Using Ms-Dos Kermit

Total Page:16

File Type:pdf, Size:1020Kb

Using Ms-Dos Kermit USING MS-DOS KERMIT TERMINAL EMULATION AND FILE TRANSFER Connecting your PC to the Electronic World SECOND EDITION DRAFT of 25 July 1991 Christine M. Gianone Copyright 1991 by Christine M. Gianone. Publication pending by Digital Press, Bedford, MA. Reproduction prohibited. This book is lovingly dedicated to my parents, Sal and Phyllis, who nurtured me with encouragement, support and love throughout my life. Foreword It is with tangible joy that I introduce Christine Gianone's book, Using MS-DOS Kermit. This is the first book dedicated to a particular Kermit communications program, and it truly brings Kermit into the realm of the serious. Until now, users of Kermit programs have had only a thick sheaf of computer output to guide them through the intricacies of in- stallation, communication setup, terminal emulation, file transfer, and script programming. Now MS-DOS Kermit, the most popular of all Kermit programs, has the book it deserves. Because of its unglamorous user interface, MS-DOS Kermit may appear to the uninitiated as a no-frills product. Believe me, the frills are there, but beneath the surface where you really need them. They are found in its precision-engineered character and graphics ter- minal emulation, its support for every model of PC and PS/2 as well as for many non- IBM-compatible PCs, its high-speed and efficient operation, its powerful macros and scripts, and in one of the most advanced and solid implementations of the Kermit file transfer protocol to be found anywhere. Compare these aspects of MS-DOS Kermit with any commercial PC communications software package and you'll be pleasantly surprised, especially when you consider the price! Credit for MS-DOS Kermit goes primarily to Professor Joe R. Doupnik of Utah State University, the principal author of the program. Since 1986, when he took over respon- sibility for MS-DOS Kermit, Joe, like all Kermit volunteer programmers, has generously donated his labors to the public through Columbia's Kermit Development and Distribution Office, which is directed by Christine, who in turn releases the Kermit software to the people of the world. Joe's work is of the highest quality, with a sensitivity to users' needs that is seldom seen among nonprofit software developers. i Chris has been responsible for the worldwide Kermit development and distribution effort for more than five years. In that time she has transformed a public-spirited but chaotic enterprise into an efficient nonprofit ``business'' as responsive to its customers as any commercial software house (more than most). Chris's dedication, her persuasive charm and wit, her unerring good sense, and her uncanny feeling for what users need have kept unruly Kermit developers (like me) firmly on track, and Kermit's countless users satisfied and loyal. And through magazine articles and press releases, seminars and lectures in far- flung areas of the world, Chris has effectively promoted the Kermit protocol into a worldwide de facto standard for file transfer. Chris's book is for the average PC userÐa person who doesn't care how Kermit works, how clever it is, or what goes on behind the scenes; a person whose life does not revolve around data communications, but who simply needs results. After all, Kermit is just a tool that you use to accomplish your actual goals. With this book, learning how to use the tool is a true delight. Chris's presentation is based on years of helping people install and use Kermit, her ex- perience designing Kermit courses and teaching beginners, experts, and everyone in between, and on her past authorship of many of the major Kermit manuals. She is expert in the material, and has an amazing talent for paring difficult concepts down to their bare essentials and conveying them simply and directlyÐespecially to people who don't have that peculiar technical orientation that most PC communication packages seem to require. If you're an experienced PC user, you can skip right ahead to Chapter 6 to learn about Kermit itself. But if you are new to PCs and data communications, computer-shy, bewil- dered, or lost, read the early chapters in which Chris takes you through the mechanics of program installation and checkout, modems and cables, and the basics of MS-DOSÐall with a minimum of pain and effort. After these preliminaries, Using MS-DOS Kermit will lead you gently and safely through the unpredictable and often hostile world of data com- munications without drowning you in jargon or confusing you with unnecessary detail. Chris's instructions are clear, concise, and step-by-step, and they are presented with a humor and sympathy rarely encountered in computer books. Useful examples appear on nearly every page, so you can build your confidence and increase your skill as you progress through the chapters. Once the material is mastered, the book remains a thought- fully organized and valuable reference. The command summary is thorough and replete with examples. The meticulously compiled tables alone are worth the price of the book, and the Index gives you quick access to any desired topic. Chris's book has a unique international perspective. Her travels as ``proprietor'' of the non-proprietary Kermit protocol have taken her not only throughout the United States, but also to Europe, Japan, and most recently the Soviet Union. In response to the needs of the ii Foreword non-English-speaking world, Chris has designed a groundbreaking extension to the Ker- mit protocol that allows for entry, display, and transfer of text in many languages; a com- plex topic that she describes with remarkable clarity in Chapter 13. Another unique aspect of this book, and of MS-DOS Kermit itself, is its concern for the disabled computer user. MS-DOS Kermit, unlike most other ``mass-market'' PC applica- tions, includes features that allow it to be used effectively by people who are partially sighted, blind, deaf, or physically challenged. These are presented by Chris simply and without fanfare in Chapter 15. It has been a constant pleasure to work with two such accomplished and inspiring people as Christine and Joe. Without Joe's efforts, MS-DOS Kermit would be a dusty old has- been, and without Chris, the Kermit protocol itself would have faded into obscurity years ago. On behalf of the millions of Kermit users all over the world, my deepest thanks to them both. Frank da Cruz New York City, 1990 Foreword iii iv Preface If you picked up this book and began reading it because you wondered why a muppet character's name was in the computer section of the bookstore, you'll soon discover that this book is not about muppets: Kermit is the name of a communications software pro- gram. In fact, it's the name of a very large family of programs that make it possible for just about any two computers anywhere to communicate with each other at the lowest pos- sible cost. If this interests you, read on. Using MS-DOS Kermit describes MS-DOS Kermit version 3.11 for the IBM PC, PS/2, and compatibles. With MS-DOS Kermit, a cable, and possibly a modem, you can intro- duce your isolated PC to the rest of world: to information and electronic mail services like CompuServe, Dow Jones News/Retrieval, or MCI Mail; to databases like BRS or DIA- LOG; to public data networks like SprintNet and TYMNET; and to the worldwide net- works described in John Quarterman's book, The Matrix.1 But most of all, you can intro- duce your PC to other computers: the PC on your desk to the corporate mainframe, your PC at home to the computers at work, your traveling laptop back to company headquar- ters, the PC in your dormitory room to the university computer center, the PC in your lab to a number-crunching supercomputer. Kermit can be your passport to the world of electronic information. 1Quarterman, John S., The Matrix, Digital Press (1990). v MS-DOS Kermit is only one of hundreds of Kermit programs written by public-spirited volunteers for virtually every kind of computer in existence. Each Kermit program fol- lows the Kermit file transfer protocol, a set of rules for reliably transferring information between two computers, and many of these programs, including MS-DOS Kermit, also let you interact directly with other computers or services using your keyboard and screen for terminal emulation. This book includes a 5.25-inch MS-DOS Kermit 3.11 diskette. If you need a 3.5-inch dis- kette, you may order it for a nominal fee, using the card at the back of this book. For fur- ther information about Kermit programs and how to get them, or to be placed on the mail- ing list for the free newsletter, Kermit News, write to: Kermit Distribution Columbia University Center for Computing Activities 612 West 115th Street New York, NY 10025 USA Kermit programs are in a category by themselves. Unlike commercial software packages or ``shareware,'' Kermit programs can be freely reproduced and shared as long as this is not done for profit. No licensing or registration is required. However, Kermit programs are not in the public domain. In general, each Kermit program includes a copyright notice to protect its special status. A large organization can potentially save itself millions of dollars by standardizing on Kermit rather than on commercial software packages, and many organizations have done just that. And, of course, private individuals save money too. The Kermit protocol was developed in 1981 at Columbia University by Bill Catchings and Frank da Cruz at Columbia's Center for Computing Activities to fill the need for inexpen- sive, reliable file transfer among Columbia's diverse PCs, minicomputers, and mainframes.
Recommended publications
  • Hieroglyphs for the Information Age: Images As a Replacement for Characters for Languages Not Written in the Latin-1 Alphabet Akira Hasegawa
    Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-1-1999 Hieroglyphs for the information age: Images as a replacement for characters for languages not written in the Latin-1 alphabet Akira Hasegawa Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended Citation Hasegawa, Akira, "Hieroglyphs for the information age: Images as a replacement for characters for languages not written in the Latin-1 alphabet" (1999). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by the Thesis/Dissertation Collections at RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Hieroglyphs for the Information Age: Images as a Replacement for Characters for Languages not Written in the Latin- 1 Alphabet by Akira Hasegawa A thesis project submitted in partial fulfillment of the requirements for the degree of Master of Science in the School of Printing Management and Sciences in the College of Imaging Arts and Sciences of the Rochester Institute ofTechnology May, 1999 Thesis Advisor: Professor Frank Romano School of Printing Management and Sciences Rochester Institute ofTechnology Rochester, New York Certificate ofApproval Master's Thesis This is to certify that the Master's Thesis of Akira Hasegawa With a major in Graphic Arts Publishing has been approved by the Thesis Committee as satisfactory for the thesis requirement for the Master ofScience degree at the convocation of May 1999 Thesis Committee: Frank Romano Thesis Advisor Marie Freckleton Gr:lduate Program Coordinator C.
    [Show full text]
  • Allgemeines Abkürzungsverzeichnis
    Allgemeines Abkürzungsverzeichnis L.
    [Show full text]
  • I.L. 40-614A 1 1. INTRODUCTION the Basic Interface to Remote Terminal, Or BIRT, Is an INCOM Network Master. BIRT Gives Users An
    I.L. 40-614A 1. INTRODUCTION 3. DESCRIPTION The Basic Interface to Remote Terminal, or BIRT, is 3.1. Power Requirements an INCOM Network Master. BIRT gives users an economical way of getting information from their Range: 48 Vdc to 250 Vdc and 120 Vac INCOM-compatible devices since it connects directly between a user’s external MODEM or personal com- Burden: 3.5 W @ 48 Vdc puter and the INCOM network. 9 W @ 250 Vdc 5 W @ 120 Vac BIRT can directly replace Westinghouse MINTs, talk- ing to all INCOM-based communication devices. 3.2. Temperature Range BIRTs also include a special high-speed mode for communicating with SADIs – allowing users to collect For Operation: 0˚ to +55˚ C data from other manufacturer’s relays more rapidly For Storage: -20˚ to +80˚ C than ever before. 3.3. Physical Dimensions BIRTs are built to handle the abuse of substation environment; their “hardened” RS-232 serial port can The BIRT enclosure dimensions are identical to the handle surges and sustained high voltages that ERNI and SADI, as shown in figure 1. would destroy ordinary serial ports, and BIRTs can run on a wide range of voltages, from 48 to 250 Vdc Dimensions and weight of chassis or even 120 Vac, with no jumpers or adjustments needed. Height: 5.26” (133.6) mm) Width: 3.32” (84.3) mm) Depth: 5.92” (150.4) mm) 2. FEATURES Weight: 2.0 lbs (0.9 kg) BIRT is designed to be very flexible in its RS-232 External Wiring: See figures 2 and 3.
    [Show full text]
  • Macwise Version 19 User's Manual
    [email protected] www.CarnationSoftware.com www.MacWise.com MacWise Version 19 User's Manual You can use Command F to find what you are looking for in this document. Introduction Terminal Emulation MacWise emulates ADDS Viewpoint, Wyse 50, Wyse 60, Wyse 370, Televideo TV 925, DEC VT100, VT220 and Prism terminals. Supports ANSI color. Esprit III color is also supported in Wyse 370 mode. MacWise allows a Macintosh to be used as a terminal -- connected to a host computer directly, by modem, or over the Internet. The emulators support video attributes such as dim, reverse, underline, 132-column modes, protected fields and graphic characters sent from the host computer, as well as enhanced Viewpoint mode. Features include phone list and dialer for modems, on-screen programmable function keys, connection scripts and more. Connectivity 1. Built in Modem 2. Telnet / TCP/IP 3. SSH Secure Shell 4. Serial ports via USB to Serial adaptor . 5. Also communicates directly with the Mac unix shell Telnet Telnet settings are under the Connection Menu. Select "Telnet" to enable telnet. Select "Telnet Connection..." to enter your Host IP address, port number and terminal type. =============================== KERMIT ================================ NOTE: If you are running Mac OS 10.13 or later, you need to also use Kermit. (There should be a check mark on "Kermit" under the Connection Menu.) Kermit is installed automatically when Mac OS 10.13 or later is detected. You can re-install kermit any time by selecting Kermit Installer from the Help Menu in MacWise. Echo Kermit Characters ( under the Connection Menu ) This is normally enabled when Kermit is enabled.
    [Show full text]
  • Openvms: an Introduction
    The Operating System Handbook or, Fake Your Way Through Minis and Mainframes by Bob DuCharme VMS Table of Contents Chapter 7 OpenVMS: An Introduction.............................................................................. 7.1 History..........................................................................................................................2 7.1.1 Today........................................................................................................................3 7.1.1.1 Popular VMS Software..........................................................................................4 7.1.2 VMS, DCL................................................................................................................4 Chapter 8 Getting Started with OpenVMS........................................................................ 8.1 Starting Up...................................................................................................................7 8.1.1 Finishing Your VMS Session...................................................................................7 8.1.1.1 Reconnecting..........................................................................................................7 8.1.2 Entering Commands..................................................................................................8 8.1.2.1 Retrieving Previous Commands............................................................................9 8.1.2.2 Aborting Screen Output.........................................................................................9
    [Show full text]
  • A Kermit File Transfer Protocol for the Apple II Series Personal Computers : John Patrick Francisco Lehigh University
    Lehigh University Lehigh Preserve Theses and Dissertations 1986 A Kermit file transfer protocol for the Apple II series personal computers : John Patrick Francisco Lehigh University Follow this and additional works at: https://preserve.lehigh.edu/etd Part of the Electrical and Computer Engineering Commons Recommended Citation Francisco, John Patrick, "A Kermit file transfer protocol for the Apple II series personal computers :" (1986). Theses and Dissertations. 4628. https://preserve.lehigh.edu/etd/4628 This Thesis is brought to you for free and open access by Lehigh Preserve. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Lehigh Preserve. For more information, please contact [email protected]. A KERMIT FILE TRANSFER PROTOCOL FOR THE APPLE II SERIES PERSONAL COMPUTERS (Using the Apple Pascal Operating system) by John Patrick Francisco A Thesis Presented to the Graduate Committee of Lehigh University in Candidacy for the Degree of Master of Science 1n• Computer Science Lehigh University March 1986 This thesis is accepted and approved in partial fulfillment of the requirements for the degree of Master of science.• (date) Professor in Charge -------------- --------------- Chairman of the Division Chairman of the Department • • -11- ACKNOWLEDGEMENTS It would be somewhat of an understatement to say this project was broad in scope as the disciplines involved ranged from Phychology to Electrical Engineering. Since the project required an extensive amount of detailed in­ formation in all fields, I was impelled to seek the help, advice and opinion of many. There were also numerous t friends and relatives upon whom I relied for both moral and financial support.
    [Show full text]
  • Operating System User's Mannal ~Zilog 03-0072-01 Revision a September 1978
    t_ .' Operating System User's Mannal ~Zilog 03-0072-01 Revision A September 1978 Copyright © 1978 by Zilog, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Zilog. Zilog assumes no responsibility for the use of any circuitry other than circuitry embodied in a Zilog product. No other circuit patent licenses are implied. zaO-RIO Operating System User's Manual September 1978 TABLE OF CONTENTS CHAPTER 1 - INTRODUCTION AND OVERVIEW • 1 1.1 INTRODUCTION •• 1 1.2 SYSTEM OVERVIEW 3 1.2.1 Hardware Configuration • • • • • • 3 1.2.2 File Systems • • • • • • • . • • 3 1.2.3 System Initialization •••.••• 6 1.2.4 Commands • • .• .•..••• 7 1.2.5 I/O • • • . • • • • • . • • • • • . 7 CHAPTER 2 - RIO EXECUTIVE 9 2.1 SYSTEM INITIALIZATION 9 2.2 FILE NAME CONVENTIONS · 10 2.3 MEMORY MANAGEMENT . • • . 12 2.3.1 MEMMGR • . 13 2.4 COMMAND STRING INTERPRETATION · 13 2.5 ERROR HANDLING • • . 15 2.6 PROGRAM EXECUTION OF COMMANDS · 15 CHAPTER 3 - 1/0 STRUCTURE • · 16 3.1 OVERVIEW . • · 16 3.2 I/O REQUESTS - SYSTEM CALLS · 17 3.3 THE 'ASSIGN' I/O REQUEST ••• • 19 - i - 3.4 STANDARD RIO I/O DEVICES • • • 21 3.4.1 ZDOS . • • • . 21 3.4.2 DFS . 21 3.4.3 NULL . • • • . 21 3.4.4 CON . • • • . • • • • • 22 3.4.5 PCON • 27 3.4.6 FLOPPY • • • • • • • • • • 27 3.4.7 DISK • • • • • • 27 CHAPTER 4 - PROGRAM INTERFACE • • 28 4.1 PROGRAM LOCATION • • • • • 28 4.2 PARAMETER STRING ADDRESS · 29 4.3 PROGRAM STACK SPACE • • • 29 4.4 PROGRAM TERMINATION - ERROR HANDLING ••.
    [Show full text]
  • OS 386 Multiuser/Multitasking Operating System
    OS 386 Multiuser/Multitasking Operating System REFERENCE GUIDE [Q] DIGITAL RESEARCH@ os REFERENCE GUIDE [jill DIGITAL RESEARCH~ COPYRIGHT Copyright © 1987 Digital Research Inc. All rights reserved. No part of this publication may be reproduced, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without the prior written permission of Digital Research Inc, 60 Garden Court, Box DRI, Monterey, California 93942 DISCLAIMER DIGITAL RESEARCH MAKES NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE CONTENTS HEREOF AND SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE. Further Digital Research Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research Inc to notify any person of such revision or changes. NOTICE TO USER This manual should not be construed as any representation or warranty with respect to the software named herein. Occasionally changes or variations exist in the software that are not reflected in the manual. Generally, if such changes or variations are known to exist and to affect the product significantly, a release note or READ.ME file accompanies the manual and the distribution disks. In that event, be sure to read the release note or READ.ME file before using the product. ii TRADEMARKS Digital Research and its logo, CP/M, and CP/M-86 are registered trademarks of Digital Research Inc. Cardfile, Concurrent, Concurrent DOS 386, Concurrent DOS XM, DR EDIX, DOS Plus and MP/M-86 are trademarks of Digital Research Inc.
    [Show full text]
  • IODF Explorer
    The Input/Output Definition File (IODF) is a critical Control Point in the management of the IBM z/Series Platform. IODF Explorer Release 4.0 USER GUIDE Contact us for additional information: NewEra Software Technical Support 800-421-5035 [email protected] www.newera.com Rev: 2009-04-24 IODF Explorer 4.0 ¾ Copyright, Trademark and Legal Notices Copyrights This Getting Started Guide and the related Software Product(s) are protected under a Copyright dated 2009 by NewEra Software, Inc. All rights are reserved. License Agreement This Getting Started Guide describes the installation and operation of Image FOCUS, its environment and applications. It is made available only under the terms of a license agreement between the licensee and NewEra Software Inc. No part of this Guide or the related Software Product(s) may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of NewEra Software, Inc. Trademarks and Copyrights of Others The following products and/or registered trademarks of International Business Machines Corporation are referenced in this document: MVS, VM, RACF, z/OS, SYSPLEX, JES, VTAM, TSO, ISPF, ICKDSF, DFSMSdss, DF/DSS, and others. 2 NewEra Software, Inc. ‐ Image Control Environment (ICE) Applications IODF Explorer 4.0 ¾ Technical Support Information NewEra Software is dedicated to providing the highest level of technical Around-the-clock- support support to meet our customers’ growing needs. In order to meet these needs, NewEra provides around‐the‐clock technical support, 7 days a week, 24 hours a day.
    [Show full text]
  • MVI69E-LDM Datasheet
    DATASHEET MVI69E-LDM Linux Development Module for CompactLogix™ The MVI69E-LDM module allows users to develop and deploy C/C++ custom algorithm applications for CompactLogix™ systems. Users are also able to create drivers for specialty Ethernet and Serial end-devices. The Linux Development module comes with a built-in API for backplane communications to the processor. With the separate development kit DVD, you are the developer who controls exactly what this module can and cannot do. Features Ideal for custom algorithm applications One independent Ethernet port, and two independent, isolated, serial ports (RS232/422/485) Industrial fan-less design Built-in API included for backplane communications to the processor Linux Virtual Machine (VM) and development environment provided on our website VM contains preinstalled toolchain and libraries VM contains the popular Eclipse IDE Ethernet & multi-serial port example applications provided on VM CPU, Memory and OS Specifications Specification Description CPU 400MHz ARM9 G20 Operating System Linux (kernel 2.6.33.7) Linux Distribution TimeSys System Memory 64MB SDRAM Flash Memory 256MB NAND Flash General Hardware Specifications Additional Products Specification Description ProSoft Technology® offers a full Backplane Current Load 500 mA @ 5 Vdc complement of hardware and 3 mA @ 24 Vdc software solutions for a wide variety Operating Temperature 0°C to 60°C (32°F to 140°F) of industrial communication Storage Temperature -40°C to 85°C (-40°F to 185°F) platforms. For a complete list of Shock 15g operational
    [Show full text]
  • Computing :: Operatingsystems :: DOS Beyond 640K 2Nd
    DOS® Beyond 640K 2nd Edition DOS® Beyond 640K 2nd Edition James S. Forney Windcrest®/McGraw-Hill SECOND EDITION FIRST PRINTING © 1992 by James S. Forney. First Edition © 1989 by James S. Forney. Published by Windcrest Books, an imprint of TAB Books. TAB Books is a division of McGraw-Hill, Inc. The name "Windcrest" is a registered trademark of TAB Books. Printed in the United States of America. All rights reserved. The publisher takes no responsibility for the use of any of the materials or methods described in this book, nor for the products thereof. Library of Congress Cataloging-in-Publication Data Forney, James. DOS beyond 640K / by James S. Forney. - 2nd ed. p. cm. Rev. ed. of: MS-DOS beyond 640K. Includes index. ISBN 0-8306-9717-9 ISBN 0-8306-3744-3 (pbk.) 1. Operating systems (Computers) 2. MS-DOS (Computer file) 3. PC -DOS (Computer file) 4. Random access memory. I. Forney, James. MS-DOS beyond 640K. II. Title. QA76.76.063F644 1991 0058.4'3--dc20 91-24629 CIP TAB Books offers software for sale. For information and a catalog, please contact TAB Software Department, Blue Ridge Summit, PA 17294-0850. Acquisitions Editor: Stephen Moore Production: Katherine G. Brown Book Design: Jaclyn J. Boone Cover: Sandra Blair Design, Harrisburg, PA WTl To Sheila Contents Preface Xlll Acknowledgments xv Introduction xvii Chapter 1. The unexpanded system 1 Physical limits of the system 2 The physical machine 5 Life beyond 640K 7 The operating system 10 Evolution: a two-way street 12 What else is in there? 13 Out of hiding 13 Chapter 2.
    [Show full text]
  • Microsoft Plays Hardball: Use of Exclusionary Pricing and Technical
    Antitrust Bulletin, XL:2, Summer 1995, 265-315 MICROSOFT PLAYS HARDBALL: The Use of Exclusionary Pricing and Technical Incompatibility to Maintain Monopoly Power in Markets for Operating System Software† by KENNETH C. BASEMAN* FREDERICK R. WARREN-BOULTON* and GLENN A. WOROCH** May 1995 ___________________ * Principals, MiCRA: Microeconomic Consulting and Research Associates, Inc., Washington, DC. ** University of California, Berkeley. † Forthcoming, Antitrust Bulletin, June 1995. We would like to express our appreciation for helpful comments and other assistance to Sturge Sobin, Linnet Harlan, Paul Dennis and the participants at the Columbia Business School's Institute for Tele-Information's Seminar on Sustaining Competition in Network Industries through Regulating and Pricing Access, especially Janusz Ordover and Bobby Willig. TABLE OF CONTENTS I. INTRODUCTION AND SUMMARY ................................... 1 II. BACKGROUND .................................................... 3 A. THE MARKET FOR PERSONAL COMPUTER OPERATING SYSTEMS ............................................................ 3 TABLE: NEW SHIPMENTS OF PERSONAL COMPUTER OPERATING SYSTEMS .............................................. 8 B. MICROSOFT'S PRACTICES ..................................... 9 III. FIRST-DEGREE PRICE DISCRIMINATION vs. INEFFICIENT SUBSTITUTION ................................................... 15 A. FIRST-DEGREE PRICE DISCRIMINATION ........................ 16 B. INEFFICIENT SUBSTITUTION ................................. 20 IV. ANTIFRAUD AND ANTIPIRACY
    [Show full text]