index stringlengths 1 5 | content stringlengths 125 75.2k |
|---|---|
6900 | From: donald@dswalker.EBay.Sun.COM (Don Walker)
Subject: Items for SALE
Article-I.D.: male.1ps3s4$6g
Reply-To: donald@dswalker.EBay.Sun.COM
Distribution: world
Organization: Sun Microsystems, Inc.
Lines: 19
NNTP-Posting-Host: dswalker.ebay.sun.com
ITEMS FOR SALE
1. Howard Miller Clock. It chimes like a grandfather clock. $250
2. Painting- A Tiger in the snow. It is a beautiful painting, the tiger
looks like it can jump off of the canvas and get you. $200
3. Mens Diamond Ring, size 10 - $500
a. 3 rows of diamonds
b. 18k gold
Call or email me.
Donald Walker
hm 408-263-3709
wk 408-276-3618
|
6901 | From: mtearle@gu.uwa.edu.au (Mark Tearle)
Subject: Re: Looking for Electronics Dept Info in Austrailia
Organization: The University of Western Australia
Lines: 37
NNTP-Posting-Host: mackerel.gu.uwa.edu.au
hjkim@hyowon.pusan.ac.kr (Hojoong Kim) writes:
>Hi Netters!
>I am looking for the list of universities in Austrailia, which has electronics department.
>I am considering to spend a year for research in Austrailia about communication area.ýé I am interested in Mobile communication areas and spread spectrum communications etc.
>But I don't have any information about Austrailian Universities.
>Can anybody recommend a good university in coûßmmunic÷³ation area?
>Any comments will be welcomed!
Can I suggest the University of Western Australia in Perth.
The weathers great, the people are great and our Electronic Engineering department is great.
I am a first year student here ... so I don't know much about what projects but I do know they have a good reputation in the fields of dsp and communications. Ever heard of QPSX? The people who own are ex-UWA ... so that gives an indication of what the department is like.
For more information
email: yianni@swanee.ee.uwa.edu.au
with the above request and he should be able to tell some more info
or write
Department of Electrical and Electronic Engineering
University of Western Australia
Stirling Highway
CRAWLEY 6009
Western Australia
Australia
Yours
Mark
mtearle@tartarus.uwa.edu.au
--
#***********************************************************************#
# Mark Tearle | #
# |
# email: mtearle@tartarus.uwa.edu.au |
|
6902 | From: Bjornar.Steinbakken@edb.uib.no
Subject: Re: #77's?
Organization: University of Bergen
Lines: 13
In article <1r23on$4p6@bigboote.WPI.EDU> ching@bigwpi.WPI.EDU ("The
Logistician") writes:
>
>I am in need of all of the players wearing #77 in the NHL. I know now
only
>of one, Ray Borque for the Bruins. Any help would be greatly
appreciated.
Paul Coffey of Detroit RedWings
Bjoernar Steinbakken
|
6903 | From: mjs@sys.uea.ac.uk (Mike Sixsmith)
Subject: Re: Looking for Women's Motorcycle Helmet
Organization: University of East Anglia
Distribution: ba
Lines: 19
lisa@alex.com (Lisa Rowlands) writes:
>Hi Janice
>I don't know if I'm being unduly cautious, but I wouldn't buy a used helmet, not for normal road use anyway. You never really know what's happened to them in their past life !
>Have fun,
>Lisa Rowlands
I'll second that!! I saw a list somewhere of all the stuff that it was
unwise to buy secondhand - stuff like parachutes, toilet paper, condoms
and motorcycle helmets...
Seriously though, why take the risk? You are extremely unlikely to get
a good-fitting secondhand helmet, cos life just doesn't work like that!
And as Lisa says, you never know where it's been before...
|
6904 | From: jeffj@krfiny.uucp (J. Jonas)
Subject: Re: Canon BJ200 (BubbleJet) and HP DeskJet 500...
Summary: there are so many refill kits now ...
Organization: Jeff's house of computer pieces
Lines: 18
>thomas.d.fellrath.1@nd.edu@nd.edu wrote:
>: The key issue that I bought my BJ-200 on was ink drying speed.
I was at the Trenton Computer Fest and there were many sources of
ink refills for the HP and Canon, so if you don't like the ink you're using,
you have a choice. There is a Frequently Asked Question (FAQ) list
that's reposted occasionally that reports how to refill the cartridges
yourself with inks that are available from the stationery store
instead of a "specialty" ink with the specialty price.
I'm not sure, but I think I found another legal source of cheap
hypos for injecting ink into the cartridges.
More on that when my mail order succeeds.
--
Jeffrey Jonas
jeffj@panix.com
|
6905 | From: Clinton-HQ@Campaign92.Org (Clinton/Gore '92)
Subject: CLINTON: Public Schedule of the President 4.5.93
Organization: Project GNU, Free Software Foundation,
675 Mass. Ave., Cambridge, MA 02139, USA +1 (617) 876-3296
Lines: 34
NNTP-Posting-Host: life.ai.mit.edu
THE WHITE HOUSE
Office of the Press Secretary
_________________________________________________________________
For Immediate Release April 5, 1993
PUBLIC SCHEDULE OF THE PRESIDENT
TUESDAY, APRIL 6, 1993
11:15 AM EST PRESIDENT CLINTON DELIVERS REMARKS with
Egyptian President Mubarek, the East Room,
The White House
Open Press
FUTURE SCHEDULE OF THE PRESIDENT
APRIL 16, 1993 PRESIDENT CLINTON MEETS with Japanese Prime
Minister Miyazawa, the White House
APRIL 26, 1993 PRESIDENT CLINTON MEETS with Italian
President Amato, the White House
|
6906 | From: pfuetz@igd.fhg.de (Matthias Pfuetzner)
Subject: Available memory to the Xserver. How to get the actual size?
Organization: Zentrum fuer Graphische Datenverarbeitung, Darmstadt, FRG
Lines: 25
Hello Everybody!
I have a little question:
Due to more features (PEX, Drag&Drop) many applications when linked with for
example Motif 1.2 instead Motif 1.1 need more memory in the Xserver.
X-terminals only have limited memory (normally no swapping possible). So my
question:
Is there a possibility to determine via X protocol calls the size of free
memory available to the Xserver?
So one can determine for example whether to start a PEX application with the
CSS on client side or on server side (when there is enough memory).
Please reply via e-mail, I'll summarize!
Sincerly,
Matthias
--
Matthias Pfuetzner | @work: +49 6151 155-150 | @home: +49 6151 75717
6100 Darmstadt, FRG | ZGDV, Wilhelminenstrasse 7 | Lichtenbergstrasse 73
pfuetzner@igd.fhg.de, pfuetzner@zgdvda.UUCP | Keith Packard said:
R5 is different from R4. That's why we changed the release number :-)
|
6907 | From: hse31913@vax1.utulsa.edu (hse31913@vax1.utulsa.edu(Scott H.), U of Tulsa)
Subject: Re: WHERE ARE THE DOUBTERS NOW? HMM?
Organization: The University of Tulsa
Lines: 28
In article <1993Apr4.051942.27095@ramsey.cs.laurentian.ca>,
maynard@ramsey.cs.laurentian.ca (Roger Maynard) writes:
> And after the Leafs make cream cheese of the Philadelphia side tomorrow
> night the Leafs will be without equal.
>
> The Leafs are the best team in the Campbell Conference.
>
> cordially, as always,
>
> rm
>
> --
> Roger Maynard
> maynard@ramsey.cs.laurentian.ca
More like Philadelphia making dust out of dead Leafs.
Roger why do you continue to embarass yourself with your brash predictions?
They got whitewashed by a last place team. Granted Philly is pretty decent
but the "best team in the Cambell Conference" would have beaten a last
place team.
--
Scott E. Humphrey, Chemical Engineering, University of Tulsa
hse31913@vax1.utulsa.edu
Bruins for The Cup!!!
Opinions expressed are those of the individual, not of the U of Tulsa.
|
6908 | From: dchien@hougen.seas.ucla.edu (David H. Chien)
Subject: Orbit data - help needed
Organization: SEASnet, University of California, Los Angeles
Lines: 43
I have the "osculating elements at perigee" of an orbit, which I need
to convert to something useful, preferably distance from the earth
in evenly spaced time intervals. A GSM coordinate system is preferable,
but I convert from other systems. C, pascal, or fortran code, or
if you can point me to a book or something that'd be great.
here's the first few lines of the file.
0 ()
1 (2X, A3, 7X, A30)
2 (2X, I5, 2X, A3, 2X, E24.18)
3 (4X, A3, 7X, E24.18)
1 SMA SEMI-MAJOR AXIS
1 ECC ECCENTRICITY
1 INC INCLINATION
1 OMG RA OF ASCENDING NODE
1 POM ARGUMENT OF PERICENTRE
1 TRA TRUE ANOMALY
1 HAP APOCENTRE HEIGHT
1 HPE PERICENTRE HEIGHT
2 3 BEG 0.167290000000000000E+05
3 SMA 0.829159999999995925E+05
3 ECC 0.692307999999998591E+00
3 INC 0.899999999999999858E+02
3 OMG 0.184369999999999994E+03
3 POM 0.336549999999999955E+03
3 TRA 0.359999999999999943E+03
3 HAP 0.133941270127999174E+06
3 HPE 0.191344498719999910E+05
2 1 REF 0.167317532658774153E+05
3 SMA 0.829125167527418671E+05
3 ECC 0.691472268118590319E+00
3 INC 0.899596754214342091E+02
3 OMG 0.184377521828175002E+03
3 POM 0.336683788851850579E+03
3 TRA 0.153847166458030088E-05
3 HAP 0.133866082767180880E+06
3 HPE 0.192026707383028306E+05
Thanks in advance,
larry kepko
lkepko@igpp.ucla.edu
|
6909 | From: mathew <mathew@mantis.co.uk>
Subject: Re: After 2000 years, can we say that Christian Morality is
Organization: Mantis Consultants, Cambridge. UK.
X-Newsreader: rusnews v1.01
Lines: 13
frank@D012S658.uucp (Frank O'Dwyer) writes:
> In article <1993Apr15.125245.12872@abo.fi> MANDTBACKA@FINABO.ABO.FI (Mats
> Andtbacka) writes:
> | "And these objective values are ... ?"
> |Please be specific, and more importantly, motivate.
>
> I'll take a wild guess and say Freedom is objectively valuable.
Yes, but whose freedom? The world in general doesn't seem to value the
freedom of Tibetans, for example.
mathew
|
6910 | From: xx155@yfn.ysu.edu (Family Magazine Sysops)
Subject: THE EMPTY TOMB...
Reply-To: xx155@yfn.ysu.edu (Family Magazine Sysops)
Organization: St. Elizabeth Hospital, Youngstown, OH
Lines: 218
THE EMPTY TOMB: CAN WE TRUST IT?
by the late Wilbur M. Smith, D.D.
(1894-1977)
When Jesus was on Earth, He made an amazing prediction about
Himself, and frequently repeated it. Let me quote it for you:
Behold, we go up to Jerusalem; and the Son
of Man shall be betrayed unto the chief
priests and unto the scribes, and they shall
condemn Him to death, and shall deliver Him
to the Gentiles to mock, and to scourge, and
to crucify Him; and the third day He shall
rise again" (Matthew 20:18-19).
Wholly different from the normal experience of men, Jesus,
who had *never* done anything worthy of death, even deserving
reproval, knew He would die before He was 40 years of age. He
knew the very city where He would die. He knew that the religious
leaders of His own race would condemn Him to death. He knew that
one of His own would betray Him. He knew that before His actual
death took place He would be mocked and scourged. He knew exactly
how He would die--*by crucifixion.*
All this is in itself remarkable. But more amazing than the
minute particulars of His foreknowledge was what He predicted
would follow shortly after He was buried--*that He would rise
again.* He even designated the time--on the third day.
But since it is on this central fact--the death and resurrec-
tion of Jesus Christ--that the whole truth or untruth of Chris-
tianity turns, let us examine it more closely.
The body of Jesus was embalmed in long sheets of cloth
between the layers of which a great abundance of spices and
ointments was distributed. The body was placed in a tomb which
had never before been used, and a great stone was rolled against
the entrance. The Jewish authorities, fully aware that Jesus had
predicted He would rise again, had the stone officially sealed and
on Saturday placed a guard before the tomb to prevent the
disciples from carrying away the body. Early Sunday morning some
of the women who were faithful followers of Christ went out to the
tomb to further anoint the body. To their utter astonishment,
they found the stone rolled away, the body gone. They rushed back
to tell the disciples. Shortly two of Jesus' friends, Peter and
John, utterly skeptical about the whole affair, came and found the
tomb empty, just as the women had said. Even the guards came
hurrying into the city to tell the Sanhedrin that had hired them
to guard the tomb that the body was gone (Matthew 28:11).
How did this tomb become empty?
One of the most famous New Testament scholars in America--
professor of New Testament literature in a large theological
seminary--wrote to the author in answer to my question of *how*
the tomb became empty, and wrote it in a letter *not* marked by
bitterness or sarcasm, that he could no more explain how the tomb
became empty than he could explain how Santa Claus comes down the
chimney at Christmas time.
But he didn't realize that Santa Clause never did come down
any chimney at Christmas time, *because there never was a Santa
Claus!* ...And there *is* a Jesus. He died; He was buried in the
tomb of Joseph of Arimathea, and on Sunday the body was gone.
Those are facts of history. No one can escape the responsi-
bility of coming to some conclusion about what really happened by
mentioning a myth we all abandoned before we were eight years old.
Another professor, Dr. Kirsopp Lake of Harvard University,
tried to explain the empty tomb by saying (what no other scholar
in the field of New Testament criticism has ventured to adopt)
that the women went to the wrong tomb.
The facts are these:
First, so far as we know, there was no other tomb nearby to
which by mistake they could have gone.
Second, it is contrary to all similar experience for three or
more people to forget the place where they have buried their
dearest loved one within less than three days. Even if the women
did miss the tomb, when Peter and John came, did they too go to
the wrong tomb?
Third, were the soldiers *guarding* the wrong tomb?
There is, of course, a record of an attempt to escape the
evidence of the empty tomb in the New Testament itself.
Now when they were going, behold, some
of the watch came into the city and showed
unto the chief priests all the things that
were done. And when they were assembled
with the leaders and had taken counsel, they
gave large money unto the soldiers, Saying,
Say ye, His disciples came by night, and stole
Him away while we slept. And if this come to
the governor's ears, we will persuade him, and
secure you. So they took the money, and did
as they were taught: and this saying is com-
monly reported among the Jews until this day
(Matthew 28:11-15).
This is a good illustration of many later attempts to escape the
fact that the tomb was empty.
You will notice at once that the chief priests and the elders never
questioned but that the tomb *was* empty. They never even went out to
see if what the guards had reported was true--they *knew* it was true.
Another fact about this story makes it ridiculous to maintain that
the tomb was empty--the soldiers were told to say that Jesus' disciples
came and stole the body away *while they* (the soldiers) *were asleep!*
How could they know what was going on while they were asleep?
Obviously, such testimony would be valueless in any court.
Even aside from the shallowness and sordidness that make us reject
the explanation, the very character and the later history of the
disciples compel us to believe they did not steal and secretly carry away
the body of Jesus.
First, as Professor Heffern points out, the leaders of Judaism in
Jerusalem, who had put the Lord Jesus to death, had nothing to offer to
contradict these disciples as they continued to preach Jesus and His
resurrection--because all Jerusalem knew the tomb was empty. If there
had been trickery here, sooner or later it would have been suspected,
then proved.
Second, surely *one* of the disciples, even *most* of them, would
have confessed the fraud under the terrific persecution they underwent.
It may be possible to live a lie, but men seldom die for a lie--and most
of these men did.
The result ultimately would have been that the message that Christ
had risen would have suffered the fate of all such unfounded stories--it
would have lost it *power.* Instead, this truth swept the world, closed
pagan temples, won millions of disciples, brought hope to a despairing
humanity, was the very foundation truth of the early church, and is today
as believable and as freshly glorious as ever.
But not only did Jesus come alive again, He did not disappear to
leave the disciples speculating through all the subsequent days as to
what had happened to Him.
Instead, He appeared to them--literally, visibly, frequently.
He appeared to the women at the tomb on Resurrection morning
(Matthew 28:1-10); later that day to Mary Magdalene alone (John 20:11-
18); and to Simon Peter, also alone (Luke 24:34). In the afternoon He
walked with two of His followers toward Emmaus (Luke 24:13-35); and that
night He appeared to ten of the apostles gathered together in an upper
room at Jerusalem (Mark 16:14-16; Luke 24:36-40; etc.).
A week later He appeared to all eleven of the apostles, probably at
the same place (John 20:26-28). Once He was seen by above 500 brethren
on a mountain in Galilee (I Corinthians 15:6); and finally to the
apostles just before His ascension (Mark 16:19; Luke 24:50-52; Acts 1:3-
8).
As with the fact of the empty tomb, so in regard to these histor-
ically recorded appearances, all kinds of theories have been proposed
attempting to deny their literalness. But these theories are
unreasonable, without supporting evidence. None has ever won the
unanimous approval of those who refuse to believe in the reality of the
appearances.
Moreover, while it is true we are living in an age when may of our
leading scientists and agnostics and many of our philosophers are
antisuperanaturalistic, let us not forget that some of the greatest
thinkers of the ages have firmly believed in this great miracle.
Increase Mather, president of Harvard; Timothy Dwight, president of Yale;
Nathan Lord, president of Dartmouth; Edward Hitchcock, president of
Amherst; Mark Hopkins, president of Williams; John Witherspoon, president
of Princeton--these men and countless others have believed it.
But suppose Christ *did* rise from the dead, what of it? What has
it to do with *my* life? What has it to do with *your* life? Just this:
it seals with certitude the teachings of Christ.
Jesus taught many great truths--especially many about Himself. He
claimed to have come down *from* God.
He said He was the way *to* God.
He said He was the Son of God, who alone knew God perfectly.
He said that whoever believed on Him had eternal life, and no one
else had it.
He said that whatever we ask God in His name, He would grant it to
us.
Thus when He did rise from the grave on the third day, He revealed
that in these amazing, unparalleled predictions, *He spoke the truth!*
Do you know any reason, *any good reason,* why we should not believe
that His words are all true?
The point is, does not the truth of the Resurrection convince us
that He is none other than the One He claimed to be--the Son of God?
And then, of course, the fact that Christ rose from the dead
testifies that He has broken the power of death, and that He will some
day raise us also up from the grave, as He promised.
In other words, if this Person, Jesus Christ, the Son of God, in all
this, He should be the cornerstone of the foundation of your life. For
He said a life built on Him would know forgiveness of sins, His compan-
ionship and help, a joy that no circumstances can ever take away, and a
hope that shineth more and more unto a perfect day.
Those who have tried it down through the ages--*and there have been
many*--have given their testimony. And we today who believe also know.
|
6911 | From: steve-b@access.digex.com (Steve Brinich)
Subject: Re: Clipper considered harmful
Organization: Express Access Online Communications, Greenbelt, MD USA
Lines: 42
Distribution: inet
NNTP-Posting-Host: access.digex.net
> > Criminals who very badly want inscrutable tactical communications
> >(specifically the terrorists and drug dealers who proponents of key escrow
> >cite as threats) will be highly motivated to steal the cipher phone of
> >a legitimate user, and to kill this person or hold them hostage so
> >discovery of compromise of the device will be delayed.
>Why doing it in such a rough manner? It is much more professional to
>steal the chip from the phone and even to replace it with a
>pin-compatible do-nothing chip that does not encrypt at all. Chances
>are that the victim will not notice anything, especially if it is done
>professionally.
Assuming that the bad guys can easily obtain substitute chips which don't
cause any noticeable effect to either the user or the person at the other end
of the line (if there is any significant difficulty to obtaining such chips,
some of the criminals will decide to fall back on the murder/kidnap method).
> > Once a suitable collection of devices is stolen, criminals can communicate
> >with impunity (assuming the cipher system carries no trapdoors apart from
> >key escrow) until and unless the compromise is discovered by some other
> >means.
> No, because the Feds will still be able to decrypt the conversations.
>True, they'll blame the wrong guys, but nevertheless one cannot say
>something like "The drugs arrive tommorrow on the ship 'Terminus'"
>when the Feds are listening, even if they cannot identify who the
>speaker is.
This assumes that the Feds are tapping Clipper phones belonging to ordinary
citizens (getting such a phone is the whole point of the crime under
discussion). To be sure, I wouldn't put it past them -- but raising the
possibility of such crime has the benefit of forcing the Feds to either
'fess up about such intentions in advance or state that using Clipper
exposes the user to an additional criminal threat. <g>
> No, the criminals will just use some secure encryption. The new
>proposal does not stop criminals; it ensures that the government will
>be able to wiretap the average citizen and stops the casual snooper.
>To me, it also clearly looks as a step towards outlawing any other
>strong encryption devices.
Agreed.
|
6912 | From: ma_ind25@blurt.oswego.edu
Subject: Re:Jewish Baseball Players?
Organization: SUNY College at Oswego, Oswego, NY
Lines: 3
I believe that Rusty Staub was also a jewish ball-player
Also, Mordaci Brown back in the early 20th century. He was a pitcher whose
nickname was "3 fingers" Brown....for obvious reasons....he had 3 fingers.
|
6913 | From: blh@uiboise.idbsu.edu (Broward L. Horne)
Subject: Clinton's Wiretapping Initiative
X-Received: by usenet.pa.dec.com; id AA05890; Fri, 16 Apr 93 11:05:06 -0700
X-Received: by inet-gw-2.pa.dec.com; id AA23713; Fri, 16 Apr 93 11:03:42 -0700
X-Received: by uiboise.idbsu.edu
(16.6/16.2) id AA29234; Thu, 15 Apr 93 13:23:52 -0600
X-To: talk.politics.misc.usenet
X-Cc: alt.politics.clinton.usenet
X-Mailer: Elm [revision: 66.25]
Lines: 19
If you look through this newsgroup, you should be
able to find Clinton's proposed "Wiretapping" Initiative
for our computer networks and telephone systems.
This 'initiative" has been up before Congress for at least
the past 6 months, in the guise of the "FBI Wiretapping"
bill.
I strongly urge you to begin considering your future.
I strongly urge you to get your application for a passport
in the mail soon.
I strongly urge you to consider moving any savings you
have overseas, into protected bank accounts, while
you are still able.
|
6914 | From: ji@cs.columbia.edu (John Ioannidis)
Subject: Re: Source of random bits on a Unix workstation
Article-I.D.: cs.C5Jp0K.4p5
Organization: Columbia University Department of Computer Science
Lines: 35
In article <C5JA6s.A59@cs.psu.edu> so@eiffel.cs.psu.edu (Nicol C So) writes:
>In article <897@pivot.sbi.com> bet@sbi.com (Bennett Todd @ Salomon Brothers Inc., NY ) writes:
>>This came up because I decided to configure up MIT-MAGIC-COOKIE-1 security
>>for X11R5. For this to work you need to stick some bits that an intruder
>>can't guess in a file (readable only by you) which X client applications
>>read. They pass the bits back to the server when they want to establish a
>>connection.
>>
>>...
>>What I settled on was grabbing a bunch of traffic off the network.
>>Basically, I ran
>>
>> etherfind -u -x greater 0|compress
>>
>>and skipped over 10K of output, then grabbed my bits. As best I can tell,
>>these are bits that can be expected to be reasonably uniformly distributed,
>>and quite unguessable by an intruder.
>
>For your application, what you can do is to encrypt the real-time clock
>value with a secret key.
For a good discussion of cryptographically "good" random number
generators, check out the draft-ietf-security-randomness-00.txt
Internet Draft, available at your local friendly internet drafts
repository.
A reasonably source of randomness is the output of a cryptographic
hash function (e.g., MD5), when fed with a large amount of
more-or-less random data. For example, running MD5 on /dev/mem is a
slow, but random enough, source of random bits; there are bound to be
128 bits of entropy in the tens (or hundreds) of megabytes of data in
a modern workstation's memory, as a fair amount of them are system
timers, i/o buffers, etc.
/ji
|
6915 | From: Mamatha Devineni Ratnam <mr47+@andrew.cmu.edu>
Subject: Atlanta Hockey Hell!!
Organization: Post Office, Carnegie Mellon, Pittsburgh, PA
Lines: 23
NNTP-Posting-Host: po4.andrew.cmu.edu
Well, it's not that bad. But I am still pretty pissed of at the
local ABC coverage. They cut off the first half hour of coverage by playing
David Brinkley at 12:30 instead of an earlier time slot. I don't
even understand their problem. If they didnt think enough people would
not watch the game why would they decide to show most of the game? And
if they showed the remaining 2.5 hours of the game, would it hurt to play
David Brinkley at its regular time? They dont have any decent programming
before noon anyway. I called the sports dept and blasted them on their
machine. I called gain and someone picked it up. When I asked him why they
premepted the first half hour of the Stanley Cup playoffs, he seemed a bit
confused. When I explained a bit more in detail, he then said that's upto
to our programming dept. call back on Monday. weel, I understand that the
sports dept is not responsible for this preemption. BUt I can't understand
how someone in the sports dept. can't even recognise the name of playoffs
shown on the very same station he works for.
Anyway, I am going to call them tomorrow and blast them on the phone again.
I urge all Atlanta hockey fans to call WSB 2 and ask them not to do the
same thing for the next 4 weeks.
-Pravin Ratnam(Oh by the way, Pens rule!!!!!!!!!!!!!!)
|
6916 | From: Seth Adam Eliot <se08+@andrew.cmu.edu>
Subject: Re: 2ND AMENDMENT DEAD - GOOD !
Organization: Doctoral student, Materials Science and Engineering, Carnegie Mellon, Pittsburgh, PA
Lines: 58
NNTP-Posting-Host: po3.andrew.cmu.edu
In-Reply-To: <1993Apr18.001319.2340@gnv.ifas.ufl.edu>
Excerpts from netnews.talk.politics.guns: 18-Apr-93 2ND AMENDMENT DEAD -
GOOD ! by jrm@gnv.ifas.ufl.edu
> Yea, there are millions of cases where yoy *say* that firearms
> 'deter' criminals. Alas, this is not provable. I think that that
> there are actually *few* cases where this is so.
excerpted from a letter I wrote a while ago:
Although less apparent to those who have not researched
the facts, personal protection is as legitimate a reason as
sport for the private citizen to own a gun. The most recent
research is that of Dr. Gary Kleck of the Florida State
University School of Criminology.1 He found that handguns
are more often used by victims to defeat crime than by
criminals to commit it (645,000 vs. 580,000 respectively in
this study). These figures are even more encouraging when
you consider the number of crimes that never occur because
of the presence of a gun in the hands of a law-abiding
private citizen. In a National Institute of Justice study
of ten state prisons across the country they found that 39%
of the felons surveyed had aborted at least one crime
because they believed that the intended victim was armed.,
and 57% agreed that "most criminals are more worried about
meeting an armed victim than they are about running into the
police."2
One of the most heinous of crimes is that against the
women of this country. It has been my recent observation
that more women are purchasing handguns for defense in
response to the present danger of these assaults. This
should be taken as encouraging news if the events of Orlando
Florida are any indicator. In the late 1960's the female
populace was plagued with a series of brutal assaults; just
the publicity of the record number of women buying guns and
obtaining training resulted in an 88% decrease in rape for
that area, the only city of its size in the country to
experience a decrease of crime for that year. Additionally,
a 1979 US Justice Department study of 32,000 attempted rapes
showed that overall, when rape is attempted, the completion
rate is 36%. But when a woman defends herself with a gun,
the completion rate drops to 3%.
1 G Kleck, Point Blank: Guns and Violence in America Aldine
de Gruyter, NY, 1991
2 JD Wright & PH Rossi Armed and Considered Dangerous: A
Survey of Felons and Their Firearms, Aldine de Gruyter, NY,
1986
-------
__________________________________________________________________________
[unlike cats] dogs NEVER scratch you when you wash them. They just
become very sad and try to figure out what they did wrong. -Dave Barry
Seth Eliot Dept of Material Science and Engineering
Carnegie Mellon Univerity, Pittsburgh, PA
ARPA :eliot+@cmu.edu |------------------------------------------
or se08+@andrew.cmu.edu |
Bitnet: se08%andrew@cmccvb |
------------------------------|
|
6917 | From: aas7@po.CWRU.Edu (Andrew A. Spencer)
Subject: Re: wife wants convertible
Organization: Case Western Reserve University, Cleveland, OH (USA)
Lines: 17
Reply-To: aas7@po.CWRU.Edu (Andrew A. Spencer)
NNTP-Posting-Host: slc5.ins.cwru.edu
In a previous article, nuet_ke@pts.mot.com (KEITH NUETZMAN X3153 P7625) says:
>
>HELP!!!
>my wife has informed me that she wants a convertible for her next car.
>We live in South Fla., so we are definitely in the right are for one.
>My wife has mentioned the Miata, but I think it is too small.
>I would like to wait for the new Mustangs ( Dec. '93 I think).
>Anyone have any opinions on any/all convertibles in a reasonable price range.
>
> Thanx
>
Geo Metro LSi
:-)
DREW
|
6918 | From: mbeaving@bnr.ca (Michael Beavington)
Subject: Re: Your opinion and what it means to me.
Nntp-Posting-Host: bmerh824
Reply-To: MBEAVING@BNR.CA
Organization: BNR Ottawa, DMS Software Design
Lines: 27
In article <13516@news.duke.edu>, infante@acpub.duke.edu (Andrew Infante) writes:
|> Well, as a few of you so aptly put it,
|> get off the road, jerk, we don't wanna hear your
|> whining.
|>
|> Fine.
|>
|> Fuck off too.
Well it still looks like you've got an attitude problem
Mr. Muttonhead. You should take the comments with more
sensitivity. I still despise most people who belittle
drinking and driving since my first girlfriend was killed
by such an asshole back in '85. Learn to take the verbal
abuse.
If you can't take the flames,
and you can't use your brains,
stay out of the newsgroup.
=============================================================================
= The Beav |Mike Beavington|BellNorthernResearch Ottawa,Ont,Canada| Dod:9733=
= Seca 400->Seca 400->RZ350->Seca750->Suzuki550->Seca650turbo->V65Sabre =
= (-> 1994 GTS1000 ...can't afford the '93) | mbeaving@bnr.ca =
= This company has no idea what I am talking about! =
=============================================================================
|
6919 | From: kime@mongoose.torolab.ibm.com (Edward Kim)
Subject: Re: Ind. Source Picks Baerga Over Alomar: Case Closed
In-Reply-To: tedward@cs.cornell.edu's message of Fri, 16 Apr 1993 19:07:35 GMT
Distribution: na
Lines: 8
<1993Apr16.190735.13322@cs.cornell.edu>
Organization: IBM Toronto Lab
> That's a joke! (Alomar might not be a gold-glover, but he's certainly
> no worse than Baerga defensively.)
Actually Alomar is a two-time gold-glover (91-92).
>
> -Valentine
Edk
|
6920 | From: jake@bony1.bony.com (Jake Livni)
Subject: Re: was:Go Hezbollah!!
Organization: The Department of Redundancy Department
Lines: 39
In article <1993Apr14.210636.4253@ncsu.edu> hernlem@chess.ncsu.edu (Brad Hernlem) writes:
>Hezbollah and other Lebanese Resistance fighters are skilled at precision
>bombing of SLA and Israeli targets.
It's hard to beat a car-bomb with a suicidal driver in getting
right up to the target before blowing up. Even booby-traps and
radio-controlled bombs under cars are pretty efficient killers.
You have a point.
>I find such methods to be far more
>restrained and responsible
Is this part of your Islamic value-system?
>than the Israeli method of shelling and bombing
>villages with the hope that a Hezbollah member will be killed along with
>the civilians murdered.
Had Israeli methods been anything like this, then Iraq wouldn've been
nuked long ago, entire Arab towns deported and executions performed by
the tens of thousands. The fact is, though, that Israeli methods
aren't even 1/10,000th as evil as those which are common and everyday
in Arab states.
>Soldiers are trained to die for their country. Three IDF soldiers
>did their duty the other day. These men need not have died if their government
>had kept them on Israeli soil.
"Israeli soil"???? Brad/Ali! Just wait until the Ayatollah's
thought-police get wind of this. It's all "Holy Muslim Soil (tm)".
Have you forgotten? May Allah have mercy on you now.
>Brad Hernlem (hernlem@chess.ncsu.EDU)
--
Jake Livni jake@bony1.bony.com Ten years from now, George Bush will
American-Occupied New York have replaced Jimmy Carter as the
My opinions only - employer has no opinions. standard of a failed President.
|
6921 | From: greg@cs.uct.ac.za (Gregory Torrance)
Subject: Automatic layout of state diagrams
Organization: Computer Science Department, University of Cape Town
Lines: 18
Hi,
I'm hoping someone out there will be able to help our computer science
project group. We are doing computer science honours, and our project
is to do a 'graphical simulator for a finite state automata'.
Basically, the program must draw a diagram of a FSA from a textual grammar,
showing circles for states, and labeled arc's in-between.
The problem is working out the best way to layout the states, and draw the
arc's in-between so that as few arc's as possible cross each other.
If anyone has any suggestions/algorithms/bug-free ready to compile C code :)
that might help us, it would be much appreciated.
Thanks in advance,
Gregory
|
6922 | From: holler@holli.augs1.adsp.sub.org (Jan Holler)
Subject: Re: Newsgroup Split
Reply-To: holli!holler@augs1.adsp.sub.org
Organization: private
Lines: 24
X-NewsSoftware: GRn 1.16f (10.17.92) by Mike Schwartz & Michael B. Smith
In article <NERONE.93Apr20085951@sylvester.cc.utexas.edu> nerone@ccwf.cc.utexas.edu (Michael Nerone) writes:
> In article <1quvdoINN3e7@srvr1.engin.umich.edu>, tdawson@engin.umich.edu (Chris Herringshaw) writes:
>
> CH> Concerning the proposed newsgroup split, I personally am not in
> Also, it is readily observable that the current spectrum of amiga
> groups is already plagued with mega-crossposting; thus the group-split
> would not, in all likelihood, bring about a more structured
> environment.
Am I glad you write that. I got flamed all along because I begged NOT to
crosspost some nonsense articles.
The problem with crossposting is on the first poster. I am aware that this
posting is a crossposting too, but what else should one do. You never know
where the interested people stay in.
To split up newsgroups brings even more crossposting.
--
Jan Holler, Bern, Switzerland Good is not good enough, make it better!
holli!holler@augs1.adsp.sub.org ((Second chance: holler@iamexwi.unibe.ch))
-------------------------------------------------------------------------------
(( fast mail: cbmehq!cbmswi!augs1!holli!holler@cbmvax.commodore.com ))
|
6923 | From: seanmcd@ac.dal.ca
Subject: PowerPC ruminations; was Re: LCIII->PowerPC?
Organization: Dalhousie University, Halifax, Nova Scotia, Canada
Lines: 47
In article <186177@pyramid.pyramid.com>, andrem@pyrtech.mis.pyramid.com (Andre Molyneux) writes:
> In article <1qksuq$1tt8@hal.gnu.ai.mit.edu>, mirsky@hal.gnu.ai.mit.edu
> (David Joshua Mirsky) writes:
> |> Hi. I own an LCIII and I recently heard an interesting rumor.
> |> I heard that the LCIII has a built in slot for a PowerPC chip.
> |> Is this true? I heard that the slot is not the same as the PDS
> |> slot. Is that true?
> |>
> |> Thanks
> |> David Mirsky
> |> mirsky@gnu.ai.mit.edu
>
> Well, I also have an LC III. Popping the top revealed:
>
> One "socket" for an additional VRAM SIMM
>
> One "socket" for a 72-pin RAM SIMM
>
> One socket for a flat-pack FPU
>
> A processor-direct slot (PDS) identical to the LC/LC II, but with
> an additional set of connetions to one side (for the full 32-bit
> data path that the LC/LC II lacked
>
> That's it. I guess a board with a PowerPC chip could be made that would fit
> in the PDS, but that's the only place.
>
So, will it be possible to have a NuBus or PDS PowerPC upgrade, or will it
require a logic board swap? It would be interesting for Apple to come out with
a NuBus PowerPC that allowed use of the CPU's 680x0, like RocketShare. But I
guess that's getting a bit fantastic!
I was wondering, since MacWeek reported that developers were 'seeded' with
PowerPCs on a NuBus card.
Also, any word on machine arrivals or estimated speed? Last I heard, the
estimates were around 3-4 times the speed of a Quadra in native RISC mode. I
heard an Apple employee mumble something about the arrival of PowerPC machines
at a much earlier date that Q1 94, but I doubt it's true.
Finally, is the PowerPC developer's CD 'mini-course' available? I saw it
advertised in the developer's university calendar, and I'd like to know if it's
at all *interesting*.
Sean
--------------
seanmcd@ac.dal.ca
|
6924 | From: mmanning@icomsim.com (Michael Manning)
Subject: Re: Riceburner Respect
Organization: Icom Simulations
Lines: 27
In article <oXZ12B1w164w@cellar.org> craig@cellar.org (Saint Craig)
writes:
> shz@mare.att.com (Keeper of the 'Tude) writes:
>
> No anyone who is a "true" rider with the real riding
> attitude will offer a wave, weather they are on a Harley
> or on a Honda or some other bike, inless they have a
> serious case of my bike is better than your and you're
> too low to be acknowleged. This you'll find is the case
> with most of the harley riders out here where I am,
> however I still give them a wave, and ride secure in the
> knowlege that I'm a better persob than they are.
^^^^^^
perSOB, I kinda like that
Most people wave or return my wave when I'm on my Harley.
Other Harley riders seldom wave back to me when I'm on my
duck. Squids don't wave, or return waves ever, even to each
other, from what I can tell.
--
Michael Manning
mmanning@icomsim.com (NeXTMail accepted.)
`92 FLSTF FatBoy
`92 Ducati 900SS
|
6925 | From: Donald Mackie <Donald_Mackie@med.umich.edu>
Subject: Re: Seeking advice/experience with back problem
Organization: UM Anesthesiology
Lines: 20
Distribution: world
NNTP-Posting-Host: 141.214.86.38
X-UserAgent: Nuntius v1.1.1d9
X-XXDate: Fri, 16 Apr 93 15:41:32 GMT
In article <C5FI9r.7yz@cbnewsk.cb.att.com> janet.m.cooper,
jmcooper@cbnewsk.cb.att.com writes:
>The mother of a friend of mine is experiencing a disabling back
>pain. After MRIs, CT scans, and doctors visits she has been
presented
>with 2 alternatives:
>(1) live with the pain
>or (2) undergo a somewhat
>risky operation which may leave her paralyzed. She also has a
Since her symptoms are only pain she would do weel to seek the
advice of a good, multi-disciplinary pain clinic. It is distressing
to think that people are stll being told they have to "live with the
pain" when many options for pain management (rather than treating
MRI findings) are available. A good pain clinic will accept that
this lady's problem is her pain and set about finding ways of
relieveing that.
Don Mackie - his opinions
UM Anesthesiology will disavow...
|
6926 | From: silvera@ghost.dsi.unimi.it (paolo silvera)
Subject: What SVGA ?
Organization: Computer Science Dep. - Milan University
Lines: 21
Excuse me to every one.
I am an Amiga owner and tired to have the same graphic modes.
So I saw on nn there was a little bridgeboard that made the
Amiga's PC slots communicate with the stanndard Amiga's slot.
The building mother house of this little gadget assure me
that using this thing I can use all the pc boards included
the SVGA cards.
I am interested in computer graphics and I do not know many
things about pc in general.
So, what is the best (ISA slot) card on the market ?
I'd like to reach resolutions like 1280x1024 with 256
colors or 800x600 with 24 bitplanes.
Any suggestion ??
thankyou in advance
Paolo Silvera -- Certified Commodore Amiga developer
silvera@ghost.sm.dsi.unimi.it
|
6927 | From: spart@cs.uq.oz.au (Geoff Green)
Subject: Multi I/O card with 16550 UART's
Reply-To: spart@cs.uq.oz.au
Organization: Department of Computer Science, The University of Queensland
Lines: 18
Is it possible to buy a serial I/O card with the 16550 UART's built in
(rather than having to buy them separately, and socketing them in)?
My current I/O card uses 8250's (correct number? The braindead ones anyway).
It also controls two floppy drives, and two IDE hard drives.
Ideally, I'd like to get a new multi I/O card, that had 2 serial ports with
16550's and could also control another 2 IDE HD's. It would have to have
configurable addresses for both the serial ports, and the IDE controller, so
it could co-exist with my existing card.
Does such a beast exist? Now the hard part - where can I get one in Australia,
preferably Brisbane?
Thanks,
Geoff Green (spart@cs.uq.oz.au)
|
6928 | From: philly@ravel.udel.edu (Robert C Hite)
Subject: Re: WFAN
Nntp-Posting-Host: ravel.udel.edu
Organization: University of Delaware
Lines: 26
In article <1993Apr15.151202.3551@Virginia.EDU> jja2h@Virginia.EDU ("") writes:
>Does any one out there listen to WFAN? For those of you who do
>not know what I am talking about, it is an all sports radio
>staion in New York. On a clear night the signal reaches up and
>down the East coast. In particular, I want to know how Len
>Berman and Mike Lupica's show is. I go to school in Virginia
>so I can't listen when there are on during the day. Just
>wondering.
The FAN is an okay Sports Radio station, but doesn't come close to
the ULTIMATE in Sports Radio, 610 WIP in Philadelphia. The signal
might not be as powerful, but then again only stations in New York
feel "obligated" to pollute everyone else's airwaves with a bunch of
hoodlum Mets fans complaining 24 hours a day. WIP took two of your
best sports jockeys too, Jody MacDonald and Steve Fredericks. 610
WIP is rockin with sports talk from 5:30 AM till midnight, check it
out anytime your within a few hours of Philadelphia. If I'm not
mistaken, WIP has the highest sports talk ratings in the nation?
-Rob
p.s the only nice thing about the FAN is that they talk sports all
night. hopefully 610 will begin to do that somewhat soon
|
6929 | From: jhart@agora.rain.com (Jim Hart)
Subject: Screw the people, crypto is for hard-core hackers & spooks only
Summary: (We need privacy chips for phones, not computer-bound station)_
Article-I.D.: agora.C5qy3M.DE3
Organization: Open Communications Forum
Lines: 48
Since the wiretap chip is being distributed internationally,
allowing the U.S. government to spy on foreign governments,
companies and people as as well as to wiretap domestic citizens,
this is a world-wide issue. Please put DISTRIBUTION: WORLD on the
Distrubution: line. Thank you.
ygoland@wright.seas.ucla.edu (The Jester) writes:
>However assuming that I can still encrypt things as I please, who
>cares about the clipper chip?
You don't care that people are being lied to, fooled into believing
the chip gives "privacy" when it fact it allows wiretaps? You
don't give a shit about anybody's privacy except your own? (And
not even your own; are you so smart that you know when you're talking to
somebody who has a wiretap chip on their phone instead of a privacy
chip with private keys?)
>attitude that everyone else should have. Instead of worrying about a
>clipper chip, simply connect your handset to your computer and feed
>the voice single through, process, encrypt, and transmit over the
>phone. The guy on the other hand then does the same in reverse.
"Simply?" "Everyone" should have this attitude? The only people
who can have this attitude are the most hard-core
computer hackers, who never make phone calls away from their
computer, who apparently never call anybody except another computer
hacker, or perhaps another spook (U.S. classified agents refuse to use
their own system, only oblivious civilian dupes get that dubious privilege).
Only spooks and hard-core hackers need privacy, huh?
We *do* need an alternative to NSA-bugged telephones, but
we're talking inexpensive *telephones* here, including hand-sized
cellulars, that need strong crypto, real privacy. Make-shift
computer hacker rigs that require living by your computer to
talk privately over the phone are just a dumb stunt that doesn't
do anything for anybody's privacy in the real world.
What we need is a true *privacy chip*. For example, a real-time
voice-encryption RSA, put it into a silicon compiler and spit out ASIC.
Put this chip on the market as a de facto standard for international
business, diplomats, and private communications. If the U.S. bans
it, we make it somewhere else and import it. The Japanese, German,
Dutch, Taiwanese, Korean, etc. electronics companies don't want the
NSA spying on them. U.S. workers lose more jobs to government fascist
stupidity.
jhart@agora.rain.com
|
6930 | From: kkeller@mail.sas.upenn.edu (Keith Keller)
Subject: Playoff pool
Organization: University of Pennsylvania, School of Arts and Sciences
Lines: 30
Nntp-Posting-Host: mail.sas.upenn.edu
Well, I looked at the scoring plan I had, and have decided to modify it.
Here is the new, finalized scoring:
Pick 1st round winner, way off on games: 2
" " " " pick within one game: 3
" " " " pick exact games: 4
Pick 2nd round winner, way off on games: 4
" " " " pick within one game: 5
" " " " pick exact games: 7
Pick conference champ, way off on games: 7
" " " pick within one game: 10
" " " pick exact games: 13
Pick Stanley Cup winner, way off on games: 13
" " " " pick within one game: 17
" " " " pick exact games: 20
Pick loser in 7, series goes 7: 2
Pick loser in 7, game 7 decided in OT: 4
These are now final. Anyone needing a copy of the entry sheet, email me
at the address below.
--
Keith Keller LET'S GO RANGERS!!!!!
LET'S GO QUAKERS!!!!!
kkeller@mail.sas.upenn.edu IVY LEAGUE CHAMPS!!!!
"When I want your opinion, I'll give it to you."
|
6931 | From: jeffp@vetmed.wsu.edu (Jeff Parke)
Subject: Re: Lyme vaccine
Organization: College of Veterinary Medicine WSU
X-Newsreader: TIN [version 1.1 PL9]
Lines: 13
kathleen richards (kilty@ucrengr) wrote:
> If you have time to type it in I'd love to have the reference for that
> paper! thanks!
Experimental Lyme Disease in Dogs Produces Arthritis and Persistant Infection,
The Journal of Infectious Diseases, March 1993, 167:651-664
--
Jeff Parke <jeffp@pgavin1.vetmed.wsu.edu>
also: jeffp@WSUVM1.bitnet AOL: JeffParke
Washington State University College of Veterinary Medicine class of 1994
Pullman, WA 99164-7012
|
6932 | From: west@next02cville.wam.umd.edu (Stilgar)
Subject: Re: Gospel Dating
Nntp-Posting-Host: next15csc.wam.umd.edu
Reply-To: west@next02.wam.umd.edu
Organization: Workstations at Maryland, University of Maryland, College Park
Lines: 35
In article <kmr4.1433.734039535@po.CWRU.edu> kmr4@po.CWRU.edu (Keith M.
Ryan) writes:
> In article <1993Apr5.163050.13308@wam.umd.edu>
west@next02cville.wam.umd.edu (Stilgar) writes:
> >In article <kmr4.1422.733983061@po.CWRU.edu> kmr4@po.CWRU.edu (Keith M.
> >Ryan) writes:
> >> In article <1993Apr5.025924.11361@wam.umd.edu>
> >west@next02cville.wam.umd.edu (Stilgar) writes:
> >>
> >> >THE ILLIAD IS THE UNDISPUTED WORD OF GOD(tm) *prove me wrong*
> >>
> >> I dispute it.
> >>
> >> Ergo: by counter-example: you are proven wrong.
> >
> > I dispute your counter-example
> >
> > Ergo: by counter-counter-example: you are wrong and
> > I am right so nanny-nanny-boo-boo TBBBBBBBTTTTTTHHHHH
>
> No. The premis stated that it was undisputed.
>
Fine... THE ILLIAD IS THE WORD OF GOD(tm) (disputed or not, it is)
Dispute that. It won't matter. Prove me wrong.
Brian West
--
THIS IS NOT A SIG FILE * -"To the Earth, we have been
THIS IS NOT A SIG FILE * here but for the blink of an
OK, SO IT'S A SIG FILE * eye, if we were gone tomorrow,
posted by west@wam.umd.edu * we would not be missed."-
who doesn't care who knows it. * (Jurassic Park)
** DICLAIMER: I said this, I meant this, nobody made me do it.**
|
6933 | From: Clinton-HQ@Campaign92.Org (Clinton/Gore '92)
Subject: CLINTON: Press Briefing by George Stephanopoulos 4.5.93
Organization: Project GNU, Free Software Foundation,
675 Mass. Ave., Cambridge, MA 02139, USA +1 (617) 876-3296
Lines: 581
NNTP-Posting-Host: life.ai.mit.edu
THE WHITE HOUSE
Office of the Press Secretary
_____________________________________________________________________
For Immediate Release April 5, 1993
PRESS BRIEFING
BY GEORGE STEPHANOPOLOUS
The Briefing Room
10:10 A.M. EDT
MR. STEPHANOPOULOS: As you know, the President is soon
to be on his way, on Amtrack to Camden Yards. He'll be throwing out
the first pitch.
Q It's MARC, the Maryland Area Transit, it's not
Amtrack.
MR. STEPHANOPOULOS: Oh, it's not Amtrack? Well, he's
going from Union Station, you're right. Excuse me.
Q George, what exactly are you prepared to do to
break the logjam with ??? Senate?
MR. STEPHANOPOULOS: Well, as you know, there are
discussions between Senator Mitchell and Senator Dole this morning,
and I think that the President is going to continue to make the point
that he believes that our investment package, our jobs package needs
to be passed as quickly as possible. We need this investment for
summer jobs, for immunization, for highway construction, for the
important programs that will put people back to work right away this
summer. And the President continues to believe his program should be
passed.
Q Will he compromise, that's the question?
MR. STEPHANOPOULOS: Well, as you know, the discussions
are going on this morning in the Senate betwen Senator Mitchell and
Senator Dole, let's see what they come up with. But the President
believes his jobs program should go forward.
Q George, would the President be willing to accept $8
billion for one year, which apparently appears to be the compromise
being offered by --
MR. STEPHANOPOULOS: Well, I don't know what is being
offered by either side. The Senate discussions are going on right
now, let's see what happens today.
Q Would he go that far -- no matter what the
Republicans have offered so far, would he go that far, $8 billion per
year?
MR. STEPHANOPOULOS: The President believes that his
program should be passed at this time. Clearly, we're going to be
willing to listen to what the Senators might or might not be able to
come up with, but I'm not going to get into figures right now. Let's
see what happens.
Q It's reasonable to assume, isn't it, from what has
happened so far that a compromise is going to be necessary in order
to get a vote?
MR. STEPHANOPOULOS: Well, the Republicans seem more
intrested in stopping progress on the President's jobs bill, than in
doing something to create -- MR. STEPHANOPOULOS: Well, the
Republicans seem more interested in stopping progress on the
President's jobs bill than in doing something to create real action,
real jobs this summer for the American people. I think there's no
question about that. There's been some frustration of legislative
activity over the last few days.
Q So, you'll need to compromise to get your package
through?
MR. STEPHANOPOULOS: We'll see what happens with the
conversations between Senator Mitchell and Senator Dole this morning.
Q prepared to compromise --
MR. STEPHANOPOULOS: The President's prepared to listen
to what Senator Mitchell has to say this morning after his meeting
with Senator Dole.
Q Does he feel that he has been defeated in his --
MR. STEPHANOPOULOS: Not in the least. In fact, he's
been very successful so far in the beginning of his term.
Q How?
MR. STEPHANOPOULOS: He passed his budget in record
time, in six weeks, and it's a budget which reduces the deficit by
$500 billion over five years. And it's a budget which provides for
important investments in our future. Right now we've also had strong
passage of his jobs program through the House. Simply because a
minority of Republicans in the Senate choose to perpetuate gridlock
and hold up action on the President's jobs program is not a sign that
he is not succeeding overall.
Q He can't beat this, can he?
Q The fact is they can do that?
MR. STEPHANOPOULOS: Well, the Republicans can stop
action. There's no question about that.
Q What are you going to do about it?
Q George, what do you know about these alleged notes
taken by Boris Yeltsin during one of the meetings in which it appears
that the President told Boris Yeltsin not to trust the Japanese; that
when they say yes they mean no?
MR. STEPHANOPOULOS: I think that's a complete
misreading of what happened at the meeting. The context of the
conversation was that President Clinton was actually reassuring
President Yeltsin at the time about his conversations with Prime
Minister Miyazawa over the Kuril Islands and the Prime Minister's
belief that Japan would play a constructive role in the G-7 process.
I mean this was a casual comment about Japanese courtesy and
etiquette but overall it was in the context of a conversation where
he was reassuring President Yeltsin that he believed the Japanese
were serious about their commitment to the G-7 process.
Q Are you saying that the President said that when
the Japanese say yes they mean no?
MR. STEPHANOPOULOS: That's not -- I don't know the
exact words and there was a much longer discussion about he did say
something along the lines that he believes that on this issue Prime
Minister Miyazawa intends to really go forward with the G-7 process.
Q Have there been any attempts to explain this to the
Japanese because apparently the Japanese press has picked this up and
there appears to be --
MR. STEPHANOPOULOS: I've seen the reports in the
Japanese press and it actually does put the situation in context. It
does talk about the Japanese -- understanding the Japanese points of
view. I don't think it's going to be a problem. I believe that
there may have been some diplomatic context just to clear things up
but I'm not positive.
Q George, was the specific comment that was made
specific to the Kuril Island situation or was it a general
observation on Japanese etiquette?
MR. STEPHANOPOULOS: The discussion was about --
Q The specific comment is what I'm asking about that
has alleged to have been translated from the Russian notes, "when the
Japanese say yes they mean no."
MR. STEPHANOPOULOS: Well, it was a combination. I mean
I don't think that's the whole sentence. I think that the specific
comment was a broad, general observation followed up by a specific
finish to the sentence where he said in this case he believes that
Prime Minister Miyazawa means to keep the commitment.
Q Was he saying it facetiously first?
MR. STEPHANOPOULOS: I think it was just a casual
observation.
Q And then you say diplomatic contacts were made to
clear it up. Has the President sent a message?
MR. STEPHANOPOULOS: No, I don't think the President
spoke; I believe that Secretary Christopher has made some calls but
I'm not sure exactly how many.
Q Well, this obviously is a bigger deal than you're
making it out to be if Christopher has had to make some calls.
MR. STEPHANOPOULOS: No, no. It was just that we got
the reports in Vancouver and the Secretary wanted to make sure that
it was understood and make sure there was absolutely no
MR. STEPHANOPOULOS: -- reports in Vancouver, and the
Secretary wanted to make sure that it was understood, and make sure
there is absolutely no misunderstanding, and I don't believe there is
on.
Q What is our position about the Japanese? That they
may have to say one thing, but actualy mean another?
MR. STEPHANOPOULOS: No. The position on the Japanese
is as the President stated to President Yeltsin throughout the two
days. He said that he had had a good conversation with Prime
Minister Miazawa prior to the Summit. He reiterated the U.S.
position, the long-standing support for the Japanese position on the
Kuril Islands, but also reiterated Prime Minister Miazawa's
commitment to move forward on the G-7 process and to play a
constructive role. And I think President Yeltsin was very glad to
hear that.
Q After listening to Secretary Christopher on Iraq
for the last few days, I'm a little confused. What is the U.S.
policy? Do you want to see Saddam Hussein overturned?
MR. STEPHANOPOULOS: It's the same policy that Secretary
Christopher has reiterated, and all of the U.S officials have
reiterated. We expect full and complete and unequivocal compliance
with all U.N. resolutions. Right now we do not have that compliance.
Q throwing it out further that if Iraq complies,
Saddam can't stay in office?
MR. STEPHANOPOULOS: Right. I think that that's -- our
judgment is that it is not possible for Saddam Hussein to comply with
the resolutions and stay in power. But the important point is that
we expect compliance by Iraq with all U.N. resolutions, and we will
continue to demand it.
Q And are you concerned the Iran will become the
dominant power in the area --
MR. STEPHANOPOULOS: Secretary Christopher has also
spoken to Iran over the last several days, and he says we also expect
full Iranian compliance with all international norms, and stopping
support of terrorism.
Q That's a very glib statement that he won't stay in
power if he complies with U.N. resolutions. On what logic do you
base that?
MR. STEPHANOPOULOS: Right now Saddam Hussein is not
complying with the U.N. resolutions at all. He is not respecting the
rights of his people, as is required by the U.N. resolution. He is
not fully complying with all the resolutions regarding inspections.
He is not fully complying with all the resolutions regarding
armaments.
Q Well, when do you think that if he did comply he
would be out of power?
MR. STEPHANOPOULOS: Well, right now his power rests on
the repression of his people. If he stopped doing that it would make
it more difficult for him to stay in power.
Q George, back on the stimulus package, why is it
that you and the President accuse the Republicans of playing pure
politics and perpetuating gridlock? Why is it that -- what evidence
do you have that they just don't have a genuine idealogical
difference with you that's in good faith?
MR. STEPHANOPOULOS: Well, the fact that several times
in the past the Republicans, many of the ones who are now leading the
fight for the filibuster, have supported the very funding they now
seek to stop, most especially, the highway funding.
Q George, in regards to that, some of the moderate
Republicans said that the White House erred by not being more open to
them during the -- while the plan was put together, that they had
one, sort of, proforma meeting between the White House and the Senate
Republicans, and that was it. Does the Administration look back and
thinks perhaps it could have done a better job of working with some -
-
MR. STEPHANOPOULOS: Well, I'm not sure that it's true
that there was only one meeting. I mean, the President met with the
Republican leadership on at least two occasions before the
introduction of his package. He met with the entire Senate
Republican Caucus also for lunch, and went up there. We are
continually in contact with as many Republicans as we can find who
have an interest in the President's package. We are interested in
what they have to say, as well. But we believe that this program is
important, and we're going to continue to fight for it.
Q your all or nothing, do it with the Democrats
alone strategy, did you maybe miscalculate the ability to get it
through?
MR. STEPHANOPOULOS: Well, I mean, I think that there is
no question that under the Senate rules a determined minority can
frustrate activity. I mean, there is just no question about that.
You only need 40 plus one to keep going. 40 plus one to keep going
and to stop any action, and that's what the Republicans are doing.
Q going to rethink the way you attempt to get
other things passed as you go through this process for the rest of
the summer?
Q work with Republicans and try to woo some
Republicans into your camp?
MR. STEPHANOPOULOS: I think we're going to continue to
look for the support of Republicans whenever we can get it on the
President's intiatives?
Q But on this one -- how are you going to do it
differently than you did it on this one because on this one you
really did stiff the Republicans from the beginning and made it clear
that it was a Democratic majority that would get this through and
could get it through and you really didn't need Republican votes?
Are you going to take a different tack when you have to go for
particular votes? When you have to go through --
MR. STEPHANOPOULOS: I can't see into the future and
understand every possible turn in the legislative road. Clearly the
President's going to continue to reach out when he can.
Q You don't have any regrets then about the way you
have handled it up to now and you don't plan any changes in your
approach in dealing with the Republicans in Congress based on this
experience?
MR. STEPHANOPOULOS: Obviously the President would like
his package passed as quickly as possible and he's going to continue
to press for that. We will continue to reach out to Republicans,
there's not question about that. And we'll continue to reason with
them and try and find appropriate avenues for cooperation. In this
case the Republicans have chosen to unify around a filibuster, around
a plan to frustrate action not a plan to move forward.
Q They're being denied any other legislative means of
putting their proposals forward.
MR. STEPHANOPOULOS: I think they're being --
Q any ideas.
MR. STEPHANOPOULOS: I think their amendments are being
defeated; I don't know that they're being denied.
Q to present them.
MR. STEPHANOPOULOS: That's not exactly true. I mean
they get the votes --
Q that theirs can be passed though by the
parliamentary rules under which they're playing.
MR. STEPHANOPOULOS: Unless they get a majority in
support all the way around, no, that's not exactly true.
Q George, one more on Iraq. Is the administration
backing any of the Iraqi opposition? Grooming any new leadership?
Q backing any of the Iraqi -- leadership?
MR. STEPHANOPOULOS: Oh, I -- again, we're pressing for
Iraqi compliance. I don't know if we can get into the business of
grooming leadership. I believe there have been some contacts, at
some levels, with Iraqi opposition groups. I don't know about
anything recently.
Q Jesse Jackson, who, of course, is not the
President's best friend, has, however, been told that there is to be
some kind of town meeting, or some kind of involvement by the
President, pre-empted the ball game -- Los Angeles. Will he consider
something like that, or any other kind of intervention there?
MR. STEPHANOPOULOS: Well, as you know, the President
appointed Commerce Secretary Ron Brown, about 10 days ago, to be a
special envoy to California, and coordiante cabinet activities around
the California economic situation, including the situation in Los
Angeles.
I believe there will also be visits out to Los Angeles
by the Education -- or have been visits by the Education Secretary,
Mr. Riley. I believe that Transportation Secretary Pena and HUD
Secretary Cisneros are also going out. And there may be other visits
by Cabinet officials over the next several days and weeks. I
wouldn't rule out the possibility of a visit by President Clinton to
California. Obviously, he is following the situation closely, and is
concerned about making sure that we make the right long term policy
decisions that will help create the kind of economic opportunities
which help prevent disturbances. But we're going to continue to
watch it.
Q George, as a follow-up, Reverend Jackson is also
supposed to be outside the ball park today, in Baltimore, with a
group of supporters protesting the lack of minorities in baseball
management. Does the President have a position on that?
MR. STEPHANOPOULOS: The President has received
correspondence from Reverend Jackson. I know that Reverend Jackson
has also spoken with the White House Chief of Staff, Mack McLarty.
He clearly raises serious questions. There has been some progress in
baseball over the last several years, but still not enough. But the
President intends to continue to go to the ball game.
Q Is he going to say anything about it today, or see
Reverend Jackson while he's out there?
MR. STEPHANOPOULOS: I don't know if he is going to see
them, but as I said, the President believes that Reverend Jackson has
raised some serious questions, and it's something that, as I said,
even though there has been progress, it's clearly not enough.
Q Did Reverend Jackson ask him not to go to the ball
game?
MR. STEPHANOPOULOS: I'm not sure about that. I believe
the characterization the Reverend Jackson is talking about is an
informational pickett. I don't know that he asked him not to go to
the ball game, but he sent a long, detailed, formal letter outlining
his concerns with the situation in major league baseball and the
President read it.
Q George, the Orioles are playing the Rangers, the
managing partner of the Rangers is George W. Bush. Is he going to be
there, and is he going to meet with the President?
MR. STEPHANOPOULOS: I don't know.
Q What is the Mubarak schedule?
MR. STEPHANOPOULOS: I know that President Mubarak is
coming tomorrow morning for a working meeting, they will have a
lunch, and I believe that he is having dinner tonight with Vice
President Gore.
Q And joint statements tomorrow --
MR. STEPHANOPOULOS: I believe so, yes. At the end,
yes.
Q Is there evidence, George, that the Egyptians did
warn the U.S. about a potential terrorist bombing -- terrorist
activities?
MR. STEPHANOPOULOS: As reported in The New York Times,
I mean, I think that President Mubarak did say that there has been
general conversations with the Egyptians, as there have been for a
long period of time. We do have general intelligence sharing, I
mean. But President Mubarak was very careful to point out that there
was no specific information on this visit that was passed forward.
The President will continue to investigate the situation, but he also
reiterates his belief that we cannot tolerate terrorism of any kind.
Q George, he did make specific -- or the Egyptians,
apparently, did issue specific warnings about this individual who,
forgive me --this individual who, forgive me the name escapes me at
the moment, and said the Egyptians were more or less rebuffed in
their attempts to get some kind of action.
MR. STEPHANOPOULOS: Again, I don't know if I would
agree with your characterization of the Mubarak interview. He did
say that they gave general warnings about the possibility of a
network in the United States and upon which we took appropriate
action. But there was no specific information on this specific
operation at all.
Q So, the White House doesn't feel that any of the
law enforcement agencies whether it be the CIA or FBI who would have
received this kind of information was lax or derelict in its duty in
not pursuing some kind of --
MR. STEPHANOPOULOS: No, not at all.
Q What's next with Serbia? It got only a passing
mention in the news conference yesterday --
MR. STEPHANOPOULOS: You didn't get to ask your
question.
Q Yes, exactly. Was there any agreement on concerted
action between the two countries? And even if there wasn't, what
does the U.S. do next?
MR. STEPHANOPOULOS: I think the U.S. is clearly going
to move forward in the U.N. today continuing discussions with our
allies on a sanctions resolution and we'll continue to look for ways
to press the Serbians to come to the negotiating table and sign an
agreement.
Q George, why do you think sanctions is still an
option? I mean the Serbians make it clear that at least the
leadership is surviving just fine and they feel like they can wait
you out and even the administration officials we had in the other day
said there's no evidence that they're going to have an effect any
time soon. The Bosnian Serbs have said no to the peace plan. When
does no mean no and you have to do something different?
MR. STEPHANOPOULOS: Well, I mean we are doing something
different. We're moving forward on further sanctions through the
U.N. and those discussions will continue. We're going to continue to
try and tighten the noose on Serbia, and I think that every
opportunity we have to do that will have an effect over time.
Q Are we looking again at lifting the arms embargo?
MR. STEPHANOPOULOS: The President has said that this is something
that is under consideration.
Q George, do you have any more on Hugh Rodham's
condition, how he's doing?
MR. STEPHANOPOULOS: As far as I know nothing's changed.
Q George, -- week after Mr. Mubarak?
MR. STEPHANOPOULOS: It's a little unclear. I think
we'll be able to get you more either tonight or tomorrow morning
after the Mubarak visit.
Q Is he going somewhere for Easter?
MR. STEPHANOPOULOS: Not that I know of.
Q What more can you tell us about the additional aid
to Russia that the President plans to ask Congress about?
MR. STEPHANOPOULOS: He's going to be consulting with
the Congress and with our G-7 partners over the next couple of weeks.
I know that he spoke last evening with Congressman Gephardt and their
delegation before the -- the congressional delegation meets with the
Russians this week and those consultations will continue over the
next several weeks.
Q Do you expect that package to be of the magnitude
of the one announced Sunday?
MR. STEPHANOPOULOS: I'm not going to discuss the
magnitude.
Q How about the list of Cold War restrictions, where
do you stand on that --
MR. STEPHANOPOULOS: As the President said yesterday,
he's going to be looking for that list from the Congress this week
and reviewing it. He believes -- he's going to try and get it this
week and he's going to review the list, and we're going to take a
hard look at it.
Q But they're making it up? I mean it's no White
House involvement, Congress is compiling this list?
MR. STEPHANOPOULOS: I think he's going to talk to the
congressional leaders about compiling the list but I'm certain we'll
be able to get our own researchers working as well.
Q George, isn't lifting the arms embargo more of a
probability than a possibility?
MR. STEPHANOPOULOS: It's something that's under
discussion.
Q Secretary Christopher has said that it's a matter
of time and -- for months before that happens.
MR. STEPHANOPOULOS: Again, all I can say is that it's
something that the President is reviewing. Right now we're working
with our allies in the U.N on a sanctions resolution, and we'll
continue to review other matters.
Q George, can you tell us anything about the schedule
this week? Any travel?
MR. STEPHANOPOULOS: They just asked about that. I
don't have anything more beyond tomorrow's visit with Mubarak right
now.
Q Are there consultations, George, with any Jewish
American organizations concerning Jackson-Vanick?
MR. STEPHANOPOULOS: As you know the National Conference
of Soviet Jewry has a list of, I believe,
MR. STEPHANOPOULOS: -- as you know, the National
Conference of Soviet Jewry has a list of, I believe, 200 Refuseniks.
We'll certainly take a look at that and continue appropriate
discussions.
Thanks.
###
|
6934 | From: amjad@eng.umd.edu (Amjad A Soomro)
Subject: Gamma-Law Correction
Organization: Project GLUE, University of Maryland, College Park
Lines: 22
Distribution: USA
Expires: 05/15/93
NNTP-Posting-Host: filter.eng.umd.edu
Hi:
I am digitizing a NTSC signal and displaying on a PC video monitor.
It is known that the display response of tubes is non-linear and is
sometimes said to follow Gamma-Law. I am not certain if these
non-linearities are "Gamma-corrected" before encoding NTSC signals
or if the TV display is supposed to correct this.
Also, if 256 grey levels, for example, are coded in a C program do
these intensity levels appear with linear brightness on a PC
monitor? In other words does PC monitor display circuitry
correct for "gamma errrors"?
Your response is much appreciated.
Amjad.
Amjad Soomro
CCS, Computer Science Center
U. of Maryland at College Park
email: amjad@wam.umd.edu
|
6935 | From: clipper@csrc.ncsl.nist.gov (Clipper Chip Announcement)
Subject: White House Public Encryption Management Fact Sheet
Organization: National Institute of Standards & Technology
Distribution: na
Lines: 94
Note: The following was released by the White House today in
conjunction with the announcement of the Clipper Chip
encryption technology.
FACT SHEET
PUBLIC ENCRYPTION MANAGEMENT
The President has approved a directive on "Public Encryption
Management." The directive provides for the following:
Advanced telecommunications and commercially available encryption
are part of a wave of new computer and communications technology.
Encryption products scramble information to protect the privacy of
communications and data by preventing unauthorized access.
Advanced telecommunications systems use digital technology to
rapidly and precisely handle a high volume of communications.
These advanced telecommunications systems are integral to the
infrastructure needed to ensure economic competitiveness in the
information age.
Despite its benefits, new communications technology can also
frustrate lawful government electronic surveillance. Sophisticated
encryption can have this effect in the United States. When
exported abroad, it can be used to thwart foreign intelligence
activities critical to our national interests. In the past, it has
been possible to preserve a government capability to conduct
electronic surveillance in furtherance of legitimate law
enforcement and national security interests, while at the same time
protecting the privacy and civil liberties of all citizens. As
encryption technology improves, doing so will require new,
innovative approaches.
In the area of communications encryption, the U. S. Government has
developed a microcircuit that not only provides privacy through
encryption that is substantially more robust than the current
government standard, but also permits escrowing of the keys needed
to unlock the encryption. The system for the escrowing of keys
will allow the government to gain access to encrypted information
only with appropriate legal authorization.
To assist law enforcement and other government agencies to collect
and decrypt, under legal authority, electronically transmitted
information, I hereby direct the following action to be taken:
INSTALLATION OF GOVERNMENT-DEVELOPED MICROCIRCUITS
The Attorney General of the United States, or her representative,
shall request manufacturers of communications hardware which
incorporates encryption to install the U.S. government-developed
key-escrow microcircuits in their products. The fact of law
enforcement access to the escrowed keys will not be concealed from
the American public. All appropriate steps shall be taken to
ensure that any existing or future versions of the key-escrow
microcircuit are made widely available to U.S. communications
hardware manufacturers, consistent with the need to ensure the
security of the key-escrow system. In making this decision, I do
not intend to prevent the private sector from developing, or the
government from approving, other microcircuits or algorithms that
are equally effective in assuring both privacy and a secure key-
escrow system.
KEY-ESCROW
The Attorney General shall make all arrangements with appropriate
entities to hold the keys for the key-escrow microcircuits
installed in communications equipment. In each case, the key
holder must agree to strict security procedures to prevent
unauthorized release of the keys. The keys shall be released only
to government agencies that have established their authority to
acquire the content of those communications that have been
encrypted by devices containing the microcircuits. The Attorney
General shall review for legal sufficiency the procedures by which
an agency establishes its authority to acquire the content of such
communications.
PROCUREMENT AND USE OF ENCRYPTION DEVICES
The Secretary of Commerce, in consultation with other appropriate
U.S. agencies, shall initiate a process to write standards to
facilitate the procurement and use of encryption devices fitted
with key-escrow microcircuits in federal communications systems
that process sensitive but unclassified information. I expect this
process to proceed on a schedule that will permit promulgation of
a final standard within six months of this directive.
The Attorney General will procure and utilize encryption devices to
the extent needed to preserve the government's ability to conduct
lawful electronic surveillance and to fulfill the need for secure
law enforcement communications. Further, the Attorney General
shall utilize funds from the Department of Justice Asset Forfeiture
Super Surplus Fund to effect this purchase.
|
6936 | Subject: XLib and 24 Bit Displays [Info Needed]
From: sl0pr@riverdale.enet.dec.com (869883 Thakkar Rahul Chandrakant)
Reply-To: sl0pr@riverdale.enet.dec.com (869883 Thakkar Rahul Chandrakant)
Distribution: world
Organization: Digital Equipment Corporation
Keywords: Xlib
Nntp-Posting-Host: riverdale.declab.usu.edu
Lines: 23
Hi,
My name is rahul and I am doing MS at USU, Logan
My query is:
I have a HP workstation: HP Series 400 with X running on it.
I have a true color - 24bit color monitor connected to this machine.
Normally I have the capability to display 256 colors from a max of
16.7 million. Since the monitor is True Color I can see 16.7
million at a time.
Que: do we have a facility in X(c-function call) that will enable me
to specify any RGB combination and see it on screen? I am using
XStoreColor to set the pallette of a max of 256 colors.
Que: If not. Is there any way I can display a true color image
on a true color monitor using XLib function calls?
We are generating ray traced images and 256 colors are indeed a
painful limit. besides I need the facility to display the true color images
i will be generating on a true color system WITHOUT color
quantification.
Please, if anyone can help i'd be obliged
Rahul
sl0pr@cc.usu.edu
|
6937 | From: jfurr@nyx.cs.du.edu (Joel Furr)
Subject: Re: How many Mutlus can dance on the head of a pin?
X-Disclaimer: Nyx is a public access Unix system run by the University
of Denver for the Denver community. The University has neither
control over nor responsibility for the opinions of users.
Organization: Nyx, Public Access Unix at U. of Denver Math/CS dept.
Lines: 16
In article <3456@israel.nysernet.org> warren@nysernet.org writes:
>In <C4xKBx.53F@polaris.async.vt.edu> jfurr@polaris.async.vt.edu (Joel Furr) writes:
>>How many Mutlus can dance on the head of a pin?
>
>That reminds me of the Armenian massacre of the Turks.
>
>Joel, I took out SCT, are we sure we want to invoke the name of he who
>greps for Mason Kibo's last name lest he include AFU in his daily
>rounds?
I dunno, Warren. Just the other day I heard a rumor that "Serdar Argic"
(aka Hasan Mutlu and Ahmed Cosar and ZUMABOT) is not really a Turk at all,
but in fact is an Armenian who is attempting to make any discussion of the
massacres in Armenia of Turks so noise-laden as to make serious discussion
impossible, thereby cloaking the historical record with a tremendous cloud
of confusion.
|
6938 | From: fmg@alpha.smi.med.pitt.edu (Filip Gieszczykiewicz)
Subject: Scope questions
Summary: What is [a] "Storage scope"
Distribution: na
Organization: Medical Informatics, Pittsburgh, PA USA
Lines: 33
Greetings. I've been seeing the word "storage" mentioned
around oscilliscopes but I'm curious, what does it mean?
If my life depended on it, I'd say that it's a scope that
uses long-persistance phosphor to keep the successive
taces on the screen for some unit of time - "store" them.
Do I get to live?
Also, I've been shopping for a decent, used, [old] scope
since my Tek 514A (portable...NOT!) and my Heathkit O-1000
are all single trace and I need more... like 2 or 3 and at
least 50MHz (maybe 100...)
During my shopping at hamfests etc. I've run into the
problem of "old scope" terminology. I can imagine what
a "mainframe" and "plug-in" are but some things like
the above "storage", "coax input" (Hey, where do I get a
probe that fits this? I had to fiddle with mine for a week
before I got anything resembling "a good trace" - they all
come with BNC connectors!), "unblanking" (huh?), and, oh,
just like my 514 manuals, MANY changes were made along the
way to the schematic - scopes, even with IDENTICAL model
numbers, have different (better?) response/performance than
others - how can I pick the better one? Does the rule of the
higher SN the better apply?
Take care.
--
/ Filip "I'll buy a vowel" Gieszczykiewicz. | Best e-mail "fmgst+@pitt.edu" \
| All ideas are mine but they can be yours for only $0.99 so respond NOW!!!! |
| I live for my EE major, winsurfing, programming, SCA, and assorted dreams. |
\ 200MB Drive - Linux has 100MB and MS-DOS has 100MB. MS-DOS is worried ;-) /
|
6939 | From: donb@netcom.com (Don Baldwin)
Subject: Re: BATF/FBI revenge
Organization: Netcom Online Communications Services (408-241-9760 login: guest)
Lines: 31
In article <C5sE5E.Coy@boi.hp.com> dianem@boi.hp.com (Diane Mathews) writes:
>Ahem. See the War on Drugs, as sponsored by the Bush and Reagan
>administrations. The precedent had well been set for federal agencies to
>step on more than a few of what people consider "rights." I won't make
>excuses for anyone, but most of the damage had been done before Clinton
>even entered the race in '92.
Not to mention last year's Weaver affair.
Anyway, here's how I see the Waco affair; I'd be interested in other peoples'
interpretations...
1. Koresh and his people were basically minding their own business.
2. Some weapons violations may have been committed and I wouldn't have
disapproved of prosecuting him for those violations. However, I think
the BATF was criminal for starting negotiations with a military style
assault and for firing into a house where there were children and other
noncombatants.
3. I don't see they couldn't just leave a token guard on the place and wait
the BDs out; I don't approve of the tear gas approach and, if it caused
the fire to be started, I think the FBI agent responsible should spend
10-20 years in jail.
4. However, if Koresh's response to the tear gas was to kill everyone there,
I hold him largely responsible for their deaths.
don
|
6940 | From: aas7@po.CWRU.Edu (Andrew A. Spencer)
Subject: Re: Dumb options list
Organization: Case Western Reserve University, Cleveland, OH (USA)
Lines: 21
Reply-To: aas7@po.CWRU.Edu (Andrew A. Spencer)
NNTP-Posting-Host: slc5.ins.cwru.edu
In a previous article, parr@acs.ucalgary.ca (Charles Parr) says:
>The idea here is to list pointless options. You know, stuff you
>(can) get on a car that has no earthly use?
1) a fitting that allows you to generate household current with
the engine running, and plug ins in the trunk, engine compartment
and cabin.
Feel free to add on...
Regards, Charles
x
--
Within the span of the last few weeks I have heard elements of
separate threads which, in that they have been conjoined in time,
struck together to form a new chord within my hollow and echoing
gourd. --Unknown net.person
:-)
|
6941 | From: nsmca@aurora.alaska.edu
Subject: 30826
Article-I.D.: aurora.1993Apr25.151108.1
Organization: University of Alaska Fairbanks
Lines: 14
Nntp-Posting-Host: acad3.alaska.edu
I like option C of the new space station design..
It needs some work, but it is simple and elegant..
Its about time someone got into simple construction versus overly complex...
Basically just strap some rockets and a nose cone on the habitat and go for
it..
Might be an idea for a Moon/Mars base to..
Where is Captain Eugenia(sp) when you need it (reference to russian heavy
lifter, I think).
==
Michael Adams, nsmca@acad3.alaska.edu -- I'm not high, just jacked
|
6942 | From: goyal@utdallas.edu (MOHIT K GOYAL)
Subject: Re: BusLogic 542B questions
Nntp-Posting-Host: csclass.utdallas.edu
Organization: Univ. of Texas at Dallas
Lines: 12
>beta. Support for the BusLogic cards is not included with OS/2 2.0 any longer.
Why not? This is rather disappointing...
>If you wish to install the beta from the CD/ROM, you will need to REM out the
>Adaptec device drivers, as they have a nasty tendency to crash the BusLogic
>cards when OS/2 attempts to use them. (Thanks Adaptec!)
Yep. That's cause the latest(and presumably all future) Adaptec drivers look
for the string "Adaptec" or something to that effect in the cards BIOS.
|
6943 | From: gld@cunixb.cc.columbia.edu (Gary L Dare)
Subject: soft contact lens cleaning unit (heater)
Summary: Barnes-Hind timer heating unit for boiling soft lenses
Nntp-Posting-Host: cunixb.cc.columbia.edu
Reply-To: gld@cunixb.cc.columbia.edu (Gary L Dare)
Organization: PhDs In The Hall
Distribution: na
Lines: 17
My girlfriend switched to gas-permeable hard lenses and no longer
needs a one year old soft contact lens cleaning unit. It's one of
those where you pop in the lens case filled with solution and the
lenses, press the lighted timer button and let it cook. No stains
(of course -- if you've owned one of these, you understand), maybe
a little dust on the cover.
Best cash offer, or equivalent worth in used CD's or Betamax tapes
(some blanks or a couple of pre-recorded movies/concerts).
gld
--
~~~~~~~~~~~~~~~~~~~~~~~~ Je me souviens ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Gary L. Dare
> gld@columbia.EDU GO Winnipeg Jets GO!!!
> gld@cunixc.BITNET Selanne + Domi ==> Stanley
|
6944 | From: shag@aero.org (Rob Unverzagt)
Subject: Re: space food sticks
Keywords: food
Article-I.D.: news.1pscc6INNebg
Organization: Organization? You must be kidding.
Lines: 35
NNTP-Posting-Host: aerospace.aero.org
In article <1pr5u2$t0b@agate.berkeley.edu> ghelf@violet.berkeley.edu (;;;;RD48) writes:
> I had spacefood sticks just about every morning for breakfast in
> first and second grade (69-70, 70-71). They came in Chocolate,
> strawberry, and peanut butter and were cylinders about 10cm long
> and 1cm in diameter wrapped in yellow space foil (well, it seemed
> like space foil at the time).
Wasn't there a "plain" flavor too? They looked more like some
kind of extruded industrial product than food -- perfectly
smooth cylinders with perfectly smooth ends. Kinda scary.
> The taste is hard to describe, although I remember it fondly. It was
> most certainly more "candy" than say a modern "Power Bar." Sort of
> a toffee injected with vitamins. The chocolate Power Bar is a rough
> approximation of the taste. Strawberry sucked.
An other post described it as like a "microwaved Tootsie Roll" --
which captures the texture pretty well. As for taste, they were
like candy, only not very sweet -- does that make sense? I recall
liking them for their texture, not taste. I guess I have well
developed texture buds.
> Man, these were my "60's."
It was obligatory to eat a few while watching "Captain Scarlet".
Does anybody else remember _that_, as long as we're off the
topic of space?
Shag
--
----------------------------------------------------------------------
Rob Unverzagt |
shag@aerospace.aero.org | Tuesday is soylent green day.
unverzagt@courier2.aero.org |
|
6945 | From: jmartin@egret.imagesRus (John Martin)
Subject: Re: Animation with XPutImage()?
Nntp-Posting-Host: suw3v.ess.harris.com
Reply-To: jmartin@egret.imagesRus
Organization: Sun Microsystems, Inc.
Lines: 39
> Hi, I'm new to this group so please bear with me!
>
> Two years ago I wrote a Sunview application for fast animation
> of raster files. With Sunview becoming rapidly obselete, I've
> finally decided to rewrite everything from scratch in XView.
> I put together a quick test, and I've found that XPutImage()
> is considerably slower (factor of 2 on average?) than the
> Sunview command pw_rop() which moves image data from memory
> pixrects to a canvas. This was on a Sparc IPX. It seems that:
> (1) the X protocol communication is slowing things down; or
> (2) XPutImage is inefficient...or both! My question is, what
> is the fastest way in X11R5 to dump 8 plane image data to
> a window? Can I take advantage of the fact that the client is
> running on the same machine as the server? Or am I stuck with
> XPutImage() (in which case I might as well give up now...)?
>
> All help appreciated...thanks!
>
> Derek
>
>In article 16330@infodev.cam.ac.uk, dcr@mail.ast.cam.ac.uk (Derek C. Richardson) writes:
-----------------------------------------------------------
> | Derek C. Richardson | Tel: (0223) 337548 x 37501 |
> | Institute of Astronomy | Fax: (0223) 337523 |
> | Cambridge, U.K. | |
> | CB3 0HA | E-mail: dcr@mail.ast.cam.ac.uk |
> -----------------------------------------------------------
>
Animation is most frequently done by copying the the client resident XImages into
server resident Pixmap(s) using XPutImage. Once this is done, the original XImages
can be deleted and the animation loop can be performed using XCopyArea from the Pixmaps to the windows drawable.
Hope this is helpfull.
John
|
6946 | From: Matt_Harrop@magic-bbs.corp.apple.com
Distribution: na
Organization: Macintosh Awareness Group In Canada
Subject: Re: Internal SCSI installation, How?
Lines: 9
>But Apple HD SC says "Unable to locate a suitable drive on SCSI"...
>what's he doing wrong?
Apples HDSC will only format a hard drive that Apple sold. You need to use
a third party formater like Drive7 or SpotOn.
|
6947 | From: ger@cv.ruu.nl (Ger Timmens)
Subject: Re: Postscript drawing prog
Nntp-Posting-Host: triton.cv.ruu.nl
Organization: University of Utrecht, 3D Computer Vision Research Group
Lines: 30
In <0010580B.vma7o9@diablo.UUCP> diablo.UUCP!cboesel (Charles Boesel) writes:
>In article <1993Apr19.171704.2147@Informatik.TU-Muenchen.DE> (comp.graphics.gnuplot,comp.graphics), rdd@uts.ipp-garching.mpg.de (Reinhard Drube) writes:
>>In article <C5ECnn.7qo@mentor.cc.purdue.edu>, nish@cv4.chem.purdue.edu (Nishantha I.) writes:
>>|> Could somebody let me know of a drawing utility that can be
>>|> used to manipulate postscript files.I am specifically interested in
>>|> drawing lines, boxes and the sort on Postscript contour plots.
>>|> I have tried xfig and I am impressed by it's features. However
>>|> it is of no use since I cannot use postscript files as input for the
>>|> programme.Is there a utility that converts postscript to xfig format?
>>|> Any help would be greatly appreciated.
>>|> Nishantha
>Have you checked out Adobe Illustrator? There are a few Unix versions
>for it available, depending on your platform. I know of two Unix versions:
>One for Mach (NeXT) and for Irix (SGI). There may be others, such
>as for Sun SparcStation, but I don't know for sure.
You can include postscript epsi files in xfig (encapsulated postscript
info files). You can't actually edit the postscript file, but you're able
to draw over the postscript file.
There a eps to epsi converter: eps2epsi (perl program),
Succes,
--
Ger Timmens (ger@cv.ruu.nl) 3DCV Research Group, Utrecht, The Netherlands
Tel.: +31 -30 50 67 11; Room: F.01.7.03; Fax.: +31 -30 51 33 99
Unquestionably, there is progress. The average American now pays out
twice as much in taxes as he formerly got in wages. --- H. L. Mencken
|
6948 | From: leavitt@cs.umd.edu (Mr. Bill)
Subject: Re: Countersteering_FAQ please post
Organization: The Cafe at the Edge of the Universe
Lines: 43
mjs@sys.uea.ac.uk (Mike Sixsmith) writes:
mjs>Secondly, it is the adhesion of the
mjs>tyre on the road, the suspension geometry and the ground clearance of the
mjs> motorcycle which dictate how quickly you can swerve to avoid obstacles, and
mjs>not the knowledge of physics between the rider's ears. Are you seriously
^^^^^^^^^^^^^^^^^^^^
mjs>suggesting that countersteering knowledge enables you to corner faster
mjs>or more competentlY than you could manage otherwise??
egreen@east.sun.com writes:
ed>If he's not, I will.
Hey Ed, you didn't give me the chance! Sheesh!
The answer is, absolutely!, as Ed so eloquently describes:
ed>Put two riders on identical machines. It's the
ed>one who knows what he's doing, and why, that will be faster. It *may*
ed>be possible to improve your technique if you have no idea what it is,
ed>through trial and error, but it is not very effective methodology.
ed>Only by understanding the technique of steering a motorcycle can one
^^^^^^^^^^^^^^^^^^^^^
ed>improve on that technique (I hold that this applies to any human
ed>endeavor).
Herein lies the key to this thread:
Kindly note the difference in the responses. Ed (and I) are talking
about knowing riding technique, while Mike is arguing knowing the physics
behind it. It *is* possible to be taught the technique of countersteering
(ie: push the bar on the inside of the turn to go that way) *without*
having to learn all the fizziks about gyroscopes and ice cream cones
and such as seen in the parallel thread. That stuff is mainly of interest
to techno-motorcycle geeks like the readers of rec.motorcycles ;^),
but doesn't need to be taught to the average student learning c-steering.
Mike doesn't seem to be able to make the distinction. I know people
who can carve circles around me who couldn't tell you who Newton was.
On the other hand, I know very intelligent, well-educated people who
think that you steer a motorcycle by either: 1) leaning, 2) steering
a la bicycles, or 3) a combination of 1 and 2. Knowledge of physics
doesn't get you squat - knowledge of technique does!
Mr. Bill
|
6949 | From: nsmca@aurora.alaska.edu
Subject: Crazy? or just Imaginitive?
Lines: 20
Nntp-Posting-Host: acad3.alaska.edu
Organization: University of Alaska Fairbanks
I have a nice quote that I like (or as close as I can remember it).
If I say something that you think is crazy, ask me what I mean before you think
its crazy..
So some of my ideas are a bit odd, off the wall and such, but so was Wilbur and
Orville Wright, and quite a few others.. Sorry if I do not have the big degrees
and such, but I think (I might be wrong, to error is human) I have something
that is in many ways just as important, I have imagination, dreams. And without
dreams all the knowledge is worthless..
Sorry my two cents worth. Or is it two rubles worth?
The basic quote idea is from H. Beam Pipers book "Space Vikings". Its a good
book on how civilization can fall, and how it can be raised to new heights.
Unfortunately H. Beam Piper killed him self just weeks short of having his
first book published, and have his ideas see light.. Such a waste.
|
6950 | From: crypt-comments@math.ncsu.edu
Subject: Cryptography FAQ 10/10 - References
Organization: The Crypt Cabal
Lines: 333
Expires: 22 May 1993 04:00:07 GMT
Reply-To: crypt-comments@math.ncsu.edu
NNTP-Posting-Host: pad-thai.aktis.com
Summary: Part 10 of 10 of the sci.crypt FAQ, References.
History and classical methods. Modern methods. Survey and reference
articles. Journals and conference proceedings. Electronic sources
(FTP sites). Related newsgroups.
X-Last-Updated: 1993/04/16
Archive-name: cryptography-faq/part10
Last-modified: 1993/4/15
FAQ for sci.crypt, part 10: References
This is the tenth of ten parts of the sci.crypt FAQ. The parts are
mostly independent, but you should read the first part before the rest.
We don't have the time to send out missing parts by mail, so don't ask.
Notes such as ``[KAH67]'' refer to the reference list in this part.
The sections of this FAQ are available via anonymous FTP to rtfm.mit.edu
as /pub/usenet/news.answers/cryptography-faq/part[xx]. The Cryptography
FAQ is posted to the newsgroups sci.crypt, sci.answers, and news.answers
every 21 days.
Contents
* Books on history and classical methods
* Books on modern methods
* Survey articles
* Reference articles
* Journals, conference proceedings
* Other
* Electronic sources
* RFCs (available from [FTPRF])
* Related newsgroups
* Books on history and classical methods
[CF] Lambros D. Callimahos, William F. Friedman, Military Cryptanalytics.
Aegean Park Press, ?.
[DEA85] Cipher A. Deavours & Louis Kruh, Machine Cryptography and
Modern Cryptanalysis. Artech House, 610 Washington St.,
Dedham, MA 02026, 1985.
[FRIE2] William F. Friedman, Solving German Codes in World War I.
Aegean Park Press, ?.
[GAI44] H. Gaines, Cryptanalysis, a study of ciphers and their
solution. Dover Publications, 1944.
[HIN00] F.H.Hinsley, et al., British Intelligence in the Second
World War. Cambridge University Press. (vol's 1, 2, 3a, 3b
& 4, so far). XXX Years and authors, fix XXX
[HOD83] Andrew Hodges, Alan Turing: The Enigma. Burnett Books
Ltd., 1983
[KAH91] David Kahn, Seizing the Enigma. Houghton Mifflin, 1991.
[KAH67] D. Kahn, The Codebreakers. Macmillan Publishing, 1967.
[history] [The abridged paperback edition left out most
technical details; the original hardcover edition is
recommended.]
[KOZ84] W. Kozaczuk, Enigma. University Publications of America, 1984
[KUL76] S. Kullback, Statistical Methods in Cryptanalysis. Aegean
Park Press, 1976.
[SIN66] A. Sinkov, Elementary Cryptanalysis. Math. Assoc. Am. 1966.
[WEL82] Gordon Welchman, The Hut Six Story. McGraw-Hill, 1982.
[YARDL] Herbert O. Yardley, The American Black Chamber. Aegean Park
Press, ?.
* Books on modern methods
[BEK82] H. Beker, F. Piper, Cipher Systems. Wiley, 1982.
[BRA88] G. Brassard, Modern Cryptology: a tutorial.
Spinger-Verlag, 1988.
[DEN82] D. Denning, Cryptography and Data Security. Addison-Wesley
Publishing Company, 1982.
[KOB89] N. Koblitz, A course in number theory and cryptography.
Springer-Verlag, 1987.
[KON81] A. Konheim, Cryptography: a primer. Wiley, 1981.
[MEY82] C. Meyer and S. Matyas, Cryptography: A new dimension in
computer security. Wiley, 1982.
[PAT87] Wayne Patterson, Mathematical Cryptology for Computer
Scientists and Mathematicians. Rowman & Littlefield, 1987.
[PFL89] C. Pfleeger, Security in Computing. Prentice-Hall, 1989.
[PRI84] W. Price, D. Davies, Security for computer networks. Wiley, 1984.
[RUE86] R. Rueppel, Design and Analysis of Stream Ciphers.
Springer-Verlag, 1986.
[SAL90] A. Saloma, Public-key cryptography. Springer-Verlag, 1990.
[WEL88] D. Welsh, Codes and Cryptography. Claredon Press, 1988.
* Survey articles
[ANG83] D. Angluin, D. Lichtenstein, Provable Security in Crypto-
systems: a survey. Yale University, Department of Computer
Science, #288, 1983.
[BET90] T. Beth, Algorithm engineering for public key algorithms.
IEEE Selected Areas of Communication, 1(4), 458--466,
1990.
[DAV83] M. Davio, J. Goethals, Elements of cryptology. in Secure
Digital Communications, G. Longo ed., 1--57, 1983.
[DIF79] W. Diffie, M. Hellman, Privacy and Authentication: An
introduction to cryptography. IEEE proceedings, 67(3),
397--427, 1979.
[DIF88] W. Diffie, The first ten years of public key cryptography.
IEEE proceedings, 76(5), 560--577, 1988.
[FEI73] H. Feistel, Cryptography and Computer Privacy. Scientific
American, 228(5), 15--23, 1973.
[FEI75] H. Feistel, H, W. Notz, J. Lynn Smith. Some cryptographic
techniques for machine-to-machine data communications,
IEEE IEEE proceedings, 63(11), 1545--1554, 1975.
[HEL79] M. Hellman, The mathematics of public key cryptography.
Scientific American, 130--139, 1979.
[LAK83] S. Lakshmivarahan, Algorithms for public key
cryptosystems. In Advances in Computers, M. Yovtis ed.,
22, Academic Press, 45--108, 1983.
[LEM79] A. Lempel, Cryptology in transition, Computing Surveys,
11(4), 285--304, 1979.
[MAS88] J. Massey, An introduction to contemporary cryptology, IEEE
proceedings, 76(5), 533--549, 1988.
[SIM91] G. Simmons (ed.), Contemporary Cryptology: the Science of
Information Integrity. IEEE press, 1991.
* Reference articles
[AND83] D. Andelman, J. Reeds, On the cryptanalysis of rotor and
substitution-permutation networks. IEEE Trans. on Inform.
Theory, 28(4), 578--584, 1982.
[BEN87] John Bennett, Analysis of the Encryption Algorithm Used in
the WordPerfect Word Processing Program. Cryptologia 11(4),
206--210, 1987.
[BER91] H. A. Bergen and W. J. Caelli, File Security in WordPerfect
5.0. Cryptologia 15(1), 57--66, January 1991.
[BIH91] E. Biham and A. Shamir, Differential cryptanalysis of
DES-like cryptosystems. Journal of Cryptology, vol. 4, #1,
3--72, 1991.
[BI91a] E. Biham, A. Shamir, Differential cryptanalysis of Snefru,
Khafre, REDOC-II, LOKI and LUCIFER. In Proceedings of CRYPTO
'91, ed. by J. Feigenbaum, 156--171, 1992.
[BOY89] J. Boyar, Inferring Sequences Produced by Pseudo-Random
Number Generators. Journal of the ACM, 1989.
[BRI86] E. Brickell, J. Moore, M. Purtill, Structure in the
S-boxes of DES. In Proceedings of CRYPTO '86, A. M. Odlyzko
ed., 3--8, 1987.
[BRO89] L. Brown, A proposed design for an extended DES, Computer
Security in the Computer Age. Elsevier Science Publishers
B.V. (North Holland), IFIP, W. J. Caelli ed., 9--22, 1989.
[BRO90] L. Brown, J. Pieprzyk, J. Seberry, LOKI - a cryptographic
primitive for authentication and secrecy applications.
In Proceedings of AUSTCRYPT 90, 229--236, 1990.
[CAE90] H. Gustafson, E. Dawson, W. Caelli, Comparison of block
ciphers. In Proceedings of AUSCRYPT '90, J. Seberry and J.
Piepryzk eds., 208--220, 1990.
[CAM93] K. W. Campbell, M. J. Wiener, Proof the DES is Not a Group.
In Proceedings of CRYPTO '92, 1993.
[ELL88] Carl M. Ellison, A Solution of the Hebern Messages. Cryptologia,
vol. XII, #3, 144-158, Jul 1988.
[EVE83] S. Even, O. Goldreich, DES-like functions can generate the
alternating group. IEEE Trans. on Inform. Theory, vol. 29,
#6, 863--865, 1983.
[GAR91] G. Garon, R. Outerbridge, DES watch: an examination of the
sufficiency of the Data Encryption Standard for financial
institutions in the 1990's. Cryptologia, vol. XV, #3,
177--193, 1991.
[GIL80] Gillogly, ?. Cryptologia 4(2), 1980.
[GM82] Shafi Goldwasser, Silvio Micali, Probabilistic Encryption and
How To Play Mental Poker Keeping Secret All Partial Information.
Proceedings of the Fourteenth Annual ACM Symposium on Theory of
Computing, 1982.
[HUM83] D. G. N. Hunter and A. R. McKenzie, Experiments with
Relaxation Algorithms for Breaking Simple Substitution
Ciphers. Computer Journal 26(1), 1983.
[KAM78] J. Kam, G. Davida, A structured design of substitution-
permutation encryption networks. IEEE Trans. Information
Theory, 28(10), 747--753, 1978.
[KIN78] P. Kinnucan, Data encryption gurus: Tuchman and Meyer.
Cryptologia, vol. II #4, 371--XXX, 1978.
[KRU88] Kruh, ?. Cryptologia 12(4), 1988.
[LAI90] X. Lai, J. Massey, A proposal for a new block encryption
standard. EUROCRYPT 90, 389--404, 1990.
[LUB88] C. Rackoff, M. Luby, How to construct psuedorandom
permutations from psuedorandom functions. SIAM Journal of
Computing, vol. 17, #2, 373--386, 1988.
[MAS88] J. Massey, An introduction to contemporary cryptology.
IEEE proceedings, 76(5), 533--549, 1988.
[ME91a] R. Merkle, Fast software encryption functions. In Proceedings
of CRYPTO '90, Menezes and Vanstone ed., 476--501, 1991.
[MEY78] C. Meyer, Ciphertext/plaintext and ciphertext/key
dependence vs. number of rounds for the Data Encryption
Standard. AFIPS Conference proceedings, 47, 1119--1126,
1978.
[NBS77] Data Encryption Standard. National Bureau of Standards,
FIPS PUB 46, Washington, DC, January 1977.
[REE77] J. Reeds, `Cracking' a Random Number Generator.
Cryptologia 1(1), 20--26, 1977.
[REE84] J. A. Reeds and P. J. Weinberger, File Security and the UNIX
Crypt Command. AT&T Bell Laboratories Technical Journal,
Vol. 63 #8, part 2, 1673--1684, October, 1984.
[SHA49] C. Shannon, Communication Theory of Secrecy Systems. Bell
System Technical Journal 28(4), 656--715, 1949.
[SHE88] B. Kaliski, R. Rivest, A. Sherman, Is the Data Encryption
Standard a Group. Journal of Cryptology, vol. 1, #1,
1--36, 1988.
[SHI88] A. Shimizu, S. Miyaguchi, Fast data encipherment algorithm
FEAL. EUROCRYPT '87, 267--278, 1988.
[SOR84] A. Sorkin, LUCIFER: a cryptographic algorithm.
Cryptologia, 8(1), 22--35, 1984.
* Journals, conference proceedings
CRYPTO
Eurocrypt
IEEE Transactions on Information Theory
Cryptologia: a cryptology journal, quarterly since Jan 1977.
Cryptologia; Rose-Hulman Institute of Technology; Terre Haute
Indiana 47803 [general: systems, analysis, history, ...]
Journal of Cryptology; International Association for Cryptologic
Research; published by Springer Verlag (quarterly since
1988).
The Cryptogram (Journal of the American Cryptogram Association);
18789 West Hickory Street; Mundelein, IL 60060; [primarily
puzzle cryptograms of various sorts]
Cryptosystems Journal, Published by Tony Patti, P.O. Box 188,
Newtown PA, USA 18940-0188 or tony_s_patti@cup.portal.com.
Publisher's comment: Includes complete cryptosystems with
source and executable programs on diskettes. Tutorial. The
typical cryptosystems supports multi-megabit keys and Galois
Field arithmetic. Inexpensive hardware random number
generator details.
Computer and Communication Security Reviews, published by Ross Anderson.
Sample issue available from various ftp sites, including
black.ox.ac.uk. Editorial c/o rja14@cl.cam.ac.uk. Publisher's
comment: We review all the conference proceedings in this field,
including not just Crypto and Eurocrypt, but regional gatherings
like Auscrypt and Chinacrypt. We also abstract over 50 journals,
and cover computer security as well as cryptology, so readers can
see the research trends in applications as well as theory.
* Other
Address of note: Aegean Park Press, P.O. Box 2837, Laguna Hills, CA
92654-0837. Answering machine at 714-586-8811.
The ``Orange Book'' is DOD 5200.28-STD, published December 1985 as
part of the ``rainbow book'' series. Write to Department of Defense,
National Security Agency, ATTN: S332, 9800 Savage Road, Fort Meade, MD
20755-6000, and ask for the Trusted Computer System Evaluation
Criteria. Or call 301-766-8729.
[BAMFD] Bamford, The Puzzle Palace. Penguin Books, ?.
[GOO83] I. J. Good, Good Thinking: the foundations of probability and
its applications. University of Minnesota Press, 1983.
[KNU81] D. E. Knuth, The Art of Computer Programming, volume 2:
Seminumerical Algorithms. Addison-Wesley, 1981.
[KUL68] Soloman Kullbach, Information Theory and Statistics.
Dover, 1968.
[YAO88] A. Yao, Computational Information Theory. In Complexity in
Information Theory, ed. by Abu-Mostafa, 1988.
* How may one obtain copies of FIPS and ANSI standards cited herein?
Many textbooks on cryptography contain complete reprints of the FIPS
standards, which are not copyrighted.
The following standards may be ordered from the
U.S. Department of Commerce, National Technical Information Service,
Springfield, VA 22161.
FIPS PUB 46-1 "Data Encryption Standard" (this is DES)
FIPS PUB 74 "Guidelines for Implementing as Using the NBS DES"
FIPS PUB 81 "DES Modes of Operation"
FIPS PUB 113 "Computer Data Authentication" (using DES)
The following standards may be ordered from the
American National Standards Institute Sales Office,
1430 Broadway, New York, NY 10018.
Phone 212.642.4900
ANSI X3.92-1981 "Data Encryption Algorithm" (identical to FIPS 46-1)
ANSI X3.106-1983 "DEA Modes of Operation" (identical to FIPS 113)
Notes: Figure 3 in FIPS PUB 46-1 is in error, but figure 3 in X3.92-1981
is correct. The text is correct in both publications.
* Electronic sources
Anonymous ftp:
[FTPBK] ftp.uu.net:bsd-sources/usr.bin/des/
[FTPCB] ftp.uu.net:usenet/comp.sources.unix/volume10/cbw/
[FTPDF] ftp.funet.fi:pub/unix/security/destoo.tar.Z
[FTPEY] ftp.psy.uq.oz.au:pub/DES/
[FTPMD] rsa.com:?
[FTPMR] cl-next3.cl.msu.edu:pub/crypt/newdes.tar.Z
[FTPOB] ftp.3com.com:Orange-book
[FTPPF] prep.ai.mit.edu:pub/lpf/
[FTPPK] ucsd.edu:hamradio/packet/tcpip/crypto/des.tar.Z
[FTPRF] nic.merit.edu:documents/rfc/
[FTPSF] beta.xerox.com:pub/hash/
[FTPSO] chalmers.se:pub/des/des.1.0.tar.Z
[FTPUF] ftp.uu.net:usenet/comp.sources.unix/volume28/ufc-crypt/
[FTPWP] garbo.uwasa.fi:pc/util/wppass2.zip
* RFCs (available from [FTPRF])
1424 Kaliski, B. Privacy Enhancement for Internet Electronic Mail: Part IV:
Key Certification and Related Services. 1993 February; 9 p. (Format:
TXT=17538 bytes)
1423 Balenson, D. Privacy Enhancement for Internet Electronic Mail: Part
III: Algorithms, Modes, and Identifiers. 1993 February; 14 p. (Format:
TXT=33278 bytes) (Obsoletes RFC 1115)
1422 Kent, S. Privacy Enhancement for Internet Electronic Mail: Part II:
Certificate-Based Key Management. 1993 February; 32 p. (Format:
TXT=86086 bytes) (Obsoletes RFC 1114)
1421 Linn, J. Privacy Enhancement for Internet Electronic Mail: Part I:
Message Encryption and Authentication Procedures. 1993 February; 42 p.
(Format: TXT=103895 bytes) (Obsoletes RFC 1113)
* Related newsgroups
There are other newsgroups which a sci.crypt reader might want also to
read. Some have their own FAQ as well.
alt.comp.compression discussion of compression algorithms and code
alt.security general security discussions
alt.security.index index to alt.security
alt.security.pgp discussion of PGP
alt.security.ripem discussion of RIPEM
alt.society.civil-liberty general civil liberties, including privacy
comp.org.eff.news News reports from EFF
comp.org.eff.talk discussion of EFF related issues
comp.patents discussion of S/W patents, including RSA
comp.risks some mention of crypto and wiretapping
comp.society.privacy general privacy issues
comp.security.announce announcements of security holes
misc.legal.computing
sci.math general math discussion
|
6951 | From: gideon@otago.ac.nz (Gideon King)
Subject: Should Christians fight? / Justifiable war
Organization: University of Otago
Lines: 144
I posted this a couple of weeks ago, and it doesn't seem to have appeared
on the newsgroup, and I haven't had a reply from the moderator. We were
having intermittent problems with our mail at the time. Please excuse me
if you have seen this before...
Should Christians fight?
Last week Alastair posted some questions about fighting, and whether there
are such things as "justifiable wars". I have started looking into these
things and have jotted down my findings as I go. I haven't answered all
his questions yet, and I know what I have here is on a slightly different
tack, but possibly I'll be able to get into it more deeply later, and post
some more info soon.
Our duty to our neighbour:
Do good to all men (Gal 6:10)
Love our neighbour as ourselves (Matt 22:39)
Act the part of the good Samaritan (Luke 10) toward any who may be in
trouble. We will therefore render every possible assistance to an injured
man, and therefore should not be part of any organisation which causes
people harm (even medical corps of the army etc).
Christians are by faith "citizens of the commonwealth of Israel"
(Ephesians 2:11-12), and also recognise that "God rules in the kingdoms of
men", and therefore we should not be taking part in any of the struggles
of those nations which we are not part of due to our faith.
We are to be "strangers and pilgrims" amongst the nations, so we are just
passing through, and not part of any nation or any national aspirations
(this can also be applied to politics etc, but that's another story). We
are not supposed to "strive" or "resist evil" (even "suffer yourselves to
be defrauded") it is therefore incosistent for us to strive to assist in
preserving a state which Christ will destroy when he returns to set up
God's kingdom.
Our duty to the state.
"Render therefore unto Caesar the things which be Caesar's and unto God
the things which be God's" (Luke 20:25).
"Let every soul be subject unto the higher powers. For there is no power
but of God; the powers that be are ordained of God. Whosoever resisteth
the power, resisteth the ordinance of God" (Rom 13:1-2).
"Submit yourselves to every ordinance of man for the Lord's sake; whether
it be to king as supreme... for so is the will of God that with well doing
ye may put to silence the ignorance of foolish men" (1 Pet 2:13-15)
These scriptures make it clear that submission to the powers that be is a
divine command, but it is equally clear from Acts 5:19-29 that when any
ordinance of man runs counter to God's law, we must refuse submission to
it. The reason for this is that we are God's "bond servants" and His
service is our life's task. An example of the type of thing is in Col
3:22-23 where bondservants were to "work heartily as unto the Lord" - so
also we should work as if our boss was God - i.e. "Pressed down, shaken
together, and running over"... oops - a bit of a side track there...
In the contests between the nations, we are on God's side - a side that is
not fighting in the battle, but is "testifying" to the truth.
When we believe in God and embrace His promises, we become "fellow
citizens with the Saints and of the Household of God", and are no longer
interested in associations of the world. Think of this in relation to
unions etc as well. Paul tells us to "lay aside every weight" that we may
run "the race that is set before us", and if we are wise, we will discard
any association which would retard our progress - "Thou therefore endure
hardness as a good soldier of Jesus Christ. No man that warreth entangleth
himself with the affairs of this life, that he may please him who hath
chosen him to be a soldier" (2 Tim 2:3-4).
One of these entanglements he warns about is "be ye not unequally yoked
together with unbelievers". One of the obvious applications of this is
marriage with unbelievers, but it also covers things like business
partnerships and any other position where we may form a close association
with any person or persons not believing the truth about God (in this case
the army). The principle comes from Deut 22:10 - remember that as well as
them being different animals of different strengths, one was clean and one
unclean under the law. These ideas are strongly stressed in 2 Cor 6:13-18
- I suggest you read this. The yoking also has another aspect - that of
servitude, and Jesus says "take my yoke upon you", so we are then yoked
with Christ and cannot be yoked with unbelievers. We have already seen
that we are bondservants of Christ, and Paul says "become not ye the
bondservants of men (1 Cor 7:23 RV).
An example from the Old Testament: the question is asked in 2 Chr 19:2
"Shouldest thou help the ungodly...?". The situation here is a good
example of what happens when you are yoked together with unbelievers.
Jehoshaphat was lucky to escape with his life. Here are the facts:
1. He had made an affinity with Ahab, who had "sold himself to work
wickedness before the Lord" (1 Kings 21:25).
2. When asked by Ahab to form a military alliance, he had agreed and said
"I am as thou art, my people as thy people" (1 Kings 22:4) - an unequal
yoking.
3. He sttod firm in refusing the advice of the false prophets and insisted
on hearing the prophet of the Lord (trying to do the right thing), he
found that he was yoked and therefore couldn't break away from the evil
association he had made.
God says to us "Come out from among them and be ye separate, and touch not
the unclean thing, and I will receive you and ye shall be my sons and
daughters" (2 Cor 6:17).
This is more or less what I have found out so far - I'm still looking into
it, as I don't think I've answered all the questions raised by Alastair
yet. Heres a summary and a few things to think about:
The Christian in under command. Obedience to this command is an essential
factor in his relationship with Christ (John 15:10,14).
Total dedication to this course of action is required (Romans 12:1-2).
Disobedience compromises the close relationship between Christ and his
followers (1 Pet 2:7-8).
We are to be separated to God (Rom 6:4). This involves a master-servant
relationship (Rom 6:12,16).
No man can serve two masters (Matt 6:24,13,14).
All that is in the 'Kosmos' is lust and pride - quite opposed to Gos (1
John 2:16). Christs kingdom is not of this world (i.e. not worldly in
nature) - if it was, his servants would fight to deliver him. If Christ is
our master and he was not delivered by his servants because his kingdom
was not of this world, then his servants cannot possibly fight for another
master.
Strangers and pilgrims have no rights, and we cannot swear allegiance to
anyone but God.
The servant of the Lord must not war but be gentle to all (2 Tim 2:24) -
this does not just apply to war, but also to avoiding strife throughout
our lives. There is a war to be waged, not with man's weapons (2 Cor
10:3-4), but with God's armour (Eph6:13-20).
I'll probably post some more when I've had time to look into things a bit
further.
--
Gideon King | Phone +64-3-479 8347
University of Otago | Fax +64-3-479 8529
Department of Computer Science | e-mail gideon@farli.otago.ac.nz
P.O. Box 56 |
Dunedin | NeXT mail preferred!
New Zealand |
|
6952 | Subject: Re: Albert Sabin
From: rfox@charlie.usd.edu (Rich Fox, Univ of South Dakota)
Reply-To: rfox@charlie.usd.edu
Organization: The University of South Dakota Computer Science Dept.
Nntp-Posting-Host: charlie
Lines: 91
In article <1993Apr15.012537.26867@nntpd2.cxo.dec.com>, sharpe@nmesis.enet.dec.com (System PRIVILEGED Account) writes:
>
>In article <C5FtJt.885@sunfish.usd.edu>, rfox@charlie.usd.edu (Rich Fox, Univ of South Dakota) writes:
>|>
>|>In article <1993Apr10.213547.17644@rambo.atlanta.dg.com>, wpr@atlanta.dg.com (Bill Rawlins) writes:
>|>
>|>[earlier dialogue deleted]
>|>
>|>>|> Perhaps you should read it and stop advancing the Bible as evidence relating
>|>>|> to questions of science.
>|>
>|>[it = _Did Jesus exist?_ by G. A. Wells]
>|>
>|>> There is a great fallacy in your statement. The question of origins is
>|>> based on more than science alone.
>|>
>|>Nope, no fallacy. Yep, science is best in determining how; religions handle
>|>why and who.
>|>
>
>Rich, I am curious as to why you and others award custody of the baby to
>theists and religion?
I hope I didn't award custody, Rich. I purposely used "handle" in order to
avoid doing so - i.e., that happens to be what religions do (of course there are
aberrations like "scientific" creationism). I used "best" in part to indicate
that science currently has a time of it with why and who, so these domains are
mostly ignored. I also attempted to be brief, which no doubt confused the
matter. As an aside, for science I should have written "how and when". Nobody
seems to argue over what.
>Are they [theists, theologians] any better equiped to investigate the "who and
>why" than magicians, astrologers, housewives [not being sexists], athiests or
>agnostics.
Seems to me that the answer would vary from individual to individual. I'm not
trying to be evasive on this, but from a societal perspective, religion works.
On the other hand, sometimes it is abused and misused, and many suffer, which
you know. But the net result seems positive, this from the anthropological
perspective on human affairs. You might call me a neo-Fruedian insofar as I
think the masses can't get along without religion. Not that generally they are
incapable; they just don't, and for myriad reasons, but the main one seems to
be the promise of immortality. Very seductive, that immortality. Therefore
it seems that theologians are better equipped than the others you mention for
dispensing answers to "who and why". I suggest that this holds regardless of
the "truth" in their answers to who and why simply because people believe.
In the end, spiritual beliefs are just as "real" as scientific facts and
explanation (CAUTION TO SOME: DO NOT TAKE THIS OUT OF CONTEXT).
>Do you suggest that the "who and why" will forever be closed to scientific
>investigation?
No. In fact, I don't think it is closed now, at least for some individuals.
Isn't there a group of theoretical physicists who argue that matter was
created from nothing in a Big Bang singularity? This approach might
presuppose an absence of who and why, except that it seems it could be argued
that something had to be responsible for nothing? Maybe that something doesn't
have to be supernatural, maybe just mechanistic. But that's a tough one for
people today to grasp. In any case, theory without empirical data is not
explanation, but then your question does not require data. In other words,
I agree that theorizing (within scientific parameters) is just as scientific
as explaining. So the answer is, who and why are not closed to scientists, but
I sense that science in these realms is currently very inadequate. Data will
be necessary for improvement, and that seems a long way off, if ever. Pretty
convoluted here; I hope I've made sense.
>It seems to me that 200 or so years ago, the question of the origin of life on
>earth was not considered open to scientific enquiry.
I agree generally. But I prefer to put it this way - the *questions* of how,
when, who and why were not open to inquiry. During the Enlightenment,
reason was reponsible for questioning the theological answers to how and when,
and not, for the most part, who and why. Science was thus born out of the
naturalists' curiosity, eventually carting away the how and when while largely
leaving behind the who and why. The ignorant, the selfish, the intolerant, and
the arrogant, of course, still claim authority in all four domains.
>|>Rich Fox, Anthro, Usouthdakota
>Did like your discussion around AMHs, and I did figure out what AMH was from
>your original post :-)
Much obliged. Funny how facts tend to muddle things, isn't it? Well, I am
sure there are plenty of "scientific" creationist "rebuttals" out there
somewhere, even if they have to be created from nothing.
[just for the record, again, AMH = anatomically modern humans]
Best regards :-),
Rich Fox, Anthro, Usouthdakota
|
6953 | From: gtoal@gtoal.com (Graham Toal)
Subject: Re: text of White House announcement and Q&As on clipper chip encryption
Lines: 22
Bred wrote:
And this means that the FBI will want to track the customer lists of
better encryption phones, because "the only reason a person would want
one is to evade the police."
They don't have to track customer lists - they merely have to digitally
listen to any phone line and eliminate any that don't have the clipper
header/signature. (No-one has said how it will be modulated - want a bet
it's a non-standard and hence easily recognisable baudrate?)
Devices to scan exchanges and detect modems etc already exist. I've seen
them advertised in the trade press.
Once you eliminate crippled crypto devices and ordinary data modems, what's
left is crypto worth looking more closely at. I guess any substitute scheme
will have to be v32bis or v.fast to disguise it, though then they just start
looking at the data too...
Whatever happens though, the effect of this new chip will be to make private
crypto stand out like a sore thumb.
G
|
6954 | From: albert@olizei.aiva.lt (Albert Meltser)
Subject: Re: How many israeli soldiers... What are you ``joking'' dark so much for?
Distribution: world
Organization: Lithuanian-Israeli Joint Stock Company OLIZEI
Reply-To: albert@olizei.aiva.lt
Keywords: Ani ohev et kolkhem -- 'Uhibbu kullukum -- I love you all
Lines: 32
> Q: How many occupying israeli soldiers (terrorists) does it
> take to kill a 5 year old native child?
>
> A: Four
>
> Two fasten his arms, one shoots in the face,
> and one writes up a false report.
>
> --
> / .. / .
> /_______/_/__________/_/_/ _< /____/
> /___ / .. /____/
>
1. There is a similar idea here in ex-USSR about how many militioners it needs
to place a new electric lamp. The answer is nine: one stays on a table and
holds the lamp, four hold the table and turn it and yet four run around the
table in opposite direction not to make the first feel bad (when being
turned). Pitily, it lacks this kind of dark humour as Nick's msg does.
2. To my mind the signature should be smth like:
/ _ __ / .
/_______/_/_______________ /________ /____/
/___ / _ /
Albert
--
_ .. I _ .. II
___I__/__)____I__I__(_) I____I ___I__II
__) ' __) .
|
6955 | From: sandvik@newton.apple.com (Kent Sandvik)
Subject: Re: Davidians and compassion
Organization: Cookamunga Tourist Bureau
Lines: 27
In article <C5sLAs.B68@blaze.cs.jhu.edu>, arromdee@jyusenkyou.cs.jhu.edu
(Ken Arromdee) wrote:
>
> In article <sandvik-190493200420@sandvik-kent.apple.com> sandvik@newton.apple.com (Kent Sandvik) writes:
> >So we have this highly Christian religious order that put fire
> >on their house, killing most of the people inside.
>
> We have no way to know that the cultists burned the house; it could have been
> the BATF and FBI. We only have the government's word for it, after all, and
> people who started it by a no-knock search with concussion grenades are hardly
> disinterested observers.
Well, looking at the videos it seems that this fire started in various
places at the same time, which would indicate that this was a planned
action. I'm sure FBI and BATF didn't *deliberately* start a possible
fire, having a sniper kill Korresh would have been a far easier
method. Looking at the careful operation, and use of tear gas
that as I know don't start fires, it is less likely that this
was the case.
Sorry, but my bets are on fanatical people keen to start
Armageddon -- theirs.
Cheers,
Kent
---
sandvik@newton.apple.com. ALink: KSAND -- Private activities on the net.
|
6956 | From: astein@nysernet.org (Alan Stein)
Subject: Re: Freedom In U.S.A.
Organization: NYSERNet, Inc.
Lines: 23
ab4z@Virginia.EDU ("Andi Beyer") writes:
> I have just started reading the articles in this news
>group. There seems to be an attempt by some members to quiet
>other members with scare tactics. I believe one posting said
>that all postings by one person are being forwarded to his
>server who keeps a file on him in hope that "Appropriate action
>might be taken".
> I don't know where you guys are from but in America
>such attempts to curtail someones first amendment rights are
>not appreciated. Here, we let everyone speak their mind
>regardless of how we feel about it. Take your fascistic
>repressive ideals back to where you came from.
Freedom of speech does not mean that others are compelled to give one
the means to speak publicly. Some systems have regulations
prohibiting the dissemination of racist and bigoted messages from
accounts they issue.
Apparently, that's not the case with virginia.edu, since you are still
posting.
--
Alan H. Stein astein@israel.nysernet.org
|
6957 | From: gfk39017@uxa.cso.uiuc.edu (George F. Krumins)
Subject: Re: Vandalizing the sky.
Organization: University of Illinois at Urbana
Lines: 59
nicho@vnet.IBM.COM (Greg Stewart-Nicholls) writes:
>In <C5y4t7.9w3@news.cso.uiuc.edu> George F. Krumins writes:
>>It is so typical that the rights of the minority are extinguished by the
>>wants of the majority, no matter how ridiculous those wants might be.
> Umm, perhaps you could explain what 'rights' we are talking about
>here ..
> -----------------------------------------------------------------
>Greg Nicholls ... : Vidi
>nicho@vnet.ibm.com or : Vici
>nicho@olympus.demon.co.uk : Veni
I was suggesting that the minority of professional and amateur astronomers
have the right to a dark, uncluttered night sky.
Let me give you an example. When you watch TV, they have commercials to pay
for the programming. You accept that as part of watching. If you don't like
it, you can turn it off. If you want to view the night sky, and there is a
floating billboard out there, you can't turn it off. It's the same
reasoning that limits billboards in scenic areas.
Pat writes:
George.
It's called a democracy. The majority rules. sorry.
If ytou don't like it, I suggest you modify the constitution to include
a constitutional right to Dark Skies. The theory of government
here is that the majority rules, except in the nature of fundamental
civil rights.
I say:
Any reasonably in-depth perusal of American history will show
you that many WASPs have continued the practices of prejudice,
discrimination, and violence against others of different
races, religions, and beliefs, despite the law.
Pat says:
If you really are annoyed, get some legislation
to create a dark sky zone, where in all light emissions are protected
in the zone. Kind of like the national radio quiet zone. Did you
know about that? near teh Radio telescope observatory in West virginia,
they have a 90?????? mile EMCON zone. Theoretically they can prevent
you from running light AC motors, like air conditioners and Vacuums.
In practice, they use it mostly to control large radio users.
I say:
What I'm objecting to here is a floating billboard that, presumably,
would move around in the sky. I, for one, am against legislating
at all. I just wish that people had a bit of common courtesy, and
would consider how their greed for money impacts the more ethereal and
aesthetic values that make us human. This includes the need for wild
and unspoiled things, including the night sky.
George
--
| George Krumins /^\ The Serpent and the Rainbow |
| gfk39017@uxa.cso.uiuc.edu <^^. .^^> |
| Pufferish Observatory <_ (o) _> |
| \_/ |
|
6958 | From: jake@bony1.bony.com (Jake Livni)
Subject: Re: Basil, opinions? (Re: Water on the brain)
Organization: The Department of Redundancy Department
Lines: 15
In article <1qmr5qINN5af@early-bird.think.com> shaig@Think.COM (Shai Guday) writes:
>The Litani river flows in a west-southwestern direction and indeed does
>not run through the buffer zone. The Hasbani does flow into the Jordan
>but contrary to what our imaginative poster might write, there has been
>no increase in the inflow from this river that is not proportional to
>climatic changes in rainfall.
What did you have to go and bring THAT up for? Now they're going to
say that Israel is stealing the RAIN, too....
--
Jake Livni jake@bony1.bony.com Ten years from now, George Bush will
American-Occupied New York have replaced Jimmy Carter as the
My opinions only - employer has no opinions. standard of a failed President.
|
6959 | From: sivap-s@cs.buffalo.edu (S. Suresh)
Subject: Re: screen problem in unix/xwindows/solaris
Organization: UB
Lines: 16
Nntp-Posting-Host: talos.cs.buffalo.edu
X-Newsreader: TIN [version 1.1 PL9]
SHONKWILER R W (ma201rs@prism.gatech.EDU) wrote:
: Experiment: From a Sun openwindows 4.1.3 xterm window log into a
: Solaris 2.x machine using rlogin; now do an "ls" and get the first
: character of each line display in the last column of the display
: with the rest of the line wrapped to the next line of the display.
: Log out and the condition persists. Check stty all, try reset
: with no effect.
The condition happens when the TAB is not set to 8 spaces, set and
then check out.
--
Suresh Sivaprakasam
Department of Computer Science, SUNY Buffalo, Amherst, NY - 14260-0001
Internet :sivap-s@cs.Buffalo.EDU Bitnet : sivap-s@SUNYBCS.BITNET
|
6960 | From: fabian@vivian.w.open.de (Fabian Hoppe)
Subject: Searching CAD-software
Nntp-Posting-Host: vivian
Organization: SubNet - The NeXT Generation
Lines: 13
Hi out there!
I'm looking for (mechanic-construction)CAD-software either PD-sources
or Sun 3-binaries (respective the licence.. :-).
Who knows _ANY_ package (and a source/site to get it..) ?
Thx, Fabian
--
Fabian Hoppe Phone : ++49 2332 12580
Elsternstr. 57 Fax : ++49 2332 83741
W-5820 Gevelsberg EMail : fabian@vivian.w.open.de
Germany
|
6961 | From: david@ods.com (David Engel)
Subject: Re: Wanted: Opinions on MAG 17S and NANAO 560i monitor
Organization: Optical Data Systems, Inc.
X-Newsreader: TIN [version 1.1 PL9]
Distribution: usa
Lines: 17
sleeping_dragon (ong_mang@iastate.edu) wrote:
: I'm looking to buy a 17" monitor soon, and it seems that I can't decide what
: monitor I should buy. I have a MAG 17S (this is a .25 dpi version and it using
: a TRINITON tube) and a NANAO 560i in mind.
Good luck finding an MX17S. When I was looking around back in
December/January, Mag wasn't producing any because they couldn't get
tubes from Sony. I asked when they expected to restart production as
I was willing to wait a few months to get an MX17S but they said not
any time soon. I wound up getting a T560i and am extremely happy with
it.
David
--
David Engel Optical Data Systems, Inc.
david@ods.com 1101 E. Arapaho Road
(214) 234-6400 Richardson, TX 75081
|
6962 | From: stoney@oyster.smcm.edu (Stanley Toney)
Subject: Re: Am I going to Hell?
Organization: University of Maryland, College Park
Lines: 45
In article <Apr.23.02.55.31.1993.3123@geneva.rutgers.edu>
tbrent@ecn.purdue.edu (Timothy J Brent) writes:
> I have stated before that I do not consider myself an atheist, but
> definitely do not believe in the christian god. The recent discussion
> about atheists and hell, combined with a post to another group (to the
> effect of 'you will all go to hell') has me interested in the consensus
> as to how a god might judge men. As a catholic, I was told that a jew,
> buddhist, etc. might go to heaven, but obviously some people do not
> believe this. Even more see atheists and pagans (I assume I would be
> lumped into this category) to be hellbound. I know you believe only
> god can judge, and I do not ask you to, just for your opinions.
excellent question timothy. i hpoe the answers you get will be satisfactory
as we can not understand the mind of god. but to attempt to answer you
clearly. GOD of the Bible has given us humans relativly little about how he
intends to judge mankind. the first test is those who have beleived that Jesus
Christ is the Son of GOD and that his death and resurrection was sufficent to
serve justice for all the acts we commit that are wrong in the eyes of god,
the bible calls this sin. for those who die before the end of the world/have
already died it is more complicated to explain without lapsing in to cliche.
God must judge people on the baasis of their works in this world. however
there is no plus and minus system for GOD. he has declared that he can not
tolerate spiritual imperfection, thus he can only based your worthiness to
live with him on the wrong in your life.
Good people, yes even Christians are going to constantly sin before GOD, The
Christian hoever thanks GOD that Christ has given his life for his sin's
penalty. the proscribed punishment for sin is death, just as the proscribed
punishment for robbery is time in jail. God then cannot ask for anything but
punishement for those sins. He does not want to condem. the Bible says in John
3:17, that God did not send his son in to the word to condem it but that
through him it might be saved." when i realize that i have sinned, and i do
with painful regularity, i must approach GOD and ask him to not hold thew sin
against me, i have that right and privlige only because of Christ. as for Jews
they are promised that they must believe on the Messiah who would come, and
dis come in Jesus of Nazereth. Muslims, i fear have been given a lie from the
fater of lies, Satan. They need Christ as do us all.
for those who don't have that right, in the view of the bible they stand
olone in their defense. are you going to hell? i can not answer that for you.
i can only say that perhaps it is eaiser to ask and answer how can i not go to
Hell? that step is much more rewarding.
stan toney stoney@oyster.smcm.edu
my opinions are my own, you may borrow them
p.s. stay in touch and keep asking questions not just to us but to God as
well, he listens too.
|
6963 | From: orourke@sophia.smith.edu (Joseph O'Rourke)
Subject: Re: Need a good concave -> convex polygon algorithm
Organization: Smith College, Northampton, MA, US
Lines: 16
In article <C5Juyz.ALy@murdoch.acc.Virginia.EDU> rws2v@uvacs.cs.Virginia.EDU (Richard Stoakley) writes:
> We need a good concave ->convex polygon conversion routine.
>I've tried a couple without much luck. Please E-mail responses and I
>will post a summary of any replies. Thank you.
>
>Richard Stoakley
>rws2v@uvacs.cs.Virginia.EDU
The problem is not precisely defined above, but if you need to find
the smallest convex polygon that encloses a given polygon, then
you are seeking the convex hull of your original polygon. There
are two ways to do this: use a somewhat tricky but by-now well
examined linear-time algorithm that exploits the polygon boundary,
or just feed the vertices of the original polygon to a convex hull
routine and accept O(n log n). Both methods are discussed in
Preparata and Shamos, for example.
|
6964 | From: glover@casbah.acns.nwu.edu (Eric Glover)
Subject: Re: What if the USSR had reached the Moon first?
Nntp-Posting-Host: unseen1.acns.nwu.edu
Organization: Northwestern University, Evanston Illinois.
Lines: 45
In article <1993Apr06.020021.186145@zeus.calpoly.edu> jgreen@trumpet.calpoly.edu (James Thomas Green) writes:
>Suppose the Soviets had managed to get their moon rocket working
>and had made it first. They could have beaten us if either:
>* Their rocket hadn't blown up on the pad thus setting them back,
>and/or
>* A Saturn V went boom.
The Apollo fire was harsh, A Saturn V explosion would have been
hurtful but The Soviets winning would have been crushing. That could have
been *the* technological turning point for the US turning us
from Today's "We can do anything, we're *the* Super Power" to a much more
reserved attitude like the Soviet Program today.
Kennedy was gone by 68\69, the war was still on is the east, I think
the program would have stalled badly and the goal of the moon
by 70 would have been dead with Nasa trying to figure were they went wrong.
>If they had beaten us, I speculate that the US would have gone
>head and done some landings, but we also would have been more
>determined to set up a base (both in Earth Orbit and on the
>Moon). Whether or not we would be on Mars by now would depend
>upon whether the Soviets tried to go. Setting up a lunar base
>would have stretched the budgets of both nations and I think
>that the military value of a lunar base would outweigh the value
>of going to Mars (at least in the short run). Thus we would
>have concentrated on the moon.
I speulate that:
+The Saturn program would have been pushed into
the 70s with cost over runs that would just be too evil.
Nixon still wins.
+The Shuttle was never proposed and Skylab never built.
+By 73 the program stalled yet again under the fuel crisis.
+A string of small launches mark the mid seventies.
+By 76 the goal of a US man on the moon is dead and the US space program
drifts till the present day.
>/~~~(-: James T. Green :-)~~~~(-: jgreen@oboe.calpoly.edu :-)~~~\
>| "I believe that this nation should commit itself to achieving |
>| the goal, before this decade is out, of landing a man on the |
>| Moon and returning him safely to the Earth." |
>| <John F. Kennedy; May 25, 1961> |
|
6965 | From: yeoy@a.cs.okstate.edu (YEO YEK CHONG)
Subject: Re: Is "Kermit" available for Windows 3.0/3.1?
Organization: Oklahoma State University
Lines: 7
From article <a4Fm3B1w165w@vicuna.ocunix.on.ca>, by Steve Frampton <frampton@vicuna.ocunix.on.ca>:
> I was wondering, is the "Kermit" package (the actual package, not a
Yes! In the usual ftp sites.
Yek CHong
|
6966 | From: jdrout@scott.skidmore.edu (JTD is lost)
Subject: Honda New Car Info
Organization: Skidmore, somewhere down from reality
Lines: 38
From Kay Honda's "Helpful HInts ABout Your Honda" infromation sheet
(given to new owners of Honda vehicles).
"A burning smell may be evident from your new car shortly after taking
delivery."
--I now own a fire extinguisher;>--
"On Prelude S mels at temperatures above 32 degrees push the
accelerator pedal to the floor one time, release slowly, and with your
foot off the accelerator, crank the engine until it starts. Moe than
5 seconds [!!!!!!! my note] of cranking may be required. In
temperatures below 32 degrees the accelerator will have to be
depressed 2-3 times."
"Door panels and interior trim can be damaged if they are not buckled
by getting caught when closing doors."
"When shifting accord automatic transmissions from Park Neutral, or
Reverse into Drive the transmission shifts into 3rd gear."
"In case of towing:
1- Start the engine
2- Shift into drive from Park, then from Drive to neutral
3- Turn off engine"
--what if you are getting towed b/c engine won't run?--
"IF ENGINE DOES NOT RUN DO NOT USE THIS PROCEDURE!"
--Phew, I was worried!--
Insert smilies where appropriate, though this is REAL.
Jonathan
jdrout@scott.skidmore.edu
Skidmore College, Saratoga NY
93 Civic Si + aftermarket fogs (if you own one, you understand!)
|
6967 | From: lange@reg.triumf.ca (THREADING THE CANADIAN TAPESTRY)
Subject: Detroit Playoff Tradition
Organization: TRIUMF: Tri-University Meson Facility
Lines: 11
Distribution: world
NNTP-Posting-Host: reg.triumf.ca
Keywords: Octopi
News-Software: VAX/VMS VNEWS 1.41
Way back in the early years (~50's) it took 8 wins to garner the Stanley Cup.
Soooooo, a couple of local fish mongers (local to the Joe Louis Arena, that is)
started the tradition of throwing an octopi onto the ice with every win. After
each victory, one leg would be severed before the octopus found its way to the
ice. (They are dead by the way.) It was a brilliant marketing strategy to
shore up the demand for one of their least popular products.
Hope this helps.
J. Lange
|
6968 | From: cramer@optilink.COM (Clayton Cramer)
Subject: Re: Lincoln & slavery (Re: Top Ten Tricks You Can Play on the American Voter)
Article-I.D.: optilink.15229
Organization: Optilink Corporation, Petaluma, CA
Lines: 36
In article <1993Apr3.185448.13811@isc-br.isc-br.com>, steveh@thor.isc-br.com (Steve Hendricks) writes:
> In article <kmitchelC4wA87.HLz@netcom.com> kmitchel@netcom.com (Kenneth C. Mitchell) writes:
# #Slavery makes economic sense (it NEVER makes MORAL sense) when human
# #muscle power is an economically valuable asset. Agricultural slavery might
# #have lasted right up to the first mechanical cotton reaper, but no
# #further; reapers are cheaper than slaves, and don't have to be fed during
# #the winter.
#
# This argument makes a several fundamental errors. First "agricultural"
# slavery was not limited to production of cotton. In the American south
# slave labor was used extensively to grow tobacco, sugar, and rice, all
# of which remained labor intensive enterprises well into the 20th century.
And of course, in states like Kentucky and Virginia, not well-suited to
large-scale plantations, slave labor was used to make one of the most
valuable agricultural products of all: more slaves. In some ways, this
treatment of humans beings as breeding livestock is the most horrifying
aspect of American slavery.
# Second, although mechanization of cotton production could be expected to
# reduce the demands for labor eventually, it was only in the 1940's
# the mechanization of cotton production in the South largely eliminated
# the labor intensive character of the operation, long after the "first
# mechanical cotton reaper" was invented.
This is an interesting question. Steinbeck's _Grapes of Wrath_
(published in the 1930s), uses agricultural mechanization of cotton
production in Arkansas as the cause of the Joad family being evicted
from the land. How many years were involved in the mechanization of
cotton farming? When did this first appear?
# #Ken Mitchell | The powers not delegated to the United States by the
# Steve Hendricks | DOMAIN: steveh@thor.ISC-BR.COM
--
Clayton E. Cramer {uunet,pyramid}!optilink!cramer My opinions, all mine!
Relations between people to be by mutual consent, or not at all.
|
6969 | From: tne@world.std.com (Thomas N Erickson)
Subject: Re: TeleUse, UIM/X, and C++
Organization: The World Public Access UNIX, Brookline, MA
Lines: 20
hubec@ctp.com (Hubert Chou) writes:
>Does anyone have any good ideas on how to integrate C++ code elegantly
>with TeleUse, UIM/X / Interface Architect generated code?
>Source would be great, but any suggestions are welcome.
Alsys has produced a paper outlining how to use C++ with TeleUSE. You can
get a copy from your local sales rep or call us at (619)457-2700.
As mentioned, it is very straight forward using the Dialog language
(similar to Visual Basic).
--
---------------------------------------------------------------------------
Tom Erickson Alsys
tne@world.std.com 67 South Bedford Street
Burlington, MA 01803
|
6970 | From: rmoskal@panix.com (Robert Moskal)
Subject: Volante Warp 10 board
Organization: PANIX Public Access Unix, NYC
Lines: 11
I've been troubleshooting the existence of way too many General Protection
Faults on a 486-33, Eisa-VLB, system. At this point I think I've narrowed
the problem down to the video drivers for the Volante Warp-10 adapter by
National Design, INc.
Yet somehow I find this hard to believe. Does anyone else have any
experiences with this board.
Thanx,
Robert Moskal
Brooklyn, USA
|
6971 | From: dlecoint@garnet.acns.fsu.edu (Darius_Lecointe)
Subject: Re: Spreading Christianity (Re: Christian Extremist Kills Doctor)
Organization: Florida State University
Distribution: na
Lines: 23
"David R. Sacco" <dsav+@andrew.cmu.edu> writes:
> Not to be too snide about it, but I think this Christianity must
> be a very convenient religion, very maliable and suitable for
> any occassion since it seems one can take it any way one wants
> to go with it and follow whichever bits one pleases and
> reinterpret the bits that don't match with one's desires. It
> is, in fact, so convenient that, were I capable of believing
> in a god, I might consider going for some brand of Christianity.
> The only difficulty left then, of course, is picking which sect
> to join. There are just so many.
>
> Dean Kaflowitz
>
> Yes, Christianity is convenient. Following the teachings of Jesus
> Christ and the Ten Commandments is convenient. Trying to love in a
> hateful world is convenient. Turning the other cheek is convenient. So
> convenient that it is burdensome at times.
>
> Dave.
Some Christians take a 10% discount off the Ten Commandments. Sunday
cannot be substituted for the Sabbath.
|
6972 | From: joel@zodiac.z-code.COM (Joel Reymont)
Subject: Xsun not finding default font (Sol2.1)
Organization: The Internet
Lines: 20
NNTP-Posting-Host: enterpoop.mit.edu
To: xpert@expo.lcs.mit.edu
Hi, netters!
I've just built X11R5 pl 21 under Solaris 2.1. I've used the multi-screen
patch, as well as the R5.SunOS... patch and everything builds great, except
for that error message Xsun gives me upon startup. It says:
"Cannot set default font path '[stuff deleted]'" and "Cannot set default font
'fixed'". If I supply the -fp option, it doesn't complain about the font path
but still complains about the font. I have symlinks from /usr/lib/ to the
place where my distribution lives.
Could somebody help me?
-joel
--
-----------------------------------------------------------------------------
Joel Reymont ! Z-Code Software Corporation ! e-mail: joel@z-code.com
-----------------------------------------------------------------------------
4340 Redwood Hwy, Suit B.50, San Rafael, CA 94903
-----------------------------------------------------------------------------
|
6973 | From: roger@crux.Princeton.EDU (Roger Lustig)
Subject: Re: Jewish Baseball Players?
Originator: news@nimaster
Nntp-Posting-Host: crux.princeton.edu
Reply-To: roger@astro.princeton.edu (Roger Lustig)
Organization: Princeton University
Lines: 39
In article <1993Apr15.221049.14347@midway.uchicago.edu> thf2@midway.uchicago.edu writes:
>In article <1qkkodINN5f5@jhunix.hcf.jhu.edu> pablo@jhunix.hcf.jhu.edu (Pablo A Iglesias) writes:
>>In article <15APR93.14691229.0062@lafibm.lafayette.edu> VB30@lafibm.lafayette.edu (VB30) writes:
>>>Just wondering. A friend and I were talking the other day, and
>>>we were (for some reason) trying to come up with names of Jewish
>>>baseball players, past and present. We weren't able to come up
>>>with much, except for Sandy Koufax, (somebody) Stankowitz, and
>>>maybe John Lowenstein. Can anyone come up with any more. I know
>>>it sounds pretty lame to be racking our brains over this, but
>>>humor us. Thanks for your help.
>>Hank Greenberg would have to be the most famous, because his Jewish
>>faith actually affected his play. (missing late season or was it world
>>series games because of Yom Kippur)
>The other Jewish HOF'er is Rod Carew (who converted).
Did he ever really convert? He married a Jewish woman, but I've never
heard him say he converted. Elliot Maddox, on the other hand...
>Lowenstein is Jewish, as well as Montana's only representative to the
>major leagues.
>Undeserving Cy Young award winner Steve Stone is Jewish. Between Stone,
>Koufax, Ken Holtzman (? might have the wrong pitcher, I'm thinking of the
>one who threw a no-hitter in both the AL and NL), and Big Ed Reulbach,
>that's quite a starting rotation. Moe Berg can catch. Harry Steinfeldt,
>the 3b in the Tinkers-Evers-Chance infield.
Yep, Holtzman. Saul Rogovin won an ERA title in 1949 or so before blowing out
the arm.
>Is Stanky Jewish? Or is that just a "Dave Cohen" kinda misinterpretation?
>Whatever, doesn't look like he stuck around the majors too long.
I'd be surprised. btw, they may just be shopping Gallego around to
make room for AS.
Roger
|
6974 | From: ak296@yfn.ysu.edu (John R. Daker)
Subject: Re: LICENSE PLATES
Organization: St. Elizabeth Hospital, Youngstown, OH
Lines: 16
Reply-To: ak296@yfn.ysu.edu (John R. Daker)
NNTP-Posting-Host: yfn.ysu.edu
In a previous article, edf003@marshall.wvnet.edu () says:
>>Hi, I'm interested in getting the list for license plate numbers. If anyone
>>has a listing I'd appreciate getting a copy of it. Thanks!
>>
You must be _incredibly_ bored. Have you considered reading the phone book?
--
--
DoD #650<----------------------------------------------------------->DarkMan
The significant problems we face cannot be solved at the same level of
thinking we were at when we created them. - Albert Einstein
___________________The Eternal Champion_________________
|
6975 | Subject: MAC to LaserJet IIIp
From: osterber@husc8.harvard.edu (Richard Osterberg)
Nntp-Posting-Host: husc8.harvard.edu
Lines: 12
I have a friend who has a MAC (LC or LC II I think), and her family has an
"extra" LaserJet IIIp sitting around. Is there any way to connect these
two and make them work without a postscript cartridge? She told me that a
random friend of hers had mentioned something about some software package
that could do the translation...
-Rick
--
+--------------------------------------------------------------------------+
| Rick Osterberg osterber@husc.harvard.edu 617-493-7784 617-493-3892 |
| 2032 Harvard Yard Mail Center Cambridge, MA 02138-7510 USA |
+--------------------------------------------------------------------------+
|
6976 | From: dyoung@media.mit.edu (David Young)
Subject: Macro Recorder/Player for X?
Organization: MIT Media Laboratory
Lines: 18
Is there aything available for X similar to QuicKeys for the Macintosh --
something that will allow me to store and playback sequences of keystrokes,
menu selections, and mouse actions - directing them towards another
application?
If so, could someone send me information on its availability -- and if not,
how hard do we think it might be to send input to other X applications and,
hopefully, deal with their responses appropriately? (If an application is
going to take a few seconds to process I probably have to wait for it to
complete before sending another command.)
thanks,
david,
|
6977 | From: bks2@cbnewsi.cb.att.com (bryan.k.strouse)
Subject: NHL RESULTS FOR GAMES PLAYED 4-05-93
Organization: AT&T
Keywords: monday night's boxscore
Lines: 55
NHL RESULTS FOR GAMES PLAYED 4/05/93.
--------------------------------------------------------------------------------
STANDINGS
PATRICK ADAMS NORRIS SMYTHE
TM W L T PT TM W L T PT TM W L T PT TM W L T PT
xPIT 53 21 6 112 yMON 47 27 6 100 yDET 44 28 9 97 yVAN 42 28 9 93
WAS 40 31 7 87 yBOS 46 26 7 99 yCHI 43 25 11 97 yCAL 40 29 10 90
NJ 38 35 6 82 yQUE 44 25 10 98 yTOR 42 26 11 95 yLA 37 33 9 83
NYI 37 34 6 80 yBUF 38 31 10 86 STL 35 34 10 80 yWIN 37 35 7 81
NYR 34 33 11 79 HAR 24 49 5 53 MIN 34 35 10 78 EDM 26 45 8 60
PHL 30 37 11 71 OTT 9 66 4 22 TB 22 51 5 49 SJ 10 68 2 22
x - Clinched Division Title
y - Clinched Playoff Berth
--------------------------------------------------------------------------------
Hartford Whalers (24-49-5) 1 1 3 - 5
New York Rangers (34-33-11) 1 2 1 - 4
1st period: HAR, Cunneyworth 5 - (Janssens, Greig) 12:21
NYR, Graves 34 - (Turcotte, Zubov) 18:39
2nd period: NYR, Kovalev 19 - (Turcotte, Graves) 2:12
HAR, Sanderson 44 - (Cassels) (pp) 4:54
NYR, Amonte 30 - (Andersson, Vanbiesbrouck) (pp) 19:13
3rd period: NYR, M.Messier 25 - (Amonte, Andersson) 2:26
HAR, Sanderson 45 - (Cassels) (sh) 5:23
HAR, Nylanders 6 - (Ladouceur) 8:35
HAR, Verbeek 36 - (Zalapski) 17:43
Powerplay Opportunities-Whalers 1 of 4
Rangers 1 of 4
Shots on Goal- Whalers 7 8 8 - 23
Rangers 9 10 12 - 31
Hartford Whalers--Gosselin (4-7-1) (31 shots - 27 saves)
New York Rangers--Vanbiesbrouck (20-18-7) (23 shots - 18 saves)
ATT-17,806
--------------------------------------------------------------------------------
\|||||/
-SPIKE-
|
6978 | From: christy@cs.concordia.ca (Christy)
Subject: XFree86 --- need help...
Organization: Computer Science, Concordia University, Montreal, Quebec
Lines: 23
Hi,
I just got XFree86 running on my pc with Consensys and encountered a few
minor (I hope) probems.
The pc is hooked up to a LAN where I want remote X applications to
connect to my X-server. I believe the command to permit this is
xhost. When I'm logged on my pc and type 'xhost + ' , I get the error message saying
"You must be on local machine to enable access".
what does this mean ? ain't I already on the local machine?
Another problem I have is with the mouse movement. I find that the
mouse cursor moves extremely slow and choppy.
How can I make the mouse cursor move more accurately?
thank in advance.
Any help is much appreciated.
please send replies to christy@alex.qc.ca.
Christy
|
6979 | From: kludge@grissom.larc.nasa.gov (Scott Dorsey)
Subject: Re: History question
Organization: NASA Langley Research Center and Reptile Farm
Lines: 16
NNTP-Posting-Host: grissom.larc.nasa.gov
In article <2775@snap> paj@uk.co.gec-mrc (Paul Johnson) writes:
>
>I recall reading of a phonograph which used mechanical amplification.
>Compressed air was squirted out of a valve which was controlled by the
>pickup. The result was noisy and distinctly lo-fi, but much louder
>than a conventional phonograph. It tended to wear the disks out
>pretty quickly though.
This was the Pathe you are thinking of, although there were other imitators.
It didn't wear the disks any more than conventional acoustic designs, but
it did have a high noise level due to the continual hiss of escaping air.
There are a lot of them still operating, and they are pretty ingenious.
There was a pneumatic amplifier designed by Alexander Graham Bell, as well,
but I don't know if it was ever constructed.
--scott
|
6980 | From: gtd597a@prism.gatech.EDU (Hrivnak)
Subject: Re: Goodbye, good riddance, get lost 'Stars
Organization: Georgia Institute of Technology
Lines: 13
In article <DT642B1w165w@sms.business.uwo.ca> s4lawren@sms.business.uwo.ca (Stephen Lawrence) writes:
> Goodbye Minnesota,...you never earned the right to have an NHL
>franchise in the first place!
>Whatta weird town!!!!!
Whatta ass!!!!!
--
GO SKINS! ||"Now for the next question... Does emotional music have quite
GO BRAVES! || an effect on you?" - Mike Patton, Faith No More
GO HORNETS! ||
GO CAPITALS! ||Mike Friedman (Hrivnak fan!) Internet: gtd597a@prism.gatech.edu
|
6981 | From: delman@mipg.upenn.edu (Delman Lee)
Subject: Tandberg 3600 + Future Domain TMC-1660 + Seagate ST-21M problem??
Distribution: comp
Organization: University of Pennsylvania, USA.
Lines: 37
Nntp-Posting-Host: mipgsun.mipg.upenn.edu
I am trying to get my system to work with a Tandberg 3600 + Future
Domain TMC-1660 + Seagate ST-21M MFM controller.
The system boots up if the Tandberg is disconnected from the system,
and of course no SCSI devices found (I have no other SCSI devices).
The system boots up if the Seagate MFM controller is removed from the
system. The Future Domain card reports finding the Tandberg 3660 on
the SCSI bus. The system then of course stops booting because my MFM
hard disks can't be found.
The system hangs if all three (Tandberg, Future Domain TMC-1660 &
Seagate MFM controller) are in the system.
Looks like there is some conflict between the Seagate and Future
Domain card. But the funny thing is that it only hangs if the Tandberg
is connected.
I have checked that there are no conflict in BIOS addresses, IRQ & I/O
port. Have I missed anything?
I am lost here. Any suggestions are most welcomed. Thanks in advance.
Delman.
--
______________________________________________________________________
Delman Lee Tel.: +1-215-662-6780
Medical Image Processing Group, Fax.: +1-215-898-9145
University of Pennsylvania,
4/F Blockley Hall, 418 Service Drive,
Philadelphia, PA 19104-6021,
U.S.A.. Internet: delman@mipg.upenn.edu
______________________________________________________________________
|
6982 | Subject: news says BATF indictment/warrant unsealed...
From: kim39@scws8.harvard.edu (John Kim)
Distribution: world
Organization: Harvard University Science Center
Nntp-Posting-Host: scws8.harvard.edu
Lines: 19
Something about how Koresh had threatened to cause local
problems with all these wepaons he had and was alleged to
have.
Someone else will post more details soon, I'm sure.
Other News:
Sniper injures 9 outside MCA buildling in L.A. Man arrested--suspect
was disgruntled employee of Universal Studios, which
is a division of M.C.A.
QUESTION:
What will Californians do with all those guns after the Reginald
denny trial?
-Case Kim
kim39@husc.harvard.edu
|
6983 | From: dzenc@hal.gnu.ai.mit.edu (Dan Zenchelsky)
Subject: VIdeotext/teletext descrambler
Article-I.D.: hal.1psvcg$1auv
Distribution: world
Organization: dis
Lines: 9
NNTP-Posting-Host: hal.ai.mit.edu
Hi,
I am looking for a PC card which does european videotext/teletext
descrambling (PAL). Does anyone in the US sell such a card? I once
saw an article about a card with the same functionallity in a
european Elektor magazine, but I wasn't able to track it down.
Thanx in advance,
Dan
|
6984 | From: cy779@cleveland.Freenet.Edu (Anas Omran)
Subject: Re: Israeli Terrorism
Organization: Case Western Reserve University, Cleveland, OH (USA)
Lines: 27
Reply-To: cy779@cleveland.Freenet.Edu (Anas Omran)
NNTP-Posting-Host: hela.ins.cwru.edu
In a previous article, tclock@orion.oac.uci.edu (Tim Clock) says:
>In article <1993Apr24.203620.6531@Virginia.EDU> ab4z@Virginia.EDU ("Andi Beyer") writes:
>>I think the Israeli press might be a tad bit biased in
>>reporting the events. I doubt the Propaganda machine of Goering
>>reported accurately on what was happening in Germany. It is
>>interesting that you are basing the truth on Israeli propaganda.
>
>Since one is also unlikely to get "the truth" from either Arab or
>Palestinian news outlets, where do we go to "understand", to learn?
>Is one form of propoganda more reliable than another?
There are many neutral human rights organizations which always report
on the situation in the O.T. But, as most people used to see on TV, the
Israelis do not allow them to go deep there in the O.T. The Israelis
used to arrest and sometimes to kill some of these neutral reporters.
So, this is another kind of terrorism committed by the Jews in Palestine.
They do not allow fair and neutral coverage of the situation in Palestine.
>to determine that is to try and get beyond the writer's "political
>agenda", whether it is "on" or "against" our *side*.
>
>Tim
Anas Omran
|
6985 | From: nlu@Xenon.Stanford.EDU (Nelson Lu)
Subject: SHARKS REVIEW Part 1: Goaltenders
Organization: Computer Science Department, Stanford University.
Lines: 80
As the Sharks' season came to a close tonight, I will start a series of posts,
trying to revisit the players, the trades, the moves, etc., that went through
for the Sharks for the past season. If you are uninterested, since I will
have the words SHARKS REVIEW in the subject heading in these postings, you can
kill them.
I will first try to evaluate how the players did. These ratings, of course,
are subject to my own biases, but I hope that I can try to be as objective as
possible. I will evalute players who finished the season with the Sharks
and/or did not play for another NHL team this season.
Thus, then, let's go to the goaltenders...
#1 BRIAN HAYWARD Season: 11th
Acquired: '91-92 from Minnesota in dispersal draft
Grade: P (D)
It is sad that his career has to come to this dim an end, a career that
featured sharing three Jennings Trophies (with Patrick Roy, in '87, '88, and
'89). It would indeed be unfair for me to do anything but give him a passing
grade (and skip the letter grading), but he had simply been awful on ice this
year, save for a bright spot or two, and even if he had been healthy, he would
not be any more than the 3rd-string goalie.
But Hayward was a classy individual, who also figured in on the Sharks' first
ever victory, the 3rd game of the season last year against the Calgary Flames.
As he retires, the fans will remember what a good guy he was.
#30 JEFF HACKETT Season: 3rd
Acquired: '91-92, from N. Y. Islanders in expansion draft
Grade: C
Hackett, after (deservedly) winning the team MVP honors last season, simply
wasted the year. Other than a few good spots (57 saves against Los Angeles,
almost-shutout against Tampa Bay, etc.), Hackett, finishing with 85.6% save
percentage and a 5.28 GAA, watched his status go from the team's #1 goalie to
bench decoration at the end of the season. He was expected, early, to carry
the team along; instead, he apparently became frustrated, but the an early
injury that forced him to miss 12 games may have been a contributing factor,
but upon return, he simply wasn't up to the task. He may not return next
year.
#31 WADE FLAHERTY Season: 1st (still eligible as rookie)
Acquired: '91-92, signed as undrafted free agent
Grade: I (A-)
It is pretty hard to evaluate a goaltender on just one game alone, thus the
incomplete grade, but yet in the one start that he did get (against the Calgary
Flames), Flaherty was nothing but sharp for at least two periods. He started
the season poorly in Kansas City, but finished strong, prompting the Blades'
owner Ron Parker to comment that he should be a candidate for the IHL MVP
honors. The upcoming IHL playoffs would be a major challenge for him as he
tries to make it into the NHL; last year, he was a capable backup for Arturs
Irbe in the throughout the season and in the Turner Cup playoffs, picking up
all-star honors along with Irbe; now it's time for him to show that he can
share the job with Irbe next year, because with prospects Dan Ryder, Trevor
Robins, and Scott Cashman coming along, if he doesn't make it next year, he
may not ever.
#32 ARTURS IRBE Season: 1st
Acquired: '91-92, from Minnesota in dispersal draft
Grade: B+
I may yet be overly critical of Irbe in a year that he clearly established that
he's a bona fide NHL goaltender, perhaps a bona fide #1 goaltender. He has
provided most of the little highlight footage that the Sharks team had, getting
the team's first ever shut-out against the Los Angeles Kings on December 26.
He has been fearless in and out of the net, aggressively playing the puck and
making passes, reminding people of a young Ron Hextall (except, of course, the
goonism). Yet he still needs to develop more consistency, which is hard to do
with such a bad defense in front of him, but if the Sharks are to challenge for
a playoff spot next season, Irbe's the key, as he demonstrated in being named
as a star of the game 13 times in 32 starts.
===============================================================================
GO CALGARY FLAMES! Al MacInnis for Norris! Gary Roberts for Hart and Smythe!
GO EDMONTON OILERS! Go for playoffs next year! Stay in Edmonton!
===============================================================================
Nelson Lu (claudius@leland.stanford.edu)
rec.sport.hockey contact for the San Jose Sharks
|
6986 | From: rogers@calamari.hi.com (Andrew Rogers)
Subject: Re: Is MSG sensitivity superstition?
Organization: Flames 'R Us
Lines: 13
NNTP-Posting-Host: calamari.hi.com
In article <1993Apr15.153729.13738@walter.bellcore.com> jchen@ctt.bellcore.com writes:
>Chinese, and many other Asians (Japanese, Koreans, etc) have used
>MSG as flavor enhancer for two thousand years. Do you believe that
>they knew how to make MSG from chemical processes? Not. They just
>extracted it from natural food such sea food and meat broth.
And to add further fuel to the flame war, I read about 20 years ago that
the "natural" MSG - extracted from the sources you mention above - does not
cause the reported aftereffects; it's only that nasty "artificial" MSG -
extracted from coal tar or whatever - that causes Chinese Restaurant
Syndrome. I find this pretty hard to believe; has anyone else heard it?
Andrew
|
6987 | From: tgl+@cs.cmu.edu (Tom Lane)
Subject: JPEG image compression: Frequently Asked Questions
Summary: Useful info about JPEG (JPG) image files and programs
Keywords: JPEG, image compression, FAQ
Supersedes: <jpeg-faq_733898461@g.gp.cs.cmu.edu>
Nntp-Posting-Host: g.gp.cs.cmu.edu
Reply-To: jpeg-info@uunet.uu.net
Organization: School of Computer Science, Carnegie Mellon
Expires: Sun, 16 May 1993 21:39:30 GMT
Lines: 1027
Archive-name: jpeg-faq
Last-modified: 18 April 1993
This FAQ article discusses JPEG image compression. Suggestions for
additions and clarifications are welcome.
New since version of 3 April 1993:
* New versions of Image Archiver and PMJPEG for OS/2.
This article includes the following sections:
[1] What is JPEG?
[2] Why use JPEG?
[3] When should I use JPEG, and when should I stick with GIF?
[4] How well does JPEG compress images?
[5] What are good "quality" settings for JPEG?
[6] Where can I get JPEG software?
[6A] "canned" software, viewers, etc.
[6B] source code
[7] What's all this hoopla about color quantization?
[8] How does JPEG work?
[9] What about lossless JPEG?
[10] Why all the argument about file formats?
[11] How do I recognize which file format I have, and what do I do about it?
[12] What about arithmetic coding?
[13] Does loss accumulate with repeated compression/decompression?
[14] What are some rules of thumb for converting GIF images to JPEG?
Sections 1-6 are basic info that every JPEG user needs to know;
sections 7-14 are advanced info for the curious.
This article is posted every 2 weeks. You can always find the latest version
in the news.answers archive at rtfm.mit.edu (18.172.1.27). By FTP, fetch
/pub/usenet/news.answers/jpeg-faq; or if you don't have FTP, send e-mail to
mail-server@rtfm.mit.edu with body "send usenet/news.answers/jpeg-faq".
Many other FAQ articles are also stored in this archive. For more
instructions on use of the archive, send e-mail to the same address with the
words "help" and "index" (no quotes) on separate lines. If you don't get a
reply, the server may be misreading your return address; add a line such as
"path myname@mysite" to specify your correct e-mail address to reply to.
----------
[1] What is JPEG?
JPEG (pronounced "jay-peg") is a standardized image compression mechanism.
JPEG stands for Joint Photographic Experts Group, the original name of the
committee that wrote the standard. JPEG is designed for compressing either
full-color or gray-scale digital images of "natural", real-world scenes.
It does not work so well on non-realistic images, such as cartoons or line
drawings.
JPEG does not handle black-and-white (1-bit-per-pixel) images, nor does it
handle motion picture compression. Standards for compressing those types
of images are being worked on by other committees, named JBIG and MPEG
respectively.
JPEG is "lossy", meaning that the image you get out of decompression isn't
quite identical to what you originally put in. The algorithm achieves much
of its compression by exploiting known limitations of the human eye, notably
the fact that small color details aren't perceived as well as small details
of light-and-dark. Thus, JPEG is intended for compressing images that will
be looked at by humans. If you plan to machine-analyze your images, the
small errors introduced by JPEG may be a problem for you, even if they are
invisible to the eye.
A useful property of JPEG is that the degree of lossiness can be varied by
adjusting compression parameters. This means that the image maker can trade
off file size against output image quality. You can make *extremely* small
files if you don't mind poor quality; this is useful for indexing image
archives, making thumbnail views or icons, etc. etc. Conversely, if you
aren't happy with the output quality at the default compression setting, you
can jack up the quality until you are satisfied, and accept lesser compression.
[2] Why use JPEG?
There are two good reasons: to make your image files smaller, and to store
24-bit-per-pixel color data instead of 8-bit-per-pixel data.
Making image files smaller is a big win for transmitting files across
networks and for archiving libraries of images. Being able to compress a
2 Mbyte full-color file down to 100 Kbytes or so makes a big difference in
disk space and transmission time! (If you are comparing GIF and JPEG, the
size ratio is more like four to one. More details below.)
If your viewing software doesn't support JPEG directly, you'll have to
convert JPEG to some other format for viewing or manipulating images. Even
with a JPEG-capable viewer, it takes longer to decode and view a JPEG image
than to view an image of a simpler format (GIF, for instance). Thus, using
JPEG is essentially a time/space tradeoff: you give up some time in order to
store or transmit an image more cheaply.
It's worth noting that when network or phone transmission is involved, the
time savings from transferring a shorter file can be much greater than the
extra time to decompress the file. I'll let you do the arithmetic yourself.
The other reason why JPEG will gradually replace GIF as a standard Usenet
posting format is that JPEG can store full color information: 24 bits/pixel
(16 million colors) instead of 8 or less (256 or fewer colors). If you have
only 8-bit display hardware then this may not seem like much of an advantage
to you. Within a couple of years, though, 8-bit GIF will look as obsolete as
black-and-white MacPaint format does today. Furthermore, for reasons detailed
in section 7, JPEG is far more useful than GIF for exchanging images among
people with widely varying color display hardware. Hence JPEG is considerably
more appropriate than GIF for use as a Usenet posting standard.
[3] When should I use JPEG, and when should I stick with GIF?
JPEG is *not* going to displace GIF entirely; for some types of images,
GIF is superior in image quality, file size, or both. One of the first
things to learn about JPEG is which kinds of images to apply it to.
As a rule of thumb, JPEG is superior to GIF for storing full-color or
gray-scale images of "realistic" scenes; that means scanned photographs and
similar material. JPEG is superior even if you don't have 24-bit display
hardware, and it is a LOT superior if you do. (See section 7 for details.)
GIF does significantly better on images with only a few distinct colors,
such as cartoons and line drawings. In particular, large areas of pixels
that are all *exactly* the same color are compressed very efficiently indeed
by GIF. JPEG can't squeeze these files as much as GIF does without
introducing visible defects. This sort of image is best kept in GIF form.
(In particular, single-color borders are quite cheap in GIF files, but they
should be avoided in JPEG files.)
JPEG also has a hard time with very sharp edges: a row of pure-black pixels
adjacent to a row of pure-white pixels, for example. Sharp edges tend to
come out blurred unless you use a very high quality setting. Again, this
sort of thing is not found in scanned photographs, but it shows up fairly
often in GIF files: borders, overlaid text, etc. The blurriness is
particularly objectionable with text that's only a few pixels high.
If you have a GIF with a lot of small-size overlaid text, don't JPEG it.
Computer-drawn images (ray-traced scenes, for instance) usually fall between
scanned images and cartoons in terms of complexity. The more complex and
subtly rendered the image, the more likely that JPEG will do well on it.
The same goes for semi-realistic artwork (fantasy drawings and such).
Plain black-and-white (two level) images should never be converted to JPEG.
You need at least about 16 gray levels before JPEG is useful for gray-scale
images. It should also be noted that GIF is lossless for gray-scale images
of up to 256 levels, while JPEG is not.
If you have an existing library of GIF images, you may wonder whether you
should convert them to JPEG. You will lose a little image quality if you do.
(Section 7, which argues that JPEG image quality is superior to GIF, only
applies if both formats start from a full-color original. If you start from
a GIF, you've already irretrievably lost a great deal of information; JPEG
can only make things worse.) However, the disk space savings may justify
converting anyway. This is a decision you'll have to make for yourself.
If you do convert a GIF library to JPEG, see section 14 for hints. Be
prepared to leave some images in GIF format, since some GIFs will not
convert well.
[4] How well does JPEG compress images?
Pretty darn well. Here are some sample file sizes for an image I have
handy, a 727x525 full-color image of a ship in a harbor. The first three
files are for comparison purposes; the rest were created with the free JPEG
software described in section 6B.
File Size in bytes Comments
ship.ppm 1145040 Original file in PPM format (no compression; 24 bits
or 3 bytes per pixel, plus a few bytes overhead)
ship.ppm.Z 963829 PPM file passed through Unix compress
compress doesn't accomplish a lot, you'll note.
Other text-oriented compressors give similar results.
ship.gif 240438 Converted to GIF with ppmquant -fs 256 | ppmtogif
Most of the savings is the result of losing color
info: GIF saves 8 bits/pixel, not 24. (See sec. 7.)
ship.jpg95 155622 cjpeg -Q 95 (highest useful quality setting)
This is indistinguishable from the 24-bit original,
at least to my nonprofessional eyeballs.
ship.jpg75 58009 cjpeg -Q 75 (default setting)
You have to look mighty darn close to distinguish this
from the original, even with both on-screen at once.
ship.jpg50 38406 cjpeg -Q 50
This has slight defects; if you know what to look
for, you could tell it's been JPEGed without seeing
the original. Still as good image quality as many
recent postings in Usenet pictures groups.
ship.jpg25 25192 cjpeg -Q 25
JPEG's characteristic "blockiness" becomes apparent
at this setting (djpeg -blocksmooth helps some).
Still, I've seen plenty of Usenet postings that were
of poorer image quality than this.
ship.jpg5o 6587 cjpeg -Q 5 -optimize (-optimize cuts table overhead)
Blocky, but perfectly satisfactory for preview or
indexing purposes. Note that this file is TINY:
the compression ratio from the original is 173:1 !
In this case JPEG can make a file that's a factor of four or five smaller
than a GIF of comparable quality (the -Q 75 file is every bit as good as the
GIF, better if you have a full-color display). This seems to be a typical
ratio for real-world scenes.
[5] What are good "quality" settings for JPEG?
Most JPEG compressors let you pick a file size vs. image quality tradeoff by
selecting a quality setting. There seems to be widespread confusion about
the meaning of these settings. "Quality 95" does NOT mean "keep 95% of the
information", as some have claimed. The quality scale is purely arbitrary;
it's not a percentage of anything.
The name of the game in using JPEG is to pick the lowest quality setting
(smallest file size) that decompresses into an image indistinguishable from
the original. This setting will vary from one image to another and from one
observer to another, but here are some rules of thumb.
The default quality setting (-Q 75) is very often the best choice. This
setting is about the lowest you can go without expecting to see defects in a
typical image. Try -Q 75 first; if you see defects, then go up. Except for
experimental purposes, never go above -Q 95; saying -Q 100 will produce a
file two or three times as large as -Q 95, but of hardly any better quality.
If the image was less than perfect quality to begin with, you might be able to
go down to -Q 50 without objectionable degradation. On the other hand, you
might need to go to a HIGHER quality setting to avoid further degradation.
The second case seems to apply much of the time when converting GIFs to JPEG.
The default -Q 75 is about right for compressing 24-bit images, but -Q 85 to
95 is usually better for converting GIFs (see section 14 for more info).
If you want a very small file (say for preview or indexing purposes) and are
prepared to tolerate large defects, a -Q setting in the range of 5 to 10 is
about right. -Q 2 or so may be amusing as "op art".
(Note: the quality settings discussed in this article apply to the free JPEG
software described in section 6B, and to many programs based on it. Other
JPEG implementations, such as Image Alchemy, may use a completely different
quality scale. Some programs don't even provide a numeric scale, just
"high"/"medium"/"low"-style choices.)
[6] Where can I get JPEG software?
Most of the programs described in this section are available by FTP.
If you don't know how to use FTP, see the FAQ article "How to find sources".
(If you don't have direct access to FTP, read about ftpmail servers in the
same article.) That article appears regularly in news.answers, or you can
get it by sending e-mail to mail-server@rtfm.mit.edu with
"send usenet/news.answers/finding-sources" in the body. The "Anonymous FTP
List FAQ" may also be helpful --- it's usenet/news.answers/ftp-list/faq in
the news.answers archive.
NOTE: this list changes constantly. If you have a copy more than a couple
months old, get the latest JPEG FAQ from the news.answers archive.
[6A] If you are looking for "canned" software, viewers, etc:
The first part of this list is system-specific programs that only run on one
kind of system. If you don't see what you want for your machine, check out
the portable JPEG software described at the end of the list. Note that this
list concentrates on free and shareware programs that you can obtain over
Internet; but some commercial programs are listed too.
X Windows:
John Bradley's free XV (version 2.00 and up) is an excellent viewer for JPEG,
GIF, and other image formats. It's available for FTP from export.lcs.mit.edu
or ftp.cis.upenn.edu. The file is called 'xv-???.tar.Z' (where ??? is the
version number, currently 2.21); it is located in the 'contrib' directory on
export or the 'pub/xv' directory at upenn. XV reduces all images to 8 bits
internally, which means it's not a real good choice if you have a 24-bit
display (you'll still get only 8-bit color). Also, you shouldn't use XV to
convert full-color images to JPEG, because they'll get color-quantized first.
But XV is a fine tool for converting GIF and other 8-bit images to JPEG.
CAUTION: there is a glitch in versions 2.21 and earlier: be sure to check
the "save at normal size" checkbox when saving a JPEG file, or the file will
be blurry.
Another good choice for X Windows is John Cristy's free ImageMagick package,
also available from export.lcs.mit.edu, file contrib/ImageMagick.tar.Z.
This package handles many image processing and conversion tasks. The
ImageMagick viewer handles 24-bit displays correctly; for colormapped
displays, it does better (though slower) color quantization than XV or the
basic free JPEG software.
Both of the above are large, complex packages. If you just want a simple
image viewer, try xloadimage or xli. xloadimage supports JPEG in its latest
release, 3.03. xloadimage is free and available from export.lcs.mit.edu,
file contrib/xloadimage.3.03.tar.Z. xli is a variant version of xloadimage,
said by its fans to be somewhat faster and more robust than the original.
(The current xli is indeed faster and more robust than the current
xloadimage, at least with respect to JPEG files, because it has the IJG v4
decoder while xloadimage 3.03 is using a hacked-over v1. The next
xloadimage release will fix this.) xli is also free and available from
export.lcs.mit.edu, file contrib/xli.1.14.tar.Z. Both programs are said
to do the right thing with 24-bit displays.
MS-DOS:
This covers plain DOS; for Windows or OS/2 programs, see the next headings.
One good choice is Eric Praetzel's free DVPEG, which views JPEG and GIF files.
The current version, 2.4a, is available by FTP from sunee.uwaterloo.ca
(129.97.50.50), file pub/jpeg/viewers/dvpeg24a.zip. This is a good basic
viewer that works on either 286 or 386/486 machines. The user interface is
not flashy, but it's functional.
Another freeware JPEG/GIF/TGA viewer is Mohammad Rezaei's Hiview. The
current version, 1.2, is available from Simtel20 and mirror sites (see NOTE
below), file msdos/graphics/hv12.zip. Hiview requires a 386 or better CPU
and a VCPI-compatible memory manager (QEMM386 and 386MAX work; Windows and
OS/2 do not). Hiview is currently the fastest viewer for images that are no
bigger than your screen. For larger images, it scales the image down to fit
on the screen (rather than using panning/scrolling as most viewers do).
You may or may not prefer this approach, but there's no denying that it
slows down loading of large images considerably. Note: installation is a
bit tricky; read the directions carefully!
A shareware alternative is ColorView for DOS ($30). This is easier to
install than either of the two freeware alternatives. Its user interface is
also much spiffier-looking, although personally I find it harder to use ---
more keystrokes, inconsistent behavior. It is faster than DVPEG but a
little slower than Hiview, at least on my hardware. (For images larger than
screen size, DVPEG and ColorView seem to be about the same speed, and both
are faster than Hiview.) The current version is 2.1, available from
Simtel20 and mirror sites (see NOTE below), file msdos/graphics/dcview21.zip.
Requires a VESA graphics driver; if you don't have one, look in vesadrv2.zip
or vesa-tsr.zip from the same directory. (Many recent PCs have a built-in
VESA driver, so don't try to load a VESA driver unless ColorView complains
that the driver is missing.)
A second shareware alternative is Fullview, which has been kicking around
the net for a while, but I don't know any stable archive location for it.
The current (rather old) version is inferior to the above viewers anyway.
The author tells me that a new version of Fullview will be out shortly
and it will be submitted to the Simtel20 archives at that time.
The well-known GIF viewer CompuShow (CSHOW) supports JPEG in its latest
revision, 8.60a. However, CSHOW's JPEG implementation isn't very good:
it's slow (about half the speed of the above viewers) and image quality is
poor except on hi-color displays. Too bad ... it'd have been nice to see a
good JPEG capability in CSHOW. Shareware, $25. Available from Simtel20 and
mirror sites (see NOTE below), file msdos/gif/cshw860a.zip.
Due to the remarkable variety of PC graphics hardware, any one of these
viewers might not work on your particular machine. If you can't get *any*
of them to work, you'll need to use one of the following conversion programs
to convert JPEG to GIF, then view with your favorite GIF viewer. (If you
have hi-color hardware, don't use GIF as the intermediate format; try to
find a TARGA-capable viewer instead. VPIC5.0 is reputed to do the right
thing with hi-color displays.)
The Independent JPEG Group's free JPEG converters are FTPable from Simtel20
and mirror sites (see NOTE below), file msdos/graphics/jpeg4.zip (or
jpeg4386.zip if you have a 386 and extended memory). These files are DOS
compilations of the free source code described in section 6B; they will
convert JPEG to and from GIF, Targa, and PPM formats.
Handmade Software offers free JPEG<=>GIF conversion tools, GIF2JPG/JPG2GIF.
These are slow and are limited to conversion to and from GIF format; in
particular, you can't get 24-bit color output from a JPEG. The major
advantage of these tools is that they will read and write HSI's proprietary
JPEG format as well as the Usenet-standard JFIF format. Since HSI-format
files are rather widespread on BBSes, this is a useful capability. Version
2.0 of these tools is free (prior versions were shareware). Get it from
Simtel20 and mirror sites (see NOTE below), file msdos/graphics/gif2jpg2.zip.
NOTE: do not use HSI format for files to be posted on Internet, since it is
not readable on non-PC platforms.
Handmade Software also has a shareware image conversion and manipulation
package, Image Alchemy. This will translate JPEG files (both JFIF and HSI
formats) to and from many other image formats. It can also display images.
A demo version of Image Alchemy version 1.6.1 is available from Simtel20 and
mirror sites (see NOTE below), file msdos/graphics/alch161.zip.
NOTE ABOUT SIMTEL20: The Internet's key archive site for PC-related programs
is Simtel20, full name wsmr-simtel20.army.mil (192.88.110.20). Simtel20
runs a non-Unix system with weird directory names; where this document
refers to directory (eg) "msdos/graphics" at Simtel20, that really means
"pd1:<msdos.graphics>". If you are not physically on MILnet, you should
expect rather slow FTP transfer rates from Simtel20. There are several
Internet sites that maintain copies (mirrors) of the Simtel20 archives;
most FTP users should go to one of the mirror sites instead. A popular USA
mirror site is oak.oakland.edu (141.210.10.117), which keeps Simtel20 files
in (eg) "/pub/msdos/graphics". If you have no FTP capability, you can
retrieve files from Simtel20 by e-mail; see informational postings in
comp.archives.msdos.announce to find out how. If you are outside the USA,
consult the same newsgroup to learn where your nearest Simtel20 mirror is.
Microsoft Windows:
There are several Windows programs capable of displaying JPEG images.
(Windows viewers are generally slower than DOS viewers on the same hardware,
due to Windows' system overhead. Note that you can run the DOS conversion
programs described above inside a Windows DOS window.)
The newest entry is WinECJ, which is free and EXTREMELY fast. Version 1.0
is available from ftp.rahul.net, file /pub/bryanw/pc/jpeg/wecj.zip.
Requires Windows 3.1 and 256-or-more-colors mode. This is a no-frills
viewer with the bad habit of hogging the machine completely while it
decodes; and the image quality is noticeably worse than other viewers.
But it's so fast you'll use it anyway, at least for previewing...
JView is freeware, fairly fast, has good on-line help, and can write out the
decompressed image in Windows BMP format; but it can't create new JPEG
files, and it doesn't view GIFs. JView also lacks some other useful
features of the shareware viewers (such as brightness adjustment), but it's
an excellent basic viewer. The current version, 0.9, is available from
ftp.cica.indiana.edu (129.79.20.84), file pub/pc/win3/desktop/jview090.zip.
(Mirrors of this archive can be found at some other Internet sites,
including wuarchive.wustl.edu.)
WinJPEG (shareware, $20) displays JPEG,GIF,Targa,TIFF, and BMP image files;
it can write all of these formats too, so it can be used as a converter.
It has some other nifty features including color-balance adjustment and
slideshow. The current version is 2.1, available from Simtel20 and mirror
sites (see NOTE above), file msdos/windows3/winjp210.zip. (This is a slow
286-compatible version; if you register, you'll get the 386-only version,
which is roughly 25% faster.)
ColorView is another shareware entry ($30). This was an early and promising
contender, but it has not been updated in some time, and at this point it
has no real advantages over WinJPEG. If you want to try it anyway, the
current version is 0.97, available from ftp.cica.indiana.edu, file
pub/pc/win3/desktop/cview097.zip. (I understand that a new version will
be appearing once the authors are finished with ColorView for DOS.)
DVPEG (see DOS heading) also works under Windows, but only in full-screen
mode, not in a window.
OS/2:
The following files are available from hobbes.nmsu.edu (128.123.35.151).
Note: check /pub/uploads for more recent versions --- the hobbes moderator
is not very fast about moving uploads into their permanent directories.
/pub/os2/2.x/graphics/jpegv4.zip
32-bit version of free IJG conversion programs, version 4.
/pub/os2/all/graphics/jpeg4-16.zip
16-bit version of same, for OS/2 1.x.
/pub/os2/2.x/graphics/imgarc11.zip
Image Archiver 1.01: image conversion/viewing with PM graphical interface.
Strong on conversion functions, viewing is a bit weaker. Shareware, $15.
/pub/os2/2.x/graphics/pmjpeg11.zip
PMJPEG 1.1: OS/2 2.x port of WinJPEG, a popular viewer for Windows
(see description in Windows section). Shareware, $20.
/pub/os2/2.x/graphics/pmview84.zip
PMView 0.84: JPEG/GIF/BMP viewer. GIF viewing very fast, JPEG viewing
fast if you have huge amounts of RAM, otherwise about the same speed
as the above programs. Strong 24-bit display support. Shareware, $20.
Macintosh:
Most Mac JPEG programs rely on Apple's JPEG implementation, which is part of
the QuickTime system extension; so you need to have QuickTime installed.
To use QuickTime, you need a 68020 or better CPU and you need to be running
System 6.0.7 or later. (If you're running System 6, you must also install
the 32-bit QuickDraw extension; this is built-in on System 7.) You can get
QuickTime by FTP from ftp.apple.com, file dts/mac/quicktime/quicktime.hqx.
(As of 11/92, this file contains QuickTime 1.5, which is better than QT 1.0
in several ways. With respect to JPEG, it is marginally faster and
considerably less prone to crash when fed a corrupt JPEG file. However,
some applications seem to have compatibility problems with QT 1.5.)
Mac users should keep in mind that QuickTime's JPEG format, PICT/JPEG, is
not the same as the Usenet-standard JFIF JPEG format. (See section 10 for
details.) If you post images on Usenet, make sure they are in JFIF format.
Most of the programs mentioned below can generate either format.
The first choice is probably JPEGView, a free program for viewing images
that are in JFIF format, PICT/JPEG format, or GIF format. It also can
convert between the two JPEG formats. The current version, 2.0, is a big
improvement over prior versions. Get it from sumex-aim.stanford.edu
(36.44.0.6), file /info-mac/app/jpeg-view-20.hqx. Requires System 7 and
QuickTime. On 8-bit displays, JPEGView usually produces the best color
image quality of all the currently available Mac JPEG viewers. JPEGView can
view large images in much less memory than other Mac viewers; in fact, it's
the only one that can deal with JPEG images much over 640x480 pixels on a
typical 4MB Mac. Given a large image, JPEGView automatically scales it down
to fit on the screen, rather than presenting scroll bars like most other
viewers. (You can zoom in on any desired portion, though.) Some people
like this behavior, some don't. Overall, JPEGView's user interface is very
well thought out.
GIFConverter, a shareware ($40) image viewer/converter, supports JFIF and
PICT/JPEG, as well as GIF and several other image formats. The latest
version is 2.3.2. Get it from sumex-aim.stanford.edu, file
/info-mac/art/gif/gif-converter-232.hqx. Requires System 6.0.5 or later.
GIFConverter is not better than JPEGView as a plain JPEG/GIF viewer, but
it has much more extensive image manipulation and format conversion
capabilities, so you may find it worth its shareware fee if you do a lot of
playing around with images. Also, the newest version of GIFConverter can
load and save JFIF images *without* QuickTime, so it is your best bet if
your machine is too old to run QuickTime. (But it's faster with QuickTime.)
Note: If GIFConverter runs out of memory trying to load a large JPEG, try
converting the file to GIF with JPEG Convert, then viewing the GIF version.
JPEG Convert, a Mac version of the free IJG JPEG conversion utilities, is
available from sumex-aim.stanford.edu, file /info-mac/app/jpeg-convert-10.hqx.
This will run on any Mac, but it only does file conversion, not viewing.
You can use it in conjunction with any GIF viewer.
Previous versions of this FAQ recommended Imagery JPEG v0.6, a JPEG<=>GIF
converter based on an old version of the IJG code. If you are using this
program, you definitely should replace it with JPEG Convert.
Apple's free program PictPixie can view images in JFIF, QuickTime JPEG, and
GIF format, and can convert between these formats. You can get PictPixie
from ftp.apple.com, file dts/mac/quicktime/qt.1.0.stuff/pictpixie.hqx.
Requires QuickTime. PictPixie was intended as a developer's tool, and it's
really not the best choice unless you like to fool around with QuickTime.
Some of its drawbacks are that it requires lots of memory, it produces
relatively poor color image quality on anything less than a 24-bit display,
and it has a relatively unfriendly user interface. Worse, PictPixie is an
unsupported program, meaning it has some minor bugs that Apple does not
intend to fix. (There is an old version of PictPixie, called
PICTCompressor, floating around the net. If you have this you should trash
it, as it's even buggier. Also, the QuickTime Starter Kit includes a much
cleaned-up descendant of PictPixie called Picture Compressor. Note that
Picture Compressor is NOT free and may not be distributed on the net.)
Storm Technology's Picture Decompress is a free JPEG viewer/converter.
This rather old program is inferior to the above programs in many ways, but
it will run without System 7 or QuickTime, so you may be forced to use it on
older systems. (It does need 32-bit QuickDraw, so really old machines can't
use it.) You can get it from sumex-aim.stanford.edu, file
/info-mac/app/picture-decompress-201.hqx. You must set the file type of a
downloaded image file to 'JPEG' to allow Picture Decompress to open it.
If your machine is too old to run 32-bit QuickDraw (a Mac Plus for instance),
GIFConverter is your only choice for single-program JPEG viewing. If you
don't want to pay for GIFConverter, use JPEG Convert and a free GIF viewer.
More and more commercial Mac applications are supporting JPEG, although not
all can deal with the Usenet-standard JFIF format. Adobe Photoshop, version
2.0.1 or later, can read and write JFIF-format JPEG files (use the JPEG
plug-in from the Acquire menu). You must set the file type of a downloaded
JPEG file to 'JPEG' to allow Photoshop to recognize it.
Amiga:
(Most programs listed in this section are stored in the AmiNet archive at
amiga.physik.unizh.ch (130.60.80.80). There are many mirror sites of this
archive and you should try to use the closest one. In the USA, a good
choice is wuarchive.wustl.edu; look under /mirrors/amiga.physik.unizh.ch/...)
HamLab Plus is an excellent JPEG viewer/converter, as well as being a
general image manipulation tool. It's cheap (shareware, $20) and can read
several formats besides JPEG. The current version is 2.0.8. A demo version
is available from amiga.physik.unizh.ch (and mirror sites), file
amiga/gfx/edit/hamlab208d.lha. The demo version will crop images larger
than 512x512, but it is otherwise fully functional.
Rend24 (shareware, $30) is an image renderer that can display JPEG, ILBM,
and GIF images. The program can be used to create animations, even
capturing frames on-the-fly from rendering packages like Lightwave. The
current version is 1.05, available from amiga.physik.unizh.ch (and mirror
sites), file amiga/os30/gfx/rend105.lha. (Note: although this directory is
supposedly for AmigaDOS 3.0 programs, the program will also run under
AmigaDOS 1.3, 2.04 or 2.1.)
Viewtek is a free JPEG/ILBM/GIF/ANIM viewer. The current version is 1.04,
available from amiga.physik.unizh.ch (and mirror sites), file
amiga/gfx/show/ViewTek104.lha.
If you're willing to spend real money, there are several commercial packages
that support JPEG. Two are written by Thomas Krehbiel, the author of Rend24
and Viewtek. These are CineMorph, a standalone image morphing package, and
ImageFX, an impressive 24-bit image capture, conversion, editing, painting,
effects and prepress package that also includes CineMorph. Both are
distributed by Great Valley Products. Art Department Professional (ADPro),
from ASDG Inc, is the most widely used commercial image manipulation
software for Amigas. ImageMaster, from Black Belt Systems, is another
well-regarded commercial graphics package with JPEG support.
The free IJG JPEG software is available compiled for Amigas from
amiga.physik.unizh.ch (and mirror sites) in directory amiga/gfx/conv, file
AmigaJPEGV4.lha. These programs convert JPEG to/from PPM,GIF,Targa formats.
The Amiga world is heavily infested with quick-and-dirty JPEG programs, many
based on an ancient beta-test version of the free IJG JPEG software (thanks
to a certain magazine that published same on its disk-of-the-month, without
so much as notifying the authors). Among these are "AugJPEG", "NewAmyJPEG",
"VJPEG", and probably others I have not even heard of. In my opinion,
anything older than IJG version 3 (March 1992) is not worth the disk space
it's stored on; if you have such a program, trash it and get something newer.
Atari ST:
The free IJG JPEG software is available compiled for Atari ST, TT, etc,
from atari.archive.umich.edu, file /atari/Graphics/jpeg4bin.zoo.
These programs convert JPEG to/from PPM, GIF, Targa formats.
I have not heard of any free or shareware JPEG-capable viewer for Ataris,
but surely there must be one by now? Pointers appreciated.
Acorn Archimedes:
!ChangeFSI, supplied with RISC OS 3 version 3.10, can convert from and view
JPEG JFIF format. Provision is also made to convert images to JPEG,
although this must be done from the CLI rather than by double-clicking.
Recent versions (since 7.11) of the shareware program Translator can handle
JPEG, along with about 30 other image formats. While older versions can be
found on some Archimedes bboards, the current version is only available by
registering with the author, John Kortink, Nutterbrink 31, 7544 WJ, Enschede,
The Netherlands. Price 35 Dutch guilders (about $22 or 10 pounds).
There's also a commercial product called !JPEG which provides JPEG read/write
functionality and direct JPEG viewing, as well as a host of other image
format conversion and processing options. This is more expensive but not
necessarily better than the above programs. Contact: DT Software, FREEPOST,
Cambridge, UK. Tel: 0223 841099.
Portable software for almost any system:
If none of the above fits your situation, you can obtain and compile the free
JPEG conversion software described in 6B. You'll also need a viewer program.
If your display is 8 bits or less, any GIF viewer will do fine; if you have a
display with more color capability, try to find a viewer that can read Targa
or PPM 24-bit image files.
There are numerous commercial JPEG offerings, with more popping up every
day. I recommend that you not spend money on one of these unless you find
the available free or shareware software vastly too slow. In that case,
purchase a hardware-assisted product. Ask pointed questions about whether
the product complies with the final JPEG standard and about whether it can
handle the JFIF file format; many of the earliest commercial releases are
not and never will be compatible with anyone else's files.
[6B] If you are looking for source code to work with:
Free, portable C code for JPEG compression is available from the Independent
JPEG Group, which I lead. A package containing our source code,
documentation, and some small test files is available from several places.
The "official" archive site for this source code is ftp.uu.net (137.39.1.9
or 192.48.96.9). Look under directory /graphics/jpeg; the current release
is jpegsrc.v4.tar.Z. (This is a compressed TAR file; don't forget to
retrieve in binary mode.) You can retrieve this file by FTP or UUCP.
If you are on a PC and don't know how to cope with .tar.Z format, you may
prefer ZIP format, which you can find at Simtel20 and mirror sites (see NOTE
above), file msdos/graphics/jpegsrc4.zip. This file will also be available on
CompuServe, in the GRAPHSUPPORT forum (GO PICS), library 15, as jpsrc4.zip.
If you have no FTP access, you can retrieve the source from your nearest
comp.sources.misc archive; version 4 appeared as issues 55-72 of volume 34.
(If you don't know how to retrieve comp.sources.misc postings, see the FAQ
article "How to find sources", referred to at the top of section 6.)
The free JPEG code provides conversion between JPEG "JFIF" format and image
files in GIF, PBMPLUS PPM/PGM, Utah RLE, and Truevision Targa file formats.
The core compression and decompression modules can easily be reused in other
programs, such as image viewers. The package is highly portable; we have
tested it on many machines ranging from PCs to Crays.
We have released this software for both noncommercial and commercial use.
Companies are welcome to use it as the basis for JPEG-related products.
We do not ask a royalty, although we do ask for an acknowledgement in
product literature (see the README file in the distribution for details).
We hope to make this software industrial-quality --- although, as with
anything that's free, we offer no warranty and accept no liability.
The Independent JPEG Group is a volunteer organization; if you'd like to
contribute to improving our software, you are welcome to join.
[7] What's all this hoopla about color quantization?
Most people don't have full-color (24 bit per pixel) display hardware.
Typical display hardware stores 8 or fewer bits per pixel, so it can display
256 or fewer distinct colors at a time. To display a full-color image, the
computer must map the image into an appropriate set of representative
colors. This process is called "color quantization". (This is something
of a misnomer, "color selection" would be a better term. We're stuck with
the standard usage though.)
Clearly, color quantization is a lossy process. It turns out that for most
images, the details of the color quantization algorithm have MUCH more impact
on the final image quality than do any errors introduced by JPEG (except at
the very lowest JPEG quality settings).
Since JPEG is a full-color format, converting a color JPEG image for display
on 8-bit-or-less hardware requires color quantization. This is true for
*all* color JPEGs: even if you feed a 256-or-less-color GIF into JPEG, what
comes out of the decompressor is *not* 256 colors, but thousands of colors.
This happens because JPEG's lossiness affects each pixel a little
differently, so two pixels that started with identical colors will probably
come out with slightly different colors. Each original color gets "smeared"
into a group of nearby colors. Therefore quantization is always required to
display a color JPEG on a colormapped display, regardless of the image
source. The only way to avoid quantization is to ask for gray-scale output.
(Incidentally, because of this effect it's nearly meaningless to talk about
the number of colors used by a JPEG image. Even if you attempted to count
the number of distinct pixel values, different JPEG decoders would give you
different results because of roundoff error differences. I occasionally see
posted images described as "256-color JPEG". This tells me that the poster
(a) hasn't read this FAQ and (b) probably converted the JPEG from a GIF.
JPEGs can be classified as color or gray-scale (just like photographs), but
number of colors just isn't a useful concept for JPEG.)
On the other hand, a GIF image by definition has already been quantized to
256 or fewer colors. (A GIF *does* have a definite number of colors in its
palette, and the format doesn't allow more than 256 palette entries.)
For purposes of Usenet picture distribution, GIF has the advantage that the
sender precomputes the color quantization, so recipients don't have to.
This is also the *disadvantage* of GIF: you're stuck with the sender's
quantization. If the sender quantized to a different number of colors than
what you can display, you have to re-quantize, resulting in much poorer
image quality than if you had quantized once from a full-color image.
Furthermore, if the sender didn't use a high-quality color quantization
algorithm, you're out of luck.
For this reason, JPEG offers the promise of significantly better image quality
for all users whose machines don't match the sender's display hardware.
JPEG's full color image can be quantized to precisely match the user's display
hardware. Furthermore, you will be able to take advantage of future
improvements in quantization algorithms (there is a lot of active research in
this area), or purchase better display hardware, to get a better view of JPEG
images you already have. With a GIF, you're stuck forevermore with what was
sent.
It's also worth mentioning that many GIF-viewing programs include rather
shoddy quantization routines. If you view a 256-color GIF on a 16-color EGA
display, for example, you are probably getting a much worse image than you
need to. This is partly an inevitable consequence of doing two color
quantizations (one to create the GIF, one to display it), but often it's
also due to sloppiness. JPEG conversion programs will be forced to use
high quality quantizers in order to get acceptable results at all, and in
normal use they will quantize directly to the number of colors to be
displayed. Thus, JPEG is likely to provide better results than the average
GIF program for low-color-resolution displays as well as high-resolution ones!
Finally, an ever-growing number of people have better-than-8-bit display
hardware already: 15-bit "hi-color" PC displays, true 24-bit displays on
workstations and Macintoshes, etc. For these people, GIF is already
obsolete, as it cannot represent an image to the full capabilities of their
display. JPEG images can drive these displays much more effectively.
Thus, JPEG is an all-around better choice than GIF for representing images
in a machine-independent fashion.
[8] How does JPEG work?
The buzz-words to know are chrominance subsampling, discrete cosine
transforms, coefficient quantization, and Huffman or arithmetic entropy
coding. This article's long enough already, so I'm not going to say more
than that here. For technical information, see the comp.compression FAQ.
This is available from the news.answers archive at rtfm.mit.edu, in files
/pub/usenet/news.answers/compression-faq/part[1-3]. If you need help in
using the news.answers archive, see the top of this article.
[9] What about lossless JPEG?
There's a great deal of confusion on this subject. The JPEG committee did
define a truly lossless compression algorithm, i.e., one that guarantees the
final output is bit-for-bit identical to the original input. However, this
lossless mode has almost nothing in common with the regular, lossy JPEG
algorithm, and it offers much less compression. At present, very few
implementations of lossless JPEG exist, and all of them are commercial.
Saying "-Q 100" to the free JPEG software DOES NOT get you a lossless image.
What it does get rid of is deliberate information loss in the coefficient
quantization step. There is still a good deal of information loss in the
color subsampling step. (With the V4 free JPEG code, you can also say
"-sample 1x1" to turn off subsampling. Keep in mind that many commercial
JPEG implementations cannot cope with the resulting file.)
Even with both quantization and subsampling turned off, the regular JPEG
algorithm is not lossless, because it is subject to roundoff errors in
various calculations. The maximum error is a few counts in any one pixel
value; it's highly unlikely that this could be perceived by the human eye,
but it might be a concern if you are doing machine processing of an image.
At this minimum-loss setting, regular JPEG produces files that are perhaps
half the size of an uncompressed 24-bit-per-pixel image. True lossless JPEG
provides roughly the same amount of compression, but it guarantees
bit-for-bit accuracy.
If you have an application requiring lossless storage of images with less
than 6 bits per pixel (per color component), you may want to look into the
JBIG bilevel image compression standard. This performs better than JPEG
lossless on such images. JPEG lossless is superior to JBIG on images with
6 or more bits per pixel; furthermore, JPEG is public domain (at least with a
Huffman back end), while the JBIG techniques are heavily covered by patents.
[10] Why all the argument about file formats?
Strictly speaking, JPEG refers only to a family of compression algorithms;
it does *not* refer to a specific image file format. The JPEG committee was
prevented from defining a file format by turf wars within the international
standards organizations.
Since we can't actually exchange images with anyone else unless we agree on
a common file format, this leaves us with a problem. In the absence of
official standards, a number of JPEG program writers have just gone off to
"do their own thing", and as a result their programs aren't compatible with
anybody else's.
The closest thing we have to a de-facto standard JPEG format is some work
that's been coordinated by people at C-Cube Microsystems. They have defined
two JPEG-based file formats:
* JFIF (JPEG File Interchange Format), a "low-end" format that transports
pixels and not much else.
* TIFF/JPEG, aka TIFF 6.0, an extension of the Aldus TIFF format. TIFF is
a "high-end" format that will let you record just about everything you
ever wanted to know about an image, and a lot more besides :-). TIFF is
a lot more complex than JFIF, and may well prove less transportable,
because different vendors have historically implemented slightly different
and incompatible subsets of TIFF. It's not likely that adding JPEG to the
mix will do anything to improve this situation.
Both of these formats were developed with input from all the major vendors
of JPEG-related products; it's reasonably likely that future commercial
products will adhere to one or both standards.
I believe that Usenet should adopt JFIF as the replacement for GIF in
picture postings. JFIF is simpler than TIFF and is available now; the
TIFF 6.0 spec has only recently been officially adopted, and it is still
unusably vague on some crucial details. Even when TIFF/JPEG is well
defined, the JFIF format is likely to be a widely supported "lowest common
denominator"; TIFF/JPEG files may never be as transportable.
A particular case that people may be interested in is Apple's QuickTime
software for the Macintosh. QuickTime uses a JFIF-compatible format wrapped
inside the Mac-specific PICT structure. Conversion between JFIF and
QuickTime JPEG is pretty straightforward, and several Mac programs are
available to do it (see Mac portion of section 6A). If you have an editor
that handles binary files, you can strip a QuickTime JPEG PICT down to JFIF
by hand; see section 11 for details.
Another particular case is Handmade Software's programs (GIF2JPG/JPG2GIF and
Image Alchemy). These programs are capable of reading and writing JFIF
format. By default, though, they write a proprietary format developed by
HSI. This format is NOT readable by any non-HSI programs and should not be
used for Usenet postings. Use the -j switch to get JFIF output. (This
applies to old versions of these programs; the current releases emit JFIF
format by default. You still should be careful not to post HSI-format
files, unless you want to get flamed by people on non-PC platforms.)
[11] How do I recognize which file format I have, and what do I do about it?
If you have an alleged JPEG file that your software won't read, it's likely
to be HSI format or some other proprietary JPEG-based format. You can tell
what you have by inspecting the first few bytes of the file:
1. A JFIF-standard file will start with the characters (hex) FF D8 FF E0,
followed by two variable bytes (often hex 00 10), followed by 'JFIF'.
2. If you see FF D8 at the start, but not the rest of it, you may have a
"raw JPEG" file. This is probably decodable as-is by JFIF software ---
it's worth a try, anyway.
3. HSI files start with 'hsi1'. You're out of luck unless you have HSI
software. Portions of the file may look like plain JPEG data, but they
won't decompress properly with non-HSI programs.
4. A Macintosh PICT file, if JPEG-compressed, will have a couple hundred
bytes of header followed by a JFIF header (scan for 'JFIF'). Strip off
everything before the FF D8 and you should be able to read it.
5. Anything else: it's a proprietary format, or not JPEG at all. If you are
lucky, the file may consist of a header and a raw JPEG data stream.
If you can identify the start of the JPEG data stream (look for FF D8),
try stripping off everything before that.
In uuencoded Usenet postings, the characteristic JFIF pattern is
"begin" line
M_]C_X ...
whereas uuencoded HSI files will start with
"begin" line
M:'-I ...
If you learn to check for the former, you can save yourself the trouble of
downloading non-JFIF files.
[12] What about arithmetic coding?
The JPEG spec defines two different "back end" modules for the final output
of compressed data: either Huffman coding or arithmetic coding is allowed.
The choice has no impact on image quality, but arithmetic coding usually
produces a smaller compressed file. On typical images, arithmetic coding
produces a file 5 or 10 percent smaller than Huffman coding. (All the
file-size numbers previously cited are for Huffman coding.)
Unfortunately, the particular variant of arithmetic coding specified by the
JPEG standard is subject to patents owned by IBM, AT&T, and Mitsubishi.
Thus *you cannot legally use arithmetic coding* unless you obtain licenses
from these companies. (The "fair use" doctrine allows people to implement
and test the algorithm, but actually storing any images with it is dubious
at best.)
At least in the short run, I recommend that people not worry about
arithmetic coding; the space savings isn't great enough to justify the
potential legal hassles. In particular, arithmetic coding *should not*
be used for any images to be exchanged on Usenet.
There is some small chance that the legal situation may change in the
future. Stay tuned for further details.
[13] Does loss accumulate with repeated compression/decompression?
It would be nice if, having compressed an image with JPEG, you could
decompress it, manipulate it (crop off a border, say), and recompress it
without any further image degradation beyond what you lost initially.
Unfortunately THIS IS NOT THE CASE. In general, recompressing an altered
image loses more information, though usually not as much as was lost the
first time around.
The next best thing would be that if you decompress an image and recompress
it *without changing it* then there is no further loss, i.e., you get an
identical JPEG file. Even this is not true; at least, not with the current
free JPEG software. It's essentially a problem of accumulation of roundoff
error. If you repeatedly compress and decompress, the image will eventually
degrade to where you can see visible changes from the first-generation
output. (It usually takes many such cycles to get visible change.)
One of the things on our to-do list is to see if accumulation of error can
be avoided or limited, but I am not optimistic about it.
In any case, the most that could possibly be guaranteed would be that
compressing the unmodified full-color output of djpeg, at the original
quality setting, would introduce no further loss. Even such simple changes
as cropping off a border could cause further roundoff-error degradation.
(If you're wondering why, it's because the pixel-block boundaries move.
If you cropped off only multiples of 16 pixels, you might be safe, but
that's a mighty limited capability!)
The bottom line is that JPEG is a useful format for archival storage and
transmission of images, but you don't want to use it as an intermediate
format for sequences of image manipulation steps. Use a lossless format
(PPM, RLE, TIFF, etc) while working on the image, then JPEG it when you are
ready to file it away. Aside from avoiding degradation, you will save a lot
of compression/decompression time this way :-).
[14] What are some rules of thumb for converting GIF images to JPEG?
As stated earlier, you *will* lose some amount of image information if you
convert an existing GIF image to JPEG. If you can obtain the original
full-color data the GIF was made from, it's far better to make a JPEG from
that. But if you need to save space and have only the GIF to work from,
here are some suggestions for getting maximum space savings with minimum
loss of quality.
The first rule when converting a GIF library is to look at each JPEG, to
make sure you are happy with it, before throwing away the corresponding GIF;
that will give you a chance to re-do the conversion with a higher quality
setting if necessary. Some GIFs may be better left as GIFs, as explained in
section 3; in particular, cartoon-type GIFs with sixteen or fewer colors
don't convert well. You may find that a JPEG file of reasonable quality
will be *larger* than the GIF. (So check the sizes too.)
Experience to date suggests that large, high-visual-quality GIFs are the best
candidates for conversion to JPEG. They chew up the most storage so offer
the most potential savings, and they convert to JPEG with least degradation.
Don't waste your time converting any GIF much under 100 Kbytes. Also, don't
expect JPEG files converted from GIFs to be as small as those created
directly from full-color originals. To maintain image quality you may have
to let the converted files be as much as twice as big as straight-through
JPEG files would be (i.e., shoot for 1/2 or 1/3rd the size of the GIF file,
not 1/4th as suggested in earlier comparisons).
Many people have developed an odd habit of putting a large constant-color
border around a GIF image. While useless, this was nearly free in terms of
storage cost in GIF files. It is NOT free in JPEG files, and the sharp
border boundary can create visible artifacts ("ghost" edges). Do yourself
a favor and crop off any border before JPEGing. (If you are on an X Windows
system, XV's manual and automatic cropping functions are a very painless
way to do this.)
cjpeg's default Q setting of 75 is appropriate for full-color input, but
for GIF inputs, Q settings of 85 to 95 often seem to be necessary to avoid
image degradation. (If you apply smoothing as suggested below, the higher
Q setting may not be necessary.)
Color GIFs of photographs or complex artwork are usually "dithered" to fool
your eye into seeing more than the 256 colors that GIF can actually store.
If you enlarge the image, you will see that adjacent pixels are often of
significantly different colors; at normal size the eye averages these pixels
together to produce the illusion of an intermediate color value. The
trouble with dithering is that, to JPEG, it looks like high-spatial-frequency
color noise; and JPEG can't compress noise very well. The resulting JPEG
file is both larger and of lower image quality than what you would have
gotten from JPEGing the original full color image (if you had it).
To get around this, you want to "smooth" the GIF image before compression.
Smoothing averages together nearby pixels, thus approximating the color that
you thought you saw anyway, and in the process getting rid of the rapid
color changes that give JPEG trouble. Appropriate use of smoothing will
often let you avoid using a high Q factor, thus further reducing the size of
the compressed file, while still obtaining a better-looking output image
than you'd get without smoothing.
With the V4 free JPEG software (or products based on it), a simple smoothing
capability is built in. Try "-smooth 10" or so when converting GIFs.
Values of 10 to 25 seem to work well for high-quality GIFs. Heavy-handed
dithering may require larger smoothing factors. (If you can see regular
fine-scale patterns on the GIF image even without enlargement, then strong
smoothing is definitely called for.) Too large a smoothing factor will blur
the output image, which you don't want. If you are an image processing
wizard, you can also do smoothing with a separate filtering program, such as
pnmconvol from the PBMPLUS package. However, cjpeg's built-in smoother is
a LOT faster than pnmconvol...
The upshot of all this is that "cjpeg -quality 85 -smooth 10" is probably a
good starting point for converting GIFs. But if you really care about the
image, you'll want to check the results and maybe try a few other settings.
---------------------
For more information about JPEG in general or the free JPEG software in
particular, contact the Independent JPEG Group at jpeg-info@uunet.uu.net.
--
tom lane
organizer, Independent JPEG Group
Internet: tgl@cs.cmu.edu BITNET: tgl%cs.cmu.edu@carnegie
|
6988 | From: smb@research.att.com (Steven Bellovin)
Subject: Re: The Old Key Registration Idea...
Organization: AT&T Bell Laboratories
Lines: 19
In article <rlglendeC5LrwC.95C@netcom.com>, rlglende@netcom.com (Robert Lewis Glendenning) writes:
> I have been chided for stating that Dorthy Denning was intellectually
> dishonest in the ACM debate and in this newsgroup. I have previously
> refrained from suggesting that she is arguing on behalf of consulting
> clients.
>
> Now, I say that it is clear that Dorthy Denning has been functioning
> as a lobbyist, not a computer scientist. She has used legal ethics
> (truth is what you can convince anyone of), not scientific ethics
> (truth is understanding the external world).
>
> Maybe we can revoke her ACM membership? 8)
I suggest that you refrain from such insults unless and until you can
produce some evidence to back up that claim. Given the measures proposed
or passed in the last year or so, such as S.266 and the scanner ban,
her proposal need not be any more than her own attempt at a technical
solution. It's entirely possible, in fact, that it was the notion of
splitting the key, which came up in the debate, that softened this proposal.
|
6989 | From: ntaib@silver.ucs.indiana.edu (Iskandar Taib)
Subject: Re: Hercules Graphite?
Nntp-Posting-Host: silver.ucs.indiana.edu
Organization: Indiana University
Lines: 20
In article <1993Apr06.185638.12139@metrics.com> tomh@metrics.com (Tom Haapanen) writes:
>Has anyone used a Hercules Graphite adapter? It looks good on paper, and
>Steve Gibson gave it a very good review in Infoworld. I'd love to get a
>real-world impression, though -- how is the speed? Drivers? Support?
The PC World reviewers found out that the Herc people had hard-coded
Winbench text into the driver. Clever, no? In any case, the Winbench
results are pretty much inflated.
When and if you get one send me mail.. I might buy that ATI GU+ off
you.. 9-)
--
-------------------------------------------------------------------------------
Iskandar Taib | The only thing worse than Peach ala
Internet: NTAIB@SILVER.UCS.INDIANA.EDU | Frog is Frog ala Peach
Bitnet: NTAIB@IUBACS !
|
6990 | From: dick@ahold.nl (Dick Heijne)
Subject: Re: xterm build problem in Solaris2.1
Organization: Ahold NV, Zaandam, Netherlands, EEC
Lines: 24
dla@se05.wg2.waii.com (Doug Acker) writes:
: ..continuing on my build problems, I got stuck here build xterm...
:
: gcc -fpcc-struct-return -o xterm main.o input.o charproc.o cursor.o util.o tabs.o screen.o scrollbar.o button.o Tekproc.o misc.o VTPrsTbl.o TekPrsTbl.o data.o menu.o -O2 -R/usr/wgep/X11R5.sos5/lib${LD_RUN_PATH+\:$LD_RUN_PATH} -L../.././lib/Xaw -lXaw -L../.././lib/Xmu -lXmu -L../.././lib/Xt -lXt -L../.././extensions/lib -lXext -L../.././lib/X -lX11 -L/usr/wgep/X11R5.sos5/lib -lsocket -lnsl -ltermcap
: Undefined first referenced
: symbol in file
: index /usr/ucblib/libtermcap.a(termcap.o)
: rindex /usr/ucblib/libtermcap.a(termcap.o)
: ld: fatal: Symbol referencing errors. No output written to xterm
: *** Error code 1
: make: Fatal error: Command failed for target `xterm'
:
: Any clues for help?
Either:
* Add -lucb -lelf to the list
or
* #define index() and rindex() to strchr() and strrchr() respectively.
Both use same args. Former are bsd, latter are SysV.
--
+==============================Ahold NV===============================+
| Room 146 , Ankersmidplein 2, 1506 CK Zaandam, The Netherlands, EEC |
| Dick.Heijne@ccsds.ahold.nl - Tel: +31 75 592151, Fax: +31 75 313030 |
+=====================================================================+
|
6991 | From: sera@zuma.UUCP (Serdar Argic)
Subject: And Azeri survivors were killed by a shot to the back of the head.
Reply-To: sera@zuma.UUCP (Serdar Argic)
Distribution: world
Lines: 24
12/12 Armenian Atrocities
MOSCOW (AP) -- Azerbaijani forces on Saturday retook
three villages seized by Armenians and discovered 16 bodies
of executed civilians, Azerbaijani reports said.
The Azerbaijani fighters found 16 bodies of civilians,
including those of a child and two elderly women who were
shot point-blank, "and survivors were killed by a shot to
the back of the head," said a ministry statement, carried by
the Azerbaijani Azerinform and Turan news agencies and the
ITAR-Tass news service.
"Everywhere Armenian occupants were, they left tens of
corpses of civilians shot to death point-blank and
mutilated," the...
Serdar Argic
'We closed the roads and mountain passes that
might serve as ways of escape for the Turks
and then proceeded in the work of extermination.'
(Ohanus Appressian - 1919)
'In Soviet Armenia today there no longer exists
a single Turkish soul.' (Sahak Melkonian - 1920)
|
6992 | Subject: Re: If You Feed Armenians Dirt -- You Will Bite Dust!
From: senel@vuse.vanderbilt.edu (Hakan)
Organization: Vanderbilt University
Summary: Armenians correcting the geo-political record.
Nntp-Posting-Host: snarl02
Lines: 18
In article <1993Apr5.194120.7010@urartu.sdpa.org> dbd@urartu.sdpa.org (David Davidian) writes:
>In article <1993Apr5.064028.24746@kth.se> hilmi-er@dsv.su.se (Hilmi Eren)
>writes:
>David Davidian says: Armenians have nothing to lose! They lack food, fuel, and
>warmth. If you fascists in Turkey want to show your teeth, good for you! Turkey
>has everything to lose! You can yell and scream like barking dogs along the
Davidian, who are fascists? Armenians in Azerbaijan are killing Azeri
people, invading Azeri soil and they are not fascists, because they
lack food ha? Strange explanation. There is no excuse for this situation.
Herkesi fasist diye damgala sonra, kendileri fasistligin alasini yapinca,
"ac kaldilar da, yiyecekleri yok amcasi, bu seferlik affedin" de. Yurrruuu,
yuru de plaka numarani alalim......
Hakan
|
6993 | From: richk@grebyn.com (Richard Krehbiel)
Subject: Re: WP-PCF, Linux, RISC?
In-Reply-To: ghhwang@csie.nctu.edu.tw's message of Sun, 18 Apr 1993 06:28:02 GMT
Lines: 22
Organization: Grebyn Timesharing, Inc.
In article <C5o1yq.M34@csie.nctu.edu.tw> ghhwang@csie.nctu.edu.tw (ghhwang) writes:
> Dear friend,
> The RISC means "reduced instruction set computer". The RISC usually has
> small instruction set so as to reduce the circuit complex and can increase
> the clock rate to have a high performance. You can read some books about
> computer architecture for more information about RISC.
RISC used to mean "Reduced Instruction Set Computer", true. They
still use the same acronym, but only to be familiar. What RISC really
means is a recently-designed CPU. :-)
In general, most RISC CPUs are like this:
A large number (32 or more) of general-purpose registers
A fixed instruction size, usually 32 bits
An instruction may make only one memory reference
Memory references must be aligned
There are delayed branches (branch after the next instruction) or
a target prediction bit (probably will/won't branch)
Instructions may complete out of order relative to the instruction
stream
--
Richard Krehbiel richk@grebyn.com
OS/2 2.0 will do for me until AmigaDOS for the 386 comes along...
|
6994 | From: jgarven@mcl.cc.utexas.edu
Subject: Re: Trumpet for Windows & other news readers
Lines: 34
In article <ashok.653.0@biochemistry.cwru.edu> ashok@biochemistry.cwru.edu (Ashok Aiyar) writes:
>In article <1993Apr21.082430@liris.tew.kuleuven.ac.be> wimvh@liris.tew.kuleuven.ac.be (Wim Van Holder) writes:
>
>>What the status of Trumpet for Windows? Will it use the Windows sockets ?
>>I liked it in DOS but had to abandon it since I started using NDIS to access
>>our token ring (results in invalid class error :(
>
>While I do not speak for Peter Tattam, I am fairly sure he is planning a
>Winsock compliant version. While this will definitely not make the initial
>public release of WinTrumpet, it will follow on shortly thereafter.
>
>Currently WinTrumpet is in very late beta. It looks like an excellent
>product, with several features beyond the DOS version.
>
>WinTrumpet supports the Trumpet TCP, Novell LWP, and there is also a direct to
>packet driver version that some people are using with the dis_pkt shim.
>
>Ashok
Ashok,
Is WinTrumpet available anywhere via anonymous ftp?
*=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=*
| James R. Garven |
| ---------------------------------------------------------------------- |
| Dept. of Finance, CBA 3.250 Voice: (512) 471-6557 |
| Graduate School of Business Fax: (512) 471-5073 |
| University of Texas Internet: jgarven@mcl.cc.utexas.edu |
| Austin, TX 78712, U.S.A. BITNET: Garven@UTXVM.BITNET |
| ---------------------------------------------------------------------- |
| "Education is ... hanging on until you've caught on" - Robert Frost |
*=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=*
|
6995 | From: avi@duteinh.et.tudelft.nl (Avi Cohen Stuart)
Subject: Re: was: Go Hezbollah!!
Originator: avi@duteinh.et.tudelft.nl
Nntp-Posting-Host: duteinh.et.tudelft.nl
Organization: Delft University of Technology, Dept. of Electrical Engineering
Lines: 35
From article <1993Apr15.031349.21824@src.honeywell.com>, by amehdi@src.honeywell.com (Hossien Amehdi):
> In article <C5HuBA.CJo@news.cso.uiuc.edu> eshneken@ux4.cso.uiuc.edu (Edward A Shnekendorf) writes:
>>amehdi@src.honeywell.com (Hossien Amehdi) writes:
>>
>>>You know when Israelis F16 (thanks to General Dynamics) fly high in the sky
>>>and bomb the hell out of some village in Lebanon, where civilians including
>>>babies and eldery getting killed, is that plain murder or what?
>>
>>If you Arabs wouldn't position guerilla bases in refugee camps, artillery
>>batteries atop apartment buildings, and munitions dumps in hospitals, maybe
>>civilians wouldn't get killed. Kinda like Saddam Hussein putting civilians
>>in a military bunker.
>>
>>Ed.
>
> Who is the you Arabs here. Since you are replying to my article you
> are assuming that I am an Arab. Well, I'm not an Arab, but I think you
> are brain is full of shit if you really believe what you said. The
> bombardment of civilian and none civilian areas in Lebanon by Israel is
> very consistent with its policy of intimidation. That is the only
> policy that has been practiced by the so called only democracy in
> the middle east!
>
> I was merley pointing out that the other side is also suffering.
> Like I said, I'm not an Arab but if I was, say a Lebanese, you bet
> I would defende my homeland against any invader by any means.
Tell me then, would you also fight the Syrians in Lebanon?
Oh, no of course not. They would be your brothers and you would
tell that you invited them.
Avi.
|
6996 | From: shz@mare.att.com (Keeper of the 'Tude)
Subject: Re: Riceburner Respect
Organization: Office of 'Tude Licensing
Nntp-Posting-Host: binky
Lines: 14
In article <1993Apr14.190210.8996@megatek.com>, randy@megatek.com (Randy Davis) writes:
> |The rider (pilot?)
>
> I'm happy I've had such an effect on your choice of words, Seth.. :-)
:-)
T'was a time when I could get a respectable response with a posting like that.
Randy's post doesn't count 'cause he saw the dearth of responses and didn't
want me to feel ignored (thanks Randy!).
I was curious about this DoD thing. How do I get a number? (:-{)}
- Roid
|
6997 | From: Harv@cup.portal.com (Harv R Laser)
Subject: Re: Dumbest automotive concepts of all time
Organization: The Portal System (TM)
<93Apr15.165432.44598@acs.ucalgary.ca> <C5JnK3.JKt@news.cso.uiuc.edu>
<1993Apr15.223029.23340@cactus.org>
Lines: 25
>
>No. reverse lights are to warn others that you are backing up. They
>aren't bright enough to (typically) see by without the brake and tail
>lights.
>
>
>Craig
Perhaps instead of this silly argument about what backup lights
are for, couldn't we agree that they serve the dual purpose of
letting people behind your car know that you have it in reverse
and that they can also light up the area behind your car while
you're backing up so you can see?
Backup lamps on current models are much brighter than they used
to be on older cars. Those on my Taurus Wagon are quite bright
enough to illuminate a good area behind the car, and they're
MUCH brighter than those on my earlier cars from the 60s and 70s.
Insofar as Vettes having side backup lights, look at a '92 or '93
model (or perhaps a year or two earlier too) and you'll see
red side marker lamps and white side marker lamps both near the
car's hindquarters. Those aren't just white reflectors.
Harv
|
6998 | From: bradley@grip.cis.upenn.edu (John Bradley)
Subject: XV 3.00 has escaped!
Organization: GRASP Lab, University of Pennsylvania
Lines: 13
Nntp-Posting-Host: grip.cis.upenn.edu
No, not another false alarm, not a "It'll certainly be done by *next* week"
message... No, this is the real thing. I repeat, this is *not* a drill!
Batten down the hatches, hide the women, and lock up the cows, XV 3.00 has
finally escaped. I was cleaning its cage this morning when it overpowered
me, broke down the office door, and fled the lab. It was last seen heading
in the general direction of export.lcs.mit.edu at nearly 30k per second...
If found, it answers to the name of 'contrib/xv-3.00.tar.Z'.
Have a blast. I'm off to the vacation capital of the U.S.: Waco, Texas.
--jhb
|
6999 | From: jkjec@westminster.ac.uk (Shazad Barlas)
Subject: Re: Dumbest automotive concepts of all time
Organization: University of Westminster
Distribution: usa
Lines: 8
Dumbest options? Well here in the UK, BMW offer a 'no-smokers' option...
It just means they take the fag lighter out.... big deal....
BTW - I just bought a Honda CRX F1..... its neat... did consider an MR2 targa,
MX5 (you guys call it Miata?).... but that CRX just one my heart with that
body kit and 8-spokes....
ps: is Richard out there somewhere?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.