CQ-Contest
[Top] [All Lists]

bootleg software

Subject: bootleg software
From: ames@nebula.decnet.lockheed.com (ames@nebula.decnet.lockheed.com)
Date: Wed Nov 17 14:41:39 1993
Should we worry about people who use "hot" rigs, or people
who may have procured equipment with illegally obtained funds?
Is it a case of innocent until proven guilty, guilty until 
proven innocent, or prove you are a "good guy" every step in
the process?  Honest people are honest, dishonest people are
dishonest and are not inhibited by any additional statements
on the summary sheet.  Do honest people make honest mistakes?
where will it all end.

alan, N2ALE/6

>From Trey Garlough <GARLOUGH@TGV.COM>  Wed Nov 17 23:21:24 1993
From: Trey Garlough <GARLOUGH@TGV.COM> (Trey Garlough)
Subject: sv section nickname results
Message-ID: <753578484.315791.GARLOUGH@TGV.COM>

> Well, I got a little bit of feedback on the SV phone nonsense.  Here
> it is:
> 
> 
>         Sac Valley              Sacramento Valley       Sugar Victor
> 
>           4 yes                      3 yes                 2 yes
> 
>           1 no                       0 no                  2 no
> 
> Nice sample size, huh.
> 
> I guess we'll try "Sac Valley" and fill with "Sacramento Valley"
> upon request.

I just knuckle under and say "Santa Clara Valley" every single time.  Of
course I get asked for occasional fills, and of course Santa Clara Valley
has the same exact cadence as Sacramento Valley.  Sigh.  Maybe I should 
say "Silicon Valley" just to make things completely clear.

--Trey, WN4KKN/6
not actually living in the Santa Clara Valley but living in the ARRL 
section by the same name

>From William Ralston" <William_Ralston@iegate.mitre.org  Wed Nov 17 18:19:00 
>1993
From: William Ralston" <William_Ralston@iegate.mitre.org (William Ralston)
Subject: Software Piracy
Message-ID: <9311172323.AA23898@mbunix.mitre.org>

Software Piracy

I do agree that developers of software should be compensated for their work,
and do my part (being a registered user of CT and NA).

I do not agree with the statement that the use of stolen software is a big
problem these days, especially in the case of software which is targetted at
the amateur radio community, which is typically inexpensive.  Now developers
certainly look at pirated copies of software as lost revenue, but this is
based on the assumption that the user of a pirated copy would under other
circumstances have payed for the software.  Sometimes, users of pirated
software do decide the product is worth supporting, and buy legal copies.  I
maintain that if a user really needs a product, they usually also need the
support, and buy a legal copy.  Most pirate users, however, do not really
need the software, and when pressed would delete their illegal copy rather
than purchase the software.

The commercial industry has largely gotten away from copy protection schemes,
and although a few high-value software products use hardware keying features,
there is a lot of customer resistance to these devices.  It seems to be that
the true value to users in a software product is the availability of support
- which (usually) is only available to registered users of a product.

I think the long term solution to this is that the costs of producing
software have to (and will) come down, making it much easier for software
producers to recoup their development costs while offering products at low
enough prices that there is less of an incentive for theft.

Just my personal opinion...(not the policy or opinion of my employer (duh))

Bill AI6E wtr@mitre.org






>From Jim Reisert AD1C  17-Nov-1993 1949 <reisert@wrksys.enet.dec.com>  Thu Nov 
>18 00:44:54 1993
From: Jim Reisert AD1C  17-Nov-1993 1949 <reisert@wrksys.enet.dec.com> (Jim 
Reisert AD1C 17-Nov-1993 1949)
Subject: CT question (yet another)
Message-ID: <9311180044.AA21845@us1rmc.bb.dec.com>

Jeff, N9HZQ wrote:

>I have been unable to get anything except CT86 to run on 286 and
>386 computers here, that is CT286 and CT386 won't execute.  I get
>various errors on start-up, like illegal interrupt and other
>things.  I read here that ZPM needed to be loaded.  I note that I
>have ZPM on my CT disk, but have no idea how to use it.

All you have to do is have ZPM.EXE in the same directory as your CT286.EXE
file.  CT286 will find ZPM and take care of the rest.

You do *NOT* need ZPM.EXE for a 386 machine.  You should run CT386.EXE
instead.  CT386 needs at least 1MB free EXTENDED memory to run.  If you are
using an expanded memory manager which converts all of your EXTENDED memory
to EXPANDED, turn it off.  QEMM provides either type of memory
automatically.  EMM386.EXE will do the right thing if you specify the RAM
parameter.

73 - Jim AD1C

--
James J. Reisert                Internet:  reisert@wrksys.enet.dec.com
Digital Equipment Corp.         UUCP:      ...decwrl!wrksys.enet.dec.com!reisert
146 Main Street - MLO3-6/C9     Voice:     508-493-5747
Maynard, MA  01754              FAX:       508-493-0395

>From george fremin iii <geoiii@wixer.bga.com>  Thu Nov 18 00:49:30 1993
From: george fremin iii <geoiii@wixer.bga.com> (george fremin iii)
Subject: cw ss scores
Message-ID: <9311180049.AA28837@wixer>

11-18-93   0048z
 
single op high power
WM5G    1604 76
W5WMU   1557 77
N4RJ    1529 77
K5GN    1462 77
W7RM    1444 77
K6LL    1428 77
N2IC    1422 77
K0RF    1414 77
NC0P    1409 77
K9FD    1400 77

NM5M    1383 77
K5MR    1377 76
K3LR    1372 76
VE3EJ   1364 76
K7UP    1357 76
AH3C    1351 77
N6TV    1313 77
KZ2S    1300 76
W6EEN   1298 77
K1TO    1292 76

N8RR    1281 77
W1XE    1271 77
KF3P    1265 75
K1DG    1257 76
K4VX    1253 77
N6RO    1248 77
W6QHS   1248 77
AA7NX   1238 77
KQ8M    1238 76
KI3L    1237 77

AA4NC   1230 76
W5KFT   1227 76
KT3Y    1220 75
WA8ZDT  1218 76
K3ZO    1215 76
K6KM    1199 77
W2SC    1190 76
KW8N    1187 76
W5XJ    1141 77
AA6KX   1094 77

KE9I    1053 77
W2RQ    1050 75
K2MM    1038 77
WB1GQR  1016 74
W5ASP   1000 76
WG9L     903 77
WE9V     874 76
KF8QE    894 76
W9YH     848 76
AA8U     831 75

W1IHN    715 76
N6AZE    281 73
N4TQO    213 57
K5EC      63 33
        

single op low power
NP4A    1388 77
N5RZ    1315 76
KY7M    1217 75
AD5Q    1210 77
K0EU    1173 75
W1FEA   1106 77
AB6FO   1075 76
K4XU    1070 76
N4AA    1030 77
N0AT    1016 76

N4TY    1006 74
WA2SRQ   950 76
W6UQF    939 77
AC5K     923 76
VE4VV    916 77
KZ4H     913 76
KQ7I     912 76
NJ2L     901 76
KO9Y     852 77
KP4TQ    840 73

N6MZ     823 77
N9JF     804 75
AI6E     782 74
N7LOX    718 76
NN5T     712 75
N6PN     685 76
AA6MC    682 76
KE4GY    682 74
WN3K     567 76
W5XD     565 72

WA1U     529 76
K8LJF    520 73
WT0K     471 70
KF9PL    455 73
ND1H     429 70
K7GM     425 72
KI4HN    347 69
N6KL     340 70
AC9CH    310 72
NG0X     260 31

KJ5JC    194 55
KU4A     152 61
AA5UO    149 52
NV3V     111 47


single op qrp
N3LS     873 77
K0FRP    824 75
W2GD     814 76
W9UP     788 76
AA2U     757 75
W9RE     751 76
K1TR     686 76
WA4PGM   667 76
N0AX     615 76
W7YAQ    590 73

KB4GID   569 72
N5NMX    465 73
WB2CPU   353 69
VE5VA    193 65
WA7BNM   100 52
N0BSH     16 14

multi-op
AA5B    1501 77
N4ZZ    1388 77
W4AQL   1379 77
N6VR    1321 77
WX0B    1308 76
K5OJI   1284 77
K6XT    1220 77
KB0S    1161 77
K0PP    1095 77 
W6BIP   1048 77

KI6X    1004 76
NV6O     666 77
K6XO     549 75


few more changes on this list. 
see all of you in the ssb version -- scores on 3830 +/- when its all
over.
 
george fremin
wb5vzl  aka: w5kft
internet: geoiii@wixer.bga.com
packet: wb5vzl@n5ljf.tx
ph: 512-416-0140


<Prev in Thread] Current Thread [Next in Thread>
  • bootleg software, ames@nebula.decnet.lockheed.com <=