The Silicon Jungle by David H. Rothman

5. Hit your return.

8736 words  |  Chapter 245

Please note that at least on my Kaypro II the =Control-B= command doesn’t work. This may have been due simply to my machine’s quirks. Again, don’t forget that MODEM7’s successors operate somewhat differently and may use a command such as =SET= or =TIM= to set up the baud selection. And remember, too, that the old MODEM7’s baud command won’t control the speed of your modem (although some modems will automatically pick up the baud rate of the one at the other end). Thanks to Jon Albers, Eric Meyer, Rick Nelson, and Pat Ehresmann for checking the accuracy and clarity of the above instructions. Blame me, however, if anything’s wrong. My instructions are a simplification of: =CP/M MODEM PROGRAM DOCUMENTATION by Mark M. Zeiger and James K. Mills 11/04/80= The MODEM7-styles programs have their origins in the work of Ward Christensen, an IBM employee and public-spirited computer hobbyist. ■ ■ ■ A MODEM7 Cheat Sheet Snip this out! It’s a handy summary of commands for the free MODEM7 program. ◾ _TO MAKE MODEM7 APPEAR ON YOUR COMPUTER SCREEN_: Type MODEM7 from the A> prompt and hit your carriage return. You’ll end up in the program’s main menu. Or if you’re using a new program, you might instead see a screen telling how to reach the menu. ◾ _TO USE THE TELETYPE-LIKE TERMINAL MODE_: Tap the letter =T= and a carriage return after the main menu appears. You can use this mode with The Source, MCI Mail, and other on-line services. ◾ _TO USE THE ECHO MODE_: Type =E= and the return. For Teletype-like use when the other machine is in “Terminal.” ◾ _TO GO FROM ONE MODE TO ANOTHER_: Use =Control-E=. This gearshift mode returns you to the main menu. ◾ _TO SEND MATERIAL ON YOUR DISK WITHOUT THE WARD CHRISTENSEN ERROR-CHECKING PROTOCOL_: Type =Control-T= after you’re in the terminal mode. Give the name of the file to transmit. Here, as in other cases, precede the name by =B:= (no space after the :) if the file is on Drive B. Hit your carriage return. ◾ _TO RECEIVE MATERIAL WITHOUT A PROTOCOL_: After typing the usual =T= in the terminal mode, you skip a space. Then specify the name of the file where you’ll collect the received data. Now hit your return several times. Use =Control-Y= to tell your computer to start saving material; also use it to turn off the save feature. (On newer versions of MODEM7, =Control-R= might be the off switch.) _IMPORTANT_: After you’ve finished talking to the other machine, you must return to the main menu and type =WRT= and return. Otherwise your computer won’t save the material on the disk. ◾ _TO SEND TO SOMEONE WITH A MODEM7-STYLE PROTOCOL_: Type =S=, skip a space, then type the name of the file that you’ll send—with the =B:= before it if necessary. Hit the carriage return. ◾ _TO RECEIVE FROM SOMEONE WITH A MODEM7-STYLE PROTOCOL_: Type =R=. Skip a space. Then type the name of the file where the material will show up, using =B:= if needed. Hit the return. ◾ _TO RETURN TO THE A> PROMPT_: From MODEM7’s main menu, type =CPM= if you’re using a CP/M version like the Kaypro one. (The IBM version substitutes =DOS= for =CPM=.) Hit your return. ■ ■ ■ BACKUP XIII ❑ Why Not an Electronic Peace Corps? In a Chicago suburb a $50,000-a-year engineer spends countless hours twiddling with his new IBM PC. The technology engrosses him, but he lacks a sense of purpose. In Southeast Asia, meanwhile, a young man wrestles with calculations needed to build an irrigation dam. He thinks his figures are correct but isn’t certain, and thousands of people will die if the dam collapses. Can the Chicago engineer somehow help his counterpart abroad? There is a way if politicians for once will appeal to the better instincts of technicians. An Electronic Peace Corps (EPC) could bring these two together and offer the Third World some of the best international technical expertise via computer networks. Useful computers sell for around a thousand dollars, and much better, cheaper, smaller computers are on the way. What’s more, thanks to satellites, international communications prices are falling; and 1,000-word messages anywhere in the world, via special packet-switching networks, could cost just $1 each. So the EPC needn’t threaten the taxpayers with a major burden. By essentially exporting knowledge instead of people, it in fact would increase the impact of economic-aid dollars. The EPC could emphasize basics like public health, agriculture, transportation, construction, manufacturing, and communications. In carrying out the idea, a government or international agency might keep computer files listing: ● The skills and information required in specific underdeveloped countries. ● People abroad who needed help. ● Those who might be able to offer it. Most of the corpsmen wouldn’t even be computer experts—just people with the right technical knowhow. Some might be ex-Peace Corpsmen. Others might receive special cultural indoctrination similar to traditional Peace Corps training. Once in the EPC, the corpsmen might regularly correspond via E-Mail at nights and on weekends or on occasion “talk” instantly to Third World counterparts. Of course, not every Third World beneficiary might use a micro. Some might submit written questions that local Peace Corps offices could pass on electronically (one way to mitigate the language problem). E-Mail, incidentally, needn’t be the only form of computer communications available through the EPC. The organization could offer electronic bulletin boards with the names of people either needing or offering information on subjects like biological pest control or solar power. That way, the EPC’s beneficiaries would feel as if they had more of a choice. In addition, there might be ongoing computer conferences on topics of common concern. Obviously, the EPC wouldn’t replace foreign-aid experts in the field, and it wouldn’t aid people _directly_ at the village level. It wouldn’t hand out lap-sized portables to barefoot farmers. Rather, the EPC would help engineers, doctors, scientists, and other people engaged in development in their own countries. Corpsmen in the field would work with local governments to make certain, for instance, that a New Delhi slumlord didn’t use the EPC to automate his dunning operation. Typical EPC beneficiaries might be Indians trying to set up a more efficient grain-storage network, millions of Third World people are starving because the food goes to the wrong places. Sometimes, incidentally, the “wrong places” include the warehouses of thieves, and computerized records could reduce the opportunities for corruption. Many problems are political or economic, of course. The EPC would limit itself to technical issues and try to be as apolitical as possible, just as the international Red Cross focuses on relief rather than ideology. Another EPC beneficiary might be a communications specialist hoping to install a satellite link; for obvious reasons, better communications might be one of the EPC’s first priorities. The EPC might help domestic and foreign groups working toward this goal. Even countries with poor phone lines, of course, can receive some computer messages in the large cities. Yet other beneficiaries could include: ● Colombian doctors who wanted to fight an epidemic with the latest information sped over the computer lines. ● A civil engineer in Peru working on a road or bridge for isolated villagers who hoped to sell food to cities. ● A rural-assistance administrator in Kenya. Micros could help his staffers keep abreast of the newest, best way to dig a well or treat a dysentery-stricken baby. The EPC wouldn’t just promote the flow of information from countries like the United States to the so-called lesser-developed countries. _Among_ them, too, it would speed up the spread of practical solutions to common problems. Learning of an efficacious home remedy, for example, a rural-assistance group in Ecuador might pass the information on for possible global dissemination. It just might save the life of a child in Peru. By keeping track of the better home remedies in the Third World, in fact, an American drug researcher might discover something that checked out scientifically—as has happened in the past. Some Third World countries or groups of them might want to start their own EPCs. Rather than preempting these efforts, an American or international EPC could aid them, thereby multiplying the benefits of the original organization and forestalling fears of electronic imperialism. The EPC could have a domestic version, too. Because of lower communications cost, the Home Corps (a friend’s phrase) might take more chances helping nonexperts without credentials. A gifted high school writer on Chicago’s South Side might tap out short stories on a school computer, for example, and a famous author across town might zip the files back, with comments easily inserted electronically. The two might meet a few times in person, then carry on via computer without the hassles and menace of urban travel. Likewise, an Evanston business executive might volunteer help to a businesswoman in a small town many miles away. The most urgent need for EPC-style assistance, however, is in the Third World, where, because of technical backwardness, so many are starving. The idea isn’t so farfetched. In fact the Third World is already enjoying some similar help in a small way. The CARINET computer network links the United States, the Caribbean, Southeast Asia, and Africa. Long before harvest time a Jamaican farmer can learn how promising a market there’ll be for his crop in the United States—or an African potter can find out how to make a ceramic insulator for his local phone company. Jerome Glenn, an official with Partnership for Productivity International, the Washington-based group behind CARINET, says the answers often come in just a day. “Mail takes too long and Telex is too expensive,” notes another Peace Corps alumnus, now heading a nutrition group that works to export U.S. technical savvy through more conventional means. Many foreign aid and computer experts have similar feelings. The technicians, sure enough, are far ahead of the politicians. One of the most distinguished technicians of them all—Arthur C. Clarke, the father of the communications satellites—describes the EPC proposal as “an excellent idea.” Reaction from Third World countries has been favorable. Naren Chitty, a Sri Lankan diplomat, says the concept is “a positive approach to technology transfer” in “these days when ‘electronic imperialism’ is a catchword.” And a Saudi Arabian communications specialist likewise advocates computer and networks for the Third World. He says: “I had a terrible argument with this Indian man who said, ‘My people are starving to death, and you talk about microcomputers.’ And I said, ‘It’s because of food distribution—the food isn’t getting there. The reason they’re starving is that they don’t have the benefits that computers could bring.’” ■ ■ ■ POSTSCRIPT: Just as I was finishing this book I heard from my friend the Saudi Arabian communications specialist, Omar Alfarouq. Omar says EPC-style efforts are already realities in some places—not just dreams. Via MCI Mail from California, he told me of “the creation of an Information network throughout Third World, accessible within our own cultural reference. “It has bloomed under sponsorship Gulf Cooperation Council; data banks for farmers, medical workers in Arabic accessible by personal computer from Oman to Kuwait; anyone can access though it is most often done through local Ministry of Information office; will be tied in with university information systems. It’s moving _alhamdullilah_ [thanks to God].” Omar says the idea for this net goes back to 1981. He continues: “Your Electronic Peace Corps is alive and well and working wonders in Africa at present time, am surprised you are not there doing it. I just returned, am here to regroup, energy burn-out terrible. For example Sahel 84 is a French group 30, lorries w/ food/medicine, one light plane with ground station tied into INMARSAT; satellite shows ground picture where people have sunk down hopeless in endless reaches of Niger, Mali etc., guides convoy to place of need; communication link back to Paris advises of further food/medicine need, diagnostic advice, these helped while other abandonees are being located. That’s Sahel 84. “Mobility 84 is British with land-rover as ground station with a computer, word-processing, works in west central Africa, put together by Alan Benjamin of CAP software in England, Contact him he is doing what you are brooding about. “Medecines sans Frontreres also has sat-data link to Paris from its camp south Soudan just over border from Ethiopia for Tigre refugees; Tigre people in terrible shape. Data banks can _insha’allah_ [if God wills] save Soudan from becoming like Ethiopia—it’s getting that way fast. Contact Gordon MacRae, deputy editor of Economist in London for further up-dates, also Jim Grant of UNICEF. “Congratulations on yr book. But the real point of data exchange is its tremendous humanitarian impact which is so desperately needed in places that will never ever see anything like a telephone. Timely forecasting can prevent Third World suffering. Or even in America. That’s your next book. See you in Addis.... _wa salaam_ [good-bye], Omar.” Americans invented the transistor, the microchip, personal computers; now if only we’ll catch up with the British, French, and Saudis in bringing the technology to the people who most need it! Thanks! My Victor 9000 and Panasonic printer ideally could spew out a list of people to thank—starting with those who most deserved it. As a mere human, however, I don’t feel up to ranking anyone other than to mention the big nine: ● Michael Canyes, a professional computer consultant who gave dozens of hours of his time in the best user-to-user tradition. ● Mack Truslow, an old friend on whom I cruelly inflicted page after page of rough drafts. ● David Fay Smith, a writer/computer expert who was the technical editor and who himself is the author of _A Computer Dictionary for Kids and Other Beginners_ (Ballantine, $9.95). ● Don Carrol, the cover artist. ● Robert B. Wyatt, editor-in-chief of Ballantine Books, who had the imagination and courage to make this a mass-market paperback. ● Richard McCoy, his assistant. ● Frank Lavena, the copyeditor. ● Pat Ehresmann of the Random House production staff, who is an innovator in the spirit of this book. ● Ruth Aley, a legendary literary agent whom writers have been thanking for decades—perhaps beginning with Irving Stone. ● Berenice Hoffman, her partner on this project. Shopping for a computer while I was writing _The Silicon Jungle_, she was a perfect test reader. In addition I’ll thank the Fairfax County Public Library System, especially the Fairfax City branch’s business room. Thanks also to the Martha Washington, George Mason, and Sherwood branches. (Computerized databases will never do away with first-rate librarians.) With the understanding that my list isn’t necessarily complete, here are other people to whom I’m grateful: John Allen; Joseph Auer; Stephen Banker (will someone please locate a $1,200 hard-disk Victor 9000 for _him_?—Steve deserves it for the help he gave me); Lindsay Baird, Jr.; Rich Baker; Rob Barnaby; Richard Barry; Jane Bator of Susan Croft Associates; Nancy Beckman; Mike Bell; John Bennett; Tom Bennett (he really should be in the top six); Dan Berger; Robert Bertini, Jr.; Ed Bigelow; Janice Blood; Jay BloomBecker; Jack Bologna; Ed Boland; Kenneth Bosomworth; Charles Bowie; Mike Bradley; Barbara Brubacker; Ted Buchholz; David Bunnell; William F. Buckley, Jr.; John Butler; Robert Campbell; John Carroll; Elizabeth Carlson; Steve Caswell; “Cheshire Catalyst”; Vinton Cerf; Naren Chitty; Chris Christiansen; Ward Christensen; Ken Churbuck; Arthur C. Clarke; Joseph Coates; Jeanette Counsellor; Glenn Cowan; Chris Daly; Martin Dean; Judy-Lynn del Rey; Dick Diluciano; Kathleen Dixon; Frank Dobisky (“B.C.E.,” friend and PR man extraordinaire); David Eisen; Margaret Engel; James Fallows (my Victor guru); Guy Farley; Tom Fay; Paul Fessler; Jack Fitzgerald; Geoff Fobes; Ron Fowler; Jim Fox; Steve Frankel (author of _The Compleat Kaypro_); John Fuller; Bill Gladstone (who, while remaining loyal to his friend Andy Kay, respected my right to call the shots as I saw them and in fact nurtured this project); Jerry Glenn; Geoff Goodfellow; Gil Gordon (his new telecommuting newsletter, _TELECOMMUTING REVIEW_, offers common sense and humanity along with insight—a combination all too often missing in the computer world; you may write for subscription information to Telespan Publishing, 50 W. Palm St., Altadena, Ca. 91001); Sandy Gossman; Etienne Grandjean; Adam Green; Judy Gregory; Sue Grothoff; Tom Hacker; H. Glen Haney; Richard Harkness; Charles Harris; Patricia Hausman; James Hayhoe; William Hole (ace library researcher); Gabe Heilig; Carl Herrman; Jeremy Joan Hewes; Harold Joseph Highland; Clauda Houston; Hugh Hunt; Peter Hyams; Chris Jensen; Peter and Trudy Johnson-Lenz; Steve Jongeward; Phil Judkins; Mitch Kapor; R. A. Karasek; Esther King; Marc King; Carol Kaplan; Lloyd Kaufman; Andy and David Kay; Kay Keeshen; Richard Koffler; David LaGrande; Jack LaVriha; John Lewis; Bob Lucas of Trigram Systems (who let me try out his useful MicroSpell spelling-checker on this manuscript); Art Lundquist (owner of Clinton Computers); Nick Lyons; Jim Mahony; Mary Matthews; Judi McClean; Bill McDonald; Jan McGowan; Chodi McReynolds; John Madden; Rainer Malitze-Goes; Basil Malony; Glenn Marcus; Clyde Merritt; Maxine Messinger; Eric, Eugene and Rima Meyer; Greg Minjack; Rolf Moulton; Ian (“Captain Zap”) Murphy; Peter Nero; Rick Nelson; Jack Nilles; J. Michael Nye; Cliff Odendhal; Dusty Park; Donn Parker; Ann Patrick; Tom Peifer; Joseph Pelton; Margaret Phanes; Don Pierce; John O’Mara; Greg Platt of PeopleTalk Associates; Joe Policy; Michael Pond; Liz, Mitzi, David and the rest of the gang at the Computer Shoppe; Doug Rickman of The Disk Connection (who donated the copy of MITE I needed to talk to Arthur C. Clarke); Don Ramsey; Peter Ross Range; Gary Rinkerman of _The Computer Law Reporter_; Hood Roberts; Mark Robinson; Harry Rothman (research); Seymour Rubinstein; Marilynne Rudick; Bruce Rupp; Richard Russell; Gabriel Salvendy (source of invaluable perspective for the “HAL” chapter); Timothy Schabeck; Alan Scharf; Joe Schopen; Michael Scott of BCI; William Scrivo; Frank Schiff; Ezra Shapiro; Joe Shelton; Ben Shneiderman; James Schweitzer; Mike Slade; Michael Smith, David Snyder; Harry Snyder; Jo Steele; Bill Stern; Barbara Sturken; Ann Sumner; Jim Swanner (for approving the MITE donation); Geoff Sweeney; Jeff Tarter; Bonita Taylor, Jerry terHorst; Chris Torem; Murray Turoff; Terian Tyre; Stanton Umans; Bernard Urban; Holly Vail; John Verboon; Nick Vergis; Barbara Wagner; Robert Waters; James Watt; Harvey Welch; William Wewer; David Whiters; Lynn Wilson; Edward and Patricia Wright; and Kitty Yaney. INDEX ❑ Accounting software Accounting Plus, 75-77 case example, 73-78 Acoustically coupled modem, 349–50 Alphanumeric field, 81–82 Alternate key, definition of, 47 AND, 82 APPEND command, 82 Applications programs, 23 Area chart, 331, 333 ASCII, 352 Asynchronous communications, 353 Audit trail, 168, 321 Automatic dialing, modems, 351–52 Backups avoiding crashes, 192–94 hard disks, 196–97 lap-sized portables, 198 scratch disk, 195 Bar charts, 332 Barnaby, Rob, 7, 46, 48, 50–59, 61 Baseband, 247 Bidirectional printers, 296 Bit, 20 Bit mapping, graphics, 344 Black boxes, 189 Block move, definition of, 48 Blocks, 351 Boland, Ed, 73–78 Boldface feature, 299 Bowie, Charlie, 78–86 Broadband, 247 Bubble memory, data security and, 197 Buffer, 300, 351 Bugs, 302 A bus, network lay-out, 244–45 Buying a computer key questions for, 282–92 printers, 294–301 software, 302–309 used computers, 292–93 Byte, 20 Calculations, 326 Captain Zap, 2, 163, 190–191, 193 Capture ability, modem, 351 Cataracts, VDTs and, 156 Cathode ray tube (CRT), Kaypro, 25 Cells, 85 Central processing unit (CPU), 20 Character-based systems, graphics, 344 Character field, 81 Characters, size/shape, 142 Charts, _See_ Graphics. Check sum, 351 Clarke, Arthur, C., 2, 249–70 CMOS (Complementary Metal Oxide Semiconductor), 197 Coaxial cable, 246–47 Colors, use in graphics, 336–37 Command-driven systems, 71–72 Command files, 82 Compatibility, Kaypro and IBM, 20–21 Composite monitor, 143 Computer-aided design/computer-aided manufacturing (CAD/CAM), 98 _Computer Classified Bluebook_, 292 Computer conferencing, 230 Computer crime, 9, 163–99 data diddling, 166–67 data leakage, 172–73 dial-up computers, protection of, 190–91 employee policy and, 179–83 impersonation, 174–76 logic bomb, 171 overwriting as protection, 191–92 passwords and, 188–89 piggybacking, 173–74 protection against, 183–86 rounding interest downward, 168–69 sample auditing, 165–66 scavenging, 172 simulation, 171–72 small businesses and, 165 superzapping, 169–70 TAP, 175–77 trapdoor/backdoor, 170–71 Trojan horse tricks, 167–68 wiretapping, 173 Computer furniture, selection of, 147–49 Computerized pacing, 133 Computers, future developments, 262–67 Conductors, 246 Consultants, 100–115 aspects of hiring decision, 101, 107–113 case examples, 101–106 contracts, guidelines for, 339–42 microcomputer field and, 105–106 qualifications of, 112–13 salesmen/consultants, 112 sample consulting contract, 114–15 Contracts, for consultants, 114–15, 339–42 Control characters, 353 Control key, definition of, 47 Correspondence quality, 297 CP/M (Control Program for Microcomputers), 20, 22–23, 285 Crashes, disk crashes, 192–93 Cross-hatch, 331 CRTs, alternatives to, 160–62 Cursor, 9, 47 Curve chart, 331, 333 Customization, source code, 77 Daisy wheel printer, 294 shortcomings of, 296–98 Data-base programs, 81, 323–30 calculations, 326–27 data fields, 324–26 dBASE II, 81–83 InfoStar, 323–30 overhead, 327 Perfect Filer, 324-27 sort keys, 327 Data bits, 350 Data diddling, 166–67 Data disk, 24 Data Encryption Standard (DES), 189 Data-entry work, 107 Data fields, 324–26 Data file, 324 Data leakage, 172–73 Data processing, micros and, 125–27 Data record, 324 Data security, 163–64 backups, 192, 194–99 protecting floppies, 193–94 scratch disk and, 195 _See also_ Computer crime. Data transfer, windows, 344 dBASE II, 81–83 features of, 81–82 training time, 83 Dean, Martin, 66–68 Defaults, 308 _Designer’s Guide to Creating Charts and Diagrams_ (Holmes), 334 Dial-up computers, protection of, 190–91 Digital voltmeter, Kay’s, 18 Digitizing tablet, 347 Direct-connect modem, 349–50 Disk-based word processor, 305 Disk crashes, 192–93 Disk drive head of, 23 twin, 23–24 Disks, rules for protection of, 193–94 Documentation, 49, 288 evaluation of, 304 Dot matrix printer, 294–95 size of characters, 142 Double-density feature, Kaypro, 24 Draft quality, 297 Dvorak keyboard, 146 EBCDIC, 352 Echo back, 352 Echo mode, 357–58 EDIT command, 82 8088 Chip, 20 Electroluminescent screens, 161 Electronic bulletin boards, 223 Electronic Information Exchange System (EIES), 222 Electronic mail, 228–33 advantages of, 230–31 capabilities of, 228–29 computer conferencing, 230 negative aspects of, 231–32 Electropheretic screens, 161 Encryption, 189 Environmental factors, _See_ Ergonomics. Epson, 43–44, 59 Ergonomics, 128–62 air conditioning/heat/ventilation, 152 aspects of good ergonomics, 129–30 back/muscular problems, 156–57 computerized pacing, 133–37 CRTs, 159–60 eyestrain, 158–59 furniture, selection of, 147–49 health factors, VDTs, 152–54 keyboard, selection of, 143–47 lighting, 149–51 liquid-crystal displays (LCDs), 160–62 noise reduction, printers, 151–52 participatory monitoring, 137–38 psychological problems, 157–58 radiation from VDTs, 154–56 screen, selection of, 140–43 word processing operations, 134–35 Error-checking, modem, 350 Escape key, definition of, 47 Ethernet, 236, 244, 246–47 Expansion slot, 41 Extremely low frequency radiation (ELF), 155 Eyestrain, computer use and, 158–59 Field, 81 Field names, 81 Field type, 81 Field width, 81 File data base, 81 definition of, 47 File locking, 242 File server, 244 Filters, for glare, 151 Flat screens, 160 weaknesses of, 161–62 Flow control, 351 Foot candles, 150 Full duplex modem, 351 Glare, 150–51 filters for, 151 Global search, 48 Graphics, 8, 93–99, 331–38 area charts, 331, 333 bar charts, 332 choosing a program, 337–38 colors, use of, 336–37 cross-hatch, 331 curve charts, 331, 333 graphics tablet, 347 grid lines, 335 line charts, 331 Macintosh, 93–96 PERT programs and, 98–99 pie chart, 334 professionals’ use of, 96–98 simplicity, importance of, 334–35 vertical bar charts, 333 Grid lines, 335 Ground wires, 246 Hacking, 176-77 Half-duplex modem, 351 Handshaking, 351 Hard disk backups, 196–97 disk crashes and, 196 Kaypro 10, 34–35 storage capacity, 286–87 Head, of disk drive, 23 Health factors, computerized pacing and, 137 _See also_ Ergonomics. Heat, VDTs and, 152 Help messages, 89, 305 Highland, Harold Joseph, 164–65 Human-machine link, _See_ Ergonomics. IBM, keyboard problems, 145 Icons, 46 Impersonation, 174–76 Information services, 224–26 InfoStar, 323–30 commands, 328 documentation, 327 shortcomings of, 328–30 Ink jet printer, 295 Integrated software, Lotus 1-2-3, 88–91 Integrity, 199 Intelligent modems, 352 Interrupt driven, 241 Job design, 133–34 Joystick, 347–48 Justification, 299 K, 21 Kay, Andy, 14–19, 26–30, 36 Kay, David, 28–29, 31, 37 Kaypro, 6, 14–35, 37–44 advertising of, 30–31 competition to, 43–44 CP/M operating system, 22–23 CRT of, 25 disk drives, 23–24 flat-screen model, 42–43 growth of company, 16–20, 26–35 hard disk, 34–35, 40 Kaypro 16, 41–42 Kaypro 10, 34–35, 37 Kaypro II, 26–27, 40–41 keyboard, 24–25 metal case of, 25 monitor of, 24, 30–31 Osborne as competitor, 15–16 public relations campaign, 31–32 64K Random-Access Memory (RAM), 21–22 weaknesses of, 38–43 Z80-style microprocessor, 20–21 Keyboard detachable, 9, 128, 144 factors in selection of, 143–147 function keys, 147 Qwerty vs. Dvorak, 146 tactile feedback, 145 Kopischiansky, Frank, 17–18 Lap-sized portables backups, 198 data security, 197 static problems, 197–98 Laser printer, 295 Letter quality, 297 Lighting, 149–51 filters, types of, 151 glare problem, 150–51 solutions to problem of, 149–50 Light pen, 348 Line chart, 331 Liquid-crystal displays (LCDs), 160 LIST command, 82 Local area networks, 221, 234–48 a bus topology, 244–45 baseband/broadband capacities, 247 considerations in choice of, 237–39 ease of use, 240–41 Ethernet, 236 file locking, 242 installation factors, 243 interrupt driven, 241 multi-user-system micro, 235 protocol, 243 queuing, 241 a ring topology, 245–46 shielded wire, 246–47 speed and, 239–40 a star topology, 245 telephone style, 246 twisted pair network, 246–47 user-privilege levels, 242 WEB network, 234, 236–37, 240–41 Logical field, 82 Logic bomb, 171 Lotus 1-2-3, 88–91 graphics, 90 printing options, 90–91 Lux, 150 MacInker, 298 Macintosh, 21 graphics, 93–96 mouse, 93 Macro language, 90 Mahoney, Jim, 116, 120 Maintenance contracts for, 289–90 MTBF figures, 289–90 Mass storage, 286 “Mature” software, 302 McDonald, Bill, 18–19, 25–26 MCI Mail, 225 _See also_ Electronic mail. Memory, random-access memory (64K), 21–22 Menu, 304–305 definition of, 48 Menu-driven software, 71 MEX, 356 Meyer, Eric, 249–55, 261, 269–70 Microprism Model 480, 294–95, 297 Microprocessor, 20 Z80, 20–21 MicroPro International, 50, 54, 56–62, 309 Modem, 300, 349–65 acoustically coupled, 349 automatic dialing, 351–52 bits, 350 capture ability, 351 communication with Sri Lanka, 249–70 direct-connect, 349–50 full duplex modem, 351 protocols, 351 synchronous/asynchronous communications, 353 MODEM7, 354–65 instructions for use of, 358–65 summary of commands, 364–65 Modular plugs, 349 Monochrome screen, 143 Mouse, 9, 93, 345–46 MS-DOS, 23, 285 MTFB figures, 289 Multiplan, 83–85 Multi-user-system micro, 235 Munytels, 5, 216–17, 219 Natural order of recalculation, 90 Near-letter quality, 297 NEC, 44 Networks, 221 NewWord, 43–44, 59 Node, 239 Noise, reduction, from printers, 151–52 Non-Linear Systems, 15–18, 26, 28, 32 Null modem, 198 Numeric field, 81 Omninet, 244 Operating systems choice in computer buying, 285–86 CP/M, 22–23 MS-DOS, 23 UNIX, 285–86 Optical character reader, 138 OR, 82 Osborne, Adam, 14–15, 32, 36–37 Osborne Computers Kaypro competition, 34–35 problems of, 6, 32–33 Overhead, 327 Overlapping, windows, 344 Overwriting, 191–92 Packet switching, 225 Paperback Software International, 36 Parallel port, 300 Participating monitoring, 137 Passwords, 188–89 Patch, 308 PC-TALK III, 356 Perfect Filer, 324–27 Perfect Writer, 310–18 improvements in, 312–15 Perfect Thesaurus, 317 pop-up commands menu, 312 weaknesses of, 312, 316–318 Pie chart, 334 Pivot, 43 Plasma panel, 161 Point-of-sales system, 75 Port, 300 Pregnancy, VDTs and, 152–53, 154 Printers, 294–301 bidirectional, 296 buffer, 300 compatibility with computer, 300 cost, 298 daisy wheel, 295 ink jet printer, 295 laser, 295 noise level, 299 noise reduction, 151–52 ports, 300 printer quality, 297 repair record, 298 ribbons, 298 special features, 299 thermal-transfer printer, 295 unidirectional, 296 volume, 298 Programmers, 125–26 Project Evaluation Review Techniques (PERT) software, 98–99 Proportional spacing, 299 Protocols local area networks, 243 modems, 351 Psychological factors, computers and, 157–58 Public key encryption system, 189 Queuing, 241 Quietwriter, 301 Qwerty keyboard, 146 Radiation, 154–56 extremely low-frequency radiation, 155 VDTs and pregnancy, 152–54 very low-frequency radiation, 155 Ragged right margins, 299 RAM-based word processor, 305 Random-Access Memory (RAM) 64K, 21–22 Read-Only Memory (ROM), 21 Real-time systems, 49 Records, data base, 81 Reverse video, 143 RGB monitor, 143 Ribbons, for printers, 298 A ring, network lay-out, 245–46 Robie, 40 Rubinstein, Seymour, 7, 45, 48–59, 63 Scavenging, 172 Scratch disk, 195 Screen color of, 141, 143 electroluminescent screens, 161 electropheretic screens, 161 factors in selection of, 140–43 flat screens, 160 plasma panel, 161 reverse video, 143 Scroll, definition of, 47 Search and replace, definition of, 48 Seequa Computer Corporation, 15 Select, 7, 65–72 training time, 67 versus WordStar, 67–68 Serial, port, 300 Simulation, 171–72 Software accounting, 73–78 buying of, 319–22 command-driven, 71–72 copying of, rationale for, 59–60 graphics, 331–38 integrated software, 88 mail-order buying of, 320–21 menu-driven, 71–72 spreadsheet programs, 83–85 windows, 344-45 word processors, 45–59, 65–72 Sorting, 82 sort keys, 326 Speech recognition, 262 Spellbinder, 69 Spelling checkers, 263 Split screens, 46 Spreadsheet programs Multiplan, 83–85 origins of, 83 requirements of, 89–90 VisiCalc, 83–84, 87 A star, network lay-out, 245 Start bits, 350–$2 Stop bits, 350–$2 Storage, hard disk, 286–87 Structure, data base, 81–$2 Synchronous communications, 353–$2 Tactile feedback, 145–$2 TAP, 175–77 Telecommuting, 4–$2, 200–227 clerical workers and, 209–210 considerations in, 203–206 data base information services, 224–26 data base requirements, 221–$2 economic benefits of, 219–$2 electronic bulletin boards, 223–$2 energy implications, 219–20 munytels, 216–17 networks, 221–$2 packet switching, 225–$2 psychological factors, 220–21 suburban versus downtown offices, 214–16 Telephone style network, 246–$2 Terminal mode, 357–58 Terminals, 287–$2 Thermal-transfer printer, 295–$2 Tile, windows, 344–$2 Token passing, 245–46 Touch-sensitive screen, 347–$2 Trackball, 348–$2 Tractor feed, 294–$2 Training, 115–24 aspects in choice of programs, 115–16, 118–20 case examples, 116–22 self-instruction, 124–$2 Trapdoor/backdoor crime, 170–71 Trojan horse tricks, 167–68 Twin disk drives, 23–24 Twisted pair network, 246–$2 Unidirectional printers, 296–$2 UNIX, 235–$2 operating system of, 285–86 Used computers, buying guidelines, 292–93 User-privilege levels, 242–$2 VDTs cataracts and, 156–$2 radiation and, 154–56 Ventilation, computers and, 152–$2 Vertical bar charts, 333–$2 Very low-frequency (VLF) radiation, 155–$2 Victor 9000, 271–76 VisiCalc, 83–84, 87–88 Voice grade lines, 350 Wangnet, 235–36, 239, 246–47 Ward Christensen Protocol, 351, 359 WEB network, 234, 236–37, 240–41 What-if tables, 89 Windows, 62–63, 343–45 buying guidelines, 344–45 Wiretapping, 173 Word length, modem, 350 Word processing operations, job design, 137–35 Word processor dedicated versus micro, 52 Perfect Writer, 310–18 Select, 65–72 Spellbinder, 69 terms used, 47–48 WordStar, 7, 44, 45–59, 285, 302–309 WordStar, 7, 44–59, 285, 302–309 accessory programs, 308–309 anti-botch-up-features, 306–307 creation of, 53–54 customization of, 308 damage limitation, 307 documentation, 304 ease of use, 302–304 error messages, 308 “Help” levels, 305 manufacturer support, 309 maturity of, 302 power of, 305–306 search-and-replace feature, 306 speed of, 305 strengths of, 46–47 training time, 67 word processing terms, 47–48 WordStar 2000, 60–62, 303, 310–11 Word wrap, 46 Work station, 239 XMODEM Protocol, 351, 359 XON/XOFF, 351 Yank-back feature, 307 Z80 microprocessor, Kaypro, 20–21 PLANNING TO OUTFIT YOUR OFFICE OR YOUR HOME WITH COMPUTERS? Or are you just interested in the facts and fancies surrounding the technological revolution of the 20th century? Now, with the help of one of America’s most readable computer experts, you’ll cut through the Silicon Jungle and find the machine that’s right for you. You’ll marvel at the history and folklore of the modern computer. You’ll explore the intricacies of the electronic superbrains that can: ● lower your costs and increase your efficiency ● instantaneously zip messages across continents ● act as word processors, doubling writers’ production ● keep records in complete depth and detail ● help whip up jazzy charts to whet colleagues’ interest ● increase your earnings within your chosen field Cover printed in USA ------------------------------------------------------------------------ Footnotes ------------------------------------------------------------------------ Transcriber’s Note Errors deemed most likely to be the printer’s have been corrected, and are noted here. Where the intent of the author is ambiguous, a suggested re-reading is provided here, and the text itself is merely annotated. The references are to the page and line in the original. Entries with three numbers refer to the page, the footnote (as resequenced), and the line within the footnote. The following issues should be noted, along with the resolutions. ii.3 Published in the Uni[t]ed States Added, 12.24 Two San Francis[c]o-area authors, Added. 24.8 [“]The “B” drive is my =data disk= Removed. 24.24 floppy disk[s] drives Removed. 30.35 the very same writer who had le[a]d the Removed. cheering 31.2 was no match for some more expensive Removed. machines[’]. 50.20 wanted to do.[”] Added. 50.21 and others unfamiliar with computer arcan[i]a. Removed. 52.13 Then again, your boss may ba[l/w]l you out Replaced. 52.27 m[e/o]re programmers are writing Replaced. 53.44 WordStar as a programming aid[e] to write Removed. WordStar. 56.31 to have a manual.[”] Added. 70.42 [“]The user needs to know Added. 71.25.1 account of Sele[k/c]t’s capital shortage Replaced. 88.31 have to go through unwield[l]y computer Removed. rigamarole 89.33 Symphony, for instance[,] lets you flush out Added. formulas 90.12 and it did [“]all the basic search and sorting Removed. 94.1 Turn onto Cary Avenue. Follow [M/C]ary Replaced. 101.39 the data base grew too unwield[l]y Removed. 104.9 was as badly botched as its hardware[.] Added. 117.8 said Bill Scrivo[,] an ex-managing editor. Added. 120.24 have microprocessors in them.[”] Added. 136.36 How much more can they push them[./?] Replaced. 138.20 and the same breaks [e]very hour for workers Added. 148.40 Angle between upper and low[er] arms: Added. 150.8 particularly effective on a num[b]er of Added. newspapers. 161.22 A second failing of electroluminescent Added. screen[s] 166.16 mainframes are sending electronic copies to [a Removed. ]micros 170.13 why not zap [a]way the barriers Added. 176.4 but it helps.[”] Added. 177.12 Steve Wozniak, the Apple cofounde[e]r Removed. 188.20 Your dial-up computer [should] send its name _sic_: until should not 194.38 You can’t afford to have your material stored _sic_ just [in on] your chip. 204.60.2 “Rising Trend of Computer Age: Employees Who Added. Work at Home;[”] _New York Times_ 206.36 articles sent over the phone lines[?/.] Replaced. 210.16 the regular workers cost a[t] least $50.52 a Added. day 215.1 A COMPARIS[I]ON OF OFFICE EXPENSES PER WORKER Removed. 217.25 establish munytels in poorer neighbor[hood]s>. Added. 220.72.1 Nilles’s[;] three-quarters of a billion Removed. 222.6 a vivid contrast to be[ ]suited, tied scientists 222.38 The Source and a rival network, CompuServe[,] Added. each boast 223.12 “You may even want to type ‘Chuckle,’[”] Trudy Added. says, 225.32 packet-switching techniques[,] can also Removed. increase 233.25 electronic mail can go from [person] to _sic_: one another person 241.10 instead of saying you[r] wanted to reach Removed. 245.31 the computers don’t[’] mind being “it” Removed. 253.9 “Hey, don’t worry[,/.] You’ll learn it much Replaced. faster than I did,” 257.15 to work together via[ by] computer Redundant. 266.92.1 Clarke[’s] conjecture about Added. 267.95.8 with horrid results, e.g., underlin[in]g to Added. the end of the manuscript!! 272.9 from an AC ex[t]ension cord. Added. 283.2 Are you pre[p]ared to do your homework? Added. 259.24 I hoped that benefic[i]ent HALs Removed. 267.22 _that_ will be in an attaché case.[’]” Removed. 290.27 will pro[b]ably quit then Added. 292.29 are damaged by [a sloppy drive in machine] _sic_: a floppy drive in the machine (?) 295.19 so thermal printers were also out of the Added. run[n]ing for me. 347.5 the mouse-equipped Macintosh for “na[i/ï]ve Replaced. users.” 348.6 is found most often in arcade-style [styles]. _sic_ 350.20 transmitted information at 300 baud[s] Removed. 353.14 An issue more basic than control characters Replaced. i[n/s] whether 353.19 You can send at 4,800 baud[s] Removed. 379.1 Perfect Fil[l]er, 324-27 Added. *** END OF THE PROJECT GUTENBERG EBOOK THE SILICON JUNGLE *** Updated editions will replace the previous one—the old editions will be renamed. Creating the works from print editions not protected by U.S. copyright law means that no one owns a United States copyright in these works, so the Foundation (and you!) can copy and distribute it in the United States without permission and without paying copyright royalties. Special rules, set forth in the General Terms of Use part of this license, apply to copying and distributing Project Gutenberg™ electronic works to protect the PROJECT GUTENBERG™ concept and trademark. Project Gutenberg is a registered trademark, and may not be used if you charge for an eBook, except by following the terms of the trademark license, including paying royalties for use of the Project Gutenberg trademark. If you do not charge anything for copies of this eBook, complying with the trademark license is very easy. You may use this eBook for nearly any purpose such as creation of derivative works, reports, performances and research. Project Gutenberg eBooks may be modified and printed and given away—you may do practically ANYTHING in the United States with eBooks not protected by U.S. copyright law. Redistribution is subject to the trademark license, especially commercial redistribution. START: FULL LICENSE THE FULL PROJECT GUTENBERG™ LICENSE PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK To protect the Project Gutenberg™ mission of promoting the free distribution of electronic works, by using or distributing this work (or any other work associated in any way with the phrase “Project Gutenberg”), you agree to comply with all the terms of the Full Project Gutenberg License available with this file or online at www.gutenberg.org/license. Section 1. General Terms of Use and Redistributing Project Gutenberg electronic works 1.A. By reading or using any part of this Project Gutenberg electronic work, you indicate that you have read, understand, agree to and accept all the terms of this license and intellectual property (trademark/copyright) agreement. If you do not agree to abide by all the terms of this agreement, you must cease using and return or destroy all copies of Project Gutenberg electronic works in your possession. If you paid a fee for obtaining a copy of or access to a Project Gutenberg electronic work and you do not agree to be bound by the terms of this agreement, you may obtain a refund from the person or entity to whom you paid the fee as set forth in paragraph 1.E.8. 1.B. “Project Gutenberg” is a registered trademark. It may only be used on or associated in any way with an electronic work by people who agree to be bound by the terms of this agreement. There are a few things that you can do with most Project Gutenberg electronic works even without complying with the full terms of this agreement. See paragraph 1.C below. There are a lot of things you can do with Project Gutenberg electronic works if you follow the terms of this agreement and help preserve free future access to Project Gutenberg electronic works. See paragraph 1.E below. 1.C. The Project Gutenberg Literary Archive Foundation (“the Foundation” or PGLAF), owns a compilation copyright in the collection of Project Gutenberg electronic works. Nearly all the individual works in the collection are in the public domain in the United States. If an individual work is unprotected by copyright law in the United States and you are located in the United States, we do not claim a right to prevent you from copying, distributing, performing, displaying or creating derivative works based on the work as long as all references to Project Gutenberg are removed. Of course, we hope that you will support the Project Gutenberg mission of promoting free access to electronic works by freely sharing Project Gutenberg works in compliance with the terms of this agreement for keeping the Project Gutenberg name associated with the work. You can easily comply with the terms of this agreement by keeping this work in the same format with its attached full Project Gutenberg License when you share it without charge with others. This particular work is one of the few individual works protected by copyright law in the United States and most of the remainder of the world, included in the Project Gutenberg collection with the permission of the copyright holder. Information on the copyright owner for this particular work and the terms of use imposed by the copyright holder on this work are set forth at the beginning of this work. 1.D. The copyright laws of the place where you are located also govern what you can do with this work. Copyright laws in most countries are in a constant state of change. If you are outside the United States, check the laws of your country in addition to the terms of this agreement before downloading, copying, displaying, performing, distributing or creating derivative works based on this work or any other Project Gutenberg work. The Foundation makes no representations concerning the copyright status of any work in any country other than the United States. 1.E. Unless you have removed all references to Project Gutenberg: 1.E.1. The following sentence, with active links to, or other immediate access to, the full Project Gutenberg License must appear prominently whenever any copy of a Project Gutenberg work (any work on which the phrase “Project Gutenberg” appears, or with which the phrase “Project Gutenberg” is associated) is accessed, displayed, performed, viewed, copied or distributed: This eBook is for the use of anyone anywhere in the United States and most other parts of the world at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg™ License included with this eBook or online at www.gutenberg.org. If you are not located in the United States, you will have to check the laws of the country where you are located before using this eBook. 1.E.2. If an individual Project Gutenberg electronic work is derived from texts not protected by U.S. copyright law (does not contain a notice indicating that it is posted with permission of the copyright holder), the work can be copied and distributed to anyone in the United States without paying any fees or charges. If you are redistributing or providing access to a work with the phrase “Project Gutenberg” associated with or appearing on the work, you must comply either with the requirements of paragraphs 1.E.1 through 1.E.7 or obtain permission for the use of the work and the Project Gutenberg trademark as set forth in paragraphs 1.E.8 or 1.E.9. 1.E.3. If an individual Project Gutenberg electronic work is posted with the permission of the copyright holder, your use and distribution must comply with both paragraphs 1.E.1 through 1.E.7 and any additional terms imposed by the copyright holder. Additional terms will be linked to the Project Gutenberg License for all works posted with the permission of the copyright holder found at the beginning of this work. 1.E.4. Do not unlink or detach or remove the full Project Gutenberg License terms from this work, or any files containing a part of this work or any other work associated with Project Gutenberg. 1.E.5. Do not copy, display, perform, distribute or redistribute this electronic work, or any part of this electronic work, without prominently displaying the sentence set forth in paragraph 1.E.1 with active links or immediate access to the full terms of the Project Gutenberg License. 1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg work in a format other than “Plain Vanilla ASCII” or other format used in the official version posted on the official Project Gutenberg website (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original “Plain Vanilla ASCII” or other form. Any alternate format must include the full Project Gutenberg License as specified in paragraph 1.E.1. 1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg works unless you comply with paragraph 1.E.8 or 1.E.9. 1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg electronic works provided that: • You pay a royalty fee of 20% of the gross profits you derive from the use of Project Gutenberg works calculated using the method you already use to calculate your applicable taxes. The fee is owed to the owner of the Project Gutenberg trademark, but he has agreed to donate royalties under this paragraph to the Project Gutenberg Literary Archive Foundation. Royalty payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, “Information about donations to the Project Gutenberg Literary Archive Foundation.” • You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg™ License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg™ works. • You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work. • You comply with all other terms of this agreement for free distribution of Project Gutenberg™ works. 1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™ electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from the Project Gutenberg Literary Archive Foundation, the manager of the Project Gutenberg™ trademark. Contact the Foundation as set forth in Section 3 below. 1.F. 1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread works not protected by U.S. copyright law in creating the Project Gutenberg™ collection. Despite these efforts, Project Gutenberg™ electronic works, and the medium on which they may be stored, may contain “Defects,” such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment. 1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the “Right of Replacement or Refund” described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg™ trademark, and any other party distributing a Project Gutenberg™ electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE. 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem. 1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE. 1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions. 1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg™ electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg™ electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg work, (b) alteration, modification, or additions or deletions to any Project Gutenberg work, and (c) any Defect you cause. Section 2. Information about the Mission of Project Gutenberg Project Gutenberg is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life. Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg’s goals and ensuring that the Project Gutenberg collection will remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org. Section 3. Information about the Project Gutenberg Literary Archive Foundation The Project Gutenberg Literary Archive Foundation is a non-profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws. The Foundation’s business office is located at 41 Watchung Plaza #516, Montclair NJ 07042, USA, +1 (862) 621-9288. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact Section 4. Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg™ depends upon and cannot survive without widespread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine-readable form accessible by the widest array of equipment including outdated equipment. Many small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit www.gutenberg.org/donate. While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate. International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff. Please check the Project Gutenberg web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: www.gutenberg.org/donate. Section 5. General Information About Project Gutenberg electronic works Professor Michael S. Hart was the originator of the Project Gutenberg concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg eBooks with only a loose network of volunteer support. Project Gutenberg eBooks are often created from several printed editions, all of which are confirmed as not protected by copyright in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition. Most people start at our website which has the main PG search facility: www.gutenberg.org. This website includes information about Project Gutenberg, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.

Chapters

1. Chapter 1 2. Chapter 7 and Backup VII, you’ll learn (1) the basics, (2) when charts 3. Chapter 12, “How I Found ‘God’ on MCI (and a Few Other Odds and Ends 4. 1. Bigger RAMs can work with more and larger numbers—a handy capability 5. 2. More RAM can accommodate programs more complicated for the computer. 6. 3. You may want the most sophisticated software to thwart computer 7. 1. You can quickly make safety copies of valuable disks—something that’s 8. 2. You can more easily work with long electronic documents. 9. 1. Absence of bugs. The software maker should have gotten all the bugs 10. 2. General ease of use. A program should be easy enough to learn _and_ 11. 3. Good documentation. The manual should be clear and logically 12. 4. Usefulness to beginners and old pros alike. You can adjust the best 13. 5. Speed. It lets you do your job fast, especially when you use it with 14. 6. Power. Related to speed. The program can quickly accomplish 15. 7. Fewer chances for botch-ups. Good programs limit the chances for 16. 8. The Jewish-uncle effect. Ideally, your software will slow you down or 17. 10. After-the-goof feedback. After you’ve botched up—and we all do 18. 11. Ability to customize. You or at least a software expert can 19. 12. Availability of “accessory” programs to make your original software 20. 13. Support. Ideally, the software seller will stand behind his product 21. 1. A =cursor= is just the marker on your screen—a blinking line, 22. 2. A =file= is an electronic version of a letter, report, or other 23. 3. A =control key= is what you start holding down to turn a letter or 24. 4. To =scroll= just means to move from place to place in your 25. 5. A =menu= lists commands on your screen. It can tell you how to 26. 6. A =block move= is the ability to move material from one part of 27. 8. A =search and replace= substitutes one word (or group of words) for 28. 1. When you work for a stuffy old bureaucracy that’s rich and afraid 29. 2. When you’re a procurement officer on probation. As they say, no 30. 3. When you want to dump the training problems in the manufacturer’s 31. 4. When you prefer an extra-large, extra-sharp screen and giant 32. 5. When you’re looking for a machine that will run special software 33. 1. It takes all of two or three minutes—maybe less—to copy a disk 34. 3. Computer users want to befriend others with similar machines so 35. 4. Many software companies overprice their wares. Yes, it’s expensive 36. 5. Some people in large companies think software houses don’t give 37. 6. Many software companies don’t offer enough guidance or other help. 38. 2. A file in a data base is the electronic version of a file drawer or 39. 3. A =field= is a category of fact like the amount of money spent on 40. 4. =Structure= is simply the way a record is set up. There are three big 41. 5. The EDIT command changes the contents of a data field. You can type 42. 6. A command to APPEND can add new records to your electronic filing 43. 7. =Sorting= lets you reshuffle records alphabetically, by date or other 44. 8. The LIST command tells dBASE II to flash across the screen the 45. 9. .AND. helps you narrow down the information you’re looking for or 46. 10. .OR. is another way to describe the desired facts. LIST FOR 47. 11. LIST FOR .NOT. SALE:PERSN = ‘BABBITT’ could help weed from view, or 48. 12. =Command files= are programs that tell the machine how to manipulate 49. 1. A large number of rows and columns. A spreadsheet of 254 rows and 65 50. 2. Speed. “Even with a simple spreadsheet,” says Scharf, “someone might 51. 3. General simplicity and ease of use. In tricky places, does the 52. 4. Range of commands. Most spreadsheets nowadays let you easily move or 53. 5. The ability to do what-if tables. The best spreadsheets won’t just 54. 6. Easy consolidation of figures from different spreadsheets. That’s no 55. 7. =Natural order of recalculation.= Cells must influence the numbers in 56. 8. A useful =macro language=. Macros are combinations of commands that 57. 1. Deciding whether to hire a computer consultant. How much in your time 58. 2. Hiring and using a consultant. It isn’t just a matter of asking, 59. 3. Training employees. Don’t clutter your people’s minds with 60. 4. Working with your company’s data-processing people. Know which 61. 1. The computer company’s FORTRAN, according to Stewart, was as badly 62. 2. FORTRAN wasn’t as good as BASIC for micro data bases that stashed 63. 3. Brown was still basically a mainframer. And micro FORTRAN was 64. 3. “What’s the quality of the work? 65. 1. Who’s teaching? Can he or she communicate well with the students, and 66. 3. Why is the material taught? To make your people computer literate in 67. 4. When do the students learn? On their time or yours? Will you reward 68. 5. Where is the learning happening? Ideally, your students can take the 69. 6. How do the students learn? Through instruction manuals, mainly, or 70. 1. Even the best-intentioned companies may fail miserably in easing some 71. 2. The traits which make somebody valuable to his company _may_ be the 72. 3. At the same time you can’t stereotype anyone—by age, folksiness, or 73. 4. An important part of training is simple salesmanship—persuading the 74. 5. Don’t make computerization seem more threatening than it has to be. 75. 6. As early as possible start people on real projects. The first day at 76. 2. Helped them with some learning aids like color-coded keys showing 77. 3. Motivated them by explaining how their new computer skills would make 78. 1. Before approaching Data Processing, ask who-how questions about the 79. 2. Ask your informal Data-Processing contact about possible technical 80. 3. When you’re ready to deal with the Data-Processing manager, tell 81. 4. Make it clear you’re aware of your project’s complications. 82. 1. =The canary-in-the-mine= theory of labor relations. Ergonomics is 83. 3. =“Terminal” happiness.= Detachable keyboards are just a start, 84. 7. =Air conditioning, heating, and ventilation=—basics neglected by a 85. 8. Honest assurances to your people that you’re exposing them to the 86. 9. A willingness to consider alternatives to the TV-like CRTs that 87. 10. Sensible use of wrinkles like the mouse—the hand-sized gizmo you use 88. 11. A related ingredient, good software—the topic of earlier chapters. 89. 2. How far the keyboard platform protrudes from the platform on which 90. 4. The angle at which the screen faces you. You can swivel away to your 91. 5. The height of your chair. You don’t of course need high-tech 92. 1. Removing half the tubes from existing fluorescent fixtures. You’ll 93. 2. Parabolic fluorescent fixtures with baffles to keep the light out of 94. 3. Parawedge louvers, which, according to Eisen, “have been particularly 95. 4. Desk and floor lamps. You might buy rheostats you can plug in between 96. 5. Indirect lighting. The disadvantage is the expense. You may have to 97. 1. Coatings or etching applied during manufacture of the video displays. 98. 2. Coatings put on after manufacture. Generally, but not always, they 99. 3. “Colored plastic panels and etched faceplates,” which, says Eisen, 100. 4. Micromesh filters, favored by German ergonomists. Eisen says U.S. 101. 5. Polarizing filters. They may reduce brightness and shorten tube life, 102. 1. There is a possibility, extra-slim, but still there, that 103. 2. More minor physical and mental problems from computers definitely do 104. 6. The possibility of a detached retina 105. 3. Guarding your electronic files 106. 1. Burden programmers and others with electronic versions of heavy 107. 2. Keep their computer systems easy to use—and vulnerable. (“Then you’re 108. 3. Compromise. (“You get half raped.”) 109. 1. How hard, exactly, would it be to puzzle out? Just how many 110. 2. How compatible is the program with your computer? If security is so 111. 3. Is the security program easy to use? If it’s too hard, it’ll be 112. 4. Are you certain the program won’t jeopardize the accuracy and 113. 5. Should you expand your system, will the security software be able to 114. 6. Do you want a =public key= encryption system? It works this way. You 115. 7. Will your code be based on the =Data Encryption Standard= (=DES=), 116. 1. See if your disk has a file at least 500 or 600 words long. If so, 117. 3. Erase A. 118. 1. Zealously enforce a no-drinking, no-eating policy around disks, at 119. 2. Remember the Rothman Dirt Domino Theory. Dirt, dust, and grease often 120. 3. Realize that floppies don’t always mix well with office materials 121. 4. Know about other natural enemies of floppies or at least of the data 122. 5. Don’t even let your floppies rest against your computer’s screen, 123. 6. Remember that the more information you can pack on a floppy, the more 124. 7. Clean your disk heads. Don’t use rubbing alcohol. “Try something like 125. 8. Have head alignment checked, to reduce disk errors. With heads out of 126. 9. Buy quality disks. Of course, the more you spend on disks, the more 127. 1. Every five minutes or so, type out the “KS” or an equivalent and dump 128. 2. Every half an hour make a printout of your recent work. With a fast 129. 3. Every day make your backup floppy. You might forget about the scratch 130. 1. Dumping to floppies. It’s cheap but slow. Then again, you can speed 131. 2. Transferring the Winchester’s contents to a special tape drive large 132. 3. Dumping to an ordinary videocassette recorder. Although slow, it’s 133. 1. How much time or money does it take to enter your data or set up your 134. 3. How much time or money do you have for copying, cleaning, 135. 1984. Many more companies might be. They might have kept quiet, however, 136. 1. The cottage keyers are paying more than $2,600 a year to rent their 137. 3. Likewise, the cottage keyers lack the normal fringe benefits. The 138. 4. The keyers may not be sharing the experiment’s rewards fifty-fifty. 139. 1. Ease and speed of use. You needn’t be a computer expert or wrestle 140. 2. Friendliness. A good system isn’t just easy to use; it’s also boy 141. 4. Confidentiality. Clerks aren’t privy to the same information as the 142. 1985. They’d be able to place mutual-fund orders for clients, conduct 143. 1. Lower phone bills. In a Midwestern office of the H. J. Heinz Company, 144. 2. Elimination of telephone tag. “We can type a memo at the end of our 145. 3. An end to garbled messages. Errors and misunderstandings decline when 146. 4. More efficient sharing of ideas. =Computer conferencing= is an 147. 1. How long a Kaypro took to sort dBASE II files electronically while 148. 3. How long a second Kaypro needed to sort the dBASE files in the first 149. 1. How extensive do you want your network’s file-sharing capabilities to 150. 2. Who’ll manage the network? Who’ll determine who can see what 151. 3. Do you want to assign special network-related duties to other people? 152. 4. Who will work at what =node=? That’s jargon for a location or =work 153. 5. Will some people share work stations? If so, you’d better decide 154. 7. How many printers and other gizmos will people share, and where will 155. 8. What kinds of computers are you planning to hook up? The WEB as of 156. chapter 11, but subject to court approval, would be bought by a Swedish 157. 1. If your computer messes up, remember the very last thing you did, 158. 2. See if that isn’t the answer to your problem. 159. 1. Know your prices. Study the want ads of the local papers. There’s 160. 2. Pay attention to the machine’s physical condition. A banged-up 161. 3. Find out how your pet programs run. If you don’t have any available 162. 5. Find out what generation of equipment it is. Does it include all 163. 6. Learn where you stand legally if you’re buying software with the 164. 7. Call up commercial auctioneers and find out if they’re holding any 165. 8. Obviously you’ll want to consider a maintenance agreement with a 166. 1. Another daisy wheel machine. The daisy wheel is plastic or metal and 167. 2. A =laser printer=. Typically, it works a bit like some copying 168. 3. A =thermal-transfer printer=. This uses patterns of heat to arrange 169. 4. An =ink-jet printer=. This kind literally squirts ink against the 170. 1. =Draft quality.= The letters are too dotty for anything but drafts 171. 2. =Correspondence quality.= It’ll do for a letter to a forgiving friend 172. 3. =Near-letter quality.= You can get away with it for book manuscripts, 173. 4. =Letter quality.= That’s typewriter quality. 174. 1. Does the printer offer them no matter what computer or program you 175. 3. For free, will the store modify your computer system to make the 176. 4. Will your desired combinations of features work simultaneously? 177. 2. If not, can the store make one up for you? At what cost? 178. 1. The general logic of the manual. The author should have written it 179. 2. The quality of the index. I’ll charitably assume it’s there to begin 180. 3. Simplicity of vocabulary and sentence structure. A manual shouldn’t 181. 1. The field may only contain certain numbers and/or letters—for 182. 2. The field will _enter itself_ based on your previous entries. For 183. 3. The field can be a constant. For example, if your data record 184. 4. The field can automatically shift cases for you. For example, you 185. 5. The field can insist that whatever you type in is identical two 186. 6. The field can be required—something that you _have_ to enter, or 187. 1. Does the program help you come up with pies, bars, or whatever kind 188. 2. Can it do so as quickly as possible? 189. 3. Does the program fit in well with your other software? 190. 4. How much memory space does the program—and the electronic files of 191. 5. What about the program’s color capabilities—both on screen and on 192. 6. Does the program coexist okay with the printer or plotter you own or 193. 7. How easy is the program to learn? What about the other general traits 194. 1. “Who?” Who from the contracting firm is doing the work? A junior 195. 2. “What?” Describe the task as clearly and precisely as possible. And 196. 3. “When?” Can you negotiate a penalty if the firm misses a deadline? 197. 4. “Where?” Will the consultants do the work in your office? Theirs? On 198. 5. “How much?” Obvious. 199. 1. Thinking small. Don’t bargain over the Who-How simply for the whole 200. 2. Making the consultant give you the source code of the new software. 201. 3. Insisting that any manuals for his software be complete and in plain 202. 4. Bargaining if possible for a software warranty. Then, if you discover 203. 5. Possibly requiring the consultant to give you a discount on 204. 6. Negotiating for full or part ownership of the software he may develop 205. 7. Forbidding the consultant from selling the new software to your 206. 8. Making the consultant pledge that he won’t violate any trade-secret 207. 9. Hammering out a confidentiality agreement, if necessary, to protect 208. 10. Making the consultant agree in writing that he is working as your 209. 11. Trying to write into the contract your right to a full explanation 210. 12. Remembering that there’s only so much protection the law can give, 211. 13. Choosing the right lawyer, if you can afford one, for the contract. 212. 1. Is the convenience worth the extra several hundred dollars you’ll be 213. 3. How do the windows look alongside each other? Do they =overlap=, just 214. 4. How about =data transfer=? If you move information from one 215. 5. What kind of graphics—=bit mapped= or =character based=? The bit 216. 6. Will the window program work with ordinary software or just products 217. 7. Will the windows at least slightly slow down some programs? A word 218. 8. Is the program picky about the computers it’ll work with? A window 219. 9. Does the program require a mouse—the gadget you roll on your disk to 220. 1. Communicate teletype-fashion with the other person. You can keep 221. 2. Call up electronic bulletin-board systems (BBSs) or plug into The 222. 3. Get copies of other programs that altruistic computer buffs have 223. 1. Start out with the other person’s modem set on ORIGINATE and yours on 224. 3. Hit your carriage-return key. 225. 6. Assuming you’re using a manual modem, flick the switch to “data.” 226. 3. Hit your return. 227. 1. From MODEM7’s main menu, you select =T= and again hit the return a 228. 2. Find out if the other person can read words you type. (Don’t worry if 229. 3. Tell him (or her) to set up his computer so that, on paper or on a 230. 4. Once the other person is ready—while you’re still in the =T= mode—hit 231. 5. Now you type =B:[name of file]=. Here and elsewhere don’t type the 232. 6. Next hit your return. The disk should start spinning, and both you 233. 2. Again, select your trusty =T= from the main menu. But don’t hit your 234. 4. Type =B:[the name of the file you’re creating on the data disk to 235. 6. Then hit the letter =Y= with your finger on the control key 236. 8. Then, to preserve the file, “writing” to your disk, you must type out 237. 2. From MODEM7’s main menu, type =S B:[name of the data disk file you 238. 3. Hit the return. 239. 3. Hit your return. 240. 2. Type the word TYPE, then a space, then the name of the file—preceded 241. 3. Then hit your return. 242. 4. Hit your return. 243. 3. Tap =Control-B=. 244. 4. Type the right number (300 for 300 baud, 1200 for 1,200; do not use 245. 5. Hit your return.

Reading Tips

Use arrow keys to navigate

Press 'N' for next chapter

Press 'P' for previous chapter