text
stringlengths 0
74.9k
| label
int64 0
19
| label_text
stringclasses 20
values |
---|---|---|
If a X-window package exists, that runs om PC, DOS (and maybe MS-windows)
I would be very happy to hear about it.
Thanx in advance. | 5 | comp.windows.x |
NHL RESULTS FOR GAMES PLAYED 4/14/93.
--------------------------------------------------------------------------------
STANDINGS
PATRICK ADAMS NORRIS SMYTHE
TM W L T PT TM W L T PT TM W L T PT TM W L T PT
xPIT 56 21 7 119 xBOS 51 26 7 109 xCHI 46 25 12 104 xVAN 45 29 9 99
yWAS 42 34 7 91 yQUE 47 27 10 104 yDET 46 28 9 101 yCAL 42 30 11 95
yNJ 40 36 7 87 yMON 48 30 6 102 yTOR 44 28 11 99 yLA 39 34 10 88
yNYI 39 37 7 85 yBUF 38 35 10 86 STL 36 36 11 83 yWIN 39 37 7 85
PHL 34 37 11 79 HAR 26 51 6 58 MIN 36 37 10 82 EDM 26 49 8 60
NYR 34 38 11 79 OTT 10 70 4 24 TB 23 53 7 53 SJ 11 70 2 24
x - Clinched Division Title
y - Clinched Playoff Berth
--------------------------------------------------------------------------------
Boston Bruins (51-26-7) 2 2 0 - 4
Ottawa Senators (10-70-4) 0 1 1 - 2
1st period: BOS, Roberts 5 - (Juneau) 7:19
BOS, Wiemer 1 - (Juneau, Oates) 17:47
2nd period: BOS, Neely 11 - (Juneau, Murphy) 6:10
BOS, Hughes 5 - (Richer, Kimble) 7:55
OTT, Archibald 9 - (Rumble, Lamb) 11:37
3rd period: OTT, Boschman 9 - (Kudelski) 5:10
Powerplay Opportunities-Bruins 0 of 2
Senators 0 of 4
Shots on Goal- Bruins 13 11 10 - 34
Senators 5 9 12 - 26
Boston Bruins--Moog (36-14-3) (8 shots - 8 saves) Blue (9:38 second)
(18 shots - 16 saves)
Ottawa Senators--Sidorkiewicz (8-46-3) (27 shots - 23 saves) Berthiaume
(6:36 third) (7 shots - 7 saves)
ATT-10,500
--------------------------------------------------------------------------------
Washington Capitals (42-34-7) 0 0 2 - 2
New York Rangers (34-38-11) 0 0 0 - 0
1st period: NONE
2nd period: NONE
3rd period: WAS, Bondra 36 - (Pivonka, Cavallini) 6:54
WAS, Bondra 37 - (Cote, Pivonka) 10:10
Powerplay Opportunities-Capitals 0 of 2
Rangers 0 of 1
Shots on Goal- Capitals 16 11 12 - 39
Rangers 8 7 8 - 23
Washington Capitals--Tabaracci (7-11-0) (23 shots - 23 saves)
New York Rangers--Richter (13-17-3) (39 shots - 37 saves)
ATT-17,897
--------------------------------------------------------------------------------
New York Islanders (39-37-7) 2 1 1 0 - 4
Hartford Whalers (26-51-6) 2 1 1 1 - 5
1st period: NYI, Ferraro 13 - (Malakhov, King) 1:29
NYI, Hogue 32 - (Thomas, Turgeon) 1:57
HAR, Yake 21 - (Poulin) 4:15
HAR, Yake 22 - (Nylander, Poulin) 16:44
2nd period: HAR, Verbeek 39 - (Cassels, Weinrich) (pp) 2:43
NYI, Thomas 35 - (King, Ferraro) 7:58
3rd period: HAR, Burt 5 - (Sanderson, Cassels) 13:41
NYI, Malakhov 14 - (Hogue) 17:45
Overtime: HAR, Janssens 12 - (Poulin) 1:08
Powerplay Opportunities-Islanders 0 of 3
Whalers 1 of 3
Shots on Goal- Islanders 16 8 7 1 - 32
Whalers 7 13 7 1 - 28
New York Islanders--Fitzpatrick (16-15-5) (28 shots - 23 saves)
Hartford Whalers--Lenaduzzi (1-0-1) (32 shots - 28 saves)
ATT-10,915
--------------------------------------------------------------------------------
Pittsburgh Penguins (56-21-7) 2 3 1 0 - 6
New Jersey Devils (40-36-7) 2 4 0 0 - 6
1st period: PIT, Daniels 5 - (Needham, Tippett) 4:14
NJD, C.Lemieux 29 - (Semak, Driver) 10:19
PIT, K.Stevens 55 - (Tocchet, Murphy) (pp) 12:40
NJD, Zelepukin 22 - (Driver, Niedermayer) 17:26
2nd period: PIT, M.Lemieux 68 - (Stevens, Tocchet) 1:42
NJD, Semak 36 - (C.Lemieux, Zelepukin) 2:27
PIT, McEachern 28 - (Jagr, Barrasso) 4:24
NJD, S.Stevens 12 - (Guerin, Pellerin) 5:45
PIT, M.Lemieux 69 - (sh) 12:40
NJD, Richer 37 - (Nicholls) 15:53
NJD, C.Lemieux 30 - (Semak, Zelepukin) 17:40
3rd period: PIT, Mullen 33 - (Jagr, M.Lemieux) 18:54
Overtime: NONE
Powerplay Opportunities-Penguins 1 of 5
Devils 0 of 3
Shots on Goal- Penguins 9 11 8 2 - 30
Devils 12 15 9 3 - 39
Pittsburgh Penguins--Barrasso (43-14-5) (39 shots - 33 saves)
New Jersey Devils--Billington (21-14-4) (30 shots - 24 saves)
ATT-14,796
--------------------------------------------------------------------------------
| 10 | rec.sport.hockey |
Mike Terry asks:
No Mike. It is imposible due to the shaft effect. The centripital effects
of the rotating shaft counteract any tendency for the front wheel to lift
off the ground. | 8 | rec.motorcycles |
Sorry for taking this off of Sharon's resp, but I'd also like to add
some more verses to that and perhaps answer the second Q.
Verses:
1 Corinthians 6:9-10
Colossians 3:5-10
As for knowing when, that's a bit tricky. People normally have
consciences which warn them about it. However, as in my case, a
conscience can be hardened by sin's deceitfulness (Hebrews 3:12:13) so
that the person has no idea (or doesn't care about it) that they are
sinning. Of course, there are those sins which we do when we don't know
that they're sinful to begin with. Those take searching and examining
of Scripture to find out that they are sinful and then repent and
change. The best question to ask in every circumstance to judge sinful
possibilities is: "Would Jesus wholeheartedly do this at this point in
time?" I know, it sounds like a cop-out, but it truly is a stifling
question.
Joe Fisher | 15 | soc.religion.christian |
4 | comp.sys.mac.hardware |
|
According to what I have read on Biblical idioms, speaking "in X's
name" is a standard Aramaic/Hebrew legal idiom for what we today
would call Power of Attorney. A person from Jesus' culture authorized
to conduct business "in John's name" had full authority over John's
financial affairs, but was held under a solemn fiduciary obligation to
work only for John's benefit and consonant with John's wishes. It was
not required for the steward to preface each business transaction with
"in John's name"; it was sufficient to have valid power of attorney
and be operating in good faith. (Note the overlap here between legal
and religious definitions of "faith".)
With this cultural background, praying "in Jesus' name" does not
mandate a particular verbal formula; rather it requires that the
petitioner be operating faithfully and consciously within an analogous
"fiduciary" relationship with Jesus and for the purposes of His
Kingdom. The message of "praying in Jesus' name" is thus closely
aligned with the parable of the talents and other passages about God's
delegation of Kingdom business to his stewards, both resources and
responsibilities. This idea of praying "in Jesus' name" is not only
present but prominent in the Lord's Prayer, although the verbal
forumula is absent.
The act of praying the words "In Jesus' Name" may be beneficial if
they cause us to clarify the relationship of our requests to the
advancement of God's Kingdom. For that reason, I'm not quite ready
to say that the praying the formula is without meaning.
Prayers to God for other purposes (desperation, anger, thanksgiving,
etc.) don't seem to be in this category at all, whether uttered by
Christian or non-Christian, whether B.C. or A.D. (that's B.C.E. or
C.E. for you P.C. :-). I don't see anything in Christ's words to
contradict the idea that God deals with all prayers according to His
omniscience and grace.
Van Kelly
vek@research.att.com
| 15 | soc.religion.christian |
Anyone seen any press releases or heard any rumors of a cache card
for the LCIII, now that it has the full data bus width on the PDS slot? | 4 | comp.sys.mac.hardware |
A friend of mine has problems running Spigot LC on an LC III.
His configuration is:
Spigot LC / LC III, System 7.1
Video Spigot Extension 1.0
I would appriciate if I can get any postitive/negative experience with this
setup.
Thanks, | 4 | comp.sys.mac.hardware |
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>',3'$9F8+"Z5'1]_?W]_?WWIZ>BHJ*BHJ*BHJ*BHJ*GIZ
M>GIZ>GIZ*BHJ*GIZ>M_?1T>EI0L+"V9F9F9FR,A_?W_(5Z(46Q04%%=75VO4
MU-34U-34U`("`@("`@("`M34?W]_?]#084O#%%O`.#AUG@&$`0$Y.?518)0&
MC#`P8V-55555555559-65@HWGV`7]?7U%Q>?GY^?GP!@45$&*2G:VBDIGIZ'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'34T2P<'HP<$2$A+!P<'!P1(2$A)-34U-34TM,)11-];6UM;6
MUM8[(3N^AX>'AX>'AX>'AX>'AX?$9@NE1]]Z*BJ[`SW2&;!3[8LTQ<7%9V=G
M9V=G9V=G9V=G9V=GQ<4TBXN+B^WM4U.P&7'2TCT]F0.[>D<+9C&'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AVYAA`$DF&IJH*"NKJZ(B(B(W-P0N;:VMK:V
MMK:VN=R(KJ0M+2W:AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MS^K/S\]K:VLV-C;9V:D'E5E9E5G9V=G9V38V-C;``(*"O!,3O((``````"N5
M=A."*RDI]/2,!@:4-Y2,]"G:9&2L[,;OQO&D:@=Y><[.!05L;&QL31(2$L'!
MP<$234U-34UJ)"0*"I_U"B0DAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?%-(N+4[`9&1D9&7%QTCV9
M`P,#`UY>7EZ[*M]'I:6E"\0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AS'$9@NE1WHJN[N[N[LJ*GK?1Z4+9C&'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<Q,<3$Q&9F9@L+I:5'
M1T='WT='W]_?W]_?>GIZ>BHJ*BHJ*BHJ*GIZW]]'1T>EI:4+"PMF9L3$U-3(
MR'_(HJ);P%M;%%=75U?4U-34U-34U`("`@)N;FYN`@)_?R`@(-0!*]`46UO`
M.'5UG@&$`0$Y4?518#<&!HR,8Y.3M+15556TDY-65C>?8!?U]?47%Y^?@8&!
M7`H'S%%XGJEUAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'34T2P>CHP<$2$A(2$A(2$A(234U-
M34U-3<[:C%%@!M;6UM;6UIN^0R&^AX>'AX>'AX>'AX>'AX>'AX>'AS%F"PNE
M1]]Z*EX#F3W2&1FP4^WM[>WM[5-3[>U34U-3L+"P&1EQ<7%QTM(]/3T]F9D#
M`UZ[N[LJ>M]'I0MF,8>'AX>'AX>'AX>'AX>'AX>'AX>'R&XK$RLD))AJ:J"@
MKJZNB(B(W-P0N;:VMK:VMK:VN=R(KMK:VMHI](>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX=K:S8V-C;9V=FI!UE94@?9H]G9V38V6UN5
M=G83$Q,3$X(!`````(*$$W:5]/3T](P&!I0WS,R4C/3:+62L[,;O[*RDF`8%
M!04%!04%!6QL;&P2$A(2$A(234UL3:YJ)`J!GY\7"B0DAX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?M
ML!G2TCV9F9F9F9F9`P,#`P,#`P->NRIZ1Z4+9L0QAX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>',<1F"PNE1]]Z*KN[
M7EZ[NRHJ>M]'"\2'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>',<3$9F9F"PL+I:6E1T='1]_?WWIZ>BHJ*BHJ*BHJ*BHJ>GIZ>M_?
MWT='1T>EI0L+I:6EU-34U,C(HJ);P,!;%%=75U?4U-0"`@("`@(";FYN;FYN
M2\M_?R#4('_0*RL46\`X=76>>%*$`2@Y4?518#>45@:<8Y.3D[15556TDY-0
M"I^?%_7U]1<7%Y^?@8&!UHXK88>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=-31(2P>CH
MP<$2$A(2$A(2$A(234U-34U-SBTP!O7,!M;6UM;6FYN;0R&^2(>'AX>'AX>'
MAX>'AX>'AX>'AX>'AS'$"Z5'WRI>`YF9F9F9F3T]/=+2TM+2TM+2TM+2TCT]
M/9F9F9F9F9F9/3T]/3V9F9D]/3T]F0->N[LJ>M^E9L3$,8>'AX>'AX>'AX>'
MAX>'R"4!=@$*)"28:FJ@H*ZNKJZ(B-P0N;:VMK:VMK:V$-R(KBDI*?3TC(>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS;9V=G9
MJ5E94EG9HZ.CHS9K:W9VO!.\=G9V$Q."````@H(3$X(`]/3TC(P&!I0WS,PW
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M*BIZ>GK?W]_?WT='1T='1T='1Z6EI:6E1]_?U-34R,C(`A1;.,!;6Q2B5U=7
MU-0"`FX"`@)N;DM+2TM+`@)_(-0@?\M+)5<46\`X=:F>`82$`2@Y]?518#>4
M!@;K4%"3D[2TM+2TDY-04)\7%_7U]1<7%Q>?GX&.CHYA8="'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX=-$A(2P>CHP<$2$A(2$A(2$A)-34U-34W.SMKT-U',@8'6UM;6
MFYL^.R$[2$B'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS'$"Z5'>BJ[N[N[N[M>
M7EY>7EY>7EY>7KN[7EY>`P,#F9F9F9F9F3W2TM+2/=+2TM+2/9D#7KN[>GK?
MWT='1T='"V;$AX>'AX>'AX?4`M!V=H$*"B0DF&IJ:J"@H*ZNB(C<N;FVMK:V
MMK:YW(B(KO3T](R,!LR'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'V0>54EG9-C8V-FMK:W:\$[QV4E)V=A-V=H*"O!,3
M@@#T]/2,C(R,C(P&-S>4!O0IVF2L\>_&\:1J!A<WZ>GIZ>GI>04%!6QLXN(2
MP<'!P<'!B*YJ)`J?%_47"B2'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=>NRIZ>GIZ>GK?W]_?1T='
MI0MFQ,3$,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>',<1F"Z6EI4??WWHJ*BIZ>M_?W]]'I0MFQ,0Q,8>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<QQ,1F"PNEI4??
MW]_?>GIZ>GIZ>GIZ>GIZ>M_?W]_?W]_?W]_?W]]'1Z6EI:6EI4='1Z5K`@("
M`@)N;A1;.,#`6Q04%%=7U,@"`FYN2TM+2TM+2\-N`L@@U"!_RTMA85<46\!U
M=9YX`82$`2@Y]5%1S#>4!NLH4%!0D[15556TDY-04)\7]?7U%Q?>WM[>WI^!
MCHZ.$1&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AQ(2$A(2$N@2$A(2$A(2$A(2$A(2$DU-
M34W.SC",S/5@GX'6UM;6FYL^/B$AOKZ'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX<QQ&8+I4='1T='W]]Z*KM>7KLJ*BHJ*KN[NUY>7@,#`P.9F3T]/9F9
MF9F9F9F9F0,#7EY>NRHJWT='1T>EI6;$AX>'AX>'AP+(2RN\%Y^!"@HD))B8
M:FIJ:J"@KHB(W!"YMK:VMKD0W(BN]/2,C`:4S&"'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AUG9-EMK:Z+/O!,3
M=G92E3.5=G83O+P3O+R"`/3T](R,C(R,]/2,C`8&C/0I+62L\5KLK*288&`&
MZ>GIZ>GIZ04.#N+BXN(2$DU-34W<KJ!J)`J?%_47@23JAX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX??
M1T>EI:6EI:4+"V8+"PL+9L2'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<QQ&8+"PNEI4='WT>EI0L+"Z4+
M"V9F9L3$Q#$Q,3&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>',3'$Q&9F"Z6E1T='1T='W]_?1T='1T='1Z6EI:6EI4='1T='1Z6EI:4+
M"PL+"PMF9L3$SZ(42TM+2TM+)5O`.#C`6UM;%%=75\@";DO#P\-+)24E2\-N
M`L@@U-34`FXE5U=;P,!U=9YX`5*$`2A1]5%1S)0&!E!04%!0D[2TM+2TDY-0
M4%#>]0T-WB<GWA<7%R>!@8Z.$1$1AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AQ(2$A(2$N@2
M$A(2$A(2$A(2$A(2$DU-;&Q553",S/7>)X&!UM;6FYL^/CLA(4I(AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<Q,<1F9@NEI4='W]]Z>GIZ*BJ[
MNUY>`P,#7EY>7EY>7EX#`P,#`P,#`P,#7KN[*BIZW]]'I0MF,3&'AX>'AX>'
M;@+()2MV]1>?GPH*)"0DF)AJ:FIJH*ZNB(C<W!`0$-S<B(BN](R,!C<W8%%1
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>BS\\3O'9V=I4S,S,SE79V=G9VE3,SVBGT]/2,C/3T*2DI]/3T
M]"G:+62D[._Q9+,&%P:8F("`Z>GIZ>D.#@X.;&QL$A)L;+G<KJ!J)`J?%_7U
MGR1960>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX?$Q,1F9F9F9F9FQ,0Q,8>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS'$9F8+
M"PL+"PL+9F9F9F9F9F;$Q,3$Q,3$,3&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AS$QQ&9F"PL+I:6E1T='1T='I:4+"V9F9F;$Q,3$
MQ,3$Q,3$9F9FQ,3$Q#$QAX>'AX>'AQ1;6\!U86%A86%A86'`.#C`P%M;6Q17
M%%MN2\-+)4M+2TM+PVYN`LC4U-3(`DM75U=;P#AU=9YX`5*$*"A1]5%@-Y0&
M4,W-4%!0D[2TM+2TDY-04%`H]?47GY^?GY\G)R>?@8Z.CA$1$8>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'$A(2$A(2Z!(2$A(2$A(2$A(2$A(2$A)-;&Q5+3",-U'>WI^!UM;6
MFYL^H*`A(=-(1(>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AS$Q9@NE1]]Z*BJ[7EX#`P,#`P.9`P->`P,#7EY>7KM>7KN[NRHJ>GK?
M1Z6EI0O$,8>'AX>'AX>'2\@")2N?%_47%Y^?"@HD)"28F&IJ:J"@KJZNB(B(
MB(B(B*ZN](R,!I0W8%%148>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AW9V=G9V4I4S,S,S,Y65,S,S,Q$1
MVMHI*?3T]/0I*=K:VBDIVMHM+62D[*?QI&K,-YAJ:IB`#@X%!8#IZ04%!>GI
M!05LMA"(KJ!J)`J?]?7UGYZXN+B>GH>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS$QQ,0Q,8>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>',3'$Q#$Q,3$Q,3&'AX>',3$Q,3$Q,<3$Q,3$Q,0Q,3$QAX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>',<3$Q,1F9@L+"Z6EI0L+
M"PMF9L0Q,3$QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'%%M;6\#`P`$!
M`2LK*P$X=3@XP%M;6UL46\!;;FY+2\/#PVYN;FX"R-34U-3(`@*B5Z);P#AU
M=:F>`0&$.3E1]5%@-Y164%!04%!0D[2TM+2TDY-04%`H]?47GX&!@8&!GR>?
M@8$8&!$1$1&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'31(2$A(2$A(2$A(2$A(2$A(2$A(2$A(2
M36Q5+3",-_7>)X&!UM;6FSX^H*!#(2%*1'"'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<QQ&8+I4='W]]Z*BHJ*BJ[N[N[N[LJ
M*GIZ>GIZ>GK?W]]'1T>EI:4+"V;$,3$QAX>'AX<E;M1N)=`*GY\7]?47GY\*
M"B0D))B8:FIJ:J"@H*ZNKJZNKJ0I*?2,C`8WS&!148>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'=G9V=G9V
ME3,S,S,S,S,S,S,186%D+2W:*2DI*2G:VBTM+2TM+2UD9&JD[,:LI)@7!FJD
MI&J8@(#JZNKJZNGIZ>GIZ>FYMMR(KJ"8)`J?]?7UGU)24E)24E*'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AS&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX<Q,3$QAX>'AX>'AX>'AX<Q,3'$Q,3$,3$QAX>'AX>'AX>',3$QQ,3$Q,3$
MQ,3$,3&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS$Q
M,3'$Q&9F9F9F9F9F9F9F9L3$Q,0QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX?/5U>B%%O`P+P3$[QV=G:\=75U.%M;6UM;P'5;H@(";FYN;FX"`@+(
MU-34U-0"`A2B5Z);.'4X=76>>`&$.3GU]?5@S)104%!04%!0DY.TM+2TDY-0
M4%`H.0W>GX&!@8&!@>'AX>&.CAB0D!$1AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=L;!(2$A(2$A(2
M$A(2$A(2$A(2$A(2$A)-36S.+3",S`W>GX'6UM:;FSX^H$-#(2'32$APAX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>',<1F
M"Z5'W]_?W]_?W]_?W]_?WT='1T='1T='1T>EI:4+"PL+9L3$Q,0QAX>'A^XE
M`M0")20D"H&?GQ?U]1>?@0HD)"0DF)B8:FIJ:FJ@H*"@H*0I*2GT](R4-\Q1
M45&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX=V=E)V=G92E3,S*S,S*RLS86%A):RL9&0M+=K:VMK:+61D9&1D
M9&1D9&ID[,9DLP;UF+-D9+.8F&L)@("`@("JJJJJ\(BYMMR(KFJ8)`J?]1?U
MN+B>G@<'![BXAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AS$QQ,3$Q,3$Q,3$Q,3$Q&9F"PL+"V9F"PL+"PL+9F9F
M9L1F9@L+I:6EI:6EI:6EI0L+9L0Q,3&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AS$QQ,3$9F9FQ,3$,3$Q,8>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AW]_("#4(']_RX1VO+P3$Q,3=75U=5M;6\#`
M=77`%*+(`@("`@("R,C(R-34U"!_HJ)75Z);.'4X=76>>'@Y'/7U]1=@S`'-
M4%!04%!04%"3DY.3DU!04%`H.2@G@8&!CHZ.CA@8&!@8&$B0D-G9;H>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AVQL$A(2$A(2$A(2$A(2$A(2$A(2$A(2$A)-;$UD+2D&40W>@8'6UM:;
MFSX^H$-#B"'3(;Y(AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX?$9@NEI:5'1T??W]_?1T='1T='I:4+"PMF9F;$,3&'
MAX>'AS&'AX>'AX>'[NZJU-3(H&J8)"0*"I^?%_47GY\*"B0D)"0DF)B8:FIJ
M:FIJ:MK:VBDI](R,E#=@45',AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AW9V=G9V=G:5,RLK86%A*RLK824EK*RL
MK&1D9&1D+2TM9&2LK*RLK*RL:K.LQAVD:I11F*3QK*1JF)B8-C8V-C8V-C:D
MH*ZYMMR(KFHD)`J?%Q<7!Q$1$1$'$1$1$8>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<Q,8>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>',<3$9F9F9@L+"PL+"PL+"PNEI:6E
MI:6EI:6E1T='1T??WT??WWIZ>GHJ*BHJ*BHJ*GIZWT>E9F;$,3&'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'PTO+?R`@?TN086&$
M=KR\O+R\=75U=<!;P,`X=74X6Q2BR,C(U-34U-3(U-34U'\4HE=75Z);P'4X
M.'6>>'@H.?47%Q=@-P'-S5!04%!04%!04%!04%!04%`H*"A0@1@8CHX8&!@8
M&!@8&$B^;FYN;FZ'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AVP2$A(2$A(2$A(2$A(2$A(2$A(2$A(2$A)-
M34UD,(Q@#=Z?@=;6UM:;FSZ@H$-#B+4A(2%(1(>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS'$9F9F"PNE1T='1Z6E"V9F
M9L3$Q#$QAX>'AX>'AX>'AX>'AX>'AX>'AX?N[D:J@-2NH*!J:B0D)`J!GQ?U
M%Y^?"@H*)"0D)"0D)"28F)@DF-K:VBDI*?2,C)3,45%@-X>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>\=G9V=G9V=G:5
M*RLK82LK*RLK*V&LK*RLK*RLK*RL9&1D9*RL\?'Q\?'QLZ2LI^RDF#=@F*3Q
M\62D:IAJI-RVMMR(KJZDH*X0MMR(KFHD)`H*%Q=2,S,S!P<',S,S!Q&'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?$
MQ,0Q,3$Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS$QQ&9F"PL+
MI:6EI4='1T='W]_?W]_?>BHJN[M>7KN[N[N[N[N[N[N[7EY>7EY>7KLJ>GK?
M1Z4+"V9F9F;$Q#$Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX=+2TM_?]34(']+2TN0A':\$Q,3$W6>=<!;P,`X=75UP%L45]34U-34U-34
MU-34R!045U=75Z);P'4X.'6>GI[-*&!@GY\W`2LKS<W-4%!04%!04%!04%!0
M4,TH.2A0DQ@8&!@8&!@8&!A(2$B^;F[+RW]_AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>';!(2$A(2$A(2$A(2
M$A(2$A(2$A(2$A(2$A)-;&3:C)3UWB>!UM;6FYN;/CZ@H$-#B(B((2'32D2;
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX<Q,<3$Q#$QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'A^[N1JJ`
M@("(KJ"@:FJ8)"0*@9\7]1>?GX&!"@H*"B0D)"0D)"0D*2DI*2DI*?3TC`8W
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MAX>'AX<Q,<1F9@NEI4='1T??>GHJ*KN[N[N[7@.9F3T]F9F9`YF9F9F9F0,#
M`YF9F9D#7KN[7KN[*GK?W]]'1T='I:6E"PL+"V;$Q#$QAX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'ATM+`G]_(-34U"!_?P)+2TL!`0$!`0&>J77`P#AU
M=75U.,!;%%=7U,C(R`(";DLXP%L45U=75Z);P'4X.'6>GLW-E)0*"@H**RO0
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MAX>'AX>'AX>'.>Y&JH"`@!"UB*ZNH&IJF"0D"H&?%_47%Y^?GY^!"@H*"@H*
M"@J!]/3T]/0I*?3TC`8W45',!O2'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'$Q,3$[R\O(2$A()2,RLK*RL!`0$K*=HM9&2L
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MAX>'AX>'AX>'AX>'AX>'AX>',3'$9F8+"Z5'1]]Z*BJ[NUX#`YF9/3T]TM+2
M<7'2TM(]/=+2TM+2/9F9F9F9`P->7EY>7EZ[N[N[N[LJ*GIZW]_?W]]'1Z4+
M9F9FQ,3$Q#$Q,3$Q,3&'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AP)+`G\@U-34(']+2TM+
M2TN0`2O0826>J75U=3AU=:FI=77`6U=7HL"I4GBI=75UP%L45U=75U<4P#@X
MP'5UGE!0"@H*"@HK*]#0T,W-4%!0S<TH*"@H*"@H*"@H.2A0DU552$A(2$A(
M2$A*2DI*2LM_?R`@("`@AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AVP2$A(2$A(2$A(2$A(2$A(2$A(2$A(2$A(2$DUL
M;+.,-PW>G];6UIN;FSX^/CZ@H*!#0T-#KCO3TTI*1&6'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=9.>ZJ@("`MK80B(BNKJ!J:I@D)`J?
MGQ?U]1<7%Y^?GX$*"@H*@9^,C(R,C/3T]/3TC`;,46`WC/3:AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AQ,3$Q,3$[R\O+R\O+R"
M`0``*P$!`0'T*2G:+61DK/'L[.SL[.SL[.S&QL;L[$VFIO'&I_%J!E%@F&0B
M[/&D:FJSI-RVN;FYB*ZDKH@0MKG<KFJ8:FHD$Q,3$Q,3$Q,3$Q,3=E(S,X>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAS$QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>',3'$Q&8+"Z5'W]]Z*BJ[
M7@.9F9D]/3T]/=)Q<7%Q<1EQ<=+2TM+2/3V9F9D#`UY>N[N[N[N[7EY>7KN[
MN[N[*BHJ*BIZ>M_?W]]'1Z6EI:4+"V9F9L3$Q#$Q,8>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MU-34U"`@(']+2TM+D)`E82LK`;P3=@$!J75U=75U=9Z>GG4X6Q175\!U`0&>
MJ75UP%L45U=75U<4P#@XP#AU4%!0)"0D)"0K*RO0T&'-4%!0S<TH*"@H.3DY
M*"@Y.2A0D[15;$I(2$A*2DI*2DI*2DI_?R`@U-34U&;$Q,3$,3&'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>';&QL$A(2$A(2$A(2$A(2
M$A(2$A)-34T2$A(234UL+3`&40TG@=;6UIN;FSX^/CZ@H*"@H*"@H*!*2DI*
M2D1EAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'A!Q9.4:JJH`0
MMK:V$(B(KJZ@:FJ8)"0*GY\7]?7U]1<7GY^!@8&?GY\&E#<WE`:,C(R,!C=1
M4<R4C/3:+8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
M$Q.\O!,3$[P3$Q,3$[R$@@```(*"@HST*2G:+62LK/'L[.SL[.SL:+&QL;'&
M34U-P>RGQJQJ!E',F*3Q[/&DF&JDKMRVMKFYW*ZNB-P0MK;<KFIJ:FIV=G9V
M=G9V=G92E3,1$1'9V6Z'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
M,<1F"Z5'WWIZ*BJ[7@.9F9F9F9D]/=)Q&1D9&1EQ<7%Q<7%QTM(]/9F9`P->
MN[N[N[N[NUY>7@,#`P,#F9D#`P,#7EX#`UY>N[MZ>M]'1Z6E"PMF9L3$Q#$Q
M,3$QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'2Y"0D)"0D"4E82LK4G83$W:$`2O0825+J:F>GG5U
MJ9YX>)YUP%NB5UMU>(1XGIYU.%L45U=75U<46S@XP,!UDY.;FYN;FYLK*RO0
MT-!04%!04,TH*"@Y.1P<.3D<*,U0D[15!6Q*2DI*2DI*2DI*2DI*?R#4U"`@
M("#4,3&'AS&',8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=5
M;&QL;&P2$A(2$A(2$A(2$A(234U-34U-$A(236QL+3`W#=XG@=;6UIN;FSX^
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MAX>'AX>'AX>'AS'$9F8+I4='W]]Z>BJ[7EX#`P.9/3T]TM(]TM)Q<1D9L+`9
M&1D9&1D9<7'2/3V9`P,#`UY>7@.9F9F9/3T]/3T]F9F9F9F9F9D#`UY>N[LJ
M>M_?WT='I:4+"V9FQ,3$,3$Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'2TM+2TM+2Y`E82LK`8*\
M$W8!*]!A)4MN`IZ>GIZIGG@!`7BI=<`45UMUGE(!GIYU=<`45U=75U>B6\`X
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MAX>'AX>'AX>'AX>'AX>'AX>'AQP<'!SN):JJB(@0$+:VMA`0B(BNKJ!J:B0D
M"@J?GQ<7]?47%Y^?GY^?G\Q145%145%145%146#,-Y0&C/0I+:SQ[(>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>\O!,3$Q,3O'9VO+P3$[R\=G9V
M=KP3$V#,E(ST*=HM9*SQ[.SL[.S&:+'O6EI:[[%-34W!P>CO'628!E',F*3Q
M\61JF&JDKMRVMK:YW(C<W-P0N;;<H)AJ:@?N$=G9V=EN;FYN;C8V:PD)@`F'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX<Q,<3$Q&9F"Z5'1]_?>GHJ*KN[7@,#F3T]
M/3T]TM+2<7$9&;"PL%-3L!D9&7%Q<7'2TCT]/3T]TCT]/3T]/=+2TCT]/3V9
MF9F9`P.9F0,#`P->N[LJ>GK?1T>E"PL+"PMF9F9F9F9F9L0Q,3&'AX>'AX>'
MAX>',3$Q,3$Q,3$QQ,1F9F9F9F;$Q,0Q,3'$Q#$Q,3$Q,3&'AX>'AX>'AX>'
MU-34(']_2Y`E82L!`8*\O!,3O(0!`0$!*RN>GIZ>>`&$A`&>=3A;5Q1UG@&$
M>)ZI=<!;HE=75U=76\`XP,"TM#X^/CZ;F]#0*RLK*RLK*U!04%#-*"@Y'!PY
M.3DH*,U04).TM%4%;$I*2DI*2DI*2DI*2M34U-34U`++?W]_Q,3$,3&'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'4+15555L;&QL$A(2$A(2$A(2
M$A(2$DU-34U-34U-36R:,`;>#=XG@=;6UIN;FYL^/CX^/CX^/CX^/CX^/CY$
M1$I*2DI$IH>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=9=AP<'.[N1JJNB(@0
M$+:VMA`0B(B(KJZ@:I@D)`J!GY\7]?47GY^?GY^?S%%1S,S,S&!@8&#,-Y24
M!@:,C/0I+63Q[.R'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'`%)VO+P3
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M>BHJNUY>`P.9F9D]/=+2<7%Q<1D9&;!34U-34U-3L+"P&1D9&1D9<7%Q<7'2
MTM+2TM(]/9F9F9F9F9D]/=+2TM+2/3V9F0->N[LJ*BIZ>M]'1Z6EI:6EI:6E
MI:4+"PL+"PMFQ,3$Q,3$9F8+"PL+"Z6EI4='1T='1T='1T>EI:5'1T='1T='
M1]]Z>M_?1Z4+"PMF9F9F('_+2\,E86$K`(*"O!,3O':$A':\O!.\O!,3>'@!
M`812`81XJ3A;5Q0X=9Y2`9ZI=<!;%%=75U=7%,#`P`4%!3X^/CZ;8=`K*RLK
M*RLK*RM04%#-*"@Y.1PY.2@H*,U04%"3M+15!6QL1$1$2DI*2DI*2HW4U-34
M(']_`DL"JJJ'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?-4+2T
M5555;&QL$A(2$A(2$A(2$A(2$A(2$DU-34U-3:RSC($G#0TG@=;6UM;6FYN;
MFSX^/CX^FYN;FYN;FSX^/D1$1$1$1$1$AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MASF5'!Q2[NY&JJ"NB!`0MK:VMA`0$(B(B*Z@:FJ8)`H*GY\7]1<7GY^!@8',
M45',E)0&E)0WE)0&C(R,C(R,]/0IVF2L\>SLAX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'``````""@E)2`0$!`0$`4E)V=G9V=G9V=F!@45%@-P;TVBUD\>SL
M[,;&QFBQ[UJ]O;U:P<'HZ.CHZ.C!(K.8!F!@F&JD9*2S:K.DI(BYN;FYN=RY
MW-S<N;:(:FH'65E2=I4S$=EN-FMK:VMK:S8V-C:'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<Q,8>'AX>'AX<Q,3'$
MQ&9F"PNEI4='W]_?WWIZ*BJ[7@.9F9D]/3W2TG$9&1D9&1D9&;"PL+"P4["P
M&1D9&1D9&7%Q<7$9&1D9<7'2TCT]/9F9F3V9/3T]/9D]/9F9F9D#`UY>NRHJ
M*GIZ>M_?W]_?1T>EI:6EI:4+"PMF9F8+"PNE"PL+I:6EI4='W]_?W]]Z>GIZ
M>GIZ>GIZ>GHJ*BJ[N[M>7@->7EY>7KN[7EY>N[N[?W_+2TO#PY!A86$`@KP3
M$Q,3$Q,3O+QVA(2$GG@!A(0!`80!GG5;5Z+`=9X!A'B>=<!;6U=75U=7%%O`
MP`4%/CX^/IN;T"LK*RLK*RLK*RNT4%!0S2@H*#D<.2@H*"C-4%!0D[2T555L
M;$I*2D1$1.CHZ.CHU-34U-0@@*IK"<C(((>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AQPH4%"TM%5556QL;!(2$A(2$A(2$A(2$A(2$A(2$DU-K&0P
MUH$G#0W>)X&!UM;6UM:;FYN;FYN;FYLD))LDFYN;/CY$1$1$1$1$1*:'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX=9.3EV'!P'[D9JH*Z(B!`0MK:V$!`0$(B(B*Z@:FJ8
M)"0*GY\7]1>?GPH*"@I14<R4!HR,C(P&C/3T]/3T]/3T]/0IVBVL\>SL[.R'
MAX>'AX>'AX>'AX>'AX>'AX<QT-#0*RLK*RMA86%A86%A*RLK*P!VO':\=G9V
M8&!145%1S`;TVBVL\>SLQFAH:+'O[UJ]O;U:P>CHZ,'!P4U-3;.,!LQ1)&JD
MI*2DL[.SI(BYN;FYN;FYW(C<MKFN:D9&[NXY679V=E(S$1'9[C8V-FMK"0F'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AS$QQ,3$9F9F
M9L3$Q,3$Q,3$9F8+"Z6EI4??WWIZ>GIZ>GIZ*BHJ*KN[7EX#`YD]/3T]TM+2
MTM)Q<7%Q<7%Q<7$9&1D9&1D9&1D9&1D9<7%Q<7%Q<7%QTCT]F9F9F9F9`P,#
M`P,#`P,#`P,#`UY>N[LJ*BIZ>GIZ>M]'1Z6EI0L+I:6E"PL+I:6EI:6EI4='
MW]_?>GIZ*KN[7EY>7EY>NUY>`P.9F9F9F9F9/3T]TM+2/3V9/3T]/3T]F9F9
MU-0@?\M+PV%A86%A80```0$!`0$!`0$!A'9VO`%24@$!`80!GG445U=;=76>
MA`&>=<#`6Q175U=7HEM;!04%/CX[OK[0T"LK*RLK*RLK*RL!M)-04%#-*"@Y
M'#DH*"@HS5!04).T555L;$T2Z.CHZ.C!P<'HZ-34U-34(-34("`@("`@((>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=0S2@HS5"TM+1556QL;!(2$A(2$A(2
M$A(2$A(2$A(2$DU-K)HPUM8GW@T-WB>?GX&!UM;6UM:;UM;6UM;6UM8D))N;
MFSX^1$1E941$1.C!AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'[NXY65(<.0?NHVJ@H*Z(B!"V
MMK80$!`0B(B(B*ZNH&J8)"0*@9\7]1>?"@H*"E%1S#>,]/3T]/3T]"DI*2DI
M*2DI*2DIVBUDK/'Q[.SL[(>'AX>'AX>'AX>'AS&0D)"02R4E)4M+2TM+2TM+
MD&%A86$``7:\$Q,3$U%145%145%1S`;TVBVL\>SLQFBQL;'O6EJ]O5KHZ.CH
MP<'!P4U-Y>6,!C=1!IAJLZ2DI+.DKHC<W+FYN;G<B(C<MA"N1D;N[N[N.3,S
M4G83=I4S$1$1$=G9;C:'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAS'$9@L+"PL+9@L+"PL+I:6E1T='1T??W]_?W]]Z>GIZ>GIZ>GIZ>BHJ*BHJ
M*KN[NUY>7EY>7@,#`YF9F9F9/3T]TM)Q<7%Q<7%Q<7%Q<=+2TCV9F9F9F9D#
M7EZ[N[N[NUY>7EY>`P,#`P,#F9F9`P->7KN[N[LJ*GIZ>BHJ>GK?1T='1T='
M1T='I:6E1]_?>GHJ*BJ[N[M>`P.9F3W2TCT]/3W2TM)Q<7%Q&1EQ<7%Q&1FP
ML+`9<7%Q<=+2TM+2TM+2SW_+2TN086$K`````````0$!`82$=KP3$[QVA`%2
MA%(!`812GG445U=;P'6>`0&>=3C`P%NB5U=7HA1;!04[.[Z^OKYA8=#0T-#0
MT-`K*P$!3+234%!0S2@H.1PY.3DH*"A04%"3M%4%;$T2$NCHZ.C!P<'!P<'4
MU-0@(-34U-34(-34U-0@((>'AX>'AX>'AX>'AX>'AX>'AX>'A[104"@Y*%!0
MM+2T555L;!(2$A(2$A(2$A(2$A(2$A(2$A+QK+.^UM:!)]X-#0W>WM[>GX'6
MUM;6UM;6@8&!UM;6)"0DFYL^/FMEIF5EIDW!P4T^AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'A^[N[I4<
M4EGN[D9&:FIJH*Z($!"VMK80$!`0B(B(B*ZNH&IJ)"0*@9_U%Y^!"@H*46#,
ME(ST*2DI*2DI*2DI*2DP*2DI*2DIVBTM9*SQ\?'Q\>SQ.,!;%*)7('\@("`@
MU"`@U-34U"!_R`)_`@)N;DLE8=```(*\$Q-145%145%145%@S`;T*2VL\>SL
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M*BHJ>BHJ*BIZ>M_?W]]Z>BHJ*BHJ*BJ[N[N[7EY>7EX#`P,#F3T]TM(]/3W2
M/3T]F9D#`UY>7KN[NRHJ*BIZ>GHJ*KN[N[N[7EY>`YF9F9D]F9F9`UY>7EY>
MN[N[N[N[*BHJN[N[*GIZ>GIZ>BHJ*BJ[NUX#F3T]/3T]TG%Q<7%Q&1D9&1D9
ML+!34U-3[>WM4U-34U-3L!D9&1D9&1D9&;"PL%-3S\_#86%A``""@KQV=E*$
MA':\$Q-VA`$!*]!A)25+O!-24H12>'5;5U<4P'5U>%*>=3@X.,`45U=7HA1L
M!04[.SN^OB4E)6%A86%AT"LK`0%,#V>TM%!04%#-*"@Y.1PY*"C-4%"3DU55
M;&P2$A(2P<'!P<'!P<'!U-34U-34U-0@?W]_?W\@(""`ZH"'AX>'AX>'AX>'
MAX>'AX=L556T4"@<*%!0M+2T555L;&P2$A(2$A(2$A(2$A(2$A(2$A+QKFJ^
MUM;6@2?>W@T-#0T-#=XGGX&!@8&!GY^!@8'6UM8D))N;/CZ@966FIDU-34U-
M3<Z'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX?N[CD<=AP<,^[N!R0D:FJ@H*Z(M1"VMK80$!"(B(B(B*ZNH&J8
M)"0*@9_U%Y^!"@H*-S>4!O0I*3`P*2DI*2DI*3`P,"DI*2DI*=HM9*RL\?'Q
M\?'Q\:Q9=E)XGNYU*V$E)9!+;DL"?R!_(-34("#(R`)N2R70*ROT-U%@8,Q@
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M>BJ[N[M>7@.9F9F9`P,#`P,#`P->7KN[NRHJ*BIZ>GHJ*BHJ*BHJ*KN[7@,#
MF9F9F9F9`P,#`P,#`P,#`P,#`UY>7EY>7EY>7@,#`P.9/3T]TM)Q<7$9&1D9
M&1D9&;"P4U-3[>WMBXN+-#3%Q30T-(N+BXN+B^WM[>WM[8N+B^WM[>V+BXLT
M@,\E82LK`5)24@$!*RL!`7:\$Q,3O(0!`2O086%A8783$Q.\>'5;5U=76\!U
MGH1XGG4X.,!;HE=75VQL;#L[.SL[2TLE)24E)6'0*RL!`0'M[5.TM+234%!0
M4,TH*"@Y'#DH*%!0D[15;&QL$A(2$A(2P<'!$A(2$M34U-0@(']_?W]_JH"`
MJJJ`@`FJJJJJ"=2J@("`JLA7$FQL556T4"@Y*%!04+2TM%5L;&P2$A(2$A(2
M$A(2$N@2$N@2$MR(I)B>OM;6UH&?GR<G)][>W@T-WM[>WM[>GY^?GY^!@=;6
M)"2;FSX^/J"F@TU-34U-3<[.8X>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX<K*RM2')4<=AQ96>[N"B0D:FJ@H*Z(B!"V
MMA`0$!"(B(B(KJZ@:FJ8)"0*GQ?U%Y^!"@K-S0:,C/0I,#`P,"DI*3`P,-HP
M,"DI*2GT*2G:+62L\?'Q\?'Q\:QD+78',YYX4@&>J6$E2VY+`G\"?R`@U-1K
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M*BHJ*BHJ*BHJN[N[7EX#`P,#`UX#`P,#`P,#`P,#`P,#`YF9F9F9F3T]TG%Q
M&1D9&;"P4U/MBXN+-#3%Q30T-#0TQ<5G9V=G#P]G9V=G9\7%Q<7%-#3%Q<7%
M-#0T-,7%9V</#P\/3$Q,@,_`82LK*RL`=KP3$Q,3$Q,3O':$A`$!`0$!`0$!
M`0&\$Q,3A"LEHE=7%,!UG@%XGG5U=<!;HL_/$FQL(3L[.SL[PTM+2R4E8=`K
M*RLKT+"P&7$]M+2TM)-04%!0S2@H.3DY*"A04).T!6QL;!(2$A(2$A(2$A(2
M$N+4U"!_1JJJJC:JJC:JJFMNJJIN;FMN;LB`;L!;`A(2$FQL;%6T4"@Y*,U0
M4+2T5555;&P2$A(2$A(2$A(2$N@2$A(2N=RN:B0!OK[6UM;6@8&!@8&!@9_>
MW@T-]?47%Q<7WI^?GX'6UB0D))L^/CX^IDWE34U-3<[.8V/EY8>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<K``%2O!.\=AP<'!Q2
M69\*)"2;:FJ@H*Z(B!"VMK80$(B(B(BNKJ"@:FHD)`J!GQ?U%Y^!"MG9S9?T
M]"DI,#`P,##:VMHM+=K:VBDI](R,C"DIVBUDK/'Q\?'Q\:QD+2GT!@:\=G92
M4@'N=1&02TM_(-34U"!_`DMH[/%DVO0W46#,-Y0W-\Q@8,PW!O0IVBUDK/'Q
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MN[LJ>GIZ>GIZ>BHJ*BHJ>GIZ>GIZ*KM>7@,#`P,#`P,#F9F9F9F9F9F9F9D]
M/3W2TG%Q<1D9L+"PL+"P4^V+BS3%Q6=G#TQ,3`\/9V=G9V</#TQ,3$Q,3$Q,
M3`\/#V=G9V=G9P\/#P\/3$Q,3$Q,3$Q,3$R)B8F)ZL_`-A$1*X(3O':5E94!
MA(2$A(2$A(2$`0$!`0$!`0$!O!.\A"LE;@+4`EO`J0$!GG5UP,!;HE?/$A)L
M(2$A.SL";FY+)270T"LK*]!AL!EQTID#`[2TM+2TDU!04,TH*"@Y.2@H4).T
M56QL;&QL$A(2$A(2$@4%!6QL;("JJC:JJFZJ-DLE)1$E86$EJB4E)24E)6QL
M$A(2$A)L;%6T4,TY*,U04+2T5555;&QL$A(2$A(2$A(2$A(2$A*VW*YJ)(&$
M`9N;UM;6UM;6UM;6UM:!G]X7%_7U]?7U]?47GY^!UM8D)"2;/CX^/CY-Y>7E
MY<[.SL[EY>7.SI.'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<3
M$Q,3$Q,3$[R\O+Q2'!SU%Y\*)"1J:J"@KJZ(B!`0MK80$(B(B*ZNH*!J:I@D
M)`J?GQ?U%Y^?V=G9V9>7*2DI*2DP,-HM+2TM9"TMVBDIC(R,C(PIVBUDK*RL
M\?'QK*QDVBGT!@8&C(P&E+R\`9ZI)6'#2W^]O;U:L6CL\63:])1@4<PWE)24
M-\Q@S#<&C/0IVBUDK/'Q[.S&L;'O$1$S``0$!,W-*"@H*"@H.3DY.3D<%Y0D
M!E967'RS:FIJH*ZNKJZ(JD9&[NXY.3DY.3DY.3DS4G9V$Q-V4I654B=P2(.'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>',3'$Q,3$9@L+"Z6EI0L+"Z6EI4='1T='W]_?>GIZ>GIZ>GIZ>BHJ
M*BHJ*BIZ>M_?W]_?WT='I0L+9L3$,3&',3'$Q&9F9F9F9F9F9L3$Q,3$Q,3$
M9F8+I4??WWIZ>GIZ>GIZ>M_?W]_?1T??W]]'1T='WWHJNUY>`P.9F9F9F9F9
MF3T]TM+2TM(]TM+2TG$9&1FPL%/M[8N+BXLT-,7%Q<5G#TQ,3$Q,3$Q,3$Q,
M3$Q,3$Q,3$Q,3(F)B8F)B8F)B8F)B8E,B8F)B8F)B4Q,3$Q,3$Q,3$Q,3(F)
M@&O`P#8K,Y5V=A.\=G:$A`$!`82$A(0!`0$!*RLK`0$!A!,3A"MA2P+4?TMA
M*Y65J=G`6UM;HE<2$A+@X.#@X-3(`FY+)6'0T-!A2TO%-.U3L!EQ<7&TM+2T
MM+104%#-*"@Y'#DH4%"T555L;&QL;!(2$A(2$A)L;&QY>?#I-DO986%A824E
M874E)0<K*]!A)55556QL;!(2$A)L;%6T4%`H.2A04+2T5555;&QL$A(2$A(2
M$A(2$A(2$A*UH&HDU@&$`7B;FYN;UM;6UM;6UM;6@9^?WM[>WMX7%_7UWI^?
M@=;6)"0DFSX^/CX^/DWE8V-C8\[.34W.SF-C8_`$)8>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'82LK*RLK*U)V$Q,3$[QV=G9VGQ?UGX$D)&IJH*"NKHB(B!`0
MMK80$(B(KJZ@:FJ8)"0D"I^?%_7U%Y^>GI[9V="7,"DI*2DP,-HM9&2LK&1D
M+2GTC`8&!HST*=HM9&2LK*RLK&0MVBF,!@:,C(P&E&!1S(PI+:SL:.^]O;WO
M:.SQK"WT!F!18,PWE)24-\S,S)2,]"G:+62L\?'L[,9HL>\V;MD1$3/P\/#P
M*"@Y'!P<'!P<'!P<')\*"E9<7'Q\?'Q\:J"@I*Z`@("JJJI&1D;N[CDY.5DS
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MB8F)B8F)B8F)B8F)B8F)@&LV-C;9679V=A,3=E*5E0&$=G:\O':$`0$K*]#0
M*RLK*RN\`2MA;@+4R$MA*[QV`:,V6VMK;!(2$N#@X.#@U-3(`FY+)24E2VX"
M86%A)<4TBXOM[>WMM+2TM+2T4%!0S2@H.3DH4%"TM`5L;&QL;!(2$A(2$A)L
M;&QL;`55M&%A86%A*ZDK*P<KT&&TM+2T555556QL;!(2$A(2;&Q5M%`H'"A0
M4+2T5555;&QL$A(2$A(2$A(2$N@2$K6@/B0D@0&$>(>'/CX^FYN;FR2;UM;6
MUH&?GR<GG][>%_7U%]Z?@=;6UB0D))L^/CX^/CZ;Y6-08V-CY<[ESLX$8P10
M*"C086%A89!+2W_4U-34("!_?W_+2TO#D)`E)6$K`':\$Q.\@H0!`9_>]?47
MGPHD)&IJH*"NKHB($!"VMK80$(BNKJ!J:I@D)`H*GY^?%_7U%YZ>GGB>J:G0
MES`I*3`PVBUDK*RLK*QD+2GTC`8&!HST*=K:+2UD9&2L9&0M*?2,!@:,C(P&
M-V!1-XPI+63LQN^]O5JQ[.RL+2F,S%%@S#>4E`8&E#<W-P:,]"G:+62L\>SL
M[,:QL0D):S9NV1%9,U*7EY>7.1P<'!P<'!P<'#DW"E9<?'Q<FYN;?'QJJJJJ
MJJJJ@("`JJJJJD9&1D;9$1$1,Y5V=@WA)PWAX8.'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<QQ&9F"Z6EI4='W]_?
M1T='1]]'1T='1T??W]]Z>GK?W]]Z>BJ[NUY>N[N[N[N[*BIZ>M]'1Z5'I:4+
M"V9F9@NE1T='I:4+9F9F"PL+9F9F9L3$Q,3$Q,3$Q&9F"PL+"PNE1T='1T='
M1]_?>BHJNUY>7EX#`YD]/3W2<1FPL+"PL+"PL+!34["P&1D9&1D9L+!3[>V+
M-#0T-,7%9P\/3$Q,3$R)B4Q,B8F)B8F)B8F)B<G)R<F)R<G)R<G)R<G)R<G)
MR<G)R<G)R<G)R<G)R<G)R<F)B8F)B8F)B8F)B8F)@&LV6VNC65)V=G83$Q,3
M$[R\O'9V=H0!`2O086%A)24E2R4E)2MA2P+4R$MA*[QV`2MA)6ML;!(2+BXN
M+N;FU-3(`@)N`@+(U-1A)4M+;@+(U$P/Q32+[555M+2TDU!0S2@H.1PH4%"T
MM%4%;&QL;!(2$A(2$A)L;&QL;&P%5;2TM+2T4%"3M+2TM+23M+2TM%5556QL
M;!(2$A(2;&Q5M%`H.2A04+2T5555;&QL;!(2$A(2$A(2$A(2M:`^)"36>(25
MAX>'ASX^/CZ;FYLDUM;6UH&?GY^?GY_>WMX-WMZ?@=;6UB0D))L^/CX^/CZ;
M)"0D4"@H*.7ESLY08\W-*)>7[BLK86%A)9!+RW]_("`@U-0@(']_RTLE82LK
M`5)V=@$K`=:!G][U]1>?"B0D:FIJH*"NB(@0$+:VMA`0B(BNH*!JF)@D)`J!
MGY\7%_7UAX>>GGB>GJG0T)<P*3`PVBUDK/'Q\:QD+2GTC(R,C/3T*=K:VBTM
M9&1D9"W:](R,!@:,C(P&S%%@E(PI+63QQN^]O5JQ[/%DVO248%',-Y0&!HR,
M!I0WE(ST*=HM9*SQ[.S&:&BQ-C8V:VMK-C9NV1$SE783=E)9'!P<'#DY.3DY
ME%9<7%Q<"@HDFQ'9[NXV-O"`@("`@("`@("JJJHV-C9NV1$1GPWA)PWAX8,Q
M,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?$
MQ&8+"Z6EI:6E1T='1T='W]_?>GHJ*BJ[N[N[7KN[N[M>7EY>7EX#`P.9`UZ[
M*GK?W]]'1T='1]]'1T??W]]Z*BHJ*GIZW]]'1T>EI:4+9F9F9L0Q,3$Q,3'$
MQ,3$Q,1F"Z6EI4='1]]Z>BJ[N[N[7EX#`YD]TG%Q<1D9&1D9&;"PL+`9&1FP
ML+"PL%-34^WMBXLT-,7%Q<5G9P\/3$Q,3$R)B8F)B8F)B8F)R<G)R<G)R<G)
MR<G)R<D6%A86%A86%A86%LG)R<G)R<G)R<G)R<G)B8F)B8F)B8F)B8F)B8F)
MSVLV:VNC6952!Y52=G:\$Q.\=E)2E3,'$=!A824E2TM+)24E86'02P+4R$MA
M*W9V`=!A/WEY;&S3T]/32DK(U-34U-34U-3(U&$E2VX"?]34U,C(`FXT-(M5
MM+2TDU!0S2@H.1PH4%"TM%4%;&QL;&P2$A(2$A(2;&QL;&P%556TM+2T4%!0
M4%!04%!04%"TM%55555L;!(2$A(2;&Q5M%!0*#DH4+2T555556QL;!(2$A(2
M$A(2$A*UH#Z;/B36E0&'AX>'AX<^/CX^/IN;)-;6UH&?GY^?GY_>W@T-WMZ?
M@=;6UM8D))L^/CX^/CX^)"0DUM;6*&-C8V-C8U"7*)>7[CD'`"LK*V$E89##
M2\M_?W\@U"!_RTN0)6$K*RLK*RLD)-:!GQ?U%Y^!"B0D:FIJH*"NB(@0$+:V
M$!`0B(BNH*!JF"0D"@J?GQ<7%_7UAX>'>`%XGIZIT"N7,"DPVBUD\?'Q\?&L
M+=KT](R,]/0IVMK:VBTM+61D+=HI](P&!@:,C(R4S%',!O0I+:SLQN^]O5IH
M[/%DVO0W46`WE`8&C(R,!I24!HST*=HM9/'L[&AHL;$'$=G9;FXV-FYNV1$1
M$3,S4G9V=G83=G924E(YEY=<7%Q6"@H'!P<'$9=&JJJJ@("`@("`@("`@(`)
M":IK:Z#6@0WA)PWAH8.E"PL+9F9FQ#$QAX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX=F"Z6E1T='1T='W]]Z*KN[NUY>`YF9F3T]/3V9F9D]
M/9F9`P,#`P,#7EY>N[LJ*BHJ*BHJN[M>7EY>NUY>7EX#`UZ[*BIZ>GK?WT='
MI0L+9F;$9F9F9F9F9F9F"PL+I:5'1T='1T='>GHJN[M>7@,#`YD]/=)Q<7$9
ML+!34U-34U.PL+!34^WMBXLTQ<5G9V=G#P],3$Q,3$Q,3$Q,3$Q,B8F)B8F)
MB8G)R<G)R<G)R<G)R<G)R<D6%A86%A86%A86%A86%A86%LG)R<G)R<F)B8F)
MB8F)B8F)B8F)B8F)B8F)SVLV:VNC696565E2=G:\$W92E3,S,S,S!P<'$0<'
MT-#0*RLK`2L!`0+4R&YA*W9V*P0$/WF3>41$1$1$P6X"R,C(`FY+2TLKT-!A
M)4MN`LC4U-3(`FX"`@("M+2T4%!0*"@H.1PHS5"TM%4%!6QL;&P2$A(2$A(2
M$FQL;&QL!56TM+104%!04%!04%!04%!0M+15555L;!(2$A(2;&Q55;10*!PH
M4%"TM%55555L;&P2$A(2$A(2$HB@/CX^/M:>`8>'AX>'AX>'/CX^/CZ^OM;6
MUM:!GR>?GY_>W@T-WMZ?@8'6UM8D))L^/CX^/CZ;)"0DUM:!@8&!4"A0*%`H
M*)<HESD'$2LK*RMA86%AD,-+RW]_(-0@?P)+D"5A83YJ)"0D)-:!G_7U%Y^!
M"B0D)&IJH*"NB(@0MK:V$!"(B*ZNH*!JF"0D"@J?GY\7%_6'AX>'AP$!`7B>
MT&'0ERDIVBUD\?'Q\?%D+=HI]/3T*2G:VBTM+2TM+2TMVBGTC`:4E`:,C(PW
M8%$WC/3:9*SL:%J]O>]H[*QDVHPW46`W!@:,C(R,!@8&C(ST*=IDK.SL:+&Q
ML=G9V6YN-C8V-C8V;FYNV=D1!UE965E965F54G9V=G924I5965E9!P>7EY=&
MJJJJ@("`@*J`@("`@("`":H)KJ"^U@WAX0TGWH-'1Z6E"PL+"PMFQ,3$,3$Q
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>E1T??WWIZ*KN[N[M>`YD]
M/=+2<1D9&1D9&1EQ<=+2TCT]/3T]F9F9F9F9F9D]/3T]/3W2TG%Q<7'2/3T]
M/9F9`UZ[NRIZ1Z6EI:4+"PL+"PL+I:6EI4='1T??WT='1T='I4='1]]Z>BJ[
MNUY>`YF9/3W2<1D9L%-34U.P4U-3[8LT-#3%9V=G#P\/3$Q,3$Q,3$Q,3$Q,
MB4Q,3$Q,B8F)B8F)R<G)R<G)R<G)R<G)R<G)R<G)R<G)R186%A86%A86%A86
M%A86R<G)R<G)R<G)R<G)R<F)B8F)B8F)B8F)B8F)SVLV:UO965E9E5E963F\
M$Q,3$Q,3O+R\=E)24I654I65,S,K`0$K*P'4R.D$S3DY*`0$>7F3IJ9-34TE
M2R5A*P$!=G92.>[NT&%A)4L"`LC4U-34U,C(R,C(R+104%#-*"@Y.3DHS5"3
MM+15!05L;&QL$A(2$A(2$A)L;&QL!555M+104%!04%!04%!04%!0M+15555L
M;!(2$A(2$FQL5;10S3DH*%!0M+2T5555;&QL$A(2$A(2M4-#H#L^OM9XAX>'
MAX>'AX>'ASX^/CX^OM;6UH&!)R<GWM[>W@T-WMXG@=;6UM;6)"2;/CX^/CZ;
M)"36UM:!@9^?@8&!UB@H*)<HESD165E9,RMA86%AD,-+2\M_(-34?TM+H*`^
M/CYJ)"0D)-:?WO7U%Y^!"B0D)&IJ:J"NKH@0MK80$(B(B*ZNH*!J:I@D)`J!
MGY\7AX>'AX>'AX>'4E)XGM!AT)?:VBVL\?'Q\?%D+=HI]/0I*=K:+2TM+2TM
M+2W:VBF,!I24E`:,C`8W46"4C"G:9*SL:%J]O>]H[/%DVHPW4<PW!@8&!@8&
M!@8&C/3T*2UD\>S&L>_O"0D)"0D):VLV-C8V-FYN;N[NV1$'65E965E9E952
M4G9V=G9V=E)2.3F7ET:JJJJJ@("JJO"J@("`@("`$!"UKJ"^U@WAX0T-#8-Z
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MWT='1T??>GHJ*KN[7EY>`P.9F3W2<1FP4U-3[>V+BXLT-#0TQ6</#TQ,3$Q,
M3$Q,3$R)B8F)3$R)B8F)B8F)B8G)R<G)R<G)R<D6%A86%A86%A86%A86%A86
M%A86%A86%A86%A86%A86%LG)R<G)R<G)R<G)R<F)B8F)B8F)B8F)B8G)R<G)
MSVLV:VO965E94EF5E965O+R\O!,3$[QV4E)24E)24I65E965,S-96=#08>GI
MS3D<*,T$>4WEY>5C*P$E8=`!65*\4I4S[D9&)4M+`G_(U-34U-34U-34U,C(
MU,C44,TH*#DY'!PH*%!0M+2T554%;&QL;&P2$A(2$A)L;&QL;`6TM+104%!0
M4%!04%!04%"TM+15555L;!(2$A(2$FQL5;104"@<*,U04+2TM%5556QL;!(2
M$A*U#`Q#(2$[O@&'AX>'AX>'AX>'AX<^/CZ^OM;6UH&?)][>WM[>#0T-WMXG
M@8'6UM;6)"0D)#X^/B0D)"36UM;6@8&!@8&!UM;6UM;6UN[N[A$1$1%A86%A
M89##2W]_$!`0M8BNH*"@/CZ;)"0D)-:?WO7U%Y^!"@HD)"1J:FJ@KH@0MK80
M$(B(B*ZNKJ!J:I@D)`H*GY^'AX>'AX>'AX>'AX12`9[08267+62LK/'QK*QD
MVBDI*2DIVMHM+2TM+2W:VMK:*?2,E#<WE`:,C`;,46`&]"DM9/'LL5J]O5JQ
M[/%DVO0W46`WE`8&E)24E`:,]/0IVBUD\>RQ[VL)"<_/S\^`S\\)"0D):VMK
MJC8V[NX'65E24G9V$Q,3=G924E*5E94Y.3F7EY=&JJJJJJJJJJJJJJJ`@("V
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M!P<'!Q$')=EN-FMK"<_/SR@<*,THU,@";DLE8=`K*P$!=A-2,P<EJJJJ@,C4
MU-34U-34U-34U,C(R,@"`@)N;B@H.3DY'!PY*,U04+2TM+15!6QL;&QL;&P2
M$A)L;&QL!56TM%!04,W-4%!04%!04+2TM%5556QL;!(2$A(2$FQL5;2T4"@Y
M*"C-4%!0M+1556QL;!(2$K4,M0Q#0SMPAX>'AX>'AX>'AX>'AX>'/CN^OM;6
MUH$GWM[>#0T-#0T-WMZ?@8'6UM;6UB2^OKZ^)"0D)-;6UM;6UH&!@8&!@=;6
MUM;6UM8D)"0D)"0D/CX^H*"@KHBU$!`0$+6(KJ"@/CXD)"0DUM:?WO47%Y^!
M"@HD)"0D:FIJH*Z($+:V$!"(B(BNKJ!J:FJ8)"0*@8>'AX>'AX>'AX>'AX>'
MA`&>T&$E1F2LK*RL9&0MVBDI]"DIVMHM+2TM+=K:VBDI]/2,E)24!@:,C)3,
M4<P&]-HM9/'LL5J]O5JQQNQDVO0&S%%@S#<W-\S,-Y2,]/0IVBVL\>RQ60<1
MV=EN-FMK"<_/S\_/SX"`JJJJ-N[N!UE94G9V$W924EE965E963DY.3F7ET:J
MJJJJJJJJJJJJJJJ(W-P0$!`0KJ"^@0WAX0T-)Z%>N[LJ*BIZ>GK?W]_?W]]'
M1]_?WT='1T>EI0L+"PL+"V9FQ,0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<#/=+2<1FP4U/M[8N+-,7%
MQ<4T-#2+BXOMBXN+BXN+BXN+[>U34["P4U-34["P&1D9&7%QTM+2/3T]/3T]
MF9F9F0,#`P,#`P,#`P->7EY>N[N[N[LJ*BHJ*BHJN[M>7EZ[N[M>7EX#`YD]
M<1FP4XN+BS3%Q6=G9P],3$Q,3$Q,B8F)B<G)R<G)R186%A86%LG)R186%A86
M%A86%A86%A865%145%145%145%06%A86%A86%A86%A86%A86%A86%A86%LG)
MR<G)R<F)B8F)B8F)B8E,3$Q,3$R)B8E,B8F)B8F):VLV-FNC65*565F54I65
M4E)9!P=2E94S,P<'!P<E)=EN;F[(:PG/S\_/"6LV-C8V;F[9V24'!S,!=KR\
M$Q,3O(0!!R79JJJ`@(#4U-34U-3(R`)N;DM+2R4E2TLE)24Y.1P<'!PY*"A0
M4%"TM+15505L;&QL;&QL;&QL;&QL!;2TM%!0S2@HS5!04%!04+2T555556QL
M;!(2$A(2$FQL556T4"@H.2@H4%!0M+15555L;&P20T,,#$,A.^&'AX>'AX>'
MAX>'AX>'AX>'ASN^OM;6UN$GW@T-#0T-#=[>WB>?@=;6UM;6UM8D)"0D)-;6
MUM;6UM;6UM:!@8&!@=;6UM;6UB0D)"0D)#X^/CX^H*"NKHBU$!`0$+6(KJ"@
M/CXD)"0DUM:?WO47GY^!"@H*)"0D)&IJH*Z($+:V$!"(B(BNKJ"@:FJ8)"0*
MAX>'AX>'AX>'AX>'AX>'AP&$>"O0849&9&1D9"W:*2GT]/0I*=K:+2W:VBDI
M*2DI]/2,!@8&!HR,!I1@43>,]-HM9/'LL5J]O;WO:.RL+2F,-V!18&#,8&!@
MS)2,]"G:+62L[.QV=G924I59!P<'V=DV-FL)"8"`@*JJJC;N[NX'65E965)V
M=G9V4E)2.3DY.9>7ET:JJJJJJJJJJJJJI*2NKJZ(B+40KJ"^@=XGX0T-X:$]
M/9F9`P->7KN[N[N[*BIZ>GK?W]_?WT='1Z6EI:6E"PL+9L3$,8>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX=Q
M&1FP4^WMBS0TQ6=G9V=G9\4TB^WM[>WM[>V+BXN+[>WM4U-34U.PL+"PL+`9
M&1EQ<7%Q&1D9&7%QTCT]F9D#`P->7@,#`P,#F0,#7EY>7EY>7EY>`P,#`P.9
MF9F9F9D]TM)Q<1D9L%/M[8LTQ<7%9P\/3$Q,B8F)B8F)R<G)R186%A86%A86
M%A86%A86%A86%A86%A86%A86%A86%A94%A865%06%A86%A86%A86%A865%14
M5!865%145!86%A;)R<G)R<G)B8F)B4Q,B8F)B4Q,3$Q,B8F)B8F)B8F)B8F)
M:VLV-FLV!Y52!P>54EE9E94'V=D'!Y4S!P<')279V6[(:PD)"0EKR,@V-F[9
M$0=965F54E*\=E*5E965E0$!`2O0)4O(@(#JZH#4U-3(`@)N;FYN;DM+)24E
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ML>SQ9-KT!LQ145%145%@S)2,]"G:+62L!P<'!P=9,Y524G9V4ED'V38VJH"`
M@("JJJHV[N[N[N[N!P<'65E9E5(<'!P<'!P<'#DYEY=&JJJJJJ2DI&IJH*"@
MKH@0KJ"^@2<GX0T-X9S2TM+2TCT]F9D#`UZ[N[N[NRHJ*BIZ>M_?1T>EI:6E
M"PL+"V9FQ,0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX<9L+!3[8N+-#3%Q<7%-#2+BXOM[>U34^WMBXN+BXOM
M[>WM4U-3L+"PL+`9&1D9&1D9&1D9&1EQTCV9F0->7EY>7EX#F9F9F9F9`P,#
M`P,#`P,#`YD]/=)Q<7%Q<7$9&1D9&;!3[8N+-#0T-,5G9P],3(F)B8F)R<G)
MR186%A86%A86%A865%145%145%145%14%A86%A86%A86%A86%A86%A86%A86
M%A86%A86%E145%145%145%145%06%A86%A;)R<G)R<F)B8F)B8F)B8F)B8F)
MB8F)B8F)B<G)R<G)R<G):VLV-J);V0<'V=F5E0<'65D'V=G9!]G9V1$')279
M;LAK"0EK:\AN;MG9V1$'69524G9V=G924I4S!P<1!R79V6[(`LC4ZL_/"<@"
M;DLE)25A86'0T"LK`0$!`0&$A(2$A(0Y.3DY*"A04%"3M+2T504%;&QL;&QL
M$FQL;&Q5M+2TDU!0S2@H*"C-4%!0M+2T5555555L;&P2$A(2$FQL556T4,TH
M'"@HS5!0M+15555L;#L[.R$ATTB'AX>'AX>'AX>'AX>'AX>'AX>'AX>'A];6
MUN'>#0T-WM[>WB<G)Y^!@=;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6
MUM;6)"0D)#X^/CX^H*"@H*ZNB+6U$!"V$+6(KJ"@/CZ;)"0D)-:?%_7>GX$*
M"@HD)"0D)&IJH*"NB!"VMA`0B(BNKJZ@H&IJF(>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>54@$K*Y<MVMHI*?3TC/3T]"DIVBDI]/3T]/0I*?3T]/3TC(P&-V!1
M8)2,]-HM9/'LL5J]O;U:L>SQ9-HIC)3,45%145%@S)3T*=HM9*SN$0<'!P<'
M!P<'63.5=G9261&CJJJ`@("`JJHV-N[N[N[N!P<'!UE969>7EY<Y.3DY'!P<
M'#F7EYB8:FIJ:IB8:FIJH*ZVB*"^@2?>X0T-X0T9&7%Q<7'2TM+2/3V9F0,#
M`UY>7KN[*GIZW]]'1Z6EI:4+"PMF9F9F9F9FQ,0QAX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<9&1FP4^V+BXN+BXN+BXN+
MBXOM[>WMBXN+B^WM4U-34U-34["PL!D9&1D9&1D9&1D9&7%QTCT#`UY>7KN[
M7EX#`YF9F9F9`YF9F9F9F9D]/=)Q&1FPL+"PL+"PL%-34U-3[8LT-,7%9P],
M3$Q,B8F)B<G)R<G)%A86%A86%A86%A945%145%145%145%145%145%145%14
M5%145%145%06%A945%145%145%145%145%145%145%145!86%A86%A;)R<G)
MR8F)B8F)B8F)B8F)R<G)R<G)R<G)%LG)R<D6%A86:VO9HZ)K==G9V=F5E0<'
M!P?9V=G9V=G9V:EUP&L)"0EKR&YN;MDE)0<1,Y5V=E)2E5E965E9!Q$EV6XV
MR&L)SPEK-FYNV39NV1$1!UE9`0$!`0$!A':\O+R\O+P3$Q.\=H2$.2@H*,U0
M4%"TM+15!04%;&QL;&QL$A)L;`55M+2T4%!0S2@H*"@H4%!0M+2T5555555L
M;&P2$A(2$FQL556T4,TH'"@HS5!0M+15556^OKZ^(2%*AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX?6X2?>#0W>WM[>)R<G)Y^!@=;6UM;6UM;6UM;6UM;6
MUM;6UM;6UM;6UM;6UM;6UM8D)"0D/CX^/J"@H*"@KJZ(M;6U$!"V$+6UKJ"@
M/CX^:B0D)-:?]1>?@0H*)"0D)"0D)&IJH*"NB!"VMA`0B(BNKJZ@H&J'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX03A"LKERDI]/2,C(ST]"DI*2GTC(R,
MC/3T*2DI]/3T](R48%%1-P:,]"DM9/'LL5J]O;U:[\;L9"TI]`8W8%%145%1
MS`;T*=HM!P<'EY>7*"@H$1$1!P=94G9V6>ZCJJJ`@("`JJHV-C;N[N[N[NX'
M!UE9.3D<'!P<'!P<'!P<'&#,E`8DF)B8F"0DF)AJ:J`0M:"^UB?>)PT-<`T9
M&1D9&7%Q<7%QTM+2/3V9F9D#7EY>7KN[*BIZW]]'1Z6E"V9FQ,3$Q,3$Q&;$
MQ,0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<9
M&;"P4U-34^WM[8OM[>WM[>WM4U/M4U-3L+`9&1FPL%-34U.PL+"PL+"PL+`9
M&7'2/3V9F9F9F9F9F9F9F9D#`YD#`P.9F9F9F9D]TG$9&;"PL+"PL+"PL+!3
M4^WMBS0TQ<5G9P],3$R)B8F)R<G)R<G)R186%A86%A86%E145%145%145%14
M5%145%14DI*2DI*2DI)45%145%145%145%145%145%145)*2DI*2DI*25%14
M5%14%A86%A86%LG)R<G)R<G)R<G)R<G)R<G)R<G)R186%A86%A86%A86%A86
M`FO9H\^B-J/9-MF54ED'!]G9V3;9V=FCV:FI=117HF[9)1$'!S,SE5)V=I59
M!P<1!P<'!^[N[J-N-LAK"<\):S9NV24'!P?N[NX'69654H12`0&$=KR\$Q,3
M$Q.\A`$K*]#0*RLH4%!04+2TM%4%!6QL;&QL;&P2$A)L;&Q5M+2TDU!04"@H
M*"C-4%!0M+2T5555555L;&P2$A(2$FQL556T4,TH.2@HS5!0M+1554B^2-,N
MTX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'X2?>#0W>WM[>)R>?GX&!
MUM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM8D)"0D/CX^H*"@H$.N
MKK6(M;40$!`0$+6UB*Z@H#X^/FHD)-:?]=Z!"B0D)"0D)"0D:FIJH*"NB!"V
MMA`0B(B(KJZNH(>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'$W:\`3DI
M]/2,C(ST]"DI*?3TC`8&C/3T*2DI]/3TC`;,45',E(ST]"DM9/'LL5J]O;V]
M[VCLK"W:](R4S&!145%18)3T*0<'!UE9EY>7EY<H!P<'65F5=G926>[N-JJJ
M@("`@*JJJC8VH^[N[@<'!UDY.1P<'!PY.3F7.6!1]?51S#<W!@8D"@H*)"0D
M)*`0M:"^UMX-)PT-<.L9&1D9&1D9&1D9<7%Q<=+2TCT]F9D#7EZ[*BHJ>M_?
M1T>EI0L+9F;$Q#$Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX<9L+"PL%-34U-34U-34U-3L%-3L+"PL+"P&;!3[>WM
MBXN+BXN+BXOM4U.P&7'2TM+2/3V9F9F9F9F9F9D#`UZ[N[M>`P.9F3T]/=)Q
M&1D9&1D9L+"P4U/M[8LT-,5G9V</3$Q,B8F)B8G)R<G)%A86%A86%A86%A86
M%A86%A86%A86%A945%145%14DI*2DI*2DI*2DI*2DI*2DI*2DI*2DI*2DI*2
MDI*2DI*2DI*25%145%145%06%A86%A86%A86%A86%A86%A86%A86%A86%A86
M%A86%A86%A865%145%145&NIH\_/6S8V-MF54I4'!]DV-C;9V=DVV:FI=5M7
M5ULX=0<1!P<SE783=I4S!UD1!^[N[N[N[NZC;FXVR`G/SVMKR#8V;F[9H^[N
M!SDY694!`5)VO!,3O':$`0$K*]#0T-#0T"LK4%"3M+2T504%;&QL;&QL;&QL
M$A)L;&Q5M+2TM%!04%#-*"A04%"TM+2T5555555L;&P2$A(2$FQL556T4,TH
M.2@HS5!0M+152$I*T].'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX<-#0W>WMXG)Y^!@8'6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6
MUM8D)"0D/CX^H*"@0ZZNM;6UM1`0$!`0$+6UB*Z@H*`^/CXD)-:?]9^!"B0D
M)"0D)"0D:FIJH*"(B!"VMA`0B(B(B*ZNAX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'`1.$.?2,C(ST]"DI*?2,!I24!HST]/3T]/3TC)1@4<PW
M!HST*=HM9/'LL>^]O;V][VCLK&3:*?2,E,Q@45%143>,!P<'!UE9EY>7EY>7
ME9524G9V=E)960?NHS:JJJJJ@("`JJHV-J/N[N[N!Y<Y.1P<'!P<63>4-V#U
M41<78%$78)^?GY^?"B0D)*`0M:"^U@T-W@T-X;`9&1D9&1D9&1D9&1D9&7%Q
M<=+2TM(]/9D#7EZ[*BIZW]]'1T>EI0L+9L3$Q#$QAX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<9&1FPL+"P4U-34U-3L+"P
ML+"PL+`9L+!3[>V+BXN+-#0T-(N+[>U34[`9<=+2TM+2TCV9F0->7EY>7EY>
MN[M>`YD]/=+2<7%Q&1D9&;"PL+!34^V+-,7%9V</#TQ,3$Q,3(F)B8F)R<G)
MR<G)R<G)%A86%A86%A86%A86%A86%A86%E145%145))4DI*2DM75U=75U=75
MU=75U=75U=75U=75DI*2DI*2DI*25%145%145%145%06%A86%A86%A86%A86
M%A86%A86%A945!86%E145%145%145%145%145%145%L'H\_/6ULV-ME9E5)9
M!]DV-C8VV38VV=FI=5M75Q3`.'5UGIZ54G9V4I4S!UD'$>[N[N[N[N[N[FXV
MR&L;S\_/SPD):\@V;C;N[NXY.3E9,Y52=A.\=H0!`2LKT-#0T-#0*P````"T
MM+15!05L;&QL;&QL;&QL$FQL;&Q5M+2TM+104%!04%!04%"TM+2T5555555L
M;&P2$A(2$FQL556T4,TH'"@HS5!0M'!$1$K!AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'#=[>WB<GGX&!@=;6UM;6UM;6UM;6UM;6UM;6
MUM;6UM;6UM;6UM;6UM;6UM;6)"0D/CX^H*!#KHBUM;6U$!`0$!`0$+6UB*Z@
MH*`^/FHD)-;>]9_6)"0DFVIJ:FIJ:FIJH*Z(B!"VMA`0M8B(B(>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'`0$!=G8YC(ST]/0I]/2,E,S,
ME`:,C(R,C(R,!LQ18#>4C/3T*=HMK/'LL>^]O;V]6K'LK&0MVBGT!C=@45%1
M479V$Q,3$W9V=G9V=G9V=G9V=G92E5E9!P?N[NZC-C8VJJJJ@("JJJHV-J/N
M[I<Y.1P<45%@S)24-U%18%'U]?7U]?47%Q<7@20D)*`0M:"^U@T-W@T-X;"P
ML+"PL+`9&1D9&1D9&1D9&1D9<7%Q<=+2TCV9F9D#7KN[*GK?W]]'I0L+9F9F
M9L0QAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX<9
ML+!34^WM[>WM[5-34U-34U-34U/M[>WMBXLT-#0T-#0T-(N+[5.P&1D9&7'2
MTM(]F9D#`P,#`P,#7EX#F3W2TM)Q<1FPL+"PL%-3[8LT-#3%Q<5G9P],3$Q,
M3$Q,3(F)B8F)R<F)B<G)R<G)R<G)R<G)R186%A86%A86%A86%A86%E145%22
MDI*2U=75U=75U=75U=75U=75U=75U=75U=75DI*2DI*2DI*25%145%145%14
M5%145!86%A86%A945%145%145%145%145%145%145%145%145%14DI*2DI*2
MDI)9-J+/6VLV-MD'!U*5!]DV-C8V-C8V-MG9=5NB5Z);P'5UJ9YX`5*\=G92
M4I5960<'[N[N[J,VJJK(:VL)"1O/S\\):\ANV27N[CDY.5E94E)2=A-V=E*5
M`0$K*RLK*RLK86%A86%A854%!6QL;&QL;&QL;&QL;&QL;`55M+2TM+2TM%!0
M4%!04+2TM%555555555L;&P2$A(2$FQL;%6T4%`H'"@H*,U09:9$AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?>WB<G@8'6UM;6
MUM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM:!@=;6UM;6UB0D/CZ@H$.NM;6U
MM1`0$!`0$+80$+6UB*Z@H*`^/ILDUH'>]9_6)"0D:FIJ:FIJ:FJ@H*Z($!"V
MMA`0$(B(AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?9$1$1$5E965DS`81V
M=G9VO#F,]/3T](R4S&!@S#<&!@8&!@8&E,Q18#<&C/0IVBUD\>SLL>^]O;V]
M6K'L\60M+2GTC)3,4783=E(S65D'!P=965E965E9!P<'$1$1[N[N[N[N[N[N
M[N[N[C8VJJJ`@*JJJC8V1I>7!LQ1]5%@-Y24S%%18&!146"?GV`7]?7UGR0D
M)*`0M:"^U@T-#0T-L+"PL+"PL+"PL+"PL+`9&1D9&1D9&1D9&1EQ<7%QTM(]
M/9D#`UZ[*GK?1Z6E"V9F9L0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
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M5U<46\!U=9YX`0%2A(0!4E*565D'[N[NHS8VJJIK:PD)S\_/S\\):\@V;B4'
M[CE9'!P<=A-V=E(S65D'$1$1V=EA86%AD,-+2TM+R\O+!6QL;&QL;&QL;&QL
M;&QL;`55M+2TM+2TM+2TM+2TM+2T5555555556QL;!(2$A(2$FQL;%6T4%`H
M.3DH**'DR&L)AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'WB>?@=;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UM;6UH&!@8'6
MUM;6UB0D/CZ@H*ZUM;6U$!`0$!`0MA`0$+6UB*Z@H#X^FR0DUI\7%Y_6)"1J
M:FIJ:FIJ:FJ@H*Z($!"VMA`0$(>'AX>'AX>'AX>'AX>'AX?N$1$1$1$1$1$1
M$1$165DSE79V=G9V=G9V4E)VO+R\'(R,C)0W8%%146#,E#<W-S<WS%%1S)2,
M]"G:+62L\>S&L5J]6EI^L1TBK&0M,#`IC%99E5)V=E*560<1V=G9V=G9V=G9
MV=EN;C8VJJHV-C8V-C8V-C8V-JJJJJJ`@*JJ-MFL9-KT!F!1]5',-Y24S%%1
M8,S,-S<&!C>?%Q<7GR0D)*"U$*`^U@T-#0T<4U-34U-34U-34U-34U.PL+`9
M&1D9&1D9&1D9&1D9&7%QTM(]/9D#`[N[*GIZWT>E"PL+9L0Q,8>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>+BXN+BXN+[>WM[>WM[8N+
M-#0T-#0TBXN+BXN+B^WM[>U34[`9&7%Q<=+2TM)Q<=+2<7%Q&1D9&1D9&1D9
ML+"PL+!34U-3[8LTQ6=G#TQ,3(F)B8F)B8F)B8F)B8F)B8F)B8F)B8F)B8F)
MB4Q,3$Q,3$Q,3(F)B8G)R<G)%A945)*2DM75U=75U4)"0D)"0D)"0D)"U=75
MU=75U=75U=75U=75DI*2DI*2DE145%145%145%145%145%145%145%145%14
M5%145)*2DI*2DI*2DI*2DI*2DI*2DI*2DI*2DE145%14T*+/HFLVH]G9V=E9
M6=DV-MG9V38V-C8V-EL45U>B%%LX=9YX`0%2A(2$`7AXG@?9V38VJJJJJJJJ
M:PG/S\_/S\_/SPEKR#9N)>XY.1QV'%)960<1$=G9;C8V;FYN`@("R,M_?W\@
M("!_?W\%!04%!6QL;&QL;&QL!555M+2TM+2T5;2TM+2TM%5555555555;&QL
M;!(2$A(2$FQL;%6T4%`H*#GK;C9K"0D)"0EKR&YN)1$SE783$Q-VAX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>!UM;6UM;6UM;6UM;6UM;6UM;6UM;6
MUM;6UM;6UM;6UH&!@8&!UM;6UB0D/J"@KK6UM1`0$!`0$+80$!`0$+6(KJZ@
MH#Z;)"36@=[UWI_6)"1J:FIJ:FIJ:FJ@H*Z($+:VMA"'AX<."0EK:S8V-F[N
MV>[NV=GN[A$1$1$S65E9,Y52=G9V=I4S65F54E)V=G9V=G9V$Q.\-\Q@45%1
M45%1S,S,S,S,8%%@-Y2,]-JS+62L\2+L:+%^6EI^L1TB\:PMVC`P[A$'65)V
M=E)960<1V=EN;C8V-C9N;FYN;NZJJJJJJJJ`@("`@("`@("`@*JJJFC&[/&L
M9-KTE&!146`WE`:4S%%1S)0&!@:8F`8*GY\7GR0D:J"U$*`^UM[>W@U34^WM
M[>WM[>WM[>WM[>WM4U-3L+"P&1D9&1D9&1D9&7%Q<=+2TCT]F9D#7EZ[*BIZ
MW]]'I0L+9L0Q,8>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'
MAX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX>'AX?M
MBXOM[>WM[5/M[>WM[>V+BXN+BXN+BXN+-#0TBXN+[5-34[`9&1D9&1D9&;"P
ML+"P&1D9&1D9L%/M[>WM[>WM[8N+-,7%9P],3$R)B8G)R<G)R<G)B8F)B8F)
MB8F)B8F)B4Q,3$P/#P\/#P\/9V=G9V</3$R)B8F)R<D6%E22DM75U=75U=75
MU4)"0D)"U=75U=75U=75U=75U=75DI*2DI*2DI*25%145%145%145%145%14
M5%145%145%145%145%145%145)*2DI*2DI*2DI*25%145%145%145%14%E06
M%A86%EO/HFLVV=G9V=D'E=DV-MG9V38V-C8V-EL45U=7%!3`=:F>>`$!4H2$
M`7AXGG5U.,#`JJJJJJJJR&L)"<_/S\_/S\\):\ANV=D'65D<=APS61$'$1'9
MV6XV;FYN;FYN;@("R&MK?W]_RTM+2P4%!6QL;&P%!04%>7F3D[2TM+155555
M5555555555555555;&QL$A(2$A(2$FQL556TM%#-ZQ'9;C9K":H)"0EK`FXE
M$3-2=A-VE3,S,S,S,S,1$1$1*RLK*P%24E)2``&'AX>'AX>'AX>'A];6UM;6
MUM;6UM;6UM;6UM;6UH'6UM;6UM;6UM;6UM:!@8&!UM;6UB0^/J!#KK6U$!`0
M$!`0$!`0$!`0M;6(KJ"@/FHD)-:!GQ?UGX'6)"1J:FIJ:FIJ:FJ@H*Z($+:V
M$#9K"0D)SPD):S8V;MG9$>X1$1$1$1$165DSE5)V=G9V=G9V=I65E3.54G9V
M=G9V=G9V=G9V=G9V8,S,S,Q145%145'U]5%@-U:,,-IDK/$B[.P=:.]^6EI^
ML6@=(O%D[A$1$5E9,U)2=G92E5E9!P<1V=GN;J,V-FYN-JJJJJJ`@.J`@("`
M@*JJJJK&:&BQL;'&[/&L9-KTE%'U4<R4!@:4-U%1-P:,F)B8F)@D"I\7GR0D
-------- End of part 9 of 14 -------- | 2 | comp.os.ms-windows.misc |
Christian: washed in the blood of the lamb.
Mithraist: washed in the blood of the bull.
If anyone in .netland is in the process of devising a new religion,
do not use the lamb or the bull, because they have already been
reserved. Please choose another animal, preferably one not
on the Endangered Species List. | 19 | talk.religion.misc |
Sounds like the picture tube lost vacuum. This would cause the filament
to ignite and could actually turn the tube from a vacuum to a pressure
vessel, followed by an explosion when the neck assembly (mostly likely
cracked to begin with) blows off. During the whole sequence of events,
the other circuits may continue functioning, which accounts for not
losing sound.
| 12 | sci.electronics |
I would like to sell my dot matrix printer so I can upgrade to inkjet.
It is a "Panasonic KX-P1124 24 pin Multi-Mode Printer". Here are the
stats (from memory and the manual):
- 360x360 dot-printing for hi-res graphics, etc.
- VERY fast (up to 192 cps) printing in "printer-controlled" (as
opposed to Windows driver-controlled) printing
- Bidirectional printing for faster processing speed
- 5 fonts ("courier","prestige","bold ps","script","sans serif")
- Epson LQ-2500 and IBM Proprinter X24 printer emulation
- Can accept single sheets, envelopes, and 3 non-carbon copies by
friction feed
- Front or bottom paper feed
- 6KB buffer
I will send a sample document and a printed GIF/JPEG file to anyone
who wishes to send a SASE. With purchase (prepaid, please!), I will
include the following accessories:
- Manual
- cable (Centronics)
- remaining stack of tractor-fed paper (about .4")
- FREE copy of Windows printer driver (unless this is illegal, or if
it is included with Windows)
- FREE unregistered DOS shareware program ($2 registration, I think)
that apparently offers some word processing capabilities
from DOS
The last two will be on a disk (either size). I am asking for around
$165, but I am open to any (reasonable) offers. I am a college
student, so I cannot afford to buy a new printer without getting a
considerable portion of the money from this printer. This price
includes all above items, and shipping (probably UPS) is included as
well. I have the original box, but only one of the original Styrofoam
end pieces. I will use a towel on the other end (you get a free towel
too!!). Worked fine getting it here. The whole shebang might not fit
in the original box; I will figure this out after the offers come in.
Email any questions and offers. -Jon. | 6 | misc.forsale |
14 | sci.space |
|
While others here may have had better experiences, I, too, share the
sentiments posted above. Though I have the original Stealth/VRAM,
it is only "relatively" recent that the Windows drivers for this card
have evolved to a point of decent performance. Note that there are
STILL a couple of modes I cannot use (ie. will not) due to shadowing,
mis-drawn check boxes, etc. I believe the version I have is 2.01.
If there's a more recent release, I'd appreciate if someone would
drop me a note to let me know -- I haven't been able to get on their
BBS lately to check again. Naturally, Diamond doesn't even bother
notifying me of fixes/releases.
Diamond was helpful when I finally reached the "right" person in curing
some of my Windows' problems due to an address conflict. The conflicting
addresses (2E0, 2E8) were OMITTED in at least my version of the
Diamond/VRAM manual. I hope it has been corrected by now. The tech rep
explained that ALL S3-based boards use these addresses. I have not
confirmed the validity of that statement.
When I upgrade my motherboard in the near future (hopefully with some
form of local bus), I'll seek a video solution from someone other than
Diamond.
Lance Hartmann (lance%hartmann.austin.ibm.com@ibmpa.awdpa.ibm.com)
Yes, that IS a '%' (percent sign) in my network address. | 3 | comp.sys.ibm.pc.hardware |
BO JACKSON 1963
1988 KCR 437 106 16 4 23 28 29 7 .253 67 .243 .288 .455
1989 KCR 517 134 19 5 33 41 27 10 .274 92 .259 .314 .507
1990 KCR 405 110 17 1 27 44 16 9 .286 77 .272 .343 .519
1991 CWS 71 16 3 0 3 12 0 1 .240 10 .225 .337 .394
MAJ 1430 366 55 10 86 125 72 27 .270 246 .256 .316 .489
MAJ 598 153 23 4 36 52 30 11
This is what Jackson looked like in 88-91, with everything converted
to a neutral park, on the basis of run production. His equivalent
average started at .253 in 88, was up to .274 in 89 and 286 in 90. So
let us say he had established, in his last two seasons, a .280 level
of play.
That is good. Very good, in fact. But it probably doesn't make the top
ten in the league. The 10th best EQA in the AL in 1992 was Dave
Winfield's .296; Thomas was first at .350. First in the NL was Bonds,
an incroyable .378; tenth was Bip Roberts, .297. But .280 is better
than any season in the past five years by Joe Carter; it is about what
Mattingly had in 1988 (.285); what Felix Jose had the last two years;
just ahead of Time Raines' five-year average; better than Ryan
Klesko's MLEs.
He got more attention from the media than was warranted from his
baseball playing, though; his hype was a lot better than his hitting.
That is the basis for the net.comments about him being overrated. The
media would have you beleive he was a great hitter. I think he was a
good, maybe very good hitter. He was IMO, something like the 30th best
hitter in the majors. | 9 | rec.sport.baseball |
I have a toggleButton widget (yes widget) and I have a routine
which changes the color of the foreground and background of the
label. Well, the background changes alright, but the label
text does not redraw itself.
I am guessing that I have to force it to redraw with an
XExposeEvent sent to it via XSendEvent. Is this the best
way to get the text up again? I can't seeem to get
XSEndEvent to work right.... if this is a good approach,
might anyone have an example lying around to show me how to
do this? I've RTFM all evening and did not find a decent
example.
PS I keep getting Segmentation Faults in XSEndEvent, tho all
the values are as expected.
Thanks in Advance | 5 | comp.windows.x |
13 | sci.med |
|
I'm interested if anyone out here can point me towards a review of the
following book in any scholarly Christian journal, whether it be
conservative or liberal, Protestant or Catholic.
_The_Lost_Years_of_Jesus_ (documentary evidence for Jesus' 17 year
journey to the East), by Elizabeth Clare Prophet. Supposedly this
is a theory that was refuted in the past, and she has re-examined it.
I thought this was just another novel book, but I saw it listed as
a text for a class in religious studies here. Also, the endorsements seem
to come from some credible sources, so I'm wondering if scholars have
reviewed it (or anyone on the net, for that matter).
| 15 | soc.religion.christian |
I use the Diamond SpeedStar 24X in 1024X768X256 mode all of the time. I
have NOT found distortions in the cursor. The cursor is a little jumpy
from time to time (due to 32 bit access to the swap file), but it is never
distorted. | 2 | comp.os.ms-windows.misc |
COMMERCIAL SPACE NEWS/SPACE TECHNOLOGY INVESTOR NUMBER 22
This is number twenty-two in an irregular series on commercial
space activities. The commentaries included are my thoughts on
these developments.
Sigh... as usual, I've gotten behind in getting this column
written. I can only plead the exigency of the current dynamics in
the space biz. This column is put together at lunch hour and after
the house quiets down at night, so data can quickly build up if
there's a lot of other stuff going on. I've complied a lot of
information and happenings since the last column, so I'm going to
have to work to keep this one down to a readable length. Have fun!
CONTENTS:
1- US COMMERCIAL SPACE SALES FLATTEN IN 1993
2- DELTA WINS TWO KEY LAUNCH CONTRACTS
3- COMMERCIAL REMOTE SENSING VENTURE GETS DOC "GO-AHEAD"
4- INVESTMENT FIRM CALLS GD'S SPACE BIZ "STILL A GOOD INVESTMENT"
5- ARIANE PREDICTS DIP IN LAUNCH DEMAND
6- NTSB INVESTIGATES PEGASUS LAUNCH OVER ABORTED ABORT
7- ANOTHER PEGASUS COMPETITOR IS ANNOUNCED
8- GEORGIA LAUNCH SITE DROPPED FROM PLANNING
9- SPAIN'S CAPRICORNIA LAUNCHER STILL PROCEEDING
10- PACASTRO SIGNS LAUNCH RESERVATION WITH SWEDISH SPACE CORP
11- CHINA AND TAIWAN JOINT SATELLITE VENTURE REPORTED
12- SOUTH KOREA ANNOUNCES NATIONAL MOVE INTO SPACE TECHNOLOGIES
13- SPACE TECHNOLOGY INDEXES THROUGH MARCH
FINAL NOTES
ARTICLES
--------------------------------------------------------------------
1- US COMMERCIAL SPACE SALES FLATTEN IN 1993
The US Department of Commerce projects US commercial space sales
will remain flat in 1993, with current data showing only a 2 percent
growth over 1992. As published in "US Industrial Outlook 1993"
(which was released in January), revenues from the 1993 US space
business are currently projected to be about $4,890 M.
In contrast to previous years when US commercial space sales had
shown double digits growth rates, this year's projected results are
driven by the US satellite manufacturing industry, where sales are
projected to drop from 12 satellites worth $1,300 M in 1992 to 7
satellites worth $ 670 M in 1993. The US Industrial Outlook also
projects U.S. commercial launchers faces flat demand in coming year,
and while predicting that 1993 revenues will increase 10 percent to
$450 M, future sales will be "adversely affected by the downward
revision in Department of Defense launch plans."
Offsetting flat launch revenues and satellite deliveries,
revenues for fixed and mobile satellite services are projected to
increase to $1,900 M, primarily driven by increased revenues from
broadcast and cable TV networks. Similarly, remote sensing products
and sales are projected to increase to $250 M in 1993 (up 15%).
US COMMERCIAL SPACE REVENUES 1989 1990 1991 1992(r) 1993(e)
Commercial satellites 900 1,000 1,100 1,300 670
Satellite services 750 800 1,200 1,500 1,900
Fixed (700) (735)(1,115)(1,275) (1,520)
Mobile (50) ( 65)( 85)( 225) ( 380)
Satellite ground equip 790 860 1,350 1,400 1,560
Mobile equipment (40) (85) (280) (352) ???
Commercial launches 150 570 380 450 450
Remote sensing data and services 125 155 190 215 250
Private microgravity research lab -- -- -- -- 60
===== ===== ====== ===== =====
TOTAL ANNUAL REVENUES 2,715 3,385 4,220 4,815 4,890
(r) = revised data for 1992 (e) = estimated data for 1993
[Commentary: This is the first look at how the US commercial
space industry is expected to do in 1993. In general, not a bad
report -- with most of the bad news concentrated in the satellite
manufacturing area. There, changes of only a few satellites worth
$100 M or so apiece can substantially influence the annual
projection. If we look forward over several years, this market
sector should retain strong sales as US firms have been very
successful in regaining international market share in the satellite
business.
Furthermore, sales of satellite ground equipment should go up in
the next revision of this data, expected to be released about mid-
year. Data on mobile satellite ground equipment sales (including
such items as GPS receivers and portable satellite terminals)
appears to be missing from the January data set. DoC usually
publishes a listing of "Space Business Indicators" in mid-year, and
the next revision of commercial space revenues should be released
then. I expect the revised revenues should easily top $5,000 M, if
the mobile satellite ground equipment are added back into the
numbers, and the year should show about a 10% overall market growth.
Looking beyond this year's data, future markets look quite
promising. The DoC projects satellite service revenues could top
$3,000 M by 1995 if new mobile satellite services and direct
broadcasting are implemented as planned, and that mobile satellite
station sales are expected to continue to growth at 15-20 % per year
through the mid 1990's. My numbers are somewhat more pessimistic
for near-term market growth, but I agree the trend should be for
substantial growth in US commercial space sales over at least the
next 5-10 years. (My pessimism is due to more conservative
assumptions on market capture and growth in LEO communications and
satellite direct broadcasting services. I don't believe all of the
current players in the yet-to-be-born LEO communications satellite
market and in the yet-to-be-proven direct broadcasting market will
be financial successes, nor that sales growth will be as explosive
as currently projected.)
It should also be noted this year's DoC data is the first
release to show revenues from privately funded microgravity research
facilities. The $60 M shown in the Janurary data is primarily for
the Spacehab module, planned for launch in April on the Space
Shuttle, but also hidden in these numbers are the projected first
sales from the COMET orbital launch and recovery experiment module.]
2- DELTA WINS TWO KEY LAUNCH CONTRACTS
McDonnell Douglas Corporation, which builds and markets the Delta
launch vehicle has won two important launch contracts. Motorola
Inc. announced in mid February that it had selected the Delta to
launch most of the satellites in the 66-satellite Iridium LEO
communications constellation, and in mid April, McDonnell Douglas
was awarded the USAF Medium Launch Vehicle III contract.
The launch services contract with Motorola for the Iridium
constellation launch is for at launch of least 45 Iridium
satellites. Another 21 satellites have been contracted to be
launched by Khrunichev Enterprise in Russian on 3 Proton vehicle
launches. These 45 satellites planned for the Delta will be
launched 5 at a time, providing for at least 9 launches.
Additional satellites in the Iridium constellation, such as a
planned on-orbit spares, may also be launched on Delta. Although
details of the launch services contract were reported to be
negotiation, and not yet final.
The USAF MLV contract also went to MDC, bidding a variant of
their Delta II launcher. This contract is only initially worth $7.5
million, but establishes a set of launch options for up to 36
launches, encompassing launches from 1996 through 2002. These
launches will deploy the next generation of the USAF's Global
Positioning System Block IIR navigation satellites, plus other
programs. First option for to meet the USAF launch options is
expected to be exercised this year, after which the USAF is expected
to request launches of up to 6 Deltas per year for at least 6 years.
Under this contract the USAF can also request "launch on demand"
services from MDC for the 1996-2002 time period, with a launch to
occur within 40 days of the request.
[Commentary: If these two contracts are fulfilled, they should
provide an excellent business base for MDC's Delta launch program
through the turn of the century. Combined, these two contracts have
a potential for about 45 launches, worth about $2,200 M to MDC, and
sustaining a core business base of $300-400 M/year. Other contracts
for international and commercial payloads, as well as for NASA
Medium ELV-class payloads, will add to this business base -- keeping
MDC as a viable commerical launch company.
However, it should be noted there are risk elements in these
contracts. Motorola's Iridium LEO communications constellation has
not yet received a US Federal Communications Commission license for
operation in the U.S., nor has Motorola lined up all the financing
and financial partners for the Iridium venture. Without these
approvals or financial backing there will be no Iridium launches.
But, hopefully, these uncertainties will be settled this year.
Similarly, the USAF MLV III program has been the target of
several Congressional actions which have slowed the production of
the GPS Block IIR satellites and deleted the funding for the MLV III
program in favor of the USAF NLS/"Spacelifter" program. At this
time, while it appears the MLV III contract will be executed, future
funding for the MLV III and other USAF commercial launch contracts
is being reconsidered as part of national space launch strategy
reviews. Some opinions expressed from within the Administration and
Congress propose cancellation of all "ELV upgrade" programs
(including the MLV programs) in favor of the proposed "Spacelifter"
program. Such opinions may have some weight in this year's budget
deliberations, particularly as DoD funds will be more difficult to
find in the shrinking US Defense budget.]
3- COMMERCIAL REMOTE SENSING VENTURE GETS DOC "GO-AHEAD"
The first commercial license to operate a remote sensing
satellite was approved in early February by the US Department of
Commerce's Office of Space Commerce. A license was granted to
WorldView Imaging Corporation of Oakland, California to build and
operate a pair of LEO imaging satellites to provide multi-spectral
images of the Earth.
[Commentary: There has been little data released on this venture
by WorldView and the DoC, other than the announcement of the
operating and construction license. This was reported to be at the
request of WorldView. Most industry speculation identifies this new
venture as a "Star Wars" spinoff, using SDI-type technology to
provide digital Earth sensing data, and heavily integrated into
digital GIS databases for remote sensing/GIS users. Most probable
customers for this service include exploration geologists,
agricultural planners, and urban planners.
It is noteworthy this is the first commercial venture under the
1992 Land Remote Sensing Policy Act. The Act, as passed last
November, provides that remote sensing data gathered from private remote
sensing craft may be sold to users at differing prices. Prior to
this act, remote sensing data from all satellites had to be sold to
all users at the same prices, and private remote sensing ventures
would have had to sell at the government-set Landsat data prices.
There are rumors of several other potential commercial remote
sensing ventures working their way through the system at different
stages of development. I think the large Landsat and SPOT satellite
systems will provide the majority of the satellite remote sensing
data market for the next decade or so. In contrast to these large,
government-sponsored remote sensing systems, smaller market ventures
such as WorldView and others can exploit market niches and use
innovative technology, and I believe, can find profitability on the
margin. I predict there may be some very interesting ventures
appearing in the next year or so.]
4- INVESTMENT FIRM CALLS GD'S SPACE BIZ "STILL A GOOD INVESTMENT"
Wall Street investment house Morgan Stanley thinks General
Dynamic's Space Systems Division could still be a moneymaker,
despite having failed in the last 3 Atlas launches. In a recent
analyst's report Morgan Stanley said "We are more than ever
convinced that if the company can return the Atlas to its historical
95%-plus success rate, this will become a highly profitable, cash-
generating unit." Based upon discussions with GD's corporate
management, Morgan Stanley projects that if the Atlas problems are
cleared up the unit could see $70 M in earnings per year by 1995 and
$100 M per year by 2000. This is based upon GD's projection of
capturing about 10 Atlas launches per year on the world market.
[Commentary: Three failures in a row of their launch system has
hurt General Dynamic's Space Systems Division. Since GD has
restructured to only keep a very few profitable core businesses,
many market pundits have been speculating GD's space business might
be next to be sold. The Morgan Stanley report indicates GD's Space
Systems Division has some potential as a moneymaker, despite current
problems -- if they can get their act together. Sales are projected
to be about $560 M in 1993, which will probably generate a loss of
about $25 M. If GD can capture their projected share of the space
launch market, and if they have managed to clean up the reliability
of their Atlas launchers, then they could generate healthy profits
from those sales. But until they demonstrate the Atlas Centaur
program is back on track, this division will continue to show
substantial losses.
In response to the sell-off rumors, in my opinion, this operation
is not a really good candidate for takeover and quick profitability.
To do such a takeover, the current set corporate and divisional
management would be replaced with another set from outside the firm.
In GD SSD's case, to get the division back on track, the management
team will have to concentrate hard on the technical problems with
the Atlas Centaur, as well as in selling Atlas services. This would
indicate only another firm with experience in rocket launch
operations could find such talent in-house, and be able to convince
customers to buy their launch services. Optimally, the firm would
have substantial liquid rocket experience, and experience in
marketing space technology internationally as well. Candidates for
this might be TRW, Rockwell, Lockheed, and Martin, and possibly
McDonnell Douglas and Boeing. But most of those firms have cash
flow problems (MDC), have had a substantial business contraction
(Boeing and MDC), are involved with other launch firms (Lockheed),
or have taken on substantial debt (Martin). And coming up with the
$700-1500 M purchase price for the division is a big chunk of
change for any company.]
5 - ARIANE PREDICTS DIP IN LAUNCH DEMAND
Arianespace, the operator of the Ariane launch system, is
projecting a dip in launch demand in the late 1990's. In early
February, Arianespace released their annual market survey, which
detailed their projection of the space transportation market for the
next decade.
Over short run, Arianespace expects to retain their dominant
position and sustain a majority share of the launch market. Of 54
international and commercial launches planned through 1995, Ariane
holds contracts for 31, General Dynamics' Atlas vehicle holds 14
contracts, McDonnell Douglas' Delta holds 7, and Great Wall's Long
March vehicle holds 2 launch contracts.
Three-quarters of future launch contracts for which Ariane can
compete are projected to come from communications satellites with
the remaining 25% split between weather, Earth observation, and
scientific satellites. Most of the future telecommunications demand
growth is predicted to come from the Asia/Pacific region.
Arianespace expects the current market consolidation of
individual satellite operators into regional or national groups will
continue, with these groups investing in heavier satellites with
larger communications payloads carrying more transponders.
Arianespace predicts the average mass of telecommunications
satellites should increase by 20 % over today's average level, to
about 3000 kg in GEO.
Demand for commercial launch services is expected to remain
strong over the next three years, but in the second half of the
decade, Arianespace predicts demand will decrease. Arianespace
bases this prediction upon a matching of satellite transponder
demand and supply, particularly as new data compression techniques
appear to could double or triple transponder capacity using existing
or near-term transponders.
One of the significant possible changes in the market was
identified as the arrival of new launch vehicles, including Russian
launch systems. But Arianespace predicts that in the long term,
investors purchasing launch services are looking for the best trade
off between launch service quality and price, and that Russian and
other new launch services will have to prove out their capabilities
and service quality, and their market penetration will be minimal.
[Commentary: Ariane releases their market surveys annually, and
I reported on their prior market survey in a past issue of CSN/STI.
Comparing the two surveys, there aren't outstanding differences in
the numbers. The most notable change is the consideration of new
data compression techniques, reducing the demand for new physical
transponders on orbit.
I note that in contrast to some predictions, demand for space-
based communications transponders appears to be remain strong. While
fiber optic lines are making substantial inroads into the
established point-to-point telecommunications markets, growing
demand for telecommunications services world wide and for point-to-
multipoint broadcast services have prevented a decrease in space
transponder demand. Fiberoptic cables provide a higher capability
service, but only from established point A to established point B.
To establish a fiberoptic link it is necessary to install cable
between the points, and while there are improved network solutions,
installing a large network of distributed fiberoptic links can cost
millions or billions of dollars.
For broadcast services where there is not an existing ground
network structure, satellites still offer the most cost effective
solution. And if new services are required into a new region, it is
cheaper to install a small satellite link costing only a few tens of
thousands of dollars and tie into the existing global satellite
network. This allows rapid growth of new satellite services, and
has kept demand high. The replacement market for fiberoptics is
growing as well, since as demand grows between the points serviced,
it becomes cost effective to later install a fiberoptic link to
handle the increase in traffic.
Since the telecommunications and data transfer markets are still
growing rapidly, satellite market projections remain rosy. But
satellites are also getting longer orbital lifetimes. Current
generation satellites are now getting guarantees of at 15 years of
on-orbit service or more, in contrast to 10 years of service from
last generation's satellites. This has cut back some of the launch
demand, as satellite owners are rescheduling replacement satellite
launches over longer intervals.
And as last note; Arianespace didn't flag it this year, but it
looks like the space transportation market will be rather over-
supplied by existing launch systems in the near term. The annual
commercial launch demand is for about 15-20 medium sized satellites
per year. From the supply side, Ariane is capable of launching up
to about a dozen medium sized satellites a year, Delta is capable of
about 9-12 per year, Atlas is capable of 6-12, Long March 4-8,
Japan's H-Vehicle 2-4, Russia's Proton capable of 8, and other
systems such as Zenit and Soyuz another 10-20 medium launches per
year. That's a lot of capability for a small market.
We can only expect the competition to intensify for commercial
launches.]
6- NTSB INVESTIGATES PEGASUS LAUNCH OVER ABORTED ABORT
The 9 Feb Pegasus launch by Orbital Sciences Corporation has
spawned an investigation over an apparent violation of range safety
rules. A valid abort order from a NASA range safety officer to halt
the mission was overridden and the Pegasus was launched in violation
of range safety rules.
In the last few minutes of the Pegasus launch countdown, one of
two abort command receivers aboard the Pegasus failed. Such a failure
typically scrubs a launch,and a NASA range safety officer at
Wallops Island, VA issued a mission abort order about a minute
before the scheduled Pegasus launch. Somehow this command was
overridden by the OSC launch team or the message was lost in the
communications channels, and the Pegasus was launched despite the
valid abort call.
Fortunately, the Pegasus functioned as expected, and the abort
command receiver was not needed. But this incident did spark an
investigation since a valid abort order was given under agreed-to
launch constraint rules, and was not obeyed.
Leading the investigation is the National Transportation Safety
Board (NTSB) with support from NASA, OSC, and the Air Force. This
investigation marks the first time NTSB has taken the lead on an
incident involving a space launch. According to the NTSB, their
investigation will take about 6 months, and is primarily looking at
lines of authority, communications links and safety procedures used
in the launch.
[Commentary: This is the first time that the NTSB has led an
investigation into a space launch. Their leadership was requested
by the Department of Commerce's Office of Commercial Space
Transportation, who had licensed the commercial launch.
At the time of writing this column, some of the initial
investigations have been concluded, and some of the results are
starting to leak out into the trade press. Apparently, 3 or four
different communications channels were in use during the test. After
the abort destruct receiver stopped responding, the NASA test
director and range controller in the Mission Control room at Wallops
Island gave abort orders about a minute before the launch.
According to the mission rules, this should have stopped the launch.
Somehow, the OSC test conductor ordered the abort reversed, and the
NASA communicator on the net relayed that order to the B-52 carrying
the Pegasus at about 22 seconds before launch. Differing
explainations of exactly how this happened are proposed -- with the
best set being that clear lines of communications and clear
definition of the responsibilities of the mission control team, and
understanding of the mission rules were not established before the
launch.
As we see more and more commercial launches, more of these
procedural issues are going to crop up and will have to be resolved.
This case is interesting because it is the first time the NTSB has
been called in to investigate a commercial launch problem (as they
do with commercial aircraft problems).
I think this problem will turn out to be primarily problems with
procedures and communications, and will be cleared up with issuance
of guidelines on how launch communications should be set up and how
specific lines of authority should be delineated.]
7- ANOTHER PEGASUS COMPETITOR IS ANNOUNCED
Tsniimach Enterprise in Russia announced it is marketing a new
small space launch system, based upon converted ICBM components.
Two versions of the launcher are being marketed: the "Aerokosmos"
winged vehicle launched like the OSC Pegasus, and the "Severkosmos",
launched from a mobile ground transporter. The Aerokosmos is
projected to deliver 900 kg to a 200 km circular orbit or 580 kg to
an 800 km circular orbit, and the Severkosmos to be capable of 430
kg to 200 km orbits and 225 kg to 800 km. Also proposed to be used
with these launch systems is a LEO data relay system called
'Sineva'. Tsniimach Enterprise is described as a ex-military
establishment, focusing on aerodynamics and thermal protection of
spacecraft and which has participated in the development of the
Buran shuttle system, They are located near the NPO Energia
facility in Kaliningrad, outside of Moscow.
[Commentary: There's very little released information on this new
venture. My suspicion is it is another Russian enterprise looking
for hard currency and trying to capitalize upon their in-house
knowledge of ex-Soviet launch systems. It adds to the list of numerous
commercial space startups announced from the ex-Soviet Union.
This one's a little different in that they are offering variants
of ex-Soviet ICBMs, but I can't identify any key customers being
targeted or substantial financial backing.]
8- GEORGIA LAUNCH SITE DROPPED FROM PLANNING
In late January, Georgia Tech Research Institute released the
results of a preliminary study on the feasibility of a commercial
rocket launching site in Camden County, Georgia at the old Kingsland
Missile Test Launching Site on the Atlantic coast. The preliminary
study recommended the site not be pursued as a commercial launch
site, stating reopening the site was not feasible due to projected
low investment returns, plus environmental and other geographic
considerations. However, the report did say the site might be ideal
for other aerospace uses, and recommended other potential uses.
[Commentary: This should put the nails in the coffin of the
Kingsland Commercial Launch Site. While other sites are still
proceeding with commercial launch site development plans, Kingsland
found without a key customer to act as anchor tenant, and if
substantial infrastructure had to be put in, then the expected
returns were too low to justify the cost of development.
This might point out some key discriminators in judging the
feasibility of a commercial launch site. These include:
- Is there an identified key customer to provide core usage
sufficient to recover setup costs?
- Is there a market advantage of using the site?
- Can existing infrastructure be used or modified at the site?
- Can financing be found at low enough cost to support the
investment?
Other commercial launch site ventures -- including those at
Woomera, Poker Flat, Cape York, White Sands, Alabama Off-Shore
Platform, Hawaii, and Vandenberg have to also be judged against
these criteria. In my opinion, some of these ventures are flying
on hope and speculation, and not on sound financial grounds.]
9- SPAIN'S CAPRICORNIA LAUNCHER STILL PROCEEDING
In one of his last official acts, former President Bush
authorized space technology transfer for several joint space
ventures between US and other firms. One of these was a proposed
use of US technology by Spain to build a small booster. With that
regulatory impediment removed, the 3-stage Capricornia launch
vehicle will start development later this year, planning for a first
launch in the 1995/96 time period. The Capricornia is described as
a small 3-stage all solid booster designed to put 250-500 Kg into
LEO. Several launch sites are being examined for the system,
including 2 on the Iberian peninsula and 1 on the Canary Islands.
Originated by INTA in Spain, the project reports it has $ 30 M in
development funding, and will use technology from Argentina's Condor
launch vehicle as well as from the US.
[Commentary: Several firms have identified a market opportunity
in providing a small launcher for the European market. Small
payloads from European firms or organizations currently use either
Ariane piggyback launches or the US/Italian Scout launcher.
However, Ariane piggyback opportunities are limited, and the Scout
program is being phased out (accompanied by some disarray in the
Italian government and space industry regarding any follow-on
system).
This has left an apparent niche for a new European small launch
system. Surprisingly enough, ESA has not supported development of
such a system within the current space funding structure. Studies
have been performed by British Aerospace, Aerospatiale, Deutsche
Aerospace, and Italian organizations, but with the exception of the
Swedish/PacAstro system (reported below), I have not been able to
find any other European development work with even a rumor of
funding for hardware.
Also of interest is the linking of the Capricornia to the
Argentinian Condor launcher. There have been some interesting
rumors surfacing out of Argentina over the past year about a space
launcher/IRBM program funded under the military junta which ruled
the country in the 1970's and early 1980's.
What is known is in Feb 1992, the Argentinian Air Force formally
transferred control of the Condor 2 missile program to the new
civilian Argentinian national space agency (Comison Nacional de
Atividades Espaciales - CNAE). The Condor 2 program was described
as originating in 1983, expanding upon the smaller Condor 1 rocket
program in collaboration with Egypt and with support of German
firms. The Condor 2 was also reportedly funded indirectly by Iraq
in the mid-1980's. Fairly large solid rocket motors were built and
tested, but Argentinan development of a suitable guidance package
lagged that of the propulsion system.
It should be noted CNAE is planning to launch its first
scientific satellite in late 1994. The US$ 9 M, 181 Kg, SAC-B
satellite will study the Earth's upper atmosphere and includes
cooperative experiments from Italy and the US. No launch vehicle has
yet been selected, but OSC's Pegasus and the Russian Burlak Air
launched rocket are reported to be strong contenders for this
contract.]
10- PACASTRO SIGNS LAUNCH RESERVATION WITH SWEDISH SPACE CORP
PacAstro, a small launch firm in Herndon, Virginia announced in
late February it had received a $6 M launch reservation contract
from the Swedish Space Corp to launch a satellite on PacAstro's PA-2
launch vehicle. This will be performed as part of the Polar
Satellite Service (PSS), a joint Norwegian Space Center/ Swedish
Space Corp. program to upgrade the Andoya Rocket Range in Norway and
offering small satellite launches into the polar regions. According
to PacAstro, PSS is also performing an $8 M upgrade of the Andoya
launch facilities, including a new integration facility and a fully-
enclosed vertical assembly building for small launch vehicles like
the PacAstro PA-2. PacAstro has been chosen as "the main
alternative rocket supplier" for the small satellite launch service
to be offered by PSS from Andoya. The date of the launch of the
Swedish satellite was not specified.
[Commentary: PacAstro has been trying to line up customers and
funding for their launch vehicle for some time now. The PA-2 is a
small, two stage rocket fueled by RP-1 and Liquid Oxygen. From
PacAstro's literature, the engines designed for the PA-series
rockets are built of "off the shelf" components based upon the Lunar
MOdule Descent Engines built by TRW, and are capable of putting a
225 Kg satellite into a 750 km circular polar orbit.
PacAstro is trying to arrange construction financing for its
first three PA-2 vehicles, with a first launch planned for 1995, and
2 orbital launches planned for 1996. My records show PacAstro hired
TRW to provide marketing support and systems design, with primary
engineering to be done by AeroAstro, a small satellite builder
closely associated with PacAstro (headquartered in the same
building). The Swedish Space Corporation would supply engineering,
launch operations, vehicle subsystems, and marketing support.
Sumitomo Corp. of Tokyo, is a first round investor and sits on the
board of directors.
PacAstro has gotten a first round financial package of at least
$550 K (Some sources place this of high as $1 M), but has been
searching for about a year for the additional $20-30 M needed to
design, build and launch their first set of vehicles.
The launch reservation from SSC can possibly be used to help
bring some investors on board, but by my estimate, they will need
much more than the single $6 M sale to put their venture into real
hardware.]
11- CHINA AND TAIWAN JOINT SATELLITE VENTURE REPORTED
In early March, it was reported a joint satellite communications
venture between a Taiwanese and mainland Chinese was in the works.
As reported in the Taipei press, China Development Corp. (CDC),
headquartered in Taiwam and with links to the ruling Nationalist
Party, is planning to set up a joint venture in Hong Kong with China
Great Wall Industry Corp. with the objective of launching a regional
communications satellite. CDC would cover about 10% of the satellite
system cost (US $10 M) in exchange for rights to 10% of the
satellite's communications channels.
[Commentary: This announcement came close on the heels of the
release of Taiwanese plans for space development (released in mid
January). In those plans, the National Space Program Office of
Taiwan will launch 3 satellites, starting with ROCSAT-1, a 400 Kg
scientific spacecraft, planned for launch in 1997. Two additional
satellites are planned, both communications satellites. TRW has
been helping Taiwan plan this program, budgeted at T$13.6 B (US $530
M) through 2006.
I haven't been able to establish any relationship between this
venture and those of the NSPOT, but there might be a connection.
While Taiwan has the financing to pursue several ventures, the
current Taiwanese telecommunications market might not support two
separate sastellite ventures.
The reported name for the Tiawanese/Chinese system is "Asiasat-
2", but I don't thinks this has any relationship with the existing
Hong Kong-based "Asiasat" program involving Chinese, Hong Kong, and
other Asian investors, other than using it as an organizational
model. There are some obvious advantages to pursuing such a joing
venture -- it could provide excellent first-hand experience to
Taiwan for a very low cost, which then can be used in later
satellite ventures. But there are internal political issues between
Taiwanese and Chinese ventures, but putting any joint venture
through a Hong Kong intermediary corporation might allow it to
proceed.
In any case, the East Asian satellite market is lighting up with
substantially growth projected in space services and revenues. This
is just another indicator to add to the list.]
12- SOUTH KOREA ANNOUNCES NATIONAL MOVE INTO SPACE TECHNOLOGIES
South Korea's Trade, Industry and Resources Ministry recently
announced plans to invest US$22 B in research and development and
another US$17 B into manufacturing and research facilities for
advanced aerospace technologies. Space technologies have been
specifically targeted as part of this program, beginning with
manufacture and launch of an advanced multi-purpose satellite by
1997. The objective of this investment is to raise South Korea's
aerospace technology to the level of the world's top 10 countries by
2000.
[Commentary: South Korea has been quietly working to develop its
national aerospace industry, specifically including space
activities. I'm noting this as a flag that potential new players are
coming into the commercial space market.
As part of their national effort, 2 national telecommunications
satellites for Korea Telecom will be launched in April and Oct 1995
on Delta. Designated Koreasat 1 and 2, the platforms will provide
television and telephone service throughout the Korean Peninsula,
southwestern Japan and portions of China bordering North Korea.
South Korea launched its first small satellite piggyback on
Ariane in Aug 1992, called Uribyol-1 (Our Star) and costing about US
$8.8 M. Uribyol-2 is planned for piggyback launch in October of
this year, again on Ariane, and will be entirely "made in Korea."
Uribyol-3, projected for a 1995 launch, will be an environment-
monitoring micro-satellite.
This satellite may be the precursor to a series of small Earth
observation satellites, The KEOS (Korean Earth Observation System)
project, which has been submitted for approval to the South Korean
government, would use two or three 300-kg spacecraft equipped with
optical and microwave sensors.
South Korean press reports claim there is also a parallel
military effort to establish the capabilities for building and
launching small military satellites by 2001. Supposedly a
government panel had been established to oversee such an effort,
funded at US $ 500 M between 1993 and 2001, in anticipation of an
expected pullout of U.S. intelligence-gathering systems from the
Korean peninsula.
In conjunction with all of these reported efforts, South Korean
is also pursuing production work either as off-sets to existing
aerospace technology contracts (for example, McDonnell Douglas is
offsetting production of some Delta parts to South Korean firms as
part of the Koreasat launch contracts), or for production of
consumer space items (among other products, South Korea exports
satellite receiver television setups to Japan, and Samsung has
announced teaming for production of OSC's Orbcomm user terminals.).
This looks like a very aggressive push into space technologies.
Considering that East Asia is currently the fastest growing sector
for commercial space services (primarily for telecommunications), a
South Korean push into space technologies may change the composition
of commercial space market there over the next decade.]
13- SPACE TECHNOLOGY INDEXES THROUGH MARCH
As announced in the last CSN/STI, each issue will give the
results of stock indexes and portfolios regarding space stocks and
investments. The table below summarizes results to the end of
March. The Space Technology Index did quite a bit better than the
market as a whole, as represented by the S&P 500 index. Since 90+%
of the values included in the index are US firms, this represents a
general increase in the market value of space-related firms. The
increase in the first quarter is more than in all of 1992 -- which
is a very promising sign, although future months may reverse this
trend. The Commercial Space Technology Index has also done quite
well, but the Pure Play portfolio -- consisting of stocks of firms
which are pure plays in space technologies -- has also surpassed its
results in all of 1993. We'll keep an eye on these ....
INDEX RESULTS THROUGH MARCH
Beginning Beginning 1 Jan 93 to
1992 1993 31 Mar 1993
------- -------- --------
S&P 500 416 436 (+4.7%) 452 (+3.7%)
Space Tech Index 267 304 (+13.6%) 373 (+22.7%)
Comm'l Space Tech Index 167 194 (+16.3%) 222 (+14.2%)
Space Tech Pure Plays 147 169 (+15.4%) 197 (+16.2%)
FINAL NOTES -
What? This column's already full? And I still have bunches of
commercial space developments to report on. As I said at the start
of this, column there's been a lot of interesting happenings - but
I'll have to put them into the next issue.
Looking ahead, I've got several articles in the works on new
happenings with Iridium and the LEO communications satellite market,
more news on international launchers appearing (and disappearing) on
the market, new international commercial space ventures, and other
interesting developments.
And as always, I hope you folks find this stuff useful and
interesting -- Any and all comments are welcome.
| 14 | sci.space |
Hello.
Is it possible to know minimize program manager when starting an
application and to restore it when the application is ended ?
If possible, please tell me how to do it !
| 2 | comp.os.ms-windows.misc |
xdm does XGrabServer when it's running in secure mode (so do some
screen-locks). There's really no simple way to tell this is the case.
You can take xdm out of secure mode; probably not too cool.
You can wrap your call to XOpenDisplay in some code which solicts
a future SIGALRM and longjmps past the XOpenDisplay from the signal
handler. An example of this can be seen in the xdm sources. | 5 | comp.windows.x |
: I
: |> Jim,
: |>
: |> I always thought that homophobe was only a word used at Act UP
: |> rallies, I didn't beleive real people used it. Let's see if we agree
: |> on the term's definition. A homophobe is one who actively and
: |> militantly attacks homosexuals because he is actually a latent
: |> homosexual who uses his hostility to conceal his true orientation.
: |> Since everyone who disapproves of or condemns homosexuality is a
: |> homophobe (your implication is clear), it must necessarily follow that
: |> all men are latent homosexuals or bisexual at the very least.
: |>
:
: Crap crap crap crap crap. A definition of any type of 'phobe comes from
: phobia = an irrational fear of. Hence a homophobe (not only in ACT UP meetings,
: the word is apparently in general use now. Or perhaps it isn't in the bible?
: Wouldst thou prefer if I were to communicate with thou in bilespeak?)
:
: Does an arachnophobe have an irrational fear of being a spider? Does an
: agoraphobe have an irrational fear of being a wide open space? Do you
: understand English?
:
: Obviously someone who has phobia will react to it. They will do their best
: to avoid it and if that is not possible they will either strike out or
: run away. Or do gaybashings occur because of natural processes? People
: who definately have homophobia will either run away from gay people or
: cause them (or themselves) violence.
:
Isn't that what I said ...
What are you taking issue with here, your remarks are merely
parenthetical to mine and add nothing useful.
: [...]
:
: |> It would seem odd if homosexuality had any evolutionary function
: |> (other than limiting population growth) since evolution only occurs
: |> when the members of one generation pass along their traits to
: |> subsequent generations. Homosexuality is an evolutionary deadend. If I
: |> take your usage of the term, homophobe, in the sense you seem to
: |> intend, then all men are really homosexual and evolution of our
: |> species at least, is going nowhere.
: |>
:
: So *every* time a man has sex with a woman they intend to produce children?
: Hmm...no wonder the world is overpopulated. Obviously you keep to the
: Monty Python song: "Every sperm is sacred". And if, as *you* say, it has
: a purpose as a means to limit population growth then it is, by your own
: arguement, natural.
Consider the context, I'm talking about an evolutionary function. One
of the most basic requirements of evolution is that members of a
species procreate, those who don't have no purpose in that context.
:
: |> Another point is that if the offspring of each generation is to
: |> survive, the participation of both parents is necessary - a family must
: |> exist, since homosexuals do not reproduce, they cannot constitute a
: |> family. Since the majority of humankind is part of a family,
: |> homosexuality is an evolutionary abberation, contrary to nature if you
: |> will.
: |>
:
: Well if that is true, by your own arguements homosexuals would have
: vanished *years* ago due to non-procreation. Also the parent from single
: parent families should put the babies out in the cold now, cos they must,
: by your arguement, die.
By your argument, homosexuality is genetically determined. As to your
second point, you prove again that you have no idea what context
means. I am talking about evolution, the preservation of the species,
the fundamental premise of the whole process.
:
: |> But it gets worse. Since the overwhelming majority of people actually
: |> -prefer- a heterosexual relationship, homosexuality is a social
: |> abberation as well. The homosexual eschews the biological imperative
: |> to reproduce and then the social imperative to form and participate in
: |> the most fundamental social element, the family. But wait, there's
: |> more.
: |>
:
: Read the above. I expect you to have at least ten children by now, with
: the family growing. These days sex is less to do with procreation (admittedly
: without it there would be no-one) but more to do with pleasure. In pre-pill
: and pre-condom days, if you had sex there was the chance of producing children.
: These days is just ain't true! People can decide whether or not to have
: children and when. Soon they will be able to choose it's sex &c (but that's
: another arguement...) so it's more of a "lifestyle" decision. Again by
: your arguement, since homosexuals can not (or choose not) to reproduce they must
: be akin to people who decide to have sex but not children. Both are
: as "unnatural" as each other.
Yet another non-sequitur. Sex is an evolutionary function that exists
for procreation, that it is also recreation is incidental. That
homosexuals don't procreate means that sex is -only- recreation and
nothing more; they serve no -evolutionary- purpose.
:
: |> Since homosexuals have come out the closet and have convinced some
: |> policy makers that they have civil rights, they are now claiming that
: |> their sexuality is a preference, a life-style, an orientation, a
: |> choice that should be protected by law. Now if homosexuality is a mere
: |> choice and if it is both contrary to nature and anti-social, then it
: |> is a perverse choice; they have even less credibility than before they
: |> became prominent.
: |>
:
: People are people are people. Who are you to tell anyone else how to live
: their life? Are you god(tm)? If so, fancy a date?
Here's pretty obvious dodge, do you really think you've said anything
or do you just feel obligated to respond to every statement? I am not
telling anyone anything, I am demonstrating that there are arguments
against the practice of homosexuality (providing it's a merely an
alternate lifestlye) that are not homophobic, that one can reasonably
call it perverse in a context even a atheist can understand. I realize
of course that this comes dangerously close to establishing a value,
and that atheists are compelled to object on that basis, but if you
are to be consistent, you have no case in this regard.
:
: |> To characterize any opposition to homosexuality as homophobic is to
: |> ignore some very compelling arguments against the legitimization of
: |> the homosexual "life-style". But since the charge is only intended to
: |> intimidate, it's really just demogoguery and not to be taken
: |> seriously. Fact is, Jim, there are far more persuasive arguments for
: |> suppressing homosexuality than those given, but consider this a start.
: |>
:
: Again crap. All your arguments are based on outdated ideals. Likewise the
: bible. Would any honest Christian condemn the ten generations spawned by
: a "bastard" to eternal damnation? Or someone who crushes his penis (either
: accidently or not..!). Both are in Deuteronomy.
I'm sure your comment pertains to something, but you've disguised it
so well I can't see what. Where did I mention ideals, out-dated or
otherwise? Your arguments are very reactionary; do you have anything
at all to contribute?
:
: |> As to why homosexuals should be excluded from participation in
: |> scouting, the reasons are the same as those used to restrict them from
: |> teaching; by their own logic, homosexuals are deviates, social and
: |> biological. Since any adult is a role model for a child, it is
: |> incumbent on the parent to ensure that the child be isolated from
: |> those who would do the child harm. In this case, harm means primarily
: |> social, though that could be extended easily enough.
: |>
: |>
:
: You show me *anyone* who has sex in a way that everyone would describe as
: normal, and will take of my hat (Puma baseball cap) to you. "One man's meat
: is another man's poison"!
:
What has this got to do with anything? Would you pick a single point
that you find offensive and explain your objections, I would really
like to believe that you can discuss this issue intelligibly. | 0 | alt.atheism |
A few days back someone posted info on a gopher site where you could
search for medical graphics, etc. Could someone please repost or mail me
a copy? I'd greatly appreciate it. Thanks!
Mark | 1 | comp.graphics |
I have one thing to say-- why does everyone say that spliting them up is
such a bad thing? I actually like my program launcher and file manager
do be seperate.. it make things easier to figure out.. I mean, take a look
at OS/2's wps... (no flames!).. I personally hate it cause I just
have too much trouble figuring out how to do simple things like file copy..
and don't say "just drag the icon!".. Cause I hate icons in the first place.
I have too much trouble telling what all those little push buttons mean.
I want "F"ile "C"opy etc..
although I know I'm in the minority.
--
----------------------------------------------------------------------------
swyatt@brahms.udel.edu !!! no disclaimer...I blame everything on someone else | 2 | comp.os.ms-windows.misc |
[lots of things, none of which are quoted here]
Oh, ye of little imagination.
You don't jump over those - that's where you lay the bike down and slide under! | 8 | rec.motorcycles |
Yup. Unfortunately, as has been pointed out, the cost of insurance
does NOT go down with No Fault. The crappiest drivers make out like bandits
because they no longer have to bear the responsibility of paying for
insurance that they have boosted in price for themselves by being crappy
drivers. The good drivers now pay through the nose to spread the cost of
the crappy drivers' actions, and that's not fair.
Any plan that caps rates for crappy drivers is inherently a piece of
shit, because the rest of us end up paying more.
Any plan that uses speeding tickets as a basis for raising rates is
also a piece of shit as it is based upon the lie that faster drivers are
inherently less safe than slower drivers, and the NHTSA disproved that two
years ago now.
Later, | 8 | rec.motorcycles |
Hi,
I've just built a valve preamp and use a diode/capacitor
voltage multiplier to step the 12vAC supply voltage up to approx
260vDV. As the load resistance increases, the RC constant decreases
and hence the output voltage drops. I need as high an output
voltage as possible. (about 260v).
The circuit consists of seven voltage multiplier stages
(ie 14 diodes and 14 capacitors) each capacitor develops about 38v
across them, and I take the output from across seven capacitors=260v.
Each capacitor is 100mfd at 68v.
If I increase each of the capacitors rating (220-470mfd), that will
increase the RC constant, and hence alleviate some of the problem.
These capacitors are going to be a little expensive as I need 14 of
them, So:
1. What would happen if I connected a 470mfd at 400v capacitor in parallel
with the output (and hence in parallel with the seven 100mfd capacitors)?
Will it, as I assume, increase the C in circuit and hence increase
the RC time constant? If it does, and my output voltage becomes more
stable by doing this, then I will have killed two birds with one stone...
as I am experiencing some 50Hz ripple (and hence amp hum), and this new
capacitor will 'smooth' this out.
and
2. Can anyone recomend a suitable value for an inductor (choke) to
be placed in the output line of the power supply to filter out
the 50Hz mains hum. Lowest resistance possible !
I've not got my preamp with me at the moment because it is TOO MUCH
of a distraction.... (I'm at university and I've got to get my
dissertation finished in two weeks !!!!!!!) hence I'm mailing not
playing with my solderoing iron (it'll be cheaper too in the long
run... especially if 14 new large capacitors don't work as planned!)
Email please.... Can't always read the net.....
Thanks in advance..
Chris ;-)
+====================================================================+
|Name : Mr Chris Smith | Twang on that 'ole guitar ! |
|Addrs: scst83@uk.ac.liv.csc | |
|Uni : Liverpool University |Quest: To build more and more hardware |
|Dgree: Computer Science | |
+====================================================================+
"What ever the sun may be, it is certainly not a ball of flaming gas!"
-- D.H. Lawrence. | 12 | sci.electronics |
************************************************************
* For Sale - Jazz Compact Discs *
************************************************************
I have the following CDs for sale, they are all in mint condition
and are fairly hard to find. They are all on the savoy label and
put out by Dennon (Dennon bought the rights to Savoy and released
these disks)
I would like to sell them all in one package deal but I will consider
individual orders.
These are the titles and artists:
Telefunken Blues Milt Jackson, Kenny Clarke, Percy Heath
Frank Morgan, Frank Wess, Walter Benton
Jazz Concert West Coast The Bopland Boys
Opus De Jazz VOl-2 John Rae, Steve Kuhn, Bobby Jaspar,
Jake Hannah, John Neves
Patterns of Jazz Cecil Payne, Kenny Dorham, Duke Jordan,
Tommy Potter, Art Taylor
Penthouse Serenade Erroll Garner
Footloose Paul Bley
The Imortal Lester Young Lester Young, Count Basie
Great Britain's Marian McPartland, George Shearing
Howard McGhee and Milt Jackson Self Titled
I Just Love Jazz Piano Hampton Hawes, John Mehegan, Herbie Nichols,
Paul Smith
Art Pepper & Sonny Reid Self Titled
Opus De Blues Frank Wess, Thad Jones, Curtis Fuller
Charlie Fowlkes, Hank Jones,
Eddie Jones, Gus Johnson
Jazz is Busting out All Over Too many names to list
Opus in Swing Frank Wess, Kenny Burrell
Freddie Green, Eddie Jones, Kenny Clarke
Jackson's Ville Milt Jackson, Lucky Thompson, Hank Jones
Wendell Marshall, Kenny Clarke
I will take any reasonable offer on the package of the 15 discs
as well as offers on individual discs.
Please E-mail me with a response or call (807) 344-0010
Thanx
Derek
| 6 | misc.forsale |
: For all the problems technology has caused, your types have made
: things even worse. Must we be reminded of the Inquisition, Operation
: Rescue, the Ku Klux Klan, Posse Comitatus, the 700 Club, David Duke, Salem
: Witch Trials, the Crusades, gay bashings, etc.
: PLUS virtually each and every single war, regardless of the level of
: technology, has had theistic organizations cheering on the carnage
: (chaplains, etc.), and claiming that god was in favor of the whole ordeal.
: Don't forget to pray for our troops!
:
This is really tedious. Every bad thing that's ever happened is
because the malefactors were under the influence of religion - does
anyone -really- believe that. I've seen it so often it must be a
pretty general opinion in a.a, but I want to believe that atheists are
really not THAT dishonest. Please, stick to the facts and, having
accomplished that, interpret them correctly. | 0 | alt.atheism |
The following items are for sale:
1) ONKYO TX-901/910 reciever/amplifier. Only 2 months old.
>PERFECT< condition. 45wpc (stereo), 4 speaker ability,
40 channel memory, has digital and direct tuning also.
Plus, it also have an earphone jack...
Bought for $350 new. Asking for no less than $250; best
offer gets it (obviously).
...PRICE DROPPED TO $230...
- No offers so far; what's the deal? No recievers needed? :(
2) Two ZEOS IBM-External keyboards. Under a month old, bought
for $90 each new; selling for $35 a piece, or $65 for both.
I pay shipping. | 6 | misc.forsale |
Which sort of loans and what have you heard exactly?
| 0 | alt.atheism |
I am selling my Macintosh Classic and Stylewriter 1 to the highest bidder.
You can reach me at 415 626-5869 (San Francisco)), or via email at
forsythe@leland.stanford.edu. | 6 | misc.forsale |
(good point about registration schemes being used only for harassment deleted)
I would also like to point out that this is receiving stolen property and is
no different than a pawn shop owner doing the same thing.
| 16 | talk.politics.guns |
The FLYERS closed out the season last night with their 8th straight victory,
a 5-4 OT winner over the Hartford Whalers. The OT game winner came from Dimitri
Yushkevich, just his 5th of the season and his first game winner. The FLYERS
never led up until that point in the game. For the Whalers, the loss marked an
NHL record 9th OT loss this season.
Roster move:
Gord Hynes was called to to play in place of Ryan McGill
Injuries:
Ryan McGill injured his hand in a fight 4/15 and was scratched.
Lines:
Eklund-Lindros-Recchi
Beranek-Brind'Amour-Dineen
Lomakin-Butsayev-Conroy
Faust-Acton-Brown
Galley-Bowen
Yushkevich-Hawgood
Carkner-Hynes
Dominic Roussel
Game Summary:
I didn't get TV coverage of the game, and since it was stormy in these parts
I didn't have the best radio coverage either. Here's the box score followed by
a few things I did pick up:
First Period:
Hartford, Nylander 10, 8:51
Philadelphia, Recchi 53 (Lindros, Brind'Amour), 19:59.8 (pp)
Penalties - Verbeek, Har (holding), :55; Carkner, Phi (roughing), 13:53; Houda,
Har (interference) 18:43
Second Period:
Hartford, Burt 6 (Cunneyworth, Kron), 2:00
Philadelphia, Bowen 1 (Eklund, Recchi), 7:09
Hartford, Nylander 11 (Zalapski, Sanderson), 9:38
Penalties - Galley, Phi, major-game misconduct (spearing) :58; Verbeek, Har
major-game misconduct (spearing), :58; Brown, Phi (tripping), 3:22; Zalapski,
Har (tripping), 15:51; Brind'Amour, Phi (slashing), 19:50
Third Period:
Hartford, Kron 14 (Sanderson, Cassels), 1:24 (pp)
Philadelphia, Beranek 15 (Lomakin, Yushkevich), 3:11
Philadelphia, Faust 2 (Brind'Amour, Roussel), 3:38
Penalties - Houda, Har (tripping), 4:20; Hawgood, Phi (holding), 5:30
Overtime:
Philadelphia, Yushkevich 5 (Faust), 1:15.
Penalties - None
Power Play:
Philadelphia 1 of 4, Hartford 1 of 4
Goalies:
Philadelphia, Roussel 14-11-5 (30 shots - 26 saves)
Hartford, Lenarduzzi, 1-1-1 (38 - 33)
On the first Hartford goal, Gord Hynes misplayed the puck at the FLYERS blue
line and Nylander stripped him and took off.
The Recchi goal was a 2 on 1 with Lindros.
The Bowen goal was just a puck he threw at the net, got a good carom and it
ended up behind the goalie.
On the second Nylander goal he got three whacks at the puck before it went in.
This is the most frustrating part of the FLYERS defense. Take the body, and if
they get one shot and beat you fine. Don't give them another chance. Carkner,
Galley and McGill are all terrible about this, I'll bet money at least one of
them was the closest FLYER to the play.
That's all I have, my radio got bad after that and I was lucky to know who it
was that scored, much less how.
From what I heard, Roussel had a very strong game. After the game, Gene Hart
asked Bobby Taylor to pick the three stars of the season rather than of the
game. It was Garry Galley #3 for his career high point total (I'm surprised
that a former goalie wouldn't look closer at his defensive play), Tommy
Soderstrom #2 for his team record tying 5 shutouts in only about 1/2 a season
and, Mark Recchi #1 for his all time high team single season scoring mark.
But here's the odd part. He couldn't decide between Lindros and Recchi for
number 1. If he picks Recchi as #1 after he had a hard time choosing between
him and Lindros, doesn't that make Lindros #2????
What? You wanna know my three stars of the season? Well, since you asked...
#1 Eric Lindros. Eric dominates a game simply by stepping out onto the ice.
The difference between the team's record with him and without him is no
accident. I believe that the team could have been almost as successful without
Recchi. There is no question that this team is significantly better with Eric
Lindros on it, and I think that he will deservedly wear the 'C' on his jersey
next season.
#2 Tommy Soderstrom. 5 shutouts was second in the league to only Ed Belfour,
and Tommy didn't have a Chris Chelios (booo) in front of him. He also didn't
play a complete season due to heart problems (sentimental edge here, my family
has a history of heart problems). There's no question in my mind that Tommy
Soderstrom is this teams goalie of the future, and if Roussel complains again
about being number 2 look for him to be traded within 2 years.
#3 Mark Recchi. Again, you can't argue with an all-time team high single season
scoring mark. There are an awful lot of teams that didn't have a single player
get as many points. Plus, Mark is the only FLYER to play the entire season.
Not a tough choice.
Honorable mentions: Rod Brind'Amour topped his single season high point total
which he set last year. The difference was that he wasn't on the top line
this year and didn't get as much playing time. Then again, he didn't get the
defensive attention that he got last year from the other team either.
Dimtri Yushkevich was the teams most consistent defenseman. Yes, he made rookie
mistakes, but he was usually fast enough to make up for them. I have a feeling
that with his shot he'll score a few more points next year without giving up
anything in his own zone, and I suspect that he'll be the teams top defenseman
in years to come.
Garry Galley was the team's point leader from defensemen. Again, there are some
things you just can't argue with. And he battled with chronic fatigue syndrome,
he certainly deserves kudos for only missing one game, and that was against his
wishes under doctors orders. But his defensive play often negates his offensive
contribution. A little more caution, and a little bit smarter in his own end
will make him a much more important part of the team next year.
Brent Fedyk was the leagues biggest improvement over last years point total.
But consistency became a problem for him.
A couple misc notes mostly for mailing list members:
Tom Misnik, a member of the mailing list, would like to exchange E-mail
addresses with any list members who want to keep in touch over the summer.
If you're interested, you can send him mail at:
att!ACR.ORG!TMISNIK
The FLYERS end the season 1 game below .500 in 5th place, their best winning
percentage since going .500 in 1988-89. 14-20-3 within the division (4th in
Patrick), 23-14-5 at home. They finished 17th overall, will draft 10th in
next years entry draft (Quebec had the 1st rounder, though). They scored as
many goals as they allowed, 319.
The 8 straight wins is the most since they won 13 in a row in 1985.
I will be sending out final stats as soon as I get the issue of the Hockey
News that contains them, since there are no more games for me to go to I have
no other way of getting them.
I hope you've all enjoyed this years hockey season as much as I have. Knowing
the future that we have coming to us made missing the playoffs one more time
almost bearable.
FLYERS team record watch:
Eric Lindros:
41 goals, 34 assists, 75 points
(rookie records)
club record goals: club record points:
Eric Lindros 40 1992-93 Dave Poulin 76 1983-84
Brian Propp 34 1979-80 Brian Propp 75 1979-80
Ron Flockhart 33 1981-82 Eric Lindros 75 1992-93
Dave Poulin 31 1983-84 Ron Flockhart 72 1981-82
Bill Barber 30 1972-73 Pelle Eklund 66 1985-86
Mark Recchi:
53 goals, 70 assists, 123 points.
club record goals: club record points:
Reggie Leach 61 1975-76 Mark Recchi 123 1992-93*
Tim Kerr 58 1985-86,86-87 Bobby Clarke 119 1975-76
Tim Kerr 54 1983-84,84-85 Bobby Clarke 116 1974-75
Mark Recchi 53 1992-93* Bill Barber 112 1975-76
Rick Macliesh 50 1972-73 Bobby Clarke 104 1972-73
Bill Barber 50 1975-76 Rick Macliesh 100 1972-73
Reggie Leach 50 1979-80
*More than 80 games.
FLYERS career years:
Player Points Best Prior Season
Mark Recchi 123 113 (90-91 Penguins)
Rod Brind'Amour 86 77 (91-92 FLYERS)
Garry Galley 62 38 (84-85 Kings)
Brent Fedyk 59 35 (90-91 Red Wings)
That's all for now... | 10 | rec.sport.hockey |
Can somebody tell me what all the letter spesifications on motorcycle models
really mean.
Example: What means the C, the B and the R in Honda CBR. - Or the V, S, G, L
and P in Suzuki VS750GLP
I wanna distribute this in our club magazine. I want lists of all types, but
I already knows about Harley.
Thanks in advance!
Vidar
---------------------------------------------------------------------------
Vidar O. Solberg - NORWAY * ROCK HARD * RIDE FREE *
"We are the proud, the few and the true Metallibashers!" | 8 | rec.motorcycles |
Those who forward offensive posts to the sysadmin aren't curtailing
anyones' freedom of speech. The neo-nazi movement has a right to
make speeches, say anything they want. They do not have a right
to have these speeches published by the N.Y. Times. That depends
on the Times analysis of the economic and to somewhat extent
newsworthy value of those speeches. Likewise to the sysadmin
of this fellows system. If he feels his resources are being
used in a manner that is not in his best interests, or are
perhaps embarassing to his organization, he will act just as
the New York Times does, not to be a conduit for these ideas.
The poster is after all free-loading off of someone else's
pocket book when he posts. He who controls the purse strings
has the right to make the decision how he wants those funds
spent or not spent.
Noone is going to put the poster in jail, unless he bombs a local
building as a symbol of his hatred. Freedom of Speech in no
way equates to accessibility to conduits of information. The
market of ideas has its own "natural selection" process that
weeds out the ga-ga from the credible ideas that are of
importance.
Seth Rosenthal | 17 | talk.politics.mideast |
Check out Xicor's new goodie in the April 12th edition of EETimes
X88C64 - an 8k * 8 E2PROM with built in latch AND bootloader setup.
You hook it directly to your '51, power it up, the prom initialises the
serial port on the '51, you load in your code via RXD, this gets blatted
onto the E2PROM, then you reset and run - i'm sure Dallas also does
something like this too, i suppose it would boil down to relative
prices, and the Dallas part freeing up P0 & P2 completely. I wonder
if ANYONE has ever managed to design a single sided PCB with an
8051, 573, EPROM, SRAM and >>NO LINKS<< ?
cheers
Mike.
| 12 | sci.electronics |
Better yet, instead of thrashing around on the DOS file system, take
it a step further. Write yourself a minimal "file system" program that
is used to create/delete files, en/decrypt them to ramdisk, list a
directory. Put the util, password protected, on a floppy.
The catch is that the storage space used by this util is NOT part
of the DOS file system. Instead, defrag your disk, thus packing all
allocated clusters into clusters 0-n. Then use the back end of the
partition to hold your 'stealth' file system. Or, leave a small 2nd
partition on the disk that is not assigned to DOS. Another approach
might be to use a directory that contains a set of invariant files (DOS
system files, for instance). Due to DOS allocating a minimum storage
unit of a "cluster" there is unused physical space on the disk between
the tail end of each file and the end of its associated cluster. These
dead spaces could be concatenated and used to hold your stealth file
system.
Now you have a situation where no encrypted data "appears" on your
disk at all :-). | 11 | sci.crypt |
:
: Just taken delivery of a 66MHz 486 DX2 machine, and very nice it is too.
: One query - the landmark speed when turbo is on is 230 or something MHz
: - thats not the problem. The problem is the speed when turbo is off. Its
: 7 MHz. The equivalent in car terms is having a nice Porsche with a button
: that turns it into a skateboard.
:
: Does anyone have a clue as to what determines the relative performance of
: turbo vs non-turbo?? I would like to set it to give a landmark speed of
: about 30 or 40 MHz with turbo off.
:
: Cheers,
: | 3 | comp.sys.ibm.pc.hardware |
My Western Digital also has three sets of pins on the back. I am using it with
another hard drive as well and the settings for the jumpers were written right
on the circuit board of the WD drive......MA SL ??
I can't remember what the last one was. If you can't find these markings on the
circuit board, I'll open my machine and tell you what mine are....... | 3 | comp.sys.ibm.pc.hardware |
I am interrested in the extrodinarily simple concept of the null modem
cable. (Actually I have NO idea, so don't count that last statement.) What I'm
asking is what pins does it use (or what are it's specifications?) I just want
to solder one myself instead of buying one. I don't even know what port is
used.
Help me please (at ke_kimmell@vax.cns.muskingum.edu)
Kevin | 3 | comp.sys.ibm.pc.hardware |
I have a MacIIFX and I know that it is wired about its SCSI chain.
I just bought a drive and I need to find out a few hardcore SCSI question:
Does the IIFX SCSI chain want to see active or passive termination?
Does the IIFX SCSI spec want me to enable the initiation of the SDTR message?
WHat does the IIFX SCSI spec want as far as parity checking?
These are some very good questions for the FAQ.
If someone does not have time to answer these questions but does know
where I can look them up please let me know and I will repost the answers
for everyone to see.
thanks, | 4 | comp.sys.mac.hardware |
From: sam.halperin@cccbbs.uceng
486 DX 50 mHz in Zero Insertion Force Socket
Empty over-drive socket
EISA motherboard with 256k cache
-->2 32 bit EISA Slots
-->2 32 bit VESA local bus slots
-->4 16 bit ISA slots
8 MB 70ns RAM
-->8 SIMMS sockets filled with 1mb strips (0 sockets open)
32 bit EISA IDE hard drive controller
330 Meg IDE hard disk drive w/ 64k cache (12ms)
Diamond Viper Weitek 9000 VESA local bus graphics card w/ 2mb
15" MAG MX15F monitor
2 Serial(NS16550AFN UART), 1 parralell & 1 game ports
Full tower case
-->250 Watt power supply
-->5 X 5.25" bays
-->2 X 3.5" bays
-->2 X Hard Drive bays
1.2MB 5.25" & 1.33MB 3.5" Floppy Drives
Enhanced 101 key keyboard
Hi-Resolution 400 DPI Serial Mouse
MS DOS 5.0 and MS Windows 3.1 or newer
AMI BIOS
Joint Data Motherboard
30 Day Money Back Gaurantee
Unconditional 2 Year Parts Warranty
Lifetime Labor Warranty
One year Nationwide on site service
This system is currently availble from Comtrade, the company that
won some of the highest (over dell, gateway and IBM) awards in
recent PC magazine reviews. Your price must be highly
competitive, without sacrificing any of the quality standards
listed above. | 6 | misc.forsale |
Some thoughts:
Has any work been done on encapsulating encrypted data inside "non-encrypted"
data files? Many file formats can be written with "gaps" in them to hide
other data. New file formats could be designed to have alternate data hidden
by dispersing it amongst the "legitimate" data. The hidden data would only
show up with the right key(s), and a file with hidden data would be
indistinguishable from one without. So, only the correct key(s) would reveal
the presence of an "illegal" document.
If I devise a custom file compression algorithm and only I and a friend have
the uncompressor, and otherwise the file appears to be total gigerish, do I
have the right to transmit the file? Will we have to "escrow" all our data
file formats? Are gangs required to escrow their hand signals, colors and
catch phrases? | 11 | sci.crypt |
First, I thank collectively all people who have given good answers
to my questions. In my follow-up to Jason Smith's posting, I will
address some issues that have caused misunderstanding:
Yes, to some degree. There was an excellent discussion in sci.skeptic
on the nature of scientific work two weeks ago, I hope it did not
escape your notice.
The correct word is 'likely'. There is no way to be sure our models and
theories are absolutely correct. Theories are backed up by evidence,
but not proved - no theory can be 'true' in a mathematical sense.
However, theories are not mere descriptions or rationalisations of
phenomena. It is extremely important to test whether theories can
_predict_ something new or not yet observed. All successful theories
science has come up with have passed this test, including the Big
Bang theory of cosmic evolution, the theory of natural selection etc.
It does not mean they _must_ be correct, but they are not mere
'best fits' for the data.
Well, yes, if you want to _believe_ in them. This is not what science
requires - take a good look at the theory and the evidence, see if
the theory has made any successful predictions, and use your reason.
Disbelievers are not punished.
This is what puzzles me - why do we need to have faith in _anything_?
My fellow atheists would call me a weak atheist - someone who is
unable to believe, ie, fails to entertain any belief in God.
Yes, I know that one can't believe without God's help; Luther makes
this quite clear in his letter to Erasmus. I'm afraid this does not
change my situation.
(deletions)
No, it is not, although it does look like one. This is a true dichotomy,
either something exists, or nothing exists. If nothing exists, nobody
would ask why. If something exists, it is possible to ask why, but
actually no existing being could give an answer.
Imagine, for a moment, that the nobodies in non-existence could also
ask: "Why nothing exists?" This is equivalent to my counter-question,
"why nothing exists in nothingness".
Now, "why anything exists" is equivalent to "why something exists in
somethingness". _This_ is what I meant with my tautology, my apologies
for the poor wording in my previous post.
I do indeed think there probably _is_ no reason for being, or existence,
in general, for reasons I stated above. However, they will still
leave open the question "why this, and not that", and this is where
theistic explanations come in.
Science cannot give reasons for any _particular_ human being's existence.
This is a deep philosophical question - is determinism true, or not?
Also, is God deterministic or not? I tend to think this question has
no meaning in His case.
If I am for a reason, I've yet failed to see what it would be.
From our perspective, it looks like 'I' exist for truly random
reasons. I just rolled two dice - why did I get 6 and 1? How can
I believe there is any better reason for my existence?
Yes, I am satisfied with this reason, until I find something better.
My 15 years of Christianity were of no help in this respect, I have
to admit, but I am patient.
No, it doesn't, but I think an existing God cannot know why He exists,
for an answer to this question is not knowable. Of course, this
should not be any obstacle to belief in His existence.
It is impossible to know unknowable things. However, the question
"why do I exist, in particular" is _not_ an invalid question - this
is not what I said. But from our perspective, it is impossible to
tell, and I can't just believe in any given explanation instead of
another, especially since I found I was deluding myself.
I think "pre-existence" is an oxymoron. There is no time 'outside' of
this spacetime (except in some other universe), and from that
perspective, our universe never was. It exists only for those who
are inside it.
No. The validity of the question has to be discussed separately; I think
philosophy is of great help here. What can be known, and what is not
knowable?
This is a very good question. In trying to answer this, and numerous
other questions that bothered me, I finally found nothing to base
my faith on.
I think it would be honest if we all asked ourselves, "why do I believe"
or "why I don't believe".
Petri
| 15 | soc.religion.christian |
You make it sound like this behavior is new. It isn't. A lot of
pedestrian bridges have fencing that curls up over the sidewalk to
make this kind of think a lot harder to do.
I don't understand the mentality myself, but then again I couldn't
figure out MOVE! (I'm glad they bombed 'em) or the Waco Wackos either.
(Newsgroup list trimmed significantly) | 7 | rec.autos |
Tsk.tsk. Too much argument on non-issues !
I'm Roman Catholic and it seems to me that people
celebrate Easter and Christmas for itself rather
than how it relates to Jesus. I don't really
care about some diety. If people have some other
definition of Easter, then that's their business.
Don't let it interfere with my Easter.
"Resurrection Sunday" 8-) Where did that come from ?
If people celebrate Easter for the Cadburry bunny,
that's their business.
| 15 | soc.religion.christian |
I have the following bike for sale:
type: Dave Scott Centurion 1989 model
size: 47 cm c-c
grouppo: Shimano 105
cranks: 165 cm
pedals: Shimano 105 P1050 with clips and straps
frame: Tange II Double butted steel
gearing: front: 52/42 rear: 24-22-19-17-15-13
seat: Terry womens gel seat
computer: Avocet 30
extras: double water bottle cages
extra rear tire
24" front/700c rear setup
My wife is asking for $350 obo. Let me know if you are interested at the
address below. Thanks,
-- mike --
--
-=--------- Michael C. Whitman
---===------- National System Engineer - Telecom
-----=====----- Pyramid Technology Corporation
-------=======--- 1921 Gallows Road, Suite 250
---------=========- Vienna, VA 22182 | 6 | misc.forsale |
Hai,
In a few days I'm going to buy a new motherboard with local-bus(ses).
It comes with a Cirrus Logic VLB card which has 2Mb RAM onboard.
It can do true-color but I don't know what type of card it is.
I read that Cirrus Logic cards aren't exactly the fastes around.
My old system had a TSENG 4000. I was pretty pleased with it, so I
consider buying a W32/TSENG card. I'd like to know a few things:
- How is the speed/performance in DOS/Windows/Unix/OS/2
Graphics & Text (also compared to S3 cards for example)
- What resolutions (including no. of colors) does it
support (text & graphics)
- How many RAM can be installed and what type of RAM
- Compatibility with old TSENG 4000
- Support in software
If anyone has any experience with this card (good or bad) I'd like
to know. If you have a better alternative than the W32 please tell
me about it.
For the people in Holland:
Kan iemand me misschien vertellen waar de W32 in Nederland te verkrijg
is? Het liefst in de omgeving van Amsterdam!
| 3 | comp.sys.ibm.pc.hardware |
This was in Wed. WSJ.
[start]
The white house, seeking to mount public pressure on GOP senators, bombarded
news outlets in some senator's home states with news releases warning that
certain projects may not be funded if the $16billion stimulus bill isn't
passed.
None of the projects mentioned are actually in the bill, rather they are
part of a wish list that may be funded from the $2.56 billion in
Community Development Block Grants.
...
[end]
I could have sworn I heard a bunch of Clintonites going on and on, raving
about how dishonest it was that the Rebublicans were taking items from this
wish list in order to ridicule this bill. Now that Clinton is using that
same list in order to garner support for the bill, are you guys going to
do the honarable thing and say that Clinton is being dishonest. | 18 | talk.politics.misc |
this borders on blasphemy. | 9 | rec.sport.baseball |
John Berryhill, Ph.D. writes
umm, please don't lump us all together. It's those blatant,
fundamentalist pickers that give the rest of us a bad name. Some of
us try very hard to be discreet and stay alert.
| 19 | talk.religion.misc |
First of all I never said the Holocaust. I said before the
Holocaust. I'm not ignorant of the Holocaust and know more
about Nazi Germany than most people (maybe including you).
What I resent is ignorant statements that call people
names when they disagree with your position. Opposing the
atrocities commited by the Israeli governement hardly qualifies
as anti-semitism. If you think name calling is a valid form of
argument in intellectual circles, you need to get out more
often.
I don't think the suffering of some Jews during WWII
justifies the crimes commited by the Israeli government. Any
attempt to call Civil liberterians like myself anti-semetic is
not appreciated.
| 17 | talk.politics.mideast |
So why don't ypu sue him.
---- | 17 | talk.politics.mideast |
As far as I know, tigers are not sentient. If I were pushed into a pool with
some dolphins and they attacked me, I might be inclined to blame the dolphins
rather than the person doing the pushing, as (a) dolphins are not usually
aggressive and (b) they seem to have well-developed brains and a capacity for
abstract thought.
As a matter of fact, tigers rarely attack humans unless the human provokes
them. Of course, if they are in a cage which is far too small, that might
count as provocation...
| 0 | alt.atheism |
Where did you get this driver. Please, please, please !!!!
I've been waiting months for this.
| 3 | comp.sys.ibm.pc.hardware |
Well, this particular thread of vituperation slopped its venom over
into alt.atheism, where we spend most of our time entertaining
arguments against our belief system, without resorting to accusing
others of bigotry. It's somewhat ironic that our exposure to bigotry
happens in this instance to have originated in rec.scouting, since I
always understood scouting to teach tolerance and diversity. I
understand bigotry to be irrational prejudice against other people who
happen to be of a different race, religion, ethnic background, sex, or
other inconsequential characteristics. All the evidence I've seen
indicates that sexual orientation and lack of belief in gods are
exactly such inconsequential characteristics. Thus, pending further
evidence, I conclude that those who show prejudice against such people
are bigots, and organizations that exclude such people are
discriminatory. | 0 | alt.atheism |
Archive-name: net-privacy/part2
Last-modified: 1993/3/3
Version: 2.1
IDENTITY, PRIVACY, and ANONYMITY on the INTERNET
================================================
(c) 1993 L. Detweiler. Not for commercial use except by permission
from author, otherwise may be freely copied. Not to be altered.
Please credit if quoted.
SUMMARY
=======
Email and account privacy, anonymity, file encryption, academic
computer policies, relevant legislation and references, EFF, and
other privacy and rights issues associated with use of the Internet
and global networks in general.
(Search for <#.#> for exact section. Search for '_' (underline) for
next section.)
PART 2
====== (this file)
Resources
---------
<4.1> What UNIX programs are related to privacy?
<4.2> How can I learn about or use cryptography?
<4.3> What is the cypherpunks mailing list?
<4.4> What are some privacy-related newsgroups? FAQs?
<4.5> What is internet Privacy Enhanced Mail (PEM)?
<4.6> What are other Request For Comments (RFCs) related to privacy?
<4.7> How can I run an anonymous remailer?
<4.8> What are references on privacy in email?
<4.9> What are some email, Usenet, and internet use policies?
<4.10> What is the MIT ``CROSSLINK'' anonymous message TV program?
Miscellaneous
-------------
<5.1> What is ``digital cash''?
<5.2> What is a ``hacker'' or ``cracker''?
<5.3> What is a ``cypherpunk''?
<5.4> What is `steganography' and anonymous pools?
<5.5> What is `security through obscurity'?
<5.6> What are `identity daemons'?
<5.7> What standards are needed to guard electronic privacy?
Issues
------
<6.1> What is the Electronic Frontier Foundation (EFF)?
<6.2> Who are Computer Professionals for Social Responsibility (CPSR)?
<6.3> What was `Operation Sun Devil' and the Steve Jackson Game case?
<6.4> What is Integrated Services Digital Network (ISDN)?
<6.5> What is the National Research and Education Network (NREN)?
<6.6> What is the FBI's proposed Digital Telephony Act?
<6.7> What other U.S. legislation is related to privacy on networks?
<6.8> What are references on rights in cyberspace?
<6.9> What is the Computers and Academic Freedom (CAF) archive?
Footnotes
---------
<7.1> What is the background behind the Internet?
<7.2> How is Internet `anarchy' like the English language?
<7.3> Most Wanted list
<7.4> Change history
* * *
RESOURCES
=========
_____
<4.1> What UNIX programs are related to privacy?
For more information, type `man [cmd]' or `apropos [keyword]' at the
UNIX shell prompt.
passwd - change password
finger - obtain information about a remote user
chfn - change information about yourself obtainable by remote
users (sometimes `passwd -f')
chmod - change the rights associated with a file or directory
umask - (shell) change the default (on creation) file access
rights
ls - list the rights associated with files and directories
xhost - allow or disable access control of particular users to an
Xwindow server
last - list the latest user logins on the system and their
originations
who - list other users, login/idle times, originations
w - list other users and what they are running
xhost - access control list for X Window client use
xauth - control X Window server authentication
.signature - file in the home directory appended to USENET posts
.forward - file used to forward email to other accounts
.Xauthority - file used for X Window server authentication keys
$SIGNATURE - variable used for name in email and USENET postings
The 'tcpdump' packet-tracing program is loosely based on SMI's
"etherfind" although none of the etherfind code remains. It was
originally written by Van Jacobson, Lawrence Berkeley Laboratory,
as part of an ongoing research project to investigate and improve
tcp and internet gateway performance. A current version is
available via anonymous ftp from host ftp.ee.lbl.gov (currently at
address 128.3.254.68) file tcpdump.tar.Z (a compressed Unix tar
file). This program is subject to the 'standard' Berkeley network
software copyright.
_____
<4.2> How can I learn about or use cryptography?
A general introduction to mostly theoretical cryptographic issues,
especially those frequently discussed in sci.crypt, is available
in FAQ form:
> Compiled by:
> cme@ellisun.sw.stratus.com (Carl Ellison)
> Gwyn@BRL.MIL (Doug Gwyn)
> smb@ulysses.att.com (Steven Bellovin)
NIST (U.S. National Institute for Standards and Technology)
publishes an introductory paper on cryptography, special
publication 800-2 ``Public-Key Cryptograhy'' by James Nechvatal
(April 1991). Available via anonymous FTP from
csrc.ncsl.nist.gov (129.6.54.11), file pub/nistpubs/800-2.txt.
Also via available anonymous FTP from wimsey.bc.ca as crypt.txt.Z
in the crypto directory. Covers technical mathematical aspects
of encryption such as number theory.
More general information can be found in a FAQ by Paul Fahn of RSA
Labortories via anonymous FTP from rsa.com in /pub/faq.ps.Z. See
the `readme' file for information on the `tex' version. Also
available as hardcopy for $20 from RSA Laboratories, 100 Marine
Parkway, Redwood City, CA 94065. Send questions to
faq-editor@rsa.com.
Phil Zimmerman's PGP (Pretty Good Privacy) public-domain package
for public key encryption is available at numerous sites, and is
in widespread use over the internet for general UNIX-based file
encryption (including email). Consult the archie FTP database.
Also see the newsgroup alt.security.pgp. Mailing list requests
to info-pgp-request@lucpul.it.luc.edu.
From the RIPEM FAQ by Marc VanHeyningen
<mvanheyn@whale.cs.indiana.edu> on news.answers:
> RIPEM is a program which performs Privacy Enhanced Mail (PEM)
> using the cryptographic techniques of RSA and DES. It allows
> your electronic mail to have the properties of authentication
> (i.e. who sent it can be confirmed) and privacy (i.e. nobody can
> read it except the intended recipient.)
>
> RIPEM was written primarily by Mark Riordan
> <mrr@scss3.cl.msu.edu>. Most of the code is in the public domain,
> except for the RSA routines, which are a library called RSAREF
> licensed from RSA Data Security Inc.
>
> RIPEM is available via anonymous FTP to citizens and permanent
> residents in the U.S. from rsa.com; cd to rsaref/ and read the
> README file for info.
>
> RIPEM, as well as some other crypt stuff, has its `home site' on
> rpub.cl.msu.edu, which is open to non-anonymous FTP for users in
> the U.S. and Canada who are citizens or permanent residents. To
> find out how to obtain access, ftp there, cd to pub/crypt/, and
> read the file GETTING_ACCESS.
Note: cryptography is generally not well integrated into email yet
and some system proficiency is required by users to utilize it.
_____
<4.3> What is the cypherpunks mailing list?
Eric Hughes <hughes@toad.com> runs the `cypherpunk' mailing list
dedicated to ``discussion about technological defenses for privacy
in the digital domain.'' Send email to
cypherpunks-request@toad.com to be added or subtracted from the
list. From the charter:
> The most important means to the defense of privacy is encryption.
> To encrypt is to indicate the desire for privacy. But to encrypt
> with weak cryptography is to indicate not too much desire for
> privacy. Cypherpunks hope that all people desiring privacy will
> learn how best to defend it.
_____
<4.4> What are some privacy-related newsgroups? FAQs?
Newsgroups
==========
alt.comp.acad-freedom.news
alt.comp.acad-freedom.talk
--------------------------
Moderated and unmoderated issues related to academic freedom and
privacy at universities. Documented examples of violated
privacy in e.g. email. Documented examples of `censorship' as
in e.g. limiting USENET groups local availability.
alt.cyberpunks
--------------
Virtual reality, (science) fiction by William Gibson and Bruce
Sterling, cyberpunk in the mainstream.
alt.hackers
-----------
USENET Network News Transfer Protocol (NNTP) posting mechanisms,
Simple Mail Transfer Protocol (SMTP), `obligatory hack' reports.
alt.privacy
-----------
General privacy issues involving taxpaying, licensing, social
security numbers, etc.
alt.security
comp.security.misc
------------------
Computer related security issues. FAQ in news.answers below.
alt.security.pgp
alt.security.ripem
----------------
Dedicated to discussing public domain cryptographic software
packages: PGP, or ``Pretty Good Privacy'' Software developed by
Phil Zimmerman for public key encryption, and RIPEM by Mark
Riordan for public key and DES encryption.
comp.society.privacy
--------------------
Privacy issues associated with computer technologies. Examples:
caller identification, social security numbers, credit
applications, mailing lists, etc. Moderated.
comp.eff.news
comp.eff.talk
-------------
Moderated and unmoderated groups associated with the Electronic
Frontier Foundation started by Mitch Kapor for protecting civil
and constitutional rights in the electronic realm.
news.admin
news.admin.policy
-----------------
Concerns of news administrators. NNTP standards and mechanisms.
news.lists
----------
USENET traffic distributions. Most frequent posters, most
voluminous groups, most active sites, etc.
sci.crypt
---------
Considers scientific and social issues of cryptography.
Examples: legitimate use of PGP, public-key patents, DES,
cryptographic security, cypher breaking, etc.
FAQs
====
FAQs or ``Frequently-Asked Questions'' are available in the
newsgroups *.answers or via anonymous FTP to pit-manager.mit.edu
[18.172.1.27] (also rtfm.mit.edu) from the directory
/pub/usenet/news.answers/[x] where [x] is the archive name. This
FAQ is archived in the file `net-privacy'. Others are:
network-info/part1
------------------
Sources of information about the Internet and how to connect to
it, through the NSF or commercial vendors.
alt-security-faq
----------------
Computer related security issues arising in alt.security and
comp.security.misc, mostly UNIX related.
ssn-privacy
-----------
Privacy issues associated with the use of the U.S. Social
Security number (SSN).
pdial
-----
Public dialup internet accounts list.
college-email/part1
-------------------
How to find email addresses for undergraduate and graduate
students, faculty and staff at various colleges and
universities.
ripem/faq
---------
Information on RIPEM, a program for public key mail encryption
officially sanctioned by Public Key Partners Inc., the company
that owns patents on public key cryptography.
unix-faq/faq/part1
------------------
Frequently-asked questions about UNIX, including information on
`finger' and terminal spying.
distributions/*
---------------
Known geographic, university, and network distributions.
_____
<4.5> What is internet Privacy Enhanced Mail (PEM)?
Internet drafts on Privacy Enhanced Mail (PEM) describe a standard
under revision for six years delineating the official protocols for
email encryption. The standard has only recently stabilized and
implementations are being developed.
- RFC-1421: ``Privacy Enhancement for Internet Electronic Mail:
Part I: Message Encryption and Authentication Procedures.'' J.
Linn <104-8456@mcimail.com>
- RFC-1422: ``Privacy Enhancement for Internet Electronic Mail: Part
II: Certificate-Based Key Management'' S. Kent <Kent@BBN.com>
- RFC-1424: ``Privacy Enhancement for Internet Electronic Mail:
Part IV: Key Certification and Related Services'' B. Kaliski
<burt@rsa.com>
- RFC-1423: ``Privacy Enhancement for Internet Electronic Mail: Part
III: Algorithms, Modes, and Identifiers'' D. Balenson
<belenson@tis.com>
Send email to pem-info@tis.com for more information. See ``RFCs
related to privacy'' for information on how to obtain RFCs.
_____
<4.6> What are other Requests For Comments (RFCs) related to privacy?
RFC-822: SMTP, Simple Mail Transfer Protocol
RFC-977: NNTP, Network News Transfer Protocol
RFC-1036: Standard for interchange of network news messages
RFC-1208: Glossary of Networking Terms
RFC-1207: Answers to ``experienced Internet user'' questions
RFC-1206: Answers to ``new Internet user'' questions
RFC-1355: Privacy issues in Network Information center databases
RFC-1177 is ``FYI: Answers to commonly asked ``new internet user''
questions, and includes: basic terminology on the Internet (TCP/IP,
SMTP, FTP), internet organizations such as IAB (Internet
Activities Board) and IETF (Internet Enbgineering Task Force), and
a glossary of terms. Also from ftp.eff.org:
/pub/internet-info/internet.q.
> RFCs can be obtained via FTP from NIC.DDN.MIL, with the pathname
> RFC:RFCnnnn.TXT or RFC:RFCnnnn.PS (where `nnnn' refers to the
> number of the RFC). Login with FTP, username `anonymous' and
> password `guest'. The NIC also provides an automatic mail
> service for those sites which cannot use FTP. Address the
> request to SERVICE@NIC.DDN.MIL and in the subject field of the
> message indicate the RFC number, as in `Subject: RFC nnnn' (or
> `Subject: RFC nnnn.PS' for PostScript RFCs).
>
> RFCs can also be obtained via FTP from NIS.NSF.NET. Using FTP,
> login with username `anonymous' and password `guest'; then
> connect to the RFC directory (`cd RFC'). The file name is of the
> form RFCnnnn.TXT-1 (where `nnnn' refers to the number of the
> RFC). The NIS also provides an automatic mail service for those
> sites which cannot use FTP. Address the request to
> NIS-INFO@NIS.NSF.NET and leave the subject field of the message
> blank. The first line of the text of the message must be `SEND
> RFCnnnn.TXT-1', where nnnn is replaced by the RFC number.
_____
<4.7> How can I run an anonymous remailer?
Cypherpunk remailer source is at soda.berkeley.edu in the
/pub/cypherpunks directory. It's written in PERL, and is
relatively easy to install (no administrative rights are required).
Karl Barrus <elee9sf@menudo.uh.edu> has more information and
modifications. Also, most remailer operators mentioned above are
amenable to discussing features, problems, and helping new sites
become operational. Address all points in the section
``responsibities of anonymous use'' in this document prior to
advertising your service. You should be committed to the long-term
stability of the site and avoid running one surreptitiously.
_____
<4.8> What are references on privacy in email?
Brown, Bob. ``EMA Urges Users to Adopt Policy on E-mail Privacy.''
Network World (Oct 29, 1990), 7.44: 2.
Bairstow, Jeffrey. ``Who Reads your Electronic Mail?'' Electronic
Business (June 11, 1990) 16 (11): 92.
``Electronic Envelopes - the uncertainty of keeping e-mail private''
Scientific American, February 1993.
ftp.eff.org
===========
/pub/eff/papers/email_privacy
---
Article on the rights of email privacy. by Ruel T. Hernandez.
/pub/academic/law/privacy.email
---
``Computer Electronic Mail and Privacy'', an edited version of a
law school seminar paper by Ruel T. Hernadez.
/pub/eff/papers/email-privacy-biblio-2
---
Compilation of bibliography on E-Mail and its privacy issues (part
2 of the work). Compiled by Stacy B. Veeder (12/91).
/pub/eff/papers/email-privacy-research
---
The author at Digital Research tried to formalize their employee
privacy policy on E-Mail. The casesightings are divided into two
groups: US Constitutional law, and California law.
/pub/eff/papers/company-email
---
Formulating a Company Policy on Access to and Disclosure of
Electronic Mail on Company Computer Systems by David R. Johnson
and John Podesta for the Electronic Mail Assocation
/pub/cud/alcor
---
Information on Alcor Co., an e-mail privacy suit.
/pub/academic/law/privacy.email
---
Email privacy search at Berkeley.
_____
<4.9> What are some email, Usenet, and internet use policies?
The Computer Policy and Critiques Archive is a collection of the
computer policies of many schools and networks, run by the
Computers and Academic Freedom group on the Electronic Frontier
Foundation FTP site. The collection also includes critiques of some
of the policies.
> If you have gopher, the archive is browsable with the command:
> gopher -p academic/policies gopher.eff.org
>
> The archive is also accessible via anonymous ftp and email. Ftp
> to ftp.eff.org (192.88.144.4). It is in directory
> `pub/academic/policies'. For email access, send email to
> archive-server@eff.org. Include the line:
>
> send acad-freedom/policies <filenames>
>
> where <filenames> is a list of the files that you want. File
> README is a detailed description of the items in the directory.
>
> For more information, to make contributions, or to report typos
> contact J.S. Greenfield (greeny@eff.org). Directory `widener'
> contains additional policies (but not critiques).
ftp.eff.org
===========
/pub/cud/networks
---
Acceptable Use Policies for various networks, including CompuServe
(file `compuserve'), NSFNET (file `nsfnet') with information on
research and commercial uses. See /pub/cud/networks/index.
/pub/cud/networks/email
---
Policies from various sysadmins about how they handle the issue of
email privacy, control, and abuse, compiled by T. Hooper
<hooper_ta@cc.curtin.edu.au>.
/pub/cud/schools/
---
Computer use policies of a number of schools. See schools/Index
for a full list and description.
Commentary
==========
/pub/academic/faq/policy.best
---
Opinions on the best academic computer policies.
/pub/academic/faq/email.policies
---
Do any universities treat email and computer files as private?
/pub/academic/faq/netnews.writing
---
Policies on what users write on Usenet.
/pub/academic/faq/netnews.reading
---
Policies on what users read on Usenet: should my university remove
(or restrict) Netnews newsgroups because some people find them
offensive?
/pub/academic/faq/policy
---
What guidance is there for creating or evaluating a university's
academic computer policy?
______
<4.10> What is the MIT ``CROSSLINK'' anonymous message TV program?
> CROSSLINK is an anonymous message system run on MIT Student
> Cable TV-36. It provides an anonymous medium through which MIT
> students can say those things they might otherwise find
> difficult, inconvenient or impossible to say in person. It's
> also a way to send fun or totally random messages to your
> friends over the air. It is similar to the anonymous message
> pages found in many college newspapers, except that it's
> electronic in nature and it's free.
Messages can be posted to the service via email. For more
information send email to crosslink@athena.mit.edu.
MISCELLANEOUS
=============
_____
<5.1> What is ``digital cash''?
With digital encryption and authentication technologies, the
possibility of a widespread digital cash system may someday be
realized. A system utilizing codes sent between users and banks
(similar to today's checking system except entirely digital) may
be one approach. The issues of cryptography, privacy, and
anonymity are closely associated with transfer of cash in an
economy. See the article in Scientific American by David Chaum
(~Dec.1992).
An experimental digital bank is run by Karl Barrus
<elee9sf@Menudo.UH.EDU> based on suggestions by Hal Finney on the
cypherpunks mailing list. To use the server send mail to
elee7h5@rosebud.ee.uh.edu message with the following text:
::
command: help
user@host
where `user@host' is your email address.
_____
<5.2> What is a ``hacker'' or ``cracker''?
These terms arouse strong feelings by many on their meaning,
especially on the internet. In the general news media in the past
a person who uses computers and networks to malicious ends (such as
breaking into systems) has been referred to as a hacker, but most
internet users prefer the term ``cracker'' for this. Instead, a
``hacker'' is perceived as a benign but intensely ambitious,
curious, and driven computer user who explores obscure areas of a
system, for example---something of a proud electronic pioneer and
patriot. This is the sense intended in this document. See also
the ``Hacker's Dictionary'' and the FAQ `alt-security-faq'.
_____
<5.3> What is a ``cypherpunk''?
From the charter of the cypherpunk mailing list:
> Cypherpunks assume privacy is a good thing and wish there were
> more of it. Cypherpunks acknowledge that those who want privacy
> must create it for themselves and not expect governments,
> corporations, or other large, faceless organizations to grant
> them privacy out of beneficence. Cypherpunks know that people
> have been creating their own privacy for centuries with whispers,
> envelopes, closed doors, and couriers. Cypherpunks do not seek
> to prevent other people from speaking about their experiences or
> their opinions.
See information on the cypherpunk mailing list below.
See also the CryptoAnarchist Manifesto and the Cryptography Glossary
in soda.berkeley.edu:/pub/cypherpunks.
_____
<5.4> What is `steganography' and anonymous pools?
Closely associated with encryption is `steganography' or the
techniques for not only pursuing private (encrypted) communication
but concealing the very existence of the communication itself.
Many new possibilities in this area are introduced with the
proliferation of computer technology. For example, it is possible
to encode messages in the least-significant bits of images,
typically the most 'noisy'. In addition, when such an item is
posted in a public place (such as a newsgroup), virtually
untraceable communication can take place between sender and
receiver. For steganographic communications in the electronic
realm one another possibility is setting up a mailing list where
individual messages get broadcast to the entire list and individual
users decode particular messages with their unique key. An
anonymous pool has been set up by Miron Cuperman
(miron@extropia.wimsey.com) for experiments. Send email to
<pool0-request@extropia.wimsey.com> with one of the following
commands in the subject line:
subscribe
unsubscribe
help
_____
<5.5> What is `security through obscurity'?
`Security through obscurity' refers to the attempt to gain
protection from system weaknesses by hiding sensitive information
or programs relating to them. For example, a company may not make
public information on its software's encryption techniques to evade
`attacks' based on knowledge of it. Another example would be
concealing data on the existence of security holes or bugs in
operating systems. Or, some reliance may be made on the fact that
some standard or mechanism with potential problems is serious
because they are ``not widely known'' or ``not widely used.'' This
argument is occasionally applied to mechanisms for email and Usenet
posting `forgery'. `Security through obscurity' is regarded as a
very feeble technique at best and inappropriate and ineffective at
worst (also called the ``head-in-the-sand approach''). See the FAQ
for alt.security.
Some remarks of John Perry Barlow, cofounder of the Electronic
Frontier Foundation, directed to NSA agents at the First
International Symposium on National Security & National
Competitiveness held in McLean, Virginia Dec. 1, 1992:
> Digitized information is very hard to stamp classified or keep
> contained. ... This stuff is incredibly leaky and volatile. It's
> almost a life form in its ability to self-propagate. If
> something hits the Net and it's something which people on there
> find interesting it will spread like a virus of the mind. I
> believe you must simply accept the idea that we are moving into
> an environment where any information which is at all interesting
> to people is going to get out. And there will be very little
> that you can do about it. This is not a bad thing in my view,
> but you may differ...
_____
<5.6> What are `identity daemons'?
RFC-931 describes a protocol standard that allows UNIX programs to
query a remote user's login name after connection to a local
communication socket (a connection of this type is established
during FTP and TELNET sessions, for example). The standard is not
widely supported, perhaps 10% of internet sites currently implement
it but the number is increasing. The mechanism is detrimental to
anonymity. Regular users cannot disable it but system
adminstrators can circumvent it. This standard may represent a
trend toward greater authentication mechanisms.
_____
<5.7> What new standards are needed to guard electronic privacy?
Remailing/Posting
-----------------
- Stable, secure, protected, officially sanctioned and permitted,
publicly and privately operated anonymous servers and hubs.
- Official standards for encryption and anonymity in mail and USENET
postings.
- Truly anonymous protocols with source and destination information
obscured or absent and hidden routing mechanisms (chaining,
encrypted addresses, etc.)
- Standards for anonymous email addressing, embedding files, and
remailer site chaining.
General
-------
- Recognition of anonymity, cryptography, and related privacy
shields as legitimate, useful, desirable, and crucial by the
general public and their governments.
- Widespread use and implementation of these technologies
by systems designers into
hardware, software, and standards, implemented `securely,'
`seamlessly,' and `transparently'.
- General shift of use, dependence, and reliance to means other than
wiretapping and electronic surveillance by law enforcement
agencies.
- Publicity, retraction, and dissolution of laws and government
agencies opposed to privacy, replaced by structures dedicated to
strengthening and protecting it.
ISSUES
======
_____
<6.1> What is the Electronic Frontier Foundation (EFF)?
From ftp.eff.org:/pub/EFF/mission_statement:
> A new world is arising in the vast web of digital, electronic
> media which connect us. Computer-based communication media like
> electronic mail and computer conferencing are becoming the basis
> of new forms of community. These communities without a single,
> fixed geographical location comprise the first settlements on an
> electronic frontier.
>
> While well-established legal principles and cultural norms give
> structure and coherence to uses of conventional media like
> newspapers, books, and telephones, the new digital media do not
> so easily fit into existing frameworks. Conflicts come about as
> the law struggles to define its application in a context where
> fundamental notions of speech, property, and place take
> profoundly new forms. People sense both the promise and the
> threat inherent in new computer and communications technologies,
> even as they struggle to master or simply cope with them in the
> workplace and the home.
>
> The Electronic Frontier Foundation has been established to help
> civilize the electronic frontier; to make it truly useful and
> beneficial not just to a technical elite, but to everyone; and to
> do this in a way which is in keeping with our society's highest
> traditions of the free and open flow of information and
> communication.
EFF was started by the multimillionaire Mitchell Kapor, founder of
Lotus software, and John Barlow, lyricist for the Grateful Dead
rock band. A highly publicized endeavor of the organization
involved the legal defense of Steve Jackson Games after an FBI
raid and an accompanying civil suit (see section on ``Steve
Jackson Games''). The foundation publishes EFF News (EFFector
Online) electronically, send requests to effnews-request@eff.org.
In a letter to Mitchell Kapor from the Chairman of the Subcommittee
with primary jurisdiction over telecommunications policy dated
November 5, 1991, Representative Edward J. Markey complemented
Mitchell Kapor on his ``insights on the development of a national
public information infrastructure'' which ``were appreciated greatly
by myself and the Members of the Subcommittee'' (complete text in
ftp.eff.com:/pub/pub-infra/1991-12):
> ...we need to pursue policies that encourage the Bell companies to
> work with other sectors of the communications industry to create
> a consumer-oriented, public information network. Please let me or
> my staff know what policies you and others in the computer
> industry believe would best serve the public interest in creating
> a reasonably priced, widely available network in which
> competition is open and innovation rewarded. I also want to
> learn what lessons from the computer industry over the past ten
> to fifteen years should apply to the current debate on
> structuring the information and communications networks of the
> future....I ask your help in gaining input from the computer
> industry so that the Subcommittee can shape policies that will
> bring this spirit of innovation and entrepreneurship to the
> information services industry.
ftp.eff.org
===========
/pub/eff/about-eff
---
A file of basic information about EFF including goals, mission,
achievements, and current projects. Contains a membership form.
/pub/eff/mission-statement
---
EFF mission statement.
/pub/eff/historical/founding-announcement
---
EFF founding press release.
/pub/eff/historical/eff-history
---
John Perry Barlow's ``Not Terribly Brief History of the EFF'' (July
10, 1990). How EFF was conceived and founded, major legal cases,
and the organizational directions.
/pub/eff/historical/legal-case-summary
---
EFF legal case summary.
_____
<6.2> Who are Computer Professionals for Social Responsibility (CPSR)?
The Computer Professionals for Social Responsibility have been
working to protect and promote electronic civil liberties issues
since ~1982. The group has three offices (Palo Alto, Cambridge,
Washington, DC) and 20 chapters. It is involved in litigation
against the FBI, The NSA, NIST, the Secret Service and other other
U.S. government agencies to declassify and provide documentation
on issues such as Operation Sundevil, the FBI wiretap proposal,
NSA's interference in crypography, the breakup of the 2600 raid in
Arlington, Va in Nov 1992. Members speak frequently in front on
Congress, state legislators and public utility commissions to
testify on privacy, information policy, computer security, and
caller identification.
CPSR has created an extensive Internet Privacy library available
via FTP, Gopher, WAIS, and email at cpsr.org, currently comprising
the largest collection of privacy documents on the internet. For
more information, anonymous FTP cpsr.org:/cpsr/.
(Thanks to Dave Banisar <banisar@washofc.cpsr.org> for contributions
here.)
_____
<6.3> What was `Operation Sundevil' and the Steve Jackson Game case?
In the early 1990's a fear spread among U.S. law enforcement agencies
on the illicit activities of `hackers' and `phreakers' involved in
such activities as credit card fraud and long-distance call thievery.
(see ftp.eff.org:/pub/SJG/General_Information/EFFector1.04):
> `Operation Sundevil,' the Phoenix-inspired crackdown of May
> 8,1990, concentrated on telephone code-fraud and credit-card
> abuse, and followed this seizure plan with some success.
> [Bulletin Board Systems] went down all over America, terrifying
> the underground and swiftly depriving them of at least some of
> their criminal instruments. It also saddled analysts with some
> 24,000 floppy disks, and confronted harried Justice Department
> prosecutors with the daunting challenge of a gigantic nationwide
> hacker show-trial involving highly technical issues in dozens of
> jurisdictions.
Massive `show-trials' never materialized, although isolated
instances of prosecution were pursued. The movement reached a
crescendo in Texas with the highly publicized case of illegal
search and seizure involving the Steve Jackson Games company of
Austin Texas on March 1, 1990. From the column GURPS' LABOUR LOST
by Bruce Sterling <bruces@well.sf.ca.us> in Fantasy and Science
Fiction Magazine:
> In an early morning raid with an unlawful and unconstitutional
> warrant, agents of the Secret Service conducted a search of the
> SJG office. When they left they took a manuscript being prepared
> for publication, private electronic mail, and several computers,
> including the hardware and software of the SJG Computer Bulletin
> Board System. Yet Jackson and his business were not only
> innocent of any crime, but never suspects in the first place.
> The raid had been staged on the unfounded suspicion that
> somewhere in Jackson's office there `might be' a document
> compromising the security of the 911 telephone system.
FBI agents involved in the seizure were named in a civil suit filed
on behalf of Steve Jackson Games by The Electronic Frontier
Foundation. See information on EFF below. From an article by Joe
Abernathy in the Houston Chronicle ~Feb 1, 1993:
> AUSTIN -- An electronic civil rights case against the Secret
> Service closed Thursday with a clear statement by federal
> District Judge Sam Sparks that the Service failed to conduct a
> proper investigation in a notorious computer crime crackdown,
> and went too far in retaining custody of seized equipment.
>
> Secret Service Special Agent Timothy Foley of Chicago, who was in
> charge of three Austin computer search-and-seizures on March 1,
> 1990, that led to the lawsuit, stoically endured Spark's rebuke
> over the Service's poor investigation and abusive computer
> seizure policies. While the Service has seized dozens of
> computers since the crackdown began in 1990, this is the first
> case to challenge the practice.
>
> Sparks grew visibly angry when it was established that the Austin
> science fiction magazine and game book publisher was never
> suspected of a crime, and that agents did not do even marginal
> research to establish a criminal connection between the firm and
> the suspected illegal activities of an employee, or to determine
> that the company was a publisher. Indeed, agents testified that
> they were not even trained in the Privacy Protection Act at the
> special Secret Service school on computer crime.
>
> "How long would it have taken you, Mr. Foley, to find out what
> Steve Jackson Games did, what it was?" asked Sparks. "An hour?
>
> "Was there any reason why, on March 2, you could not return to
> Steve Jackson Games a copy, in floppy disk form, of everything
> taken?
>
> "Did you read the article in Business Week magazine where it had
> a picture of Steve Jackson -- a law-abiding, tax-paying citizen
> -- saying he was a computer crime suspect?
>
> "Did it ever occur to you, Mr. Foley, that seizing this material
> could harm Steve Jackson economically?"
>
> Foley replied, "No, sir," but the judge offered his own answer.
>
> "You actually did, you just had no idea anybody would actually go
> out and hire a lawyer and sue you."
>
> More than $200,000 has been spent by the Electronic Frontier
> Foundation in bringing the case to trial. The EFF was founded by
> Mitchell Kapor amid a civil liberties movement sparked in large
> part by the Secret Service computer crime crackdown.
ftp.eff.org
===========
/pub/cud/papers/sundevil
---
A collection of information on Operation SunDevil by the Epic
nonprofit publishing project. Everything you wanted to know but
could never find.
/pub/cud/papers/sj-resp
---
Steve Jackson's response to the charges against him.
_____
<6.4> What is Integrated Services Digital Network (ISDN)?
ISDN is a high-speed data communications standard that utilizes
existing copper telephone lines, and is a possible inexpensive and
intermediate alternative to laying fiber optic cable for phone
networks. The speeds involved may be sufficient for audio and
video transmission applications. G. V. der Leun in the file
ftp.eff.org: /pub/pub-infra/1991-11:
> Telecommunications in the United States is at a crossroads. With
> the Regional Bell Operating Companies now free to provide
> content, the shape of the information networking is about to be
> irrevocably altered. But will that network be the open,
> accessible, affordable network that the American public needs?
> You can help decide this question.
>
> The Electronic Frontier Foundation recently presented a plan to
> Congress calling for the immediate deployment of a national
> network based on existing ISDN technology, accessible to anyone
> with a telephone connection, and priced like local voice service.
> We believe deployment of such a platform will spur the
> development of innovative new information services, and maximize
> freedom, competitiveness, and civil liberties throughout the
> nation.
>
> The EFF is testifying before Congress and the FCC; making
> presentations to public utility commisions from Massachusetts to
> California; and meeting with representatives from telephone
> companies, publishers, consumer advocates, and other stakeholders
> in the telecommunications policy debate.
>
> The EFF believes that participants on the Internet, as pioneers on
> the electronic frontier, need to have their voices heard at this
> critical moment.
To automatically receive a description of the platform and details,
send mail to archive-server@eff.org, with the following line:
send documents open-platform-overview
or send mail to eff@eff.org. See also the Introduction to the EFF
Open Platform Proposal in ftp.eff.org:/pub/pub-infra/1991-02.
References
==========
``Digital Data On Demand.'' MacWorld, 2/82 (page 224).
---
56Kbps vs. ISDN services and products. See comments by J. Powers
in ftp.eff.org:pub/pub-infra/1992-02.
``Telephone Service That Rings of the Future.'' By Joshua Quittner.
Newsday, Tue, Jan 7 1992.
---
Implications of ISDN for the masses, written in popular science
style. John Perry Barlow (cofounder EFF). Regional telephone
companies (Ohio Bell). ISDN as ``Technological Rorschach Test.''
Anecdotes about McDonald's, Barbara Bush teleconferencing. See
complete text in ftp.eff.org:/pub/pub-infra/1992-01.
ftp.eff.org:/pub/pub-infra/
---
Files 1991-11 through 1992-05 containing email from the EFF public
infrastructure group organized by month. Opinions and facts on
the pros and cons of ISDN, Integrated Services Digital Network.
Uses of ISDN (phone video, audio, etc.) Japanese model.
Alternatives to ISDN (HDSL, ADSL, fiber optics). Technical
specifications of ISDN, implementation details, cost issues,
political obstacles, (RBOC, Regional Bell Operating Companies or
`Baby Bells', e.g. NET, New England Telephone). Influencing
development of future networks (e.g. ISDN and NREN, National
Research and Education Network), encouraging competition (cable
TV systems). Press releases and news articles. Letter from Rep.
E. J. Markey to M. Kapor.
_____
<6.5> What is the National Research and Education Network (NREN)?
The Nation Research and Education Network was introduced in
legislation cosponsored by Sen. A. Gore to promote high-speed data
network infrastructure augmenting the internet with up to 50 times
faster transmission rates. The bill passed the House on November
20, 1991, the Senate on November 22, 1991, and was signed by the
President on December 9, 1991.
ftp.eff.org
===========
/pub/EFF/legislation/nren-bill-text
---
The complete text of the House-Senate compromise version of S.
272, the High-Performance Computing Act.
/pub/internet-info/gore.bill
---
102nd congress 1st Session. Text of high performance computing
bill cosponsored by Sen. A. Gore.
/pub/EFF/legislation/gore-infrastructure-bill
---
The text of S.2937, the Information Infrastructure and Technology
Act of 1992 introduced by Senator Gore to expand Federal efforts
to develop technologies for applications of high-performance
computing and high-speed networking, and to provide for a
coordinated Federal program to accelerate development and
deployment of an advanced information infrastructure.
U.S. SAID TO PLAY FAVORITES IN PROMOTING NATIONWIDE COMPUTER NETWORK
By John Markoff, N.Y. Times (~18 Dec 91).
---
President Bush's legislation for natiowide computer data
`superhighway.' IBM-MCI venture as monopoly destructive to fair
competition and innovation? National Science Foundation NSFnet.
complete text in /pub/pub-infra/1991-12.
Commentary
==========
/pub/academic/statements/nren.privacy.cpsr
---
``Proposed Privacy Guidelines for the NREN'' -- Statement of Marc
Rotenberg, Washington Director Computer Professionals for Social
Responsibility (CPSR).
/pub/internet-info/cisler.nren
---
The National Research and Education Network: Two meetings Steve
Cisler, Senior Scientist Apple Computer Library December 17, 1990
Summary of meetings exploring educational issues of NREN by
diverse members of academia and industry.
/pub/internet-info/privatized.nren
---
Feb. 14 1991 essay by M. Kapor advocating advantages of a private
National Public Network, and specific recommendations for open
NREN policies encouraging competition.
/pub/eff/papers/netproposition
---
An FYI about the proposed NREN setup.
_____
<6.6> What is the FBI's proposed Digital Telephony Act?
``Providers of electronic communication services and private branch
exchange operators shall provide within the United States
capability and capacity for the government to intercept wire and
electronic communications when authorized by law...''
From `BBS Legislative Watch: FBIs Wiretapping Proposal Thwarted' by
S. Steele in Boardwatch Magazine, Feb. 1993, p. 19-22:
> In a move that worried privacy experts, software manufacturers and
> telephone companies, the FBI proposed legislation to amend the
> Communications Act of 1934 to make it easier for the Bureau to
> perform electronic wiretapping. The proposed legislation,
> entitled 'Digital Telephony,' would have required communications
> service providers and hardware manufacturers to make their
> systems 'tappable' by providing 'back doors' through which law
> enforcement officers could intercept communications. Furthermore,
> this capability would have been provided undetectably, while the
> communications was in progress, exclusive of any communications
> between other parties, regardless of the mobility of the target
> of the FBI's investigation, and without degradation of service.
>
> ...under the proposal, the Department of Justice (DOJ) can keep
> communications products off the market if it determines that
> these products do not meet the DOJ's own ... guidelines. This
> [could] result in increased costs and reduced competitiveness for
> service providers and equipment manufacturers, since they will be
> unlikely to add any features that may result in a DOJ rejection
> of their entire product. ...the FBI proposal suggests that the
> cost of this wiretapping 'service' to the Bureau would have to be
> borne by the service provider itself...
>
> The Electronic Frontier Foundation organized a broad coalition of
> public interest and industry groups, from Computer Professionals
> for Social Responsibilty (CPSR) and the ACLU to AT&T and Sun
> Microsystems, to oppose the legislation. A white paper produced
> by the EFF and ratified by the coalition, entitled, `An Analysis
> of the FBI Digital Telephony Proposal,' was widely distributed
> throughout the Congress. ... The Justice Department lobbied hard
> in the final days to get Congress to take up the bill before
> Congress adjourned, but the bill never ... found a Congressional
> sponsor (and was therefore never officially introduced). The FBI
> [may] reintroduce "Digital Telephony" when the 103rd Congress
> convenes in January.
ftp.eff.org
===========
/pub/eff/legislation/fbi-wiretap-bill
/pub/EFF/legislation/new-fbi-wiretap-bill
---
A bill to ensure the continuing access of law enforcement to the
content of wire and electronic communications when authorized by
law and for other purposes. Version 2 of the bill after FBI
changes in response to public response.
/pub/cud/law/hr3515
---
House of Rep bill 3515, Telecommunications Law.
Commentary
==========
/pub/eff/papers/eff-fbi-analysis
---
The EFF-sponsored analysis of the FBI's Digital Telephony proposal.
/pub/eff/papers/ecpa.layman
---
The Electronic Communications Privacy Act of 1986: A Layman's View.
/pub/eff/papers/nightline-wire
---
Transcript of ABC's Nightline of May 22, 1992, on the FBI,
Privacy, and Proposed Wire-Tapping Legislation. Featured are Marc
Rotenberg of the CPSR and William Sessions, Director of the FBI.
/pub/eff/papers/edwards_letter
---
A letter from the Director of the Secret Service to US Rep. Don
Edwards, D-California, in response to questions raised by
Edwards' Subcommittee. This copy came from Computer Professionals
for Social Responsibility in Washington, D.C.
/pub/eff/papers/fbi.systems
---
A description of how information is stored on the FBI's computer
systems.
_____
<6.7> What other U.S. legislation is related to privacy?
ftp.eff.org
===========
/pub/cud/law/<state>
---
State computer crime laws:
AL, AK, AZ, CA, CO, CT, DE, FL, GA,
HI, IA, ID, IL, IN, MD, MN, NC, NJ,
NM, NY, OR, TX, VT, VA, WA, WI, WV.
/pub/cud/law/<country>
---
Current computer crime laws for: The United States (federal
code), Canada, Ghana, and Great Britain.
/pub/cud/law/bill.s.618
---
Senate bill 618, addressing registration of encryption keys with
the government.
/pub/cud/law/improve
---
Improvement of Information Access bill.
/pub/cud/law/monitoring
---
Senate bill 516; concerning abuses of electronic monitoring in the
workplace.
/pub/cud/law/us.e-privacy
---
Title 18, relating to computer crime & email privacy.
/pub/academic/law/privacy.electronic.bill
---
The text of Simon's electronic privacy bill, S. 516. ``To prevent
potential abuses of electronic monitoring in the workplace.''
_____
<6.8> What are references on rights in cyberspace?
ftp.eff.org
===========
/pub/cud/papers/const.in.cyberspace
---
Laurence Tribe's keynote address at the first Conference on
Computers, Freedom, & Privacy. `The Constitution in Cyberspace'
/pub/cud/papers/denning
---
Paper presented to 13th Nat'l Comp Security Conf ``Concerning
Hackers Who Break into Computer Systems'' by Dorothy E Denning.
/pub/cud/papers/privacy
---
``Computer Privacy vs First and Fourth Amendment Rights'' by
Michael S. Borella
/pub/cud/papers/rights-of-expr
---
Rights of Expression in Cyberspace by R. E. Baird
/pub/academic/eff.rights
---
Bill of Rights' meaning in the Electronic Frontier.
_____
<6.9> What is the Computers and Academic Freedom (CAF) archive?
The CAF Archive is an electronic library of information about
computers and academic freedom. run by the Computers and Academic
Freedom group on the Electronic Frontier Foundation FTP site.
> If you have gopher, the archive is browsable with the command:
> gopher -p academic gopher.eff.org
>
> It is available via anonymous ftp to ftp.eff.org (192.88.144.4) in
> directory `pub/academic'. It is also available via email. For
> information on email access send email to archive-server@eff.org.
> In the body of your note include the lines `help' and `index'.
>
> For more information, to make contributions, or to report typos
> contact J.S. Greenfield (greeny@eff.org).
ftp.eff.org
===========
/pub/academic/statements/caf-statement
---
Codifies the application of academic freedom to academic
computers, reflecting seven months of on-line discussion about
computers and academic freedom. Covers free expression, due
process, privacy, and user participation.
/pub/academic/books
---
Directory of book references related to Computers and Academic
Freedom or mentioned in the CAF discussion. The file books/README
is a bibliography.
/pub/academic/faq/archive
---
List of files available on the Computers and Academic Freedom
archive.
/pub/academic/news
---
Directory of all issues of the Computers and Academic Freedom
News. A full list of abstracts is available in file `abstracts'.
The special best-of-the-month issues are named with their month,
for example, `June'.
FOOTNOTES
=========
_____
<7.1> What is the background behind the Internet?
The article ``Internet'' in Fantasy and Science Fiction by Bruce
Sterling <bruces@well.sf.ca.us> contains general and nontechnical
introductory notes on origins of the Internet, including the role
of the RAND corporation, the goal of network resilience in face of
nuclear attack, MIT, UCLA, ARPANET, TCP/IP, NSF, NREN, etc.:
> ARPANET itself formally expired in 1989, a happy victim of its
> own overwhelming success. Its users scarcely noticed, for
> ARPANET's functions not only continued but steadily improved.
> The use of TCP/IP standards for computer networking is now
> global. In 1971, a mere twenty-one years ago, there were only
> four nodes in the ARPANET network. Today there are tens of
> thousands of nodes in the Internet, scattered over forty-two
> countries, with more coming on-line every day. Three million,
> possibly four million people use this gigantic
> mother-of-all-computer-networks.
>
> The Internet is especially popular among scientists, and is
> probably the most important scientific instrument of the late
> twentieth century. The powerful, sophisticated access that it
> provides to specialized data and personal communication has sped
> up the pace of scientific research enormously.
>
> The Internet's pace of growth in the early 1990s is spectacular,
> almost ferocious. It is spreading faster than cellular phones,
> faster than fax machines. Last year the Internet was growing at
> a rate of twenty percent a *month.* The number of `host'
> machines with direct connection to TCP/IP has been doubling
> every year since 1988. The Internet is moving out of its
> original base in military and research institutions, into
> elementary and high schools, as well as into public libraries
> and the commercial sector.
References
==========
Bowers, K., T. LaQuey, J. Reynolds, K. Roubicek, M. Stahl, and A.
Yuan, ``Where to Start - A Bibliography of General Internetworking
Information'' (RFC-1175), CNRI, U Texas, ISI, BBN, SRI, Mitre,
August 1990.
The Whole Internet Catalog & User's Guide by Ed Krol. (1992)
O'Reilly and Associates, Inc.
---
A clear, non-jargonized introduction to the intimidating business
of network literacy written in humorous style.
Krol, E., ``The Hitchhikers Guide to the Internet'' (RFC-1118),
University of Illinois Urbana, September 1989.
``The User's Directory to Computer Networks'', by Tracy LaQuey.
The Matrix: Computer Networks and Conferencing Systems Worldwide.
by John Quarterman. Digital Press: Bedford, MA. (1990)
---
Massive and highly technical compendium detailing the
mind-boggling scope and complexity of global internetworks.
``!%@:: A Directory of Electronic Mail Addressing and Networks'' by
Donnalyn Frey and Rick Adams.
The Internet Companion, by Tracy LaQuey with Jeanne C. Ryer (1992)
Addison Wesley.
---
``Evangelical'' etiquette guide to the Internet featuring
anecdotal tales of life-changing Internet experiences. Foreword
by Senator Al Gore.
Zen and the Art of the Internet: A Beginner's Guide by Brendan P.
Kehoe (1992) Prentice Hall.
---
Brief but useful Internet guide with plenty of good advice on
useful databases.
See also ftp.eff.com:/pub/internet-info/. (Thanks to Bruce Sterling
<bruces@well.sf.ca.us> for contributions here.)
General
=======
Cunningham, Scott and Alan L. Porter. ``Communication Networks: A
dozen ways they'll change our lives.'' The Futurist 26, 1
(January-February, 1992): 19-22.
Brian Kahin, ed., BUILDING INFORMATION INFRASTRUCTURE (New York:
McGraw-Hill, 1992) ISBN# 0-390-03083-X
---
Essays on information infrastructure. Policy and design issues,
research and NREN, future visions, information markets. See
table of contents in ftp.eff.org:/pub/pub-infra/1992-03.
Shapard, Jeffrey. ``Observations on Cross-Cultural Electronic
Networking.'' Whole Earth Review (Winter) 1990: 32-35.
Varley, Pamela. ``Electronic Democracy.'' Technology Review
(November/December, 1991): 43-51.
______
<7.2> How Internet `anarchy' like the English language?
According to Bruce Sterling <bruces@well.sf.ca.us>:
> The Internet's `anarchy' may seem strange or even unnatural, but
> it makes a certain deep and basic sense. It's rather like the
> `anarchy' of the English language. Nobody rents English, and
> nobody owns English. As an English-speaking person, it's up
> to you to learn how to speak English properly and make whatever
> use you please of it (though the government provides certain
> subsidies to help you learn to read and write a bit).
> Otherwise, everybody just sort of pitches in, and somehow the
> thing evolves on its own, and somehow turns out workable. And
> interesting. Fascinating, even. Though a lot of people earn
> their living from using and exploiting and teaching English,
> `English' as an institution is public property, a public good.
> Much the same goes for the Internet. Would English be improved
> if the `The English Language, Inc.' had a board of directors
> and a chief executive officer, or a President and a Congress?
> There'd probably be a lot fewer new words in English, and a lot
> fewer new ideas.
_____
<7.3> Most Wanted list
Hopefully you have benefitted from this creation, compilation, and
condensation of information from various sources regarding privacy,
identity, and anonymity on the internet. The author is committed
to keeping this up-to-date and strengthening it, but this can only
be effective with your feedback. In particular, the following
items are sought:
- Short summaries of RFC documents and other references listed,
esp. CPSR files.
- More data on the specific uses and penetration of RFC-931.
- Internet traffic statistics. How much is email? How much
USENET? What are the costs involved?
- Famous or obscure examples of compromised privacy
on the internet.
- FTP site for the code (NOT the code) to turn the .plan file into a
named pipe for sensing/reacting to remote `fingers'.
- Knowledge on the `promiscuous' mode of receipt or transmission
on network cards.
- Details on the infamous experiment where a scientist resubmitted
previously accepted papers to a prominent journal with new and
unknown authors that were subsequently rejected.
- X Windows, EFF, CPSR FAQhood in news.answers.
Commerical use of this document is negotiable and is a way for the
author to recoup from a significant time investment. Email feedback
to ld231782@longs.lance.colostate.edu. Please note where you saw
this (which newsgroup, etc.).
_____
<7.4> Change history
3/3/93 v2.1 (current)
CPSR pointer, new UNIX mode examples, digital telephony act,
Steve Jackson incident, additions/ reorganization to
anonymity section, part 3. Note: v2.0 post to sci.crypt,
alt.privacy, news.answers, alt.answers, sci.answers was cancelled
by J. Kamens because of incorrect subject line.
2/14/93 v2.0
Major revisions. New section for X Windows. Some email privacy
items reorganized to network security section. New sections for
email liability issues, anonymity history and responsibilities.
Split into three files. Many new sources added, particularly
from EFF and CAF in new `issues' part. `commentary' from
news.admin.policy. 21 day automated posting starts.
2/3/93 v1.0
More newsgroups & FAQs added. More `Most Wanted'. Posted to
news.answers. Future monthly posting to sci.crypt, alt.privacy.
2/1/93 v0.3
Formatted to 72 columns for quoting etc. `miscellaneous,'
`resources' sections added with cypherpunk servers and use
warnings. More UNIX examples (`ls' and `chmod'). Posted to
alt.privacy, comp.society.privacy.
1/29/93 v0.2
`Identity' and `Privacy' sections added. `Anonymity' expanded.
Remailer addresses removed due to lack of information and
instability. Posted to sci.crypt.
1/25/93 v0.1
Originally posted to the cypherpunks mailing list on 1/25/93 as a
call to organize a list of anonymous servers.
email ld231782@longs.lance.colostate.edu for earlier versions.
* * *
SEE ALSO
========
Part 1 (previous file)
------
<1.1> What is `identity' on the internet?
<1.2> Why is identity (un)important on the internet?
<1.3> How does my email address (not) identify me and my background?
<1.4> How can I find out more about somebody from their email address?
<1.5> Why is identification (un)stable on the internet?
<1.6> What is the future of identification on the internet?
<2.1> What is `privacy' on the internet?
<2.2> Why is privacy (un)important on the internet?
<2.3> How (in)secure are internet networks?
<2.4> How (in)secure is my account?
<2.5> How (in)secure are my files and directories?
<2.6> How (in)secure is X Windows?
<2.7> How (in)secure is my email?
<2.8> How am I (not) liable for my email and postings?
<2.9> How do I provide more/less information to others on my identity?
<2.10> Who is my sysadmin? What does s/he know about me?
<2.11> Why is privacy (un)stable on the internet?
<2.12> What is the future of privacy on the internet?
<3.1> What is `anonymity' on the internet?
<3.2> Why is `anonymity' (un)important on the internet?
<3.3> How can anonymity be protected on the internet?
<3.4> What is `anonymous mail'?
<3.5> What is `anonymous posting'?
<3.6> Why is anonymity (un)stable on the internet?
<3.7> What is the future of anonymity on the internet?
Part 3 (next file)
------
<8.1> What are some known anonymous remailing and posting sites?
<8.2> What are the responsibilities associated with anonymity?
<8.3> How do I `kill' anonymous postings?
<8.4> What is the history behind anonymous posting servers?
<8.5> What is the value of anonymity?
<8.6> Should anonymous posting to all groups be allowed?
<8.7> What should system operators do with anonymous postings?
<8.8> What is going on with anon.penet.fi maintained by J. Helsingius?
* * * | 11 | sci.crypt |
Koff! You mean that as long as I put you to sleep first,
I can kill you without being cruel?
This changes everything. | 0 | alt.atheism |
Complete Q700 are best obtained from your dealer or some recent
copy of MacWorld or MacUser. My foggy memory suggests that the most relevant
comparison factors vis-a-vis a IIci are as follows:
25 MHz 68040
16 Mhz data path (don't recall this for sure, but it's slower
than Q 950 style machines for sure).
Ethertalk card on-board
Audio in/out
4 MB RAM on motherboard
4 SIMM slots
2 NuBus slots.
More flexible build-in video than the CI. Uses VRAM.
In comparison, a IIci with an accelerator won't give you
audio or ethernet or the same video options.
With a 68040 accelerator, CPU performance can be comparable but I
think it ends up costing more. | 4 | comp.sys.mac.hardware |
Not if they are unwilling to go through a public marriage ceremony,
nor if they say they are willing but have not actually done so.
Let's distinguish _real_ logistical problems (like being stranded on a
desert island) from _excuses_ (such as waiting for so-and-so's brother
to come back from being in the army so he can be in the ceremony)...
| 15 | soc.religion.christian |
#There is a big difference between running one's business
#affairs, and actively ripping people off.
And charging homosexuals more becuase people think that AIDS is a "gay
disease" is actively ripping people off.
| 18 | talk.politics.misc |
HELP! I really got ripped off and I need some help unripping myself.
I bought a Maxtor 4380 300mb ESDI HDD from Hi-Tech for $300, then paid to
get it repaired, for about another $300. Here's the deal: The thing works
fine! It low level formats, etc without any bad spots at all! AND THEN...
(Jaws Music) sectors start going bad! EEK!!! One at a time. Norton disk
doctor keeps marking some U and some C. That FIXES it. For about 5 minutes.
Then next day when I run NDD on it again: NO DICE more uncorrectable and
correctable sectors. AHHHHHUUUURRRRRRGGGGGHHHHH!!!!! So I fugure: "Ok, NDD's
just not being thurough enough, I'll use Spinrite, I heard that works well."
What happens? Spinrite goes and returns the clusters to active use!!!
AHHHUUUURRRRRRGGGGGHHHH!!!! NDD undoes it of course. The problem seams to
be getting worse and worse. HOWEVER when the HDD is low level formatted
again the problem goes away for a while, only to return in a day or so.
I'm so pissed off right now I'm considering buying another HDD, and I really
can't afford it.
I'm using SMARTDRIVE, and WINDOWS 3.1 (I'm not using the 32 bit disk access
though, I know that can create problems). The disk is using the second
option to trick the controller into thinking it's got less then 1024 cyls,
and everything else selected is standard, maybe I need to use a different
head skew or something? I don't know.
ANYONE WHO KNOWS HOW TO FIX THIS PROBLEM PLEASE TELL ME HOW!!!! HELP!!!! | 3 | comp.sys.ibm.pc.hardware |
Two LH Research SM11-1 power supplies (series SM10).
1000W, 5V, 200A (currently wired for 115VAC)
Control lines: +/- sense, on/off, pwr. fail, high/lo margin, current monitor
(List price from LH Research $824.00 each, qty. 1-9)
Asking $350.00 for the pair obo | 6 | misc.forsale |
The JP5 on the Speedstar 24x is for those systems with boot-up problems.
If your system fails to boot-up proprtly, please pull off the jumper
block from jp5. This will not affect the proformance of the SpeedStar 24x.
This is what my manual says about jp5. I never knew that it was there
but the card is a real ask kicker in my book. It beats the hell out
of my junk Sony 1604s to the point that I can't even use above 648x480
mode much...Sam
Some times an upgrage turns out to be a big overkill, like driving a Sony
with a 24x that the monitor can't handle. Or installing 60ns simms and
then finding out that your mother board doesn't have a cmos wait state
adjustment to take advantage of the new 60ns simms that you just bought! | 3 | comp.sys.ibm.pc.hardware |
Purists often distinguish between "true" clubbing and "pseudo"
clubbing, the difference being that with "true" clubbing the
angle of the nail when viewed from the side is constantly
negative when proceeding distally (towards the fingertip).
With "pseudo" clubbing, the angle is initially positive, then
negative, which is the normal situation. "Real" internists
can talk for hours about clubbing. I'm limited to a couple
of minutes.
Whether this distinction has anything to do with reality is
entirely unclear, but it is one of those things that internists
love to paw over during rounds. Supposedly, only "true" clubbing
is associated with disease. The problem is that the list of
diseases associated with clubbing is quite long, and includes
both congenital conditions and acquired disease. Since many of
these diseases are associated with cardiopulmonary problems
leading to right to left shunts and chronic hypoxemia, it is
very reasonable to get a chest xray. However, many of the
congenital abnormalities would only be diagnosed with a cardiac
catheterization.
The cause of clubbing is unclear, but presumably relates to
some factor causing blood vessels in the distal fingertip to
dilate abnormally.
Clubbing is one of those things from an examination which is
a tipoff to do more extensive examination. Often, however,
the cause of the clubbing is quite apparent. | 13 | sci.med |
What does "DC" stand for? Couldn't be an antichiropractic posting
from a chiropractor, could it? My curiosity is piqued.
Prostate CA is an especially troublesome entity for chiropractors.
It so typically causes bone pain due to spinal metastases that it
gets manipulated frequently. Manipulating a cancer riddled bone
is highly dangerous, since it can then fracture. I've seen at
least three cases where this happened with resulting neurologic
damage, including paraplegia. This is one instance where knowing
how to read x-rays can really help a chiropractor stay out of trouble.
DO chiropractors know what bony mets from prostate look like?
--
----------------------------------------------------------------------------
Gordon Banks N3JXP | "Skepticism is the chastity of the intellect, and
geb@cadre.dsl.pitt.edu | it is shameful to surrender it too soon." | 13 | sci.med |
I meant to comment on this at the time.
There's just no way baserunning could be that important - if it was,
runs created wouldn't be nearly as accurate as it is.
Runs Created is usually about 90-95% accurate on a team level, and
there's a lot more than baserunning that has to account for the
remaining percent. | 9 | rec.sport.baseball |
there is a file out there (look for it with archie) that is called
'theref22.zip' which has lots of info on various PC things,
amongst which is also a detailed description of all Floppy controller
commands, I think hard drive controller commands are not there.
it is possible to read an entire track including all gaps, sector
headers etc. by setting sector size to something very large (like
8K). | 3 | comp.sys.ibm.pc.hardware |
I built a little project using the radio shack 5vdc relays to switch
audio. I got pretty bad 'clicks' when the thing switched. I was doing
most of the common things one is supposed to do when using relays and
nothing seemed to get rid of the clicks.
My question is:
Is there a good relay/relay circuit that I can use for switching
audio, so that there will be *NO* noise of any kind on the audio lines.
I will appreciate any advice or references to advice. Also, exact part
numbers/company names etc. for the relays will help!
Thanks!
| 12 | sci.electronics |
They don't move, to anybody much bigger than an electron :-)
noah | 4 | comp.sys.mac.hardware |
Another dodge. Oh well. I'm no match for your amazing repertoire
of red herrings and smoke screens.
You asked for an apology. I'm not going to apologize for pointing out
that your straw-man argument was a straw-man argument. Nor for saying
that your list of "bible contradictions" shows such low standards of
scholarship that it should be an embarrassment to anti-inerrantists,
just as Josh McDowell should be an embarrassment to the fundies. Nor
for objecting various times to your taking quotes out of context. Nor
for pointing out that "they do it too" is not an excuse. Nor for calling
your red herrings and smoke screens what they are.
I'm still not sure why you think I'm a hypocrite. It's true that I
haven't responded to any of Robert Weiss' articles, which may be due in
part to the fact that I almost never read his articles. But I have
responded to both you and Frank DeCenso (a fundie/inerrantist.) Both
you and Frank have taken quotes out of context, and I've objected to
both of you doing so. I've criticized bad arguments both when they
were yours and I agreed with the conclusion (that the Bible is not
inerrant), and when they were Frank's and I disagreed with the
conclusion. I've criticized both you and Frank for evading questions,
and for trying to "explain me away" without addressing the objections
I raise (you by accusing me of being hypocritical and irrational, Frank
by accusing me of being motivated by a desire to attack the Bible.) I
don't see that any of this is hypocritical, nor do I apologize for it.
I do apologize, however, for having offended you in any other way.
Happy now? | 19 | talk.religion.misc |
:
{much deleted]
:
:
: The fact that this happened while eating two sugar coated cereals made
: by Kellog's makes me think she might be having an allergic reaction to
: something in the coating or the cereals. Of the four of us in our
: immediate family, Kathryn shows the least signs of the hay fever, running
: nose, itchy eyes, etc. but we have a lot of allergies in our family history
: including some weird food allergies - nuts, mushrooms.
:
Many of these cereals are corn-based. After your post I looked in the
literature and located two articles that implicated corn (contains
tryptophan) and seizures. The idea is that corn in the diet might
potentiate an already existing or latent seizure disorder, not cause it.
Check to see if the two Kellog cereals are corn based. I'd be interested. | 13 | sci.med |
3 | comp.sys.ibm.pc.hardware |
|
I think this kind of comparison is pretty useless in general. The
processor is only good when a good computer is designed around it adn the
computer is used in its designed purpose. Comparing processor speed is
pretty dumb because all you have to do is just increase the clock speed
to increase speed among other things.
I mean how can you say a 040 is faster than a 486 without
giving is operational conditions? Can you say the same when
you are running a program that uses a lot of transidental functions.
Knowing that 040 does not have transidental functions building in to
its FPU and 486 does, can you say that 040 is still faster?
Anyway, I hope people do not decided upon wether a computers
is good or not solely on its processor. Or how fast a processor is
based on its name, because one can alway do a certain things to a
processor to speed it up.
But if we restrict our arguements to, for example, pure
processor architectural issues. Or how one processor will work
well and another will not based on its design, then we can get
somewhere with our discussions.
- Chung Yang | 4 | comp.sys.mac.hardware |
Personally, I follow the no alcohol rule when I'm on a bike. My view is that you have to be in such a high degree of control that any alcohol could be potentially hazardous to my bike! If I get hurt it's my own fault, but I don't want to wreck my Katana. I developed this philosophy from an impromptu *experiment*. I had one beer at 6:00 in the evening and had volleyball practice at 7:00. I wasn't even close to leagle intoxication, but I couldn't perform even the most basic things until 8:30! This made
me think about how I viewed alcohol and intoxication. You may seem fine, but your reactions may be affected such that you'll be unable to recover from hitting a rock or even just a gust of wind. I greatly enjoy social drinking but, for me, it just doesn't mix with riding. | 8 | rec.motorcycles |
Actually I wasn't too surprised, since I bought it with the rust. Any of you
got some ideas of getting rid of this CHEAPLY (key word)?? It has eaten all
the
way through on the door panels. Can I use Bondo?
Also, is there a good paint that will bond to Aluminum rims? The paint thati
was on my rims has peeled off, actually, there's some rust looking 'stuff' on
the rims themselves... but it comes off pretty easily.
One more thing...
Have any of you done self-painting to a car? How do you start? What do I need
to do this? | 7 | rec.autos |
$17-20/piece.
~~~~~~~~~~~~~
I assume you are talking about 1meg X 9 SIMMs, or 1Meg X 9 SIPPs with
speed of 70ns? I would take 10K pieces per week if you have that price.
(FOB US port).
I am not waiting for an offer with that price, I could only dream.
tiger
| 3 | comp.sys.ibm.pc.hardware |
These substitutes exist, and at this time are available. Its the future
availability that is in doubt.
1) GHG-12
Get it from People's Welding Supply 800-382-9006
2) butane/propane
You can mix this yourself so no one can ever regulate it away.
Just make sure you use good quality (dry) gases.
I don't know of any 200mpg carb distributors :-) | 7 | rec.autos |
It's not a cliche, and (unlike your comments below) it's not a tautology.
It needn't have been true. If every pitcher in baseball were essentially
the same in quality (i.e. if the variance of pitching ability were much
smaller than the variance of batting ability), then scoring runs would be
much more important than preventing them, simply because the *ability* to
actively prevent runs would be much weaker.
If that's your point, you should have said so. What you in fact said was
"Pitching and defense win championships", and later "Pitching is the essence
of baseball". Neither of which says what you are now claiming was "your
point", and neither of which is true.
And you accuse Sherri of mouthing cliches!?
It's not clear to me at all that this is true. In high-scoring games, the
team with the better offense wins a high percentage of the time. In low-
scoring games, the split is essentially 50/50 regardless of team ability.
I thought you said "pitching and defense win championships" and "pitching is
the essence of baseball".
| 9 | rec.sport.baseball |
9 | rec.sport.baseball |