The Silicon Jungle by David H. Rothman

9. Does the program require a mouse—the gadget you roll on your disk to

2759 words  |  Chapter 219

move the cursor? How easily can you control the program without a mouse? Footnote 105: I’m basing the “windows-shopping” questions on points raised by various micro publications, especially _Popular Computing_, May 1984, p. 96. BACKUP X ❑ Of Mice and Men—and Touch Pads, Touch Screens, Etc.[106] “If you’re a trained, high-volume production typist,” asked Seymour Rubinstein, the WordStar developer, “what are you going to do with a mouse except feed it cheese?”[107] Footnote 106: For background in researching this appendix—but not for the opinions, strictly mine—I’m grateful to Forrest M. Mims’s excellent article “A Few Quick Pointers.” It appeared in May 1984 _Computers and Electronics_. Footnote 107: Rubinstein’s “cheese” quote is from _InfoWorld_, May 14, 1984, p. 57. Score one for Rubinstein. He says mice are great—if you have three hands. Doing graphics? A mouse, maybe. But damned if I’m going to take my hands off the keyboard to push the cursor from one spot on the screen to the next. It’s simply too much wasted motion. I instead just press the cursor keys right above the main keyboard. Or I use WordStar’s cursor-moving commands. And even if I hadn’t learned touch typing a quarter century ago, I’d still wonder if a mouse for word processing wasn’t the Silicon Valley version of _The Emperor’s New Clothes_. Next time you’re in California, maybe you’ll see Apple execs naked in the streets as well as their hot tubs. Well, maybe not. The mouse could be a great marketing tool for sales reps peddling Macs or Apple IIc’s to people hoping to do word processing. But experienced typists? Many would probably groan over all the excursions that the mouse forced them to take from the main keyboard. Some enemies of mice—cats?—also wonder if jockeying the cursor this way couldn’t be a little tiring for people writing or typing. Think of the hand-eye coordination required. You’re rolling a palm-sized gizmo on your desk to position the cursor on a single letter at times, and that might not wear too well if you‘re working for hours on end. Mind you, the rodents have their friends, especially at Apple, where, inconsiderately, the hardware wizards didn’t even favor the Macintosh with cursor keys. Joe Shelton, the Apple products manager mentioned in Chapter 7, says he does most of his writing with a mouse. He suggests the mouse-equipped Macintosh for “naïve users.” Your term, Joe. Now I’ll slightly water down my jeremiads. Macintosh-style computers offer nifty graphics and nice offbeat typefaces. So some trendy writers may want one—rodent or not. And if you’re an executive or someone else not doing heavy word processing? Then maybe, just maybe, a mouse is for you. Perhaps you’re working with spreadsheets, a number of programs in fact, and you write only a small fraction of the time. Richard Webb—a partner at Peat, Marwick and Mitchell, the big accounting firm that advised Apple during development of the Macintosh and ordered thousands of them—swears by the mouse for spreadsheets. He says that alone would justify the mouse. I’m not a spreadsheet artist and will take a pro’s word. But at least for heavy-duty writing and typing, the old cursor keys are my best bet. Graphics is different. There, the cursor keys are more cumbersome. One artist, however, wanted not a mouse but an electronic “pad and a stylus”; he might be happy with a =digitizing tablet=—also known as a =graphics tablet=—like the well-known KoalaPad. You can write on this surface with a stylus or your finger and the computer will display the lines on its screen. A =touch-sensitive screen= is still another possibility—for some people—both in word processing and graphics. You point your finger at a spot on the screen. Bingo! You can start moving a paragraph or perform graphics magic. But touch typists may face the same problem as with the mouse—wasted motion—and some people may tire of reaching up to the screen again and again. Also, touch-sensitive screens may not be precise enough for you to pick out just one number or letter. Hugh Hunt raised an interesting issue. “What happens if a fly lands on the Hewlett-Packard screen?” he asked someone about a computer with a touch screen. Well, I hear, the HP 150’s screen uses infrared touch sensors that are more than fly length from the glass. “Debugging” the 150, Hewlett-Packard must have thought of _everything_. Yet other pointing devices are: ● The =joystick=. Moving the stick around, you move the cursor. A neat idea. But it’s more fit for video games than word processing and many other business programs—you just can’t point exactly. ● The =trackball=. You move the cursor by rotating a ball inside an enclosure. Want the cursor to go faster? Then rotate the ball more energetically. The trackball is found most often in arcade-style systems. It’s great for chasing aliens and may have uses in spreadsheets and data-base management, but some people say it’s an abomination for word processing. ● The =light pen=, with which you could electronically “draw” on the screen. _Draw?_ Okay. _Write?_ Well, it’s “wasted motion” time again here, as with the other items on this list. As computers climb the executive ladders—as more nontypists use them—these alternatives may grow in importance. And what about people on the factory floor? They may use such gizmos to make new inventory entries or machine adjustments. Partly the world is learning to type, and partly the computer is learning to understand devices other than the keyboard. What cursor-control gizmos are ahead? I’ll keep reading the _National Enquirer_ articles about people moving objects with their minds. Maybe, the hard-core hackers are thinking, the next gimmick will feature some user-friendly ESP. BACKUP XI ❑ The Micro Connection: Some Critical Explanations When John Fuller hooked up his Heath micro over the phone lines to the Wang at his office, he had a head start on many other do-it-yourself telecommuters. He wasn’t a computer or electronics rookie. For years he had worked around big IBM’s and Honeywells, and while telecommuting, he was a computer and management consultant with the navy. He even soldered together his H-89—a kit. And, anyway, he was communicating with another smaller computer, a Wang word processor. Does that mean you should give up on do-it-yourself telecommuting because of the technical complexities? No. Not at all. Before hiring a consultant, you might consider two possible sources of free advice: (1) your corporate data-processing department, if you have one, and (2) users groups, whose phone numbers you can get through dealers. Before approaching anyone, though, learn the basics of the technology. A =modem= converts the _0_s from your computer into one pitch and the _1_s into another, and that whine, you’ll recall, goes out over the phone lines. The “mo” in “modem” stands for “modulator”; the “dem,” for “demodulator.” And a “dem” springs into action at the other end—demodulating the whine back into the _1_s and _0_s. Modems come in two varieties, =direct connect= and =acoustically coupled=. The direct-connect modem hooks between the phone line and your phone, or between your phone and the handset. Its whine transmits better over static-ridden lines than do acoustic couplers, but it’s normally a little more expensive, and hard to install if your phone lacks =modular plugs=, the tiny plastic ones that unsnap. Using an acoustic coupler, you cradle your handset in rubber “earmuffs.” A small speaker whines into the phone transmitter; a little microphone picks up the sound from the handset’s receiver. Acoustic couplers don’t need phones with modular plugs, obviously—a boon to traveling executives—but they might not work if the handset is oddly shaped, as it is with some of the new-style phones. Also, loud noises in the room can confuse them. A direct-connect modem, for that reason and others, would probably be better for your regular office. Also, consider a =full-duplex= modem in most cases. No, it isn’t a modem for two-family houses. “Full duplex” is just jargon for computers jabbering back and forth, both ways, at once. Like two people on the phone. A =half-duplex= modem would allow just one-way communications without switching; it’s somewhat comparable to a radio with an unwieldy send-receive control. There are times, however, when half duplex would be best. Normal phone lines, =voice grade= ones in telephone company language, can’t handle computers jabbering at too high a speed, and half duplex may work better than full. Like most modems for personal computers in the early 1980s, Fuller’s gizmo transmitted information at 300 baud—equivalent to 300 bits a second, 30 characters per second, or 360 words per minute at 5 letters a word. When telecommuting, however, you may be better off with a modem going 1,200 baud. After all, it can zip material over the phone lines at four times the speed, and that means you’re tying up your modem less on long documents. You might not be tying up _yourself_ if you run an operating system like Concurrent CP/M, which lets your computer handle electronic mail while you’re using it for other purposes; but a 1,200-baud modem is still a good investment if you can afford it. You may well be able to. Soon 1,200-baud modems with auto-answer features will commonly sell for well under $300. Sent through a modem, the =data bits= are those conveying the information itself. And the =start bits= and =stop bits= keep track of the beginnings and ends of your micros’ characters. The most common setting is a =word length= of 8 data bits and 1 stop bit. =Parity bits= may help the computers check for errors caused by static and other electronic noise. Parity is said to be “even,” “odd,” or “none.” This =error-checking= method has its drawbacks. It may fail if the mistakes cancel each other out—and it’s slow since it checks every character. Some =communications programs= (the ones allowing computers to talk) lack this feature. The most common parity setting is “none”—when you tell your software not to do parity checks. A few other wrinkles in such programs are: FILE TRANSFER That’s the ability to send whole files of text or data—including programs, too. CAPTURE ABILITY With =capture ability= you can keep a record of each end of a keyboard conversation with both people typing away. You tell your computer to open up a =buffer= in its RAM—the temporary memory. The buffer captures the conversation. And if it fills up, some software will automatically “write” to your floppy disk, then reopen the buffer. Some programs won’t write to the disk at the ends of your conversations unless you command them to, meaning that the absentminded will see their bits and bytes vanish. PROTOCOL FLEXIBILITY Beyond changing bit numbers, etc., you may want software that can handle different kinds of protocols—sets of rules telling how computers transmit different sets of information. One possible protocol for you to use—at least in conversations with other micros—would be the =XMODEM Protocol= or =Ward Christensen Protocol=. The receiving computer tallies up the number of bits and bytes transmitted from =blocks=—tiny parts of material—and compares this =check sum= to the number that the originating machine says it sent. And if there’s a mismatch? The receiving computer asks for the block again. You might also use no protocol at all. It’s as if you’re sending material simply by tapping away on the keyboard without any elaborate rules for the other person’s machine. You two should still, however, agree on basics like baud rate, data bits, stop bits, and parity. Protocols use =handshaking= as part of their bags of tricks. Handshaking, computers swap bits and bytes to verify that they’re on speaking terms. A common form is =XON/XOFF=. Some mainframes use XON/XOFF to talk to micros and vice versa. The receiving computer gives an XOFF signal, telling the transmitting one to pause while the receiving machine “writes” to its disk. XON means, “Okay, my buffer’s almost empty. Send more!” Without this =flow control=, you might overwhelm the buffer and lose information. AUTOMATIC DIALING AND OTHER TRIMMINGS Some modems will let the communications software dial for you or at least let you feed the number in from your keyboard. Some also have =automatic log-on=. That lets you check onto a network or bulletin-board system without typing out your ID or password. Many =intelligent modems=, by the way, even without special software, can remember and dial phone numbers automatically and spit out log-on sequences and passwords. VERSATILITY Want to speak to a number of computers? Then buy software allowing you to set: ◼ Baud rate (speed of transmission). ◼ Data bits. ◼ Stop bits. ◼ Parity. ◼ Terminal emulation. It means making the micro imitate popular brands of terminals. ◼ Half or full duplex. Full is most common in micro communications. ◼ The type of handshaking protocol. Ideally, the software will also: ◼ Accommodate a variety of modem types. ◼ Designate the host—which computer will manage the =echo back= (which makes the typed conversation appear on both screens). ◼ Let you choose different protocols. All those features, of course, might still not let you communicate easily with your corporate computer. It may not use the =ASCII= code, for instance, which most micros do. “Since you ASCII’d, anyway,” as _PC Magazine_ once punned, “those five letters are an acronym for the American Standard Code for Information Interchange.” With ASCII, an “A” is one combination of _1_s and _0_s, “B” is another, “,” is another, and so on. When communicating with a mainframe capable of ASCII, it may not matter what brand of micro you’re running. So don’t reflexively think Big Blue for telecommuting. The proud IBM mainframes, however, like aloof mandarins of old China, jabber away in a dialect of their own, =EBCDIC=—it’s similar to ASCII but different enough to cause serious problems. Now that doesn’t mean your home computer won’t work with an IBM mainframe. But it may require special programming that will translate from one set of codes to another. Of course your corporate mainframe may also need a string of =control characters= to open or close an electronic file, and here your word-processing software may matter more than your communications program. The control characters normally are just letters tapped out in combination with the control key to give commands to your computer. They generally don’t print out on paper; they may or may not show on the screen. In this case, controls characters pass the commands on to another machine over the wires. And so you may have to =embed= the control characters in your electronic files. If your word processor won’t let you embed control characters, you may not be able to communicate with some kinds of mainframes. WordStar lets you do this. An issue more basic than control characters is whether you’re using =synchronous= or =asynchronous communications=. The former is a staple among the big mainframes; the latter, among micros. In synchronous communications, the two computers or modems employ timing signals to separate characters sent in one stream. Synchronous has a big advantage. You can send at 4,800 baud over regular phone lines; you can’t with the asynchronous method, or at least not with late 1984 technology. But “synch” is more expensive—the needed modems typically cost well over $1,000. Asynchronous, moreover, doesn’t require timing signals. It’s the simplest form of communications between computers; and more and more data-processing departments have added asynchronous ports for micros to dial up. John Fuller himself was communicating not with a giant computer but a dedicated word processor in his office, which, like most, talked ASCII asynchronously. He solved other problems on his own. You may need a consultant to do what Fuller did. But take heart. It could well be worth it, what with the time and money your telecommuting may spare you and your employer. “I’m saving gas, dressing in comfortable grubbies when I write,” Fuller said in an article about his experiences, “and with the direct connection I can _prove_ that I’m working. I turn out my reports faster. My computer is really paying off. Now,” said the self-deprecating Fuller, “if you’ll excuse me, I have to repel invaders from space.” BACKUP XII ❑ MODEM7: An Almost-Free and Fairly Easy Way to Talk to Other Computers MODEM7 may be free, but it _works_. With it you can talk to computers thousands of miles away _if_ they’re running MODEM7 or compatible software. Normally, your only real expense is for the modem and maybe cables; you might spend as little as $100. Using MODEM7, you can send letters, reports, or programs already on your computer disk. Or you can receive them. You can also:

Chapters

1. Chapter 1 2. Chapter 7 and Backup VII, you’ll learn (1) the basics, (2) when charts 3. Chapter 12, “How I Found ‘God’ on MCI (and a Few Other Odds and Ends 4. 1. Bigger RAMs can work with more and larger numbers—a handy capability 5. 2. More RAM can accommodate programs more complicated for the computer. 6. 3. You may want the most sophisticated software to thwart computer 7. 1. You can quickly make safety copies of valuable disks—something that’s 8. 2. You can more easily work with long electronic documents. 9. 1. Absence of bugs. The software maker should have gotten all the bugs 10. 2. General ease of use. A program should be easy enough to learn _and_ 11. 3. Good documentation. The manual should be clear and logically 12. 4. Usefulness to beginners and old pros alike. You can adjust the best 13. 5. Speed. It lets you do your job fast, especially when you use it with 14. 6. Power. Related to speed. The program can quickly accomplish 15. 7. Fewer chances for botch-ups. Good programs limit the chances for 16. 8. The Jewish-uncle effect. Ideally, your software will slow you down or 17. 10. After-the-goof feedback. After you’ve botched up—and we all do 18. 11. Ability to customize. You or at least a software expert can 19. 12. Availability of “accessory” programs to make your original software 20. 13. Support. Ideally, the software seller will stand behind his product 21. 1. A =cursor= is just the marker on your screen—a blinking line, 22. 2. A =file= is an electronic version of a letter, report, or other 23. 3. A =control key= is what you start holding down to turn a letter or 24. 4. To =scroll= just means to move from place to place in your 25. 5. A =menu= lists commands on your screen. It can tell you how to 26. 6. A =block move= is the ability to move material from one part of 27. 8. A =search and replace= substitutes one word (or group of words) for 28. 1. When you work for a stuffy old bureaucracy that’s rich and afraid 29. 2. When you’re a procurement officer on probation. As they say, no 30. 3. When you want to dump the training problems in the manufacturer’s 31. 4. When you prefer an extra-large, extra-sharp screen and giant 32. 5. When you’re looking for a machine that will run special software 33. 1. It takes all of two or three minutes—maybe less—to copy a disk 34. 3. Computer users want to befriend others with similar machines so 35. 4. Many software companies overprice their wares. Yes, it’s expensive 36. 5. Some people in large companies think software houses don’t give 37. 6. Many software companies don’t offer enough guidance or other help. 38. 2. A file in a data base is the electronic version of a file drawer or 39. 3. A =field= is a category of fact like the amount of money spent on 40. 4. =Structure= is simply the way a record is set up. There are three big 41. 5. The EDIT command changes the contents of a data field. You can type 42. 6. A command to APPEND can add new records to your electronic filing 43. 7. =Sorting= lets you reshuffle records alphabetically, by date or other 44. 8. The LIST command tells dBASE II to flash across the screen the 45. 9. .AND. helps you narrow down the information you’re looking for or 46. 10. .OR. is another way to describe the desired facts. LIST FOR 47. 11. LIST FOR .NOT. SALE:PERSN = ‘BABBITT’ could help weed from view, or 48. 12. =Command files= are programs that tell the machine how to manipulate 49. 1. A large number of rows and columns. A spreadsheet of 254 rows and 65 50. 2. Speed. “Even with a simple spreadsheet,” says Scharf, “someone might 51. 3. General simplicity and ease of use. In tricky places, does the 52. 4. Range of commands. Most spreadsheets nowadays let you easily move or 53. 5. The ability to do what-if tables. The best spreadsheets won’t just 54. 6. Easy consolidation of figures from different spreadsheets. That’s no 55. 7. =Natural order of recalculation.= Cells must influence the numbers in 56. 8. A useful =macro language=. Macros are combinations of commands that 57. 1. Deciding whether to hire a computer consultant. How much in your time 58. 2. Hiring and using a consultant. It isn’t just a matter of asking, 59. 3. Training employees. Don’t clutter your people’s minds with 60. 4. Working with your company’s data-processing people. Know which 61. 1. The computer company’s FORTRAN, according to Stewart, was as badly 62. 2. FORTRAN wasn’t as good as BASIC for micro data bases that stashed 63. 3. Brown was still basically a mainframer. And micro FORTRAN was 64. 3. “What’s the quality of the work? 65. 1. Who’s teaching? Can he or she communicate well with the students, and 66. 3. Why is the material taught? To make your people computer literate in 67. 4. When do the students learn? On their time or yours? Will you reward 68. 5. Where is the learning happening? Ideally, your students can take the 69. 6. How do the students learn? Through instruction manuals, mainly, or 70. 1. Even the best-intentioned companies may fail miserably in easing some 71. 2. The traits which make somebody valuable to his company _may_ be the 72. 3. At the same time you can’t stereotype anyone—by age, folksiness, or 73. 4. An important part of training is simple salesmanship—persuading the 74. 5. Don’t make computerization seem more threatening than it has to be. 75. 6. As early as possible start people on real projects. The first day at 76. 2. Helped them with some learning aids like color-coded keys showing 77. 3. Motivated them by explaining how their new computer skills would make 78. 1. Before approaching Data Processing, ask who-how questions about the 79. 2. Ask your informal Data-Processing contact about possible technical 80. 3. When you’re ready to deal with the Data-Processing manager, tell 81. 4. Make it clear you’re aware of your project’s complications. 82. 1. =The canary-in-the-mine= theory of labor relations. Ergonomics is 83. 3. =“Terminal” happiness.= Detachable keyboards are just a start, 84. 7. =Air conditioning, heating, and ventilation=—basics neglected by a 85. 8. Honest assurances to your people that you’re exposing them to the 86. 9. A willingness to consider alternatives to the TV-like CRTs that 87. 10. Sensible use of wrinkles like the mouse—the hand-sized gizmo you use 88. 11. A related ingredient, good software—the topic of earlier chapters. 89. 2. How far the keyboard platform protrudes from the platform on which 90. 4. The angle at which the screen faces you. You can swivel away to your 91. 5. The height of your chair. You don’t of course need high-tech 92. 1. Removing half the tubes from existing fluorescent fixtures. You’ll 93. 2. Parabolic fluorescent fixtures with baffles to keep the light out of 94. 3. Parawedge louvers, which, according to Eisen, “have been particularly 95. 4. Desk and floor lamps. You might buy rheostats you can plug in between 96. 5. Indirect lighting. The disadvantage is the expense. You may have to 97. 1. Coatings or etching applied during manufacture of the video displays. 98. 2. Coatings put on after manufacture. Generally, but not always, they 99. 3. “Colored plastic panels and etched faceplates,” which, says Eisen, 100. 4. Micromesh filters, favored by German ergonomists. Eisen says U.S. 101. 5. Polarizing filters. They may reduce brightness and shorten tube life, 102. 1. There is a possibility, extra-slim, but still there, that 103. 2. More minor physical and mental problems from computers definitely do 104. 6. The possibility of a detached retina 105. 3. Guarding your electronic files 106. 1. Burden programmers and others with electronic versions of heavy 107. 2. Keep their computer systems easy to use—and vulnerable. (“Then you’re 108. 3. Compromise. (“You get half raped.”) 109. 1. How hard, exactly, would it be to puzzle out? Just how many 110. 2. How compatible is the program with your computer? If security is so 111. 3. Is the security program easy to use? If it’s too hard, it’ll be 112. 4. Are you certain the program won’t jeopardize the accuracy and 113. 5. Should you expand your system, will the security software be able to 114. 6. Do you want a =public key= encryption system? It works this way. You 115. 7. Will your code be based on the =Data Encryption Standard= (=DES=), 116. 1. See if your disk has a file at least 500 or 600 words long. If so, 117. 3. Erase A. 118. 1. Zealously enforce a no-drinking, no-eating policy around disks, at 119. 2. Remember the Rothman Dirt Domino Theory. Dirt, dust, and grease often 120. 3. Realize that floppies don’t always mix well with office materials 121. 4. Know about other natural enemies of floppies or at least of the data 122. 5. Don’t even let your floppies rest against your computer’s screen, 123. 6. Remember that the more information you can pack on a floppy, the more 124. 7. Clean your disk heads. Don’t use rubbing alcohol. “Try something like 125. 8. Have head alignment checked, to reduce disk errors. With heads out of 126. 9. Buy quality disks. Of course, the more you spend on disks, the more 127. 1. Every five minutes or so, type out the “KS” or an equivalent and dump 128. 2. Every half an hour make a printout of your recent work. With a fast 129. 3. Every day make your backup floppy. You might forget about the scratch 130. 1. Dumping to floppies. It’s cheap but slow. Then again, you can speed 131. 2. Transferring the Winchester’s contents to a special tape drive large 132. 3. Dumping to an ordinary videocassette recorder. Although slow, it’s 133. 1. How much time or money does it take to enter your data or set up your 134. 3. How much time or money do you have for copying, cleaning, 135. 1984. Many more companies might be. They might have kept quiet, however, 136. 1. The cottage keyers are paying more than $2,600 a year to rent their 137. 3. Likewise, the cottage keyers lack the normal fringe benefits. The 138. 4. The keyers may not be sharing the experiment’s rewards fifty-fifty. 139. 1. Ease and speed of use. You needn’t be a computer expert or wrestle 140. 2. Friendliness. A good system isn’t just easy to use; it’s also boy 141. 4. Confidentiality. Clerks aren’t privy to the same information as the 142. 1985. They’d be able to place mutual-fund orders for clients, conduct 143. 1. Lower phone bills. In a Midwestern office of the H. J. Heinz Company, 144. 2. Elimination of telephone tag. “We can type a memo at the end of our 145. 3. An end to garbled messages. Errors and misunderstandings decline when 146. 4. More efficient sharing of ideas. =Computer conferencing= is an 147. 1. How long a Kaypro took to sort dBASE II files electronically while 148. 3. How long a second Kaypro needed to sort the dBASE files in the first 149. 1. How extensive do you want your network’s file-sharing capabilities to 150. 2. Who’ll manage the network? Who’ll determine who can see what 151. 3. Do you want to assign special network-related duties to other people? 152. 4. Who will work at what =node=? That’s jargon for a location or =work 153. 5. Will some people share work stations? If so, you’d better decide 154. 7. How many printers and other gizmos will people share, and where will 155. 8. What kinds of computers are you planning to hook up? The WEB as of 156. chapter 11, but subject to court approval, would be bought by a Swedish 157. 1. If your computer messes up, remember the very last thing you did, 158. 2. See if that isn’t the answer to your problem. 159. 1. Know your prices. Study the want ads of the local papers. There’s 160. 2. Pay attention to the machine’s physical condition. A banged-up 161. 3. Find out how your pet programs run. If you don’t have any available 162. 5. Find out what generation of equipment it is. Does it include all 163. 6. Learn where you stand legally if you’re buying software with the 164. 7. Call up commercial auctioneers and find out if they’re holding any 165. 8. Obviously you’ll want to consider a maintenance agreement with a 166. 1. Another daisy wheel machine. The daisy wheel is plastic or metal and 167. 2. A =laser printer=. Typically, it works a bit like some copying 168. 3. A =thermal-transfer printer=. This uses patterns of heat to arrange 169. 4. An =ink-jet printer=. This kind literally squirts ink against the 170. 1. =Draft quality.= The letters are too dotty for anything but drafts 171. 2. =Correspondence quality.= It’ll do for a letter to a forgiving friend 172. 3. =Near-letter quality.= You can get away with it for book manuscripts, 173. 4. =Letter quality.= That’s typewriter quality. 174. 1. Does the printer offer them no matter what computer or program you 175. 3. For free, will the store modify your computer system to make the 176. 4. Will your desired combinations of features work simultaneously? 177. 2. If not, can the store make one up for you? At what cost? 178. 1. The general logic of the manual. The author should have written it 179. 2. The quality of the index. I’ll charitably assume it’s there to begin 180. 3. Simplicity of vocabulary and sentence structure. A manual shouldn’t 181. 1. The field may only contain certain numbers and/or letters—for 182. 2. The field will _enter itself_ based on your previous entries. For 183. 3. The field can be a constant. For example, if your data record 184. 4. The field can automatically shift cases for you. For example, you 185. 5. The field can insist that whatever you type in is identical two 186. 6. The field can be required—something that you _have_ to enter, or 187. 1. Does the program help you come up with pies, bars, or whatever kind 188. 2. Can it do so as quickly as possible? 189. 3. Does the program fit in well with your other software? 190. 4. How much memory space does the program—and the electronic files of 191. 5. What about the program’s color capabilities—both on screen and on 192. 6. Does the program coexist okay with the printer or plotter you own or 193. 7. How easy is the program to learn? What about the other general traits 194. 1. “Who?” Who from the contracting firm is doing the work? A junior 195. 2. “What?” Describe the task as clearly and precisely as possible. And 196. 3. “When?” Can you negotiate a penalty if the firm misses a deadline? 197. 4. “Where?” Will the consultants do the work in your office? Theirs? On 198. 5. “How much?” Obvious. 199. 1. Thinking small. Don’t bargain over the Who-How simply for the whole 200. 2. Making the consultant give you the source code of the new software. 201. 3. Insisting that any manuals for his software be complete and in plain 202. 4. Bargaining if possible for a software warranty. Then, if you discover 203. 5. Possibly requiring the consultant to give you a discount on 204. 6. Negotiating for full or part ownership of the software he may develop 205. 7. Forbidding the consultant from selling the new software to your 206. 8. Making the consultant pledge that he won’t violate any trade-secret 207. 9. Hammering out a confidentiality agreement, if necessary, to protect 208. 10. Making the consultant agree in writing that he is working as your 209. 11. Trying to write into the contract your right to a full explanation 210. 12. Remembering that there’s only so much protection the law can give, 211. 13. Choosing the right lawyer, if you can afford one, for the contract. 212. 1. Is the convenience worth the extra several hundred dollars you’ll be 213. 3. How do the windows look alongside each other? Do they =overlap=, just 214. 4. How about =data transfer=? If you move information from one 215. 5. What kind of graphics—=bit mapped= or =character based=? The bit 216. 6. Will the window program work with ordinary software or just products 217. 7. Will the windows at least slightly slow down some programs? A word 218. 8. Is the program picky about the computers it’ll work with? A window 219. 9. Does the program require a mouse—the gadget you roll on your disk to 220. 1. Communicate teletype-fashion with the other person. You can keep 221. 2. Call up electronic bulletin-board systems (BBSs) or plug into The 222. 3. Get copies of other programs that altruistic computer buffs have 223. 1. Start out with the other person’s modem set on ORIGINATE and yours on 224. 3. Hit your carriage-return key. 225. 6. Assuming you’re using a manual modem, flick the switch to “data.” 226. 3. Hit your return. 227. 1. From MODEM7’s main menu, you select =T= and again hit the return a 228. 2. Find out if the other person can read words you type. (Don’t worry if 229. 3. Tell him (or her) to set up his computer so that, on paper or on a 230. 4. Once the other person is ready—while you’re still in the =T= mode—hit 231. 5. Now you type =B:[name of file]=. Here and elsewhere don’t type the 232. 6. Next hit your return. The disk should start spinning, and both you 233. 2. Again, select your trusty =T= from the main menu. But don’t hit your 234. 4. Type =B:[the name of the file you’re creating on the data disk to 235. 6. Then hit the letter =Y= with your finger on the control key 236. 8. Then, to preserve the file, “writing” to your disk, you must type out 237. 2. From MODEM7’s main menu, type =S B:[name of the data disk file you 238. 3. Hit the return. 239. 3. Hit your return. 240. 2. Type the word TYPE, then a space, then the name of the file—preceded 241. 3. Then hit your return. 242. 4. Hit your return. 243. 3. Tap =Control-B=. 244. 4. Type the right number (300 for 300 baud, 1200 for 1,200; do not use 245. 5. Hit your return.

Reading Tips

Use arrow keys to navigate

Press 'N' for next chapter

Press 'P' for previous chapter