index
stringlengths
1
5
content
stringlengths
125
75.2k
5900
From: turpin@cs.utexas.edu (Russell Turpin) Subject: Re: Science and methodology (was: Homeopathy ... tradition?) Organization: CS Dept, University of Texas at Austin Lines: 123 Distribution: inet NNTP-Posting-Host: im4u.cs.utexas.edu Summary: More in response to Lee Lady. Keywords: science errors Turpin NLP -*---- I think that part of the problem is that I have proposed a definition of science that I intended to be interpreted broadly and that Lee Lady has interpreted fairly narrowly. My definition is this: Science is the investigation of the empirical that avoids mistakes in reasoning and methodology discovered from previous work. Lee Lady writes: > I don't think that science should be defined in a way that some > of the activities that lead to really important science --- namely > thinking and informal exploration --- are not recognized as > scientific work. Unless one classifies "thinking and informal exploration" as a mistake, they fall under my definition. I hope no one would consider speculation, thinking, and informal exploration as unscientific. In article <C5nAsF.MH7@news.Hawaii.Edu> lady@uhunix.uhcc.Hawaii.Edu (Lee Lady) writes: > Seriously, I'm not sure whether I misjudged you or not, in one respect. > I still have a major problem, though, with your insistence that science > is mainly about avoiding mistakes. ... Here is where I think we are talking at cross-purposes. It is not clear to me that the kind of definition I have proposed should be taken as describing what "science is mainly about." Consider, for example, a definition of invertebrates as all animals lacking a backbone. This fairly tells what is an invertebrate and what is not an invertebrate, but it hardly tells you what invertebrates are all about. One can read this definition and still not know that 95% of all animal species are invertebrates, that invertebrates possess a remarkably broad range of form, that some invertebrate groups -- such as insects and nematodes -- are ubiquitous in all ecosystems, etc. In short, knowing the definition of invertebrates does *not* tell one what they are "mainly about." The misunderstanding here is my fault. I did not give sufficient context for people to understand my proposed definition. > Okay, so let's see if we agree on this: FIRST of all, there are degrees > of certainty. It might be appropriate, for instance, to demand carefully > controlled trials before we accept as absolute scientific truth (to the > extent that there is any such thing) the effectiveness of a certain > treatment. On the other hand, highly favorable clinical experience, even > if uncontrolled, can be adequate to justify a *preliminary* judgement that > a treatment is useful. ... > > SECONDLY, it makes sense to be more tolerant in our standards of > evidence for a pronounced effect than for one that is marginal. I agree on both counts. As an example of the second, it would only take a few cases of curing rabies to convince most veterinarians that a treatment was effective, despite a lack of controls. As to the first, I do not think it is useful to talk about "absolute scientific truth." I think it is more useful to talk about the kinds of evidence that various claims have and the kinds of evidence IN PARTICULAR FIELDS that in the past have proven faulty or reliable. The latter is obviously a matter of degree, and in each field, practitioners try to discover the relevance of different kinds of evidence. One of the primary mistakes that marks the advocacy of an idea as psuedo-science is that the advocacy lacks any sense of proportion regarding the kinds of evidence related to the proposed claim, the kinds of evidence that are actually relevant to it, and the historical reasons in the field that certain kinds of evidence are given more weight than others. It is perfectly alright to speculate. I have read quite a few refereed papers that speculated left and right. But the authors were careful to identify the notions as speculative, to list what little evidence was presently available for them, and to describe how research could proceed to either put the notion on more firm footing or to uncover its problems. Often what distinguishes whether a paper of this sort passes muster is the thoughtfulness with which the author sets the context and paves the way for future work. (It is in this area that many proponents of speculative ideas fail.) > The folks over in sci.psychology have a hundred and one excuses not to > make this simple test. They claim that only an elaborate outcome study > will be satisfactory --- a study of the sort that NLP practitioners, > many of whom make a barely marginal living from their practice, can ill > afford to do. (Most of them are also just plain not interested, because > the whole idea seems frivolous. And since they're not part of the > scientific establishment, they have no tangible rewards to gain > from scientific acceptance.) I think a lot of scientists steer away from things that -- deserving or not -- garner a patina of kookiness. When proponents of some practice see no value in more careful investigation of that practice, that sets alarms ringing in many researchers' minds. This is unfortunate, because there is undoubtedly some intersection between things that are worth investigating and things that are advocated by those who seem careless or unreasonable in their advocacy. On the other hand, I can understand why many scientists would just as soon select other directions for research. As Gordon Banks has pointed out, no one wants to become this generation's Rhine. > One academic in sci.psychology said that it would be completely > unscientific for him to test the phobia cure since it hasn't > been described in a scientific journal. ... I think this is absurd. > Actually, at least one fairly careful academic study has been done > (with favorable results), but it's apparently not acceptable because > it's a doctoral dissertation and not published in a refereed journal. I wonder why the results were not published. In my field, dissertation results are typically summarized in papers that are submitted to journals. Often the papers are accepted for publication before the dissertation is finished. (This certainly eases one's defense.) Finally, I hope Lee Lady will forgive me from commenting either on NLP or the discussion of it in sci.psychology. I know little about either and so have nothing to offer. Russell
5901
From: aaf0@ns1.cc.lehigh.edu (Andrew Aaron Feigin) Subject: 84 Mazda Pickup, (College Pro, Student Painters, LOOK.) Organization: Lehigh University Lines: 26 84 Mazda Pickup Rebuilt engine at 60,000 miles. New Transmission, 5 speed. 88,000 miles. New brakes, new brake calipers. BRAND NEW CLUTCH, only 200 miles on it. professional ladder racks, can hold up to 6 ladders.. 4 cylinder, gets 30-35 miles to the gallon. Fog lights. Tach. Runs Great. =============== All inquires should write back or call. I will have it Saturday Afternoon, and Sunday if you would like to take a look at it. Phone: 1-215-882-3154 If your are Painting this summer, this is an excellent vehicle to use. -- ____________________________________ / /| / / | / / | ------------------------------------/ | | Andy Feigin | | | Prodigy -> rwbp88d | |
5902
From: hagberg@violet.ccit.arizona.edu (HAGBERG JR, D. J.) Subject: Clipper and Ranting Libertarians Keywords: clipper clinton rant rave libertarians Distribution: usa,local Organization: University of Arizona Lines: 26 Nntp-Posting-Host: violet.ccit.arizona.edu News-Software: VAX/VMS VNEWS 1.41 I would think that you could reduce the defense of using non-clipper based encryption technologies to defending freedom of expression (IE, free speech). That you have to right to express whatever you want in whatever form your little heart desires so long as you do not impinge on the rights of others. Encrypted text/sound/video is just another form of expression of that particular text/sound/video. Just like digitized sound is another means of expression of sound -- streams of 100100101111 instead of continuous waveforms. Also, it shouldn't be up to the government at all. Encryption _Standards_ can be decided upon by Independent Standards Orgainizations (apologies for the acronym). One can note how well this has worked with ISO and the Metric System, SAE, etc. Independent entities or consortia of people/industries in that particular area are far more qualified to set standards than any One government agency. Consider for example what the Ascii character set would have looked like if it was decided by the government. I hope this helps folks to formulate their defenses. I'm still working on mine and hope to be faxing my congressmen soon... -=- D. J. Hagberg -=- hagberg@ccit.arizona.edu -=- finger ^ for Info and PGP Public Key
5903
From: tffreeba@indyvax.iupui.edu Subject: Re: Death and Taxes (was Why not give $1 billion...) Lines: 48 nsmca@aurora.alaska.edu, University of Alaska Fairbanks writes: [A GOOD DEAL OF HEALTHY IF NOT DEEPLY THOUGHT OUT IDEALISM DELETED BELOW.] >Major question is if you decide to mine the moon or Mars, who will stop you? >[...] Can the truly inforce it? [...] If their parent company does business (and they will) on the face of the Earth then they are vulnerable to govt. sanctions. Yes they can be stopped. >If you go to the moon as declare that you are now a soverign nation, who will >stop you from doing it. [...] For the first 100 - 500 (IMHO) years nobody will have to. The colonists will be too dependent on Earth too pull it off. Eventually they will, history shows us that. >Also once you have the means to mine the moon (or whatever) then just do it. >The UN if done right can be made to be so busy with something else, they will >not care [...] What exactly do you mean here? Terrorism? Start an international incident so your dream can come true? Crack a few eggs to make the omelet? This sounds fairly irresponsible. >Basically what I am saying is where is that drive of yeasteryears to go a >little bit farther out, to do jus ta little bit more, and to tell the crown to >piss off.. If my ancestors thought the way many today think, Id have been born >in Central Europe just north of the Black Sea.. Again, the tie that binds will be much stronger for space colonists than any immigrants that have gone before. Even those intrepid Asian explorers that crossed the Bering land bridge did not have to carry their air on their backs. == >Michael Adams, nsmca@acad3.alaska.edu -- I'm not high, just jacked Keep the dream alive, maybe dream it a little more cogently. Tom Freebairn | There once was a man | Who built a boat | To sail away in. | It sank. | J.P. Donleavy _Fairy Tale of New York_ (maybe?)
5904
From: harryb@phred.UUCP (harry barnett) Subject: Re: text of White House announcement and Q&As on clipper chip encryption Reply-To: harryb@phred.UUCP Organization: Physio-Control Lines: 48 In article 29778@yuma.ACNS.ColoState.EDU, holland@CS.ColoState.EDU (douglas craig holland) writes: >In article <1993Apr19.130132.12650@afterlife.ncsc.mil> rlward1@afterlife.ncsc.mil (Robert Ward) writes: >>In article <bontchev.734981805@fbihh> bontchev@fbihh.informatik.uni-hamburg.de writes: >>>and since the US constitutions guarantees the right to every American >>>to bear arms, why is not every American entitled, as a matter of >> >>Have you read the applicable part of the Constitution and interpreted it IN >>CONTEXT? If not, please do so before posting this misinterpretation again. >>It refers to the right of the people to organize a militia, not for individuals >>to carry handguns, grenades, and assault rifles. > >Read the Constitution yourself. The Second Amendment says the right to bear >arms shall not be infringed, so a well regulated militia may be more easily >formed. I have an interpretation of the Second that shows there are no >qualifications to the right to keep and bear arms. If you want, I can E-mail >it to you. By the way, gun talk belongs in talk.politics.guns. > Doug Holland Mr. Ward, before you start blathering about your skill "interpreting" the Constitution, it might be helpful to learn to read. After a review with a high school English teacher emphasizing participial phrases, you might start with the Second Amendment, and follow it up with: 97th Congress, 2nd Session, Committee Print, *The Right To Keep and Bear Arms*, of the Subcomittee on the Constitution of the Committee on the Judiciary, United States Senate, 97th Congress, Second Session, February, 1982. GPO No. 88-618-O This authoritative, heavily researched and annotated document clearly turns your "interpretation" into specious claptrap, which is a polite way of saying utter bullshit. In spite of your false assertion to the contrary, the Second Amendment DOES protect the right of the individual citizen, in his capacity as an individual, to keep and bear arms. And, Mr. Holland, IMHO, blatantly and harmfully false information, asserted as fact and globally distributed, deserves globally distributed rebuttal in the forum in which it is posted. (And besides, this site doesn't carry t.p.g...:-) harryb%phred@data-io.com phred!harryb@data-io.com ----------------------------------------------------------------------- No free man shall ever be debarred the use of arms. The strongest reason for the people to retain the right to keep and bear arms is, as a last resort, to protect themselves against tyranny in government. --Thomas Jefferson -----------------------------------------------------------------------
5905
From: richter@fossi.hab-weimar.de (Axel Richter) Subject: True Color Display in POV Keywords: POV, Raytracing Nntp-Posting-Host: fossi.hab-weimar.de Organization: Hochschule fuer Architektur und Bauwesen Weimar, Germany Lines: 6 Hallo POV-Renderers ! I've got a BocaX3 Card. Now I try to get POV displaying True Colors while rendering. I've tried most of the options and UNIVESA-Driver but what happens isn't correct. Can anybody help me ?
5906
From: paj@uk.co.gec-mrc (Paul Johnson) Subject: Re: History question Reply-To: paj@uk.co.gec-mrc (Paul Johnson) Organization: GEC-Marconi Research Centre, Great Baddow, UK Lines: 25 In article <kazel.15.734728882@uiuc.edu> kazel@uiuc.edu (Mitch Kazel) writes: >Sorry if this isn't the correct news group . . . but . . . > >A colleague of mine is trying to find out when the first public use of >electronic voice amplification was . . . i.e. a P-A system. > >Any reference would be appreciated. Please reply via e-mail. >Mitch Kazel (N9HDQ) >INTERNET: kazel@uiuc.edu This is vague, so I am posting it in case anyone else knows more. I recall reading of a phonograph which used mechanical amplification. Compressed air was squirted out of a valve which was controlled by the pickup. The result was noisy and distinctly lo-fi, but much louder than a conventional phonograph. It tended to wear the disks out pretty quickly though. Paul. -- Paul Johnson (paj@gec-mrc.co.uk). | Tel: +44 245 73331 ext 3245 --------------------------------------------+---------------------------------- These ideas and others like them can be had | GEC-Marconi Research is not for $0.02 each from any reputable idealist. | responsible for my opinions
5907
From: behnke@FNALF.FNAL.GOV (M.L. 'Broomen' Behnke) Subject: Re: Electric power line "balls" Article-I.D.: fnnews.1psrgl$6cb Reply-To: behnke@FNALF.FNAL.GOV Distribution: usa Organization: Fermi National Accelerator Lab Lines: 27 NNTP-Posting-Host: fnalf.fnal.gov In article <1993Apr6.203237.20841@eagle.lerc.nasa.gov>, fsset@bach.lerc.nasa.gov (Scott Townsend) writes: >I got a question from my dad which I really can't answer and I'd appreciate >some net.wisdom. > >His question is about some 18-24" diameter balls which are attached to >electric power lines in his area. He's seen up to a half dozen between >two poles. Neither of us have any experience with electric power distribution. >My only guess was that they may be a capacitive device to equalize the >inductance of the grid, but why so many between two poles?. > >Anyone know what they really are? Is there a related FAQ for this? >Is there a better group to submit to? > >We'd both appreciate some enlightenment. > The balls are used to reduce the amplitude of oscillations of the wire during periods of high winds. I've seen what looks like paint cans filled with concrete used for the same purpose. Mike Behnke | Senior Tech/Advisor | Quid est illuidin aqua?? Fermi Nat Accel Lab | Equipment Suuport | Batavia, Il. | Computing Div | PISTRIX!! PISTRIX!! BEHNKE@FNALF.FNAL.GOV | | My opinions are my own, not of the lab. So, if you don't like them, call 1-800-UWH-INER
5908
From: rdell@cbnewsf.cb.att.com (richard.b.dell) Subject: Re: Fujitsu 8" HDD Keywords: M2321K, M2322K, Fujitsu, Microdisk (-: Organization: AT&T Distribution: na Lines: 15 In article <1993Apr17.204351.2256@aber.ac.uk> cjp1@aber.ac.uk (Christopher John Powell) writes: [deletions] >It appears to use two balanced-line connections, but what each connection >corresponds to I know not. One connection is a 30-way IDC, the other a >60-way IDC. Sounds like it is an SMD interface to me, not being at work now to actually count pins. there are two varients, SMD and SMDC (I think), only minor differences between them. Widely used prior to the advent of SCSI for large drives (or all drives) on minis (and mainframes(?) no experience on those). Richard Dell
5909
From: jlroffma@unix.amherst.edu (JOSHUA LAWRENCE ROFFMAN) Subject: Re: Jewish Baseball Players? Nntp-Posting-Host: amhux3.amherst.edu Organization: Amherst College X-Newsreader: TIN [version 1.1 PL7] Lines: 12 : >baseball players, past and present. We weren't able to come up : >with much, except for Sandy Koufax, (somebody) Stankowitz, and : >maybe John Lowenstein. Can anyone come up with any more. I know : >it sounds pretty lame to be racking our brains over this, but : >humor us. Thanks for your help. : John Lowenstein is definately NOT Jewish. Many in Baltimore thought he was... especially after he told the Baltimore _Jewish Times_ so...but later he admitted that it was a joke.
5910
From: gld@cunixb.cc.columbia.edu (Gary L Dare) Subject: ST (TOS) and SF Movie Videotapes (BETA) for Sale/Trade [repost] Summary: trade for other Beta, used CD's or barter other merchandise Nntp-Posting-Host: cunixb.cc.columbia.edu Reply-To: gld@cunixb.cc.columbia.edu (Gary L Dare) Organization: PhDs In The Hall Distribution: na Lines: 52 nyamane@nyx.cs.du.edu (Norm Yamane) writes: > >I have the following videos for sale. All have been viewed once >and are in good condition: > >Star Trek (TOS) Collector's Edition > All 79 episodes. (39 tapes) Asking $800 for the lot. I've got 7 episodes left on *Beta* for Sale at US$8 each (neg.), or for Trade 1-for-1 for movie on Beta or a used CD; or, a package deal for $50 or whatever you care to propose in trade -- e.g., all for a set of good stereo headphones (e.g. Sony V6 or V7), an Apple IWII sheet feeder, a good used FM/Cassette stereo "walkman" or a hotel coupon(s) for free stays FOB New York City (guests coming!)). The remaining collection is as follows: 8 - Charlie X 11 - Dagger of the Mind 12 - Miri 17 - Shore Leave 20 - The Alternative Factor 29 - Operation-Annihilate! 33 - Who Mourns for Adonais? Numbers indicate episode numbering on the tape boxes, for those who are keeping track of what episodes they're missing in that manner. RSVP for summaries, if necessary. The tapes are all in excellent condition in the original packaging. All have been played at least once, but most have been played ONLY once, and NONE have been played more than twice. Running time: ~50 min. ea. (Unedited, uncut store-bought originals unlike those in syndication; all have *incredible* Beta HiFi sound!) I also have the following SF and Horror movies on Beta as well; US$10 (negotiable) or Trade (1-for-1 swap for movie on Beta or a used CD): The Bride (Sting, Jennifer Beales) * Buck Rogers Conquers the Universe (Buster Crabbe, Constance Moore) RSVP for my larger Beta movies/music trade list, or find it on Misc.forsale! gld PS: For those of you who may wonder, Beta is alive as a pro/hobbyist format ... there's life beyond the corner video store! (-; -- ~~~~~~~~~~~~~~~~~~~~~~~~ Je me souviens ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Gary L. Dare > gld@columbia.EDU GO Winnipeg Jets GO!!! > gld@cunixc.BITNET Selanne + Domi ==> Stanley
5911
From: mangoe@cs.umd.edu (Charley Wingate) Subject: Re: Motto Mania Lines: 33 mathew writes: >I prefer Mark-Jason Dominus's suggestion that the motto should be changed to >"Mind your own fucking business". In this era of AIDS, isn't someone's fucking *everyone's* interest? (semi :-)) I propose "We have no motto." Recently in the glorious state of Maryland (the only state whose state song refers to Abraham Lincoln as a tyrant), people have gotten all wound up over the state motto (which we inherited from the Calverts): "Fatti Maschii, Parole Femine" which, if you read Italian, says, "Manly deeds, womanly words" or something to that effect. In the state which not so long ago had four women out of seven representatives, this represents a problem. The official solution was to change the translation, so now it means: "Strong deeds, gentle words" My personal suggestion was changing it to "walk softly and carry a big stick." -- C. Wingate + "The peace of God, it is no peace, + but strife closed in the sod. mangoe@cs.umd.edu + Yet, brothers, pray for but one thing: tove!mangoe + the marv'lous peace of God."
5912
From: lady@uhunix.uhcc.Hawaii.Edu (Lee Lady) Subject: Re: Science and methodology (was: Homeopathy ... tradition?) Summary: Ultimately, ideas come from exploration and informal thinking. Organization: University of Hawaii (Mathematics Dept) Expires: Mon, 10 May 1993 10:00:00 GMT Lines: 65 In article <C5L9ws.Jn2@unx.sas.com> sasghm@theseus.unx.sas.com (Gary Merrill) writes: > >In article <1993Apr16.155919.28040@cs.rochester.edu>, fulk@cs.rochester.edu (Mark Fulk) writes: > >|> Flights of fancy, and other irrational approaches, are common. The crucial >|> thing is not to sit around just having fantasies; they aren't of any use >|> unless they make you do some experiments. .... >|> >|> (Simple example: Warren Jelinek noticed an extremely heavy band on a DNA >|> electrophoresis gel of human ALU fragments. He got very excited, ..... > >But why do you characterize this as a "flight of fancy" or a "fantasy"? >While I am unfamiliar with the scientific context here, it appears obvious >that his speculation (for lack of a better or more neutral word) was >at least in significant part a consequence of his knowledge of and acceptance >of current theory coupled with his observations. It would appear that >something quite rational was going on as he attempted to fit his observation >into that theory (or to tailor the theory to cover the observation). ... Whether a scientific idea comes while one is staring out the window, or dreaming, or having a fantasy, or watching an apple fall (Newton), or sitting in a bath (Archimedes) ... it is ultimately the result of a lot of intense scientific thinking done beforehand. Letting one's mind roam freely and giving rein to one's intuition can be a useful way of coming up with new ideas, but only when one has done a lot of rational analysis of the problem first. Scientific intuition is not something one is born with. It is something that one learns. Maybe we don't understand completely how it is learned, but training in systematic scientific thinking is certainly one of the key elements in developing it. Informal exploration is also often an important element in finding new scientific ideas. One thinks, for instance, of Darwin's naturalistic studies in the Galapagos islands, which led him to the ideas for the theory of evolution. This is why I am offended by a definition of science that emphasizes empirical verification and does not recognize thinking and informal exploration as important scientific work. I agree that mere speculation does not deserve to be called science. I also think that mere empirical studies not directed by good scientific thinking are at best a very poor kind of science. In article <1qk92lINNl55@im4u.cs.utexas.edu> turpin@cs.utexas.edu (Russell Turpin) writes: > ... >I think that Lee Lady and I are talking at cross purposes. > ... Lady seems concerned with the contrast between great >science that makes big advances in our knowledge and mediocre >science that makes smaller steps. In most of this thread, I have >been concerned with the difference between what is science and >what is not. I don't think that science should be defined in a way that some of the activities that lead to really important science --- namely thinking and informal exploration --- are not recognized as scientific work. -- In the arguments between behaviorists and cognitivists, psychology seems less like a science than a collection of competing religious sects. lady@uhunix.uhcc.hawaii.edu lady@uhunix.bitnet
5913
From: sera@zuma.UUCP (Serdar Argic) Subject: They were completely and systematically exterminated by Armenians. Reply-To: sera@zuma.UUCP (Serdar Argic) Distribution: world Lines: 96 In article <C4xCu3.401@polaris.async.vt.edu> jfurr@polaris.async.vt.edu (Joel Furr) writes: >Do it. Depew has shown himself to be unrepentant (though embarrassed) and >still possessed of the same fucked-up hubris-laden self-righteousness that The theory is that the hollering kills the spirit of the criminal/Nazi Armenians of the ASALA/SDPA/ARF Terrorism and Revisionism Triangle. Now, try dealing with the rest of what I wrote. What is more, the activities of the Armenian Government seem to have been efforts aimed at eradicating a race (the Turks) or aimed at carrying out a one-sided feud, instead of being a struggle for liberation. From the outset, the efforts of the Armenian revolutionaries within the Ottoman borders took the form of terrorist and destructive actions aimed at mass murder, cruelty and genocide, so that no other interpretation of them is possible. Armenian activities started during the reign of Abdulhamid II as individual acts of terror, and then developed into assassinations and surprise attacks. The element of brute force in these activities increased steadily, culminating in mass rebellions and widespread fighting during the First World War. Furthermore, when the Ottoman army withdrew from Eastern Anatolia after the 1915 Sarikamis defeat, Armenian revolutionaries initiated a series of cruelties in this area. Although the Russians occupied Eastern Anatolia as an enemy, nevertheless they were constrained by the rules of war. However, when they returned to their country in 1917 after the Revolution, Armenian revolutionaries were unchecked in this area for about a year until the Ottoman forces returned to Erzurum in 1918. During this period, Armenian revolutionaries executed massacres on the local people which is recorded in historical documents.[1] For example, let us look at a report dated 21 March 1918 which the Commander of the Third Army submitted when he entered Erzurum and Erzincan: "They were completely and systematically destroyed and burned down by Armenians, even the trees were cut down, and they are like a building entirely consumed by fire in every sense of the word." As for the people who had been living in Erzurum and Erzincan: "Those who were capable of fighting were taken away at the very beginning with the excuse of forced labor in road construction, they were taken in the direction of Sarikamis and annihilated. When the Russian army withdrew, a part of the remaining people was destroyed in Armenian massacres and cruelties: they were thrown into wells, they were locked in houses and burned down, they were killed with bayonets and swords, in places selected as butchering spots, their bellies were torn open, their lungs were pulled out, and girls and women were hanged by their hair after being subjected to every conceivable abominable act. A very small part of the people who were spared these abominations far worse than the cruelty of the inquisition resembled living dead and were suffering from temporary insanity because of the dire poverty they had lived in and because of the frightful experiences they had been subjected to. Including women and children, such persons discovered so far do not exceed one thousand five hundred in Erzincan and thirty thousand in Erzurum. All the fields in Erzincan and Erzurum are untilled, everything that the people had has been taken away from them, and we found them in a destitute situation. At the present time, the people are subsisting on some food they obtained, impelled by starvation, from Russian storages left behind after their occupation of this area."[2] Foreign observers who witnessed the events, including Russian Officers who did not desert their lines, submitted detailed reports proving the genocide to Ottoman commanders who received them as prisoners of war. What is most important is that they stated in their reports 'the massacres did not happen by chance but were planned.'[3] At the end of the war, the German author Dr. Weiss, his Austrian colleague Dr. Stein and his Turkish colleague Mr. Ahmet Vefik visited Trabzon, Kars, Erzurum and Batum between April 17th and May 20th 1918 to record the cruelties. Their writings not only show the scope of Armenian activities, but also reveal their goal and true nature.[4] [1] (The Ottoman State, the Ministry of War), "Islam Ahalinin Ducar Olduklari Mezalim Hakkinda Vesaike Mustenid Malumat," (Istanbul, 1918). The French version: "Documents Relatifs aux Atrocites Commises par les Armeniens sur la Population Musulmane," (Istanbul, 1919). In the Latin script: H. K. Turkozu, ed., "Osmanli ve Sovyet Belgeleriyle Ermeni Mezalimi," (Ankara, 1982). In addition: Z. Basar, ed., "Ermenilerden Gorduklerimiz," (Ankara, 1974) and, edited by the same author, "Ermeniler Hakkinda Makaleler - Derlemeler," (Ankara, 1978). "Askeri Tarih Belgeleri ...," Vol. 32, 83 (December 1983), document numbered 1881. [2] "Askeri Tarih Belgeleri ....," Vol. 31, 81 (December 1982), document numbered 1869. [3] From Twerdo-Khlebof's report dated 29 April 1918; quoted in Ermeniler ..., Vol. 2, p. 275. [4] A. R. (Altinay), "Iki Komite - Iki Kital," (Istanbul, 1919), and, "Kafkas Yollarinda Hatiralar ve Tahassusler" (Istanbul, 1919). Serdar Argic 'We closed the roads and mountain passes that might serve as ways of escape for the Turks and then proceeded in the work of extermination.' (Ohanus Appressian - 1919) 'In Soviet Armenia today there no longer exists a single Turkish soul.' (Sahak Melkonian - 1920)
5914
From: cjp1@aber.ac.uk (Christopher John Powell) Subject: Fujitsu 8" HDD Keywords: M2321K, M2322K, Fujitsu, Microdisk (-: Organization: University of Wales, Aberystwyth Lines: 23 I have a Fujitsu M2322K which has been removed (I believe) from a digital X-Ray machine (takes X-Ray pictures without film). The Fujitsu part number is B03B-4745-B002A. I have obtained some data on the device, it is 8-inch winchester-type of 168 megabyte capacity (though I was told it was over 800 megabytes). However, there is very little information on the interface standard used. It appears to use two balanced-line connections, but what each connection corresponds to I know not. One connection is a 30-way IDC, the other a 60-way IDC. If anyone has any information on this device, I would be most grateful if you could provide it. Thanks. Chris Powell. -- +------------------------------------------------------------------------+ | THE MAN FROM : ##### ####### | JANET : cjp1@uk.ac.aber | | # # _# | Internet : cjp1@aber.ac.uk | | # # _# | NYX : cpowell@nyx.cs.du.edu |
5915
From: b-clark@nwu.edu (Brian Clark) Subject: Re: High Resolution ADC for Mac II Nntp-Posting-Host: elvex33.acns.nwu.edu Organization: Northwestern University Lines: 24 In article <1qidk1INNhk9@iskut.ucs.ubc.ca>, Rob Douglas <douglas@ecc.ubc.ca> wrote: > > In article <1qhfmg$hoh@lll-winken.llnl.gov> Charles E. Cunningham, > cec@imager writes: > > I would like to buy a 16 bit ADC card for the Mac II with digitization > >rate of at least 100 kHz, preferably 200 kHz. I would prefer one with > >good differential and integral linearity, and DMA would be a plus. Other > >than National Instruments, do you know of any other vendor who sells such > >a card? > > Instrutech Corp has a nice looking 16 bit A/D and D/A board that can run > at the speeds you want. The ITC-16 (?) doesn't have DMA, but it does have > a good sized FIFO that can buffer your samples. Instrutech can be reached > at (516) 829-5942, or 929-0934 (FAX). > I don't know about the Instrutech boards (though I plan to check them out), but you need to be very careful checking the monotonicity and S/N ratio of many of the "16 bit" boards out there. The NI boards are very clearly specified in terms of monotonicity, S/N ratio, accuracy, etc; and the NB-A2100 and NB-A2150 have all the dyynamic range and freedom from distortion that you'd expect from a good, true 16 bit converter. This is not true for the Spectral Innovations boards, for example.
5916
From: sgoldste@aludra.usc.edu (Fogbound Child) Subject: Re: NEWS YOU WILL MISS, Apr 15 Organization: University of Southern California, Los Angeles, CA Lines: 27 NNTP-Posting-Host: aludra.usc.edu arf@genesis.MCS.COM (Jack Schmidling) writes: > > Yigal et al, sue ADL > Why do you title this "News you will miss" ? There have been at least three front-page stories on it in the L.A. Times. I wouldn't exactly call that a media cover-up. > js > ___Samuel___ Mossad Special Agent ID314159 Media Spiking & Mind Control Division Los Angeles Offices -- _________Pratice Safe .Signature! Prevent Dangerous Signature Virii!_______ Guildenstern: Our names shouted in a certain dawn ... a message ... a summons ... There must have been a moment, at the beginning, where we could have said -- no. But somehow we missed it.
5917
From: jks4675@ritvax.isc.rit.edu Subject: Conner 120 MB Question Nntp-Posting-Host: vaxa.isc.rit.edu Reply-To: jks4675@ritvax.isc.rit.edu Organization: Rochester Institute of Technology What do I need to do to configure this drive as a slave? Model# CP30101G Please reply via e-mail. Thanks!! Jeff **************************************************************** * Four out of five electrons prefer holes for their mutual * * annhiliation needs. Boycott Sierra. Ignore anybody who * * purports to be a serious Windows user. Support new makers * * of hardware and software. Buy Canadian music. Quit smoking. * * Take up running. FM synthesis is the CGA of audio. * * JKS4675@RITVAX.ISC.RIT.EDU * ****************************************************************
5918
Subject: Best Sportwriters... From: csc2imd@cabell.vcu.edu (Ian M. Derby) Expires: Sat, 1 May 1993 04:00:00 GMT Organization: Virginia Commonwealth University Keywords: Sportswriters Summary: Sportswriters Lines: 19 Since someone brought up sports radio, howabout sportswriting??? (Anyone give an opinion) Which city do you think has the best sports coverage in terms of print media? (these are general questions) Is the Washington Post better than the Philadelphia Inquier or the NY Times? Howabout the Philadelphia Daily News compared to the New York Daily News? Do you notice papers being subjective or objective to the home team?
5919
From: habs@panix.com (Harry Shapiro) Subject: Re: The source of that announcement Organization: PANIX Public Access Unix, NYC Lines: 27 In <MARC.93Apr18174241@oliver.mit.edu> marc@mit.edu (Marc Horowitz N1NZU) writes: >I received mail from Mitch Kapor saying that he did not ask to be on >the list, and does not know why he was added. I'm sure the same >applies to others on the list. So, I guess my initial theory was >right, that the clipper list was just someone's idea of a bad joke. I >guess I should be happy it wasn't a conspiracy. I have also been in contact with Mitch about this. I believe him when he says he didn't ask to be on the "clipper" list. He also forwarded the traffic he had recieved through that list to me which will be placed at some ftp site. However, the first alias on the "clipper list" was csspab which was another mailing list. It basically contained the addresses for staffers and board members of the NIST security board. Several of these people had their accounts within the dockmaster domain. These are the people we might wish to FOIA... /harry -- Harry Shapiro habs@panix.com List Administrator of the Extropy Institute Mailing List Private Communication for the Extropian Community since 1991
5920
From: David.Anderman@ofa123.fidonet.org Subject: LRDPA news X-Sender: newtout 0.08 Feb 23 1993 Lines: 28 Many of you at this point have seen a copy of the Lunar Resources Data Purchase Act by now. This bill, also known as the Back to the Moon bill, would authorize the U.S. government to purchase lunar science data from private and non-profit vendors, selected on the basis of competitive bidding, with an aggregate cap on bid awards of $65 million. If you have a copy of the bill, and can't or don't want to go through all of the legalese contained in all Federal legislation,don't both - you have a free resource to evaluate the bill for you. Your local congressional office, listed in the phone book,is staffed by people who can forward a copy of the bill to legal experts. Simply ask them to do so, and to consider supporting the Lunar Resources Data Purchase Act. If you do get feedback, negative or positive, from your congressional office, please forward it to: David Anderman 3136 E. Yorba Linda Blvd., Apt G-14, Fullerton, CA 92631, or via E-Mail to: David.Anderman@ofa123.fidonet.org. Another resource is your local chapter of the National Space Society. Members of the chapter will be happy to work with you to evaluate and support the Back to the Moon bill. For the address and telephone number of the nearest chapter to you, please send E-mail, or check the latest issue of Ad Astra, in a library near you. Finally, if you have requested, and not received, information about the Back to the Moon bill, please re-send your request. The database for the bill was recently corrupted, and some information was lost. The authors of the bill thank you for your patience. --- Maximus 2.01wb
5921
From: VEAL@utkvm1.utk.edu (David Veal) Subject: Re: 2ND AMENDMENT DEAD - GOOD ! Lines: 47 Organization: University of Tennessee Division of Continuing Education In article <1993Apr18.001319.2340@gnv.ifas.ufl.edu> jrm@gnv.ifas.ufl.edu writes: >Yea, there are millions of cases where yoy *say* that firearms >'deter' criminals. Alas, this is not provable. Not provable. It's about as "provable" as the number of votes vast for Bill Clinton in the last election. If you accept the information available, you can prove one way or the other. If you refuse to accept it, nothing is "provable." >I think that that >there are actually *few* cases where this is so. Fine, support your assertation. But, you haven't supported any assertations just yet. The National Crime Survey, that secret Arm of the NRA, estimates between 40,000 and 50,000 with-gun self-defenses from assaults, and is considered to considerably under-report. When broken down by weapon, there is no form of "self-defense" including dowing nothing which is more effective at avoiding injury or death. >The bulk of firarems are used against unworthy and unnesessary >opponents ... those who posessa a cool jakcet you want, those who >would argue with you about a parking space, those who would >take your woman. In short, trivial and worthless causes. Ok, support *this* assertation. Hell, support *one*. >Too much of this has ruined you cause. There is no recovery. That's nice. >In the near future, federal martials will come for your arms. That's nice, too. >The 2nd amendment is dead. Accept this. Find another way. Why on Earth should we? If you're correct we've nothing to lose by continuing to argue against it and everything to gain. ------------------------------------------------------------------------ David Veal Univ. of Tenn. Div. of Cont. Education Info. Services Group PA146008@utkvm1.utk.edu - "I still remember the way you laughed, the day your pushed me down the elevator shaft; I'm beginning to think you don't love me anymore." - "Weird Al"
5922
From: jeh@cmkrnl.com Subject: Re: A question about 120VAC outlet wiring.. Organization: Kernel Mode Systems, San Diego, CA Lines: 43 In article <1993Apr14.172145.27458@ecsvax.uncecs.edu>, crisp@ecsvax.uncecs.edu (Russ Crisp) writes: > I'm considering modernizing some old wiring in my home, and > I need a little advice on outlet wiring. Several outlets > are the old 'two prong' type, without the ground. Naturally, > the wire feeding these outlets is 12/2, WITHOUT the ground > wire. I noticed at the fusebox that some circuits have the > 12/2 with ground, and that on these circuits, the ground > wire was tied to the same bus as the neutral (white) wire. > > SO.. Here's my question. It seems to me that I'd have the > same electrical circuit if I hooked the jumper from the neutral > over to the ground screw on new 'three prong' grounding outlets. > What's wrong with my reasoning here? No. No. NOOO!!! The ground (green) wire is for safety. No current is supposed to flow in it under normal conditions. This means that there's normally no voltage drop in it either. It is supposed to be safe to touch the ground wire... even if you're grounded in some other way at the same time. The neutral (white) wire is, as Dave Vanderbyl correctly said, the return for the hot wire. Since current flows in it, there's a voltage drop. If you plug a heavy load into a properly-wired grounded outlet, you can commonly measure a volt or so of difference between neutral and ground. They are supposed to be connected together at the breaker panel... but nowhere, repeat NOwhere, else. (Well, almost. There are strange exceptions for things like sub-panels.) What you CAN do if you want three-prong outlets without additional wiring is to use a GFCI outlet (or breaker, but the outlet will be cheaper). In fact, depending on where you are putting your new outlet(s), a GFCI may be *required*. There is a FAQ on electrical wiring, posted regularly to rec.woodworking and news.answers. It goes into great detail on these issues (including GFCIs) and you should probably read it before asking any more questions. I'll mail a copy to you, append a copy here, and will ask the writers to cross-post it here in the future. --- Jamie Hanrahan, Kernel Mode Systems, San Diego CA Internet: jeh@cmkrnl.com Uucp: uunet!cmkrnl!jeh CIS: 74140,2055
5923
From: 0005111312@mcimail.com (Peter Nesbitt) Subject: Newspapers censoring gun advertisements Lines: 88 Recently while looking around in Traders Sporting Goods store, a very well stocked firearms store, I discovered a printed document that was being distributed by the good folks who work there. Traders, BTW, is located in San Leandro, CA. Granted, the document may be asking you and I to help out Traders, but in the big scope of things, I feel that we would do all gun owners a favor by helping to this cause. Anyway, here it is: NEWSPAPER AD CENSORSHIP Are you letting the newspapers tell you how to live your life, what's good for you, what's not, and exercise blatant censorship over what you read in their advertisments? The newspapers have now decided to censor gun ads - which is why you no longer see the ads that Traders, San Leandro, has run for many years. These ads were run for the law-abiding honest citizens who own firearms for sporting use or self-protection. They certainly have the right to do so, under the Second Amendment Right to Bear Arms. If you are tired of newspapers who run sex and liquor ads galor, yet refuse to run legitimate gun ads, please send a letter to the editors indicating your displeasure over their censorship doctrine. Following is a list of Bay area newspapers who censor gun ads. Perhaps you'd like to send them your thoughts on this issue! Oakland Tribune Daily Review Alameda Times-Star POB 28883 POB 5050 1516 Oak St. Oakland, CA 94604 Hayward,94540 Alameda, CA 94501 Argus Tri Valley Herald San Leandro Times 3850 Decoto Rd. POB 10367 161 W. Juana Ave. Fremont, CA 94555 Pleasanton, CA 94588 San Leandro, CA 94577 Contra Costa Times San Mateo Times San Francisco Chronicle POB 5088 POB 5400 901 Mission St. Walnut Creek, CA 94596 San Mateo, CA 94402 San Francisco, CA 94103 San Fran. Independent San Fran. Examiner San Jose Mercury News 1201 Evans Ave 110 5th St. 750 Ridder Park Dr. San Fran., CA 94124 San Fran., CA 94103 San Jose, CA 95190 Then there are six pages of "facts". I can not validate these facts, and there were no sources, but many feel and sound very true. Here are the topic headlines: - Big Media Snow Job - Blaming Firearms for Murder is Like Blaming Hospitals for Death - I could use the same Nazi Journalistic Technique of CBS and ABC to prove that Hospitals Cause Death - How NBC, CBS, and ABC have scammed the American people on "gun control" - American TV journalism is based on Nazi journalism - Why TV journalists lie - The Government with the help of the TV networks, has succeeded in playing one group against the other - Gun laws are unconstitutional - American gun laws are based on Nazi gun laws - The Government is trying to devide and conquer - The CIA wants your firearms and so on for six pages. So now we have the media trying help put gun dealers out of business by trying to limit their exposure to potential customers, and preventing the customers from reading about sales of ammunition and firearms for sporting, hunting, or other recreational use. Let me know if you write to any of these bozos. /-----------------------------------------------------------------------------\ | Peter D. Nesbitt | Air Traffic Controller | PNESBITT@MCIMAIL.COM | | | Oakland Bay TRACON | | |-----------------------------------------------------------------------------| | CBR600F2 Pilot | NRA Member CCX1380F | S&W .41 Magnum Carrier | \-----------------------------------------------------------------------------/
5924
From: gt1091a@prism.gatech.EDU (gt1091a gt1091a KAAN,TIMUCIN) Subject: Re: Public Service Translation No.2 Keywords: effective Greek & Armenian postings Organization: Georgia Institute of Technology Lines: 21 Who the hell is this guy David Davidian. I think he talks too much.. Yo , DAVID you would better shut the f... up.. O.K ?? I don't like your attitute. You are full of lies and shit. Didn't you hear the saying "DON'T MESS WITH A TURC!!"... See ya in hell.. Timucin. -- KAAN,TIMUCIN Georgia Institute of Technology, Atlanta Georgia, 30332 uucp: ...!{decvax,hplabs,ncar,purdue,rutgers}!gatech!prism!gt1091a Internet: gt1091a@prism.gatech.edu
5925
From: tedward@cs.cornell.edu (Edward [Ted] Fischer) Subject: Re: Defensive Averages 1988-1992 -- Shortstop Organization: Cornell Univ. CS Dept, Ithaca NY 14853 Lines: 13 In article <1993Apr17.200602.8229@leland.Stanford.EDU> addison@leland.Stanford.EDU (Brett Rogers) writes: >In article <steph.735027990@pegasus.cs.uiuc.edu> steph@pegasus.cs.uiuc.edu (Dale Stephenson) writes: >>>Smith, Ozzie .742 .717 .697 .672 .664 0.701 >> The Wizard's 1988 is the second highest year ever. Still very good, >>but I don't like the way his numbers have declined every year. In a few >>years may be a defensive liability. > >That's rich... Ozzie Smith a defensive liability... Why not? Brooks Robinson is a defensive liability too, and Ted Williams is a weak hitter. Even great players decline as they age. -Valentine
5926
From: ad354@Freenet.carleton.ca (James Owens) Subject: Re: Question for those with popular morality Organization: National Capital Freenet, Ottawa, Canada Lines: 87 In article 70257, david@terminus.ericsson.se (David Bold) writes: >In article 17570@freenet.carleton.ca, ad354@Freenet.carleton.ca >(James Owens) writes: >>You seem to be saying that, God being unknowable, His morality >>is unknowable. >Yep, that's pretty much it. . . . >. . . >As I understand it, the Sadducees believed that the Torah was all >that was required, whereas the Pharisees (the ancestors of modern >Judaism) believed that the Torah was available for interpretation >to lead to an understanding of the required Morality in all its >nuances (->Talmud). >The essence of all of this is that Biblical Morality is an >interface between Man and YHWH (for a Jew or Christian) and does >not necessarily indicate anything about YHWH outside of that >relationship (although one can speculate). >. . . >. . . the point I`m trying to make is that we only really have the >Bible to interpret, and that interpretation is by humanity. I guess >this is where Faith or Relevation comes in with all its inherent >subjectiveness. God being unknowable, I can't comment on His motives, but it would be distressing if He allowed us to misunderstand Him through no fault of our own. For sanity's sake we must assume, if we believe in Him at all, that His message comes through somehow. The question is whether it comes through immediately to every individual, or is contained in a complex canon that must be interpreted by experts in consultation with one another, or is transmitted directly through appointed representatives who are free to interpret, extend and modify the canon. If God's message is indeed mediated, the further problem arises as to whether the individual under- stands the mediated message fully and clearly. Since the responsibility for understanding lies ultimately with the individual, we must assume that God in His benevolence guides each individual to the appropriate source for that individual, whereof the person may or may not drink. >>Metaphysically, if there are multiple moral codes then there is no >>Absolute moral code, and I think this is theologically questionable. >No. There may be an absolute moral code. There are undoubtably multiple >moral codes. The multiple moral codes may be founded in the absolute moral >code. As an example, a parent may tell a child never to swear, and the child >may assume that the parent never swears simply because the parent has told >the child that it is "wrong". Now, the parent may swear like a trooper in >the pub or bar (where there are no children). The "wrongness" here is if >the child disobeys the parent. The parent may feel that it is "inappropriate" >to swear in front of children but may be quite happy to swear in front of >animals. The analogy does not quite hold water because the child knows that >he is of the same type as the parent (and may be a parent later in life) but >you get the gist of it? Incidentally, the young child considers the directive >as absolute until he gets older (see Piaget) and learns a morality of his own. Your example is complicated in our age by the thin line between morality and politeness. You might have said "burp", for burping and swearing carry about the same stigma today. If you are talking about "taking the Lord's name in vain" as a serious transgression, then this example is more a case of hypocrisy than of varying moral codes. If there is an absolute moral code, propositions or laws in that code apply absolutely and universally, by definition. Conceivably some moral codes could be subsets of the universal code, as you say at the outset. So, for example, God's code could include, "Thou shalt not create Beings without a hospitable planet to live on", but this law would be inapplicable to us. Nevertheless, we would be entitled to suppose that all laws applicable to us are also applicable to God. But when you begin to ask what laws might appear in God's moral code, you have a sense of the absurdity of the question. Does God make laws for Himself to follow? Perhaps God is not the sort of being to which the category "morality" can be sensibly applied. -- James Owens ad354@Freenet.carleton.ca Ottawa, Ontario, Canada
5927
From: wyman@rtsg.mot.com (Mark S. Wyman) Subject: Re: AMD i486 clones: Now legal in US?!?!?! Nntp-Posting-Host: lead17 Organization: Motorola Inc., Cellular Infrastructure Group Distribution: na Lines: 12 poe@wharton.upenn.edu writes: >A friend of mine called me on the phone and told me he was wathcing CNN >and saw a report that the ruling prohibiting AMD from selling their i486 >clones has been thrown out, making it legal for AMD to ship in the US. >Can anyone out there verify this? >Thanks in advance >Phil Yep, this was on the news. Great news for consumers. Bad news for Intel.
5928
From: Steve Bollinger <buzz@apple.com> Subject: Re: Stereo sound problem (?) on mac games X-Useragent: Nuntius v1.1.1d20 X-Xxdate: Mon, 19 Apr 93 19:34:37 GMT X-Xxmessage-Id: <A7F83ECD5E013847@pyd.apple.com> Organization: Apple Computer, Inc. Lines: 192 In article <1qsfak$skc@network.ucsd.edu> Doug P. Book, dpb@sdchemw2.ucsd.edu writes: >Hi. I think I have a problem with the stereo sound output on my Quadra >900, but I am not totally sure because my roomate has the same problem >on his PowerBook 170. Any info or experience anyopne has would be >greatly appreciated. > >When I hook my Quadra up to my home stereo system, the following types >of sounds (mono, as far as I can tell) all play fine through BOTH >speakers: > >system beeps (already provided ones such as Indigo and ones I record) > >Armor Alley >Spectre >Spaceward Ho! > > >But, the following games only play out of the left channel: > >Lemmings >Out of This World (awesome game, BTW) >Glider 4.0 >OIDS > > >But still, STEREO system beeps do play in stereo, through BOTH speakers. >(The one I'm specifically referrring to is Apocolyptic Beginning, which >my roommate downloaded from some ftp site (sumex?)) > > >All of the symptoms are the same on my rommates 170 (he can't run >OOTW because he doesn't have color). > >We're both running system 7.1 > > > >Does anyone with Lemmings or the other three games I mentioned above get >sound out of both speakers on a Mac II class, Quadra, LC, PowerBook 140 or >greater, Centris, SE/30, etc... (stereo) machine? > >I used to have a Mac II, and I sort of rememeber Lemmings playing in >stereo on that machine, not just on the left channel. (I could be >mistaken, though. If there were a problem with the Quad 900's and PB >170's, I am wondering why the system beeps still play in stereo? If there >isn't a problem with our machines, I wonder why the 4 games above are >apparantly written to support only one channel of stereo when they >could just use mono sounds so the mono sound would at least come out of >both speakers (like Spectre, etc. do)? > >Quadra 900's and PowerBook 170's have the same ROMS (to my knowledge), >so maybe this is a ROM problem? (if so, though, why wouldn't System 7.1 >patch over this problem?) > > > > >Thanks for any help you can provide! In article <1993Apr18.213827.9974@kth.se> Jon Wtte, d88-jwa@hemul.nada.kth.se writes: >Mac sound hardware is diverse; some macs play in stereo and >mix the output (the SE/30 for instance) while others play in >stereo but ONLY has the left channel for the speaker, while >some are "truly" mono (like the LC) > >Developers know that stuff played in the left channel is >guaranteed to be heard, while the right channel isn't. Some >send data to both, some only send data to the left channel >(the first is preferrable, of course) Okay, I guess its time for a quick explanation of Mac sound. The original documentation for the sound hardware (IM-3) documents how to make sound by directly accessing hardware. Basically, you jam values into all the even bytes from SoundBase to SoundBase+0x170. This was because of how the Mac 128 (and some later machines) generated sound was by scanning this block and D/Aing every even byte (the odd bytes went to the floppy on some machines). When the Mac II (and Apple Sound Chip) was invented, it was designed to generate stereo sound. It was also designed to be compatible with we had once documented. So storing bytes at the even values at SoundBase meant "I want to play a mono sound" and so it was emulated. But Apple had since retracted the documentation on SoundBase and decided not to document the lowest layers of sound generation. So apple never explained where to stuff bytes if you want to make stereo sound. Enter game developers. The sound driver and current sound manager are inconveniently lame for making games. Furthermore, people who port from the IBM don't want to learn more APIs. So, it has become popular for game writers to write to SoundBase to make sound, since it is very easy. Since the Mac II, Apple has had many different kind of sound output hardware, and the only things they have in common are that writing to SoundBase works. On some hardware, (Mac II, IIx, IIcx, IIci at least), writing to SoundBase gets you mono sound through both speakers. On some Macs (Quadra 700/900/950 at least) writing to SoundBase gets you mono sound on the left channel only. Both are technically correct interpretations of the original specification, but one is obviously preferable for asthetic reasons. If developers use the Sound Manager (and I think the sound driver), mono sounds will (typically) come out through both channels regardless of the underlying hardware. It is possible to specify you want to generate left channel only, but no one does. If developers write to sound base, their games will only come out the left on some games. The other problem, the original Mac II only producing left channel sound on the internal speaker, while the SE/30 mixes both, isn't really related. It is due to the post generation amplification used on the motherboards of the different machines. It only affects true stereo sounds. Sounds which are actually mono, will play on the internal speaker, no matter what machine you have. Now, to more directly address the question, the games you list: >Lemmings >Out of This World (awesome game, BTW) >Glider 4.0 >OIDS and also Hellcats, Super Tetris Oxyd (and many more, these are just what I've tested) Cheat and write to SoundBase and so are only left channel on Quadras. Other games you list: >Armor Alley >Spectre >Spaceward Ho! and also PGA Tour Golf Civilization (and more, these are again only from personal experience) Use the sound manager and work fine on all machines. The more of the story is to developers: DON'T CHEAT! Really, I am absolutely, positively not allowed to do what I am about to do, but I'm going say it anyway. Stop cheating on sound! Really soon, you will be sorry, as even those without external speakers will be disappointed with your sound on future hardware. The grace period is about to end. The Sound Manager is understandable now, and works pretty well and will work even better soon, so use it. In conclusion: To Doug, it isn't a hardware problem, at least, not a bug. To Jon, it isn't a choice to developers as to whether they want to send sound to both channels. If they do it the right way, it is taken care of automatically. If you cheat, there is not way to make it work on all hardware. Have fun. Disclaimer number 1: I don't work on sound here at Apple, I'm just pretty well informed. So don't write me with sound questions. Disclaimer number 2: If it says up above that I wrote anything like "the grace period is about to end" then it is a bug in your news feed, since I am catagorically not allowed to say anything like that. You know what I mean. Disclaimer number 3: I don't speak for Apple, just me. -Steve Bollinger
5929
From: jennise@opus.dgi.com (Milady Printcap the goddess of peripherals) Subject: Looking for a little research help [ addendum] Organization: Dynamic Graphics Inc. Lines: 10 Distribution: usa NNTP-Posting-Host: opus.dgi.com Sorry but I forgot this ps. Right now my sight is getting news about two weeks behind so it's kind of necessary (to me) that any responses be sent to me directly. Thanks a lot Jennise jennise@dgi.com
5930
Subject: McRae is (Re: Torre: The worst manager?) From: scott@mccall.com (Scott D. Davis) Reply-To: scott@mccall.com (Scott D. Davis) Organization: The McCall Pattern Co., Manhattan, KS, USA Nntp-Posting-Host: mis2 Nntp-Posting-User: scott Lines: 18 In article <16BB1C589.DAK988S@vma.smsu.edu.Ext>, DAK988S@vma.smsu.edu writes: >gt7469a@prism.gatech.EDU (Brian R. Landmann) writes: >>Joe Torre has to be the worst manager in baseball. >>brian, a very distressed cardinal fan. >No....Hal McRae is the worst manager in baseball. I've never seen a guy who >can waste talent like he can. One of the best raw-talent staffs in the league, >and he's still finding a way to lose. I'll be surprised if he makes it through >the next 2 weeks, unless drastic improvement is made. > KC(?) news was doing a report on that. They said that McRae is really a batting coach and not a manager. But for some reason he took the job. Whatever the reason, the Royals need a new manager now...while it is too late. -- Scott D. Davis <scott@mccall.com> The McCall Pattern Company (uucp: ...!widener!depot!mccall!scott) 615 McCall Road (800)255-2762, in Kansas (913)776-4041 Manhattan, KS 66502, USA
5931
From: hudson@athena.cs.uga.edu (Paul Hudson Jr) Subject: Re: Religion and homosexuality Keywords: being liberal Organization: University of Georgia, Athens Distribution: usa Lines: 18 In article <1993Apr5.182411.7621@midway.uchicago.edu> dsoconne@midway.uchicago.edu writes: >First of all as far as I know, only male homosexuality is explicitly >mentioned in the bibles, so you're off the hook there, Actually, there is one condemnation of lesbian acts in the Bible, Romans 1:26. I think. In >any event, there are *plenty* of people in many denominations who >do not consider a person's sexual identification of gay/lesbian/bisexual >as an "immoral lifestyle choice" There are plenty who don't read the Bible. Or pray for that matter. Link Hudson.
5932
From: kaveh@gate-koi.corp.sgi.com (Kaveh Smith ) Subject: Jews/Islam Dr. Frankenstien Nntp-Posting-Host: gate-koi.corp.sgi.com Reply-To: kaveh@gate-koi.corp.sgi.com (Kaveh Smith ) Organization: Silicon Graphics, Inc., Mountain View, CA, USA Lines: 49 I have found Jewish people very imagentative and creative. Jewish religion was the foundation for Christianity and Islam. In other words Judaism has fathered both religions. Now Islam has turned against its father I may say. It is Ironic that after communizem threat is almost gone, religion wars are going to be on the raise. I thought the idea of believing on one God, was to Unite all man kind. How come both Jews and Islam which believe on the same God, "the God of Ebrahim" are killing each other? Is this like Dr. Frankenstien's story? How are you going to stop this from happening? How are you going to deal with so many Muslims. Nuking them would distroy the whole world? Would God get mad, since you have killed his followers, you believe on the same God, same heaven and the same hell after all? What is the peacefull way of ending this Saga? Man kind needs religion, since it sets up the rules and the regulations which keeps the society in a healthy state. A religion is mostly a sets of rules which people have experienced and know it works for the society. The praying, keeps the sole healthy and meditates it. God does not care for man kinds pray, but man kind hopes that God will help him when he prays. Religion works mostly on the moral issues and trys to put away the materialistic things in the life. But the religious leaders need to make a living through religion? So they may corrupt it, or turn it to their own way to make their living. i.e Muslims have to pay %20 percent of their income to the Mullahs. I guess the rabie gets his cut too! Is in it that religion should be such that everybody on planet earth respects each other, be good toward each other helps one another, respect the mother nature. Is in that heaven and hell are created on earth through the acts that we take today? Is in it that within every man there is good and bad, he could choose either one, then he will see the outcome of his choice. How can we prevent man kind from going crazy over religion. How can we stop another religious killing field, under poor Gods name? What are your thoughts? Do you think man kind would to come its senses, before it is too late? P.S. on the side Do you think that Moses saw the God on mount Sina? Why would God go to top of the mountain? He created the earth, he could have been anywhere? why on top the mountain? Was it because people thought to see God you have to reach to the skies/heavens? Why God kept coming back to Middle East? Was it because they created God through their imagination? Is that why Jewish people were told by God, they were the chosen ones? Profit Mohammad was married to Khadijeh. She was a Jewish. She taught him how to trade. She probably taught him about Judaism. Quran is mostly copy right of Taurah (sp? old testement). Do you think God wrote Quran? Makeh was a trade city before Islam. Do you think it was made to be the center of Islamic world because Mohammad wanted to expand his trade business? Is that why God has put his house in there? I think this religious stuff has gone too far. All man kind are going to hurt from it if they do not wise up. Look at David Koresh, how that turned out? I am afraid in the bigger scale, the Jews and the Muslims will have the same ending!!!!!!!! Religion is needed in the sense to keep people in harmony and keep them doing good things, rather than plotting each others distruction. There is one earth, One life and one God. Let's all man kind be good toward each other. God help us all. Peace
5933
From: ab@nova.cc.purdue.edu (Allen B) Subject: Re: Fractals? What good are they ? Organization: Purdue University Lines: 16 In article <mdpyssc.2@fs1.mcc.ac.uk> mdpyssc@fs1.mcc.ac.uk (Sue Cunningham) writes: > We have been using Iterated Systems compression board to compress > pathology images and are getting ratios of 40:1 to 70:1 without too > much loss in quality. It is taking about 4 mins per image to compress, > on a 25Mhz 486 but decompression is almost real time on a 386 in software > alone. How does that compare with JPEG on the same images and hardware as far as size, speed, and image quality are concerned? Despite my skeptical and sometimes nearly rabid postings criticizing Barnsley and company, I am very interested in the technique. If I weren't I probably wouldn't be so critical. :-) ab
5934
From: dcoleman@utxvms.cc.utexas.edu (Daniel M. Coleman) Subject: Re: Gateway 2000 and ATI LB problem. Lines: 37 Nntp-Posting-Host: gray.cc.utexas.edu Organization: The University of Texas at Austin Lines: 37 In article <jmgree01.734040660@starbase.spd.louisville.edu>, jmgree01@starbase.spd.louisville.edu (Jude M. Greer) writes: > I was wondering if anyone out there has had the same problem I am having with > my Gateway 2000 486-33DX VL-Bus system with ATI Graphics Ultra Pro LB. > When I have my computer in any resolution other than 800x600, everything is > fine, but whenever I use it in 800x600 (Windows, AutoCAD, GIFs) the screen > gets about 1 1/2 inches shorter. At the very top and very bottom of the screen > there is about a 3/4" bar of black. The screen isn't cut off, it just squeezes > everything into the smaller space and messes up the aspect ratio. While I can > manually change the V-Size on the back, this is a pain in the ass, and it just > shouldn't happen anyway. I've called Gateway numerous times and they haven't > been able to help me at all. Two different times they sent me a new card, and > both times the new card didn't work at all in my computer. They even tried > to bill me for the first card because they didn't get it back in a couple of > days, when they TOLD me over the phone that they would wait more than 2 weeks > before billing my card. But their customer support is a different story... > So, if anyone has had this same problem, please let me know if you know what > to do. Hell, let me know if you don't have a solution, just so I know I'm > not the only one with this problem. Thanks in advance. > > Jude M. Greer > jmgree01@starbase.spd.louisville.edu > > P.S. I already tried going into the MACH 32 install program and manually set- > ting up the card. Doesn't work. Whenever I try to increase the vertical size > of the 800x600 screen, it just starts to cut off the top and bottom. > Maybe its a monitor problem. You mentioned that you swapped cards, but not monitors. Perhaps that could be it. Dan -- Daniel Matthew Coleman | Internet: dcoleman@utxvms.cc.utexas.edu -----------------------------------+---------- : dcoleman@ccwf.cc.utexas.edu The University of Texas at Austin | DECnet: UTXVMS::DCOLEMAN Electrical/Computer Engineering | BITNET: DCOLEMAN@UTXVMS [.BITNET]
5935
From: hlu@luke.eecs.wsu.edu (HJ Lu) Subject: Re: Debugging possible hardware problems Article-I.D.: serval.1993Apr20.151405.12480 Organization: Washington State University! Lines: 54 In article <1r0rslINNnv2@senator-bedfellow.MIT.EDU> jfc@athena.mit.edu (John F Carr) writes: > >I'm running Linux on an 80486 EISA system, and I'm having what I think are >hardware problems. It could be software, but I don't see why I'd be the >only one having trouble. I'd like some advice on how best to debug this. > >The symptom: when I try to build gcc, I get unpredictable and unrepeatable >results. Sometimes a .o file is not in valid a.out format. Recompiling the >file gives me a valid binary. Sometimes the compiler aborts or dumps core, >but works fine when run again with the same input. Compiling the same >source files with the same arguments gives slight differences in a few >object files. (Note that Linux, unlike many other systems, does not put >timestamps in object files so compiling twice should give bit-identical >results.) > >I also have occasional filesystem corruption on my SCSI drive, but that >could be caused by using development software. It could also be related to >my problems compiling. The compile problems are not caused by disk >problems: I get the same results whether I do my work on an IDE or SCSI >disk. > >I've set the memory speed and cache write speed to the recommended values. Recommended for what, DOS? That is a junk. > >I suspect the external cache, but I have no real evidence for this. > >The motherboard is a NICE Super-EISA with 256 KB write-back cache and a DX/2 >66 Mhz processor. > >What I'm looking for: > > . A system test program to run under DOS or Linux Linux + gcc. Fire up gcc to compile libc and kernel at the same time running X11R5. > > . Suggestions about the cause of the problem Bad memory, bad motherboard, bad cache. > > . Suggestions about how to debug the problem > change wait state of RAM. turn off turbo. change bus speed swap RAM. H.J.
5936
From: "james kewageshig" <james.kewageshig@canrem.com> Subject: articles on flocking? Reply-To: "james kewageshig" <james.kewageshig@canrem.com> Organization: Canada Remote Systems Distribution: comp Lines: 17 HI All, Can someone point me towards some articles on 'boids' or flocking algorithms... ? Also, articles on particle animation formulas would be nice... ________________________________________________________________________ |0 ___ ___ ____ ____ ____ 0|\ | \ \// || || || James Kewageshig |\| | _\//_ _||_ _||_ _||_ UUCP: james.kewageshig@canrem.com |\| | N E T W O R K V I I I FIDONET: James Kewageshig - 1:229/15 |\| |0______________________________________________________________________0|\| \________________________________________________________________________\| --- þ DeLuxeý 1.25 #8086 þ Head of Co*& XV$# Hi This is a signature virus. Co -- Canada Remote Systems - Toronto, Ontario 416-629-7000/629-7044
5937
From: carlos@beowulf.Jpl.Nasa.Gov (Carlos Carrion) Subject: Re: The Role of the National News Media in Inflaming Passions Organization: Jet Propulsion Laboratory, Pasadena, CA Lines: 20 Distribution: ca NNTP-Posting-Host: beowulf.jpl.nasa.gov In article <15377@optilink.COM> cramer@optilink.COM (Clayton Cramer) writes: >I'm sick of it. This continual effort to inflame the passions >of Americans by playing every trial as completely sexist, racist, >or gay-bashing, when the realities are seldom this simple. This >is what happens when a society becomes tied up in ideologies. I have come to the conclusion that the TV stations here in LA WANT a riot to happen when the verdict comes in. In a not so subtle way they are preparing their audience for the worst and even going so far as to want SOMETHING to happen for their viewers with all their commercials and their "we are ready for anything so watch US" messages... carlos. "I as much as any other man am in favor of having the superior position assigned to the white race" - Abraham Lincoln ...ames!elroy!jpl-devvax!{beowulf|pituco}!carlos
5938
From: arromdee@jyusenkyou.cs.jhu.edu (Ken Arromdee) Subject: Re: Davidians and compassion Organization: Johns Hopkins University CS Dept. Lines: 16 In article <sandvik-190493200420@sandvik-kent.apple.com> sandvik@newton.apple.com (Kent Sandvik) writes: >So we have this highly Christian religious order that put fire >on their house, killing most of the people inside. We have no way to know that the cultists burned the house; it could have been the BATF and FBI. We only have the government's word for it, after all, and people who started it by a no-knock search with concussion grenades are hardly disinterested observers. -- "On the first day after Christmas my truelove served to me... Leftover Turkey! On the second day after Christmas my truelove served to me... Turkey Casserole that she made from Leftover Turkey. [days 3-4 deleted] ... Flaming Turkey Wings! ... -- Pizza Hut commercial (and M*tlu/A*gic bait) Ken Arromdee (arromdee@jyusenkyou.cs.jhu.edu)
5939
From: prb@access.digex.com (Pat) Subject: Re: Shuttle oxygen (was Budget Astronaut) Organization: Express Access Online Communications USA Lines: 11 NNTP-Posting-Host: access.digex.net I thought that under emergency conditions, the STS can put down at any good size Airport. IF it could take a C-5 or a 747, then it can take an orbiter. You just need a VOR/TAC I don't know if they need ILS. pat ANyone know for sure.
5940
From: michael@jester.GUN.de (Michael Gerhards) Distribution: world Subject: Re: com ports /modem/ mouse conflict -REALLY? X-Newsreader: TIN [version 1.1 PL8] Organization: private COHERENT system Lines: 20 Phil Hunt (phil@howtek.MV.COM) wrote: > I'm kind of new at the pc stuff. My machine has 4 serial ports. Com 1 and3 > and 2 &4 share same IRQs. You mean I can't plug a mouse into Com1 and a modem > into com3 and expect both to work? No, but some OS's ( COHERENT , etc ) are able to drive one of the ports in polled mode without using the IRQ. In your example, after accessing the modem, the mouse won't work until you reboot, because the IRQ is used by the modem. > If Answer is NO, should I change IRQ's for com ports to be different? And, > does it really matter which IRQ I set the ports too? Yes, you can change the IRQ's for com3/4, but it depends on your other hardware. com1 uses IRQ4, com2 IRQ3. If you have only one printerport ( IRQ7 ), you can change com3 to IRQ5 ( normally 2nd printer ). For com4, you can assign IRQ2, if its free. As far as I know, no other IRQ can be used until your I/O-card is 16bit and caould access IRQ's > 8. Michael -- * michael@jester.gun.de * Michael Gerhards * Preussenstrasse 59 * * Germany 4040 Neuss * Voice: 49 2131 82238 *
5941
From: drlovemd@jhuvms.hcf.jhu.edu (Steve Liu) Subject: What is the current Rom Version shipping in Syquest drives? Organization: The Johns Hopkins University - HCF Lines: 4 Distribution: world NNTP-Posting-Host: jhuvms.hcf.jhu.edu News-Software: VAX/VMS VNEWS 1.41 The title says it all. I need to know the 44, 88, and 88c rom versions. Steve :-)
5942
From: mikgr@wpsun4.UUCP (Michael Grant) Subject: Re: COMMENTS ==> VIDEO BLASTER (Creative Labs) Organization: WordPerfect Corporation, Orem UT Lines: 42 In article <1993Apr14.062219.11573@ultb.isc.rit.edu>, mej0381@ritvax.isc.rit.edu writes: > >In <115080@bu.edu> heiser@acs2.bu.edu (Bill Heiser) writes: > > > >>In article <C4rDy0.Fw9@chinet.chi.il.us> randy@chinet.chi.il.us (Randy Suess) w > >rites: > >>>>The video blaster doesn't work with the ATI GRaphics Ultra Pro, doesn't work > >>>>with >15M system RAM. > > > >>Are you serious? So I can't use a Video Blaster in my 16mb 486/33? > >>What are the alternatives (other than removing memory?) > > > >Get a better one. Hows about the Win/TV thing? > >-- > >The Wailer at the Gates of Dawn | banshee@cats.UCSC.EDU | > >Just who ARE you calling a FROOFROO Head? | | > >oD#0667 "Just a friend of the beast." | banshee@ucscb.UCSC.EDU | > >2,3,5,7,13,17,19,31,61,89,107,127,521,607....| banshee@ucscb.BITNET | > > No good. I perfer WatchIT TV. It can run in DOS and Windows. Win/Tv only run in > windows. Sorry.... > > -- Still no good. WatchIT TV will not work on a with local bus video. It will not work in any high reolution modes either. The people who make the card assure me that they will have a card available in June that supports both local-bus and hi-res. BTW does anyone know the name of the company who makes watchit tv? Phone #? BBS? Internet? Thanks Michael Grant (mikgr@wordperfect.com) or (mikgr@wpsun4.uunet.uu.net)
5943
From: cobb@alexia.lis.uiuc.edu (Mike Cobb) Subject: Christian Morality is Organization: University of Illinois at Urbana Lines: 51 In <11836@vice.ICO.TEK.COM> bobbe@vice.ICO.TEK.COM (Robert Beauchaine) writes: >In article <C5L1Ey.Jts@news.cso.uiuc.edu> cobb@alexia.lis.uiuc.edu (Mike Cobb) writes: >>In <11825@vice.ICO.TEK.COM> bobbe@vice.ICO.TEK.COM (Robert Beauchaine) writes: >> >> >>> Actually, my atheism is based on ignorance. Ignorance of the >>> existence of any god. Don't fall into the "atheists don't believe >>> because of their pride" mistake. >> >>How do you know it's based on ignorance, couldn't that be wrong? Why would it >>be wrong >>to fall into the trap that you mentioned? >> > If I'm wrong, god is free at any time to correct my mistake. That > he continues not to do so, while supposedly proclaiming his > undying love for my eternal soul, speaks volumes. What are the volumes that it speaks besides the fact that he leaves your choices up to you? > As for the trap, you are not in a position to tell me that I don't > believe in god because I do not wish to. Unless you can know my > motivations better than I do myself, you should believe me when I > say that I earnestly searched for god for years and never found > him. I definitely agree that it's rather presumptuous for either "side" to give some psychological reasoning for another's belief. MAC >/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\ >Bob Beauchaine bobbe@vice.ICO.TEK.COM >They said that Queens could stay, they blew the Bronx away, >and sank Manhattan out at sea. >^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -- **************************************************************** Michael A. Cobb "...and I won't raise taxes on the middle University of Illinois class to pay for my programs." Champaign-Urbana -Bill Clinton 3rd Debate cobb@alexia.lis.uiuc.edu With new taxes and spending cuts we'll still have 310 billion dollar deficits.
5944
From: dclaar@cup.hp.com (Doug Claar) Subject: Los Angeles Freeway traffic reports Nntp-Posting-Host: hprtnyc.cup.hp.com Organization: Hewlett-Packard X-Newsreader: TIN [version 1.1 PL8.9] Lines: 4 oops, that's KNX 1070. KNBR is up in 'Frisco, and down at 680. ==Doug "San Fran can't be 'the city': Jack Webb told me so" Claar
5945
From: lvc@cbnews.cb.att.com (Larry Cipriani) Subject: Re: Need info on 43:1 and suicide for refutation Organization: Ideology Busters, Inc. Distribution: usa Lines: 203 Here's something Preston Covey (professor of ethics at CMU) wrote: From: "Preston K. Covey" <covey+@andrew.cmu.edu> Subject: Gun Stats & Mortal Risks Date: Mon, 15 Feb 1993 18:35:05 -0500 (EST) Folks, Hail from the nether world. On February 4th, the Wall Street Journal carried a front-page article by Erik Larson entitled "Armed Force." I felt a reply was in order to his citation of the notorious scare stat that "A Gun is 43 times more likely to kill than to protect." I sent the following to the WSJ. ----- Gun Stats & Mortal Risks Preston K. Covey Erik Larson~s even-handed article on Paxton Quigley (~Armed Force,~ 2/4/93, WSJ) cites the world~s most notorious ~statistic~ regarding guns in the home: ~A pioneering study of residential gunshot deaths in King County, Washington, found that a gun in the home was 43 times more likely to be used to kill its owner, spouse, a friend or child than to kill an intruder.~ The ~43 times~ stat is everywhere these days; it has grown in media lore like the proverbial urban myth: it was inflated by one pugilistic talk-show pundit to ~93.~ Given the shock value of the finding, the conclusion of the 1986 New England Journal of Medicine (NEJM) study is remarkably understated: ~The advisability of keeping firearms in the home for protection must be questioned.~ Responsible people should indeed question the risks and benefits of bringing a firearm into their home. But what we need to know is this: What exactly are the risks and benefits? The NEJM testimony is neither the whole truth about the benefits nor nothing but the truth about the risks. Further, as with motor vehicles, we want to know: What control do we have over the risks and benefits? And, as with the risks of cancer or heart disease or auto accidents: How can we minimize the risks? Like raw highway death tolls, the NEJM stat is not very helpful here. The NEJM finding purports to inform us, but it is framed to warn us off. It is widely promulgated in the media as a ~scare stat,~ a misleading half-truth whose very formulation is calculated to prejudice and terrify. The frightful statistic screams for itself: The risks far outweigh the benefits, yes? What fool would run these risks? If your car were 43 times more likely to kill you, a loved one, a dear friend or an innocent child than to get you to your destination, should you not take the bus? Uncritical citation puts the good name of statistics in the bad company of lies and damned lies. Surely, we can do better where lives are at stake. Let~s take a closer look at this risky business: The ~43 times~ stat of the NEJM study is the product of dividing the number of home intruders/aggressors justifiably killed in self-defense (the divisor) into the number of family members or acquaintances killed by a gun in the home (the dividend). The divisor of this risk equation is 9: in the study~s five-year sample there were 2 intruders and 7 other cases of self-defense. The dividend is 387: in the study there were 12 accidental deaths, 42 criminal homicides, and 333 suicides. 387 divided by 9 yields 43. There were a total of 743 gun-related deaths in King County between 1978 and 1983, so the study leaves 347 deaths outside of homes unaccounted. The NEJM~s notorious ~43 times~ statistic is seriously misleading on six counts: 1. The dividend is misleadingly characterized in the media: the ~or acquaintances~ of the study (who include your friendly drug dealers and neighborhood gang members) is equated to ~friends.~ The implication is that the offending guns target and kill only beloved family members, dear friends, and innocent children. Deaths may all be equally tragic, but the character and circumstance of both victims and killers are relevant to the risk. These crucial risk factors are masked by the calculated impression that the death toll is generated by witless Waltons shooting dear friends and friendly neighbors. This is criminological hogwash. 2. The study itself does not distinguish households or environs populated by people with violent, criminal, or substance-abuse histories -- where the risk of death is very high -- versus households inhabited by more civil folk (for example, people who avoid high-risk activities like drug dealing, gang banging and wife beating) -- where the risk is very low indeed. In actuality, negligent adults allow fatal but avoidable accidents; and homicides are perpetrated mostly by people with histories of violence or abuse, people who are identifiably and certifiably at ~high risk~ for misadventure. To ignore these obvious risk factors in firearm accidents and homicides is as misleading as ignoring the role of alcohol in vehicular deaths: by tautology, neither gun deaths nor vehicular deaths would occur without firearms or vehicles; but the person and circumstance of the gun owner or driver crucially affect the risk. 3. One misleading implication of the way the NEJM stat is framed is that the mere presence of a gun in the home is much more likely to kill than to protect, and this obscures -- indeed, disregards -- the role of personal responsibility. The typical quotation of this study (unlike Larson~s) attributes fatal agency to the gun: ~A gun in the home is 43 times as likely to kill . . . .~ (The Center to Prevent Handgun Violence, a major promulgator of the NEJM statistic, uses this particular formulation.) We can dispense with the silly debate about whether it~s people or guns that accomplish the killing: again, by tautology, gun deaths would not occur without the guns. The question begged is how many deaths would occur anyway, without the guns. In any case, people are the death-dealing agents, the guns are their lethal instruments. The moral core of the personal risk factors in gun deaths are personal responsibility and choice. Due care and responsibility obviate gun accidents; human choice mediates homicide and suicide (by gun or otherwise). The choice to own a gun need not condemn a person to NEJM~s high-risk pool. The gun does not create this risk by itself. People have a lot to say about what risk they run with guns in their homes. For example, graduates of Paxton Quigley~s personal protection course do not run the touted ~43 times~ risk any more than skilled and sober drivers run the same risks of causing or suffering vehicular death as do reckless or drunk drivers. Undiscriminating actuarials disregard and obscure the role of personal responsibility and choice, just as they disregard and obscure the role of socio-economic, criminological and other risk-relevant factors in firearm-related death. This is why we resent insurance premiums and actuarial consigment to risk pools whose norms disregard our individualities. Fortunately, nothing can consign us to the NEJM risk pool but our own lack of choice or responsibility in the matter. 4. Suicide accounts for 84% of the deaths by gun in the home in the NEJM study. As against the total deaths by gun in King County, including those outside the home, in-house suicides are 44% of the total death toll, which is closer to the roughly 50% proportion found by other studies. Suicide is a social problem of a very different order from homicide or accidents. The implication of the NEJM study is that these suicides might not occur without readily available guns. It is true that attempted suicide by gun is likely to succeed. It is not obviously true that the absence of a gun would prevent any or all of these suicides. This is widely assumed or alleged, but the preponderance of research on guns and suicide actually shows otherwise, that this is wishful thinking in all but a few truly impulsive cases. (See: Bruce L. Danto et al., The Human Side of Homicide, Columbia University Press, 1982; Charles Rich et al., ~Guns and Suicide,~ American Journal of Psychiatry, March 1990.) If suicides were removed from the dividend of the NEJM study~s risk equation, the ~43 times~ stat would deflate to ~six.~ The inclusion of suicides in the NEJM risk equation -- like the causes, durability, or interdiction of suicidal intent itself -- is a profoundly debatable matter. Quotations of the NEJM study totally disregard this issue. 5. Citations of the NEJM study also mislead regarding the estimable rate of justifiable and excusable homicide. Most measures, like the NEJM homicide rate, are based on the immediate disposition of cases. But many homicides initially ruled criminal are appealed and later ruled self-defense. In the literature on battered women, immediate case dispositions are notorious for under-representing the rate of justifiable or excusable homicide. Time~s January 18, 1993, cover story on women ~Fighting Back~ reported one study~s finding that 40% of women who appeal have their murder convictions thrown out. Time~s July 17, 1989, cover story on a week of gun deaths reported 51% of the domestic cases as shootings by abuse victims; but only 3% of the homicides were reported as self-defense. In a May 14, 1990, update, Time reported that 12% of the homicides had eventually been ruled self-defense. In Time~s sample, the originally reported rate of self-defense was in error by a factor of four. The possibility of such error is not acknowledged by promulgators of the NEJM statistic. 6. While both the dividend and the product of the NEJM risk equation are arguably inflated, the divisor is unconscionably misleading. The divisor of this equation counts only aggressors who are killed, not aggressors who are successfully thwarted without being killed or even shot at. The utility of armed self-defense is the other side of the coin from the harms done with guns in homes. What kind of moral idiocy is it to measure this utility only in terms of killings ? Do we measure the utility of our police solely in terms of felons killed -- as opposed to the many many more who are otherwise foiled, apprehended, or deterred? Should we not celebrate (let alone count ) those cases where no human life is lost as successful armed defenses? The question posed to media that cite the NEJM scare stat is this: Why neglect the compendious research on successful armed defense, notably by criminologist Gary Kleck (Point Blank: Guns and Violence in America , Aldine de Gruyter, 1992)? Kleck~s estimations of the rate and risk of defensive firearm use are based on victimization surveys as well as other studies: the rate is high (about one million a year) and the risk is good (gun defenders fare better than anyone, either those who resort to other forms of resistance or those who do not resist). Dividing one million gun defenses a year by 30,000 annual gun deaths (from self-defense, homicides, suicides, and accidents) yields 33. Thus, we can construct a much more favorable statistic than the NEJM scare stat: A gun is 33 times more likely to be used to defend against assault or other crime than to kill anybody. Of course, Kleck~s critics belittle the dividend of this calculation; what is good news for gun defenders is bad news for gun control. We should indeed question the basis and method of Kleck~s high estimation of defensive firearm use, as I have questioned the NEJM statistic. Clearly, the issue of how to manage mortal risks is not settled by uncritical citation of statistics. One thing troubles me still: we can hardly escape the unquestioned NEJM scare stat in our media, but we hardly ever find Kleck~s good work mentioned, even critically. -- Larry Cipriani -- l.v.cipriani@att.com
5946
From: kentiler@matt.ksu.ksu.edu (Kent P. Iler) Subject: Comments on an accelerated Video Card for ISA bus Organization: Kansas State University Lines: 8 NNTP-Posting-Host: matt.ksu.ksu.edu Hi, I am looking to buy an accelerated video card for my 486 DX 50 with ISA bus. I have a 14" SVGA NI monitor. I'm currently running DOS 5.0 and windows 3.1, although I'm considering OS/2 in the future. Can anyone make a suggestion for a video card that would suit my needs? How is Diamond speedstar? Stealth? Etc.... Thanks. --Kent
5947
From: babb@sciences.sdsu.edu (J. Babb) Subject: Re: Getting rid of screen wiggles? Organization: SDSU - LARC Lines: 42 Distribution: world NNTP-Posting-Host: larc.sdsu.edu In article <1qpj5t$itg@vela.acs.oakland.edu>, eabyrnes@vela.acs.oakland.edu (Ed Byrnes) wrote: > > My monitor display has a bad case of the wigglies. I have a good ground. I > live in an old house and I have replaced much of the wiring. I have two > EMI filters on the computer, the monitor plugs into the computer. When > fluorescent lights are on upstairs, the display jiggles, when motors run > in the house, the display jiggles, when incandescent lights are on in the > kitchen the display jiggles. I could bring a separate line from the > breaker box, and use it only for the computer, would this do it? EMI > doesn't only travel the 110 volt line though. Should I shield the back of > the monitor? Ground a grid or plate? > Your expertise is appreciated. Thanks very much! Ed Byrnes Aaahh... a problem very near and dear to my heart. In our case, other monitors cause this problem - the deflection coil of other monitors to be specific. Have also seen a monitor backed up to a fuse panel exhibit this problem. This sounds like your problem since flourescent lites, motors, etc several 10s of feet away seem to me to be too far to cause it, but the juice running to them must pass nearby your monitor. Fusebox on other side of wall maybe? We started spec'ing Panasonic CT-1331Y video monitors (3 switchable input lines(vid & aud) S-VHS on one) <$400. This stopped the wavy interference effect on the computer monitor next to it. Now on to your problem. You need what is known as mu shielding (very common, in fact almost mandatory on electrostatic deflection type O'scopes). I talked to a EE prof. He said get a coffee can, cut both ends off, mount around deflection coil of interfering monitor. BE CAREFUL TO AVOID ALL HIGH VOLTAGE CIRCUITRY. ESPECIALLY THE THICKER HIGH VOLTAGE ANODE LEAD USUALLY COLORED RED. IF YOU KILL YOURSELF, DON'T BLAME/SUE ME!!! USE PLASTIC OR OTHER NON-CONDUCTING STAND-OFFS AND SUCH TO MOUNT CAN. Now, I would assume that what is good for keeping mag fields in is also good at keeping them out, so hopefully this'll work by mounting shield on monitor being interfered with as well. If not, start shielding those other sources. Jeff Babb babb@sciences.sdsu.edu babb@ucssun1.sdsu.edu Programmer, SDSU - LARC
5948
From: crypt-comments@math.ncsu.edu Subject: Cryptography FAQ 08/10 - Technical Miscellany Organization: The Crypt Cabal Lines: 414 Expires: 22 May 1993 04:00:07 GMT Reply-To: crypt-comments@math.ncsu.edu NNTP-Posting-Host: pad-thai.aktis.com Summary: Part 8 of 10 of the sci.crypt FAQ, Technical Miscellany. Recovering Word Perfect passwords. Breaking Vigenerre ciphers. Encrypting Unix files/email. Security of Unix `crypt' command. Encryption and compression. Key management. Letter frequency. The German Enigma code. Card shuffling. S/W piracy. X-Last-Updated: 1993/04/16 Archive-name: cryptography-faq/part08 Last-modified: 1993/4/15 FAQ for sci.crypt, part 8: Technical Miscellany This is the eighth of ten parts of the sci.crypt FAQ. The parts are mostly independent, but you should read the first part before the rest. We don't have the time to send out missing parts by mail, so don't ask. Notes such as ``[KAH67]'' refer to the reference list in the last part. The sections of this FAQ are available via anonymous FTP to rtfm.mit.edu as /pub/usenet/news.answers/cryptography-faq/part[xx]. The Cryptography FAQ is posted to the newsgroups sci.crypt, sci.answers, and news.answers every 21 days. Contents * How do I recover from lost passwords in WordPerfect? * How do I break a Vigenere (repeated-key) cipher? * How do I send encrypted mail under UNIX? [PGP, RIPEM, PEM, ...] * Is the UNIX crypt command secure? * How do I use compression with encryption? * Is there an unbreakable cipher? * What does ``random'' mean in cryptography? * What is the unicity point (a.k.a. unicity distance)? * What is key management and why is it important? * Can I use pseudo-random or chaotic numbers as a key stream? * What is the correct frequency list for English letters? * What is the Enigma? * How do I shuffle cards? * Can I foil S/W pirates by encrypting my CD-ROM? * Can you do automatic cryptanalysis of simple ciphers? * What is the coding system used by VCR+? * How do I recover from lost passwords in WordPerfect? WordPerfect encryption has been shown to be very easy to break. The method uses XOR with two repeating key streams: a typed password and a byte-wide counter initialized to 1+<the password length>. Full descriptions are given in Bennett [BEN87] and Bergen and Caelli [BER91]. Chris Galas writes: ``Someone awhile back was looking for a way to decrypt WordPerfect document files and I think I have a solution. There is a software company named: Accessdata (87 East 600 South, Orem, UT 84058), 1-800-658-5199 that has a software package that will decrypt any WordPerfect, Lotus 1-2-3, Quatro-Pro, MS Excel and Paradox files. The cost of the package is $185. Steep prices, but if you think your pw key is less than 10 characters, (or 10 char) give them a call and ask for the free demo disk. The demo disk will decrypt files that have a 10 char or less pw key.'' * How do I break a Vigenere (repeated-key) cipher? A repeated-key cipher, where the ciphertext is something like the plaintext xor KEYKEYKEYKEY (and so on), is called a Vigenere cipher. If the key is not too long and the plaintext is in English, do the following: 1. Discover the length of the key by counting coincidences. (See Gaines [GAI44], Sinkov [SIN66].) Trying each displacement of the ciphertext against itself, count those bytes which are equal. If the two ciphertext portions have used the same key, something over 6% of the bytes will be equal. If they have used different key, then less than 0.4% will be equal (assuming random 8-bit bytes of key covering normal ASCII text). The smallest displacement which indicates an equal key is the length of the repeated key. 2. Shift the text by that length and XOR it with itself. This removes the key and leaves you with text XORed with itself. Since English has about 1 bit of real information per byte, 2 streams of text XORed together has 2 bits of info per 8-bit byte, providing plenty of redundancy for choosing a unique decryption. (And in fact one stream of text XORed with itself has just 1 bit per byte.) If the key is short, it might be even easier to treat this as a standard polyalphabetic substitution. All the old cryptanalysis texts show how to break those. It's possible with those methods, in the hands of an expert, if there's only ten times as much text as key. See, for example, Gaines [GAI44], Sinkov [SIN66]. * How do I send encrypted mail under UNIX? [PGP, RIPEM, PEM, ...] Here's one popular method, using the des command: cat file | compress | des private_key | uuencode | mail Meanwhile, there is a de jure Internet standard in the works called PEM (Privacy Enhanced Mail). It is described in RFCs 1421 through 1424. To join the PEM mailing list, contact pem-dev-request@tis.com. There is a beta version of PEM being tested at the time of this writing. There are also two programs available in the public domain for encrypting mail: PGP and RIPEM. Both are available by FTP. Each has its own newsgroup: alt.security.pgp and alt.security.ripem. Each has its own FAQ as well. PGP is most commonly used outside the USA since it uses the RSA algorithm without a license and RSA's patent is valid only (or at least primarily) in the USA. RIPEM is most commonly used inside the USA since it uses the RSAREF which is freely available within the USA but not available for shipment outside the USA. Since both programs use a secret key algorithm for encrypting the body of the message (PGP used IDEA; RIPEM uses DES) and RSA for encrypting the message key, they should be able to interoperate freely. Although there have been repeated calls for each to understand the other's formats and algorithm choices, no interoperation is available at this time (as far as we know). * Is the UNIX crypt command secure? No. See [REE84]. There is a program available called cbw (crypt breaker's workbench) which can be used to do ciphertext-only attacks on files encrypted with crypt. One source for CBW is [FTPCB]. * How do I use compression with encryption? A number of people have proposed doing perfect compression followed by some simple encryption method (e.g., XOR with a repeated key). Unfortunately, you can only compress perfectly if you know the exact distribution of possible inputs. For all practical purposes it's impossible to describe ``the typical English text'' beyond coarse characteristics such as single-letter frequencies. You can build up more and more sophisticated models of your inputs, but if the enemy has a slightly more accurate model, he'll be able to find some redundancy in your compressed output. Note that nearly all practical compression schemes, unless they have been designed with cryptography in mind, produce output that actually starts off with high redundancy. For example, the output of UNIX compress begins with a well-known three-byte ``magic number'' that can serve as an entering wedge for cryptanalysis. This is not to say that compression before encryption is inherently a bad idea; it just has to be done very, very carefully, and by no means removes the need for strong encryption. Compression after encryption is silly. * Is there an unbreakable cipher? Yes. The one-time pad is unbreakable; see part 4. Unfortunately the one-time pad requires secure distribution of as much key material as plaintext. Of course, a cryptosystem need not be utterly unbreakable to be useful. Rather, it needs to be strong enough to resist attacks by likely enemies for whatever length of time the data it protects is expected to remain valid. * What does ``random'' mean in cryptography? Cryptographic applications demand much more out of a pseudorandom number generator than most applications. For a source of bits to be cryptographically random, it must be computationally impossible to predict what the Nth random bit will be given complete knowledge of the algorithm or hardware generating the stream and the sequence of 0th through N-1st bits, for all N up to the lifetime of the source. A software generator (also known as pseudo-random) has the function of expanding a truly random seed to a longer string of apparently random bits. This seed must be large enough not to be guessed by the opponent. Ideally, it should also be truly random (perhaps generated by a hardware random number source). Those who have Sparcstation 1 workstations could, for example, generate random numbers using the audio input device as a source of entropy, by not connecting anything to it. For example, cat /dev/audio | compress - >foo gives a file of high entropy (not random but with much randomness in it). One can then encrypt that file using part of itself as a key, for example, to convert that seed entropy into a pseudo-random string. When looking for hardware devices to provide this entropy, it is important really to measure the entropy rather than just assume that because it looks complicated to a human, it must be "random". For example, disk operation completion times sound like they might be unpredictable (to many people) but a spinning disk is much like a clock and its output completion times are relatively low in entropy. * What is the unicity point (a.k.a. unicity distance)? See [SHA49]. The unicity distance is an approximation to that amount of ciphertext such that the sum of the real information (entropy) in the corresponding source text and encryption key equals the number of ciphertext bits used. Ciphertexts significantly longer than this can be shown probably to have a unique decipherment. This is used to back up a claim of the validity of a ciphertext-only cryptanalysis. Ciphertexts significantly shorter than this are likely to have multiple, equally valid decryptions and therefore to gain security from the opponent's difficulty choosing the correct one. Unicity distance, like all statistical or information-theoretic measures, does not make deterministic predictions but rather gives probabilistic results: namely, the minimum amount of ciphertext for which it is likely that there is only a single intelligible plaintext corresponding to the ciphertext, when all possible keys are tried for the decryption. Working cryptologists don't normally deal with unicity distance as such. Instead they directly determine the likelihood of events of interest. Let the unicity distance of a cipher be D characters. If fewer than D ciphertext characters have been intercepted, then there is not enough information to distinguish the real key from a set of possible keys. DES has a unicity distance of 17.5 characters, which is less than 3 ciphertext blocks (each block corresponds to 8 ASCII characters). This may seem alarmingly low at first, but the unicity distance gives no indication of the computational work required to find the key after approximately D characters have been intercepted. In fact, actual cryptanalysis seldom proceeds along the lines used in discussing unicity distance. (Like other measures such as key size, unicity distance is something that guarantees insecurity if it's too small, but doesn't guarantee security if it's high.) Few practical cryptosystems are absolutely impervious to analysis; all manner of characteristics might serve as entering ``wedges'' to crack some cipher messages. However, similar information-theoretic considerations are occasionally useful, for example, to determine a recommended key change interval for a particular cryptosystem. Cryptanalysts also employ a variety of statistical and information-theoretic tests to help guide the analysis in the most promising directions. Unfortunately, most literature on the application of information statistics to cryptanalysis remains classified, even the seminal 1940 work of Alan Turing (see [KOZ84]). For some insight into the possibilities, see [KUL68] and [GOO83]. * What is key management and why is it important? One of the fundamental axioms of cryptography is that the enemy is in full possession of the details of the general cryptographic system, and lacks only the specific key data employed in the encryption. (Of course, one would assume that the CIA does not make a habit of telling Mossad about its cryptosystems, but Mossad probably finds out anyway.) Repeated use of a finite amount of key provides redundancy that can eventually facilitate cryptanalytic progress. Thus, especially in modern communication systems where vast amounts of information are transferred, both parties must have not only a sound cryptosystem but also enough key material to cover the traffic. Key management refers to the distribution, authentication, and handling of keys. A publicly accessible example of modern key management technology is the STU III secure telephone unit, which for classified use employs individual coded ``Crypto Ignition Keys'' and a central Key Management Center operated by NSA. There is a hierarchy in that certain CIKs are used by authorized cryptographic control personnel to validate the issuance of individual traffic keys and to perform installation/maintenance functions, such as the reporting of lost CIKs. This should give an inkling of the extent of the key management problem. For public-key systems, there are several related issues, many having to do with ``whom do you trust?'' * Can I use pseudo-random or chaotic numbers as a key stream? Chaotic equations and fractals produce an apparent randomness from relatively compact generators. Perhaps the simplest example is a linear congruential sequence, one of the most popular types of random number generators, where there is no obvious dependence between seeds and outputs. Unfortunately the graph of any such sequence will, in a high enough dimension, show up as a regular lattice. Mathematically this lattice corresponds to structure which is notoriously easy for cryptanalysts to exploit. More complicated generators have more complicated structure, which is why they make interesting pictures--- but a cryptographically strong sequence will have no computable structure at all. See [KNU81], exercise 3.5-7; [REE77]; and [BOY89]. * What is the correct frequency list for English letters? There are three answers to this question, each slightly deeper than the one before. You can find the first answer in various books: namely, a frequency list computed directly from a certain sample of English text. Of course any such list will be ``correctly'' computed, but exactly which list you get depends on which sample was taken. The second answer is that the question doesn't make sense. What do you mean by ``English letters''? The ``English language'' is not a fixed, finite, closed object that can be exactly characterized. It has changed over time; it is different between different authors. Any particular message will have different statistics from those of the language as a whole. The third answer is that yes, no particular message is going to have exactly the same characteristics as English in general, but for all reasonable statistical uses these slight discrepancies won't matter. In fact there's an entire field called ``Bayesian statistics'' (other buzzwords are ``maximum entropy methods'' and ``maximum likelihood estimation'') which studies questions like ``What's the chance that a text with these letter frequencies is in English?'' and comes up with reasonably robust answers. So make your own list from your own samples of English text. It will be good enough for practical work, if you use it properly. * What is the Enigma? ``For a project in data security we are looking for sources of information about the German Enigma code and how it was broken by the British during WWII.'' See [WEL82], [DEA85], [KOZ84], [HOD83], [KAH91]. * How do I shuffle cards? Card shuffling is a special case of the permutation of an array of values, using a random or pseudo-random function. All possible output permutations of this process should be equally likely. To do this, you need a random function (modran(x)) which will produce a uniformly distributed random integer in the interval [0..x-1]. Given that function, you can shuffle with the following [C] code: (assuming ARRLTH is the length of array arr[] and swap() interchanges values at the two addresses given) for ( n = ARRLTH-1; n > 0 ; n-- ) swap( &arr[modran( n+1 )], &arr[n] ) ; modran(x) can not be achieved exactly with a simple (ranno() % x) since ranno()'s interval may not be divisible by x, although in most cases the error will be very small. To cover this case, one can take ranno()'s modulus mod x, call that number y, and if ranno() returns a value less than y, go back and get another ranno() value. * Can I foil S/W pirates by encrypting my CD-ROM? Someone will frequently express the desire to publish a CD-ROM with possibly multiple pieces of software, perhaps with each encrypted separately, and will want to use different keys for each user (perhaps even good for only a limited period of time) in order to avoid piracy. As far as we know, this is impossible, since there is nothing in standard PC or workstation hardware which uniquely identifies the user at the keyboard. If there were such an identification, then the CD-ROM could be encrypted with a key based in part on the one sold to the user and in part on the unique identifier. However, in this case the CD-ROM is one of a kind and that defeats the intended purpose. If the CD-ROM is to be encrypted once and then mass produced, there must be a key (or set of keys) for that encryption produced at some stage in the process. That key is useable with any copy of the CD-ROM's data. The pirate needs only to isolate that key and sell it along with the illegal copy. * Can you do automatic cryptanalysis of simple ciphers? schneier@chinet.chi.il.us (Bruce Schneier) says: AccessData of Orem, Utah sells products that break the password scheme of a number of popular Macintosh and PC software packages. Their telephone number is (801) 224-6970 No PD software has been cited but there are many papers on the subject.... Peleg, S. and Rosenfeld, A. "Breaking Substitution Ciphers Using a Relaxation Algorithm" Comm. ACM Vol. 22(11) pp 598-605 (Nov. 1979) Lucks, Michael, "A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers", Advances in Cryptology -- CRYPTO '88, Springer Lecture Notes in Computer Science, vol. 403 (The paper also contains references to earlier work on the subject.) John Carrol and Steve Martin, "The Automated Cryptanalysis of Substitution Ciphers", Cryptologia, vol X number 4, Oct 86 p193-209. John Carrol and Lynda Robbins, "Automated Cryptanalysis of Polyalphabetic Ciphers", Cryptologia, vol XI number 4, Oct 87 p193-205 Martin Kochanski, "A Survey of Data Insecurity Packages", Cryptologia, vol XI number 1, Jan 87 p1-15 Martin Kochanski, "Another Data Insecurity Package", Cryptologia, vol XII number 3, July 88, p165-177. Cryptologia Vol XIII Number 4 1989 pp 303-326. King and Bahler, "Probabilistic Relaxation in the Cryptanalysis of Simple Substitution Ciphers" Cryptologia 16(3):215-225. King and Bahler, "An Algorithmic Solution of Sequential Homophonic Ciphers". Cryptologia, April 93 (in press). R. Spillman et.al., "Use of Genetic Algorithms in Cryptanalysis of Simple Substitution Ciphers", Cryptologia, vol XVII Number 1, Jan 93 p31-44. * What is the coding system used by VCR+? One very frequently asked question in sci.crypt is about how the VCR+ codes work. The following article attempts to describe it. K. Shirriff, C. Welch, A. Kinsman, "Decoding a VCR Controller Code," Cryptologia, 16(3), July 1992, pp 227-234.
5949
From: rdippold@qualcomm.com (Ron "Asbestos" Dippold) Subject: Re: text of White House announcement and Q&As on clipper chip encryption Originator: rdippold@qualcom.qualcomm.com Nntp-Posting-Host: qualcom.qualcomm.com Organization: Qualcomm, Inc., San Diego, CA Distribution: na Lines: 12 ted@nmsu.edu (Ted Dunning) writes: >nobody seems to have noticed that the clipper chip *must* have been >under development for considerably longer than the 3 months that >clinton has been president. this is not something that choosing >choosing bush over clinton would have changed in the slightest; it has >been in the works for some time. I've got no doubts that this would probably have gone ahead if Bush was still president. What's puzzling to me are the people who are apparently amazed that Clinton is going along with it. -- Other than that, Mrs. Lincoln, how did you like the play?
5950
Organization: City University of New York From: <F36SI@CUNYVM.BITNET> Subject: UNITED NATIONS : Gettin' busy Lines: 4 Chapter 7 operation in Somlia. Almost Chapter 7 in Cambodia and Yugo. 'Bout time the UN started using force to make the peace happen. Hopefully, they will soon be doing the same with world economics.
5951
From: an030@cleveland.Freenet.Edu (Broward Horne) Subject: Re: Impeach Clinton, Reno Organization: Case Western Reserve University, Cleveland, OH (USA) Lines: 40 Reply-To: an030@cleveland.Freenet.Edu (Broward Horne) NNTP-Posting-Host: hela.ins.cwru.edu In a previous article, gs26@prism.gatech.EDU (Glenn R. Stone) says: > >Fact: Both Janet Reno and Bill Clinton have admitted responsibility, > even grief, over the deaths in Waco. > >Fact: Regardless of who started the fire, there are more than enough > things on tape to make a civil rights case against these two. > Cruel and unusual punishment (dying tortured rabbits on tape?) > come to mind. > >Fact: It is a federal felony to infringe civil rights under color of > law; where death is involved, this offense carries a penalty > of life in prison. > >Fact: Impeachment is allowable for "high crimes and misdemeanors." > Anything that's a federal felony should qualify. > >Conclusion: We have NO CHOICE, if we are an honest people, but to > impeach Mr. Clinton, and remove Reno from office. I HEARTILY agree. Now that the BATF warrant has been unsealed, it is CLEAR that Clinton and Reno supported an ILLEGAL raid. Did they not KNOW this? NO authority for a 'no-knock" raid NO authority to use helicopters. NO authority to search for a "drug lab" And, apparently, not even any authority to search for "automatic weapons". 51 days of GOVERNMENT LIES.
5952
From: sas58295@uxa.cso.uiuc.edu (Lord Soth ) Subject: MPEG for MS-DOS Organization: University of Illinois at Urbana Lines: 13 Does anyone know where I can FTP MPEG for DOS from? Thanks for any help in advance. Email is preferred but posting is fine. Scott --------------------------------------------------------------------------- | Lord Soth, Knight |||| email to --> LordSoth@uiuc |||||||| | of the Black Rose |||| NeXT to ---> sas58295@sumter.cso.uiuc.edu |||||||| | @}--'-,--}-- ||||||||||||||||||||||||||||||||||||||||||||||||||||||| |-------------------------------------------------------------------------| | I have no clue what I want to say in here so I won't say anything. | ---------------------------------------------------------------------------
5953
From: kv07@IASTATE.EDU (Warren Vonroeschlaub) Subject: Re: After 2000 years, can we say that Christian Morality is Reply-To: kv07@IASTATE.EDU (Warren Vonroeschlaub) Organization: Ministry of Silly Walks Lines: 28 In article <C5L184.Jo9@news.cso.uiuc.edu>, cobb@alexia.lis.uiuc.edu (Mike Cobb) writes: >In <1qlapk$d7v@morrow.stanford.edu> salem@pangea.Stanford.EDU (Bruce Salem) >writes: >>In article <C5JrDE.M4z@news.cso.uiuc.edu> cobb@alexia.lis.uiuc.edu (Mike >Cobb) writes: >>>Theory of Creationism: MY theistic view of the theory of creationism, (there >>>are many others) is stated in Genesis 1. In the beginning God created >>>the heavens and the earth. > >> Wonderful, now try alittle imaginative thinking! > >Huh? Imaginative thinking? What did that have to do with what I said? Would it >have been better if I said the world has existed forever and never was created >and has an endless supply of energy and there was spontaneous generation of >life from non-life? WOuld that make me all-wise, and knowing, and imaginative? No, but at least it would be a theory. | __L__ -|- ___ Warren Kurt vonRoeschlaub | | o | kv07@iastate.edu |/ `---' Iowa State University /| ___ Math Department | |___| 400 Carver Hall | |___| Ames, IA 50011 J _____
5954
From: punjabi@leland.Stanford.EDU (sanjeev punjabi) Subject: When does Fred McGriff of the Padres become a free agent? Organization: DSG, Stanford University, CA 94305, USA Lines: 1
5955
From: rogntorb@idt.unit.no (Torbj|rn Rognes) Subject: Adding int. hard disk drive to IIcx Keywords: Mac IIcx, internal, hard disk drive, SCSI Reply-To: rogntorb@idt.unit.no (Torbj|rn Rognes) Organization: Div. of CS & Telematics, Norwegian Institute of Technology Lines: 32 I haven't seen much info about how to add an extra internal disk to a mac. We would like to try it, and I wonder if someone had some good advice. We have a Mac IIcx with the original internal Quantum 40MB hard disk, and an unusable floppy drive. We also have a new spare Connor 40MB disk which we would like to use. The idea is to replace the broken floppy drive with the new hard disk, but there seems to be some problems: The internal SCSI cable and power cable inside the cx has only connectors for one single hard disk drive. If I made a ribbon cable and a power cable with three connectors each (1 for motherboard, 1 for each of the 2 disks), would it work? Is the IIcx able to supply the extra power to the extra disk? What about terminators? I suppose that i should remove the resistor packs from the disk that is closest to the motherboard, but leave them installed in the other disk. The SCSI ID jumpers should also be changed so that the new disk gets ID #1. The old one should have ID #0. It is no problem for us to remove the floppy drive, as we have an external floppy that we can use if it won't boot of the hard disk. Thank you! ---------------------------------------------------------------------- Torbj|rn Rognes Email: rogntorb@idt.unit.no
5956
From: creol@netcom.com Subject: Intel memory board for sale Article-I.D.: netcom.creolC51GrD.Ln6 Organization: Netcom Online Communications Services (408-241-9760 login: guest) Lines: 8 I have an Intel Above Board (16 bit) with 2 megs of ram that I would like to sell ASAP. Please email me offers if interested! Thanks Fred
5957
From: strnlght@netcom.com (David Sternlight) Subject: Re: An Open Letter to Mr. Clinton Organization: DSI/USCRPAC Lines: 29 In article <01050810.vkcsbl@mbeckman.mbeckman.com> mbeckman@mbeckman.com writes: > As an economist, I'm sure you can see the flaws in this logic. If the (naive) >market is flooded with proprietary, but weak, encryption, then truly strong >encryption will be unable to compete. This is true for the mass market, but not for those who need strong crypto and are willing to pay the price. After all, one can buy strong crypto today if one is willing to spend enough. Thus the concern is not economic. The issue most worth worrying about is that after the system takes hold, the government will outlaw other systems, and something voluntary will become the only system available. That is a political, not an economic issue. As a separate matter, you may be making an implied advocacy for cheap secure crypto for everyone. It's true that the Clipper chip would probably prevent that except via Clipper, but "cheap, secure crypto for everyone" is a political discussion, not an economic one, and the whole point of Clipper is to resolve that political (policy) tension between securing legitimate communications and tapping the crooks. -- David Sternlight Great care has been taken to ensure the accuracy of our information, errors and omissions excepted.
5958
From: rich.bellacera@amail.amdahl.com Subject: "Ex-Gay"? (was: HOMOSEXUALITY Fact & Fiction) Lines: 152 Return-Path: <amail.amdahl.com!rich.bellacera@juts.ccc.amdahl.com> Tony- While I honestly believe you believe you are doing a "good thing" by posting that piece of propaganda, I believe the more people believe that the more they will feel justified in their blatant persecution of gay oriented people. I have seen the film called "The Gay Agenda" and along with my church we found it to be horrifying. Not because of what was actually shown (cleaver use of editting can create any image one wants to portray), rather becaseu we are familia familiar with how widely it was actively distributed and how many naive people are actually believing the garbage found within it. The truth is that neither you nor I can fully speak for anyone who calls themself gay, but knowing as many as I do and knowing their testimonies and witnessing thier faith and life I have to say that the report you posted is a very biased report, something obviously claimed against gays as well. The truth is that unless YOU are innately gay you cannot know what harm you are causing. I speak as an abolitionist who supports affirming gay rights in our society. I do not support wild sex or any other misrepresentations perpetrated by Christian Fundamentalist extremists, but I know people who are not the sexual deviants your report paints them to be. It is no mistake that the APA removed homosexuality from it's list of mental illnesses, it is also no mistake that there are many Christians and homophobes who long to bring it back to the list. I do not feel threatened by gays, I don't understand why others are. The following is an article concerning two of the more popular ex-gay min- istries: Exodus International & Homosexuals Anonymous. THE FOUNDER OF AN "EX-GAY" SUPPORT GROUP CHOOSES HOMO OVER HETERO by Robert Pela (from Gay oriented magazine ADVOCATE) In December 1985, David Caligiuri received one of The Advocate's homophobia rewaa awards: the A Prayer A Day Keeps the Lust Away citation. As director of FREE INDEED, a national ex-gay ministry, Caligiuri was singled out for offering discontented gays and lesbians "a way out of the homosexual death-style" through prayer. "I'd like to give the award back," Caligiuri now laughs, "I'm no longer deserve it." Caligiuri's eight year involvement with the national "ex-gay" movement peaked with his founding of the Phoenix chapter of Homosexuals Anonymous (HA) as well as Free Indeed. He has since abandoned his pulpit and now says that the ex- gay movement is a fruitless effort based on deception. "There's no reality in it," he says, "I was selling a product, and my product was a lie." Headed up by national ministries like Exodus International and Courage, the organizations of the ex-gay movement rely on the tenents of born-again Christianity to convince disatisfied homosexuals -- usually young gay men who are just coming out -- that they can shed their sexuality by suppressing their sexual urges and embracing Christianity. "We offer support to people who are seeking to leave the sin of homosexuality," explains Bob Davies, director of Exodus. He ventures that "about 80% of those seeking to abandon their homo- sexuality are men." "Anybody who is involved in the ex-gay ministry is misguided and is wasting their time," says Lisa Seeley, a former "redeemed lesbian" who worked with Caligiuri as HA and appeared with him on the Sally Jessy Raphael show. "These organizations are for people who are spiritually and emotionally wounded." "It's possible to change your identity or your behavior," says sex educator Brian McNaught, author of _On Being Gay_. "But it's really impossible to change your orientation. These people are no longer calling themselves gay, but they continue to have same-sex erotic feelings." Caligiuri says he founded Free Indeed after an ominous week in 1981 when all hell broke loose in his personal life. A few days after his lover ended both their romance and their business partnership, Caligiuri was sexually assaulted by a man he picked up in a bar. "I was really drunk," he recalls, "and I went home with this guy. He tied me up and raped me. He left me tied up all night, and the next morning he raped me again." When Caligiuri was eventually freed by the attacker, he returned home to the home he shared with his ex-lover. "He had another man there with him," Caligiuri recalls. "I thought at this time, 'If this is what being gay is about, I don't want to be this way anymore." Caligiuri vowed that if he could find a way out, he would share his discovery with others. He organized an antigay contingent to demonstrate at Phoenix's gay pride parade in June 1985, and a few months later Free Indeed held its first public protest. At a meeting to promote a gay civil rights ordinance, Free Indeed members loudly blasted gays, telling them ther were sinners headed for hell. Free Indeed began receiving about a hundred telephone calls a week, thanks in part to a deceptive listing in the local yellow pages. "We were listed under Lesbian and Gay Alternative Services," Caligiuri says, "so people thought we were a gay information switchboard. People would call to find out where the local bars were, and we'd preach to them about the sins of homo- sexuality." Ruses like this are typical of the movement, Caligiuri says, adding, "They'll do anything to reach these people." "David used to go on radio and say really stupid things," recalls Peter Kelly, a counselor at Phoenix's Catholic diocese AIDS program, "like that he knew he was gay when he started wearing pastel colors." Caligiuri's family first found out about his ministry when they saw him on Raphael's syndicated talk show in 1985. "They were relieved," he recalls. "They figured that if they had to have a gay person in the family, better that I should be a 'reformed' gay person." But Caligiuri was hardly reformed. "By the time I appeared on Sally's show," "I'd started having sex with men again. Men would call our hotline and tell me about thier latest sin: sex with their pastor, sex with their father. I was horny all the time." Unable to risk going to gay bars, where he might be recognized from his numerous television appearances, Caligiuri says he "used to go to bookstores and get blowjobs." When he wasn't working the bookstores, he was sleeping with other "reformed" homosexuals. "I didn't realize it at first, but a lot of the HA leaders were having sex with one another," Caligiuri says. "We'd go to conferences in other cities, and we'd be paired up in hotel rooms. Everybody was sleeping with everybody else." By the time he appeared on 'AM Philadelphia' television show in May 1988, Caligiuri was having anonymous sex a couple times a week. When the show's host asked him if he ever "acted on temptation," his answer was a lie. Caligiuri's duplicity began to take it's toll on him, however. He was suffering from chrinic fatigue syndrome and candidiasis, a dibilitating yeast infection, and this led to his escape from the sect. "I was too sick to go to church," he explains. "The more time I spent away from those people the more I began to feel like myself. I began to remember who I used to be." Late in 1991, Caligiuri turned Free Indeed phone lines over to a local church and closed the ministry's doors. "I'd convinced myself that there is no need in the world for ex-gay people," he says. Today, Caligiuri, 31, is studying alternative spiritualities ("I'm interest- ed in belief systems that aren't judgemental."), considering romance ("But not with a CHristian!"), and searching for a new project to devote himself to. "I feel compelled to commit myself to gay causes," he says. "I want to eventually stop feeling guilty about what I did and make up for the damage I may have brought to our community." ---end article--- Caligiuri's tory is by no means unique and I have read several other articles of former leaders and founders of 'ex-gay' ministries who have said very similar th similar things. Fortuantely not all of them have left Christianity, but have come to realize that God loves them despite the attitudes of others. Some, like Chris Glaser, director of the Presbyterian "Lazarus Project" of West Hollywood Presbyterian Church have actually been working with the gay community to bring them into the sheepfold of Christ and encouraging real ethical values of sexuality within the sphere of being gay. I have also, as I said talked and become and become close friends with many who once attended such groups as "Love In Action" and others, who either once claimed to have been "reformed" or who were too honest with themselves to live a lie, no matter who was disappointed in them. Some were even encouraged to marry as a way of "sealing" their new heterosexuality, only to eventually start hitting the bars, bathhouses and bookstores, since these were usually activities under the concealment of night and one-night-stands of promiscuous behavior meant no continuous "sin" through a committed relationship. This is a horrible trap which the CHurch has dumped on the backs of the truly gay oriented people, and the very inno- cent victims in these cases are the wives and children of such marriages. Yet the church insists that there are only two options they are willing to allow gay people: 1) heterosexuality or 2) celebacy. This is sad. What is also mrtifying, is in the cases of those who cannot suppress their desires and fear for thier sanity in such a mixed up confusion that the church forces on them, they may even opt for 'suicide' or surgical dampering of the brain functions. In the past lobotomies and heavey drug suppressants were common- place. There are now becoming available more and more literature on the threat of coercive Christianity toward gays, such as Sylvia Pennington's _"Ex-Gays? There Are None_. and others. There are also a great many fact based books being written to help people trapped in this confusion such as Maury Johnston's _Gays Under Grace_, and Chris Glaser's _Come Hom!_. I seriously recommend those for people seeking help for this persecution and self-acceptance. Thank you.
5959
From: twong@civil.ubc.ca (Thomas Wong) Subject: Re: Date is stuck Organization: Dept. of Civil Engineering, U.B.C., Vancouver, B.C., Canada Lines: 15 NNTP-Posting-Host: sam.civil.ubc.ca In article <1qte10$kn5@usenet.INS.CWRU.Edu> ab245@cleveland.Freenet.Edu (Sam Latonia) writes: > >I can't imagine why someone would leave their computer on all of >the time to start with. Its like leaving your lights tv, radio >and everything in the house on all of the time to me.....Nuts We have plenty of computer labs where the computers are left on all the time. I don't see any shorter lifespan than the ones we have in the offices which does get turned off at the end of the day. In fact, some of the computers in the labs have outlived some of the same ones in the offices. But it goes both ways so can't conclude anything. Thomas.
5960
From: randy@megatek.com (Randy Davis) Subject: Re: Observation re: helmets Reply-To: randy@megatek.com Organization: Megatek Corporation, San Diego, California Lines: 38 In article <1qk5oi$d0i@sixgun.East.Sun.COM> egreen@east.sun.com writes: |In article 211353@mavenry.altcit.eskimo.com, maven@mavenry.altcit.eskimo.com (Norman Hamer) writes: |> |> The question for the day is re: passenger helmets, if you don't know for |>certain who's gonna ride with you (like say you meet them at a .... church |>meeting, yeah, that's the ticket)... What are some guidelines? Should I just |>pick up another shoei in my size to have a backup helmet (XL), or should I |>maybe get an inexpensive one of a smaller size to accomodate my likely |>passenger? | |If your primary concern is protecting the passenger in the event of a |crash, have him or her fitted for a helmet that is their size. If your |primary concern is complying with stupid helmet laws, carry a real big |spare (you can put a big or small head in a big helmet, but not in a |small one). Well, you can accomplish both goals, actually, if you have a definite physical type in mind when you go to these (cough) church meetings.. If your tastes tend to smaller, more petite (cough) churchgoers, it is more likely that they will have a smaller head, and you can safely get a medium or small helmet. This works for me, and I traded my spare large helmet with my best friend, who, at 6'9", tends to look more for women that are over 6'0", and can't usually fit into the medium size helmet he previously had... Of course, if you aren't picky what size (*cough*) churchgoers you give helpful motorcycle rides to, then Ed's advice will hopefully cover any eventuality as far as legality is concerned, and a spare handtowel in the tankbag makes acceptable padding so the passenger can see out of the viewport (rather than the padding above the viewport) in the cases of extreme mismatch. Randy Davis Email: randy@megatek.com ZX-11 #00072 Pilot {uunet!ucsd}!megatek!randy DoD #0013 "But, this one goes to *eleven*..." - Nigel Tufnel, _Spinal Tap_
5961
From: acheng@ncsa.uiuc.edu (Albert Cheng) Subject: Re: hard times investments was: (no subject given) Article-I.D.: news.C52t8L.5CH Organization: Nat'l Ctr for Supercomp App (NCSA) @ University of Illinois Lines: 10 Originator: acheng@shalom.ncsa.uiuc.edu In article <1938@tecsun1.tec.army.mil>, riggs@descartes.etl.army.mil (Bill Riggs) writes: > My mother-in-law, who grew up in Germany, doesn't believe in >money at all. She started out as a real estate developer, and now raises >horses. She keeps telling me that inflation is coming back, and to lock >in my fixed rate mortgage as low as possible. If time is really hard, can a bank selectively call in some mortgage loans early? What if the bank folds, can its creditors call in the loans?
5962
From: xanadu@seanews.akita.com (Dan Scherer) Subject: PS/2 Stuff Organization: SEANEWS - Seattle Public Access News + Mail Lines: 30 Misc. P2/2 Stuff! CARDS: (Micro Channel) (6) Arcnet, Coax, 83X9648. Net Cards. (3) Serial Adapter. P/N: 90X8459 (2) Parallel Adapters. P/N: 72X6753 (2) CoProcessor?? P/N: 83X7488 (2) Memory Expansion Option. P/N: 90X9507 Expanded Memory Adapter w/2Mb. P/N: 61X6752 Expanded memory Adapter, 0k, P/N: 90X8799 Alloy FTC500/MCA Tape adapter. DRIVES: (Hard & Floppy) 30 Mb HDD, P/N: 90X9403 Model WD-336R 60 Mb HDD, P/N: 6128282, Model WD-387T 1.44 FDD, P/N: 15F7503, EC #A79541 1.44 FDD, P/N: 15F7503, EC #88086 This is what I have aquired over the past few years in PS/2 components... I have posted the part #'s, so if you have any questions as to what a component is, you can call IBM and find out! (I have no idea!!!) Make me an offer! Trades welcome! Dan Scherer (206) 453-5215 Voice (206) 996-8350 Pager -- [] SEANEWS [] Seattle Public Access Usenet News + Mail [] +1 206 747 NEWS [] xanadu@seanews.akita.com
5963
From: str@maredsous.Eng.Sun.COM (Todd Rader) Subject: Re: Rickey Henderson Organization: Sun Lines: 6 Distribution: usa NNTP-Posting-Host: maredsous In article <1993Apr5.173500.26383@ra.msstate.edu> js1@Isis.MsState.Edu (Jiann-ming Su) writes: %I say buy out Henderson's contract and let him go bag groceries. Next %season, you'll be able to sign him for nothing. That goes for any bitching %ball player. Stay in school. You have a lot to learn.
5964
Subject: Re: Trade rumor: Montreal/Ottawa/Phillie From: <JER108@psuvm.psu.edu> Organization: Penn State University Lines: 50 In article <93095.210625MWEINTR@auvm.american.edu>, <MWEINTR@auvm.american.edu> says: > >Also sprach slegge@kean.ucs.mun.ca ... > >>TSN Sportsdesk just reported that the OTTAWA SUN has reported that >>Montreal will send 4 players + $15 million including Vin Damphousse >>and Brian Bellows to Phillidelphia, Phillie will send Eric Lindros >>to Ottawa, and Ottawa will give it's first round pick to Montreal. >> >>If this is true, it will most likely depend on whether or not Ottawa >>gets to choose 1st overall. Can Ottawa afford Lindros' salary? >> >>Personally, I can't see Philli giving up Lindros -- for anything. >>They didn't give away that much to Quebec just to trade him away >>again. Not to mention that Lindros seems to be a *huge* draw in >>Phillie -- and that he represents a successful future for the >>franchise. >> >>Ottawa may be better off taking the 4 players +$15 from Montreal >>for the pick. >> >>Stephen Legge >>SLEGGE@kean.ucs.munc.ca > >Two things: > >1. Didn't the trade deadline pass two weeks ago? > >2. The FLYERS would never ever EVER give up Lindros, simple as that. > 3. With Soderstrom and Roussel, why the hell would the Flyers want to pick up an older and slumping Roy? (BYW, I could come up with a group of players they'd trade for.... but they wouldn't be from the same team.) >Go Flyers, Cup in '94... > >Mike >--- >***Yes-Rush-Marillion-ELP-Genesis-King Crimson-Dream Theater-Beatles*** >* Mike Weintraub, aka Jvi on IRC "Courageous convictions * >* mweintr@american.edu will drag the dream * >* jedi@wave.cerf.net into existence" * >* The American University, Washington DC - Rush (NOT Limbaugh) * >***Go Philadelphia Flyers, Vancouver Canucks & Philadelphia Phillies*** John E. Runski <jer108@psuvm>
5965
From: "Calvin D. Swartzentruber" <cs6t+@andrew.cmu.edu> Subject: ATTN: Ken Smith Organization: Freshman, Electrical and Computer Engineering, Carnegie Mellon, Pittsburgh, PA Lines: 9 NNTP-Posting-Host: po3.andrew.cmu.edu In-Reply-To: <9304051540.AA03922@gumby.Altos.COM> It is model number #7033D, a 14" interlaced .28dp. BTW, if you have a number to contact the company, that would really be helpful to. Thanks for replying. I was beginning to believe that I was never going to get a reply. I posted this on the netnews bboard because the first message I sent to you was returned, and I didn't know if my second message would get to you. Calvin
5966
From: bobsarv@microsoft.com (Bob Sarver) Subject: Re: Question for those with popular morality Organization: Microsoft Corp. Distribution: usa Lines: 57 (hudson) >/These people hurt their own bodies. Why can't they hurt other peoples bodies >/too? > (me) >Because other people might not *want* to be hurt, Hudson. And hurting >them against their will is a violation of choice. /(hudson) /So. Why is someone elses will such a big deal if morality is all relative. I don't believe I ever said that morality was all relative. What I said was that I can make my mind up on my own, thank you, and that you don't have the right to tell others what to think. I think that you will find that in most moral systems, there is a respect for human life and the dignity of the person. It is all the stuff besides these points that forms the core of the disagreement between primitive moral absolutists like yourself and the rest of us. /(hudson) /Maybe (the insane lover of pain might reason) if other people experienced /enough pain, they might learn to enjoy it, too. Fine. There is still the clinical definition of crazy. And this also involves a violation of free will, because the insane lover of your little example would be inflicting pain on a non-willing subject. Try again. (hudson) >/You have to have other premises to derive this. > (me) >No, you don't. That is a patently false statement. /(hudson) /You have to have some sort of premise about choice or self-awareness. No, you do not. I demonstrated to you the example of the football team which doesn't require premises about freedom of choice or sentience/self-awareness. As I said, you are wrong, and you don't seem to know much about moral systems. If I were you, I would take David Bold's suggestion and do some reading on the subject before you try preaching about it.
5967
From: shenx@helium.gas.uug.arizona.edu (xiangxin shen ) Subject: Re: IDE Low Level Format Organization: University of Arizona, Tucson Lines: 10 In article <C5H3yL.F66@news.cso.uiuc.edu> mandel@romulus.ehs.uiuc.edu (Hector Mandel) writes: >I accidentally tried to low level format my Western Digital Caviar 280 drive. >Is there a public domain or shareware utility available that will allow >me to fix it? > >Thanks. I am no expert on this. But I am pretty sure there is no way to recover this. IDE drive has mapping information written directly on drives. When you low level format it, the information itself is gone as well, I don't think you can get it back unless you send it back to Western Digital and ask them to refurbish it for you. Jim
5968
From: timmbake@mcl.ucsb.edu (Bake Timmons) Subject: Re: Amusing atheists and agnostics Lines: 19 nancyo@fraser.sfu.ca (Nancy Patricia O'Connor) writes: >timmbake@mcl.ucsb.edu (Bake Timmons) writes: >>Rule #4: Don't mix apples with oranges. How can you say that the >>extermination by the Mongols was worse than Stalin? Khan conquered people >>unsympathetic to his cause. That was atrocious. But Stalin killed millions of >>his own people who loved and worshipped _him_ and his atheist state!! How can >>anyone be worse than that? >You're right. And David Koresh claimed to be a Christian. Yup. I can hear the _millions_ cheering for DK right now! Josef Stalin eat your heart out! :) -- Bake Timmons, III -- "...there's nothing higher, stronger, more wholesome and more useful in life than some good memory..." -- Alyosha in Brothers Karamazov (Dostoevsky)
5969
From: HoffmanE@space1.spacenet.jhuapl.edu (Hoffman, Eric J.) Subject: Re: Drag free satellites Organization: UTexas Mail-to-News Gateway Lines: 37 NNTP-Posting-Host: cs.utexas.edu In article <1raee7$b8s@access.digex.net> prb@access.digex.com (Pat) writes: >In article <23APR199317325771@kelvin.jpl.nasa.gov> baalke@kelvin.jpl.nasa.gov (Ron Baalke) writes: >> In answer >>to a question from Hawking, Chahine described a proposed >>drag-free satellite, but confirmed that at this point, "it's only >>a concept." > >SO what's a drag free satellite? coated with WD-40? TRIAD, the first drag-free satellite, was designed and built by the Johns Hopkins Applied Physics Laboratory and launched 2 Sept 1972. The satellite was in three sections separated by two booms. The central section housed the DISCOS Disturbance Compensation System, which consisted of a proof mass of special non-magnetic alloy housed within a spherical cavity. The proof mass flew a true gravitational orbit, free from drag and radiation pressure. Teflon microthrusters kept the body of the satellite centered around the proof mass, thereby flying the entire satellite drag free. TRIAD was one of the APL-designed Navy Navigation Satellites. The 2nd-generation operational navigation satellites flying today (NOVA) use a single-axis version of DISCOS. TRIAD was also the sixth APL satellite to be powered by an RTG (APL flew the first nuclear power supply in space, in 1961). Further info on TRIAD, DISCOS, etc. can be found in "Spacecraft Design Innovations in the APL Space Department," Johns Hopkins APL Technical Digest, Vol. 13, No. 1 (1992). --Eric Hoffman
5970
cs.utexas.edu!uunet!olivea!sgigate!sgiblab!adagio.panasonic.com!nntp-server.caltech.edu!bdunn Subject: Re: The wrong and the right. From: bdunn@cco.caltech.edu (Brendan Dunn) Organization: California Institute of Technology, Pasadena NNTP-Posting-Host: punisher.caltech.edu Lines: 25 In article <93090.141001E62763@TRMETU.BITNET> <E62763@TRMETU.BITNET> writes: >Hi.I'm a Turkish guy who had tried atheism,satenism and buddism at some instant >s of hislife.Finally I decided on Islambecause of many facts which I intend to > write here.From my point of view,you atheists are people who has dropped to a >deep,dark well and thinking the only reality is the dusty walls of the well.But > if you had looked a little bit upward you would see the blue skies.You'dsee t >he truth but you close your eyes.Allah is the only GOD and Mohammed is his mess > ager.now,let's generate some entropy in means of theology and thermodynamics.W >hat's your point of view to the problem of the ''FIRST KISS''?That is,the first > spark which was generated for the formation of the universe.Has it formed by i >tself?You are bothering yourselves with the Big Bang but where is the first spa >rk?Please think a bit.Think and return to the only reality of the universe:ISLA >M| Uh oh. This looks a bit too much like Bobby's "Atheism Is False" stuff. Are we really going to have to go through this again? Maybe the universe is cyclical! :) :( --Brendan Dunn
5971
From: k4bnc@cbnewsh.cb.att.com (john.a.siegel) Subject: Can't set COM4 Organization: AT&T Distribution: usa Keywords: G2K Lines: 15 I have been unable to get COM 4 to work - diagnostic programs such as msd show nothing installed. I think the software options are OK - is there a known hardware conflict and/or workaround for this problemand CD ROM System is a G2K 486DX2/66 tower with ATI video card Ports are set as follows On board COMa = COM1 IRQ4 to external device Internal modem = COM 3 IRQ5 DFIO port card primary port = COM 2 IRQ3 mouse On board COM B = COM 4 IRQ 9 <--- DOES NOT WORK I have run this from a boot disk with only command.com to eliminate softwar Any suggestions before I call technical support? John Siegel k4bnc@cbnewsh.att.com jas@hrollie.hr.att.com
5972
From: rwag@gwl.com (Rodger Wagner) Subject: Running C++ EXE under Windows 3.1 Reply-To: rwag@gwl.com Organization: The Great-West Life Assurance Company. X-Disclaimer: The views expressed in this message are those of an individual at The Great-West Life Assurance Company and do not necessarily reflect those of the company. Lines: 17 Preface: I am a novice user at best to the Windows environment. I am trying to execute a MS C++ 7.0 executable program which accesses a Btrieve database to build an ASCII file. When I execute it under windows the screen goes blank and my PC locks up. The only way for me to return is to reset the machine. Does anyone have any insight on what I may have to do in order for the program to correctly under windows? (By the way it runs fine in DOS 5.0) System: Gateway 486/DX250 ATI Graphics Ultra Card 640x480 Any help would be greatly appreciated. Rodger
5973
Subject: Re: Picking up cable tv with an aerial. From: ganter@ifi.unibas.ch (Robert Ganter) Organization: Institut fuer Informatik Nntp-Posting-Host: schroeder.ifi.unibas.ch Lines: 11 Great, the first advantage of cheap coax, I've ever heard. Cheers Robert (HB9NBY) -- Robert Ganter /------------\ Universitaet Basel | I am a fan | Institut fuer Informatik | of my plan | Basel/Switzerland \------------/ ganter@ifi.unibas.ch amateurradio: HB9NBY packet: HB9NBY@HB9EAS.CHE.EU
5974
From: salaris@niblick.ecn.purdue.edu (Rrrrrrrrrrrrrrrabbits) Subject: Re: Satan kicked out of heaven: Biblical? Organization: Purdue University Engineering Computer Network Lines: 23 In article <May.7.01.09.04.1993.14501@athos.rutgers.edu>, easteee@wkuvx1.bitnet writes: > Hello all, > I have a question about Satan. I was taught a long time ago > that Satan was really an angel of God and was kicked out of heaven > because he challenged God's authority. The problem is, I cannot > find this in the Bible. Is it in the Bible? If not, where did it > originate? > Satan was one of God's highest ranking angels, like Uriel, Raphael, Michael, and Gabriel. In fact, his name was Satanel. He did challenge God's authority and got kicked out of heaven. A lot of the mythology of Satan (he lost the -el suffix when he fell) comes from the Book of Enoch and is not found in the bible. Read the Book of Enoch, available thru bookstores, or get the book called "Angels: an endangered species" (I think). -- Steven C. Salaris We're...a lot more dangerous than 2 Live Crew salaris@carcs1.wustl.edu and their stupid use of foul language because we have ideas. We have a philosophy. Geoff Tate -- Queensryche
5975
From: sdbsd5@cislabs.pitt.edu (Stephen D Brener) Subject: Japanese for Scientists and Engineers Organization: University of Pittsburgh Lines: 101 INTENSIVE JAPANESE AT THE UNIVERSITY OF PITTSBURGH THIS SUMMER ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ The University of Pittsburgh is offering two intensive Japanese language courses this summer. Both courses, Intensive Elementary Japanese and Intensive Intermediate Japanese, are ten week, ten credit courses each equivalent to one full year of Japanese language study. They begin June 7 and end August 13. The courses meet five days per week, five hours per day. There is a flat rate tuition charge of $1600 per course. Fellowships available for science and engineering students. Contact Steven Brener, Program Manager of the Japanese Science and Technology Management Program, at the University of Pittsburgh at the number or address below. ALL INTERESTED INDIVIDUALS ARE ENCOURAGED TO APPLY, THIS IS NOT LIMITED TO UNIVERSITY STUDENTS. ####################################################################### ################# New Program Announcement ######################## ####################################################################### JAPANESE SCIENCE AND TECHNOLOGY MANAGEMENT PROGRAM The Japanese Science and Technology Management Program (JSTMP) is a new program jointly developed by the University of Pittsbugh and Carnegie Mellon University. Students and professionals in the engineering and scientific communitites are encouraged to apply for classes commencing in June 1993 and January 1994. PROGRAM OBJECTIVES The program intends to promote technology transfer between Japan and the United States. It is also designed to let scientists, engineers, and managers experience how the Japanese proceed with technological development. This is facilitated by extended internships in Japanese research facilities and laboratories that provide participants with the opportunity to develop long-term professional relationships with their Japanese counterparts. PROGRAM DESIGN To fulfill the objectives of the program, participants will be required to develop advanced language capability and a deep understanding of Japan and its culture. Correspondingly, JSTMP consists of three major components: 1. TRAINING IN THE JAPANESE LANGUAGE Several Japanese language courses will be offered, including intensive courses designed to expedite language preparation for scientists and engineers in a relatively short time. 2. EDUCATION IN JAPANESE BUSINESS AND SOCIAL CULTURE A particular enphasis is placed on attaining a deep understanding of the cultural and educational basis of Japanese management approaches in manufacturing and information technology. Courses will be available in a variety of departments throughout both universities including Anthropology, Sociology, History, and Political Science. Moreover, seminars and colloquiums will be conducted. Further, a field trip to Japanese manufacturing or research facilities in the United States will be scheduled. 3. AN INTERNSHIP OR A STUDY MISSION IN JAPAN Upon completion of their language and cultural training at PITT and CMU, participants will have the opportunity to go to Japan and observe, and participate in the management of technology. Internships in Japan will generally run for one year; however, shorter ones are possible. FELLOWSHIPS COVERING TUITION FOR LANGUAGE AND CULTURE COURSES, AS WELL AS STIPENDS FOR LIVING EXPENSES ARE AVAILABLE. FOR MORE INFORMATION AND APPLICATION MATERIALS CONTACT STEVEN BRENER SUSIE BROWN JSTMP Carnegie Mellon University, GSIA University of Pittsburgh Pittsburgh, PA 15213-3890 4E25 Forbes Quadrangle Telephone: (412) 268-7806 Pittsburgh, PA 15260 FAX: (412) 268-8163 Telephone: (412) 648-7414 FAX: (412) 648-2199 ############################################################################ ############################################################################ Interested individuals, companies and institutions should respond by phone or mail. Please do not inquire via e-mail. Please note that this is directed at grads and professionals, however, advanced undergrads will be considered. Further, funding is resticted to US citizens and permanent residents of the US. Steve Brener
5976
From: marc@tanda.isis.org (Marc Thibault) Subject: Re: Hard drive security for FBI targets Reply-To: marc@tanda.isis.org Distribution: world Organization: Thibault & Friends Lines: 45 1. Do a straight encryption of your keyrings and put the results with misleading names somewhere they won't be noticed (eg. in the \windows directory; nobody knows what half those files are). 2. Do a straight encryption of a .BAT file that will decrypt the keyrings to RAMdisk and will set PGPPATH to point at it. 3. Set up another .BAT file to decrypt and execute the first (again on RAM disk). Have it take the name of the target file as an argument so that there is no link between this file and the (non-existent) batch file referred to by the rest of the system. Comment it so it looks like a test script for fooling around with PGP. Set PGPPATH to the PGP directory. 4. Leave the original keyrings that came with PGP in the directory with PGP; a good indication that you are playing with, but haven't made serious use of PGP. Add a set of keys with your name and a really simple passphrase. Never use it, or use it as your widely published key for low-security e-mail. 5. When needed, run the second .BAT file. Make sure all intermediate and plainfiles are generated on RAMdisk. 6. When you hear the concussion grenade, hit the power switch. Cheers, Marc --- Marc Thibault | CIS:71441,2226 | Put another log marc@tanda.isis.org | NC FreeNet: aa185 | on the fire. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.0 mQBNAiqxYTkAAAECALfeHYp0yC80s1ScFvJSpj5eSCAO+hihtneFrrn+vuEcSavh AAUwpIUGyV2N8n+lFTPnnLc42Ms+c8PJUPYKVI8ABRG0I01hcmMgVGhpYmF1bHQg PG1hcmNAdGFuZGEuaXNpcy5vcmc+ =HLnv -----END PGP PUBLIC KEY BLOCK-----
5977
From: reimert@anthrax.etdesg.trw.com (Scott P. Reimert) Subject: Re: win/NT file systems Organization: TRW Inc., Redondo Beach, CA Lines: 26 In article <1993Apr26.103230.10618@spider.co.uk> keiths@spider.co.uk (Keith Smith) writes: >OK will some one out there tell me why / how DOS 5 >can read (I havn't tried writing in case it breaks something) >the Win/NT NTFS file system. >I thought NTFS was supposed to be better than the FAT system > >keith DOS 5.0/6.0 cannot read the NTFS file system, although the NTFS file system can read the FAT file system of DOS. I have WindowsNT on a seperate partition on my machine at home, and I can read my DOS disks from Windows NT, but not vice-versa. As far as the robustness of the file system, it seems to be very fast, and I have yet to have a single problem with it. That doesn't prove it's better than the FAT system though. Read the book 'Inside Windows NT,' it will give you all the info you're looking for. Scott -- ------------------------------------------------------------------------------- Scott Reimert \ reimert@mamacass.etdesg.trw.com /Standard disclaimer: Redondo Beach, CA \______________________________________/"Blah blah blah ... " __________________|Always store beer in a cool dark place|_____________________
5978
From: rlglende@netcom.com (Robert Lewis Glendenning) Subject: Re: Estimating Wiretap Costs/Benefits Organization: Netcom - Online Communication Services (408 241-9760 guest) Lines: 13 I am most embarassed that my irrate, intemperate post is still circulating. I have been chided by experts for my behavior. I now agree with all of them, although some were no more restrained in their speech than I was 8) I have apologized to Robin Hanson. Lew -- Lew Glendenning rlglende@netcom.com "Perspective is worth 80 IQ points." Niels Bohr (or somebody like that).
5979
From: Rob Earhart <earhart+@CMU.EDU> Subject: Re: Mix GL with X (Xlib,Xt,mwm) Organization: Pittsburgh Supercomputing Center Lines: 15 NNTP-Posting-Host: po3.andrew.cmu.edu In-Reply-To: <9304191540.AA09727@sparc1.jade.com> Yes, it's possible... in fact, there's some gl widget code in /usr/lpp/GL somewhere... (it's named Glib.c; my IBM's down right now though, so I can't find the exact location :) WARNING: this code feels quite bogus. It does things like calling noport() before winopen(), and then extracting an X window id from it anyway. It worked just fine under aix 3.1; I spent last weekend trying to port it to 3.2 (gl under 3.2 doesn't seem to like it), and it's turning into a Hard Job. Check out your "info" pages; it has some pretty good documentation on whan you can and can't do when mixing gl and X, and how to go about doing so. )Rob
5980
From: neath@brazil.psych.purdue.edu (Ian Neath) Subject: Re: Thumbs up to ESPN Organization: Purdue University Lines: 13 jca2@cec1.wustl.edu (Joseph Charles Achkar) writes: > It was nice to see ESPN show game 1 between the Wings and Leafs since > the Cubs and Astros got rained out. Instead of showing another baseball > game, they decided on the Stanley Cup Playoffs. A classy move by ESPN. Not in Indiana: they showed a tape-delay of Chicago v Boston, because WGN had the rainout of the cubs. So WGN showed reruns of Hitchcock. No hockey (at least in this part of the state). Go Aeros! -- Ian Neath | There are four kinds of people in this world: neath@psych.purdue.edu | cretins, fools, morons and lunatics - U. Eco
5981
From: ldo@waikato.ac.nz (Lawrence D'Oliveiro, Waikato University) Subject: Re: Interesting ADB behaviour on C650 Organization: University of Waikato, Hamilton, New Zealand Lines: 20 In article <1993Apr15.181440.15490@waikato.ac.nz>, I said: > I know that plugging and unplugging ADB devices with the power on is "not > supported", and you can hit problems if you have multiple devices with > clashing addresses, and all that. I've had a couple of e-mail responses from people who seem to believe that this sort of thing is not only unsupported, it is downright dangerous. I have heard of no such warnings from anybody at Apple. Just to be sure, I asked a couple of our technicians, one of whom has been servicing Macs for years. There is *no* danger of damaging logic boards by plugging and unplugging ADB devices with the power on. SCSI, yes, ADB, no... Lawrence D'Oliveiro fone: +64-7-856-2889 Computer Services Dept fax: +64-7-838-4066 University of Waikato electric mail: ldo@waikato.ac.nz Hamilton, New Zealand 37^ 47' 26" S, 175^ 19' 7" E, GMT+12:00
5982
From: maler@vercors.imag.fr (Oded Maler) Subject: Re: Unconventional peace proposal Nntp-Posting-Host: pelvoux Organization: IMAG, University of Grenoble, France Lines: 43 In article <1483500348@igc.apc.org>, cpr@igc.apc.org (Center for Policy Research) writes: |> |> From: Center for Policy Research <cpr> |> Subject: Unconventional peace proposal |> |> |> A unconventional proposal for peace in the Middle-East. |> ---------------------------------------------------------- by |> Elias Davidsson |> |> 1. A Fund should be established which would disburse grants |> for each child born to a couple where one partner is Israeli-Jew |> and the other Palestinian-Arab. |> |> 2. To be entitled for a grant, a couple will have to prove |> that one of the partners possesses or is entitled to Israeli |> citizenship under the Law of Return and the other partner, |> although born in areas under current Isreali control, is not |> entitled to such citizenship under the Law of Return. |> |> 3. For the first child, the grant will amount to $18.000. For |> the second the third child, $12.000 for each child. For each |> subsequent child, the grant will amount to $6.000 for each child. ... |> I would be thankful for critical comments to the above proposal as |> well for any dissemination of this proposal for meaningful |> discussion and enrichment. |> |> Elias Davidsson Post Box 1760 121 Reykjavik, ICELAND Maybe I'm a bit old-fashioned, but have you heard about something called Love? It used to play some role in people's considerations for getting married. Of course I know some people who married fictitiously in order to get a green card, but making a common child for 18,000$? The power of AA is limited. Your proposal is indeed unconventional. =============================================================== Oded Maler, LGI-IMAG, Bat D, B.P. 53x, 38041 Grenoble, France Phone: 76635846 Fax: 76446675 e-mail: maler@imag.fr ===============================================================
5983
From: oaf@zurich.ai.mit.edu (Oded Feingold) Subject: Re: NEWS YOU WILL MISS, Apr 15 Organization: M.I.T. Artificial Intelligence Lab. Lines: 18 Distribution: world Reply-To: oaf@zurich.ai.mit.edu NNTP-Posting-Host: klosters.ai.mit.edu In-reply-to: arf@genesis.MCS.COM's message of 15 Apr 1993 22:51:03 -0500 Sorry, ARF - you dog, That news was suppressed because the Israeli national volleyball team repeatedly spiked it. Let this be a lesson to others not to invoke the wrath of sports nuts. (Brits lead the way in this regard, with ~220 casualties in the last 2 years.) Anyway, Yigal would never sue. His life is (presumably) so pristine that its most intimate details could be revealed without harm to anyone. Might even be good instruction for some people I can think of. Me, I _would_ sue! I hate the way sports dominates the media. Anyway, the last 3 ADL agents watching me die of boredom before filing their reports. I've damaged their Atlanta operation something fierce.
5984
From: sera@zuma.UUCP (Serdar Argic) Subject: Nazi Armenians were of service to Germans in Arab countries as well. Reply-To: sera@zuma.UUCP (Serdar Argic) Distribution: world Lines: 40 In article <1993Apr26.175246.24412@colorado.edu> perlman@qso.Colorado.EDU (Eric S. Perlman) writes: >This has been discussed before, by several people, on this net. The >statement is attributable either to Hajj Amin al-Husseini, former Grand >Mufti of Jerusalem - and the leader of the Palestinian death squads >during the 1948 war, or to one of his chief henchmen. Let us not forget the Nazi Armenians. Nazi Armenians were of service to Germans in Arab countries as well. As Uzun put it, one well-known case which received a lot of media-coverage involved two Nazi Armenian agents which were dropped over Syria by Italian war planes. The mission of the agents was to mingle among the Armenian population in Syria and to acquire relevant information for the German Wehrmacht on the allied forces in the area.[1] Nazi Armenians also helped German propaganda efforts in Arab countries designed to promote pro-Nazi sentiments among the French- and British-ruled Arab populations. Beirut had traditionally been strong-hold of the Nazi Armenians and until very recently it was the center of international Armenian terrorism. In Russia General Dro (the Butcher), the architect of the Turkish genocide in WWI, was working closely with the German Secret Service. He entered the war zone with his own men and acquired important intelligence about the Soviets. His experience with the Turkish genocide in x-Soviet Armenia made him an invaluable source for the Germans.[2] [1] Meyer, Berkian, ibid., p. 150. [2] Meyer, Berkian, ibid., p. 113; Patrick von zur Muehlen, ibid., p. 84. Serdar Argic 'We closed the roads and mountain passes that might serve as ways of escape for the Turks and then proceeded in the work of extermination.' (Ohanus Appressian - 1919) 'In Soviet Armenia today there no longer exists a single Turkish soul.' (Sahak Melkonian - 1920)
5985
From: mini@csd4.csd.uwm.edu (Padmini Srivathsa) Subject: WANTED : Info on Image Databases Organization: Computing Services Division, University of Wisconsin - Milwaukee Lines: 15 Distribution: world NNTP-Posting-Host: 129.89.7.4 Originator: mini@csd4.csd.uwm.edu Guess the subject says it all. I would like references to any introductory material on Image Databases. Please send any pointers to mini@point.cs.uwm.edu Thanx in advance! -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -< MINI >- mini@point.cs.uwm.edu | mini@csd4.csd.uwm.edu ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
5986
From: dsegard@nyx.cs.du.edu (Daniel Segard) Subject: Re: Easter: what's in a name? (was Re: New Testament Double Stan Organization: Nyx, Public Access Unix at U. of Denver Math/CS dept. Lines: 98 seanna@bnr.ca (Seanna (S.M.) Watson) asks: > What is the objection to celebration of Easter? The objection naturally is in the way in which you phrase it. Easter (or Eashtar or Ishtar or Ishtarti or other spellings) is the pagan whore goddess of fertility. Therefore, your question to me is "what is the objection to celebration of the pagan whore goddess?" When phrased that way I suspect (or at least I would HOPE) that it becomes immeadiately apparent what my objection to "celebrating" her would be. > It is celebration of the resurrection of Jesus. No, you are thinking perhaps of "Ressurection Sunday" I think. (Though I'm not too crazy about the word "Sunday", but I certainly like this phrasing much better than envoking the name of the whore goddess.) For that matter, stay Biblical and call it Omar Rasheet (The Feast of First Fruits). Torah commands that this be observed on the day following the Sabbath of Passover week. (Sunday by any other name in modern parlance.) Why is there so much objection to observing the Resurrection on the 1st day of the week on which it actually occured? Why jump it all over the calendar the way Easter does? Why not just go with the Sunday following Passover the way the Bible has it? Why seek after unbiblical methods? > I don't recall a command in Scripture for us to celebrate > the resurrection, but it is the sole and only reason that > we are Christians--how could we not celebrate it? So what does this question have to do with Easter (the whore goddess)? I am all for celebrating the Resurrection. Just keep that whore out of the discussion. > If it is only the name which is a problem, I suggest that if > we are too concerned about etymology, there are a lot of > words we are going to have to drop. (As an aside, some > terminally PC people here in Ottawa want dictionaries to be > altered so that there are no negative definitions associated > with the word _black_, so as not to offend people of colour. Yes, I have heard of your newspapers speaking of the need to repave streets with "Afro-Canadiantop". <grin> (I still think "blacktop" sounds better though.) > As a short person, I hope they will also remove the definition > "curt or surly" associated with my physical description.) Fine by me. And while we are at it, the left-handed people are both "sinister" and "gauche" so we probably will have some objections from that quarter as well. > In Quebec French, the word for the celebration of the > resurrection is "Pa^ques"--this is etymologically related > to Pesach (Passover) and the pascal lamb. So is the > French Canadian (mostly Roman Catholic) celebration better > because it uses the right name? Yes, that sounds much better to me. Is there anyone out there would thinks that phrasing sounds worse? > So from this I infer that there are different rules for > Christians of Jewish descent? What happened to "there is > neither Jew nor Greek, slave nor free, male nor female, for > all are one in Christ Jesus"? Read the letter to Philemon. Now tell me, was Philemon's "slave" returned to him? Were there different rules upon the slave than upon Philemon? How about male and female? Are there different "rules" that apply to them as well? Or if there is no more "male and female" can Adam and Steve get married to each other in your congregation? Yes, there are differences in form and function. But the way we come to Salvation in Messiah remains the same no matter what our position in life. --------------------------------------- [I am in general not in favor of continuing this discussion, as it seems repetitive, but this particular point is one that I believe is new -- the objection is not to having a holiday but to its name. I'd like to suggest that people think very carefully about this argument. Words often change their meaning over time. The days of the week are of course originally based on pagan gods. Some Christians prefer to refer to "first day", "second day", etc. However the majority of Christians have not been persuaded. The question seems to be whether it makes any difference what the dictionary shows as the derivation of a word, if what people mean by it and think when they use it is different. Indeed I'd like to suggest that postings like this could themselves be dangerous. Suppose people in general use Easter to mean the celebration of Christ's resurrection. Postings trying to convince them that they really mean a celebration in honor of some godess run the risk of creating exactly the situation that they claim to oppose. They are doing their best to *create* a linkage in people's minds between their celebration and the pagan goddess. It's not clear that this is a healthy thing. --clh]
5987
From: jra@law7.DaytonOH.NCR.COM (John Ackermann x 2966) Subject: Single chip receiver for FSK? Reply-To: jra@law7.DaytonOH.NCR.COM (John Ackermann x 2966) Organization: NCR Corporation -- Law Department Lines: 21 My next project is to come up with an IF/detector module for fast -- 112 to 250 kB/sec -- packet radio use. No fancy modulation scheme, just wide FSK for use at 902 or 1296 MHz. I'm a bit familiar with the Motorola 3362 chip, but I wonder if there are newer designs that might work at higher input frequencies. My goal is to come up with an inexpensive design for a receiver "back end" with IF input on one end and an FSK demondulator on the other. I'm particularly interested in ways to use a higher IF than 10.7 -- do any current chips work up to, say 150MHz with internal downconversion so a normal IF filter can be used? Any suggestions? John -- John R. Ackermann, Jr. Law Department, NCR Corporation, Dayton, Ohio (513) 445-2966 John.Ackermann@daytonoh.ncr.com Packet Radio: ag9v@n8acv.oh tcp/ip: ag9v@ag9v.ampr [44.70.12.232]
5988
From: auerbach@batman.bmd.trw.com Subject: Re: ATF BURNS DIVIDIAN RANCH! NO SURVIVORS!!! Lines: 23 In article <1r19tp$5em@bigboote.WPI.EDU>, mfrhein@wpi.WPI.EDU (Michael Frederick Rhein) writes: > In article <93109.13404334AEJ7D@CMUVM.BITNET> <34AEJ7D@CMUVM.BITNET> writes: >>I will be surprised if this post makes it past the censors, >>but here goes: >> > In short Mr. Gorman (I am assuming Mr. as a title because I don't think a >woman would be stupid enough to make this post) I don't know what episode of CNN you ^^^^^ What an incrediblt sexist remark! Come now, Mike, what ever possessed you to make such a un-PC remark? I hope all women out there reading this are as incensed as I am. Remember, WOMAN ARE JUST AS GOOD AS MEN!!!! Women stand up for your right to be just as stupid as men. In fact, insist on every oppurtunity to be even more stupid than men! You've got the right, use it! Hey, it's a slow afternoon and I really don't want to get back to that report...;) BTW: mega-smileys for the humor impaired... Karl
5989
From: metatron!joe@dogface.austin.tx.us (Joe Zitt) Subject: Re: Fighting the Clipper Initiative Organization: Metatron Press / Human Systems Performance Group, Austin, TX X-Newsreader: rusnews v1.01 Lines: 17 steve-b@access.digex.com (Steve Brinich) writes: > >As a flaming libertarian paranoid extremist (:-), I'at a loss for > >specific objections that don't sound frighteningly technical. > > The idea that foisting the Cripple Chip standard on US manufacturers would > result in saying "Sayonara" to yet another high-tech market isn't technical, > isn't in the least difficult to understand, and plays on a concern lots of > people are worried about already.... > > Could you expand on this? I have a feeling you're right, but I don't quite understand. -- "You could be an ocarina salesman going | Metatron Press | Austin, Texas! from door to door..." -- Laurie Anderson | Human Systems Performance Group
5990
From: matthew@alchemy.TN.Cornell.EDU (Matthew Kleinmann) Subject: Is a 2 headed Sun 3/60 possible (cgfour0/bwtwo0) Organization: Alchemy International Lines: 12 Distribution: world NNTP-Posting-Host: alchemy.tn.cornell.edu I have a Sun 3/60 that has a mono framebuffer (bwtwo0 ?) built on the motherboard. The same system also has a cgfour (cgfour0 and bwtwo1 ?) daughterboard. I have been using this system with a color monitor having a color "front" screen from the cgfour, and a mono "back" screen from the bwtwo1, both on the same tube. I recentley picked up a 1600 x 1280 Sun mono monitor, and I would like to make a two headed system with the cgfour0 and the bwtwo0. I do not care if I loose the "back" screen on the color tube from the bwtwo1. After looking through the Xsun man page I am not sure if this is possible. Has anybody sucessfuly done this before? --Matthew
5991
From: huot@cray.com (Tom Huot) Subject: Re: Goodbye, good riddance, get lost 'Stars Lines: 20 Nntp-Posting-Host: pittpa.cray.com Organization: Cray Research Inc. X-Newsreader: TIN [version 1.1 PL8] Stephen Lawrence (s4lawren@sms.business.uwo.ca) wrote: : Goodbye Minnesota,...you never earned the right to have an NHL : franchise in the first place! : Hope you enjoy your Twin city wide mania for HIGH SCHOOL HOCKEY : (hey, by the way my old pee wee team is having a reunion in Regina, care : to come up and film the event?) : Yee haa Golden Gophers : Whatta weird town!!!!! : s4lawren@sms.business.uwo.ca (Stephen Lawrence) : Western Business School -- London, Ontario This is the second posting of this kind from an idiot at a business school in Canada. What is your problem up there anyway? Is this what they teach you in business school in Canada? -- _____________________________________________________________________________ Tom Huot huot@cray.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
5992
From: draper@gnd1.wtp.gtefsd.com (PAM DRAPER) Subject: Any info. on Vasomotor Rhinitis Organization: GTE Government Systems, Federal Systems Division, Chantilly, VA Lines: 20 Distribution: world Reply-To: draper@gnd1.wtp.gtefsd.com NNTP-Posting-Host: gnd1.wtp.gtefsd.com News-Software: VAX/VMS VNEWS 1.3-4 I recently attended an allery seminar. Steroid Nasal sprays were discussed. Afterward on a one-on-one basis, I asked the speaker what if none of the Vancanese, Beconase, Nasalide, Nasalcort, or Nasalchrom work nor do any oral decongestants work. She replied that she saw an article on Vasomotor Rhinitis. That this is not an allergic reaction and that nothing other than the Afrin's and such would work. (Which in my case is true). I want to find out as much as possible about this, since I am going to see my allergist in May and want to be armed to the hilt with information; since nothing he has done with me has helped me at all and I have had no relief for 14 months. Please respond if you know anything about this and/or please let me know what articles might be helpful that I could look up in the library.
5993
From: cramer@optilink.COM (Clayton Cramer) Subject: Re: The Role of the National News Media in Inflaming Passions Organization: Optilink Corporation, Petaluma, CA Lines: 17 In article <C5L780.Apu@murdoch.acc.Virginia.EDU>, gsh7w@fermi.clas.Virginia.EDU (Greg Hennessy) writes: > Kaldis writes: > #The fact that she was wearing a miniskirt with no underwear was > #presented as evidence that she was a prostitute, and the court > #apparently found this compelling. > > Ah, I know women who wear miniskirts without wearing underwear, and > they are not prostitutes. Do they have a history of working in massage parlors, and telling co-workers there that they are prostitutes? Do they frequent truck stop parking lots at 4:00 AM, without ID on any sort? > -Greg Hennessy, University of Virginia -- Clayton E. Cramer {uunet,pyramid}!optilink!cramer My opinions, all mine! Relations between people to be by mutual consent, or not at all.
5994
From: andrew@idacom.hp.com (Andrew Scott) Subject: USENET Playoff Pool (IMPORTANT) Organization: IDACOM, A division of Hewlett-Packard Lines: 15 I got back from my trip to discover that my email spool file got blown away. I am missing all the playoff pool entries sent between April 5 and April 17. It looks like about 200 entries got lost. *Sigh*. Therefore, I would like to ask each person that sent me a team to resend it ASAP. I am relying on your honesty to not make changes after the deadline today. Thanks in advance, and I apologize for the problem. -- Andrew Scott | andrew@idacom.hp.com HP IDACOM Telecom Operation | (403) 462-0666 ext. 253 During the Roman Era, 28 was considered old...
5995
From: tony@morgan.demon.co.uk (Tony Kidson) Subject: Re: What is it with Cats and Dogs ???! Distribution: world Organization: The Modem Palace Reply-To: tony@morgan.demon.co.uk X-Newsreader: Simple NEWS 1.90 (ka9q DIS 1.21) Lines: 21 In article <1qk3mqINN72e@emory.mathcs.emory.edu> gnome@pd.org writes: >james.bessette (jimbes@cbnewsj.cb.att.com) wrote: >>In article <6130328@hplsla.hp.com> kens@hplsla.hp.com (Ken Snyder) writes: >>Ask the breeder why they also chase BMWs also. > >Cam chain. > In that case why do they chase ST1100s & Goldwings? Tony +---------------+------------------------------+-------------------------+ |Tony Kidson | ** PGP 2.2 Key by request ** |Voice +44 81 466 5127 | |Morgan Towers, | The Cat has had to move now |E-Mail(in order) | |Morgan Road, | as I've had to take the top |tony@morgan.demon.co.uk | |Bromley, | off of the machine. |tny@cix.compulink.co.uk | |England BR1 3QE|Honda ST1100 -=<*>=- DoD# 0801|100024.301@compuserve.com| +---------------+------------------------------+-------------------------+
5996
From: ray@ole.cdac.com (Ray Berry) Subject: Re: Hard drive security for FBI targets Organization: Cascade Design Automation Lines: 32 rja14@cl.cam.ac.uk (Ross Anderson) writes: >In article <1993Apr2.050451.7866@ucsu.Colorado.EDU>, cuffell@spot.Colorado.EDU >(Tim Cuffel) writes: >This suggests a new PC security product design approach - first fill the hard >drive with 50% random files and 50% files encrypted under a number of known >keys. Then whenever a new secret file is created, you delete a random file and >replace it with real encrypted data. New non-secret files are encrypted under >a known key. Better yet, instead of thrashing around on the DOS file system, take it a step further. Write yourself a minimal "file system" program that is used to create/delete files, en/decrypt them to ramdisk, list a directory. Put the util, password protected, on a floppy. The catch is that the storage space used by this util is NOT part of the DOS file system. Instead, defrag your disk, thus packing all allocated clusters into clusters 0-n. Then use the back end of the partition to hold your 'stealth' file system. Or, leave a small 2nd partition on the disk that is not assigned to DOS. Another approach might be to use a directory that contains a set of invariant files (DOS system files, for instance). Due to DOS allocating a minimum storage unit of a "cluster" there is unused physical space on the disk between the tail end of each file and the end of its associated cluster. These dead spaces could be concatenated and used to hold your stealth file system. Now you have a situation where no encrypted data "appears" on your disk at all :-). -- Ray Berry kb7ht ray@ole.cdac.com rjberry@eskimo.com 73407.3152@compuserve.com
5997
From: mike@cunixf.cc.columbia.edu (Michael Chen) Subject: Re: Jack Morris Nntp-Posting-Host: cunixf.cc.columbia.edu Reply-To: mike@cunixf.cc.columbia.edu (Michael Chen) Organization: Columbia University Lines: 44 In article <1993Apr19.024222.11181@newshub.ariel.yorku.ca> cs902043@ariel.yorku.ca (SHAWN LUDDINGTON) writes: >In article <1993Apr18.032345.5178@cs.cornell.edu> tedward@cs.cornell.edu (Edward [Ted] Fischer) writes: >>In article <1993Apr18.030412.1210@mnemosyne.cs.du.edu> gspira@nyx.cs.du.edu (Greg Spira) writes: >>>Howard_Wong@mindlink.bc.ca (Howard Wong) writes: >>> >>>>Has Jack lost a bit of his edge? What is the worst start Jack Morris has had? >>> >>>Uh, Jack lost his edge about 5 years ago, and has had only one above >>>average year in the last 5. >> >>Again goes to prove that it is better to be good than lucky. You can >>count on good tomorrow. Lucky seems to be prone to bad starts (and a >>bad finish last year :-). >> >>(Yes, I am enjoying every last run he gives up. Who was it who said >>Morris was a better signing than Viola?) >> >>Cheers, >>-Valentine > >Hey Valentine, I don't see Boston with any world series rings on their >fingers. Damn, Morris now has three and probably the Hall of Fame in his >future. Therefore, I would have to say Toronto easily made the best >signing. And don't tell me Boston will win this year. They won't >even be in the top 4 in the division, more like 6th. > >Shawn > Gee, I never knew Valentine made a comment about how Viola signing with Boston was gonna bring a World Series title to Boston. I don't think Valentine ever said Boston will win this year. Boy, talk about sensitive, insecure Toronto fans. :) In any case, I think Viola would have made a better signing. Why? Viola is younger, and is left handed (how many left handed starters does Toronto have? -Mike /mike@columbia.edu
5998
From: cjp+@pitt.edu (Casimir J Palowitch) Subject: Re: CLINTON: President's Trip to Pittsburg [sic] Organization: University of Pittsburgh Lines: 37 In article <1ql6bgINNklu@life.ai.mit.edu> Clinton-HQ@Campaign92.Org (Clinton/Gore '92) writes: > STATEMENT BY THE PRESS SECRETARY > The President will travel to Pittsburgh on Saturday, April >17 to talk about his job creation plan and its impact on the >state of Pennsylvania, where it would create as many as 3,818 ^^^^^ ^^^^^ *Would*? Ha Haaaa Haa ha haAA How the hell can they come up with a number, specified to the units column, on something as complicated as this? Face it, it's the perceptions that matter here, folks, not the facts. Especially this one: >full time jobs and up to 21,240 summer jobs. He will make a ^^^^^^^^^^^^^^^^^^ According to the Pittsburgh Post-Gazette, that means over 7200 new jobs for Allegheny county (metro Pgh) alone! Haaaa HAAA ha HA HAAA heh heh HAAAA <snif> Doing what? I hope it's fixing the potholes on my street. Let's face it, folks, we're in a depression and this is the WPA. Clinton's really coming here to beat on Sen. Arlen Specter, who happens to be vacationing in Africa (Don't know whether to laugh or cry) -- ** Casimir J. (Casey) Palowitch - In 1996, there will be two kinds ** ** Slavic Cataloger - of computer professional : those ** ** U. of Pgh. Library Systems - who know NeXTStep, and those ** ** cjp+@pitt.edu - without Jobs. **
5999
From: hays@ssd.intel.com (Kirk Hays) Subject: Re: Nazi memoribilia Nntp-Posting-Host: taos Organization: Intel Supercomputer Systems Division Lines: 38 In article <cmay.734085409@helium>, cmay@helium.gas.uug.arizona.edu (Christopher C May) writes: |> In <1993Apr2.232511.10711@raid.dell.com> mikepb@lupus.dell.com (Michael P. Brininstool) writes: |> |> >Swatikas were also common in American Indian markings/painted walls etc. Is |> >it the Swastika that is bad? |> |> Just want to back this up with a personal anecdote. My grandparents |> have a Navajo rug made in the 1920's, which they received in trade |> from the weaver while living in Flagstaff, Arizona. The decorative motif |> consists of 4 large black swastikas, one in each corner. What's more, the |> color scheme is black, white, and red. To the casual glance it would |> undoubtedly appear to be a Nazi relic of some kind. Yet they owned it |> ten years before Hitler and the National Socialists came to power. |> |> As I recall, they took it down in the 30's, and didn't feel quite right |> about putting it back up until the 60's. It still draws comments from |> those who don't know what it is. Having lived, played, and worked on and near the Navajo reservation for a number of years, I can confirm this is an ancient pattern, found in petroglyphs dated 800 to 1200 years old. Also, the Indians never stopped making rugs with this pattern - they just stopped selling them after the Nazi's pre-empted the swastika. Note also that the Indian versions use both clockwise and counter-clockwise swastikas. Ob guns: It's the rare Navaho family that doesn't own a rifle. They remember being "relocated" by the US Army, and don't intend to do it again. The Hopi, on the other hand, have a dislike for weapons, from my experience. Perhaps they just hide them better from strangers. -- Kirk Hays - NRA Life, seventh generation. "The only thing necessary for the triumph of evil is for good men to do nothing." -- Edmund Burke (1729-1797)