Comquter Jse N -=Ocial ~Ervices ~Etwork Vol. 6 No. 2

Total Page:16

File Type:pdf, Size:1020Kb

Comquter Jse N -=Ocial ~Ervices ~Etwork Vol. 6 No. 2 Vol. 6 No. 2 ComQuterJse ~n-= ocial~ ervices~etwork Summer 1986 Networking: The Linking of People, Resources and Ideas TABLE OF CONTENTS Services Available ............ ... .......... ; . ......... ... ..... .. 3 Notes From The Editor ....... ..... .... ... ..... ...... .......... .. .. 4 Articles , Reviews and Reports ... ... ..... ............ ................. 4 What is CUSSnet and FlpONET? by Dick Schoech . ........ .... 4 A Description of CUSSnet nodes . .... .... .. .. ..... ... .. .. .. .. ... 4-6 .. 6-8 FIDO Brings Out the Crazies . ... .. .. ... ... 11-13 Selected Items from FIDONET News . ... .. .. .. ... .. .. .. .. 13-14 History of FIDOnet . .. .. ....... .. 14-15 " Virtual Offices" For Management Of The Mental Retardation Program and The ir Essential Funct ions by Gordon C. Krantz . .. .. .. .. 15-18 FIDONET Nodelis t as of 11 July 86 ... ... .. ... .. .. .. .... .. ....... .. .. .. 18_.28 CUSSnet : dipping from and aiding in Human Serv i ces . CoDDDuni cating at : 300- 2400 baud *· . *· 8 data bits 1 stop bit no parity *· Buil din g on FIDONET The Worl d 's Fir st * . I \ BBS Network * 1:00 \ (_: I_) *· ·* _ '@I_\ --~ -~--~~--------~~-~ -- -- -- \ \\ I : ( *) : \ ) ) _ _I -- CUSSnet : _u_: I \I I I FIDO \ [ Support provided by] _I I : : _\ I (_1 3015 __ ) Apple Computers (_l(_!( ____I (jm) I U.S. Robotics \ I & (gmb)\ I U.S. Department of Health and Human Services \ I OHDS, OPD \ I \ I~--~---~ ---------------------------~---------------' 2 About the Network Computer Use in Social Services (CUSS) Network is a call 817-273-3966 and type the file in the HELP file area called nonprofit association of professionals interested in exchanging FIDOLIST.80. Communications are at 300-2400 baud , 8 data information and experiences on using computers in the human bits, 1 stop bit and no parity. Almost any computer or terminal services. Members participate in the Network by : and modem will work. • Sending materials for the CUSSN Newsletter, such as: mem­ The Skills Bank allows members to locate or share specif­ ber needs, interests, hardware/software use, activities, ic knowledge , skills and experiences for providing information resources, ideas, experiences, computer applications, and about yourself. Contact Gunther R. Geiss, Adelphi U., School events. of Social Work , Garden City, NY 11530. • Participating in the electronic network , skills bank , software clearinghouse and subgroups. The Software Clearinghouse offers a computerized inven­ • Distributing Newletters at workshops and conferences. (I will tory of commercial and public domai n available human serv­ send newsletters to distribute or place on a resource table.) ice software, a software review file, and a software exchange. • Referring vendors to advertise their services and products Contact Walter LaMendola , Professor, School of Social Work, through the CUSSN. U. of Denver, Denver, CO 80208. • Holding local CUSSN meetings. Local meetings in Dallas/Ft. Special Interest Group (SIGs) are subgroups where sig­ Worth, Chicago, Baltimore and Australia have been nificant networking is occuring on a special topic . successful. Educators SIG, write Wallace Gingerich, School of Social Wel­ Network Dues: $1 O individuals, $15 institutions (payable in fare, U of Wisconsin-Milwaukee , Milwaukee , WI 53201 . U.S. Funds). Contact Dick Schoech , Associate Professor. Hospital Social Services SIG, write Mike King, Director of School of Social Work, The University of Texas at Arlington , Box Social Work and Discharge Planning , Saint Francis Hospital, 19129, Arlington, TX 76019. 100 Port Washington Blvd , Roslyn, NY 11576. The Newsletter is published approximately 4 times a year Area Groups: and is sent free to all network member s. Back issues $5 each. Baltimore , MO, contact Bob Elkin Professor, U of Maryland , School of Social Work and Communit y Planning , 525 W. Red­ The Electronic Network (CUSSnet) establishes local bulletin wood Street, Baltimore, MD 21201 board s, national and local mail and file transfer, downloading California , James M. Gardner , Department of Developme n­ of public doma in software , and access to numerous reposito­ tal Services, Fairview State Hospital, 2501 Harbor Boulevard, ries of electronically available information on human service Costa Mesa, CA 92626 computing. CUSSnet builds on FIDONET, approximately 900 Australia , Floyd Bolitho, La Trobe U., School of Social Work, microcomputer-based local bulletin boards across the U.S. and Bundoora Victoria, Australia, 3083. in 9 continents . Contact Dick Schoech for your local node , or CUSSN ADVISORY BOARD MEMBERS Floyd H. Bolitho, Assistant Professor, La Trobe U., School of Social Work , Bundoora Victoria, Australia, 3083 Robert Elkin Professor, U of Maryland , School of Social Work and Communit y Planning , 525 W. Redwood Street, Baltimore, MD 21201 Marilyn Flynn, Professor, U of Illinois-Urbana Champaign , 1207 W. Oregon St., Urbana , IL 61801 James M. Gardner , Department of Developmental Services, Fairview State Hospital , 2501 Harbor Boulevard , Costa Mesa, CA 92626 Gunther R. Geiss, Associate Professor, Adelphi U. School of Social Work, Garden City, NY, 11530 Wallace Gingerich, U. of Wisconsin-Milwauk ee School of Social Welfare, Milwaukee, WI 53201 . Michael Gorodezky , Poolman, Shih & Platton, Inc., Information System Consultants, 1810 Grand Ave, Santa Barbara, CA 93103 Mike King, Director , Social Work/Discharge Planning, St Francis Hospital , Port Washington Blvd, Roslyn, NY 11576 Ursula Koch, Fachhoch schule Ostfriesland, Constantiaplztz 4 D-2970 Emden, Germany , Europe Camille Lambert, Professor, Faculty of Social Work , U. of Toronto , 246 Bloor St. W., Toronto , Ontario M5S 1A 1, Fido net 111/38 1 Walter LaMendola , PhD , Professor, School of Social Work, U. of Denver, Denver , CO 80208 F Dean Luse, President , Outpst Inc., 119 Wilson, Park Forest, IL 60466 , Fidonet 115/396 Alain MAZET , 10 Boulevard Gambetta , 87000 LIMOGES, France Menachem Monnickendam, Deputy Director, Dept. of Development of Local Social Services, Ministry of Labor and Social Affairs, POB 1260 , Jerusalem , Israel 9100 . Laurence Moseley, Computer Science Dept. , University College , Singleton Park, Swansea, United Kingdom SA2 8pp Thomas Neudecker , Assistant Vice President for Academic Affairs, Carnesie Mellon U. 5000 Forbes Ave. , Pitts­ burgh , PA 15213, Fidonet 129/384 Lynn Harold Vogel, Assistant Professor, U. of Chicago , School of Social Service Administration , 969 E. 60th St., Chicago , IL 60637 , Fidonet 129/384 CUSS Network Newsletter , Summer 86 3 Services Available Vendor/Consultant Contact Person Services Illino is OUTP ST, Inc. F. Dean Luse, Ph.D., Consultation on feasibility and information system planning. Provides Drawer CNC6 CSW, President help with accountability , forms & report design, decision support 119 Wilson St., (31 2) 7 48-3854 systems, database de velopme nt, software selection & evaluation , Park Forest, IL 60466 train ing yo ur staff to use computer systems Extensive micro and mainframe computer experience. Synergis tic Office Joseph Zefran , MSW The SOS team of human serv ice/comp uter profe ssionals help you Systems (SOS) (312) 680-8383 with ready-to-use SOFTWARE exclusive ly for nonprofits - Fund Ac ­ 438 Peterson Road (312) 275 -3747 counting , Donor /Fun Raising , Client Service/ Receivables - and a full Libertyville, IL 60048 range of SERVICES - feasibility studies , programming, training , and support. Florida Commu nity Service Counci l Susan K. Buza, Exec utive Full range of consulting and technical support in the automation of of Broward County , Inc. Director Social and Human Services. Systems include Agency Invento­ 1300 S. Andrews Avenue (305) 524-8371 ry/Directory Production , Information & Referral, Client Case Manage ­ P.O. Box 22877 ment , Mental Health Client Tra cking , Statewide Netwo rking , Trans­ Fort Lauderd ale, FL 33335 portation Scheduling, Carpool Matching . Maryland KBL Group , Inc. Karen . Levitan, Ph.D., Services to help you use information , technology , and systems as 'Knowledge Based Living' President, professional resources . We work for you ; we work with you; we help 808 Pershing Drive #100 (301) 588-4633 you do it yourse lf. Silver Springs, MD 20910 New York King Associates , LTD . Michael A. King , D.S.W. Microcomputer software for socia l work and for discharge planning 215 Shoreward Drive (516) 497-5995 departments . Customization also available. Great Neck, N.Y. 11021 New Yo rk/New Jersey RFM/Associates , Inc . Rod Monger , PhD , A consulting and training firm whose associates are academics and One Bridge Plaza , (201) 592-5895 experienced professionals . Services include programming , manage­ Suite 400 ment development and training , systems design techinical writing , Ft. Lee , NJ 07024 planning , security audits, and personnel searches . Write for brochure with full description of services. No charge for initial consultation . Micro specialization . Rhode Island Applied Innovations , Inc. 800 -272-2250 A developer and manufacturer of over 20 software programs South Kingstown Office Park 401- 789-5081 designed to operate on popular microcomputers . The programs are Wakefield , R.I. 02879 fully supported, documented and operational in hundreds of loca­ tions . Programs assist with Psychological testing (eg MMPI) office management (eg billing /insurance forms) or Assessment (eg psy­ chosoc ial histories). Texa s Dick Schoech , Ph.D. (81 7) 273-3964 Consultation and training on information systems feasibility , design , 1311 W. Lavender
Recommended publications
  • History of the Internet-English
    Sirin Palasri Steven Huter ZitaWenzel, Ph.D. THE HISTOR Y OF THE INTERNET IN THAILAND Sirin Palasri Steven G. Huter Zita Wenzel (Ph.D.) The Network Startup Resource Center (NSRC) University of Oregon The History of the Internet in Thailand by Sirin Palasri, Steven Huter, and Zita Wenzel Cover Design: Boonsak Tangkamcharoen Published by University of Oregon Libraries, 2013 1299 University of Oregon Eugene, OR 97403-1299 United States of America Telephone: (541) 346-3053 / Fax: (541) 346-3485 Second printing, 2013. ISBN: 978-0-9858204-2-8 (pbk) ISBN: 978-0-9858204-6-6 (English PDF), doi:10.7264/N3B56GNC ISBN: 978-0-9858204-7-3 (Thai PDF), doi:10.7264/N36D5QXN Originally published in 1999. Copyright © 1999 State of Oregon, by and for the State Board of Higher Education, on behalf of the Network Startup Resource Center at the University of Oregon. This work is licensed under a Creative Commons Attribution- NonCommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/deed.en_US Requests for permission, beyond the Creative Commons authorized uses, should be addressed to: The Network Startup Resource Center (NSRC) 1299 University of Oregon Eugene, Oregon 97403-1299 USA Telephone: +1 541 346-3547 Email: [email protected] Fax: +1 541-346-4397 http://www.nsrc.org/ This material is based upon work supported by the National Science Foundation under Grant No. NCR-961657. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
    [Show full text]
  • Telecommunications Infrastructure for Electronic Delivery 3
    Telecommunications Infrastructure for Electronic Delivery 3 SUMMARY The telecommunications infrastructure is vitally important to electronic delivery of Federal services because most of these services must, at some point, traverse the infrastructure. This infrastructure includes, among other components, the Federal Government’s long-distance telecommunications program (known as FTS2000 and operated under contract with commercial vendors), and computer networks such as the Internet. The tele- communications infrastructure can facilitate or inhibit many op- portunities in electronic service delivery. The role of the telecommunications infrastructure in electronic service delivery has not been defined, however. OTA identified four areas that warrant attention in clarifying the role of telecommunications. First, Congress and the administration could review and update the mission of FTS2000 and its follow-on contract in the context of electronic service delivery. The overall perform- ance of FTS2000 shows significant improvement over the pre- vious system, at least for basic telephone service. FTS2000 warrants continual review and monitoring, however, to assure that it is the best program to manage Federal telecommunications into the next century when electronic delivery of Federal services likely will be commonplace. Further studies and experiments are needed to properly evaluate the benefits and costs of FTS2000 follow-on options from the perspective of different sized agencies (small to large), diverse Federal programs and recipients, and the government as a whole. Planning for the follow-on contract to FTS2000 could consider new or revised contracting arrangements that were not feasible when FTS2000 was conceived. An “overlapping vendor” ap- proach to contracting, as one example, may provide a “win-win” 57 58 I Making Government Work situation for all parties and eliminate future de- national infrastructure will be much stronger if bates about mandatory use and service upgrades.
    [Show full text]
  • The Future of the Internet and How to Stop It the Harvard Community Has
    The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Jonathan L. Zittrain, The Future of the Internet -- And How to Citation Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Accessed July 1, 2016 4:22:42 AM EDT Citable Link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 This article was downloaded from Harvard University's DASH Terms of Use repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms- of-use#LAA (Article begins on next page) YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S.
    [Show full text]
  • CS5865 Laboratory #1 Notes File Transfer Protocols
    1 CS5865 Laboratory #1 Notes File Transfer Protocols - An Overview Dr. B.J. Kurz XMODEM (Ward Christensen, 1970), one of the earliest ‘industry standard’ file transfer protocols in the public domain. HDX operation, character (byte)-oriented, fixed-length 128-byte blocks, 8-bit characters (bytes), 8-bit BCC = sum-mod256, stop-wait ARQ, block counts, binary data capability. Poor error detection capability, typically 95%. data block format: SOH/count/1’s compl. count/ user data/BCC control block format: ACK or NAK (or C), EOT Several later versions of XMODEM are in use: XMODEM-CRC same as regular XMODEM above except uses 8-bit BCC = CRC-8 (some implementations use 16-bit BCC = CRC-16). Better error detection capability, typically 99.97% (for CRC-8). Some versions negotiate the error character generation method: the sender first tries sum- mod256 BCC, then switches to CRC-8 BCC after three unsuccessful attempts indicated by NAKs from the receiver. XMODEM-1K same as XMODEM-CRC except uses 1024-byte blocks for better throughput (fewer line- turn-arounds), but slightly degraded error detection performance. WXMODEM a sliding-window version of XMODEM. Group size is fixed as 4 blocks. Much improved throughput. FDX capable lines needed if continous-ARQ error recovery used. YMODEM (Chuck Forsberg) a variation of XMODEM-1K. Supports two block lengths of 128 bytes and 1024 bytes, uses 2-byte CRC-16, excellent error detection capability, typically 99.99%. KERMIT (Frank de Cruz, Columbia Univ. Comp. Center, N.Y), most popular file transfer protocol, copyrighted, over 200 implementations for various systems. This is a comprehensive 2 remote communications package including terminal emulators, storage-to-storage transfer, not only a file transfer protocol.
    [Show full text]
  • Application Research and Evaluation Methods of Instant Messaging Software
    International Journal of Multimedia and Ubiquitous Engineering Vol.11, No.7 (2016), pp.279-290 http://dx.doi.org/10.14257/ijmue.2016.11.7.28 Application Research and Evaluation Methods of Instant Messaging Software Sun Beibei Zibo Vocational Institute, Zibo, China, 255314 [email protected] Abstract With the rapid development of computer and communication technology, instant messaging software has become more and more important communication platform, but because of the diversity of the instant communication software, there have not unified specification management, lack of evaluation research for the system. Aiming at finding instant messaging software how to affect the use factors of the user, this paper uses the hierarchy analytic process (hap) and Delphi method, established the application evaluation system of instant messaging software, the usage of instant messaging software and services function be researched. Keywords: Instant messaging software; Delphi method; Hierarchy Analytic process (hap); Evaluation system 1. Introduction Instant messaging (IM) refers to a business that can carry on the Internet information to send and receive instantly, communication instantly [1]. Since 1998, IM obtained the swift and violent development, its function also more and more perfect, such as have blogs, search, music, games, etc. IM started only simple chat, now it has developed into a comprehensive information platform, integrated with news and information, communication, electronic commerce, entertainment, search, office collaboration and enterprise customer service, etc. all kinds of information. E-mail as a communication tool, but it has its own disadvantages, such as ductility flawed, however IM just make up for the shortcomings, makes the terminal capable of communications at any time, contact at any time to view the status information.
    [Show full text]
  • Free Chat Application for Mobile
    Free Chat Application For Mobile Well-defined Dimitrios sometimes ruralized his coercionists expressively and coze so unmeasurably! Falconine and possessive Ambrose typecast her Cantab dig treacherously or forge seasonably, is Dave foveate? Marko withdrawing binocularly while silty Rad citrate lowest or clapboard conversely. As free chat application for mobile and only LiveChat Applications Live Chat App. Line application for free to choose the pro features are a welcome back. Olark is a seamless process. Very informative article tuition is. Chat app store that you can plug it offers basic visitor behavior or business with a popular than one place for hcl including text? Can I use it pinch my desktop? Look for free to use the application in addition of. Crisp free chat with the app will not just one for mobile application enables you are. Please publish an employee account may be rotten to mark statistics as favorites. You for free by providing fast. The developer will be required to enjoy privacy details when they submit or next app update. Free version covers most basic requirements Live chat support apps for mobile devices Gorgeous multi-language chat widgets Analytics and. Allows for free and chats with a free plan to extend or pwas are many online project supported for you can keep yourself how? Slack his work happens. Free 14-day trial your plan features No credit card required Desktop Apps. Chat App Maker Mobile app builder Shoutem. Best live Chat Software 2021 Reviews of agriculture Most Popular. Keep sharing more interesting posts. Hire a Zapier Expert to help someone improve processes and automate workflows.
    [Show full text]
  • Trojans and Malware on the Internet an Update
    Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY Abstract This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet - throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses the status of hostile active content on the Internet, including threats from Java and ActiveX, and re-examines the impact of these types of threats to Internet users in the real world. Observations related to the role of the antivirus industry in solving the problem are considered. Throughout the paper, technical and policy based strategies for minimizing the risk of damage from various types of Trojan horses on the Internet are presented This paper represents an update and summary of our research from Where There's Smoke There's Mirrors: The Truth About Trojan Horses on the Internet, presented at the Eighth International Virus Bulletin Conference in Munich Germany, October 1998, and Attitude Adjustment: Trojans and Malware on the Internet, presented at the European Institute for Computer Antivirus Research in Aalborg, Denmark, March 1999. Significant portions of those works are included here in original form. Descriptors: fidonet, internet, password stealing trojan, trojanized system, trojanized application, user behavior, java, activex, security policy, trojan horse, computer virus Attitude Adjustment: Trojans and Malware on the Internet Trojans On the Internet… Ever since the city of Troy was sacked by way of the apparently innocuous but ultimately deadly Trojan horse, the term has been used to talk about something that appears to be beneficial, but which hides an attack within.
    [Show full text]
  • The Kermit File Transfer Protocol
    THE KERMIT FILE TRANSFER PROTOCOL Frank da Cruz February 1985 This is the original manuscript of the Digital Press book Kermit, A File Transfer Protocol, ISBN 0-932976-88-6, Copyright 1987, written in 1985 and in print from 1986 until 2001. This PDF file was produced by running the original Scribe markup-language source files through the Scribe publishing package, which still existed on an old Sun Solaris computer that was about to be shut off at the end of February 2016, and then converting the resulting PostScript version to PDF. Neither PostScript nor PDF existed in 1985, so this result is a near miracle, especially since the last time this book was "scribed" was on a DECSYSTEM-20 for a Xerox 9700 laser printer (one of the first). Some of the tables are messed up, some of the source code comes out in the wrong font; there's not much I can do about that. Also (unavoidably) the page numbering is different from the printed book and of couse the artwork is missing. Bear in mind Kermit protocol and software have seen over 30 years of progress and development since this book was written. All information herein regarding the Kermit Project, how to get Kermit software, or its license or status, etc, is no longer valid. The Kermit Project at Columbia University survived until 2011 but now it's gone and all Kermit software was converted to Open Source at that time. For current information, please visit the New Open Source Kermit Project website at http://www.kermitproject.org (as long as it lasts).
    [Show full text]
  • Download, Including1 17N REU, Ramlink Partition, Jimymon-64 (ML Monitor)
    C 0 T E T S ISSUE Published June 1996 COMMODORE WORLD 6 Wheels-Laying More Than A Patch THE NEWS MAGAZINE FOR COMMODORE 64 » 1'■ I 1J',[ K1. Bruce Thonuu 14 GOFA-A Modulap- Pcogpamming System Fob The Coeimodore 64 http://wviw.cmiweb.am/cwhtme.hlml George Flanagan General Manager Chinks ft Christiansen ♦ Editor Review; Doug Cot Ion ♦ 24 Software: Centipede 126 E>r Gaelwe R. Gasson Advegtisinq Sales A Look ai ihe Newesi Commodore I2S BBS Program Charles A. Christiansen (413) 525-0023 ♦ Graphic Acts Doug Cotton .UMN! '♦ 26 Jusr Fob Starters by Jason Compton Electronic Pre-Press & Pointing Maiuir/Holden Helpful Hints for Handling Disk Drives ♦ 30 Graphic Interpretation by Bruce Thomas Cover Design by Doug Cotton GEOS: For ti Good lime... 32 Carrier Detect by Gaelyne B. Gasson Tclecommunicationi News & Updates 36 S16 Beat by Mark Fellows Things to Look Out For When Program/Hint- the 65X16 Commodore1" and [he respective Commodore producl names are trademarks or registered trademarks of Commodore, a 38 Over The Edge by Jeffrey L. Jones division of Tulip Compulers. Commodore World is in no way aftiliated wilrtthe owner n! ".he Commodore logo ana technology. Commodore Programming in a SuperCPU World Commodore Worla (ISSN 1078-2515) is published 8 limos annually by Creative Micro Designs. Inc.. 15 Benton Drive, Easl Longrneadow MA 01028-0646. Secono-Class Postage Paid at EasL Longmeaflow MA. (USPS «)n-801| Annual subscnpiion rale is USS29.95 fci U.S. addresses. USS35.95(orC3nada0'Maiico.USSJS.95!orallECCounlnB5. Department paymanlsmusl be provided in U S. Dollars. Mail subscriptions 2 From the Editor to CW Subscriptions, do Crestiva Micro Designs.
    [Show full text]
  • Copyrighted Material
    Index AAAS (American Association for adolescence Mali; Mauritania; the Advancement of Science), identity development among, Mozambique; Namibia; 91 306 Nigeria; Rwanda; Senegal; Aakhus, M., 178 identity practices of boys, 353 South Africa; Tanzania; Aarseth, Espen, 292n revelation of personal Uganda; Zambia abbreviations, 118, 120, 121, 126, information by, 463 African-Americans, 387 127, 133, 134 psychological framework of, 462 identity practices of adolescent ABC (American Broadcasting advertising, 156, 329, 354, 400, boys, 353 Company), 413, 416 415, 416, 420–1 political discussion, 174 ABC (Australian Broadcasting banner, 425 African Global Information Commission), 420 elaborate and sophisticated, 409 Infrastructure Gateway Aboriginal people, 251, 253, porn, 428 Project, see Leland 257–8, 262, 263 revenues, 417, 418, 419, 435 age, 280, 431, 432 abusive imageries, 431 Advertising Age, 417 porn images, 433 accessibility, 13, 50–1, 53, 424 aesthetics, 391, 425, 428, 430, agency, 44, 53, 55, 62, 312 balancing security and, 278 434 conditioned and dominated by control of, 388 alternative, 427 profit, 428 increasing, 223 digital, 407 technologically enhanced, 195 limited, 26 familiar, 435 AHA (American Historical private, 94 games designer, 75 Association), 86 public, 94, 95 play and, 373 Ahmed, Sara, 286–7, 288 see also Internet access promotional, 409 AILLA (Archive of the Indigenous accountability, 151, 191, 199, Afghanistan, 205 Languages of Latin America), 207, 273, 276, 277 AFHCAN (Alaska Federal 263 balancing privacy and, 278 Healthcare
    [Show full text]
  • Configuration Parameters
    Good news, everyone! User Documentation Version: 2020-01-01 M. Brutman ([email protected]) http://www.brutman.com/mTCP/ Table of Contents Introduction and Setup Introduction..............................................................................................................................................................8 What is mTCP?...................................................................................................................................................8 Features...............................................................................................................................................................8 Tested machines/environments...........................................................................................................................9 Licensing...........................................................................................................................................................10 Packaging..........................................................................................................................................................10 Binaries.....................................................................................................................................................................10 Documentation..........................................................................................................................................................11 Support and contact information.......................................................................................................................11
    [Show full text]
  • Imperial College of Science and Technology, University of London, Department of Computing
    Imperial College of Science and Technology, University of London, Department of Computing. HIGH EFFICIENCY, CHARACTER-ORIENTED, LOCAL AREA NETWORKS by Martin Cripps This thesis is submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy and the Diploma of Imperial College of Science and Technology, January 1988. For Clare Attempt the end His reasons are as two grains of wheat but never stand to doubt hid in two bushels of chaff. nothing's so hard You shall seek all day ere you find them but search and when you have found them will find it out they are not worth the search. Robert Herrick (1591-1674) William Shakespeare (1564-1616) 1 ABSTRACT This thesis explores the problem of interconnecting character-oriented devices over local area networks by investigating significant aspects of hardware, software, protocol and operational factors. It proposes effective and efficient solutions which were tested during a full-scale experiment The results of that experiment demonstrate convenient, cost-effective and reliable operation. The novelty of this investigation arises from its character-oriented approach. Much work has been carried out by others on local area networks which transfer blocks of data efficiently, however, a large majority of installed devices operate on a character-by-character basis and will continue so to do for some considerable time. This study is approached through analysis of the low efficiency of international standard networks for this class of device which defines the scope of this work. An original analysis of the potential mechanisms which can be used to give high efficiency and low delay for this class of transfer is then derived.
    [Show full text]