human-nets@ucbvax.ARPA (06/26/85)
From: Charles McGrew (The Moderator) <Human-Nets-Request@Rutgers> HUMAN-NETS Digest Tuesday, 25 Jun 1985 Volume 8 : Issue 20 Today's Topics: Computers Networks - Komputers and the Klan & In memoriam E-COM, Computers and the Law - ACM White Paper on Hacking (2 msgs) Computers and People - Giving users the "finger"? & Computers Are Everywhere & Mail System Specs, Announcement - new AI in education mail list ---------------------------------------------------------------------- Date: Sat, 15 Jun 85 20:45:30 cdt From: riddle@ut-sally.ARPA (Prentiss Riddle) Subject: Komputers and the Klan The April/May issue of the Yippie publication "Overthrow" (not entirely my political cup of tea, but interesting reading regardless) includes a couple of articles on the bboard systems operated by the Klan, the Nazis and their ilk. Reprinted below (with tacit permission) is the shorter of the two. KLAN & NAZI NUMBERS Below are five of the six newly established "Aryan Nations Liberty Net" data bases. These data bases are available 24 hours a day and contain Klan/Nazi propaganda, enemy lists, electronic mailboxes, bulletin boards, and more. All bulletin boards are set for 300 baud and most will let you into the system without a password by typing the word "NEW" when prompted. Have fun... White American Resistance (619) 723-8996 Aryan Nations (208) 772-6134 CKKKK BBS no. car. (919) 323-9888 Texas KKK BBS (214) 263-3109 W. Va. BBS (304) 927-1773 Needless to say, neither the Yippies nor I are exactly fond of the Klan. These numbers are offered in the belief that you should "know thy enemy." --- Prentiss Riddle ("Aprendiz de todo, maestro de nada.") --- {ihnp4,harvard,seismo,gatech,ctvax}!ut-sally!riddle --- riddle@ut-sally.UUCP, riddle@ut-sally.ARPA, riddle%zotz@ut-sally ------------------------------ Date: 21 Jun 1985 09:46 PST From: Lars Poulsen <LARS@ACC> Subject: In memoriam E-COM Reply-to: LARS@ACC From "Communications Week", June 17, 1985: "The U.S.Postal Service's unprofitable Electronic Computer- Originated Mail (E-COM) system, which has been for sale since last June, will be shut down by September if the Postal Service is still unable to get an acceptable offer." E-COM was a great idea implemented in the worst possible way. Besides some questionable design (the message format for submissions had to be seen to be believed), it was killed by regulatory cramps that are can only be explained by a desire to ensure that this project would fail. Item: E-COM had 25 service centers around the country. A natural mode of operation would be for a customer to enter submissions at the nearest E-COM center, and for E-COM to move the data to the service center nearest to the addressee for printout and entry to the mail stream. E-COM offices did have communications links between them, these were allowed to be used only for administrative data. If the post office wanted to move E-COM message data between sites it was required to put them on magtape and put the magtape in a mail bag. Item: E-COM centers had X.25 lines to receive data on, but they were not allowed to use these for switched service, so that E-COM customers could place a call to E-COM via commercial X.25 networks. The X.25 lines could be used only for dedicated lines from resellers. Would you buy a used E-COM system subject to this kind of regulation ? Unfortunately, this aspect of E-COM's troubles has not received any attention in the press; most stories have had an undercurrent of "this goes to show that a government outfit will screw up even the best business idea". / Lars Poulsen Advanced Computer Communications <Lars @ ACC.ARPA> ------------------------------ Date: Tue 18 Jun 85 23:40:58-PDT From: Ken Laws <Laws@SRI-AI.ARPA> Subject: ACM White Paper on Hacking To: JWhite.PA@XEROX.ARPA Cc: SU-BBoards@SU-SCORE.ARPA You are listed as the contact and author of the April 1985 ACM Pacific Region Newsletter. I would appreciate it if you would convey the following open letter to the External Activities Board in regard to their April 3-4 forum on "hacking" at SRI and their planned ACM White Paper on Hacking. I strenuously object to this abuse of the word "hacking". Reporters for the news media may be forgiven for seizing one meaning of this word and ignoring all others, but the ACM should be more professional. Hacking has a short but proud history, and giving in to the current abuse of the word by the uninformed denigrates all past hackers and their hacks. It also robs us of a wonderful term for which there is no ready substitute, while bestowing honor on those for whom "electronic vandal" is a suitable epithet. This is not a trivial, academic issue. Aside from my previous point, there is a real danger in use of the term "hacking" for malicious mischief via telecommunications or networks. The designation implies that no previous concepts and precedents describe this phenonmenon, and hence that entirely new laws are needed to deal with it. Attempts at creating such laws have been uniformly ill-advised, according to reports on the Arpanet, whereas attempts to apply or extend existing laws seem more likely to be successful. There is nothing we can do now to change the April forum, but I urge responsible members of the ACM to block publication of the resulting "ACM White Paper on Hacking" under this counterproductive and undescriptive name. -- Dr. Kenneth I. Laws Member, ACM SRI International 333 Ravenswood Avenue Menlo Park, CA 94303 ------------------------------ Date: 19 Jun 85 16:48:11 PDT From: JWhite.pa@Xerox.ARPA Subject: Re: ACM White Paper on Hacking To: Ken Laws <Laws@SRI-AI.ARPA> Cc: JWhite.pa@Xerox.ARPA, SU-BBoards@SU-SCORE.ARPA Thanks for the input regarding ACM's use of the term Hacking. I'll forward you letter to the Chairman of ACM's External Activities Board. Personally, I share your concerns. -- John White ------------------------------ Date: Wed 12 Jun 85 17:27:22-EDT From: Thomas.Finholt@CMU-CS-C.ARPA Subject: "Finger" information policies To: mkb@CMU-CS-C.ARPA, sproull@CMU-CS-C.ARPA I have talked with various people recently about the use of "finger" and other locator programs. Mike Blackwell, of CMU, reports that "finger" is among the most frequently used programs on that university's TOPS-20s. Administrators of BITnet describe the existence of "BITnauts": people who are fascinated by "finger" information on users at other sites (some halfway around the world). I have also encountered people who find the free access to data which "finger" provides a violation of privacy. This tradition maintains, for example, that job status and terminal location are privileged and should not be revealed casually. These observations have started me thinking about "finger". At CMU, people seem to take for granted that information is freely available via "finger". I always assumed that this was true at other sites. Now, in light of some of the conversations mentioned above, I am not so sure. I would be interested in hearing from Human-net readers about why they think "finger" is important, why it is such a popular program -- and what guidelines exist at other institutions to govern the extent and type of data provided by "finger". One theory might be that computer users tend to feel isolated, hence "finger" allows them to become aware of their larger social environment. Or, perhaps people just enjoy reading other people's plan files (are plan files a universal thing?). Still another theory suggests that attitudes toward "finger" are determined by organizational context. For instance, a private institution might have a very liberal attitude toward "finger" information -- while a public institution (with a stronger obligation to adhere to federal guidelines on privacy? what are these guidelines?) might disable "finger" mechanisms all together. Are "finger"-type programs a good thing? As the world moves toward distributed networks this information becomes less easy to collect and disseminate (because users are no longer conveniently centralized on one time-sharing system). Early users of one network environment at CMU were somewhat perturbed to find that the new system did not provide the accustomed dynamic information on other users. Instead, information on other users could only be obtained via an on-line "user directory" (ie a phonebook). Will future users be content to work in a "finger"-less world, or will administrators and implementors have to bow to popular demand, and commit the resources to design and maintain a new generation of "finger" programs? Tom Finholt Committee for Social Science Research on Computing CMU --------------------------------------------------------------------- EXAMPLES OF "FINGER" INFORMATION: (? = phone numbers) @finger finholt *Name Job PrName Idle %Cpu TTY Terminal Location Thomas Finholt 27 Finger 1.7 46 F/E dialup ---- Plan File ---- Graduate Student, CSSRC and Social Science Office: PH 319, Office Phone: x???? Home Phone: (412)-???-???? Home Address: 5000 Forbes Ave. If you own a Kaypro II or play tennis please give me a call. @finger *Name Job PrName Idle %Cpu TTY Terminal Location Samuel Shipman 8 Bboard 1:26 161 Via ETHERFE-52 #176260 Allen Newell 9 Exec 17 50 Newell house ???-???? Vince Fuller 20 Detach Det from 5120 VAF's lair x???? Rob Maclachlan 21 Detach 3:27 Det from 3207 Spice Rack x???? Skef Wholey 24 Exec 5 155 8218 Black&c x???? Thomas Finholt 27 Finger 2.2 46 F/E dialup Marc Raibert 29 Emacs 2.9 156 Raibert house ???-???? Wei-Min Shen 30 Clisp 40.9 157 8301 Birkel&c x???? Kathleen Carley 37 Emacs .7 51 F/E Dialup Leona Champeny 40 Emacs 1.8 47 Term. Rm. D6 x???? John Aronis 45 Doverq 7 52 4212 Sylvia/Dyane x???? @finger bovik@speech2 [CMU-CS-SPEECH2.ARPA] Login name: bovik In real life: H.Q. Bovik Directory: /usrsp0/jdoe Shell: /usr/cmu/new/csh Last login Tue Jun 11 11:37 on ttypq (Floating PERQ) Mail came on Tue Jun 11 17:58, last read on Tue Jun 11 13:27 Plan: Research Programmer, Computer Science Projects include Speech Understanding and Spice Office: WeH 4500, Office Phone: x???? Home Phone: (412) ???-???? Home Address: 2300 Foobar Avenue, Pittsburgh, PA 15213 ------------------------------ Date: Mon, 17 Jun 85 12:37:15 CDT From: William Martin <control@ALMSA-1> To: Info-Micro@Brl Cc: wmartin@ALMSA-1 Subject: Computers Are Everywhere (Another) Recall the note I sent out some months back about the computerized fishing reel? Well, that same publication I found that in now has another item: PUMA'S COMPUTER RUNNING SHOE MEASURES PERFORMANCE ELECTRONICALLY Photo caption, on a photo of a modern-style lace-up running shoe, with a sort of added block which wraps around the rear of the shoe and has a switch mounted on the top: An electronic device attaches to the left foot of Puma's RS Computer Shoe, measuring distance according to the runner's own calibrations and sensing footfall. After a run it plugs into a computer to read out detailed performance data and comparisons with pre-set goals. [There is also a photo of a graph displayed on a micro's screen, an example of the output capabilities of the software package.] Text: Puma's RS Computer Shoe comes with its own electronics and software to document individual runners' performance. It has a built-in electronic device that communicates with a personal computer, allowing runners to electronically measure the time, distance, and energy and/or calories expended on each run. It will retail for $200, packaged with the software, the electronic measuring device and the plug that connects shoe and computer. Replacement shoes, which, like the original, represent Puma's top of the line, will retail for $90. ...will be in stores by late 1985. ...a high correlation among running enthusiasts and home computer owners. [Comment leading to the impression that the software is designed for Apple IIe's and/or Commodore 64's.] The same software program can be used by an unlimited number of runners who wear the computer shoe model. The software can access a file containing information on each individual's running performance before calculating the distance and caloric measures. This aspect is expected to provide teams and groups of individuals with an important motivational and training tool, according to Puma executives. Information stored in the shoe can be accessed right after a run or stored indefinitely in the device as long as the shoe is not turned off. [Gee, another thing to worry about -- "No! Don't turn my shoe off yet!! No! No!...." :-)] The shoe itself, including the device, weighs approximately 13 oz. It will initially be introduced in men's sizes from 6 to 13. ...a women's version is also scheduled for production in 1986. ...Puma has similar devices for other shoe products on the drawing boards. ***End of article*** (From SPORTS MERCHANDISER, June 1985, p. 36) Hmm.... Maybe they can build a radio data link to get realtime info transmitted from the shoe as you run... Thought y'all might be interested in this.... Regards, Will Martin ------------------------------ From: ihnp4!utzoo!henry@Berkeley Date: 19 Jun 85 21:18:06 CDT (Wed) Subject: Re: Mail System Specs I note one aspect of this requirements spec that disturbs me: the call for editing and spelling checking as part of a *message* system. While I don't dispute that editing and spell-checking are important to use of a message system, this is an open invitation to implementors to re-invent the wheel yet again, poorly. "Re-invented wheels are often square." I would like to see a requirement along the lines of: Should work with or extend existing text editors, rather than inventing its own incompatible editor, unless there are truly compelling reasons (not just implementation convenience) for the change. and likewise for spelling checking. Existing text editors have evolved over many years as engines for manipulating text; they are likely to be distinctly better at this than a two-week hack by a message-system author. They are also more likely to be functionally complete and fully debugged. They may need extending to handle the message-specific aspects, but this is not a valid excuse to throw them away and start over. What was that quote about standing on each other's shoulders rather than each other's feet? Henry Spencer @ U of Toronto Zoology {allegra,ihnp4,linus,decvax}!utzoo!henry ------------------------------ Date: Mon 24 Jun 85 14:16:53-PDT From: Mark Richer <RICHER@SUMEX-AIM.ARPA> Subject: new AI in education mail list There seemed to be enough interest to create a mailing list on artificial intelligence in education. If there are several people at one site that are interested, try to form a local distribution system. Here's the description: AI-ED@SUMEX-AIM Discussions related to the application of artificial intelligence to education. This includes material on intelligent computer assisted instruction (ICAI) or intelligent tutoring systems (ITS), interactive encyclopedias, intelligent information retrieval for educational purposes, and pychological and cognitive science models of learning, problem solving, and teaching that can be applied to education. Issues related to teaching AI are welcome. Topics may also include evaluation of tutoring systems, commercialization of AI based instructional systems, description of actual use of an ITS in a classroom setting, user-modeling, intelligent user-interfaces, and the use of graphics or videodisk in ICAI. Announcements of books, papers, conferences, new products, public domain software tools, etc. are encouraged. Archives of messages are kept on SUMEX-AIM in: <BBOARD>AI-ED.TXT All requests to be added to or deleted from these lists, problems, questions, etc., should be sent to AI-Ed-Request@SUMEX-AIM Coordinator: Mark Richer <Richer@SUMEX-AIM> ------------------------------ End of HUMAN-NETS Digest ************************