1288 lines
66 KiB
Plaintext
1288 lines
66 KiB
Plaintext
* * * * * * * * * * * * * * * * * * * * * * * * * * * * *
|
||
T E L E C O M P U T I N G M A G A Z I N E
|
||
Electronic Edition
|
||
October/November 1990
|
||
(C) 1990 Galaxy Telecomm Corporation
|
||
800-477-1788
|
||
* * * * * * * * * * * * * * * * * * * * * * * * * * * * *
|
||
|
||
1 ... Superdemocracy - Tim Stryker
|
||
2 ... Joining the Online World - Victor Baron
|
||
3 ... The FBI Comes Rapping, Rapping at Your BBS -
|
||
Brock N. Meeks
|
||
4 ... What's New in ZMODEM - Chuck Forsberg
|
||
5 ... Under the Boardwalk - Dean Kerl
|
||
6 ... Requirements To Display Telecomputing Magazine
|
||
On Electronic Bulletin Board Systems
|
||
7 ... Table Of Contents From Our Printed Edition
|
||
(What's Missing From The Electronic Edition!)
|
||
|
||
CALL 800-477-1788 AND REQUEST A FREE COPY OF OUR LATEST ISSUE!
|
||
Telecomputing Magazine, The Online Authority
|
||
|
||
|
||
SUPERDEMOCRACY
|
||
by Tim Stryker
|
||
|
||
Online technology offers the promise of a fundamentally new form of
|
||
government: a government truly of the people, by the people, for the people.
|
||
|
||
The form of government under which we now live is technically known as
|
||
a "representative democracy". This means that we the people do not directly
|
||
act as the government... we democratically elect representatives who act on
|
||
our behalf to create laws, enforce them, and resolve disputes. These three
|
||
functions correspond to the hallowed "separation of powers" everyone knows
|
||
from grade school: the legislative, executive, and judicial branches of
|
||
government.
|
||
|
||
The shortcomings of this system are many. It is generally acknowledged
|
||
that although it is the best system yet developed for government on a large
|
||
scale (and I for one agree), it fails in several key respects, among them:
|
||
|
||
1. Vulnerability to special interests. Any economic group, such as
|
||
real estate developers or tobacco companies, has a much higher stake in the
|
||
passage of legislation favorable to the group than the average citizen has
|
||
in its defeat. The proposal to re-zone a property outside a five-mile
|
||
radius from your house, for example, is something that you personally can
|
||
only get incensed about in the abstract, whereas the real estate agents,
|
||
lawyers, and developers involved stand to make or lose millions of dollars
|
||
on the outcome. Therefore they have an enormously higher incentive than you
|
||
do to put pressure on the city or county commisioners making the decision.
|
||
|
||
2. Domination by busybodies. Politics tends to take into account to a
|
||
disproportionate extent the opinions of those with nothing better to do, and
|
||
single-issue constituencies. The mechanisms for candidate identification,
|
||
conducting public hearings, jury selection and so forth are all so
|
||
cumbersome and time-consuming that the average citizen has little motivation
|
||
to participate. The result is often that the outputs of these processes
|
||
suffer from the Milquetoast Effect. In particular, the only candidates
|
||
presented to the general public for voting are those that have not been
|
||
winnowed out by offending a single one of a host of highly vocal
|
||
sub-minorities.
|
||
|
||
3. Getting involved is too much work for the average person. You are
|
||
unusual if you even know the names of your representatives to the U.S.
|
||
Congress, much less the names of your state congresspersons, much much less
|
||
the qualifications of each of the hordes of local judges you may be asked to
|
||
vote on every few years. The reason is that, although you know exactly how
|
||
you feel about each specific issue, it would take vast research for you to
|
||
find out how each candidate feels or has voted on each of the issues
|
||
important to you, and to form, for each post, a weighted probability of the
|
||
likelihood that each candidate will perform as you wish them to. (On top of
|
||
this, if you register to vote, you are penalized with jury duty!) The
|
||
result is widespread voter "apathy", especially at the state and local
|
||
levels. This isn't really a lack of caring, it's just a sense among the
|
||
populace that voting as it stands is too indirect and requires research on
|
||
each individual's part far out of proportion to the benefit that they will
|
||
individually derive from it.
|
||
|
||
4. Corruption. This is just a more extreme form of vulnerability to
|
||
special interests. The incentive to influence legislation or enforcement is
|
||
often high enough that a lobby will succeed in "stocking" elective posts
|
||
with its own hirelings. The amount of money needed for a campaign,
|
||
especially lately, is huge, and it can only be expected that a successful
|
||
candidate will look more favorably on the concerns of his or her big
|
||
contributors. There is a continuum of possibilities between this state of
|
||
affairs and outright payoffs for votes or favors. All of this flies in the
|
||
face of the ideal that elected officials and representatives are supposed to
|
||
act in the best interests of the community that elected them, as a whole.
|
||
|
||
5. Capriciousness of justice. This concern applies mainly to the
|
||
judicial branch of government. The fact that diverse individuals are
|
||
elected or appointed to positions of coequal power means that a case may be
|
||
decided very differently, depending on which particular judge you happen to
|
||
get. The use of juries for the more serious cases is an attempt in the
|
||
right direction, but an awful lot still depends on the particular jury,
|
||
judge, prosecutor, and defense attorney you happen to wind up with.
|
||
|
||
6. Horse trading and smoke-filled rooms. So much of the actual
|
||
mechanics of government takes place outside public knowledge or control that
|
||
a lot of the decisions made have nothing to do with what is best for the
|
||
community at large, but only what is best for the personal agendas of the
|
||
participants. The fact that the participants are subject to removal from
|
||
office at the next election keeps them from getting too outrageously
|
||
flagrant, but the continuous on-going exchange of favors among lawmakers in
|
||
service of their personal ambitions does not exactly constitute government
|
||
of the people, by the people, for the people.
|
||
|
||
|
||
There Must Be A Better Way
|
||
--------------------------
|
||
|
||
Suppose that society could decide every issue by simple majority vote.
|
||
This tends to work well on a small scale. For example, in the city-states
|
||
of ancient Greece, the entire populace got together from time to time and
|
||
enacted the "will of the people" into law, with no man's voice given any
|
||
more authority than any other. Another example would be the "town meetings"
|
||
of early New England, at which the townspeople got together and formulated
|
||
the laws by which they regulated themselves. Today, small non-governmental
|
||
organizations such as professional societies often decide policy by direct
|
||
vote of the members.
|
||
|
||
The reason this works well (on a small scale) is that it eliminates the
|
||
role of the "representative". You no longer have a fallible human being,
|
||
with his or her own agenda, ambitions, and preconceptions acting on behalf
|
||
of the group. The group votes directly on the issues before it, not on a
|
||
personality or a suit.
|
||
|
||
The reasons this hasn't worked before on a larger scale are mostly
|
||
practical. The entire populace cannot physically gather in continuous
|
||
session, deciding every detail of policy and law... nothing else in the
|
||
world would get done!
|
||
|
||
What you *could* have, though, is a continuous networked hierarchy of
|
||
online referenda, open to all. The idea would be to create an environment
|
||
in which any citizen is free to propose new laws, amend old ones, and to
|
||
vote or contribute to ongoing discussions on proposals or amendments
|
||
introduced by others at any time. I call this "Superdemocracy".
|
||
|
||
Superdemocracy would be continuous in the sense that anyone could tap
|
||
into the system any time, 24 hours a day, 365 days a year. It would be
|
||
networked in the sense that anything posted about any issue, anywhere in the
|
||
system, would be accessible to anyone else. It would be a hierarchy in the
|
||
sense that each citizen could access his or her own local, county,
|
||
statewide, or national referenda through a single mechanism: a "tree" of
|
||
nodes able to collate discussion and voting at all appropriate levels.
|
||
|
||
The sorts of things that people could vote on includes everything
|
||
currently decided by our legislative and judicial branches, city councils,
|
||
policy-forming bodies in the executive branch, and so on. The
|
||
implementational portion of each of these branches would be retained, and
|
||
all aspects of national life requiring instant decisions would continue to
|
||
operate under the control of executive branch personnel. The military would
|
||
retain full autonomy under civilian oversight, just as it does now, and
|
||
there would still be a President, a Cabinet, police forces, an FBI and a
|
||
CIA, and so on.
|
||
|
||
But the broad, strategic decision-making power would be vested in the
|
||
people directly: the making of new laws, resolutions, and policies, the
|
||
amendment or repeal of old ones, the selection of the necessary executive
|
||
personnel, and the resolution of conflicts and disagreements. Let's call
|
||
these things, in general, "measures". Some key provisions of Superdemocracy
|
||
would be:
|
||
|
||
1. Constitutional priority. All measures passed would still be
|
||
subject to a consistency test against a statement of underlying principles.
|
||
The statement of underlying principles would require much broader levels of
|
||
support to modify or overturn. This would help to keep us from wildly
|
||
gyrating about the legal landscape as current events shape public opinion.
|
||
|
||
2. Instant delegation and revocation of proxy powers. Each citizen
|
||
would have the option to delegate his or her voting powers to other people
|
||
(their "representatives", if you will) in various ways, and to override or
|
||
revoke these powers at any time. This would provide for a healthy
|
||
proportion of the public's voting power to be present in even the smallest
|
||
decisions of government, without paralyzing the country in an orgy of
|
||
continuous individual voting. The flexibility of these proxy powers would
|
||
give each citizen the ability to say to a representative, "I trust your
|
||
judgement, overall, on matters within a given area that I personally don't
|
||
have enough interest in to bother with the details; however I reserve the
|
||
right to change my mind about you at any time or to override your judgement
|
||
on occasions when my opinion happens to differ from yours."
|
||
|
||
3. Minimum quorum requirements on every measure. By requiring a
|
||
minimum proportion of the overall voting power available to be active in
|
||
each vote, we help ensure that happenstantial distortion of the people's
|
||
will, due to low participation in a low-profile issue, will not occur. If
|
||
quorum requirements are not met in a given vote, it means that not enough
|
||
people (or their proxies) feel strongly enough about it one way or the other
|
||
to be worth their time.
|
||
|
||
4. Minimum debate-time requirements on every measure. After a measure
|
||
reaches quorum, there needs to be sufficient time, around 30 days or so, for
|
||
everyone to talk it over and think about it before finalizing the vote.
|
||
Each person could continue to update his or her vote status throughout this
|
||
period, and only the tally of votes at the end of this period would be
|
||
decisive.
|
||
|
||
5. Minimum hold-time requirements on every measure. Further
|
||
protection against wild gyrations about the legal landscape can be provided
|
||
by establishing a minimum time period, after a measure is passed, before it
|
||
can take effect. This would be on the order of 30 days. During this time,
|
||
opponents of the measure could try to repeal it or amend it, which, if
|
||
successful, would yield another 30-day period for the population to be
|
||
really sure that *this* is what it wants, and so on. Any oscillations would
|
||
quickly die down, and the true "will of the people" would then take effect.
|
||
|
||
Several practical considerations arise. Everyone would have to have
|
||
access to a communications link and the knowledge of how to use it, just as
|
||
now everyone must have eyes, hands, and a basic ability to read and punch
|
||
holes in order to vote (special provisions for the handicapped would of
|
||
course apply). Airtight protection against fraud and invasion of privacy
|
||
would have to be developed. And, the cost of creating and maintaining this
|
||
colossal network of computers would be high.
|
||
|
||
|
||
Historic Trends
|
||
---------------
|
||
|
||
Technology, strangely enough, has always driven the development of
|
||
democracy. Think about it. Democracy has only existed when the overall
|
||
level of affluence in a population permitted a significant number of people
|
||
to take nose from grindstone long enough to consider the larger issues.
|
||
|
||
During the Dark Ages, there were no large-scale democracies,
|
||
representative or otherwise, because travel over distances of more than a
|
||
few tens of miles was too arduous to make practical the congregation of
|
||
representatives from widely separated regions for purposes of timely
|
||
decision-making. Also, before Gutenberg, communications technology was so
|
||
poorly developed that the knowledgeability of the average villager about
|
||
anything outside a ten-mile radius from home was effectively zero.
|
||
|
||
Our current model of representative democracy derives from conditions
|
||
in the 1700's. At that time, the technology of physical transport had
|
||
reached the point at which it was practical for representatives from
|
||
communities across the nation to commute to and from a central meeting
|
||
place. The entire communities themselves couldn't travel, of course, but at
|
||
least their elected representatives could. Similarly, the entire community
|
||
couldn't sit in on every 2-bit larceny trial, but they could elect a judge
|
||
to oversee the process for them (or, they could elect a governor who would
|
||
appoint a judge, etc.).
|
||
|
||
As technology has improved, so has the demand for wider and more direct
|
||
participation in the democratic process. As created by our Founding
|
||
Fathers, it was not possible to vote in most states in the late 1700's
|
||
unless you were white, free, male, *and* owned a certain amount of property.
|
||
The property requirement fell away in the early 1800's, as technological
|
||
advancement brought the affluence of the average freeman -- and thus his
|
||
perceived awareness and ability to be informed about political issues --
|
||
above a certain threshold. The race requirement was theoretically
|
||
eliminated in 1870 with the Fifteenth Amendment, once the pre-technological
|
||
abomination of slavery was forever buried... but further technological
|
||
advancements in communications and education were necessary before the poll
|
||
tax, which had been used to prevent many blacks from voting, was banned by
|
||
the Twenty-Fourth Amendment in 1964. Meanwhile, women gained the vote in
|
||
1920, after great agitation and improvements in technology sufficient to
|
||
emancipate them from the continuous servitude of housework.
|
||
|
||
The particulars of *what* we have been able to vote about has evolved,
|
||
too. Originally, the public (as restrictively as the term was defined!) was
|
||
not considered competent to elect the President of the United States
|
||
directly. It was not even entitled to elect the electors directly! The
|
||
public elected the members of the State legislatures, among whose duties it
|
||
was to elect the members of the "Electoral College", which elected the
|
||
President.
|
||
|
||
In this century, a growing tide of "direct democracy" has been sweeping
|
||
the nation. This movement, an outgrowth of the Populist and Progressive
|
||
movements around the turn of the century, has empowered citizens in most
|
||
states with the tools of the "initiative", the "referendum", and the
|
||
"recall". An "initiative" is a citizen-sponsored piece of legislation; a
|
||
"referendum" refers a proposed or existing law to voters for their approval
|
||
or rejection; a "recall" vote is an attempt to remove an elected official
|
||
from office prematurely.
|
||
|
||
All developments up to this point, though, have centered around the
|
||
same cumbersome, bureaucratic methods of vote-gathering that were used in
|
||
the 1700's. Voters must first register, months in advance. Then, on the
|
||
appointed day, tens of thousands of polling places open in every village and
|
||
city neighborhood. Voters then walk or drive, typically several miles, to
|
||
their particular polling place, and wait in line while dedicated public
|
||
servants pore through mountains of paper, checking off names and handing out
|
||
ballots which are voted upon and then reverently placed in the sacred Ballot
|
||
Box. It is actually a wonderful thing, and vastly preferable to the
|
||
despotic and corrupt systems it replaced.
|
||
|
||
|
||
An Example of Operation
|
||
-----------------------
|
||
|
||
Wouldn't it be incredible, though, if the people's participation in
|
||
government were to operate something like this:
|
||
|
||
|
||
You come home from the office after a hard day's work, kick your shoes
|
||
off, and, flipping on the tube, decide to take a quick glance at the city's
|
||
pending resolutions. You notice that today is the last day to vote on the
|
||
street-repair proposal, the referendum on funding low-income housing on the
|
||
north side of town, and the decision whether or not to permit someone named
|
||
John Hosiger to operate a liquor store downtown. The display shows you the
|
||
votes that your proxy, Sharon Imeld, will cast for you if you don't do
|
||
anything. Sharon's already fine on the street-repair thing, but she's way
|
||
off base on the low-income housing issue, so you override her there. You
|
||
never heard of John Hosiger so you figure Sharon probably looked into his
|
||
background for you and you leave that one alone.
|
||
|
||
You flip over to the "coming-up" screen and find that the next week
|
||
contains votes on school bus purchases, giving the "Key to the City" to a
|
||
certain Mark Havrelman, a proposal to re-zone a tract of farmland nearby to
|
||
commercial, the firemen's annual contract renewal, and scores of other
|
||
items. Cosby's on in 5 minutes, but you feel intrigued by the school bus
|
||
thing, so you select that for a moment. Up on your screen comes a listing
|
||
of messages on this topic from neighbors, school administrators, and bus
|
||
manufacturers. Selecting one of the latter, you are drawn into a discussion
|
||
of the impact of different transaxle designs on fuel economy. You read
|
||
several messages containing claims and rebuttals, and you leave a
|
||
sharply-worded message of your own to one of the bus companies, contesting
|
||
one of their statements.
|
||
|
||
Next, you pop out to the statewide level and glance through the issues
|
||
there: a debate on introducing a new form of Lottery, a proposal to reduce
|
||
state sales tax, another proposal to increase it, a new regulation on
|
||
offshore oil platforms, and many more. You've already registered your votes
|
||
on most of these, and your statewide proxy, Irwin Marsh, seems to have the
|
||
others under control.
|
||
|
||
Next, you pop over to Trials and note with satisfaction that the 3-time
|
||
murderer and child molester, Ted Goondy, has been voted into the electric
|
||
chair. Up for decision statewide today are Blanche Newald, accused of grand
|
||
larceny, and Abe Newman, 2nd-degree manslaughter. You select Abe's case and
|
||
begin poring through the state's evidence and the defense's counterpoints.
|
||
It's a complex issue, and you decide after a few minutes' review to make a
|
||
snap decision. Whoops, the box reminds you, in capital cases a review of at
|
||
least 3 hours of the evidence is required in order to vote.
|
||
|
||
Cosby's already started and you don't have the time, so you figure that
|
||
wiser minds will prevail on Abe's case and you pop out to National for a
|
||
quick look. Under debate are sanctions against Irate, confirmation of the
|
||
new ambassador to France, funding for fusion research, and a proposal to
|
||
eliminate the penny, among other things. You happen to feel strongly about
|
||
fusion research, so you select it and jump into the ongoing discussion.
|
||
|
||
And ongoing it is! At the national level, with new messages coming in
|
||
at a rate of thousands every second, it is nothing like your relatively
|
||
tranquil school bus debate! You select a keyword search on "pellet", which
|
||
responds saying that 7,455 messages are on file with that word. You specify
|
||
an additional keyword of "comparison", which cuts the number down to 104.
|
||
Scrolling through these quickly, you see a number of diagrams flash by which
|
||
you recognize as comparing the pellet-implosion method to the magnetic
|
||
containment method. Examining one of these closely, you realize that one of
|
||
your previous assumptions about fusion technology is untrue! You begin a
|
||
series of hypertext jumps through the database, winding up at last in the
|
||
quaintly named Library of Congress CD-ROM archives, gleaning more
|
||
information with which to make your decision.
|
||
|
||
Finally, sated with information and power, you indicate your vote on
|
||
the tally-screen and head for bed. You've missed Cosby but you've gained
|
||
something immeasurably greater: a sense of control over your own destiny.
|
||
Maybe tomorrow you'll write up that proposal for a new school gym you've
|
||
been thinking about, and send it up on the local node... who knows, maybe
|
||
others have been thinking about it too, and you'll hit quorum!
|
||
|
||
|
||
Objections
|
||
----------
|
||
|
||
A proposal like this is sure to stir up a hornet's nest of resistance,
|
||
if seriously considered. Some of the more likely objections are:
|
||
|
||
1. The "tyranny of the majority": the contention that minority rights
|
||
will be trampled in the mad lust of majority rule. This objection has been
|
||
applied to democracies throughout history, and is no more valid now than it
|
||
was before. If anything, the wider the empowerment, the less likely the
|
||
elite are to be able to force their effete and/or status-quo-oriented ideas
|
||
upon the rest of us. The lesson of small-scale democracies, and the trend
|
||
of history, is that the more a given decision can partake of the joint
|
||
common sense of everyday people, as opposed to their charismatic or
|
||
power-crazed leaders, the fairer and more equitable the decision is likely
|
||
to be.
|
||
|
||
2. Incompetence and/or apathy of the public. This is another
|
||
hold-over from bygone eras in which the aristocracy had an innate distrust
|
||
of the "lower classes". Another way this objection might be stated is that
|
||
Superdemocracy violates the Principle of Representation. This is a fancy
|
||
way of saying that people are better at deciding who should decide things
|
||
for them, than they are at deciding things themselves. This is false,
|
||
because the decision to elect a given politician can only be based on an
|
||
imperfect projection of the probabilities that the politician will act in
|
||
accordance with one's future desires. As for "apathy", the apathy that
|
||
currently exists is directly engendered by our hidebound mechanisms for
|
||
participation in government on the part of the populace.
|
||
|
||
3. Greater bamboozlement by special interests. Columnist George Will
|
||
recently denounced a proposal to allow nationwide "initiatives" to be voted
|
||
by the public directly into law: "Any national initiative would be dominated
|
||
by an intense, unelected minority using direct mail, television commercials,
|
||
and other techniques of mass persuasion." This is of course exactly how
|
||
modern-day election campaigns work, except that what is being voted upon is
|
||
not a policy or law, but a fallible human being who, once elected,
|
||
personally becomes the focus of a whole procession of "intense, unelected
|
||
minorities", behind closed doors, for the duration of his or her term in
|
||
office.
|
||
|
||
4. Fragility of high-tech underpinnings. It might be argued that the
|
||
country could be thrown into permanent confusion by a single well-placed
|
||
bomb or computer virus, if it has no other means of governing itself than
|
||
this consensual one. The solution is of course a manual "backup"
|
||
government, voted into being in the standard way, which would take over in
|
||
the event of a catastrophe.
|
||
|
||
5. Fickleness of public sentiment. Episodes of McCarthyism and the
|
||
recent "flag-burning amendment" furor make us wonder if the laws under
|
||
Superdemocracy would not change chaotically. I think that the dual measures
|
||
of adherence to a Constitution and the "30-day rules" would damp out any
|
||
wild oscillations. Those it doesn't can be regarded as the natural
|
||
consequence of a body governing itself, correcting imbalances as feedback is
|
||
obtained. They would at least not be due to a small minority of its leading
|
||
citizens behaving erratically, as is often the case now.
|
||
|
||
6. Greater divisiveness. This is a criticism more aptly aimed at the
|
||
proponents of "direct democracy", not Superdemocracy. By bringing complex
|
||
issues down to a simple yes/no vote, existing methods of initiative and
|
||
referendum can polarize communities, whereas due legislative process
|
||
encourages discussion, moderation, compromise, and consensus.
|
||
Superdemocracy would preserve and enhance this moderating,
|
||
consensus-building aspect of the legislative process by extending it to all
|
||
the people. Topical message bases are only one possible tool for doing
|
||
this -- to be sure, a much higher level of overall political awareness and
|
||
discussion would exist under Superdemocracy, and new tools and techniques
|
||
would inevitably spring into being. In the future, bidirectional recorded
|
||
video or other more exotic technologies could come into play.
|
||
|
||
7. Proxy battles: the fight for control of large delegated blocs of
|
||
votes, granted by proxy, may loom ominously large in some people's eyes.
|
||
This is a laudable objection, because it demonstrates a perceptiveness and
|
||
an ability to extrapolate into uncharted territory. Certainly, there will
|
||
be proxy battles, and individuals will seek to enhance their social status
|
||
by garnering "authority" over large numbers of votes. But the saving grace
|
||
here is the instant revocability of proxy powers, and their entirely
|
||
voluntary nature. It would be vital to have laws in place prohibiting abuse
|
||
of the proxy relationship, such as the sale of powers, or the commitment of
|
||
one's votes to another for a fixed time period, etc. If each voter is free
|
||
to change his or her mind about the attractiveness of a given proxy at any
|
||
time for any reason, then proxy abuse cannot occur.
|
||
|
||
8. Difficulty of reaching quorum. This is another excellent
|
||
objection, since it demonstrates insight into the process. The contention
|
||
is that many important or urgent measures will languish below quorum
|
||
indefinitely, due to insufficient voter interest or energy, thus clogging up
|
||
the wheels of government. The reason this would not be a problem is that
|
||
large proxy-holders would naturally tend to spend more time than the average
|
||
voter in the sub-quorum "pool", since their influence may be decisive there
|
||
(this pool, by the way, is expected to be *huge*). By definition, truly
|
||
important issues could not help but be significant to large numbers of
|
||
voters, so if the proxies were not doing their jobs, the public would take
|
||
charge directly. Both within the message databases and outside, in the
|
||
public media, commentary and exchange of opinions could not help but bring
|
||
all genuinely important measures into widespread play, with exactly the
|
||
speed and to exactly the extent that each in some sense "deserves".
|
||
|
||
9. Dominance by technocrats. A valid concern is that the high-tech
|
||
nature of the process will scare away computerphobes, or create barriers for
|
||
the less technically adept, which would lead to disproportionately high
|
||
representation of the technocracy in the voting tallies. It is an absolute
|
||
requirement that the designers of the system eliminate this concern by
|
||
making it as easy to use as a bank auto-teller. Also, a network of human
|
||
"facilitators" and manual-interaction "pavilions" should be established
|
||
nationwide to service the needs of those for whom the proficiency barrier is
|
||
insuperable. No system of voting can ever be perfect in this regard (the
|
||
current system requires at least a modicum of intelligence and initiative),
|
||
but Superdemocracy can and should be made as simple to deal with as a
|
||
banking machine, or simpler. Touch screens, voice recognition, and
|
||
progressively more advanced AI technologies can be harnessed for this
|
||
purpose as time goes by.
|
||
|
||
10. High cost. Certainly, to install and maintain all of the computers
|
||
and networks we are talking about would be expensive. There would also be a
|
||
need to provide communications link equipment (presumably terminals and
|
||
modems at first) to those unable to afford them, or perhaps to everybody.
|
||
The high cost is beyond dispute. But we need to weigh this against the not
|
||
insignificant costs of the current system, with its state and national
|
||
capitol buildings, representative's salaries and perks, staffers, and
|
||
colossal infrastructure. Some of those smoke-filled rooms are pretty big!
|
||
And computer and communications costs are dropping day by day, with no end
|
||
in sight.
|
||
|
||
|
||
Conclusions
|
||
-----------
|
||
|
||
Superdemocracy is defined as a continuous networked hierarchy of online
|
||
referenda, open to all.
|
||
|
||
Special interests would be able to sway the decisions of a group run
|
||
this way only by catering to the interests of a majority of the group -- in
|
||
which case they would no longer, by definition, be special interests.
|
||
|
||
Busybodies would be able to sway the decisions of a group run this way
|
||
only by making themselves the "proxies" of large blocs of people. Even so,
|
||
they would merely be performing a public service by voting on those people's
|
||
behalf exactly as those people would, themselves, have voted anyhow -- or
|
||
the busybody would find him- or herself quickly out of votes.
|
||
|
||
Citizen participation and morale would be dramatically improved because
|
||
each citizen would be voting on the issues that are important to that
|
||
citizen, directly. The guessing game of figuring out what somebody else is
|
||
going to do over a multi-year period, on the basis of schmoozy campaign ads
|
||
and zoot suits, is eliminated.
|
||
|
||
Corruption would be limited to the tactical, implementational end of
|
||
government. Never again would we have to worry about corruption on the
|
||
grand scale of Teapot Dome or the S&L scandal.
|
||
|
||
Justice would be less capricious because the same group of human beings
|
||
would review evidence and deliver a verdict in each case. This group,
|
||
instead of being just 12 people who could all happen to misconstrue a fact
|
||
the same wrong way, would be thousands or millions of everyday people, the
|
||
very people whose welfare depends on the right decisions being made in the
|
||
courtroom.
|
||
|
||
And finally, the expense, waste, and mismanagement of smoke-filled
|
||
rooms and their seedy inhabitants would be laid to rest for once and for
|
||
all. People would begin to have some reason for optimism about the future,
|
||
and some sense of control over their own destinies.
|
||
|
||
I don't expect any of this to happen anytime soon, but if you know
|
||
anyone who is thinking of setting up a new country, please show him or her a
|
||
copy of this article. It's certainly worth a try.
|
||
|
||
The World Online...
|
||
Copyright 1990 Victor Baron
|
||
|
||
Through the years, computers have been a tremendous source of
|
||
enjoyment for me, starting with playing StarTrek on a *printer*
|
||
terminal for many hours at a time, continuing with the building of a
|
||
kit IMSAI 8080 with it's seemingly hundreds of LED's on to writing and
|
||
marketing my own programs. I can't recall anything that gave me more
|
||
enjoyment, however, than the first time I went online and connected
|
||
with another computer in the city. There are still many of you out
|
||
there who lurk in the background, afraid to make the step, possibly
|
||
fearing that the experience is way beyond your level of expertise.
|
||
Hopefully, this little article can alleviate some of those fears and
|
||
open up a new world online.
|
||
|
||
There are a *few* things to learn and some equipment to acquire but
|
||
nothing exceptionally complicated nor expensive. Depending upon your
|
||
budget, you can go from a few hundred dollars to a few thousand with
|
||
plenty of steps in between. I will try to alleviate the frustrations
|
||
that usually accompany the first attempts and computer communication.
|
||
|
||
Since this will be your first trek into the world of computer
|
||
communications, you'll need some minimal equipment in addition to your
|
||
computer. You'll need a modem, some communication software, possibly a
|
||
serial cable and a telephone extension cord. Your computer essentially
|
||
telephones another computer and talks to it over your regular
|
||
telephone lines. The modem is the go-between. It converts the signals
|
||
from your computer to a form the telephone can understand and
|
||
vice-versa. Your standard telephone line should suffice (unless you
|
||
have a teenage daughter) with a little cooperation from other members
|
||
of your household. It is difficult to describe the visual and
|
||
emotional impact you receive when someone picks up the telephone while
|
||
you are online.
|
||
|
||
Looking at the specifications of the many modems on the market can
|
||
cause your eyeballs to spin violently but when all the frills are
|
||
removed, you initially start with 2 types, Internal and external. The
|
||
internal modem requires only a connection to the telephone line and an
|
||
available slot in your computer. The external requires an external
|
||
source of power, a connection to the telephone line and a serial cable
|
||
that you may have to purchase separately. As in automobiles, the
|
||
features vary widely but the basics are fairly standardized.
|
||
|
||
The final piece in your online travel kit is the communications or
|
||
terminal software. There is a wide choice of available packages
|
||
ranging from some of the more popular and inexpensive shareware
|
||
packages to the more expensive commercial packages. This remains
|
||
largely a matter of choice but it would be wise to start with one of
|
||
the simpler shareware packages until your skills develop. Simply put,
|
||
the terminal software controls what is sent and received by your
|
||
system.
|
||
|
||
Now that you've acquired the proper equipment and software, the
|
||
next step is to install your modem. Whether internal or external, this
|
||
procedure is relatively simple and most manufacturers provide ample
|
||
guidance in their documentation. The serial cable is connected between
|
||
the modem and the serial port on your computer, the telephone cord is
|
||
connected between the modem and the telephone outlet and the modem is
|
||
plugged in. An internal modem requires only the telephone connection,
|
||
all other needs are supplied by the system.
|
||
|
||
Before you try out your new modem you must set a few parameters
|
||
from within your communication program that will make your system
|
||
compatible with the computer you'll be calling. Most communication
|
||
programs have a 'Setup' area or a 'Port Parameter' area. This will be
|
||
your first stop.
|
||
|
||
COM1 or COM2-- Although there is increasing support for
|
||
additional COM ports, COM1 and COM2 are the most used. Generally your
|
||
computer documentation will indicate the available ports on your
|
||
system. Start by selecting COM1, you can always go back and change it
|
||
later if needed.
|
||
|
||
BPS or BAUD--Bits per Second is the rate of speed of data
|
||
transmission and reception through the selected com port.
|
||
Although incorrect in this instance, baudrate or baud are
|
||
generally used interchangeably with bps. The most common rate is 2400
|
||
bps, although the decreasing cost of higher speed modems has resulted in
|
||
many non commercial systems communicating at 9600 bps and higher.
|
||
Slower speeds of 1200 bps are still generally available on some
|
||
systems and you might still find an occasional 300 bps system out
|
||
there. The main function of the 'setup' area is to assure that both
|
||
systems are communicating at the same rate. Therefore if the system
|
||
you are calling will be at 2400 bps, then your system must be set the
|
||
same or you will be unable to establish decent communications. The
|
||
most common cause of communication problems is improper parameter
|
||
setup. It's much like speaking Greek to an Italian over a long
|
||
distance telephone line, no communication is possible.
|
||
|
||
DATA BITS--This setting determines the number of bits that make up
|
||
each byte of information. Sometimes referred to as word length.
|
||
Most BBS (Bulletin Board System) normally use a setting of 8 bits while
|
||
most commercial systems use a setting of 7 bits.
|
||
|
||
PARITY is an error detection method used to check the validity of a
|
||
transmitted character. If the computer is using 8 *data* bits, the
|
||
parity is usually *none*, indicated by an 'N' while systems using 7
|
||
data bits usually use *even*, indicated by an 'E'.
|
||
|
||
STOP BITS are signaling bits attached to a character before it is
|
||
transmitted which indicate when the character ends. Each character
|
||
transmitted is preceded by one start bit and followed by one or two
|
||
stop bits and possibly a parity bit. The most common setting is to
|
||
use 1 stop bit. Therefore, your most common settings for a PC based BBS
|
||
would be 8 data bits - No parity - 1 stop bit (8N1) and for
|
||
commercial systems, 7 data bits - Even parity - 1 Stop bit (7E1).
|
||
|
||
FULL/HALF DUPLEX also called local/remote echo is the setting that
|
||
determines which system (local/remote) is responsible for displaying
|
||
characters on the screen. Most BBS systems supply the remote echo so
|
||
the usual setting for your system should be remote echo (no local
|
||
echo). If you can't see what you type on your screen when you are
|
||
connected to another system, then you should turn your local echo on.
|
||
If your screen should ddiissppllaayy cchhaarraacctteerrss lliikkee
|
||
tthhiiss, then you know that both the local and remote systems are
|
||
echoing the characters and you should turn your local echo off (remote
|
||
on).
|
||
|
||
Now you should be ready to give this thing a try. Your modem is
|
||
connected and your communication program is loaded. Following the
|
||
documentation for your specific program, enter the dialing directory
|
||
and select the number you wish to dial. At this point, if you press
|
||
return, most programs will dial the selected number. If your modem has
|
||
a speaker you should hear phone go off hook, dial the number and start
|
||
ringing. When the remote system answers, you will hear the modems try
|
||
to establish a connection with appropriate squealing and hissing. When
|
||
connected, you will see a message that says CONNECT or CONNECT 2400.
|
||
Congratulations! You are online! Depending on the type of system you
|
||
have called, you may have to press the carriage return a few times to
|
||
'wake up' the BBS or it may start 'talking' to you automatically.
|
||
Online etiquette is beyond the scope of this article but remember,
|
||
you are essentially a guest in someone's home. Please act as you would
|
||
have a guest act in your home. Profane language is a no-no. Finally,
|
||
when the time comes to leave the BBS, there is usually a command
|
||
similar to GO or BYE or EXIT or OFF that will take care of some
|
||
housekeeping and politely let you leave the system and hang up. Only
|
||
in an extreme case should you just HANG UP without signing off the
|
||
BBS. Doing that is similar to walking out and slamming the door
|
||
without even a goodbye. Extremely rude! On some of the old time
|
||
systems, this could hang a system thus preventing other callers from
|
||
calling in. The newer systems don't have a problem with this any
|
||
longer but it's still tacky.
|
||
|
||
This should give you enough information to get you started
|
||
exploring the world online. The majority of the people you meet are
|
||
very friendly and helpful. When you log on to a new BBS, I recommend
|
||
that you go directly to the message base and read some of the
|
||
messages. You can get a lot of initial questions answered this way.
|
||
If you have a specific question, most BBS's will allow you to leave a
|
||
comment to the sysop (SYStem OPerator) on your first call.
|
||
|
||
Remember, you can't hurt anything and the people you contact all
|
||
started the same way as you, so relax, happy calling and enjoy the
|
||
world online.
|
||
|
||
|
||
The FBI Comes Rapping, Rapping At Your BBS
|
||
|
||
Brock N. Meeks
|
||
|
||
The dog-eared manila envelope spilled a coffee stained report onto
|
||
my cluttered desk. The title, "The FBI and Your BBS" sounded a little
|
||
too nefarious, even for this curmudgeon of the information age. But I
|
||
figured the report was worth at least a quick read. After all,
|
||
somebody had gone to the effort to track down my address and forward a
|
||
copy of the report to me. That someone turns out to be the report's
|
||
author, Glen L. Roberts, director of The FBI Project an organization
|
||
which publishes a newsletter, Full Disclosure, under the self-defined
|
||
category "privacy/surveillance.
|
||
|
||
The report is chilling, almost paranoid. And if more people had
|
||
known about its existence, a lot of grief might have been saved. As
|
||
I read I remembered an old, coffee-ringed file folder I'd squirreled
|
||
away. I remembered something about it's containing information on
|
||
what I'd off-handedly labeled "FBI Computer Hit Squad." When I found
|
||
the file, Roberts' report didn't seem so paranoid and knew I was in
|
||
for a long night of research and bunch of early morning wake up
|
||
interviews.
|
||
|
||
If you dig, you hit dirt
|
||
|
||
In 1984 a short series of discreet advertisements, placed by the
|
||
FBI, appeared in a few computer trade publications and in The Wall
|
||
Street Journal. The message was simple, and went something like:
|
||
"We're looking for computer literate persons to join the Bureau."
|
||
There was no mention of any special task force; however, it was clear
|
||
that the Bureau wanted to upgrade their high-tech prowess.
|
||
|
||
Although the FBI won't confirm the existence of a computerized "hit
|
||
squad," an FBI public relations officer did confirm that they "have
|
||
made an extraordinary effort to recruit more technically oriented
|
||
personnel" since 1984.
|
||
|
||
If you dig hard enough, you'll find substantial evidence that the
|
||
FBI is most definitely working overtime in its efforts to monitor the
|
||
electronic community. "They are desperately wary of the way
|
||
information flows so freely in this medium," says Roberts.
|
||
|
||
Indeed, one has only to recall this past May when some 150 Secret
|
||
Service agents, assisted by local police (backed up with electronic
|
||
"intelligence gathered and provided by the FBI) served some 27 search
|
||
warrants in a dozen cities across the U.S.
|
||
|
||
The bust, code-named Operation Sun Devil, was patterned after the
|
||
tactics used to take down suspected drug rings: simultaneous busts,
|
||
synchronized arrests. All in an effort to preclude any "early
|
||
warnings" reaching the West via grapevine information moving from the
|
||
East.
|
||
|
||
I was curious about all these high tech hit tactics and armed with
|
||
my file folder and Roberts' report I called a number scrawled on the
|
||
inside flap of my file folder. It was annotated "Former agent;
|
||
possible source." I called the number, and got a story.
|
||
|
||
"I was recruited in 1983 by the FBI for my computer skills."
|
||
|
||
"I was recruited in 1983 by the FBI for my computer skills," the
|
||
former agent told me. Because he still does some consulting for the
|
||
Bureau, he asked not to be identified, but he laid out a very
|
||
specific plan by the FBI to increase their knowledge of the electronic
|
||
communications world. He confided, "During my time the Bureau's
|
||
monitoring of BBSs was extremely limited; we just didn't know how." In
|
||
those days, he said, the FBI drew on the expertise of a small band of
|
||
high-tech freelance snoops to augment their staff, "while we all honed
|
||
our own skills."
|
||
|
||
Tradition
|
||
|
||
Certainly the FBI has a tradition of "investigating" groups of
|
||
people it deems "unsavory" or threatening.
|
||
|
||
In Roberts' The FBI and Your BBS, there's a brief history of the
|
||
FBI's willingness to gather all known information on a target group.
|
||
Pulling from the Final Report of the Select (Senate) Committee to
|
||
Study Governmental Operations with respect to Intelligence Activities,
|
||
Book IV, Supplementary Reports on Intelligence Activities, Roberts
|
||
includes this excerpt:
|
||
|
||
"Detectives were sent to local radical publishing houses to take their
|
||
books. In addition, they were to find every private collection or
|
||
library in the possession of any radical, and to make the arrangements
|
||
for obtaining them in their entirety. Thus, when the GID (General
|
||
Intelligence Division) discovered an obscure Italian born philosopher
|
||
who had a unique collection of books on the theory of anarchism, his
|
||
lodgings were raided by the Bureau and his valuable collection become
|
||
one more involuntary contribution to the huge and ever-growing library
|
||
of the GID. [pages 87-88]."
|
||
|
||
Change "any radical" to "any BBS" and "book" to "disk" and quite
|
||
suddenly the electronic landscape turns into a winter still-life.
|
||
|
||
Data collection
|
||
|
||
Roberts, quoting from his report, says, "Unlike other
|
||
communications media, information on a BBS does not get read by anyone
|
||
before its instantaneous publication. Therefore, the FBI has much
|
||
less of a possibility of intimidating the owner of a BBS into not
|
||
publishing certain information. The FBI also acts as if BBSs have a
|
||
monopoly on the distribution of so-called 'illegal information.' The
|
||
FBI often uses this 'danger' as justification to monitor the
|
||
activities on these systems. In reality, however, BBSs transfer much
|
||
less 'illegal information' than the phone system."
|
||
|
||
Roberts statements are worth noting in light of the government's
|
||
increased interest in the marriage of criminal activity and electronic
|
||
communications.
|
||
|
||
Crime has moved into the high-tech arena.
|
||
|
||
A 455-page report issued by the President's Commission on Organized
|
||
Crime, dealing with drug abuse and trafficking cites that fact that
|
||
crime has moved into the high-tech arena. The report states "To the
|
||
extent that law enforcement agencies' capabilities and equipment are
|
||
inferior to those of drug traffickers, immediate steps should be taken
|
||
to rectify the situation." The report then recommends that
|
||
data-gathering efforts of several agencies (including the FBI) should
|
||
be tied together in one "all-source intelligence and operations
|
||
center."
|
||
|
||
Any problem here?
|
||
|
||
There are no laws prohibiting the FBI (or other agencies) from
|
||
monitoring the public message traffic on a BBS; the Electronic
|
||
Communications Privacy Act of 1986 protects private messages and
|
||
privately stored files only. But what about an FBI agent monitoring a
|
||
BBS solely for the purpose of gathering information on the board's
|
||
users? Any problem here?
|
||
|
||
The former FBI agent I spoke with raised the concern that such
|
||
casual monitoring might be a violation of the 1968 Wiretap Act. "In
|
||
order for a wire tap, you have to get a court order. Now if an FBI
|
||
agent is monitoring a BBS to gather information, that becomes an
|
||
interesting question, because there are very specific federal rules
|
||
about a wire tap. My question to you about a BBS [being monitored]
|
||
is: "At what point does monitoring turn into a wiretap-like act?"
|
||
|
||
Good point. The reality is, however, that there are no rules.
|
||
Unless that agent is asking for private message traffic, he can,
|
||
without impunity, monitor, store, and otherwise manipulate your public
|
||
messages as he sees fit.
|
||
|
||
Roberts points out that a BBS with public access is fair game for
|
||
any kind of governmental snooping. But there is a way to make such
|
||
casual snooping by a federal agent a crime.
|
||
|
||
"If you want your BBS readily accessible to the public but want to
|
||
protect against unwarranted monitoring, you have to provide a warning
|
||
to prospective users," says Roberts. "It should read: 'This BBS is a
|
||
private system. Only private citizens who are not involved in
|
||
government or law enforcement activities are authorized to use it. The
|
||
users are not authorized to divulge any information gained from this
|
||
system to any government or law enforcement agency or employee.'"
|
||
|
||
This does two things. It makes the entire board "private." Second,
|
||
it makes any kind of monitoring by the FBI (or other agencies, such as
|
||
the Secret Service) a criminal offense (because they are would be
|
||
guilty of unauthorized access; it also forces them to use the
|
||
established guidelines of gaining information via a court ordered
|
||
search warrant. The warning also protects you in another way: it
|
||
stops "freelancers" from doing the Bureau's work.
|
||
|
||
Get real
|
||
|
||
How real is the possibility of the FBI monitoring your BBS? Much
|
||
more than I'd like to believe. Although details of Operation Sun
|
||
Devil are still sketchy, it's clear that the FBI, working in tandem
|
||
with the Secret Service, is monitoring several hundred "suspected"
|
||
boards across the electronic landscape. What kind of board is a
|
||
potential monitoring target? "Any board that advocates hacking," said
|
||
a Secret Service spokesman. Yet when I asked for a definition of
|
||
hacking, all I was told was "illegal activity."
|
||
|
||
Are the "good guys" getting caught up with the bad?
|
||
|
||
The information provided here bears out, if nothing else, an
|
||
increased interest by the FBI in the hardball practice of going after
|
||
electronic criminals. But are the "good guys" getting caught up with
|
||
the bad?
|
||
|
||
How extensive is the FBI's actual fact gathering by monitoring
|
||
BBSs? No one knows really knows. However, given the history of
|
||
Bureau, and the hard facts that crime in the information age makes
|
||
full use of all the technology it can get its hands on, it's a small
|
||
leap to believe that at least specific monitoring, of certain target
|
||
groups, is taking place.
|
||
|
||
Where does that leave you and me in all this? Back to square one,
|
||
watching carefully what we say online. If you're a member of a
|
||
"controversial" BBS, you might pass the concerns of Roberts on to your
|
||
sysop. If you are a sysop, you might want to consider adding a bit of
|
||
protection to the board . . . for the rest of us.
|
||
|
||
Brock Meeks is a Washington, D.C.-based columnist whose articles have
|
||
appeared in several publications including Byte Magazine. His
|
||
favorite radical BBS is . . . well . . . private.
|
||
|
||
|
||
What's NEW in ZMODEM
|
||
|
||
by Chuck Forsberg
|
||
|
||
In early 1986, Telenet funded a project to develop a new file
|
||
transfer protocol to alleviate the throughput problems network
|
||
customers were experiencing with XMODEM and Kermit file transfers.
|
||
Designing ZMODEM from scratch allowed me to use the best ideas from
|
||
X.PC, HDLC, BISYNC, Kermit, and dozens of other protocols, while
|
||
avoiding many of their shortcomings.
|
||
|
||
Since then ZMODEM has been incorporated into hundreds of programs.
|
||
ZMODEM's speed, reliability, and ease of use has made it the protocol
|
||
of choice for thousands of bulletin boards, GEnie, BIX, Portal,
|
||
Delphi, and other information utilities.
|
||
|
||
From the beginning, ZMODEM was designed to be extended. Important
|
||
reliability, performance and compatibility extensions have been
|
||
developed since the Telenet project. These extensions accelerate
|
||
downloads by 5 to 30 percent in many applications, with some files
|
||
downloading many times faster.
|
||
|
||
New programs can exploit these extensions without sacrificing
|
||
downward compatibility with older programs. This article summarizes
|
||
the most important of these ZMODEM extensions.
|
||
|
||
CRC-32
|
||
|
||
Ease of implementation was one of ZMODEM's original design goals.
|
||
XMODEM CRC technology was used because XMODEM routines were widely
|
||
available in many programming languages.
|
||
|
||
XMODEM's CRC polynomial is many times less reliable than good 16
|
||
bit CRC's. This wasn't an issue with XMODEM because XMODEM itself was
|
||
inherently unreliable under stress. When ZMODEM's speed and
|
||
"bullet-proof" robustness soon found use in applications too harsh for
|
||
XMODEM, ZMODEM's robustness revealed XMODEM CRC to be too inaccurate.
|
||
|
||
The first major extension to ZMODEM was the adoption of 32 bit CRC.
|
||
|
||
ZMODEM uses the 32-bit CRC specified by ANSI X3.66, FIPS PUB 71,
|
||
and FED-STD-1003. A table driven calculation keeps processing
|
||
overhead low. ZMODEM CRC-32 is five orders of magnitude more accurate
|
||
than XMODEM CRC, and billions of times more sensitive than 1 byte
|
||
XMODEM and Kermit checksums. The extra protection of CRC-32 is vital
|
||
in high speed applications.
|
||
|
||
ZMODEM retains XMODEM CRC capability to accommodate old programs.
|
||
|
||
|
||
Compression
|
||
|
||
Compression techniques compact the redundant information in data
|
||
files to reduce storage and transmission time. ZMODEM-90(TM)
|
||
extensions include "on the fly" compression that boosts throughput on
|
||
listings and other suitable files. Compression percentages range from
|
||
-1% on already compressed files to more than 1000 percent (10 times
|
||
speedup) on the Personal Computing Magazine text file benchmark.
|
||
|
||
Moby Turbo(tm) Accelerator
|
||
|
||
Many files downloaded from bulletin boards are already compressed
|
||
with PKZIP or other compression programs.
|
||
|
||
ZMODEM was developed to operate over packet switched networks that
|
||
use control characters for network control. When one of these
|
||
characters appears in the data, ZMODEM protects the network by
|
||
replacing the offending character with a two character sequence
|
||
(quoting). Standard ZMODEM quoting increases overhead on compressed
|
||
files by about 3 percent.
|
||
|
||
The protection of control character quoting and its overhead are
|
||
not needed in many applications. ZMODEM-90(TM) offers MobyTurbo(TM)
|
||
to close the speed gap between ZMODEM and less reliable protocols
|
||
without sacrificing ZMODEM's historical robustness and reliability.
|
||
MobyTurbo reduces the character quoting overhead on compressed files
|
||
to 0.5%. In comparison tests the speed difference between YMODEM-g
|
||
and MobyTurbo(TM) is less than 1 percent. Many users feel 1% is a low
|
||
price to pay to get Crash Recovery, automatic downloads, and the
|
||
safety of 32 bit CRC error checking,
|
||
|
||
______________________________
|
||
| OVERHEAD FACTORS |
|
||
| (Compressed Files) |
|
||
------------------------------
|
||
|1024 Byte Subpackets | .5% |
|
||
|Character Quoting | 3% |
|
||
|MobyTurbo Quoting | .5% |
|
||
------------------------------
|
||
|
||
Reduced Overhead
|
||
|
||
Some networks and modem concentrators reserve control characters
|
||
not protected by ZMODEM defaults. Previously the solution was to
|
||
protect all control characters, resulting in protocol overhead
|
||
approaching that of Kermit.
|
||
|
||
ZMODEM-90(TM) extensions provide individual control of the
|
||
protected control characters, avoiding the high overhead of quoting
|
||
all control characters.
|
||
|
||
|
||
Window Management
|
||
|
||
Many information utilities are accessed via complex packet switched
|
||
networks. These networks may behave more like a balloon than a pipe
|
||
as they pass data from a fast mainframe to a relatively slow modem.
|
||
Undelivered kilobytes swell the network's memory banks, and error
|
||
correction is impaired.
|
||
|
||
ZMODEM allows the sender to limit this ballooning by regulating the
|
||
rate of transmission to accommodate the slowest segment of the
|
||
network. ZMODEM accomplishes this by commanding the receiver to
|
||
acknowledge data sub-blocks as they are received, and waiting for more
|
||
acknowledgements when the receiver is too far behind (window too
|
||
large).
|
||
|
||
The optimum window size depends on the network characteristics and
|
||
modem error rate. With ZMODEM-90 the receiver can override the
|
||
sender's window size according to local conditions. Users with error
|
||
correcting modems can increase throughput by increasing the window
|
||
size.
|
||
|
||
These ZMODEM-90 extensions give GEnie downloads 5 to 30 percent
|
||
faster than public domain ZMODEM.
|
||
|
||
|
||
7-Bit Environments
|
||
|
||
A pair of ZMODEM-90 programs with 7-bit support will automatically
|
||
detect a 7-bit environment and switch to one of two 7-bit path
|
||
compatible encodings.
|
||
|
||
The default 7-bit ZMODEM uses RLE compression and 8th bit quoting.
|
||
This mode resembles Kermit encoding, but is more efficient because the
|
||
RLE encoding is optimized and fewer control characters are quoted.
|
||
This default is well suited for text files.
|
||
|
||
ZMODEM Pack-7 packs 4 bytes into 5 printing characters. This is
|
||
more efficient than quoting for sending compressed files. ZMODEM
|
||
Pack-7 is efficient enough to beat Kermit on ZIP files, even when
|
||
Kermit is allowed to use all 8 bits.
|
||
|
||
A 75136 byte ZIP file was sent between two adjacent machines
|
||
directly connected at 2400 bps. These tests demonstrate the difference
|
||
in protocol performance under ideal conditions.
|
||
|
||
Kermit transfers used one byte checksum and 2000 byte packets.
|
||
ZMODEM used 32 Bit (four byte) CRC.
|
||
|
||
______________________________
|
||
| 7-BIT LINE |
|
||
------------------------------
|
||
|CPS| Protocol |
|
||
|156| Kermit long packet=2000|
|
||
|190| ZMODEM-90tm PACK-7 |
|
||
------------------------------
|
||
|
||
|
||
|
||
|
||
Intelligent Crash Recovery
|
||
|
||
Crash Recovery allows an interrupted file transfer to be completed
|
||
without throwing away the portion transferred before the interruption.
|
||
Crash Recovery has been a favorite ZMODEM feature since 1986.
|
||
|
||
Accurate crash recovery requires that the receiver's copy of the
|
||
file match the sender's copy up to the point where the transfer was
|
||
cut off. If you don't call back instantly the file may change, and
|
||
simply resuming the transfer will corrupt the file. If this is a
|
||
concern, choose a program that verifies the accuracy of Crash
|
||
Recovery.
|
||
|
||
Intelligent Crash Recovery(TM) (-rr option) allows files to be
|
||
compared without transmitting the actual file contents. The sender and
|
||
receiver take a 32 bit CRC on the files and compare those numbers. The
|
||
"zmodem R" parameter controls how much of the files to compare. The
|
||
default of 0 compares the entire file. The chance of different files
|
||
producing the same 32 bit CRC is small; an independent comparison of
|
||
another segment further enhances reliability.
|
||
|
||
Currently, ASCII file translation (Unix to DOS format, etc.) does
|
||
not allow Crash Recovery.
|
||
|
||
A future extension should remove this restriction.
|
||
|
||
Total Transfer Display
|
||
|
||
ZMODEM and YMODEM now support a count of the files remaining and
|
||
their total size to the receiver. This allows the receiver to
|
||
estimate remaining transfer time, updated as conditions change. This
|
||
information is optional and may not be provided when its collection
|
||
would cause an unacceptable delay starting a transfer.
|
||
|
||
VAX/VMS Specific Programs
|
||
|
||
Previous versions of the RZ (Receive ZMODEM) and SZ (Send ZMODEM)
|
||
file transfer programs were poorly adapted for Digital Equipment's
|
||
VAX/VMS minicomputer operating system.
|
||
|
||
A new VMS RZ writes variable length CR terminated records for ASCII
|
||
files and fixed 512 byte records for binary files. These record
|
||
formats are better suited for standard VMS utilities.
|
||
|
||
A -i option may be given to the sender or receiver to force VMS
|
||
Stream_LF record format. Stream_LF format preserves the exact data
|
||
and file length. Stream_LF is suitable for C programs and PC oriented
|
||
file server and archive applications.
|
||
|
||
VMS SZ now supports wild cards and subdirectories.
|
||
|
||
These programs are available from Omen Technology Incorporated.
|
||
|
||
|
||
ZMODEM-90(TM), MobyTurbo(TM), and Intelligent Crash Recovery(TM)
|
||
are Omen Technology trademarks.
|
||
|
||
|
||
UNDER THE BOARDWALK
|
||
|
||
"Hello, Dean speaking."
|
||
|
||
"I'm going to quit my job, start a BBS, make a fortune and live
|
||
happily ever after."
|
||
|
||
"Excuse me? That's impossible!"
|
||
|
||
"No really, I'm going to make my living running a BBS."
|
||
|
||
I never thought I'd have phone conversations like this a year ago, now it
|
||
happens once a week. One enthusiastic caller was dead serious when he told
|
||
me "I'm going to put CompuServe out of business." As ridiculous as these
|
||
statements sound, it should. It tells me that the BBS world is starting to
|
||
evolve in a big way.
|
||
|
||
A schism is forming between the FREE and the PAY BBS systems. The hardcore
|
||
sysop of the past will tell you "Until they pry my cold dead fingers from
|
||
my keyboard, my system will always have free access." The enterprising
|
||
sysop of today will tell you "I'm offering a service that my customers
|
||
enjoy, and I'm not embarrassed to be compensated for it." I hope there will
|
||
always be a place for the FREE BBS. However, the pay as you go BBS system
|
||
is todays item of interest. What does it take to make real money running a
|
||
BBS?
|
||
|
||
As an example, we'll start a fictitious BBS called OPERATION OVERKILL, or
|
||
OK BBS for short. We're going to charge $45 per year, run 4 lines at 9600
|
||
Bps and use PCBoard on a 386 Novell Network. Congratulations, OK BBS just
|
||
consumed $10,000 like it was light beer, and nobody calls.
|
||
|
||
Across town, HUMBLE BEGINNINGS BBS (HB BBS for short) starts up using a
|
||
spare XT, 1 phone line at 2400 Bps, runs the shareware version of PCBoard
|
||
and charges NOTHING. The new sysop of HB BBS, Horatio A., has been calling
|
||
BBS's for years and finally decides to give it a try. Six months later HB
|
||
BBS has 500 steady callers, but they complain that the BBS is busier than
|
||
the men's room at Joe's Bar on Saturday night.
|
||
|
||
After many sleepless nights and countless cans of Jolt Cola, Horatio
|
||
asks for $20 donations to add another phone line, get a 386, buy the
|
||
multinode version of PCBoard and increase the hard drive storage.
|
||
Enough money comes in to cover half of the upgrade. Horatio digs
|
||
into his pockets for the rest and HUMBLE BEGINNINGS is now running 2
|
||
nodes under Desqview on the new 386. He adds more file areas, throws
|
||
in some DOORS, and answers the mail from his users 3 times a day.
|
||
|
||
In order to recoup the investment in the upgrade, Horatio adds
|
||
an Adult file section available to paying users only. He imposes
|
||
a 20:1 download/upload ratio for non-paying callers. As a bonus,
|
||
he allows callers with a 5:1 download/upload ratio full
|
||
privileges. His file area becomes inundated with new uploads as
|
||
his non-paying callers realize the cheapest way to use the system
|
||
is to upload new files. There's even a few long distance callers
|
||
which he gives full access for no charge. Heck, they're already paying
|
||
good money to our favorite charity THE PHONE COMPANY, so why not?
|
||
|
||
HUMBLE BEGINNINGS is now busy all the time! The free callers keep
|
||
the file library bursting with new software while the paying
|
||
callers are happy to rape this fantastic software resource for
|
||
only $20 per year. In fact, HUMBLE BEGINNINGS is making a little more
|
||
money each month. A third phone line is added to keep up with the
|
||
demand.
|
||
|
||
Horatio decides to attempt to make some real money with his BBS.
|
||
HUMBLE BEGINNINGS has been online for 2 years, pays the phone bill,
|
||
and even makes more of a profit each month. He borrows $5,000 from his
|
||
brother Donald to bring his system to 6 lines running on a Novell
|
||
network. He figures 6 lines will keep everyone happy for at least a
|
||
year. He raises the price to $45 per year, but still allows callers
|
||
with a 5:1 download/upload ratio full access.
|
||
|
||
HUMBLE BEGINNINGS is now on it's way to possibly becoming a very
|
||
large system. Who knows, maybe in another year Horatio will be
|
||
able to quit his real job to devote 24 hours a day to his BBS. More
|
||
likely, HB BBS will become a mildly profitable small business. Is
|
||
there a moral to this story? Not really, but all the would be
|
||
entrepreneurs out there might want to memorize the countless cliches
|
||
related to starting your own business.
|
||
|
||
BBS's must do the same as any successful small business, provide a
|
||
needed product or service, provide excellent customer service, price
|
||
it reasonably, and continue to improve while keeping one eye on the
|
||
competition.
|
||
|
||
* * * * * * * * * * * * * * * * * * * * * * * * * * * * *
|
||
T E L E C O M P U T I N G M A G A Z I N E
|
||
Electronic Edition
|
||
|
||
Summer 1990
|
||
|
||
(C) 1990 Galaxy Telecomm Corporation
|
||
All Rights Reserved
|
||
800-477-1788, 505-881-6988 - Voice
|
||
505-881-6964 - BBS - 64 Lines
|
||
* * * * * * * * * * * * * * * * * * * * * * * * * * * * *
|
||
|
||
Requirements To Display Telecomputing Magazine
|
||
|
||
No Nonsense Copyright Statement
|
||
|
||
Telecomputing Magazine is copyrighted material and must be treated as
|
||
such. Telecomputing Magazine's Electronic Edition may be transmitted
|
||
and displayed on Electronic Bulletin Board Systems. Alterations,
|
||
additions, or ommissions of material will be considered a copyright
|
||
violation.
|
||
|
||
DON'T CHANGE ANY OF THE FILES! IF YOU DISPLAY ONE FILE, YOU MUST
|
||
DISPLAY THEM ALL.
|
||
|
||
Feel free to pass this Electronic Edition of our magazine along to
|
||
your friends and favorite BBS's. For a free copy of our 4 color glossy
|
||
magazine, give us a call at 800-477-1788 and request a copy!
|
||
|
||
* * * * * * * * * * * * * * * * * * * * * * * * * * * * *
|
||
T E L E C O M P U T I N G M A G A Z I N E
|
||
Electronic Edition
|
||
|
||
October/November 1990
|
||
|
||
(C) 1990 Galaxy Telecomm Corporation
|
||
All Rights Reserved
|
||
800-477-1788
|
||
* * * * * * * * * * * * * * * * * * * * * * * * * * * * *
|
||
|
||
TABLE OF CONTENTS OF TELECOMPUTING MAGAZINE'S PRINTED EDITION
|
||
|
||
|
||
COVER STORY - Tim Stryker
|
||
Superdemocracy
|
||
|
||
FEATURES
|
||
|
||
News from the Online World - Nia Bennett
|
||
Where Is Everybody? - Jerry Pournelle/Mike Banks
|
||
The FBI Comes Rapping, Rapping at Your BBS - Brock N. Meeks
|
||
Electronic Government - Michael E. Marotta
|
||
|
||
TUTORIAL
|
||
|
||
What's New in ZMODEM - Chuck Forsberg
|
||
Worried About Viruses? - William Minus
|
||
|
||
PRODUCT REVIEW
|
||
|
||
Intel Goes After 9600 BPS Market - Tom Scott
|
||
TDBS: The Comfortable Revolution - Phil Becker
|
||
Telecommand System 100 by JDS Technologies - Tom Scott
|
||
The Metro BBS System P.D. and Plenty of Power - Jim Reyna
|
||
|
||
I*N*F*O
|
||
|
||
Aladdin - Genie's Magic Lamp - Dennis Fowler
|
||
The BBSers Guide to COMDEX - Tom Scott
|
||
Joining the Online World - Victor Baron
|
||
|
||
SOFTWARE REVIEW
|
||
|
||
BGFT: Background File Transfer System
|
||
Falcon F-16 by Mark Hiatt
|
||
Weight Loss Software by Nia Bennett
|
||
News from Oracomm - Running a Successful BBS by Gary Young
|
||
Wildcat! BBS News - Dawn of the Information Society
|
||
|
||
BOOK REVIEW
|
||
|
||
"Using Computer Bulletin Boards" by John V. Hedtke
|
||
- Review by Charles Stuart Klingman
|
||
|
||
COMMENTARY
|
||
|
||
Software Mania - John C. Dvorak
|
||
Power Suits and Pretty Dresses For BBSing on the Edge
|
||
- Bob Mahoney
|
||
Under The Boardwalk/Commentary - Dean Kerl
|
||
|
||
DEPARTMENTS
|
||
|
||
From The Editor
|
||
Letters To The Editor
|
||
EXEC-PC Top 20 Downloads
|
||
telecomputing's BBS Listings (classifieds)
|
||
|
||
|
||
|