index stringlengths 1 5 | content stringlengths 125 75.2k |
|---|---|
5900 | From: turpin@cs.utexas.edu (Russell Turpin)
Subject: Re: Science and methodology (was: Homeopathy ... tradition?)
Organization: CS Dept, University of Texas at Austin
Lines: 123
Distribution: inet
NNTP-Posting-Host: im4u.cs.utexas.edu
Summary: More in response to Lee Lady.
Keywords: science errors Turpin NLP
-*----
I think that part of the problem is that I have proposed a
definition of science that I intended to be interpreted broadly
and that Lee Lady has interpreted fairly narrowly. My definition
is this: Science is the investigation of the empirical that avoids
mistakes in reasoning and methodology discovered from previous
work. Lee Lady writes:
> I don't think that science should be defined in a way that some
> of the activities that lead to really important science --- namely
> thinking and informal exploration --- are not recognized as
> scientific work.
Unless one classifies "thinking and informal exploration" as a
mistake, they fall under my definition. I hope no one would
consider speculation, thinking, and informal exploration as
unscientific.
In article <C5nAsF.MH7@news.Hawaii.Edu> lady@uhunix.uhcc.Hawaii.Edu (Lee Lady) writes:
> Seriously, I'm not sure whether I misjudged you or not, in one respect.
> I still have a major problem, though, with your insistence that science
> is mainly about avoiding mistakes. ...
Here is where I think we are talking at cross-purposes. It is not
clear to me that the kind of definition I have proposed should be
taken as describing what "science is mainly about." Consider,
for example, a definition of invertebrates as all animals lacking
a backbone. This fairly tells what is an invertebrate and
what is not an invertebrate, but it hardly tells you what
invertebrates are all about. One can read this definition and
still not know that 95% of all animal species are invertebrates,
that invertebrates possess a remarkably broad range of form, that
some invertebrate groups -- such as insects and nematodes -- are
ubiquitous in all ecosystems, etc. In short, knowing the
definition of invertebrates does *not* tell one what they are
"mainly about."
The misunderstanding here is my fault. I did not give sufficient
context for people to understand my proposed definition.
> Okay, so let's see if we agree on this: FIRST of all, there are degrees
> of certainty. It might be appropriate, for instance, to demand carefully
> controlled trials before we accept as absolute scientific truth (to the
> extent that there is any such thing) the effectiveness of a certain
> treatment. On the other hand, highly favorable clinical experience, even
> if uncontrolled, can be adequate to justify a *preliminary* judgement that
> a treatment is useful. ...
>
> SECONDLY, it makes sense to be more tolerant in our standards of
> evidence for a pronounced effect than for one that is marginal.
I agree on both counts. As an example of the second, it would only
take a few cases of curing rabies to convince most veterinarians
that a treatment was effective, despite a lack of controls.
As to the first, I do not think it is useful to talk about
"absolute scientific truth." I think it is more useful to talk
about the kinds of evidence that various claims have and the
kinds of evidence IN PARTICULAR FIELDS that in the past have
proven faulty or reliable. The latter is obviously a matter of
degree, and in each field, practitioners try to discover the
relevance of different kinds of evidence.
One of the primary mistakes that marks the advocacy of an idea as
psuedo-science is that the advocacy lacks any sense of proportion
regarding the kinds of evidence related to the proposed claim,
the kinds of evidence that are actually relevant to it, and the
historical reasons in the field that certain kinds of evidence
are given more weight than others. It is perfectly alright to
speculate. I have read quite a few refereed papers that
speculated left and right. But the authors were careful to
identify the notions as speculative, to list what little evidence
was presently available for them, and to describe how research
could proceed to either put the notion on more firm footing or to
uncover its problems. Often what distinguishes whether a paper
of this sort passes muster is the thoughtfulness with which the
author sets the context and paves the way for future work. (It
is in this area that many proponents of speculative ideas fail.)
> The folks over in sci.psychology have a hundred and one excuses not to
> make this simple test. They claim that only an elaborate outcome study
> will be satisfactory --- a study of the sort that NLP practitioners,
> many of whom make a barely marginal living from their practice, can ill
> afford to do. (Most of them are also just plain not interested, because
> the whole idea seems frivolous. And since they're not part of the
> scientific establishment, they have no tangible rewards to gain
> from scientific acceptance.)
I think a lot of scientists steer away from things that --
deserving or not -- garner a patina of kookiness. When
proponents of some practice see no value in more careful
investigation of that practice, that sets alarms ringing in many
researchers' minds.
This is unfortunate, because there is undoubtedly some
intersection between things that are worth investigating and
things that are advocated by those who seem careless or
unreasonable in their advocacy. On the other hand, I can
understand why many scientists would just as soon select other
directions for research. As Gordon Banks has pointed out, no one
wants to become this generation's Rhine.
> One academic in sci.psychology said that it would be completely
> unscientific for him to test the phobia cure since it hasn't
> been described in a scientific journal. ...
I think this is absurd.
> Actually, at least one fairly careful academic study has been done
> (with favorable results), but it's apparently not acceptable because
> it's a doctoral dissertation and not published in a refereed journal.
I wonder why the results were not published. In my field,
dissertation results are typically summarized in papers that are
submitted to journals. Often the papers are accepted for
publication before the dissertation is finished. (This certainly
eases one's defense.)
Finally, I hope Lee Lady will forgive me from commenting either
on NLP or the discussion of it in sci.psychology. I know little
about either and so have nothing to offer.
Russell
|
5901 | From: aaf0@ns1.cc.lehigh.edu (Andrew Aaron Feigin)
Subject: 84 Mazda Pickup, (College Pro, Student Painters, LOOK.)
Organization: Lehigh University
Lines: 26
84 Mazda Pickup
Rebuilt engine at 60,000 miles.
New Transmission, 5 speed.
88,000 miles.
New brakes, new brake calipers.
BRAND NEW CLUTCH, only 200 miles on it.
professional ladder racks, can hold up to 6 ladders..
4 cylinder, gets 30-35 miles to the gallon.
Fog lights.
Tach.
Runs Great.
===============
All inquires should write back or call. I will have it Saturday Afternoon,
and Sunday if you would like to take a look at it.
Phone: 1-215-882-3154
If your are Painting this summer, this is an excellent vehicle to use.
--
____________________________________
/ /|
/ / |
/ / |
------------------------------------/ |
| Andy Feigin | |
| Prodigy -> rwbp88d | |
|
5902 | From: hagberg@violet.ccit.arizona.edu (HAGBERG JR, D. J.)
Subject: Clipper and Ranting Libertarians
Keywords: clipper clinton rant rave libertarians
Distribution: usa,local
Organization: University of Arizona
Lines: 26
Nntp-Posting-Host: violet.ccit.arizona.edu
News-Software: VAX/VMS VNEWS 1.41
I would think that you could reduce the defense of using non-clipper
based encryption technologies to defending freedom of expression
(IE, free speech). That you have to right to express whatever you
want in whatever form your little heart desires so long as you do
not impinge on the rights of others.
Encrypted text/sound/video is just another form of expression of that
particular text/sound/video. Just like digitized sound is another
means of expression of sound -- streams of 100100101111 instead of
continuous waveforms.
Also, it shouldn't be up to the government at all. Encryption
_Standards_ can be decided upon by Independent Standards Orgainizations
(apologies for the acronym). One can note how well this has worked
with ISO and the Metric System, SAE, etc. Independent entities
or consortia of people/industries in that particular area are far
more qualified to set standards than any One government agency.
Consider for example what the Ascii character set would have looked
like if it was decided by the government.
I hope this helps folks to formulate their defenses. I'm still working
on mine and hope to be faxing my congressmen soon...
-=- D. J. Hagberg
-=- hagberg@ccit.arizona.edu
-=- finger ^ for Info and PGP Public Key
|
5903 | From: tffreeba@indyvax.iupui.edu
Subject: Re: Death and Taxes (was Why not give $1 billion...)
Lines: 48
nsmca@aurora.alaska.edu, University of Alaska Fairbanks writes:
[A GOOD DEAL OF HEALTHY IF NOT DEEPLY THOUGHT OUT IDEALISM DELETED
BELOW.]
>Major question is if you decide to mine the moon or Mars, who will stop you?
>[...] Can the truly inforce it? [...]
If their parent company does business (and they will) on the face of the Earth
then they are vulnerable to govt. sanctions. Yes they can be stopped.
>If you go to the moon as declare that you are now a soverign nation, who will
>stop you from doing it. [...]
For the first 100 - 500 (IMHO) years nobody will have to. The colonists will
be too dependent on Earth too pull it off. Eventually they will, history
shows us that.
>Also once you have the means to mine the moon (or whatever) then just do it.
>The UN if done right can be made to be so busy with something else, they will
>not care [...]
What exactly do you mean here? Terrorism? Start an international incident
so your dream can come true? Crack a few eggs to make the omelet? This
sounds fairly irresponsible.
>Basically what I am saying is where is that drive of yeasteryears to go a
>little bit farther out, to do jus ta little bit more, and to tell the crown to
>piss off.. If my ancestors thought the way many today think, Id have been born
>in Central Europe just north of the Black Sea..
Again, the tie that binds will be much stronger for space colonists than
any immigrants that have gone before. Even those intrepid Asian
explorers that crossed the Bering land bridge did not have to carry their
air on their backs.
==
>Michael Adams, nsmca@acad3.alaska.edu -- I'm not high, just jacked
Keep the dream alive, maybe dream it a little more cogently.
Tom Freebairn | There once was a man
| Who built a boat
| To sail away in.
| It sank.
| J.P. Donleavy
_Fairy Tale of New York_ (maybe?)
|
5904 | From: harryb@phred.UUCP (harry barnett)
Subject: Re: text of White House announcement and Q&As on clipper chip encryption
Reply-To: harryb@phred.UUCP
Organization: Physio-Control
Lines: 48
In article 29778@yuma.ACNS.ColoState.EDU, holland@CS.ColoState.EDU (douglas craig holland) writes:
>In article <1993Apr19.130132.12650@afterlife.ncsc.mil> rlward1@afterlife.ncsc.mil (Robert Ward) writes:
>>In article <bontchev.734981805@fbihh> bontchev@fbihh.informatik.uni-hamburg.de writes:
>>>and since the US constitutions guarantees the right to every American
>>>to bear arms, why is not every American entitled, as a matter of
>>
>>Have you read the applicable part of the Constitution and interpreted it IN
>>CONTEXT? If not, please do so before posting this misinterpretation again.
>>It refers to the right of the people to organize a militia, not for individuals
>>to carry handguns, grenades, and assault rifles.
>
>Read the Constitution yourself. The Second Amendment says the right to bear
>arms shall not be infringed, so a well regulated militia may be more easily
>formed. I have an interpretation of the Second that shows there are no
>qualifications to the right to keep and bear arms. If you want, I can E-mail
>it to you. By the way, gun talk belongs in talk.politics.guns.
> Doug Holland
Mr. Ward, before you start blathering about your skill "interpreting"
the Constitution, it might be helpful to learn to read. After a review
with a high school English teacher emphasizing participial phrases, you
might start with the Second Amendment, and follow it up with:
97th Congress, 2nd Session, Committee Print, *The Right To Keep and
Bear Arms*, of the Subcomittee on the Constitution of the Committee on
the Judiciary, United States Senate, 97th Congress, Second Session,
February, 1982. GPO No. 88-618-O
This authoritative, heavily researched and annotated document clearly
turns your "interpretation" into specious claptrap, which is a polite
way of saying utter bullshit. In spite of your false assertion to the
contrary, the Second Amendment DOES protect the right of the individual
citizen, in his capacity as an individual, to keep and bear arms.
And, Mr. Holland, IMHO, blatantly and harmfully false information,
asserted as fact and globally distributed, deserves globally
distributed rebuttal in the forum in which it is posted.
(And besides, this site doesn't carry t.p.g...:-)
harryb%phred@data-io.com
phred!harryb@data-io.com
-----------------------------------------------------------------------
No free man shall ever be debarred the use of arms. The strongest
reason for the people to retain the right to keep and bear arms is,
as a last resort, to protect themselves against tyranny in government.
--Thomas Jefferson
-----------------------------------------------------------------------
|
5905 | From: richter@fossi.hab-weimar.de (Axel Richter)
Subject: True Color Display in POV
Keywords: POV, Raytracing
Nntp-Posting-Host: fossi.hab-weimar.de
Organization: Hochschule fuer Architektur und Bauwesen Weimar, Germany
Lines: 6
Hallo POV-Renderers !
I've got a BocaX3 Card. Now I try to get POV displaying True Colors
while rendering. I've tried most of the options and UNIVESA-Driver
but what happens isn't correct.
Can anybody help me ?
|
5906 | From: paj@uk.co.gec-mrc (Paul Johnson)
Subject: Re: History question
Reply-To: paj@uk.co.gec-mrc (Paul Johnson)
Organization: GEC-Marconi Research Centre, Great Baddow, UK
Lines: 25
In article <kazel.15.734728882@uiuc.edu> kazel@uiuc.edu (Mitch Kazel) writes:
>Sorry if this isn't the correct news group . . . but . . .
>
>A colleague of mine is trying to find out when the first public use of
>electronic voice amplification was . . . i.e. a P-A system.
>
>Any reference would be appreciated. Please reply via e-mail.
>Mitch Kazel (N9HDQ)
>INTERNET: kazel@uiuc.edu
This is vague, so I am posting it in case anyone else knows more.
I recall reading of a phonograph which used mechanical amplification.
Compressed air was squirted out of a valve which was controlled by the
pickup. The result was noisy and distinctly lo-fi, but much louder
than a conventional phonograph. It tended to wear the disks out
pretty quickly though.
Paul.
--
Paul Johnson (paj@gec-mrc.co.uk). | Tel: +44 245 73331 ext 3245
--------------------------------------------+----------------------------------
These ideas and others like them can be had | GEC-Marconi Research is not
for $0.02 each from any reputable idealist. | responsible for my opinions
|
5907 | From: behnke@FNALF.FNAL.GOV (M.L. 'Broomen' Behnke)
Subject: Re: Electric power line "balls"
Article-I.D.: fnnews.1psrgl$6cb
Reply-To: behnke@FNALF.FNAL.GOV
Distribution: usa
Organization: Fermi National Accelerator Lab
Lines: 27
NNTP-Posting-Host: fnalf.fnal.gov
In article <1993Apr6.203237.20841@eagle.lerc.nasa.gov>, fsset@bach.lerc.nasa.gov (Scott Townsend) writes:
>I got a question from my dad which I really can't answer and I'd appreciate
>some net.wisdom.
>
>His question is about some 18-24" diameter balls which are attached to
>electric power lines in his area. He's seen up to a half dozen between
>two poles. Neither of us have any experience with electric power distribution.
>My only guess was that they may be a capacitive device to equalize the
>inductance of the grid, but why so many between two poles?.
>
>Anyone know what they really are? Is there a related FAQ for this?
>Is there a better group to submit to?
>
>We'd both appreciate some enlightenment.
>
The balls are used to reduce the amplitude of oscillations of the wire during
periods of high winds. I've seen what looks like paint cans filled with
concrete used for the same purpose.
Mike Behnke | Senior Tech/Advisor | Quid est illuidin aqua??
Fermi Nat Accel Lab | Equipment Suuport |
Batavia, Il. | Computing Div | PISTRIX!! PISTRIX!!
BEHNKE@FNALF.FNAL.GOV | |
My opinions are my own, not of the lab. So, if you don't like them, call
1-800-UWH-INER
|
5908 | From: rdell@cbnewsf.cb.att.com (richard.b.dell)
Subject: Re: Fujitsu 8" HDD
Keywords: M2321K, M2322K, Fujitsu, Microdisk (-:
Organization: AT&T
Distribution: na
Lines: 15
In article <1993Apr17.204351.2256@aber.ac.uk> cjp1@aber.ac.uk (Christopher John Powell) writes:
[deletions]
>It appears to use two balanced-line connections, but what each connection
>corresponds to I know not. One connection is a 30-way IDC, the other a
>60-way IDC.
Sounds like it is an SMD interface to me, not being at work now
to actually count pins. there are two varients, SMD and
SMDC (I think), only minor differences between them. Widely used
prior to the advent of SCSI for large drives (or all drives) on minis
(and mainframes(?) no experience on those).
Richard Dell
|
5909 | From: jlroffma@unix.amherst.edu (JOSHUA LAWRENCE ROFFMAN)
Subject: Re: Jewish Baseball Players?
Nntp-Posting-Host: amhux3.amherst.edu
Organization: Amherst College
X-Newsreader: TIN [version 1.1 PL7]
Lines: 12
: >baseball players, past and present. We weren't able to come up
: >with much, except for Sandy Koufax, (somebody) Stankowitz, and
: >maybe John Lowenstein. Can anyone come up with any more. I know
: >it sounds pretty lame to be racking our brains over this, but
: >humor us. Thanks for your help.
:
John Lowenstein is definately NOT Jewish. Many in Baltimore thought he was...
especially after he told the Baltimore _Jewish Times_ so...but later he
admitted that it was a joke.
|
5910 | From: gld@cunixb.cc.columbia.edu (Gary L Dare)
Subject: ST (TOS) and SF Movie Videotapes (BETA) for Sale/Trade [repost]
Summary: trade for other Beta, used CD's or barter other merchandise
Nntp-Posting-Host: cunixb.cc.columbia.edu
Reply-To: gld@cunixb.cc.columbia.edu (Gary L Dare)
Organization: PhDs In The Hall
Distribution: na
Lines: 52
nyamane@nyx.cs.du.edu (Norm Yamane) writes:
>
>I have the following videos for sale. All have been viewed once
>and are in good condition:
>
>Star Trek (TOS) Collector's Edition
> All 79 episodes. (39 tapes) Asking $800 for the lot.
I've got 7 episodes left on *Beta* for Sale at US$8 each (neg.), or
for Trade 1-for-1 for movie on Beta or a used CD; or, a package deal
for $50 or whatever you care to propose in trade -- e.g., all for a
set of good stereo headphones (e.g. Sony V6 or V7), an Apple IWII
sheet feeder, a good used FM/Cassette stereo "walkman" or a hotel
coupon(s) for free stays FOB New York City (guests coming!)). The
remaining collection is as follows:
8 - Charlie X
11 - Dagger of the Mind
12 - Miri
17 - Shore Leave
20 - The Alternative Factor
29 - Operation-Annihilate!
33 - Who Mourns for Adonais?
Numbers indicate episode numbering on the tape boxes, for those who
are keeping track of what episodes they're missing in that manner.
RSVP for summaries, if necessary.
The tapes are all in excellent condition in the original packaging.
All have been played at least once, but most have been played ONLY
once, and NONE have been played more than twice. Running time: ~50
min. ea. (Unedited, uncut store-bought originals unlike those in
syndication; all have *incredible* Beta HiFi sound!)
I also have the following SF and Horror movies on Beta as well; US$10
(negotiable) or Trade (1-for-1 swap for movie on Beta or a used CD):
The Bride (Sting, Jennifer Beales)
* Buck Rogers Conquers the Universe (Buster Crabbe, Constance Moore)
RSVP for my larger Beta movies/music trade list, or find it on Misc.forsale!
gld
PS: For those of you who may wonder, Beta is alive as a pro/hobbyist
format ... there's life beyond the corner video store! (-;
--
~~~~~~~~~~~~~~~~~~~~~~~~ Je me souviens ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Gary L. Dare
> gld@columbia.EDU GO Winnipeg Jets GO!!!
> gld@cunixc.BITNET Selanne + Domi ==> Stanley
|
5911 | From: mangoe@cs.umd.edu (Charley Wingate)
Subject: Re: Motto Mania
Lines: 33
mathew writes:
>I prefer Mark-Jason Dominus's suggestion that the motto should be changed to
>"Mind your own fucking business".
In this era of AIDS, isn't someone's fucking *everyone's* interest? (semi
:-))
I propose "We have no motto."
Recently in the glorious state of Maryland (the only state whose state song
refers to Abraham Lincoln as a tyrant), people have gotten all wound up over
the state motto (which we inherited from the Calverts):
"Fatti Maschii, Parole Femine"
which, if you read Italian, says,
"Manly deeds, womanly words"
or something to that effect. In the state which not so long ago had four
women out of seven representatives, this represents a problem. The official
solution was to change the translation, so now it means:
"Strong deeds, gentle words"
My personal suggestion was changing it to "walk softly and carry a big
stick."
--
C. Wingate + "The peace of God, it is no peace,
+ but strife closed in the sod.
mangoe@cs.umd.edu + Yet, brothers, pray for but one thing:
tove!mangoe + the marv'lous peace of God."
|
5912 | From: lady@uhunix.uhcc.Hawaii.Edu (Lee Lady)
Subject: Re: Science and methodology (was: Homeopathy ... tradition?)
Summary: Ultimately, ideas come from exploration and informal thinking.
Organization: University of Hawaii (Mathematics Dept)
Expires: Mon, 10 May 1993 10:00:00 GMT
Lines: 65
In article <C5L9ws.Jn2@unx.sas.com> sasghm@theseus.unx.sas.com
(Gary Merrill) writes:
>
>In article <1993Apr16.155919.28040@cs.rochester.edu>, fulk@cs.rochester.edu
(Mark Fulk) writes:
>
>|> Flights of fancy, and other irrational approaches, are common. The crucial
>|> thing is not to sit around just having fantasies; they aren't of any use
>|> unless they make you do some experiments. ....
>|>
>|> (Simple example: Warren Jelinek noticed an extremely heavy band on a DNA
>|> electrophoresis gel of human ALU fragments. He got very excited, .....
>
>But why do you characterize this as a "flight of fancy" or a "fantasy"?
>While I am unfamiliar with the scientific context here, it appears obvious
>that his speculation (for lack of a better or more neutral word) was
>at least in significant part a consequence of his knowledge of and acceptance
>of current theory coupled with his observations. It would appear that
>something quite rational was going on as he attempted to fit his observation
>into that theory (or to tailor the theory to cover the observation). ...
Whether a scientific idea comes while one is staring out the window, or
dreaming, or having a fantasy, or watching an apple fall (Newton), or
sitting in a bath (Archimedes) ... it is ultimately the result of a lot of
intense scientific thinking done beforehand. Letting one's mind roam
freely and giving rein to one's intuition can be a useful way of coming
up with new ideas, but only when one has done a lot of rational analysis
of the problem first.
Scientific intuition is not something one is born with. It is something
that one learns. Maybe we don't understand completely how it is learned,
but training in systematic scientific thinking is certainly one of the
key elements in developing it.
Informal exploration is also often an important element in finding new
scientific ideas. One thinks, for instance, of Darwin's naturalistic
studies in the Galapagos islands, which led him to the ideas for the
theory of evolution.
This is why I am offended by a definition of science that emphasizes
empirical verification and does not recognize thinking and informal
exploration as important scientific work. I agree that mere speculation
does not deserve to be called science. I also think that mere empirical
studies not directed by good scientific thinking are at best a very
poor kind of science.
In article <1qk92lINNl55@im4u.cs.utexas.edu> turpin@cs.utexas.edu
(Russell Turpin) writes:
> ...
>I think that Lee Lady and I are talking at cross purposes.
> ... Lady seems concerned with the contrast between great
>science that makes big advances in our knowledge and mediocre
>science that makes smaller steps. In most of this thread, I have
>been concerned with the difference between what is science and
>what is not.
I don't think that science should be defined in a way that some of the
activities that lead to really important science --- namely thinking and
informal exploration --- are not recognized as scientific work.
--
In the arguments between behaviorists and cognitivists, psychology seems
less like a science than a collection of competing religious sects.
lady@uhunix.uhcc.hawaii.edu lady@uhunix.bitnet
|
5913 | From: sera@zuma.UUCP (Serdar Argic)
Subject: They were completely and systematically exterminated by Armenians.
Reply-To: sera@zuma.UUCP (Serdar Argic)
Distribution: world
Lines: 96
In article <C4xCu3.401@polaris.async.vt.edu> jfurr@polaris.async.vt.edu (Joel Furr) writes:
>Do it. Depew has shown himself to be unrepentant (though embarrassed) and
>still possessed of the same fucked-up hubris-laden self-righteousness that
The theory is that the hollering kills the spirit of the criminal/Nazi
Armenians of the ASALA/SDPA/ARF Terrorism and Revisionism Triangle.
Now, try dealing with the rest of what I wrote.
What is more, the activities of the Armenian Government seem to have been
efforts aimed at eradicating a race (the Turks) or aimed at carrying out a
one-sided feud, instead of being a struggle for liberation. From the outset,
the efforts of the Armenian revolutionaries within the Ottoman borders took
the form of terrorist and destructive actions aimed at mass murder, cruelty
and genocide, so that no other interpretation of them is possible. Armenian
activities started during the reign of Abdulhamid II as individual acts of
terror, and then developed into assassinations and surprise attacks. The element
of brute force in these activities increased steadily, culminating in mass
rebellions and widespread fighting during the First World War. Furthermore,
when the Ottoman army withdrew from Eastern Anatolia after the 1915 Sarikamis
defeat, Armenian revolutionaries initiated a series of cruelties in this area.
Although the Russians occupied Eastern Anatolia as an enemy, nevertheless they
were constrained by the rules of war. However, when they returned to their
country in 1917 after the Revolution, Armenian revolutionaries were unchecked
in this area for about a year until the Ottoman forces returned to Erzurum
in 1918. During this period, Armenian revolutionaries executed massacres on
the local people which is recorded in historical documents.[1]
For example, let us look at a report dated 21 March 1918 which the Commander
of the Third Army submitted when he entered Erzurum and Erzincan:
"They were completely and systematically destroyed and burned down
by Armenians, even the trees were cut down, and they are like a
building entirely consumed by fire in every sense of the word."
As for the people who had been living in Erzurum and Erzincan:
"Those who were capable of fighting were taken away at the very beginning
with the excuse of forced labor in road construction, they were taken
in the direction of Sarikamis and annihilated. When the Russian army
withdrew, a part of the remaining people was destroyed in Armenian
massacres and cruelties: they were thrown into wells, they were locked
in houses and burned down, they were killed with bayonets and swords, in places
selected as butchering spots, their bellies were torn open, their lungs
were pulled out, and girls and women were hanged by their hair after
being subjected to every conceivable abominable act. A very small part
of the people who were spared these abominations far worse than the
cruelty of the inquisition resembled living dead and were suffering
from temporary insanity because of the dire poverty they had lived
in and because of the frightful experiences they had been subjected to.
Including women and children, such persons discovered so far do not
exceed one thousand five hundred in Erzincan and thirty thousand in
Erzurum. All the fields in Erzincan and Erzurum are untilled, everything
that the people had has been taken away from them, and we found them
in a destitute situation. At the present time, the people are subsisting
on some food they obtained, impelled by starvation, from Russian storages
left behind after their occupation of this area."[2]
Foreign observers who witnessed the events, including Russian Officers
who did not desert their lines, submitted detailed reports proving the
genocide to Ottoman commanders who received them as prisoners of war.
What is most important is that they stated in their reports 'the
massacres did not happen by chance but were planned.'[3]
At the end of the war, the German author Dr. Weiss, his Austrian colleague
Dr. Stein and his Turkish colleague Mr. Ahmet Vefik visited Trabzon, Kars,
Erzurum and Batum between April 17th and May 20th 1918 to record the
cruelties. Their writings not only show the scope of Armenian activities,
but also reveal their goal and true nature.[4]
[1] (The Ottoman State, the Ministry of War), "Islam Ahalinin Ducar Olduklari
Mezalim Hakkinda Vesaike Mustenid Malumat," (Istanbul, 1918). The French
version: "Documents Relatifs aux Atrocites Commises par les Armeniens sur
la Population Musulmane," (Istanbul, 1919). In the Latin script: H. K.
Turkozu, ed., "Osmanli ve Sovyet Belgeleriyle Ermeni Mezalimi," (Ankara,
1982). In addition: Z. Basar, ed., "Ermenilerden Gorduklerimiz," (Ankara,
1974) and, edited by the same author, "Ermeniler Hakkinda Makaleler -
Derlemeler," (Ankara, 1978). "Askeri Tarih Belgeleri ...," Vol. 32, 83
(December 1983), document numbered 1881.
[2] "Askeri Tarih Belgeleri ....," Vol. 31, 81 (December 1982), document
numbered 1869.
[3] From Twerdo-Khlebof's report dated 29 April 1918; quoted in Ermeniler ...,
Vol. 2, p. 275.
[4] A. R. (Altinay), "Iki Komite - Iki Kital," (Istanbul, 1919), and, "Kafkas
Yollarinda Hatiralar ve Tahassusler" (Istanbul, 1919).
Serdar Argic
'We closed the roads and mountain passes that
might serve as ways of escape for the Turks
and then proceeded in the work of extermination.'
(Ohanus Appressian - 1919)
'In Soviet Armenia today there no longer exists
a single Turkish soul.' (Sahak Melkonian - 1920)
|
5914 | From: cjp1@aber.ac.uk (Christopher John Powell)
Subject: Fujitsu 8" HDD
Keywords: M2321K, M2322K, Fujitsu, Microdisk (-:
Organization: University of Wales, Aberystwyth
Lines: 23
I have a Fujitsu M2322K which has been removed (I believe) from a digital
X-Ray machine (takes X-Ray pictures without film). The Fujitsu part number
is B03B-4745-B002A.
I have obtained some data on the device, it is 8-inch winchester-type
of 168 megabyte capacity (though I was told it was over 800 megabytes).
However, there is very little information on the interface standard used.
It appears to use two balanced-line connections, but what each connection
corresponds to I know not. One connection is a 30-way IDC, the other a
60-way IDC.
If anyone has any information on this device, I would be most grateful
if you could provide it.
Thanks.
Chris Powell.
--
+------------------------------------------------------------------------+
| THE MAN FROM : ##### ####### | JANET : cjp1@uk.ac.aber |
| # # _# | Internet : cjp1@aber.ac.uk |
| # # _# | NYX : cpowell@nyx.cs.du.edu |
|
5915 | From: b-clark@nwu.edu (Brian Clark)
Subject: Re: High Resolution ADC for Mac II
Nntp-Posting-Host: elvex33.acns.nwu.edu
Organization: Northwestern University
Lines: 24
In article <1qidk1INNhk9@iskut.ucs.ubc.ca>, Rob Douglas
<douglas@ecc.ubc.ca> wrote:
>
> In article <1qhfmg$hoh@lll-winken.llnl.gov> Charles E. Cunningham,
> cec@imager writes:
> > I would like to buy a 16 bit ADC card for the Mac II with digitization
> >rate of at least 100 kHz, preferably 200 kHz. I would prefer one with
> >good differential and integral linearity, and DMA would be a plus. Other
> >than National Instruments, do you know of any other vendor who sells such
> >a card?
>
> Instrutech Corp has a nice looking 16 bit A/D and D/A board that can run
> at the speeds you want. The ITC-16 (?) doesn't have DMA, but it does have
> a good sized FIFO that can buffer your samples. Instrutech can be reached
> at (516) 829-5942, or 929-0934 (FAX).
>
I don't know about the Instrutech boards (though I plan to check them out),
but you need to be very careful checking the monotonicity and S/N ratio of
many of the "16 bit" boards out there. The NI boards are very clearly
specified in terms of monotonicity, S/N ratio, accuracy, etc; and the
NB-A2100 and NB-A2150 have all the dyynamic range and freedom from
distortion that you'd expect from a good, true 16 bit converter. This is
not true for the Spectral Innovations boards, for example.
|
5916 | From: sgoldste@aludra.usc.edu (Fogbound Child)
Subject: Re: NEWS YOU WILL MISS, Apr 15
Organization: University of Southern California, Los Angeles, CA
Lines: 27
NNTP-Posting-Host: aludra.usc.edu
arf@genesis.MCS.COM (Jack Schmidling) writes:
>
> Yigal et al, sue ADL
>
Why do you title this "News you will miss" ?
There have been at least three front-page stories on it in the L.A. Times.
I wouldn't exactly call that a media cover-up.
> js
>
___Samuel___
Mossad Special Agent ID314159
Media Spiking & Mind Control Division
Los Angeles Offices
--
_________Pratice Safe .Signature! Prevent Dangerous Signature Virii!_______
Guildenstern: Our names shouted in a certain dawn ... a message ... a
summons ... There must have been a moment, at the beginning,
where we could have said -- no. But somehow we missed it.
|
5917 | From: jks4675@ritvax.isc.rit.edu
Subject: Conner 120 MB Question
Nntp-Posting-Host: vaxa.isc.rit.edu
Reply-To: jks4675@ritvax.isc.rit.edu
Organization: Rochester Institute of Technology
What do I need to do to configure this drive as a slave?
Model# CP30101G
Please reply via e-mail. Thanks!!
Jeff
****************************************************************
* Four out of five electrons prefer holes for their mutual *
* annhiliation needs. Boycott Sierra. Ignore anybody who *
* purports to be a serious Windows user. Support new makers *
* of hardware and software. Buy Canadian music. Quit smoking. *
* Take up running. FM synthesis is the CGA of audio. *
* JKS4675@RITVAX.ISC.RIT.EDU *
****************************************************************
|
5918 | Subject: Best Sportwriters...
From: csc2imd@cabell.vcu.edu (Ian M. Derby)
Expires: Sat, 1 May 1993 04:00:00 GMT
Organization: Virginia Commonwealth University
Keywords: Sportswriters
Summary: Sportswriters
Lines: 19
Since someone brought up sports radio, howabout sportswriting???
(Anyone give an opinion)
Which city do you think has the best sports coverage in terms of
print media?
(these are general questions)
Is the Washington Post better than the Philadelphia Inquier or the NY
Times?
Howabout the Philadelphia Daily News compared to the New York Daily
News?
Do you notice papers being subjective or objective to the home team?
|
5919 | From: habs@panix.com (Harry Shapiro)
Subject: Re: The source of that announcement
Organization: PANIX Public Access Unix, NYC
Lines: 27
In <MARC.93Apr18174241@oliver.mit.edu> marc@mit.edu (Marc Horowitz
N1NZU) writes:
>I received mail from Mitch Kapor saying that he did not ask to be on
>the list, and does not know why he was added. I'm sure the same
>applies to others on the list. So, I guess my initial theory was
>right, that the clipper list was just someone's idea of a bad joke. I
>guess I should be happy it wasn't a conspiracy.
I have also been in contact with Mitch about this. I believe
him when he says he didn't ask to be on the "clipper" list.
He also forwarded the traffic he had recieved through that list to
me which will be placed at some ftp site.
However, the first alias on the "clipper list" was csspab which was
another mailing list. It basically contained the addresses for
staffers and board members of the NIST security board. Several of
these people had their accounts within the dockmaster domain.
These are the people we might wish to FOIA...
/harry
--
Harry Shapiro habs@panix.com
List Administrator of the Extropy Institute Mailing List
Private Communication for the Extropian Community since 1991
|
5920 | From: David.Anderman@ofa123.fidonet.org
Subject: LRDPA news
X-Sender: newtout 0.08 Feb 23 1993
Lines: 28
Many of you at this point have seen a copy of the
Lunar Resources Data Purchase Act by now. This bill, also known as the Back to
the Moon bill, would authorize the U.S.
government to purchase lunar science data from private
and non-profit vendors, selected on the basis of competitive bidding, with an
aggregate cap on bid awards of $65 million.
If you have a copy of the bill, and can't or don't want to go through
all of the legalese contained in all Federal legislation,don't both - you have
a free resource to evaluate the bill for you. Your local congressional office,
listed in the phone book,is staffed by people who can forward a copy of the
bill to legal experts. Simply ask them to do so, and to consider supporting
the Lunar Resources Data Purchase Act.
If you do get feedback, negative or positive, from your congressional
office, please forward it to: David Anderman
3136 E. Yorba Linda Blvd., Apt G-14, Fullerton, CA 92631,
or via E-Mail to: David.Anderman@ofa123.fidonet.org.
Another resource is your local chapter of the National Space Society.
Members of the chapter will be happy to work with you to evaluate and support
the Back to the Moon bill. For the address and telephone number of the nearest
chapter to you, please send E-mail, or check the latest issue of Ad Astra, in
a library near you.
Finally, if you have requested, and not received, information about
the Back to the Moon bill, please re-send your request. The database for the
bill was recently corrupted, and some information was lost. The authors of the
bill thank you for your patience.
--- Maximus 2.01wb
|
5921 | From: VEAL@utkvm1.utk.edu (David Veal)
Subject: Re: 2ND AMENDMENT DEAD - GOOD !
Lines: 47
Organization: University of Tennessee Division of Continuing Education
In article <1993Apr18.001319.2340@gnv.ifas.ufl.edu> jrm@gnv.ifas.ufl.edu writes:
>Yea, there are millions of cases where yoy *say* that firearms
>'deter' criminals. Alas, this is not provable.
Not provable. It's about as "provable" as the number of votes
vast for Bill Clinton in the last election. If you accept the information
available, you can prove one way or the other. If you refuse to accept
it, nothing is "provable."
>I think that that
>there are actually *few* cases where this is so.
Fine, support your assertation. But, you haven't supported
any assertations just yet.
The National Crime Survey, that secret Arm of the NRA, estimates
between 40,000 and 50,000 with-gun self-defenses from assaults, and
is considered to considerably under-report. When broken down by weapon,
there is no form of "self-defense" including dowing nothing which is
more effective at avoiding injury or death.
>The bulk of firarems are used against unworthy and unnesessary
>opponents ... those who posessa a cool jakcet you want, those who
>would argue with you about a parking space, those who would
>take your woman. In short, trivial and worthless causes.
Ok, support *this* assertation. Hell, support *one*.
>Too much of this has ruined you cause. There is no recovery.
That's nice.
>In the near future, federal martials will come for your arms.
That's nice, too.
>The 2nd amendment is dead. Accept this. Find another way.
Why on Earth should we? If you're correct we've nothing to
lose by continuing to argue against it and everything to gain.
------------------------------------------------------------------------
David Veal Univ. of Tenn. Div. of Cont. Education Info. Services Group
PA146008@utkvm1.utk.edu - "I still remember the way you laughed, the day
your pushed me down the elevator shaft; I'm beginning to think you don't
love me anymore." - "Weird Al"
|
5922 | From: jeh@cmkrnl.com
Subject: Re: A question about 120VAC outlet wiring..
Organization: Kernel Mode Systems, San Diego, CA
Lines: 43
In article <1993Apr14.172145.27458@ecsvax.uncecs.edu>, crisp@ecsvax.uncecs.edu (Russ Crisp) writes:
> I'm considering modernizing some old wiring in my home, and
> I need a little advice on outlet wiring. Several outlets
> are the old 'two prong' type, without the ground. Naturally,
> the wire feeding these outlets is 12/2, WITHOUT the ground
> wire. I noticed at the fusebox that some circuits have the
> 12/2 with ground, and that on these circuits, the ground
> wire was tied to the same bus as the neutral (white) wire.
>
> SO.. Here's my question. It seems to me that I'd have the
> same electrical circuit if I hooked the jumper from the neutral
> over to the ground screw on new 'three prong' grounding outlets.
> What's wrong with my reasoning here?
No. No. NOOO!!!
The ground (green) wire is for safety. No current is supposed to flow in it
under normal conditions. This means that there's normally no voltage drop in
it either. It is supposed to be safe to touch the ground wire... even if
you're grounded in some other way at the same time.
The neutral (white) wire is, as Dave Vanderbyl correctly said, the return for
the hot wire. Since current flows in it, there's a voltage drop. If you
plug a heavy load into a properly-wired grounded outlet, you can commonly
measure a volt or so of difference between neutral and ground.
They are supposed to be connected together at the breaker panel... but nowhere,
repeat NOwhere, else. (Well, almost. There are strange exceptions for things
like sub-panels.)
What you CAN do if you want three-prong outlets without additional wiring is
to use a GFCI outlet (or breaker, but the outlet will be cheaper). In fact,
depending on where you are putting your new outlet(s), a GFCI may be *required*.
There is a FAQ on electrical wiring, posted regularly to rec.woodworking and
news.answers. It goes into great detail on these issues (including GFCIs) and
you should probably read it before asking any more questions. I'll mail a copy
to you, append a copy here, and will ask the writers to cross-post it here in
the future.
--- Jamie Hanrahan, Kernel Mode Systems, San Diego CA
Internet: jeh@cmkrnl.com Uucp: uunet!cmkrnl!jeh CIS: 74140,2055
|
5923 | From: 0005111312@mcimail.com (Peter Nesbitt)
Subject: Newspapers censoring gun advertisements
Lines: 88
Recently while looking around in Traders Sporting Goods store, a very well
stocked firearms store, I discovered a printed document that was being
distributed by the good folks who work there. Traders, BTW, is located in
San Leandro, CA.
Granted, the document may be asking you and I to help out Traders, but in the
big scope of things, I feel that we would do all gun owners a favor by helping
to this cause.
Anyway, here it is:
NEWSPAPER AD CENSORSHIP
Are you letting the newspapers tell you how to live your life, what's good for
you, what's not, and exercise blatant censorship over what you read in their
advertisments?
The newspapers have now decided to censor gun ads - which is why you no longer
see the ads that Traders, San Leandro, has run for many years.
These ads were run for the law-abiding honest citizens who own firearms for
sporting use or self-protection. They certainly have the right to do so, under
the Second Amendment Right to Bear Arms.
If you are tired of newspapers who run sex and liquor ads galor, yet refuse to
run legitimate gun ads, please send a letter to the editors indicating your
displeasure over their censorship doctrine.
Following is a list of Bay area newspapers who censor gun ads. Perhaps you'd
like to send them your thoughts on this issue!
Oakland Tribune Daily Review Alameda Times-Star
POB 28883 POB 5050 1516 Oak St.
Oakland, CA 94604 Hayward,94540 Alameda, CA 94501
Argus Tri Valley Herald San Leandro Times
3850 Decoto Rd. POB 10367 161 W. Juana Ave.
Fremont, CA 94555 Pleasanton, CA 94588 San Leandro, CA 94577
Contra Costa Times San Mateo Times San Francisco Chronicle
POB 5088 POB 5400 901 Mission St.
Walnut Creek, CA 94596 San Mateo, CA 94402 San Francisco, CA 94103
San Fran. Independent San Fran. Examiner San Jose Mercury News
1201 Evans Ave 110 5th St. 750 Ridder Park Dr.
San Fran., CA 94124 San Fran., CA 94103 San Jose, CA 95190
Then there are six pages of "facts". I can not validate these facts, and
there were no sources, but many feel and sound very true. Here are the topic
headlines:
- Big Media Snow Job
- Blaming Firearms for Murder is Like Blaming Hospitals for Death
- I could use the same Nazi Journalistic Technique of CBS and ABC to prove
that Hospitals Cause Death
- How NBC, CBS, and ABC have scammed the American people on "gun control"
- American TV journalism is based on Nazi journalism
- Why TV journalists lie
- The Government with the help of the TV networks, has succeeded in playing
one group against the other
- Gun laws are unconstitutional
- American gun laws are based on Nazi gun laws
- The Government is trying to devide and conquer
- The CIA wants your firearms
and so on for six pages.
So now we have the media trying help put gun dealers out of business by trying
to limit their exposure to potential customers, and preventing the customers
from reading about sales of ammunition and firearms for sporting, hunting, or
other recreational use.
Let me know if you write to any of these bozos.
/-----------------------------------------------------------------------------\
| Peter D. Nesbitt | Air Traffic Controller | PNESBITT@MCIMAIL.COM |
| | Oakland Bay TRACON | |
|-----------------------------------------------------------------------------|
| CBR600F2 Pilot | NRA Member CCX1380F | S&W .41 Magnum Carrier |
\-----------------------------------------------------------------------------/
|
5924 | From: gt1091a@prism.gatech.EDU (gt1091a gt1091a KAAN,TIMUCIN)
Subject: Re: Public Service Translation No.2
Keywords: effective Greek & Armenian postings
Organization: Georgia Institute of Technology
Lines: 21
Who the hell is this guy David Davidian. I think he talks too much..
Yo , DAVID you would better shut the f... up.. O.K ?? I don't like
your attitute. You are full of lies and shit. Didn't you hear the
saying "DON'T MESS WITH A TURC!!"...
See ya in hell..
Timucin.
--
KAAN,TIMUCIN
Georgia Institute of Technology, Atlanta Georgia, 30332
uucp: ...!{decvax,hplabs,ncar,purdue,rutgers}!gatech!prism!gt1091a
Internet: gt1091a@prism.gatech.edu
|
5925 | From: tedward@cs.cornell.edu (Edward [Ted] Fischer)
Subject: Re: Defensive Averages 1988-1992 -- Shortstop
Organization: Cornell Univ. CS Dept, Ithaca NY 14853
Lines: 13
In article <1993Apr17.200602.8229@leland.Stanford.EDU> addison@leland.Stanford.EDU (Brett Rogers) writes:
>In article <steph.735027990@pegasus.cs.uiuc.edu> steph@pegasus.cs.uiuc.edu (Dale Stephenson) writes:
>>>Smith, Ozzie .742 .717 .697 .672 .664 0.701
>> The Wizard's 1988 is the second highest year ever. Still very good,
>>but I don't like the way his numbers have declined every year. In a few
>>years may be a defensive liability.
>
>That's rich... Ozzie Smith a defensive liability...
Why not? Brooks Robinson is a defensive liability too, and Ted
Williams is a weak hitter. Even great players decline as they age.
-Valentine
|
5926 | From: ad354@Freenet.carleton.ca (James Owens)
Subject: Re: Question for those with popular morality
Organization: National Capital Freenet, Ottawa, Canada
Lines: 87
In article 70257, david@terminus.ericsson.se (David Bold) writes:
>In article 17570@freenet.carleton.ca, ad354@Freenet.carleton.ca
>(James Owens) writes:
>>You seem to be saying that, God being unknowable, His morality
>>is unknowable.
>Yep, that's pretty much it. . . .
>. . .
>As I understand it, the Sadducees believed that the Torah was all
>that was required, whereas the Pharisees (the ancestors of modern
>Judaism) believed that the Torah was available for interpretation
>to lead to an understanding of the required Morality in all its
>nuances (->Talmud).
>The essence of all of this is that Biblical Morality is an
>interface between Man and YHWH (for a Jew or Christian) and does
>not necessarily indicate anything about YHWH outside of that
>relationship (although one can speculate).
>. . .
>. . . the point I`m trying to make is that we only really have the
>Bible to interpret, and that interpretation is by humanity. I guess
>this is where Faith or Relevation comes in with all its inherent
>subjectiveness.
God being unknowable, I can't comment on His motives, but it would be
distressing if He allowed us to misunderstand Him through no fault of
our own. For sanity's sake we must assume, if we believe in Him at all,
that His message comes through somehow. The question is whether it comes
through immediately to every individual, or is contained in a complex
canon that must be interpreted by experts in consultation with one another,
or is transmitted directly through appointed representatives who are free
to interpret, extend and modify the canon. If God's message is indeed
mediated, the further problem arises as to whether the individual under-
stands the mediated message fully and clearly. Since the responsibility
for understanding lies ultimately with the individual, we must assume that
God in His benevolence guides each individual to the appropriate source
for that individual, whereof the person may or may not drink.
>>Metaphysically, if there are multiple moral codes then there is no
>>Absolute moral code, and I think this is theologically questionable.
>No. There may be an absolute moral code. There are undoubtably multiple
>moral codes. The multiple moral codes may be founded in the absolute moral
>code. As an example, a parent may tell a child never to swear, and the child
>may assume that the parent never swears simply because the parent has told
>the child that it is "wrong". Now, the parent may swear like a trooper in
>the pub or bar (where there are no children). The "wrongness" here is if
>the child disobeys the parent. The parent may feel that it is "inappropriate"
>to swear in front of children but may be quite happy to swear in front of
>animals. The analogy does not quite hold water because the child knows that
>he is of the same type as the parent (and may be a parent later in life) but
>you get the gist of it? Incidentally, the young child considers the directive
>as absolute until he gets older (see Piaget) and learns a morality of his own.
Your example is complicated in our age by the thin line between morality
and politeness. You might have said "burp", for burping and swearing carry
about the same stigma today. If you are talking about "taking the Lord's
name in vain" as a serious transgression, then this example is more a case of
hypocrisy than of varying moral codes.
If there is an absolute moral code, propositions or laws in that code apply
absolutely and universally, by definition. Conceivably some moral codes
could be subsets of the universal code, as you say at the outset. So, for
example, God's code could include, "Thou shalt not create Beings without
a hospitable planet to live on", but this law would be inapplicable to us.
Nevertheless, we would be entitled to suppose that all laws applicable
to us are also applicable to God.
But when you begin to ask what laws might appear in God's moral code, you have
a sense of the absurdity of the question. Does God make laws for Himself to
follow? Perhaps God is not the sort of being to which the category "morality"
can be sensibly applied.
--
James Owens ad354@Freenet.carleton.ca
Ottawa, Ontario, Canada
|
5927 | From: wyman@rtsg.mot.com (Mark S. Wyman)
Subject: Re: AMD i486 clones: Now legal in US?!?!?!
Nntp-Posting-Host: lead17
Organization: Motorola Inc., Cellular Infrastructure Group
Distribution: na
Lines: 12
poe@wharton.upenn.edu writes:
>A friend of mine called me on the phone and told me he was wathcing CNN
>and saw a report that the ruling prohibiting AMD from selling their i486
>clones has been thrown out, making it legal for AMD to ship in the US.
>Can anyone out there verify this?
>Thanks in advance
>Phil
Yep, this was on the news. Great news for consumers. Bad news
for Intel.
|
5928 | From: Steve Bollinger <buzz@apple.com>
Subject: Re: Stereo sound problem (?) on mac games
X-Useragent: Nuntius v1.1.1d20
X-Xxdate: Mon, 19 Apr 93 19:34:37 GMT
X-Xxmessage-Id: <A7F83ECD5E013847@pyd.apple.com>
Organization: Apple Computer, Inc.
Lines: 192
In article <1qsfak$skc@network.ucsd.edu> Doug P. Book,
dpb@sdchemw2.ucsd.edu writes:
>Hi. I think I have a problem with the stereo sound output on my Quadra
>900, but I am not totally sure because my roomate has the same problem
>on his PowerBook 170. Any info or experience anyopne has would be
>greatly appreciated.
>
>When I hook my Quadra up to my home stereo system, the following types
>of sounds (mono, as far as I can tell) all play fine through BOTH
>speakers:
>
>system beeps (already provided ones such as Indigo and ones I record)
>
>Armor Alley
>Spectre
>Spaceward Ho!
>
>
>But, the following games only play out of the left channel:
>
>Lemmings
>Out of This World (awesome game, BTW)
>Glider 4.0
>OIDS
>
>
>But still, STEREO system beeps do play in stereo, through BOTH speakers.
>(The one I'm specifically referrring to is Apocolyptic Beginning, which
>my roommate downloaded from some ftp site (sumex?))
>
>
>All of the symptoms are the same on my rommates 170 (he can't run
>OOTW because he doesn't have color).
>
>We're both running system 7.1
>
>
>
>Does anyone with Lemmings or the other three games I mentioned above get
>sound out of both speakers on a Mac II class, Quadra, LC, PowerBook 140
or
>greater, Centris, SE/30, etc... (stereo) machine?
>
>I used to have a Mac II, and I sort of rememeber Lemmings playing in
>stereo on that machine, not just on the left channel. (I could be
>mistaken, though. If there were a problem with the Quad 900's and PB
>170's, I am wondering why the system beeps still play in stereo? If
there
>isn't a problem with our machines, I wonder why the 4 games above are
>apparantly written to support only one channel of stereo when they
>could just use mono sounds so the mono sound would at least come out of
>both speakers (like Spectre, etc. do)?
>
>Quadra 900's and PowerBook 170's have the same ROMS (to my knowledge),
>so maybe this is a ROM problem? (if so, though, why wouldn't System 7.1
>patch over this problem?)
>
>
>
>
>Thanks for any help you can provide!
In article <1993Apr18.213827.9974@kth.se> Jon Wtte,
d88-jwa@hemul.nada.kth.se writes:
>Mac sound hardware is diverse; some macs play in stereo and
>mix the output (the SE/30 for instance) while others play in
>stereo but ONLY has the left channel for the speaker, while
>some are "truly" mono (like the LC)
>
>Developers know that stuff played in the left channel is
>guaranteed to be heard, while the right channel isn't. Some
>send data to both, some only send data to the left channel
>(the first is preferrable, of course)
Okay, I guess its time for a quick explanation of Mac sound.
The original documentation for the sound hardware (IM-3) documents how to
make sound by directly accessing hardware. Basically, you jam values
into all the even bytes from SoundBase to SoundBase+0x170. This was
because
of how the Mac 128 (and some later machines) generated sound was by
scanning
this block and D/Aing every even byte (the odd bytes went to the floppy on
some machines).
When the Mac II (and Apple Sound Chip) was invented, it was designed to
generate stereo sound. It was also designed to be compatible with we had
once
documented. So storing bytes at the even values at SoundBase meant "I
want to
play a mono sound" and so it was emulated. But Apple had since retracted
the
documentation on SoundBase and decided not to document the lowest layers
of
sound generation. So apple never explained where to stuff bytes if you
want
to make stereo sound.
Enter game developers. The sound driver and current sound manager are
inconveniently lame for making games. Furthermore, people who port from
the
IBM don't want to learn more APIs. So, it has become popular for game
writers to write to SoundBase to make sound, since it is very easy.
Since the Mac II, Apple has had many different kind of sound output
hardware,
and the only things they have in common are that writing to SoundBase
works.
On some hardware, (Mac II, IIx, IIcx, IIci at least), writing to SoundBase
gets you mono sound through both speakers. On some Macs (Quadra
700/900/950
at least) writing to SoundBase gets you mono sound on the left channel
only.
Both are technically correct interpretations of the original
specification,
but one is obviously preferable for asthetic reasons.
If developers use the Sound Manager (and I think the sound driver), mono
sounds will (typically) come out through both channels regardless of the
underlying hardware. It is possible to specify you want to generate left
channel only, but no one does. If developers write to sound base, their
games will only come out the left on some games.
The other problem, the original Mac II only producing left channel sound
on the internal speaker, while the SE/30 mixes both, isn't really related.
It is due to the post generation amplification used on the motherboards of
the different machines. It only affects true stereo sounds. Sounds which
are actually mono, will play on the internal speaker, no matter what
machine
you have.
Now, to more directly address the question, the games you list:
>Lemmings
>Out of This World (awesome game, BTW)
>Glider 4.0
>OIDS
and also
Hellcats,
Super Tetris
Oxyd
(and many more, these are just what I've tested)
Cheat and write to SoundBase and so are only left channel on Quadras.
Other games you list:
>Armor Alley
>Spectre
>Spaceward Ho!
and also
PGA Tour Golf
Civilization
(and more, these are again only from personal experience)
Use the sound manager and work fine on all machines.
The more of the story is to developers: DON'T CHEAT!
Really, I am absolutely, positively not allowed to do what I am about to
do,
but I'm going say it anyway.
Stop cheating on sound!
Really soon, you will be sorry, as even those without external speakers
will be disappointed with your sound on future hardware. The grace period
is about to end.
The Sound Manager is understandable now, and works pretty well and will
work
even better soon, so use it.
In conclusion:
To Doug, it isn't a hardware problem, at least, not a bug.
To Jon, it isn't a choice to developers as to whether they want to send
sound
to both channels. If they do it the right way, it is taken care of
automatically. If you cheat, there is not way to make it work on all
hardware.
Have fun.
Disclaimer number 1:
I don't work on sound here at Apple, I'm just pretty well informed.
So don't write me with sound questions.
Disclaimer number 2:
If it says up above that I wrote anything like "the grace period is about
to end" then it is a bug in your news feed, since I am catagorically not
allowed to say anything like that. You know what I mean.
Disclaimer number 3:
I don't speak for Apple, just me.
-Steve Bollinger
|
5929 | From: jennise@opus.dgi.com (Milady Printcap the goddess of peripherals)
Subject: Looking for a little research help [ addendum]
Organization: Dynamic Graphics Inc.
Lines: 10
Distribution: usa
NNTP-Posting-Host: opus.dgi.com
Sorry but I forgot this ps.
Right now my sight is getting news about two weeks behind so it's
kind of necessary (to me) that any responses be sent to me directly.
Thanks a lot
Jennise
jennise@dgi.com
|
5930 | Subject: McRae is (Re: Torre: The worst manager?)
From: scott@mccall.com (Scott D. Davis)
Reply-To: scott@mccall.com (Scott D. Davis)
Organization: The McCall Pattern Co., Manhattan, KS, USA
Nntp-Posting-Host: mis2
Nntp-Posting-User: scott
Lines: 18
In article <16BB1C589.DAK988S@vma.smsu.edu.Ext>, DAK988S@vma.smsu.edu writes:
>gt7469a@prism.gatech.EDU (Brian R. Landmann) writes:
>>Joe Torre has to be the worst manager in baseball.
>>brian, a very distressed cardinal fan.
>No....Hal McRae is the worst manager in baseball. I've never seen a guy who
>can waste talent like he can. One of the best raw-talent staffs in the league,
>and he's still finding a way to lose. I'll be surprised if he makes it through
>the next 2 weeks, unless drastic improvement is made.
>
KC(?) news was doing a report on that. They said that McRae is
really a batting coach and not a manager. But for some reason
he took the job. Whatever the reason, the Royals need a new
manager now...while it is too late.
--
Scott D. Davis <scott@mccall.com> The McCall Pattern Company
(uucp: ...!widener!depot!mccall!scott) 615 McCall Road
(800)255-2762, in Kansas (913)776-4041 Manhattan, KS 66502, USA
|
5931 | From: hudson@athena.cs.uga.edu (Paul Hudson Jr)
Subject: Re: Religion and homosexuality
Keywords: being liberal
Organization: University of Georgia, Athens
Distribution: usa
Lines: 18
In article <1993Apr5.182411.7621@midway.uchicago.edu> dsoconne@midway.uchicago.edu writes:
>First of all as far as I know, only male homosexuality is explicitly
>mentioned in the bibles, so you're off the hook there,
Actually, there is one condemnation of lesbian acts in the Bible, Romans
1:26.
I think. In
>any event, there are *plenty* of people in many denominations who
>do not consider a person's sexual identification of gay/lesbian/bisexual
>as an "immoral lifestyle choice"
There are plenty who don't read the Bible.
Or pray for that matter.
Link Hudson.
|
5932 | From: kaveh@gate-koi.corp.sgi.com (Kaveh Smith )
Subject: Jews/Islam Dr. Frankenstien
Nntp-Posting-Host: gate-koi.corp.sgi.com
Reply-To: kaveh@gate-koi.corp.sgi.com (Kaveh Smith )
Organization: Silicon Graphics, Inc., Mountain View, CA, USA
Lines: 49
I have found Jewish people very imagentative and creative. Jewish religion was the foundation for Christianity and
Islam. In other words Judaism has fathered both religions. Now Islam has turned against its father I may say.
It is Ironic that after communizem threat is almost gone, religion wars are going to be on the raise.
I thought the idea of believing on one God, was to Unite all man kind. How come both Jews and Islam which believe
on the same God, "the God of Ebrahim" are killing each other? Is this like Dr. Frankenstien's story?
How are you going to stop this from happening? How are you going to deal with so many Muslims. Nuking them
would distroy the whole world? Would God get mad, since you have killed his followers, you believe on the same
God, same heaven and the same hell after all? What is the peacefull way of ending this Saga?
Man kind needs religion, since it sets up the rules and the regulations which keeps the society in a healthy state.
A religion is mostly a sets of rules which people have experienced and know it works for the society.
The praying, keeps the sole healthy and meditates it. God does not care for man kinds pray, but man kind hopes
that God will help him when he prays.
Religion works mostly on the moral issues and trys to put away the materialistic things in the life. But the
religious leaders need to make a living through religion? So they may corrupt it, or turn it to their own way to
make their living. i.e Muslims have to pay %20 percent of their income to the Mullahs. I guess the rabie gets his
cut too!
Is in it that religion should be such that everybody on planet earth respects each other, be good toward each other
helps one another, respect the mother nature. Is in that heaven and hell are created on earth through the acts
that we take today? Is in it that within every man there is good and bad, he could choose either one, then he will
see the outcome of his choice. How can we prevent man kind from going crazy over religion. How can we stop
another religious killing field, under poor Gods name? What are your thoughts? Do you think man kind would
to come its senses, before it is too late?
P.S. on the side
Do you think that Moses saw the God on mount Sina? Why would God go to top of the mountain? He created
the earth, he could have been anywhere? why on top the mountain? Was it because people thought to see God
you have to reach to the skies/heavens? Why God kept coming back to Middle East? Was it because they created
God through their imagination? Is that why Jewish people were told by God, they were the chosen ones?
Profit Mohammad was married to Khadijeh. She was a Jewish. She taught him how to trade. She probably taught
him about Judaism. Quran is mostly copy right of Taurah (sp? old testement). Do you think God wrote Quran?
Makeh was a trade city before Islam. Do you think it was made to be the center of Islamic world because Mohammad
wanted to expand his trade business? Is that why God has put his house in there?
I think this religious stuff has gone too far. All man kind are going to hurt from it if they do not wise up.
Look at David Koresh, how that turned out? I am afraid in the bigger scale, the Jews and the Muslims will
have the same ending!!!!!!!!
Religion is needed in the sense to keep people in harmony and keep them doing good things, rather than
plotting each others distruction. There is one earth, One life and one God. Let's all man kind be good toward
each other.
God help us all.
Peace
|
5933 | From: ab@nova.cc.purdue.edu (Allen B)
Subject: Re: Fractals? What good are they ?
Organization: Purdue University
Lines: 16
In article <mdpyssc.2@fs1.mcc.ac.uk> mdpyssc@fs1.mcc.ac.uk (Sue Cunningham)
writes:
> We have been using Iterated Systems compression board to compress
> pathology images and are getting ratios of 40:1 to 70:1 without too
> much loss in quality. It is taking about 4 mins per image to compress,
> on a 25Mhz 486 but decompression is almost real time on a 386 in software
> alone.
How does that compare with JPEG on the same images and hardware as far
as size, speed, and image quality are concerned?
Despite my skeptical and sometimes nearly rabid postings
criticizing Barnsley and company, I am very interested in the
technique. If I weren't I probably wouldn't be so critical. :-)
ab
|
5934 | From: dcoleman@utxvms.cc.utexas.edu (Daniel M. Coleman)
Subject: Re: Gateway 2000 and ATI LB problem.
Lines: 37
Nntp-Posting-Host: gray.cc.utexas.edu
Organization: The University of Texas at Austin
Lines: 37
In article <jmgree01.734040660@starbase.spd.louisville.edu>, jmgree01@starbase.spd.louisville.edu (Jude M. Greer) writes:
> I was wondering if anyone out there has had the same problem I am having with
> my Gateway 2000 486-33DX VL-Bus system with ATI Graphics Ultra Pro LB.
> When I have my computer in any resolution other than 800x600, everything is
> fine, but whenever I use it in 800x600 (Windows, AutoCAD, GIFs) the screen
> gets about 1 1/2 inches shorter. At the very top and very bottom of the screen
> there is about a 3/4" bar of black. The screen isn't cut off, it just squeezes
> everything into the smaller space and messes up the aspect ratio. While I can
> manually change the V-Size on the back, this is a pain in the ass, and it just
> shouldn't happen anyway. I've called Gateway numerous times and they haven't
> been able to help me at all. Two different times they sent me a new card, and
> both times the new card didn't work at all in my computer. They even tried
> to bill me for the first card because they didn't get it back in a couple of
> days, when they TOLD me over the phone that they would wait more than 2 weeks
> before billing my card. But their customer support is a different story...
> So, if anyone has had this same problem, please let me know if you know what
> to do. Hell, let me know if you don't have a solution, just so I know I'm
> not the only one with this problem. Thanks in advance.
>
> Jude M. Greer
> jmgree01@starbase.spd.louisville.edu
>
> P.S. I already tried going into the MACH 32 install program and manually set-
> ting up the card. Doesn't work. Whenever I try to increase the vertical size
> of the 800x600 screen, it just starts to cut off the top and bottom.
>
Maybe its a monitor problem. You mentioned that you swapped cards, but not
monitors. Perhaps that could be it.
Dan
--
Daniel Matthew Coleman | Internet: dcoleman@utxvms.cc.utexas.edu
-----------------------------------+---------- : dcoleman@ccwf.cc.utexas.edu
The University of Texas at Austin | DECnet: UTXVMS::DCOLEMAN
Electrical/Computer Engineering | BITNET: DCOLEMAN@UTXVMS [.BITNET]
|
5935 | From: hlu@luke.eecs.wsu.edu (HJ Lu)
Subject: Re: Debugging possible hardware problems
Article-I.D.: serval.1993Apr20.151405.12480
Organization: Washington State University!
Lines: 54
In article <1r0rslINNnv2@senator-bedfellow.MIT.EDU> jfc@athena.mit.edu (John F Carr) writes:
>
>I'm running Linux on an 80486 EISA system, and I'm having what I think are
>hardware problems. It could be software, but I don't see why I'd be the
>only one having trouble. I'd like some advice on how best to debug this.
>
>The symptom: when I try to build gcc, I get unpredictable and unrepeatable
>results. Sometimes a .o file is not in valid a.out format. Recompiling the
>file gives me a valid binary. Sometimes the compiler aborts or dumps core,
>but works fine when run again with the same input. Compiling the same
>source files with the same arguments gives slight differences in a few
>object files. (Note that Linux, unlike many other systems, does not put
>timestamps in object files so compiling twice should give bit-identical
>results.)
>
>I also have occasional filesystem corruption on my SCSI drive, but that
>could be caused by using development software. It could also be related to
>my problems compiling. The compile problems are not caused by disk
>problems: I get the same results whether I do my work on an IDE or SCSI
>disk.
>
>I've set the memory speed and cache write speed to the recommended values.
Recommended for what, DOS? That is a junk.
>
>I suspect the external cache, but I have no real evidence for this.
>
>The motherboard is a NICE Super-EISA with 256 KB write-back cache and a DX/2
>66 Mhz processor.
>
>What I'm looking for:
>
> . A system test program to run under DOS or Linux
Linux + gcc. Fire up gcc to compile libc and kernel at the
same time running X11R5.
>
> . Suggestions about the cause of the problem
Bad memory, bad motherboard, bad cache.
>
> . Suggestions about how to debug the problem
>
change wait state of RAM.
turn off turbo.
change bus speed
swap RAM.
H.J.
|
5936 | From: "james kewageshig" <james.kewageshig@canrem.com>
Subject: articles on flocking?
Reply-To: "james kewageshig" <james.kewageshig@canrem.com>
Organization: Canada Remote Systems
Distribution: comp
Lines: 17
HI All,
Can someone point me towards some articles on 'boids' or
flocking algorithms... ?
Also, articles on particle animation formulas would be nice...
________________________________________________________________________
|0 ___ ___ ____ ____ ____ 0|\
| \ \// || || || James Kewageshig |\|
| _\//_ _||_ _||_ _||_ UUCP: james.kewageshig@canrem.com |\|
| N E T W O R K V I I I FIDONET: James Kewageshig - 1:229/15 |\|
|0______________________________________________________________________0|\|
\________________________________________________________________________\|
---
þ DeLuxeý 1.25 #8086 þ Head of Co*& XV$# Hi This is a signature virus. Co
--
Canada Remote Systems - Toronto, Ontario
416-629-7000/629-7044
|
5937 | From: carlos@beowulf.Jpl.Nasa.Gov (Carlos Carrion)
Subject: Re: The Role of the National News Media in Inflaming Passions
Organization: Jet Propulsion Laboratory, Pasadena, CA
Lines: 20
Distribution: ca
NNTP-Posting-Host: beowulf.jpl.nasa.gov
In article <15377@optilink.COM> cramer@optilink.COM (Clayton Cramer) writes:
>I'm sick of it. This continual effort to inflame the passions
>of Americans by playing every trial as completely sexist, racist,
>or gay-bashing, when the realities are seldom this simple. This
>is what happens when a society becomes tied up in ideologies.
I have come to the conclusion that the TV stations here in LA
WANT a riot to happen when the verdict comes in.
In a not so subtle way they are preparing their audience for the
worst and even going so far as to want SOMETHING to happen for
their viewers with all their commercials and their "we are ready
for anything so watch US" messages...
carlos.
"I as much as any other man am in favor of having the superior position
assigned to the white race" - Abraham Lincoln
...ames!elroy!jpl-devvax!{beowulf|pituco}!carlos
|
5938 | From: arromdee@jyusenkyou.cs.jhu.edu (Ken Arromdee)
Subject: Re: Davidians and compassion
Organization: Johns Hopkins University CS Dept.
Lines: 16
In article <sandvik-190493200420@sandvik-kent.apple.com> sandvik@newton.apple.com (Kent Sandvik) writes:
>So we have this highly Christian religious order that put fire
>on their house, killing most of the people inside.
We have no way to know that the cultists burned the house; it could have been
the BATF and FBI. We only have the government's word for it, after all, and
people who started it by a no-knock search with concussion grenades are hardly
disinterested observers.
--
"On the first day after Christmas my truelove served to me... Leftover Turkey!
On the second day after Christmas my truelove served to me... Turkey Casserole
that she made from Leftover Turkey.
[days 3-4 deleted] ... Flaming Turkey Wings! ...
-- Pizza Hut commercial (and M*tlu/A*gic bait)
Ken Arromdee (arromdee@jyusenkyou.cs.jhu.edu)
|
5939 | From: prb@access.digex.com (Pat)
Subject: Re: Shuttle oxygen (was Budget Astronaut)
Organization: Express Access Online Communications USA
Lines: 11
NNTP-Posting-Host: access.digex.net
I thought that under emergency conditions, the STS can
put down at any good size Airport. IF it could take a C-5 or a
747, then it can take an orbiter. You just need a VOR/TAC
I don't know if they need ILS.
pat
ANyone know for sure.
|
5940 | From: michael@jester.GUN.de (Michael Gerhards)
Distribution: world
Subject: Re: com ports /modem/ mouse conflict -REALLY?
X-Newsreader: TIN [version 1.1 PL8]
Organization: private COHERENT system
Lines: 20
Phil Hunt (phil@howtek.MV.COM) wrote:
> I'm kind of new at the pc stuff. My machine has 4 serial ports. Com 1 and3
> and 2 &4 share same IRQs. You mean I can't plug a mouse into Com1 and a modem
> into com3 and expect both to work?
No, but some OS's ( COHERENT , etc ) are able to drive one of the ports in
polled mode without using the IRQ. In your example, after accessing the
modem, the mouse won't work until you reboot, because the IRQ is used by
the modem.
> If Answer is NO, should I change IRQ's for com ports to be different? And,
> does it really matter which IRQ I set the ports too?
Yes, you can change the IRQ's for com3/4, but it depends on your other
hardware. com1 uses IRQ4, com2 IRQ3. If you have only one printerport
( IRQ7 ), you can change com3 to IRQ5 ( normally 2nd printer ). For com4,
you can assign IRQ2, if its free. As far as I know, no other IRQ can be
used until your I/O-card is 16bit and caould access IRQ's > 8.
Michael
--
* michael@jester.gun.de * Michael Gerhards * Preussenstrasse 59 *
* Germany 4040 Neuss * Voice: 49 2131 82238 *
|
5941 | From: drlovemd@jhuvms.hcf.jhu.edu (Steve Liu)
Subject: What is the current Rom Version shipping in Syquest drives?
Organization: The Johns Hopkins University - HCF
Lines: 4
Distribution: world
NNTP-Posting-Host: jhuvms.hcf.jhu.edu
News-Software: VAX/VMS VNEWS 1.41
The title says it all. I need to know the 44, 88, and 88c rom versions.
Steve :-)
|
5942 | From: mikgr@wpsun4.UUCP (Michael Grant)
Subject: Re: COMMENTS ==> VIDEO BLASTER (Creative Labs)
Organization: WordPerfect Corporation, Orem UT
Lines: 42
In article <1993Apr14.062219.11573@ultb.isc.rit.edu>, mej0381@ritvax.isc.rit.edu writes:
> >In <115080@bu.edu> heiser@acs2.bu.edu (Bill Heiser) writes:
> >
> >>In article <C4rDy0.Fw9@chinet.chi.il.us> randy@chinet.chi.il.us (Randy Suess) w
> >rites:
> >>>>The video blaster doesn't work with the ATI GRaphics Ultra Pro, doesn't work
> >>>>with >15M system RAM.
> >
> >>Are you serious? So I can't use a Video Blaster in my 16mb 486/33?
> >>What are the alternatives (other than removing memory?)
> >
> >Get a better one. Hows about the Win/TV thing?
> >--
> >The Wailer at the Gates of Dawn | banshee@cats.UCSC.EDU |
> >Just who ARE you calling a FROOFROO Head? | |
> >oD#0667 "Just a friend of the beast." | banshee@ucscb.UCSC.EDU |
> >2,3,5,7,13,17,19,31,61,89,107,127,521,607....| banshee@ucscb.BITNET |
>
> No good. I perfer WatchIT TV. It can run in DOS and Windows. Win/Tv only run in
> windows. Sorry....
>
> --
Still no good. WatchIT TV will not work on a with local bus video.
It will not work in any high reolution modes either. The people who
make the card assure me that they will have a card available in June
that supports both local-bus and hi-res. BTW does anyone know the
name of the company who makes watchit tv? Phone #? BBS? Internet?
Thanks
Michael Grant
(mikgr@wordperfect.com) or
(mikgr@wpsun4.uunet.uu.net)
|
5943 | From: cobb@alexia.lis.uiuc.edu (Mike Cobb)
Subject: Christian Morality is
Organization: University of Illinois at Urbana
Lines: 51
In <11836@vice.ICO.TEK.COM> bobbe@vice.ICO.TEK.COM (Robert Beauchaine) writes:
>In article <C5L1Ey.Jts@news.cso.uiuc.edu> cobb@alexia.lis.uiuc.edu (Mike
Cobb) writes:
>>In <11825@vice.ICO.TEK.COM> bobbe@vice.ICO.TEK.COM (Robert Beauchaine)
writes:
>>
>>
>>> Actually, my atheism is based on ignorance. Ignorance of the
>>> existence of any god. Don't fall into the "atheists don't believe
>>> because of their pride" mistake.
>>
>>How do you know it's based on ignorance, couldn't that be wrong? Why would it
>>be wrong
>>to fall into the trap that you mentioned?
>>
> If I'm wrong, god is free at any time to correct my mistake. That
> he continues not to do so, while supposedly proclaiming his
> undying love for my eternal soul, speaks volumes.
What are the volumes that it speaks besides the fact that he leaves your
choices up to you?
> As for the trap, you are not in a position to tell me that I don't
> believe in god because I do not wish to. Unless you can know my
> motivations better than I do myself, you should believe me when I
> say that I earnestly searched for god for years and never found
> him.
I definitely agree that it's rather presumptuous for either "side" to give some
psychological reasoning for another's belief.
MAC
>/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
>Bob Beauchaine bobbe@vice.ICO.TEK.COM
>They said that Queens could stay, they blew the Bronx away,
>and sank Manhattan out at sea.
>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
--
****************************************************************
Michael A. Cobb
"...and I won't raise taxes on the middle University of Illinois
class to pay for my programs." Champaign-Urbana
-Bill Clinton 3rd Debate cobb@alexia.lis.uiuc.edu
With new taxes and spending cuts we'll still have 310 billion dollar deficits.
|
5944 | From: dclaar@cup.hp.com (Doug Claar)
Subject: Los Angeles Freeway traffic reports
Nntp-Posting-Host: hprtnyc.cup.hp.com
Organization: Hewlett-Packard
X-Newsreader: TIN [version 1.1 PL8.9]
Lines: 4
oops, that's KNX 1070. KNBR is up in 'Frisco, and down at 680.
==Doug "San Fran can't be 'the city': Jack Webb told me so" Claar
|
5945 | From: lvc@cbnews.cb.att.com (Larry Cipriani)
Subject: Re: Need info on 43:1 and suicide for refutation
Organization: Ideology Busters, Inc.
Distribution: usa
Lines: 203
Here's something Preston Covey (professor of ethics at CMU) wrote:
From: "Preston K. Covey" <covey+@andrew.cmu.edu>
Subject: Gun Stats & Mortal Risks
Date: Mon, 15 Feb 1993 18:35:05 -0500 (EST)
Folks,
Hail from the nether world. On February 4th, the Wall Street Journal
carried a front-page article by Erik Larson entitled "Armed Force." I
felt a reply was in order to his citation of the notorious scare stat
that "A Gun is 43 times more likely to kill than to protect." I sent
the following to the WSJ.
-----
Gun Stats & Mortal Risks
Preston K. Covey
Erik Larson~s even-handed article on Paxton Quigley (~Armed Force,~
2/4/93, WSJ) cites the world~s most notorious ~statistic~ regarding guns
in the home: ~A pioneering study of residential gunshot deaths in King
County, Washington, found that a gun in the home was 43 times more
likely to be used to kill its owner, spouse, a friend or child than to
kill an intruder.~ The ~43 times~ stat is everywhere these days; it
has grown in media lore like the proverbial urban myth: it was inflated
by one pugilistic talk-show pundit to ~93.~ Given the shock value of
the finding, the conclusion of the 1986 New England Journal of Medicine
(NEJM) study is remarkably understated: ~The advisability of keeping
firearms in the home for protection must be questioned.~
Responsible people should indeed question the risks and benefits of
bringing a firearm into their home. But what we need to know is this:
What exactly are the risks and benefits? The NEJM testimony is neither
the whole truth about the benefits nor nothing but the truth about the
risks. Further, as with motor vehicles, we want to know: What control
do we have over the risks and benefits? And, as with the risks of
cancer or heart disease or auto accidents: How can we minimize the
risks? Like raw highway death tolls, the NEJM stat is not very helpful
here.
The NEJM finding purports to inform us, but it is framed to warn us
off. It is widely promulgated in the media as a ~scare stat,~ a
misleading half-truth whose very formulation is calculated to prejudice
and terrify. The frightful statistic screams for itself: The risks far
outweigh the benefits, yes? What fool would run these risks? If your
car were 43 times more likely to kill you, a loved one, a dear friend or
an innocent child than to get you to your destination, should you not
take the bus?
Uncritical citation puts the good name of statistics in the bad company
of lies and damned lies. Surely, we can do better where lives are at
stake. Let~s take a closer look at this risky business:
The ~43 times~ stat of the NEJM study is the product of dividing the
number of home intruders/aggressors justifiably killed in self-defense
(the divisor) into the number of family members or acquaintances killed
by a gun in the home (the dividend). The divisor of this risk equation
is 9: in the study~s five-year sample there were 2 intruders and 7 other
cases of self-defense. The dividend is 387: in the study there were 12
accidental deaths, 42 criminal homicides, and 333 suicides. 387 divided
by 9 yields 43. There were a total of 743 gun-related deaths in King
County between 1978 and 1983, so the study leaves 347 deaths outside of
homes unaccounted.
The NEJM~s notorious ~43 times~ statistic is seriously misleading on
six counts:
1. The dividend is misleadingly characterized in the media: the ~or
acquaintances~ of the study (who include your friendly drug dealers and
neighborhood gang members) is equated to ~friends.~ The implication is
that the offending guns target and kill only beloved family members,
dear friends, and innocent children. Deaths may all be equally tragic,
but the character and circumstance of both victims and killers are
relevant to the risk. These crucial risk factors are masked by the
calculated impression that the death toll is generated by witless
Waltons shooting dear friends and friendly neighbors. This is
criminological hogwash.
2. The study itself does not distinguish households or environs
populated by people with violent, criminal, or substance-abuse histories
-- where the risk of death is very high -- versus households inhabited
by more civil folk (for example, people who avoid high-risk activities
like drug dealing, gang banging and wife beating) -- where the risk is
very low indeed. In actuality, negligent adults allow fatal but
avoidable accidents; and homicides are perpetrated mostly by people with
histories of violence or abuse, people who are identifiably and
certifiably at ~high risk~ for misadventure. To ignore these obvious
risk factors in firearm accidents and homicides is as misleading as
ignoring the role of alcohol in vehicular deaths: by tautology, neither
gun deaths nor vehicular deaths would occur without firearms or
vehicles; but the person and circumstance of the gun owner or driver
crucially affect the risk.
3. One misleading implication of the way the NEJM stat is framed is
that the mere presence of a gun in the home is much more likely to kill
than to protect, and this obscures -- indeed, disregards -- the role of
personal responsibility. The typical quotation of this study (unlike
Larson~s) attributes fatal agency to the gun: ~A gun in the home is 43
times as likely to kill . . . .~ (The Center to Prevent Handgun
Violence, a major promulgator of the NEJM statistic, uses this
particular formulation.) We can dispense with the silly debate about
whether it~s people or guns that accomplish the killing: again, by
tautology, gun deaths would not occur without the guns. The question
begged is how many deaths would occur anyway, without the guns. In any
case, people are the death-dealing agents, the guns are their lethal
instruments. The moral core of the personal risk factors in gun deaths
are personal responsibility and choice. Due care and responsibility
obviate gun accidents; human choice mediates homicide and suicide (by
gun or otherwise). The choice to own a gun need not condemn a person to
NEJM~s high-risk pool. The gun does not create this risk by itself.
People have a lot to say about what risk they run with guns in their
homes. For example, graduates of Paxton Quigley~s personal protection
course do not run the touted ~43 times~ risk any more than skilled and
sober drivers run the same risks of causing or suffering vehicular death
as do reckless or drunk drivers. Undiscriminating actuarials disregard
and obscure the role of personal responsibility and choice, just as they
disregard and obscure the role of socio-economic, criminological and
other risk-relevant factors in firearm-related death. This is why we
resent insurance premiums and actuarial consigment to risk pools whose
norms disregard our individualities. Fortunately, nothing can consign
us to the NEJM risk pool but our own lack of choice or responsibility in
the matter.
4. Suicide accounts for 84% of the deaths by gun in the home in the
NEJM study. As against the total deaths by gun in King County,
including those outside the home, in-house suicides are 44% of the total
death toll, which is closer to the roughly 50% proportion found by other
studies. Suicide is a social problem of a very different order from
homicide or accidents. The implication of the NEJM study is that these
suicides might not occur without readily available guns. It is true
that attempted suicide by gun is likely to succeed. It is not obviously
true that the absence of a gun would prevent any or all of these
suicides. This is widely assumed or alleged, but the preponderance of
research on guns and suicide actually shows otherwise, that this is
wishful thinking in all but a few truly impulsive cases. (See: Bruce
L. Danto et al., The Human Side of Homicide, Columbia University Press,
1982; Charles Rich et al., ~Guns and Suicide,~ American Journal of
Psychiatry, March 1990.) If suicides were removed from the dividend of
the NEJM study~s risk equation, the ~43 times~ stat would deflate to
~six.~ The inclusion of suicides in the NEJM risk equation -- like the
causes, durability, or interdiction of suicidal intent itself -- is a
profoundly debatable matter. Quotations of the NEJM study totally
disregard this issue.
5. Citations of the NEJM study also mislead regarding the estimable
rate of justifiable and excusable homicide. Most measures, like the
NEJM homicide rate, are based on the immediate disposition of cases.
But many homicides initially ruled criminal are appealed and later ruled
self-defense. In the literature on battered women, immediate case
dispositions are notorious for under-representing the rate of
justifiable or excusable homicide. Time~s January 18, 1993, cover story
on women ~Fighting Back~ reported one study~s finding that 40% of women
who appeal have their murder convictions thrown out. Time~s July 17,
1989, cover story on a week of gun deaths reported 51% of the domestic
cases as shootings by abuse victims; but only 3% of the homicides were
reported as self-defense. In a May 14, 1990, update, Time reported
that 12% of the homicides had eventually been ruled self-defense. In
Time~s sample, the originally reported rate of self-defense was in error
by a factor of four. The possibility of such error is not acknowledged
by promulgators of the NEJM statistic.
6. While both the dividend and the product of the NEJM risk equation
are arguably inflated, the divisor is unconscionably misleading. The
divisor of this equation counts only aggressors who are killed, not
aggressors who are successfully thwarted without being killed or even
shot at. The utility of armed self-defense is the other side of the
coin from the harms done with guns in homes. What kind of moral idiocy
is it to measure this utility only in terms of killings ? Do we measure
the utility of our police solely in terms of felons killed -- as
opposed to the many many more who are otherwise foiled, apprehended, or
deterred? Should we not celebrate (let alone count ) those cases where
no human life is lost as successful armed defenses? The question posed
to media that cite the NEJM scare stat is this: Why neglect the
compendious research on successful armed defense, notably by
criminologist Gary Kleck (Point Blank: Guns and Violence in America ,
Aldine de Gruyter, 1992)?
Kleck~s estimations of the rate and risk of defensive firearm use are
based on victimization surveys as well as other studies: the rate is
high (about one million a year) and the risk is good (gun defenders fare
better than anyone, either those who resort to other forms of resistance
or those who do not resist). Dividing one million gun defenses a year
by 30,000 annual gun deaths (from self-defense, homicides, suicides, and
accidents) yields 33. Thus, we can construct a much more favorable
statistic than the NEJM scare stat:
A gun is 33 times more likely to be used to defend against assault or
other crime than to kill anybody.
Of course, Kleck~s critics belittle the dividend of this calculation;
what is good news for gun defenders is bad news for gun control. We
should indeed question the basis and method of Kleck~s high estimation
of defensive firearm use, as I have questioned the NEJM statistic.
Clearly, the issue of how to manage mortal risks is not settled by
uncritical citation of statistics. One thing troubles me still: we
can hardly escape the unquestioned NEJM scare stat in our media, but we
hardly ever find Kleck~s good work mentioned, even critically.
--
Larry Cipriani -- l.v.cipriani@att.com
|
5946 | From: kentiler@matt.ksu.ksu.edu (Kent P. Iler)
Subject: Comments on an accelerated Video Card for ISA bus
Organization: Kansas State University
Lines: 8
NNTP-Posting-Host: matt.ksu.ksu.edu
Hi,
I am looking to buy an accelerated video card for my 486 DX 50 with
ISA bus. I have a 14" SVGA NI monitor. I'm currently running
DOS 5.0 and windows 3.1, although I'm considering OS/2 in the
future. Can anyone make a suggestion for a video card that would
suit my needs? How is Diamond speedstar? Stealth? Etc....
Thanks.
--Kent
|
5947 | From: babb@sciences.sdsu.edu (J. Babb)
Subject: Re: Getting rid of screen wiggles?
Organization: SDSU - LARC
Lines: 42
Distribution: world
NNTP-Posting-Host: larc.sdsu.edu
In article <1qpj5t$itg@vela.acs.oakland.edu>, eabyrnes@vela.acs.oakland.edu
(Ed Byrnes) wrote:
>
> My monitor display has a bad case of the wigglies. I have a good ground. I
> live in an old house and I have replaced much of the wiring. I have two
> EMI filters on the computer, the monitor plugs into the computer. When
> fluorescent lights are on upstairs, the display jiggles, when motors run
> in the house, the display jiggles, when incandescent lights are on in the
> kitchen the display jiggles. I could bring a separate line from the
> breaker box, and use it only for the computer, would this do it? EMI
> doesn't only travel the 110 volt line though. Should I shield the back of
> the monitor? Ground a grid or plate?
> Your expertise is appreciated. Thanks very much! Ed Byrnes
Aaahh... a problem very near and dear to my heart. In our case, other
monitors cause this problem - the deflection coil of other monitors to be
specific. Have also seen a monitor backed up to a fuse panel exhibit this
problem. This sounds like your problem since flourescent lites, motors, etc
several 10s of feet away seem to me to be too far to cause it, but the
juice running to them must pass nearby your monitor. Fusebox on other side
of wall maybe?
We started spec'ing Panasonic CT-1331Y video monitors (3 switchable input
lines(vid & aud) S-VHS on one) <$400. This stopped the wavy interference
effect on the computer monitor next to it.
Now on to your problem. You need what is known as mu shielding (very
common, in fact almost mandatory on electrostatic deflection type
O'scopes).
I talked to a EE prof. He said get a coffee can, cut both ends off, mount
around deflection coil of interfering monitor.
BE CAREFUL TO AVOID ALL HIGH VOLTAGE CIRCUITRY. ESPECIALLY THE THICKER HIGH
VOLTAGE ANODE LEAD USUALLY COLORED RED. IF YOU KILL YOURSELF, DON'T
BLAME/SUE ME!!! USE PLASTIC OR OTHER NON-CONDUCTING STAND-OFFS AND SUCH TO
MOUNT CAN.
Now, I would assume that what is good for keeping mag fields in is also
good at keeping them out, so hopefully this'll work by mounting shield on
monitor being interfered with as well. If not, start shielding those other
sources.
Jeff Babb
babb@sciences.sdsu.edu babb@ucssun1.sdsu.edu
Programmer, SDSU - LARC
|
5948 | From: crypt-comments@math.ncsu.edu
Subject: Cryptography FAQ 08/10 - Technical Miscellany
Organization: The Crypt Cabal
Lines: 414
Expires: 22 May 1993 04:00:07 GMT
Reply-To: crypt-comments@math.ncsu.edu
NNTP-Posting-Host: pad-thai.aktis.com
Summary: Part 8 of 10 of the sci.crypt FAQ, Technical Miscellany.
Recovering Word Perfect passwords. Breaking Vigenerre ciphers.
Encrypting Unix files/email. Security of Unix `crypt' command.
Encryption and compression. Key management. Letter frequency.
The German Enigma code. Card shuffling. S/W piracy.
X-Last-Updated: 1993/04/16
Archive-name: cryptography-faq/part08
Last-modified: 1993/4/15
FAQ for sci.crypt, part 8: Technical Miscellany
This is the eighth of ten parts of the sci.crypt FAQ. The parts are
mostly independent, but you should read the first part before the rest.
We don't have the time to send out missing parts by mail, so don't ask.
Notes such as ``[KAH67]'' refer to the reference list in the last part.
The sections of this FAQ are available via anonymous FTP to rtfm.mit.edu
as /pub/usenet/news.answers/cryptography-faq/part[xx]. The Cryptography
FAQ is posted to the newsgroups sci.crypt, sci.answers, and news.answers
every 21 days.
Contents
* How do I recover from lost passwords in WordPerfect?
* How do I break a Vigenere (repeated-key) cipher?
* How do I send encrypted mail under UNIX? [PGP, RIPEM, PEM, ...]
* Is the UNIX crypt command secure?
* How do I use compression with encryption?
* Is there an unbreakable cipher?
* What does ``random'' mean in cryptography?
* What is the unicity point (a.k.a. unicity distance)?
* What is key management and why is it important?
* Can I use pseudo-random or chaotic numbers as a key stream?
* What is the correct frequency list for English letters?
* What is the Enigma?
* How do I shuffle cards?
* Can I foil S/W pirates by encrypting my CD-ROM?
* Can you do automatic cryptanalysis of simple ciphers?
* What is the coding system used by VCR+?
* How do I recover from lost passwords in WordPerfect?
WordPerfect encryption has been shown to be very easy to break.
The method uses XOR with two repeating key streams: a typed password
and a byte-wide counter initialized to 1+<the password length>. Full
descriptions are given in Bennett [BEN87] and Bergen and Caelli
[BER91].
Chris Galas writes: ``Someone awhile back was looking for a way to
decrypt WordPerfect document files and I think I have a solution.
There is a software company named: Accessdata (87 East 600 South,
Orem, UT 84058), 1-800-658-5199 that has a software package that will
decrypt any WordPerfect, Lotus 1-2-3, Quatro-Pro, MS Excel and Paradox
files. The cost of the package is $185. Steep prices, but if you
think your pw key is less than 10 characters, (or 10 char) give them a
call and ask for the free demo disk. The demo disk will decrypt files
that have a 10 char or less pw key.''
* How do I break a Vigenere (repeated-key) cipher?
A repeated-key cipher, where the ciphertext is something like the
plaintext xor KEYKEYKEYKEY (and so on), is called a Vigenere cipher.
If the key is not too long and the plaintext is in English, do the
following:
1. Discover the length of the key by counting coincidences.
(See Gaines [GAI44], Sinkov [SIN66].) Trying each displacement of
the ciphertext against itself, count those bytes which are equal.
If the two ciphertext portions have used the same key, something
over 6% of the bytes will be equal. If they have used different
key, then less than 0.4% will be equal (assuming random 8-bit bytes
of key covering normal ASCII text). The smallest displacement which
indicates an equal key is the length of the repeated key.
2. Shift the text by that length and XOR it with itself. This
removes the key and leaves you with text XORed with itself. Since
English has about 1 bit of real information per byte, 2 streams of
text XORed together has 2 bits of info per 8-bit byte, providing
plenty of redundancy for choosing a unique decryption. (And in fact
one stream of text XORed with itself has just 1 bit per byte.)
If the key is short, it might be even easier to treat this as a
standard polyalphabetic substitution. All the old cryptanalysis
texts show how to break those. It's possible with those methods, in
the hands of an expert, if there's only ten times as much text as key.
See, for example, Gaines [GAI44], Sinkov [SIN66].
* How do I send encrypted mail under UNIX? [PGP, RIPEM, PEM, ...]
Here's one popular method, using the des command:
cat file | compress | des private_key | uuencode | mail
Meanwhile, there is a de jure Internet standard in the works called
PEM (Privacy Enhanced Mail). It is described in RFCs 1421 through
1424. To join the PEM mailing list, contact pem-dev-request@tis.com.
There is a beta version of PEM being tested at the time of this
writing.
There are also two programs available in the public domain for encrypting
mail: PGP and RIPEM. Both are available by FTP. Each has its own
newsgroup: alt.security.pgp and alt.security.ripem. Each has its own FAQ
as well.
PGP is most commonly used outside the USA since it uses the RSA algorithm
without a license and RSA's patent is valid only (or at least primarily)
in the USA.
RIPEM is most commonly used inside the USA since it uses the RSAREF which
is freely available within the USA but not available for shipment outside
the USA.
Since both programs use a secret key algorithm for encrypting the body of
the message (PGP used IDEA; RIPEM uses DES) and RSA for encrypting the
message key, they should be able to interoperate freely. Although there
have been repeated calls for each to understand the other's formats and
algorithm choices, no interoperation is available at this time (as far as
we know).
* Is the UNIX crypt command secure?
No. See [REE84]. There is a program available called cbw (crypt
breaker's workbench) which can be used to do ciphertext-only attacks
on files encrypted with crypt. One source for CBW is [FTPCB].
* How do I use compression with encryption?
A number of people have proposed doing perfect compression followed by
some simple encryption method (e.g., XOR with a repeated key).
Unfortunately, you can only compress perfectly if you know the exact
distribution of possible inputs. For all practical purposes it's
impossible to describe ``the typical English text'' beyond coarse
characteristics such as single-letter frequencies. You can build up
more and more sophisticated models of your inputs, but if the enemy
has a slightly more accurate model, he'll be able to find some
redundancy in your compressed output.
Note that nearly all practical compression schemes, unless they
have been designed with cryptography in mind, produce output that
actually starts off with high redundancy. For example, the output of
UNIX compress begins with a well-known three-byte ``magic number''
that can serve as an entering wedge for cryptanalysis.
This is not to say that compression before encryption is inherently a
bad idea; it just has to be done very, very carefully, and by no means
removes the need for strong encryption.
Compression after encryption is silly.
* Is there an unbreakable cipher?
Yes. The one-time pad is unbreakable; see part 4. Unfortunately the
one-time pad requires secure distribution of as much key material as
plaintext.
Of course, a cryptosystem need not be utterly unbreakable to be
useful. Rather, it needs to be strong enough to resist attacks by
likely enemies for whatever length of time the data it protects is
expected to remain valid.
* What does ``random'' mean in cryptography?
Cryptographic applications demand much more out of a pseudorandom
number generator than most applications. For a source of bits to be
cryptographically random, it must be computationally impossible to
predict what the Nth random bit will be given complete knowledge of
the algorithm or hardware generating the stream and the sequence of
0th through N-1st bits, for all N up to the lifetime of the source.
A software generator (also known as pseudo-random) has the function
of expanding a truly random seed to a longer string of apparently
random bits. This seed must be large enough not to be guessed by
the opponent. Ideally, it should also be truly random (perhaps
generated by a hardware random number source).
Those who have Sparcstation 1 workstations could, for example,
generate random numbers using the audio input device as a source of
entropy, by not connecting anything to it. For example,
cat /dev/audio | compress - >foo
gives a file of high entropy (not random but with much randomness in
it). One can then encrypt that file using part of itself as a key,
for example, to convert that seed entropy into a pseudo-random
string.
When looking for hardware devices to provide this entropy, it is
important really to measure the entropy rather than just assume that
because it looks complicated to a human, it must be "random". For
example, disk operation completion times sound like they might be
unpredictable (to many people) but a spinning disk is much like a
clock and its output completion times are relatively low in entropy.
* What is the unicity point (a.k.a. unicity distance)?
See [SHA49]. The unicity distance is an approximation to that amount
of ciphertext such that the sum of the real information (entropy) in
the corresponding source text and encryption key equals the number
of ciphertext bits used. Ciphertexts significantly longer than this
can be shown probably to have a unique decipherment. This is used to
back up a claim of the validity of a ciphertext-only cryptanalysis.
Ciphertexts significantly shorter than this are likely to have
multiple, equally valid decryptions and therefore to gain security
from the opponent's difficulty choosing the correct one.
Unicity distance, like all statistical or information-theoretic
measures, does not make deterministic predictions but rather gives
probabilistic results: namely, the minimum amount of ciphertext
for which it is likely that there is only a single intelligible
plaintext corresponding to the ciphertext, when all possible keys
are tried for the decryption. Working cryptologists don't normally
deal with unicity distance as such. Instead they directly determine
the likelihood of events of interest.
Let the unicity distance of a cipher be D characters. If fewer than
D ciphertext characters have been intercepted, then there is not
enough information to distinguish the real key from a set of
possible keys. DES has a unicity distance of 17.5 characters,
which is less than 3 ciphertext blocks (each block corresponds to
8 ASCII characters). This may seem alarmingly low at first, but
the unicity distance gives no indication of the computational work
required to find the key after approximately D characters have been
intercepted.
In fact, actual cryptanalysis seldom proceeds along the lines used
in discussing unicity distance. (Like other measures such as key
size, unicity distance is something that guarantees insecurity if
it's too small, but doesn't guarantee security if it's high.) Few
practical cryptosystems are absolutely impervious to analysis; all
manner of characteristics might serve as entering ``wedges'' to crack
some cipher messages. However, similar information-theoretic
considerations are occasionally useful, for example, to determine a
recommended key change interval for a particular cryptosystem.
Cryptanalysts also employ a variety of statistical and
information-theoretic tests to help guide the analysis in the most
promising directions.
Unfortunately, most literature on the application of information
statistics to cryptanalysis remains classified, even the seminal
1940 work of Alan Turing (see [KOZ84]). For some insight into the
possibilities, see [KUL68] and [GOO83].
* What is key management and why is it important?
One of the fundamental axioms of cryptography is that the enemy is in
full possession of the details of the general cryptographic system,
and lacks only the specific key data employed in the encryption. (Of
course, one would assume that the CIA does not make a habit of telling
Mossad about its cryptosystems, but Mossad probably finds out anyway.)
Repeated use of a finite amount of key provides redundancy that can
eventually facilitate cryptanalytic progress. Thus, especially in
modern communication systems where vast amounts of information are
transferred, both parties must have not only a sound cryptosystem but
also enough key material to cover the traffic.
Key management refers to the distribution, authentication, and
handling of keys.
A publicly accessible example of modern key management technology
is the STU III secure telephone unit, which for classified use
employs individual coded ``Crypto Ignition Keys'' and a central Key
Management Center operated by NSA. There is a hierarchy in that
certain CIKs are used by authorized cryptographic control
personnel to validate the issuance of individual traffic keys and
to perform installation/maintenance functions, such as the
reporting of lost CIKs.
This should give an inkling of the extent of the key management
problem. For public-key systems, there are several related issues,
many having to do with ``whom do you trust?''
* Can I use pseudo-random or chaotic numbers as a key stream?
Chaotic equations and fractals produce an apparent randomness from
relatively compact generators. Perhaps the simplest example is a
linear congruential sequence, one of the most popular types of random
number generators, where there is no obvious dependence between seeds
and outputs. Unfortunately the graph of any such sequence will, in a
high enough dimension, show up as a regular lattice. Mathematically
this lattice corresponds to structure which is notoriously easy for
cryptanalysts to exploit. More complicated generators have more
complicated structure, which is why they make interesting pictures---
but a cryptographically strong sequence will have no computable
structure at all.
See [KNU81], exercise 3.5-7; [REE77]; and [BOY89].
* What is the correct frequency list for English letters?
There are three answers to this question, each slightly deeper than
the one before. You can find the first answer in various books:
namely, a frequency list computed directly from a certain sample of
English text. Of course any such list will be ``correctly'' computed,
but exactly which list you get depends on which sample was taken.
The second answer is that the question doesn't make sense. What do
you mean by ``English letters''? The ``English language'' is not a
fixed, finite, closed object that can be exactly characterized. It
has changed over time; it is different between different authors.
Any particular message will have different statistics from those of
the language as a whole.
The third answer is that yes, no particular message is going to have
exactly the same characteristics as English in general, but for all
reasonable statistical uses these slight discrepancies won't matter.
In fact there's an entire field called ``Bayesian statistics'' (other
buzzwords are ``maximum entropy methods'' and ``maximum likelihood
estimation'') which studies questions like ``What's the chance that a
text with these letter frequencies is in English?'' and comes up with
reasonably robust answers.
So make your own list from your own samples of English text. It will
be good enough for practical work, if you use it properly.
* What is the Enigma?
``For a project in data security we are looking for sources of
information about the German Enigma code and how it was broken by
the British during WWII.''
See [WEL82], [DEA85], [KOZ84], [HOD83], [KAH91].
* How do I shuffle cards?
Card shuffling is a special case of the permutation of an array of
values, using a random or pseudo-random function. All possible output
permutations of this process should be equally likely. To do this, you
need a random function (modran(x)) which will produce a uniformly
distributed random integer in the interval [0..x-1]. Given that
function, you can shuffle with the following [C] code: (assuming ARRLTH
is the length of array arr[] and swap() interchanges values at the two
addresses given)
for ( n = ARRLTH-1; n > 0 ; n-- ) swap( &arr[modran( n+1 )], &arr[n] ) ;
modran(x) can not be achieved exactly with a simple (ranno() % x) since
ranno()'s interval may not be divisible by x, although in most cases the
error will be very small. To cover this case, one can take ranno()'s
modulus mod x, call that number y, and if ranno() returns a value less
than y, go back and get another ranno() value.
* Can I foil S/W pirates by encrypting my CD-ROM?
Someone will frequently express the desire to publish a CD-ROM with
possibly multiple pieces of software, perhaps with each encrypted
separately, and will want to use different keys for each user (perhaps
even good for only a limited period of time) in order to avoid piracy.
As far as we know, this is impossible, since there is nothing in standard
PC or workstation hardware which uniquely identifies the user at the
keyboard. If there were such an identification, then the CD-ROM could be
encrypted with a key based in part on the one sold to the user and in
part on the unique identifier. However, in this case the CD-ROM is one
of a kind and that defeats the intended purpose.
If the CD-ROM is to be encrypted once and then mass produced, there must
be a key (or set of keys) for that encryption produced at some stage in
the process. That key is useable with any copy of the CD-ROM's data.
The pirate needs only to isolate that key and sell it along with the
illegal copy.
* Can you do automatic cryptanalysis of simple ciphers?
schneier@chinet.chi.il.us (Bruce Schneier) says: AccessData of Orem,
Utah sells products that break the password scheme of a number of
popular Macintosh and PC software packages. Their telephone number
is (801) 224-6970
No PD software has been cited but there are many papers on the
subject....
Peleg, S. and Rosenfeld, A. "Breaking Substitution Ciphers Using a
Relaxation Algorithm" Comm. ACM Vol. 22(11) pp 598-605 (Nov. 1979)
Lucks, Michael, "A Constraint Satisfaction Algorithm for the
Automated Decryption of Simple Substitution Ciphers", Advances in
Cryptology -- CRYPTO '88, Springer Lecture Notes in Computer
Science, vol. 403 (The paper also contains references to earlier
work on the subject.)
John Carrol and Steve Martin, "The Automated Cryptanalysis of
Substitution Ciphers", Cryptologia, vol X number 4, Oct 86 p193-209.
John Carrol and Lynda Robbins, "Automated Cryptanalysis of
Polyalphabetic Ciphers", Cryptologia, vol XI number 4, Oct 87
p193-205
Martin Kochanski, "A Survey of Data Insecurity Packages",
Cryptologia, vol XI number 1, Jan 87 p1-15
Martin Kochanski, "Another Data Insecurity Package", Cryptologia,
vol XII number 3, July 88, p165-177.
Cryptologia Vol XIII Number 4 1989 pp 303-326.
King and Bahler, "Probabilistic Relaxation in the Cryptanalysis of
Simple Substitution Ciphers" Cryptologia 16(3):215-225.
King and Bahler, "An Algorithmic Solution of Sequential Homophonic
Ciphers". Cryptologia, April 93 (in press).
R. Spillman et.al., "Use of Genetic Algorithms in Cryptanalysis of
Simple Substitution Ciphers", Cryptologia, vol XVII Number 1, Jan 93
p31-44.
* What is the coding system used by VCR+?
One very frequently asked question in sci.crypt is about how the VCR+ codes
work. The following article attempts to describe it.
K. Shirriff, C. Welch, A. Kinsman, "Decoding a VCR Controller Code,"
Cryptologia, 16(3), July 1992, pp 227-234.
|
5949 | From: rdippold@qualcomm.com (Ron "Asbestos" Dippold)
Subject: Re: text of White House announcement and Q&As on clipper chip encryption
Originator: rdippold@qualcom.qualcomm.com
Nntp-Posting-Host: qualcom.qualcomm.com
Organization: Qualcomm, Inc., San Diego, CA
Distribution: na
Lines: 12
ted@nmsu.edu (Ted Dunning) writes:
>nobody seems to have noticed that the clipper chip *must* have been
>under development for considerably longer than the 3 months that
>clinton has been president. this is not something that choosing
>choosing bush over clinton would have changed in the slightest; it has
>been in the works for some time.
I've got no doubts that this would probably have gone ahead if Bush
was still president. What's puzzling to me are the people who are
apparently amazed that Clinton is going along with it.
--
Other than that, Mrs. Lincoln, how did you like the play?
|
5950 | Organization: City University of New York
From: <F36SI@CUNYVM.BITNET>
Subject: UNITED NATIONS : Gettin' busy
Lines: 4
Chapter 7 operation in Somlia. Almost Chapter 7 in Cambodia and Yugo.
'Bout time the UN started using force to make the peace happen.
Hopefully, they will soon be doing the same with world economics.
|
5951 | From: an030@cleveland.Freenet.Edu (Broward Horne)
Subject: Re: Impeach Clinton, Reno
Organization: Case Western Reserve University, Cleveland, OH (USA)
Lines: 40
Reply-To: an030@cleveland.Freenet.Edu (Broward Horne)
NNTP-Posting-Host: hela.ins.cwru.edu
In a previous article, gs26@prism.gatech.EDU (Glenn R. Stone) says:
>
>Fact: Both Janet Reno and Bill Clinton have admitted responsibility,
> even grief, over the deaths in Waco.
>
>Fact: Regardless of who started the fire, there are more than enough
> things on tape to make a civil rights case against these two.
> Cruel and unusual punishment (dying tortured rabbits on tape?)
> come to mind.
>
>Fact: It is a federal felony to infringe civil rights under color of
> law; where death is involved, this offense carries a penalty
> of life in prison.
>
>Fact: Impeachment is allowable for "high crimes and misdemeanors."
> Anything that's a federal felony should qualify.
>
>Conclusion: We have NO CHOICE, if we are an honest people, but to
> impeach Mr. Clinton, and remove Reno from office.
I HEARTILY agree. Now that the BATF warrant has been
unsealed, it is CLEAR that Clinton and Reno supported an
ILLEGAL raid. Did they not KNOW this?
NO authority for a 'no-knock" raid
NO authority to use helicopters.
NO authority to search for a "drug lab"
And, apparently, not even any authority to search for "automatic
weapons".
51 days of GOVERNMENT LIES.
|
5952 | From: sas58295@uxa.cso.uiuc.edu (Lord Soth )
Subject: MPEG for MS-DOS
Organization: University of Illinois at Urbana
Lines: 13
Does anyone know where I can FTP MPEG for DOS from? Thanks for any
help in advance. Email is preferred but posting is fine.
Scott
---------------------------------------------------------------------------
| Lord Soth, Knight |||| email to --> LordSoth@uiuc ||||||||
| of the Black Rose |||| NeXT to ---> sas58295@sumter.cso.uiuc.edu ||||||||
| @}--'-,--}-- |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|-------------------------------------------------------------------------|
| I have no clue what I want to say in here so I won't say anything. |
---------------------------------------------------------------------------
|
5953 | From: kv07@IASTATE.EDU (Warren Vonroeschlaub)
Subject: Re: After 2000 years, can we say that Christian Morality is
Reply-To: kv07@IASTATE.EDU (Warren Vonroeschlaub)
Organization: Ministry of Silly Walks
Lines: 28
In article <C5L184.Jo9@news.cso.uiuc.edu>, cobb@alexia.lis.uiuc.edu (Mike Cobb)
writes:
>In <1qlapk$d7v@morrow.stanford.edu> salem@pangea.Stanford.EDU (Bruce Salem)
>writes:
>>In article <C5JrDE.M4z@news.cso.uiuc.edu> cobb@alexia.lis.uiuc.edu (Mike
>Cobb) writes:
>>>Theory of Creationism: MY theistic view of the theory of creationism, (there
>>>are many others) is stated in Genesis 1. In the beginning God created
>>>the heavens and the earth.
>
>> Wonderful, now try alittle imaginative thinking!
>
>Huh? Imaginative thinking? What did that have to do with what I said? Would it
>have been better if I said the world has existed forever and never was created
>and has an endless supply of energy and there was spontaneous generation of
>life from non-life? WOuld that make me all-wise, and knowing, and
imaginative?
No, but at least it would be a theory.
| __L__
-|- ___ Warren Kurt vonRoeschlaub
| | o | kv07@iastate.edu
|/ `---' Iowa State University
/| ___ Math Department
| |___| 400 Carver Hall
| |___| Ames, IA 50011
J _____
|
5954 | From: punjabi@leland.Stanford.EDU (sanjeev punjabi)
Subject: When does Fred McGriff of the Padres become a free agent?
Organization: DSG, Stanford University, CA 94305, USA
Lines: 1
|
5955 | From: rogntorb@idt.unit.no (Torbj|rn Rognes)
Subject: Adding int. hard disk drive to IIcx
Keywords: Mac IIcx, internal, hard disk drive, SCSI
Reply-To: rogntorb@idt.unit.no (Torbj|rn Rognes)
Organization: Div. of CS & Telematics, Norwegian Institute of Technology
Lines: 32
I haven't seen much info about how to add an extra internal disk to a
mac. We would like to try it, and I wonder if someone had some good
advice.
We have a Mac IIcx with the original internal Quantum 40MB hard disk,
and an unusable floppy drive. We also have a new spare Connor 40MB
disk which we would like to use. The idea is to replace the broken
floppy drive with the new hard disk, but there seems to be some
problems:
The internal SCSI cable and power cable inside the cx has only
connectors for one single hard disk drive.
If I made a ribbon cable and a power cable with three connectors each
(1 for motherboard, 1 for each of the 2 disks), would it work?
Is the IIcx able to supply the extra power to the extra disk?
What about terminators? I suppose that i should remove the resistor
packs from the disk that is closest to the motherboard, but leave them
installed in the other disk.
The SCSI ID jumpers should also be changed so that the new disk gets
ID #1. The old one should have ID #0.
It is no problem for us to remove the floppy drive, as we have an
external floppy that we can use if it won't boot of the hard disk.
Thank you!
----------------------------------------------------------------------
Torbj|rn Rognes Email: rogntorb@idt.unit.no
|
5956 | From: creol@netcom.com
Subject: Intel memory board for sale
Article-I.D.: netcom.creolC51GrD.Ln6
Organization: Netcom Online Communications Services (408-241-9760 login: guest)
Lines: 8
I have an Intel Above Board (16 bit) with 2 megs of ram
that I would like to sell ASAP. Please email me offers
if interested!
Thanks
Fred
|
5957 | From: strnlght@netcom.com (David Sternlight)
Subject: Re: An Open Letter to Mr. Clinton
Organization: DSI/USCRPAC
Lines: 29
In article <01050810.vkcsbl@mbeckman.mbeckman.com> mbeckman@mbeckman.com writes:
> As an economist, I'm sure you can see the flaws in this logic. If the (naive)
>market is flooded with proprietary, but weak, encryption, then truly strong
>encryption will be unable to compete.
This is true for the mass market, but not for those who need strong crypto
and are willing to pay the price. After all, one can buy strong crypto today
if one is willing to spend enough.
Thus the concern is not economic.
The issue most worth worrying about is that after the system takes hold, the
government will outlaw other systems, and something voluntary will become
the only system available. That is a political, not an economic issue.
As a separate matter, you may be making an implied advocacy for cheap secure
crypto for everyone. It's true that the Clipper chip would probably prevent
that except via Clipper, but "cheap, secure crypto for everyone" is a
political discussion, not an economic one, and the whole point of Clipper is
to resolve that political (policy) tension between securing legitimate
communications and tapping the crooks.
--
David Sternlight Great care has been taken to ensure the accuracy of
our information, errors and omissions excepted.
|
5958 | From: rich.bellacera@amail.amdahl.com
Subject: "Ex-Gay"? (was: HOMOSEXUALITY Fact & Fiction)
Lines: 152
Return-Path: <amail.amdahl.com!rich.bellacera@juts.ccc.amdahl.com>
Tony-
While I honestly believe you believe you are doing a "good thing" by posting
that piece of propaganda, I believe the more people believe that the more they
will feel justified in their blatant persecution of gay oriented people. I
have seen the film called "The Gay Agenda" and along with my church we found
it to be horrifying. Not because of what was actually shown (cleaver use of
editting can create any image one wants to portray), rather becaseu we are familia
familiar with how widely it was actively distributed and how many naive people
are actually believing the garbage found within it. The truth is that neither
you nor I can fully speak for anyone who calls themself gay, but knowing as
many as I do and knowing their testimonies and witnessing thier faith and life
I have to say that the report you posted is a very biased report, something
obviously claimed against gays as well. The truth is that unless YOU are
innately gay you cannot know what harm you are causing. I speak as an
abolitionist who supports affirming gay rights in our society. I do not
support wild sex or any other misrepresentations perpetrated by Christian
Fundamentalist extremists, but I know people who are not the sexual deviants
your report paints them to be. It is no mistake that the APA removed
homosexuality from it's list of mental illnesses, it is also no mistake that
there are many Christians and homophobes who long to bring it back to the list.
I do not feel threatened by gays, I don't understand why others are.
The following is an article concerning two of the more popular ex-gay min-
istries: Exodus International & Homosexuals Anonymous.
THE FOUNDER OF AN "EX-GAY" SUPPORT GROUP CHOOSES HOMO OVER HETERO
by Robert Pela (from Gay oriented magazine ADVOCATE)
In December 1985, David Caligiuri received one of The Advocate's homophobia rewaa
awards: the A Prayer A Day Keeps the Lust Away citation. As director of FREE
INDEED, a national ex-gay ministry, Caligiuri was singled out for offering
discontented gays and lesbians "a way out of the homosexual death-style"
through prayer. "I'd like to give the award back," Caligiuri now laughs, "I'm
no longer deserve it."
Caligiuri's eight year involvement with the national "ex-gay" movement peaked
with his founding of the Phoenix chapter of Homosexuals Anonymous (HA) as well
as Free Indeed. He has since abandoned his pulpit and now says that the ex-
gay movement is a fruitless effort based on deception. "There's no reality
in it," he says, "I was selling a product, and my product was a lie."
Headed up by national ministries like Exodus International and Courage, the
organizations of the ex-gay movement rely on the tenents of born-again
Christianity to convince disatisfied homosexuals -- usually young gay men who
are just coming out -- that they can shed their sexuality by suppressing their
sexual urges and embracing Christianity. "We offer support to people who are
seeking to leave the sin of homosexuality," explains Bob Davies, director of
Exodus. He ventures that "about 80% of those seeking to abandon their homo-
sexuality are men."
"Anybody who is involved in the ex-gay ministry is misguided and is wasting
their time," says Lisa Seeley, a former "redeemed lesbian" who worked with
Caligiuri as HA and appeared with him on the Sally Jessy Raphael show. "These
organizations are for people who are spiritually and emotionally wounded."
"It's possible to change your identity or your behavior," says sex educator
Brian McNaught, author of _On Being Gay_. "But it's really impossible to
change your orientation. These people are no longer calling themselves gay,
but they continue to have same-sex erotic feelings."
Caligiuri says he founded Free Indeed after an ominous week in 1981 when all
hell broke loose in his personal life. A few days after his lover ended both
their romance and their business partnership, Caligiuri was sexually assaulted
by a man he picked up in a bar. "I was really drunk," he recalls, "and I
went home with this guy. He tied me up and raped me. He left me tied up all
night, and the next morning he raped me again."
When Caligiuri was eventually freed by the attacker, he returned home to the
home he shared with his ex-lover. "He had another man there with him,"
Caligiuri recalls. "I thought at this time, 'If this is what being gay is
about, I don't want to be this way anymore."
Caligiuri vowed that if he could find a way out, he would share his discovery
with others. He organized an antigay contingent to demonstrate at Phoenix's
gay pride parade in June 1985, and a few months later Free Indeed held its
first public protest. At a meeting to promote a gay civil rights ordinance,
Free Indeed members loudly blasted gays, telling them ther were sinners headed
for hell.
Free Indeed began receiving about a hundred telephone calls a week, thanks
in part to a deceptive listing in the local yellow pages. "We were listed
under Lesbian and Gay Alternative Services," Caligiuri says, "so people
thought we were a gay information switchboard. People would call to find out
where the local bars were, and we'd preach to them about the sins of homo-
sexuality." Ruses like this are typical of the movement, Caligiuri says,
adding, "They'll do anything to reach these people."
"David used to go on radio and say really stupid things," recalls Peter
Kelly, a counselor at Phoenix's Catholic diocese AIDS program, "like that
he knew he was gay when he started wearing pastel colors."
Caligiuri's family first found out about his ministry when they saw him on
Raphael's syndicated talk show in 1985. "They were relieved," he recalls.
"They figured that if they had to have a gay person in the family, better
that I should be a 'reformed' gay person."
But Caligiuri was hardly reformed. "By the time I appeared on Sally's
show," "I'd started having sex with men again. Men would call our hotline
and tell me about thier latest sin: sex with their pastor, sex with their
father. I was horny all the time."
Unable to risk going to gay bars, where he might be recognized from his
numerous television appearances, Caligiuri says he "used to go to bookstores
and get blowjobs." When he wasn't working the bookstores, he was sleeping
with other "reformed" homosexuals.
"I didn't realize it at first, but a lot of the HA leaders were having sex
with one another," Caligiuri says. "We'd go to conferences in other cities,
and we'd be paired up in hotel rooms. Everybody was sleeping with everybody
else."
By the time he appeared on 'AM Philadelphia' television show in May 1988,
Caligiuri was having anonymous sex a couple times a week. When the show's
host asked him if he ever "acted on temptation," his answer was a lie.
Caligiuri's duplicity began to take it's toll on him, however. He was
suffering from chrinic fatigue syndrome and candidiasis, a dibilitating
yeast infection, and this led to his escape from the sect. "I was too sick
to go to church," he explains. "The more time I spent away from those people
the more I began to feel like myself. I began to remember who I used to be."
Late in 1991, Caligiuri turned Free Indeed phone lines over to a local
church and closed the ministry's doors. "I'd convinced myself that there
is no need in the world for ex-gay people," he says.
Today, Caligiuri, 31, is studying alternative spiritualities ("I'm interest-
ed in belief systems that aren't judgemental."), considering romance ("But
not with a CHristian!"), and searching for a new project to devote himself to.
"I feel compelled to commit myself to gay causes," he says. "I want to
eventually stop feeling guilty about what I did and make up for the damage I
may have brought to our community."
---end article---
Caligiuri's tory is by no means unique and I have read several other articles
of former leaders and founders of 'ex-gay' ministries who have said very similar th
similar things. Fortuantely not all of them have left Christianity, but have
come to realize that God loves them despite the attitudes of others. Some,
like Chris Glaser, director of the Presbyterian "Lazarus Project" of West
Hollywood Presbyterian Church have actually been working with the gay community
to bring them into the sheepfold of Christ and encouraging real ethical values
of sexuality within the sphere of being gay. I have also, as I said talked and become
and become close friends with many who once attended such groups as "Love In
Action" and others, who either once claimed to have been "reformed" or who
were too honest with themselves to live a lie, no matter who was disappointed
in them. Some were even encouraged to marry as a way of "sealing" their
new heterosexuality, only to eventually start hitting the bars, bathhouses
and bookstores, since these were usually activities under the concealment of
night and one-night-stands of promiscuous behavior meant no continuous "sin"
through a committed relationship. This is a horrible trap which the CHurch
has dumped on the backs of the truly gay oriented people, and the very inno-
cent victims in these cases are the wives and children of such marriages. Yet
the church insists that there are only two options they are willing to allow
gay people: 1) heterosexuality or 2) celebacy. This is sad. What is also
mrtifying, is in the cases of those who cannot suppress their desires and
fear for thier sanity in such a mixed up confusion that the church forces on
them, they may even opt for 'suicide' or surgical dampering of the brain
functions. In the past lobotomies and heavey drug suppressants were common-
place. There are now becoming available more and more literature on the
threat of coercive Christianity toward gays, such as Sylvia Pennington's
_"Ex-Gays? There Are None_. and others. There are also a great many fact
based books being written to help people trapped in this confusion such as
Maury Johnston's _Gays Under Grace_, and Chris Glaser's _Come Hom!_. I
seriously recommend those for people seeking help for this persecution and
self-acceptance.
Thank you.
|
5959 | From: twong@civil.ubc.ca (Thomas Wong)
Subject: Re: Date is stuck
Organization: Dept. of Civil Engineering, U.B.C., Vancouver, B.C., Canada
Lines: 15
NNTP-Posting-Host: sam.civil.ubc.ca
In article <1qte10$kn5@usenet.INS.CWRU.Edu> ab245@cleveland.Freenet.Edu (Sam Latonia) writes:
>
>I can't imagine why someone would leave their computer on all of
>the time to start with. Its like leaving your lights tv, radio
>and everything in the house on all of the time to me.....Nuts
We have plenty of computer labs where the computers are left on all the
time. I don't see any shorter lifespan than the ones we have in the
offices which does get turned off at the end of the day. In fact, some
of the computers in the labs have outlived some of the same ones in the
offices. But it goes both ways so can't conclude anything.
Thomas.
|
5960 | From: randy@megatek.com (Randy Davis)
Subject: Re: Observation re: helmets
Reply-To: randy@megatek.com
Organization: Megatek Corporation, San Diego, California
Lines: 38
In article <1qk5oi$d0i@sixgun.East.Sun.COM> egreen@east.sun.com writes:
|In article 211353@mavenry.altcit.eskimo.com, maven@mavenry.altcit.eskimo.com (Norman Hamer) writes:
|>
|> The question for the day is re: passenger helmets, if you don't know for
|>certain who's gonna ride with you (like say you meet them at a .... church
|>meeting, yeah, that's the ticket)... What are some guidelines? Should I just
|>pick up another shoei in my size to have a backup helmet (XL), or should I
|>maybe get an inexpensive one of a smaller size to accomodate my likely
|>passenger?
|
|If your primary concern is protecting the passenger in the event of a
|crash, have him or her fitted for a helmet that is their size. If your
|primary concern is complying with stupid helmet laws, carry a real big
|spare (you can put a big or small head in a big helmet, but not in a
|small one).
Well, you can accomplish both goals, actually, if you have a definite
physical type in mind when you go to these (cough) church meetings.. If
your tastes tend to smaller, more petite (cough) churchgoers, it is more
likely that they will have a smaller head, and you can safely get a medium
or small helmet.
This works for me, and I traded my spare large helmet with my best friend,
who, at 6'9", tends to look more for women that are over 6'0", and can't
usually fit into the medium size helmet he previously had...
Of course, if you aren't picky what size (*cough*) churchgoers you give
helpful motorcycle rides to, then Ed's advice will hopefully cover any
eventuality as far as legality is concerned, and a spare handtowel in the
tankbag makes acceptable padding so the passenger can see out of the viewport
(rather than the padding above the viewport) in the cases of extreme mismatch.
Randy Davis Email: randy@megatek.com
ZX-11 #00072 Pilot {uunet!ucsd}!megatek!randy
DoD #0013
"But, this one goes to *eleven*..." - Nigel Tufnel, _Spinal Tap_
|
5961 | From: acheng@ncsa.uiuc.edu (Albert Cheng)
Subject: Re: hard times investments was: (no subject given)
Article-I.D.: news.C52t8L.5CH
Organization: Nat'l Ctr for Supercomp App (NCSA) @ University of Illinois
Lines: 10
Originator: acheng@shalom.ncsa.uiuc.edu
In article <1938@tecsun1.tec.army.mil>, riggs@descartes.etl.army.mil (Bill Riggs) writes:
> My mother-in-law, who grew up in Germany, doesn't believe in
>money at all. She started out as a real estate developer, and now raises
>horses. She keeps telling me that inflation is coming back, and to lock
>in my fixed rate mortgage as low as possible.
If time is really hard, can a bank selectively call in some mortgage
loans early? What if the bank folds, can its creditors call in the
loans?
|
5962 | From: xanadu@seanews.akita.com (Dan Scherer)
Subject: PS/2 Stuff
Organization: SEANEWS - Seattle Public Access News + Mail
Lines: 30
Misc. P2/2 Stuff!
CARDS: (Micro Channel)
(6) Arcnet, Coax, 83X9648. Net Cards.
(3) Serial Adapter. P/N: 90X8459
(2) Parallel Adapters. P/N: 72X6753
(2) CoProcessor?? P/N: 83X7488
(2) Memory Expansion Option. P/N: 90X9507
Expanded Memory Adapter w/2Mb. P/N: 61X6752
Expanded memory Adapter, 0k, P/N: 90X8799
Alloy FTC500/MCA Tape adapter.
DRIVES: (Hard & Floppy)
30 Mb HDD, P/N: 90X9403 Model WD-336R
60 Mb HDD, P/N: 6128282, Model WD-387T
1.44 FDD, P/N: 15F7503, EC #A79541
1.44 FDD, P/N: 15F7503, EC #88086
This is what I have aquired over the past few years in PS/2
components...
I have posted the part #'s, so if you have any questions as to what a
component is, you can call IBM and find out! (I have no idea!!!)
Make me an offer! Trades welcome!
Dan Scherer
(206) 453-5215 Voice
(206) 996-8350 Pager
--
[] SEANEWS [] Seattle Public Access Usenet News + Mail [] +1 206 747 NEWS []
xanadu@seanews.akita.com
|
5963 | From: str@maredsous.Eng.Sun.COM (Todd Rader)
Subject: Re: Rickey Henderson
Organization: Sun
Lines: 6
Distribution: usa
NNTP-Posting-Host: maredsous
In article <1993Apr5.173500.26383@ra.msstate.edu> js1@Isis.MsState.Edu (Jiann-ming Su) writes:
%I say buy out Henderson's contract and let him go bag groceries. Next
%season, you'll be able to sign him for nothing. That goes for any bitching
%ball player.
Stay in school. You have a lot to learn.
|
5964 | Subject: Re: Trade rumor: Montreal/Ottawa/Phillie
From: <JER108@psuvm.psu.edu>
Organization: Penn State University
Lines: 50
In article <93095.210625MWEINTR@auvm.american.edu>, <MWEINTR@auvm.american.edu>
says:
>
>Also sprach slegge@kean.ucs.mun.ca ...
>
>>TSN Sportsdesk just reported that the OTTAWA SUN has reported that
>>Montreal will send 4 players + $15 million including Vin Damphousse
>>and Brian Bellows to Phillidelphia, Phillie will send Eric Lindros
>>to Ottawa, and Ottawa will give it's first round pick to Montreal.
>>
>>If this is true, it will most likely depend on whether or not Ottawa
>>gets to choose 1st overall. Can Ottawa afford Lindros' salary?
>>
>>Personally, I can't see Philli giving up Lindros -- for anything.
>>They didn't give away that much to Quebec just to trade him away
>>again. Not to mention that Lindros seems to be a *huge* draw in
>>Phillie -- and that he represents a successful future for the
>>franchise.
>>
>>Ottawa may be better off taking the 4 players +$15 from Montreal
>>for the pick.
>>
>>Stephen Legge
>>SLEGGE@kean.ucs.munc.ca
>
>Two things:
>
>1. Didn't the trade deadline pass two weeks ago?
>
>2. The FLYERS would never ever EVER give up Lindros, simple as that.
>
3. With Soderstrom and Roussel, why the hell would the Flyers want to
pick up an older and slumping Roy?
(BYW, I could come up with a group of players they'd trade for.... but
they wouldn't be from the same team.)
>Go Flyers, Cup in '94...
>
>Mike
>---
>***Yes-Rush-Marillion-ELP-Genesis-King Crimson-Dream Theater-Beatles***
>* Mike Weintraub, aka Jvi on IRC "Courageous convictions *
>* mweintr@american.edu will drag the dream *
>* jedi@wave.cerf.net into existence" *
>* The American University, Washington DC - Rush (NOT Limbaugh) *
>***Go Philadelphia Flyers, Vancouver Canucks & Philadelphia Phillies***
John E. Runski
<jer108@psuvm>
|
5965 | From: "Calvin D. Swartzentruber" <cs6t+@andrew.cmu.edu>
Subject: ATTN: Ken Smith
Organization: Freshman, Electrical and Computer Engineering, Carnegie Mellon, Pittsburgh, PA
Lines: 9
NNTP-Posting-Host: po3.andrew.cmu.edu
In-Reply-To: <9304051540.AA03922@gumby.Altos.COM>
It is model number #7033D, a 14" interlaced .28dp. BTW, if you have a
number to contact the company, that would really be helpful to. Thanks
for replying. I was beginning to believe that I was never going to get
a reply. I posted this on the netnews bboard because the first message
I sent to you was returned, and I didn't know if my second message would
get to you.
Calvin
|
5966 | From: bobsarv@microsoft.com (Bob Sarver)
Subject: Re: Question for those with popular morality
Organization: Microsoft Corp.
Distribution: usa
Lines: 57
(hudson)
>/These people hurt their own bodies. Why can't they hurt other peoples bodies
>/too?
>
(me)
>Because other people might not *want* to be hurt, Hudson. And hurting
>them against their will is a violation of choice.
/(hudson)
/So. Why is someone elses will such a big deal if morality is all relative.
I don't believe I ever said that morality was all relative.
What I said was that I can make my mind up on my own, thank you, and that
you don't have the right to tell others what to think.
I think that you will find that in most moral systems, there is
a respect for human life and the dignity of the person. It is all the
stuff besides these points that forms the core of the disagreement between
primitive moral absolutists like yourself and the rest of us.
/(hudson)
/Maybe (the insane lover of pain might reason) if other people experienced
/enough pain, they might learn to enjoy it, too.
Fine. There is still the clinical definition of crazy. And this also
involves a violation of free will, because the insane lover of your
little example would be inflicting pain on a non-willing subject.
Try again.
(hudson)
>/You have to have other premises to derive this.
>
(me)
>No, you don't. That is a patently false statement.
/(hudson)
/You have to have some sort of premise about choice or self-awareness.
No, you do not. I demonstrated to you the example of the football
team which doesn't require premises about freedom of choice or
sentience/self-awareness.
As I said, you are wrong, and you don't seem to know much about moral
systems. If I were you, I would take David Bold's suggestion and do some
reading on the subject before you try preaching about it.
|
5967 | From: shenx@helium.gas.uug.arizona.edu (xiangxin shen )
Subject: Re: IDE Low Level Format
Organization: University of Arizona, Tucson
Lines: 10
In article <C5H3yL.F66@news.cso.uiuc.edu> mandel@romulus.ehs.uiuc.edu (Hector Mandel) writes:
>I accidentally tried to low level format my Western Digital Caviar 280 drive.
>Is there a public domain or shareware utility available that will allow
>me to fix it?
>
>Thanks.
I am no expert on this. But I am pretty sure there is no way to recover this. IDE drive has mapping information written directly on drives. When you low level format it, the information itself is gone as well, I don't think you can get it back unless you send it back to Western Digital and ask them to refurbish it for you.
Jim
|
5968 | From: timmbake@mcl.ucsb.edu (Bake Timmons)
Subject: Re: Amusing atheists and agnostics
Lines: 19
nancyo@fraser.sfu.ca (Nancy Patricia O'Connor) writes:
>timmbake@mcl.ucsb.edu (Bake Timmons) writes:
>>Rule #4: Don't mix apples with oranges. How can you say that the
>>extermination by the Mongols was worse than Stalin? Khan conquered people
>>unsympathetic to his cause. That was atrocious. But Stalin killed millions of
>>his own people who loved and worshipped _him_ and his atheist state!! How can
>>anyone be worse than that?
>You're right. And David Koresh claimed to be a Christian.
Yup. I can hear the _millions_ cheering for DK right now! Josef Stalin eat
your heart out! :)
--
Bake Timmons, III
-- "...there's nothing higher, stronger, more wholesome and more useful in life
than some good memory..." -- Alyosha in Brothers Karamazov (Dostoevsky)
|
5969 | From: HoffmanE@space1.spacenet.jhuapl.edu (Hoffman, Eric J.)
Subject: Re: Drag free satellites
Organization: UTexas Mail-to-News Gateway
Lines: 37
NNTP-Posting-Host: cs.utexas.edu
In article <1raee7$b8s@access.digex.net> prb@access.digex.com (Pat) writes:
>In article <23APR199317325771@kelvin.jpl.nasa.gov> baalke@kelvin.jpl.nasa.gov
(Ron Baalke) writes:
>> In answer
>>to a question from Hawking, Chahine described a proposed
>>drag-free satellite, but confirmed that at this point, "it's only
>>a concept."
>
>SO what's a drag free satellite? coated with WD-40?
TRIAD, the first drag-free satellite, was designed and built by the
Johns Hopkins Applied Physics Laboratory and launched 2 Sept 1972. The
satellite was in three sections separated by two booms. The central section
housed the DISCOS Disturbance Compensation System, which consisted of a proof
mass of special non-magnetic alloy housed within a spherical cavity. The
proof mass flew a true gravitational orbit, free from drag and radiation
pressure. Teflon microthrusters kept the body of the satellite centered
around the proof mass, thereby flying the entire satellite drag free.
TRIAD was one of the APL-designed Navy Navigation Satellites. The
2nd-generation operational navigation satellites flying today (NOVA) use a
single-axis version of DISCOS. TRIAD was also the sixth APL satellite to be
powered by an RTG (APL flew the first nuclear power supply in space, in 1961).
Further info on TRIAD, DISCOS, etc. can be found in "Spacecraft Design
Innovations in the APL Space Department," Johns Hopkins APL Technical Digest,
Vol. 13, No. 1 (1992).
--Eric Hoffman
|
5970 | cs.utexas.edu!uunet!olivea!sgigate!sgiblab!adagio.panasonic.com!nntp-server.caltech.edu!bdunn
Subject: Re: The wrong and the right.
From: bdunn@cco.caltech.edu (Brendan Dunn)
Organization: California Institute of Technology, Pasadena
NNTP-Posting-Host: punisher.caltech.edu
Lines: 25
In article <93090.141001E62763@TRMETU.BITNET> <E62763@TRMETU.BITNET> writes:
>Hi.I'm a Turkish guy who had tried atheism,satenism and buddism at some instant
>s of hislife.Finally I decided on Islambecause of many facts which I intend to
> write here.From my point of view,you atheists are people who has dropped to a
>deep,dark well and thinking the only reality is the dusty walls of the well.But
> if you had looked a little bit upward you would see the blue skies.You'dsee t
>he truth but you close your eyes.Allah is the only GOD and Mohammed is his mess
> ager.now,let's generate some entropy in means of theology and thermodynamics.W
>hat's your point of view to the problem of the ''FIRST KISS''?That is,the first
> spark which was generated for the formation of the universe.Has it formed by i
>tself?You are bothering yourselves with the Big Bang but where is the first spa
>rk?Please think a bit.Think and return to the only reality of the universe:ISLA
>M|
Uh oh. This looks a bit too much like Bobby's "Atheism Is False" stuff. Are
we really going to have to go through this again? Maybe the universe is
cyclical! :) :(
--Brendan Dunn
|
5971 | From: k4bnc@cbnewsh.cb.att.com (john.a.siegel)
Subject: Can't set COM4
Organization: AT&T
Distribution: usa
Keywords: G2K
Lines: 15
I have been unable to get COM 4 to work - diagnostic programs such as msd show
nothing installed. I think the software options are OK - is there a known
hardware conflict and/or workaround for this problemand CD ROM
System is a G2K 486DX2/66 tower with ATI video card
Ports are set as follows
On board COMa = COM1 IRQ4 to external device
Internal modem = COM 3 IRQ5
DFIO port card primary port = COM 2 IRQ3 mouse
On board COM B = COM 4 IRQ 9 <--- DOES NOT WORK
I have run this from a boot disk with only command.com to eliminate softwar
Any suggestions before I call technical support?
John Siegel
k4bnc@cbnewsh.att.com
jas@hrollie.hr.att.com
|
5972 | From: rwag@gwl.com (Rodger Wagner)
Subject: Running C++ EXE under Windows 3.1
Reply-To: rwag@gwl.com
Organization: The Great-West Life Assurance Company.
X-Disclaimer: The views expressed in this message are those of an
individual at The Great-West Life Assurance Company and do
not necessarily reflect those of the company.
Lines: 17
Preface: I am a novice user at best to the Windows environment.
I am trying to execute a MS C++ 7.0 executable program which accesses a Btrieve
database to build an ASCII file.
When I execute it under windows the screen goes blank and my PC locks up. The only
way for me to return is to reset the machine.
Does anyone have any insight on what I may have to do in order for the program to
correctly under windows? (By the way it runs fine in DOS 5.0)
System: Gateway 486/DX250
ATI Graphics Ultra Card 640x480
Any help would be greatly appreciated.
Rodger
|
5973 | Subject: Re: Picking up cable tv with an aerial.
From: ganter@ifi.unibas.ch (Robert Ganter)
Organization: Institut fuer Informatik
Nntp-Posting-Host: schroeder.ifi.unibas.ch
Lines: 11
Great, the first advantage of cheap coax, I've ever heard.
Cheers Robert (HB9NBY)
--
Robert Ganter /------------\
Universitaet Basel | I am a fan |
Institut fuer Informatik | of my plan |
Basel/Switzerland \------------/
ganter@ifi.unibas.ch
amateurradio: HB9NBY packet: HB9NBY@HB9EAS.CHE.EU
|
5974 | From: salaris@niblick.ecn.purdue.edu (Rrrrrrrrrrrrrrrabbits)
Subject: Re: Satan kicked out of heaven: Biblical?
Organization: Purdue University Engineering Computer Network
Lines: 23
In article <May.7.01.09.04.1993.14501@athos.rutgers.edu>, easteee@wkuvx1.bitnet writes:
> Hello all,
> I have a question about Satan. I was taught a long time ago
> that Satan was really an angel of God and was kicked out of heaven
> because he challenged God's authority. The problem is, I cannot
> find this in the Bible. Is it in the Bible? If not, where did it
> originate?
>
Satan was one of God's highest ranking angels, like Uriel, Raphael,
Michael, and Gabriel. In fact, his name was Satanel. He did challenge
God's authority and got kicked out of heaven. A lot of the mythology
of Satan (he lost the -el suffix when he fell) comes from the
Book of Enoch and is not found in the bible.
Read the Book of Enoch, available thru bookstores, or get the book
called "Angels: an endangered species" (I think).
--
Steven C. Salaris We're...a lot more dangerous than 2 Live Crew
salaris@carcs1.wustl.edu and their stupid use of foul language because
we have ideas. We have a philosophy.
Geoff Tate -- Queensryche
|
5975 | From: sdbsd5@cislabs.pitt.edu (Stephen D Brener)
Subject: Japanese for Scientists and Engineers
Organization: University of Pittsburgh
Lines: 101
INTENSIVE JAPANESE AT THE UNIVERSITY OF PITTSBURGH THIS SUMMER
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The University of Pittsburgh is offering two intensive Japanese language
courses this summer. Both courses, Intensive Elementary Japanese and
Intensive Intermediate Japanese, are ten week, ten credit courses
each equivalent to one full year of Japanese language study. They begin
June 7 and end August 13. The courses meet five days per week, five hours
per day. There is a flat rate tuition charge of $1600 per course.
Fellowships available for science and engineering students. Contact
Steven Brener, Program Manager of the Japanese Science and Technology
Management Program, at the University of Pittsburgh at the number or
address below.
ALL INTERESTED INDIVIDUALS ARE ENCOURAGED TO APPLY, THIS IS NOT LIMITED TO
UNIVERSITY STUDENTS.
#######################################################################
################# New Program Announcement ########################
#######################################################################
JAPANESE SCIENCE AND TECHNOLOGY MANAGEMENT PROGRAM
The Japanese Science and Technology Management Program (JSTMP) is a new
program jointly developed by the University of Pittsbugh and Carnegie Mellon
University. Students and professionals in the engineering and scientific
communitites are encouraged to apply for classes commencing in June 1993 and
January 1994.
PROGRAM OBJECTIVES
The program intends to promote technology transfer between Japan and the
United States. It is also designed to let scientists, engineers, and managers
experience how the Japanese proceed with technological development. This is
facilitated by extended internships in Japanese research facilities and
laboratories that provide participants with the opportunity to develop
long-term professional relationships with their Japanese counterparts.
PROGRAM DESIGN
To fulfill the objectives of the program, participants will be required to
develop advanced language capability and a deep understanding of Japan and
its culture. Correspondingly, JSTMP consists of three major components:
1. TRAINING IN THE JAPANESE LANGUAGE
Several Japanese language courses will be offered, including intensive courses
designed to expedite language preparation for scientists and engineers in a
relatively short time.
2. EDUCATION IN JAPANESE BUSINESS AND SOCIAL CULTURE
A particular enphasis is placed on attaining a deep understanding of the
cultural and educational basis of Japanese management approaches in
manufacturing and information technology. Courses will be available in a
variety of departments throughout both universities including Anthropology,
Sociology, History, and Political Science. Moreover, seminars and colloquiums
will be conducted. Further, a field trip to Japanese manufacturing or
research facilities in the United States will be scheduled.
3. AN INTERNSHIP OR A STUDY MISSION IN JAPAN
Upon completion of their language and cultural training at PITT and CMU,
participants will have the opportunity to go to Japan and observe,
and participate in the management of technology. Internships in Japan
will generally run for one year; however, shorter ones are possible.
FELLOWSHIPS COVERING TUITION FOR LANGUAGE AND CULTURE COURSES, AS WELL AS
STIPENDS FOR LIVING EXPENSES ARE AVAILABLE.
FOR MORE INFORMATION AND APPLICATION MATERIALS CONTACT
STEVEN BRENER SUSIE BROWN
JSTMP Carnegie Mellon University, GSIA
University of Pittsburgh Pittsburgh, PA 15213-3890
4E25 Forbes Quadrangle Telephone: (412) 268-7806
Pittsburgh, PA 15260 FAX: (412) 268-8163
Telephone: (412) 648-7414
FAX: (412) 648-2199
############################################################################
############################################################################
Interested individuals, companies and institutions should respond by phone or
mail. Please do not inquire via e-mail.
Please note that this is directed at grads and professionals, however, advanced
undergrads will be considered. Further, funding is resticted to US citizens
and permanent residents of the US.
Steve Brener
|
5976 | From: marc@tanda.isis.org (Marc Thibault)
Subject: Re: Hard drive security for FBI targets
Reply-To: marc@tanda.isis.org
Distribution: world
Organization: Thibault & Friends
Lines: 45
1. Do a straight encryption of your keyrings and put the
results with misleading names somewhere they won't be noticed
(eg. in the \windows directory; nobody knows what half those
files are).
2. Do a straight encryption of a .BAT file that will decrypt
the keyrings to RAMdisk and will set PGPPATH to point at it.
3. Set up another .BAT file to decrypt and execute the first
(again on RAM disk). Have it take the name of the target file
as an argument so that there is no link between this file and
the (non-existent) batch file referred to by the rest of the
system. Comment it so it looks like a test script for fooling
around with PGP. Set PGPPATH to the PGP directory.
4. Leave the original keyrings that came with PGP in the
directory with PGP; a good indication that you are playing
with, but haven't made serious use of PGP. Add a set of keys
with your name and a really simple passphrase. Never use it,
or use it as your widely published key for low-security
e-mail.
5. When needed, run the second .BAT file. Make sure all
intermediate and plainfiles are generated on RAMdisk.
6. When you hear the concussion grenade, hit the power switch.
Cheers,
Marc
---
Marc Thibault | CIS:71441,2226 | Put another log
marc@tanda.isis.org | NC FreeNet: aa185 | on the fire.
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.0
mQBNAiqxYTkAAAECALfeHYp0yC80s1ScFvJSpj5eSCAO+hihtneFrrn+vuEcSavh
AAUwpIUGyV2N8n+lFTPnnLc42Ms+c8PJUPYKVI8ABRG0I01hcmMgVGhpYmF1bHQg
PG1hcmNAdGFuZGEuaXNpcy5vcmc+
=HLnv
-----END PGP PUBLIC KEY BLOCK-----
|
5977 | From: reimert@anthrax.etdesg.trw.com (Scott P. Reimert)
Subject: Re: win/NT file systems
Organization: TRW Inc., Redondo Beach, CA
Lines: 26
In article <1993Apr26.103230.10618@spider.co.uk> keiths@spider.co.uk (Keith Smith) writes:
>OK will some one out there tell me why / how DOS 5
>can read (I havn't tried writing in case it breaks something)
>the Win/NT NTFS file system.
>I thought NTFS was supposed to be better than the FAT system
>
>keith
DOS 5.0/6.0 cannot read the NTFS file system, although the NTFS file system
can read the FAT file system of DOS. I have WindowsNT on a seperate
partition on my machine at home, and I can read my DOS disks from Windows NT,
but not vice-versa.
As far as the robustness of the file system, it seems to be very fast, and
I have yet to have a single problem with it. That doesn't prove it's better
than the FAT system though. Read the book 'Inside Windows NT,' it will give
you all the info you're looking for.
Scott
--
-------------------------------------------------------------------------------
Scott Reimert \ reimert@mamacass.etdesg.trw.com /Standard disclaimer:
Redondo Beach, CA \______________________________________/"Blah blah blah ... "
__________________|Always store beer in a cool dark place|_____________________
|
5978 | From: rlglende@netcom.com (Robert Lewis Glendenning)
Subject: Re: Estimating Wiretap Costs/Benefits
Organization: Netcom - Online Communication Services (408 241-9760 guest)
Lines: 13
I am most embarassed that my irrate, intemperate post is still
circulating.
I have been chided by experts for my behavior. I now agree with
all of them, although some were no more restrained in their
speech than I was 8)
I have apologized to Robin Hanson.
Lew
--
Lew Glendenning rlglende@netcom.com
"Perspective is worth 80 IQ points." Niels Bohr (or somebody like that).
|
5979 | From: Rob Earhart <earhart+@CMU.EDU>
Subject: Re: Mix GL with X (Xlib,Xt,mwm)
Organization: Pittsburgh Supercomputing Center
Lines: 15
NNTP-Posting-Host: po3.andrew.cmu.edu
In-Reply-To: <9304191540.AA09727@sparc1.jade.com>
Yes, it's possible... in fact, there's some gl widget code in
/usr/lpp/GL somewhere... (it's named Glib.c; my IBM's down right now
though, so I can't find the exact location :)
WARNING: this code feels quite bogus. It does things like calling
noport() before winopen(), and then extracting an X window id from it
anyway. It worked just fine under aix 3.1; I spent last weekend trying
to port it to 3.2 (gl under 3.2 doesn't seem to like it), and it's
turning into a Hard Job.
Check out your "info" pages; it has some pretty good documentation on
whan you can and can't do when mixing gl and X, and how to go about
doing so.
)Rob
|
5980 | From: neath@brazil.psych.purdue.edu (Ian Neath)
Subject: Re: Thumbs up to ESPN
Organization: Purdue University
Lines: 13
jca2@cec1.wustl.edu (Joseph Charles Achkar) writes:
> It was nice to see ESPN show game 1 between the Wings and Leafs since
> the Cubs and Astros got rained out. Instead of showing another baseball
> game, they decided on the Stanley Cup Playoffs. A classy move by ESPN.
Not in Indiana: they showed a tape-delay of Chicago v Boston, because
WGN had the rainout of the cubs. So WGN showed reruns of Hitchcock.
No hockey (at least in this part of the state).
Go Aeros!
--
Ian Neath | There are four kinds of people in this world:
neath@psych.purdue.edu | cretins, fools, morons and lunatics - U. Eco
|
5981 | From: ldo@waikato.ac.nz (Lawrence D'Oliveiro, Waikato University)
Subject: Re: Interesting ADB behaviour on C650
Organization: University of Waikato, Hamilton, New Zealand
Lines: 20
In article <1993Apr15.181440.15490@waikato.ac.nz>, I said:
> I know that plugging and unplugging ADB devices with the power on is "not
> supported", and you can hit problems if you have multiple devices with
> clashing addresses, and all that.
I've had a couple of e-mail responses from people who seem to believe that
this sort of thing is not only unsupported, it is downright dangerous.
I have heard of no such warnings from anybody at Apple. Just to be sure, I
asked a couple of our technicians, one of whom has been servicing Macs for
years. There is *no* danger of damaging logic boards by plugging and unplugging
ADB devices with the power on.
SCSI, yes, ADB, no...
Lawrence D'Oliveiro fone: +64-7-856-2889
Computer Services Dept fax: +64-7-838-4066
University of Waikato electric mail: ldo@waikato.ac.nz
Hamilton, New Zealand 37^ 47' 26" S, 175^ 19' 7" E, GMT+12:00
|
5982 | From: maler@vercors.imag.fr (Oded Maler)
Subject: Re: Unconventional peace proposal
Nntp-Posting-Host: pelvoux
Organization: IMAG, University of Grenoble, France
Lines: 43
In article <1483500348@igc.apc.org>, cpr@igc.apc.org (Center for Policy Research) writes:
|>
|> From: Center for Policy Research <cpr>
|> Subject: Unconventional peace proposal
|>
|>
|> A unconventional proposal for peace in the Middle-East.
|> ---------------------------------------------------------- by
|> Elias Davidsson
|>
|> 1. A Fund should be established which would disburse grants
|> for each child born to a couple where one partner is Israeli-Jew
|> and the other Palestinian-Arab.
|>
|> 2. To be entitled for a grant, a couple will have to prove
|> that one of the partners possesses or is entitled to Israeli
|> citizenship under the Law of Return and the other partner,
|> although born in areas under current Isreali control, is not
|> entitled to such citizenship under the Law of Return.
|>
|> 3. For the first child, the grant will amount to $18.000. For
|> the second the third child, $12.000 for each child. For each
|> subsequent child, the grant will amount to $6.000 for each child.
...
|> I would be thankful for critical comments to the above proposal as
|> well for any dissemination of this proposal for meaningful
|> discussion and enrichment.
|>
|> Elias Davidsson Post Box 1760 121 Reykjavik, ICELAND
Maybe I'm a bit old-fashioned, but have you heard about something
called Love? It used to play some role in people's considerations
for getting married. Of course I know some people who married
fictitiously in order to get a green card, but making a common
child for 18,000$? The power of AA is limited. Your proposal is
indeed unconventional.
===============================================================
Oded Maler, LGI-IMAG, Bat D, B.P. 53x, 38041 Grenoble, France
Phone: 76635846 Fax: 76446675 e-mail: maler@imag.fr
===============================================================
|
5983 | From: oaf@zurich.ai.mit.edu (Oded Feingold)
Subject: Re: NEWS YOU WILL MISS, Apr 15
Organization: M.I.T. Artificial Intelligence Lab.
Lines: 18
Distribution: world
Reply-To: oaf@zurich.ai.mit.edu
NNTP-Posting-Host: klosters.ai.mit.edu
In-reply-to: arf@genesis.MCS.COM's message of 15 Apr 1993 22:51:03 -0500
Sorry, ARF - you dog,
That news was suppressed because the Israeli national volleyball team
repeatedly spiked it.
Let this be a lesson to others not to invoke the wrath of sports nuts.
(Brits lead the way in this regard, with ~220 casualties in the last 2
years.)
Anyway, Yigal would never sue. His life is (presumably) so pristine
that its most intimate details could be revealed without harm to
anyone. Might even be good instruction for some people I can think of.
Me, I _would_ sue! I hate the way sports dominates the media.
Anyway, the last 3 ADL agents watching me die of boredom before filing
their reports. I've damaged their Atlanta operation something fierce.
|
5984 | From: sera@zuma.UUCP (Serdar Argic)
Subject: Nazi Armenians were of service to Germans in Arab countries as well.
Reply-To: sera@zuma.UUCP (Serdar Argic)
Distribution: world
Lines: 40
In article <1993Apr26.175246.24412@colorado.edu> perlman@qso.Colorado.EDU (Eric S. Perlman) writes:
>This has been discussed before, by several people, on this net. The
>statement is attributable either to Hajj Amin al-Husseini, former Grand
>Mufti of Jerusalem - and the leader of the Palestinian death squads
>during the 1948 war, or to one of his chief henchmen.
Let us not forget the Nazi Armenians. Nazi Armenians were of service
to Germans in Arab countries as well. As Uzun put it, one well-known
case which received a lot of media-coverage involved two Nazi Armenian
agents which were dropped over Syria by Italian war planes. The mission
of the agents was to mingle among the Armenian population in Syria and
to acquire relevant information for the German Wehrmacht on the allied
forces in the area.[1] Nazi Armenians also helped German propaganda
efforts in Arab countries designed to promote pro-Nazi sentiments among
the French- and British-ruled Arab populations. Beirut had traditionally
been strong-hold of the Nazi Armenians and until very recently it was
the center of international Armenian terrorism.
In Russia General Dro (the Butcher), the architect of the Turkish
genocide in WWI, was working closely with the German Secret
Service. He entered the war zone with his own men and acquired
important intelligence about the Soviets. His experience with
the Turkish genocide in x-Soviet Armenia made him an invaluable
source for the Germans.[2]
[1] Meyer, Berkian, ibid., p. 150.
[2] Meyer, Berkian, ibid., p. 113; Patrick von zur Muehlen,
ibid., p. 84.
Serdar Argic
'We closed the roads and mountain passes that
might serve as ways of escape for the Turks
and then proceeded in the work of extermination.'
(Ohanus Appressian - 1919)
'In Soviet Armenia today there no longer exists
a single Turkish soul.' (Sahak Melkonian - 1920)
|
5985 | From: mini@csd4.csd.uwm.edu (Padmini Srivathsa)
Subject: WANTED : Info on Image Databases
Organization: Computing Services Division, University of Wisconsin - Milwaukee
Lines: 15
Distribution: world
NNTP-Posting-Host: 129.89.7.4
Originator: mini@csd4.csd.uwm.edu
Guess the subject says it all.
I would like references to any introductory material on Image
Databases.
Please send any pointers to mini@point.cs.uwm.edu
Thanx in advance!
--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-< MINI >- mini@point.cs.uwm.edu | mini@csd4.csd.uwm.edu
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
5986 | From: dsegard@nyx.cs.du.edu (Daniel Segard)
Subject: Re: Easter: what's in a name? (was Re: New Testament Double Stan
Organization: Nyx, Public Access Unix at U. of Denver Math/CS dept.
Lines: 98
seanna@bnr.ca (Seanna (S.M.) Watson) asks:
> What is the objection to celebration of Easter?
The objection naturally is in the way in which you phrase it.
Easter (or Eashtar or Ishtar or Ishtarti or other spellings) is the pagan
whore goddess of fertility. Therefore, your question to me is "what is
the objection to celebration of the pagan whore goddess?" When phrased
that way I suspect (or at least I would HOPE) that it becomes immeadiately
apparent what my objection to "celebrating" her would be.
> It is celebration of the resurrection of Jesus.
No, you are thinking perhaps of "Ressurection Sunday" I think.
(Though I'm not too crazy about the word "Sunday", but I certainly like
this phrasing much better than envoking the name of the whore goddess.)
For that matter, stay Biblical and call it Omar Rasheet (The Feast of
First Fruits). Torah commands that this be observed on the day following
the Sabbath of Passover week. (Sunday by any other name in modern
parlance.) Why is there so much objection to observing the Resurrection
on the 1st day of the week on which it actually occured? Why jump it all
over the calendar the way Easter does? Why not just go with the Sunday
following Passover the way the Bible has it? Why seek after unbiblical
methods?
> I don't recall a command in Scripture for us to celebrate
> the resurrection, but it is the sole and only reason that
> we are Christians--how could we not celebrate it?
So what does this question have to do with Easter (the whore
goddess)? I am all for celebrating the Resurrection. Just keep that
whore out of the discussion.
> If it is only the name which is a problem, I suggest that if
> we are too concerned about etymology, there are a lot of
> words we are going to have to drop. (As an aside, some
> terminally PC people here in Ottawa want dictionaries to be
> altered so that there are no negative definitions associated
> with the word _black_, so as not to offend people of colour.
Yes, I have heard of your newspapers speaking of the need to repave
streets with "Afro-Canadiantop". <grin> (I still think "blacktop" sounds
better though.)
> As a short person, I hope they will also remove the definition
> "curt or surly" associated with my physical description.)
Fine by me. And while we are at it, the left-handed people are
both "sinister" and "gauche" so we probably will have some objections from
that quarter as well.
> In Quebec French, the word for the celebration of the
> resurrection is "Pa^ques"--this is etymologically related
> to Pesach (Passover) and the pascal lamb. So is the
> French Canadian (mostly Roman Catholic) celebration better
> because it uses the right name?
Yes, that sounds much better to me. Is there anyone out there would
thinks that phrasing sounds worse?
> So from this I infer that there are different rules for
> Christians of Jewish descent? What happened to "there is
> neither Jew nor Greek, slave nor free, male nor female, for
> all are one in Christ Jesus"?
Read the letter to Philemon. Now tell me, was Philemon's "slave"
returned to him? Were there different rules upon the slave than upon
Philemon? How about male and female? Are there different "rules" that
apply to them as well? Or if there is no more "male and female" can Adam
and Steve get married to each other in your congregation? Yes, there are
differences in form and function. But the way we come to Salvation in
Messiah remains the same no matter what our position in life.
---------------------------------------
[I am in general not in favor of continuing this discussion, as it
seems repetitive, but this particular point is one that I believe is
new -- the objection is not to having a holiday but to its name.
I'd like to suggest that people think very carefully about this
argument. Words often change their meaning over time. The days of
the week are of course originally based on pagan gods. Some
Christians prefer to refer to "first day", "second day", etc. However
the majority of Christians have not been persuaded. The question
seems to be whether it makes any difference what the dictionary shows
as the derivation of a word, if what people mean by it and think when
they use it is different.
Indeed I'd like to suggest that postings like this could themselves be
dangerous. Suppose people in general use Easter to mean the
celebration of Christ's resurrection. Postings trying to convince
them that they really mean a celebration in honor of some godess run
the risk of creating exactly the situation that they claim to oppose.
They are doing their best to *create* a linkage in people's minds
between their celebration and the pagan goddess. It's not clear that
this is a healthy thing.
--clh]
|
5987 | From: jra@law7.DaytonOH.NCR.COM (John Ackermann x 2966)
Subject: Single chip receiver for FSK?
Reply-To: jra@law7.DaytonOH.NCR.COM (John Ackermann x 2966)
Organization: NCR Corporation -- Law Department
Lines: 21
My next project is to come up with an IF/detector module for fast -- 112
to 250 kB/sec -- packet radio use. No fancy modulation scheme, just
wide FSK for use at 902 or 1296 MHz.
I'm a bit familiar with the Motorola 3362 chip, but I wonder if there
are newer designs that might work at higher input frequencies.
My goal is to come up with an inexpensive design for a receiver "back
end" with IF input on one end and an FSK demondulator on the other. I'm
particularly interested in ways to use a higher IF than 10.7 -- do any
current chips work up to, say 150MHz with internal downconversion so a
normal IF filter can be used?
Any suggestions?
John
--
John R. Ackermann, Jr. Law Department, NCR Corporation, Dayton, Ohio
(513) 445-2966 John.Ackermann@daytonoh.ncr.com
Packet Radio: ag9v@n8acv.oh tcp/ip: ag9v@ag9v.ampr [44.70.12.232]
|
5988 | From: auerbach@batman.bmd.trw.com
Subject: Re: ATF BURNS DIVIDIAN RANCH! NO SURVIVORS!!!
Lines: 23
In article <1r19tp$5em@bigboote.WPI.EDU>, mfrhein@wpi.WPI.EDU (Michael Frederick Rhein) writes:
> In article <93109.13404334AEJ7D@CMUVM.BITNET> <34AEJ7D@CMUVM.BITNET> writes:
>>I will be surprised if this post makes it past the censors,
>>but here goes:
>>
> In short Mr. Gorman (I am assuming Mr. as a title because I don't think a
>woman would be stupid enough to make this post) I don't know what episode of CNN you
^^^^^
What an incrediblt sexist remark! Come now, Mike, what ever possessed you to
make such a un-PC remark? I hope all women out there reading this are as
incensed as I am. Remember, WOMAN ARE JUST AS GOOD AS MEN!!!!
Women stand up for your right to be just as stupid as men. In fact, insist on
every oppurtunity to be even more stupid than men! You've got the right, use
it!
Hey, it's a slow afternoon and I really don't want to get back to that
report...;)
BTW: mega-smileys for the humor impaired...
Karl
|
5989 | From: metatron!joe@dogface.austin.tx.us (Joe Zitt)
Subject: Re: Fighting the Clipper Initiative
Organization: Metatron Press / Human Systems Performance Group, Austin, TX
X-Newsreader: rusnews v1.01
Lines: 17
steve-b@access.digex.com (Steve Brinich) writes:
> >As a flaming libertarian paranoid extremist (:-), I'at a loss for
> >specific objections that don't sound frighteningly technical.
>
> The idea that foisting the Cripple Chip standard on US manufacturers would
> result in saying "Sayonara" to yet another high-tech market isn't technical,
> isn't in the least difficult to understand, and plays on a concern lots of
> people are worried about already....
>
>
Could you expand on this? I have a feeling you're right, but I don't quite
understand.
--
"You could be an ocarina salesman going | Metatron Press | Austin, Texas!
from door to door..." -- Laurie Anderson | Human Systems Performance Group
|
5990 | From: matthew@alchemy.TN.Cornell.EDU (Matthew Kleinmann)
Subject: Is a 2 headed Sun 3/60 possible (cgfour0/bwtwo0)
Organization: Alchemy International
Lines: 12
Distribution: world
NNTP-Posting-Host: alchemy.tn.cornell.edu
I have a Sun 3/60 that has a mono framebuffer (bwtwo0 ?) built on the
motherboard. The same system also has a cgfour (cgfour0 and bwtwo1 ?)
daughterboard. I have been using this system with a color monitor having a
color "front" screen from the cgfour, and a mono "back" screen from the
bwtwo1, both on the same tube. I recentley picked up a 1600 x 1280 Sun mono
monitor, and I would like to make a two headed system with the cgfour0 and the
bwtwo0. I do not care if I loose the "back" screen on the color tube from the
bwtwo1. After looking through the Xsun man page I am not sure if this is
possible. Has anybody sucessfuly done this before?
--Matthew
|
5991 | From: huot@cray.com (Tom Huot)
Subject: Re: Goodbye, good riddance, get lost 'Stars
Lines: 20
Nntp-Posting-Host: pittpa.cray.com
Organization: Cray Research Inc.
X-Newsreader: TIN [version 1.1 PL8]
Stephen Lawrence (s4lawren@sms.business.uwo.ca) wrote:
: Goodbye Minnesota,...you never earned the right to have an NHL
: franchise in the first place!
: Hope you enjoy your Twin city wide mania for HIGH SCHOOL HOCKEY
: (hey, by the way my old pee wee team is having a reunion in Regina, care
: to come up and film the event?)
: Yee haa Golden Gophers
: Whatta weird town!!!!!
: s4lawren@sms.business.uwo.ca (Stephen Lawrence)
: Western Business School -- London, Ontario
This is the second posting of this kind from an idiot at a business
school in Canada. What is your problem up there anyway? Is this what
they teach you in business school in Canada?
--
_____________________________________________________________________________
Tom Huot
huot@cray.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
5992 | From: draper@gnd1.wtp.gtefsd.com (PAM DRAPER)
Subject: Any info. on Vasomotor Rhinitis
Organization: GTE Government Systems, Federal Systems Division, Chantilly, VA
Lines: 20
Distribution: world
Reply-To: draper@gnd1.wtp.gtefsd.com
NNTP-Posting-Host: gnd1.wtp.gtefsd.com
News-Software: VAX/VMS VNEWS 1.3-4
I recently attended an allery seminar. Steroid Nasal sprays were
discussed. Afterward on a one-on-one basis, I asked the speaker what if
none of the Vancanese, Beconase, Nasalide, Nasalcort, or Nasalchrom work
nor do any oral decongestants work. She replied that she saw an article on
Vasomotor Rhinitis. That this is not an allergic reaction and that nothing
other than the Afrin's and such would work. (Which in my case is true).
I want to find out as much as possible about this, since I am going to see
my allergist in May and want to be armed to the hilt with information;
since nothing he has done with me has helped me at all and I have had no
relief for 14 months.
Please respond if you know anything about this and/or please let me know
what articles might be helpful that I could look up in the library.
|
5993 | From: cramer@optilink.COM (Clayton Cramer)
Subject: Re: The Role of the National News Media in Inflaming Passions
Organization: Optilink Corporation, Petaluma, CA
Lines: 17
In article <C5L780.Apu@murdoch.acc.Virginia.EDU>, gsh7w@fermi.clas.Virginia.EDU (Greg Hennessy) writes:
> Kaldis writes:
> #The fact that she was wearing a miniskirt with no underwear was
> #presented as evidence that she was a prostitute, and the court
> #apparently found this compelling.
>
> Ah, I know women who wear miniskirts without wearing underwear, and
> they are not prostitutes.
Do they have a history of working in massage parlors, and telling
co-workers there that they are prostitutes? Do they frequent truck
stop parking lots at 4:00 AM, without ID on any sort?
> -Greg Hennessy, University of Virginia
--
Clayton E. Cramer {uunet,pyramid}!optilink!cramer My opinions, all mine!
Relations between people to be by mutual consent, or not at all.
|
5994 | From: andrew@idacom.hp.com (Andrew Scott)
Subject: USENET Playoff Pool (IMPORTANT)
Organization: IDACOM, A division of Hewlett-Packard
Lines: 15
I got back from my trip to discover that my email spool file got blown
away. I am missing all the playoff pool entries sent between April 5
and April 17. It looks like about 200 entries got lost. *Sigh*.
Therefore, I would like to ask each person that sent me a team to resend
it ASAP. I am relying on your honesty to not make changes after the
deadline today.
Thanks in advance, and I apologize for the problem.
--
Andrew Scott | andrew@idacom.hp.com
HP IDACOM Telecom Operation | (403) 462-0666 ext. 253
During the Roman Era, 28 was considered old...
|
5995 | From: tony@morgan.demon.co.uk (Tony Kidson)
Subject: Re: What is it with Cats and Dogs ???!
Distribution: world
Organization: The Modem Palace
Reply-To: tony@morgan.demon.co.uk
X-Newsreader: Simple NEWS 1.90 (ka9q DIS 1.21)
Lines: 21
In article <1qk3mqINN72e@emory.mathcs.emory.edu> gnome@pd.org writes:
>james.bessette (jimbes@cbnewsj.cb.att.com) wrote:
>>In article <6130328@hplsla.hp.com> kens@hplsla.hp.com (Ken Snyder) writes:
>>Ask the breeder why they also chase BMWs also.
>
>Cam chain.
>
In that case why do they chase ST1100s & Goldwings?
Tony
+---------------+------------------------------+-------------------------+
|Tony Kidson | ** PGP 2.2 Key by request ** |Voice +44 81 466 5127 |
|Morgan Towers, | The Cat has had to move now |E-Mail(in order) |
|Morgan Road, | as I've had to take the top |tony@morgan.demon.co.uk |
|Bromley, | off of the machine. |tny@cix.compulink.co.uk |
|England BR1 3QE|Honda ST1100 -=<*>=- DoD# 0801|100024.301@compuserve.com|
+---------------+------------------------------+-------------------------+
|
5996 | From: ray@ole.cdac.com (Ray Berry)
Subject: Re: Hard drive security for FBI targets
Organization: Cascade Design Automation
Lines: 32
rja14@cl.cam.ac.uk (Ross Anderson) writes:
>In article <1993Apr2.050451.7866@ucsu.Colorado.EDU>, cuffell@spot.Colorado.EDU
>(Tim Cuffel) writes:
>This suggests a new PC security product design approach - first fill the hard
>drive with 50% random files and 50% files encrypted under a number of known
>keys. Then whenever a new secret file is created, you delete a random file and
>replace it with real encrypted data. New non-secret files are encrypted under
>a known key.
Better yet, instead of thrashing around on the DOS file system, take
it a step further. Write yourself a minimal "file system" program that
is used to create/delete files, en/decrypt them to ramdisk, list a
directory. Put the util, password protected, on a floppy.
The catch is that the storage space used by this util is NOT part
of the DOS file system. Instead, defrag your disk, thus packing all
allocated clusters into clusters 0-n. Then use the back end of the
partition to hold your 'stealth' file system. Or, leave a small 2nd
partition on the disk that is not assigned to DOS. Another approach
might be to use a directory that contains a set of invariant files (DOS
system files, for instance). Due to DOS allocating a minimum storage
unit of a "cluster" there is unused physical space on the disk between
the tail end of each file and the end of its associated cluster. These
dead spaces could be concatenated and used to hold your stealth file
system.
Now you have a situation where no encrypted data "appears" on your
disk at all :-).
--
Ray Berry kb7ht ray@ole.cdac.com rjberry@eskimo.com 73407.3152@compuserve.com
|
5997 | From: mike@cunixf.cc.columbia.edu (Michael Chen)
Subject: Re: Jack Morris
Nntp-Posting-Host: cunixf.cc.columbia.edu
Reply-To: mike@cunixf.cc.columbia.edu (Michael Chen)
Organization: Columbia University
Lines: 44
In article <1993Apr19.024222.11181@newshub.ariel.yorku.ca> cs902043@ariel.yorku.ca (SHAWN LUDDINGTON) writes:
>In article <1993Apr18.032345.5178@cs.cornell.edu> tedward@cs.cornell.edu (Edward [Ted] Fischer) writes:
>>In article <1993Apr18.030412.1210@mnemosyne.cs.du.edu> gspira@nyx.cs.du.edu (Greg Spira) writes:
>>>Howard_Wong@mindlink.bc.ca (Howard Wong) writes:
>>>
>>>>Has Jack lost a bit of his edge? What is the worst start Jack Morris has had?
>>>
>>>Uh, Jack lost his edge about 5 years ago, and has had only one above
>>>average year in the last 5.
>>
>>Again goes to prove that it is better to be good than lucky. You can
>>count on good tomorrow. Lucky seems to be prone to bad starts (and a
>>bad finish last year :-).
>>
>>(Yes, I am enjoying every last run he gives up. Who was it who said
>>Morris was a better signing than Viola?)
>>
>>Cheers,
>>-Valentine
>
>Hey Valentine, I don't see Boston with any world series rings on their
>fingers. Damn, Morris now has three and probably the Hall of Fame in his
>future. Therefore, I would have to say Toronto easily made the best
>signing. And don't tell me Boston will win this year. They won't
>even be in the top 4 in the division, more like 6th.
>
>Shawn
>
Gee, I never knew Valentine made a comment about how Viola signing
with Boston was gonna bring a World Series title to Boston. I don't
think Valentine ever said Boston will win this year. Boy, talk about
sensitive, insecure Toronto fans. :)
In any case, I think Viola would have made a better signing. Why?
Viola is younger, and is left handed (how many left handed starters does
Toronto have?
-Mike
/mike@columbia.edu
|
5998 | From: cjp+@pitt.edu (Casimir J Palowitch)
Subject: Re: CLINTON: President's Trip to Pittsburg [sic]
Organization: University of Pittsburgh
Lines: 37
In article <1ql6bgINNklu@life.ai.mit.edu> Clinton-HQ@Campaign92.Org (Clinton/Gore '92) writes:
> STATEMENT BY THE PRESS SECRETARY
> The President will travel to Pittsburgh on Saturday, April
>17 to talk about his job creation plan and its impact on the
>state of Pennsylvania, where it would create as many as 3,818
^^^^^ ^^^^^
*Would*? Ha Haaaa Haa ha haAA
How the hell can they come up with a number, specified to the units
column, on something as complicated as this?
Face it, it's the perceptions that matter here, folks, not the facts.
Especially this one:
>full time jobs and up to 21,240 summer jobs. He will make a
^^^^^^^^^^^^^^^^^^
According to the Pittsburgh Post-Gazette, that means over 7200 new jobs
for Allegheny county (metro Pgh) alone!
Haaaa HAAA ha HA HAAA heh heh HAAAA <snif>
Doing what? I hope it's fixing the potholes on my street.
Let's face it, folks, we're in a depression and this is the WPA.
Clinton's really coming here to beat on Sen. Arlen Specter, who happens
to be vacationing in Africa (Don't know whether to laugh or cry)
--
** Casimir J. (Casey) Palowitch - In 1996, there will be two kinds **
** Slavic Cataloger - of computer professional : those **
** U. of Pgh. Library Systems - who know NeXTStep, and those **
** cjp+@pitt.edu - without Jobs. **
|
5999 | From: hays@ssd.intel.com (Kirk Hays)
Subject: Re: Nazi memoribilia
Nntp-Posting-Host: taos
Organization: Intel Supercomputer Systems Division
Lines: 38
In article <cmay.734085409@helium>, cmay@helium.gas.uug.arizona.edu (Christopher C May) writes:
|> In <1993Apr2.232511.10711@raid.dell.com> mikepb@lupus.dell.com (Michael P. Brininstool) writes:
|>
|> >Swatikas were also common in American Indian markings/painted walls etc. Is
|> >it the Swastika that is bad?
|>
|> Just want to back this up with a personal anecdote. My grandparents
|> have a Navajo rug made in the 1920's, which they received in trade
|> from the weaver while living in Flagstaff, Arizona. The decorative motif
|> consists of 4 large black swastikas, one in each corner. What's more, the
|> color scheme is black, white, and red. To the casual glance it would
|> undoubtedly appear to be a Nazi relic of some kind. Yet they owned it
|> ten years before Hitler and the National Socialists came to power.
|>
|> As I recall, they took it down in the 30's, and didn't feel quite right
|> about putting it back up until the 60's. It still draws comments from
|> those who don't know what it is.
Having lived, played, and worked on and near the Navajo reservation
for a number of years, I can confirm this is an ancient pattern,
found in petroglyphs dated 800 to 1200 years old.
Also, the Indians never stopped making rugs with this pattern - they
just stopped selling them after the Nazi's pre-empted the swastika.
Note also that the Indian versions use both clockwise and
counter-clockwise swastikas.
Ob guns: It's the rare Navaho family that doesn't own a rifle.
They remember being "relocated" by the US Army, and don't intend to
do it again. The Hopi, on the other hand, have a dislike for
weapons, from my experience. Perhaps they just hide them better
from strangers.
--
Kirk Hays - NRA Life, seventh generation.
"The only thing necessary for the triumph of evil is for good men to
do nothing." -- Edmund Burke (1729-1797)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.