1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-06 22:46:29 +02:00
This commit is contained in:
OPSXCQ
2017-12-13 13:43:38 -03:00
parent 5aa4075d30
commit 97a990b4ad
496 changed files with 527910 additions and 0 deletions

View File

@@ -0,0 +1,188 @@
MICROCOM DEMONSTRATES INTERNETWORKING AND COMMUNICATIONS HARDWARE AND
SOFTWARE AT NETWORLD 92 BOSTON, BOOTH #1508
BOSTON, MA-(Networld '92 Boston, Booth #1508) February 11, 1992 Microcom,
Inc. a Norwood, MA-based PC connectivity vendor, today demonstrated its
award-winning line-up of internetworking and communications solutions. Two
new high-speed V.32bis modems, the portable MicroPorte 4232bis and the
standalone QX/4232bis+, were also debuted today.
Microcom also demonstrated the following solutions at Networld.
<EFBFBD> Microcom Bridge/Router
The MBR/6000 transparently bridges and routes traffic on 16/4 MB Token Ring
or Ethernet LANs. The MBR connects LANs at local sites and at remote
locations over leased lines.
Communications Software For Windows
<EFBFBD> Carbon Copy for Windows provides remote control between PCs running
Windows applications. Carbon Copy for Windows supports VGA, EGA, CGA,
Hercules and most Super VGA and video modes.
<EFBFBD> RELAY Gold for Windows enables PC-to-mainframe communications supporting
up to 15 multiple sessions. RELAY Gold provides file transfer, terminal
emulation and true PC-to-IBM connectivity.
<EFBFBD> MicroCourier offers complete communications at a very low price. Users
can connect to other PCs, bulletin boards and on-line services such as
CompuServe.
Communications Software For DOS
<EFBFBD> Carbon Copy Plus is the leading remote control and communications product
for PCs. Carbon Copy links keyboards over a LAN or via modem and standard
telephone lines.
<EFBFBD> RELAY Gold fulfills the need for reliable PC-to-mainframe, PC-to-mini and
PC-to-PC communications. RELAY supports virtually any physical connection
including coax boards, gateways, Token Ring TIC, synchronous and
asynchronous dial-up.
<EFBFBD> RELAY Gateway provides an economical connection between multiple PCs on a
LAN to a mainframe. Three versions support a variety of connections
between NetBIOS or Novell IPX LANs to IBM hosts.
Microcom MNP 10 Modems
<EFBFBD> HDMS provides comprehensive means to conveniently expand dial-up modem
network capacity with an efficient central site management and security
system. HDMS supports up to 32 High Density V.32bis modems featuring
sophisticated management reports, event logs and four layers of
dial-access security.
<EFBFBD> QX/4232bis+ V.32bis desktop modem delivers throughputs up to 57, 000 bps.
This full-featured modem also provides 2-wire dial and 4-wire leased line
operation protected by multiple security modems.
<EFBFBD> MicroPorte 4232bis portable modem offers V.32bis speeds up to 38,400 bps.
Like all new Microcom modems, the MicroPorte 4232bis features MNP 10 for
reliable operation over both poor quality land lines and cellular links.
--------------------------------------------------------
MICROCOM DEBUTS INDUSTRY'S FIRST V.32bis PORTABLE MODEM
MicroPorte 4232bis Supports Data Communication Over Cellular and Land-lines
with MNP 10 Adverse Channel Enhancements
BOSTON, MA (Networld Booth #1508), FEBRUARY 11, 1992 -- Microcom), Inc.,
(Norwood, MA) developer of MNP (Microcom Networking Protocol), today
debuted the MicroPorte 4232bis, the industry's first V.32bis portable
modem. With V.32bis, the MicroPorte 4232bis yields high-speed throughputs
up to 38,400 bps on land-based lines reducing modem connect time,
resulting in substantial line cost savings. In keeping with the Company's
strategy, the MicroPorte 4232bis supports MNP 10 providing enhanced data
transmission reliability over both dial-up and cellular connections.
The MicroPorte 4232bis has a footprint about the size of an index card,
weighs 10 ounces, and supports the advanced modem features users have come
to expect from Microcom's premium desktop modems.
"The MicroPorte 4232bis is the only high-speed portable modem that enables
users to communicate virtually anywhere," says Stephen P. Mank, Microcom's
Vice President of Marketing. "Supporting communication over cellular is
particularly important to the increasing number of laptop, notebook,
palmtop and pen computer users who require mobile communication
capabilities. With MNP 10, their connect times are shorter and
communication links more reliable."
Microcom's MNP 10 gives the MicroPorte 4232bis user a better chance to get
connected and stay connected over poor quality cellular and land-based
links. MNP 10 incorporates four unique functions called Adverse Channel
Enhancements (ACE) that regulate modem speed and packet sizes, optimizing
data transfer under virtually any conditions. MNP 10 initiates a call at
1200 bps, the most robust level, then upshifts to the highest possible
line speed. Throughout the call, MNP 10 monitors various line parameters
and aggressively adapts packet size and shifts modem speed, upward or
downward, providing optimum data throughput.
In addition to supporting CCITT V.32bis modulation standards and MNP 10,
the MicroPorte 4232bis also supports MNP 2-4 error control, MNP 5 and
V.42bis data compression, and other modulation standards, including V.32
(9600), V.22bis (2400), V.22 (1200 bps), Bell 212A (1200 bps) and Bell 103
(300 bps).
The MicroPorte 4232bis includes an AC power pack and rechargeable
batteries. Fully charged batteries provide 1.5 hours of connect time. Auto
shut-off conserves battery life when the MicroPorte is not in use. For
mobile computing, users can purchase an optional 12-volt DC adapter that
plugs into a standard automobile cigarette lighter.
Shipping to authorized Microcom resellers in March 1992, the MicroPorte
4232bis will have a list price of $899.
--------------------------------------------------------
BOSTON, MA (Networld Booth #1508), February 11, 1992--Microcom, Inc.,
(Norwood, MA) developer of the Microcom Networking Protocol (MNP), the de
facto modem standard, today debuted the QX/4232bis+, the newest member of
its V.32bis modem family. The QX/4232bis+ is ideally suited for users of
high-power PCs and larger systems requiring very high throughput, solid
security and error-free transmission over dial-up or leased lines.
Enabling users to transfer data at speeds up to 57,600 bps, the QX/4232bis+
eliminates performance bottlenecks that frequently occur when running
complex applications with slower modems. The high-speed QX/4232bis+ also
provides the throughput users require for data-intensive applications
running on midrange, mainframe and supercomputers.
In addition to 2-wire dial-up operation, the QX/4232bis+ supports 4-wire
leased lines. This preserves users' modem investments as the QX/4232bis+
is compatible with most 4-wire modems.
If the leased line connection is disrupted, the QX/4232bis+ automatically
switches to a 2-wire dial backup. While in backup mode, the modem
continually monitors the leased line and switches back to 4-wire operation
when the line is restored. Throughout the backup process, the QX/4232bis+
maintains complete data integrity.
Since many large computer systems are installed in banks, financial
institutions and Fortune 1000 corporations, Microcom designed the
QX/4232bis+ with multiple security modes to protect sensitive financial
and technical data. Sophisticated security features enable users to
program a security database for up to 20 users, selecting fixed dial-back,
variable dial-back or pass-through security, depending upon the user's
needs. Other security features are also provided.
For both synchronous and asynchronous operation, the QX/4232bis+ provides
CCITT V.25bis dialing commands. This feature is particularly valuable to
users of IBM AS/400 systems, which commonly support V.25bis dialing.
Following its strategy of providing high-performance capabilities in its
modems, Microcom also includes MNP 10 in the QX/4232bis+. MNP 10 provides
users with an effective solution for communicating data over cellular
networks and other adverse channels such as noisy land lines. MNP 10
enhances modem connectability and adjusts packet size and modem speed to
optimize performance of the QX/4232bis+.
Other features provided in the QX/4232bis+ include
<EFBFBD> Auto Logon
. PCS Security
<EFBFBD> Multiple Configurations
. UUCP/Kermit Spoofing
<EFBFBD> Remote Access
<EFBFBD> Auto Dial-back On Loss of Carrier
Microcom will ship the QX/4232bis+ to authorized dealers by the end of
January 1992. The modem will have a list price of $1099.
Microcom's other V.32bis modems include the QX/4232bis desktop model and
the recently announced MicroPorte 4232bis portable modem. Both include MNP
10 and provide speeds up to 38,400 bps.
Microcom, 500 River Ridge Dr, Norwood, MA 02062
617-551-1000
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,80 @@
(Phoenix, Arizona, February 11, 1992)--Computing in the nineties is
changing fast. With more and more organizations increasing their reliance
on Local Area Networks (LANs), the expanding popularity of notebook and
laptop computers, and the growing trend toward telecommuting, effective
computing no longer just means a PC on your desk in the office.
LANs are taking over the way businesses compute. Studies indicate that
56.8% of all PCs in use will be connected to a LAN by 1995. International
Data Corporation (IDC) predicts the demand for LAN-based dial out will
increase as the number of PCs on LANs worldwide increases.
In addition IDC states that, "the number of portable PCs (including
notebooks, laptops, and transportables) shipping worldwide will increase
from 3.9 million in 1991 to 9.6 million in 1995." With this growth in the
portable PC market comes an increasing need for remote access to the LAN.
Market research firm, Link Resources, says 4.3 million company employees
work at home now. That figure is expected to increase as companies
continue to find that higher productivity and employee satisfaction are
the positive results of their telecommuting policies.
In response to all of these trends and growing user concern with the
complexity of LAN-to-WAN connectivity, LANMODEM provides a simple
solution. LANMODEM is a V.32bis/ V.42bis (14.4K baud modem with up to 4x
data compression) network-attachable modem, which operates at speeds up to
57.6K baud.
It is an intelligent plug-and-play network modem designed to give users
high speed access to, from and between Novell LANs. LANMODEM provides a
direct connection to the LAN cabling, giving remote users the ability to
log in to their office network from home, their hotel room, or wherever
they may be. LANMODEM lets them run applications such as E-mail,
groupware, word processing programs, graphics packages, etc., exactly as
if they were attached directly to the network. Additionally, remote users
can transfer files, print documents or..take remote control of a network
PC.
As the popularity of telecommuting increases, so does the need for
realistic tools which permit employees to work efficiently and
effectively, believes David Bolles, company founder and CEO, who designed
LANMODEM with telecommuting in mind. "I think technology has a
responsibility to attempt to solve some of our environmental problems.
More and more, companies are willing to work with their employees to
permit them to work out of their home. LANMODEM is their easy-to-use
dial-in solution. Additionally it solves a need for employees traveling on
business to access their office networks."
LANMODEM attaches directly to the network and allows network users in the
office to share modems to dial out to electronic information services. In
addition, LANMODEM features an additional serial port permitting another
modem to be attached, giving multiple users the ability to dial in and out
simultaneously, avoiding the need for dedicated modems and extra
telecommunications lines.
LANMODEM, ($1,995 Ethernet Version), was announced late in 1991, and is
currently in final beta testing. It will ship in March.
Microtest Inc. designs, manufactures and markets innovative solutions for
users of computer networks, pioneering several firsts in both network
diagnostic and connectivity products. Since the introduction of Cable
Scanner, the first hand-held cable testing tool, in 1988, Microtest's
products have captured national recognition in the industry, including
winning several "Product of the Year" awards. The LANPORT connectivity
product line of dedicated applications servers, introduced in 1989, gave
network users the ability for the first time to share printers and modems
without a dedicated computer.
Microtest, 3519 East Shea Blvd, Suite 134, Phoenix, AZ 85028
602-971-6464
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,49 @@
BOSTON, MASSACHUSETTS, FEBRUARY 10,1992 -- Expandable Software, Inc., a
market leader of integrated factory and financial management software on
PC-LANs, today announced its new release 4.4. Over sixty new features were
incorporated. Major ease of use enhancements include pop-up help (user
modifiable) with point-and-shoot selection of valid values, hot-keys jump
users to other related programs or inquires from any prompt, and over 100+
drill-down inquires. The new release also supports companies requiring
sales and financial reporting by product line. This release will be
provided free to all Expandable/MRP users under their standard maintenance
contract.
Release 4.4 also includes a major new module, Lot Tracking. This
significant addition to the Expandable/MRP system lists for $3,000. Aimed
at companies that require part traceability where material must be tracked
by lot number, batch number, or serial number, the Lot Tracking module
provides complete tracking of a part and its lot/serial number information
from the time it is purchased or manufactured until it is consumed or
shipped. Features include traceability of parts as they are received,
cycle counted, kit issued to work orders or jobs, backflush issued,
completed and or shipped.
Marshall Guile, president and CEO of Expandable Software said, '"The new
Lot Tracking module provides optimum downward (lot source) and upward (lot
consumption) traceability required by companies with either FDA or serial
number traceability requirements. Lot Tracking also provides capabilities
to help a firm improve its quality control and save a firm unnecessary
write-offs because of lot expiration date control."
The Expandable/MRP system manages manufacturing (MRP II), financial, and
order management information for manufacturing companies. Feature rich and
completely integrated, it employs fourth-generation relational data base
technology and runs on IBM's AIX and in a variety of PC/LAN environments.
Because Expandable/MRP is an open-ended, total solution for manufacturing
management, --- and one that combines affordability with great power --,
the Expandable system on AIX and LANs has emerged as the premier
manufacturing software product of the 90s.
Expandable Software can be reached at: 408-261-7880
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,106 @@
Boston, MA, February 11, 1992 -- OAZ Communications today announced the
availability of NetFax Director systems software, the newest member of the
NetFax Open family of Fax gateways for Novell NetWare local area networks
(LANs). The NetFax Open Systems are based on an "open architecture"
platform, the same technology as OAZ's OEM product which is utilized by
the leading long distance carriers ensuring compatibility with Fax
standards worldwide.
NetFax Director software runs on the NetFax Manager Fax gateway hardware
and transforms an IBM PC or compatible into a Fax gateway. Up to Four
NetFax boards can be configured in a NetFax Fax gateway. The NetFax Open
architecture allows a multi-line server to send and receive Faxes
concurrently plus provides unlimited expandability allowing multiple
gateways to be added per LAN.
NetFax Director can be run with NetFax DOS or NetFax Windows user
interfaces or any MHS compatible E-Mail package. This "open architecture
provides users with unsurpassed ease of use.
The NetFax Director also provides an application program interface (API)
that simplifies the integration of NetFax with vertical application
programs for VARs targeting specific markets such as insurance, medical,
and legal, banking/finance and manufacturing.
NetFax Director delivers advanced features including: Completely automated
inbound routing via DID (direct inward dialing) or semi-automatic DTMF
(touch-tone decoding) routing to deliver Faxes directly to the recipient's
PC; Fax Broadcasting up to two thousand using personal or global
directories; Attachment of up to 64 computer files or scanned documents;
Support for new fonts; HP LaserJet 2P and III printer support; HP ScanJet
scanner support; 180 degree rotation for viewing faxes; Real-time
conversion of outbound faxes.
OAZ incorporated many powerful features into NetFax Director for network
managers. OAZ developed an easy installation program plus comprehensive
step-by-step documentation for administrators and users. Additionally,
network managers are provided with the most comprehensive management
utilities available, including: Fax queue manipulation to prioritize
faxes; Fax scheduling including scheduling for off peak rates to achieve
line cost savings up to sixty percent; Activity log for monitoring and
reporting; departmental bill-back capabilities.
NetFax Director is currently shipping with the NetFax Manager board plus
NetFax DOS user software for $1,995. Upgrades for O-A-Z customers to
NetFax Director are only $495.
OAZ Communications, Fremont, CA, designs, manufactures and markets open
network Fax solutions for end-users and original equipment manufacturers
(OEMs). OAZ's exclusive open platform provides universal compatibility
with unsurpassed flexibility and power for both users and developers. OAZ
offers the industry's fastest, most powerful and most cost-effective Fax
products. OAZ's products are sold through a worldwide network of
value-added resellers (VARs) and distributors.
--------------------------------------------------------
Boston, MA, February 1 1, 1 992 -- OAZ Communications today announced
NetFax for Windows, user software for the NetFax Open family of Fax
gateways for Novell NetWare local area networks (LANs). NetFax for Windows
has been designed to be fully compatible (native) with Novell's Message
Handling Service (MHS) message routing platform.
NetFax for Windows is the first Windows Fax program for LANs which writes
Faxes directly to MHS, bypassing any gateway or font conversions.
Additionally, NetFax for Windows is the first Windows-based Fax
application that allows users to send multiple attachments.
NetFax for Windows provides "ultra-easy" Fax capability - allowing users to
Fax as easily as printing a document. Users can Fax from within any
Windows PC application by simply selecting the "NetFax" option from their
print menu. Plus, NetFax for Windows takes full advantage of the scalable
fonts of Adobe Type Manager from Adobe Systems and Face Lift from
Bitstream, providing the maximum possible resolution for Faxed messages.
Additional NetFax for Windows features include: Windows 3.1 compatibility;
Attachment of multiple files while print capturing from applications;
Creation of broadcast group out of the active phone book; Elimination of
redundant conversions via file caching during broadcasts; Import and
export of telephone databases (ASCII).
NetFax for Windows user interface software runs with NetFax Director Fax
gateway software and the NetFax Manager Fax gateway hardware. NetFax for
Windows will be available in April. Prices range from $395.00 for eight
users, $495.00 for 100 users, to $595.00 for 500 users.
OAZ Communications, Fremont, CA, designs, manufactures and markets open
network Fax solutions for end-users and original equipment manufacturers
(OEMs). OAZ's exclusive open platform provides universal compatibility
with unsurpassed flexibility and power for both users and developers. OAZ
offers the industry's fastest, most powerful and most cost-effective Fax
products. OAZ's products are sold through a worldwide network of
value-added resellers (VARs) and distributors.
OAZ Communications, 44290 Osgood Rd, Fremont, CA 94539
510-226-0171
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,216 @@
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
<20> INTEL FAXMODEMS NOW OFFERED <20>
<20> IN SYSOP PROGRAM! <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
After PC Magazine's most intensive modem evaluation in years, the Intel
14.4EX tied for "Editors Choice" honors with AT&T. The AT&T modem is more
than double the price of the Intel 14.4EX, making Intel's modem the clear
winner. Intel has combined this technology with our award winning
SatisFAXtion modems to bring you a new line of faxmodems. The best of the
bunch will be offered at special pricing to Sysops.
1) SatisFAXtion Modem/400 - an internal V.32bis, coprocessed
faxmodem with a V.32bis modem, Smart Line sharing and
Smart UART. Supports CAS compatible applications.
2) SatisFAXtion Modem/400e; an external V.32bis faxmodem.
Supports CAS and Class 1 fax interfaces.
[For more informaton, download the appropriate online
literature].
Common features of the 14.4EX, SatisFAXtion Modem/400 and 400e:
-V.32bis/V.32 speeds of 14.4K, 12K, 9.6K, 7.2K and 4.8Kbps.
-V.42bis, V.42 and MNP 5 data compression and error control.
-Automatic speed optimization. The modem monitors line
noise and falls back and/or forward to insure the maximum
throughput. These speed changes happen in less than 200ms!
-Adaptive handshaking. The 14.4EX samples the phone line
BEFORE the connection is made to maximize throughput.
-Quick connection option. The modem can be configured to
connect with other Intel modems in as little as six
seconds (vs the normal 12-16 seconds). Even if you're
connecting to a non-Intel modem, the connection time can be
cut to eight seconds. (NOTE: noisy phone lines will affect
the performance of this option).
-Automatic leased line restoration. In the event of carrier
loss on a leased line, the modem can be setup to automatically
attempt to re-establish the connection.
-Small form factor. Our external high speed modems are
packaged in the same metal case as our 2400bps modem,
reducing space requirements.
-Free communications software from Crosstalk. Each modem
comes with a free copy of "Communicator by Crosstalk".
This is the full $99 retail package which includes 13
terminal emulators and 8 file transfer protocols - including
ZMODEM.
-Status lights display connection speeds between 1200 and
14,400bps and when error control and data compression
connections have been made (externals only)
-Maximum DTE rate = 115.2Kbps
TO QUALIFY FOR THIS OFFER:
[] You must currently be operating a bulletin board system.
[] Purchase is for bulletin board use only -- not for resale.
[] The modem must be used on the BBS at least one year
before removal.
[] Bulletin board must display a message on user sign
on declaring an Intel 14.4EX or SatisFAXtion Modem/400
(or 400e) in use.
NOTE:
o Due to local market approval requirements, this
offer is only available in North America.
o This is a special limited offer from Intel. Intel
reserves the right to discontinue or alter the offer
at any time.
PAYMENT TERMS:
We accept Visa, Mastercard, American Express, Cashier
check or money order.
SHIPPING AND HANDLING (please allow 2-4 weeks for delivery): $15/unit
OTHER CHARGES:
State sales tax must be included where applicable (or
provide a tax exemption number).
--------------------------------------------------------
SYSOP ORDER FORM -- INTEL MODEMS
(Effective: 7/31/92)
NAME _____________________________________
COMPANY __________________________________
MAIL SLOT_________________________________
ADDRESS___________________________________
CITY____________________STATE____ZIP______
SHIPPING ADDRESS (IF DIFFERENT FROM ABOVE):
___________________________________________
___________________________________________
___________________________________________
Voice phone number:
_____________________________________
BBS phone number(s):
________________________________________________
________________________________________________
________________________________________________
________________________________________________
Name and address of your BBS:
________________________________________________
________________________________________________
________________________________________________
How long has your BBS been in operation?
________________________________________________
Hours of BBS operation:
________________________________________________
If you are a member of a network (eg. FidoNet,
Usenet, etc.) list addresses:
________________________________________________
________________________________________________
Average number of calls per month:
________________________________________________
BBS software used:
________________________________________________
Processor used on BBS computer:
________________________________________________
Brands and speeds of modems you now use:
________________________________________________
________________________________________________
________________________________________________
Account number, name and password for Intel (so we can
log into your system for verification):
________________________________________________
________________________________________________
________________________________________________
-------------------------------------------------------------------------
MODEL LIST SYSOP TOTAL
PRICE PRICE
14.4EX (ext) $549 $269 ________
* SatisFAXtion Modem/400e (ext) $549 $279 ________
SatisFAXtion Modem/400 (int) $499 $249 ________
SUB TOTAL (Quantity X Price) ________
(Limit 4)
*Available the end of August
STATE SALES TAX (Subtotal X State Tax %) ________
(or enter tax exemption number here)
SHIPPING & HANDLING ($15/unit) ________
(Please allow 2-4 weeks for delivery)
TOTAL ________
CREDIT CARD NUMBER: VISA:_______________
MASTERCARD:_______________
AMERICAN EXPRESS:_______________
EXPIRATION DATE:_______________
--------------------------------------------------------
My signature below shows that I have read and
understand the terms of this agreement.
[] You must currently be operating a bulletin board system.
[] Modem purchased is for bulletin board use only -- not for
resale.
[] The modem must be used on the BBS at least one year
before removal.
[] Bulletin board must display a message on user sign
on declaring an Intel 14.4EX of SatisFAXtion Modem/400
(or 400e) in use.
PURCHASER SIGNATURE:__________________________
--------------------------------------------------------
FAX THIS FORM AND CREDIT CARD NUMBER TO:
INTEL SYSOP SPECIAL OFFER
at (503) 228-9707
*OR*
MAIL YOUR ORDER TO:
INTEL SYSOP PROGRAM
PO BOX 10723
PORTLAND, OR 97210

View File

@@ -0,0 +1,68 @@
ATLANTA, GA, 20 January 1992 -- Hayes Microcomputer Products, Inc. today
announced immediate availability of Smartmodem OPTIMA 2400 (OPTIMA 24), a
cost effective solution for business and personal communications that
provides CCITT V.42 error-control and V.42 bis data compression for data
throughput up to 9600 bps. Hayes also lowered the price of Smartmodem
OPTIMA 9600 (OPTIMA 96), a CCITT V.32 modem, by approximately 20 percent.
OPTIMA 24 supports CCITT V.22 bis (2400 bps), CCITT V.22 (1200 bps), as
well as industry standards 103 (300 bps) and 212A (1200 bps). OPTIMA 24
communicates asynchronously and synchronously, as well as supports Hayes
AutoSync, a standard Smartmodem feature that allows the modem to
communicate both asynchronously and synchronously, without using an SDLC
card.
While Hayes does not publish an estimated retail price for OPTIMA products,
both OPTIMA 24 and OPTIMA 96 are available to the distribution channel at
an aggressive price that encourages a market price well below that of
competitive products. The current advertised price range of OPTIMA 24 is
$149 to $199, while the current advertised price range of OPTIMA 96 is
$349 to $429. Prices may vary based on the level of value-added service a
reseller provides to their customers.
"At Hayes, we believe we should be our own best competitor. With OPTIMA 24,
we reinforce our commitment to providing the latest technology to all
sectors of the communications market," said Hayes President Dennis C.
Hayes. "If you liked the price of OPTIMA 96 in 1991, you'll love the price
of both OPTIMA 96 and OPTIMA 24 in 1992. OPTIMA 24 offers a perfect
migration for companies that have standardized on Smartmodem 2400 and now
want data compression and error-control."
OPTIMA 24 and OPTIMA 96 come bundled with Smartcom EZ communications
software and a special $35 upgrade offer for Smartcom Exec as well as
valuable information services coupons.
Smartcom EZ is a simple-to-use communications software program that enables
users to access PCs and on-line or BBS services. Smartcom EZ provides
easy-to-follow menus and phone book entries to store frequently called
numbers, keyboard macros, extensive on-line help screens and Autotype,
which enables users to transfer text files effortlessly. Furthermore, the
XMODEM protocol allows users to send or receive data files error-free
between locations.
Both OPTIMA 24 and OPTIMA 96 are available in the U.S. and Canada, and
carry a two year limited performance warranty. While OPTIMA 96 is
currently available throughout Latin America, Hayes anticipates the
approval and availability of OPTIMA 24 in Latin America over the next few
months.
Best known as the leader in microcomputer modems, Hayes develops, supplies
and supports computer communications equipment and software for personal
computer and computer communications networks. The company distributes its
products through an international network of authorized distributors,
dealers, mass merchants and original equipment manufacturers.
Hayes Microcomputer Products Inc
PO Box 105203, Atlanta, GA 30348
404-441-1617
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,83 @@
HAYES MICROCOMPUTER PRODUCTS, INC.
P.O. Box 105203
Atlanta, Georgia 30348
Press Inquiries: 404/840-9200
Customer Service: 404/441-1617
Fax: 404/441-1238 FOR IMMEDIATE RELEASE
Angie Ciarloni/Peggy Ballard H-1292+++AT
HAYES INTRODUCES SMARTMODEM OPTIMA DATA + FAX MODEM
AND SMARTCOM FAX Software
- - - - - -
Smartmodem OPTIMA 144 Data Modem Announced
ATLANTA, GA, 18 May 1992 -- Hayes Microcomputer Products, Inc.
today announced Hayes OPTIMA 144 + FAX144, a data + fax modem that
supports CCITT V.32 bis and CCITT V.42 bis for data throughput of up to
57,600 bit/s and CCITT Group 3 Fax standard V.17 for 14,400 bit/s. In
addition, Hayes also announced Hayes OPTIMA 144, a data modem that
supports CCITT V.32 bis and CCITT V.42 bis.
Hayes OPTIMA 144 + FAX144, available for an estimated retail
<S>topprie of US$519 and CDN$699, comes bundled with free Smartcom FAX
communications software and Smartcom EZ data communications software.
Smartcom FAX is a TSR program that allows users to fax documents directly
from their computer, as well as receive fax messages and then view,
rotate, flip, print or save to disk. Smartcom FAX also keeps detailed
Transaction Logs in files on disk, so that both send and receive fax
activities may be viewed at any time.
OPTIMA 144, a cost-effective, high-speed data modem, is designed
for users whose applications do not require fax communications.
OPTIMA 144 comes packaged with free Smartcom EZ communications software
for an estimated retail price of US$479 and CDN$649.
OPTIMA 144 and OPTIMA 144 + FAX144 supports CCITT V.32 bis
(14,400 bit/s), CCITT V.32 (9600 bit/s), V.22 bis (2400 bit/s) and V.22
(1200 bit/s), as well as industry standards 103 (300 bit/s) and 212A (1200
bit/s) for data communications. These modems communicate asynchronously
and synchronously, and support Hayes AutoSync, a standard Smartmodem
feature that allows the system's asynchronous communications port to
transmit data synchronously, eliminating the need for an SDLC or Bisync
card. These products, which are manufactured in Norcross, Ga., will be
available in the Americas Region, including the U.S., Canada, Mexico,
Argentina, Chile and Venezuela in third quarter 1992.
<S>top
"Sending or receiving fax messages around the world without
leaving your computer is no longer just another convenience in businesses
today for many applications it is an essential part of communications,"
said Hayes President Dennis C. Hayes. "Now no matter what your needs are,
you have everything in one modem asynchronous or synchronous data
communications as well as fax capabilities. With OPTIMA 144 you have the
advantage of additional cost savings for the highest standardized speed
available for PC modem communications."
All OPTIMA products carry a two year limited performance
warranty. A special offer by Hayes, available in the U.S. and Canada
only, allows users to obtain a free extension of the limited performance
warranty to a total of five years coverage when one of these OPTIMA
products is registered within 90 days of purchase by mail or by using
Online With Hayes, Hayes Bulletin Board System, in the U.S. and Canada at
800/US HAYES or 404/729-6525 (Atlanta ISDN users).
Hayes provides high-quality customer support through applications
consultants and technical support engineers through Hayes Customer Service
in the U.S. at 404/441-1617 and in Canada at 519/746-5000, as well as
24-hour electronic support throughout the Americas Region at 404/HI MODEM,
via Online with Hayes. In Latin America, Hayes also provides customer and
<S>toptechnical support through authorized service distributors. (See attached
for additional distribution and support information for the Americas
Region.)
Best known as the leader in microcomputer modems, Hayes develops,
supplies and supports computer communications equipment and software for
personal computer and computer communications networks. The company
distributes its products in over 60 countries through a global network of
authorized distributors, dealers, VARs, systems integrators and original
equipment manufacturers.
###


View File

@@ -0,0 +1,48 @@
February 10, 1991, Boston, MA - Output Technology Corporation (OUTPUT) is
demonstrating its new 800 cps office printer with a wide range of standard
features, plus flexible paper handling capabilities. The MTP is designed
for office printing jobs, as well as document-on-demand, point-of-sale,
and graphics applications.
"The MTP is really a multiple task printer," said John Lugviel, OUTPUT's
Vice President of Marketing and Sales. "It has excellent paper handling
capabilities, and because of this, it can do a lot of jobs that the
typical printer just can't handle. For businesses that need a single
printer to handle a wide variety of applications, it's an exceptional
value at $2,195!"
The key to the printer's versatility lies in its advanced paper handling
features. The MTP, an impact printer, has full forms capabilities,
including l-button zero tear off (eliminating forms waste), a standard
push tractor for forms up to 6 parts, and paper parking, as well as
options for a bottom feed pull tractor and a cut sheet feeder. The
printer's auto head gap automatically adjusts to a form's thickness,
completely eliminating the need for any manual adjustments.
The MTP also excels at graphics and bar codes, and features 9 resident
fonts, more than any other printer in its class. It also has 5 resident
bar codes (Code 39, UPC-A, EAN-8, EAN-13, Interleaved 2 of 5), and
built-in color capabilities. Emulations include Epson, FX-1050, Epson
EX-1000 (color), and IBM Proprinter III XL. With a suggested retail price
of $2,195, the MTP is available for shipment now.
Output Technology Corporation is a Spokane, Washington, based printer
manufacturer, and is a leader in laser and impact printing technology, and
laser enhancement products. OUTPUT's products are available worldwide
through an extensive network of distributors, VARs, and OEMs, recently
complemented with the addition of Ingram Micro and Tech Data Corporation.
OTC - Output Technology Corp
2310 N. Fancher Rd, Spokane, WA 99212-1381
509-536-0468 800-468-8788
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,93 @@
INTEL PRESENTS P6 MICROARCHITECTURE DETAILS
Technical Paper Highlights "Dynamic Execution" Design
SAN FRANCISCO, Calif., Feb. 16, 1995 -- Intel Corporation today
disclosed details of the first fruit of a parallel engineering effort,
the next-generation P6 microprocessor, at an engineering conference here.
The presentation of technical details follows the delivery of first
working samples to OEMs.
The 5.5-million transistor chip will deliver the highest level of
processor performance for the Intel Architecture when systems using the chip
begin to ship in the second half of this year. P6 will achieve this
performance using a unique combination of technologies known as Dynamic
Execution.
P6 microarchitecture details were presented by Intel at the IEEE
International Solid State Circuits Conference (ISSCC), an annual industry
gathering where technical innovations are showcased and discussed. Details
on P6's unique approach to high-performance processing, described collectively
as Dynamic Execution, were presented by Dr. Robert Colwell, P6 architecture
manager, at ISSCC.
Colwell explained that this architectural enhancement is the next step
beyond the superscalar advance implemented in the Pentium(R) processor.
Dynamic Execution is a combination of technologies -- multiple branch
prediction, data flow analysis and speculative execution -- that is
constantly feeding P6's data-crunching units. Intel engineers were able to
implement Dynamic Execution by analyzing how billions of lines of code in
software programs are typically executed by processors. Collectively, these
technologies allow the P6 to operate as an efficient information factory.
Multiple branch prediction increases the amount of work available
for the microprocessor to execute. Data flow analysis schedules the
instructions to be executed when ready, independent of the original program
order. Speculative execution allows the P6 to keep its superscalar engine
as busy as possible by executing instructions that are likely to be needed.
With these technologies, the P6 can efficiently analyze much larger
sections of incoming program flow than any previous PC processor, swiftly
allocate internal resources, and intelligently optimize work that can be
done in parallel. Consequently, more data can be processed in a given time
period.
Parallel Design Teams Learn From Each Other
The concept of P6's Dynamic Execution engine began in 1990, when
today's mainstream Pentium(R) processor was still just a software simulation.
"Intel's use of parallel engineering teams for chip design has
compressed delivery cycles of new generations of chips, cutting the time
about in half," said Albert Yu, senior vice president and general manager,
Microprocessor Products Group. "As a result, computer users will have some
of the most powerful, low-cost engines at hand to enrich the desktop with
software and other capabilities we only imagined five years ago," he said.
Yu said the Oregon-based P6 design team, building on the knowledge
gained from the Pentium processor design, embarked on an innovative
system-level solution to the next-generation processor involving the
processor, cache (high-speed supporting memory), and bus (the transport
mechanism that keeps data flowing into and out of the processor). "This
approach will ensure that computers built around P6 will be able to take
advantage of the chip's processing power when it is introduced as a
commercial product later this year," he said.
The system-level approach means the P6 will be the first high-volume
microprocessor with two die in a single package. A dual-cavity, standard
PGA package contains a P6 die and a companion level two (L2) cache die.
The two chips communicate using a highly-optimized bus which contributes
to high performance by tightly-coupling the processor to its primary
data source.
Additional Features
In addition to providing new levels of performance, the P6 will contain
new features which will greatly simplify the design of multiprocessor systems
and improve overall system reliability. Among applications that will benefit
greatly from this processing power are: desktop applications such as image
processing, speech recognition, software-only videoconferencing and
multimedia authoring, and server applications such as transaction and
database processing.
At introduction in the second half of this year, the P6 processor
will operate at 133 MHz and will use a power supply of 2.9 volts. The
low voltage also contributes to low power dissipation, which is expected
to be only about 14 watts, typically, for the processor and L2 cache combined.
Complete performance and power dissipation information will also be available
at that time, although estimated performance has been measured at more than
200 SPECint92 on a prototype system, twice the performance of today's fastest
Pentium processor.
Intel, the world's largest chip maker, is also a leading manufacturer
of personal computer, networking and communications products.

View File

@@ -0,0 +1,54 @@
WEST DES MOINES, IOWA FEBRUARY 7, 1992 -- CESOFTWARE HOLDINGS, INC.
(NASDAQ/HMS Symbol: CESH) today announced QuickMail for MHS (Message
Handling Services). QuickMail for MHS will allow the more than two million
users attached to Novell networks, utilizing NetWare MHS, similar
functionality and flexibility already enjoyed by nearly half a million
QuickMail users worldwide. MacWeek recently estimated that NetWare MHS is
the messaging engine for about 65% of the PC mail market. The NetWare MHS
end-users' experience will be enhanced by the full featured, easy-to-use
QuickMail interface and the comprehensive services offered by NetWare
MHS.
Kanwal Rekhi, Executive Vice President of Novell and General Manager of the
Interoperability Systems Group said, "We are very excited that CE Software
is developing their market-leading E-mail package, QuickMail, to run
natively with NetWare MHS. Our customers have been asking for native
NetWare MHS support for the Macintosh and now users of QuickMail for MHS
will gain transparent access to the more than 120 commercial applications
which use NetWare MHS."
"We are pleased to announce our strategic support of MHS," said Richard
Skeie, President and CEO of CE Software, Inc. "As we strive to improve our
customers' computing environments, it's a natural progression for
QuickMail to support NetWare MHS. NetWare users should benefit handsomely
from the combination of QuickMail functionality and Novell NetWare MHS
services."
CE Software will be demonstrating a version of QuickMail for MHS in the
Novell booth at NetWorld, held in Boston, February 11-13. Product
availability will be announced at a later date.
CE Software is the leading supplier of electronic mail for the Macintosh
market. QuickMail also supports Windows, DOS and OS/2. CE's other major
products include In/Out, an electronic people tracker for networked
computers; QuicKeys 2, the award-winning macro program; DiskTop, a
sophisticated file management utility; Alarming Events, a personal
scheduling application; Tiles, the Intelligent Desktop for Apple
Macintosh; and CalendarMaker, a popular calendar publishing application
for Macintosh and Windows.
CE Software
1801 Industrial Circle, PO Box 65580
West Des Moines, IA 50265
515-224-1995
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,194 @@
Mustang Software, Inc. Introduces QmodemPro
BAKERSFIELD, Calif., October 13, 1992 -- Mustang Software, Inc.
(MSI), has introduced QmodemPro, the first communications software
program enabling electronic mail messages to be received and answered
using one integrated program, regardless of the originating E-mail
source.
QmodemPro retrieves E-mail, bringing it in to one PC/compatible
environment. The user no longer needs separate programs to handle MCI
Mail, CompuServe E-mail, BBS messages and other E-mail systems. In
addition, QmodemPro can redirect the user's replies to any bulletin
board system (BBS), E-mail service or FAX machine -- not just the
original message's source.
QmodemPro represents a "rewrite from scratch" of the Qmodem
program, according to Jim Harrer, president/CEO of MSI. The company
acquired the original Qmodem program from The Forbin Project, Cedar
Falls, Iowa, in October 1991. The product had attracted a large user
following through its nearly seven years of availability as a shareware
product.
"Our goal for Qmodem has always been to produce an outstanding,
mass-merchandized product that could compete on any retail shelf with
the major generic communications programs," Harrer said. "In addition,
QmodemPro works hand-in-glove with our other retail product line, the
WILDCAT! BBS software."
Enhanced Off-Line Xpress Mail Reader Heads New Features
QmodemPro offers more than 75 new features compared to Qmodem
Version 5, the first version of Qmodem sold under the MSI label,
unveiled this past January. Heading the list of new features is an
enhanced off-line mail reader. This capability allows users to
download packets of mail and then read the contents off-line,
significantly reducing expensive long-distance charges.
The enhanced off-line mail reader OLX features full mouse support
with pull-down menus and resizable windows. Other new features include:
* Ability to open multiple packets and view multiple conferences at
once.
* No limitations to the size of packets, conferences or message size.
* More efficient use of memory resources, including EMS and XMS.
* An integrated message editor with spelling checker and 124,000 word
dictionary. External editors also supported.
* Full cut, copy and paste between messages, conferences and replies,
even across packets.
* Ability to save messages to folders for reading and action at a
later time.
* Internal address book with full links via QmodemPro to CIS, MCI,
FAX and other services.
* Advanced personal mail handling via an IN BOX with automatic
archiving and configurable purging. Personal mail no longer
disappears when a packet is deleted.
* Redirection of replies and messages to any location, not just the
original source system.
Full mouse support and a pull-down menu interface have also been added
throughout the QmodemPro program. Other key new features of the
communications software include:
* The dialing directory now supports up to 4,095 entries per
telephone book, with an unlimited number of books.
* Ideally suited for working with a BBS, the dialing directory
now includes support for up to four alternate telephone numbers
per entry. This allows the user to automatically try a
different telephone number if the primary BBS number is busy.
* Group-dialing support allows users to group-dial telephone book
entries as one entry. When dialing multiple E-mail systems,
QmodemPro will download mail from one system and automatically
continue on to the next entry in the group.
* Automatic linking between mail packets created in OLX and dialing
directory entries. This allows sending all pending replies with a
single keystroke.
* QmodemPro includes send FAX ability, supporting both ASCII and .PCX
files through any Class 1 or Class 2 FAX modem. FAX send
integrates with OLX completely making it possible to create and
send a FAX and custom cover sheet by simply typing the message to
send.
* MCI Mail and CompuServe E-mail gateway support, enabling users
to retrieve or send messages on these popular E-mail accounts.
* 125 pre-configured modem setups for fast installation.
Xmodem and ASCII. Up to 10 external protocols can be added,
including bi-directional protocols such as BIMODEM and HSLINK.
* Five new terminal emulations have also been added, including
WYSE 50, DEC VT 102, 220, 320 and TVI 925.
Direct orders for QmodemPro are being taken effective 10/13/92. A
specific release date cannot be announced since the manuals and
packaging are still in production.
The retail price for QmodemPro with Off-Line Xpress is $99, and it will
be available in retail outlets in 6-8 weeks. Orders placed with MSI
direct will be processed as soon as the packaging is complete. Allow
6-8 week for delivery for all orders. Orders will be shipped on a
first-in first-out basis.
There are several special offers available. Review the section below
for details. Should an individual be eligible for more than one offer,
we encourage you to order the one which gives the best pricing
advantage. Only one special price offer is available per registration.
* A special upgrade offer for only $35 + s/h is available to
registered users of Qmodem v5.x, and to users of Qmodem 4.x
purchased from the Forbin project. In order to take advantage
of this upgrade offer your registration card must be on file
with MSI or your name and registration information must be on
file in the database of purchasers from the Forbin project.
* A special offer is also being extended to registered WILDCAT!
sysops for a limited time. Until December 31, 1992 any WILDCAT!
sysop can purchase QmodemPro for only $50 + s/h, a discount of
almost 50%. If you don't own WILDCAT! but want to get it, you
can order WILDCAT! between now and December 31 and get QmodemPro
at the discount.
Because the new OLX v3 integrates so well with QmodemPro and has
extra capabilities when used with QmodemPro (such as FAX, CIS, MCI
etc.), we are also extending special offers to registered users of the
OLX and SLMR products.
* Registered users of OLX v2.2 will be receiving the new OLX v3
automatically, provided the registration card has been received
at MSI. A special offer is also being extended to these OLX
registered users to enable them to receive the full QmodemPro
package (including OLX) for only $20 + s/h. To take advantage
of this offer you must place your order by phone with MSI prior
to November 1, 1992! This offer is not good after the free OLX
update has been mailed. You must place your order prior to
November 1 so that we can change our system records before we
ship your package. After that date you can take a credit for $40
toward a purchase of QmodemPro (see last offer).
* Registered users of the SLMR program from Technique Computer
Systems can upgrade to OLX v3 for $20 + s/h. They may also
purchase QmodemPro with OLX for $40 + s/h if desired. This
offer expires on December 31, 1992.
* Registered users of either OLX 2.2 or SLMR may upgrade to
QmodemPro at any time by taking a credit of their purchase price
($40 for OLX 2.2 and $20 for SLMR) against the $99 QmodemPro
price.
Shipping and handling charges for all orders are as follows:
Continental U.S. - $10
Hawaii, Alaska & Canada - $15
Overseas - $35
Add $5 for all COD orders. CODs must be paid by cashiers check
or money order, no personal checks or cash.
Orders are shipped exclusively by Federal Express.
Orders can be placed as follows:
* Call 1-800-999-9619 to order via VISA, MC, AMEX, Discover or COD.
* Order via FAX by calling 805-395-0713. Please indicate your
full shipping address, the name of the product desired, and
registration information if taking advantage of an update
discount. Also include a daytime phone number for use in the
event we need to contact you about your order.
* Mail your order information to us at P.O. Box 2264, Bakersfield,
CA 93303. Please indicate your full shipping address, the name
of the product desired, and registration information if taking
advantage of an update discount. Also include a daytime phone number fo
event we need to contact you about your order.
* Order via our BBS by calling 805-395-0650 (non-registered lines)
or 805-395-0250 (registered lines).

View File

@@ -0,0 +1,39 @@
Santa Monica, CA, January 6, 1992 -- Retix, a leading worldwide supplier of
Open Networking products, today announced that it has begun shipments of
its Microsoft Mail for Macintosh Gateway to X.400. The gateway provides
Microsoft Mail (MS Mail) users with direct access to X.400 network users
worldwide.
The MS Mail Gateway links users of MS Mail for the Macintosh to users of
other leading LAN-based electronic mail (e-mail) products, mainframe and
mini-computer based e-mail systems and public and private X.400 services.
The gateway works in conjunction with Retix' OpenServer 400 to provide MS
Mail-to-X.400 file conversion and transmission facilities. Using the
standard X.400 data format, messages can be exchanged between otherwise
incompatible e-mail programs, regardless of the computing platform.
Pricing for the gateway begins at $1,795, U.S. list. For more information,
contact Retix Inside Sales at 1-800-255-2333 or 310-828-3400.
Retix is a leading worldwide supplier of Open Networking products to the
end user and OEM markets. Founded in 1985, Retix designs, manufactures and
markets both OSI software and internetworking bridges and routers to end
users, OEMs, systems integrators, value-added resellers and distributors.
Retix has more than 200 OSI original equipment manufacturer (OEM)
licensees throughout the world and has sold over 20,000 bridges and
routers. Retix' shares are traded on the NASDAQ National Market System
under the symbol "RETX".
Retix, 2401 Colorado Ave, Santa Monica, CA 90404
310-828-3400
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,108 @@
Santa Monica, CA, February 5, 1992 -- Retix, a leading worldwide supplier
of Open Networking products, today expanded its OpenServer 400 series of
X.400 based messaging solutions with a new version of OpenServer 400 and
two additional gateway Products. The company has added an OS/2 version to
its current line of popular OpenServer 400 products which includes
versions for DOS and UNIX (both SCO and Interactive versions). In
addition, Retix has introduced a new Microsoft Mail for PC Networks
Gateway to X400 and a new version of the SMTP (Simple Mail Transfer
Protocol) Gateway to X.400, expanding its current suite of gateway
products. Now, users in each of the major operating system environments,
using virtually any e-mail system, can benefit from OpenServer 400's
messaging solution.
The OpenServer 400 Product Family
Retix OpenServer 400 products allow users to link otherwise incompatible
mail systems to one another, creating a cohesive, enterprise-wide
messaging environment. All OpenServer 400 products provide a distributed
solution based on widely-accepted industry and ISO international
standards. In addition, OpenServer 400 products can be combined with an
extensive suite of gateways from Retix and other vendors to gain access to
virtually every popular e-mail and mail-enabled application in use today.
OpenServer 400 for OS/2
OpenServer 400 for OS/2 is designed to take full advantage of the
multi-tasking OS/2 Version 1.3 operating system, providing users with
improved performance and increased capacity for their enterprise-wide
messaging networks. Key benefits of the OS/2 version include: better
memory utilization and increased performance for more efficient service to
large numbers of users; the ability to run OpenServer 400 and selected
e-mail server applications on a single machine; and a graphical OpenServer
Configuration Utility (OCU) running under Presentation Manager that
simplifies configuration and set-up.
"Now that we have a version of OpenServer 400 for OS/2, as well as DOS and
UNIX, we can address the full spectrum of users that need to establish
enterprise-wide messaging," said Mark Fishburn, vice president and general
manager of Retix' OSI Product Unit.
New Gateway Products
Retix also expanded its family of gateways which work in conjunction with
OpenServer 400 to give users of PC LAN-based e-mail systems
interoperability with a wide range of other e-mail systems, mainframe and
minicomputer based systems and public mail networks that support X.400.
The new Microsoft (MS) Mail for PC Networks Gateway provides MS
Mail-to-X.400 format conversion and transmission, allowing users of MS
Mail for PC Networks (formerly Consumer Software's Network Courier e-mail
package) to send messages and receive messages from users of other e-mail
systems. In fact, to the MS Mail user, users of other email systems appear
as if they were using the same mail system; the gateway simply maps the MS
Mail address to the X.400 address transparently.
The Retix SMTP Gateway to X.400 works in a similar fashion, providing
SMTP-to-X.400 format conversion and transmission facilities, so that users
of UNIX e-mail systems (RFC 822 mailers) obtain access to other e-mail
systems and mail networks. Using the SMTP Gateway in combination with
OpenServer 400, users can send messages or files throughout an enterprise
using any e-mail package that supports RFC 822. The new version of the
gateway announced today adds support for SCO UNIX (to the previously
supported Interactive version), as well as MMDF-II, a popular SCO UNIX
mailer.
"Microsoft has a significant market share in the LAN-based e-mail world
with MS Mail for PC Networks, and UNIX mailers are used heavily in both
government and academic sectors," said James Neiser, associate vice
president of marketing for the Retix OSI Product Unit. "In conjunction
with our OpenServer Partners, we can now provide X.400-based
interoperability to e-mail users in virtually every market sector."
The MS Mail for PC Networks and SMTP Gateways to X.400 join the growing
number of gateways supplied by Retix and its OpenServer Partners to
provide access to popular e-mail and mail-enabled applications. Additional
gateways to X.400 are currently available for users of 3Com, cc:Mail,
NetWare MHS, OfficeWorks, MS Mail for Macintosh and WordPerfect, among
others.
Pricing and Availability
OpenServer for OS/2 is available 60 days ARO and begins at $5,950, U.S.
list. The Microsoft Mail for PC Networks Gateway to X.400 and the new
version of the SMTP Gateway to X.400 are available 60 days ARO. Pricing
for both gateways begins at $1,795, U.S. list. The products will be
demonstrated, along with OpenServer 400, at Networld Boston, February
11-13,1992 in Boston, Massachusetts, booth 121.
Retix is a leading worldwide supplier of Open Networking products to the
end user and OEM markets. Founded in 1985, Retix designs, manufactures and
markets both OSI software and internetworking bridges and routers to end
users, OEMs, systems integrators, value-added resellers and distributors.
Retix has more than 200 OSI OEM licensees throughout the world and has
sold over 25,000 bridges and routers. Retix' shares are traded on the
NASDAQ National Market System under the symbol "RETX".
Retix, 2401 Colorado Ave, Santa Monica, CA 90404
310-828-3400
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,55 @@
February 11, 1992, Boston, MA. Cracchiolo & Feder, Inc. today announced the
release of RightFAX 2.0, a totally rewritten version of it's network fax
solution. RightFAX 2.0 incorporates the benefits of client-server
technology and a Windows 3.0 and 3.1 front-end -- improving performance
and reducing support problems. "RightFAX 2.0 has been redesigned using
more client-server technology than previous versions to provide a more
robust solution for today' s demanding networks," said Bradley Feder,
President of Cracchiolo & Feder, Inc.
RightFAX 2.0 now supports a variety of fax boards including the Brooktrout
TR-112 series and the Gammalink CP series. "Faxing is critical for
communicating overseas. RightFAX' s support of these boards provides for
more international connections, and the Gammalink CP-MC board addresses
the needs of the MicroChannel market which adds depth to the RightFAX
product line," said Joseph Cracchiolo, Vice President of R&D. RightFAX 2.0
also includes additional international character set support.
RightFAX 2.0 is a multi-channel network fax utility product that allows PC
clients to send and receive fax documents from their network workstation.
Outgoing documents can be faxed by printing them to a standard network
print queue from any software application package. As for incoming faxes,
RightFAX offers several routing options including Direct-Inward-Dial. The
new version adds support of DTMF codes which enables callers to route
faxes with tone or voice prompts. RightFAX 2.0's DTMF routing technology
can also be configured to interface with PBX systems.
Supporting NetWare, LAN Manager and OS/2 LAN Server, RightFAX 2.0 added a
new Windows fax viewer which allows documents to be scaled, flipped, and
edited in graphics mode. A new NetWare version of RightFAX utilizes an
OS/2 based fax server for increased throughput. A NetWare fax server now
supports up to 32 print queues on 32 file servers, supports up to 16 phone
lines or a maximum of 8 fax boards, and services Windows, DOS, & OS/2
clients/workstations.
Based in Tucson, Arizona, Cracchiolo & Feder is a network integrator and
developer of high-technology network FAX solutions. RightFAX is the only
multichannel, auto-routing fax Server solution which requires no
workstation TSR memory. RightFAX 2.0 is scheduled to ship March 1, 1992
through a network of distributors, VARs and system integrators. Prices
range from $1,995 (US) to $4,495 (US). The entire RightFAX product line
will be exhibited at NetWorld/Boston (booth #4825) and CeBIT in Hannover,
Germany (Hall #12, USA Pavilion, Stand A48/C47, Booth C6). For more
information, please contact Cracchiolo & Feder, Inc. at (602) 327-1357 or
FAX at (602) 795-4753.
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,206 @@
Shiva at Networld '92
Shiva Joins Novell Technical Support Alliance
At Networld, Shiva Corporation will announce joining Novell, Inc., and
other computer industry leaders as a member of the Technical Support
Alliance (TSA), which gives customers coordinated post-sales support for
multivendor computing environments. Novell's choice of Shiva as a
technical alliance partner was a result of an extensive survey of the
large NetWare user base. TSA members include 30 leading companies such as
Apple, Borland, Digital Equipment Corporation, Microsoft and others. For
more details, see the enclosed press release.
Network Discussion Groups
Throughout the show, Shiva will host a series of discussion groups on
issues surrounding dial-in network access. The groups of network managers
-over 100 in all will air their views, led by Dr. Eric Almquist, general
manager of Decision Research Corporation and Lori Underhill, also of DRC.
To keep the ideas flowing, Shiva also invited industry experts who will
act as discussion catalysts. For information about trends that emerge in
the discussion groups, contact Criswell Communications after Networld.
Shiva Booth Demonstrations
Shiva Corporation (booth #3624) will demonstrate a variety of dial-in
solutions for PC and Macintosh vendor environments, along with its popular
FastPath 5 LocalTalk-to-Ethernet router.
NetModem/E
Shiva will demonstrate the award-winning NetModem/E, the only dial-in
networking product that gives PC users transparent access to Novell
NetWare network data and services, even using graphical programs like
Lotus Notes and Windows. The NetModem/E supports Novell's IPX and
AppleTalk, so PC and Macintosh users can dial into a network and access
resources as if they were local nodes. Other features include shared
dial-out and network-to-network routing.
The demonstration setup in Shiva's booth includes NetWare 3.11 running on a
Compaq 386-33 computer along with the Mac NLM (NetWare Loadable Module).
The network, based on a 10BaseT Ethernet topology, connects two Compaq
workstations, a Macintosh IIsi, and Apple Computer's PowerBook. Both PCs
and Macintosh computers can dial out to outside services and dial into the
Shiva network in Cambridge, MA, through a NetModem/E. The NetModem/E uses
Shiva's dial-in driver, which is compatible with the ODI (Open Data Link
Interface) specification from Novell. The workstations can all dial out
through a single NetModem/E to Shiva's bulletin board or CompuServe, or
dial into a NetModem at Shiva for network-to-network routing.
FastPath 5
Shiva's FastPath 5, the fastest LocalTalk-Ethernet gateway, and the de
facto standard for Macintosh routing, will also be demonstrated with
Shiva's new routing software, called K-Star 9.1, that is faster and uses
less memory than previous versions. K-Star 9.1 adds more support for SNMP,
including support for 311 unique MIB objects. Version 2.2.1 of Shiva Net
Manager, including a new management interface and enhanced diagnostics,
will also be demonstrated. The Shiva Net Manager lets users manage all
their FastPaths from anywhere on the internet.
AppleTalk Remote Access Technology Demonstration
Shiva is showing one of the first third-party demonstrations of AppleTalk
Remote Access. The demonstration setup includes an Apple PowerBook running
System 7 and AppleTalk Remote Access client software, a 9600 bps modem,
and a Shiva hardware server and modem connected to an AppleTalk network.
Using AppleTalk Remote Access and the modem, the remote PowerBook dials
and connects to the Shiva server, and becomes a full node on the AppleTalk
network. The PowerBook user can access file servers, printers, or
electronic mail, as if he or she were directly connected to the network.
User Champions
Shiva salutes its User Champions from Polaroid Corporation, McDonald's and
others in its booth presentation. Polaroid Corporation uses the NetModem/E
in an automated identification system that stores digitized photographs,
fingerprints and data on a central server. Clients in remote locations can
access identification data using the NetModem/E - a transparent, easy
solution. McDonald's Corporation also uses the NetModem/E, to give
regional managers in remote offices access to central databases from
anywhere.
Expanded Management Team
New management joining Shiva during the last two quarters include Bill
Avery, VP-Product Development; Paul Chesterman, VP-Finance; Steve Van
Beaver, Director of Customer Support; Ronna Alintuck, Director of
Marketing. For more information, see the enclosed release.
About Shiva Corporation
Founded in 1985, Shiva Corporation is a leading supplier of communications
servers and internetworking products. According to International Data
Corporation (Framingham, MA), Shiva is the leading AppleTalk
internetworking vendor, with 56% of the market.
NetModem/E is a trademark of Shiva Corporation. FastPath is a registered
Trademark of Novell, licensed to Shiva Corporation. All other product
names are registered trademarks or trademarks of their respective
companies.
--------------------------------------------------------
Boston, MA, Networld -- February 11, 1992 -- Today Shiva Corporation joined
Novell, Inc., and other computer industry leaders as a member of the
Technical Support Alliance (TSA), formed to provide customers with
coordinated post-sales support for multivendor computing environments.
Novell's choice of Shiva as technical alliance partner was a result of an
extensive survey of the large NetWare user base. Shiva was recognized as a
leading supplier of internetworking and dial-in remote access tools for
Novell customers. Shiva is the only Macintosh hardware product company,
other than Apple Computer Corp., currently in the Alliance.
TSA members include computer industry leaders such as Apple, Borland,
Compaq, Digital Equipment Corp., Hewlett-Packard, IBM, Intel, Lotus
Development Corp., Microsoft, NetFRAME, Oracle, Ungermann Bass, 3Com and
others. The TSA now includes 30 member companies.
According to Richard King, Novell's Vice President of Service and Support,
"With companies like Shiva joining the alliance, TSA will continue to
provide the widest support coverage for complex, multivendor systems in
the industry."
The Technical Support Alliance agreement between Novell and Shiva outlines
the responsibilities of a support team that includes technical support
staff from both companies. Team members exchange training and technical
information on their respective products and use each other's products in
their technical support labs. A customer with a technical problem
involving both companies can call either company to begin resolution of
the problem. Procedures that involve a conference call between team
members are defined for problems that require escalation.
Steve Van Beaver, Shiva's Director of Product Support, said "Our
participation in TSA reflects the fact that internetworking tools, and
dial-in remote access, are becoming network critical applications. As
users link multi-platform and multi-protocol environments, tools like
routers and Shiva's NetModem become virtually as central as the network
operating system."
The NetModem/E is an integrated network communications server that provides
remote IBM and compatible PCs and Macintosh computers with transparent,
secure access to NetWare and AppleTalk Ethernet networks. The NetModem/E
provides dial-in, shared dial-out, and network-to-network routing for
PC-only networks, Macintosh-only networks, and mixed networks.
Shiva's FastPath 5, the leading LocalTalk-Ethernet gateway, and NetModem/E,
a network communications server for Macintosh and PC users, are both
widely used to integrate Macintosh computers into Novell NetWare
environments. The FastPath 5 is a multi-protocol LocalTalk-Ethernet
gateway that routes AppleTalk Phase 1 and 2, TCP/IP, DECnet, IPTalk and
NFS. It is the de facto standard for AppleTalk to Ethernet routing, with
an estimated 80 percent of the market.
Shiva's Dramatic Growth Results in Major Support Focus
Shiva, recently recognized as 1 8th on the Inc. 500 list of fastest growing
companies, has increased its support staff by over 50% during the last
year. Senior technical support people have been added to the team,
increasing the bandwidth and quality of the support. The company has also
put a sophisticated call tracking system in place.
According to Van Beaver, "Shiva has implemented an automated call tracking
system based on Informix that allows us to create a life history of every
customer who calls us. It saves both us and our customers valuable time as
we help solve their problems. Perhaps more important, it provides feedback
to the entire company about what customers are saying to us."
Since joining the company, Van Beaver has also introduced a customer
awareness program. As part of the program, every Shiva manager visits or
phones several accounts each week, requesting feedback on product quality,
application use, and the customer's overall satisfaction.
Turnaround time is a priority, since networks play a mission-critical role
in the corporate infrastructure. Said Van Beaver, "We've reduced our
response time drastically. If a customer calls Shiva, they can feel secure
that they'll talk with a support technician right away. And if we don't
meet those expectations, we want to know!" Van Beaver previously managed
product support at Intersolv (formerly Index Technology), where the
telephone support group received the best rating in the CASE industry for
three years running. He manages worldwide support, training and repair for
Shiva's products.
About Shiva
Shiva Corporation is a leading supplier of dial-in remote access, and
internetworking tools for Novell, AppleTalk, or mixed networks. Shiva
products have won critical acclaim for their easy to use peripheral
sharing, remote access and local- and wide-area network routing. According
to market research firm International Data Corporation, Shiva Corporation
is the leading supplier of AppleTalk internetworking systems with 56.1% of
the market.
Shiva Corp, One Cambridge Center, Cambridge, MA 02142
617-252-6300
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,90 @@
Retail prices on SMC's most popular 8- and 16-bit Ethernet network
interface cards have been reduced 20 to 35 per cent according to an
announcement made today by the company. At the same time, SMC introduced
both new and enhanced Elite Series Ethernet adapter cards featuring
increased performance, reduced size and easier installation. The new
boards expand the SMC EtherCard PLUS Elite adapter card line.
The significant price reductions on SMC Ethernet cards became effective
February 1,1992. According to Geof Karlin, SMC vice president of
marketing, the price drops reflect a major benefit of SMC's ability to
manufacture its own Ethernet chipset and bus interface LSI. "Our control
of silicon integration allows us to pass along manufacturing cost
advantages to our customers. This new, low pricing reflects SMC's
commitment to remain the Ethernet price/performance leader."
The five new EliteSeries boards from SMC consist of an 8-bit 10BASE-T; two
16-bit Micro Channel cards -- one 10BASE-T and one coax; and two
high-performance EISA adapters that feature two direct interfaces to
twisted pair or thin coax wiring via on-board transceivers, and offer an
alternative connection to a variety of media through an AUI port. The
three enhanced EliteSeries boards are all 16-bit adapters -- one 10BASE-T,
one coax and a combination 10BASE-T/coax version.
The new and upgraded boards all feature higher levels of silicon
integration for both increased reliability and ease of installation, and
are 20% smaller than the previous generation boards they replace.
"With the introduction of these new boards, we extend our line of Elite
board offerings," said Karlin. "Further integration of our LSI and
elimination of jumpers have allowed us to reduce space requirements on the
boards while increasing their reliability and making them easy to
configure. We expect these new cards to be as popular as the rest of the
EliteSeries line."
SMC EtherCard PLUS Elite boards are well-known for their outstanding
performance and quality, and easy installation via two preconfigured
jumper settings, or SMC's EZSETUP software configuration program. They
offer the broadest driver support in the LAN industry through SMC's
SuperDisk and third-party vendors.
SMC is making its new EtherCard PLUS Elite boards available in convenient,
easy-to-carry 6-packs with even more economical per-board retail prices -
some as low as $165. This is equivalent to buying five boards, and getting
the sixth free. Elite 6-packs will begin shipping in February, according
to the company.
SMC (NASD:SMSC) is one of the world's largest suppliers of PC LAN system
products. The company is a major designer, manufacturer and marketer of
10BASE-T/twisted pair, coax and fiber network interface cards,
concentrators and network management products for the Ethernet and ARCNET
markets. SMC currently has a worldwide installed base of over 3.5 million
nodes.
--------------------------------------------------------
After announcing major retail price reductions on its Ethernet adapter
cards, SMC said that five of its most popular boards will be available in
6-packs at even lower prices beginning this month.
SMC's 8-bit and 16-bit 10BASE-T and coax, as well as their 16-bit
combination boards, are all available in the new packaging at a per-board
price that is 20% off list, according to the company. All the boards are
part of the SMC EliteSeries family of Ethernet adapter cards.
"Resellers want to buy in volume whenever possible, so we're offering Elite
Ethernet boards in a package that meets that need," said Kristine Stewart,
SMC's director of channel marketing.
The new boxes, complete with carrying handle, began shipping to
distributors this month. Stewart said SMC is alerting the reseller
community about the new packaging through what the company calls the Elite
Treat direct mail campaign which features one of the 6-packs filled with
gourmet popcorn and promotional materials.
"We shipped over 16,000 of these Elite Treat boxes worldwide. It's
certainly the best tasting direct mail campaign we've ever had, and should
attract quite a bit of attention," said Stewart.
--------------------------------------------------------
For more information about SMC or the name of their nearest reseller,
contact SMC at 80 Arkay Drive, Hauppauge, NY 11788;1-800-SMC4-YOU in the
U.S., 1-800-8334-SMC in Canada, or (516) 273-3100, ext. 5317 elsewhere.
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,216 @@
Atlanta, GA, February 12, 1992 - LAN users can now reap the benefits of PC
fax technology without fear of incompatibility or obsolescence with
ShareFax 2.5, which started shipping February 11.
ShareFax 2.5 is the first software to enable DOS and Windows PCs to be
non-dedicated fax servers which work with any LAN operating system running
on ethernet or arcnet cards, and with virtually all faxboards and fax
modems.
ShareFax 2.5 gives organizations a valuable LAN fax solution while the
industry struggles to define universally acceptable technology standards.
Its ability to run in a nondedicated fashion regardless of LAN environment
or fax device clearly distinguishes ShareFax 2.5 from competitors,
according to SofNet, its Atlanta, GA-based developer.
SotNet simultaneously addresses the peer-to-peer and small business LAN
markets with new two- and eight-user versions of ShareFax for $149.00 and
$399.00 respectively. This is ideal for companies that spend less than
$500 for a LAN such as LANtastic or NetWare Lite, but who do not want to
buy a fax system that costs more than their LAN.
Users can load both the Windows and DOS versions of ShareFax 2.5 on the
same LAN so Windows and DOS PCs on that LAN can share the fax server.
ShareFax 2.' runs on any LAN operating system that allows its users to
share a directory.
ShareFax 2.5's unlimited user version enables any LAN-based PC with a fax
device to be the fax server for however many PCs are on the LAN. It runs
in the background so the server can be a non-dedicated PC which executes
other computing tasks. This is more economical than tying up a PC just for
faxing, or buying a stand-alone fax server hardware system.
A new ShareFax 2.5 feature enables it to support all Class I and Class 2
fax modems, which represent 95% of the fax modems on the market. This,
along with its ability to support the Hayes-JT Fax modem,
Intel/CAS-compatible fax boards and most proprietary boards, protects
organizations from the adverse effects of fax technology changes.
ShareFax 2.5 installs automatically, so set up only takes minutes. The DOS
version has new graphical features and a streamlined command structure
which makes it easier to use. Like its Windows' counterpart, the DOS
version enables documents to fax exactly as they appear on the screen,
whereas some PC fax systems transmit text without fonts or other
graphics.
ShareFax 2.5's command structure is designed so both DOS and Windows users
can fax from their PCs as easily as they print a software document.
ShareFax 2.5 automatically executes the complex software procedures
necessary to communicate with network fax devices.
Another key new feature enables ShareFax 2.5 users to view, route and print
incoming faxes. ShareFax 2.5 also includes a status log to monitor
out-going and in-coming faxes, multiple phone books for storing fax
numbers and quick dialing, transmission scheduling to send faxes at
optimum times and the ability to fax multiple files to multiple
destinations.
ShareFax 2.5 for DOS runs on any 8088 through 80486 IBM PC or 100%
compatible with DOS 3.0 or higher. It requires 128K RAM to run in the
foreground, and 18K as a TSR, but users should have 640K total RAM to
allow for their fax board or modem software's memory requirements. The
ShareFax 2.5 Windows version requires Windows 3.0.
The suggested retail price of unlimited-user version for Windows is
$995.00, and $795 for DOS-only. Users of the limited versions can call
SofNet with their credit card and special ID number to receive a code
which they use to upgrade to additional workstations ($30.00 each for DOS,
$35.00 each for Windows), or to ShareFax's unlimited-user version.
General Overview - ShareFax 2.5
ShareFax 2.5 enables any DOS or Windows PC on a LAN to be a non-dedicated
fax server for the other PCs on the network. ShareFax supports an
unlimited number of users and operates with any LAN operating system which
allows all of the network users to share the same file server directory.
The new 2.5 version is compatible with Class land Class 2 modems, as well
as Intel/CAS, Hayes JT and other proprietary fax devices, which
collectively represent over 95% of the PC fax devices currently on the
market..
Besides giving organizations the flexibility to do network faxing from any
LAN environment and with virtually any network fax system, developer
SofNet streamlined ShareFax's operation to make it easier to use. They
also designed 2-user and 8-user limited versions to better meet the needs
of small peer-to-peer LAN users. Organizations can buy either a DOS-only
version, or a DOS/Windows combination if they have DOS and Windows PCs on
the same LAN.
ShareFax 2.5 consists of two components.
The workstation module (MultiFax and XFax for DOS, FaxIt for Windows) picks
up the document(s) to be faxed, automatically converts them to the file
format required by fax devices, then stores them in the shared directory.
Both MultiFax and FaxIt use graphical interfaces, they enable users to
create an unlimited number of "phone books" for storing names and fax
numbers, and they send faxes to multiple destinations. MultiFax also can
fax multiple files. XFax is a utility that uses DOS line commands to do
the same thing as MultiFax. Many experienced DOS users prefer line
commands to graphical interfaces.
The fax server module runs from the LAN PC on which the faxboard or fax
modem and its software is installed. This portion of ShareFax searches the
shared directory every 2 - 5 seconds for faxes, picks up outbound faxes
and uses one of its three fax drivers designed respectively to communicate
with Intel/CAS, Hayes JT or Class 1 and Class 2 fax devices. The server
portion also picks up incoming faxes and sends them to a LAN administrator
directory located on the server.
ShareFax 2.5 - easy installation and set up
Network administrators must be sure all of the LAN PCs, including the one
designated as the fax server, can refer to the shared directory with the
same drive reference and path (e.g. F:\FAXOUT). The LAN PCs must also be
able to create, delete, read from and write to files on this shared
directory. The shared directory will typically be found on the file server
of serverbased LANs. On peer-to-peer LANs, the shared directory can be on
any of the attached PCs.
A simple "INSTALL" command installs ShareFax's fax server portion on the PC
fax server's hard drive. LAN administrators place MultiFax and XFax on the
shared directory, then create the directories and batch files needed to
run MultiFax as a TSR (Terminate but Stay Resident) or a DOS line
command-driven program. XFax is set up the same way. FaxIt can only be
loaded from ShareFax's Windows disk directly onto each Windows PCs' hard
drives.
Faxing as easy as printing documents
MultiFax gives users several graphical formats, including push buttons,
check boxes and radio buttons, to guide them through the process of
sending faxes, checking the fax log for the status of in- and outbound
faxes, creating and using phone books and using the print capture feature.
FaxIt uses the standard Windows graphical features.
Users access MultiFax from the shared directory through their PCs. The
easiest fax procedure is to set MultiFax to run as a TSR, and turn on its
Print Capture feature. When users are ready to fax, they set the software
application they are running to print to an HP LaserJet printer on LPT3
(the printer port option that people rarely use). The "Print" command
automatically sends the document to MultiFax in HP's .PCL format. When the
document finishes printing, MultiFax pops up to ask users if they want to
print more files. Users can send as many documents to MultiFax as they
want in this manner.
When users finish printing whatever is to be faxed, MultiFax walks them
through the process of creating cover sheets, determining destinations and
the date and time when faxes should be sent. Hitting the "Send Fax"
command tells MultiFax to take over the faxing process and users can go on
with other work. MultiFax then automatically converts the documents from
.PCL to .PCX format (the format required by all fax devices to be able to
send files) and sends them to the shared directory, where the ShareFax
server module picks the files up and sends them out as soon as possible or
at user-designated times.
Another procedure users can employ is to turn off Print Capture, but still
run MultiFax as a TSR. When they are ready to fax, users pop up MultiFax,
turn on Print Capture, exit MultiFax, set their document to print to an HP
Laser printer on LPTl(which is where most documents are already set to
print) and hit the "Print" command. The rest of the fax procedure is the
same as with the first option. LAN administrators can determine which
option they want based on the particular needs and skills of their users.
A third faxing option is to convert files to ASCII or .PCX format (if the
particular application software can do so) and store these files where
users can pick them up with MultiFax at a later time. This is valuable
because users can create documents they send regularly, such as sales
literature, and fax them quickly without having to exit documents to keep
re-entering the commonly faxed documents. However, converting documents to
ASCII format strips them of their graphics and font settings.
XFax does all of the MultiFax faxing operations through line commands at
the DOS prompt. The ability to specify each ShareFax parameters gives
users greater flexibility in how they use the program. Experienced users
can set up batch files and software shells to use ShareFax in manner most
comfortable to their individual tastes. SofNet provides several prewritten
batch files to further facilitate XFax's use.
FaxIt, the ShareFax Windows module is even simpler to use than MultiFax.
During installation, users use a command to designate a FaxIt on ShareFax
option be part of Windows' printer setup dialog. When users want to fax a
document, they select the Printer Setup command from any Windows
application, click on FaxIt ShareFax, then print the document as they
normally would.
FaxIt then works the same as MultiFax, walking users through the various
fax set up options, automatically converting the files to the proper
format with graphics and fonts intact, and sending them to the shared
directory (which is the same directory DOS users access). However, FaxIt
cannot not send multiple files at one time, or send ASCII and .PCX files.
ShareFax DOS users can create and store any number of custom fax cover
pages, and both DOS and Windows users can store logos in files that can be
merged with the cover pages as faxes are sent.
Incoming faxes are received at the fax server in the Administration
Directory (created during installation). Anyone who is given
"Administrator" rights can review these faxes with MultiFax, XFax or
FaxIt, and route them to the appropriate people. After individual users
receive faxes at their PCs, they have the option to view them, re-route
faxes to any or all other users, or print the faxes to designated printers
on the LAN. Users can also store faxes on their hard drives.
SofNet
380 Interstate North Parkway, Suite 150, Atlanta, GA 30339
404-984-8088
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,72 @@
OREM, Utah--February 21, 1992 SoftSolutions Technology Corporation (STC)
announced today the latest release of their document management software
-- SoftSolutions for DOS, version 3.0. SoftSolutions 3.0 has been enhanced
to provide an all-encompassing approach to document management. Version
3.0 undertakes the management of all enterprisewide documents, regardless
of their source of creation.
SoftSolutions organizes documents originating from multiple sources (i.e.,
PC LANs, UNIX systems, documents stored on Laptops or Notebooks, hardcopy
documents, and documents created from the use of SoftSolution's Portable
Mode when the network is down), and creates a comprehensive depository of
accessible information.
Version 3.0 makes information readily available by providing a balance of
features that meet both the needs of end users and system administrators.
The following enhancements benefit both end users and administrators:
Portable Mode operations, equipped with fully-functioning Profiles and
searching features; completely customizable profile screens; activity
logs; personal worklists; simple management of compound documents;
extensive integration and "launch" facilities for other network
applications; improved document security; and, customizable menu options,
error messages, and help screens.
Alvin Tedjamulia, Vice President of STC, explains that "SoftSolutions is
the only company currently offering Portable Mode operations, which solves
significant problems encountered by organizations managing documents
created by busy users." SoftSolutions can easily coordinate the fragmented
flow of information generated by executives who may have created documents
on their home PC, on a laptop while traveling, or in another office. A
dataset, for example, in one office may welcome "guest documents" from a
dataset of another office. SoftSolutions 3.0 manages the entire process,
including status tracking, mass checkin/check-out, and moving documents
and Profiles. Welcoming guest documents or inviting them back to their
home dataset is efficiently coordinated in SoftSolutions 3.0 with a single
request.
SoftSolutions 3.0 beta users agree that some of the most impressive aspects
of version 3.0 is the comprehensive offering of features and the product
configurability/flexibility. "Users have given valuable input on the
enhancements of SoftSolutions 3.0 and the resulting cooperative effort
with current users has paid off in the most impressive product we have yet
delivered....SoftSolutions 3.0," said Kenneth W. Duncan, President of
STC.
SoftSolutions 3.0 fully supports SoftSolutions Image Manager and
SoftSolutions Intelligent Search. SoftSolutions for Windows will have the
same functionality as the DOS version and will be available second quarter
of 1992.
Memory requirements for SoftSolutions 3.0 are 640 Kb on the PC. A Server
Enhancement Module (SEM) providing true client/server computing, exists
for NetWare 3.1x, IBM AIX, Digital Ultrix, Data General UX, SUN/OS, SCO
UNIX, and Interactive UNIX.
SoftSolutions 3.0 will ship the end of February. SoftSolutions 3.0 sells
for $495.00 per File Server, $295.00 per additional station, and $1,995.00
for the Server Enhancement Module.
SoftSolutions Technology Corp
ParkView Plaza, 625 South State St, Orem, UT 84058
801-226-6000
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,148 @@
U.S. ROBOTICS SPORTSTER 14400 - AN UNINTENDED BARGAIN
-----------------------------------------------------
Modem manufacturer U.S. Robotics has long offered two classes of modems, the
Courier and the Sportster lines. Courier is the top of the line modem and
within the BBS community is considered one of the top models available.
Sportster modems were typically the ugly little brother - at a much more
economical price.
The company recently released some new Sportster models that have an allure.
The Sportster 14000 and Sportster 14000 with Fax offer CCITT V.32bis
connections at 14,400 bps, V.42 and V.42bis error correction and compression,
Microcom Networking Protocol (MNP) level 5 compatibility, and in the case of
the fax model - 9600 bps fax. The modems are listed at $519 and $549
respectively - actually not terribly competitive in the economy class for
modems with this functionality. But Sportsters are almost designed to be
discounted and these are available on the street at around $290 which is
quite competitive.
The main difference between the Sportster models and the Courier models in
this case is the case. The Courier features a very nice black plastic case
suitable for framing. The Sportster looks like nothing so much as a Radio
Shack home intercomm. You are almost drawn to press a switch, lean over to
speak into it, and ask mom for some juice with this thing.
But under the hood lies more modem than even U.S. Robotics apparently
intended. The modem motherboard within is not similar to the $1295 Courier
Dual Standard, it actually IS the Courier Dual Standard motherboard. The
Courier Dual Standard of course, in addition to the 14.4kbps V.32bis mode,
features a 16.8kbps proprietary HST (High Speed Technology) mode, a really
nice case, an ASL mode, and a list price of $1295. We obtained data transfer
rates as high as 1885 cps with this top of the line model and reviewed it
very favorably in our October issue.
The reasons for this are fairly understandable. It is actually cheaper to
manufacture lots of a single motherboard than two different motherboards. And
by repackaging it in a downscale case and disabling a few features, you can
reach an entirely different market segment without a lot of retooling.
The difference in features is a function of the operating software held in
Read-Only-Memory (ROM) chips on the modem motherboard. But on a large number
of early shipments of the Sportster, the code is still in the ROMs, and can
be reactivated with simple AT commands to give the lightweight Sportster the
16.8Kbps mode that is the most notable function of the Courier power house.
It does not appear to add the ASL function.
To see if your model supports this, enter the command ATI7 to display the ROM
version. At the bottom of the display, you should see an entry for SUPERVISOR
VER 4.1 or SUPERVISOR VER 4.2. It will also list an OPTIONS V32 entry. If
your ROM indicates SUPERVISOR VER 4.1, you win the USR Sweepstakes. Enter the
command AT GW 03C6,22 GW 05CD,2F and again enter ATI7. The options entry
should now read OPTIONS HST,V32. This means you can now use the 16.8kbps HST
mode. The ATB1 command will turn it on. And if you dial a BBS with a Courier
Dual Standard, you will get a 16800/ARQ connect.
Currently shipping models of the Sportster have a version 4.2 ROM and the
command doesn't work. Merry Christmas from U.S. Robotics. Rumor has it there
are some very unhappy campers within USR over this marketing faux pas. We
don't get it. So some USR customers got a good deal - that's got to be
terrible PR right?
Apparently USR is determined to turn it into a negative one way or another.
The company has issued a fairly artless written IMPORTANT WARNING TO BULLETIN
BOARD USERS quoting chapter and verse of U.S. copyright law. We produce the
full text of this warning here:
"IMPORTANT WARNING TO BULLETIN BOARD USERS:
It has recently come to our attention that some bulletin board operators and
other third parties have been improperly distributing copyrighted firmware
that will add USR's proprietary "HST" protocol to USR "Sportster" modems
without having to compensate USR for the conversion. Some of these persons
have further been telling customers that if such a conversion is made, it
will not adversely affect the customer's right to warranty service from USR.
USR has not authorized the dissemination of this firmware. The Company
considers any such attempts to improperly incorporate copyrighted "HST"
features into non-HST modems to be a clear infringement of USR's rights under
Federal Copyright Law. Persons contemplating such action should be aware that
the Copyright Act of 1976 provides stiff remedies for acts of copyright
infringement, including the impounding of all infringing copies, monetary
damages, special statutory damages, costs, attorney fees, and even potential
criminal liability. 17 U.S.C. Secs. 502-506. USR will take whatever steps it
deems necessary to protect its copyright rights. In addition, USR's warranty
will not extend to products that have been tampered with in this manner.
Also, please note that it has also come to our attention that versions of the
firmware being disseminated contain disguised code ("Trojan Horse") that may
inflict irreparable damage to the hard drive of the computer utilizing the
programs.
We regret the necessity of having to post this warning. Please understand
that USR has spent considerable time, effort and money to research and
develop the software embodied in its products. Like any manufacturer, we
cannot simply sit back and tolerate attempts to misappropriate our
copyrighted programs in this manner. U.S. Robotics, Inc."
We haven't been able to locate anything remotely resembling USR firmware
online. If it did exist, it would be a copy of the ROM code in the Dual
Standard ROM and could not conceivably even be run on an 80x86
microprocessor, much less operate as a Trojan Horse. It would be data that
garage-shop pirates would use to create unauthorized copies of the ROM using
an Electrically Programmable Read Only Memory (EPROM) programming device.
This would be put in the Sportster to convert it to a Courier Dual Standard.
This would certainly be copyright violation, and we cannot condone it in any
form. But it disqualifies itself as a candidate for a Trojan Horse program
quite thoroughly.
The only file we can find online even remotely relating to this warning is a
tiny 24KB program titled USRPATCH.ZIP. It appears to come from Johan Franzn
of Twilight Garden BBS at 46-8-510-50925 (FidoNet 2:201/258). The program is
apparently authored by "Jeffe and Alex" who credit Henrik Johansson with the
discovery. It appears to simply send the AT command previously described to
the modem from the DOS command line. In this way, you can run the program,
and then your terminal program, and not have to enter the AT command at all
each time you use the modem.
We are thoroughly confused by U.S. Robotics' warning. And any attempt to talk
to anyone within the company leads to a lot of finger pointing and referral
to other telephone numbers in an essentially endless fashion. First, the
program does nothing more than send the AT commands to the modem and U.S.
Robotics "copyright" to AT commands of any sort is openly questionable.
Secondly, there is nothing we can find wrong with this file, and the question
of a Trojan Horse program appears to be blatantly transparent fear mongering
of the worst sort. In fact, the concept of a software program causing
"irreparable damage to a hard drive mechanism is ludicrous. The most virulent
viruses and most damaging Trojan Horse programs can only damage data on hard
disk drives - not the hard disk drives themselves. This is officially and
totally utter nonsense. It was undoubtedly drafted by a lawyer to the ongoing
chagrin and mortified embarrassment of every technical person within this
fine company.
We understand their distress. And we'll shed no tears for anyone running
garage shop EPROM mills that might be prosecuted. But technically ridiculous
warning messages do nothing but call into question the credibility of USR
itself. Trying to "scare" users into NOT entering simple commands to make the
modem they bought and paid for more capable doesn't even make sense from a
marketing standpoint. And lost in the confusion is the fact that their "Radio
Shack Intercomm" model is actually a dynamite little modem on its own merits,
at a reasonable price. That a few of the early buyers of this modem got a
good deal, can only work to U.S. Robotics benefit - if they don't work too
hard to turn it into a negative.
There were rumors of plans within the company to introduce a BBS operator
discount price on this Sportster model of as little as $279 - which would
have been quite exciting. The current imbroglio has probably delayed this
move if indeed those were the plans. U.S. Robotics, Inc. 8100 North McCormick
Blvd., Skokie, IL 60076; (708)982-5010 voice; (708)982-5092 BBS.

View File

@@ -0,0 +1,125 @@
[10] From: dgsi!ee.rochester.edu!jerry at Internet-Gateway 2/21/92 5:36PM (6006
bytes: 119 ln)
To: VRV at cimage_aa_lan
Subject: No Subject Given
------------------------------- Message Contents -------------------------------
[FILENAME: SPRASOP.TXT]
SUPRA'S NEW 9600 MODEMS!!!
Supra will be releasing 2 new 9600 modems - the 9600 Supra FaxModem
v.32 and the 14400 Supra FaxModem v.32bis at a retail price of $299.95
and $399.95 respectively. The v.32bis will be available in late January
1992 and the v.32 will be available in February 1992. Supra will offer
these two modems at a special price for Sysops.
Both modems support 300-2400bps (Bell 103/212A, V.21 / 22A&B / 22bis
/ 23), v.32 (9600bps), MNP 2-5/10, V42bis, 9600 send/receive fax
(v.27ter/29), class 1/2 (fax software-fax modem communication standard),
caller ID and voice. (Voice and caller ID can be enabled through low-
cost, user-installable firmware upgrades available mid-1992.) The
v.32bis model adds v.32bis (14400bps) and v.17 (14400 fax). This is all
packaged in Supra's famous small case (1" high x 4.5" wide x 6.5" long).
The modems will have 4 lights (RD/SD/OH/TR) and a LED display. The
display will show the connection rate, compression protocol, error
correction protocol, etc. in a rotating fashion.
>>>HOW CAN SUPRA SELL A 9600 MODEM FOR 1/2-1/3 THE PRICE OF
CURRENT MODEMS?
This year the price of v.32/v.32bis technology will tumble to new
lows. Supra is continuing its proud tradition of being a leader in
using new chipsets to lead the modem industry to a new price point.
>>>IF SUPRA IS USING A NEW CHIPSET, HOW CAN I BE SURE THAT THE
NEW MODEMS WILL NOT HAVE SOME PROBLEMS WHEN THEY ARE RELEASED?
Supra is using a new Rockwell chipset which condenses several of
their older chips into 1 chip. Rockwell is the leader in building modem
chipsets. A majority of current 9600 modems are based upon the older
Rockwell v.32 technology. We do not foresee any problems, but if a
problem does occur, Supra is committed to solving it as quickly as
possible. Supra also offers a 30 day Money Back Guarantee for products
that are purchased directly from Supra.
>>>MY LOCAL USERS USE USR HST MODEMS. WILL I BE ABLE TO
COMMUNICATE AT 9600 BAUD WITH THEM?
The maximum baud rate you will connect at with a HST modem is 2400.
Depending on the age of the HST modem, you may also get a v42bis data
compression connection. If the user uses the USR Dual Standard modem,
and it is setup correctly, you will connect at a baud rate of 9600 (or
14400 if using v.32bis). We expect that most owners of the HST modems
will be upgrading to v.32 modems.
>>>I HAVE NEVER HEARD OF SUPRA. HOW RELIABLE ARE THEIR MODEMS?
Supra Corporation has been providing personal computer users with
high-quality, low-cost peripherals since 1985. In addition to
manufacturing a very successful line of modems, Supra makes a variety of
peripherals for Mac, IBM, and Amiga computers. Supra has excelled
because of its unique combination of quality products, competitive
prices, and excellent customer support.
Supra has a complete line of modems from a standard 2400 modem to a
2400 v.42bis, a 2400 FaxModem, a 9600 FaxModem and a 14400 FaxModem. We
have internal versions of most of these modems for the IBM and Amiga.
As with most of our products, every modem that we manufacture is tested
and burned in on our test machines.
To obtain one of the new modems under this Sysop offer, please
complete the following information and send it to:
Supra Corporation
7101 SW Supra Dr.
Albany, OR 97321
ATTN: Sysop Order
or FAX the information to 503-967-2401.
If you have any questions, please contact either Supra's Sales
Department or the Technical Support Department at:
503-967-2400 (main 8-5pst)
503-967-2401 (Fax)
503-967-2410 (Sales 7-5pst)
800-727-8772 (Sales 7-5pst)
503-967-2440 (Tech Support 9-4pst)
503-967-2444 (BBS, 2 line v32bis)
CompuServe 76004,565
GEnie SupraTech
Bix SupraCorp
American Online SupraCorp2
========================================================================
SYSOP INFORMATION
BBS Name:________________________ BBS Software:________________
BBS Phone:_______________________ Type of System:______________
No. of Phone Lines:______________ Type of Modem used:__________
No. Calls per Month:_____________ No. of Modems:_______________
How long in operation:___________
ORDER INFORMATION
Date______________
BILL TO:_________________________________________________________
Address__________________________________________________________
City______________ State_____ Zip________ Phone____________
Contact Name:____________________________________________________
Circle one of the following: VISA MASTERCARD COD
Card Numbers__________________________ Expiration Date_________
SHIP TO:_________________________________________________________
Address__________________________________________________________
City______________ State_____ Zip________ Phone____________
Referred by:_____________________________________________________
PRODUCT
Model: Price: Quantity:
SupraFAXModem V.32 $199.95 (modem only) _____
SupraFAXModem V.32bis $249.95 (modem only) _____
SHIPPING
Route: Price: Quantity:
___ Ground $ 5.00/pc _____
___ Blue Label $ 8.00/pc _____
___ Express $12.00/pc _____
COMMENTS:_______________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________


View File

@@ -0,0 +1,227 @@
[11] From: dgsi!ee.rochester.edu!jerry at Internet-Gateway 2/21/92 5:36PM (11258
bytes: 221 ln)
To: VRV at cimage_aa_lan
Subject: No Subject Given
------------------------------- Message Contents -------------------------------
[FILENAME: SUPRA96.TXT]
Supra Breaks Price Barrier With Powerful SupraFAXModems 14,400 bps Fax
and Data (V.32bis) Modem for only $399
ALBANY, OR, January 1992 A wide range of features fax, data, voice,
caller ID, unique status display, small case, and very attractive price
all combine to make the new SupraFAXModem family of modems from Supra
Corporation an intriguing new opportunity for computer users. The
SupraFAXModem V.32bis features 14,400 bps fax and data for $399.95
retail, and the SupraFAXModem V.32 features 9600 bps fax and data for
$299.95 retail.
On the fax side, both modems feature Class 1 and 2 commands,
compatibility with Group 3 fax machines, and the ability to send and
receive faxes directly from the computer. On the data side, both modems
support communication at speeds ranging from 300 bps to 14,400 bps (9600
bps for the SupraFAXModem V.32), plus they also support CCITT V.42bis,
MNP 2-5, and MNP 10 data compression and error correction protocols.
When using V.42bis (4:1 compression), the SupraFAXModem V.32bis provides
up to 57,600 bps throughput, and the SupraFAXModem V.32, up to 38,400
bps throughput.
Both modems also feature a revolutionary status display, which allows
for an unlimited number of status messages. In a display that looks
similar to a digital clock, the modems presently give the user up to 25
different messages, conveying things like connection rate and type (FX),
dialing (DI), ringing (RI), and transmission error (TE). This display is
a great advantage compared with most other modems, whose finite number
of indicator lights limit how much information they can convey to the
user.
All of these features are packed into a case about the size of two decks
of playing cards placed side by side (1" x 4.5" x 6.5") a case that is
half the size of many other V.32 and V.32bis modems.
All that's needed to use an external SupraModem is a computer
(or terminal) with an RS-232C interface, communications software, and a
cable to connect the modem to the computer. Everything else is
included: the modem, operatorUs manual, quick-reference card, power
adapter, and telephone cable.
Voice & Caller ID
SupraFAXModems also support two important features voice and caller ID
that can be enabled through low-cost, user-installable firmware upgrades
available mid-1992. The voice feature allows the modems to send and
receive digitized voice and implement several voice functions. The
modems can compress and uncompress voice data for efficient storage,
generate and recognize touch tones, and sample at various frequencies,
depending on the quality level desired. This feature will be useful for
interactive applications such as voice mail, answering machines, and
digital announcers. Caller ID (where available) allows the number from
which an incoming call was dialed to be displayed on the user's screen
before the call is answered. This will be useful for secure
communications, automatic identification of incoming calls, and
interactive voice applications.
Innovation & Chip Sets Combine For Killer Pricing At $299.95 and $399.95
retail, respectively, the SupraFAXModem V.32 and SupraFAXModem V.32bis
are about 1/2 to 1/3 the price of similar modems. Supra is able to
offer these prices because of innovative designs and state-of-the-art
chip sets from Rockwell International.
"We are very excited about the power we're putting into our customers'
hands, and the outstanding quality we are able to deliver at these very
affordable prices," said John Wiley, President of Supra Corporation.
In addition to the stand-alone modems, packages that include cables and
software will be available for IBM PC and Macintosh computers. IBM PC
internal models will also be available.
About Supra Corporation
Supra Corporation, based in Albany, Oregon, has been providing personal
computer users with high-quality, low-cost peripherals since 1985. The
SupraFAXModems (including the previously announced 9600 bps fax/2400 bps
data SupraFAXModem Plus) are the latest additions to the popular
SupraModem family. Since the original SupraModem 2400 was introduced in
1987, SupraModems have been popular among consumers looking for
excellent value in a reliable modem, and have been recommended by a
variety of sources, from respected PC Magazine and MacUser columnist
John C. Dvorak to the Berkeley Macintosh User's Group (BMUG). In
addition to manufacturing a complete line of fax and data modems, Supra
makes a variety of peripherals for Commodore Amiga computers.
Supra Corporation
7101 SW Supra Drv
Albany, OR 97321
503-967-2400 (main 8-5pst)
503-967-2401 (Fax)
503-967-2410 (Sales 7-5pst)
800-727-8772 (Sales 7-5pst)
503-967-2440 (Tech Support 9-4pst)
503-967-2444 (BBS, 2 line v32bis)
CompuServe 76004,565
GEnie SupraTech Bix
SupraCorp American Online SupraCorp2
SupraFAXModem Packages for Macintosh and IBM PC Compatibles Provide
Everything User Needs
ALBANY,
OR, January 1992 Supra's two newest modems the SupraFAXModem V.32bis and
the SupraFAXModem V.32 are available as stand-alone units that work with
any computer with an RS-232C port, and as packages that include software
and cables for Macintosh and IBM PC compatible computers. The packages
provide everything the user needs to get started using the modem
immediately. The Macintosh packages are compatible with System 7 and
include FAXstf fax software, award-winning MicroPhone 1.5
telecommunications software, a CompuServe Information Manager starter
kit and software, and online service offers. Also included in the
Macintosh packages are a modem cable, phone cable, and manuals. IBM
packages are available with internal and external SupraFAXModems for DOS
and Windows. Windows packages include Winfax software, online service
offers, and all required cables and manuals. (Windows comes with its own
telecom software.) DOS packages include FaxTalk Plus software, Mirror
telecommunications software, online service offers, and all required
cables and manuals.
SupraFAXModem Retail Prices
SupraFAXModem V.32bis Stand-Alone $399.95
SupraFAXModem V.32 Stand-Alone $299.95
SupraFAXModem V.32bis Macintosh $479.95
SupraFAXModem V.32 Macintosh $379.95
SupraFAXModem V.32bis IBM PC external $449.95
SupraFAXModem V.32bis IBM PC internal $389.95
SupraFAXModem V.32 IBM PC external $349.95
SupraFAXModem V.32 IBM PC internal $289.95
DOS or Windows package
Various upgrade offers will let owners of earlier SupraModems upgrade to
fax capabilities. Supra also has a sysop program for the stand-alone
versions. The Supra Sales Department can provide customers with more
information at 1-800-727-8772 or 503-967-2410.
SupraFAXModem Features
Feature SupraFAXModem V.32bis SupraFAXModem V.32
Retail Price (Stand-Alone) $399.95 $299.95
Maximum Fax Rate 14,400 bps 9600 bps
Class 1 and 2 commands X X
Group 3 compatible X X
Send and receive fax X X
CCITT V.27 ter X X
CCITT V.29 X X
CCITT V.17 X X
Maximum Data Rate
(without data compression) 14,400 bps 9600 bps
Bell 103/212A X X
CCITT V.21/V.22/ V.22bis X X
CCITT V.23 X X
CCITT V.32 X X
CCITT V.32bis X
Error correction X X
MNP 2P4, MNP 10 X X
CCITT V.42 X X
Data compression X X
MNP 5 (2:1) X X
CCITT V.42bis (4:1) X X
Max. throughput, MNP 5 28,800 bps 19,200 bps
Max. throughput, V.42bis 57,600 bps 38,400 bps
Digital status display X X
Connection status (digital) 3, 6, 12, 24, 48, 72, 3, 6, 12, 24, 48,
96, 120, 144, FX 96, FX
Error correction status (digital) LP (V.42bis LAPM), same as V.32bis
M2 (MNP 2), M3 (MNP 3),
M4 (MNP 4), M5 (MNP 5),
M10 (MNP 10)
Data compression status (digital) DC same as V.32bis
Action status (digital) DI, RI, AA, CD, TE, TM same as V.32bis
Single LED status display OH, RD, SD, TR same as V.32bis
Case size 1" x 4.5" x 6.5" 1" x 4.5" x 6.5"
Upgradable to Voice X X
Upgradable to Caller ID X X
5 year limited warranty X X
Made in the U.S.A. X X
RATS command compatible X X
Asynchronous operation X X
Synchronous operation X X
Compatible with popular
telecommunications software X X
Automatic adjustment to
optimal protocol and rate X X
Autoanswer/autodial
(tone or pulse) X X
Two modular phone jacks X X
Adjustable-volume speaker X X
Front panel ON/OFF switch X X
Stand-alone version X X
Macintosh* package1 X X
IBM* PC Windows* package2 X X
IBM PC DOS* package3 X X
1 Macintosh packages are compatible with System 7 and include FAXstf* fax
software, award-winning MicroPhone* 1.5 telecommunications software, CompuServe
Information Manager* starter kit and software, online service offers, modem
cable, phone cable, and manuals.
2 Windows packages include Winfax* software, online service offers, cables, and
manuals. (Windows comes with its own telecom software.)
3 DOS packages include FaxTalk* Plus software, Mirror* telecommunications
software, online service offers, cables, and manuals.
Supra Corporation
7101 SW Supra Drv
Albany, OR 97321
503-967-2400 (main 8-5pst)
503-967-2401 (Fax)
503-967-2410 (Sales 7-5pst)
800-727-8772 (Sales 7-5pst)
503-967-2440 (Tech Support 9-4pst)
503-967-2444 (BBS, 2 line v32bis)
CompuServe 76004,565
GEnie SupraTech
Bix SupraCorp
American Online SupraCorp2


View File

@@ -0,0 +1,105 @@
Toronto, Ontario -- November 14, 1991-- SuperTime Inc. has announced that
they are now shipping version 1.1 of their critically acclaimed groupware
product, SuperTime. The new release contains added functionality in the
product's sales management and telemarketing features, improved text
editing capabilities, increased integration and interactivity between the
various modules, easier installation/setup routines and more extensive
help.
Designed to automate and organize the daily activities of an entire
LAN-connected office, these new enhancements have been added to
SuperTime's existing Appointment Calendar/Scheduler, Contact Directories,
Message Center (including complete E-Mail), Project & Task Management, DOS
Shell/Menu Routines and Data Reference Libraries .
SuperTime 1.1 has strengthened its sales management/telemarketing features
by totally integrating the Activity List of the Contact Directory with
other components of the software including To-Do items, Appointments and a
new Call List that appears under the Calendar Module. The addition of an
Auto-Dialer allows users to quickly and accurately make phone contact with
any one of their clients from anywhere in the program.
With the new text editing capabilities, that are used in all note fields in
SuperTime, users can now instantly generate Quick Letters from within any
contact file. Text can easily be imported and exported between the
internal note fields and WordPerfect, Microsoft Word, WordStar and ASCII
formats. SuperTime's text editor also now allows block cut/copy and paste
and search/replace functions.
The context-sensitive, hypertext Help System in SuperTime version 1.1 has
been greatly expanded, virtually eliminating the need to refer to the
documentation. The new version is also highlighted by its streamlined
installation and setup routines that enable users to have SuperTime 1.1
running on their LAN in minutes. Adding new users and resources is also
faster and simpler using the default settings within version 1.1's
Resource Setup.
According to Gary Babcock, Product Manager for SuperTime "The biggest news
of SuperTime Version 1.1 is the increased integration between the Contact
Management Module and the Calendar Module. This integration is critical
for people who need to manage both their time, and their activities.
Because SuperTime 1.1 is a groupware product, its enhanced features will
help people co-ordinate not just their activities, but also those
activities in relation to everyone else's in the organization."
SuperTime's Appointment Calendar has the ease of use of a written diary,
yet has all the features and functionality to handle even the most complex
appointment booking situations, including multi-resource group
scheduling.
SuperTime's Contact Directory is a comprehensive contact management system
containing General, Private and Other Directories that can be completely
customized to the users' requirements. During data entry, SuperTime
dynamically links individual contacts to their corresponding
business/organization records, and vice versa, enabling users to apply a
variety of methods to instantly locate and retrieve records.
SuperTime's Message Center has proven to be one of its more popular
components. The Message Center provides complete Electronic Mail
capability, an In/Out Board, a Switchboard for centralizing the generation
and retrieval of phone messages, and a personal message retrieval center.
Capable of organizing every facet of a large project, the Project & Task
Management area provides a structured method for creating and tracking the
everyday "To-Do" lists of individual users; allowing delegation,
scheduling, milestone reviews, and expense detailing of tasks for all
users on the system.
The DOS Shell/Menu allows users to run SuperTime as a TSR, and enables
other applications to be selected and run from a menu within SuperTime.
The Data Reference Libraries contain reference information (e.g. unit
conversion tables, area codes, etc.) and a pop up calculator, providing an
easy on-line reference facility.
SuperTime version 1.1 is an MS-DOS based program and will run on any
Network OS that complies with DOS 3.x file locking protocol (including
Navell, Banyan, LAN Manager, Artisoft and Hayes), with a minimum of 512 K
available RAM on the workstation. SuperTime retails for $295 for the
single user/single resource version, $495 for single user/multi-resource,
$695 for 4 users, $995 for 8 users, $1695 for 16 users, $2495 for 25
users, $4795 for 50 users, $6995 for 75 users, $8995 for 100 users, and
$85 for each users greater than 100.
SuperTime Inc. is a software development company, with Head Offices and R&D
facilities located in Toronto, Ontario, Canada. As a founding member of
the Software Publishing Association's Special Interest Group for Workgroup
Computing, SuperTime is committed to bringing high quality,
state-of-the-art, LAN-oriented groupware products to the rapidly expanding
LAN marketplace.
SuperTime Inc
2025 Sheppard Ave E, Suite 2206
Willowdale (Toronto), Ontario CANADA M2J 1V7
416-499-3288
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,207 @@
We want the single most powerful endorsement
a product can have ...........
Y O U R S !
THE BBS SYSOP
We think Bulletin Board System Operators
everywhere will flip over our NEW PM14400FXSA
V.32bis modem!
We think you'll agree that it's the most
impressive new modem of it's kind...a real
breakthrough at a suggested retail price of $549
for the stand-alone.
But...you don't have to pay $549. Or $499...
Or even $399!
If you'll tell you customers that your system
uses our new modems when they log on, we'll sell
you all the modems your system needs for just $250
each for the stand-alone.
Take a good look at the modem's features,
specifications, and its lifetime warranty.
Together with a price especially for Bulletin
Board System Operators it all adds up to a
spectacular value.
The product is superior, the price is
spectacular, and there's never been a better time
to put new state-of-the-art technology to work for
you!
FEATURES & SPECIFICATIONS:
() Compatible with Hayes Ultra 144, Ultra, and
Optima
() Supports Group III send/receive FAX
capabilities.
() Supports V.42 error detection/correction.
() Supports both hardware and software flow
control.
() V.42bis data compression for effective data
throughput up to 57,600bps.
() Supports MNP level 2-5, MNP/4 error
correction, MNP/5 data compression.
() Inactivity disconnect timer.
() Power On self test includes RAM, ROM, NVRAM
() Stand Alone has a 12-character back lit LED
display.
() RS-232C interface.
() Dialing Methods: User selectable Tone or
Pulse dialing, Secondary dial tone detection
and quiet answer. Full call progress
monitoring via programmable speaker and
negotiation progress messages.
() Nonvolatile memory stores 4 telephone numbers
(up to 36 digits each).
() Interface: RS-232 and RJ11
() Dimensions: 3"x5"x10".
Here's how to use the very Practical PM14400FXSA
V.32bis Product Purchase Plan.
1: To qualify for this special offer you
must currently be operating a bulletin
board system.
2: You must use the order form attached,
and warrant that the modems you buy are
for your own use in operating your
bulletin board system, and are not for
resale.
3: The number of modems you may purchase
is limited to the number of working data
lines connected to your bulletin board
system. Data line numbers must be shown
on the order form. PLEASE INCLUDE A COPY
OF YOUR CURRENT PHONE BILL. If these
numbers change, you will notify Practical
Peripherals promptly.
4: You agree to post an appropriate
visible notice at the start of log-on to
the bulletin board system that the system
uses the: "...NEW PRACTICAL PERIPHERALS
PM14400FXSA V.32BIS MODEM."
5: Payment must accompany the order form.
Major credit cards, money orders, and
personal checks will be accepted. (If
you pay for your order with a personal
check, your Practical Peripherals
product will be shipped when your
check has cleared).
The special Offer is good until Dec. 31 1992.
So double check all the specs and order now.
Please allow 3-4 weeks for Delivery.
Open a log file to log the order form:
Return this form with your payment to:
Practical Peripherals, Dept. Sysop,
31245 La Baya Drive,
Westlake Village, CA 91362
Phone: (818)706-0333
Fax: (818)706-2474
1. Here's my order for ________ PM14400FXSA
V.32bis modems at the special price of $250.00
each.
Total payment of $______________ is enclosed.
(Include 7.50 per unit for S/H. CA
residents add 8.25% Sales Tax.)
2. Form of Payment:
() Company Check () Cashier's Check
() Personal Check () MasterCard
() Money Order () VISA
Credit Card #: __________________________________
Exp. Date: ______________________________________
Authorized Signature: ___________________________
3. Name of BBS: ________________________________
Hours of Operation: _________________________
Types of BBS Software Used: _________________
Special subjects covered by your bbs: _______
______________________________________________
______________________________________________
Type and baud rate of modem(s) currently being
used: _______________________________________
______________________________________________
______________________________________________
4. Please give us an account number, name, and
password to log-on to your system: __________
______________________________________________
______________________________________________
5. BBS/Data Telephone Numbers...1 for each modem
ordered (Use a separate sheet for additional
numbers):
( )_______________ ( )______________
( )_______________ ( )______________
( )_______________ ( )______________
6. Ship Modems to:
Address: __________________________________
City: _____________________________________
State: _________ ZipCode: ________________
7. Your signature indicates that you will abide
by the terms of the special offer outlined in
this brochure. Please be sure that all
information on this form is accurate. Your
order cannot be processed if this form is
incomplete or inaccurate.
Your Signature: __________________________________________________

View File

@@ -0,0 +1,337 @@
SYSOP PROGRAM BROCHURE
Instructions:
Read the Ven-Tel SYSOP Program Rules carefully. Seperate the rules
from the rest of the brochure and keep them in a safe place. Fill out
and return the rest of the form to Ven-Tel.
This section describes the rules of the Ven-Tel SYSOP program.
Ven-Tel reserves the right to modify or change these rules at any
time.
Scope:
The Ven-Tel SYSOP Program permits qualified SYSOPs to purchase
current Ven- Tel modem products at a reduced price.
Qualifications:
1. The SYSOP has been operating a bulletin board system for at least
6 months.
2. The SYSOP understands that the number of modems that may be
obtained under this program is limited to the number of working,
verifiable data lines. Modems purchased under this program must be
used on one of the stated lines.
3. The SYSOP agrees to post an appropriate logon notice, visible to
users of the bulletin board, which states that this bulletin board
uses and supports Ven-Tel modems.
4. The SYSOP agrees that he/she intends to operate the bulletin
board, for which these modems are purchased, for at least 6 months
post purchase.
5. Resellers of Ven-Tel modems are NOT eligible to purchase modems
under this program. Instead, qualified resellers may take advantage of
other marketing programs offered by Ven-Tel. Information is available
by calling the Sales and Marketing Department at: 800-538-5121.
6. Ven-Tel will ship modem(s) to qualified SYSOPs as soon as possible
after:
a. The SYSOP completes the order form and questionnaire found
immediately after these rules and mails it along with the appropriate
payment and shipping instructions to: Ven-Tel Inc. 2121 Zanker Road
San Jose, CA 95131 Attention: APPLICATION SUPPORT
* Acceptable forms of payment include check or certified money order,
C.O.D., VISA and MasterCard.
b. The SYSOP further understands that once an order is placed, it
cannot be changed.
* If you are uncertain as to what type of modem you want to purchase
under this program, you may consult the Bulletin Menu of Ven-Tel's
TIPS BBS for product information at (408) 922-0988, or, you may call
Ven-Tel's Application Support Department at 800-538-5121 ext. 230.
c. Your board has been verified by the Ven-Tel SYSOP. We must be
able to connect with your bulletin board to verify board status.
* In the event that we are uncertain of your board status, you will
be notified by the Ven-Tel SYSOP of what else is needed to transact
the order, or if Ven-Tel cannot transact the order due to an invalid
board status.
7. Ven-Tel will not accept phone orders. FAX orders for VISA/MC and
C.O.D. purchases are acceptable. C.O.D. is limited to the continental
U.S. only.
8. Ven-Tel reserves the right to modify, change or cancel this
program at any time.
Ven-Tel Sysop Program Questionnaire
*** PLEASE ANSWER ALL QUESTIONS ***
This section contains questions designed to assist us in
processing your order. You must answer all questions for this form to
be considered a valid order.
1. Day Time Voice Telephone Numbers (include area code)
______________________________________________
______________________________________________
2. Data (BBS) Telephone Numbers (include area code)
______________________________________________
______________________________________________
3. Hours of board operation (pacific standard time, please)
______________________________________________
5. Bulletin Board Name:
______________________________________________
6. How long has your board been in operation?
______________________________________________
7. Please give us the necessary information to log on and access your board:
Please remember, we will not ship your order until we verify your board status.
Your Board Password:
Our log on first name:
Our log on last name:
Our log on password:
Access level:
* Note, we must be able to view all files and user log in order to
validate your board status. Please assign us the appropriate access
level.
8. For whom do you work?
Company Name:
Company Address:
City: St: Zip:________
Work Phone #
Your position (title)
9. Please describe the main thrust of your board. What is your primary
audience, what are the unique features & benefits, etc.?
10. Are you a User Group Member? ____ Yes ____ No
If so, which group(s) (please list)
____________________________________________________________
____________________________________________________________
____________________________________________________________
11. What type of bbs software does your board use?
____________________________________________________________
12. Where did you hear of Ven-Tel's SYSOP offer (be specific)?
____________________________________________________________
____________________________________________________________
Thank you for completing this section of the order form.
Ven-Tel Sysop Program
Price List and Order Form
Effective: August 1, 1991
This section contains price and ordering information. Once
Ven-Tel's APPLICATION SUPPORT DEPARTMENT receives your completed order
and can verify your BBS, your modem will be shipped.
To help us facilitate your order, please be sure to complete this
form clearly and accurately. Missing or incomplete information will
only cause delays in processing your request.
ACCEPTANCE FORM
READ AND SIGN BELOW: I have read, understand and agree to the terms
of the Ven-Tel Sysop Program rules.
Accepted on: ________________19____
SYSOP
(Buyer) ___________________________
(please print your name)
SYSOP
(Buyer) ___________________________
(please sign your name)
The following Ven-Tel modem products are available to qualified
SYSOPs under this program:
Modem Suggested SYSOP Order Extended
Model # List Price Price Quantity Price
9600 Plus II $899 $571
EC96
9600 Plus $699 $439
EC96
PCM9600 $675 $439
Internal PC
PCM-96/NS
2400 Plus II $499 $232
EC2400-33
PCM2400E $399 $185
Internal PC
PCM2400E/NS
24/2E $499 $249
Internal PS/2
MCM-24E/NS
2400 Plus $199 $125
EC2400-32
Half Card 24 $175 $108
Internal PC
PCM-XT24/NS
24/2 $235 $145
Internal PS/2
MCM-24/NS
California customers, please add
8% sales tax $
Please add the appropriate freight
charges (see chart below) $
Order Total $
*** SPECIAL NOTE FOR CANADIAN SYSOPS ***
You are responsible for paying all taxes for customs duties.
Freight charge chart:
Note: Costs listed below are "per modem".
In the U.S.:
* UPS Ground (5 to 7 working day delivery) $12.00
* UPS Blue (2 day working delivery) $17.00
* UPS Red (Next working day delivery service) $24.00
In Canada:
* UPS Ground (5 to 7 working day delivery) $14.00
* UPS Red (2 to 3 working day delivery) $41.00
International Customers:
* All shipments are delivered via DHL International $99.00
Method of payment:
Payments accepted in U.S. Dollars only.
Please check one:
____ COD: Payment must be made as one of the following: Certified
check or money order. Please do not send cash. All checks and money
orders should be endorsed to: Ven-Tel, Inc. COD is available in U.S.
Only.
____ Prepay: Certified checks, cashiers checks or money orders.
Personal checks are accepted, but will be held for 15 days after we
verify your board for bank clearing purposes.
____ MasterCard/Visa:
Card Number:
Exp. Date:
Signature (As it appears on the card):
Shipping Information:
Note: We cannot deliver to a P.O. Box.
Ship modem to:
(your name)
Street Address:
City:
State/Province: ____________ Zip/Postal Code __________
Country: _____________________
*** IS YOUR ORDER COMPLETE? ***
1. Have you:
a. Stored the Program Rules in a safe place for later reference?
b. Filled out the Price List, Order Form and Questionnaire completely?
2. If pre-pay, have you included your TOTAL payment with this order?
(Be sure to include freight costs and applicable taxes.)
3. Mail the entire order form to: (Remember, Ven-Tel does not accept
phone orders!)
Ven-Tel, Inc.
2121 Zanker Road
San Jose, CA 95131
Attention: Application Support

View File

@@ -0,0 +1,147 @@
BOSTON, Mass. (February 11,1992) -- Tallgrass Technologies Corporation
today announced FileSECURE EnterpriZ, storage management software for
backing up DOS and NetWare with expanded networking capabilities.
FileSECURE EnterpriZ was designed to serve the storage management needs of
a distributed network. It offers the ability to backup and restore entire
networks including both fileserver and workstation data. EnterpriZ
includes peer-to-peer capabilities allowing the application to access data
on all local workstations. EnterpriZ is fully network aware, automatically
configuring itself to the network operating system in use. It concurrently
supports multiple network operating systems and multiple tape devices on
the network. EnterpriZ also fully supports backup on Banyan servers
including the STREET TALK database.
Features
FileSECURE EnterpriZ offers Quick File Access, context-sensitive on-line
help, and auto-login security. Data may be restored to any server or
workstation allowing for productivity even after a major server crash.
EnterpriZ supports cascading backups to multiple daisy-chained devices in
one backup operation.
"FileSECURE EnterpriZ ex(ends the functionality of workstation-based backup
by including automatic support for multiple operating systems and multiple
tape devices. This level of support preserves the uses storage investments
and provides a solution that can grow with the requirements of the
network," stated Ernest H. Wassmann, President and CEO of Tallgrass.
Compatibility
Hardware platform compatibility for FileSECURE EnterpriZ includes ISA and
MCA bus computers and supports operation in EISA. EnterpriZ supports the
following network operating systems: NetWare, LANtastic, 10NET, PC LAN,
POWERLan, and a host of other NetBIOS and SMB based LANs. Banyan VINES
support will also be available as an option in the second quarter of
1992.
Pricing
Suggested retail pricing for FileSECURE EnterpriZ is $795 . EnterpriZ with
the Banyan VINES option retails for $1,995. The product is packaged
complete with both 5.25" and 3.5" diskettes.
Tallgrass Technologies is a leading supplier of storage management
solutions. Established in 1981, Tallgrass supports an installed base in
excess of 250,000 units worldwide. Celebrating over a decade in business
as Architects of Storage Management, Tallgrass is represented in
twenty-two countries around the globe.
Tallgrass' series of tape backup systems provide a full range of storage
management solutions enabling Tallgrass to be a single-source provider of
tape backup systems to its distributor partners.
--------------------------------------------------------
LENEXA, Kansas (January 9, 1992) -- Tallgrass Technologies Corporation
today announced shipment of its enhanced version of NetSECURE,
server-based NLM network backup solution.
About the Product
NetSECURE was designed to integrate directly into the NetWare operating
system to provide maximum performance, flexibility, and a high level of
security for the user. Centralized backup allows servers and workstations
to be accessed in both attended and unattended modes. NetSECURE takes full
advantage of the NetWare Loadable Module (NIM) capabilities to maximize
tape speed for both backup and restore. NetSECURE 4.0 supports Tallgrass'
entire line of SCSI-based storage systems, with capacities ranging from
250 MB to 2 GB.
New features of NetSECURE 4.0 include:
<EFBFBD> Auto Pilot - A feature set that includes the following:
<20> tape rotation maintains daily, weekly, monthly and
yearly tapes, producing a complete system backup
history.
<20> disk grooming removes files not accessed during
a specified period of time and generates a specified
number of copies in permanent storage.
<20> Quick Recover Restore allows full or partial recovery
automatically at any specified time.
<EFBFBD> Directory Mirroring - allows configuration to trim the directory of the
destination disk to match the source disk file structure. Files or
subdirectories found in the destination directory which do not appear in
the source directory can be deleted from the destination.
<EFBFBD> Tape Usage Database - tracks the amount of tape usage for each individual
cartridge. A log provides information on when the tape should be replaced
or when the drive should be serviced.
<EFBFBD> Archive Bit Backup - allows backup or archive operations to be performed
based on the status of the file's archive bit.
<EFBFBD> Daisy Chaining - allows for the cascading of backup operations across
multiple drives.
"NetSECURE was designed to complement the Tallgrass line of high capacity,
high speed SCSI storage solutions. It fits in with our goal of
architecting solutions that are specific to the users' needs and wants,"
stated Ernest Wassmann, President and CEO of Tallgrass.
Compatibility
Hardware platform compatibility for NetSECURE 4.0 includes ISA and MCA bus
computers and supports operation in EISA.
Configuration
The NetSECURE application is available as an NLM for NetWare version 3.X
and will be available as a VAP for NetWare version 2.X in January 1992.
NetSECURE is packaged in stratified configurations and is available in NLM
packages in increments of 10-20 users, and 250 users. VAP packages will be
available in increments of 5,10 and unlimited users.
Pricing
Suggested retail pricing for NetSECURE 4.0 ranges from $295 for 5 user VAP
support to $1895 for 250 USER NLM support. NetSECURE is packaged as a
software kit and includes both 3 .5" and 5.25" diskettes.
Upgrades are available to registered users and will be handled direct from
Tallgrass.
Tallgrass Technologies is a leading supplier of storage management
solutions. Established in 1981, Tallgrass supports an installed base in
excess of 250,000 units worldwide. Celebrating a decade in business as
Architects of Storage Solutions, Tallgrass is represented in twenty-two
countries around the globe.
Tallgrass' series of tape backup systems provide a full range of storage
management solutions enabling Tallgrass to be a single-source provider of
tape backup systems to its distributors.
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,225 @@
February 10, 1992 -- Austin, Texas -- Thomas-Conrad has added three Micro
Channel Adapters to its 100Mbps TCNS family. These adapters support
100Mbps transmission over coaxial, shielded twisted-pair (STP), and
fiber-optic cable.
100Mbps TCNS provides affordable workstation connections. At a cost of less
than $1,250 per connection for coaxial or STP media, TCNS Micro Channel is
significantly less expensive than other proposed 100Mbps solutions over
copper- or fiber-based cabling, including FDDI.
According to Robert Barton, TCNS product line manager for Thomas-Conrad
Corporation, Many users in the IBM community with Micro Channel machines
need TCNS to provide the extra bandwidth they don't see with 16Mbps token
ring. For applications such as multimedia or image processing, TCNS Is at
a definite advantage."
TCNS is a token-passing, deterministic technology that is configured in a
distributed-star topology for easy network maintenance. It supports a
maximum of 255 nodes per network. The TCNS technology operates with
standard linkable, ODI and NDIS ARCNET drivers. These drivers allow TCNS
to operate in NetWare, LAN Manager, LAN Server, VINES, and POWER-LAN
environments. In addition, TCNS is compatible at the OSI Network Layer
with FDDI, Ethernet, token ring, and ARCNET LANs.
The TCNS technology is optimized for use in imaging, document processing,
database management, and other environments where large amounts of data
need to move across the LAN quickly. TCNS first shipped one and a half
years ago, and it has rapidly gained market acceptance because the speed
it offers has not been available at an affordable cost previously.
At present, TCNS operates on RG62/U coax, Type 1 STP, and fiber-optic
media, offering a wide range of connection costs and distances. On coax
and STP, TCNS offers an easy upgrade path for users of ARCNET and token
ring networks.
Three TC3046 adapters will be available for IBM Type 1 shielded
twisted-pair, RG62/U coaxial, and fiberoptic media. The TC3046-STP will
list for $995; the TC3046-CX will list for $995; and, the TC3046 ST will
list for $1,395. The adapters will be available in the early second
quarter of 1992. Thomas-Conrad markets its TCNS adapters and hubs through
a worldwide network of distributors.
--------------------------------------------------------
February 11, 1992 -- Thomas-Conrad has announced 8-bit 100Mbps TCNS
adapters in coax and shielded twisted-pair (STP) implementations, which
are significantly less expensive than other proposed 100Mbps solutions
over copper-based cable, including FDDI. The 8-bit adapters allow good
performance in the large population of 8088- and 286-based workstations
presently installed.
According to Jeff Chumbley, director of strategic planning for
Thomas-Conrad Corporation, "Introducing TCNS for 8-bit processors on
copper-based media brings 100Mbps technology into the reach of users for
whom FDDI is too expensive and for whom upgrading to more powerful
workstations is not an alternative. TCNS on copper satisfies distances of
150 meters on shielded twisted-pair and 100 meters on coax. It offers a
feasible upgrade plan for existing token ring or ARCNET users that have
coax or shielded twisted-pair already installed."
TCNS Is a token-passing, deterministic technology that is configured in a
distributed-star topology for easy network maintenance, and supports a
maximum of 255 nodes per network. The TCNS technology operates with
standard ODI or NDIS drivers and accelerated ARCNET drivers, and offers
interoperability at the OSI Network layer with FDDI, Ethernet, token ring,
and ARCNET LANs. Because TCNS uses ARCNET drivers and operates on media
commonly Installed in ARCNET and token ring network, it offers an easy
upgrade path for ARCNET and token ring networks. TCNS can operate in
NetWare, LAN Manager, LAN Server, Banyan VINES, and Performance Technology
s POWERlan environments, thus allowing easy system Interoperability.
The TCNS technology has been shipping for one and a half years and is
marketed worldwide through a network of distributors.
The two 8-bit copper-based adapters, the TC3042-STP TCNS Adapter/AT for
shielded twisted-pair cable and the TC3042-CX TCNS Adapter/AT for coaxial
cable list for $595. The adapters will be available late this quarter.
--------------------------------------------------------
February 11, 1992 -- Thomas-Conrad has added 16/32-bit bus-mastering Micro
Channel 10BASE-T and 10BASE-2 Ethernet adapters to its Ethernet product
family. The TC5046-T 10BASE-T Ethernet Adapter is one of the first 32bit
Micro Channel adapter on the market. The TC5046-2 offers both a 10BASE-2
connection and an AUI connector. Because these adapters use a full 32 bits
for addressing and data you can receive increased performance on your LAN
when you substitute them for other Micro Channel Ethernet adapters
presently available.
Both the TC5046-T and the TC5046-2 adapters use the National Semiconductor
SONIC chipset, which provides support for increased network management and
diagnosis. The adapters have on-board LEDs that indicate collisions,
transmission and receipt of data, and reverse polarity--features that help
the network manager isolate and diagnose network problems. The Micro
Channel adapters are software configurable for easy installation and
comply with the IEEE 802.3 specification for Ethernet.
According to Jeff Chumbley, director of strategic planning for
Thomas-Conrad, "The TC5046 adapters offer superior performance with their
bus-mastering design and full 32-bit driver support for both servers and
workstations. These adapters are ideal for high-performance 32-bit file
servers and workstations, and can also be used in 16-bit Micro Channel
machines."
The TC5046-T and TC5046-2 are also available in conveniently packaged
six-pack bundles for $2,529, a savings of 9% over individually packaged
adapters.
The TC5046 Ethernet Adapter/MC will ship in early the second quarter in
10BASE-T and 10BASE-2 versions, both priced at $449. In addition,
Thomas-Conrad manufactures 8/16-bit NE1000/2000 compatible adapters and
bus-mastering, 16-bit Ethernet adapters. The 8- and 16-bit adapters
support 10BASE-T, 10BASE-2, and 10BASE-5 environments. An eight-port
10BASE-T concentrator and 10BASE-T and 10BASE-2 transceivers are also
currently shipping.
--------------------------------------------------------
January 20, 1992 -- Starting February 1 and extending through March 31,
1992, Thomas-Conrad will give users $50 in exchange for each ARCNET
adapter they trade-in for a 100Mbps TCNS RG62/U coax adapter. For those
users that need extra performance or have applications that require more
than ARCNET's 2.5Mbps transmission rate, TCNS is an ideal choice. With
this offer, users can recoup part of their initial ARCNET investment.
Approximately 4,000,000 ARCNET adapters are presently installed, many of
which run on RG62/U coaxial cable. Because TCNS is also available for
RG62/U coax, users can install it without rewiring their ARCNET LANs.
Thomas-Conrad will accept any vendor's ARCNET adapters, regardless of the
adapter's condition.
According to Jeff Chumbley, director of strategic planning for
Thomas-Conrad, "Many users bought ARCNET because it is reliable,
Inexpensive, and easy to troubleshoot. These same users have been waiting
for sometime for 20Mbps ARCNETPlus. With TCNS, they don't need to wait any
longer--a high-speed ARCNET-like access method is available today."
TCNS is a 100Mbps local area network technology optimized for high-volume
and transaction-processing applications. The adapters work with most
popular network operating systems including Novell's NetWare, Banyan's
VINES, Artisoft's LANTastic, and Performance Technology's POWERLan. TCNS
adapters require no software changes to existing ARCNET networks and use
only 16KB of address space. The TCNS adapter drivers support multiple
memory address and IRQ options to provide installation flexibility with
other add-in cards. Thus, several network adapters, including TCNS can be
internally routed in a file server or dedicated device. The adapters,
which use fiber-optic, Type 1 shielded twisted-pair, or RG62/U coaxial
cable, operate under currently available Novell RX-Net drivers or
Thomas-Conrad's Accelerated ARCNET Drivers for NetWare. The TCNS adapters
connect to the network via the TCNS Smart Hub, a diagnostic hub that
supports Thomas-Conrad's HubTalkn', a network hub manager.
To learn more about the trade-in policy, users should contact Thomas-Conrad
at 1-800-332 8683.
--------------------------------------------------------
January 23, 1992 -- Effective January 20, Thomas-Conrad is dropping the
prices of its ARCNET adapters by 12-20%. The new prices will be $110 for
TC6242 8-bit coax adapters, $120 for TC6242-OTP 8-bit industry-standard
twisted-pair adapters, and $325 for TC6245 16-bit coax adapters.
The company has also dropped prices on many of its "Six-Pack to Go"
bundles. These bundled packs offer a savings of up to 30% over
individually packaged adapters and include an offer for six free boot
ROMs. The company's TC6242 8-bit coax six-packs are $595; its TC6242 8-bit
industry-standard twisted-pair six-packs are $665; and The TC6245 16-bit
coax six-packs are $1,325.
According to Jeff Chumbley, director of strategic planning for
Thomas-Conrad, "As a result of our commitment to World Class Manufacturing
techniques and continual, rapid improvement, we have achieved cost savings
in the manufacture of our ARCNET product line. In keeping with our
corporate philosophy of offering high quality, technically innovative LAN
products at affordable prices, we are passing these savings on to our
customers."
These ARCNET adapters include an on-bracket node ID switch and an activity
LED for easy configuration and maintenance. Existing ARCNET drivers,
including RX-Net drivers and Thomas-Conrad's accelerated ARCNET drivers,
are compatible with the TC6242 and TC6245 family of adapters. As with
other Thomas-Conrad ARCNET adapters, the TC6242s and TC6245s operate with
Novell NetWare, Banyan VINES, Performance Technology POWERLan, Artisoft
LANtastic, and the various implementations of Microsoft's LAN Manager.
--------------------------------------------------------
February 11, 1992 -- Thomas-Conrad has announced plans to join Novell's
Technical Support Alliance. The charter of the Technical Support Alliance
(TSA) is to bring industry vendors together to provide customers with a
network of comprehensive service and support. Both Novell and
Thomas-Conrad customers will benefit greatly from this partnership.
As part of the agreement, Thomas-Conrad and Novell will cross-train each
others' technicians on their respective products. The companies will
exchange both technical information and products to enable the other
vendor to more easily solve problems in multi-vendor networks.
Thomas-Conrad and Novell will also formalize joint escalation procedures
for quick resolution of more difficult problems.
According to Jeff Chumbley, director of strategic planning for
Thomas-Conrad, "As a part of the TSA, we are able to provide a higher
level of service to our users in Novell environments. Programs like the
TSA, in addition to our toil-free 24 hour-a-day, seven day-a-week
technical support, allow us to provide the best support in the industry to
our customers."
In addition to participation in the TSA, Thomas-Conrad offers technical
support via its own bulletin board system (BBS), Novell's NetWire forums,
and through ongoing distributor and reseller training.
Thomas-Conrad Corp
1908-R Kramer Lane, Austin, TX 78758
512-836-1935
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,51 @@
NETWORLD, Boston, February 11-- Ziff Communications today announced that it
has acquired TECHS, International, of Anaheim, California, publisher of
the Technical Encyclopedia of Computer Hardware and Software, the only
multivendor database of technical support information for computer
hardware and software.
Ziff plans a future release of the TECHS product as part of its Computer
Library CD-ROM product line, according to Seth Alpert, vice president and
general manager of the Computer Library Group. "The TECHS acquisition is
strategic for us," said Alpert, "because it enables us to enter the
critical area of technical support with a definitive CD-ROM product in the
near future."
The current TECHS product is available on CD-ROM and contains technical
information from over 60 hardware and software vendors including Novell,
3Com, Banyan, AST Research, Cabletron, SynOptics, Madge, and Standard
Microsystems Corp. (SMC). It is especially useful for supporting network
products and offers cross-referenced information about error messages,
hardware and software compatibility, and installation and configuration of
hardware. It has received a number of awards including Product of the Year
from LAN Magazine in 1988.
TECHS is used by end-user organizations, major computer product
manufacturers, distributors, and resellers in the U.S. and over 20
countries throughout the world.
TECHS founder Jeff Schwartz welcomes the Ziff acquisition, and will
continue on as Computer Library's director of LAN support products. "This
acquisition means we now have the resources available to substantially
improve the scope and quality of the product," says Schwartz. "We remain
committed to offering the most comprehensive and accessible technical
support information available anywhere."
For product support or ordering information, TECHS customers should
continue to call TECHS International at (714) 777-7700.
A division of Ziff Communications Company, Computer Library develops,
markets and supports comprehensive, CD-ROM databases of computer
information that help businesses evaluate, buy, use and manage personal
computers and networking products.
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,102 @@
BOSTON, February 11-13, 1992--To more fully automate unattended backup,
Tecmar introduces ProServe' 4.0, the latest version of its award winning
server-based backup and restore software for Novell NetWare. Supporting
Tecmar's complete ProLine family of backup subsystems, ProServe 4.0 now
fully automates all data-management activities and offers advanced
disaster recovery features. The new software will be demonstrated at
NetWorld Boston in booth #4301.
ProServe 4.0 offers a new Auto Pilot Tape Management enhancement which
works as an invisible network administrator with features including: Tape
Rotation to maintain daily, weekly, monthly and yearly tapes with complete
system backup history; Disk Grooming to remove unaccessed disk files after
a user-specified time period and automatically generate permanent storage
copies; and for automated disaster recovery, Quick Recover to rebuild part
or all of a network's data back to any point in time by reading a stored
database from a backup tape. ProServe 4.0 also fully automates tape
creation and labeling, tape library management, and supports hierarchical
data storage.
"These new enhancements are in direct response to the needs of large
network sites which demand powerful automation and reliable controls,"
said Gene Della Torre, vice president of marketing. "We're giving our
users just what they've asked for, along with improved automation which
will save them considerable headaches, time and money."
Specifications And Compatibility
ProServe 4.0 is available as both an NLM for NetWare 3.11 networks and as a
VAR for NetWare 2.2. ProServe 4.0 is compatible with Tecmar's complete
line of ProLine backup systems, including its quarter-inch tape systems
ranging from 250MB to 1GB, its DATaVault' 2GB DAT drive, its 8mm 2.2GB
tape drive, and its LaserVault rewritable optical disk drive.
Price And Availability
The new ProServe 4.0 is available now with Tecmar's ProLine products. The
suggested retail price for the ProServe 4.0 NLM is $1,695. The suggested
retail price for the ProServe 4.0 VAP is $1,195. Upgrade pricing for the
ProServe 4.0 VAP or the ProServe 4.0 NLM ranges from $125 to $700
depending on the version required. Contact Tecmar for details.
For More Information
Tecmar, founded in 1974, is a pioneer and international leader in
manufacturing enhancement products for personal computers. Tecmar is a
subsidiary of Rexon, Inc., whose common stock is traded on the NASDAQ
system, ticker symbol REXN. Tecmar markets its IBM2 and Apple products
through a worldwide network of dealers, distributors and VARs.
--------------------------------------------------------
BOSTON, February 11-13, 1992--Tecmar announces significant upgrade
discounts for its new ProServe version 4.0 automated backup software for
Novell NetWare users. The promotional pricing begins at NetWorld Boston
and is effective through March 31 for any United States customer.
For users upgrading from a ProServe 3.0 VAP' or NLM to a ProServe 4.0 VAP
or NLM, Tecmar's discount price is $75 rather than the standard $125. For
users upgrading from a ProServe 3.0 VAP to a ProServe 4.0 NLM, the price
has been discounted from $700 to $425.
Free upgrades are also available to anyone who has purchased a ProLine
drive or ProServe software within the last 90 days, with proof of
purchase.
Tecmar's new ProServe 4.0 is being introduced during NetWorld Boston. The
advanced automated backup software supports Tecmar's wide range of
1/4-inch tape, digital audio tape (DAT), 8mm helical scan and rewritable
optical backup systems.
--------------------------------------------------------
BOSTON, February 11-13,1992--Tecmar announces free upgrades and shipping
for its latest QTOS' version 1.4 to registered QTOS users during NetWorld
Boston. The free upgrades are available to any QTOS user with the
completion of a simple survey at Tecmar's booth #4301.
For those registered users not attending NetWorld Boston, the new QTOS 1.4
is available, free from the Tecmar Bulletin Board System at (216)
349-0853, and for $25 through Tecmar's toll-free number, (800) 624-8560
through March 31. Sold separately, the new QTOS 1.4 is regularly priced at
$149.
The new QTOS version 1.4 supports Tecmar's complete range of 1/4-inch,
digital audio tape (DAT), 8mm helical scan and rewritable optical backup
systems.
--------------------------------------------------------
Tecmar, 6225 Cochran Rd, Solon, OH 44139-3377
216-349-0600; 800-624-8560
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,59 @@
SUNNYVALE, Calif.--January 27,1992--Telebit Corporation (NASDAQ: trading
symbol TBIT), a pioneer of high-speed modems, dial-up networking, and
wide-area communications products, introduced today the ModemMizer,
Telebit's newest member of the ACS (asynchronous communication server)
product family that functions as a non-dedicated communications server
solution for Novell Netware and NetBIOS networks.
ModemMizer is a modem-sharing software solution that operates on any
existing PC workstation and supports up to two modems with port speeds up
to 38,400bps. Providing both dial-in and dial-out functionality, the
ModemMizer utilizes dynamic allocation of ports to effectively manage LAN
modem resources. This insures that no modems or telephone lines are
inaccessible unless they are actually being used. Since the ModemMizer
operates in the background of any PC, local and remote users can access
other applications such as electronic mail and file transfer as well as
dial-out service providers without interrupting the host PCs activity on
the network.
ModemMizer also offers comprehensive network management features including
activity reporting, built-in breakout box, data trace, and remote console
capabilities that are typically offered only in dedicated communications
servers. All of these features can be accessed from any local or remote PC
on the network.
"ModemMizer is the ideal modem-sharing solution for small PC LANs that want
to maximize the performance of high-speed modems and reduce hardware and
phone line costs at the same time," said Michael Ballard, President and
CEO.
The Telebit ModemMizer software package is available immediately for a list
price of $349 and includes a standard 90 day warranty.
Included with ModemMizer is a two concurrent user license for pcANYWARE
IV/LAN version 4.5 software and two copies of pcANYWARE IV/Remote
providing terminal emulation, remote control and support for remote
Windows. Additionally, ModemMizer operates with other third-party
communications packages that support either the Telebit APL Interrupt 14
or NASI workstation interfaces.
Telebit Corporation designs, manufactures and markets advanced highspeed
products for dial-up networking and wide-area communications. The
company's digital signal processing technologies provide extremely
reliable error-free communications across the global switched telephone
network. Telebit markets its products worldwide through distributors,
original equipment manufacturers and value-added resellers.
Telebit Corp, 1315 Chesapeake Terrace, Sunnyvale, CA 94089
408-734-4333
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,136 @@
Iselin, NJ, February 11, 1992 - Triton Technologies announces the release
of CO/Session 6.02 with faster EGA/VGA graphics and improved remote
Windows performance.
Shipping March 1, CO/Session 6.02 provides substantial performance
improvements based upon further refinements in Triton's proprietary
graphic data compression and video scanning techniques. "Triton's latest
release of CO/Session offers substantial remote graphic improvements.
Remote VGA graphics are two to five times faster when using popular DOS
graphic programs such as Lotus 1-2-3, Quattro Pro or Harvard Graphics.
Remote Windows performance has also been vastly improved by 20% or more,"
explained Jim Mulholland, Triton's Director of Marketing.
For example, utilizing a 9600 baud modem, some VGA images that previously
required 30 seconds or longer to be drawn remotely are now displayed in
less than 7 seconds with CO/Session 6.02.
CO/Session 6.02 is a remote-control communications software product
allowing a PC in one location to remotely operate a second PC in a distant
location via modems or communication ports. The PCs involved can be either
standalone PCs or PCs on a network. CO/Session supports the remote
execution of both DOS and Window application programs.
CO/Session 6.02 requires the remote or host PC to have MS-DOS 2.0 or later,
360k of disk storage and 256K of memory.
The suggested list price of CO/Session 6.02. is $195 for a Two PC Package.
Additional Host packages will be available for $125 and additional Remote
packages will be available for $135.
An upgrade path is available for users of CO/Session, Carbon Copy,
Close-Up, Remote2 and pcAnywhere. Current CO/Session 4.0 or 5.0 users can
upgrade to CO/Session 6.02 for only $25. Users of CO/Session 6.0 can
upgrade for $10 and users of CO/Session 6.01 can upgrade for free via
Triton's BBS. Users of Carbon Copy, Close-Up, Remote2 and pcAnywhere can
also upgrade any version to a CO/Session Two PC Package for just $50.
CO/Session 6.02 will be available from distributors and dealers worldwide.
Interested individuals can contact Triton at (908) 855-9440.
The previous release of CO/Session, version 6.0, recently won LAN
Magazine's 1992 Communication Software Product of the Year Award, as well
as PC Magazine Editor's Choice. The improved features of CO/Session 6.02
will be demonstrated at Triton Technologies' booth at Networld Boston.
Triton's booth number is #1933.
Triton Technologies Inc. is a leading U.S. and international supplier of
remote access, file transfer and modem sharing communication packages for
IBM compatible PCs and networks. The company was founded April 1985 and
offers a range of products for PC, LAN and X.25 communications including
CO/Session LAN II, Session/XL, CO/Session ACS and CO/Session X.25.
--------------------------------------------------------
Iselin, NJ, January 10, 1992 - Triton Technologies announces the shipping
of CO/Session LAN II for Novell networks. Providing users on a Novell
network with the ability to remotely control another workstation,
CO/Session LAN II further allows network users to access any modem
connected to an Asynchronous Communication Server. Priced at $195 per file
server, CO/Session LAN II began shipping to the general public on December
16, 1991.
As part of Triton's release of CO/Session LAN II, full support for Windows
3.0 is included. Users on a Novell network will be able to access other
workstations on the network and remotely run Windows, Windows applications
and DOS applications from their remote workstation with full graphics,
keyboard and remote mouse support. Real, standard and enhanced modes of
Windows will be supported.
"Our customers and dealers have asked us to provide them a LAN version of
CO/Session for controlling PCs and modems across the network. CO/Session
LAN II does that with Windows and ACS support and at a great price,"
states Jim Mulholland, Triton's Director of Marketing.
Offering the ability to access modems connected to an ACS, CO/Session LAN
II is ideal for use with high speed modems to access remote PCs and
networks. With TTY, VT100 or VT102 terminal emulation modes and XMODEM
file transfer protocol, CO/Session LAN II also provides network users with
general purpose communications.
"Originally developed to be compatible with asynchronous communication
servers, Co/Session LAN II has grown into a full fledged network aware
communication program, able to control other workstations on the network
and access modems connected to an ACS for remote control, terminal
emulation or file transfers," explained Jim Mulholland. "It provides
network administrators with one package to handle many needs with one
common user interface and terrific value."
CO/Session LAN II is compatible with asynchronous communication servers
(ACS) that support a NASI/NCSI or Interrupt 14 interface. Communication
servers supported include Triton's CO/Session ACS, Novell's NACS,
Telebit's PACS, J & L Information System's NCS, Network Products' ACS2,
Cross Information's LAN+Modem and Fresh Technologies' Modem Assist.
CO/Session LAN II is licensed for use with up to four modems
simultaneously with a single ACS.
Support of Banyan's Intelligent Communication Adapters (ICA) is also
included with CO/Session LAN II. This provides Banyan users with a
powerful capability for control of remote LANs and PCs. No other remote
control package currently is compatible with Banyan's ICA.
The suggested list price of CO/Session LAN II is $195 per file server with
unlimited users for LAN-to-LAN remote control and for a single
communication server with up to four communication devices (modems).
Upgrades to users who purchased CO/Session LAN are $75. Users of competing
LAN remote control products such as pcAnywhere IV LAN, Close-Up LAN, LAN
Assist and NETremote Plus can also upgrade for just $75 per file server.
"CO/Session LAN II is the only LAN remote control product to retail for
less than $200 for a file server. Competing products retail for $295 -
$795 and many are licensed by number of workstations on the LAN creating a
real headache for Administrators to maintain proper licensing", states Jim
Mulholland.
CO/Session LAN II is available from distributors and dealers Interested
individuals can contact Triton at (908)
Triton Technologies Inc. is a leading U.S. and international supplier of
remote access and file transfer communication packages for IBM compatible
PCs and networks. The company was founded April 1985 and offers a range of
products for PC, LAN and X.25 communications including Session/XL,
CO/Session LAN II, CO/Session ACS and CO/Session X.25.
Triton, 200 Middlesex Turnpike, Iselin, NJ 08830
800-322-9440; 908-855-9440
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,142 @@
BATON ROUGE, La., Nov. 18, 1991 -- Fifth Generation Systems, Inc., today
introduced Untouchable, a new line of anti-virus software that provides
complete virus protection without the need for frequent virus signature
updates. Untouchable stand-alone and network products are designed to
operate on DOS-based PCs, compatibles and networks.
Four features distinguish the Untouchable product line from other
anti-virus software products on the market:
o a revolutionary product design which eliminates the need
for frequent virus signature updates;
o a patented virus removal technique that guarantees
100 percent restoration of recoverable infected files,
including those hit by unknown viruses;
o automatic, load-and-forget protection that ensures the
integrity of data without interfering with the work
process; and
o a network version that provides centralized installation
and management capabilities.
"Untouchable sets the standard for the next generation of anti-virus
software," said Barry L. Bellue, Sr., president and CEO of Fifth
Generation Systems. "This is the virus protection software that corporate
America has been waiting for," he continued. "It is nearly impossible to
get 40,000 users at a large corporation to update their software every
three months. With Untouchable, they will have total protection against
all existing and future viruses, even if they never buy virus signature
updates."
PRODUCT DESIGN
Untouchable consists of three distinct anti-virus technologies that
constantly interact to detect and eradicate known and unknown viruses.
The heart of Untouchable's detection capabilities is the file scanner,
which incorporates the principal of modification detection. This
mathematically-proven technique safeguards against known and unknown virus
threats by making unique use of file signatures rather than the
commonly-used virus signatures.
During installation, Untouchable fingerprints and registers all files on
the PC, using proprietary file signature calculations, and stores the
information in encrypted on-line and off-line databases. Every day,
Untouchable automatically performs an integrity test of the user's files
and compares the results of this check to the information initially stored
in the database.
If a virus is detected, Untouchable uses the database of file signatures as
a reference to reconstruct infected files to their former. "healthy"
state. Since the removal methodology does not rely on virus signatures,
Untouchable can safely restore files struck by an unknown virus.
"No other product available today can offer this degree of protection or
guarantee 100 percent safe restoration of recoverable files," said
Bellue.
As a first line of defense, Untouchable uses a TSR monitor that checks
system memory for known boot sector and partition table viruses. Once
loaded into memory, it is always on guard against known viruses, scanning
each file before execution and checking every diskette inserted into the
floppy drive. Running completely in the background, the TSR monitor
occupies less than 900 bytes (.9K) when loaded into expanded memory or 5K
if fully loaded in conventional memory.
Untouchable's second line of defense is a virus scanner/remover that can
detect and eradicate hundreds of known viruses. The virus scanner is
automatically run during program installation to verify a clean
environment and is automatically launched to check all new files and
programs for viruses before they are added to the database of file
signatures. The scanner can be manually run from the command line to check
floppy disks before use. If the scanner detects a known virus, it will
restore recoverable files to their original state.
UNTOUCHABLE NETWORK
Untouchable Network provides Novell LAN administrators with the ability to
centrally monitor and control the entire network for viruses.
The program uses the same methods of protection as the stand-alone version,
but incorporates enhanced LAN management features, including:
o automatic installation and updating from one location;
o transparent, unobtrusive operation at the workstation
o ultimate control over the way the program operates
on every node;
o real-time virus alert mechanisms;
o ongoing status reports on the state of the network
from one central control panel;
o historical logs of all status reports and virus
alerts; and
o the ability to assign "system operators" who receive
the same alert that workstations receive.
Untouchable Network currently provides its enhanced LAN management
facilities for the Novell Netware operating system. A network saw y
version of the product, without the LAN management features, is available
to run on Microsoft LAN Manager, Banyan Vines, 3Com and other PC network
operating systems. Bellue said, "We will expand Untouchable Network's LAN
management capabilities to other network operating systems."
Untouchable will be available in mid-November at a suggested retail price
of $165. An Untouchable Network Starter Kit is available at a suggested
retail price of $695. The starter kit includes the server package of full
supervisor documentation and software and ten node license agreements.
License agreements for additional nodes may be purchased at a suggested
retail price of $85 per node.
While Untouchable does not require virus signature updates to ensure
complete protection against undiscovered new viruses, Fifth Generation
Systems recognizes that some users may want them. The company will provide
quarterly virus signature updates for the virus scanner and TSR monitor,
for a service charge of $15 per quarter.
Fifth Generation Systems is one of the leading developers of DOS and
macintosh utilities software for data security, with Untouchable for virus
protection, DiskLock for access security and encryption, and FastBack Plus
for data backup. The privately-held firm also develops software for
menuing/file management and recovery.
Fifth Generation Systems Inc
10049 North Reiger Rd, Baton Rouge, LA 70809
504-291-7221
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,191 @@
Boston, MA -- February 11, 1992 -- At NetWorld 92 Boston, XTree Company
(Booth #430) will expand its product line to include the most
comprehensive network virus detection, prevention, and elimination utility
ever -- ViruSafe/LAN. ViruSafe/LAN sets the standard for protection
against known and unknown viruses and, unlike other programs, can even
learn from unknown viruses to modify and enhance its defenses.
ViruSafe/LAN has been created to work on all networks, including Novell
LANs. The $595 utility comes with a license for ten users. New network
specific features include: automatic Supervisor notification of a virus
attack on a workstation and unsurpassed flexibility in installation and
configurability.
ViruSafe, licensed by XTree Company for distribution in North and South
America, Australia and New Zealand, was created in Israel by EliaShim
Microcomputers in 1987 to combat Jerusalem B (the first virus to attack
microcomputers).
After years of use and hundreds of thousands of worldwide installations
(with clients ranging from the Israeli Defense Ministry to Hewlett Packard
and NASA) ViruSafe has emerged as a Fortune 1000 and government standard
in comprehensive virus detection, prevention, and elimination according to
Moti Dover, President, EliaShim Microcomputers, Inc.
ViruSafe/LAN, now in its fourth major release, has earned the reputation
for being the most complete virus protection product available. ViruSafe
is a "user friently product that can be used by everyone in your
organization, it found more viruses than any other product tested," says
Bob Cartwright, of Chevron Information Technology. "It is the most
comprehensive packaged I reviewed."
"ViruSafe/LAN is active, not reactive," explains King Lee, XTree Company
CEO. "ViruSafe's technology does not rely simply on known virus signatures
-- it knows how to detect activity prior to infection... as well as
after." Lee adds, "ViruSafe is time-tested and the only total solution for
protection against infection from known and unknown viruses on the market
today."
ViruSafe/LAN - The Complete Virus Terminator
ViruSafe/LAN monitors, detects and removes viruses in memory, file
allocation tables (FATs), boot sectors, partition tables, and root
directories as well as in executable files (or in all files). The network
utility works on both Net BIOS LAN and NetWare.
ViruSafe/LAN is designed to give the network administrator unsurpassed
flexibility in installation and configurability. For example, ViruSafe/LAN
will display all the users on the network. From there the supervisor can
select individual users and uniquely configure ViruSafe/LAN for their
system.
When the user logs on, ViruSafe/LAN will automatically configure and copy
the appropriate ViruSafe/LAN modules to the local workstation and update
the AUTOEXEC.BAT file (if desired). This unique time-saving feature allows
supervisors on all types of networks to individually configure and
maintain hundreds of users from one location.
This module will also automatically collect and combine virus-checking
reports from each work station and send it back to the server where the
supervisor can monitor virus-checking activity.
ViruSafe/LAN contains six modules -- Anti-Virus Resident Monitor, Memory
Virus Check, Scan and Remove, Program Integrity Check, Disaster Protection
and Recovery, and PC-Checkup System Information. All of the ViruSafe/LAN
modules are self-immunized against virus infection. If they are attacked
by a virus, the programs can dynamically reconstruct themselves without
forcing the user to reinstall. All modules are available in the easy menu
interface or at the command line. ViruSafe/LAN allows the supervisor to
define when ViruSafe/LAN should be active -- continuously, when scheduled,
or only run manually -- as well as which portions of the system should be
checked.
** ViruSafe Monitor (VS.EXE) is a totally-configurable, real-time
Anti-Virus Filter TSR module (transparent to the user) which provides
continuous monitoring. (TSR uses only 12K -- 9K without help screens --
half the size of competitive products. And it will load high, occupying as
little as OK on a 286 or 386 system.) If selected, VS will:
<EFBFBD> Prevent unauthorized access to critical areas like Boot Sectors, Program
Files and Memory.
<EFBFBD> Prevent viruses from entering memory before they have a chance to
replicate.
<EFBFBD> Prevent any writes to your hard disk the first time a new program is
executed.
<EFBFBD> Automatically check floppy diskettes for viruses the first time they are
read.
<EFBFBD> Check for changes in memory sizes or interrupt values that would indicate
a virus is present.
<EFBFBD> Provides a virus-free copy function that checks any files to be copied
for viruses.
** Virus Check (VC.EXE) checks memory for any viruses and can be run from a
batch file to give protection each time the computer is turned on. Virus
Check can detect and neutralize known and unknown viruses trying to infect
programs.
Once it has determined the activity pattern and identifying signature of
the virus, Virus Check can provide that information to the other modules
so that they can update their own defenses. For the first time, new virus
types can be identified and stopped instantly without having to receive a
software update from the publisher.
** UNVIRUS scans and removes viruses from all files and boot sectors. This
is useful for users who may already have a virus and want to remove it
from their system. In most cases, ViruSafe/LAN can safely remove a virus
from files and leave the original file intact.
** Program Integrity Check (PIC.EXE) registers signatures of user selected
files (or all files) and boot sectors and identifies unauthorized changes
to them -- guarding against known and unknown viruses. PIC can reconstruct
the boot sector and partition table if a change is detected, completely
neutralizing viruses.
More Than a Virus Terminator
ViruSafe/LAN goes beyond being amazingly powerful by providing:
<EFBFBD> Easy Installation -- Easy Interface. Simple user interface
includes mouse support and point-and-shoot menus.
<EFBFBD> Creation of a "safe" floppy diskette to restore PC to
health -- if needed.
<EFBFBD> Password protection to prevent tampering with the ViruSafe
system.
<EFBFBD> Viewers to see memory or contents of boot track
(to scan for virus messages).
<EFBFBD> Comprehensive list of viruses and mutations with
descriptions of symptoms. (New virus signatures may easily
be added to the program.)
Pricing, Availability. Requirements
The introduction of ViruSafeLAN is accompanied by new customer service
programs at XTree Company. New virus information and updates to the
ViruSafe/LAN database can be downloaded from the company's bulletin board
service (BBS). These updates provide additional virus identification and
removal instructions for ViruSafe/LAN. In addition, a CompuServe forum
will be available soon, as well as a fax service that allows users to call
for the latest product and virus information. An update service will allow
ViruSafe/LAN customers to receive quarterly updates of new virus
signatures. All registered users will receive their first update at no
charge.
ViruSafe/LAN retails for $595 and includes a license for ten users. XTree
Company also offers corporate volume purchase agreements and site
licenses.
ViruSafe/LAN is also available through the vendor's distributor network,
which includes Ingram Micro, Kenfil, Merisel, Software Resource, and XTree
Authorized Resellers, which include CompUSA, Egghead, Software City,
Software Etc., and other nationwide chains.
Other Products
XTree Company also publishes XTreeGold 2.5 and XTree Easy, the industry
standards in disk management software for the IBM PC, XT, AT, PS/2 and
compatible computers; XTreeNet, the leading file and disk manager for
Novell network administrators; and the just-released Xtree for UNIX
systems, the leading file and disk manager for multi-user Intel-based UNIX
applications.
Project Green
In 1990, XTree Company launched "Project Green" and became the first major
publisher to produce software products using recycled and/or
environmentally sensitive materials.
ViruSafe/LAN continues the "everything except the floppy disk and the
shrink-wrap can be recycled" practice. (The company is currently looking
for alternatives to shrink-wrapping their products.) Further, for every
ViruSafe/LAN user registration card returned, XTree Company will plant a
tree in conjunction with the American Forestry Association's Global ReLeaf
program.
Xtree Company, 4330 Santa Fe Rd, San Luis Obispo, CA 93401
805-541-0604
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,162 @@
Atlanta, GA (February 3, 1992)- VisiSoft's new systems architecture for its
Windows-based VisiNet Network Management System will be shown for the
first time at NetWorld Boston. The new architecture includes the
Enterprise System Platform and special Function Modules that tailor the
system to a wide range of network operating systems, protocols, devices,
enterprise managers and management functions.
"It's clear that better network management is critical to the continued
expansion of the use of LANs and WANs," said Rich Mauro, VisiSoft's vice
president, marketing. "The requirements, however, vary considerably from
company to company. A single LAN user's management needs are quite
different from those of the heterogenous, multi-site, wide area network
user. Many of these single site networks will, of course, grow in
complexity over time.
The primary design goal of VisiNet's new architecture was to allow users to
tailor a VisiNet system to their initial requirements and expand it as
they grow."
Under the new VisiNet architecture, users may purchase the basic Enterprise
System Platform with a single module supporting one specific environment.
NetWare, LAN Manager/LAN Server, NetBIOS and SNMP Function Modules will
all be available when the new platform ships. The Function Modules will
provide the same user interface and function as the current versions of
VisiNet that support these network operating systems and protocols. A
Banyan VINES Module will also be available later in the year; Banyan
users, however, may take immediate advantage of VisiNet's management
capabilities by using the SNMP Module. VisiSoft is also working with
Novell to interface VisiNet's Netware Module to Novell's recently
announced network management platform.
Companies whose heterogenous, wide-area networks employing multiple network
operating systems and protocols can purchase VisiNet's Enterprise System
Platform with multiple Function Modules to serve their specific needs.
Administration of the entire network environment may then be done from a
single network console.
"VisiNet's new structure will minimize the impact of network expansion on
network management," said Chip Standifer, VisiSoft's president. "The
modular approach will not only let users expand VisiNet as their network
expands, but do it painlessly. They won't have to buy a new system or
upgrade to a new version...they'll just add the necessary module to
VisiNet's Enterprise System Platform".
Later this year, VisiSoft will introduce additional Function Modules that
will allow VisiNet to operate as a hierarchical network management system.
VisiNet consoles equipped with a Communicating Module in remote sites will
send real-time management information to a central site equipped with a
VisiNet Collecting Module. Users will have a choice of managing the remote
sites solely from the central console or sharing the management duties
between the remote and central site.
Future VisiNet Function Modules will expand its interface to other vendors'
enterprise management systems, such as NetView, and to proprietary device
information. Device support will be developed in joint development efforts
with these vendors or by the vendors themselves. VisiSoft will make
information on the VisiNet interface available to interested vendors to
facilitate the expansion process.
"Our goal," said Standifer, "is to evolve VisiNet to the point where it not
only detects problems, but resolves many common network problems.
Effective network management requires both monitoring and control. We want
VisiNet to help the network administrator understand the options and
select the best course of action. We expect to make those expanded
functions available as additional modules that companies can add to their
systems."
VisiSoft distributes VisiNet through a worldwide network of value-added
resellers, system integrators and distributors. Inquiries are welcome, and
should be directed to VisiSoft, 430 10th St., NW, Suite S-008, Atlanta, GA
30318, phone 404-874-0428, fax 404-8746412.
--------------------------------------------------------
Atlanta, GA (February 3, 1992)- The Simple Network Management Protocol
(SNMP) version of VisiNet, the Windows-based active network management
system developed by the VisiSoft division of Technology Dynamics, began
shipping today. "VisiNet's SNMP version," said Chip Standifer, VisiSoft's
president, "lets network administrators manage systems and devices that
include an SNMP agent. It supports MIB I and MIB II, and can be
user-expanded to support experimental and enterprise-specific MIBs. It
communicates with the network using NetManage's TCP/IP kernel, which is
included in the VisiNet SNMP package."
VisiNet's user-extendable capability allows it to access any information
provided by a system's or device's SNMP agent. VisiSoft plans to augment
this basic user definability with pre-configured MIBs beyond MIB I and MIB
II. These will support the RMON MIB and other popular system or device
MIBs.
Currently operating under Windows 3.0, VisiNet will operate under Windows
3.1 and OS/2 2.0 when these environments become available. VisiNet's SNMP
version has a suggested list price of $2495. The LAN Manager/LAN Server
and NetWare versions, which are currently available, are priced at $1995.
VisiSoft distributes VisiNet through a worldwide network of value-added
resellers, system integrators and distributors.
--------------------------------------------------------
Atlanta, GA (February 3, 1992)- VisiNet 2.0, developed by the VisiSoft
division of Technology Dynamics, promises to revolutionize PC-based
network management with its graphic presentation and control of network
information. Currently operating under Windows 3.0, VisiNet will operate
under Windows 3.1 and OS/2 2.0 when those environments become available.
Under any of these environments, it provides a graphical user interface
and user-definable icons which allow users to create hierarchical views of
each network layer. Real-time monitoring alerts the user to critical
operating conditions and alarm events. World, country, state and regional
maps or office floor plans may be selected as backgrounds for each view;
custom images created in bit-map or DXF format may also be imported.
VisiNet's database supports the creation and maintenance of up data fields
and list boxes for objects within each node and link. Standard definition
templates, which can later be tailored to specific network needs, help
users get off to a fast start.
A comprehensive scripting language that lets users define what is monitored
and what conditions will cause an alarm is a key VisiNet feature. The
language was designed with ease of use as a primary objective, but
standard scripts are provided for initial use and customization, allowing
gradual familiarization with the language.
Because it polls the network constantly, VisiNet sends an alert immediately
when it detects a potential problem. This can be a visible and audible
signal; the user can then respond to the alert, clicking down to view the
cause of the alarm or change in state.
The polling interval may be selected for each item within each object,
allowing further fine-tuning of network performance. VisiNet builds a
database of activity while it monitors the network. It maintains a
historical log, from which trouble tickets and standard reports may be
pulled for network analysis. Data may also be exported to any application
supporting Dynamic Data Exchange (DDE) or Object Linking and Embedding
(OLE) for analysis or additional activity reports.
At setup, VisiNet automatically scans the network and identifies each
active node and its configuration. Among the items VisiNet monitors are
processor type, memory capacity, LAN adapters, device drivers and the
values of environment variables. By adding the links and any other
required workstation data, the user can be up and running quickly. Each
time a user signs on, the station's hardware configuration is
automatically scanned, allowing VisiNet to maintain a constantly updated
network configuration.
VisiSoft shipped its LAN Manager/LAN Server version in August, 1991 and its
NetWare version in November, 1991. Each of these products are priced at
$1995. VisiNet's SNMP version is priced at $2495.
VisiSoft distributes VisiNet through a worldwide network of value-added
resellers, system integrators and distributors. Inquiries are welcome, and
should be directed to VisiSoft, 430 10th St., NW, Suite S-008, Atlanta, GA
30318, phone 404-874-0428, fax 404-874-6412.
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,59 @@
OREM, Utah, January 31, 1992--WordPerfect Corporation today announced the
shipping of WordPerfect Office 3.1 for PC LANs. WordPerfect Office is an
electronic mail and scheduling package combined with other office
automation programs. Users will be able to upgrade their whole domain to
version 3.1 for $199.US/$239.CN.
WordPerfect Office's E-mail includes folders, status checking, message
retraction, and allows up to 100 attachments. The 3.1 release also
includes a launching feature for the transfer of documents or graphics
into word processing or graphics editing programs. The scheduler program
schedules events, meetings, and office resources over the system.
WordPerfect Office for PC LANs and WordPerfect Connections, which allows
for LAN-to-LAN communication, are now bundled together. WordPerfect Office
now includes E-mail, Calendaring/Scheduling, and several desktop utility
programs as well as: Remote Mail, improved Directory Services for LAN
Systems Administration, out-bound FAX support, a platform bridge for
connections to Macintosh, UNIX, VMS, and Data General platforms, and an
improved Asynchronous bridge. The license gives users the right to use the
included Connections software on any on-site PC dedicated to connections
activities including async, gateway, and multi-LAN connections.
With the additional contents, the suggested retail price of a five user
license PC LAN package will remain the same at $495.US/$595.CN. Additional
license-only packages will also be available in quantities of 1, 20, and
100 for $75.US/$89.CN, $1295.US/$1,555.CN, and $5,995.US/$7,195.CN
respectively. The company said its new license-only prices will
accommodate large account purchasing.
The step to version 3.1 is an important one according to David Clare,
WPCorp director of development. "WordPerfect Office 3.1 is very important
to WPCorp's crossplatform strategy because it creates a bridge between MS
DOS, Macintosh, UNIX, VMS, and Data General systems for exchange of
electronic mail and scheduling services," said
Product Marketing Manager Andrew Ehat said that "WordPerfect Office 3.1 is
for use in all organizations that are using or considering PC networks
and/or a variety of multi-user platforms and would like to use global mail
and scheduling across these platforms."
WordPerfect Office is an electronic mail and scheduling package to enhance
PC LAN communication. The product also contains several desktop utility
programs such as a menuing system, flat-file database, calculator, program
and macro editor, and personal calendar. WordPerfect Office has an
approximate user base of 400,000. For more information, contact WPCorp
Information Services at (801) 225-5000.
WordPerfect Corp, 1555 N. Technology Way, Orem, UT 84057
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,137 @@
February 11, 1992-Laurel, MD-XDB Systems, Inc., the SQL technology leader,
expands its relational database management product line by unveiling
XDB-LINK at NetWorld '92, a new software package that permits PC
applications to transparently access mainframe DB2 data. "Developers can
use XDB-Workbench as well as the interactive XDB tools to query, update,
report, browse and enter data directly to DB2," states Robert Strom, XDB's
Senior Development Manager. With XDB-LINK it is now possible to develop
cooperative processing applications in order to use MIS resources more
efficiently. For example, applications and data that reside in distributed
areas can be viewed as a single data center.
The XDB-LINK product consists of two components: XDB-LINK Gateway, which
resides on the PC, and the XDB-LINK Host, which resides on the mainframe.
These components communicate via LU6.2 protocols to satisfy DB2 SQL
requests originated from the PC. The XDB-LINK works with IBM's CICS/APPC
product and VTAM.
XDB-LINK is based on the client-server architecture and supports DOS, OS/2,
and Windows clients. In a development environment, the XDB-LINK product
extends systems level testing to the PC environment by providing access to
mainframe production data. In a production environment, XDB's application
tools (XDB-Workbench, XDB-Tools, XDB-C) and LAN applications can now
access data residing in mainframe DB2 as a database server.
One significant advantage of the XDB-LINK package is increased
productivity. The data transfer procedure has been streamlined since
developers can now transfer data between the PC and the mainframe in one
step. In addition, data access using XDB-LINK's bulk fetch processing
feature is comparable to local 3270 access. Mike Meyer, Principle Systems
Associate with Mutual Benefit Life Insurance Company in Newark, NJ said,
"With the LINK's bulk fetch processing feature I can save a significant
amount of time and resources required to fetch multiple rows from DB2."
IBM is scheduled for commercial release of their Distributed Relational
Data Architecture (DRDA) standard next year and XDB intends to supports
DRDA. XDB Systems is committed to providing quality relational database
management products and services. The price range for the XDBLINK is
$21,000 to $36,000 depending upon a company's mainframe CPU size. For more
information stop by Booth #633 or contact XDB Systems, Inc., 14700
Sweitzer Lane, Laurel, MD 20707-2921; (301) 317-6800.
--------------------------------------------------------
February 11, 1992 - Laurel, MD-XDB Systems, Inc., the SQL technology
leader, will be featuring a new version of their SQL Engine for OS/2 at
NetWorld '92. The XDB-SERVER is a high performance, multi-user database
system that brings the power and integrity of mainframe database systems
to LANs. The core of XDB's product line is the 100% DB2 compatible Engine.
Now with the XDB-SERVER for OS/2 version 2.41, DB2 applications become
portable to client-server platforms. Since the XDB-SERVER is network
independent, DB2 compatibility can exist on multiple platforms and
operating systems.
The main benefits of the XDB-SERVER for OS/2 version 2.41 are increased
power and performance. Rusty Fiste, XDB's Director of Development, states,
"XDB's new, enhanced SERVER for OS/2 obtains significant performance gains
because of its improved internal buffer management system which minimizes
disk accesses." Multiple physical disk volumes are now supported. Now
developers can utilize multiple disk volumes to separate various data
objects like indices and databases thereby decreasing the amount of time
required to retrieve data. The size of a database is also no longer
limited by the size of one OS/2 disk volume. In addition, the XDB-SERVER
for OS/2 version 2.41 has greatly enhanced its query optimization.
The XDB-SERVER takes maximum advantage of OS/2 technology. One of the Beta
sites chose XDB-SERVER because they wanted DB2 compatibility on their PC
LAN. Igor Kruglyak, Assistant Vice President & Systems Architect with
Merrill Lynch in Somerset, NJ, states, "We have many users that need to
share DB2 data and the XDB-SERVER provides the fully DB2 compatible
technology for mainframe applications to migrate to the LAN environment."
--------------------------------------------------------
February 11, 1992 - Laurel, MD-XDB Systems, Inc., the SQL technology
leader, will be featuring Version 2.41 of the XDB-Workbench. The new
engine supports both DOS and OS/2 and is designed to provide an
unprecedented level of compatibility with IBM's mainframe relational
database DB2. The XDB-Workbench 2.41 enables COBOL programmers to develop,
test, and run DB2 applications in an inexpensive and friendly PC
environment. XDB has added numerous functions to their new version of
their Workbench 2.41 in order to fine tune their compatibility with DB2.
Rusty Fiste, XDB's Director of Development says, "This latest version of
our workbench delves deep into the distinctive characteristics of DB2."
XDB's reserved words were also made fully compatible with DB2. "This
release further underscores our commitment to ensure 100% compatibility
between XDB's Workbench and DB2," states Rusty Fiste.
"XDB's Workbench version 2.41 is well suited for downsizing mainframe DB2
applications, where DB2 compatibility is a crucial consideration. XDB has
made a remarkable commitment to capture the subtle intricacies of the
DB2/SQL engine," says Jonathan Sayles, Director of Education Services for
The Systems Group and a nationally recognized author on relational
technology. Rick Slade, Senior Research Analyst at Sara Lee in
Winston-Salem, North Carolina said, "I chose the XDB-Workbench for
PC-based development because no recoding would be required when we moved
our project back up to the mainframe."
In addition to DB2 compatibility enhancements, other Product enhancements
include additional referential integrity clauses, date/time functions,
string functions, numeric functions, table privileges, and database
privileges. The XDB-Workbench is the first PC SQL DBMS to provide the
rigorous referential integrity constraints including cascading update, a
fundamental data manipulation function that involves modifying data
records in a continuous series so that all corresponding data is brought
up to date.
XDB Systems sets the standards for database management. Following the
release of the XDBWorkbench Version 2.41, XDB Systems, Inc. will be
releasing their new XDB-LINK product and their new version of the XDB
SERVER engine for OS/2. The XDB-LINK permits PC applications to directly
access mainframe DB2 data. Developers can use the interactive XDB tools to
query, update, report, browse and enter data directly to DB2. The XDB
SERVER for OS/2, a multi-user database system that brings the power and
integrity of mainframe database systems to LANS, will feature increased
power and memory size enhancements.
--------------------------------------------------------
XDB Systems, Inc. offers high performance database solutions that are
powerful, easy to use, and compatible with industry SQL standards. The
XDB-Workbench Version 2.41 makes your PC a complete DB2 applications
development machine. The list price of the XDB-Workbench in $1500.00. For
more information stop by Booth #633 or contact XDB Systems, Inc., 14700
Sweitzer Lane, Laurel, MD 20707-2921; (301) 317-6800.
###
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,155 @@
Boston, MA -- February 11, 1992 -- At NetWorld 92 Boston, XTree Company
(Booth #430) will introduce its latest version of XTreeNet -- its file
management utility for Novell networks. The company has added new features
and revamped its licensing policy, making it more cost efficient for
administrators of large networks with multiple server environments.
Shipping now, XTreeNet 2.07 delivers an unprecedented set of file- and disk
management features designed to give complete control of the network to
the administrator. New features include remote control capabilities which
allow users to control other workstations from a single PC. XTreeNet also
offers full support for all NetWare 386 directory and file attributes.
New Licensing Policy
Effective immediately, users of XTreeNet 2.07 can purchase server
extensions for only U.S.$100. This means that users no longer have to
purchase additional product in order to access other servers on the
network through XTreeNet. XTree Company decided to revamp its licensing
product in order to make it more cost efficient for administrators of
multiple server environments, explains Brad Bowen, XTree Company Network
Product Manager.
Like all XTree products, the new XTreeNet Version 2.07 provides the
familiar graphical tree display of a disk's directory structure, allowing
the easy manipulation of files by using the advanced commands found in the
program. XTreeNet 2.07 can also access local drives as well as file server
volumes. In addition, XTreeNet's new peer-to-peer capability allows access
to any workstation on the network, thereby giving the administrator
unparalleled distributed file management capabilities.
Peer-to Peer Communications
Using advanced communication techniques, XTreeNet 2.07 can now view and
manipulate files of any workstation on the network. For the first time,
files on distant workstations can be copied, deleted, and edited from one
location. Instead of running from machine to machine, the administrator
can manage the entire network from his desk enabling workstations to be
setup and maintained with the highest level of convenience.
Other special network capabilities include:
* log entire or partial drives
* display and modify all NetWare information associated
with directories and files
* map network drives
* send output from any program to any printer on the network
Advanced File Management Features
To provide the most complete set of file management capabilities in any
network utility, XTreeNet 2.07 has advanced capabilities for searching and
rapidly finding data in any file or set of files.
For example, users can search for any group of files for data they need by
specifying any convenient character sequence, such as a name or date they
remember.
Within seconds, XTreeNet automatically tags all files containing the
specified data string for further file management operations, such as
directly viewing, copying, or modifying parts of these files even when
stored in Lotus 1-2-3, Microsoft Word, WordPerfect, MultiMate, or any
popular data file format.
The applications which created these files can then be LAUNCHed
automatically. Text can also be GATHERed in blocks from these files and
moved to a printer or directly into another file -- all with simple, easy
keystrokes.
At the touch of a single key, a split-screen window capability lets users
see and manipulate files in two unrelated directory trees side-by-side. To
speed and simplify repetitive operations, every XTreeNet command maintains
a history for instant recall by either keystroke or click of a mouse
button.
Another exclusive feature of XTreeNet 2.07 is the Archive command that
saves time, money and valuable hard disk space by compressing files into
the industry standard .ARC format. Compressed files can be transferred to
disks quicker, using fewer diskettes. They can also be sent via modem or
downloaded from on-line services like CompuServe and MCI faster, reducing
telephone costs and on-line access fees.
Other new features include PRUNE and GRAFT commands, which allow the moving
or deleting of entire directory tree structures as quickly, easily, and
safely as moving a single file.
XTreeNet 2.07 also provides a powerful, easy-to-use interface to the
network operating system and all other application software through the
use of an application menu. Up to 12 items can be placed on the menu, and
when selected, will execute the commands assigned to that menu. Using the
application menu or the command shell, XTreeNet can collapse to take up a
minimum amount of RAM when other programs are executed.
Highest Level of Network Security
In addition to its disk management capabilities, XTreeNet 2.07 also offers
network supervisors the highest level of security available in the network
environment. "XTreeNet's advanced security features are the result of
extensive research with experienced network managers," explains Bowen.
XTreeNet 2.07 enhances NetWare's security features by allowing the
supervisor to restrict XTreeNet commands to users or groups based upon
their needs in a particular directory. For further file protection, only
the files and directories to which a user has access rights will be shown
in the XTreeNet display.
Pricing, Availability, Requirements
XTreeNet 2.07 is shipping now through the vendor's distributor network,
which includes Ingram Micro, Kenfil, Merisel, Software Resource, and XTree
Authorized Resellers, which include CompUSA, Egghead, Software City,
Software Etc., and other nationwide chains.
The Advanced/SFT/386 version will retail for U.S.$495. Registered XTreeNet
1.0 users can upgrade for U.S.$149 (plus $4.95 shipping/handling).
Registered XTreeNet 2.0 customers can upgrade for only U.S.$49 (plus $4.95
shipping and handling.)
Server extensions may be purchased for U.S.$100 each, with no limit,
although a base copy of XTreeNet 2.07 must be installed.
XTreeNet 2.07 requires an IBM PC, XT, AT, PS/2, or a 100% compatible
computer workstation, DOS 3.1 or above, 256K and Novell Advanced NetWare
version 2.1 or above. XTreeNet 2.07 contains both 5.25" and 3.5" program
disks and is not copy protected. Telephone technical support is available
free of charge to registered users.
For Additional Information
XTree Company, a division of Executive Systems, Inc., is the world's
leading supplier of disk management software. With more than two million
copies in use, XTree and XTreeGold are well-recognized industry standards
for disk management.
Other XTree Company products include: XTree Easy and XTreeGold 2.5, the
most comprehensive hard disk manager for the PC available; plus Xtree for
UNIX systems, the leading file disk manager for Intel-based UNIX
implementations.
At COMDEX/Fall '91, XTree Company released ViruSafe', ViruSafe/LAN, and
AllSafe -- a complete line of virus and security utilities.
Xtree Company, 4330 Santa Fe Rd, San Luis Obispo, CA 93401
805-541-0604
+---------------------------------------------------------------+
| From the America On-Line & PC-Link New Product Info Services |
+===============================================================+
| This information was processed with OmniPage Professional OCR |
| software (from Caere Corp) & a Canon IX-30 scanner from data |
| provided by the above mentioned company. For additional info, |
| contact the company at the address or phone# indicated above. |
| All submissions for this service should be addressed to |
| BAKER ENTERPRISES, 20 Ferro Drive, Sewell, NJ 08080 U.S.A. |
+---------------------------------------------------------------+

View File

@@ -0,0 +1,113 @@
I've been chomping at the bit to speak out and right now I just don't
care about the non-disclosure agreements. We have been beta-testing
the A4000 and another model which may be called the A1000 Classic,
A800, or possibly some other name. Both are based on the AA chipset
and should be able to hold their own against other machines on the
market, but there are still a few areas where they are lacking.
The A4000 is pretty much an A3000 with an 040 on the motherboard, the
AA chipset instead of the ECS, and beta 2.1 ROMS. Ours has 16M fast
RAM and 4M chip, expandable to 64M and 16M respectively. ZIP RAM like
that in the A3000 is used, but there is a chance that production
machines will go to SIMMS. Our machine has a 105M Quantum hard drive
and a true full- speed high-density floppy. The expansion slots are
Zorro III and appear to be identical to those on the A3000. I am not
positive, but the cpu slot looks to be the same as the one found on
the A3000.
The other machine is housed in pizza-box style case 3" high and 15"
wide and deep. It has a 16MHz 030, the AA chipset, 2.1 ROMS, and
sockets for up to 16M fast RAM and 4M chip RAM. It has the same
floppy drive as the A4000, but the hard drive is only a 52M Quantum.
There is a daughterboard with two Zorro III slots and one inline video
slot, but it looks to be very cramped in there. The cpu slot is in
the same orientation as that of the A3000 and A4000, but there is not
much clearance. It is a very nice compact package and manages to look
even "sexier" than the A3000/A4000.
Both machines sport the same I/O ports, starting with the same ports
found on the A3000. The floppy drive and serial ports are now stacked
in the same way as the SCSI and parallel ports, as are the RGBA, VGA,
and audio ports. There is a microphone port that works with the built-
in digitizer, with 8bit 22kHz sampling possible. Not exactly CD
quality, but better than the toy CODEC samplers found on the NeXT,
Mac, and others. The keyboard and mouse ports are on the rear of the
machine, with the joystick ports stacked vertically. This stacking
leaves just enough room for a pair of MIDI ports and another port that
was covered with a plastic cap on both of our units. We pried it off
and it looks like a PCMIA slot, but we've not been able to confirm
this. Given that the A600 has one, this would not be a bad idea,
but it seems odd that it was covered up like that.
The new mouse looks to be the same as the pregnant mouse, but the
A3000 came with a three button and the other machine a two button.
Both had standard A3000 keyboards. The most shocking thing about
these machines is how much they feel like existing Amigas instead of a
new breed.
The AA chipset is a real improvement over the ECS, but it may not be
enough to keep the Amiga competitive for another 7 years. Some of the
chips are similar to those in the ECS, but none look to be drop-in
replacements for existing machines. Agnus, Denise, and Paula have
been improved and all three are now surface mount chips roughly the
size of the fat Agnus. There are three other chips that have tape
covering the names, but one of them is certainly an Amber type de-
interlacer chip. It has what 1M of VRAM in order to handle the
increased color depths and de-interlaces all but the highest
resolution modes. We peeled back the tape a bit on the other two
and one is named Lisa, the other was just a number. The Lisa chip
appears to be responsible for the graphics, but its relationship with
Agnus and Denise is not so clear. The other chip may be the rumored
DSP chip, but none of the software we have mentions it specifically.
There is an A/D chip for the microphone and two D/A chips for the
audio in the same general area, so they are probably related.
Amiga owners will be surprised at some of the features of the AA
chipset and disappointed with others. The resolutions supported are
similar to those of the ECS, with the addition of the 800x300, 800x600
interlaced, 1280x480, and 1280x960 interlaced. The Amber de-
interlacer works with all of the modes, but most SVGA monitors can't
handle the non-interlaced 1280x960 mode. All modes can be up to 8
bitplanes except for the 1280 modes, which are limited to six. The
palette is 24 bit, but there is a way to simulate 12 bit for
compatibility with some older software. A pleasant surprise is the
SuperHAM mode which uses 10 bits to allow for pseudo-24 bit color.
This works in the 320 and 640 modes and is nothing short of
spectacular, with the bonus of being able to handle up to 30fps for
some amazing animation. The 800 and 1280 modes have 8 bit 256k color
and 6 bit 4096 color HAM modes, respectively. There is still a
problem with fringing on raw images, but the better programs seem to
do a pretty good job with reducing the problem. The sprites now
change to match the resolution of the screen, so pointers look much
more professional. They may be up to 64 pixels wide, with no height
limitation. There are still only eight per scanline, but the number
of colors is up to 16 in all modes except for 1280, which is only
four. All in all, these Amigas have graphics that hold their own
against offerings for the PC and Mac, but they won't be able to last
for another seven years without improvement.
We have not done much with the audio, but 16 bit four channel sound in
up to 56kHz is available. A neat trick is that up to 8 8 bit channels
at 56kHz and up to 16 8 bit 28kHz channels can be emulated. We don't
have any software that takes advantage of these modes with the
exception of the digitizer, but there is a lot of potential.
The 2.1 OS is pretty much the same as what has been posted on the
nets, but it really looks awesome on the new displays. We have found
the 800x600 256 color Workbench to be very nice and snappy enough to
be useable. The blitter may have been improved, but it does not feel
like it is 4x faster as some like to claim. There are only a few
programs that don't work on these machines, and all of those are pre-
2.04. If the developers have followed the guidelines set by
Commodore, they should not have any problems.
There will probably be more than a few folks who are pissed off by me
letting the cat out of the bag, but it looks like something is needed
to keep more people from joining the mass exodus. These machines are
stable enough for production, but the higher-ups seem to have their
heads up their asses and won't release them. I guess I really should
not even bother trying to figure out Commodore's idiocy, but it is
frustrating to see such potential wasted.


View File

@@ -0,0 +1,235 @@
. .
/\_ /| /\_ /\_ /\_ /| /\_ /\_ /\_
/ _ \ | / _ \ / _ \ /__ \ / | /__ \ / _ \ /__ \
__ / |__\|__/ | \ | \ | \ |__/ | \ | \ | \ __
__ /\_/_// __| | \_ | \ | \ | \ |A \_ _ \ | \ | \\_\_ <20>/\__
\/ \_\\ | | / | / | / | / |V / | / | / | //_/ \/
.:\__|\_____/_____/_____/_____/_____/__|__/__|__/_____/:.
<20>---------------------------------------------------------<2D>
#08-865804 -- PLEASE CALL AT 9600 / HST -- #08-865804
Be very welcome to **FLOODLAND BBS - Hagsatra !
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Great File Areas!
Great Mail Areas!
Great Porno Areas!
No Shit -- Great Axs To Great Users !
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>׫<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
/\ /XX/ D<>E<EFBFBD>C<EFBFBD>A<EFBFBD>D<EFBFBD>E S<>W<EFBFBD>E<EFBFBD>D<EFBFBD>I<EFBFBD>S<EFBFBD>H H<>E<EFBFBD>A<EFBFBD>D<EFBFBD>Q<EFBFBD>U<EFBFBD>A<EFBFBD>R<EFBFBD>T<EFBFBD>E<EFBFBD>R<EFBFBD>S \XX\
/ \ .__. |\ .__.
\__/ __ | |_____________________ _______| \ ._____ __ | |______________
| \/ \| | _ / ________ \/ ___. | \|____ \/ \| | ____/ ___/
| \ \ | \ / _)__| _ _/ |__| _ \ _ \ \ | |__/\ _)_.
| \ \ | \/\ | | | \_ | | \ | \ \ | | \ | |
|__ / |\__|__ / \______|__| /____| |____/__| / |\__|_____ /_____|
` \/ | \/ |___/ |__| |__/ |r0t0x!'93\/ '
\__| \__|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>׫<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
This file was downloaded from:
_______ __ __ _______ ___________ ______ ______
/__ __// /_/ // _____/ / _____/\__ \ / ____// ____/
/ / / __ // ___/ / ___/ / \/ // /\ // ___/
/_/ /_/ /_/ \__/ \__/ /____/ \_\/_/ \__/
-*- The Silents World Head-Quarters -*-
0 Day Amiga & 0 Day Console Warez!
3 Nodes! all 16.8 Dual HST's
Running GVP 33Mhz! '040
Multi-Node Chat
1-716-655-4940
OnLine Since 1985
No Freeloaders here, you want to read this file, then download it!!
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
***************************************************************************
****************** First reports of the A5000 *************************
***************************************************************************
Commodore have gone for much like the A2000 large case to contain the power
of this new machine. on the front panel it supports two 3.5" drive (one as
standard) and two 5.25" (one holding a CD-Drive). This is the first machine
to really support multi-tasking with it's three processors on board.
Processors
----------
The A5000 will incorperate the new motorola 68060 + two 68EC040 processors,
the '060' is clocked at over 35MHz and the two '040' clocked at 25Mhz
will give the A5000 a total speed at over 60MHz. The '060' with sit on a
seperate card in the cpu slot (as in the A4000) and both the '040' will
sit on the motherboard. The '040' have been design to help the '060' ,this
will be most evident at times of heavy multi-tasking. As a result of this
configuration the A5000 will have a new kickstart.
Kickstart/Workbench
-------------------
The A5000 will have kickstart/workbench 4.0 (beta version has 3.2). This
kickstart is required to control the three processors , earlier kickstarts
will not be able to access the '040' (but the '060' can). This kickstart
will not be released for the older machines although 4.1 will. This
kickstart/workbench will enable the '040' to be assigned to different tasks
and as shiped one will handle all screen and sound processing and the other
will handle all of the I/O devices. This kickstart is a 1Mb chip and will
be shipped on the hard drive (to be confirmed). If it is released in chip
form then the chip will be placed on it's own card. This kickstart will have
a user-selectable kickstart screen so the user can select which kickstart to
load (either in slot or on harddrive) and the A5000 has been tested with
kickstart 1.2 upwards so there will be no more compatability problems.
Chipset
-------
Commodore have done it again in changing the chipset as there are several
new chips. The A5000 with workbench 4 is now capable of operating in all
modes with a 512 colour pallet. To maintain the speed require to operate
in this mode one of the '040' can be assigned to the screen display (as
it is shipped). The maximum screen resolution is 4096 x 4096 with over
32 million colours on screen. This new chipset will be able to detect which
chipset it should use (orig. ,ECS ,super-ECS or AGA , super AGA ) by
detecting which kickstart is currently running or which is selected at a
cold boot.
Ram
---
As the new chipset has a higher resolution and more colours more chip ram is
required and commodore have responded by having 16Mb of chip ram on the
motherboard (expandable to 64Mb) and 16Mb of fast ram (theoretically
expandable to 1024Mb, tested to 256Mb). The chip and fast ram have been
organised on a 32-bit wide structure as in the A3000 + A4000.
Drives
------
The harddrive interface is the new scsi2 standard with a 210Mb slimline
hardrive mounted as standard. The floppy drive is a high density type and
the CD-drive is a standard A2000 internal drive.
Sound
-----
The sound is now 16-bit as the A4000 was supposed to have.
Internal Connectors
-------------------
There are eight zorro III expansion slots with three IBM slots in parallel
with three zorro slots. There is no cpu slot as the '060' is on it's own
board and thus can easily replaced. If the kickstart is to be shipped on
the harddrive there will be an empty slot to place a new kickstart.
External Connectors
-------------------
It has all the standard ports (disk drive, serial, etc.) and the keyboard
connector (same pins as the A4000) at the back, the mouse ports are on the
right side towards the back.
Price
-----
Well that depends on what pack you want as as of this moment there are two
1 all above = $3499 (Appox.)
2 all above plus
Amax v3.0 Mac emulator (100% compatable with all known software) +
Golden gate IBM emulator = $3999 (Approx.)(uses two zorro III slots)
This information has been confirmed by Commodore.
.....and don't forget to call.....
___ . . . * . .
. / /\ *_________ _______ _______ . ______
/ / / /\ \ . \ \ . /\ \ ./\ \ .
o . /__/ /_ . / \ \ . \ \ / \ \/ \ \
/__/\ \/\__ / \________\ / \______\. / \______\ \_____\
_\__\ \ / /\./ / _______// \_ __ \/ / ___ / / ____/
. /__/\/ \ \/ // / / \ .__/ / / \ \ / / \/_/ / /__\
/ /\ /\ \ // / /___\. \ \ / /\ \ \ / /\____\ / ____/
/ / /\ \ \ \// / _____/___\ \ / / \ / / / /\/__ / / / \ *
/__/ \ \ \_\/ \ / / \ \/ /____\/ / / /___\/ /\/ /_____\
\__\/\ \ \ \ \ / / \__________/\/________/ \_______/
\ \ \_\/ . \/ \_____________________________________________\ .
\ \ \ \ /
\__\/ \ -*- The Silents World Head-Quarters -*- /
\____________________________________________/ .
. . . . . . .
. . SysOp: PLANET MASTER . .
3 NODES! 7 1 6 - 6 5 5 - 4 9 4 0 . 3 NODES!
. * 0 DAY AMIGA WAREZ 16.8 Dual HST's 24Hrs/7Days 0 DAY CONSOLE WAREZ
. Running GVP's G-Force '040/2000 33Mhz! . .
. . 900 Megs On-Line Multi-Node Chat . .
OnLine Since 1985 *
. . . . .
. . C A L L T O D A Y ! ! . . .
%+%+%+%+%+%+%+%+%+%+%+%+%+% YA GOT THE WAREZ FROM %+%+%+%+%+%+%+%+%+%+%+%+%+%
___________ ___________________________/\ ___________ _______________
\SP \ \ ____________ __/ \__ \ \ \ ______/
\ _ \/ /__ _______ / \ / \ _ \/ /__
\ / \ \ ___// //_____/ \ \ / \ \ ___/
___\/___\ \ /___/__ /______/ | \___\/___\ \ /______
\ / \ \ / / / / | \ / \ \ / /
\ /__/ / /\ / _ \ /__/ / /
\ _________/\ / \ / |_____/\ _________/\ /
\/ \____/ \_____/\_______| \/ \____/
G E R M A N H E A D Q U A R T E R S
<< ELYSION DISTRIBUTION SIDE >>
\----------/\/-> GANDALF & COROPLEX <-\/\-----------/
:+:AMIGA:+: :+:IBM:+: :+:SNES:+: :+:MUZAK:+:
[1] +49-202-572656 [2] +49-202-590720 [3] +49-*S-O-O-N*
(16.8-DHST) (14.4-DHST) (19.2-ZYXEL)
_ _ _ _
/\_ ______________)\ / \______ / \____/\ ______________)\
/ / / __ \ ______// ____ \/ / __ \ __ \ ______/
/ / _/ / / /___ \ / __/ / / / / / / / /___ \
/ \_/ \ /_/ /___/ / / /___/ \ / /_/ / /_/ /___/ /
\ _____/_____/ ____/ \___ /\__/\_/\____ /______/ ____/CX
\/ \_/ \/ \/ \_/
* 4 NoDaZ RuNNiNG LaTEsT /X ReG. oN A3000 - 25MhZ - 500Mb oNBoARd *
* 24h oNLiNE FoR eVeR! - HST 16.8 DuAL StaNDaRD RuLeS *
* DECADE ReLeASeS FiRST - CooL SySoPS! - FuCki`N FAAAAST *
* A LoT oF FoREiGN CaLLeRS ArE LoCATeD HeRe *
* WaIT At LeASt FoR 4 NoDaZ *
* AlWAyS ReMEMbER - wE ArE ThE FuTUrE, BCoZ oF ReAL FRieNDshIP! *
UPLOAD-DATE: DD/MM/YY UPLOAD-TIME: 10:40:48
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>׫<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
/\ /XX/ D<>E<EFBFBD>C<EFBFBD>A<EFBFBD>D<EFBFBD>E S<>W<EFBFBD>E<EFBFBD>D<EFBFBD>I<EFBFBD>S<EFBFBD>H H<>E<EFBFBD>A<EFBFBD>D<EFBFBD>Q<EFBFBD>U<EFBFBD>A<EFBFBD>R<EFBFBD>T<EFBFBD>E<EFBFBD>R<EFBFBD>S \XX\
/ \ .__. |\ .__.
\__/ __ | |_____________________ _______| \ ._____ __ | |______________
| \/ \| | _ / ________ \/ ___. | \|____ \/ \| | ____/ ___/
| \ \ | \ / _)__| _ _/ |__| _ \ _ \ \ | |__/\ _)_.
| \ \ | \/\ | | | \_ | | \ | \ \ | | \ | |
|__ / |\__|__ / \______|__| /____| |____/__| / |\__|_____ /_____|
` \/ | \/ |___/ |__| |__/ |r0t0x!'93\/ '
\__| \__|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>׫<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>

View File

@@ -0,0 +1,175 @@
This is the CORRECT way to make your A501 chip ram!!
There have been other docs floating around saying to toggle the JP7A jumper,
but this is not true! Clear it instead! For all of you who have tried the
A501 chip ram fix and got nothing but a system crash on bootup, this is the
doc 4 u :-)
Thanks to Greg Change (gchance@ecst.csuchico.edu) for information on how to
correctly do this :-)
<<<DIRECTIONS ON HOW TO CONVERT YOUR A501 CARTRIDGE TO CHIP RAM>>>
DISCLAIMER: Attempting to conduct this procedure will by all means VOID YOUR
WARRANTY! I shall not be held responsible for any problems due
to this modification. I shall not be held responsible for any
problems whatsoever.
Now I've got myself covered, lets' go on.
First off, it is required you have a revision 6A motherboard for this pro-
ject. It will work with others, but requires a 1mb Agnus chip and also re-
quires cutting a trace, which I am not familiar with at the moment.
If you are unfamiliar with electronic repair and modifications, ask an ex-
perienced technician to proceed with the modification.
READ THESE INSTRUCTIONS CAREFULLY AND THOROUGHLY BEFORE INITATING PROCEDURE!!
Tools needed:
#10 Torx Screwdriver
Flat Head Screwdriver
Low Power Soldering Iron
Razor Blade or Exacto-Knife
Anti-Static Guard (optional)
1. Turn off computer and unplug ALL cords and peripherals from the computer.
This includes the A501.
2. Now carefully flip the computer over. WARNING! Do NOT grab the A500 on
the left side if the expansion dust cover is off! If you tug hard enough,
you will snap off the connector, and the only way to replace that is by
buying a new motherboard! It's just an edge-connector and can snap easily.
3. Plug in the soldering iron, just to get it all nice and warm. (make sure
the iron has been on for at LEAST 15 minutes to avoid cold solder joints.
4. Now take the #10 Torx screwdriver and remove the 6 Torx screws around the
edge of the case (at this point the bottom is facing up, of course. Do
NOT remove any other screws on the bottom of your computer. Save the po-
sition of each screw, because some may be intentionally different lengths
5. Flip the computer over again and carefully remove the top. If it doesn't
remove with ease, use the flat head screwdriver to pry open the sides.
Using a large screwdriver will make less pry marks in the case, or put a
cloth around it or something. :-) Hopefully this won't permanently de-
stroy the latches in the sides. They should just snap right back togethor
6. Now remove the cable going from the keyboard to the socket on the mother-
board. It should just pull right out.
7. Now take the keyboard out and set it off to the side for now.
8. Now remove the two Torx screws on the left side of the computer facing
the front. Remove the other two Torx screws holding down the grounding
plate of the external expansion port. Now carefully remove these screws
and the grounding plate. Remember the positions of each screw! Try not
to mix them up! Also- Make note of the text under the disk drive. It
should tell you the model, "B52/ROCK LOBSTER" (if you're lucky) and some
other junk. Now look for the text "Rev. 6A". If your motherboard is not
6A, like I mentioned before, you can still do the mod, but you need to
cut a special trace and unfortunately, I cannot help you with this.
9. Now is the time to don your anti-static wrist strap, or whatever have
you.
10. Look around the edge of the RF shield for small metal tabs holding the
cover down. Now carefully bend these tabs up with the flat head screw-
driver. Becareful not to bend them too much, or they will snap off.
This is what happened to mine. :-)
11. Now remove the RF shield cover.
12. Get ready, here is the time to do the modification. Be careful not to
hit the Amiga's plastic case with the soldering iron. I did this on some
practice soldering equipment (broken VCR's etc) a while ago and once you
destroy the case you're Amiga will no longer look pretty. (thank god I
didn't do THIS :-)
Left|
Side| *BE CAREFUL WHEN CUTTING - Be careful NOT to cut any other traces*
of |
Ami | Fig 1
++ ____
E :: -| |-
X :: -| |-
P :: -| M |- 1| 13. Now locate Jumper 2 (JP2) Between the CPU
A :: -| C |- | JP2 and the ROM chip (just above and left of
N :: -| 6 |- 2| _ the ROM chip.) The jumper consists of three
S :: -| 8 |- =| |= solder "pads". See how Fig 1 has these pads
I P:: -| 0 |- 3| =|R|= numbered. When your computer arrived, pads
O O:: -| 0 |- =|O|= 2 and 3 should have been set. We are about
N R:: -| 0 |- =|M|= to change this. Now take your razor blade
T:: -| |- =| |= or Xacto knife and just the trace between
:: -|____|- =|_|= pad 2 and 3. Make sure, and check with a multi-
++ meter or magnifying glass that there is no
connection between these two pads. Now take
your HOT soldering iron and solder, and
connect pads 2 and 1, just like the jumper
= depicted in Fig 1. Make sure it is a solid
= Fig 2 connection and not a cold joint.
=
=
= 14. Now it is time to locate the other jumper,
JP7A = which is just left of the connector to the
= trapdoor (where the A501 goes). Search for
1| = Trapdoor another three-padded jumper, labeled "JP7A"
= or JP7. Now cut the trace which was connecting
2| = pads 2 and 3. Make sure it is a clean, solid
= cut. This jumper should be left open, and no
3| = pad should be soldered to another.
=
=
=
15. Now check and make sure all connections are firm and clean, and replace
the RF cover. Then push down the metal tabs and make sure the cover is
secure at those points.
16. Now replace the grounding plate and CAREFULLY screw the two Torx screws
in. These are special screws- so as soon as it feels firm, no NOT turn
ANY further! This can strip the screwholes and damage your case perm-
enantly. Remember to put each screw in it's dedicated position.
17. Now replace the other two Torx screws and once again screw them in just
until secure. Remember once again to put each screw in it's dedicated
position.
18. Replace the keyboard and set it in the special slots so it is secure.
Carefully replace the keyboard cord, and make SURE it is inserted the
correct way. If it is not then I cannot guarantee your system will boot
up and work correctly.
19. Now snap the top case of the A500 back on. Make sure it is perfectly
aligned and all.
20. Now carefully flip over the A500, and remember not to grab the edge-
connector! I have never seen this incedent happen but I'm sure it has.
Such a simple mistake could cost you a whole new computer/motherboard.
21. Now insert each Torx screw. And once again remember to put each screw
in it's dedicated position. (whew!)
22. Now return the A501 to the trapdoor, close it up and flip the Amiga
over. (and now I KNOW you know not to grab the edge-connector :-)
23. Plug all other peripherals and cords back in, and turn the machine on.
24. If it boots up O.K, then hopefully you're in buisness. Now run a program
like SysInfo or PerfMon to make sure you have 1024k of chip ram (1mb)
25. Have fun! It is now possible to load large large mods, have more graphic
data in memory at once, play better demos, and, in short, fit along with
the rest of the world! :-) Good luck!
*** If you are having any problems I encourage you to check all of these
steps and make sure nothing was left out or improperly done.
Stay Cool with your new 1mb of Chip Ram,
Bill The Cat (wjhun@oswego.edu)
(Will Jhun)

View File

@@ -0,0 +1,484 @@
This document was exported from WP 5.0 and some of the formatting codes
were lost (especially footnotery). Please pardon the occasional anomalies
especially out-of-place "1"s which were originally superscripted (footnote).
MEMORY EXPANSION IN 80x86-BASED COMPUTERS UNDER MS-DOS
prepared by
John Wilson, Hyperdyne, Inc.
Annandale, VA
IN THE BEGINNING ...
In the beginning, the was the 8080 microprocessor. The 8080
was, defendably, the "first" microprocessor.1 When the 8080 was
invented, memory for computers was very expensive. The 8080 could
directly address 64 thousand bytes of information, which was a very
great deal in those days. Few systems (or more correctly, few
system owners) could afford to actually place a full 64 K of memory
in their systems. But things changed quickly. The Silicon Valley
guys learned to make transistors smaller and better and it became
much more economically feasible to talk about fully populated 64K
machines. On the software front, things like spreadsheets and word
processors were being invented. These programs were hungry for
memory and the microcomputer user rapidly outgrew the 64K box.
Before going on with the story, a little digression into the
origins of the 64K limit. This limit was the direct result of the
fact that the CPU chip had only 16 address lines. The address
lines are a set of wires coming out of the CPU which allow the CPU
to indicate what item of memory it wants to read or write. In most
computers, the size of the "pieces" are bytes, or 8-bit characters.
These 16 wires are called the Address Bus. The voltages on the 16
address lines are interpreted as a binary number (with the first
pin representing the 1's place, the second pin representing the 2's
place, the third pin representing the 4's place, etc.) the
resultant number is the Address being addressed by the CPU. The
number of distinct patterns of 16 things, each of which can have
two values, is 2 raised to the 16th power, or 65536. This number
is 64 times the quantity "1K" which is 1024. (Early on,
programmers engineers decided to use the "K" as a unit of counting
things like memory because it was a nice power of two and figured
it was close enough to a "real" thousand that nobody would notice).
The point of this story is that the original microprocessors could
only address 64K because of the simple reason that they only had
16 address lines. Why didn't they just build one with more address
lines? Well its not that simple. Those address lines had to have
circuitry driving them, and other circuitry to actually generate
the 16-bit addresses, and other circuitry to decode the new
instructions that would use more than 16 bits, and so on, and so
on. And this circuitry was made of transistors. And,
unfortunately, the state of the art of chip manufacturing did not
allow chips to be built with many more transistors. So, mankind
waited for the silicon boys to learn how to fit more transistors
on one raisin-sized chip.
Meanwhile, back the ranch, The Intel Corporation, in a stroke
of electromarketing genius took the basic 8080 architecture and
doubled up a small portion of the internal workings of the CPU's
address circuitry. They basically duplicated the address register
(the transistors that hold the pattern of bits to place on the
address bus), slid it left 4 bits, and added some simple circuitry
to add it arithmetically to the "old" address register. An so was
born the infamous Intel Segment Register. By making this simple
kluge to the 8080, Intel created the 8086 and 8088 microprocessors
which now effectively had TWENTY address lines and could therefore
address 2 to the 20th locations, a little over one million bytes.
This new unit was called a Megabyte even those it was further away
from a million than a "K" was from a thousand, but then again you
bought the "K", didn't you? The 20 bit address bus allowed the new
amazing spreadsheets to really do some amazing things. This, in
turn allowed Intel to beat competitor Motorola to the marketplace
(who were expanding the address bus the "right" way in their 68000
family). This in turn led IBM to select the Intel family over
Motorola's as the basis of their new PC, and the rest is history.
Using the power of the 8088, the Microsoft corporation adapted
the CP/M operating system to the new chip, and, using its new
power, created MS-DOS. Because of a lot of reasons, the 8088 and
MS-DOS took over the world. And everyone was happy. Except .....
the programmers kept getting more bold in the ways they found to
use memory, and the users wanted still BIGGER spreadsheets, and
started playing with things like CAD/CAM, DBMSs, Artificial
intelligence, desktop publishing, etc, all of which had insatiable
appetites for memory. The silicon boys kept up with the hunger by
developing bigger and better CPUs, the 80286, 80386, 80486 etc.).
These 80286 had a 24-bit address bus and could therefore address
16 MB of memory directly. No one could possibly want to put that
much actual memory in a PC, right? In a pre-emptive first strike,
they also created 80386 which had a 32-bit address bus and could
therefore address 2 to the 32 bytes or over 4 billion
bytes! (Pow! Bam! Take THAT, Power User). The day had finally
come when the CPUs sitting on desktops could finally address more
memory than anyone could afford to buy.
-----------
1 Yes, there was an 8008, and a 4004 before that, but their only,
surviving significance today is that they were the predecessors of
the 8080.
----------
End of problem, right? Wrong. Unfortunately, there were
millions and millions of the 20-bit machines out there now (in the
mid-1980's). Probably more significantly there were hundreds of
millions of dollars invested in MS-DOS software that did not know
how to use the new 32-bit instructions and capabilities.
Especially MS-DOS. (Unix and OS/2 and a number of other less well-
known operating environments do use the 32-bit mode, but MS-DOS was
still king). Because Intel wanted to sell more than 3 of these new
chips, they wisely decided to build "modes" into the new chips to
make them compatible with MS-DOS. A Mode is essentially a switch,
inside the CPU that turns it into another chip, insofar a all
logical functionality is concerned. So when you're running MS-DOS
on your shiny new 386 or 486, you're still running with only 20
bits of address and consequently a 1 MB address space. This mode
is called real mode and the lower 1 MB of addressable memory in
real mode is called conventional memory.
The solution? EMS or Expanded Memory Specification.
EXPANDED MEMORY
Expanded memory is a way to allow more than 1 MB of memory to
be used by MS-DOS applications. How can this be? The CPU can only
address 1 million different addresses; how can I have more than
one MB in my PC? The answer is that the CPU re-uses the same
address to get to more than one byte of data. It does this by
allowing any one address to actually be used to reference several,
distinct, physically different storage locations - but only one at
a time, of course.
EMS memory usually resides on special "EMS cards", like the
AST "RAMPage". (I say usually because there are some clever ways
of implementing EMS on 80286 and 80386 machines that don't use
"special" EMS cards; this is discussed later in the section
entitled "Software Approaches to EMS"). The EMS card has memory
chips on it just like regular system memory cards. The difference
is that the memory chips on the card are not connected directly to
the CPUs address bus. These chips are actually wired to another
address bus, totally contained on the card, that has more than 20
address bits, usually 24 or so. Where do these extra address bits
come from? Well some of them are just passed-through systems
address bits. The rest come from special storage locations onboard
the EMS card, called page registers. How are these page registers
loaded? These registers are themselves directly addressable by the
CPU. To access a byte of data in EMS memory, the CPU first loads
the page register (itself simply another location accessible by the
CPU) and then makes a normal memory reference. Some of the bits
come from the address bus, and the rest come from the bits
previously squirreled away in the page registers. Thus, it can be
seen that a given address on the regular CPUs address bus forms
only part of the address needed to select a particular byte of
memory on the EMS card. To uniquely identify a byte, you need to
specify the regular address plus the contents of the page register.
It follows that one CPU address can correspond to several EMS
memory locations, each of which differs only by the contents of the
page register. The CPU can thus access more than 1 MB of memory
on the EMS card by using its normal address bus augmented by the
page registers.
HOW IT ALL FITS TOGETHER
In the early versions of EMS, all EMS memory was mapped to
appear to be in a special address range in the range of all
possible addresses accessible by the CPU. This was usually at
addresses between D0000 and DFFFF (in hexadecimal notation). This
includes exactly 64KB possible addresses. This area of address
space is called the Page Frame, an analogy to a frame around a
picture. The page frame is logically divided into 4 16KB "pages".1
When we say that the EMS memory is "mapped" into this range, what
we mean is that the EMS card does not respond to any addresses
outside this range. When an address is placed on the address bus
----------
1 For the sake of simplicity in the following discussion, the
multi-page nature of the page frame will not be mentioned further.
The explanations apply to each page within the page frame
individually. It should also be noted that, strictly speaking, the
4-page, 64 KB page frame applies only to EMS versions 3.2 and
earlier. In EMS 4.0+, the page frame is not limited to just 4
pages and can, in fact, be all or partially located within the 640
KB address range normally occupied by conventional RAM. This
feature is used by various multitasking overlays to DOS, such as
Desqview, which actually allow program code to be paged in and out.
----------
outside this range, the EMS board remains totally passive, just
like it was not plugged in at all. When the CPU asserts an address
within this range, the EMS board comes to life and responds like
regular memory. When the CPU references the EMS address space, the
CPUs address bits are used along with the page register bits to
actually specify which EMS byte to access. The net effect is to
make the EMS card memory appear as a series of "banks" which can
be made (one at a time) to masquerade as "real" system memory at
a certain address in the range D0000-DFFFF hex. These banks are
called EMS pages. Within each page, the practically any byte
addressed is selected by the system address bus bits that were
passed through by the EMS circuitry. The particular page selected
is determined by what value was previously written into the EMS
page registers. All the physical EMS memory locations that respond
to a common value in the page registers are said to be in the same
page. That is, once that special value is loaded into the page
register, any of those locations can be accessed by the CPU using
normal memory read/write instructions. If another value is loaded
into the page registers, a totally different set of EMS memory
bytes (i.e, physically different transistors) are made to respond
to the same CPU addresses as before.
The model that this behavior suggests is that the EMS memory,
divided up into 16K pages, exists out in limbo somewhere, and is
unable to be addressed by the CPU in any way. The CPU can however
invoke the right magic to instantaneously plug any one of these
disembodied pages right into its addressable memory space. The
magic consists of loading the Holy Page Register. The CPU can,
with equal ease, banish that same page back into limbo, by putting
a different value in the page registers. The thing that makes this
magic useful is that, any data stored in an EMS page is faultlessly
remembered even after it has been banished to zombie land. And,
furthermore, that data can be read by the CPU just by remapping it
into the address space.
This means that an MS-DOS program can juggle megabytes of
memory resident data using just 20 address bits in good old 8088
real mode. Of course at any one given instant, most of that data
is in zombie land, but no matter, it can be called back from the
netherworld with a simple, hardware-assisted incantation in
microseconds.
EMS MEMORY MANAGERS OR DRIVERS
Each manufacturer of an EMS board is free to actually design
the actual circuitry of his EMS board to suit his whim, his
engineers, and his marketing plan. Most boards are different in
a real, physical way from one another. The magic incantations
necessary to shuffle EMS pages between here and Hoboken is
different for each one. Does each application program need to know
which particular brand/model of board is plugged in and what its
religion is? Fortunately not. Enter the Enhanced Memory
Specification. EMS is a specification of a standardized way that
applications interact with EMS hardware. This interaction is via
the software interrupt feature of the 8088/MS-DOS. All
applications that wish to use EMS memory call interrupt 67H the
same way with the same arguments, no matter who made the board.
When the interrupt is issued, control passes to the memory resident
EMS management software, usually called either an EMS memory
manager or EMS driver (same thing). This piece of software is
unique to each brand of board and is normally supplied by the
boards vendor. It is the express purpose of this piece of software
to turn the standard EMS invocation arguments into the particular
set of hardware incantations understood by the board. Beware
mixing boards and drivers from different sources! This may work
in rare circumstances but will eventually lead to consumption of
excessive amounts of alcoholic beverages.
EXTENDED MEMORY
OK. Now we know how EMS works: it expands a selected 64KB-
sized range of addresses in the CPUs address space to several
megabytes by paging-in one chunk at a time. But what about
"Extended Memory"?. Actually extended memory is a much simpler
concept. Remember those unused address lines in the 80286 and
80386? (MS-DOS and other real-mode applications only use the first
20 of the 80286's 24 and the 80386's 32). They were not put there
for decoration. The CPU can be put in Protected Mode and can then
use those extra address lines to address megabytes and megabytes
of memory without needing the help of the special EMS hardware like
page registers and private (EMS-card) address busses. In protected
mode, the CPU can address all physical memory in the same, natural
way. In fact, the one megabyte boundary loses all significance,
except for the painful memory of what it used to be like back in
that awful 20-bit real mode. Extended memory is thus just like
conventional memory, just extended up to higher addresses. The
down side is, of course, that MS-DOS does not know how to switch
into protected mode, and wouldn't know what to do there if it did.
Rectifying this shortcoming, and all its implications, is the sole
reason for OS/2.
SOFTWARE APPROACHES TO EMS IMPLEMENTATION
The discussion of EMS so far has talked exclusively about
hardware approaches to EMS. In the 8088, hardware must be employed
to supplement the deficiencies of that chip. In the 80286 and
80386, however, there are software-only methods to give the same
functionality as EMS hardware. Both approaches use extended memory
for the storage of EMS page data.
In the 80286, EMS memory contents are brought into the 1 MB,
conventionally-addressable range by physically copying 16 KB blocks
of memory to and from extended memory. The EMS "page" that the
application program sees is actually a block of conventional memory
that has been filled with the contents of a block of extended
memory. The copying is done by a piece of software known as an
EMS Emulator (driver) which is usually loaded like other DOS device
drivers in CONFIG.SYS. Note that to access the extended memory,
the EMS Driver must switch into protected mode, copy the data, then
hightail it back into real-mode to keep DOS happy. The extended
memory blocks, in this scheme, are emulating a block of memory that
would normally be physically resident on the EMS card. Note that
these are not really "paged"-in in the same sense as true EMS
pages, nor is there any "mapping" going on. All physical memory
contents retain their actual addresses as far as the CPU is
concerned, only there contents are copied back and forth.
The advantage of this scheme is that EMS functionality can be
achieved in machines without actual EMS hardware. A disadvantage
of this scheme is its performance. Whole 16K blocks must be moved
to access a new page (which takes milliseconds), in contrast to
"true" EMS where just a page register must be loaded (which takes
microseconds). Another disadvantage is the fact that some precious
conventional memory is consumed by the emulated page frame.
In the 80386, the solution is much more elegant. In true EMS,
the contents of the page registers can be thought of as a memory-
mapping table. That is, the contents of the page register, in
essence, point to a particular block of EMS-card-resident memory -
change the page register contents and a new physical page shows
up in the page frame. The 386 was designed for operating systems
much more sophisticated than MS-DOS; these operating systems take
for granted the presence of memory mapping capability. The 80386
has, in fact, an internal memory mapping facility much more
sophisticated than the crude, bank-oriented page registers of an
EMS card. The 386's memory management unit allows any arbitrary-
sized chunk of physical memory to be mapped to anywhere in the
address space, including the lower 1 MB. And, most importantly,
to the address were an EMS-aware application expects to find the
page frame and the EMS pages contained therein. With the 80386,
hardware within the CPU performs the mapping previously done by EMS
hardware. Programming of the CPUs mapping registers is performed
by a device driver usually known as an Expanded Memory Manager.
Memory managers are written to run on the (standard) 80386 and not
some particular vendor's EMS hardware. This allows third-party
vendors to produce EMS emulators for any 80386. Examples are
"QEMM-386" by Quarterdeck Systems and "386-to-the-Max" by Qualitas.
Finally, there is one more software approach to EMS that can
be used with any machine. That approach is called Virtual EMS and
employs a system's hard disk as storage for EMS pages. A device
driver intercepts EMS calls in much the same way as the approach
described above for the 80286, except that copying is done between
a page frame in conventional memory, and sectors of your hard disk.
This is a clever approach, and allows EMS memory to be much greater
than the amount of memory in your machine, but, because disk is
thousands of times slower than semiconductor memory, this approach
should only be used by the terminally desperate.
APPENDIX - SUMMARY FOR USERS
EMS is the specification of a software technique for making
more than 640 KB (the normal DOS limit) available to your programs.
Put simply, EMS reserves a block of memory space in your PC and
allows a block of RAM (usually resident on an EMS card) to be
switched into that address range. There are generally many
identical blocks of RAM present on the EMS card, each and any one
of which can be "plugged" in -- only one at a time. Your CPU can
use one of these blocks to store data in, and then switch in
another block, store data in that, switch in yet another block, and
so on, and so on. Later, the CPU can recall these blocks in the
same or different order and read back the original data. In many
ways, this performs the same function as your system's disk --
except that it's all done in solid-state memory and is thousands
of times faster.
There are four approaches to actually implementing EMS,
depending to some extent, on what type of machine you have. These
approaches are:
- an EMS memory card (like the AST "Rampage") [any DOS
computer, but usually 8088s or 80286s]
- an EMS emulator [80286 or 80386, but usually only
on 80286's]
- an Extended Memory Manager [386 only] (for example
Quarterdeck System's "QEMM-386 or Qualitas's "386-
to-the-Max" )
- a Virtual Memory Manager [any DOS machine]
An EMS memory card is more than just a memory expansion card:
it contains special circuitry to perform the bank-switching
operation discussed above. To use an EMS card, you will have to
perform two steps:
(1) Configure the EMS card hardware to match your computer's
configuration and (2) install a special EMS card driver for the
board in your CONFIG.SYS file. Details and procedures differ for
different makes and models of EMS cards. Consult your EMS card's
users manual for instructions. Note that drivers are usually card-
specific; you cannot, in general, use Vendor A's driver with Vendor
B's card.
Not all "memory" expansion cards are EMS cards. There is
another type of memory called extended memory which is used by
other operating systems such as OS/2 and Unix. It is also used by
a few DOS utilities, most notably IBM's VDISK RAM disk emulator.
If your computer is advertised as having more than 640 KB of memory
installed, it's a good bet that it's extended memory and not EMS
memory. Few applications can use extended memory, although by using a
software technique which will be discussed in a moment, extended
memory can be made to serve as EMS memory. Before deciding on an
EMS strategy, determine the type of memory your computer already
has installed. Be forewarned: IBM, as usual, has a different name
for extended memory (like everything else). They call it (you
guessed it) expanded memory. So, if you bought it from IBM, and
it's called expanded memory, it's extended memory. Everyone else
pretty much sticks to standard nomenclature but to be sure, look
for the phrase "EMS x.x compliant" in the documentation, where x.x
is usually a number like 3.2 or 4.0.
----------
1 The 'S' in EMS stands for "Specification". EMS is not a
particular way to build EMS memory, rather, it is the specification
of a software interface to it. Different vendors can, and do,
implement EMS differently. What is the same, however, is the way
that applications programs interface to this memory.
----------
Many EMS cards allow the memory contained on them to be
configured as all EMS memory, all extended memory, or a mixture.
If you use VDISK or any other special programs that use extended
memory, you may wish to reserve part of the board's memory for use
as extended memory. Otherwise, there's really no good reason for
not configuring all of your memory as EMS. (Note that EMS boards
are generally more expensive than "plain" extended memory boards
because of the additional circuitry required). Consult your
board's users manual for the proper switch settings or software
settings to give the mix you desire. EMS cards can be used in any
machine, but are usually found in 8088s and 80286s because there
is a better and cheaper way to go in 80386s as will be discussed
below.
EMS EMULATORS
A less common approach to implementing EMS in your computer
is a EMS Emulator. This is a software-only approach that requires
no special hardware to use. It essentially turns extended memory
into expanded memory. Unfortunately, there is a price for this
magic - performance. Because extended memory lacks the special
hardware to switch its address like the blocks of memory on an EMS
card, this software must copy whole blocks of data (16 KB's worth)
back and forth between your program and extended memory every time
a new block is required -- even if it's just to read a single byte.
Depending on the nature of the program, this can be a few times
slower or hundreds of times slower than "true" EMS.
This is not a recommended solution for
that reason, however, if necessary, it can be used. This approach
can only be used on 80286 and 80386 machines which have extended
memory. Machines based on the 8088 (like the original PC and XT)
cannot accommodate extended memory. On the 80386, a much better
solution is described below.
EXTENDED MEMORY MANAGERS
Built into every 80386 is a special capability that can be
used to do an excellent job of providing EMS memory without the use
of EMS hardware. This facility is called the paging unit or Memory
Management Unit (MMU). The MMU consists of circuitry very much
like the switching circuitry onboard EMS cards, except much more
sophisticated. It was actually included for use by advanced
operating systems but can be used quite nicely to emulate EMS in
80386-based DOS machines. The MMU, like the EMS emulators, can
turn extended memory into expanded memory through software-only
means. Unlike those emulators, the MMU, in conjunction with a
piece of software known as an Extended Memory Manager (EMM), does
not suffer any performance penalty. In fact, it is usually faster
than true EMS cards because: the circuitry is onboard the CPU chip;
the 80386 is faster than lower-class machines that usually use EMS
cards; and the extended memory used is often fast, 32-bit system
memory rather than card-based memory which is slowed down by the
relatively slow I/O bus. On 80386 systems, this is definitely the
way to go. Excellent EMMs include "386-to-the-Max" by Qualitas,
Inc., and "QEMM-386" by Quarterdeck systems, Inc.. To use these
EMMs, you need to install them in your CONFIG.SYS file. Like the
EMS cards, you will have to configure them to partition your
available system memory between extended and expanded memory.
Consult the users manual for the package you are using.
VIRTUAL MEMORY MANAGERS
Virtual Memory Managers are another software-only approach to
EMS. These function almost identically to the EMS emulators
discussed above, except that they use the system disk rather than
extended memory as the storage medium for blocks of memory copied
out of your program. As you can imagine, this is excruciatingly
s-l-o-w. Use this approach only as a last resort.

View File

@@ -0,0 +1,472 @@
_ROLL YOUR OWN MINILANGUAGES WITH MINI-INTERPRETERS_
by Michael Abrash and Dan Illowsky
[LISTING ONE]
; This program demonstrates the use of a mini-interpreter to produce
; code that is compact, flexible and easy to modify. The mini-
; program draws and labels a maze and animates an arrow through
; the maze.
;
; Note: This program must be run in 80-column text mode.
;
; Tested with TASM 1.0 and MASM 5.0.
;
; By Dan Illowsky & Michael Abrash 2/18/89
; Public Domain
;
Stak segment para stack 'stack' ;allocate stack space
db 200h dup (?)
Stak ends
;
_TEXT segment para public 'code'
assume cs:_TEXT, ds:_TEXT
;
; Overall animation delay. Selected for an AT: set higher to slow
; animation more for faster computers, lower to slow animation less
; for slower computers.
;
DELAY_COUNT equ 30000
;
; Equates for mini-language commands, used in the data
; sequences that define mini-programs. The values of these
; equates are used by Interp as indexes into the jump table
; Function_Table in order to call the corresponding subroutines.
;
; Lines starting with ">>" describe the parameters that must
; follow the various commands.
;
Done equ 0 ;Ends program or subprogram.
;>>No parms.
SubProg equ 1 ;Executes a subprogram.
;>>Parm is offset of subprogram.
SetXY equ 2 ;Sets the cursor location (the location at
; which to output the next character).
;>>Parms are X then Y coordinates (both
; bytes).
SetXYInc equ 3 ;Sets the distance to move after displaying
; each character.
;>>Parms are X then Y amount to move after
; displaying character (both bytes).
SetX equ 4 ;Sets the X part of the cursor location.
;>>Parm is the X coordinate (byte).
SetY equ 5 ;Sets the Y part of the cursor location.
;>>Parm is the Y coordinate (byte).
SetXInc equ 6 ;Sets the X part of the amount to move after
; displaying each character.
;>>Parm is the X amount to move after
; character is displayed (byte).
SetYInc equ 7 ;Sets the Y part of the amount to move after
; displaying each character.
;>>Parm is the Y amount to move after
; character is displayed (byte).
SetAtt equ 8 ;Sets the screen attribute of characters to
; be displayed.
;>>Parm is attribute (byte).
TextUp equ 9 ;Displays a string on the screen.
;>>Parm is an ASCII string of bytes,
; which must be terminated by an EndO byte.
RepChar equ 10 ;Displays a single character on the screen
; a number of times.
;>>Parms are char to be displayed followed
; by byte count of times to output byte.
Cls equ 11 ;Clears screen and makes text cursor
; invisible.
;>>No parms.
SetMStart equ 12 ;Sets location of maze start.
;>>Parms are X then Y coords (both bytes).
Mup equ 13 ;Draws maze wall upwards.
;>>Parm is byte length to draw in characters.
Mrt equ 14 ;Draws maze wall right.
;>>Parm is byte length to draw in characters.
Mdn equ 15 ;Draws maze wall downwards.
;>>Parm is byte length to draw in characters.
Mlt equ 16 ;Draws maze wall left.
;>>Parm is byte length to draw in characters.
SetAStart equ 17 ;Sets arrow starting location.
;>>Parms are X then Y coordinates
; (both bytes).
Aup equ 18 ;Animates arrow going up.
;>>No parms.
Art equ 19 ;Animates arrow going right.
;>>No parms.
Adn equ 20 ;Animates arrow going down.
;>>No parms.
Alt equ 21 ;Animates arrow going left.
;>>No parms.
DoRep equ 22 ;Repeats the command that follows
; a specified number of times.
;>>Parm is repetition count (one byte).
;
EndO equ 0 ;used to indicate the end of a
; string of text in a TextUp
; command.
;********************************************************************
; The sequences of bytes and words between this line and the next
; line of stars are the entire mini-program that our interpreter will
; execute. This mini-program will initialize the screen, put text on
; the screen, draw a maze, and animate an arrow through the maze.
;
DemoScreen$ label byte ;this is the main mini-program that our
; interpreter will execute
; Initialize the screen
db SubProg
dw InitScreen$
; Put up words
db SetXY,0,0, SetXYInc,0,1, TextUp,'START',EndO
db SetXY,79,20, TextUp,'END',EndO
; Draw the maze
db SetMstart,4,0, Mrt,8, Mdn,4, Mrt,4, Mup,3, Mrt,4, Mdn,3
db Mrt,4, Mdn,8, Mrt,3, Mup,3, Mrt,5, Mup,9, Mrt,17, Mdn,9
db Mrt,5, Mdn,3, Mrt,4, Mup,10, Mrt,12, Mdn,18, Mrt,6
db SetXY,4,2, Mrt,4, Mdn,2, Mlt,4, Mdn,18, Mrt,12, Mup,4
db Mrt,4, Mdn,4, Mrt,11, Mup,11, Mrt,5, Mup,9, Mrt,9, Mdn,9
db Mrt,5, Mdn,11, Mrt,12, Mup,4, Mrt,4, Mdn,4, Mrt,10
db SetXY,8,6, SubProg
dw Box4x6$
db SetXY,8,14, SubProg
dw Box4x6$
db SetXY,24,14, SubProg
dw Box4x6$
db SetXY,54,14, SubProg
dw Box4x6$
db SetXY,62,4, SubProg
dw Box4x6$
db SetXY,16,6, SubProg
dw Box4x4$
db SetXY,16,12, SubProg
dw Box4x4$
db SetXY,62,12, SubProg
dw Box4x4$
; Animate the arrow through the maze.
db SetAStart,3,0, Alt,2, Adn,2, Art,2, Aup,2
db SetXY,0,0
db DoRep,5,SubProg
dw SpinAround$
db Alt,2, Adn,1, Art,9, Adn,4, Alt,4, Adn,8, Art,8, Adn,8
db Alt,8, Aup,8, Art,8, Aup,2, Art,8, Adn,2, Art,7, Aup,3
db Art,5, Aup,9, Art,13, Adn,9, Art,5, Adn,11, Art,8, Aup,10
db Art,8, Aup,8, Alt,8, Adn,8, Art,8, Adn,10, Art,8, Adn,1
db Art,2, Aup,2, DoRep,5,SubProg
dw SpinAround$
db Alt,2, Adn,1, Art,1
db Done
; Subprogram to clear the screen and initialize drawing variables.
InitScreen$ db SetXY,0,0, SetAtt,7, SetXYInc,1,0, Cls, Done
; Subprograms to draw boxes.
Box4x4$ db Mrt,4, Mdn,4, Mlt,4, Mup,4, Mrt,2, Done
Box4x6$ db Mrt,4, Mdn,6, Mlt,4, Mup,6, Mrt,2, Done
; Subprogram to spin the arrow around a square.
SpinAround$ db Alt,2, Adn,2, Art,2, Aup,2, Done
;********************************************************************
; Data for outputting text characters to the screen.
Text_Out_Data label byte
Cursor_X_Coordinate db 0
Cursor_Y_Coordinate db 0
Cursor_X_Increment db 1
Cursor_Y_increment db 0
Character_Attribute db 7
Last_Maze_Direction db 0ffh ;0-up, 1-rt, 2-dn, 3-lt
; 0ffh-starting
AnimateLastCoordinates dw 0 ;low byte is X, high byte is Y
;
; Jump table used by Interp to call the subroutines associated
; with the various function numbers equated above. The functions
; called through this jump table constitute the mini-language
; used in this program.
;
Function_Table label word ;list of function addresses
dw Done% ; which correspond one for
dw SubProg% ; one with the commands defined
dw SetXY% ; with EQU above
dw SetXYInc%
dw Set% ;Set%, MOut%, and Animate% all use
dw Set% ; the function number to determine
dw Set% ; which byte to set or which
dw Set% ; direction is called for
dw Set%
dw TextUp%
dw RepChar%
dw Cls%
dw SetMStart%
dw MOut%
dw MOut%
dw MOut%
dw MOut%
dw SetAStart%
dw Animate%
dw Animate%
dw Animate%
dw Animate%
dw DoRep%
;
; Program start point.
;
Start proc far
push cs ;code and data segments are the
pop ds ; same for this program
mov si,offset DemoScreen$ ;point to mini-program
call Interp ;execute it
mov ah,1 ;wait for a key before clearing the
int 21h ; the screen and ending
mov ah,15 ;get the current screen mode
int 10h ; so it can be set to force
sub ah,ah ; the screen to clear and the
int 10h ; cursor to reset
mov ah,4ch
int 21h ;end the program
Start endp
;
; Mini-interpreter main loop and dispatcher. Gets the next
; command and calls the associated function.
;
Interp proc near
cld
GetNextCommand:
lodsb ;get the next command
mov bl,al
xor bh,bh ;convert to a word in BX
shl bx,1 ;*2 for word lookup
call [bx+Function_Table] ;call the corresponding
; function
jmp short GetNextCommand ;do the next command
;
; The remainder of the listing consists of functions that
; implement the commands supported by the mini-interpreter.
;
; Ends execution of mini-program and returns to code that
; called Interp.
;
Done%:
pop ax ;don't return to Interp
ret ;done interpreting mini-program or subprogram
; so return to code that called Interp
;
; Executes a subprogram.
;
SubProg%:
lodsw ;get the address of the subprogram
push si ;save pointer to where to
; resume the present program
mov si,ax ;address of subprogram
call Interp ;call interpreter recursively
; to execute the subprogram
pop si ;restore pointer and resume
ret ; the program
;
; Sets the screen coordinates at which text will be drawn.
;
SetXY%:
lodsw
mov word ptr [Cursor_X_Coordinate],ax
ret
;
; Sets the amount by which the cursor will move after each
; character is output to the screen.
;
SetXYInc%:
lodsw
mov word ptr [Cursor_X_Increment],ax
ret
;
; Sets individual X coordinate, Y coordinate, X movement after
; character is output to the screen, Y movement, or character
; attribute depending on function number.
;
Set%:
shr bx,1 ;calculate the command number
lodsb ; get the new value
mov [bx+Text_Out_Data-SetX],al ;store in location
; corresponding to
; the command number
Return:
ret
;
; Displays a string of text on the screen.
;
TextUp%:
GetNextCharacter:
lodsb ;get next text character
or al,al ;see if end of string
je Return ;if so, next command
call OutputCharacter ;else output character
jmp short GetNextCharacter ;next character
;
; Displays a single character on the screen multiple times.
;
RepChar%:
lodsw ;get the character in AL
; and the count in AH
RepCharLoop:
push ax ;save the character and count
call OutputCharacter ;output it once
pop ax ;restore count and character
dec ah ;decrement count
jne RepCharLoop ;jump if count not now 0
ret
;
; Clears the screen and turns off the cursor.
;
Cls%:
mov ax,600h ;BIOS clear screen parameters
mov bh,[Character_Attribute]
xor cx,cx
mov dx,184fh
int 10h ;clear the screen
mov ah,01 ;turn off cursor
mov cx,2000h ; by setting bit 5 of the
int 10h ; cursor start parameter
ret
;
; Sets the start coordinates for maze-drawing.
;
SetMStart%:
lodsw ;get both X and Y coordinates and store
mov word ptr [Cursor_X_coordinate],ax
mov [Last_Maze_Direction],0ffh ;indicate no
ret ; last direction
;
; Maze-drawing tables.
;
XYincTable db 0,-1, 1,0, 0,1, -1,0
;X & Y increment pairs for the 4 directions
CharacterGivenDirectionTable db 179,196,179,196
;vertical or horizontal line character to use
; for a given direction
FirstCharGivenNewAndOldDirectionTable label byte
db 179,218,179,191, 217,196,191,196 ;table of corner
db 179,192,179,217, 192,196,218,196 ; characters
;
; Outputs a maze line to the screen.
;
MOut%:
sub bx,Mup+Mup ;find new direction word index
mov ax,word ptr [bx+XYincTable] ;set for new
mov word ptr [Cursor_X_Increment],ax ; direction
shr bx,1 ;change to byte index from word index
mov al,[bx+CharacterGivenDirectionTable] ;get char for
; this direction
mov ah,al ;move horizontal or vert
mov dl,[Last_Maze_Direction] ; character into AH
mov [Last_Maze_Direction],bl ;if last dir is 0ffh then
or dl,dl ; just use horiz or vert char
js OutputFirstCharacter ;look up corner character
shl dl,1 ; in table using last
shl dl,1 ; direction*4 + new direction
add bl,dl ; as index
mov al,[bx+FirstCharGivenNewAndOldDirectionTable]
OutputFirstCharacter:
push ax ;AL has corner, AH side char
call OutputCharacter ;put out corner character
pop ax ;restore side char to AH
lodsb ;get count of chars for this
dec al ; side, minus 1 for corner
xchg al,ah ; already output
jmp short RepCharLoop ;put out side char n times
;
; Table of arrow characters pointing in four directions.
;
AnimateCharacterTable db 24,26,25,27
;
; Animates an arrow moving in one of four directions.
;
Animate%:
sub bx,(Aup+Aup) ;get word dir index
mov ax,word ptr [XYIncTable+bx] ;set move direction
mov word ptr [Cursor_X_Increment],ax
lodsb ;get move count
shr bx,1 ;make into byte
mov ah,[bx+AnimateCharacterTable] ; index and get
xchg al,ah ; char to animate
NextPosition: ; into AL, AH count
mov dx,[AnimateLastCoordinates] ;coords of last arrow
;move cursor to where last
; character was output
mov word ptr [Cursor_X_Coordinate],dx
push ax ;save char and count
mov al,20h ;output a space there
call OutputCharacter ; to erase it
pop ax ;restore char in AL, count in AH
push ax ;save char and count
mov dx,word ptr [Cursor_X_Coordinate] ;store new coords
mov [AnimateLastCoordinates],dx ; as last
call OutputCharacter ;output in new
mov cx,DELAY_COUNT ; location then
WaitSome: ; wait so doesn't
loop WaitSome ; move too fast
pop ax ;restore count and
; character
dec ah ;count down
jne NextPosition ; if not done
ret ; do again
;
; Sets the animation start coordinates.
;
SetAStart%:
lodsw ;get both X & Y
mov [AnimateLastCoordinates],ax ; coordinates and
ret ; store
;
; Repeats the command that follows the count parameter count times.
;
DoRep%:
lodsb ;get count parameter
NextRep:
push si ;save pointer to command
; to repeat
push ax ;save count
lodsb ;get command to repeat
mov bl,al ;convert command byte to
xor bh,bh ; word index in BX
shl bx,1 ;
call [bx+Function_Table] ;execute command once
pop ax ;get back the count
dec al ;see if it's time to stop
je DoneWithRep ;jump if done all repetitions
pop si ;get back the pointer to the
; command to repeat, and
jmp NextRep ; do it again
DoneWithRep:
pop ax ;clear pointer to command to
; repeat from stack, leave
; SI pointing to the next
; command
ret
;
Interp endp
;
; Outputs a text character at the present cursor coordinates,
; then advances the cursor coordinates according to the
; X and Y increments.
;
OutputCharacter proc near
push ax ;save the character to output
mov ah,2 ;set the cursor position
mov dx,word ptr [Cursor_X_Coordinate]
xor bx,bx ;page 0
int 10h ;use BIOS to set cursor position
pop ax ;restore character to be output
mov ah,9 ;write character BIOS function
mov bl,[Character_Attribute] ;set attribute
mov cx,1 ;write just one character
int 10h ;use BIOS to output character
;advance X & Y coordinates
mov ax,word ptr [Cursor_X_Coordinate] ;both x & y Incs
add al,[Cursor_X_Increment] ; can be negative
add ah,[Cursor_Y_Increment] ; so must add bytes
; separately
mov word ptr [Cursor_X_Coordinate],ax ;store new X & Y
; coordinates
ret
OutputCharacter endp
;
_TEXT ends
end Start ;start execution at Start


View File

@@ -0,0 +1,84 @@
Amiga 500 processor accelerator project
by Leslie Ayling
p.o. box 334
GLEBE 2037
Welcome once again to cheapskates corner, where we try and buy the
world for a song. This time around we shall increase the speed of the
processor to just over 14Mhz, double the standard speed,
for under $25 !!!!
You will need the following -
1. an MC68000p12A 16MHz processor. These are available in Sydney from VSI
electronics, 16 DICKSON ave ARTARMON 2064 ph (02)4398622 cost is
$18.90 plus tax ($22.68 tax inc.)
2. a 74F74 D type flip flop. Geoff wood at Lane Cove or Rod Irving
should keep them.
3. a few short lengths of hook-up wire.
4. a SPDT switch.
Refer to the accompanying circuit diagram
Note: Keep the leads to the switch as SHORT as possible.
The circuit is relatively straight forward. the 74F74 is wired as a
positive edge triggered divide by two circuit, which provides the alternate
clock frequency of 14.18Mhz approxiamately. The old 68000 8Mhz processor
is removed and replaced with the 16Mhz version which has is clock pin (15)
bent out horizontally so we can connect our new circuitry to it.
The SPDT switch either connects the normal 7Mhz signal or the new 14Mhz
signal to the 68000's clock input.
The switch can be changed while the machine is on, however it will simply
lock up. Just reset as usual from the keyboard once you have changed speed.
I have a revision 5 board with new 1.3 roms which cope with the new speed
quite happily. Using the program CRAMDEN-SI from MEGADISC 10 to compare
the difference the mod makes :
The standard position gives-
performance relative to amiga 1000 : 1.0
performance relative to ibm pc/xt : 3.2
On high speed the performance is-
performance relative to amiga 1000 : 1.7
performance relative to ibm pc/xt : 5.2
so roughly a 70% increase in performance.
Even though the clock speed is doubled to the processor, the performance
dosen't increase to 2.0 because the agnus and the other support chips are
still running at the same speed as before thus holding the processor up
for a slightly higher percentage of the total time than before.
This mod basically gives the same capability as the CMI accelerator board
priced at $399 in sydney, with the exception that it isn't software
controlled. However when it's only costing 1/16th the price one cant
really complain!!.
If you have any queries or would like the mod installed in your machine,
either contact me direct or via Megadisc.
The machine should work on the 1000 and 2000 however the pin numbers may
be different.I suggest you compare the a500 schematics with that of your
machine and make note of the differences.
Hope this is of some help...........regards Leslie Ayling.
#addendum#
One machine this mod was carried out on had trouble with the one of the
disk drives at high speed. It appeared to be trying to step the head of
the internal drive faster than the drive could physically move and
refused to boot.When I connected a drive with a 5ms track-track access
time and booted off of it the problem dissappeared.
I have a patch for this problem for normal DOS disks to slow down the
step rate which sits in the boot sector.It may be a problem however for
protected software or non-standard boot sector type programs.
Don't despair however the patch is very small and should fit in
somewhere anyway.Just drop me a line. If your machine exhibits the
problem, the patch disk is available DIRECT from me with various usefull
disk speedup utils and a Trackdisk step-rate alteration program, plus
loads of other priceless information on gurus, reset program flow,
diagnostics all on an ARP1.3 system disk for the princely sum of $5 !!
There should be no problem with HARD disks however if anyone encounters
any please let me know........thanks.

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,382 @@
How to connect a PC to a Videocrypt decoder
-------------------------------------------
Markus Kuhn -- 1994-06-19
The easiest way to connect your PC to a Videocrypt pay-TV decoder is to
use the card slot as an interface and connect it with a voltage
converter (MAX232) and a TTL open collector driver (74LS07) to the
RS-232 serial port. This way, you don't even have to open the decoder
and the PC can now act as a smart card.
WARNING: In order to build the adapter described below, you will at
least require some basic hobby electronics experience. If
you don't understand, how the described circuitry works,
better don't use it! Although the described procedure is
relatively secure, serious errors might in the worst case
damage both your PC and your TV system.
The chip cards used by the Videocrypt pay-TV system follow exactly the
specification ISO 7816 (you might find this international standard in a
good library, if you are interested in more details). Also, the
protocol is the "asynchronous half duplex T=0 protocol" with "active
low reset" and "inverse convention" as defined in this standard. The
following description may also be used in order to connect computers to
other ISO 7816 compatible chip card systems (e.g. GSM mobile phones or
other pay-TV decoding systems) if they also use asynchronous
transmission. For smart card systems which use synchronous transmission
(e.g. most phone cards) the interface described here will need some
modifications.
According to ISO, a chip card is 85.60 mm long, 53.98 mm high, 0.76 mm
thick and the edges are rounded with a radius of 3.18 mm. It has eight
defined contact areas (C1 - C8 in the diagram below), each of which is
at least 2 mm wide and 1.7 mm heigh:
______________________________________
/ \
| |
| |
| C1 C5 |
| C2 C6 |
| C3 C7 |
| C4 C8 |
| |
| |
| |
\________________________________________/
These contacts have the following purpose:
C1 VCC Supply voltage (+5 V, max. 200 mA)
C2 RST Reset signal
C3 CLK Clock signal
C4 - reserved
C5 GND Ground
C6 VPP Programming voltage (5-25 V)
C7 I/O Data input/output
C8 - reserved
The following table gives the precise location of the contact areas.
These areas are only minimum areas, the actual contacts might be larger
but must of course be properly isolated from each other.
In the following table,
A represents the maximum distance between the card's left
edge and the contact area's left edge,
B represents the minimum distance between the card's left
edge and the contact area's right edge,
C represents the maximum distance between the card's top
edge and the contact area's upper edge,
D represents the minimum distance between the card's top
edge and the contact area's lower edge.
A B C D
-----------------------------------------
C1 10.25 12.25 19.23 20.93
C2 10.25 12.25 21.77 23.47
C3 10.25 12.25 24.31 26.01
C4 10.25 12.25 26.85 28.55
C5 17.87 19.87 19.23 20.93
C6 17.87 19.87 21.77 23.47
C7 17.87 19.87 24.31 26.01
C8 17.87 19.87 26.85 28.55
Older card systems (defined in a French AFNOR standard) had these
contacts located higher (distance from the top between 9.07 mm and
18.39 mm, distance from the left identical). As some decoders support
both contact area alternatives, make sure that this old contact area is
properly isolated or you'll produce a short circuit when inserting your
card. You may have noticed, that the contacts are arranged in the usual
1/10 inch (= 2.54 mm) system (i.e. like the pins of a 8-pin DIL chip).
You can produce your card adapter by making a PCB with contact areas at
the above listed locations. The PCB must have precisely the thickness
and width of a real card, but it may be longer, so that you can locate
the interface electronics on the part which remains outside the slot.
Cards are inserted in most decoders with the contacts on the bottom
side. Normal PCBs are about 1.3 mm think and won't fit into the slot.
Either you get a PCB which is about 0.8 mm thick or you make it
thinner, e.g. by using a sander machine. Perhaps you find also ready to
use test cards with connectors instead of producing your own or you
simply open the decoder, clamp contacts to the resistors near the card
slot and insert a normal plastic card in order to activate the
card-presence switch (this is NOT recommended: there are unisolated 230
V parts inside the decoder and they could kill you if you are not very
carefull!!!).
The adapter will only need the card contacts I/O, GND, RST and VCC. On
the RS-232 side, the following contacts will be used:
Sub-D 25-pin Sub-D 9-pin
---------------------------------------------------------
TxD 2 3 transmit data
RxD 3 2 receive data
RTS 4 7 request to send
CTS 5 8 clear to send
DSR 6 6 data set ready
GND 7 5 ground
DCD 8 1 carrier detect (here: reset)
DTR 20 4 data terminal ready
The pins DTR, DSR and CTS are not actually needed, they are just
connected together in the adapter, so that defined levels are available
on them because some software might need this. RTS is connected to an
unused MAX232 input and the corresponding TTL output might be used for
generating the reset signal if the adapter is used for connecting a PC
to a card instead of an decoder.
The following components are necessary for the adapter
1 x 0.5-0.8 mm PCB single sided or test card
1 x IC Maxim MAX232CPE (or Linear Technology LT1081CN)
1 x IC 74LS07 (or 7407)
5 x capacitors 1 uF (or higher), 16 V
1 x female Sub-D connector (9 or 25-pin)
1 x card slot (optional)
These components cost together less than 20 DM.
The MAX232 converts the RS-232 levels (about +10 and -10 V) to TTL
voltage (0 and +5 V) and vice versa without requiring anything else
than +5 V power supply. This chip contains two TTL->RS-232 and two
RS-232->TTL drivers and needs four external 1 uF capacitors in order
to generate the RS-232 voltage internally. The adapter electronic gets
its power supply from the decoder's VCC line or you can use an external
5 V supply if you wish.
The card slot's RST line is connected using one of the TTL->RS-232
drivers in the MAX232 to DCD, so that the software and the decoder can
easily resynchronize in case of a protocol error.
The I/O line is a bidirectional half-duplex asynchronous TTL level
serial port that is operated in a Videocrypt system with 9600 bits/s.
We can connect this line to a MAX232 TTL input driver (which is
connected to RxD and sends bytes to the PC) in order to receive data
from the decoder. The TxD signal is converted in the MAX232 to TTL
level and is connected with an open collector TTL driver to I/O. This
open collector driver (one of six in the 74LS07) has a high impedance
output during idle state and 1 and is connected to GND during a 0 on
it's input. As there is already a pull-up resistor to +5 V on I/O in
the decoder, this circuitry guarantees, that the adapter is in high
impedance state if the TxD line is idle and delivers the correct
voltage if the PC sends bytes and the decoder is in reception mode. As
we don't connect totem-pole or tristate outputs to I/O, a short circuit
should be impossible in the adapter.
The following diagram describes the whole interface:
+-------------+ +
+-----------|1 V 16|---+---o +5V (VCC)
+| +| | ===
=== +5V o-||-|2 MAX232 15|---+---o GND (card & RS-232)
| | |
+-----------|3 +---14|----o DCD +-<-o DTR
+ | | | |
+---||---|4 | +-13|----o RTS +->-o DSR
| | | v | |
+--------|5 | +-12|- (unused TTL output) +->-o CTS
+ | | |
GND o-||-|6 +-<-11|----o RST
| |
RxD o----|7 ---<--- 10|-------------------+----o I/O
| | |\ |
TxD o----|8 --->--- 9|--------------| |--+
+-------------+ 1|/ 2
74LS07
At the MAX232, pin 2 delivers
+10 V and pin 6 delivers -10 V. (also connected to 74LS07:
pin 7=GND, pin 14=VCC)
Pay attention to the polarity of the capacitors (marked with a + in the
diagram next to each capacitor)! The -->-- symbols in the AX232
diagram above indicate the voltage converters inside the chip. You
might want to add an LED and a resistor (between 220 and 1k ohm)
between VCC and GND so that you can see when the decoder activates the
interface. If you can't live without blinking bits, then add a LED and
a resistor from VCC to I/O. The capacitor between VCC and GND is not
absolutely necessary, but recommended especially if you add other
circuitry on the board (e.g. the quartz oscillator described below).
As a side effect of this simple interface design, every byte sent by
the PC is at the same time also received by the PC. Consequently, you
can test the circuit with a terminal emulator and external +5 V supply
by switching of local echo: if you still see every typed character
immediately on the screen, the interface should be all right. Software
must be capable of dealing with this echo from the interface. As
specified in the ISO standard, the decoder activates VCC only shortly
before a reset and deactivates VCC again if an answer-to-reset packet
isn't received from the card in time after the reset signal.
A few additional hints:
If you have a larger distance between the PC an the decoder, then
locate the adapter electronic near the decoder, because the RS-232
interface is much more suitable for long cables than the TTL signals.
Cables of 12 m length have sucessfully been used and you shouldn't have
problems with RS-232 cables up to 25 m length and more.
You can also use this adapter circuit to allow a PC to listen to the
data traffic between a decoder and a real card. Just connect the real
card and the adapter parallel to the decoder and don't let the PC
software transmit anything. Suitable card slots are available for
little money from various manufacturers (see below for addresses).
Videocrypt uses the inverse convention data format, i.e., you have to
reverse and invert the bits in each byte in the PC software in order to
get the correct byte value. For more details about the protocol, check
ISO 7816-3.
There are many alternative ways to build this interface if you don't
have some of the components available. E.g. the MAX232 could be
replaced by the fully compatible LT1081 from Linear Technology. The
circuit still works fine if you use higher capacitors than 1 uF (e.g.
my prototype worked fine with 4 22 uF types which were left from a
previous project), but use equally sized capacitors. If you use the pin
compatible MAX220 (a low power version) instead of the MAX232, then use
capacitors with 10 uF or higher. The MAX232 should be the easiest
available one of these chips. If it is more convenient for your layout,
then you can use instead of the 1->2 driver in the 74LS07 one of the
remaining 5 drivers at the pins 3->4, 5->6, 9->8, 11->10 and 13->12. If
your local electronic store doesn't have a 74LS07 or 7407, then use
e.g. two of the six open collector inverters in a 74LS05 (same pin
assignment as the 74LS07) in series and a 2.2k pull-up resistor to VCC
between them. Peoples have also suggested quick-and-dirty designs where
the 74LS07 open-collector driver is replaced by a 100 ohm resistor and
the MAX232 by a CMOS inverter.
If you don't have the experience to etch your own PCB (it's not very
difficult) or don't know someone who does, then you could solder the
components in a universal raster PCB or plug them into an experimental
board. Then produce just a simple PCB with only the ISO card contacts
and connections to outside the decoder by mechanically removing the
thin copper layer with a good knive between the 4 contacts and lines.
Peoples have also suggested to use an empty German phone card, which
also has ISO contacts. Remove the integrated chip from the other
non-contact side, test whether the contacts are now isolated from each
other and use a special conductive ink you'll find in an electronics
store in order to draw connections to the end of the card were you
connect wires. I haven't tested this and don't know how well it works,
but you might also consider it. If you ask dealers who sell Videocrypt
clone cards, you might also get a suitable PCB with card contacts for
little money.
You can use the same circuit with a few modifications in order to
connect a PC to a smart card. This allows you to use the PC in order to
emulate a decoder from the card's point of view.
Just connect the card's RST input to pin 12 of the MAX232 so that you
can control the RST line with the RS-232 RTS signal. Add a 20k pull-
upresistor from the card's I/O line to VCC. In addition, you'll have to
generate a 3.57 MHz CLK signal for the card. If you use other
frequencies, remember that the time for one protocol bit is 372 CLK
periods and you'll have to adjust the bits/sec rate. Either you'll find
a complete 3.5 or 3.579545 MHz quartz oscillator which delivers a TTL
signal or you build one like the following circuit using a 3.579545 MHz
quartz (easily available, because each NTSC TV set contains one) and 2
of the 6 CMOS inverters in a 74HC04. I've also tried a 74HCT04 and a
4069, but they both are less suitable. And of course you'll need an
external regulated +5 V power supply (a decoder will give you only VCC
and CLK while it is talking to a card). In order to protect both the
card and the adapter, it might be a good idea to put a 10 ohm resistor
in all lines to the card (and perhaps even protection diodes to VCC and
GND). If you don't already have a VCC/GND capacitor near the 74HC04,
then add 0.1 uF between VCC and GND.
1M 2.2k 3|\4 10
+-/\/\/--+----/\/\/-----+--| o-----+-----/\/\/---o CLK
| |2 | |/ |
| -o- | |100 pF
| /_____\ | ===
| |1 | |
| | 3.579545 MHz | |
| | +--+ | - (also connect to 74HC04:
+--------+---| | | |---+ GND pin 5,7,9,11,13=GND,
| +--+ | pin 14=VCC=+5 V)
|27pF |27pF
=== ===
| |
- -
GND GND
You can easily build a universal device that can be operated in two
modes by changing the position of two jumpers:
a) In the first mode, you have a PC<->decoder adapter. The PCB is plugged
into the card slot of a decoder, and either you let the PC talk
to the decoder or you put a card into the additional slot on your
device and use the PC in order to listen to the traffic between
card and decoder. Use the jumpers in order to connect pins CLK and
RST of your card slot to those of the decoder.
b) In the second mode of operation, you have a PC<->card adapter. The
device is not connected with the decoder and you have to attach a
+5 V power supply. The jumpers are switched, so that your card slot
has its CLK pin connected to the output of the above quartz oscillator
and the RST pin to pin 12 of the MAX232. As in this mode the PCB
isn't plugged into the decoder, it is convenient to have tiny
feets attached to the PCB so that you can put it on a table.
Now you've built a cheap and flexible debugging tool for all ISO 7816
compatible smart card systems that use an asynchronous protocol. Other
ideas are to add a chip socket for a microcontroller (e.g. a PIC16C84
from Microchip or a 8032+EPROM from Intel) parallel to the additional
card slot and to add pins where you can easily connect an oscilloscope.
This allows you to debug card software for microcontrollers easily.
Feel free to produce and sell such a device, but if you do it
commercially, please be nice and don't forget to send me a free one,
too. :-)
ISO 7816 chip card connectors are e.g. available from:
Amphenol-Tuchel Electronics GmbH
August-Haeusser-Str. 10
D-74080 Heilbronn
Germany
phone +49 7131 486-0
fax +49 7131 486-323
A few final remarks about the security of the adapter:
Normally, both the RS-232 interface and the decoder slot should not be
harmed by short circuits, but be careful. Also try to avoid
electrostatic voltage (e.g. generated by walking on a suitable carpet)
near the interface, because discharges cause easily decoder or PC
crashes and could theoretically even harm the hardware (especially CMOS
chips like the 74HC04). Before connecting the decoder and the PC the
first time, you might want to check the voltage between the two GND
lines. In correct installations, the difference of the GND potentials
is very low (below 1 V), but someone has reported up to 50 V (high
impedance only). Most TV sets, VCRs, SAT receivers and decoders are not
connected with the earth line, so their GND potential is floating or
sometimes only defined by e.g. the shielding of the antenna cable. If
your antenna system is not correctly installed, the shield might also
not be grounded. One quick solution might be to switch off all
components and then connect first the RS-232 GND line to e.g. the GND
in the SCART connector or the GND at an audio connector of your decoder
before connecting anything else. You might also design the ISO contacts
on the PCB so that GND touches all pins at first when the PCB is
inserted in the card slot. The only really secure protection between
your PC and your decoder would be to use an isolating RS-232 driver
(e.g. you might want to check data sheets of Maxim's MAX250/251/252
chips which offer RS-232 protection up to 1500 V), but under normal
circumstances you won't need this.
Use this circuit at your own risk and please don't blame me if anything
doesn't work or produces only smoke and noise. Good luck ... ;-)

View File

@@ -0,0 +1,127 @@
HOOKING A 5.25" DRIVE TO YOUR AMIGA
by Les Ayling
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Hooking up a standard 80 track, double-sided, 5 1/4" floppy disk drive
as drive df2: or df3:
Looking at the connector from the back side of the external drive, the
pin out is as follows:
712 11 10 9 8 7 6 5 4 3 2 1
23 22 21 20 19 18 17 16 15 14 13
34 Pin edge connector pin-out is as follows:
34 32 30 28 26 24 22 20 18 16 14 12 10 8 6 4 2
33 31 29 27 25 23 21 19 17 15 13 11 9 7 5 3 1
Wire a DB25 (RS-232) connector with pins 13 and 25 cut off per the
following configuration:
34 Pin 23 Pin
-----------------
34 --------- 1
32 --------- 13
30 --------- 2
28 --------- 14
26 --------- 15
24 ---7---- 16
22 --------- 17
20 --------- 18
18 --------- 19
16 ---------
14 --------- 9
12 --------- 21
10 -- tie to ground, keep the motor running all the time
8 --------- 22
6 --------- 20
4 ---------
2 ---------
all odd numbered pins of the 34 pin connector should be tied to pins
3, 4, 5, 6 & 7 of the 23 Pin connector (grounds).
In addition, pin 11 of the 23 pin connector should be wired to a
momentary push-button that can be activated whenever a diskette is
removed and replaced with another. This tells the DOS that a different
diskette has been inserted into the drive. Simply change the diskette,
push the button and hold until DOS accesses the drives. The switch may
then be released. This function is necessary due to the fact that the
DOS seems to read the directory of the current diskette into ram, and
unless the DOS is told of another diskette being used, it will either
ask you to replace the diskette that was in the drive or write to the
diskette using parameters from the previous disk. This, of course, is
very undesirable.
Also, note that the drive must be connected when booting DOS or it
will not be noted as being on-line. The diskette does not have to be
inserted, just the drive plugged in.
Do not make any connections to the 23 pin connector, pins 23 or pin
12. These pins provide power to the Amiga drive 1 and may not be used
to power an external 5 1/4" drive. An external power supply must be
used.
The 5 1/4" drive selection header may be programmed as drive for drive
2. Drive 1 selects as DF2: and drive 2 selects as DF3:.
A motor on latch circuit may be built to eliminate the motor
continuously turning, however, the way indicated above is the quickest
and simplest method to get another drive on-line.
After this procedure is completed, the 5 1/4" drive may be used just
as any normal Amiga drive.
Considering the $295.00 list price of the Amiga drives, versus about
$50 dollar price of 5 1/4" drives, it's a real bargain.
*** As always, with any hardware project -
(1) - if you are not sure of what I am talking about, get
knowledgeable help and
(2) - TRIPLE CHECK your work before plugging in the new drive.
|||||||||||||||||||||||| END OF ADD_5.25_DRIVE ||||||||||||||||||||||

View File

@@ -0,0 +1,79 @@
HOW TO INSTALL 1MB CHIP INTO AN AMIGA 500 ON THE MOTHERCARD!
Note. This hack works just on Rev. 6A Amigas (or higher!)
You will need the following:
4 memory chips (44267 or pincompatible)
A LOW WATTAGE solder iron
PLEASE READ ALL TEXT CAREFULLY BEFORE YOU DOES ANYTHING!
Now open you Amiga (it's a hell to open those fucking nonstandard screws!)
(When you open Ya Amiga ya worrenty will go to hell, but if ya are a real
hardware hacker you don't mind!!) then try to find where the memory chips
are located! (under the keyboard on the left side where the memory expansion
should be located!) there will you find 4 EMPTY places for 4 chips! just
solder the new chips there! (with the SAME direction as the other chips
already have otherwise bad things CAN happen!)
Now locate jumper JP7A and cut the connections from ALL three bases!
then find jumper JP2 and cut the connections and solder a connection
between the middle one and that one on the top! so the jumpers should
be connected like this:
JP7A:
O
O
O
(no connection at all!)
JP2:
O
|
O
O
(The Top one and the middle one soldered together!)
and that should be it! (test the command AVAIL to check how much CHIP/FAST
mem you have! you should now have 104000 or something like that in CHIP
mem! (if you have downloaded ths from a BBS that was packed with LHARC by
me then AVAIL will be in this file too!)
NOTE: YOU CAN'T HAVE A MEMORY EXPANSION (LIKE THE A501) IN THE INTERNAL
PORT IF YOU INSTALL THIS MEMORY!!!!!!!!! IT GOT TO BE A EXTERNAL MEMORY
EXPANSION!!!!!!!!!
I WILL NOT TAKE ANY RESPONSIBILITY IF ANYTHING GOES WRONG FOR YOU!
===
If you have something to ask me feel free to call those BBSes and leave a
message to me: (Send the messy to John Hertell)
The Golden Arrow +46 26 275710 (-2400 BAUD) (I'm a CO-SYSOP there!)
Checkpoint Charlie +46 31 463582 (HST+)
Power Station +46 522 29360 (HST+)
Or in VIDEOTEX in Sweden send a message to: 52000161-1
or call my voice line on +46 522 75764
or a letter to: John Hertell, Box 5074, 451 05 Uddevalla, Sweden
Have fun with your 1MB CHIP AMIGA! (on the motherboard)
AGAIN i must say that this hack ONLY works if you have a REV. 6 AMIGA!
(they have a SUPER FAT AGNUS already!) The Superfat Agnus is called:
8372A! (it's that strange chip who looks like a box!)
Signed Chucky of The Gang!

View File

@@ -0,0 +1,84 @@
****************************************************
* *
* A1000/A500 86-pin to 100-pin Expansion *
* *
****************************************************
This HACK will allow an Amiga 1000 or 500 to use it's 86-pin expansion
connector as an A2000 100-pin slot!!!!!
Parts Needed:
1 100-pin edge connector (Female)
1 86-pin edge connector (Female)
1 74LS86 TTL gate
Ribbon Cable
PLEASE Refer to included picture for building details:
Try to keep the cable length a short as possible,
longer cables tend to have noise problems. If used on
a 1000 the PAL's should be grounded to help prevent
noise problems.
Also there may not be enough reserve power to run these
cards on a stock A500 power supply. Although I've had
it working on a stock A500 with a GVP card ( 40Q + 2Meg)
The following products have been used successfully:
Commodore A2091 w/40Q+2M
GVP Series I w/40Q+2M and w/105Q+2M
GVP Series II w/40Q+8M
SupraRam w/8M
Supra-zi Modems
The GVP Series II is very susceptible to bus noise
(probably because of the incrediable transfer rates it
achieves). My original cable was about 7 inches, it worked
with all of the listed products except the Series II. Making
the cable shorter proved to be the answer.
I've had this cable running for about 5 months on my
Amiga 1000 with a Spirit 1.5M Ram expansion and a
Commodore 2091 SCSI Controller (w/40M Quantum drive)
If you find this usefull a ShareWare fee of $20 will
be greatly appreciated.
Since I have found it somewhat difficult to find the
86-pin and 100-pin edge connectors. I have put together
a Kit with all parts and instructions. This kit is
available with ShareWare Registration for $45+Shipping.
If you have any additional questions or information.
Please contact me at.
Joe Pellegrino
c/o Computer World
6174 W Flamingo Rd.
Las Vegas, NV 89103
USA
BBS ClickMeTwice (702)454-7787

View File

@@ -0,0 +1,147 @@
= THE TRAGEDY OF AN ON-LINE ADDICTION =
- by Steve King -
"Did you know that last month's (expletive) phone bill is over
$450?" my wife scolded me in her harshest, my-husband-the-child
voice. "That's more than twice the monthly payment you make for
that (expletive) computer!" she continued as she escalated to
screaming.
"I confess! I confess!" I sobbed. "I'm just an on-line junkie
-- I'm addicted to my modem! I guess I'll just have to join
Modems Anonymous before I owe my soul to the phone company."
As a counselor for Modems Anonymous, I hear numerous variations
of the preceding story every day. That insidious disease, modem
fever, is exacting a tragically large toll from the cream of our
society's computer users. Modem-mania is sweeping through the
very foundations of our country and there seems to be no stopping
it. This disease (yes, it is a social disease of almost epidemic
proportions) is becoming a such calamity that soon there's even
going to be a soap opera about on-line addiction named, "All My
Modems."
If you don't already own one of those evil instruments called a
modem, take warning! Don't even think about buying one. Modem
fever sets in very quietly; it sneaks up on you and then grabs
you by the wallet, checkbook or, heaven forbid, credit cards.
Once you own a modem, you enter the insidious addictive trap by
"dialing up" a friend who also has a modem. For some strange
reason, typing messages to each other fascinates you. (Even if
it is less than 10% of the speed that you can speak the same
words over a normal voice phone link.) Of course, you make
several attempts at hooking up before you finally figure out that
at least one of you must be in the half-duplex mode; that
discovery actually titillates you (sounds impossible, but it's
true).
Then your modem-buddy (friend is too good a term) sows another
seed on the road to on-line addiction by giving you the number of
a local RBBS (Remote Bulletin Board Service). Once you get an
RBBS phone number, you've taken the first fatal step in a journey
that can only end in on-line addiction.
After you take the next step by dialing up the the RBBS your
modem-buddy told you about, you find that it's very easy to
"log-on." This weird form of conversation with an unattended
computer is strangely exciting, much more so than just typing
messages when you're on-line with your modem-buddy. The initial
bulletins scroll by and inform you about the board, but you're
too "up" to comprehend most of it. Then you read some of the
messages in the message section and maybe, in a tentative manner,
you enter one or two of your own. That's fun, but the excitement
starts to wear off; you're calming down. Thinking that it might
be worthwhile to go back and re-read the log-on bulletins, you
return to the main RBBS menu.
Then it happens. The RBBS provides the bait that entices you all
the way into the fiery hell of modem addiction. As you look at
the RBBS main menu to learn how to return to the log-on
bulletins, you find an item called FILES. By asking your host
computer for FILES, you thread the bait onto the hook of
corruption; the FILES SUBMENU sets the hook. You start running
with the line when you LIST the files; you leap into the air with
the sheer joy of the fight when all those public domain program
titles and descriptions scroll by. They're FREE!!! All you have
to do is tell the bulletin board to download (transmit) them to
you. You download your first program and you're landed, in the
creel, cleaned and ready for the cooking fires. In just 55
minutes after you logged-onto the board, you've downloaded six
programs, one of them is Andrew Fleugelman's PC-Talk, version 3
(truly an instrument for evil).
RBBSLIST.DOC, which is also among the files you downloaded,
contains a list of a great number of bulletin boards throughout
the country. (There's evil all around us, constantly tempting
us!) You print the list and find about 60 RBBS phone numbers.
(Have mercy on our souls!) The list also gives you the hours of
operation, communications parameters and informs you about each
board's specialty. You decide to try PC-Talk and use it to
dial-up an RBBS about three states away. Since the line is busy,
you pass the time entering all those RBBS phone numbers into
PC-Talk's voluminous dialing directory.
You try the number again -- still busy. You think, "Hey, there's
one that specializes in Pascal programs. Maybe I'll try it. It's
about half-way across the country, but it's after 5pm and the
phone rates have changed. It won't be too expensive."
The Pascal board answers. After 45 minutes you've downloaded
another five programs. Then you call another board -- only this
one's completely across the country from California, in Florida.
And so it goes on into the night... And the next night... And
the next...
Some days it gets to you. You begin to feel the dirtiness of
modem addiction, particularly when your wife makes you feel like
a child by berating you for those astronomical phone bills -- if
she hasn't divorced you by then. Every time you sit down before
your IBM PC to do some work, you dial up another RBBS instead.
If that one's busy, you call another, and another, until you
connect. Then you feel OK, almost "high." When you finally hang
up, you still can't work; you can only dial up another RBBS.
Your downfall as an on-line addict is just another one of this
society's terrible tragedies, such as polygamy or the compulsion
to circle all the numbers on computer magazine "bingo cards."
Eventually your whole social life relies upon only the messages
you find on electronic bulletin boards; your only happiness is
the programs you have downloaded. (You never try any of them,
you only collect them.)
Hope exists, however. We, the dedicated but under-paid staff of
Modems Anonymous, have done extensive research to find a cure for
modem mania, which has been ruining hundreds of lives. And we
have succeeded in our quest. The cure is really quite simple,
yet effective:
Set up your own remote bulletin board service. Then
all the other modem addicts will phone you, and their
wives can nag at them about $450 phone bills. And you
can find peace -- at last.
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.
"Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X

View File

@@ -0,0 +1,160 @@
Generic
3.5 Inch Double Sided Disk Drive
for
The 520/1040 Series
by
James Lacassagne
Purpose: This document is a description of the hook-ups and mod-
ifications that I found necessary in adding a 3.5 inch
double sided drive to my Atari(tm) 520. It is intended
solely as a guide to anyone who is interested in saving
a few dollars by using an "industry standard" drive in
place of the Atari SF314.
Warning: This installation seems to function properly for my sys-
tem, but I cannot guarantee anything. Also, the only way
that a saving will result is if a suitable power supply
is already available, or can be obtained at a very low
price.
Requirements: 1 3.5" Double Sided Drive w/ Installation kit @ $130
(The Unit I used was a Toshiba(tm) ND-352
which came with a multi-purpose mounting
kit. BE SURE that the unit is XT compat-
ible!!(720 K etc))
1 5v/12vdc Regulated Power Supply @ $ 25
(The supply must be capable of supplying
5V.+/-5% @200 mA and 12V.+/-5% @300 mA.
I saved some money here by using the same
supply that I used for adding a 5 1/4 in.
drive as described in numerous articles
in magazines and on Bulletin Boards.)
1 34 pin Card Edge Connector @ $ 3
(Yes, This is the "industry standard"
used on all XT's and Clones. I got mine
at Radio Shack (P/N____________).)
1 Standard Atari(tm) 3.5 in Disk Drive Cable @ $ 8
(Preferably, one of the After Market types
6' or so in length.)
1 Disk Drive Case @ $ ?
(This is optional--I still haven't found
a good cheap one, but the drive seems to
work fine.)
Procedure: There are two ways to proceed with this project depending
on whether you want the new drive to be A or B. The Drive
B method is the simpler, so I will start with it.
Cut the Standard Drive Cable in half (Save the other
half for another project--maybe!)
Strip back about 2" of the outer insulation from the
cable. Do Not cut off the shield wire (a layer of wire
woven around the multiple conductors in the cable).
Carefully unweave the shield, and twist it to form a
wire of its own.
Since the 34 pin connector that I used was designed for
ribbon cable, some ingenuity is required here. Each pin
on the connector ends in a V shaped stud designed to
separate the ribbon cable wire and cut only its insul-
ation when the cover is forced in place. Since most of
the wires in the cable go to the top row of the con-
nector (the even numbered pins) and the shield goes
to the bottom row, along with the wires from pins 3 and
7 of the Atari connector, I divided them accordingly and
routed them above and below the connector cover. Very
carefully, I pushed each wire far enough into the cor-
responding Vstud to hold it in place. I then forced
the cover down, forcing the wires the rest of the way
into the V. By trial and error I found that the two
ground wires (pins 3 and 7) in the cable did not provide
a sufficient ground path, causing unreliable drive oper-
ation. I overcame this by (gasp!) tying the shield to
ALL of the odd numbered pins on the connector. (That's
what the twisted shield wire is used for.) Carefully
lay it over the bottom row of Vstuds before putting
the connector cover on. The Connections Follow:
(NOTE: the colors mentioned are for an Atari Cable
You should check if you are using an After Market
Cable.)
34 pin conn. Atari conn. Signal Color
2 * media chng
4 N/A in use
6 N/A d4 sel
8 4 index yellow
10 5 d0 sel green
12 6 d1 sel violet
14 N/A d2 sel
16 8 motor on brown
18 9 direction orange
20 10 step grey
22 11 wrt data pink
24 12 wrt gate lt. blue
26 13 track 0 lt. brown
28 14 wrt prot lt. green
30 1 read data red
32 2 side 0 white
34 * rdy/med ch
(any 3 logic gnd blue
odd) 7 logic gnd black
Assemble the Disk Drive and Adapter kit. It should have
come with a power cable adapter with a std XT con-
nector on the end. You can either buy a mating
connector or cut it off and splice directly to the wires.
(Generally, pin 1 (red) is 5V, pin 4 (yel) is 12V, and
pins 2&3 (blk) are Ground.) The Installation Kit may
refer to a jumper on pin 34, but this can be ignored.
Now, the only modification to the drive can be made.
On the Installation Kit PC Board, a Jumper must be
soldered between pin 2 and pin 28 of the Drive Con-
nector.(This is the one that actually connects to
the Disk Drive. It is identical in pin layout to the
Std connector, with pin 2 on the top left as you look
at it.) This connects the Media Change signal on pin
2 to the Write Protect signal.(Thanks to Analog2 for
pointing me in the right direction on this one.)
These are both open collector, active low signals, and
can be safely wired together.(wired or configuration)
This should be all that has to be done to make the
drive work. Simply plug the cable into the OUT con-
nector of the first drive or the 1040, and away you
go.
If you have a 520 and want this to be drive A, the
procedure is the same, except DO NOT CUT THE CABLE
IN HALF. Instead, strip a 3-4 in. section in the
center of the cable, Cut and unweave 1/2 of the
shield. Lead the wires over the Vstuds as before,
but cut the wires from the Atari connector pins 5&
6.(computer end) Pin 5 wire is connected to the Std
connector pin 10 and pin 6 wire is connected to the
remaining end of pin 5.(The part that will go to the
second drive.) This brings the ds1 signal to the
ds0 pin on the second drive, just like Atari does it.
You can cut off the remaining pin 6 wire if you like,
since it doesn't get used. Don't forget to attach the
shield to the odd number connector pins.
If you have understood and followed my directions, the
drive should function properly. If not, there is not
much that can cause damage. My version will read and
format and write to double and single sided disks
without any problems. If you encounter any difficulty,
I can be contacted through Delphi as JIMSL or Com-
puserve No. 72257,1613.
Atari, Radio Shack, and Toshiba are Registered Trademarks.

View File

@@ -0,0 +1,50 @@
MARCH 1990
AIDS TROJAN MARCHES ON
LONDON - It has been almost three
months since infected Aids Information
disks started landing on user's desks.
Despite the high level of publicity,
users continue to ignore the warnings
install the disk and allowing the Trojan
to continue causing damage.
UK-based detective Barry Donovan predicts
there will be users who will install the
disk and then forget about it until it
triggers after 90 or so reboots. For
some users, those 90 reboots are now
up.
A representative from Michelin Tyres
in Nigeria contacted PC Business World,
UK, to request a Clearaid disk because the
virus had just triggerd on his home PC. He
said a significantly large number of disks
are in circulation in West Africa.
The US arm of Save the Children Fund offices
in Ethiopia also became a victim of the
blackmail attempt having PC's "wiped out
by the Trojan". Other US-based charities
with offices in the African continent have
reported similar attacks, despite local
media coverage and warning issued by
charities, local police forces, and wide area
networks like Usenet.
Joseph Popp, whom FBI agents arrested in
connection with the mailing, is still being
held in an Ohio prison awaiting extradition
proceedings. He has made a second court
appearance to appeal against his continued
detention in order to be medically examined.
The court, however, ruled such assessments
should be conducted in prison. According to
Scotland Yard, Popp's extradition hearing will
be held in early April.

View File

@@ -0,0 +1,527 @@
ID:SW Switches available for QOS products
Quarterdeck Technical Note
by Quarterdeck
What follows is all the help screens from the DESQview 2.26, QEMM 5.0,
Manifest 1.0, QRAM 1.0, and some of their utilities:
From QEMM.SYS:
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> QEMM <20>
<20> Copyright (c) 1986-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> QEMM is an expanded memory manager for 80386 machines <20>
<20> It also gives High RAM and other capabilities <20>
<20> <20>
<20> Syntax: <20>
<20> DEVICE=QEMM.SYS [switches] <20>
<20> <20>
<20> QEMM switches: <20>
<20> ADAPTERRAM=xxxx-yyyy An adapter has RAM in the range <20>
<20> ADAPTERROM=xxxx-yyyy An adapter has ROM in the range <20>
<20> AUTO Turn on only if necessary <20>
<20> COMPAQ386S Identify this as a COMPAQ 386S <20>
<20> COMPAQEGAROM Relocate COMPAQ's video ROM <20>
<20> COMPAQHALFROM Split system ROM in half <20>
<20> COMPAQROMMEMORY Use COMPAQ memory reserved for ROM <20>
<20> DISKBUF=xx Set the size of the SCSI disk buffer <20>
<20> DMA=xx Set the size of the DMA buffer <20>
<20> DOS4 Alter EMS page ordering for DOS 4.00 <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> QEMM <20>
<20> Copyright (c) 1986-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> EXCLUDE=xxxx-yyyy Consider the range unmappable <20>
<20> EXTMEM=xxxxx Reserve xxxxxK of extended memory <20>
<20> FORCEEMS Still act like EMS even if no frame <20>
<20> FRAME=xxxx Set the page frame; xxxx=seg or NONE <20>
<20> FRAMELENGTH=x Set the page frame to be x pages <20>
<20> HANDLES=xxx Set the number of EMS handles <20>
<20> HMAMIN=xx Set the minimum size of the HMA (0-63K) <20>
<20> IGNOREA20 Don't trap the 8042 <20>
<20> INCLUDE=xxxx-yyyy Consider the range mappable <20>
<20> LOCKDMA Don't allow interrupts during DMA processing <20>
<20> MAPS=xx Set the number of alternate register sets <20>
<20> MEMORY=xxxxx Use only xxxxxK of extended memory <20>
<20> NOCOMPAQFEATURES Disable EGAROM, HALFROM, ROMMEMORY <20>
<20> NOEMS Don't be an expanded memory manager <20>
<20> NOFILL Don't fill conventional memory <20>
<20> NOHMA Don't allow access to the HMA <20>
<20> NOROM Don't map the "reboot" page of the system ROM <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> QEMM <20>
<20> Copyright (c) 1986-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> NOROMHOLES Don't find holes in the system ROM <20>
<20> NOSHADOWRAM Don't use C&T Shadow RAM <20>
<20> NOSORT Don't sort memory <20>
<20> NOTOPMEMORY Don't look for "top memory" <20>
<20> NOVIDEOFILL Don't fill into video memory <20>
<20> NOVIDEORAM Don't put RAM into video memory <20>
<20> NOXBDA Don't move the eXtended BIOS Data Area <20>
<20> NOXMS Don't be an extended memory manager <20>
<20> OLDDV DV 1.3 or 2.00 will be run <20>
<20> OFF Turn QEMM OFF <20>
<20> ON Turn QEMM ON <20>
<20> RAM[=xxxx-yyyy] Put RAM everywhere or in the range <20>
<20> ROM[=xxxx[-yyyy]] Map ROM everywhere or in the range <20>
<20> TASKS=xx Set the interrupt nesting level <20>
<20> UNUSUAL8042 The 8042 is non-standard <20>
<20> UNUSUALEXT The extended memory BIOS is non-standard <20>
<20> VIDRAMEGA Configure for EGA feature of VIDRAM <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> QEMM <20>
<20> Copyright (c) 1986-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> VIDRAMEMS Configure for EMS feature of VIDRAM <20>
<20> WATCHDOG=[0,1,2] Set the type of Watchdog timer <20>
<20> NOPAUSEONERROR Don't pause on error <20>
<20> PAUSE Pause while parsing commands <20>
<20> HELP Display this help text <20>
<20> ? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
From QEMM.COM
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> QEMM <20>
<20> Copyright (c) 1986-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> QEMM displays and gives some control over certain <20>
<20> functions of QEMM.SYS <20>
<20> <20>
<20> Syntax: <20>
<20> QEMM [switches] <20>
<20> QEMM with no parameters shows SUMMARY and TYPE <20>
<20> <20>
<20> QEMM switches: <20>
<20> AUTO Put QEMM into AUTO mode <20>
<20> ON Turn QEMM on <20>
<20> OFF Turn QEMM off <20>
<20> TYPE Display QEMM type information <20>
<20> ACCESSED Display QEMM accessed information <20>
<20> ANALYSIS Cross-reference ACCESSED with TYPE <20>
<20> MEMORY Display QEMM memory usage <20>
<20> SUMMARY Display QEMM summary <20>
<20> LIST Display charts in LIST format <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> QEMM <20>
<20> Copyright (c) 1986-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> MAP Display charts in MAP format <20>
<20> RESET Reset ACCESSED info to unaccessed <20>
<20> NOPAUSEONERROR Don't pause on error <20>
<20> PAUSE Pause while parsing commands <20>
<20> HELP Display this help text <20>
<20> ? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
From QEXT.SYS
Quarterdeck Extended Memory Manager 286 V5.10
Copyright (c) 1987-1990 by Quarterdeck Office Systems
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> QEXT <20>
<20> Copyright (c) 1987-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> QEXT.SYS is an extended memory manager <20>
<20> <20>
<20> Syntax: <20>
<20> DEVICE=QEXT.SYS [switches] <20>
<20> <20>
<20> QEXT switches: <20>
<20> BLOCKSIZE=xxxxx Specify the size of extended memory transfers <20>
<20> EXTMEM=xxxxx Reserve xxxxxK of extended memory <20>
<20> HANDLES=xxx Set the number of EMB handles <20>
<20> HMAMIN=xx Set the minimum size of the HMA (0-63K) <20>
<20> MEMORY=xxxxx Use only xxxxxK of extended memory <20>
<20> NOXMS Don't be an extended memory manager <20>
<20> UNUSUAL8042 The 8042 is non-standard <20>
<20> VDISKVERSION=m.n Look like a version m.n VDISK <20>
<20> NOPAUSEONERROR Don't pause on error <20>
<20> PAUSE Pause while parsing commands <20>
<20> HELP Display this help text <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> QEXT <20>
<20> Copyright (c) 1987-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> ? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
From Manifest:
MANIFEST [Category] [Topic] [/M] [/L] [/N] [/P] [/A] [/Bd] [/Tn] [/?]
Category Topic
System [ Overview CONFIG AUTOEXEC Adapters CMOS ]
First Meg [ Overview Programs Interrupts BIOS Data Timings ]
Expanded [ Overview Pages Handles Timings Benchmark ]
Extended [ Overview XMS ]
DOS [ Overview Drivers Files Environment ]
QEMM-386 [ Overview Type Accessed Analysis Memory ]
Hints [ Overview Detail ]
* = all overviews
<Category> * = all topics in category
* * = all information
Switches: M - monochrome (2 color) display
L - EGA: 43 rows; VGA: 50 rows
N - CGA: No sync - with snow
P - PAUSE after each screen to console
A - show alternate F3 screens
Bd - specify boot drive letter
Tn - automatically TSR (hotkey choice 1-3)
? - This help screen
From QRAM:
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> QRAM <20>
<20> Copyright (c) 1989-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> QRAM provides high RAM for use by LOADHI when <20>
<20> loaded after an EMS 4 or EEMS driver <20>
<20> <20>
<20> Syntax: <20>
<20> DEVICE=QRAM.SYS [switches] <20>
<20> No switches means the RAM option <20>
<20> <20>
<20> QRAM switches: <20>
<20> EXCLUDE=xxxx-yyyy Don't put RAM in the range <20>
<20> FORCEEMS Still act like EMS even if no frame <20>
<20> FRAMELENGTH=x Set the page frame to be x (0-4) pages <20>
<20> HIDE=xxxx-yyyy Hide that the range is mappable <20>
<20> INCLUDE=xxxx-yyyy Put RAM or fill in the range <20>
<20> NOFILL Don't fill conventional memory <20>
<20> NOSHADOWRAM Don't use C&T Shadow RAM <20>
<20> NOVIDEOFILL Don't fill into video memory <20>
<20> NOVIDEORAM Don't put RAM into video memory <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> QRAM <20>
<20> Copyright (c) 1989-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> NOXBDA Don't move the eXtended BIOS Data Area <20>
<20> NOXMS Don't be an extended memory manager <20>
<20> RAM[=xxxx-yyyy] Put RAM everywhere or in the range <20>
<20> REGION:n Load into region number n <20>
<20> VIDRAMEGA Configure for EGA feature of VIDRAM <20>
<20> VIDRAMEMS Configure for EMS feature of VIDRAM <20>
<20> NOPAUSEONERROR Don't pause on error <20>
<20> PAUSE Pause while parsing commands <20>
<20> HELP Display this help text <20>
<20> ? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> EMS <20>
<20> Copyright (c) 1989-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> EMS gives status of and control over expanded <20>
<20> memory handle functions. <20>
<20> <20>
<20> Syntax: <20>
<20> EMS [param] <20>
<20> EMS with no parameter gives EMS status <20>
<20> <20>
<20> EMS parameters: <20>
<20> CREATE name size Create a handle with the given name and size <20>
<20> CREATEFAST name size Create a handle with fast expanded memory <20>
<20> CREATESLOW name size Create a handle with slow expanded memory <20>
<20> DIR Display current handle sizes and names <20>
<20> FREE handle Free the given handle <20>
<20> LOAD handle file Load handle data from the specified file <20>
<20> RENAME handle name Change a handle's name <20>
<20> RESIZE handle size Change amount of memory allocated to a handle <20>
<20> SAVE handle file Save handle data in the specified file <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> EMS <20>
<20> Copyright (c) 1989-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> NOPAUSEONERROR Don't pause on error <20>
<20> PAUSE Pause while parsing commands <20>
<20> HELP Display this help text <20>
<20> ? List all commands <20>
<20> <20>
<20> where: <20>
<20> name - is a handle name of up to 8 characters. The name need <20>
<20> not be quoted unless it contains blanks. <20>
<20> size - is the number of 16K pages to be allocated. If the number <20>
<20> is followed immediately by the letter 'K', it represents <20>
<20> the number of kilobytes to allocate. <20>
<20> handle - is either a 'name' as described above or a handle number <20>
<20> file - is a DOS file name <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> LASTDRIVE <20>
<20> Copyright (c) 1989-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> LASTDRIV displays and increases the highest <20>
<20> DOS drive letter <20>
<20> <20>
<20> Syntax: <20>
<20> LASTDRIV [param] <20>
<20> LASTDRIV with no parameter shows the current <20>
<20> highest drive letter <20>
<20> <20>
<20> LASTDRIV parameters <20>
<20> l Set the highest drive to letter l <20>
<20> =l Set the highest drive to letter l <20>
<20> +num Increase the number of letters by num <20>
<20> NOPAUSEONERROR Don't pause on error <20>
<20> PAUSE Pause while parsing commands <20>
<20> HELP Display this help text <20>
<20> ? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
From LOADHI.COM
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> LOADHI <20>
<20> Copyright (c) 1988-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> LOADHI loads TSRs into high RAM <20>
<20> <20>
<20> Syntax: <20>
<20> LOADHI [switches] [prog-name [prog-switches]] <20>
<20> LOADHI with no parameters shows status <20>
<20> <20>
<20> LOADHI switches: <20>
<20> /BESTFIT Load into the block that fits best <20>
<20> /HAPPIEST Load until the program is happy <20>
<20> /REGION:n Load into region number n <20>
<20> /LARGEST[:n] Load into the nth largest block <20>
<20> /SMALLEST[:n] Load into the nth smallest block <20>
<20> /EXCLUDEREGION:n Don't load into region number n <20>
<20> /EXCLUDELARGEST[:n] Don't load into the nth largest block <20>
<20> /EXCLUDESMALLEST[:n] Don't load into the nth smallest block <20>
<20> /GETSIZE[:f] Load low and calculate size <20>
<20> Store result in file f <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> LOADHI <20>
<20> Copyright (c) 1988-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> /SIZE:nnnnn Load into a block nnnnn big <20>
<20> /LABEL:abc Display a label with /GS data <20>
<20> /NOLO Don't load low <20>
<20> /LO Load low <20>
<20> /TERMINATERESIDENT TSR on exit <20>
<20> /NOPAUSEONERROR Don't pause on error <20>
<20> /PAUSE Pause while parsing commands <20>
<20> /HELP Display this help text <20>
<20> /? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
From LOADHI.SYS
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> LOADHI <20>
<20> Copyright (c) 1988-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> LOADHI loads drivers into high RAM <20>
<20> <20>
<20> Syntax: <20>
<20> DEVICE=LOADHI.SYS [switches] driver-name [driver-switches] <20>
<20> <20>
<20> LOADHI switches: <20>
<20> /BESTFIT Load into the block that fits best <20>
<20> /HAPPIEST Load until the program is happy <20>
<20> /REGION:n Load into region number n <20>
<20> /LARGEST[:n] Load into the nth largest block <20>
<20> /SMALLEST[:n] Load into the nth smallest block <20>
<20> /EXCLUDEREGION:n Don't load into region number n <20>
<20> /EXCLUDELARGEST[:n] Don't load into the nth largest block <20>
<20> /EXCLUDESMALLEST[:n] Don't load into the nth smallest block <20>
<20> /GETSIZE[:f] Load low and calculate size <20>
<20> Store result in file f <20>
<20> /SIZE:nnnnn Load into a block nnnnn big <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> LOADHI <20>
<20> Copyright (c) 1988-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> /LABEL:abc Display a label with /GS data <20>
<20> /NOLO Don't load low <20>
<20> /LO Load low <20>
<20> /NOPAUSEONERROR Don't pause on error <20>
<20> /PAUSE Pause while parsing commands <20>
<20> /HELP Display this help text <20>
<20> /? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> FILES <20>
<20> Copyright (c) 1989-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> FILES displays and increases the maximum number of <20>
<20> DOS file handles <20>
<20> <20>
<20> Syntax: <20>
<20> FILES [param] <20>
<20> FILES with no parameter shows the current amount <20>
<20> <20>
<20> FILES parameters <20>
<20> num Set the number of file handles <20>
<20> =num Set the number of file handles <20>
<20> +num Increase the number of file handles by num <20>
<20> NOPAUSEONERROR Don't pause on error <20>
<20> PAUSE Pause while parsing commands <20>
<20> HELP Display this help text <20>
<20> ? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> FCBS <20>
<20> Copyright (c) 1989-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> FCBS displays and increases the number of <20>
<20> DOS FCB handles <20>
<20> <20>
<20> Syntax: <20>
<20> FCBS [param] <20>
<20> FCBS with no parameter shows the current amount <20>
<20> <20>
<20> FCBS parameters <20>
<20> num Set the number of FCBs <20>
<20> ,num Set the number of protected FCBs <20>
<20> num1,num2 Set both FCBS and protected FCBS <20>
<20> +num Increase the number of FCBs <20>
<20> +,num Increase the number of protected FCBs <20>
<20> +num1,num2 Increase both FCBs and protected FCBs <20>
<20> NOPAUSEONERROR Don't pause on error <20>
<20> PAUSE Pause while parsing commands <20>
<20> HELP Display this help text <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> FCBS <20>
<20> Copyright (c) 1989-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> ? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> BUFFERS <20>
<20> Copyright (c) 1988-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> BUFFERS displays and increases the number of <20>
<20> DOS buffers <20>
<20> <20>
<20> Syntax: <20>
<20> BUFFERS [param] <20>
<20> BUFFERS with no parameter shows the current amount <20>
<20> <20>
<20> BUFFERS parameters <20>
<20> num Set the number of buffers <20>
<20> =num Set the number of buffers <20>
<20> +num Increase the number of buffers by num <20>
<20> NOPAUSEONERROR Don't pause on error <20>
<20> PAUSE Pause while parsing commands <20>
<20> HELP Display this help text <20>
<20> ? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> VIDRAM <20>
<20> Copyright (c) 1989-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> VIDRAM grows conventional memory on an EGA or VGA <20>
<20> <20>
<20> Syntax: <20>
<20> VIDRAM [switches] <20>
<20> VIDRAM with no switches displays status <20>
<20> <20>
<20> VIDRAM switches: <20>
<20> EGA Use EGA memory to turn on <20>
<20> EMS Use EMS memory to turn on (default) <20>
<20> NOCGA Inhibit EGA and CGA graphics <20>
<20> NOEGA Inhibit EGA graphics only <20>
<20> OFF Set up normal video memory with graphics <20>
<20> ON Grow memory into video region <20>
<20> OVERRIDE Allow video memory conflict <20>
<20> RESIDENT Just go resident <20>
<20> NOPAUSEONERROR Don't pause on error <20>
<20> PAUSE Pause while parsing commands <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> VIDRAM <20>
<20> Copyright (c) 1989-1990 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> HELP Display this help text <20>
<20> ? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> OPTIMIZE <20>
<20> Copyright (c) 1989 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> OPTIMIZE calculates and analyzes the sizes of your <20>
<20> TSRs and device drivers, and the sizes of the areas <20>
<20> of high RAM, and determines the optimal way to fit <20>
<20> the programs in memory so that as much memory as <20>
<20> possible is left below 640K. <20>
<20> <20>
<20> Syntax: <20>
<20> OPTIMIZE [switches] [filename] <20>
<20> OPTIMIZE with a filename processes that file <20>
<20> <20>
<20> OPTIMIZE switches: <20>
<20> /BOOT:l Specify boot drive letter <20>
<20> /PATH Add optimize path to path statements <20>
<20> /EMM:fname Specify own QEMM type driver <20>
<20> /LOADHIONLY Only modify lines which already have LOADHI <20>
<20> /NOPAUSEONERROR Don't pause on error <20>
<20> /PAUSE Pause while parsing commands <20>
<20> Press any key for next page... <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<20> OPTIMIZE <20>
<20> Copyright (c) 1989 <20>
<20> Quarterdeck Office Systems, Inc. <20>
<20> <20>
<20> /HELP Display this help text <20>
<20> /? List all commands <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
Copyright (C) 1990 by Quarterdeck Office Systems
* * * E N D O F F I L E * * *


View File

@@ -0,0 +1,61 @@
BIG AL'S NORTON UTIL TECH TIPS VOLUME 1 NUMBER 1 (ALSNUTT1)
(C) Copyright 1990 by Al Hansen All Rights Reserved
This first issue of ALSNUTT is issued to the Public Domain and
may be freely copied and distributed as long as the above copyright
notice remains intact.
If you wish to comment on this volume or add to future issues
please do so. You may contact me via Exec-PC the home of
ALSNUTT at 414/789-4210. I'm in the Exec-PC Message.
(Exec-PC Main Menu chain command ;M;I;B;S;;ALSNUTT )
NU 5.0 FILEFIND TIP
Are you tired of FILEFIND searching each matching file on your
disk for a text string when all you really wanted was to limit
the seach to the matching files in the directory you were in at
the moment? If you can't always remember the command line switches
here's a simple little batch file called LF.BAT (for 'local find'):
FF .\%1 %2 %3 %4 %5 %6 %7 %8 %9 ;For example: LF yourtext
Place it in your path. Simple and more intuitive than remembering
to type ".\*.*" or "/C".
SYSTEM SHUT-DOWN TIP
Here's another slick little batch file that will give your hard disk
a quick once over and defrag it before you shut-down for the day.
As an option you could add a disk park program of your choice.
QUIT.BAT
NDD C: /QUICK ;Norton Disk Doctor /QUICK=just test system area
SD C: /U /A /V ;Speed Disk /U=update /A=all /V=volume
PARK ;Use any 'park' utility on hard disk
;shut power off
If you have multiple partitions on your hard disk be sure to add the
same commands for each drive.
NORTON COMMANDER 3.0 ZIP VIEWER
Norton Commander 3.0 has the capabilty to view many major file formats
except .ZIP files. Future versions are rumoured to have this capability.
For now you could try the following:
1. Edit (or create) your NC.EXT file to include:
ZIP: PKUNZIP -V !.! ;allows you to 'view' the contents
2. Park your cursor on the zip file and press Enter
3. Use the NC command CTRL-E to actually unzip the file after 'viewing'
edit out the '-V' option and press Enter again to unzip
ALSNUTT by Al Hansen
Exec-PC
1/1/91

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,93 @@
Amiga 'Boot' Sequence
After getting a number of inquiries from fellow Amiga users about what's
wrong with their Amigas when their Caplock key starts flashing, or, why
the screen flashed odd colors, I decided to create this file.
The Amiga goes through a rather elaborate startup sequence which is a
series of diagnostic tests the Amiga goes through during each 'cold' or
'warm' boot. The following is a list of what happens during each and
every 'boot':
1. Clear all old data in RAM
2. Disable DMA and interrupts
3. Clear the screen
4. Check hardware (is the 680x0 working?)
5. Change screen color indicating pass/fail
6. Perform checksum test of all ROMs
7. Change screen color indicating pass/fail
8. Begin system startup
9. Check RAM at $C0000..move SYSBASE there
10. Test CHIP RAM
11. Change screen color indicating pass/fail
12. Check if software is coming in OK
13. Change screen color indicating pass/fail
14. Set up CHIP RAM to receive data
15. Link libraries
16. Check for any additional RAM and link it
17. Turn on DMA and interrupts
18. Start default task
19. Check processor and MMU type
20. Check for an Exception (processor error)
21. If found, do a reset
22. If not, normal 'boot'
As these tests are running, the Capslock key will normally 'flash' once,
and the screen will cycle colors. The chart below used in conjunction
with the above steps indicates both a 'normal' and an 'abnormal' boot.
NORMAL Fault Condition
Sreen color:
Dark Grey Red (indicates error in ROM)
Light Grey Green (error in CHIP RAM)
White Blue (error in a Custom Chip)
Yellow (680x0 found an error)
Capslock Key:
Stays on for several secs One blink (ROM checksum failed)
Two blinks (RAM test failed)
Three blinks (Whatchdog timer)
Four blinks (A short exists between
2 lines or one of the
special keys)
Please note that the capslock 'blinks' are short in duration (about one
second) and that your screen colors may falsely indicate a problem when
you do a 'warm' boot depending on what state the Amiga was in before the
warm boot. Its best to watch for these diagostic errors upon initial
startup. If your Amiga exhibits any of these errors frequently, you should
take it to an Authorised Service Center for service. The most common
error you will encounter is that you'll see a bright green screen at the
initial boot..this usually indicates that an addon RAM board is not
seated in its socket properly. Try reseating it before you take it all to
your dealer. You may save yourself some money;)
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.
"Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X

View File

@@ -0,0 +1,439 @@
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=
SAVED BY
-<<<<< THE OWL >>>>>-
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=
--------------------
AMIGA'S CUSTOM CHIPS
--------------------
Name: Blaine Gardner #21 @8103
Date: Tue Oct 17 11:24:00 1989
It's impossible to say "that chip does this" and "this chip does that". Agnus, Denise and Paula are three indivisible parts of one functional whole. They are completely useless on their own. The Agnus chip controls the addressing for all the chips, that's why it's the only one that needs changing to increase Chip RAM to 1M for ALL the custom chips. Now it is true that Denise has the video output stuff, and Paula has the audio output stuff, but to get the true picture of how the system works you need to ignore the three IC packages, and look and the one logical unit that they function as.
There's a great set of hires pictures showing exactly how the chips work together on Fish Disk 29. They were done by Jay Miner.
The newer chips that have nothing to do with custom chipset are Gary and Buster. Gary is a Gate ARraY that just makes the machine cheaper to manufacture, it replaces a handful of TTL parts that do the same thing on the A1000. Buster is a BUS arbitraTER chip used on the A2000's expansion bus.
The of course there's the 8520s, they are a semi-custom version of a common interface adapter chip. The only real difference is the format of the timer outputs.
------
COLORS
------
90Jun07 from Blaine Gardner@Gateway (106 Meg BBS, SLC Utah)
32 colors is the standard in lo-res (320 x n) screens. That's 5 bitplanes, and 2 ^ 5 = 32. The Amiga uses a bitplane setup, not pixel-packed. You can have 2, 4, 8, 16, or 32 colors just by setting up a 1, 2, 3, 4 or 5 bitplane screen. They are 100% individually addressable pixels at the 1 through 5 bitplane screens. The 64 or 4096 color screens are special modes with some limitations. 64 colors is Extra Half-Brite (EHB) mode, where a 6th bitplane is added. This bitplane specifies whether the pixel is normal or half brightness. So the second 32 colors must be the half-bright values of the first 32. The 4096 color mode is even more fun. HAM stands for Hold And Modify. You can specify 16 absolute colors, and get the rest by modifying the red, green or blue component of the previous pixel. The disadvantage is that unless you are using one of the absolute colors (which can be any of the 4096), it takes 3 pixels to change all three components (RG&B) of a color, so you can get fringing, but in practice it's not much of a problem since programs really know how to minimize the effect these days.
On bitplanes, the amount of RAM a screen uses relates directly to the resolution and number of bitplanes. 320 x 400 x 6 bitplanes = 768,000 bits, or 96,000 bytes. 1, 2, 3, 4 and 5 bitplane screens use 16K, 32K, 48K, 64K, and 80K respectively.
------------
MULTITASKING
------------
Name: Piranha #7 @8100
Date: Tue Dec 05 23:26:19 1989
There is a TRIVIAL amount of hardware support for multitasking in the Amiga. The custom chip set does wonderful stuff for graphics, animation, and I/O, but ti does not do much to help the machine multitask. The core of the Amiga's multitasking ability is Exec, a small, but wonderful bit of software that does all the magic.
If the Amiga REALLY had "hardware support" for multitasking, we'd all have 68020 or 68030 based machines with hardware memory protection. That does seem to be in the distant future since CBM just took over official support of Dave Haynie's SetCPU program. But wouldn't you really prefer that a corrupt program just dumped a "core" file and terminated, instead of taking down all or part of the machine?
Don't Panic
Much is made of the Amiga's ability to multitask. But what makes its multitasking different from other computers? If anyone has used Window 3.0 for the IBM, you will note that the response is a little different from the Amiga. I found this from Guy Garnett of tnc.UUCP (The Next Challenge, Fairfax, Va.), which gives a good explanation of the Amiga's multitasking system.
Multitasking operating systems can be broken down into two broad categories, "preemptive" and "cooperative". The Amiga, as well as OS/2, Unix, and most mainframes use preemptive multitasking. Multifinder for the Mac, Windows for MS-DOS, and some other computers, use cooperative multitasking.
Preemptive multitasking is particularly well suited for doing several things at once (which is why it is used so often); some have been known to call it "true" multitasking. Cooperative multitasking is also valid multitasking, but it is less generally useful (anything which can be done on a cooperative multitasking system can also be done with a preemptive system, in theory, but the reverse is not true).
Programs on the Amiga have a time limit, or "slice"; when the time expires, Exec (a part of the Amiga operating system) takes control away from the running program, and gives it to the next eligible program. The time slice is so short that it appears that many programs are running at once. Programs can also give up control voluntarily; usually this happens when the program is waiting for something, like disk drives, user input, or other "real world" events. The program in effect says "I have nothing to do until someone moves the mouse (or whatever)", and so Exec starts up another program. This helps make efficient use of the computer.
Unlike many preemptive multitasking operating systems, the Amiga has "real-time response". This means that external events can be detected and responded to quickly ("quickly" is a relative term; the Amiga can respond much faster than most other multitasking systems, although there are several which are designed to respond even faster still). For example, the system can be set up so that a certain program runs between every frame of video (this is how some programs manage color cycling).
------------------------------
READING & WRITING AT SAME TIME
------------------------------
Name: Piranha #7 @8100
Date: Tue Dec 05 23:31:48 1989
Sorry, but the Amiga is incapable of reading or writing to more than one drive at one time. All the LED means is that the drive's motor is turned on.
There is only one blitter channel for encoding/decoding the MFM bitstream from the drive, so only one drive at a time can be dealt with. Some copy programs go as far as having the CPU messing with one track while the blitter is decoding the next one, but that's as close as you can get.
----------------------
File systems OFS & FFS
----------------------
Name: Blaine Gardner #21 @8103
Date: Tue Oct 24 23:38:22 1989
The file systems are largely identical, but to boost speed in the FFS, some of the redunancy of the OFS was removed. The OFS only has 488 bytes of data per block because the other 24 bytes are used for pointers to the previous block. In the OFS you have a double linked list of the blocks used by a file, both forwards and backwards. This gives you a very safe and easy to recover file system, but you lose speed because you have to strip those 24 bytes out of each block. The FFS is fast for this (and other) reasons, but it's also a but less safe because you only have one way to find a loose block, not two.
The FFS still has enough redundancy that the security for speed tradeoff is a good choice. And with DMA controllers the speed is really noticable. With the FFS large chunks can be dropped right into RAM from the drive. With the OFS the system has to strip out the link info from the data before it can dump it to RAM.
If you're not sure what file system a disk is using, just select the disk icon, and use the INFO menu item in Workbench. The "Bytes per block" line will report 488 for OFS and 512 for FFS.
----------
AUTOCONFIG
----------
Date: 29 Jul 90 17:12:28
From: Blaine Gardner
There are a couple of misunderstandings here. First is the meaning of "Autoconfig". Unless an expansion device has special autoconfig hardware, and is configured by the Autoconfig hardware protocol (this means among other things that RAM is added from $200000-a00000, depending on other Autoconfig cards in the system), it is NOT an Autoconfig device, but is using some other method to be added to the system. These methods include "Addmem", and the "Ranger" $c00000 address range trick.
Anything, including the A501, the Spirit Tech, and Michigan Software Insider, that use the $c00000 addressing trick, are NOT Autoconfig, even though they are automatically added to the system.
The second misunderstanding is the difference between hardware design, and address space. It makes no difference at all in the performance of the hardware what address space the RAM responds to. On the other hand, if the physical design of the RAM expansion shares the Chip RAM bus, then no matter what address space the board is jumpered to, it will still be a victim of Chip bus contention and slowdown.
So based on the fact that your board is "autorecognized" (NOT "Autoconfiged") at $c00000, and the fact that your Chip RAM and Fast RAM timings are nearly identical, I'd have to stand by my conclusion that your RAM board design is sharing the Chip RAM bus. If this is true, there is nothing you can do to speed it up, other than redesign it.
Oh, one more thing, if you jumper your board at anything other than the $c00000-e00000 range, does the system automatically recognize it, or do you have to run an "Addmem" type of program?
---
RAM
---
Chip RAM: Accessed by both the custom chips, and the 68000. The ONLY RAM that the Chips can access. All graphics, sound and I/O activity MUST take place in Chip RAM.
Fast RAM: Most expansion RAM. Can't be accessed by the Chipset, and not on the same bus, so not subject to interruption by them. Therefore "Fast" RAM.
Half Fast RAM: (say it quick a couple of times :-) The A501 expanson for the A500, or the extra 512K on the A2000 motherboard. Not available to the Chipset, but on the same bus, so subject to interruption by the chipset. Slower than real Fast RAM.
The Amiga's bus is clocked at 14 MHz, with the 68000 and chipset taking alternate cycles, so they get 7 MHz each. If needed the chipset will steal the bus from the 68000. This does cause slowdowns in program execution, but speeds things up in general because the chipset is more efficient than the 68000 (for graphics, sound, I/O, etc).
That's with only 512K. With Fast RAM, the 68000 runs at full speed all the time because the chipset cannot interrupt it. It doesn't actually run any faster than Chip RAM, but it's not possible to run SLOWER as it is with Chip RAM.
Half Fast was the nickname given to what some people saw as the half-assed design of the extra 512K in the new Amigas. You get the worst of both worlds: No access for the chipset, but subject to interruption by the chipset. This was explained away as a cost cutting measure (cheaper to put it on the Chip RAM bus and save the price of another bus and buffers, etc.) But now we know that it was the prelude to the new 1 megabyte Fat Agnus. Now that the new Agnus has been released, the drawbacks of the Half Fast RAM become the great advantages of an extra 512K of Chip RAM. All you do is swap chips, and change one jumper.
Nothing should change with the extra Chip RAM, except you can have more graphics intensive programs running at once. If you've never run out of Chip RAM while you still had a large chunk of Fast RAM left, you don't need the new chip. I run a 704x470 Workbench screen, and DPaint III can't run in 640x400 16 color mode because it's such a Chip RAM hog.
The speed of the former Half Fast RAM doesn't change, it just becomes available for use by the chipset. If you've got a 1 megabyte 500 or 2000, ALL of your RAM becomes Chip RAM, but there is no speed change.
Don't Panic
CHIP RAM - This is the first 512K of memory (1 Meg if you have the fatter Agnus, 2 Megs if you happen to have a 3000). This memory is used by the processor and custom chips (hence the name CHIP) for programs, graphics, and audio data. Since the custom chips can block the processors' access to the RAM, programs run slower here. If the custom chips are very active at a given time, the CPU must wait for the bus to be free for it's use. [Some activities of the custom chips can 'cycle steal' from the CPU, causing it to be forced to wait]. Normally, the 68000 on the Amiga only needs the bus every alternate clock cycle in order to run full speed...thus the other cycles not used are taken up by the custom chips. However, when the blitter is in use, or the coprocessor (COPPER), you see some of this cycle stealing.
FAST RAM - FAST RAM on the Amiga is any RAM out of the reach of the custom chips. It is known as FAST RAM because code and data may be accessed by the CPU there faster, as it does not have to deal with the bus contention in the CHIP RAM addressing space. With FAST RAM on the system, the CPU can generally run full speed regardless, provided the code/data being accessed is in said FAST RAM, as the custom chips cannot access this memory medium, and are not using it's bus.
Autoconfig RAM - AutoConfig memory is basically a setup of the OS and the memory board which uses it. When a memory board is considered to be AutoConfig, the system will automatically configure it into the free memory pool upon startup. Basically, AutoConfig allows a board to be assigned to a memory address slot based on what is free on the system at configuration time, without your having to configure it manually. On startup, the each board along the line (of physical slots in the machine) appears at a specific memory location, and presents ID information, whereby it is configured to a suitable address space on the system. This done, the next board in line appears, and the same process repeats...on down the line until no further AutoConfig boards remain. Non-AutoConfig memory is not recognized in this manner, and is designed for a specific memory address location only. Using a program such as AddMem, or AddRAM, you are telling the OS where in the addressing space this board can be found, and adding it's memory to free pool list.
32-bit RAM - On a 16 bit bus (16-bit memory), 16 bits of data can be operated on at one time (transferred about, etc...). The 32bit bus can work with 32-bits of data at a time. Thus if you are running two different buses...on 16-bit and one 32-bit, the 32-bit bus can handle more data at a given interval (assuming appropriate processors for each and equivalent bus speeds). This is handled at the interface logic and bus level. Therefore a 32 bit processor such as a 68020 or 68030 with 32 bit memory (a 3000 or 2500) can access information faster than a 16 bit 68000, even though they might be running at the same speed.
On many accelerators, (ones with a Memory Management Unit (MMU) in place), it is possible to take an "image" of the system ROM, copy it to a faster medium (32-bit bus area...the accelerator's memory area), then use the MMU to translate address requests to where the ROM image originally was to it's new location. This is done to speed up the system ROM calls. The first 3000's (the ones with "magic" ROMS) did this. allowing the user to load either OS 1.3 or 2.0.
FASTMEMFIRST - Memory on the Amiga is prioritized. Now, normally CHIP RAM is given a priority on the system of -10. This is to insure it is not used by programs requesting simply "I want a chunk of memory", and not saying "and it needs to be CHIP". This helps prevent CHIP RAM from being used for things which do not need to be there. Now, FastMemFirst is special. On Amigas with 512K of CHIP RAM, the other 512K which make up the 1 meg std. complement is what is called "SLOW-FAST" RAM. This is because, while the custom chips cannot use it, it is still subject to the bus contention for CHIP RAM. FastMemFirst is useful if you have this "SLOW-FAST" memory, and also have true FAST memory on the system. What it does is place your "SLOW-FAST" memory at the same -10 priority as CHIP RAM. Since most true FAST RAM will default to a priority of 0, it places your true FAST RAM ahead of the CHIP and SLOW-FAST memory on the memory lists. This is so programs which do not need to use CHIP RAM (and a program's actual CODE never does for the most part) will be placed in you FAST RAM, and run somewhat faster. SLOW-FAST and CHIP will only be used when either requested specifically by a program, or when your FAST RAM is filled.
--------------------------------------
PROCESSOR SPEEDS / COMPUTER COMPARISON
--------------------------------------
From: daveh@cbmvax.commodore.com (Dave Haynie)
Path: ncr-sd!sdd.hp.com!usc!cs.utexas.edu!uunet!cbmvax!daveh
Organization: Commodore, West Chester, PA
Your friend is on the right track, but obviously confused about the details. Basically, it's meaningless to compare the clock speeds of different chip architectures without knowing both architectures. The clock speed has little to do with how long the actual chip takes to perform an operation. For at least older CPUs, one actually meaningful number is the bus speed -- how many clocks does the CPU take to run a single cycle on its memory bus. A 68000, an 8086, and several other CPUs of the same vintage take 4 processor clock cycles to run one memory cycle. The Z-80 runs a 3 clock cycle to fetch an instruction, a 4 clock cycle to fetch data. The 6502 takes a single clock for its minimum memory cycle. So while you can figure that an 8MHz 68000 and 8MHz 8086 talk to memory at about the same speed, an 8MHz 6502, if such a chip existed, would be talking to memory more like a 32MHz 68000.
Motorola and Intel chips of the same basic generation are going about the same memory speed at the same clock rate. For example, both the 80386 and the 68030 take two clock cycles to access memory. Motorola is indeed making faster 68030s than Intel makes 80386s, and they really do go faster. Some RISC chips actually handle one memory cycle per clock cycle, and the burst mode found on 68030s, 68040s, and 80486s lets these chips fetch 4 longwords in as little as 5 clocks, coming close to 1 word per clock.
And memory fetch is only part of the question. Many CPU operations are internal to the part, and some happen in fewer clocks. The 68040, for instance, takes only one clock to fetch from internal cache, while the 68030 takes the standard two clocks for internal cache fetches (both can fetch from both caches at the same time).
To sum up, an 8MHz 68000 runs much the same kind of cycle as an 8MHz 8086. An 8MHz 68020 can hit memory 1.5 times as fast, an 8MHz 68030 or 80386 can hit memory 2 times as fast, and a 8MHz 68030 or similar chip can hit burst mode memory nearly 4 times as fast as the 68000 or 8086. Of course, since the 68030 has a 32 bit bus, this is actually a data transfer rate closer to 8 times faster.
You can't tell the performance of any _SYSTEM_ simply by looking at the CPU's clock speed. You need to know the kind of memory the CPU is talking to (including possibly system-level caches), the any overhead work the CPU is doing (eg, is there other hardware helping out the CPU, or is the CPU being used to replace some hardware), and the nature of the operating system that's driving the whole thing.
You also need to know the kind of program that's running. You can find some things that a garden variety 12MHz AT will do faster than a plain 68000-based Amiga, and other things the Amiga will do faster. If you know the chip types, you can certainly make a few performance estimates when comparing system to system: you know how many clock cycles a memory fetch would take, what kind of objects the CPU can manipulate, etc. In general, 80286 system compare with 68000 system, 68020 and 68030 system compare with 80386 systems, and 68040 systems should compare well with 80486 systems.
But again, it depends on how the thing is built. HP has a 50MHz 68030 system that beats most 25MHz 80486 systems in most integer benchmarks (though you'll find the same benchmark on the same system will change depending on the OS in charge at the time). Of course, the HP is designed to be a workstation, and costs like one, whereas most 80486 systems are built much like other PCs. And there's nothing much HP could do to make that machine equal the 80486 in floating point operations, other than dropping a 68040 into it.
Machine/OS-- Amiga Mac Atari/TOS 386/UNIX/X-win NeXT
Feature: II SE ST Mega Vista 1280x
NTSC X X X X X
Multitasking X X X X X X
Cooperative X X
Preemptive X X X
Coop.-Preemp. X
Lightweight X X X X
Heavyweight X X X
Real-time
Process Protection X X X
Virtual X X X
Windows/screens X X X X X X X X
Multitasking X X X X X X
Multiresolution X X N/A X
exclusive X
swapped X
windowed
sliding X
Hardware Assist X X X X X
exclusive X
queued X X X X X
prioritized
Table Notes (or Small Print and Definitions):
All systems are essentially "basic", the Mac II and 386 systems don't come with video cards, so for the table I simply picked the cards which had the features you asked for, namely NTSC and hardware assist (blitter).
Cooperative/Preemptive/Coop.-Preemp.: C. means a process must go into wait for another process to get time. P. means all processes get time relative to priority. C.-P. means that all processes of high priority must go into wait for lower priority processes to get time (in retrospect this, rather than lightweight, is probably what markD originally meant by 'real-time').
Multiresolution: Multiple modes are really an artifact of less expensive hardware (allowing trade-off between resolution and bits/pixel) or brain-dead "standards" that cause every device from now until eternity to emulate every earlier device. "Faulting" a 386/UNIX/X/Vista combination -- which can practically "fill" an NTSC signal to the max -- because it can't do alower resolution/bits-per-pixel doesn't make sense, N/A = Not Applicable. Exclusive means the user switches the mode that all applications use (doesn't qualify for "virtual"). Swapped means the application uses a mode and the OS "swaps" the entire screen when you change apps (this is for those brain-dead designs). Windowed means that each window/workspace can have a different resolution. Sliding is a subset of windowed where the mode can only change horizontally or vertically, like a sliding blackboard. Although the ST has multiple modes, you have to reinitialize (i.e. reboot) GEM between them, so I didn't 'X' that.
Hardware Assist: Exclusive means a process can request exclusive use of the video hardware, side-stepping the queueing that is normally done.
> Of course the implementation would be different, my only argument is that a VRAM system of the same flexibility as the Amiga would be far more expensive.
Yes, I think it would be more expensive to use VRAM, I gave the reasons (mainly VRAM+support vs. DRAM) a while back. But, no, if I am wrong about the cost (as Jeff is still trying to convince me of), there is no reason it could not have been as versatile. For example, there isn't really a problem with the VRAM shift register reload time, you have to account for that in _any_ system that is more than 256 wide, you account for it by using a FIFO in front of your pallette that can hold enough pixels during the reload. Ttyhe FIFO/reload puts a limit on how often you can change buffers, but within those limits you can use the copper and have "windowed" virtual screens just like now you have "sliding" virtual screens (Intel's controller can do this). Sprites, like now, are loaded during horizontal retrace. Yes, it's very difficult to implement non exponent-of-2 bits/pixel, but with VRAM you'd would have had the bandwidth (the DRAM limiting factor) to go up to 640x480x8 (even with the A1000's 256k+256k, no less!). And if people the likes of Fred Fish and Leo Schwab are to be trusted ( :-) ), 640x480x8 looks quite a bit better than 320x480 HAM.
> Would you like to write every graphics routine to support 5 or 6 different numbers of bits per pixel like the Mac II?
If I could get as many people to buy each of those different bits/pixel systems as Apple has already managed to do, I would be delighted :-). I think it ends up being better tieing the driver-level drawing routines to the hardware, let the hardware match the intended use, and let the OS be ignorant of how the hardware's organized. If the intended use is bits-per-pixel vs. resolution vs. memory then bit-planes are a great way to generalize. If the intended use is single-mode 1280x900x8 it turns out that one can implement a faster line draw using 1 8-bit byte pixel than can be done with 8 16-bit-word planes, mostly due to overhead of reloading the bit-plane parameters.
ST/Amiga Comparison
-------------------
Please send updates, corrections, and questions to ken_macleod@pedro.UUCP, or ken_macleod at Bitsko's Bar & Grill, (801) 277-0272.
Color 520STfm Amiga 500 w/Color Monitor
------------------- -----------------
$699 Price(1) $769
8.0 Mhz Processor Speed 7.2 Mhz
1000 Software(1) ??
?? Units sold/shipped(1,2) 600k Video
320x200x16 blitter
640x200x4 DMA palette changes
640x400x2 non-interlaced(3) 320x200x2,4,8,16,32,64,HAM
320x400x2,4,8,16,32,64,HAM interlaced
352x242x2,4,8,16,32,64,HAM overscanned
352x484x2,4,8,16,32,64,HAM overscanned
interlaced 640x200x2,4,8,16
640x400x2,4,8,16 interlaced
704x242x2,4,8,16 overscanned
704x484x2,4,8,16 overscanned interlaced
multiple video modes on-screen
16 sprites
Sound
3/1 channel 4 channel
single waveform D/A buffer, 28kHz, 8bits
stereo
Disk Drives
one 720k one 880k
Operating System
command line interpreter(4) command line interpreter
WIMP(4) WIMP
8 overlapping windows time-sliced prioritized multitasking
pipes
messaging
signals
semaphores shared-libraries
prioritized interrupt handling
overlapping windows (screen-bound)
sliding screens
68010/68020 compatible/aware
animation handler
speech synthesizer
Miscellaneous
512k 512k
cartridge port expansion bus
SASI port
MIDI port
The following are higher end machines similar to the above, unless otherwise noted they have all of the features shown above:
1040ST: Amiga 1000 (discontinued):
1024k detached keyboard
Mega ST 2 or 4: Amiga 2000:
2048k or 4096k Detached keyboard
Detached keyboard Internal slots (IBM, Zorro, video)
blitter Battery-backed clock
expansion bus
-----------------------------------------------------------------------
(1) These numbers, of course, are dated.
By the time you read this they're
wrong.
(2) Units sold/shipped include compatible units.
(3) 640x400x2 requires a different monitor, totaling $752(1).
Machine must be rebooted between monitor switches.
(4) CLI and WIMP are exclusive of each other.
---
DMA
---
Date: 29 Jun 90 12:36:52
From: Blaine Gardner
The problem is moving data from the hard drive to RAM. There are two ways to do this, DMA (Direct Memory Access), or copying it with the CPU.
With DMA the DMA controller requests control of the bus, then directly dumps the data into the desired RAM location. The data traverses the bus only once, from DMA controller to RAM.
In non-DMA (CPU driven I/O) controllers the CPU fetches the data from the controller, then copies the data from the CPU registers to the final location in RAM. This makes TWO trips across the bus, one from drive to CPU, and a second from CPU to RAM.
Regardless of anything else, you can see that DMA is twice as efficient in bus usage as CPU driven I/O.
The other way DMA is better is that while a DMA transfer is taking place, the CPU is free for anything else. In a non-DMA design, the CPU is being used for the grunt work of transferring data, so it cannot do anything else while data transfer is happening.
Remember that this is all happening very fast, so you will not see a non-DMA controller lock up the system during a data transfer because the usual task-switching is taking place. But you will see the CPU free time hit 0%. A DMA controller will leave about 90-95% of the CPU time free.
Another advantage to the A2091 is that it does not shut off interrupts when doing disk access like the Kronos does. A friend was unable to download to his hard drive with the Kronos controller, until someone told me that the default setup from CLtd disables interrupts during disk access, in order to get better benchmark times. Sure enough, when we enabled interrupts again, my friend stopped getting errors when downloading to the hard drive, and it did drop the drive benchmark speeds noticably.
Remember that there are three kinds of lies: Lies, Damned Lies, and Benchmarks.
If you really want a good indication of a drive or controller's performace, get Disk Speed 3.1 (by Michael Sinz, of CBM) from Fish Disk 329, and run it in "High Intensity" mode with both "DMA Contention" and "CPU Contention" on. Then run it again with both contention modes off.
This will tell you not only how fast your setup performs under ideal conditions (what every controller seller quotes), but the contention modes will tell you what your setup will do under worst-case modes. Expect to see a dramatic fall off in speed for CPU driven controllers.
Also, run PerfMon at the slowest time to see what impact on CPU time your hard drive setup has. The Hardframe uses about 20% of the CPU time at most. This will be close to 90% for CPU driven controllers.
Oh, I meant to say, have PerfMon running WHILE you are running DiskSpeed.
And for the best, and most repeatable results, run the test on a freshly formatted partition. Fragmentation can cut your speed by half.
From: daveh@cbmvax.commodore.com (Dave Haynie)
Date: 4 Sep 90 21:11:29 GMT
Organization: Commodore, West Chester, PA
In article <1990Aug30.195419.25644@sisd.kodak.com> jeh@sisd.kodak.com (Ed Hanway) writes: >In article <02102.123056@thiger.UUCP> skraw@thiger.UUCP (Stephan von Krawczynski) writes: >>DMA (other than bitmap) runs into heavy troubles sometimes during
>>overscan-graphics (e.g.)
>[...]
>>i have seen no dma-controller yet, that didn't have problems.
>[...]
>>amigamem troughput brings the thing down to some 100 kBytes (a typical
>Well then I guess that you've never seen a HardFrame. Using the Diskspeed
>benchmark with DMA contention turned on, my disk transfer speeds slow from
>about 800k/sec to about 650k/sec, which seems completely reasonable to me.
>I don't know where you get the idea that 100k/sec is a typical bottleneck.
It certainly isn't. The real question is, more than likely, what's the target of your DMA. If you have Fast memory in the system, than the Chip bus saturation is really only a DMA lag problem -- how long might the DMA device have to wait before it gets the bus. Once it has the bus, the transfer into Fast memory occurs at full bus speed. If the DMA was to Chip memory, then it's the same problem the CPU had -- waiting for retrace times.
>My question to all the DMA opponents is this: given that 4 bitplane hires
>overscanned screen DMA does eat up most of the chip memory bandwidth, why
>should processor-controlled I/O be any better than DMA at using the remaining
>bandwidth?
It's actually worse, if it relies on any interrupt activity. To begin the transfer, the either CPU or the potential bus master must wait for a clear cycle. The bus master gets it in a single cycle, most of the time, while any interrupt will have to wait for an instruction boundary, and then in most cases fetch its vector from Chip memory anyway. So, DMA or not, you are most likely taking the largest bottleneck waiting on interrupts, not the actual transfer, as long as there's fast memory around. If you have an A2620 or '030 system, try SetCPU V1.6 (to get supervisor stack out of Chip memory) and one of the MoveVBR things to get interrupt vectors out of Chip memory, and your Chip-bus-saturated disk performance should go up, a little or alot will depend on the
>although a 68030 tight loop might approach DMA efficiency.
Compared with 16 bit DMA, it does approach DMA efficiency in the limit as 68030 memory access time approaches 0 (not being facetious here; one 32 bit RAM access can be 200ns or less, while two 16 accesses take at least 1120ns). Of course, what you want is to build a DMA controller for the 68030 bus. See "A3000" for more details :-)
In article <02048.002057@thiger.UUCP> skraw@thiger.UUCP (Stephan von Krawczynski) writes:
>>> True DMA (ala the A2090) is VERY important to me. GVP claims
>>> this board is. Anybody have one that can comment?
>1. GVP does not DMA to amiga-memory.
That's true, at least with the original GVP board. I don't know the details
of the new one.
>2. why is DMA so important for you? it is generally slower than the
>processor-method (lets call it this way).
That's ABSOLUTELY INCORRECT. But sometimes a misconception amoung the uninformed. You have to understand the problem you're trying to solve to get a true picture of what's happening. And that problem is, how can you efficiently transfer data from the SCSI chip into system memory.
The simplest approach would, of course, be to have the CPU wait on the SCSI chip and copy over every single byte as it's available. This is basically what the pre-IIfx Macintoshes all do; they pretend the SCSI chip is slow, 8-bit wide memory, and wait for each byte to become available in a tight CPU copy loop. This is a loosing proposition from the start, however. The most common form of SCSI transfer, asynchronous SCSI, runs at up to 1.5 MB/s (Megabytes per second). Your A2000 bus runs at about 3.5 MB/s. If you run it at only 8 bits/transfer, that's cut down to 1.75 MB/s. However, using the CPU to do the copying, at best, you need two byte reads and one word write to get a word from SCSI chip into memory. That's a maximum speed of 1.17 MB/s for the transfer (neglecting any overhead from the transfer loop, which will be non-zero), and during that transfer, the CPU gets to do NOTHING but copy the data from the SCSI chip. This can't even keep up with SCSI, so we throw it out for anything but the cheapest controllers (the original TrumpCard and the original C Ltd controllers worked this way).
The next approach would be to funnel two SCSI bytes into one word and do the same wait-copy approach. This would yield a maximum transfer rate of 1.75 MB/s, which will keep up with asynchronous SCSI at its fastest. However, this wait-copy approach has severe drawbacks. It gets the data into memory extremely fast, since nothing but the copy can happen until the data is in memory. But you may actually be WAITING for the data from the SCSI drive, for seeks or other times at which you're not getting it in at full speed. This kind of scheme may APPEAR to be the fastest transfer, since in using polled I/O instead of interrupts, there's never any lag at the end of the transfer, but you sacrifice your SYSTEM speed for hard disk speed. Overall, things will be slower, since you actually end up wasting time in wait states, waiting on the hard disk. Single tasking systems like the Macintosh or PC might take this OK, since they have nothing else to do anyway, but it's no good for an Amiga. C Ltd's Kronos and Supra's WordSync both funnel SCSI into the 16 bit data path, though I don't know if they hog the bus as described or not.
The third approach is to add a buffer to your CPU copy approach. In this system, you have the SCSI chip itself conduct a DMA-like transfer into some private controller memory (many SCSI chips provide a counter output to make the hardware for this easy). Once the transfer is complete, the controller interrupts the CPU, which does a fast memory-to-memory copy of the acquired data block, all at once. The transfer speed here is still the same 1.75 MB/s as in the previous method, however, it always occurs at full speed. The preceived disk speed may be a bit slower, since the actual transfer doesn't start until the block is fully read, but the overall SYSTEM goes faster, since no time is wasted in wait states. The GVP controller does this.
The final method is true DMA. While DMA controllers can use a full block buffering method, most use some kind of FIFO, which tends to be more efficient with DMA. The DMA controller can transfer data at the full 3.5 MB/s, although asynchronous SCSI can only manage 1.5 MB/s. The CPU will set up the DMA controller with a destination for any number of SCSI blocks, and then the DMA controller takes over. When the FIFO is near full, it requests the bus, transfers data at full speed, and then gives the bus back when the FIFO empties until the FIFO is near full again. The actual data gets into memory not much differently than the buffered CPU copy approach (eg, no wait states), but for the same amount of data transferred, the DMA device uses 1/2 the bus time. The other 1/2 is available to the CPU, so CPU work actually gets done during the transfer, even if waiting is required. A2090[a], A2091, A3000, and Microbotics Hardframe work this way (the A3000 DMA controller, by the way, runs at around 20 MB/s on a 25MHz A3000).
>you win nothing because you have a whole lot of DMA going on already inside
>the system
The other DMA in the system is a completely different kind of DMA. Hard disk controllers run on the Fast/Expansion bus just like the CPU, while "Amiga" DMA is this special slot-allocated bus sharing that only takes place on the Chip bus. The two are unrelated; in fact, as far as the Fast or Chip bus is concerned, there's no difference between CPU access or access by a DMA driven expansion device such as a hard disk controller.
>and processor's running into heavy troubles sometimes, e.g.
>harddisk-performance is very low while using overscan-graphics (just to
>mention an example).
The only case in which overscan-graphics cause a problem is in the case of the 2090[a] controllers. And this has nothing to do with DMA. The effect of overscan with many bitplanes on is to tie up the chip bus for long periods of time. If the CPU is trying to access Chip memory at this time, it gets wait stated and can do nothing until a retrace comes along. DMA or non-DMA, you have the same problem here -- getting the CPU away from waiting on Chip RAM, either by interrupt in the non-DMA case or by bus request in the DMA case. While the hard disk controller is waiting for CPU/bus access, there is still SCSI activity coming in. Unless your controller fully buffering, as in my third case, it must tell SCSI to stop sending data. The problem with the A2090[a] is that it didn't know how to do this. At least part of that problem was due to it's support of ST-506. At the time, ST-506 was the primary interface, SCSI was simply added because it was easy. ST-506 is slower than SCSI, and being a dumb interface, can't be stopped. So for whatever reasons, the A2090[a] controllers didn't know how to tell SCSI to stop sending when they couldn't get the bus fast enough, so they don't work well with heavy chip bus activity. This IS NOT a general problem with DMA! The A2091, A3000, Hardframe, and most likely any other DMA driven controller will work as well with overscan, if not better, than any non-DMA device. The manufacturers of non-DMA devices often try to mislead you by claiming "DMA problems" and implying they pertain to all DMA driven controllers, not just the A2090[a] (which, by the way, haven't been made for awhile).
>well, how about "transfer rates up to 4MB/SEC synchronous" (gvp). in fact
>i have never understood this one. what do they mean? 4MBytes/sec?
As I mentioned previously, asynchronous-mode SCSI transfers run at about 1.5 MB/s, tops. All SCSI devices out there run in asynchronous mode, and many don't handle synchronous mode. That's one of the reasons that the non-DMA controllers have managed, so far, to appear as fast or, parasitically, faster, than the DMA controllers -- as long as the SCSI transfers aren't faster than your transfer mechanism can handle, the speed of SCSI is the limiting factor. In synchronous mode, the SCSI bus uses a clock to coordinate the transfer, yielding potential transfers of 2 MB/s to 5 MB/s, depending on the clock. There's also a fast synchronous mode as part of the SCSI-2 spec which has a top speed of 10 MB/s. Synchronous won't make much difference in most single drive situations, anyway, since the raw speed of data coming off the disk is still around 1.25-1.5 MB/s, at best. But if you have multiple devices on the SCSI bus, and when faster devices are available, controllers that don't saturate the Amiga at 1.5 MB/s (eg, DMA controllers) will go noticably faster than non-DMA controllers.
>i have never seen a controller/hd-combination reaching this.
Like I said above, you probably won't. Just yet. And the raw SCSI transfer speed is only part of the equation -- your interrupt lag, device driver efficiency, system load, etc. all add to effective disk speed.
>4MBits/sec = 512kBytes/sec. seems to be more like the truth, but is an
>absolutely ridiculous value
No, it's 4 MegaBYTES per Second. That's trivial compared to the speed of the A3000's main bus or Zorro III bus, though not bad for the kind of peripheral bus SCSI is supposed to be. As I mentioned, the drives themselves are still catching up to this, and most A2000-class SCSI controllers are caught up short. The A3000 can hit around 1.2 MB/s through the filesystem with an asynchronous SCSI device, since it's fast DMA and fast bus arbitration are practically invisible when compared to the speed of SCSI. And keep in mind, while that DMA is happening, you're only using about 7.5% of the 3000's main bus bandwidth (a full speed synchronous SCSI could take 25% if it could be sustained).
Dave Haynie Commodore-Amiga (Amiga 3000) "The Crew That Never Rests"
{uunet|pyramid|rutgers}!cbmvax!daveh PLINK: hazy BIX: hazy
Get that coffee outta my face, put a Margarita in its place!
---------------------------
Hidden Goodies in Workbench
---------------------------
1.x = hold both Shift & Alt keys
press & hold each of F keys in turn (different messages for each key)
Insert disk in & out of DF0: (bad or nice message on eject)
2.x = click on Workbench window with Left button,
press & hold: Ctrl, both Alt, both Shift,
select any Workbench menu items with mouse,
release keys and choose <20>Last Message<67> from menu (repeat each menu)
3.x = 1. Boot Amiga. May have to shut down Workbench tools (AppIcons)
2. Press and hold down Right mouse button.
3. Press and hold down: Ctrl, left Shift, left Alt, right Shift, right Alt
4. Select <20>About<75> from Workbench menu
5. Move About window aside (don<6F>t close it), click on Workbench window
again, repeat from step 2. Within 15 tries, a different About box should open. If
not, you may have the Workbench.library open too may times. If so, reboot
without running startup-sequence, start Workbench with <20>LoadWB<57> and try
again.

View File

@@ -0,0 +1,400 @@
On Monday March 2, RJ Mical (=RJ=) spoke at the Boston Computer Society
meeting in Cambridge.
Fortunately I was momentarily possessed with an organizational passion,
and I took copious notes. I present them here filtered only through my
memory and my Ann Arbor. My comments are in [square brackets]. What
follows is a neutron-star-condensed version of about three and one half
hours of completely uninterrupted discussion.
PART 1 - The Rise and Fall of Amiga Computer Inc.
==== === === ==== === ==== == ===== ======== ====
The Early Days
--- ----- ----
Amiga Computer Inc. had its beginnings, strangely enough, RJ began, with
the idea of three Florida doctors who had a spare $7 million to invest.
They thought of opening a department store franchise, but (as RJ said) they
wanted to try something a bit more exciting. So they decided to start a
computer company. "Yeah, that's it! A computer company! That's the
ticket! :-)"
They found Jay Miner, who was then at Atari (boo hiss) and Dave Morse,
the VP of sales (you can see their orientation right off..) they lifted
>from Tonka Toys. The idea right from the start was to make the most killer
game box they could. That was it, and nothing more. However Jay and the
techies had other ideas. Fortunately they concealed them well, so the
upper management types still thought they were just getting a great game
machine. Of course the market for machines like that was hot hot hot in
1982...
They got the name out of the thesaurus; they wanted to convey the
thought of friendliness, and Amiga was the first synonym in the list. The
fact that it came lexically before Apple didn't hurt any either, said RJ.
However before they could get a machine out the door, they wanted to
establish a "market presence" which would give them an established name and
some distribution channels - keep thinking "game machine" - which they did
by selling peripherals and software that they bought the rights to from
other vendors. Principal among these was the Joyboard, a sort of joystick
that you stand on, and you sway and wiggle your hips to control the
switches under the base. They had a ski game of course, and some track &
field type games that they sold with this Joyboard. But one game the folks
at Amiga Inc. thought up themselves was the Zen Meditation game, where you
sat on the Joyboard and tried to remain perfectly motionless. This was
perfect relaxation from product development, as well as from the ski game.
And in fact, this is where the term Guru Meditation comes from; the only
way to keep sane when your machine crashes all the time is the ol'
Joyboard. The execs tried to get them to take out the Guru, but the early
developers, bless 'em, raised such a hue and cry they had to put it back in
right away.
When RJ interviewed with Amiga Computer (he had been at Williams) in
July 1983, the retail price target for the Amiga was $400. Perfect for a
killer game machine. By the time he accepted three weeks later, the target
was up to $600 and rising fast. Partly this was due to the bottom dropping
completely out of the game market; the doctors and the execs knew they had
to have something more than just another game box to survive. That's when
the techies' foresight in designing in everything from disk controllers to
keyboard (yes, the original original Amiga had NO KEYBOARD), ports, and
disk drives began to pay off.
The exciting part of the Amiga's development, in a way its adolescence,
that magical time of loss of innocence and exposure to the beauties and
cruelties of the real world, began as plans were made to introduce it,
secretly of course, at the winter CES on January 4th, 1984(?).
Adolescence
-----------
The software was done ten days before the CES, and running fine on the
simulators. Unfortunately when the hardware was finally powered up several
days later, (surprise) it didn't match its simulations. This hardware, of
course, was still not in silicon. The custom chips were in fact large
breadboards, placed vertically around a central core and wired together
round the edges like a Cray. Each of the three custom `chips' had one of
these towers, each one a mass of wires. According to RJ, the path leading
up to the first Amiga breadboard, with its roll-out antistatic flooring,
the antistatic walls just wide enough apart for one person to fit through
and all the signs saying Ground Thyself, made one think of nothing so much
as an altar to some technology god.
After working feverishly right up to the opening minutes of the CES,
including most everybody working on Christmas, they had a working Amiga,
still in breadboard, at the show in the booth in a special enclosed gray
room, so they could give private demos. Unfortunately if you rode up the
exhibit-hall escalator and craned your neck, you could see into the room
>from the top.
The Amiga was, RJ reminisced, the hardest he or most anyone there had
ever worked. "We worked with a great passion...my most cherished memory is
how much we cared about what we were doing. We had something to prove...a
real love for it. We created our own sense of family out there."
After the first successful night of the CES, all the marketing guys got
dollar signs in their eyes because the Amiga made SUCH a splash even though
they were trying to keep it "secret."
And so they took out all the technical staff for Italian food, everyone
got drunk and then they wandered back to the exhibit hall to work some more
on demos, quick bug fixes, features that didn't work, and so on. At CES
everyone worked about 20 hours a day, when they weren't eating or sleeping.
RJ and Dale Luck were known as the "dancing fools" around the office
because they'd play really loud music and dance around during compiles to
stay awake.
Late that night, in their drunken stupor, Dale and RJ put the finishing
touches on what would become the canonical Amiga demo, Boing.
At last the true story is told.
Money Problems
----- --------
After the CES, Amiga Inc. was very nearly broke and heavily in debt. It
had cost quite a bit more than the original $7 million to bring the Amiga
even that far, and lots more time and money were needed to bring it to the
market. Unfortunately the doctors wanted out, and wouldn't invest any
more. So outside funding was needed, and quick.
The VP of Finance balanced things for a little while, and even though
they were $11 million in the hole they managed to pay off the longest-
standing debts and keep one step ahead of Chapter 11. After much
scrounging, they got enough money to take them to the June CES; for that
they had REAL WORKING SILICON. People kept peeking under the skirts of the
booth tables asking "Where's the REAL computer generating these displays?"
Now money started flowing and interest was really being generated in the
media. And like most small companies, as soon as the money came in the
door it was spent. More people were added - hardware folks to optimize and
cost-reduce the design; software people to finish the OS. Even the sudden
influx of cash was only enough to keep them out of bankruptcy, though; they
were still broke and getting broker all the time. How much WOULD have been
enough? RJ said that if he were starting over, he'd need about $49
million to take the machine from design idea to market. Of course Amiga
Inc. had nowhere near that much, and they were feeling the crunch. Every-
body tightened their belts and persevered somehow. They actually were at
one point so broke they couldn't meet their payroll; Dave Morse, the VP of
Sales, took out a second mortgage on his house to help cover it, but it
still wasn't enough.
They knew they were going under, and unless they could find someone
quick to buy them out they were going to be looking for jobs very shortly.
They talked to Sony, to Apple, to Phillips and HP, Silicon Graphics (who
just wanted the chips) and even Sears. Finally...they called Atari. (Boo!
Hiss! [literally - the audience hissed at Jack Tramiel's name!]) Trying to
be discreet, RJ's only personal comment on Jack Tramiel was (and it took
him a while to formulate this sentence) "an interesting product of the
capitalist system." Ahem. Apparently Tramiel has been quoted as saying
"Business is War." Tramiel had recently left Commodore in a huff and
bought Atari "undercover" so that by the time he left C= he was already CEO
of Atari.
Realizing that Commodore was coming out with their own hot game machine,
Tramiel figured he'd revenge himself on them for dumping him by buying
Amiga Inc. and driving C= down the tubes with "his" superior product. So
Atari gave them half a million just for negotiating for a month; that money
was gone in a day.
Of course Tramiel saw that Amiga Inc. wasn't in a very good bargaining
position; basically unless they were bought they were on the street. So he
offered them 98 cents a share; Dave Morse held out for $2.00. But instead
of bargaining in good faith, every time Morse and Amiga tried to meet them
halfway their bid went down!
"Okay, $1.50 a share.
No, we think we'll give you 80 cents.
How about $1.25?
70 cents."
And so on...
Even Dave Morse, the staunchest believer in the concept that was the
Amiga, the guiding light who made everyone's hair stand on end when he
walked into the room, was getting depressed. Gloom set in. Things looked
grim.
Then, just three days before the month deadline was up, Commodore
called. Two days later they bought Amiga Inc. for $4.25 a share. They
offered them $4.00, but Dave Morse TURNED THEM DOWN saying it wasn't
acceptable to his employees; he was on the verge of walking out when they
offered $4.25. He signed right then and there.
The Commodore Years
--- --------- -----
Commodore gave them $27 million for development; they'd never seen that
much money in one place before. They went right out and bought a Sun
workstation for every software person, with Ethernet and disk servers and
everything. The excitement was back.
Commodore did many good things for the Amiga; not only did they cost-
reduce it without losing much functionality, they had this concept of it as
a business machine; this was a very different attitude from what Amiga Inc.
had been working with. Because of that philosophy, they improved the
keyboard [ha! - garyo] and made lots of other little improvements that RJ
didn't elaborate on.
What could Commodore have given them that they didn't? The one thing RJ
wanted most from them was an extra 18 months of development time. Unfortu-
nately Commodore wasn't exactly rich right then either, so they had to
bring out the product ASAP [and when is it ever any different?] Also, he
said, they could have MARKETED it. (applause!). If he'd had that extra 18
months, he could have made Intuition a device rather than a separate kind
of thing; he could have released it much more bug-free.
As far as marketing goes, the old ad agency has been fired; we should
see some new Amiga ads real soon now.
The Future
--- ------
RJ's advice for A1000 owners: "Keep what you've got. It's not worth it
to trade up. The A1000 is really a better machine."
This may be sour grapes on RJ's part, since the Amiga 2000 was designed
in Braunschweig, West Germany, and the version of the A2000 being worked on
in Los Gatos was rejected in favor of the Braunschweig-Commodore version.
However the A1000 compares to the A2000, though, the Los Gatos 2000 would
have certainly been better than either machine. C= management vetoed it
because Braunschweig promised a faster design turnaround (and, to their
credit, were much faster in execution than the Los Gatos group would have
been) and more cost-reduction, which was their specialty. Los Gatos, on
the other hand, wanted a dream machine with vastly expanded capabilities in
every facet of the machine. The cruel financial facts forced C= to go with
the Business Computer Group, who did the Sidecar in Braunschweig as well,
and quickly and cheaply.
So they fired more than half the staff at the original Los Gatos
facility, one by one. That trauma was to some extent played out on the
net; no doubt many of you remember it as a very difficult and emotional
time. There are now only six people left in Los Gatos, and their lease
expires in March, so thus expires the original Amiga group.
And that's how RJ ended his talk; the rise and fall of Amiga Computer
Inc. The future of the Amiga is now in the hands of Westchester and
Braunschweig, and who knows what direction it will take?
PART 2 - Technical Questions From the Audience
==== === ========= ========= ==== === ========
I'll just make this part a list of technical questions and answers,
since that was the format at the talk anyway. This part is part technical
inquiries and part total rumor mill; caveat emptor.
Q's are from the audience, A's are =RJ=.
............................................................................
Q: When is 1.3 coming and what's in it?
A: 1.3 (or maybe it'll be called 1.2A) will be mostly just 1.2 with hard
disk boot; it'll look for Workbench on dh0: as well as df0:.
No one is working on it right now, although there are people in West
Chester planning it.
Q: Can you do double buffering with Intuition?
A: Pop answer: No. Thought-out: well, yes, but it's not easy. Use
MenuVerify and don't change the display while menus are up. It's pretty
hairy.
Q: How big is intuition (source code)?
A: The listings (commented) are about a foot thick, 60 lpp, 1 inch margins.
Q: Where did MetaComCo come into the Amiga story?
A: MCC's AmigaDOS was a backup plan; the original Los Gatos-written
AmigaDOS was done with some co-developers who dropped out due to
contract and money hassles when C= bought Amiga. Then MCC had to crank
EXTREMELY hard to get their BCPL DOS into the system at the last
possible minute.
Q: Why isn't the Sidecar out?
A: Who knows? It passed FCC in December...
Q: Why no MMU?
A: Several reasons. Obviously, cost was a factor. MMUs available at the
time the Amiga was designed also consumed system time [this is what he
said- I'm just the scribe]; although newer MMUs solve this problem they
were too late for the Amiga.
Second, the original goal of the Amiga was to be a killer game machine
with easy low-level access, and an MMU didn't seem necessary for a game
machine.
Third [get this!] with an MMU, message-passing becomes MUCH MUCH hairier
and slower, since in the Amiga messages are passed by just passing a
pointer to someone else's memory. With protection, either public memory
would need to be done and system calls issued to allocate it, etc., or
the entire message would have to be passed. Yecch. So the lack of MMU
actually speeds up the basic operation of the Amiga several fold.
Q: Why no resource tracking?
A: The original AmigaDOS/Exec had resource tracking; it's a shame it died.
Q: How is your game coming? [??]
A: It's just now becoming a front-burner project. It's number crunch
intensive; hopefully it will even take over the PC part of the 2000 for
extra crunch. It's half action, half strategy; the 'creation' part is
done, only the playing part needs to be written. Next question. :-)
Q: Will there ever be an advanced version of the chip set?
A: Well, Jay Miner isn't working on anything right now... [RUMOR ALERT]
The chip folks left in Los Gatos who are losing their lease in March
were at one time thinking about 1k square 2meg chip space 128-color
graphics, although still with 4 bit color DACs though... and even stuff
like a blitter per plane (!!) They were supposed to be done now, in the
original plans; the chip designers will be gone in March, but the design
may (?) continue in West Chester. Maybe they'll be here two years from
now.
Q: What will happen to the unused Los Gatos A2000 design?
A: ??????
Q: Should I upgrade from my 1000 to a 20
00?
A: Probably not. The 2000 isn't enough better to justify the cost. Unless
you need the PC compatibility, RJ advocated staying with the 1000.
After all the 2000 doesn't have the nifty garage for the keyboard...:-)
The A1000 keyboard is better built; you can have kickstart on disk; it's
smaller and a LOT quieter, [maybe not than the old internal drives!!!]
and uses less power; the 2000 has no composite video out, plus the RGB
quality is a tad worse. Composite video (PAL or NTSC) is an extra-cost
option with the 2000.
Q: Have you ever seen a working Amiga-Live!?
A: Yes, I've seen it taking 32-color images at 16fps, and HAM pictures at
something like half that. [!!] It's all done and working. I don't know
why it's not out. It sure beats Digiview at 8 seconds per image!
Q: What do you use for Amiga development tools?
A: DPaint and Infominder, Aztec C, Andy Finkel's Microemacs.
Q: What's the future of the A1000?
A: They aren't making any right now; they're just shipping from stock. But
they do claim that they intend to continue making them.
Q: Is MetaComCo's stuff all really slow, or what? :-)
A: Yes, it is slow. But don't knock it, it works.
Q: Who is the competition for Amiga right now?
A: The new Macs are so expensive, they're not a threat to the 2000, much
less the 1000. Atari's new stuff "doesn't impress me." [that's all he
said.]
Q: What can I do about lack of Amiga ads, and the quality of the ones that
do exist?
A: Write (don't call) Clive Smith in Marketing at Westchester and tell him
they need better ads.
Q: Why are the pixels 10% higher than wide?
A: The hardware came out that way, and it would have been a pain to do it
any other way due to sync-rate-multiple timing constraints.
[that's all folks!]
===========================================================================
The preceding tome was produced entirely by placing my terminal cable just
next to the microwave on high and wiggling it around like !*(&t%*h5i@!s, so
don't take any of it too seriously. :-)
Gary Oberbrunner
--
Remember, -Truth is not beauty;
Information is not knowledge; / Beauty is not love; Gary Oberbrunner
Knowledge is not wisdom; / Love is not music; ...!masscomp!garyo
Wisdom is not truth; ----/ Music is the best. - FZ
--
--------------------------- Signature Version 1.2 ---------------------------
| bear@bu-pub.bu.edu enge05c@buacca.bu.edu |
| |
| "Love is like oxygen. You get too much, you get too high. |
| Not enough and you're gonna die. Love gets you high." |
-----------------------------------------------------------------------------

View File

@@ -0,0 +1,203 @@
The following is an excerpt from an article scheduled to appear in the
February 1991 issue of Amazing Computing. Please refer to that article for
more information about the I/O Board as well as ordering information. -JL
Happy Holidays!
=============================================================================
12 December 1990
More Ports for Your Amiga
An I/O Expansion board
by Jeff Lavin
Copyright )1990 The Puzzle Factory
Many of you in the Amiga community have built Brad Fowles' excellent "LUCAS"
accelerator board, which introduced the idea of "Public Domain Hardware". In
this article I will present another public domain hardware project for the
Amiga, which will enable you to add two parallel ports and two serial ports
to your Amiga 500, 1000 or 2000 for $70. Furthermore, you can easily and
inexpensively upgrade to four parallel ports and/or four serial ports at any
time.
The hardware consists of a small printed circuit board with a 40 pin cable
and DIP jumper that plugs into the socket occupied by CIA B, and a small pcb
that contains the serial interface. CIA B is physically moved onto the I/O
Expansion board.
This hardware supports 15 standard baud rates, from 50 to 38,400 baud, plus
MIDI (31,250 baud). It also supports full hardware handshaking. Up to four
units may be open at one time, although the cpu may not be able to keep up
with all four units running above 2400 baud.
Raison d'etre
=============
As a hardware hacker of long standing, I have a number of small computers
with all sorts of hardware attached to them, from extra ports to EPROM prog-
rammers, and longed to do the same with the Amiga. Since the Amiga uses a
pair of 8520's (actually 6526's) for its I/O, I figured it would be a piece
of cake to add more 65/68XX family peripheral chips and be up and running.
The only problem was that, because there is no obvious chip select decoding,
I could never figure out how the 8520's were addressed. One day a friend
came by, and we were able to figure out that the I/O chips are
"automatically" selected when certain addresses are generated by logic hidden
in the PALS. Now that the final piece of the puzzle was in place, I wasted
no time and had a prototype in my Amiga in two weeks.
How it works
============
This hardware hack is possible because of two things the designers of the
Amiga did for us:
1. The address space where the CIAs live is incompletely decoded. This
means the 16 CIA registers are echoed repeatedly over a large range.
2. The locations where software is supposed to address the CIA registers
is completely specified over a much smaller range.
These two facts make it possible for us to take the chip select from one CIA,
and divide it into four parts. The addresses in the upper part are routed to
the CIA normally, and we "steal" the addresses from the remainder of the
space for our own use. Because the "hard" part, most of the address decoding
and the bus timing, has been done for us, we can get away with nothing more
complicated than an additional address decoder to split off our address space.
Unfortunately, this hack is not possible on the A3000 for the same reason
that it is possible on earlier Amigas. The address decoding on the A3000 is
complete; there are no "extra" incompletely decoded addresses to "steal".
The VIA and ACIA registers are still echoed over a pretty wide address range.
We have specified where to address them for the same reason that Commodore
has specified addresses for the CIAs: to ensure software compatibility. We
would very much like to see enough people build these boards to create an
installed software base. So programmers, please use these addresses when you
are writing all those neat multi-line BBS programs and multi-user
applications, as well as process control programs, robotics demos, etc.
Software
========
Of course, hardware is next to useless without software to drive it. This
section describes the software available for the I/O Expansion Board.
The Serial Driver
-----------------
Almost all programs written for the Amiga that use the serial port (with the
notable exception of some MIDI software) access it indirectly via a standard
software module called "serial.device". As a result, most existing software
will work fine with the I/O Board given a suitable driver, and we supply one,
named "newser.device". Simply copy it to your "DEVS:" directory and you're
in business. Most programs will permit you to change the device name (from
serial.device to newser.device) as well as the unit number (indicating which
port is to be used), or you may use the supplied IOpatch utility, described
below (see "Support Programs"). It is worth noting that, as with all other
programs relating to the I/O Board, we supply complete assembly language
source code of the driver. If you encounter a problem - and all else fails -
it's possible to fix it yourself.
The Parallel Driver
-------------------
The four parallel ports on the I/O Expansion Board are controlled by the
eightbit.device. There are no known differences between this device and the
V1.3 parallel.device. Applications should not experience any problems
communicating with the eightbit.device on the device level. Full assembly
language source code of the driver is supplied with the I/O Expansion board.
DOS-Level Support
-----------------
"DOS-level support" refers to the ability to get and send data via the serial
and parallel ports with standard AmigaDOS commands, such as TYPE or LIST, or
with any program that does serial or parallel I/O via AmigaDOS, rather than
directly via the Exec-level "newser.device" or "eightbit.device". Although
this sort of capability is not frequently used, it is useful from time to
time.
In a perfect world, DOS-level support would mean nothing more than an
appropriate MountList entry, specifying a driver name of "newser.device" or
"eightbit.device", and some unit number of your choosing, corresponding to a
DOS name such as "SER1" or "PAR2". Unfortunately, Commodore supplied a
version of the Port-Handler and Aux-Handler with Workbench V1.3 that doesn't
permit this; rather, they're hard-coded to use either "serial.device" or
"parallel.device". The printer.device suffers from a similar limitation. At
the time of this writing, we don't have a solution, other than using IOpatch.
However, we expect to have replacement handlers ready by the time you read
this. In addition, the handlers in Workbench V2.0 have the capability to use
any device and unit, so this whole problem is non-existent if you have V2.0.
Support Programs
----------------
Several programs are available for use with the I/O Expansion Board.
SERprefs functions much the same as the serial section of Preferences, but
allows you to set and save parameters for all four units of the
newser.device. These are saved in "S:Serial-Preferences".
Many programs allow you to specify the device name and unit number, so that
using an alternate device driver is no problem. For those applications that
insist on using a particular device, we have written a nice little hack
called IOpatch. This program SetFunction()s the exec OpenDevice call. The
user puts this program in his startup-sequence, or otherwise invokes it,
before he runs his application program. This patch will make a small window
appear, whenever OpenDevice() is called, with a choice of units; 0-4. Unit 0
will select the internal serial or parallel port, and units 1-4 will select
one of the newser.device or eightbit.device units. Please note that the
names of both drivers have been selected to be the same length as the names
of the original devices. This has been done to facilitate file-zapping as a
last resort. Of course, software may be written for the newser.device or
eightbit.device initially.
A suite of simple test programs to check the I/O Expansion Board Hardware can
save you hours of hardware debugging time. Chip selects, as well as read and
write signals, are generated for all chips. One program simulates a very
simple character-oriented terminal program for checking an ACIA.
A nice little program to drive a real-time clock-calendar is also available.
The clock hardware, based on the OKI MSM5832, is capable of generating
interrupts at 1024 hz, once per second, once per minute, or hourly. Software
to take advantage of this feature is left as an exercize for the student.
Credits
=======
I would like to thank Dan Babcock for the many hours he put in writing and
debugging the serial device driver. This was surely one of the most
difficult parts of this project. Paul Coward, of DigiSoft, provided us with
the parallel device driver, no small achievement either. Jim Cooper, of The
Software Distillery, made many helpful suggestions concerning software
issues, and especially DOS compatibility, and helped us get up to speed.
Bill Seymour provided invaluable help in layout and pre-production of the
PCBs, and also provided design help. Finally, this task was made easier by
the help and encouragment of Doug Sears and Grace Lavin.
Conclusion
==========
I think this is a pretty neat little hack. I also feel that it is simple
enough that if I hadn't come up with it, someone else would have. It
provides some much-needed additional I/O for the Amiga 1000 or 2000 at a
rock-bottom price. If enough software becomes available to warrant it, I
will try to set up some sort of software clearing house for use with this
board. Keep an eye on BIX or my BBS, The Symposium, for any news.
Meanwhile, I hope you enjoy using this board. And don't let the blue smoke
out!
=============================================================================
If you need to get in touch with me, here are some possibilities:
BIX jblavin
USENET jlavin@cie.uoregon.edu
The Symposium My own BBS, (503) 935-7883, 24hrs, F8N1
The Puzzle Factory
P.O. Box 986
Veneta, OR 97487
(503) 935-3709
The Puzzle Factory, Inc. | Jeff Lavin -- jlavin@cie.uoregon.edu
Veneta, Oregon |-------------------------------------
Voice : (503) 935-3709 | Remainder of signature line
Data : (503) 935-7883 | under construction.

View File

@@ -0,0 +1,136 @@
SCSI CONTROLLER
This is a very preliminary doc. for a SCSI interface for the AMIGA.
I know that it is fragmented, but I am trying to get something together
quickly. Feel free to send me your comments.
At the present time this design does not support DMA or AUTOCONFIG'ing.
The "net-list" also includes parts for an optional 2 meg. memory add-on.
At this time the memory does not work! I have to check my equations and
analize that section of the board. The memory section does NOT upset the
AMIGA or the SCSI interface. There are no special considerations when
building the board. It runs off of the AMIGA's power supply and plugs
into the EXPANSION PORT .
The board uses 1 special part: NCR53C80 (sorry about that.)
I used it because it handles most of the SCSI interface, and eliminates
alot of "LS" chips. (The NCR53C80 is the CMOS version of the SCSI
controller used by APPLE and most other venders!)
Building the board
WARNING ! This board plugs into the expansion port! That port is directly
connected to the CPU and other chips in your AMIGA. Care must be taken so
as not to short anything to +5v or gnd as that may DESTROY your AMIGA.
The circuit and design concepts are sound, but YOU are in control of
your machines destiny. This project is NOT for the casual hacker.
REMEMBER, Don't yell at me if you break your machine!!!
On the lighter side, my board worked the first time it was turned on.
It must be easy if I didn't make any errors... Just take your time and all
will be OK !
After deciding where to locate all of the parts, use the "net-list" to
wire it. I suggest doing all of the wiring to the board before installing
the IC's. Remember that the NCR53C80 is sensitive to static, so be careful.
Also before installing IC's it is a good practice to check the power and
gruond pins on all chip sockets.
PARTS LIST
PART# LOC USE
74LS688 ....................... Z1 ......... ADDRESS DECODER
74LS139 ....................... Z2 ......... ADDRESS & R/W DECODER
NCR53C80 ...................... Z3 ......... SCSI INTERFACE
7406 .......................... Z4 ......... INTERRUPT BUFFER
74LS244 .................... Z6 Z7 Z8 ...... MEMORY ADD. MUX
PAL20RA10 ..................... Z5 ......... MEMORY CTRL PAL
AMIGA CONNECTOR ............... P1 ......... 86 PIN
SCSI CONNECTOR ................ P2 ......... 50 PIN
MEMORY CONNECTOR .............. P3 ......... 60 PIN
NOTE: DO NOT INSTALL U4,U5,U6,U7,U8 AT THIS TIME.
If you want to wire it, go ahead the DRAM will be comming soon!
CIRCUIT DESCRIPTION
The reason for the 74LS688 (8 bit comparitor) is to allow for upgrading
the board for AUTOCONFIG'ing. I don't plan to do this until I get the
important work done (DRAM & CLOCK). It is not hard to use this way,
you have to "install" the board anyway. The advantage of AUTOCONFIG
is that the AMIGA decides where in the memory the board resides.
This is not a problem since it is the only board in the system.....
The PAL (Z5) is used to control the DRAM. It is not needed at this point
so don"t worry about it.
The 'LS139 is used to decode addresses intofour 16K blocks.
1: $800000 is the NCR53C80
2: $801000 is the PSEUDO DMA
3: $802000 is for the CLOCK (not done yet)
4: $803000 is not used at this point
It may seem like alot of wasted memory but the AMIGA can only
AUTOCONFIG in 64K blocks.
The second half of the 'LS139 is used to convert the R/W signal
of the 680x0 to the read & write lines used by the NCR53C80.
Z4 -the 7406 will be used as the interrupt driver. I want to
use INT2* for the NCR's interrupts and INT6* for the DRQ*. DON'T
install the 7406 untill the real driver is available. Your AMIGA
won't like getting interrupted by the NCR53C80!
That is all there is to the SCSI interface. (Atleast for now)
It is possible to add DMA capibilities to the board but lets get the
thing up and running first!
READING THE "NET-LIST"
The schematic "AMSCSI" was made on an IBM XT using Future-Net software.
I wish that someone had a good schmatic capture pgm for the AMIGA !
Anyway to wire a board from the "net-list" ignore the "Path Ref" &
the "Symbol Ref" cols.
EXAMPLE: Part of the net-list
Signal Desc Path Ref Circuit Designator Symbol Ref Pin
--------------------------------------------------------------------------------
IGNORE PART# IGNORE PIN #
THIS THIS
COL. COL.
1,(AS) (This is the signal name)
1-1 P1 (part #) 195 74 (pin)
1-1 Z1 191 1
1-1 Z5 196 6
1,(C1)
1-1 P1 195 16
1-1 Z5 196 2
1,(C3)
1-1 P1 195 14
1-1 Z5 196 3
The signal (AS) should be wired from pin 74 of P1 to Z1 pin 1 and
Z5 pin 6
The signal (C1) should be wired from pin 16 of P1 to Z5 pin 2
Continue this for the rest of the net list. EASY ISN'T IT.
It is recommended that the SCSI bus be terminated with 220 ohm / 330 ohm
resistors. These are not included on the "net-list". Every SCSI signal
should have a 220 ohm resistor to +5v, and a 330 ohm resistor to gnd.
You might want to try it without the terminators, but leave room for them
just to be safe..........
When I get a chance I will make a schematic on Dpaint.
I have included two BASIC programs that will help you test your board.
1: SCSIMon - a small monitor that constantly reads the NCR53C80
and desplays the reg.s in HEX
2: SCSIdvr - a very crude program that "PEEKS & POKES" the
SCSI . With it you can FORMAT, READ, & WRITE
a hard disk. It takes about 10-20 sec to read,
or write 1 sector !! ( Not blazing speed is it?)
I hope to have an assembly (source) language program in the near future.
It is called------- SCSI68K.asm
If anyone can help with the DRIVER, PLEASE, let me know!
I can be reached through AMIGA/INFO BBS @ (215) 430-3969
GOOD LUCK Rich Frantz

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,247 @@
_C CUSTOMIZED MEMORY ALLOCATORS_
by Paul Anderson
[LISTING ONE]
/* sym1.c - symbol table data types */
#include <stdio.h>
#include "xalloc.h"
#include "defs.h"
main()
{
Symbol *p1, *p2;
char *ps = "test string";
int *p5;
p1 = (Symbol *) xmalloc(sizeof(struct Symbol));
p1->dtype = STRING;
p1->val.pstring = xmalloc(strlen(ps) + 1);
strcpy(p1->val.pstring, ps);
p2 = (Symbol *) xmalloc(sizeof(struct Symbol));
p2->dtype = DOUBLE;
p2->val.pdouble = (double *) xmalloc(sizeof(double));
*p2->val.pdouble = 6.7e-13;
printf("%s\n", p1->val.pstring);
printf("%g\n", *p2->val.pdouble);
p5 = (int *) xmalloc(30000 * sizeof(int));
}
$ sym1
test string
6.7e-13
file sym1.c - line 26: malloc error for 60000 bytes
[LISTING TWO]
#include <stdio.h>
#include <malloc.h>
#define MAXBUF 256 /* size of debug buffer */
static char *dbuf[MAXBUF]; /* debug buffer */
/* ymalloc2.c - front end for malloc()
Version 2
*/
char *ymalloc(file, lineno, nbytes)
char *file;
int lineno;
unsigned int nbytes;
{
char *pheap;
void install();
pheap = malloc(nbytes);
if (pheap == (char *) NULL) {
fprintf(stderr,"file %s - line %d: malloc error for %u bytes\n",
file, lineno, nbytes);
exit(1);
}
install(pheap); /* place in debug buffer */
return pheap;
}
void install(pheap) /* store heap pointer in debug buffer */
char *pheap;
{
register char **pbuf;
for (pbuf = dbuf; pbuf < dbuf + MAXBUF; pbuf++)
if (*pbuf == (char *) NULL) {
*pbuf = pheap;
return;
}
fprintf(stderr, "No room left in debug buffer\n");
exit(1);
}
char *yrealloc(file, lineno, oldp, nbytes)
char *file, *oldp;
int lineno;
unsigned int nbytes;
{
char *newp;
register char **pbuf;
short found = 0;
if (oldp != (char *) NULL)
for (pbuf = dbuf; pbuf < dbuf + MAXBUF; pbuf++)
if (*pbuf == oldp) { /* find oldp's slot */
found = 1;
break;
}
if (!found) {
fprintf(stderr,"file %s - line %d: realloc error for address %x\n",
file, lineno, oldp);
exit(1);
}
newp = realloc(oldp, nbytes);
if (newp == (char *) NULL) {
fprintf(stderr,"file %s - line %d: realloc error for %u bytes\n",
file, lineno, nbytes);
exit(1);
}
*pbuf = newp; /* replace in debug buffer's old slot */
return newp;
}
void yfree(file, lineno, pheap)
char *file, *pheap;
int lineno;
{
register char **pbuf;
if (pheap != (char *) NULL)
for (pbuf = dbuf; pbuf < dbuf + MAXBUF; pbuf++)
if (*pbuf == pheap) {
*pbuf = NULL;
free(pheap);
return;
}
fprintf(stderr,"file %s - line %d: free error for address %x\n",
file, lineno, pheap);
exit(1);
}
[LISTING THREE]
/* sym2.c - more symbol table data types */
#include <stdio.h>
#include "xalloc.h"
#include "defs.h"
main()
{
Symbol *p1, *p2;
char *ps = "test string";
char *ps2 = "much longer test string";
p1 = (Symbol *) xmalloc(sizeof(struct Symbol));
p1->dtype = STRING;
p1->val.pstring = xmalloc(strlen(ps) + 1);
strcpy(p1->val.pstring, ps);
p2 = (Symbol *) xmalloc(sizeof(struct Symbol));
p2->dtype = DOUBLE;
p2->val.pdouble = (double *) xmalloc(sizeof(double));
*p2->val.pdouble = 6.7e-13;
printf("%s\n", p1->val.pstring);
printf("%g\n", *p2->val.pdouble);
p1->val.pstring = xrealloc(p1->val.pstring, strlen(ps2) + 1);
strcpy(p1->val.pstring, ps2);
printf("%s\n", p1->val.pstring);
xfree((char *) p2->val.pdouble);
xfree(ps2); /* free a bad pointer */
}
$ sym2
test string
6.7e-13
much longer test string
file sym2.c - line 31: free error for address 2634
Example 1: Out of bounds references
/* twzone.c - array out of bounds */
main()
{
int buf[10];
buf[-4] = 1; /* negative subscript */
buf[10] = 2; /* one step beyond */
printf("%d %d\n", *(buf - 4), *(buf + 10));
}
Example 2: Program that demonstartes xcalloc()
/* neg.c - negative subscripts with xcalloc */
#include <stdio.h>
main()
{
char *xcalloc();
int *p, *q;
p = (int *) xcalloc(10, sizeof(int));
q = (int *) xcalloc(15, sizeof(int));
fill(p); /* fill with 10 numbers */
display(p); /* print 10 numbers */
fill(q); /* fill with 15 numbers */
display(q); /* print 15 numbers */
}
$ neg
1 2 3 4 5 6 7 8 9 10
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Example 3: xcalloc() routine
#include <stdio.h>
#include <malloc.h>
#include <memory.h>
char *xcalloc(nitems, size) /* custom calloc() */
unsigned nitems, size;
{
char *pheap;
unsigned blksize;
blksize = nitems * size; /* size of chunk */
if ((pheap = malloc(blksize + sizeof(int))) == NULL) {
fprintf(stderr, "Can't malloc on heap\n");
exit(1);
}
*(int *)pheap = nitems; /* store no. of items in heap */
memset(pheap + sizeof(int), 0, blksize); /* zero the area */
return pheap + sizeof(int); /* pointer to data */
}


File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,77 @@
This program is an attempt to try to make a very simple
ST to ST link. The main objective was to make it as transparent as
possible to the user and to other programs.
LOADING AND SETUP
ANET uses three user vectors starting at $200 and the drivemap
located at $4C2. A reset using the reset buttom sometimes does not
clear the lower system memory so if this program is resident you must
use a cold start "power off and power on" or a reboot program for it to
be reloaded correctly when you run the ANETWORK.PRG or ANETCTRL.PRG after
the reboot. The ANETCTRL.PRG has a reboot selection on the MENU.
Double-click on the ANETWORK.PRG to load the resident program then
double-click on the ANETCTRL.PRG to load the control program. After the
first load you can usually load both the resident and control programs by
running ANETCTRL.PRG after a reboot.
ONLY LOAD THE ANETWORK.PRG IF YOU GET A MODULA-2 ERROR
TRYING TO RUN ANETCTRL.PRG FIRST. AS IT WILL LOAD THE ANETWORK.PRG FOR YOU.
The control program lets you set the baud rate, reboot the ST,
reset the network message sequence count, turn the network on and off,
see which ICONS to install to use the remote disks and of course to quit
the control program. The NEW command on the sequence MENU is to resync
the remote program if it gets out of sync due to a reboot, hang or and
error condition. Click the mouse on NEW to send a resync command to the
remote and try to access the ICON again.
MAKE INT on the mode MENU will make a network setup file called
ANETWORK.INT that ANETWORK.PRG reads to set the baud rate and to turn
the netork on or off. ANETCTRL.PRG also reads the INT file when it is
loaded and uses the parameters to set up the menu values. Clicking the
pointer on MAKE INT will save the current menu values on the ANETCTRL.PRG
menu to a new ANETWORK.INT file.
To load the dial menu make a file called ANETWORK.DIL. It can
have up to 16 entrys for phone numbers. Each entry must be terminated with
a RETURN. If you have a HAYES modem enter the dial code, the number, a
space, then the name of the service or person.
Example:
ATDT696-0060 genie
ATDT691-7862 CIS
USE
Install the ICONS on the GEM DESKTOP for the remote system drive(s)
you wish to access, then just use them just like any other disk drive. Due
to the slower serial access it is usally better to copy the file a local
disk if you wish to edit or run the file. Every effort has been made to
make sure it is error free but I would only use it to read from the remote
rather that sending files due to a crash may cause disk file links to be
lost while creating new files on the remote system.
You need a crossover cable for the ST to ST connection.
like this.
local remote
2------------\ /-------------3
\/
/\
3------------/ \-------------2
7-----------------------------7
<-------- any length --------->
It is possible to use a modem using a std cable from the ST to modem.
FRED BROOKS
PS Please let me know of any bugs ASAP.

View File

@@ -0,0 +1,778 @@
From caf-talk Caf Jun 8 19:52:43 1992
Newsgroups: comp.society
Subject: Anonymity and privacy on the network
Message-ID: <92083.072152SOCICOM@auvm.american.edu>
Date: 23 Mar 92 12:21:52 GMT
Organization: The American University - University Computing Center
Lines: 759
Approved: SOCICOM@AUVM
Moderator's note: The following article is a lengthy excerpt from a
recent issue of FIDONEWS concerning individual privacy and the use of
aliases or handles in computer-based communications. It was submitted by
a comp.society reader who used a handle; because the excerpt is a cross-
post from another electronic publication, I have taken the liberty of
viewing the use of a handle by sender as a request for privacy and
anonymity similar to the request a newspaper editor might receive in a
letter to the editor. Thus, while reprinting the submission, the name
and address of the sender are "withheld upon request." The article
raises a number of good points; the submission by a reader using a handle
to preserve anonymity makes a point; and the editorial action of
submitting the reader's posting anonymously makes the question current.
What are the implications of using aliases on the net?
Greg Welsh, moderator, comp.society
Internet: Socicom@american.edu
Bitnet: Socicom@auvm.bitnet
[begin excerpt]
F I D O N E W S -- | Vol. 9 No. 9 (2 March 1992)
The newsletter of the |
FidoNet BBS community | Published by:
_ |
/ \ | "FidoNews" BBS
/|oo \ | (415)-863-2739
(_| /_) | FidoNet 1:1/1
_`@/_ \ _ | Internet:
| | \ \\ | fidonews@fidonews.fidonet.org
| (*) | \ )) |
|__U__| / \// | Editors:
_//|| _\ / | Tom Jennings
(_/(_|(____/ | Tim Pozar
(jm) |
----------------------------+---------------------------------------
Published weekly by and for the Members of the FidoNet international
amateur network. Copyright 1992, Fido Software. All rights reserved.
Duplication and/or distribution permitted for noncommercial purposes
only. For use in other circumstances, please contact FidoNews.
Paper price: . . . . . . . . . . . . . . . . . . . . . . . $5.00US
Electronic Price: . . . . . . . . . . . . . . . . . . . . . free!
For more information about FidoNews refer to the end of this file.
--------------------------------------------------------------------
[...some editing...]
======================================================================
ARTICLES
======================================================================
The Joy of Handles
Mahatma Kane Jeeves
101/138.8
David Lescohier
101/138.0
THE JOY OF HANDLES
------------------
or:
EVERYTHING YOU ALWAYS WANTED TO KNOW ABOUT ME
(but have no right to ask)
--------------------------
* * * * *
We should never so entirely avoid danger as to appear
irresolute and cowardly. But, at the same time, we should
avoid unnecessarily exposing ourselves to danger, than
which nothing can be more foolish. [Cicero]
* * * * *
Do you trust me?
If you participate in computer conferencing, and you use
your real name, then you'd better.
"Why?", you ask. "What can you do with my name?" To start
with, given that and your origin line, I can probably look
you up in your local phone book, and find out where you
live. Even if you are unlisted, there are ways to locate
you based on your name. If you own any property, or pay any
utility bills, your address is a matter of public record.
Do you have children in the public schools? It would be
easy to find out. But that's just the beginning.
Former Chairman of the U.S. Privacy Protection Commission
David F. Linowes, in his book "Privacy in America" (1989),
writes of New York private investigator Irwin Blye:
"Challenged to prove his contention that, given a little
time and his usual fee, he could learn all about an
individual without even speaking with him, Blye was
presented with a subject -- a New Jersey
newspaperman.... The result was a five-page, single-
spaced, typed report which documented, though not always
accurately, a wide sweep of the journalist's past, and
was detailed to the point of disclosing his father's
income before his retirement."
Who am I? If I don't post, you might not even know I exist.
I could be on your local Police Department, or an agent
working with the IRS, or some federal law-enforcement
agency. I could be a member of some fanatical hate group,
or criminal organization. I might even be a former Nixon
White-House staffer!
I could be that pyromaniacal teenager you flamed last
weekend, for posting a step-by-step description of how he
made plastic explosive in his high-school chem lab. He
seemed kind of mad.
But you're an upstanding citizen; you have nothing to hide.
So why not use your name on the nets? Trust me. There's
nothing to worry about.
Is there?
* * * * *
WHAT'S ALL THIS BROUHAHA?
-------------------------
Stupidity is evil waiting to happen. [Clay Bond]
Not long ago in Fidonet's BCSNET echo (the Boston Computer
Society's national conference), the following was posted by
the conference moderator to a user calling himself "Captain
Kirk":
"May we ask dear Captain Kirk that it would be very
polite if you could use your real name in an echomail
conference? This particular message area is shared
with BBS's all across the country and everyone else is
using their real name. It is only common courtesy to
do so in an echomail conference."
One of us (mkj) responded with a post questioning that
policy. Soon the conference had erupted into a heated
debate! Although mkj had worried that the subject might be
dismissed as trivial, it apparently touched a nerve. It
brought forth debate over issues and perceptions central to
computer communications in general, and it revealed profound
disparities in fundamental values and assumptions among
participants.
This article is a response to that debate, and to the
prevailing negative attitudes regarding the use of handles.
Handles seem to have a bad reputation. Their use is
strangely unpopular, and frequently forbidden by network
authorities. Many people seem to feel that handles are rude
or dishonest, or that anyone wishing to conceal his or her
identity must be up to no good. It is the primary purpose
of this article to dispel such prejudices.
Let us make one thing perfectly clear here at the outset: We
do NOT challenge the need or the right of sysops to know the
identities of their users! But we do believe that a sysop
who collects user names has a serious responsibility to
protect that information. This means making sure that no
one has access to the data without a legal warrant, and it
certainly means not pressuring users to broadcast their real
names in widespread public forums such as conferences.
* * * * *
SO YOU WANT TO BE A STAR?
-------------------------
John Lennon died for our sins. [anonymous]
Andy Warhol said that "In the future, everyone will be
famous for fifteen minutes". The computer nets, more than
any other medium, lend credibility to this prediction. A
network conference may span the globe more completely than
even satellite TV, yet be open to anyone who can afford the
simplest computer and modem. Through our participation in
conferencing, each of us becomes, if only briefly, a public
figure of sorts -- often without realizing it, and without
any contemplation of the implications and possible
consequences.
Brian Reid (reid@decwrl.DEC.COM) conducts and distributes
periodic surveys of Usenet conference readership. His
statistical results for the end of 1991 show that of the
1,459 conferences which currently make up Usenet, more than
fifty percent have over 20,000 readers apiece; the most
popular conferences are each seen by about 200,000 readers!
Mr. Reid's estimate of total Usenet readership is nearly TWO
MILLION people.
Note that Mr. Reid's numbers are for Usenet only; they do
not include any information on other large public nets such
as RIME (PC-Relaynet), Fido, or dozens of others, nor do
they take into account thousands of private networks which
may have indirect public network connections. The total
number of users with access to public networks is unknown,
but informed estimates range to the tens of millions, and
the number keeps growing at an amazing pace -- in fact, the
rate of growth of this medium may be greater than any other
communications medium in history.
The special problems and risks which arise when one deals
with a large public audience are something about which most
computer users have little or no experience or
understanding. Until recently, those of us involved in
computer conferencing have comprised a small and rather
elite community. The explosion in network participation is
catching us all a little unprepared.
Among media professionals and celebrities, on the other
hand, the risks of conducting one's business in front of a
public audience are all too familiar. If the size of one's
audience becomes sufficiently large, one must assume that
examples of virtually every personality type will be
included: police and other agents of various governments,
terrorists, murderers, rapists, religious fanatics, the
mentally ill, robbers and con artists, et al ad infinitum.
It must also be assumed that almost anything you do, no
matter how innocuous, could inspire at least one person,
somewhere, to harbor ill will toward you.
The near-fatal stabbing of actress Theresa Saldana is a case
in point. As she was walking to her car one morning near her
West Hollywood apartment, a voice behind her asked, "Are you
Theresa Saldana?"; when she turned to answer, a man she had
never seen before pulled out a kitchen knife and stabbed her
repeatedly.
After her lengthy and painful recovery, she wrote a book on
the experience ("Beyond Survival", 1986). In that book she
wrote:
[pg 12] "... Detective Kalas informed me that the
assailant, whom he described as a Scottish drifter, had
fixated upon me after seeing me in films."
[pg 28] "... it was through my work as an actress that
the attacker had fixated on me. Naturally, this made
me consider getting out of show business ..."
[pg 34] "For security, I adopted an alias and became
'Alicia Michaels.' ... during the months that followed
I grew so accustomed to it that, to this day, I still
answer reflexively when someone calls the name Alicia!"
Or consider the fate of Denver radio talk show host Alan
Berg, who in 1984 died outside his home in a hail of
gunfire. Police believe he was the victim of a local neo-
nazi group who didn't like his politics.
We are reminded of the murders of John Lennon and Rebecca
Shaffer; the Reagan/Hinckley/Foster incident; and a long
string of other "celebrity attacks" of all sorts, including
such bizarre events as the occupation of David Letterman's
home by a strange woman who claimed to be his wife! There is
probably no one in public life who doesn't receive at least
the occassional threatening letter.
Of course, ordinary participants in network conferencing may
never attract quite the attention that other types of
celebrities attract. But consider the following, rather less
apocalyptic scenarios:
-- On Friday night you post a message to a public
conference defending an unpopular or controversial
viewpoint. On Monday morning your biggest client
cancels a major contract. Or you are kept up all
night by repeated telephone calls from someone
demanding that you "stop killing babies"!
-- You buy your teenage son or daughter a computer and
modem. Sometime later you find your lawn littered
with beer bottles and dug up with tire marks, or
your home vandalized or burglarized.
-- One day you are nominated to the Supreme Court. Who
are all these strange people on TV claiming to be
your friends? How did that fellow know your position
on abortion? Your taste in GIFs?
Celebrities and other professional media personalities
accept the risks and sacrifices of notoriety, along with the
benefits, as part of their chosen careers. Should computer
conference participants be expected to do the same? And who
should be making these decisions?
* * * * *
OTHER MEDIA
-----------
When thou art at Rome, do as they do at Rome [Cervantes]
Older media seem to address the problems of privacy very
differently than computer media, at least so far. We are
not aware of ANY medium or publication, apart from computer
conferencing, where amateur or even most professional
participants are required to expose their true names against
their will. Even celebrities frequently use "stage names",
and protect their addresses and phone numbers as best they
can.
When a medium caters specifically to the general public,
participants are typically given even greater opportunities
to protect their privacy. Television talk shows have been
known to go so far as to employ silhouetting and electronic
alteration of voices to protect the identities of guests,
and audience members who participate are certainly not
required to state their full names before speaking.
The traditional medium most analogous to computer
conferencing may be talk radio. Like conferencing, talk
radio is a group discussion and debate medium oriented
toward controversy, where emotions can run high. Programs
often center around a specific topic, and are always run by
a "host" whose role seems analogous in many respects to that
of a conference moderator. It is therefore worth noting
that in talk radio generally, policy seems to be that
callers are identified on the air only by their first names
(unless of course they volunteer more).
Finally, of course, authors have published under "pen names"
since the dawn of publishing, and newspapers and magazines
frequently publish letters to the editor with "name and
address withheld by request" as the signature line. Even
founding fathers Alexander Hamilton, James Madison and John
Jay, in authoring the seminal Federalist Papers in 1787 for
publication in the Letters columns of various New York City
newspapers, concealed their identities behind the now-famous
psuedonym "Publius".
What would you think if someone called a radio talk show
demanding to know the identity of a previous caller? Such a
demand would undoubtedly be seen as menacing and
inappropriate in that context. Yet that same demand seems
to arise without much challenge each time a handle shows up
in a computer conference. The authors of this article feel
that such demands should always be looked upon as
suspicious, and that it would be beneficial for moderators
to take upon themselves the responsibility of making sure
that besieged handle-users are aware of their right to
refuse such inappropriate demands.
It is reasonable to assume that privacy policies in
traditional media are the result of hard-won wisdom gained
from long experience. Are we so arrogant that we cannot
learn from others? It is not hard to imagine the sorts of
problems and experiences which shaped these policies in the
old media. Will we have to wait for similar problems to
occur on the computer networks before we learn?
* * * * *
PRIVACY AND SURVEILLANCE
------------------------
In an effort to identify people who fail to file tax
returns, the Internal Revenue Service is matching
its files against available lists of names and
addresses of U.S. citizens who have purchased
computers for home use. The IRS continues to seek
out sources for such information. This information
is matched against the IRS master file of taxpayers
to see if those who have not filed can be
identified.
[COMPUTERWORLD, Sept. 1985]
Date: Thu, 23 May 91 11:58:07 PDT
From: mmm@cup.portal.com
Subject: The RISKS of Posting to the Net
-
I just had an interesting visit from the FBI. It
seems that a posting I made to sci.space several
months ago had filtered through channels, caused the
FBI to open (or re-open) a file on me, and an agent
wanted to interview me, which I did voluntarily...
I then went on to tell him about the controversy
over Uunet, and their role in supplying archives of
Usenet traffic on tape to the FBI...
[RISKS Digest]
Also frequent are instances where computers are
seized incident to an unrelated arrest. For
example, on February 28, 1991, following an arrest
on charges of rape and battery, the Massachusetts
state and local police seized the suspect's computer
equipment. The suspect reportedly operated a 650-
subscriber bulletin board called "BEN," which is
described as "geared largely to a gay/leather/S&M
crowd." It is not clear what the board's seizure is
supposed to have accomplished, but the board is now
shut down, and the identities and messages of its
users are in the hands of the police.
[CONSTITUTIONAL, LEGAL, AND ETHICAL
CONSIDERATIONS FOR DEALING WITH ELECTRONIC
FILES IN THE AGE OF CYBERSPACE, Harvey A.
Silverglate and Thomas C. Viles]
Most of us have been brought up to be grateful for the fact
that we live in a nation where freedom is sacred. In other
countries, we are told as children, people are afraid to
speak their minds for fear they are being watched. Thank
God we live in America!
It would surprise most of us to learn that America is
currently among the premiere surveillance nations in the
world, but such, sadly, is indeed the case. Our leadership
in technology has helped the U.S. government to amass as
much information on its citizens as almost any other nation
in history, totalitarian or otherwise. And to make matters
worse, a consumer surveillance behemoth has sprung up
consisting of huge private data-collection agencies which
cater to business.
As Evan Hendricks, editor of "Privacy Times" (a Washington
D.C.-based newsletter) has put it: "You go through life
dropping bits and pieces of information about yourself
everywhere. Most people don't realize there are big vacuum
cleaners out there sucking it all up." [Wall Street
Journal, March 14, 1991].
To get an idea of how much of your privacy has already been
lost, consider the bits and pieces of information about
yourself which are already available to investigators, and
how thoroughly someone might come to know you by these clues
alone.
A person's lifestyle and personality are largely described,
for example, by his or her purchases and expenses; from your
checking account records -- which banks are required by law
to keep and make available to government investigators -- a
substantial portrait of your life will emerge. Credit card
records may reveal much of the same information, and can
also be used to track your movements. (In a recent case,
"missing" Massachusetts State Representative Timothy O'Leary
was tracked by credit-card transactions as he fled across
the country, and his movements were reported on the nightly
news!)
Then there are your school records, which include IQ and
other test results, comments on your "socialization" by
teachers and others, and may reveal family finances in great
detail. Employment and tax records reveal your present
income, as well as personal comments by employers and co-
workers. Your properties are another public record of your
income and lifestyle, and possibly your social status as
well. Telephone billing records reveal your personal and
business associations in more detail. Insurance records
reveal personal and family health histories and treatments.
All of this information is commonly accessed by government
and private or corporate investigators. And this list is
far from exhaustive!
Now consider how easily the computer networks lend
themselves to even further erosions of personal privacy. The
actual contents of our mail and telephone traffic have up to
now been subjected to deliberate scrutiny only under
extraordinary conditions. This built-in safety is due
primarily to the difficulty and expense of conducting
surveillance in these media, which usually requires extended
human intervention. But in the medium of computer
communications, most surveillance can be conducted using
automated monitoring techniques. Tools currently available
make it possible and even cost-effective for government and
other interests to monitor virtually everything which
happens here.
Why would anyone want to monitor network users? It is well
documented that, throughout the 1960s and 1970s, the FBI and
other agencies of government, in operations such as the
infamous COINTELPRO among others, spent a great deal of time
and effort collecting vast lists of names. As Computer
Underground Digest moderators Jim Thomas and Gordon Meyer
recalled in a recent commentary (CuD #3.42):
"A 1977 class action suit against the Michigan State
Police learned, through FOIA requests, that state and
federal agents would peruse letters to the editor of
newspapers and collect clippings of those whose politics
they did not like. These news clippings became the basis
of files on those persons that found there way into the
hands of other agencies and employers."
To get onto one of these government "enemies" lists, you
often needed to do nothing more than telephone an
organization under surveillance, or subscribe to the "wrong"
types of magazines and newspapers. Groups engaged in
political activism, including environmental and women's
rights organizations, were commonly infiltrated. The sort
of investigative reporting which uncovered these lists and
surveillances back in the '60s and '70s is now rare, but
there is little reason to assume that such activities have
ceased or even slowed. In fact, progressive computerization
of local police LEIU activities (Law Enforcement
Intelligence Units, commonly known as "red squads") suggests
that such activities may have greatly increased.
Within the realm of computer conferencing especially, there
is ample reason to believe that systematic monitoring is
being conducted by government and law-enforcement
organizations, and perhaps by other hostile interests as
well. In a recent issue of Telecom Digest
(comp.dcom.telecom), Craig Neidorf (knight@EFF.ORG) reported
on the results of a recent Freedom of Information Act
request for documents from the Secret Service:
" ... The documents also show that the Secret Service
established a computer database to keep track of
suspected computer hackers. This database contains
records of names, aliases, addresses, phone numbers,
known associates, a list of activities, and various
[conference postings] associated with each individual."
But the privacy issues which surround computer
communications go far beyond the collection of user lists.
Both government and industry have long pursued the elusive
grail of personality profiling on citizens and consumers. Up
to now, such ambitions have been restrained by the practical
difficulty and expense of collecting and analyzing large
amounts of information on large numbers of citizens. But
computer communications, more than any other technology,
seems to hold out the promise that this unholy grail may
finally be in sight.
To coin a phrase, never has so much been known by so few
about so many. The information commonly available to
government and industry investi-gators today is sufficient
to make reliable predictions about our personalities,
health, politics, future behavior, our vulnerabilities,
perhaps even about our innermost thoughts and feelings. The
privacy we all take for granted is, in fact, largely an
illusion; it no longer exists in most walks of life. If we
wish to preserve even the most basic minimum of personal
privacy, it seems clear that we need to take far better care
on the networks than we have taken elsewhere.
* * * * *
FREEDOM
-------
Human beings are the only species with a history.
Whether they also have a future is not so obvious.
The answer will lie in the prospects for popular
movements, with firm roots among all sectors of the
population, dedicated to values that are suppressed
or driven to the margins within the existing social
and political order...
[Noam Chomsky]
In your day-to-day social interactions, as you deal with
employers, clients, public officials, friends, acquaintances
and total strangers, how often do you feel you can really
speak freely? How comfortable are you discussing
controversial issues such as religion, taxes, politics,
racism, sexuality, abortion or AIDS, for example? Would you
consider it appropriate or wise to express an honest opinion
on such an issue to your boss, or a client? To your
neighbors?
Most of us confine such candid discussions to certain
"trusted" social contexts, such as when we are among our
closest friends. But when you post to a network conference,
your boss, your clients, and your neighbors may very well
read what you post -- if they are not on the nets today,
they probably will be soon, as will nearly everyone.
If we have to consider each post's possible impact on our
social and professional reputations, on our job security and
income, on our family's acceptance and safety in the
community, it could be reckless indeed to express ourselves
freely on the nets. Yet conferences are often geared to
controversy, and inhibitions on the free expression of
opinions can reduce traffic to a trickle, killing off an
important conference topic or distorting a valuable sampling
of public opinion.
More important still is the role computer networks are
beginning to play in the free and open dissemination of news
and information. Democracy is crippled if dissent and
diversity in the media are compromised; yet even here in the
U.S., where a "free press" is a cherished tradition, the
bulk of all the media is owned by a small (and ever-
shrinking) number of corporations, whose relatively narrow
culture, interests and perspec-tives largely shape the
public perception.
Computer communication, on the other hand, is by its nature
very difficult to control or shape. Its resources are
scattered; when one BBS goes bust (or is busted!), three
others spring up in its place. The natural resiliency of
computer communications (and other new, decentral-ized
information technologies such as fax, consumer camcorders
and cheap satellite links) is giving rise to a new brand of
global "guerrilla journalism" which includes everyone, and
defies efforts at suppression.
The power and value of this new journalistic freedom has
recently shown itself during the Gulf War, and throughout
Eastern Europe and the Soviet Union, as well as within the
U.S. Just think of the depth and detail of information
available on the nets regarding the Secret Service's recent
"Operation Sundevil" and associated activities, compared to
the grossly distorted, blatantly propagandistic coverage of
those same activities given to the general public through
the traditional media.
Historically, established power and wealth have seldom been
disposed to tolerate uncontrolled media, and recent events
in this country and elsewhere show that computer media are
sometimes seen as threats to established interests as well.
To understand the role of handles in this context, it is
useful to note the flurries of anti-handle sentiment which
have arisen in the wake of crackdowns such as Sundevil, or
the Tom Tcimpidis raid in the early 1980s. Although few
charges and fewer convictions have typically resulted from
such operations, one might be tempted to speculate that the
real purposes -- to terrorize the nets and chill freedoms of
speech and assembly thereon -- have been achieved.
In this way, sysops and moderators become unwitting
accomplices in the supression of freedom on the networks.
When real name requirements are instituted, anyone who fears
retaliation of any sort, by any group, will have to fear
participation in the nets; hence content is effectively
controlled. This consideration becomes especially important
as the nets expand into even more violent and repressive
countries outside the U.S.
We must decide whether freedom of information and open
public discussion are in fact among the goals of network
conferencing, and if so, whether handles have a role in
achieving these goals. As access to the networks grows, we
have a rare opportunity to frustrate the efforts of
governments and corporations to control the public mind! In
this way above all others, computers may have the potential
to shape the future of all mankind for the better.
* * * * *
A CALL TO ACTION
----------------
The move to electronic communication may be a turning
point that history will remember. Just as in
seventeenth and eighteenth century Great Britain and
America a few tracts and acts set precedents for
print by which we live today, so what we think and do
today may frame the information system for a
substantial period in the future.
[Ithiel de Sola Pool, "Technologies of Freedom", 1983]
There was a time when anybody with some gear and a few
batteries could become a radio broadcaster -- no license
required. There was a time when anyone with a sense of
adventure could buy a plane, and maybe get a contract to
carry mail. Those early technological pioneers were
probably unable to imagine the world as it is today, but
their influence is strongly felt in current laws,
regulations and policies with roots in the traditions and
philosophies they founded and shaped.
Today the new pioneers are knitting the world together with
computers, and the world is changing faster than ever. Law
and ethics are scrambling to keep up. How far will this
growth take us? No one can say for sure. But you don't
need a crystal ball to see that computer communications has
the potential to encompass and surpass all the functionality
of prior media -- print, post, telegraph, telephone, radio
and television -- and more. It seems reasonable to assume
that computer communications will be at least as ubiquitous
and important in the lives of our grandchildren as all the
older media have been in ours.
It will be a world whose outlines we can now make out only
dimly. But the foundations of that world are being built
today by those of us exploring and homesteading on the
electronic frontier. We need to look hard at what it will
take to survive in the information age.
In this article we have attempted to show, for one very
narrow issue, what some of the stakes may be in this future-
building game. But the risks associated with exposing your
name in a computer conference are not well defined, and
various people will no doubt assess the importance of these
risks differently. After all, most of us take risks every
day which are probably greater than the risks associated
with conferencing. We drive on the expressway. We eat
sushi. To some people, the risks of conferencing may seem
terrifying; to others, insignificant.
But let us not get side-tracked into unresolvable arguments
on the matter. The real issue here is not how dangerous
conferencing may or may not be; it is whether you and I will
be able to make our own decisions, and protect ourselves (or
not) as we see fit. The obvious answer is that users must
exercise their collective power to advance their own
interests, and to pressure sysops and moderators to become
more sensitive to user concerns.
To help in that effort, we would like to recommend the
following guidelines for user action:
-- Bear in mind John Perry Barlow's observation that
"Liberties are preserved by using them". Let your
sysop know that you would prefer to be using a
handle, and use one wherever you can.
-- Try to support boards and conferences which allow
handles, and avoid those which don't.
-- When using a handle, BEHAVE RESPONSIBLY! There will
always be irresponsible users on the nets, and they
will always use handles. It is important for the
rest of us to fight common anti-handle prejudices by
showing that handles are NOT always the mark of an
irresponsible user!
-- Educate others about the importance of handles (but
NEVER argue or flame anyone about it).
To sysops and moderators: We ask you to bear in mind that
authority is often used best where it is used least. Grant
users the right to engage in any harmless and responsible
behaviors they choose. Protect your interests in ways which
tread as lightly as possible upon the interests of others.
The liberties you preserve may be your own!
In building the computer forums of today, we are building
the social fabric of tomorrow. If we wish to preserve the
free and open atmosphere which has made computer networking
a powerful force, while at the same time taking care against
the risks inherent in such a force, handles seem to be a
remarkably harmless, entertaining and effective tool to help
us. Let's not throw that tool away.
----------------------------------------------------------------------
[end of excerpt]
--
David Collier-Brown, | davecb@Nexus.YorkU.CA | lethe!dave
72 Abitibi Ave., |
Willowdale, Ontario, | He's so smart he's dumb.
CANADA. 416-223-8968 | -- Joyce Collier-Brown
From caf-talk Caf Jun 10 00:17:10 1992

View File

@@ -0,0 +1,31 @@
Do you know the terror of
ARQ-FLASHING ?
I am sure you know....
I have to admit that my method cant remove line-noise but the most
ARQ-Discos are not caused by a bad line but by a slow retrain of the HST.
You start the upload and the first thing happening is: CS-led off and the
ARQ-led is flashing. (I know you cry "Yes, yes") Ok normaly it will take
a long time to finish flashing or it will never finish. What can I do
against this? Its pretty simple: Try to keep your computer away from
sending (just as long as the ARQ is flashing).
How can you do this? If you use NCOMM, you have just to click the Transmit-
Window (just as you want to move it). The border of the window will be
inverted. Hold this position until the disco is over. Repeat this if
the disco starts again.
I know this is a very ify-english:-)
Bye,
____ ____ ______
/_ __\ / __/ / ____/
/\ /\//_// / / ___ / __/
/ \/ \ / / _// \//\/\/ /___
/_/\__/\_\_\/_/ /__//_/\_\____/
PS: If you use another Term and you cant find a way to stop the computer
from sending, leave me a msg (or an OLM:-) and I will code a short tool.

View File

@@ -0,0 +1,71 @@
Anywhere Scroller
v1.00
OverView:
Anywhere scroller is a program that is another part to the
Intro Maker v3.0. This handy little utility, requires a .CRD coordinate
file for an external 256 color FONT picture. By using this program, you will
be allowed to draw with your keyboard or mouse, on the background picture
where and how you want the Scrolling text to appear. There are four parts
to this program.
The First part to this program, is the request for the .CRD file
which you have created, or one that has been provided with THG Intro Maker.
This will tell the program how big your font that you wish to scroll
actually is. The .CRD files can be created with the MEGAFONT.EXE program.
The Second part to the Anywhere Scroller is a feature that comes in
quite handy for tricky scrolling effects. After figuring how out big your
external font will be, the ANYWhere scroller will switch to 80x50 mode, and
display the number of pixels vertically. Here, the first pixel will be
a fixed point or reference point for the scroller. The next course of
action should be you using the keypad, or arrow keys to place each pixel
how you want it to scroll repectively to the first pixel. To switch
pixels, use the +/- keys. You can save these patterns in BWF files which
mean Brush Warping File. Use L and S to Load the Brush Warp File or Save
the Brush Warp File respectively. If you wish to move the 1st pixel so
you can move the pixels above or along side the first pixel, use the
I-J-K-M buttons to move the screen accordingly so you can have enough
room to move each pixel. Don't forget to save the BWF file if you wish
to re-use this pattern for another scroll. Press Q or ESC to exit
this part. It does not save this automatically, you must use the
Save command.
The Third part of the program, is a request for the background
picture support. Give the extension of your background picture according
to which graphics compression is used. It will decompact the picture and
display it throwing you into the next part of the program.
The heart of the Anywhere scroller is the next part. This will
show you a cursor that looks like you have entered according to the offsets
you have entered in the last second part of the program. Here, you may
either hit the Space Bar for PenUP/ PenDOWN toggle and the keypad for
moving the cursor around. Remember, when the Pen is DOWN, it is recording
where you are putting the pixels. That is the order they will show up in
when it goes to scroll it. You can also use the Mouse and Mouse buttons to
draw on the screen. Although, there is no mouse support when the keyboard
PenUP/PenDOWN key has been toggled, all you have to do is to place the
cursor where you want a slice of your scroll to go. Press the left mouse
button. The Right mouse button exits to the next part of the program, as
well does ESC, and Q. If you hold down the Left mouse button and move the
cursor, it will skip pixels. So go SLOWLY. THis is because the Mouse button
routine that was written is too fast for it. It would record several pixels
by just a quick press of the button. Also, the + and - keys change the
color of the cursor, and the backspace key undoes the previous slice.
The Final part to the program, is entering the Name of the .PTH
path file you wish to call it. This screen also tells you how many slices
of a scroller you have entered.
Keys:
+/- : Change Color
Q,ESC : Exit
Keypad : Move cursor
SpaceBar : PenUP/PenDOWN toggle
Back Space : Undo last Slice
Left Mouse Button : Place a slice at x,y
Right Mouse Button : Exit
Note:
I am not one for documentation. I don't think any of us are, but
this program is pretty easy to use.


View File

@@ -0,0 +1,63 @@
APPENDIX A : Standards
V.21 Standard for modem communications at 300 bps. Modems made in
the US or Canada follow the Bell 103 standard. However, the
modem can be set to answer V.21 calls from overseas.
V.22 Standard for modem communications at 1200 bps, compatible
with the Bell 212A standard observed in the US and Canada.
V.22 bis Standard for modem communications at 2400 bps. The standard
includes an automatic link negotiation fallback to 1200 bps
and compatibility with Bell 212A/V.22 modems.
V.23 Standard for modem communications at 1200 bps with a 75 bps
back channel.
V.24 Standards layed down by the CCITT for interfacing a digital
device to a PTT-supplied modem. V.24 is also used as an
interface standard for connecting a peripheral device, such
as a visual display unit or a printer, to a computer.
V.25 Standard for modem communications that specifies an answer
tone different from the Bell answer tone used in the US and
Cananda.
V.32 Standard for modem communications at 9600 bps and 4800 bps.
V.32 modems fall back at 4800 bps when line quality is
impaired, and fall forward again to 9600 bps when line
quality improves.
V.32 bis Standard that extends the V.32 connection range: 4800,7200,
9600, 12K and 14.4K bps. V.32 bis modems fall back to the
next lower speed when line quality is impaired, and fall back
further as necessary. They fall forward to the next higher
speed when line quality improves.
V.34 28.800 CCITT standard
V.34+ 31.200 & 33.600, currently only supported by US Robotics
(V.EveryThing modems) under consideration by CCITT.
V.35 See V.24.
V.42 Standard for modem communications that defines a two-stage
process of detection and negotiation for LAPM error control.
V.42 also supports the MNP error control protocol.
V.42 bis An extention of V.42 that defines a specific data compression
scheme for use with V.42 and MNP error control.
X.3 It describes the functions of an X.25 PAD and the parameters
used to control its operation.
X.21 Interface between DTE and DCE for synchronous operation on
on public data networks.
X.25 Interface between DTE and DCE for terminals operating in
packet mode on public data networks.
X.28 It defines the interactions between a terminal and an X.25
PAD.
X.29 It defines the interactions between a host and its associated
PAD.
X.75 ISDN, EuroStandard, 64000.
X.400 Message handling systems : System model and service elements.
X.401 Message handling systems : Basic service elements and
optional user facilities.
X.408 Message handling systems : Encoded information type
convertion rules.
X.409 Message handling systems : Presentation transfer syntax and
notation.
X.410 Message handling systems : Remote operations and reliable
transfer server.
X.411 Message handling systems : Message transfer layer.
X.420 Message handling systems : Interpersonal messaging user agent
layer.
X.430 Message handling systems : Access protocol for teletex
terminals.
X.500 The directory (OSI Directory Services).

View File

@@ -0,0 +1,126 @@
TEXT OF APPLE-MICROSOFT AGREEMENT
AGREEMENT
This Agreement is entered into on this 22nd day of November, 1985, by
and between Apple Computer, Inc., a California corporation having its
place of business at 20525 Mariani Avenue, Cupertino, California 95014
(hereinafter "Apple") and Microsoft Corporation, having its place of
business at 10700 Northrup Way, Bellevue, Washington 98008 (hereinafter
"Microsoft.")
The parties have a long history of cooperation and trust and wish to
maintain that mutually beneficial relationship. However, a dispute has
arisen concerning the ownership of and possible copyright infringement
as to certain visual displays generated by several Microsoft software
products. These products are Microsoft's operating environment program,
"Microsoft Windows Version 1.0," the three Microsoft applications
programs developed under the January 22, 1982, agreement between
Microsoft and Apple for use on Apple's MacIntosh Computers: an
electronic spread sheet program ("Microsoft Mutliplan"), a business
graphics program ("Microsoft Chart") and a database program (Microsoft
File"), and two other Microsoft application programs: an integrated
electronic spread sheet program ("Microsoft Excel") and a word
processing program ("Microsoft Word"). By means of this Agreement the
parties intend to resolve the dispute and each acknowledges that the
valuable consideration underlying this Agreement consists of the
resolution of the dispute and the several undertakings and
accommodations of the respective parties described below. Accordingly,
the parties agree as follows:
1. Acknowledgement. For purposes of resolving this dispute and in
consideration of the license grant from Apple described in section 2
below, Microsoft acknowledges that the visual displays in the
above-listed Microsoft programs are derivative works of the visual
displays generated by Apple's Lisa and Macintosh graphic user interface
programs.
2. Visual Copyright License from Apple.
A. Grant. Apple hereby grants to Microsoft a non-exclusive, worldwide,
royalty-free, perpetual, non-transferable license to use these
derivative works in present and future software programs and to license
them to and through third parties for use in their software programs.
This license shall not include new software programs written by
Microsoft which are similar in function to Microsoft Excel and are
offered for to the public prior to October 1, 1986.
As a condition to this license, Microsoft shall cause its visual
copyright notice to appear in its products which use visual displays
licensed hereunder.
B. Warranty. Apple hereby warrants that neither Apple nor any of its
agents, representatives or attorneys knows of any patent, copyright,
trade secret or any other right or claim of or by any third party to
these licensed visual copyrights in the Lisa and Macintosh graphic user
interface programs. Each party shall notify the other promptly of any
such claim and will cooperate fully in the defense of such a claim.
Apple shall indemnify and hold Microsoft harmless from any such claim of
which it had such knowledge and any damages and reasonable expenses
arising therefrom.
3. Patent License from Apple.
A. Grant. Apple hereby grants to Microsoft a nonexclusive, worldwide,
royalty-free, nontransferable license to make, use and sell the
.More..
inventions described and claimed in claims 9, 11, 12, and 13 of the
United States Patent No. 4,464,652 for the life of the patent. Microsoft
in turn may license these rights to and through third parties for use in
their software programs and hardware products. Microsoft is not required
to cause any patent marking to appear in its products which use any such
inventions.
B. Warranty. Apple hereby warrants that it owns the patent and to the
best of its knowledge there are no claims asserted by any third party to
the inventions described in these claims.
4. Release. Apple hereby waives any other copyright, patent, trade
secret or other claim or right it may have as to Microsoft Windows
Version 1.0.
5. Visual Copyright License from Microsoft. Microsoft hereby grants to
Apple a nonexclusive, worldwide, royalty-free, perpetual,
nontransferable license to use any new visual displays created by
Microsoft during a period of five years from the date of this agreement
as part of its Microsoft Windows retail software product in software
programs and to license them to and through third parties for use in
their software programs. As a condition to this license, Apple shall
cause its visual copyright notice to appear in its products which use
.More..
such Microsoft visual displays.
6. Revision of Microsoft Word. Microsoft shall revise Microsoft Word
which operates on the Apple Macintosh computer by enhancing and
improving the program as specified in Exhibit A to this Agreement.
Microsoft shall use its best efforts to complete the revision by July
31, 1986.
7. General Provisions.
A. Confidentiality. The parties shall keep the terms and conditions of
this Agreement in strict confidence, except that each party may state
that it has entered into an agreement with the other concerning visual
copyrights.
B. Representations. The parties represent that each is free to enter
into this Agreement and is not and will not become a party to any
agreement inconsistent or in conflic with any of the terms or
conditions of this agreement.
C. Breach and Termination.
If a breach of this Agreement by either party contines more than 30
days from the date of written notice of such breach by the non-breaching
party, that party may terminate the Agreement by giving written notice
to the other.
Waiver by a non-breaching party of any breach by the other shall not
be deemed to be a waiver of any other or subsequent breach. The rights
of the parties under this clause are in addition to any other rights or
remedies provided by law or under this Agreement.
D. Notices. Any notice reuired under this Agreement shall be given by
first class mail, postage prepaid, with return receipt requested.
E. Assignment. Except in the case of the sale of substantially all of
the assets or controlling stock, this Agreement may not be assigned, nor
the rights granted hereunder (other than the sublicensing rights
containd in paragraph 2) transferred by either party without the prior
written consent of the other party.
F. Independent Contractor. This Agreement shall not be construed as
creating an agency, partnership or joint venture between the parties.
G. Entire Agreement.
This Agreement constitutes the entire agreement between the parties
with respect to the subject matter treated herein. This Agreement shall
not be amended except by a written agreement signed by both parties.
H. Binding Effect.
Subject to the limitations expressed above, this Agreement will inure
to the benefit of and be binding upon the parties and their successors
in interest.
Signed:
John Sculley, Apple Computer Inc., president and chief executive
officer.
William H. Gates, Microsoft Corporation, chairman of the board and
chief executive officer.

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,585 @@
=================================================================
COLUMNS
=================================================================
Host net 508, Node:508/4 Tel. int+55 421284
Ignaat Simons
Chopinlaan 3
7333GA Apeldoorn Netherlands
HAYES modems and compatables.
1. Introduction.
In the world of modem freaks and slowly on in the industrial
world, the HAYES modem is a defacto standard.
The official standards like RS232c (USA) and V24/V28 (CCITT)
describe the Physical part of a data circuit, while the V25
(CCITT) describes the A(uto) C(call) U(unit) function. The
speeds and usage of the modems are laid down by the CCITT V-
standards, mainly in the V21 till V36 books.
Due to the different country and telephone company laws,
modems are different and not compatable with each other,
exept modems of one vendor. Some years ago, it was very
unwise to make a connection with two different modems, even
if they claimed to be according a V-xx norm. Mostly this
was no problem, because a data transport was mainly between
two predefined points via a leased line or switched network.
The connection was buildup manual, or made automatic via
autocall function ACU (V25/RS232).
The HAYES-300 modem (I think this was the start), besides
the Physical RS232/V24/V28 norm did specify the modem
control command level between modem and terminal via the AT
leadin and the <silence>+++<silence> command to return from
a data state to the command state. Also it describes the
handling of automatic speed detection. This command set
enables operators and application programmers to buildup a
connection via normal conversation. As it could be
programmed, the connection via a switched network was
possible automatical via simple statements like "CALL John".
The original HAYES-300 was not using call procedures like
108/1 or 108/2 (DTR circuit). With the HAYES-1200, this
command set was extended to cope with more than one line
speed, the BELL 103 and BELL 212A. The last one more or less
compatable with the CCITT V22 norm. Also the automatic speed
selection in 'answering' mode was build in. With the HAYES-
2400, the set was dramatically extended with three speeds,
BELL-103, BELL-212A and the CCITT V22 and V22bis norms. So
handling also in 'answering' mode an automatic selection. As
the BELL-212A and V22 uses a PSK (four-level phase shift
keying) and V22bis uses QAM (Quadrature Amplitude
Modulation) technic, which were designed for synchronous
modems, the HAYES-modem translates the asynchrone data into
a synchronous way by inserting and consequently removing a
STOP bit in periods where no character is send. The HAYES-
1200 is not compatible with the BELL-212A/V22 synchronous
modems. The HAYES-2400 is also in this aspect compatible and
serves also the formal Half duplex (RTS/CTS-handling). As
the HAYES-1200 did serve only the CCITT 108/2 mode, the
HAYES-2400 supports also the 108/1 mode. Really you can say,
the HAYES-2400 is a complex intelligent unit. Despite the
well written handbook of HAYES, it is a hard job to make a
compatible one. From all modems (compatibles) I have seen,
there are a few which come close to the HAYES, the most are
fare away.
As my job is Faultfinder (Support), I really was very
pleased, HAYES did implement in the HAYES-2400, a really
complete circuit test via the S16-register, even with remote
commands, so the fully V54 norm of CCITT. As most Hobbyist
but even profesionals have big problems with reliable
circuit connections, and more the solvation of it, a modem
without this feature nowadays isn't worth the word MODEM so
certainly not the word HAYES.
2. HAYES-clones.
What is "compatible". Really nothing if not exactly said
with WHAT. "HAYES compatible" is to vaque. "HAYES command
set compatible" is better. Most modems, so not all, are only
compatible with a "subset of HAYES command set". But also
most "hayes" modems have commands not existing with hayes.
Some unlucky vendors did use commands or registers not used
with hayes-1200 at that time, but later used in the HAYES-
2400. (Bad Ques).
The best I can say most of the better clones are more or
less compatible upto HAYES-1200.
As I don't know if besides HAYES-1200 and the HAYES-2400,
also a HAYES-300 exists, I further only refer to this two,
from which both I have the specifications. In Europe a lot
of 'hayes' modems with only the V21 and V23 speeds exists,
which are similar, but absolute not connectable, with the
BELL-103 and BELL-202 norm modems.
As most application programs only use a small set of the
HAYES-command set, most clones will run with these packages
such that the user is pleased, not to use his fingers and
ear to make a connection. This if he has a user friendly
telephone company (are there), but mostly the results are
hopeless in peak hours, if there is a mismatch between the
modem commands and the terminal commands. I had a modem and
a terminal program and on some day no nice CALL <my mother>
was succesfully. With finger and ear there was no problem.
Reaction of the terminal was "BUSY". The real point was, the
modem did not pickup in ATX2 mode the dial tone from the
Telephone company, so didn't start dialling. As the modem
had not a speaker (for cheapness), I could not use the ATM1
command, to follow the connection process. The dial signal
was strong enough, but the frequency was a little ouside
(WHO's) specification.
3. The HAYES set.
With this I hope, without copying the whole 250 pages of
both Hayes handbooks, to give enough information to
understand the HAYES-set and the differences.
Hayes propose to use as terminal program, the Hayes Smartcom
II Version 2.1.
3.1. The Physical DCE/DTE-lines.
With DTE is meant the Data Terminal Equipment (Your terminal
or Host computer) and with DCE the Data Circuit
(termination) Equipment (all equipment between two modems
RS232 plugs). The HAYES-1200B is the 1200 type but as a card
to be fitted into an IBM-PC. The same for HAYES-2400B.
The pin assignments must be in accordance to ISO 2110.
Pin # Circuit Towards Description 1200 2400
EIA/CCITT
1 AA 101 N/A prot. ground x x
7 AB 102 N/A signal ,, x x
2 BA 103 DCE transmit data x x
3 BB 104 DTE receive data x x
4 CA 105 DCE request to send x
5 CB 106 DTE clear to send H x
6 CC 107 DTE data set ready R x
20 108.1 DCE connect data set x x
20 CD 108.2 DCE data term. ready x x
22 CE 125 DTE ring indicator x x
8 CF 109 DCE data carrier detected x x
23 CI 112 DTE select altern. rate x
12 CI DTE as previous (Bell212) x x
24 DA 113 DCE TX-clock (DTE source) x
15 DB 114 DTE TX-clock (synchr.) x
17 DD 115 DTE RX-clock (synchr.) x
Remark: x means served by the modem.
H means tied to +10 volt (True).
R means tied to pin 8.
Pin 20 (DTR) can be simulated in the 1200 and
1200B type with a dipswitch.
Pin 6 and 8 can be forced to true in the 1200
and 1200B type with a dipswitch.
3.2. The telephone line.
On the telephone lin level some distinction can be made on
the HAYES-2400, between jack type RJ12/RJ13 (multi line
jack) and the RJ11/RJ41S/RJ45S (single line jack). The 1200
only supports the RJ11 (single line), RJ12/RJ13 (multi
line), which can be set by dipswitches. This typically is
different per country. In the USA and some other countries,
the telephone set remaines connected in parallel to the
modem. In other countries like the Netherlands the telephone
set is switched of, as soon as the modem goes off-hook.
3.3. The modulation frequencies and call setup phase tones.
The following information is not exactly the HAYES-modem
information, but a hopefully readable extract from the
CCITT-norms. As I have not the Bell-norms, more or less the
USA norms are deducted from other documents.
The frequencies used with the different baudrates are:
3.3.1. For the F(requency) S(hift) K(eying) methodes.
These can be used as well as Synchrone.
Norm Send Receive Answ. mode
'0' '1' '0' '1' tone
Bell-103(ORG) 1070 1270 2025 2225 1270 300 FD
Bell-103(ANS) 2025 2225 1070 1270 2225 300 FD
Bell-202(main) 2200 1200 2200 1200 2025 1200 HD
Bell-202(back) 487 387 487 387 - 0-150 HD
V21 (ORGinate) 1180 980 1850 1650 980 300 FD
V21 (ANSwer) 1850 1650 1180 980 2100 300 FD
V23-1 (main) 1700 1300 2100 1300 2100 600 HD
V23-2 (main) 2100 1300 1700 1300 2100 1200 HD
V23 (back) 450 390 450 390 - 0-150 HD
Remark: '0'= "start bit" = "space"
'1'= "stop bit" = "mark"
FD = Full Duplex, HD = Half Duplex.
Important is, the modems use filter technics to seperate
the transmit channel and receive channel. Some autoanswering
modems also by filter technics decide in which mode they are
called.
3.3.2. Automatic answering sequence (V25).
If ringing is received on the line, the CE/CT125 circuit
(pin 22) will be raised true. If CD/108 circuit was true,
the modem goes OFF-HOOK. If not the modem waits for a true
signal on CD/108 (pin 20), before it goes OFF-HOOK. The
modem remains after 'off hook', for 1.8-2.5 sec. silent and
then transmits the 2100 Hz. answer tone during 2.6-4.0 sec.
or till 100msec. after a response from the calling station.
At least now 75 msec. silence is maintained. The 2100 Hz is
intended to disable network echo cancellers or echo
suppressors and is reversed in phase every 425-475 msec. Now
the circuit CC/107 (pin 6) is set true to indicate to the
terminal, a connection is ready. The calling modem reacts on
the answer tone also by setting circuit CC/107 (pin 6) true.
A response normally as mentioned is the frequency of a
binary '1'. If the equipment of the telephone company does
not have echo control devices, the 2100 Hz tone may be
replaced by any other tone e.g. directly the binary '1'.
Only after this sequence (or in ommission of it) directly
the autospeed modems will determine the baudrate norm. In
Europe, with its V23-splitbaud rate complexity, there are
Hayes compatibles trying to select at the moment after the
answer sequence to select: V21, V23 (viditel), V22 and
V22bis. This means actually a detection criteria for carrier
frequencies at 980/1180 (V21), 450/390 (V23) and 1200
V22(bis) modulated with 600 baud. At the same time all kind
of frequencies like 2100, 550, 1800 Hz. and busy tone, dial
tones around 425 Hz. has to be ignored.
3.3.3. For the D(iferential) P(hase) S(hift) K(eying)
and the Q(uadrature) A(mplitude) M(odulation) methodes.
These methodes are primarly for synchrone transmission, but
asynchrone is allowed by inserting extra stop bits between
characters.
Norm Send Rec. Guard tone Mode Methode
V22 (ORG) 1200 2400 - 600/1200 FD DPSK
V22 (ANS) 2400 1200 1800(550) 600/1200 FD DPSK
V22(bis) (ORG) 1200 2400 - 1200/2400 FD QAM
V22(bis) (ANS) 2400 1200 1800(550) 1200/2400 FD QAM
Bell-212A (ORG) 1200 2400 - 1200 FD DPSK
Bell-212A (ANS) 2400 1200 - 1200 FD DPSK
The guard tone is only send in the high channel (2400 Hz.
carrier, so by the answering modem, but can be disabled per
country. The 550 guard tone is another option. Basically
the Bell-212 and the CCITT-V22 are the same. But in detail
there are differences. Which, I don't know yet for sure, it
may be the scrambled '0' instead '1's (see lateron). But in
the HAYES-2400, there is a command ATBn, with which the
BELL-212 (n=1) or V22 (n=0) is selected. This only for the
1200 baud FD mode. The V22bis is fully compatible with the
V22 norm. The difference between V22 (600/1200 baud) and
V22bis (1200/2400 baud) is V22 works with 2 dibits and
V22bis with quadbits. The way of working of PSK/QAM modems
is to complex to explain here, but it is important to know
that a phase change of the modulated carrier of:
0 degrees is equal to dibit 01
90 degrees is equal to dibit 00
180 degrees is equal to dibit 10
270 degrees is equal to dibit 11
These first two bits in the V22bis quadbit are compatible
with the dibits of V22, to remain compatabilty for fallback
mode. The V22bis has another 4 levels of detection by means
of a quadrature amplitude modulation technic.
3.3.4. Automatic answering mode V22(bis).
At calling time the sequence as described above with the FSK
type modem is valid for the V22(bis). The called modem
reacts instead or after the answer sequence with unscrambled
binary '1's at 1200 bit/sec. and well in the upper channel
(2400 Hz. carrier). This till it detects scrambled '0' or
'1's in the lower channel (1200 Hz. carrier). The calling
modem remains silent till it for 155 msec. detects
unscrambled '1's in the upper channel, after which it
remains silent for 456 msec. and then transmit unscrambled
double dibits 00 and 11, if in V22bis mode, for 100 msec.
followed by scrambled binary '1's or if in V22 mode it
transmits direct scrambled binary '1's (*). Here the
distinction 1200/2400 baud is made by the calling modem. The
called modem reacts with scrambled '1's preceded, if V22bis
with the unscrambled double dibit 00 and 11. At the moment
of detection of the double dibits, the circuit CI/112 (pin
12) is set true (indicating 2400 baud). In both cases the
scrambled '1's are observed for 600 msec. after which the
circuit CF/109 (pin 8) is set true. If V22 (1200) the data
transfer is started under control of CA/104 (pin 3). In the
V22bis mode (2400), first scrambled binary '1's are send
form both sides for 200 msec. on 2400 bit/sec. mode. Noted,
that till now all was transmitted on 1200 bit/sec. After
this 200 msec. also the V22bis mode is ready for data
transfer.
I know it is confusing, but so it works. To make it more
difficult, the (*) mentioned in the text is true for V22bis
and for V22 alternative A and B only. For V22 alternative C,
for the '1's you have to read '0's. As the V22 norm is very
confusing on some aspects, one remark has to be made. In V22
(not V22bis) 3 alternatives can be selected. Alternative A
and B are compatible with V22bis, but alternative C not. The
difference is the scrambled binary '0's stead '1's of the
calling modem. So the real difference between alternatives
A/B and C is, that alternative C includes the possibility
for mode V, for anisochronenous data upto 300 bit/sec. Which
manufacturer tells me which alternative as mentioned in V22
he serves. Or has this to do with the Bell-212 norm. Who can
tell? Has this to do with the famous ATBn command in the
HAYES-2400 modem? See above.
Be carefully with these V22 and Bell-212A norms. As
explained before only the 2400 baud (V22bis) is compatible.
The 1200 sometimes works, but sometimes not. E.g. I had an
USA RIXTON 212 modem, not corrected for the European market.
Also I had a Dutch designed (DATAD) V22(bis) V23 and V21
modem and an English (PACE) for the same speeds. The RIXTON
works pretty most at the time with both the DATAD and PACE
modem. But sometimes it goes wrong and the Eurpeans connects
at 2400, which is strange, but true. With an original HAYES-
1200 (with no ATBn) command as the HAYES-2400 has, nearly
the same result. The two Europeans hardly are connectable at
1200 baud to each other. This has in my opinion to do with
the way of speed selection. We try to come out of this
struggle.
3.4. Some advise on real physical level.
If you are ggiing into communications with modems and you
have no Telecomfreak-friend close to you and you want no
nervous breakdown in the near future, have at least a
"breakbox", self made or from the shop. This to follow the
different DTE/DCE levels. If you want to log a HAYES session
to evaluate the connection process or data exchange process,
make from your old computer a "DATASCOPE". (See Appendix A
for some suggestions). An other advise is to standardise
your cable set. As some manufactures make a mash of the V24
or RS232C pins, you have not to follow it. On telephone
line level it is handy to have in your surrounding a scope
or frequency counter.
3.5. Connection of the terminal to the HAYES.
The Hayes modem has a minimum and a maximum baud rate. If
you connect a terminal to the modem, make sure you have the
right pins connected in relation with the dipswitches. Also
if you have selected e.g. 108/2 mode, be sure your terminal
program support them. It is possible to connect only the
pins 2,3 and 7. So in this case the DTR and the DCD are
forced true. In general I don't like this methode. With the
Hayes-1200, RTS and CTS are not used, so only full duplex is
possible. With Hayes-2400 you have to use these signals only
if you use the Half Duplex mode (Synchrone mode). Otherwise
RTS (pin 4) is neglected and CTS (pin 5) is set true.
So if you have connected the terminal properly, at the time
you give an 'A' or 'a', the modem decides what the baudrate
is and set the terminal interface UART according to it.
Hayes is very street forward. This speed is maintained till
after the <carriage return>, which always finishes a command
line. With the next A from a new AT command line, a new
speed can be defined. There is one other possibility. In
auto answer mode or if a call is made, the baudrate can be
else as the speed in the last passed command mode. This on
real modem level, the baudrate detection selects another
speed. The Hayes reacts with the connect code on this last
command mode speed and than switches to the new speed. To
give an example. Suppose the terminalspeed is 2400 baud. A
dial is made towards a 1200 baud only modem. The Hayes will
start the connect phase as described in 3.3.2. but finally
will get a connection on 1200 baud. So he will react towards
the terminal with 2400 baud with 'CONNECT' or '1', switches
back to 1200 baud, which the terminal has to follow,
otherwise it result in a terminal/modem mismatch. Also a
<silence>+++<silence> on 2400 baud will not be accepted.
Only 1200 baud, from this moment on. So suppose the
established call at 1200 baud is broken. The Hayes will,
after the carrier disappear, fall back into command mode
still in 1200 baud. The terminal has to give an AT<string>
on 2400 baud if it wants the original 2400 baud connection
again.
3.6. The differences in the Hayes command set.
Very short a comparision between HAYES-1200 and HAYES-2400
modem will be given and only per command a short functional
recoqnition. First however the Hayes command-input line. It
starts with AT or at (no mix of UPPER/lower) and ends with a
cariage return from now on indicated with <CR>. The only
exeption is the A/ command, which needs no <CR>. During
commandline editing backspace (hex '08') is accepted. One or
more commands can be given after one leading AT. The max.
length of the input string however is 40 char.
Blanks can be inserted for more readability.
Command. What does it. Hayes-1200 Hayes-2400 Return code
AT Attention y y OK
A/ Repeat last comm. y y depends
A Off hook (ANS) y y none (data)
Bn 1200 (V22/Bell) - n=0-1,1 OK
Cn TX off/on n=0-1 - OK
D<modif> Dial y y see modifier
En Echo off/on(comm) n=0-1 n=0-1,1 OK
Fn Echo off/on(data) n=0-1 - OK
Hn Hook on/off/spec. n=0-2 n=0-1 none (data)
In prod.code/prom-cc n=0-1 n=0-2 info
Ln Speaker (L/M/H) - n=0-2,1 OK
Mn Speaker off/on n=0-2 n=0-3,1 OK
On Online only O n=0-1 none (data)
P Set pulse dial y y OK
Qn Result code Y/N n=0-1 n=0-1,0 OK
Sr=n Set reg. r to n r=0-16 r=0-27 OK
Sr? Display reg. r r=0-16 r=0-27 contents r
T Set touch dial y y OK
Vn Result code N/W n=0-1 n=0-1,1 OK
Xn Dial process n=0-1 n=0-4,4 OK
Yn Long disconn. - n=0-1,0 OK
Zn Reset only Z n=0-1 OK
&Cn DCD on/carrier - n=0-1,0 OK
&Dn DTR modes - n=0-3,0 OK
&F Load factory set - y OK
&Gn Gaurd tone - n=0-2,0 OK
&Jn RJ-jack sel. - n=0-1,0 OK
&Mn Asynch./Synchr. - n=0-3,0 OK
&Pn Pulse ratio - n=0-1,0 OK
&Rn CTS mode - n=0-1,0 OK
&Sn DSR mode - n=0-1,0 OK
&Tn Test local/remote - n=0-8 OK
&V Display conf/tel - y OK
&Wn Write conf. MOS - n=0-1 OK
&Xn Line clock mode - n=0-2,0 Ok
&Yn Sel. default prof.- n=0-1 OK
&Zn Store teleph. nr. - n=0-3 OK
Remark: n=0-2,1 means, n can be 0,1,2 and 1=default.
If n=0 this may ommitted. (ATV0 equal to ATV).
All numbers are in decimal (max.=255).
Dial What does Hayes-1200 Hayes-2400
Modifier it
P Pulse dial y y
R Reverse to ANSW y y
Sn Dial stored tel. - n=0-3
T Touch dial y y
W Wait 2e dialtone - y
. Pause y y
! Flash - y
@ Wait for silence - y
; Return to comm. y y
The registers.
Reg. What does it. Hayes-1200 Hayes-2400
S0 Ring to answ.on 0-255 0-255,00
S1 Ring count 0-255,00 0-255,00
S2 Escape code 0-127,43 0-127,43 ASCII
S3 Cariage return 0-127,13 0-127,13 ASCII
S4 Line feed code 0-127,10 0-127,10 ASCII
S5 Back space code 0-127,08 0-127,08 ASCII
S6 Wait for dial tone 0-255,02 0-255,02 Sec.
S7 Wait for carrier 1-30,30 1-30,30 Sec.
S8 Pause time comma 0-255,02 0-255,02 Sec.
S9 Carrier detect time 1-255,06 1-255,06 1/10 Sec.
S10 Lost carrier time 1-255,07 1-255,14 1/10 Sec.
S11 DTMF dialing speed 50-255,70 50-255,95 mSec.
S12 Escape code guard 0-255,50 0-255,50 1/50 Sec.
S13 UART status reg. y y
S14 Option reg. y x'AA'
S15 Flag reg. y y
S16 Modem test 0-2,0 bit settings
S17 res. - res.
S18 Modem test time - 1-255,00 Sec.
S19 Res. - Res.
S20 Res. - Res.
S21 Bit mapped options - 00
S22 Bit mapped options - x'76'
S23 Bit mapped options - 07
S24 Res. - Res.
S25 Detect DTR change - 0-255,05 1/100 Sec.
S26 RTS to CTS delay - 0-255,01 1/100 Sec.
S27 Bit mapped options - x'40'
Remark: 1-255,01 means, range 1 till 255, 01=default.
All numbers are in decimal (max.=255).
x'76' is hexadecimal.
Return codes Hayes-1200 Hayes-2400
Digit Word
0 OK y y
1 CONNECT y y
2 RING y y
3 NO CARRIER y y
4 ERROR y y
5 CONNECT 1200 y y
6 NO DIALTONE - y
7 BUSY - y
8 NO ANSWER - y
9 reserved - -
10 CONNECT 2400 - y
========
Appendix A. Datascope.
A datascope looks to both the RXD and the TXD line of a
V24/RS232C line. So only follows what happens on the line.
There are very nice commercial packages as FELINE, HP etc.,
but they are expensive and they use mostly a special POD to
connect to the V24 line. Most of them you have to preset on
one speed and than to start the logging.
If you have an old computer with better two speed
programmable UART or a SIO chip and you can program them in
Assembler/basic/pascal or C, you can make your one one.
The next story is a simplified logunit only to log
datastreams preceded with a AT-string. Most of the
application programs works in terminal session as well
filetransport in a half duplex mode. Or better, never the TX
and RX line transports a character. So basically in default
you have to look to the TXD-line, and look at 2400 baud for
a character x'41','06', '78' or '01'. At that moment you
know that probably the speed is 2400, 1200, 600 or 300 baud.
You get on line speeds 600 and 1200 a framing error, because
the stop-bit is not detected. Now depending the detected
speed you have to wait (time-out) till the rest of the
character is passed, then you have to change the speed of
your comm-port, and await for the 'T', If it is a 'T' than
you have the speed, if not wait on 2400 baud for the
posibilities as described above. The basic idee behind this
is really simple. If you listen with 2400 bit/sec to a 300
bit/sec send character, the start bit is detected and will
serve for the startbit and 7 bits char. bits (so 7 zero
bits). The eights char. bit is formed of the LSB bit and
well 1/8 portion of it. The second portion will be the stop
bit. So if on the line really is transmitted a 600 bit/sec
char., the same is true with 1/4 portions. Furthermore you
have to look to both the TXD and RXD line, if on one a char.
is received. If so you put this char. in its own buffer and
in the other one a x'00'. Lateron you can print it out, one
line from buffer RXD, one line from buffer TXD in Hex or
ASCII (or both) outfit.
Go on on the same speed till you didn't receive for 30 sec.
any character on both lines and start again with AT
synchronisation. In fact the HAYES inside micro computer is
doing the same. Don't try to write the buffer to disk at
first instance, because you need a DMA at least, but also 2
buffers. So buffer it in memory only. You can try to write
to disk in the silence just before the new AT string.

View File

@@ -0,0 +1,182 @@
From: jones@pyrite.cs.uiowa.edu (Douglas W. Jones)
Newsgroups: alt.folklore.computers
Subject: Re: ASCII control codes
Date: 31 Aug 1995 19:37:58 GMT
From article <4239uk$ko1@metro.ucc.su.OZ.AU>,
by adrianw@cassius (Adrian Whichello):
> Some are obviously still used for their original purpose (CR, LF, the
> tabbing codes etc.) but what did ENQ, EM, SUB, FS, etc. do? Thanks,
- - - here's a reply I posted a year ago in June - - -
Subject: Re: original uses of ASCII control codes
Newsgroups: alt.folklore.computers
References: <1994Jun02.064649.131411@ua1ix.ua.edu>
To understand the original intent of the ASCII control codes, you have
to think of teletypes, using paper tape, configured in a multidrop
system with relay logic used to turn on or off individual teletypes in
the bunch, and you have to remember that the designers were pretty
smart and they anticipated future developments, but they also managed
to include provisions for things that never happened. Here are the
ASCII control characters, and a few others, with comments on how they
were supposed to be used and how this relates to current popular uses:
NAME HEX/CTL USE
NULL 00 ^@ always ignored -- leader and trailer on paper tape
systems was typically made of sequences of NULLs.
SOH 01 ^A start of heading -- imagine a heading containing, for
example, the address of the recipient. You could have
relay logic that scans for SOH, then enables the print
mechanism if the following character matches this
station's address. In early documentation, this was
called start of message.
STX 02 ^B start of text -- if the heading matched, start printing
with the following character. In early documentation,
this was called end of address.
ETX 03 ^C end of text -- now is a good time to stop printing.
Your message might continue after this with a checksum
or other administrative stuff. In early documentation,
this was called end of message. The common use of
control C as a kill character stems from this -- it
indicates the end of your text addressed to some
application.
EOT 04 ^D end of transmission -- relay logic could decode this
and, if there is a tape in the tape reader, it could
begin transmitting its own message.
ENQ 05 ^E enquire -- on receiving this, local relay logic would
generate a response. In early documentation, this was
called WRU or who are you. Teletypes had programmable
response sequences that were encoded on a music box
mechanism, and it was up to the customer to break
plastic fingers off the drum to code how it responded
to an ENQ.
ACK 06 ^F acknowledge -- one possible response to ENQ. In early
documentation, this was called RU or are you.
BEL 07 ^G bell -- ring the bell in the terminal. Teletypes had
real bells where most modern terminals have beepers of
some kind. A sequence of BEL characters sent to a
teletype sounded very much like a telephone ringing.
BS 08 ^H backspace.
HT 09 ^I horizontal tab.
LF 0A ^J linefeed.
VT 0B ^K vertical tab.
FF 0C ^L formfeed -- page eject.
CR 0D ^M carrage return -- on many mechanical devices, CR was
slow. The sequence CR LF was always sent in that order
so that the linefeed could be handled while the carriage
was returning; a well adjusted Teletype could just finish
the CR in this time (0.2 seconds), and a common sign that
it was time to call the service man was that the first
letter printed after a CR LF was printed "on the fly" on
the way back to the margin.
SO 0E ^N shift out -- if you've got a two-color ribbon, shift to
the alternate color, usually red. There are obvious
extensions of this to alternate character sets.
SI 0F ^O shift in -- undo whatever SO does. For mysterious reasons
that have no apparent connection to old or modern ASCII
standards, DEC liked to use control O as a break character
to suppress teletype output.
DLE 10 ^P data link escape -- an escape character is generally a
prefix for something else. DLE was expected to be used
as a prefix on characters in the user data stream that
might otherwise be interpreted as data link control
characters, for example, flow control characters. In
some early documentation, this was called DC0 or device
control zero.
DC1 11 ^Q device control 1 -- turn on the paper tape reader.
In early documentation, this was called XON.
DC2 12 ^R device control 2 -- turn on the paper tape punch.
DC3 13 ^S device control 3 -- turn off the paper tape reader.
In early documentation, this was called XOFF, The use
of XON/XOFF (DC1/DC3) for flow control stems from their
use to control the flow of data from the paper tape
reader attached to a Teletype.
DC4 14 ^T device control 4 -- turn off the paper tape punch.
NAK 15 ^U negative acknowledge -- another possible response to ENQ.
One flow control mechanism is to use ENQ to ask if the
receiver has buffer space, and require the receiver to
respond with either ACK (yes) or NAK (no). ENQ could
also be used to enquire about whether a retransmission
is required after sending a checksum. The popular use of
control U to delete the current input line is only vaguely
grounded in this definition.
SYN 16 ^V synchronous idle -- if you're using a synchronous
transmission protocol, and you have no data to send, you
send SYN characters to keep the clocks synchronized.
The receiver should ignore these, and the transmitter may
have to insert them into the data stream once in a while.
ETB 17 ^W end of transmission block -- used when a transmission must
be broken into many blocks for some reason, for example,
to place a checksum after each block. Early documentation
called this logical end of media.
CAN 18 ^X cancel -- take that back, what I just sent you is a
mistake, ignore it.
EM 19 ^Y end of medium -- there's nothing left on this reel of
(paper) tape.
SUB 1A ^Z substitute -- the next character is from an alternate
character set. SUB X might be equivalent to SO X SI,
or it might be an alternate mechanism for extending the
character set. The common use of control Z as an end
of file character has no obvious relation to the standard.
ESC 1B ^[ escape -- the next character is to be interpreted as
something other than text, for example, it might be an
extended control character of some kind.
FS 1C ^\ file separator -- useful if you have multiple logical
files in one transmission.
GS 1D ^] group separator -- useful if files are made of groups
of records.
RS 1E ^^ record separator -- COBOL anyone?
US 1F ^_ unit separator -- are records made of units?
ALT 7D } Some early teletypes had an ALT MODE key that generated
this code instead of ESC. This was interpreted as an
escape code, which was no problem when nobody had lower
case printers, but with the advent of full 96 character
ASCII, there were obvious compatability problems.
PRE 7E ~ A few terminals had a PREFIX key that generated this code
instead of ALT MODE, with all the same problems.
DEL 7F delete -- remember, paper tape uses a hole to record each
one and no hole to record each zero. DEL is all holes,
so it can be punched over any other character to rub it
out (on old teletypes, it was the RUB or RUB OUT key).
If you mispunch a character, just back up the tape and
overpunch it with a DEL. Software is expected to ignore
DEL the same way it ignores NULL.

View File

@@ -0,0 +1,26 @@
(*----------------------------------------------------------------------*)
(* ASCII character set definitions *)
(*----------------------------------------------------------------------*)
const
NUL = 0; (* NULL Character *)
ETX = 3; (* ETX = ^C *)
ENQ = 5; (* ENQ Character *)
ACK = 6;
BELL = 7; (* BELL Character *)
BS = 8; (* Backspace Char *)
HT = 9; (* Horizontal Tab *)
LF = 10; (* Line Feed *)
VT = 11; (* Vertical Tab *)
FF = 12; (* Form Feed *)
CR = 13; (* Carriage Return *)
SO = 14; (* Start grahics *)
SI = 15; (* End graphics *)
XON = 17; (* XON Character *)
XOFF = 19; (* XOFF Character *)
CAN = 24;
SUB = 26; (* EOF Character *)
ESC = 27; (* Escape *)
SP = 32; (* Space *)
DEL = 127; (* DEL Character *)

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,618 @@
_STRUCTURED PROGRAMMING COLUMN_
by Jeff Duntemann
[LISTING ONE]
{ Calendar unit demo program }
{ Jeff Duntemann -- 2/3/89 }
PROGRAM CalTest;
USES DOS,Crt, { Standard Borland units }
Screens, { Given in DDJ 4/89 }
Calendar; { Given in DDJ 6/89 }
CONST
YellowOnBlue = $1E; { Text attribute; yellow chars on blue background }
CalX = 25;
CalY = 5;
VAR
MyScreen : ScreenPtr; { Type exported by Screens unit }
WorkScreen : Screen; { Type exported by Screens unit }
Ch : Char;
Quit : Boolean;
ShowFor : DateTime; { Type exported by DOS unit }
I : Word; { Dummy; picks up dayofweek field in GetDate }
BEGIN
MyScreen := @WorkScreen; { Create a pointer to WorkScreen }
InitScreen(MyScreen,True);
ClrScreen(MyScreen,ClearAtom); { Clear the entire screen }
Quit := False;
WITH ShowFor DO { Start with clock date }
GetDate(Year,Month,Day,I);
ShowCalendar(MyScreen,ShowFor,CalX,CalY,YellowOnBlue);
REPEAT { Until Enter is pressed: }
IF Keypressed THEN { If a keystroke is detected }
BEGIN
Ch := ReadKey; { Pick up the keystroke }
IF Ord(Ch) = 0 THEN { See if it's an extended keystroke }
BEGIN
Ch := ReadKey; { If so, pick up scan code }
CASE Ord(Ch) OF { and parse it }
72 : Pan(MyScreen,Up,1); { Up arrow }
80 : Pan(MyScreen,Down,1); { Down arrow }
75 : BEGIN { Left arrow; "down time" }
WITH ShowFor DO
IF Month = 1 THEN
BEGIN
Month := 12;
Dec(Year)
END
ELSE Dec(Month);
ShowCalendar(MyScreen,ShowFor,CalX,CalY,YellowOnBlue);
END;
77 : BEGIN { Right arrow; "up time" }
WITH ShowFor DO
IF Month = 12 THEN
BEGIN
Month := 1;
Inc(Year)
END
ELSE Inc(Month);
ShowCalendar(MyScreen,ShowFor,CalX,CalY,YellowOnBlue);
END;
END { CASE }
END
ELSE { If it's an ordinary keystroke, test for quit: }
IF Ch = Chr(13) THEN Quit := True
END;
UNTIL Quit;
ClrScreen(MyScreen,ClearAtom) { All this stuff's exported by Screens }
END.
[LISTING TWO]
{--------------------------------------------------------------}
{ CALENDAR }
{ }
{ Text calendar for virtual screen platform }
{ }
{ by Jeff Duntemann KI6RA }
{ Turbo Pascal 5.0 }
{ Last modified 2/3/89 }
{--------------------------------------------------------------}
UNIT Calendar;
INTERFACE
USES DOS, { Standard Borland unit }
TextInfo, { Given in DDJ 3/89 }
Screens, { Given in DDJ 4/89 }
CalCalc; { Given in DDJ 6/89 courtesy Michael Covington }
TYPE
DaysOfWeek = (Sunday,Monday,Tuesday,Wednesday,Thursday,Friday,Saturday);
Months = (January,February,March,April,May,June,July,
August,September,October,November,December);
PROCEDURE ShowCalendar(Target : ScreenPtr;
ShowFor : DateTime;
CalX,CalY : Integer;
Attribute : Byte);
IMPLEMENTATION
TYPE
String10 = STRING[10];
CONST
MonthNames : ARRAY[January..December] OF String10 =
('January','February', 'March','April','May','June','July',
'August', 'September','October','November','December');
Days : ARRAY[January..December] OF Integer =
(31,28,31,30,31,30,31,31,30,31,30,31);
{$L CALBLKS}
{$F+} PROCEDURE CalFrame; EXTERNAL;
PROCEDURE Caldata; EXTERNAL;
{$F-}
{$L BLKBLAST}
{$F+}
PROCEDURE BlkBlast(ScreenEnd,StoreEnd : Pointer;
ScreenX,ScreenY : Integer;
ULX,ULY : Integer;
Width,Height : Integer;
Attribute : Byte;
DeadLines : Integer;
TopStop : Integer);
EXTERNAL;
{$F-}
FUNCTION IsLeapYear(Year : Integer) : Boolean;
{ Works from 1901 - 2199 }
BEGIN
IsLeapYear := False;
IF (Year MOD 4) = 0 THEN IsLeapYear := True
END;
PROCEDURE FrameCalendar(Target : ScreenPtr;
CalX,CalY : Integer;
Attribute : Byte;
StartDay : DaysOfWeek;
DayCount : Integer);
TYPE
PointerMath = RECORD
CASE BOOLEAN OF
True : (APointer : Pointer);
False : (OfsWord : Word;
SegWord : Word)
END;
VAR
DataPtr : Pointer;
FudgeIt : PointerMath;
DayInset : Word;
DayTopStop : Word;
BEGIN
{ DayInset allows is to specify which day of the week the first of the }
{ month falls. It's an offset into the block containing day figures }
DayInset := (7-Ord(StartDay))*4;
{ DayTopStop allows us to specify how many days to show in the month. }
DayTopStop := 28+(DayCount*4)-DayInset;
BlkBlast(Target,@CalFrame, { Display the calendar frame }
VisibleX,VisibleY, { Genned screen size from TextInfo unit }
CalX,CalY, { Show at specified coordinates }
29,17, { Size of calendar frame block }
Attribute, { Attribute to use for calendar frame }
0, { No interspersed empty lines }
0); { No topstop; show the whole thing. }
WITH FudgeIt DO { FudgeIt is a free union allowing pointer arithmetic }
BEGIN
APointer := @CalData; { Create the pointer to the days block }
OfsWord := OfsWord+DayInset; { Offset into block for start day }
BlkBlast(Target,APointer, { Blast the day block over the }
VisibleX,VisibleY, { calendar frame }
CalX+1,CalY+5, { Pos. of days relative to frame }
28,6, { Size of day block }
Attribute, { Show days in same color as frame }
1, { Insert 1 line between block lines }
DayTopStop) { Set limit on number of chars to }
END { be copied from block to control }
END; { how many days shown for a month }
PROCEDURE ShowCalendar(Target : ScreenPtr;
ShowFor : DateTime;
CalX,CalY : Integer;
Attribute : Byte);
CONST
NameOffset : ARRAY[January..December] OF Integer =
(8,8,10,10,11,10,10,9,7,8,8,8);
VAR
StartDay : DaysOfWeek;
TargetMonth : Months;
TargetDay : Real;
DaysInMonth : Integer;
BEGIN
{ First figure day number since 1980: }
WITH ShowFor DO TargetDay := DayNumber(Year,Month,1);
{ Then use the day number to calculate day-of-the-week: }
StartDay := DaysOfWeek(WeekDay(TargetDay)-1);
TargetMonth := Months(ShowFor.Month-1);
DaysInMonth := Days[TargetMonth];
{ Test and/or adjust for leap year: }
IF TargetMonth = February THEN
IF IsLeapYear(ShowFor.Year) THEN DaysInMonth := 29;
{ Now draw the frame on the virtual screen! }
FrameCalendar(Target,
CalX,CalY,
Attribute,
StartDay,
DaysInMonth);
{ Add the month name and year atop the frame: }
GotoXY(Target,CalX+NameOffset[TargetMonth],CalY+1);
WriteTo(Target,MonthNames[TargetMonth]+' '+IntStr(ShowFor.Year,4));
END;
END.
[LISTING THREE]
UNIT CalCalc;
{ --- Calendrics --- }
{ Long-range calendrical package in standard Pascal }
{ Copyright 1985 Michael A. Covington }
INTERFACE
function daynumber(year,month,day:integer):real;
procedure caldate(date:real; var year,month,day:integer);
function weekday(date:real):integer;
function julian(date:real):real;
IMPLEMENTATION
function floor(x:real) : real;
{ Largest whole number not greater than x. }
{ Uses real data type to accommodate large numbers. }
begin
if (x < 0) and (frac(x) <> 0) then
floor := int(x) - 1.0
else
floor := int(x)
end;
function daynumber(year,month,day:integer):real;
{ Number of days elapsed since 1980 January 0 (1979 December 31). }
{ Note that the year should be given as (e.g.) 1985, not just 85. }
{ Switches from Julian to Gregorian calendar on Oct. 15, 1582. }
var
y,m: integer;
a,b,d: real;
begin
if year < 0 then y := year + 1
else y := year;
m := month;
if month < 3 then
begin
m := m + 12;
y := y - 1
end;
d := floor(365.25*y) + int(30.6001*(m+1)) + day - 723244.0;
if d < -145068.0 then
{ Julian calendar }
daynumber := d
else
{ Gregorian calendar }
begin
a := floor(y/100.0);
b := 2 - a + floor(a/4.0);
daynumber := d + b
end
end;
procedure caldate(date:real; var year,month,day:integer);
{ Inverse of DAYNUMBER; given date, finds year, month, and day. }
{ Uses real arithmetic because numbers are too big for integers. }
var
a,aa,b,c,d,e,z: real;
y: integer;
begin
z := int(date + 2444239.0);
if date < -145078.0 then
{ Julian calendar }
a := z
else
{ Gregorian calendar }
begin
aa := floor((z-1867216.25)/36524.25);
a := z + 1 + aa - floor(aa/4.0)
end;
b := a + 1524.0;
c := int((b-122.1)/365.25);
d := int(365.25*c);
e := int((b-d)/30.6001);
day := trunc(b - d - int(30.6001*e));
if e > 13.5 then month := trunc(e - 13.0)
else month := trunc(e - 1.0);
if month > 2 then y := trunc(c - 4716.0)
else y := trunc(c - 4715.0);
if y < 1 then year := y - 1
else year := y
end;
function weekday(date:real):integer;
{ Given day number as used in the above routines, }
{ finds day of week (1 = Sunday, 2 = Monday, etc.). }
var
dd: real;
begin
dd := date;
while dd > 28000.0 do dd:=dd-28000.0;
while dd < 0 do dd:=dd+28000.0;
weekday := ((trunc(dd) + 1) mod 7) + 1
end;
function julian(date:real):real;
{ Converts result of DAYNUMBER into a Julian date. }
begin
julian := date + 2444238.5
end;
END. { CalCalc }
[LISTING FOUR]
;===========================================================================
;
; B L K B L A S T - Blast 2D character pattern and attributes into memory
;
;===========================================================================
;
; by Jeff Duntemann 3 February 1989
;
; BLKBLAST is written to be called from Turbo Pascal 5.0 using the EXTERNAL
; machine-code procedure convention.
;
; This version is written to be used with the SCREENS.PAS virtual screens
; unit for Turbo Pascal 5.0. See DDJ for 4/89.
;
; Declare the procedure itself as external using this declaration:
;
; PROCEDURE BlkBlast(ScreenEnd,StoreEnd : Pointer;
; ScreenX,ScreenY : Integer;
; ULX,ULY : Integer;
; Width,Height : Integer;
; Attribute : Byte;
; DeadLines : Integer;
; TopStop : Integer);
; EXTERNAL;
;
; The idea is to store a video pattern as an assembly-language external or
; as a typed constant, and then blast it into memory so that it isn't seen
; to "flow" down from top to bottom, even on 8088 machines.
;
; During the blast itself, the attribute byte passed in the Attribute
; parameter is written to the screen along with the character information
; pointed to by the source pointer. In effect, this means we do a byte-sized
; read from the source character data, but a word-sized write to the screen.
;
; The DeadLines parm specifies how many screen lines to skip between lines of
; the pattern. The skipped lines are not disturbed. TopStop provides a byte
; count that is the maximum number of bytes to blast in from the pattern.
; If a 0 is passed in TopStop, the value is ignored.
;
; To reassemble BLKBLAST:
;
; Assemble this file with MASM or TASM: "C>MASM BLKBLAST;"
; (The semicolon is unnecessary with TASM.)
;
; No need to relink; Turbo Pascal uses the .OBJ only.
;
;========================
;
; STACK PROTOCOL
;
; This creature puts lots of things on the stack. Study closely:
;
ONSTACK STRUC
OldBP DW ? ;Caller's BP value saved on the stack
RetAddr DD ? ;Full 32-bit return address. (This is a FAR proc!)
TopStop DW ? ;Maximum number of chars to be copied from block pattern
DeadLns DW ? ;Number of lines of dead space to insert between blasted lines
Attr DW ? ;Attribute to be added to blasted pattern
BHeight DW ? ;Height of block to be blasted to the screen
BWidth DW ? ;Width of block to be blasted to the screen
ULY DW ? ;Y coordinate of upper left corner of the block
ULX DW ? ;X coordinate of the upper left corner of the block
YSize DW ? ;Genned max Y dimension of current visible screen
XSize DW ? ;Genned max X dimension of current visible screen
Block DD ? ;32-bit pointer to block pattern somewhere in memory
Screen DD ? ;32-bit pointer to an array of pointers to screen lines
ENDMRK DB ? ;Dummy field for stack struct size calculation
ONSTACK ENDS
CODE SEGMENT PUBLIC
ASSUME CS:CODE
PUBLIC BlkBlast
BlkBlast PROC FAR
PUSH BP ;Save Turbo Pascal's BP value
MOV BP,SP ;SP becomes new value in BP
PUSH DS ;Save Turbo Pascal's DS value
;-------------------------------------------------------------------------
; If a zero is passed in TopStop, then we fill the TopStop field in the
; struct with the full size of the block, calculated by multiplying
; BWidth times BHeight. This makes it unnecessary for the caller to
; pass the full size of the block in the TopStop parameter if topstopping
; is not required.
;-------------------------------------------------------------------------
CMP [BP].TopStop,0 ; See if zero was passed in TopStop
JNZ GetPtrs ; If not, skip this operation
MOV AX,[BP].BWidth ; Load block width into AX
MUL [BP].BHeight ; Multiply by block height, to AX
MOV [BP].TopStop,AX ; Put the product back into TopStop
;-------------------------------------------------------------------------
; The first important task is to get the first pointer in the ShowPtrs
; array into ES:DI. This involved two LES operations: The first to get
; the pointer to ShowPtrs (field Screen in the stack struct) into ES:DI,
; the second to use ES:DI to get the first ShowPtrs pointer into ES:DI.
; Remembering that ShowPtrs is an *array* of pointers, the next task is
; to index DI into the array by multiplying the top line number (ULY)
; less one (because we're one-based) by 4 using SHL and then adding that
; index to DI:
;-------------------------------------------------------------------------
GetPtrs: LES DI,[BP].Screen ; Address of ShowPtrs array in ES:DI
MOV CX,[BP].ULY ; Load line address of block dest. to CX
DEC CX ; Subtract 1 'cause we're one-based
SHL CX,1 ; Multiply CX by 4 by shifting it left...
SHL CX,1 ; ...twice.
ADD DI,CX ; Add the resulting index to DI.
MOV BX,DI ; Copy offset of ShowPtrs into BX
MOV DX,ES ; Copy segment of ShowPtrs into DX
LES DI,ES:[DI] ; Load first line pointer into ES:DI
;-------------------------------------------------------------------------
; The inset from the left margin of the block's destination is given in
; struct field ULX. It's one-based, so it has to be decremented by one,
; then multiplied by two using SHL since each character atom is two bytes
; in size. The value in the stack frame is adjusted (it's not a VAR parm,
; so that's safe) and then read from the frame at the start of each line
; blast and added to the line offset in DI.
;-------------------------------------------------------------------------
DEC [BP].ULX ; Subtract 1 'cause we're one-based
SHL [BP].ULX,1 ; Multiply by 2 to cover word moves
ADD DI,[BP].ULX ; And add the adjustment to DI
;-------------------------------------------------------------------------
; One additional adjustment must be made before we start: The Deadspace
; parm puts 1 or more lines of empty space between each line of the block
; that we're blasting onto the screen. This value is passed in the
; DEADLNS field in the struct. It's passed as the number of lines to skip,
; but we have to multiply it by 4 so that it becomes an index into the
; ShowPtrs array, each element of which is four bytes in size. Like ULX,
; the value is adjusted in the stack frame and added to the stored offset
; value we keep in DX each time we set up the pointer in ES:DI to blast the
; next line.
;-------------------------------------------------------------------------
SHL [BP].DEADLNS,1 ; Shift dead space line count by 1...
SHL [BP].DEADLNS,1 ; ...and again to multiply by 4
LDS SI,[BP].Block ; Load pointer to block into DS:SI
;-------------------------------------------------------------------------
; This is the loop that does the actual block-blasting. Two counters are
; kept, and share CX by being separate values in CH and CL. After
; each line blast, both pointers are adjusted and the counters swapped,
; the LOOP counter decremented and tested, and then the counters swapped
; again.
;-------------------------------------------------------------------------
MovEm: MOV CX,[BP].BWidth ; Load atom counter into CH
MOV AH,BYTE PTR [BP].Attr ; Load attribute into AH
DoChar: LODSB ; Load char from block storage into AL
STOSW ; Store AX into ES:DI; increment DI by 2
LOOP DoChar ; Go back for next char if CX > 0
;-------------------------------------------------------------------------
; Immediately after a line is blasted from block to screen, we adjust.
; First we move the pointer in ES:DI to the next pointer in the
; Turbo Pascal ShowPtrs array. Note that the source pointer does NOT
; need adjusting. After blasting through one line of the source block,
; SI is left pointing at the first character of the next line of the
; source block. Also note the addition of the deadspace adjustment to
; BX *before* BX is copied into DI, so that the adjustment will be
; retained through all the rest of the lines moved. Finally, we subtract
; the number of characters in a line from TopStop, and see if there are
; fewer counts left in TopStop than there are characters in a block line.
; If so, we force BWidth to the number of remaining characters, and
; BHeight to one, so that we will blast only one remaining (short) line.
;-------------------------------------------------------------------------
MOV ES,DX ; Copy ShowPtrs segment from DX into ES
ADD BX,4 ; Bounce BX to next pointer offset
ADD BX,[BP].DeadLns ; Add deadspace adjustment to BX
LES DI,ES:[BX] ; Load next pointer into ES:DI
ADD DI,[BP].ULX ; Add adjustment for X offset into screen
MOV AX,[BP].TopStop ; Load current TopStop value into AX
SUB AX,[BP].BWidth ; Subtract BWidth from TopSTop value
JBE GoHome ; If TopStop is <= zero, we're done.
MOV [BP].TopStop,AX ; Put TopStop value back in stack struct
CMP AX,[BP].BWidth ; Compare what remains in TopStop to BWidth
JAE MovEm ; If at least one BWidth remains, loop again
MOV [BP].BWidth,AX ; Otherwise, replace BWidth with remainder
JMP MovEm ; and jump to last go-thru
;-------------------------------------------------------------------------
; When the outer loop is finished, the work is done. Restore registers
; and return to Turbo Pascal.
;-------------------------------------------------------------------------
GoHome: POP DS ; Restore Turbo Pascal's
MOV SP,BP ; Restore Turbo Pascal's stack pointer...
POP BP ; ...and BP
RET ENDMRK-RETADDR-4 ; Clean up stack and return as FAR proc!
; (would be ENDMRK-RETADDR-2 for NEAR...)
BlkBlast ENDP
CODE ENDS
END
[LISTING FIVE]
TITLE CalBlks -- External calendar pattern blocks
; By Jeff Duntemann -- TASM 1.0 -- Last modified 3/1/89
;
; For use with CALENDAR.PAS and BLKBLAST.ASM as described in DDJ 6/89
CODE SEGMENT WORD
ASSUME CS:CODE
CalFrame PROC FAR
PUBLIC CalFrame
DB '<27><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>͸'
DB '<27> <20>'
DB '<27><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ'
DB '<27>Sun<75>Mon<6F>Tue<75>Wed<65>Thu<68>Fri<72>Sat<61>'
DB '<27><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ'
DB '<27> <20> <20> <20> <20> <20> <20> <20>'
DB '<27><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ'
DB '<27> <20> <20> <20> <20> <20> <20> <20>'
DB '<27><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ'
DB '<27> <20> <20> <20> <20> <20> <20> <20>'
DB '<27><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ'
DB '<27> <20> <20> <20> <20> <20> <20> <20>'
DB '<27><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ'
DB '<27> <20> <20> <20> <20> <20> <20> <20>'
DB '<27><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ'
DB '<27> <20> <20> <20> <20> <20> <20> <20>'
DB '<27><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>;'
Calframe ENDP
CalData PROC FAR
PUBLIC CalData
DB ' <20> <20> <20> <20> <20> <20> <20>'
DB ' 1<> 2<> 3<> 4<> 5<> 6<> 7<>'
DB ' 8<> 9<> 10<31> 11<31> 12<31> 13<31> 14<31>'
DB ' 15<31> 16<31> 17<31> 18<31> 19<31> 20<32> 21<32>'
DB ' 22<32> 23<32> 24<32> 25<32> 26<32> 27<32> 28<32>'
DB ' 29<32> 30<33> 31<33> <20> <20> <20> <20>'
DB ' <20> <20> <20> <20> <20> <20> <20>'
DB ' <20> <20> <20> <20> <20> <20> <20>'
CalData ENDP
CODE ENDS
END

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,287 @@
"SYSOP_LAST_NAME";"SYSOP_FIRST_NAME";"BBS_NAME";"ADDRESS_LINE_1";"ADDRESS_LINE_2";"ADDRESS_LINE_3";"COUNTRY";"VOICE_PHONE";"BBS_PHONE";"FAX_PHONE";"STATUS"
"Abernathy";"Russell";"St Louis Users Group BBS";"PO Box 69099";"St Louis MO 63169";"";"USA";"Not Published";"314-878-7614";"Not Available";"Active"
"Adams";"Arnold";"Seascape! BBS";"PO Box 326";"Morehead City NC 28557";"";"USA";"919-726-6667";"919-726-9364";"Not Available";"Active"
"Albrecht";"Taylor";"Aspenwood BBS";"1220 S Parker Rd #110";"Denver CO 80231";"";"USA";"Not Published";"303-388-0336";"303-671-6305";"Active"
"Aloia";"Rodney A.";"INDEX System (tm), The";"6030 E. Alabama Road";"Suite 114";"Woodstock GA 30188";"USA";"404-924-8667";"404-924-8472";"Not Available";"Active"
"Alves";"Miguel Lupi";"SkyLab BBS";"Estrada da Luz 161-30/D0";"Lisboa 1600";"Portugal";"PORTUGAL";"Not Published";"+351-1-7269042";"Not Available";"Active"
"Anderson";"Nels J.";"Xevious BBS";"585 Edmands Road";"Framingham MA 01701-3088";"";"USA";"Not Published";"508-788-6951";"508-788-1363";"Active"
"Andrews";"Constance";"Nexus BBS, The";"PO Box 8088";"Fredericksburg VA 22404";"";"USA";"Not Published";"703-898-7205";"Not Available";"Active"
"Arezzo";"Federico";"Prometheus";"Via Podgora 132";"70124 Bari";"Italy";"ITALY";"Not Published";"+39-80-5515278";"Not Available";"Active"
"Argo";"Claude";"A to Z Tech Line";"21024 SE 269th";"Kent WA 98042";"";"USA";"206-432-8436";"206-432-4732";"Not Available";"Active"
"Armenia";"Greg";"Pier Exchange, The";"50 Tulane Road";"Buffalo NY 14217-1604";"";"USA";"Not Published";"716-875-0283";"716-875-4931";"Active"
"Arnold";"Anne";"Bits N' Bytes BBS";"PO Box 8194";"Winslow ME 04901";"";"USA";"Not Published";"207-873-1937";"Not Available";"Active"
"Asselin";"Patrick";"ToToche BBS";"6305 Beaucourt";"Montreal-Nord, QC H1G 2G3";"CANADA";"CANADA";"Not Published";"514-326-8363";"Not Available";"Active"
"Atkins";"Carl";"BackTrackers";"124 Bittersweet Lane";"Lansing KS 66043-1401";"";"USA";"Not Published";"913-727-2043";"Not Available";"Active"
"Attard";"Janet";"GEnie Home Off/Small Bus";"c/o Robert Schenot";"PO Box 117";"Portsmouth, NH 03802-0117";"SPECIAL";"Not Published";"800-638-8369";"Not Available";"Active"
"Attaway";"Edwin (Skip)";"Mill Dog BBS, The";"621 Big Horn Dr.";"O'Fallon MO 63366-6944";"";"USA";"314-272-7604";"314-240-7547";"314-240-7547";"Active"
"Atteberry";"Duane";"VISIONARY";"105 E Butler St";"Manchester IA 52057-1606";"";"USA";"Not Published";"319-927-4474";"319-927-5582";"Active"
"Atwood";"Mike & Sandy";"My Home BBS";"PO Box 16203";"Augusta GA 30919-2203";"";"USA";"706-733-7284";"706-733-1124";"Not Available";"Active"
"Baker";"Craig W.";"MultiSystem TBBS";"2524 Elmdale Drive";"Cincinnati OH 45230-1213";"";"USA";"Not Published";"513-231-7013";"513-231-7824";"Active"
"Balshone";"Joe";"Wizard's Gate BBS, The";"463 East Town Street";"Columbus, OH 43215-4796";"";"USA";"Not Published";"614-224-1635";"Not Available";"Active"
"Barcenas";"Daniel";"Mr. Wonderful's Lair";"670 S. Anderson Street";"Los Angeles CA 90023";"";"USA";"Not Published";"213-261-8055";"Not Available";"Active"
"Barnard";"Patrick";"Vision Quest";"1695 Sixth Street";"Muskegon MI 49441";"";"USA";"616-726-6236";"616-725-8566";"Not Available";"Active"
"Barnes";"Ernie";"Tranquility Base BBS";"PO Box 19483";"Oklahoma City OK";"73144-0483";"USA";"Not Published";"405-682-2352";"Not Available";"Active"
"Bartee";"Brian";"File Bank, Inc, The";"PO Box 9601";"Denver CO 80209-0601";"";"USA";"Not Published";"303-534-4646";"Not Available";"Active"
"Behan";"Craig";"V-Net Online Services";"21-710 Coronation Ave";"Ottowa ON K1G 4G7";"Canada";"CANADA";"Not Published";"613-723-1740";"Not Available";"Active"
"Bengel";"Tony";"Jackson Area PCUG";"1804 Chapin St.";"Jackson, MI 49203-1804";"";"USA";"Not Published";"517-789-7556";"Not Available";"Active"
"Bergman";"Jos";"MultiServer";"Schubertstraat 38";"8031 ZE Zwolle";"The Netherlands";"NETHERLANDS";"Not Published";"+31-38-541358";"+31-38-540882";"Active"
"Berzins";"Dave";"Nucleus Information Serv";"2047 - 34 Avenue SW";"Calgary AB T2T 2C4";"Canada";"CANADA";"403-249-9009";"403-531-9353";"403-249-5121";"Active"
"Bigelow";"Stephen J.";"TechNet BBS";"Dynamic Learning Systems";"PO Box 805";"Marlboro MA 01752";"USA";"508-366-9487";"508-366-7683";"508-898-9995";"Active"
"Biggs";"Dave";"Black Cauldron BBS, The";"704 Highgate Dr.";"Winter Springs, FL 32708";"";"USA";"Not Published";"407-699-6613";"Not Available";"Active"
"Bixby";"Greg";"Techno-Babble";"29550 Highmeadow";"Farmington Hills MI 48334";"";"USA";"810-737-9406";"810-737-2912";"Not Available";"Active"
"Blaccard";"Paul";"Substation BBS";"1717 Avenida Del Sol";"Boca Raton FL 33432";"";"USA";"407-477-9594";"407-477-5756";"407-477-5758";"Active"
"Blackman Jr.";"Webb B.";"Blue Ridge Express, The";"PO Box 34446";"Richmond VA 23234";"";"USA";"804-790-1007";"804-790-1675";"Not Available";"Active"
"Blake";"Timothy";"SFE Systems BBS";"PO Box 4655";"Huntsville AL 35815";"";"USA";"205-650-0901";"205-650-0107";"Not Available";"Active"
"Blankennagel";"Ben";"H.C.C. Dept. Almere";"Alban Bergstraat 35";"1323 GG Almere";"The Netherlands";"NETHERLANDS";"+31-36-5360783";"+31-36-5364352";"Not Available";"Active"
"Bodley";"Don";"PROF-BBS, The";"2050 Idle Hour Center";"Suite 106";"Lexington KY 40502";"USA";"Not Published";"606-269-1565";"606-622-1020";"Active"
"Bonser";"Earl";"At The GIFfer's";"12088 Anderson Rd.";"Suite 170";"Tampa FL 33625";"USA";"Not Published";"813-969-2761";"Not Available";"Active"
"Braad-Sorensen";"Ole";"OBSdata-BBS";"Nuevo Chilches 3 Nr. 5";"29760 Chilches-Malaga";"Spain";"SPAIN";"+34-(9)5-2513416";"+34-(9)5-2514228";"Not Available";"Active"
"Bradford";"Clint";"Attention to Details";"5085 Trail Canyon Dr";"Mira Loma CA 91752-1685";"";"USA";"909-681-6210";"909-681-6221";"909-681-6222";"Active"
"Brandt";"Ron";"SataLink Info Systems";"PO Box 449";"Huntingdon Vly PA 19006";"";"USA";"Not Published";"215-364-3324";"Not Available";"Active"
"Brann";"George";"Last Chance TBBS";"PO Box 2536";"Universal City TX 78148";"";"USA";"Not Published";"210-822-4050 (HST)";"Not Available";"Active"
"Breen";"Partick";"Atomic Dog BBS";"PO Box 523";"Medford MA 02155-0004";"";"USA";"617-396-2673";"617-279-3561";"Not Available";"Active"
"Brenner";"Bob";"R.B. Enterprises";"711 East 134th Street";"Brandenton FL 34202";"";"USA";"N/A";"813-748-5380";"Not Available";"Active"
"Briggs";"Tom";"Richmond Connection, The";"PO Box 70241";"Richmond VA 23255";"";"USA";"804-378-5031";"804-740-1364";"Not Available";"Active"
"Broekema";"Marcel";"HACOM BBS";"A.Blankaartsingle 113";"AMERSFOORT 3813 PA";"The Netherlands";"NETHERLANDS";"+31-2943-2888";"+31-33-801882";"+31-2943-2888";"Active"
"Brookes";"Colyn";"NCS Cape Town";"57 Bedford Street";"Parow 7500, Cape Town";"South Africa";"SOUTH AFRICA";"Not Published";"+21-930-2752";"Not Available";"Active"
"Brown";"Tim";"Stargate Online";"Rue de l'Agace 30A";"7020 Maisieres";"Belgium";"BELGIUM";"Not Published";"+32-(0)65-334-518";"+32-(0)65-842-640";"Active"
"Bruhn";"Max";"Golden*Dane BBS, The";"633 Franklin Avenue";"Suite 128";"Nutley NJ 07110";"USA";"Not Published";"201-338-5265";"Not Available";"Active"
"Brunning";"Tommy";"Rama One BBS";"PO Box 863514";"Ridgewood NY 11386-3514";"";"USA";"Not Published";"718-366-6165";"Not Available";"Active"
"Burke";"David";"**CCAT**";"11326 Dew Creek Circle";"Corpus Christi TX 78410";"";"USA";"Not Published";"512-242-2206";"512-888-8368";"Active"
"Burton";"John";"Sandbox, The";"PO Box 30902";"Midwest City OK 73140";"";"USA";"405-737-5887";"405-737-9540";"Not Available";"Active"
"Butland";"Bill";"Shack BBS, The";"43 Hillview Road";"Findon Valley, Worthing";"West Sussex BN14 0BX, UK";"UNITED KINGDOM";"Not Published";"+44-903-268668";"Not Available";"Active"
"Camara";"Jose";"Visus BBS";"Av. Marques de Tomar, 71A";"1000 LISBOA";"PORTUGAL";"PORTUGAL";"+351-1-7964297";"+351-1-7935839";"Not Available";"Active"
"Campbell";"Bill";"ComputerLink";"3747 Bloor St W";"Etobicoke Ont M9A 1A2";"Canada";"CANADA";"416-233-7150";"416-233-5410";"Not Available";"Active"
"Cannon";"Scotty";"Redwood 101";"9621-C N State St";"Redwood Valley CA 95470";"";"USA";"707-485-8792";"707-485-7843";"Not Available";"Active"
"Caplan";"Jay";"Consultant BBS, The";"PO Box 8571";"New York NY 10116-4655";"";"AHN";"Not Published";"718-837-3236";"Not Available";"Active"
"Cassarino";"Paul";"PC3 (PC Cubed)";"18 Preston Cr.";"Rochester NY 14626";"";"USA";"Not Published";"716-723-8489";"716-359-8932";"Active"
"Castellano";"Emilio";"Icaro BBS";"c/o Luis de Salazar 9 5C";"Madrid 28002";"Spain";"SPAIN";"Not Published";"+34-1-5194645";"Not Available";"Active"
"Chase";"Nate";"Hawg Wild! BBS, Inc.";"PO Box 540691";"Omaha NE 68154";"";"USA";"402-593-8527";"402-493-2737";"Not Available";"Active"
"Chin";"Anthony";"Artist On-Line Info Sys";"Blk 458, Ang Mo Kio";"#14-1584, Singapore 2056";"REPUBLIC OF SINGAPORE";"SINGAPORE";"Not Published";"+65-456-1100";"Not Available";"Active"
"Chow";"How-Sun";"T.I.F.S.D.B.";"636 Coral Reef Drive";"Gaithersburg MD 20878";"";"USA";"301-975-0192";"301-975-9794";"Not Available";"Active"
"Ciraolo";"Phil";"SecurNet";"37 Matilda St South";"Dundas, Ontario L9H 3C6";"Canada";"CANADA";"905-628-9310";"905-628-4518";"905-628-3402";"New"
"Cline";"John";"Black Gold BBS, The";"6927 E. 71 St.";"Tulsa OK 74133";"";"USA";"Not Published";"918-272-7779";"Not Available";"Active"
"Clouser";"James";"My BBS";"5407 Maple Lane";"Tampa FL 33610";"";"USA";"Not Published";"813-621-2115";"Not Available";"Active"
"Cmiel";"Rich";"Chip-N-Disk BBS";"PO Box 89";"Trevor WI 53179-0089";"";"USA";"414-862-2018";"414-862-6221";"Not Available";"Active"
"Cochran";"Jeff";"Margaritaville";"5240 Bank Street #17";"Fort Myers FL 33907";"";"USA";"813-939-5630";"813-939-3009";"Not Available";"Active"
"Cole";"Doug";"Psychobabble";"481 Cypress Lane J-179";"Greenville MS 38701";"";"USA";"Not Published";"601-332-9453";"Not Available";"Active"
"Collins";"Hugh M";"Trading Post BBS";"39 Oval Grange, Wooler Rd";"Hartlepool, TS26 8LT";"United Kingdom";"UNITED KINGDOM";"+44-1429-862889";"+44-1429-891453";"Not Available";"Active"
"Collins";"John A.";"TEXADA Graphic WINDOWS";"PO Box 1 - Van Anda";"Texada Island BC V0N 3K0";"Canada";"CANADA";"604-486-7519";"604-486-7229";"Not Available";"Active"
"Cook";"Chris";"Mind's Eye, The";"1540 19th Street SW";"Hickory, NC 28602";"";"USA";"Not Published";"704-322-1681";"Not Available";"Active"
"Crisan";"John G";"County Seat BBS";"105 N River Rd, #111";"Mt Clemens MI 48043-1927";"";"USA";"810-468-4442";"810-468-2625";"Not Available";"Active"
"Curtis";"Tom";"Big Byte, The";"609 Rogers St";"Rockwell NC 28138";"";"USA";"Not Published";"704-279-2295";"Not Available";"Active"
"Dansey";"Terry";"BixBox, The";"PO Box 75";"Chatham, Kent ME5 9DL";"ENGLAND";"UNITED KINGDOM";"Not Published";"+44-1634-20093";"+44-1634-687178";"Active"
"Dean";"Michael";"Impact! Online";"8855 SW Brabham Way";"Gaston OR 97119";"";"USA";"503-985-7009";"503-985-3408";"Not Available";"Active"
"Decker";"Randy";"Destination CPU";"PO Box 906";"Elmira NY 14902-0906";"";"USA";"Not Published";"607-737-6901";"Not Available";"Active"
"Deegan";"Peter";"My Computer Company BBS";"PO Box 99 (25 Albert St)";"Erskineville NSW 2043";"Australia";"AUSTRALIA";"+612-565-1991";"+612-565-1044";"+612-550-4459";"Active"
"DeZotell";"Ken";"Nite-Air BBS";"RD 2, Box 457,Bartlett Rd";"Rome NY 13440";"";"USA";"Not Published";"315-339-8831";"Not Available";"Active"
"DiBuono";"Barbara";"Direct Connect";"PO Box 6684";"Philadelphia PA 19149";"";"USA";"Not Published";"215-535-1917 (V32B)";"Not Available";"Active"
"Dorsey";"David W.";"DFG Financial BBS";"PO Drawer 4006";"606 North Eighth Street";"Opelika AL 36803-4006";"USA";"334-745-5544";"334-745-0579";"334-745-0779";"Active"
"Ducolon";"G.";"Trail's West BBS";"#305 4 Avenue Crescent";"Wainwright AB, T9W 1A1";"Canada";"CANADA";"403-842-6381";"403-842-6655";"403-842-6381";"Active"
"Dumont";"Pierre";"Solar";"825 Belvedere Sud #100";"Sherbrooke Quebec J1H 4B9";"Canada";"CANADA";"819-564-6673";"819-564-3198";"819-564-1426";"Active"
"Duncan";"Kev";"Northern Exposure";"43 Primrose Crescent";"Fullwell, Sunderland";"SR6 9RJ England";"UNITED KINGDOM";"Not Published";"+44-91-548-0892";"Not Available";"Active"
"Dunmyer";"Jim";"Toledo's TBBS";"4440 Samaria Dr.";"Temperance MI 48182";"";"USA";"Not Published";"313-854-6001";"Not Available";"Active"
"Duval";"Wayne";"Deep Cove BBS";"PO Box 45504";"Sunnyside Mall PO";"Surrey BC V4A 9N3 Canada";"CANADA";"Not Published";"604-536-5885";"Not Available";"Active"
"Elwell";"Rob";"BorderTown BBS";"332 East Main Street";"Westminster MD 21157";"";"USA";"410-876-8308";"410-876-5101";"Not Available";"Active"
"Eubank";"Randy";"Texstar BBS";"1111 S Main St, Ste A";"Duncanville TX 75137";"";"USA";"214-298-9596";"214-298-0273";"Not Available";"Active"
"Fergione";"Mike";"Hole In The Wall BBS";"6325 N Ponderosa Way";"Parker CO 80134-5615";"";"USA";"Not Published";"303-841-5515";"Not Available";"Active"
"Fidlow";"Barry";"Absolute Pleasure BBS";"PO Box 3235";"Skokie IL 60076";"";"USA";"708-677-3407";"708-677-3369";"Not Available";"Active"
"Field";"Wade";"Computer Data Services";"1224 Leopard Street";"Corpus Christi TX 78401";"";"USA";"512-883-5464";"512-887-0787";"Not Available";"Active"
"Filandro";"Alan";"Cygnus X-I Opus BBS, The";"12 Homesdale Ave.";"Southington, CT 06489";"";"USA";"Not Published";"203-628-9702";"Not Available";"Active"
"Ford";"S.";"Hunter's Info Service";"PO Box 9887";"Baltimore MD 21284";"";"USA";"410-668-8377";"410-668-3793";"Not Available";"Active"
"Forgacs";"Peter J.";"PJ Systems";"7290 Britton Hwy";"Britton MI 49229";"";"USA";"Not Published";"517-451-2072";"Not Available";"Active"
"Fox";"Steven";"Albuquerque ROS, The";"PO Box 13150";"Albuquerque NM 87192-3150";"";"USA";"505-299-7447";"505-296-3000";"Not Available";"Active"
"Foy";"Tyronne A.";"Intercity BBS";"4615 Patterson Ave";"Richmond VA 23226-1341";"";"USA";"804-358-5644";"804-353-4160";"Not Available";"Active"
"Frank";"Doug";"Dew Drop Inn, The";"3567 Mtn View Dr #222";"West Mifflin PA 15122";"";"USA";"Not Published";"412-854-0619";"Not Available";"Active"
"French";"Phil";"French Connexion, The";"3017 St Clair Avenue #264";"Burlington Ontario";"Canada L7N 3P5";"CANADA";"Not Published";"416-632-5653";"Not Available";"Active"
"Friend";"Mark";"Stimpy's Sandbox";"613 Herman Avenue";"Lemoyne PA 17043";"";"USA";"Not Published";"717-730-8504";"Not Available";"Active"
"Gage";"David";"SSB BBS";"PO Box 2153";"Pampa TX 79066-2153";"";"USA";"806-669-2508";"806-669-6936";"Not Available";"Active"
"Gagliano";"Robert";"Hi-Desert Hangout";"3053 Rancho Vista Blvd";"Suite H-125";"Palmdale CA 93551";"USA";"Not Published";"805-722-5758";"Not Available";"Active"
"Gamber";"Paul";"Wesley's Widow BBS";"220 Orange Church Rd.";"Canton GA 30115";"";"USA";"Not Published";"404-522-9240";"Not Available";"Active"
"Garber";"Frank";"8-Bit Corner, The";"1297 Lakeshore Drive";"Muskegon MI 49441-1614";"";"USA";"Not Published";"616-755-3013";"Not Available";"Active"
"Gay";"Carolyn";"Darton Connection, The";"2400 Gillionville Road";"Albany GA 31707";"";"USA";"912-430-6802";"912-430-3007";"Not Available";"Active"
"George";"David";"Eagle's Nest Retreat";"636-1/2 Tayco St";"Menasha WI 54952";"";"USA";"414-720-0046";"414-729-1157";"Not Available";"Active"
"Ghassemieh";"Kourosh";"MindWare Online";"PO Box 13934";"Berkeley CA 94712";"";"USA";"510-540-5518";"510-843-8071";"Not Available";"Active"
"Gillis";"Gregg";"G-Net BBS, The";"610 Elm Street";"Struthers OH 44471";"";"USA";"Not Published";"216-755-0843";"Not Available";"Active"
"Gose";"Stephen";"MegaComm(sm) BBS";"336 Lafayette Drive";"Culpeper VA 22701-3963";"";"USA";"Not Published";"540-829-2441";"Not Available";"Active"
"Gothie";"J.N.";"AAA Legal BBS";"303 S Ridge Rd. Apt 1";"Boiling Springs PA 17007";"";"USA";"Not Published";"717-258-8094";"Not Available";"Active"
"Grande";"Stephen F.";"Liberty BBS, The";"Suite 102";"446 S. Anaheim Hills Rd.";"Aneheim Hills CA 92807";"USA";"714-996-9999 x630";"800-474-1818";"Not Available";"Active"
"Green";"Jackie";"The Bee Line";"26 Elizabeth St";"Orangeville ONT";"L9W 1C1 Canada";"CANADA";"519-941-9517";"519-940-4990";"Not Available";"Active"
"Green";"Jim";"Trader's Connection";"PO Box 11499";"Indpls IN 46201-0499";"";"USA";"Not Published";"317-359-5199 (IN)";"317-322-2010";"Active"
"Groeller";"Gary";"mAp/LZ";"6049 Dwight";"Dearborn Hgts MI 48127";"";"USA";"313-563-7996";"313-563-8940";"313-563-8940";"Active"
"Groome";"David S.";"MicroMetric Support BBS";"98 Dade Avenue";"Sarasota FL 34232-1609";"";"USA";"813-377-2515";"813-371-2490";"Not Available";"Active"
"Grote";"Patrick";"Support U.";"11221 Manchester Rd";"Suite 313";"St Louis MO 63122";"USA";"Not Published";"314-984-8387";"314-984-9981";"Active"
"Habegger";"Don";"Ya! WebeCad! BBS";"PO Box 23071";"Evansville IN 47724";"";"USA";"Not Published";"812-428-0267";"812-426-4945";"Active"
"Hamilton";"Gene & Katie";"HouseNet";"PO Box 520";"St Michaels MD 21663";"";"USA";"Not Published";"410-745-2037";"Not Available";"Active"
"Hansen";"Richard";"BBS WorkShop";"Sopark Alle 86";"DK4171 Glumso";"Denmark";"DENMARK";"+45-576-50010";"+45-576-45050";"+45-576-55050";"Active"
"Hardy";"Paul";"JIX BBS";"JIX Corporation";"2-7-12 Higashi-Tenma";"Kita-ku, Osaka 530 JAPAN";"JAPAN";"Not Published";"+06-351-6074";"Not Available";"Active"
"Hatch";"John";"Shareware Express BBS";"1908 Ashland Street #D";"Ashland OR 97520";"";"USA";"503-482-5136";"513-488-0321";"503-482-4230";"Active"
"Havlock";"Joey";"Real Exposure";"121 W. 27th Street";"Suite 703A";"New York NY 10001";"USA";"212-691-2616";"212-691-2679";"Not Available";"Active"
"Hawkins";"Owen";"Space BBS";"PO Box X";"Menlo Park CA 94026";"";"AHN";"Not Published";"415-323-4193";"Not Available";"Active"
"Hayden";"Brandon";"Hollywood News/Info Sys";"PO Box 366";"Hollywood MD 20636";"";"USA";"Not Published";"301-373-2150";"Not Available";"Active"
"Heder";"Tess";"Channel 1 Communications";"PO Box 338";"Cambridge MA 02238";"";"USA";"617-864-0100";"617-354-3230";"617-354-3100";"Active"
"Heigold";"Karl";"Trade Link";"3120 Country Pines Way";"Westbank BC V4T 1C2";"Canada";"CANADA";"604-768-1239";"604-768-0988";"Not Available";"Active"
"Hemphill";"Rick";"HUG & Lincoln Software";"1136 Sunnyside Drive";"Hagerstown MD 21742-3044";"";"USA";"301-733-7449";"301-733-6456";"Not Available";"Active"
"Henke";"Norm";"PC-Ohio";"23749 Cedar Rd";"Cleveland OH 44122-1069";"";"USA";"Not Published";"216-381-3320";"216-291-2685";"Active"
"Hill";"Fred C.";"Graphics Edge, The";"5048 W. Maplewood Ave.";"Littleton, CO 80123-6279";"";"USA";"303-795-7653";"303-795-9583";"Not Available";"Active"
"Hochner";"Patrick";"P&A BBS";"302 Bellwins 1367-23";"Nakagami Akishima";"Tokyo 196 JAPAN";"JAPAN";"+81-425-46-9141";"+81-425-46-9143";"+81-425-46-9142";"Active"
"Hogard";"Chuck";"Hogard Software Solutions";"4533 Marblearch Drive";"Grand Prairie TX 75052";"";"USA";"Not Published";"214-641-6292";"Not Available";"Active"
"Holmes";"Robert";"Racers Net, The";"PO Box 251";"Tahoe Vista CA 96148-0251";"";"USA";"916-546-3923";"916-546-2095";"Not Available";"Active"
"Horrighs Jr";"Steve";"Fantasy Land";"PO Box 320";"211 East Harpole";"Williamsville IL 62693";"USA";"217-566-3723";"217-566-3775";"Not Available";"Active"
"Howard";"Jim";"Cornucopia TBBS";"1530 Cavendish Road";"Winter Park FL 32789";"";"USA";"Not Published";"407-645-4929";"Not Available";"Active"
"Hubinsky";"Peter";"SAC BBS";"ESET s.r.o., Ondavska 3";"826 47 Bratislava";"Slovakia";"SLOVAKIA";"+42-7-5438228";"+42-7-5438232";"+42-7-5438230";"Active"
"Hult";"Leonard";"Collector's Edition";"3733 Rockdale Dr";"Dallas TX 75220";"";"USA";"Not Published";"214-351-9859";"Not Available";"Active"
"Ibrahim";"Kairy";"Nocturnal Forest";"7850 Riley St #1307";"Overland Park KS 66204";"";"USA";"913-648-1194";"913-648-1198";"Not Available";"Active"
"Ingle";"Terry";"Piedmont Rocket BBS";"1436 Dry Pond Road";"Granite Falls NC 28630";"";"USA";"Not Published";"704-396-1847";"Not Available";"Active"
"Jackson";"Bruce";"Break RBBS <East>, The";"4660 Whitaker Pl";"Dale City VA 22193-3011";"";"AHN";"Not Published";"703-680-9269";"Not Available";"Active"
"Jacobs";"Tim";"Virginia Data Exchange";"11 Evelyn Dr.";"Newport News VA 23602";"";"USA";"804-877-3384";"804-877-3562";"Not Available";"Active"
"Jain";"Nitish";"Way Out Wild!";"24 VijayVilla Rd.";"79 Worli Seaface, Bombay";"Maharashtra India 400025";"INDIA";"+91-22-4947157";"+91-22-4961609";"Not Available";"Active"
"Janes";"Gerald";"Hawk's Castle";"PO Box 26";"Bracknell, Berks RG12 7WA";"UNITED KINGDOM";"UNITED KINGDOM";"Not Published";"+44-344-411621";"+44-784-460007";"Active"
"Jeffers";"Edward";"Board, The";"2828 Cochran St #271";"Simi Valley CA 93065";"";"USA";"Not Published";"805-579-9082";"Not Available";"Active"
"Jensen";"Thomas";"Night Dream BBS";"Naestvedvej 24";"DK-4760 Vordingborg";"Denmark";"DENMARK";"Not Published";"+45-55340404";"Not Available";"Active"
"Johnston";"Rick";"Alpha City BBS";"59 Gatineau Street";"Oshawa Ontario";"Canada L1H 7G2";"CANADA";"Not Published";"905-579-6302 (V32B)";"Not Available";"Active"
"Jonasson";"Terry";"Info-Source Canada";"620 Herbert Ave.";"Winnipeg, Manitoba";"CANADA R2L 2G2";"CANADA";"Not Published";"204-667-0899";"Not Available";"Active"
"Jones";"Kendal J.";"Omega Line, The";"ALPHA Technologies";"416 W. St John";"Olney IL 62450";"USA";"Not Published";"618-392-4607";"Not Available";"Active"
"Karroo";"Rachid";"Edoma BBS";"Jerningham Street";"Curepipe Rd";"Mauritius Island";"MAURITIUS ISLAND";"+230-676-1598";"+230-674-8260";"+230-674-6268";"Active"
"Keigher";"Jim";"Superior Shareware";"PO Box 26005";"Thunder Bay ON";"Canada P7E 2M0";"CANADA";"807-473-5368";"807-475-3099";"Not Available";"Active"
"Kelly";"Steve";"Magpie BBS";"310 East Main St";"Crothersville IN 47229";"";"USA";"812-793-3838";"812-793-2237";"Not Available";"Active"
"Kennon";"Bill";"Classified Connection";"9528 Miramar Rd Ste 277";"San Diego CA 92126";"";"USA";"Not Published";"619-566-7347 (2400)";"Not Available";"Active"
"Kern";"Bill";"Registry BBS, The";"3131 Mountain Creek Rd";"Apt 7A7";"Chattanooga TN 37415";"USA";"423-875-3907";"423-870-0794";"Not Available";"Active"
"Kiesz";"Barry";"Midwest Data Exchange";"119 So. Main";"Aberdeen SD 57401";"";"USA";"605-226-2133";"605-226-2428";"Not Available";"Active"
"Kilgore";"Lawrence O.";"GeoFract BBS";"726 Hofer Avenue";"Fort Wayne IN 46808-3174";"";"USA";"219-483-3947";"219-484-9740";"Not Available";"Active"
"Kirkman";"John";"WorldLink BBS Ltd.";"1 Seogebrook Close";"Oakwood, Derby DE21 2DX";"United Kingdom";"UNITED KINGDOM";"+44-332-834574";"+44-332-830362";"+44-332-834574";"Active"
"Knapp";"Frank";"DreamLine II BBS";"10 Pleasant Road";"Norristown PA 19401";"";"USA";"Not Published";"610-279-2760";"Not Available";"Active"
"Koh";"Samuel";"Link BBS, The";"2975 Wilshire Blvd. #600";"Los Angeles CA 90010";"";"USA";"Not Published";"310-459-1264";"Not Available";"Active"
"Kramer";"Brian";"NJ Computer Connection";"PO Box 6909";"Lawrenceville NJ 08648";"";"USA";"609-896-9308";"609-895-0398";"Not Available";"Active"
"Kuhwarth";"Don";"24th Street Exchange";"1507 21st Street Ste 107";"Sacramento CA 95814";"";"USA";"Not Published";"916-448-2483";"Not Available";"Active"
"Larimore";"Jon";"GLIB";"PO Box 636";"Arlington VA 22216-0636";"";"USA";"Not Published";"703-578-4542";"703-820-1636";"Active"
"Larsen";"Terri";"Sunset Ridge BBS";"9320 S. 54th Court";"Oak Lawn IL 60453";"";"USA";"Not Published";"708-636-0971";"Not Available";"Active"
"Larson";"Tim";"Top City BBS";"78 East 10th St #3401";"St Paul MN 55101";"";"USA";"Not Published";"612-225-1003 (2400)";"Not Available";"Active"
"Laszko";"Bob";"File Bank, The";"PO Box 2828";"Fallbrook CA 92088";"";"USA";"Not Published";"619-728-7307";"619-728-0264";"Active"
"Laurent";"Dominique";"Serveur Cal";"92, cours Vitton";"69006 Lyon";"France";"FRANCE";"Not Published";"+33-72-83-1010";"Not Available";"Active"
"Lawton";"Bob";"Evergreen BBS";"104 Evergreen Ave";"Hopatcong NJ 07843";"";"USA";"Not Published";"201-398-2373";"Not Available";"Active"
"Lehner";"Tom";"Point BBS, The";"122 Cedar Street";"Stevens Point, WI 54481";"";"USA";"Not Published";"715-345-1327";"Not Available";"Active"
"Leon";"Stephen M.";"Cliffside Park BBS";"300 Winston Drive - 1202";"Cliffside Park NJ 07010";"";"USA";"201-886-1658";"201-886-1658";"Not Available";"Active"
"Lesher";"Larry";"Tech Resource, The";"3495 Hayes Lane";"Beaumont TX 77703-2755";"";"USA";"Not Published";"409-892-1977";"Not Available";"Active"
"Lewis";"Larry";"Prophet BBS";"PO Box E41";"Emerton NSW 2770";"Australia";"AUSTRALIA";"+61-2-835-1170";"+61-2-835-1388";"+61-2-835-1168";"Active"
"Liew";"Thim";"PC Shop";"37 Jalan Sri Petaling 1";"57000 Kuala Lumpur";"Malaysia";"MALAYSIA";"+60-3-957-7701";"+60-3-957-4373";"+60-3-957-7717";"Active"
"Mackai";"Don";"Miami PC Users Group";"10448 SW 49th Place";"Cooper City FL 33328";"";"USA";"Not Published";"305-680-9481";"Not Available";"Active"
"Mahnke";"Bill";"VisionBytes!";"210 Summerford Circle";"San Ramon CA 94583-4400";"";"USA";"Not Published";"510-355-0968";"Not Available";"Active"
"Mahoney";"Bob";"Exec-PC";"PO Box 57";"Elm Grove WI 53122";"";"USA";"Not Published";"414-789-4210";"Not Available";"Active"
"Malzahn";"Hartmut W.";"Hamster BBS";"Zimmerstrasse 9";"58638 Iserlohn";"Germany";"GERMANY";"Not Published";"+49-2371-14490";"Not Available";"Active"
"Mann";"Steve";"Mainstreet Online";"502 Fontanelle Ct";"San Jose CA 95111-1712";"";"USA";"408-224-4357";"408-224-7523";"Not Available";"Active"
"Manngard";"Scott D.";"L.I.N.E.";"PO Box 19";"Greenlawn, NY 11740";"";"USA";"Not Published";"516-261-9701";"Not Available";"Active"
"Mardlin";"Adrian";"Shareware Support BBS";"82 Akeman Street";"Tring Herts HP23 6AF";"UK";"UNITED KINGDOM";"Not Published";"+44 494-431861";"Not Available";"Active"
"Marin";"Margarita";"Clavius";"C/Francos Rodriguez 42,2o";"28039 Madrid";"Spain";"SPAIN";"+34-1-3112372";"+34-1-3112371";"Not Available";"Active"
"Marquis";"Ed";"Transporter Room, The";"1018 Glenfiddich Dr";"Charlotte NC 28215";"";"USA";"704-567-9614";"704-567-9513";"Not Available";"Active"
"Martin";"Bill R.";"Prime Time BBS";"PO Box 6997";"Burbank CA 91510";"";"USA";"818-982-4152";"818-982-7271 (2400)";"818-765-5472";"Active"
"Martin";"Chris";"MARS Station, The";"PO Box 878";"Yermo CA 92398";"";"USA";"Not Published";"619-254-3012";"Not Available";"Active"
"Martinez";"Francisco";"Europa BBS";"Nicolasa Gomez, 80 B";"28022 Madrid";"Spain";"SPAIN";"Not Published";"+34-1-320-8460";"Not Available";"Active"
"Matyaszek";"George";"Chicago Syslink";"1643 Gunderson Ave.";"Berwyn, IL 60402";"";"USA";"Not Published";"708-795-4442";"Not Available";"Active"
"Mayer";"Dave";"SouthWest BBS";"PO Box 70062";"Pasadena CA 91117-7062";"";"USA";"Not Published";"818-285-8684";"Not Available";"Active"
"Mayer";"Paul";"MSN Shareware Forum";"2526 69th Ave So";"St Petersburg FL";"33712-5631";"SPECIAL";"813-866-8233";"Local MSN Access Nos.";"Not Available";"Active"
"Mayner";"Michael D";"HighLander BBS, The";"PO Box 2152";"Stow OH 44224";"";"USA";"216-678-7300";"216-678-2277";"216-678-7300";"Active"
"McClenny";"Tony";"World Data Network";"11088 Thrush Ridge Road";"Reston VA 22091-4722";"";"USA";"703-648-0808";"703-620-8900";"Not Available";"Active"
"McPheeters";"Scott";"Mail Room BBS, The";"3007 George Street";"Anderson IN 46016-5448";"";"USA";"317-644-5169";"317-644-5029";"317-640-2495";"Active"
"Medrud";"Mark J.";"Electro-Technika";"PO Box 8210";"Colorado Springs CO";"80933-8210";"USA";"Not Published";"719-380-0541";"Not Available";"Active"
"Menezes Filho";"Jose De";"Full Connection BBS";"Caixa Postal 108";"Santo Andre - SP";"09001-970 BRAZIL";"BRAZIL";"+55-11-444-1167";"+55-11-440-7204";"Not Available";"Active"
"Miller";"Greg & Pam";"Small Circle BBS, The";"PO Box 287";"Sunset LA 70584";"";"USA";"Not Published";"318-662-3328";"318-662-3328";"Active"
"Milon";"Jacques";"Ace-Station-BBS";"9401 Orion Avenue";"North Hills CA 91343";"";"USA";"Not Published";"818-891-0397";"Not Available";"Active"
"Miranda";"Charles";"Hot-Line BBS";"PO Box 9050";"Rio de Janeiro, RJ";"Brazil 22272-970";"BRAZIL";"+55-21-537-3162";"+55-21-537-1603";"Not Available";"Active"
"Moriarty";"Jeff";"Rock Garden, The";"2229 E McDowell Rd Ste 3";"Phoenix AZ 85006";"";"USA";"602-267-9434";"602-220-0001";"Not Available";"Active"
"Morris";"James";"Computer Matrix, The";"PO Box 3150";"Springfield MO 65808";"";"USA";"Not Published";"417-862-8910";"Not Available";"Active"
"Morton";"Jim";"Windchimes BBS";"PO Box 2100";"Jupiter FL 33468";"";"USA";"Not Published";"407-881-9025";"Not Available";"Active"
"Moss";"Reuben A";"Comp Parts & Sftwre Exch";"202 W Westwood Drive";"Kalamazoo MI 49006-4344";"";"USA";"616-383-6257";"616-383-9436";"616-383-6257";"Active"
"Moyles";"Harry";"Evans BBS, The";"302 East Coffren Ave.";"Greenville MI 48838";"";"USA";"Not Published";"616-754-6180";"Not Available";"Active"
"Myers";"Tyler";"Radio Wave BBS, The";"PO Box 1026";"Delran NJ 08075";"";"USA";"609-461-0634";"609-764-0812";"Not Available";"Active"
"Nelson";"Herb";"Starlight";"PO Box 15752";"Seattle WA 98115";"";"USA";"Not Published";"206-782-3221";"Not Available";"Active"
"Nielson";"Dart L.";"Dart Board RBBS, The";"17921 Co Rd 25";"Dolores CO 81323";"";"USA";"303-882-4662";"303-882-2360";"Not Available";"Active"
"Nishimura";"Tim";"TIM EO / TIMBBS";"275 Dorin Court Road";"Fort Lee NJ 07024";"";"USA";"201-224-2114";"201-224-2688";"Not Available";"Active"
"Nutter";"Ron";"Bluegrass RBBS";"686 Sheridan Drive";"Lexington KY 40503-1726";"";"USA";"606-276-0887";"606-272-0499";"Not Available";"Active"
"Oaks";"Tom";"Jacob's House BBS";"1101 S Stadium";"Alice TX 78332";"";"USA";"512-664-6773";"512-664-7570";"512-279-3515";"Active"
"Oestergaard";"Johnny";"Danish Key Board BBS";"Vesterbrogade 171";"DK-1800 Frederiksberg C";"Denmark";"DENMARK";"+45-332-55500";"+45-332-55600";"+45-332-55501";"Active"
"Parker";"Ross";"SkyWatch";"2667 Rothwell St";"Regina SC S4N 2E2";"Canada";"CANADA";"Not Published";"306-569-0581";"Not Available";"Active"
"Parr";"Chris";"UT Dallas Undergraduate";"Univ of Texas At Dallas";"PO Box 830688 M/S J03.2";"Richardson TX 75083-0688";"USA";"Not Published";"214-690-2168";"Not Available";"Active"
"Parsons";"Ted";"Jupiter BBS";"PO Box 69";"Jupiter FL 33468-0069";"";"USA";"407-575-0667";"407-575-3853";"Not Available";"Active"
"Patterson";"David";"Nordic Enterpirses EDMS";"PO Box 509";"Ipswich MA 01938";"";"USA";"508-356-7893";"508-356-1166";"508-356-7341";"Active"
"Peace";"George";"Pennsylvania Online!";"PO Box 6501";"Harrisburg PA 17112";"";"USA";"Not Published";"717-657-8699";"Not Available";"Active"
"Pendergrass";"Dave";"A Community BBS";"PO Box 276";"Monrovia CA 91017";"";"USA";"818-289-4148";"818-358-3811";"818-357-1299";"Active"
"Poplock";"Hewie";"FABulous BBS, The";"525 S. County Road 427";"Suite 125";"Longwood, FL 32750";"USA";"Not Published";"407-834-6466";"Not Available";"Active"
"Rabergeau";"Philippe";"Gateway Software BBS";"1230 Market Street";"Suite 420";"San Francisco CA 94102";"USA";"415-885-0593";"415-885-1392";"415-885-1396";"Active"
"Rasure";"Lois";"Bare Bony Facts BBS, The";"Route 1, Box 141";"Dike TX 75437";"";"USA";"Not Published";"903-945-2062";"903-885-4228";"Active"
"Ray";"Gary";"Tiger Team Buddhist I.N.";"1920 Francisco, #112";"Berkeley CA 94709";"";"USA";"510-540-6565";"510-268-0102";"Not Available";"Active"
"Roberts";"Neal";"Squirrel's Nest";"1250 E. Bluff St.";"Marseilles IL 61341";"";"USA";"815-795-4894";"815-795-6371";"Not Available";"Active"
"Robinson";"Chris";"Our Town Online";"240 Clipper Way";"Seal Beach CA 90740";"";"USA";"Not Published";"310-799-8553";"Not Available";"Active"
"Rosinski";"Rick";"Wolverine BBS";"PO Box 646";"Midland MI 48640";"";"USA";"Not Published";"517-695-9952";"Not Available";"Active"
"Rottner";"Phil";"Central Europe BBS";"Hansastr. 25";"D-90766 FURTH";"Germany";"GERMANY";"Not Published";"+49-911-97344-44";"Not Available";"Active"
"Rucci";"Peter L.";"Del Ches Systems BBS";"11 Andover Dr.";"Exton PA 19341";"";"USA";"Not Published";"215-363-6625";"Not Available";"Active"
"Rune";"Terry";"Colorado Connection, The";"6700 Van Gordon Street";"Arvada CO 80001";"";"USA";"Not Published";"303-423-9775";"Not Available";"Active"
"Scantlen";"Michael E.";"SHARPENIT! RBBS";"65 Valentine Street";"Agawam, MA 01001";"";"USA";"Not Published";"413-786-4706";"Not Available";"Active"
"Schubert";"Dave";"Casino Bulletin Board";"PO Box 451";"Pomona NJ 08240-0451";"";"USA";"Not Published";"609-485-2380";"Not Available";"Active"
"Schulz";"Michael J.";"NAFI On-Line";"PO Box 957257";"2155 Stonington Ave #118";"Hoffman Estates IL 60195";"USA";"847-427-6320";"847-885-9305";"Not Available";"Active"
"Scott";"David A.";"Why Not RBBS-PC";"PO Box 20643";"Long Beach CA 90813-0643";"";"USA";"Not Published";"310-436-9008";"Not Available";"Active"
"Scott";"Don";"V-I-S-I-O-N";"PO Box 290";"W Friendship MD 21794";"";"USA";"Not Published";"410-750-3800";"410-461-8108";"Active"
"Sedlak";"Emery H.";"MetroPitt BBS";"PO Box 183";"Glenshaw PA 15116";"";"USA";"Not Published";"412-487-9223";"Not Available";"Active"
"Seiden";"Mark";"Boss BBS, The";"206 County Road";"Tenafly NJ 07670";"";"USA";"201-568-2533";"201-568-7293";"Not Available";"Active"
"Sener";"Frank";"Charleston Communications";"PO Box 85178";"Las Vegas NV 89185-0178";"";"USA";"Not Published";"702-386-7979";"Not Available";"Active"
"Shackley";"Chad";"GaiaNet BBS";"2700 Benedict Canyon Dr";"Beverly Hills CA 90210";"";"USA";"Not Published";"310-724-8965";"310-271-5368";"Active"
"Sheppard";"Joseph";"Ledge PCBoard, The";"6858 Acco Street";"Los Angeles CA 90040";"";"USA";"Not Published";"818-896-2007";"213-888-1799";"Active"
"Short";"Jason";"DataLynx BBS";"Capri Electronics Corp.";"PO Box 589";"Bayfield CO 81122-0589";"USA";"970-884-8006";"970-884-6001";"Not Available";"Active"
"Sill";"Sam";"Out-Post RBBS, The";"1335 E Andrews Ave, Ste B";"Ozark AL 36360";"";"USA";"334-774-3015";"334-774-6989";"334-774-6989";"Active"
"Silva";"Luis";"MSmac BBS(R)";"Rua Princesa Benedita";"n-4 1-drt, 2560 -";"Torres Vedras, Portugal";"PORTUGAL";"+351-61-313834";"+351-61-314336";"Not Available";"Active"
"Silverglate";"Art";"CBUG BBS";"PO Box 125";"Columbia MD 21045";"";"USA";"Not Published";"410-750-2435";"Not Available";"Active"
"Simmons";"Larry";"Realms of Legend, The";"PO Box 496";"Ft Dick CA 95538";"";"USA";"Not Published";"707-464-8722";"Not Available";"Active"
"Sinan";"Jamil";"Darin";"PO Box 202";"Qatif 31911";"Saudi Arabia";"SAUDI ARABIA";"+966-3-855-6200";"+966-3-855-2131";"+966-3-855-2917";"Active"
"Smereczniak";"Mark A.R.";"MARS Media Inc";"37 Pidgeon Hill Dr #180";"Sterling VA 20165-6102";"";"USA";"703-742-6720";"703-742-9296";"703-742-6720";"Active"
"Smith";"Grayham";"Electronic Oracle, The";"12 Brentwood Road";"Flinders Park";"South Australia 5025";"AUSTRALIA";"Not Published";"+61-8-234-0791";"Not Available";"Active"
"Smith";"Greg";"National Cheese Emporium";"1105 Creswood Road";"Philadelphia PA";"19115-3003";"USA";"Not Published";"215-673-0261";"Not Available";"Active"
"Snedeker";"Robert F.";"Dr Sned's RBBS-In-A-Box";"RR 1 Box 232";"San Mateo FL 32187-9801";"";"USA";"Not Published";"904-325-6558";"Not Available";"Active"
"Snow";"Raymond";"Rocky Mountain Software";"PO Box 18279";"Salt Lake City UT";"84418-0279";"USA";"Not Published";"801-967-8721";"Not Available";"Active"
"Spice";"Mick";"ChatterBox";"114 Kingfisher Road";"Larkfield, Kent ME20 6QG";"United Kingdom";"UNITED KINGDOM";"Not Published";"+44-1732-845338";"Not Available";"Active"
"St. John";"Dwayne";"Crystal Mountain BBS";"172 Cottage St. Suite 1";"Athol MA 01331";"";"USA";"Not Published";"508-249-2156";"Not Available";"Active"
"Stafford";"Lee";"Windmill Company BBS, The";"PO Box 1529";"Lubbock TX 79408";"";"USA";"806-792-4598";"806-792-6116";"806-792-7847";"Active"
"Steinhilpert";"Gregg";"Surf's Up BBS/Disc Net";"114 Annapolis Street";"Annapolis MD 21401";"";"USA";"410-280-8964";"410-269-0304";"Not Available";"Active"
"Stevenson";"Clint";"BBS Express";"PO Box 4505";"Santa Rosa CA 95402";"";"USA";"Not Published";"707-571-7526";"Not Available";"Active"
"Stevenson";"Craig S.";"Bertha BBS, The";"PO Box 297";"Bertha MN 56437";"";"USA";"Not Published";"218-924-2060";"Not Available";"Active"
"Stevenson";"Larry";"Grinder, The";"PO Box 1114";"Simi Valley, CA 93062";"";"USA";"Not Published";"805-583-5833";"Not Available";"Active"
"Storm";"Dale";"Linker BBS, The";"306 Oil Hill Road";"El Dorado, KS 67042";"";"USA";"Not Published";"316-321-5410";"Not Available";"Active"
"Strom";"Charles H.";"GEnie IBM Round Table";"c/o GEnie - GEIS";"401 Washington Street";"Rockville MD 20150";"SPECIAL";"Not Published";"Call 800-638-9636 Voice";"Not Available";"Active"
"Stroud";"Michael M.";"Micro Message Service";"1464 Garner Station Blvd";"Suite 100";"Raleigh NC 27603";"USA";"919-662-7317";"919-779-6674";"Not Available";"Active"
"Stulbach";"Aliza";"AlizaNet";"Centauri Ltd";"P.o.b. 273 Bat-Yam";"Israel";"ISRAEL";"+972-3-5073812";"+972-3-5081312";"+972-3-5082413";"New"
"Sun";"Randolph";"Sigma Industries BBS";"800 S. Main St.";"Lakeport CA 95453";"";"USA";"707-263-5345";"707-263-8581";"Not Available";"Active"
"Sussell";"Michael";"Invention Factory, The";"321 Greenwich St";"New York NY 10013-3340";"";"USA";"Not Published";"212-274-8110";"212-431-1244";"Active"
"Sykes";"Gary";"Computer Users Exchange";"1710 SW 33 St";"Topeka KS 66611-2504";"";"USA";"Not Published";"913-267-1903";"Not Available";"Active"
"Taddeo";"Jack";"RadioComm";"PO Box 633";"Park Ridge IL 60068";"";"USA";"Not Published";"708-518-8336";"Not Available";"Active"
"Tantillo";"Alfred A.";"Wild Onion!, The";"107 E Vallette #1303";"Elmhurst IL 60126";"";"USA";"Not Published";"708-993-0461";"708-993-0477";"Active"
"Tarpy";"Peter E.";"Prime Cut BBS";"13 Kirkbrae Drive";"Lincoln RI 02865-1007";"";"USA";"Not Published";"401-334-3096";"Not Available";"Active"
"Taylor";"Lee";"Resting Place BBS, The";"PO Box 323";"Sandwich IL 60548-0323";"";"USA";"Not Published";"815-786-6240";"Not Available";"Active"
"Tcimpidis";"Tom";"Mog-Ur'S EMS, The";"11846 Balboa Blvd, #293";"Granada Hills CA 91344";"";"USA";"818-366-4837";"818-366-6442";"Not Available";"Active"
"Thompson";"Raeann";"Thompson Towers BBS";"4447 Ben Hill Rd.";"Lithia Springs GA";"30057-1130";"USA";"404-941-3775";"404-941-0746";"Not Available";"Active"
"Tigner";"David R.";"Privy Ledged BBS, The";"5572 West Joaquin St";"Kearns UT 84118-7212";"";"USA";"801-964-5830";"801-966-6270";"Not Available";"Active"
"Tikkala";"Rick";"Menagerie BBS, The";"209 W Pearl Street";"Willard OH 44890";"";"USA";"419-933-6016";"419-935-0245";"Not Available";"Active"
"Verrezen";"Freddy";"Info-Center BBS";"De Hassels 2";"B-2400 MOL";"Belgium";"BELGIUM";"Not Published";"+32-14-311455";"+32-14-311455";"Active"
"Vidler";"Jon";"Late Nite Diversions";"#2-1200 London Road, #241";"Sarnia ON N7S 1P4";"Canada";"CANADA";"Not Published";"519-332-0241";"Not Available";"Active"
"Viener";"Adam & Sara";"Cyberia";"Box 172";"2536 Eastern Blvd";"York PA 17402";"USA";"717-840-0139";"717-840-1444";"Not Available";"Active"
"Viera";"John";"Archives BBS";"100 Nestles Lane";"Acushnet MA 02743";"";"USA";"Not Published";"508-995-0085";"Not Available";"Active"
"Volkman";"Victor R.";"HAL 9000 BBS";"5145 Pontiac Trail";"Ann Arbor MI 48105-9627";"";"USA";"Not Published";"313-663-4173";"313-663-6869";"Active"
"Wachenschwanz";"David E.";"Atomic Cafe BBS, The";"PO Box 720894";"Houston TX 77072";"";"USA";"Not Published";"713-530-8875";"Not Available";"Active"
"Waid";"Andy";"Aquarius BBS";"1206 Lackey St";"Paducah KY 42003-3472";"";"USA";"502-443-7757";"502-443-4707";"Not Available";"Active"
"Walford";"Dan";"FireBox Express, The";"2120 Keystone";"Sterling Heights MI 48310";"";"USA";"Not Published";"810-826-9411";"Not Available";"Active"
"Walton";"Jim";"Sounds of Silence, The";"100 North Gallatin Road";"Madison TN 37115";"";"USA";"615-865-6000";"615-449-5969";"615-865-2544";"Active"
"Watkins";"Don";"CompuServe IBMNET";"1705 Barclay Drive";"Austin TX 78746";"";"SPECIAL";"Not Published";"Local Phone Numbers";"512-328-2641";"Active"
"Webb";"Charley";"Excalibur's BBS";"PO Box 293";"Canton CT 06019";"";"USA";"203-693-2448";"203-693-9930";"203-693-6298";"Active"
"Wecter";"Sam";"Stingray/Stingray II BBS";"7034 N. Cedar Ave #175";"Fresno CA 93720";"";"USA";"Not Published";"209-434-4215";"Not Available";"Active"
"Welber";"Chris";"Red Phone Info Sys, The";"215 W 11th St";"New York NY 10014";"";"USA";"Not Published";"212-924-1138";"Not Available";"Active"
"Wen";"Lee";"Node 1 BBS";"Al. dos Aicas, 1507";"Moema, Sao Paulo, SP CEP";"04086-003 Brazil";"BRAZIL";"+55-11-530-0189";"+55-11-5561-3155";"+55-11-542-9694";"Active"
"Wendt";"David";"JADE";"416 Colby Court";"Janesville WI 53546";"";"USA";"Not Published";"608-757-3000";"Not Available";"Active"
"Wigginton";"Jay E.";"TNT Online";"11350 Metro Pkwy #101";"Ft Myers FL 33912";"";"USA";"813-275-7877";"813-337-5999";"Not Available";"Active"
"Woien";"Harvey";"ThunderVolts BBS";"1175 Montecito Drive";"Los Angeles CA 90031-1651";"";"USA";"Not Published";"213-225-5474";"Not Available";"Active"
"Wood";"Raymond D.";"Capitol Area Network";"10829 Golf Course Ter.";"Mitchellville, MD 20721";"";"USA";"Not Published";"301-499-4671";"301-808-1099";"Active"
"Wootten";"Charles A.";"Servant of the Lord";"6113 W River Road";"Matoaca VA 23803-8047";"";"USA";"Not Published";"804-590-2161";"804-590-1659";"Active"
"Wright";"Martin";"YAHou! BBS";"7914 W Dodge St #353";"Omaha NE 68114";"";"USA";"Not Published";"402-455-7901";"Not Available";"Active"
"Yadron";"Michael J.";"Lighthouse BBS";"525 N. Broad Street";"Griffith IN 46319";"";"USA";"219-922-9509";"219-922-9357";"Not Available";"Active"
"YK";"Chan";"Bobcat BBS System, The";"100 Anthony Road #05-100";"Cairnhill Garden";"Singapore 0922";"SINGAPORE";"Not Published";"+65-738-2509";"Not Available";"Active"
"Young";"Rick";"Dataland! BBS";"PO Box 196";"Edison NJ 08818-0196";"";"USA";"908-985-0825";"908-572-5762";"908-572-9233";"Active"
"Youngblood";"Mike";"Motherboard III, The";"Accudrive";"903-I Loop 336 West";"Conroe TX 77301";"USA";"Not Published";"409-441-2939";"Not Available";"Active"
"Yui";"Alsmond";"Phone Magazine";"Rm 501, Yuenroong Centre";"150, Castle Peak Road";"Yuen Long, N.T. Hong Kong";"HONG KONG";"Not Published";"011-852-475-2772";"Not Available";"Active"
"Zilles";"Anthony Lloyd";"Baud Room, The";"PO Box 254";"Clifton Hill 3068";"Victoria, Australia";"AUSTRALIA";"Not Published";"+61-3-481-8022";"+61-3-482-2492";"Active"

View File

@@ -0,0 +1,48 @@
IBM Wouldn't Do This, Would They?
(But They Did!)
I am not currently an AT user. Otherwise, I might have discovered
this before now and probably at some inconvenience. I pass it on so
that many of you who are using AT's might be aware of the possible
inconvenience Big Blue has planned for AT users. The following item
appeared in the Lotus Magazine, Vol.2, No.9, September, 1986 (p. 26).
- Jack Kilday, Sysop
Northern Lights BBS
207-766-2467 2400/1200
Preventing PC AT Amnesia
If you've never pulled the cover off an IBM PC AT, you may not realize
that there is a battery inside. If that news comes as a surprise,
there's no need to be embarrassed; you apparently have a lot of
company.
According to Alex Papakyriakou, general manager of International
Battery Corp. (IBC) (Reseda, Calif.), a sizable number of IBM PC AT
owners -- including some large-scale corporate buyers -- are just
realizing this because the batteries are beginning to fail. This
causes the loss of not only time and date information but also
internally stored configuration information like the machine's memory
size and type and number of disk drives.
When a PC AT's battery fades out, you are forced to enter the
configuration info each time you start the system -- a tedious process
that leads to a quick search for a replacement battery. The
difficulty users face in finding the batteries is what got IBC into
the AT battery business.
IBC was getting requests for the 6-volt lithium units and couldn't
find a supplier until they came across Tadiran, a major battery
manufacturer headquartered in Israel.
IBC obtained exclusive rights to aftermarkets sales of Tadiran's
AT-compatible batteries and is selling them by mail order for $27.50,
which Papakyriakou claims is $15 less than IBM sells them for. But
IBC is likely to have competition soon in this lucrative market. The
market-research firm Dataquest (San Jose, Calif.) estimates there will
be more than one million IBM AT's in use by the end of 1986, each
having a battery that runs out of juice every one to three years.


View File

@@ -0,0 +1,384 @@
_MAKING THE MOVE TO MODULA-2_
by J.V. Auping and Chis Johnston
[LISTING ONE]
DEFINITION MODULE ModPlot;
(* Title : High level Modula-2 Graphics library interface
Author : Judy Auping
System : PC Graphics
Compiler: LOGITECH MODULA-2/86
*)
FROM DataDefs IMPORT
DeviceType,UnitsType,SizeType,AngleType,LineType,ColorType,
FontType,OriginType,SymbolType,ModeType,STRING80;
EXPORT QUALIFIED
GraphInit,SetPlotDevice,SetPlotArea,SetScaledArea,SetScale,SetUnits,
SetCharSize,SetLabelAngle,SetLineType,SetPenColor,SetBackgroundColor,
SetLabelOrigin,SetFixedDigits,ReturnRatio,SetFontType,
Draw,Move,IncDraw,IncMove,DrawXAxis,DrawYAxis,DrawAxes,DrawGrid,
DrawLabel,DrawLabelledAxes,DrawLabelledGrid,DrawFrame,DrawSymbol,
Where,NewScreen,CloseGraphics;
PROCEDURE GraphInit;
(* Initializes system-MUST be called before any output generated *)
PROCEDURE SetPlotDevice(GraphDevice: DeviceType);
(* Selects output device for subsequent graphics commands *)
PROCEDURE SetPlotArea(XMin,XMax,YMin,YMax: REAL);
(* Sets the 'clip' area in % of absolute device boundaries*)
PROCEDURE SetScaledArea(XMin,XMax,YMin,YMax: REAL);
(* Sets the area in % of absolute device boundaries to which
subsequent SetScale takes effect*)
PROCEDURE SetScale(XMin,XMax,YMin,YMax: REAL);
(* Sets the user scale *)
PROCEDURE SetUnits(GraphUnits: UnitsType);
(* Sets either User (Scaled units) or Device (absolute units) *)
PROCEDURE SetCharSize(CharSize: SizeType);
(* Sets character size for subsequent labels *)
PROCEDURE SetLabelAngle(LabelRotation: AngleType);
(* Sets the angle of rotation of subseqent labels *)
PROCEDURE SetLineType(LineTypeSelected: LineType);
(* Sets the line type for subsequent Draw commands *)
PROCEDURE SetPenColor(PenColor: ColorType);
(* Sets the pen color for subsequent output *)
PROCEDURE SetBackgroundColor(BackgroundColor: ColorType);
(* Sets the background color (screen only) *)
PROCEDURE SetLabelOrigin(LabelOrigin: OriginType);
(* Determines orientation relative to current position with
which subsequent labels will be drawn *)
PROCEDURE SetFixedDigits(XNumDigits,YNumDigits: CARDINAL);
(* Sets number of digits to right of decimal point for
subsequent DrawLabelledAxes or DrawLabelledGrid *)
PROCEDURE ReturnRatio(): REAL;
(* Returns the ratio of the physical dimensions of the
plotting area of the current device *)
PROCEDURE SetFontType(FontTypeSelected: FontType);
(* Sets the font type for subsequent label commands *)
PROCEDURE Draw(XCoord,YCoord: REAL);
(* Draw a line from the active position to the specified coords *)
PROCEDURE Move(XCoord,YCoord: REAL);
(* Move the active position to the specified coordinates *)
PROCEDURE IncDraw(XIncr,YIncr: REAL);
(* Do an incremental draw from the active position *)
PROCEDURE IncMove(XIncr,YIncr: REAL);
(* Do an incremental move to the new active position *)
(* In the following set of axis drawing and labelling procedures,
the variables XIntercept, YIntercept, XTicSpacing, YTicSpacing
XMin, XMax, YMin, and YMax are all interpreted according to the
most recent SetUnits, SetScaledArea, and Set Scale commands.
MajorCount is an integer that specifies the number of tic intervals
between major tic marks. In DrawLabelledAxes and DrawLabelledGrid,
if MajorCount is positive, tic marks are drawn perpendicular to the
corresponding axis; if negative, tic marks are parallel.
MajorTicFrac specifies the size of the major tics as a percentage
of the length of the corresponding axis.*)
PROCEDURE DrawXAxis(YIntercept,TicSpacing,XMin,XMax: REAL;
MajorCount: INTEGER;
MajorTicFrac: REAL);
(* Draw an X-axis from XMin to XMax at the specified y-intercept*)
PROCEDURE DrawYAxis(XIntercept,TicSpacing,YMin,YMas: REAL;
MajorCount: INTEGER;
MajorTicFrac: REAL);
(* Draw a Y-axis from YMin to YMax at the specified x-intercept*)
PROCEDURE DrawAxes(XIntercept,YIntercept,XTicSpacing,YTicSpacing: REAL;
XMajorCount,YMajorCount: INTEGER;
XMajorTicFrac,YMajorTicFrac: REAL);
(* Draws full-scale axes intersecting at XIntercept and YIntercept*)
PROCEDURE DrawGrid(XIntercept,YIntercept,XTicSpacing,YTicSpacing: REAL;
XMajorCount,YMajorCount: INTEGER;
XMinorTicFrac,YMinorTicFrac: REAL);
(* Draws a full-scale grid, with lines spaced symmetrically
around XIntercept,YIntercept *)
PROCEDURE DrawLabel(LabelString: ARRAY OF CHAR);
(* Writes LabelString at the current active position according
to the current CharSize, LabelOrigin, and LabelRotation settings*)
PROCEDURE DrawLabelledAxes(XIntercept,YIntercept,XTicSpacing,
YTicSpacing: REAL;
XMajorCount,YMajorCount: INTEGER;
XMajorTicFrac,YMajorTicFrac: REAL);
(* Draws a pair of axes in the same manner as DrawAxes. Puts
labels at the major tic marks according to the current
CharSize, XNumDigits, and YNumDigits settings *)
PROCEDURE DrawLabelledGrid(XIntercept,YIntercept,XTicSpacing,
YTicSpacing: REAL;
XGridSpacing,YGridSpacing: INTEGER;
XMajorTicFrac,YMajorTicFrac: REAL);
(* Draws a full-scale grid as in DrawGrid and labels the grid
lines as in DrawLabelledAxes *)
PROCEDURE DrawFrame;
(* Draws a box around the current plotting area *)
PROCEDURE DrawSymbol(XCoord,YCoord: REAL;
Symbol: SymbolType;
Size: REAL);
(* Draws the indicated symbol centered at XCoord,YCoord.
Size is specified in mm *)
PROCEDURE Where(VAR XCoord,YCoord: REAL);
(* Returns the coordinate values of the current active position*)
PROCEDURE NewScreen(Mode: ModeType);
(* Clears the screen and sets the mode. No cursor in Menu mode*)
PROCEDURE CloseGraphics;
(* Cleans up the interrupts and restores to normal *)
END ModPlot.
[LISTING TWO]
DEFINITION MODULE GDriver;
(* Title : Low Level CRT and Plotter Draw module
Author : Chris Johnston
System : Modula-2 Plotting System
Compiler: LOGITECH MODULA-2/86
*)
FROM DataDefs IMPORT ModeType, STRING80, DevPresentType;
EXPORT QUALIFIED
ReadDevices, DrawAbs, MoveAbs, DrawString, SetMode, CleanUp;
PROCEDURE ReadDevices(VAR DevicesPresent : DevPresentType);
(* Finds out what devices are available: EGA/CGA and
IBM7372A/IBM7372B/IBM7371. An HP 7470 is reported
as an IBM7371 and the HP 7475 is reported as an
IBM7372A or B depending upon the paper size selected *)
PROCEDURE DrawAbs(XCoord, YCoord : CARDINAL);
(* Draw a line from the current location to XCoord, YCoord
on the selected device. Line type and color read from system
globals *)
PROCEDURE MoveAbs(XCoord, YCoord : CARDINAL);
(* Move from the current location to XCoord, YCoord on the
selected device with the pen raised. *)
PROCEDURE DrawString(XCoord, YCoord : CARDINAL;
LabelString : ARRAY OF CHAR);
(* Draw the character string LabelString starting at XCoord, YCoord.
The font, color, size, and rotation are selected from system globals
*)
PROCEDURE SetMode( Mode : ModeType);
(* Set the mode to text or graphics and clear the screen. This call has
** NO EFFECT ** if the selected device is a plotter *)
PROCEDURE CleanUp;
(* clean up the interrupt drivers and the character set at the end. *)
END GDriver.
[LISTING THREE]
DEFINITION MODULE DataDefs;
(* Title : Data Definitions
Author : Judy Auping
System : PC Graphics
Compiler: LOGITECH MODULA-2/86
*)
EXPORT QUALIFIED
DeviceType,UnitsType,SizeType,AngleType,LineType,ColorType,
FontType,OriginType,SymbolType,DevPresentType,ModeType,STRING80,
GraphDevice,LineTypeSelected,CharSize,FontTypeSelected,
PenColor,BackgroundColor,LabelRotation,DeviceXMax,DeviceYMax,
ErrorString, DriverError;
TYPE
DeviceType = (EGA,CGA,IBM7372A,IBM7372B,IBM7371);
UnitsType = (User,Device);
SizeType = (Small,Med,Large,XLarge);
AngleType = (Deg0,Deg45,Deg90,Deg135,Deg180,Deg225,Deg270,Deg315);
LineType = (Solid, EndPoint, Dotted, ShortDash, LongDash);
ColorType = (Black,Blue,Green,Cyan,Red,Magenta,Brown,White,
DarkGray,LightBlue,LightGreen,LightCyan,
LightRed,LightMagenta,Yellow,IntensifiedWhite);
FontType = (Standard,Italic);
OriginType = (UpperRight,CenterRight,LowerRight,UpperMiddle,
CenterMiddle,LowerMiddle,UpperLeft,CenterLeft,
LowerLeft);
SymbolType = (Circle,Square,Triangle,Asterisk,Cross,Plus);
DevPresentType = ARRAY DeviceType OF BOOLEAN;
ModeType = (Graphics,Text,Menu);
STRING80 = ARRAY[0..79] OF CHAR;
VAR
GraphDevice: DeviceType;
LineTypeSelected: LineType;
CharSize: SizeType;
FontTypeSelected: FontType;
PenColor: ColorType;
BackgroundColor: ColorType;
LabelRotation: AngleType;
DeviceXMax,DeviceYMax: CARDINAL;
DriverError: BOOLEAN;
ErrorString: STRING80;
END DataDefs.
[LISTING FOUR]
MODULE Example;
(* Title: Example of using the ModPlot graphics library
Author: Judy Auping
System: PC Graphics
*)
FROM DataDefs IMPORT
DeviceType,SizeType,ColorType,OriginType;
FROM ModPlot IMPORT
GraphInit,SetPlotArea,SetScaledArea,SetScale,DrawAxes,SetPenColor,
Move,Draw,DrawFrame,NewScreen,CloseGraphics,SetLabelOrigin,DrawLabel,
SetCharSize,IncDraw,SetPlotDevice;
FROM MathLib0 IMPORT sin;
FROM InOut IMPORT Read,WriteString,WriteLn;
TYPE
CornerType = (UpLeft,UpRight,LowLeft,LowRight);
CONST
NPnts = 1000; pi = 3.14159;
VAR
XValue: ARRAY[1..NPnts] OF REAL;
YValue: ARRAY [UpLeft..LowRight] OF ARRAY[1..NPnts] OF REAL;
NumTerms: ARRAY[UpLeft..LowRight] OF CARDINAL;
IPlot: CornerType;
IPnt,ITerm: CARDINAL;
x,NextTerm: REAL;
Input: CHAR;
PROCEDURE GeneratePlotArrays;
(* This procedure generates arrays of data points for the Fourier series
approximation of a sawtooth wave, where
y = 2 (sin x - sin(2x)/2 + sin(3x)/3 - sin(4x)/4 + ... )
The XValue array contains the x values for the plot in units of pi, where
the values vary from zero to 4pi.
The YValue array of arrays contains four arrays of y values for
different numbers of terms in the summation approximation. *)
BEGIN
WriteString("Generating approximation functions"); (* Inform user *)
NumTerms[UpLeft] := 5; NumTerms[UpRight] := 10;
NumTerms[LowLeft] := 20; NumTerms[LowRight] := 100;
FOR IPnt := 1 TO NPnts DO
IF (IPnt MOD 100)=0 THEN
WriteString(" ."); (* Let the user know the progress of *)
END (* if *); (* the calculations.*)
FOR IPlot := UpLeft TO LowRight DO
YValue[IPlot,IPnt] := 0.0; (* Initialize the terms. *)
END (* for *);
x := FLOAT(IPnt) * (4.0 * pi)/FLOAT(NPnts);
XValue[IPnt] := x/pi;
FOR ITerm := 1 TO NumTerms[LowRight] DO
IF (ITerm MOD 2)=0 THEN (* even terms are negative *)
NextTerm := -2.0 * sin(FLOAT(ITerm)* x)/FLOAT(ITerm);
ELSE (* odd terms are positive,*)
NextTerm := 2.0 * sin(FLOAT(ITerm)* x)/FLOAT(ITerm);
END (* if *);
FOR IPlot := UpLeft TO LowRight DO
IF ITerm<=NumTerms[IPlot] THEN
YValue[IPlot,IPnt] := YValue[IPlot,IPnt] + NextTerm;
END (* if *);
END (* for *);
END (* for *);
END (* for *);
END GeneratePlotArrays;
BEGIN
GeneratePlotArrays;
GraphInit;
SetPlotDevice(IBM7372A);
WriteLn; WriteString("Drawing plot . . ."); (*Let user know where we are*)
FOR IPlot := UpLeft TO LowRight DO (*Draw a plot for each array*)
CASE IPlot OF (* For each array, choose the appropriate plotting area*)
UpLeft:SetPlotArea(0.0,45.0,60.0,100.0); (*Upper left corner *)
SetScaledArea(5.0,40.0,62.0,94.0);
|UpRight: SetPlotArea(55.0,100.0,60.0,100.0); (*Upper right corner*)
SetScaledArea(60.0,95.0,62.0,94.0);
|LowLeft:SetPlotArea(0.0,45.0,0.0,40.0); (*Lower left*)
SetScaledArea(5.0,40.0,2.0,34.0);
|LowRight:SetPlotArea(55.0,100.0,0.0,40.0); (*Lower right*)
SetScaledArea(60.0,95.0,2.0,34.0);
END (* case *);
SetScale(0.0,4.0,-4.0,4.0); (* remember, x is in units of pi *)
SetPenColor(Black);
DrawAxes(0.0,0.0,1.0,1.0,2,2,3.0,2.0); (* draw axes without labels *)
(* Labels are drawn separately so we can put 'pi' on x-axis labels*)
SetCharSize(Small); (* Label the axes *)
SetLabelOrigin(CenterLeft); (* First, the y-axis *)
Move(-0.05,4.0); DrawLabel("4");
Move(-0.05,2.0); DrawLabel("2");
Move(-0.05,0.0); DrawLabel("0");
Move(-0.05,-2.0); DrawLabel("-2");
Move(-0.05,-4.0); DrawLabel("-4");
SetLabelOrigin(LowerMiddle); (* Then the x-axis *)
Move(2.0,-0.5); DrawLabel("2pi");
Move(4.0,-0.5); DrawLabel("4pi");
CASE IPlot OF (*Set a new pen color for each plot *)
UpLeft: SetPenColor(Red);
|UpRight: SetPenColor(Green);
|LowLeft: SetPenColor(Blue);
|LowRight: SetPenColor(Magenta);
END (* case *);
Move(0.0,0.0); (* Start at the origin *)
FOR IPnt := 1 TO NPnts DO
Draw(XValue[IPnt],YValue[IPlot,IPnt]); (*Draw to each point*)
END (* for *);
SetPenColor(Black);
DrawFrame; (*Draw a box around the plot for this array *)
Move(0.75,4.7);
SetLabelOrigin(CenterRight);
SetCharSize(Small);
CASE IPlot OF (*Put the appropriate title on each plot*)
UpLeft: DrawLabel("5 terms in series");
|UpRight: DrawLabel("10 terms in series");
|LowLeft:DrawLabel("20 terms in series");
|LowRight:DrawLabel("100 terms in series");
END (* case *);
END (* for *);
(*Now that all four plots have been drawn, put a title and
the formula in the middle area on the page *)
SetPlotArea(0.0,100.0,0.0,100.0); (* Set to full screen *);
SetScaledArea(0.0,100.0,0.0,100.0);
SetScale(0.0,100.0,0.0,100.0);
Move(9.0,53.0);
SetCharSize(Med);
SetLabelOrigin(CenterRight);
DrawLabel("FOURIER SERIES APPROXIMATION TO A SAWTOOTH WAVE");
Move(17.0,47.0);
SetCharSize(Small);
DrawLabel("y = 2 {sin(x) - sin(2x)/2 + sin(3x)/3 - sin(4x)/4 + ... }");
CloseGraphics; (* Clean up and restore the system *)
END Example.


File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,102 @@
ASP Membership Application -- Author: _ Publisher _ (Select one)
Your Name............. ______________________________
Company Name.......... ______________________________
Mailing Address....... ______________________________
P.O. Box.............. ____________________
City.................. ____________________
State, Cntry, Zip..... __ _______________ __________
Phone, day............ ______________
Phone, evenings....... ______________
Contact Phone.. ______________ (Optional - See AUTPUB.TXT)
CompuServe i.d... ___________
MCI & Other...... ____________________
FAX ............. ____________________
Mailing List OK.. __ Yes __ No
Product Name.... ______________ Price _______
Description..... _______________________________________________________
_______________________________________________________
_______________________________________________________
Platform..... IBM ___ Mac ___ Other (specify) ___
NOTE: You should submit your documentation as it WILL appear after you
have been accepted by the ASP.
Where is your support policy described to shareware users?
________________________________________________________________________
Briefly describe your support policy:
________________________________________________________________________
________________________________________________________________________
Does your documentation clearly describe how to register, what is provided
to registered users, and how much registration costs? __ Yes __ No
Where does the Ombudsman statement appear in your product?
________________________________________________________________________
Is the Registered Version of this product identical to the Freely
Distributed Version? __ Yes __ No. If No, READ THE INSTRUCTIONS and
explain ALL differences below, and include a copy of the registered version
with your application.
Registration Reminder Screens (RRS)
Number of Screens... ____
Location in Program. _________________________________________________
Sample Files
Name and Size....... _________________________________________________
Description......... _________________________________________________
_________________________________________________
Tutorial and Additional Explanatory Material
Number/Size Files... _________________________________________________
Description......... _________________________________________________
_________________________________________________
Small Version / Large Version
Size of Small Vers.. _____ Size of Large Vers.. ______
Location and Cost of Large Version: __________________________________
Unrelated Bonus Utilities and/or Convenience Utilities
Name and Size....... _________________________________________________
Description......... _________________________________________________
_________________________________________________
Other Differences
Source Code in Registered(not Freely Distributed)version? __ Yes __ No
Board Waiver Sought For ______________________________________________
Is there an Non-Shareware Version (NSV) of this product? __ Yes __ No
(If Yes, include a copy of the NSV with your application.)
Please list the latest versions of any other software you have available for
user evaluation -- whether Shareware, Freeware, Demoware or Otherware.
________________ _________________ ______________ ____________________
________________ _________________ ______________ ____________________
I certify that the above information is correct; that I will abide by the
standards of the ASP; that if I should ever decide to no longer abide by
those standards or by new standards which the ASP may adopt in the future,
I will cancel my membership immediately; that the ASP may cancel my
membership using criteria and procedures specified in the bylaws; and that
upon cancellation of membership by either party, I will discontinue using
any materials, logos, claims of membership, or other benefits which are
intended solely for members of the ASP.
Signed:_____________________________ Date: ____________
+------------------------------------------------------------------+
| P.S. - We can now accept Master or Visa card payments. Fill out |
| the following ONLY if you are making payment by MC or Visa. |
| |
| Master Card [ ] Visa Card [ ] Number ______ ______ _____ ______ |
| |
| Name on the Card (print) _______________________________________ |
| |
| Expires ____/____ Signature ___________________________________ |
+------------------------------------------------------------------+
Rev: 19 Nov 1993


View File

@@ -0,0 +1,272 @@
ASP Membership Requirements
The following are the general standards that ALL ASP authors (full members)
have agreed to follow. Each was passed by at least a 2/3 vote of those
members voting and is binding on all authors. They consist of a support
policy, a policy on payments, a policy on no crippled software, an
Ombudsman policy and some miscellaneous items:
**** ASP SOFTWARE SUPPORT POLICY ****
1. All ASP members' shareware products must provide support (included in the
purchase price) for a minimum of three months from the date of registration.
If the support is by telephone, there may be a limitation on BOTH the total
connect time and the period after purchase during which it is available
without additional cost so long as the connect time is at least 30 minutes
during the required three months. Support may be provided for a fee after
this initial period has elapsed. The support policy must be clearly stated in
the shareware documentation.
2. Support during the initial period may be one or more of the following:
- mail support
- telephone support (if this is the only support provided, at a
minimum an answering machine must be available 4 hours per day; this
support may be limited to thirty minutes of connect time at the
option of the author)
- for communications products, or ones associated to a communication
product by BBS or major communications service
- by any alternate method approved by the Board of Directors by a two
thirds vote (of those directors voting)
3. The minimum level of support required by this policy involves answering
questions and fixing serious bugs during the minimum three month period. For
problems involving a specific hardware or software environment or feature, the
author may choose not to modify the program. In that case, if the report is
within three months after purchase, then the author shall offer to refund the
user's purchase price.
4. Any money sent to an author to register an unsupported product shall be
promptly returned with an explanation that the product in question is no
longer supported.
5. Known incompatibilities with other software or hardware and major or
unusual program limitations are noted in the documentation that comes with
the shareware (evaluation) program.
**** ASP REGISTRATION PAYMENT POLICY *****
1. The Documentation must clearly describe how to register the product and
what goods and/or services the user will receive for registering.
2. Fees must be expressed in fixed monetary amounts. Voluntary payments or
contributions may not be solicited, although phrasing such as "if you use
and like this product, please register" is allowed.
3. Multiple levels of registration may be set, as long as each level
individually satisfies the above two requirements.
**** ASP POLICY ON NO CRIPPLING ****
The principle behind shareware is "try before you buy." ASP believes that
users have a right to try a fully functioning shareware program in their
regular computing environment. Accordingly, ASP authors agree that:
(1) The executable files (and/or items linked in with executables)
in their shareware and registered versions will be the same (with
the exceptions noted below)
(2) All the program's features will be fully documented.
(3) Registration encouragement procedures which in the judgment of
the Board are either unreasonable or unprofessional are not allowed.
Registration Reminder Screens should (if used):
1) be displayed no more than twice each time the program
runs (or twice per day for long-running programs such as
TSR's).
2) not require more than two keystrokes to bypass.
3) not have a forced minimum display time of more than three
seconds. In other words, the RRS itself should not take
control of the computer away from the user for more than
three seconds.
Practices such as creating undocumented hidden files or printing
a registration form without the user's knowledge or consent are
prohibited. It is NOT necessary to have any of the above as a
simple "Strike Any Key To Continue" is the least objectional to
the user.
(4) Solicitation of sales of a non-shareware version (NSV) of a
shareware program may be made in the evaluation version only if it
meets the following guidelines:
(a) Features of the NSV not in the shareware version must not be
detailed in the body of the documentation. An appendix or
separate file listing the features may be used.
(b) The shareware version may not present any features of the NSV
during its operation such as in stubbed-out menus or in on-line
help. A solicitation of the NSV and its features may be
presented in any Registration Reminder Screens and on order
forms.
(c) The names of the NSV and the shareware program must be
distinctly different. Suffixes such as 'Plus', 'Pro',
'Gold', 'LAN', etc. meet this distinction. Numeric version
or suffix numbers do not meet this distinction.
(d) The shareware version may not be designed or implemented in
such a fashion that, in the opinion of 60% of the Board of
Directors, it gives the user the impression that the
shareware version's major purpose is to sell copies of the NSV.
Exceptions to a strict interpretation of this policy are as follows:
- to save disk space, tutorial and additional explanatory
material may be left out of the shareware documentation.
- the shareware version may have registration encouragement
procedures absent from the registered version (or which can be
disabled with a code only provided to registered users).
- the registered version may include sample files not included
in the shareware version.
- if source code is offered with the registered version,
it may be withheld from the shareware version.
- the author may provide two shareware versions: one a small
version which the author designates the distributed version
in normal circumstances (e.g. language tools in C only
available in one model) so long as the full shareware version
is available from some public source (possibly for a small
distribution fee) and may be copied for trial purposes.
The small version's documentation must clearly describe
how users may obtain the full shareware version.
- registered users may be provided bonus utilities unrelated to
(and which do not change) the basic functionality of the program
- registered users may be given utilities which provide a
convenience but which are not essential
- exceptions approved by the ASP board of directors
by a 60% vote of those voting
- It is an acceptable registration incentive to market the first
product of a series as shareware and use the remaining products as
registration incentives, so long as the remaining products are
merely "more of the same" when compared to the first product. The
author may charge a single registration fee for the set, or may use
varying levels of registration to allow customers to obtain the
original product and/or remaining products.
**** ASP OMBUDSMAN POLICY ****
1. The board shall set up the office of Ombudsman and appoint someone to
that position. The Ombudsman's sole role shall be to mediate disputes
between ASP members and their customers. The Ombudsman shall report
to the board situations where he feels board action or knowledge is
appropriate.
2. All ASP members and vendor associate members are required to cooperate
with the Ombudsman when approached by him/her.
3. The Shareware version of any shareware program produced by ASP author
members must contain the following text as part of some file on the
disk. (The shareware version means the one intended for trial use).
"This program is produced by a member of the Association of Shareware
Professionals (ASP). ASP wants to make sure that the shareware
principle works for you. If you are unable to resolve a
shareware-related problem with an ASP member by contacting the member
directly, ASP may be able to help. The ASP Ombudsman can help you
resolve a dispute or problem with an ASP member, but does not provide
technical support for members' products. Please write to the ASP
Ombudsman at 545 Grover Road, Muskegon, MI USA 49442-9427, Fax
616-788-2765, or send a CompuServe message via CompuServe Mail to ASP
Ombudsman 70007,3536."
4. Inclusion of Ombudsman statement.
a. The Ombudsman statement shall be included in the shareware version
in a location clearly accessible to the evaluator.
b. Any registered versions which contain reference to the ASP or use
the ASP logo must contain the Ombudsman statement but they may be
in a written form rather than on disk.
c. If the ASP logo or name is used by any ASP approved vendor in any
ads/catalogs etc , then that vendor must include the OMB
statement with their catalogs and newsletters and is encouraged
to include it with any disks sold containing ASP member programs.
d. Members are free to include the Ombudsman statement in printed
documentation, ads and other mailings if they wish.
5. The first sentence may be replaced by "<Member's name> is a member of
the Association of Shareware Professionals (ASP)." If a member's
company qualifies under the company name policy, the company name may
be used instead of <member's name>.
6. ASP approved vendors must include the following statement with their
catalogs and newsletters and are encouraged to include it with all
disks sold:
"Company X is an Approved Vendor and a member of the Association
of Shareware Professionals (ASP). ASP wants to make sure that the
shareware principle works for you. If you are unable to resolve
a shareware-related problem with an ASP member by contacting the
member directly, ASP may be able to help. The ASP Ombudsman can
help you resolve a dispute or problem with an ASP member, but does not
provide technical support for members' products. Please write to the
ASP Ombudsman at 545 Grover Road, Muskegon, MI USA 49442-9427, Fax
616-788-2765, or send a CompuServe message via CompuServe Mail to ASP
Ombudsman 70007,3536."
7. The Ombudsman statement may not be hidden in a file or other manner
which 60% of the board of directors regards as obscure.
8. ASP approved BBS Systems must include the following statement as a
system bulletin (or as a downloadable file, if and only if an online
bulletin is not feasible), Which is to be accessible by all callers:
"<Name of BBS> is an Approved BBS and a member of the Association
of Shareware Professionals (ASP). ASP wants to make sure that
the shareware principle works for you. If you are unable to resolve
a shareware-related problem with an ASP member by contacting the
member directly, ASP may be able to help. The ASP Ombudsman can
help you resolve a dispute or problem with an ASP member, but does not
provide technical support for members' products. Please write to the
ASP Ombudsman at 545 Grover Road, Muskegon, MI USA 49442-9427, Fax
616-788-2765, or send a CompuServe message via CompuServe Mail to ASP
Ombudsman 70007,3536."
9. If posted as a bulletin, the title of said bulletin shall be "ASP
Ombudsman Statement"; if posted as a downloadable file, the filename
shall be "ASPOMB.xxx" (where "xxx" is representative of either a
text ar archive filename extension.)
**** ASP MISC STANDARDS ****
The program has been thoroughly tested by the author and should not be
harmful to other files or hardware if used properly.
Any discussion of the shareware concept and of registration requirements is
done in a professional and positive manner.
The program author will respond to people who send registration payments, as
promised in the program's documentation. At a minimum, the author will
acknowledge receipt of all payments.
The author will keep the ASP apprised of changes in mailing address and of
any changes in the status of his/her programs to:
ASP Executive Director
545 Grover Road
Muskegon MI 49442-9427


View File

@@ -0,0 +1,52 @@
***************************************************************
AWARD BIOS DRIVE TYPE TABLE
***************************************************************
TYPE CYLINDER HEADS WRITE LANDING SPECIFIC
PRE-COMP ZONE DISK
***************************************************************
1 306 4 128 305
2 615 4 300 615 Seagate 4026
3 615 6 300 615
4 940 8 512 940
5 940 6 512 940
6 615 4 0 615
7 462 8 256 511
8 733 5 0 733
9 900 15 0 901
10 820 3 0 820
11 855 5 0 855
12 855 7 0 855
13 306 8 128 319
14 733 7 0 733
15 reserved
16 612 4 0 663
17 997 5 300 997
18 997 7 0 997
19 1024 7 512 1023
20 733 5 300 732
21 733 7 300 732
22 733 5 300 733
23 306 4 0 336
24 reserved
25 1024 9 0 1023 Seagate 4096
26 1224 7 0 1223 Maxtor 2085
27 1224 11 0 1223 Maxtor 2140
28 1224 15 0 1223 Maxtor 2190
29 1024 8 0 1023 Maxtor 1085
30 1024 11 0 1023 Maxtor 1105
31 918 11 0 1023 Maxtor 1170
32 925 9 0 926 CDC 9415
33 1024 10 0 1023
34 1024 12 0 1023
35 1024 13 0 1023
36 1024 14 0 1023
37 1024 2 0 1023
38 1024 16 0 1023
39 918 15 0 1023 Maxtor 1140
40 820 6 0 820 Seagate 251


View File

@@ -0,0 +1,905 @@
_AN OBJECT-ORIENTED LOGIC SIMULATOR_
by Kenneth E. Ayers
[LISTIN<49> ONE]
Object subclass: #LogicLab
instanceVariableNames:
'devices signals switches clashes changed topPane analyzer breadboard
listSelector currentComponent '
classVariableNames: ''
poolDictionaries:
'FunctionKeys CharacterConstants ' !
!LogicLab class methods !
description
"Answer a String describing the
application and version."
^'LogicLab (Version 1.0 -- 06/26/88)'.!
new
"Answer an initialized LogicLab application."
| logicLab |
logicLab := super new.
logicLab initialize.
^logicLab.! !
!LogicLab methods !
addComponent: aComponent
"Add aComponent to the circuit description.
If there is an error, answer nil; otherwise
answer aComponent."
| name |
name := aComponent name.
name size == 0
ifTrue: [
"
User is installing -- get a name.
"
name := self getNewName.
name isNil
ifTrue: [^nil].
aComponent name: name]
ifFalse: [
"
A name has been supplied -- this implies
that the component is being installed from
a file. Need to check for a clash with
an existing name.
"
((self componentNamed: name) isNil)
ifFalse: [
"
Had a name clash -- get a synonym
from the user and stash both of them
away in the clashes table. Then
rename the component.
"
name := self getNewName.
name isNil
<EFBFBD> ifTrue: [^nil].
clashes
at: aComponent name
put: name.
aComponent name: name]].
changed := true.
aComponent isDevice
ifTrue: [devices add: aComponent]
ifFalse: [
aComponent isSignal
ifTrue: [signals add: aComponent]
ifFalse: [
switches add: aComponent.
analyzer isNil
ifFalse: [analyzer addSwitch: aComponent]]].
^aComponent.!
allNames
"Answer an array of all of the
names of installed components."
^((self deviceNames), (self signalNames), (self switchNames)).!
analyzer: aModel
"Set the LogicAnalyzer Application model
to aModel."
analyzer := aModel.!
breadboardList
"Answer an array of strings according to the
current list selector."
listSelector isNil
ifTrue: [listSelector := #listDevices].
^(self perform: listSelector).!
breadboardMenu
"Private -- answer the menu that processes
breadboard functions."
MenuPosition := Cursor position.
^(Menu
labels: ('Load\Save\Erase\List\',
'Install\Connect\Remove\Disconnect\',
'Simulate\',
'Quit') withCrs
lines: #(4 8 9)
selectors: #(load save erase list
install connect remove disconnect
run
quit)).!
changed
"Answer true if the circuit has changed."
^changed.!
changed: aBoolean
"Set the circuit-changed flag to aBoolean."
changed := aBoolean.!
close
"Close the LogicLab breadboarding window."
topPane dispatcher deactivateWindow closeWindow.!
closeIt
"Close the breadboard application window."
<EFBFBD> self close.!
componentNamed: aName
"Answer the component (device, signal, or switch)
whose name is aName. If no component can be found
answer nil."
| realName |
realName := aName.
clashes isNil
ifFalse: [
(clashes includesKey: aName)
ifTrue: [realName := clashes at: aName]].
devices do: [:aDevice|
(aDevice name = realName)
ifTrue: [^aDevice]].
signals do: [:aSignal|
(aSignal name = realName)
ifTrue: [^aSignal]].
switches do: [:aSwitch|
(aSwitch name = realName)
ifTrue: [^aSwitch]].
^nil.!
componentTypeMenu: selectorArray
"Answer a user-selected action for a
component type."
^((Menu
labels: 'Device\Signal\Switch' withCrs
lines: #()
selectors: selectorArray) popUpAt: MenuPosition).!
connect
"Make a user-specified connection."
| from to |
from := self getNode.
from isNil
ifTrue: [^nil].
to := self getNode.
to isNil
ifTrue: [^nil].
from connect: to.
changed := true.
currentComponent := from model.
listSelector := #listComponentConnections.
breadboard update.!
description
"Answer a string with a description of the receiver."
^(self class description).!
deviceNames
"Answer a collection of all of the
names of installed devices."
| list |
list := OrderedCollection new: (devices size).
devices do: [:aDevice| list add: aDevice name].
^list.!
devices
"Answer the list of installed devices."
^devices.!
<EFBFBD>disconnect
"Remove a user-specified connection."
| node |
node := self getNode.
node isNil
ifTrue: [^nil].
node disconnect.
changed := true.
currentComponent := node model.
listSelector := #listComponentConnections.
breadboard update.!
erase
"After user-verification, erase
the circuit description."
Cursor offset: MenuPosition.
(self verify: 'Erase circuit description?')
ifFalse: [^nil].
self eraseCircuit.
listSelector := #listDevices.
changed := true.
breadboard update.!
eraseCircuit
"Erase the circuit description."
devices do: [:aDevice|
self removeComponent: aDevice].
signals do: [:aSignal|
self removeComponent: aSignal].
switches do: [:aSwitch|
self removeComponent: aSwitch].
self initialize.!
getExistingComponent
"Answer a user-specified component."
| name component reply list |
name := self getName.
name isNil
ifTrue: [^nil].
component := self componentNamed: name.
component isNil
ifFalse: [^component].
Cursor offset: MenuPosition.
(Menu message:
(name, ' not installed -- select from list?')) isNil
ifTrue: [^nil].
Cursor offset: MenuPosition.
reply := self componentTypeMenu:
#(deviceNames signalNames switchNames).
Cursor offset: MenuPosition.
reply isNil
ifTrue: [^nil].
list := self perform: reply.
(list size == 0)
ifTrue: [
Menu message: 'None installed'.
Cursor offset: MenuPosition.
^nil].
<EFBFBD> name := VariableMenu selectFrom: list.
name isNil
ifTrue: [^nil].
name := list at: name.
^(self componentNamed: name).!
getExistingName
"Answer a user-specified name of
an existing component."
| component |
component := self getExistingComponent.
component isNil
ifTrue: [^nil].
^(component name).!
getFile
"Answer a FileStream for a
user-specified filename."
| name |
name := self getFilename.
name isNil
ifTrue: [^nil].
^(File pathName: name).!
getFilename
"Answer a user-specified filename."
| name |
Cursor offset: MenuPosition.
name :=
Prompter
prompt: 'Enter filename'
default: ''.
Cursor offset: MenuPosition.
^name.!
getName
"Answer a user-specified name."
| name |
Cursor offset: MenuPosition.
name :=
Prompter
prompt: 'Enter component name'
default: ''.
Cursor offset: MenuPosition.
^name.!
getNewName
"Answer a user-specified name for
a new component."
| name |
Cursor offset: MenuPosition.
name :=
Prompter
prompt: 'Enter name for new component'
default: ''.
Cursor offset: MenuPosition.
name isNil
ifTrue: [^nil].
[(self componentNamed: name) isNil]
whileFalse: [
<EFBFBD> name :=
Prompter
prompt: 'Name exists -- enter NEW name'
default: name.
Cursor offset: MenuPosition.
name isNil
ifTrue: [^nil]].
^name.!
getNode
"Answer a user-specified LogicNode."
| component |
component := self getExistingComponent.
component isNil
ifTrue: [^nil].
^(component getNode).!
initialize
"Private -- initialize a new
LogicLab application."
devices := OrderedCollection new.
signals := OrderedCollection new.
switches := OrderedCollection new.
changed := true.!
install
"Install a user-specified component."
| component |
component := LogicComponent install.
component isNil
ifTrue: [^nil].
self addComponent: component.
listSelector := self listSelectorFor: component.
breadboard update.
^component.!
installClassFrom: aStream
"Install a LogicComponent subclass
whose name is the next word on aStream."
| className |
className := aStream nextWord.
(Smalltalk includesKey: className asSymbol)
ifFalse: [
self error: ('Class: ', className, ' not installed')].!
installComponentFrom: aStream
"Install a LogicComponent instance
whose name is the next word on aStream."
| className class component |
className := aStream nextWord.
class := LogicComponent classNamed: className.
class isNil
ifTrue: [
self error: ('Unknown class: ', className).
^nil].
component := class new installFrom: aStream.
component isNil
ifTrue: [^nil].
^(self addComponent: component).!
installConnectionFrom: aStream
<EFBFBD> "Install a connection from aStream."
| fromName from toName to fromNode toNode |
fromName := aStream nextWord.
from := self componentNamed: fromName.
from isNil
ifTrue: [
self error: ('Unknown component: ', fromName).
^nil].
fromNode := from getNodeFrom: aStream.
fromNode isNil
ifTrue: [
self error: ('Unknown node on: ', fromName).
^nil].
toName := aStream nextWord.
to := self componentNamed: toName.
to isNil
ifTrue: [
self error: ('Unknown component: ', toName).
^nil].
toNode := to getNodeFrom: aStream.
toNode isNil
ifTrue: [
self error: ('Unknown node on: ', toName).
^nil].
^(fromNode connect: toNode).!
installFrom: aStream
"Load a circuit from the description
on aStream."
| keyWord |
clashes := Dictionary new.
[(aStream atEnd)
or: [(keyWord := aStream nextWord) isNil]]
whileFalse: [
keyWord = 'LOAD'
ifTrue: [
self installClassFrom: aStream]
ifFalse: [
keyWord = 'INSTALL'
ifTrue: [
self installComponentFrom: aStream]
ifFalse: [
keyWord = 'CONNECT'
ifTrue: [
self installConnectionFrom: aStream]
ifFalse: [
self error:
('Unknown command: ',
keyWord)]]]].
clashes release.
clashes := nil.!
list
"Process a user-specified list request."
| selection |
selection :=
(Menu
<EFBFBD> labels: ('Components\Connections\',
'Circuit Description') withCrs
lines: #()
selectors: #(listComponents
listConnections
listCircuit))
popUpAt: MenuPosition.
selection isNil
ifTrue: [^nil].
listSelector := selection.
breadboard update.!
listCircuit
"Answer a collection of strings with
the circuit description."
| name stream list |
CursorManager execute change.
name := 'logiclab.tmp'.
stream := File pathName: name.
list := OrderedCollection new.
stream
nextPutAll: '**** Circuit Description ****';
cr;
cr.
self storeOn: stream.
stream flush.
stream position: 0.
[stream atEnd]
whileFalse: [list add: stream nextLine].
stream close.
File remove: name.
CursorManager normal change.
^list.!
listComponentConnections
"Answer a collection of strings listing
the connection chain(s) for the
'currentComponent'."
currentComponent isNil
ifTrue: [^#()]
ifFalse: [
^(#('**** Connection List ****' ' '),
currentComponent connectionList)].!
listComponents
"Answer a collection of strings containing
a list of installed components."
| selection |
selection :=
self componentTypeMenu:
#(listDevices listSignals listSwitches).
selection isNil
ifTrue: [^#()].
^(self perform: selection).!
listConnections
"Answer a collection of strings listing
the connection chain(s) for a
user-specified component."
<EFBFBD> | component |
component := self getExistingComponent.
component isNil
ifTrue: [^#()].
currentComponent := component.
^self listComponentConnections.!
listContaining: aComponent
"Answer the list (devices, signals, or switches)
that includes aComponent."
(devices includes: aComponent)
ifTrue: [^devices].
(signals includes: aComponent)
ifTrue: [^signals].
^switches.!
listDevices
"Answer a collection of strings containing
a list of all the installed devices."
| size list |
size := devices size.
size == 0
ifTrue: [^#('No devices installed')].
size := size + 1.
list := OrderedCollection new: size.
list add: 'DEVICES'.
devices do: [:aDevice| list add: (' ', (aDevice identify))].
^list.!
listSelectorFor: aComponent
"Answer the list selector method used
to produce the list for aComponent's type."
aComponent isDevice
ifTrue: [^#listDevices].
aComponent isSignal
ifTrue: [^#listSignals].
^#listSwitches.!
listSignals
"Answer a collection of strings containing
a list of all the installed input signals."
| size list |
size := signals size.
size == 0
ifTrue: [^#('No signals installed')].
size := size + 1.
list := OrderedCollection new: size.
list add: 'SIGNALS'.
signals do: [:aSignal| list add: (' ', (aSignal identify))].
^list.!
listSwitches
"Answer a collection of strings containing
a list of all the installed swithces."
| size list |
size := switches size.
size == 0
ifTrue: [^#('No switches installed')].
size := size + 1.
list := OrderedCollection new: size.
<EFBFBD> list add: 'SWITHCES'.
switches do: [:aSwitch| list add: (' ', (aSwitch identify))].
^list.!
load
"Load a circuit description from
a user-specified file."
| file |
file := self getFile.
file isNil
ifTrue: [^nil].
self installFrom: file.
listSelector := #listDevices.
breadboard update.!
noDelay
"Setup all components to ignore
propagation delays."
signals do: [:signal| signal noDelay].
switches do: [:switch| switch noDelay].
devices do: [:device| device noDelay].!
noMenu
"Private -- answer an empty menu."
^(EmptyMenu new).!
open
"Open the Breadboard and Analyzer windows."
| size position |
size := (Display boundingBox extent * 3) // 4.
position := Display boundingBox center - (size // 2).
topPane :=
TopPane new
label: ((self class description),
' -- Breadboard');
model: self;
menu: #noMenu;
yourself.
topPane addSubpane:
(breadboard := ListPane new
name: #breadboardList;
model: self;
menu: #breadboardMenu;
change: #doNothing:;
framingRatio: (0 @ 0 extent: 1 @ 1)).
topPane reframe: (position extent: size).
topPane dispatcher openWindow scheduleWindow.!
quit
"Quit this LogicLab."
(self verify: 'Quit this LogicLab?')
ifFalse: [^nil].
self eraseCircuit.
signals := switches := devices := nil.
analyzer isNil
ifFalse: [
analyzer closeWindow.
analyzer := nil].
breadboard dispatcher deactivateWindow closeWindow.
Scheduler systemDispatcher redraw.
<EFBFBD> Scheduler resume.!
remove
"Remove a user-specified component."
| component |
component := self getExistingComponent.
component isNil
ifTrue: [^nil].
changed := true.
listSelector := self listSelectorFor: component.
self removeComponent: component.
breadboard update.!
removeComponent: aComponent
"Remove aComponent from the circuit."
analyzer isNil
ifFalse: [analyzer removeComponent: aComponent].
(self listContaining: aComponent) remove: aComponent.
aComponent remove.!
reset
"Reset all components."
signals do: [:signal| signal reset].
switches do: [:switch| switch reset].
devices do: [:device| device reset].!
restoreDelay
"Setup all components to use
propagation delays."
signals do: [:signal| signal restoreDelay].
switches do: [:switch| switch restoreDelay].
devices do: [:device| device restoreDelay].!
resume
"Resume the breadboarding application
after running the simulation."
Cursor offset: breadboard frame center.
topPane dispatcher scheduleWindow.!
run
"Invoke the LogicAnalyzer to run the simulation."
analyzer isNil
ifTrue: [
analyzer := LogicAnalyzer new.
analyzer openOn: self]
ifFalse: [analyzer activate].!
save
"Store the circuit description in
a user-specified file."
| file |
file := self getFile.
file isNil
ifTrue: [^nil].
CursorManager execute change.
self storeOn: file.
file
flush;
close.
CursorManager normal change.!
selectName
"Answer a user-selected name from a list
<EFBFBD> of the names of installed components."
| names index |
names := self allNames.
(names size == 0)
ifTrue: [^nil].
index := VariableMenu selectFrom: names.
index isNil
ifTrue: [^nil].
^(names at: index).!
signalNames
"Answer a collection of all of the
names of installed signals."
| list |
list := OrderedCollection new: (signals size).
signals do: [:aSignal| list add: aSignal name].
^list.!
signals
"Answer the list of installed signals."
^signals.!
simulate
"Simulate one pseudo-time interval."
signals do: [:signal| signal simulate].
switches do: [:switch| switch simulate].
devices do: [:device| device simulate].!
storeClassesOn: aStream
"Write a record of each component class
used by the circuit on aStream."
| classes |
classes := Set new.
devices do: [:aDevice| classes add: aDevice class].
signals do: [:aSignal| classes add: aSignal class].
switches do: [:aSwitch| classes add: aSwitch class].
classes do: [:aClass|
aStream
nextPutAll: ('LOAD ', (aClass name));
cr].!
storeComponentsFrom: aCollection on: aStream
"Write a record of each logic component from
aCollection installed in the circuit on aStream."
aCollection do: [:aComponent|
aStream nextPutAll: 'INSTALL '.
aComponent storeOn: aStream.
aStream cr].!
storeConnectionsOn: aStream
"Write a record of each connection
in the circuit on aStream."
devices do: [:aDevice| aDevice storeConnectionsOn: aStream].
signals do: [:aSignal| aSignal storeConnectionsOn: aStream].
switches do: [:aSwitch| aSwitch storeConnectionsOn: aStream].
devices do: [:aDevice| aDevice unMark].
signals do: [:aSignal| aSignal unMark].
switches do: [:aSwitch| aSwitch unMark].!
storeDevicesOn: aStream
"Write a record of each logic device
installed in the circuit on aStream."
<EFBFBD> self storeComponentsFrom: devices on: aStream.!
storeOn: aStream
"Write a description of the circuit on
aStream in a form that can be recovered
by the 'installOn:' method."
self
storeClassesOn: aStream;
storeDevicesOn: aStream;
storeSignalsOn: aStream;
storeSwitchesOn: aStream;
storeConnectionsOn: aStream.!
storeSignalsOn: aStream
"Write a record of each logic signal
installed in the circuit on aStream."
self storeComponentsFrom: signals on: aStream.!
storeSwitchesOn: aStream
"Write a record of each logic switch
installed in the circuit on aStream."
self storeComponentsFrom: switches on: aStream.!
switches
"Answer the list of installed switches."
^switches.!
switchNames
"Answer a collection of all of the
names of installed swithces."
| list |
list := OrderedCollection new: (switches size).
switches do: [:aSwitch| list add: aSwitch name].
^list.!
verify: aPrompt
"Ask the user to verify some condition."
Cursor offset: MenuPosition.
^((Menu message: aPrompt) notNil).! !
<20>
[LISTIN<49> TWO]
LogicSwitch subclass: #ToggleSwitch
instanceVariableNames: ''
classVariableNames: ''
poolDictionaries: '' !
!ToggleSwitch class methods !
type
"Answer a string with the receiver's type."
^'Toggle Switch'.! !
!ToggleSwitch methods !
identify
"Answer a string identifying the receiver."
^((self name),
' (', (self type), ')').!
push: aButton
"Simulate pushing a toggle switch by
inverting its state."
node invert.
node isHigh
ifTrue: [aButton lampOn]
ifFalse: [aButton lampOff].
(model isNil or: [changeSelector isNil])
ifFalse: [model perform: changeSelector].!
reset
"Reset the receiver."
button isNil
ifFalse: [
node isHigh
ifTrue: [button lampOn]
ifFalse: [button lampOff]].!
simulate
"Simulate a toggle switch."
node output.! !
[LISTIN<49> THREE]
LogicSwitch subclass: #PulserSwitch
instanceVariableNames:
'rest time timer '
classVariableNames: ''
poolDictionaries: '' !
!PulserSwitch class methods !
type
"Answer a string with the receiver's type."
^'Pulser'.! !
!PulserSwitch methods !
identify
"Answer a string identifying the receiver."
^((self name),
' (', (self type), ' -- ',
(LogicNode
statePrintString: (LogicNode not: rest)), ': ',
(TimeInterval timePrintString: time), ')').!
initialize
"Initialize a new PulserSwitch."
super initialize.
rest := false.
time := timer := 0.!
install
"Answer the receiver with user-specified
rest state and pulse time."
rest := LogicNode getState. "User will select pulse state"
rest isNil
ifTrue: [^super release].
rest := LogicNode not: rest.
time := TimeInterval getTimeFor: 'pulse'.
time isNil
ifTrue: [^super release].
^self.!
installFrom: aStream
"Answer a new PulserSwitch initialized with
parameters read from aStream."
super installFrom: aStream.
rest := LogicNode stateNamed: aStream nextWord.
node state: rest.
time := aStream nextWord asInteger.
^self.!
push: aButton
"Simulate pushing a Pulser Switch."
timer == 0
ifTrue: [node state: (LogicNode not: rest)].
timer := time.
node isHigh
ifTrue: [aButton lampOn]
ifFalse: [aButton lampOff].
(model isNil or: [changeSelector isNil])
<EFBFBD> ifFalse: [model perform: changeSelector].!
reset
"Reset the receiver's state to its resting
state and its timer to zero."
node state: rest.
timer := 0.
button isNil
ifFalse: [
node isHigh
ifTrue: [button lampOn]
ifFalse: [button lampOff]].!
simulate
"Simulate a Pulser Switch."
timer == 0
ifTrue: [
node state: rest.
button isNil
ifFalse: [
node isHigh
ifTrue: [button lampOn]
ifFalse: [button lampOff]]]
ifFalse: [timer := timer - 1].
node output.!
storeOn: aStream
"Store a record of the receiver on aStream."
super storeOn: aStream.
aStream
nextPutAll: (' ',
(LogicNode statePrintString: rest), ' ',
(time printString)).! !
[LISTIN<49> FOUR]
LogicDevice subclass: #N74LS00
instanceVariableNames: ''
classVariableNames: ''
poolDictionaries: '' !
!N74LS00 class methods !
description
"Answer a string with a description
of the receiver's function."
^'Quad 2-input NAND gate'.!
type
"Answer a string with the receiver's type."
^'74LS00'.! !
!N74LS00 methods !
initialize
"Private -- initialize the propagation delays
for a new 74LS00 LogicDevice."
super
initialize;
initializeDelays:
#( 5 5 10 5 5 10 0
10 5 5 10 5 5 0 ).!
simulate
"Simulate a 74LS00 device."
((pins at: 1) isHigh and: [(pins at: 2) isHigh])
ifTrue: [(pins at: 3) output: false]
ifFalse: [(pins at: 3) output: true].
((pins at: 4) isHigh and: [(pins at: 5) isHigh])
ifTrue: [(pins at: 6) output: false]
ifFalse: [(pins at: 6) output: true].
((pins at: 10) isHigh and: [(pins at: 9) isHigh])
ifTrue: [(pins at: 8) output: false]
ifFalse: [(pins at: 8) output: true].
((pins at: 13) isHigh and: [(pins at: 12) isHigh])
ifTrue: [(pins at: 11) output: false]
ifFalse: [(pins at: 11) output: true].! !
[LISTIN<49> FIVE]
output: aState <20>
"Generate aState as an output from the node." <20>
old := int. <20>
int := aState. <20>
int == ext <20>
ifTrue: [ <20>
"State is stable" <20>
timer := 0. <20>
^self outputToConnections]. <20>
"State has changed" <20>
timer == 0 <20>
ifTrue: [ <20>
"No delay in progress -- initiate prop delay" <20>
delay == 0 <20>
ifTrue: [ <20>
"No delay -- just change state" <20>
ext := int] <20>
ifFalse: [ <20>
"Arm delay timer" <20>
timer := delay]. <20>
^self outputToConnections]. <20>
"Propagation delay in progress" <20>
timer := timer - 1. <20>
timer == 0 <20>
ifTrue: [ <20>
"Timer has expired -- update state" <20>
ext := int]. <20>
self outputToConnections. <20>
[LISTIN<49> SIX]
simulate <20>
"Simulate a 74LS00 device." <20>
((pins at: 1) isHigh and: [(pins at: 2) isHigh]) <20>
ifTrue: [(pins at: 3) output: false] <20>

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,353 @@
What is the Filename to read? backdoor.txt
February 20 1989
This is BACKDOR1.arc ... the first in a series of
"back doors" to various games. The source of this info is
various magazines, and I have paraphrased the articles.
Note that "back door" refers NOT to regular game hints on
how to play better, but to a way to CHEAT, usually put
there by the programmer, sometimes caused by a bug. Usually
you'll be made invincible if it's an arcade-type game, or
be able to advance quicker if an adventure game.
Most of these "back door" and "side door" hints are out of
a GREAT magazine for the Amiga, C64, and C128: INFO.
It's a grass-roots, down to earth magazine - the first
magazine about personal computers to be be entirely done on
personal computers. That's "Where It's At".
You owe it to yourself to subscribe to INFO.
With the exception of most of the ads, everything including
color screen shots and photos are digitally created, edited,
composed, printed, and color separated as complete assembled
pages on 14 Amiga computers running Professional Page (and
many many other Amiga software products), and output to a
Linotronic L300 typesetting device at 1235 dots per inch!
INFO doesn't cover programming techniques, but in my opinion
it out-shines all the other Commodore mags for news, honest
opinion, game reviews, and reviews of all C= software.
George Knochel, Lakewood Colorado
ALL GAMES: connect a genlock to the Amiga and leave it on
while playing games, and they'll play 25% slower, which
allows you to score high.
ARKANOID
Get into the back door this way: boot and run the game as
usual, then select a start screen and begin game. Press the
space bar to pause, and type in DSIMAGIC (no spaces, and
don't press Return). Press the space bar to unpause.
Now a yellow Power capsule named DS will fall down. Catch
it. Now you can get any power capsule you want any time.
Press the first letter of the capsule you want, and it will
fall down for you to catch:
Break Catch Disruption Expand Laser Player Slow
Catch some Player capsules first to get extra lives.
You can also use two capsules at the same time, like Disrupt
the ball into three balls, and use Lasers also.
Pressing the F key will send you to the Finsl screen where
you fight DOH, the Dominion Over Hour monster on the cover
of the package. You'll need lots of lives first.
Skip over any screen by pressing Enter on the keypad, or
get through the screen fast (with points too) using a Break
capsule.
ARKANOID II
On the high score screen, type in the name DEBBIE S
(with the space), and you'll have infinite lives.
BARBARIAN
Boot and run the game as usual, but at some point after the
game has started, type in: 04-08-59 ...It will make the
Barbarian character almost invincible, but he can still be
killed by very high falls, and by the flame-hurling horned
demon in the dungeon deep, pictured on the cover.
After you type 04-08-59 the screen will turn gray, telling
you that you're invincible.
Once you make it to Necron, you must have a shield. Face
Necron when he turns to face you. When he throws a fireball
at you, press the defense button as it hits your shield.
BARD'S TALE
How to hoard millions in gold without trying: Load your
party, go to the stats screen for the first player. Pool
all of the party's gold to the first player, then remove
him from the party, then load him back in. Then pool the
gold to another player. Repeat this for each player.
Then turn off the computer without saving the game. Reboot
and ezch player will have gold equal to the TOTAL the party
had before. Repeat if you're really greedy !
BETTER DEAD THAN ALIEN
If you are just about to be hit by an alien or a bomb, press
the ESC key to pause, move your ship out of the way, then
press N to resume the action.
Type CHAMP on the options screen, then press the HELP
key. You'll be shown a list of cheat keys.
CAPONE
To find the "special bonus", go to the front of the Post
Office. Shoot the ball at the top of the flag pole, and
your score will go way up. If you shoot it again, you'll
see a screen of the programmers! Shoot again and you'll be
invincible, standing in the bank. At the end of that round,
you will start at the beginning, except you'll be in warp
speed.
DEFENDER OF THE CROWN
To get 1,024 Knights: After conquering a territory, press
these four keys at the same time, while the drive is still
running: H J K L ... If you do it just right, you'll have
1,024 knights both in your home and in your army. Hey, this
is good stuff!
Another way was reported in which to get 1,024 Knights, but
it doesn't seem to work: After first picking the knight,
when Robin Hood appears, type PATTERSON over and over until
the map of England appears. Don't press the Return key.
If this trick doesn't work the first time, try again.
I was only able to get this to work most of the time if,
before typing PATTERSON over and over, I first typed in
my name with no spaces: GEORGEKNOCHEL Yep, Twilight Zone!
Another good trick for Defender of the Crown, for sword
fighting, is to get the PD program called FUN-BUT
(fun button), which when run lets you press the F1 key
continuously instead of clicking on the mouse.
(but then this is a hint, not a back door).
DRAGON'S LAIR
This will demo the ENTIRE game (about 18 minutes worth or a
disk I/O error, whichever comes first). You can't play it,
just watch the whole game: After the credits have finished
loading, and are being displayed (the red light will still
be on, but no loading is occurring), press the following six
(6) keys, simultaneously: <ESC> R / L N 7
Yes, all at the same time (use your nose if ya have to -
just press ESC and hold, then press R and hold, etc.).
The screen will flash if you did it right. THEN PRESS THE
FIRE BUTTON on your joystick. Sit back and watch all the
animation. (I couldn't - my disk 5 had an I/O error)
DUNGEON MASTER
To advance Ninjas a level, stand in a hall and throw all
your weapons, then get them and repeat. This also works
with magic and Fighter levels: cast a spell at the air,
or slash and bash until you gain a level.
F/A-18 INTERCEPTOR
Select option "2 Free Flight, no enemy confrontation" from
the main menu. Then select zero instead of 1 to 4. The
screen will go into a spiral and scroll way south to 34 by
117 degrees, placing your plane somewhere without a runway.
To take off you have to use the afterburners. 117 degrees
is the furthest south you'll be able to fly, but you can go
in other directions. (Is there more to this back door? hmm)
FAERY TALE ADVENTURE
Sometimes you can accumulate all the treasure you want by
going near the item, press space bar, and keep pressing 'T'.
You'll receive an infinite supply of that treasure.
Save your position in a dungeon. Then go through it until
you don't have anymore keys. Restore your position. All
doors already opened will still be open, and you'll have a
new supply of keys. Repeat if needed. Also works in cave.
Jump on the turtle and start slashing. Your bravery points
will go up to infinity, but doesn't hurt the turtle or you.
On the island with the Crystal Castle, press the right mouse
button while talking to the Sorceress and your luck will go
to 65. "Ask"ing the Sorceress several times will normally
boost your luck.
If running low on green keys, use a secret entrance for the
fort - it is on the left side, almost even with the door.
HYBRIS
Boot game and don't do anything until the high scores screen
appears. Then type COMMANDER and click the fire button.
When it starts, wait a few moments and press the F10 key.
If the extensions of your ship get flickery or glimmer,
you're now invincible and have unlimited expansions and
smart bombs. Get to the other 6 levels of expansions by
pressing F1 through F5 when you're in unexpanded mode, or
capture the special "capsules" in the usual way. Move to
other game levels (there are three) with the F8 key, and
turn invincibility off or on with the F10 key. No High
scores are collected when you're invincible.
KARATE KID II
Press the P key in single player mode to be taken to the
next screen. You can go as far as the Final Encounter. In
2-player mode, you can go to the next-to-the-last screen.
LEISURE SUIT LARRY
Press ALT and X at the same time to bypass the proof-of-age
questions.
STARGLIDER (not Starglider II):
Boot and play as usual until launched and ready to do
battle. Then slow down until completely stopped in
space. Press the F1 key to turn on the fixed sight, and
press the backspace key to pause the game. Now type:
js[space]arg[space]s You should now be invincible!
You'll know you're in invincible mode when you can
repeatedly press the P key and get additional missiles (up
to 9). If the password didn't take the first time, try
again. To may have to dock and re-exit for it to work.
Once invincible, your fuel will remain constant and shields
will never be depleted.
Also, a secret built-in 3D object viewer running in the
background is available by pressing the z key once you've
entered the invincible mode. Use the keyboard to pause [p],
select [, and .] and manipulate objects - use all keys
except q and ESC. Use the mouse to change point of view
and magnification and hold down the right button. ....
STARGLIDER II
Once the game has started, press F for fixed sights and
then slow the ship to a halt. Press BACKSPACE to pause, and
type the words: WERE ON A MISSION FROM GOD (really!)
(The article did not have the apostrophe ' in We're ...)
Then press 1 (one) on the keyboard (not keypad). Your
shield and energy levels will drop to a fixed point. Press
the letter K to get all the weapons in the game, including
the neutron bomb. If you run low on weapons, you can get
them all back by repeating the process. Onward into battle,
young soldiers!
SWORD OF SODAN
Type NANCY then press RETURN on the high scores screen for
unlimited lives!
TEST DRIVE
Holding down the joystick button while going around curves
prevents you from hitting the wall or going off the cliff.
THREE STOOGES
To really slow down "the hand" which selects the scenes, do
the slapping game and pull Curly's ear: pull it continuously
until the time runs out.
XENON
Let yourself be killed off at the beginning of the 2nd stage
of the 2nd level, and all aliens in the round are destroyed.
Press [ENTER] to continue...
Call the Terminal Bliss BBS at T-ERM-INA-LBLS.
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
\\ home of the dead rock \\
\\ stars and across the \\
\\ street from the circle \\
\\ A its the............ \\
\\ \\
\\ DEAD ROCK CAFE \\
\\ 415-676-5953 \\
\\ 300-1200-2400 BAUD \\
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: The NIRVANAnet(tm) Seven
& the Temple of the Screaming Electron Taipan Enigma 510/935-5845
Burn This Flag Zardoz 408/363-9766
realitycheck Poindexter Fortran 510/527-1662
Lies Unlimited Mick Freen 801/278-2699
The New Dork Sublime Biffnix 415/864-DORK
The Shrine Rif Raf 206/794-6674
Planet Mirth Simon Jester 510/786-6560
"Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X

Binary file not shown.

View File

@@ -0,0 +1,351 @@
********************
Basic Unix Use
By Lord Lawless
Phortune 500
Board of Directors
********************
March 8, 1987
-------------
This file is basically a brief introduction and overview for the beginning
hacker to the Unix operating system. All information contained herein is
accurate to the extent of my knowledge. This file is intended for inform-
ational purposes only and the author (Lord Lawless) is in NO way responsible
for the use of this file for purposes other than the aforementioned.
Part I: What is Unix?
----------------------
Unix is an operating system, so designated because it allows a user to
interface with a computer in a way that is (hopefully) easy for the user to
learn and use. Unix can be known by other forms, PC-Unix, Xenix, etc., but
they all basically are the same (with slight differences this file won't go
into) and use the same commands. Unix is a wonderfully simple to use OS once
you begin, and while this file will help you I recommend that you find a Unix
system somewhere and wander around on it to help yourself to learn. To put
this more formally:
The UNIX system is a set of programs that include a time-sharing
operating system and a set of utility programs. The operating
system has two basic parts:
1) The kernel is the program in the UNIX operating system
that is responsible for most operating system functions. It
schedules and manages all the work done by the computer and
maintains the file system. It is always running, and is
invisible to users.
2) The shell is the UNIX operating system program responsible
for handling all interaction between users and the computer.
It includes a powerful command language called "shell language"*.
The utility programs (usually called UNIX commands) are executed
through the shell, and allow users to communicate with each other,
to edit and manipulate files, to write and execute programs in
several programming languages, and many other things.
Part II: Recognizing a Unix system
-------------------------------------
When you connect to a Unix system you will see a message usually like
"AT&T Unix: Unauthorized use will be Prosecuted!" or just "Unix System V" or
the like. At the least you will see a prompt saying "login:". At this point,
if possible, make sure that you are in lowercase, because if the computer det-
ects that you are typing in uppercase everything you read after will be in
uppercase with lowercase denoted by a \ in front of the word. This is because
Unix is case sensitive, so be careful, reading lowercase is much easier than
reading all uppercase and slashes. Ok, so here you are at the Unix "login:"
prompt.
Part III: Logging on
---------------------
At this point you must enter your login, and then, if the account (
never more than 14 characters) has one, the password. Now, all Unix systems
have default accounts, and unless set by the Root System Operator no passwords.
This has been the means of infiltration by many the Unix hacker. There are two
types of accounts in a Unix, the "super user" and the "user". The super user
has access to almost everything (or everything depending on the system) and the
user basically has access to the files he owns and what he can sometimes read.
The default super user accounts on a unix are:
ROOT
MAKEFSYS
MOUNTFSYS
UMOUNTFSYS
CHECKFSYS
and sometimes
ADMIN
SYSADMIN.
For passwords to these try things like SYSTEM, SYSMAN, SYSADMIN, ADMINISTRATOR,
OPERATOR, SYSOP, etc.
The default user-level accounts are:
LP
DAEMON
TROUBLE
NUUCP
UUCP
RJE
ADM
SYSADM
SYNC
BIN
(Note: These accounts should be entered in lower case , I merely wrote them
in upper case for easier reference.)
After being on Unix's, I have also seen the following common accounts:
USER
UNIX
GAMES
GUEST
STUDENT -on school run Unix's.
The maximum length of a password is 11 characters.
After doing all this you should, with luck, be in!
If you couldn't hack anything out, try typing "WHO" at the login: prompt, it
may list all the user accounts and you can try them until you find one without
a password.
Part IV: You're in!!!
----------------------
Congratulate yourself, the hardest part of Unix "hacking" is over. Ok,
now that you're in you'll see a prompt which will probably look like "$" for a
user account or "#" if you got lucky and got a super user account.
(Quick note, to stop a unix process in action try typing ctrl-d or control
backspace, these are the end of file/Stop process keys.)
Ok, so you are now in. Let me give a quick lesson on Unix directories. In
Unix, the root is the main directory, and it contains subdirectories which may
contain subdirectories etc. In order to change to the root directory, one
would type "cd /". This is because "cd" is the command "change directory" and
"/" is the root directory. To change to subdirectory "Bill" contained in the
root directory, you would type "cd /Bill" or, if you were in the root dir, just
"cd Bill". If you wanted to access Bill's files, you'd enter "cd /Bill/files"
assuming Bill had a subdir called files where he kept his files. This is how
a person would move around in a Unix sys. Graphically, it looks like this:
Root
__________!!_________
!!
__Bill__
!!
__Files__
Part V: Basic Commands
-----------------------
Ok, these commands are the most useful ones that I've found and can are
entered from the prompt.
Command:What it does
--------------------
ls gives a listing of all files in a directory
cat gives a dump to screen of what is contained in a file. For instance
"cat phones" would show me what is in file "phones".
cd change directory
pwd shows what directory path you are in now
ps shows system processes
rm remove a file, for instance "rm phones".
rmdir removes a directory, for instance "rm Bill".
grep print ascii strings in a file, ie "grep phones"
who shows who's on the system
mail sends mail to a user, syntax mail <username>
su change from 1 account to another. For instance, if you are account
Bill and wish to change to account Jake (which is unpassworded) just
type "su Jake" and you will change to him. If Jake has a password you
will be prompted to enter it. This is useful for loggin in under a
user account and switching later to a super user account.
passwd allows a user to change his password. If you are a superuser you can
change someone elses password by typing "passwd <account>".
mkuser make a user (providing you are a super user)
mkdir create a directory
More Information about Commands
-------------------------------
The following are more of the most basic Unix commands.
cat cd chmod cp cut date
echo egrep fgrep file find glossary
grep help ln locate ls mail
mesg mkdir mv news pr ps
pwd rm sleep sort starter stty
tabs tail tee time touch tty
uname usage wall wc who write
Using the Command: mkdir
Syntax Summary: mkdir dir_name1 [ dir_name2 ...]
where:
dir_names are simple subdirectory names,
relative pathnames, or full pathnames
Description:
mkdir creates one or more new directories.
If mkdir is given a simple name as an argument, the new
directory will be a subdirectory of the current directory.
You can make new directories anywhere in the file system
by giving mkdir a complete or relative pathname for the new
directories, if you have permission to write in the directory
where the new directory is to be created.
Ok, those are the basic commands you will need to go around in the system.
Part VI: Useful Information
----------------------------
A great place to go to get information on who is on the system and
what accounts you can use to get on again is contained in the file "passwd"
in the "etc" directory. To look at it, cd etc, and then cat passwd. The
first entry should say something like this:
root:adfaBADca:0:1:Operator:/:/bin/sh
what this means is that the root account has an encrypted password, has super-
user capabilities (any user with a 0 in that slot is a super user) is in group
1 (relatively unimportant for this file), has a comment of Operator (this may
be blank), has a home directory of / (the root) and uses the Bourne Shell, kept
in the /bin directory.
You will then see all the other users listed out in the same format. If you
see an account followed by two colons, that means that it has no password. You
want these accounts so that you can log in under them another time. If you get
real lucky you may see something like this:
makefsys::0:1:/bin:/bin/sh
meaning that you have found a super user account with no password, a very
useful item indeed.
Another good place to look is the /usr/spool dir and the
/usr/spool/cron/crontabs dir because if you are a super user that dir contains
much that will be useful to you.
In order to move up to a directory one level higher than you are presently in,
type "cd ..". So to move from /Bill/files to /Bill I would just type cd ..
and, assuming I started in /Bill/files I would now be in /Bill.
Ok, now you can wander the system "cat"'ing around and whatnot. If a file
doesn't "cat", try just typing it's name, that will execute it if you have the
privileges. Try typing "admin" or "ua" if you are a superuser nad maybe you'll
be able to create users or other interesting things. You may not be able to
cat a file or run it because you lack access permissions. What are they? Read
on!
Access Permissions
------------------
access permissions: permissions: mode: owner:
owner/group/others: read/write/execute
As the user of a UNIX system, you can decide who can read, write,
and execute the files and directories that you own. You are
usually the owner of files and directories that you have created in
your login directory and in the "subdirectories"* in your login
directory. You may also own files in other peoples' directories.
You control the use of your files and directories by specifying the
access permissions, also called the mode, for each. You can specify
different access permissions for yourself, your "group"*, and the
other users of the system. Permission to read allows the user to
read the contents of the file. Write permission allows the user to
change the file and execute permission enables the user to execute
the program within the file.
ls -l
prints the access permissions for each file and directory in the
current directory. The sample listing below shows the mode of the
file (preceded by a -), the number of "links"*, the owner, the
"group ID"*, the size in characters, the date and time the file
was last modified, and the "filename"*.
-rwxr-x--x 1 sandy 12345 128 Oct 9 9:32 lock
If this were a listing for a directory, the hyphen (-) would be
replaced by the letter d. The owner of the file "lock" can read,
write and execute the file, the group can read and execute it, and
the others can only execute it. You can change the mode of your
files and directories by using the change mode command, chmod.
Other interesting places to look are in the directories assigned to the users
on the Unix system, often their files will contain some useful information.
Also try going into the /uucp directory or looking for any uucp dir anywhere as
it may contain phone numbers to other Unix systems or other "goodies".
The *: asterisk
---------------
In the shell, an asterisk matches any "string"* of characters in
a "filename"* on a command line. The command
rm temp*
removes all files from the current working directory that begin with
the string "temp". Files like "temp", "temp1", "temp.1", and
"temp.save" would all be deleted. An asterisk alone matches any
filename in the current working directory except those beginning
with "dot (.)"*. For example,
rm *
removes all the files in your directory except for the dot (.)files.
Finally, typing help at the unix prompt may bring up a help manual that is
usually quite well done and will help you if you are stuck or wish to explore
in more depth the commands I didn't go into.
Hmm, what else? I can't think of much more right now that would help you much
more, in this file I think I've covered everything that should get you well on
your way towards becoming a unix hacker. Once you've got this, start reading
files on "Unix Shells", "Scripts", and ask around A LOT. Ah, I just remembered
something. To get help on a command, type "man <command>" or "whatis <command>
" and you may find out. Also, a lot of Unix's have a built in Help feature
somewhere, try to get to it.
Part VII: A Few Final Words
----------------------------
If you manage to get onto a Unix system, don't screw it up. Unix is a
great operating system, and fun to learn on and have other people learn on.
Don't become a superuser and delete everything or other things, it's just not
worth it. Also, don't make a use called "Hacker" or "Shadow 1" or something,
that's a blatant giveaway. Put an account a little out of the way directory,
and create user level accounts if you must, and perhaps just 1 super user
level. I can't think of much more to say on the basics, though I probably left
some important things out....nobody's perfect. I hope you enjoyed the file and
I can be found on the following boards:
The Private Connection
The Undergraduates Lounge
Quick Shop
Phreak Klass 2600
The Brewery
The Works
Slaughterhouse 5, Holovision Network Node 1
Spock's Brain
Special Thanks to: The Prophet, for his excellent file: Unix Use and Security
From the Ground Up.
The End, good luck, enjoy yourself, and don't get caught!
Lord Lawless
Phortune 500/BOD
--This has been a Lord Lawless Presentation, (C) 1987.--
u are a super user that dir contains
much that will be useful to you.
In order to move up to a directory one level higher than you are presently in,
type "cd ..". So to move from /Bill/files to /Bill I would just type cd ..
and, assuming I started in /Bill/files I would now be in /Bill.
Ok, now you can wander the system "cat"'ing around and whatnot. If a file
doesn't "cat", try just typing it's name, that will execute it if you have the
privileges. Try typing "admin" or "ua" if you are a superuser nad maybe you'll
be able to create users or other interesting things. You may not be able to
cat a file or run it because you lack access permissions. What are they? Re

View File

@@ -0,0 +1,206 @@
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Always start a program with a batch file containing [exit] as the first line.
This is important if you! Let's say you already have shelled to dos from
windows, dmp or another program. Running two big shells on top of eachother
really fuck up your memory, and usually requires a reboot. Replace win.exe
with win.bat and move win.com to winfile.com, and dmp.exe with play.bat and
dmpfile.exe, just as an example.... | The bat files is to contain lines:
1 - exit 2-[program].[extension]
-------------------------------------------------------------------------------
If you have 4dos, you can create aliases that replace the programs. Like:
win=exit^win
, etc.......
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Your path statement should NOT exceed 127 bytes. Remember that "path="
is a part of that environment string.
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
If you ever need to turn a variable to UPPER CASE, save the path, set the
path=[the variable], which will make it uppercase, set the original
variable=[path], and restore the path... This might look like this:
set oldpath=%path%
set path=%a%
set %a=%path%
set path=oldpath
This requires a lot of environment free, depending on you system-configuration.
Suggestions to improvements: Use disk instead of environment to store
temporary data.
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
A very simple trick to expand the current path, is to set the path like this:
set path=%path%;[the new directory you want temporarily in your path]
Don't say you wasn't warned! VERY simple!
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
if you like to have a lot of REM statements in your batch files, use this
instead:
When you normally-
rem blahblahblahblablahblahblah
rem blahblahblahblablahblahblah
rem blahblahblahblablahblahblah
rem blahblahblahblablahblahblah
replace it with,
goto a
rem blahblah........
:a
Which is faster, but not really noticeable on todays fast computers
Dos really don't know that it's handling a REM line until it has processed
and read the whole line!
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
To prevent programs from messing up your autoexec.bat, as a first and only
line in autoexec.bat, start a new batch file, called, for example,
autosub.bat. This file would contain your originally autoexec.bat, and
this way, you can select what lines you want to include.
You might also try to set the read only attribute of the config.sys and
autoexec.bat files. Not so good solution, but......?
-------------------------------------------------------------------------------
With 4dos you would start the autosub.bat with a CALL autosub.bat.
With command.com, i dunno, try c:\autosub.bat as a first line...
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
again, a tip for slow computer, or really, slow text subsystems:
In the beginning of your config.sys, put a:
ctty nul
which sends all output to the NUL: device
and then in the end:
ctty con
which restores input from the kbd....
Remember that you can't really press ctrl-break during process
since you haven't restored the keyb-control, and a ctrl+c will stop
processing and deny any further processing...
The NUL device is an empty device that points to nothing. This might be useful
if a program refuses to let you NOT save a file. Type NUL: or NUL as filename,
and you will never see the file again!
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
There is an undocumented config.sys feature called "Comment".
Use it like this:
Comment=[text]
Dos only captures the first to letters of the text, and COMMENT is not
case-sensitive. After comment, dos ignores all lines that begins with
the same two letters as the first two letters of [text] was. Let's say you
don't want any drivers installed, you specify:
Comment=De
,which in turn makes dos NOT install any DEvices.
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
I found two other undocumented config.sys features. One of which I know the
meaning of. (See it for yourself, just list io.sys.) The features is:
INSTALLHIGH
MULTITRACK
Installhigh is like devicehigh and loadhigh, but it INSTALLs high, just like
dvh and lh. (Installing is for starting exe/com files from config.sys that
are not really needed for installing here...)
Multitrack...
I dunno what this is, but I will investigate it further, and get back to you.
If you know what this is, please contact me.
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Sometimes the order of fcbs, stacks, files, etc... DO COUNT!!!
You might run into some RARE problems when the order of these
"names" is in a certain order. It occoured to me that it was this way, when I
suddenly had problems when the machine locked up whenever I used the internal
"copy" !!! I had to rem out every line in autoexec.bat (really autosub.bat),
and then every line in config.sys, until I suddenly found out that the
order DO COUNT!
Generally, I put it in this order (at the absolute beginning of config.sys):
files
buffers
fcbs
lastdrive
stacks
That works ok for me.
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Set verify=on when using non-standard devices in dos.
This helps you PKUNZIP (and arj, lha...) and copy from, for example,
84track 21sec/track disks. You might think that this isn't a problem, and
it is very rare indeed... ,But it happens, and the extra time dos uses with
disk sector verifying is really worth it.
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Set break=on to be able to break more often.
Everyone needs a break sometimes....... =*)
The extra speed gained in dos by setting break=off, isn't THAT much, and
when you set break=on, you can break unwanted processes faster, which makes
dos sessions go faster.
Have you ever COPYed files to the wrong destination? When break=on, dos checks
for ctrl+c even when handling disk operations, so you can break relatively
fast, and recover faster...
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Do you need to know if to files is different?
As far as I know, fc or comp don't leave errorlevels, BUT there is a
solution!
Try this:
attrib -rsh .\nomatch
del .\nomatch
fc %file1% %file2% > .\nomatch
if exist .\nomatch echo There was a difference!
Nice, eh? Not? =*)
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Want to copy disks faster? You COULD check which clusters were occupied, etc..
BUT if you aren't so keen on writing anything else than bat-files, just copy
ALL files on you floppy (/S /H) to a temporary directory on your hd, copy
labels (with LC.btm). Then MOVE them out again to disk, and you are done!
No empty clusters copyed!
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,441 @@
----------------------------------------------------------------
RECHARGEABLE BATTERIES AND LAPTOP COMPUTERS
----------------------------------------------------------------
No other topic seems to inspire more opinion and comment than
the proper care and handling of rechargeable laptop and notebook
computer batteries. Should you slow or fast charge them? What is
the true life of a rechargeable battery after which it must be
disposed? Do rechargeable batteries have a "memory" effect? Can
nickel-cadmium batteries explode when charging or discharging?
Although this tutorial may seem technical in places, try to read
ALL of it since battery power may be your only source of laptop
power on many occasions.
For many portable computers a variety of rechargeable battery
options exist today. But frequently it comes down to the old
standby: nickel-cadmium batteries. Ubiquitous in consumer
electronic items such as shavers, flashlights, toothbrushes and
radios, nickel-cadmiums or "nicads" are a reasonable balance of
power, cost and weight and are used by many computer
manufacturers as the portable power source of choice. Let's
scratch the surface on the topic since there is QUITE A BIT the
manufacturer doesn't tell you about nicads....
Glance at the following chemical equation which is at the heart
of the nickel-cadmium cell reaction. Don't get overly anxious
because high school chemistry was not your favorite subject.
We'll take things slowly....
<-----
Cd + 2 NiOOH + 2 KOH -----> Cd(OH) + 2NiO + 2 KOH
2
In this highly simplified reaction sequence, electricity is
generated when the reaction proceeds in the direction of the
right pointing arrow, the discharge cycle. If the reaction
proceeds in the left direction the cell is charging.
In simplest terms, a nicad cell (a battery is constructed of
several cells hooked together) has a positively charged plate of
nickelic hydroxide and a negative plate of metallic cadmium. The
liquid between the positive and negatives plates which
facilitates this chemical reaction is usually a dilute solution
of potassium hydroxide - similar to lye or the Draino (tm)
solution your pour down the sink to clean your plumbing. When
discharging and thus producing electricity, the nickelic
hydroxide is reduced to nickelous hydroxide as hydroxyl ions
from the potassium hydroxide electrolyte combine with the
cadmium metal of the negative plate of the cell to form cadmium
hydroxide. Cadmium is oxidized when this happens and electrons
are provided into the external circuit, such as your laptop
computer.
When charging, the process reverses and hydroxyl ions combine
with the nickel which accepts electrons from the external
charging circuit. Notice that the electrolyte, potassium
hydroxide is unchanged with two atoms or units produced on both
sides of the chemical equation whether charging or discharging.
This is why you do not need to add more water to a nicad battery
which operates as a sealed reaction container. It regenerates
its electrolyte in both the charge and discharge cycles.
All of this is an ideal nicad cell. The real world of computers
and rechargeable batteries is not quite that simple. The first
SERIOUS item to consider is that all nicad cells and batteries
generate gas during both the charging, and to a lesser extent,
discharging cycle.
During recharging, oxygen gas is generated at the positive
electrode while hydrogen gas is produced at the negative
electrode. In other types of rechargeable cells, a standard lead
acid car battery for example, these gasses are usually released
into the atmosphere. The nicad cell does not have this luxury
since it must operate cleanly and with minimum release of gasses
or liquids. To minimize hydrogen gas release, nicad cells
usually have an oversized negative electrode which tends to
reabsorb hydrogen gas. In addition oxygen is recycled by
combining with metallic cadmium to produce cadmium oxide. So
called "fast-charging" nicad cells prevent gas buildup and
dissipate some of the heat generated during the quick charge
cycle by further enlarging the electrodes. Heat and gas buildup
is thus controlled and kept to tolerable limits in quick charge
nicads.
The first of several lessons which can be derived from this
technical discussion is that the buildup of hydrogen and oxygen
gas during the charging cycle is normally dissipated unless HIGH
recharging rates are attempted or unusually high temperatures
are produced. If the nicad cell is charged at abnormally high
rates the oxygen gas cannot dissipate and will EXPLOSIVELY
rupture the cell.
A safety system of sorts exists within the design structure of
most nicad cells via a pressure venting system - a plastic
diaphragm membrane at the top of the cell and small external
hole or "exhaust vent." In theory the system safely vents excess
pressure and then reseals. In practice the resealing is never
complete and the cell may continue to ooze caustic electrolyte
or worse the vent may not open soon enough and the cell may
simply explode. The vent is really designed for SEVERE charging
or discharging rates. In normal use it should NEVER activate; if
it does, the battery should be discarded. In cases of massive
overcharge or discharge the safety vent is usually too little
too late and a dangerous battery explosion takes place anyway.
During rapid discharge - short circuiting the nicad cell or
battery with a piece of wire, for example - gas buildup and heat
can be generated and a violent explosion can occur. Another
reason why nicads can explosively burst when short circuited and
forced to discharge quickly is that they have relatively low
"internal resistance" which allows them to dump their electrical
capacity quickly and with explosive force.
Common zinc carbon batteries have a much higher internal
resistance and when shorted may produce serious burns to your
fingers from melting wire but usually will not explode due to
sudden gas buildup. On the point of sudden nicad discharge by
short circuit you might be tempted to say that it would be highly
unlikely with a portable computer battery. Not so. Tales are
told of laptop computer batteries which have exploded when a
careless owner shoved several fully charged nicad batteries in a
travel case with a set of spare keys. If the keys accidentally
contact both the positive and negative poles of the nicad
simultaneously, a violent explosion reaction can occur!
Clearly nicads have some unusual features to be respected and
understood. Be careful with charged nicads and treat them as the
small "hand grenades" which they can become. Heat, sudden short
circuits and high rates of charging are the problem in this
area.
The correct operating temperature for discharging and recharging
nicads is from 65F to 85F, according to most manufacturers. High
and low ranges of from +32F to 115F are possible as upper and
lower limits if nicads MUST be used in extreme environments
although discharge and recharge efficiency may be adversely
affected - it may require more power to fully charge the battery,
charge may not be held for as long on the shelf after charging
and finally discharge may not produce a full three or four hour
computing session at these severe temperature ranges.
Electrically, individual nicad cells - the units which are
hooked together to produce the final battery - have a charged
voltage of 1.25 volts. Nominally this drops to 1.2 volts under
actual discharge use or "load" in the electrical device.
Individual cells are strung together in "series" with the
positive terminal of one cell touching the negative terminal of
the next cell in sequence to raise the voltage to that suitable
for the electrical device. Thus two cells hooked in "series" as
a battery produce 2 X 1.2 volts = 2.4 volts. Likewise, three
cells connected as a battery produce 3.6 volts. By the way,
ordinary flashlight batteries of the carbon zinc type have a
nominal voltage of 1.5 volts compared to the 1.2 volts of the
nicad cell.
Nicad batteries have an unusual and highly characteristic
discharge behavior which is best described as "a stable
discharge plateau then sudden voltage drop." Essentially a fully
charged nicad battery provides constant voltage and current
until near its exhaustion at which point the voltage SUDDENLY
DROPS and the cell is, for practical purposes, completely
discharged.
Compare this to standard carbon zinc and alkaline batteries
which gradually drop in voltage and amperage through the
discharge cycle of the battery. In use nicads tend to be stable,
then die suddenly at the end while conventional non-rechargeable
batteries slowly decay in voltage as their power is consumed.
One conclusion you might draw from this is that when your
portable computer beeps that the nicad battery voltage is
nearing exhaustion you literally have only moments of use left!
The good news is that nicads produce dependable power through
their discharge cycle which is highly desirable with digital
data and computer memory devices.
The "memory effect" of nicads is perhaps the most discussed and
misunderstood phenomenon associated with nicad cells and
batteries. An undesirable and somewhat unique characteristic of
nicad batteries that they can develop a "memory" which can
decrease either the capacity or voltage of the battery.
The first type of memory problem in nicads - voltage memory - is
caused by sustained charging over many days or months. This
memory effect can be accelerated by high ambient temperature
extreme duration of charge and high rate of charge. In effect
the battery is charged for such a long period of time or at such
a high rate or high temperature that the efficiency of the
chemical reaction is impaired and proper terminal voltage
readings are not achieved.
In the second, more common "memory capacity" problem, the nicad
loses the capability to deliver its full power capacity. One
cause of this peculiar memory problem is the FREQUENT PARTIAL
DISCHARGE of the battery - use for perhaps 30 minutes - and then
full recharge again. In effect the nicad battery "learns" that
only part of its capacity is used and over several cycles of
"partial depletion and then full recharge" that less then full
capacity is needed. It will then be unable to deliver a full
two or three hour standard discharge in normal use. Fortunately
memory effects are usually temporary and can be reversed.
The chemical basis for these two memory effects is not fully
understood, but may have to do with obscure oxidation reactions
which temporarily coat the internal electrodes of the battery
with thin layers of complex non-reactive chemical compounds
which can be removed by more fully "exercising" a nicad through a
complete charge/discharge cycle.
It is claimed by many manufacturers that this odd memory effect
of nicads has been largely eliminated due to modern
manufacturing methods. However to some degree this may in fact
be a result of newer charging systems and the relatively
complete discharge of nicad power by modern laptops. In effect
the batteries are charged and discharged in a more appropriate
manner by most laptop users so memory effects "appear" to be no
longer a problem.
Both memory problems - voltage memory and capacity memory - are
usually temporary and can be corrected by discharging the
battery to or very near its exhaustion point (optimum drawdown
voltage is about 1.0 to .9 volts for a standard 1.2 volt nicad)
and then recharging it to full capacity. Repeat this discharge-
recharge cycle from 2 to five times and frequently the nicad
will lose its memory for the "partial capacity" and again
provide a full 3 or 4 hours of use in most laptops. Actually,
frequent FULL discharge and recharge prolongs the life of a
nicad. The more you use them the longer they last!
Most folks who want to completely discharge laptop nicads simply
leave the computer on until it runs down. A much faster method is
to use the following batch file which continuously reads the
directory of a disk and writes the contents to a disk file.
The continuous disk access drains nicad power much faster. If
you are not familiar with batch files, read the batch file
tutorial elsewhere in this program. Here's the three line batch
file. To stop the batch file at any time press the control and
break keys simultaneously. When finished you may wish to erase
both the batch file and the small file named "test" which it
creates.
:start
dir>test
goto start
As an aside, the newer nickel-hydride batteries used in some
laptop and notebook computers do not seem to suffer from memory
effects. But these batteries are more expensive and not in
common use by most laptop manufacturers.
Nicads do eventually fail. And for various reasons. Temporary or
partial failure due to memory effects was discussed in the
previous paragraphs.
Permanent failure - usually between 3 to 5 years into the life
of a typical nicad can happen due to the growth of
characteristic "whiskers" of conducting chemical compounds which
effectively bridge the internal gap between the positive and
negative electrodes inside the battery. Effectively these small
contamination deposits gradually short circuit the battery
internally which leads to inability to charge or discharge. Some
clever electronic hobbyists build high current "surge" power
supplies which can burn open these internal deposits and reopen
the gap between positive and negative electrodes. A risky
practice at best - given the explosive reputation of nicads - but
"zapping" nicads in this manner has been documented as one way
to add life to an otherwise dying battery. A risky an usually
ill-advised attempt to salvage an otherwise dying battery.
A different permanent failure can result from premature loss of the
liquid electrolyte from the battery. High temperature and/or
high charging rates are usually the cause here. Quick-charge
batteries frequently fail due to this problem if their charging
circuits are not properly designed. If the top edge of the cell
which contains the fail safe pressure release valve has a
buildup of white corrosion powder this is probably the residue
ot the expelled electrolyte and the cell may be on its way to
failure and should be replaced. Note that you can only see this
corrosion buildup on the top of the SINGLE nicad cells which are
usually encased within a surrounding plastic battery housing.
The plastic housing may show little problem externally.
Generally, however, the average computer user should not attempt
to open the protective plastic case of the battery to examine
each cell. If the manufacturer seals several individual nicad
cells in a plastic battery container it is for GOOD reason and
your own personal safety. As a rule quick charge nicads do not
last as long a regular nicads due to heat build up during the
charging cycle.
So how long will a nicad battery last before complete failure
occurs? Manufacturers estimate LOW figures between 500 and 1,000
full charge and discharge cycles or about 3 to 5 five years, as
noted above. Some nicads have been known to approach 5,000 to
10,000 charge and discharge cycles before permanent failure.
Excessive quick charging, heat buildup, infrequent use and lack
of full charge all contribute to shortened nicad lifespan.
Charging and discharging mathematics...
Charging nicads is generally done automatically by a charging
circuit. Two practical pieces of advice: 1) if the battery
becomes VERY hot something could be wrong 2) if the manufacturer
tells you that the battery will be fully charged after a certain
length of time although it can be left charging longer you will
probably do the nicad a favor by removing it after full charge
is reached. Some clever nicad users simply attach an inexpensive
electrical timer - similar to those used to turn lights on and
off in the evening - directly to the nicad charger to prevent
overcharging.
Generally nicads have a proper charging rate which depends on
each manufacturers recommendation. For standard nicads which are
NOT quick charge types the proper slow or "trickle" charge rate
is determined by dividing the ampere hour capacity of the
battery by 10. For example if a nicad has a total capacity of 1
ampere hour, dividing this by ten (1/10) produces a correct
trickle charging rate of .1 amps or 100 milliamps. Quick-charge
nicads can accept a charge rapidly and the suggested charging
rate is determined by dividing the ampere hour capacity of the
battery by 3 rather than by 10. These figures represent the
trickle charge rate which theoretically means the nicad "could"
be safely left charging indefinitely without harm.
Higher efficiency chargers are designed not to simply trickle
charge nicads but start a discharged battery at a HIGH rate of
charge and then taper the charging current back quickly to the
safer "trickle" charge rate once full charge is reached. Usually
for regular nicads this "initial surge charge" can be as high as
the ampere hour capacity divided by 3. For quick charge nicads
this "initial surge charge" can be as high as the ampere hour
capacity divided by 1. Obviously these are very high charge
rates and are provided to discharged batteries and then
quickly discontinued once full charge is approached. Clearly a
charging circuit of this sophistication is expensive and may
even contain its own microprocessor to sense the discharge level
of the nicad and calculate the optimum charge rate, time and
trickle charge transition. Since we have previously discussed
the adverse affect of heat on nicads it is essential to note
that NICADS SHOULD BE CHARGED IN A COOL OR ROOM TEMPERATURE
location since they normally generate heat when charged. If you
minimize heat buildup - especially during the charging cycle -
you will prolong the useful life of your nicad battery.
Discharging a nicad - especially if you are trying to remove a
"memory" problem such as that discussed earlier does NOT mean
discharging a cell to zero volts. Usually the correct discharge
voltage is about 1.0 volts. This may seem odd when you consider
that the fully charged cell has a 1.2 volt reading, but in fact
at 1.0 volts a typical nicad cell has released about 90% to 95%
of its energy - another eccentric, but predictable behavior of
nicads given the rapid "voltage drop off" as they near the end
of their three or four hour life in a laptop computer.
Shelf life. While carbon zinc and alkaline batteries can hold
their charge for years, nicads lose their charge relatively
quickly. Although it varies, one quick rule of thumb is that a
typical fully charged nicad will lose roughly 25% to 35% of full
charge in one month. Then another 25% to 35% of THE CHARGE
REMAINING in the next month. And so on and so on. Thus if you
have several nicad batteries you want to charge for a trip you
will be taking in a month, it is probably better to charge ALL
OF THEM the final week just before the trip rather than the
month before. For want of a better phrase, this might be called
"shelf discharge" and is normal with all nicads and has to do
with slight electrical leakage and chemical compound decay
internally within a charged nicad which sits on a shelf. Cooling
or refrigerating the nicad (but NOT freezing) will slow this
"shelf discharge" since you are cooling and slowing the
breakdown reaction. In fact ALL batteries will last longer when
refrigerated until they are used. Simply store them in
individual sealed plastic bags (to minimize moisture
condensation) and place them in the refrigerator.
And so we conclude with a little summary....
1) Do exactly what the manufacturer suggests for both
discharging and recharging a nicad.
2) Keep temperatures - especially during charging - cool or at
normal room temperature.
3) Never short circuit a nicad intentionally or accidentally.
4) Try cycling a nicad through several COMPLETE discharge and
recharge cycles if it "appears" to be faulty an incapable of
operating your equipment for a normal three or four hour
operating period.
5) Remove nicads from charging circuits or discontinue charging
when full charge has been reached.
6) Watch for white flaky corrosion deposits on the upper edge of
the cell near the pressure vent this can mean impending cell
failure and electrolyte loss.
7) Dispose of permanently defective nicads properly - contact
the manufacturer for instructions since cadmium is a dangerous
toxic metal and has been banned from many dump sites. Try
calling your local city hall and ask who can answer a question
about cadmium metal waste disposal.
8) When the nicad battery power begins to drop near the end of a
discharge cycle it will drop VERY QUICKLY due to the rapid
characteristic dropoff of nicads. Prepare for laptop shutdown
quickly.
9) Cycle your nicads through a FULL DEEP discharge and FULL
COMPLETE recharge frequently - they will last LONGER before you
must dispose of them and deliver MORE power when used.
10) Infrequently used nicads should be charged and discharged at
least once or twice every two or three months to prolong their
usable lifetime before permanent failure.
11) If your nicads are stated by the manufacturer to be quick
charge type, you can probably prolong their life by slow or
trickle charging them (if your charger provides that option)
since you will minimize heat and gas buildup within the cell.
Just because they can be quick charged does not mean they MUST
be quick charged. Nicads last longer and deliver more power when
not driven to extremes of temperature or overcharging.
Tutorial finished. Be sure to order your FOUR BONUS DISKS which
expand this software package with vital tools, updates and
additional tutorial material for laptop users! Send $20.00 to
Seattle Scientific Photography, Department LAP, PO Box 1506,
Mercer Island, WA 98040. Bonus disks shipped promptly! Some
portions of this software package use sections from the larger
PC-Learn tutorial system which you will also receive with your
order. Modifications, custom program versions, site and LAN
licenses of this package for business or corporate use are
possible, contact the author. This software is shareware - an
honor system which means TRY BEFORE YOU BUY. Press escape key to
return to menu.

View File

@@ -0,0 +1,200 @@
_OPTIMIZING IN A PARALLEL ENVIRONMENT_
by Barr E. Bauer
[LISTIN<49> ONE]
program test 1
* 2
* purpose is to test SGI parallelization scheme for loop selection, 3
* numerically-intensive calculations, and total reduction. See text 4
* for details. 5
* 6
parameter (MAXFIRST=250, MAXSECOND=250, MAXTHIRD=10) 7
real*8 a(MAXTHIRD,MAXSECOND,MAXFIRST) 8
real*8 b(MAXTHIRD,MAXSECOND,MAXFIRST) 9
real*8 sub_total(MAXFIRST), partial_total(4) 10
real*8 d(MAXTHIRD), c, tmp ! local variables 11
real*8 dist(MAXSECOND,MAXFIRST), grand_total 12
real*8 grand_total ! test for proper operation 13
logical parallel ! selects 2-version loops 14
integer*4 iflag ! used to show LASTLOCAL value 15
16
data parallel /.false./ 17
data sub_total, iflag /MAXFIRST*0.0, 0/ 18
* 19
* outer loop: contains both interior loops 20
* 21
22
* C$doacross local(k,j,i,tmp,d,c), share(a,b,sub_total,dist), 23
* C$& lastlocal(iflag) 24
25
do i = 1, MAXFIRST 26
* 27
* first inner loop: fills arrays a and b 28
* 29
30
* C$doacross local(j,k,c), share(i,a,b) 31
32
do j = 1, MAXSECOND 33
do k = 1, MAXTHIRD 34
a(k,j,i) = dsqrt(dfloat(i*j*k)) 35
c = 1.0 - a(k,j,i) 36
if (c .le. 0.0 .and. i .lt. j*k) then 37
c = -c 38
else 39
c = c**2 40
endif 41
b(k,j,i) = 32*(dcos(c)**5)*dsin(c)- 42
1 32*(dcos(c)**3)*dsin(c)+ 43
2 6*dcos(c)*dsin(c) 44
enddo 45
enddo 46
* 47
* seond inner loop: determines distance and starts summation 48
* 49
50
* c$doacross local(j,k,d,tmp), share(i,a,b,dist,sub_total), 51
* c$& lastlocal(iflag) 52
53
<EFBFBD> do j=1, MAXSECOND 54
tmp = 0.0 55
do k = 1, MAXTHIRD 56
d(k) = a(k,j,i) - b(k,j,i) 57
enddo 58
do k = 1, MAXTHIRD 59
tmp = tmp + d(k)**2 60
enddo 61
dist(j,i) = dsqrt(tmp) 62
if (dist(j,i) .le. 0.1) iflag = iflag + 1 63
sub_total(j) = sub_total(j) + dist(j,i) 64
enddo 65
enddo 66
* 67
* the next section is an example of sum reduction optimized to the 68
* parallel environment and the use of a more efficient 2 loop summation 69
* 70
* if -mp option is active, parallel is set to .true. which then 71
* selects the parallel version 72
* 73
74
C$ parallel = .true. 75
grand_total = 0.0 76
if (parallel) then ! parallel version 77
C$ num_threads = mp_numthreads() 78
ichunk = (MAXFIRST + (num_threads - 1))/num_threads 79
80
C$doacross local(k,j), 81
C$& share(num_threads,partial_total,sub_total,ichunk) 82
83
do k = 1, num_threads ! this loop is parallelized 84
partial_total(k) = 0.0 85
do j = k*ichunk - ichunk + 1, min(k*ichunk,MAXFIRST) 86
partial_total(k) = partial_total(k) + sub_total(j) 87
enddo 88
enddo 89
do j = 1, num_threads ! smaller loop handled as scalar 90
grand_total = grand_total + partial_total(j) 91
enddo 92
else ! the scalar version 93
do j = 1, MAXFIRST 94
grand_total = grand_total + sub_total(j) 95
enddo 96
endif 97
98
if (parallel) then 99
C$ write (*,10) grand_total, num_threads 100
C$ write (*,20) iflag 101
else 102
write (*,30) grand_total 103
write (*,40) iflag 104
endif 105
stop 106
C$10 format(1x,'grand total = ',g10.3,'threads = ',i4) 107
C$20 format(1x,'parallel iflag = ',i10) 108
<EFBFBD>30 format(1x,'grand total = ',g10.3) 109
40 format(1x,'scalar iflag = ',i10) 110
end 111
[LISTIN<49> TWO]
(source code)
subroutine example(a, b, c, n)
integer*4 n
real*4 a(n), b(n), c(n)
(additional code)
c$doacross local(i, x)
do i=1, n
x = a(n) * b(n)
c(n) = x**2
enddo
(additional code)
return
end
(the loop is transformed to)
subroutine _example_1(
1 _local_start, ! index starting value
<EFBFBD> 2 _local_ntrip, ! number of loop executions
3 _incr, ! index increment
4 _my_threadno) ! unique process ID number
integer*4 _local_start, _local_ntrip, _incr, _my_threadno
integer*4 i ! declared local
real*4 x ! declared local
integer*4 _tmp ! created local
i = _local_start
do _tmp = 1, _local_ntrip
x = a(i) * b(i)
c(i) = x**2
i = i + _incr
enddo
return
end
Exampl<EFBFBD> 1<> A typical D<> loop
do i = 1, n
a(i) = x * b(i)
enddo
Exampl<EFBFBD> 2<> <20> D<> loo<6F> i<> whic<69> th<74> arra<72> variabl<62> reference<63> <20> <20>
valu<EFBFBD> tha<68> i<> no<6E> curren<65> wit<69> <20>h<EFBFBD> index
do i = 2, n
arr(i) = b(i) - arr(i-1)
enddo
Exampl<EFBFBD> 3<> A<> exampl<70> o<> loa<6F> imbalance
do i = 1, n
do j = 1, i
a(j, i) = a(j, i) * xmult
enddo
enddo
Exampl<EFBFBD> 4<> Loa<6F> balancing
num_threads = mp_numthreads()
c$doacross local(i, j, k)
do k = 1, num_threads
do i = k, n, num_threads
do j = 1, i
a(j, i) = a(j, i) * xmult
enddo

148
textfiles.com/computers/bb Normal file
View File

@@ -0,0 +1,148 @@
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ<EFBFBD><C4BF><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ<EFBFBD><C4BF><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20><><EFBFBD><EFBFBD>Ŀ<EFBFBD><C4BF><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ<EFBFBD><C4BF><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
<20> ڿ <20> <20> <20><> <20><> ڿ <20> <20> ڿ <20> <20> <20><> <20><> ڿ <20>
<20> <20><> <20> <20> <20><><EFBFBD><EFBFBD><EFBFBD>Ŀ <20><>ٳ <20><> <20> <20> <20><> <20> <20> <20><>Ŀ <20><>ٳ <20><><EFBFBD><EFBFBD>
<20> <20><> <20><> <20> <20><> <20> <20> <20> <20><> <20> <20> <20><> <20><> <20> <20> <20> <20> <20> <20><>Ŀ
<20> ڿ <20><> <20> <20><> <20> <20> <20> <20> <20> ڿ <20><> <20> <20> <20> <20> <20><>Ŀ <20>
<20> <20><> <20> <20> <20><>Ŀ <20> <20> <20> ڿ <20> <20> <20><> <20> <20> <20> <20> <20> <20>Ŀ<EFBFBD> <20>
<20> <20><> <20> <20> <20> <20> <20> <20> <20><> <20> <20> <20><> <20> <20> <20> <20> <20> <20> <20><> <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Copyright 1986 Bon Erreur Logiciel, S.A.
by Tim Conner, Jr.
Hello and welcome to Beta Bits! This *** CONTINUED FROM LEFT COLUMN ****
area of PC GAZETTE will cover the world Item Compaq IBM IBM Modified
of software. This includes what is now Name PC-Plus PC/XT AT IBM AT
available and what is coming out in the ---------------------------------------
future. I will be writing about Standards:
software program being beta tested and
those programs that are coming out. Disk Size 10 M. 10 M. 20 M. 20 M.
Mem Chip 4.77 4.77 6.22 10
As a beta tester for five major
software companies, I have the dubious
honor of really testing the new Ver. 1.3:
software releases before it is released
to the general public. Mem Test N/A N/A N/A N/A
Disk Dir 1'22" 1'52" 58.0" 45.7"
You are probably wondering what a Beta Opt 5'32" 16'12" 22'23" 14'12"
Tester does. Well, it is a group of
dedicated users that a software company
picks to have test every possible Ver. 2.0:
aspect of their products. This includes
testing of software, read the manual(s) Mem Test 6.0" 7.2" 3.1" 2.6"
for clarity and ease of use. Also, to Disk Dir 1'34" 2'12" 1'2" 58.0"
test each and every item that the Opt 13'42" 13'56" 15'22" 9'42"
software company claims to have fixed,
added, or changed. All of this is very
important to the company as that the As you can see from the above chart,
final software product will either be that this new version 2.0 will take a
profitable or a bust! bit more time to optimize. However, I
have not optimize my hard disk on any
In this premier column, I will be of the machines in over three weeks!
addressing several new items that I am When I was using the 1.3 version, I
currently beta testing and somewhere usually had to optimize the hard drive
else in this issue is a review of a San every other day. Thus, you now see the
Francisco company's two entries into savings in doing an optimization every
the software market. so often.
One last note, I am not being paid and To order release 2.0, call or write to
I am not endorsing any products the address below:
appearing in Beta Bits or Quicksilver's
Review. All of these reviews and Softlogic Solutions, Inc.
articles appearing in PC GAZETTE are 530 Chestnut Street
strictly for informing you, the public, Manchester, New Hampshire 03101
of any new items that you might Toll Free Order Number: (800) 272-9900.
purchase in the near future.
Now that all of the above is over with, Expected release of Disk Optimizer
let's take a look of what is happening version 2.0 will be in two months.
out in the world of software.
Beta Testing #2:
Quicksilver's Snap Judgments: ----------------
------------------------------
In the Snap Judgments Department, you This beta testing is actually a
may want to wait on your purchase of preliminary report on Borland's Turbo
Microsoft's QuickBasic version 2.0. Pascal version 4.0.
The reason is that the company is going
into hi-gear fixing several bugs and So far, I have been beta testing for
including a debugger called CodeView over two months on the new release of
into the package. The estimated time Turbo Pascal and I have been really
table for release 3.0 of QuickBasic impressed by this release. The many new
will be within the next four months. features includes the following:
In other news, those fun loving folks 1) Ability to connect with other
at Ashton-Tate are hurrying to put out Borland products such as Turbo
a newer version of dBase III Plus. I Prolog and Turbo Lightning.
will bet that even with the new 2) End of the 64k code barrier.
release, that there will be more bugs 3) A new quick compiler which speeds
with the software due to the hurried up the compiling time.
pace.
Within the next month, Microsoft will As of now, the beta testing is going
be releasing the new 'C' language rather slowly. Several beta testers
version 4.0. If you are a registered have found many bugs with this test
user of Microsoft's C or Lattice 'C', version. Borland is trying to fix all
you might want to get in touch with of the problems with another test
Microsoft for their newer version! version due for release to the beta
Version 4.0, is very compatible to testers shortly.
either UNIX or XENIX. This version will
include the new CodeView(R) for I will be giving you a full detailed
debugging. Microsoft's phone number report on Turbo Pascal Version 4.0 in a
is:(206) 882-8080. future column.
Beta Testing #1:
---------------- Quicksilver's Pet Pieves:
I am currently beta testing a newer -------------------------
release of Disk Optimizer from
SoftLogic Solutions. This section is where you get a chance
to blow off some steam against software
This version (2.0), is a major companies. If you have any complaints,
enhancement from the old release 1.0 or questions, tid-bits, or comments,
1.3. Many of these enhancements please leave E-MAIL (address to Tim
includes the following items: Conner) at either Polaris BBS or
InfoLink Network. The author reserves
1) A preliminary memory test the right to edit any mail that I use
2) Verifies DMA to disk transfer in this column. Please when you leave
from all memory mail, leave your full address as I am
3) Performs READ AFTER WRITE planning to send any comments (good or
verification bad) to the software company for their
4) Displays visual feedback of the responses.
process
5) Sub-directories are no longer Let's start off this section with one
sorted of my pet pieces.
6) Does NOT alter any file/directory
with an attribute of Hidden or To Ashton-Tate: Where is the dBRUN
System program that you have promised to all
7) For DOS 3.x users: Allocates all of those buyers of dBase III Plus
directories as close to the File package?? Originally, the dBRUN
Allocation Table as possible program was due out by May 1986 and it
8) Allocates COM, EXE, SYS, OVL and has been delayed over four times!! Get
Read Only files to the beginning on the ball, folks!!
of the disk, following the
directory clusters. The Final Word:
9) Allow up to 40 levels of sub- ---------------
directory nesting
10) Allow up to 1000 directories I hope that you enjoy Beta Bits. Since
11) Tolerates file names that begin this is the first column, I will
with a period promise to make this column much better
12) Displays the full disk statistics in the future. All comments are greatly
at the end welcome. Please send your comments to
13) Displays file names and parent either Polaris BBS or InfoLink Network.
directory or directory name The board's phone numbers are listed
when a read error occurs. elsewhere in this issue.
14) Recovers unused clusters caused
by deleting files from sub- Within the next few months, I will be
directories. beta testing several software packages
from Microsoft and several software
So far, the beta testing is currently packages from Europe. Europe??
in it's fifth test. It is about 85-90%
completed. Some minor bugs have been Yes, I said Europe. I will be going
found and I expect that this will be over to Europe to visit and to
remedied within the next test. interview the president of the French
version of Philipe Kahn's Borland
Here are some test timing information International. I will also report on
utilizing version 1.3 and the new the software industry and the
version 2.0 (test #5). Remember, this availability of American software and
test is being conducted on 3 different magazines. Who knows, I might get an
machines with different set-ups. exclusive for PC GAZETTE. I think that
this will be a first for this
*** CONTINUED ON RIGHT COLUMN *** electronic newspaper!!


View File

@@ -0,0 +1,55 @@
=====[ YOUR SYSTEM HAS NOISE ]==============================================
Written by Bill Noel
Your system has noise!! Ever heard that from one of your users? Of
course you have. And did you have a problem? Most likely not. If you
had a noisy line then all of your calls would have been noisy. Then
where is the problem? It is in what is known as the trunking network.
The Trunking Network is a series of lines and trunks that connect
switching offices. All offices do not have direct trunks, so they are
routed through a connection office. Sometimes these trunks operate on
copper cable, sometimes onT-Carrier, and sometimes on the Fiber Optic
cables that are currently being installed. Any one of these methods can
cause data problems. In fact, any carrier system can cause one way data
errors. That is, the BBS can be seeing errors and the user does not see
them, or vice versa. The latter problem makes your user know for sure
that your BBS is in trouble.
Trunking Network problems are the most difficult problems to solve.
Southern Bell does not train their Repair Clerks to handle trunking
complaints. What you should do when you experience data problems to a
certain exchange is listen to a quiet line into that office. Try to
describe the problem in terms of steady noise, "popping," "frying,"
"other people on the line", etc. Tell the repair clerk that you always
have this type of problem when calling the 457 exchange when calling
from the 999 exchange. Tell her this is a trunking problem and to
please really the report to Trunking Maintenance. Never tell her that
you have a data problem. Southern Bell does not guarantee data
transmission on non-conditioned lines. (However, a non-conditioned line
that meets all of their normal residential service requirements will
support data up to 2400 baud with very little problems). Remember that
when you buy a cheap modem, you get a cheap modem. Why was it cheap?
Because they left things out like noise filters! Keep that in mind when
you buy.
But what if you are really having trouble on you line? Be careful
before calling Ma Bell with a complaint. If you are not paying them the
$1.00 service charge for House Wire Maintenance, they will hit you with
about $35.00 per hour to fix the problem, or even if they don't fix it
but prove it was you fault. The mini-jacks located in your house can
cause you a lot of noise problems. They get all kind of things in them
like smoke, grease, animal hair, and dust. These things cause the
contacts to corrode. Corrosion causes noise. If you have an OHM meter
and the technical skill to use it, lift the house wire from the
terminals and check for high resistance shorts in you house with all of
your modems and phones removed from the jacks.
Noise problems can also come from the carbon blocks located in the small
grey box located where the phone lines enter your house. Normally this
condition will appear after an electrical storm or high winds when there
may have been currents flowing on the phone lines. These devices belong
to the phone company and you should not mess with them.
I hope this will shed some light on the subject of noise for you.

File diff suppressed because it is too large Load Diff

Some files were not shown because too many files have changed in this diff Show More