1233 lines
56 KiB
Plaintext
1233 lines
56 KiB
Plaintext
![]() |
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD>ܱ<EFBFBD><DCB1><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD>ܱ<EFBFBD><DCB1><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD>߱<EFBFBD><DFB1> <20><><EFBFBD> <20><>۱<EFBFBD>۱<EFBFBD><DBB1> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> ߱<><DFB1><EFBFBD><EFBFBD> <20><><EFBFBD> <20><>۱<EFBFBD>۱<EFBFBD><DBB1> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20>߱<EFBFBD><DFB1> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20>߱<EFBFBD><DFB1> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD>߱<EFBFBD><DFB1> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>߱<EFBFBD><DFB1>
|
|||
|
<20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><> <20><> <20><> <20><> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><> <20><> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| EDITORS FILE |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
by John Dodson, Node id ->CANTINA.
|
|||
|
|
|||
|
Welcome to the June issue of RIME Times! It continues to amaze me that
|
|||
|
another month passes and we are still receiving outstanding contributions
|
|||
|
for our little newsletter! I think I am getting used to the panic that
|
|||
|
strikes about the 10th of each month. This is when the "official" article
|
|||
|
submission deadline is well past and we have received very few submissions.
|
|||
|
Somehow the users and sysops of RelayNet keep coming through, albeit a
|
|||
|
little late. As someone once said, "Punctuality is the virtue of the
|
|||
|
bored". It is comforting to know that the members of RelayNet are not
|
|||
|
bored and that you somehow find the time to submit some great articles!
|
|||
|
|
|||
|
We have changed the format to single column. I believe this will give us
|
|||
|
greater flexibility in accomodating the great variety in style and layout.
|
|||
|
The newsletter is now easier to read on-line or viewed with a file viewer,
|
|||
|
which should please you "save the tree" folks out there! <grin>
|
|||
|
|
|||
|
RelayNet continues to experience steady growth. Last count was 460 nodes!
|
|||
|
Of course along with the growth come growing pains. Howard B. shows
|
|||
|
frustration at the disregard for the 10 line limit in COMMON. Trouble in
|
|||
|
the DEBATE conference spills over to other conferences and results in a
|
|||
|
user being ousted from the network. Some cry censorship while some cry out
|
|||
|
for a "get tougher" policy. Some have suggested a software solution
|
|||
|
(natural enough!) as a way to gain better control of the message bases. As
|
|||
|
the network continues to grow, how do we insure orderly growth and what
|
|||
|
course of action will we follow?
|
|||
|
|
|||
|
On the more pleasant side of growth, nodes from Japan, England and our
|
|||
|
first node from Hawaii was greeted with warm aloha's. It seems nodes from
|
|||
|
the UK are joining up left and right with BBS names like Crispy and Biddles
|
|||
|
.... names _only_ the English can come up with! I think it may be time for
|
|||
|
me to download the node-list file (RIME.ZIP) again and find out who all
|
|||
|
these folks are!
|
|||
|
|
|||
|
If you like a column, please be sure to route a nice message to the author.
|
|||
|
If you don;t like a column, submit one of your own!
|
|||
|
|
|||
|
See you on the next relay!
|
|||
|
|
|||
|
|
|||
|
Page 2
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| ONE SYSOPS MUSINGS |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
by Lana Fox, Node id ->MODEMZN
|
|||
|
|
|||
|
Sometimes when I'm reading the messages captured in the Boosters conference
|
|||
|
on The ToolShop BBS, I start thinking (I know, I know ... that's dangerous
|
|||
|
for me). Dangerous or no, I DO start thinking and what I think rambles
|
|||
|
along the following lines:
|
|||
|
|
|||
|
I sense personalities in the messages I read. The awful thing about THAT
|
|||
|
is I've noticed a definite personality change in the person or persons who
|
|||
|
write the messages with Samuel Smith in the FROM: field and signed as ;;
|
|||
|
Sam.
|
|||
|
|
|||
|
I hold that this personality change occurred sometime after the sudden
|
|||
|
'disappearance' of Sam from the message bases in October of 1989. Prior to
|
|||
|
the disappearance, Sam answered EVERY message addressed to Samuel Smith in
|
|||
|
the Booster's conference EVERY day and still managed to write excellent
|
|||
|
code every day as well as hold down a full time job. This Sam also knew
|
|||
|
exactly where a problem was likely to be stemming from, most of the time,
|
|||
|
when sysops had some difficulty with a new beta version. This Sam never
|
|||
|
lost his cool and NEVER "yelled" in his replies. He didn't make typos or
|
|||
|
spelling errors, either.
|
|||
|
|
|||
|
After the disappearance, upon resuming communications with us, the NEW Sam
|
|||
|
surfaced. This new Sam never caught up on his mail and no longer answers
|
|||
|
each and every message addressed to him. Why not just start fresh? I've
|
|||
|
seen this new Sam trip over a new feature in ProDoor and ProSM as the
|
|||
|
obvious culprit in a sysop's dilemma. The old Sam would have known
|
|||
|
immediately! The new Sam has been seen to yell (all caps and exclamation
|
|||
|
marks) in replies to some sysops. The new Sam makes typos and misspells
|
|||
|
words on occasion. The personality that shows through the typed words
|
|||
|
changes, as though it were not just one person replying to the messages.
|
|||
|
In short the new Sam says and does things the old Sam would NEVER have said
|
|||
|
or done!
|
|||
|
|
|||
|
Now, sometimes I go so far as to get ANGRY at the hoax being perpetrated
|
|||
|
upon us (this could, of course, be due solely to the phase of the moon or
|
|||
|
even PMS!). When I do get angry, (imagine if you will a cartoon bubble
|
|||
|
depicting thoughts) I think, "Just how STUPID does this person or team of
|
|||
|
persons think we sysops ARE, anyway?". I mean, if this is really a team of
|
|||
|
people (and that would make perfect sense), then why not admit it? If the
|
|||
|
original "Sam" was replaced, again, why not admit it?
|
|||
|
|
|||
|
Perhaps it IS only one person and this person has undergone a personality
|
|||
|
change. There are lots of reasons for personality changes, not the least
|
|||
|
of which is dealing with so many demanding people. Or it might be health
|
|||
|
problems, medication, a nervous breakdown or the simple truth of being
|
|||
|
tired of the whole mess!
|
|||
|
|
|||
|
|
|||
|
Page 3
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
Take your pick. I'm sure we can all imagine worse things than the probable
|
|||
|
truth of the matter. One sysop I know thinks Sam is short for Samantha and
|
|||
|
hence the mood swings. I, for one, just wish I knew so I wouldn't have
|
|||
|
these angry thoughts that someone is pulling a spoof on me. Hey Sam! I
|
|||
|
sure would like to communicate "voice" with you just once! Do you think
|
|||
|
that might be arranged?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| A DB2 PUZZLE |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
by Ed Lazarowitz, Node id ->CAPCON
|
|||
|
|
|||
|
I know we must have a few IBM mainframers out there in RelayNet land. So
|
|||
|
for those of you who (think they) know a little about DB2, I'd like to
|
|||
|
propose the following SQL problem. To give you all plenty of time to think
|
|||
|
about it, I'll present the solution in the next issue of the Rime Times
|
|||
|
Newsletter.
|
|||
|
|
|||
|
You're the owner of the company whose employees are listed in the table
|
|||
|
Q.STAFF. Unfortunately, the id numbers assigned to each employee no longer
|
|||
|
bear any resemblance to anything logical. You therefore wish to design an
|
|||
|
SQL query that will generate a result table that includes a single entry
|
|||
|
for each of your employees, containing all of the information in Q.STAFF,
|
|||
|
as well as an SQL-generated number, unique to each row in the result table.
|
|||
|
This number will be used as a new id number. To allow plenty of room for
|
|||
|
future insertions or deletions, the number should be the employee's current
|
|||
|
DEPT multiplied by 100, plus a sequence number unique within his
|
|||
|
department. A portion of the result table will look like this:
|
|||
|
|
|||
|
New Id Field
|
|||
|
|
|
|||
|
|
|||
|
|
|||
|
COL1 DEPT NAME JOB YEARS SALARY COMM
|
|||
|
----------- ------ --------- ----- ------ ---------- ----------
|
|||
|
1010 10 DANIELS MGR 5 19260.25 -
|
|||
|
1020 10 JONES MGR 12 21234.00 -
|
|||
|
1030 10 LU MGR 10 20010.00 -
|
|||
|
1040 10 MOLINARE MGR 7 22959.20 -
|
|||
|
1510 15 HANES MGR 10 20659.80 -
|
|||
|
1520 15 KERMISCH CLERK 4 12258.50 110.10
|
|||
|
1530 15 NGAN CLERK 5 12508.20 206.60
|
|||
|
: : : : : : :
|
|||
|
: : : : : : :
|
|||
|
: : : : : : :
|
|||
|
: : : : : : :
|
|||
|
8410 84 DAVIS SALES 5 15454.50 806.10
|
|||
|
8420 84 EDWARDS SALES 7 17844.00 1285.00
|
|||
|
|
|||
|
Page 4
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
8430 84 GAFNEY CLERK 5 13030.50 188.00
|
|||
|
8440 84 QUILL MGR 10 19818.00 -
|
|||
|
|
|||
|
|
|||
|
If you currently work at a site that has DB2 and QMF installed, you should
|
|||
|
find the table (Q.STAFF) used in this problem in your sub-system DB2
|
|||
|
catalog. It is included with the install tape.
|
|||
|
|
|||
|
Have fun, remember to think relationally, and see you in the next
|
|||
|
issue.
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| CONFERENCE NEWS |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
by Skip Ross, Node id ->ACC
|
|||
|
|
|||
|
NAME: PCRELAY SUPPORT
|
|||
|
NUMBER: 202
|
|||
|
DESCRIPTION: A conference dedicated to the support of PCRelay
|
|||
|
software, and is available to all networks running
|
|||
|
PCRelay software.
|
|||
|
HOST: Bonnie Anthony Node ID ->RUNNINGA
|
|||
|
ACTIVITY: Moderate
|
|||
|
|
|||
|
NAME: TLX-Host
|
|||
|
NUMBER: 203
|
|||
|
DESCRIPTION: When Dan Horn created his Telix Script "HOST3" over
|
|||
|
a year ago, he also created a new very simple
|
|||
|
method for ordinary folks to start up a very
|
|||
|
capable BBS in minutes - literally! This conference
|
|||
|
supports all versions of Dan's Host program, which
|
|||
|
now includes a file database, a very small message
|
|||
|
base, a full-screen visual editor, full SysOp
|
|||
|
utilities, etc, but can be set-up and functional in
|
|||
|
minutes.
|
|||
|
HOST: Dan Horn Node ID ->DBORED
|
|||
|
ACTIVITY: New
|
|||
|
|
|||
|
NAME: WAR-ZONE!!!
|
|||
|
NUMBER: 204
|
|||
|
DESCRIPTION: A place to vent your anger, carry on heated flaming
|
|||
|
debates, and generally let-your-hair-down! Rules
|
|||
|
are simple and few.
|
|||
|
HOSTS: STEERING COMMITTEE
|
|||
|
ACTIVITY: NEW
|
|||
|
|
|||
|
Announcing RIME/RelayNet's newest conferences. Please note that
|
|||
|
the conference #205 is a limited-run conference, and will be
|
|||
|
replaced after testing is done with the PALRUN software.
|
|||
|
|
|||
|
NAME: Computer Assembly
|
|||
|
|
|||
|
Page 5
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
NUMBER: 199
|
|||
|
DESCRIPTION: Discussions centering around the construction of
|
|||
|
computers. Included will be specific hardware
|
|||
|
tips. This conference is for the serious amateur
|
|||
|
computer builder and will offer extensive help from
|
|||
|
peers.
|
|||
|
HOST: Mark Balch Node ID ->HELIX
|
|||
|
ACTIVITY: NEW
|
|||
|
|
|||
|
NAME: PALRUN SOFTWARE
|
|||
|
NUMBER: 205
|
|||
|
DESCRIPTION: This conference is for the Beta Testers of PALRUN
|
|||
|
software. This is a limited-run conference.
|
|||
|
HOST: Robert Tolz Author Node ID ->PAL
|
|||
|
ACTIVITY: NEW
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| THE FUTURE OF RIME |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
by Jeff Woods, Node id ->MUSICAL
|
|||
|
|
|||
|
or
|
|||
|
10 Psychic Predictions from the National Inquisitor Staff
|
|||
|
|
|||
|
1. Howard Belasco will have a religious conversion to Moslem, changing
|
|||
|
his name to Hamid Belasco, and will express joy and peace in every
|
|||
|
message. We will never see the words "END THIS THREAD NOW" in his
|
|||
|
messages, and he will remove his caps lock key and exclamation point
|
|||
|
from his keyboard.
|
|||
|
|
|||
|
2. Someone will upload a voice emulation to RUNNINGA that will tell
|
|||
|
Bonnie Anthony to quit her job and follow a tribe of pygmies across
|
|||
|
the African wilderness. She will listen, and take the nethub with
|
|||
|
her. All calls to the nethub will be over cellular phones.
|
|||
|
|
|||
|
3. Kip Compton will get married in the next year, most likely to a
|
|||
|
user on the network (the names Debby Kryger and Becky Pickel have
|
|||
|
been tossed about). Release software will not have come out by
|
|||
|
then, and Kip will turn over all programming to Mark Herring, who
|
|||
|
will rename the software "QRelay" and re-write it in BASIC.
|
|||
|
|
|||
|
4. Matt Giwer will experience a complete turnaround, gaining such
|
|||
|
confidence of the SC that he will become the eighth member of the
|
|||
|
SC (to replace Hamid's missing exclamation points). To keep the
|
|||
|
SC in balance at an odd number, the ninth member will also be
|
|||
|
chosen, and it will be Paul Waldinger. He will decline the
|
|||
|
position, and it will be given to Rick Fry, who will increase his
|
|||
|
message postings threefold, if that is possible.
|
|||
|
|
|||
|
5. Skip Ross will present to the SC the idea that we have way too many
|
|||
|
conferences. It will be suggested that ONE large conference with
|
|||
|
|
|||
|
Page 6
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
all topics at once might work better. This idea will be rejected
|
|||
|
in favor of keeping only 3 conferences: COMMON, UNCOMMON, and the
|
|||
|
UNIQUE conferences.
|
|||
|
|
|||
|
6. Patrick Lee and David Greenberger will become roommates with the
|
|||
|
"other" Patrick Lee and with David Greenberg, who just joined the
|
|||
|
net. They will set up a BBS, and all have the same password. No
|
|||
|
one will be able to tell who is who when they leave a message, as
|
|||
|
all of their messages will be left under the name "David Lee".
|
|||
|
|
|||
|
7. William Parfitt will take over US NETHUB responsibilities when
|
|||
|
Bonnie goes to Africa, and will become very annoyed when Bonnie's
|
|||
|
calls step on his time slot. He will lock her out, but new SC
|
|||
|
member Matt Giwer will intervene, diverting the battle, and getting
|
|||
|
Bonnie and Bill arguing about flag burning and abortion instead.
|
|||
|
Bill will allow users to see the log on the Nethub, but other users
|
|||
|
revolt when they find HE is the one who has been stomping. Bill's
|
|||
|
system will be offered in sacrifice to Allah by Hamid.
|
|||
|
|
|||
|
8. Jim Spinelli and JThomas Howell will go on vacation together.
|
|||
|
After much discussion, they decide to cruise Lake Michigan on a
|
|||
|
fan-driven sailboat. They never return, as once on the lake, the
|
|||
|
debate is finally settled in that the fan will NOT drive the boat.
|
|||
|
|
|||
|
9. Jeff Woods will be shot by an angry emigre' from Montreal at a
|
|||
|
cafe in Toronto. The event stems from Jeff being brought the
|
|||
|
wrong soda with his meal, not knowing the derogatory slang for the
|
|||
|
French Canadians. He makes his mistake by shouting angrily at the
|
|||
|
French Canadian waiter, "I said 2 Cokes, you fool! I hate Pepsis!"
|
|||
|
|
|||
|
10. AT&T will announce the abolition of long distance charges on January
|
|||
|
1st, 2000 (predicted by Arthur C. Clarke in 2061: Odyssey 3).
|
|||
|
Users of the network will wait for this momentous event, and mail
|
|||
|
will accumulate on nodes for nine years. At midnight on that date
|
|||
|
all nodes will dial in, so overloading the nethub and the phone
|
|||
|
lines (there will be 23,158 nodes by then) that Scott Anthony and
|
|||
|
his wife (who will then be in charge of the nethub after that one
|
|||
|
unfortunate incident in 1997 that got Bonnie kicked off the network)
|
|||
|
will come home and find that their 531 gigabyte hard drive FULL,
|
|||
|
and users screaming about the runaway thread from 1991 that won't
|
|||
|
die. RIME continues to grow, but some things never change......
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| SHORT AND SWEET |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
By Lucien R Greif, Node id ->PAL
|
|||
|
|
|||
|
When I was young and unbridled, I worked for a public relations firm as a
|
|||
|
technical writer. My job: prepare articles for business publications on a
|
|||
|
wide variety of industrial topics.
|
|||
|
|
|||
|
|
|||
|
Page 7
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
One day, my boss sent back a manuscript to me, to which he had appended
|
|||
|
these three "rules for good writing," with the suggestion that I study
|
|||
|
them:
|
|||
|
|
|||
|
1> Can I say it with FEWER words.
|
|||
|
2> Can I say it with SHORTER words.
|
|||
|
3> Do I have to say it AT ALL?
|
|||
|
|
|||
|
Stung by his audacity in questioning my Shakespearean prose, I fired back,
|
|||
|
"No I don't have to say it at all. But will you continue to pay me?"
|
|||
|
|
|||
|
Lucky for me, the man was not only wise - in retrospect - but he also had a
|
|||
|
sense of humor. We ended up good friends.
|
|||
|
|
|||
|
Why this long litany about something that is of no interest to anyone?
|
|||
|
Well, because it occurs to me that my boss' guiding philosophy could - and
|
|||
|
should - apply to all of us who use the RIME network. I've read that one of
|
|||
|
the Sysops sends about $100 per month to the telephone company, just so
|
|||
|
that you and I can converse with each other. At NO cost to us. Needless to
|
|||
|
say, I am firmly convinced that we must do all we can to hold his expenses
|
|||
|
down to a quiet roar and to minimize the aggravation we cause. Toward this
|
|||
|
end, I have composed a set of rules - for ME(!) - that I will make every
|
|||
|
effort to live by.
|
|||
|
|
|||
|
1> I will compose the shortest message I can in response to another.
|
|||
|
2> I will reread it, to make it even shorter.
|
|||
|
3> I will make SURE the message contributes something; if not, I'll
|
|||
|
kill it.
|
|||
|
4> I will check it for spelling and grammatical usage. And make it
|
|||
|
shorter.
|
|||
|
5> I will hold messages in COMMON to 10 lines, MAXIMUM.
|
|||
|
6> I will route message and "R/O" them whenever possible, to cut
|
|||
|
costs.
|
|||
|
7> I will not GUESS; I will provide only correct technical
|
|||
|
information.
|
|||
|
8> I will be only positive in my thinking, not hurtful or snide.
|
|||
|
9> I will try to help the other person, not cut him down or show off.
|
|||
|
10>I will not argue pointlessly to prove that I'm right; it does not
|
|||
|
matter.
|
|||
|
11>I will not assume the other person is a dunce; I have not lived his
|
|||
|
life.
|
|||
|
12>I will not use profanity and I will write only when my anger has
|
|||
|
subsided.
|
|||
|
13>I will at all times speak quietly, graciously, never in a mean
|
|||
|
spirit.
|
|||
|
|
|||
|
My wife has promised to needle-point this bakers' dozen, suitable for
|
|||
|
framing. I will hang it over my computer, to refresh my memory when I
|
|||
|
forget.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 8
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| BEGINNERS CORNER |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
by Jim Daly, Node id ->TREASURE
|
|||
|
|
|||
|
The MAIL/MESSAGING functions of a Bulletin Board System (BBS)
|
|||
|
|
|||
|
-----------------------------------------------------------------------
|
|||
|
NOTE: Any Functions discussed are specific to Bulletin Boards that are are
|
|||
|
running under the PCBoard system. Other BBS Systems will have a have
|
|||
|
similar set of commands.
|
|||
|
-----------------------------------------------------------------------
|
|||
|
One of the primary benefits of the nationwide BBS system is the ability to
|
|||
|
meet new friends and business associates and to become involved in a
|
|||
|
multitude of topical conversations. This is particularly true if you
|
|||
|
happen to call a BBS that is a Member of one of the Worldwide message ECHO
|
|||
|
bases (most commonly known as NETS). A future article will go into more
|
|||
|
detail on this fascinating field of BBS messaging.
|
|||
|
|
|||
|
The most important consideration in BBS messaging is this:
|
|||
|
-------------------------------------------------------------------------
|
|||
|
!!! IF YOU WANT TO RECEIVE MAIL - YOU MUST LEAVE MAIL !!!
|
|||
|
-------------------------------------------------------------------------
|
|||
|
1.> An important consideration when becoming involved in the Message bases
|
|||
|
of any BBS you may call is that each System you call tends to have
|
|||
|
developed a "personality". By "personality" I mean the overall sort of
|
|||
|
feeling you get when reading through the various Messages Bases. Serious,
|
|||
|
frivolous, amusing, exciting, inspiring, boring, etc. This general feeling
|
|||
|
is usually the result of how the SysOp and his various co-SysOps and SigOps
|
|||
|
interact with the other members of the Board. You will quickly discover
|
|||
|
whether or not you are comfortable on any particular Bulletin Board.
|
|||
|
|
|||
|
2.> As mentioned in a previous article, when you first logon to a BBS, you
|
|||
|
will find yourself in the MAIN Area. Messages in this part of the system
|
|||
|
will normally be of the General Interest type and also the most likely
|
|||
|
place to find messages from the Sysop to ALL of the Members of the BBS.
|
|||
|
|
|||
|
In addition to the MAIN Message Area, most Bulletin Boards will
|
|||
|
also have additional CONFERENCES in which you will find messages
|
|||
|
that are specific to Special Interests. This is particularly true
|
|||
|
on Boards that are Members of Message ECHO groups such as RelayNet
|
|||
|
FIDO, InterLink, etc.)
|
|||
|
|
|||
|
3.> Following are some of the more important Messaging Commands along
|
|||
|
with a brief description of its function:
|
|||
|
|
|||
|
(R)ead Mail and its various sub-commands
|
|||
|
(Y)our - Mail addressed to you specifically
|
|||
|
(S)ince - Mail left since your last visit
|
|||
|
(A)ll - All Conferences
|
|||
|
|
|||
|
|
|||
|
Page 9
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
As with other Board functions, you can Enter the single letter
|
|||
|
commands one at a time or you can "string" them. As an example,
|
|||
|
|
|||
|
R;Y;S;A or R Y S A (note the spaces)
|
|||
|
|
|||
|
will show you (Y)our Messages (S)ince the last time you called in
|
|||
|
(A)ll Conferences to which you have Access. On the other hand,
|
|||
|
|
|||
|
R;Y;S or R Y S
|
|||
|
|
|||
|
will allow you to (R)ead (Y)ours (S)ince in the Conference you are
|
|||
|
now visiting. And just R S will show you EVERY Message in that Area
|
|||
|
of the BBS (S)ince your last call because we did not delimit the
|
|||
|
search by using the (Y)ours.
|
|||
|
|
|||
|
(RE)ply to a message
|
|||
|
|
|||
|
When you finish reading a message, you will see a line that says;
|
|||
|
"End of Message Command:". If you now Type RE, the screen will
|
|||
|
clear and be refreshed with a Header showing the name of the writer
|
|||
|
of the original message in the TO:, your name in the FROM:, and the
|
|||
|
cursor will be at the end of the SUBJECT: line (which will read
|
|||
|
exactly the same as the original message). You may hit the <ENTER>
|
|||
|
key to retain the SUBJECT: line as is or you may use your Backspace
|
|||
|
key to erase what is shown and replace it with a new subject. You
|
|||
|
will then be in the body of the message and you can then proceed with
|
|||
|
entering your REply.
|
|||
|
|
|||
|
When you have finished with your REply, hit <ENTER> on a blank line
|
|||
|
and Select S to (S)ave.
|
|||
|
|
|||
|
(E)nter a message
|
|||
|
|
|||
|
If you wish to leave a message, simply hit the E key which is BBS
|
|||
|
shorthand for (E)nter a new message. You will be prompted for the
|
|||
|
name of the person to whom you wish to send the message (TO:), your
|
|||
|
name will automatically appear in the FROM:, and you will be at the
|
|||
|
SUBJECT:. At this position, type in a brief description of what
|
|||
|
your message concerns and hit <ENTER>.
|
|||
|
|
|||
|
NOTES on the TO: line:
|
|||
|
---------------------------------------------------------------------
|
|||
|
As mentioned above, you may address your message to a specific
|
|||
|
person or by typing ALL, you are sending the message to everybody
|
|||
|
who is a member of the Conference you are in at the time.
|
|||
|
|
|||
|
If your SysOp has enabled the "check for existence of Member" Option
|
|||
|
you will be advised if the Recipient is not a current Member of the
|
|||
|
BBS and you can either (A)bort the message or accept the fact that
|
|||
|
whomever you are addressing the message to will probably never see
|
|||
|
it!! (Same thing happens if you mis-spell the name).
|
|||
|
---------------------------------------------------------------------
|
|||
|
|
|||
|
Page 10
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
You will now be asked to enter a security level for the message.
|
|||
|
A security level prompt will appear as follows:
|
|||
|
|
|||
|
Security: (G)roup, (R)eceiver, (S)ender, (H)elp, (N)one
|
|||
|
|
|||
|
(G)roup allows assigning a password to the message so that
|
|||
|
only other callers who know the common password will be
|
|||
|
allowed to read the message.
|
|||
|
|
|||
|
(R)eceiver makes the message private to all except you - the
|
|||
|
person leaving it - and the person to who it is addressed.
|
|||
|
|
|||
|
(S)ender allows you to assign a password to the message so
|
|||
|
that only you can kill it later. This prevents the other
|
|||
|
person to who the message is addressed from killing it.
|
|||
|
|
|||
|
(N)one means that the message will be open for all to read.
|
|||
|
|
|||
|
Note that you can NOT assign (R)eceiver protection to a message
|
|||
|
which has been addressed to ALL.
|
|||
|
|
|||
|
After completing the above steps, you can enter your text. Each line
|
|||
|
you enter will be preceded by it's line number. Up to 72 characters
|
|||
|
per line are allowed. Typing beyond the 72 character limit will
|
|||
|
cause your text to automatically "word-wrap" down to the next line.
|
|||
|
|
|||
|
It is important to remember that hitting <ENTER> when you are in the
|
|||
|
first position of a blank line signals the System that you are now
|
|||
|
finished writing the message and want to Post the message. So, if
|
|||
|
you want an actual blank line for a paragraph separator, space over
|
|||
|
to the Second position before hitting the <ENTER> key.
|
|||
|
|
|||
|
To complete entering text, press (Enter) alone on a blank line, at
|
|||
|
which time the following command will be displayed:
|
|||
|
|
|||
|
Message Completion Subcommands
|
|||
|
------------------------------
|
|||
|
|
|||
|
(A)bort, (C)ontinue, (D)elete, (E)dit, (H)elp, (I)nsert, (L)ist, (S)ave,
|
|||
|
(SC)
|
|||
|
|
|||
|
(A)bort abandons or cancels your message entry.
|
|||
|
(C)ontinue allows you to continue entering text.
|
|||
|
(D)elete allows you to delete a line of text from the message.
|
|||
|
(E)dit allows you to edit a line of text.
|
|||
|
(H)elp displays this Help file.
|
|||
|
(I)nsert allows inserting a line of text in front of another.
|
|||
|
(L)ist relists your text entry so far to the screen.
|
|||
|
(S)ave actually writes the message to disk.
|
|||
|
(SC) allows saving the same message to another individual.
|
|||
|
(SK) save your message, kill replied to message (if applicable)
|
|||
|
(SN) save your message, skip redisplay of replied to message
|
|||
|
|
|||
|
Page 11
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
Note: The format to (E)dit a line of text is:
|
|||
|
old text;new text
|
|||
|
|
|||
|
where the "old text" is the text you wish to replace, followed
|
|||
|
by a ";" followed by the new text. The old text search is case
|
|||
|
sensitive - so capital letters must match exactly. If your new
|
|||
|
text causes that line to exceed 72 characters, the characters
|
|||
|
beyond 72 will be truncated from the line.
|
|||
|
|
|||
|
|
|||
|
Next month's article will continue with the messaging function and we will
|
|||
|
take a look at some of the more advanced functions such as how you can
|
|||
|
Search the entire BBS for a message containing a specific word, Quoting
|
|||
|
from another message, and posting pre-written messages using the ASCII
|
|||
|
UPload function.
|
|||
|
|
|||
|
Once Again... IF YOU WANT TO RECEIVE MAIL - LEAVE MAIL!!
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| 'C' TUTOR |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
by Doug Maclean, Node id->RUNNINGB
|
|||
|
|
|||
|
Many times I find tab characters to be annoying in text viewers that
|
|||
|
display the ASCII code for the tab and which do not convert them into
|
|||
|
spaces. Very often, form feeds in documentation cause strange paginations
|
|||
|
which leave two or three lines alone on a page. The following program,
|
|||
|
strip, will convert tab characters into any number of spaces that you want
|
|||
|
and remove pesky form feeds. This code also serves as a guide to writing
|
|||
|
your own linked list programs and it contains a routine to insert one
|
|||
|
string into another.
|
|||
|
|
|||
|
#include <stdio.h>
|
|||
|
#include <stdlib.h>
|
|||
|
#include <malloc.h>
|
|||
|
#include <string.h>
|
|||
|
|
|||
|
#define MAXLINE 128
|
|||
|
#define OPTIONS "ft:v"
|
|||
|
#define BUFSIZE 20480
|
|||
|
|
|||
|
extern char *optarg;
|
|||
|
extern int optind;
|
|||
|
|
|||
|
int getopt(int argc,char * *argv,char *optionS);
|
|||
|
void addlst(char *s);
|
|||
|
void strins(char *buf,char *ptr,char *str);
|
|||
|
void main(int argc,char **argv);
|
|||
|
|
|||
|
struct list
|
|||
|
|
|||
|
Page 12
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
{
|
|||
|
char *str;
|
|||
|
struct list *next;
|
|||
|
} *croot = NULL, *clast = NULL;
|
|||
|
|
|||
|
void
|
|||
|
main(argc,argv)
|
|||
|
char **argv;
|
|||
|
{
|
|||
|
FILE *fn;
|
|||
|
char buf[MAXLINE];
|
|||
|
char *srcbuf;
|
|||
|
char *ch;
|
|||
|
char *spaces;
|
|||
|
char opt;
|
|||
|
int sp;
|
|||
|
int ff=0,vt=0,verbose=0;
|
|||
|
|
|||
|
if((argc != 3) && (argc != 2))
|
|||
|
{
|
|||
|
fprintf(stderr,"usage: strip [-%s] file\n",OPTIONS);
|
|||
|
exit(1);
|
|||
|
}
|
|||
|
while((opt=(char)getopt(argc,argv,OPTIONS)) != EOF)
|
|||
|
switch(opt)
|
|||
|
{
|
|||
|
case 'f':
|
|||
|
ff = 1;
|
|||
|
break;
|
|||
|
case 't':
|
|||
|
vt = 1;
|
|||
|
sp = atoi(optarg);
|
|||
|
spaces = calloc(sp+1,1);
|
|||
|
memset(spaces,' ',sp);
|
|||
|
break;
|
|||
|
case 'v':
|
|||
|
verbose = 1;
|
|||
|
break;
|
|||
|
default:
|
|||
|
fprintf(stderr,"usage: strip [-%s] file\n",OPTIONS);
|
|||
|
exit(1);
|
|||
|
break;
|
|||
|
}
|
|||
|
srcbuf = malloc(BUFSIZE);
|
|||
|
if((fn=fopen(argv[optind],"rt")) == NULL)
|
|||
|
{
|
|||
|
fprintf(stderr,"unable to open file %s for read\n",argv[optind]);
|
|||
|
exit(2);
|
|||
|
}
|
|||
|
setvbuf(fn,srcbuf,_IOFBF,BUFSIZE);
|
|||
|
memset(buf,'\0',MAXLINE);
|
|||
|
while(fgets(buf,MAXLINE,fn) != NULL)
|
|||
|
|
|||
|
Page 13
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
{
|
|||
|
for(ch=&buf[strlen(buf)];--ch >= buf;)
|
|||
|
if(*ch < 0x20)
|
|||
|
switch(*ch)
|
|||
|
{
|
|||
|
case 12:
|
|||
|
if(!ff)
|
|||
|
*ch = 0x20;
|
|||
|
break;
|
|||
|
case 9:
|
|||
|
*ch = 0x20;
|
|||
|
if(vt)
|
|||
|
strins(buf,ch,spaces);
|
|||
|
break;
|
|||
|
default:
|
|||
|
*ch = 0x20;
|
|||
|
break;
|
|||
|
}
|
|||
|
addlst(buf);
|
|||
|
if(verbose)
|
|||
|
puts(buf);
|
|||
|
}
|
|||
|
fclose(fn);
|
|||
|
if((fn=fopen(argv[optind],"w+")) == NULL)
|
|||
|
{
|
|||
|
fprintf(stderr,"unable to open %s for write\n",argv[1]);
|
|||
|
exit(3);
|
|||
|
}
|
|||
|
for(clast=croot;clast;clast=clast->next)
|
|||
|
fprintf(fn,"%s\n",clast->str);
|
|||
|
fclose(fn);
|
|||
|
printf("%s converted\n",argv[optind]);
|
|||
|
}
|
|||
|
void
|
|||
|
addlst(s)
|
|||
|
char *s;
|
|||
|
{
|
|||
|
struct list *cp;
|
|||
|
|
|||
|
if((cp=(struct list *)malloc(sizeof(struct list))) == NULL ||
|
|||
|
(cp->str=malloc(strlen(s)+1)) == NULL)
|
|||
|
{
|
|||
|
fprintf(stderr,"out of memory\n");
|
|||
|
exit(4);
|
|||
|
}
|
|||
|
strcpy(cp->str,s);
|
|||
|
cp->next = NULL;
|
|||
|
if(croot == NULL)
|
|||
|
croot = cp;
|
|||
|
else
|
|||
|
clast->next = cp;
|
|||
|
clast = cp;
|
|||
|
|
|||
|
Page 14
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
}
|
|||
|
void
|
|||
|
strins(buf,ptr,str)
|
|||
|
char *buf; /* original string */
|
|||
|
char *ptr; /* pointer to position to insert */
|
|||
|
char *str; /* string to insert */
|
|||
|
{
|
|||
|
char *temp;
|
|||
|
char *pos;
|
|||
|
int i;
|
|||
|
int len;
|
|||
|
|
|||
|
temp = calloc(strlen(buf)+strlen(str)+1,1);
|
|||
|
for(pos=buf,i=0;pos<=ptr;pos++,i++)
|
|||
|
*(temp+i) = *pos;
|
|||
|
strcat(temp,str);
|
|||
|
len = strlen(temp);
|
|||
|
for(pos=&ptr[1],i=0;pos<=&buf[strlen(buf)];pos++,i++)
|
|||
|
*(temp+i+len) = *pos;
|
|||
|
strcpy(buf,temp);
|
|||
|
free(temp);
|
|||
|
}
|
|||
|
|
|||
|
I hope everyone enjoys this article. Coming events in my conferences
|
|||
|
include:
|
|||
|
|
|||
|
'C': programming MSC 6.0's PWB
|
|||
|
OOPS: learning the new Turbo C++ compiler
|
|||
|
Systems: Interviewing problems
|
|||
|
ASM: Loops and jumps
|
|||
|
Brief: Re-write your startup macro
|
|||
|
Genetics: Use of fetal tissue
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| DOS SHELL SHOOT-OUT |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
by Jim Daly, Node id ->TREASURE
|
|||
|
|
|||
|
XTree Pro-Gold and Norton Commander
|
|||
|
|
|||
|
I became acquainted with the XTREE series almost 3 years ago when I
|
|||
|
purchased a PC that had the original XTree on its hard drive. At that
|
|||
|
time, I was using IBM's Fixed Disk Organizer as my DOS Shell program. In
|
|||
|
fact, up until the time I discovered XTree on the used XT, I bundled IBM-
|
|||
|
FDO on every system I installed. After comparing the 2 programs, XTree
|
|||
|
became our standard DOS Shell management program. The release of XTreePRO
|
|||
|
added many new features including a built-in text editor.
|
|||
|
|
|||
|
XTreePro-GOLD continues building on the features that have made its 2
|
|||
|
former versions so successful. The environment created by "GOLD" helps
|
|||
|
|
|||
|
Page 15
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
both the novice and power user manage their files, directories and disks
|
|||
|
faster and more easily than ever before.
|
|||
|
|
|||
|
I will touch on just a few of the many many features of "GOLD" in this
|
|||
|
article.
|
|||
|
|
|||
|
General Overview
|
|||
|
----------------
|
|||
|
In addition to duplicating all of the standard DOS features in its on-
|
|||
|
screen windows, "GOLD" offers some special operations either not offered by
|
|||
|
DOS as enhancements to DOS.
|
|||
|
|
|||
|
. View the complete Directory structure of any of your disks in one clear
|
|||
|
graphic display (split the window and look at 2 different disks at the same
|
|||
|
time).
|
|||
|
|
|||
|
. Log up to 26 drives and 13,000 files and display all files
|
|||
|
across all logged drives simultaneously.
|
|||
|
|
|||
|
. View every file in every directory as a single list. The files
|
|||
|
can be shown with or without sizes, dates, and attributes and
|
|||
|
can be displayed in different sort orders.
|
|||
|
|
|||
|
. View files created in dBASE, WORD, WordStar, WordPerfect, Multi-
|
|||
|
Mate, Hex, ASCII, and LOTUS formats (Exact LOTUS formulae are shown
|
|||
|
whereas Commander only shows that a cell contains a formula). While
|
|||
|
in the View Mode, you can also search for exact text strings in the
|
|||
|
displayed files or groups of files.
|
|||
|
|
|||
|
Norton Commander adds the ability to also view several types of
|
|||
|
Graphics formats. With the increasing popularity of Desk Top
|
|||
|
Publishing, this missing feature is a definite handicap in "GOLD".
|
|||
|
|
|||
|
. Specify up to 16 different file specifications at one time so that
|
|||
|
you can view specific combinations of files. You may also specify
|
|||
|
specifications that EXCLUDE files from display.
|
|||
|
|
|||
|
. Move a single file or group of files from one directory to another.
|
|||
|
|
|||
|
. Start Applications and perform other Batch operations using the
|
|||
|
customizable Application Menu. (When using the Application function,
|
|||
|
"GOLD" is shrunk to only 7kb resident.
|
|||
|
|
|||
|
. GRAFT-move an entire sub-directory and its files to a different parent.
|
|||
|
PRUNE-a branch of a directory, completely deleting all sub-directories
|
|||
|
and files contained in the pruned directory.
|
|||
|
|
|||
|
. Maintain a history of up to 15 responses for every operation or command
|
|||
|
that requires text entry.
|
|||
|
|
|||
|
. Change any attribute on any single file or group of files.
|
|||
|
|
|||
|
|
|||
|
Page 16
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
Although "GOLD" will allow you to enter a DOS command from within its
|
|||
|
Command Shell, Norton Commander's "always on" DOS line is a better
|
|||
|
approach.
|
|||
|
|
|||
|
Since I have been a User of the XTREE family for several years and have
|
|||
|
become familiar with its overall "look and feel", XTreePro-GOLD is my
|
|||
|
program of choice. However, for a new User of DOS Shell Manager, I believe
|
|||
|
either one would be well-served by either COMMANDER or GOLD.
|
|||
|
|
|||
|
System Requirements:
|
|||
|
100% IBM-PC compatible
|
|||
|
256K (Minimum)
|
|||
|
PC or MS-DOS v3.1 or greater
|
|||
|
GRAPHICS-All supported
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| TRADEMARKS |
|
|||
|
| AND SERVICE MARKS |
|
|||
|
+---------------------------------+
|
|||
|
by James J. Spinelli, Node ID ->VMC
|
|||
|
|
|||
|
In our past three articles of this series we explored the areas of patents,
|
|||
|
copyrights and trademarks in protecting our ideas. In this, our final
|
|||
|
article in the series, we'll take a brief tour of state and common law
|
|||
|
protections.
|
|||
|
|
|||
|
Patents, copyrights and trademarks are all created by federal law.
|
|||
|
Individual states may afford additional protection under such common law
|
|||
|
concepts as "unfair competition" and "trade secrets." Although the laws of
|
|||
|
each state may differ, they all follow a similar pattern. The discussion
|
|||
|
that follows assumes a product that is not patented.
|
|||
|
|
|||
|
TRADE SECRETS
|
|||
|
-------------
|
|||
|
Let's say that you have a special formula for SUPERSODA which makes it
|
|||
|
taste better than any other softdrink on the market. It has its own secret
|
|||
|
recipe. This recipe formula is a trade secret.
|
|||
|
|
|||
|
A trade secret is basically confidential information used in a business to
|
|||
|
give a competitive advantage over others who do not know or use it. It can
|
|||
|
include formulas, patterns, customer lists, manufacturing processes,
|
|||
|
devices, and many other types of information, including new product ideas.
|
|||
|
|
|||
|
You can own a trade secret even if you are not in business, as long as it
|
|||
|
is of economic value and is confidential. In deciding whether something is
|
|||
|
a trade secret, courts look at how well known it is, how valuable it is,
|
|||
|
the effort taken by the owner to protect it, and how difficult it was to
|
|||
|
develop.
|
|||
|
|
|||
|
Common law trade secret protection differs significantly from patent law:
|
|||
|
|
|||
|
- There is no obligation to disclose the details publicly.
|
|||
|
|
|||
|
Page 17
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
In fact, while confidential disclosures do not destroy the
|
|||
|
protection, indiscriminate or unconditional ones do. If selling
|
|||
|
or exhibiting your product reveals the secret, you may no longer
|
|||
|
be protected. The same is probably true if you enter your idea
|
|||
|
in a contest.
|
|||
|
|
|||
|
- There is no arbitrary time limitation on common law protection,
|
|||
|
as there is with patents.
|
|||
|
|
|||
|
- The rigid standards for patentability do not apply to common
|
|||
|
law.
|
|||
|
|
|||
|
- Common law does NOT bestow the right to exclude others from
|
|||
|
making and selling an identical product if they legitimately
|
|||
|
have information that enables them to do so. The crucial
|
|||
|
question is basically HOW they got that information. Unless they
|
|||
|
obtained it wrongfully, they can use it any way they wish.
|
|||
|
Therefore, to maintain your protection, you must take
|
|||
|
precautions to ensure that your idea remains confidential. If
|
|||
|
another individual independently invents your product, however,
|
|||
|
you have no rights against him.
|
|||
|
|
|||
|
How does someone "wrongfully" obtain a trade secret? It can happen in any
|
|||
|
number of ways. Theft and industrial espionage certainly fit the category.
|
|||
|
But so does breach of a "confidential relationship," a term that
|
|||
|
essentially encompasses any situation where the parties anticipate (and
|
|||
|
mutually agree) that information will be kept confidential or used only
|
|||
|
with permission. This can arise from an express written agreement, such as
|
|||
|
a "Non-Disclosure" agreement, or it may be implied from the circumstances.
|
|||
|
|
|||
|
For example, when you submit an idea to a company, the law presumes that
|
|||
|
you are doing so with the expectation of payment. The company may not use
|
|||
|
the concept without compensating you. Most firms will agree to review your
|
|||
|
idea if you sign a document disclaiming a confidential relationship. They
|
|||
|
do this not to intentionally steal your ideas (or so it is reasonably
|
|||
|
believed), but to protect themselves from unjust lawsuits by disgruntled
|
|||
|
inventors.
|
|||
|
|
|||
|
One precaution you can take is to tell people with whom you are dealing
|
|||
|
that the information is confidential and should not be disclosed. You could
|
|||
|
try to have them sign a simple form stating that they will respect your
|
|||
|
confidence. Ideally, everyone should sign, including consultants,
|
|||
|
employees, suppliers, manufacturers, graphic artists, and anyone else to
|
|||
|
whom you must reveal the information. In reality, asking people to sign
|
|||
|
such an agreement may alienate them and destroy trust.
|
|||
|
|
|||
|
About the only time these agreements are recommended is for presenting
|
|||
|
ideas to small companies. Informal requests, handshakes, and eye contact
|
|||
|
are probably more effective in most situations.
|
|||
|
|
|||
|
UNFAIR COMPETITION
|
|||
|
------------------
|
|||
|
|
|||
|
Page 18
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
The state common law equivalent of federally registered trademarks is the
|
|||
|
doctrine of unfair competition. Through consistent use, the public often
|
|||
|
comes to associate certain words or symbols with the goods or services of a
|
|||
|
particular company. They are said to have acquired a "secondary meaning."
|
|||
|
For example, most people will immediately think of McDonald's when they see
|
|||
|
golden arches. Even if this were not a registered trademark, it would
|
|||
|
probably be protected by the common law of unfair competition.
|
|||
|
|
|||
|
This law basically prohibits anyone else from "passing off" or "palming
|
|||
|
off" his goods or services as those of a competitor by using the words and
|
|||
|
symbols associated with the competitor. Therefore, you probably could not
|
|||
|
franchise fast foods under similar yellow spans without hearing from
|
|||
|
McDonald's lawyers. Similarly, you could not market canned peas using a
|
|||
|
laughing leafy leviathan logo (the "Green Giant"). Geographic
|
|||
|
designations, common words, and even your own name may acquire secondary
|
|||
|
meaning relating to others' products. If that is the case, you cannot use
|
|||
|
them in ways that would tend to confuse your goods with theirs. (For
|
|||
|
example, at least in the BBS/shareware arena, let's say your name is
|
|||
|
Sparks. You may not be permitted to call your product(s), "Sparkware.")
|
|||
|
This is a technical area of the law, and if you have any doubts, you would
|
|||
|
do well to consult a knowledgeable attorney in your state.
|
|||
|
|
|||
|
SAMPLE NON-DISCLOSURE AGREEMENT
|
|||
|
-------------------------------
|
|||
|
We hereby agree to receive in confidence full details about [your
|
|||
|
idea/invention/product] to be submitted by [your name].
|
|||
|
|
|||
|
In consideration for receiving such information, we agree that all
|
|||
|
materials provided will remain the property of [your name] and that they
|
|||
|
will be returned immediately upon written request. We agree to maintain
|
|||
|
the confidentiality of all information and materials provided and to
|
|||
|
refrain from divulging any details of the [your idea/invention/product]
|
|||
|
without prior written consent.
|
|||
|
|
|||
|
We agree not to make use of any feature or information of which [your name]
|
|||
|
is the originator, without payment of compensation in an amount to be
|
|||
|
negotiated.
|
|||
|
|
|||
|
[Your idea/invention/product] is being received and will be reviewed in
|
|||
|
confidence. However, we assume no responsibility whatsoever with respect to
|
|||
|
features or related technology that can be demonstrated to be already known
|
|||
|
to us. All information and correspondence regarding the subject of this
|
|||
|
agreement will be marked "CONFIDENTIAL."
|
|||
|
|
|||
|
We agree that within a period of _____[days/weeks/months] we will report to
|
|||
|
[your name] the results of our review and will advise whether we are
|
|||
|
interested in negotiating for the purchase of the rights to use [your
|
|||
|
idea/invention/product].
|
|||
|
|
|||
|
Date: ____________ Company: _______________________________
|
|||
|
|
|||
|
By: ______________________________________________
|
|||
|
|
|||
|
Page 19
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
Title: ______________________________________________
|
|||
|
|
|||
|
***************************************************************
|
|||
|
|
|||
|
In the next issue of RIME TIMES, we'll begin a series of articles dealing
|
|||
|
with Media and Communications Law, including libel, the First Amendment,
|
|||
|
and their implications to the BBS arena and BBS operators.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| TIPS FROM DAVE! |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
by David W. Terry, Node id ->SCORE
|
|||
|
|
|||
|
(on the argument as to whether to run a modem at 19200 or 38400)
|
|||
|
|
|||
|
If you do some benchmark tests you'll find that running your system at
|
|||
|
either 19200 or 38400 makes very little difference (in most cases). Here's
|
|||
|
a quick list for you sysops to ponder on...
|
|||
|
|
|||
|
At 19200 with modem compression turned OFF
|
|||
|
- downloading an ASCII file will achieve a maximum rate of 1700 cps
|
|||
|
- downloading a compressed file will also achieve a maximum of 1700
|
|||
|
|
|||
|
At 19200 with modem compression turned ON
|
|||
|
- downloading an ASCII file will achieve a maximum rate of 1920 cps
|
|||
|
- downloading a compressed file will SLOW DOWN to something less
|
|||
|
than 1700 cps depending on the data being transferred
|
|||
|
|
|||
|
At 38400 with modem compression turned OFF
|
|||
|
- downloading an ASCII file will achieve a maximum rate of 1700 cps
|
|||
|
- downloading a compressed file will also achieve a maximum of 1700
|
|||
|
|
|||
|
At 38400 with modem compression turned ON
|
|||
|
- downloading an ASCII file will achieve a maximum rate of 2300+ cps
|
|||
|
- downloading a compressed file will SLOW DOWN to something less than
|
|||
|
1700 cps depending on the data being transferred.
|
|||
|
|
|||
|
Now look for patterns in the above information.... let me point out a few:
|
|||
|
|
|||
|
1) Most files downloaded are of the compressed type (ZIP or ARC files)
|
|||
|
and in the two cases above where compression is turned OFF the
|
|||
|
maximum transfer rate is about 1700 cps REGARDLESS of whether you
|
|||
|
run at 19200 or 38400.
|
|||
|
|
|||
|
2) With compression turned ON the same compressed files slow down to
|
|||
|
something less than what you'd like to see whether you run at 19200
|
|||
|
or 38400.
|
|||
|
|
|||
|
|
|||
|
Page 20
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
Therefore the only (readily tangible) advantage to running at 38400 is for
|
|||
|
those users who connect with compression _ON_ and then download only ASCII
|
|||
|
(or other non-compressed) files.
|
|||
|
|
|||
|
Unless you have a lot of people connecting with compression ON who are
|
|||
|
downloading ASCII files you will not experience very much of a difference
|
|||
|
whether you run your modem at 19200 or 38400.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| ASK MISS NETIQUETTE! |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
|
|||
|
Dear Miss Netiquette,
|
|||
|
|
|||
|
In matters of taste, what subjects are generally considered to be network
|
|||
|
"taboo"? I cannot seem to make a determination based on conference
|
|||
|
content...:-)
|
|||
|
|
|||
|
signed, "Anything goes" Nola
|
|||
|
|
|||
|
Dear Miss Nola,
|
|||
|
|
|||
|
You must have *quite* a storied past if you cannot determine what is and
|
|||
|
what is not "taboo" in RelayNet conferencing. A woman of your loose
|
|||
|
judgement (and probably morals) should proceed with care while
|
|||
|
participating in the conferences.
|
|||
|
|
|||
|
What can and cannot be discussed should be apparent to the most casual
|
|||
|
observer. While the large variety and number of conferences covering
|
|||
|
topics such as Religion, Politics, Rock and Heavy Metal Music, Gay Issues,
|
|||
|
Men's and Women's issues and Medical and Science issues seem to cover it
|
|||
|
all, there are certain topics which need to be handled very carefully and
|
|||
|
ONE topic to be avoided at ALL costs and is very MUCH "taboo".
|
|||
|
|
|||
|
You must understand that all sysops and quite a few users eat at least one
|
|||
|
daily meal in front of their computers while reading network mail. If you
|
|||
|
follow the guidelines of appropriate dinner time conversation you cannot go
|
|||
|
wrong. While not "taboo" the topics concerning bodily functions,
|
|||
|
obsessive/compulsive behavior and sexual perversions need to be discusssed
|
|||
|
with sensitivity out of respect for thousands of digestive tracts across
|
|||
|
the country.
|
|||
|
|
|||
|
If you had been reading the COMMON conference, you would know by now THE
|
|||
|
one forbidden topic. I hesitate to mention it here. Even though THE
|
|||
|
forbidden topic consists of simple words, the synergistic power unleashed
|
|||
|
when these simple words are combined is quite alarming! Under no
|
|||
|
circumstance, must you bring up "Fan-Driven Sailboats"! I am sure the
|
|||
|
reason is obvious to you and will say no more.
|
|||
|
|
|||
|
|
|||
|
Page 21
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| NAME THAT AUTHOR! |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
|
|||
|
Below are three quotes. If you can name the authors of all three, Ed
|
|||
|
Lazarowitz will bestow upon you some high honor and/or some fabulous prize!
|
|||
|
Please route your answers R/O in COMMON to Ed at Node id
|
|||
|
->CAPCON.
|
|||
|
|
|||
|
"If I'd have known I was going to live so long, I'd have taken better
|
|||
|
care of myself."
|
|||
|
|
|||
|
"Advertising is 85 percent confusion and 15 percent commission."
|
|||
|
|
|||
|
"Advertising is legalized lying."
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| NOTES FROM |
|
|||
|
| ADMIN |
|
|||
|
+---------------------------------+
|
|||
|
|
|||
|
Relaynet is now 460 nodes strong!
|
|||
|
PCRelay 4.1 is released!
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| AS SEEN ON THE BIT STREAM |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
|
|||
|
TAGLINE OF THE MONTH:
|
|||
|
"STUPIDITY is not a handicap, PARK ELSEWHERE!!"
|
|||
|
|
|||
|
BORING THREAD OF THE MONTH:
|
|||
|
"OIL" (on the relative merits of different motor oils)
|
|||
|
|
|||
|
THE THREAD THAT LOST CONTROL:
|
|||
|
"DAN QUAYLE" (on what state is Dan from? Maybe no state wants to claim
|
|||
|
him?)
|
|||
|
|
|||
|
MALFUNCTION OF THE MONTH:
|
|||
|
After an enthusiastic welcome from many members, our first node from Hawaii
|
|||
|
posted a system password in COMMON to give us all "special access" to his
|
|||
|
BBS. Ed, we are hoping that the access is not TOO special and that you
|
|||
|
make your system password a true "mystery".
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 22
|
|||
|
---------------------------------------------------------------------------
|
|||
|
JUN RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
+---------------------------------+
|
|||
|
| NOTICES |
|
|||
|
| |
|
|||
|
+---------------------------------+
|
|||
|
|
|||
|
The RIME Times is published monthly by the membership of RelayNet In-
|
|||
|
ternational Message Exchange as its official newsletter. Users and Sysops
|
|||
|
are encouraged to contribute. Submissions and questions may be directed to
|
|||
|
the editors John Dodson, node ->CANTINA or Ed Lazarowitz, node ->CAPCON.
|
|||
|
|
|||
|
(c)Copyright 1990, The RelayNet International Message Exchange. Permission
|
|||
|
is hereby granted for unlimited distribution and duplication, provided
|
|||
|
such distribution and duplication are strictly for non-commercial purposes
|
|||
|
only. All other rights reserved. RelayNet and RIME are registered
|
|||
|
trademarks.
|
|||
|
|