From steve at advocate.net Thu Feb 1 21:31:10 2001 From: steve at advocate.net (Steve) Date: Thu, 1 Feb 2001 21:31:10 -0800 Subject: SCN: Privacy Message-ID: <3A79D59E.20647.9BB57DF@localhost> x-no-archive: yes ======================== Finding the Right Literary Metaphor for Net Privacy (Carl S. Kaplan, NY Times)---It's customary these days for many legal thinkers, journalists and just plain civilians to use the phrase "Big Brother" when bemoaning the loss of privacy created by the rise of computerized databases which track an individual's every move in cyberspace. The slogan is great to toss around at conferences and parties. But people who take books and ideas seriously might well ask: is Big Brother -- the personification of an all-seeing totalitarian government depicted in George Orwell's novel "1984" -- the best metaphor to describe the privacy problems of the Internet Age? According to Daniel J. Solove, an assistant professor at Seton Hall Law School in New Jersey who teaches a course in privacy, the answer is no. In a 70-page article that Solove said he hopes to publish in a major law review in the fall, and which is available as a working draft on the Internet, Solove set his sights upon an alternative nightmare. He wrote that Franz Kafka's harrowing tale "The Trial" better explains the texture and feel of the privacy problems of today. The battle of the metaphors is much more than a literary parlor game, said Solove in his article, "Privacy and Power: Computer Databases and Metaphors for Information Privacy." The way a problem is framed determines its solution, he suggested. And if lawmakers are to come up with adequate responses to the lack of privacy online, they need to fully understand the nature of the beast. In short, if they read books, they should read more Kafka and less Orwell. In his article, which is an entertaining hybrid of legal scholarship and literary discussion, Solove recalled that Orwell's novel depicts an oppressive government that regulates every aspect of existence - - even one's private thoughts. In every corner of Orwell's imaginary world are posters of a giant face with the caption: "Big Brother is Watching You." The goal of the state is dreary conformity. The means used are techniques of surveillance that result in self- censorship. Uniformed men patrol street corners, helicopters peer in houses and the "telescreen" installed in every home -- watches people as they watch it. For Solove, Big Brother is an apt metaphor to describe the effects of surveillance and the invasion of a person's secret or private world. But that doesn't get at the heart of the computer database threat, he said. "Understanding the problem as surveillance fails to account for the majority of our activities in the world and web," he wrote. "A large portion of our personal information involves facts that we are not embarrassed about: our financial information, race, marital status, hobbies, occupation and the like. Most people surf the web without wandering into its dark corners. The vast majority of information collected about us concerns relatively innocuous details. The surveillance model does not explain why the recording of this non- taboo information poses a problem." Recognizing that privacy in the digital realm can be invaded even if no secrets are revealed and even if nobody is watching us, Solove argued that the better guide to modern life in cyberspace is Kafka. In "The Trial," as every english major knows, Joseph K. awakens one morning to find a group of officials in his apartment. They inform him that he is under arrest. Instead of taking him to a police precinct, however, they unaccountably depart. The rest of the novel is a kind of absurd odyssey. Joseph K. tries to find out why he has been arrested, without success. He tries to learn about a vast Court that has apparently assembled a detailed dossier on him. But the Court is secret. At the end of the tale he is seized by two officials in the night and executed. The hallmarks of "The Trial" are impotence, anger and anxiety -- a character's sense that an unseen bureaucracy has information about him and that he has no control over the use of that information. That's pretty close to the average person's nagging sense of loss of privacy at the hands of some computerized databases, argued Solove. "We are not heading toward a world of Big Brother or one composed of Little Brothers -- but toward a more mindless process -- of bureaucratic indifference, arbitrary errors, and dehumanization -- a world that is beginning to resemble Kafka's vision in "The Trial." Solove wrote in his article. Jack Balkin, a law professor and Internet law expert at Yale Law School who is familiar with Solove's essay, applauded the author's attempt to "do a different take" on the issue of privacy. "With Orwell you have a brooding, evil guy trying to squeeze you," Balkin said. "Kafka's idea is that you are trapped in a maze." Balkin also noted that Solove's work is far from academic. The right metaphor is a necessary ingredient to good legislation, he said. "A striking example, the personalization of a problem, an easy-to- understand slogan, these are all important at the level of politics in getting people to understand what is at stake in a issue," he said. In a telephone interview, Solove, 28, who began his teaching career this year following his graduation from Yale Law School and some stints as a judicial clerk, said he wrote the article to bridge his interests in literature, internet law and the nature of bureaucracy. He said that a lot of discussions about privacy boil down to a view of the type of world we want to live in -- its feel and atmosphere. Literature is particularly good at capturing life in different types of societies, he said. And the literary metaphors we choose to employ in debates "effect the way we see a problem and the way we solve a problem," he said. The implications of adopting the Kafka view of privacy woes are signficant, added Solove. Anti-surveillance laws that are overly concerned with preventing the disclosure of confidential information remain important but miss the point when it comes to cyberspace, he said. Instead of pursuing more similar legislation, state and federal legislatures should seek to create laws that regulate what public and private information may be collected and processed by private or governmental databases, how the information must be secured and how its successive transfer to other databases should be limited. These types of regulations, which are not in great evidence at present, would go a long way toward easing the average person's dreadful sense that he has little or no control over his personal information, said Solove. Copyright 2001 The New York Times Company * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From GreatList at excite.com Fri Feb 2 05:29:12 2001 From: GreatList at excite.com (GreatList at excite.com) Date: Fri, 2 Feb 2001 05:29:12 -0800 (PST) Subject: SCN: Hi, Hust for you Bonus for opening this email!! Message-ID: <200102021329.FAA03373@scn.org> An HTML attachment was scrubbed... URL: From steve at advocate.net Mon Feb 5 14:10:01 2001 From: steve at advocate.net (Steve) Date: Mon, 5 Feb 2001 14:10:01 -0800 Subject: SCN: Stupidity Message-ID: <3A7EB439.28455.14FDDDF@localhost> x-no-archive: yes ======================== (Jakob Nielsen's Alertbox)---Usability opponents often complain that we user advocates are overly focused on stupid people. They commonly claim that: ...We select stupid users for usability studies; our findings do not apply to smarter users. ...Our recommendation to make simplicity a major design goal stems from our misguided view that all users are stupid. In reality, they claim, many users are capable of navigating complex sites. ...Some people are so stupid that technology is beyond their grasp; making websites easy enough for everyone to navigate is an unrealistic goal. I'll now address each of these claims, and then examine how attitudes about usability and user intelligence will impact business as the Internet population grows. Typically, when project managers observe their design undergoing a usability test, their initial reaction is: Where did you find such stupid users? This is exactly what happened recently when I released a WAP usability study. The study concluded that using WAP (to access the Internet through mobile phones) is too difficult for most purposes. In response, a group of big WAP investors rejected the findings, issuing a press release that claimed that the study's outcome would have been different if we had tested experienced WAP users. Although this might be true, their response misses the point. First, it ignores the fact that users' initial experience with a new technology is crucial. People will never become experienced users unless they are capable of learning the technology in the first place. Second, our study's participants used WAP phones for a week, and we tested them both at the beginning and the end of the period. If a full week of use is insufficient to learn a user interface, we are surely not talking about a mainstream consumer technology. Usability lessons are not always easy to take. It is a painful experience to sit in the back room watching as a user clicks every button on the screen except the one button that "obviously" leads to the answer. The first time project members observe a usability study, they almost always lapse into denial about the true lessons of the experience. Until we bring in the second user. He or she typically has many of the same problems as the first user. Then the third user comes in, and again: many of the same problems. At this point, designers often start to soften to the users' plight. If not, the fourth or fifth user will do the trick. When people have problems using a design, it's not because they are stupid. It's because the design is too difficult. Enthusiasts sometimes defend bleeding-edge technology and complex designs with the claim that users actually like sophisticated websites. Users, they assert, are smart enough to handle complicated design. These enthusiasts labor under a miscomprehension about the Web's fundamental nature. It is not a question of whether users are capable of overcoming complexity and learning an advanced user interface. It is a question of whether they are willing to do so. I have conducted many usability studies with users who had immense computer experience, great aptitude for technology, and high levels of IQ and education. These users are just like anybody else: they just want to get their work done. They have neither the desire nor the time to learn the idiosyncrasies of individual websites. If you have doubts, run a test with network system administrators or international investment analysts, for example. What you'll discover is that they face plenty of complicated problems in their own work and they don't want to devote brain cells to your website or its design. They want to get in, get out, and move on with their own tasks. Design complexity is a barrier for users. While they certainly might be capable of jumping the barrier, why should they? The Web is about freedom of movement. Anything that stands in the way of immediate task completion will negatively impact the user's experience. Some people are smarter than others. Most readers of this column probably belong to the top 10% of the population in terms of intelligence. From such a vantage point, it is easy to think of other people as being stupid. But perhaps it is more fair and more accurate (not to mention more productive) to assume that the other 90% of the population form the mainstream audience. Not that they are stupid. Nonetheless, it might be true that some people do not have enough intelligence to use sophisticated and advanced high-tech systems. But are they online? Not likely at this point. Even in the most wired societies like the United States and Scandinavia, only half the population is currently using the Internet. It continues to be quite an elitist medium. Thus, almost by definition at this point, anyone who is now using the Web is probably a fairly smart person. Given this, it makes no sense to blame users' difficulty with a site or design on stupidity. When current Web users have problems, it's because the design is too difficult. As the Internet keeps growing, it will reach ever-broader segments of the population. Five years from now we might in fact have people online who could be indelicately described as stupid. Whether or not such people should be included or excluded from the Web is a political and social question: What percentage of the population can we exclude from the new economy? >From my perspective, the answer is "very few." Politicians might say "zero," which is an honorable but unrealistic goal. Literacy offers a good analogy here: While all rich countries aim at zero illiteracy, there are always some children who don't learn to read. Nonetheless, we cannot accept high illiteracy rates and expect to maintain a prosperous society. As far as meeting the need for Internet usability, we have yet to scratch the surface. Very few websites are easy enough to continue supporting users when the Internet reaches 80% of the population. To serve 95% of the population (let alone 99%), substantial advances in usability will be required. Disregarding political and moral issues, the broadening user base poses a very simple business question: What percentage of your prospects will you turn away because they are not smart enough to use your website? Maybe 10% of your potential customers? Or perhaps 20%? That's a lot of dollars lost to an elitist attitude. And, even if you accept a 20% loss in customers because your site is too difficult, you still need a site easy enough for 80% of the population to use. Considering that most sites are too difficult for the 50% of the population that is currently online, companies will have to substantially improve their usability to willingly abandon that "acceptable" 20%. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From GreatList at excite.com Thu Feb 8 06:39:05 2001 From: GreatList at excite.com (GreatList at excite.com) Date: Thu, 8 Feb 2001 06:39:05 -0800 (PST) Subject: SCN: Hi, Open this email. Great new game on the Net!!! Message-ID: <200102081439.GAA28299@scn.org> An HTML attachment was scrubbed... URL: From bigjoe at japan.com Thu Feb 8 07:59:56 2001 From: bigjoe at japan.com (bigjoe at japan.com) Date: Thu, 08 Feb 2001 09:59:56 -0600 Subject: SCN: Brand New E-Mail pager for FR-EE! 21422 Message-ID: <000037326658$000071e1$000053ae@kate.ccohs.ca> No activation fee No big prepayment of airtime No credit check PAGING AMERICA is going to give you absolutely Free the Brand new Motorola Accessmate E-Mail display pager. This is the top of the line PCS technology pager made today. This side viewable display pager has a retail value of $189.00and comes with its own e-mail address so you can receive your e-mails as well as alpha-numeric and numeric messages instantly where ever you are. Your new e-mail pager has features like 50,000 character memory, message time stamping, automatic garbled message correction, beeps or vibrates, incandescent backlight, saved message folder, a unique never out of range feature that allows your pager to retrieve messages sent earlier when your pager was out of range or turned completely off. You can also receive weather, news and sports .The Motorola e-mail pager is very small and uses only a single double A battery. All we ask before we ship you your Free pager is for you to allow us to provide the airtime for you. There is no long term contract or credit check. Airtime is month to month and can be cancelled at any time. This pager will comes pre-programmed with its own e-mail address as well as a local telephone number to receive numeric pages. This pager comes with a complete 30 day money back guarantee, if after receiving this pager you're not completely happy, send it back and receive a full refund. For immediate delivery call Paging America at toll free at 877-699-8546 Brand New E-Mail pager for FREE! No long term contract * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at advocate.net Fri Feb 9 16:37:20 2001 From: steve at advocate.net (Steve) Date: Fri, 9 Feb 2001 16:37:20 -0800 Subject: SCN: Recycling Message-ID: <3A841CC0.26528.37EF020@localhost> x-no-archive: yes ======================== Computers are ranked as the nation's fastest-growing category of solid waste by the Environmental Protection Agency. And one of its most dangerous. (Anita Hamilton/Endicott, Time Magazine)---In a cement-floored warehouse in upstate New York, half a dozen women sit hunched over computer workstations. Holding a heat gun in one hand and metal tweezers in the other, they pry silicon chips from circuit boards like dentists extracting little metal teeth. Down the hall, a jumble of bright green motherboards spills out onto a conveyor belt headed toward a shredder that will rip them to cracker-size pieces of plastic. And around the corner, a clean-cut guy in a black work smock takes a big hammer and smashes one hard drive after another before tossing them into a huge bin marked ALUMINUM. No, this is not a PC factory gone berserk. This is the place where old computers go to die. IBM's Asset Recovery Center in Endicott, N.Y., is one of the largest PC junkyards in the world. Some 40 million lbs. of computers are dismantled here each year. It hardly makes a dent, however, in the annual bumper crop of dead computers. Every year an electronic trash heap nearly as tall as Mount Everest is tossed into garbage cans, stashed in garages or forgotten in closets. Some 500 million PCs will be rendered obsolete by 2007 in the U.S. alone--abandoned by users who have upgraded to faster and sexier machines--according to a report by the National Safety Council. Computers are ranked as the nation's fastest-growing category of solid waste by the Environmental Protection Agency. And one of its most dangerous. Old PCs contain lead, cadmium, mercury and other unsavory components. Yet only 10% of the machines are recycled. Many of them find their way into landfills and incinerators, where they can threaten the environment. That's why the European Union has drafted rules that will hold manufacturers responsible for recycling their wares by 2008. To fend off similar legislation here, U.S. manufacturers are scrambling to devise recycling programs of their own--and hoping to make a buck while they're at it. Last November, IBM launched the first nationwide program; it charges computer users a $30 shipping- and-handling fee to take even an ancient PC off their hands. Hewlett- Packard plans to launch its consumer-PC take-back program in March. Regional efforts--such as Sony's "recycling days" begun in Minnesota last fall--have sprung up from Oregon to New York. They face some consumer resistance. It's hard to pay a stranger to cart away a computer you bought for $2,000. Yet by the time you're ready to part with that machine, it's often so obsolete that no school or charity will take it. If you put it on the curb with the trash, however, it will end up in a landfill, where toxins could leach into the soil. A recycled PC, on the other hand, is literally a gold mine. Pentium and other processors have golden tips. A computer's main circuit board, fashioned from copper and fiber glass, is studded with silver and gold connectors. A steel frame keeps the unit sturdy, and aluminum or copper heat sinks prevent the cpu from overheating. The outer plastic case can be recycled to make everything from pothole filler to pencil holders. Even the cords dangling from the back have rich copper wiring that can be reincarnated as pipes, pans or furniture. Yet for all the precious metals and other reusable parts, it's still tough to make any money recycling PCs. Minus the cost of processing, the average used system is worth a measly $6 in raw materials, according to electronics recycler Envirocycle in Hallstead, Pa. The monitor is worth just $2.50. When IBM announced its consumer-PC recycling program last fall, it decided to have the carcasses shipped not to its 700,000-sq.-ft. recycling center in Endicott (where it mines corporate PCs for parts) but to an independent recycler 30 miles away. The reason: "Typically all that low-end stuff is not profitable," says Lawrence Yehle, operations manager at IBM Endicott. So low is the material value of each PC that the first step in recycling is to try to resell the machine--either whole or for its working parts. IBM resells a third of the used equipment it gets back from corporate leases in online sales and auctions. "It's a profitable business for us," says Joe Lane, general manager for global financing. Old chips get second lives in electronic toys. Outdated cd- rom and hard drives are reborn as replacement parts. When components are too old to be salvaged, IBM ships them to specialists in plastic, metals and glass. At Envirocycle, which does monitors, the plastic cases are popped open, the power cables chopped off and the circuit boards removed. Next the glass is crushed into pieces and stripped of various coatings so it can be sent to monitor makers that will re-form the rubble into new displays. MBA Polymers in Richmond, Calif., feeds whole keyboards and joysticks into its machines. The metals get siphoned off, then the plastic is melted into tiny pellets, which are resold for use in industrial flooring, auto parts and office supplies. Because metals are especially valuable, Hewlett-Packard mines its own. Step inside its 200,000-sq.-ft. warehouse in Roseville, Calif. (which it runs with partner MicroMetallics), and you will see computers stacked three stories high. A hulking blue machine swallows PCs and mainframes whole, grinds them up and a few minutes later spits them out in quarter-size pieces. A system of magnets, screens and electrical currents separates out aluminum and steel, while the remaining mixed metals go to Noranda Inc., a copper smelter in Quebec. The metal scrap HP produces by the ton has a higher percentage of copper than ore excavated from the ground, according to Bob Sippel, Noranda's vice president of recycling. Last year the Roseville operation retrieved more than $5 million worth of gold, copper, silver, aluminum and steel. As recycling ramps up, computer manufacturers are discovering new ways to make the process more efficient. Metal screws are being replaced with snap-open panels for quicker dismantling. Lead solder used to fasten parts to circuit boards is giving way to safer tin, silver and copper alloys. Spray-on flame retardants, which can be toxic when recycled, are being replaced with metal paneling. And those annoying plastic shipping peanuts are being replaced with packing material made of water-soluble starch. Still, critics insist that more work needs to be done. "The efforts in the U.S. have been chaotic and will not be successful until companies start picking up the excess costs," says activist Ted Smith of the Silicon Valley Toxics Coalition. In their defense, U.S. manufacturers insist that government and consumers must share the responsibility--and the cost. "I can't go into people's houses and take their computers out for them," says Renee St. Denis, environmental-business-unit manager for HP. That's true. But if consumers aren't given sufficient incentive to turn their computers in, then all those recycling initiatives--not to mention all those PCs piling up in closets--could simply go to waste. Copyright 2001 Time Inc. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From jj at scn.org Mon Feb 12 20:44:15 2001 From: jj at scn.org (J. Johnson) Date: Mon, 12 Feb 2001 20:44:15 -0800 (PST) Subject: SCN: Another VBS virus, & possible mail congestion. In-Reply-To: Message-ID: There is an advisory from CERT (the official and authentic source of such information) about another VBS (Visual Basic Script) e-mail virus making the rounds, this one supposedly containing images of athelete Anna Kournikova. (Summary below. For more details, go to wwww.cert.org.) PLEASE NOTE: this, as all VBS e-mail viruses, severely affects only those who read their mail with Microsoft applications such as "Outlook Express". It does not affect any SCN user who reads their mail on SCN, or use mail readers other than Outlook. (Or even Outlook users who have turned-off the default--and idiotic!--automatic execution of e-mail programs.) (See below for a tip.) However, we may all be affected to some degree, as there are reports that heavy volumes of e-mail at some locations is causing network congestion. Also, SCN users may be getting copies from affected users--don't worry about them. Read them, but please don't send them to susceptible users. A tip for anyone using MS software to receive mail from another ISP: if you get suspicious e-mail, and don't know if it would be safe to open it on your system: forward it to your SCN account and read it here. === JJ ============================================================= > CERT Advisory CA-2001-03 VBS/OnTheFly (Anna Kournikova) Malicious Code > > > Systems Affected > > Users of Microsoft Outlook who have not applied previously available > security updates. > > Overview > > The "VBS/OnTheFly" malicious code is a VBScript program that spreads > via email. As of 7:00 pm EST(GMT-5) Feb 12, 2001, the CERT > Coordination Center had received reports from more than 100 individual > sites. Several of these sites have reported suffering network > degradation as a result of mail traffic generated by the > "VBS/OnTheFly" malicious code. > Go to CERT's web page at www.cert.org for the rest of the details. * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From scoth at scn.org Tue Feb 13 20:22:28 2001 From: scoth at scn.org (Scot Harkins on scn.org) Date: Tue, 13 Feb 2001 20:22:28 -0800 Subject: SCN: Early Wireless Topologies Message-ID: <000901c0963d$c8c99740$a38cc5ce@corp.thurman.com> Sometimes we are reminded that the internet was once the sole domain of people of good cheer and self-deprecating humor. Some of the early internet RFC's (requests for comment) speculated on whimsical subjects, most of which never flew. ---begin RFC 1149--- Network Working Group D. Waitzman Request for Comments: 1149 BBN STC 1 April 1990 A Standard for the Transmission of IP Datagrams on Avian Carriers Status of this Memo This memo describes an experimental method for the encapsulation of IP datagrams in avian carriers. This specification is primarily useful in Metropolitan Area Networks. This is an experimental, not recommended standard. Distribution of this memo is unlimited. Overview and Rational Avian carriers can provide high delay, low throughput, and low altitude service. The connection topology is limited to a single point-to-point path for each carrier, used with standard carriers, but many carriers can be used without significant interference with each other, outside of early spring. This is because of the 3D ether space available to the carriers, in contrast to the 1D ether used by IEEE802.3. The carriers have an intrinsic collision avoidance system, which increases availability. Unlike some network technologies, such as packet radio, communication is not limited to line-of-sight distance. Connection oriented service is available in some cities, usually based upon a central hub topology. Frame Format The IP datagram is printed, on a small scroll of paper, in hexadecimal, with each octet separated by whitestuff and blackstuff. The scroll of paper is wrapped around one leg of the avian carrier. A band of duct tape is used to secure the datagram's edges. The bandwidth is limited to the leg length. The MTU is variable, and paradoxically, generally increases with increased carrier age. A typical MTU is 256 milligrams. Some datagram padding may be needed. Upon receipt, the duct tape is removed and the paper copy of the datagram is optically scanned into a electronically transmittable form. Discussion Multiple types of service can be provided with a prioritized pecking order. An additional property is built-in worm detection and eradication. Because IP only guarantees best effort delivery, loss of a carrier can be tolerated. With time, the carriers are self- regenerating. While broadcasting is not specified, storms can cause data loss. There is persistent delivery retry, until the carrier drops. Audit trails are automatically generated, and can often be found on logs and cable trays. Security Considerations Security is not generally a problem in normal operation, but special measures must be taken (such as data encryption) when avian carriers are used in a tactical environment. Author's Address David Waitzman BBN Systems and Technologies Corporation BBN Labs Division 10 Moulton Street Cambridge, MA 02238 Phone: (617) 873-4323 EMail: dwaitzman at BBN.COM ---end--- -- Scot Harkins (KA5KDU) | Systems Administrator, Thurman Ind, Bothell, WA Greenbank, WA | Native Texan firmly planted in Western Washington scoth at bigfoot.com | SCA: Ld. Scot MacFin, Barony of Madrone, An Tir scoth at scn.org/msn.com | URL * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From thannon at scn.org Tue Feb 20 12:58:54 2001 From: thannon at scn.org (Tim Hannon) Date: Tue, 20 Feb 2001 12:58:54 -0800 (PST) Subject: SCN: brumfield ps/2 to ADB (fwd) Message-ID: ---------- Forwarded message ---------- Date: Tue, 20 Feb 2001 11:28:32 -0800 From: Tim Hannon To: Tim Hannon Subject: brumfield ps/2 to ADB http://www.geethree.com/ps2adb.html * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From thannon at scn.org Tue Feb 20 19:35:34 2001 From: thannon at scn.org (Tim Hannon) Date: Tue, 20 Feb 2001 19:35:34 -0800 (PST) Subject: SCN: deleted u.washington. Message-ID: Hi, I deleted your uwashington address, so no personal emails from me should intterupt your day. I really don't have any emergencies, so I didn't think I'd need to contact you in the day. we had a lovely time up on Orcas. Hit an accident on the way up, but made the ferry. everything was covered in snow, and the ocean was stormy and windy when we arrived, about 5 pm. Allison and Emily were so excited when they saw our "cabin" they were jumping up and down and screaming "we love this place" Kids are a real handful..no time to sleep in, read or relax..just go, go, go, from one activity to another. They did play with their babies for a while, but they have to tell you things constantly so you are always "engaged" with them. Phew, tiring. The dogs had a wonderful time running free on the beach, tucker is totally worn out. he went straight to bed without supper and didn't want to get up at all this morning. he licks his paws alot. I left the basement door open for him so he can go in and out. what a spoiled dog. I think taking care of dogs is enough for me! the dining room is almost done, I have the table in there now and it is so warm, sunny and delightful. Sue like orcas so much she booked a cottage for their summer vacation. I am going back up the end of may, the weekend before mem'l day for a 5 day vacation. Sunday and Monday were beautiful days for sailing up there...god...it would be a dream to sail those islands. I hope you can do that someday....you can rent sailboats up there. well, hope all is well and you had a fun weekend, take care, marilee and tucker.. Marilee Murphy Jensen, MN, ARNP Clinician, Internal Medicine and Lecturer, Family Child Nursing ****************************************************************************** Internal Medicine Clinic, Roosevelt: 206-598-4936***fax 206 598 4939 Family Child Nursing, WPCNP Program: 206-543-8223***fax 206 "Take into account that great love and great achievements involve great risk." "When you lose, don't lose the lesson." Dalai Lama, 2000 * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From hotstocknews at hotmail.com Wed Feb 21 14:26:15 2001 From: hotstocknews at hotmail.com (hotstocknews at hotmail.com) Date: Wed, 21 Feb 2001 14:26:15 -0800 (PST) Subject: SCN: Clements (OTCBB:CPHX) signs contract with large Chinesse Import Company Message-ID: <200102212226.OAA19715@scn.org> An HTML attachment was scrubbed... URL: From jj at scn.org Tue Feb 27 00:40:05 2001 From: jj at scn.org (J. Johnson) Date: Tue, 27 Feb 2001 00:40:05 -0800 (PST) Subject: SCN: The difficulties of Feb 24-26. Message-ID: (The following account of the difficulties SCN encountered on Feb. 24-26 may be desiminated generally.) On the evening of Feb 24th our 'scn4' machine, which hosts the mail server, the web server, and the SCN Web pages, went into a perpetual reboot because of a memory failure. On Sunday afternoon we attempted to restore scn4 onto the chassis (box) used for scn3 (which had been pulled for development of SCN2). However, diagnostics showed "memory" problems on that box, plus there was a network problem, so every thing was put back onto the original chassis. Unfortunately, in the crowded conditions of our equipment rack a power cable was disturbed, and we lost our network connection to the library and to the Internet. This was not discovered until that evening, so we were unable to correct that until Monday morning. On Monday morning there was also a failure of a key networking service on our main 'scn' machine (probably because of repeated failure to connect to scn4). This effectively killed incoming dialup connections, though at that point that was less of a problem than merciful assistance. On Monday extensive testing of scn4's memmory commenced. The Sun memory diagnostic is not reliable, so the system was shutdown and rebooted in various memory configurations until clear results were obtained. This was done with various combinations of memory and also memory slots, as the latter are also susceptible to failure. This is very tedious, but in the end both memory and the motherboard for scn4 were replaced, including one memory DIMM that was supplied as replacement. And scn3 will be getting its motherboard replaced Tuesday. At one point there was also a problem with a disk drive, again because of the cramped conditions, and about two hours were required to restore key system files and e-mail. About two-dozen messages were lost. The system was restored at 6:30 PM. There is a very large backlog of mail which will take all night to deliver. This was a very difficult episode, which was exacerbated by when it happened. Hopefully the replacement hardware will give us good service, and some experience was gained which will aid us if the hardware fails. Operations is also looking at ways of making the system more robust. === JJ ============================================================= * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * * From steve at groupworks.org Wed Feb 28 13:06:03 2001 From: steve at groupworks.org (Steve Guest) Date: Wed, 28 Feb 2001 13:06:03 -0800 Subject: SCN: IMPORTANT - General Meeting Cancelled Message-ID: <005701c0a1ca$95fb1620$0100a8c0@dellxpsr350> Friends Due to the recent unexpected geologic intrusion - the University Branch Library is closing for the rest of the day. Therefore SCN has been forced to now cancel its General Meeting this evening. I hope you will forgive us this very short notice. For those that did manage to try and attend this meeting before you read this - we are very sorry and the closure was not ours but the Library's. Thanks for your support Steve and Melissa -=- -=-=- -=- -=-=- -=- -=-=- -=- -=-=- -=- -=-=- -=- Melissa & Steve Guest (425) 653 7353 Presidents of Seattle Community Network http://www.scn.org "Supporting People and Communities with Free Internet Services" * * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * * . To unsubscribe from this list, send a message to: majordomo at scn.org In the body of the message, type: unsubscribe scn ==== Messages posted on this list are also available on the web at: ==== * * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * *