text
stringlengths
0
74.9k
label
int64
0
19
label_text
stringclasses
20 values
If a X-window package exists, that runs om PC, DOS (and maybe MS-windows) I would be very happy to hear about it. Thanx in advance.
5
comp.windows.x
NHL RESULTS FOR GAMES PLAYED 4/14/93. -------------------------------------------------------------------------------- STANDINGS PATRICK ADAMS NORRIS SMYTHE TM W L T PT TM W L T PT TM W L T PT TM W L T PT xPIT 56 21 7 119 xBOS 51 26 7 109 xCHI 46 25 12 104 xVAN 45 29 9 99 yWAS 42 34 7 91 yQUE 47 27 10 104 yDET 46 28 9 101 yCAL 42 30 11 95 yNJ 40 36 7 87 yMON 48 30 6 102 yTOR 44 28 11 99 yLA 39 34 10 88 yNYI 39 37 7 85 yBUF 38 35 10 86 STL 36 36 11 83 yWIN 39 37 7 85 PHL 34 37 11 79 HAR 26 51 6 58 MIN 36 37 10 82 EDM 26 49 8 60 NYR 34 38 11 79 OTT 10 70 4 24 TB 23 53 7 53 SJ 11 70 2 24 x - Clinched Division Title y - Clinched Playoff Berth -------------------------------------------------------------------------------- Boston Bruins (51-26-7) 2 2 0 - 4 Ottawa Senators (10-70-4) 0 1 1 - 2 1st period: BOS, Roberts 5 - (Juneau) 7:19 BOS, Wiemer 1 - (Juneau, Oates) 17:47 2nd period: BOS, Neely 11 - (Juneau, Murphy) 6:10 BOS, Hughes 5 - (Richer, Kimble) 7:55 OTT, Archibald 9 - (Rumble, Lamb) 11:37 3rd period: OTT, Boschman 9 - (Kudelski) 5:10 Powerplay Opportunities-Bruins 0 of 2 Senators 0 of 4 Shots on Goal- Bruins 13 11 10 - 34 Senators 5 9 12 - 26 Boston Bruins--Moog (36-14-3) (8 shots - 8 saves) Blue (9:38 second) (18 shots - 16 saves) Ottawa Senators--Sidorkiewicz (8-46-3) (27 shots - 23 saves) Berthiaume (6:36 third) (7 shots - 7 saves) ATT-10,500 -------------------------------------------------------------------------------- Washington Capitals (42-34-7) 0 0 2 - 2 New York Rangers (34-38-11) 0 0 0 - 0 1st period: NONE 2nd period: NONE 3rd period: WAS, Bondra 36 - (Pivonka, Cavallini) 6:54 WAS, Bondra 37 - (Cote, Pivonka) 10:10 Powerplay Opportunities-Capitals 0 of 2 Rangers 0 of 1 Shots on Goal- Capitals 16 11 12 - 39 Rangers 8 7 8 - 23 Washington Capitals--Tabaracci (7-11-0) (23 shots - 23 saves) New York Rangers--Richter (13-17-3) (39 shots - 37 saves) ATT-17,897 -------------------------------------------------------------------------------- New York Islanders (39-37-7) 2 1 1 0 - 4 Hartford Whalers (26-51-6) 2 1 1 1 - 5 1st period: NYI, Ferraro 13 - (Malakhov, King) 1:29 NYI, Hogue 32 - (Thomas, Turgeon) 1:57 HAR, Yake 21 - (Poulin) 4:15 HAR, Yake 22 - (Nylander, Poulin) 16:44 2nd period: HAR, Verbeek 39 - (Cassels, Weinrich) (pp) 2:43 NYI, Thomas 35 - (King, Ferraro) 7:58 3rd period: HAR, Burt 5 - (Sanderson, Cassels) 13:41 NYI, Malakhov 14 - (Hogue) 17:45 Overtime: HAR, Janssens 12 - (Poulin) 1:08 Powerplay Opportunities-Islanders 0 of 3 Whalers 1 of 3 Shots on Goal- Islanders 16 8 7 1 - 32 Whalers 7 13 7 1 - 28 New York Islanders--Fitzpatrick (16-15-5) (28 shots - 23 saves) Hartford Whalers--Lenaduzzi (1-0-1) (32 shots - 28 saves) ATT-10,915 -------------------------------------------------------------------------------- Pittsburgh Penguins (56-21-7) 2 3 1 0 - 6 New Jersey Devils (40-36-7) 2 4 0 0 - 6 1st period: PIT, Daniels 5 - (Needham, Tippett) 4:14 NJD, C.Lemieux 29 - (Semak, Driver) 10:19 PIT, K.Stevens 55 - (Tocchet, Murphy) (pp) 12:40 NJD, Zelepukin 22 - (Driver, Niedermayer) 17:26 2nd period: PIT, M.Lemieux 68 - (Stevens, Tocchet) 1:42 NJD, Semak 36 - (C.Lemieux, Zelepukin) 2:27 PIT, McEachern 28 - (Jagr, Barrasso) 4:24 NJD, S.Stevens 12 - (Guerin, Pellerin) 5:45 PIT, M.Lemieux 69 - (sh) 12:40 NJD, Richer 37 - (Nicholls) 15:53 NJD, C.Lemieux 30 - (Semak, Zelepukin) 17:40 3rd period: PIT, Mullen 33 - (Jagr, M.Lemieux) 18:54 Overtime: NONE Powerplay Opportunities-Penguins 1 of 5 Devils 0 of 3 Shots on Goal- Penguins 9 11 8 2 - 30 Devils 12 15 9 3 - 39 Pittsburgh Penguins--Barrasso (43-14-5) (39 shots - 33 saves) New Jersey Devils--Billington (21-14-4) (30 shots - 24 saves) ATT-14,796 --------------------------------------------------------------------------------
10
rec.sport.hockey
Mike Terry asks: No Mike. It is imposible due to the shaft effect. The centripital effects of the rotating shaft counteract any tendency for the front wheel to lift off the ground.
8
rec.motorcycles
Sorry for taking this off of Sharon's resp, but I'd also like to add some more verses to that and perhaps answer the second Q. Verses: 1 Corinthians 6:9-10 Colossians 3:5-10 As for knowing when, that's a bit tricky. People normally have consciences which warn them about it. However, as in my case, a conscience can be hardened by sin's deceitfulness (Hebrews 3:12:13) so that the person has no idea (or doesn't care about it) that they are sinning. Of course, there are those sins which we do when we don't know that they're sinful to begin with. Those take searching and examining of Scripture to find out that they are sinful and then repent and change. The best question to ask in every circumstance to judge sinful possibilities is: "Would Jesus wholeheartedly do this at this point in time?" I know, it sounds like a cop-out, but it truly is a stifling question. Joe Fisher
15
soc.religion.christian
4
comp.sys.mac.hardware
According to what I have read on Biblical idioms, speaking "in X's name" is a standard Aramaic/Hebrew legal idiom for what we today would call Power of Attorney. A person from Jesus' culture authorized to conduct business "in John's name" had full authority over John's financial affairs, but was held under a solemn fiduciary obligation to work only for John's benefit and consonant with John's wishes. It was not required for the steward to preface each business transaction with "in John's name"; it was sufficient to have valid power of attorney and be operating in good faith. (Note the overlap here between legal and religious definitions of "faith".) With this cultural background, praying "in Jesus' name" does not mandate a particular verbal formula; rather it requires that the petitioner be operating faithfully and consciously within an analogous "fiduciary" relationship with Jesus and for the purposes of His Kingdom. The message of "praying in Jesus' name" is thus closely aligned with the parable of the talents and other passages about God's delegation of Kingdom business to his stewards, both resources and responsibilities. This idea of praying "in Jesus' name" is not only present but prominent in the Lord's Prayer, although the verbal forumula is absent. The act of praying the words "In Jesus' Name" may be beneficial if they cause us to clarify the relationship of our requests to the advancement of God's Kingdom. For that reason, I'm not quite ready to say that the praying the formula is without meaning. Prayers to God for other purposes (desperation, anger, thanksgiving, etc.) don't seem to be in this category at all, whether uttered by Christian or non-Christian, whether B.C. or A.D. (that's B.C.E. or C.E. for you P.C. :-). I don't see anything in Christ's words to contradict the idea that God deals with all prayers according to His omniscience and grace. Van Kelly vek@research.att.com
15
soc.religion.christian
Anyone seen any press releases or heard any rumors of a cache card for the LCIII, now that it has the full data bus width on the PDS slot?
4
comp.sys.mac.hardware
A friend of mine has problems running Spigot LC on an LC III. His configuration is: Spigot LC / LC III, System 7.1 Video Spigot Extension 1.0 I would appriciate if I can get any postitive/negative experience with this setup. Thanks,
4
comp.sys.mac.hardware
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>',3'$9F8+"Z5'1]_?W]_?WWIZ>BHJ*BHJ*BHJ*BHJ*GIZ M>GIZ>GIZ*BHJ*GIZ>M_?1T>EI0L+"V9F9F9FR,A_?W_(5Z(46Q04%%=75VO4 MU-34U-34U`("`@("`@("`M34?W]_?]#084O#%%O`.#AUG@&$`0$Y.?518)0& MC#`P8V-55555555559-65@HWGV`7]?7U%Q>?GY^?GP!@45$&*2G:VBDIGIZ' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'34T2P<'HP<$2$A+!P<'!P1(2$A)-34U-34TM,)11-];6UM;6 MUM8[(3N^AX>'AX>'AX>'AX>'AX?$9@NE1]]Z*BJ[`SW2&;!3[8LTQ<7%9V=G M9V=G9V=G9V=G9V=GQ<4TBXN+B^WM4U.P&7'2TCT]F0.[>D<+9C&'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AVYAA`$DF&IJH*"NKJZ(B(B(W-P0N;:VMK:V MMK:VN=R(KJ0M+2W:AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MS^K/S\]K:VLV-C;9V:D'E5E9E5G9V=G9V38V-C;``(*"O!,3O((``````"N5 M=A."*RDI]/2,!@:4-Y2,]"G:9&2L[,;OQO&D:@=Y><[.!05L;&QL31(2$L'! MP<$234U-34UJ)"0*"I_U"B0DAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?%-(N+4[`9&1D9&7%QTCV9 M`P,#`UY>7EZ[*M]'I:6E"\0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AS'$9@NE1WHJN[N[N[LJ*GK?1Z4+9C&' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<Q,<3$Q&9F9@L+I:5' M1T='WT='W]_?W]_?>GIZ>BHJ*BHJ*BHJ*GIZW]]'1T>EI:4+"PMF9L3$U-3( MR'_(HJ);P%M;%%=75U?4U-34U-34U`("`@)N;FYN`@)_?R`@(-0!*]`46UO` M.'5UG@&$`0$Y4?518#<&!HR,8Y.3M+15556TDY-65C>?8!?U]?47%Y^?@8&! M7`H'S%%XGJEUAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'34T2P>CHP<$2$A(2$A(2$A(234U- M34U-3<[:C%%@!M;6UM;6UIN^0R&^AX>'AX>'AX>'AX>'AX>'AX>'AS%F"PNE M1]]Z*EX#F3W2&1FP4^WM[>WM[5-3[>U34U-3L+"P&1EQ<7%QTM(]/3T]F9D# M`UZ[N[LJ>M]'I0MF,8>'AX>'AX>'AX>'AX>'AX>'AX>'R&XK$RLD))AJ:J"@ MKJZNB(B(W-P0N;:VMK:VMK:VN=R(KMK:VMHI](>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX=K:S8V-C;9V=FI!UE94@?9H]G9V38V6UN5 M=G83$Q,3$X(!`````(*$$W:5]/3T](P&!I0WS,R4C/3:+62L[,;O[*RDF`8% M!04%!04%!6QL;&P2$A(2$A(234UL3:YJ)`J!GY\7"B0DAX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?M ML!G2TCV9F9F9F9F9`P,#`P,#`P->NRIZ1Z4+9L0QAX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>',<1F"PNE1]]Z*KN[ M7EZ[NRHJ>M]'"\2'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>',<3$9F9F"PL+I:6E1T='1]_?WWIZ>BHJ*BHJ*BHJ*BHJ>GIZ>M_? MWT='1T>EI0L+I:6EU-34U,C(HJ);P,!;%%=75U?4U-0"`@("`@(";FYN;FYN M2\M_?R#4('_0*RL46\`X=76>>%*$`2@Y4?518#>45@:<8Y.3D[15556TDY-0 M"I^?%_7U]1<7%Y^?@8&!UHXK88>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=-31(2P>CH MP<$2$A(2$A(2$A(234U-34U-SBTP!O7,!M;6UM;6FYN;0R&^2(>'AX>'AX>' MAX>'AX>'AX>'AX>'AS'$"Z5'WRI>`YF9F9F9F3T]/=+2TM+2TM+2TM+2TCT] M/9F9F9F9F9F9/3T]/3V9F9D]/3T]F0->N[LJ>M^E9L3$,8>'AX>'AX>'AX>' MAX>'R"4!=@$*)"28:FJ@H*ZNKJZ(B-P0N;:VMK:VMK:V$-R(KBDI*?3TC(>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS;9V=G9 MJ5E94EG9HZ.CHS9K:W9VO!.\=G9V$Q."````@H(3$X(`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`A1;.,!;6Q2B5U=7 MU-0"`FX"`@)N;DM+2TM+`@)_(-0@?\M+)5<46\`X=:F>`82$`2@Y]?518#>4 M!@;K4%"3D[2TM+2TDY-04)\7%_7U]1<7%Q>?GX&.CHYA8="'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX=-$A(2P>CHP<$2$A(2$A(2$A)-34U-34W.SMKT-U',@8'6UM;6 MFYL^.R$[2$B'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS'$"Z5'>BJ[N[N[N[M> M7EY>7EY>7EY>7KN[7EY>`P,#F9F9F9F9F3W2TM+2/=+2TM+2/9D#7KN[>GK? MWT='1T='"V;$AX>'AX>'AX?4`M!V=H$*"B0DF&IJ:J"@H*ZNB(C<N;FVMK:V MMK:YW(B(KO3T](R,!LR'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'V0>54EG9-C8V-FMK:W:\$[QV4E)V=A-V=H*"O!,3 M@@#T]/2,C(R,C(P&-S>4!O0IVF2L\>_&\:1J!A<WZ>GIZ>GI>04%!6QLXN(2 MP<'!P<'!B*YJ)`J?%_47"B2'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=>NRIZ>GIZ>GK?W]_?1T=' MI0MFQ,3$,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>',<1F"Z6EI4??WWHJ*BIZ>M_?W]]'I0MFQ,0Q,8>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<QQ,1F"PNEI4?? MW]_?>GIZ>GIZ>GIZ>GIZ>M_?W]_?W]_?W]_?W]]'1Z6EI:6EI4='1Z5K`@(" M`@)N;A1;.,#`6Q04%%=7U,@"`FYN2TM+2TM+2\-N`L@@U"!_RTMA85<46\!U M=9YX`82$`2@Y]5%1S#>4!NLH4%!0D[15556TDY-04)\7]?7U%Q?>WM[>WI^! MCHZ.$1&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AQ(2$A(2$N@2$A(2$A(2$A(2$A(2$DU- M34W.SC",S/5@GX'6UM;6FYL^/B$AOKZ'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX<QQ&8+I4='1T='W]]Z*KM>7KLJ*BHJ*KN[NUY>7@,#`P.9F3T]/9F9 MF9F9F9F9F0,#7EY>NRHJWT='1T>EI6;$AX>'AX>'AP+(2RN\%Y^!"@HD))B8 M:FIJ:J"@KHB(W!"YMK:VMKD0W(BN]/2,C`:4S&"'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AUG9-EMK:Z+/O!,3 M=G92E3.5=G83O+P3O+R"`/3T](R,C(R,]/2,C`8&C/0I+62L\5KLK*288&`& MZ>GIZ>GIZ04.#N+BXN(2$DU-34W<KJ!J)`J?%_47@23JAX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?? M1T>EI:6EI:4+"V8+"PL+9L2'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<QQ&8+"PNEI4='WT>EI0L+"Z4+ M"V9F9L3$Q#$Q,3&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>',3'$Q&9F"Z6E1T='1T='W]_?1T='1T='1Z6EI:6EI4='1T='1Z6EI:4+ M"PL+"PMF9L3$SZ(42TM+2TM+)5O`.#C`6UM;%%=75\@";DO#P\-+)24E2\-N M`L@@U-34`FXE5U=;P,!U=9YX`5*$`2A1]5%1S)0&!E!04%!0D[2TM+2TDY-0 M4%#>]0T-WB<GWA<7%R>!@8Z.$1$1AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AQ(2$A(2$N@2 M$A(2$A(2$A(2$A(2$DU-;&Q553",S/7>)X&!UM;6FYL^/CLA(4I(AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<Q,<1F9@NEI4='W]]Z>GIZ*BJ[ MNUY>`P,#7EY>7EY>7EX#`P,#`P,#`P,#7KN[*BIZW]]'I0MF,3&'AX>'AX>' M;@+()2MV]1>?GPH*)"0DF)AJ:FIJH*ZNB(C<W!`0$-S<B(BN](R,!C<W8%%1 MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>BS\\3O'9V=I4S,S,SE79V=G9VE3,SVBGT]/2,C/3T*2DI]/3T M]"G:+62D[._Q9+,&%P:8F("`Z>GIZ>D.#@X.;&QL$A)L;+G<KJ!J)`J?%_7U MGR1960>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX?$Q,1F9F9F9F9FQ,0Q,8>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS'$9F8+ M"PL+"PL+9F9F9F9F9F;$Q,3$Q,3$,3&'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AS$QQ&9F"PL+I:6E1T='1T='I:4+"V9F9F;$Q,3$ MQ,3$Q,3$9F9FQ,3$Q#$QAX>'AX>'AQ1;6\!U86%A86%A86'`.#C`P%M;6Q17 M%%MN2\-+)4M+2TM+PVYN`LC4U-3(`DM75U=;P#AU=9YX`5*$*"A1]5%@-Y0& M4,W-4%!0D[2TM+2TDY-04%`H]?47GY^?GY\G)R>?@8Z.CA$1$8>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'$A(2$A(2Z!(2$A(2$A(2$A(2$A(2$A)-;&Q5+3",-U'>WI^!UM;6 MFYL^H*`A(=-(1(>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AS$Q9@NE1]]Z*BJ[7EX#`P,#`P.9`P->`P,#7EY>7KM>7KN[NRHJ>GK? M1Z6EI0O$,8>'AX>'AX>'2\@")2N?%_47%Y^?"@HD)"28F&IJ:J"@KJZNB(B( MB(B(B*ZN](R,!I0W8%%148>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AW9V=G9V4I4S,S,S,Y65,S,S,Q$1 MVMHI*?3T]/0I*=K:VBDIVMHM+62D[*?QI&K,-YAJ:IB`#@X%!8#IZ04%!>GI M!05LMA"(KJ!J)`J?]?7UGYZXN+B>GH>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS$QQ,0Q,8>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>',3'$Q#$Q,3$Q,3&'AX>',3$Q,3$Q,<3$Q,3$Q,0Q,3$QAX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>',<3$Q,1F9@L+"Z6EI0L+ M"PMF9L0Q,3$QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'%%M;6\#`P`$! M`2LK*P$X=3@XP%M;6UL46\!;;FY+2\/#PVYN;FX"R-34U-3(`@*B5Z);P#AU M=:F>`0&$.3E1]5%@-Y164%!04%!0D[2TM+2TDY-04%`H]?47GX&!@8&!GR>? M@8$8&!$1$1&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'31(2$A(2$A(2$A(2$A(2$A(2$A(2$A(2 M36Q5+3",-_7>)X&!UM;6FSX^H*!#(2%*1'"'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<QQ&8+I4='W]]Z*BHJ*BJ[N[N[N[LJ M*GIZ>GIZ>GK?W]]'1T>EI:4+"V;$,3$QAX>'AX<E;M1N)=`*GY\7]?47GY\* M"B0D))B8:FIJ:J"@H*ZNKJZNKJ0I*?2,C`8WS&!148>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'=G9V=G9V ME3,S,S,S,S,S,S,186%D+2W:*2DI*2G:VBTM+2TM+2UD9&JD[,:LI)@7!FJD MI&J8@(#JZNKJZNGIZ>GIZ>FYMMR(KJ"8)`J?]?7UGU)24E)24E*'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AS&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX<Q,3$QAX>'AX>'AX>'AX<Q,3'$Q,3$,3$QAX>'AX>'AX>',3$QQ,3$Q,3$ MQ,3$,3&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS$Q M,3'$Q&9F9F9F9F9F9F9F9L3$Q,0QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX?/5U>B%%O`P+P3$[QV=G:\=75U.%M;6UM;P'5;H@(";FYN;FX"`@+( MU-34U-0"`A2B5Z);.'4X=76>>`&$.3GU]?5@S)104%!04%!0DY.TM+2TDY-0 M4%`H.0W>GX&!@8&!@>'AX>&.CAB0D!$1AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=L;!(2$A(2$A(2 M$A(2$A(2$A(2$A(2$A)-36S.+3",S`W>GX'6UM:;FSX^H$-#(2'32$APAX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>',<1F M"Z5'W]_?W]_?W]_?W]_?WT='1T='1T='1T>EI:4+"PL+9L3$Q,0QAX>'A^XE M`M0")20D"H&?GQ?U]1>?@0HD)"0DF)B8:FIJ:FJ@H*"@H*0I*2GT](R4-\Q1 M45&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX=V=E)V=G92E3,S*S,S*RLS86%A):RL9&0M+=K:VMK:+61D9&1D M9&1D9&ID[,9DLP;UF+-D9+.8F&L)@("`@("JJJJJ\(BYMMR(KFJ8)`J?]1?U MN+B>G@<'![BXAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AS$QQ,3$Q,3$Q,3$Q,3$Q&9F"PL+"V9F"PL+"PL+9F9F M9L1F9@L+I:6EI:6EI:6EI0L+9L0Q,3&'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AS$QQ,3$9F9FQ,3$,3$Q,8>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AW]_("#4(']_RX1VO+P3$Q,3=75U=5M;6\#` M=77`%*+(`@("`@("R,C(R-34U"!_HJ)75Z);.'4X=76>>'@Y'/7U]1=@S`'- M4%!04%!04%"3DY.3DU!04%`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`J?%Q<7!Q$1$1$'$1$1$8>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<Q,8>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>',<3$9F9F9@L+"PL+"PL+"PNEI:6E MI:6EI:6E1T='1T??WT??WWIZ>GHJ*BHJ*BHJ*GIZWT>E9F;$,3&'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'PTO+?R`@?TN086&$ M=KR\O+R\=75U=<!;P,`X=74X6Q2BR,C(U-34U-3(U-34U'\4HE=75Z);P'4X M.'6>>'@H.?47%Q=@-P'-S5!04%!04%!04%!04%!04%`H*"A0@1@8CHX8&!@8 M&!@8&$B^;FYN;FZ'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AVP2$A(2$A(2$A(2$A(2$A(2$A(2$A(2$A)- M34UD,(Q@#=Z?@=;6UM:;FSZ@H$-#B+4A(2%(1(>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS'$9F9F"PNE1T='1Z6E"V9F M9L3$Q#$QAX>'AX>'AX>'AX>'AX>'AX>'AX?N[D:J@-2NH*!J:B0D)`J!GQ?U M%Y^?"@H*)"0D)"0D)"28F)@DF-K:VBDI*?2,C)3,45%@-X>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>\=G9V=G9V=G:5 M*RLK82LK*RLK*V&LK*RLK*RLK*RL9&1D9*RL\?'Q\?'QLZ2LI^RDF#=@F*3Q M\62D:IAJI-RVMMR(KJZDH*X0MMR(KFHD)`H*%Q=2,S,S!P<',S,S!Q&'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?$ MQ,0Q,3$Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS$QQ&9F"PL+ MI:6EI4='1T='W]_?W]_?>BHJN[M>7KN[N[N[N[N[N[N[7EY>7EY>7KLJ>GK? M1Z4+"V9F9F;$Q#$Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX=+2TM_?]34(']+2TN0A':\$Q,3$W6>=<!;P,`X=75UP%L45]34U-34U-34 MU-34R!045U=75Z);P'4X.'6>GI[-*&!@GY\W`2LKS<W-4%!04%!04%!04%!0 M4,TH.2A0DQ@8&!@8&!@8&!A(2$B^;F[+RW]_AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>';!(2$A(2$A(2$A(2 M$A(2$A(2$A(2$A(2$A)-;&3:C)3UWB>!UM;6FYN;/CZ@H$-#B(B((2'32D2; MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX<Q,<3$Q#$QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'A^[N1JJ` M@("(KJ"@:FJ8)"0*@9\7]1>?GX&!"@H*"B0D)"0D)"0D*2DI*2DI*?3TC`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`YF9F9F9F0,# M`YF9F9D#7KN[7KN[*GK?W]]'1T='I:6E"PL+"V;$Q#$QAX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'ATM+`G]_(-34U"!_?P)+2TL!`0$!`0&>J77`P#AU M=75U.,!;%%=7U,C(R`(";DLXP%L45U=75Z);P'4X.'6>GLW-E)0*"@H**RO0 MT,W-4%!0S<W-S<TH*,W-S2@H.2A0DU48&!@8<'!P2$A(2$A*2LM_?W\@((>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX<2$A(2$A(2$A(2$A(2$A(2$A(2$A(2$A(2$DUL;"TP!E$-)X'6UM:;FYL^ M/CZ@H$-#0T-#(2'3TTI$98>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'.>Y&JH"`@!"UB*ZNH&IJF"0D"H&?%_47%Y^?GY^!"@H*"@H* M"@J!]/3T]/0I*?3TC`8W45',!O2'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'$Q,3$[R\O(2$A()2,RLK*RL!`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`YF9/3T]TM+2 M<7'2TM(]/=+2TM+2/9F9F9F9`P->7EY>7EZ[N[N[N[LJ*GIZW]_?W]]'1Z4+ M9F9FQ,3$Q#$Q,3$Q,3&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AP)+`G\@U-34(']+2TM+ M2TN0`2O0826>J75U=3AU=:FI=77`6U=7HL"I4GBI=75UP%L45U=75U<4P#@X MP'5UGE!0"@H*"@HK*]#0T,W-4%!0S<TH*"@H*"@H*"@H.2A0DU552$A(2$A( M2$A*2DI*2LM_?R`@("`@AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AVP2$A(2$A(2$A(2$A(2$A(2$A(2$A(2$A(2$DUL M;+.,-PW>G];6UIN;FSX^/CZ@H*!#0T-#KCO3TTI*1&6'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=9.>ZJ@("`MK80B(BNKJ!J:I@D)`J? MGQ?U]1<7%Y^?GX$*"@H*@9^,C(R,C/3T]/3TC`;,46`WC/3:AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AQ,3$Q,3$[R\O+R\O+R" M`0``*P$!`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`UY>N[N[N[N[7EY>7KN[ MN[N[*BHJ*BIZ>M_?W]]'1Z6EI:4+"V9F9L3$Q#$Q,8>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MU-34U"`@(']+2TM+D)`E82LK`;P3=@$!J75U=75U=9Z>GG4X6Q175\!U`0&> MJ75UP%L45U=75U<4P#@XP#AU4%!0)"0D)"0K*RO0T&'-4%!0S<TH*"@H.3DY M*"@Y.2A0D[15;$I(2$A*2DI*2DI*2DI_?R`@U-34U&;$Q,3$,3&'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>';&QL$A(2$A(2$A(2$A(2 M$A(2$A)-34T2$A(234UL+3`&40TG@=;6UIN;FSX^/CZ@H*"@H*"@H*!*2DI* M2D1EAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'A!Q9.4:JJH`0 MMK:V$(B(KJZ@:FJ8)"0*GY\7]?7U]1<7GY^!@8&?GY\&E#<WE`:,C(R,!C=1 M4<R4C/3:+8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' M$Q.\O!,3$[P3$Q,3$[R$@@```(*"@HST*2G:+62LK/'L[.SL[.SL:+&QL;'& M34U-P>RGQJQJ!E',F*3Q[/&DF&JDKMRVMKFYW*ZNB-P0MK;<KFIJ:FIV=G9V M=G9V=G92E3,1$1'9V6Z'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' M,<1F"Z5'WWIZ*BJ[7@.9F9F9F9D]/=)Q&1D9&1EQ<7%Q<7%QTM(]/9F9`P-> MN[N[N[N[NUY>7@,#`P,#F9D#`P,#7EX#`UY>N[MZ>M]'1Z6E"PMF9L3$Q#$Q M,3$QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'2Y"0D)"0D"4E82LK4G83$W:$`2O0825+J:F>GG5U MJ9YX>)YUP%NB5UMU>(1XGIYU.%L45U=75U<46S@XP,!UDY.;FYN;FYLK*RO0 MT-!04%!04,TH*"@Y.1P<.3D<*,U0D[15!6Q*2DI*2DI*2DI*2DI*?R#4U"`@ M("#4,3&'AS&',8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=5 M;&QL;&P2$A(2$A(2$A(2$A(234U-34U-$A(236QL+3`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`P.9/3T]TM(]TM)Q<1D9L+`9 M&1D9&1D9<7'2/3V9`P,#`UY>7@.9F9F9/3T]/3T]F9F9F9F9F9D#`UY>N[LJ M>M_?WT='I:4+"V9FQ,3$,3$Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'2TM+2TM+2Y`E82LK`8*\ M$W8!*]!A)4MN`IZ>GIZIGG@!`7BI=<`45UMUGE(!GIYU=<`45U=75U>B6\`X MP,"TM+2;FYN;F]#0*RLK*]#04%!04,TH*#DY'!P<'#DY*,U04+2T56QL2DI* M2DI*2DI*2DI*?R#4U"!_?W]_((>'AS'$Q,0Q,8>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'A[1556QL;&QL$A(2$A(2$A(2$A(234U-34U-31(236R: M,%;>#=XG@=;6UIN;FSX^/CX^/CX^/CX^/CX^/DI*2DI*2D2FAX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AQP<'!SN):JJB(@0$+:VMA`0B(BNKJ!J:B0D M"@J?GQ<7]?47%Y^?GY^?G\Q145%145%145%146#,-Y0&C/0I+:SQ[(>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>\O!,3$Q,3O'9VO+P3$[R\=G9V M=KP3$V#,E(ST*=HM9*SQ[.SL[.S&:+'O6EI:[[%-34W!P>CO'628!E',F*3Q M\61JF&JDKMRVMK:YW(C<W-P0N;;<H)AJ:@?N$=G9V=EN;FYN;C8V:PD)@`F' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX<Q,<3$Q&9F"Z5'1]_?>GHJ*KN[7@,#F3T] M/3T]TM+2<7$9&;"PL%-3L!D9&7%Q<7'2TCT]/3T]TCT]/3T]/=+2TCT]/3V9 MF9F9`P.9F0,#`P->N[LJ>GK?1T>E"PL+"PMF9F9F9F9F9L0Q,3&'AX>'AX>' MAX>',3$Q,3$Q,3$QQ,1F9F9F9F;$Q,0Q,3'$Q#$Q,3$Q,3&'AX>'AX>'AX>' MU-34(']_2Y`E82L!`8*\O!,3O(0!`0$!*RN>GIZ>>`&$A`&>=3A;5Q1UG@&$ M>)ZI=<!;HE=75U=76\`XP,"TM#X^/CZ;F]#0*RLK*RLK*U!04%#-*"@Y'!PY M.3DH*,U04).TM%4%;$I*2DI*2DI*2DI*2M34U-34U`++?W]_Q,3$,3&'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'4+15555L;&QL$A(2$A(2$A(2 M$A(2$DU-34U-34U-36R:,`;>#=XG@=;6UIN;FYL^/CX^/CX^/CX^/CX^/CY$ M1$I*2DI$IH>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=9=AP<'.[N1JJNB(@0 M$+:VMA`0B(B(KJZ@:I@D)`J!GY\7]?47GY^?GY^?S%%1S,S,S&!@8&#,-Y24 M!@:,C/0I+63Q[.R'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'`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`P.9F9D]/=+2<7%Q<1D9&;!34U-34U-3L+"P&1D9&1D9<7%Q<7'2 MTM+2TM(]/9F9F9F9F9D]/=+2TM+2/3V9F0->N[LJ*BIZ>M]'1Z6EI:6EI:6E MI:4+"PL+"PMFQ,3$Q,3$9F8+"PL+"Z6EI4='1T='1T='1T>EI:5'1T='1T=' M1]]Z>M_?1Z4+"PMF9F9F('_+2\,E86$K`(*"O!,3O':$A':\O!.\O!,3>'@! M`812`81XJ3A;5Q0X=9Y2`9ZI=<!;%%=75U=7%,#`P`4%!3X^/CZ;8=`K*RLK M*RLK*RM04%#-*"@Y.1PY.2@H*,U04%"3M+15!6QL1$1$2DI*2DI*2HW4U-34 M(']_`DL"JJJ'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?-4+2T M5555;&QL$A(2$A(2$A(2$A(2$A(2$DU-34U-3:RSC($G#0TG@=;6UM;6FYN; MFSX^/CX^FYN;FYN;FSX^/D1$1$1$1$1$AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MASF5'!Q2[NY&JJ"NB!`0MK:VMA`0$(B(B*Z@:FJ8)`H*GY\7]1<7GY^!@8', M45',E)0&E)0WE)0&C(R,C(R,]/0IVF2L\>SLAX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'``````""@E)2`0$!`0$`4E)V=G9V=G9V=F!@45%@-P;TVBUD\>SL M[,;&QFBQ[UJ]O;U:P<'HZ.CHZ.C!(K.8!F!@F&JD9*2S:K.DI(BYN;FYN=RY MW-S<N;:(:FH'65E2=I4S$=EN-FMK:VMK:S8V-C:'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<Q,8>'AX>'AX<Q,3'$ MQ&9F"PNEI4='W]_?WWIZ*BJ[7@.9F9D]/3W2TG$9&1D9&1D9&;"PL+"P4["P M&1D9&1D9&7%Q<7$9&1D9<7'2TCT]/9F9F3V9/3T]/9D]/9F9F9D#`UY>NRHJ M*GIZ>M_?W]_?1T>EI:6EI:4+"PMF9F8+"PNE"PL+I:6EI4='W]_?W]]Z>GIZ M>GIZ>GIZ>GHJ*BJ[N[M>7@->7EY>7KN[7EY>N[N[?W_+2TO#PY!A86$`@KP3 M$Q,3$Q,3O+QVA(2$GG@!A(0!`80!GG5;5Z+`=9X!A'B>=<!;6U=75U=7%%O` MP`4%/CX^/IN;T"LK*RLK*RLK*RNT4%!0S2@H*#D<.2@H*"C-4%!0D[2T555L M;$I*2D1$1.CHZ.CHU-34U-0@@*IK"<C(((>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AQPH4%"TM%5556QL;!(2$A(2$A(2$A(2$A(2$A(2$DU-K&0P MUH$G#0W>)X&!UM;6UM:;FYN;FYN;FYLD))LDFYN;/CY$1$1$1$1$1*:'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX=9.3EV'!P'[D9JH*Z(B!`0MK:V$!`0$(B(B*Z@:FJ8 M)"0*GY\7]1>?GPH*"@I14<R4!HR,C(P&C/3T]/3T]/3T]/0IVBVL\>SL[.R' MAX>'AX>'AX>'AX>'AX>'AX<QT-#0*RLK*RMA86%A86%A*RLK*P!VO':\=G9V M8&!145%1S`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`YD]/3T]TM+2 MTM)Q<7%Q<7%Q<7$9&1D9&1D9&1D9&1D9<7%Q<7%Q<7%QTCT]F9F9F9F9`P,# M`P,#`P,#`P,#`UY>N[LJ*BIZ>GIZ>M]'1Z6EI0L+I:6E"PL+I:6EI:6EI4=' MW]_?>GIZ*KN[7EY>7EY>NUY>`P.9F9F9F9F9/3T]TM+2/3V9/3T]/3T]F9F9 MU-0@?\M+PV%A86%A80```0$!`0$!`0$!A'9VO`%24@$!`80!GG445U=;=76> MA`&>=<#`6Q175U=7HEM;!04%/CX[OK[0T"LK*RLK*RLK*RL!M)-04%#-*"@Y M'#DH*"@HS5!04).T555L;$T2Z.CHZ.C!P<'HZ-34U-34(-34("`@("`@((>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=0S2@HS5"TM+1556QL;!(2$A(2$A(2 M$A(2$A(2$A(2$DU-K)HPUM8GW@T-WB>?GX&!UM;6UM:;UM;6UM;6UM8D))N; MFSX^1$1E941$1.C!AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'[NXY65(<.0?NHVJ@H*Z(B!"V MMK80$!`0B(B(B*ZNH&J8)"0*@9\7]1>?"@H*"E%1S#>,]/3T]/3T]"DI*2DI M*2DI*2DIVBUDK/'Q[.SL[(>'AX>'AX>'AX>'AS&0D)"02R4E)4M+2TM+2TM+ MD&%A86$``7:\$Q,3$U%145%145%1S`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`YF9F9F9/3T]TM)Q<7%Q<7%Q<7%Q<=+2TCV9F9F9F9D# M7EZ[N[N[NUY>7EY>`P,#`P,#F9F9`P->7KN[N[LJ*GIZ>BHJ>GK?1T='1T=' M1T='I:6E1]_?>GHJ*BJ[N[M>`P.9F3W2TCT]/3W2TM)Q<7%Q&1EQ<7%Q&1FP ML+`9<7%Q<=+2TM+2TM+2SW_+2TN086$K`````````0$!`82$=KP3$[QVA`%2 MA%(!`812GG445U=;P'6>`0&>=3C`P%NB5U=7HA1;!04[.[Z^OKYA8=#0T-#0 MT-`K*P$!3+234%!0S2@H.1PY.3DH*"A04%"3M%4%;$T2$NCHZ.C!P<'!P<'4 MU-0@(-34U-34(-34U-0@((>'AX>'AX>'AX>'AX>'AX>'AX>'A[104"@Y*%!0 MM+2T555L;!(2$A(2$A(2$A(2$A(2$A(2$A+QK+.^UM:!)]X-#0W>WM[>GX'6 MUM;6UM;6@8&!UM;6)"0DFYL^/FMEIF5EIDW!P4T^AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'A^[N[I4< M4EGN[D9&:FIJH*Z($!"VMK80$!`0B(B(B*ZNH&IJ)"0*@9_U%Y^!"@H*46#, ME(ST*2DI*2DI*2DI*2DP*2DI*2DIVBTM9*SQ\?'Q\>SQ.,!;%*)7('\@("`@ MU"`@U-34U"!_R`)_`@)N;DLE8=```(*\$Q-145%145%145%@S`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`P,#F3T]TM(]/3W2 M/3T]F9D#`UY>7KN[NRHJ*BIZ>GHJ*KN[N[N[7EY>`YF9F9D]F9F9`UY>7EY> MN[N[N[N[*BHJN[N[*GIZ>GIZ>BHJ*BJ[NUX#F3T]/3T]TG%Q<7%Q&1D9&1D9 ML+!34U-3[>WM4U-34U-3L!D9&1D9&1D9&;"PL%-3S\_#86%A``""@KQV=E*$ MA':\$Q-VA`$!*]!A)25+O!-24H12>'5;5U<4P'5U>%*>=3@X.,`45U=7HA1L M!04[.SN^OB4E)6%A86%AT"LK`0%,#V>TM%!04%#-*"@Y.1PY*"C-4%"3DU55 M;&P2$A(2P<'!P<'!P<'!U-34U-34U-0@?W]_?W\@(""`ZH"'AX>'AX>'AX>' MAX>'AX=L556T4"@<*%!0M+2T555L;&P2$A(2$A(2$A(2$A(2$A(2$A+QKFJ^ MUM;6@2?>W@T-#0T-#=XGGX&!@8&!GY^!@8'6UM8D))N;/CZ@966FIDU-34U- M3<Z'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX?N[CD<=AP<,^[N!R0D:FJ@H*Z(M1"VMK80$!"(B(B(B*ZNH&J8 M)"0*@9_U%Y^!"@H*-S>4!O0I*3`P*2DI*2DI*3`P,"DI*2DI*=HM9*RL\?'Q M\?'Q\:Q9=E)XGNYU*V$E)9!+;DL"?R!_(-34("#(R`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`P,#`P,#`P->7KN[NRHJ*BIZ>GHJ*BHJ*BHJ*KN[7@,# MF9F9F9F9`P,#`P,#`P,#`P,#`UY>7EY>7EY>7@,#`P.9/3T]TM)Q<7$9&1D9 M&1D9&;"P4U-3[>WMBXN+-#3%Q30T-(N+BXN+B^WM[>WM[8N+B^WM[>V+BXLT M@,\E82LK`5)24@$!*RL!`7:\$Q,3O(0!`2O086%A8783$Q.\>'5;5U=76\!U MGH1XGG4X.,!;HE=75VQL;#L[.SL[2TLE)24E)6'0*RL!`0'M[5.TM+234%!0 M4,TH*"@Y'#DH*%!0D[15;&QL$A(2$A(2P<'!$A(2$M34U-0@(']_?W]_JH"` MJJJ`@`FJJJJJ"=2J@("`JLA7$FQL556T4"@Y*%!04+2TM%5L;&P2$A(2$A(2 M$A(2$N@2$N@2$MR(I)B>OM;6UH&?GR<G)][>W@T-WM[>WM[>GY^?GY^!@=;6 M)"2;FSX^/J"F@TU-34U-3<[.8X>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX<K*RM2')4<=AQ96>[N"B0D:FJ@H*Z(B!"V MMA`0$!"(B(B(KJZ@:FJ8)"0*GQ?U%Y^!"@K-S0:,C/0I,#`P,"DI*3`P,-HP M,"DI*2GT*2G:+62L\?'Q\?'Q\:QD+78',YYX4@&>J6$E2VY+`G\"?R`@U-1K M?\M+D&$E+2D&8%',-S<WS&!146#,E(STVBUDK/'L[.QHL;'O6EH%!<[.SL[. MSL[.SL[.8V-C8Y3UE)B8F)B8F&JDKJZNKHB(B(BNKHC<1D9&[N[N.3E9'!-V M=I4S,S,S,S-9$1%AOD2'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS$QQ,0QQ,3$9F9F M"PNEI4??WWIZW]_?>GIZ>M_?WWIZ>M]Z>GIZW]_?1T='1Z6E"PL+9F8+9F9F M9F9F9F9F9L3$Q&8+I:5'WWHJ*BJ[N[N[N[M>7EZ[N[N[NUY>N[LJ*BHJN[N[ M*BHJ*BHJ*BHJN[N[7EX#`P,#`UX#`P,#`P,#`P,#`P,#`YF9F9F9F3T]TG%Q M&1D9&;"P4U/MBXN+-#3%Q30T-#0TQ<5G9V=G#P]G9V=G9\7%Q<7%-#3%Q<7% M-#0T-,7%9V</#P\/3$Q,@,_`82LK*RL`=KP3$Q,3$Q,3O':$A`$!`0$!`0$! M`0&\$Q,3A"LEHE=7%,!UG@%XGG5U=<!;HL_/$FQL(3L[.SL[PTM+2R4E8=`K M*RLKT+"P&7$]M+2TM)-04%!0S2@H.3DY*"A04).T!6QL;!(2$A(2$A(2$A(2 M$N+4U"!_1JJJJC:JJC:JJFMNJJIN;FMN;LB`;L!;`A(2$FQL;%6T4"@Y*,U0 M4+2T5555;&P2$A(2$A(2$A(2$N@2$A(2N=RN:B0!OK[6UM;6@8&!@8&!@9_> MW@T-]?47%Q<7WI^?GX'6UB0D))L^/CX^IDWE34U-3<[.8V/EY8>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<K``%2O!.\=AP<'!Q2 M69\*)"2;:FJ@H*Z(B!"VMK80$(B(B(BNKJ"@:FHD)`J!GQ?U%Y^!"MG9S9?T M]"DI,#`P,##:VMHM+=K:VBDI](R,C"DIVBUDK/'Q\?'Q\:QD+2GT!@:\=G92 M4@'N=1&02TM_(-34U"!_`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`P,#`P,#F9F9F9F9F9F9F9D] M/3W2TG%Q<1D9L+"PL+"P4^V+BS3%Q6=G#TQ,3`\/9V=G9V</#TQ,3$Q,3$Q, M3`\/#V=G9V=G9P\/#P\/3$Q,3$Q,3$Q,3$R)B8F)ZL_`-A$1*X(3O':5E94! MA(2$A(2$A(2$`0$!`0$!`0$!O!.\A"LE;@+4`EO`J0$!GG5UP,!;HE?/$A)L M(2$A.SL";FY+)270T"LK*]!AL!EQTID#`[2TM+2TDU!04,TH*"@Y.2@H4).T M56QL;&QL$A(2$A(2$@4%!6QL;("JJC:JJFZJ-DLE)1$E86$EJB4E)24E)6QL M$A(2$A)L;%6T4,TY*,U04+2T5555;&QL$A(2$A(2$A(2$A(2$A*VW*YJ)(&$ M`9N;UM;6UM;6UM;6UM:!G]X7%_7U]?7U]?47GY^!UM8D)"2;/CX^/CY-Y>7E MY<[.SL[EY>7.SI.'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<3 M$Q,3$Q,3$[R\O+Q2'!SU%Y\*)"1J:J"@KJZ(B!`0MK80$(B(B*ZNH*!J:I@D M)`J?GQ?U%Y^?V=G9V9>7*2DI*2DP,-HM+2TM9"TMVBDIC(R,C(PIVBUDK*RL M\?'QK*QDVBGT!@8&C(P&E+R\`9ZI)6'#2W^]O;U:L6CL\63:])1@4<PWE)24 M-\Q@S#<&C/0IVBUDK/'Q[.S&L;'O$1$S``0$!,W-*"@H*"@H.3DY.3D<%Y0D M!E967'RS:FIJH*ZNKJZ(JD9&[NXY.3DY.3DY.3DS4G9V$Q-V4I654B=P2(.' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>',3'$Q,3$9@L+"Z6EI0L+"Z6EI4='1T='W]_?>GIZ>GIZ>GIZ>BHJ M*BHJ*BIZ>M_?W]_?WT='I0L+9L3$,3&',3'$Q&9F9F9F9F9F9L3$Q,3$Q,3$ M9F8+I4??WWIZ>GIZ>GIZ>M_?W]_?1T??W]]'1T='WWHJNUY>`P.9F9F9F9F9 MF3T]TM+2TM(]TM+2TG$9&1FPL%/M[8N+BXLT-,7%Q<5G#TQ,3$Q,3$Q,3$Q, M3$Q,3$Q,3$Q,3(F)B8F)B8F)B8F)B8E,B8F)B8F)B4Q,3$Q,3$Q,3$Q,3(F) M@&O`P#8K,Y5V=A.\=G:$A`$!`82$A(0!`0$!*RLK`0$!A!,3A"MA2P+4?TMA M*Y65J=G`6UM;HE<2$A+@X.#@X-3(`FY+)6'0T-!A2TO%-.U3L!EQ<7&TM+2T MM+104%#-*"@Y'#DH4%"T555L;&QL;!(2$A(2$A)L;&QY>?#I-DO986%A824E M874E)0<K*]!A)55556QL;!(2$A)L;%6T4%`H.2A04+2T5555;&QL$A(2$A(2 M$A(2$A(2$A*UH&HDU@&$`7B;FYN;UM;6UM;6UM;6@9^?WM[>WMX7%_7UWI^? M@=;6)"0DFSX^/CX^/DWE8V-C8\[.34W.SF-C8_`$)8>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'82LK*RLK*U)V$Q,3$[QV=G9VGQ?UGX$D)&IJH*"NKHB(B!`0 MMK80$(B(KJZ@:FJ8)"0D"I^?%_7U%Y^>GI[9V="7,"DI*2DP,-HM9&2LK&1D M+2GTC`8&!HST*=HM9&2LK*RLK&0MVBF,!@:,C(P&E&!1S(PI+:SL:.^]O;WO M:.SQK"WT!F!18,PWE)24-\S,S)2,]"G:+62L\?'L[,9HL>\V;MD1$3/P\/#P M*"@Y'!P<'!P<'!P<')\*"E9<7'Q\?'Q\:J"@I*Z`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`0$K*]#0 M*RLK*RN\`2MA;@+4R$MA*[QV`:,V6VMK;!(2$N#@X.#@U-3(`FY+)24E2VX" M86%A)<4TBXOM[>WMM+2TM+2T4%!0S2@H.3DH4%"TM`5L;&QL;!(2$A(2$A)L M;&QL;`55M&%A86%A*ZDK*P<KT&&TM+2T555556QL;!(2$A(2;&Q5M%`H'"A0 M4+2T5555;&QL$A(2$A(2$A(2$N@2$K6@/B0D@0&$>(>'/CX^FYN;FR2;UM;6 MUH&?GR<GG][>%_7U%]Z?@=;6UB0D))L^/CX^/CZ;Y6-08V-CY<[ESLX$8P10 M*"C086%A89!+2W_4U-34("!_?W_+2TO#D)`E)6$K`':\$Q.\@H0!`9_>]?47 MGPHD)&IJH*"NKHB($!"VMK80$(BNKJ!J:I@D)`H*GY^?%_7U%YZ>GGB>J:G0 MES`I*3`PVBUDK*RLK*QD+2GTC`8&!HST*=K:+2UD9&2L9&0M*?2,!@:,C(P& M-V!1-XPI+63LQN^]O5JQ[.RL+2F,S%%@S#>4E`8&E#<W-P:,]"G:+62L\>SL M[,:QL0D):S9NV1%9,U*7EY>7.1P<'!P<'!P<'#DW"E9<?'Q<FYN;?'QJJJJJ MJJJJ@("`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`YD]/3W2<1FPL+"PL+"PL+!34["P&1D9&1D9L+!3[>V+ M-#0T-,7%9P\/3$Q,3$R)B4Q,B8F)B8F)B8F)B<G)R<F)R<G)R<G)R<G)R<G) MR<G)R<G)R<G)R<G)R<G)R<F)B8F)B8F)B8F)B8F)@&LV6VNC65)V=G83$Q,3 M$[R\O'9V=H0!`2O086%A)24E2R4E)2MA2P+4R$MA*[QV`2MA)6ML;!(2+BXN M+N;FU-3(`@)N`@+(U-1A)4M+;@+(U$P/Q32+[555M+2TDU!0S2@H.1PH4%"T MM%4%;&QL;!(2$A(2$A)L;&QL;&P%5;2TM+2T4%"3M+2TM+23M+2TM%5556QL M;!(2$A(2;&Q5M%`H.2A04+2T5555;&QL;!(2$A(2$A(2$A(2M:`^)"36>(25 MAX>'ASX^/CZ;FYLDUM;6UH&?GY^?GY_>WMX-WMZ?@=;6UB0D))L^/CX^/CZ; M)"0D4"@H*.7ESLY08\W-*)>7[BLK86%A)9!+RW]_("`@U-0@(']_RTLE82LK M`5)V=@$K`=:!G][U]1>?"B0D:FIJH*"NB(@0$+:VMA`0B(BNH*!JF)@D)`J! MGY\7%_7UAX>>GGB>GJG0T)<P*3`PVBUDK/'Q\:QD+2GTC(R,C/3T*=K:VBTM M9&1D9"W:](R,!@:,C(P&S%%@E(PI+63QQN^]O5JQ[/%DVO248%',-Y0&!HR, M!I0WE(ST*=HM9*SQ[.S&:&BQ-C8V:VMK-C9NV1$SE783=E)9'!P<'#DY.3DY ME%9<7%Q<"@HDFQ'9[NXV-O"`@("`@("`@("JJJHV-C9NV1$1GPWA)PWAX8,Q M,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?$ MQ&8+"Z6EI:6E1T='1T='W]_?>GHJ*BJ[N[N[7KN[N[M>7EY>7EX#`P.9`UZ[ M*GK?W]]'1T='1]]'1T??W]]Z*BHJ*GIZW]]'1T>EI:4+9F9F9L0Q,3$Q,3'$ MQ,3$Q,1F"Z6EI4='1]]Z>BJ[N[N[7EX#`YD]TG%Q<1D9&1D9&;"PL+`9&1FP ML+"PL%-34^WMBXLT-,7%Q<5G9P\/3$Q,3$R)B8F)B8F)B8F)R<G)R<G)R<G) MR<G)R<D6%A86%A86%A86%LG)R<G)R<G)R<G)R<G)B8F)B8F)B8F)B8F)B8F) MSVLV:VNC6952!Y52=G:\$Q.\=E)2E3,'$=!A824E2TM+)24E86'02P+4R$MA M*W9V`=!A/WEY;&S3T]/32DK(U-34U-34U-3(U&$E2VX"?]34U,C(`FXT-(M5 MM+2TDU!0S2@H.1PH4%"TM%4%;&QL;&P2$A(2$A(2;&QL;&P%556TM+2T4%!0 M4%!04%!04%"TM%55555L;!(2$A(2;&Q5M%!0*#DH4+2T555556QL;!(2$A(2 M$A(2$A*UH#Z;/B36E0&'AX>'AX<^/CX^/IN;)-;6UH&?GY^?GY_>W@T-WMZ? M@=;6UM8D))L^/CX^/CX^)"0DUM;6*&-C8V-C8U"7*)>7[CD'`"LK*V$E89## M2\M_?W\@U"!_RTN0)6$K*RLK*RLD)-:!GQ?U%Y^!"B0D:FIJH*"NB(@0$+:V M$!`0B(BNH*!JF"0D"@J?GQ<7%_7UAX>'>`%XGIZIT"N7,"DPVBUD\?'Q\?&L M+=KT](R,]/0IVMK:VBTM+61D+=HI](P&!@:,C(R4S%',!O0I+:SLQN^]O5IH M[/%DVO0W46`WE`8&C(R,!I24!HST*=HM9/'L[&AHL;$'$=G9;FXV-FYNV1$1 M$3,S4G9V=G83=G924E(YEY=<7%Q6"@H'!P<'$9=&JJJJ@("`@("`@("`@(`) M":IK:Z#6@0WA)PWAH8.E"PL+9F9FQ#$QAX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX=F"Z6E1T='1T='W]]Z*KN[NUY>`YF9F3T]/3V9F9D] M/9F9`P,#`P,#7EY>N[LJ*BHJ*BHJN[M>7EY>NUY>7EX#`UZ[*BIZ>GK?WT=' MI0L+9F;$9F9F9F9F9F9F"PL+I:5'1T='1T='>GHJN[M>7@,#`YD]/=)Q<7$9 ML+!34U-34U.PL+!34^WMBXLTQ<5G9V=G#P],3$Q,3$Q,3$Q,3$Q,B8F)B8F) MB8G)R<G)R<G)R<G)R<G)R<D6%A86%A86%A86%A86%A86%LG)R<G)R<F)B8F) MB8F)B8F)B8F)B8F)B8F)SVLV:VNC696565E2=G:\$W92E3,S,S,S!P<'$0<' MT-#0*RLK`2L!`0+4R&YA*W9V*P0$/WF3>41$1$1$P6X"R,C(`FY+2TLKT-!A M)4MN`LC4U-3(`FX"`@("M+2T4%!0*"@H.1PHS5"TM%4%!6QL;&P2$A(2$A(2 M$FQL;&QL!56TM+104%!04%!04%!04%!0M+15555L;!(2$A(2;&Q55;10*!PH M4%"TM%55555L;&P2$A(2$A(2$HB@/CX^/M:>`8>'AX>'AX>'/CX^/CZ^OM;6 MUM:!GR>?GY_>W@T-WMZ?@8'6UM8D))L^/CX^/CZ;)"0DUM:!@8&!4"A0*%`H M*)<HESD'$2LK*RMA86%AD,-+RW]_(-0@?P)+D"5A83YJ)"0D)-:!G_7U%Y^! M"B0D)&IJH*"NB(@0MK:V$!"(B*ZNH*!JF"0D"@J?GY\7%_6'AX>'AP$!`7B> MT&'0ERDIVBUD\?'Q\?%D+=HI]/3T*2G:VBTM+2TM+2TMVBGTC`:4E`:,C(PW M8%$WC/3:9*SL:%J]O>]H[*QDVHPW46`W!@:,C(R,!@8&C(ST*=IDK.SL:+&Q ML=G9V6YN-C8V-C8V;FYNV=D1!UE965E965F54G9V=G924I5965E9!P>7EY=& MJJJJ@("`@*J`@("`@("`":H)KJ"^U@WAX0TGWH-'1Z6E"PL+"PMFQ,3$,3$Q MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>E1T??WWIZ*KN[N[M>`YD] M/=+2<1D9&1D9&1EQ<=+2TCT]/3T]F9F9F9F9F9D]/3T]/3W2TG%Q<7'2/3T] M/9F9`UZ[NRIZ1Z6EI:4+"PL+"PL+I:6EI4='1T??WT='1T='I4='1]]Z>BJ[ MNUY>`YF9/3W2<1D9L%-34U.P4U-3[8LT-#3%9V=G#P\/3$Q,3$Q,3$Q,3$Q, MB4Q,3$Q,B8F)B8F)R<G)R<G)R<G)R<G)R<G)R<G)R<G)R186%A86%A86%A86 M%A86R<G)R<G)R<G)R<G)R<F)B8F)B8F)B8F)B8F)SVLV:UO965E9E5E963F\ M$Q,3$Q,3O+R\=E)24I654I65,S,K`0$K*P'4R.D$S3DY*`0$>7F3IJ9-34TE M2R5A*P$!=G92.>[NT&%A)4L"`LC4U-34U,C(R,C(R+104%#-*"@Y.3DHS5"3 MM+15!05L;&QL$A(2$A(2$A)L;&QL!555M+104%!04%!04%!04%!0M+15555L M;!(2$A(2$FQL5;10S3DH*%!0M+2T5555;&QL$A(2$A(2M4-#H#L^OM9XAX>' MAX>'AX>'ASX^/CX^OM;6UH&!)R<GWM[>W@T-WMXG@=;6UM;6)"2;/CX^/CZ; M)"36UM:!@9^?@8&!UB@H*)<HESD165E9,RMA86%AD,-+2\M_(-34?TM+H*`^ M/CYJ)"0D)-:?WO7U%Y^!"B0D)&IJ:J"NKH@0MK80$(B(B*ZNH*!J:I@D)`J! MGY\7AX>'AX>'AX>'4E)XGM!AT)?:VBVL\?'Q\?%D+=HI]/0I*=K:+2TM+2TM M+2W:VBF,!I24E`:,C`8W46"4C"G:9*SL:%J]O>]H[/%DVHPW4<PW!@8&!@8& M!@8&C/3T*2UD\>S&L>_O"0D)"0D):VLV-C8V-FYN;N[NV1$'65E965E9E952 M4G9V=G9V=E)2.3F7ET:JJJJJ@("JJO"J@("`@("`$!"UKJ"^U@WAX0T-#8-Z MW]]'1T='I:4+"PL+"PMF9F9F9L3$,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?? MWWIZ*KN[7EX#F3W2<1D9L%-34U.PL!D9&1D9&1D9L+"P4["P&1D9&1D9&1D9 M&1EQ<1D9&1EQ<7'2TCT]F5Z[*GIZW]_?WWK?WT='1T??>GIZ>BHJ*BIZ>GK? MWT='1T??>GHJ*KN[7EY>`P.9F3W2<1FP4U-3[>V+BXLT-#0TQ6</#TQ,3$Q, M3$Q,3$R)B8F)3$R)B8F)B8F)B8G)R<G)R<G)R<D6%A86%A86%A86%A86%A86 M%A86%A86%A86%A86%A86%LG)R<G)R<G)R<G)R<F)B8F)B8F)B8F)B8G)R<G) MSVLV:VO965E94EF5E965O+R\O!,3$[QV4E)24E)24I65E965,S-96=#08>GI MS3D<*,T$>4WEY>5C*P$E8=`!65*\4I4S[D9&)4M+`G_(U-34U-34U-34U,C( MU,C44,TH*#DY'!PH*%!0M+2T554%;&QL;&P2$A(2$A)L;&QL;`6TM+104%!0 M4%!04%!04%"TM+15555L;!(2$A(2$FQL5;104"@<*,U04+2TM%5556QL;!(2 M$A*U#`Q#(2$[O@&'AX>'AX>'AX>'AX<^/CZ^OM;6UH&?)][>WM[>#0T-WMXG M@8'6UM;6)"0D)#X^/B0D)"36UM;6@8&!@8&!UM;6UM;6UN[N[A$1$1%A86%A M89##2W]_$!`0M8BNH*"@/CZ;)"0D)-:?WO7U%Y^!"@HD)"1J:FJ@KH@0MK80 M$(B(B*ZNKJ!J:I@D)`H*GY^'AX>'AX>'AX>'AX12`9[08267+62LK/'QK*QD MVBDI*2DIVMHM+2TM+2W:VMK:*?2,E#<WE`:,C`;,46`&]"DM9/'LL5J]O5JQ M[/%DVO0W46`WE`8&E)24E`:,]/0IVBUD\>RQ[VL)"<_/S\^`S\\)"0D):VMK MJC8V[NX'65E24G9V$Q,3=G924E*5E94Y.3F7EY=&JJJJJJJJJJJJJJJ`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`K*P$!=A-2,P<EJJJJ@,C4 MU-34U-34U-34U,C(R,@"`@)N;B@H.3DY'!PY*,U04+2TM+15!6QL;&QL;&P2 M$A)L;&QL!56TM%!04,W-4%!04%!04+2TM%5556QL;!(2$A(2$FQL5;2T4"@Y M*"C-4%!0M+1556QL;!(2$K4,M0Q#0SMPAX>'AX>'AX>'AX>'AX>'/CN^OM;6 MUH$GWM[>#0T-#0T-WMZ?@8'6UM;6UB2^OKZ^)"0D)-;6UM;6UH&!@8&!@=;6 MUM;6UM8D)"0D)"0D/CX^H*"@KHBU$!`0$+6(KJ"@/CXD)"0DUM:?WO47%Y^! M"@HD)"0D:FIJH*Z($+:V$!"(B(BNKJ!J:FJ8)"0*@8>'AX>'AX>'AX>'AX>' MA`&>T&$E1F2LK*RL9&0MVBDI]"DIVMHM+2TM+=K:VBDI]/2,E)24!@:,C)3, M4<P&]-HM9/'LL5J]O5JQQNQDVO0&S%%@S#<W-\S,-Y2,]/0IVBVL\>RQ60<1 MV=EN-FMK"<_/S\_/SX"`JJJJ-N[N!UE94G9V$W924EE965E963DY.3F7ET:J MJJJJJJJJJJJJJJJ(W-P0$!`0KJ"^@0WAX0T-)Z%>N[LJ*BIZ>GK?W]_?W]]' M1]_?WT='1T>EI0L+"PL+"V9FQ,0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<#/=+2<1FP4U/M[8N+-,7% MQ<4T-#2+BXOMBXN+BXN+BXN+[>U34["P4U-34["P&1D9&7%QTM+2/3T]/3T] MF9F9F0,#`P,#`P,#`P->7EY>N[N[N[LJ*BHJ*BHJN[M>7EZ[N[M>7EX#`YD] M<1FP4XN+BS3%Q6=G9P],3$Q,3$Q,B8F)B<G)R<G)R186%A86%LG)R186%A86 M%A86%A86%A865%145%145%145%06%A86%A86%A86%A86%A86%A86%A86%LG) MR<G)R<F)B8F)B8F)B8E,3$Q,3$R)B8E,B8F)B8F):VLV-FNC65*565F54I65 M4E)9!P=2E94S,P<'!P<E)=EN;F[(:PG/S\_/"6LV-C8V;F[9V24'!S,!=KR\ M$Q,3O(0!!R79JJJ`@(#4U-34U-3(R`)N;DM+2R4E2TLE)24Y.1P<'!PY*"A0 M4%"TM+15505L;&QL;&QL;&QL;&QL!;2TM%!0S2@HS5!04%!04+2T555556QL M;!(2$A(2$FQL556T4"@H.2@H4%!0M+15555L;&P20T,,#$,A.^&'AX>'AX>' MAX>'AX>'AX>'ASN^OM;6UN$GW@T-#0T-#=[>WB>?@=;6UM;6UM8D)"0D)-;6 MUM;6UM;6UM:!@8&!@=;6UM;6UB0D)"0D)#X^/CX^H*"NKHBU$!`0$+6(KJ"@ M/CXD)"0DUM:?WO47GY^!"@H*)"0D)&IJH*Z($+:V$!"(B(BNKJ"@:FJ8)"0* MAX>'AX>'AX>'AX>'AX>'AP&$>"O0849&9&1D9"W:*2GT]/0I*=K:+2W:VBDI M*2DI]/2,!@8&!HR,!I1@43>,]-HM9/'LL5J]O;WO:.RL+2F,-V!18&#,8&!@ MS)2,]"G:+62L[.QV=G924I59!P<'V=DV-FL)"8"`@*JJJC;N[NX'65E965)V M=G9V4E)2.3DY.9>7ET:JJJJJJJJJJJJJI*2NKJZ(B+40KJ"^@=XGX0T-X:$] M/9F9`P->7KN[N[N[*BIZ>GK?W]_?WT='1Z6EI:6E"PL+9L3$,8>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=Q M&1FP4^WMBS0TQ6=G9V=G9\4TB^WM[>WM[>V+BXN+[>WM4U-34U.PL+"PL+`9 M&1EQ<7%Q&1D9&7%QTCT]F9D#`P->7@,#`P,#F0,#7EY>7EY>7EY>`P,#`P.9 MF9F9F9D]TM)Q<1D9L%/M[8LTQ<7%9P\/3$Q,B8F)B8F)R<G)R186%A86%A86 M%A86%A86%A86%A86%A86%A86%A86%A94%A865%06%A86%A86%A86%A865%14 M5!865%145!86%A;)R<G)R<G)B8F)B4Q,B8F)B4Q,3$Q,B8F)B8F)B8F)B8F) M:VLV-FLV!Y52!P>54EE9E94'V=D'!Y4S!P<')279V6[(:PD)"0EKR,@V-F[9 M$0=965F54E*\=E*5E965E0$!`2O0)4O(@(#JZH#4U-3(`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` M@("JJJHV[N[N[N[N!P<'65E9E5(<'!P<'!P<'#DYEY=&JJJJJJ2DI&IJH*"@ MKH@0KJ"^@2<GX0T-X9S2TM+2TCT]F9D#`UZ[N[N[NRHJ*BIZ>M_?1T>EI:6E M"PL+"V9FQ,0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX<9L+!3[8N+-#3%Q<7%-#2+BXOM[>U34^WMBXN+BXOM M[>WM4U-3L+"PL+`9&1D9&1D9&1D9&1EQTCV9F0->7EY>7EX#F9F9F9F9`P,# M`P,#`P,#`YD]/=)Q<7%Q<7$9&1D9&;!3[8N+-#0T-,5G9P],3(F)B8F)R<G) MR186%A86%A86%A865%145%145%145%14%A86%A86%A86%A86%A86%A86%A86 M%A86%A86%E145%145%145%145%06%A86%A;)R<G)R<F)B8F)B8F)B8F)B8F) MB8F)B8F)B<G)R<G)R<G):VLV-J);V0<'V=F5E0<'65D'V=G9!]G9V1$')279 M;LAK"0EK:\AN;MG9V1$'69524G9V=G924I4S!P<1!R79V6[(`LC4ZL_/"<@" M;DLE)25A86'0T"LK`0$!`0&$A(2$A(0Y.3DY*"A04%"3M+2T504%;&QL;&QL M$FQL;&Q5M+2TDU!0S2@H*"C-4%!0M+2T5555555L;&P2$A(2$FQL556T4,TH M'"@HS5!0M+15555L;#L[.R$ATTB'AX>'AX>'AX>'AX>'AX>'AX>'AX>'A];6 MUN'>#0T-WM[>WB<G)Y^!@=;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6 MUM;6)"0D)#X^/CX^H*"@H*ZNB+6U$!"V$+6(KJ"@/CZ;)"0D)-:?%_7>GX$* M"@HD)"0D)&IJH*"NB!"VMA`0B(BNKJZ@H&IJF(>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>54@$K*Y<MVMHI*?3TC/3T]"DIVBDI]/3T]/0I*?3T]/3TC(P&-V!1 M8)2,]-HM9/'LL5J]O;U:L>SQ9-HIC)3,45%145%@S)3T*=HM9*SN$0<'!P<' M!P<'63.5=G9261&CJJJ`@("`JJHV-N[N[N[N!P<'!UE969>7EY<Y.3DY'!P< M'#F7EYB8:FIJ:IB8:FIJH*ZVB*"^@2?>X0T-X0T9&7%Q<7'2TM+2/3V9F0,# M`UY>7KN[*GIZW]]'1Z6EI:4+"PMF9F9F9F9FQ,0QAX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<9&1FP4^V+BXN+BXN+BXN+ MBXOM[>WMBXN+B^WM4U-34U-34["PL!D9&1D9&1D9&1D9&7%QTCT#`UY>7KN[ M7EX#`YF9F9F9`YF9F9F9F9D]/=)Q&1FPL+"PL+"PL%-34U-3[8LT-,7%9P], M3$Q,B8F)B<G)R<G)%A86%A86%A86%A945%145%145%145%145%145%145%14 M5%145%145%06%A945%145%145%145%145%145%145%145!86%A86%A;)R<G) MR8F)B8F)B8F)B8F)R<G)R<G)R<G)%LG)R<D6%A86:VO9HZ)K==G9V=F5E0<' M!P?9V=G9V=G9V:EUP&L)"0EKR&YN;MDE)0<1,Y5V=E)2E5E965E9!Q$EV6XV MR&L)SPEK-FYNV39NV1$1!UE9`0$!`0$!A':\O+R\O+P3$Q.\=H2$.2@H*,U0 M4%"TM+15!04%;&QL;&QL$A)L;`55M+2T4%!0S2@H*"@H4%!0M+2T5555555L M;&P2$A(2$FQL556T4,TH'"@HS5!0M+15556^OKZ^(2%*AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX?6X2?>#0W>WM[>)R<G)Y^!@=;6UM;6UM;6UM;6UM;6 MUM;6UM;6UM;6UM;6UM;6UM8D)"0D/CX^/J"@H*"@KJZ(M;6U$!"V$+6UKJ"@ M/CX^:B0D)-:?]1>?@0H*)"0D)"0D)&IJH*"NB!"VMA`0B(BNKJZ@H&J'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX03A"LKERDI]/2,C(ST]"DI*2GTC(R, MC/3T*2DI]/3T](R48%%1-P:,]"DM9/'LL5J]O;U:[\;L9"TI]`8W8%%145%1 MS`;T*=HM!P<'EY>7*"@H$1$1!P=94G9V6>ZCJJJ`@("`JJHV-C;N[N[N[NX' M!UE9.3D<'!P<'!P<'!P<'&#,E`8DF)B8F"0DF)AJ:J`0M:"^UB?>)PT-<`T9 M&1D9&7%Q<7%QTM+2/3V9F9D#7EY>7KN[*BIZW]]'1Z6E"V9FQ,3$Q,3$Q&;$ MQ,0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<9 M&;"P4U-34^WM[8OM[>WM[>WM4U/M4U-3L+`9&1FPL%-34U.PL+"PL+"PL+`9 M&7'2/3V9F9F9F9F9F9F9F9D#`YD#`P.9F9F9F9D]TG$9&;"PL+"PL+"PL+!3 M4^WMBS0TQ<5G9P],3$R)B8F)R<G)R<G)R186%A86%A86%E145%145%145%14 M5%145%14DI*2DI*2DI)45%145%145%145%145%145%145)*2DI*2DI*25%14 M5%14%A86%A86%LG)R<G)R<G)R<G)R<G)R<G)R<G)R186%A86%A86%A86%A86 M`FO9H\^B-J/9-MF54ED'!]G9V3;9V=FCV:FI=117HF[9)1$'!S,SE5)V=I59 M!P<1!P<'!^[N[J-N-LAK"<\):S9NV24'!P?N[NX'69654H12`0&$=KR\$Q,3 M$Q.\A`$K*]#0*RLH4%!04+2TM%4%!6QL;&QL;&P2$A)L;&Q5M+2TDU!04"@H M*"C-4%!0M+2T5555555L;&P2$A(2$FQL556T4,TH.2@HS5!0M+1554B^2-,N MTX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'X2?>#0W>WM[>)R>?GX&! MUM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM8D)"0D/CX^H*"@H$.N MKK6(M;40$!`0$+6UB*Z@H#X^/FHD)-:?]=Z!"B0D)"0D)"0D:FIJH*"NB!"V MMA`0B(B(KJZNH(>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'$W:\`3DI M]/2,C(ST]"DI*?3TC`8&C/3T*2DI]/3TC`;,45',E(ST]"DM9/'LL5J]O;V] M[VCLK"W:](R4S&!145%18)3T*0<'!UE9EY>7EY<H!P<'65F5=G926>[N-JJJ M@("`@*JJJC8VH^[N[@<'!UDY.1P<'!PY.3F7.6!1]?51S#<W!@8D"@H*)"0D M)*`0M:"^UMX-)PT-<.L9&1D9&1D9&1D9<7%Q<=+2TCT]F9D#7EZ[*BHJ>M_? M1T>EI0L+9F;$Q#$Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX<9L+"PL%-34U-34U-34U-3L%-3L+"PL+"P&;!3[>WM MBXN+BXN+BXOM4U.P&7'2TM+2/3V9F9F9F9F9F9D#`UZ[N[M>`P.9F3T]/=)Q M&1D9&1D9L+"P4U/M[8LT-,5G9V</3$Q,B8F)B8G)R<G)%A86%A86%A86%A86 M%A86%A86%A86%A945%145%14DI*2DI*2DI*2DI*2DI*2DI*2DI*2DI*2DI*2 MDI*2DI*2DI*25%145%145%06%A86%A86%A86%A86%A86%A86%A86%A86%A86 M%A86%A86%A865%145%145&NIH\_/6S8V-MF54I4'!]DV-C;9V=DVV:FI=5M7 M5ULX=0<1!P<SE783=I4S!UD1!^[N[N[N[NZC;FXVR`G/SVMKR#8V;F[9H^[N M!SDY694!`5)VO!,3O':$`0$K*]#0T-#0T"LK4%"3M+2T504%;&QL;&QL;&QL M$A)L;&Q5M+2TM%!04%#-*"A04%"TM+2T5555555L;&P2$A(2$FQL556T4,TH M.2@HS5!0M+152$I*T].'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX<-#0W>WMXG)Y^!@8'6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6 MUM8D)"0D/CX^H*"@0ZZNM;6UM1`0$!`0$+6UB*Z@H*`^/CXD)-:?]9^!"B0D M)"0D)"0D:FIJH*"(B!"VMA`0B(B(B*ZNAX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'`1.$.?2,C(ST]"DI*?2,!I24!HST]/3T]/3TC)1@4<PW M!HST*=HM9/'LL>^]O;V][VCLK&3:*?2,E,Q@45%143>,!P<'!UE9EY>7EY>7 ME9524G9V=E)960?NHS:JJJJJ@("`JJHV-J/N[N[N!Y<Y.1P<'!P<63>4-V#U M41<78%$78)^?GY^?"B0D)*`0M:"^U@T-W@T-X;`9&1D9&1D9&1D9&1D9&7%Q M<=+2TM(]/9D#7EZ[*BIZW]]'1T>EI0L+9L3$Q#$QAX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<9&1FPL+"P4U-34U-3L+"P ML+"PL+`9L+!3[>V+BXN+-#0T-(N+[>U34[`9<=+2TM+2TCV9F0->7EY>7EY> MN[M>`YD]/=+2<7%Q&1D9&;"PL+!34^V+-,7%9V</#TQ,3$Q,3(F)B8F)R<G) MR<G)R<G)%A86%A86%A86%A86%A86%A86%E145%145))4DI*2DM75U=75U=75 MU=75U=75U=75U=75DI*2DI*2DI*25%145%145%145%06%A86%A86%A86%A86 M%A86%A86%A945!86%E145%145%145%145%145%145%L'H\_/6ULV-ME9E5)9 M!]DV-C8VV38VV=FI=5M75Q3`.'5UGIZ54G9V4I4S!UD'$>[N[N[N[N[N[FXV MR&L;S\_/SPD):\@V;C;N[NXY.3E9,Y52=A.\=H0!`2LKT-#0T-#0*P````"T MM+15!05L;&QL;&QL;&QL$FQL;&Q5M+2TM+104%!04%!04%"TM+2T5555555L M;&P2$A(2$FQL556T4,TH'"@HS5!0M'!$1$K!AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'#=[>WB<GGX&!@=;6UM;6UM;6UM;6UM;6UM;6 MUM;6UM;6UM;6UM;6UM;6UM;6)"0D/CX^H*!#KHBUM;6U$!`0$!`0$+6UB*Z@ MH*`^/FHD)-;>]9_6)"0DFVIJ:FIJ:FIJH*Z(B!"VMA`0M8B(B(>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'`0$!=G8YC(ST]/0I]/2,E,S, ME`:,C(R,C(R,!LQ18#>4C/3T*=HMK/'LL>^]O;V]6K'LK&0MVBGT!C=@45%1 M479V$Q,3$W9V=G9V=G9V=G9V=G92E5E9!P?N[NZC-C8VJJJJ@("JJJHV-J/N M[I<Y.1P<45%@S)24-U%18%'U]?7U]?47%Q<7@20D)*`0M:"^U@T-W@T-X;"P ML+"PL+`9&1D9&1D9&1D9&1D9<7%Q<=+2TCV9F9D#7KN[*GK?W]]'I0L+9F9F M9L0QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<9 ML+!34^WM[>WM[5-34U-34U-34U/M[>WMBXLT-#0T-#0T-(N+[5.P&1D9&7'2 MTM(]F9D#`P,#`P,#7EX#F3W2TM)Q<1FPL+"PL%-3[8LT-#3%Q<5G9P],3$Q, M3$Q,3(F)B8F)R<F)B<G)R<G)R<G)R<G)R186%A86%A86%A86%A86%E145%22 MDI*2U=75U=75U=75U=75U=75U=75U=75U=75DI*2DI*2DI*25%145%145%14 M5%145!86%A86%A945%145%145%145%145%145%145%145%145%14DI*2DI*2 MDI)9-J+/6VLV-MD'!U*5!]DV-C8V-C8V-MG9=5NB5Z);P'5UJ9YX`5*\=G92 M4I5960<'[N[N[J,VJJK(:VL)"1O/S\\):\ANV27N[CDY.5E94E)2=A-V=E*5 M`0$K*RLK*RLK86%A86%A854%!6QL;&QL;&QL;&QL;&QL;`55M+2TM+2TM%!0 M4%!04+2TM%555555555L;&P2$A(2$FQL;%6T4%`H'"@H*,U09:9$AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?>WB<G@8'6UM;6 MUM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM:!@=;6UM;6UB0D/CZ@H$.NM;6U MM1`0$!`0$+80$+6UB*Z@H*`^/ILDUH'>]9_6)"0D:FIJ:FIJ:FJ@H*Z($!"V MMA`0$(B(AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?9$1$1$5E965DS`81V M=G9VO#F,]/3T](R4S&!@S#<&!@8&!@8&E,Q18#<&C/0IVBUD\>SLL>^]O;V] M6K'L\60M+2GTC)3,4783=E(S65D'!P=965E965E9!P<'$1$1[N[N[N[N[N[N M[N[N[C8VJJJ`@*JJJC8V1I>7!LQ1]5%@-Y24S%%18&!146"?GV`7]?7UGR0D M)*`0M:"^U@T-#0T-L+"PL+"PL+"PL+"PL+`9&1D9&1D9&1D9&1EQ<7%QTM(] M/9D#`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`0%2A(0!4E*565D'[N[NHS8VJJIK:PD)S\_/S\\):\@V;B4' M[CE9'!P<=A-V=E(S65D'$1$1V=EA86%AD,-+2TM+R\O+!6QL;&QL;&QL;&QL M;&QL;`55M+2TM+2TM+2TM+2TM+2T5555555556QL;!(2$A(2$FQL;%6T4%`H M.3DH**'DR&L)AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'WB>?@=;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UH&!@8'6 MUM;6UB0D/CZ@H*ZUM;6U$!`0$!`0MA`0$+6UB*Z@H#X^FR0DUI\7%Y_6)"1J M:FIJ:FIJ:FJ@H*Z($!"VMA`0$(>'AX>'AX>'AX>'AX>'AX?N$1$1$1$1$1$1 M$1$165DSE79V=G9V=G9V4E)VO+R\'(R,C)0W8%%146#,E#<W-S<WS%%1S)2, M]"G:+62L\>S&L5J]6EI^L1TBK&0M,#`IC%99E5)V=E*560<1V=G9V=G9V=G9 MV=EN;C8VJJHV-C8V-C8V-C8V-JJJJJJ`@*JJ-MFL9-KT!F!1]5',-Y24S%%1 M8,S,-S<&!C>?%Q<7GR0D)*"U$*`^U@T-#0T<4U-34U-34U-34U-34U.PL+`9 M&1D9&1D9&1D9&1D9&7%QTM(]/9D#`[N[*GIZWT>E"PL+9L0Q,8>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>+BXN+BXN+[>WM[>WM[8N+ M-#0T-#0TBXN+BXN+B^WM[>U34[`9&7%Q<=+2TM)Q<=+2<7%Q&1D9&1D9&1D9 ML+"PL+!34U-3[8LTQ6=G#TQ,3(F)B8F)B8F)B8F)B8F)B8F)B8F)B8F)B8F) MB4Q,3$Q,3$Q,3(F)B8G)R<G)%A945)*2DM75U=75U4)"0D)"0D)"0D)"U=75 MU=75U=75U=75U=75DI*2DI*2DE145%145%145%145%145%145%145%145%14 M5%145)*2DI*2DI*2DI*2DI*2DI*2DI*2DI*2DE145%14T*+/HFLVH]G9V=E9 M6=DV-MG9V38V-C8V-EL45U>B%%LX=9YX`0%2A(2$`7AXG@?9V38VJJJJJJJJ M:PG/S\_/S\_/SPEKR#9N)>XY.1QV'%)960<1$=G9;C8V;FYN`@("R,M_?W\@ M("!_?W\%!04%!6QL;&QL;&QL!555M+2TM+2T5;2TM+2TM%5555555555;&QL M;!(2$A(2$FQL;%6T4%`H*#GK;C9K"0D)"0EKR&YN)1$SE783$Q-VAX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>!UM;6UM;6UM;6UM;6UM;6UM;6UM;6 MUM;6UM;6UM;6UH&!@8&!UM;6UB0D/J"@KK6UM1`0$!`0$+80$!`0$+6(KJZ@ MH#Z;)"36@=[UWI_6)"1J:FIJ:FIJ:FJ@H*Z($+:VMA"'AX<."0EK:S8V-F[N MV>[NV=GN[A$1$1$S65E9,Y52=G9V=I4S65F54E)V=G9V=G9V$Q.\-\Q@45%1 M45%1S,S,S,S,8%%@-Y2,]-JS+62L\2+L:+%^6EI^L1TB\:PMVC`P[A$'65)V M=E)960<1V=EN;C8V-C9N;FYN;NZJJJJJJJJ`@("`@("`@("`@*JJJFC&[/&L M9-KTE&!146`WE`:4S%%1S)0&!@:8F`8*GY\7GR0D:J"U$*`^UM[>W@U34^WM M[>WM[>WM[>WM[>WM4U-3L+"P&1D9&1D9&1D9&7%Q<=+2TCT]F9D#7EZ[*BIZ MW]]'I0L+9L0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>' MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?M MBXOM[>WM[5/M[>WM[>V+BXN+BXN+BXN+-#0TBXN+[5-34[`9&1D9&1D9&;"P ML+"P&1D9&1D9L%/M[>WM[>WM[8N+-,7%9P],3$R)B8G)R<G)R<G)B8F)B8F) MB8F)B8F)B4Q,3$P/#P\/#P\/9V=G9V</3$R)B8F)R<D6%E22DM75U=75U=75 MU4)"0D)"U=75U=75U=75U=75U=75DI*2DI*2DI*25%145%145%145%145%14 M5%145%145%145%145%145%145)*2DI*2DI*2DI*25%145%145%145%14%E06 M%A86%EO/HFLVV=G9V=D'E=DV-MG9V38V-C8V-EL45U=7%!3`=:F>>`$!4H2$ M`7AXGG5U.,#`JJJJJJJJR&L)"<_/S\_/S\\):\ANV=D'65D<=APS61$'$1'9 MV6XV;FYN;FYN;@("R&MK?W]_RTM+2P4%!6QL;&P%!04%>7F3D[2TM+155555 M5555555555555555;&QL$A(2$A(2$FQL556TM%#-ZQ'9;C9K":H)"0EK`FXE M$3-2=A-VE3,S,S,S,S,1$1$1*RLK*P%24E)2``&'AX>'AX>'AX>'A];6UM;6 MUM;6UM;6UM;6UM;6UH'6UM;6UM;6UM;6UM:!@8&!UM;6UB0^/J!#KK6U$!`0 M$!`0$!`0$!`0M;6(KJ"@/FHD)-:!GQ?UGX'6)"1J:FIJ:FIJ:FJ@H*Z($+:V M$#9K"0D)SPD):S8V;MG9$>X1$1$1$1$165DSE5)V=G9V=G9V=I65E3.54G9V M=G9V=G9V=G9V=G9V8,S,S,Q145%145'U]5%@-U:,,-IDK/$B[.P=:.]^6EI^ ML6@=(O%D[A$1$5E9,U)2=G92E5E9!P<1V=GN;J,V-FYN-JJJJJJ`@.J`@("` M@*JJJJK&:&BQL;'&[/&L9-KTE%'U4<R4!@:4-U%1-P:,F)B8F)@D"I\7GR0D -------- End of part 9 of 14 --------
2
comp.os.ms-windows.misc
Christian: washed in the blood of the lamb. Mithraist: washed in the blood of the bull. If anyone in .netland is in the process of devising a new religion, do not use the lamb or the bull, because they have already been reserved. Please choose another animal, preferably one not on the Endangered Species List.
19
talk.religion.misc
Sounds like the picture tube lost vacuum. This would cause the filament to ignite and could actually turn the tube from a vacuum to a pressure vessel, followed by an explosion when the neck assembly (mostly likely cracked to begin with) blows off. During the whole sequence of events, the other circuits may continue functioning, which accounts for not losing sound.
12
sci.electronics
I would like to sell my dot matrix printer so I can upgrade to inkjet. It is a "Panasonic KX-P1124 24 pin Multi-Mode Printer". Here are the stats (from memory and the manual): - 360x360 dot-printing for hi-res graphics, etc. - VERY fast (up to 192 cps) printing in "printer-controlled" (as opposed to Windows driver-controlled) printing - Bidirectional printing for faster processing speed - 5 fonts ("courier","prestige","bold ps","script","sans serif") - Epson LQ-2500 and IBM Proprinter X24 printer emulation - Can accept single sheets, envelopes, and 3 non-carbon copies by friction feed - Front or bottom paper feed - 6KB buffer I will send a sample document and a printed GIF/JPEG file to anyone who wishes to send a SASE. With purchase (prepaid, please!), I will include the following accessories: - Manual - cable (Centronics) - remaining stack of tractor-fed paper (about .4") - FREE copy of Windows printer driver (unless this is illegal, or if it is included with Windows) - FREE unregistered DOS shareware program ($2 registration, I think) that apparently offers some word processing capabilities from DOS The last two will be on a disk (either size). I am asking for around $165, but I am open to any (reasonable) offers. I am a college student, so I cannot afford to buy a new printer without getting a considerable portion of the money from this printer. This price includes all above items, and shipping (probably UPS) is included as well. I have the original box, but only one of the original Styrofoam end pieces. I will use a towel on the other end (you get a free towel too!!). Worked fine getting it here. The whole shebang might not fit in the original box; I will figure this out after the offers come in. Email any questions and offers. -Jon.
6
misc.forsale
14
sci.space
While others here may have had better experiences, I, too, share the sentiments posted above. Though I have the original Stealth/VRAM, it is only "relatively" recent that the Windows drivers for this card have evolved to a point of decent performance. Note that there are STILL a couple of modes I cannot use (ie. will not) due to shadowing, mis-drawn check boxes, etc. I believe the version I have is 2.01. If there's a more recent release, I'd appreciate if someone would drop me a note to let me know -- I haven't been able to get on their BBS lately to check again. Naturally, Diamond doesn't even bother notifying me of fixes/releases. Diamond was helpful when I finally reached the "right" person in curing some of my Windows' problems due to an address conflict. The conflicting addresses (2E0, 2E8) were OMITTED in at least my version of the Diamond/VRAM manual. I hope it has been corrected by now. The tech rep explained that ALL S3-based boards use these addresses. I have not confirmed the validity of that statement. When I upgrade my motherboard in the near future (hopefully with some form of local bus), I'll seek a video solution from someone other than Diamond. Lance Hartmann (lance%hartmann.austin.ibm.com@ibmpa.awdpa.ibm.com) Yes, that IS a '%' (percent sign) in my network address.
3
comp.sys.ibm.pc.hardware
BO JACKSON 1963 1988 KCR 437 106 16 4 23 28 29 7 .253 67 .243 .288 .455 1989 KCR 517 134 19 5 33 41 27 10 .274 92 .259 .314 .507 1990 KCR 405 110 17 1 27 44 16 9 .286 77 .272 .343 .519 1991 CWS 71 16 3 0 3 12 0 1 .240 10 .225 .337 .394 MAJ 1430 366 55 10 86 125 72 27 .270 246 .256 .316 .489 MAJ 598 153 23 4 36 52 30 11 This is what Jackson looked like in 88-91, with everything converted to a neutral park, on the basis of run production. His equivalent average started at .253 in 88, was up to .274 in 89 and 286 in 90. So let us say he had established, in his last two seasons, a .280 level of play. That is good. Very good, in fact. But it probably doesn't make the top ten in the league. The 10th best EQA in the AL in 1992 was Dave Winfield's .296; Thomas was first at .350. First in the NL was Bonds, an incroyable .378; tenth was Bip Roberts, .297. But .280 is better than any season in the past five years by Joe Carter; it is about what Mattingly had in 1988 (.285); what Felix Jose had the last two years; just ahead of Time Raines' five-year average; better than Ryan Klesko's MLEs. He got more attention from the media than was warranted from his baseball playing, though; his hype was a lot better than his hitting. That is the basis for the net.comments about him being overrated. The media would have you beleive he was a great hitter. I think he was a good, maybe very good hitter. He was IMO, something like the 30th best hitter in the majors.
9
rec.sport.baseball
I have a toggleButton widget (yes widget) and I have a routine which changes the color of the foreground and background of the label. Well, the background changes alright, but the label text does not redraw itself. I am guessing that I have to force it to redraw with an XExposeEvent sent to it via XSendEvent. Is this the best way to get the text up again? I can't seeem to get XSEndEvent to work right.... if this is a good approach, might anyone have an example lying around to show me how to do this? I've RTFM all evening and did not find a decent example. PS I keep getting Segmentation Faults in XSEndEvent, tho all the values are as expected. Thanks in Advance
5
comp.windows.x
13
sci.med
I'm interested if anyone out here can point me towards a review of the following book in any scholarly Christian journal, whether it be conservative or liberal, Protestant or Catholic. _The_Lost_Years_of_Jesus_ (documentary evidence for Jesus' 17 year journey to the East), by Elizabeth Clare Prophet. Supposedly this is a theory that was refuted in the past, and she has re-examined it. I thought this was just another novel book, but I saw it listed as a text for a class in religious studies here. Also, the endorsements seem to come from some credible sources, so I'm wondering if scholars have reviewed it (or anyone on the net, for that matter).
15
soc.religion.christian
I use the Diamond SpeedStar 24X in 1024X768X256 mode all of the time. I have NOT found distortions in the cursor. The cursor is a little jumpy from time to time (due to 32 bit access to the swap file), but it is never distorted.
2
comp.os.ms-windows.misc
COMMERCIAL SPACE NEWS/SPACE TECHNOLOGY INVESTOR NUMBER 22 This is number twenty-two in an irregular series on commercial space activities. The commentaries included are my thoughts on these developments. Sigh... as usual, I've gotten behind in getting this column written. I can only plead the exigency of the current dynamics in the space biz. This column is put together at lunch hour and after the house quiets down at night, so data can quickly build up if there's a lot of other stuff going on. I've complied a lot of information and happenings since the last column, so I'm going to have to work to keep this one down to a readable length. Have fun! CONTENTS: 1- US COMMERCIAL SPACE SALES FLATTEN IN 1993 2- DELTA WINS TWO KEY LAUNCH CONTRACTS 3- COMMERCIAL REMOTE SENSING VENTURE GETS DOC "GO-AHEAD" 4- INVESTMENT FIRM CALLS GD'S SPACE BIZ "STILL A GOOD INVESTMENT" 5- ARIANE PREDICTS DIP IN LAUNCH DEMAND 6- NTSB INVESTIGATES PEGASUS LAUNCH OVER ABORTED ABORT 7- ANOTHER PEGASUS COMPETITOR IS ANNOUNCED 8- GEORGIA LAUNCH SITE DROPPED FROM PLANNING 9- SPAIN'S CAPRICORNIA LAUNCHER STILL PROCEEDING 10- PACASTRO SIGNS LAUNCH RESERVATION WITH SWEDISH SPACE CORP 11- CHINA AND TAIWAN JOINT SATELLITE VENTURE REPORTED 12- SOUTH KOREA ANNOUNCES NATIONAL MOVE INTO SPACE TECHNOLOGIES 13- SPACE TECHNOLOGY INDEXES THROUGH MARCH FINAL NOTES ARTICLES -------------------------------------------------------------------- 1- US COMMERCIAL SPACE SALES FLATTEN IN 1993 The US Department of Commerce projects US commercial space sales will remain flat in 1993, with current data showing only a 2 percent growth over 1992. As published in "US Industrial Outlook 1993" (which was released in January), revenues from the 1993 US space business are currently projected to be about $4,890 M. In contrast to previous years when US commercial space sales had shown double digits growth rates, this year's projected results are driven by the US satellite manufacturing industry, where sales are projected to drop from 12 satellites worth $1,300 M in 1992 to 7 satellites worth $ 670 M in 1993. The US Industrial Outlook also projects U.S. commercial launchers faces flat demand in coming year, and while predicting that 1993 revenues will increase 10 percent to $450 M, future sales will be "adversely affected by the downward revision in Department of Defense launch plans." Offsetting flat launch revenues and satellite deliveries, revenues for fixed and mobile satellite services are projected to increase to $1,900 M, primarily driven by increased revenues from broadcast and cable TV networks. Similarly, remote sensing products and sales are projected to increase to $250 M in 1993 (up 15%). US COMMERCIAL SPACE REVENUES 1989 1990 1991 1992(r) 1993(e) Commercial satellites 900 1,000 1,100 1,300 670 Satellite services 750 800 1,200 1,500 1,900 Fixed (700) (735)(1,115)(1,275) (1,520) Mobile (50) ( 65)( 85)( 225) ( 380) Satellite ground equip 790 860 1,350 1,400 1,560 Mobile equipment (40) (85) (280) (352) ??? Commercial launches 150 570 380 450 450 Remote sensing data and services 125 155 190 215 250 Private microgravity research lab -- -- -- -- 60 ===== ===== ====== ===== ===== TOTAL ANNUAL REVENUES 2,715 3,385 4,220 4,815 4,890 (r) = revised data for 1992 (e) = estimated data for 1993 [Commentary: This is the first look at how the US commercial space industry is expected to do in 1993. In general, not a bad report -- with most of the bad news concentrated in the satellite manufacturing area. There, changes of only a few satellites worth $100 M or so apiece can substantially influence the annual projection. If we look forward over several years, this market sector should retain strong sales as US firms have been very successful in regaining international market share in the satellite business. Furthermore, sales of satellite ground equipment should go up in the next revision of this data, expected to be released about mid- year. Data on mobile satellite ground equipment sales (including such items as GPS receivers and portable satellite terminals) appears to be missing from the January data set. DoC usually publishes a listing of "Space Business Indicators" in mid-year, and the next revision of commercial space revenues should be released then. I expect the revised revenues should easily top $5,000 M, if the mobile satellite ground equipment are added back into the numbers, and the year should show about a 10% overall market growth. Looking beyond this year's data, future markets look quite promising. The DoC projects satellite service revenues could top $3,000 M by 1995 if new mobile satellite services and direct broadcasting are implemented as planned, and that mobile satellite station sales are expected to continue to growth at 15-20 % per year through the mid 1990's. My numbers are somewhat more pessimistic for near-term market growth, but I agree the trend should be for substantial growth in US commercial space sales over at least the next 5-10 years. (My pessimism is due to more conservative assumptions on market capture and growth in LEO communications and satellite direct broadcasting services. I don't believe all of the current players in the yet-to-be-born LEO communications satellite market and in the yet-to-be-proven direct broadcasting market will be financial successes, nor that sales growth will be as explosive as currently projected.) It should also be noted this year's DoC data is the first release to show revenues from privately funded microgravity research facilities. The $60 M shown in the Janurary data is primarily for the Spacehab module, planned for launch in April on the Space Shuttle, but also hidden in these numbers are the projected first sales from the COMET orbital launch and recovery experiment module.] 2- DELTA WINS TWO KEY LAUNCH CONTRACTS McDonnell Douglas Corporation, which builds and markets the Delta launch vehicle has won two important launch contracts. Motorola Inc. announced in mid February that it had selected the Delta to launch most of the satellites in the 66-satellite Iridium LEO communications constellation, and in mid April, McDonnell Douglas was awarded the USAF Medium Launch Vehicle III contract. The launch services contract with Motorola for the Iridium constellation launch is for at launch of least 45 Iridium satellites. Another 21 satellites have been contracted to be launched by Khrunichev Enterprise in Russian on 3 Proton vehicle launches. These 45 satellites planned for the Delta will be launched 5 at a time, providing for at least 9 launches. Additional satellites in the Iridium constellation, such as a planned on-orbit spares, may also be launched on Delta. Although details of the launch services contract were reported to be negotiation, and not yet final. The USAF MLV contract also went to MDC, bidding a variant of their Delta II launcher. This contract is only initially worth $7.5 million, but establishes a set of launch options for up to 36 launches, encompassing launches from 1996 through 2002. These launches will deploy the next generation of the USAF's Global Positioning System Block IIR navigation satellites, plus other programs. First option for to meet the USAF launch options is expected to be exercised this year, after which the USAF is expected to request launches of up to 6 Deltas per year for at least 6 years. Under this contract the USAF can also request "launch on demand" services from MDC for the 1996-2002 time period, with a launch to occur within 40 days of the request. [Commentary: If these two contracts are fulfilled, they should provide an excellent business base for MDC's Delta launch program through the turn of the century. Combined, these two contracts have a potential for about 45 launches, worth about $2,200 M to MDC, and sustaining a core business base of $300-400 M/year. Other contracts for international and commercial payloads, as well as for NASA Medium ELV-class payloads, will add to this business base -- keeping MDC as a viable commerical launch company. However, it should be noted there are risk elements in these contracts. Motorola's Iridium LEO communications constellation has not yet received a US Federal Communications Commission license for operation in the U.S., nor has Motorola lined up all the financing and financial partners for the Iridium venture. Without these approvals or financial backing there will be no Iridium launches. But, hopefully, these uncertainties will be settled this year. Similarly, the USAF MLV III program has been the target of several Congressional actions which have slowed the production of the GPS Block IIR satellites and deleted the funding for the MLV III program in favor of the USAF NLS/"Spacelifter" program. At this time, while it appears the MLV III contract will be executed, future funding for the MLV III and other USAF commercial launch contracts is being reconsidered as part of national space launch strategy reviews. Some opinions expressed from within the Administration and Congress propose cancellation of all "ELV upgrade" programs (including the MLV programs) in favor of the proposed "Spacelifter" program. Such opinions may have some weight in this year's budget deliberations, particularly as DoD funds will be more difficult to find in the shrinking US Defense budget.] 3- COMMERCIAL REMOTE SENSING VENTURE GETS DOC "GO-AHEAD" The first commercial license to operate a remote sensing satellite was approved in early February by the US Department of Commerce's Office of Space Commerce. A license was granted to WorldView Imaging Corporation of Oakland, California to build and operate a pair of LEO imaging satellites to provide multi-spectral images of the Earth. [Commentary: There has been little data released on this venture by WorldView and the DoC, other than the announcement of the operating and construction license. This was reported to be at the request of WorldView. Most industry speculation identifies this new venture as a "Star Wars" spinoff, using SDI-type technology to provide digital Earth sensing data, and heavily integrated into digital GIS databases for remote sensing/GIS users. Most probable customers for this service include exploration geologists, agricultural planners, and urban planners. It is noteworthy this is the first commercial venture under the 1992 Land Remote Sensing Policy Act. The Act, as passed last November, provides that remote sensing data gathered from private remote sensing craft may be sold to users at differing prices. Prior to this act, remote sensing data from all satellites had to be sold to all users at the same prices, and private remote sensing ventures would have had to sell at the government-set Landsat data prices. There are rumors of several other potential commercial remote sensing ventures working their way through the system at different stages of development. I think the large Landsat and SPOT satellite systems will provide the majority of the satellite remote sensing data market for the next decade or so. In contrast to these large, government-sponsored remote sensing systems, smaller market ventures such as WorldView and others can exploit market niches and use innovative technology, and I believe, can find profitability on the margin. I predict there may be some very interesting ventures appearing in the next year or so.] 4- INVESTMENT FIRM CALLS GD'S SPACE BIZ "STILL A GOOD INVESTMENT" Wall Street investment house Morgan Stanley thinks General Dynamic's Space Systems Division could still be a moneymaker, despite having failed in the last 3 Atlas launches. In a recent analyst's report Morgan Stanley said "We are more than ever convinced that if the company can return the Atlas to its historical 95%-plus success rate, this will become a highly profitable, cash- generating unit." Based upon discussions with GD's corporate management, Morgan Stanley projects that if the Atlas problems are cleared up the unit could see $70 M in earnings per year by 1995 and $100 M per year by 2000. This is based upon GD's projection of capturing about 10 Atlas launches per year on the world market. [Commentary: Three failures in a row of their launch system has hurt General Dynamic's Space Systems Division. Since GD has restructured to only keep a very few profitable core businesses, many market pundits have been speculating GD's space business might be next to be sold. The Morgan Stanley report indicates GD's Space Systems Division has some potential as a moneymaker, despite current problems -- if they can get their act together. Sales are projected to be about $560 M in 1993, which will probably generate a loss of about $25 M. If GD can capture their projected share of the space launch market, and if they have managed to clean up the reliability of their Atlas launchers, then they could generate healthy profits from those sales. But until they demonstrate the Atlas Centaur program is back on track, this division will continue to show substantial losses. In response to the sell-off rumors, in my opinion, this operation is not a really good candidate for takeover and quick profitability. To do such a takeover, the current set corporate and divisional management would be replaced with another set from outside the firm. In GD SSD's case, to get the division back on track, the management team will have to concentrate hard on the technical problems with the Atlas Centaur, as well as in selling Atlas services. This would indicate only another firm with experience in rocket launch operations could find such talent in-house, and be able to convince customers to buy their launch services. Optimally, the firm would have substantial liquid rocket experience, and experience in marketing space technology internationally as well. Candidates for this might be TRW, Rockwell, Lockheed, and Martin, and possibly McDonnell Douglas and Boeing. But most of those firms have cash flow problems (MDC), have had a substantial business contraction (Boeing and MDC), are involved with other launch firms (Lockheed), or have taken on substantial debt (Martin). And coming up with the $700-1500 M purchase price for the division is a big chunk of change for any company.] 5 - ARIANE PREDICTS DIP IN LAUNCH DEMAND Arianespace, the operator of the Ariane launch system, is projecting a dip in launch demand in the late 1990's. In early February, Arianespace released their annual market survey, which detailed their projection of the space transportation market for the next decade. Over short run, Arianespace expects to retain their dominant position and sustain a majority share of the launch market. Of 54 international and commercial launches planned through 1995, Ariane holds contracts for 31, General Dynamics' Atlas vehicle holds 14 contracts, McDonnell Douglas' Delta holds 7, and Great Wall's Long March vehicle holds 2 launch contracts. Three-quarters of future launch contracts for which Ariane can compete are projected to come from communications satellites with the remaining 25% split between weather, Earth observation, and scientific satellites. Most of the future telecommunications demand growth is predicted to come from the Asia/Pacific region. Arianespace expects the current market consolidation of individual satellite operators into regional or national groups will continue, with these groups investing in heavier satellites with larger communications payloads carrying more transponders. Arianespace predicts the average mass of telecommunications satellites should increase by 20 % over today's average level, to about 3000 kg in GEO. Demand for commercial launch services is expected to remain strong over the next three years, but in the second half of the decade, Arianespace predicts demand will decrease. Arianespace bases this prediction upon a matching of satellite transponder demand and supply, particularly as new data compression techniques appear to could double or triple transponder capacity using existing or near-term transponders. One of the significant possible changes in the market was identified as the arrival of new launch vehicles, including Russian launch systems. But Arianespace predicts that in the long term, investors purchasing launch services are looking for the best trade off between launch service quality and price, and that Russian and other new launch services will have to prove out their capabilities and service quality, and their market penetration will be minimal. [Commentary: Ariane releases their market surveys annually, and I reported on their prior market survey in a past issue of CSN/STI. Comparing the two surveys, there aren't outstanding differences in the numbers. The most notable change is the consideration of new data compression techniques, reducing the demand for new physical transponders on orbit. I note that in contrast to some predictions, demand for space- based communications transponders appears to be remain strong. While fiber optic lines are making substantial inroads into the established point-to-point telecommunications markets, growing demand for telecommunications services world wide and for point-to- multipoint broadcast services have prevented a decrease in space transponder demand. Fiberoptic cables provide a higher capability service, but only from established point A to established point B. To establish a fiberoptic link it is necessary to install cable between the points, and while there are improved network solutions, installing a large network of distributed fiberoptic links can cost millions or billions of dollars. For broadcast services where there is not an existing ground network structure, satellites still offer the most cost effective solution. And if new services are required into a new region, it is cheaper to install a small satellite link costing only a few tens of thousands of dollars and tie into the existing global satellite network. This allows rapid growth of new satellite services, and has kept demand high. The replacement market for fiberoptics is growing as well, since as demand grows between the points serviced, it becomes cost effective to later install a fiberoptic link to handle the increase in traffic. Since the telecommunications and data transfer markets are still growing rapidly, satellite market projections remain rosy. But satellites are also getting longer orbital lifetimes. Current generation satellites are now getting guarantees of at 15 years of on-orbit service or more, in contrast to 10 years of service from last generation's satellites. This has cut back some of the launch demand, as satellite owners are rescheduling replacement satellite launches over longer intervals. And as last note; Arianespace didn't flag it this year, but it looks like the space transportation market will be rather over- supplied by existing launch systems in the near term. The annual commercial launch demand is for about 15-20 medium sized satellites per year. From the supply side, Ariane is capable of launching up to about a dozen medium sized satellites a year, Delta is capable of about 9-12 per year, Atlas is capable of 6-12, Long March 4-8, Japan's H-Vehicle 2-4, Russia's Proton capable of 8, and other systems such as Zenit and Soyuz another 10-20 medium launches per year. That's a lot of capability for a small market. We can only expect the competition to intensify for commercial launches.] 6- NTSB INVESTIGATES PEGASUS LAUNCH OVER ABORTED ABORT The 9 Feb Pegasus launch by Orbital Sciences Corporation has spawned an investigation over an apparent violation of range safety rules. A valid abort order from a NASA range safety officer to halt the mission was overridden and the Pegasus was launched in violation of range safety rules. In the last few minutes of the Pegasus launch countdown, one of two abort command receivers aboard the Pegasus failed. Such a failure typically scrubs a launch,and a NASA range safety officer at Wallops Island, VA issued a mission abort order about a minute before the scheduled Pegasus launch. Somehow this command was overridden by the OSC launch team or the message was lost in the communications channels, and the Pegasus was launched despite the valid abort call. Fortunately, the Pegasus functioned as expected, and the abort command receiver was not needed. But this incident did spark an investigation since a valid abort order was given under agreed-to launch constraint rules, and was not obeyed. Leading the investigation is the National Transportation Safety Board (NTSB) with support from NASA, OSC, and the Air Force. This investigation marks the first time NTSB has taken the lead on an incident involving a space launch. According to the NTSB, their investigation will take about 6 months, and is primarily looking at lines of authority, communications links and safety procedures used in the launch. [Commentary: This is the first time that the NTSB has led an investigation into a space launch. Their leadership was requested by the Department of Commerce's Office of Commercial Space Transportation, who had licensed the commercial launch. At the time of writing this column, some of the initial investigations have been concluded, and some of the results are starting to leak out into the trade press. Apparently, 3 or four different communications channels were in use during the test. After the abort destruct receiver stopped responding, the NASA test director and range controller in the Mission Control room at Wallops Island gave abort orders about a minute before the launch. According to the mission rules, this should have stopped the launch. Somehow, the OSC test conductor ordered the abort reversed, and the NASA communicator on the net relayed that order to the B-52 carrying the Pegasus at about 22 seconds before launch. Differing explainations of exactly how this happened are proposed -- with the best set being that clear lines of communications and clear definition of the responsibilities of the mission control team, and understanding of the mission rules were not established before the launch. As we see more and more commercial launches, more of these procedural issues are going to crop up and will have to be resolved. This case is interesting because it is the first time the NTSB has been called in to investigate a commercial launch problem (as they do with commercial aircraft problems). I think this problem will turn out to be primarily problems with procedures and communications, and will be cleared up with issuance of guidelines on how launch communications should be set up and how specific lines of authority should be delineated.] 7- ANOTHER PEGASUS COMPETITOR IS ANNOUNCED Tsniimach Enterprise in Russia announced it is marketing a new small space launch system, based upon converted ICBM components. Two versions of the launcher are being marketed: the "Aerokosmos" winged vehicle launched like the OSC Pegasus, and the "Severkosmos", launched from a mobile ground transporter. The Aerokosmos is projected to deliver 900 kg to a 200 km circular orbit or 580 kg to an 800 km circular orbit, and the Severkosmos to be capable of 430 kg to 200 km orbits and 225 kg to 800 km. Also proposed to be used with these launch systems is a LEO data relay system called 'Sineva'. Tsniimach Enterprise is described as a ex-military establishment, focusing on aerodynamics and thermal protection of spacecraft and which has participated in the development of the Buran shuttle system, They are located near the NPO Energia facility in Kaliningrad, outside of Moscow. [Commentary: There's very little released information on this new venture. My suspicion is it is another Russian enterprise looking for hard currency and trying to capitalize upon their in-house knowledge of ex-Soviet launch systems. It adds to the list of numerous commercial space startups announced from the ex-Soviet Union. This one's a little different in that they are offering variants of ex-Soviet ICBMs, but I can't identify any key customers being targeted or substantial financial backing.] 8- GEORGIA LAUNCH SITE DROPPED FROM PLANNING In late January, Georgia Tech Research Institute released the results of a preliminary study on the feasibility of a commercial rocket launching site in Camden County, Georgia at the old Kingsland Missile Test Launching Site on the Atlantic coast. The preliminary study recommended the site not be pursued as a commercial launch site, stating reopening the site was not feasible due to projected low investment returns, plus environmental and other geographic considerations. However, the report did say the site might be ideal for other aerospace uses, and recommended other potential uses. [Commentary: This should put the nails in the coffin of the Kingsland Commercial Launch Site. While other sites are still proceeding with commercial launch site development plans, Kingsland found without a key customer to act as anchor tenant, and if substantial infrastructure had to be put in, then the expected returns were too low to justify the cost of development. This might point out some key discriminators in judging the feasibility of a commercial launch site. These include: - Is there an identified key customer to provide core usage sufficient to recover setup costs? - Is there a market advantage of using the site? - Can existing infrastructure be used or modified at the site? - Can financing be found at low enough cost to support the investment? Other commercial launch site ventures -- including those at Woomera, Poker Flat, Cape York, White Sands, Alabama Off-Shore Platform, Hawaii, and Vandenberg have to also be judged against these criteria. In my opinion, some of these ventures are flying on hope and speculation, and not on sound financial grounds.] 9- SPAIN'S CAPRICORNIA LAUNCHER STILL PROCEEDING In one of his last official acts, former President Bush authorized space technology transfer for several joint space ventures between US and other firms. One of these was a proposed use of US technology by Spain to build a small booster. With that regulatory impediment removed, the 3-stage Capricornia launch vehicle will start development later this year, planning for a first launch in the 1995/96 time period. The Capricornia is described as a small 3-stage all solid booster designed to put 250-500 Kg into LEO. Several launch sites are being examined for the system, including 2 on the Iberian peninsula and 1 on the Canary Islands. Originated by INTA in Spain, the project reports it has $ 30 M in development funding, and will use technology from Argentina's Condor launch vehicle as well as from the US. [Commentary: Several firms have identified a market opportunity in providing a small launcher for the European market. Small payloads from European firms or organizations currently use either Ariane piggyback launches or the US/Italian Scout launcher. However, Ariane piggyback opportunities are limited, and the Scout program is being phased out (accompanied by some disarray in the Italian government and space industry regarding any follow-on system). This has left an apparent niche for a new European small launch system. Surprisingly enough, ESA has not supported development of such a system within the current space funding structure. Studies have been performed by British Aerospace, Aerospatiale, Deutsche Aerospace, and Italian organizations, but with the exception of the Swedish/PacAstro system (reported below), I have not been able to find any other European development work with even a rumor of funding for hardware. Also of interest is the linking of the Capricornia to the Argentinian Condor launcher. There have been some interesting rumors surfacing out of Argentina over the past year about a space launcher/IRBM program funded under the military junta which ruled the country in the 1970's and early 1980's. What is known is in Feb 1992, the Argentinian Air Force formally transferred control of the Condor 2 missile program to the new civilian Argentinian national space agency (Comison Nacional de Atividades Espaciales - CNAE). The Condor 2 program was described as originating in 1983, expanding upon the smaller Condor 1 rocket program in collaboration with Egypt and with support of German firms. The Condor 2 was also reportedly funded indirectly by Iraq in the mid-1980's. Fairly large solid rocket motors were built and tested, but Argentinan development of a suitable guidance package lagged that of the propulsion system. It should be noted CNAE is planning to launch its first scientific satellite in late 1994. The US$ 9 M, 181 Kg, SAC-B satellite will study the Earth's upper atmosphere and includes cooperative experiments from Italy and the US. No launch vehicle has yet been selected, but OSC's Pegasus and the Russian Burlak Air launched rocket are reported to be strong contenders for this contract.] 10- PACASTRO SIGNS LAUNCH RESERVATION WITH SWEDISH SPACE CORP PacAstro, a small launch firm in Herndon, Virginia announced in late February it had received a $6 M launch reservation contract from the Swedish Space Corp to launch a satellite on PacAstro's PA-2 launch vehicle. This will be performed as part of the Polar Satellite Service (PSS), a joint Norwegian Space Center/ Swedish Space Corp. program to upgrade the Andoya Rocket Range in Norway and offering small satellite launches into the polar regions. According to PacAstro, PSS is also performing an $8 M upgrade of the Andoya launch facilities, including a new integration facility and a fully- enclosed vertical assembly building for small launch vehicles like the PacAstro PA-2. PacAstro has been chosen as "the main alternative rocket supplier" for the small satellite launch service to be offered by PSS from Andoya. The date of the launch of the Swedish satellite was not specified. [Commentary: PacAstro has been trying to line up customers and funding for their launch vehicle for some time now. The PA-2 is a small, two stage rocket fueled by RP-1 and Liquid Oxygen. From PacAstro's literature, the engines designed for the PA-series rockets are built of "off the shelf" components based upon the Lunar MOdule Descent Engines built by TRW, and are capable of putting a 225 Kg satellite into a 750 km circular polar orbit. PacAstro is trying to arrange construction financing for its first three PA-2 vehicles, with a first launch planned for 1995, and 2 orbital launches planned for 1996. My records show PacAstro hired TRW to provide marketing support and systems design, with primary engineering to be done by AeroAstro, a small satellite builder closely associated with PacAstro (headquartered in the same building). The Swedish Space Corporation would supply engineering, launch operations, vehicle subsystems, and marketing support. Sumitomo Corp. of Tokyo, is a first round investor and sits on the board of directors. PacAstro has gotten a first round financial package of at least $550 K (Some sources place this of high as $1 M), but has been searching for about a year for the additional $20-30 M needed to design, build and launch their first set of vehicles. The launch reservation from SSC can possibly be used to help bring some investors on board, but by my estimate, they will need much more than the single $6 M sale to put their venture into real hardware.] 11- CHINA AND TAIWAN JOINT SATELLITE VENTURE REPORTED In early March, it was reported a joint satellite communications venture between a Taiwanese and mainland Chinese was in the works. As reported in the Taipei press, China Development Corp. (CDC), headquartered in Taiwam and with links to the ruling Nationalist Party, is planning to set up a joint venture in Hong Kong with China Great Wall Industry Corp. with the objective of launching a regional communications satellite. CDC would cover about 10% of the satellite system cost (US $10 M) in exchange for rights to 10% of the satellite's communications channels. [Commentary: This announcement came close on the heels of the release of Taiwanese plans for space development (released in mid January). In those plans, the National Space Program Office of Taiwan will launch 3 satellites, starting with ROCSAT-1, a 400 Kg scientific spacecraft, planned for launch in 1997. Two additional satellites are planned, both communications satellites. TRW has been helping Taiwan plan this program, budgeted at T$13.6 B (US $530 M) through 2006. I haven't been able to establish any relationship between this venture and those of the NSPOT, but there might be a connection. While Taiwan has the financing to pursue several ventures, the current Taiwanese telecommunications market might not support two separate sastellite ventures. The reported name for the Tiawanese/Chinese system is "Asiasat- 2", but I don't thinks this has any relationship with the existing Hong Kong-based "Asiasat" program involving Chinese, Hong Kong, and other Asian investors, other than using it as an organizational model. There are some obvious advantages to pursuing such a joing venture -- it could provide excellent first-hand experience to Taiwan for a very low cost, which then can be used in later satellite ventures. But there are internal political issues between Taiwanese and Chinese ventures, but putting any joint venture through a Hong Kong intermediary corporation might allow it to proceed. In any case, the East Asian satellite market is lighting up with substantially growth projected in space services and revenues. This is just another indicator to add to the list.] 12- SOUTH KOREA ANNOUNCES NATIONAL MOVE INTO SPACE TECHNOLOGIES South Korea's Trade, Industry and Resources Ministry recently announced plans to invest US$22 B in research and development and another US$17 B into manufacturing and research facilities for advanced aerospace technologies. Space technologies have been specifically targeted as part of this program, beginning with manufacture and launch of an advanced multi-purpose satellite by 1997. The objective of this investment is to raise South Korea's aerospace technology to the level of the world's top 10 countries by 2000. [Commentary: South Korea has been quietly working to develop its national aerospace industry, specifically including space activities. I'm noting this as a flag that potential new players are coming into the commercial space market. As part of their national effort, 2 national telecommunications satellites for Korea Telecom will be launched in April and Oct 1995 on Delta. Designated Koreasat 1 and 2, the platforms will provide television and telephone service throughout the Korean Peninsula, southwestern Japan and portions of China bordering North Korea. South Korea launched its first small satellite piggyback on Ariane in Aug 1992, called Uribyol-1 (Our Star) and costing about US $8.8 M. Uribyol-2 is planned for piggyback launch in October of this year, again on Ariane, and will be entirely "made in Korea." Uribyol-3, projected for a 1995 launch, will be an environment- monitoring micro-satellite. This satellite may be the precursor to a series of small Earth observation satellites, The KEOS (Korean Earth Observation System) project, which has been submitted for approval to the South Korean government, would use two or three 300-kg spacecraft equipped with optical and microwave sensors. South Korean press reports claim there is also a parallel military effort to establish the capabilities for building and launching small military satellites by 2001. Supposedly a government panel had been established to oversee such an effort, funded at US $ 500 M between 1993 and 2001, in anticipation of an expected pullout of U.S. intelligence-gathering systems from the Korean peninsula. In conjunction with all of these reported efforts, South Korean is also pursuing production work either as off-sets to existing aerospace technology contracts (for example, McDonnell Douglas is offsetting production of some Delta parts to South Korean firms as part of the Koreasat launch contracts), or for production of consumer space items (among other products, South Korea exports satellite receiver television setups to Japan, and Samsung has announced teaming for production of OSC's Orbcomm user terminals.). This looks like a very aggressive push into space technologies. Considering that East Asia is currently the fastest growing sector for commercial space services (primarily for telecommunications), a South Korean push into space technologies may change the composition of commercial space market there over the next decade.] 13- SPACE TECHNOLOGY INDEXES THROUGH MARCH As announced in the last CSN/STI, each issue will give the results of stock indexes and portfolios regarding space stocks and investments. The table below summarizes results to the end of March. The Space Technology Index did quite a bit better than the market as a whole, as represented by the S&P 500 index. Since 90+% of the values included in the index are US firms, this represents a general increase in the market value of space-related firms. The increase in the first quarter is more than in all of 1992 -- which is a very promising sign, although future months may reverse this trend. The Commercial Space Technology Index has also done quite well, but the Pure Play portfolio -- consisting of stocks of firms which are pure plays in space technologies -- has also surpassed its results in all of 1993. We'll keep an eye on these .... INDEX RESULTS THROUGH MARCH Beginning Beginning 1 Jan 93 to 1992 1993 31 Mar 1993 ------- -------- -------- S&P 500 416 436 (+4.7%) 452 (+3.7%) Space Tech Index 267 304 (+13.6%) 373 (+22.7%) Comm'l Space Tech Index 167 194 (+16.3%) 222 (+14.2%) Space Tech Pure Plays 147 169 (+15.4%) 197 (+16.2%) FINAL NOTES - What? This column's already full? And I still have bunches of commercial space developments to report on. As I said at the start of this, column there's been a lot of interesting happenings - but I'll have to put them into the next issue. Looking ahead, I've got several articles in the works on new happenings with Iridium and the LEO communications satellite market, more news on international launchers appearing (and disappearing) on the market, new international commercial space ventures, and other interesting developments. And as always, I hope you folks find this stuff useful and interesting -- Any and all comments are welcome.
14
sci.space
Hello. Is it possible to know minimize program manager when starting an application and to restore it when the application is ended ? If possible, please tell me how to do it !
2
comp.os.ms-windows.misc
xdm does XGrabServer when it's running in secure mode (so do some screen-locks). There's really no simple way to tell this is the case. You can take xdm out of secure mode; probably not too cool. You can wrap your call to XOpenDisplay in some code which solicts a future SIGALRM and longjmps past the XOpenDisplay from the signal handler. An example of this can be seen in the xdm sources.
5
comp.windows.x
: I : |> Jim, : |> : |> I always thought that homophobe was only a word used at Act UP : |> rallies, I didn't beleive real people used it. Let's see if we agree : |> on the term's definition. A homophobe is one who actively and : |> militantly attacks homosexuals because he is actually a latent : |> homosexual who uses his hostility to conceal his true orientation. : |> Since everyone who disapproves of or condemns homosexuality is a : |> homophobe (your implication is clear), it must necessarily follow that : |> all men are latent homosexuals or bisexual at the very least. : |> : : Crap crap crap crap crap. A definition of any type of 'phobe comes from : phobia = an irrational fear of. Hence a homophobe (not only in ACT UP meetings, : the word is apparently in general use now. Or perhaps it isn't in the bible? : Wouldst thou prefer if I were to communicate with thou in bilespeak?) : : Does an arachnophobe have an irrational fear of being a spider? Does an : agoraphobe have an irrational fear of being a wide open space? Do you : understand English? : : Obviously someone who has phobia will react to it. They will do their best : to avoid it and if that is not possible they will either strike out or : run away. Or do gaybashings occur because of natural processes? People : who definately have homophobia will either run away from gay people or : cause them (or themselves) violence. : Isn't that what I said ... What are you taking issue with here, your remarks are merely parenthetical to mine and add nothing useful. : [...] : : |> It would seem odd if homosexuality had any evolutionary function : |> (other than limiting population growth) since evolution only occurs : |> when the members of one generation pass along their traits to : |> subsequent generations. Homosexuality is an evolutionary deadend. If I : |> take your usage of the term, homophobe, in the sense you seem to : |> intend, then all men are really homosexual and evolution of our : |> species at least, is going nowhere. : |> : : So *every* time a man has sex with a woman they intend to produce children? : Hmm...no wonder the world is overpopulated. Obviously you keep to the : Monty Python song: "Every sperm is sacred". And if, as *you* say, it has : a purpose as a means to limit population growth then it is, by your own : arguement, natural. Consider the context, I'm talking about an evolutionary function. One of the most basic requirements of evolution is that members of a species procreate, those who don't have no purpose in that context. : : |> Another point is that if the offspring of each generation is to : |> survive, the participation of both parents is necessary - a family must : |> exist, since homosexuals do not reproduce, they cannot constitute a : |> family. Since the majority of humankind is part of a family, : |> homosexuality is an evolutionary abberation, contrary to nature if you : |> will. : |> : : Well if that is true, by your own arguements homosexuals would have : vanished *years* ago due to non-procreation. Also the parent from single : parent families should put the babies out in the cold now, cos they must, : by your arguement, die. By your argument, homosexuality is genetically determined. As to your second point, you prove again that you have no idea what context means. I am talking about evolution, the preservation of the species, the fundamental premise of the whole process. : : |> But it gets worse. Since the overwhelming majority of people actually : |> -prefer- a heterosexual relationship, homosexuality is a social : |> abberation as well. The homosexual eschews the biological imperative : |> to reproduce and then the social imperative to form and participate in : |> the most fundamental social element, the family. But wait, there's : |> more. : |> : : Read the above. I expect you to have at least ten children by now, with : the family growing. These days sex is less to do with procreation (admittedly : without it there would be no-one) but more to do with pleasure. In pre-pill : and pre-condom days, if you had sex there was the chance of producing children. : These days is just ain't true! People can decide whether or not to have : children and when. Soon they will be able to choose it's sex &c (but that's : another arguement...) so it's more of a "lifestyle" decision. Again by : your arguement, since homosexuals can not (or choose not) to reproduce they must : be akin to people who decide to have sex but not children. Both are : as "unnatural" as each other. Yet another non-sequitur. Sex is an evolutionary function that exists for procreation, that it is also recreation is incidental. That homosexuals don't procreate means that sex is -only- recreation and nothing more; they serve no -evolutionary- purpose. : : |> Since homosexuals have come out the closet and have convinced some : |> policy makers that they have civil rights, they are now claiming that : |> their sexuality is a preference, a life-style, an orientation, a : |> choice that should be protected by law. Now if homosexuality is a mere : |> choice and if it is both contrary to nature and anti-social, then it : |> is a perverse choice; they have even less credibility than before they : |> became prominent. : |> : : People are people are people. Who are you to tell anyone else how to live : their life? Are you god(tm)? If so, fancy a date? Here's pretty obvious dodge, do you really think you've said anything or do you just feel obligated to respond to every statement? I am not telling anyone anything, I am demonstrating that there are arguments against the practice of homosexuality (providing it's a merely an alternate lifestlye) that are not homophobic, that one can reasonably call it perverse in a context even a atheist can understand. I realize of course that this comes dangerously close to establishing a value, and that atheists are compelled to object on that basis, but if you are to be consistent, you have no case in this regard. : : |> To characterize any opposition to homosexuality as homophobic is to : |> ignore some very compelling arguments against the legitimization of : |> the homosexual "life-style". But since the charge is only intended to : |> intimidate, it's really just demogoguery and not to be taken : |> seriously. Fact is, Jim, there are far more persuasive arguments for : |> suppressing homosexuality than those given, but consider this a start. : |> : : Again crap. All your arguments are based on outdated ideals. Likewise the : bible. Would any honest Christian condemn the ten generations spawned by : a "bastard" to eternal damnation? Or someone who crushes his penis (either : accidently or not..!). Both are in Deuteronomy. I'm sure your comment pertains to something, but you've disguised it so well I can't see what. Where did I mention ideals, out-dated or otherwise? Your arguments are very reactionary; do you have anything at all to contribute? : : |> As to why homosexuals should be excluded from participation in : |> scouting, the reasons are the same as those used to restrict them from : |> teaching; by their own logic, homosexuals are deviates, social and : |> biological. Since any adult is a role model for a child, it is : |> incumbent on the parent to ensure that the child be isolated from : |> those who would do the child harm. In this case, harm means primarily : |> social, though that could be extended easily enough. : |> : |> : : You show me *anyone* who has sex in a way that everyone would describe as : normal, and will take of my hat (Puma baseball cap) to you. "One man's meat : is another man's poison"! : What has this got to do with anything? Would you pick a single point that you find offensive and explain your objections, I would really like to believe that you can discuss this issue intelligibly.
0
alt.atheism
A few days back someone posted info on a gopher site where you could search for medical graphics, etc. Could someone please repost or mail me a copy? I'd greatly appreciate it. Thanks! Mark
1
comp.graphics
I have one thing to say-- why does everyone say that spliting them up is such a bad thing? I actually like my program launcher and file manager do be seperate.. it make things easier to figure out.. I mean, take a look at OS/2's wps... (no flames!).. I personally hate it cause I just have too much trouble figuring out how to do simple things like file copy.. and don't say "just drag the icon!".. Cause I hate icons in the first place. I have too much trouble telling what all those little push buttons mean. I want "F"ile "C"opy etc.. although I know I'm in the minority. -- ---------------------------------------------------------------------------- swyatt@brahms.udel.edu !!! no disclaimer...I blame everything on someone else
2
comp.os.ms-windows.misc
[lots of things, none of which are quoted here] Oh, ye of little imagination. You don't jump over those - that's where you lay the bike down and slide under!
8
rec.motorcycles
Yup. Unfortunately, as has been pointed out, the cost of insurance does NOT go down with No Fault. The crappiest drivers make out like bandits because they no longer have to bear the responsibility of paying for insurance that they have boosted in price for themselves by being crappy drivers. The good drivers now pay through the nose to spread the cost of the crappy drivers' actions, and that's not fair. Any plan that caps rates for crappy drivers is inherently a piece of shit, because the rest of us end up paying more. Any plan that uses speeding tickets as a basis for raising rates is also a piece of shit as it is based upon the lie that faster drivers are inherently less safe than slower drivers, and the NHTSA disproved that two years ago now. Later,
8
rec.motorcycles
Hi, I've just built a valve preamp and use a diode/capacitor voltage multiplier to step the 12vAC supply voltage up to approx 260vDV. As the load resistance increases, the RC constant decreases and hence the output voltage drops. I need as high an output voltage as possible. (about 260v). The circuit consists of seven voltage multiplier stages (ie 14 diodes and 14 capacitors) each capacitor develops about 38v across them, and I take the output from across seven capacitors=260v. Each capacitor is 100mfd at 68v. If I increase each of the capacitors rating (220-470mfd), that will increase the RC constant, and hence alleviate some of the problem. These capacitors are going to be a little expensive as I need 14 of them, So: 1. What would happen if I connected a 470mfd at 400v capacitor in parallel with the output (and hence in parallel with the seven 100mfd capacitors)? Will it, as I assume, increase the C in circuit and hence increase the RC time constant? If it does, and my output voltage becomes more stable by doing this, then I will have killed two birds with one stone... as I am experiencing some 50Hz ripple (and hence amp hum), and this new capacitor will 'smooth' this out. and 2. Can anyone recomend a suitable value for an inductor (choke) to be placed in the output line of the power supply to filter out the 50Hz mains hum. Lowest resistance possible ! I've not got my preamp with me at the moment because it is TOO MUCH of a distraction.... (I'm at university and I've got to get my dissertation finished in two weeks !!!!!!!) hence I'm mailing not playing with my solderoing iron (it'll be cheaper too in the long run... especially if 14 new large capacitors don't work as planned!) Email please.... Can't always read the net..... Thanks in advance.. Chris ;-) +====================================================================+ |Name : Mr Chris Smith | Twang on that 'ole guitar ! | |Addrs: scst83@uk.ac.liv.csc | | |Uni : Liverpool University |Quest: To build more and more hardware | |Dgree: Computer Science | | +====================================================================+ "What ever the sun may be, it is certainly not a ball of flaming gas!" -- D.H. Lawrence.
12
sci.electronics
************************************************************ * For Sale - Jazz Compact Discs * ************************************************************ I have the following CDs for sale, they are all in mint condition and are fairly hard to find. They are all on the savoy label and put out by Dennon (Dennon bought the rights to Savoy and released these disks) I would like to sell them all in one package deal but I will consider individual orders. These are the titles and artists: Telefunken Blues Milt Jackson, Kenny Clarke, Percy Heath Frank Morgan, Frank Wess, Walter Benton Jazz Concert West Coast The Bopland Boys Opus De Jazz VOl-2 John Rae, Steve Kuhn, Bobby Jaspar, Jake Hannah, John Neves Patterns of Jazz Cecil Payne, Kenny Dorham, Duke Jordan, Tommy Potter, Art Taylor Penthouse Serenade Erroll Garner Footloose Paul Bley The Imortal Lester Young Lester Young, Count Basie Great Britain's Marian McPartland, George Shearing Howard McGhee and Milt Jackson Self Titled I Just Love Jazz Piano Hampton Hawes, John Mehegan, Herbie Nichols, Paul Smith Art Pepper & Sonny Reid Self Titled Opus De Blues Frank Wess, Thad Jones, Curtis Fuller Charlie Fowlkes, Hank Jones, Eddie Jones, Gus Johnson Jazz is Busting out All Over Too many names to list Opus in Swing Frank Wess, Kenny Burrell Freddie Green, Eddie Jones, Kenny Clarke Jackson's Ville Milt Jackson, Lucky Thompson, Hank Jones Wendell Marshall, Kenny Clarke I will take any reasonable offer on the package of the 15 discs as well as offers on individual discs. Please E-mail me with a response or call (807) 344-0010 Thanx Derek
6
misc.forsale
: For all the problems technology has caused, your types have made : things even worse. Must we be reminded of the Inquisition, Operation : Rescue, the Ku Klux Klan, Posse Comitatus, the 700 Club, David Duke, Salem : Witch Trials, the Crusades, gay bashings, etc. : PLUS virtually each and every single war, regardless of the level of : technology, has had theistic organizations cheering on the carnage : (chaplains, etc.), and claiming that god was in favor of the whole ordeal. : Don't forget to pray for our troops! : This is really tedious. Every bad thing that's ever happened is because the malefactors were under the influence of religion - does anyone -really- believe that. I've seen it so often it must be a pretty general opinion in a.a, but I want to believe that atheists are really not THAT dishonest. Please, stick to the facts and, having accomplished that, interpret them correctly.
0
alt.atheism
The following items are for sale: 1) ONKYO TX-901/910 reciever/amplifier. Only 2 months old. >PERFECT< condition. 45wpc (stereo), 4 speaker ability, 40 channel memory, has digital and direct tuning also. Plus, it also have an earphone jack... Bought for $350 new. Asking for no less than $250; best offer gets it (obviously). ...PRICE DROPPED TO $230... - No offers so far; what's the deal? No recievers needed? :( 2) Two ZEOS IBM-External keyboards. Under a month old, bought for $90 each new; selling for $35 a piece, or $65 for both. I pay shipping.
6
misc.forsale
Which sort of loans and what have you heard exactly?
0
alt.atheism
I am selling my Macintosh Classic and Stylewriter 1 to the highest bidder. You can reach me at 415 626-5869 (San Francisco)), or via email at forsythe@leland.stanford.edu.
6
misc.forsale
(good point about registration schemes being used only for harassment deleted) I would also like to point out that this is receiving stolen property and is no different than a pawn shop owner doing the same thing.
16
talk.politics.guns
The FLYERS closed out the season last night with their 8th straight victory, a 5-4 OT winner over the Hartford Whalers. The OT game winner came from Dimitri Yushkevich, just his 5th of the season and his first game winner. The FLYERS never led up until that point in the game. For the Whalers, the loss marked an NHL record 9th OT loss this season. Roster move: Gord Hynes was called to to play in place of Ryan McGill Injuries: Ryan McGill injured his hand in a fight 4/15 and was scratched. Lines: Eklund-Lindros-Recchi Beranek-Brind'Amour-Dineen Lomakin-Butsayev-Conroy Faust-Acton-Brown Galley-Bowen Yushkevich-Hawgood Carkner-Hynes Dominic Roussel Game Summary: I didn't get TV coverage of the game, and since it was stormy in these parts I didn't have the best radio coverage either. Here's the box score followed by a few things I did pick up: First Period: Hartford, Nylander 10, 8:51 Philadelphia, Recchi 53 (Lindros, Brind'Amour), 19:59.8 (pp) Penalties - Verbeek, Har (holding), :55; Carkner, Phi (roughing), 13:53; Houda, Har (interference) 18:43 Second Period: Hartford, Burt 6 (Cunneyworth, Kron), 2:00 Philadelphia, Bowen 1 (Eklund, Recchi), 7:09 Hartford, Nylander 11 (Zalapski, Sanderson), 9:38 Penalties - Galley, Phi, major-game misconduct (spearing) :58; Verbeek, Har major-game misconduct (spearing), :58; Brown, Phi (tripping), 3:22; Zalapski, Har (tripping), 15:51; Brind'Amour, Phi (slashing), 19:50 Third Period: Hartford, Kron 14 (Sanderson, Cassels), 1:24 (pp) Philadelphia, Beranek 15 (Lomakin, Yushkevich), 3:11 Philadelphia, Faust 2 (Brind'Amour, Roussel), 3:38 Penalties - Houda, Har (tripping), 4:20; Hawgood, Phi (holding), 5:30 Overtime: Philadelphia, Yushkevich 5 (Faust), 1:15. Penalties - None Power Play: Philadelphia 1 of 4, Hartford 1 of 4 Goalies: Philadelphia, Roussel 14-11-5 (30 shots - 26 saves) Hartford, Lenarduzzi, 1-1-1 (38 - 33) On the first Hartford goal, Gord Hynes misplayed the puck at the FLYERS blue line and Nylander stripped him and took off. The Recchi goal was a 2 on 1 with Lindros. The Bowen goal was just a puck he threw at the net, got a good carom and it ended up behind the goalie. On the second Nylander goal he got three whacks at the puck before it went in. This is the most frustrating part of the FLYERS defense. Take the body, and if they get one shot and beat you fine. Don't give them another chance. Carkner, Galley and McGill are all terrible about this, I'll bet money at least one of them was the closest FLYER to the play. That's all I have, my radio got bad after that and I was lucky to know who it was that scored, much less how. From what I heard, Roussel had a very strong game. After the game, Gene Hart asked Bobby Taylor to pick the three stars of the season rather than of the game. It was Garry Galley #3 for his career high point total (I'm surprised that a former goalie wouldn't look closer at his defensive play), Tommy Soderstrom #2 for his team record tying 5 shutouts in only about 1/2 a season and, Mark Recchi #1 for his all time high team single season scoring mark. But here's the odd part. He couldn't decide between Lindros and Recchi for number 1. If he picks Recchi as #1 after he had a hard time choosing between him and Lindros, doesn't that make Lindros #2???? What? You wanna know my three stars of the season? Well, since you asked... #1 Eric Lindros. Eric dominates a game simply by stepping out onto the ice. The difference between the team's record with him and without him is no accident. I believe that the team could have been almost as successful without Recchi. There is no question that this team is significantly better with Eric Lindros on it, and I think that he will deservedly wear the 'C' on his jersey next season. #2 Tommy Soderstrom. 5 shutouts was second in the league to only Ed Belfour, and Tommy didn't have a Chris Chelios (booo) in front of him. He also didn't play a complete season due to heart problems (sentimental edge here, my family has a history of heart problems). There's no question in my mind that Tommy Soderstrom is this teams goalie of the future, and if Roussel complains again about being number 2 look for him to be traded within 2 years. #3 Mark Recchi. Again, you can't argue with an all-time team high single season scoring mark. There are an awful lot of teams that didn't have a single player get as many points. Plus, Mark is the only FLYER to play the entire season. Not a tough choice. Honorable mentions: Rod Brind'Amour topped his single season high point total which he set last year. The difference was that he wasn't on the top line this year and didn't get as much playing time. Then again, he didn't get the defensive attention that he got last year from the other team either. Dimtri Yushkevich was the teams most consistent defenseman. Yes, he made rookie mistakes, but he was usually fast enough to make up for them. I have a feeling that with his shot he'll score a few more points next year without giving up anything in his own zone, and I suspect that he'll be the teams top defenseman in years to come. Garry Galley was the team's point leader from defensemen. Again, there are some things you just can't argue with. And he battled with chronic fatigue syndrome, he certainly deserves kudos for only missing one game, and that was against his wishes under doctors orders. But his defensive play often negates his offensive contribution. A little more caution, and a little bit smarter in his own end will make him a much more important part of the team next year. Brent Fedyk was the leagues biggest improvement over last years point total. But consistency became a problem for him. A couple misc notes mostly for mailing list members: Tom Misnik, a member of the mailing list, would like to exchange E-mail addresses with any list members who want to keep in touch over the summer. If you're interested, you can send him mail at: att!ACR.ORG!TMISNIK The FLYERS end the season 1 game below .500 in 5th place, their best winning percentage since going .500 in 1988-89. 14-20-3 within the division (4th in Patrick), 23-14-5 at home. They finished 17th overall, will draft 10th in next years entry draft (Quebec had the 1st rounder, though). They scored as many goals as they allowed, 319. The 8 straight wins is the most since they won 13 in a row in 1985. I will be sending out final stats as soon as I get the issue of the Hockey News that contains them, since there are no more games for me to go to I have no other way of getting them. I hope you've all enjoyed this years hockey season as much as I have. Knowing the future that we have coming to us made missing the playoffs one more time almost bearable. FLYERS team record watch: Eric Lindros: 41 goals, 34 assists, 75 points (rookie records) club record goals: club record points: Eric Lindros 40 1992-93 Dave Poulin 76 1983-84 Brian Propp 34 1979-80 Brian Propp 75 1979-80 Ron Flockhart 33 1981-82 Eric Lindros 75 1992-93 Dave Poulin 31 1983-84 Ron Flockhart 72 1981-82 Bill Barber 30 1972-73 Pelle Eklund 66 1985-86 Mark Recchi: 53 goals, 70 assists, 123 points. club record goals: club record points: Reggie Leach 61 1975-76 Mark Recchi 123 1992-93* Tim Kerr 58 1985-86,86-87 Bobby Clarke 119 1975-76 Tim Kerr 54 1983-84,84-85 Bobby Clarke 116 1974-75 Mark Recchi 53 1992-93* Bill Barber 112 1975-76 Rick Macliesh 50 1972-73 Bobby Clarke 104 1972-73 Bill Barber 50 1975-76 Rick Macliesh 100 1972-73 Reggie Leach 50 1979-80 *More than 80 games. FLYERS career years: Player Points Best Prior Season Mark Recchi 123 113 (90-91 Penguins) Rod Brind'Amour 86 77 (91-92 FLYERS) Garry Galley 62 38 (84-85 Kings) Brent Fedyk 59 35 (90-91 Red Wings) That's all for now...
10
rec.sport.hockey
Can somebody tell me what all the letter spesifications on motorcycle models really mean. Example: What means the C, the B and the R in Honda CBR. - Or the V, S, G, L and P in Suzuki VS750GLP I wanna distribute this in our club magazine. I want lists of all types, but I already knows about Harley. Thanks in advance! Vidar --------------------------------------------------------------------------- Vidar O. Solberg - NORWAY * ROCK HARD * RIDE FREE * "We are the proud, the few and the true Metallibashers!"
8
rec.motorcycles
Those who forward offensive posts to the sysadmin aren't curtailing anyones' freedom of speech. The neo-nazi movement has a right to make speeches, say anything they want. They do not have a right to have these speeches published by the N.Y. Times. That depends on the Times analysis of the economic and to somewhat extent newsworthy value of those speeches. Likewise to the sysadmin of this fellows system. If he feels his resources are being used in a manner that is not in his best interests, or are perhaps embarassing to his organization, he will act just as the New York Times does, not to be a conduit for these ideas. The poster is after all free-loading off of someone else's pocket book when he posts. He who controls the purse strings has the right to make the decision how he wants those funds spent or not spent. Noone is going to put the poster in jail, unless he bombs a local building as a symbol of his hatred. Freedom of Speech in no way equates to accessibility to conduits of information. The market of ideas has its own "natural selection" process that weeds out the ga-ga from the credible ideas that are of importance. Seth Rosenthal
17
talk.politics.mideast
Check out Xicor's new goodie in the April 12th edition of EETimes X88C64 - an 8k * 8 E2PROM with built in latch AND bootloader setup. You hook it directly to your '51, power it up, the prom initialises the serial port on the '51, you load in your code via RXD, this gets blatted onto the E2PROM, then you reset and run - i'm sure Dallas also does something like this too, i suppose it would boil down to relative prices, and the Dallas part freeing up P0 & P2 completely. I wonder if ANYONE has ever managed to design a single sided PCB with an 8051, 573, EPROM, SRAM and >>NO LINKS<< ? cheers Mike.
12
sci.electronics
Better yet, instead of thrashing around on the DOS file system, take it a step further. Write yourself a minimal "file system" program that is used to create/delete files, en/decrypt them to ramdisk, list a directory. Put the util, password protected, on a floppy. The catch is that the storage space used by this util is NOT part of the DOS file system. Instead, defrag your disk, thus packing all allocated clusters into clusters 0-n. Then use the back end of the partition to hold your 'stealth' file system. Or, leave a small 2nd partition on the disk that is not assigned to DOS. Another approach might be to use a directory that contains a set of invariant files (DOS system files, for instance). Due to DOS allocating a minimum storage unit of a "cluster" there is unused physical space on the disk between the tail end of each file and the end of its associated cluster. These dead spaces could be concatenated and used to hold your stealth file system. Now you have a situation where no encrypted data "appears" on your disk at all :-).
11
sci.crypt
: : Just taken delivery of a 66MHz 486 DX2 machine, and very nice it is too. : One query - the landmark speed when turbo is on is 230 or something MHz : - thats not the problem. The problem is the speed when turbo is off. Its : 7 MHz. The equivalent in car terms is having a nice Porsche with a button : that turns it into a skateboard. : : Does anyone have a clue as to what determines the relative performance of : turbo vs non-turbo?? I would like to set it to give a landmark speed of : about 30 or 40 MHz with turbo off. : : Cheers, :
3
comp.sys.ibm.pc.hardware
My Western Digital also has three sets of pins on the back. I am using it with another hard drive as well and the settings for the jumpers were written right on the circuit board of the WD drive......MA SL ?? I can't remember what the last one was. If you can't find these markings on the circuit board, I'll open my machine and tell you what mine are.......
3
comp.sys.ibm.pc.hardware
I am interrested in the extrodinarily simple concept of the null modem cable. (Actually I have NO idea, so don't count that last statement.) What I'm asking is what pins does it use (or what are it's specifications?) I just want to solder one myself instead of buying one. I don't even know what port is used. Help me please (at ke_kimmell@vax.cns.muskingum.edu) Kevin
3
comp.sys.ibm.pc.hardware
I have a MacIIFX and I know that it is wired about its SCSI chain. I just bought a drive and I need to find out a few hardcore SCSI question: Does the IIFX SCSI chain want to see active or passive termination? Does the IIFX SCSI spec want me to enable the initiation of the SDTR message? WHat does the IIFX SCSI spec want as far as parity checking? These are some very good questions for the FAQ. If someone does not have time to answer these questions but does know where I can look them up please let me know and I will repost the answers for everyone to see. thanks,
4
comp.sys.mac.hardware
From: sam.halperin@cccbbs.uceng 486 DX 50 mHz in Zero Insertion Force Socket Empty over-drive socket EISA motherboard with 256k cache -->2 32 bit EISA Slots -->2 32 bit VESA local bus slots -->4 16 bit ISA slots 8 MB 70ns RAM -->8 SIMMS sockets filled with 1mb strips (0 sockets open) 32 bit EISA IDE hard drive controller 330 Meg IDE hard disk drive w/ 64k cache (12ms) Diamond Viper Weitek 9000 VESA local bus graphics card w/ 2mb 15" MAG MX15F monitor 2 Serial(NS16550AFN UART), 1 parralell & 1 game ports Full tower case -->250 Watt power supply -->5 X 5.25" bays -->2 X 3.5" bays -->2 X Hard Drive bays 1.2MB 5.25" & 1.33MB 3.5" Floppy Drives Enhanced 101 key keyboard Hi-Resolution 400 DPI Serial Mouse MS DOS 5.0 and MS Windows 3.1 or newer AMI BIOS Joint Data Motherboard 30 Day Money Back Gaurantee Unconditional 2 Year Parts Warranty Lifetime Labor Warranty One year Nationwide on site service This system is currently availble from Comtrade, the company that won some of the highest (over dell, gateway and IBM) awards in recent PC magazine reviews. Your price must be highly competitive, without sacrificing any of the quality standards listed above.
6
misc.forsale
Some thoughts: Has any work been done on encapsulating encrypted data inside "non-encrypted" data files? Many file formats can be written with "gaps" in them to hide other data. New file formats could be designed to have alternate data hidden by dispersing it amongst the "legitimate" data. The hidden data would only show up with the right key(s), and a file with hidden data would be indistinguishable from one without. So, only the correct key(s) would reveal the presence of an "illegal" document. If I devise a custom file compression algorithm and only I and a friend have the uncompressor, and otherwise the file appears to be total gigerish, do I have the right to transmit the file? Will we have to "escrow" all our data file formats? Are gangs required to escrow their hand signals, colors and catch phrases?
11
sci.crypt
First, I thank collectively all people who have given good answers to my questions. In my follow-up to Jason Smith's posting, I will address some issues that have caused misunderstanding: Yes, to some degree. There was an excellent discussion in sci.skeptic on the nature of scientific work two weeks ago, I hope it did not escape your notice. The correct word is 'likely'. There is no way to be sure our models and theories are absolutely correct. Theories are backed up by evidence, but not proved - no theory can be 'true' in a mathematical sense. However, theories are not mere descriptions or rationalisations of phenomena. It is extremely important to test whether theories can _predict_ something new or not yet observed. All successful theories science has come up with have passed this test, including the Big Bang theory of cosmic evolution, the theory of natural selection etc. It does not mean they _must_ be correct, but they are not mere 'best fits' for the data. Well, yes, if you want to _believe_ in them. This is not what science requires - take a good look at the theory and the evidence, see if the theory has made any successful predictions, and use your reason. Disbelievers are not punished. This is what puzzles me - why do we need to have faith in _anything_? My fellow atheists would call me a weak atheist - someone who is unable to believe, ie, fails to entertain any belief in God. Yes, I know that one can't believe without God's help; Luther makes this quite clear in his letter to Erasmus. I'm afraid this does not change my situation. (deletions) No, it is not, although it does look like one. This is a true dichotomy, either something exists, or nothing exists. If nothing exists, nobody would ask why. If something exists, it is possible to ask why, but actually no existing being could give an answer. Imagine, for a moment, that the nobodies in non-existence could also ask: "Why nothing exists?" This is equivalent to my counter-question, "why nothing exists in nothingness". Now, "why anything exists" is equivalent to "why something exists in somethingness". _This_ is what I meant with my tautology, my apologies for the poor wording in my previous post. I do indeed think there probably _is_ no reason for being, or existence, in general, for reasons I stated above. However, they will still leave open the question "why this, and not that", and this is where theistic explanations come in. Science cannot give reasons for any _particular_ human being's existence. This is a deep philosophical question - is determinism true, or not? Also, is God deterministic or not? I tend to think this question has no meaning in His case. If I am for a reason, I've yet failed to see what it would be. From our perspective, it looks like 'I' exist for truly random reasons. I just rolled two dice - why did I get 6 and 1? How can I believe there is any better reason for my existence? Yes, I am satisfied with this reason, until I find something better. My 15 years of Christianity were of no help in this respect, I have to admit, but I am patient. No, it doesn't, but I think an existing God cannot know why He exists, for an answer to this question is not knowable. Of course, this should not be any obstacle to belief in His existence. It is impossible to know unknowable things. However, the question "why do I exist, in particular" is _not_ an invalid question - this is not what I said. But from our perspective, it is impossible to tell, and I can't just believe in any given explanation instead of another, especially since I found I was deluding myself. I think "pre-existence" is an oxymoron. There is no time 'outside' of this spacetime (except in some other universe), and from that perspective, our universe never was. It exists only for those who are inside it. No. The validity of the question has to be discussed separately; I think philosophy is of great help here. What can be known, and what is not knowable? This is a very good question. In trying to answer this, and numerous other questions that bothered me, I finally found nothing to base my faith on. I think it would be honest if we all asked ourselves, "why do I believe" or "why I don't believe". Petri
15
soc.religion.christian
You make it sound like this behavior is new. It isn't. A lot of pedestrian bridges have fencing that curls up over the sidewalk to make this kind of think a lot harder to do. I don't understand the mentality myself, but then again I couldn't figure out MOVE! (I'm glad they bombed 'em) or the Waco Wackos either. (Newsgroup list trimmed significantly)
7
rec.autos
Tsk.tsk. Too much argument on non-issues ! I'm Roman Catholic and it seems to me that people celebrate Easter and Christmas for itself rather than how it relates to Jesus. I don't really care about some diety. If people have some other definition of Easter, then that's their business. Don't let it interfere with my Easter. "Resurrection Sunday" 8-) Where did that come from ? If people celebrate Easter for the Cadburry bunny, that's their business.
15
soc.religion.christian
I have the following bike for sale: type: Dave Scott Centurion 1989 model size: 47 cm c-c grouppo: Shimano 105 cranks: 165 cm pedals: Shimano 105 P1050 with clips and straps frame: Tange II Double butted steel gearing: front: 52/42 rear: 24-22-19-17-15-13 seat: Terry womens gel seat computer: Avocet 30 extras: double water bottle cages extra rear tire 24" front/700c rear setup My wife is asking for $350 obo. Let me know if you are interested at the address below. Thanks, -- mike -- -- -=--------- Michael C. Whitman ---===------- National System Engineer - Telecom -----=====----- Pyramid Technology Corporation -------=======--- 1921 Gallows Road, Suite 250 ---------=========- Vienna, VA 22182
6
misc.forsale
Hai, In a few days I'm going to buy a new motherboard with local-bus(ses). It comes with a Cirrus Logic VLB card which has 2Mb RAM onboard. It can do true-color but I don't know what type of card it is. I read that Cirrus Logic cards aren't exactly the fastes around. My old system had a TSENG 4000. I was pretty pleased with it, so I consider buying a W32/TSENG card. I'd like to know a few things: - How is the speed/performance in DOS/Windows/Unix/OS/2 Graphics & Text (also compared to S3 cards for example) - What resolutions (including no. of colors) does it support (text & graphics) - How many RAM can be installed and what type of RAM - Compatibility with old TSENG 4000 - Support in software If anyone has any experience with this card (good or bad) I'd like to know. If you have a better alternative than the W32 please tell me about it. For the people in Holland: Kan iemand me misschien vertellen waar de W32 in Nederland te verkrijg is? Het liefst in de omgeving van Amsterdam!
3
comp.sys.ibm.pc.hardware
This was in Wed. WSJ. [start] The white house, seeking to mount public pressure on GOP senators, bombarded news outlets in some senator's home states with news releases warning that certain projects may not be funded if the $16billion stimulus bill isn't passed. None of the projects mentioned are actually in the bill, rather they are part of a wish list that may be funded from the $2.56 billion in Community Development Block Grants. ... [end] I could have sworn I heard a bunch of Clintonites going on and on, raving about how dishonest it was that the Rebublicans were taking items from this wish list in order to ridicule this bill. Now that Clinton is using that same list in order to garner support for the bill, are you guys going to do the honarable thing and say that Clinton is being dishonest.
18
talk.politics.misc
this borders on blasphemy.
9
rec.sport.baseball
John Berryhill, Ph.D. writes umm, please don't lump us all together. It's those blatant, fundamentalist pickers that give the rest of us a bad name. Some of us try very hard to be discreet and stay alert.
19
talk.religion.misc
First of all I never said the Holocaust. I said before the Holocaust. I'm not ignorant of the Holocaust and know more about Nazi Germany than most people (maybe including you). What I resent is ignorant statements that call people names when they disagree with your position. Opposing the atrocities commited by the Israeli governement hardly qualifies as anti-semitism. If you think name calling is a valid form of argument in intellectual circles, you need to get out more often. I don't think the suffering of some Jews during WWII justifies the crimes commited by the Israeli government. Any attempt to call Civil liberterians like myself anti-semetic is not appreciated.
17
talk.politics.mideast
So why don't ypu sue him. ----
17
talk.politics.mideast
As far as I know, tigers are not sentient. If I were pushed into a pool with some dolphins and they attacked me, I might be inclined to blame the dolphins rather than the person doing the pushing, as (a) dolphins are not usually aggressive and (b) they seem to have well-developed brains and a capacity for abstract thought. As a matter of fact, tigers rarely attack humans unless the human provokes them. Of course, if they are in a cage which is far too small, that might count as provocation...
0
alt.atheism
Where did you get this driver. Please, please, please !!!! I've been waiting months for this.
3
comp.sys.ibm.pc.hardware
Well, this particular thread of vituperation slopped its venom over into alt.atheism, where we spend most of our time entertaining arguments against our belief system, without resorting to accusing others of bigotry. It's somewhat ironic that our exposure to bigotry happens in this instance to have originated in rec.scouting, since I always understood scouting to teach tolerance and diversity. I understand bigotry to be irrational prejudice against other people who happen to be of a different race, religion, ethnic background, sex, or other inconsequential characteristics. All the evidence I've seen indicates that sexual orientation and lack of belief in gods are exactly such inconsequential characteristics. Thus, pending further evidence, I conclude that those who show prejudice against such people are bigots, and organizations that exclude such people are discriminatory.
0
alt.atheism
Archive-name: net-privacy/part2 Last-modified: 1993/3/3 Version: 2.1 IDENTITY, PRIVACY, and ANONYMITY on the INTERNET ================================================ (c) 1993 L. Detweiler. Not for commercial use except by permission from author, otherwise may be freely copied. Not to be altered. Please credit if quoted. SUMMARY ======= Email and account privacy, anonymity, file encryption, academic computer policies, relevant legislation and references, EFF, and other privacy and rights issues associated with use of the Internet and global networks in general. (Search for <#.#> for exact section. Search for '_' (underline) for next section.) PART 2 ====== (this file) Resources --------- <4.1> What UNIX programs are related to privacy? <4.2> How can I learn about or use cryptography? <4.3> What is the cypherpunks mailing list? <4.4> What are some privacy-related newsgroups? FAQs? <4.5> What is internet Privacy Enhanced Mail (PEM)? <4.6> What are other Request For Comments (RFCs) related to privacy? <4.7> How can I run an anonymous remailer? <4.8> What are references on privacy in email? <4.9> What are some email, Usenet, and internet use policies? <4.10> What is the MIT ``CROSSLINK'' anonymous message TV program? Miscellaneous ------------- <5.1> What is ``digital cash''? <5.2> What is a ``hacker'' or ``cracker''? <5.3> What is a ``cypherpunk''? <5.4> What is `steganography' and anonymous pools? <5.5> What is `security through obscurity'? <5.6> What are `identity daemons'? <5.7> What standards are needed to guard electronic privacy? Issues ------ <6.1> What is the Electronic Frontier Foundation (EFF)? <6.2> Who are Computer Professionals for Social Responsibility (CPSR)? <6.3> What was `Operation Sun Devil' and the Steve Jackson Game case? <6.4> What is Integrated Services Digital Network (ISDN)? <6.5> What is the National Research and Education Network (NREN)? <6.6> What is the FBI's proposed Digital Telephony Act? <6.7> What other U.S. legislation is related to privacy on networks? <6.8> What are references on rights in cyberspace? <6.9> What is the Computers and Academic Freedom (CAF) archive? Footnotes --------- <7.1> What is the background behind the Internet? <7.2> How is Internet `anarchy' like the English language? <7.3> Most Wanted list <7.4> Change history * * * RESOURCES ========= _____ <4.1> What UNIX programs are related to privacy? For more information, type `man [cmd]' or `apropos [keyword]' at the UNIX shell prompt. passwd - change password finger - obtain information about a remote user chfn - change information about yourself obtainable by remote users (sometimes `passwd -f') chmod - change the rights associated with a file or directory umask - (shell) change the default (on creation) file access rights ls - list the rights associated with files and directories xhost - allow or disable access control of particular users to an Xwindow server last - list the latest user logins on the system and their originations who - list other users, login/idle times, originations w - list other users and what they are running xhost - access control list for X Window client use xauth - control X Window server authentication .signature - file in the home directory appended to USENET posts .forward - file used to forward email to other accounts .Xauthority - file used for X Window server authentication keys $SIGNATURE - variable used for name in email and USENET postings The 'tcpdump' packet-tracing program is loosely based on SMI's "etherfind" although none of the etherfind code remains. It was originally written by Van Jacobson, Lawrence Berkeley Laboratory, as part of an ongoing research project to investigate and improve tcp and internet gateway performance. A current version is available via anonymous ftp from host ftp.ee.lbl.gov (currently at address 128.3.254.68) file tcpdump.tar.Z (a compressed Unix tar file). This program is subject to the 'standard' Berkeley network software copyright. _____ <4.2> How can I learn about or use cryptography? A general introduction to mostly theoretical cryptographic issues, especially those frequently discussed in sci.crypt, is available in FAQ form: > Compiled by: > cme@ellisun.sw.stratus.com (Carl Ellison) > Gwyn@BRL.MIL (Doug Gwyn) > smb@ulysses.att.com (Steven Bellovin) NIST (U.S. National Institute for Standards and Technology) publishes an introductory paper on cryptography, special publication 800-2 ``Public-Key Cryptograhy'' by James Nechvatal (April 1991). Available via anonymous FTP from csrc.ncsl.nist.gov (129.6.54.11), file pub/nistpubs/800-2.txt. Also via available anonymous FTP from wimsey.bc.ca as crypt.txt.Z in the crypto directory. Covers technical mathematical aspects of encryption such as number theory. More general information can be found in a FAQ by Paul Fahn of RSA Labortories via anonymous FTP from rsa.com in /pub/faq.ps.Z. See the `readme' file for information on the `tex' version. Also available as hardcopy for $20 from RSA Laboratories, 100 Marine Parkway, Redwood City, CA 94065. Send questions to faq-editor@rsa.com. Phil Zimmerman's PGP (Pretty Good Privacy) public-domain package for public key encryption is available at numerous sites, and is in widespread use over the internet for general UNIX-based file encryption (including email). Consult the archie FTP database. Also see the newsgroup alt.security.pgp. Mailing list requests to info-pgp-request@lucpul.it.luc.edu. From the RIPEM FAQ by Marc VanHeyningen <mvanheyn@whale.cs.indiana.edu> on news.answers: > RIPEM is a program which performs Privacy Enhanced Mail (PEM) > using the cryptographic techniques of RSA and DES. It allows > your electronic mail to have the properties of authentication > (i.e. who sent it can be confirmed) and privacy (i.e. nobody can > read it except the intended recipient.) > > RIPEM was written primarily by Mark Riordan > <mrr@scss3.cl.msu.edu>. Most of the code is in the public domain, > except for the RSA routines, which are a library called RSAREF > licensed from RSA Data Security Inc. > > RIPEM is available via anonymous FTP to citizens and permanent > residents in the U.S. from rsa.com; cd to rsaref/ and read the > README file for info. > > RIPEM, as well as some other crypt stuff, has its `home site' on > rpub.cl.msu.edu, which is open to non-anonymous FTP for users in > the U.S. and Canada who are citizens or permanent residents. To > find out how to obtain access, ftp there, cd to pub/crypt/, and > read the file GETTING_ACCESS. Note: cryptography is generally not well integrated into email yet and some system proficiency is required by users to utilize it. _____ <4.3> What is the cypherpunks mailing list? Eric Hughes <hughes@toad.com> runs the `cypherpunk' mailing list dedicated to ``discussion about technological defenses for privacy in the digital domain.'' Send email to cypherpunks-request@toad.com to be added or subtracted from the list. From the charter: > The most important means to the defense of privacy is encryption. > To encrypt is to indicate the desire for privacy. But to encrypt > with weak cryptography is to indicate not too much desire for > privacy. Cypherpunks hope that all people desiring privacy will > learn how best to defend it. _____ <4.4> What are some privacy-related newsgroups? FAQs? Newsgroups ========== alt.comp.acad-freedom.news alt.comp.acad-freedom.talk -------------------------- Moderated and unmoderated issues related to academic freedom and privacy at universities. Documented examples of violated privacy in e.g. email. Documented examples of `censorship' as in e.g. limiting USENET groups local availability. alt.cyberpunks -------------- Virtual reality, (science) fiction by William Gibson and Bruce Sterling, cyberpunk in the mainstream. alt.hackers ----------- USENET Network News Transfer Protocol (NNTP) posting mechanisms, Simple Mail Transfer Protocol (SMTP), `obligatory hack' reports. alt.privacy ----------- General privacy issues involving taxpaying, licensing, social security numbers, etc. alt.security comp.security.misc ------------------ Computer related security issues. FAQ in news.answers below. alt.security.pgp alt.security.ripem ---------------- Dedicated to discussing public domain cryptographic software packages: PGP, or ``Pretty Good Privacy'' Software developed by Phil Zimmerman for public key encryption, and RIPEM by Mark Riordan for public key and DES encryption. comp.society.privacy -------------------- Privacy issues associated with computer technologies. Examples: caller identification, social security numbers, credit applications, mailing lists, etc. Moderated. comp.eff.news comp.eff.talk ------------- Moderated and unmoderated groups associated with the Electronic Frontier Foundation started by Mitch Kapor for protecting civil and constitutional rights in the electronic realm. news.admin news.admin.policy ----------------- Concerns of news administrators. NNTP standards and mechanisms. news.lists ---------- USENET traffic distributions. Most frequent posters, most voluminous groups, most active sites, etc. sci.crypt --------- Considers scientific and social issues of cryptography. Examples: legitimate use of PGP, public-key patents, DES, cryptographic security, cypher breaking, etc. FAQs ==== FAQs or ``Frequently-Asked Questions'' are available in the newsgroups *.answers or via anonymous FTP to pit-manager.mit.edu [18.172.1.27] (also rtfm.mit.edu) from the directory /pub/usenet/news.answers/[x] where [x] is the archive name. This FAQ is archived in the file `net-privacy'. Others are: network-info/part1 ------------------ Sources of information about the Internet and how to connect to it, through the NSF or commercial vendors. alt-security-faq ---------------- Computer related security issues arising in alt.security and comp.security.misc, mostly UNIX related. ssn-privacy ----------- Privacy issues associated with the use of the U.S. Social Security number (SSN). pdial ----- Public dialup internet accounts list. college-email/part1 ------------------- How to find email addresses for undergraduate and graduate students, faculty and staff at various colleges and universities. ripem/faq --------- Information on RIPEM, a program for public key mail encryption officially sanctioned by Public Key Partners Inc., the company that owns patents on public key cryptography. unix-faq/faq/part1 ------------------ Frequently-asked questions about UNIX, including information on `finger' and terminal spying. distributions/* --------------- Known geographic, university, and network distributions. _____ <4.5> What is internet Privacy Enhanced Mail (PEM)? Internet drafts on Privacy Enhanced Mail (PEM) describe a standard under revision for six years delineating the official protocols for email encryption. The standard has only recently stabilized and implementations are being developed. - RFC-1421: ``Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures.'' J. Linn <104-8456@mcimail.com> - RFC-1422: ``Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management'' S. Kent <Kent@BBN.com> - RFC-1424: ``Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services'' B. Kaliski <burt@rsa.com> - RFC-1423: ``Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers'' D. Balenson <belenson@tis.com> Send email to pem-info@tis.com for more information. See ``RFCs related to privacy'' for information on how to obtain RFCs. _____ <4.6> What are other Requests For Comments (RFCs) related to privacy? RFC-822: SMTP, Simple Mail Transfer Protocol RFC-977: NNTP, Network News Transfer Protocol RFC-1036: Standard for interchange of network news messages RFC-1208: Glossary of Networking Terms RFC-1207: Answers to ``experienced Internet user'' questions RFC-1206: Answers to ``new Internet user'' questions RFC-1355: Privacy issues in Network Information center databases RFC-1177 is ``FYI: Answers to commonly asked ``new internet user'' questions, and includes: basic terminology on the Internet (TCP/IP, SMTP, FTP), internet organizations such as IAB (Internet Activities Board) and IETF (Internet Enbgineering Task Force), and a glossary of terms. Also from ftp.eff.org: /pub/internet-info/internet.q. > RFCs can be obtained via FTP from NIC.DDN.MIL, with the pathname > RFC:RFCnnnn.TXT or RFC:RFCnnnn.PS (where `nnnn' refers to the > number of the RFC). Login with FTP, username `anonymous' and > password `guest'. The NIC also provides an automatic mail > service for those sites which cannot use FTP. Address the > request to SERVICE@NIC.DDN.MIL and in the subject field of the > message indicate the RFC number, as in `Subject: RFC nnnn' (or > `Subject: RFC nnnn.PS' for PostScript RFCs). > > RFCs can also be obtained via FTP from NIS.NSF.NET. Using FTP, > login with username `anonymous' and password `guest'; then > connect to the RFC directory (`cd RFC'). The file name is of the > form RFCnnnn.TXT-1 (where `nnnn' refers to the number of the > RFC). The NIS also provides an automatic mail service for those > sites which cannot use FTP. Address the request to > NIS-INFO@NIS.NSF.NET and leave the subject field of the message > blank. The first line of the text of the message must be `SEND > RFCnnnn.TXT-1', where nnnn is replaced by the RFC number. _____ <4.7> How can I run an anonymous remailer? Cypherpunk remailer source is at soda.berkeley.edu in the /pub/cypherpunks directory. It's written in PERL, and is relatively easy to install (no administrative rights are required). Karl Barrus <elee9sf@menudo.uh.edu> has more information and modifications. Also, most remailer operators mentioned above are amenable to discussing features, problems, and helping new sites become operational. Address all points in the section ``responsibities of anonymous use'' in this document prior to advertising your service. You should be committed to the long-term stability of the site and avoid running one surreptitiously. _____ <4.8> What are references on privacy in email? Brown, Bob. ``EMA Urges Users to Adopt Policy on E-mail Privacy.'' Network World (Oct 29, 1990), 7.44: 2. Bairstow, Jeffrey. ``Who Reads your Electronic Mail?'' Electronic Business (June 11, 1990) 16 (11): 92. ``Electronic Envelopes - the uncertainty of keeping e-mail private'' Scientific American, February 1993. ftp.eff.org =========== /pub/eff/papers/email_privacy --- Article on the rights of email privacy. by Ruel T. Hernandez. /pub/academic/law/privacy.email --- ``Computer Electronic Mail and Privacy'', an edited version of a law school seminar paper by Ruel T. Hernadez. /pub/eff/papers/email-privacy-biblio-2 --- Compilation of bibliography on E-Mail and its privacy issues (part 2 of the work). Compiled by Stacy B. Veeder (12/91). /pub/eff/papers/email-privacy-research --- The author at Digital Research tried to formalize their employee privacy policy on E-Mail. The casesightings are divided into two groups: US Constitutional law, and California law. /pub/eff/papers/company-email --- Formulating a Company Policy on Access to and Disclosure of Electronic Mail on Company Computer Systems by David R. Johnson and John Podesta for the Electronic Mail Assocation /pub/cud/alcor --- Information on Alcor Co., an e-mail privacy suit. /pub/academic/law/privacy.email --- Email privacy search at Berkeley. _____ <4.9> What are some email, Usenet, and internet use policies? The Computer Policy and Critiques Archive is a collection of the computer policies of many schools and networks, run by the Computers and Academic Freedom group on the Electronic Frontier Foundation FTP site. The collection also includes critiques of some of the policies. > If you have gopher, the archive is browsable with the command: > gopher -p academic/policies gopher.eff.org > > The archive is also accessible via anonymous ftp and email. Ftp > to ftp.eff.org (192.88.144.4). It is in directory > `pub/academic/policies'. For email access, send email to > archive-server@eff.org. Include the line: > > send acad-freedom/policies <filenames> > > where <filenames> is a list of the files that you want. File > README is a detailed description of the items in the directory. > > For more information, to make contributions, or to report typos > contact J.S. Greenfield (greeny@eff.org). Directory `widener' > contains additional policies (but not critiques). ftp.eff.org =========== /pub/cud/networks --- Acceptable Use Policies for various networks, including CompuServe (file `compuserve'), NSFNET (file `nsfnet') with information on research and commercial uses. See /pub/cud/networks/index. /pub/cud/networks/email --- Policies from various sysadmins about how they handle the issue of email privacy, control, and abuse, compiled by T. Hooper <hooper_ta@cc.curtin.edu.au>. /pub/cud/schools/ --- Computer use policies of a number of schools. See schools/Index for a full list and description. Commentary ========== /pub/academic/faq/policy.best --- Opinions on the best academic computer policies. /pub/academic/faq/email.policies --- Do any universities treat email and computer files as private? /pub/academic/faq/netnews.writing --- Policies on what users write on Usenet. /pub/academic/faq/netnews.reading --- Policies on what users read on Usenet: should my university remove (or restrict) Netnews newsgroups because some people find them offensive? /pub/academic/faq/policy --- What guidance is there for creating or evaluating a university's academic computer policy? ______ <4.10> What is the MIT ``CROSSLINK'' anonymous message TV program? > CROSSLINK is an anonymous message system run on MIT Student > Cable TV-36. It provides an anonymous medium through which MIT > students can say those things they might otherwise find > difficult, inconvenient or impossible to say in person. It's > also a way to send fun or totally random messages to your > friends over the air. It is similar to the anonymous message > pages found in many college newspapers, except that it's > electronic in nature and it's free. Messages can be posted to the service via email. For more information send email to crosslink@athena.mit.edu. MISCELLANEOUS ============= _____ <5.1> What is ``digital cash''? With digital encryption and authentication technologies, the possibility of a widespread digital cash system may someday be realized. A system utilizing codes sent between users and banks (similar to today's checking system except entirely digital) may be one approach. The issues of cryptography, privacy, and anonymity are closely associated with transfer of cash in an economy. See the article in Scientific American by David Chaum (~Dec.1992). An experimental digital bank is run by Karl Barrus <elee9sf@Menudo.UH.EDU> based on suggestions by Hal Finney on the cypherpunks mailing list. To use the server send mail to elee7h5@rosebud.ee.uh.edu message with the following text: :: command: help user@host where `user@host' is your email address. _____ <5.2> What is a ``hacker'' or ``cracker''? These terms arouse strong feelings by many on their meaning, especially on the internet. In the general news media in the past a person who uses computers and networks to malicious ends (such as breaking into systems) has been referred to as a hacker, but most internet users prefer the term ``cracker'' for this. Instead, a ``hacker'' is perceived as a benign but intensely ambitious, curious, and driven computer user who explores obscure areas of a system, for example---something of a proud electronic pioneer and patriot. This is the sense intended in this document. See also the ``Hacker's Dictionary'' and the FAQ `alt-security-faq'. _____ <5.3> What is a ``cypherpunk''? From the charter of the cypherpunk mailing list: > Cypherpunks assume privacy is a good thing and wish there were > more of it. Cypherpunks acknowledge that those who want privacy > must create it for themselves and not expect governments, > corporations, or other large, faceless organizations to grant > them privacy out of beneficence. Cypherpunks know that people > have been creating their own privacy for centuries with whispers, > envelopes, closed doors, and couriers. Cypherpunks do not seek > to prevent other people from speaking about their experiences or > their opinions. See information on the cypherpunk mailing list below. See also the CryptoAnarchist Manifesto and the Cryptography Glossary in soda.berkeley.edu:/pub/cypherpunks. _____ <5.4> What is `steganography' and anonymous pools? Closely associated with encryption is `steganography' or the techniques for not only pursuing private (encrypted) communication but concealing the very existence of the communication itself. Many new possibilities in this area are introduced with the proliferation of computer technology. For example, it is possible to encode messages in the least-significant bits of images, typically the most 'noisy'. In addition, when such an item is posted in a public place (such as a newsgroup), virtually untraceable communication can take place between sender and receiver. For steganographic communications in the electronic realm one another possibility is setting up a mailing list where individual messages get broadcast to the entire list and individual users decode particular messages with their unique key. An anonymous pool has been set up by Miron Cuperman (miron@extropia.wimsey.com) for experiments. Send email to <pool0-request@extropia.wimsey.com> with one of the following commands in the subject line: subscribe unsubscribe help _____ <5.5> What is `security through obscurity'? `Security through obscurity' refers to the attempt to gain protection from system weaknesses by hiding sensitive information or programs relating to them. For example, a company may not make public information on its software's encryption techniques to evade `attacks' based on knowledge of it. Another example would be concealing data on the existence of security holes or bugs in operating systems. Or, some reliance may be made on the fact that some standard or mechanism with potential problems is serious because they are ``not widely known'' or ``not widely used.'' This argument is occasionally applied to mechanisms for email and Usenet posting `forgery'. `Security through obscurity' is regarded as a very feeble technique at best and inappropriate and ineffective at worst (also called the ``head-in-the-sand approach''). See the FAQ for alt.security. Some remarks of John Perry Barlow, cofounder of the Electronic Frontier Foundation, directed to NSA agents at the First International Symposium on National Security & National Competitiveness held in McLean, Virginia Dec. 1, 1992: > Digitized information is very hard to stamp classified or keep > contained. ... This stuff is incredibly leaky and volatile. It's > almost a life form in its ability to self-propagate. If > something hits the Net and it's something which people on there > find interesting it will spread like a virus of the mind. I > believe you must simply accept the idea that we are moving into > an environment where any information which is at all interesting > to people is going to get out. And there will be very little > that you can do about it. This is not a bad thing in my view, > but you may differ... _____ <5.6> What are `identity daemons'? RFC-931 describes a protocol standard that allows UNIX programs to query a remote user's login name after connection to a local communication socket (a connection of this type is established during FTP and TELNET sessions, for example). The standard is not widely supported, perhaps 10% of internet sites currently implement it but the number is increasing. The mechanism is detrimental to anonymity. Regular users cannot disable it but system adminstrators can circumvent it. This standard may represent a trend toward greater authentication mechanisms. _____ <5.7> What new standards are needed to guard electronic privacy? Remailing/Posting ----------------- - Stable, secure, protected, officially sanctioned and permitted, publicly and privately operated anonymous servers and hubs. - Official standards for encryption and anonymity in mail and USENET postings. - Truly anonymous protocols with source and destination information obscured or absent and hidden routing mechanisms (chaining, encrypted addresses, etc.) - Standards for anonymous email addressing, embedding files, and remailer site chaining. General ------- - Recognition of anonymity, cryptography, and related privacy shields as legitimate, useful, desirable, and crucial by the general public and their governments. - Widespread use and implementation of these technologies by systems designers into hardware, software, and standards, implemented `securely,' `seamlessly,' and `transparently'. - General shift of use, dependence, and reliance to means other than wiretapping and electronic surveillance by law enforcement agencies. - Publicity, retraction, and dissolution of laws and government agencies opposed to privacy, replaced by structures dedicated to strengthening and protecting it. ISSUES ====== _____ <6.1> What is the Electronic Frontier Foundation (EFF)? From ftp.eff.org:/pub/EFF/mission_statement: > A new world is arising in the vast web of digital, electronic > media which connect us. Computer-based communication media like > electronic mail and computer conferencing are becoming the basis > of new forms of community. These communities without a single, > fixed geographical location comprise the first settlements on an > electronic frontier. > > While well-established legal principles and cultural norms give > structure and coherence to uses of conventional media like > newspapers, books, and telephones, the new digital media do not > so easily fit into existing frameworks. Conflicts come about as > the law struggles to define its application in a context where > fundamental notions of speech, property, and place take > profoundly new forms. People sense both the promise and the > threat inherent in new computer and communications technologies, > even as they struggle to master or simply cope with them in the > workplace and the home. > > The Electronic Frontier Foundation has been established to help > civilize the electronic frontier; to make it truly useful and > beneficial not just to a technical elite, but to everyone; and to > do this in a way which is in keeping with our society's highest > traditions of the free and open flow of information and > communication. EFF was started by the multimillionaire Mitchell Kapor, founder of Lotus software, and John Barlow, lyricist for the Grateful Dead rock band. A highly publicized endeavor of the organization involved the legal defense of Steve Jackson Games after an FBI raid and an accompanying civil suit (see section on ``Steve Jackson Games''). The foundation publishes EFF News (EFFector Online) electronically, send requests to effnews-request@eff.org. In a letter to Mitchell Kapor from the Chairman of the Subcommittee with primary jurisdiction over telecommunications policy dated November 5, 1991, Representative Edward J. Markey complemented Mitchell Kapor on his ``insights on the development of a national public information infrastructure'' which ``were appreciated greatly by myself and the Members of the Subcommittee'' (complete text in ftp.eff.com:/pub/pub-infra/1991-12): > ...we need to pursue policies that encourage the Bell companies to > work with other sectors of the communications industry to create > a consumer-oriented, public information network. Please let me or > my staff know what policies you and others in the computer > industry believe would best serve the public interest in creating > a reasonably priced, widely available network in which > competition is open and innovation rewarded. I also want to > learn what lessons from the computer industry over the past ten > to fifteen years should apply to the current debate on > structuring the information and communications networks of the > future....I ask your help in gaining input from the computer > industry so that the Subcommittee can shape policies that will > bring this spirit of innovation and entrepreneurship to the > information services industry. ftp.eff.org =========== /pub/eff/about-eff --- A file of basic information about EFF including goals, mission, achievements, and current projects. Contains a membership form. /pub/eff/mission-statement --- EFF mission statement. /pub/eff/historical/founding-announcement --- EFF founding press release. /pub/eff/historical/eff-history --- John Perry Barlow's ``Not Terribly Brief History of the EFF'' (July 10, 1990). How EFF was conceived and founded, major legal cases, and the organizational directions. /pub/eff/historical/legal-case-summary --- EFF legal case summary. _____ <6.2> Who are Computer Professionals for Social Responsibility (CPSR)? The Computer Professionals for Social Responsibility have been working to protect and promote electronic civil liberties issues since ~1982. The group has three offices (Palo Alto, Cambridge, Washington, DC) and 20 chapters. It is involved in litigation against the FBI, The NSA, NIST, the Secret Service and other other U.S. government agencies to declassify and provide documentation on issues such as Operation Sundevil, the FBI wiretap proposal, NSA's interference in crypography, the breakup of the 2600 raid in Arlington, Va in Nov 1992. Members speak frequently in front on Congress, state legislators and public utility commissions to testify on privacy, information policy, computer security, and caller identification. CPSR has created an extensive Internet Privacy library available via FTP, Gopher, WAIS, and email at cpsr.org, currently comprising the largest collection of privacy documents on the internet. For more information, anonymous FTP cpsr.org:/cpsr/. (Thanks to Dave Banisar <banisar@washofc.cpsr.org> for contributions here.) _____ <6.3> What was `Operation Sundevil' and the Steve Jackson Game case? In the early 1990's a fear spread among U.S. law enforcement agencies on the illicit activities of `hackers' and `phreakers' involved in such activities as credit card fraud and long-distance call thievery. (see ftp.eff.org:/pub/SJG/General_Information/EFFector1.04): > `Operation Sundevil,' the Phoenix-inspired crackdown of May > 8,1990, concentrated on telephone code-fraud and credit-card > abuse, and followed this seizure plan with some success. > [Bulletin Board Systems] went down all over America, terrifying > the underground and swiftly depriving them of at least some of > their criminal instruments. It also saddled analysts with some > 24,000 floppy disks, and confronted harried Justice Department > prosecutors with the daunting challenge of a gigantic nationwide > hacker show-trial involving highly technical issues in dozens of > jurisdictions. Massive `show-trials' never materialized, although isolated instances of prosecution were pursued. The movement reached a crescendo in Texas with the highly publicized case of illegal search and seizure involving the Steve Jackson Games company of Austin Texas on March 1, 1990. From the column GURPS' LABOUR LOST by Bruce Sterling <bruces@well.sf.ca.us> in Fantasy and Science Fiction Magazine: > In an early morning raid with an unlawful and unconstitutional > warrant, agents of the Secret Service conducted a search of the > SJG office. When they left they took a manuscript being prepared > for publication, private electronic mail, and several computers, > including the hardware and software of the SJG Computer Bulletin > Board System. Yet Jackson and his business were not only > innocent of any crime, but never suspects in the first place. > The raid had been staged on the unfounded suspicion that > somewhere in Jackson's office there `might be' a document > compromising the security of the 911 telephone system. FBI agents involved in the seizure were named in a civil suit filed on behalf of Steve Jackson Games by The Electronic Frontier Foundation. See information on EFF below. From an article by Joe Abernathy in the Houston Chronicle ~Feb 1, 1993: > AUSTIN -- An electronic civil rights case against the Secret > Service closed Thursday with a clear statement by federal > District Judge Sam Sparks that the Service failed to conduct a > proper investigation in a notorious computer crime crackdown, > and went too far in retaining custody of seized equipment. > > Secret Service Special Agent Timothy Foley of Chicago, who was in > charge of three Austin computer search-and-seizures on March 1, > 1990, that led to the lawsuit, stoically endured Spark's rebuke > over the Service's poor investigation and abusive computer > seizure policies. While the Service has seized dozens of > computers since the crackdown began in 1990, this is the first > case to challenge the practice. > > Sparks grew visibly angry when it was established that the Austin > science fiction magazine and game book publisher was never > suspected of a crime, and that agents did not do even marginal > research to establish a criminal connection between the firm and > the suspected illegal activities of an employee, or to determine > that the company was a publisher. Indeed, agents testified that > they were not even trained in the Privacy Protection Act at the > special Secret Service school on computer crime. > > "How long would it have taken you, Mr. Foley, to find out what > Steve Jackson Games did, what it was?" asked Sparks. "An hour? > > "Was there any reason why, on March 2, you could not return to > Steve Jackson Games a copy, in floppy disk form, of everything > taken? > > "Did you read the article in Business Week magazine where it had > a picture of Steve Jackson -- a law-abiding, tax-paying citizen > -- saying he was a computer crime suspect? > > "Did it ever occur to you, Mr. Foley, that seizing this material > could harm Steve Jackson economically?" > > Foley replied, "No, sir," but the judge offered his own answer. > > "You actually did, you just had no idea anybody would actually go > out and hire a lawyer and sue you." > > More than $200,000 has been spent by the Electronic Frontier > Foundation in bringing the case to trial. The EFF was founded by > Mitchell Kapor amid a civil liberties movement sparked in large > part by the Secret Service computer crime crackdown. ftp.eff.org =========== /pub/cud/papers/sundevil --- A collection of information on Operation SunDevil by the Epic nonprofit publishing project. Everything you wanted to know but could never find. /pub/cud/papers/sj-resp --- Steve Jackson's response to the charges against him. _____ <6.4> What is Integrated Services Digital Network (ISDN)? ISDN is a high-speed data communications standard that utilizes existing copper telephone lines, and is a possible inexpensive and intermediate alternative to laying fiber optic cable for phone networks. The speeds involved may be sufficient for audio and video transmission applications. G. V. der Leun in the file ftp.eff.org: /pub/pub-infra/1991-11: > Telecommunications in the United States is at a crossroads. With > the Regional Bell Operating Companies now free to provide > content, the shape of the information networking is about to be > irrevocably altered. But will that network be the open, > accessible, affordable network that the American public needs? > You can help decide this question. > > The Electronic Frontier Foundation recently presented a plan to > Congress calling for the immediate deployment of a national > network based on existing ISDN technology, accessible to anyone > with a telephone connection, and priced like local voice service. > We believe deployment of such a platform will spur the > development of innovative new information services, and maximize > freedom, competitiveness, and civil liberties throughout the > nation. > > The EFF is testifying before Congress and the FCC; making > presentations to public utility commisions from Massachusetts to > California; and meeting with representatives from telephone > companies, publishers, consumer advocates, and other stakeholders > in the telecommunications policy debate. > > The EFF believes that participants on the Internet, as pioneers on > the electronic frontier, need to have their voices heard at this > critical moment. To automatically receive a description of the platform and details, send mail to archive-server@eff.org, with the following line: send documents open-platform-overview or send mail to eff@eff.org. See also the Introduction to the EFF Open Platform Proposal in ftp.eff.org:/pub/pub-infra/1991-02. References ========== ``Digital Data On Demand.'' MacWorld, 2/82 (page 224). --- 56Kbps vs. ISDN services and products. See comments by J. Powers in ftp.eff.org:pub/pub-infra/1992-02. ``Telephone Service That Rings of the Future.'' By Joshua Quittner. Newsday, Tue, Jan 7 1992. --- Implications of ISDN for the masses, written in popular science style. John Perry Barlow (cofounder EFF). Regional telephone companies (Ohio Bell). ISDN as ``Technological Rorschach Test.'' Anecdotes about McDonald's, Barbara Bush teleconferencing. See complete text in ftp.eff.org:/pub/pub-infra/1992-01. ftp.eff.org:/pub/pub-infra/ --- Files 1991-11 through 1992-05 containing email from the EFF public infrastructure group organized by month. Opinions and facts on the pros and cons of ISDN, Integrated Services Digital Network. Uses of ISDN (phone video, audio, etc.) Japanese model. Alternatives to ISDN (HDSL, ADSL, fiber optics). Technical specifications of ISDN, implementation details, cost issues, political obstacles, (RBOC, Regional Bell Operating Companies or `Baby Bells', e.g. NET, New England Telephone). Influencing development of future networks (e.g. ISDN and NREN, National Research and Education Network), encouraging competition (cable TV systems). Press releases and news articles. Letter from Rep. E. J. Markey to M. Kapor. _____ <6.5> What is the National Research and Education Network (NREN)? The Nation Research and Education Network was introduced in legislation cosponsored by Sen. A. Gore to promote high-speed data network infrastructure augmenting the internet with up to 50 times faster transmission rates. The bill passed the House on November 20, 1991, the Senate on November 22, 1991, and was signed by the President on December 9, 1991. ftp.eff.org =========== /pub/EFF/legislation/nren-bill-text --- The complete text of the House-Senate compromise version of S. 272, the High-Performance Computing Act. /pub/internet-info/gore.bill --- 102nd congress 1st Session. Text of high performance computing bill cosponsored by Sen. A. Gore. /pub/EFF/legislation/gore-infrastructure-bill --- The text of S.2937, the Information Infrastructure and Technology Act of 1992 introduced by Senator Gore to expand Federal efforts to develop technologies for applications of high-performance computing and high-speed networking, and to provide for a coordinated Federal program to accelerate development and deployment of an advanced information infrastructure. U.S. SAID TO PLAY FAVORITES IN PROMOTING NATIONWIDE COMPUTER NETWORK By John Markoff, N.Y. Times (~18 Dec 91). --- President Bush's legislation for natiowide computer data `superhighway.' IBM-MCI venture as monopoly destructive to fair competition and innovation? National Science Foundation NSFnet. complete text in /pub/pub-infra/1991-12. Commentary ========== /pub/academic/statements/nren.privacy.cpsr --- ``Proposed Privacy Guidelines for the NREN'' -- Statement of Marc Rotenberg, Washington Director Computer Professionals for Social Responsibility (CPSR). /pub/internet-info/cisler.nren --- The National Research and Education Network: Two meetings Steve Cisler, Senior Scientist Apple Computer Library December 17, 1990 Summary of meetings exploring educational issues of NREN by diverse members of academia and industry. /pub/internet-info/privatized.nren --- Feb. 14 1991 essay by M. Kapor advocating advantages of a private National Public Network, and specific recommendations for open NREN policies encouraging competition. /pub/eff/papers/netproposition --- An FYI about the proposed NREN setup. _____ <6.6> What is the FBI's proposed Digital Telephony Act? ``Providers of electronic communication services and private branch exchange operators shall provide within the United States capability and capacity for the government to intercept wire and electronic communications when authorized by law...'' From `BBS Legislative Watch: FBIs Wiretapping Proposal Thwarted' by S. Steele in Boardwatch Magazine, Feb. 1993, p. 19-22: > In a move that worried privacy experts, software manufacturers and > telephone companies, the FBI proposed legislation to amend the > Communications Act of 1934 to make it easier for the Bureau to > perform electronic wiretapping. The proposed legislation, > entitled 'Digital Telephony,' would have required communications > service providers and hardware manufacturers to make their > systems 'tappable' by providing 'back doors' through which law > enforcement officers could intercept communications. Furthermore, > this capability would have been provided undetectably, while the > communications was in progress, exclusive of any communications > between other parties, regardless of the mobility of the target > of the FBI's investigation, and without degradation of service. > > ...under the proposal, the Department of Justice (DOJ) can keep > communications products off the market if it determines that > these products do not meet the DOJ's own ... guidelines. This > [could] result in increased costs and reduced competitiveness for > service providers and equipment manufacturers, since they will be > unlikely to add any features that may result in a DOJ rejection > of their entire product. ...the FBI proposal suggests that the > cost of this wiretapping 'service' to the Bureau would have to be > borne by the service provider itself... > > The Electronic Frontier Foundation organized a broad coalition of > public interest and industry groups, from Computer Professionals > for Social Responsibilty (CPSR) and the ACLU to AT&T and Sun > Microsystems, to oppose the legislation. A white paper produced > by the EFF and ratified by the coalition, entitled, `An Analysis > of the FBI Digital Telephony Proposal,' was widely distributed > throughout the Congress. ... The Justice Department lobbied hard > in the final days to get Congress to take up the bill before > Congress adjourned, but the bill never ... found a Congressional > sponsor (and was therefore never officially introduced). The FBI > [may] reintroduce "Digital Telephony" when the 103rd Congress > convenes in January. ftp.eff.org =========== /pub/eff/legislation/fbi-wiretap-bill /pub/EFF/legislation/new-fbi-wiretap-bill --- A bill to ensure the continuing access of law enforcement to the content of wire and electronic communications when authorized by law and for other purposes. Version 2 of the bill after FBI changes in response to public response. /pub/cud/law/hr3515 --- House of Rep bill 3515, Telecommunications Law. Commentary ========== /pub/eff/papers/eff-fbi-analysis --- The EFF-sponsored analysis of the FBI's Digital Telephony proposal. /pub/eff/papers/ecpa.layman --- The Electronic Communications Privacy Act of 1986: A Layman's View. /pub/eff/papers/nightline-wire --- Transcript of ABC's Nightline of May 22, 1992, on the FBI, Privacy, and Proposed Wire-Tapping Legislation. Featured are Marc Rotenberg of the CPSR and William Sessions, Director of the FBI. /pub/eff/papers/edwards_letter --- A letter from the Director of the Secret Service to US Rep. Don Edwards, D-California, in response to questions raised by Edwards' Subcommittee. This copy came from Computer Professionals for Social Responsibility in Washington, D.C. /pub/eff/papers/fbi.systems --- A description of how information is stored on the FBI's computer systems. _____ <6.7> What other U.S. legislation is related to privacy? ftp.eff.org =========== /pub/cud/law/<state> --- State computer crime laws: AL, AK, AZ, CA, CO, CT, DE, FL, GA, HI, IA, ID, IL, IN, MD, MN, NC, NJ, NM, NY, OR, TX, VT, VA, WA, WI, WV. /pub/cud/law/<country> --- Current computer crime laws for: The United States (federal code), Canada, Ghana, and Great Britain. /pub/cud/law/bill.s.618 --- Senate bill 618, addressing registration of encryption keys with the government. /pub/cud/law/improve --- Improvement of Information Access bill. /pub/cud/law/monitoring --- Senate bill 516; concerning abuses of electronic monitoring in the workplace. /pub/cud/law/us.e-privacy --- Title 18, relating to computer crime & email privacy. /pub/academic/law/privacy.electronic.bill --- The text of Simon's electronic privacy bill, S. 516. ``To prevent potential abuses of electronic monitoring in the workplace.'' _____ <6.8> What are references on rights in cyberspace? ftp.eff.org =========== /pub/cud/papers/const.in.cyberspace --- Laurence Tribe's keynote address at the first Conference on Computers, Freedom, & Privacy. `The Constitution in Cyberspace' /pub/cud/papers/denning --- Paper presented to 13th Nat'l Comp Security Conf ``Concerning Hackers Who Break into Computer Systems'' by Dorothy E Denning. /pub/cud/papers/privacy --- ``Computer Privacy vs First and Fourth Amendment Rights'' by Michael S. Borella /pub/cud/papers/rights-of-expr --- Rights of Expression in Cyberspace by R. E. Baird /pub/academic/eff.rights --- Bill of Rights' meaning in the Electronic Frontier. _____ <6.9> What is the Computers and Academic Freedom (CAF) archive? The CAF Archive is an electronic library of information about computers and academic freedom. run by the Computers and Academic Freedom group on the Electronic Frontier Foundation FTP site. > If you have gopher, the archive is browsable with the command: > gopher -p academic gopher.eff.org > > It is available via anonymous ftp to ftp.eff.org (192.88.144.4) in > directory `pub/academic'. It is also available via email. For > information on email access send email to archive-server@eff.org. > In the body of your note include the lines `help' and `index'. > > For more information, to make contributions, or to report typos > contact J.S. Greenfield (greeny@eff.org). ftp.eff.org =========== /pub/academic/statements/caf-statement --- Codifies the application of academic freedom to academic computers, reflecting seven months of on-line discussion about computers and academic freedom. Covers free expression, due process, privacy, and user participation. /pub/academic/books --- Directory of book references related to Computers and Academic Freedom or mentioned in the CAF discussion. The file books/README is a bibliography. /pub/academic/faq/archive --- List of files available on the Computers and Academic Freedom archive. /pub/academic/news --- Directory of all issues of the Computers and Academic Freedom News. A full list of abstracts is available in file `abstracts'. The special best-of-the-month issues are named with their month, for example, `June'. FOOTNOTES ========= _____ <7.1> What is the background behind the Internet? The article ``Internet'' in Fantasy and Science Fiction by Bruce Sterling <bruces@well.sf.ca.us> contains general and nontechnical introductory notes on origins of the Internet, including the role of the RAND corporation, the goal of network resilience in face of nuclear attack, MIT, UCLA, ARPANET, TCP/IP, NSF, NREN, etc.: > ARPANET itself formally expired in 1989, a happy victim of its > own overwhelming success. Its users scarcely noticed, for > ARPANET's functions not only continued but steadily improved. > The use of TCP/IP standards for computer networking is now > global. In 1971, a mere twenty-one years ago, there were only > four nodes in the ARPANET network. Today there are tens of > thousands of nodes in the Internet, scattered over forty-two > countries, with more coming on-line every day. Three million, > possibly four million people use this gigantic > mother-of-all-computer-networks. > > The Internet is especially popular among scientists, and is > probably the most important scientific instrument of the late > twentieth century. The powerful, sophisticated access that it > provides to specialized data and personal communication has sped > up the pace of scientific research enormously. > > The Internet's pace of growth in the early 1990s is spectacular, > almost ferocious. It is spreading faster than cellular phones, > faster than fax machines. Last year the Internet was growing at > a rate of twenty percent a *month.* The number of `host' > machines with direct connection to TCP/IP has been doubling > every year since 1988. The Internet is moving out of its > original base in military and research institutions, into > elementary and high schools, as well as into public libraries > and the commercial sector. References ========== Bowers, K., T. LaQuey, J. Reynolds, K. Roubicek, M. Stahl, and A. Yuan, ``Where to Start - A Bibliography of General Internetworking Information'' (RFC-1175), CNRI, U Texas, ISI, BBN, SRI, Mitre, August 1990. The Whole Internet Catalog & User's Guide by Ed Krol. (1992) O'Reilly and Associates, Inc. --- A clear, non-jargonized introduction to the intimidating business of network literacy written in humorous style. Krol, E., ``The Hitchhikers Guide to the Internet'' (RFC-1118), University of Illinois Urbana, September 1989. ``The User's Directory to Computer Networks'', by Tracy LaQuey. The Matrix: Computer Networks and Conferencing Systems Worldwide. by John Quarterman. Digital Press: Bedford, MA. (1990) --- Massive and highly technical compendium detailing the mind-boggling scope and complexity of global internetworks. ``!%@:: A Directory of Electronic Mail Addressing and Networks'' by Donnalyn Frey and Rick Adams. The Internet Companion, by Tracy LaQuey with Jeanne C. Ryer (1992) Addison Wesley. --- ``Evangelical'' etiquette guide to the Internet featuring anecdotal tales of life-changing Internet experiences. Foreword by Senator Al Gore. Zen and the Art of the Internet: A Beginner's Guide by Brendan P. Kehoe (1992) Prentice Hall. --- Brief but useful Internet guide with plenty of good advice on useful databases. See also ftp.eff.com:/pub/internet-info/. (Thanks to Bruce Sterling <bruces@well.sf.ca.us> for contributions here.) General ======= Cunningham, Scott and Alan L. Porter. ``Communication Networks: A dozen ways they'll change our lives.'' The Futurist 26, 1 (January-February, 1992): 19-22. Brian Kahin, ed., BUILDING INFORMATION INFRASTRUCTURE (New York: McGraw-Hill, 1992) ISBN# 0-390-03083-X --- Essays on information infrastructure. Policy and design issues, research and NREN, future visions, information markets. See table of contents in ftp.eff.org:/pub/pub-infra/1992-03. Shapard, Jeffrey. ``Observations on Cross-Cultural Electronic Networking.'' Whole Earth Review (Winter) 1990: 32-35. Varley, Pamela. ``Electronic Democracy.'' Technology Review (November/December, 1991): 43-51. ______ <7.2> How Internet `anarchy' like the English language? According to Bruce Sterling <bruces@well.sf.ca.us>: > The Internet's `anarchy' may seem strange or even unnatural, but > it makes a certain deep and basic sense. It's rather like the > `anarchy' of the English language. Nobody rents English, and > nobody owns English. As an English-speaking person, it's up > to you to learn how to speak English properly and make whatever > use you please of it (though the government provides certain > subsidies to help you learn to read and write a bit). > Otherwise, everybody just sort of pitches in, and somehow the > thing evolves on its own, and somehow turns out workable. And > interesting. Fascinating, even. Though a lot of people earn > their living from using and exploiting and teaching English, > `English' as an institution is public property, a public good. > Much the same goes for the Internet. Would English be improved > if the `The English Language, Inc.' had a board of directors > and a chief executive officer, or a President and a Congress? > There'd probably be a lot fewer new words in English, and a lot > fewer new ideas. _____ <7.3> Most Wanted list Hopefully you have benefitted from this creation, compilation, and condensation of information from various sources regarding privacy, identity, and anonymity on the internet. The author is committed to keeping this up-to-date and strengthening it, but this can only be effective with your feedback. In particular, the following items are sought: - Short summaries of RFC documents and other references listed, esp. CPSR files. - More data on the specific uses and penetration of RFC-931. - Internet traffic statistics. How much is email? How much USENET? What are the costs involved? - Famous or obscure examples of compromised privacy on the internet. - FTP site for the code (NOT the code) to turn the .plan file into a named pipe for sensing/reacting to remote `fingers'. - Knowledge on the `promiscuous' mode of receipt or transmission on network cards. - Details on the infamous experiment where a scientist resubmitted previously accepted papers to a prominent journal with new and unknown authors that were subsequently rejected. - X Windows, EFF, CPSR FAQhood in news.answers. Commerical use of this document is negotiable and is a way for the author to recoup from a significant time investment. Email feedback to ld231782@longs.lance.colostate.edu. Please note where you saw this (which newsgroup, etc.). _____ <7.4> Change history 3/3/93 v2.1 (current) CPSR pointer, new UNIX mode examples, digital telephony act, Steve Jackson incident, additions/ reorganization to anonymity section, part 3. Note: v2.0 post to sci.crypt, alt.privacy, news.answers, alt.answers, sci.answers was cancelled by J. Kamens because of incorrect subject line. 2/14/93 v2.0 Major revisions. New section for X Windows. Some email privacy items reorganized to network security section. New sections for email liability issues, anonymity history and responsibilities. Split into three files. Many new sources added, particularly from EFF and CAF in new `issues' part. `commentary' from news.admin.policy. 21 day automated posting starts. 2/3/93 v1.0 More newsgroups & FAQs added. More `Most Wanted'. Posted to news.answers. Future monthly posting to sci.crypt, alt.privacy. 2/1/93 v0.3 Formatted to 72 columns for quoting etc. `miscellaneous,' `resources' sections added with cypherpunk servers and use warnings. More UNIX examples (`ls' and `chmod'). Posted to alt.privacy, comp.society.privacy. 1/29/93 v0.2 `Identity' and `Privacy' sections added. `Anonymity' expanded. Remailer addresses removed due to lack of information and instability. Posted to sci.crypt. 1/25/93 v0.1 Originally posted to the cypherpunks mailing list on 1/25/93 as a call to organize a list of anonymous servers. email ld231782@longs.lance.colostate.edu for earlier versions. * * * SEE ALSO ======== Part 1 (previous file) ------ <1.1> What is `identity' on the internet? <1.2> Why is identity (un)important on the internet? <1.3> How does my email address (not) identify me and my background? <1.4> How can I find out more about somebody from their email address? <1.5> Why is identification (un)stable on the internet? <1.6> What is the future of identification on the internet? <2.1> What is `privacy' on the internet? <2.2> Why is privacy (un)important on the internet? <2.3> How (in)secure are internet networks? <2.4> How (in)secure is my account? <2.5> How (in)secure are my files and directories? <2.6> How (in)secure is X Windows? <2.7> How (in)secure is my email? <2.8> How am I (not) liable for my email and postings? <2.9> How do I provide more/less information to others on my identity? <2.10> Who is my sysadmin? What does s/he know about me? <2.11> Why is privacy (un)stable on the internet? <2.12> What is the future of privacy on the internet? <3.1> What is `anonymity' on the internet? <3.2> Why is `anonymity' (un)important on the internet? <3.3> How can anonymity be protected on the internet? <3.4> What is `anonymous mail'? <3.5> What is `anonymous posting'? <3.6> Why is anonymity (un)stable on the internet? <3.7> What is the future of anonymity on the internet? Part 3 (next file) ------ <8.1> What are some known anonymous remailing and posting sites? <8.2> What are the responsibilities associated with anonymity? <8.3> How do I `kill' anonymous postings? <8.4> What is the history behind anonymous posting servers? <8.5> What is the value of anonymity? <8.6> Should anonymous posting to all groups be allowed? <8.7> What should system operators do with anonymous postings? <8.8> What is going on with anon.penet.fi maintained by J. Helsingius? * * *
11
sci.crypt
Koff! You mean that as long as I put you to sleep first, I can kill you without being cruel? This changes everything.
0
alt.atheism
Complete Q700 are best obtained from your dealer or some recent copy of MacWorld or MacUser. My foggy memory suggests that the most relevant comparison factors vis-a-vis a IIci are as follows: 25 MHz 68040 16 Mhz data path (don't recall this for sure, but it's slower than Q 950 style machines for sure). Ethertalk card on-board Audio in/out 4 MB RAM on motherboard 4 SIMM slots 2 NuBus slots. More flexible build-in video than the CI. Uses VRAM. In comparison, a IIci with an accelerator won't give you audio or ethernet or the same video options. With a 68040 accelerator, CPU performance can be comparable but I think it ends up costing more.
4
comp.sys.mac.hardware
Not if they are unwilling to go through a public marriage ceremony, nor if they say they are willing but have not actually done so. Let's distinguish _real_ logistical problems (like being stranded on a desert island) from _excuses_ (such as waiting for so-and-so's brother to come back from being in the army so he can be in the ceremony)...
15
soc.religion.christian
#There is a big difference between running one's business #affairs, and actively ripping people off. And charging homosexuals more becuase people think that AIDS is a "gay disease" is actively ripping people off.
18
talk.politics.misc
HELP! I really got ripped off and I need some help unripping myself. I bought a Maxtor 4380 300mb ESDI HDD from Hi-Tech for $300, then paid to get it repaired, for about another $300. Here's the deal: The thing works fine! It low level formats, etc without any bad spots at all! AND THEN... (Jaws Music) sectors start going bad! EEK!!! One at a time. Norton disk doctor keeps marking some U and some C. That FIXES it. For about 5 minutes. Then next day when I run NDD on it again: NO DICE more uncorrectable and correctable sectors. AHHHHHUUUURRRRRRGGGGGHHHHH!!!!! So I fugure: "Ok, NDD's just not being thurough enough, I'll use Spinrite, I heard that works well." What happens? Spinrite goes and returns the clusters to active use!!! AHHHUUUURRRRRRGGGGGHHHH!!!! NDD undoes it of course. The problem seams to be getting worse and worse. HOWEVER when the HDD is low level formatted again the problem goes away for a while, only to return in a day or so. I'm so pissed off right now I'm considering buying another HDD, and I really can't afford it. I'm using SMARTDRIVE, and WINDOWS 3.1 (I'm not using the 32 bit disk access though, I know that can create problems). The disk is using the second option to trick the controller into thinking it's got less then 1024 cyls, and everything else selected is standard, maybe I need to use a different head skew or something? I don't know. ANYONE WHO KNOWS HOW TO FIX THIS PROBLEM PLEASE TELL ME HOW!!!! HELP!!!!
3
comp.sys.ibm.pc.hardware
Two LH Research SM11-1 power supplies (series SM10). 1000W, 5V, 200A (currently wired for 115VAC) Control lines: +/- sense, on/off, pwr. fail, high/lo margin, current monitor (List price from LH Research $824.00 each, qty. 1-9) Asking $350.00 for the pair obo
6
misc.forsale
The JP5 on the Speedstar 24x is for those systems with boot-up problems. If your system fails to boot-up proprtly, please pull off the jumper block from jp5. This will not affect the proformance of the SpeedStar 24x. This is what my manual says about jp5. I never knew that it was there but the card is a real ask kicker in my book. It beats the hell out of my junk Sony 1604s to the point that I can't even use above 648x480 mode much...Sam Some times an upgrage turns out to be a big overkill, like driving a Sony with a 24x that the monitor can't handle. Or installing 60ns simms and then finding out that your mother board doesn't have a cmos wait state adjustment to take advantage of the new 60ns simms that you just bought!
3
comp.sys.ibm.pc.hardware
Purists often distinguish between "true" clubbing and "pseudo" clubbing, the difference being that with "true" clubbing the angle of the nail when viewed from the side is constantly negative when proceeding distally (towards the fingertip). With "pseudo" clubbing, the angle is initially positive, then negative, which is the normal situation. "Real" internists can talk for hours about clubbing. I'm limited to a couple of minutes. Whether this distinction has anything to do with reality is entirely unclear, but it is one of those things that internists love to paw over during rounds. Supposedly, only "true" clubbing is associated with disease. The problem is that the list of diseases associated with clubbing is quite long, and includes both congenital conditions and acquired disease. Since many of these diseases are associated with cardiopulmonary problems leading to right to left shunts and chronic hypoxemia, it is very reasonable to get a chest xray. However, many of the congenital abnormalities would only be diagnosed with a cardiac catheterization. The cause of clubbing is unclear, but presumably relates to some factor causing blood vessels in the distal fingertip to dilate abnormally. Clubbing is one of those things from an examination which is a tipoff to do more extensive examination. Often, however, the cause of the clubbing is quite apparent.
13
sci.med
What does "DC" stand for? Couldn't be an antichiropractic posting from a chiropractor, could it? My curiosity is piqued. Prostate CA is an especially troublesome entity for chiropractors. It so typically causes bone pain due to spinal metastases that it gets manipulated frequently. Manipulating a cancer riddled bone is highly dangerous, since it can then fracture. I've seen at least three cases where this happened with resulting neurologic damage, including paraplegia. This is one instance where knowing how to read x-rays can really help a chiropractor stay out of trouble. DO chiropractors know what bony mets from prostate look like? -- ---------------------------------------------------------------------------- Gordon Banks N3JXP | "Skepticism is the chastity of the intellect, and geb@cadre.dsl.pitt.edu | it is shameful to surrender it too soon."
13
sci.med
I meant to comment on this at the time. There's just no way baserunning could be that important - if it was, runs created wouldn't be nearly as accurate as it is. Runs Created is usually about 90-95% accurate on a team level, and there's a lot more than baserunning that has to account for the remaining percent.
9
rec.sport.baseball
there is a file out there (look for it with archie) that is called 'theref22.zip' which has lots of info on various PC things, amongst which is also a detailed description of all Floppy controller commands, I think hard drive controller commands are not there. it is possible to read an entire track including all gaps, sector headers etc. by setting sector size to something very large (like 8K).
3
comp.sys.ibm.pc.hardware
I built a little project using the radio shack 5vdc relays to switch audio. I got pretty bad 'clicks' when the thing switched. I was doing most of the common things one is supposed to do when using relays and nothing seemed to get rid of the clicks. My question is: Is there a good relay/relay circuit that I can use for switching audio, so that there will be *NO* noise of any kind on the audio lines. I will appreciate any advice or references to advice. Also, exact part numbers/company names etc. for the relays will help! Thanks!
12
sci.electronics
They don't move, to anybody much bigger than an electron :-) noah
4
comp.sys.mac.hardware
Another dodge. Oh well. I'm no match for your amazing repertoire of red herrings and smoke screens. You asked for an apology. I'm not going to apologize for pointing out that your straw-man argument was a straw-man argument. Nor for saying that your list of "bible contradictions" shows such low standards of scholarship that it should be an embarrassment to anti-inerrantists, just as Josh McDowell should be an embarrassment to the fundies. Nor for objecting various times to your taking quotes out of context. Nor for pointing out that "they do it too" is not an excuse. Nor for calling your red herrings and smoke screens what they are. I'm still not sure why you think I'm a hypocrite. It's true that I haven't responded to any of Robert Weiss' articles, which may be due in part to the fact that I almost never read his articles. But I have responded to both you and Frank DeCenso (a fundie/inerrantist.) Both you and Frank have taken quotes out of context, and I've objected to both of you doing so. I've criticized bad arguments both when they were yours and I agreed with the conclusion (that the Bible is not inerrant), and when they were Frank's and I disagreed with the conclusion. I've criticized both you and Frank for evading questions, and for trying to "explain me away" without addressing the objections I raise (you by accusing me of being hypocritical and irrational, Frank by accusing me of being motivated by a desire to attack the Bible.) I don't see that any of this is hypocritical, nor do I apologize for it. I do apologize, however, for having offended you in any other way. Happy now?
19
talk.religion.misc
: {much deleted] : : : The fact that this happened while eating two sugar coated cereals made : by Kellog's makes me think she might be having an allergic reaction to : something in the coating or the cereals. Of the four of us in our : immediate family, Kathryn shows the least signs of the hay fever, running : nose, itchy eyes, etc. but we have a lot of allergies in our family history : including some weird food allergies - nuts, mushrooms. : Many of these cereals are corn-based. After your post I looked in the literature and located two articles that implicated corn (contains tryptophan) and seizures. The idea is that corn in the diet might potentiate an already existing or latent seizure disorder, not cause it. Check to see if the two Kellog cereals are corn based. I'd be interested.
13
sci.med
3
comp.sys.ibm.pc.hardware
I think this kind of comparison is pretty useless in general. The processor is only good when a good computer is designed around it adn the computer is used in its designed purpose. Comparing processor speed is pretty dumb because all you have to do is just increase the clock speed to increase speed among other things. I mean how can you say a 040 is faster than a 486 without giving is operational conditions? Can you say the same when you are running a program that uses a lot of transidental functions. Knowing that 040 does not have transidental functions building in to its FPU and 486 does, can you say that 040 is still faster? Anyway, I hope people do not decided upon wether a computers is good or not solely on its processor. Or how fast a processor is based on its name, because one can alway do a certain things to a processor to speed it up. But if we restrict our arguements to, for example, pure processor architectural issues. Or how one processor will work well and another will not based on its design, then we can get somewhere with our discussions. - Chung Yang
4
comp.sys.mac.hardware
Personally, I follow the no alcohol rule when I'm on a bike. My view is that you have to be in such a high degree of control that any alcohol could be potentially hazardous to my bike! If I get hurt it's my own fault, but I don't want to wreck my Katana. I developed this philosophy from an impromptu *experiment*. I had one beer at 6:00 in the evening and had volleyball practice at 7:00. I wasn't even close to leagle intoxication, but I couldn't perform even the most basic things until 8:30! This made me think about how I viewed alcohol and intoxication. You may seem fine, but your reactions may be affected such that you'll be unable to recover from hitting a rock or even just a gust of wind. I greatly enjoy social drinking but, for me, it just doesn't mix with riding.
8
rec.motorcycles
Actually I wasn't too surprised, since I bought it with the rust. Any of you got some ideas of getting rid of this CHEAPLY (key word)?? It has eaten all the way through on the door panels. Can I use Bondo? Also, is there a good paint that will bond to Aluminum rims? The paint thati was on my rims has peeled off, actually, there's some rust looking 'stuff' on the rims themselves... but it comes off pretty easily. One more thing... Have any of you done self-painting to a car? How do you start? What do I need to do this?
7
rec.autos
$17-20/piece. ~~~~~~~~~~~~~ I assume you are talking about 1meg X 9 SIMMs, or 1Meg X 9 SIPPs with speed of 70ns? I would take 10K pieces per week if you have that price. (FOB US port). I am not waiting for an offer with that price, I could only dream. tiger
3
comp.sys.ibm.pc.hardware
These substitutes exist, and at this time are available. Its the future availability that is in doubt. 1) GHG-12 Get it from People's Welding Supply 800-382-9006 2) butane/propane You can mix this yourself so no one can ever regulate it away. Just make sure you use good quality (dry) gases. I don't know of any 200mpg carb distributors :-)
7
rec.autos
It's not a cliche, and (unlike your comments below) it's not a tautology. It needn't have been true. If every pitcher in baseball were essentially the same in quality (i.e. if the variance of pitching ability were much smaller than the variance of batting ability), then scoring runs would be much more important than preventing them, simply because the *ability* to actively prevent runs would be much weaker. If that's your point, you should have said so. What you in fact said was "Pitching and defense win championships", and later "Pitching is the essence of baseball". Neither of which says what you are now claiming was "your point", and neither of which is true. And you accuse Sherri of mouthing cliches!? It's not clear to me at all that this is true. In high-scoring games, the team with the better offense wins a high percentage of the time. In low- scoring games, the split is essentially 50/50 regardless of team ability. I thought you said "pitching and defense win championships" and "pitching is the essence of baseball".
9
rec.sport.baseball
9
rec.sport.baseball