[comp.org.fidonet] FidoNET Newsletter, Volume 6, # 20

pozar@hoptoad.uucp (Tim Pozar) (05/16/89)

     Volume 6, Number 20                                   15 May 1989
     +---------------------------------------------------------------+
     |                                                  _            |
     |                                                 /  \          |
     |                                                /|oo \         |
     |        - FidoNews -                           (_|  /_)        |
     |                                                _`@/_ \    _   |
     |        International                          |     | \   \\  |
     |     FidoNet Association                       | (*) |  \   )) |
     |         Newsletter               ______       |__U__| /  \//  |
     |                                 / FIDO \       _//|| _\   /   |
     |                                (________)     (_/(_|(____/    |
     |                                                     (jm)      |
     +---------------------------------------------------------------+
     Editor in Chief:                                  Vince Perriello
     Editors Emeritii:                                     Dale Lovell
                                                        Thom Henderson
     Chief Procrastinator Emeritus:                       Tom Jennings
     Contributing Editors:                                   Al Arango
     
     FidoNews  is  published  weekly  by  the  International   FidoNet
     Association  as  its  official newsletter.  You are encouraged to
     submit articles for publication in FidoNews.  Article  submission
     standards  are contained in the file ARTSPEC.DOC,  available from
     node 1:1/1.    1:1/1  is  a Continuous Mail system, available for
     network mail 24 hours a day.
     
     Copyright 1989 by  the  International  FidoNet  Association.  All
     rights  reserved.  Duplication  and/or distribution permitted for
     noncommercial purposes only.  For  use  in  other  circumstances,
     please contact IFNA at (314) 576-4067. IFNA may also be contacted
     at PO Box 41143, St. Louis, MO 63141.
     
     Fido  and FidoNet  are registered  trademarks of  Tom Jennings of
     Fido Software,  164 Shipley Avenue,  San Francisco, CA  94107 and
     are used with permission.
     
     We  don't necessarily agree with the contents  of  every  article
     published  here.  Most of these materials are  unsolicited.    No
     article will be rejected which is properly attributed and legally
     acceptable.    We   will  publish  every  responsible  submission
     received.


                        Table of Contents
     1. EDITORIAL  ................................................  1
     2. ARTICLES  .................................................  2
        FidoNews Editorial Policy  ................................  2
        Palindrome Archives -- A Product review  ..................  7
        FidoNet and Policy4  ...................................... 14
        No-Code Packet Radio? (reprint)  .......................... 23
        What DOES a "reasonable sysop" do?  ....................... 26
        Wilderness Echo  .......................................... 31
     3. COLUMNS  .................................................. 32
        The Veterinarian's Corner: Feline Skin Diseases  .......... 32
     And more!
     FidoNews 6-20                Page 1                   15 May 1989


     =================================================================
                                 EDITORIAL
     =================================================================

     This is  turning  into  a  narcotic.    Now  that I have written
     something up here  and people are sending me mail and responses,
     I am really getting INTO it.

     Last week you might  have  noticed  that  I  was concerned about
     whether the *C's were going to take any concrete actions to deal
     with  their  perceived  FidoNews  problem.  Since  writing  that
     editorial I have received sufficient information to believe that
     they  ARE going to take action:   they  are  going  to  help  me
     increase  the  "signal"  content  of FidoNews.  In  fact,  Steve
     Bonine was kind enough to compose and submit a  response  to  my
     editorial, which I am printing this week (along with one other).

     Since much of  the  controversy  seems  to  have  centered  on a
     particular column, it probably would be worthwhile at this point
     for me to state my intentions towards this column.   I intend to
     run the remaining submissions.  Unless I then receive some  very
     strong indication  that  this column has enjoyed wide readership
     and interest, I  will  print  no  further  submissions  for this
     column.  So it's  up  to  YOU  to  determine if you want to read
     ANIMED excerpts in FidoNews, or  if  you'd rather just subscribe
     to  the  Echomail  conference  from  which  all  this  data  was
     extracted.

     In  future weeks I expect to have assembled a series on  FidoNet
     history, using  materials  I've  solicited from Ken Kaplan and a
     few others.   In many cases, some of you "old-timers" might have
     seen  the  material  I'll    be   printing,  but  you're  vastly
     outnumbered by those members of  FidoNet  who  have not had this
     opportunity.

     As always, this is YOUR newsletter.    It's  only as good as YOU
     make it. Let's make it GREAT.

     -----------------------------------------------------------------
     FidoNews 6-20                Page 2                   15 May 1989


     =================================================================
                                 ARTICLES
     =================================================================

     Steve Bonine
     115/777

                  My Opinion on FidoNews Editorial Policy


     I feel compelled to respond to Vince's recent editorial on
     FidoNews editorial policy, since I was (and still am) one of the
     RC's who raised questions concerning the content of FidoNews.

     Why do I care?  There are two reasons.  First, I spend my own
     money to distribute FidoNews to NC's in region 11.  Second, I
     feel that FidoNet needs a means of distributing information to
     the sysops throughout the network, and that FidoNews has pretty
     much lost its effectiveness as that vehicle because of a lack of
     a reasonable editorial policy.  (I'm not criticizing Vince; his
     hands are tied.)

     Vince left the impression in his editorial that the RC's are
     trying to restrict free speech.  I'm a firm believer in free
     speech, but I'm not particularly eager to spend my own money
     shipping data around that no one is going to read.  What is Fido-
     News, anyway?  Is it an important forum -- the last bastion of
     available distribution mechanisms for opinion?  No.  FidoNews is
     the newsletter of the FidoNet BBS network.  It's actually the
     newsletter of an organization called the IFNA, but that
     organization seldom graces its pages with any IFNA-related
     information, and rumor has it that IFNA is trying its best to
     divorce itself from FidoNet.

     The print-anything policy is an idea whose time is past.  There
     are probably a hundred echomail conferences which have higher
     readership than FidoNews.  If I want to find out about fleas, I
     am perfectly capable of getting the ANIMED conference myself.
     Why should the RC's and NC's have to spend their money
     distributing articles on fleas to an audience which contains only
     a miniscule number of people who want to read that information?
     If I want to exercise my freedom of speech, I'll do it where
     someone might read what I write -- in a forum of people with
     similar interests.  It's not like we are short of echomail
     conferences!

     The fact that there are probably a hundred echomail conferences
     with higher readership than FidoNews is an indication of how bad
     the problem is.  Before echomail, most sysops read FidoNews
     because that's all there was.  Now it has competition, and it's
     not doing well against that competition.

     All of which brings us to the question of what to do now.
     Actually, I agree with much of what Vince says in his editorial.
     He points out that there is a low signal-to-noise ratio, and that
     we need more good articles.  That's true.  But there are two ways
     FidoNews 6-20                Page 3                   15 May 1989


     to improve the signal-to-noise ratio:  increase the signal, or
     reduce the noise.  I feel that FidoNews needs both.  Not only do
     we need more good articles, but we need a responsible editorial
     policy to reduce the extraneous junk.  I would rather have a
     FidoNews with one good article, and that's all, than have the
     same article plus five fillers.  It's less for me to distribute,
     and it's more likely that the sysops of FidoNet will read it.  If
     FidoNews were judged on bulk, then we would have no problem.

     I think that FidoNews could be improved by the simple application
     of a common-sense editorial policy to restrict the content to
     FidoNet-related material.  No one is going to have their freedom
     of speech abridged -- I bet the ANIMED conference will survive
     just fine without a weekly column in FidoNews.  Readership would
     improve, and subsequently more articles would be submitted.  But
     I recognize that I'm in the minority, so I will content myself
     with living with the situation, and hoping that eventually the
     problem improves.  In the meantime, I've done my part.  Where's
     YOUR FidoNews article?

     -----------------------------------------------------------------
     FidoNews 6-20                Page 4                   15 May 1989


     Freedom of the Press:  An opposing viewpoint
     Jack Decker
     1:154/8


     Freedom of the Press:  An opposing viewpoint

     In FidoNews Volume 6, Number 19, our esteemed Editor in Chief
     (Vince Perriello) editoralized on Freedom of the Press.  I am
     not being sarcastic when I use the word "esteemed" in reference
     to Vince, since he has probably done more to help Fidonet than
     at least 95% of the people in the net.  Vince has made some
     major contributions to our hobby, and I value his opinions
     highly, even if I don't always agree.

     Vince basically espoused the viewpoint that FidoNews should
     remain "a free and open public forum in which any of us can
     share anything we consider important with anyone else."  As
     Vince points out, the present content of FidoNews "often has
     little or nothing to do with the day-in, day-out nonsense
     involved in being a member of Fidonet."

     Let's take a moment to consider what "Freedom of the Press"
     really means.  If we can, let's take a look at the real world,
     outside of Fidonet.  If I submit an article on raising African
     Violets to the editor of Radio-Electronics magazine, is he
     under any obligation to print it?  Of course not!  All right,
     let's suppose I send the editor of that publication an article
     that IS somehow related to Radio or Electronics?  Is he then
     under any obligation to print it?  The answer is still NO!  As
     a matter of fact, "Freedom of the Press" does not require ANY
     publication to print ANY article they receive (even if they
     print a correction or retraction to a previous story, it's not
     because of "Freedom of the Press", it's because they don't want
     to be sued for things like libel or slander!).

     Similarly, FidoNews is under no legal obligation to print
     everything received.  That's an editorial decision.  What
     "freedom of the Press" really means is that if you don't like
     the way a particular publication is doing things, you have the
     freedom to start your own, competing publication.  In theory,
     the government is not allowed to shut you down because they
     don't happen to agree with the contents of your publication.
     In fact, the scope of "Freedom of the Press" is pretty much
     limited to government interference with private publications
     (some of you may recall when the old Bell System was able to
     legally suppress nearly the entire distribution of one issue of
     "Ramparts" magazine back in the 60's, because Bell objected to
     an article in that issue detailing how to build a "black box."
     The comment was made that had Ramparts similarly figured out
     through their own efforts how a top secret Navy submarine
     works, the government would have been quite powerless to stop
     them from publishing those details, unless they could somehow
     prove that the information had been stolen from government
     files).

     FidoNews 6-20                Page 5                   15 May 1989


     The problem with a "print everything received" policy is that
     it leaves the door wide open for any particular group to usurp
     FidoNews as their soapbox.  Now, I happen to feel that such a
     policy is very valuable when the article has something to do
     with Fidonet, computers, or communications.  But there are lots
     of other subjects that folks might write on, and that sysops
     (even at the *C level) might object to.  A few examples, just
     to get you thinking:

     * An article extolling the benefits of being a member of the Ku
     Klux Klan (if you were a black sysop, would you really want to
     carry that?)

     * An article soliciting members for a worldwide neo-Nazi party,
     and promoting a private echo called "NAZI" for the
     dissemination of information on that movement (if you were
     Jewish, would you feel comfortable with this?)

     * An article describing the joys of sex with animals in the
     most graphic terms possible (with extremely foul language), and
     inviting everyone to try it (If you have kids and/or pets,
     would you be comfortable with such an article?  Would you want
     your children to read it on your BBS?).

     * Articles promoting various religions (not yours) promising
     anything from bad luck to eternal damnation to those who do not
     follow the tenets of that religion (an interesting side note to
     this:  After the Tom Jennings article that started much of the
     present controversy, I suggested to previous FidoNews editor
     Dale Lovell that now someone might write a "hell fire and
     brimstone" article giving the Biblical injunctions against
     homosexuality (yes, there are some verses that condemn the
     practice).  Dale replied that an article like that would
     probably NOT be published in FidoNews.  This makes me wonder if
     the "print everything" policy really translates to "print
     everything that the FidoNews editor doesn't find repugnant."
     The problem there is that if the FidoNews editor can censor
     articles that he personally finds objectionable, why can't the
     *C's that are forced to distribute FidoNews do the same?
     Either we have a true "print everything received" policy or we
     don't...  and if we don't, we should stop pretending we do, and
     get on with defining just where the limits are!).

     The major problem I see with a "print everything" policy is
     that *C's are forced by Policy to distribute FidoNews to the
     nodes underneath them.  This would make sense IF FidoNews was
     primarily a technical journal dealing with things relating to
     Fidonet.  The problem occurs when we force sysops to distribute
     material that is objectionable to their standard of ethics or
     sense of decency.  Even newstand owners have the right to not
     carry magazines that they personally find objectionable (how
     many religious magazines do you find in adult bookstores, or
     vise versa?).  But, in effect, Policy states that "we don't
     care if there's an article in FidoNews from a group advocating
     the death of you and your family... if the article gets into
     FidoNews, you HAVE to carry it, or step down as *C.  Meanwhile,
     FidoNews 6-20                Page 6                   15 May 1989


     as I pointed out earlier, the FidoNews editor apparently has
     the discretion to omit articles that he personally finds
     objectionable (I do not know whether Vince uses this
     prerogative or not).  If the editor's world view lines up with
     yours, you may not be uncomfortable with letting him have all
     the discretion over what YOU must pass out (if you're a *C),
     but otherwise, you may find that you're forced to pass along
     articles that are personally repugnant to you (or perhaps even
     dangerous to the health and well being of you and/or your
     family).

     Now, if the editor replies to this by saying he wouldn't print
     these types of truly objectionable articles, we still have a
     few problems.  One is, what if he passes on an article that a
     *C finds truly awful?  Is the editor's judgement better than
     that of the *C?  Second, doesn't this give the editor the power
     to discriminate against certain articles and/or people that he
     doesn't happen to approve of (I'm just throwing that out for
     discussion, the truth is that EVERY "editor" has that power.
     The "print everything" policy really makes the FidoNews
     "editor's" job more that of a "compiler" of articles than a
     true "editor").  Third, if the editor really does delete
     objectionable articles, then we DON'T really have a "print
     everything" policy, in which case I would like to see some
     published guidelines, rather than just leaving everything to
     the personal preferences of the editor (if for no other reason
     than the fact that I don't want to waste the time and effort to
     write an article that will be rejected out of hand).

     I would suggest that at the very least, we modify the "print
     everything received" policy to say that we will "print
     everything received" AS LONG AS it has at least something to do
     with Fidonet, computers, or communications.  Perhaps all the
     other types of articles should go into a separate, Fidonet
     "literary" publication that would be offered to the *C's
     (through the same distribution channels as FidoNews), but that
     the *C's would not be REQUIRED to carry (I suppose that idea is
     much too democratic for this net!).

     In any case, if the "print everything received" policy is NOT
     modified, then I feel that those *C's who object should not be
     forced to carry it.  I would invite anyone who disagrees to
     show how "Freedom of the Press" REQUIRES someone to distribute
     literature that they are morally opposed to.  Why should we
     require this of VOLUNTEER sysops in Fidonet?  Here again, it
     seems that a few people are under the impression that Fidonet
     sysops are somehow their "employees" (that's being charitable,
     some might say "slaves") that can be dictated to by the
     higher-ups.  The sooner we realize that Fidonet is a volunteer
     organization, and that you don't make unreasonable demands of
     volunteers, the better off we're all going to be.


     -----------------------------------------------------------------
     FidoNews 6-20                Page 7                   15 May 1989


                  Palindrome Archives -- A Product review
                          by Ben Baker -- 7:44/76


          We have  all heard the litany many times, "Back up your hard
     disk, or you'll regret it!"  One of our favorite New Year's reso-
     lutions is "Do more back-ups!"

          The trouble  is that  backing up is such a painful exercise,
     we would much prefer to do something else!  I know owners of tape
     systems (I  was one  of them) who do not perform back-ups as fre-
     quently as  they should.  True, you don't have to shuffle a stack
     of diskettes, and then keep track of them, but even backing up to
     tape is still largely a manual process, right?  Wrong!

          Palindrome Corporation,  a new  company based  in a  Chicago
     suburb, saw  a need  and filled  it.  They market a line of "Tape
     Archiving Systems,"  as opposed to a tape back-up system.  If you
     have experience  in the main-frame world, you have probably heard
     the expression "tape archiving" before, but it's a new concept to
     PCs.   Tape archiving  is a strategy for backing up disk files in
     such a  way as  to provide  maximum protection  with minimum  re-
     sources.  It is a strategy you could employ with any back-up sys-
     tem --  disk or  tape --  but it requires careful record keeping,
     and 'till now, you were the bookkeeper!

          Palindrome OEM's  the tape  drives.   The key is their soft-
     ware, collectively  called "The PERSONAL ARCHIVIST" or TPA, which
     fully understands tape archiving strategy.  Believe me, it is so-
     phisticated stuff.   Before I can explain how it works, I need to
     define some terms.

          A "tape  set" is  a coordinated  set of  tapes, treated as a
     unit by  TPA.   A "tape  volume" is  a single tape.  For a system
     with one  20-meg disk,  tape sets  will all be single volume sets
     for some time, but for larger systems, a tape set might be two or
     more volumes.

          A "file  set" is  a collection  of files written from a disk
     drive to  tape in  a single  archiving operation.   There are two
     kinds of  file sets.  A "save set" is a permanent file set, and a
     "checkpoint set"  is a  temporary file  set.  As you might guess,
     "saving a  file" means  including that  file in  a save  set, and
     "checkpointing a file" means including it in a checkpoint set.  A
     file is  "fully protected" if the current version appears in save
     sets in three different tape sets.  (This number is configurable,
     but three is recommended, and certainly adequate for most circum-
     stances.)

          A "tape  rotation" is  the changing from one tape set to an-
     other.   This is usually done once a week.  With the usual number
     of five  tape sets, call them A, B, C, D and E, the tape rotation
     schedule for a 16-week period would look like this:

          E  D  E  C  E  D  E  B  E  D  E  C  E  D  E  A

     FidoNews 6-20                Page 8                   15 May 1989


          The schedule  then repeats indefinitely.  Remember I said it
     requires careful  record keeping?   The  beauty is that TPA keeps
     track of it all -- painlessly.  Notice from the schedule:

          Tape Set       Frequency of use

              A          once in 16 weeks
              B          once in 16 weeks
              C          once in  8 weeks
              D          once in  4 weeks
              E          every other week

          This means  that if  you muff  things horribly, you have not
     only current  checkpoints, and  week-old checkpoints,  but others
     dating back  at least eight weeks and up to 16 weeks!  And, using
     TPA's menu  system, recovering  an older  version of a particular
     file is  merely a  matter of  "point and  shoot!"  Now that's not
     merely back-up  -- that's true archiving!  What's more, save sets
     are never forgotten.  Eventually you would have the capability of
     going back  years into your save sets.  Have you ever installed a
     new version  of a program over the old, only to find out that the
     new version  is very  buggy?   Or how  about this.  You wrote a C
     program a long time ago and someone has asked you to recompile it
     to use  the math  coprocessor.   It should  only take a couple of
     minutes.  The trouble is that it was written for Lattice C, 2.47.
     Since then  you converted  to Lattice  3.0,  then  3.1,  then  to
     Microsoft C  4.0 to  5.0 to 5.1.  If you can find the old source,
     it won't  be a trivial task just getting it to compile under your
     present compiler!

          Had you  been using  TPA, the old version of the program you
     lost might be on the tape in the tape drive.  If not, it's surely
     right in  front in  your desk  drawer.   In two or three minutes,
     you've got  it back.  The old source file as well as version 2.47
     of the  Lattice compiler,  with all  its  libraries  and  include
     files, are is save sets on older tapes -- you haven't the fogiest
     which ones.   Run  the TPA  menu.   They all  show up as migrated
     files in  the database.   Select  the ones  you need -- oops, not
     enough space.  Delete some files you don't need right this minute
     to make  space, then have TPA restore the old files and their old
     directories.  It will tell you what tape or tapes it needs.  Then
     compile and  test the  program with  the right compiler switch to
     generate coprocessor code.  Finally delete the Lattice stuff, re-
     store your disk the way it was 45 minutes ago and press on!

          So what's all this about "saving" and "checkpointing?"

          Here's the  philosophy.  Stable files should be saved perma-
     nently.  Volatile files should be written to temporary tape sets,
     or "checkpointed,"  but permanent saving might well consume enor-
     mous amounts of tape.  How does TPA tell the difference?  It uses
     file date and time stamps and the "archive bit" as any sane back-
     up system would.  And it uses rules.  Enter configuration.

          When you  install TPA,  it is  pre-configured for  one  hard
     disk, your boot disk, three saves to fully protect a file, weekly
     FidoNews 6-20                Page 9                   15 May 1989


     rotations each Monday, and a default set of archiving rules.  All
     of this  may be changed through TPA's menu system.  The following
     is a  facsimile of TPA's configuration screen, published courtesy
     of Palindrome:

     -----------------------------------------------------------------
     THE PERSONAL ARCHIVIST            (c) Palindrome Corporation 1989
     -----------------------------------------------------------------

                           Archive Configuration

               Schedule                           Archive Storage
        ---------------------                  ---------------------
             Archive ID: BAKER                     Save Copies: 3
       Archive Rotation: SATURDAY                   Verify ECC: NO
        Automatic Start: 6:30a                     Auto Format: NO
          Automatic End: 7:00a                    Auto Migrate: NO
         Auto Intervals: 0                       Leave Phantom: NO
           Auto Command: tpa2tape /a /q             Media Type: QIC 40
              Error Log: C:\tpa_log             Concurrent DMA: NO
                                                   Split Saves: NO

           Protected Drives                      Archive Retrieval
        ---------------------                  ---------------------
         Disk 1: C: (no label)                  Overwrite File: PROMPT
         Disk 2: D: (no label)                  Allow Redirect: YES
         Disk 3: E: (no label)                  ChkPt Password: NO
         Disk 4: F: (no label)                   Save Password: NO

     Tab to select.   Enter to edit.   F1 for help.     Esc to return.
     -----------------------------------------------------------------

          (Note that  a fair  amount of editing has been done to these
     screens to  eliminate line-drawing characters, and to fit the 65-
     column format.  Nevertheless, they are reasonably faithful.)

          All of  the parameters  in the  above screen,  except  Media
     Type, are user configurable.

          TPA associates  a "rule"  with each  and every  file on your
     hard disk.   The rules answer the questions "When should I check-
     point this  file, when  should I save it, and when is it eligible
     for migration?"  (More on this in a bit.)  There are two kinds of
     rules -- specific and generic.  A specific rule applies to a par-
     ticular file.   A generic rule applies to a class of files in the
     directory in  which the rule is defined, and all its sub-directo-
     ries.

          Initially there  is a  rule for  "*.*" in the root directory
     which says  "checkpoint a file when it changes, save it if it has
     not changed  in six  weeks, and make it eligible for migration if
     it has  not been  used in  12 weeks.  When more than one rule ap-
     plies to a file, the most specific rule is used.  Any rule may be
     edited and new rules may be defined.  For example, I use the edi-
     tor Brief,  which places back-up copies of edited files in a spe-
     cial sub-directory.   I  have a  rule for  that subdirectory  for
     FidoNews 6-20                Page 10                  15 May 1989


     "*.*" which  says "Never  checkpoint, never  save and  never  mi-
     grate."  TPA dutifully ignores any files in that subdirectory.  I
     have a  similar rule  for "*.MSG"  in the root of the drive which
     contains my  BBS message base (these files are not only volatile,
     they change  names frequently,  and I  have no desire to preserve
     them for posterity).

          The following screen facsimile shows a few of my rules and a
     few files with rules applied to them:

     -----------------------------------------------------------------
     THE PERSONAL ARCHIVIST            (c) Palindrome Corporation 1989
     -----------------------------------------------------------------
       Directory Tree       Files in: \
       for Drive C:
                                         Check Pt     Save    Migrate
      >\                    LIST1        On Change After 6w  After12w
       |-123                LIST2        On Change After 6w  After12w
       |-BACKUP             TPA_LOG         Never     Never     Never
       |-BRIEF              *       .*   On Change After 6w  After12w
       | |-BACKUP           JUNK*   .*      Never     Never     Never
       | |-HELP             RUN     .ARC On Change After 6w  After12w
       | |-MACROS           SYSTEMS .ARC On Change After 6w  After12w
       |                    WIN2    .ARC On Change After 6w  After12w
     -----------------------------------------------------------------

          The left  side of  the display shows the directory tree with
     the root  currently selected.  Files and rules in the root direc-
     tory are listed on the right.

          What's all this about "migrating?"

          An optional, but very powerful feature of TPA, allows you to
     identify the files you don't use, and get them off your disk once
     they are  fully protected!   How?  TPAWATCH, a TSR furnished with
     the TPA software watches file opens.  It uses about 24K of memory
     and imposes very little overhead on normal operations.  If a file
     hasn't been  opened for  the prescribed  amount of  time,  it  is
     deemed eligible for migration.  Migration may be done at your di-
     rection, or TPA may be configured to do it automatically.

          TPAWATCH has  a second optional function useful in many sys-
     tems (but  not mine).  It can schedule automatic archiving opera-
     tions at a pre-determined time of day.  This is not terribly use-
     ful in  a BBS  environment, so I use SEAdog's event scheduler for
     this purpose.

          The  following  screen  shows  the  current  status  of  the
     archives as TPA sees it:

     -----------------------------------------------------------------
     THE PERSONAL ARCHIVIST            (c) Palindrome Corporation 1989
     -----------------------------------------------------------------
                  Last Archive update:  Checkpoint modified files.
                           Using tape:  BAKER_E1.
                           Updated on:  Mon Apr 10 05:34:41 1989
     FidoNews 6-20                Page 11                  15 May 1989


                     BAKER_E1 Summary:  Percent     Bytes
                      Permanent saves:     0%              0
                 Reusable checkpoints:    24%      9,740,288
                               Unused:    71%     28,745,728

                Next scheduled update:  Modified checkpoint.
                   Continue with tape:  BAKER_E1.

          For next scheduled rotation:  Sat Apr 15.
                   You will need tape:  BAKER_D1.

                        Tapes on hand:  BAKER_D1  BAKER_E1
             You should have in vault:  BAKER_A1  BAKER_A2
                                     :  BAKER_B1  BAKER_B2
                                     :  BAKER_C1  BAKER_C2
     -----------------------------------------------------------------

          You can tell from the information reported, that TPA is well
     aware of  the situation.   It  tells me  that I am doing modified
     checkpoints to  the "E"  tape set,  and that I will rotate to the
     "D" set  on Saturday.  It even suggests which tape sets should be
     stored in  a vault or at some off-site location.  (I use off-site
     storage, and  I don't agree with TPA's suggestion, since it would
     put all  my save  sets off-site, making a full restore impossible
     until I  retrieve some  tapes.   But its  heart is  in the  right
     place.)

          "So, how well does it work?"
          Installing the tape drive isn't difficult at all.  There are
     two versions in the 40- and 80-meg capacities -- internal and ex-
     ternal --  and both  go in according to the documentation without
     surprises.

          The software  installation procedure  is simple enough.  You
     just insert  the diskette  and type  "INSTALL."  It asks which is
     your boot  HD (you  need a meg of space there), then it creates a
     TPA subdirectory,  copies the files and initializes its database.
     It even  offers to  create a  bootable recovery diskette for you.
     This is a good idea, since it isn't at all obvious how to do this
     later, but you need a pre-formatted, bootable diskette or a blank
     diskette ahead  of time.   The install program offers to format a
     bootable diskette  for you, but if you decline, it won't copy the
     system files  for you,  and after  it has copied its own files to
     the diskette, it's too late!

          The archiving  rules can  only be  configured through  TPA's
     menu system.   For  a four-partition disk system it's repetitive,
     time-consuming, and boring.  They really need a method of editing
     the rules  off-line with your favorite text editor.  But you nor-
     mally only  need to  do it  once.   The menu approach is fine for
     later tweaking the rules as conditions change.

          Finally you're  ready to  start actually  using the  system.
     That's when I ran into serious problems.  TPA had no end of trou-
     ble reading  and writing  my tapes.  I spent several hours on the
     phone with Jim Gast of Palindrome (they are not shy about provid-
     FidoNews 6-20                Page 12                  15 May 1989


     ing customer  support --  they're young  and want  satisfied cus-
     tomers), and more hours than I care to think about exercising the
     system.  Once I had accumulated sufficient evidence, Palindrome,s
     engineers decided  I must  have received a "marginal" tape drive,
     and sent  me a replacement.  It appears they were right because I
     have had no problems with the new drive.

          The menu system is designed for easy use.  For the most part
     it is, and should present no problem for the casual user.  At the
     same time,  it permits the more experienced user to get well down
     into the  details.   It is  a little clunky in spots (like super-
     fluous "Strike  any key  to continue"  messages in a few places),
     but I have no serious complaints with it.

          Most (but  not all)  functions may also be operated in batch
     mode without operator intervention.  Day-to-day operations can be
     scheduled either by TPAWATCH, or in my case, by a SEAdog external
     event.  I run checkpoints three times a week on Monday, Wednesday
     and Friday,  and it  seems to take five to ten minutes.  Creating
     the A,  B and C sets took about 80 minutes each because it had to
     create my  initial save sets, and copied every file I had to tape
     each time.   After that, files more that six weeks old are "fully
     protected" and  won't be  written any more unless they change, so
     my Saturday  rotation takes 20 to 30 minutes.  I schedule archiv-
     ing operations  right after  net mail,  and they happen while I'm
     sleeping.  All I have to do is check the status and make sure TPA
     has the  tape it needs for the next run.  It's an idea whose time
     is long over due.

          If the hardware and software are quality stuff, the documen-
     tation is  an afterthought!   The  information contained  in  the
     software manual is well written and reasonably clear.  The cover-
     age of  the archiving  strategy and  of day-to-day operations are
     adequate, but  there are  whole sections missing.  TPA appears to
     have a  large repertoire of error messages.  Each message is num-
     bered for  easy look-up.   Trouble  is, there's  no place to look
     them up,  and it's not always clear what induced an error message
     in the  first place!   Two weeks ago TPA stopped backing up my D:
     drive and  began complaining  about the "undefined drive D."  The
     manual should  have told  me how  to resolve this problem, but it
     has no  sections on  error messages  or error recovery.  I had to
     call Palindrome  to find out that TPA supports drives with remov-
     able media,  and the volume label is a key part of a "drive defi-
     nition."   Sure enough,  I had  apparently run a (still unidenti-
     fied) program  which changed  the volume label on the D drive.  I
     corrected the  label and  TPA was  happy again.   The  phone call
     should not have been necessary.

          Palindrome acknowledges  the shortcomings  of the documenta-
     tion, and  I would  expect future  releases to  improve.   When I
     voiced this thought to a Company spokesman, his response was "You
     can bet  on it!  The company is growing fast, and a new manual is
     one of our highest priorities.  New sections will include 'How to
     recover (single  files to  whole disks).'  'Troubleshooting,' and
     'Error Messages (and their likely causes).'"

     FidoNews 6-20                Page 13                  15 May 1989


          Now that  I have  good hardware, I am beginning to trust the
     system, and  have joined  the ranks of "satisfied customers."  If
     you are  in the  market for  tape backup  capability, you  really
     should take  a look at this one.  If you already have a QIC-40 or
     QIC-80 tape  system, you might check with Palindrome for compati-
     bility.  They market the software separately at $195.

          System prices vary from $695 for the 40 Mb internal Personal
     Archivist for XT or AT (and near clones), to $6,995 for the 2 Gi-
     gabyte Network Archivist system.

          For more information, contact:

          Palindrome Corporation
          710 E. Ogden, Suite 208
          Naperville, IL 60540

          (312) 357-4600

     -----------------------------------------------------------------
     FidoNews 6-20                Page 14                  15 May 1989


     Randall Greylock, 1:321/202

     A Relatively Classless Organization

     FidoNet started  as  a relatively egalitarian place.  I think it
     was  Harv Neghila  who  described  it  as  equals  participating
     equally.

     Unfortunately, FidoNet seems to  be  changing  from  a classless
     organization to an organization that has no class.


     The Original Deal

     Send A Message To Your NC

     All the information originally required by Policy was needed for
     equals to participate equally.  It  was stored in a public place
     (the  nodelist)  and  was equally accessable to  all.    It  was
     equally verifiable by all.


     Operate In Accordance To Policy

     From there, all you had to do was  what  it  said  in  this  one
     document  you could pick up anywhere:  Policy.   Basically,  you
     had  to run ZMH, and try to be a reasonable  human  being.    It
     didn't matter if you had stumbled into FidoNet on some board  in
     CA, even if you were in MA.  All the information you  needed was
     there:  the rules and the phone numbers.


     You Are Now In Fidonet - No Further Costs Need Be Incurred


     Policy4: Changing The Ante: Haves Vs Have Nots

     Information Haves And Have Nots (And How To's)

     Voice Phones Are Valuable Information

     Like everyone else in FidoNet, there are one or two points about
     Policy4 I  don't  like.    The big one to me is this Voice Phone
     number crap.

     I've heard all  the arguments - I still don't buy them.  We have
     crossed a significant line - now we need to provide not only the
     information  required  for  the  technical  maintenance  of  the
     network, but more.

     I'm  not against the use of  telephones.    All  levels  of  the
     coordinator chain above me have a number for me, and vice versa.
     What I object to is REQUIRING this.   Also,  I  am  ONLY talking
     about the simple case of network membership.  I can see merit in
     requiring them between NEC's and nodes.

     FidoNews 6-20                Page 15                  15 May 1989


     Who Has Access To Them

     I  have  many  questions  about this.  Who has access  to  those
     numbers?  It's not spelled out by Policy.

     If  I am involved in a Policy dispute, will the other  party  be
     given  my  number  and  told to talk it out?  (Note there  is  a
     section  in  Policy that mentions voice as a step in the dispute
     resolution process.)


     What Responsibility Exists To Use Them

     If you  have these numbers, doesn't it imply some responsibility
     to use them?    This  is a many bladed juggernaut of a question.
     Does an NC or  RC  or  ZC or IC have a responsibility to talk to
     nodes  involved  in  a  Policy    dispute?     Do  they  have  a
     responsibility to call first if they  cannot get in touch with a
     system and are about to mark it  down?    If  these  things  are
     implied  (and  I  believe they will be -  lame  logic  tends  to
     reinforce itself), the cost of being a *C goes up dramatically.

     What if I don't WANT to talk to a boneheaded RC?  If I refuse to
     do so, is that grounds for excommunication?  What if I refuse to
     talk  to  the  dolt  I'm in a dispute with?  Does  that  mean  I
     automatically  lose my complaint?  (There is at least one RC who
     is more or less doing this now;  he's affectionately referred to
     as Adolf by those in his region.)

     And isn't it  only  fair if they have our numbers we should have
     the *C's?  And  if they won't talk to us, should that be grounds
     for excommunication or at least removal from position?


     Not Verifiable Information

     The  information  is  not  technically    verifiable,    and  is
     discriminatory against those with hearing or speech impediments.
     I don't HAVE a voice phone number,  and  when  officially asked,
     that will be my response.

     I really don't!  My business does, I  can be reached there.  But
     it's not fair to impose FidoNet calls on my  business.   More to
     the  point,  if I had an unlisted phone number, I  could  simply
     tell my NC I had no number.  He might suspect  I  was lying, but
     he would have no way to verify it.  Should I be  denied  a  node
     number?


     Discriminatory

     And  what about those  with  physical  difficulties  with  voice
     communications?  There was a  very  active person in the network
     who is deaf.  He did  not want that known, and did a good job of
     keeping it that way.  I don't  know  his  reasons  -  I  suspect
     because he had found an environment where he  was  treated as an
     FidoNews 6-20                Page 16                  15 May 1989


     equal.    This  requirement  would  destroy  all  hope  of  such
     equality.    When I found out about this person's condition,  it
     colored  my  opinion  of  him  - originally, I thought he was  a
     scumsucker;   after I found out he was a more sympathetic figure
     due to his handicap.


     Local Policy - Fiefdoms And Other Problems

     Added Burden To The Coordinator Structure

     Local Policy  is  a paradox.  It is an attempt to solve problems
     by adding to them.  The real problem is simple:  the coordinator
     structure has not done  a very good job of identifying problems,
     communicating with the body sysop, and attempting solutions.  In
     other words, the coordinator structure has  not  discharged well
     its    responsibilities.      Local  Policy  will  simply    add
     responsibility to be ill-discharged.

     Local Policy must be written by someone.   That's work.  And one
     way or the other, Local Policy will be challenged up the chain -
     even if you don't explicitly provide for review, somewhere along
     the  line just the creation of bad Policy will be challenged  as
     annoying.

     We already have  people  playing  Policy Games.  "Policy doesn't
     SAY  you have to  run  mail  only  during  ZMH"  is  one  of  my
     favorites.  What do you  think will happen when we have hundreds
     of Policies, all with their potential games?


     Examples

     I'm  about  to  list  a  series  of  examples  of  local  policy
     fragments,  each  stated  in the vernacular with  the  reasoning
     behind them.  In some cases, I'll explain  exactly  what I think
     is wrong with each.

     The important test is this:  get a number  of  sysop  friends to
     read  this  article,  and  have them mark Valid or Invalid  each
     example.  I'd be willing to bet that nearly all items  will have
     both  a  valid  and an invalid, and, unless you marked all items
     one  way  or  the other, no one else will agree with you on  all
     cases.


     Under A Local Policy, Could A Node Be Required To:

     Attend Network Meetings

     It is much  simpler  to  resolve  many  problems - technical and
     social - via more  direct  communication  than FidoNet provides.
     Therefore, doesn't it make sense  to  have  a local policy which
     FORCES the members to attend local network meetings?

     (BTW - the first person who  ever  presented this argument to me
     FidoNews 6-20                Page 17                  15 May 1989


     was Mikey.)


     Obey Local User And Point Policies

     We are having problems with some users  and some points that are
     causing  great havoc throughout our network.  For  instance,  we
     have one malicious user who logs onto Sysop B's  board using the
     name  of  Sysop  A  (or a close derivative) and leaves  annoying
     messages.    By the time Sysop B gets wise and tightens  up  his
     access rules,  new  Sysop C gets the same treatment.  Therefore,
     doesn't it make  sense  to  require  all  sysops  to  abide by a
     standard set of rules  for  granting  user  access?  No handles,
     voice numbers and addresses must  be  obtained and verified, and
     God help you if you don't.

     I mean, who cares about that  "A  sysop  may run his board as he
     pleases" crap.


     Participate

     One of the biggest problems in FidoNet is one of Apathy.  We are
     continually arguing over which side the silent majority  is  on.
     If  one  cares  enough  to  join,  one  should  care  enough  to
     participate  in  the  decision making process - if one does  not
     participate, one relinquishes his access.

     In our net, we have a node that is VERY active  in the Veteran's
     Affairs.    The  sysop  is not very active in either our net  or
     regional conferences, although  he  does attend the face to face
     meetings we occaisionally have.    Should he HAVE to invest time
     at the local level when  he  makes  a  great contribution at the
     national level?

     In many ways, his situation exemplifies  the  worst of the flaws
     in  a  local  policy.  He was  working  at  putting  together  a
     standard kit for other Veteran's groups to get  online  quickly.
     It's tough enough to do the technical work of  bringing up a new
     node;   local  policy  could  increase  that exponentially.  For
     instance, suppose the  local policy mandated CM operation - that
     would exclude any Vet  Center wanting to do "split use" on their
     phone lines.  Strict network rules regarding user identification
     and registration contradict the need for confidentiality in many
     "social service" forums.


     Pick Up Echoconferences (At Your Expense?)

     Echomail is the main mechanism for communication in FidoNet.  In
     order to ensure that everyone gets the information,  doesn't  it
     make sense that everyone should be required to get some base set
     of echo conferences?

     Not to me, it doesn't.  Let me count the ways.

     FidoNews 6-20                Page 18                  15 May 1989


     In the old days, there was one, and only one thing one had to do
     to join FidoNet that overtly cost money:  send a message  to  an
     NC requesting a node number.  Once you had your node number, you
     could easily exist  with  nearly no contact with the coordinator
     structure.

     The logic presented for  mandated echomail sounds like requiring
     that I buy a TV  and  leave  it  on  CNN all the time, even if I
     could care less.

     Further, the question is where does  it  stop?    Can we mandate
     regional,  zonal, and FidoNet wide conferences as  well  as  our
     little local one?  (What, this is unreasonable?    Hmmmm  - that
     doesn't sound consistent to me ...) And while we  are at it, can
     we mandate more than one per level - say one for sysops, and one
     for  general chatter?  (Oh, you say this is unreasonable?  Hmmmm
     ...  but what you suggest sounds unreasonable to me!)


     Pick Up Groupmail

     If we assume it's ok to mandate echomail, why not groupmail?  In
     fact, in this  net,  we are right thinking sorts of people - you
     not  only  have  to    get  our  net  conferences  grouped,  but
     EVERYTHING.


     Provide Credit References

     Before you get into this net, we are going  to make sure you are
     a right thinking  upstanding individual.   Our NC, S. Daddy, has
     access  to TRW, and checks your credit with them before granting
     a  node  number.    If  you  are  unwilling  to  provide  enough
     information for same, no node number.


     Mandated Routing

     Since we have mandated conferences here, we don't really want to
     impose too much long  distance.    Therefore,  you MUST make any
     conferences you have available to other net members.


     Minimum Baud Rate

     Since we require you to pick up all this crud, and since I don't
     want my Glorious NC System tied  up  for  excessive  periods  of
     time, all nodes in My Most Perfect Network must run 2400 baud or
     better.  If you run less than that,  you  should  be a point, as
     you are not real serious.


     Run A BBS

     This network exists to serve users.  Therefore, to  be  a member
     of  this  network, you must provide direct services to users  by
     FidoNews 6-20                Page 19                  15 May 1989


     operating  a BBS.  Mail Only and Private systems are simply  not
     allowed.


     Run CM

     In this day and age, there is just no reason not to run CM.

     And who cares about Fido11w anyway?


     Run Session Protected

     We have a lot of problems with nodes imitating nodes.  In  order
     to  eliminate  this problem  locally,  all  nodes  must  operate
     session protected.

     We don't care about Fido11w either.


     Run Wazoo

     In this day and age,  it's damned annoying to have to restart an
     echomail or other file transfer.   Since  WaZoo  was  the  first
     restartable session technology, we require all nodes in this net
     to operate WaZoo capable.


     Impact of Stupidity

     Let's consider the impact of this stupidity.   First  off, we'll
     probably  have to establish that local Policy itself is  subject
     to  challenge up the chain.  This will probably take  a  few  of
     months of arguing.  Let's assume it takes the nets a  couple  of
     months  of  squabbling  to arrive at a local policy.  Then there
     will be  a  month  or so of intense local argument before things
     get into complaints or challenges.  From there, we have a couple
     of weeks of per  level  of  fact  gathering and decision making.
     And if the policy is  overturned,  we  are faced with other ugly
     questions:    is  the whole local  policy  invalid?    Will  the
     creators follow the dim logic of "There's  more  than one way to
     skin a cat" and come up with some new policy that does about the
     same thing but avoids the points of the decision.

     It's Sysiphian.


     Stupidity Is Uniformly Distributed

     When  I  was  younger,  I  spent long hours trying  to  convince
     Chairman  Len  that  my  generation  had a unique perspective on
     reality, and  was  therefore  smarter.    Len  would  argue that
     stupidity  is  evenly    distributed.      I  still  believe  my
     generation's perspective is quite  different  from his, but long
     ago, I conceded his point on stupidity.

     FidoNews 6-20                Page 20                  15 May 1989


     Many people, myself included, have  been  critical  of the upper
     level  coordinator  structure.   In my  opinion,  a  significant
     percentage of the RC structure could be used as lab animals in a
     brain death demonstration.  However, this is not to say the NC's
     and NEC's are perfect.  Far from it -  I  have  seen  MANY  more
     misstatements  of  Policy  from  the  NC level than from the  RC
     level.    This  is  to  be  expected:    if stupidity is equally
     distributed on  a  percentage  basis, there are bound to be more
     stupid NC's than RC's.

     Also, in very  few  cases  do  I believe Malice is the operating
     emotion.  To quote Chairman Len:  "When presented with stupidity
     or malice as explanations for  incomprehensible  behaviour,  the
     smart money is always on stupid."

     A Policy is only as good  as  the  people that bring it to life.
     At  this  point, we have one single  Policy  which  is  unevenly
     interpreted and implemented - a direct comment on the quality of
     the people doing the implementation.  Policy3 (or 4)  may or may
     not be badly written, but if you allow full local  policies, you
     will  SURELY  end up with a zillion Policies, some of which  are
     badly written, most being  unevenly interpreted and implemented.
     You considerably increase the amount of stupid arguing that goes
     on about Policy - instead of  pointless  bickering  (and  little
     action)  on  one Policy, you'll have three  or  four  times  the
     pointless bickering, as you add Zonal, Regional, and  Net  Level
     hassles.

     I  recently saw a message characterizing the various operational
     entities in FidoNet as gangs.  What leads anyone to believe that
     local Policy would not lead to local gangs?


     Policy Process

     Comparisons To US Governmental Organization

     Paradox: A Node Number Is Not A Right

     One  of the biggest pieces of garbage I've heard lately is  that
     FidoNet  is  a right.  Freedom of speech in FidoNet is a  right,
     not a privilege.

     Membership in FidoNet is not a right.  It is a privilege.  It is
     earned.   Unfortunately, many in FidoNet  (particularly  in  the
     SouthEast) seem to have lost sight of  this.  We do not have the
     right to defame, to make racist remarks, to  shout  Theatre in a
     crowded Fire.

     What  I find most amusing about all this is it  comes  from  the
     hotbed of  EggNet - a network based on all these fine principles
     which does not work.  Since it's screwed up on its own, it seems
     now to want to  try  the  same  experiments  in  FidoNet,  which
     largely DOES work.


     FidoNews 6-20                Page 21                  15 May 1989


     Policy Is More A Bill of Rights Than A Set Of Laws

     A fundamental problem is that people look on Policy as the rules
     of FidoNet.  This is only  partially  correct.  If you come back
     to the analogy of US Government, Policy  is  both  the "US Code"
     AND The Bill of Rights.

     Those basic rights are as follows:

     A Sysop May Run His Board Pretty Much As He Pleases

     So long as he meets the basic technical and social norms, he may
     participate in the network

     Along with these rights are responsibilities:

     Thou shalt not excessively annoy
     Thou shalt not be excessively annoyed


     Voting Against As Opposed To Voting For

     Perhaps  the biggest problem with something like Policy is  that
     too  many  are  willing  to  be  one-issue  people.   All  their
     decisions  are  based  on  that  one  issue.    For some, it  is
     democracy.   For  others, it is local Policy.  For still others,
     it's commercialization.

     It's simply not possible to write a policy document that doesn't
     offend someone.  But in our "I"-centered network,  the  things I
     object  to are far more important than the good  of  the  whole.
     More  than  anything,  this  typifies  what  is  wrong  with the
     network.


     How Do You Expect A New Policy To Be Put In Place?

     Personally,  I  think  a big mistake was made in using Policy4's
     own processes to bootstrap it.  I am at least partially to blame
     for  this.    It  should  simply  have  been put in place by the
     IC/RC's, and subsequent changes made by the mechanisms therein.

     Let's assume  P4  is  voted  down.  What next?  Do you think the
     RC's will want  to  go  through this again?  For that matter, if
     David were as power  hungry  as  he  is depicted, what reason is
     there for him to ALLOW a policy that erodes that (as P4 does.)

     One way or the other,  a Policy change must be acceptable to the
     *C  structure at all levels.   It  cannot  be  imposed  on  that
     structure, at least not given Policy3.


     How Do You Expect To Get A New IC?

     If you vote down Policy 4, how  do  you  expect to get a new IC?
     One of the things that keeps David in  office  is the chaos that
     FidoNews 6-20                Page 22                  15 May 1989


     would    surely    ensue    if    he   left  given  the  current
     "non-succession".


     Who Do You Expect To Write Policy 4.07?

     At this point, at least a year and a half  of effort on the part
     of the RC's has gone into Policy 4.  Despite what many think, it
     was  not  the  work  of an obnoxious bunch of boors who want  to
     crush the sysops  under  their  boots.   The divisions among the
     RC's are as great as the divisions seen in the network.

     It is a particularly  gruelling process for the person doing the
     writing.  This person has  to  tread a fine line between his own
     opinions and the will of the  majority.  He is often placed in a
     position where he has to write language  he considers terminally
     flawed, and is met with abuse when he  finds it impossible to do
     so.  It's even tougher given that the RC's  are  as apathetic as
     the net as a whole - a minority of the  RC's  even  bothered  to
     participate while I was scribe - Zone 3 was marginally involved,
     Zone 2 not at all.  (Another farce that needs to be  addressed -
     Zone  2  isn't  a part of FidoNet.  They operate under their own
     Policy and we should give them what they want:  out.)


     Vote For Policy 4

     -----------------------------------------------------------------
     FidoNews 6-20                Page 23                  15 May 1989


     Re-typed and submitted by Jack Decker
     Fidonet 1:154/8  LCRnet 77:1011/8  NetWork 8:70/8


                         NO-CODE PACKET RADIO?

     [All of the following text (INCLUDING the note asking that the
     article be reprinted) is taken verbatim from April, 1989 issue
     of the Tandy User Group Newsletter (a NON-copyrighted
     publication of the Radio Shack Marketing Information Department
     of Tandy Corporation).  The author is Ed Juge, director of
     market planning, Radio Shack, 1700 One Tandy Center, Fort
     Worth, Texas  76102.]


     And, Speaking of Packet Radio...

     (Note to club newsletter editors - Even though this may seem a
     little bit off the subject, please try to find space in your
     newsletter to reprint it.  I think many of your members may
     find it of real interest.)

     In a column in PCM Magazine last Fall, I editorialized a bit
     about the large number of computer users who are sharing data,
     programs, electronic mail, and more... not just locally, but
     with others literally around the world... and not paying a dime
     in connect time charges.  That, and a follow-up column early
     this year, brought more mail than any topic I have ever written
     about.

     How are they doing this?  By way of Amateur Radio.  But, you
     say, "You gotta' learn that Morse Code stuff."  MAYBE NOT!
     Amateurs recently lost 2 MHz. of frequency spectrum to
     commercial services, and frankly, it had the effect of a major
     earthquake, measuring "10" on ham radio's Ricther scale!
     Immediately, one well-known Amateur launched a campaign to
     petition the Federal Communications Commission for a no-code
     VHF license.  Even the prestigious American Radio Relay League
     (ARRL), who had successfully and bitterly fought a previous
     attempt at such a license, appears to be taking a much more
     liberal stand.  They appointed and an ad-hoc committee to study
     the no-code issues and recommend a course of action to their
     board of directors.

     To make a long story as short as possible -- and to get to why
     I'm discussing all this in a computer newsletter -- the FCC has
     effectively told the Amateur community, if you want a no-code
     VHF license, and the ARRL doesn't fight it, it's yours.

     If the FCC receives a petition, it will issue a Notice of
     Proposed Rulemaking (NPRM), and allow some period of time for
     replies... possibly as short as 30 days... before making their
     decision.  That's far too short a comment period for magazine
     lead times to pass the word, and IF YOU'RE INTERESTED, YOU
     SHOULD COMMENT TO THE FCC!

     FidoNews 6-20                Page 24                  15 May 1989


     Let me take a moment to explain to those who don't know, that
     Very High Frequency (VHF) refers to frequencies above 30 Mhz.
     In terms of the Amateur bands, this includes 50 Mhz (6 meters),
     which allows for some fairly long-distance work.  (Under
     international law, Morse code is a requirement for licensing
     below 30 Mhz.)

     =============================
     An Amateur Radio License
     WITHOUT LEARNING MORSE CODE!!
                          ...Maybe
     =============================

     Although there are several digital modes used below 30 Mhz,
     including PACKET, AMTOR, BAUDOT and ASCII teletype, and even
     keyboard sent/video received Morse code... most of the VHF
     digital operation is "Packet Radio."  Packet is literally
     computer-to-computer data transfer, using a slightly modified
     X.25 protocol.  There are bulletin boards, personal mailboxes,
     and many types of operation computer users would find exciting.
     There is even a nationwide traffic (messaging) system which
     allows me in Texas to address a message to someone in Maine,
     which will be automatically relayed across the country to its
     destination.  It could go through multiple VHF relays, or it
     might go through a "gateway" onto the long-haul HF bands, or
     even cross the country via satellite.  Widespread use of these
     exciting digital modes on Amateur Radio is less than five years
     old, so exciting advances in software and techniques are
     happening monthly if not weekly or daily.

     ==========================
     Transfer Data and Programs
        --Around the World--
        No Connect Charges!
     ==========================

     An Amateur VHF Packet station can be as simple as a Model 102
     laptop computer, a "Terminal Node Controller" (TNC) and a ham
     "walkie-talkie."  A small, battery-powered TNC costs about
     $160, and a used "talkie" another $150 or so.  So, as you can
     see, a complete station (you can even throw it in your
     briefcase) is quite inexpensive.

     Packet Radio has one interesting characteristic... if you are
     close enough to "connect" with ANY other station, you can use
     that station (even without his knowledge) to act as a repeater
     for your transmissions, and thereby extend your range
     considerably.  Many hams leave their VHF packet stations on 24
     hours per day, making packet operation about as easy from a
     walkie-talkie as it is from a base station with an antenna high
     in the air.

     Getting back to the original objective... the question of a
     codeless license takes on almost religious overtones among
     Amateurs.  Others feel it's stifling growth, and thereby
     endangering frequency allocations.  Those who favor a codeless
     FidoNews 6-20                Page 25                  15 May 1989


     license feel that many who could contribute greatly to the
     Amateur service are being kept out by what they view as an
     unreasonable and irrelevant restriction... code.  Because of
     the leading-edge technologies Amateurs have available today...
     satellite communications, "EME" ("Earth-Moon-Earth" or
     "moonbounce"), and digital communications, computer enthusiasts
     are probably at the top of the list of those who could derive
     the most enjoyment from, and make the greatest contribution to,
     Amateur Radio.

     So, my purpose in bringing you what I had hoped would be a
     short dissertation, is to encourage you to watch the news on
     this matter.  If a codeless Amateur Radio license appeals to
     you -- or if you feel strongly that it should NOT happen --
     then watch for an FCC NPRN, and send them your comments!!

     This newsletter appears in electronic form on several
     information services.  If you look around the service, you'll
     find a ham radio special interest group.  Watch their bulletin
     board for developments.

     ==============
     If YOU care...
       Comment!
     ==============

     If you're reading this in a club bulletin, and you're
     interested, send me an SASE, and I'll let you know if and when
     it's time to comment.  It is important to get input to the FCC
     from those who might benefit from such a change, rather than
     just from those who are already licensed.  The FCC sincerely
     wants opinions from all interested parties.  Let me know if you
     want to know when and how to comment.


     -----------------------------------------------------------------
     FidoNews 6-20                Page 26                  15 May 1989


     Bill Vanglahn
     FidoNet@1:107/557

          "...what a reasonable person would do......"

        Statements  like  this are seen throughout the law books  when
     referring  to  definition of negligence.  Legal  issues  are  are
     beginning  to crop up throughout the land of Sysops,  with Sysops
     suing  users,  users  suing Sysops....  The question of  what  an
     average,  reasonable Sysop would do in a given everyday situation
     has crossed my mind many times as of late. And so, the reason for
     this letter.

        As you are well aware of, YOU run your system the way YOU want
     to.  That's the way it should be.  The person 3 blocks away  from
     you  may run his system differently,  and I may do it a different
     way than either of you.  That's what makes BBS's so  interesting,
     the  diversity of the systems you can call,  and the way you  can
     make your system conform to what you like.

        But, as far as the law is concerned, a Sysop should be working
     within some set of boundaries,  which are mostly common sense. As
     of this moment, I know of no defined rules of What-a-Sysop-does-
     or-doesn't-do, because it has never been defined in any way. If a
     list  were  compiled  that  stated,  "Well,  given  this  similar
     situation,  an AVERAGE Sysop would have......", not only would we
     have a legal leg to stand on,  but we could help the courts get a
     view into our world of electronic communications.

        In  order  to  get  a  good concensus of  what  we  are  doing
     individually, I have compiled the following questionnaire. Please
     take the 2 minutes out to fill it out, and return it to me at the
     netmail  address below.  This is truly a case where you can  help
     define your own future!

        Please send your answers to:

                Bill Vanglahn
                              FidoNet 1:107/557
                             ALTERNet 7:520/557
                                P/Net 9:93/0
                           PhoenixNet 9:807/2

           Or, via US Mail to:
                              P.O. Box 73
                              Dumont, N.J. 07628








     Sysop Questionnaire
     ~~~~~~~~~~~~~~~~~~~
     FidoNews 6-20                Page 27                  15 May 1989


     *NOTICE*

     ALL INFORMATION ON THIS FORM IS HELD CONFIDENTIAL!



      Please answer these questions with the one MOST correct answer.

     1) Do you run your BBS as a......

                A) Hobby
                B) Support Board for PD/Shareware Products
                C) Support Board for Commercial Products
                D) Other, please specify _____________________

     2) When new users log on, what kind of registration system do you
     use?
               A) On-Line Registration
               B) Mail Registration
               C) No Registration
               D) Call-Back Verification
               E) Questionnaires On-Line
               F) Other, please specify ___________________________

     3) No matter which method of regitration you use,  do you  voice-
     verify new users?

               A) Always
               B) Occassional Spot-Checks
               C) Very Seldom
               D) Never

     4) Do you have material that can be considered of an adult nature
     available for reading/downloading on your board?

              A) Yes
              B) No

     (If the answer to #4 is No, please skip to question #9)

     5) Do you restrict access to adult material on your system?

             A) Yes
             B) No

     6) How do you determine access rights to the adult material?

             A) On-line Verification
             B) Mail-in Disclaimer Form, Notarized
             C) Mail-in Disclosure Form, with Copy of Proof of Age
                                 (Driver's License, Passport, etc.)
             D) Voice Verification
             E) Other, please specify ______________________________

     7)  Do you have any limits set on the degree of adult material
     present on your system?
     FidoNews 6-20                Page 28                  15 May 1989


             A) Yes
             B) No

     8) The following is a set of True/False questions.

        I  would  allow  adult  material  on  my  system  that   dealt
     with.......
                                                  T      F

             A) Nude photographs
             B) Masturbation
             C) Explicit sexual acts
             D) Homosexuality-male
             E) Homosexuality-female
             F) Group Sex (more than 2 people)
             G) Sex with animals
             H) Pedophilia (sex with minors)

     (Back to the multiple choice)

     File Area Questions

     9)  A  user  uploads a program that is  protected  by  copyright,
     either  as  the whole program,  a hacked version,  or  a  pirated
     version. I would

             A) Warn the user that he will be locked out next time.
             B) Lock the user out of your BBS.
             C) Permit the file to be downloaded by others.
             D) Inform the company that wrote the software.
             E) Other, please specify _______________________

     10)  A user uploads a program that is a trojan/virus  program.  I
     would.......

             A) Do nothing.
             B) Take no action against the user, but erase the file.
             C) Warn the user, and erase the file.
             D) Lock the user out of the BBS, and erase the file.
             E) Lock the user out, and seek legal action.

     11)  Do  you have a separate file directory  for  newly  uploaded
     programs?

             A) Yes
             B) No





     12)  Do  you  check  new uploads before they  are  available  for
     downloading?

             A) Yes
             B) No
     FidoNews 6-20                Page 29                  15 May 1989


     13) How often do you perform checks on newly uploaded files?

             A) Daily.
             B) Once a week or more.
             C) Once a month or more.
             D) Every other month or more.
             E) New uploads are not checked.


     Message Area Questions

     14) Do you proof messages before they can be read by the  general
     public?

            A) Yes
            B) No

     15)  How  often  do  you check your  message  base  for  improper
     messages?

            A) More than once a day.
            B) Daily
            C) Every other day.
            D) Weekly
            E) Every other week.
            F) Monthly.

     16) Is your system capable of running in a network (communicating
     with other BBS's)?
            A) Yes
            B) No

     17)  Does your system share messages with other systems (Echomail
     /Groupmail conferences)?
            A) Yes
            B) No

     18) Do you routinely run any utility that deletes messages from  a
     particular user or network address?
            A) Yes
            B) No








     19)  A user enters a message which is considered offensive to
     other users. I would.....

            A) Warn the user, and lock him out if it happens again.
            B) Deny the user access to the message conference.
            C) Deny the user access to the entire message system.
            D) Lock the user out.
     FidoNews 6-20                Page 30                  15 May 1989


            E) Do nothing. The user is stating his/her opinion.
            F) Other, please specify _____________________________

     20)  A  user enters information in a message about  some  illegal
     activity. This could include phreaking, hacking (in the bad sense
     of the word), construction of bombs, etc. I would......

             A) Warn the user that he will be locked out next time.
             B) Lock the user out of your BBS.
             C) Permit the message to be read by others.
             D) Inform the proper authorities.
             E) Other, please specify _______________________

     General Information

     (We will attempt to correlate answers based on these)


     21) How many users are currently listed on your system?

             A) 1-50
             B) 51-100
             C) 101-200
             D) 201-500
             E) 501-1000
             F) >1000

     22) Which BBS Package are you using?

             A) Fido                  H) Phoenix
             B) QBBS                  I) PCBoard
             C) TBBS                  J) RBBS
             D) Kitten                K) TComm/TCommNet
             E) Opus                  L) Lynx
             F) WWIV BBS              M) Spitfire
             G) Wildcat!              N) Other _____________________

     Optional Information

            Your Name: ______________________________________

       Street Address: ______________________________________

       City,State,Zip: ______________________________________

       Network Address Zone:___ Net:_____ Node:_____


       When  you  include your mailing address,  I will send  you  the
     hard-copy results of this survey!


        Thank you for helping support the future of your hobby!


     -----------------------------------------------------------------
     FidoNews 6-20                Page 31                  15 May 1989


     John Perkins
     The Engine House,  1:260/315
     (315) 451-7148
     Syracuse_NY

                         The Wilderness Echo


     The Wilderness Echo, WILDRNSS, is a non-backbone Echo that has
     recently been created in response to a perceived need.  Any and
     all discussions related to wilderness camping, hiking, canoeing,
     and related fields are welcome and encouraged.  Discussions
     include, but are not limited to, 'Places To Go' , recently
     acquired wilderness and canoe areas, as well as new equipment
     reviews.

     There currently are nodes receiving this Echo in various parts of
     the USA.  I would like to have many more nodes as there are many
     fine wilderness areas that are not represented.

     If you enjoy the great outdoors or would like to find out more
     about the wilderness and related fields give us a try!

     If you would like to carry this echo please send netmail to me at
     the ENGINE HOUSE , 1:260/315.

     -----------------------------------------------------------------
     FidoNews 6-20                Page 32                  15 May 1989


     =================================================================
                                  COLUMNS
     =================================================================

     The Veterinarian's Corner
     Excerpts from the ANIMED GroupMail Conference

     by Don Thomson, 1:102/1005

     (From the ANIMED conference):

       Hi Doc.  How's business?

       I have to report that Ranger's chin has been clear for a long
       time now, or at least it sure seems long.  Thanks. I think he
       feels a lot better  because of it.  He is more social and
       playful with G.P. than he had been while his chin hurt.
       However, this brings with it another new problem.  (If it ain't
       one thing it's another...)  The little #@$@@ G.P. chews on
       Rangers ears as they do battle all over he apartment.  Ranger's
       ears are pink and, I'd dare guess, a bit sore.  Is there a
       recommended ointment or treatment, other than seperation of the
       two monsters we call cats?

       Nice to have a doc in the bbs community.  Thanks again...

                  Robert, Jeanne, Ranger and G.P.

     ----------

     Glad to hear it, Robert!  The eosinophilic-granuloma complex is a
     skin disease unique to cats.  We can get into that topic at a
     later date. Suffice to say, great that he feels better all
     around!

     > The little #@$@@ G.P. chews on Rangers ears as they do battle
     > all over the apartment. Ranger's ears are pink and, I'd dare
     > guess, a bit sore. Is there a recommended ointment or
     > treatment, other than seperation...

     I assume we are only talking about irritated skin, not severly
     inflammed or infected. Mild 0.5% hydocortisone cream applied on a
     occasional basis would be the most I would reccomend without an
     examination. As long as there is no foul odor and discharge that
     would indicate an outer ear infection or earmites this would be
     safe. Cats are extremely resistant to c.steriod side effects.
     Some of the base carriers of ointments can be irritating to cats,
     so stick to a cream. If the inflammation worsens, he should be
     seen....

     DB Thomson, DVM
     1:102/1005
     9:871/16

     -----------------------------------------------------------------
     FidoNews 6-20                Page 33                  15 May 1989


     The following  is  the last in a series of four columns Fred Grosby
     (a federal government  employee, and a user on "The Falcon's Rock")
     has written.  He  deserves  all  the  credit  for  writing them.  I
     suggested that he upload them  to  my  system,  because  I  enjoyed
     reading them in our local Mensa  newsletter, Capital M.  I hope you
     enjoy reading them, too.  The archive  of all four is available for
     file request from 1:109/501 as BSOUTH.ZIP.

     Notes From Bureaucracy South (Part 4)
     By Fred Grosby, a user on 1:109/501

     What a mess.  Sprinkler head blew on  the  eighth floor, and by the
     time they figured out how to shut the system  off,  three floors of
     our building had been inundated with several inches of water.  Five
     hundred  thousand  dollars    in  computer  equipment  was  ruined.
     Documents that I had  worked  on for months now have water and rust
     spots on them.  And  the whole damn thing wouldn't have happened if
     it hadn't been for SMART.

     SMART stands for Space Management And  Reduction  Task,  and like a
     lot of things here at Bureaucracy South  it started out as a pretty
     good idea.  We've reduced staff over the last few years, so it only
     made sense to reduce our office space as well.  Sure, it would cost
     something to renovate the remaining space to better accommodate us,
     but the savings in rent was supposed to more than make up for that.
     Seemed like a smart idea at the time.

     So we hired a Contractor to draw up some plans.  We  used  to  do a
     lot  of  this sort of thing ourselves, but that's not what one does
     nowadays.  Today, you  hire  a  Contractor, often because the staff
     reductions have hit the people who used to do whatever sort of work
     is being contracted.  This is  called Privatization.  There may not
     be  money  for  anything  else,  but  there  is  always  money  for
     Privatization.

     Anyway, the Contractor In Charge Of Planning drew  up  a  stack  of
     plans, which were duly approved by the building management  and the
     Bureaucracy  In  Charge Of Buildings, a moving schedule was issued,
     and people started to pack up their stuff.  And then...    nothing.
     SMART  slammed  to a screeching halt.  For months we heard nothing.
     I mean,  people  were  working  out of cardboard boxes and we heard
     nothing!

     Just about the  time  I had figured that the whole thing was a dead
     issue, we found out  what  the  delay was about.  Seems that in his
     zeal to get the building  management  and the Bureaucracy In Charge
     Of Buildings to approve the plans,  the  Contractor  In  Charge  Of
     Planning had forgotten to get the plans  approved by The City.  Now
     The City did not like the idea of  us renovating a building without
     the required permits, and clapped a lid on the  whole  thing.  What
     we had been waiting for was for The City to  review and approve the
     inch-thick stack of plans and issue the permits.

     Anyway,  once  all  the building permits were in order, an army  of
     employees hired by the Contractor In Charge Of Renovation showed up
     and got  right  to  it.    Only  thing  was,  the  plans called for
     FidoNews 6-20                Page 34                  15 May 1989


     renovating areas of  the  building  that  still had people in them.
     This, folks, was not  a  very  smart idea.  I walked into the first
     office being renovated just in  time to see somebody trying to work
     while a contractor employee stood on her desk rewiring the ceiling,
     as dust and pieces of ceiling tile  drifted  down  over everything.
     It came to a head when the next  scheduled  office  demanded  to be
     moved to safe quarters while their space was being  renovated,  and
     invoked the threat of a complaint to The Union.   Faced  with  this
     threat  (nothing  intimidates us like a threatened complaint to The
     Union), the  Contractor  In  Charge Of Renovation was instructed to
     revise the whole work plan that had been drawn up by the Contractor
     In Charge Of Planning.  More delays.

     Finally, the Contractor In  Charge Of Renovation started working on
     the space into which my  group  would  be  moving.    Boy,  were we
     excited!  We used to go down to our new space and try to figure out
     what was going to go where.   Well,  guess  what.   Just as we were
     getting ready to pack up, the workers disappeared.    Just  dropped
     their  tools and split.  Seems that the Bureaucracy  In  Charge  Of
     Buildings forgot to pay the Contractor In Charge Of Renovation, who
     then could not afford to pay his workers.  The workers, being good,
     smart  union  people,  did what all good smart union people do when
     they don't get paid:  they went on strike.  Took three weeks to get
     the whole mess straightened out.  Then we had to wait while another
     office was moved  into  our  new  space  so  their  space  could be
     renovated.

     Our actual move was  to  take  place  over  a  weekend.  The Friday
     before moving day, I helped  the  people  from  our  administrative
     services office mark all of our  stuff.   Every item, right down to
     the  trash  cans,  was  marked with a  number  corresponding  to  a
     location on the blueprint of our new space.    This  is supposed to
     insure that the right stuff gets put in the  right  space  for  the
     right  person.    We'd  used this system before, and it  had  never
     failed us.  Until this time.  This time, the Bureaucracy  In Charge
     Of  Buildings  forgot to pay the Contractor In Charge Of Moving, so
     the  entire  office  was  moved  from the eighth floor to the sixth
     floor  by  two  administrative  services  people  working  overtime
     throughout the weekend.    Under  the  circumstances,  they  did an
     absolutely wonderful job, but  you  wouldn't  have known it to have
     walked into our brand new office on Monday morning.

     It was a disaster.  The marked floor plan had been abandoned.  File
     cabinets, shelving, and boxes were heaped  everywhere.   Desks were
     shoved into the strangest places;  one woman had to literally climb
     over the top of her desk to get to her chair.  By some miracle, the
     only thing that I lost was my phone.   I  was  lucky;  it took some
     people  hours to find the boxes holding their work.   None  of  the
     computers  were  hooked up;  three of them, including the one  that
     houses our  logging  and  tracking  systems, didn't even get moved.
     Nobody told the  cable pullers to drop new cables for our mainframe
     terminals, so we didn't  have access to the payroll computer.  Ever
     tried working in a payroll  office  where  you don't have access to
     the payroll computer?

     And if that wasn't bad enough,  they  decided  that  since  we were
     FidoNews 6-20                Page 35                  15 May 1989


     moving anyway, it would be a good  time  to give our clerical staff
     their brand new Workstations.  For those of you who have never seen
     one, a Workstation has less storage space and takes  up  twice  the
     floor area of the desk that it replaces.  Ours  have  the  optional
     computer  keyboard  trays that mangle the connecting cables and are
     perfectly placed to smash your knees if you move too fast.  Anyway,
     here came the  Contractor  In  Charge Of Workstations with all this
     furniture, which was then crammed into areas intended for plain old
     desks.  On top of  the  mess  from  the move, this was more than we
     could handle.  By Tuesday afternoon, we just threw up our hands and
     decided to live with it as it was.  And still is, for that matter.

     Well, time went by, and even though  we  still did not love our new
     work environment, we managed to come to terms  with  it.   And then
     came The Flood.  All of that renovation required relocation of many
     of  the  nozzles for the building's sprinkler system.  About  three
     weeks after we moved, just as things were starting to settle  down,
     the  nozzle  located  in  the public affairs office, right by their
     brand-new desktop publishing equipment, decided to pretend that the
     building was on  fire.   This in itself was a catastrophe, but what
     really made it bad  was that nobody knew how to turn the thing off.
     Do you believe it?   Here  we  are,  in a building with a full-time
     maintenance    staff,   equipped  with  a  state-of-the-art    fire
     suppression system, and nobody knows how to  shut  the damned thing
     off!  ARRRRGH!!!  Finally, somebody came up  with  the  smart  idea
     that, well, since it is a fire suppression system,  maybe we should
     get the fire department to turn it off.  That  worked just fine, of
     course, but by that time the water had seeped down two  floors, and
     the plaster was falling off the walls in our office.  But  you know
     what?    We didn't have to pay for the damage!  Seems that although
     we paid for the renovation, the building management was responsible
     for seeing that it was done correctly.  Your tax money is safe this
     time;  the building management's insurance paid the bill.

     So they fixed the walls, and dried out the carpet, and replaced all
     that ruined computer equipment, and  except  for the rust and water
     stains on about 200 pay documents life here at Bureaucracy South is
     pretty much as it was before.  I'm told that with all of the delays
     and changes of plans, SMART will end up  costing  a  good  bit more
     than it was supposed to save, but that's not  what's  important  to
     those of us who work here.  What's important to us is that SMART is
     finished.

     -----------------------------------------------------------------
     FidoNews 6-20                Page 36                  15 May 1989


     =================================================================
                              LATEST VERSIONS
     =================================================================

                          Latest Software Versions

                           Bulletin Board Software
     Name        Version    Name        Version    Name       Version

     Fido            12k    Opus          1.03b    TBBS           2.1
     QuickBBS       2.03    TPBoard         5.0    TComm/TCommNet 3.4
     Lynx           1.30*   Phoenix         1.3    RBBS         17.1D


     Network                Node List              Other
     Mailers     Version    Utilities   Version    Utilities  Version

     Dutchie       2.90C*   EditNL         4.00    ARC           6.01
     SEAdog         4.50    MakeNL         2.12    ARCmail        2.0
     BinkleyTerm    2.20*   Prune          1.40    ConfMail      4.00
     D'Bridge       1.18*   XlatList       2.90    TPB Editor    1.21
     FrontDoor       2.0    XlaxNode       2.32    TCOMMail       2.2*
     PRENM          1.40    XlaxDiff       2.32    TMail         8901
                            ParseList      1.30    UFGATE        1.03
                                                   GROUP         2.07*
                                                   EMM           1.40
                                                   MSGED         1.99
                                                   XRS            2.0*

     * Recently changed

     Utility authors:  Please help  keep  this  list  up  to  date  by
     reporting  new  versions  to 1:1/1.  It is not our intent to list
     all utilities here, only those which verge on necessity.

     -----------------------------------------------------------------
     FidoNews 6-20                Page 37                  15 May 1989


     =================================================================
                                  NOTICES
     =================================================================

                          The Interrupt Stack


     19 May 1989
        Start of EuroCon III at Eindhoven, The Netherlands. Contact
        Hans Ligthelm of 2:500/3 for details.

      5 Jun 1989
        David Dodell's 32nd Birthday

      2 Aug 1989
        Start of Galactic Hacker Party in Amsterdam, Holland. Contact
        Rop Gonggrijp at 2:280/1 for details.

     24 Aug 1989
        Voyager 2 passes Neptune.

     24 Aug 1989
        FidoCon '89 starts at the Holiday Inn in San Jose,
        California.  Trade show, seminars, etc. Contact 1/89
        for info.

      5 Oct 1989
        20th Anniversary of "Monty Python's Flying Circus"

     11 Nov 1989
        A new area code forms in northern Illinois at 12:01 am.
        Chicago proper will remain area code 312; suburban areas
        formerly served with that code will become area code 708.

     If you have something which you would like to see on this
     calendar, please send a message to FidoNet node 1:1/1.

     -----------------------------------------------------------------

     FidoNews 6-20                Page 38                  15 May 1989


            OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION

     Mort Sternheim 1:321/109  Chairman of the Board
     Bob Rudolph    1:261/628  President
     Matt Whelan    3:3/1      Vice President
     Bill Bolton    3:711/403  Vice President-Technical Coordinator
     Linda Grennan  1:147/1    Secretary
     Kris Veitch    1:147/30   Treasurer


            IFNA COMMITTEE AND BOARD CHAIRS

     Administration and Finance     Mark Grennan    1:147/1
     Board of Directors             Mort Sternheim  1:321/109
     Bylaws                         Don Daniels     1:107/210
     Ethics                         Vic Hill        1:147/4
     Executive Committee            Bob Rudolph     1:261/628
     International Affairs          Rob Gonsalves   2:500/1
     Membership Services            David Drexler   1:147/1
     Nominations & Elections        David Melnick   1:107/233
     Public Affairs                 David Drexler   1:147/1
     Publications                   Rick Siegel     1:107/27
     Security & Individual Rights   Jim Cannell     1:143/21
     Technical Standards            Rick Moore      1:115/333


                      IFNA BOARD OF DIRECTORS

         DIVISION                               AT-LARGE

     10  Courtney Harris   1:102/732    Don Daniels     1:107/210
     11  Bill Allbritten   1:11/301     Mort Sternheim  1:321/109
     12  Bill Bolton       3:711/403    Mark Grennan    1:147/1
     13  Irene Henderson   1:107/9       (vacant)
     14  Ken Kaplan        1:100/22     Ted Polczyinski 1:154/5
     15  Scott Miller      1:128/12     Matt Whelan     3:3/1
     16  Ivan Schaffel     1:141/390    Robert Rudolph  1:261/628
     17  Neal Curtin       1:343/1      Steve Jordan    1:206/2871
     18  Andrew Adler      1:135/47     Kris Veitch     1:147/30
     19  David Drexler     1:147/1       (vacant)
      2  Henk Wevers       2:500/1      David Melnik    1:107/233

     -----------------------------------------------------------------
     FidoNews 6-20                Page 39                  15 May 1989


                                      __
                 The World's First   /  \
                    BBS Network     /|oo \
                    * FidoNet *    (_|  /_)
                                    _`@/_ \    _
                                   |     | \   \\
                                   | (*) |  \   ))
                      ______       |__U__| /  \//
                     / Fido \       _//|| _\   /
                    (________)     (_/(_|(____/ (tm)

            Membership for the International FidoNet Association

     Membership in IFNA is open to any individual or organization that
     pays  a  specified  annual   membership  fee.   IFNA  serves  the
     international  FidoNet-compatible  electronic  mail  community to
     increase worldwide communications.

     Member Name _______________________________  Date _______________
     Address _________________________________________________________
     City ____________________________________________________________
     State ________________________________  Zip _____________________
     Country _________________________________________________________
     Home Phone (Voice) ______________________________________________
     Work Phone (Voice) ______________________________________________

     Zone:Net/Node Number ____________________________________________
     BBS Name ________________________________________________________
     BBS Phone Number ________________________________________________
     Baud Rates Supported ____________________________________________
     Board Restrictions ______________________________________________

     Your Special Interests __________________________________________
     _________________________________________________________________
     _________________________________________________________________
     In what areas would you be willing to help in FidoNet? __________
     _________________________________________________________________
     _________________________________________________________________
     Send this membership form and a check or money order for $25 in
     US Funds to:
                   International FidoNet Association
                   PO Box 41143
                   St Louis, Missouri 63141
                   USA

     Thank you for your membership!  Your participation will help to
     insure the future of FidoNet.

     Please NOTE that IFNA is a general not-for-profit organization
     and Articles of Association and By-Laws were adopted by the
     membership in January 1987.  The second elected Board of Directors
     was filled in August 1988.  The IFNA Echomail Conference has been
     established on FidoNet to assist the Board.  We welcome your
     input to this Conference.

     -----------------------------------------------------------------
-- 
 ...sun!hoptoad!\                                     Tim Pozar
                 >fidogate!pozar               Fido:  1:125/406
  ...lll-winken!/                            PaBell:  (415) 788-3904
       USNail:  KKSF / 77 Maiden Lane /  San Francisco CA 94108