Loyalty Still Grows on Ztree

Total Page:16

File Type:pdf, Size:1020Kb

Loyalty Still Grows on Ztree 20 livewire THE AGE Thursday, March 24, 2011 bleeding edge ZTree displays the contents of hard disks in an ‘‘inverted-tree charles hierarchical structure’’. You can wright find files individually or in groups in a directory, or with just one keystroke, globally on a hard disk or several hard disks. You can view them, tag them, copy them, compare them, search Loyalty still them for text strings, move them, delete them, rename them, archive them using built-in PKZIP and RAR compression, change their attributes, perform grows on ZTree batch operations, turn them into short cuts and so on — in short, manage them, individually or in bulk, with just a few keystrokes. A DOS-style file manager worthy of far greater Despite the fact Kim was attention has its fair share of paying fans. forced to abandon a ‘‘free ZTreeWin, by Kim Henkel (below), has the feel and speed of command-key DOS-era programs. upgrades forever’’ policy and ask for a $10 upgrade fee with the E PROBABLY shouldn’t made a gentle request for us to because it preloads drives, direct- When the young man offered launch of version 2.0 of have done it. Every time write an article about ZTreeWin. ories and files into memory, a to do the job for $25,000, Execut- ZTreeWin in 2009, it remains a WBleeding Edge men- ‘‘This program is my favourite degree of speed and utility that ive Systems declined again. It product that has paying fans, tions a new productivity tool or file utility program and has been would be unfamiliar to most was one of the most dramatically rather than customers. an organising utility, as we did ever since I have been running Windows users. stupid decisions in the history of They spontaneously developed recently with Nemo Documents, Windows,’’ he told us. ZTreeWin has an unbreakable commercial software. a user forum that is now at we seem to ignite our readers’ ‘‘I used XTree way back in the connection with Melbourne. It ZTreeBold for OS/2 came out bit.ly/ej7E1k, a wiki for user- enthusiasm engines and before days of DOS and so it was an was written by a Boronia boy, in the middle of that year. Exec- contributed tips and a semi- long their emails are doing easy progression to ZTree when Kim G. Henkel, and largely mar- utive Systems eventually sold out official wish-list at bit.ly/enpGYk, burnouts in our mailbox. XTree ‘died’. I am not sure that keted by his father, Gordon. Kim to Central Point Software, which to say nothing of a Wikipedia ‘‘Call that a file manager?’’ there is anything else out there Henkel’s formal computer educa- in turn was acquired by Syman- entry and Facebook page. someone will demand to know. that compares with ZTree. It is tion consisted of a six-month tec. It ingeniously engineered a Since version 2.0 emerged, ‘‘Why, my file manager can beat fast, keyboard-driven and per- course in mainframe Cobol, rewrite that comprehensively there have been several major your file manager with one hand forms many functions not completed — characteristically removed XTreeGold’s most val- updates, culminating in a migra- tied behind its back!’’ available in Windows Explorer. for a kid who cut his teeth on a ued features, forcing users to tion to the Microsoft Visual It’s been going on since the ‘‘As far as I can tell from the web TRS-80 computer at 15 — in just give up their treasured short-cut Studio 2008 development plat- days of MS-DOS, when the there are quite a few devoted three months at the Melbourne keys and blinding speed for a form, which allows parallel world was divided into ‘followers’ out there but office of Control Data. tedious drag-and-drop interface. development of 32-bit and 64-bit two types of computer I feel it could do with a It was 1993 when Executive As a test case for inducing cus- versions. The 64-bit version users: those who swore bit more exposure.’’ Systems, the original owner of tomer dissatisfaction, it was an released this month means by XTreeGold and those It’s been almost XTreeGold, got a letter from a absolute triumph. ZTree’s viewer can now open who wouldn’t dream of 10 years since we last young man somewhere in Vic- Ironically, that left Kim Hen- files well beyond the one-gigabyte operating their PC with- wrote about ZTreeWin toria, Australia, begging it to kel free to take the XTree limit of the 32-bit version. out a copy of Norton (ztree.com)—a$30 develop a multi-threaded, 32-bit interface and simple command Although it does work with a Commander. program that has the version of his favourite file man- structure, overcome the 640kB mouse, anyone prepared to learn Those days were look and feel of one of ager so he could continue to use memory constraints of the DOS its command-key structure will brought back to us the DOS world’s most- it with the then newly released version, add the ability to handle enter a Zen-like digital paradise. last week, loved programs, Windows and OS/2. The com- Windows’ Long File Names and when one XTreeGold pany declined on the grounds include more features. The Win- Email feedback on the Bleeding Edge to reader (xtree.com), and that the task was too complex. dows version came out in 1996. [email protected]. Ahead of the game continued from page 15 they launch. Comparing prices Nintendo DS Nintendo DS Lite Nintendo DSi Nintendo DSi XL Nintendo 3DS with something like the number February 24, 2005 June 1, 2006 April 2, 2009 April 15, 2010 March 31, 2011 of tubs of ice-cream the same money would buy should get the already been well informed that This new console continues to Along with new immersive you that the Nintendo 3DS is message across. It is also helpful the latest console due to launch offer dual screens and touch- games, 3D movies are also expec- clearly one innovative step ahead to explain how the prices in Australia, the Nintendo 3DS sensitive interaction with games ted to become available in the of the current competitors, decrease over time and that it hand-held gaming device, arrives and activities, though it is also future. The console also features including its older siblings, makes better financial sense to next week. It is the fifth model in the world’s first console to intro- dual cameras on the back though, in the long run, it inev- wait before buying things. the long-running and best-selling duce 3D gaming without the designed to take 3D images. itably rests with a parent as to Many parents have no doubt DS family. need to wear special glasses. It may not take a child to tell whether that child gets one. NATAGE F020.
Recommended publications
  • Virus Bulletin, January 1993
    January 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding Advisory Board: Jim Bates, Bates Associates, UK, Andrew Busey, Datawatch Corporation, USA, David M. Chess, IBM Research, Phil Crewe, Fingerprint, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Tony Pitts, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus Corporation, USA, Steve R. White, IBM Research, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SCANNER UPDATE 1993 Scanner Shoot-Out 8 EDITORIAL Imageline v. McAfee 2 VIRUS ANALYSES NEWS 1. The CMOS1 Virus 13 2. DOSHUNTER - Search S&S Caught Out 3 And Destroy 15 Chinese Whispers 3 3. Penza - Variations on a Familiar Theme 16 A Rose By Any Other Name 3 PRODUCT REVIEWS IBM PC VIRUSES (UPDATE) 4 1. IBM AntiVirus 18 INSIGHT 2. PC Tools 8 21 Scotland Yard’s Virus Hunters 6 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers.
    [Show full text]
  • Newsletter of Stanford Palo Alto Users Group for PC
    ' mmm ~ I.__ __v_o_i_. _x_•_11_______ J_u_L_v_•_9_9s _________ N_o_ ._1_ __. Q Newsletter of Stanford Palo Alto Users Group for PC Q TABLE OF CONTENTS President's Piece Brain Christopher, SPAUG President 2 ~ New BBS Kendric Smith 2 Banks, Microsoft, and Online Banking Larry Weinberg J Norton DeskTop for Windows Lee Ammons 4 Internet Access in Public Libraries s Renewals 6 Anti-Virus for OS/2 David Varney 7 Why I Like OS/2 Jack Cook 8 Internet SIG 9 Membership Application 10 Resource Center SP AUG 11 ..... Ji GENERAL MEETING McAFEE ASSOCIATES - Latest Anti-Virus Software INCAT SYSTEMS - YAMAHA Recordable CD-ROM WATERGATE SOFTWARE - PC Doctor for IRQ Conflicts WEDNESDAY. JULY 26, 7:3 PM SPAUG NOW HAS A Conference ON A LOCAL First Class BBS. Nick Chinn. the Sysop (system operator) of Dead Winners Dog Party.has kindly provided space on his BBS for A new adventure is a click away for prize an interactive Conference for SPAUG. All you need winners at the June General Meeting. Del Philpott is a computer with a modem. Just dial (415) 968- and Clark Moore both won Pixar's Typestry. Frank 7919. You will see a few introductory screens of Kimbel and Bill McElhrney won Ares software information and be prompted to enter a User ID and Font Minder and Font Chameleon . Larry Turpen a password. New users will be prompted lo fill out won the Better Homes & Garden's Healthily a registration form. Cooking. After logging on, go to Conferences and select BBS Closed SPAUG. You can read what has been posted by other, and you can post your own material that you On July 5th, the Board of Directors feel will be of interest to others in the PC unanimously voted lo close the SPAUG BBS.
    [Show full text]
  • 1 Introduction 2 Main Window 3 Directory/File
    Gtree 1 Introduction Gtree is an Xtree like file manager with a GUI interface. It should run on any reasonably recent Linux system with GTK+ installed. The current functionality is incomplete, but concentrates on Directory navigation and logging. 2 Main Window The initial Gtree display is divided into a number of areas. The largest panel is a Frame which contains a list of Directories and/or Files. The area to the right displays Statistics about the item currently selected in the main Frame. The bottom panel is a summary of the Commands which apply to the current selection. 3 Directory/File Frame The Frame has 2 components. The top Directory Window is a tree display of Directories. The bottom File Window is a list of Files currently selected in the Directory Window. The relative sizes of the Directory and File panes can be controlled by dragging on the divider (keyboard control coming). To work with files the user enters the File Window. This hides the Directory Window (although it is still there in the background). There is a second Frame, which is initially hidden, but can be made visible. The user can then switch between the left and right frame and hide the inactive frame. Each frame is independent - although the logged directories are the same, those which are displayed may be different. 3.1 Directory Window The Directory Window is a tree display of Directories. The top left is the displays the root node. The frame label (top-left border) is the full path to the currently selected directory.
    [Show full text]
  • Netware 5.1 Upgrade
    NOVELL PARTNER CONSULTING SERVICE OFFERINGS NOVELL PARTNERNET CONFIDENTIAL CONSULTANT GUIDE NetWare 5.1 Upgrade ® Table of Contents NetWare 5.1 Upgrade Consulting Guide .................................................................................... 4 Target Audience...........................................................................Error! Bookmark not defined. Terminology......................................................................................................................... 4 Skill Set............................................................................................................................... 4 Purpose ............................................................................................................................... 5 Acknowledgements.......................................................................Error! Bookmark not defined. NetWare 5.1 Training Curriculum ............................................................................................ 6 Curriculum for NetWare 5.1 .................................................................................................... 6 Curriculum for NetWare 5 CNE ............................................................................................... 6 Reference Material ...............................................................................................................10 Books .............................................................................................................................10 AppNotes
    [Show full text]
  • Oncommand Insight 7.2 Configuration and Administration Guide
    OnCommand® Insight 7.2 Con®guration and Administration Guide April 2016 | 215-10390_B0 [email protected] Table of Contents | 3 Contents OnCommand Insight overview ................................................................... 7 Insight architecture ...................................................................................................... 7 Insight Data Warehouse architecture ............................................................... 8 Firewall-friendly architecture .......................................................................... 8 How Insight is used by administrators, managers, and planners ................................. 9 Finding answers to your Insight questions ................................................................ 10 Accessing Help directly ................................................................................ 10 Locating product information on the NetApp Support Site .......................... 10 Setting up Insight ........................................................................................ 12 Accessing the web UI ................................................................................................ 12 Installing your Insight licenses .................................................................................. 13 Updating expired licenses ............................................................................. 14 OnCommand Insight licenses ........................................................................ 14 Setting up and managing
    [Show full text]
  • Magazyn Dragonia
    Numer 24 – 2008 SciDAVis To program dla wszystkich, którzy po- trzebują programu do analizy danych doświadczalnych. Dla naukowców z dziedziny nauk ścisłych i przyrodni- czych, dla studentów tychże nauk i dla innych zainteresowanych. Całość na stronie 13 Linux to NIE Windows Artykuł dla nowych użytkowników systemu Linux, który mają mniejsze lub większe problemy z przestawie- niem się z Windows na Linuksa. Dłu- gość artykułu odzwierciedla jak bar- dzo różnią się te dwa systemy. Całość na stronie 36 Linux w biurze – KWord Test kolejnego edytora z linuksowe- go biurka – KWord z pakietu KOffice przeznaczonego dla środowiska KDE. Całość na stronie 22 Wstępniak Spis treści Drodzy Czytelnicy System Oddajemy w Wasze ręce kolejny, tym ra- openSUSE 11...................................3 zem wakacyjny, numer Dragonii. Mimo wa- Felieton kacji redakcja oraz współpracujący autorzy nie próżnowali, o czym przekonacie się po Linux to NIE Windows...............................5 lekturze Dragonii. Software Oprócz wspomnianych na stronie tytu- SciDAVis.................................... 13 łowej artykułów o narzędziu do analizy da- Baza pod kontrolą PHP – część 2............................ 17 nych, teście aplikacji biurowych i tekście o Li- Linux w biurze – KWord............................... 22 nuksie dla początkujących zapraszam do lek- tury pozostałych artykułów. W bieżącym nu- Xtree – starszy brat Norton Commandera.......................... 26 merze możemy przeczytać o konfiguracji ser- EasyLin – Konfigurator urządzeń............................ 29 werów DHCP, NIS i urządzeń, o systemie NND – serwer DHCP................................ 32 statystyk dla serwisu internetowego, a tak- Konfigurujemy NIS................................. 34 że o nowinkach w świecie serwerów poczto- Graphviz.................................... 36 wych. Axigen – nowość na rynku serwerów poczty........................ 39 Część naszych czytelników to osoby z doświadczeniem w administracji systema- Literatura mi linuksowymi czy uniksowymi, lub auto- Książki wydawnictwa PWN.............................
    [Show full text]
  • Indexing Nearest Neighbor Queries
    IT 10 017 Examensarbete 30 hp May 2010 Indexing nearest neighbor queries Thanh Truong Institutionen för informationsteknologi Department of Information Technology Abstract Indexing nearest neighbor queries Thanh Truong Teknisk- naturvetenskaplig fakultet UTH-enheten In database technology, one very well known problem is K nearest neighbor (KNN). However, the cost of finding a solution of the KNN problem may be expensive with Besöksadress: the increase of database size. In order to achieve efficient data mining of large Ångströmlaboratoriet Lägerhyddsvägen 1 amounts of data, it is important to index high dimensional data to support KNN Hus 4, Plan 0 search. Xtree, an index structure for high dimensional data, was investigated and then Postadress: integrated into Amos II, an extensible functional Database Management System Box 536 751 21 Uppsala (DBMS).The result of the integration is AmosXtree, which has showed that the query time for KNN search on high dimensional data, is scale well with both database size Telefon: and dimensionality. 018 – 471 30 03 To utilize the functionality of AmosXtree, an example is given on how to define an Telefax: index structure in searching pictures. 018 – 471 30 00 Hemsida: http://www.teknat.uu.se/student Handledare: Tore Risch Ämnesgranskare: Tore Risch Examinator: Anders Jansson IT 10 017 Tryckt av: Reprocentralen ITC i TABLE OF CONTENTS ACKNOWLEDGEMENTS ..............................................................................................................................................IV 1. INTRODUCTION
    [Show full text]
  • Virus Bulletin, October 1994
    ISSN 0956-9979 OCTOBER 1994 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford CONTENTS Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, EDITORIAL Network Security Management, UK Live and Let Die 2 VIRUS PREVALENCE TABLE 3 NEWS Virus Total Reaches 5000 3 CPAV to Continue 3 Total Anonymity 3 IN THIS ISSUE: IBM PC VIRUSES (UPDATE) 4 To be the best. This months edition brings the biggest CONFERENCE REPORT Virus Bulletin comparative review yet of NLM anti-virus VB 94: The Return to Jersey 6 software (see pp.13-20). Ten products were tested, and the results may cause something of a surprise VIRUS ANALYSES 1. One_Half: The Lieutenant Commander? 9 Conference spotlight. VB 94 recently took place in 2. AntiEXE.A - Missing the Target? 11 Jersey - turn to page 6 for an in-depth report on what happened when. COMPARATIVE REVIEW Half way there? One_Half is a multi-partite virus NLMs in Depth 13 which uses some of the techniques developed by the PRODUCT REVIEW Dark Avenger in Commander_Bomber. As if this were Virex for the PC 21 not enough, it can also encrypt vital parts of the fixed disk. A detailed analysis is given on page 9. END NOTES & NEWS 24 VIRUS BULLETIN ©1994 Virus Bulletin Ltd, 21 The Quadrant, Abingdon, Oxfordshire, OX14 3YS, England. Tel. +44 (0)1235 555139. /94/$0.00+2.50 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form without the prior written permission of the publishers. 2 • VIRUS BULLETIN OCTOBER 1994 EDITORIAL Live and Let Die The Internet seems to have become the symbol of the computing revolution which we are told is going to change our lives forever.
    [Show full text]
  • DLCC Software Catalog
    Daniel's Legacy Computer Collections Software Catalog Category Platform Software Category Title Author Year Media Commercial Apple II Integrated Suite Claris AppleWorks 2.0 Claris Corporation and Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 1.0.2 --> 1.1.1 Update Apple Computer, Inc. 1984 400K Commercial Apple II Operating System Apple IIGS System 1.1 Apple Computer, Inc. 1986 800K Commercial Apple II Operating System Apple IIGS System 2.0 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.1 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.2 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 4.0 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 5.0 Apple Computer, Inc. 1989 800K Commercial Apple II Operating System Apple IIGS System 5.0.2 Apple Computer, Inc. 1989 800K Commercial Apple II Reference: Programming ProDOS Basic Programming Examples Apple Computer, Inc. 1983 800K Commercial Apple II Utility: Printer ImageWriter Toolkit 1.5 Apple Computer, Inc. 1984 400K Commercial Apple II Utility: User ProDOS User's Disk Apple Computer, Inc. 1983 800K Total Apple II Titles: 12 Commercial Apple Lisa Emulator MacWorks 1.00 Apple Computer, Inc. 1984 400K Commercial Apple Lisa Office Suite Lisa 7/7 3.0 Apple Computer, Inc. 1984 400K Total Apple Lisa Titles: 2 Commercial Apple Mac OS 0-9 Audio Audioshop 1.03 Opcode Systems, Inc. 1992 800K Commercial Apple Mac OS 0-9 Audio Audioshop 2.0 Opcode Systems, Inc.
    [Show full text]
  • Counteracting Viruses in MS-DOS Systems
    86-01-35 Counteracting Viruses in MS-DOS Previous screen Systems A. Padgett Peterson Payoff The trapdoors programmed into the first DOS-based personal computers still persist today, providing relatively easy access for viruses and worms. By learning how malicious software exploits these weaknesses, security managers can develop a coordinated defense to counteract virus attacks now and in the future. This article describes how MS-DOS start- up processes can become exposed to viruses, discusses various intrusion methods, and presents techniques for designing a safe computing environment. Problems Addressed Today's personal computers still bear striking similarities to the first units created during the 1970s. All of the trapdoors and loopholes developed by systems experts to permit BIOS-level programming in the early stages of development of these systems are still present today, providing easy access for viruses, worms, logic bombs, and Trojan horses. It is alarming that such low-level programs are no longer being fully documented by manufacturers; they are currently treating as proprietary the techniques that were widely disseminated just a few years ago. Administrators and systems managers who are responsible for the millions of dollars of corporate investment in trusted computing systems typically lack an in-depth understanding of these systems. Unfortunately, penetration techniques, though not readily available, are known to an underground of hackers. Although numerous antivirus products have become available, these products are as available to hackers as to legitimate users. Fortunately, defenses are available to the corporate systems manager that cannot be readily compromised by the individual computer user. A trusted computing environment can be developed that is low in cost and user impact, one that not only has a high degree of reliability but permits natural and easy growth.
    [Show full text]
  • Netware IPX Socket List
    Network Analysis Institute – www.netanalysis.org IPX/SPX Third-Party Assigned Sockets (HEX) All values listed herein are in hexadecimal (0x) format. 8000 NATIONAL ADVANCED SYSTEMS 8001 NATIONAL ADVANCED SYSTEMS 8002 NATIONAL ADVANCED SYSTEMS 8003 COMM DRIVER SPERRY CORP. COMPUTER SYSTEMS 8004 KTA 8005 KTA 8006 KTA 8007 KTA 8008 NOVELL - PROVO 8009 SPERRY TERM EMULATOR TURNBULL AUTOMATIONS 800A PRINT SERVER COMMUNICATION HORIZONS 800B DATA LANGUAGE CORP 800F BATRAM SANTA CLARA SYSTEMS 8010 OFFICE WARE CENTURY ANALYSIS 8011 UPS ELGAR CORP 8012 UPS ELGAR CORP 8013 CHI CORP 8014 INTEL - AMERICAN FORK 8015 COMPASS COMPUTING 8016 COMPASS COMPUTING 8017 COMPASS COMPUTING 8018 COMPASS COMPUTING 8019 COMPASS COMPUTING 801A COMPASS COMPUTING 801B COMPASS COMPUTING 801C COMPASS COMPUTING 801D COMPASS COMPUTING 801E COMPASS COMPUTING 801F NOVELL - SUNNYVALE LATIN AMERI 8020 NOVELL - SUNNYVALE LATIN AMERI 8021 NOVELL - SUNNYVALE LATIN AMERI 8022 NOVELL - SUNNYVALE LATIN AMERI 8023 MCAFEE ASSOCIATES 8024 BLUE LANCE NETWORK INFO SYS 8027 GATEWAY COMMUNICATIONS INC 8028 GATEWAY COMMUNICATIONS INC 8029 GATEWAY COMMUNICATIONS INC 802A FILE SHARING NETLINE INC 802B FILE SHARING NETLINE INC 802C INTEL - AMERICAN FORK 802D INTEL - AMERICAN FORK 802E ICM 802F C-TREE VAP FAIR COM 8030 MICROMIND 8031 MICROMIND 8032 NORTH STAR COMPUTERS 8033 NORTH STAR COMPUTERS 8034 X.25 GATEWAY RSJ SOFTWARE 8035 SANYO ICON INC 8036 DATA ACCESS CORP 8039 NET MANAGEMENT NOVELL - AUSTIN 803A BETA SOFT 803B PHASER SYSTEMS 803C PHASER SYSTEMS Page 1 Network Analysis Institute –
    [Show full text]
  • Product Support Bulletin
    Product Support Bulletin Subject: Apex Plus Hardware and Software Compatibility Lists Date: 4/19/89 PSB No: S-007 Page: 1 of 8 Originator: REM The purpose of this bulletin is to provide a current listing of tested hardware and software for the Apex Plus. All testing was performed by Seiko Epson Japan and the results were supplied to Epson America. This is not an all - inclusive list; there are many hardware options and applications that will work correctly that are not listed. Unless otherwise noted, all tests were conducted with the latest release of the Apex Plus MS - DOS operating system software and ROM BIOS. The products tested were certified in one of three ways: OK - Product works with full functionality NG - Product does not work - see compatibility note * Product works with partial functionality - see compatibility note The information provided does not constitute a guarantee or endorsement of any particular product or any specific use or application. Some of the products on the list may have software or hardware requirements which are not met by the Apex Plus personal computer. Therefore, while EPSON believes the information supplied is accurate, EPSON does not assume any responsibility for use of any of the products on the attached list. EPSON MAKES NO REPRESENTATIONS OR WARRANTIES, EITHER EXPRESS OR’ IMPLIED, WITH RESPECT TO THIS LISTING OR THE PRODUCTS REFERENCED IN THE LIST. EPSON SHALL NOT BE LIABLE FOR ANY LOSS, INCONVENIENCE OR DAMAGE, INCLUDING DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES, RESULTING FROM THE USE OR INABILITY TO USE ANY OF THE PRODUCTS LISTED.
    [Show full text]