uuname; uuname > infoname; --uuname) {
X if (*uuname == '/') {
X ++uuname;
X break;
X }
X }
X
X /* attempt to open the info file */
X infile = fopen(infoname, "r");
X if (infile == NULL) {
X fprintf(stderr, "\n%s: cannot open info file: %s: ",
X program, infoname);
X perror("");
X continue;
X }
X
X /*
X * write the start of the section
X */
X fprintf(output, "---info---\n");
X check_io(output, oname, EOF_NOT_OK);
X
X /* uuencode the info file */
X uuencode(output, oname, infile, infoname, UUINFO_MODE, uuname);
X
X printf("\nDo you have another info file to include (enter y or n)? ");
X while (get_line(yorn, 1+1, 0) <= 0 || !(yorn[0]=='y' || yorn[0]=='n')) {
X printf("\nplease answer y or n: ");
X }
X };
X return;
X}
X
X/*
X * output_build - output the ---build--- section
X *
X * Read the needed information from stdin, and write the build section.
X */
Xvoid
Xoutput_build(output, oname, build, bname)
X FILE *output; /* entry's output file stream */
X char *oname; /* name of the output file */
X FILE *build; /* open build file stream */
X char *bname; /* name of the build file */
X{
X /*
X * write the start of the section
X */
X fprintf(output, "---build---\n");
X check_io(output, oname, EOF_NOT_OK);
X
X /*
X * uuencode the program file
X */
X uuencode(output, oname, build, bname, UUBUILD_MODE, UUBUILD_NAME);
X return;
X}
X
X/*
X * output_program - output the ---program--- section
X *
X * Read the needed information form stdin, and write the program section.
X */
Xvoid
Xoutput_program(output, oname, prog, pname)
X FILE *output; /* entry's output file stream */
X char *oname; /* name of the output file */
X FILE *prog; /* open program stream */
X char *pname; /* name of program file */
X{
X /*
X * write the start of the section
X */
X fprintf(output, "---program---\n");
X check_io(output, oname, EOF_NOT_OK);
X
X /*
X * uuencode the program file
X */
X uuencode(output, oname, prog, pname, UUPROG_MODE, UUPROG_NAME);
X return;
X}
X
X/*
X * output_end - output the ---end--- section
X *
X * Read the needed information form stdin, and write the 'end section'.
X */
Xvoid
Xoutput_end(output, oname)
X FILE *output; /* entry's output file stream */
X char *oname; /* name of the output file */
X{
X /*
X * write the final section terminator
X */
X fprintf(output, "---end---\n");
X check_io(output, oname, EOF_NOT_OK);
X return;
X}
X
X/*
X * get_line - get an answer from stdin
X *
X * This function will flush stdout, in case a prompt is pending, and
X * read in the answer.
X *
X * This function returns 0 if the line is too long, of the length of the
X * line (including the newline) of the line was ok. This function does
X * not return if ERROR or EOF.
X */
Xint
Xget_line(buf, siz, maxcol)
X char *buf; /* input buffer */
X int siz; /* length of input, including the newline */
X int maxcol; /* max col allowed, 0 => disable check */
X{
X int length; /* the length of the input line */
X
X /* flush terminal output */
X fflush(stdout);
X
X /* read the line */
X if (fgets(buf, siz+1, stdin) == NULL) {
X /* report the problem */
X check_io(stdin, "stdin", EOF_NOT_OK);
X }
X
X /* look for the newline */
X length = strlen(buf);
X if (buf[length-1] != '\n') {
X int eatchar; /* the char being eaten */
X
X /* no newline found, line must be too long, eat the rest of the line */
X do {
X eatchar = fgetc(stdin);
X } while (eatchar != EOF && eatchar != '\n');
X check_io(stdin, "stdin", EOF_NOT_OK);
X
X /* report the situation */
X return 0;
X }
X
X /* watch for long lines, if needed */
X if (maxcol > 0 && (length > maxcol || col_len(buf) > maxcol)) {
X /* report the situation */
X return 0;
X }
X
X /* return length */
X return length;
X}
X
X/*
X * output_till_dot - output a set of lines until '.' by itself is read
X *
X * This routine will read a set of lines until (but not including)
X * a single line with '.' is read. The format of the output is:
X *
X * leader:\tfirst line
X * \tnext line
X * \tnext line
X * ...
X *
X * This routine will not return if I/O error or EOF.
X */
Xvoid
Xoutput_till_dot(output, oname, leader)
X FILE *output; /* entry's output file stream */
X char *oname; /* name of the output file */
X char *leader; /* the lead text for the first line */
X{
X char buf[BUFSIZ+1]; /* input buffer */
X int count; /* lines read */
X int done=FALSE; /* TRUE => finished reading input */
X
X /* instruct the user on how to input */
X printf("\nTo end input, enter a line with a single period.\n");
X
X /* read lines until '.' or EOF */
X count = 0;
X while (!done) {
X /* issue the prompt */
X printf("%s\t", (count>0) ? "" : leader);
X fflush(stdout);
X
X /* get the line */
X if (get_line(buf, BUFSIZ, MAX_COL-9) <= 0) {
X printf("\nline too long, please re-enter:\n\t");
X continue;
X }
X
X /* note if '.' was read */
X if (strcmp(buf, ".\n") == 0) {
X done = TRUE;
X }
X
X /* write line if we read something */
X if (!done) {
X fprintf(output, "%s\t%s", (count++>0) ? "" : leader, buf);
X check_io(output, oname, EOF_NOT_OK);
X }
X }
X
X /* if no lines read, at least output something */
X if (count <= 0) {
X fprintf(output, "%s\t.\n", leader);
X check_io(output, oname, EOF_NOT_OK);
X }
X return;
X}
X
X/*
X * col_len - determine the highest that a string would reach
X *
X * Given a string, this routine returns that a string would reach
X * if the string were printed at column 1. Tab stops are assumed
X * to start at 9, 17, 25, 33, ...
X */
Xint
Xcol_len(string)
X char *string; /* the string to examine */
X{
X int col; /* current column */
X char *p; /* current char */
X
X /* scan the string */
X for (col=0, p=string; *p != '\0' && *p != '\n'; ++p) {
X /* note the column shift */
X col = (*p=='\t') ? 1+((col+8)/8*8) : col+1;
X }
X if (*p == '\n') {
X --col;
X }
X
X /* return the highest column */
X return col;
X}
X
X/*
X * check_io - check for EOF or I/O error on a stream
X *
X * Does not return if EOF or I/O error.
X */
Xvoid
Xcheck_io(stream, name, eof_ok)
X FILE *stream; /* the stream to check */
X char *name; /* the name of this stream */
X int eof_ok; /* EOF_OK or EOF_NOT_OK */
X{
X /* test for I/O error */
X if (ferror(stream)) {
X fprintf(stderr, "%s: error on %s: ", program, name);
X perror("");
X exit(1);
X
X /* test for EOF */
X } else if (eof_ok == EOF_NOT_OK && feof(stream)) {
X fprintf(stderr, "%s: EOF on %s\n", program, name);
X exit(1);
X }
X return;
X}
X
X/*
X * uuencode - uuencode a file
X *
X * Perform the uuencoding process identical to the process performed
X * by the uuencode(1) utility.
X *
X * This routine implements the algorithm described in the uuencode(5)
X * 4.3BSD Reno man page.
X */
Xvoid
Xuuencode(output, oname, infile, iname, umode, uname)
X FILE *output; /* output file stream */
X char *oname; /* output filename */
X FILE *infile; /* input file stream */
X char *iname; /* input filename */
X int umode; /* the mode to put on the uuencode file */
X char *uname; /* name to put on the uuencode file */
X{
X char buf[UUENCODE_LEN+1]; /* the uuencode buffer */
X int read_len; /* actual number of chars read */
X int val; /* 6 bit chunk from buf */
X char filler='\0'; /* filler uuencode pad text */
X char *p;
X
X /*
X * output the initial uuencode header
X */
X fprintf(output, "begin %o %s\n", umode, uname);
X check_io(output, oname, EOF_NOT_OK);
X
X /*
X * clear out the input buffer
X */
X for (p=buf; p < &buf[sizeof(buf)/sizeof(buf[0])]; ++p) {
X *p = '\0';
X }
X
X /*
X * We will process UUENCODE_LEN chars at a time, forming
X * a single output line each time.
X */
X while ((read_len=fread(buf,sizeof(buf[0]),UUENCODE_LEN,infile)) > 0) {
X
X /*
X * the first character is the length character
X */
X fputc(UUENCODE(read_len), output);
X check_io(output, oname, EOF_NOT_OK);
X
X /*
X * We will convert 24 bits at a time. Thus we will convert
X * 3 sets of 8 bits into 4 sets of uuencoded 6 bits.
X */
X for (p=buf; read_len>0; read_len-=3, p+=3) {
X
X /* bits 0 to 5 */
X val = (p[0]>>2)&0x3f;
X fputc(UUENCODE(val), output);
X check_io(output, oname, EOF_NOT_OK);
X
X /* bits 6 to 11 */
X val = ((p[0]<<4)&0x30) | ((p[1]>>4)&0x0f);
X fputc(UUENCODE(val), output);
X check_io(output, oname, EOF_NOT_OK);
X
X /* bits 12 to 17 */
X val = ((p[1]<<2)&0x3c) | ((p[2]>>6)&0x03);
X fputc(UUENCODE(val), output);
X check_io(output, oname, EOF_NOT_OK);
X
X /* bits 18 to 23 */
X val = p[2]&0x3f;
X fputc(UUENCODE(val), output);
X check_io(output, oname, EOF_NOT_OK);
X }
X
X /* end of UUENCODE_LEN line */
X fputc('\n', output);
X check_io(output, oname, EOF_NOT_OK);
X
X /*
X * clear out the input buffer (don't depend on bzero() or memset())
X */
X for (p=buf; p < &buf[sizeof(buf)/sizeof(buf[0])]; ++p) {
X *p = '\0';
X }
X }
X
X /* check the last read on the input file */
X check_io(infile, iname, EOF_OK);
X
X /* write end of uuencode file */
X fprintf(output, "%c\nend\n", UUENCODE(filler));
X check_io(output, oname, EOF_NOT_OK);
X}
SHAR_EOF
chmod 0444 mkentry.c ||
echo "restore of mkentry.c failed"
set `wc -c mkentry.c`;Wc_c=$1
if test "$Wc_c" != "33961"; then
echo original size 33961, current size $Wc_c
fi
# ============= obfuscate.info ==============
echo "x - extracting obfuscate.info (Text)"
sed 's/^X//' << 'SHAR_EOF' > obfuscate.info &&
X1993 Obfuscated contest information
X
XCopyright (c) Landon Curt Noll & Larry Bassel, 1993.
XAll Rights Reserved. Permission for personal, education or non-profit use is
Xgranted provided this this copyright and notice are included in its entirety
Xand remains unaltered. All other uses must receive prior permission in writing
Xfrom both Landon Curt Noll and Larry Bassel.
X
XThe International Obfuscated C Code Contest (IOCCC), in the sprit of
Xco-operation, is willing mention other programming contents, as space
Xpermits.
X
XHow to have your contest included in this file:
X
X If you wish the IOCCC judges to include your contest in this file,
X send a request to:
X
X judges@toad.com
X
X We request that contest descriptions be limited to 50 lines and to
X not exceed 2500 bytes. We typically request that your contest
X include a current description of the IOCCC.
X
X In order to be included in this file for given year, we must
X receive a current description no EARLIER than Jan 1 00:00:00 UTC and
X no LATER than Feb 15 00:00:00 UTC. Agreement to publish your
X contest must also be obtained prior to Feb 15. Annual contests
X that fail to submit a new entry will be dropped from this file.
X
XOfficial Disclaimer: (pardon the officialese)
X
X The contents noted below, other than the IOCCC, are not affiliated
X with the IOCCC, nor are they endorsed by the IOCCC. We reserve the
X right to refuse to print information about a given contest.
X
X The information below was provided by the particular contest
X organizer(s) and printed by permission. Please contact the
X contest organizer(s) directly regarding their contents.
X
XWith that official notice given, we present for your ENJOYMENT, the following
Xinformation about contents:
X
X---------------------------------------------------------------------------
X
X 10th International Obfuscated C Contest
X
X "The original obfuscated contest"
X
X Obfuscate: tr.v. -cated, -cating, -cates. 1. a. To render obscure.
X b. To darken. 2. To confuse: Their emotions obfuscated
X their judgment. [LLat. obfuscare, to darken : ob(intensive) +
X Lat. fuscare, to darken < fuscus, dark.] -obfuscation n.
X obfuscatory adj.
X
X GOALS OF THE CONTEST:
X
X * To write the most Obscure/Obfuscated C program under the rules below.
X * To show the importance of programming style, in an ironic way.
X * To stress C compilers with unusual code.
X * To illustrate some of the subtleties of the C language.
X * To provide a safe forum for poor C code. :-)
X
X The IOCCC is the grandfather of USENET programming contests. Since
X 1984, this contest demonstrated that a program that mearly works
X correctly is not sufficient. The IOCCC has also done much to add
X the arcane word 'obfuscated' back into the English language.
X (see "The New Hacker's Dictionary" by Eric Raymond)
X
X You are strongly encouraged to read the new contest rules before
X sending any entries. The rules, and sometimes the contest Email
X address itself, change over time. A valid entry one year may
X be rejected in a later year due to changes in the rules. The typical
X start date for contests is in early March. Contest rules are normally not
X finalized and posted until the beginning of the contest. The typical
X closing date for contests are in early May.
X
X The contest rules are posted to comp.unix.wizards, comp.lang.c,
X misc.misc, alt.sources and comp.sources.d. If you do not have access
X to these groups, or if you missed the early March posting, you may
X request a copy from the judges, via Email, at;
X
X judges@toad.com -or- ...!{sun,uunet,utzoo,pyramid}!hoptoad!judges
X
X Previous contest winners are available via anonymous ftp from
X ftp.uu.net under the directory /pub/ioccc.
X
X---------------------------------------------------------------------------
X
X 0th International Obfuscated Perl Contest
X By: Landon Noll & Larry Wall
X
X This content is being planned. Someday when Landon & Larry are not too
X busy, they will actually get around to posting the first set of rules!
X
X Landon says: "Yes, I know that I said we would have a contest in 1993,
X but other existing projects got in the way. Hopefully
X something will be developed after Nov 1993."
X
X---------------------------------------------------------------------------
X
X 2nd International obFUsCaTeD POsTsCripT Contest
X Jonathan Monsarrat (jgm@cs.brown.edu)
X Alena Lacova (alena@nikhef.nl)
X
X A contest of programming skills and knowledge, exclusively for the
X PostScript programming language. Its purpose:
X
X * To spread knowledge of PostScript and its details.
X * To applaud those with the best tricks.
X * To prove that humans can beat those damnable machine generators at
X their own game by writing the most obscure and mysterious PostScript
X programs ever.
X
X Winners will receive the fame and attention that goes with having their
X program entry posted as a winner to programmers world-wide.
X
X The 1993 contest rules and results are available by ftp as
X ``wilma.cs.brown.edu:pub/postscript/obfuscated*.shar'', or individually
X in the obfuscated directory. The judges will post the 1994 rules
X in November to comp.lang.postscript on Usenet, and other places.
X Send questions to jgm@cs.brown.edu.
X
X Categories include: Best Obfuscated PostScript, Best Artwork,
X Most Compact, Best Interactive Program, Most Useful, and
X anything so unusual and creative that it deserves an award.
X
X The judges will choose the winners of each category.
X
X Alena Lacova is a system administrator at NIKHEF (Institute for High
X Energy and Nuclear Physics) in the Netherlands. She is the author of
X The PostScript Chaos Programs, which draw Julia sets, Mandelbrot sets
X and other kinds of fractal functions.
X
X Jonathan Monsarrat is a graduate student from MIT and Brown University
X in the U.S.A. He is the FAQ maintainer for the Usenet newsgroup
X comp.lang.postscript and the author of The PostScript Zone and LameTeX.
X .
X
SHAR_EOF
chmod 0444 obfuscate.info ||
echo "restore of obfuscate.info failed"
set `wc -c obfuscate.info`;Wc_c=$1
if test "$Wc_c" != "6257"; then
echo original size 6257, current size $Wc_c
fi
exit 0
--
Sunnyvale residents: Vote Landon Noll for Sunnyvale City Council seat 1.
| 5comp.windows.x |
In article <1r9o0s$424@horus.ap.mchp.sni.de>, frank@D012S658.uucp (Frank O'Dwyer) writes:
>
> Not necessarily, but I believe that some people really are terrorists,
> and some people really are people of peace. I prefer the peaceful folk
> to the terrorists and even though I don't claim to have lock on which is which,
> I have hope in our ability to tell them apart, and it would be insane not to
> try.
Well, that's the end-point problem again. Being able to
distinguish some egregious terrorist from some saintly man
of peace does not mean that you have a method for telling
who's a terrorist in general.
Of course we *try* to tell them apart, but for my money
it's better to try with the full awareness that we all
bring bias to the judgement than to imagine that we are
using some objective test.
jon.
| 19talk.religion.misc |
In article <alan-210493163447@17.129.12.26> alan@apple.com (Alan Mimms) writes:
>Actually detecting a BREAK is done by watching for a "character" containing
>all zero bits with the framing error resulting from its receipt. This
True enough, but...
>means that the line stayed in the zero bit state even past the stop bit
>time slot, which basically indicates a BREAK. There is no special way to
>detect BREAK that I have found other than this -- there's no magic signal
>generated by UARTs, etc.
Zilog SCC:
---------
RR0[7]: Break Detect
This is a very popular part, but it has a number of quirks, especially
in HDLC mode.
Signetics 68562 DUSCC:
---------------------
RSR[2]: Break Start Detect
RSR[3]: Break End Detect
Two of the bits in the Receiver Status Register. You can enable an interrupt
on either of these bits going high, too. Also, only one NULL will be put
in the FIFO per break detected.
This is simply the best serial chip I've ever worked with. _Many_ less
quirks than the SCC, which is IMHO second-best. (Death to 8250 devices!)
--
+----------------+
! II CCCCCC ! Jim Cathey
! II SSSSCC ! ISC-Bunker Ramo
! II CC ! TAF-C8; Spokane, WA 99220
! IISSSS CC ! UUCP: uunet!isc-br!jimc (jimc@isc-br.isc-br.com)
! II CCCCCC ! (509) 927-5757
+----------------+
One Design to rule them all; one Design to find them.
One Design to bring them all and in the darkness bind
them. In the land of Mediocrity where the PC's lie.
| 12sci.electronics |
In article <May.9.05.40.06.1993.27468@athos.rutgers.edu>,
jwindley@cheap.cs.utah.edu (Jay Windley) writes...
[...]
>There are other interpretations to Christian history in this matter.
>One must recall that most of what we know about the Gnostics was
>written by their enemies. Eusebius claims that Jesus imparted secret
>information to Peter, James, and John after His resurrection, and that
>those apostles transmitted that information to the rest of the Twelve
>(Eusebius, _Historia Ecclesiastica_ II 1:3-4).
This is curious. I read in _EH_...
"The Lord imparted the gift of knowledge to James the Just, to John
and Peter after his resurrection, these delivered it to the rest of
the apostles, and they to the seventy, of whom Barnabas was one."
--- Eusebius, _Ecclesiastical History_
It seems that the Lord imparted the gift of knowledge, not that the
Lord imparted secret information.
[...]
>apostles. Interestingly enough, Eusebius refers to the groups which
>we today call Gnostics as promulgators of a false gnosis (Eusebius,
>op. cit., III, 32:7-8). His gripe was not that thay professed *a*
>gnosis, but that they had the *wrong* one.
I'm afraid that I cannot find this portrayal in _EH_.
I don't see anywhere in 3:32:7-8 where Eusebius mentions that certain
gnostics had the wrong gnosis.
The closest is when Eusebius summarizes Hegesippus' statements,
"...whilst if there were any at all, that attempted to pervert
the sound doctrine of the saving gospel, they were yet skulking
in dark retreats..."
>Now one can approach this and other such evidence in many ways. I
>don't intend that everyone interpret Christian history as I do, but I
>believe that evidence exists (favorably interpreted, of course) of
>early Christian rites analogous to those practiced by Mormons today.
"Favorably interpreted?" Just in looking at two of the four
references that you gave (I have the _EH_ handy, Irenaeus and the
_Clemetine Recognitions_ I will have to look for) I see no room for
such 'interpretations.'
And any such 'interpretation' still falls short of an equivalence to
the Temple Ceremonies.
The links for Jay's using _EH_ for support are: "imparting the gift
of knowledge" = "imparted secret information" = "being given secret
signs and tokens to gain entrance to heaven." But there is not
enough equivalence between the the ideas for us to be able to call
this "favorable interpretation." It appears to be closer to
"fabrication."
=============================
Robert Weiss
psyrobtw@ubvms.cc.buffalo.edu
| 15soc.religion.christian |
In article <1993Apr5.083324.48826@kuhub.cc.ukans.edu>, wellison@kuhub.cc.ukans.e
du writes:
>I have a project that was drooped in my lap that is somewhat a pain to design.
>What I am looking for is a stable ultra-long solid state timer. What they want
>to do is to place this thing on the Antartic ice shelf and measure the amount
>of snow fall over a period of six weeks. Every two weeks, they want to trip a
>selonoid to discharge different colored pellets by gas pressure out across the
>snow. Then by digging down into the snow, the snow fall amount can be measured
>as they come to the different color pellets.
>
>The problem is trying to build a timer that would stand the cold (-40 degrees)
>and a power source that wouldn't drain. I have looked at the XR-2204 timers and
>the standard NE556 dual timers, but thier temp specs won't go that low. Also,
>two weeks equates to 1,209,600 seconds per firing, which means one big timing
>cap ! I have found 2.2 farad (yes, Farad !) caps that have a working voltage of
>5 volts and are small in size. But again, the time of discharge at -40 or lower
>degrees isn't linear. I was thinking of using several timers chained together
>to fire the selonid at the end of the timing period, but that blasted cold and
>the drain on a battery over six weeks is the pain. One possibility would be to
>use solar panels, but this is during the six month twilight. Anyone have any
>good ideas ?
>
>Thanks in advance...
>
>-=-= Wes =-=-
>
just a suggestion:
take a motorola mc14536B set it up to give you a pulse once every sec or ten
secs with either a RC or xtal clock input. then feed to a MC14521B as clock
input and decode output for 1,209,600 sec output ,might have to add a few 'and'
gates or decoder chips to get output and reset pulse back to the'521 to restart
cycle... Trigger a oneshot from the decoded riseing edge ;the one shot then
goes to a mosfet to drive the mechanism to fire the pellet launcher..
these ckts require uAmps of current,between 5 - 15 volts, so a 12 volt
gel cell of a few Amphours would last the six weeks.
Then take the ckt board & battery wrap in 3" or 4" of foam or build a box
of out of the stuff...with plywood or metal exterior...
build a small heater out of 10-50 Watt resistors in series to keep the battery
and ckts warm.
2nd thought use 2 batteries one for heater one for timer and pellet trigger.
Insolate-insolate.......even though the chips state that the - AL
rated devices are good to -55 C.. The batteries have a considerable reduction
in capacity...oh make sure the area inside has minium air leakage..
hope this helps
RW ( is this to long winded for the net??)(be gentle)...
--
| 12sci.electronics |
How does one print to a non-appletalk printer using DMM LaserWriter Stuff.
I'm using the Serial driverand does nothig. I'vetried saving a postscriptfile and then tried sending with SendPS2.0 and it says can'topen LaserWriter Driver,
then some appletalk messagethatprinter not specified. I'm using and imagewritwrite one cable. Should I use a null-modem adapter? Help...
---Lowell
--
***********************************************************************
* Lowell Reiter "I need a Vacation... Now!!! " *
* Tufts University *
* Internet Account: lreiter@jade.tufts.edu *
***********************************************************************
| 4comp.sys.mac.hardware |
Just a quick reminder:
The way you are interpreting those passages is your opinion. You make
it sound as if your opinion is somehow an undisputable fact.
Many would interpret the passages you cite very differently.
(Many have--several of the great theologians you mentioned do that
very thing. These were people who had much more expertise in the
interpretation of scripture than you or me or probably anyone reading
this newsgroup. To say that all of them are wrong and you are right
is, in my opinion, (notice those last three words) coming pretty darn
close to the sin of pride.
In the future I would suggest you not be so absolutist in your
interpretations, especially when contradicting highly respected
doctors of Christianity.
- Mike Walker
mdw33310@uxa.cso.uiuc.edu
(Univ. of Illinois)
| 15soc.religion.christian |
For sale:
1981 Oldsmobile Omega four door. Gray, power windows, power steering,
power brakes, remote trunk release. Starts reliably and runs well,
but needs some work. $400 obo.
For details, email or (708)864-0526.
--
Michael A. Atkinson | There is no try, there is only Dew.
asbestos@nwu.edu |
A Libertarian and an NRA member.
| 7rec.autos |
In article <19930423.010821.639@almaden.ibm.com> nicho@vnet.ibm.com writes:
>>Since we don't have the money to keep them going now, how will
>>changing them to a seperate agency help anything?
>>
>How about transferring control to a non-profit organisation that is
>able to accept donations to keep craft operational.
The problem is, you can't raise adequate amounts of money that way.
The Viking Fund tried. They did succeed, in a way, but only because
of the political impact of their fundraising. The actual amount of
money they raised was fairly inconsequential; it would not have kept
the Viking lander going by itself.
--
All work is one man's work. | Henry Spencer @ U of Toronto Zoology
- Kipling | henry@zoo.toronto.edu utzoo!henry
| 14sci.space |
Chuck Kuczaj (csk@wdl50.wdl.loral.com) wrote:
: mbeaving@bnr.ca (Michael Beavington) writes:
:
: McGuire's makes a plastic scratch/removing compound and a plastic
: polishing compound which really work great as well.
A useful tip.
How about someone letting me know MOTORCYCLE DETAILING TIP #19 ?
The far side of my instrument panel was scuffed when the previous owner
dumped the bike. Same is true for one of the turn signals.
Both of the scuffed areas are black plastic.
I recall reading somewhere, that there was some plastic compound you could coat
the scuffed areas with, then rub it down, ending with a nice smooth shiny
finish ?
Anyone any ideas.
thanks
tony
--
Tony Jones (ant@cray.com, ..!uunet!cray!ant)
CMCS Codegeneration Group, Software Division
Cray Research Inc, 655F Lone Oak Drive, Eagan, MN 55121
| 8rec.motorcycles |
Holly KS (cs3sd3ae@maccs.mcmaster.ca) wrote:
> My Western Digital also has three sets of pins on the back. I am using it with
> another hard drive as well and the settings for the jumpers were written right
> on the circuit board of the WD drive......MA SL ??
The ??-jumper is used, if the other drive a conner cp3xxx.
no jumper set: drive is alone
MA: drive is master
SL: drive is slave
Michael
--
* michael@jester.gun.de * Michael Gerhards * Preussenstrasse 59 *
* Germany 4040 Neuss * Voice: 49 2131 82238 *
| 3comp.sys.ibm.pc.hardware |
Hi,
I am looking to buy an accelerated video card for my 486 DX 50 with
ISA bus. I have a 14" SVGA NI monitor. I'm currently running
DOS 5.0 and windows 3.1, although I'm considering OS/2 in the
future. Can anyone make a suggestion for a video card that would
suit my needs? How is Diamond speedstar? Stealth? Etc....
Thanks.
--Kent
| 3comp.sys.ibm.pc.hardware |
On 19 Apr 1993 16:59:12 -0400, graham@sparc1.ottawa.jade.COM (Jay Graham) said:
> I am developing an X (Xt,Xm) application that will include a graphics window
> of some sort with moving symbols among other things. A pure X application
> could be implemented with Motif widgets, one of which would be an
> XmDrawingArea for drawing with Xlib. But I would like to take advantage of
> the Graphics Library (GL) available on our IBM RS/6000 (SGI's GL i believe).
> Is it possible to mix X and GL in one application program?
> Can I use GL subroutines in an XmDrawingArea or in an X window opened by me
> with XOpenWindow?
In SGI's distribution with their Indigo line (others as well, possibly),
they include source code for a GL widget that fits on top of Motif, and
one that's Xt based as well. You may wish to ask IBM whether they
support this.
--
Robert L. McMillin | Surf City Software | rlm@helen.surfcty.com | Dude!
#include <std.disclaimer.h>
| 5comp.windows.x |
A bright light phenomenon was observed in the Eastern Finland
on April 21. At 00.25 UT two people saw a bright, luminous
pillar-shaped phenomenon in the low eastern horizont near
Mikkeli. The head of the pillar was circular. The lower part
was a little winding. It was like a monster they told. They
were little frightened. Soon the yellowish pillar became
enlarged. A bright spot like the Sun was appeared in the middle
of the phenomenon. At last the light landed behind the nearby
forest. Now there was only luminous trails in the sky which were
visible till morning sunrise.
The same phenomenon was observed also by Jaakko Kokkonen in
Lappeenranta. At 00.26 UT he saw a luminous yellowish trail in
the low northeastern horizont. The altitude of the trail was
only about 3-4 degrees. Soon the trail began to grow taller.
A loop was appeared in the head of the trail. It was like a
spoon. This lasted only 10 seconds. Now the altitude was about
five degress above horizont. He noted a bright spot at the
upper stage of loop. The spot was at magnitude -2. The loop
became enlarged and the spot was now visible in the middle of
the loop. A cartwheel-shaped trail was appeared round the bright
spot. After a minute the spot disappeared and only fuzzy trails
were only visible in the low horizont. Luminous trails were still
visible at 01.45 UT in the morning sky.
The phenomenon was caused by a Russian rocket. I don't know if
there were satellite launches in Plesetsk Cosmodrome near
Arkhangelsk, but this may be a rocket experiment too. Since 1969
we have observed over 80 rocket phenomena in Finland. Most of
these are rocket experiments (military missile tests?), barium
experiments and other chemical releases. During these years we
have observed 17 satellite launches.
Leo Wikholm
=====================================================================
Ursa Astronomical Association I phone : +358-0-174048
Satellite and Rocket Phenomena Sect. I fax : +358-0-657728
Laivanvarustajankatu 9 C 54 I bbs : +358-0-174341
FIN-00140 Helsinki I inter : leo.wikholm@compart.fi
Finland I
=====================================================================
| 14sci.space |
In article <C5HF6r.CG3@ncratl.AtlantaGA.NCR.COM> mwilson@ncratl.AtlantaGA.NCR.COM (Mark Wilson) writes:
>In <C5FG7t.6At@exnet.co.uk> sys1@exnet.co.uk (Xavier Gallagher) writes:
>
>|I have to disagree. You do not take your logic far enough.
>
>|True, man did not invent the need for food, shelter, warmth and the ilk,
>|but man did invent the property laws and the laws of trespass.
>
>I guess Xavier has never heard of territoriality in animals. Many animals,
>especially preditors will stake out a territory and chase of any members of
>the same species that tries to invade their territory.
Yes, I have! Wasn't there a case of a single lion ruling all the land
from South Africa up to Egypt across to the congo? If my memory serves
me correctly there was enough game to feed some 100,000 or more lions but he
wouldn't let the other lions hunt as he wanted it all himself.
He died of a heart attack brought on by being overweight.
Good thing too as he had designs on Europe, America (north and south),
and the Falkland Islands.
>Mark.Wilson@AtlantaGA.NCR.com
Xavier.
| 18talk.politics.misc |
dsh@eceyv.ncsu.edu (Doug Holtsinger) writes:
>Janet Reno killed the Waco children. She is responsible for
>their deaths. She should resign immediately.
( I AGREE ! )
>She should have
>understood that David Koresh was a madman who would do anything
>against the children if he became provoked. All the warning
>signs were there and she ignored them. She provoked Koresh
>into killing the children.
I think the problem here is that Mrs. Reno strikes me
( After watching NightLine Last night ) as a person who is incapable
of understanding OR dealing with a great number of things.
fact is that Bill and Hillary had to clear the decks for their
"Dream Package" of "Free Stuff" for the American People (..Their
subjects...). They couldn't have a wild card floating around while
they and Robert "the Fifth Reich" Reich plan the glorious "Peoples
Democracy". That wouldn't fit in with their vision of themselves or
whatyou should be "progressively" working for... after all,
who do you think your'e working for... and if a handful of peasant
children have to die for the glorious vision of "the year of the Child"
in America, its a small price to pay. Let them eat cake....
| 18talk.politics.misc |
>roots in Detroit. He would be a valuable asset to the Wings and Perhaps the
>Rangers could get a Zombo in return?
Wake up and smell the Norris!! Rick Zombo was traded to the Blues for Vince
Riendo (sp?) last season.
- Mike
| 10rec.sport.hockey |
In article <1993Apr13.025426.22532@mnemosyne.cs.du.edu> kcochran@nyx.cs.du.edu (Keith "Justified And Ancient" Cochran) writes:
>In article <47749@sdcc12.ucsd.edu> shopper@ucsd.edu writes:
>>
>>Does anyone have or know where I can find a list of christian-owned
>>corporations and companies? One that I know of is WordPerfect.
>
>I believe that WordPerfect is actually owned by the Mormons.
Sorry, but Mormons aren't generally considered to be Christians.
>--
>=kcochran@nyx.cs.du.edu | B(0-4) c- d- e++ f- g++ k(+) m r(-) s++(+) t | TSAKC=
>=My thoughts, my posts, my ideas, my responsibility, my beer, my pizza. OK???=
>="Do you have some pumps and a purse in this shade? A perfume that whispers, =
>='please come back to me'? I'm looking for something in Green."-Laurie Morgan=
| 19talk.religion.misc |
In article <1993Apr23.164901.13892@megatek.com> randy@megatek.com writes:
> When did *you* go out and change the laws of physics? :-) According to some
>numbers I used to see bandied around, shaft drive is on the order of 95-97%
>efficient, while chain drive is closer to 99%... Seems to me that this makes
>*chain* drive more efficient, hmmmmm???
>
Well maintained chains, running in oil, without those little rubber 'O' rings
to cause frictional losses, might reach 99% efficiency. The average open to
the dust 'O' ring motorcycle chain probably has a difficult job making 90%
efficient.
Tony
+---------------+------------------------------+-------------------------+
|Tony Kidson | ** PGP 2.2 Key by request ** |Voice +44 81 466 5127 |
|Morgan Towers, | The Cat has had to move now |E-Mail(in order) |
|Morgan Road, | as I've had to take the top |tony@morgan.demon.co.uk |
|Bromley, | off of the machine. |tny@cix.compulink.co.uk |
|England BR1 3QE|Honda ST1100 -=<*>=- DoD# 0801|100024.301@compuserve.com|
+---------------+------------------------------+-------------------------+
| 8rec.motorcycles |
>From: pwiseman@salmon.usd.edu (Cliff)
>Organization: University of South Dakota
>Subject: roman.bmp 01/14In response to the requests for cool
>bitmaps I am posting one.
>Date: 04/27 03:50 PM
>_______________________________________________________
>Due to the resolution and size it is in 14 parts.
>
>This is a uuencoded bitmap. 960X600 256 colors.
>The picture is a marbled gazebo on a desert with blue sky background.
>The size is just right for centered wallpaper on a 1024x768 display
>because it leaves a border at the bottom just big enough for icons
>to fit in without being on top of the picture. Reguarding image
>quality and resolution - I have not seen much better.
Please do not do this!
I don't know how the rest of you read news, but here's how I do it: I
subscribe to an "outernet" system which allows me to dial up via modem and
download e-mail and news articles automatically. When someone posts a
huge attached binary file, I have no choice but to receive it along with
all the other new articles in the groups I subscribe to. I also pay for
the connect time, which is normally not a problem because I have a 14.4K
modem and each day's upload/download session takes only 5 minutes or so.
Today's session, however, lasted about 25 minutes because of ROMAN.BMP.
Consequently, it cost me about $3.00 extra just to receive a file that I
didn't want in the first place.
If you have cool bitmaps that you want to make available, there are other
ways to do it: either upload the file to an ftp site (like
ftp.cica.indiana.edu, which has a complete Windows section) and tell
people how to get to it, or use one of the newsgroups like
alt.binaries.pictures (or something like that), which are file archives
rather than discussion groups. Don't use discussion groups like this one
to send out attached files, especially when they're 600K in size.
Thanks
Ed Klein
eklein@spiff.win.net
| 2comp.os.ms-windows.misc |
douglas craig holland (holland@CS.ColoState.EDU) writes:
>
> With E-Mail, if they can't break your PGP encryption, they'll just
> call up one of their TEMPEST trucks and read the electromagnetic
> emmisions from your computer or terminal. Note that measures to
> protect yourself from TEMPEST surveillance are still classified, as
> far as I know.
are LCD displays vulnerable to tempest?
> If the new regime comes to fruition, make sure you protect your First
> Amendment rights by asserting your Second Amendment Rights.
i'll second that.
jason
--
"I stood up on my van. I yelled, `Excuse me, sir. Ain't nothing wrong
with this country that a few plastic explosives won't cure!'"
- Steve Taylor, I Blew Up the Clinic Real Good
`,`,`,`,`,`,`,`,`,`,`,`,`,`,`,`,`,` steiner@jupiter.cse.utoledo.edu `,`,`,`
| 11sci.crypt |
For Sale:
Fitted car cover specifically for '91',92,'93 MR-2.
Top of the line Evolution-3 [TM] fabric. Used for less than 6 months.
The cover is in excellent condition-no rips, cuts, stains or other
blemishes. It has grommets for a locking cable. The color is silver.
Price: $90 f.o.b. will ship collect
please contact wchutt@monsanto.com
or phone at
314 576 3798 after 6 pm CDT
| 7rec.autos |
Im trying to find a site that has UPDATED(daily) stats more the
National league. I'll take both leagues but I'm really interested in the
National league.
How about them Philadelphia Sillies
| 9rec.sport.baseball |
Could somebody please tell me if there is a Dodgers newsletter on the Net,
and if so how to subscribe? Thanks,
Joel
| 9rec.sport.baseball |
In article <rhaller-260493122521@rhaller.cc.uoregon.edu>, rhaller@ns.uoregon.edu (Rich Haller) writes:
|> I have a fairly severe high frequency hearing loss. A recent rough test
|> showed a gently sloping loss to 10-20db down at 1000cps. Then it falls off
|> a cliff to 70-80dbs down from 1500cps on. This type of loss is difficult
|> to fit. I am currently using some old siemens behind the ear aids which
|> keep me roughly functional, but leave a lot to be desired.
|>
|> Recently I had an opportunity to test the Widex Q8 behind the ear aids for
|> several weeks. These have four independent programs which are intended to
|> be customized for different hearing situations and can be reprogramed. I
|> found them to be a definite improvement over my current aids and was about
|> to go ahead with them until another local outfit advertised a free trial of
|> another programmable system called ReSound.
|>
|> Unfortunately I was only able to try the ReSound aids in their office for
|> about 30 minutes and I couldn't compare them 'head to head' with the Widex.
|> Nevertheless, it did appear to me that they were superior and I was
|> impressed by what I was able to read about the theory behind them which I
|> will give in a separate posting. They also carry the Widex aids and had one
|> patient (presumably wealthy) who decided to go ahead and get the ReSound
|> even though he had purchased the Widex only 6 months ago.
|>
|> The problem is that the ReSound aids are about twice as expensive as the
|> Widex and other programmable aids. I could take a trip to Europe on the
|> difference! Being a lover of bargains and hating to spend money, I am
|> having a hard time persuading myself to go with the ReSounds. I would
|> appreciate any opinions on this and other hearing aids and projections
|> about when and if I might see improvements in technology that aren't quite
|> so expensive.
|>
|>
Your hearing curve sounds a lot like mine (thanks, Uncle Sam!). I've been
wearing Miracle Ear canal aids for about 5 months now and I find them to be
acceptable. They are molded to the shape of your ear canal, and tuned to
your hearing curve. They are comfortable to wear and almost invisible, if
you're worried about that (although if you're currently wearing behind the
ear models, that's not an issue). The cost: I paid $1200 each for mine,
through the Miracle Ear counter at Sears. I've heard that there is a
substantial discount for senior citizens, but I haven't researched that, because
I'm not a senior citizen, yet!
Give them a try; you might be pleasantly surprised!
--
Alan Hepburn "A man doesn't know what he knows
National Semiconductor until he knows what he doesn't know."
Santa Clara, Ca
alan@berlioz.nsc.com Thomas Carlyle
| 13sci.med |
Mark Ashley's account of private revelation does not, as some might
think, contradict my posting in which I said that the Catholic Church
believes that public revelation, on which Catholic doctrine is based,
ended with the death of St. John, the last Apostle. In that posting
I made sure I used the word "public". Public revelation contains
God's truth intended for everyone to believe. The revelation contained
in the Bible is a significant subset of public revelation. Private
revelation is revelation that God gives to an individual. He may speak
directly to the individual, He may send an angel, or He may send the
Virgin Mary or some lesser saint. The only person who is required to
believe a private revelation is the person to whom it is revealed.
Devotional practices may be based on reported private revelations,
but doctrines can not.
When an alleged private revelation attracts sufficient attention, the
Church may investigate it. If the investigation indicates a likelihood
that the alleged private revelation is in fact from God, it will be
approved. That means that it can be preached in the Church. However,
it is still true that no one is required to believe that it came from
God. A Catholic is free to deny the authenticity of even the most
well attested and strongly approved private revelations, such as those
at Fatima and Lourdes. (I suspect that few if any Catholics do reject
Fatima and Lourdes, but if any do their rejection of them does not
mean they are not orthodox Catholics in good standing.)
I do not have at hand a list of the criteria the Church uses in
evaluating an alleged private revelation--it's not something I need
every day--but I know that one of the primary requirements is that
nothing in the alleged private revelation can contradict anything
known through public revelation
-------
Marty Helgesen
Bitnet: mnhcc@cunyvm Internet: mnhcc@cunyvm.cuny.edu
"What if there were no such thing as a hypothetical situation?"
| 15soc.religion.christian |
In article <C5sDCK.38n@news.cso.uiuc.edu> eshneken@ux4.cso.uiuc.edu (Edward A Shnekendorf) writes:
>Come on! Most if not all Arabs are sympathetic to the Palestinian war
>against Israel.
I wouldn't bet on it.
Arab governments generally don't care much about the Palestineans and
their struggle but find it useful for political purposes back home.
They are happy to leave the Palestineans largely under Israeli control
because that leaves the job of controlling them to the Israelis. The
Israelis don't like this job any more than King Hussein of Jordan
liked it -- and he managed to kill them off at the rate of thousands
per month when they started an Intifada in Jordan. The governments of
Syria, Lebanon and Egypt all feel similarly. However, proclaiming
public support for the Palestinean war against Israel deflects
criticism from deep problems at home and lends an air of legitimacy to
even the most brutal Arab tyrants.
Arab *PEOPLE* probably aren't much more sympathetic. Palestineans
have shown a willingness to destabilize and plunder in Jordan,
Lebanon and Kuwait and are viewed with suspicion elsewhere.
You might still be right in sympathy to the war against Israel, but I
suspect that many Arabs, far removed from the immediate border with
Israel (e.g. in Kuwait or Morroco), couldn't care less.
--
Jake Livni jake@bony1.bony.com Ten years from now, George Bush will
American-Occupied New York have replaced Jimmy Carter as the
My opinions only - employer has no opinions. standard of a failed President.
| 17talk.politics.mideast |
In article <39898@optima.cs.arizona.edu> bakken@cs.arizona.edu (Dave Bakken) writes:
[deleted]
>
>Is this really what you (and Rached and others in the general
>west-is-evil-zionists-rule-hate-west-or-you-are-a-puppet crowd)
>want, Ilyess?
It's noteworthy that the posts about the west being
evil etc are made not in some Islamic hellhole but from
the west. If the west is so bad, why do they come here?
Notice how they comfortably exercise their rights to
free expression, something completely absent in their
own countries.
Vasudev
--
+-------------------------------------------------------------------+
|Vasudev Murthy Any opinions expressed are strictly |
|murthy@asl.dl.nec.com my own and have nothing to do with |
| Advanced Switching Lab, NEC America, Inc.|
| 17talk.politics.mideast |
The two historic facts that I think the most important are these:
(1) If Jesus didn't rise from the dead, then he must have done something
else equally impressive, in order to create the observed amount of impact.
(2) Nobody ever displayed the dead body of Jesus, even though both the
Jewish and the Roman authorities would have gained a lot by doing so
(it would have discredited the Christians).
--
:- Michael A. Covington internet mcovingt@ai.uga.edu : *****
:- Artificial Intelligence Programs phone 706 542-0358 : *********
:- The University of Georgia fax 706 542-0349 : * * *
:- Athens, Georgia 30602-7415 U.S.A. amateur radio N4TMI : ** *** ** <><
| 15soc.religion.christian |
jrogoff@scott.skidmore.edu (jay rogoff) writes:
>One last infield fly question that has always puzzled me and hasn't
>yet been addressed. I believe the rule also does *not* deal with this
>situation:
>However, if the Infield Fly is *not* caught, at what point can a runner
>legally leave his base w/o fear of being doubled off for advancing too
>early?
The runner can leave his base at any time. If the ball is caught,
he's got to tag up. If it isn't caught, he _doesn't_ have to tag up at
all. So, if he's feeling lucky, your runner at second can sprint for glory
as soon as the ball is popped up. If it isn't caught, he's probably scored
a run. If it is, he's probably headed for AAA.
The only effect the infield fly has is to make the batter out,
thereby removing the force on the runners on base. All other rules apply,
as if you were standing second with first open and the ball is popped up.
--
Tim Shippert shippert@cco.caltech.edu
"If we are going to stick to this damned quantum-jumping, then I regret
that I ever had anything to do with quantum theory."
-E. Schrodinger
| 9rec.sport.baseball |
Source: "Men Are Like That" by Leonard Ramsden Hartill. The Bobbs-Merrill
Company, Indianapolis (1926). (305 pages).
(Memoirs of an Armenian officer who participated in the genocide of 2.5
million Muslim people)
p. 19 (first paragraph)
"The Tartar section of the town no longer existed, except as a pile of
ruins. It had been destroyed and its inhabitants slaughtered. The same
fate befell the Tartar section of Khankandi."
p. 130 (third paragraph)
"The city was a scene of confusion and terror. During the early days of
the war, when the Russian troops invaded Turkey, large numbers of the
Turkish population abandoned their homes and fled before the Russian
advance."
p. 181 (first paragraph)
"The Tartar villages were in ruins."
Serdar Argic
'We closed the roads and mountain passes that
might serve as ways of escape for the Turks
and then proceeded in the work of extermination.'
(Ohanus Appressian - 1919)
'In Soviet Armenia today there no longer exists
a single Turkish soul.' (Sahak Melkonian - 1920)
| 17talk.politics.mideast |
In article <1993Apr18.034352.19470@news.clarkson.edu>, tuinstra@sunspot.ece.clarkson.edu.soe (Dwight Tuinstra) writes:
|> It might pay to start looking at what this proposal might mean to a
|> police agency. It just might be a bad idea for them, too.
|>
|> OK, suppose the NY State Police want to tap a suspect's phone. They
|> need a warrant, just like the old days. But unlike the old days, they
|> now need to
|>
|> (a) get two federal agencies to give them the two parts of
|> the key.
|>
|> Now, what happens if there's a tiff between the two escrow houses?
|> Posession/release of keys becomes a political bargaining chit.
While I think it is unrealistic to suppose that the federal
agencies will fail to promptly comply with a court order, there is
still a good point here. Local law enforcement will be unable to perform
a wiretap without bringing in federal agencies. Based on the (possibly
incomplete) understanding of the system quoted from D. Denning, only the
FBI will be able to decrypt the system key encryption layer, which seems
to be needed even to identify what escrowed keys to request. This moves
a great deal of law enforcement power to the federal level.
The reason I like this point is that it may sway or even persuade
people who don't generally line up with the civil liberties crowd. A
national police force is opposed by people from a broad range of political
viewpoints.
olson@umbc.edu
| 11sci.crypt |
kasajian@netcom.com (Kenneth Kasajian) writes:
>wnkretz@ikesg1.energietechnik.uni-stuttgart.de (Oliver Kretzschmar) writes:
>> Hey,
>> could somebody tell me, how it is possible to work with the mouse
>> in a NON-Windows application, which runs in an window. We use
>> MS-WINDOWS 3.1 and have CLIPPER applications. Exists there any
>> routines or something else ? Please mail me your informations.
>> Thanks for your efforts,
>> Oliver
>>--
>> NAME : O.Kretzschmar Inst.IKE / University Stuttgart
>> PHONE: +49 711 685 2130 Pfaffenwaldring 31
>> FAX : +49 711 685 2010 7000 Stuttgart 80
>> EMAIL: wnkretz@ikesg1.energietechnik.uni-stuttgart.de
>Very simple. You have to have the MOUSE.COM or MOUSE.SYS loaded in DOS
>before you run Windows. Note that you don't need to have these files loaded
>to use the mouse in Windows.
One addition to this... I don't know if it applies to everybody. For my
(Microsoft 400dpi) mouse to work with windowed DOS apps, I had to use the
driver that came with Windows (Version 8.20). 8.1 didn't allow me to do
it for some reason.
| 2comp.os.ms-windows.misc |
I am looking for some Public Domain (and exportable) code for
encryption. Nothing elaborate, just something that will satisfy
a marketing need :-)
Oh yes, UNIX platform.
--
Jerry Natowitz
Guest user on:
ARPA jin@ursa-major.spdcc.com
UUCP {ima,harvard,rayssd,linus,m2c}!spdcc!jin
| 11sci.crypt |
In article <C62B7n.6B4@news.cso.uiuc.edu> cobb@alexia.lis.uiuc.edu
(Mike Cobb) writes:
>In <1ren9a$94q@morrow.stanford.edu> salem@pangea.Stanford.EDU (Bruce Salem)
>writes:
>>In article <C5ztJu.FKx@news.cso.uiuc.edu> cobb@alexia.lis.uiuc.edu
(Mike Cobb) writes:
>>>Why is the NT tossed out as info on Jesus. I realize it is normally tossed
>>>out because it contains miracles, but what are the other reasons?
>> It is not tossed out as a source, but would it be regarded as
>>unbiased and independant?
Bruce hits the main point simply -- as Russell Turpin does in more detail
in his response. *All* sources are, in modern historiography, to be used
critically, which is simply to say that any claims deriving from them are
subject to *specific* examination in the light of motives and other HUMAN
considerations (as well as the physical background). The critical method
applies BOTH to the original document AND to the uses made of it by others
(most emphatically *including* the historical researchers themselves.)
>wouldn't they be a better "reporter" than someone who heard about it second
>hand? I guess isn't firsthand better than second hand. I know, there is bias,
>and winners writing history, but doesn't the principle of firsthand being best
>still apply?
But given the critical principle, what evidence is there that we have
ANYTHING at ALL from "firsthand" sources about Jesus? Paul's letters are
indeed firsthand evidence ABOUT PAUL and his interactions. They are, as
a result, the most historically solid books in the NT. Paul's claims and
descriptions about his conflicts with Jerusalem may not be "wie es eigent-
lich gewesen" -- but they are most definitely the comments of a participant!
In other words, we'd evaluate Paul's statements more or less as we would
the testimony of a witness in court.
The gospels are another story altogether. Luke is most assuredly NOT a
firsthand witness. He *claims* to have gathered material that is closer
to the actual events -- but this is a conventional claim in ancient books
and Luke in fact NEVER NAMES a witness or points to any one thing in his
book(s) which derive from any source *we* can detect behind Luke. John
has a concluding remark that it derives from the testimony of a beloved
disciple (who is NOT named.) We are not bound to accept this claim (for
a long time, some scholars rejected it outright), but even if we do, it
makes the fourth gospel as we have it *at best* secondhand. Neither Mark
nor Matthew make any claims to be firsthand. Later (much later) Christian
tradition associates the first gosple with Matthew and a possible Aramaic
proto-gospel, and associates Mark with Peter as having something like the
same second-hand status of recounting Peter's preaching of the gospel.
Such traditional claims run into difficulties if we try to evaluate the
actual data before us. Luke and Matthew both appear to use (differently!)
an anonymous and not otherwise attested collection of _logoi_ (words and
deeds) of Jesus, as well as to be dependent on Mark. This makes their
testimony AT LEAST thirdhand.
All that said, historians DO attempt to glean whatever they can from the
NT sources, and they are overwhelmingly the obvious and best sources for
anything about the earliest Church. They are also *extremely* important
for the light they cast (however refracted through Christian biases) on
the sectarian world of Judaism just before and around the time of the
destruction of the 2nd Temple.
The problem of "the historical Jesus" is tricky, however. There is a
cycle of fashion on this (and we are now near a major "high" in people
thinking they *can* discern [with historico-critical plausibility] some-
thing about Jesus' life and opinions from the NT. The difficulty here
(which dominated thinking 50 years ago, and will probably return to favor
in another generation :-)) was pointed out by Bultmann, after Schweitzer's
treatment at the end of the previous high-point on the cycle -- simply
BECAUSE all our sources have passed through AT LEAST one layer of quite
anonymous shaping WITHIN the early Church, we have no easy and reliable
way to distribute ANY part of the material between "real" history and the
inventions of the Church. There are few "radical skeptics" who think we
have nothing of history in the gospels [though such a position can be
maintained], but neither have we any tools that can distinguish "shaping"
of real historical material by its communal use as opposed to "invention."
--
Michael L. Siemon "Stand, stand at the window
mls@panix.com As the tears scald and start.
mls@ulysses.att.com You shall love your crooked neighbor
-standard disclaimer- With your crooked heart."
| 0alt.atheism |
In article <1993Apr15.051309.22252@stortek.com>, pg@sanitas.stortek.com (Paul Gilmartin) writes:
> Bill Higgins-- Beam Jockey (higgins@fnalf.fnal.gov) wrote:
> : While you're at it, comet experts, explain how a comet gets into
> : Jovian orbit to begin with!
>
> : There are non-gravitational forces from heating and outgassing when a
> : comet gets into the inner solar system. [...]
>
> Don't forget the Galilean satellites of Jupiter.
My poor old physics intuition will be very surprised if these tiny
masses, sitting very close to Jupiter, play any role whatsoever in the
problem. Or, to put it more technically, the extra "volume" they add
to the phase space of possible capture trajectories is negligible.
Jupiter is 2E27 kg, while the Galilean satellites are around 1E23.
Also, as I said, the few references that I've looked at do not
mention outgassing or breakup as important processes. The important
thing is a Jupiter-Sun-comet "reverse slingshot" that leads to a
weakly Jupiter-bound orbit for the comet (at least a temporary one).
Bill Higgins | Late at night she still doth haunt me
Fermilab | Dressed in garments soaked in brine
Bitnet: HIGGINS@FNAL.BITNET | Though in life I used to hug her
Internet: HIGGINS@FNAL.FNAL.GOV | Now she's dead, I draw the line!
SPAN/Hepnet: 43011::HIGGINS | --after the tragedy, "Clementine"
| 14sci.space |
In article <1483500349@igc.apc.org>, cpr@igc.apc.org (Center for Policy Research) writes:
>
> From: Center for Policy Research <cpr>
> Subject: Ten questions about Israel
>
>
> Ten questions to Israelis
> -------------------------
>
> I would be thankful if any of you who live in Israel could help to
> provide
> accurate answers to the following specific questions. These are
> indeed provocative questions but they are asked time and again by
> people around me.
>
> 1. Is it true that the Israeli authorities don't recognize
> Israeli nationality ? And that ID cards, which Israeli citizens
> must carry at all times, identify people as Jews or Arabs, not as
> Israelis ?
Although the Hebrew expression LE'UM is used, the ID card specifically states on
the 2nd page: EZRACHUT YISREALIT: Israeli citizen. This is true for all
Israeli citizens no matter what their ethnicity. In the United States most
official forms have RACE (Caucasian, Black, AmerIndian, etc.).
>
> 2. Is it true that the State of Israel has no fixed borders
> and that Israeli governments from 1948 until today have refused to
> state where the ultimate borders of the State of Israel should be
> ?
>
Funny, I have a number of maps and ALL of them have fixed borders.
> 3. Is it true that Israeli stocks nuclear weapons ? If so,
> could you provide any evidence ?
Probably yes. So what ?
>
> 4. Is it true that in Israeli prisons there are a number of
> individuals which were tried in secret and for which their
> identities, the date of their trial and their imprisonment are
> state secrets ?
Apart from Mordechai Vanunu who had a trial behind closed doors, there was one
other espionage case (the nutty professor at the Nes Ziona Biological
Institute who was a K.G.B. mole) who was tried "in camera". I wouldn't exactly
call it a state secret. The trial was simply tried behind closed doors. I hate
to disappoint you but the United States has tried a number of espionage cases
in camera.
>
> 5. Is it true that Jews who reside in the occupied
> territories are subject to different laws than non-Jews?
>
Not Jews. Israeli citizens. Jordanian law is in effect in the West Bank but the
KNESSET passed a law that Israeli law would be binding on Israeli citizens
residing in the West Bank. These citizens could be Jews, Israeli Muslims, Druze,
or Israeli Christians. It has NOTHING to do with religion.
> 6. Is it true that Jews who left Palestine in the war 1947/48
> to avoid the war were automatically allowed to return, while their
> Christian neighbors who did the same were not allowed to return ?
Anyone who was registered (Jew, Muslim, Christian) could return. You might be
confusing this with the census taken in June 1967 on the West Bank after the
Six Day War. In *this* instance, if the Arab was not physically present he
couldn't reside on the West Bank (e.g. if he had been visting Jordan).
>
> 7. Is it true that Israel's Prime Minister, Y. Rabin, signed
> an order for ethnical cleansing in 1948, as is done today in
> Bosnia-Herzegovina ?
>
No. Not even if you drowned him in bourbon, scotch or brandy :-)
> 8. Is it true that Israeli Arab citizens are not admitted as
> members in kibbutzim?
Not true. Although a minority, there *are* some Israeli Arabs living on
kibbutzim. On the other hand, at my age (42) I wouldn't be admitted to a
kibbutz nor could the family join me. Not that I would be so thrilled to do so
in the first place. The kibbbutz movement places candidates under rigorous
membership criteria. Many Israeli Jews are not admitted.
>
> 9. Is it true that Israeli law attempts to discourage
> marriages between Jews and non-Jews ?
The religious status quo in Israel has marriage and divorce handled by the
religious courts. The RABBANUT handles marriage and divorce for Jews, the
Muslim SHAARIA courts are for Muslims, the Christian denominations have their
religious courts, and the Druze have their own courts. The entire religious
establishment (Jewish, Muslim, Druze, Christian) wants to keep it that way.
>
> 10. Is it true that Hotel Hilton in Tel Aviv is built on the
> site of a muslim cemetery ?
I believe it's adjacent to a former Muslim cemetary. From what I heard (and I'd
like to get feedback from Muslins on the net) sanctity of cemetaries is not
held that sancrosanct as it is held by Jews. The current Israeli Ministry of
Trade and Industry on Agron Road in Jerusalem is housed in a former hotel that
was built by Arabs in the 1920's on the site of an Arab cemetary.
Josh
backon@VMS.HUJI.AC.IL
>
> Thanks,
>
> Elias Davidsson Iceland email: elias@ismennt.is
| 17talk.politics.mideast |
Seeing all these questions about uart types, their availability, and their
relative merits, wouldn't it be fine, if for internal highspeed modems there
were a mode of operation bypassing the dull and stupid uart interface and
instead accessing directly the relatively large send/receive buffers of the
modem, thus eliminating all problems with interrupt latencies ?
Just an idea,
Wolfgang R. Mueller <dvs@ze8.rz.uni-duesseldorf.de>,
Computing Centre, Heinrich-Heine-University, Duesseldorf, Germany.
| 3comp.sys.ibm.pc.hardware |
In article <C5uHIM.JFq@rot.qc.ca> beaver@rot.qc.ca (Andre Boivert) writes:
>
>
>I am looking for comments from people who have used/heard about PhotoShop
>for Windows. Is it good? How does it compare to the Mac version? Is there
>a lot of bugs (I heard the Windows version needs "fine-tuning)?
>
Also photoshopII is out soon, has anyone got a date and any cofmments?
Andy
_______________________________________________________
| Andrew Leahy | aleahy@cch.coventry.ac.uk | Odd FROG |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"What a piece of work is man! how noble in reason! how infinite in faculties!
in form and moving, how express and admirable! in action how like an angel!
in apprehension how like a god! the beauty of the world, the paragon of
animals! And yet to me what is the quintessence if dust?
Man delights not me....... "
Shakespeare, Hamlet
| 1comp.graphics |
In article <0096B0F0.C5DE05A0@Msu.oscs.montana.edu>, alird@Msu.oscs.montana.edu writes...
>In article <1993Apr15.003015.1@vmsb.is.csupomona.edu>, cvadrnlh@vmsb.is.csupomona.edu writes:
>>Today (4/14) Cubs activated P Mike Harkey from DL, whom did they move to make
>>room for Harkey?
>>Also, are Delino Deshields & John Wetteland of the Expos on the DL?
>>Thanks for anyone who can give me more info!
>>/===
>>Ken
>>Cal Poly, Pomona
>>
>
>Wetteland is on the DL effective March 26 or something like that.
>
>rick
Wetteland comes off the DL on April 23rd, and will be evaluated on the 24th.
He is throwing well, and without pain on the side.
DeShields is not on the DL. He suffered from the chicken pox and lost
(this is the official total) 12 pounds. He will be back, hopefully,
next week.
Walker will be back this tonight or tomorrow...
CorelMARK! from Montreal.
| 9rec.sport.baseball |
In article <1483500349@igc.apc.org>, cpr@igc.apc.org (Center for Policy Research) writes:
>
> From: Center for Policy Research <cpr>
> Subject: Ten questions about Israel
>
>
> Ten questions to Israelis
> -------------------------
>
> I would be thankful if any of you who live in Israel could help to
> provide
> accurate answers to the following specific questions. These are
> indeed provocative questions but they are asked time and again by
> people around me.
>
> 1. Is it true that the Israeli authorities don't recognize
> Israeli nationality ? And that ID cards, which Israeli citizens
> must carry at all times, identify people as Jews or Arabs, not as
> Israelis ?
That's true. Israeli ID cards do not identify people
as Israelies. Smart huh?
> 3. Is it true that Israeli stocks nuclear weapons ? If so,
> could you provide any evidence ?
Yes. There's one warhead in my parent's backyard in
Beer Sheva (that's only some 20 miles from Dimona,
you know). Evidence? I saw it!
> 4. Is it true that in Israeli prisons there are a number of
> individuals which were tried in secret and for which their
> identities, the date of their trial and their imprisonment are
> state secrets ?
Yes. But unfortunately I can't give you more details.
That's _secret_, you see.
[...]
>
> Thanks,
>
> Elias Davidsson Iceland email: elias@ismennt.is
You're welcome. Now, let me ask you a few questions, if you
don't mind:
1. Is it true that the Center for Policy Research is a
one-man enterprise?
2. Is it true that your questions are not being asked
bona fide?
3. Is it true that your statement above, "These are indeed
provocative questions but they are asked time and again by
people around me" is not true?
Noam
| 17talk.politics.mideast |
In article <9491@blue.cis.pitt.edu> shah@pitt.edu (Ravindra S Shah) writes:
>
>Exactly. That is my biggest complaint about the coverage so far.
>Follow that damn puck!
>
If ESPN/ABC is going to stick with one-sided Pens-Devils series(and it
looks like they will continue with it on Thursday night), I'd rather
watch pretty women in the stands than non-action on the ice where a
slow,aging NJ team being taken out to lunch by a dynamic Pens squad.
-PPV Mark
| 10rec.sport.hockey |
Hi, can anyone tell me what Microsoft BBS number is ? I tried the one
that is given on the DOS 6 upgrade manual but that number never
answered the call ...
Thanks, please email.
| 2comp.os.ms-windows.misc |
What 4 or more com port boards are available for PCs?
We want standard com ports, so no need to mention the expensive
coprocessed ones.
They should either be able to share IRQs or be able to use IRQs 8-15.
Thanks for any info...
| 3comp.sys.ibm.pc.hardware |
My first encounter with a dog chasing after my bike was on my first poker run.
A big german shepard ran out into the pack of bikes I was riding with and tried
to bite the right leg of the guy riding in front of me. He kicked the dog a
couple of times (we were all only going about 10-15mph) and just made the dog
angrier and got away by applying WFO and outrunning the dog who then started
after yours truly. At the time, I had open drag pipes (obnoxiously loud as hell)
and as soon as the dog was about 2 feet away from the right side of my bike, I
pulled in the clutch and revved the motor up to about 5000rpm and the roar of
the pipes frightened the dog away (probably made the dog's ears hurt like hell)
and he didn't come back for the rest of the bikers behind me either.
My second encounter was with an already deceased road-kill dog. I wasn't paying
very close attention to the pavement when the car in front of me straddled the
carcass. I looked down just in time to see what I was about to run over so I
just held onto the handlebars and freaked out. Both wheels went squarely over
the dog's belly with a thump-thump just like running over a piece of a 4x4
lumber. The bike didn't lose any stability at all and I kept on going. After
I got to my destination, I found bits of fur, meat, and blood stuck to
the bottom of my motor and frame...... gross.
--
=============================================================================
Neal Howard '91 XLH-1200 DoD #686 CompuTrac, Inc (Richardson, TX)
doh #0000001200 |355o33| neal@cmptrc.lonestar.org
Std disclaimer: My opinions are mine, not CompuTrac's.
"Let us learn to dream, gentlemen, and then perhaps
we shall learn the truth." -- August Kekule' (1890)
=============================================================================
| 8rec.motorcycles |
I need a device (either an ISA board or a subsystem) which will
take two RGB video signals and combine them according to a template.
The template can be as simple as a rectangular window with signal
one being used for the interior and signal two for the exterior.
But I beleive fancier harware may also exist which I do not want
to exclude from my search. I know this sort of hardware exists
for NTSC, etc. but I need it for RGB.
Please email and or post any leads....
Gordon Lang (glang@smail.srl.ford.com -or- glang@holo6.srl.ford.com)
| 3comp.sys.ibm.pc.hardware |
In article <1993Apr19.055039.29715@oec4.orbital.dialix.oz.au>
oecjtb@oec4.orbital.dialix.oz.au (John Bongiovanni) writes:
[stuff deleted]
>Did I once hear that in order for the date to advance, something, like a
>clock, *has* to make a Get Date system call? Apparently, the clock
>hardware interrupt and BIOS don't do this (date advance) automatically. The
>Get Date call notices that a "midnight reset" flag has been set, and then
>then advances the date.
>
>Anybody with more info?
There are two 'problems':
(1) the BIOS TOD routine which updates the BIOS clock uses only 1 bit
for day increment, so a second wrapping of the clock past midnight
will get lost if no one calls the BIOS to read the clock in the
meantime, and
(2) the BIOS resets the day wrap indicator on the first 'get date'
call from ANYBODY (after the wrap indicator has been set). So
unless the first BIOS 'get date' call after midnight is done by
the DOS 'kernel' (which is the only part of DOS which knows how to
increment the date, the day wrap indication is normally lost.
My guess is that Kevin's 'menu' system uses BIOS calls to read the
clock (in order to display the time), and is hence the entity which
causes the day wrap indication to get lost. Even if the 'menu' system
'notices' the day 'wrap' (which I think is indicated by a non-zero
value in AL), there really isn't any particularly good way to tell DOS
about it, so that DOS can update the day. The menu system 'should' use
DOS calls to get the time, which would cause the DOS 'kernel' to do
the BIOS call, and the wrap indicator would hence be processed
properly. Possibly, though, the 'menu' system can't easily use DOS
calls for time, because DOS is not reentrant, and perhaps time
incrementing ofters occur while the 'menu' system is 'inside' some
other DOS call.
Wally Bass
| 3comp.sys.ibm.pc.hardware |
In article <1993Apr26.000410.18114@daffy.cs.wisc.edu>, mccullou@snake2.cs.wisc.edu (Mark McCullough) writes:
> In article <C62B52.LKz@blaze.cs.jhu.edu> arromdee@jyusenkyou.cs.jhu.edu (Ken Arromdee) writes:
> >I can think of a lot more agonizing ways to get killed. Fatal cancer, for
> >instance.
> >
> >Anyone else have some more? Maybe we can make a list.
> How about dying of a blood clot in a _very_ bad place.
Kidney stones with complete blockage.
| 0alt.atheism |
:
: > Surely you are not equating David Koresh with Christianity? The two are
: > not comparable.
:
: This is always an option: when the sect is causing harm, re-label
: the cult to something else.
:
: Cheers,
: Kent
Good point.
I would not doubt that DK could have spouted verse and debated with best.
According to reports his extensive Bible knowledge was one way he sucked
in the fools (followers?).
Quote bible all you want. I too judge what you say be what you do and
even more by if it makes sense.
Sense, common that is. Doesn't seem so common after all!
--
+--------------------------------------------------------------------+
| John Morris jwmorris@netcom.com |
| San Diego, CA I have no opinion, but if I did...|
+--------------------------------------------------------------------+
| 19talk.religion.misc |
Hello:
can anybody help me to find a program that converts a format named
"raw" (also known as "img") to the "gif" format or "jpeg" one.
It's desirable to be for a unix machine than for a PC.
(
"Raw" format of a N*N image is a file that contain a tail of
N*N characters, each one referencing to the k*N+j pixel of the
monocrome image, where k and j lies between 0 and N-1.
).
Thanxs mne@ing.puc.cL
| 1comp.graphics |
Where can I get the Winmarks benchmark to run on my PC?
via ftp would be best.
-Roger
--------------------------------------------------------------
bix: ruzun
NET: uzun@crash.cts.com
| 3comp.sys.ibm.pc.hardware |
I just wanted to thank all the netters out there who either
posted a response or sent e-mail regarding my ignition kill
question. Now that I know how simple a procedure it is, it
looks like I'll be paying my local Pep Boys a visit this
weekend....
-Mik
| 7rec.autos |
In article <2385@emoryu1.cc.emory.edu> labrg@emory.edu (Ryan Montieth Gill) writes:
>
> For those who have had problems with small birds what about the
> large raptor types when they are swooping across the road after
> smallish prey?? I had a hawk, Falcon what ever come within 5
> feet of me, lucky for him (or me for that matter) he noticed me
> and my, and pulled up on his/her trajectory at the last moment.
> Scared the shit outa me...nothing like a red tailed hawk in the
> face, Talons and all....I wonder if riding a Nighthawk has
> anything to do with it....hmmmm?
>
> Ryan
> 0780
I got a male Mallard duck in the chest once.
It was like being kicked by my karate instructor.
No accident, but my eyes were tearing so hard, and I was wheezing
so loudly, that it's quite remarkable that I was able to come
to a stop with the rubber side up.
The duck, BTW, lived, and seemed quite healthy, though we both
sat by the roadside and shook our heads for a few minutes.
The bruise went from my right collar bone all the way down to
my belly button.
Regards, Charles
DoD0.001
RZ350
--
Within the span of the last few weeks I have heard elements of
separate threads which, in that they have been conjoined in time,
struck together to form a new chord within my hollow and echoing
gourd. --Unknown net.person
| 8rec.motorcycles |
The following is what they feed to us..... most has been posted already,
but there are a number of items not seen here yet.....
Redesign Activities Update -- Following is the weekly status on redesign,
based on information provided by NASA headquarters.
The station Redesign Team (SRT) provided a detailed status report to the
Advisory Committee on the Redesign of the Space Station on April 22. The
day-long meeting was held in ANSER facilities in Crystal City, VA; topics
covered by the SRT included a preliminary mission and goals statement for
the space station; science, technology and engineering research; the
assessment process; and the design approach. Discussions on management
options and operations concepts also were held.
The Design Teams then presented the three options under study:
¥ Option A - Modular Buildup -- Pete Priest presented the A option. Priest
said the team is working to define a station that meets cost goals and has
identified three distinct phases of evolution - power station, human tended
and permanent presence. The team will define the minimum capability needed
to achieve each phase, the total cost of each phase and the achievable
capability for budget levels. The A option uses current or simplified
Freedom hardware where cost effective and is considering other existing
systems such as the so-called "Bus-1 spacecraft," the orbiter and Spacelab.
The Power Station Capability could be achieved in 3 flights with Freedom
photo voltaic modules providing 20 kW of power. 30-day Shuttle/Spacelab
missions docked to the power station are assumed for this phase.
Human Tended Capability would be provided by the addition of the U.S.
Common Module Module which adds subsystems and 9 payload racks and docking
ports for ESA and Japanese laboratories. 60-day missions with the orbiter
docked to the station are assumed for this phase. Different
operation/utilization modes are being studied for this phase.
¥ Option B - Freedom Derived -- Mike Griffin presented the status of Option
B activities. Griffin detailed the evolution of the Freedom-derived option,
from initial Research Capability, to Human-Tended Capability, to Permanent
Human Presence Capability, to Two Fault Tolerance, and finally Permanent
Human Capability. Griffin also outlined proposed systems changes to the
baseline program, with minor changes to the Communications and Tracking
system, Crew Health Care System and ECLSS, and a major change to the Data
Management System.
Initial Research Capability would be achieved with 2 flights to 28.5 degree
inclination (3 flights to 51.6 degrees) and consist of an extended duration
orbiter-Spacelab combination docked to a truss segment with 2 photo voltaic
arrays providing 18.75 kW of power.
Human-Tended Capability would be achieved in 6 flights and add truss
segments and the U.S. lab.
Permanent Human Presence Capability would be achieved in 8 flights with two
orbiters providing habitation and assured crew return.
Two Fault Tolerance, achieved in 11 flights, would build out the other
section of truss with another set of PV modules, thermal control and
propulsion systems.
The freedom derived configuration could achieve an International Complete
state with 16 flights. Three more flights, to bring up the habitat module,
a third PV array and two Assured Crew Return Vehicles (ACRV) would complete
the Permanent Human Capability with International stage.
Griffin told the Redesign Advisory Committee that eliminating hardware
would not, by itself, meet budget guidelines for the Freedom derived
option. Major reductions or deferrals must occur in other areas including
program management, contractor non-hardware, early utilization and
operations costs, he said.
¥ Option C - Singe Launch Core Station -- Chet Vaughn presented Option C,
the Single Launch Core Station concept. A Shuttle external tank and solid
rocket boosters would be used to launch the station into orbit. Shuttle
main engines would be mounted to the tail of the station module for launch
and jettisoned after ET separation.
The module, 23 feet in diameter and 92 feet long, would provide 26,000
cubic feet of pressured volume, separated into 7 "decks" connected by a
centralized passageway. Seven berthing ports would be located at various
places on the circumference of the module to place the international
modules, and other elements. This "can" would have two fixed photo voltaic
arrays producing approximately 40 kW of power flying in a solar interial
attitude.
In his closing comments to the Redesign Advisory Committee, Bryan O'Connor
said a design freeze would be established for the 3 options on April 26 so
that detailed costing of the options can begin. The next meeting with the
Redesign Advisory Committee will be May 3.
Russian Consultants Arrive in U.S. -- A delegation of 16 Russian space
experts arrived in the U.S. on April 21 and briefings to the SRT by members
of the Russian team began on the 22nd. The group includes Russian Space
Agency General Director Y. M. Koptev, and V. A. Yatsenko, also of the RSA.
Others on the team include representatives from the Ministry of Defense,
the Design Bureau SALYUT, the Institute of Biomedical Problems, the
Ministry of Foreign Affairs, NPO Energia and TsNIJMASH. The Russian team
briefed the SRT on environmental control and life support system, docking
systems, the Proton launch vehicle, Mir operations and utilization, and the
Soyuz TM spacecraft.
The Russian consultants are available to the SRT to assess the capabilities
of the Mir space station, and the possible use of Mir and other Russian
capabilities and systems as part of the space station redesign. They will
be available to the SRT through May 5.
Management and Operations Review Continues -- Work continued in the SRT
subgroups. The Management Group under Dr. Walt Brooks is working to
develop a family of options that solve the current problems and build a
foundation for the transition to development and operations. Various
management options have been developed including:
¥ Lead Center with the Center Director in the programmatic chain of
command.
¥ Host Center with the Program Manager reporting directly to an Associate
Administrator.
¥ Skunk Works/Dedicated Program Office with a small dedicated co-located
hand-picked program office.
¥ Combine Space Station with Shuttle, with the space station becoming an
element of the current program.
¥ Major Tune Up to Current Organization, with current contracts and
geographical distribution maintained but streamlined.
The Operations Group under Dr. John Cox is building on the work of the
Operations Phase Assessment Team lead by Gene Kranz of NASA-JSC, which had
already begun a comprehensive review of operations and had concluded in its
preliminary results that significant cost reductions are possible.
As part of its work, the Operations Group has identified teams of agency
experts to develop detailed evaluations of each design in the areas of
assembly and operations, utilization, maintenance and logistics and testing
and ground operations.
What's in the Week Ahead? -- The Design Support Teams will provide a
comprehensive status of their option to the Station Redesign Team on Monday
and Tuesday at which point the design will be "frozen" to begin the
detailed cost assessment. Also this week, the team will begin preparing
for the next round of discussions with the redesign Advisory Committee, to
be held May 3.
Dr. Shea Steps Down -- Dr. Joe Shea stepped down as director of the
Station Redesign Team on April 22 and Bryan O'Connor will take over the
activities of the team. Dr. Shea submitted his resignation as assistant
deputy administrator for space station analysis, but will continue to serve
as a special advisory to NASA Administrator Goldin and be available to
consult with the SRT. Mr Goldin accepted the resignation so that a request
from Dr. Shea to reduce his workload could be accommodated.
Key Milestones -- The key dates for the SRT as they are currently being
carried on the schedule are:
April 26
Design Freeze on Options for Costing
April 27
Design Support Team Present Selected Options to SRT
May 3
Status report to Redesign Advisory Committee
May 15
Interim report by Redesign Advisory Committee
June 7
Final report to Redesign Advisory Committee
(Oct. 31-cancellation .....just my opinion...AC)
| 14sci.space |
In article <1rd7eo$1a4@usenet.INS.CWRU.Edu>, cy779@cleveland.Freenet.Edu (Anas Omran) writes:
|>
|> There are many neutral human rights organizations which always report
|> on the situation in the O.T. But, as most people used to see on TV, the
|> Israelis do not allow them to go deep there in the O.T. The Israelis
|> used to arrest and sometimes to kill some of these neutral reporters.
|> So, this is another kind of terrorism committed by the Jews in Palestine.
|> They do not allow fair and neutral coverage of the situation in Palestine.
Please list the names of some of those neutral reporters that were killed
in the "O.T.". It is also interesting to note that at the outbreak of
the intifada, palestinian parties quickly began orchestrating their
demonstrations for the benefit of the media. Having spoken to a Danish
reporter who covered the initfada, I know of at least one case where
he found out that a "mass demonstration" on the outskirts of Gaza was
setup for himself and his colleagues. When I asked whether the footage
shot was sent he replied affirmatively, "after all, it did happen."
When this became the case, the IDF began closing sensitive trouble
spots to reporters.
|> Anas Omran
|>
--
Shai Guday | Stealth bombers,
OS Software Engineer |
Thinking Machines Corp. | the winged ninja of the skies.
Cambridge, MA |
| 17talk.politics.mideast |
In article <Apr.14.03.08.08.1993.5448@athos.rutgers.edu> jasons@atlastele.com (Jason Smith) writes:
>One of the Laws of Nature, specifying cause and effect seems to dictate
>(at least to this layman's mind) there must be a causal event. No
>reasonable alternative exists.
The big-bang model supposes a temporal singularity at the point of
origin. There was _no_ time for a prior cause to occur in. If you
want to invent fables for the surrounding context, fine, but one fable
is only as good as any other. Why should I prefer to believe in a God that
_just_ exists, as opposed to a singularity that _just happened_, or
giant puce subspace iguanas, that fling universes off their tongues
like gobs of spit?
|As far as I can tell, the very laws of nature demand a "why". That isn't
|true of something outside of nature (i.e., *super*natural).
>I believe the "genetic code" will be entirely deciphered in our lifetimes,
>but we will not see man convert entirely inert material into self sustaining,
>reproducing life, *ever*. (I've never been much of a prophet, though. I
>can't even *picture* New York in my mind 8^] ). I don't believe *any*
>technology would be able to produce that necessary *spark* of life, despite
>having all of the parts available. Just my opinion.
Just your opinion, and unfortunately wrong. Self assembling molecules
have already been produced, entirely from inert matter, and have
spontaneously mutated into a more rapidly assembling form on exposure
to ultraviolet light. Both abiogenesis and the beginnings of evolution,
TODAY. (saw this in "Nature", early last year.)
Biological vitalism is dead, and has been dead for many, many years.
Give it up. Life is not a 'spark'. Life is the self-organization
of systems poised between chaos and order.
>Until the King returns,
>
>Jason
Your King baldly and repeatedly stated he would be back within the lifetime
of some then present and alive. "Soon, soon" he said, over and over - as
have many would be messiahs.
It is Nineteen Ninety Three
of Years Anno Domini
Tell me, Tell me, where is He?
Nowhere at all, Q. E. D.
Max G. Webb
[I should have watched this more closely. We had a discussion about
the first cause, etc., not long ago. I'm not up for a replay.
There was also a detailed discussion of the point Max brings up
here about the initial singularity. The geometry near the big bang
is very interesting. Time turns into space, so there is no "before".
--clh]
| 15soc.religion.christian |
In article <1993Apr23.195051.16862@news.clarkson.edu>
(Dwight Tuinstra) writes:
> Great slogan! I'm ready to sign up with a crypto-lobbying effort (though
> I wouldn't want to do it through an NRA offshoot). Shall we also push
> for the CRA -- Cryptographic Rights Amendment ??
Looking at it from up here in the Frozen North, it looks like
you could do worse than get the NRA involved. They have a
kindred problem, a large number of voters, the right attitude,
and lots of funds.
From an ethical _or_ constitutional viewpoint, I haven't seen
a good argument for cryptographic rights that doesn't also
support the NRA position on guns (and vice-versa).
Cheers,
Marc
---
Marc Thibault | marc@tanda.isis.org
Automation Architect | CIS:71441,2226
R.R.1, Oxford Mills, Ontario, Canada | NC FreeNet: aa185
-----BEGIN PGP PUBLIC KEY BLOCK-----
mQBNAiqxYTkAAAECALfeHYp0yC80s1ScFvJSpj5eSCAO+hihtneFrrn+vuEcSavh
AAUwpIUGyV2N8n+lFTPnnLc42Ms+c8PJUPYKVI8ABRG0I01hcmMgVGhpYmF1bHQg
PG1hcmNAdGFuZGEuaXNpcy5vcmc+
=HLnv
-----END PGP PUBLIC KEY BLOCK-----
| 11sci.crypt |
In article <ltqp28INNpa7@pageboy.cs.utexas.edu>, jhpark@cs.utexas.edu (Jihun Park) writes:
>Hello,
>I have some problem in converting tga file(generated by POVray) to
>rle file. When I convert, I do not get any warning message. But
>if I use xloadimage/getx11, something is wrong.
[edited]
>I know that I need to install ppmtorle and tgatoppm, but I do not spend
>time to install them. Even I do not want to generate .rgb from POVray
>and then convert them to rle, if possible.(.rgb to rle works, but
>it will mess up my directory with so many files, and it needs 2 more
>steps to finally convert to rle file. say cat | rawtorle | rleflip )
>Does any body out there have same experience/problems ?
Well for starters, why use rle files? You might have a specific program that
needs them, OK, but I tend to convert straight to jpeg format, thus a 2.4meg
24bit targa file becomes a ~80k or less 24bit jpeg.
The latest versions of XV (2.2.1 ?) and xloadimage (3.03) both handle jpeg files.
And the best way to convert to jpeg is with the c/djpeg suit. Even at 90%
quality (you can't see the difference) the jpeg is way smaller than anything
else even an 8bit gif!
Later'ish
Craig
--
|\/\/\/\/\/| "I didn't do it, nobody saw me do it,
| ___ ___ | you can't prove anything."
|/ \/ \| craig.humphrey@stargate.actrix.gen.nz
__ccc_c_#_|__#_ccc_c____chumphre@comp.vuw.ac.nz______________________________
| 1comp.graphics |
Hi. Recently my svga monitor has been acting up by taking about
3 minutes to warm up.
Previously, when I first start up my PC I can see all the
CMOS messages (RAM test ...etc) but now I've got to wait
for about 3min before the display shows anything and
it starts up with a bright white flash. This only happens
when the system has been off for a long time (eg overnight).
If it was only off for a couple of hours and then turned on
again, the display works as normal like before.
Does anyone know what is causing this? Is it a warning that
it will give up soon or just signs of aging (the system is a
386sx and its about 3 yrs old). I've used systems at work for
years and never seen this happen to a monitor yet.
I'd really appreciated any help that you fellow netters can offer.
Thanks a lot.
Edwin
--
-----------------------------------------------------
* Edwin Ng (edwin@ccu1.aukuni.ac.nz) *
* E&E Engineering, University of Auckland *
* Private Bag 92019, Auckland, NEW ZEALAND *
| 3comp.sys.ibm.pc.hardware |
Now that you have purified yourselves by obeying the truth so that you have
sincere love for your brothers, love one another deeply, from the heart.
IPeter 1:22
| 15soc.religion.christian |
Now, my ego with regards to my shifting ability is as big as anyone else's, but
I just ordered my first car with an auto trans. I wasn't planning on it; but
after driving a few I was convinced: Things have changed since the days of
"Slip 'n' Slide Withe Powerglide". They shift *better* than I do, there's no
clutch to wear out (Honda wanted $800 for my 4WD wagon last year!- got it done
for $500), it only costs about 5% in gas milage on the highway and it makes it
easier to concentrate on all the radios in my car ;-)
(Oddly enough, while two of my best friends- both in the auto industry here in the
Motor City- have switched wholeheartedly to autos, their wives *insist* on
manual. Shift envy?)
Braggadocio aside, given today's technology and the warranties they're handing
out the auto trans seemed like an excellent choice. Call me a convert.
--mike
| 7rec.autos |
Others said:
# >... Why would the picture tube explode or even smoke?
Naw, it was the penguin on TOP of the set that exploded...
;-}
--
A host is a host from coast to coast..wb8foz@skybridge.scl.cwru.edu
& no one will talk to a host that's close............(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433
| 12sci.electronics |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.