Computer Professionals for Social Responsibility Records M1633

Total Page:16

File Type:pdf, Size:1020Kb

Computer Professionals for Social Responsibility Records M1633 http://oac.cdlib.org/findaid/ark:/13030/c8nc6728 No online items Guide to the Computer Professionals for Social Responsibility Records M1633 Department of Special Collections and University Archives 2019 Green Library 557 Escondido Mall Stanford 94305-6064 [email protected] URL: http://library.stanford.edu/spc Guide to the Computer M1633 1 Professionals for Social Responsibility Records M1633 Language of Material: English Contributing Institution: Department of Special Collections and University Archives Title: Computer Professionals for Social Responsibility records source: Computer Professionals for Social Responsibility creator: Computer Professionals for Social Responsibility Identifier/Call Number: M1633 Physical Description: 48 Linear Feet(96 boxes) Date (inclusive): 1980-2004 Abstract: Records of the policy group Computer Professionals for Social Responsibility (CPSR), consisting of correspondence, memoranda, newsletters, board minutes, publications, media, and other material. Finding aid contains folder listing only; collection has not been physically processed. Related Materials Stanford University Archives holds the Stanford University Computer Professionals for Social Responsibility records (SC1199) https://searchworks.stanford.edu/view/10556271 The Charles Babbage Institute at the University of Minnesota also holds a CPSR collection: http://purl.umn.edu/40803 Conditions Governing Access Open for research. Note that material must be requested at least 36 hours in advance of intended use. Audiovisual and computer media material is not available in original format, and must be reformatted to digital use copies. Conditions Governing Use While Special Collections is the owner of the physical and digital items, permission to examine collection materials is not an authorization to publish. These materials are made available for use in research, teaching, and private study. Any transmission or reproduction beyond that allowed by fair use requires permission from the owners of rights, heir(s) or assigns. Immediate Source of Acquisition Gift of Computer Professionals for Social Responsibility (CPSR), 2008. Accession 2008-188. Preferred Citation [identification of item], Computer Professionals for Social Responsibility records (M1633). Dept. of Special Collections and University Archives, Stanford Libraries, Stanford, Calif. Scope and Contents Computer Professionals for Social Responsibility (CPSR) was an organization promoting the responsible use of computer technology. CPSR was incorporated in 1983 following discussions and organizing that began in 1981. It educated policymakers and the public on a wide range of issues including privacy, design, and the role of computers in defense. The organisation was dissolved in May 2013. Subjects and Indexing Terms Computers -- Reliability. Strategic Defense Initiative. Technology -- social aspects. Computer Professionals for Social Responsibility Computer Professionals for Social Responsibility box 1, folder 1 Gordon, Diane R. box 1, folder 2 Hearings box 1, folder 3 Illinois box 1, folder 4 FBI: NCARL box 1, folder 5 Reporters' decision box 1, folder 6 Research in brief box 1, folder 7 SEARCH, Interface box 1, folder 8 Clippings box 1, folder 9 Resumes box 1, folder 10 Mary Karen Dahl - task force box 1, folder 11 Budget 1987-1988 Guide to the Computer M1633 2 Professionals for Social Responsibility Records M1633 box 1, folder 12 Net correspondence box 1, folder 13 Expert panel box 1, folder 14 Effects of task force box 1, folder 15 California box 1, folder 16 ACLU box 1, folder 17 Security clearinghouse box 1, folder 18 Bibliography box 1, folder 19 FBI - NCIC - Background box 1, folder 20 Statement on Strategic Defense System box 1, folder 21 Computer experts warn box 1, folder 22 Conscience crisis box 1, folder 23 Sense of responsibility box 2, folder 1 Software seen as obstacle box 2, folder 2 Buchsbaum statement - Senate Committee on Nuclear Forces box 2, folder 3 Computers invade box 2, folder 4 Calculated lies box 2, folder 5 Star Wars box 2, folder 6 Annals of law box 2, folder 7 SV employment profile box 2, folder 8 Ethical questions box 2, folder 9 Limits of correctness box 2, folder 10 Could we trust box 2, folder 11 Message box 2, folder 12 Reliability & responsibility box 2, folder 13 Strategic computing box 2, folder 14 Unreliable - SDI - Limits box 2, folder 15 Software - SDI box 2, folder 16 Why I won't work on SDI box 2, folder 17 Why communications systems are not like SDI box 2, folder 18 Annotated bibliography box 2, folder 19 Computer unreliability box 2, folder 20 EFF mission statement box 2, folder 21 Fletcher report box 2, folder 22 Star Wars defense box 2, folder 23 Computer system reliability (IPPNW) box 2, folder 24 Computer system reliability (ACM) box 2, folder 25 Lean, mean warriors box 2, folder 26 Campuses' role box 2, folder 27 Debate box 2, folder 28 Challenge to Reagan box 2, folder 29 Software/military box 2, folder 30 Soviet veto box 2, folder 31 Resolving the Star Wars box 2, folder 32 Pentagon plans box 2, folder 33 West interview box 2, folder 34 Defense agency box 2, folder 35 Wonders box 2, folder 36 Feasible computer box 2, folder 37 Army turns box 2, folder 38 Can we trust box 2, folder 39 Pravda box 2, folder 40 Computer bugs box 2, folder 41 Warning label box 2, folder 42 Rift over high tech box 2, folder 43 Study cites box 2, folder 44 Redell trip report box 2, folder 45 Project keyhole Guide to the Computer M1633 3 Professionals for Social Responsibility Records M1633 box 2, folder 46 New law box 2, folder 47 Super snoops box 2, folder 48 Dreams box 2, folder 50 Military spending box 2, folder 51 House passes box 2, folder 52 Computer madness box 2, folder 53 Eastport's findings box 2, folder 54 Errors box 2, folder 55 Experts' growing box 2, folder 56 Illusion box 2, folder 57 Programmed box 2, folder 58 Calculated lies box 2, folder 59 Fight box 2, folder 60 Debate box 2, folder 61 Even the experts box 2, folder 62 Federal agencies box 2, folder 63 Failure of colleges box 2, folder 64 Dim view box 2, folder 65 Big Brother box 3, folder 1 Roger Clarke box 3, folder 2 Computer system box 3, folder 3 Universal service box 3, folder 4 Eastport study group box 3, folder 5 Computer system box 3, folder 6 CPSR, Inc. box 3, folder 7 Annotated bibliography box 3, folder 8 National security box 3, folder 9 Eavesdropping box 3, folder 10 Big Brother 1980 box 3, folder 11 Unveiling box 3, folder 12 Ears of America box 3, folder 13 Sons box 3, folder 14 Superspy box 3, folder 15 Questionnaire box 3, folder 16 CHIP box 3, folder 17 Black chip box 3, folder 18 Big screen box 3, folder 19 ADL dirty box 3, folder 20 Cyberspace, knowledge box 3, folder 21 FCC box 3, folder 22 Conscience box 3, folder 23 BCS Impact! box 3, folder 24 INES newsletter box 3, folder 25 Illustrative risks box 3, folder 26 Artwork box 3, folder 27 Survey box 3, folder 28 Reliability box 3, folder 29 Boisjoly box 3, folder 30 Information box 4, folder 1 Women in computing box 4, folder 2 NAIS interim report box 4, folder 3 ACM-W meeting 1997-09-20 box 4, folder 4 EECS - Women graduate students box 4, folder 5 Incredible shrinking box 4, folder 5 Summit on women in engineering box 4, folder 6 Technology gap box 4, folder 7 Leveraging Guide to the Computer M1633 4 Professionals for Social Responsibility Records M1633 box 4, folder 8 CS programs in engineering colleges = fewer females box 4, folder 9 Privacy scam box 4, folder 10 Bridge box 4, folder 11 Universal literacy box 4, folder 12 Senior's women summit box 4, folder 13 Report on women's summit box 4, folder 14 UBC DCS technical reports box 4, folder 15 ACM-W poster box 4, folder 16 ACM-W annual report 1997-1998 box 4, folder 17 Survey of national leaders box 4, folder 18 CRAW grad school info guide box 4, folder 19 ACM-W meeting Dec. 1998 box 4, folder 20 Public-key cryptography box 4, folder 21 Cryptology goes public box 4, folder 22 Cryptology revolution box 4, folder 23 Cryptology secret meeting box 4, folder 24 Factoring on microcomputers box 4, folder 25 Flaws found box 4, folder 26 ACM's committee on women in computing box 5, folder 1 We the people box 5, folder 2 Bill ACA 36 box 5, folder 3 Bill of rights box 5, folder 4 CA lawmakers box 5, folder 5 HR145 box 5, folder 6 Dangers of information control box 5, folder 7 Panel backs expansion box 5, folder 8 NCIC renews proposal box 5, folder 9 Toward a GIP box 5, folder 10 Feynman goes to Washington box 5, folder 11 Computing risks box 5, folder 12 Detectives know-how box 5, folder 13 Modern criminal procedure box 5, folder 14 Officer's neglected report box 5, folder 15 Positive alternatives box 5, folder 16 Prosecutors mint box 5, folder 17 Hair ID box 5, folder 18 G-Men box 5, folder 19 Cunliffe box 5, folder 20 High-tech spooks box 5, folder 21 Big Brother isn't box 5, folder 22 NSA DES box 5, folder 23 Computer encryption box 5, folder 24 Crypto-censors box 5, folder 25 NSA to provide box 5, folder 26 Knapsack box 5, folder 27 NSA seeks box 5, folder 28 MIT seeks box 5, folder 29 Code is broken box 5, folder 30 New codes box 5, folder 31 Prior restraints box 5, folder 32 Prior restraints box 5, folder 33 More secrecy box 5, folder 34 New group box 5, folder 35 Unpacking knapsack box 5, folder 36 Public key box 5, folder 37 DOD vacillates box 5, folder 38 Shredded knapsack Guide to the Computer M1633 5 Professionals for Social Responsibility Records M1633 box 5, folder 39 Public's secrets box 5, folder 40 Promising code falls box 5, folder 41 Encryption boom box 5, folder 42 Foiling electronic box 5, folder 43 Arabsat satellite box 5, folder 44 Mathematical games box 5, folder 45 Short-circuiting box 5, folder 46 Computer encryption box 5, folder 47 Computer security box 5, folder 48 Shunning box 5, folder 49 Public cryptology box 5, folder 50 National security vs.
Recommended publications
  • Participant Reference Guide
    Participant Reference Guide Table of Contents Introduction System Requirements Definitions Audio Conferencing How to Join Phone Keypad Commands Playback Instructions Online Meetings How to Join Meeting Wall Meeting Resources Chat Radio Technical Support Introduction FreeConferenceCall.com is an intuitive and agile collaboration tool packed with features to allow participants to join audio conference calls and online meetings. All accounts include high-definition audio, screen sharing and video conferencing for up to 1,000 participants at no cost. During a conference, use phone keypad commands to mute, hear instructions and more. Access the host’s Meeting Wall to find important information and resources for a meeting. For assistance, go to www.freeconferencecall.com/support to live chat with 24/7 Customer ​ ​ Care, email [email protected] or call (844) 844-1322. ​ ​ System Requirements FreeConferenceCall.com audio conferencing can be accessed at any time by calling from a landline, mobile phone, VoIP call (through the internet using a computer, tablet or mobile device) or a third-party VoIP call. In order to access the FreeConferenceCall.com website and use online meetings with screen sharing and video conferencing, the following system requirements must be met: Browsers: ● Chrome™ 29 or newer (recommended) ● Firefox® 22 or newer ● Safari® 6.0 or newer (Mac only) ● Internet Explorer® 10 or newer (Windows only) (Javascript) Operating systems: ● Windows 7 and up ● Mac OS X 10.7 and up ● Ubuntu 14.04 and up Note for Linux: ○ Preferred Windows Manager environment: Compiz ○ Desktop Environment: Unity, Gnome ● Bandwidth 100Kb/s (HD Audio), 400Kb/s (screen sharing), 500 Kb/s (video) ● Video camera supported by OS, integrated or external Definitions In order to use the FreeConferenceCall.com reference guide effectively, the following list of terminology has been provided: ● Dial-in number - A phone number that is dialed to join a meeting.
    [Show full text]
  • Cruising the Information Highway: Online Services and Electronic Mail for Physicians and Families John G
    Technology Review Cruising the Information Highway: Online Services and Electronic Mail for Physicians and Families John G. Faughnan, MD; David J. Doukas, MD; Mark H. Ebell, MD; and Gary N. Fox, MD Minneapolis, Minnesota; Ann Arbor and Detroit, Michigan; and Toledo, Ohio Commercial online service providers, bulletin board ser­ indirectly through America Online or directly through vices, and the Internet make up the rapidly expanding specialized access providers. Today’s online services are “information highway.” Physicians and their families destined to evolve into a National Information Infra­ can use these services for professional and personal com­ structure that will change the way we work and play. munication, for recreation and commerce, and to obtain Key words. Computers; education; information services; reference information and computer software. Com m er­ communication; online systems; Internet. cial providers include America Online, CompuServe, GEnie, and MCIMail. Internet access can be obtained ( JFam Pract 1994; 39:365-371) During past year, there has been a deluge of articles information), computer-based communications, and en­ about the “information highway.” Although they have tertainment. Visionaries imagine this collection becoming included a great deal of exaggeration, there are some the marketplace and the workplace of the nation. In this services of real interest to physicians and their families. article we focus on the latter interpretation of the infor­ This paper, which is based on the personal experience mation highway. of clinicians who have played and worked with com­ There are practical medical and nonmedical reasons puter communications for the past several years, pre­ to explore the online world. America Online (AOL) is one sents the services of current interest, indicates where of the services described in detail.
    [Show full text]
  • QUICK USER GUIDE OVERVIEW in Idle Mode: Press and Hold to Record a Memo
    Wall Mounting Charging the batteries Press to playback OGM. Charge the batteries for at least 12 hours when charging for In TAM message playback mode: Press to go back to the first time. previous message. MEMO/SKIP FORWARD ( ) QUICK USER GUIDE OVERVIEW In Idle mode: Press and hold to record a memo. Base In TAM message playback mode: Press to skip to next Base message. 1- LCD DISPLAY DOWN/REDIAL LIST (▼) In idle mode: Press to access the redial list. 2- IN USE ( ) : On during a call. In menu mode: Press to scroll down the menu items. 3- RING light ( ) In Phonebook list / Redial list / Call list view mode: Press Flashes when there is an incoming call. to scroll down the list. Steadily on when the answering machine is turned on. Flashes In editing mode: Press to move the cursor one character to when there are new memos or messages in the answering the right. machine. During a call or TAM message playback: Press to decrease 4- MENU/OK ( ) the volume. Insert Photos for speed dial keys In idle mode: Press to access the main menu. 13-ANS ON/OFF ( ) In sub-menu mode: Press to confirm the selection. In Idle: Press to switch the answering machine ON or OFF. In Redial list/Call list: Press to store the number into 14. PLAY/STOP ( / ) Phonebook. In idle mode: Press to playback messages. 5- PHONEBOOK ( ) During TAM message playback: Press to stop playing In Idle: Press to access the phonebook. messages. 6- CALLS (CALL LIST) ( ) 15. DELETE ( ) In Idle mode: Press to access the call list.
    [Show full text]
  • Conferencing
    CONFERENCING 1. GENERAL 1.1 Service Definition 1.2 Standard Service Features 1.3 Customer Responsibilities 2. SUPPLEMENTAL TERMS 2.1 Emergency Calling 2.2 Protected Health Information (U.S. only) 2.3 On Line Password for Access to Service and CPNI 2.4 Cisco Universal Cloud Terms 2.5 Call Recording 2.6 India Regulations 2.7 Service Commitment Period 2.8 Audit and Extraordinary Events 3. SERVICE LEVEL AGREEMENT 4. FINANCIAL TERMS 4.1 General 4.2 Optimized Services 4.3 Non-Optimized Services 5. DEFINITIONS Appendix - Cloud Connect Audio Schedule 1 – Inspection Pro Forma And Cover Letter From The Indian Based Customer, Or Where Customer Is Not Based In India, From Customer’s Indian Based Affiliate/Participating Entity/End User 1. GENERAL 1.1 Service Definition. Verizon Conferencing Services bring together Cisco Webex conferencing with Verizon’s dial-in and dial-out reach for audio connectivity. The Service provides a multipoint service that enables Customer to conduct a collaboration session allowing text, documents, data or images (collectively, Data) to be transmitted via the Internet. A session may be used to provide Data on a one- way, one-to-many, view-only basis or on a multipoint, many-to-many, collaborative basis. To initiate a session, a Meeting Leader and Participants must have browser access to the Internet. The meeting Leader and Participants may also access an accompanying Audio Conferencing call. Customer’s use of the Services features and functions, including new features and functions, whether or not listed herein, will be deemed as Customer’s agreement to the terms and conditions related to such features and functions including, but not limited to, the then-current standard rates.
    [Show full text]
  • Using Avaya Communicator for Microsoft Lync 2013 on Avaya Aura®
    Using Avaya Communicator for Microsoft Lync 2013 on Avaya Aura® Release 6.4 02-604243 Issue 3 February 2017 © 2013-2017, Avaya, Inc. applicable number of licenses and units of capacity for which the All Rights Reserved. license is granted will be one (1), unless a different number of licenses or units of capacity is specified in the documentation or other Notice materials available to You. “Software” means computer programs in While reasonable efforts have been made to ensure that the object code, provided by Avaya or an Avaya Channel Partner, information in this document is complete and accurate at the time of whether as stand-alone products, pre-installed on hardware products, printing, Avaya assumes no liability for any errors. Avaya reserves and any upgrades, updates, patches, bug fixes, or modified versions the right to make changes and corrections to the information in this thereto. “Designated Processor” means a single stand-alone document without the obligation to notify any person or organization computing device. “Server” means a Designated Processor that of such changes. hosts a software application to be accessed by multiple users. “Instance” means a single copy of the Software executing at a Documentation disclaimer particular time: (i) on one physical machine; or (ii) on one deployed “Documentation” means information published by Avaya in varying software virtual machine (“VM”) or similar deployment. mediums which may include product information, operating License type(s) instructions and performance specifications that Avaya may generally make available to users of its products and Hosted Services. Designated System(s) License (DS). End User may install and use Documentation does not include marketing materials.
    [Show full text]
  • History Analog Video Transmission
    Videotelephony - AccessScience from McGraw-Hill Education http://www.accessscience.com/content/videotelephony/732100 (http://www.accessscience.com/) Article by: Bleiweis, John J. JJB Associates, Great Falls, Virginia. Publication year: 2014 DOI: http://dx.doi.org/10.1036/1097-8542.732100 (http://dx.doi.org/10.1036/1097-8542.732100) Content History Infrastructure Bibliography Analog video transmission Video telephone hardware Additional Readings Digital video transmission Video telephone software A means of simultaneous, two-way communication comprising both audio and video elements. Participants in a video telephone call can both see and hear each other in real time. Videotelephony is a subset of teleconferencing, broadly defined as the various ways and means by which people communicate with one another over some distance. Initially conceived as an extension to the telephone, videotelephony is now possible using computers with network connections. In addition to general personal use, there are specific professional applications, such as criminal justice, health care delivery, and surveillance that can greatly benefit from videotelephony. See also: Teleconferencing (/content/teleconferencing/680075) History Although basic research on the technology of videotelephony dates back to 1925, the first public demonstration of the concept was by American Telephone and Telegraph Corporation (AT&T) at the 1964 New York World's Fair. The device was called Picturephone, and the high cost of the analog circuits required to support it made it very expensive and thus unsuitable for the market place. The 1970s brought the first attempts at digitization of transmissions. The video telephones comprised four parts: a standard touch-tone telephone, a small screen with a camera and loudspeaker, a control pad with user controls and a microphone, and a service unit (coder-decoder, or CODEC) that converted the analog signals to digital signals for transmission and vice versa for reception and display.
    [Show full text]
  • Videoconferencing - Wikipedia,Visited the Free on Encyclopedia 6/30/2015 Page 1 of 15
    Videoconferencing - Wikipedia,visited the free on encyclopedia 6/30/2015 Page 1 of 15 Videoconferencing From Wikipedia, the free encyclopedia Videoconferencing (VC) is the conduct of a videoconference (also known as a video conference or videoteleconference) by a set of telecommunication technologies which allow two or more locations to communicate by simultaneous two-way video and audio transmissions. It has also been called 'visual collaboration' and is a type of groupware. Videoconferencing differs from videophone calls in that it's designed to serve a conference or multiple locations rather than individuals.[1] It is an intermediate form of videotelephony, first used commercially in Germany during the late-1930s and later in A Tandberg T3 high resolution the United States during the early 1970s as part of AT&T's development of Picturephone telepresence room in use technology. (2008). With the introduction of relatively low cost, high capacity broadband telecommunication services in the late 1990s, coupled with powerful computing processors and video compression techniques, videoconferencing has made significant inroads in business, education, medicine and media. Like all long distance communications technologies (such as phone and Internet), by reducing the need to travel, which is often carried out by aeroplane, to bring people together the technology also contributes to reductions in carbon emissions, thereby helping to reduce global warming.[2][3][4] Indonesian and U.S. students Contents participating in an educational videoconference
    [Show full text]
  • Cisco IP Video Telephony Solution Reference Network Design (SRND) Cisco Callmanager Release 4.0 July 2004
    Cisco IP Video Telephony Solution Reference Network Design (SRND) Cisco CallManager Release 4.0 July 2004 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: 9562740406 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • One Talk CP860 IP Conference Phone User Guide Contents
    CP860 IP conference phone user guide One Talk CP860 IP conference phone user guide www.onetalk.com Contents Welcome ................................................................................................................................................................................................................................... 4 Initial setup ............................................................................................................................................................................................................................ 4 Connecting the phone to power and Ethernet .......................................................................................................................................... 4 Startup ...................................................................................................................................................................................................................................... 4 View E911 address. .......................................................................................................................................................................................................... 4 Attaching an expansion microphone ................................................................................................................................................................ 4 Getting to know your conference phone ............................................................................................................................................
    [Show full text]
  • GXV3350 Call History
    Grandstream Networks, Inc. GXV3350 High-End Smart Video Phone User Guide COPYRIGHT ©2021 Grandstream Networks, Inc. http://www.grandstream.com All rights reserved. Information in this document is subject to change without notice. Reproduction or transmittal of the entire or any part, in any form or by any means, electronic or print, for any purpose without the express written permission of Grandstream Networks, Inc. is not permitted. The latest electronic version of this guide is available for download here: http://www.grandstream.com/support Grandstream is a registered trademark and Grandstream logo is trademark of Grandstream Networks, Inc. in the United States, Europe and other countries. CAUTION Changes or modifications to this product not expressly approved by Grandstream, or operation of this product in any way other than as detailed by this guide, could void your manufacturer warranty. WARNING Please do not use a different power adaptor with devices as it may cause damage to the products and void the manufacturer warranty. P a g e | 2 GXV3350 User Guide Version 1.0.3.30 U.S. FCC Statement Part 68 Regulatory Information This equipment complies with Part 68 of the FCC rules. Located on the equipment is a label that contains, among other information, the ACTA registration number and ringer equivalence number (REN). If requested, this information must be provided to the telephone company. The REN is used to determine the quantity of devices which may be connected to the telephone line. Excessive REN’s on the telephone line may result in the devices not ringing in response to an incoming call.
    [Show full text]
  • Audio Conferencing User's Guide
    User Guide: Insert Title USER GUIDE Conferencing Audio Conferencing Planning Your Meeting .......................................................................................................................... 2 Choose the Type of Meeting................................................................................................................................ 2 Choose How Participants Attend Your Virtual Meeting ....................................................................................... 3 Choose Features for Enhanced Meeting Management Capabilities ................................................................... 4 Feature Chart.......................................................................................................................................... 6 Scheduling Your Meeting ...................................................................................................................... 7 Meeting Tips ........................................................................................................................................... 8 Meeting Checklist................................................................................................................................... 8 Scheduling Your Meeting..................................................................................................................................... 8 Conducting Your Meeting ...................................................................................................................................
    [Show full text]
  • Tel-Ed'93, Global Connections. Conference Proceedings.(Dallas, Texas, November 10-13, 1993)
    DOCUMENT RESUME ED 366 334 IR 016 545 AUTHOR Foster, David, Ed.; Jolly, Deborah V., Ed. TITLE Tel-Ed '93, Global Connections. Conference Proceedings. (Dallas, Texas, November 10-13, 1993). INSTITUTION International Society for Technology in Education, Eugene, OR.; Southwest Educational Development Lab., Austin, Tex. SPONS AGENCY Office of Educational Research and Improvement (ED), Washington, DC. PUB DATE Nov 93 CONTRACT RP91002003 NOTE 361p.; Additional funding provided by Cognitive Training Associates, Inc. PUB TYPE Collected Works Conference Proceedings (021) EDRR PRICE MFOI/PC15 Plus Postage. DESCRIPTORS Computer Networks; Educational Inncvation; Educational Research; *Educational Technology; Educational Trends; Fund Raising; *Global Approach; Information Networks; Instructional Program Divisions; Instructional Systems; Partnerships in Education; Rural Education; *Telecommunications IDENTIFIERS Internet ABSTRACT The Tel-Ed '93 conference, "Global Connections," was intended to enable educators, administrators, researchers, and industry representatives to learn of the many new and innovative applications, important research studies, best practices, and national and international policy issues in educational telecommunications. The goal was to assist individuals concerned with the educational applications of telecommunications to use new resources and tools to improve the educational systems of their respective countries and, ultimately, to the benefit of humankind. The topics covered in this proceedings range from the theoretical to
    [Show full text]