Should we worry about people who use "hot" rigs, or people
who may have procured equipment with illegally obtained funds?
Is it a case of innocent until proven guilty, guilty until
proven innocent, or prove you are a "good guy" every step in
the process? Honest people are honest, dishonest people are
dishonest and are not inhibited by any additional statements
on the summary sheet. Do honest people make honest mistakes?
where will it all end.
alan, N2ALE/6
>From Trey Garlough <GARLOUGH@TGV.COM> Wed Nov 17 23:21:24 1993
From: Trey Garlough <GARLOUGH@TGV.COM> (Trey Garlough)
Subject: sv section nickname results
Message-ID: <753578484.315791.GARLOUGH@TGV.COM>
> Well, I got a little bit of feedback on the SV phone nonsense. Here
> it is:
>
>
> Sac Valley Sacramento Valley Sugar Victor
>
> 4 yes 3 yes 2 yes
>
> 1 no 0 no 2 no
>
> Nice sample size, huh.
>
> I guess we'll try "Sac Valley" and fill with "Sacramento Valley"
> upon request.
I just knuckle under and say "Santa Clara Valley" every single time. Of
course I get asked for occasional fills, and of course Santa Clara Valley
has the same exact cadence as Sacramento Valley. Sigh. Maybe I should
say "Silicon Valley" just to make things completely clear.
--Trey, WN4KKN/6
not actually living in the Santa Clara Valley but living in the ARRL
section by the same name
>From William Ralston" <William_Ralston@iegate.mitre.org Wed Nov 17 18:19:00
>1993
From: William Ralston" <William_Ralston@iegate.mitre.org (William Ralston)
Subject: Software Piracy
Message-ID: <9311172323.AA23898@mbunix.mitre.org>
Software Piracy
I do agree that developers of software should be compensated for their work,
and do my part (being a registered user of CT and NA).
I do not agree with the statement that the use of stolen software is a big
problem these days, especially in the case of software which is targetted at
the amateur radio community, which is typically inexpensive. Now developers
certainly look at pirated copies of software as lost revenue, but this is
based on the assumption that the user of a pirated copy would under other
circumstances have payed for the software. Sometimes, users of pirated
software do decide the product is worth supporting, and buy legal copies. I
maintain that if a user really needs a product, they usually also need the
support, and buy a legal copy. Most pirate users, however, do not really
need the software, and when pressed would delete their illegal copy rather
than purchase the software.
The commercial industry has largely gotten away from copy protection schemes,
and although a few high-value software products use hardware keying features,
there is a lot of customer resistance to these devices. It seems to be that
the true value to users in a software product is the availability of support
- which (usually) is only available to registered users of a product.
I think the long term solution to this is that the costs of producing
software have to (and will) come down, making it much easier for software
producers to recoup their development costs while offering products at low
enough prices that there is less of an incentive for theft.
Just my personal opinion...(not the policy or opinion of my employer (duh))
Bill AI6E wtr@mitre.org
>From Jim Reisert AD1C 17-Nov-1993 1949 <reisert@wrksys.enet.dec.com> Thu Nov
>18 00:44:54 1993
From: Jim Reisert AD1C 17-Nov-1993 1949 <reisert@wrksys.enet.dec.com> (Jim
Reisert AD1C 17-Nov-1993 1949)
Subject: CT question (yet another)
Message-ID: <9311180044.AA21845@us1rmc.bb.dec.com>
Jeff, N9HZQ wrote:
>I have been unable to get anything except CT86 to run on 286 and
>386 computers here, that is CT286 and CT386 won't execute. I get
>various errors on start-up, like illegal interrupt and other
>things. I read here that ZPM needed to be loaded. I note that I
>have ZPM on my CT disk, but have no idea how to use it.
All you have to do is have ZPM.EXE in the same directory as your CT286.EXE
file. CT286 will find ZPM and take care of the rest.
You do *NOT* need ZPM.EXE for a 386 machine. You should run CT386.EXE
instead. CT386 needs at least 1MB free EXTENDED memory to run. If you are
using an expanded memory manager which converts all of your EXTENDED memory
to EXPANDED, turn it off. QEMM provides either type of memory
automatically. EMM386.EXE will do the right thing if you specify the RAM
parameter.
73 - Jim AD1C
--
James J. Reisert Internet: reisert@wrksys.enet.dec.com
Digital Equipment Corp. UUCP: ...decwrl!wrksys.enet.dec.com!reisert
146 Main Street - MLO3-6/C9 Voice: 508-493-5747
Maynard, MA 01754 FAX: 508-493-0395
>From george fremin iii <geoiii@wixer.bga.com> Thu Nov 18 00:49:30 1993
From: george fremin iii <geoiii@wixer.bga.com> (george fremin iii)
Subject: cw ss scores
Message-ID: <9311180049.AA28837@wixer>
11-18-93 0048z
single op high power
WM5G 1604 76
W5WMU 1557 77
N4RJ 1529 77
K5GN 1462 77
W7RM 1444 77
K6LL 1428 77
N2IC 1422 77
K0RF 1414 77
NC0P 1409 77
K9FD 1400 77
NM5M 1383 77
K5MR 1377 76
K3LR 1372 76
VE3EJ 1364 76
K7UP 1357 76
AH3C 1351 77
N6TV 1313 77
KZ2S 1300 76
W6EEN 1298 77
K1TO 1292 76
N8RR 1281 77
W1XE 1271 77
KF3P 1265 75
K1DG 1257 76
K4VX 1253 77
N6RO 1248 77
W6QHS 1248 77
AA7NX 1238 77
KQ8M 1238 76
KI3L 1237 77
AA4NC 1230 76
W5KFT 1227 76
KT3Y 1220 75
WA8ZDT 1218 76
K3ZO 1215 76
K6KM 1199 77
W2SC 1190 76
KW8N 1187 76
W5XJ 1141 77
AA6KX 1094 77
KE9I 1053 77
W2RQ 1050 75
K2MM 1038 77
WB1GQR 1016 74
W5ASP 1000 76
WG9L 903 77
WE9V 874 76
KF8QE 894 76
W9YH 848 76
AA8U 831 75
W1IHN 715 76
N6AZE 281 73
N4TQO 213 57
K5EC 63 33
single op low power
NP4A 1388 77
N5RZ 1315 76
KY7M 1217 75
AD5Q 1210 77
K0EU 1173 75
W1FEA 1106 77
AB6FO 1075 76
K4XU 1070 76
N4AA 1030 77
N0AT 1016 76
N4TY 1006 74
WA2SRQ 950 76
W6UQF 939 77
AC5K 923 76
VE4VV 916 77
KZ4H 913 76
KQ7I 912 76
NJ2L 901 76
KO9Y 852 77
KP4TQ 840 73
N6MZ 823 77
N9JF 804 75
AI6E 782 74
N7LOX 718 76
NN5T 712 75
N6PN 685 76
AA6MC 682 76
KE4GY 682 74
WN3K 567 76
W5XD 565 72
WA1U 529 76
K8LJF 520 73
WT0K 471 70
KF9PL 455 73
ND1H 429 70
K7GM 425 72
KI4HN 347 69
N6KL 340 70
AC9CH 310 72
NG0X 260 31
KJ5JC 194 55
KU4A 152 61
AA5UO 149 52
NV3V 111 47
single op qrp
N3LS 873 77
K0FRP 824 75
W2GD 814 76
W9UP 788 76
AA2U 757 75
W9RE 751 76
K1TR 686 76
WA4PGM 667 76
N0AX 615 76
W7YAQ 590 73
KB4GID 569 72
N5NMX 465 73
WB2CPU 353 69
VE5VA 193 65
WA7BNM 100 52
N0BSH 16 14
multi-op
AA5B 1501 77
N4ZZ 1388 77
W4AQL 1379 77
N6VR 1321 77
WX0B 1308 76
K5OJI 1284 77
K6XT 1220 77
KB0S 1161 77
K0PP 1095 77
W6BIP 1048 77
KI6X 1004 76
NV6O 666 77
K6XO 549 75
few more changes on this list.
see all of you in the ssb version -- scores on 3830 +/- when its all
over.
george fremin
wb5vzl aka: w5kft
internet: geoiii@wixer.bga.com
packet: wb5vzl@n5ljf.tx
ph: 512-416-0140
|