User's Guide SAFRE Contents

Total Page:16

File Type:pdf, Size:1020Kb

User's Guide SAFRE Contents tquthem Re urce Exchange User's Guide SAFRE Contents 1. Overview, features and terms 5 2. The main menu 9 3. Reading received messages 11 Control keys in message reader/editor Parts of amessage 4. Creating messages 15 4.1 Message Status 4.2 Importing a file into a message Importing a WordPerfect file 4.3 Replying to amessage 4.4 Tips cn using the Front Door message editor Commands Hard carriage returns Cut and paste Carbon copies 5. Sending messages running the 25 network mailer 5.1 Attaching files using the message editor 5.2 Sending multiple files 5.3 Receiving a file 5.4 Dialer - helpful notes on the message sender/dialer User'sManual I SAFIRE 6. Conference Mail 33 6.1 The conference manager Quick start Finding conferences ofL-iterest Configuration 7. Requesting a file 37 8. Making files requestable 39 from your system 9. Messagebase management 41 Mass-deleting messages 10. Nodelist maintenance 43 11. Logs and statistics 45 Appendix A - Hints on using 47 Front Door effectively and conveniently 2 User'sMaanua SAFME Prologue This manual is intended primarily as a reference manual. The user may, of course, read it in order from start to end. However, the user can usually read alater section without needing to first read any of the earlier sections. The only exceptions are sections 1and 2. The user must be familiar with the concepts presented in section 1,and must know how to get to the main menu as explained in section 2 (which is only one page long). Sections 3 and higher consist largely of sample "walk-thrus" and "reference sheets". This manual is not intended to be acomplete substitute for the manuals of FrontDoor and the other programs used in this kit. The purpose of this manual is to assist new users in quickly becoming proficient with the software, without going into esoteric details. User'sManual 3 SAFIRE sectionl 1: Overview, features and teiflM0l0gy What is network mailer software? basic There are many varieties of network mailer software. The files and messages from com­ function of these mailers isto transfer and ordinary phone lines. puter to computer using modems read and write your messages off-line. With a "mailer" package, you completing calls and delivers the messages, The "mailer" automatically it can hold the in aminimum of time. Alternatively, the transfer to pick them up. Messages until another system calls yours messages in one call. files can be transferred both ways and and messages can be totally automated, The whole process of sending needs very little human interaction. system include: The advantages of this kind of costs thereby minimizing phone bill * Routing* Miimumconect of messages time, and files through participating relays who on a certain area thus cutting down combine all messages going to bill costs to all users- phone prior to connecting to most No need to purchase asubscription other network mailer systems. we are using, evolved retwork mailer software that Front Door, the called FidoNet. from a cooperative, PC-based, global network used on numerous other networks However, the software iscommonly and private. besides FidoNet, both public isVidoNet? What mes­ PC-based network that transfers FidoNet is just the name of a User'sManual P~ViOu5 Pare Blank SAFME sages and files fbr a vast number of people, using book which iscirculated a "nodelist" phone to systems around the world. The software that all people use to connect NONproprietary to FidoNet conforms to a standard commonly referred technology." There to as "FidoNet are many other, competing software which also conform packages to these standards, and with which you have obtained will the software communicate via modem. The FidoNet Technology mailer that we will be using is called FrontDoor, which included in a set of is FidoNet programs called The PerManNet (The elements of the PerManNet Kit Kit are discussed in the Sysop's Manual.) What can this software package do? This software package allows users to: * Send private E-Mail messages * Send public "conerence" messages (i.e., group discussions) *Send fles * Receive files sent by others Request files from others or from ageneral-access databank None of the above requires any "real time" interaction with people. In other words, the people other you are sending the mail to do not have to be on the other end to receive your messages. The user interacts with the network, without the need to interrupt any other human user at the moment Concepts/terms you need to know to get started 1.Mailer Asoftware module which operates the modem and interacts with remote systems using FidoNet technology. 2. Message Reader Also know as a "message editor" is the software module used to read and create messages. 3. Conference Mail a. versus Netmail NetMail ­ private messages between only two people md seen by no one else. This is the deffnlt fIder that you will enter when you first start up Front Door. You will see "NETMAIL" written in the top right comer of your screen. *Note: netmail does not refer to all networked mail, but only to private mail. 6 UsersManual SAMnE b. Conference Mail ­ public messages for group called discussion, also "echomail" and "newsgroups". Conference organized messages are by topic (also called a "folder"). When in a conference you write a message folder area, then prepare the message will go to to be sent out, it all the people who are a part of that conference. that you This means don't have to carbon copy (c.c.) the message you don't have to know to a group, and them personally. An example is the Africa Drought Southern Conference. It goes to the Canadian International Development Agency, PVO's, USAID and interested groups all over the southern Africa region. 4. Addressing An address in netmail issimilar to azip code. Each code tells number in a zip the post office where in the country, state, your letter county and city should go. Ifyou address you letter in-correctly, not go then it will to the right address. It is the same in netmail. An Address commonly looks like the following, and has 4 parts: 3:683/15.7 zo-= T T -T Net Node Point number The four parts of the address are called: Zone (3): The zone number is the first number followed in every address by a ':'. There are 6 zones in the FIDONET system which correspond addressing with 6 parts ofthe world. They are as follows: Zone 1: North America Zone 2: Europe and the CIS Zone 3: Australia and New Zealand Zone 4: Latin America Zone 5: Africa Zone 6: Asia Nct (683/) The number following the zone number is the Net number which indicates a local calling area. Node (1.5) A PC with asystem operator, who as ageneral rule operates 24 hours a day. Point (. 79), which is aPC with a s/stem operator which is notin the aser'sManual 7 SAFIRE nodelist, and uses anode as relay. (In this example, node 15.) On a mailer network, each Personal Computer (PC) has an electronic can be mail address, and each address is represented by one PC. There For one or multiple users at aparticular address using one PC. drought example, the Country Director can be a user, as well as the machine, coordinator in Zambia. However, if they are using the same The and 1phone line, they will have on'y one address for that site. addressing isone for every distinct site, not per user per site. 8 User'sManad SAFIRE Section 2: The main menu To start the program from your DOS prompt by typing- CD \FD START You will then be presented with the following menu: Main Mtenu Frequent off-line actions: B Bundle/unbundle coafercace mail F File maMgement progran futmated on-lin actions: II hetwork mode - dial and answer Occaionl off-line actions: C Copf lguration P Periodic aaintenasca L Logs and statistics H Help QQuit elanatlon of Item hi-lighted !2 aurso. bar: Perflanhet Startup lit, Veralon 3.01 The menu is split up into three kinds of functions. You can choose a function by: 1. typing the letter for the particular function, cr by 2. moving the highlight bar over the desired sedcidon using the up and down arrow keys ("cursor keys"). Then hit -Enter> to choose the selection. User'sManual 9 SANE "NOTE: When a selection is highlighted, aline of further explana­ don of that item is given at the bottom of the screen. The following sections will explain how to use each of these functions. 10 User'sMaual SAFIRE Section 3: Reading received messages menu, you select M for Mail reader/editor. 1. From the START editor. (Altema­ This will place you in whjt is called the message tively, you could run the message reader/editor by running hit Alt E from the network FnMEXE from the \FD directory, or mailer screen.) mail) section. start off in the Netmail (private You will <Alt H> for Help" then the message "Press Ifyou hit an invalid key, screen. will flash up on the bottom line of your initially is the last netmail What will come up on your screen 2. on. To move from message to message that you were working messages right cursor (arrow) keys. The message, press the left and is the fashion, meaning "to the left" are stored in "left to right" also message 2,3, and so on. This is message 1,and "to the right" is and created messages. the order in which you received amessage conference, such Conference mail: To change to *Note: which are kept in as the Southern Africa Drought Conference, hit-<Ctrl F> to get a list ofavailable separate areas called "folders," down the list to the one you want, conference folders.
Recommended publications
  • The Science of Television. Television and Its Importance for the History of Health and Medicine Jessica Borge, Tricia Close-Koenig, Sandra Schnädelbach
    Introduction: The Science of Television. Television and its Importance for the History of Health and Medicine Jessica Borge, Tricia Close-Koenig, Sandra Schnädelbach To cite this version: Jessica Borge, Tricia Close-Koenig, Sandra Schnädelbach. Introduction: The Science of Television. Television and its Importance for the History of Health and Medicine. Gesnerus, Schwabe Verlag Basel, 2019, 76 (2), pp.153-171. 10.24894/Gesn-en.2019.76008. hal-02885722 HAL Id: hal-02885722 https://hal.archives-ouvertes.fr/hal-02885722 Submitted on 30 Jun 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Gesnerus 76/2 (2019) 153–171, DOI: 10.24894/Gesn-en.2019.76008 Introduction. The Science of Television: Television and its Importance for the History of Health and Medicine Jessica Borge, Tricia Close-Koenig, Sandra Schnädelbach* From the live transmission of daunting surgical operations and accounts of scandals about medicines in the 1950s and 1960s to participatory aerobic workouts and militant AIDS documentaries in the 1980s the interrelation- ship of the history of bodies and health on television and the history of tele- vision can be witnessed. A telling example of this is the US born aerobics movement as it was brought to TV in Europe, with shows such as Gym Tonic (from 1982) in France, Enorm in Form (from 1983) in Germany or the Green Goddess on BBC Breakfast Time (from 1983) in Great Britain.
    [Show full text]
  • Cruising the Information Highway: Online Services and Electronic Mail for Physicians and Families John G
    Technology Review Cruising the Information Highway: Online Services and Electronic Mail for Physicians and Families John G. Faughnan, MD; David J. Doukas, MD; Mark H. Ebell, MD; and Gary N. Fox, MD Minneapolis, Minnesota; Ann Arbor and Detroit, Michigan; and Toledo, Ohio Commercial online service providers, bulletin board ser­ indirectly through America Online or directly through vices, and the Internet make up the rapidly expanding specialized access providers. Today’s online services are “information highway.” Physicians and their families destined to evolve into a National Information Infra­ can use these services for professional and personal com­ structure that will change the way we work and play. munication, for recreation and commerce, and to obtain Key words. Computers; education; information services; reference information and computer software. Com m er­ communication; online systems; Internet. cial providers include America Online, CompuServe, GEnie, and MCIMail. Internet access can be obtained ( JFam Pract 1994; 39:365-371) During past year, there has been a deluge of articles information), computer-based communications, and en­ about the “information highway.” Although they have tertainment. Visionaries imagine this collection becoming included a great deal of exaggeration, there are some the marketplace and the workplace of the nation. In this services of real interest to physicians and their families. article we focus on the latter interpretation of the infor­ This paper, which is based on the personal experience mation highway. of clinicians who have played and worked with com­ There are practical medical and nonmedical reasons puter communications for the past several years, pre­ to explore the online world. America Online (AOL) is one sents the services of current interest, indicates where of the services described in detail.
    [Show full text]
  • Networking and the Internet
    Networking and Today’s lecture the Internet History of the Internet How the Internet works Lecture 4 – COMPSCI111/111G S2 2018 Network protocols The telephone WWII and the Cold War 1876: first successful bi-directional Computer technology played an important role transmission of clear speech in code-breaking during WW2 by Alexander Bell and Thomas Watson Cold War between US and USSR led to a technology and arms race Peaked with the launch of Sputnik in 1957 1958: Advanced Research Projects Agency (ARPA) 1940: first successful transmission established of digital data through over telegraph wires by George Stibitz April 1969: construction of ARPANET begins, a packet-switching network Circuit-switching network Packet-switching network Nodes are connected physically via a central Data is broken into packets, which are then sent node on the best route in the network Used by the telephone network Each node on the route sends the packet onto its next destination, avoiding congested or broken Originally, switchboard operators had to nodes manually connect phone calls, today this is done electronically B A ARPANET ARPANET in 1977 October 1969: ARPANET is completed with four nodes 1973: Norway connects to ARPANET via satellite, followed by London via a terrestrial link ARPANET ARPANET to the Internet 1983: TCP/IP implemented in ARPANET Networks similar to ARPANET sprang up around the USA and in other countries 1990: ARPANET is formally decommissioned 1984: domain name system (DNS) implemented 1985: NSFNET was established 1989: Waikato University connects to NSFNET 1991: World Wide Web (WWW) created at CERN (European Organization for Nuclear Research) by Tim Berners-Lee 1995: NSFNET is retired WWW vs Internet Internet growth The Internet is a global system of interconnected computer networks.
    [Show full text]
  • Trojans and Malware on the Internet an Update
    Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY Abstract This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet - throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses the status of hostile active content on the Internet, including threats from Java and ActiveX, and re-examines the impact of these types of threats to Internet users in the real world. Observations related to the role of the antivirus industry in solving the problem are considered. Throughout the paper, technical and policy based strategies for minimizing the risk of damage from various types of Trojan horses on the Internet are presented This paper represents an update and summary of our research from Where There's Smoke There's Mirrors: The Truth About Trojan Horses on the Internet, presented at the Eighth International Virus Bulletin Conference in Munich Germany, October 1998, and Attitude Adjustment: Trojans and Malware on the Internet, presented at the European Institute for Computer Antivirus Research in Aalborg, Denmark, March 1999. Significant portions of those works are included here in original form. Descriptors: fidonet, internet, password stealing trojan, trojanized system, trojanized application, user behavior, java, activex, security policy, trojan horse, computer virus Attitude Adjustment: Trojans and Malware on the Internet Trojans On the Internet… Ever since the city of Troy was sacked by way of the apparently innocuous but ultimately deadly Trojan horse, the term has been used to talk about something that appears to be beneficial, but which hides an attack within.
    [Show full text]
  • The New Routing Algorithm for the ARPANET
    IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. COM-28, NO. 5, MAY 1980 71 1 The New Routing Algorithmfor the ARPANET JOHN M. McQUILLAN,MEMBER, IEEE. IRA RICHER,MEMBER. IEEE. AND ERIC C. ROSEN Absrracr-The new ARPANET routingalgorithm is animprovement test results. This paper is a summary of our conclusions only; over theold procedurein that it uses fewer network resources, operates on for more complete descriptions of our research findings, see more realistic estimates of network conditions, reacts faster to important our internai reportson this project [3] -[5]. network changes, and does not suffer from long-term loopsor oscillations. In the new procedure, each node in the network maintainsa database 11. PROBLEMS WITH THE ORIGINAL ALGORITHM describing the complete network topology and the delays on all lines, and uses the databasedescribing the network to generate a tree representing the me original ARPANET routing algorithm and the new ver- minimum delay pathsfrom a given root node to every other network node.sion both attempt to route packets along paths of least delay. Becausethe traffic in thenetwork can be quite variable, each node The total path is not determined in advance; rather, each node periodically measures the delays along its outgoing lines and forwards this information to all other nodes. The delay information propagates quickly decides which line to use in forwarding the packet to the next through the network so thatall nodes can update their databases and node. In the original approach, each node maintained a table continue to route traffic in a consistent and efficient manner. of estimated delay to each other node, and sent itstable to all An extensive series of tests were conducted on the ARPANET, showing adjacent nodes every 128 ms.
    [Show full text]
  • Inventing Television: Transnational Networks of Co-Operation and Rivalry, 1870-1936
    Inventing Television: Transnational Networks of Co-operation and Rivalry, 1870-1936 A thesis submitted to the University of Manchester for the degree of Doctor of Philosophy In the faculty of Life Sciences 2011 Paul Marshall Table of contents List of figures .............................................................................................................. 7 Chapter 2 .............................................................................................................. 7 Chapter 3 .............................................................................................................. 7 Chapter 4 .............................................................................................................. 8 Chapter 5 .............................................................................................................. 8 Chapter 6 .............................................................................................................. 9 List of tables ................................................................................................................ 9 Chapter 1 .............................................................................................................. 9 Chapter 2 .............................................................................................................. 9 Chapter 6 .............................................................................................................. 9 Abstract ....................................................................................................................
    [Show full text]
  • Chapter 8 the Birth and Development of the ARPANET by Ronda Hauben [email protected]
    Chapter 8 The Birth and Development of the ARPANET by Ronda Hauben [email protected] “The Nutrition of a Commonwealth consisteth, in the Plenty, and the Distribution of Materials, Condusive to Life.” Thomas Hobbes The Leviathan “The method I take…is not yet very usual; for instead of using only comparative and superlative words, and intellectual arguments, I have taken the course (as a Specimen of the Political Arithmetic I have long aimed at) to express myself in terms of Number, Weight, or Measure; to use only arguments of Sense, and to consider only such Causes, as have visible Foundations in Nature; leaving those that depend upon the mutable Minds, Opinions, Appetites, and Passions of particular Men, to the Conservation of others.” Sir William Petty, Political Arithmetic Preface The creation of a Global Computer Network is one of the surprising developments of our times. This achievement raises the question: What are the factors that nourished the growth and development of this network and what are those creating impediments to its continued development and expansion?1 Introduction J. C. R. Licklider was one of the early computer pioneers who helped to make the global computer network a reality. His vision of an Intergalactic Computer Network helped to inspire these developments. He and Albert Vezza, describing an earlier networking advance, wrote, “Shakespeare could have been foreseeing the present situation in information networking when he said, ‘…What’s past is prologue; what’s to come, in yours and my discharge’.”2 The story of the network’s growth and development contains important lessons for its continued expansion.
    [Show full text]
  • 8068/8038/8039/8028/8029 Premium Deskphone
    Alcatel-Lucent OmniPCX Office Rich Communication Edition 8068 Premium DeskPhone 8039 Premium DeskPhone 8038 Premium DeskPhone 8029 Premium DeskPhone 8028 Premium DeskPhone User Manual R100 8AL90894ENACed01-1617 Introduction Thank you for choosing an ALE International phone. This model offers enhanced ergonomical features for more effective communication. This document describes the services offered by the following sets: 8068 Bluetooth® Premium DeskPhone (8068 BT) 8068 Premium DeskPhone 8039 Premium DeskPhone 8038 Premium DeskPhone 8029 Premium DeskPhone 8028 Premium DeskPhone The labels and icons displayed on the phone depend on the type of the set. Some features are depended on the type of the set. 8068 BT 8068 8039 8038 8029 8028 IP Phone Digital Phone Color screen Monochrome screen Bluetooth® handset Bluetooth® Headset Two-port Gigabit Ethernet switch with Power Over Ethernet support Premium Add-on 10 keys modules Audio services (hands-free, handset and headset) Premium Smart display 14 keys module Adjusting the contrast of the display Agent set / Supervisor station The labels and icons presented in this document are not contractually binding and may be modified without prior warning. 8AL90894ENACed01 2 /53 1 GETTING TO KNOW YOUR TELEPHONE 7 1.1 8068 BLUETOOTH® / 8068 PREMIUM DESKPHONE 7 1.2 8038/8039 PREMIUM DESKPHONE 7 1.3 8028/8029 PREMIUM DESKPHONE 8 1.4 CONNECTIVITIES 8 1.5 WELCOME SCREENS 9 1.6 NAVIGATION 10 1.7 STATUS ICONS / CALL ICONS 10 1.8 PERMANENT FEATURES KEYS 10 1.9 ALPHABETIC KEYBOARD 11 1.10 ADD-ON MODULE 12 1.11 CALL MANAGEMENT SCREEN 13 1.12 BLUETOOTH® WIRELESS HANDSET 14 2 USING YOUR TELEPHONE 15 2.1 MESSAGING PORTAL 15 2.2 MAKING A CALL 16 2.3 RECEIVING A CALL 17 2.4 USING THE TELEPHONE IN “HANDS FREE“ MODE 17 2.5 ACTIVATING THE LOUDSPEAKER DURING A CONVERSATION (RECEIVER LIFTED) -LOUDSPEAKER.
    [Show full text]
  • E-Mail and Academic Computer Networks
    AAPM REPORT NO. 30 E-MAIL AND ACADEMIC COMPUTER NETWORKS Published for the American Association of Physicists in Medicine by the American Institute of Physics AAPM REPORT NO. 30 REPORT OF TASK GROUP 1 COMPUTER COMMITTEE Trevor D. Cradduck (Task Group Chairman) Martin S. Weinhous Neal Tobochnik September 1990 Published for the American Association of Physicists in Medicine by the American Institute of Physics DISCLAIMER: This publication is based on sources and information believed to be reliable, but the AAPM and the editors disclaim any warranty or liability based on or relat- ing to the contents of this publication The AAPM does not endorse any products, manufac- turers, or suppliers. Nothing in this publication should be interpreted as implying such endorsement. Further copies of this report ($10 prepaid) may be obtained from: American Institute of Physics c/o AIDC 64 Depot Road Colchester, Vermont 05446 (l-800-445-6638) Library of Congress Catalog Number: 90-55652 International Standard Book Number: 0-883 18-806-6 International Standard Serial Number: 0271-7344 © 1990 by the American Association of Physicists in Medicine All rights reserved. No part of this publication may be re- produced, stored in a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photo- copying, recording, or otherwise) without the prior writ- ten permission of the publisher. Published by the American Institute of Physics, Inc. 335 East 45 Street, New York, NY 10017 Printed in the United States of America TABLE OF CONTENTS TABLE OF CONTENTS . i PREFACE . 1 1 INTRODUCTION ................................... 3 ELECTRONIC MAIL AND COMMUNICATIONS ......
    [Show full text]
  • Telephone Consumer Protection Act 47 USC §
    Telephone Consumer Protection Act 47 U.S.C. § 227 SEC. 227. [47 U.S.C. 227] RESTRICTIONS ON THE USE OF TELEPHONE EQUIPMENT (a) DEFINITIONS.—As used in this section— (1) The term “automatic telephone dialing system” means equipment which has the capacity— (A) to store or produce telephone numbers to be called, using a random or sequential number generator; and (B) to dial such numbers. (2) The term “established business relationship”, for purposes only of subsection (b)(1)(C)(i), shall have the meaning given the term in section 64.1200 of title 47, Code of Federal Regulations, as in effect on January 1, 2003, except that— (A) such term shall include a relationship between a person or entity and a business subscriber subject to the same terms applicable under such section to a relationship between a person or entity and a residential subscriber; and B) an established business relationship shall be subject to any time limitation established pursuant to paragraph (2)(G)). (3) The term “telephone facsimile machine” means equipment which has the capacity (A) to transcribe text or images, or both, from paper into an electronic signal and to transmit that signal over a regular telephone line, or (B) to transcribe text or images (or both) from an electronic signal received over a regular telephone line onto paper. (4) The term “telephone solicitation” means the initiation of a telephone call or message for the purpose of encouraging the purchase or rental of, or investment in, property, goods, or services, which is transmitted to any person, but such term does not include a call or message (A) to any person with that person's prior express invitation or permission, (B) to any person with whom the caller has an established business relationship, or (C) by a tax exempt nonprofit organization.
    [Show full text]
  • Secx1034 Telecommunication Switching Systems
    SECX1034 TELECOMMUNICATION SWITCHING SYSTEMS UNIT I EVALUATION OF PUBLIC SWITCHED TELECOMMUNICATION NETWORKS Switching system functions – stronger switching system – cross bar exchange – SPC exchange – Message switching – circuits switching – Telephone handset – four wire concept – Hybrid circuit – Echo suppressor and cancellors – PCM coders – Modems and relays – Telecommunication standard. 1.1 Switching System. The switching centers receives the control signals, messages or conversations and forwards to the required destination, after necessary modification (link amplifications) if necessary. A switching system is a collection of switching elements arranged and controlled in such a way as to setup a communication path between any two distant points. A switching center of a telephone network comprising a switching network and its control and support equipment is called a central office. In computer communication, the switching technique used is known as packet switching or message switch (store and forward switching). In telephone network the switching method used is called circuit switching. Some practical switching system are step-by-step, cross barred relay system, digital switching systems, electronic switching system etc. Signalling Systems: A signalling system in a data communication networks exchanges signalling information effectively between subscribers. The signalling systems are essential building blocks in providing the ultimate objective of a worldwide automatic telephone services standardized. Signalling provides the interface between different national systems. The introduction of signalling system was the big step in improving the PSTN. 1.2 Strowger switching systems-The Invention of Automatic Switching Almon B. Strowger was an undertaker in Kansas City, USA. The story goes that there was a competing undertaker locally whose wife was an operator at the local (manual) telephone exchange.
    [Show full text]
  • The Invention of Television
    f (0,1 ! , t-/ r 1 The Invention of Television Albert Abramson elevision is the electrical transmission and came in 1843 when Samuel F. B. Morse developed reception of transient visual images, and is his telegraph (distant-record) machine. This was probably the first invention by committee, in a means of communication by which the letters the sense of resulting from the effort of hundreds of of the alphabet were converted into electrical equi- individuals widely separated in time and space, all valents (the Morse code) that could be either re- prompted by the urge to produce a system of seeing corded on paper tape or transcribed by trained over the horizon. operators. Since the code was transmitted over wires Whether with tom-toms. smoke signals, or sema- at almost the speed of light, it soon became the phore. human beings have always tried to com- quickest means of point-to-point communication. municate with neighbours beyond the horizon. The Before long, electric wires were strung on poles con- desire has been a matter of commerce, curiosity, or necting most of the major cities. These same wires most importantly, warfare. Written messages were were also run under the lakes and oceans of the sent by ships, horses, birds, and shanks mare. But world. these were slow, cumbersome, and subject to the About the same time, other inventors were seek- whims of weather, terrain, or the endurance of ing means to transmit more than dots and dashes animals. The first steps towards instant commun- over these same wires. One of the earliest was ications were really taken by seventeenth- and Alexander Bath in 1843.
    [Show full text]