The Use of Technology in Adult Literacy Programs. SPONS AGENCY Australian Dept

Total Page:16

File Type:pdf, Size:1020Kb

The Use of Technology in Adult Literacy Programs. SPONS AGENCY Australian Dept DOCUMENT RESUME ED 319 930 CE 054 878 AUTHOR Anderson, Jonathan; And Others TITLE The Use of Technology in Adult Literacy Programs. SPONS AGENCY Australian Dept. of Employment, Education and Training, Canberra. PUB DATE Jan 90 NOTE 189p. PUB TYPE Reports - Descriptive (141) EDRS PRICE MF01/PC08 Plus Postage. DESCRIPTORS *Adult Basic Education; Adult Literacy; Adults; Basic Skills; Computer Assisted Instruction; *Computer Software; Educational Media; Educational Resources; *Educational Technology; Foreign Countries; Functional Literacy; Hypermedia; Interactive Video; *Literacy Education; *Multimedia Instruction; Teaching Methods; Teleconferencing IDENTIFIERS *Australia ABSTRACT This document describes the use of educational technology (including radio, television, computers, telephones, satellites, and optical laser discs) in adult literacyprograms in Australia. Chapter 1 describes the scope of the study thatresulted in the document and defines both literacy and educationaltechnology. Chapter 2 contains a generalized set of questions thatcan be asked about any educational technology and that providea framework for evaluating educational technology. Chapter 3 describes theuse of educational technology in adult literacyprograms in Australia. Descriptions of the technologies in use are included for printmedia, audio material supporting print material, radio, videoand television, subtitling, computers, drill and practice,simulation programs, word processing, word and text manipulation, story programs, databases, computer peripherals, teleconferencing, optical laser discs, CD-ROM, videodisc, and hypermedia. Chapters 4-9present case studies of the use of technology in particular literacy programs. Chapter 10 describes computer software programs thatare appropriate for use in adult literacy classes. Chapter 11 isdevoted to an exploration of the uses of HyperCard and HyperStoryin adult literacy learning. Chapter 12 considers emerging issuesand the potential of using educational tech slogies in adultliteracy education. The document concludes with 121references. (CML) *********************************************************************** Reproductionq supplied by EDRS are the best thatcan be made from the original document. *********************************************************************** = vz cm cn ,--( cyz The Use of Technology = ;4 in Adult Literacy Programs Jonathan Anderson Alison Cheatham Richard Grice Brian Marshall "PERMISS,ON TO REPRODUCETHIS U.S. DEPARTMENT OF EDUCATION GRANTED BY OffceEchcabonal Research end Improvement MATERIAL HAS BEEN EDU T1ONAL RESOURCES INFORMATION CENTER (ERIC) Ttus document has been reproduced as recemed from the person or organuabon ohonattng et CI Maar ChangeS have been made to Improve recoducbon cuaidy RESOURCES Punts of view of opuhons stated let t tus docu- TO THE EDUCATIONAL ment do not necessarily represent Wham INFORMATION CENTER(ERIC)7 OERI post on or PIHICY January, 1990 Preface This Report on the use of technology in adult literacyprograms was commissioned by the Department of Employment, Education and Training,and was conducted under the auspices of the Adult Literacy Action Campaign,as part the Federal Government's National Policy on Languages. The study was directed by Jonathan Anderson, Professorof Education at Flinders University. Alison Cheetham actedas research assistant for the duration of the project. Richard Grice, Senior Lecturer in Educationat the University of Queensland, joined the research team for part of his study leave, duringwhich time he assisted in the evaluation. The fourth member of the researchteam was Brian Marshall who participated in some of the case studiesas part of a Master of Education degree. Thanks are due to the representatives of the AustralianCouncil of Adult Literacy in the different States who assisted in providinginformation about developments in technology in their States, and especiallyto Linda Are, Marian Norton, Christine O'Callaghan, Colleen Smith, and Aileen Treloar.To the many officers within TAFE who provided further information,we gratefully acknowledge their help: Jennifer Cameron, Brian Kenworthy, Vic Margan,Brian Nussey, Rosie Wickert, Julia Zimmerman. Those who were involved in developingthe technology described in this Report were most open in sharing withus current developments and future projections. and here we acknowledge the professionalismof Trevor Lloyd, Herb Peppard, and Tony Schick. To the many teachers and administratorsJenny Charlesworth, Lorraine Glacken, Rebecca Noble, Anita Steinerts, DonStrempl, as well as many othersand to all students in adult literacy classes with whomwe spoke, we thank them for the time they freely gave. This Reportwas only possible because of the help of all these people. Jonathan Anderson Alison Cheetham Richard Grice January, 1990 Brian Marshall ii 3 CONTENTS 1Scope of Report Aims and purposes Extent of adult illiteracy in Australia Adult literacy provision Defining literacy Literacy for whom? Native English adult speakers Aboriginal adults Adults with disabilities Adults from non-English speaking backgrounds What is educational technology? Report overview 2Evaluating the Potential of Technology 7 A framework for evaluation Questions for administrators Questions for teachers Questions for adult learners Applying the evaluation framework 3Technology in Use in Adult Literacy Programs 13 What's happening in Australia Queensland, New South Wales, Victoria, The Australian Capital Territory, Tasmania and the Northern Territory, South Australia, Western Australia What's happening overseas The United States, Britain, Canada Overview of technology in use Print media Audio material supporting print material Radio Video and television Subtitling Computers Drill and practice, Simulation programs, Word processing, Word and text manipulation, Story programs, Shell programs, Databases Computer peripherals Teleconferencing New generation technologies Optical laser discs CD-ROM Videodisc Hypermedia Case studies of technology in use Technology and Adult Literacy iii 4 4 CASE STUDY: Computers as Tools in LiteracyAcquisition 3a. Background to case study What the literature says about computer-based learning How the study was conducted Examining the technologies, Observations, Interviews Recent history of the Adult Literacy Unit Negotiating learning objectives A session at the Adult Literacy Unit From the students' point of view Expectations, Needs, Feedback and interest level,Learning and ease of use From the teacher's point of view Outcomes and interest, Adaptability, Appropriateness,Flexibility and ease of use From the administrator's point of view Costs, Objectives, Access and outcomes, Management Conclusion 5CASE STUDY: Literacy at a Distance with Teleconferencing 4 5 Background to case study First experience of a teleconference Teleconferencing and DUCT Aborigines use teleconferencingto acquire literacy How the study was conducted Literature about teleconferencing The hardware From the teachers' perspective Objectives and outcomes, Approach and interest,Appropriateness, Flexibility and adaptability, Learning, Familiarity,Portability and convenience, Ease of use From the administrator's perspective Objectives and outcomes, Approach, Access andmanagement, Services and support, Costs From the perspective of students Enhancing the technology Conclusion 6CASE STUDY: Using Narrowcast Television toTarget Aboriginal Communities 62 Background to case study Observation of an interactive televisionprogram What is narrowcast television? How the study was conducted Narrowcast television and interactive televisionsurvey The equipment The television series From an administrator's perspective Objectives and outcomes, Approach, Access,Management, Service and support, Costs From the teacher's perspective Objectives, Outcomes, Approach and interestlevel, Appropriateness, Flexibility, Adaptability and learning,Familiarity, Portability and convenience, Ease ofuse, Overview From a student's perspective Conclusion iv Technology and Adult Literacy 5 7CASE .STUDY: Lexiphon A New Literacy Tool for Trade Training 75 Background to case study What is Lexiphon? Lexiphon literacy materials What has been written about Lexiphon? Trial of Lexiphon Features of the Lexiphon system Objectives and outcomes, Methodology and approach, Access, Management and support, Costs, Other features Concluding comments 8CASE STUDY: Talking Computers for the Blind 90 Talking computers in the literature Synthesised speech, Digitised speech How the study was conducted Examining the technologies, Observation, Interviews Recent history of the Alternate Print Unit The computer communications course The talking computer Normal scanning mode, Input mode, Output mode, Spell mode From the students' point of view From the teacher's point of view Role changes, Flexibility From the administrators' point of view Objectives, Outcomes, Attitudinal changes Conclusion 9 CASE STUDY: Interactive VideodiscA Tool for ESL Learners 103 What is The Aussie Barbie? How the study was conducted What has been written about The Aussie Barbie? The hardware needed What is in the package? The videodisc, Transcripts, Teachers' Guide, Learners' Guide, Student record sheets, Computer disks From the student point of view From the teacher's point of view From an administrator's point of view Conclusion The Aussie Barbie: an evaluation, Interactive videodisc: the future Technology and Adult Literacy 6 10 Software for Adult Literacy Learners 120 Current applications Software evaluation in the
Recommended publications
  • Mac OS 8 Update
    K Service Source Mac OS 8 Update Known problems, Internet Access, and Installation Mac OS 8 Update Document Contents - 1 Document Contents • Introduction • About Mac OS 8 • About Internet Access What To Do First Additional Software Auto-Dial and Auto-Disconnect Settings TCP/IP Connection Options and Internet Access Length of Configuration Names Modem Scripts & Password Length Proxies and Other Internet Config Settings Web Browser Issues Troubleshooting • About Mac OS Runtime for Java Version 1.0.2 • About Mac OS Personal Web Sharing • Installing Mac OS 8 • Upgrading Workgroup Server 9650 & 7350 Software Mac OS 8 Update Introduction - 2 Introduction Mac OS 8 is the most significant update to the Macintosh operating system since 1984. The updated system gives users PowerPC-native multitasking, an efficient desktop with new pop-up windows and spring-loaded folders, and a fully integrated suite of Internet services. This document provides information about Mac OS 8 that supplements the information in the Mac OS installation manual. For a detailed description of Mac OS 8, useful tips for using the system, troubleshooting, late-breaking news, and links for online technical support, visit the Mac OS Info Center at http://ip.apple.com/infocenter. Or browse the Mac OS 8 topic in the Apple Technical Library at http:// tilsp1.info.apple.com. Mac OS 8 Update About Mac OS 8 - 3 About Mac OS 8 Read this section for information about known problems with the Mac OS 8 update and possible solutions. Known Problems and Compatibility Issues Apple Language Kits and Mac OS 8 Apple's Language Kits require an updater for full functionality with this version of the Mac OS.
    [Show full text]
  • ADMINISTRATION GUIDE Version 7.2
    GUIDE STORMSHIELD ENDPOINT SECURITY ADMINISTRATION GUIDE Version 7.2 Document last update: June 2, 2021 Reference: ses-en-administration_guide-v7.2 SES - ADMINISTRATION GUIDE - V 7.2 Table of contents Preface 9 Thanks! 9 What is the target audience? 9 Contact 9 1. Use environment 10 1.1 Recommendations on security watch 10 1.2 Recommendations on keys and certificates 10 1.3 Recommendations on algorithms 10 1.4 Recommendations on administrators 10 1.5 Recommendations on workstations 10 1.6 Recommendations on administration workstations 11 1.7 Certification and qualification environment 11 2. Stormshield Endpoint Security Overview 12 2.1 Concepts 12 2.1.1 Concept 1: Integrated security 12 2.1.2 Concept 2: Proactive protection 12 2.1.3 Concept 3: Adaptive control 13 2.1.4 Concept 4: Flexible policy control 13 2.1.5 Concept 5: Application of policies based on the organization's directory 13 2.1.6 Concept 6: Information feedback 13 2.1.7 Concept 7: Data encryption 13 2.2 Protection mechanisms 13 2.2.1 Rule-based protection 14 2.2.2 Automatic protections 14 2.3 Architecture 15 2.3.1 Concepts 15 2.3.2 Stormshield Endpoint Security components 15 2.4 Packages and licenses 18 2.4.1 Packages 18 2.4.2 Licenses 21 3. Stormshield Endpoint Security Installation and Uninstallation 24 3.1 Downloading the Stormshield Endpoint Security software 24 3.1.1 Downloading from the client area 24 3.1.2 Checking software authenticity 24 3.2 System prerequisites for Stormshield Endpoint Security under Windows 25 3.2.1 Active Directory prerequisites 25 3.2.2 Stormshield
    [Show full text]
  • Final Version of Thesis
    JAPANESE INNOVATION STRATEGY AND THE ACQUISITION OF UK INFORMATION TECHNOLOGY FIRMS T H W Minshall Christ’s College, Cambridge A dissertation submitted to the University of Cambridge for the Degree of Doctor of Philosophy Cambridge University Engineering Department April 1997 Preface Except for commonly understood and accepted ideas, or where specific reference is made, the work reported in this dissertation is my own and includes nothing which is the outcome of work done in collaboration. No part of the dissertation has been previously submitted to any university for any degree, diploma or other qualification. T H W Minshall Cambridge April 1997 Acknowledgements I am particularly grateful to my supervisor, Elizabeth Garnsey, for her guidance and support throughout the course of this research. In addition, thanks are due to Nick Oliver and Hugh Whittaker, and all my colleagues at the Manufacturing and Management Division of the Engineering Department, and at the Judge Institute of Management Studies for their advice and constructive criticism. On the industry side, my gratitude to the companies in the UK and Japan who agreed to contribute to the contents of this dissertation. Finally, my thanks to my family, for encouraging me, and to Nicola, for all her support and for applying her new-found skills at proof-reading. This programme of research was supported by a Postgraduate Training Award (J00 429 332012) from the ESRC. Table of contents Chapter 1 Introduction ...........................................................................................................
    [Show full text]
  • Keystroke Recorder Attack on a Client/Server Infrastructure
    Keystroke Recorder Attack on a Client/Server Infrastructure Randy Marchany, Tom Wilson VA Tech Computing Center Blacksburg, VA 24060 8/2/96 Abstract This paper describes and analyzes a simple attack on a client/server infrastructure. We had no knowledge of the software being used by the client/server systems but did have moderate knowledge of the Macintosh computer. We built a trojan program that installs keystroke recorder software on target client systems without the owner’s knowledge. The recorder software captured all characters entered by the client software users. The recorder log was then transferred back to a Mac system for analysis. This attack can be Internet or Intranet based. This is a demonstration of the ability of a novice attacker to use sophisticated tools with success on a typcial client/server infrastructure. “No true hacker would ever admit to his peers that he could break into a Mac. What skill is there in that?” -Internet Truism 1.0 Introduction In general, standard PC and Mac operating systems do not employ adequate access controls to prevent anyone from installing unwanted software on the system. This poses one of the greatest threats to a company’s client/server structure. PC’s and Mac’s are vulnerable to a wide range of virus, trojan horse, and socially engineered software attacks. There has been considerable discussion on the security features of the client/server projects. IS staffs have anticipated that network sniffer software would be employed to intercept traffic between the client and server systems. A number of interlocking defenses such as data encryption and subnet isolation are being employed or considered by the IS staffs.
    [Show full text]
  • Macintosh System 7.5 Upgrade Guide 1994.Pdf
    Macintosh ••••••••••••••••••••••••••• Upgrade Guide <-»·' c:_ 1 - '--~ I · · ····~ f~··~~ \ ,{"&.--;:... (}.. ... Macintosh • • • Upgrade Guide • Apple Compute.r, Inc. © 1994 Apple Computer, Inc. All rights reserved . Under the copyright laws. this manual may not be copied, in whole or in part. wi thout the written consent of Apple. Your rights to the software are governed by the accompanying soft ware li cense agreement. The Apple logo is a trademark of Apple Computer, Inc., registered in !he U.S. and olher count ries. Use of the "keybomd" Apple logo (Option-Shi 1"1 -K) for commercial purposes witJwut the prior wrillen consenl of Apple may constitule lrademark infringement and unfair compel ilion in violation or federal and state laws. Every efforl has been made to ensure tlult the informati on in this manual is accurate. Apple is not responsib le for printi ng or clerical errors. Apple Computer. Inc. I Infinite Loop Cuperti no. CA 950 14-2084 (408) 996- 10 I0 Apple, the Apple logo, AppleTalk, LaserWritcr, Mac intosh. and PowerBook are trademarks of Apple Computer. Inc., registered in the U.S. and other countries. AppleMail. AppleScri pt. At Ease. Balloon Help, ColorSync, Finder. Plai nTalk, PowerShare, PowerTalk, Quick Draw. QuickTime, and TrucTypc arc trademarks of Apple Computer. Inc. Adobe, Adobe Ill ustrator. Adobe Photoshop. Adobe Type Manager. and PostScript are trademarks of Adobe Systems Incorporated, which may be registered in certain jurisdict ions. Exposure is a registered tmdemark of Preferred Publi shers, Inc. Helvetica and Times are regislered trademarks of Linotype Company. QMS is a registered lrademark of QMS. Inc. Quark X Press is a registered trademark of Quark, Inc.
    [Show full text]
  • Transformation—A Fundamental Idea of Mathematics Education Sebastian Rezat · Mathias Hattermann Andrea Peter-Koop Editors
    Transformation—A Fundamental Idea of Mathematics Education Sebastian Rezat · Mathias Hattermann Andrea Peter-Koop Editors Transformation—A Fundamental Idea of Mathematics Education 1 3 Editors Sebastian Rezat Andrea Peter-Koop EIM - Institut für Mathematik Fakultät für Mathematik - IDM Universität Paderborn Universität Bielefeld Paderborn Bielefeld Germany Germany Mathias Hattermann Fakultät für Mathematik - IDM Universität Bielefeld Bielefeld Germany ISBN 978-1-4614-3488-7 ISBN 978-1-4614-3489-4 (eBook) DOI 10.1007/978-1-4614-3489-4 Springer New York Heidelberg Dordrecht London Library of Congress Control Number: 2013955389 © Springer Science+Business Media, LLC 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc.
    [Show full text]
  • A Puny Performa Chapter
    Chapter 15 A Puny Performa Chapter IN THIS CHAPTER: I The baffling history of Performas I What’s different about the Performa I All about At Ease I How to use Apple Backup WHAT’S A PERFORMA? What is a Performa? At one time, you could have said it’s “a Macintosh sold only through consumer stores such as Sears (and not computer stores).” But then Apple began selling them through computer stores, too. OK, so then you might have said, “It’s a Macintosh with specialized system software that makes it easier to use.” But then Apple made the special Performa features standard across all Macs (in System 7.5). At this point, you might have defined a Performa as “a Mac that comes with free software already on the hard drive, such as ClarisWorks, Quicken, America Online, and clip art.” But then Apple introduced products such as the “Quadra 605 bundle” and the PowerBook 190 and 1400 series — you guessed it, non-Performas with that same software pre-installed. So, finally you might have mentioned the last remaining defining charac- teristic of the Performa line: “A Performa is a Mac sold with everything — even a monitor — in one box, for one price.” 511 512 Part II: Secrets of the Machine Until Apple introduced the Performa 6220 and 6400, which are sold with- out monitors. That’s why this is a puny Performa chapter — because there are scarcely any differences left between Performa models and those described in the bulk of this book. In the early days, Performa models essentially corresponded to main- stream Mac models.
    [Show full text]
  • Apple Computer, Inc. Records M1007
    http://oac.cdlib.org/findaid/ark:/13030/tf4t1nb0n3 No online items Guide to the Apple Computer, Inc. Records M1007 Department of Special Collections and University Archives 1998 Green Library 557 Escondido Mall Stanford 94305-6064 [email protected] URL: http://library.stanford.edu/spc Guide to the Apple Computer, Inc. M1007 1 Records M1007 Language of Material: English Contributing Institution: Department of Special Collections and University Archives Title: Apple Computer, Inc. Records creator: Apple Computer, Inc. Identifier/Call Number: M1007 Physical Description: 600 Linear Feet Date (inclusive): 1977-1998 Abstract: Collection contains organizational charts, annual reports, company directories, internal communications, engineering reports, design materials, press releases, manuals, public relations materials, human resource information, videotapes, audiotapes, software, hardware, and corporate memorabilia. Also includes information regarding the Board of Directors and their decisions. Physical Description: ca. 600 linear ft. Access Open for research; material must be requested at least 36 hours in advance of intended use. As per legal agreement, copies of audio-visual material are only available in the Special Collections reading room unless explicit written permission from the copyright holder is obtained. The Hardware Series is unavailable until processed. For further details please contact Stanford Special Collections ([email protected]). Conditions Governing Use While Special Collections is the owner of the physical and digital items, permission to examine collection materials is not an authorization to publish. These materials are made available for use in research, teaching, and private study. Any transmission or reproduction beyond that allowed by fair use requires permission from the owners of rights, heir(s) or assigns.
    [Show full text]
  • Network Working Group J. Reynolds Request for Comments: 1700 J
    Network Working Group J. Reynolds Request for Comments: 1700 J. Postel STD: 2 ISI Obsoletes RFCs: 1340, 1060, 1010, 990, 960, October 1994 943, 923, 900, 870, 820, 790, 776, 770, 762, 758,755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 Category: Standards Track ASSIGNED NUMBERS Status of this Memo This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited. OVERVIEW This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite. To make the current information readily available the assignments are kept up-to- date in a set of online text files. This RFC has been assembled by catinating these files together with a minimum of formatting "glue". The authors appologize for the somewhat rougher formatting and style than is typical of most RFCs. We expect that various readers will notice specific items that should be corrected. Please send any specific corrections via email to <[email protected]>. Reynolds & Postel [Page 1] RFC 1700 Assigned Numbers October 1994 INTRODUCTION The files in this directory document the currently assigned values for several series of numbers used in network protocol implementations. ftp://ftp.isi.edu/in-notes/iana/assignments The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. The IANA is chartered by the Internet Society (ISOC) and the Federal Network Council (FNC) to act as the clearinghouse to assign and coordinate the use of numerous Internet protocol parameters.
    [Show full text]
  • Imac Emergency Handbook
    Emergency Handbook Includes troubleshooting, hard disk repair, and software installation information for your iMac K Apple Computer, Inc. © 1998 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of Apple. Your rights to the software are governed by the accompanying software license agreement. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Every effort has been made to ensure that the information in this manual is accurate. Apple is not responsible for printing or clerical errors. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 408-996-1010 http://www.apple.com Apple, the Apple logo, AppleShare, AppleTalk, LaserWriter, Mac, the Mac OS logo, Macintosh, Power Macintosh, QuickDraw, and QuickTime are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AppleCD, At Ease, Disk First Aid, Extensions Manager, Finder, Foreign File Access, and Macintosh PC Exchange are trademarks of Apple Computer, Inc. ENERGY STAR is a U.S. registered trademark. Helvetica is a registered trademark of Linotype-Hell AG and/or its subsidiaries. PostScript is a trademark of Adobe Systems Incorporated or its subsidiaries and may be registered in certain jurisdictions. PowerPC and the PowerPC logo are trademarks of International Business Machines Corporation, used under license therefrom.
    [Show full text]
  • The System Software Museum
    Chapter 6 The System Software Museum IN THIS CHAPTER: I Every system version Apple ever released I The differences between System 7.1 and 7.0.1 I The differences between 7.5, 7.5.1, 7.5.2, 7.5.3, 7.5.5, 7.6, and so on I The SECRETS time line I Mac OS 8 — what’s left of it — explained I Guide to AppleSpeak In a little more than a decade, Apple has served up no fewer than 32 different versions of the Mac operating system. We will attempt in this chapter to guide you on a never-before-attempted journey: We will describe virtually all these permutations of the Mac’s system software, from the short-lived System 1.0 to the sprawling, sophisticated System 7.6. Beyond that we’ll show you exactly what to expect from Apple’s as-yet-unreleased system updates and the still- evolving Mac OS 8. THE SYSTEM SOFTWARE MUSEUM Why create a museum of the Mac’s system software? For one thing, exploring the nitty-gritty of system compatibility may prove valuable to Mac trou- bleshooters. It can be pretty handy to know, for example, that in a pinch you can run an LC II with System 6.0.8, but not 6.0.7. Or that a Quadra 630 can 215 216 Part I: System Software Revealed run System 7.1.2P,but not the nearly identical System 7.1.2. Furthermore, the rash of System 7 varieties has boggled even us. Quick, without looking: What’s the difference between versions 7.1.1, 7.1.2, 7.1.3, and 7.5? And what on Earth was System 7.5.3 Revision 2.1? On a more philosophical level, this retrospective provides a stunning overview of just how far the Mac has come since its introduction.
    [Show full text]
  • Network Working Group J. Reynolds Request for Comments: 1700 J
    Network Working Group J. Reynolds Request for Comments: 1700 J. Postel STD: 2 ISI Obsoletes RFCs: 1340, 1060, 1010, 990, 960, October 1994 943, 923, 900, 870, 820, 790, 776, 770, 762, 758,755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 Category: Standards Track ASSIGNED NUMBERS Status of this Memo This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited. OVERVIEW This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite. To make the current information readily available the assignments are kept up-to- date in a set of online text files. This RFC has been assembled by catinating these files together with a minimum of formatting "glue". The authors appologize for the somewhat rougher formatting and style than is typical of most RFCs. We expect that various readers will notice specific items that should be corrected. Please send any specific corrections via email to . Reynolds & Postel [Page 1] RFC 1700 Assigned Numbers October 1994 INTRODUCTION The files in this directory document the currently assigned values for several series of numbers used in network protocol implementations. ftp://ftp.isi.edu/in-notes/iana/assignments The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. The IANA is chartered by the Internet Society (ISOC) and the Federal Network Council (FNC) to act as the clearinghouse to assign and coordinate the use of numerous Internet protocol parameters.
    [Show full text]