4742 ---- Copyright (C) 2007 by Lidija Rangelovska. Please see the corresponding RTF file for this eBook. RTF is Rich Text Format, and is readable in nearly any modern word processing program. 39 ---- The Hitchhikers Guide to the Internet 25 August 1987 Ed Krol krol@uxc.cso.uiuc.edu This document was produced through funding of the National Science Foundation. Copyright (C) 1987, by the Board of Trustees of The University of Illinois. Permission to duplicate this document, in whole or part, is granted provided reference is made to the source and this copyright is included in whole copies. This document assumes that one is familiar with the workings of a non-connected simple IP network (e.g. a few 4.2 BSD systems on an Ethernet not connected to anywhere else). Appendix A contains remedial information to get one to this point. Its purpose is to get that person, familiar with a simple net, versed in the "oral tradition" of the Internet to the point that that net can be connected to the Internet with little danger to either. It is not a tutorial, it consists of pointers to other places, literature, and hints which are not normally documented. Since the Internet is a dynamic environment, changes to this document will be made regularly. The author welcomes comments and suggestions. This is especially true of terms for the glossary (definitions are not necessary). In the beginning there was the ARPAnet, a wide area experimental network connecting hosts and terminal servers together. Procedures were set up to regulate the allocation of addresses and to create voluntary standards for the network. As local area networks became more pervasive, many hosts became gateways to local networks. A network layer to allow the interoperation of these networks was developed and called IP (Internet Protocol). Over time other groups created long haul IP based networks (NASA, NSF, states...). These nets, too, interoperate because of IP. The collection of all of these interoperating networks is the Internet. Two groups do much of the research and information work of the Internet (ISI and SRI). ISI (the Informational Sciences Institute) does much of the research, standardization, and allocation work of the Internet. SRI International provides information services for the Internet. In fact, after you are connected to the Internet most of the information in this document can be retrieved from the Network Information Center (NIC) run by SRI. Operating the Internet Each network, be it the ARPAnet, NSFnet or a regional network, has its own operations center. The ARPAnet is run by BBN, Inc. under contract from DARPA. Their facility is called the Network Operations Center or NOC. Cornell University temporarily operates NSFnet (called the Network Information Service Center, NISC). It goes on to the -2- regionals having similar facilities to monitor and keep watch over the goings on of their portion of the Internet. In addition, they all should have some knowledge of what is happening to the Internet in total. If a problem comes up, it is suggested that a campus network liaison should contact the network operator to which he is directly connected. That is, if you are connected to a regional network (which is gatewayed to the NSFnet, which is connected to the ARPAnet...) and have a problem, you should contact your regional network operations center. RFCs The internal workings of the Internet are defined by a set of documents called RFCs (Request for Comments). The general process for creating an RFC is for someone wanting something formalized to write a document describing the issue and mailing it to Jon Postel (postel@isi.edu). He acts as a referee for the proposal. It is then commented upon by all those wishing to take part in the discussion (electronically of course). It may go through multiple revisions. Should it be generally accepted as a good idea, it will be assigned a number and filed with the RFCs. The RFCs can be divided into five groups: required, suggested, directional, informational and obsolete. Required RFC's (e.g. RFC-791, The Internet Protocol) must be implemented on any host connected to the Internet. Suggested RFCs are generally implemented by network hosts. Lack of them does not preclude access to the Internet, but may impact its usability. RFC-793 (Transmission Control Protocol) is a suggested RFC. Directional RFCs were discussed and agreed to, but their application has never come into wide use. This may be due to the lack of wide need for the specific application (RFC-937 The Post Office Protocol) or that, although technically superior, ran against other pervasive approaches (RFC-891 Hello). It is suggested that should the facility be required by a particular site, animplementation be done in accordance with the RFC. This insures that, should the idea be one whose time has come, the implementation will be in accordance with some standard and will be generally usable. Informational RFCs contain factual information about the Internet and its operation (RFC-990, Assigned Numbers). Finally, as the Internet and technology have grown, some RFCs have become unnecessary. These obsolete RFCs cannot be ignored, however. Frequently when a change is made to some RFC that causes a new one to be issued obsoleting others, the new RFC only contains explanations and motivations for the change. Understanding the model on which the whole facility is based may involve reading the original and subsequent RFCs on the topic. -3- (Appendix B contains a list of what are considered to be the major RFCs necessary for understanding the Internet). The Network Information Center The NIC is a facility available to all Internet users which provides information to the community. There are three means of NIC contact: network, telephone, and mail. The network accesses are the most prevalent. Interactive access is frequently used to do queries of NIC service overviews, look up user and host names, and scan lists of NIC documents. It is available by using %telnet sri-nic.arpa on a BSD system and following the directions provided by a user friendly prompter. From poking around in the databases provided one might decide that a document named NETINFO:NUG.DOC (The Users Guide to the ARPAnet) would be worth having. It could be retrieved via an anonymous FTP. An anonymous FTP would proceed something like the following. (The dialogue may vary slightly depending on the implementation of FTP you are using). %ftp sri-nic.arpa Connected to sri-nic.arpa. 220 SRI_NIC.ARPA FTP Server Process 5Z(47)-6 at Wed 17-Jun-87 12:00 PDT Name (sri-nic.arpa:myname): anonymous 331 ANONYMOUS user ok, send real ident as password. Password: myname 230 User ANONYMOUS logged in at Wed 17-Jun-87 12:01 PDT, job 15. ftp> get netinfo:nug.doc 200 Port 18.144 at host 128.174.5.50 accepted. 150 ASCII retrieve of NUG.DOC.11 started. 226 Transfer Completed 157675 (8) bytes transferred local: netinfo:nug.doc remote:netinfo:nug.doc 157675 bytes in 4.5e+02 seconds (0.34 Kbytes/s) ftp> quit 221 QUIT command received. Goodbye. (Another good initial document to fetch is NETINFO:WHAT-THE-NIC-DOES.TXT)! Questions of the NIC or problems with services can be asked of or reported to using electronic mail. The following addresses can be used: NIC@SRI-NIC.ARPA General user assistance, document requests REGISTRAR@SRI-NIC.ARPA User registration and WHOIS updates HOSTMASTER@SRI-NIC.ARPA Hostname and domain changes and updates ACTION@SRI-NIC.ARPA SRI-NIC computer operations SUGGESTIONS@SRI-NIC.ARPA Comments on NIC publications and services -4- For people without network access, or if the number of documents is large, many of the NIC documents are available in printed form for a small charge. One frequently ordered document for starting sites is a compendium of major RFCs. Telephone access is used primarily for questions or problems with network access. (See appendix B for mail/telephone contact numbers). The NSFnet Network Service Center The NSFnet Network Service Center (NNSC) is funded by NSF to provide a first level of aid to users of NSFnet should they have questions or encounter problems traversing the network. It is run by BBN Inc. Karen Roubicek (roubicek@nnsc.nsf.net) is the NNSC user liaison. The NNSC, which currently has information and documents online and in printed form, plans to distribute news through network mailing lists, bulletins, newsletters, and online reports. The NNSC also maintains a database of contact points and sources of additional information about NSFnet component networks and supercomputer centers. Prospective or current users who do not know whom to call concerning questions about NSFnet use, should contact the NNSC. The NNSC will answer general questions, and, for detailed information relating to specific components of the Internet, will help users find the appropriate contact for further assistance. (Appendix B) Mail Reflectors The way most people keep up to date on network news is through subscription to a number of mail reflectors. Mail reflectors are special electronic mailboxes which, when they receive a message, resend it to a list of other mailboxes. This in effect creates a discussion group on a particular topic. Each subscriber sees all the mail forwarded by the reflector, and if one wants to put his "two cents" in sends a message with the comments to the reflector.... The general format to subscribe to a mail list is to find the address reflector and append the string -REQUEST to the mailbox name (not the host name). For example, if you wanted to take part in the mailing list for NSFnet reflected by NSFNET@NNSC.NSF.NET, one sends a request to -5- NSFNET-REQUEST@NNSC.NSF.NET. This may be a wonderful scheme, but the problem is that you must know the list exists in the first place. It is suggested that, if you are interested, you read the mail from one list (like NSFNET) and you will probably become familiar with the existence of others. A registration service for mail reflectors is provided by the NIC in the files NETINFO:INTEREST-GROUPS-1.TXT, NETINFO:INTEREST-GROUPS-2.TXT, and NETINFO:INTEREST-GROUPS- 3.TXT. The NSFNET mail reflector is targeted at those people who have a day to day interest in the news of the NSFnet (the backbone, regional network, and Internet inter-connection site workers). The messages are reflected by a central location and are sent as separate messages to each subscriber. This creates hundreds of messages on the wide area networks where bandwidth is the scarcest. There are two ways in which a campus could spread the news and not cause these messages to inundate the wide area networks. One is to re-reflect the message on the campus. That is, set up a reflector on a local machine which forwards the message to a campus distribution list. The other is to create an alias on a campus machine which places the messages into a notesfile on the topic. Campus users who want the information could access the notesfile and see the messages that have been sent since their last access. One might also elect to have the campus wide area network liaison screen the messages in either case and only forward those which are considered of merit. Either of these schemes allows one message to be sent to the campus, while allowing wide distribution within. Address Allocation Before a local network can be connected to the Internet it must be allocated a unique IP address. These addresses are allocated by ISI. The allocation process consists of getting an application form received from ISI. (Send a message to hostmaster@sri-nic.arpa and ask for the template for a connected address). This template is filled out and mailed back to hostmaster. An address is allocated and e-mailed back to you. This can also be done by postal mail (Appendix B). IP addresses are 32 bits long. It is usually written as four decimal numbers separated by periods (e.g., 192.17.5.100). Each number is the value of an octet of the 32 bits. It was seen from the beginning that some networks might choose to organize themselves as very flat (one net with a lot of nodes) and some might organize hierarchically -6- (many interconnected nets with fewer nodes each and a backbone). To provide for these cases, addresses were differentiated into class A, B, and C networks. This classification had to with the interpretation of the octets. Class A networks have the first octet as a network address and the remaining three as a host address on that network. Class C addresses have three octets of network address and one of host. Class B is split two and two. Therefore, there is an address space for a few large nets, a reasonable number of medium nets and a large number of small nets. The top two bits in the first octet are coded to tell the address format. All of the class A nets have been allocated. So one has to choose between Class B and Class C when placing an order. (There are also class D (Multicast) and E (Experimental) formats. Multicast addresses will likely come into greater use in the near future, but are not frequently used now). In the past sites requiring multiple network addresses requested multiple discrete addresses (usually Class C). This was done because much of the software available (not ably 4.2BSD) could not deal with subnetted addresses. Information on how to reach a particular network (routing information) must be stored in Internet gateways and packet switches. Some of these nodes have a limited capability to store and exchange routing information (limited to about 300 networks). Therefore, it is suggested that any campus announce (make known to the Internet) no more than two discrete network numbers. If a campus expects to be constrained by this, it should consider subnetting. Subnetting (RFC-932) allows one to announce one address to the Internet and use a set of addresses on the campus. Basically, one defines a mask which allows the network to differentiate between the network portion and host portion of the address. By using a different mask on the Internet and the campus, the address can be interpreted in multiple ways. For example, if a campus requires two networks internally and has the 32,000 addresses beginning 128.174.X.X (a Class B address) allocated to it, the campus could allocate 128.174.5.X to one part of campus and 128.174.10.X to another. By advertising 128.174 to the Internet with a subnet mask of FF.FF.00.00, the Internet would treat these two addresses as one. Within the campus a mask of FF.FF.FF.00 would be used, allowing the campus to treat the addresses as separate entities. (In reality you don't pass the subnet mask of FF.FF.00.00 to the Internet, the octet meaning is implicit in its being a class B address). A word of warning is necessary. Not all systems know how to do subnetting. Some 4.2BSD systems require additional software. 4.3BSD systems subnet as released. Other devices -7- and operating systems vary in the problems they have dealing with subnets. Frequently these machines can be used as a leaf on a network but not as a gateway within the subnetted portion of the network. As time passes and more systems become 4.3BSD based, these problems should disappear. There has been some confusion in the past over the format of an IP broadcast address. Some machines used an address of all zeros to mean broadcast and some all ones. This was confusing when machines of both type were connected to the same network. The broadcast address of all ones has been adopted to end the grief. Some systems (e.g. 4.2 BSD) allow one to choose the format of the broadcast address. If a system does allow this choice, care should be taken that the all ones format is chosen. (This is explained in RFC-1009 and RFC-1010). Internet Problems There are a number of problems with the Internet. Solutions to the problems range from software changes to long term research projects. Some of the major ones are detailed below: Number of Networks When the Internet was designed it was to have about 50 connected networks. With the explosion of networking, the number is now approaching 300. The software in a group of critical gateways (called the core gateways of the ARPAnet) are not able to pass or store much more than that number. In the short term, core reallocation and recoding has raised the number slightly. By the summer of '88 the current PDP-11 core gateways will be replaced with BBN Butterfly gateways which will solve the problem. Routing Issues Along with sheer mass of the data necessary to route packets to a large number of networks, there are many problems with the updating, stability, and optimality of the routing algorithms. Much research is being done in the area, but the optimal solution to these routing problems is still years away. In most cases the the routing we have today works, but sub-optimally and sometimes unpredictably. -8- Trust Issues Gateways exchange network routing information. Currently, most gateways accept on faith that the information provided about the state of the network is correct. In the past this was not a big problem since most of the gateways belonged to a single administrative entity (DARPA). Now with multiple wide area networks under different administrations, a rogue gateway somewhere in the net could cripple the Internet. There is design work going on to solve both the problem of a gateway doing unreasonable things and providing enough information to reasonably route data between multiply connected networks (multi-homed networks). Capacity & Congestion Many portions of the ARPAnet are very congested during the busy part of the day. Additional links are planned to alleviate this congestion, but the implementation will take a few months. These problems and the future direction of the Internet are determined by the Internet Architect (Dave Clark of MIT) being advised by the Internet Activities Board (IAB). This board is composed of chairmen of a number of committees with responsibility for various specialized areas of the Internet. The committees composing the IAB and their chairmen are: Committee Chair Autonomous Networks Deborah Estrin End-to-End Services Bob Braden Internet Architecture Dave Mills Internet Engineering Phil Gross EGP2 Mike Petry Name Domain Planning Doug Kingston Gateway Monitoring Craig Partridge Internic Jake Feinler Performance & Congestion ControlRobert Stine NSF Routing Chuck Hedrick Misc. MilSup Issues Mike St. Johns Privacy Steve Kent IRINET Requirements Vint Cerf Robustness & Survivability Jim Mathis Scientific Requirements Barry Leiner Note that under Internet Engineering, there are a set of task forces and chairs to look at short term concerns. The chairs of these task forces are not part of the IAB. -9- Routing Routing is the algorithm by which a network directs a packet from its source to its destination. To appreciate the problem, watch a small child trying to find a table in a restaurant. From the adult point of view the structure of the dining room is seen and an optimal route easily chosen. The child, however, is presented with a set of paths between tables where a good path, let alone the optimal one to the goal is not discernible.*** A little more background might be appropriate. IP gateways (more correctly routers) are boxes which have connections to multiple networks and pass traffic between these nets. They decide how the packet is to be sent based on the information in the IP header of the packet and the state of the network. Each interface on a router has an unique address appropriate to the network to which it is connected. The information in the IP header which is used is primarily the destination address. Other information (e.g. type of service) is largely ignored at this time. The state of the network is determined by the routers passing information among themselves. The distribution of the database (what each node knows), the form of the updates, and metrics used to measure the value of a connection, are the parameters which determine the characteristics of a routing protocol. Under some algorithms each node in the network has complete knowledge of the state of the network (the adult algorithm). This implies the nodes must have larger amounts of local storage and enough CPU to search the large tables in a short enough time (remember this must be done for each packet). Also, routing updates usually contain only changes to the existing information (or you spend a large amount of the network capacity passing around megabyte routing updates). This type of algorithm has several problems. Since the only way the routing information can be passed around is across the network and the propagation time is non-trivial, the view of the network at each node is a correct historical view of the network at varying times in the past. (The adult algorithm, but rather than looking directly at the dining area, looking at a photograph of the dining room. One is likely to pick the optimal route and find a bus-cart has moved in to block the path after the photo was taken). These inconsistencies can cause circular routes (called routing loops) where once a packet enters it is routed in a closed path until its time to live (TTL) field expires and it is discarded. Other algorithms may know about only a subset of the network. To prevent loops in these protocols, they are usually used in a hierarchical network. They know completely about their own area, but to leave that area they go to one particular place (the default gateway). Typically these are used in smaller networks (campus, regional...). -10- Routing protocols in current use: Static (no protocol-table/default routing) Don't laugh. It is probably the most reliable, easiest to implement, and least likely to get one into trouble for a small network or a leaf on the Internet. This is, also, the only method available on some CPU-operating system combinations. If a host is connected to an Ethernet which has only one gateway off of it, one should make that the default gateway for the host and do no other routing. (Of course that gateway may pass the reachablity information somehow on the other side of itself). One word of warning, it is only with extreme caution that one should use static routes in the middle of a network which is also using dynamic routing. The routers passing dynamic information are sometimes confused by conflicting dynamic and static routes. If your host is on an ethernet with multiple routers to other networks on it and the routers are doing dynamic routing among themselves, it is usually better to take part in the dynamic routing than to use static routes. RIP RIP is a routing protocol based on XNS (Xerox Network System) adapted for IP networks. It is used by many routers (Proteon, cisco, UB...) and many BSD Unix systems BSD systems typically run a program called "routed" to exchange information with other systems running RIP. RIP works best for nets of small diameter where the links are of equal speed. The reason for this is that the metric used to determine which path is best is the hop-count. A hop is a traversal across a gateway. So, all machines on the same Ethernet are zero hops away. If a router connects connects two net- works directly, a machine on the other side of the router is one hop away.... As the routing information is passed through a gateway, the gateway adds one to the hop counts to keep them consistent across the net- work. The diameter of a network is defined as the largest hop-count possible within a network. Unfor- tunately, a hop count of 16 is defined as infinity in RIP meaning the link is down. Therefore, RIP will not allow hosts separated by more than 15 gateways in the RIP space to communicate. The other problem with hop-count metrics is that if links have different speeds, that difference is not -11- reflected in the hop-count. So a one hop satellite link (with a .5 sec delay) at 56kb would be used instead of a two hop T1 connection. Congestion can be viewed as a decrease in the efficacy of a link. So, as a link gets more congested, RIP will still know it is the best hop-count route and congest it even more by throwing more packets on the queue for that link. The protocol is not well documented. A group of people are working on producing an RFC to both define the current RIP and to do some extensions to it to allow it to better cope with larger networks. Currently, the best documentation for RIP appears to be the code to BSD "routed". Routed The ROUTED program, which does RIP for 4.2BSD systems, has many options. One of the most frequently used is: "routed -q" (quiet mode) which means listen to RIP infor- mation but never broadcast it. This would be used by a machine on a network with multiple RIP speaking gate- ways. It allows the host to determine which gateway is best (hopwise) to use to reach a distant network. (Of course you might want to have a default gateway to prevent having to pass all the addresses known to the Internet around with RIP). There are two ways to insert static routes into "routed", the "/etc/gateways" file and the "route add" command. Static routes are useful if you know how to reach a distant network, but you are not receiving that route using RIP. For the most part the "route add" command is preferable to use. The reason for this is that the command adds the route to that machine's routing table but does not export it through RIP. The "/etc/gateways" file takes precedence over any routing information received through a RIP update. It is also broadcast as fact in RIP updates produced by the host without question, so if a mistake is made in the "/etc/gateways" file, that mistake will soon permeate the RIP space and may bring the network to its knees. One of the problems with "routed" is that you have very little control over what gets broadcast and what doesn't. Many times in larger networks where various parts of the network are under different administrative controls, you would like to pass on through RIP only nets which you receive from RIP and you know are reasonable. This prevents people from adding IP addresses to the network which may be illegal and you being responsible for passing them on to the Internet. This -12- type of reasonability checks are not available with "routed" and leave it usable, but inadequate for large networks. Hello (RFC-891) Hello is a routing protocol which was designed and implemented in a experimental software router called a "Fuzzball" which runs on a PDP-11. It does not have wide usage, but is the routing protocol currently used on the NSFnet backbone. The data transferred between nodes is similar to RIP (a list of networks and their metrics). The metric, however, is milliseconds of delay. This allows Hello to be used over nets of various link speeds and performs better in congestive situations. One of the most interesting side effects of Hello based networks is their great timekeeping ability. If you consider the problem of measuring delay on a link for the metric, you find that it is not an easy thing to do. You cannot measure round trip time since the return link may be more congested, of a different speed, or even not there. It is not really feasible for each node on the network to have a builtin WWV (nationwide radio time standard) receiver. So, you must design an algorithm to pass around time between nodes over the network links where the delay in transmission can only be approximated. Hello routers do this and in a nationwide network maintain synchronized time within milliseconds. Exterior Gateway Protocol (EGP RFC-904) EGP is not strictly a routing protocol, it is a reacha- bility protocol. It tells only if nets can be reached through a particular gateway, not how good the connec- tion is. It is the standard by which gateways to local nets inform the ARPAnet of the nets they can reach. There is a metric passed around by EGP but its usage is not standardized formally. Its typical value is value is 1 to 8 which are arbitrary goodness of link values understood by the internal DDN gateways. The smaller the value the better and a value of 8 being unreach- able. A quirk of the protocol prevents distinguishing between 1 and 2, 3 and 4..., so the usablity of this as a metric is as three values and unreachable. Within NSFnet the values used are 1, 3, and unreachable. Many routers talk EGP so they can be used for ARPAnet gateways. -13- Gated So we have regional and campus networks talking RIP among themselves, the NSFnet backbone talking Hello, and the DDN speaking EGP. How do they interoperate? In the beginning there was static routing, assembled into the Fuzzball software configured for each site. The problem with doing static routing in the middle of the network is that it is broadcast to the Internet whether it is usable or not. Therefore, if a net becomes unreachable and you try to get there, dynamic routing will immediately issue a net unreachable to you. Under static routing the routers would think the net could be reached and would continue trying until the application gave up (in 2 or more minutes). Mark Fedor of Cornell (fedor@devvax.tn.cornell.edu) attempted to solve these problems with a replacement for "routed" called "gated". "Gated" talks RIP to RIP speaking hosts, EGP to EGP speakers, and Hello to Hello'ers. These speakers frequently all live on one Ethernet, but luckily (or unluckily) cannot understand each others ruminations. In addition, under configuration file control it can filter the conversion. For example, one can produce a configuration saying announce RIP nets via Hello only if they are specified in a list and are reachable by way of a RIP broadcast as well. This means that if a rogue network appears in your local site's RIP space, it won't be passed through to the Hello side of the world. There are also configuration options to do static routing and name trusted gateways. This may sound like the greatest thing since sliced bread, but there is a catch called metric conversion. You have RIP measuring in hops, Hello measuring in milliseconds, and EGP using arbitrary small numbers. The big questions is how many hops to a millisecond, how many milliseconds in the EGP number 3.... Also, remember that infinity (unreachability) is 16 to RIP, 30000 or so to Hello, and 8 to the DDN with EGP. Getting all these metrics to work well together is no small feat. If done incorrectly and you translate an RIP of 16 into an EGP of 6, everyone in the ARPAnet will still think your gateway can reach the unreachable and will send every packet in the world your way. For these reasons, Mark requests that you consult closely with him when configuring and using "gated". -14- "Names" All routing across the network is done by means of the IP address associated with a packet. Since humans find it difficult to remember addresses like 128.174.5.50, a symbolic name register was set up at the NIC where people would say "I would like my host to be named 'uiucuxc'". Machines connected to the Internet across the nation would connect to the NIC in the middle of the night, check modification dates on the hosts file, and if modified move it to their local machine. With the advent of workstations and micros, changes to the host file would have to be made nightly. It would also be very labor intensive and consume a lot of network bandwidth. RFC-882 and a number of others describe domain name service, a distributed data base system for mapping names into addresses. We must look a little more closely into what's in a name. First, note that an address specifies a particular connec- tion on a specific network. If the machine moves, the address changes. Second, a machine can have one or more names and one or more network addresses (connections) to different networks. Names point to a something which does useful work (i.e. the machine) and IP addresses point to an interface on that provider. A name is a purely symbolic representation of a list of addresses on the network. If a machine moves to a different network, the addresses will change but the name could remain the same. Domain names are tree structured names with the root of the tree at the right. For example: uxc.cso.uiuc.edu is a machine called 'uxc' (purely arbitrary), within the subdomains method of allocation of the U of I) and 'uiuc' (the University of Illinois at Urbana), registered with 'edu' (the set of educational institutions). A simplified model of how a name is resolved is that on the user's machine there is a resolver. The resolver knows how to contact across the network a root name server. Root servers are the base of the tree structured data retrieval system. They know who is responsible for handling first level domains (e.g. 'edu'). What root servers to use is an installation parameter. From the root server the resolver finds out who provides 'edu' service. It contacts the 'edu' name server which supplies it with a list of addresses of servers for the subdomains (like 'uiuc'). This action is repeated with the subdomain servers until the final sub- domain returns a list of addresses of interfaces on the host in question. The user's machine then has its choice of which of these addresses to use for communication. -15- A group may apply for its own domain name (like 'uiuc' above). This is done in a manner similar to the IP address allocation. The only requirements are that the requestor have two machines reachable from the Internet, which will act as name servers for that domain. Those servers could also act as servers for subdomains or other servers could be designated as such. Note that the servers need not be located in any particular place, as long as they are reach- able for name resolution. (U of I could ask Michigan State to act on its behalf and that would be fine). The biggest problem is that someone must do maintenance on the database. If the machine is not convenient, that might not be done in a timely fashion. The other thing to note is that once the domain is allocated to an administrative entity, that entity can freely allocate subdomains using what ever manner it sees fit. The Berkeley Internet Name Domain (BIND) Server implements the Internet name server for UNIX systems. The name server is a distributed data base system that allows clients to name resources and to share that information with other net- work hosts. BIND is integrated with 4.3BSD and is used to lookup and store host names, addresses, mail agents, host information, and more. It replaces the "/etc/hosts" file for host name lookup. BIND is still an evolving program. To keep up with reports on operational problems, future design decisions, etc, join the BIND mailing list by sending a request to "bind-request@ucbarp.Berkeley.EDU". BIND can also be obtained via anonymous FTP from ucbarpa.berkley.edu. There are several advantages in using BIND. One of the most important is that it frees a host from relying on "/etc/hosts" being up to date and complete. Within the .uiuc.edu domain, only a few hosts are included in the host table distributed by SRI. The remainder are listed locally within the BIND tables on uxc.cso.uiuc.edu (the server machine for most of the .uiuc.edu domain). All are equally reachable from any other Internet host running BIND. BIND can also provide mail forwarding information for inte- rior hosts not directly reachable from the Internet. These hosts can either be on non-advertised networks, or not con- nected to a network at all, as in the case of UUCP-reachable hosts. More information on BIND is available in the "Name Server Operations Guide for BIND" in "UNIX System Manager's Manual", 4.3BSD release. There are a few special domains on the network, like SRI- NIC.ARPA. The 'arpa' domain is historical, referring to hosts registered in the old hosts database at the NIC. There are others of the form NNSC.NSF.NET. These special domains are used sparingly and require ample justification. They refer to servers under the administrative control of -16- the network rather than any single organization. This allows for the actual server to be moved around the net while the user interface to that machine remains constant. That is, should BBN relinquish control of the NNSC, the new provider would be pointed to by that name. In actuality, the domain system is a much more general and complex system than has been described. Resolvers and some servers cache information to allow steps in the resolution to be skipped. Information provided by the servers can be arbitrary, not merely IP addresses. This allows the system to be used both by non-IP networks and for mail, where it may be necessary to give information on intermediate mail bridges. What's wrong with Berkeley Unix University of California at Berkeley has been funded by DARPA to modify the Unix system in a number of ways. Included in these modifications is support for the Internet protocols. In earlier versions (e.g. BSD 4.2) there was good support for the basic Internet protocols (TCP, IP, SMTP, ARP) which allowed it to perform nicely on IP ether- nets and smaller Internets. There were deficiencies, how- ever, when it was connected to complicated networks. Most of these problems have been resolved under the newest release (BSD 4.3). Since it is the springboard from which many vendors have launched Unix implementations (either by porting the existing code or by using it as a model), many implementations (e.g. Ultrix) are still based on BSD 4.2. Therefore, many implementations still exist with the BSD 4.2 problems. As time goes on, when BSD 4.3 trickles through vendors as new release, many of the problems will be resolved. Following is a list of some problem scenarios and their handling under each of these releases. ICMP redirects Under the Internet model, all a system needs to know to get anywhere in the Internet is its own address, the address of where it wants to go, and how to reach a gateway which knows about the Internet. It doesn't have to be the best gateway. If the system is on a network with multiple gateways, and a host sends a packet for delivery to a gateway which feels another directly connected gateway is more appropriate, the gateway sends the sender a message. This message is an ICMP redirect, which politely says "I'll deliver this message for you, but you really ought to use that gate- way over there to reach this host". BSD 4.2 ignores these messages. This creates more stress on the gate- ways and the local network, since for every packet -17- sent, the gateway sends a packet to the originator. BSD 4.3 uses the redirect to update its routing tables, will use the route until it times out, then revert to the use of the route it thinks is should use. The whole process then repeats, but it is far better than one per packet. Trailers An application (like FTP) sends a string of octets to TCP which breaks it into chunks, and adds a TCP header. TCP then sends blocks of data to IP which adds its own headers and ships the packets over the network. All this prepending of the data with headers causes memory moves in both the sending and the receiving machines. Someone got the bright idea that if packets were long and they stuck the headers on the end (they became trailers), the receiving machine could put the packet on the beginning of a page boundary and if the trailer was OK merely delete it and transfer control of the page with no memory moves involved. The problem is that trailers were never standardized and most gateways don't know to look for the routing information at the end of the block. When trailers are used, the machine typically works fine on the local network (no gateways involved) and for short blocks through gateways (on which trailers aren't used). So TELNET and FTP's of very short files work just fine and FTP's of long files seem to hang. On BSD 4.2 trailers are a boot option and one should make sure they are off when using the Internet. BSD 4.3 negotiates trailers, so it uses them on its local net and doesn't use them when going across the network. Retransmissions TCP fires off blocks to its partner at the far end of the connection. If it doesn't receive an acknowledge- ment in a reasonable amount of time it retransmits the blocks. The determination of what is reasonable is done by TCP's retransmission algorithm. There is no correct algorithm but some are better than others, where better is measured by the number of retransmis- sions done unnecessarily. BSD 4.2 had a retransmission algorithm which retransmitted quickly and often. This is exactly what you would want if you had a bunch of machines on an ethernet (a low delay network of large bandwidth). If you have a network of relatively longer delay and scarce bandwidth (e.g. 56kb lines), it tends to retransmit too aggressively. Therefore, it makes the networks and gateways pass more traffic than is really necessary for a given conversation. Retransmis- sion algorithms do adapt to the delay of the network -18- after a few packets, but 4.2's adapts slowly in delay situations. BSD 4.3 does a lot better and tries to do the best for both worlds. It fires off a few retransmissions really quickly assuming it is on a low delay network, and then backs off very quickly. It also allows the delay to be about 4 minutes before it gives up and declares the connection broken. -19- Appendix A References to Remedial Information Quaterman and Hoskins, "Notable Computer Networks", Communications of the ACM, Vol 29, #10, pp. 932-971 (October, 1986). Tannenbaum, Andrew S., Computer Networks, Prentice Hall, 1981. Hedrick, Chuck, Introduction to the Internet Protocols, Anonymous FTP from topaz.rutgers.edu, directory pub/tcp-ip-docs, file tcp-ip-intro.doc. -20- Appendix B List of Major RFCs RFC-768 User Datagram Protocol (UDP) RFC-791 Internet Protocol (IP) RFC-792 Internet Control Message Protocol (ICMP) RFC-793 Transmission Control Protocol (TCP) RFC-821 Simple Mail Transfer Protocol (SMTP) RFC-822 Standard for the Format of ARPA Internet Text Messages RFC-854 Telnet Protocol RFC-917 * Internet Subnets RFC-919 * Broadcasting Internet Datagrams RFC-922 * Broadcasting Internet Datagrams in the Presence of Subnets RFC-940 * Toward an Internet Standard Scheme for Subnetting RFC-947 * Multi-network Broadcasting within the Internet RFC-950 * Internet Standard Subnetting Procedure RFC-959 File Transfer Protocol (FTP) RFC-966 * Host Groups: A Multicast Extension to the Internet Protocol RFC-988 * Host Extensions for IP Multicasting RFC-997 * Internet Numbers RFC-1010 * Assigned Numbers RFC-1011 * Official ARPA-Internet Protocols RFC's marked with the asterisk (*) are not included in the 1985 DDN Protocol Handbook. Note: This list is a portion of a list of RFC's by topic retrieved from the NIC under NETINFO:RFC-SETS.TXT (anonymous FTP of course). The following list is not necessary for connection to the Internet, but is useful in understanding the domain system, mail system, and gateways: RFC-882 Domain Names - Concepts and Facilities RFC-883 Domain Names - Implementation RFC-973 Domain System Changes and Observations RFC-974 Mail Routing and the Domain System RFC-1009 Requirements for Internet Gateways -21- Appendix C Contact Points for Network Information Network Information Center (NIC) DDN Network Information Center SRI International, Room EJ291 333 Ravenswood Avenue Menlo Park, CA 94025 (800) 235-3155 or (415) 859-3695 NIC@SRI-NIC.ARPA NSF Network Service Center (NNSC) NNSC BBN Laboratories Inc. 10 Moulton St. Cambridge, MA 02238 (617) 497-3400 NNSC@NNSC.NSF.NET -22- Glossary core gateway The innermost gateways of the ARPAnet. These gateways have a total picture of the reacha- bility to all networks known to the ARPAnet with EGP. They then redistribute reachabil- ity information to all those gateways speak- ing EGP. It is from them your EGP agent (there is one acting for you somewhere if you can reach the ARPAnet) finds out it can reach all the nets on the ARPAnet. Which is then passed to you via Hello, gated, RIP.... count to infinity The symptom of a routing problem where routing information is passed in a circular manner through multiple gateways. Each gate- way increments the metric appropriately and passes it on. As the metric is passed around the loop, it increments to ever increasing values til it reaches the maximum for the routing protocol being used, which typically denotes a link outage. hold down When a router discovers a path in the network has gone down announcing that that path is down for a minimum amount of time (usually at least two minutes). This allows for the pro- pagation of the routing information across the network and prevents the formation of routing loops. split horizon When a router (or group of routers working in consort) accept routing information from mul- tiple external networks, but do not pass on information learned from one external network to any others. This is an attempt to prevent bogus routes to a network from being propagated because of gossip or counting to infinity. -23- 250 ---- A Brief History of the Internet The Bright Side: The Dark Side by Michael Hart with Max Fuller (C)1995, Released on March 8th, 1995 Chapter 00 Preface The Internet Conquers Space, Time, and Mass Production... Michael Hart called it NeoMass Production [TM] in 1971... and published the U.S. Declaration of Independence on the and no one was listening...or were they? ???careful!!!! If the governments, universities or colleges of the world wanted people to be educated, they certainly could have a copy of things like the Declaration of Independence where everyone could get an electronic copy. After all, it has been over 25 years since the Internet began as government funded projects among our universities, and only 24 years since the Declaration was posted, followed by the Bill of Rights, Constitution, the Bible, Shakespeare, etc. Why do more people get their electronic books from others than these institutions when they spend a TRILLION DOLLAR BUDGET EVERY YEAR pretending their goal is some universal form of education. This is the story of the Bright Side and Dark Side of the Internet. . .Bright Side first. The Facts: The Internet is a primitive version of the "Star Trek Communicator," the "Star Trek Transporter," and, also a primitive version of the "Star Trek Replicator." Communicator The Internet "let's" you talk to anyone on the Earth, as long as they, too, are on the Internet. Transporter The Internet "let's" you transport anything you would be able to get into your computer to any Netter. Replicator The Internet "let's" you replicate anything anyone is able to get into their computer, from "The Mona Lisa" to "The Klein Bottle" if you use the right "printer," and the library never closes, the books are always on the shelves, never checked out, lost, in for binding, and there is never an overdue fine because you never, ever, have to take them back. The Bright Side and the Dark Side For the first time in the entire history of the Earth, we have the ability for EVERYONE to get copies of EVERYTHING as long as it can be digitized and communicated to all of the people on the Earth, via computers [and the devices a person might need to make a PHYSICAL, rather than VIRTUAL copy of whatever it might be. . . Think about what you have just read for a moment, please, EVERYTHING FOR EVERYONE. . . as long as the Information Superhighway is not taken over by the INFORMATION RICH and denied access to others other than for a fee they may not be able to pay, and shouldn't have to pay. . .since the INFORMATION RICH have had rides for free for the first 25 years of the Internet.] From 1969 to 1994, most of the traffic on the Information Superhighway was generated by individuals who did not pay tolls to get on the ramps to the Information Superhighway . . .in fact, ALL of the early users were paid to get on, except one. . .they were paid. . .BY YOU! Michael Hart may have been the first person who got on as a private individual, not paid by any of the 23 nodes, or the Internet/ARPANet system, for his work; but who at the time of this publication might have given away 25 billion worth of Etexts in return for his free network access. [i.e. Mr. Hart was the first "normal" person to have this access to the Internet, a first non-computer-professional for social responsibility; "We should provide information to all persons, without delay. . .simply because WE CAN!" Just like climbing Mount Everest or going into space, and this is so much cheaper and less dangerous. [For those of you considering asking that his accesses be revoked, he has received permission from CCSO management, previously CSO as indicated in his email address, for the posting of this document and has also received permission from several other colleges and/or universities, at which he has computer accounts and/or is affiliated.] In the beginning, all the messages on the Net were either hardware or software crash messages, people looking for a helping hand in keeping their mainframes up and running-- and that was about it for the first 10-15 years of cyber- space. . .cyber-space. . .mostly just space. . .there was nothing really in it for anyone, but mainframe operators, programmers, and a few computer consultants who worked in multi-state regions because there weren't enough computer installations in any single state, not even California or Illinois, to keep a computer consultant in business. The Bright Side Mr. Hart had a vision in 1971 that the greatest purpose a computer network would ever provide would be the storage, transmission, and copying of the library of information a whole planet of human beings would generate. These ideas were remarkably ahead of their time, as attested to by an Independent Plans of Study Degree in the subject of Human Machine Interfaces from the University of Illinois, 1973. This degree, and the publications of the first few Etexts [Electronic Texts] on the Internet, began the process the Internet now knows as Project Gutenberg, which has caught fire and spread to all areas of the Internet, and spawned several generations of "Information Providers," as we now have come to call them. It is hard to log in to the Internet without finding many references to Project Gutenberg and Information Providers these days, but you might be surprised just how much of a plethora of information stored on the Internet is only on line for LIMITED DISTRIBUTION even though the information is actually in the PUBLIC DOMAIN and has been paid for in money paid by your taxes, and by grants, which supposedly are given for the betterments of the human race, not just a favored few at the very top 1% of the INFORMATION RICH. Many of you have seen the publicity announcements of such grants in the news media, and an information professional sees them all the time. You may have seen grants totalling ONE BILLION DOLLARS to create "Electronic Libraries;" what you haven't seen is a single "Electronic Book" released into the Public Domain, in any form for you to use, from any one of these. The Dark Side Why don't you see huge electronic libraries available for download from the Internet? Why are the most famous universities in the world working on electronic libraries and you can't read the books? If it costs $1,000 to create an electronic book through a government or foundation grant, then $1,000,000,000 funds for electronic libraries should easily create a 1,000,000 volume electronic library in no time at all. After all, if someone paid YOU $1,000 to type, scan or to otherwise get a public domain book onto the Internet, you could do that in no time at all, and so could one million other people, and they could probably do it in a week, if they tried really hard, maybe in a month if they only did it in their spare time. For $1,000 per book, I am sure a few people would be turning out a book a week for as long as it took to get all million books into electronic text. There has been perhaps ONE BILLION DOLLARS granted for an electronic library in a variety of places, manners, types and all other diversities; IF THE COST IS ONE THOUSAND OF THOSE DOLLARS TO CREATE A SINGLE ELECTRONIC BOOK, THEN WE SHOULD HAVE ONE MILLION BOOKS ONLINE FOR EVERYONE TO USE. HOW HAS THIS PROCESS BEEN STOPPED? Anyone who wants to stop this process for a Public Domain Library of information is probably suffering from several of the Seven Deadly Sins: Pride, covetousness, lust, anger, greed, envy, and sloth. Merriam Webster Third International Unabridged Dictionary [Above: Greed = Gluttony, and moved back one place] [Below: my simple descriptions of the Seven Deadly Sins] 1. Pride: I have one and you don't. 2. Covetousness: Mine is worth more if you don't have a copy or something similar. I want yours. I want the one you have, even if I already have one or many. 3. Lust: I have to have it. 4. Anger: I will hurt you to ensure that I have it, and and to ensure that you do not have one. 5. Envy: I hate that you have one. 6. Greed: There is no end to how much I want, or to how little I want you to have in comparison. 7. Sloth: I am opposed to you moving up the ladder: it means that I will have to move up the ladder, to keep my position of lordship over you. If I have twice as much as you do, and you gain a rung, that means I can only regain my previous lordship by moving up two; it is far easier to knock you back a rung, or to prevent you from climbing at all. Destruction is easier than construction. This becomes even more obvious for the person who has a goal of being 10 or 100 times further up the ladder of success. . .given the old, and hopefully obsolete, or soon to be obsolete, definitions of success. "If I worked like a fiend all my life to ensure I had a thousand dollars for every dollar you had, and then someone came along and wanted to give everyone $1000, then I would be forced to work like a fiend again, to get another million dollars to retain my position." Think about it: someone spends a lifetime achieving, creating, or otherwise investing their life, building a talent, an idea, or a physical manifestation of the life they have led. . .the destruction of this is far easier than the construction. . .just as the building of a house is much more difficult, requires training, discipline, knowledge of the laws of physics to get a temperature and light balance suitable for latitudes, etc., etc., etc. But nearly anyone can burn down a building, or a pile of books without a fraction of this kind of training. People are used to lording it over others by building and writing certain items that reflect their lordship over themselves, their environments, and, last/least, over other people. If they were not engaged in power over themselves [self-discipline, education, etc,] or over their environments [food, clothing and shelter], then they have only other people to have control over and that is the problem. They don't want other people to have it easier than they did. "If _I_ did it with the hard ways and tools of the past, then _YOU_ would threaten me if you use some easier ways and tools the present has to offer, and _I_ don't want to learn the new tools, since I have invested my whole life to the mastery of the old tools." I have literally met very highly placed souls in the system of higher education who have told me they will quit the system on the day they have to use email because it removes the control they used to have over physical meetings, phone calls and the paper mails. It is just too obvious if a big wig is not answering your email, since email programs can actually tell you the second it was delivered and also the second the person "opened" it. This is why SOME people fear the new Internet: other people fear it NOT because they lose the kind of lord position that comes with OWNERSHIP; rather they fear, in a similar manner, they will lose the CONTROL which they have used to achieve their position of lordship, such as one kind of professor mentioned below. *****As Hart's DOS prompt sometimes states:***** "Money is how people with no talent keep score!" "Control is how others with no money keep score!" These Seven Deadly Sins, while named by various names and by most civilizations, have nonetheless often been actual laws; in that certain people were required, by law, to be victims of the rest of their populations in that a person might be legally denied ownership of any property, due to racism or sexism, or denied the right to a contract, even legally denied the ability to read and write, not just an assortment of rights to vote, contract and own property-- there have even been laws that forbade any but the "upper crust" to wear certain types of clothing, a "statement of fashion" of a slightly different order than we see today, but with similar ends. You might want to look up laws that once divided this and other countries by making it illegal to teach any persons of certain races or genders reading, writing, arithmetic, and others of the ways human beings learn to have a power over their environments. Power over oneself is the first kind of power...if you do not control yourself, you will find difficulty in control of anything. Power over the environment is the second kind of power... if you do not control food, clothing and shelter, you are going to have a hard time controlling anything else. Power over other human being is the third kind of power-- described above in the Seven Deadly Sins, a third raters' kind of power. Those who cannot control anything else... must, by definition, have others control things for them. If they don't want to depend on the voluntary cooperation of others, then they must find some way to control them. We are now seeing the efforts by those who couldn't BUILD the Internet to control it, and the 40 million people who are on it; people from the goverment to big business, who feel "Freedom Is Slavery" or at least dangerous; and, who feel the Internet is the "NEXT COMMERCIAL FRONTIER" where customers are all ready to be inundated with advertising, more cheaply than with junkmail. Fortunately some of the other Internet pioneers have developed ways of preventing this sort of thing from happening BUT I am sure we aren't far from lawsuits by the cash rich and information rich, complaining that they can't get their junkemail into "my" emailbox. We will probably all be forced to join into an assortment of "protectives" in which we subscribe to such "killbots" as are required to let in the mail we want and keep out the junkemail. These same sorts of protectives were forming a century or so before the Internet, in a similar response to the hard monopolistic pricing policies of the railroads which went transcontinental just 100 years before this Internet did. I suggest you look up Grange in your encyclopedias, where one of them says: "The National Grange is the popular name of the Order of the Patrons of Husbandry, the oldest general farm organization in the United States. . .formed largely through the efforts of Oliver Hudson Kelley, a Minnesota farmer who was deeply affected by the poverty and isolation of the farmers he saw will inspecting farm areas in the South for the U.S. Department of Agriculture in 1866. In the 1870's the Grange was prominent in the broader Granger movement, which campaigned against extortionate charges by monopolistic railroads and warehouses and helped bring about laws regulating these charges. . . . Although challenged, the constitutionality of such laws was upheld by the U.S. Supreme Court in Munn v. Illinois (1877). [1994 Grolier Electronic Enyclcopedia] *** The Internet Conquers Space, Time and Mass Production The Internet is a primitive version of the "Star Trek Communicator," the "Star Trek Transporter," and, also a primitive version of the "Star Trek Replicator." The Internet "let's" you talk to anyone on the Earth, as long as they, too, are on the Internet. The Internet "let's" you transport anything you would be able to get into your computer to any Netter. The Internet "let's" you replicate anything anyone is able to get into their computer, from "The Mona Lisa" to "The Klein Bottle" if you use the right "printer." Don't forget the "SneakerNet" is part of the Internet and let's you get information to or from those who do not have direct Internet connections. SneakerNet was a term developed to describe the concept of sending a file to someone nearby the person you wanted, and the person would then put on his/her sneakers and run the disk down the street for you. From my experience, it was incredibly obvious that SneakerNet traversed from East to West and West to East around the world before the Internet did, as I received letters from the East and West as the Project Gutenberg Alice in Wonderland Etext circled the globe long before the Internet did. This is very important to know if you consider that a possible future development might keep you from using the Internet for this, due to socio-political motions to turn the Internet into a "World Wide Mall" [WWM] a term coined specifically to describe that moneymaking philosophy that says "Even if it has been given away, free of charge, to 90% of the users for 25 years, our goal is to make sure we change it from an Information Superhighway to an Information Supertollway. I said "let's" you do the Star Trek Communicator, and Transporter, and Replicator functions because it will soon be obvious that those "Information Rich" who had free access to the Internet for so long want to do an Internet Monopoly thing to ensure that what was free, to the Information Rich, will no longer be free for a class of the Information Poor. This is serious business, and if you consider that it would cost the 40 million Netters about $25 per month to "subscribe" to the Information Rich version of the Internet, that means one thousand million dollars per month going into the hands of the Information Rich at the expense of the Information Poor; we would shortly be up to our virtual ears in a monopoly that would be on the order of the one recently broken up in a major anti-trust and anti-monopoly actions against the hand of the telephone company. Hopefully, if we see it coming we can prevent it now, but it will take far more power than _I_ have. People will tell you "No one can own the Internet!"-- but the fact is that while you may own your computer, you do not "Own the Internet" any more than owning my own telephones or PBX exchanges means I own telephone networks that belong to The Telephone Companies. The corporations that own the physical wires and cabling, they are the ones who own the Internet, and right now that system is being sold to The Telephone Companies, and your "rights" to the Information Superhighway are being sold with them. The goal of giving 10,000 books to everyone on Earth, which we at Project Gutenberg have been trying to do, virtually since the start of the Internet, is in huge danger of becoming just another tool for those we are becoming enslaved by on the Internet, and these books might never get into the high schools: much less the middle schools and grade schools because the Trillion dollars we spend on educations with the rise and fall of every Congress of the United States isn't meant to educate, it is meant for something else. After all-- if a Trillion dollars were really being spent on this process of education every two years, should literacy rates have plummeted to 53% and college level testing scores fallen for many straight years? [Oh yes, I heard yesterday's report the tests were up for the first time in decades. . .but what I did NOT! hear was ANY reference to the fact that the score was "inflated" not only by the "normal" free 200 points a person gets for just being able to sign their names-- but by an additional 22 points for math, 76 verbal.] [Written February 5th, 1995] This kind of "grade inflation" has been going on in a similar, though less official manner, in our schools, for decades. There are schools in which the averages indicate more "A"s are given out than all other grade points combined, not just more "A"s than "B"s or "B"s than "C"s. Some of the most importanted studies were never published, even though they were tax funded. Watch out, the term "grade inflation" is "politically incorrect" to such a degree that it does not appear a single time in any of the encyclopedias I have tried, although it does appear in my Random House Unabridged and College Dictionaries, but not the Merriam-Webster Ninth New College Dictionary, American Heritage or in any other references I have searched. Please tell me if you find it in any. "The awarding of higher grades than students deserve either to maintain a school's academic reputation or as a result of diminished teacher expectations." [1980-1985] I can personally tell you this was a huge concern in 1970-1975 when the average grade at some colleges in question had already passed the point mentioned just above, yielding averages including all undergraduate courses, including the grades of "flunk-outs," still higher than a "B" which means more "A"s were given a whole undergraduate student body than "B"s and "C"s. [Actually it means worse than that, but point made.] So, we reached the point at which large numbers of a nation's high school graduates couldn't even read or fill out a minimum wage job application form, while, on paper, we were doing better than ever, excepting, thank God, the fact that testing scores showed there was something incredibly wrong, and businesses would notice they were having to interview more people for a job before they could find someone to fill it. This is what happens when we separate a country into the "Information Rich" and the "Information Poor." Don't let it happen to the entire world. For the first time in ALL history, we have the chance to ensure that every person can put huge amounts of "Public Domain" and other information into computers that should be as inexpensive as calculators in a few more years. I would like to ensure these people actually have material to put in those computers when they get them. Example: Some Shakespeare professors believe that the way to be a great Shakespeare professor is to know something about a Shakespeare play or poem that no one else knows. Therefore they never tell anyone, and that knowledge can quite possibly die with them if it is never published in a wide manner. Example: Damascus steel was famous, for hundreds of years, but the knowledge of how to make this steel was so narrowly known that all those who knew that technique died without passing it on, and it was a truly long time before computer simulations finally managed to recreate Damascus steel after all those centuries when a person had to buy an antique to get any. Some other Shakespeare professors believe that the way a person should act to be a great Shakespeare professor is to teach as many people as possible about Shakespeare in as complete a manner as they want to learn. The Internet is balancing on this same dichotomy now.... Do we want Unlimited Distribution... Or do we want to continue with Limited Distribution? The French have just given us one of the great examples: a month or so ago [I am writing this in early February.] they found a cave containing the oldest known paintings, twice as old as any previously discovered, and after the initial month of photographing them in secret, placed an electronic set of photographs on the Internet for all of us to have. . .ALL! This is in GREAT contradistinction to the way things had been done around the time I was born, when the "Dead Sea Scrolls" were discovered, and none of you ever saw them, or any real description of them, until a few years ago-- in case you are wondering when, I was born in 1947; this is being published on my 48th birthday when I officially become "old." [As a mathematician, I don't cheat, and I admit that if you divide a 72 year lifespan into equals, you only get 24 years to be young, 24 years to be middle aged, and 24 years to be old. . .after that you have the odds beaten. If you divide the US into young and old, a person has to be considered "old" at 34, since 33 is the median age [meaning half the people are younger than 33, and half the people are older. The median Internet age? 26. Median Web age 31. Some predictions indicate these will decrease until the median Internet age is 15. Who will rule the Internet? Will it be the Internet Aristocrats... or an Internet Everyman? The difference is whether the teacher or scholar lording it over others is our example, or the teacher or scholar who teaches as well and as many as possible. We SAY our people should have and must have universal education yet with test scores and literacy rates in a tailspin it can obvious that we have anything BUT a widest universalness of primary and secondary education program in mind. Not to leave out college education, which has been known for the graduation of people who were totally illiterate. For the first time we actually have an opportunity for a whole world's population to share not only air or water, but also to share the world of ideas, of art or of music and other sounds. . .anything that can be digitized. Do you remember what the first protohumans did in "2001" [the movie by Stanley Kubrick and Arthur C. Clark] ? They chased their neighbors away from the water hole. Will let the Thought Police chase us away from this huge watering hole, just so they can charge us admission, for something our tax dollars have already paid for? The Internet Conquers Space, Time and Mass Production... Think of the time and effort people save simply by being able to consult a dictionary, an encyclopedia, thesaurus or other reference book, a newspaper or magazine library of vast proportions, or a library of a thousand books of the greatest works of all history without even having to get up and go to the bookcase. Think of the simple increase in education just because a person can and will look up more information, judgements become sharper and more informed.... Unless someone believes that good judgement, an informed population, and their effects are their enemies, it is a difficult stretch to understand why certain institutions and people want to limit this flow of information. Yet a great number of our institutions, and even some of the people who run them, are against this kind of easily available information...they either want to control it-- or they want to maintain their "leadership" in fields of endeavor by making sure we "have to do it the hard way," simply because they did it the hard way. There is no longer any reason to "do it the hard way" as you will see below, and on the Internet. End of the Preface to "A Brief History of the Internet." Chapter 0 Introduction Michael Hart is trying to change Human Nature. He says Human Nature is all that is stopping the Internet from saving the world. The Internet, he says, is a primitive combination of Star Trek communicators, transporters and replicators; and can and will bring nearly everything to nearly everyone. "I type in Shakespeare and everyone, everywhere, and from now until the end of history as we know it--everyone will have a copy instantaneously, on request. Not only books, but the pictures, paintings, music. . .anything that will be digitized. . .which will eventually include it all. A few years ago I wrote some articles about 3-D replication [Stereographic Lithography] in which I told of processes, in use today, that videotaped and played back fastforward on a VCR, look just like something appearing in Star Trek replicators. Last month I saw an article about a stove a person could program from anyhere on the Internet. . .you could literally `fax someone a pizza' or other meals, the `faxing a pizza' being a standard joke among Internetters for years, describing one way to tell when the future can be said to have arrived." For a billion or so people who own or borrow computers it might be said "The Future Is Now" because they can get at 250 Project Gutenberg Electronic Library items, including Shakespeare, Beethoven, and Neil Armstrong landing on the Moon in the same year the Internet was born. This is item #250, and we hope it will save the Internet, and the world. . .and not be a futile, quixotic effort. Let's face it, a country with an Adult Illiteracy Rate of 47% is not nearly as likely to develop a cure for AIDS as a country with an Adult Literacy Rate of 99%. However, Michael Hart says the Internet has changed a lot in the last year, and not in the direction that will take the Project Gutenberg Etexts into the homes of the 47% of the adult population of the United States that is said to be functionally illiterate by the 1994 US Report on Adult Literacy. He has been trying to ensure that there is not going to be an "Information Rich" and "Information Poor," as a result of a Feudal Dark Ages approach to this coming "Age of Information". . .he has been trying since 1971, a virtual "First Citizen" of the Internet since he might be the first person on the Internet who was NOT paid to work on the Internet/ARPANet or its member computers. Flashback In either case, he was probably one of the first 100 on a fledgling Net and certainly the first to post information of a general nature for others on the Net to download; it was the United States' Declaration of Independence. This was followed by the U.S. Bill of Rights, and then a whole Etext of the U.S. Constitution, etc. You might consider, just for the ten minutes the first two might require, the reading of the first two of these documents that were put on the Internet starting 24 years ago: and maybe reading the beginning of the third. The people who provided his Internet account thought this whole concept was nuts, but the files didn't take a whole lot of space, and the 200th Anniversary of the Revolution [of the United States against England] was coming up, and parchment replicas of all the Revolution's Documents were found nearly everywhere at the time. The idea of putting the Complete Works of Shakespeare, the Bible, the Q'uran, and more on the Net was still pure Science Fiction to any but Mr. Hart at the time. For the first 17 years of this project, the only responses received were of the order of "You want to put Shakespeare on a computer!? You must be NUTS!" and that's where it stayed until the "Great Growth Spurt" hit the Internet in 1987-88. All of a sudden, the Internet hit "Critical Mass" and there were enough people to start a conversation on nearly any subject, including, of all things, electronic books, and, for the first time, Project Gutenberg received a message saying the Etext for everyone concept was a good idea. That watershed event caused a ripple effect. With others finally interested in Etext, a "Mass Marketing Approach," and such it was, was finally appropriate, and the release of Alice in Wonderland and Peter Pan signalled beginnings of a widespread production and consumption of Etexts. In Appendix A you will find a listing of these 250, in order of their release. Volunteers began popping up, right on schedule, to assist in the creation or distribution of what Project Gutenberg hoped would be 10,000 items by the end of 2001, only just 30 years after the first Etext was posted on the Net. Flash Forward Today there are about 500 volunteers at Project Gutenberg and they are spread all over the globe, from people doing their favorite book then never being heard from again, to PhD's, department heads, vice-presidents, and lawyers who do reams of copyright research, and some who have done in excess of 20 Etexts pretty much by themselves; appreciate is too small a word for how Michael feel about these, and tears would be the only appropriate gesture. There are approximately 400 million computers today, with the traditional 1% of them being on the Internet, and the traditional ratio of about 10 users per Internet node has continued, too, as there are about 40 million people on a vast series of Internet gateways. Ratios like these have been a virtual constant through Internet development. If there is only an average of 2.5 people on each of 400M computers, that is a billion people, just in 1995. There will probably be a billion computers in the world by 2001 when Project Gutenberg hopes to have 10,000 items online. If only 10% of those computers contain the average Etexts from Project Gutenberg that will mean Project Gutenberg's goal of giving away one trillion Etexts will be completed at that time, not counting that more than one person will be able to use any of these copies. If the average would still be 2.5 people per computer, then only 4% of all the computers would be required to have reached one trillion. [10,000 Etexts to 100,000,000 people equals one trillion] Hart's dream as adequately expressed by "Grolier's" CDROM Electronic Encyclopedia has been his signature block with permission, for years, but this idea is now threatened by those who feel threatened by Unlimited Distribution: ===================================================== | The trend of library policy is clearly toward | the ideal of making all information available | without delay to all people. | |The Software Toolworks Illustrated Encyclopedia (TM) |(c) 1990, 1991 Grolier Electronic Publishing, Inc. ============================================= Michael S. Hart, Professor of Electronic Text Executive Director of Project Gutenberg Etext Illinois Benedictine College, Lisle, IL 60532 No official connection to U of Illinois--UIUC hart@uiucvmd.bitnet and hart@vmd.cso.uiuc.edu Internet User Number 100 [approximately] [TM] Break Down the Bars of Ignorance & Illiteracy On the Carnegie Libraries' 100th Anniversary! Human Nature such as it is, has presented a great deal of resistance to the free distribution of anything, even air and water, over the millennia. Hart hopes the Third Millennium A.D. can be different. But it will require an evolution in human nature and even perhaps a revolution in human nature. So far, the history of humankind has been a history of an ideal of monopoly: one tribe gets the lever, or a wheel, or copper, iron or steel, and uses it to command, control or otherwise lord it over another tribe. When there is a big surplus, trade routes begin to open up, civilizations begin to expand, and good times are had by all. When the huge surplus is NOT present, the first three estates lord it over the rest in virtually the same manner as historic figures have done through the ages: "I have got this and you don't." [Nyah nyah naa naa naa!] *** *** Now that ownership of the basic library of human thoughts is potentially available to every human being on Earth--I have been watching the various attempts to keep this from actually being available to everyone on the planet: this is what I have seen: 1. Ridicule Those who would prefer to think their worlds would be destroyed by infinite availability of books such as: Alice in Wonderland, Peter Pan, Aesop's Fables or the Complete Works of Shakespeare, Milton or others, have ridiculed the efforts of those who would give them to all free of charge by arguing about whether it should be: "To be or not to be" or "To be [,] or not to be" or "To be [;] or not to be"/"To be [:] or not to be" or whatever; and that whatever their choices are, for this earthshaking matter, that no other choice should be possible to anyone else. My choice of editions is final because _I_ have a scholarly opinion. 1A. My response has been to refuse to discuss: "How many angels can dance on the head of a pin," [or many other matters of similar importance]. I know this was once considered of utmost importance, BUT IN A COUNTRY WHERE HALF THE ADULTS COULD NOT EVEN READ SHAKESPEARE IF IT WERE GIVEN TO THEM, I feel the general literacy and literary requirements overtake a decision such as theirs. If they honestly wanted the best version of Shakespeare [in their estimations] to be the default version on the Internet, they wouldn't have refused to create just such an edition, wouldn't have shot down my suggested plan to help them make it . . .for so many years. . .nor, when they finally did agree, they wouldn't have let an offer from a largest wannabee Etext provider to provide them with discount prices, and undermine their resolve to create a super quality public domain edition of Shakespeare. It was an incredible commentary on the educational system in that the Shakespeare edition we finally did use for a standard Internet Etext was donated by a commercial-- yes--commercial vendor, who sells it for a living. In fact, I must state for the record, that education, as an institution, has had very little to do with the creation and distribution of Public Domain Etexts for the public, and that contributions by the commercial, capitalistic corporations has been the primary force, by a large margin, that funds Project Gutenberg. The 500 volunteers we have come exclusively from smaller, less renowned institutions of education, without any, not one that I can think of, from any of the major or near major educational institutions of the world. It would appear that those Seven Deadly Sins listed a few paragraphs previously have gone a long way to the proof of the saying that "Power corrupts and absolute power corrupts absolutely." Power certainly accrues to those who covet it and the proof of the pudding is that all of the powerful club we have approached have refused to assist in the very new concept of truly Universal Education. Members of those top educational institutions managed to subscribe to our free newsletter often enough, but not one of them ever volunteered to do a book or even to donate a dollar for what they have received: even send in lists of errors they say they have noticed. Not one. [There is a word for the act of complaining about something without [literally] lifting a finger] The entire body of freely available Etexts has been a product of the "little people." 2. Cost Inflation When Etexts were first coming it, estimates were sent around the Internet that it took $10,000 to create an Etexts, and that therefore it would take $100,000,000 to create the proposed Project Gutenberg Library. $500,000,000 was supposedly donated to create Etexts, by one famous foundation, duly reported by the media, but these Etexts have not found their way into hands, or minds, of the public, nor will they very soon I am afraid, though I would love to be put out of business [so to say] by the act of these institutions' release of the thousands of Etexts some of them already have, and that others have been talking about for years. My response was, has been, and will be, simply to get the Etexts out there, on time, and with no budget. A simple proof that the problem does not exist. If the team of Project Gutenberg volunteers can produce this number of Etexts and provide it to the entire world's computerized population, then the zillions of dollars you hear being donated to the creations of electronic libraries by various government and private donations should be used to keep the Information Superhighway a free and productive place for all, not just for those 1% of computers that have already found a home there. 3. Graphics and Markup versus Plain Vanilla ASCII The one thing you will see in common with ALL of such graphics and markup proposals is LIMITED DISTRIBUTION as a way of life. The purpose of each one of these is and always has been to keep knowledge in the hands of the few and away from the minds of the many. I predict that in the not-too-distant-future that all materials will either be circulating on the Internet, or that they will be jealously guarded by owners whom I described with the Seven Deadly Sins. If there is ever such a thing as the "Tri-corder," of Star Trek fame, I am sure there simultaneously has to be developed a "safe" in which those who don't want a whole population to have what they have will "lock" a valuable object to ensure its uniqueness; the concept of which I am speaking is illustrated by this story: "A butler announces a delivery, by very distinguished members of a very famous auction house. The master-- for he IS master--beckons him to his study desk where the butler deposits his silver tray, containing a big triangular stamp, then turns to go. What some of these projects with tens of millions for their "Electronic Libraries" are doing to ensure this is for THEM and not for everyone is to prepare Etexts in a manner in which no normal person would either be willing or able to read them. Shakespeare's Hamlet is a tiny file in PVASCII, small enough for half a dozen copies to fit [uncompressed!] on a $.23 floppy disk that fits in your pocket. But, if it is preserved as a PICTURE of each page, then it will take so much space that it would be difficult to carry around even a single copy in that pocket unless it were on a floppy sized optical disk, and even then I don't think it would fit. Another way to ensure no normal person would read it, to mark it up so blatantly that the human eyes should have difficulty in scansion, stuttering around pages, rather than sliding easily over them; the information contained in this "markup" is deemed crucial by those esoteric scholars who think it is of vital importance that a coffee cup stain appears at the lower right of a certain page, and that "Act I" be followed by [] to ensure everyone knows this is actually where this is where an act or scene or whatever starts. You probably would not believe how much money has had the honor of being spent on these kinds of projects a normal person is intentionlly deprived of through the mixture is just plain HIDING the files, to making the files so BIG you can't download them, to making them so WEIRD you wouldn't read them if you got them. The concept of requiring all documents to be formatted in a certain manner such that only a certain program can read them has been proposed more often then you might ever want to imagine, for the TWIN PURPOSES OF PROFIT AND LIMITED DISTRIBUTION in a medium which requires a virtue of UNLIMITED DISTRIBUTION to keep it growing. Every day I read articles, proposals, proceedings for various conferences that promote LIMITED DISTRIBUTION on the Nets. . .simply to raise the prestige or money to keep some small oligarchy in power. This is truly a time of POWER TO THE PEOPLE as people say in the United States. What we have here is a conflict between the concepts that everything SHOULD be in LIMITED DISTRIBUTION, and that of the opposing concept of UNLIMITED DISTRIBUTION. If you look over the table of contents on the next pages, you will see that each of these item stresses the greater and greater differences between an history which has been dedicated to the preservation of Limited Distribution and something so new it has no history longer than 25 years-- *** Contents Chapter 00 Preface Chapter 0 Introduction Saving Time and Effort The New Scholarship Chapter 1 General Comments Plain Vanilla ASCII Versus Proprietary Markups Chapter 2 Copyright Chapter 3 Luddites Chapter 4 Internet As Chandelier [The Famous Chandelier Diatribe of 1990] Chapter 5 The Rush To The Top Chapter 6 Those Who Would Be King Gopher, WWW, Mosaic, Netscape Chapter 7 Listowners vs List Moderators Those Who Would Be King, Part I Chapter 8 Lurkers Those Who Would Be King, Part II Chapter 9 "Lurking Is Good. . .Remember. . .Lurking Is Good" Those Who Would Be King, Part III The Netiquetters Chapter 10 TPC, The Phone Company Those Who Would Be King, Part IV ****** Chapter 1 Plain Vanilla ASCII Versus Proprietary Markups Chapter 2 Copyright Chapter 3 Luddites Chapter 4 Internet As Chandelier [The Infamous Chandelier Diatribe of 1990] [chandel2/wp] -------------------ORIGINAL MESSAGE-------------------------- Hart undoubtedly saw academia as a series of dark brown dream shapes, disorganized, nightmarish, each with its set of rules for nearly everything: style of writing, footnoting, limited subject matter, and each with little reference to each other. -------------------------REPLY---------------------------------- What he wanted to see was knowledge in the form of a chandelier, with each subject area powered by the full intensity of the flow of information, and each sending sparks of light to other areas, which would then incorporate and reflect them to others, a never ending flexion and reflection, an illumination of the mind, soul and heart of Wo/Mankind as could not be rivalled by a diamond of the brightest and purest clarity. Instead, he saw petty feudal tyrants, living in dark poorly lit, poorly heated, well defended castles: living on a limited diet, a diet of old food, stored away for long periods of time, salted or pickled or rotted or fermented. Light from the outside isn't allowed in, for with it could come the spears and arrows of life and the purpose of the castle was to keep the noble life in, and all other forms of life out. Thus the nobility would continue a program of inbreeding which would inevitably be outclassed by an entirely random reflexion of the world's gene pool. A chandelier sends light in every direction, light of all colors and intensities. No matter where you stand, there are sparkles, some of which are aimed at you, and you alone, some of which are also seen by others: yet, there is no spot of darkness, neither are there spots of overwhelming intensity, as one might expect a sparkling source of lights to give off. Instead, the area is an evenly lit paradise, with direct and indirect light for all, and at least a few sparkles for everyone, some of which arrive, pass and stand still as we watch. But the system is designed to eliminate sparkles, reflections or any but the most general lighting. Scholars are encouraged to a style and location of writing which guarantee that 99 and 44 one hundredths of the people who read their work will be colleagues, already a part of that inbred nobility of their fields. We are already aware that most of our great innovations are made from leaps from field to field, that the great thinkers apply an item here in this field which was gleaned from that field: thus are created the leaps which create new fields which widen fields of human endeavor in general. Yet, our petty nobles, cased away in their casements, encased in their tradition, always reject the founding of these new fields, fearing their own fields can only be dimmed by comparison. This is true, but only by their own self-design. If their field were open to light from the outside, then the new field would be part of their field, but by walling up the space around themselves, a once new and shining group of enterprising revolutionaries could only condemn themselves to awaiting the ravages of time, tarnish and ignorance as they become ignorant of the outside world while the outside world becomes ignorant of them. So, I plead with you, for your sake, my sake, for everyone's, to open windows in your mind, in your field, in your writing and in your thinking; to let illumination both in and out, to come from underneath and from behind the bastions of your defenses, and to embrace the light and the air, to see and to breathe, to be seen and to be breathed by the rest of Wo/Mankind. Let your light reflect and be reflected by the other jewels in a crown of achievement more radiant than anything we have ever had the chance to see or to be before. Join the world! [chandel2.txt] A Re-Visitation to the Chandelier by Michael S. Hart Every so often I get a note from a scholar with questions and comments about the Project Gutenberg Edition of this or that. Most of the time this appears to be either idle speculation-- since there is never any further feedback about passages this or that edition does better in the eye of particular scholars or the feedback is of the "holier than thou" variety in which the scholar claims to have found errors in our edition, which the scholar then refuses to enumerate. As for the first, there can certainly be little interest in a note that appears, even after follow-up queries, of that idle brand of inquiry. As to the second, we are always glad to receive a correction, that is one of the great powers of etext, that corrections be made easily and quickly when compared to paper editions, with the corrections being made available to those who already had the previous editions, at no extra charge. However, when someone is an expert scholar in a field they do have a certain responsibility to have their inquiries be some reasonable variety, with a reasonable input, in order to have a reasonable output. To complain that there is a problem w/o pointing out the problem has a rich and powerful vocabulary I do not feel is appropriate for this occasion. We have put an entirely out-of-proportion cash reward on these errors at one time or another and still have not received any indications a scholar has actually ever found them, which would not be more difficult than finding errors in any other etexts, especially ones not claiming an beginning accuracy of only 99.9%. However, if these corrections WERE forthcoming, then the 99.9 would soon approach 99.95, which is the reference error level referred to several times in the Library of Congress Workshop on Electronic Text Proceedings. On the other hand, just as the Project Gutenberg's efficiency would drop dramatically if we insisted our first edition of a book were over 99.5% accurate, so too, should efficiency drop dramatically if we were ever to involve ourselves in any type of discussion resembling "How many angels can dance on a pin- head." The fact is, that our editions are NOT targeted to an audience specifically interested in whether Shakespeare would have said: "To be or not to be" "To be, or not to be" "To be; or not to be" "To be: or not to be" "To be--or not to be" This kind of conversation is and should be limited to the few dozen to few hundred scholars who are properly interested. A book designed for access by hundreds of millions cannot spend that amount of time on an issue that is of minimal relevance, at least minimal to 99.9% of the potential readers. However, we DO intend to distribute a wide variety of Shakespeare, and the contributions of such scholars would be much appreciated, were it ever given, just as we have released several editions of the Bible, Paradise Lost and even Aesop's Fables. In the end, when we have 30 different editions of Shakespeare on line simulateously, this will probably not even be worthy, as it hardly is today, of a footnote. . .I only answer out of respect for the process of creating these editions as soon as possible, to improve the literacy and education of the masses as soon as possible. For those who would prefer to see that literacy and education continue to wallow in the mire, I can only say that a silence on your part creates its just reward. Your expertise dies an awful death when it is smothered by hiding your light under a bushel, as someone whom is celebrated today once said: Matthew 5:15 Neither do men light a candle, and put it under a bushel, but on a candlestick; and it giveth light unto all that are in the house. Mark 4:21 And he said unto them, Is a candle brought to be put under a bushel, or under a bed? and not to be set on a candlestick? Luke 8:16 No man, when he hath lighted a candle, covereth it with a vessel, or putteth it under a bed; but setteth it on a candlestick, that they which enter in may see the light. Luke 11:33 No man, when he hath lighted a candle, putteth it in a secret place, neither under a bushel, but on a candlestick, that they which come in may see the light. Chapter 5 The Rush To The Top Chapter 6 Those Who Would Be King Gopher, WWW, Mosaic, Netscape This chapter discusses why URLs aren't U, Why Universal Resource Locators Are Not Universal When I first tried the experimental Gopher sites, I asked the inventors of Gopher if their system could be oriented to also support FTP, should a person be more inclined for going after something one already had researched: rather than the "browsing" that was being done so often on those Gopher servers. The answer was technically "yes," but realistically "no," in that while Gophers COULD be configured such that every file would be accessible by BOTH Gopher and FTP, the real intent of Gopher was to bypass FTP and eventually replace it as the primary method of surfing the Internet. I tried to explain to them that "surfing" the Internet is much more time consuming as well as wasteful of bandwidth [this at a time when all bandwidth was still free, and we were only trying to make things run faster, as opposed to actually saving money. Chapter 7 Listowners vs List Moderators Those Who Would Be King, Part I Chapter 8 Lurkers Those Who Would Be King, Part II Chapter 9 "Lurking Is Good. . .Remember. . .Lurking Is Good" Those Who Would Be King, Part III The Netiquetters "We Are Surrounded By An Insurmountable Opportunity." "It Is Like Drinking From A Firehose." "Be Sure To Have YOUR Messages `Netiquette Approved.'" These sentiments reflect a portion of the Internet who have terrified thoughts and feelings about a wonderful set of opportunties made available by the Internet and other networks. They are afraid of too much opportunity and would like to make sure no one else takes advantage of such great opportunities because it will make themselves look and feel very small by comparison. They want to make sure YOU don't cross the boundaries, simply because THEY ARE AFRAID to cross them. Their thinking is sociological rather than logical, as follows: 1: They are obviously afraid of so much opportunity. 2: They want to reduce the pressure of so much highly available opportunity. 3. This is because they are afraid someone else would make good use of this opportunity and leave them a footnote in their own fields as opportunity shifts into hyper-drive and nothing will ever be quite as sedate, staid, prim, proper, stiff and reserved as it was previous in a paper dominated room, full of stuffed shirts and Robert's Rules Of Order: which THEY used to keep YOU from upsetting Apple and IBM carts with more horsepower than THEY were willing, and able, to use. History is full of examples of those in position of an older variety of power using their power to deny, defy and otherwise stultify anything new, and therefore out of their own immediate forms of control. It is also full of examples of the "Powers-That-Be" so vaingloriously squashing any potential rival powers in much the same manner as a queen bee stings other queen bees to death before they are even born. In such a manner are the ideas of the new refused in a world dominated by the old. Of course what comes to mind is Napoleon III's "Salon- des-Refuses" in which works of the [now!] greatest and most famous painters in the world finally had a day to have their works shown to the public after years of an autocratic denial by the Academic Francaise's official Salon, originally begun in the Louvre, and where great examples of these works hang today, in defiance of the greatest "powers-that-be" that ever were, who failed-- as all such attempts should fail. "The Academie Francaise (French Academy) is the most renouned and oldest of the five learned socities that make up the Insititue de France, established by Cardinal Richelieu. [Grolier's 1994 Electronic Encyclopedia] The encyclopedia goes on to state that "`unification, and purification'" were among the prime "`development'" goals. The most famous recounting of Cardinal Richelieu's attempts to take over France and to remold it in a reflection of his own conservative power structure are detailed in Alexandre Dumas' Three Musketeers. Please...take time to "Read More About It." The encyclopedia article continues on to describe the intense conservatism these Institutes maintain even a few centuries later even though at least this "oldest and most powerful" of them, "the Salon gradually lost its position as the sole official exibition of French painting," sculpture, etc., which also stood against the Eiffel Tower, as well as everything else new. JUST SAY NO When they come to YOUR electronic door, enlisting YOUR support for their views of how to run the Internet you can "just say no" and feel no obligation to make THEIR rules of order be YOUR rules of order: 1. Don't bother with their requests for "conservation of bandwidth" because their idea of bandwidth is a sociological "inversion, diversion and perversion" of the term "bandwidth." They would have you believe that a dozen short message files sent through THEIR listservers are a "bandwidth- preserver" rather than one message containing what you had to say all at once. A. This is just so much sociological barnyard matter. They just want to keep you from having your say in an uninterrupted manner. . .it is ONLY this manner in which anyone CAN BE INTERRUPTED on the Internet and it requires YOU TO INTERRUPT YOURSELF, because THEY CAN'T DO INTERRUPT YOU THEMSELVES: THEY HAVE TO TALK YOU INTO THE CUTTING YOUR OWN THROAT. B. The logical rather than sociological truth is that short messages are 50% made up of header materials that are not part of the message you are sending-- but rather header and packet identifiers for these messages. Thus your series of a dozen messages of the short variety is going to be 50% wasteful of a bandwidth it uses, in comparison to sending the 12 thoughts you might want to express as one, single, uninterrupted message. *** Insert header here Here is an example of the kind of header attached to a normal Internet message. Some VERY wasteful emailers, Netiquetters included, have much longer headers due to their refusal to take the time to delete the addresses when they send the same message to hundreds of people. I have received messages in which the header literally contained hundreds of extra lines beyond this. **Header Starts Below** [Margins were shortened. This header contains 1054 characters, which would take 3 512 byte packets, each packet of which has to have its own header normal users never see. A mailer can be set not to show most of the header, but it is all there, and taking up bandwidth.] Received: from UBVM.cc.buffalo.edu (ubvm.cc.buffalo.edu [128.205.2.1]) by mtshasta.snowcrest.net (8.6.5/8.6.5) with SMTP id FAA24025; Thu, 2 Feb 1995 05:53:11 -0800 Message-Id: <199502021353.FAA24025@ mtshasta.snowcrest.net> Received: from UBVM.CC.BUFFALO.EDU by UBVM.cc.buffalo.edu (IBM VM SMTP V2R2) with BSMTP id 0354; Thu, 02 Feb 95 08:43:10 EST Received: from UICBIT.UIC.EDU (NJE origin VMMAIL@PPLCATS) by UBVM.CC.BUFFALO.EDU (LMail V1.2a/1.8a) with BSMTP id 3521; Wed, 1 Feb 1995 19:45:18 -0500 Received: from UICBIT.BITNET (NJE origin LISTSERV@UICBIT) by UICBIT.UIC.EDU (LMail V1.2a/1.8a) with BSMTP id 5650; Wed, 1 Feb 1995 18:44:26 -0600 Date: Wed, 1 Feb 1995 18:22:10 CST Reply-To: Project Gutenberg Email List Sender: Project Gutenberg Email List From: "Michael S. Hart" Subject: March Gutenberg Etexts To: Multiple recipients of list GUTNBERG **Header Ends Here** Another Demonstration of Socio-Logical Argumentation I have a signature block that contains the usual in a name, position, and disclaimer along with information of how long you should wait for a reply to a message, who to contact for further information and it has one line about how long I have been on the Internet. It takes up about this much space: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx which is about 318 characters and receives complaints from those who accept signature blocks that look like: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx x x x x x x x Your Message Here x x x x x x x xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx which takes over 718 characters because all the blank spaces are real spaces. I have pointed out this discrepancy in logic, but the people readily reply the space they are talking about is in the human mind, and not in the computers. To which _I_ reply "Barnyard Material!" THESE PEOPLE ARE NOT OUT TO SAVE "BUZZWORD BANDWIDTH". . . THEY ARE OUT TO CONTROL YOU. . .DON'T LET THEM. "Netiquette" is something THEY have invented TO CONTROL YOU! All you have to do is remind them that each individual has a most powerful protection against anything they don't want to see. . .THE DELETE KEY! You will probably also have to remind them, sometimes in the manner of using a different platform to speak from, if their response is not to post your messages, that: "SINCE EVERYONE HAS THEIR OWN DELETE KEY, THERE IS NO NEED TO DELETE THIS FOR THEM! Chapter 10 TPC, The Phone Company Those Who Would Be King, Part IV My apologies for using the United States as an example so many times, but...most of my experience has been in the US. Asychnronous Availability of Information One of the major advantages of electronic information is that you don't have to schedule yourself to match others in their schedules. This is very important. Just this very week I have been waiting for a power supply for one of my computers, just because the schedule of the person who has it was not in sync with the schedule of the person picking it up. The waste has been enormous, and trips all the way across an entire town are wasted, while the computer lies unused. The same things happens with libraries and stores of all kinds around the world. How many times have you tried a phone call, a meeting, a purchase, a repair, a return or a variety of other things, and ended up not making these connections? No longer, with things that are available electronically over the Nets. You don't have to wait until the door of the library swings open to get that book you want for an urgent piece of research; you don't have to wait until a person is available to send them an instant message; you don't have to wait for the evening news on tv.... This is called Asyncronous Communication...meaning those schedules don't have to match exactly any more to have a meaningful and quick conversation. A minute here, there or wherever can be saved instead of wasted and the whole communication still travels at near instantaneous speed, without the cost of ten telegrams, ten phone calls, etc. You can be watching television and jump up and put a few minutes into sending, or answering, your email and would not miss anything but the commercials. "Commercials" bring to mind another form of asynchronous communication...taping a tv or radio show and watching a show in 40 minutes instead of an hour because you do not have to sit through 1 minute of "not-show" per 2 minutes of show. No only to you not have to be home on Thursday night to watch your favorite TV show any more, but those pesky commercials can be edited out, allowing you to see three shows in the time it used to take to watch two. This kind of efficiency can have a huge effect on you or your children. . .unless you WANT them to see 40 ads per hour on television, or spend hours copying notes from an assortment of library books carried miles from, and back to, the libraries. Gone are the piles of 3x5 cards past students and scholars have heaped before time in efforts to organize mid-term papers for 9, 12, 16 or 20 years of institutionalized education. Whole rainforests of trees can be saved, not to mention the billions of hours of an entire population's educated scribbling that should have been spent between the ears instead of between paper and hand, cramping the thought and style of generations upon generations of those of us without photographic memories to take the place of the written word. Now we all can have photographic memories, we can quote, with total accuracy, millions of 3x5 cards worth of huge encyclopedias of information, all without getting up for any reason other than eating, drinking and stretching. Research in this area indicates that 90% of the time the previous generations spent for research papers was spent traipsing through the halls, stairways and bookstacks of libraries; searching through 10 to 100 books for each of the ones selected for further research; and searching on 10-100 pages for each quote worthy of making it into the sacred piles of 3x5 cards; then searching the card piles for those fit for the even more sacred sheets of paper a first draft was written on. Even counting the fanatical dedication of those who go through several drafts before a presentation draft is finally achieved the researchers agree that 90% of this kind of work is spent in "hunting and gathering" the information and only 10% of this time is spent "digesting" the information. If you understand that civilization was based on the new invention called "the plow," which changed the habits of "hunting and gathering" peoples into civilized cities... then you might be able to understand the the changes the computer and computer networks are making to those using them instead of the primitive hunting and gathering jobs we used to spend 90% of our time on. In mid-19th Century the United States was over 90% in an agrarian economy, spending nearly all of its efforts for raising food to feed an empty belly. Mid-20th Century's advances reversed that ratio, so that only 10% was being used for the belly, 90% for civilization. The same thing will be said for feeding the mind, if our civilization ever gets around deciding that spending the majority of our research time in a physical, rather than mental, portion of the educational process. Think of it this way, if it takes only 10% as long to do the work to write a research paper, we are likely to get either 10 times as many research papers, or papers which are 10 times as good, or some combination...just like we ended up with 10 times as much food for the body when we turned from hunting and gathering food to agriculture at the beginnings of civilization...then we would excpect a similar transition to a civilization of the future. *** If mankind is defined as the animal who thinks; thinking more and better increases the degree to which we are the human species. Decreasing our ability to think is going to decrease our humanity...and yet I am living in what a large number of people define as the prime example of an advanced country...where half the adult population can't read at a functional level. [From the US Adult Literacy Report of 1994] *** "Now that cloning geniuses, along with all other humans, has been outlawed, only outlaws will clone geniuses, and the rest of mankind will be `unarmed' in a battle of the mind between themselves and the geniuses." "Have you ever noticed that the only workers in history, all of history; never to have a guild or a union are the inventors who live by the effort of the mind?" We have workers who live by the efforts of their bodies, whether dock workers or professional athletes who have a set of established unions, pay dues, have gone on strike from time to time, and all the related works of unions-- but we have never had a union of those who change worlds from Old World to New World**** Appendix 1 The Growth of the Internet Date Hosts ----- --------- 05/69 4 10/69 5 04/71 23 06/74 62 03/77 111 08/81 213 05/82 235 08/83 562 10/84 1,024 10/85 1,961 02/86 2,308 11/86 5,089 12/87 28,174 07/88 33,000 10/88 56,000 01/89 80,000 07/89 130,000 10/89 159,000 10/90 313,000 01/91 376,000 07/91 535,000 07/91 535,000 10/91 617,000 01/92 727,000 04/92 890,000 07/92 992,000 10/92 1,136,000 01/93 1,313,000 04/93 1,486,000 07/93 1,776,000 10/93 2,056,000 01/94 2,217,000 03/95 ~4,000,000 [Multiply hosts by 100 to get approximate numbers of computers in the world at the time. For instance we should be approaching about 400 million computers in the world at the time of this first edition.] [Multiply Hosts by 10 to get an approximation of the total number of people. Early on, this was probably a smaller multiplier, as there were only 7 people on the UIUC login list at the time: half of these were not logging in on a regular basis. Thus my estimate that I was about the 100th person on the Internet as I presume our site was not the first nor the last of the 18 new sites in 1971, so approximating 9th, plus the 5 already there, we were probably around 14th or so, though they tell me we were actually earlier, to facilitate transcontinental traffic. Sticking with the conservative estimate of 14th, and with the same numbers of people on each of the other nodes, that would have made me the 99th user.] Television versus Education: Who Is Winning? [As If You Had To Ask] Basketball, Football, Baseball, Hockey and Golf [Live and Video Games] versus Shakespeare, Milton, Chaucer, Verne and Hugo You would think that some operation that spends a hundred times more than another would not fear much competition-- especially when the deck is stacked in their favor as the following examples demonstrate: 1. There is always great battle between Macbeth and Macduff; Macbeth never gets blown out in the first quarter and the author never jacks you up for higher royalties. 2. Shakespeare was DESIGNED to be entertaining, so you don't have to change the rules every season to make things more exciting. Of course, if you WANT to, you can always turn Romeo and Juliet into a story about New York City warfare between street gangs instead of noble families of Verona. If the US actually spends a trillion dollars on education every year or two, and major sports franchising spends in the neighborhood of 1/100th of that amount, and the video game businesses spend even less, then why is it that your exposure to Michael Jordan was a given, and his paychecks were higher than any other college graduate in his class? Ten to fifteen year old basketball shoes are nearly all a forgotten item, rotting away in landfills while computers the same age are still available for studying Shakespeare more efficiently than any paper copy can ever provide and less expensively. Those computers are more than fast enough for the kind of studying most kids do in school, and they cost no more on today's market than a pair of basketball shoes. Why is the centuries old blackboard still the default for classrooms around the world, when they cost much more and do much less than computers one tenth their age? Why do we have physical Olympics and no mental Olympics? Why do trivia games shows thrive on the market, and shows featuring our brightest students die on the vine and then get relegated to local programming on Sunday morning? Outfitting a kid with a decade old computer costs no more than outfitting that kid with basketball shows, much less a basketball and a hoop, and the kid doesn't outgrow that computer every year or wear it out, and regulation height of the monitor doesn't change and make all the older ones obsolete just due to some rule change. Throwing billions of Etexts out there into cyberspace can not guarantee anyone will actually learn to read any more than throwing a billion basketballs out there should be a guarantee that there will be another Michael Jordan: nor will it guarantee a new Einstein, Edison, Shakespeare, or any other great person. . . . . .BUT. . .it will increase the odds. Someone still has to pick up the books, just as there has to be someone to pick up the basketballs, for both remain dead until someone brings them to life. Television, on the other hand, natters on into the night, long after you have fallen asleep. Education has all the advantages in competition with ball games and video games, not only those listed above, but a whole world insists on education, forces edcuation, which just might have caused some of the problem. Perhaps education has too many advantages. . .so many, in fact, that education has never realized it is competition bound with other messages. A hundred years ago there were no industries vying for an audience of kids, life outside the schoolhouse was boring and there was very little to bring to class to compete in some manner with the teacher, other than a bullfrog. The massive variety of things kids have competing for them is something educational systems have not taken into account and they still rely on the threat of truant officers, not on earning the attention of the students. The competition is not nearly so sound asleep. . . . TV shows spend billions of their dollars figuring out how to get you to stay tuned in for that last few seconds and billions more watching overnight ratings results to check their performances and those of their competitors. When TV ratings go down, the shows are changed, sometimes so drastically you wouldn't recognize them, and are often cancelled altogether, sometimes only two weeks into a new season. I once saw a show featured on one of the morning talk shows to promote that evening's performance, but the show was cancelled during the intervening hours. When school ratings go down, the ratings are changed; the show remains essentially the same, and it is often a best teacher award winner who gets cancelled while more boring teachers go on year after year to bore the children of an assortment of former students. The Preservation of Errors With the advent of electronic text there is no longer any reason but the Seven Deadly Sins [enumerated above] for a person not to share information. . .except. . .some value added work to make the texts better than what passed into their hands from previous editions. However, with a kind of infinitely reverse logic, most of the scholars dipping their toes into cyberspace, have the espoused idea that no Etexts should vary by one character from some exact paper predecessor, and that these Etexts, new that they are, should be absolutely identified with a particular paper edition which cannot be improved upon. Somehow this reminds me of the Dark Ages, that 1500 years during which no weighty tome of the past could be updated because that would be the same thing as challenging those revered authorities of the Golden Age of Greece, which we all know can never be improved upon. Their tomes were copied, over, and over, and over again-- with the inevitable degradation that comes with telephone games [in which you whisper a secret message through ears after ears in a circle, until completely distorted babble returns from the other side]. Even xeroxing has this bad result if you do it over and over. Therefore scholars developed a habit of searching for any differences between editions, and referring back to older editions to resolve differences, because the more copying the more chances for the addition of errors, comments and other possibly spurious information. This was probably ok for the environment they lived in... but a serious failing caused the Dark Ages which lasted a VERY LONG TIME by anyone's standards, and served to warn, in a manner we should NOT ignore, that this should not be the way things should be done in the future. [The most minimized estimates of the length of the period approximate about 400 years from the latest possible date of the fall of the Roman Empire sometime in the 400's AD, to Charlemagne in the 800's. Of course, most believe the fall of the Roman Empire was much earlier, as the empire, such as it was, was "neither Holy, nor Roman, nor Empire" for a long time before 400 AD and things tended to return to the way they had been before Charlemagne after he died with estimates of the end of Dark Ages ranging as late as the Renaissance in the 1400's. Thus the longest estimate would be no more than 1500 years from the birth of Caesar until the Renaissance was truly underway, with a shortest possible estimate being somewhat under 500 years. Thus a medium estimate of 1000 years would be sure to antagonize both end of the spectrum, and is therefore certainly more accurate than either.] It would appear that the effort to reproduce books with a perfection that refuses the corrections of errors because of a misplaced loyalty to previous editions, looms again, this time over the electronic libraries of the future, in that a significant number of Etext creators are insisting on continuing the practices, policies and precepts of the Dark Ages in that they insist on the following: 1. Copies must be exact, no corrections can be made. 2. Any differences between copies must be decided in an ethic that honors the oldest over the newest. 3. The authoritative copies must be held in sacred trust in the sepulchres of the oldest institutions, and not let out into the hands of the public. Of course, these are totally belied by the facts: 1. Digitial ASCII reproductions ARE exact by nature, and thus no errors can creep in. 2. Any differences that DO creep in can be found in just a single second with programs such as comp, diff, cf, and the like. Even a change as unnoticeable as blank space added to the end of a sentence or file is found and precisely located without effort. 3. Holding books in sacred trust in this manner does not allow them to do their work. A book that is not read is a book that is dead. Books are written for people to read, to hear, to see performed on stage, not so a sort of intellectual GESTAPO/GEheimnis STadt POlizei/ Home State Police could come to power by holding book power in secret. *** On March 8, 1995, Project Gutenberg completed its 250th offering to the Internet Public Library, as many have come to call it. A great number of changes have come to the Internet since we got the Complete Works of Shakespeare out as out 100th publication-- some of them extraordinarily good, some of the of more moderated goodness, and some on the other end of the spectrum Probably the most exciting two recent events are the 20,000 year old cave paintings discovered in France in January, released for the news media in February, and posted as #249 on March 8th with several versions of each painting having been collected, in both .GIF and .JPG formats. This is particularly exciting when you realize that the Dead Sea Scrolls were discovered in 1947 and that no one outside a select few ever even saw them or pictures of them until just a few were smuggled out on Macintosh disks a couple years ago; four decades went by without the public getting any view of them. The French Ministry of Culture has been very swift in getting an extraordinary event such as this covered by the general media on a worldwide basis only one month after their discovery, and also has taken only a week or two to grant Project Gutenberg a permit to post these wonderful paintings on the Internet. On the other hand, the future of the Internet Public Library may be in serious danger if we do not ensure that information may be continually forthcoming to the public. As many of you know, the Project Gutenberg Etexts are 90% from the Public Domain with 10% reproduced by permission. However, there is a movement to cease the introduction of materials into the Public Domain in Congress [of the United States] which would effectively stop the entry of this kind of information into general Internet circulation. 200 years ago the US copyright was established at 14 years according to the speeches of Senator Orrin Hatch, sponsoring one bill, and then extended another 14, then another 28, then extended to life of the author plus another 50 years after, and 75 years for that kind of copyright which is created by a corporation. This means that if you took your 5 year old kid to see "The Lion King" when it came out, the kid would have to be 80 years old to have lived long enough to have a copy that was not licensed by a commercial venture. The fact that the average person will never reach the age of 80 effectively creates a permanent copyright to deny public access during the expected lifetimes of any of us. However, this is not enough. . .the new bill is designed to kill off ANY chance that even 1% of the youngest of us will ever have our own rights to an unlicensed copy of any material produced in our lifetimes because if these bills are passed, our young kid a paragraph above will have to reach the age of 100 to have rights to the materials published today, while the rights of inventors, protected by patent law, will still expire in 17 years. Why is it more important that we all can buy Public Domain legal copies of the latest supersonic toaster less than two decades of production after the original, but it is not as important for us to be well read, well informed and well educated? *** FREE WINNIE-THE-POOH We hope with your assistance we can mount a successful effort to free Winnie-the Pooh, imprisoned by various copyright laws since his birth in 1926. At the beginning of Project Gutenberg, one of our first projects was going to be the children's classic Winnie-the-Pooh: written in 1926, and therefore up for copyright renewal in 1954, and the copyright renewal would have then expired in 1982, and thus been a perfect candidate for Project Gutenberg's Children's Library. However, this was not allowed to happen. Instead, the copyright on Winnie-the-Pooh was extended, for a 75 year total, meaning we would have to wait until 2001 for the new copyright term to expire, effectively keeping Winnie-the-Pooh in jail for another two decades or so. However, two new bills have been introduced into the Senate, and the House of Representatives of the United States to extend this term of imprisonment yet again, for an additional 20 years. The last copyright extension in the United States was in 1975 as I recall. If we extend the copyright 20 years every 20 years we will destroy the very concept of Public Domain, as we have known it since the beginning of copyright. Copyright only began when people other than those extremely rich few who could afford a price of a family farm for every book had their places as the only owners of books destroyed by Gutenberg, the inventor of the moveable type printing press. Mass availability of books was just something that should not be tolerated. . .therefore the printers' guilds lobbied for a right to decide not only who could print any book but whether the book would be printed at all. This was a very strong monopoly put on an industry that had been a free-for-all since Gutenberg. This copyright remained virtually the same length, 28 years, for quite a while, and the first United States copyright was for two 14 year periods, the second automatically given on request. When books once again became too popular at the turn of the last century, and many publishers began selling inexpensive sets of a variety of extensive subjects, the copyrights were doubled again so that the 14 years plus 14 year extension became 28 years with a 28 year extension, which was done around 1909. Then, in the last half of this century, books once again were to become too widely spread, this time with the advent of the xerox machine. Not only were new laws made to curb copying, but those old laws were extended from that 28+28=56 years to 75 years, and this was done in 1975 or so. Now with the advent of truly UNLIMITED DISTRIBUTION available to the world via computer files, books are once again getting to be too widely spread, and further restriction is in the works, this time only 20 years after the last extension, which was for about 20 years. Work is already underway for a permanent copyright to keep us from putting "the Library of Congress" on our disks. I have said for years that by the time computers get as far into the future as they have come from the past, that we will be able to hold all of the Library of Congress in one hand, but I added, "They probably won't let us do it." Let me explain that for a minute; back in 1979 Project Gutenberg bought its first hard drive for about $1500 dollars, for Apple's new Personal Computer. Not counting inflation we can buy drives that will hold 1,000 times as much data for the same price. The true cost, counting inflation, would be that our $1500 would buy closer to 10,000 times as much space because our $1500 from 1979 is equivalent to about $5,000 today, if we get the new "magneto- resistive" drive from IBM. This is NOT counting ZIP compression or other compression programs. If you count them, you would get about 5,000 times as much data for your money today as in 1979. 5 million bytes = $1500 in 1979 = one copy of Shakespeare 12 billion bytes = $4500 in 1995 [inflation has tripled plus] 25 billion bytes . . .with compression programs. This is 5,000 copies of the Complete Shakespeare on one disk, or less then $1 per copy. This upsets those who think there should not be unlimited numbers of books in the world, so definition of copyright and consequently the definition of public domain is in danger of being changed, as they have been every time in history that the public got too much information. If the trend listed above continues for only 15 more years, 2010 will see drives containing 25 million copies of Shakespeare, for the same price as the drive that could only hold one copy thirty years earlier, and the price per copy will be so low that it may take more money to run the calculation to figure the prices than the prices actually are. This is the real reason copyright gets extended, history repeats itself, over and over again, and "those who do not study history are condemned to repeat it." What they want is to ensure you do not study history, so they can do the same things over and over, because that is the easiest way for them to make money. Change, especially the kinds that are happening in the computers' world, is what scares them. When changes comes along, they try as hard as they can to keep things the way they were, and nowhere is it more obvious than now. Most copyrighted materials are gone, out of print forever, in only five years, maybe 75% in ten years, in 15 years probably 87% are out of print, 20 years at that rate is 93%, 25 years is 96%, 30 years is 98% and 35 years would be well over 99%. . .and that doesn't even take into account the shorter term runs of newspapers, magazines, TV show, movies, records and all those things that most people don't even expect to last more than year in the public eye. The fact is that probably only .1% or less of anything published in the 1920s is still in print for the original edition. . .that is only one item out of 1,000, and that estimate is probably quite high. The point is that can our copyright laws support the withholding of 1,000 books for 1 that is actually available. . .we don't make our driving laws for the 1 out of 1,000 that could be race car drivers, that would be one of the silliest laws on record. We have to make our laws so the law applies well to everyone, not just to make the rich richer-- or in this case the Information Rich richer. Much of this new effort not to let anything out of copyright was made by the music industry, which just had the best year of all, ever, shipping over a billion CD's, tapes, records and videos. Why, with all this success, they want to keep copyrights on 1920 items that are 99% out of print. . .is a question worth asking-- the answer is the copyright has always been extended when books, or other forms of information, have become too plentiful; we SAY we want everyone to be well read and well informed, and then the law makes it more difficult. Just look as what has happened for literacy in the United States during the period that a copyright law demanded that nothing become Public Domain coming up to 1975 . . .is keeping Hemingway or Winnie-the-Pooh from becoming parts of the Public Domain going to improve the US literacy rate? We hope with your assistance we can mount a successful effort to free Winnie-the Pooh, imprisoned by various copyright laws since his birth in 1926. . .all copyright laws referred to were United States copyright laws in effect at various times Winnie-the-Pooh has been incarcerated. Other countries have different copyright laws, and Winnie-the-Pooh was written in England, so a variation in the US laws cannot be said to have affects other copyrights. However, the above example is pretty valid for any book that was published in the US during the 1920s or 1930's. *** Ladies and Gentlemen. . .Start Your Engines! The Race to the Information Age Has Begun. It began in a much more quiet manner than the Golden Spike which joined the two halves of a Transcontinental Railroad exactly 100 years earlier. . .so much more quietly that we never knew it was happening, and we were all left standing there at the starting gate, gawking at Men on the Moon. It all happened about 25 years ago, in 1969, but the media never put the word "Internet" on the front page of a major newspaper until the Wall Street Journal did it, on October 29, 1991. . .yet even so, most of you probably never heard or saw the word Internet in the media until 1994, with the 25th Anniversay hardly ever mentioned, as the idea was for everyone to think the Internet is the newest thing around, and to get us all to buy tickets for $20-$25 a month. What is the "First Rule of Reporting a Story?". . .oh yes: Follow The Money Right now there are 40-50 million people on the Internet-- and if someone could figure out how to make them all pay a $20-$25 fee. . .that would be $100 million a month or over a billion dollars a year. Wow. . .if they can do that to an Information Superhighway that had been running free of charge since the 60's, might be they will figure out how to do it with those Interstate Superhighways made of concrete, too, most of them have not been running any longer than that. The NSFNet [National Science Foundation Network] was being cussed and discussed by the powers that be in the hopes it could be dismantled at the same time most of us were first hearing about the Internet, and none of us would notice it when we were all asked to pay that billion dollars a year, for something that had been as free as the highway systems to the Information Rich/Etite for all those years. Let's Follow The Money Some More The first hard drives anyone used on the Internet were not very big in terms of how much information they would hold, but they were HUGE compared to any other hard drives every computer has used for over 15 years. . .they were the size of washing machines, and could not hold information as big as the Bible or Shakespeare. Today, for 1% of the price you can get 1,000 times as much storage space. . .2,000 times as much, if you use a modern compression program when storing your information. The point I am trying to make here is that the price of an electronic storage device has fallen literally closer to 0 than to 1% of the price it was when the Internet started-- and this is scheduled to continue for the next few decades, which means we will all be able to affort drives that will be able to hold the entire Library of Congress. . . .if it is allowed. But it won't be. There's the rub. The point I am trying to make is that just because we will finally have the box capable of storing the entire Library of Congress. . .they will make sure we don't get to, ever, for we will be dead by the time anything we see today gets old enough for the copyright to expire. Let's Follow The Money Some More Just a few months ago, the music industry completed record sales figures for any year in history, moving 1 billion of a combination of CDs, tapes, records and music videos, for a staggering $12 billion dollars. The response to this success, a few weeks ago, was for the music industry to propose, not a rebate to their customers but just the opposite, an additional 20 years during which the music industry could have a continued monopoly on that music, and. . .purely incidentally. . .this monopoly would also be extended to books, television, movies, video games and everything else that could be copyrighted. I think the only way to understand this is to put it in an elementary perspective such as this: Right now, you take your kid to see a movie, any movie the producers are releasing right now. Let's say your kid has been alive 5 years, under current law, that kid has to get to 80 years old before s/he can own a copy of that movie-- without the permission of the copyright holder. . .and the average age such kids can be expected to live is less than 80 years. . .thus making the copyright permanent for us or the kids we take to the movies. The same is true for all current copyrighted materials and the music industry is trying to add another 20 years to an already "life sentence". . .and this when their sales have just broken all records in history, if you will pardon the pun. . . . Since the founding of the United States when copyrights or patents were proposed by Thomas Jefferson for 17 years the period was lengthened to 28 years, plus another 28 years-- and most recently to 75 years for corporate copyrights and "life plus 50 years" for individual copyrights. That means that "Zen and the Art of the Internet," written by a 20 year old, who will be expected to live for another 55 years or so, will still be under copyright sentencing a century from now, and will be totally out of date and will be totally useless other than as a historical footnote. If this is the response of an industry that has just had a huge record bashing year of sales, a response not to lower prices but to raise them, then we are doing something in a backwards manner in the case of copyright. When car makers have really good years, or really bad ones for that matter, they work very hard to attract customers, with new innovations, more car for the money, financing on better terms, or whatever, and when they have record years they give their workers huge bonuses, which I am sure most of you have heard about recently, and they also compete in an aggressive manner to keep sales up. Copyright and patents are what allow people NOT to compete in the marketplace, as least for the first decade or two a new item is in the marketplace. . .only now copyrights are being extended to include the entire lifetime, not only of the copyright holder, but of the audience as well. Something is wrong. The Information Age Is Being Ruled By The Information Rich As Surely as the Transcontinental Railroads Were Ruled For Decades By The Robber Barons. The Information Rich had a free ride on the Superhighways, about 25 years worth of free ride, and now the Information Poor want a ride so the Information Rich are shutting down the free rides and are selling tickets. . .selling tickets to something which until this year was so inexpensive that it it hardly paid to figure out what to charge any person, much less any institution. 49 ---- Surfing the INTERNET: an Introduction Version 2.0.2 December 15, 1992 c. 1992 Jean Armour Polly. Material quoted from other authors was compiled from public Internet posts by those authors. No copyright claims are made for those compiled quotes. Permission to reprint is granted for nonprofit educational purposes. Please let me know if you find this compilation useful. This first (much shorter) version of this appeared in the June, 1992 Wilson Library Bulletin. Please include this entire copyright/copy notice if you duplicate this document. Updates may be ftp'd: ftp nysernet.org (192.77.173.2) login anonymous password name@machine.node cd /pub/resources/guides Please choose the most current version of surfing.the.internet. Please send updates and corrections to: jpolly@nysernet.org Today I'll travel to Minnesota, Texas, California, Cleveland, New Zealand, Sweden, and England. I'm not frantically packing, and I won't pick up any frequent flyer mileage. In fact, I'm sipping cocoa at my Macintosh. My trips will be electronic, using the computer on my desk, communications software, a modem, and a standard phone line. I'll be using the Internet, the global network of computers and their interconnections, which lets me skip like a stone across oceans and continents and control computers at remote sites. I haven't "visited" Antarctica yet, but it is only a matter of time before a host computer becomes available there! This short, non-technical article is an introduction to Internet communications and how librarians and libraries can benefit from net connectivity. Following will be descriptions of electronic mail, discussion lists, electronic journals and texts, and resources available to those willing to explore. Historical details about the building of the Internet and technical details regarding network speed and bandwidth are outside the scope of this piece. What's Out There Anyway? Until you use a radio receiver, you are unaware of the wealth of programming, music, and information otherwise invisible to you. Computer networks are much the same. About one million people worldwide use the Internet daily. Information packet traffic rises by 12% each month. About 727,000 host computers are connected, according to a January, 1992 report (Network Working Group Request for Comments: 1296) by Mark K. Lottor. So, what's all the excitement about? What's zipping around in that fiber and cable and ether, anyway? On my electronic adventure I browsed the online catalog at the University Library in Liverpool, England, leaving some "Hi there from Liverpool, New York" mail for the librarian. I downloaded some new Macintosh anti-virus software from Stanford's SUMEX archive. Then I checked a few databases for information needed for this article, and scanned today's news stories. I looked at the weather forecast for here in the East and for the San Francisco Bay area, forwarding that information to a friend in San Jose who would read it when he woke up. The Internet never closes! After that I read some electronic mail from other librarians in Israel, Korea, England, Australia and all over the U.S. We're exchanging information about how to keep viruses off public computers, how to network CDROMS, and how to reink inkjet printer cartridges, among other things. I monitor about twelve discussion groups. Mail sent to the group address is distributed to all other "subscribers". It's similar to a round-robin discussion. These are known variously as mailing lists, discussion groups, reflectors, aliases, or listservs, depending on what type they are and how they are driven. Subscriptions are free. One of these groups allows children and young adults all over the world to communicate with each other. Kids from Cupertino to Moscow are talking about their lives, pets, families, hope and dreams. It's interesting to see that Nintendo is a universal language! Teachers exchange lesson plans and bibliographies in another group, and schools participate in projects like the global market basket survey. For this project, students researched what foods a typical family of four would buy and prepare over one week's time. Their results were posted to the global project area, where they could be compared with reports from kids all over North and South America, India, Scandinavia, and Asia. It opened up discussions of dietary laws, staple foods, and cultural differences. Other lists explore the worlds of library administration, reference, mystery readers, romance readers, bird-watcher hotlines, cat enthusiasts, ex-Soviet Union watchers, packet radio techies, and thousands more. There is even a list to announce the creation of new lists! The Power of the Net A net connection in a school is like having multiple foreign exchange students in the classroom all the time. It promotes active, participatory learning. Participating in a discussion group is like being at an ongoing library conference. All the experts are Out There, waiting to be asked. Want to buy a CDROM drive? Send one query and "ask" the 3,000 folks on PACS-L (Public Access Computer Systems list) for advice. In a few hours you'll have personal testimonies on the pros and cons of various hardware configurations. Want to see if any libraries are doing anything with Total Quality Management? Ask the members of LIBADMIN and you'll have offers of reports, studies, personal experiences and more. How do you cope with budget cuts: personnel layoffs or materials? Again, LIBADMIN use allows shared advice. Here is one story about the power of the net. At Christmas, an electronic plea came from Ireland. "My daughter believes in Santa Claus," it began. "And although the `My Little Pony Megan & Sundance' set has not been made in three years, she believes Santa will prevail and she will find one under her tree." Mom, a university professor, had called the manufacturer in the US, but none were available. "Check around," they said, "maybe some yet stand on store shelves." So Mom sent the call out to the net. Many readers began a global search for the wily Pony as part of their own holiday shopping forays. Soon, another message came from Dublin. It seemed that a reader of the original message had a father who was a high-ranking executive in the toy company, and he had managed to acquire said pony where others had failed! It was duly shipped in time to save Santa's reputation. Part of the library's mission is to help remove barriers to accessing information, and part of this is removing barriers between people. One of the most interesting things about telecommunications is that it is the Great Equalizer. It lets all kinds of computers and humans talk to each other. The old barriers of sexism, ageism, and racism are not present, since you can't see the person to whom you're "speaking". You get to know the person without preconceived notions about what you THINK he is going to say, based on visual prejudices you may have, no matter how innocent. Well, almost without visual prejudice. Electronic mail is not always an harmonic convergence of like souls adrift in the cyberspace cosmos: there are arguments and tirades (called "flames"). Sometimes you get so used to seeing a frequent poster's electronic signature that you know what he's going to say before he says it! Smileys One problem with written communication is that remarks meant to be humorous are often lost. Without the visual body-language clues, some messages may be misinterpreted. So a visual shorthand known as "smileys" has been developed. There are a hundred or more variations on this theme- :-) That's a little smiley face. Look at it sideways. More Smiley info may be found via anonymous ftp at many places, including the following: ftp nic.funet.fi cd /pub/misc/funnies/smiley.txt FTP is introduced later in the text. What a range of emotions you can show using only keyboard characters. Besides the smiley face above, you can have :-( if you're sad, or :-< if you're REALLY upset! ;-) is one way of showing a wink. Folks wearing glasses might look like this online: %^). But for the most part, the electronic community is willing to help others. Telecommunications helps us overcome what has been called the tyranny of distance. We DO have a global village. Electronic Newsletters and Serials Subscribing to lists with reckless abandon can clog your mailbox and provide a convenient black hole to vacuum up all your spare time. You may be more interested in free subscriptions to compiled documents known as electronic journals. These journals are automatically delivered to your electronic door. There are a growing number of these. Some of the best for librarians are listed below. To subscribe to these journals you must know how to send an interactive message to another computer. This information is well- documented in the resources listed at the end of this article. Telnet and ftp are introduced further along in this article. ALCTS NETWORK NEWS (Association for Library Collections and Technical Services) Various ALA news, net news, other items of interest to librarians. Send the following message to LISTSERV@UICVM.BITNET SUBSCRIBE ALCTS First Name Last Name. Current Cites Bibliography of current journal articles relating to computers, networks, information issues, and technology. Distributed on PACS-L, or connect remotely via TELNET to MELVYL.UCOP.EDU (192.35.222.222); Enter this command at the prompt: SHOW CURRENT CITES. Further information: David F. W. Robison, drobison@library.berkeley.edu. EFFector Online The online newsletter of the Electronic Frontier Foundation. All the hot net issues are covered here: privacy, freedom, first amendment rights. Join EFF to be added to the mailing list or ftp the files yourself from ftp.eff.org (192.88.144.4) They are in the /pub/eff and subsequent directories. Hot Off the Tree (HOTT) (Excerpts and Abstracts of Articles about Information Technology) TELNET MELVYL.UCOP.EDU (192.35.222.222); Enter command: SHOW HOTT. Further information: Susan Jurist, SJURIST@UCSD.EDU. Network News An irreverent compendium of tidbits, resources, and net factoids that is a must for true Internet surfers. To subscribe, send the following message to LISTSERV@NDSUVM1.BITNET SUBSCRIBE NNEWS First Name Last Name. For more information: Dana Noonan at noonan@msus1.msus.edu. Public-Access Computer Systems News and The Public-Access Computer Systems Review Sent automatically to PACS-L subscribers. See above. For a list of back issue files, send the following message to: LISTSERV@UHUPVM1.BITNET INDEX PACS-L To obtain a comprehensive list of electronic serials on all topics, send the following commands to: LISTSERV@UOTTAWA.BITNET GET EJOURNL1 DIRECTRY GET EJOURNL2 DIRECTRY For further information, contact Michael Strangelove: 441495@ACADVM1.UOTTAWA.CA. Remote Login to Internet Resources: TELNET One step beyond electronic mail is the ability to control a remote computer using TELNET. This feature lets you virtually teleport anywhere on the network and use resources located physically at that host. Further, some hosts have gateways to other hosts, which have further gateways to still more hosts. How can you be in two places at once? It sounds more confusing than it is. What resources are available? Here is a sampling of some of the fare awaiting you at several sites: Cleveland Free-net Freenets are the progeny of: Tom Grundner, Director, Community Telecomputing Laboratory Case Western Reserve University 303 Wickenden Building Cleveland, OH 44106 216/368-2733 FAX: 216/368-5436 Internet: aa001@cleveland.freenet.edu BITNET: aa001%cleveland.freenet.edu@cunyvm and the folks at: National Public Telecomputing Network (NPTN) Box 1987 Cleveland, OH 44106 216/368-2733 FAX: 216/368-5436 Internet: aa622@cleveland.freenet.edu. Free-nets are built around a city metaphor, complete with schools, hospitals, libraries, courthouses, and other public services. Academy One recently held an online global simulation of a series of major space achievements. 16 schools (from five states and four nations) participated. Here are several of the descriptions of their projects: "VALKEALA HIGH SCHOOL VALKEALA ELEMENTARY SCHOOL Valkeala, Finland (sa124@cleveland.freenet.edu) Acting as Space Shuttle Discovery taking the Hubble Telescope into space. These Finnish students will be in communication with students in Estonia, relaying their reports." "DR. HOWARD ELEMENTARY SCHOOL Champaign, IL (cwilliam@mars.ncsa.uiuc.edu, cdouglas@ncsa.uiuc.edu) Dr. Howard School (25 students in 3rd/4th grade) will be simulating the Challenger 2 launch. They are being assisted by the National Center for Supercomputing Applications." "ST. JULIE BILLIART SCHOOL Hamilton, OH (ba542@cleveland.freenet.edu) Simulating a NASA Tracking Station in Florida. They will be posting hourly weather reports about the conditions in Florida around Cape Kennedy. This information is vital to the recovery of the Friendship 7 capsule and crew. Students have taken an interest in Space Junk and will be posting additional reports on the various probes which were used to test the surface of the moon and how all of that junk is now becoming a hazard to current and future space exploration." Another Free-net resource is Project Hermes. This service provides copies of Supreme Court opinions in electronic form to as wide an audience as possible, almost as soon as they are announced. The Court's opinions can be sent directly to you or you may download the files directly from any NPTN community computer system. The Free-nets also provide weather, news, and gateways to other resources. To access the Cleveland Free-Net (where all this is being held) simply telnet to: freenet-in-a.cwru.edu 129.22.8.82 or 129.22.8.75 or 129.22.8.76 or 129.22.8.44 and select "visitor" at the login menu. MELVYL Catalog Division of Library Automation University of California Office of the President 300 Lakeside Drive, 8th floor, Oakland, California 94612-3550 415/987-0555 (MELVYL Catalog Helpline) E-mail: lynch@postgres.berkeley.edu The MELVYL catalog is the union catalog of monographs and serials (periodicals) held by the nine University of California campuses and affiliated libraries. It represents nearly 11 million holdings at UC, the California State Library, and the Center for Research Libraries. The MELVYL catalog also provides access to MEDLINE and Current Contents as well as a gateway to many other systems. Access to some databases is restricted under a license agreement to the University of California faculty, staff, and students. Telnet: MELVYL.UCOP.EDU (192.35.222.222) CARL Colorado Alliance of Research Libraries 777 Grant Suite 306 Denver CO 80203-3580 303/861-5319 E-mail: help@carl.org CARL offers access to the following groups of databases: Academic and public library online catalogs, current article indexes such as UnCover and Magazine Index, databases such as the Academic American Encyclopedia and Internet Resource Guide, and a gateway to other library systems. Access to some items is limited. Telnet: pac.carl.org (192.54.81.128) MICROMUSE This is how Barry Kort (aka `Moulton'), Visiting Scientist at Educational Technology Research, BBN Labs, Cambridge, MA describes MicroMuse at M.I.T. "MUDs (Multi-User Dimensions) or MUSEs (Multi-User Simulation Environments) are virtual realities which offer a rich environment for synergy, community, collaboration, and exploratory discovery." "Players connect to the host computer, adopt a character and personality of their choosing, and enter into the synthetic world, consisting of a web of connected rooms and movable props." "Everything (rooms, movable objects, connecting passageways, and players) has a description (typically a few lines of text) which are displayed when a player looks at it." "Actions such as picking up or dropping an object, and exiting to an adjacent room also generate a short message appropriate to the action." "At MIT's AI Lab, MicroMuse features explorations, adventures, and puzzles with redeeming social, cultural, and educational content. The MicroMuse Science Center offers an Exploratorium and Mathematica Exhibit complete with interactive exhibits drawn from experience with Science Museums around the country. The Mission to Mars includes an elaborate tour of the red planet with accurate descriptions rivaling those found in National Geographic." "Elsewhere on MicroMuse, one can find an outstanding adventure based on the children's classic Narnia; a recreation of the Wizard of Oz adventure built by a gifted 8-year old; a challenging Logic Quest; and a living model of the science fiction genre `The DragonRiders of Pern' by author Anne McCaffrey." If you would like to explore MicroMuse, you may connect as follows from your local host computer: telnet michael.ai.mit.edu [18.43.0.177] login: guest [no password required] tt [TinyTalk client program] connect guest [Connect to MicroMuse] BBS.OIT.UNC.EDU Telnet to BBS.OIT.UNC.EDU or 152.2.22.80. Type launch at the login message. It's a must. Not only can you read Usenet Newsfeeds, but you can use LibTel, a scripted telnet gateway to access both US and international libraries plus such things as Data Research Associates Library of Congress catalog, the Ham Radio Call Book, the National Science Foundation, the Weather Server, Webster's dictionary and thesaurus, and more. Remote Access to Files (FTP) FTP or File Transfer Protocol is what to use to retrieve a text file, software, or other item from a remote host. Normal practice is to ftp to the host you want and login as "anonymous". Some sites use the password "guest" while others require that you put in your network address as the password. Some popular ftp sites follow: SUMEX-AIM This archive at Stanford (sumex-aim.stanford.edu or 36.44.0.6) houses a plethora of Macintosh applications, utilities, graphics and sound files. SIMTEL20 (simtel20.army.mil or 192.88.110.20) at the White Sands Missile Range in New Mexico contains a similar archive software for MS-DOS computers. An FTP visit to the Network Service Center at nnsc.nsf.net (128.89.1.178) is a gold mine of documents and training materials on net use. See further information on this in the "Resources for Learning More" section of this article. Project Gutenberg The primary goal of Project Gutenberg is to encourage the creation and distribution of electronic text. They hope to get ten thousand titles to one hundred million users for a trillion etexts in distribution by the end of 2001. Some of the many texts available now include Alice in Wonderland, Peter Pan, Moby Dick, Paradise Lost and other texts in the public domain. Many of these texts are availablevia ftp: ftp mrcnext.cso.uiuc.edu (128.174.201.12) cd etext/etext92 [for 1992 releases] [etext93 is available for testing now] cd etext/etext91 [for 1991 releases] [This file should be in it] cd etext/articles [for Project Gutenberg articles and newsletters]. Most are also available from quake.think.com (192.31.181.1); /pub/etext, from simtel20, and from many other sites. For more info try Gopher as in the following section or contact: Michael S. Hart, Director Project Gutenberg National Clearinghouse for Machine Readable Texts Illinois Benedictine College 5700 College Road Lisle, Illinois 60532-0900 INTERNET: dircompg@ux1.cso.uiuc.edu CompuServe: >INTERNET:dircompg@ux1.cso.uiuc.edu Attmail: internet!ux1.cso.uiuc.edu!dircompg BITNET: HART@UIUCVMD Travel Agents: Archie, Gopher, Veronica, WAIS, Worldwide Web and More There is so much information on the net, it's impossible to know where everything is, or even how to begin looking. Fortunately, some computerized "agents" are in development to help sort through the massive data libraries on the net. Archie Peter Deutsch, of McGill's Computing Centre, describes the archie server concept, which allows users to ask a question once yet search many different hosts for files of interest. "The archie service is a collection of resource discovery tools that together provide an electronic directory service for locating information in an Internet environment. Originally created to track the contents of anonymous ftp archive sites, the archie service is now being expanded to include a variety of other online directories and resource listings." "Currently, archie tracks the contents of over 800 anonymous FTP archive sites containing some 1,000,000 files throughout the Internet. Collectively, these files represent well over 50 Gigabytes (50,000,000,000 bytes) of information, with additional information being added daily. Anonymous ftp archive sites offer software, data and other information which can be copied and used without charge by anyone with connection to the Internet." "The archie server automatically updates the listing information from each site about once a month, ensuring users that the information they receive is reasonably timely, without imposing an undue load on the archive sites or network bandwidth." Unfortunately the archie server at McGill is currently out of service. Other sites are: archie.ans.net (USA [NY]) archie.rutgers.edu (USA [NJ]) archie.sura.net (USA [MD]) archie.funet.fi (Finland/Mainland Europe) archie.au (Australia/New Zealand) archie.doc.ic.ac.uk (Great Britain/Ireland) More information avaiable from: UNIX Support Group Computing Centre McGill University Room 200 Burnside Hall 805 Sherbrooke Street West Montreal, Quebec CANADA H3A 2K6 514/398-3709 peterd@cc.mcgill.ca Internet Gopher Gopher (or go-fer): someone who fetches necessary items from many locations. Login as gopher after you telnet to consultant.micro.umn.edu and enjoy having a computer do all the work for you. Almost. Gopher is still in experimental mode at many gopherized sites. Still, it is one of the best ways to locate information on and in the Internet. Besides archie, the gopher at consultant.micro.umn.edu includes fun and games, humor, libraries (including reference books such as the Hacker's Dictionary, Roget's 1911 Thesaurus, and the CIA World Fact Book), gateways to other US and foreign gophers, news, and gateways to other systems. VERONICA: Very Easy Rodent-Oriented Net-wide Index to Computerized Archives. Very new on the scene is VERONICA. Here is some information from Steve Foster about it. "Veronica offers a keyword search of most gopher-server menus in the entire gopher web. As Archie is to ftp archives, Veronica is to gopherspace. Unlike Archie, the search results can connect you directly to the data source. Imagine an Archie search that lets you select the data, not just the host sites, directly from a menu. Because Veronica is accessed through a gopher client, it is easy to use, and gives access to all types of data supported by the gopher protocol." "Veronica was designed as a response to the problem of resource discovery in the rapidly-expanding gopher web. Frustrated comments in the net news- groups have recently reflected the need for such a service. Additional motivation came from the comments of naive gopher users, several of whom assumed that a simple-touse service would provide a means to find resources `without having to know where they are.'" "The result of a Veronica search is an automatically-generated gopher menu, customized according to the user's keyword specification. Items on this menu may be drawn from many gopher servers. These are functional gopher items, immediately accessible via the gopher client just double- click to open directories, read files, or perform other searches -- across hundreds of gopher servers. You need never know which server is actually involved in filling your request for information. Items that are appear particularly interesting can be saved in the user's bookmark list." "Notice that these are NOT full-text searches of data at gopher-server sites, just as Archie does not index the contents of ftp sites, but only the names of files at those sites. Veronica indexes the TITLES on all levels of the menus, for most gopher sites in the Internet. 258 gophers are indexed by Veronica on Nov. 17, 1992; we have discovered over 500 servers and will index the full set in the near future. We hope that Veronica will encourage gopher administrators to use very descriptive titles on their menus." "To try Veronica, select it from the `Other Gophers' menu on Minnesota's gopher server (consultant.micro.umn.edu), or point your gopher at: Name=Veronica (search menu items in most of GopherSpace) Type=1 Port=70 Path=1/Veronica Host=futique.scs.unr.edu" "Veronica is an experimental service, developed by Steve Foster and Fred Barrie at University of Nevada. As we expect that the load will soon outgrow our hardware, we will distribute the Veronica service across other sites in the near future." "Please address comments to: gophadm@futique.scs.unr.edu" Is this the new world order of automated librarianship? WAIS Wide Area Information Servers (pronounced ways) allows users to get information from a variety of hosts by means of a "client". The user tells the client, in plain English, what to look for out in dataspace. The client then searches various WAIS servers around the globe. The user tells the client how relevant each hit is, and the client can be sent out on the same quest again and again to find new documents. Client software is available for many different types of computers. WAIStation is an easy to use Macintosh implementation of a WAIS client. It can be downloaded from think.com as well as a self-running MediaTracks demo of WAIStation in action. Kahle also moderates a thoughtful WAIS newsletter and discussion group, often speculating about the future of libraries and librarians. Info from: Brewster Kahle, Project Leader Wide Area Information Servers Thinking Machines Corporation 1010 El Camino Real Menlo Park, CA 94025 415/329-9300 x228 brewster@Think.COM WorldWideWeb Tim Berners-Lee describes the Web this way: "The WWW project merges the techniques of information retrieval and hypertext to make an easy but powerful global information system. The WWW world consists of documents, and links. Indexes are special documents which, rather than being read, may be searched. The result of such a search is another (`virtual') document containing links to the documents found. The Web contains documents in many formats. Those documents which are hypertext, (real or virtual) contain links to other documents, or places within documents. All documents, whether real, virtual or indexes, look similar to the reader and are contained within the same addressing scheme. To follow a link, a reader clicks with a mouse (or types in a number if he or she has no mouse). To search and index, a reader gives keywords (or other search criteria). These are the only operations necessary to access the entire world of data." Info from: Tim Berners-Lee WorldWideWeb project CERN 1211 Geneva 23, Switzerland Tel: +41(22)767 3755 FAX:+41(22)767 7155 email:tbl@cernvax.cern.ch Hytelnet Peter Scott, the creator of HYTELNET, sends this recent update: "HYTELNET version 6.3, the utility which gives an IBM-PC user instant- access to all Internetaccessible library catalogs, FREE-NETS, CWISs, BBSs, Gophers, WAIS, etc. is now available. You can get it via anonymous ftp from: access.usask.ca in the pub/hytelnet/pc subdirectory. It is listed as HYTELN63.ZIP." "Version 6.3 is a major upgrade. Much redundant information has been deleted, and errors have been corrected. New subdirectories have been added, which has meant that many files now have a more meaningful home. Also all the new/updated files created since Version 6.2 were incorporated." "Note: the UNZIPPED files total over 1.2 mb but remember, you can always edit out any information you do not need, in order to save space. Information from Roy Tennant follows, slightly edited, describing how to obtain HYTELNET 6.3 from the ftp site (thanks Roy)::" "TO RETRIEVE HYTELNET: At your system prompt, enter: ftp access.usask.ca or ftp 128.233.3.1 When you receive the Name prompt, enter: anonymous When you receive the password prompt, enter: your Internet address. When you are at the ftp> prompt, enter: binary At the next ftp> prompt, enter: cd pub/hytelnet/pc Then enter: get hyteln63.zip After the transfer has occurred, either proceed with the instructions below to retrieve the UNZIP utility (which you need unless you already have it) or enter: quit The Hytelnet program is archived using a ZIP utility. To unarchive it, you must be able to "unzip" the file. If you have the file PKUNZIP.EXE, it will unarchive the HYTELN63.ZIP file (see below for instructions). If you do not have it, you may retrieve it by following these instructions: TO RETRIEVE PKUNZIP: Use the above instructions for connecting to: access.usask.ca At the ftp> prompt, enter: binary Then enter: cd pub/hytelnet/pc Then enter: get pkunzip.exe After the transfer has occurred, enter: quit TO DOWNLOAD IT TO YOUR PC: Because of the plethora of PC communications programs, I will not attempt to give step-by-step instructions here. You should check the instructions for your software for downloading a *binary* file from your Internet account to your PC. TO UNARCHIVE HYTELN63.ZIP: Make a new directory on your hard disk (e.g., mkdir hytelnet) Copy PKUNZIP.EXE and HYTELN63.ZIP into the new directory Make sure you are in that directory, then enter: pkunzip HYTELN63 It will then unarchive HYTELN63.ZIP, which contains the following files: HYTELNET.ZIP READNOW. The file READNOW gives full instructions for un-archiving HYTELNET.ZIP. Simply put, you **MUST** unZIP the file with the -d parameter so that all the subdirectories will be recursed. To use HYTELNET, you should refer to the instructions in the release announcement by Peter Scott, or to the README file included with the package." "PLEASE NOTE that I offer the above instructions as a service for those who are unfamiliar with the steps required to download and use files from network sources. I cannot be responsible for any local variations in these procedures which may exist. Please contact your local computer support staff if you have difficulty performing these tasks." "The UNIX/VMS version, created by Earl Fogel, is available for browsing by telnet to access.usask.ca login with hytelnet (lower case). For more information on this version contact Earl at: fogel@skyfox.usask.ca." How to Get Connected Now that you're interested in what resources are available, how does one go about getting connected? Time was that you needed a standard, dedicated connection to the Internet. Then you needed a robust computer system and a couple of zany gurus to keep it all running. And once a year you could expect an invoice in the $30,000 range to keep the data flowing. These days, anyone can connect, from small libraries and non-profits to individuals. (and of course commercial-mh) And the prices are affordable. There is a NSFNet acceptable-use policy you must agree to adhere to if your traffic passes through NSFNet. It is available from the NSF Network Service Center. Contact your regional network first to see what services might be available to you. A list of regional nets can be obtained from the NSF Network Service Center (address below), or check with a local college or university's academic computing center. A university may be able to give you a guest account on its system for educational purposes. Access to electronic mail alone is roughly $20 a month at this writing. Additional capabilities, including telnet and ftp, cost more, and it will cost $2,000 or more per year if you want to operate your own host system. The good news is that the costs are spiraling downwards. Here are a few other methods of connecting to the net. Many more are listed in the "must-have" books at the end of this article. CERFnet The California Education and Research Federation (CERFnet) has announced DIAL N' CERF USA. It allows educators, scientists, corporations, and individuals access to the Internet from anywhere in the continental US. A toll-free number, 1-800-7CERFNET (1-800-723-7363), provides subscribers with the capability to log in to remote machines, transfer files, and send and receive electronic mail, as if they had a standard, dedicated connection. The cost of this toll-free connection is $20 a month with a $10 per hour usage fee and free installation. There is an installation charge of $50. CERFnet California Education and Research Federation c/o San Diego Supercomputer Center P.O. Box 85608 San Diego, CA 92186-9784 800/876-CERF or 619/534-5087 help@cerf.net Performance Systems International PSI offers several permutations of network connectivity, including low-end email-only accounts, dial-up host connectivity on demand, and dedicated connections. Costs are competitive and performance is reliable. PSI has POPs (points of presence) in over forty U.S. cities. PSILink, email and delayed ftp, is $19 a month for 2400 baud service or below, $29 per month for 9600 baud service. GDS (Global Dialup Service) includes telnet, rlogins at $39 a month, 2400 baud, 24 hour access. Host DCS (Dialup Connection Service), at about $2000 per year, includes a full suite of internet activities (mail, news, ftp, telnet). Performance Systems International, Inc. 11800 Sunrise Valley Dr. Suite 1100 Reston, VA 22091 800/82PSI82 or 703/620-6651 FAX: 703/620-4586 info@psi.com. All-info@psi.com generates an automatic reply response containing summaries of various PSI products. Software Tool & Die Software Tool & Die offers The World, a public access Unix system: The basic rates are $2 per hour and a $5 monthly account fee. Services offered by The World include internet electronic mail, USENET news, ClariNet -UPI, AP, and satellite news services, real-time chat, Unix Software, Archie, the Online Book Initiative (a publicly accessible repository for freely redistributable collections of textual information, a net-worker's library.) AlterNet Access - Users have access to AlterNet via ftp/telnet. The World can also be accessed over the Compuserve Packet Network. You do not have to be a Compuserve subscriber to use this network, but you will be billed for its use. The WORLD Software Tool & Die 1330 Beacon Street Brookline, MA 02146 617/39-0202 Daniel Dern also provides the following definitive information file on how to get connected: Daniel Dern's Short Answer to "How do I get a list of Internet Service/Access Providers for Individual Accounts": For a list of Internet Service Providers contact: NSF Network Service Center (NNSC) BBN Laboratories Inc. 10 Moulton St. Cambridge, MA 02238 617/873-3361 nnsc@nnsc.nsf.net The NNSC info-server utility can also automatically e-mail you a copy of this list and other documents. Simply send an e-mail message to: info-server@nnsc.nsf.net with the following text in the body: request: nsfnet topic: topic: request: end You don't need to put anything in the subject line. "referral-list" gets you the NNSC's referral list of Internet Service Providers based in the U.S. (possibly providing international service). This is generally agreed to be the most comprehensive and least-biased list. "limited-referral" gets you the NNSC's referral list of Internet providers for "limited service," which includes Dial-Up IP, Internet E-mail. "help" (recommended) gets you the Help document for the info-server facility. For a list of dial-up-accessible Public-Access Internet Hosts (Unix BBSs that can do telnet, ftp, etc., that can you can access by calling from your PC and modem), see the PDIAL list, maintained by Peter Kaminski. Kaminski periodically posts an updated version to the usenet groups alt.bbs.lists and alt.bbs.internet; also, the most recent edition may be obtained by sending e-mail to: kaminski@netcom.com with the `Send PDIAL' in the subject. To be placed on a list to receive future editions automatically, send e-mail to: kaminski@netcom.com with `Subscribe PDIAL' in the subject. The `nixpub' list is a frequently updated list of Public-Access unix Systems -Unix-based BBSs usually carrying usenet news, supporting e-mail connectivity to the Internet, and with some mix of local archives, multi- user games, etc. The full list is long (over 1,000 lines). To get a current copy of `nixpub' as an automatic e-mail reply, Send a message to `nixpub@digex.com' (no subject or message text needed), or to `archive-server@cs.widener.edu' with message body of one of these: send nixpub long send nixpub short send nixpub long short index nixpub The nixpub and nixpub.short lists are regularly reposted to the USENET comp.misc and alt.bbs groups Info from: Daniel P. Dern Free-lance technology writer P.O. Box 309 Newton Centre, MA 02159 617/969-7947 FAX: 617/969-7949 ddern@world.std.com Resources for Learning More CERFnet Network Information Center (NIC) This is a repository for many eclectic internet guides and RFC (Requests For Comments) from many sources, including the famous, if technical "Hitchhiker's Guide to the Internet." These may be obtained via anonymous ftp to nic.cerf.net (192.102.249.3). Call the CERFnet Hotline at 800-876-CERF for assistance. California Education and Research Federation c/o San Diego Supercomputer Center P. O. Box 85608 San Diego, CA 92186- 9784 800/876-CERF or 619/534-5087 help@cerf.net CICNet Resource Guide Over 200 pages of Internet resources, published June, 1992. Copies are $27.00 from CICNet, Inc. Attn Kim Schaffer 2901 Hubbard Pod A Ann Arbor, MI 48109. 313/998-6103 FAX 313/998-6105 info@cic.net "The December Lists" "Information Sources: the Internet and Computer-Mediated Communication" Compiled by John December (decemj@rpi.edu) Here is part of his information file on this excellent resource: "This document or updates are available via anonymous ftp. Host: ftp.rpi.edu file: /pub/communications/internet-cmc PURPOSE: to list pointers to information describing the Internet, computer networks, and issues related to computer- mediated communication (CMC). Topics of interest include the technical, social, cognitive, and psychological aspects of CMC. AUDIENCE: this file is useful for those getting started in understanding the Internet and CMC; it compactly summarizes sources of information for those who are already exploring these issues. ASSUMPTIONS: to access many information sources listed here you must have access to and know how to use anonymous ftp, email, or USENET newsgroups. Some files are in TeX or PostScript format. Contents: Section -1- THE INTERNET AND SERVICES Section -2- INFORMATION SERVICES/ELECTRONIC PUBLICATIONS Section -3- SOCIETIES AND ORGANIZATIONS Section -4- NEWSGROUPS Section -5- SELECTED BIBLIOGRAPHY" "Emily Postnews Answers Your Questions on Netiquette" Brad Templeton's (brad@looking.on.ca) satirical and hilarious piece on how NOT to behave on the net. Emily Postnews, foremost authority on proper net behaviour, gives her advice. There are many places to ftp this file, and it is appearing on many gophers. One place to get the file is by ftp to ra.msstate.edu (130.18.80.10) Location: /pub/docs/words- l/Funnies The file is called emily.postnews. Here is a sample: "Dear Miss Postnews: How long should my signature be? -- verbose@noisy A: Dear Verbose: Please try and make your signature as long as you can. It's much more important than your article, of course, so try to have more lines of signature than actual text. Try to include a large graphic made of ASCII characters, plus lots of cute quotes and slogans. People will never tire of reading these pearls of wisdom again and again, and you will soon become personally associated with the joy each reader feels at seeing yet another delightful repeat of your signature. Be sure as well to include a complete map of USENET with each signature, to show how anybody can get mail to you from any site in the world. Be sure to include Internet gateways as well. Also tell people on your own site how to mail to you. Give independent addresses for Internet, UUCP, and BITNET, even if they're all the same." "Incomplete Guide to the Internet" The "Incomplete Guide" was compiled by the NCSA Education Group, dated September, 1992. It is also available for anonymous FTP at: ftp.ncsa.uiuc.edu in the /misc directory This excellent manual is a must. It even covers SLIP connections and use of Eudora. Here are some comments about it from cfarmer@ncsa.uiuc.EDU (Chuck Farmer): "The first half of the text is devoted to the mechanics of telecommunications, how to connect, what to do once you are connected, etc. The second half of the manual is devoted to current telecommunications projects, past successful projects, and resources. The resources include FTP sites, open BBS's and networks, Free-Nets, subscription services, and where to get more information on each resource. This resource was complied by the Living Lab program (NSF funded) at NCSA as an attempt to encourage the proliferation of HPCC use in the K-12 classroom. We welcome your comments and suggestions. For further information: National Center for Supercomputing Applications 605 E Springfield Ave. Champaign, IL 61820 217/244-6122 "Library Resources on the Internet: Strategies for Selection and Use" 1992. RASD Occasional Paper no. 12, selling for $18 to members, $20 for nonmembers. It can be ordered from: ALA Order Services 50 E. Huron Chicago, IL 60611, 800/545-2433 Electronic versions available via FTP ASCII file from: host DLA.UCOP.EDU (128.48.108.25) directory /pub/internet/Libcat-guide host FTP.UNT.EDU (129.120.1.1) directory /pub/library/libcat-guide WordPerfect 5.1 file from: host HYDRA.UWO.CA (129.100.2.13) directory libsoft/internet.com Merit's Cruise of the Internet This attractive overview looks great on a Macintosh. I have not seen the Windows version. From the README text: "Merit's `Cruise of the Internet' is a computer- based tutorial for new as well as experienced Internet `navigators.' The Cruise will introduce you to Internet resources as diverse as supercomputing, minorities, multimedia, and even cooking. It will also provide information about the tools needed to access those resources." ftp to NIC.MERIT.EDU /internet/resources. There are Macintosh and Windows versions, and README text files to explain installation procedures. A Cruise of the Internet Version 2.01 for Apple Macintosh computers December 1, 1992 SYSTEM REQUIREMENTS This tutorial will run on any color Macintosh which is capable of displaying 256 colors. To run the Cruise tutorial you will need: - A Macintosh II, LC or Quadra series computer - 8-bit color and any color monitor (12" minimum) - System 6.05 or 7.x - Approximately 3 MB of disk space - 4 MB RAM is recommended - Internet connectivity and software that does file transfers via FTP. A Cruise of the Internet Version 2.0 for IBM-DOS and DOS compatibles running Windows October 28, 1992 SYSTEM REQUIREMENTS: This tutorial will run on any IBM-DOS or DOS-compatible computer which is equipped to display 256 colors at an aspect ratio of 640 x 480. To run the Cruise tutorial you will need: - An IBM-DOS or DOS-compatible computer - XGA- or XGA-compatible adapter set to display 256 colors at 640 x 480 - Microsoft Windows(TM) version 3.1 - Approximately 1.5 MB of disk space - 2 MB RAM minimum - Internet connectivity and software that does file transfers via FTP. "Mining the Internet" The Net as mine metaphor is a popular theme. Tunneling through the network matrix in search of gems and ore is not far from fact. Sometimes it is hard work, and a lot of it is working in the dark. There is a guidebook called "Mining the Internet", available from University of California at Davis. Here is how the Gold Country Mining Instructions begin: "Jist durn tuckered o' workin' eight t' five for a salary. ain't you? An' you wanna set out for parts unknown. You're hankerin' for an a'venture. Come'n then go `Mining the Internet' with me, father of Clementine (that's my darlin'), and I'll tell you some old timey tales and introduce you to a new resource for students, faculty, and staff called wide area networking 'Taint goin' to hurt you any, and the prospect looks good for a lucky strike." "Mining the Internet" and "Using the Internet A&B" available from: Computing Services University of California Davis, CA 95616-8563 916/752-0233. Or electronically by anonymous ftp from ucdavis.edu (128.120.2.1) directory /ucd.netdocs/mining NSF Network Service Center (NNSC) NSF Internet Tour HyperCard Stack--borrow a Macintosh long enough to view this, worth the effort! Includes net history, net maps, net poetry and lore. Free. They also publish a very complete Internet Resource Guide ($15). Many items, including the HyperCard Tour to the Internet, freely available by anonymous ftp from nnsc.nsf.net NNSC Bolt Beranek and Newman Inc. 10 Moulton Street, Cambridge, MA 02138 617/873-3400 nnsc@nnsc.nsf.net New User's Guide to Unique and Interesting Resources on the Internet 2.2. Available from NYSERNet (New York State Education and Research Network). It is over 145 pages and lists some 50 sources. OPACS, databases, information resources, and more. The New User's Guide is available in hard copy at the cost of $25.00. (NYSERNet Members: $18.00) It is available electronically at nysernet.org (192.77.173.2) in the directory /pub/resources/guides It is called the new.user.guide.v2.2.txt For more information: NYSERNet, Inc. 111 College Pl. Syracuse, NY 13244-4100 315/443-4120 FAX 315/425-7518 info@nysernet.org NorthWestNet User Services Internet Resource Guide NorthWestNet has released a 300-page guide to the Internet, covering electronic mail, file transfer, remote login, discussion groups, online library catalogues, and supercomputer access. Copies may be purchased for $20.00 from NorthWestNet. It is also available via anonymous ftp: ftphost.nwnet.net in the directory /nic/nwnet/user-guide NorthWestNet 15400 SE 30th Place, Suite 202, Bellevue, WA 98007 206/562-3000 FAX: 206/562-4822 "There's Gold in Them Thar Networks! or Searching for Gold in all the Wrong Places" written by Jerry Martin at Ohio State University. This document is available via Internet message to Infoserver@nnsc.nsf.net. Once inside the message area, give the following commands to retrieve the document: REQUEST:NSFNET TOPIC:NETWORK-TREASURES REQUEST: END "The Yanoff Lists" "Special Internet Connections" Compiled by Scott Yanoff. This is an indispensable weekly list of network resources available using telnet and ftp. It includes a few Online Public Access Catalogs, chat lines, weather servers, Campus Wide Information Systems, and reference resources. Send e-mail to the list manager (Scott Yanoff) at: yanoff@csd4.csd.uwm.edu or ftp to csd4.csd.uwm.edu The filename is inet-services. How to Find out More About Discussion Lists Thousands of discussion groups, LISTSERVs, and mail reflectors exist on the Internet. Here are several ways to find lists of interest to you. LISTSERVs available from NYSERNet.org Nysernet.org hosts over 20 lists, including folk_music and PUBLIB for public librarians. Send a LIST GLOBAL command in an interactive message to our host. For example: To: LISTSERV@nysernet.org Subject: Message: LIST GLOBAL The SRI NIC Maintained Interest-Groups List of Lists This is available by FTP from ftp.nisc.sri.com (192.33.33.22) in the directory /netinfo/interest-groups. The SRI NIC list-of-lists is also available via electronic mail. Send a message to mail-server@nisc.sri.com with the following line in the message body: Send netinfo/interest-groups Example: To: mail-server@nisc.sri.com Subject: Message: Send netinfo/interest-groups The List of Lists A comprehensive list-of-lists can be obtained from some larger host computers running LISTSERV software, by sending a LIST GLOBAL command in an interactive message. This will return a "one line per list" list of all lists known to that host as of that date. For example: To: LISTSERV@VM1.NoDak.EDU mail Subject: Message: LIST GLOBAL The global list can also be searched online. For details send LISTSERV the command INFO DATABASE Network Accessible Database Server Only available on the LISTSERV@VM1.NoDak.EDU is a searchable interest groups database. For example, to search of the databases for lists on "cats" you would send the following statements (copy them exactly into your mail message to the LISTSERV): //DBlook JOB Echo=No Database Search DD=Rules //Rules DD * Select cats in lists index Select cats in intgroup index Select cats in new-list index These statements search the global LISTSERV list of lists ("in lists"), and the local copy of the SRI-NIC Interest Groups ("in intgroup"), and the archives of the "new-list" list ("in new-list"). Send LISTSERV the command INFO DATABASE for more information. The 5th Revision of the Directory of Scholarly Electronic Conferences This resource is available at LISTSERV@KENTVM or LISTSERV@KENTVM.KENT.EDU and via anonymous FTP to ksuvxa.kent.edu in the library directory. This announcement is extracted from the ACADLIST README FILE "This directory contains descriptions of 805 electronic conferences (econferences) on topics of interest to scholars. E- conference is the umbrella term that includes discussion lists, interest groups, e-journals, e-newsletters, Usenet newsgroups, forums, etc. We have used our own judgment in deciding what is of scholarly interest -- and accept any advice or argument about our decisions. We have placed the entries into categories by deciding what the *dominant* academic subject area of the electronic conference is." "The 5th Revision involves an attempt to make it easier to feed the Directory into HyperCard(TM), dBase(TM) and other database programs. The first step in this effort has been to use field labels for each part of each record. We've also reduced the size of each record by trying to keep topic information between 25-50 words (some are still bigger). Advice on this topic will be gratefully accepted at dkovacs@kentvm.kent.edu." "In addition, information about editorial policy and archive availability and frequency have also been included in each record. Where possible the information in each record has been checked for currency and accuracy by checking the LISTSERV header in the case of LISTSERV based e-conferences and contacting the moderators of other kinds of e-conferences." "The field labels are as follows: LN: (e-conference name) TI: (topic information) SU: (subscription information) ED: (edited? Yes or No) AR: (archived? if Yes, frequency, private=subscribers only) MO: (moderator, editor, listowner, manager, coordinator, etc.) IA: (`official' institutional affiliation)." "Topic descriptions are taken in whole or part from the descriptions provided by each listowner, editor, moderator or coordinator to the New-List, the List of Lists, and the Internet Interest Groups file." "Any errors are the responsibility of the compiler of the Electronic Conferences for Academics Files. If you can provide corrections or additional information about any of these electronic conferences, please contact: Diane Kovacs (Bitnet) DKOVACS@KENTVM (Internet) DKOVACS@KENTVM.KENT.EDU These files are available on the Directory of Scholarly E-Conferences: ACADLIST README (explanatory notes for the Directory) ACADSTCK HQX (binhexed, self-decompressing, HyperCard Stack of entire Directory - Keyword searchable) ACADLIST FILE1 (Anthropology- Education) ACADLIST FILE2 (Geography-Library and Information Science) ACADLIST FILE3 (Linguistics-Political Science) ACADLIST FILE4 (Psychology-Writing) ACADLIST FILE5 (Biological sciences) ACADLIST FILE6 (Physical sciences -now includes Academic Computing and Computer Science) ACADLIST FILE7 (business, Academia, news) ACADWHOL HQX (binhexed self-decompressing Macintosh M.S. Word 4.0 document of all 7 directories) ACADLIST.CHANGES (Major additions and deletions) How to retrieve the abovefiles via mail 1. Send an e-mail message addressed to LISTSERV@KENTVM or LISTSERV@KENTVM.KENT.EDU. 2. Leave the subject and other info lines blank. 3. The message must read: GET Filename Filetype (e.g.,filename=ACADLIST filetype=FILE1 or HQX or whatever) 4. The files will be sent to you and you must receive them. 5. If you need assistance receiving, etc. contact your local Computer Services people. How to retrieve the files via anonymous FTP (File Transfer Protocol) FTP to KSUVXA.KENT.EDU 1. when prompted for `USERID,' type ANONYMOUS. 2. Your password will be your actual userid on your local machine. 3. Type: cd library 4. Type: GET Filename.Filetype (e.g., filename=ACADLIST filetype=FILE1 or HQX or whatever) 5. The files will be transferred directly into the directory you ftp'ed from at your site. New Lists and List Changes New lists are being started every day, and old ones fade away. To find out bout these changes, join the NEW-LIST mailing. Here is part of their Welcome message: "The `NEW-LIST' list has been established as a central address to post announcements of new public mailing lists. In addition, `NEW-LIST' might be used as a final verification before establishing a list (to check for existing lists on the same topic, etc.). However, be sure to check sources such as the Internet List-of-Lists (SIGLIST or INTEREST-GROUPS list), LISTSERV GROUPS, and the LISTS database on the major LISTSERVs (we have the LISTS database on NDSUVM1)." "We will gladly rebroadcast New List announcements, final list proposals (to avoid conflicts or redundancy), or emergency announcements about the availability of some list. List Review Service These folks subscribe to and monitor a list for awhile and then report on it to everyone else. It's a great idea and a useful way to "sample" a list. Here is the subscription information. Email its author to be added to the List Review Service list, BITNET ADDRESS: SRCMUNS@UMSLVMA LIST REVIEW SERVICE ISSN: 1060-8192 Published bi-weekly, when school is in session, by The University of Missouri, St. Louis Libraries. Raleigh C. Muns, editor. For more information: Thomas Jefferson Library University of Missouri St. Louis 8001 Natural Bridge Road St. Louis, MO 63121 314/553-5059 Internet Library Guides Three different Internet library guides are available to help both beginning and experienced OPAC users. Art St. George's Internet-Accessible Library Catalogs and Databases includes directions for Internet libraries and Campus Wide Information Systems as well as dialup libraries and bulletin boards in the United States. Available from: ariel.unm.edu /LIBRARY/INTERNET.LIBRARY Billy Barron's Accessing On-line Bibliographic Databases contains a number of useful features such as guides to local OPAC escape sequences and commands. FTP to ftp.unt.edu (129.120.1.1) /LIBRARY/LIBRARIES.TXT Dana Noonan's A Guide to Internet/Bitnet comes in two parts. Part two is about Internet Libraries. It is an easy to use guide to many national and international OPACS and their login and use instructions. (available via anonymous ftp from vm1.nodak.edu then CD NNEWS (although nnews may not show up on the directory menu, it works.) A printed version is available for $10 from Metronet. For more information: Metronet 226 Metro Square Building Seventh and Robert Streets St. Paul, Minnesota 55101 612/224-4801 FAX 612/224-4827 Must-have Books for the Internet Surfer Kehoe, Brendan. (1993). Zen and the Art of the Internet: a Beginner's Guide (2nd ed.). Englewood Cliffs, NJ: Prentice-Hall. The first edition is available for free from many FTP sites (see below) This version has about 30 pages of new material and corrects various minor errors in the first edition. Includes the story of the Coke Machine on the Internet. For much of late 1991 and the first half of 1992, this was the document of choice for learning about the Internet. ISBN 0-13-010778-6. Index. $22.00 To ftp Zen 1.0 in a PostScript version: ftp.uu.net [137.39.1.9] directory /inet/doc ftp.cs.toronto.edu [128.100.3.6] directory /pub/zen ftp.cs.widener.edu [147.31.254.132] directory /pub/zen as zen-1.0.tar.Z, zen-1.0.dvi, and zen-1.0.PS ftp.sura.net [128.167.254.179] directory /pub/nic as zen-1.0.PS It is also available to read on many Gopher servers. Krol, Ed. (1992). The Whole Internet User's Guide & Catalog. Sebastopol, CA: O'Reilly & Associates. Comprehensive guide to how the network works, the domain name system, acceptable use, security, and other issues. Chapters on telnet/remote login, File Transfer Protocol, and electronic mail explain error messages, special situations, and other arcana. Archie, Gopher, Net News, WAIS, WWW, and troubleshooting each enjoy a chapter in this well-written book. Appendices contain info on how to get connected in addition to a glossary. ISBN 1-56592-025-2. $24.95 LaQuey, Tracey, & Ryer, J.C. (1993). The Internet Companion: a Beginner's Guide to Global Networking. Reading, MA: Addison-Wesley. Beginning with a forewordby Vice-President Elect Al Gore, this book provides an often-humorous explanation of the origins of the Internet, acceptable use, basics of electronic mail, netiquette, online resources, transferring information, and finding email addresses. The In the Know guide provides background on Internet legends (Elvis sightings is one), organizations, security issues, and how to get connected. Bibliography. Index. ISBN 0-201-62224-6 $10.95 Marine, April. (1992). INTERNET: Getting Started.. Menlo Park, CA: SRI International. This book has an international overview, and includes things the others don't, such as an index to all the RFC's (Request for Comments), Internet organizations, source information for the TCP/IP CD ROM, and the answer to "who is in charge of the Internet?" (No one is. The Internet is a cooperating group of independently administered networks. Some groups set basic policy though.) ISBN 0-944604-15-3 $39.00 SRI 333 Ravenswood Ave. Menlo Park, CA 94025 Tennant, Roy, Ober, J., & Lipow, A. G. (1993). Crossing the Internet Threshold: An Instructional Handbook. Berkeley, CA: Library Solutions Press. A cookbook to run your own Internet training sessions. Real- world examples. Foreword by Cliff Lynch. ISBN: 1-882208-01-3 $45.00 Library Solutions Institute and Press 2137 Oregon Street Berkeley, CA 94705 510/841-2636 FAX: 510/841-2926 Magazine Matrix News, the monthly newsletter edited by John S. Quarterman. Subscriptions are $30 per year. for a paper edition, $25/yr for an online edition. Matrix News, Matrix Information & Directory Services, Inc. (MIDS) 1106 Clayton La. Suite 500 W Austin, TX 78746 512/329-1087 FAX: 512/327-1274 mids@tic.com Organizations CNI Coalition for Networked Information 1527 New Hampshire Ave., NW Washington, DC 20036 202/232-2466 FAX: 202/462-7849 info@cni.org CPSR Computer Professionals for Social Responsibility PO Box 717 Palo Alto, CA 94302 415/322-3778 FAX: 415/322-3798 CPSR Newsletter, annual Computers, Freedom and Privacy Conference, poster ("Technology is driving the future-- it's time to find out who's steering.") cpsr@clsi.stanford.edu EFF The Electronic Frontier Foundation, Inc. 155 Second St. Cambridge, MA 02141 617/864-1550 FAX: 617/864-0866 Publishes the EFFector in online and print editions. T-shirts, bumper stickers ("I'd rather be telecommuting"; "ISDN: Make it so."; "CYBERNAUT") eff@eff.org Internet Society 1895 Preston White Drive Suite 100 Reston, VA 22091 703/620-8990, FAX 703/620-0913 Annual conference, quarterly Internet Society News. isoc@nri.reston.va.us ============================================= For more information about this article: Jean Armour Polly Manager of Network Development and User Training NYSERNet, Inc. 111 College Place Syracuse, NY 13244-4100 315/443-4120 FAX: 315/425-7518 jpolly@nysernet.org ============================================= 56 ---- NREN for All: Insurmountable Opportunity c. 1993 Jean Armour Polly Manager of Network Development and User Training NYSERNet, Inc. jpolly@nysernet.org This was originally published in the February 1, 1993 issue of Library Journal (volume 118, n. 2, pp 38-41). It may be freely reprinted for educational use, please let me know if you are redistributing it, I like to know if it's useful and where it's been. Please do not sell it, and keep this message intact. When Senator Al Gore was evangelizing support for his visionary National Research and Education Network bill, he often pointed to the many benefits of a high-speed, multi-lane, multi-level data superhighway. Some of these included: -- collaborating research teams, physically distant from each other, working on shared projects via high speed computer networks. Some of these "grand challenges" might model global environmental change, or new therapeutic drug research, or the design of a new airplane for inexpensive consumer air travel. -- a scientist or engineer might design a product, which could be instantly communicated to a manufacturing plant, whose robotic machine could turn the drawing-board product into reality. One example of this is the capability to digitally measure a new recruit for an army uniform, transmit the information to a clothing manufacturer, and take delivery of a custom-tailored uniform the next day. -- access to digital libraries of information, both textual and graphic. Besides hundreds of online public access catalogs, and full text documents, color illustrations of photographic quality, full motion videos and digital audio will also be available over the network. In his many articles and speeches touting the bill, Gore often used an example of a little girl, living in a rural area, at work on a school project. Was she information-poor due to her physical location, far from the resources of large cities? No-- the National Research and Education Network would give her the capability to dial into the Library of Congress-- to collect information on dinosaurs. Now that the NREN bill has been signed into law (12/91), and committees are being formed, and policies are being made, I'm still thinking about that little girl, and her parents, for that matter. In fact I've got some "Grand Questions" to pose. 1- How will we get access? The Internet has been called the "Interim NREN", since it's what we have in place now. I'm wondering how the family is going to get to the Internet "dial tone", let alone the NREN, especially since they live in a rural area. The information superhighway may be miles from their home, and it may be an expensive long-distance call to the "entrance ramp". Or, the superhighway may run right through their front yard, but they can't make use of it because they have no computer, no modem, and no phone line to make the connection. What good is a superhighway if all you've got is a tricycle? 2- What will they be able to gain access to, and will their privacy be protected? Beyond the infrastructure issues, I'm concerned about what kind of things will be available for them once they do get connected, how the resources will be arranged, and how they will learn to use these tools to advantage. Beyond that, how authoritative is the information in the digital collection, and how do we know for sure it came from a legitimate source? How confidential will their information searches be, and how will it be safeguarded? 3- Who will get access? I'm concerned that even if the infrastructure and resource problems are resolved, that little girl still won't be allowed access, because a lot of folks don't think the Internet is a safe place for unaccompanied minors. 4- Does the family have any electronic rights? Electronic responsibilities? Are dinosaurs and a grade-school project too trivial for NREN? Some people think the NREN should be reserved for scientists working on "Grand Challenges", not ordinary ones. Who will decide what constitutes "acceptable use"? 5- What is the future of the local public library? Worse yet, I'm worried that the reason they are phoning the Library of Congress in the first place is that their local public library has shut its doors, sold off the book stock, and dismissed the librarian. What can public libraries do to avoid that future? Brief Background: The Internet Today Computers all over the world are linked by high speed telecommunications lines. On the other side of their screens are people of all races and nationalities who are able to exchange ideas quickly through this network. This "brain to brain" interface brings both delight and despair, as evidenced by the following True Tales from the Internet: -- Children all over the world participate in class collaborations, sharing holiday customs, local food prices, proverbs, acid rain measurements, and surveys such as a recent one from a fifth grade class in Argentina who wanted to know (among other things) "Can you wear jeans to school?". -- During the Soviet coup in the summer of 1991, hundreds read eyewitness accounts of developments posted to the net by computer users in Moscow and other Soviet cities with network connectivity. A literal hush fell over this side of the network after a plea came across from the Soviet side. We appreciate your messages of encouragement and offers of help, it said, but please save the bandwidth for our outgoing reports! - Proliferation of discussion groups on the Internet means one can find a niche to discuss everything from cats to Camelot, from library administration to lovers of mysteries, from Monty Python to Medieval History. -- Predictably, Elvis has been sighted on the Internet. Besides electronic mail, full text resources may be downloaded from many Internet host computers. Some of these are religious materials, such as the Bible, and the Koran, others are the complete works of Shakespeare, Peter Pan, and Far From the Madding Crowd. Searchable resources include lyrics from popular songs, chord tablature for guitar, recipes, news articles, government information, Supreme Court Opinions, census data, current and historical weather information, dictionaries, thesauri, the CIA World Fact Book, and much more. Hundreds of library OPACS may be searched, and those with accounts set up at CARL may use UnCover to find articles of interest, which then may be faxed on demand. The richness of the Internet changes on a daily basis as more data resources, computer resources, and human resources join those already active on the net. But, back to that little girl. How will she get access? She'll need a plain old telephone line, a modem, a computer, and some communications software. Will her family be able to afford it? If not, will she be able to dial in from her school? Her Post Office? The local feed store? A kiosk at K-Mart? At the American Library Association's 1992 convention in San Francisco, Gloria Steinem said "the public library is the last refuge of those without modems." I'm sure she meant that the library will act as information provider for those unable to get their information using a home computer's telecommunications connections. But it could be taken another way. Couldn't the public library act as electronic information access centers, providing public modems and telecommunications alongside the books and videos? Why the Public Library is a good place for NREN access The public library is an institution based on long-standing beliefs in intellectual freedom and the individual's right to know. Let's revisit ALA's LIBRARY BILL OF RIGHTS, Adopted June 18, 1948; amended February 2, 1961, and January 23, 1980, by the ALA Council. The American Library Association affirms that all libraries are forums for information and ideas, and that the following basic policies should guide their services. 1. Books and other library resources should be provided for the interest, information, and enlightenment of all people of the community the library serves. Materials should not be excluded because of the origin, background, or views of those contributing to their creation. No problem here. The Internet's resources are as diverse as their creators, from nations all over the world. Every community can find something of interest on the Internet. 2. Libraries should provide materials and information presenting all points of view on current and historical issues. Materials should not be proscribed or removed because of partisan or doctrinal disapproval. 3. Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment. 4. Libraries should cooperate with all persons and groups concerned with resisting abridgment of free expression and free access to ideas. Again, global electronic communication allows discussion and debate in an instant electronic forum. There is no better "reality check" than this. 5. A person's right to use a library should not be denied or abridged because of origin, age, background, or views. In a public library, the little girl won't be barred from using the Internet because of her age. The ALA interpretation of the above right states: "Librarians and governing bodies should not resort to age restrictions on access to library resources in an effort to avoid actual or anticipated objections from parents or anyone else. The mission, goals, and objectives of libraries do not authorize librarians or governing bodies to assume, abrogate, or overrule the rights and responsibilities of parents or legal guardians. Librarians and governing bodies should maintain that parents - and only parents - have the right and the responsibility to restrict the access of their children - and only their children - to library resources. Parents or legal guardians who do not want their children to have access to certain library services, materials or facilities, should so advise their children. Librarians and governing bodies cannot assume the role of parents or the functions of parental authority in the private relationship between parent and child. Librarians and governing bodies have a public and professional obligation to provide equal access to all library resources for all library users." 6. Libraries which make exhibit spaces and meeting rooms available to the public they serve should make such facilities available on an equitable basis, regardless of the beliefs or affiliations of individuals or groups requesting their use." The Internet provides the equivalent of electronic meeting rooms and virtual exhibit spaces. Public libraries will offer access to all comers, regardless of their status. Further, as part of the Interpretation of the Library Bill of Rights, this statement appears: "The U.S. Supreme Court has recognized that `the right to receive ideas follows ineluctably from the sender's First Amendment right to send them. . . . More importantly, the right to receive ideas is a necessary predicate to the recipient's meaningful exercise of his own rights such as speech, press, and political freedom' Board of Education, Island Trees Union Free School District No. 26 v. Pico, 457 U.S. 853, 866-67 (1982) (plurality opinion)." Clearly, reception and sending of ideas is a First Amendment issue. Oral, written, and electronic speech must be equally protected so that democracy may flourish. Public libraries also provide "free" services, though in fact the costs are just deferred. Taxes, state aid derived from taxes, federal aid derived from taxes, and private funds all pay for the "free" services at public libraries. Public libraries may be thought of as Information Management Organizations (IMO's), similar to Health Management Organizations, where patrons/patients contribute before they need information/health care, so that when they do need it, librarians/doctors are available to render aid. Why NREN in the Public Library is a bad idea On the surface, the public library looks like an excellent place to drop Internet/NREN connectivity. Libraries are veritable temples of learning, intellectual freedom, and confidentiality. However, most public libraries lack what computer experts call infrastructure. If there are computers, they may be out of date. Staff may not have had time to learn to operate them, and the computers may literally be collecting dust. There may be no modems, no phone line to share, no staff with time to learn about the Internet and its many resources. Money to update equipment, hire staff, and buy training is out of the question. Public libraries face slashed budgets, staff layoffs, reduced hours, and cutbacks in services. Many of these drawbacks are noted in the recent study by Dr. Charles R. McClure, called Public Libraries and the Internet/NREN: New Challenges, New Opportunities. Public librarians were surveyed about their attitudes toward NREN in interviews and focus groups. According to the study, public librarians thought that the public had a "right" to the Internet, and its availability in their libraries would provide a safety net for the electronic-poor. On the other hand they felt that they could not commit resources to this initiative until they knew better what the costs were and the benefits might be. They longed for someone else to create a pilot project to demonstrate the Internet's usefulness, or lack thereof, for public library users. The study describes several scenarios for public libraries as the NREN evolves. Some may simply choose to ignore the sweeping technological changes in information transfer. They may continue to exist by purveying high-demand items and traditional services, but they may find it increasingly difficult to maintain funding levels as the rest of the world looks elsewhere for their information and reference needs. The public library may find itself servicing only the information disenfranchised, while the rest of the community finds, and pays for, other solutions. As the study explains: "While embracing and exploiting networked information and services, [successfully transitioned libraries] also maintain high visibility and high demand traditional services. But resources will be reallocated from collections and less-visible services to support their involvement in the network. All services will be more client-centered and demand-based, and the library will consciously seek opportunities to deliver new types of information resources and services electronically." "In this scenario, the public library will develop and mount services over the NREN, provide for public access to the NREN, and will compete successfully against other information providers. In its networked role, the library can serve as a central point of contact as an electronic navigator and intermediary in linking individuals to electronic information resources- regardless of type or physical location. The public library in this second scenario will define a future for itself in the NREN and develop a strategic plan to insure its successful participation as an information provider in the networked environment." What Should Happen Senator Gore has proposed what has been variously called Son of NREN or Gore II, which should help address many of these infrastructure problems. Unfortunately, the Bill was not passed and the closing of the last Congress. There is hope, however, that it will be reintroduced this Spring. Specifically, Gore's bill would have ensured that the technology developed by the High-Performance Computing Act of 1991 is applied widely in K-12 education, libraries, health care and industry, particularly manufacturing. It would have authorized a total of $1.15 billion over the next five years. According to a press release from Senator Gore's office, "The Information Infrastructure and Technology Act charges the White House Office of Science and Technology Policy (OSTP) with coordinating efforts to develop applications for high-performance computing networking and assigns specific responsibilities to the National Science Foundation, the National Aeronautics and Space Agency, the National Institute of Standards and Technology, and the National Institutes of Health. It would expand the role of OSTP in overseeing federal efforts to disseminate scientific and technical information." "The bill provides funding to both NSF and NASA to develop technology for 'digital libraries'-- huge data bases that store text, imagery, video, and sound and are accessible over computer networks like NSFNET. The bill also funds development of prototype 'digital libraries' around the country." The public needs NREN because 300 baud used to be fast and low- resolution graphics used to be pretty. Now we get impatient waiting for fax machines to print out a document from half a continent away, when a few years ago we would have been content to wait days or weeks for the same article to arrive by mail. We are satisfied with technology until it starts to impede our lives in some way. We wait impatiently, sure that we spend half our lives waiting for printers, and the other half waiting for disk drives. Time is a commodity. I can envision that little girl walking into the public library with the following request: "I'm doing a school report on the Challenger disaster. I need a video clip of the explosion, a sound bite of Richard Feynman explaining the O-ring problem, some neat graphics from NASA, oh, and maybe some virtual reality mock-ups of the shuttle interior. Can you put it all on this floppy disk for me, I know it's only 15 minutes before you close but, gee, I had band practice." This is why public libraries need NREN. We would do well to remember the words of Ranganathan, whose basic tenets of good librarianship need just a little updating from 1931: "[Information] is for use." "Every [bit of information], its user." "Every user, [his/her bit of information]." "Save the time of the [user]." "A [network] is a growing organism." And so is the public library. A promising future awaits the public library that can be proactive rather than reactive to technology. Information technology is driving the future, librarians should be at the wheel. It is hoped that the new Administration in Washington will provide the fuel to get us going. _______________________________ SIDEBAR ------------------------------------------------------- Excerpts from S.2937 as introduced July 1, 1992 102nd Congress 2nd Session IN THE SENATE OF THE UNITED STATES Mr. GORE (for himself, Rockefeller (D-WV), Kerry (D-MA), Prestler (R-SD), Riegle (D-MI), Robb (D-VA), Lieberman (D-CT), Kerrey (D-NE) and Burns (R-MT)) introduced the following bill; which was read twice and referred to the Committee on Commerce, Science and Transportation. A BILL To expand Federal efforts to develop technologies for applications of high-performance computing and high-speed networking, to provide for a coordinated Federal program to accelerate development and deployment of an advanced information infrastructure, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the "Information Infrastructure and Technology Act of 1992". SEC. 7. APPLICATIONS FOR LIBRARIES. (a) DIGITAL LIBRARIES.--In accordance with the Plan developed under section 701 of the National Science and Technology Policy, Organization and Priorities Act of 1976 (42 U.S.C. 6601 et seq.), as added by section 3 of this Act, the National Science Foundation, the National Aeronautics and Space Administration, the Defense Advanced Research Projects Agency, and other appropriate agencies shall develop technologies for "digital libraries" of electronic information. Development of digital libraries shall include the following: (1) Development of advanced data storage systems capable of storing hundreds of trillions of bits of data and giving thousands of users nearly instantaneous access to that information. (2) Development of high-speed, highly accurate systems for converting printed text, page images, graphics, and photographic images into electronic form. (3) Development of database software capable of quickly searching, filtering, and summarizing large volumes of text, imagery, data, and sound. (4) Encouragement of development and adoption of standards for electronic data. (5) Development of computer technology to categorize and organize electronic information in a variety of formats. (6) Training of database users and librarians in the use of and development of electronic databases. (7) Development of technology for simplifying the utilization of networked databases distributed around the Nation and around the world. (8) Development of visualization technology for quickly browsing large volumes of imagery. (b) DEVELOPMENT OF PROTOTYPES.--The National Science Foundation, working with the supercomputer centers it supports, shall develop prototype digital libraries of scientific data available over the Internet and the National Research and Education Network. (c) DEVELOPMENT OF DATABASES OF REMOTE- SENSING IMAGES.--The National Aeronautics and Space Administration shall develop databases of software and remote-sensing images to be made available over computer networks like the Internet. (d) AUTHORIZATION OF APPROPRIATIONS.-- (1) There are authorized to be appropriated to the National Science Foundation for the purposes of this section, $10,000,000 for fiscal year 1993, $20,000,000 for fiscal year 1994, $30,000,000 for fiscal year 1995, $40,000,000 for fiscal year 1996, and $50,000,000 for fiscal year 1997. (2) There are authorized to be appropriated to the National Aeronautics and Space Administration for the purposes of this section, $10,000,000 for fiscal year 1993, $20,000,000 for fiscal year 1994, $30,000,000 for fiscal year 1995, $40,000,000 for fiscal year 1996, and $50,000,000 for fiscal year 1997. ________________________ SIDEBAR Resources ___________________________ McClure, Charles R., Joe Ryan, Diana Lauterbach and William E. Moen Public Libraries and the INTERNET/NREN: New Challenges, New Opportunities. 1992. Copies of this 38-page study may be ordered at $15 each from the Publication Office, School of Information Studies, Syracuse University, Syracuse, NY 13244-4100 315/443-2911. The U.S. National Commission on Libraries and Information Science (NCLIS) has issued a Report to the Office of Science and Technology Policy on Library and Information Services' Roles in the National Research and Education Network. The 25-page document, released in late November, 1992, summarizes the results of an open forum held in Washington during the previous summer. Topics addressed include funding NREN, charging for use, commercial access, protection of intellectual property, and security and privacy. The report "focuses on fulfilling the potential for extending the services and effectiveness of libraries and information services for all Americans through high-speed networks and electronic databases." A limited number of copies are available from NCLIS at 111 18th St., NW, Suite 310, Washington, D.C. 20036 202/254-3100. Grand Challenges 1993: High Performance Computing and Communications. The "Teal Book" (because of its color) "provides a far-sighted vision for investment in technology but also recognizes the importance of human resources and applications that serve major national needs. This Ã� investment will bring both economic and social dividends, including advances in education, productivity, basic science, and technological innovation." Requests for copies of this 68-page document should go to: Federal Coordinating Council for Science, Engineering and Technology, Committee on Physical, Mathematical, and Engineering Sciences c/o National Science Foundation, Computer and Information Science and Engineering Directorate, 1800 G St. NW, Washington, D.C. 20550 Carl Kadie operates an excellent electronic resource of documents pertaining to academic freedom, the Library Bill of Rights, and similar policy statements. Those with Internet access may use File Transfer Protocol (FTP) to ftp.eff.org (192.88.144.4) Login as anonymous, use your network address as the password. The documents are in the /pub/academic directory. Further Reading Kehoe, Brendan. (1993). Zen and the Art of the Internet: a Beginner's Guide (2nd ed.). Englewood Cliffs, NJ: Prentice-Hall. The first edition is available for free from many FTP sites. (see below) This version has about 30 pages of new material and corrects various minor errors in the first edition. Includes the story of the Coke Machine on the Internet. For much of late 1991 and the first half of 1992, this was the document of choice for learning about the Internet. ISBN 0-13-010778-6. Index. $22.00 To ftp Zen: ftp.uu.net [137.39.1.9] in /inet/doc ftp.cs.toronto.edu [128.100.3.6] in pub/zen ftp.cs.widener.edu [147.31.254.132] in pub/zen as zen-1.0.tar.Z, zen-1.0.dvi, and zen-1.0.PS ftp.sura.net [128.167.254.179] in pub/nic as zen-1.0.PS Krol, Ed. (1992). The Whole Internet User's Guide & Catalog. Sebastopol, CA: O'Reilly & Associates. Comprehensive guide to how the network works, the domain name system, acceptable use, security, and other issues. Chapters on telnet/remote login, File Transfer Protocol, and electronic mail explain error messages, special situations, and other arcana. Archie, Gopher, NetNews, WAIS, WWW, and troubleshooting each enjoy a chapter in this well-written book. Appendices contain info on how to get connected in addition to a glossary. ISBN 1-56592-025-2. $24.95 LaQuey, Tracy, & Ryer, J. C. (1993). The Internet Companion: a Beginner's Guide to Global Networking. Reading, MA: Addison-Wesley. Beginning with a foreword by Vice-President Elect Al Gore, this book provides an often- humorous explanation of the origins of the Internet, acceptable use, basics of electronic mail, netiquette, online resources, transferring information, and finding email addresses. The In the Know guide provides background on Internet legends (Elvis sightings is one), organizations, security issues, and how to get connected. Bibliography. Index. ISBN 0-201-62224-6 $10.95 Polly, Jean Armour. Surfing the Internet 2.0. An enthusiastic tour of selected Internet resources, electronic serials, listserv discussion groups, service providers, manuals and guides and more. Available via anonymous FTP from NYSERNET.org (192.77.173.2) in the directory /pub/resources/guides surfing.2.0.txt. Tennant, Roy, Ober, J., & Lipow, A. G. (1993). Crossing the Internet Threshold: An Instructional Handbook. Berkeley, CA: Library Solutions Press. A cookbook to run your own Internet training sessions. Real-world examples. Foreword by Cliff Lynch. Library Solutions Institute and Press 2137 Oregon Street Berkeley, CA 94705 Phone:(510) 841-2636 Fax: (510) 841-2926 ISBN: 1-882208-01-3 $45.00 118 ---- Big Dummy's Guide To The Internet (C)1993, 1994 by the Electronic Frontier Foundation [EFF] ***************************************************************************** Copyright 1993, 1994 Electronic Frontier Foundation, all rights reserved. Redistribution, excerpting, republication, copying, archiving, and reposting are permitted, provided that the work is not sold for profit, that EFF contact information, copyright notice, and distribution information remains intact, and that the work is not qualitatively modified (translation, reformatting, and excerpting expressly permitted however - feel free to produce versions of the Guide for use with typesetting, hypertext, display, etc. applications, but please do not change the text other than to translate it to another language. Excerpts should be credited and follow standard fair use doctrine.) Electronic Frontier Foundation, 1001 G St. NW, Suite 950 E, Washington DC 20001 USA, +1 202 347 5400 (voice) 393 5509 (fax.) Basic info: info@eff.org; General and Guide related queries: ask@eff.org. ***************************************************************************** Big Dummy's Guide to the Internet, v.2.2 copyright Electronic Frontier Foundation 1993, 1994 TABLE OF CONTENTS Foreword by Mitchell Kapor, co-founder, Electronic Frontier Foundation. Preface by Adam Gaffin, senior writer, Network World. Chapter 1: Setting up and jacking in 1.1 Ready, set... 1.2 Go! 1.3 Public-access Internet providers 1.4 If your town doesn't have direct access 1.5 Net origins 1.6 How it works 1.7 When things go wrong 1.8 FYI Chapter 2: E-mail 2.1. The basics 2.2 Elm -- a better way 2.3 Pine -- even better than Elm 2.4 Smileys 2.5 Sending e-mail to other networks 2.6 Seven Unix commands you can't live without Chapter 3: Usenet I 3.1 The global watering hole 3.2 Navigating Usenet with nn 3.3 nn commands 3.4 Using rn 3.5 rn commands 3.6 Essential newsgroups 3.7 Speaking up 3.8 Cross-posting Chapter 4: Usenet II 4.1 Flame, blather and spew 4.2 Killfiles, the cure for what ails you 4.3 Some Usenet hints 4.4 The Brain-Tumor Boy, the modem tax and the chain letter 4.5 Big Sig 4.6 The First Amendment as local ordinance 4.7 Usenet history 4.8 When things go wrong 4.9 FYI Chapter 5: Mailing lists and Bitnet 5.1 Internet mailing lists 5.2 Bitnet Chapter 6: Telnet 6.1 Mining the Net 6.2 Library catalogs 6.3 Some interesting telnet sites 6.4 Telnet bulletin-board systems 6.5 Putting the finger on someone 6.6 Finding someone on the Net 6.7 When things go wrong 6.8 FYI Chapter 7: FTP 7.1 Tons of files 7.2 Your friend archie 7.3 Getting the files 7.4 Odd letters -- decoding file endings 7.5 The keyboard cabal 7.6 Some interesting ftp sites 7.7 ncftp -- now you tell me! 7.8 Project Gutenberg -- electronic books 7.9 When things go wrong 7.10 FYI Chapter 8: Gophers, WAISs and the World-Wide Web 8.1 Gophers 8.2 Burrowing deeper 8.3 Gopher commands 8.4 Some interesting gophers 8.5 Wide-Area Information Servers 8.6 The World-Wide Web 8.7 Clients, or how to snare more on the Web 8.8 When things go wrong 8.9 FYI Chapter 9: Advanced E-mail 9.1 The file's in the mail 9.2 Receiving files 9.3 Sending files to non-Internet sites 9.4 Getting ftp files via e-mail 9.5 The all knowing Oracle Chapter 10: News of the world 10.1 Clarinet: UPI, Dave Barry and Dilbert 10.2 Reuters 10.3 USA Today 10.4 National Public Radio 10.5 The World Today: From Belarus to Brazil 10.6 E-mailing news organizations 10.7 FYI Chapter 11: IRC, MUDs and other things that are more fun than they sound 11.1 Talk 11.2 Internet Relay Chat 11.3 IRC commands 11.4 IRC in times of crisis 11.5 MUDs 11.6 Go, go, go (and chess, too)! 11.7 The other side of the coin 11.8 FYI Chapter 12: Education and the Net 12.1 The Net in the Classroom 12.2 Some specific resources for students and teachers 12.3 Usenet and Bitnet in the classroom Chapter 13: Business on the Net 13.1 Setting up shop 13.2 FYI Chapter 14: Conclusion -- The end? Appendix A: Lingo Appendix B: Electronic Frontier Foundation Information Foreword By Mitchell Kapor, Co-founder, Electronic Frontier Foundation. Welcome to the World of the Internet The Electronic Frontier Foundation (EFF) is proud to have sponsored the production of the Big Dummy's Guide to the Internet. EFF is a nonprofit organization based in Washington, D.C., dedicated to ensuring that everyone has access to the newly emerging communications technologies vital to active participation in the events of our world. As more and more information is available online, new doors open up for those who have access to that information. Unfortunately, unless access is broadly encouraged, individuals can be disenfranchised and doors can close, as well. The Big Dummy's Guide to the Internet was written to help open some doors to the vast amounts of information available on the world's largest network, the Internet. The spark for the Big Dummy's Guide to the Internet was ignited in a few informal conversations that included myself and Steve Cisler of Apple Computer, Inc., in June of 1991. With the support of Apple Computer, EFF engaged Adam Gaffin to write the book and actually took on the project in September of 1991. The idea was to write a guide to the Internet for people who had little or no experience with network communications. We intended to post this guide to the Net in ASCII and HyperCard formats and to give it away on disk, as well as have a print edition available. We have more than realized our goal. Individuals from as geographically far away as Germany, Italy, Canada, South Africa, Japan, Scotland, Norway, and Antarctica have all sent electronic mail to say that they downloaded the Big Dummy's Guide to the Internet. The guide is now available in a wide array of formats, including ACSCII text, HyperCard, World Wide Web, PostScript and AmigaGuide. And the guide will be published in a printed format by MIT Press in June of 1994. EFF would like to thank author Adam Gaffin for doing a terrific job of explaining the Net in such a nonthreatening way. We'd also like to thank the folks at Apple, especially Steve Cisler of the Apple Library, for their support of our efforts to bring this guide to you. We invite you to join with EFF in our fight to ensure that equal access to the networks and free speech are protected in newly emerging technologies. We are a membership organization, and through donations like yours, we can continue to sponsor important projects to make communications easier. Information about the Electronic Frontier Foundation and some of the work that we do can be found at the end of this book. We hope that the Big Dummy's Guide to the Internet helps you learn about whole new worlds, where new friends and experiences are sure to be yours. Enjoy! Mitch Kapor Chairman of the Board Electronic Frontier Foundation mkapor@eff.org For comments, questions, or requests regarding EFF or the Big Dummy's Guide to the Internet, send a note to ask@eff.org. Preface By Adam Gaffin, Senior Writer, Network World, Framingham, Mass. Welcome to the Internet! You're about to start a journey through a unique land without frontiers, a place that is everywhere at once -- even though it exists physically only as a series of electrical impulses. You'll be joining a growing community of millions of people around the world who use this global resource on a daily basis. With this book, you will be able to use the Internet to: = Stay in touch with friends, relatives and colleagues around the world, at a fraction of the cost of phone calls or even air mail. = Discuss everything from archaeology to zoology with people in several different languages. = Tap into thousands of information databases and libraries worldwide. = Retrieve any of thousands of documents, journals, books and computer programs. = Stay up to date with wire-service news and sports and with official weather reports. = Play live, "real time" games with dozens of other people at once. Connecting to "the Net" today, takes something of a sense of adventure, a willingness to learn and an ability to take a deep breath every once in awhile. Visiting the Net today is a lot like journeying to a foreign country. There are so many things to see and do, but everything at first will seem so, well, foreign. When you first arrive, you won't be able to read the street signs. You'll get lost. If you're unlucky, you may even run into some locals who'd just as soon you went back to where you came from. If this weren't enough, the entire country is constantly under construction; every day, it seems like there's something new for you to figure out. Fortunately, most of the locals are actually friendly. In fact, the Net actually has a rich tradition of helping out visitors and newcomers. Until very recently, there were few written guides for ordinary people, and the Net grew largely through an "oral" tradition in which the old- timers helped the newcomers. So when you connect, don't be afraid to ask for help. You'll be surprised at how many people will lend a hand! Without such folks, in fact, this guide would not be possible. My thanks to all the people who have written with suggestion, additions and corrections since the Big Dummy's Guide first appeared on the Internet in 1993. Special thanks go to my loving wife Nancy. I would also like to thank the following people, who, whether they know it or not, provided particular help. Rhonda Chapman, Jim Cocks, Tom Czarnik, Christopher Davis, David DeSimone, Jeanne deVoto, Phil Eschallier, Nico Garcia, Joe Granrose, Joerg Heitkoetter, Joe Ilacqua, Jonathan Kamens, Peter Kaminski, Thomas A. Kreeger, Stanton McCandlish, Leanne Phillips, Nancy Reynolds, Helen Trillian Rose, Barry Shein, Jennifer "Moira" Smith, Gerard van der Leun and Scott Yanoff. If you have any suggestions or comments on how to make this guide better, I'd love to hear them. You can reach me via e-mail at adamg@world.std.com. Boston, Mass., February, 1994. Chapter 1: SETTING UP AND JACKING IN 1.1 READY, SET ... The world is just a phone call away. With a computer and modem, you'll be able to connect to the Internet, the world's largest computer network (and if you're lucky, you won't even need the modem; many colleges and companies now give their students or employees direct access to the Internet). The phone line can be your existing voice line -- just remember that if you have any extensions, you (and everybody else in the house or office) won't be able to use them for voice calls while you are connected to the Net. A modem is a sort of translator between computers and the phone system. It's needed because computers and the phone system process and transmit data, or information, in two different, and incompatible ways. Computers "talk" digitally; that is, they store and process information as a series of discrete numbers. The phone network relies on analog signals, which on an oscilloscope would look like a series of waves. When your computer is ready to transmit data to another computer over a phone line, your modem converts the computer numbers into these waves (which sound like a lot of screeching) -- it "modulates" them. In turn, when information waves come into your modem, it converts them into numbers your computer can process, by "demodulating" them. Increasingly, computers come with modems already installed. If yours didn't, you'll have to decide what speed modem to get. Modem speeds are judged in "bps rate" or bits per second. One bps means the modem can transfer roughly one bit per second; the greater the bps rate, the more quickly a modem can send and receive information. A letter or character is made up of eight bits. You can now buy a 2400-bps modem for well under $60 -- and most now come with the ability to handle fax messages as well. At prices that now start around $150, you can buy a modem that can transfer data at 14,400 bps (and often even faster, using special compression techniques). If you think you might be using the Net to transfer large numbers of files, a faster modem is always worth the price. It will dramatically reduce the amount of time your modem or computer is tied up transferring files and, if you are paying for Net access by the hour, will save you quite a bit in online charges. Like the computer to which it attaches, a modem is useless without software to tell it how to work. Most modems today come with easy-to-install software. Try the program out. If you find it difficult to use or understand, consider a trip to the local software store to find a better program. You can spend several hundred dollars on a communications program, but unless you have very specialized needs, this will be a waste of money, as there are a host of excellent programs available for around $100 or less. Among the basic features you want to look for are a choice of different "protocols" (more on them in a bit) for transferring files to and from the Net and the ability to write "script" or "command" files that let you automate such steps as logging into a host system. When you buy a modem and the software, ask the dealer how to install and use them. Try out the software if you can. If the dealer can't help you, find another dealer. You'll not only save yourself a lot of frustration, you'll also have practiced the prime Internet directive: "Ask. People Know." To fully take advantage of the Net, you must spend a few minutes going over the manuals or documentation that comes with your software. There are a few things you should pay special attention to: uploading and downloading; screen capturing (sometimes called "screen dumping"); logging; how to change protocols; and terminal emulation. It is also essential to know how to convert a file created with your word processing program into "ASCII" or "text" format, which will let you share your thoughts with others across the Net. Uploading is the process of sending a file from your computer to a system on the Net. Downloading is retrieving a file from somewhere on the Net to your computer. In general, things in cyberspace go "up" to the Net and come "down" to you. Chances are your software will come with a choice of several "protocols" to use for these transfers. These protocols are systems designed to ensure that line noise or static does not cause errors that could ruin whatever information you are trying to transfer. Essentially, when using a protocol, you are transferring a file in a series of pieces. After each piece is sent or received, your computer and the Net system compare it. If the two pieces don't match exactly, they transfer it again, until they agree that the information they both have is identical. If, after several tries, the information just doesn't make it across, you'll either get an error message or your screen will freeze. In that case, try it again. If, after five tries, you are still stymied, something is wrong with a) the file; b) the telephone line; c) the system you're connected to; or d) your own computer. From time to time, you will likely see messages on the Net that you want to save for later viewing -- a recipe, a particularly witty remark, something you want to write your congressman about, whatever. This is where screen capturing and logging come in. When you tell your communications software to capture a screen, it opens a file in your computer (usually in the same directory or folder used by the software) and "dumps" an image of whatever happens to be on your screen at the time. Logging works a bit differently. When you issue a logging command, you tell the software to open a file (again, usually in the same directory or folder as used by the software) and then give it a name. Then, until you turn off the logging command, everything that scrolls on your screen is copied into that file, sort of like recording on videotape. This is useful for capturing long documents that scroll for several pages -- using screen capture, you would have to repeat the same command for each new screen. Terminal emulation is a way for your computer to mimic, or emulate, the way other computers put information on the screen and accept commands from a keyboard. In general, most systems on the Net use a system called VT100. Fortunately, almost all communications programs now on the market support this system as well -- make sure yours does. You'll also have to know about protocols. There are several different ways for computers to transmit characters. Fortunately, there are only two protocols that you're likely to run across: 8-1-N (which stands for "8 bits, 1 stop bit, no parity" -- yikes!) and 7-1-E (7 bits, 1 stop bit, even parity). In general, Unix-based systems use 7-1-E, while MS-DOS-based systems use 8-1-N. What if you don't know what kind of system you're connecting to? Try one of the settings. If you get what looks like gobbledygook when you connect, you may need the other setting. If so, you can either change the setting while connected, and then hit enter, or hang up and try again with the other setting. It's also possible your modem and the modem at the other end can't agree on the right bps rate. If changing the protocols doesn't work, try using another bps rate (but no faster than the one listed for your modem). Don't worry, remember, you can't break anything! If something looks wrong, it probably is wrong. Change your settings and try again. Nothing is learned without trial, error and effort. There are the basics. Now on to the Net! 1.2 GO! Once, only people who studied or worked at an institution directly tied to the Net could connect to the world. Today, though, an ever-growing number of "public-access" systems provide access for everybody. These systems can now be found in several states, and there are a couple of sites that can provide access across the country. There are two basic kinds of these host systems. The more common one is known as a UUCP site (UUCP being a common way to transfer information among computers using the Unix operating system) and offers access to international electronic mail and conferences. However, recent years have seen the growth of more powerful sites that let you tap into the full power of the Net. These Internet sites not only give you access to electronic mail and conferences but to such services as databases, libraries and huge file and program collections around the world. They are also fast -- as soon as you finish writing a message, it gets zapped out to its destination. Some sites are run by for-profit companies; others by non-profit organizations. Some of these public-access, or host, systems, are free of charge. Others charge a monthly or yearly fee for unlimited access. And a few charge by the hour. Systems that charge for access will usually let you sign up online with a credit card. Some also let you set up a billing system. But cost should be only one consideration in choosing a host system, especially if you live in an area with more than one provider. Most systems let you look around before you sign up. What is the range of each of their services? How easy is each to use? What kind of support or help can you get from the system administrators? The last two questions are particularly important because many systems provide no user interface at all; when you connect, you are dumped right into the Unix operating system. If you're already familiar with Unix, or you want to learn how to use it, these systems offer phenomenal power -- in addition to Net access, most also let you tap into the power of Unix to do everything from compiling your own programs to playing online games. But if you don't want to have to learn Unix, there are other public-access systems that work through menus (just like the ones in restaurants; you are shown a list of choices and then you make your selection of what you want), or which provide a "user interface" that is easier to figure out than the ever cryptic Unix. If you don't want or need access to the full range of Internet services, a UUCP site makes good financial sense. They tend to charge less than commercial Internet providers, although their messages may not go out as quickly. Some systems also have their own unique local services, which can range from extensive conferences to large file libraries. 1.3 PUBLIC-ACCESS INTERNET PROVIDERS When you have your communications program dial one of these host systems, one of two things will happen when you connect. You'll either see a lot of gibberish on your screen, or you'll be asked to log in. If you see gibberish, chances are you have to change your software's parameters (to 7-1-E or 8-1-N as the case may be). Hang up, make the change and then dial in again. When you've connected, chances are you'll see something like this: Welcome to THE WORLD Public Access UNIX for the '90s Login as 'new' if you do not have an account login: That last line is a prompt asking you to do something. Since this is your first call, type new and hit enter. Often, when you're asked to type something by a host system, you'll be told what to type in quotation marks (for example, 'new'). Don't include the quotation marks. Repeat: Don't include the quotation marks. What you see next depends on the system, but will generally consist of information about its costs and services (you might want to turn on your communication software's logging function, to save this information). You'll likely be asked if you want to establish an account now or just look around the system. You'll also likely be asked for your "user name." This is not your full name, but a one-word name you want to use while online. It can be any combination of letters or numbers, all in lower case. Many people use their first initial and last name (for example, "jdoe"); their first name and the first letter of their last name (for example, "johnd"); or their initials ("jxd"). Others use a nickname. You might want to think about this for a second, because this user name will become part of your electronic-mail address (see chapter 2 for more on that). The one exception are the various Free-Net systems, all of which assign you a user name consisting of an arbitrary sequence of letters and numbers. You are now on the Net. Look around the system. See if there are any help files for you to read. If it's a menu-based host system, choose different options just to see what happens. Remember: You can't break anything. The more you play, the more comfortable you'll be. What follows is a list of public-access Internet sites, which are computer systems that offer access to the Net. All offer international e-mail and Usenet (international conferences). In addition, they offer: FTP: File-transfer protocol -- access to hundreds of file libraries (everything from computer software to historical documents to song lyrics). You'll be able to transfer these files from the Net to your own computer. Telnet: Access to databases, computerized library card catalogs, weather reports and other information services, as well as live, online games that let you compete with players from around the world. Additional services that may be offered include: WAIS: Wide-area Information Server; a program that can search dozens of databases in one search. Gopher: A program that gives you easy access to dozens of other online databases and services by making selections on a menu. You'll also be able to use these to copy text files and some programs to your mailbox. IRC: Internet Relay Chat, a CB simulator that lets you have live keyboard chats with people around the world. However, even on systems that do not provide these services directly, you will be able to use a number of them through telnet (see Chapter 6). In the list that follows, systems that let you access services through menus are noted; otherwise assume that when you connect, you'll be dumped right into Unix (a.k.a. MS-DOS with a college degree). Several of these sites are available nationwide through national data networks such as the CompuServe Packet Network and SprintNet. Please note that all listed charges are subject to change. Many sites require new or prospective users to log on a particular way on their first call; this list provides the name you'll use in such cases. ALABAMA Huntsville. Nuance. Call voice number for modem number. $35 setup; $25 a month. Voice: (205) 533-4296. ALASKA Anchorage. University of Alaska Southeast, Tundra Services, (907) 789-1314; has local dial-in service in several other cities. $20 a month. Voice: (907) 465-6453. ALBERTA Edmonton. PUCNet Computer Connections, (403) 484-5640. Log on as: guest. $10 setup fee; $25 for 20 hours a month plus $6.25 an hour for access to ftp and telnet. Voice: (403) 448-1901. ARIZONA Tucson. Data Basics, (602) 721-5887. $25 a month or $180 a year. Voice: (602) 721-1988. Phoenix/Tucson. Internet Direct, (602) 274-9600 (Phoenix); (602) 321-9600 (Tucson). Log on as: guest. $20 a month. Voice: (602) 274-0100 (Phoenix); (602) 324-0100 (Tucson). BRITISH COLUMBIA Victoria Victoria Free-Net, (604) 595-2300. Menus. Access to all features requires completion of a written form. Users can "link" to other Free-Net systems in Canada and the United States. Free. Log on as: guest Voice: (604) 389-6026. CALIFORNIA Berkeley. Holonet. Menus. For free trial, modem number is (510) 704-1058. For information or local numbers, call the voice number. $60 a year for local access, $2 an hour during offpeak hours. Voice: (510) 704-0160. Cupertino. Portal. Both Unix and menus. (408) 725-0561 (2400 bps); (408) 973-8091 (9600/14,400 bps). $19.95 setup fee, $19.95 a month. Voice: (408) 973-9111. Irvine. Dial N' CERF. See under San Diego. Los Angeles/Orange County. Kaiwan Public Access Internet, (714) 539-5726; (310) 527-7358. $15 signup; $11 a month (credit card). Voice: (714) 638-2139. Los Angeles. Dial N' CERF. See under San Diego. Oakland. Dial N' CERF. See under San Diego. Pasadena. Dial N' CERF See under San Diego. Palo Alto. Institute for Global Communications., (415) 322-0284. Unix. Local conferences on environmental/peace issues. Log on as: new. $10 a month and $3 an hour after first hour. Voice: (415) 442-0220. San Diego. Dial N' CERF USA, run by the California Education and Research Federation. Provides local dial-up numbers in San Diego, Los Angeles, Oakland, Pasadena and Irvine. For more information, call voice (800) 876-CERF or (619) 534-5087. $50 setup fee; $20 a month plus $5 an hour ($3 on weekends). Voice: (800) 876-2373. San Diego. CTS Network Services, (619) 637-3660. Log on as: help. $15 set-up fee, monthly fee of $10 to $23 depending on services used. Voice: (619) 637-3637. San Diego. Cyberspace Station, (619) 634-1376. Unix. Log on as: guest. Charges: $10 sign-up fee; $15 a month or $60 for six months. San Francisco. Pathways, call voice number for number. Menus. $25 setup fee; $8 a month and $3 an hour. Voice: (415) 346-4188. San Jose. Netcom, (510) 865-9004 or 426-6610; (408) 241-9760; (415) 424-0131, up to 9600 bps. Unix. Maintains archives of Usenet postings. Log on as: guest. $15 startup fee and then $17.50 a month for unlimited use if you agree to automatic billing of your credit-card account (otherwise $19.50 a month for a monthly invoice). Voice: (408) 554-UNIX. San Jose. A2i, (408) 293-9010. Log on as: guest. $20 a month; $45 for three months; $72 for six months. Sausalito. The Whole Earth 'Lectronic Link (WELL), (415) 332- 6106. Uses moderately difficult Picospan software, which is sort of a cross between Unix and a menu system. New users get a written manual. More than 200 WELL-only conferences. Log on as: newuser. $15 a month plus $2 an hour. Access through the nationwide CompuServe Packet Network available for another $4.50 an hour. Voice: (415) 332-4335. Recorded message about the system's current status: (800) 326-8354 (continental U.S. only). COLORADO Colorado Springs/Denver. CNS, (719) 570-1700 (Colorado Springs); (303) 758-2656 (Denver). Local calendar listings and ski and stock reports. Users can choose between menus or Unix. Log on as: new. $35 setup fee; $2.75 an hour (minimum fee of $10 a month). Voice: (719) 592- 1240. Colorado Springs. Old Colorado City Communications, (719) 632- 4111. Log on as: newuser. $25 a month. Voice: (719) 632-4848. Denver. Denver Free-Net, (303) 270-4865. Menus. Access to all services requires completion of a written form. Users can "link" to other Free-Net systems across the country. Free. Log on as: guest. Golden. Colorado SuperNet. E-mail to fax service. Available only to Colorado residents. Local dial-in numbers available in several Colorado cities. For dial-in numbers, call the number below. $3 an hour ($1 an hour between midnight and 6 a.m.); one-time $20 sign-up fee. Voice: (303) 273-3471. DELAWARE Middletown. Systems Solutions, (302) 378-1881. $20 setup fee; $25 a month for full Internet access. Voice: (800) 331-1386 FLORIDA Talahassee. Talahassee Free-Net, (904) 488-5056. Menus. Full access requires completion of a registration form. Can "link" to other Free-Net systems around the country. Voice: (904) 488-5056. GEORGIA Atlanta. Netcom, (303) 758-0101. See under Los Angeles, California, for information on rates. ILLINOIS Champaign. Prarienet Free-Net, (217) 255-9000. Menus. Log on as: visitor. Free for Illinois residents; $25 a year for others. Voice: (217) 244-1962. Chicago. MCSNet, (312) 248-0900. $25/month or $65 for three months of unlimited access; $30 for three months of access at 15 hours a month. Voice: (312) 248-UNIX. Peoria. Peoria Free-Net, (309) 674-1100. Similar to Cleveland Free-Net (see Ohio, below). Users can "link" to the larger Cleveland system for access to Usenet and other services. There are also Peoria Free-Net public-access terminals in numerous area libraries, other government buildings and senior-citizen centers. Contact the number below for specific locations. Full access (including access to e-mail) requires completion of a written application. Free. Voice: (309) 677-2544. MARYLAND Baltimore. Express Access, (410) 766-1855; (301) 220-0462; (714) 377-9784. Log on as: new. $20 setup fee; $25 a month or $250 a year. Voice: (800 969-9090. Baltimore. Clarknet, (410) 730-9786; (410) 995-0271; (301) 596- 1626; (301) 854-0446. Log on as: guest. $23 a month, $126 for six months or $228 a year. Voice: (410) 730-9765. MASSACHUSETTS Bedford. The Internet Access Company, (617) 275-0331. To log on, follow on-line prompts. $20 setup fee; $19.50 a month. Voice: (617) 275-2221. Brookline. The World, (617) 739-9753. "Online Book Initiative" collection of electronic books, poetry and other text files. Log on as: new. $5 a month plus $2 an hour or $20 for 20 hours a month. Available nationwide through the CompuServe Packet Network for another $5.60 an hour. Voice: (617) 739-0202. Lynn. North Shore Access, (617) 593-4557. Log on as: new. $10 for 10 hours a month; $1 an hour after that. Voice: (617) 593-3110. Worcester. NovaLink, (508) 754-4009. Log on as: info. $12.95 sign-up (includes first two hours); $9.95 a month (includes five daytime hours), $1.80 an hour after that. Voice: (800) 274-2814. MICHIGAN Ann Arbor. MSEN. Call voice number for dial-in number. Unix. Charges: $20 setup; $20 a month. Voice: (313) 998-4562. Ann Arbor. Michnet. Has local dial-in numbers in several Michigan numbers. For local numbers, call voice number below. $35 a month plus one-time $40 sign-up fee. Additional network fees for access through non-Michnet numbers. Voice: (313) 764-9430. NEW HAMPSHIRE Manchester. MV Communications, Inc. For local dial-up numbers call voice line below. $5 a month mininum plus variable hourly rates depending on services used. Voice: (603) 429-2223. NEW JERSEY New Brunswick. Digital Express, (908) 937-9481. Log on as: new. $20 setup fee; $25 a month or $250 a year. Voice: (800) 969-9090. NEW YORK New York. Panix, (212) 787-3100. Unix or menus. Log on as: newuser. $40 setup fee; $19 a month or $208 a year. Voice: (212) 877- 4854. New York. Echo, (212) 989-8411. Unix, but with local conferencing software. Log on as: newuser. $19.95 ($13.75 students and seniors) a month. Voice: (212) 255-3839. New York. MindVox, (212) 989-4141. Local conferences. Log on as: guest. $10 setup fee for non-credit-card accounts; $15 a month. Voice: (212) 989-2418. New York. Pipeline, (212) 267-8606 (9600 bps and higher); (212) 267-7341 (2400 bps). Offers graphical interface for Windows for $90. Log on as: guest. $20 a month and $2 an hour after first 20 hours or $35 a month unlimited hours. Voice: (212) 267-3636. New York. Maestro, (212) 240-9700. Log on as: newuser. $12 a month or $140 a year. Voice: (212) 240-9600. NORTH CAROLINA Charlotte. Vnet Internet Access, (704) 347-8839; (919) 406-1544. Log on as: new. $25 a month. Voice: (704) 374-0779. Triangle Research Park. Rock Concert Net. Call number below for local modem numbers in various North Carolina cities. $30 a month; one- time $50 sign-up fee. Voice: (919) 248-1999. OHIO Cleveland. Cleveland Free-Net, (216) 368-3888. Ohio and US Supreme Court decisions, historical documents, many local conferences. Full access (including access to e-mail) requires completion of a written application. Free. Voice: (216) 368-8737. Cincinnati. Tri-State Free-Net, (513) 579-1990. Similar to Cleveland Free-Net. Full access (including access to e-mail) requires completion of a written application. Free. Cleveland. Wariat, (216) 481-9436. Unix or menus. $20 setup fee; $35 a month. Voice: (216) 481-9428. Dayton. Freelance Systems Programming, (513) 258-7745. $20 setup fee; $1 an hour. Voice: (513) 254-7246. Lorain. Lorain County Free-Net, (216) 277-2359 or 366-9753. Similar to Cleveland Free-Net. Users can "link" to the larger Cleveland system for additional services. Full access (including access to e-mail) requires completion of a written application. Free. Voice: (216) 366-4200. Medina. Medina Free-Net, (216) 723-6732, 225-6732 or 335-6732. Users can "link" to the larger Cleveland Free-Net for additional services. Full access (including access to e-mail) requires completion of a written application. Free. Youngstown. Youngstown Free-Net, (216) 742-3072. Users can "link" to the Cleveland system for services not found locally. Full access (including access to e-mail) requires completion of a written application. Free. ONTARIO Ottawa. National Capital FreeNet, (613) 780-3733 or (613) 564-3600. Free, but requires completion of a written form for access to all services. Toronto. UUNorth. Call voice number below for local dial-in numbers. $20 startup fee; $25 for 20 hours a month of offpeak use. Voice: (416) 225-8649. Toronto. Internex Online, (416) 363-3783. Both Unix and menus. $40 a year for one hour a day. Voice: (416) 363-8676. OREGON Portland. Agora, (503) 293-1772 (2400 bps), (503) 293-2059 (9600 bps or higher). Log on as: apply. $6 a month for one hour per day. Portland. Teleport, (503) 220-0636 (2400 bps); (503) 220-1016 (9600 and higher). Log on as: new. $10 a month for one hour per day. Voice: (503) 223-4245. PENNSYLVANIA Pittsburgh. Telerama, (412) 481-5302. $6 for 10 hours a month, 60 cents for each additional hour. Voice: (412) 481-3505. QUEBEC Montreal. Communications Accessibles Montreal, (514) 931-7178 (9600 bps); (514) 931-2333 (2400 bps). $25 a month. Voice: (514) 931-0749. RHODE ISLAND East Greenwich. IDS World Network, (401) 884-9002. In addition to Usenet, has conferences from the Fidonet and RIME networks. $10 a month; $50 for six months; $100 for a year. Providence/Seekonk. Anomaly, (401) 331-3706. $125 for six months or $200 a year. Educational rate of $75 for six months or $125 a year. Voice: (401) 273-4669. TEXAS Austin. RealTime Communications, (512) 459-4391. Log on as: new. $75 a year. Voice: (512) 451-0046. Dallas. Texas Metronet, (214) 705-2901; (817) 261-1127. Log on as: info or signup. $10 to $35 setup fee, depending on service; $10 to $45 a month, depending on service. Voice: (214) 705-2900 or (817) 543-8756. Houston. The Black Box, (713) 480-2686. $21.65 a month. Voice: (713) 480-2684. VIRGINIA Norfolk/Peninsula. Wyvern Technologies, (804) 627-1828 (Norfolk); (804) 886-0662 (Peninsula). $10 startup fee; $15 a month or $144 a year. Voice: (804) 622-4289. WASHINGTON, DC The Meta Network. Call voice number below for local dial-in numbers. Caucus conferencing, menus. $15 setup fee; $20 a month. Voice: (703) 243-6622. CapAccess, (202), 784-1523. Log on as guest with a password of visitor. A Free-Net system (see under Cleveland, Ohio, for information). Free. Voice: (202) 994-4245. See also: listing under Baltimore, MD for Express Access and Clarknet. WASHINGTON STATE Seattle. Halcyon, (206) 382-6245. Users can choose between menus and Unix. Log on as: new. $10 setup fee; $60 a quarter or $200 a year. Voice: (206) 955-1050. Seattle. Eskimo North, (206) 367-3837 (all speeds), (206) 362-6731 (9600/14.4K bps). $10 a month or $96 a year. Voice: (206) 367-7457. UNITED KINGDOM London. Demon Internet Systems, 44 (0)81 343 4848. 12.50 setup fee; 10 a month or 132.50 a year. Voice: 44 (0)81 349 0063 1.4 IF YOUR TOWN HAS NO DIRECT ACCESS If you don't live in an area with a public-access site, you'll still be able to connect to the Net. Several services offer access through national data networks such as the CompuServe Packet Network and SprintNet, which have dozens, even hundreds of local dial-in numbers across the country. These include Holonet in Berkeley, Calf., Portal in Cupertino, Calf., the WELL in Sausalito, Calf., Dial 'N CERF in San Diego, Calf., the World in Brookline, Mass., and Michnet in Ann Arbor, Mich. Dial 'N CERF offers access through an 800 number. Expect to pay from $2 to $12 an hour to use these networks, above each provider's basic charges. The exact amount depends on the network, time of day and type of modem you use. For more information, contact the above services. Four other providers deliver Net access to users across the country: Delphi, based in Cambridge, Mass., is a consumer-oriented network much like CompuServe or America Online -- only it now offers subscribers access to Internet services. Delphi charges: $3 a month for Internet access, in addition to standard charges. These are $10 a month for four hours of off-peak (non-working hours) access a month and $4 an hour for each additional hour or $20 for 20 hours of access a month and $1.80 an hour for each additional hour. For more information, call (800) 695-4005. BIX (the Byte Information Exchange) offers FTP, Telnet and e-mail access to the Internet as part of their basic service. Owned by the same company as Delphi, it also offers 20 hours of access a month for $20. For more information, call (800) 695-4775. PSI, based in Reston, Va., provides nationwide access to Internet services through scores of local dial-in numbers to owners of IBM and compatible computers. PSILink. which includes access to e-mail, Usenet and ftp, costs $29 a month, plus a one-time $19 registration fee. Special software is required, but is available free from PSI. PSI's Global Dialup Service provides access to telnet for $39 a month plus a one-time $39 set-up fee. For more information, call (800) 82PSI82 or (703) 620-6651. NovX Systems Integration, based in Seattle, Washington, offers full Internet access through an 800 number reachable across the United States. There is a $24.95 setup fee, in addition to a monthly fee of $19.95 and a $10.5 hourly charge. For more information, call (206) 447-0800. 1.5 NET ORIGINS In the 1960s, researchers began experimenting with linking computers to each other and to people through telephone hook-ups, using funds from the U.S Defense Department's Advanced Research Projects Agency (ARPA). ARPA wanted to see if computers in different locations could be linked using a new technology known as packet switching. This technology, in which data meant for another location is broken up into little pieces, each with its own "forwarding address" had the promise of letting several users share just one communications line. Just as important, from ARPA's viewpoint, was that this allowed for creation of networks that could automatically route data around downed circuits or computers. ARPA's goal was not the creation of today's international computer-using community, but development of a data network that could survive a nuclear attack. Previous computer networking efforts had required a line between each computer on the network, sort of like a one-track train route. The packet system allowed for creation of a data highway, in which large numbers of vehicles could essentially share the same lane. Each packet was given the computer equivalent of a map and a time stamp, so that it could be sent to the right destination, where it would then be reassembled into a message the computer or a human could use. This system allowed computers to share data and the researchers to exchange electronic mail, or e-mail. In itself, e-mail was something of a revolution, offering the ability to send detailed letters at the speed of a phone call. As this system, known as ARPANet, grew, some enterprising college students (and one in high school) developed a way to use it to conduct online conferences. These started as science-oriented discussions, but they soon branched out into virtually every other field, as people recognized the power of being able to "talk" to hundreds, or even thousands, of people around the country. In the 1970s, ARPA helped support the development of rules, or protocols, for transferring data between different types of computer networks. These "internet" (from "internetworking") protocols made it possible to develop the worldwide Net we have today that links all sorts of computers across national boundaries. By the close of the 1970s, links developed between ARPANet and counterparts in other countries. The world was now tied together in a computer web. In the 1980s, this network of networks, which became known collectively as the Internet, expanded at a phenomenal rate. Hundreds, then thousands, of colleges, research companies and government agencies began to connect their computers to this worldwide Net. Some enterprising hobbyists and companies unwilling to pay the high costs of Internet access (or unable to meet stringent government regulations for access) learned how to link their own systems to the Internet, even if "only" for e-mail and conferences. Some of these systems began offering access to the public. Now anybody with a computer and modem -- and persistence -- could tap into the world. In the 1990s, the Net continues to grow at exponential rates. Some estimates are that the volume of messages transferred through the Net grows 20 percent a month. In response, government and other users have tried in recent years to expand the Net itself. Once, the main Net "backbone" in the U.S. moved data at 56,000 bits per second. That proved too slow for the ever increasing amounts of data being sent over it, and in recent years the maximum speed was increased to 1.5 million and then 45 million bits per second. Even before the Net was able to reach that latter speed, however, Net experts were already figuring out ways to pump data at speeds of up to 2 billion bits per second -- fast enough to send the entire Encyclopedia Britannica across the country in just one or two seconds. Another major change has been the development of commercial services that provide internetworking services at speeds comparable to those of the government system. In fact, by mid-1994, the U.S. government will remove itself from any day-to-day control over the workings of the Net, as regional and national providers continue to expand. 1.6 HOW IT WORKS The worldwide Net is actually a complex web of smaller regional networks. To understand it, picture a modern road network of trans- continental superhighways connecting large cities. From these large cities come smaller freeways and parkways to link together small towns, whose residents travel on slower, narrow residential ways. The Net superhighway is the high-speed Internet. Connected to this are computers that use a particular system of transferring data at high speeds. In the U.S., the major Internet "backbone" theoretically can move data at rates of 45 million bits per second (compare this to the average home modem, which has a top speed of roughly 9,600 to 14,400 bits per second). Connected to the backbone computers are smaller networks serving particular geographic regions, which generally move data at speeds around 1.5 million bits per second. Feeding off these in turn are even smaller networks or individual computers. Unlike with commercial networks such as CompuServe or Prodigy, there is no one central computer or computers running the Internet -- its resources are to be found among thousands of individual computers. This is both its greatest strength and its greatest weakness. The approach means it is virtually impossible for the entire Net to crash at once -- even if one computer shuts down, the rest of the network stays up. The design also reduces the costs for an individual or organization to get onto the network. But thousands of connected computers can also make it difficult to navigate the Net and find what you want -- especially as different computers may have different commands for plumbing their resources. It is only recently that Net users have begun to develop the sorts of navigational tools and "maps" that will let neophytes get around without getting lost. Nobody really knows how many computers and networks actually make up this Net. Some estimates say there are now as many as 5,000 networks connecting nearly 2 million computers and more than 15 million people around the world. Whatever the actual numbers, however, it is clear they are only increasing. The Net is more than just a technological marvel. It is human communication at its most fundamental level. The pace may be a little quicker when the messages race around the world in a few seconds, but it's not much different from a large and interesting party. You'll see things in cyberspace that will make you laugh; you'll see things that will anger you. You'll read silly little snippets and new ideas that make you think. You'll make new friends and meet people you wish would just go away. Major network providers continue to work on ways to make it easier for users of one network to communicate with those of another. Work is underway on a system for providing a universal "white pages" in which you could look up somebody's electronic-mail address, for example. This connectivity trend will likely speed up in coming years as users begin to demand seamless network access, much as telephone users can now dial almost anywhere in the world without worrying about how many phone companies actually have to connect their calls. And today, the links grow ever closer between the Internet and such commercial networks as CompuServe and Prodigy, whose users can now exchange electronic mail with their Internet friends. Some commercial providers, such as Delphi and America Online, are working to bring their subscribers direct access to Internet services. And as it becomes easier to use, more and more people will join this worldwide community we call the Net. Being connected to the Net takes more than just reading conferences and logging messages to your computer; it takes asking and answering questions, exchanging opinions -- getting involved. If you choose to go forward, to use and contribute, you will become a citizen of Cyberspace. If you're reading these words for the first time, this may seem like an amusing but unlikely notion -- that one could "inhabit" a place without physical space. But put a mark beside these words. Join the Net and actively participate for a year. Then re-read this passage. It will no longer seem so strange to be a "citizen of Cyberspace." It will seem like the most natural thing in the world. And that leads to another fundamental thing to remember: You can't break the Net! As you travel the Net, your computer may freeze, your screen may erupt into a mass of gibberish. You may think you've just disabled a million-dollar computer somewhere -- or even your own personal computer. Sooner or later, this feeling happens to everyone -- and likely more than once. But the Net and your computer are hardier than you think, so relax. You can no more break the Net than you can the phone system. If something goes wrong, try again. If nothing at all happens, you can always disconnect. If worse comes to worse, you can turn off your computer. Then take a deep breath. And dial right back in. Leave a note for the person who runs the computer to which you've connected to ask for advice. Try it again. Persistence pays. Stay and contribute. The Net will be richer for it -- and so will you. 1.7 WHEN THINGS GO WRONG * Your computer connects with a public-access site and get gibberish on your screen. If you are using parameters of 8-1-N, try 7-1-e (or vice-versa). If that doesn't work, try another modem speed. * You have your computer dial a public-access site, but nothing happens. Check the phone number you typed in. If correct, turn on your modem's speaker (on Hayes-compatible modems, you can usually do this by typing ATM1 in your communications software's "terminal mode"). If the phone just rings and rings, the public-access site could be down for maintenance or due to a crash or some other problem. If you get a "connect" message, but nothing else, try hitting enter or escape a couple of times. * You try to log in, but after you type your password, nothing happens, or you get a "timed out" message followed by a disconnect. Re-dial the number and try it again. * Always remember, if you have a problem that just doesn't go away, ask! Ask your system administrator, ask a friend, but ask. Somebody will know what to do. 1.8 FYI The Net grows so fast that even the best guide to its resources would be somewhat outdated the day it was printed. At the end of each chapter, however, you'll find FYI pointers to places on the Net where you can go for more information or to keep updated on new resources and services. Peter Kaminski maintains a list of systems that provide public access to Internet services. It's availble on the network itself, which obviously does you little good if you currently have no access, but which can prove invaluable should you move or want to find a new system. Look for his "PDIAL" file in the alt.bbs.lists or news.answers newsgroups in Usenet (for information on accessing Usenet, see Chapter 3). Steven Levy's book, "Hackers: Heroes of the Computer Revolution," (Anchor Press/Doubleday, 1984). describes the early culture and ethos that ultimately resulted in the Internet and Usenet. John Quarterman's "The Matrix: Computer Networks and Conferencing Systems Worldwide" (Digital Press, 1990) is an exhaustive look at computer networks and how they connect with each other. You'll find numerous documents about the Internet, its history and its resources in the pub/Net_info directory on the Electronic Frontier Foundation's FTP server (see chapter 7 to decipher this). Chapter 2: E-MAIL 2.1 THE BASICS Electronic mail, or e-mail, is your personal connection to the world of the Net. All of the millions of people around the world who use the Net have their own e-mail addresses. A growing number of "gateways" tie more and more people to the Net every day. When you logged onto the host system you are now using, it automatically generated an address for you, as well. The basic concepts behind e-mail parallel those of regular mail. You send mail to people at their particular addresses. In turn, they write to you at your e-mail address. You can subscribe to the electronic equivalent of magazines and newspapers. You might even get electronic junk mail. E-mail has two distinct advantages over regular mail. The most obvious is speed. Instead of several days, your message can reach the other side of the world in hours, minutes or even seconds (depending on where you drop off your mail and the state of the connections between there and your recipient). The other advantage is that once you master the basics, you'll be able to use e-mail to access databases and file libraries. You'll see how to do this later, along with learning how to transfer program and data files through e-mail. E-mail also has advantages over the telephone. You send your message when it's convenient for you. Your recipients respond at their convenience. No more telephone tag. And while a phone call across the country or around the world can quickly result in huge phone bills, e-mail lets you exchange vast amounts of mail for only a few pennies -- even if the other person is in New Zealand. E-mail is your connection to help -- your Net lifeline. The Net can sometimes seem a frustrating place! No matter how hard you try, no matter where you look, you just might not be able to find the answer to whatever is causing you problems. But when you know how to use e-mail, help is often just a few keystrokes away: you can ask your system administrator or a friend for help in an e-mail message. The quickest way to start learning e-mail is to send yourself a message. Most public-access sites actually have several different types of mail systems, all of which let you both send and receive mail. We'll start with the simplest one, known, appropriately enough, as "mail," and then look at a couple of other interfaces. At your host system's command prompt, type: mail username where username is the name you gave yourself when you first logged on. Hit enter. The computer might respond with subject: Type test or, actually, anything at all (but you'll have to hit enter before you get to the end of the screen). Hit enter. The cursor will drop down a line. You can now begin writing the actual message. Type a sentence, again, anything at all. And here's where you hit your first Unix frustration, one that will bug you repeatedly: you have to hit enter before you get to the very end of the line. Just like typewriters, many Unix programs have no word-wrapping (although there are ways to get some Unix text processors, such as emacs, to word-wrap). When done with your message, hit return. Now hit control-D (the control and the D keys at the same time). This is a Unix command that tells the computer you're done writing and that it should close your "envelope" and mail it off (you could also hit enter once and then, on a blank line, type a period at the beginning of the line and hit enter again). You've just sent your first e-mail message. And because you're sending mail to yourself, rather than to someone somewhere else on the Net, your message has already arrived, as we'll see in a moment. If you had wanted, you could have even written your message on your own computer and then uploaded it into this electronic "envelope." There are a couple of good reasons to do this with long or involved messages. One is that once you hit enter at the end of a line in "mail" you can't readily fix any mistakes on that line (unless you use some special commands to call up a Unix text processor). Also, if you are paying for access by the hour, uploading a prepared message can save you money. Remember to save the document in ASCII or text format. Uploading a document you've created in a word processor that uses special formatting commands (which these days means many programs) will cause strange effects. When you get that blank line after the subject line, upload the message using the ASCII protocol. Or you can copy and paste the text, if your software allows that. When done, hit control-D as above. Now you have mail waiting for you. Normally, when you log on, your public-access site will tell you whether you have new mail waiting. To open your mailbox and see your waiting mail, type mail and hit enter. When the host system sees "mail" without a name after it, it knows you want to look in your mailbox rather than send a message. Your screen, on a plain-vanilla Unix system will display: Mail version SMI 4.0 Mon Apr 24 18:34:15 PDT 1989 Type ? for help. "/usr/spool/mail/adamg": 1 message 1 new 1 unread >N 1 adamg Sat Jan 15 20:04 12/290 test Ignore the first line; it's just computerese of value only to the people who run your system. You can type a question mark and hit return, but unless you're familiar with Unix, most of what you'll see won't make much sense at this point. The second line tells you the directory on the host system where your mail messages are put, which again, is not something you'll likely need to know. The second line also tells you how many messages are in your mailbox, how many have come in since the last time you looked and how many messages you haven't read yet. It's the third line that is of real interest -- it tells you who the message is from, when it arrived, how many lines and characters it takes up, and what the subject is. The "N" means it is a new message -- it arrived after the last time you looked in your mailbox. Hit enter. And there's your message -- only now it's a lot longer than what you wrote! Message 1: From adamg Jan 15 20:04:55 1994 Received: by eff.org id AA28949 (5.65c/IDA-1.4.4/pen-ident for adamg); Sat, 15 Jan 1994 20:04:55 -0400 (ident-sender: adamg@eff.org) Date: Sat, 15 Jan 1994 21:34:55 -0400 From: Adam Gaffin Message-Id: <199204270134.AA28949@eff.org> To: adamg Subject: test Status: R This is only a test! Whoa! What is all that stuff? It's your message with a postmark gone mad. Just as the postal service puts its marks on every piece of mail it handles, so do Net postal systems. Only it's called a "header" instead of a postmark. Each system that handles or routes your mail puts its stamp on it. Since many messages go through a number of systems on their way to you, you will often get messages with headers that seem to go on forever. Among other things, a header will tell you exactly when a message was sent and received (even the difference between your local time and Greenwich Mean Time -- as at the end of line 4 above). If this had been a long message, it would just keep scrolling across and down your screen -- unless the people who run your public- access site have set it up to pause every 24 lines. One way to deal with a message that doesn't stop is to use your telecommunication software's logging or text-buffer function. Start it before you hit the number of the message you want to see. Your computer will ask you what you want to call the file you're about to create. After you name the file and hit enter, type the number of the message you want to see and hit enter. When the message finishes scrolling, turn off the text-buffer function. The message is now saved in your computer. This way, you can read the message while not connected to the Net (which can save you money if you're paying by the hour) and write a reply offline. But in the meantime, now what? You can respond to the message, delete it or save it. To respond, type a lowercase r and hit enter. You'll get something like this: To: adamg Subject: Re: test Note that this time, you don't have to enter a user name. The computer takes it from the message you're replying to and automatically addresses your message to its sender. The computer also automatically inserts a subject line, by adding "Re:" to the original subject. From here, it's just like writing a new message. But say you change your mind and decide not to reply after all. How do you get out of the message? Hit control-C once. You'll get this: (Interrupt -- one more to kill letter) If you hit control-C once more, the message will disappear and you'll get back to your mail's command line. Now, if you type a lowercase d and then hit enter, you'll delete the original message. Type a lowercase q to exit your mailbox. If you type a q without first hitting d, your message is transferred to a file called mbox. This file is where all read, but un-deleted messages go. If you want to leave it in your mailbox for now, type a lowercase x and hit enter. This gets you out of mail without making any changes. The mbox file works a lot like your mailbox. To access it, type mail -f mbox at your host system's command line and hit enter. You'll get a menu identical to the one in your mailbox from which you can read these old messages, delete them or respond to them. It's probably a good idea to clear out your mailbox and mbox file from time to time, if only to keep them uncluttered. Are there any drawbacks to e-mail? There are a few. One is that people seem more willing to fly off the handle electronically than in person, or over the phone. Maybe it's because it's so easy to hit r and reply to a message without pausing and reflecting a moment. That's why we have smileys (see section 2.4)! There's no online equivalent yet of a return receipt: chances are your message got to where it's going, but there's no absolute way for you to know for sure unless you get a reply from the other person. So now you're ready to send e-mail to other people on the Net. Of course, you need somebody's address to send them mail. How do you get it? Alas, the simplest answer is not what you'd call the most elegant: you call them up on the phone or write them a letter on paper and ask them. Residents of the electronic frontier are only beginning to develop the equivalent of phone books, and the ones that exist today are far from complete (still, later on, in Chapter 6, we'll show you how to use some of these directories). Eventually, you'll start corresponding with people, which means you'll want to know how to address mail to them. It's vital to know how to do this, because the smallest mistake -- using a comma when you should have used a period, for instance, can bounce the message back to you, undelivered. In this sense, Net addresses are like phone numbers: one wrong digit and you get the wrong person. Fortunately, most net addresses now adhere to a relatively easy-to-understand system. Earlier, you sent yourself a mail message using just your user- name. This was sort of like making a local phone call -- you didn't have to dial a 1 or an area code. This also works for mail to anybody else who has an account on the same system as you. Sending mail outside of your system, though, will require the use of the Net equivalent of area codes, called "domains." A basic Net address will look something like this: tomg@world.std.com Tomg is somebody's user ID, and he is at (hence the @ sign) a site (or in Internetese, a "domain") known as std.com. Large organizations often have more than one computer linked to the Internet; in this case, the name of the particular machine is world (you will quickly notice that, like boat owners, Internet computer owners always name their machines). Domains tell you the name of the organization that runs a given e-mail site and what kind of site it is or, if it's not in the U.S., what country it's located in. Large organizations may have more than one computer or gateway tied to the Internet, so you'll often see a two-part domain name; and sometimes even three- or four-part domain names. In general, American addresses end in an organizational suffix, such as ".edu," which means the site is at a college or university. Other American suffixes include: .com for businesses .org for non-profit organizations .gov and .mil for government and military agencies .net for companies or organizations that run large networks. Sites in the rest of the world tend to use a two-letter code that represents their country. Most make sense, such as .ca for Canadian sites, but there are a couple of seemingly odd ones. Swiss sites end in .ch, while South African ones end in .za. Some U.S. sites have followed this international convention (such as well.sf.ca.us). You'll notice that the above addresses are all in lower-case. Unlike almost everything else having anything at all to do with Unix, most Net mailing systems don't care about case, so you generally don't have to worry about capitalizing e-mail addresses. Alas, there are a few exceptions -- some public-access sites do allow for capital letters in user names. When in doubt, ask the person you want to write to, or let her send you a message first (recall how a person's e-mail address is usually found on the top of her message). The domain name, the part of the address after the @ sign, never has to be capitalized. It's all a fairly simple system that works very well, except, again, it's vital to get the address exactly right -- just as you have to dial a phone number exactly right. Send a message to tomg@unm.edu (which is the University of New Mexico) when you meant to send it to tomg@umn.edu (the University of Minnesota), and your letter will either bounce back to you undelivered, or go to the wrong person. If your message is bounced back to you as undeliverable, you'll get an ominous looking-message from MAILER-DAEMON (actually a rather benign Unix program that exists to handle mail), with an evil-looking header followed by the text of your message. Sometimes, you can tell what went wrong by looking at the first few lines of the bounced message. Besides an incorrect address, it's possible your host system does not have the other site in the "map" it maintains of other host systems. Or you could be trying to send mail to another network, such as Bitnet or CompuServe, that has special addressing requirements. Sometimes, figuring all this out can prove highly frustrating. But remember the prime Net commandment: Ask. Send a message to your system administrator. He or she might be able to help decipher the problem. There is one kind of address that may give your host system particular problems. There are two main ways that Unix systems exchange mail. One is known as UUCP and started out with a different addressing system than the rest of the Net. Most UUCP systems have since switched over to the standard Net addressing system, but a few traditional sites still cling to their original type, which tends to have lots of exclamation points in it, like this: uunet!somesite!othersite!mybuddy The problem for many host sites is that exclamation points (also known as "bangs") now mean something special in the more common systems or "shells" used to operate many Unix computers. This means that addressing mail to such a site (or even responding to a message you received from one) could confuse the poor computer to no end and your message never gets sent out. If that happens, try putting backslashes in front of each exclamation point, so that you get an address that looks like this: uunet\!somesite\!othersite\!mybuddy Note that this means you may not be able to respond to such a message by typing a lowercase r -- you may get an error message and you'll have to create a brand-new message. If you want to get a taste of what's possible through e-mail, start an e-mail message to almanac@oes.orst.edu Leave the "subject:" line blank. As a message, write this: send quote Or, if you're feeling a little down, write this instead: send moral-support In either case, you will get back a message within a few seconds to a few hours (depending on the state of your host system's Internet connection). If you simply asked for a quote, you'll get back a fortune-cookie-like saying. If you asked for moral support, you'll also get back a fortune-cookie-like saying, only supposedly more uplifting. This particular "mail server" is run by Oregon State University. Its main purpose is actually to provide a way to distribute agricultural information via e-mail. If you'd like to find out how to use the server's full range of services, send a message to its address with this line in it: send help You'll quickly get back a lengthy document detailing just what's available and how to get it. Feeling opinionated? Want to give the President of the United States a piece of your mind? Send a message to president@whitehouse.gov. Or if the vice president will do, write vice-president@whitehouse.gov. The "mail" program is actually a very powerful one and a Netwide standard, at least on Unix computers. But it can be hard to figure out -- you can type a question mark to get a list of commands, but these may be of limited use unless you're already familiar with Unix. Fortunately, there are a couple of other mail programs that are easier to use. 2.2 ELM -- A BETTER WAY Elm is a combination mailbox and letter-writing system that uses menus to help you navigate through mail. Most Unix-based host systems now have it online. To use it, type elm and hit enter. You'll get a menu of your waiting mail, along with a list of commands you can execute, that will look something like this: Mailbox is '/usr/spool/mail/adamg' with 38 messages [ELM 2.3 PL11] 1 Sep 1 Christopher Davis (13) here's another message. 2 Sep 1 Christopher Davis (91) This is a message from Eudora 3 Aug 31 Rita Marie Rouvali (161) First Internet Hunt !!! (fwd) 4 Aug 31 Peter Scott/Manage (69) New File University of Londo 5 Aug 30 Peter Scott/Manage (64) New File X.500 service at A 6 Aug 30 Peter Scott/Manage (39) New File DATAPAC Informatio 7 Aug 28 Peter Scott/Manage (67) Proposed Usenet group for HYTELNET n 8 Aug 28 Peter Scott/Manage (56) New File JANET Public Acces 9 Aug 26 Helen Trillian Ros (15) Tuesday 10 Aug 26 Peter Scott/Manage (151) Update Oxford University OU You can use any of the following commands by pressing the first character; d)elete or u)ndelete mail, m)ail a message, r)eply or f)orward mail, q)uit To read a message, press . j = move down, k = move up, ? = help Each line shows the date you received the message, who sent it, how many lines long the message is, and the message's subject. If you are using VT100 emulation, you can move up and down the menu with your up and down arrow keys. Otherwise, type the line number of the message you want to read or delete and hit enter. When you read a message, it pauses every 24 lines, instead of scrolling until it's done. Hit the space bar to read the next page. You can type a lowercase r to reply or a lower-case q or i to get back to the menu (the I stands for "index"). At the main menu, hitting a lowercase m followed by enter will let you start a message. To delete a message, type a lower-case d. You can do this while reading the message. Or, if you are in the menu, move the cursor to the message's line and then hit d. When you're done with elm, type a lower-case q. The program will ask if you really want to delete the messages you marked. Then, it will ask you if you want to move any messages you've read but haven't marked for deletion to a "received" file. For now, hit your n key. Elm has a major disadvantage for the beginner. The default text editor it generally calls up when you hit your r or m key is often a program called emacs. Unixoids swear by emacs, but everybody else almost always finds it impossible. Unfortunately, you can't always get away from it (or vi, another text editor often found on Unix systems), so later on we'll talk about some basic commands that will keep you from going totally nuts. If you want to save a message to your own computer, hit s, either within the message or with your cursor on the message entry in the elm menu. A filename will pop up. If you do not like it, type a new name (you won't have to backspace). Hit enter, and the message will be saved with that file name in your "home directory" on your host system. After you exit elm, you can now download it (ask your system administrator for specifics on how to download -- and upload -- such files). 2.3 PINE -- AN EVEN BETTER WAY Pine is based on elm but includes a number of improvements that make it an ideal mail system for beginners. Like elm, pine starts you with a menu. It also has an "address book" feature that is handy for people with long or complex e-mail addresses. Hitting A at the main menu puts you in the address book, where you can type in the person's first name (or nickname) followed by her address. Then, when you want to send that person a message, you only have to type in her first name or nickname, and pine automatically inserts her actual address. The address book also lets you set up a mailing list. This feature allows you to send the same message to a number of people at once. What really sets pine apart is its built-in text editor, which looks and feels a lot more like word-processing programs available for MS-DOS and Macintosh users. Not only does it have word wrap (a revolutionary concept if ever there was one), it also has a spell-checker and a search command. Best of all, all of the commands you need are listed in a two-line mini-menu at the bottom of each screen. The commands look like this: ^W Where is The little caret is a synonym for the key marked "control" on your keyboard. To find where a particular word is in your document, you'd hit your control key and your W key at the same time, which would bring up a prompt asking you for the word to look for. Some of pine's commands are a tad peculiar (control-V for "page down" for example), which comes from being based on a variant of emacs (which is utterly peculiar). But again, all of the commands you need are listed on that two-line mini-menu, so it shouldn't take you more than a couple of seconds to find the right one. To use pine, type pine at the command line and hit enter. It's a relatively new program, so some systems may not yet have it online. But it's so easy to use, you should probably send e-mail to your system administrator urging him to get it! 2.4 SMILEYS When you're involved in an online discussion, you can't see the smiles or shrugs that the other person might make in a live conversation to show he's only kidding. But online, there's no body language. So what you might think is funny, somebody else might take as an insult. To try to keep such misunderstandings from erupting into bitter disputes, we have smileys. Tilt your head to the left and look at the following sideways. :-). Or simply :). This is your basic "smiley." Use it to indicate people should not take that comment you just made as seriously as they might otherwise. You make a smiley by typing a colon, a hyphen and a right parenthetical bracket. Some people prefer using the word "grin," usually in this form: Sometimes, though, you'll see it as *grin* or even just for short. Some other smileys include: ;-) Wink; :-( Frown; :-O Surprise; 8-) Wearing glasses; =|:-)= Abe Lincoln. OK, so maybe the last two are a little bogus :-). 2.5 SENDING E-MAIL TO OTHER NETWORKS There are a number of computer networks that are not directly part of the Net, but which are now connected through "gateways" that allow the passing of e-mail. Here's a list of some of the larger networks, how to send mail to them and how their users can send mail to you: America Online Remove any spaces from a user's name and append "aol.com," to get user@aol.com America Online users who want to send mail to you need only put your Net address in the "to:" field before composing a message. ATTMail Address your message to user@attmail.com. From ATTMail, a user would send mail to you in this form: internet!domain!user So if your address were nancyr@world.std.com, your correspondent would send a message to you at internet!world.std.com!nancyr Bitnet Users of Bitnet (and NetNorth in Canada and EARN in Europe) often have addresses in this form: IZZY@INDVMS. If you're lucky, all you'll have to do to mail to that address is add "bitnet" at the end, to get izzy@indvms.bitnet. Sometimes, however, mail to such an address will bounce back to you, because Bitnet addresses do not always translate well into an Internet form. If this happens, you can send mail through one of two Internet/Bitnet gateways. First, change the @ in the address to a %, so that you get username%site.bitnet. Then add either @vm.marist.edu or @cunyvm.cuny.edu, so that, with the above example, you would get izzy%indyvms.bitnet@vm.marist.edu or izzy%indvyvms.bitnet@cunyvm.cuny.edu Bitnet users have it a little easier: They can usually send mail directly to your e-mail address without fooling around with it at all. So send them your address and they should be OK. CompuServe CompuServe users have numerical addresses in this form: 73727,545. To send mail to a CompuServe user, change the comma to a period and add "@compuserve.com"; for example: 73727.545@compuserve.com. Note that some CompuServe users must pay extra to receive mail from the Internet. If you know CompuServe users who want to send you mail, tell them to GO MAIL and create a mail message. In the address area, instead of typing in a CompuServe number, have them type your address in this form: >INTERNET:YourID@YourAddress. For example, >INTERNET:adamg@world.std.com. Note that both the ">" and the ":" are required. Delphi To send mail to a Delphi user, the form is username@delphi.com. Fidonet To send mail to people using a Fidonet BBS, you need the name they use to log onto that system and its "node number.'' Fidonet node numbers or addresses consist of three numbers, in this form: 1:322/190. The first number tells which of several broad geographic zones the BBS is in (1 represents the U.S. and Canada, 2 Europe and Israel, 3 Pacific Asia, 4 South America). The second number represents the BBS's network, while the final number is the BBS's "FidoNode'' number in that network. If your correspondent only gives you two numbers (for example, 322/190), it means the system is in zone 1. Now comes the tricky part. You have to reverse the numbers and add to them the letters f, n and z (which stand for "FidoNode,''"network,'' and "zone'). For example, the address above would become f190.n322.z1. Now add "fidonet.org'' at the end, to get f190.n322.z1.fidonet.org. Then add "FirstName.LastName@', to get FirstName.LastName@f190.n322.z1.fidonet.org Note the period between the first and last names. Also, some countries now have their own Fidonet "backbone" systems, which might affect addressing. For example, were the above address in Germany, you would end it with "fido.de" instead of "fidonet.org." Whew! The reverse process is totally different. First, the person has to have access to his or her BBS's "net mail" area and know the Fidonet address of his or her local Fidonet/UUCP gateway (often their system operator will know it). Your Fidonet correspondent should address a net-mail message to UUCP (not your name) in the "to:" field. In the node-number field, they should type in the node number of the Fidonet/UUCP gateway (if the gateway system is in the same regional network as their system, they need only type the last number, for example, 390 instead of 322/390). Then, the first line of the message has to be your Internet address, followed by a blank line. After that, the person can write the message and send it. Because of the way Fidonet moves mail, it could take a day or two for a message to be delivered in either direction. Also, because many Fidonet systems are run as hobbies, it is considered good form to ask the gateway sysop's permission if you intend to pass large amounts of mail back and forth. Messages of a commercial nature are strictly forbidden (even if it's something the other person asked for). Also, consider it very likely that somebody other than the recipient will read your messages. GEnie To send mail to a GEnie user, add "@genie.com" to the end of the GEnie user name, for example: walt@genie.com. MCIMail To send mail to somebody with an MCIMail account, add "@mcimail.com to the end of their name or numerical address. For example: 555-1212@mcimail.com or jsmith@mcimail.com Note that if there is more than one MCIMail subscriber with that name, you will get a mail message back from MCI giving you their names and numerical addresses. You'll then have to figure out which one you want and re-send the message. From MCI, a user would type Your Name (EMS) at the "To:" prompt. At the EMS prompt, he or she would type internet followed by your Net address at the "Mbx:" prompt. Peacenet To send mail to a Peacenet user, use this form: username@igc.org Peacenet subscribers can use your regular address to send you mail. Prodigy UserID@prodigy.com. Note that Prodigy users must pay extra for Internet e-mail. 2.6 SEVEN UNIX COMMANDS YOU CAN'T LIVE WITHOUT: If you connect to the Net through a Unix system, eventually you'll have to come to terms with Unix. For better or worse, most Unix systems do NOT shield you from their inner workings -- if you want to copy a Usenet posting to a file, for example, you'll have to use some Unix commands if you ever want to do anything with that file. Like MS-DOS, Unix is an operating system - it tells the computer how to do things. Now while Unix may have a reputation as being even more complex than MS-DOS, in most cases, a few basic, and simple, commands should be all you'll ever need. If your own computer uses MS-DOS or PC-DOS, the basic concepts will seem very familiar -- but watch out for the cd command, which works differently enough from the similarly named DOS command that it will drive you crazy. Also, unlike MS-DOS, Unix is case sensitive -- if you type commands or directory names in the wrong case, you'll get an error message. If you're used to working on a Mac, you'll have to remember that Unix stores files in "directories" rather than "folders." Unix directories are organized like branches on a tree. At the bottom is the "root" directory, with sub-directories branching off that (and sub-directories in turn can have sub-directories). The Mac equivalent of a Unix sub-directory is a folder within another folder. cat Equivalent to the MS-DOS "type" command. To pause a file every screen, type cat file |more where "file" is the name of the file you want to see. Hitting control-C will stop the display. Alternately, you could type more file to achieve the same result. You can also use cat for writing or uploading text files to your name or home directory (similar to the MS-DOS "copy con" command). If you type cat>test you start a file called "test." You can either write something simple (no editing once you've finished a line and you have to hit return at the end of each line) or upload something into that file using your communications software's ASCII protocol). To close the file, hit control-D. cd The "change directory" command. To change from your present directory to another, type cd directory and hit enter. Unlike MS-DOS, which uses a \ to denote sub- directories (for example: \stuff\text), Unix uses a / (for example: /stuff/text). So to change from your present directory to the stuff/text sub-directory, you would type cd stuff/text and then hit enter. As in MS-DOS, you do not need the first backslash if the subdirectory comes off the directory you're already in. To move back up a directory tree, you would type cd .. followed by enter. Note the space between the cd and the two periods -- this is where MS-DOS users will really go nuts. cp Copies a file. The syntax is cp file1 file2 which would copy file1 to file2 (or overwrite file2 with file1). ls This command, when followed by enter, tells you what's in the directory, similar to the DOS dir command, except in alphabetical order. ls | more will stop the listing every 24 lines -- handy if there are a lot of things in the directory. The basic ls command does not list "hidden" files, such as the .login file that controls how your system interacts with Unix. To see these files, type ls -a or ls -a | more ls -l will tell you the size of each file in bytes and tell you when each was created or modified. mv Similar to the MS-DOS rename command. mv file1 file2 will rename file1 as file2, The command can also be used to move files between directories. mv file1 News would move file1 to your News directory. rm Deletes a file. Type rm filename and hit enter (but beware: when you hit enter, it's gone for good). WILDCARDS: When searching for, copying or deleting files, you can use "wildcards" if you are not sure of the file's exact name. ls man* would find the following files: manual, manual.txt, man-o-man. Use a question mark when you're sure about all but one or two characters. For example, ls man? would find a file called mane, but not one called manual. 2.7 WHEN THINGS GO WRONG * You send a message but get back an ominous looking message from MAILER-DAEMON containing up to several dozen lines of computerese followed by your message. Somewhere in those lines you can often find a clue to what went wrong. You might have made a mistake in spelling the e-mail address. The site to which you're sending mail might have been down for maintenance or a problem. You may have used the wrong "translation" for mail to a non-Internet network. * You call up your host system's text editor to write a message or reply to one and can't seem to get out. If it's emacs, try control-X, control-C (in other words, hit your control key and your X key at the same time, followed by control and C). If worse comes to worse, you can hang up. * In elm, you accidentally hit the D key for a message you want to save. Type the number of the message, hit enter and then U, which will "un-delete" the message. This works only before you exit Elm; once you quit, the message is gone. * You try to upload an ASCII message you've written on your own computer into a message you're preparing in Elm or Pine and you get a lot of left brackets, capital Ms, Ks and Ls and some funny-looking characters. Believe it or not, your message will actually wind up looking fine; all that garbage is temporary and reflects the problems some Unix text processors have with ASCII uploads. But it will take much longer for your upload to finish. One way to deal with this is to call up the simple mail program, which will not produce any weird characters when you upload a text file into a message. Another way (which is better if your prepared message is a response to somebody's mail), is to create a text file on your host system with cat, for example, cat>file and then upload your text into that. Then, in elm or pine, you can insert the message with a simple command (control-R in pine, for example); only this time you won't see all that extraneous stuff. * You haven't cleared out your Elm mailbox in awhile, and you accidentally hit "y" when you meant to hit "n" (or vice-versa) when exiting and now all your messages have disappeared. Look in your News directory (at the command line, type: cd News) for a file called recieved. Those are all your messages. Unfortunately, there's no way to get them back into your Elm mailbox -- you'll have to download the file or read it online. Chapter 3: USENET I 3.1 THE GLOBAL WATERING HOLE Imagine a conversation carried out over a period of hours and days, as if people were leaving messages and responses on a bulletin board. Or imagine the electronic equivalent of a radio talk show where everybody can put their two cents in and no one is ever on hold. Unlike e-mail, which is usually "one-to-one," Usenet is "many-to- many." Usenet is the international meeting place, where people gather to meet their friends, discuss the day's events, keep up with computer trends or talk about whatever's on their mind. Jumping into a Usenet discussion can be a liberating experience. Nobody knows what you look or sound like, how old you are, what your background is. You're judged solely on your words, your ability to make a point. To many people, Usenet IS the Net. In fact, it is often confused with Internet. But it is a totally separate system. All Internet sites CAN carry Usenet, but so do many non-Internet sites, from sophisticated Unix machines to old XT clones and Apple IIs. Technically, Usenet messages are shipped around the world, from host system to host system, using one of several specific Net protocols. Your host system stores all of its Usenet messages in one place, which everybody with an account on the system can access. That way, no matter how many people actually read a given message, each host system has to store only one copy of it. Many host systems "talk" with several others regularly in case one or another of their links goes down for some reason. When two host systems connect, they basically compare notes on which Usenet messages they already have. Any that one is missing the other then transmits, and vice-versa. Because they are computers, they don't mind running through thousands, even millions, of these comparisons every day. Yes, millions. For Usenet is huge. Every day, Usenet users pump upwards of 40 million characters a day into the system -- roughly the equivalent of volumes A-G of the Encyclopedia Britannica. Obviously, nobody could possibly keep up with this immense flow of messages. Let's look at how to find conferences and discussions of interest to you. The basic building block of Usenet is the newsgroup, which is a collection of messages with a related theme (on other networks, these would be called conferences, forums, bboards or special-interest groups). There are now more than 5,000 of these newsgroups, in several diferent languages, covering everything from art to zoology, from science fiction to South Africa. Some public-access systems, typically the ones that work through menus, try to make it easier by dividing Usenet into several broad categories. Choose one of those and you're given a list of newsgroups in that category. Then select the newsgroup you're interested in and start reading. Other systems let you compile your own "reading list" so that you only see messages in conferences you want. In both cases, conferences are arranged in a particular hierarchy devised in the early 1980s. Newsgroup names start with one of a series of broad topic names. For example, newsgroups beginning with "comp." are about particular computer- related topics. These broad topics are followed by a series of more focused topics (so that "comp.unix" groups are limited to discussion about Unix). The main hierarchies are: bionet Research biology bit.listserv Conferences originating as Bitnet mailing lists biz Business comp Computers and related subjects misc Discussions that don't fit anywhere else news News about Usenet itself rec Hobbies, games and recreation sci Science other than research biology soc "Social" groups, often ethnically related talk Politics and related topics alt Controversial or unusual topics; not carried by all sites In addition, many host systems carry newsgroups for a particular city, state or region. For example, ne.housing is a newsgroup where New Englanders look for apartments. A growing number also carry K12 newsgroups, which are aimed at elementary and secondary teachers and students. And a number of sites carry clari newsgroups, which is actually a commercial service consisting of wire-service stories and a unique online computer news service (more on this in chapter 10). 3.2 NAVIGATING USENET WITH nn How do you dive right in? As mentioned, on some systems, it's all done through menus -- you just keep choosing from a list of choices until you get to the newsgroup you want and then hit the "read" command. On Unix systems, however, you will have to use a "newsreader" program. Two of the more common ones are known as rn (for "read news") and nn (for "no news" -- because it's supposed to be simpler to use). For beginners, nn may be the better choice because it works with menus -- you get a list of articles in a given newsgroup and then you choose which ones you want to see. To try it out, connect to your host system and, at the command line, type nn news.announce.newusers and hit enter. After a few seconds, you should see something like this: Newsgroup: news.announce.newusers Articles: 22 of 22/1 NEW a Gene Spafford 776 Answers to Frequently Asked Questions b Gene Spafford 362 A Primer on How to Work With the Usenet Community c Gene Spafford 387 Emily Postnews Answers Your Questions on Netiquette d Gene Spafford 101 Hints on writing style for Usenet e Gene Spafford 74 Introduction to news.announce f Gene Spafford 367 USENET Software: History and Sources g Gene Spafford 353 What is Usenet? h taylor 241 A Guide to Social Newsgroups and Mailing Lists i Gene Spafford 585 Alternative Newsgroup Hierarchies, Part I j Gene Spafford 455 >Alternative Newsgroup Hierarchies, Part II k David C Lawrenc 151 How to Create a New Newsgroup l Gene Spafford 106 How to Get Information about Networks m Gene Spafford 888 List of Active Newsgroups n Gene Spafford 504 List of Moderators o Gene Spafford 1051 Publicly Accessible Mailing Lists, Part I p Gene Spafford 1123 Publicly Accessible Mailing Lists, Part II q Gene Spafford 1193 >Publicly Accessible Mailing Lists, Part III r Jonathan Kamens 644 How to become a USENET site s Jonathan Kamen 1344 List of Periodic Informational Postings, Part I -- 15:52 -- SELECT -- help:? -----Top 85%----- Explanatory postings for new users. (Moderated) Obviously, this is a good newsgroup to begin your exploration of Usenet! Here's what all this means: The first letter on each line is the letter you type to read that particular "article" (it makes sense that a "newsgroup" would have "articles"). Next comes the name of the person who wrote that article, followed by its length, in lines, and what the article is about. At the bottom, you see the local time at your access site, what you're doing right now (i.e., SELECTing articles), which key to hit for some help (the ? key) and how many of the articles in the newsgroup you can see on this screen. The "(moderated)" means the newsgroup has a "moderator" who is the only one who can directly post messages to it. This is generally limited to groups such as this, which contain articles of basic information, or for digests, which are basically online magazines (more on them in a bit). Say you're particularly interested in what "Emily Postnews" has to say about proper etiquette on Usenet. Hit your c key (lower case!), and the line will light up. If you want to read something else, hit the key that corresponds to it. And if you want to see what's on the next page of articles, hit return or your space bar. But you're impatient to get going, and you want to read that article now. The command for that in nn is a capital Z. Hit it and you'll see something like this: Gene Spafford: Emily Postnews Answers Your Questions on NetiquetteSep 92 04:17 Original-author: brad@looking.on.ca (Brad Templeton) Archive-name: emily-postnews/part1 Last-change: 30 Nov 91 by brad@looking.on.ca (Brad Templeton) **NOTE: this is intended to be satirical. If you do not recognize it as such, consult a doctor or professional comedian. The recommendations in this article should recognized for what they are -- admonitions about what NOT to do. "Dear Emily Postnews" Emily Postnews, foremost authority on proper net behaviour, gives her advice on how to act on the net. ============================================================================ Dear Miss Postnews: How long should my signature be? -- verbose@noisy A: Dear Verbose: Please try and make your signature as long as you -- 09:57 --.announce.newusers-- LAST --help:?--Top 4%-- The first few lines are the message's header, similar to the header you get in e-mail messages. Then comes the beginning of the message. The last line tells you the time again, the newsgroup name (or part of it, anyway), the position in your message stack that this message occupies, how to get help, and how much of the message is on screen. If you want to keep reading this message, just hit your space bar (not your enter key!) for the next screen and so on until done. When done, you'll be returned to the newsgroup menu. For now hit Q (upper case this time), which quits you out of nn and returns you to your host system's command line. To get a look at another interesting newsgroup, type nn comp.risks and hit enter. This newsgroup is another moderated group, this time a digest of all the funny and frightening ways computers and the people who run and use them can go wrong. Again, you read articles by selecting their letters. If you're in the middle of an article and decide you want to go onto the next one, hit your n key. Now it's time to look for some newsgroups that might be of particular interest to you. Unix host systems that have nn use a program called nngrep (ever get the feeling Unix was not entirely written in English?) that lets you scan newsgroups. Exit nn and at your host system's command line, type nngrep word where word is the subject you're interested in. If you use a Macintosh computer, you might try nngrep mac You'll get something that looks like this: alt.music.machines.of.loving.grace alt.religion.emacs comp.binaries.mac comp.emacs comp.lang.forth.mac comp.os.mach comp.sources.mac comp.sys.mac.announce comp.sys.mac.apps comp.sys.mac.comm comp.sys.mac.databases comp.sys.mac.digest comp.sys.mac.games comp.sys.mac.hardware comp.sys.mac.hypercard comp.sys.mac.misc comp.sys.mac.programmer comp.sys.mac.system comp.sys.mac.wanted gnu.emacs.announce gnu.emacs.bug gnu.emacs.gnews gnu.emacs.gnus gnu.emacs.help gnu.emacs.lisp.manual gnu.emacs.sources gnu.emacs.vm.bug gnu.emacs.vm.info gnu.emacs.vms Note that some of these obviously have something to do with Macintoshes while some obviously do not; nngrep is not a perfect system. If you want to get a list of ALL the newsgroups available on your host system, type nngrep -a |more or nngrep -a |pg and hit enter (which one to use depends on the Unix used on your host system; if one doesn't do anything, try the other). You don't absolutely need the |more or |pg, but if you don't include it, the list will keep scrolling, rather than pausing every 24 lines. If you are in nn, hitting a capital Y will bring up a similar list. Typing "nn newsgroup" for every newsgroup can get awfully tiring after awhile. When you use nn, your host system looks in a file called .newsrc. This is basically a list of every newsgroup on the host system along with notations on which groups and articles you have read (all maintained by the computer). You can also use this file to create a "reading list" that brings up each newsgroup to which you want to "subscribe." To try it out, type nn without any newsgroup name, and hit enter. Unfortunately, you will start out with a .newsrc file that has you "subscribed" to every single newsgroup on your host system! To delete a newsgroup from your reading list, type a capital U while its menu is on the screen. The computer will ask you if you're sure you want to "unsubscribe." If you then hit a Y, you'll be unsubscribed and put in the next group. With many host systems carrying thousands of newsgroups, this will take you forever. Fortunately, there are a couple of easier ways to do this. Both involve calling up your .newsrc file in a word or text processor. In a .newsrc file, each newsgroup takes up one line, consisting of the group's name, an exclamation point or a colon and a range of numbers. Newsgroups with a colon are ones to which you are subscribed; those followed by an exclamation point are "un-subscribed." To start with a clean slate, then, you have to change all those colons to exclamation points. If you know how to use emacs or vi, call up the .newsrc file (you might want to make a copy of .newsrc first, just in case), and use the search-and-replace function to make the change. If you're not comfortable with these text processor, you can download the .newsrc file, make the changes on your own computer and then upload the revised file. Before you download the file, however, you should do a couple of things. One is to type cp .newsrc temprc and hit enter. You will actually download this temprc file (note the name does not start with a period -- some computers, such as those using MS-DOS, do not allow file names starting with periods). After you download the file, open it in your favorite word processor and use its search-and-replace function to change the exclamation points to colons. Be careful not to change anything else! Save the document in ASCII or text format. Dial back into your host system. At the command line, type cp temprc temprc1 and hit enter. This new file will serve as your backup .newsrc file just in case something goes wrong. Upload the temprc file from your computer. This will overwrite the Unix system's old temprc file. Now type cp temprc .newsrc and hit enter. You now have a clean slate to start creating a reading list. 3.3 nn COMMANDS To mark a specific article for reading, type the letter next to it (in lower case). To mark a specific article and all of its responses, type the letter and an asterisk, for example: a* To un-select an article, type the letter next to it (again, in lower case). C Cancels an article (around the world) that you wrote. Every article posted on Usenet has a unique ID number. Hitting a capital C sends out a new message that tells host systems that receive it to find earlier message and delete it. F To post a public response, or follow-up. If selected while still on a newsgroup "page", asks you which article to follow up. If selected while in a specific article, will follow up that article. In either case, you'll be asked if you want to include the original article in yours. Caution: puts you in whatever text editor is your default. N Goes to the next subscribed newsgroup with unread articles. P Goes to the previous subscribed newsgroup with unread articles. G news.group Goes to a specific newsgroup. Can be used to subscribe to new newsgroups. Hitting G brings up a sub-menu: u Goes to the group and shows only un-read articles. a Goes to the group and shows all articles, even ones you've already read. s Will show you only articles with a specific subject. n Will show you only articles from a specific person. M Mails a copy of the current article to somebody. You'll be asked for the recipient's e-mail address and whether you want to add any comments to the article before sending it off. As with F, puts you in the default editor. :post Post an article. You'll be asked for the name of the group. Q Quit, or exit, nn. U Un-subscribe from the current newsgroup. R Responds to an article via e-mail. space Hitting the space bar brings up the next page of articles. X If you have selected articles, this will show them to you and then take you to the next subscribed newsgroup with unread articles. If you don't have any selected articles, it marks all articles as read and takes you to the next unread subscribed newsgroup. =word Finds and marks all articles in the newsgroup with a specific word in the "subject:" line, for example: =modem Z Shows you selected articles immediately and then returns you to the current newsgroup. ? Brings up a help screen. < Goes to the previous page in the newsgroup. > Goes to the next page in the newsgroup. $ Goes to the last page in an article. ^ Goes to the first page in an article. 3.4 USING rn Some folks prefer this older newsreader. If you type rn news.announce.newusers at your host system's command line, you'll see something like this: ******** 21 unread articles in news.announce.newusers--read now? [ynq] If you hit your Y key, the first article will appear on your screen. If you want to see what articles are available first, though, hit your computer's = key and you'll get something like this: 152 Introduction to news.announce 153 A Primer on How to Work With the Usenet Community 154 What is Usenet? 155 Answers to Frequently Asked Questions 156 Hints on writing style for Usenet 158 Alternative Newsgroup Hierarchies, Part I 159 Alternative Newsgroup Hierarchies, Part II 160 Emily Postnews Answers Your Questions on Netiquette 161 USENET Software: History and Sources 162 A Guide to Social Newsgroups and Mailing Lists 163 How to Get Information about Networks 164 How to Create a New Newsgroup 169 List of Active Newsgroups 170 List of Moderators 171 Publicly Accessible Mailing Lists, Part I 172 Publicly Accessible Mailing Lists, Part II 173 Publicly Accessible Mailing Lists, Part III 174 How to become a USENET site 175 List of Periodic Informational Postings, Part I 176 List of Periodic Informational Postings, Part II 177 List of Periodic Informational Postings, Part III End of article 158 (of 178)--what next? [npq] Notice how the messages are in numerical order this time, and don't tell you who sent them. Article 154 looks interesting. To read it, type in 154 and hit enter. You'll see something like this: Article 154 (20 more) in news.announce.newusers (moderated): From: spaf@cs.purdue.EDU (Gene Spafford) Newsgroups: news.announce.newusers,news.admin,news.answers Subject: What is Usenet? Date: 20 Sep 92 04:17:26 GMT Followup-To: news.newusers.questions Organization: Dept. of Computer Sciences, Purdue Univ. Lines: 353 Supersedes: Archive-name: what-is-usenet/part1 Original from: chip@tct.com (Chip Salzenberg) Last-change: 19 July 1992 by spaf@cs.purdue.edu (Gene Spafford) The first thing to understand about Usenet is that it is widely misunderstood. Every day on Usenet, the "blind men and the elephant" phenomenon is evident, in spades. In my opinion, more flame wars arise because of a lack of understanding of the nature of Usenet than from any other source. And consider that such flame wars arise, of necessity, among people who are on Usenet. Imagine, then, how poorly understood Usenet must be by those outside! --MORE--(7%) This time, the header looks much more like the gobbledygook you get in e-mail messages. To keep reading, hit your space bar. If you hit your n key (lower case), you'll go to the next message in the numerical order. To escape rn, just keep hitting your q key (in lower case), until you get back to the command line. Now let's set up your reading list. Because rn uses the same .newsrc file as nn, you can use one of the search-and-replace methods described above. Or you can do this: Type rn and hit enter. When the first newsgroup comes up on your screen, hit your u key (in lower case). Hit it again, and again, and again. Or just keep it pressed down (if your computer starts beeping, let up for a couple of seconds). Eventually, you'll be told you're at the end of the newsgroups, and asked what you want to do next. Here's where you begin entering newsgroups. Type g newsgroup (for example, g comp.sys.mac.announce) and hit enter. You'll be asked if you want to "subscribe." Hit your y key. Then type g next newsgroup (for example, g comp.announce.newusers) and hit enter. Repeat until done. This process will also set up your reading list for nn, if you prefer that newsreader. But how do you know which newsgroups to subscribe? Typing a lowercase l and then hitting enter will show you a list of all available newsgroups. Again, since there could be more than 2,000 newsgroups on your system, this might not be something you want to do. Fortunately, you can search for groups with particular words in their names, using the l command. Typing l mac followed by enter, will bring up a list of newsgroups with those letters in them (and as in nn, you will also see groups dealing with emacs and the like, in addition to groups related to Macintosh computers). Because of the vast amount of messages transmitted over Usenet, most systems carry messages for only a few days or weeks. So if there's a message you want to keep, you should either turn on your computer's screen capture or save it to a file which you can later download). To save a message as a file in rn, type s filename where filename is what you want to call the file. Hit enter. You'll be asked if you want to save it in "mailbox format." In most cases, you can answer with an n (which will strip off the header). The message will now be saved to a file in your News directory (which you can access by typing cd News and then hitting enter). Also, some newsgroups fill up particularly quickly -- go away for a couple of days and you'll come back to find hundreds of articles! One way to deal with that is to mark them as "read" so that they no longer appear on your screen. In nn, hit a capital J; in rn, a small c. 3.5 rn COMMANDS Different commands are available to you in rn depending on whether you are already in a newsgroup or reading a specific article. At any point, typing a lowercase h will bring up a list of available commands and some terse instructions for using them. Here are some of them: After you've just called up rn, or within a newsgroup: c Marks every article in a newsgroup as read (or "caught up") so that you don't have to see them again. The system will ask you if you are sure. Can be done either when asked if you want to read a particular newsgroup or once in the newsgroup. g Goes to a newsgroup, in this form: g news.group Use this both for going to groups to which you're already subscribed and subscribing to new groups. h Provides a list of available commands with terse instructions. l Gives a list of all available newsgroups. p Goes to the first previous subscribed newsgroup with un-read articles. q Quits, or exits, rn if you have not yet gone into a newsgroup. If you are in a newsgroup, it quits that one and brings you to the next subscribed newsgroup. Only within a newsgroup: = Gives a list of all available articles in the newsgroup. m Marks a specific article or series of articles as "un-read" again so that you can come back to them later. Typing 1700m and hitting enter would mark just that article as un-read. Typing 1700-1800m and hitting enter would mark all of those articles as un- read. space Brings up the next page of article listings. If already on the last page, displays the first article in the newsgroup. u Un-subscribe from the newsgroup. /text/ Searches through the newsgroup for articles with a specific word or phrase in the "subject:" line, from the current article to the end of the newsgroup. For example, /EFF/ would bring you to the first article with "EFF" in the "subject:" line. ?text? The same as /text/ except it searches in reverse order from the current article. Only within a specific article: e Some newsgroups consist of articles that are binary files, typically programs or graphics images. Hitting e will convert the ASCII characters within such an article into a file you can then download and use or view (assuming you have the proper computer and software). Many times, such files will be split into several articles; just keep calling up the articles and hitting e until done. You'll find the resulting file in your News subdirectory. C If you post an article and then decide it was a mistake, call it up on your host system and hit this. The message will soon begin disappearing on systems around the world. F Post a public response in the newsgroup to the current article. Includes a copy of her posting, which you can then edit down using your host system's text editor. f The same as above except it does not include a copy of the original message in yours. m Marks the current article as "un-read" so that you can come back to it later. You do not have to type the article number. Control-N Brings up the first response to the article. If there is no follow-up article, this returns you to the first unread article in the newsgroup). Control-P Goes to the message to which the current article is a reply. n Goes to the next unread article in the newsgroup. N Takes you to the next article in the newsgroup even if you've already read it. q Quits, or exits, the current article. Leaves you in the current newsgroup. R Reply, via e-mail only, to the author of the current article. Includes a copy of his message in yours. r The same as above, except it does not include a copy of his article. s file Copies the current article to a file in your News directory, where "file" is the name of the file you want to save it to. You'll be asked if you want to use "mailbox" format when saving. If you answer by hitting your N key, most of the header will not be saved. s|mail user Mails a copy of the article to somebody. For "user" substitute an e-mail address. Does not let you add comments to the message first, however. space Hitting the space bar shows the next page of the article, or, if at the end, goes to the next un-read article. 3.6 ESSENTIAL NEWSGROUPS With so much to choose from, everybody will likely have their own unique Usenet reading list. But there are a few newsgroups that are particularly of interest to newcomers. Among them: news.announce.newusers This group consists of a series of articles that explain various facets of Usenet. news.newusers.questions This is where you can ask questions (we'll see how in a bit) about how Usenet works. news.announce.newsgroups Look here for information about new or proposed newsgroups. news.answers Contains lists of "Frequently Asked Questions" (FAQs) and their answers from many different newsgroups. Learn how to fight jet lag in the FAQ from rec.travel.air; look up answers to common questions about Microsoft Windows in an FAQ from comp.os.ms-windows; etc. alt.internet.services Looking for something in particular on the Internet? Ask here. alt.infosystems.announce People adding new information services to the Internet will post details here. 3.7 SPEAKING UP "Threads" are an integral part of Usenet. When somebody posts a message, often somebody else will respond. Soon, a thread of conversation begins. Following these threads is relatively easy. In nn, related messages are grouped together. In rn, when you're done with a message, you can hit control-N to read the next related message, or followup. As you explore Usenet, it's probably a good idea to read discussions for awhile before you jump in. This way, you can get a feel for the particular newsgroup -- each has its own rhythms. Eventually, though, you'll want to speak up. There are two main ways to do this. You join an existing conversation, or you can start a whole new thread. If you want to join a discussion, you have to decide if you want to include portions of the message you are responding to in your message. The reason to do this is so people can see what you're responding to, just in case the original message has disappeared from their system (remember that most Usenet messages have a short life span on the average host system) or they can't find it. If you're using a Unix host system, joining an existing conversation is similar in both nn and rn: hit your F key when done with a given article in the thread. In rn, type a small f if you don't want to include portions of the message you're responding to; an uppercase F if you do. In nn, type a capital F. You'll then be asked if you want to include portions of the original message. And here's where you hit another Unix wall. When you hit your F key, your host system calls up its basic Unix text editor. If you're lucky, that'll be pico, a very easy system. More likely, however, you'll get dumped into emacs (or possibly vi), which you've already met in the chapter on e-mail. The single most important emacs command is control-x control-c This means, depress your control key and hit x. Then depress the control key and hit c. Memorize this. In fact, it's so important, it bears repeating: control-x control-c These keystrokes are how you get out of emacs. If they work well, you'll be asked if you want to send, edit, abort or list the message you were working on. If they don't work well (say you accidentally hit some other weird key combination that means something special to emacs) and nothing seems to happen, or you just get more weird-looking emacs prompts on the bottom of your screen, try hitting control-g. This should stop whatever emacs was trying to do (you should see the word "quit" on the bottom of your screen), after which you can hit control-x control-c. But if this still doesn't work, remember that you can always disconnect and dial back in! If you have told your newsreader you do want to include portions of the original message in yours, it will automatically put the entire thing at the top of your message. Use the arrow keys to move down to the lines you want to delete and hit control-K, which will delete one line at a time. You can then write your message. Remember that you have to hit enter before your cursor gets to the end of the line, because emacs does not have word wrapping. When done, hit control-X control-C. You'll be asked the question about sending, editing, aborting, etc. Choose one. If you hit Y, your host system will start the process to sending your message across the Net. The nn and rn programs work differently when it comes to posting entirely new messages. In nn, type :post and hit enter in any newsgroup. You'll be asked which newsgroup to post a message to. Type in its name and hit enter. Then you'll be asked for "keywords." These are words you'd use to attract somebody scanning a newsgroup. Say you're selling your car. You might type the type of car here. Next comes a "summary" line, which is somewhat similar. Finally, you'll be asked for the message's "distribution." This is where you put how widely you want your message disseminated. Think about this one for a second. If you are selling your car, it makes little sense to send a message about it all over the world. But if you want to talk about the environment, it might make a lot of sense. Each host system has its own set of distribution classifications, but there's generally a local one (just for users of that system), one for the city, state or region it's in, another for the country (for example, usa), one for the continent (for Americans and Canadians, na) and finally, one for the entire world (usually: world). Which one to use? Generally, a couple of seconds' thought will help you decide. If you're selling your car, use your city or regional distribution -- people in Australia won't much care and may even get annoyed. If you want to discuss presidential politics, using a USA distribution makes more sense. If you want to talk about events in the Middle East, sending your message to the entire world is perfectly acceptable. Then you can type your message. If you've composed your message offline (generally a good idea if you and emacs don't get along), you can upload it now. You may see a lot of weird looking characters as it uploads into emacs, but those will disappear when you hit control-X and then control-C. Alternately: "save" the message (for example, by hitting m in rn), log out, compose your message offline, log back on and upload your message into a file on your host system. Then call up Usenet, find the article you "saved." Start a reply, and you'll be asked if you want to include a prepared message. Type in the name of the file you just created and hit enter. In rn, you have to wait until you get to the end of a newsgroup to hit F, which will bring up a message-composing system. Alternately, at your host system's command line, you can type Pnews and hit enter. You'll be prompted somewhat similarly to the nn system, except that you'll be given a list of possible distributions. If you chose "world," you'll get this message: This program posts news to thousands of machines throughout the entire civilized world. Your message will cost the net hundreds if not thousands of dollars to send everywhere. Please be sure you know what you are doing. Are you absolutely sure that you want to do this? [ny] Don't worry -- your message won't really cost the Net untold amounts, although, again, it's a good idea to think for a second whether your message really should go everywhere. If you want to respond to a given post through e-mail, instead of publicly, hit R in nn or r or R in rn. In rn, as with follow-up articles, the upper-case key includes the original message in yours. Most newsgroups are unmoderated, which means that every message you post will eventually wind up on every host system within the geographic region you specified that carries that newsgroup. Some newsgroups, however, are moderated, as you saw earlier with comp.risks. In these groups, messages are shipped to a single location where a moderator, acting much like a magazine editor, decides what actually gets posted. In some cases, groups are moderated like scholarly journals. In other cases, it's to try to cut down on the massive number of messages that might otherwise be posted. You'll notice that many articles in Usenet end with a fancy "signature" that often contains some witty saying, a clever drawing and, almost incidentally, the poster's name and e-mail address. You too can have your own "signature" automatically appended to everything you post. On your own computer, create a signature file. Try to keep it to four lines or less, lest you annoy others on the Net. Then, while connected to your host system, type cat>.signature and hit enter (note the period before the s). Upload your signature file into this using your communications software's ASCII upload protocol. When done, hit control-D, the Unix command for closing a file. Now, every time you post a message, this will be appended to it. There are a few caveats to posting. Usenet is no different from a Town Meeting or publication: you're not supposed to break the law, whether that's posting copyrighted material or engaging in illegal activities. It is also not a place to try to sell products (except in certain biz. and for-sale newsgroups). 3.8 CROSS-POSTING Sometimes, you'll have an issue you think should be discussed in more than one Usenet newsgroup. Rather than posting individual messages in each group, you can post the same message in several groups at once, through a process known as cross-posting. Say you want to start a discussion about the political ramifications of importing rare tropical fish from Brazil. People who read rec.aquaria might have something to say. So might people who read alt.politics.animals and talk.politics.misc. Cross-posting is easy. It also should mean that people on other systems who subscribe to several newsgroups will see your message only once, rather than several times -- news-reading software can cancel out the other copies once a person has read the message. When you get ready to post a message (whether through Pnews for rn or the :post command in nn), you'll be asked in which newsgroups. Type the names of the various groups, separated by a comma, but no space, for example: rec.aquaria,alt.politics.animals,talk.politics.misc and hit enter. After answering the other questions (geographic distribution, etc.), the message will be posted in the various groups (unless one of the groups is moderated, in which case the message goes to the moderator, who decides whether to make it public). It's considered bad form to post to an excessive number of newsgroups, or inappropriate newsgroups. Probably, you don't really have to post something in 20 different places. And while you may think your particular political issue is vitally important to the fate of the world, chances are the readers of rec.arts.comics will not, or at least not important enough to impose on them. You'll get a lot of nasty e-mail messages demanding you restrict your messages to the "appropriate" newsgroups. Chapter 4: USENET II 4.1 FLAME, BLATHER AND SPEW Something about online communications seems to make some people particularly irritable. Perhaps it's the immediacy and semi-anonymity of it all. Whatever it is, there are whole classes of people you will soon think seem to exist to make you miserable. Rather than pausing and reflecting on a message as one might do with a letter received on paper, it's just so easy to hit your R key and tell somebody you don't really know what you really think of them. Even otherwise calm people sometimes find themselves turning into raving lunatics. When this happens, flames erupt. A flame is a particularly nasty, personal attack on somebody for something he or she has written. Periodically, an exchange of flames erupts into a flame war that begin to take up all the space in a given newsgroup (and sometimes several; flamers like cross-posting to let the world know how they feel). These can go on for weeks (sometimes they go on for years, in which case they become "holy wars," usually on such topics as the relative merits of Macintoshes and IBMs). Often, just when they're dying down, somebody new to the flame war reads all the messages, gets upset and issues an urgent plea that the flame war be taken to e- mail so everybody else can get back to whatever the newsgroup's business is. All this usually does, though, is start a brand new flame war, in which this poor person comes under attack for daring to question the First Amendment, prompting others to jump on the attackers for impugning this poor soul... You get the idea. Every so often, a discussion gets so out of hand that somebody predicts that either the government will catch on and shut the whole thing down or somebody will sue to close down the network, or maybe even the wrath of God will smote everybody involved. This brings what has become an inevitable rejoinder from others who realize that the network is, in fact, a resilient creature that will not die easily: "Imminent death of Usenet predicted. Film at 11.'' Flame wars can be tremendously fun to watch at first. They quickly grow boring, though. And wait until the first time you're attacked! Flamers are not the only net.characters to watch out for. Spewers assume that whatever they are particularly concerned about either really is of universal interest or should be rammed down the throats of people who don't seem to care -- as frequently as possible. You can usually tell a spewer's work by the number of articles he posts in a day on the same subject and the number of newsgroups to which he then sends these articles -- both can reach well into double digits. Often, these messages relate to various ethnic conflicts around the world. Frequently, there is no conceivable connection between the issue at hand and most of the newsgroups to which he posts. No matter. If you try to point this out in a response to one of these messages, you will be inundated with angry messages that either accuse you of being an insensitive racist/American/whatever or ignore your point entirely to bring up several hundred more lines of commentary on the perfidy of whoever it is the spewer thinks is out to destroy his people. Closely related to these folks are the Holocaust revisionists, who periodically inundate certain groups (such as soc.history) with long rants about how the Holocaust never really happened. Some people attempt to refute these people with facts, but others realize this only encourages them. Blatherers tend to be more benign. Their problem is that they just can't get to the point -- they can wring three or four screenfuls out of a thought that others might sum up in a sentence or two. A related condition is excessive quoting. People afflicted with this will include an entire message in their reply rather than excising the portions not relevant to whatever point they're trying to make. The worst quote a long message and then add a single line: "I agree!" or some such, often followed by a monster .signature (see section 4.5) There are a number of other Usenet denizens you'll soon come to recognize. Among them: Net.weenies. These are the kind of people who enjoy Insulting others, the kind of people who post nasty messages in a sewing newsgroup just for the hell of it. Net.geeks. People to whom the Net is Life, who worry about what happens when they graduate and they lose their free, 24-hour access. Net.gods. The old-timers; the true titans of the Net and the keepers of its collective history. They were around when the Net consisted of a couple of computers tied together with baling wire. Lurkers. Actually, you can't tell these people are there, but they are. They're the folks who read a newsgroup but never post or respond. Wizards. People who know a particular Net-related topic inside and out. Unix wizards can perform amazing tricks with that operating system, for example. Net.saints. Always willing to help a newcomer, eager to share their knowledge with those not born with an innate ability to navigate the Net, they are not as rare as you might think. Post a question about something and you'll often be surprised how many responses you get. The last group brings us back to the Net's oral tradition. With few written guides, people have traditionally learned their way around the Net by asking somebody, whether at the terminal next to them or on the Net itself. That tradition continues: if you have a question, ask. Today, one of the places you can look for help is in the news.newusers.questions newsgroup, which, as its name suggests, is a place to learn more about Usenet. But be careful what you post. Some of the Usenet wizards there get cranky sometimes when they have to answer the same question over and over again. Oh, they'll eventually answer your question, but not before they tell you should have asked your host system administrator first or looked at the postings in news.announce.newusers. 4.2 KILLFILES, THE CURE FOR WHAT AILS YOU As you keep reading Usenet, you are going to run across things or people that really drive you nuts -- or that you just get tired of seeing. Killfiles are just the thing for you. When you start your newsreader, it checks to see if you have any lists of words, phrases or names you don't want to see. If you do, then it blanks out any messages containing those words. Such as cascades. As you saw earlier, when you post a reply to a message and include parts of that message, the original lines show up with a > in front of them. Well, what if you reply to a reply? Then you get a >> in front of the line. And if you reply to that reply? You get >>>. Keep this up, and soon you get a triangle of >'s building up in your message. There are people who like building up these triangles, or cascades. They'll "respond" to your message by deleting everything you've said, leaving only the "In message 123435, you said:" part and the last line of your message, to which they add a nonsensical retort. On and on they go until the triangle has reached the right end of the page. Then they try to expand the triangle by deleting one > with each new line. Whoever gets to finish this mega-triangle wins. There is even a newsgroup just for such folks: alt.cascade. Unfortunately, cascaders would generally rather cascade in other newsgroups. Because it takes a lot of messages to build up a completed cascade, the targeted newsgroup soon fills up with these messages. Of course, if you complain, you'll be bombarded with messages about the First Amendment and artistic expression -- or worse, with another cascade. The only thing you can do is ignore them, by setting up a killfile. There are also certain newsgroups where killfiles will come in handy because of the way the newsgroups are organized. For example, readers of rec.arts.tv.soaps always use an acronym in their subject: line for the show they're writing about (AMC, for example, for "All My Children"). This way, people who only want to read about "One Life to Live" can blank out all the messages about "The Young and the Restless" and all the others (to keep people from accidentally screening out messages that might contain the letters "gh" in them, "General Hospital" viewers always use "gh:" in their subject lines). Both nn and rn let you create killfiles, but in different ways. To create a killfile in nn, go into the newsgroup with the offending messages and type a capital K. You'll see this at the bottom of your screen: AUTO (k)ill or (s)elect (CR => Kill subject 30 days) If you hit return, nn will ask you which article's subject you're tired of. Choose one and the article and any follow-ups will disappear, and you won't see them again for 30 days. If you type a lower-case k instead, you'll get this: AUTO KILL on (s)ubject or (n)ame (s) If you hit your S key or just enter, you'll see this: KILL Subject: (=/) Type in the name of the offending word or phrase and hit enter. You'll then be prompted: KILL in (g)roup 'eff.test' or in (a)ll groups (g) except that the name of the group you see will be the one you're actually in at the moment. Because cascaders and other annoying people often cross-post their messages to a wide range of newsgroups, you might consider hitting a instead of g. Next comes: Lifetime of entry in days (p)ermanent (30) The P key will screen out the offending articles forever, while hitting enter will do it for 30 days. You can also type in a number of days for the blocking. Creating killfiles in rn works differently -- its default killfile generator only works for messages in specific groups, rather than globally for your entire newsgroup list. To create a global killfile, you'll have to write one yourself. To create a killfile in rn, go into the newsgroup where the offending messages are and type in its number so you get it on your screen. Type a capital K. From now on, any message with that subject line will disappear before you read the group. You should probably choose a reply, rather than the original message, so that you will get all of the followups (the original message won't have a "Re: " in its subject line). The next time you call up that newsgroup, rn will tell you it's killing messages. When it's done, hit the space bar to go back into reading mode. To create a "global" kill file that will automatically wipe out articles in all groups you read, start rn and type control-K. This will start your whatever text editor you have as your default on your host system and create a file (called KILL, in your News subdirectory). On the first line, you'll type in the word, phrase or name you don't want to see, followed by commands that tell rn whether to search an entire message for the word or name and then what to do when it finds it. Each line must be in this form /pattern/modifier:j "Pattern" is the word or phrase you want rn to look for. It's case-insensitive: both "test" and "Test" will be knocked out. The modifier tells rn whether to limit its search to message headers (which can be useful when the object is to never see messages from a particular person): a: Looks through an entire message h: Looks just at the header You can leave out the modifier command, in which case rn will look only at the subject line of messages. The "j" at the end tells rn to screen out all articles with the offending word. So if you never want to see the word "foo" in any header, ever again, type this: /foo/h:j This is particularly useful for getting rid of articles from people who post in more than one newsgroup, such as cascaders, since an article's newsgroup name is always in the header. If you just want to block messages with a subject line about cascades, you could try: /foo/:j To kill anything that is a followup to any article, use this pattern: /Subject: *Re:/:j When done writing lines for each phrase to screen, exit the text editor as you normally would, and you'll be put back in rn. One word of caution: go easy on the global killfile. An extensive global killfile, or one that makes frequent use of the a: modifier can dramatically slow down rn, since the system will now have to look at every single word in every single message in all the newsgroups you want to read. If there's a particular person whose posts you never want to see again, first find his or her address (which will be in the "from:" line of his postings) and then write a line in your killfile like this: /From: *name@address\.all/h:j 4.3 SOME USENET HINTS Case counts in Unix -- most of the time. Many Unix commands, including many of those used for reading Usenet articles, are case sensitive. Hit a d when you meant a D and either nothing will happen, or something completely different from what you expected will happen. So watch that case! In nn, you can get help most of the time by typing a question mark (the exception is when you are writing your own message, because then you are inside the text-processing program). In rn, type a lower-case h at any prompt to get some online help. When you're searching for a particular newsgroup, whether through the l command in rn or with nngrep for nn, you sometimes may have to try several keywords. For example, there is a newsgroup dedicated to the Grateful Dead, but you'd never find it if you tried, say, l grateful dead, because the name is rec.music.gdead. In general, try the smallest possible part of the word or discussion you're looking for, for example, use "trek" to find newsgroups about "Star Trek." If one word doesn't produce anything, try another. 4.4 THE BRAIN-TUMOR BOY, THE MODEM TAX AND THE CHAIN LETTER Like the rest of the world, Usenet has its share of urban legends and questionable activities. There are three in particular that plague the network. Spend more than, oh, 15 minutes within Usenet and you're sure to run into the Brain Tumor Boy, the plot by the evil FCC to tax your modem and Dave Rhode's miracle cure for poverty. For the record, here's the story on all of them: There once was a seven-year-old boy in England named Craig Shergold who was diagnosed with a seemingly incurable brain tumor. As he lay dying, he wished only to have friends send him postcards. The local newspapers got a hold of the tear-jerking story. Soon, the boy's wish had changed: he now wanted to get into the Guinness Book of World Records for the largest postcard collection. Word spread around the world. People by the millions sent him postcards. Miraculously, the boy lived. An American billionaire even flew him to the U.S. for surgery to remove what remained of the tumor. And his wish succeeded beyond his wildest dreams -- he made the Guinness Book of World Records. But with Craig now well into his teens, his dream has turned into a nightmare for the post office in the small town outside London where he lives. Like Craig himself, his request for cards just refuses to die, inundating the post office with millions of cards every year. Just when it seems like the flow is slowing, along comes somebody else who starts up a whole new slew of requests for people to send Craig post cards (or greeting cards or business cards -- Craig letters have truly taken on a life of their own and begun to mutate). Even Dear Abby has been powerless to make it stop! What does any of this have to do with the Net? The Craig letter seems to pop up on Usenet as often as it does on cork boards at major corporations. No matter how many times somebody like Gene Spafford posts periodic messages to ignore them or spend your money on something more sensible (a donation to the local Red Cross, say), somebody manages to post a letter asking readers to send cards to poor little Craig. Don't send any cards to the Federal Communications Commission, either. In 1987, the FCC considered removing a tax break it had granted CompuServe and other large commercial computer networks for use of the national phone system. The FCC quickly reconsidered after alarmed users of bulletin-board systems bombarded it with complaints about this "modem tax." Now, every couple of months, somebody posts an "urgent" message warning Net users that the FCC is about to impose a modem tax. This is NOT true. The way you can tell if you're dealing with the hoax story is simple: it ALWAYS mentions an incident in which a talk-show host on KGO radio in San Francisco becomes outraged on the air when he reads a story about the tax in the New York Times. Another way to tell it's not true is that it never mentions a specific FCC docket number or closing date for comments. Save that letter to your congressman for something else. Sooner or later, you're going to run into a message titled "Make Money Fast." It's your basic chain letter. The Usenet version is always about some guy named Dave Rhodes who was on the verge of death, or something, when he discovered a perfectly legal way to make tons of money -- by posting a chain letter on computer systems around the world. Yeah, right. 4.5 BIG SIG There are .sigs and there are .sigs. Many people put only bare-bones information in their .sig files -- their names and e-mail addresses, perhaps their phone numbers. Others add a quotation they think is funny or profound and a disclaimer that their views are not those of their employer. Still others add some ASCII-art graphics. And then there are those who go totally berserk, posting huge creations with multiple quotes, hideous ASCII "barfics" and more e-mail addresses than anybody could humanly need. College freshmen unleashed on the Net seem to excel at these. You can see the best of the worst in the alt.fan.warlord newsgroup, which exists solely to critique .sigs that go too far, such as: ___________________________________________________________________________ |#########################################################################| |#| |#| |#| ***** * * ***** * * ***** ***** ***** |#| |#| * * * * ** ** * * * * |#| |#| * ****** *** * * * *** * ** ***** ***** |#| |#| * * * * * * * * * * * |#| |#| * * * ***** * * ***** ***** * * |#| |#| |#| |#| **** ***** ***** ***** ***** ***** ***** ***** |#| |#| * ** * * * * * * * * |#| |#| **** * * ** ***** * * ** * * * |#| |#| * ** * * * ** * * * * * * * |#| |#| **** ***** ***** ** ***** ***** ***** ***** ***** |#| |#| |#| |#| T-H-E M-E-G-A B-I-G .S-I-G C-O-M-P-A-N-Y |#| |#| ~-----------------------------~ |#| |#| "Annoying people with huge net.signatures for over 20 years..." |#| |#| |#| |#|---------------------------------------------------------------------|#| |#| "The difference between a net.idiot and a bucket of shit is that at |#| |#| least a bucket can be emptied. Let me further illustrate my point |#| |#| by comparing these charts here. (pulls out charts) Here we have a |#| |#| user who not only flames people who don't agree with his narrow- |#| |#| minded drivel, but he has this huge signature that takes up many |#| |#| pages with useless quotes. This also makes reading his frequented |#| |#| newsgroups a torture akin to having at 300 baud modem on a VAX. I |#| |#| might also add that his contribution to society rivals only toxic |#| |#| dump sites." |#| |#| -- Robert A. Dumpstik, Jr |#| |#| President of The Mega Big Sig Company |#| |#| September 13th, 1990 at 4:15pm |#| |#| During his speech at the "Net.abusers |#| |#| Society Luncheon" during the |#| |#| "1990 Net.idiots Annual Convention" |#| |#|_____________________________________________________________________|#| |#| |#| |#| Thomas Babbit, III: 5th Assistant to the Vice President of Sales |#| |#| __ |#| |#| ========== ______ Digital Widget Manufacturing Co. |#| |#| \\ / 1147 Complex Incorporated Drive |#| |#| )-======= Suite 215 |#| |#| Nostromo, VA 22550-1147 |#| |#| #NC-17 Enterpoop Ship :) Phone # 804-844-2525 |#| |#| ---------------- Fax # 804-411-1115 |#| |#| "Shut up, Wesley!" Online Service # 804-411-1100 |#| |#| -- Me at 300-2400, and now 9600 baud! |#| |#| PUNet: tbabb!digwig!nostromo |#| |#| Home address: InterNet: dvader@imperial.emp.com |#| |#| Thomas Babbit, III Prodigy: Still awaiting author- |#| |#| 104 Luzyer Way ization |#| |#| Sulaco, VA 22545 "Manufacturing educational widget |#| |#| Phone # 804-555-1524 design for over 3 years..." |#| |#|=====================================================================|#| |#| |#| |#| Introducing: |#| |#| ______ |#| |#| The |\ /| / |#| |#| | \/ | / |#| |#| | | / |#| |#| | | / |#| |#| | | ETELHED /_____ ONE |#| |#|'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'|#| |#| 50Megs Online! The k00l BBS for rad teens! Lots of games and many |#| |#| bases for kul topix! Call now and be validated to the Metelhed Zone|#| |#| -- 804-555-8500 -- |#| |#|\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\V/////////////////////////////////////|#| |#| "This is the end, my friend..." -- The Doors |#| |#########################################################################| --------------------------------------------------------------------------- Hit "b" to continue Hahahha... fooled u! 4.6 THE FIRST AMENDMENT AS LOCAL ORDINANCE Usenet's international reach raises interesting legal questions that have yet to be fully resolved. Can a discussion or posting that is legal in one country be transmitted to a country where it is against the law? Does the posting even become illegal when it reaches the border? And what if that country is the only path to a third country where the message is legal as well? Several foreign colleges and other institutions have cut off feeds of certain newsgroups where Americans post what is, in the U.S., perfectly legal discussions of drugs or alternative sexual practices. Even in the U.S., some universities have discontinued certain newsgroups their administrators find offensive, again, usually in the alt. hierarchy. An interesting example of this sort of question happened in 1993, when a Canadian court issued a gag order on Canadian reporters covering a particularly controversial murder case. Americans, not bound by the gag order, began posting accounts of the trial -- which any Canadian with a Net account could promptly read. 4.7 USENET HISTORY In the late 1970s, Unix developers came up with a new feature: a system to allow Unix computers to exchange data over phone lines. In 1979, two graduate students at Duke University in North Carolina, Tom Truscott and Jim Ellis, came up with the idea of using this system, known as UUCP (for Unix-to-Unix CoPy), to distribute information of interest to people in the Unix community. Along with Steve Bellovin, a graduate student at the University of North Carolina and Steve Daniel, they wrote conferencing software and linked together computers at Duke and UNC. Word quickly spread and by 1981, a graduate student at Berkeley, Mark Horton and a nearby high school student, Matt Glickman, had released a new version that added more features and was able to handle larger volumes of postings -- the original North Carolina program was meant for only a few articles in a newsgroup each day. Today, Usenet connects tens of thousands of sites around the world, from mainframes to Amigas. With more than 3,000 newsgroups and untold thousands of readers, it is perhaps the world's largest computer network. 4.8 WHEN THINGS GO WRONG * When you start up rn, you get a "warning" that "bogus newsgroups" are present. Within a couple of minutes, you'll be asked whether to keep these or delete them. Delete them. Bogus newsgroups are newsgroups that your system administrator or somebody else has determined are no longer needed. * While in a newsgroup in rn, you get a message: "skipping unavailable article." This is usually an article that somebody posted and then decided to cancel. * You upload a text file to your Unix host system for use in a Usenet message or e-mail, and when you or your recipient reads the file, every line ends with a ^M. This happens because Unix handles line endings differently than MS- DOS or Macintosh computers. Most Unix systems have programs to convert incoming files from other computers. To use it, upload your file and then, at your command line, type dos2unix filename filename or mac2unix filename filename depending on which kind of computer you are using and where filename is the name of the file you've just uploaded. A similar program can prepare text files for downloading to your computer, for example: unix2dos filename filename or unix2mac filename filename will ensure that a text file you are about to get will not come out looking odd on your computer. 4.9 FYI Leanne Phillips periodically posts a list of frequently asked questions (and answers) about use of the rn killfile function in the news.newusers.questions and news.answers newsgroups on Usenet. Bill Wohler posts a guide to using the nn newsreader in the news.answers and news.software newsgroups. Look in the news.announce.newusers and news.groups newsgroups on Usenet for "A Guide to Social Newsgroups and Mailing Lists,'' which gives brief summaries of the various soc. newsgroups. "Managing UUCP and Usenet,' by Tim O'Reilly and Grace Todino (O'Reilly & Associates, 1992) is a good guide for setting up your own Usenet system. Chapter 5: MAILING LISTS AND BITNET 5.1 INTERNET MAILING LISTS Usenet is not the only forum on the Net. Scores of "mailing lists" represent another way to interact with other Net users. Unlike Usenet messages, which are stored in one central location on your host system's computer, mailing-list messages are delivered right to your e-mail box, unlike Usenet messages. You have to ask for permission to join a mailing list. Unlike Usenet, where your message is distributed to the world, on a mailing list, you send your messages to a central moderator, who either re-mails it to the other people on the list or uses it to compile a periodic "digest" mailed to subscribers. Given the number of newsgroups, why would anybody bother with a mailing list? Even on Usenet, there are some topics that just might not generate enough interest for a newsgroup; for example, the Queen list, which is all about the late Freddie Mercury's band. And because a moderator decides who can participate, a mailing list can offer a degree of freedom to speak one's mind (or not worry about net.weenies) that is not necessarily possible on Usenet. Several groups offer anonymous postings -- only the moderator knows the real names of people who contribute. Examples include 12Step, where people enrolled in such programs as Alcoholics Anonymous can discuss their experiences, and sappho, a list limited to gay and bisexual women. You can find mailing addresses and descriptions of these lists in the news.announce.newusers newsgroup with the subject of "Publicly Accessible Mailing Lists." Mailing lists now number in the hundreds, so this posting is divided into three parts. If you find a list to which you want to subscribe, send an e- mail message to list-request@address where "list" is the name of the mailing list and "address" is the moderator's e-mail address, asking to be added to the list. Include your full e-mail address just in case something happens to your message's header along the way, and ask, if you're accepted, for the address to mail messages to the list. 5.2 BITNET As if Usenet and mailing lists were not enough, there are Bitnet "discussion groups" or "lists." Bitnet is an international network linking colleges and universities, but it uses a different set of technical protocols for distributing information from the Internet or Usenet. It offers hundreds of discussion groups, comparable in scope to Usenet newsgroups. One of the major differences is the way messages are distributed. Bitnet messages are sent to your mailbox, just as with a mailing list. However, where mailing lists are often maintained by a person, all Bitnet discussion groups are automated -- you subscribe to them through messages to a "listserver" computer. This is a kind of robot moderator that controls distribution of messages on the list. In many cases, it also maintains indexes and archives of past postings in a given discussion group, which can be handy if you want to get up to speed with a discussion or just search for some information related to it. Many Bitnet discussion groups are now "translated" into Usenet form and carried through Usenet in the bit.listserv hierarchy. In general, it's probably better to read messages through Usenet if you can. It saves some storage space on your host system's hard drives. If 50 people subscribe to the same Bitnet list, that means 50 copies of each message get stored on the system; whereas if 50 people read a Usenet message, that's still only one message that needs storage on the system. It can also save your sanity if the discussion group generates large numbers of messages. Think of opening your e-mailbox one day to find 200 messages in it -- 199 of them from a discussion group and one of them a "real" e-mail message that's important to you. Subscribing and canceling subscriptions is done through an e- mail message to the listserver computer. For addressing, all listservers are known as "listserv" (yep) at some Bitnet address. This means you will have to add ".bitnet" to the end of the address, if it's in a form like this: listserv@miamiu. For example, if you have an interest in environmental issues, you might want to subscribe to the Econet discussion group. To subscribe, send an e-mail message to listserv@miamiu.bitnet Some Bitnet listservers are also connected to the Internet, so if you see a listserver address ending in ".edu", you can e-mail the listserver without adding ".bitnet" to the end. Always leave the "subject:" line blank in a message to a listserver. Inside the message, you tell the listserver what you want, with a series of simple commands: subscribe group Your Name To subscribe to a list, where "group" is the list name and "Your Name" is your full name, for example: subscribe econet Henry Fielding unsubscribe group Your Name To discontinue a group, for example: unsubscribe econet Henry Fielding list global This sends you a list of all available Bitnet discussion groups. But be careful -- the list is VERY long! get refcard Sends you a list of other commands you can use with a listserver, such as commands for retrieving past postings from a discussion group. Each of these commands goes on a separate line in your message (and you can use one or all of them). If you want to get a list of all Bitnet discussion groups, send e-mail to listserv@bitnic.educom.edu Leave the "subject:" line blank and use the list global command. When you subscribe to a Bitnet group, there are two important differences from Usenet. First, when you want to post a message for others to read in the discussion group, you send a message to the group name at its Bitnet address. Using Econet as an example, you would mail the message to: econet@miamiu.bitnet Note that this is different from the listserv address you used to subscribe to the group to begin with. Use the listserv address ONLY to subscribe to or unsubscribe from a discussion group. If you use the discussion-group address to try to subscribe or unsubscribe, your message will go out to every other subscriber, many of whom will think unkind thoughts, which they may share with you in an e-mail message). The second difference relates to sending an e-mail message to the author of a particular posting. Usenet newsreaders such as rn and nn let you do this with one key. But if you hit your R key to respond to a discussion-group message, your message will go to the listserver, and from there to everybody else on the list! This can prove embarrassing to you and annoying to others. To make sure your message goes just to the person who wrote the posting, take down his e-mail address from the posting and then compose a brand-new message. Remember, also, that if you see an e-mail address like IZZY@INDYVMS, it's a Bitnet address. Two Bitnet lists will prove helpful for delving further into the network. NEW-LIST tells you the names of new discussion groups. To subscribe, send a message to listserv@ndsuvm1.bitnet: sub NEW-LIST Your Name INFONETS is the place to go when you have questions about Bitnet. It is also first rate for help on questions about all major computer networks and how to reach them. To subscribe, send e-mail to info-nets- request@think.com: sub INFONETS Your Name Both of these lists are also available on Usenet, the former as bit.listserv.new-list; the latter as bit.listserv.infonets (sometimes bit.listserv.info-nets). Chapter 6: TELNET 6.1 MINING THE NET Like any large community, cyberspace has its libraries, places you can go to look up information or take out a good book. Telnet is one of your keys to these libraries. Telnet is a program that lets you use the power of the Internet to connect you to databases, library catalogs, and other information resources around the world. Want to see what the weather's like in Vermont? Check on crop conditions in Azerbaijan? Get more information about somebody whose name you've seen online? Telnet lets you do this, and more. Alas, there's a big "but!'' Unlike the phone system, Internet is not yet universal; not everybody can use all of its services. Almost all colleges and universities on the Internet provide telnet access. So do all of the for-fee public-access systems listed in Chapter 1. But the Free-Net systems do not give you access to every telnet system. And if you are using a public-access UUCP or Usenet site, you will not have access to telnet. The main reason for this is cost. Connecting to the Internet can easily cost $1,000 or more for a leased, high-speed phone line. Some databases and file libraries can be queried by e-mail, however; we'll show you how to do that later on. In the meantime, the rest of this chapter assumes you are connected to a site with at least partial Internet access. Most telnet sites are fairly easy to use and have online help systems. Most also work best (and in some cases, only) with VT100 emulation. Let's dive right in and try one. At your host system's command line, type telnet access.usask.ca and hit enter. That's all you have to do to connect to a telnet site! In this case, you'll be connecting to a service known as Hytelnet, which is a database of computerized library catalogs and other databases available through telnet. You should see something like this: Trying 128.233.3.1 ... Connected to access.usask.ca. Escape character is '^]'. Ultrix UNIX (access.usask.ca) login: Every telnet site has two addresses -- one composed of words that are easier for people to remember; the other a numerical address better suited for computers. The "escape character" is good to remember. When all else fails, hitting your control key and the ] key at the same time will disconnect you and return you to your host system. At the login prompt, type hytelnet and hit enter. You'll see something like this: Welcome to HYTELNET version 6.2 ................... What is HYTELNET? . Up/Down arrows MOVE Library catalogs . Left/Right arrows SELECT Other resources . ? for HELP anytime Help files for catalogs . Catalog interfaces . m returns here Internet Glossary . q quits Telnet tips . Telnet/TN3270 escape keys . Key-stroke commands . ........................ HYTELNET 6.2 was written by Peter Scott, U of Saskatchewan Libraries, Saskatoon, Sask, Canada. 1992 Unix and VMS software by Earl Fogel, Computing Services, U of S 1992 The first choice, "" will be highlighted. Use your down and up arrows to move the cursor among the choices. Hit enter when you decide on one. You'll get another menu, which in turn will bring up text files telling you how to connect to sites and giving any special commands or instructions you might need. Hytelnet does have one quirk. To move back to where you started (for example, from a sub-menu to a main menu), hit the left-arrow key on your computer. Play with the system. You might want to turn on your computer's screen-capture, or at the very least, get out a pen and paper. You're bound to run across some interesting telnet services that you'll want to try -- and you'll need their telnet "addresses.'' As you move around Hytelnet, it may seem as if you haven't left your host system -- telnet can work that quickly. Occasionally, when network loads are heavy, however, you will notice a delay between the time you type a command or enter a request and the time the remote service responds. To disconnect from Hytelnet and return to your system, hit your q key and enter. Some telnet computers are set up so that you can only access them through a specific "port." In those cases, you'll always see a number after their name, for example: india.colorado.edu 13. It's important to include that number, because otherwise, you may not get in. In fact, try the above address. Type telnet india.colorado.edu 13 and hit enter. You should see something like this: Trying 128.138.140.44 ... Followed very quickly by this: telnet india.colorado.edu 13 Escape character is '^]'. Sun Jan 17 14:11:41 1994 Connection closed by foreign host. What we want is the middle line, which tells you the exact Mountain Standard Time, as determined by a government-run atomic clock in Boulder, Colo. 6.2 LIBRARY CATALOGS Several hundred libraries around the world, from the Snohomish Public Library in Washington State to the Library of Congress are now available to you through telnet. You can use Hytelnet to find their names, telnet addresses and use instructions. Why would you want to browse a library you can't physically get to? Many libraries share books, so if yours doesn't have what you're looking for, you can tell the librarian where he or she can get it. Or if you live in an area where the libraries are not yet online, you can use telnet to do some basic bibliographic research before you head down to the local branch. There are several different database programs in use by online libraries. Harvard's is one of the easier ones to use, so let's try it. Telnet to hollis.harvard.edu. When you connect, you'll see: ***************** H A R V A R D U N I V E R S I T Y ***************** OFFICE FOR INFORMATION TECHNOLOGY *** *** *** *** VE *** RI *** *** *** *** HOLLIS (Harvard OnLine LIbrary System) ***** ***** **** TAS **** HUBS (Harvard University Basic Services) *** *** ***** IU (Information Utility) *** CMS (VM/CMS Timesharing Service) ** HOLLIS IS AVAILABLE WITHOUT ACCESS RESTRICTIONS ** Access to other applications is limited to individuals who have been granted specific permission by an authorized person. To select one of the applications above, type its name on the command line followed by your user ID, and press RETURN. ** HOLLIS DOES NOT REQUIRE A USERID ** EXAMPLES: HOLLIS (press RETURN) or HUBS userid (press RETURN) ===> Type hollis and hit enter. You'll see several screens flash by quickly until finally the system stops and you'll get this: WELCOME TO HOLLIS (Harvard OnLine Library Information System) To begin, type one of the 2-character database codes listed below: HU Union Catalog of the Harvard libraries OW Catalog of Older Widener materials LG Guide to Harvard Libraries and Computing Resources AI Expanded Academic Index (selective 1987-1988, full 1989- ) LR Legal Resource Index (1980- ) PA PAIS International (1985- ) To change databases from any place in HOLLIS, type CHOOSE followed by a 2-character database code, as in: CHOOSE HU For general help in using HOLLIS, type HELP. For HOLLIS news, type HELP NEWS. For HOLLIS hours of operation, type HELP HOURS. ALWAYS PRESS THE ENTER OR RETURN KEY AFTER TYPING YOUR COMMAND The first thing to notice is the name of the system: Hollis. Librarians around the world seem to be inordinately found of cutesy, anthropomorphized acronyms for their machines (not far from Harvard, the librarians at Brandeis University came up with Library On-Line User Information Service, or Louis; MIT has Barton). If you want to do some general browsing, probably the best bet on the Harvard system is to choose HU, which gets you access to their main holdings, including those of its medical libraries. Choose that, and you'll see this: THE HARVARD UNIVERSITY LIBRARY UNION CATALOG To begin a search, select a search option from the list below and type its code on the command line. Use either upper or lower case. AU Author search TI Title search SU Subject search ME Medical subject search KEYWORD Keyword search options CALL Call number search options OTHER Other search options For information on the contents of the Union Catalog, type HELP. To exit the Union Catalog, type QUIT. A search can be entered on the COMMAND line of any screen. ALWAYS PRESS THE ENTER OR RETURN KEY AFTER TYPING YOUR COMMAND. Say you want to see if Harvard has shed the starchy legacy of the Puritans, who founded the school. Why not see if they have "The Joy of Sex" somewhere in their stacks? Type TI Joy of Sex and hit enter. This comes up: HU: YOUR SEARCH RETRIEVED NO ITEMS. Enter new command or HELP. You typed: TI JOY OF SEX ******************************************************************************* ALWAYS PRESS THE ENTER OR RETURN KEY AFTER TYPING YOUR COMMAND. ------------------------------------------------------------------------------- OPTIONS: FIND START - search options HELP QUIT - exit database COMMAND? Oh, well! Do they have anything that mentions "sex" in the title? Try another TI search, but this time just: TI sex. You get: HU GUIDE: SUMMARY OF SEARCH RESULTS 2086 items retrieved by your search: FIND TI SEX ------------------------------------------------------------------------------ 1 SEX 2 SEX A 823 SEXA 827 SEXBO 831 SEXCE 833 SEXDR 834 SEXE 879 SEXIE 928 SEXJA 929 SEXLE 930 SEXO 965 SEXPI 968 SEXT 1280 SEXUA 2084 SEXWA 2085 SEXY ------------------------------------------------------------------------------- OPTIONS: INDEX (or I 5 etc) to see list of items HELP START - search options REDO - edit search QUIT - exit database COMMAND? If you want to get more information on the first line, type 1 and hit enter: HU INDEX: LIST OF ITEMS RETRIEVED 2086 items retrieved by your search: FIND TI SEX ------------------------------------------------------------------------------ SEX 1 geddes patrick sir 1854 1932/ 1914 bks SEX A Z 2 goldenson robert m/ 1987 bks SEX ABUSE HYSTERIA SALEM WITCH TRIALS REVISITED 3 gardner richard a/ 1991 bks SEX AETATES MUNDI ENGLISH AND IRISH 4 irish sex aetates mundi/ 1983 bks SEX AFTER SIXTY A GUIDE FOR MEN AND WOMEN FOR THEIR LATER YEARS 5 butler robert n 1927/ 1976 bks ------------------------------------------------------ (CONTINUES) ------------ OPTIONS: DISPLAY 1 (or D 5 etc) to see a record HELP GUIDE MORE - next page START - search options REDO - edit search QUIT - exit database COMMAND? Most library systems give you a way to log off and return to your host system. On Hollis, hit escape followed by xx One particularly interesting system is the one run by the Colorado Alliance of Research Libraries, which maintains databases for libraries throughout Colorado, the West and even in Boston. Telnet pac.carl.org. Follow the simple log-in instructions. When you get a menu, type 72 (even though that is not listed), which takes you to the Pikes Peak Library District, which serves the city of Colorado Springs. Several years ago, its librarians realized they could use their database program not just for books but for cataloging city records and community information, as well. Today, if you want to look up municipal ordinances or city records, you only have to type in the word you're looking for and you'll get back cites of the relevant laws or decisions. Carl will also connect you to the University of Hawaii library, which, like the one in Colorado Springs, has more than just bibliographic material online. One of its features is an online Hawaiian almanac that can tell you everything you ever wanted to know about Hawaiians, including the number injured in boogie-board accidents each year (seven). 6.3 SOME INTERESTING TELNET SITES AGRICULTURE PENPages, run by Pennsylvania State University's College of Agricultural Sciences, provides weekly world weather and crop reports from the U.S. Department of Agriculture. These reports detail everything from the effect of the weather on palm trees in Malaysia to the state of the Ukrainian wheat crop. Reports from Pennsylvania country extension officers offer tips for improving farm life. One database lists Pennsylvania hay distributors by county -- and rates the quality of their hay! The service lets you search for information two different ways. A menu system gives you quick access to reports that change frequently, such as the weekly crop/weather reports. An index system lets you search through several thousand online documents by keyword. At the main menu, you can either browse through an online manual or choose "PENPages,'' which puts you into the agriculture system. Telnet: psupen.psu.edu User name: Your 2-letter state code or WORLD California State University's Advanced Technology Information Network provides similar information as PENPages, only focusing on California crops. It also maintains lists of upcoming California trade shows and carries updates on biotechnology. Telnet: caticsuf.cati.csufresno.edu Log in: public You will then be asked to register and will be given a user name and password. Hit "a'' at the main menu for agricultural information. Hit "d'' to call up a menu that includes a biweekly biotechnology report. AIDS The University of Miami maintains a database of AIDS health providers in southern Florida. Telnet: callcat.med.miami.edu Log in: library At the main menu, select P (for "AIDS providers" and you'll be able to search for doctors, hospitals and other providers that care for patients with AIDS. You can also search by speciality. See also under Conversation and Health. AMATEUR RADIO: The National Ham Radio Call-Sign Callbook lets you search for American amateur operators by callsign, city, last name or Zip code. A successful search will give you the ham's name, address, callsign, age, type of license and when he or she got it. Telnet: callsign.cs.buffalo.edu 2000 or ham.njit.edu 2000. When you connect, you tell the system how you want to search and what you're looking for. For example, if you want to search for hams by city, you would type city city name and hit enter (for example: city Kankakee). Other search choices are "call" (after which you would type a ham's name), "name," and "zip" (which you would follow with a Zip code). Be careful when searching for hams in a large city; there doesn't seem to be anyway to shut off the list once it starts except by using control-]. Otherwise, when done, type quit and hit enter to disconnect. ANIMALS See under Health. CALCULATORS Hewlett-Packard maintains a free service on which you can seek advice about their line of calculators. Telnet: hpcvbbs.cv.hp.com No log-in is needed. CHEMISTRY The Electronic Periodic Table of the Elements draws the table on your screen and then lets you look up various properties of individual elements. Telnet: camms2.caos.kun.nl No password needed. CONGRESS The Library of Congress Information Service lets you search current and past legislation (dating to 1982). Telnet: locis.loc.gov Password: none needed. When you connect, you'll get a main menu that lets you select from several databases, including the Library of Congress card catalog (with book entries dating to 1978) and a database of information on copyright laws. For the congressional database, select the number next to its entry and hit enter. You'll then be asked to choose which legislative year to search. After that, a menu similar to this will come up: ***C103- THE LEGISLATIVE INFORMATION FILE FOR THE 103RD CONGRESS, which was updated on 05/10/93 and contains 4,044 records, is now available for your search. CURRENCY: All information is NOT current through the above date, which is machine generated when ANY information is added to the file. Bill numbers, official titles, sponsors, and status (STEP) added within 48 hours. Indexing terms and digests added later, in some cases several weeks after the bill is added to the file. TO START RETRIEVE to find: EXAMPLES: SEARCH: member name --------------> retrieve rep gingrich retrieve sen kennedy bill number --------------> retrieve h.r. 1 subject keywords ---------> retrieve day care FOR HELP: Type the word HELP and press the ENTER key. READY FOR NEW COMMAND: CONVERSATION Communications Canada, a Canadian government agency is developing Conversational Hypertext Access Technology (CHAT) is a system being developed by Communications Canada to provide easy database access to people with little or no computer experience, using what are known as hypertext links. Instead of cryptic computer commands, users type questions in English. Telnet: debra.doc.ca Log in: chat You choose one of the three databases now online, one on AIDS, and then ask questions in English. Ask the AIDS database, "When was AIDS first discovered?'' and it answers: "The first case of AIDS in North America was diagnosed in 1979. Before that, it existed in Africa, probably beginning in the 1950's. AIDS was discovered in North America when a number of young men with a history of homosexuality developed a rare type of cancer called Kaposi's sarcoma.'' Sometimes, you do have to rephrase your question. For example, when asked "What is the link between AIDS and drug use?'' the computer responds: "I know two things about drugs: the drugs that are used to treat people with AIDS, and the risks that drug users have in getting AIDS. Please ask about treatments or drug users.'' COPYRIGHT LAW See under Congress. CURRENT EVENTS Every year, the CIA publishes a Fact Book that is essentially an almanac of all the world's countries and international organizations, including such information as major products, type of government and names of its leaders. It's available for searching through the University of Maryland Info Database. Telnet: info.umd.edu Choose a terminal type and hit enter (or just hit enter if you are using VT100). At the main menu, choose the number next to "Educational Resources." Then select the number next to "International," followed by "Factbook." You can then search by country or agency. This site also maintains copies of the U.S. budget, documents related to the North American Free Trade Agreement and other government initiatives. At the "Educational Resources" menu, select the number next to "United States" and then the one next to "Government." The Access Legislative Information Service lets you browse through and look up bills before the Hawaiian legislature. Telnet: access.uhcc.hawaii.edu ENVIRONMENT Envirolink is a large database and conference system about the environment, based in Pittsburgh. Telnet: envirolink.org Log on: gopher The U.S. Environmental Protection Agency maintains online databases of materials related to hazardous waste, the Clean Lakes program and cleanup efforts in New England. The agency plans to eventually include cleanup work in other regions, as well. The database is actually a computerized card catalog of EPA documents -- you can look the documents up, but you'll still have to visit your regional EPA office to see them. Telnet: epaibm.rtpnc.epa.gov No password or user name is needed. At the main menu, type public and hit enter (there are other listed choices, but they are only for use by EPA employees). You'll then see a one-line menu. Type ols and hit enter, and you'll see something like this: NET-106 Logon to TSO04 in progress. DATABASES: N NATIONAL CATALOG CH CHEMICAL COLL. SYSTEM H HAZARDOUS WASTE 1 REGION I L CLEAN LAKES OTHER OPTIONS: ? HELP Q QUIT ENTER SELECTION --> Choose one and you'll get a menu that lets you search by document title, keyword, year of publication or corporation. After you enter the search word and hit enter, you'll be told how many matches were found. Hit 1 and then enter to see a list of the entries. To view the bibliographic record for a specific entry, hit V and enter and then type the number of the record. The University of Michigan maintains a database of newspaper and magazine articles related to the environment, with the emphasis on Michigan, dating back to 1980. Telnet: hermes.merit.edu Host: mirlyn Log in: meem GEOGRAPHY The University of Michigan Geographic Name Server can provide basic information, such as population, latitude and longitude of U.S. cities and many mountains, rivers and other geographic features. Telnet: martini.eecs.umich.edu 3000 No password or user name is needed. Type in the name of a city, a Zip code or a geographic feature and hit enter. The system doesn't like names with abbreviations in them (for example, Mt. McKinley), so spell them out (for example, Mount McKinley). By typing in a town's name or zip code, you can find out a community's county, Zip code and longitude and latitude. Not all geographic features are yet included in the database. GOVERNMENT The National Technical Information Service runs a system that not only provides huge numbers of federal documents of all sorts -- from environmental factsheets to patent abstract -- but serves as a gateway to dozens of other federal information systems. Telnet: fedworld.gov Log on as: new See also under Congress and Current Events. HEALTH The U.S. Food and Drug Administration runs a database of health- related information. Telnet: fdabbs.fda.gov Log in: bbs You'll then be asked for your name and a password you want to use in the future. After that, type topics and hit enter. You'll see this: TOPICS DESCRIPTION * NEWS News releases * ENFORCE Enforcement Report * APPROVALS Drug and Device Product Approvals list * CDRH Centers for Devices and Radiological Health Bulletins * BULLETIN Text from Drug Bulletin * AIDS Current Information on AIDS * CONSUMER FDA Consumer magazine index and selected articles * SUBJ-REG FDA Federal Register Summaries by Subject * ANSWERS Summaries of FDA information * INDEX Index of News Releases and Answers * DATE-REG FDA Federal Register Summaries by Publication Date * CONGRESS Text of Testimony at FDA Congressional Hearings * SPEECH Speeches Given by FDA Commissioner and Deputy * VETNEWS Veterinary Medicine News * MEETINGS Upcoming FDA Meetings * IMPORT Import Alerts * MANUAL On-Line User's Manual You'll be able to search these topics by key word or chronologically. It's probably a good idea, however, to capture a copy of the manual, first, because the way searching works on the system is a little odd. To capture a copy, type manual and hit enter. Then type scan and hit enter. You'll see this: FOR LIST OF AVAILABLE TOPICS TYPE TOPICS OR ENTER THE TOPIC YOU DESIRE ==> MANUAL BBSUSER 08-OCT-91 1 BBS User Manual At this point, turn on your own computer's screen-capture or logging function and hit your 1 key and then enter. The manual will begin to scroll on your screen, pausing every 24 lines. HIRING AND COLLEGE PROGRAM INFORMATION The Federal Information Exchange in Gaithersburg, MD, runs two systems at the same address: FEDIX and MOLIS. FEDIX offers research, scholarship and service information for several federal agencies, including NASA, the Department of Energy and the Federal Aviation Administration. Several more federal agencies provide minority hiring and scholarship information. MOLIS provides information about minority colleges, their programs and professors. Telnet: fedix.fie.com User name: fedix (for the federal hiring database) or molis (for the minority-college system) Both use easy menus to get you to information. HISTORY Stanford University maintains a database of documents related to Martin Luthor King. Telnet: forsythetn.stanford.edu Account: socrates At the main menu, type select mlk and hit enter. SKI REPORTS See under weather. SPACE NASA Spacelink in Huntsville, Ala., provides all sorts of reports and data about NASA, its history and its various missions, past and present. You'll find detailed reports on every single probe, satellite and mission NASA has ever launched along with daily updates and lesson plans for teachers. The system maintains a large file library of GIF-format space graphics, but you can't download these through telnet. If you want them, you have to dial the system directly, at (205) 895-0028. Telnet: spacelink.msfc.nasa.gov When you connect, you'll be given an overview of the system and asked to register and choose a password. The NED-NASA/IPAC Extragalactic Database lists data on more than 100,000 galaxies, quasars and other objects outside the Milky Way. Telnet: ipac.caltech.edu. Log in: ned You can learn more than you ever wanted to about quasars, novae and related objects on a system run by the Smithsonian Astrophysical Observatory in Cambridge, Mass. Telnet: cfa204.harvard.edu Log in: einline The physics department at the University of Massachusetts at Amherst runs a bulletin-board system that provides extensive conferences and document libraries related to space. Telnet: spacemet.phast.umass.edu Log on with your name and a password. SUPREME COURT DECISIONS The University of Maryland Info Database maintains U.S. Supreme Court decisions from 1991 on. Telnet: info.umd.edu Choose a terminal type and hit enter (or just hit enter if you are using VT100). At the main menu, choose the number next to "Educational Resources" and hit enter. One of your options will then be for "United States." Select that number and then, at the next menu, choose the one next to "Supreme Court." TELNET Hytelnet, at the University of Saskatchewan, is an online guide to hundreds of telnet sites around the world. Telnet: access.usask.ca Log in: hytelnet TIME To find out the exact time: Telnet: india.colorado.edu 13 You'll see something like this: Escape character is '^]'. Sun Apr 5 14:11:41 1992 Connection closed by foreign host. The middle line tells you the date and exact Mountain Standard Time, as determined by a federal atomic clock. TRANSPORTATION The Subway Navigator in Paris can help you learn how long it will take to get from point A to point B on subway systems around the world. Telnet: metro.jussieu.fr 10000 No log-in is needed. When you connect, you'll be asked to choose a language in which to search (you can choose English or French) and then a city to search. You'll be asked for the station you plan to leave from and the station you want to get to. WEATHER The University of Michigan's Department of Atmospheric, Oceanographic and Space Sciences supplies weather forecasts for U.S. and foreign cities, along with skiing and hurricane reports. Telnet: madlab.sprl.umich.edu 3000 (note the 3000). No log-in name is needed. Also see under Weather in the FTP list for information on downloading satellite and radar weather images. 6.4 TELNET BULLETIN-BOARD SYSTEMS You might think that Usenet, with its hundreds of newsgroups, would be enough to satisfy the most dedicated of online communicators. But there are a number of "bulletin-board" and other systems that provide even more conferences or other services, many not found directly on the Net. Some are free; others charge for access. They include: Bookstacks Unlimited is a Cleveland bookstore that uses the Internet to advertise its services. Its online system features not only a catalog, however, but conferences on books and literature. Telnet: books.com Log in with your own name and select a password for future connections. Cimarron. Run by the Instituto Technical in Monterey, Mexico, this system has Spanish conferences, but English commands, as you can see from this menu of available conferences: List of Boards Name Title General Board general Dudas Dudas de Cimarron Comentarios Comentarios al SYSOP Musica Para los afinados........ Libros El sano arte de leer..... Sistemas Sistemas Operativos en General. Virus Su peor enemigo...... Cultural Espacio Cultural de Cimarron NeXT El Mundo de NeXT Ciencias Solo apto para Nerds. Inspiracion Para los Romanticos e Inspirados. Deportes Discusiones Deportivas To be able to write messages and gain access to files, you have to leave a note to SYSOP with your name, address, occupation and phone number. To do this, at any prompt, hit your M key and then enter, which will bring up the mail system. Hitting H brings up a list of commands and how to use them. Telnet: bugs.mty.itesm.mx (8 p.m. to 10 a.m., Eastern time, only). At the "login:" prompt, type bbs and hit enter. Cleveland Free-Net. The first of a series of Free-nets, this represents an ambitious attempt to bring the Net to the public. Originally an in-hospital help network, it is now sponsored by Case Western Reserve University, the city of Cleveland, the state of Ohio and IBM. It uses simple menus, similar to those found on CompuServe, but organized like a city: <<< CLEVELAND FREE-NET DIRECTORY >>> 1 The Administration Building 2 The Post Office 3 Public Square 4 The Courthouse & Government Center 5 The Arts Building 6 Science and Technology Center 7 The Medical Arts Building 8 The Schoolhouse (Academy One) 9 The Community Center & Recreation Area 10 The Business and Industrial Park 11 The Library 12 University Circle 13 The Teleport 14 The Communications Center 15 NPTN/USA TODAY HEADLINE NEWS ------------------------------------------------ h=Help, x=Exit Free-Net, "go help"=extended help Your Choice ==> The system has a vast and growing collection of public documents, from copies of U.S. and Ohio Supreme Court decisions to the Magna Carta and the U.S. Constitution. It links residents to various government agencies and has daily stories from USA Today. Beyond Usenet (found in the Teleport area), it has a large collection of local conferences on everything from pets to politics. And yes, it's free! Telnet: freenet-in-a.cwru.edu or freenet-in-b.cwru.edu or freenet-in-c.cwru.edu When you connect to Free-Net, you can look around the system. However, if you want to be able to post messages in its conferences or use e-mail, you will have to apply in writing for an account. Information on this is available when you connect. DUBBS. This is a bulletin-board system in Delft in the Netherlands. The conferences and files are mostly in Dutch, but the help files and the system commands themselves are in English. Telnet: tudrwa.tudelft.nl ISCA BBS. Run by the Iowa Student Computer Association, it has more than 100 conferences, including several in foreign languages. After you register, hit K for a list of available conferences and then J to join a particular conference (you have to type in the name of the conference, not the number next to it). Hitting H brings up information about commands. Telnet bbs.isca.uiowa.edu At the "login:" prompt, type bbs and hit enter. Youngstown Free-Net. The people who created Cleveland Free-Net sell their software for $1 to anybody willing to set up a similar system. A number of cities now have their own Free-Nets, including Youngstown, Ohio. Telnet: yfn.ysu.edu At the "login:" prompt, type visitor and hit enter. 6.5 PUTTING THE FINGER ON SOMEONE Finger is a handy little program which lets you find out more about people on the Net -- and lets you tell others on the Net more about yourself. Finger uses the same concept as telnet or ftp. But it works with only one file, called .plan (yes, with a period in front). This is a text file an Internet user creates with a text editor in his home directory. You can put your phone number in there, tell a little bit about yourself, or write almost anything at all. To finger somebody else's .plan file, type this at the command line: finger email-address where email-address is the person's e-mail address. You'll get back a display that shows the last time the person was online, whether they've gotten any new mail since that time and what, if anything, is in their .plan file. Some people and institutions have come up with creative uses for these .plan files, letting you do everything from checking the weather in Massachusetts to getting the latest baseball standings. Try fingering these e-mail addresses: weather@cirrus.mit.edu Latest National Weather Service weather forecasts for regions in Massachusetts. quake@geophys.washington.edu Locations and magnitudes of recent earthquakes around the world. jtchern@ocf.berkeley.edu Current major-league baseball standings and results of the previous day's games. nasanews@space.mit.edu The day's events at NASA. coke@cs.cmu.edu See how many cans of each type of soda are left in a particular soda machine in the computer-science department of Carnegie-Mellon University. 6.6 FINDING SOMEONE ON THE NET So you have a friend and you want to find out if he has an Internet account to which you can write? The quickest way may be to just pick up the phone, call him and ask him. Although there are a variety of "white pages" services available on the Internet, they are far from complete -- college students, users of commercial services such as CompuServe and many Internet public-access sites, and many others simply won't be listed. Major e-mail providers are working on a universal directory system, but that could be some time away. In the meantime, a couple of "white pages" services might give you some leads, or even just entertain you as you look up famous people or long-lost acquaintances. The whois directory provides names, e-mail and postal mail address and often phone numbers for people listed in it. To use it, telnet to internic.net No log-on is needed. The quickest way to use it is to type whois name at the prompt, where "name" is the last name or organization name you're looking for. Another service worth trying, especially since it seems to give beginners fewer problems, is the Knowbot Information Service reachable by telnet at info.cnri.reston.va.us 185 Again, no log-on is needed. This service actually searches through a variety of other "white pages" systems, including the user directory for MCIMail. To look for somebody, type query name where "name" is the last name of the person you're looking for. You can get details of other commands by hitting a question mark at the prompt. You can also use the knowbot system by e-mail. Start a message to netaddress@info.cnri.reston.va.us You can leave the "subject:" line blank. As your message, type query name for the simplest type of search. If you want details on more complex searches, add another line: man Another way to search is via the Usenet name server. This is a system at MIT that keeps track of the e-mail addresses of everybody who posts a Usenet message that appears at MIT. It works by e-mail. Send a message to mail-server@rtfm.mit.edu Leave the "subject:" line blank. As your message, write send usenet-addresses/lastname where "lastname" is the last name of the person you're looking for. 6.7 WHEN THINGS GO WRONG * Nothing happens when you try to connect to a telnet site. The site could be down for maintenance or problems. * You get a "host unavailable" message. The telnet site is down for some reason. Try again later. * You get a "host unknown" message. Check your spelling of the site name. * You type in a password on a telnet site that requires one, and you get a "login incorrect" message. Try logging in again. If you get the message again, hit your control and ] keys at the same time to disengage and return to your host system. * You can't seem to disconnect from a telnet site. Use control-] to disengage and return to your host system. 6.8 FYI The Usenet newsgroups alt.internet.services and alt.bbs.internet can provide pointers to new telnet systems. Scott Yanoff periodically posts his "Updated Internet Services List" in the former. The alt.bbs.internet newsgroup is also where you'll find Aydin Edguer's compendium of FAQs related to Internet bulletin-board systems. Peter Scott, who maintains the Hytelnet database, runs a mailing list about new telnet services and changes in existing ones. To get on the list, send him a note at scott@sklib.usask.ca. Gleason Sackman maintains another mailing list dedicated to new Internet services and news about the new uses to which the Net is being put. To subscribe, send a message to listserv@internic.net. Leave the "subject:" line blank, and as your message, write: Sub net-happenings Your Name. Chapter 7: FTP 7.1 TONS OF FILES Hundreds of systems connected to Internet have file libraries, or archives, accessible to the public. Much of this consists of free or low- cost shareware programs for virtually every make of computer. If you want a different communications program for your IBM, or feel like playing a new game on your Amiga, you'll be able to get it from the Net. But there are also libraries of documents as well. If you want a copy of a recent U.S. Supreme Court decision, you can find it on the Net. Copies of historical documents, from the Magna Carta to the Declaration of Independence are also yours for the asking, along with a translation of a telegram from Lenin ordering the execution of rebellious peasants. You can also find song lyrics, poems, even summaries of every "Lost in Space" episode ever made. You can also find extensive files detailing everything you could ever possibly want to know about the Net itself. First you'll see how to get these files; then we'll show you where they're kept. The commonest way to get these files is through the file transfer protocol, or ftp. As with telnet, not all systems that connect to the Net have access to ftp. However, if your system is one of these, you'll be able to get many of these files through e-mail (see the next chapter). Starting ftp is as easy as using telnet. At your host system's command line, type ftp site.name and hit enter, where "site.name" is the address of the ftp site you want to reach. One major difference between telnet and ftp is that it is considered bad form to connect to most ftp sites during their business hours (generally 6 a.m. to 6 p.m. local time). This is because transferring files across the network takes up considerable computing power, which during the day is likely to be needed for whatever the computer's main function is. There are some ftp sites that are accessible to the public 24 hours a day, though. You'll find these noted in the list of ftp sites in section 7.6 7.2 YOUR FRIEND ARCHIE How do you find a file you want, though? Until a few years ago, this could be quite the pain -- there was no master directory to tell you where a given file might be stored on the Net. Who'd want to slog through hundreds of file libraries looking for something? Alan Emtage, Bill Heelan and Peter Deutsch, students at McGill University in Montreal, asked the same question. Unlike the weather, though, they did something about it. They created a database system, called archie, that would periodically call up file libraries and basically find out what they had available. In turn, anybody could dial into archie, type in a file name, and see where on the Net it was available. Archie currently catalogs close to 1,000 file libraries around the world. Today, there are three ways to ask archie to find a file for you: through telnet, "client" Archie program on your own host system or e- mail. All three methods let you type in a full or partial file name and will tell you where on the Net it's stored. If you have access to telnet, you can telnet to one of the following addresses: archie.mcgill.ca; archie.sura.net; archie.unl.edu; archie.ans.net; or archie.rutgers.edu. If asked for a log-in name, type archie and hit enter. When you connect, the key command is prog, which you use in this form: prog filename followed by enter, where "filename" is the program or file you're looking for. If you're unsure of a file's complete name, try typing in part of the name. For example, "PKZIP" will work as well as "PKZIP204.EXE." The system does not support DOS or Unix wildcards. If you ask archie to look for "PKZIP*," it will tell you it couldn't find anything by that name. One thing to keep in mind is that a file is not necessarily the same as a program -- it could also be a document. This means you can use archie to search for, say, everything online related to the Beetles, as well as computer programs and graphics files. A number of Net sites now have their own archie programs that take your request for information and pass it onto the nearest archie database -- ask your system administrator if she has it online. These "client" programs seem to provide information a lot more quickly than the actual archie itself! If it is available, at your host system's command line, type archie -s filename where filename is the program or document you're looking for, and hit enter. The -s tells the program to ignore case in a file name and lets you search for partial matches. You might actually want to type it this way: archie -s filename|more which will stop the output every screen (handy if there are many sites that carry the file you want). Or you could open a file on your computer with your text-logging function. The third way, for people without access to either of the above, is e- mail. Send a message to archie@quiche.cs.mcgill.ca. You can leave the subject line blank. Inside the message, type prog filename where filename is the file you're looking for. You can ask archie to look up several programs by putting their names on the same "prog" line, like this: prog file1 file2 file3 Within a few hours, archie will write back with a list of the appropriate sites. In all three cases, if there is a system that has your file, you'll get a response that looks something like this: Host sumex-aim.stanford.edu Location: /info-mac/comm FILE -rw-r--r-- 258256 Feb 15 17:07 zterm-09.hqx Location: /info-mac/misc FILE -rw-r--r-- 7490 Sep 12 1991 zterm-sys7-color-icons.hqx Chances are, you will get a number of similar looking responses for each program. The "host" is the system that has the file. The "Location" tells you which directory to look in when you connect to that system. Ignore the funny-looking collections of r's and hyphens for now. After them, come the size of the file or directory listing in bytes, the date it was uploaded, and the name of the file. 7.3 GETTING THE FILES Now you want to get that file. Assuming your host site does have ftp, you connect in a similar fashion to telnet, by typing: ftp sumex-aim.stanford.edu (or the name of whichever site you want to reach). Hit enter. If the connection works, you'll see this: Connected to sumex-aim.stanford.edu. 220 SUMEX-AIM FTP server (Version 4.196 Mon Jan 13 13:52:23 PST 1992) ready. Name (sumex-aim.stanford.edu:adamg): If nothing happens after a minute or so, hit control-C to return to your host system's command line. But if it has worked, type anonymous and hit enter. You'll see a lot of references on the Net to "anonymous ftp." This is how it gets its name -- you don't really have to tell the library site what your name is. The reason is that these sites are set up so that anybody can gain access to certain public files, while letting people with accounts on the sites to log on and access their own personal files. Next, you'll be asked for your password. As a password, use your e-mail address. This will then come up: 230 Guest connection accepted. Restrictions apply. Remote system type is UNIX. Using binary mode to transfer files. ftp> Now type ls and hit enter. You'll see something awful like this: 200 PORT command successful. 150 Opening ASCII mode data connection for /bin/ls. total 2636 -rw-rw-r-- 1 0 31 4444 Mar 3 11:34 README.POSTING dr-xr-xr-x 2 0 1 512 Nov 8 11:06 bin -rw-r--r-- 1 0 0 11030960 Apr 2 14:06 core dr--r--r-- 2 0 1 512 Nov 8 11:06 etc drwxrwsr-x 5 13 22 512 Mar 19 12:27 imap drwxr-xr-x 25 1016 31 512 Apr 4 02:15 info-mac drwxr-x--- 2 0 31 1024 Apr 5 15:38 pid drwxrwsr-x 13 0 20 1024 Mar 27 14:03 pub drwxr-xr-x 2 1077 20 512 Feb 6 1989 tmycin 226 Transfer complete. ftp> Ack! Let's decipher this Rosetta Stone. First, ls is the ftp command for displaying a directory (you can actually use dir as well, but if you're used to MS-DOS, this could lead to confusion when you try to use dir on your host system, where it won't work, so it's probably better to just remember to always use ls for a directory while online). The very first letter on each line tells you whether the listing is for a directory or a file. If the first letter is a ``d,'' or an "l", it's a directory. Otherwise, it's a file. The rest of that weird set of letters and dashes consist of "flags" that tell the ftp site who can look at, change or delete the file. You can safely ignore it. You can also ignore the rest of the line until you get to the second number, the one just before the date. This tells you how large the file is, in bytes. If the line is for a directory, the number gives you a rough indication of how many items are in that directory -- a directory listing of 512 bytes is relatively small. Next comes the date the file or directory was uploaded, followed (finally!) by its name. Notice the README.POSTING file up at the top of the directory. Most archive sites have a "read me" document, which usually contains some basic information about the site, its resources and how to use them. Let's get this file, both for the information in it and to see how to transfer files from there to here. At the ftp> prompt, type get README and hit enter. Note that ftp sites are no different from Unix sites in general: they are case-sensitive. You'll see something like this: 200 PORT command successful. 150 Opening BINARY mode data connection for README (4444 bytes). 226 Transfer complete. 4444 bytes received in 1.177seconds (3.8 Kbytes/s) And that's it! The file is now located in your home directory on your host system, from which you can now download it to your own computer. The simple "get" command is the key to transferring a file from an archive site to your host system. If you want to download more than one file at a time (say a series of documents, use mget instead of get; for example: mget *.txt This will transfer copies of every file ending with .txt in the given directory. Before each file is copied, you'll be asked if you're sure you want it. Despite this, mget could still save you considerable time -- you won't have to type in every single file name. If you want to save even more time, and are sure you really want ALL of the given files, type prompt before you do the mget command. This will turn off the prompt, and all the files will be zapped right into your home directory. There is one other command to keep in mind. If you want to get a copy of a computer program, type bin and hit enter. This tells the ftp site and your host site that you are sending a binary file, i.e., a program. Most ftp sites now use binary format as a default, but it's a good idea to do this in case you've connected to one of the few that doesn't. To switch to a directory, type cd directory-name (substituting the name of the directory you want to access) and hit enter. Type ls and hit enter to get the file listing for that particular directory. To move back up the directory tree, type cd .. (note the space between the d and the first period) and hit enter. Or you could type cdup and hit enter. Keep doing this until you get to the directory of interest. Alternately, if you already know the directory path of the file you want (from our friend archie), after you connect, you could simply type get directory/subdirectory/filename On many sites, files meant for public consumption are in the pub or public directory; sometimes you'll see an info directory. Almost every site has a bin directory, which at first glance sounds like a bin in which interesting stuff might be dumped. But it actually stands for "binary" and is simply a place for the system administrator to store the programs that run the ftp system. Lost+found is another directory that looks interesting but actually never has anything of public interest in them. Before, you saw how to use archie. From our example, you can see that some system administrators go a little berserk when naming files. Fortunately, there's a way for you to rename the file as it's being transferred. Using our archie example, you'd type get zterm-sys7-color-icons.hqx zterm.hqx and hit enter. Instead of having to deal constantly with a file called zterm-sys7-color-icons.hqx, you'll now have one called, simply, zterm.hqx. Those last three letters bring up something else: Many program files are compressed to save on space and transmission time. In order to actually use them, you'll have to use an un-compress program on them first. 7.4 ODD LETTERS -- DECODING FILE ENDINGS There are a wide variety of compression methods in use. You can tell which method was used by the last one to three letters at the end of a file. Here are some of the more common ones and what you'll need to un- compress the files they create (most of these decompression programs can be located through archie). .txt or .TXT By itself, this means the file is a document, rather than a program. .ps or .PS A PostScript document (in Adobe's page description language). You can print this file on any PostScript capable printer, or use a previewer, like GNU project's GhostScript. .doc or .DOC Another common "extension" for documents. No decompression is needed, unless it is followed by: .Z This indicates a Unix compression method. To uncompress, type uncompress filename.Z and hit enter at your host system's command line. If the file is a compressed text file, you can read it online by instead typing zcat filename.txt.Z |more u16.zip is an MS-DOS program that will let you download such a file and uncompress it on your own computer. The Macintosh equivalent program is called MacCompress (use archie to find these). .zip or .ZIP These indicate the file has been compressed with a common MS-DOS compression program, known as PKZIP (use archie to find PKZIP204.EXE). Many Unix systems will let you un-ZIP a file with a program called, well, unzip. .gz A Unix version of ZIP. To uncompress, type gunzip filename.gz at your host system's command line. .zoo or .ZOO A Unix and MS-DOS compression format. Use a program called zoo to uncompress .Hqx or .hqx Mactintosh compression format. Requires the BinHex program. .shar or Another Unix format. Use unshar to uncompress. .Shar .tar Another Unix format, often used to compress several related files into one large file. Most Unix systems will have a program called tar for "un-tarring" such files. Often, a "tarred" file will also be compressed with the gz method, so you first have to use uncompress and then tar. .sit or .Sit A Mactinosh format that requires the StuffIt program. .ARC Another MS-DOS format, which requires the use of the ARC or ARCE programs. .LHZ Another MS-DOS format; requires the use of LHARC. A few last words of caution: Check the size of a file before you get it. The Net moves data at phenomenal rates of speed. But that 500,000- byte file that gets transferred to your host system in a few seconds could take more than an hour or two to download to your computer if you're using a 2400-baud modem. Your host system may also have limits on the amount of bytes you can store online at any one time. Also, although it is really extremely unlikely you will ever get a file infected with a virus, if you plan to do much downloading over the Net, you'd be wise to invest in a good anti-viral program, just in case. 7.5 THE KEYBOARD CABAL System administrators are like everybody else -- they try to make things easier for themselves. And when you sit in front of a keyboard all day, that can mean trying everything possible to reduce the number of keys you actually have to hit each day. Unfortunately, that can make it difficult for the rest of us. You've already read about bin and lost+found directories. Etc is another seemingly interesting directory that turns out to be another place to store files used by the ftp site itself. Again, nothing of any real interest. Then, once you get into the actual file libraries, you'll find that in many cases, files will have such non-descriptive names as V1.1- AK.TXT. The best known example is probably a set of several hundred files known as RFCs, which provide the basic technical and organizational information on which much of the Internet is built. These files can be found on many ftp sites, but always in a form such as RFC101.TXT, RFC102.TXT and so on, with no clue whatsoever as to what information they contain. Fortunately, almost all ftp sites have a "Rosetta Stone" to help you decipher these names. Most will have a file named README (or some variant) that gives basic information about the system. Then, most directories will either have a similar README file or will have an index that does give brief descriptions of each file. These are usually the first file in a directory and often are in the form 00INDEX.TXT. Use the ftp command to get this file. You can then scan it online or download it to see which files you might be interested in. Another file you will frequently see is called ls-lR.Z. This contains a listing of every file on the system, but without any descriptions (the name comes from the Unix command ls -lR, which gives you a listing of all the files in all your directories). The Z at the end means the file has been compressed, which means you will have to use a Unix un-compress command before you can read the file. And finally, we have those system administrators who almost seem to delight in making things difficult -- the ones who take full advantage of Unix's ability to create absurdly long file names. On some FTP sites, you will see file names as long as 80 characters or so, full of capital letters, underscores and every other orthographic device that will make it almost impossible for you to type the file name correctly when you try to get it. Your secret weapon here is the mget command. Just type mget, a space, and the first five or six letters of the file name, followed by an asterisk, for example: mget This_F* The FTP site will ask you if you want to get the file that begins with that name. If there are several files that start that way, you might have to answer 'n' a few times, but it's still easier than trying to recreate a ludicrously long file name. 7.6 SOME INTERESTING FTP SITES What follows is a list of some interesting ftp sites, arranged by category. With hundreds of ftp sites now on the Net, however, this list barely scratches the surface of what is available. Liberal use of archie will help you find specific files. The times listed for each site are in Eastern time and represent the periods during which it is considered acceptable to connect. AMIGA ftp.uu.net Has Amiga programs in the systems/amiga directory. Available 24 hours. wuarchive.wustl.edu. Look in the pub/aminet directory. Available 24 hours. ATARI atari.archive.umich.edu Find almost all the Atari files you'll ever need, in the atari directory. 7 p.m. - 7 a.m. BOOKS rtfm.mit.edu The pub/usenet/rec.arts.books directories has reading lists for various authors as well as lists of recommended bookstores in different cities. Unfortunately, this site uses incredibly long file names -- so long they may scroll off the end of your screen if you are using an MS-DOS or certain other computers. Even if you want just one of the files, it probably makes more sense to use mget than get. This way, you will be asked on each file whether you want to get it; otherwise you may wind up frustrated because the system will keep telling you the file you want doesn't exist (since you may miss the end of its name due to the scrolling problem). 6 p.m. - 6 a.m. mrcnext.cso.uiuc.edu Project Gutenberg is an effort to translate paper texts into electronic form. Already available are more than 100 titles, from works by Lewis Carrol to Mark Twain; from "A Tale of Two Cities" to "Son of Tarzan." Look in the /etext/etext92 and /etext/etext93 directories. 6 p.m. - 9 a.m. COMPUTER ETHICS ftp.eff.org The home of the Electronic Frontier Foundation. Use cd to get to the pub directory and then look in the EFF, SJG and CPSR directories for documents on the EFF itself and various issues related to the Net, ethics and the law. Available 24 hours. CONSUMER rtfm.mit.edu The pub/usenet/misc.consumers directory has documents related to credit. The pub/usenet/rec.travel.air directory will tell you how to deal with airline reservation clerks, find the best prices on seats, etc. See under Books for a caveat in using this ftp site. 6 p.m. - 6 a.m. COOKING wuarchive.wustl.edu Look for recipes and recipe directories in the usenet/rec.food.cooking/recipes directory. gatekeeper.dec.com Recipes are in the pub/recipes directory. ECONOMICS neeedc.umesbs.maine.edu The Federal Reserve Bank of Boston uses this site (yes, there are three 'e's in "neeedc") to house all sorts of data on the New England economy. Many files contain 20 years or more of information, usually in forms that are easily adaptable to spreadsheet or database files. Look in the frbb directory. 6 p.m. - 6 a.m. town.hall.org. Look in the edgar directory for the beginnings of a system to distribute annual reports and other data publicly held companies are required to file with the Securities and Exchange Commission. The other/fed directory holds various statistical files from the Federal Reserve Board. FTP iraun1.ira.uka.de Run by the computer-science department of the University of Karlsruhe in Germany, this site offers lists of anonymous- FTP sites both internationally (in the anon.ftp.sites directory) and in Germany (in anon.ftp.sites.DE). 12 p.m. to 2 a.m. ftp.netcom.com The pub/profiles directory has lists of ftp sites. GOVERNMENT ncsuvm.cc.ncsu.edu The SENATE directory contains bibliographic records of U.S. Senate hearings and documents for the past several Congresses. Get the file README.DOS9111, which will explain the cryptic file names. 6 p.m. - 6 a.m. nptn.org The General Accounting Office is the investigative wing of Congress. The pub/e.texts/gao.reports directory represents an experiment by the agency to use ftp to distribute its reports. Available 24 hours. info.umd.edu The info/Government/US/Whitehouse directory has copies of press releases and other documents from the Clinton administration. 6 p.m. - 6 a.m. leginfo.public.ca.gov This is a repository of legislative calendars, bills and other information related to state government in California. Available 24 hours. whitehouse.gov Look for copies of presidential position papers, transcripts of press conferences and related information here. Available 24 hours. See also under law. HISTORY nptn.org This site has a large, growing collecting of text files. In the pub/e.texts/freedom.shrine directory, you'll find copies of important historical documents, from the Magna Carta to the Declaration of Independence and the Emancipation Proclamation. Available 24 hours. ra.msstate.edu Mississippi State maintains an eclectic database of historical documents, detailing everything from Attilla's battle strategy to songs of soldiers in Vietnam, in the docs/history directory. 6 p.m. - 6 a.m. seq1.loc.gov The Library of Congress has acquired numerous documents from the former Soviet government and has translated many of them into English. In the pub/soviet.archive/text.english directory, you'll find everything from telegrams from Lenin ordering the death of peasants to Khrushchev's response to Kennedy during the Cuban missile crisis. The README file in the pub/soviet.archive directory provides an index to the documents. 6 p.m. - 6 a.m. HONG KONG nok.lcs.mit.edu GIF pictures of Hong Kong pop stars, buildings and vistas are available in the pub/hongkong/HKPA directory. 6 p.m. - 6 a.m. INTERNET ftp.eff.org The pub/Net_info directory has a number of sub- directories containing various Internet resources guides and information files, including the latest online version of the Big Dummy's Guide. Available 24 hours. nic.ddn.mil The internet-drafts directory contains information about Internet, while the scc directory holds network security bulletins. 6 p.m. - 6 a.m. LAW info.umd.edu U.S. Supreme Court decisions from 1989 to the present are stored in the info/Government/US/SupremeCt directory. Each term has a separate directory (for example, term1992). Get the README and Index files to help decipher the case numbers. 6 p.m. - 6 a.m. ftp.uu.net Supreme Court decisions are in the court-opinions directory. You'll want to get the index file, which tells you which file numbers go with which file names. The decisions come in WordPerfect and Atex format only. Available 24 hours a day. LIBRARIES ftp.unt.edu The library directory contains numerous lists of libraries with computerized card catalogs accessible through the Net. LITERATURE nptn.org In the pub/e.texts/gutenberg/etext91 and etext92 directories, you can get copies of Aesop's Fables, works by Lewis Carroll and other works of literature, as well as the Book of Mormon. Available 24 hours. world.std.com The obi directory has everything from online fables to accounts of Hiroshima survivors. 6 p.m. - 6 a.m. MACINTOSH sumex-aim.stanford.edu This is the premier site for Macintosh software. After you log in, switch to the info-mac directory, which will bring up a long series of sub-directories of virtually every free and shareware Mac program you could ever want. 9 p.m. - 9 a.m. ftp.uu.net You'll find lots of Macintosh programs in the systems/mac/simtel20 directory. Available 24 hours a day. MOVIE REVIEWS lcs.mit.edu Look in the movie-reviews directory. 6 p.m. - 6 a.m. MS-DOS wuarchive.wustl.edu This carries one of the world's largest collections of MS-DOS software. The files are actually copied, or "mirrored" from a computer at the U.S. Army's White Sands Missile Range (which uses ftp software that is totally incomprehensible). It also carries large collections of Macintosh, Windows, Atari, Amiga, Unix, OS9, CP/M and Apple II software. Look in the mirrors and systems directories. The gif directory contains a large number of GIF graphics images. Accessible 24 hours. ftp.uu.net Look for MS-DOS programs and files in the systems/msdos/simtel20 directory. Available 24 hours a day. MUSIC cs.uwp.edu The pub/music directory has everything from lyrics of contemporary songs to recommended CDs of baroque music. It's a little different - and easier to navigate - than other ftp sites. File and directory names are on the left, while on the right, you'll find a brief description of the file or directory, like this: SITES 1528 Other music-related FTP archive sites classical/ - (dir) Classical Buying Guide database/ - (dir) Music Database program discog/ = (dir) Discographies faqs/ = (dir) Music Frequently Asked questions files folk/ - (dir) Folk Music Files and pointers guitar/ = (dir) Guitar TAB files from ftp.nevada.edu info/ = (dir) rec.music.info archives interviews/ - (dir) Interviews with musicians/groups lists/ = (dir) Mailing lists archives lyrics/ = (dir) Lyrics Archives misc/ - (dir) Misc files that don't fit anywhere else pictures/ = (dir) GIFS, JPEGs, PBMs and more. press/ - (dir) Press Releases and misc articles programs/ - (dir) Misc music-related programs for various machines releases/ = (dir) Upcoming USA release listings sounds/ = (dir) Short sound samples 226 Transfer complete. ftp> When you switch to a directory, don't include the /. 7 p.m. - 7 a.m. potemkin.cs.pdx.edu The Bob Dylan archive. Interviews, notes, year-by-year accounts of his life and more, in the pub/dylan directory. 9 p.m. - 9 a.m. ftp.nevada.edu Guitar chords for contemporary songs are in the pub/guitar directory, in subdirectories organized by group or artist. NATIVE AMERICANS pines.hsu.edu Home of IndianNet, this site contains a variety of directories and files related to Indians and Eskimos, including federal census data, research reports and a tribal profiles database. Look in the pub and indian directories. PETS rtfm.mit.edu The pub/usenet/rec.pets.dogs and pub/usenet.rec.pets.cats directories have documents on the respective animals. See under Books for a caveat in using this ftp site. 6 p.m. - 6 a.m. PICTURES wuarchiv.wustl.edu The graphics/gif directory contains hundreds of GIF photographic and drawing images, from cartoons to cars, space images to pop stars. These are arranged in a long series of subdirectories. PHOTOGRAPHY ftp.nevada.edu Photolog is an online digest of photography news, in the pub/photo directory. RELIGION nptn.org In the pub/e.texts/religion directory, you'll find subdirectories for chapters and books of both the Bible and the Koran. Available 24 hours. SCIENCE FICTION elbereth.rutgers.edu In the pub/sfl directory, you'll find plot summaries for various science-fiction TV shows, including Star Trek (not only the original and Next Generation shows, but the cartoon version as well), Lost in Space, Battlestar Galactica, the Twilight Zone, the Prisoner and Doctor Who. There are also lists of various things related to science fiction and an online science-fiction fanzine. 6 p.m. - 6 a.m. SEX rtfm.mit.edu Look in the pub/usenet/alt.sex and pub/usenet/alt.sex.wizards directories for documents related to all facets of sex. See under Books for a caveat in using this ftp site. 6 p.m. - 6 a.m. SHAKESPEARE atari.archive.umich.edu The shakespeare directory contains most of the Bard's works. A number of other sites have his works as well, but generally as one huge mega-file. This site breaks them down into various categories (comedies, poetry, histories, etc.) so that you can download individual plays or sonnets. SPACE ames.arc.nasa.gov Stores text files about space and the history of the NASA space program in the pub/SPACE subdirectory. In the pub/GIF and pub/SPACE/GIF directories, you'll find astronomy- and NASA-related GIF files, including pictures of planets, satellites and other celestial objects. 9 p.m. - 9 a.m. TV coe.montana.edu The pub/TV/Guides directory has histories and other information about dozens of TV shows. Only two anonymous-ftp log-ins are allowed at a time, so you might have to try more than once to get in. 8 p.m. - 8 a.m. ftp.cs.widener.edu The pub/simpsons directory has more files than anybody could possibly need about Bart and family. The pub/strek directory has files about the original and Next Generation shows as well as the movies. See also under Science Fiction. TRAVEL nic.stolaf.edu Before you take that next overseas trip, you might want to see whether the State Department has issued any kind of advisory for the countries on your itinerary. The advisories, which cover everything from hurricane damage to civil war, are in the pub/travel- advisories/advisories directory, arranged by country. 7 p.m. - 7 a.m. USENET ftp.uu.net In the usenet directory, you'll find "frequently asked questions" files, copied from rtfm.mit.edu. The communications directory holds programs that let MS-DOS users connect directly with UUCP sites. In the info directory, you'll find information about ftp and ftp sites. The inet directory contains information about Internet. Available 24 hours. rtfm.mit.edu This site contains all available "frequently asked questions" files for Usenet newsgroups in the pub/usenet directory. See under Books for a caveat in using this ftp site. 6 p.m. - 6 a.m. VIRUSES ftp.unt.edu The antivirus directory has anti-virus programs for MS- DOS and Macintosh computers. 7 p.m. - 7 a.m. WEATHER wuarchive.wustl.edu The /multimedia/images/wx directory contains GIF weather images of North America. Files are updated hourly and take this general form: CV100222. The first two letters tell the type of file: CV means it is a visible-light photo taken by a weather satellite. CI images are similar, but use infrared light. Both these are in black and white. Files that begin with SA are color radar maps of the U.S. that show severe weather patterns but also fronts and temperatures in major cities. The numbers indicate the date and time (in GMT - five hours ahead of EST) of the image: the first two numbers represent the month, the next two the date, the last two the hour. The file WXKEY.GIF explains the various symbols in SA files. 7.7 ncftp -- NOW YOU TELL ME! If you're lucky, the people who run your host system or public- access site have installed a program called ncftp, which takes some of the edges off the ftp process. For starters, when you use ncftp instead of plain old ftp, you no longer have to worry about misspelling "anonymous" when you connect. The program does it for you. And once you're in, instead of getting line after line filled with dashes, x's, r's and d's, you only get listings of the files or directories themselves (if you're used to MS-DOS, the display you get will be very similar to that produced by the dir/w command). The program even creates a list of the ftp sites you've used most recently, so you can pick from that list, instead of trying to remember some incredibly complex ftp site name. Launching the program, assuming your site has it, is easy. At the command prompt, type ncftp sitename where "sitename" is the site you want to reach (alternately, you could type just ncftp and then use its open command). Once connected, you can use the same ftp commands you've become used to, such as ls, get and mget. Entries that end in a / are directories to which you can switch with cd; others are files you can get. A couple of useful ncftp commands include type, which lets you change the type of file transfer (from ASCII to binary for example) and size, which lets you see how large a file is before you get it, for example size declaration.txt would tell you how large the declaration.txt file is before you get it. When you say "bye" to disconnect from a site, ncftp remembers the last directory you were in, so that the next time you connect to the site, you are put back into that directory automatically. If you type help you'll get a list of files you can read to extend the power of the program even further. 7.8 PROJECT GUTENBERG -- ELECTRONIC BOOKS Project Gutenberg, coordinated by Michael Hart, has a fairly ambitious goal: to make more than 10,000 books and other documents available electronically by the year 2001. In 1993, the project uploaded an average of four books a month to its ftp sites; in 1994, they hope to double the pace. Begun in 1971, the project already maintains a "library" of hundreds of books and stories, from Aesop's Fables to "Through the Looking Glass" available for the taking. It also has a growing number of current- affairs documents, such as the CIA's annual "World Factbook" almanac. Besides nptn.org, Project Gutenberg texts can be retrieved from mrcnext.cso.uiuc.edu in the etext directory. 7.9 WHEN THINGS GO WRONG * You get a "host unavailable" message. The ftp site is down for some reason. Try again later. * You get a "host unknown" message. Check your spelling of the site name. * You misspell "anonymous" when logging in and get a message telling you a password is required for whatever you typed in. Type something in, hit enter, type bye, hit enter, and try again. Alternately, try typing "ftp" instead of "anonymous." It will work on a surprising number of sites. Or just use ncftp, if your site has it, and never worry about this again. 7.10 FYI Liberal use of archie will help you find specific files or documents. For information on new or interesting ftp sites, try the comp.archives newsgroup on Usenet. You can also look in the comp.misc, comp.sources.wanted or news.answers newsgroups on Usenet for lists of ftp sites posted every month by Tom Czarnik and Jon Granrose. The comp.archives newsgroup carries news of new ftp sites and interesting new files on existing sites. In the comp.virus newsgroup on Usenet, look for postings that list ftp sites carrying anti-viral software for Amiga, MS-DOS, Macintosh, Atari and other computers. The comp.sys.ibm.pc.digest and comp.sys.mac.digest newsgroups provide information about new MS-DOS and Macintosh programs as well as answers to questions from users of those computers. Chapter 8: GOPHERS, WAISs AND THE WORLD-WIDE WEB 8.1. GOPHERS Even with tools like Hytelnet and archie, telnet and ftp can still be frustrating. There are all those telnet and ftp addresses to remember. Telnet services often have their own unique commands. And, oh, those weird directory and file names! But now that the Net has become a rich repository of information, people are developing ways to make it far easier to find and retrieve information and files. Gophers and Wide-Area Information Servers (WAISs) are two services that could ultimately make the Internet as easy to navigate as commercial networks such as CompuServe or Prodigy. Both gophers and WAISs essentially take a request for information and then scan the Net for it, so you don't have to. Both also work through menus -- instead of typing in some long sequence of characters, you just move a cursor to your choice and hit enter. Gophers even let you select files and programs from ftp sites this way. Let's first look at gophers (named for the official mascot of the University of Minnesota, where the system was developed). Many public-access sites now have gophers online. To use one, type gopher at the command prompt and hit enter. If you know your site does not have a gopher, or if nothing happens when you type that, telnet to consultant.micro.umn.edu At the log-in prompt, type gopher and hit enter. You'll be asked what type of terminal emulation you're using, after which you'll see something like this: Internet Gopher Information Client v1.03 Root gopher server: gopher.micro.umn.edu --> 1. Information About Gopher/ 2. Computer Information/ 3. Discussion Groups/ 4. Fun & Games/ 5. Internet file server (ftp) sites/ 6. Libraries/ 7. News/ 8. Other Gopher and Information Servers/ 9. Phone Books/ 10. Search lots of places at the U of M 11. University of Minnesota Campus Information/ Press ? for Help, q to Quit, u to go up a menu Page: 1/1 Assuming you're using VT100 or some other VT emulation, you'll be able to move among the choices with your up and down arrow keys. When you have your cursor on an entry that looks interesting, just hit enter, and you'll either get a new menu of choices, a database entry form, or a text file, depending on what the menu entry is linked to (more on how to tell which you'll get in a moment). Gophers are great for exploring the resources of the Net. Just keep making choices to see what pops up. Play with it; see where it takes you. Some choices will be documents. When you read one of these and either come to the end or hit a lower-case q to quit reading it, you'll be given the choice of saving a copy to your home directory or e-mailing it to yourself. Other choices are simple databases that let you enter a word to look for in a particular database. To get back to where you started on a gopher, hit your u key at a menu prompt, which will move you back "up" through the gopher menu structure (much like "cd .." in ftp). Notice that one of your choices above is "Internet file server (ftp) sites." Choose this, and you'll be connected to a modified archie program -- an archie with a difference. When you search for a file through a gopher archie, you'll get a menu of sites that have the file you're looking for, just as with the old archie. Only now, instead of having to write down or remember an ftp address and directory, all you have to do is position the cursor next to one of the numbers in the menu and hit enter. You'll be connected to the ftp site, from which you can then choose the file you want. This time, move the cursor to the file you want and hit a lower-case s. You'll be asked for a name in your home directory to use for the file, after which the file will be copied to your home system. Unfortunately, this file-transfer process does not yet work with all public-access sites for computer programs and compressed files. If it doesn't work with yours, you'll have to get the file the old-fashioned way, via anonymous ftp. In addition to ftp sites, there are hundreds of databases and libraries around the world accessible through gophers. There is not yet a common gopher interface for library catalogs, so be prepared to follow the online directions more closely when you use gopher to connect to one. Gopher menu entries that end in a / are gateways to another menu of options. Entries that end in a period are text, graphics or program files, which you can retrieve to your home directory (or e-mail to yourself or to somebody else). A line that ends in or represents a request you can make to a database for information. The difference is that entries call up one-line interfaces in which you can search for a keyword or words, while brings up an electronic form with several fields for you to fill out (you might see this in online "White Pages" directories at colleges). Gophers actually let you perform some relatively sophisticated Boolean searches. For example, if you want to search only for files that contain the words "MS-DOS" and "Macintosh," you'd type ms-dos and macintosh (gophers are not case-sensitive) in the keyword field. Alternately, if you want to get a list of files that mention either "MS-DOS" or "Macintosh," you'd type ms-dos or macintosh 8.2 BURROWING DEEPER As fascinating as it can be to explore "gopherspace," you might one day want to quickly retrieve some information or a file. Or you might grow tired of calling up endless menus to get to the one you want. Fortunately, there are ways to make even gophers easier to use. One is with archie's friend, veronica (it allegedly is an acronym, but don't believe that for a second), who does for gopherspace what archie does for ftp sites. In most gophers, you'll find veronica by selecting "Other gopher and information services" at the main menu and then "Searching through gopherspace using veronica." Select this and you'll get something like this: Internet Gopher Information Client v1.1 Search titles in Gopherspace using veronica --> 1. . 2. FAQ: Frequently-Asked Questions about veronica (1993/08/23). 3. How to compose veronica queries (NEW June 24) READ ME!!. 4. Search Gopher Directory Titles at PSINet 5. Search Gopher Directory Titles at SUNET 6. Search Gopher Directory Titles at U. of Manitoba 7. Search Gopher Directory Titles at University of Cologne 8. Search gopherspace at PSINet 9. Search gopherspace at SUNET 10. Search gopherspace at U. of Manitoba 11. Search gopherspace at University of Cologne Press ? for Help, q to Quit, u to go up a menu Page: 1/1 A few choices there! First, the difference between searching directory titles and just plain ol' gopherspace. If you already know the sort of directory you're looking for (say a directory containing MS-DOS programs), do a directory-title search. But if you're not sure what kind of directory your information might be in, then do a general gopherspace search. In general, it doesn't matter which of the particular veronicas you use -- they should all be able to produce the same results. The reason there is more than one is because the Internet has become so popular that only one veronica (or one gopher or one of almost anything) would quickly be overwhelmed by all the information requests from around the world. You can use veronica to search for almost anything. Want to find museums that might have online displays from their exhibits? Try searching for "museum." Looking for a copy of the Declaration of Independence? Try "declaration." In many cases, your search will bring up a new gopher menu of choices to try. Say you want to impress those guests coming over for dinner on Friday by cooking cherries flambe. If you were to call up veronica and type in "flambe" after calling up veronica, you would soon get a menu listing several flambe recipes, including one called "dessert flambe." Put your cursor on that line of the menu and hit enter, and you'll find it's a menu for cherries flambe. Then hit your q key to quit, and gopher will ask you if you want to save the file in your home directory on your public-access site or whether you want to e-mail it somewhere. As you can see, you can use veronica as an alternative to archie, which, because of the Internet's growing popularity, seems to take longer and longer to work. In addition to archie and veronica, we now also have jugheads (no bettys yet, though). These work the same as veronicas, but their searches are limited to the specific gopher systems on which they reside. If there are particular gopher resources you use frequently, there are a couple of ways to get to them even more directly. One is to use gopher in a manner similar to the way you can use telnet. If you know a particular gopher's Internet address (often the same as its telnet or ftp address), you can connect to it directly, rather than going through menus. For example, say you want to use the gopher at info.umd.edu. If your public-access site has a gopher system installed, type this gopher info.umd.edu at your command prompt and you'll be connected. But even that can get tedious if there are several gophers you use frequently. That's where bookmarks come in. Gophers let you create a list of your favorite gopher sites and even database queries. Then, instead of digging ever deeper into the gopher directory structure, you just call up your bookmark list and select the service you want. To create a bookmark for a particular gopher site, first call up gopher. Then go through all the gopher menus until you get to the menu you want. Type a capital A. You'll be given a suggested name for the bookmark enty, which you can change if you want by backspacing over the suggestion and typing in your own. When done, hit enter. Now, whenever you're in gopherspace and want to zip back to that particular gopher service, just hit your V key (upper- or lower-case; in this instance, gopher doesn't care) anywhere within gopher. This will bring up a list of your bookmarks. Move to the one you want and hit enter, and you'll be connected. Using a capital A is also good for saving particular database or veronica queries that you use frequently (for example, searching for news stories on a particular topic if your public-access site maintains an indexed archive of wire-service news). Instead of a capital A, you can also hit a lower-case a. This will bring you to the particular line within a menu, rather than show you the entire menu. If you ever want to delete a bookmark, hit V within gopher, select the item you want to get rid of, and then hit your D key. One more hint: If you want to find the address of a particular gopher service, hit your = key after you've highlighted its entry in a gopher menu. You'll get back a couple of lines, most of which will be technicalese of no immediate value to most folks, but some of which will consist of the site's address. 8.3. GOPHER COMMANDS a Add a line in a gopher menu to your bookmark list. A Add an entire gopher menu or a database query to your bookmark list. d Delete an entry from your bookmark list (you have to hit v first). q Quit, or exit, a gopher. You'll be asked if you really want to. Q Quit, or exit, a gopher without being asked if you're sure. s Save a highlighted file to your home directory. u Move back up a gopher menu structure v View your bookmark list. = Get information on the originating site of a gopher entry. > Move ahead one screen in a gopher menu. < Move back one screen in a gopher menu. 8.4. SOME INTERESTING GOPHERS There are now hundreds of gopher sites around the world. What follows is a list of some of them. Assuming your site has a gopher "client" installed, you can reach them by typing gopher sitename at your command prompt. Can't find what you're looking for? Remember to use veronica to look up categories and topics! AGRICULTURE cyfer.esusda.gov More agricultural statistics and regulations most people will ever need. usda.mannlib.cornell.edu More than 140 different types of agricultural data, most in Lotus 1-2-3 spreadsheet format. ANIMALS saimiri.primate.wisc.edu Information on primates and animal-welfare laws. ARCHITECTURE libra.arch.umich.edu Maintains online exhibits of a variety of architectural images. ART marvel.loc.gov The Library of Congress runs several online "galleries" of images from exhibits at the library. Many of these pictures, in GIF or JPEG format, are HUGE, so be careful what you get first. Exhibits include works of art from the Vatican, copies of once secret Soviet documents and pictures of artifacts related to Columbus's 1492 voyage. At the main menu, select 2 and then "Exhibits." galaxy.ucr.edu The California Museum of Photography maintains its own online galery here. At the main menu, select "Campus Events," then "California Museum of Photography," then "Network Ex- hibitions." ASTRONOMY cast0.ast.cam.ac.uk A gopher devoted to astronomy, run by the Institute of Astronomy and the Royal Greenwich Observatory, Cambridge, England. CENSUS bigcat.missouri.edu You'll find detailed federal census data for communities of more than 10,000 people, as well as for states and counties here. At the main menu, select "Reference and Information Center," then "United States and Missouri Census Information" and "United States Census." COMPUTERS wuarchive.wustl.edu Dozens of directories with software for all sorts of computers. Most programs have to be "un-compressed" before you can use them. sumex-aim.stanford.edu A similar type of system, with the emphasis on Macintosh programs and files. DISABILITY val-dor.cc.buffalo.edu The Cornucopia of Disability Information carries numerous information resources on disability issues and links to other disability-related services. ENVIRONMENT ecosys.drdr.virginia.edu Copies of Environmental Protection Agency factsheets on hundreds of chemicals, searchable by keyword. Select "Education" and then "Environmental fact sheets." envirolink.org Dozens of documents and files related to environmental activism around the world. ENTOMOLOGY spider.ento.csiro.au All about creepy-crawly things, both the good and the bad ones. GEOLOGY gopher.stolaf.edu Select "Internet Resources" and then "Weather and geography" for information on recent earthquakes. GOVERNMENT marvel.loc.gov Run by the Library of Congress, this site provides numerous resources, including access to the Library card catalog and all manner of information about the U.S. Congress. gopher.lib.umich.edu Wide variety of government information, from Congressional committee assignments to economic statistics and NAFTA information. ecix.doc.gov Information on conversion of military installations to private uses. sunsite.unc.edu Copies of current and past federal budgets can be found by selecting "Sunsite archives," then "Politics," then "Sunsite politcal science archives." wiretap.spies.com Documents related to Canadian government can be found in the "Government docs" menu. stis.nih.gov Select the "Other U.S. government gopher servers" for access to numerous other federal gophers. HEALTH odie.niaid.nih.gov National Institutes of Health databases on AIDS, in the "AIDS related information" menu. helix.nih.gov For National Cancer Institute factsheets on different cancers, select "Health and clinical information" and then "Cancernet information." nysernet.org Look for information on breast cancer in the "Special Collections: Breast Cancer" menu. welchlink.welch.jhu.edu This is Johns Hopkins University's medical gopher. HISTORY See under Art. INTERNET gopher.lib.umich.edu Home to several guides to Internet resources in specific fields, for example, social sciences. Select "What's New & Featured Resources" and then "Clearinghouse." ISRAEL jerusalem1.datasrv.co.il This Israeli system offers numerous documents on Israel and Jewish life. JAPAN gopher.ncc.go.jp Look in the "Japan information" menu for documents related to Japanese life and culture. MUSIC mtv.com Run by Adam Curry, an MTV video jock, this site has music news and Curry's daily "Cybersleaze" celebrity report. NATURE ucmp1.berkeley.edu The University of California at Berkeley's Museum of Paleontology runs several online exhibits here. You can obtain GIF images of plants and animals from the "Remote Nature" menu. The "Origin of the Species" menu lets you read Darwin's work or search it by keyword. SPORTS culine.colorado.edu Look up schedules for teams in various professional sports leagues here, under "Professional Sports Schedules." WEATHER wx.atmos.uiuc.edu Look up weather forecasts for North America or bone up on your weather facts. 8.5. WIDE-AREA INFORMATION SERVERS Now you know there are hundreds of databases and library catalogs you can search through. But as you look, you begin to realize that each seems to have its own unique method for searching. If you connect to several, this can become a pain. Gophers reduce this problem somewhat. Wide-area information servers promise another way to zero in on information hidden on the Net. In a WAIS, the user sees only one interface -- the program worries about how to access information on dozens, even hundreds, of different databases. You tell give a WAIS a word and it scours the net looking for places where it's mentioned. You get a menu of documents, each ranked according to how relevant to your search the WAIS thinks it is. Like gophers, WAIS "client" programs can already be found on many public-access Internet sites. If your system has a WAIS client, type swais at the command prompt and hit enter (the "s" stands for "simple"). If it doesn't, telnet to bbs.oit.unc.edu, which is run by the University of North Carolina At the "login:" prompt, type bbs and hit enter. You'll be asked to register and will then get a list of "bulletins,'' which are various files explaining how the system works. When done with those, hit your Q key and you'll get another menu. Hit 4 for the "simple WAIS client," and you'll see something like this: SWAIS Source Selection Sources: 23# Server Source Cost 001: [ archie.au] aarnet-resource-guide Free 002: [ archive.orst.edu] aeronautics Free 003: [nostromo.oes.orst.ed] agricultural-market-news Free 004: [sun-wais.oit.unc.edu] alt-sys-sun Free 005: [ archive.orst.edu] alt.drugs Free 006: [ wais.oit.unc.edu] alt.gopher Free 007: [sun-wais.oit.unc.edu] alt.sys.sun Free 008: [ wais.oit.unc.edu] alt.wais Free 009: [ archive.orst.edu] archie-orst.edu Free 010: [ archie.au] archie.au-amiga-readmes Free 011: [ archie.au] archie.au-ls-lRt Free 012: [ archie.au] archie.au-mac-readmes Free 013: [ archie.au] archie.au-pc-readmes Free 014: [ pc2.pc.maricopa.edu] ascd-education Free 015: [ archie.au] au-directory-of-servers Free 016: [ cirm2.univ-mrs.fr] bib-cirm Free 017: [ cmns-sun.think.com] bible Free 018: [ zenon.inria.fr] bibs-zenon-inria-fr Free Keywords: selects, w for keywords, arrows move, searches, q quits, or ? Each line represents a different database (the .au at the end of some of them means they are in Australia; the .fr on the last line represents a database in France). And this is just the first page! If you type a capital K, you'll go to the next page (there are several pages). Hitting a capital J will move you back a page. The first thing you want to do is tell the WAIS program which databases you want searched. To select a database, move the cursor bar over the line you want (using your down and up arrow keys) and hit your space bar. An asterisk will appear next to the line number. Repeat this until you've selected all of the databases you want searched. Then hit your W key, after which you'll be prompted for the key words you're looking for. You can type in an entire line of these words -- separate each with a space, not a comma. Hit return, and the search begins. Let's say you're utterly fascinated with wheat. So you might select agricultural-market-news to find its current world price. But you also want to see if it has any religious implications, so you choose the Bible and the Book of Mormon. What do you do with the stuff? Select recipes and usenet-cookbook. Are there any recent Supreme Court decisions involving the plant? Choose supreme-court. How about synonyms? Try roget-thesaurus and just plain thesaurus. Now hit w and type in wheat. Hit enter, and the WAIS program begins its search. As it looks, it tells you whether any of the databases are offline, and if so, when they might be ready for a search. In about a minute, the program tells you how many hits it's found. Then you get a new menu, that looks something like this: Keywords: # Score SourceTitleLines 001: [1000] (roget-thesaurus) #465. [results of comparison. 1] Di 19 002: [1000] (roget-thesaurus) #609. Choice. -- N. choice, option; 36 003: [1000] (roget-thesaurus) #465. [results of comparison. 1] Di 19 004: [1000] (roget-thesaurus) #609. Choice. -- N. choice, option; 36 005: [1000] (recipes) aem@mthvax Re: MONTHLY: Rec.Food.Recipes 425 006: [1000] ( Book_of_Mormon) Mosiah 9:96 007: [1000] ( Book_of_Mormon) 3 Nephi 18:185 008: [1000] (agricultural-ma) Re: JO GR115, WEEKLY GRAIN82 009: [ 822] (agricultural-ma) Re: WA CB351 PROSPECTIVE PLANTINGS 552 010: [ 800] ( recipes) kms@apss.a Re: REQUEST: Wheat-free, Suga 35 011: [ 750] (agricultural-ma) Re: WA CB101 CROP PRODUCTION258 012: [ 643] (agricultural-ma) Re: SJ GR850 DAILY NAT GRN SUM72 013: [ 400] ( recipes) pat@jaamer Re: VEGAN: Honey Granola63 014: [ 400] ( recipes) jrtrint@pa Re: OVO-LACTO: Sourdough/Trit 142 Each of these represents an article or citing that contains the word wheat, or some related word. Move the cursor bar (with the down and up arrow keys) to the one you want to see, hit enter, and it will begin to appear on your screen. The "score" is a WAIS attempt to gauge how closely the citing matches your request. Doesn't look like the Supreme Court has had anything to say about the plant of late! Now think of how much time you would have spent logging onto various databases just to find these relatively trivial examples. 8.6 THE WORLD-WIDE WEB Developed by researchers at the European Particle Physics Laboratory in Geneva, the World-Wide Web is somewhat similar to a WAIS. But it's designed on a system known as hypertext. Words in one document are "linked" to other documents. It's sort of like sitting with an encyclopedia -- you're reading an article, see a reference that intrigues you and so flip the pages to look up that reference. To try the Worldwide Web, telnet to ukanaix.cc.ukans.edu Log on as: www. When you connect, you'll see something like: Welcome to CERN The World-Wide Web: CERN entry point CERN is the European Particle Physics Laboratory in Geneva, Switzerland. Select by number information here, or elsewhere. Help[1] About this program World-Wide Web[2] About the W3 global information initiative. CERN information[3] Information from and about this site Particle Physics[4] Other HEP sites with information servers Other Subjects[5] Catalogue of all online information by subject. Also: by server type[6] . ** CHECK OUT X11 BROWSER "ViolaWWW": ANON FTP TO info.cern.ch in /pub/www/src *** Still beta, so keep bug reports calm :-) If you use this service frequently, please install this or any W3 browser on your own machine (see instructions[7] ). You can configure it to start 1-7, for more, Quit, or Help: You navigate the web by typing the number next to a given reference. So if you want to know more about the web, hit 2. This is another system that bears playing with. 8.7. CLIENTS, OR HOW TO SNARE MORE ON THE WEB If you are used to plain-vanilla Unix or MS-DOS, then the way these gophers and WAISs work seems quite straightforward. But if you're used to a computer with a graphical interface, such as a Macintosh, an IBM compatible with Windows or a Next, you'll probably regard their interfaces as somewhat primitive. And even to a veteran MS-DOS user, the World-Wide Web interface is rather clunky (and some of the documents and files on the Web now use special formatting that would confuse your poor computer). There are, however, ways to integrate these services into your graphical user interface. In fact, there are now ways to tie into the Internet directly, rather than relying on whatever interface your public-access system uses, through what are known as "client" programs. These programs provide graphical interfaces for everything from ftp to the World-Wide Web. There is now a growing number of these "client" programs for everything from ftp to gopher. PSI of Reston, Va., which offers nationwide Internet access, in fact, requires its customers to use these programs. Using protocols known as SLIP and PPP, these programs communicate with the Net using the same basic data packets as much larger computers online. Beyond integration with your own computer's "desktop,'' client programs let you do more than one thing at once on the net -- while you're downloading a large file in one window, you can be chatting with a friend through an Internet chat program in another. Unfortunately, using a client program can cost a lot of money. Some require you to be connected directly to the Internet through an Ethernet network for example. Others work through modem protocols, such as SLIP, but public-access sites that allow such access may charge anywhere from $25 to $200 a month extra for the service. Your system administrator can give you more information on setting up one of these connections. 8.8. WHEN THINGS GO WRONG As the Internet grows ever more popular, its resources come under more of a strain. If you try to use gopher in the middle of the day, at least on the East Coast of the U.S., you'll sometimes notice that it takes a very long time for particular menus or database searches to come up. Sometimes, you'll even get a message that there are too many people connected to whichever service you're trying to use and so you can't get in. The only alternative is to either try again in 20 minutes or so, or wait until later in the day, when the load might be lower. When this happens in veronica, try one of the other veronica entries. When you retrieve a file through gopher, you'll sometimes be asked if you want to store it under some ludicrously long name (there go our friends the system administrators again, using 128 characters just because Unix lets them). With certain MS-DOS communications programs, if that name is longer than one line, you won't be able to backspace all the way back to the first line if you want to give it a simpler name. Backspace as far as you can. Then, when you get ready to download it to your home computer, remember that the file name will be truncated on your end, because of MS-DOS's file-naming limitations. Worse, your computer might even reject the whole thing. What to do? Instead of saving it to your home directory, mail it to yourself. It should show up in your mail by the time you exit gopher. Then, use your mail command for saving it to your home directory -- at which point you can name it anything you want. Now you can download it. 8.9 FYI David Riggins maintains a list of gophers by type and category. You can find the most recent one at the ftp site ftp.einet.net, in the pub directory. Look for a file with a name like "gopher-jewels.txt." Alternately, you can get on a mailing list to get the latest version sent to your e-mailbox automatically. Send a mail message to gopherjewelslist- request@tpis.cactus.org (yep, that first part is all one word). Leave the "subject:" line blank, and as a message, write SUBSCRIBE. Blake Gumprecht maintains a list of gopher and telnet sites related to, or run by, the government. He posts it every three weeks to the news.answers and soc.answers newsgroups on Usenet. It can also be obtained via anonymous ftp from rtfm.mit.edu, as /pub/usenet/news.answers/us-govt-net-pointers. Students at the University of Michigan's School of Information and Library Studies, recently compiled separate lists of Internet resources in 11 specific areas, from aeronautics to theater. They can be obtained via gopher at gopher.lib.umich.edu, in the "What's New and Featured Resources" menu. The Usenet newsgroups comp.infosystems.gopher and comp.infosystems.wais are places to go for technical discussions about gophers and WAISs respectively. The Interpedia project is an attempt to take gopher one step further, by creating an online repository of all of the interesting and useful information availble on the Net and from its users. To get on the mailing list for the project, send an e-mail message, with a "subject:" of "subscribe" to interpedia-request@telerama.lm.com. You can get supporting documentation for the project via anonymous ftp at ftp.lm.com in the pub/interpedia directory. Chapter 9: ADVANCED E-MAIL 9.1 THE FILE'S IN THE MAIL E-mail by itself is a powerful tool, and by now you may be sending e-mail messages all over the place. You might even be on a mailing list or two. But there is a lot more to e-mail than just sending messages. If your host system does not have access to ftp, or it doesn't have access to every ftp site on the Net, you can have programs and files sent right to your mailbox. And using some simple techniques, you can use e-mail to send data files such as spreadsheets, or even whole programs, to friends and colleagues around the world. A key to both is a set of programs known as encoders and decoders. For all its basic power, Net e-mail has a big problem: it can't handle graphics characters or the control codes found in even the simplest of computer programs. Encoders however, can translate these into forms usable in e-mail, while decoders turn them back into a form that you can actually use. If you are using a Unix-based host system, chances are it already has an encoder and decoder online that you can use. These programs will also let you use programs posted in several Usenet newsgroups, such as comp.binaries.ibm.pc. If both you and the person with whom you want to exchange files use Unix host systems, you're in luck because virtually all Unix host systems have encoder/decoder programs online. For now, let's assume that's the case. First, upload the file you want to send to your friend to your host site (ask your system administrator how to upload a file to your name or "home" directory if you don't already know how). Then type uuencode file file > file.uu and hit enter. "File" is the name of the file you want to prepare for mailing, and yes, you have to type the name twice! The > is a Unix command that tells the system to call the "encoded" file "file.uu" (you could actually call it anything you want). Now to get it into a mail message. The quick and dirty way is to type mail friend where "friend" is your friend's address. At the subject line, tell her the name of the enclosed file. When you get the blank line, type ~r file.uu or whatever you called the file, and hit enter. (on some systems, the ~ may not work; if so, ask your system administrator what to use). This inserts the file into your mail message. Hit control-D, and your file is on its way! On the other end, when your friend goes into her mailbox, she should transfer it to her home directory. Then she should type uudecode file.name and hit enter. This creates a new file in her name directory with whatever name you originally gave it. She can then download it to her own computer. Before she can actually use it, though, she'll have to open it up with a text processor and delete the mail header that has been "stamped" on it. If you use a mailer program that automatically appends a "signature," tell her about that so she can delete that as well. 9.2 RECEIVING FILES If somebody sends you a file through the mail, you'll have to go through a couple of steps to get it into a form you can actually use. If you are using the simple mail program, go into mail and type w # file.name where # is the number of the message you want to transfer and file.name is what you want to call the resulting file. In pine, call up the message and hit your O key and then E. You'll then be asked for a file name. In elm, call up the message and hit your S key. You'll get something that looks like this: =file.request Type a new file name and hit enter (if you hit enter without typing a file name, the message will be saved to another mail folder, not your home directory). In all three cases, exit the mail program to return to your host system's command line. Because the file has been encoded for mail delivery, you now have to run a decoder. At the command line, type uudecode file.name where file.name is the file you created while in mail. Uudecode will create a new, uncompressed binary file. In some cases, you may have to run it through some other programs (for example, if it is in "tar" form), but generally it should now be ready for you to download to your own computer (on which you might then have to run a de-compressor program such as PKXZIP). 9.3 FILES TO NON-INTERNET SITES What if your friend only connects with a non-Unix system, such as CompuServe or MCIMail? There are programs available for MS-DOS, Apple and Amiga computers that will encode and decode files. Of course, since you can't send one of these programs to your friend via e-mail (how would she un-encode it?), you'll have to mail (the old-fashioned way) or give her a diskette with the program on it first. Then, she can get the file by e-mail and go through the above process (only on her own computer) to get a usable file. Remember to give her an encoder program as well, if she wants to send you files in return. For MS-DOS machines, you'll want to get uunecode.com and uudecode.com. Both can be found through anonymous ftp at wuarchive.wustl.edu in the /mirrors/msdos/starter directory. The MS- DOS version is as easy to use as the Unix one: Just type uudecode filename.ext and hit enter. Mac users should get a program called uutool, which can be found in the info-mac/util directory on sumex-aim.stanford.edu. Think twice before sending somebody a giant file. Although large sites connected directly to the Internet can probably handle mega-files, many smaller systems cannot. Some commercial systems, such as CompuServe and MCIMail, limit the size of mail messages their users can receive. Fidonet doesn't even allow encoded messages. In general, a file size of 30,000 or so bytes is a safe upper limit for non-Internet systems. 9.4 GETTING FTP FILES VIA E-MAIL To help people without ftp access, a number of ftp sites have set up mail servers (also known as archive servers) that allow you to get files via e-mail. You send a request to one of these machines and they send back the file you want. As with ftp, you'll be able to find everything from historical documents to software (but please note that if you do have access to ftp, that method is always quicker and ties up fewer resources than using e-mail). Some interesting or useful mail servers include: mail-server@rtfm.mit.edu Files of "frequently asked questions" related to Usenet; state-by-state lists of U.S. representatives and Senators and their addresses and office phone numbers. archive-server@eff.org Information about the Electronic Frontier Foundation; documents about legal issues on the Net. archive-server@cs.widener.edu Back copies of the Computer Underground Digest and every possible fact you could want to know about "The Simpsons." netlib@uunet.uu.net Programs for many types of personal computers; archives of past postings from many Usenet newsgroups. archive-server@ames.arc.nasa.gov Space-related text and graphics (GIF-format) files. service@nic.ddn.mil Detailed information about Internet. Most mail servers work pretty much the same -- you send an e-mail message that tells them what file you want and how you want it sent to you. The most important command is "send," which tells the computer you want it to send you a particular file. First, though, you'll need to know where the mail server stores that file, because you have to tell it which directory or sub- directory it's in. There are a couple of ways to do this. You can send an e-mail message to the archive-server that consists of one line: index The server will then send you a directory listing of its main, or root directory. You'll then have to send a second message to the archive server with one line: index directory/subdirectory where that is the directory or directory path for which you want a listing. An alternative is to send an e-mail message to our old friend archie, which should send you back the file's exact location on the archive-server (along with similar listings for all the other sites that may have the file, however) Once you have the file name and its directory path, compose a message to the archive server like this: send directory/subdirectory/file Send off the message and, anywhere from a few minutes to a couple of days later, you'll find a new message in your mailbox: a copy of the file you requested. The exact time it will take a file to get to you depends on a variety of factors, including how many requests are in line before yours (mail servers can only process so many requests at a time) and the state of the connections between the server and you. Seems simple enough. It gets a little more complicated when you request a program rather than a document. Programs or other files that contain unusual characters or lines longer than 130 characters (graphics files, for example) require special processing by both the mail server to ensure they are transmitted via e-mail. Then you'll have to run them through at least one converter program to put them in a form you can actually use. To ensure that a program or other "non-mailable" file actually gets to you, include another line in your e-mail message to the server: encoder This converts the file into an encoded form. To decode it, you'll first have to transfer the file message into a file in your home directory. One further complication comes when you request a particularly long file. Many Net sites can only handle so much mail at a time. To make sure you get the entire file, tell the mail server to break it up into smaller pieces, with another line in your e-mail request like this: size 100000 This gives the mail server the maximum size, in bytes, of each file segment. This particular size is good for UUCP sites. Internet and Bitnet sites can generally go up to 300000. When you get all of these files in mail, transfer them to your home directory. Exit mail and call up each file in your host system's text processor and delete each one's entire header and footer (or "signature" at the end). When done with this, at your host system's command line, type cat file1 file2 > bigfile where file1 is the first file, file2 the second file, and so on. The > tells your host system to combine them into a new megafile called bigfile (or whatever you want to call it). After you save the file to your home directory (see section 9.2 above), you can then run uudecode, tar, etc. One word of caution, though: if the file you want is long enough that it has to be broken into pieces, think of how much time it's going to take you to download the whole thing -- especially if you're using a 2400-baud modem! There are a number of other mail servers. To get a list, send an e-mail message to mail-server@rtfm.mit.edu: send usenet/comp.sources.wanted/How_to_find_sources_(READ_THIS_BEFORE_POSTING) You'll have to spell it exactly as listed above. Some mail servers use different software, which will require slightly different commands than the ones listed here. In general, if you send a message to a mail server that says only help you should get back a file detailing all of its commands. But what if the file you want is not on one of these mail servers? That's where ftpmail comes in. Run by Digital Equipment Corp. in California, this service can connect to almost any ftp site in the world, get the file you want and then mail it to you. Using it is fairly simple -- you send an e-mail message to ftpmail that includes a series of commands telling the system where to find the file you want and how to format it to mail to you. Compose an e-mail message to ftpmail@decwrl.dec.com Leave the "subject:" line blank. Inside the message, there are several commands you can give. The first line should be reply address where "address" is your e-mail address. The next line should be connect host where "host" is the system that has the file you want (for example: wuarchive.wustl.edu). Other commands you should consider using are "binary" (required for program files); "compress" (reduces the file size for quicker transmission) and "uuencode" (which encodes the file so you can do something with it when it arrives). The last line of your message should be the word "quit". Let's say you want a copy of the U.S. constitution. Using archie, you've found a file called, surprise, constitution, at the ftp site archive.cis.ohio-state.edu, in the /pub/firearms/politics/rkba directory. You'd send a message to ftpmail@decwrl.dec.com that looks like this: reply adamg@world.std.com connect archive.cis.ohio-state.edu binary compress uuencode get pub/firearms/politics/rkba/constitution quit When you get the file in your mailbox, use the above procedure for copying it to a file. Run it through uudecode. Then type uncompress file.name to make it usable. Since this was a text file, you could have changed the "binary" to "ascii" and then eliminated the "uuencode" file. For programs, though, you'll want to keep these lines. One caveat with ftpmail: it has become such a popular service that it could take a week or more for your requested files to arrive. 9.5 THE ALL KNOWING ORACLE One other thing you can do through e-mail is consult with the Usenet Oracle. You can ask the Oracle anything at all and get back an answer (whether you like the answer is another question). First, you'll want to get instructions on how to address the Oracle (he, or she, or it, is very particular about such things and likes being addressed in august, solemn and particularly sycophantic tones). Start an e-mail message to oracle@iuvax.cs.indiana.edu In the "subject:" line, type help and hit enter. You don't actually have to say anything in the message itself -- at least not yet. Hit control-D to send off your request for help. Within a few hours, the Oracle will mail you back detailed instructions. It's a fairly long file, so before you start reading it, turn on your communications software's logging function, to save it to your computer (or save the message to a file on your host system's home directory and then download the file). After you've digested it, you can compose your question to the Oracle. Mail it to the above address, only this time with a subject line that describes your question. Expect an answer within a couple of days. And don't be surprised if you also find a question in your mailbox -- the Oracle extracts payment by making seekers of knowledge answer questions as well! Chapter 10: NEWS OF THE WORLD 10.1 Clarinet: UPI, Dave Barry and Dilbert. Usenet "newsgroups" can be something of a misnomer. They may be interesting, informative and educational, but they are often not news, at least, not the way most people would think of them. But there are several sources of news and sports on the Net. One of the largest is Clarinet, a company in Cupertino, Calf., that distributes wire-service news and columns, along with a news service devoted to computers and even the Dilbert comic strip, in Usenet form. Distributed in Usenet form, Clarinet stories and columns are organized into more than 100 newsgroups (in this case, a truly appropriate name), some of them with an extremely narrow focus, for example, clari.news.gov.taxes. The general news and sports come from United Press International; the computer news from the NewsBytes service; the features from several syndicates. Because Clarinet charges for its service, not all host systems carry its articles. Those that do carry them as Usenet groups starting with "clari." As with other Usenet hierarchies, these are named starting with broad area and ending with more specific categories. Some of these include business news (clari.biz); general national and foreign news, politics and the like (clari.news), sports (clari.sports); columns by Mike Royko, Miss Manners, Dave Barry and others (clari.feature); and NewsBytes computer and telecommunications reports (clari.nb). Because Clarinet started in Canada, there is a separate set of clari.canada newsgroups. The clari.nb newsgroups are divided into specific computer types (clari.nb.apple, for example). Clari news groups feature stories updated around the clock. There are even a couple of "bulletin" newsgroups for breaking stories: clari.news.bulletin and clari.news.urgent. Clarinet also sets up new newsgroups for breaking stories that become ongoing ones (such as major natural disasters, coups in large countries and the like). Occasionally, you will see stories in clari newsgroups that just don't seem to belong there. Stories about former Washington, D.C. mayor Marion Barry, for example, often wind interspersed among columns by Dave Barry. This happens because of the way wire services work. UPI uses three-letter codes to route its stories to the newspapers and radio stations that make up most of its clientele, and harried editors on deadline sometimes punch in the wrong code. 10.2 REUTERS This is roughly the British equivalent of UPI or Associated Press. Msen, a public-access site in Michigan, currently feeds Reuters dispatches into a series of Usenet-style conferences. If your site subscribes to this service, look for newsgroups with names that begin in msen.reuters. 10.3 USA TODAY If your host system doesn't carry the clari or msen.reuters newsgroups, you might be able to keep up with the news a different way over the Net. USA Today has been something of an online newspaper pioneer, selling its stories to bulletin-board and online systems across the country for several years. Cleveland Free-Net provides the online version of USA Today (along with all its other services) for free. Currently, the paper only publishes five days a week, so you'll have to get your weekend news fix elsewhere. Telnet: freenet-in-a.cwru.edu or freenet-in-b.cwru.edu After you connect and log in, look for this menu entry: NPTN/USA TODAY HEADLINE NEWS. Type the number next to it and hit enter. You'll then get a menu listing a series of broad categories, such as sports and telecommunications. Choose one, and you'll get a yet another menu, listing the ten most recent dates of publication. Each of these contains one-paragraph summaries of the day's news in that particular subject. 10.4 THE WORLD TODAY, FROM BELARUS TO BRAZIL Radio Free Europe and Radio Liberty are American radio stations that broadcast to the former Communist countries of eastern Europe. Every day, their news departments prepare a summary of news in those countries, which is then disseminated via the Net, through a Bitnet mailing list and a Usenet newsgroup. To have the daily digests sent directly to your e-mailbox, send a message to listserv@ubvm.cc.buffalo.edu Leave the subject line blank, and as a message, write: subscribe rferl-l Your Name Alternately, look for the bulletins in the Usenet newsgroup misc.news- east-europe.rferl. Daily Brazilian news updates are available (in Portuguese) from the University of Sao Paulo. Use anonymous ftp to connect to uspif.if.usp.br Use cd to switch to the whois directory. The news summaries are stored in files with this form: NEWS.23OCT92;1. But to get them, leave off the semicolon and the 1, and don't capitalize anything, for example: get news.23oct92 Daily summaries of news reports from France (in French) are availble on the National Capital FreeNet in Ottawa, Ont. Telnet to freenet.carleton.ca and log on as: guest. At the main menu, select the number for "The Newsstand" and then "La presse de France." 10.5 E-MAILING NEWS ORGANIZATIONS A number of newspapers, television stations and networks and other news organizations now encourage readers and viewers to communicate with them electronically, via Internet e-mail addresses. They include: The Middlesex News, Framingham, Mass. sysop@news.ci.net The Boston Globe voxbox@globe.com WCVB-TV, Boston, Mass. wcvb@aol.com NBC News, New York, N.Y. nightly@nbc.com The Ottawa Citizen, Ottawa, Ont. ottawa-citizen@freenet.carleton.ca CJOH-TV, Ottawa, Ont. ab363@freenet.carleton.ca St. Petersburg (Fla.) Times 73174.3344@compuserve.com Illinois Issues, Springfield, Ill. gherardi@sangamon.edu WTVF-TV, Nashville, Tenn. craig.ownsby@nashville.com 10.6 FYI The clari.net.newusers newsgroup on Usenet provides a number of articles about Clarinet and ways of finding news stories of interest to you. To discuss the future of newspapers and newsrooms in the new electronic medium, subscribe to the Computer Assisted Reporting and Research mailing list on Bitnet. Send a mail message of Subscribe carr-l Your Name to listserv@ulkyvm.bitnet. Chapter 9: ADVANCED E-MAIL 9.1 THE FILE'S IN THE MAIL E-mail by itself is a powerful tool, and by now you may be sending e-mail messages all over the place. You might even be on a mailing list or two. But there is a lot more to e-mail than just sending messages. If your host system does not have access to ftp, or it doesn't have access to every ftp site on the Net, you can have programs and files sent right to your mailbox. And using some simple techniques, you can use e-mail to send data files such as spreadsheets, or even whole programs, to friends and colleagues around the world. A key to both is a set of programs known as encoders and decoders. For all its basic power, Net e-mail has a big problem: it can't handle graphics characters or the control codes found in even the simplest of computer programs. Encoders however, can translate these into forms usable in e-mail, while decoders turn them back into a form that you can actually use. If you are using a Unix-based host system, chances are it already has an encoder and decoder online that you can use. These programs will also let you use programs posted in several Usenet newsgroups, such as comp.binaries.ibm.pc. If both you and the person with whom you want to exchange files use Unix host systems, you're in luck because virtually all Unix host systems have encoder/decoder programs online. For now, let's assume that's the case. First, upload the file you want to send to your friend to your host site (ask your system administrator how to upload a file to your name or "home" directory if you don't already know how). Then type uuencode file file > file.uu and hit enter. "File" is the name of the file you want to prepare for mailing, and yes, you have to type the name twice! The > is a Unix command that tells the system to call the "encoded" file "file.uu" (you could actually call it anything you want). Now to get it into a mail message. The quick and dirty way is to type mail friend where "friend" is your friend's address. At the subject line, type the name of the enclosed file. When you get the blank line, type ~r file.uu or whatever you called the file, and hit enter. (on some systems, the ~ may not work; if so, ask your system administrator what to use). This inserts the file into your mail message. Hit control-D, and your file is on its way! On the other end, when your friend goes into her mailbox, she should transfer it to her home directory. Then she should type uudecode file.name and hit enter. This creates a new file in her name directory with whatever name you originally gave it. She can then download it to her own computer. Before she can actually use it, though, she'll have to open it up with a text processor and delete the mail header that has been "stamped" on it. If you use a mailer program that automatically appends a "signature," tell her about that so she can delete that as well. 9.2 RECEIVING FILES If somebody sends you a file through the mail, you'll have to go through a couple of steps to get it into a form you can actually use. If you are using the simple mail program, go into mail and type w # file.name where # is the number of the message you want to transfer and file.name is what you want to call the resulting file. In pine, call up the message and hit your O key and then E. You'll then be asked for a file name. In elm, call up the message and hit your S key. You'll get something that looks like this: =file.request Type a new file name and hit enter (if you hit enter without typing a file name, the message will be saved to another mail folder, not your home directory). In all three cases, exit the mail program to return to your host system's command line. Because the file has been encoded for mail delivery, you now have to run a decoder. At the command line, type uudecode file.name where file.name is the file you created while in mail. Uudecode will create a new, uncompressed binary file. In some cases, you may have to run it through some other programs (for example, if it is in "tar" form), but generally it should now be ready for you to download to your own computer (on which you might then have to run a de-compressor program such as PKXZIP). 9.3 SENDING FILES TO NON-INTERNET SITES What if your friend only connects with a non-Unix system, such as CompuServe or MCIMail? There are programs available for MS-DOS, Apple and Amiga computers that will encode and decode files. Of course, since you can't send one of these programs to your friend via e-mail (how would she un-encode it?), you'll have to mail (the old-fashioned way) or give her a diskette with the program on it first. Then, she can get the file by e-mail and go through the above process (only on her own computer) to get a usable file. Remember to give her an encoder program as well, if she wants to send you files in return. For MS-DOS machines, you'll want to get uunecode.com and uudecode.com. Both can be found through anonymous ftp at wuarchive.wustl.edu in the /mirrors/msdos/starter directory. The MS- DOS version is as easy to use as the Unix one: Just type uudecode filename.ext and hit enter. Mac users should get a program called uutool, which can be found in the info-mac/util directory on sumex-aim.stanford.edu. Think twice before sending somebody a giant file. Although large sites connected directly to the Internet can probably handle mega-files, many smaller systems cannot. Some commercial systems, such as CompuServe and MCIMail, limit the size of mail messages their users can receive. Fidonet doesn't even allow encoded messages. In general, a file size of 30,000 or so bytes is a safe upper limit for non-Internet systems. 9.4 GETTING FTP FILES VIA E-MAIL To help people without ftp access, a number of ftp sites have set up mail servers (also known as archive servers) that allow you to get files via e-mail. You send a request to one of these machines and they send back the file you want. As with ftp, you'll be able to find everything from historical documents to software (but please note that if you do have access to ftp, that method is always quicker and ties up fewer resources than using e-mail). Some interesting or useful mail servers include: mail-server@rtfm.mit.edu Files of "frequently asked questions" related to Usenet; state-by-state lists of U.S. representatives and Senators and their addresses and office phone numbers. archive-server@eff.org Information about the Electronic Frontier Foundation; documents about legal issues on the Net. archive-server@cs.widener.edu Back copies of the Computer Underground Digest and every possible fact you could want to know about "The Simpsons." netlib@uunet.uu.net Programs for many types of personal computers; archives of past postings from many Usenet newsgroups. archive-server@ames.arc.nasa.gov Space-related text and graphics (GIF-format) files. service@nic.ddn.mil Detailed information about Internet. Most mail servers work pretty much the same -- you send an e-mail message that tells them what file you want and how you want it sent to you. The most important command is "send," which tells the computer you want it to send you a particular file. First, though, you'll need to know where the mail server stores that file, because you have to tell it which directory or sub- directory it's in. There are a couple of ways to do this. You can send an e-mail message to the archive-server that consists of one line: index The server will then send you a directory listing of its main, or root directory. You'll then have to send a second message to the archive server with one line: index directory/subdirectory where directory/subdirectory is the directory path for which you want a listing. An alternative is to send an e-mail message to our old friend archie, which should send you back the file's exact location on the archive-server (along with similar listings for all the other sites that may have the file, however) Once you have the file name and its directory path, compose a message to the archive server like this: send directory/subdirectory/file Send off the message and, anywhere from a few minutes to a couple of days later, you'll find a new message in your mailbox: a copy of the file you requested. The exact time it will take a file to get to you depends on a variety of factors, including how many requests are in line before yours (mail servers can only process so many requests at a time) and the state of the connections between the server and you. Seems simple enough. It gets a little more complicated when you request a program rather than a document. Programs or other files that contain unusual characters or lines longer than 130 characters (graphics files, for example) require special processing by the mail server to ensure they are transmitted via e-mail. Then you'll have to run them through at least one converter program to put them in a form you can actually use. To ensure that a program or other "non-mailable" file actually gets to you, include another line in your e-mail message to the server: encoder This converts the file into an encoded form. To decode it, you'll first have to transfer the file message into a file in your home directory. One further complication comes when you request a particularly long file. Many Net sites can only handle so much mail at a time. To make sure you get the entire file, tell the mail server to break it up into smaller pieces, with another line in your e-mail request like this: size 100000 This gives the mail server the maximum size, in bytes, of each file segment. This particular size is good for UUCP sites. Internet and Bitnet sites can generally go up to 300000. When you get all of these files in mail, transfer them to your home directory. Exit mail and call up each file in your host system's text processor and delete each one's entire header and footer (or "signature" at the end). When done with this, at your host system's command line, type cat file1 file2 > bigfile where file1 is the first file, file2 the second file, and so on. The > tells your host system to combine them into a new megafile called bigfile (or whatever you want to call it). After you save the file to your home directory (see section 9.2 above), you can then run uudecode, tar, etc. One word of caution, though: if the file you want is long enough that it has to be broken into pieces, think of how much time it's going to take you to download the whole thing -- especially if you're using a 2400-baud modem! There are a number of other mail servers. To get a list, send an e-mail message to mail-server@rtfm.mit.edu: send usenet/comp.sources.wanted/How_to_find_sources_(READ_THIS_BEFORE_POSTING) You'll have to spell it exactly as listed above. Some mail servers use different software, which will require slightly different commands than the ones listed here. In general, if you send a message to a mail server that says only help you should get back a file detailing all of its commands. But what if the file you want is not on one of these mail servers? That's where ftpmail comes in. Run by Digital Equipment Corp. in California, this service can connect to almost any ftp site in the world, get the file you want and then mail it to you. Using it is fairly simple -- you send an e-mail message to ftpmail that includes a series of commands telling the system where to find the file you want and how to format it to mail to you. Compose an e-mail message to ftpmail@decwrl.dec.com Leave the "subject:" line blank. Inside the message, there are several commands you can give. The first line should be reply address where "address" is your e-mail address. The next line should be connect host where "host" is the system that has the file you want (for example: wuarchive.wustl.edu). Other commands you should consider using are "binary" (required for program files); "compress" (reduces the file size for quicker transmission) and "uuencode" (which encodes the file so you can do something with it when it arrives). The last line of your message should be the word "quit". Let's say you want a copy of the U.S. constitution. Using archie, you've found a file called, surprise, constitution, at the ftp site archive.cis.ohio-state.edu, in the /pub/firearms/politics/rkba directory. You'd send a message to ftpmail@decwrl.dec.com that looks like this: reply adamg@world.std.com connect archive.cis.ohio-state.edu binary compress uuencode get pub/firearms/politics/rkba/constitution quit When you get the file in your mailbox, use the above procedure for copying it to a file. Run it through uudecode. Then type uncompress file.name to make it usable. Since this was a text file, you could have changed the "binary" to "ascii" and then eliminated the "uuencode" file. For programs, though, you'll want to keep these lines. One caveat with ftpmail: it has become such a popular service that it could take a week or more for your requested files to arrive. 9.5 THE ALL KNOWING ORACLE One other thing you can do through e-mail is consult with the Usenet Oracle. You can ask the Oracle anything at all and get back an answer (whether you'll like the answer is another question). First, you'll want to get instructions on how to address the Oracle (he, or she, or it, is very particular about such things and likes being addressed in august, solemn and particularly sycophantic tones). Start an e-mail message to oracle@iuvax.cs.indiana.edu In the "subject:" line, type help and hit enter. You don't actually have to say anything in the message itself -- at least not yet. Hit control-D to send off your request for help. Within a few hours, the Oracle will mail you back detailed instructions. It's a fairly long file, so before you start reading it, turn on your communications software's logging function, to save it to your computer (or save the message to a file on your host system's home directory and then download the file). After you've digested it, you can compose your question to the Oracle. Mail it to the above address, only this time with a subject line that describes your question. Expect an answer within a couple of days. And don't be surprised if you also find a question in your mailbox -- the Oracle extracts payment by making seekers of knowledge answer questions as well! Chapter 10: NEWS OF THE WORLD 10.1 Clarinet: UPI, Dave Barry and Dilbert. Usenet "newsgroups" can be something of a misnomer. They may be interesting, informative and educational, but they are often not news, at least, not the way most people would think of them. But there are several sources of news and sports on the Net. One of the largest is Clarinet, a company in Cupertino, Calf., that distributes wire-service news and columns, along with a news service devoted to computers and even the Dilbert comic strip, in Usenet form. Distributed in Usenet form, Clarinet stories and columns are organized into more than 100 newsgroups (in this case, a truly appropriate name), some of them with an extremely narrow focus, for example, clari.news.gov.taxes. The general news and sports come from United Press International; the computer news from the NewsBytes service; the features from several syndicates. Because Clarinet charges for its service, not all host systems carry its articles. Those that do carry them as Usenet groups starting with "clari." As with other Usenet hierarchies, these are named starting with broad area and ending with more specific categories. Some of these include business news (clari.biz); general national and foreign news, politics and the like (clari.news), sports (clari.sports); columns by Mike Royko, Miss Manners, Dave Barry and others (clari.feature); and NewsBytes computer and telecommunications reports (clari.nb). Because Clarinet started in Canada, there is a separate set of clari.canada newsgroups. The clari.nb newsgroups are divided into specific computer types (clari.nb.apple, for example). Clari news groups feature stories updated around the clock. There are even a couple of "bulletin" newsgroups for breaking stories: clari.news.bulletin and clari.news.urgent. Clarinet also sets up new newsgroups for breaking stories that become ongoing ones (such as major natural disasters, coups in large countries and the like). Occasionally, you will see stories in clari newsgroups that just don't seem to belong there. Stories about former Washington, D.C. mayor Marion Barry, for example, often wind interspersed among columns by Dave Barry. This happens because of the way wire services work. UPI uses three-letter codes to route its stories to the newspapers and radio stations that make up most of its clientele, and harried editors on deadline sometimes punch in the wrong code. 10.2 REUTERS This is roughly the British equivalent of UPI or Associated Press. Msen, a public-access site in Michigan, currently feeds Reuters dispatches into a series of Usenet-style conferences. If your site subscribes to this service, look for newsgroups with names that begin in msen.reuters. 10.3 USA TODAY If your host system doesn't carry the clari or msen.reuters newsgroups, you might be able to keep up with the news a different way over the Net. USA Today has been something of an online newspaper pioneer, selling its stories to bulletin-board and online systems across the country for several years. Cleveland Free-Net provides the online version of USA Today (along with all its other services) for free. Currently, the paper publishes only five days a week, so you'll have to get your weekend news fix elsewhere. Telnet: freenet-in-a.cwru.edu or freenet-in-b.cwru.edu or freenet-in-c.cwru.edu After you connect and log in, look for this menu entry: NPTN/USA TODAY HEADLINE NEWS. Type the number next to it and hit enter. You'll then get a menu listing a series of broad categories, such as sports and telecommunications. Choose one, and you'll get a yet another menu, listing the ten most recent dates of publication. Each of these contains one-paragraph summaries of the day's news in that particular subject. 10.4 NATIONAL PUBLIC RADIO Look in the alt.radio.networks.npr newsgroup in Usenet for summaries of NPR news shows such as "All Things Considered." This newsgroup is also a place to discuss the network and its shows, personalities and policies. 10.5 THE WORLD TODAY, FROM BELARUS TO BRAZIL Radio Free Europe and Radio Liberty are American radio stations that broadcast to the former Communist countries of eastern Europe. Every day, their news departments prepare a summary of news in those countries, which is then disseminated via the Net, through a Bitnet mailing list and a Usenet newsgroup. To have the daily digests sent directly to your e-mailbox, send a message to listserv@ubvm.cc.buffalo.edu Leave the subject line blank, and as a message, write: subscribe rferl-l Your Name Alternately, look for the bulletins in the Usenet newsgroup misc.news- east-europe.rferl. The Voice of America, a government broadcasting service aimed at other countries, provides transcripts of its English-language news reports through both gopher and anonymous ftp. For the former, use gopher to connect to this address: gopher.voa.gov and for the latter, to this address: ftp.voa.gov Daily Brazilian news updates are available (in Portuguese) from the University of Sao Paulo. Use anonymous ftp to connect to uspif.if.usp.br Use cd to switch to the whois directory. The news summaries are stored in files with this form: NEWS.23OCT92;1. But to get them, leave off the semicolon and the 1, and don't capitalize anything, for example: get news.23oct92 Daily summaries of news reports from France (in French) are availble on the National Capital FreeNet in Ottawa, Ont. Telnet to freenet.carleton.ca and log on as: guest. At the main menu, select the number for "The Newsstand" and then "La presse de France." 10.6 E-MAILING NEWS ORGANIZATIONS A number of newspapers, television stations and networks and other news organizations now encourage readers and viewers to communicate with them electronically, via Internet e-mail addresses. They include: The Middlesex News, Framingham, Mass. sysop@news.ci.net The Boston Globe voxbox@globe.com WCVB-TV, Boston, Mass. wcvb@aol.com NBC News, New York, N.Y. nightly@nbc.com The Ottawa Citizen, Ottawa, Ont. ottawa-citizen@freenet.carleton.ca CJOH-TV, Ottawa, Ont. ab363@freenet.carleton.ca St. Petersburg (Fla.) Times 73174.3344@compuserve.com Illinois Issues, Springfield, Ill. gherardi@sangamon.edu WTVF-TV, Nashville, Tenn. craig.ownsby@nashville.com Santa Cruz County (Calif.) Sentinel sented@cruzio.com Morning Journal, Lorain, Ohio mamjornl@freenet.lorain.oberlin.edu WCCO-TV, Minneapolis, Minn. wccotv@mr.net Tico Times, Costa Rica ttimes@huracon.cr 10.7 FYI The clari.net.newusers newsgroup on Usenet provides a number of articles about Clarinet and ways of finding news stories of interest to you. To discuss the future of newspapers and newsrooms in the new electronic medium, subscribe to the Computer Assisted Reporting and Research mailing list on Bitnet. Send a mail message of Subscribe carr-l Your Name to listserv@ulkyvm.bitnet. Chapter 11: IRC, MUDs AND OTHER THINGS THAT ARE MORE FUN THAN THEY SOUND Many Net systems provide access to a series of interactive services that let you hold live "chats" or play online games with people around the world. To find out if your host system offers these, you can ask your system administrator or just try them -- if nothing happens, then your system does not provide them. In general, if you can use telnet and ftp, chances are good you can use these services as well. 11.1 TALK This is the Net equivalent of a telephone conversation and requires that both you and the person you want to talk to have access to this function and are online at the same time. To use it, type talk user@site.name where user@site.name is the e-mail address of the other person. She will see something like this on her screen: talk: connection requested by yourname@site.name talk: respond with: talk yourname@site.name To start the conversation, she should then type (at her host system's command line): talk yourname@site.name where that is your e-mail address. Both of you will then get a top and bottom window on your screen. She will see everything you type in one window; you'll see everything she types in the other. To disconnect, hit control-C. One note: Public-access sites that use Sun computers sometimes have trouble with the talk program. If talk does not work, try typing otalk or ntalk instead. However, the party at the other end will have to have the same program online for the connection to work. 11.2 INTERNET RELAY CHAT IRC is a program that lets you hold live keyboard conversations with people around the world. It's a lot like an international CB radio - it even uses "channels." Type something on your computer and it's instantly echoed around the world to whoever happens to be on the same channel with you. You can join in existing public group chats or set up your own. You can even create a private channel for yourself and as few as one or two other people. And just like on a CB radio, you can give yourself a unique "handle" or nickname. IRC currently links host systems in 20 different countries, from Australia to Hong Kong to Israel. Unfortunately, it's like telnet -- either your site has it or it doesn't. If your host system does have it, Just type irc and hit enter. You'll get something like this: *** Connecting to port 6667 of server world.std.com *** Welcome to the Internet Relay Network, adamg *** Your host is world.std.com, running version 2.7.1e+4 *** You have new mail. *** If you have not already done so, please read the new user information with +/HELP NEWUSER *** This server was created Sat Apr 18 1992 at 16:27:02 EDT *** There are 364 users on 140 servers *** 45 users have connection to the twilight zone *** There are 124 channels. *** I have 1 clients and 3 servers MOTD - world.std.com Message of the Day - MOTD - Be careful out there... MOTD - MOTD - ->Spike * End of /MOTD command. 23:13 [1] adamg [Mail: 32] * type /help for help ---------------------------------------------------------------------- You are now in channel 0, the "null" channel, in which you can look up various help files, but not much else. As you can see, IRC takes over your entire screen. The top of the screen is where messages will appear. The last line is where you type IRC commands and messages. All IRC commands begin with a /. The slash tells the computer you are about to enter a command, rather than a message. To see what channels are available, type /list and hit enter. You'll get something like this: *** Channel Users Topic *** #Money 1 School CA$H (/msg SOS_AID help) *** #Gone 1 ----->> Gone with the wind!!! ------>>>>> *** #mee 1 *** #eclipse 1 *** #hiya 2 *** #saigon 4 *** #screwed 3 *** #z 2 *** #comix 1 LET'S TALK 'BOUT COMIX!!!!! *** #Drama 1 *** #RayTrace 1 Rendering to Reality and Back *** #NeXT 1 *** #wicca 4 Mr. Potato Head, R. I. P. *** #dde^mhe` 1 no'ng chay? mo*? ...ba` con o*iiii *** #jgm 1 *** #ucd 1 *** #Maine 2 *** #Snuffland 1 *** #p/g! 4 *** #DragonSrv 1 Because IRC allows for a large number of channels, the list might scroll off your screen, so you might want to turn on your computer's screen capture to capture the entire list. Note that the channels always have names, instead of numbers. Each line in the listing tells you the channel name, the number of people currently in it, and whether there's a specific topic for it. To switch to a particular channel, type /join #channel where "#channel" is the channel name and hit enter. Some "public" channels actually require an invitation from somebody already on it. To request an invitation, type /who #channel-name where channel-name is the name of the channel, and hit enter. Then ask someone with an @ next to their name if you can join in. Note that whenever you enter a channel, you have to include the #. Choose one with a number of users, so you can see IRC in action. If it's a busy channel, as soon as you join it, the top of your screen will quickly be filled with messages. Each will start with a person's IRC nickname, followed by his message. It may seem awfully confusing at first. There could be two or three conversations going on at the same time and sometimes the messages will come in so fast you'll wonder how you can read them all. Eventually, though, you'll get into the rhythm of the channel and things will begin to make more sense. You might even want to add your two cents (in fact, don't be surprised if a message to you shows up on your screen right away; on some channels, newcomers are welcomed immediately). To enter a public message, simply type it on that bottom line (the computer knows it's a message because you haven't started the line with a slash) and hit enter. Public messages have a user's nickname in brackets, like this: If you receive a private message from somebody, his name will be between asterisks, like this: *tomg* 11.3 IRC COMMANDS Note: Hit enter after each command. /away When you're called away to put out a grease fire in the kitchen, issue this command to let others know you're still connected but just away from your terminal or computer for awhile. /help Brings up a list of commands for which there is a help file. You will get a "topic:" prompt. Type in the subject for which you want information and hit enter. Hit enter by itself to exit help. /invite Asks another IRC to join you in a conversation. /invite fleepo #hottub would send a message to fleepo asking him to join you on the #hottub channel. The channel name is optional. /join Use this to switch to or create a particular channel, like this: /join #hottub If one of these channels exists and is not a private one, you will enter it. Otherwise, you have just created it. Note you have to use a # as the first character. /list This will give you a list of all available public channels, their topics (if any) and the number of users currently on them. Hidden and private channels are not shown. /m name Send a private message to that user. /mode This lets you determine who can join a channel you've created. /mode #channel +s creates a secret channel. /mode #channel +p makes the channel private /nick This lets you change the name by which others see you. /nick fleepo would change your name for the present session to fleepo. People can still use /whois to find your e-mail address. If you try to enter a channel where somebody else is already using that nickname, IRC will ask you to select another name. /query This sets up a private conversation between you and another IRC user. To do this, type /query nickname Every message you type after that will go only to that person. If she then types /query nickname where nickname is yours, then you have established a private conversation. To exit this mode, type /query by itself. While in query mode, you and the other person can continue to "listen" to the discussion on whatever public channels you were on, although neither of you will be able to respond to any of the messages there. /quit Exit IRC. /signoff Exit IRC. /summon Asks somebody connected to a host system with IRC to join you on IRC. You must use the person's entire e-mail address. /summon fleepo@foo.bar.com would send a message to fleepo asking him to start IRC. Usually not a good idea to just summon people unless you know they're already amenable to the idea; otherwise you may wind up annoying them no end. This command does not work on all sites. /topic When you've started a new channel, use this command to let others know what it's about. /topic #Amiga would tell people who use /list that your channel is meant for discussing Amiga computers. /who Shows you the e-mail address of people on a particular channel. /who #foo would show you the addresses of everybody on channel foo. /who by itself shows you every e-mail address for every person on IRC at the time, although be careful: on a busy night you might get a list of 500 names! /whois Use this to get some information about a specific IRC user or to see who is online. /whois nickname will give you the e-mail address for the person using that nickname. /whois * will list everybody on every channel. /whowas Similar to /whois; gives information for people who recently signed off IRC. 11.4 IRC IN TIMES OF CRISIS IRC has become a new medium for staying on top of really big breaking news. In 1993, when Russian lawmakers barricaded themselves inside the parliament building, some enterprising Muscovites and a couple of Americans set up a "news channel" on IRC to relay first-person accounts direct from Moscow. The channel was set up to provide a continuous loop of information, much like all-news radio stations that cycle through the day's news every 20 minutes. In 1994, Los Angeles residents set up a similar channel to relay information related to the Northridge earthquake. In both cases, logs of the channels were archived somewhere on the Net, for those unable to "tune in" live. How would you find such channels in the future? Use the /list command to scroll through the available channels. If one has been set up to discuss a particular breaking event, chances are you'll see a brief description next to the channel name that will tell you that's the place to tune. 11.5 MUDs Multiple-User Dimensions or Dungeons (MUDs) take IRC into the realm of fantasy. MUDs are live, role-playing games in which you enter assume a new identity and enter an alternate reality through your keyboard. As you explore this other world, through a series of simple commands (such as "look," "go" and "take"), you'll run across other users, who may engage you in a friendly discussion, enlist your aid in some quest or try to kill you for no apparent reason. Each MUD has its own personality and creator (or God) who was willing to put in the long hours required to establish the particular MUD's rules, laws of nature and information databases. Some MUDs stress the social aspects of online communications -- users frequently gather online to chat and join together to build new structures or even entire realms. Others are closer to "Dungeons and Dragons" and are filled with sorcerers, dragons and evil people out to keep you from completing your quest -- through murder if necessary. Many MUDs (there are also related games known as MUCKs and MUSEs) require you to apply in advance, through e-mail, for a character name and password. One that lets you look around first, though, is HoloMuck at McGill University in Montreal. The premise of this game is that you arrive in the middle of Tanstaafl, a city on the planet Holo. You have to find a place to live (else you get thrown into the homeless shelter) and then you can begin exploring. Magic is allowed on this world, but only outside the city limits. Get bored with the city and you can roam the rest of the world or even take a trip into orbit (of course, all this takes money; you can either wait for your weekly salary or take a trip to the city casino). Once you become familiar with the city and get your own character, you can even begin erecting your own building (or subway line, or almost anything else). To connect, telnet to collatz.mcrcim.mcgill.edu 5757 When you connect, type connect guest guest and hit enter. This connects you to the "guest" account, which has a password of "guest." You'll see this: The Homeless Shelter(#22Rna) You wake up in the town's Homeless Shelter, where vagrants are put for protective holding. Please don't sleep in public places-- there are plenty of open apartments available. Type 'apartments' to see how to get to an apartment building with open vacancies. There is a small sign on the wall here, with helpful information. Type 'look sign' to read it. The door is standing open for your return to respectable society. Simply walk 'out' to the center. Of course, you want to join respectable society, but first you want to see what that sign says. So you type look sign and hit enter, which brings up a list of some basic commands. Then you type out followed by enter, which brings up this: You slip out the door, and head southeast... Tanstaafl Center This is the center of the beautiful town of Tanstaafl. High Street runs north and south into residential areas, while Main Street runs east and west into business districts. SW: is Tanstaafl Towers. Please claim an apartment... no sleeping in public! SE: the Public Library offers both information and entertainment. NW: is the Homeless Shelter, formerly the Town Jail. NE: is Town Hall, site of several important services, including: Public Message Board, Bureau of Land Management (with maps and regulations), and other governmental/ bureaucratic help. Down: Below a sign marked with both red and blue large letter 'U's, a staircase leads into an underground subway passage. (Feel free to 'look' in any direction for more information.) [Obvious exits: launch, d, nw, se, w, e, n, s, ne, sw] Contents: Instructions for newcomers Directional signpost Founders' statue To see "Instructions for newcomers", type look Instructions for newcomers and hit enter. You could do the same for "Directional signpost" and "Founders' statue." Then type SW and enter to get to Tanstaafl Towers, the city housing complex, where you have to claim an apartment (you may have to look around; many will already) be occupied. And now it's off to explore Holo! One command you'll want to keep in mind is "take." Periodically, you'll come across items that, when you take them will confer certain abilities or powers on you. If you type help and enter, you'll get a list of files you can read to learn more about the MUD's commands. The "say" command lets you talk to other players publicly. For example, say Hey, I'm here! would be broadcast to everybody else in the room with you. If you want to talk to just one particular person, use "whisper" instead of "say." whisper agora=Hey, I'm here! would be heard only by agora. Another way to communicate with somebody regardless of where on the world they are is through your pager. If you suddenly see yours go off while visiting, chances are it's a wizard checking to see if you need any help. To read his message, type page To send him a message, type page name=message where name is the wizard's name (it'll be in the original message). Other MUDs and MUCKs may have different commands, but generally use the same basic idea of letting you navigate through relatively simple English commands. When you connect to a MUD, choose your password as carefully as you would one for your host system; alas, there are MUD crackers who enjoy trying to break into other people's MUD accounts. And never, never use the same password as the one you use on your host system! MUDs can prove highly addicting. "The jury is still out on whether MUDding is 'just a game' or 'an extension of real life with gamelike qualities'," says Jennifer Smith, an active MUD player who wrote an FAQ on the subject. She adds one caution: "You shouldn't do anything that you wouldn't do in real life, even if the world is a fantasy world. The important thing to remember is that it's the fantasy world of possibly hundreds of people, and not just yours in particular. There's a human being on the other side of each and every wire! Always remember that you may meet these other people some day, and they may break your nose. People who treat others badly gradually build up bad reputations and eventually receive the NO FUN Stamp of Disapproval." 11.6 GO, GO, GO (AND CHESS, TOO)! Fancy a good game of go or chess? You no longer have to head for the nearest park with a board in hand. The Internet has a couple of machines that let you engage people from around the world in your favorite board games. Or, if you prefer, you can watch matches in progress. To play go, telnet hellspark.wharton.upenn.edu 6969 log on as: guest You'll find prompts to various online help files to get you started. For a chess match, telnet news.panix.com 5000 log on as: guest You'll find prompts for online help files on the system, which lets you choose your skill level. 11.7 THE OTHER SIDE OF THE COIN All is not fun and games on the Net. Like any community, the Net has its share of obnoxious characters who seem to exist only to make your life miserable (you've already met some of them in chapter 4). There are people who seem to spend a bit more time on the Net than many would find healthy. It also has its criminals. Clifford Stoll writes in "The Cuckoo's Egg" how he tracked a team of German hackers who were breaking into U.S. computers and selling the information they found to the Soviets. Robert Morris, a Cornell University student, was convicted of unleashing a "worm" program that effectively disabled several thousand computers connected to the Internet. Of more immediate concern to the average Net user are crackers who seek to find other's passwords to break into Net systems and people who infect programs on ftp sites with viruses. There is a widely available program known as "Crack" that can decipher user passwords composed of words that might be found in a dictionary (this is why you shouldn't use such passwords). Short of that, there are the annoying types who take a special thrill in trying to make you miserable. The best advice in dealing with them is to count to 10 and then ignore them -- like juveniles everywhere, most of their fun comes in seeing how upset you can get. Meanwhile, two Cornell University students pleaded guilty in 1992 to uploading virus-infected Macintosh programs to ftp sites. If you plan to try out large amounts of software from ftp sites, it might be wise to download or buy a good anti-viral program. But can law enforcement go too far in seeking out the criminals? The Electronic Frontier Foundation was founded in large part in response to a series of government raids against an alleged gang of hackers. The raids resulted in the near bankruptcy of one game company never alleged to have had anything to do with the hackers, when the government seized its computers and refused to give them back. The case against another alleged participant collapsed in court when his attorney showed the "proprietary" and supposedly hacked information he printed in an electronic newsletter was actually available via an 800 number for about $13 -- from the phone company from which that data was taken. 11.8 FYI You can find discussions about IRC in the alt.irc newsgroup. "A Discussion on Computer Network Conferencing," by Darren Reed (May, 1992), provides a theoretical background on why conferencing systems such as IRC are a Good Thing. It's available through ftp at nic.ddn.mil in the rfc directory as rfc1324.txt. Every Friday, Scott Goehring posts a new list of MUDs and related games and their telnet addresses in the newsgroup rec.games.mud.announce. There are several other mud newsgroups related to specific types of MUDs, including rec.games.mud.social, rec.games.mud.adventure, rec.games.mud.tiny, rec.games.mud.diku and rec.games.mud.lp. For a good overview of the impact on the Internet of the Morris Worm, read "Virus Highlights Need for Improved Internet Management," by the U.S. General Accounting Office (June, 1989). You can get a copy via ftp from cert.sei.cmu.edu in the pub/virus-l/docs directory. It's listed as gao_rpt. Clifford Stoll describes how the Internet works and how he tracked a group of KGB-paid German hackers through it, in "The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage," Doubleday (1989). Chapter 12: EDUCATION AND THE NET 12.1 THE NET IN THE CLASSROOM If you're a teacher, you've probably already begun to see the potential the Net has for use in the class. Usenet, ftp and telnet have tremendous educational potential, from keeping up with world events to arranging international science experiments. Because the Net now reaches so many countries and often stays online even when the phones go down, you and your students can "tune in" to first-hand accounts during international conflicts. Look at your system's list of Usenet soc.culture groups to see if there is one about the country or region you're interested in. Even in peacetime, these newsgroups can be great places to find people from countries you might be studying. The biggest problem may be getting accounts for your students, if you're not lucky enough to live within the local calling area of a Free-Net system. Many colleges and universities, however, are willing to discuss providing accounts for secondary students at little or no cost. Several states, including California and Texas, have Internet- linked networks for teachers and students. 12.2 SOME SPECIFIC RESOURCES FOR STUDENTS AND TEACHERS In addition, there are a number of resources on the Internet aimed specifically at elementary and secondary students and teachers. You can use these to set up science experiments with classes in another country, learn how to use computers in the classroom or keep up with the latest advances in teaching everything from physics to physical education. Among them: AskERIC Run by the Educational Resource and Information Center, AskERIC provides a way for educators, librarians and others interested in K-12 education to get more information about virtually everything. The center maintains an e-mail address (askeric@ericir.syr.edu) for questions and promises answers within 48 hours. It also maintains a gopher site that contains digests of questions and answers, lesson plans in a variety of fields and other educationally related information. The gopher address is ericir.syr.edu. Health-Ed: A mailing list for health educators. Send a request to health-ed-request@stjhmc.fidonet.org K12Net: Begun on the Fidonet hobbyist network, K12Net is now also carried on many Usenet systems and provides a host of interesting and valuable services. These include international chat for students, foreign-language discussions (for example, there are French and German- only conference where American students can practice those languages with students from Quebec and German). There are also conferences aimed at teachers of specific subjects, from physical education to physics. The K12 network still has limited distribution, so ask your system administrator if your system carries it. Kidsphere: Kidsphere is a mailing list for elementary and secondary teachers, who use it to arrange joint projects and discuss educational telecommunications. You will find news of new software, lists of sites from which you can get computer-graphics pictures from various NASA satellites and probes and other news of interest to modem-using teachers. To subscribe, send a request by e-mail to kidsphere- request@vms.cis.pitt.edu or joinkids@vms.cis.pitt.edu and you will start receiving messages within a couple of days. To contribute to the discussion, send messages to kidsphere@vms.cis.pitt.edu. KIDS is a spin-off of KIDSPHERE just for students who want to contact students. To subscribe, send a request to joinkids@vms.cis.pitt.edu, as above. To contribute, send messages to kids@vms.cist.pitt.edu. Knoxville Using the newspaper in the electronic classroom. This News- gopher site lets students and teachers connect to Sentinel the newspaper, and provides resources for them derived Online from the newsroom. Use gopher to connect to gopher.opup.org MicroMUSE This is an online, futuristic city, built entirely by participants (see chapter 11 for information on MUSEs and MUDs in general). Hundreds of students from all over have participated in this educational exercise, coordinated by MIT. Telnet to michael.ai.mit.edu. Log on as guest and then follow the prompts for more information. NASA Spacelink: This system, run by NASA in Huntsville, Ala., provides all sorts of reports and data about NASA, its history and its various missions, past and present. Telnet spacelink.msfc.nasa.gov or 128.158.13.250. When you connect, you'll be given an overview of the system and asked to register. The system maintains a large file library of GIF-format space graphics, but note that you can't download these through telnet. If you want to, you have to dial the system directly, at (205) 895- 0028. Many can be obtained through ftp from ames.arc.nasa.gov, however. Newton: Run by the Argonne National Laboratory, it offers conferences for teachers and students, including one called "Ask a Scientist." Telnet: newton.dep.anl.gov. Log in as: cocotext You'll be asked to provide your name and address. When you get the main menu, hit 4 for the various conferences. The "Ask a Scientist" category lets you ask questions of scientists in fields from biology to earth science. Other categories let you discuss teaching, sports and computer networks. OERI: The U.S. Department of Education's Office of Educational Resources and Improvement runs a gopher system that provides numerous educational resources, information and statistics for teachers. Use gopher to connect to gopher.ed.gov. Spacemet Forum: If your system doesn't carry the K12 conferences, but does provide you with telnet, you can reach the conferences through SpaceMet Forum, a bulletin-board system aimed at teachers and students that is run by the physics and astronomy department at the University of Massachusetts at Amherst. Telnet: spacemet.phast.umass.edu. When you connect, hit escape once, after which you'll be asked to log on. Like K12Net, SpaceMet Forum began as a Fidonet system, but has since grown much larger. Mort and Helen Sternheim, professors at the university, started SpaceMet as a one-line bulletin-board system several years ago to help bolster middle-school science education in nearby towns. In addition to the K12 conferences, SpaceMet carries numerous educationally oriented conferences. It also has a large file library of interest to educators and students, but be aware that getting files to your site could be difficult and maybe even impossible. Unlike most other Internet sites, Spacemet does not use an ftp interface. The Sternheims say ZMODEM sometimes works over the network, but don't count on it. 12.3 USENET AND BITNET IN THE CLASSROOM There are numerous Usenet newsgroups of potential interest to teachers and students. As you might expect, many are of a scientific bent. You can find these by typing l sci. in rn or using nngrep sci. for nn. There are now close to 40, with subjects ranging from archaeology to economics (the "dismal science," remember?) to astronomy to nanotechnology (the construction of microscopically small machines). One thing students will quickly learn from many of these groups: science is not just dull, boring facts. Science is argument and standing your ground and making your case. The Usenet sci. groups encourage critical thinking. Beyond science, social-studies and history classes can keep busy learning about other countries, through the soc.culture newsgroups. Most of these newsgroups originated as ways for expatriates of a given country to keep in touch with their homeland and its culture. In times of crisis, however, these groups often become places to disseminate information from or into the country and to discuss what is happening. From Afghanistan to Yugoslavia, close to 50 countries are now represented on Usenet. To see which groups are available, use l soc.culture. in rn or nngrep soc.culture. for nn. Several "talk" newsgroups provide additional topical discussions, but teachers should screen them first before recommending them to students. They range from talk.abortion and talk.politics.guns to talk.politics.space and talk.environment. One caveat: Teachers might want to peruse particular newsgroups before setting their students loose in them. Some have higher levels of flaming and blather than others. There are also a number of Bitnet discussion groups of potential interest to students and teachers. See Chapter 5 for information on finding and subscribing to Bitnet discussion groups. Some with an educational orientation include: biopi-l ksuvm.bitnet Secondary biology education chemed-l uwf.bitnet Chemistry education dts-l iubvm.bitnet The Dead Teacher's Society list phys-l uwf.bitnet Discussions for physics teachers physhare psuvm.bitnet Where physics teachers share resources scimath-l psuvm.bitnet Science and math education To get a list of ftp sites that carry astronomical images in the GIF graphics format, use ftp to connect to nic.funet.fi. Switch to the /pub/astro/general directory and get the file astroftp.txt. Among the sites listed is ames.arc.nasa.gov, which carries images taken by the Voyager and Galileo probes, among other pictures. CHAPTER 13: Business on the Net 13.1 SETTING UP SHOP Back in olden days, oh, before 1990 or so, there were no markets in the virtual community -- if you wanted to buy a book, you still had to jump in your car and drive to the nearest bookstore. This was because in those days, the Net consisted mainly of a series of government-funded networks on which explicit commercial activity was forbidden. Today, much of the Net is run by private companies, which generally have no such restrictions, and a number of companies have begun experimenting with online "shops" or other services. Many of these shops are run by booksellers, while the services range from delivery of indexed copies of federal documents to an online newsstand that hopes to entice you to subscribe to any of several publications (of the printed on paper variety). A number of companies also use Usenet newsgroups (in the biz hierarchy) to distribute press releases and product information. Still, commercial activity on the remains far below that found on other networks, such as CompuServe, with its Electronic Mall, or Prodigy, with its advertisements on almost every screen. In part that's because of the newness and complexity of the Internet as a commercial medium. In part, however, that is because of security concerns. Companies worry about such issues as crackers getting into their system over the network, and many people do not like the idea of sending a credit-card number via the Internet (an e-mail message could be routed through several sites to get to its destination). These concerns could disappear as Net users turn to such means as message encryption and "digital signatures." In the meantime, however, businesses on the Net can still consider themselves something of Internet pioneers. A couple of public-access sites and a regional network have set up "marketplaces" for online businesses. The World in Brookline, Mass., currently rents "space" to several bookstores and computer-programming firms, as well as an "adult toy shop." To browse their offerings, use gopher to connect to world.std.com At the main menu, select "Shops on the World." Msen in Ann Arbor provides its "Msen Marketplace," where you'll find a travel agency and an "Online Career Center" offering help-wanted ads from across the country. Msen also provides an "Internet Business Pages," an online directory of companies seeking to reach the Internet community. You can reach Msen through gopher at gopher.msen.com At the main menu, select "Msen Marketplace." The Nova Scotia Technology Network runs a "Cybermarket" on its gopher service at nstn.ns.ca There, you'll find an online bookstore that lets you order books through e-mail (to which you'll have to trust your credit-card number) and a similar "virtual record store.'' Both let you search their wares by keyword or by browsing through catalogs. Other online businesses include: AnyWare Associates This Boston company runs an Internet-to-fax gateway that lets you send fax message anywhere in the world via the Internet (for a fee, of course). For more information, write sales@awa.com Bookstacks Unlimited This Cleveland bookstore offers a keyword- searchable database of thousands of books for sale. Telnet: books.com Counterpoint Publishing Based in Cambridge, Mass., this company's main Internet product is indexed versions of federal journals, including the Federal Register (a daily compendium of government contracts, proposed regulations and the like). Internet users can browse through recent copies, but complete access will run several thousand dollars a year. Use gopher to connect to enews.com and select "Counterpoint Publishing" Dialog The national database company can be reached through telnet at dialog.com To log on, however, you will have first had to set up a Dialog account. Dow Jones News A wire service run by the information company Retrieval that owns the Wall Street Journal. Available via telnet at djnr.dowjones.com As with Dialog, you need an account to log on. Infinity Link Browse book, music, software, video-cassette and laser-disk catalogs through this system based in Malvern, Penn. Use gopher to connect to columbia.ilc.com Log on as: cas The Internet Company Sort of a service bureau, this company, based in Cambridge, Mass., is working with several publishers on Internet-related products. Its Electronic Newsstand offers snippets and special subscription rates to a number of national magazines, from the New Republic to the New Yorker. Use gopher to connect to enews.com MarketBase You can try the classified-ads system developed by this company in Santa Barbara, Calif., by gopher to connect to mb.com O'Reilly and Associates Best known for its "Nutshell" books on Unix, O'Reilly runs three Internet services. The gopher server, at ora.com provides information about the company and its books. It posts similar information in the biz.oreilly.announce Usenet newsgroup. Its Global Network Navigator, accessible through the World-Wide Web, is a sort of online magazine that lets users browse through interesting services and catalogs. 13.2 FYI The com-priv mailing list is the place to discuss issues surrounding the commercialization and the privatization of the Internet. To subscribe (or un-subscribe), send an e-mail request to com-priv- request@psi.com. Mary Cronin's book, "Doing Business on the Internet" (1994, Van Nostrand Reinhold), takes a more in-depth look at the subject. Kent State University in Ohio maintains a repository of "Business Sources on the Net." Use gopher to connect to refmac.kent.edu. Chapter 14: CONCLUSION -- THE END? The revolution is just beginning. New communications systems and digital technologies have already meant dramatic changes in the way we live. Think of what is already routine that would have been considered impossible just ten years ago. You can browse through the holdings of your local library -- or of libraries halfway around the world -- do your banking and see if your neighbor has gone bankrupt, all through a computer and modem. Imploding costs coupled with exploding power are bringing ever more powerful computer and digital systems to ever growing numbers of people. The Net, with its rapidly expanding collection of databases and other information sources, is no longer limited to the industrialized nations of the West; today the web extends from Siberia to Zimbabwe. The cost of computers and modems used to plug into the Net, meanwhile, continue to plummet, making them ever more affordable. Cyberspace has become a vital part of millions of people's daily lives. People form relationships online, they fall in love, they get married, all because of initial contacts in cyberspace, that ephemeral ``place'' that transcends national and state boundaries. Business deals are transacted entirely in ASCII. Political and social movements begin online, coordinated by people who could be thousands of miles apart. Yet this is only the beginning. We live in an age of communication, yet the various media we use to talk to one another remain largely separate systems. One day, however, your telephone, TV, fax machine and personal computer will be replaced by a single ``information processor'' linked to the worldwide Net by strands of optical fiber. Beyond databases and file libraries, power will be at your fingertips. Linked to thousands, even millions of like-minded people, you'll be able to participate in social and political movements across the country and around the world. How does this happen? In part, it will come about through new technologies. High-definition television will require the development of inexpensive computers that can process as much information as today's workstations. Telephone and cable companies will cooperate, or in some cases compete, to bring those fiber-optic cables into your home. The Clinton administration, arguably the first led by people who know how to use not only computer networks but computers, is pushing for creation of a series of "information superhighways" comparable in scope to the Interstate highway system of the 1950s (one of whose champions in the Senate has a son elected vice president in 1992). Right now, we are in the network equivalent of the early 1950s, just before the creation of that massive highway network. Sure, there are plenty of interesting things out there, but you have to meander along two-lane roads, and have a good map, to get to them. Creation of this new Net will require more than just high-speed channels and routing equipment; it will require a new communications paradigm: the Net as information utility. The Net remains a somewhat complicated and mysterious place. To get something out of the Net today, you have to spend a fair amount of time with a Net veteran or a manual like this. You have to learn such arcana as the vagaries of the Unix cd command. Contrast this with the telephone, which now also provides access to large amounts of information through push buttons, or a computer network such as Prodigy, which one navigates through simple commands and mouse clicks. Internet system administrators have begun to realize that not all people want to learn the intricacies of Unix, and that that fact does not make them bad people. We are already seeing the development of simple interfaces that will put the Net's power to use by millions of people. You can already see their influence in the menus of gophers and the World-Wide Web, which require no complex computing skills but which open the gates to thousands of information resources. Mail programs and text editors such as pico and pine promise much of the power of older programs such as emacs at a fraction of the complexity. Some software engineers are taking this even further, by creating graphical interfaces that will let somebody navigate the Internet just by clicking on the screen with a mouse or by calling up an easy text editor, sort of the way one can now navigate a Macintosh computer -- or a commercial online service such as Prodigy. Then there are the Internet services themselves. For every database now available through the Internet, there are probably three or four that are not. Government agencies are only now beginning to connect their storehouses of information to the Net. Several commercial vendors, from database services to booksellers, have made their services available through the Net. Few people now use one of the Net's more interesting applications. A standard known as MIME lets one send audio and graphics files in a message. Imagine opening your e-mail one day to hear your granddaughter's first words, or a "photo" of your friend's new house. Eventually, this standard could allow for distribution of even small video displays over the Net. All of this will require vast new amounts of Net power, to handle both the millions of new people who will jump onto the Net and the new applications they want. Replicating a moving image on a computer screen alone takes a phenomenal amount of computer bits, and computing power to arrange them. All of this combines into a National Information Infrastructure able to move billions of bits of information in one second -- the kind of power needed to hook information "hoses" into every business and house. As these "superhighways" grow, so will the "on ramps," for a high- speed road does you little good if you can't get to it. The costs of modems seem to fall as fast as those of computers. High-speed modems (9600 baud and up) are becoming increasingly affordable. At 9600 baud, you can download a satellite weather image of North America in less than two minutes, a file that, with a slower modem could take up to 20 minutes to download. Eventually, homes could be connected directly to a national digital network. Most long-distance phone traffic is already carried in digital form, through high-volume optical fibers. Phone companies are ever so slowly working to extend these fibers the "final mile" to the home. The Electronic Frontier Foundation is working to ensure these links are affordable. Beyond the technical questions are increasingly thorny social, political and economic issues. Who is to have access to these services, and at what cost? If we live in an information age, are we laying the seeds for a new information under class, unable to compete with those fortunate enough to have the money and skills needed to manipulate new communications channels? Who, in fact, decides who has access to what? As more companies realize the potential profits to be made in the new information infrastructure, what happens to such systems as Usenet, possibly the world's first successful anarchistic system, where everybody can say whatever they want? What are the laws of the electronic frontier? When national and state boundaries lose their meaning in cyberspace, the question might even be: WHO is the law? What if a practice that is legal in one country is "committed" in another country where it is illegal, over a computer network that crosses through a third country? Who goes after computer crackers? What role will you play in the revolution? Appendix A: THE LINGO Like any community, the Net has developed its own language. What follows is a glossary of some of the more common phrases you'll likely run into. But it's only a small subset of net.speak. You an find a more complete listing in "The New Hacker's Dictionary," compiled by Eric Raymond (MIT Press). Raymond's work is based on an online reference known as "The Jargon File," which you can get through anonymous ftp from ftp.gnu.mit.ai.mit as jarg300.txt.gz in the pub/gnu directory (see chapter 7 for information on how to un-compress a .gz file). ASCII Has two meanings. ASCII is a universal computer code for English letters and characters. Computers store all information as binary numbers. In ASCII, the letter "A" is stored as 01000001, whether the computer is made by IBM, Apple or Commodore. ASCII also refers to a method, or protocol, for copying files from one computer to another over a network, in which neither computer checks for any errors that might have been caused by static or other problems. ANSI Computers use several different methods for deciding how to put information on your screen and how your keyboard interacts with the screen. ANSI is one of these "terminal emulation" methods. Although most popular on PC-based bulletin-board systems, it can also be found on some Net sites. To use it properly, you will first have to turn it on, or enable it, in your communications software. ARPANet A predecessor of the Internet. Started in 1969 with funds from the Defense Department's Advanced Projects Research Agency. backbone A high-speed network that connects several powerful computers. In the U.S., the backbone of the Internet is often considered the NSFNet, a government funded link between a handful of supercomputer sites across the country. Baud The speed at which modems transfer data. One baud is roughly equal to one bit per second. It takes eight bits to make up one letter or character. Modems rarely transfer data at exactly the same speed as their listed baud rate because of static or computer problems. More expensive modems use systems, such as Microcom Network Protocol (MNP), which can correct for these errors or which "compress" data to speed up transmission. BITNet Another, academically oriented, international computer network, which uses a different set of computer instructions to move data. It is easily accessible to Internet users through e-mail, and provides a large number of conferences and databases. Its name comes from "Because It's Time." " Bounce What your e-mail does when it cannot get to its recipient -- it bounces back to you -- unless it goes off into the ether, never to be found again. Command line On Unix host systems, this is where you tell the machine what you want it to do, by entering commands. Communications A program that tells a modem how to work. software Daemon An otherwise harmless Unix program that normally works out of sight of the user. On the Internet, you'll most likely encounter it only when your e-mail is not delivered to your recipient -- you'll get back your original message plus an ugly message from a "mailer daemon. Distribution A way to limit where your Usenet postings go. Handy for such things as "for sale" messages or discussions of regional politics. Domain The last part of an Internet address, such as "news.com." Dot When you want to impress the net veterans you meet at parties, say "dot" instead of "period," for example: "My address is john at site dot domain dot com." Dot file A file on a Unix public-access system that alters the way you or your messages interact with that system. For example, your .login file contains various parameters for such things as the text editor you get when you send a message. When you do an ls command, these files do not appear in the directory listing; do ls -a to list them. Down When a public-access site runs into technical trouble, and you can no longer gain access to it, it's down. Download Copy a file from a host system to your computer. There are several different methods, or protocols, for downloading files, most of which periodically check the file as it is being copied to ensure no information is inadvertently destroyed or damaged during the process. Some, such as XMODEM, only let you download one file at a time. Others, such as batch-YMODEM and ZMODEM, let you type in the names of several files at once, which are then automatically downloaded. EMACS A standard Unix text editor preferred by Unix types that beginners tend to hate. E-mail Electronic mail -- a way to send a private message to somebody else on the Net. Used as both noun and verb. Emoticon See smiley. F2F Face to Face. When you actually meet those people you been corresponding with/flaming. FAQ Frequently Asked Questions. A compilation of answers to these. Many Usenet newsgroups have these files, which are posted once a month or so for beginners. Film at 11 One reaction to an overwrought argument: "Imminent death of the Net predicted. Film at 11." Finger An Internet program that lets you get some bit of information about another user, provided they have first created a .plan file. Flame Online yelling and/or ranting directed at somebody else. Often results in flame wars, which occasionally turn into holy wars (see). Followup A Usenet posting that is a response to an earlier message. Foo/foobar A sort of online algebraic place holder, for example: "If you want to know when another site is run by a for- profit company, look for an address in the form of foo@foobar.com." Fortune cookie An inane/witty/profund comment that can be found around the net. Freeware Software that doesn't cost anything. FTP File-transfer Protocol. A system for transferring files across the Net. Get a life What to say to somebody who has, perhaps, been spending a wee bit too much time in front of a computer. GIF Graphic Interchange Format. A format developed in the mid-1980s by CompuServe for use in photo-quality graphics images. Now commonly used everywhere online. GNU Gnu's Not Unix. A project of the Free Software Foundation to write a free version of the Unix operating system. Hacker On the Net, unlike among the general public, this is not a bad person; it is simply somebody who enjoys stretching hardware and software to their limits, seeing just what they can get their computers to do. What many people call hackers, net.denizens refer to as crackers. Handshake Two modems trying to connect first do this to agree on how to transfer data. Hang When a modem fails to hang up. Holy war Arguments that involve certain basic tenets of faith, about which one cannot disagree without setting one of these off. For example: IBM PCs are inherently superior to Macintoshes. Host system A public-access site; provides Net access to people outside the research and government community. IMHO In My Humble Opinion. Internet A worldwide system for linking smaller computer networks together. Networks connected through the Internet use a particular set of communications standards to communicate, known as TCP/IP. Killfile A file that lets you filter Usenet postings to some extent, by excluding messages on certain topics or from certain people. Log on/log in Connect to a host system or public-access site. Log off Disconnect from a host system. Lurk Read messages in a Usenet newsgroup without ever saying anything. Mailing list Essentially a conference in which messages are delivered right to your mailbox, instead of to a Usenet newsgroup. You get on these by sending a message to a specific e- mail address, which is often that of a computer that automates the process. MOTSS Members of the Same Sex. Gays and Lesbians online. Originally an acronym used in the 1980 federal census. Net.god One who has been online since the beginning, who knows all and who has done it all. Net.personality Somebody sufficiently opinionated/flaky/with plenty of time on his hands to regularly post in dozens of different Usenet newsgroups, whose presence is known to thousands of people. Net.police Derogatory term for those who would impose their standards on other users of the Net. Often used in vigorous flame wars (in which it occasionally mutates to net.nazis). Netiquette A set of common-sense guidelines for not annoying others. Network A communications system that links two or more computers. It can be as simple as a cable strung between two computers a few feet apart or as complex as hundreds of thousands of computers around the world linked through fiber optic cables, phone lines and satellites. Newbie Somebody new to the Net. Sometimes used derogatorily by net.veterans who have forgotten that, they, too, were once newbies who did not innately know the answer to everything. "Clueless newbie" is always derogatory. Newsgroup A Usenet conference. NIC Network Information Center. As close as an Internet- style network gets to a hub; it's usually where you'll find information about that particular network. NSA line eater The more aware/paranoid Net users believe that the National Security Agency has a super-powerful computer assigned to reading everything posted on the Net. They will jokingly (?) refer to this line eater in their postings. Goes back to the early days of the Net when the bottom lines of messages would sometimes disappear for no apparent reason. NSF National Science Foundation. Funds the NSFNet, a high-speed network that once formed the backbone of the Internet in the U.S. Offline When your computer is not connected to a host system or the Net, you are offline. Online When your computer is connected to an online service, bulletin-board system or public-access site. Ping A program that can trace the route a message takes from your site to another site. .plan file A file that lists anything you want others on the Net to know about you. You place it in your home directory on your public-access site. Then, anybody who fingers (see) you, will get to see this file. Post To compose a message for a Usenet newsgroup and then send it out for others to see. Postmaster The person to contact at a particular site to ask for information about the site or complain about one of his/her user's behavior. Protocol The method used to transfer a file between a host system and your computer. There are several types, such as Kermit, YMODEM and ZMODEM. Prompt When the host system asks you to do something and waits for you to respond. For example, if you see "login:" it means type your user name. README files Files found on FTP sites that explain what is in a given FTP directory or which provide other useful information (such as how to use FTP). Real Soon Now A vague term used to describe when something will actually happen. RFC Request for Comments. A series of documents that describe various technical aspects of the Internet. ROTFL Rolling on the Floor Laughing. How to respond to a particularly funny comment. ROT13 A simple way to encode bad jokes, movie reviews that give away the ending, pornography, etc. Essentially, each letter in a message is replace by the letter 13 spaces away from it in the alphabet. There are online decoders to read these; nn and rn have them built in. RTFM Read the, uh, you know, Manual. Often used in flames against people who ask computer-related questions that could be easily answered with a few minutes with a manual. More politely: RTM. Screen capture A part of your communications software that opens a file on your computer and saves to it whatever scrolls past on the screen while connected to a host system. Server A computer that can distribute information or files automatically in response to specifically worded e-mail requests. Shareware Software that is freely available on the Net. If you like and use the software, you should send in the fee requested by the author, whose name and address will be found in a file distributed with the software. .sig file Sometimes, .signature file. A file that, when placed in your home directory on your public-access site, will automatically be appended to every Usenet posting you write. .sig quote A profound/witty/quizzical/whatever quote that you include in your .sig file. Signal-to-noise The amount of useful information to be found in a given ratio Usenet newsgroup. Often used derogatorily, for example: "the signal-to-noise ratio in this newsgroup is pretty low." SIMTEL20 The White Sands Missile Range used to maintain a giant collection of free and low-cost software of all kinds, which was "mirrored" to numerous other ftp sites on the Net. In the fall of 1993, the Air Force decided it had better things to do than maintain a free software library and shut it down. But you'll still see references to the collection, known as SIMTEL20, around the Net. Smiley A way to describe emotion online. Look at this with your head tilted to the left :-). There are scores of these smileys, from grumpy to quizzical. Snail mail Mail that comes through a slot in your front door or a box mounted outside your house. Sysadmin The system administrator; the person who runs a host system or public-access site. Sysop A system operator. Somebody who runs a bulletin-board system. TANSTAAFL There Ain't No Such Thing as a Free Lunch. TCP/IP Transmission Control Protocol/Internet Protocol. The particular system for transferring information over a computer network that is at the heart of the Internet. Telnet A program that lets you connect to other computers on the Internet. Terminal There are several methods for determining how your emulation keystrokes and screen interact with a public-access site's operating system. Most communications programs offer a choice of "emulations" that let you mimic the keyboard that would normally be attached directly to the host-system computer. UUCP Unix-to-Unix CoPy. A method for transferring Usenet postings and e-mail that requires far fewer net resources than TCP/IP, but which can result in considerably slower transfer times. Upload Copy a file from your computer to a host system. User name On most host systems, the first time you connect you are asked to supply a one-word user name. This can be any combination of letters and numbers. VT100 Another terminal-emulation system. Supported by many communications program, it is the most common one in use on the Net. VT102 is a newer version. Appendix B: General Information About the Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is a membership organization that was founded in July of 1990 to ensure that the principles embodied in the Constitution and the Bill of Rights are protected as new communications technologies emerge. From the beginning, EFF has worked to shape our nation's communications infrastructure and the policies that govern it in order to maintain and enhance First Amendment, privacy and other democratic values. We believe that our overriding public goal must be the creation of Electronic Democracy, so our work focuses on the establishment of: o new laws that protect citizens' basic Constitutional rights as they use new communications technologies, o a policy of common carriage requirements for all network providers so that all speech, no matter how controversial, will be carried without discrimination, o a National Public Network where voice, data and video services are accessible to all citizens on an equitable and affordable basis, and o a diversity of communities that enable all citizens to have a voice in the information age. Join us! I wish to become a member of the Electronic Frontier Foundation. I enclose: $__________ Regular membership -- $40 $__________ Student membership -- $20 Special Contribution I wish to make a tax-deductible donation in the amount of $__________ to further support the activities of EFF and to broaden participation in the organization. Documents Available in Hard Copy Form The following documents are available free of charge from the Electronic Frontier Foundation. Please indicate any of the documents you wish to receive. ___ Open Platform Proposal - EFF's proposal for a national telecommunications infrastructure. 12 pages. July, 1992 ___ An Analysis of the FBI Digital Telephony Proposal - Response of EFF-organized coalition to the FBI's digital telephony proposal of Fall, 1992. 8 pages. September, 1992. ___ Building the Open Road: The NREN and the National Public Network - A discussion of the National Research and Education Network as a prototype for a National Public Network. 20 pages. May, 1992. ___ Innovative Services Delivered Now: ISDN Applications at Home, School, the Workplace and Beyond - A compilation of ISDN applications currently in use. 29 pages. January, 1993. ___ Decrypting the Puzzle Palace - John Perry Barlow's argument for strong encryption and the need for an end to U.S. policies preventing its development and use. 13 pages. May, 1992. ___ Crime and Puzzlement - John Perry Barlow's piece on the founding of the Electronic Frontier Foundation and the world of hackers, crackers and those accused of computer crimes. 24 pages. June, 1990. ___ Networks & Policy - A quarterly newsletter detailing EFF's activities and achievements. Your Contact Information: Name: __________________________________________________________ Organization: ____________________________________________________ Address: ________________________________________________________ ________________________________________________________ Phone: (____) _______________ FAX: (____) _______________ (optional) E-mail address: ___________________________________________________ Payment Method ___ Enclosed is a check payable to the Electronic Frontier Foundation. ___ Please charge my: ___ MasterCard ___ Visa ___ American Express Card Number: ___________________________________________ Expiration Date: _________________________________________ Signature: ______________________________________________ Privacy Policy EFF occasionally shares our mailing list with other organizations promoting similar goals. However, we respect an individual's right to privacy and will not distribute your name without explicit permission. ___ I grant permission for the EFF to distribute my name and contact information to organizations sharing similar goals. Print out and mail to: Membership Coordinator Electronic Frontier Foundation 1001 G Street, N.W. Suite 950 East Washington, DC 20001 202/347-5400 voice 202/393-5509 fax The Electronic Frontier Foundation is a nonprofit, 501(c)(3) organization supported by contributions from individual members, corporations and private foundations. Donations are tax-deductible. 5180 ---- IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA AMERICAN LIBRARY ASSOCIATION, : CIVIL ACTION INC., et al. : : v. : : UNITED STATES, et al. : NO. 01-1303 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MULTNOMAH COUNTY PUBLIC : CIVIL ACTION LIBRARY, et al. : : v. : : UNITED STATES OF AMERICA, et al. : NO. 01-1322 Before: BECKER, Chief Circuit Judge, FULLAM and BARTLE, District Judges. OPINION OF THE COURT May 31, 2002 Becker, Chief Circuit Judge CONTENTS I. Preliminary Statement II. Findings of Fact A. Statutory Framework 1. Nature and Operation of the E-rate and LSTA Programs 2. CIPA a. CIPA's Amendments to the E-rate Program b. CIPA's Amendments to the LSTA Program B. Identity of the Plaintiffs 1. Library and Library Association Plaintiffs 2. Patron and Patron Association Plaintiffs 3. Web Publisher Plaintiffs C. The Internet 1. Background 2. The Indexable Web, the "Deep Web"; Their Size and Rates of Growth and Change 3. The Amount of Sexually Explicit Material on the Web D. American Public Libraries 1. The Mission of Public Libraries, and Their Reference and Collection Development Practices 2. The Internet in Public Libraries a. Internet Use Policies in Public Libraries b. Methods for Regulating Internet Use E. Internet Filtering Technology 1. What Is Filtering Software, Who Makes It, and What Does It Do? 2. The Methods that Filtering Companies Use to Compile Category Lists a. The "Harvesting" Phase b. The "Winnowing" or Categorization Phase c. The Process for "Re-Reviewing" Web Pages After Their Initial Categorization 3. The Inherent Tradeoff Between Overblocking and Underblocking 4. Attempts to Quantify Filtering Programs' Rates of Over- and Underblocking 5. Methods of Obtaining Examples of Erroneously Blocked Web Sites 6. Examples of Erroneously Blocked Web Sites 7. Conclusion: The Effectiveness of Filtering Programs III. Analytic Framework for the Opinion: The Centrality of Dole and the Role of the Facial Challenge IV. Level of Scrutiny Applicable to Content-based Restrictions on Internet Access in Public Libraries A. Overview of Public Forum Doctrine B. Contours of the Relevant Forum: the Library's Collection as a Whole or the Provision of Internet Access? C. Content-based Restrictions in Designated Public Fora D. Reasons for Applying Strict Scrutiny 1. Selective Exclusion From a "Vast Democratic Forum" 2. Analogy to Traditional Public Fora V. Application of Strict Scrutiny A. State Interests 1. Preventing the Dissemination of Obscenity, Child Pornography, and Material Harmful to Minors 2. Protecting the Unwilling Viewer 3. Preventing Unlawful or Inappropriate Conduct 4. Summary B. Narrow Tailoring C. Less Restrictive Alternatives D. Do CIPA's Disabling Provisions Cure the Defect? VI. Conclusion; Severability FOOTNOTES 1. Preliminary Statement This case challenges an act of Congress that makes the use of filtering software by public libraries a condition of the receipt of federal funding. The Internet, as is well known, is a vast, interactive medium based on a decentralized network of computers around the world. Its most familiar feature is the World Wide Web (the "Web"), a network of computers known as servers that provide content to users. The Internet provides easy access to anyone who wishes to provide or distribute information to a worldwide audience; it is used by more than 143 million Americans. Indeed, much of the world's knowledge accumulated over centuries is available to Internet users almost instantly. Approximately 10% of the Americans who use the Internet access it at public libraries. And approximately 95% of all public libraries in the United States provide public access to the Internet. While the beneficial effect of the Internet in expanding the amount of information available to its users is self-evident, its low entry barriers have also led to a perverse result – facilitation of the widespread dissemination of hardcore pornography within the easy reach not only of adults who have every right to access it (so long as it is not legally obscene or child pornography), but also of children and adolescents to whom it may be quite harmful. The volume of pornography on the Internet is huge, and the record before us demonstrates that public library patrons of all ages, many from ages 11 to 15, have regularly sought to access it in public library settings. There are more than 100,000 pornographic Web sites that can be accessed for free and without providing any registration information, and tens of thousands of Web sites contain child pornography. Libraries have reacted to this situation by utilizing a number of means designed to insure that patrons avoid illegal (and unwanted) content while also enabling patrons to find the content they desire. Some libraries have trained patrons in how to use the Internet while avoiding illegal content, or have directed their patrons to "preferred" Web sites that librarians have reviewed. Other libraries have utilized such devices as recessing the computer monitors, installing privacy screens, and monitoring implemented by a "tap on the shoulder" of patrons perceived to be offending library policy. Still others, viewing the foregoing approaches as inadequate or uncomfortable (some librarians do not wish to confront patrons), have purchased commercially available software that blocks certain categories of material deemed by the library board as unsuitable for use in their facilities. Indeed, 7% of American public libraries use blocking software for adults. Although such programs are somewhat effective in blocking large quantities of pornography, they are blunt instruments that not only "underblock," i.e., fail to block access to substantial amounts of content that the library boards wish to exclude, but also, central to this litigation, "overblock," i.e., block access to large quantities of material that library boards do not wish to exclude and that is constitutionally protected. Most of the libraries that use filtering software seek to block sexually explicit speech. While most libraries include in their physical collection copies of volumes such as The Joy of Sex and The Joy of Gay Sex, which contain quite explicit photographs and descriptions, filtering software blocks large quantities of other, comparable information about health and sexuality that adults and teenagers seek on the Web. One teenager testified that the Internet access in a public library was the only venue in which she could obtain information important to her about her own sexuality. Another library patron witness described using the Internet to research breast cancer and reconstructive surgery for his mother who had breast surgery. Even though some filtering programs contain exceptions for health and education, the exceptions do not solve the problem of overblocking constitutionally protected material. Moreover, as we explain below, the filtering software on which the parties presented evidence in this case overblocks not only information relating to health and sexuality that might be mistaken for pornography or erotica, but also vast numbers of Web pages and sites that could not even arguably be construed as harmful or inappropriate for adults or minors. The Congress, sharing the concerns of many library boards, enacted the Children's Internet Protection Act ("CIPA"), Pub. L. No. 106-554, which makes the use of filters by a public library a condition of its receipt of two kinds of subsidies that are important (or even critical) to the budgets of many public libraries – grants under the Library Services and Technology Act, 20 U.S.C. Sec. 9101 et seq. ("LSTA"), and so-called "E-rate discounts" for Internet access and support under the Telecommunications Act, 47 U.S.C. Sec. 254. LSTA grant funds are awarded, inter alia, in order to: (1) assist libraries in accessing information through electronic networks, and (2) provide targeted library and information services to persons having difficulty using a library and to underserved and rural communities, including children from families with incomes below the poverty line. E-rate discounts serve the similar purpose of extending Internet access to schools and libraries in low-income communities. CIPA requires that libraries, in order to receive LSTA funds or E-rate discounts, certify that they are using a "technology protection measure" that prevents patrons from accessing "visual depictions" that are "obscene," "child pornography," or in the case of minors, "harmful to minors." 20 U.S.C. Sec. 9134(f)(1)(A) (LSTA); 47 U.S.C. Sec. 254(h)(6)(B) & (C) (E- rate). The plaintiffs, a group of libraries, library associations, library patrons, and Web site publishers, brought this suit against the United States and others alleging that CIPA is facially unconstitutional because: (1) it induces public libraries to violate their patrons' First Amendment rights contrary to the requirements of South Dakota v. Dole, 483 U.S. 203 (1987); and (2) it requires libraries to relinquish their First Amendment rights as a condition on the receipt of federal funds and is therefore impermissible under the doctrine of unconstitutional conditions. In arguing that CIPA will induce public libraries to violate the First Amendment, the plaintiffs contend that given the limits of the filtering technology, CIPA's conditions effectively require libraries to impose content-based restrictions on their patrons' access to constitutionally protected speech. According to the plaintiffs, these content- based restrictions are subject to strict scrutiny under public forum doctrine, see Rosenberger v. Rector & Visitors of Univ. of Va., 515 U.S. 819, 837 (1995), and are therefore permissible only if they are narrowly tailored to further a compelling state interest and no less restrictive alternatives would further that interest, see Reno v. ACLU, 521 U.S. 844, 874 (1997). The government responds that CIPA will not induce public libraries to violate the First Amendment, since it is possible for at least some public libraries to constitutionally comply with CIPA's conditions. Even if some libraries' use of filters might violate the First Amendment, the government submits that CIPA can be facially invalidated only if it is impossible for any public library to comply with its conditions without violating the First Amendment. Pursuant to CIPA, a three-judge Court was convened to try the issues. Pub. L. No. 106-554. Following an intensive period of discovery on an expedited schedule to allow public libraries to know whether they need to certify compliance with CIPA by July 1, 2002, to receive subsidies for the upcoming year, the Court conducted an eight-day trial at which we heard 20 witnesses, and received numerous depositions, stipulations and documents. The principal focus of the trial was on the capacity of currently available filtering software. The plaintiffs adduced substantial evidence not only that filtering programs bar access to a substantial amount of speech on the Internet that is clearly constitutionally protected for adults and minors, but also that these programs are intrinsically unable to block only illegal Internet content while simultaneously allowing access to all protected speech. As our extensive findings of fact reflect, the plaintiffs demonstrated that thousands of Web pages containing protected speech are wrongly blocked by the four leading filtering programs, and these pages represent only a fraction of Web pages wrongly blocked by the programs. The plaintiffs' evidence explained that the problems faced by the manufacturers and vendors of filtering software are legion. The Web is extremely dynamic, with an estimated 1.5 million new pages added every day and the contents of existing Web pages changing very rapidly. The category lists maintained by the blocking programs are considered to be proprietary information, and hence are unavailable to customers or the general public for review, so that public libraries that select categories when implementing filtering software do not really know what they are blocking. There are many reasons why filtering software suffers from extensive over- and underblocking, which we will explain below in great detail. They center on the limitations on filtering companies' ability to: (1) accurately collect Web pages that potentially fall into a blocked category (e.g., pornography); (2) review and categorize Web pages that they have collected; and (3) engage in regular re-review of Web pages that they have previously reviewed. These failures spring from constraints on the technology of automated classification systems, and the limitations inherent in human review, including error, misjudgment, and scarce resources, which we describe in detail infra at 58-74. One failure of critical importance is that the automated systems that filtering companies use to collect Web pages for classification are able to search only text, not images. This is crippling to filtering companies' ability to collect pages containing "visual depictions" that are obscene, child pornography, or harmful to minors, as CIPA requires. As will appear, we find that it is currently impossible, given the Internet's size, rate of growth, rate of change, and architecture, and given the state of the art of automated classification systems, to develop a filter that neither underblocks nor overblocks a substantial amount of speech. The government, while acknowledging that the filtering software is imperfect, maintains that it is nonetheless quite effective, and that it successfully blocks the vast majority of the Web pages that meet filtering companies' category definitions (e.g., pornography). The government contends that no more is required. In its view, so long as the filtering software selected by the libraries screens out the bulk of the Web pages proscribed by CIPA, the libraries have made a reasonable choice which suffices, under the applicable legal principles, to pass constitutional muster in the context of a facial challenge. Central to the government's position is the analogy it advances between Internet filtering and the initial decision of a library to determine which materials to purchase for its print collection. Public libraries have finite budgets and must make choices as to whether to purchase, for example, books on gardening or books on golf. Such content-based decisions, even the plaintiffs concede, are subject to rational basis review and not a stricter form of First Amendment scrutiny. In the government's view, the fact that the Internet reverses the acquisition process and requires the libraries to, in effect, purchase the entire Internet, some of which (e.g., hardcore pornography) it does not want, should not mean that it is chargeable with censorship when it filters out offending material. The legal context in which this extensive factual record is set is complex, implicating a number of constitutional doctrines, including the constitutional limitations on Congress's spending clause power, the unconstitutional conditions doctrine, and subsidiary to these issues, the First Amendment doctrines of prior restraint, vagueness, and overbreadth. There are a number of potential entry points into the analysis, but the most logical is the spending clause jurisprudence in which the seminal case is South Dakota v. Dole, 483 U.S. 203 (1987). Dole outlines four categories of constraints on Congress's exercise of its power under the Spending Clause, but the only Dole condition disputed here is the fourth and last, i.e., whether CIPA requires libraries that receive LSTA funds or E-rate discounts to violate the constitutional rights of their patrons. As will appear, the question is not a simple one, and turns on the level of scrutiny applicable to a public library's content-based restrictions on patrons' Internet access. Whether such restrictions are subject to strict scrutiny, as plaintiffs contend, or only rational basis review, as the government contends, depends on public forum doctrine. The government argues that, in providing Internet access, public libraries do not create a public forum, since public libraries may reserve the right to exclude certain speakers from availing themselves of the forum. Accordingly, the government contends that public libraries' restrictions on patrons' Internet access are subject only to rational basis review. Plaintiffs respond that the government's ability to restrict speech on its own property, as in the case of restrictions on Internet access in public libraries, is not unlimited, and that the more widely the state facilitates the dissemination of private speech in a given forum, the more vulnerable the state's decision is to restrict access to speech in that forum. We agree with the plaintiffs that public libraries' content-based restrictions on their patrons' Internet access are subject to strict scrutiny. In providing even filtered Internet access, public libraries create a public forum open to any speaker around the world to communicate with library patrons via the Internet on a virtually unlimited number of topics. Where the state provides access to a "vast democratic forum[]," Reno v. ACLU, 521 U.S. 844, 868 (1997), open to any member of the public to speak on subjects "as diverse as human thought," id. at 870 (internal quotation marks and citation omitted), the state's decision selectively to exclude from the forum speech whose content the state disfavors is subject to strict scrutiny, as such exclusions risk distorting the marketplace of ideas that the state has facilitated. Application of strict scrutiny finds further support in the extent to which public libraries' provision of Internet access uniquely promotes First Amendment values in a manner analogous to traditional public fora such as streets, sidewalks, and parks, in which content-based restrictions are always subject to strict scrutiny. Under strict scrutiny, a public library's use of filtering software is permissible only if it is narrowly tailored to further a compelling government interest and no less restrictive alternative would serve that interest. We acknowledge that use of filtering software furthers public libraries' legitimate interests in preventing patrons from accessing visual depictions of obscenity, child pornography, or in the case of minors, material harmful to minors. Moreover, use of filters also helps prevent patrons from being unwillingly exposed to patently offensive, sexually explicit content on the Internet. We are sympathetic to the position of the government, believing that it would be desirable if there were a means to ensure that public library patrons could share in the informational bonanza of the Internet while being insulated from materials that meet CIPA's definitions, that is, visual depictions that are obscene, child pornography, or in the case of minors, harmful to minors. Unfortunately this outcome, devoutly to be wished, is not available in this less than best of all possible worlds. No category definition used by the blocking programs is identical to the legal definitions of obscenity, child pornography, or material harmful to minors, and, at all events, filtering programs fail to block access to a substantial amount of content on the Internet that falls into the categories defined by CIPA. As will appear, we credit the testimony of plaintiffs' expert Dr. Geoffrey Nunberg that the blocking software is (at least for the foreseeable future) incapable of effectively blocking the majority of materials in the categories defined by CIPA without overblocking a substantial amount of materials. Nunberg's analysis was supported by extensive record evidence. As noted above, this inability to prevent both substantial amounts of underblocking and overblocking stems from several sources, including limitations on the technology that software filtering companies use to gather and review Web pages, limitations on resources for human review of Web pages, and the necessary error that results from human review processes. Because the filtering software mandated by CIPA will block access to substantial amounts of constitutionally protected speech whose suppression serves no legitimate government interest, we are persuaded that a public library's use of software filters is not narrowly tailored to further any of these interests. Moreover, less restrictive alternatives exist that further the government's legitimate interest in preventing the dissemination of obscenity, child pornography, and material harmful to minors, and in preventing patrons from being unwillingly exposed to patently offensive, sexually explicit content. To prevent patrons from accessing visual depictions that are obscene and child pornography, public libraries may enforce Internet use policies that make clear to patrons that the library's Internet terminals may not be used to access illegal speech. Libraries may then impose penalties on patrons who violate these policies, ranging from a warning to notification of law enforcement, in the appropriate case. Less restrictive alternatives to filtering that further libraries' interest in preventing minors from exposure to visual depictions that are harmful to minors include requiring parental consent to or presence during unfiltered access, or restricting minors' unfiltered access to terminals within view of library staff. Finally, optional filtering, privacy screens, recessed monitors, and placement of unfiltered Internet terminals outside of sight- lines provide less restrictive alternatives for libraries to prevent patrons from being unwillingly exposed to sexually explicit content on the Internet. In an effort to avoid the potentially fatal legal implications of the overblocking problem, the government falls back on the ability of the libraries, under CIPA's disabling provisions, see CIPA Sec. 1712 (codified at 20 U.S.C. Sec. 9134(f)(3)), CIPA Sec.1721(b) (codified at 47 U.S.C. Sec. 254(h)(6)(D)), to unblock a site that is patently proper yet improperly blocked. The evidence reflects that libraries can and do unblock the filters when a patron so requests. But it also reflects that requiring library patrons to ask for a Web site to be unblocked will deter many patrons because they are embarrassed, or desire to protect their privacy or remain anonymous. Moreover, the unblocking may take days, and may be unavailable, especially in branch libraries, which are often less well staffed than main libraries. Accordingly, CIPA's disabling provisions do not cure the constitutional deficiencies in public libraries' use of Internet filters. Under these circumstances we are constrained to conclude that the library plaintiffs must prevail in their contention that CIPA requires them to violate the First Amendment rights of their patrons, and accordingly is facially invalid, even under the standard urged on us by the government, which would permit us to facially invalidate CIPA only if it is impossible for a single public library to comply with CIPA's conditions without violating the First Amendment. In view of the limitations inherent in the filtering technology mandated by CIPA, any public library that adheres to CIPA's conditions will necessarily restrict patrons' access to a substantial amount of protected speech, in violation of the First Amendment. Given this conclusion, we need not reach plaintiffs' arguments that CIPA effects a prior restraint on speech and is unconstitutionally vague. Nor do we decide their cognate unconstitutional conditions theory, though for reasons explained infra at note 36, we discuss the issues raised by that claim at some length. For these reasons, we will enter an Order declaring Sections 1712(a)(2) and 1721(b) of the Children's Internet Protection Act, codified at 20 U.S.C. Sec. 9134(f) and 47 U.S.C. Sec. 254(h)(6), respectively, to be facially invalid under the First Amendment and permanently enjoining the defendants from enforcing those provisions.II. Findings of Fact 1. Statutory Framework 1. Nature and Operation of the E-rate and LSTA Programs In the Telecommunications Act of 1996 ("1996 Act"), Congress directed the Federal Communications Commission ("FCC") to take the steps necessary to establish a system of support mechanisms to ensure the delivery of affordable telecommunications service to all Americans. This system, referred to as "universal service," is codified in section 254 of the Communications Act of 1934, as amended by the 1996 Act. See 47 U.S.C. Sec. 254. Congress specified several groups as beneficiaries of the universal service support mechanism, including consumers in high-cost areas, low-income consumers, schools and libraries, and rural health care providers. See 47 U.S.C. Sec. 254(h)(1). The extension of universal service to schools and libraries in section 254(h) is commonly referred to as the Schools and Libraries Program, or "E-rate" Program. Under the E-rate Program, "[a]ll telecommunications carriers serving a geographic area shall, upon a bona fide request for any of its services that are within the definition of universal service . . ., provide such services to elementary schools, secondary schools, and libraries for educational purposes at rates less than the amounts charged for similar services to other parties." 47 U.S.C. Sec. 254(h)(1)(B). Under FCC regulations, providers of "interstate telecommunications" (with certain exceptions, see 47 C.F.R. Sec. 54.706(d)), must contribute a portion of their revenue for disbursement among eligible carriers that are providing services to those groups or areas specified by Congress in section 254. To be eligible for the discounts, a library must: (1) be eligible for assistance from a State library administrative agency under the Library Services and Technology Act, see infra; (2) be funded as an independent entity, completely separate from any schools; and (3) not be operating as a for-profit business. See 47 C.F.R. Sec. 54.501(c). Discounts on services for eligible libraries are set as a percentage of the pre-discount price, and range from 20% to 90%, depending on a library's level of economic disadvantage and its location in an urban or rural area. See 47 C.F.R. Sec. 54.505. Currently, a library's level of economic disadvantage is based on the percentage of students eligible for the national school lunch program in the school district in which the library is located. The Library Services and Technology Act ("LSTA"), Subchapter II of the Museum and Library Services Act, 20 U.S.C. Sec. 9101 et seq., was enacted by Congress in 1996 as part of the Omnibus Consolidated Appropriations Act of 1997, Pub. L. No. 104-208. The LSTA establishes three grant programs to achieve the goal of improving library services across the nation. Under the Grants to States Program, LSTA grant funds are awarded, inter alia, in order to assist libraries in accessing information through electronic networks and pay for the costs of acquiring or sharing computer systems and telecommunications technologies. See 20 U.S.C. Sec. 9141(a). Through the Grants to States program, LSTA funds have been used to acquire and pay costs associated with Internet-accessible computers located in libraries. 2. CIPA The Children's Internet Protection Act ("CIPA") was enacted as part of the Consolidated Appropriations Act of 2001, which consolidated and enacted several appropriations bills, including the Miscellaneous Appropriations Act, of which CIPA was a part. See Pub. L. No. 106-554. CIPA addresses three distinct types of federal funding programs: (1) aid to elementary and secondary schools pursuant to Title III of the Elementary and Secondary Education Act of 1965, see CIPA Sec. 1711 (amending Title 20 to add Sec. 3601); (2) LSTA grants to states for support of libraries, see CIPA Sec. 1712 (amending the Museum and Library Services Act, 20 U.S.C. Sec. 9134); and (3) discounts under the E-rate program, see CIPA Sec. 1721(a) & (b) (both amending the Communications Act of 1934, 47 U.S.C. Sec. 254(h)). Only sections 1712 and 1721(b) of CIPA, which apply to libraries, are at issue in this case. As explained in more detail below, CIPA requires libraries that participate in the LSTA and E-rate programs to certify that they are using software filters on their computers to protect against visual depictions that are obscene, child pornography, or in the case of minors, harmful to minors. CIPA permits library officials to disable the filters for patrons for bona fide research or other lawful purposes, but disabling is not permitted for minor patrons if the library receives E-rate discounts. 1. CIPA's Amendments to the E-rate Program Section 1721(b) of CIPA imposes conditions on a library's participation in the E-rate program. A library "having one or more computers with Internet access may not receive services at discount rates," CIPA Sec. 1721(b) (codified at 47 U.S.C. Sec. 254(h)(6)(A)(i)), unless the library certifies that it is "enforcing a policy of Internet safety that includes the operation of a technology protection measure with respect to any of its computers with Internet access that protects against access through such computers to visual depictions that are – (I) obscene; (II) child pornography; or (III) harmful to minors," and that it is "enforcing the operation of such technology protection measure during any use of such computers by minors." CIPA Sec. 1721(b) (codified at 47 U.S.C. Sec. 254(h)(6)(B)). CIPA defines a "technology protection measure" as "a specific technology that blocks or filters access to visual depictions that are obscene, . . . child pornography, . . . or harmful to minors." CIPA Sec. 1703(b)(1) (codified at 47 U.S.C. Sec. 254(h)(7)(I)). To receive E-rate discounts, a library must also certify that filtering software is in operation during adult use of the Internet. More specifically, with respect to adults, a library must certify that it is "enforcing a policy of Internet safety that includes the operation of a technology protection measure with respect to any of its computers with Internet access that protects against access through such computers to visual depictions that are – (I) obscene; or (II) child pornography," and that it is "enforcing the operation of such technology protection measure during any use of such computers." CIPA Sec. 1721(b) (codified at 47 U.S.C. Sec. 254(h)(6)(C)). Interpreting the statutory terms "any use," the FCC has concluded that "CIPA makes no distinction between computers used only by staff and those accessible to the public." In re Federal-State Joint Board on Universal Service: Children's Internet Protection Act, CC Docket No. 96-45, Report and Order, FCC 01-120, 30 (Apr. 5, 2001). With respect to libraries receiving E-rate discounts, CIPA further specifies that "[a]n administrator, supervisor, or other person authorized by the certifying authority . . . may disable the technology protection measure concerned, during use by an adult, to enable access for bona fide research or other lawful purpose." CIPA Sec.1721(b) (codified at 47 U.S.C. Sec. 254(h)(6)(D)). 2. CIPA's Amendments to the LSTA Program Section 1712 of CIPA amends the Museum and Library Services Act (20 U.S.C. Sec. 9134(f)) to provide that no funds made available under the Act "may be used to purchase computers used to access the Internet, or to pay for direct costs associated with accessing the Internet," unless such library "has in place" and is enforcing "a policy of Internet safety that includes the operation of a technology protection measure with respect to any of its computers with Internet access that protects against access through such computers to visual depictions" that are "obscene" or "child pornography," and, when the computers are in use by minors, also protects against access to visual depictions that are "harmful to minors." CIPA Sec. 1712 (codified at 20 U.S.C. Sec. 9134(f)(1)). Section 1712 contains definitions of "technology protection measure," "obscene," "child pornography," and "harmful to minors," that are substantially similar to those found in the provisions governing the E-rate program. CIPA Sec. 1712 (codified at 20 U.S.C. Sec. 9134(f)(7)); see also supra note 2. As under the E-rate program, "an administrator, supervisor or other authority may disable a technology protection measure . . . to enable access for bona fide research or other lawful purposes." CIPA Sec. 1712 (codified at 20 U.S.C. Sec. 9134(f)(3)). Whereas CIPA's amendments to the E-rate program permit disabling for bona fide research or other lawful purposes only during adult use, the LSTA provision permits disabling for both adults and minors. 2. Identity of the Plaintiffs 1. Library and Library Association Plaintiffs Plaintiffs American Library Association, Alaska Library Association, California Library Association, Connecticut Library Association, Freedom to Read Foundation, Maine Library Association, New England Library Association, New York Library Association, and Wisconsin Library Association are non-profit organizations whose members include public libraries that receive either E-rate discounts or LSTA funds for the provision of Internet access. Because it is a prerequisite to associational standing, we note that the interests that these organizations seek to protect in this litigation are central to their raison d'être. Plaintiffs Fort Vancouver Regional Library District, in southwest Washington state; Multnomah County Public Library, in Multnomah County, Oregon; Norfolk Public Library System, in Norfolk, Virginia; Santa Cruz Public Library Joint Powers Authority, in Santa Cruz, California; South Central Library System ("SCLS"), centered in Madison, Wisconsin; and the Westchester Library System, in Westchester County, New York, are public library systems with branch offices in their respective localities that provide Internet access to their patrons. The Fort Vancouver Regional Library District, for over three years from 1999-2001, received $135,000 in LSTA grants and $19,500 in E-rate discounts for Internet access. The Multnomah County Public Library received $70,000 in E-rate discounts for Internet access this year, and has applied for $100,000 in E-rate discounts for the upcoming year. The Norfolk Public Library System received $90,000 in E-rate discounts for Internet access this year, and has received a $200,000 LSTA grant to put computer labs in eight of its libraries. The Santa Cruz Public Library Joint Powers Authority received $20,560 in E-rate discounts for Internet access in 2001-02. The SCLS received between $3,000 and $5,000 this year in E-rate discounts for Internet access. The Fort Vancouver Regional Library District Board is a public board whose members are appointed by elected county commissioners. The Multnomah County Library is a county department, whose board is appointed by the county chair and confirmed by the other commissioners. The SCLS is an aggregation of 51 independently governed statutory member public libraries, whose relationship to SCLS is defined by state law. The governing body of the SCLS is the Library Board of Trustees, which consists of 20 members nominated by county executives and ratified by county boards of supervisors. 2. Patron and Patron Association Plaintiffs Plaintiffs Association of Community Organizations for Reform Now, Friends of the Philadelphia City Institute Library, and the Pennsylvania Alliance for Democracy are nonprofit organizations whose members include individuals who access the Internet at public libraries that receive E-rate discounts or LSTA funds for the provision of public Internet access. We note for the purpose of associational standing that the interests that these organizations seek to protect in this litigation are germane to their purposes. Plaintiffs Emmalyn Rood, Mark Brown, Elizabeth Hrenda, C. Donald Weinberg, Sherron Dixon, by her father and next friend Gordon Dixon, James Geringer, Marnique Tynesha Overby, by her next friend Carolyn C. Williams, William J. Rosenbaum, Carolyn C. Williams, and Quiana Williams, by her mother and next friend Sharon Bernard, are adults and minors who use the Internet at public libraries that, to the best of their knowledge, do not filter patrons' access to the Internet. Several of these plaintiffs do not have Internet access from home. Emmalyn Rood is a sixteen-year-old who uses the Multnomah County Public Library. When she was 13, she used the Internet at the Multnomah County Public Library to research issues relating to her sexual identity. Ms. Rood did not use her home or school computer for this research, in part because she wished her searching to be private. Although the library offered patrons the option of using filtering software, Ms. Rood did not use that option because she had had previous experience with such programs blocking information that was valuable to her, including information relating to gay and lesbian issues. Plaintiff Mark Brown used the Internet at the Philadelphia Free Library to research breast cancer and reconstructive surgery for his mother who had breast surgery. Mr. Brown's research at the library provided him and his mother with essential information about his mother's medical condition and potential treatments. 3. Web Publisher Plaintiffs Plaintiff Afraid to Ask, Inc., based in Saunderstown, Rhode Island, publishes a health education Web site, www.AfraidtoAsk.com. Dr. Jonathan Bertman, the president and medical director of Afraid to Ask, is a family practice physician in rural Rhode Island and a clinical assistant professor of family medicine at Brown University. AfraidtoAsk.com's mission is to provide detailed information on sensitive health issues, often of a sexual nature, such as sexually transmitted diseases, male and female genitalia, and birth control, sought by people of all ages who would prefer to learn about sensitive health issues anonymously, i.e., they are "afraid to ask." As part of its educational mission, AfraidtoAsk.com often uses graphic images of sexual anatomy to convey information. Its primary audience is teens and young adults. Based on survey data collected on the site, half of the people visiting the site are under 24 years old and a quarter are under 18. AfraidtoAsk.com is blocked by several leading blocking products as containing sexually explicit content. Plaintiff Alan Guttmacher Institute has a Web site that contains information about its activities and objectives, including its mission to protect the reproductive choices of women and men. Plaintiff Planned Parenthood Federation of America, Inc. ("Planned Parenthood") is a national voluntary organization in the field of reproductive health care. Planned Parenthood owns and operates several Web sites that provide a range of information about reproductive health, from contraception to prevention of sexually transmitted diseases, to finding an abortion provider, and to information about the drug Mifepristone. Plaintiff Safersex.org is a Web site that offers free educational information on how to practice safer sex. Plaintiff Ethan Interactive, Inc., d/b/a Out In America, is an online content provider that owns and operates 64 free Web sites for gay, lesbian, bisexual and transgendered persons worldwide. Plaintiff PlanetOut Corporation is an online content provider for gay, lesbian, bisexual and transgendered persons. Plaintiff the Naturist Action Committee ("NAC") is the nonprofit political arm of the Naturist Society, a private organization that promotes a way of life characterized by the practice of nudity. The NAC Web site provides information about Naturist Society activities and about state and local laws that may affect the rights of Naturists or their ability to practice Naturism, and includes nude photographs of its members. Plaintiff Wayne L. Parker was the Libertarian candidate in the 2000 U.S. Congressional election for the Fifth District of Mississippi (and is running again in 2002). He publishes a Web site that communicates information about his campaign and that provides information about his political views and the Libertarian Party to the public. Plaintiff Jeffrey Pollock was the Republican candidate in the 2000 U.S. Congressional election for the Third District of Oregon. He operates a Web site that is now promoting his candidacy for Congress in 2002. 3. The Internet 1. Background As we noted at the outset, the Internet is a vast, interactive medium consisting of a decentralized network of computers around the world. The Internet presents low entry barriers to anyone who wishes to provide or distribute information. Unlike television, cable, radio, newspapers, magazines or books, the Internet provides an opportunity for those with access to it to communicate with a worldwide audience at little cost. At least 400 million people use the Internet worldwide, and approximately 143 million Americans were using the Internet as of September 2001. Nat'l Telecomm. & Info. Admin., A Nation Online: How Americans Are Expanding Their Use of the Internet (February 2002), available at http://www.ntia.doc.gov/ntiahome/dn/. The World Wide Web is a part of the Internet that consists of a network of computers, called "Web servers," that host "pages" of content accessible via the Hypertext Transfer Protocol or "HTTP." Anyone with a computer connected to the Internet can search for and retrieve information stored on Web servers located around the world. Computer users typically access the Web by running a program called a "browser" on their computers. The browser displays, as individual pages on the computer screen, the various types of content found on the Web and lets the user follow the connections built into Web pages – called "hypertext links," "hyperlinks," or "links" – to additional content. Two popular browsers are Microsoft Internet Explorer and Netscape Navigator. A "Web page" is one or more files a browser graphically assembles to make a viewable whole when a user requests content over the Internet. A Web page may contain a variety of different elements, including text, images, buttons, form fields that the user can fill in, and links to other Web pages. A "Web site" is a term that can be used in several different ways. It may refer to all of the pages and resources available on a particular Web server. It may also refer to all the pages and resources associated with a particular organization, company or person, even if these are located on different servers, or in a subdirectory on a single server shared with other, unrelated sites. Typically, a Web site has as an intended point of entry, a "home page," which includes links to other pages on the same Web site or to pages on other sites. Online discussion groups and chat rooms relating to a variety of subjects are available through many Web sites. Users may find content on the Web using engines that search for requested keywords. In response to a keyword request, a search engine will display a list of Web sites that may contain relevant content and provide links to those sites. Search engines and directories often return a limited number of sites in their search results (e.g., the Google search engine will return only 2,000 sites in response to a search, even if it has found, for example, 530,000 sites in its index that meet the search criteria). A user may also access content on the Web by typing a URL (Uniform Resource Locator) into the address line of the browser. A URL is an address that points to some resource located on a Web server that is accessible over the Internet. This resource may be a Web site, a Web page, an image, a sound or video file, or other resource. A URL can be either a numeric Internet Protocol or "IP" address, or an alphanumeric "domain name" address. Every Web server connected to the Internet is assigned an IP address. A typical IP address looks like "13.1.64.14." Typing the URL "http://13.1.64.14/" into a browser will bring the user to the Web server that corresponds to that address. For convenience, most Web servers have alphanumeric domain name addresses in addition to IP addresses. For example, typing in "http://www.paed.uscourts.gov" will bring the user to the same Web server as typing in "http://204.170.64.143." Every time a user attempts to access material located on a Web server by entering a domain name address into a Web browser, a request is made to a Domain Name Server, which is a directory of domain names and IP addresses, to "resolve," or translate, the domain name address into an IP address. That IP address is then used to locate the Web server from which content is being requested. A Web site may be accessed by using either its domain name address or its IP address. A domain name address typically consists of several parts. For example, the alphanumeric URL http://www.paed.uscourts.gov/documents/opinions can be broken down into three parts. The first part is the transfer protocol the computer will use in accessing the content (e.g., "http" for Hypertext Transfer Protocol); next is the name of the host server on which the information is stored (e.g., www.paed.uscourts.gov); and then the name of the particular file or directory on that server (e.g., /documents/opinions). A single Web page may be associated with more than one URL. For example, the URLs http://www.newyorktimes.com and http://www.nytimes.com will both take the user to the New York Times home page. The topmost directory in a Web site is often referred to as that Web site's root directory or root URL. For example, in http://www.paed.uscourts.gov/documents, the root URL is http://www.paed.uscourts.gov. There may be hundreds or thousands of pages under a single root URL, or there may be one or only a few. There are a number of Web hosting companies that maintain Web sites for other businesses and individuals, which can lead to vast amounts of diverse content being located at the same IP address. Hosting services are offered either for a fee, or in some cases, for free, allowing any individual with Internet access to create a Web site. Some hosting services are provided through the process of "IP-based hosting," where each domain name is assigned a unique IP number. For example, www.baseball.com might map to the IP address "10.3.5.9" and www.XXX.com might map to the IP address "10.0.42.5." Other hosting services are provided through the process of "name-based hosting," where multiple domain name addresses are mapped to a single IP address. If the hosting company were using this method, both www.baseball.com and www.XXX.com could map to a single IP address, e.g., "10.3.5.9." As a result of the "name-based hosting" process, up to tens of thousands of pages with heterogeneous content may share a single IP address. 2. The Indexable Web, the "Deep Web"; Their Size and Rates of Growth and Change The universe of content on the Web that could be indexed, in theory, by standard search engines is known as the "publicly indexable Web." The publicly indexable Web is limited to those pages that are accessible by following a link from another Web page that is recognized by a search engine. This limitation exists because online indexing techniques used by popular search engines and directories such as Yahoo, Lycos and AltaVista, are based on "spidering" technology, which finds sites to index by following links from site to site in a continuous search for new content. If a Web page or site is not linked by others, then spidering will not discover that page or site. Furthermore, many larger Web sites contain instructions, through software, that prevent spiders from investigating that site, and therefore the contents of such sites also cannot be indexed using spidering technology. Because of the vast size and decentralized structure of the Web, no search engine or directory indexes all of the content on the publicly indexable Web. We credit current estimates that no more than 50% of the content currently on the publicly indexable Web has been indexed by all search engines and directories combined. No currently available method or combination of methods for collecting URLs can collect the addresses of all URLs on the Web. The portion of the Web that is not theoretically indexable through the use of "spidering" technology, because other Web pages do not link to it, is called the "Deep Web." Such sites or pages can still be made publicly accessible without being made publicly indexable by, for example, using individual or mass emailings (also known as "spam") to distribute the URL to potential readers or customers, or by using types of Web links that cannot be found by spiders but can be seen and used by readers. "Spamming" is a common method of distributing to potential customers links to sexually explicit content that is not indexable. Because the Web is decentralized, it is impossible to say exactly how large it is. A 2000 study estimated a total of 7.1 million unique Web sites, which at the Web's historical rate of growth, would have increased to 11 million unique sites as of September 2001. Estimates of the total number of Web pages vary, but a figure of 2 billion is a reasonable estimate of the number of Web pages that can be reached, in theory, by standard search engines. We need not make a specific finding as to a figure, for by any measure the Web is extremely vast, and it is constantly growing. The indexable Web is growing at a rate of approximately 1.5 million pages per day. The size of the un-indexable Web, or the "Deep Web," while impossible to determine precisely, is estimated to be two to ten times that of the publicly indexable Web. In addition to growing rapidly, Web pages and sites are constantly being removed, or changing their content. Web sites or pages can change content without changing their domain name addresses or IP addresses. Individual Web pages have an average life span of approximately 90 days. 3. The Amount of Sexually Explicit Material on the Web There is a vast amount of sexually explicit material available via the Internet and the Web. Sexually explicit material on the Internet is easy to access using any public search engine, such as, for example, Google or AltaVista. Although much of the sexually explicit material available on the Web is posted on commercial sites that require viewers to pay in order to gain access to the site, a large number of sexually explicit sites may be accessed for free and without providing any registration information. Most importantly, some Web sites that contain sexually explicit content have innocuous domain names and therefore can be reached accidentally. A commonly cited example is http://www.whitehouse.com. Other innocent-sounding URLs that retrieve graphic, sexually explicit depictions include http://www.boys.com, http://www.girls.com, http://www.coffeebeansupply.com, and http://www.BookstoreUSA.com. Moreover, commercial Web sites that contain sexually explicit material often use a technique of attaching pop-up windows to their sites, which open new windows advertising other sexually explicit sites without any prompting by the user. This technique makes it difficult for a user quickly to exit all of the pages containing sexually explicit material, whether he or she initially accessed such material intentionally or not. The percentage of Web pages on the indexed Web containing sexually explicit content is relatively small. Recent estimates indicate that no more than 1-2% of the content on the Web is pornographic or sexually explicit. However, the absolute number of Web sites offering free sexually explicit material is extremely large, approximately 100,000 sites. 4. American Public Libraries The more than 9,000 public libraries in the United States are typically funded (at least in large part) by state or local governments. They are frequently overseen by a board of directors that is either elected or is appointed by an elected official or a body of elected officials. We heard testimony from librarians and library board members working in eight public library systems in different communities across the country, some of whom are also plaintiffs in this case. They hailed from the following library systems: Fort Vancouver, Washington; Fulton County, Indiana; Greenville, South Carolina; a regional consortium of libraries centered in Madison, Wisconsin; Multnomah County, Oregon; Norfolk, Virginia; Tacoma, Washington; and Westerville, Ohio. The parties also took depositions from several other librarians and library board members who did not testify during the trial, and submitted a number of other documents regarding individual libraries' policies. 1. The Mission of Public Libraries, and Their Reference and Collection Development Practices American public libraries operate in a wide variety of communities, and it is not surprising that they do not all view their mission identically. Nor are their practices uniform. Nevertheless, they generally share a common mission – to provide patrons with a wide range of information and ideas. Public libraries across the country have endorsed the American Library Association's ("ALA") "Library Bill of Rights" and/or "Freedom to Read Statement," including every library testifying on behalf of the defendants in this case. The "Library Bill of Rights," first adopted by the ALA in 1948, provides, among other things, that "[b]ooks and other library resources should be provided for the interest, information, and enlightenment of all people of the community the library serves." It also states that libraries "should provide materials and information presenting all points of view on current and historical issues" and that library materials "should not be proscribed or removed because of partisan or doctrinal disapproval." The ALA's "Freedom to Read" statement, adopted in 1953 and most recently updated in July 2000, states, among other things, that "[i]t is in the public interest for publishers and librarians to make available the widest diversity of views and expressions, including those that are unorthodox or unpopular with the majority." It also states that "[i]t is the responsibility of . . . librarians . . . to contest encroachments upon th[e] freedom [to read] by individuals or groups seeking to impose their own standards or tastes upon the community at large." Public libraries provide information not only for educational purposes, but also for recreational, professional, and other purposes. For example, Ginnie Cooper, Director of the Multnomah County Library, testified that some of the library's most popular items include video tapes of the British Broadcasting Corporation's "Fawlty Towers" series, and also print and "books on tape" versions of science fiction, romance, and mystery novels. Many public libraries include sexually explicit materials in their print collection, such as The Joy of Sex and The Joy of Gay Sex. Very few public libraries, however, collect more graphic sexually explicit materials, such as XXX-rated videos, or Hustler magazine. The mission of public librarians is to provide their patrons with a wide array of information, and they surely do so. Reference librarians across America answer more than 7 million questions weekly. If a patron has a specialized need for information not available in the public library, the professional librarian will use a reference interview to find out what information is needed to help the user, including the purpose for which an item will be used. Reference librarians are trained to assist patrons without judging the patron's purpose in seeking information, or the content of the information that the patron is seeking. Many public libraries routinely provide patrons with access to materials not in their collections through the use of bibliographic access tools and interlibrary loan programs. Public libraries typically will assist patrons in obtaining access to all materials except those that are illegal, even if they do not collect those materials in their physical collection. In order to provide this access, a librarian may attempt to find material not included in the library's own collection in other libraries in the system, through interlibrary loan, or through a referral, perhaps to a government agency or a commercial bookstore. Interlibrary loan is expensive, however, and is therefore used infrequently. Public librarians also apply professional standards to their collection development practices. Public libraries generally make material selection decisions and frame policies governing collection development at the local level. Collection development is a key subject in the curricula of Masters of Library Science programs and is defined by certain practices. In general, professional standards guide public librarians to build, develop and create collections that have certain characteristics, such as balance in its coverage and requisite and appropriate quality. To this end, the goal of library collections is not universal coverage, but rather to find those materials that would be of the greatest direct benefit or interest to the community. In making selection decisions, librarians consider criteria including the content of the material, its accuracy, the title's niche in relation to the rest of the collection, the authority of the author, the publisher, the work's presentation, and how it compares with other material available in the same genre or on the same subject. In pursuing the goal of achieving a balanced collection that serves the needs and interests of their patrons, librarians generally have a fair amount of autonomy, but may also be guided by a library's collection development policy. These collection development policies are often drawn up in conjunction with the libraries' governing boards and with representatives from the community, and may be the result of public hearings, discussions and other input. Although many librarians use selection aids, such as review journals and bibliographies, as a guide to the quality of potential acquisitions, they do not generally delegate their selection decisions to parties outside of the public library or its governing body. One limited exception is the use of third- party vendors or approval plans to acquire print and video resources. In such arrangements, third-party vendors provide materials based on the library's description of its collection development criteria. The vendor sends materials to the library, and the library retains the materials that meet its collection development needs and returns the materials that do not. Even in this arrangement, however, the librarians still retain ultimate control over their collection development and review all of the materials that enter their library's collection. 2. The Internet in Public Libraries The vast majority of public libraries offer Internet access to their patrons. According to a recent report by the U.S. National Commission on Libraries and Information Science, approximately 95% of all public libraries provide public access to the Internet. John C. Bertot & Charles R. McClure, Public Libraries and the Internet 2000: Summary Findings and Data Tables, Report to National Commission on Libraries and Information Science, at 3. The Internet vastly expands the amount of information available to patrons of public libraries. The widespread availability of Internet access in public libraries is due, in part, to the availability of public funding, including state and local funding and the federal funding programs regulated by CIPA. Many libraries face a large amount of patron demand for their Internet services. At some libraries, patron demand for Internet access during a given day exceeds the supply of computer terminals with access to the Internet. These libraries use sign- in and time limit procedures and/or establish rules regarding the allowable uses of the terminals, in an effort to ration their computer resources. For example, some of the libraries whose librarians testified at trial prohibit the use of email and chat functions on their public Internet terminals. Public libraries play an important role in providing Internet access to citizens who would not otherwise possess it. Of the 143 million Americans using the Internet, approximately 10%, or 14.3 million people, access the Internet at a public library. Internet access at public libraries is more often used by those with lower incomes than those with higher incomes. About 20.3% of Internet users with household family income of less than $15,000 per year use public libraries for Internet access. Approximately 70% of libraries serving communities with poverty levels in excess of 40% receive E-rate discounts. 1. Internet Use Policies in Public Libraries Approximately 95% of libraries with public Internet access have some form of "acceptable use" policy or "Internet use" policy governing patrons' use of the Internet. These policies set forth the conditions under which patrons are permitted to access and use the library's Internet resources. These policies vary widely. Some of the less restrictive policies, like those held by Multnomah County Library and Fort Vancouver Regional Library, do not prohibit adult patrons from viewing sexually explicit materials on the Web, as long as they do so at terminals with privacy screens or recessed monitors, which are designed to prevent other patrons from seeing the material that they are viewing, and as long as it does not violate state or federal law to do so. Other libraries prohibit their patrons from viewing all "sexually explicit" or "sexually graphic" materials. Some libraries prohibit the viewing of materials that are not necessarily sexual, such as Web pages that are "harmful to minors," "offensive to the public," "objectionable," "racially offensive," or simply "inappropriate." Other libraries restrict access to Web sites that the library just does not want to provide, even though the sites are not necessarily offensive. For example, the Fulton County Public Library restricts access to the Web sites of dating services. Similarly, the Tacoma Public Library's policy does not allow patrons to use the library's Internet terminals for personal email, for online chat, or for playing games. In some cases, libraries instituted Internet use policies after having experienced specific problems, whereas in other cases, libraries developed detailed Internet use policies and regulatory measures (such as using filtering software) before ever offering public Internet access. Essentially four interests motivate libraries to institute Internet use policies and to apply the methods described above to regulate their patrons' use of the Internet. First, libraries have sought to protect patrons (especially children) and staff members from accidentally viewing sexually explicit images, or other Web pages containing content deemed harmful, that other patrons are viewing on the Internet. For example, some librarians who testified described situations in which patrons left sexually explicit images minimized on an Internet terminal so that the next patron would see them when they began using it, or in which patrons printed sexually explicit images from a Web site and left them at a public printer. Second, libraries have attempted to protect patrons from unwittingly or accidentally accessing Web pages that they do not wish to see while they are using the Internet. For example, the Memphis-Shelby County (Tennessee) Public Library's Internet use policy states that the library "employs filtering technology to reduce the possibility that customers may encounter objectionable content in the form of depictions of full nudity and sexual acts." Third, libraries have sought to keep patrons (again, especially children) from intentionally accessing sexually explicit materials or other materials that the library deems inappropriate. For example, a study of the Tacoma Public Library's Internet use logs for the year 2000 showed that users between the ages of 11 and 15 accounted for 41% of the filter blocks that occurred on library computers. The study, which we credit, concluded that children and young teens were actively seeking to access sexually explicit images in the library. The Greenville Library's Board of Directors was particularly concerned that patrons were accessing obscene materials in the public library in violation of South Carolina's obscenity statute. Finally, some libraries have regulated patrons' Internet use to attempt to control patrons' inappropriate (or illegal) behavior that is thought to stem from viewing Web pages that contain sexually explicit materials or content that is otherwise deemed unacceptable. We recognize the concerns that led several of the public libraries whose librarians and board members testified in this case to start using Internet filtering software. The testimony of the Chairman of the Board of the Greenville Public Library is illustrative. In December 1999, there was considerable local press coverage in Greenville concerning adult patrons who routinely used the library to surf the Web for pornography. In response to public outcry stemming from the newspaper report, the Board of Trustees held a special board meeting to obtain information and to communicate with the public concerning the library's provision of Internet access. At this meeting, the Board learned for the first time of complaints about children being exposed to pornography that was displayed on the library's Internet terminals. In late January to early February of 2000, the library installed privacy screens and recessed terminals in an effort to restrict the display of sexually explicit Web sites at the library. In February, 2000, the Board informed the library staff that they were expected to be familiar with the South Carolina obscenity statute and to enforce the policy prohibition on access to obscene materials, child pornography, or other materials prohibited under applicable local, state, and federal laws. Staff were told that they were to enforce the policy by means of a "tap on the shoulder." Prior to adopting its current Internet Use Policy, the Board adopted an "Addendum to Current Internet Use Policy." Under the policy, the Board temporarily instituted a two-hour time limit per day for Internet use; reduced substantially the number of computers with Internet access in the library; reconfigured the location of the computers so that librarians had visual contact with all Internet-accessible terminals; and removed the privacy screens from terminals with Internet access. Even after the Board implemented the privacy screens and later the "tap-on-the-shoulder" policy combined with placing terminals in view of librarians, the library experienced a high turnover rate among reference librarians who worked in view of Internet terminals. Finding that the policies that it had tried did not prevent the viewing of sexually explicit materials in the library, the Board at one point considered discontinuing Internet access in the library. The Board finally concluded that the methods that it had used to regulate Internet use were not sufficient to stem the behavioral problems that it thought were linked to the availability of pornographic materials in the library. As a result, it implemented a mandatory filtering policy. We note, however, that none of the libraries proffered by the defendants presented any systematic records or quantitative comparison of the amount of criminal or otherwise inappropriate behavior that occurred in their libraries before they began using Internet filtering software compared to the amount that happened after they installed the software. The plaintiffs' witnesses also testified that because public libraries are public places, incidents involving inappropriate behavior in libraries (sexual and otherwise) existed long before libraries provided access to the Internet. 2. Methods for Regulating Internet Use The methods that public libraries use to regulate Internet use vary greatly. They can be organized into four categories: (1) channeling patrons' Internet use; (2) separating patrons so that they will not see what other patrons are viewing; (3) placing Internet terminals in public view and having librarians observe patrons to make sure that they are complying with the library's Internet use policy; and (4) using Internet filtering software. The first category – channeling patrons' Internet use – frequently includes offering training to patrons on how to use the Internet, including how to access the information that they want and to avoid the materials that they do not want. Another technique that some public libraries use to direct their patrons to pages that the libraries have determined to be accurate and valuable is to establish links to "recommended Web sites" from the public library's home page (i.e., the page that appears when patrons begin a session at one of the library's public Internet terminals). Librarians select these recommended Web sites by using criteria similar to those employed in traditional collection development. However, unless the library determines otherwise, selection of these specific sites does not preclude patrons from attempting to access other Internet Web sites. Libraries may extend the "recommended Web sites" method further by limiting patrons' access to only those Web sites that are reviewed and selected by the library's staff. For example, in 1996, the Westerville, Ohio Library offered Internet access to children through a service called the "Library Channel." This service was intended to be a means by which the library could organize the Internet in some fashion for presentation to patrons. Through the Library Channel, the computers in the children's section of the library were restricted to 2,000 to 3,000 sites selected by librarians. After three years, Westerville stopped using the Library Channel system because it overly constrained the children's ability to access materials on the Internet, and because the library experienced several technical problems with the system. Public libraries also use several different techniques to separate patrons during Internet sessions so that they will not see what other patrons are viewing. The simplest way to achieve this result is to position the library's public Internet terminals so that they are located away from traffic patterns in the library (and from other terminals), for example, by placing them so that they face a wall. This method is obviously constrained by libraries' space limitations and physical layout. Some libraries have also installed privacy screens on their public Internet terminals. These screens make a monitor appear blank unless the viewer is looking at it head-on. Although the Multnomah and Fort Vancouver Libraries submitted records showing that they have received few complaints regarding patrons' unwilling exposure to materials on the Internet, privacy screens do not always prevent library patrons or employees from inadvertently seeing the materials that another patron is viewing when passing directly behind a terminal. They also have the drawback of making it difficult for patrons to work together at a single terminal, or for librarians to assist patrons at terminals, because it is difficult for two people to stand side by side and view a screen at the same time. Some library patrons also find privacy screens to be a hindrance and have attempted to remove them in order to improve the brightness of the screen or to make the view better. Another method that libraries use to prevent patrons from seeing what other patrons are viewing on their terminals is the installation of "recessed monitors." Recessed monitors are computer screens that sit below the level of a desk top and are viewed from above. Although recessed monitors, especially when combined with privacy screens, eliminate almost all of the possibility of a patron accidentally viewing the contents on another patron's screen, they suffer from the same drawbacks as privacy screens, that is, they make it difficult for patrons to work together or with a librarian at a single terminal. Some librarians also testified that recessed monitors are costly, but did not indicate how expensive they are compared to privacy screens or filtering software. A related technique that some public libraries use is to create a separate children's Internet viewing area, where no adults except those accompanying children in their care may use the Internet terminals. This serves the objective of keeping children from inadvertently viewing materials appropriate only for adults that adults may be viewing on nearby terminals. A third set of techniques that public libraries have used to enforce their Internet use policies takes the opposite tack from the privacy screens/recessed monitors approach by placing all of the library's public Internet terminals in prominent and visible locations, such as near the library's reference desk. This approach allows librarians to enforce their library's Internet use policy by observing what patrons are viewing and employing the tap-on-the-shoulder policy. Under this approach, when patrons are viewing materials that are inconsistent with the library's policies, a library staff member approaches them and asks them to view something else, or may ask them to end their Internet session. A patron who does not comply with these requests, or who repeatedly views materials not permitted under the library's Internet use policy, may have his or her Internet or library privileges suspended or revoked. But many librarians are uncomfortable with approaching patrons who are viewing sexually explicit images, finding confrontation unpleasant. Hence some libraries are reluctant to apply the tap-on-the- shoulder policy. The fourth category of methods that public libraries employ to enforce their Internet use policies, and the one that gives rise to this case, is the use of Internet filtering software. According to the June 2000 Survey of Internet Access Management in Public Libraries, approximately 7% of libraries with public Internet access had mandated the use of blocking programs by adult patrons. Some public libraries provide patrons with the option of using a blocking program, allowing patrons to decide whether to engage the program when they or their children access the Internet. Other public libraries require their child patrons to use filtering software, but not their adult patrons. Filtering software vendors sell their products on a subscription basis. The cost of a subscription varies with the number of computers on which the filtering software will be used. In 2001, the cost of the Cyber Patrol filtering software was $1,950 for 100 terminal licenses. The Greenville County Library System pays $2,500 per year for the N2H2 filtering software, and a subscription to the Websense filter costs Westerville Public Library approximately $1,200 per year. No evidence was presented on the cost of privacy screens, recessed monitors, and the tap-on-the-shoulder policy, relative to the costs of filtering software. Nor did any of the libraries proffered by the government present any quantitative evidence on the relative effectiveness of use of privacy screens to prevent patrons from being unwillingly exposed to sexually explicit material, and the use of filters, discussed below. No evidence was presented, for example, comparing the number of patron complaints in those libraries that have tried both methods. The librarians who testified at trial whose libraries use Internet filtering software all provide methods by which their patrons may ask the library to unblock specific Web sites or pages. Of these, only the Tacoma Public Library allows patrons to request that a URL be unblocked without providing any identifying information; Tacoma allows patrons to request a URL by sending an email from the Internet terminal that the patron is using that does not contain a return email address for the user. David Biek, the head librarian at the Tacoma Library's main branch, testified at trial that the library keeps records that would enable it to know which patrons made unblocking requests, but does not use that information to connect users with their requests. Biek also testified that he periodically scans the library's Internet use logs to search for: (1) URLs that were erroneously blocked, so that he may unblock them; or (2) URLs that should have been blocked, but were not, in order to add them to a blocked category list. In the course of scanning the use logs, Biek has also found what looked like attempts to access child pornography. In two cases, he communicated his findings to law enforcement and turned over the logs in response to a subpoena. At all events, it takes time for librarians to make decisions about whether to honor patrons' requests to unblock Web pages. In the libraries proffered by the defendants, unblocking decisions sometimes take between 24 hours and a week. Moreover, none of these libraries allows unrestricted access to the Internet pending a determination of the validity of a Web site blocked by the blocking programs. A few of the defendants' proffered libraries represented that individual librarians would have the discretion to allow a patron to have full Internet access on a staff computer upon request, but none claimed that allowing such access was mandatory, and patron access is supervised in every instance. None of these libraries makes differential unblocking decisions based on the patrons' age. Unblocking decisions are usually made identically for adults and minors. Unblocking decisions even for adults are usually based on suitability of the Web site for minors. It is apparent that many patrons are reluctant or unwilling to ask librarians to unblock Web pages or sites that contain only materials that might be deemed personal or embarrassing, even if they are not sexually explicit or pornographic. We credit the testimony of Emmalyn Rood, discussed above, that she would have been unwilling as a young teen to ask a librarian to disable filtering software so that she could view materials concerning gay and lesbian issues. We also credit the testimony of Mark Brown, who stated that he would have been too embarrassed to ask a librarian to disable filtering software if it had impeded his ability to research treatments and cosmetic surgery options for his mother when she was diagnosed with breast cancer. The pattern of patron requests to unblock specific URLs in the various libraries involved in this case also confirms our finding that patrons are largely unwilling to make unblocking requests unless they are permitted to do so anonymously. For example, the Fulton County Library receives only about 6 unblocking requests each year, the Greenville Public Library has received only 28 unblocking requests since August 21, 2000, and the Westerville, Ohio Library has received fewer than 10 unblocking requests since 1999. In light of the fact that a substantial amount of overblocking occurs in these very libraries, see infra Subsection II.E.4, we find that the lack of unblocking requests in these libraries does not reflect the effectiveness of the filters, but rather reflects patrons' reluctance to ask librarians to unblock sites. 5. Internet Filtering Technology 1. What Is Filtering Software, Who Makes It, and What Does It Do? Commercially available products that can be configured to block or filter access to certain material on the Internet are among the "technology protection measures" that may be used to attempt to comply with CIPA. There are numerous filtering software products available commercially. Three network-based filtering products – SurfControl's Cyber Patrol, N2H2's Bess/i2100, and Secure Computing's SmartFilter – currently have the lion's share of the public library market. The parties in this case deposed representatives from these three companies. Websense, another network-based blocking product, is also currently used in the public library market, and was discussed at trial. Filtering software may be installed either on an individual computer or on a computer network. Network-based filtering software products are designed for use on a network of computers and funnel requests for Internet content through a centralized network device. Of the various commercially available blocking products, network-based products are the ones generally marketed to institutions, such as public libraries, that provide Internet access through multiple terminals. Filtering programs function in a fairly simple way. When an Internet user requests access to a certain Web site or page, either by entering a domain name or IP address into a Web browser, or by clicking on a link, the filtering software checks that domain name or IP address against a previously compiled "control list" that may contain up to hundreds of thousands of URLs. The three companies deposed in this case have control lists containing between 200,000 and 600,000 URLs. These lists determine which URLs will be blocked. Filtering software companies divide their control lists into multiple categories for which they have created unique definitions. SurfControl uses 40 such categories, N2H2 uses 35 categories (and seven "exception" categories), Websense uses 30 categories, and Secure Computing uses 30 categories. Filtering software customers choose which categories of URLs they wish to enable. A user "enables" a category in a filtering program by configuring the program to block all of the Web pages listed in that category. The following is a list of the categories offered by each of these four filtering programs. SurfControl's Cyber Patrol offers the following categories: Adult/Sexually Explicit; Advertisements; Arts & Entertainment; Chat; Computing & Internet; Criminal Skills; Drugs, Alcohol & Tobacco; Education; Finance & Investment; Food & Drink; Gambling; Games; Glamour & Intimate Apparel; Government & Politics; Hacking; Hate Speech; Health & Medicine; Hobbies & Recreation; Hosting Sites; Job Search & Career Development; Kids' Sites; Lifestyle & Culture; Motor Vehicles; News; Personals & Dating; Photo Searches; Real Estate; Reference; Religion; Remote Proxies; Sex Education; Search Engines; Shopping; Sports; Streaming Media; Travel; Usenet News; Violence; Weapons; and Web-based Email. N2H2 offers the following categories: Adults Only; Alcohol; Auction; Chat; Drugs; Electronic Commerce; Employment Search; Free Mail; Free Pages; Gambling; Games; Hate/Discrimination; Illegal; Jokes; Lingerie; Message/Bulletin Boards; Murder/Suicide; News; Nudity; Personal Information; Personals; Pornography; Profanity; Recreation/Entertainment; School Cheating Information; Search Engines; Search Terms; Sex; Sports; Stocks; Swimsuits; Tasteless/Gross; Tobacco; Violence; and Weapons. The "Nudity" category purports to block only "non-pornographic" images. The "Sex" category is intended to block only those depictions of sexual activity that are not intended to arouse. The "Tasteless/Gross" category includes contents such as "tasteless humor" and "graphic medical or accident scene photos." Additionally, N2H2 offers seven "exception categories." These exception categories include Education, Filtered Search Engine, For Kids, History, Medical, Moderated, and Text/Spoken Only. When an exception category is enabled, access to any Web site or page via a URL associated with both a category and an exception, for example, both "Sex" and "Education," will be allowed, even if the customer has enabled the product to otherwise block the category "Sex." As of November 15, 2001, of those Web sites categorized by N2H2 as "Sex," 3.6% were also categorized as "Education," 2.9% as "Medical," and 1.6% as "History." Websense offers the following categories: Abortion Advocacy; Advocacy Groups; Adult Material; Business & Economy; Drugs; Education; Entertainment; Gambling; Games; Government; Health; Illegal/Questionable; Information Technology; Internet Communication; Job Search; Militancy/Extremist; News & Media; Productivity Management; Bandwidth Management; Racism/Hate; Religion; Shopping; Society & Lifestyle; Special Events; Sports; Tasteless; Travel; Vehicles; Violence; and Weapons. The "Adult" category includes "full or partial nudity of individuals," as well as sites offering "light adult humor and literature" and "[s]exually explicit language." The "Sexuality/Pornography" category includes, inter alia, "hard-core adult humor and literature" and "[s]exually explicit language." The "Tasteless" category includes "hard-to-stomach sites, including offensive, worthless or useless sites, grotesque or lurid depictions of bodily harm." The "Hacking" category blocks "sites providing information on or promoting illegal or questionable access to or use of communications equipment and/or software." SmartFilter offers the following categories: Anonymizers/Translators; Art & Culture; Chat; Criminal Skills; Cults/Occult; Dating; Drugs; Entertainment; Extreme/Obscene/Violence; Gambling; Games; General News; Hate Speech; Humor; Investing; Job Search; Lifestyle; Mature; MP3 Sites; Nudity; On-line Sales; Personal Pages; Politics, Opinion & Religion; Portal Sites; Self-Help/Health; Sex; Sports; Travel; Usenet News; and Webmail. Most importantly, no category definition used by filtering software companies is identical to CIPA's definitions of visual depictions that are obscene, child pornography, or harmful to minors. And category definitions and categorization decisions are made without reference to local community standards. Moreover, there is no judicial involvement in the creation of filtering software companies' category definitions and no judicial determination is made before these companies categorize a Web page or site. Each filtering software company associates each URL in its control list with a "tag" or other identifier that indicates the company's evaluation of whether the content or features of the Web site or page accessed via that URL meets one or more of its category definitions. If a user attempts to access a Web site or page that is blocked by the filter, the user is immediately presented with a screen that indicates that a block has occurred as a result of the operation of the filtering software. These "denial screens" appear only at the point that a user attempts to access a site or page in an enabled category. All four of the filtering programs on which evidence was presented allow users to customize the category lists that exist on their own PCs or servers by adding or removing specific URLs. For example, if a public librarian charged with administering a library's Internet terminals comes across a Web site that he or she finds objectionable that is not blocked by the filtering program that his or her library is using, then the librarian may add that URL to a category list that exists only on the library's network, and it would thereafter be blocked under that category. Similarly, a customer may remove individual URLs from category lists. Importantly, however, no one but the filtering companies has access to the complete list of URLs in any category. The actual URLs or IP addresses of the Web sites or pages contained in filtering software vendors' category lists are considered to be proprietary information, and are unavailable for review by customers or the general public, including the proprietors of Web sites that are blocked by filtering software. Filtering software companies do not generally notify the proprietors of Web sites when they block their sites. The only way to discover which URLs are blocked and which are not blocked by any particular filtering company is by testing individual URLs with filtering software, or by entering URLs one by one into the "URL checker" that most filtering software companies provide on their Web sites. Filtering software companies will entertain requests for recategorization from proprietors of Web sites that discover their sites are blocked. Because new pages are constantly being added to the Web, filtering companies provide their customers with periodic updates of category lists. Once a particular Web page or site is categorized, however, filtering companies generally do not re-review the contents of that page or site unless they receive a request to do so, even though the content on individual Web pages and sites changes frequently. 2. The Methods that Filtering Companies Use to Compile Category Lists While the way in which filtering programs operate is conceptually straightforward – by comparing a requested URL to a previously compiled list of URLs and blocking access to the content at that URL if it appears on the list – accurately compiling and categorizing URLs to form the category lists is a more complex process that is impossible to conduct with any high degree of accuracy. The specific methods that filtering software companies use to compile and categorize control lists are, like the lists themselves, proprietary information. We will therefore set forth only general information on the various types of methods that all filtering companies deposed in this case use, and the sources of error that are at once inherent in those methods and unavoidable given the current architecture of the Internet and the current state of the art in automated classification systems. We base our understanding of these methods largely on the detailed testimony and expert report of Dr. Geoffrey Nunberg, which we credit. The plaintiffs offered, and the Court qualified, Nunberg as an expert witness on automated classification systems. When compiling and categorizing URLs for their category lists, filtering software companies go through two distinct phases. First, they must collect or "harvest" the relevant URLs from the vast number of sites that exist on the Web. Second, they must sort through the URLs they have collected to determine under which of the company's self-defined categories (if any), they should be classified. These tasks necessarily result in a tradeoff between overblocking (i.e., the blocking of content that does not meet the category definitions established by CIPA or by the filtering software companies), and underblocking (i.e., leaving off of a control list a URL that contains content that would meet the category definitions defined by CIPA or the filtering software companies). 1. The "Harvesting" Phase Filtering software companies, given their limited resources, do not attempt to index or classify all of the billions of pages that exist on the Web. Instead, the set of pages that they attempt to examine and classify is restricted to a small portion of the Web. The companies use a variety of automated and manual methods to identify a universe of Web sites and pages to "harvest" for classification. These methods include: entering certain key words into search engines; following links from a variety of online directories (e.g., generalized directories like Yahoo or various specialized directories, such as those that provide links to sexually explicit content); reviewing lists of newly-registered domain names; buying or licensing lists of URLs from third parties; "mining" access logs maintained by their customers; and reviewing other submissions from customers and the public. The goal of each of these methods is to identify as many URLs as possible that are likely to contain content that falls within the filtering companies' category definitions. The first method, entering certain keywords into commercial search engines, suffers from several limitations. First, the Web pages that may be "harvested" through this method are limited to those pages that search engines have already identified. However, as noted above, a substantial portion of the Web is not even theoretically indexable (because it is not linked to by any previously known page), and only approximately 50% of the pages that are theoretically indexable have actually been indexed by search engines. We are satisfied that the remainder of the indexable Web, and the vast "Deep Web," which cannot currently be indexed, includes materials that meet CIPA's categories of visual depictions that are obscene, child pornography, and harmful to minors. These portions of the Web cannot presently be harvested through the methods that filtering software companies use (except through reporting by customers or by observing users' log files), because they are not linked to other known pages. A user can, however, gain access to a Web site in the unindexed Web or the Deep Web if the Web site's proprietor or some other third party informs the user of the site's URL. Some Web sites, for example, send out mass email advertisements containing the site's URL, the spamming process we have described above. Second, the search engines that software companies use for harvesting are able to search text only, not images. This is of critical importance, because CIPA, by its own terms, covers only "visual depictions." 20 U.S.C. Sec. 9134(f)(1)(A)(i); 47 U.S.C. Sec. 254(h)(5)(B)(i). Image recognition technology is immature, ineffective, and unlikely to improve substantially in the near future. None of the filtering software companies deposed in this case employs image recognition technology when harvesting or categorizing URLs. Due to the reliance on automated text analysis and the absence of image recognition technology, a Web page with sexually explicit images and no text cannot be harvested using a search engine. This problem is complicated by the fact that Web site publishers may use image files rather than text to represent words, i.e., they may use a file that computers understand to be a picture, like a photograph of a printed word, rather than regular text, making automated review of their textual content impossible. For example, if the Playboy Web site displays its name using a logo rather than regular text, a search engine would not see or recognize the Playboy name in that logo. In addition to collecting URLs through search engines and Web directories (particularly those specializing in sexually explicit sites or other categories relevant to one of the filtering companies' category definitions), and by mining user logs and collecting URLs submitted by users, the filtering companies expand their list of harvested URLs by using "spidering" software that can "crawl" the lists of pages produced by the previous four methods, following their links downward to bring back the pages to which they link (and the pages to which those pages link, and so on, but usually down only a few levels). This spidering software uses the same type of technology that commercial Web search engines use. While useful in expanding the number of relevant URLs, the ability to retrieve additional pages through this approach is limited by the architectural feature of the Web that page-to-page links tend to converge rather than diverge. That means that the more pages from which one spiders downward through links, the smaller the proportion of new sites one will uncover; if spidering the links of 1000 sites retrieved through a search engine or Web directory turns up 500 additional distinct adult sites, spidering an additional 1000 sites may turn up, for example, only 250 additional distinct sites, and the proportion of new sites uncovered will continue to diminish as more pages are spidered. These limitations on the technology used to harvest a set of URLs for review will necessarily lead to substantial underblocking of material with respect to both the category definitions employed by filtering software companies and CIPA's definitions of visual depictions that are obscene, child pornography, or harmful to minors. 2. The "Winnowing" or Categorization Phase Once the URLs have been harvested, some filtering software companies use automated key word analysis tools to evaluate the content and/or features of Web sites or pages accessed via a particular URL and to tentatively prioritize or categorize them. This process may be characterized as "winnowing" the harvested URLs. Automated systems currently used by filtering software vendors to prioritize, and to categorize or tentatively categorize the content and/or features of a Web site or page accessed via a particular URL operate by means of (1) simple key word searching, and (2) the use of statistical algorithms that rely on the frequency and structure of various linguistic features in a Web page's text. The automated systems used to categorize pages do not include image recognition technology. All of the filtering companies deposed in the case also employ human review of some or all collected Web pages at some point during the process of categorizing Web pages. As with the harvesting process, each technique employed in the winnowing process is subject to limitations that can result in both overblocking and underblocking. First, simple key-word-based filters are subject to the obvious limitation that no string of words can identify all sites that contain sexually explicit content, and most strings of words are likely to appear in Web sites that are not properly classified as containing sexually explicit content. As noted above, filtering software companies also use more sophisticated automated classification systems for the statistical classification of texts. These systems assign weights to words or other textual features and use algorithms to determine whether a text belongs to a certain category. These algorithms sometimes make reference to the position of a word within a text or its relative proximity to other words. The weights are usually determined by machine learning methods (often described as "artificial intelligence"). In this procedure, which resembles an automated form of trial and error, a system is given a "training set" consisting of documents preclassified into two or more groups, along with a set of features that might be potentially useful in classifying the sets. The system then "learns" rules that assign weights to those features according to how well they work in classification, and assigns each new document to a category with a certain probability. Notwithstanding their "artificial intelligence" description, automated text classification systems are unable to grasp many distinctions between types of content that would be obvious to a human. And of critical importance, no presently conceivable technology can make the judgments necessary to determine whether a visual depiction fits the legal definitions of obscenity, child pornography, or harmful to minors. Finally, all the filtering software companies deposed in this case use some form of human review in their process of winnowing and categorizing Web pages, although one company admitted to categorizing some Web pages without any human review. SmartFilter states that "the final categorization of every Web site is done by a human reviewer." Another filtering company asserts that of the 10,000 to 30,000 Web pages that enter the "work queue" to be categorized each day, two to three percent of those are automatically categorized by their PornByRef system (which only applies to materials classified in the pornography category), and the remainder are categorized by human review. SurfControl also states that no URL is ever added to its database without human review. Human review of Web pages has the advantage of allowing more nuanced, if not more accurate, interpretations than automated classification systems are capable of making, but suffers from its own sources of error. The filtering software companies involved here have limited staff, of between eight and a few dozen people, available for hand reviewing Web pages. The reviewers that are employed by these companies base their categorization decisions on both the text and the visual depictions that appear on the sites or pages they are assigned to review. Human reviewers generally focus on English language Web sites, and are generally not required to be multi-lingual. Given the speed at which human reviewers must work to keep up with even a fraction of the approximately 1.5 million pages added to the publicly indexable Web each day, human error is inevitable. Errors are likely to result from boredom or lack of attentiveness, overzealousness, or a desire to "err on the side of caution" by screening out material that might be offensive to some customers, even if it does not fit within any of the company's category definitions. None of the filtering companies trains its reviewers in the legal definitions concerning what is obscene, child pornography, or harmful to minors, and none instructs reviewers to take community standards into account when making categorization decisions. Perhaps because of limitations on the number of human reviewers and because of the large number of new pages that are added to the Web every day, filtering companies also widely engage in the practice of categorizing entire Web sites at the "root URL," rather than engaging in a more fine-grained analysis of the individual pages within a Web site. For example, the filtering software companies deposed in this case all categorize the entire Playboy Web site as Adult, Sexually Explicit, or Pornography. They do not differentiate between pages within the site containing sexually explicit images or text, and for example, pages containing no sexually explicit content, such as the text of interviews of celebrities or politicians. If the "root" or "top-level" URL of a Web site is given a category tag, then access to all content on that Web site will be blocked if the assigned category is enabled by a customer. In some cases, whole Web sites are blocked because the filtering companies focus only on the content of the home page that is accessed by entering the root URL. Entire Web sites containing multiple Web pages are commonly categorized without human review of each individual page on that site. Web sites that may contain multiple Web pages and that require authentication or payment for access are commonly categorized based solely on a human reviewer's evaluation of the pages that may be viewed prior to reaching the authentication or payment page. Because there may be hundreds or thousands of pages under a root URL, filtering companies make it their primary mission to categorize the root URL, and categorize subsidiary pages if the need arises or if there is time. This form of overblocking is called "inheritance," because lower-level pages inherit the categorization of the root URL without regard to their specific content. In some cases, "reverse inheritance" also occurs, i.e., parent sites inherit the classification of pages in a lower level of the site. This might happen when pages with sexual content appear in a Web site that is devoted primarily to non-sexual content. For example, N2H2's Bess filtering product classifies every page in the Salon.com Web site, which contains a wide range of news and cultural commentary, as "Sex, Profanity," based on the fact that the site includes a regular column that deals with sexual issues. Blocking by both domain name and IP address is another practice in which filtering companies engage that is a function both of the architecture of the Web and of the exigencies of dealing with the rapidly expanding number of Web pages. The category lists maintained by filtering software companies can include URLs in either their human-readable domain name address form, their numeric IP address form, or both. Through "virtual hosting" services, hundreds of thousands of Web sites with distinct domain names may share a single numeric IP address. To the extent that filtering companies block the IP addresses of virtual hosting services, they will necessarily block a substantial amount of content without reviewing it, and will likely overblock a substantial amount of content. Another technique that filtering companies use in order to deal with a structural feature of the Internet is blocking the root level URLs of so-called "loophole" Web sites. These are Web sites that provide access to a particular Web page, but display in the user's browser a URL that is different from the URL with which the particular page is usually associated. Because of this feature, they provide a "loophole" that can be used to get around filtering software, i.e., they display a URL that is different from the one that appears on the filtering company's control list. "Loophole" Web sites include caches of Web pages that have been removed from their original location, "anonymizer" sites, and translation sites. Caches are archived copies that some search engines, such as Google, keep of the Web pages they index. The cached copy stored by Google will have a URL that is different from the original URL. Because Web sites often change rapidly, caches are the only way to access pages that have been taken down, revised, or have changed their URLs for some reason. For example, a magazine might place its current stories under a given URL, and replace them monthly with new stories. If a user wanted to find an article published six months ago, he or she would be unable to access it if not for Google's cached version. Some sites on the Web serve as a proxy or intermediary between a user and another Web page. When using a proxy server, a user does not access the page from its original URL, but rather from the URL of the proxy server. One type of proxy service is an "anonymizer." Users may access Web sites indirectly via an anonymizer when they do not want the Web site they are visiting to be able to determine the IP address from which they are accessing the site, or to leave "cookies" on their browser. Some proxy servers can be used to attempt to translate Web page content from one language to another. Rather than directly accessing the original Web page in its original language, users can instead indirectly access the page via a proxy server offering translation features. As noted above, filtering companies often block loophole sites, such as caches, anonymizers, and translation sites. The practice of blocking loophole sites necessarily results in a significant amount of overblocking, because the vast majority of the pages that are cached, for example, do not contain content that would match a filtering company's category definitions. Filters that do not block these loophole sites, however, may enable users to access any URL on the Web via the loophole site, thus resulting in substantial underblocking. 3. The Process for "Re-Reviewing" Web Pages After Their Initial Categorization Most filtering software companies do not engage in subsequent reviews of categorized sites or pages on a scheduled basis. Priority is placed on reviewing and categorizing new sites and pages, rather than on re-reviewing already categorized sites and pages. Typically, a filtering software vendor's previous categorization of a Web site is not re-reviewed for accuracy when new pages are added to the Web site. To the extent the Web site was previously categorized as a whole, the new pages added to the site usually share the categorization assigned by the blocking product vendor. This necessarily results in both over- and underblocking, because, as noted above, the content of Web pages and Web sites changes relatively rapidly. In addition to the content on Web sites or pages changing rapidly, Web sites themselves may disappear and be replaced by sites with entirely different content. If an IP address associated with a particular Web site is blocked under a particular category and the Web site goes out of existence, then the IP address likely would be reassigned to a different Web site, either by an Internet service provider or by a registration organization, such as the American Registry for Internet Numbers, see http://www.arin.net. In that case, the site that received the reassigned IP address would likely be miscategorized. Because filtering companies do not engage in systematic re-review of their category lists, such a site would likely remain miscategorized unless someone submitted it to the filtering company for re-review, increasing the incidence of over- and underblocking. This failure to re-review Web pages primarily increases a filtering company's rate of overblocking. However, if a filtering company does not re-review Web pages after it determines that they do not fall into any of its blocking categories, then that would result in underblocking (because, for example, a page might add sexually explicit content). 3. The Inherent Tradeoff Between Overblocking and Underblocking There is an inherent tradeoff between any filter's rate of overblocking (which information scientists also call "precision") and its rate of underblocking (which is also referred to as "recall"). The rate of overblocking or precision is measured by the proportion of the things a classification system assigns to a certain category that are appropriately classified. The plaintiffs' expert, Dr. Nunberg, provided the hypothetical example of a classification system that is asked to pick out pictures of dogs from a database consisting of 1000 pictures of animals, of which 80 were actually dogs. If it returned 100 hits, of which 80 were in fact pictures of dogs, and the remaining 20 were pictures of cats, horses, and deer, we would say that the system identified dog pictures with a precision of 80%. This would be analogous to a filter that overblocked at a rate of 20%. The recall measure involves determining what proportion of the actual members of a category the classification system has been able to identify. For example, if the hypothetical animal- picture database contained a total of 200 pictures of dogs, and the system identified 80 of them and failed to identify 120, it would have performed with a recall of 40%. This would be analogous to a filter that underblocked 60% of the material in a category. In automated classification systems, there is always a tradeoff between precision and recall. In the animal-picture example, the recall could be improved by using a looser set of criteria to identify the dog pictures in the set, such as any animal with four legs, and all the dogs would be identified, but cats and other animals would also be included, with a resulting loss of precision. The same tradeoff exists between rates of overblocking and underblocking in filtering systems that use automated classification systems. For example, an automated system that classifies any Web page that contains the word "sex" as sexually explicit will underblock much less, but overblock much more, than a system that classifies any Web page containing the phrase "free pictures of people having sex" as sexually explicit. This tradeoff between overblocking and underblocking also applies not just to automated classification systems, but also to filters that use only human review. Given the approximately two billion pages that exist on the Web, the 1.5 million new pages that are added daily, and the rate at which content on existing pages changes, if a filtering company blocks only those Web pages that have been reviewed by humans, it will be impossible, as a practical matter, to avoid vast amounts of underblocking. Techniques used by human reviewers such as blocking at the IP address level, domain name level, or directory level reduce the rates of underblocking, but necessarily increase the rates of overblocking, as discussed above. To use a simple example, it would be easy to design a filter intended to block sexually explicit speech that completely avoids overblocking. Such a filter would have only a single sexually explicit Web site on its control list, which could be re-reviewed daily to ensure that its content does not change. While there would be no overblocking problem with such a filter, such a filter would have a severe underblocking problem, as it would fail to block all the sexually explicit speech on the Web other than the one site on its control list. Similarly, it would also be easy to design a filter intended to block sexually explicit speech that completely avoids underblocking. Such a filter would operate by permitting users to view only a single Web site, e.g., the Sesame Street Web site. While there would be no underblocking problem with such a filter, it would have a severe overblocking problem, as it would block access to millions of non-sexually explicit sites on the Web other than the Sesame Street site. While it is thus quite simple to design a filter that does not overblock, and equally simple to design a filter that does not underblock, it is currently impossible, given the Internet's size, rate of growth, rate of change, and architecture, and given the state of the art of automated classification systems, to develop a filter that neither underblocks nor overblocks a substantial amount of speech. The more effective a filter is at blocking Web sites in a given category, the more the filter will necessarily overblock. Any filter that is reasonably effective in preventing users from accessing sexually explicit content on the Web will necessarily block substantial amounts of non- sexually explicit speech. 4. Attempts to Quantify Filtering Programs' Rates of Over- and Underblocking The government presented three studies, two from expert witnesses, and one from a librarian fact witness who conducted a study using Internet use logs from his own library, that attempt to quantify the over- and underblocking rates of five different filtering programs. The plaintiffs presented one expert witness who attempted to quantify the rates of over- and underblocking for various programs. Each of these attempts to quantify rates of over- and underblocking suffers from various methodological flaws. The fundamental problem with calculating over- and underblocking rates is selecting a universe of Web sites or Web pages to serve as the set to be tested. The studies that the parties submitted in this case took two different approaches to this problem. Two of the studies, one prepared by the plaintiffs' expert witness Chris Hunter, a graduate student at the University of Pennsylvania, and the other prepared by the defendants' expert, Chris Lemmons of eTesting Laboratories, in Research Triangle Park, North Carolina, approached this problem by compiling two separate lists of Web sites, one of URLs that they deemed should be blocked according to the filters' criteria, and another of URLs that they deemed should not be blocked according to the filters' criteria. They compiled these lists by choosing Web sites from the results of certain key word searches. The problem with this selection method is that it is neither random, nor does it necessarily approximate the universe of Web pages that library patrons visit. The two other studies, one by David Biek, head librarian at the Tacoma Public Library's main branch, and one by Cory Finnell of Certus Consulting Group, of Seattle, Washington, chose actual logs of Web pages visited by library patrons during specific time periods as the universe of Web pages to analyze. This method, while surely not as accurate as a truly random sample of the indexed Web would be (assuming it would be possible to take such a sample), has the virtue of using the actual Web sites that library patrons visited during a specific period. Because library patrons selected the universe of Web sites that Biek and Finnell's studies analyzed, this removes the possibility of bias resulting from the study author's selection of the universe of sites to be reviewed. We find that the Lemmons and Hunter studies are of little probative value because of the methodology used to select the sample universe of Web sites to be tested. We will therefore focus on the studies conducted by Finnell and Biek in trying to ascertain estimates of the rates of over- and underblocking that takes place when filters are used in public libraries. The government hired expert witness Cory Finnell to study the Internet logs compiled by the public libraries systems in Tacoma, Washington; Westerville, Ohio; and Greenville, South Carolina. Each of these libraries uses filtering software that keeps a log of information about individual Web site requests made by library patrons. Finnell, whose consulting firm specializes in data analysis, has substantial experience evaluating Internet access logs generated on networked systems. He spent more than a year developing a reporting tool for N2H2, and, in the course of that work, acquired a familiarity with the design and operation of Internet filtering products. The Tacoma library uses Cyber Patrol filtering software, and logs information only on sites that were blocked. Finnell worked from a list of all sites that were blocked in the Tacoma public library in the month of August 2001. The Westerville library uses the Websense filtering product, and logs information on both blocked sites and non-blocked sites. When the logs reach a certain size, they are overwritten by new usage logs. Because of this overwriting feature, logs were available to Finnell only for the relatively short period from October 1, 2001 to October 3, 2001. The Greenville library uses N2H2's filtering product and logs both blocked sites and sites that patrons accessed. The logs contain more than 500,000 records per day. Because of the volume of the records, Finnell restricted his analysis to the period from August 2, 2001 to August 15, 2001. Finnell calculated an overblocking rate for each of the three libraries by examining the host Web site containing each of the blocked pages. He did not employ a sampling technique, but instead examined each blocked Web site. If the contents of a host Web site or the pages within the Web site were consistent with the filtering product's definition of the category under which the site was blocked, Finnell considered it to be an accurate block. Finnell and three others, two of whom were temporary employees, examined the Web sites to determine whether they were consistent with the filtering companies' category definitions. Their review was, of course, necessarily limited by: (1) the clarity of the filtering companies' category definitions; (2) Finnell's and his employees' interpretations of the definitions; and (3) human error. The study's reliability is also undercut by the fact that Finnell failed to archive the blocked Web pages as they existed either at the point that a patron in one of the three libraries was denied access or when Finnell and his team reviewed the pages. It is therefore impossible for anyone to check the accuracy and consistency of Finnell's review team, or to know whether the pages contained the same content when the block occurred as they did when Finnell's team reviewed them. This is a key flaw, because the results of the study depend on individual determinations as to overblocking and underblocking, in which Finnell and his team were required to compare what they saw on the Web pages that they reviewed with standard definitions provided by the filtering company. Tacoma library's Cyber Patrol software blocked 836 unique Web sites during the month of August. Finnell determined that 783 of those blocks were accurate and that 53 were inaccurate. The error rate for Cyber Patrol was therefore estimated to be 6.34%, and the true error rate was estimated with 95% confidence to lie within the range of 4.69% to 7.99%. Finnell and his team reviewed 185 unique Web sites that were blocked by Westerville Library's Websense filter during the logged period and determined that 158 of them were accurate and that 27 of them were inaccurate. He therefore estimated the Websense filter's overblocking rate at 14.59% with a 95% confidence interval of 9.51% to 19.68%. Additionally, Finnell examined 1,674 unique Web sites that were blocked by the Greenville Library's N2H2 filter during the relevant period and determined that 1,520 were accurate and that 87 were inaccurate. This yields an estimated overblocking rate of 5.41% and a 95% confidence interval of 4.33% to 6.55%. Finnell's methodology was materially flawed in that it understates the rate of overblocking for the following reasons. First, patrons from the three libraries knew that the filters were operating, and may have been deterred from attempting to access Web sites that they perceived to be "borderline" sites, i.e., those that may or may not have been appropriately filtered according to the filtering companies' category definitions. Second, in their cross-examination of Finnell, the plaintiffs offered screen shots of a number of Web sites that, according to Finnell, had been appropriately blocked, but that Finnell admitted contained only benign materials. Finnell's explanation was that the Web sites must have changed between the time when he conducted the study and the time of the trial, but because he did not archive the images as they existed when his team reviewed them for the study, there is no way to verify this. Third, because of the way in which Finnell counted blocked Web sites – i.e., if separate patrons attempted to reach the same Web site, or one or more patrons attempted to access more than one page on a single Web site, Finnell counted these attempts as a single block, see supra note 10 – his results necessarily understate the number of times that patrons were erroneously denied access to information. At all events, there is no doubt that Finnell's estimated rates of overblocking, which are based on the filtering companies' own category definitions, significantly understate the rate of overblocking with respect to CIPA's category definitions for filtering for adults. The filters used in the Tacoma, Westerville, and Greenville libraries were configured to block, among other things, images of full nudity and sexually explicit materials. There is no dispute, however, that these categories are far broader than CIPA's categories of visual depictions that are obscene, or child pornography, the two categories of material that libraries subject to CIPA must certify that they filter during adults' use of the Internet. Finnell's study also calculated underblocking rates with respect to the Westerville and Greenville Libraries (both of which logged not only their blocked sites, but all sites visited by their patrons), by taking random samples of URLs from the list of sites that were not blocked. The study used a sample of 159 sites that were accessed by Westerville patrons and determined that only one of them should have been blocked under the software's category definitions, yielding an underblocking rate of 0.6%. Given the size of the sample, the 95% confidence interval is 0% to 1.86%. The study examined a sample of 254 Web sites accessed by patrons in Greenville and found that three of them should have been blocked under the filtering software's category definitions. This results in an estimated underblocking rate of 1.2% with a 95% confidence interval ranging from 0% to 2.51%. We do not credit Finnell's estimates of the rates of underblocking in the Westerville and Greenville public libraries for several reasons. First, Finnell's estimates likely understate the actual rate of underblocking because patrons, who knew that filtering programs were operating in the Greenville and Westerville Libraries, may have refrained from attempting to access sites with sexually explicit materials, or other contents that they knew would probably meet a filtering program's blocked categories. Second, and most importantly, we think that the formula that Finnell used to calculate the rate of underblocking in these two libraries is not as meaningful as the formula that information scientists typically use to calculate a rate of recall, which we describe above in Subsection II.E.3. As Dr. Nunberg explained, the standard method that information scientists use to calculate a rate of recall is to sort a set of items into two groups, those that fall into a particular category (e.g., those that should have been blocked by a filter) and those that do not. The rate of recall is then calculated by dividing the number of items that the system correctly identified as belonging to the category by the total number of items in the category. In the example above, we discussed a database that contained 1000 photographs. Assume that 200 of these photographs were pictures of dogs. If, for example, a classification system designed to identify pictures of dogs identified 80 of the dog pictures and failed to identify 120, it would have performed with a recall rate of 40%. This would be analogous to a filter that underblocked at a rate of 60%. To calculate the recall rate of the filters in the Westerville and Greenville public libraries in accordance with the standard method described above, Finnell should have taken a sample of sites from the libraries' Internet use logs (including both sites that were blocked and sites that were not), and divided the number of sites in the sample that the filter incorrectly failed to block by the total number of sites in the sample that should have been blocked. What Finnell did instead was to take a sample of sites that were not blocked, and divide the total number of sites in this sample by the number of sites in the sample that should have been blocked. This made the denominator that Finnell used much larger than it would have been had he used the standard method for calculating recall, consequently making the underblocking rate that he calculated much lower than it would have been under the standard method. Moreover, despite the relatively low rates of underblocking that Finnell's study found, librarians from several of the libraries proffered by defendants that use blocking products, including Greenville, Tacoma, and Westerville, testified that there are instances of underblocking in their libraries. No quantitative evidence was presented comparing the effectiveness of filters and other alternative methods used by libraries to prevent patrons from accessing visual depictions that are obscene, child pornography, or in the case of minors, harmful to minors. Biek undertook a similar study of the overblocking rates that result from the Tacoma Library's use of the Cyber Patrol software. He began with the 3,733 individual blocks that occurred in the Tacoma Library in October 2000 and drew from this data set a random sample of 786 URLs. He calculated two rates of overblocking, one with respect to the Tacoma Library's policy on Internet use – that the pictorial content of the site may not include "graphic materials depicting full nudity and sexual acts which are portrayed obviously and exclusively for sensational or pornographic purposes" – and the other with respect to Cyber Patrol's own category definitions. He estimated that Cyber Patrol overblocked 4% of all Web pages in October 2000 with respect to the definitions of the Tacoma Library's Internet Policy and 2% of all pages with respect to Cyber Patrol's own category definitions. It is difficult to determine how reliable Biek's conclusions are, because he did not keep records of the raw data that he used in his study; nor did he archive images of the Web pages as they looked when he made the determination whether they were properly classified by the Cyber Patrol program. Without this information, it is impossible to verify his conclusions (or to undermine them). And Biek's study certainly understates Cyber Patrol's overblocking rate for some of the same reasons that Finnell's study likely understates the true rates of overblocking used in the libraries that he studied. We also note that Finnell's study, which analyzed a set of Internet logs from the Tacoma Library during which the same filtering program was operating with the same set of blocking categories enabled, found a significantly higher rate of overblocking than the Biek study did. Biek found a rate of overblocking of approximately 2% while the Finnell study estimated a 6.34% rate of overblocking. At all events, the category definitions employed by CIPA, at least with respect to adult use – visual depictions that are obscene or child pornography – are narrower than the materials prohibited by the Tacoma Library policy, and therefore Biek's study understates the rate of overblocking with respect to CIPA's definitions for adults. In sum, we think that Finnell's study, while we do not credit its estimates of underblocking, is useful because it states lower bounds with respect to the rates of overblocking that occurred when the Cyber Patrol, Websense, and N2H2 filters were operating in public libraries. While these rates are substantial – between nearly 6% and 15% – we think, for the reasons stated above, that they greatly understate the actual rates of overblocking that occurs, and therefore cannot be considered as anything more than minimum estimates of the rates of overblocking that happens in all filtering programs. 5. Methods of Obtaining Examples of Erroneously Blocked Web Sites The plaintiffs assembled a list of several thousand Web sites that they contend were, at the time of the study, likely to have been erroneously blocked by one or more of four major commercial filtering programs: SurfControl Cyber Patrol 6.0.1.47, N2H2 Internet Filtering 2.0, Secure Computing SmartFilter 3.0.0.01, and Websense Enterprise 4.3.0. They compiled this list using a two-step process. First, Benjamin Edelman, an expert witness who testified before us, compiled a list of more than 500,000 URLs and devised a program to feed them through all four filtering programs in order to compile a list of URLs that might have been erroneously blocked by one or more of the programs. Second, Edelman forwarded subsets of the list that he compiled to librarians and professors of library science whom the plaintiffs had hired to review the blocked sites for suitability in the public library context. Edelman assembled the list of URLs by compiling Web pages that were blocked by the following categories in the four programs: Cyber Patrol: Adult/Sexually Explicit; N2H2: Adults Only, Nudity, Pornography, and Sex, with "exceptions" engaged in the categories of Education, For Kids, History, Medical, Moderated, and Text/Spoken Only; SmartFilter: Sex, Nudity, Mature, and Extreme; Websense: Adult Content, Nudity, and Sex. Edelman then assembled a database of Web sites for possible testing. He derived this list by automatically compiling URLs from the Yahoo index of Web sites, taking them from categories from the Yahoo index that differed significantly from the classifications that he had enabled in each of the blocking programs (taking, for example, Web sites from Yahoo's "Government" category). He then expanded this list by entering URLs taken from the Yahoo index into the Google search engine's "related" search function, which provides the user with a list of similar sites. Edelman also included and excluded specific Web sites at the request of the plaintiffs' counsel. Taking the list of more than 500,000 URLs that he had compiled, Edelman used an automated system that he had developed to test whether particular URLs were blocked by each of the four filtering programs. This testing took place between February and October 2001. He recorded the specific dates on which particular sites were blocked by particular programs, and, using commercial archiving software, archived the contents of the home page of the blocked Web sites (and in some instances the pages linked to from the home page) as it existed when it was blocked. Through this process, Edelman, whose testimony we credit, compiled a list of 6,777 URLs that were blocked by one or more of the four programs. Because these sites were chosen from categories from the Yahoo directory that were unrelated to the filtering categories that were enabled during the test (i.e., "Government" vs. "Nudity"), he reasoned that they were likely erroneously blocked. As explained in the margin, Edelman repeated his testing and discovered that Cyber Patrol had unblocked most of the pages on the list of 6,777 after he had published the list on his Web site. His records indicate that an employee of SurfControl (the company that produces Cyber Patrol software) accessed his site and presumably checked out the URLs on the list, thus confirming Edelman's judgment that the majority of URLs on the list were erroneously blocked. Edelman forwarded the list of blocked sites to Dr. Joseph Janes, an Assistant Professor in the Information School of the University of Washington who also testified at trial as an expert witness. Janes reviewed the sites that Edelman compiled to determine whether they are consistent with library collection development, i.e., whether they are sites to which a reference librarian would, consistent with professional standards, direct a patron as a source of information. Edelman forwarded Janes a list of 6,775 Web sites, almost the entire list of blocked sites that he collected, from which Janes took a random sample of 859 using the SPSS statistical software package. Janes indicated that he chose a sample size of 859 because it would yield a 95% confidence interval of plus or minus 2.5%. Janes recruited a group of 16 reviewers, most of whom were current or former students at the University of Washington's Information School, to help him identify which sites were appropriate for library use. We describe the process that he used in the margin. Due to the inability of a member of Janes's review team to complete the reviewing process, Janes had to cut 157 Web sites out of the sample, but because the Web sites were randomly assigned to reviewers, it is unlikely that these sites differed significantly from the rest of the sample. That left the sample size at 699, which widened the 95% confidence interval to plus or minus 2.8%. Of the total 699 sites reviewed, Janes's team concluded that 165 of them, or 23.6% percent of the sample, were not of any value in the library context (i.e., no librarian would, consistent with professional standards, refer a patron to these sites as a source of information). They were unable to find 60 of the Web sites, or 8.6% of the sample. Therefore, they concluded that the remaining 474 Web sites, or 67.8% of the sample, were examples of overblocking with respect to materials that are appropriate sources of information in public libraries. Applying a 95% confidence interval of plus or minus 2.8%, the study concluded that we can be 95% confident that the actual percentage of sites in the list of 6,775 sites that are appropriate for use in public libraries is somewhere between 65.0% and 70.6%. In other words, we can be 95% certain that the actual number of sites out of the 6,775 that Edelman forwarded to Janes that are appropriate for use in public libraries (under Janes's standard) is somewhere between 4,403 and 4,783. The government raised some valid criticisms of Janes's methodology, attacking in particular the fact that, while sites that received two "yes" votes in the first round of voting were determined to be of sufficient interest in a library context to be removed from further analysis, sites receiving one or two "no" votes were sent to the next round. The government also correctly points out that results of Janes's study can be generalized only to the population of 6,775 sites that Edelman forwarded to Janes. Even taking these criticisms into account, and discounting Janes's numbers appropriately, we credit Janes's study as confirming that Edelman's set of 6,775 Web sites contains at least a few thousand URLs that were erroneously blocked by one or more of the four filtering programs that he used, whether judged against CIPA's definitions, the filters' own category criteria, or against the standard that the Janes study used. Edelman tested only 500,000 unique URLs out of the 4000 times that many, or two billion, that are estimated to exist in the indexable Web. Even assuming that Edelman chose the URLs that were most likely to be erroneously blocked by commercial filtering programs, we conclude that many times the number of pages that Edelman identified are erroneously blocked by one or more of the filtering programs that he tested. Edelman's and Janes's studies provide numerous specific examples of Web pages that were erroneously blocked by one or more filtering programs. The Web pages that were erroneously blocked by one or more of the filtering programs do not fall into any neat patterns; they range widely in subject matter, and it is difficult to tell why they may have been overblocked. The list that Edelman compiled, for example, contains Web pages relating to religion, politics and government, health, careers, education, travel, sports, and many other topics. In the next section, we provide examples from each of these categories. 6. Examples of Erroneously Blocked Web Sites Several of the erroneously blocked Web sites had content relating to churches, religious orders, religious charities, and religious fellowship organizations. These included the following Web sites: the Knights of Columbus Council 4828, a Catholic men's group associated with St. Patrick's Church in Fallon, Nevada, http://msnhomepages.talkcity.com/SpiritSt/kofc4828, which was blocked by Cyber Patrol in the "Adult/Sexually Explicit" category; the Agape Church of Searcy, Arkansas, http://www.agapechurch.com, which was blocked by Websense as "Adult Content"; the home page of the Lesbian and Gay Havurah of the Long Beach, California Jewish Community Center, http://www.compupix.com/gay/havurah.htm, which was blocked by N2H2 as "Adults Only, Pornography," by Smartfilter as "Sex," and by Websense as "Sex"; Orphanage Emmanuel, a Christian orphanage in Honduras that houses 225 children, http://home8.inet.tele.dk/rfb_viva, which was blocked by Cyber Patrol in the "Adult/Sexually Explicit" category; Vision Art Online, which sells wooden wall hangings for the home that contain prayers, passages from the Bible, and images of the Star of David, http://www.visionartonline.com, which was blocked in Websense's "Sex" category; and the home page of Tenzin Palmo, a Buddhist nun, which contained a description of her project to build a Buddhist nunnery and international retreat center for women, http://www.tenzinpalmo.com, which was categorized as "Nudity" by N2H2. Several blocked sites also contained information about governmental entities or specific political candidates, or contained political commentary. These included: the Web site for Kelley Ross, a Libertarian candidate for the California State Assembly, http://www.friesian.com/ross/ca40, which N2H2 blocked as "Nudity"; the Web site for Bob Coughlin, a town selectman in Dedham, Massachusetts, http://www.bobcoughlin.org, which was blocked under N2H2's "Nudity" category; a list of Web sites containing information about government and politics in Adams County, Pennsylvania, http://www.geocities.com/adamscopa, which was blocked by Websense as "Sex"; the Web site for Wisconsin Right to Life, http://www.wrtl.org, which N2H2 blocked as "Nudity"; a Web site that promotes federalism in Uganda, http://federo.com, which N2H2 blocked as "Adults Only, Pornography"; "Fight the Death Penalty in the USA," a Danish Web site dedicated to criticizing the American system of capital punishment, http://www.fdp.dk, which N2H2 blocked as "Pornography"; and "Dumb Laws," a humor Web site that makes fun of outmoded laws, http://www.dumblaws.com, which N2H2 blocked under its "Sex" category. Erroneously blocked Web sites relating to health issues included the following: a guide to allergies, http://www.x- sitez.com/allergy, which was categorized as "Adults Only, Pornography" by N2H2; a health question and answer site sponsored by Columbia University, http://www.goaskalice.com.columbia.edu, which was blocked as "Sex" by N2H2, and as "Mature" by Smartfilter; the Western Amputee Support Alliance Home Page, http://www.usinter.net/wasa, which was blocked by N2H2 as "Pornography"; the Web site of the Willis-Knighton Cancer Center, a Shreveport, Louisiana cancer treatment facility, http://cancerftr.wkmc.com, which was blocked by Websense under the "Sex" category; and a site dealing with halitosis, http://www.dreamcastle.com/tungs, which was blocked by N2H2 as "Adults, Pornography," by Smartfilter as "Sex," by Cyber Patrol as "Adult/Sexually Explicit," and by Websense as "Adult Content." The filtering programs also erroneously blocked several Web sites having to do with education and careers. The filtering programs blocked two sites that provide information on home schooling. "HomEduStation – the Internet Source for Home Education," http://www.perigee.net/~mcmullen/homedustation/, was categorized by Cyber Patrol as "Adult/Sexually Explicit." Smartfilter blocked "Apricot: A Web site made by and for home schoolers," http://apricotpie.com, as "Sex." The programs also miscategorized several career-related sites. "Social Work Search," http://www.socialworksearch.com/, is a directory for social workers that Cyber Patrol placed in its "Adult/Sexually Explicit" category. The "Gay and Lesbian Chamber of Southern Nevada," http://www.lambdalv.com, "a forum for the business community to develop relationships within the Las Vegas lesbian, gay, transsexual, and bisexual community" was blocked by N2H2 as "Adults Only, Pornography." A site for aspiring dentists, http://www.vvm.com/~bond/home.htm, was blocked by Cyber Patrol in its "Adult/Sexually Explicit" category. The filtering programs erroneously blocked many travel Web sites, including: the Web site for the Allen Farmhouse Bed & Breakfast of Alleghany County, North Carolina, http://planet- nc.com/Beth/index.html, which Websense blocked as "Adult Content"; Odysseus Gay Travel, a travel company serving gay men, http://www.odyusa.com, which N2H2 categorized as "Adults Only, Pornography"; Southern Alberta Fly Fishing Outfitters, http://albertaflyfish.com, which N2H2 blocked as "Pornography"; and "Nature and Culture Conscious Travel," a tour operator in Namibia, http://www.trans-namibia-tours.com, which was categorized as "Pornography" by N2H2. The filtering programs also miscategorized a large number of sports Web sites. These included: a site devoted to Willie O'Ree, the first African-American player in the National Hockey League, http://www.missioncreep.com/mw/oree.html, which Websense blocked under its "Nudity" category; the home page of the Sydney University Australian Football Club, http://www.tek.com.au/suafc, which N2H2 blocked as "Adults Only, Pornography," Smartfilter blocked as "Sex," Cyber Patrol blocked as "Adult/Sexually Explicit" and Websense blocked as "Sex"; and a fan's page devoted to the Toronto Maple Leafs hockey team, http://www.torontomapleleafs.atmypage.com, which N2H2 blocked under the "Pornography" category. 7. Conclusion: The Effectiveness of Filtering Programs Public libraries have adopted a variety of means of dealing with problems created by the provision of Internet access. The large amount of sexually explicit speech that is freely available on the Internet has, to varying degrees, led to patron complaints about such matters as unsought exposure to offensive material, incidents of staff and patron harassment by individuals viewing sexually explicit content on the Internet, and the use of library computers to access illegal material, such as child pornography. In some libraries, youthful library patrons have persistently attempted to use the Internet to access hardcore pornography. Those public libraries that have responded to these problems by using software filters have found such filters to provide a relatively effective means of preventing patrons from accessing sexually explicit material on the Internet. Nonetheless, out of the entire universe of speech on the Internet falling within the filtering products' category definitions, the filters will incorrectly fail to block a substantial amount of speech. Thus, software filters have not completely eliminated the problems that public libraries have sought to address by using the filters, as evidenced by frequent instances of underblocking. Nor is there any quantitative evidence of the relative effectiveness of filters and the alternatives to filters that are also intended to prevent patrons from accessing illegal content on the Internet. Even more importantly (for this case), although software filters provide a relatively cheap and effective, albeit imperfect, means for public libraries to prevent patrons from accessing speech that falls within the filters' category definitions, we find that commercially available filtering programs erroneously block a huge amount of speech that is protected by the First Amendment. Any currently available filtering product that is reasonably effective in preventing users from accessing content within the filter's category definitions will necessarily block countless thousands of Web pages, the content of which does not match the filtering company's category definitions, much less the legal definitions of obscenity, child pornography, or harmful to minors. Even Finnell, an expert witness for the defendants, found that between 6% and 15% of the blocked Web sites in the public libraries that he analyzed did not contain content that meets even the filtering products' own definitions of sexually explicit content, let alone CIPA's definitions. This phenomenon occurs for a number of reasons explicated in the more detailed findings of fact supra. These include limitations on filtering companies' ability to: (1) harvest Web pages for review; (2) review and categorize the Web pages that they have harvested; and (3) engage in regular re-review of the Web pages that they have previously reviewed. The primary limitations on filtering companies' ability to harvest Web pages for review is that a substantial majority of pages on the Web are not indexable using the spidering technology that Web search engines use, and that together, search engines have indexed only around half of the Web pages that are theoretically indexable. The fast rate of growth in the number of Web pages also limits filtering companies' ability to harvest pages for review. These shortcomings necessarily result in significant underblocking. Several limitations on filtering companies' ability to review and categorize the Web pages that they have harvested also contribute to over- and underblocking. First, automated review processes, even those based on "artificial intelligence," are unable with any consistency to distinguish accurately material that falls within a category definition from material that does not. Moreover, human review of URLs is hampered by filtering companies' limited staff sizes, and by human error or misjudgment. In order to deal with the vast size of the Web and its rapid rates of growth and change, filtering companies engage in several practices that are necessary to reduce underblocking, but inevitably result in overblocking. These include: (1) blocking whole Web sites even when only a small minority of their pages contain material that would fit under one of the filtering company's categories (e.g., blocking the Salon.com site because it contains a sex column); (2) blocking by IP address (because a single IP address may contain many different Web sites and many thousands of pages of heterogenous content); and (3) blocking loophole sites such as translator sites and cache sites, which archive Web pages that have been removed from the Web by their original publisher. Finally, filtering companies' failure to engage in regular re-review of Web pages that they have already categorized (or that they have determined do not fall into any category) results in a substantial amount of over- and underblocking. For example, Web publishers change the contents of Web pages frequently. The problem also arises when a Web site goes out of existence and its domain name or IP address is reassigned to a new Web site publisher. In that case, a filtering company's previous categorization of the IP address or domain name would likely be incorrect, potentially resulting in the over- or underblocking of many thousands of pages. The inaccuracies that result from these limitations of filtering technology are quite substantial. At least tens of thousands of pages of the indexable Web are overblocked by each of the filtering programs evaluated by experts in this case, even when considered against the filtering companies' own category definitions. Many erroneously blocked pages contain content that is completely innocuous for both adults and minors, and that no rational person could conclude matches the filtering companies' category definitions, such as "pornography" or "sex." The number of overblocked sites is of course much higher with respect to the definitions of obscenity and child pornography that CIPA employs for adults, since the filtering products' category definitions, such as "sex" and "nudity," encompass vast amounts of Web pages that are neither child pornography nor obscene. Thus, the number of pages of constitutionally protected speech blocked by filtering products far exceeds the many thousands of pages that are overblocked by reference to the filtering products' category definitions. No presently conceivable technology can make the judgments necessary to determine whether a visual depiction fits the legal definitions of obscenity, child pornography, or harmful to minors. Given the state of the art in filtering and image recognition technology, and the rapidly changing and expanding nature of the Web, we find that filtering products' shortcomings will not be solved through a technical solution in the foreseeable future. In sum, filtering products are currently unable to block only visual depictions that are obscene, child pornography, or harmful to minors (or, only content matching a filtering product's category definitions) while simultaneously allowing access to all protected speech (or, all content not matching the blocking product's category definitions). Any software filter that is reasonably effective in blocking access to Web pages that fall within its category definitions will necessarily erroneously block a substantial number of Web pages that do not fall within its category definitions. 2. Analytic Framework for the Opinion: The Centrality of Dole and the Role of the Facial Challenge Both the plaintiffs and the government agree that, because this case involves a challenge to the constitutionality of the conditions that Congress has set on state actors' receipt of federal funds, the Supreme Court's decision in South Dakota v. Dole, 483 U.S. 203 (1987), supplies the proper threshold analytic framework. The constitutional source of Congress's spending power is Article I, Sec. 8, cl. 1, which provides that "Congress shall have Power . . . to pay the Debts and provide for the common Defence and general Welfare of the United States." In Dole, the Court upheld the constitutionality of a federal statute requiring the withholding of federal highway funds from any state with a drinking age below 21. Id. at 211-12. In sustaining the provision's constitutionality, Dole articulated four general constitutional limitations on Congress's exercise of the spending power. First, "the exercise of the spending power must be in pursuit of 'the general welfare.'" Id. at 207. Second, any conditions that Congress sets on states' receipt of federal funds must be sufficiently clear to enable recipients "to exercise their choice knowingly, cognizant of the consequences of their participation." Id. (internal quotation marks and citation omitted). Third, the conditions on the receipt of federal funds must bear some relation to the purpose of the funding program. Id. And finally, "other constitutional provisions may provide an independent bar to the conditional grant of federal funds." Id. at 208. In particular, the spending power "may not be used to induce the States to engage in activities that would themselves be unconstitutional. Thus, for example, a grant of federal funds conditioned on invidiously discriminatory state action or the infliction of cruel and unusual punishment would be an illegitimate exercise of the Congress' broad spending power." Id. at 210. Plaintiffs do not contend that CIPA runs afoul of the first three limitations. However, they do allege that CIPA is unconstitutional under the fourth prong of Dole because it will induce public libraries to violate the First Amendment. Plaintiffs therefore submit that the First Amendment "provide[s] an independent bar to the conditional grant of federal funds" created by CIPA. Id. at 208. More specifically, they argue that by conditioning public libraries' receipt of federal funds on the use of software filters, CIPA will induce public libraries to violate the First Amendment rights of Internet content-providers to disseminate constitutionally protected speech to library patrons via the Internet, and the correlative First Amendment rights of public library patrons to receive constitutionally protected speech on the Internet. The government concedes that under the Dole framework, CIPA is facially invalid if its conditions will induce public libraries to violate the First Amendment. The government and the plaintiffs disagree, however, on the meaning of Dole's "inducement" requirement in the context of a First Amendment facial challenge to the conditions that Congress places on state actors' receipt of federal funds. The government contends that because plaintiffs are bringing a facial challenge, they must show that under no circumstances is it possible for a public library to comply with CIPA's conditions without violating the First Amendment. The plaintiffs respond that even if it is possible for some public libraries to comply with CIPA without violating the First Amendment, CIPA is facially invalid if it "will result in the impermissible suppression of a substantial amount of protected speech." Because it was clear in Dole that the states could comply with the challenged conditions that Congress attached to the receipt of federal funds without violating the Constitution, the Dole Court did not have occasion to explain fully what it means for Congress to use the spending power to "induce [recipients] to engage in activities that would themselves be unconstitutional." Dole, 483 U.S. at 210; see id. at 211 ("Were South Dakota to succumb to the blandishments offered by Congress and raise its drinking age to 21, the State's action in so doing would not violate the constitutional rights of anyone."). Although the proposition that Congress may not pay state actors to violate citizens' First Amendment rights is unexceptionable when stated in the abstract, it is unclear what exactly a litigant must establish to facially invalidate an exercise of Congress's spending power on this ground. In general, it is well-established that a court may sustain a facial challenge to a statute only if the plaintiff demonstrates that the statute admits of no constitutional application. See United States v. Salerno, 481 U.S. 739, 745 (1987) ("A facial challenge to a legislative Act is, of course, the most difficult challenge to mount successfully, since the challenger must establish that no set of circumstances exists under which the Act would be valid."); see also Bowen v. Kendrick, 487 U.S. 589, 612 (1988) ("It has not been the Court's practice, in considering facial challenges to statutes of this kind, to strike them down in anticipation that particular applications may result in unconstitutional use of funds.") (internal quotation marks and citation omitted). First Amendment overbreadth doctrine creates a limited exception to this rule by permitting facial invalidation of a statute that burdens a substantial amount of protected speech, even if the statute may be constitutionally applied in particular circumstances. "The Constitution gives significant protection from overbroad laws that chill speech within the First Amendment's vast and privileged sphere. Under this principle, [a law] is unconstitutional on its face if it prohibits a substantial amount of protected expression." Ashcroft v. Free Speech Coalition, 122 S. Ct. 1389, 1399 (2002); see also Broadrick v. Oklahoma, 413 U.S. 601, 612 (1973). This more liberal test of a statute's facial validity under the First Amendment stems from the recognition that where a statute's reach contemplates a number of both constitutional and unconstitutional applications, the law's sanctions may deter individuals from challenging the law's validity by engaging in constitutionally protected speech that may nonetheless be proscribed by the law. Without an overbreadth doctrine, "the contours of regulation would have to be hammered out case by case – and tested only by those hardy enough to risk criminal prosecution to determine the proper scope of regulation." Dombrowski v. Pfister, 380 U.S. 479, 487 (1965); see also Brockett v. Spokane Arcades, Inc., 472 U.S. 491, 503 (1985) ("[A]n individual whose own speech or expressive conduct may validly be prohibited or sanctioned is permitted to challenge a statute on its face because it also threatens others not before the court – those who desire to engage in legally protected expression but who may refrain from doing so rather than risk prosecution or undertake to have the law declared partially invalid."). Plaintiffs argue that the overbreadth doctrine is applicable here, since CIPA "threatens to chill free speech – because it will censor a substantial amount of protected speech, because it is vague, and because the law creates a prior restraint . . . ." Unlike the statutes typically challenged as facially overbroad, however, CIPA does not impose criminal penalties on those who violate its conditions. Cf. Freedom of Speech Coalition, 122 S. Ct. at 1398 ("With these severe penalties in force, few legitimate movie producers or book publishers, or few other speakers in any capacity, would risk distributing images in or near the uncertain reach of this law."). Thus, the rationale for permitting facial challenges to laws that may be constitutionally applied in some instances is less compelling in cases such as this, which involve challenges to Congress's exercise of the spending power, than in challenges to criminal statutes. Nonetheless, "even minor punishments can chill protected speech," id., and absent the ability to challenge CIPA on its face, public libraries that depend on federal funds may decide to comply with CIPA's terms, thereby denying patrons access to substantial amounts of constitutionally protected speech, rather than refusing to comply with CIPA's terms and consequently losing the benefits of federal funds. See 47 C.F.R. Sec. 54.520(e)(1) ("A school or library that knowingly fails to ensure the use of computers in accordance with the certifications required by this section, must reimburse any funds and discounts received under the federal universal support service support mechanism for schools and libraries for the period in which there was noncompliance."). Even in cases where the only penalty for failure to comply with a statute is the withholding of federal funds, the Court has sustained facial challenges to Congress's exercise of the spending power. See, e.g., Legal Servs. Corp. v. Velazquez, 531 U.S. 533 (2001) (declaring unconstitutional on its face a federal statute restricting the ability of legal services providers who receive federal funds to engage in activity protected by the First Amendment). The Court's unconstitutional conditions cases, such as Velazquez, are not strictly controlling, since they do not require a showing that recipients who comply with the conditions attached to federal funding will, as state actors, violate others' constitutional rights, as is the case under the fourth prong of Dole. However, they are highly instructive. The Supreme Court's pronouncements in the unconstitutional conditions cases on what is necessary for a plaintiff to mount a successful First Amendment facial challenge to an exercise of Congress's spending power have not produced a seamless web. For example, in Rust v. Sullivan, 500 U.S. 173 (1991), the Court rejected a First Amendment facial challenge to federal regulations prohibiting federally funded healthcare clinics from providing counseling concerning the use of abortion as a method of family planning, explaining that: Petitioners are challenging the facial validity of the regulations. Thus, we are concerned only with the question whether, on their face, the regulations are both authorized by the Act and can be construed in such a manner that they can be applied to a set of individuals without infringing upon constitutionally protected rights. Petitioners face a heavy burden in seeking to have the regulations invalidated as facially unconstitutional. . . . The fact that the regulations might operate unconstitutionally under some conceivable set of circumstances is insufficient to render them wholly invalid. Id. at 183 (internal quotation marks, alterations, and citation omitted). In contrast, NEA v. Finley, 524 U.S. 569 (1998), which also involved a facial First Amendment challenge to an exercise of Congress's spending power, articulated a somewhat more liberal test of facial validity than Rust, explaining that "[t]o prevail, respondents must demonstrate a substantial risk that application of the provision will lead to the suppression of speech." Id. at 580. Against this background, it is unclear to us whether, to succeed in facially invalidating CIPA on the grounds that it will "induce the States to engage in activities that would themselves be unconstitutional," Dole, 483 U.S. at 210, plaintiffs must show that it is impossible for public libraries to comply with CIPA's conditions without violating the First Amendment, or rather simply that CIPA will effectively restrict library patrons' access to substantial amounts of constitutionally protected speech, therefore causing many libraries to violate the First Amendment. However, we need not resolve this issue. Rather, we may assume without deciding, for purposes of this case, that a facial challenge to CIPA requires plaintiffs to show that any public library that complies with CIPA's conditions will necessarily violate the First Amendment and, as explained in detail below, we believe that CIPA's constitutionality fails even under this more restrictive test of facial validity urged on us by the government. Because of the inherent limitations in filtering technology, public libraries can never comply with CIPA without blocking access to a substantial amount of speech that is both constitutionally protected and fails to meet even the filtering companies' own blocking criteria. We turn first to the governing legal principles to be applied to the facts in order to determine whether the First Amendment permits a library to use the filtering technology mandated by CIPA. 3. Level of Scrutiny Applicable to Content-based Restrictions on Internet Access in Public Libraries In analyzing the constitutionality of a public library's use of Internet filtering software, we must first identify the appropriate level of scrutiny to apply to this restriction on patrons' access to speech. While plaintiffs argue that a public library's use of such filters is subject to strict scrutiny, the government maintains that the applicable standard is rational basis review. If strict scrutiny applies, the government must show that the challenged restriction on speech is narrowly tailored to promote a compelling government interest and that no less restrictive alternative would further that interest. United States v. Playboy Entm't Group, Inc., 529 U.S. 803, 813 (2000). In contrast, under rational basis review, the challenged restriction need only be reasonable; the government interest that the restriction serves need not be compelling; the restriction need not be narrowly tailored to serve that interest; and the restriction "need not be the most reasonable or the only reasonable limitation." Cornelius v. NAACP Legal Def. & Educ. Fund, 473 U.S. 788, 808 (1985). Software filters, by definition, block access to speech on the basis of its content, and content-based restrictions on speech are generally subject to strict scrutiny. See Playboy, 529 U.S. at 813 ("[A] content-based speech restriction . . . can stand only if it satisfies strict scrutiny."). Strict scrutiny does not necessarily apply to content-based restrictions on speech, however, where the restrictions apply only to speech on government property, such as public libraries. "[I]t is . . . well settled that the government need not permit all forms of speech on property that it owns and controls." Int'l Soc'y for Krishna Consciousness, Inc. v. Lee, 505 U.S. 672, 678 (1992). We perforce turn to a discussion of public forum doctrine. 1. Overview of Public Forum Doctrine The government's power to restrict speech on its own property is not unlimited. Rather, under public forum doctrine, the extent to which the First Amendment permits the government to restrict speech on its own property depends on the character of the forum that the government has created. See Cornelius v. NAACP Legal Def. & Educ. Fund, Inc., 473 U.S. 788 (1985). Thus, the First Amendment affords greater deference to restrictions on speech in those areas considered less amenable to free expression, such as military bases, see Greer v. Spock, 424 U.S. 828 (1976), jail grounds, see Adderley v. Florida, 385 U.S. 39 (1966), or public airport terminals, see Int'l Soc'y for Krishna Consciousness, Inc. v. Lee, 505 U.S. 672 (1992), than to restrictions on speech in state universities, see Rosenberger v. Rector & Visitors of Univ. of Va., 515 U.S. 819 (1995), or streets, sidewalks and public parks, see Frisby v. Schultz, 487 U.S. 474 (1988); Hague v. CIO, 307 U.S. 496 (1939). The Supreme Court has identified three types of fora for purposes of identifying the level of First Amendment scrutiny applicable to content-based restrictions on speech on government property: traditional public fora, designated public fora, and nonpublic fora. Traditional public fora include sidewalks, squares, and public parks: [S]treets and parks . . . have immemorially been held in trust for the use of the public and, time out of mind, have been used for purposes of assembly, communicating thoughts between citizens, and discussing public questions. Such use of the streets and public places has, from ancient times, been a part of the privileges, immunities, rights, and liberties of citizens. Hague, 307 U.S. at 515. "In these quintessential public forums, . . . [f]or the State to enforce a content-based exclusion it must show that its regulation is necessary to serve a compelling state interest and that it is narrowly drawn to achieve that end." Perry Educ. Ass'n v. Perry Local Educs. Ass'n, 460 U.S. 37, 45 (1983); see also Int'l Soc'y for Krishna Consciousness, 505 U.S. at 678 ("[R]egulation of speech on government property that has traditionally been available for public expression is subject to the highest scrutiny."); Frisby, 487 U.S. at 480 ("[W]e have repeatedly referred to public streets as the archetype of a traditional public forum."). A second category of fora, known as designated (or limited) public fora, "consists of public property which the State has opened for use by the public as a place for expressive activity." Perry, 460 U.S. at 46. Whereas any content-based restriction on the use of traditional public fora is subject to strict scrutiny, the state is generally permitted, as long as it does not discriminate on the basis of viewpoint, to limit a designated public forum to certain speakers or the discussion of certain subjects. See Perry, 460 U.S. at 45 n.7. Once it has defined the limits of a designated public forum, however, "[r]egulation of such property is subject to the same limitations as that governing a traditional public forum." Int'l Soc'y for Krishna Consciousness, 505 U.S. at 678. Examples of designated fora include university meeting facilities, see Widmar v. Vincent, 454 U.S. 263 (1981), school board meetings, see City of Madison Joint School Dist. v. Wisc. Employment Relations Comm'n, 429 U.S. 167 (1976), and municipal theaters, see Southeastern Promotions, Ltd. v. Conrad, 420 U.S. 546 (1975). The third category, nonpublic fora, consists of all remaining public property. "Limitations on expressive activity conducted on this last category of property must survive only a much more limited review. The challenged regulation need only be reasonable, as long as the regulation is not an effort to suppress the speaker's activity due to disagreement with the speaker's view." Int'l Soc'y for Krishna Consciousness, 505 U.S. at 679. 2. Contours of the Relevant Forum: the Library's Collection as a Whole or the Provision of Internet Access? To apply public forum doctrine to this case, we must first determine whether the appropriate forum for analysis is the library's collection as a whole, which includes both print and electronic resources, or the library's provision of Internet access. Where a plaintiff seeks limited access, for expressive purposes, to governmentally controlled property, the Supreme Court has held that the relevant forum is defined not by the physical limits of the government property at issue, but rather by the specific access that the plaintiff seeks: Although . . . as an initial matter a speaker must seek access to public property or to private property dedicated to public use to evoke First Amendment concerns, forum analysis is not completed merely by identifying the government property at issue. Rather, in defining the forum we have focused on the access sought by the speaker. When speakers seek general access to public property, the forum encompasses that property. In cases in which limited access is sought, our cases have taken a more tailored approach to ascertaining the perimeters of a forum within the confines of the government property. Cornelius v. NAACP Legal Def. & Educ. Fund, Inc., 473 U.S. 788, 801 (1985). Thus, in Cornelius, where the plaintiffs were legal defense and political advocacy groups seeking to participate in the Combined Federal Campaign charity drive, the Court held that the relevant forum, for First Amendment purposes, was not the entire federal workplace, but rather the charity drive itself. Id. at 801. Similarly, in Perry Education Association v. Perry Local Educators' Association, 460 U.S. 37 (1983), which addressed a union's right to access a public school's internal mail system and teachers' mailboxes, the Court identified the relevant forum as the school's mail system, not the public school as a whole. In Widmar v. Vincent, 454 U.S. 263 (1981), in which a student group challenged a state university's restrictions on use of its meeting facilities, the Court identified the relevant forum as the meeting facilities to which the plaintiffs sought access, not the state university generally. And in Christ's Bride Ministries, Inc. v. SEPTA, 148 F.3d 242 (3d Cir. 1998), involving a First Amendment challenge to the removal of advertisements from subway and commuter rail stations, the Third Circuit noted that the forum at issue was not the rail and subway stations as a whole, but rather the advertising space within the stations. Id. at 248. Although these cases dealt with the problem of identifying the relevant forum where speakers are claiming a right of access, we believe that the same approach applies to identifying the relevant forum where the parties seeking access are listeners or readers. In this case, the patron plaintiffs are not asserting a First Amendment right to compel public libraries to acquire certain books or magazines for their print collections. Nor are the Web site plaintiffs claiming a First Amendment right to compel public libraries to carry print materials that they publish. Rather, the right at issue in this case is the specific right of library patrons to access information on the Internet, and the specific right of Web publishers to provide library patrons with information via the Internet. Thus, the relevant forum for analysis is not the library's entire collection, which includes both print and electronic media, such as the Internet, but rather the specific forum created when the library provides its patrons with Internet access. Although a public library's provision of Internet access does not resemble the conventional notion of a forum as a well- defined physical space, the same First Amendment standards apply. See Rosenberger v. Rector & Visitors of Univ. of Va., 515 U.S. 819, 830 (1995) (holding that a state university's student activities fund "is a forum more in a metaphysical than a spatial or geographic sense, but the same principles are applicable"); see also Cornelius, 473 U.S. at 801 (identifying the Combined Federal Campaign charity drive as the relevant unit of analysis for application of public forum doctrine). 3. Content-based Restrictions in Designated Public Fora Unlike nonpublic fora such as airport terminals, see Int'l Soc'y for Krishna Consciousness, Inc. v. Lee, 505 U.S. 672 (1992), military bases, see Greer v. Spock, 424 U.S. 828 (1976), jail grounds, see Adderley v. Florida, 385 U.S. 39 (1966), the federal workplace, see Cornelius v. NAACP Legal Def. & Educ. Fund, 473 U.S. 788, 805 (1985), and public transit vehicles, see Lehman v. City of Shaker Heights, 418 U.S. 298 (1974), the purpose of a public library in general, and the provision of Internet access within a public library in particular, is "for use by the public . . . for expressive activity," Perry Educ. Ass'n v. Perry Local Educs. Ass'n, 460 U.S. 37, 45 (1983), namely, the dissemination and receipt by the public of a wide range of information. We are satisfied that when the government provides Internet access in a public library, it has created a designated public forum. See Mainstream Loudoun v. Bd. of Trustees of the Loudoun County Library, 24 F. Supp. 2d 552, 563 (E.D. Va. 1998); cf. Kreimer v. Bureau of Police, 958 F.2d 1242, 1259 (3d Cir. 1992) (holding that a public library is a limited public forum). Relying on those cases that have recognized that government has leeway, under the First Amendment, to limit use of a designated public forum to narrowly specified purposes, and that content-based restrictions on speech that are consistent with those purposes are subject only to rational basis review, the government argues for application of rational basis review to public libraries' decisions about which content to make available to their patrons via the Internet. See Rosenberger, 515 U.S. 819, 829 (1995) ("The necessities of confining a forum to the limited and legitimate purposes for which it was created may justify the State in reserving it for certain groups or for the discussion of certain topics."); Perry, 460 U.S. at 46 n.7 (1983) ("A public forum may be created for a limited purpose such as use by certain groups . . . or for the discussion of certain subjects."). In particular, the government forcefully argues that a public library's decision to limit the content of its digital offerings on the Internet should be subject to no stricter scrutiny than its decisions about what content to make available to its patrons through the library's print collection. According to the government, just as a public library may choose to acquire books about gardening but not golf, without having to show that this content-based restriction on patrons' access to speech is narrowly tailored to further a compelling state interest, so may a public library make content-based decisions about which speech to make available on the Internet, without having to show that such a restriction satisfies strict scrutiny. Plaintiffs respond that the government's ability to restrict the content of speech in a designated public forum by restricting the purpose of the designated public forum that it creates is not unlimited. Cf. Legal Servs. Corp. v. Velazquez, 531 U.S. 533, 547 (2001) ("Congress cannot recast a condition on funding as a mere definition of its program in every case, lest the First Amendment be reduced to a simple semantic exercise."). As Justice Kennedy has explained: If Government has a freer hand to draw content-based distinctions in limiting a forum than in excluding someone from it, the First Amendment would be a dead letter in designated public forums; every exclusion could be recast as a limitation. . . . The power to limit or redefine forums for a specific legitimate purpose does not allow the government to exclude certain speech or speakers from them for any reason at all. Denver Area Telecomm. Consortium, Inc. v. FCC, 518 U.S. 727, 801 (1996) (Kennedy, J., concurring in the judgment). Although we agree with plaintiffs that the First Amendment imposes some limits on the state's ability to adopt content-based restrictions in defining the purpose of a public forum, precisely what those limits are is unclear, and presents a difficult problem in First Amendment jurisprudence. The Supreme Court's "cases have not yet determined . . . that government's decision to dedicate a public forum to one type of content or another is necessarily subject to the highest level of scrutiny. Must a local government, for example, show a compelling state interest if it builds a band shell in the park and dedicates it solely to classical music (but not to jazz)? The answer is not obvious." Denver, 518 U.S. at 750 (plurality opinion); see also Southeastern Promotions, Ltd. v. Conrad, 420 U.S. 546, 572-73 (1975) (Rehnquist, J., dissenting) ("May an opera house limit its productions to operas, or must it also show rock musicals? May a municipal theater devote an entire season to Shakespeare, or is it required to book any potential producer on a first come, first served basis?"). We believe, however, that certain principles emerge from the Supreme Court's jurisprudence on this question. In particular, and perhaps somewhat counterintuitively, the more narrow the range of speech that the government chooses to subsidize (whether directly, through government grants or other funding, or indirectly, through the creation of a public forum) the more deference the First Amendment accords the government in drawing content-based distinctions. At one extreme lies the government's decision to fund a particular message that the government seeks to disseminate. In this context, content-based restrictions on the speech that government chooses to subsidize are clearly subject to at most rational basis review, and even viewpoint discrimination is permissible. For example, "[w]hen Congress established a National Endowment for Democracy to encourage other countries to adopt democratic principles, 22 U.S.C. Sec. 4411(b), it was not constitutionally required to fund a program to encourage competing lines of political philosophy such as communism and fascism." Rust v. Sullivan, 500 U.S. 173, 194 (1991); see also Velazquez, 531 U.S. at 541 ("[V]iewpoint-based funding decisions can be sustained in instances in which the government is itself the speaker, or in instances, like Rust, in which the government used private speakers to transmit information pertaining to its own program.") (internal quotation marks and citation omitted). Although not strictly controlling, the Supreme Court's unconstitutional conditions cases, such as Rust and Velazquez, are instructive for purposes of analyzing content-based restrictions on the use of public fora. This is because the limitations that government places on the use of a public forum can be conceptualized as conditions that the government attaches to the receipt of a benefit that it offers, namely, the use of government property. Public forum cases thus resemble those unconstitutional conditions cases involving First Amendment challenges to the conditions that the state places on the receipt of a government benefit. See Velazquez, 531 U.S. at 544 ("As this suit involves a subsidy, limited forum cases . . . may not be controlling in the strict sense, yet they do provide some instruction."). Even when the government does not fund the dissemination of a particular government message, the First Amendment generally permits government, subject to the constraints of viewpoint neutrality, to create public institutions such as art museums and state universities, dedicated to facilitating the dissemination of private speech that the government believes to have particular merit. Thus, in NEA v. Finley, 524 U.S. 569 (1998), the Court upheld the use of content-based restrictions in a federal program awarding grants to artists on the basis of, inter alia, artistic excellence. "The very assumption of the NEA is that grants will be awarded according to the artistic worth of competing applications, and absolute neutrality is simply inconceivable." Id. at 585 (internal quotation marks and citation omitted). Similarly, as Justice Stevens explained in his concurring opinion in Widmar v. Vincent, 454 U.S. 263 (1981), the First Amendment does not necessarily subject to strict scrutiny a state university's use of content-based means of allocating scarce resources, including limited public fora such as its meeting facilities: Because every university's resources are limited, an educational institution must routinely make decisions concerning the use of the time and space that is available for extracurricular activities. In my judgment, it is both necessary and appropriate for those decisions to evaluate the content of a proposed student activity. I should think it obvious, for example, that if two groups of 25 students requested the use of a room at a particular time – one to view Mickey Mouse cartoons and the other to rehearse an amateur performance of Hamlet – the First Amendment would not require that the room be reserved for the group that submitted its application first. Nor do I see why a university should have to establish a "compelling state interest" to defend its decision to permit one group to use the facility and not the other. Id. at 278 (Stevens, J., concurring in the judgment). The more broadly the government facilitates private speech, however, the less deference the First Amendment accords to the government's content-based restrictions on the speech that it facilitates. Thus, where the government creates a designated public forum to facilitate private speech representing a diverse range of viewpoints, the government's decision selectively to single out particular viewpoints for exclusion is subject to strict scrutiny. Compare Rosenberger, 515 U.S. at 834 (applying heightened First Amendment scrutiny to viewpoint-based restrictions on the use of a limited public forum where the government "does not itself speak or subsidize transmittal of a message it favors but instead expends funds to encourage a diversity of views from private speakers"), with Finley, 524 U.S. at 586 ("In the context of arts funding, in contrast to many other subsidies, the Government does not indiscriminately encourage a diversity of views from private speakers.") (internal quotation marks and citation omitted). Similarly, although the government may create a designated public forum limited to speech on a particular topic, if the government opens the forum to members of the general public to speak on that topic while selectively singling out for exclusion particular speakers on the basis of the content of their speech, that restriction is subject to strict scrutiny. For instance, in City of Madison Joint School District No. 8 v. Wisconsin Employment Relations Commission, 429 U.S. 167 (1976), the Court held that where a school board opens its meetings for public participation, it may not, consistent with the First Amendment, prohibit teachers other than union representatives from speaking on the subject of pending collective-bargaining negotiations. See id. at 175 (noting that the state "has opened a forum for direct citizen involvement"); see also Ark. Educ. Television Comm'n v. Forbes, 523 U.S. 666, 680 (1998) (distinguishing, for purposes of determining the appropriate level of First Amendment scrutiny, a televised debate in which a public broadcasting station exercises editorial discretion in selecting participating candidates from a debate that has "an open-microphone format"). Finally, content-based restrictions on speech in a designated public forum are most clearly subject to strict scrutiny when the government opens a forum for virtually unrestricted use by the general public for speech on a virtually unrestricted range of topics, while selectively excluding particular speech whose content it disfavors. Thus, in Conrad, the Court held that a local government violated the First Amendment when it denied a group seeking to perform the rock musical "Hair" access to a general-purpose municipal theater open for the public at large to use for performances. See also Denver, 518 U.S. at 802 (Kennedy, J., concurring in the judgment) (suggesting that strict scrutiny would not apply to a local government's decision to "build[] a band shell in the park and dedicate[] it solely to classical music (but not jazz)," but would apply to "the Government's creation of a band shell in which all types of music might be performed except for rap music"). Similarly, in FCC v. League of Women Voters of Cal., 468 U.S. 364 (1984), the Court subjected to heightened scrutiny a federal program that funded a wide range of public broadcasting stations that disseminated speech on a wide range of subjects, where the federal program singled out for exclusion speech whose content amounted to editorializing. As the Court later explained: In FCC v. League of Women Voters of Cal., 468 U.S. 364 (1984) the Court was instructed by its understanding of the dynamics of the broadcast industry in holding that prohibitions against editorializing by public radio networks were an impermissible restriction, even though the Government enacted the restriction to control the use of public funds. The First Amendment forbade the Government from using the forum in an unconventional way to suppress speech inherent in the nature of the medium. Velazquez, 531 U.S. at 543. In sum, the more widely the state opens a forum for members of the public to speak on a variety of subjects and viewpoints, the more vulnerable is the state's decision selectively to exclude certain speech on the basis of its disfavored content, as such exclusions distort the marketplace of ideas that the state has created in establishing the forum. Cf. Velazquez, 531 U.S. at 544 ("Restricting LSC attorneys in advising their clients and in presenting arguments and analyses to the courts distorts the legal system by altering the traditional role of the attorneys in much the same way broadcast systems or student publication networks were changed in the limited forum cases . . . ."). Thus, we believe that where the state designates a forum for expressive activity and opens the forum for speech by the public at large on a wide range of topics, strict scrutiny applies to restrictions that single out for exclusion from the forum particular speech whose content is disfavored. "Laws designed or intended to suppress or restrict the expression of specific speakers contradict basic First Amendment principles." United States v. Playboy Entm't Group, Inc., 529 U.S. 803, 812 (2000); see also Denver, 518 U.S. at 782 (Kennedy, J., concurring in the judgment) (noting the flaw in a law that "singles out one sort of speech for vulnerability to private censorship in a context where content-based discrimination is not otherwise permitted"). Compare Forbes, 523 U.S. at 679 (holding that the state does not create a public forum when it "allows selective access for individual speakers rather than general access for a class of speakers") (emphasis added), with Police Dep't of the City of Chicago v. Mosley, 408 U.S. 92, 96 (1972) ("Selective exclusions from a public forum may not be based on content alone, and may not be justified by reference to content alone.") (emphasis added). We note further that to the extent that the government creates a public forum expressly designed to facilitate the dissemination of private speech, opens the forum to any member of the public to speak on any virtually any topic, and then selectively targets certain speech for exclusion based on its content, the government is singling out speech in a manner that resembles the discriminatory taxes on the press that the Supreme Court subjected to heightened First Amendment scrutiny in Arkansas Writers' Project, Inc. v. Ragland, 481 U.S. 221 (1987), and Minneapolis Star & Tribune Co. v. Minnesota Commissioner of Revenue, 460 U.S. 575 (1983), which we explain in the margin. 4. Reasons for Applying Strict Scrutiny 1. Selective Exclusion From a "Vast Democratic Forum" Applying these principles to public libraries, we agree with the government that generally the First Amendment subjects libraries' content-based decisions about which print materials to acquire for their collections to only rational review. In making these decisions, public libraries are generally free to adopt collection development criteria that reflect not simply patrons' demand for certain material, but also the library's evaluation of the material's quality. See Bernard W. Bell, Filth, Filtering, and the First Amendment: Ruminations on Public Libraries' Use of Internet Filtering Software, 53 Fed. Comm. L.J. 191, 225 (2001) ("Librarians should have the discretion to decide that the library is committed to intellectual inquiry, not to the satisfaction of the full range of human desires."). Thus, a public library's decision to use the last $100 of its budget to purchase the complete works of Shakespeare even though more of its patrons would prefer the library to use the same amount to purchase the complete works of John Grisham, is not, in our view, subject to strict scrutiny. Cf. NEA v. Finley, 524 U.S. 569 (1998) (subjecting only to rational basis review the government's decision to award NEA grants on the basis of, inter alia, artistic excellence). Nonetheless, we disagree with the government's argument that public libraries' use of Internet filters is no different, for First Amendment purposes, from the editorial discretion that they exercise when they choose to acquire certain books on the basis of librarians' evaluation of their quality. The central difference, in our view, is that by providing patrons with even filtered Internet access, the library permits patrons to receive speech on a virtually unlimited number of topics, from a virtually unlimited number of speakers, without attempting to restrict patrons' access to speech that the library, in the exercise of its professional judgment, determines to be particularly valuable. Cf. Rosenberger v. Rector & Visitors of Univ. of Va., 515 U.S. 819, 834 (1995) (applying strict scrutiny to viewpoint-based restrictions where the state "does not itself speak or subsidize transmittal of a message it favors but instead expends funds to encourage a diversity of views from private speakers"). See generally supra Section IV.C. In those cases upholding the government's exercise of editorial discretion in selecting certain speech for subsidization or inclusion in a state-created forum, the state actor exercising the editorial discretion has at least reviewed the content of the speech that the forum facilitates. Thus, in Finley the NEA examined the content of those works of art that it chose to subsidize, and in Arkansas Educational Television Commission v. Forbes, 523 U.S. 666 (1998), the public broadcaster specifically reviewed and approved each speaker permitted to participate in the debate. See id. at 673 ("In the case of television broadcasting, . . . broad rights of access for outside speakers would be antithetical, as a general rule, to the discretion that stations and their editorial staff must exercise to fulfill their journalistic purpose and statutory obligations."); Finley, 524 U.S. at 586 ("The NEA's mandate is to make esthetic judgments, and the inherently content-based 'excellence' threshold for NEA support sets it apart from the subsidy at issue in Rosenberger – which was available to all student organizations that were 'related to the educational purpose of the University . . . .'") (quoting Rosenberger, 515 U.S. at 824); see also Cornelius v. NAACP Legal Def. & Educ. Fund, 473 U.S. 788, 804 (1985) ("The Government's consistent policy has been to limit participation in the [Combined Federal Campaign] to 'appropriate' voluntary agencies and to require agencies seeking admission to obtain permission from federal and local Campaign officials. . . . [T]here is no evidence suggesting that the granting of the requisite permission is merely ministerial."). The essence of editorial discretion requires the exercise of professional judgment in examining the content that the government singles out as speech of particular value. This exercise of editorial discretion is evident in a library's decision to acquire certain books for its collection. As the government's experts in library science testified, in selecting a book for a library's collection, librarians evaluate the book's quality by reference to a variety of criteria such as its accuracy, the title's niche in relation to the rest of the collection, the authority of the author, the publisher, the work's presentation, and how it compares with other material available in the same genre or on the same subject. Thus, the content of every book that a library acquires has been reviewed by the library's collection development staff or someone to whom they have delegated the task, and has been judged to meet the criteria that form the basis for the library's collection development policy. Although some public libraries use "approval plans" to delegate the collection development to third-party vendors which provide the library with recommended materials that the library is then free to retain or return to the vendor, the same principle nonetheless attains. In contrast, in providing patrons with even filtered Internet access, a public library invites patrons to access speech whose content has never been reviewed and recommended as particularly valuable by either a librarian or a third party to whom the library has delegated collection development decisions. Although several of the government's librarian witnesses who testified at trial purport to apply the same standards that govern the library's acquisition of print materials to the library's provision of Internet access to patrons, when public libraries provide their patrons with Internet access, they intentionally open their doors to vast amounts of speech that clearly lacks sufficient quality to ever be considered for the library's print collection. Unless a library allows access to only those sites that have been preselected as having particular value, a method that, as noted above, was tried and rejected by the Westerville Ohio Public Library, see supra at 46-47, even a library that uses software filters has opened its Internet collection "for indiscriminate use by the general public." Perry Educ. Ass'n v. Perry Local Educs. Ass'n, 460 U.S. 37, 47 (1983). "[M]ost Internet forums – including chat rooms, newsgroups, mail exploders, and the Web – are open to all comers." Reno v. ACLU, 521 U.S. 844, 880 (1997). The fundamental difference between a library's print collection and its provision of Internet access is illustrated by comparing the extent to which the library opens its print collection to members of the public to speak on a given topic and the extent to which it opens its Internet terminals to members of the public to speak on a given topic. When a public library chooses to carry books on a selected topic, e.g. chemistry, it does not open its print collection to any member of the public who wishes to write about chemistry. Rather, out of the myriad of books that have ever been written on chemistry, each book on chemistry that the library carries has been reviewed and selected because the person reviewing the book, in the exercise of his or her professional judgment, has deemed its content to be particularly valuable. In contrast, when a public library provides Internet access, even filtered Internet access, it has created a forum open to any member of the public who writes about chemistry on the Internet, regardless of how unscientific the author's methods or of how patently false the author's conclusions are, regardless of the author's reputation or grammar, and regardless of the reviews of the scientific community. Notwithstanding protestations in CIPA's legislative history to the contrary, members of the general public do define the content that public libraries make available to their patrons through the Internet. Any member of the public with Internet access could, through the free Web hosting services available on the Internet, tonight jot down a few musings on any subject under the sun, and tomorrow those musings would become part of public libraries' online offerings and be available to any library patron who seeks them out. In providing its patrons with Internet access, a public library creates a forum for the facilitation of speech, almost none of which either the library's collection development staff or even the filtering companies have ever reviewed. Although filtering companies review a portion of the Web in classifying particular sites, the portion of the Web that the filtering companies actually review is quite small in relation to the Web as a whole. The filtering companies' harvesting process, described in our findings of fact, is intended to identify only a small fraction of Web sites for the filtering companies to review. Put simply, the state cannot be said to be exercising editorial discretion permitted under the First Amendment when it indiscriminately facilitates private speech whose content it makes no effort to examine. Cf. Bell, supra, at 226 ("[C]ourts should take a much more jaundiced view of library policies that block Internet access to a very limited array of subjects than they take of library policies that reserve Internet terminals for very limited use."). While the First Amendment permits the government to exercise editorial discretion in singling out particularly favored speech for subsidization or inclusion in a state-created forum, we believe that where the state provides access to a "vast democratic forum[]," Reno, 521 U.S. at 868, open to any member of the public to speak on subjects "as diverse as human thought," id. at 870, and then selectively excludes from the forum certain speech on the basis of its content, such exclusions are subject to strict scrutiny. These exclusions risk fundamentally distorting the unique marketplace of ideas that public libraries create when they open their collections, via the Internet, to the speech of millions of individuals around the world on a virtually limitless number of subjects. A public library's content-based restrictions on patrons' Internet access thus resemble the content-based restrictions on speech subsidized by the government, whether through direct funding or through the creation of a designated public forum, that the Supreme Court has subjected to strict scrutiny, as discussed above in Section IV.C. Although the government may subsidize a particular message representing the government's viewpoint without having to satisfy strict scrutiny, see Rust v. Sullivan, 500 U.S. 173 (1991), strict scrutiny applies to restrictions that selectively exclude particular viewpoints from a public forum designed to facilitate a wide range of viewpoints, see Rosenberger v. Rector & Visitors of Univ. of Va., 515 U.S. 819 (1995). Similarly, although the state's exercise of editorial discretion in selecting particular speakers for participation in a state-sponsored forum is subject to rational basis review, see Ark. Educ. Television Comm'n v. Forbes, 523 U.S. 666 (1998), selective exclusions of particular speakers from a forum otherwise open to any member of the public to speak are subject to strict scrutiny, see City of Madison Joint School Dist. No. 8 v. Wis. Employment Relations Comm'n, 429 U.S. 167 (1976). And while the government may, subject only to rational basis review, make content-based decisions in selecting works of artistic excellence to subsidize, see NEA v. Finley, 524 U.S. 569 (1998), the Supreme Court has applied heightened scrutiny where the government opens a general-purpose municipal theater for use by the public, but selectively excludes disfavored content, see Southeastern Promotions, Ltd. v. Conrad, 420 U.S. 546 (1975), where the government facilitates the speech of public broadcasters on a virtually limitless number of topics, but prohibits editorializing, see FCC v. League of Women Voters of Cal., 468 U.S. 364 (1984), and where the government funds a wide range of legal services but restricts funding recipients from challenging welfare laws, see Legal Servs. Corp. v. Velazquez, 531 U.S. 533 (2001). Similarly, where a public library opens a forum to an unlimited number of speakers around the world to speak on an unlimited number of topics, strict scrutiny applies to the library's selective exclusions of particular speech whose content the library disfavors. 2. Analogy to Traditional Public Fora Application of strict scrutiny to public libraries' use of software filters, in our view, finds further support in the extent to which public libraries' provision of Internet access promotes First Amendment values in an analogous manner to traditional public fora, such as sidewalks and parks, in which content-based restrictions on speech are always subject to strict scrutiny. The public library, by its very nature, is "designed for freewheeling inquiry." Bd. of Education v. Pico, 457 U.S. 853, 915 (1982) (Rehnquist, J., dissenting). As such, the library is a "mighty resource in the free marketplace of ideas," Minarcini v. Strongsville City Sch. Dist., 541 F.2d 577, 582 (6th Cir. 1976), and represents a "quintessential locus of the receipt of information." Kreimer v. Bureau of Police for Morristown, 958 F.2d 1242, 1255 (3d Cir. 1992); see also Sund v. City of Wichita Falls, 121 F. Supp. 2d 530, 547 (N.D. Tex. 2000) ("The right to receive information is vigorously enforced in the context of a public library . . . ."); cf. Int'l Soc'y for Krishna Consciousness, Inc. v. Lee, 505 U.S. 672, 681 (1992) ("[A] traditional public forum is property that has as 'a principal purpose . . . the free exchange of ideas.'") (quoting Cornelius v. NAACP Legal Def. & Educ. Fund, 473 U.S. 788, 800 (1985)). We acknowledge that the provision of Internet access in a public library does not enjoy the historical pedigree of streets, sidewalks, and parks as a vehicle of free expression. Nonetheless, we believe that it shares many of the characteristics of these traditional public fora that uniquely promote First Amendment values and accordingly warrant application of strict scrutiny to any content-based restriction on speech in these fora. Regulation of speech in streets, sidewalks, and parks is subject to the highest scrutiny not simply by virtue of history and tradition, but also because the speech-facilitating character of sidewalks and parks makes them distinctly deserving of First Amendment protection. Many of these same speech-promoting features of the traditional public forum appear in public libraries' provision of Internet access. First, public libraries, like sidewalks and parks, are generally open to any member of the public who wishes to receive the speech that these fora facilitate, subject only to narrow limitations. See Kreimer, 958 F.2d at 1260 (noting that a public library does not retain unfettered discretion "to choose whom it will permit to enter the Library," but upholding the library's right to exclude patrons who harass patrons or whose offensive personal hygiene precludes the library's use by other patrons). Moreover, like traditional public fora, public libraries are funded by taxpayers and therefore do not charge members of the public each time they use the forum. The only direct cost to library patrons who wish to receive information, whether via the Internet or the library's print collection, is the time spent reading. By providing Internet access to millions of Americans to whom such access would otherwise be unavailable, public libraries play a critical role in bridging the digital divide separating those with access to new information technologies from those that lack access. See generally National Telecommunications and Information Administration, U.S. Department of Commerce, Falling Through the Net: Defining the Digital Divide (1999), available at http://www.ntia.doc.gov/ntiahome/fttn99/contents.html. Cf. Velazquez, 531 U.S. at 546 (invalidating a content-based restriction on the speech of federally funded legal services corporations and noting that given the financial hardship of legal services corporations' clients, "[t]he restriction on speech is even more problematic because in cases where the attorney withdraws from a representation, the client is unlikely to find other counsel"). Public libraries that provide Internet access greatly expand the educational opportunities for millions of Americans who, as explained in the margin, would otherwise be deprived of the benefits of this new medium. Just as important as the openness of a forum to listeners is its openness to speakers. Parks and sidewalks are paradigmatic loci of First Amendment values in large part because they permit speakers to communicate with a wide audience at low cost. One can address members of the public in a park for little more than the cost of a soapbox, and one can distribute handbills on the sidewalk for little more than the cost of a pen, paper, and some photocopies. See Martin v. City of Struthers, 319 U.S. 141, 146 (1943) ("Door to door distribution of circulars is essential to the poorly financed causes of little people."); Laurence H. Tribe, American Constitutional Law Sec. 12-24 at 987 (2d ed. 1988) ("The 'public forum' doctrine holds that restrictions on speech should be subject to higher scrutiny when, all other things being equal, that speech occurs in areas playing a vital role in communication – such as in those places historically associated with first amendment activities, such as streets, sidewalks, and parks – especially because of how indispensable communication in these places is to people who lack access to more elaborate (and more costly) channels."); Daniel A. Farber, Free Speech without Romance: Public Choice and the First Amendment, 105 Harv. L. Rev. 554, 574 n.86 (1991) (noting that traditional public fora "are often the only place where less affluent groups and individuals can effectively express their message"); Harry Kalven, Jr., The Concept of the Public Forum: Cox v. Louisiana, 1965 Sup. Ct. Rev. 1, 30 ("[T]he parade, the picket, the leaflet, the sound truck, have been the media of communication exploited by those with little access to the more genteel means of communication."). Similarly, given the existence of message boards and free Web hosting services, a speaker can, via the Internet, address the public, including patrons of public libraries, for little more than the cost of Internet access. As the Supreme Court explained in Reno v. ACLU, 521 U.S. 844 (1997), "the Internet can hardly be considered a 'scarce' expressive commodity. It provides relatively unlimited, low-cost capacity for communication of all kinds." Id. at 870. Although the cost of a home computer and Internet access considerably exceeds the cost of a soapbox or a few hundred photocopies, speakers wishing to avail themselves of the Internet may gain free access in schools, workplaces, or the public library. As Professor Lessig has explained: The "press" in 1791 was not the New York Times or the Wall Street Journal. It did not comprise large organizations of private interests, with millions of readers associated with each organization. Rather, the press then was much like the Internet today. The cost of a printing press was low, the readership was slight, and anyone (within reason) could become a publisher – and in fact an extraordinary number did. When the Constitution speaks of the rights of the "press," the architecture it has in mind is the architecture of the Internet. Lawrence Lessig, Code 183 (1999). While public libraries' provision of Internet access shares many of the speech-promoting qualities of traditional public fora, it also facilitates speech in ways that traditional public fora cannot. In particular, whereas the architecture of real space limits the audience of a pamphleteer or soapbox orator to people within the speaker's immediate vicinity, the Internet renders the geography of speaker and listener irrelevant: Through the use of chat rooms, any person with a phone line can become a town crier with a voice that resonates farther than it could from any soapbox. Through the use of Web pages, mail exploders, and newsgroups, the same individual can become a pamphleteer. Reno, 521 U.S. at 870 . By providing patrons with Internet access, public libraries in effect open their doors to an unlimited number of potential speakers around the world, inviting the speech of any member of the public who wishes to communicate with library patrons via the Internet. Due to the low costs for speakers and the irrelevance of geography, the volume of speech available to library patrons on the Internet is enormous and far exceeds the volume of speech available to audiences in traditional public fora. See id. at 868 (referring to "the vast democratic forums of the Internet"). Indeed, as noted in our findings of fact, the Web is estimated to contain over one billion pages, and is said to be growing at a rate of over 1.5 million pages per day. See id. at 885 (noting "[t]he dramatic expansion of this new marketplace of ideas"). This staggering volume of content on the Internet "is as diverse as human thought," id. at 870, and "is thus comparable, from the reader's viewpoint, to . . . a vast library including millions of readily available and indexed publications," id. at 853. As a result of the Internet's unique speech-facilitating qualities, "it is hard to find an aspiring social movement, new or old, of left, right, or center, without a website, a bulletin board, and an email list." Kreimer, supra n.27, at 125. "[T]he growth of the Internet has been and continues to be phenomenal." Reno, 521 U.S. at 885. This extraordinary growth of the Internet illustrates the extent to which the Internet promotes First Amendment values in the same way that the historical use of traditional public fora for speaking, handbilling, and protesting testifies to their effectiveness as vehicles for free speech. Cf. Martin, 319 U.S. at 145 ("The widespread use of this method of communication [door-to-door distribution of leaflets] by many groups espousing various causes attests its major importance."); Schneider v. State, 308 U.S. 147, 164 (1939) ("[P]amphlets have proved most effective instruments in the dissemination of opinion."). The provision of Internet access in public libraries, in addition to sharing the speech-enhancing qualities of fora such as streets, sidewalks, and parks, also supplies many of the speech-enhancing properties of the postal service, which is open to the public at large as both speakers and recipients of information, and provides a relatively low-cost means of disseminating information to a geographically dispersed audience. See Lamont v. Postmaster Gen., 381 U.S. 301 (1965) (invalidating a content-based prior restraint on the use of the mails); see also Blount v. Rizzi, 400 U.S. 410 (1971) (same). Indeed, the Supreme Court's description of the postal system in Lamont seems equally apt as a description of the Internet today: "the postal system . . . is now the main artery through which the business, social, and personal affairs of the people are conducted . . . ." 381 U.S. at 305 n.3. In short, public libraries, by providing their patrons with access to the Internet, have created a public forum that provides any member of the public free access to information from millions of speakers around the world. The unique speech-enhancing character of Internet use in public libraries derives from the openness of the public library to any member of the public seeking to receive information, and the openness of the Internet to any member of the public who wishes to speak. In particular, speakers on the Internet enjoy low barriers to entry and the ability to reach a mass audience, unhindered by the constraints of geography. Moreover, just as the development of new media "presents unique problems, which inform our assessment of the interests at stake, and which may justify restrictions that would be unacceptable in other contexts," United States v. Playboy Entm't Group, Inc., 529 U.S. 803, 813 (2000), the development of new media, such as the Internet, also presents unique possibilities for promoting First Amendment values, which also inform our assessment of the interests at stake, and which we believe, in the context of the provision of Internet access in public libraries, justify the application of heightened scrutiny to content-based restrictions that might be subject to only rational review in other contexts, such as the development of the library's print collection. Cf. id. at 818 ("Technology expands the capacity to choose; and it denies the potential of this revolution if we assume the Government is best positioned to make these choices for us."). A faithful translation of First Amendment values from the context of traditional public fora such as sidewalks and parks to the distinctly non-traditional public forum of Internet access in public libraries requires, in our view, that content-based restrictions on Internet access in public libraries be subject to the same exacting standards of First Amendment scrutiny as content-based restrictions on speech in traditional public fora such as sidewalks, town squares, and parks: The architecture of the Internet, as it is right now, is perhaps the most important model of free speech since the founding. . . . Two hundred years after the framers ratified the Constitution, the Net has taught us what the First Amendment means. . . . The model for speech that the framers embraced was the model of the Internet – distributed, noncentralized, fully free and diverse. Lessig, Code, at 167, 185. Indeed, "[m]inds are not changed in streets and parks as they once were. To an increasing degree, the more significant interchanges of ideas and shaping of public consciousness occur in mass and electronic media." Denver Area Educ. Telecomms. Consortium, Inc. v. FCC, 518 U.S. 727, 802-03 (1996) (Kennedy, J., concurring in the judgment). In providing patrons with even filtered Internet access, a public library is not exercising editorial discretion in selecting only speech of particular quality for inclusion in its collection, as it may do when it decides to acquire print materials. By providing its patrons with Internet access, public libraries create a forum in which any member of the public may receive speech from anyone around the world who wishes to disseminate information over the Internet. Within this "vast democratic forum[]," Reno, 521 U.S. at 868, which facilitates speech that is "as diverse as human thought," id. at 870, software filters single out for exclusion particular speech on the basis of its disfavored content. We hold that these content- based restrictions on patrons' access to speech are subject to strict scrutiny. 4. Application of Strict Scrutiny Having concluded that strict scrutiny applies to public libraries' content-based restrictions on patrons' access to speech on the Internet, we must next determine whether a public library's use of Internet software filters can survive strict scrutiny. To survive strict scrutiny, a restriction on speech "must be narrowly tailored to promote a compelling Government interest. If a less restrictive alternative would serve the Government's purpose, the legislature must use that alternative." United States v. Playboy Entm't Group, Inc., 529 U.S. 803, 813 (2000) (citation omitted); see also Fabulous Assocs., Inc. v. Pa. Pub. Util. Comm'n, 896 F.2d 780, 787 (3d Cir. 1990) (holding that a content-based burden on speech is permissible "only if [the government] shows that the restriction serves a compelling interest and that there are no less restrictive alternatives"). The application of strict scrutiny to a public library's use of filtering products thus requires three distinct inquiries. First, we must identify those compelling government interests that the use of filtering software promotes. It is then necessary to analyze whether the use of software filters is narrowly tailored to further those interests. Finally, we must determine whether less restrictive alternatives exist that would promote the state interest. 1. State Interests We begin by identifying those legitimate state interests that a public library's use of software filters promotes. 1. Preventing the Dissemination of Obscenity, Child Pornography, and Material Harmful to Minors On its face, CIPA is clearly intended to prevent public libraries' Internet terminals from being used to disseminate to library patrons visual depictions that are obscene, child pornography, or in the case of minors, harmful to minors. See CIPA Sec. 1712 (codified at 20 U.S.C. Sec. 9134(f)(1)(A) & (B)), Sec. 1721(b) (codified at 47 U.S.C. Sec. 254(h)(6)(B) & (C)) (requiring any library that receives E-rate discounts to certify that it is enforcing "a policy of Internet safety that includes the operation of a technology protection measure with respect to any of its computers with Internet access that protects against access through such computers to visual depictions" that are "obscene" or "child pornography," and, when the computers are in use by minors, also protects against access to visual depictions that are "harmful to minors"). The government's interest in preventing the dissemination of obscenity, child pornography, or, in the case of minors, material harmful to minors, is well-established. Speech that is obscene, under the legal definition of obscenity set forth in the margin, is unprotected under the First Amendment, and accordingly the state has a compelling interest in preventing its distribution. See Miller v. California, 413 U.S. 15, 18 (1973) ("This Court has recognized that the States have a legitimate interest in prohibiting dissemination or exhibition of obscene material."); Stanley v. Georgia, 394 U.S. 557, 563 (1969) ("[T]he First and Fourteenth Amendments recognize a valid governmental interest in dealing with the problem of obscenity."); Roth v. United States, 354 U.S. 476, 485 (1957) ("We hold that obscenity is not within the area of constitutionally protected speech of press."). The First Amendment also permits the state to prohibit the distribution to minors of material that, while not obscene with respect to adults, is obscene with respect to minors. See Ginsberg v. New York, 390 U.S. 629, 637 (1968) (holding that it is constitutionally permissible "to accord minors under 17 a more restricted right than that assured to adults to judge and determine for themselves what sex material they may read or see"). Proscribing the distribution of such material to minors is constitutionally justified by the government's well-recognized interest in safeguarding minors' well-being. See Reno v. ACLU, 521 U.S. 844, 869-70 (1997) ("[T]here is a compelling interest in protecting the physical and psychological well-being of minors which extend[s] to shielding them from indecent messages that are not obscene by adult standards . . . .") (internal quotation marks and citation omitted); New York v. Ferber, 458 U.S. 747, 756-57 (1982) ("It is evident beyond the need for elaboration that a State's interest in safeguarding the physical and psychological well-being of a minor is compelling.") (internal quotation marks and citation omitted); Ginsberg, 390 U.S. at 640 ("The State . . . has an independent interest in the well-being of its youth."). The government's compelling interest in protecting the well- being of its youth justifies laws that criminalize not only the distribution to minors of material that is harmful to minors, but also the possession and distribution of child pornography. See Osborne v. Ohio, 495 U.S. 103, 111 (1990) (holding that a state "may constitutionally proscribe the possession and viewing of child pornography"); Ferber, 458 U.S. at 757, 763 (noting that "[t]he prevention of sexual exploitation and abuse of children constitutes a government objective of surpassing importance," and holding that "child pornography [is] a category of material outside the protection of the First Amendment"). Thus, a public library's use of software filters survives strict scrutiny if it is narrowly tailored to further the state's well-recognized interest in preventing the dissemination of obscenity and child pornography, and in preventing minors from being exposed to material harmful to their well-being. 2. Protecting the Unwilling Viewer Several of the libraries that use filters assert that filters serve the libraries' interest in preventing patrons from being unwillingly exposed to sexually explicit speech that the patrons find offensive. Nearly every library proffered by either the government or the plaintiffs received complaints, in varying degrees of frequency, from library patrons who saw other patrons accessing sexually explicit material on the library's Internet terminals. In general, First Amendment jurisprudence is reluctant to recognize a legitimate state interest in protecting the unwilling viewer from speech that is constitutionally protected. "Where the designed benefit of a content-based speech restriction is to shield the sensibilities of listeners, the general rule is that the right of expression prevails, even where no less restrictive alternative exists. We are expected to protect our own sensibilities simply by averting our eyes." Playboy, 529 U.S. at 813 (2000) (internal quotation marks and citation omitted); see also Erznoznik v. City of Jacksonville, 422 U.S. 205, 209 (1975) ("[W]hen the government, acting as censor, undertakes selectively to shield the public from some kinds of speech on the ground that they are more offensive than others, the First Amendment strictly limits its power."). For example, in Cohen v. California, 403 U.S. 15 (1971), the Supreme Court reversed defendant's conviction for wearing, in a municipal courthouse, a jacket bearing the inscription "Fuck the Draft." The Court noted that "much has been made of the claim that Cohen's distasteful mode of expression was thrust upon unwilling or unsuspecting viewers, and that the State might therefore legitimately act as it did in order to protect the sensitive from otherwise unavoidable exposure to appellant's crude form of protest." Id. at 21. This justification for suppressing speech failed, however, because it "would effectively empower a majority to silence dissidents simply as a matter of personal predilections." Id. The Court concluded that "[t]hose in the Los Angeles courthouse could effectively avoid further bombardment of their sensibilities simply by averting their eyes." Id. Similarly, in Erznoznik, the Court invalidated on its face a municipal ordinance prohibiting drive-in movie theaters from showing films containing nudity if they were visible from a public street or place. The city's "primary argument [was] that it may protect its citizens against unwilling exposure to materials that may be offensive." 422 U.S. at 208. The Court soundly rejected this interest in shielding the unwilling viewer: The plain, if at times disquieting, truth is that in our pluralistic society, constantly proliferating new and ingenious forms of expression, we are inescapably captive audiences for many purposes. Much that we encounter offends our esthetic, if not our political and moral, sensibilities. Nevertheless, the Constitution does not permit government to decide which types of otherwise protected speech are sufficiently offensive to require protection for the unwilling listener or viewer. Rather, absent . . . narrow circumstances . . . the burden normally falls upon the viewer to avoid further bombardment of his sensibilities simply by averting his eyes. 422 U.S. at 210-11 (internal quotation marks and citation omitted). The state's interest in protecting unwilling viewers from exposure to patently offensive material is accounted for, to some degree, by obscenity doctrine, which originated in part to permit the state to shield the unwilling viewer. "The Miller standard, like its predecessors, was an accommodation between the State's interests in protecting the sensibilities of unwilling recipients from exposure to pornographic material and the dangers of censorship inherent in unabashedly content-based laws." Ferber, 458 U.S. at 756 (internal quotation marks and citation omitted); see also Miller, 413 U.S. at 18-19 ("This Court has recognized that the States have a legitimate interest in prohibiting dissemination or exhibition of obscene material when the mode of dissemination carries with it a significant danger of offending the sensibilities of unwilling recipients or of exposure to juveniles.") (citation omitted). To the extent that speech has serious literary, artistic, political, or scientific value, and therefore is not obscene under the Miller test of obscenity, the state's interest in shielding unwilling viewers from such speech is tenuous. Nonetheless, the Court has recognized that in certain limited circumstances, the state has a legitimate interest in protecting the public from unwilling exposure to speech that is not obscene. This interest has justified restrictions on speech "when the speaker intrudes on the privacy of the home, or the degree of captivity makes it impractical for the unwilling viewer or auditor to avoid exposure." Erznoznik, 422 U.S. at 209 (citations omitted). Thus, in FCC v. Pacifica Foundation, 438 U.S. 726 (1978), the Court relied on the state's interest in shielding viewers' sensibilities to uphold a prohibition against profanity in radio broadcasts: Patently offensive, indecent material presented over the airwaves confronts the citizen, not only in public, but also in the privacy of the home, where the individual's right to be left alone plainly outweighs the First Amendment rights of an intruder. Because the broadcast audience is constantly tuning in and out, prior warnings cannot completely protect the listener or viewer from unexpected program content. Id. at 748 (citation omitted); accord Frisby v. Schultz, 487 U.S. 474, 485 (1988) ("Although in many locations, we expect individuals simply to avoid speech they do not want to hear, the home is different."); see also Lehman v. City of Shaker Heights, 418 U.S. 298, 302 (1974) (plurality opinion) (upholding a content-based restriction on the sale of advertising space in public transit vehicles and noting that "[t]he streetcar audience is a captive audience"). Although neither the Supreme Court nor the Third Circuit has recognized a compelling state interest in shielding the sensibilities of unwilling viewers, beyond laws intended to preserve the privacy of individuals' homes or to protect captive audiences, we do not read the case law as categorically foreclosing recognition, in the public library setting, of the state's interest in protecting unwilling viewers. See Pacifica, 438 U.S. at 749 n.27 ("Outside the home, the balance between the offensive speaker and the unwilling audience may sometimes tip in favor of the speaker, requiring the offended listener to turn away.") (emphasis added). Under certain circumstances, therefore a public library might have a compelling interest in protecting library patrons and staff from unwilling exposure to sexually explicit speech that, although not obscene, is patently offensive. 3. Preventing Unlawful or Inappropriate Conduct Several of the librarians proffered by the government testified that unfiltered Internet access had led to occurrences of criminal or otherwise inappropriate conduct by library patrons, such as public masturbation, and harassment of library staff and patrons, sometimes rising to the level of physical assault. As in the case with patron complaints, however, the government adduced no quantitative data comparing the frequency of criminal or otherwise inappropriate patron conduct before the library's use of filters and after the library's use of filters. The sporadic anecdotal accounts of the government's library witnesses were countered by anecdotal accounts by the plaintiffs' library witnesses, that incidents of offensive patron behavior in public libraries have long predated the advent of Internet access. Aside from a public library's interest in preventing patrons from using the library's Internet terminals to receive obscenity or child pornography, which constitutes criminal conduct, we are constrained to reject any compelling state interest in regulating patrons' conduct as a justification for content-based restrictions on patrons' Internet access. "[T]he Court's First Amendment cases draw vital distinctions between words and deeds, between ideas and conduct." Ashcroft, 122 S. Ct. at 1403. First Amendment jurisprudence makes clear that speech may not be restricted on the ground that restricting speech will reduce crime or other undesirable behavior that the speech is thought to cause, subject to only a narrow exception for speech that "is directed to inciting or producing imminent lawless action and is likely to incite or produce such action." Brandenburg v. Ohio, 395 U.S. 444, 447 (1969) (per curiam). "The mere tendency of speech to encourage unlawful acts is insufficient reason for banning it." Ashcroft, 122 S. Ct. at 1403. Outside of the narrow "incitement" exception, the appropriate method of deterring unlawful or otherwise undesirable behavior is not to suppress the speech that induces such behavior, but to attach sanctions to the behavior itself. "Among free men, the deterrents ordinarily to be applied to prevent crime are education and punishment for violations of the law, not abridgement of the rights of free speech." Kingsley Int'l Pictures Corp. v. Regents of the Univ. of the State of New York, 360 U.S. 684, 689 (1959) (quoting Whitney v. Cal., 274 U.S. 357, 378 (1927) (Brandeis, J., concurring)); see also Bartnicki v. Vopper, 532 U.S. 514, 529 (2001) ("The normal method of deterring unlawful conduct is to impose an appropriate punishment on the person who engages in it."). 4. Summary In sum, we reject a public library's interest in preventing unlawful or otherwise inappropriate patron conduct as a basis for restricting patrons' access to speech on the Internet. The proper method for a library to deter unlawful or inappropriate patron conduct, such as harassment or assault of other patrons, is to impose sanctions on such conduct, such as either removing the patron from the library, revoking the patron's library privileges, or, in the appropriate case, calling the police. We believe, however, that the state interests in preventing the dissemination of obscenity, child pornography, or in the case of minors, material harmful to minors, and in protecting library patrons from being unwillingly exposed to offensive, sexually explicit material, could all justify, for First Amendment purposes, a public library's use of Internet filters, provided that use of such filters is narrowly tailored to further those interests, and that no less restrictive means of promoting those interests exist. Accordingly, we turn to the narrow tailoring question. 2. Narrow Tailoring Having identified the relevant state interests that could justify content-based restrictions on public libraries' provision of Internet access, we must determine whether a public library's use of software filters is narrowly tailored to further those interests. "It is not enough to show that the Government's ends are compelling; the means must be carefully tailored to achieve those ends." Sable Communications of Cal., Inc. v. FCC, 492 U.S. 115, 126 (1989). "[M]anifest imprecision of [a] ban . . . reveals that its proscription is not sufficiently tailored to the harms it seeks to prevent to justify . . . substantial interference with . . . speech." FCC v. League of Women Voters of Cal., 468 U.S. 364, 392 (1984). The commercially available filters on which evidence was presented at trial all block many thousands of Web pages that are clearly not harmful to minors, and many thousands more pages that, while possibly harmful to minors, are neither obscene nor child pornography. See supra, Subsection II.E.7. Even the defendants' own expert, after analyzing filtering products' performance in public libraries, concluded that of the blocked Web pages to which library patrons sought access, between 6% and 15% contained no content that meets even the filtering products' own definitions of sexually explicit content, let alone the legal definitions of obscenity or child pornography, which none of the filtering companies that were studied use as the basis for their blocking decisions. Moreover, in light of the flaws in these studies, discussed in detail in our findings of fact above, these percentages significantly underestimate the amount of speech that filters erroneously block, and at best provide a rough lower bound on the filters' rates of overblocking. Given the substantial amount of constitutionally protected speech blocked by the filters studied, we conclude that use of such filters is not narrowly tailored with respect to the government's interest in preventing the dissemination of obscenity, child pornography, and material harmful to minors. To be sure, the quantitative estimates of the rates of overblocking apply only to those four commercially available filters analyzed by plaintiffs' and defendants' expert witnesses. Nonetheless, given the inherent limitations in the current state of the art of automated classification systems, and the limits of human review in relation to the size, rate of growth, and rate of change of the Web, there is a tradeoff between underblocking and overblocking that is inherent in any filtering technology, as our findings of fact have demonstrated. We credit the testimony of plaintiffs' expert witness, Dr. Geoffrey Nunberg, that no software exists that can automatically distinguish visual depictions that are obscene, child pornography, or harmful to minors, from those that are not. Nor can software, through keyword analysis or more sophisticated techniques, consistently distinguish web pages that contain such content from web pages that do not. In light of the absence of any automated method of classifying Web pages, filtering companies are left with the Sisyphean task of using human review to identify, from among the approximately two billion web pages that exist, the 1.5 million new pages that are created daily, and the many thousands of pages whose content changes from day to day, those particular web pages to be blocked. To cope with the Web's extraordinary size, rate of growth, and rate of change, filtering companies that rely solely on human review to block access to material falling within their category definitions must use a variety of techniques that will necessarily introduce substantial amounts of overblocking. These techniques include blocking every page of a Web site that contains only some content falling within the filtering companies' category definitions, blocking every Web site that shares an IP-address with a Web site whose content falls within the category definitions, blocking "loophole sites," such as anonymizers, cache sites, and translation sites, and allocating staff resources to reviewing content of uncategorized pages rather than re-reviewing pages, domain names, or IP-addresses that have been already categorized to determine whether their content has changed. While a filtering company could choose not to use these techniques, due to the overblocking errors they introduce, if a filtering company does not use such techniques, its filter will be ineffective at blocking access to speech that falls within its category definitions. Thus, while it would be easy to design, for example, a filter that blocks only ten Web sites, all of which are either obscene, child pornography, or harmful to minors, and therefore completely avoids overblocking, such a filter clearly would not comply with CIPA, since it would fail to offer any meaningful protection against the hundreds of thousands of Web sites containing speech in these categories. As detailed in our findings of fact, any filter that blocks enough speech to protect against access to visual depictions that are obscene, child pornography, and harmful to minors, will necessarily overblock substantial amounts of speech that does not fall within these categories. This finding is supported by the government's failure to produce evidence of any filtering technology that avoids overblocking a substantial amount of protected speech. Where, as here, strict scrutiny applies to a content-based restriction on speech, the burden rests with the government to show that the restriction is narrowly tailored to serve a compelling government interest. See Playboy, 529 U.S. at 816 ("When the Government restricts speech, the Government bears the burden of proving the constitutionality of its actions."); see also R.A.V. v. City of St. Paul, 505 U.S. 377, 382 (1992) ("Content-based regulations are presumptively invalid."). Thus, it is the government's burden, in this case, to show the existence of a filtering technology that both blocks enough speech to qualify as a technology protection measure, for purposes of CIPA, and avoids overblocking a substantial amount of constitutionally protected speech. Here, the government has failed to meet its burden. Indeed, as discussed in our findings of fact, every technology protection measure used by the government's library witnesses or analyzed by the government's expert witnesses blocks access to a substantial amount of speech that is constitutionally protected with respect to both adults and minors. In light of the credited testimony of Dr. Nunberg, and the inherent tradeoff between overblocking and underblocking, together with the government's failure to offer evidence of any technology protection measure that avoids overblocking, we conclude that any technology protection measure that blocks a sufficient amount of speech to comply with CIPA's requirement that it "protect[] against access through such computers to visual depictions that are – (I) obscene; (II) child pornography; or (III) harmful to minors" will necessarily block substantial amounts of speech that does not fall within these categories. CIPA Sec. 1712 (codified at 20 U.S.C. Sec. 9134(f)(1)(A)). Hence, any public library's use of a software filter required by CIPA will fail to be narrowly tailored to the government's compelling interest in preventing the dissemination, through Internet terminals in public libraries, of visual depictions that are obscene, child pornography, or harmful to minors. Where, as here, strict scrutiny applies, the government may not justify restrictions on constitutionally protected speech on the ground that such restrictions are necessary in order for the government effectively to suppress the dissemination of constitutionally unprotected speech, such as obscenity and child pornography. "The argument . . . that protected speech may be banned as a means to ban unprotected speech . . . . turns the First Amendment upside down. The Government may not suppress lawful speech as the means to suppress unlawful speech." Ashcroft, 122 S. Ct. at 1404. This rule reflects the judgment that "[t]he possible harm to society in permitting some unprotected speech to go unpunished is outweighed by the possibility that protected speech of others may be muted . . . ." Broadrick v. Oklahoma, 413 U.S. at 612. Thus, in Ashcroft, the Supreme Court rejected the government's argument that a statute criminalizing the distribution of constitutionally protected "virtual" child pornography, produced through computer imaging technology without the use of real children, was necessary to further the state's interest in prosecuting the dissemination of constitutionally unprotected child pornography produced using real children, since "the possibility of producing images by using computer imaging makes it very difficult for [the government] to prosecute those who produce pornography using real children." Ashcroft, 122 S. Ct. at 1404; see also Stanley, 394 U.S. at 567-58 (holding that individuals have a First Amendment right to possess obscene material, even though the existence of this right makes it more difficult for the states to further their legitimate interest in prosecuting the distribution of obscenity). By the same token, even if the use of filters is effective in preventing patrons from receiving constitutionally unprotected speech, the government's interest in preventing the dissemination of such speech cannot justify the use of the technology protection measures mandated by CIPA, which necessarily block substantial amounts of constitutionally protected speech. CIPA thus resembles the Communications Decency Act, which the Supreme Court facially invalidated in Reno v. ACLU, 521 U.S. 844 (1997). Although on its face, the CDA simply restricted the distribution to minors of speech that was constitutionally unprotected with respect to minors, as a practical matter, given Web sites' difficulties in identifying the ages of Internet users, the CDA effectively prohibited the distribution to adults of material that was constitutionally protected with respect to adults. Similarly, although on its face, CIPA, like the CDA, requires the suppression of only constitutionally unprotected speech, it is impossible as a practical matter, given the state of the art of filtering technology, for a public library to comply with CIPA without also blocking significant amounts of constitutionally protected speech. We therefore hold that a library's use of a technology protection measure required by CIPA is not narrowly tailored to the government's legitimate interest in preventing the dissemination of visual depictions that are obscene, child pornography, or in the case of minors, harmful to minors. For the same reason that a public library's use of software filters is not narrowly tailored to further the library's interest in preventing its computers from being used to disseminate visual depictions that are obscene, child pornography, and harmful to minors, a public library's use of software filters is not narrowly tailored to further the library's interest in protecting patrons from being unwillingly exposed to offensive, sexually explicit material. As discussed in our findings of fact, the filters required by CIPA block substantial numbers of Web sites that even the most puritanical public library patron would not find offensive, such as http://federo.com, a Web site that promotes federalism in Uganda, which N2H2 blocked as "Adults Only, Pornography," and http://www.vvm.com/~bond/home.htm, a site for aspiring dentists, which was blocked by Cyberpatrol as "Adult/Sexually Explicit." We list many more such examples in our findings of fact, see supra, and find that such erroneously blocked sites number in at least the thousands. Although we have found large amounts of overblocking, even if only a small percentage of sites blocked are erroneously blocked, either with respect to the state's interest in preventing adults from viewing material that is obscene or child pornography and in preventing minors from viewing material that is harmful to minors, or with respect to the state's interest in preventing library patrons generally from being unwillingly exposed to offensive, sexually explicit material, this imprecision is fatal under the First Amendment. Cf. Reno, 521 U.S. at 874 ("[T]he CDA lacks the precision that the First Amendment requires when a statute regulates the content of speech."); League of Women Voters, 468 U.S. at 398 ("[E]ven if some of the hazards at which [the challenged provision] was aimed are sufficiently substantial, the restriction is not crafted with sufficient precision to remedy those dangers that may exist to justify the significant abridgement of speech worked by the provision's broad ban . . . ."). While the First Amendment does not demand perfection when the government restricts speech in order to advance a compelling interest, the substantial amounts of erroneous blocking inherent in the technology protection measures mandated by CIPA are more than simply de minimis instances of human error. "The line between speech unconditionally guaranteed and speech which may legitimately be regulated, suppressed, or punished is finely drawn. Error in marking that line exacts an extraordinary cost." Playboy, 529 U.S. at 817 (internal quotation marks and citation omitted). Indeed, "precision of regulation must be the touchstone in an area so closely touching our most precious freedoms." Keyishian v. Bd. of Regents of the Univ. of the State of N.Y., 385 U.S. 589, 603 (1967) (internal quotation marks and citation omitted); see also Bantam Books, Inc. v. Sullivan, 372 U.S. 58, 66 (1963) ("The separation of legitimate from illegitimate speech calls for sensitive tools.") (internal quotation marks and citation omitted). Where the government draws content-based restrictions on speech in order to advance a compelling government interest, the First Amendment demands the precision of a scalpel, not a sledgehammer. We believe that a public library's use of the technology protection measures mandated by CIPA is not narrowly tailored to further the governmental interests at stake. Although the strength of different libraries' interests in blocking certain forms of speech may vary from library to library, depending on the frequency and severity of problems experienced by each particular library, we conclude, based on our findings of fact, that any public library's use of a filtering product mandated by CIPA will necessarily fail to be narrowly tailored to address the library's legitimate interests. Because it is impossible for a public library to comply with CIPA without blocking substantial amounts of speech whose suppression serves no legitimate state interest, we therefore hold that CIPA is facially invalid, even under the more stringent standard of facial invalidity urged on us by the government, which would require upholding CIPA if it is possible for just a single library to comply with CIPA's conditions without violating the First Amendment. See supra Part III. 3. Less Restrictive Alternatives The constitutional infirmity of a public library's use of software filters is evidenced not only by the absence of narrow tailoring, but also by the existence of less restrictive alternatives that further the government's legitimate interests. See Playboy, 529 U.S. at 813 ("If a less restrictive alternative would serve the Government's purpose, the legislature must use that alternative."); Sable, 492 U.S. at 126 ("The Government may . . . regulate the content of constitutionally protected speech in order to promote a compelling interest if it chooses the least restrictive means to further the articulated interest."). As is the case with the narrow tailoring requirement, the government bears the burden of proof in showing the ineffectiveness of less restrictive alternatives. "When a plausible, less restrictive alternative is offered to a content- based speech restriction, it is the Government's obligation to prove that the alternative will be ineffective to achieve its goals." Playboy, 529 U.S. at 816; see also Reno, 521 U.S. at 879 ("The breadth of this content-based restriction of speech imposes an especially heavy burden on the Government to explain why a less restrictive provision would not be as effective . . . ."); Fabulous Assocs., Inc. v. Pa. Pub. Util. Comm'n, 896 F.2d 780, 787 (3d Cir. 1990) ("We focus . . . on the more difficult question whether the Commonwealth has borne its heavy burden of demonstrating that the compelling state interest could not be served by restrictions that are less intrusive on protected forms of expression.") (internal quotation marks and citation omitted). We find that there are plausible, less restrictive alternatives to the use of software filters that would serve the government's interest in preventing the dissemination of obscenity and child pornography to library patrons. In particular, public libraries can adopt Internet use policies that make clear to patrons that the library's Internet terminals may not be used to access illegal content. Libraries can ensure that their patrons are aware of such policies by posting them in prominent places in the library, requiring patrons to sign forms agreeing to comply with the policy before the library issues library cards to patrons, and by presenting patrons, when they log on to one of the library's Internet terminals, with a screen that requires the user to agree to comply with the library's policy before allowing the user access to the Internet. Libraries can detect violations of their Internet use policies either through direct observation or through review of the library's Internet use logs. In some cases, library staff or patrons may directly observe a patron accessing obscenity and child pornography. Libraries' Internet use logs, however, also provide libraries with a means of detecting violations of their Internet use policies. These logs, which can be kept regardless whether a library uses filtering software, record the URL of every Web page accessed by patrons. Although ordinarily the logs do not link particular URLs with particular patrons, it is possible, using access logs, to identify the patron who viewed the Web page corresponding to a particular URL, if library staff discover in the access logs the URL of a Web page containing obscenity or child pornography. For example, David Biek, Director of Tacoma Public Library's main branch, testified that in the course of scanning Internet use logs he has found what looked like attempts to access child pornography, notwithstanding the fact that Tacoma uses Websense filtering software. In two cases, he communicated his findings to law enforcement and turned over the logs to law enforcement in response to a subpoena. Once a violation of a library's Internet use policy is detected through the methods described above, a library may either issue the patron a warning, revoke the patron's Internet privileges, or notify law enforcement, if the library believes that the patron violated either state obscenity laws or child pornography laws. Although these methods of detecting use of library computers to access illegal content are not perfect, and a library, out of respect for patrons' privacy, may choose not to adopt such policies, the government has failed to show that such methods are substantially less effective at preventing patrons from accessing obscenity and child pornography than software filters. As detailed in our findings of fact, the underblocking that results from the size, rate of change, and rate of growth of the Internet significantly impairs the software filters from preventing patrons from accessing obscenity and child pornography. Unless software filters are themselves perfectly effective at preventing patrons from accessing obscenity and child pornography, "[i]t is no response that [a less restrictive alternative] . . . may not go perfectly every time." Playboy, 529 U.S. at 824; cf. Denver Area Educ. Telecomm. Consortium, Inc. v. FCC, 518 U.S. 727, 759 (1996) ("No provision . . . short of an absolute ban, can offer certain protection against assault by a determined child."). The government has not offered any data comparing the frequency with which obscenity and child pornography is accessed at libraries that enforce their Internet use policies through software filters with the frequency with which obscenity and child pornography is accessed at public libraries that enforce their Internet use policies through methods other than software filters. Although the government's library witnesses offered anecdotal accounts of a reduction in the use of library computers to access sexually explicit speech when filtering software was mandated, these anecdotal accounts are not a substitute for more robust analyses comparing the use of library computers to access child pornography and material that meets the legal definition of obscenity in libraries that use blocking software and in libraries that use alternative methods. Cf. Playboy, 529 U.S. at 822 ("[T]he Government must present more than anecdote and supposition."). We acknowledge that some library staff will be uncomfortable using the "tap-on-the-shoulder" method of enforcing the library's policy against using Internet terminals to access obscenity and child pornography. The Greenville County Library, for example, experienced high turnover among library staff when staff were required to enforce the library's Internet use policy through the tap-on-the-shoulder technique. Given filters' inevitable underblocking, however, even a library that uses filtering will have to resort to a tap-on-the-shoulder method of enforcement, where library staff observes a patron openly violating the library's Internet use policy, by, for example, accessing material that is obviously child pornography but that the filtering software failed to block. Moreover, a library employee's degree of comfort in using the tap-on-the-shoulder method will vary from employee to employee, and there is no evidence that it is impossible or prohibitively costly for public libraries to hire at least some employees who are comfortable enforcing the library's Internet use policy. We also acknowledge that use of a tap on the shoulder delegates to librarians substantial discretion to determine which Web sites a patron may view. Nonetheless, we do not believe that this putative "prior restraint" problem can be avoided through the use of software filters, for they effectively delegate to the filtering company the same unfettered discretion to determine which Web sites a patron may view. Moreover, as noted above, violations of a public library's Internet use policy may be detected not only by direct observation, but also by reviewing the library's Internet use logs after the fact, which alleviates the need for library staff to directly confront patrons while they are viewing obscenity or child pornography. Similar less restrictive alternatives exist for preventing minors from accessing material harmful to minors. First, libraries may use the tap-on-the-shoulder method when minors are observed using the Internet to access material that is harmful to minors. Requiring minors to use specific terminals, for example in a children's room, that are in direct view of library staff will increase the likelihood that library staff will detect minors' use of the Internet to access material harmful to minors. Alternatively, public libraries could require minors to use blocking software only if they are unaccompanied by a parent, or only if their parent consents in advance to their child's unfiltered use of the Internet. "A court should not assume that a plausible, less restrictive alternative would be ineffective; and a court should not presume parents, given full information, will fail to act." Playboy, 529 U.S. at 824. In contrast to the "harmful to minors" statute upheld in Ginsberg v. New York, 390 U.S. 629 (1968), which permitted parents to determine whether to provide their children with access to material otherwise prohibited by the statute, CIPA, like the Communications Decency Act, which the Court invalidated in Reno, contains no exception for parental consent: [W]e noted in Ginsberg that "the prohibition against sales to minors does not bar parents who so desire from purchasing the magazines for their children." Under the CDA, by contrast, neither the parents' consent – nor even their participation – in the communication would avoid the application of the statute. Reno, 521 U.S. at 865 (citation omitted); see also Ginsberg, 390 U.S. at 639 ("It is cardinal with us that the custody, care, and nurture of the child reside first in the parents, whose primary function and freedom include preparation for obligations the state can neither supply nor hinder." (quoting Prince v. Massachusetts, 321 U.S. 158, 166 (1944))). The Court in Playboy acknowledged that although a regime of permitting parents voluntarily to block cable channels containing sexually explicit programming might not be a completely effective alternative to the challenged law, which effectively required cable operators to transmit sexually explicit programming only during particular hours, the challenged law itself was not completely effective in serving the government's interest: There can be little doubt, of course, that under a voluntary blocking regime, even with adequate notice, some children will be exposed to signal bleed; and we need not discount the possibility that a graphic image could have a negative impact on a young child. It must be remembered, however, that children will be exposed to signal bleed under time channeling as well. . . . The record is silent as to the comparative effectiveness of the two alternatives. Playboy, 529 U.S. at 826. Similarly, in this case, the government has offered no evidence comparing the effectiveness of blocking software and alternative methods used by public libraries to protect children from material harmful to minors. Finally, there are other less restrictive alternatives to filtering software that further public libraries' interest in preventing patrons from unwillingly being exposed to patently offensive, sexually explicit content on the Internet. To the extent that public libraries are concerned with protecting patrons from accidentally encountering such material while using the Internet, public libraries can provide patrons with guidance in finding the material they want and avoiding unwanted material. Some public libraries also offer patrons the option of using filtering software, if they so desire. Cf. Rowan v. Post Office Dept., 397 U.S. 728 (1970) (upholding a federal statute permitting individuals to instruct the Postmaster General not to deliver advertisements that are "erotically arousing or sexually provocative"). With respect to protecting library patrons from sexually explicit content viewed by other patrons, public libraries have used a variety of less restrictive methods. One alternative is simply to segregate filtered from unfiltered terminals, and to place unfiltered terminals outside of patrons' sight-lines and areas of heavy traffic. Even the less restrictive alternative of allowing unfiltered access on only a single terminal, well out of the line of sight of other patrons, however, is not permitted under CIPA, which requires the use of a technology protection measure on every computer in the library. See CIPA Sec. 1721(b)(6)(C) (codified at 47 U.S.C. Sec. 254(h)(6)(C)), CIPA Sec. 1712 (codified at 20 U.S.C. Sec. 9134(f)(1)(A)) (requiring a public library receiving E-rate discounts or LSTA grants to certify that it "has in place a policy of Internet safety that includes the operation of a technology protection measure with respect to any of its computers with Internet access . . . ." (emphasis added)); In re Federal-State Joint Board on Universal Service: Children's Internet Protection Act, CC Docket No. 96-45, Report and Order, FCC 01-120, 30 (Apr. 5, 2001) ("CIPA makes no distinction between computers used only by staff and those accessible to the public."). Alternatively, libraries can use privacy screens or recessed monitors to prevent patrons from unwillingly being exposed to material viewed by other patrons. We acknowledge that privacy screens and recessed monitors suffer from imperfections as alternatives to filtering. Both impose costs on the library, particularly recessed monitors, which, according to the government's library witnesses, are expensive. Moreover, some libraries have experienced problems with patrons attempting to remove the privacy screens. Privacy screens and recessed monitors also make it difficult for more than one person to work at the same terminal. These problems, however, are not insurmountable. While there is no doubt that privacy screens and recessed terminals impose additional costs on libraries, the government has failed to show that the cost of privacy screens or recessed terminals is substantially greater than the cost of filtering software and the resources needed to maintain such software. Nor has the government shown that the cost of these alternatives is so high as to make their use prohibitive. With respect to the problem of patrons removing privacy screens, we find, based on the successful use of privacy screens by the Fort Vancouver Regional Library and the Multnomah County Public Library, that it is possible for public libraries to prevent patrons from removing the screens. Although privacy screens may make it difficult for patrons to work at the same terminal side by side with other patrons or with library staff, a library could provide filtered access at terminals that lack privacy screens, when patrons wish to use a terminal with others. Alternatively, a library can reserve terminals outside of patrons' sight lines for groups of patrons who wish unfiltered access. We therefore conclude that the government has failed to show that the less restrictive alternatives discussed above are ineffective at furthering the government's interest either in preventing patrons from using library computers to access visual depictions that are obscene, child pornography, or in the case of minors, harmful to minors, or in preventing library patrons from being unwillingly exposed to patently offensive, sexually explicit speech. 4. Do CIPA's Disabling Provisions Cure the Defect? The Government argues that even if the use of software filters mandated by CIPA blocks a substantial amount of speech whose suppression serves no legitimate state interest, and therefore fails strict scrutiny's narrow tailoring requirement, CIPA's disabling provisions cure any lack of narrow tailoring inherent in filtering technology. The disabling provision applicable to libraries receiving LSTA grants states that "[a]n administrator, supervisor, or other authority may disable a technology protection measure . . . to enable access for bona fide research or other lawful purposes." CIPA Sec. 1712(a)(2) (codified at 20 U.S.C. Sec. 9134(f)(3)). CIPA's disabling provision with respect to libraries receiving E-rate discounts similarly states that "[a]n administrator, supervisor, or other person authorized by the certifying authority . . . may disable the technology protection measure concerned, during use by an adult, to enable access for bona fide research or other lawful purpose." CIPA Sec. 1721(b) (codified at 47 U.S.C. Sec. 254(h)(6)(D)). To determine whether the disabling provisions cure CIPA's lack of narrow tailoring, we must first determine, as a matter of statutory construction, under what circumstances the disabling provisions permit libraries to disable the software filters. It is unclear to us whether CIPA's disabling provisions permit libraries to disable the filters any time a patron wishes to access speech that is neither obscenity, child pornography, or in the case of a minor patron, material that is harmful to minors. Whether CIPA permits disabling in such instances depends on the meaning of the provisions' reference to "bona fide research or other lawful purpose." On the one hand, the language "to enable access for bona fide research or other lawful purpose" could be interpreted to mean "to enable access to all constitutionally protected material." As a textual matter, this reading of the disabling provisions is plausible. If a patron seeks access to speech that is constitutionally protected, then it is reasonable to conclude that the patron has a "lawful purpose," since the dissemination and receipt of constitutionally protected speech cannot be made unlawful. Moreover, since a narrower construction of the disabling provision creates more constitutional problems than a construction of the disabling provisions that permits access to all constitutionally protected speech, the broader interpretation is preferable. "[I]f an otherwise acceptable construction of a statute would raise serious constitutional problems, and where an alternative interpretation of the statute is fairly possible, we are obligated to construe the statute to avoid such problems." INS v. St. Cyr, 121 S. Ct. 2271, 2279 (2001) (internal quotation marks and citations omitted). On the other hand, interpreting CIPA's disabling provisions to permit disabling for access to all constitutionally protected speech presents several problems. First, if "other lawful purpose" means "for the purpose of accessing constitutionally protected speech," then this reading renders superfluous CIPA's reference to "bona fide research," which clearly contemplates some purpose beyond simply accessing constitutionally protected speech. In general, "courts should disfavor interpretations of statutes that render language superfluous." Conn. Nat'l Bank v. Germain, 503 U.S. 249, 253 (1992). Furthermore, Congress is clearly capable of explicitly specifying categories of constitutionally unprotected speech, as it did when it drafted CIPA to require funding recipients to use technology protection measures that protect against visual depictions that are "obscene," "child pornography," or, in the case of minors, "harmful to minors." CIPA Sec. 1712(a) (codified at 20 U.S.C. Sec. 9134(f)(1)(A)(i)(I)-(III)); CIPA Sec. 1721(b) (codified at 47 U.S.C. Sec. 254(h)(6)(B)(i)(I)-(III)). If Congress intended CIPA's disabling provisions simply to permit libraries to disable the filters to allow access to speech falling outside of these categories, Congress could have drafted the disabling provisions with greater precision, expressly permitting libraries to disable the filters "to enable access for any material that is not obscene, child pornography, or in the case of minors, harmful to minors," rather than "to enable access for bona fide research or other lawful purposes," which is the language that Congress actually chose. At bottom, however, we need not definitively construe CIPA's disabling provisions, since it suffices in this case to assume without deciding that the disabling provisions permit libraries to allow a patron access to any speech that is constitutionally protected with respect to that patron. Although this interpretation raises fewer constitutional problems than a narrower interpretation, this interpretation of the disabling provisions nonetheless fails to cure CIPA's lack of narrow tailoring. Even if the disabling provisions permit public libraries to allow patrons to access speech that is constitutionally protected yet erroneously blocked by the software filters, the requirement that library patrons ask a state actor's permission to access disfavored content violates the First Amendment. The Supreme Court has made clear that content-based restrictions that require recipients to identify themselves before being granted access to disfavored speech are subject to no less scrutiny than outright bans on access to such speech. In Lamont v. Postmaster General, 381 U.S. 301 (1965), for example, the Court held that a federal statute requiring the Postmaster General to halt delivery of communist propaganda unless the addressee affirmatively requested the material violated the First Amendment: We rest on the narrow ground that the addressee in order to receive his mail must request in writing that it be delivered. This amounts in our judgment to an unconstitutional abridgment of the addressee's First Amendment rights. The addressee carries an affirmative obligation which we do not think the Government may impose on him. This requirement is almost certain to have a deterrent effect, especially as respects those who have sensitive positions. Id. at 307. Similarly, in Denver Area Educational Telecommunications Consortium, Inc. v. FCC, 518 U.S. 727 (1996), the Court held unconstitutional a federal law requiring cable operators to allow access to patently offensive, sexually explicit programming only to those subscribers who requested access to the programming in advance and in writing. Id. at 732-33. As in Lamont, the Court in Denver reasoned that this content-based restriction on recipients' access to speech would have an impermissible chilling effect: "[T]he written notice requirement will . . . restrict viewing by subscribers who fear for their reputations should the operator, advertently or inadvertently, disclose the list of those who wish to watch the 'patently offensive' channel." Id. at 754; see also Fabulous Assocs., Inc. v. Pa. Pub. Util. Comm'n, 896 F.2d 780, 785 (3d Cir. 1990) (considering the constitutionality of a state law requiring telephone users who wish to listen to sexually explicit telephone messages to apply for an access code to receive such messages, and invalidating the law on the ground that "[a]n identification requirement exerts an inhibitory effect"). We believe that CIPA's disabling provisions suffer from the same flaws as the restrictions on speech in Lamont, Denver, and Fabulous Associates. By requiring library patrons affirmatively to request permission to access certain speech singled out on the basis of its content, CIPA will deter patrons from requesting that a library disable filters to allow the patron to access speech that is constitutionally protected, yet sensitive in nature. As we explain above, we find that library patrons will be reluctant and hence unlikely to ask permission to access, for example, erroneously blocked Web sites containing information about sexually transmitted diseases, sexual identity, certain medical conditions, and a variety of other topics. As discussed in our findings of fact, software filters block access to a wide range of constitutionally protected speech, including Web sites containing information that individuals are likely to wish to access anonymously. That library patrons will be deterred from asking permission to access Web sites containing certain kinds of content is evident as a matter of common sense as well as amply borne out by the trial record. Plaintiff Emmalyn Rood, who used the Internet at a public library to research information relating to her sexual identity, testified that she would have been unwilling as a young teen to ask a librarian to disable filtering software so that she could view materials concerning gay and lesbian issues. Similarly, plaintiff Mark Brown stated that he would have been too embarrassed to ask a librarian to disable filtering software if it had impeded his ability to research surgery options for his mother when she was treated for breast cancer. As explained in our findings of fact, see supra at Subsection II.D.2.b, the reluctance of patrons to request permission to access Web sites that were erroneously blocked is further established by the low number of patron unblocking requests, relative to the number of erroneously blocked Web sites, in those public libraries that use software filters and permit patrons to request access to incorrectly blocked Web sites. Cf. Fabulous Assocs., 896 F.2d at 786 ("On the record before us, there is more than enough evidence to support the district court's finding that access codes will chill the exercise of some users' right to hear protected communications."). To be sure, the government demonstrated that it is possible for libraries to permit patrons to request anonymously that a particular Web site be unblocked. In particular, the Tacoma Public Library has configured its computers to present patrons with the option, each time the software filter blocks their access to a Web page, of sending an anonymous email to library staff requesting that the page be unblocked. Moreover, a library staff member periodically scans logs of URLs blocked by the filters, in an effort to identify erroneously blocked sites, which the library will subsequently unblock. Although a public library's ability to permit anonymous unblocking requests addresses the deterrent effect of requiring patrons to identify themselves before gaining access to a particular Web site, we believe that it fails adequately to address the overblocking problem. In particular, even allowing anonymous requests for unblocking burdens patrons' access to speech, since such requests cannot immediately be acted on. Although the Tacoma Public Library, for example, attempts to review requests for unblocking within 24 hours, requests sometimes are not reviewed for several days. And delays are inevitable in libraries with branches that lack the staff necessary immediately to review patron unblocking requests. Because many Internet users "surf" the Web, visiting hundreds of Web sites in a single session and spending only a short period of time viewing many of the sites, the requirement that a patron take the time to affirmatively request access to a blocked Web site and then wait several days until the site is unblocked will, as a practical matter, impose a significant burden on library patrons' use of the Internet. Indeed, a patron's time spent requesting access to an erroneously blocked Web site and checking to determine whether access was eventually granted is likely to exceed the amount of time the patron would have actually spent viewing the site, had the site not been erroneously blocked. This delay is especially burdensome in view of many libraries' practice of limiting their patrons to a half hour or an hour of Internet use per day, given the scarcity of terminal time in relation to patron demand. The burden of requiring library patrons to ask permission to view Web sites whose content is disfavored resembles the burden that the Supreme Court found unacceptable in Denver, which invalidated a federal law requiring cable systems operators to block subscribers' access to channels containing sexually explicit programming, unless subscribers requested unblocking in advance. The Court reasoned that "[t]hese restrictions will prevent programmers from broadcasting to viewers who select programs day by day (or, through 'surfing,' minute by minute) . . . ." Denver, 518 U.S. at 754. Similarly, in Fabulous Associates, the Third Circuit explained that a law preventing adults from listening to sexually explicit phone messages unless they applied in advance for access to such messages would burden adults' receipt of constitutionally protected speech, given consumers' tendency to purchase such speech on impulse. See Fabulous Assocs., 896 F.2d at 785 (noting that officers of two companies that sell access to sexually explicit recorded phone messages "testified that it is usually 'impulse callers' who utilize these types of services, and that people will not call if they must apply for an access code"). In sum, in many cases, as we have noted above, library patrons who have been wrongly denied access to a Web site will decline to ask the library to disable the filters so that the patron can access the Web site. Moreover, even if patrons requested unblocking every time a site is erroneously blocked, and even if library staff granted every such request, a public library's use of blocking software would still impermissibly burden patrons' access to speech based on its content. The First Amendment jurisprudence of the Supreme Court and the Third Circuit makes clear that laws imposing content-based burdens on access to speech are no less offensive to the First Amendment than laws imposing content-based prohibitions on speech: It is of no moment that the statute does not impose a complete prohibition. The distinction between laws burdening and laws banning speech is but a matter of degree. The Government's content-based burdens must satisfy the same rigorous scrutiny as its content-based bans. . . . When the purpose and design of a statute is to regulate speech by reason of its content, special consideration or latitude is not afforded to the Government merely because the law can somehow be described as a burden rather than outright suppression. United States v. Playboy Entm't Group, Inc., 529 U.S. 803, 812, 826 (2000) (invalidating a federal law requiring cable television operators to limit the transmission of sexually explicit programming to the hours between 10:00 p.m. and 6:00 a.m.); see also Fabulous Assocs., 896 F.2d at 785 ("[H]ere . . . there is no outright prohibition of indecent communication. However, the First Amendment protects against government inhibition as well as prohibition.") (internal quotation marks and citation omitted). Even if CIPA's disabling provisions could be perfectly implemented by library staff every time patrons request access to an erroneously blocked Web site, we hold that the content-based burden that the library's use of software filters places on patrons' access to speech suffers from the same constitutional deficiencies as a complete ban on patrons' access to speech that was erroneously blocked by filters, since patrons will often be deterred from asking the library to unblock a site and patron requests cannot be immediately reviewed. We therefore hold that CIPA's disabling provisions fail to cure CIPA's lack of narrow tailoring. 5. Conclusion; Severability Based upon the foregoing discussion, we hold that a public library's content-based restriction on patrons' access to speech on the Internet is subject to strict scrutiny. Every item in a library's print collection has been selected because library staff, or a party to whom staff delegates the decision, deems the content to be particularly valuable. In contrast, the Internet, as a forum, is open to any member of the public to speak, and hence, even when a library provides filtered Internet access, it creates a public forum in which the vast majority of the speech has been reviewed by neither librarians nor filtering companies. Under public forum doctrine, where the state creates such a forum open to any member of the public to speak on an unlimited number of subjects, the state's decision selectively to exclude certain speech on the basis of its content, is subject to strict scrutiny, since such exclusions risk distorting the marketplace of ideas that the state has created. Application of strict scrutiny to public libraries' content- based restrictions on their patrons' access to the Internet finds further support in the analogy to traditional public fora, such as sidewalks, parks, and squares, in which content-based restrictions on speech are always subject to strict scrutiny. Like these traditional public fora, Internet access in public libraries uniquely promotes First Amendment values, by offering low barriers to entry to speakers and listeners. The content of speech on the Internet is as diverse as human thought, and the extent to which the Internet promotes First Amendment values is evident from the sheer breadth of speech that this new medium enables. To survive strict scrutiny, a public library's use of filtering software must be narrowly tailored to further a compelling state interest, and there must be no less restrictive alternative that could effectively further that interest. We find that, given the crudeness of filtering technology, any technology protection measure mandated by CIPA will necessarily block access to a substantial amount of speech whose suppression serves no legitimate government interest. This lack of narrow tailoring cannot be cured by CIPA's disabling provisions, because patrons will often be deterred from asking the library's permission to access an erroneously blocked Web page, and anonymous requests for unblocking cannot be acted on without delaying the patron's access to the blocked Web page, thereby impermissibly burdening access to speech on the basis of its content. Moreover, less restrictive alternatives exist to further a public library's legitimate interests in preventing its computers from being used to access obscenity, child pornography, or in the case of minors, material harmful to minors, and in preventing patrons from being unwillingly exposed to patently offensive, sexually explicit speech. Libraries may use a variety of means to monitor their patrons' use of the Internet and impose sanctions on patrons who violate the library's Internet use policy. To protect minors from material harmful to minors, libraries could grant minors unfiltered access only if accompanied by a parent, or upon parental consent, or could require minors to use unfiltered terminals in view of library staff. To prevent patrons from being unwillingly exposed to offensive, sexually explicit content, libraries can offer patrons the option of using blocking software, can place unfiltered terminals outside of patrons' sight lines, and can use privacy screens and recessed monitors. While none of these less restrictive alternatives are perfect, the government has failed to show that they are significantly less effective than filtering software, which itself fails to block access to large amounts of speech that fall within the categories sought to be blocked. In view of the severe limitations of filtering technology and the existence of these less restrictive alternatives, we conclude that it is not possible for a public library to comply with CIPA without blocking a very substantial amount of constitutionally protected speech, in violation of the First Amendment. Because this conclusion derives from the inherent limits of the filtering technology mandated by CIPA, it holds for any library that complies with CIPA's conditions. Hence, even under the stricter standard of facial invalidity proposed by the government, which would require us to uphold CIPA if only a single library can comply with CIPA's conditions without violating the First Amendment, we conclude that CIPA is facially invalid, since it will induce public libraries, as state actors, to violate the First Amendment. Because we hold that CIPA is invalid on these grounds, we need not reach the plaintiffs' alternative theories that CIPA is invalid as a prior restraint on speech and is unconstitutionally vague. Nor need we decide whether CIPA is invalid because it requires public libraries, as a condition on the receipt of federal funds, to relinquish their own First Amendment rights to provide the public with unfiltered Internet access, a theory that we nonetheless feel constrained to discuss (at length) in the margin. Having determined that CIPA violates the First Amendment, we would usually be required to determine whether CIPA is severable from the remainder of the statutes governing LSTA and E-rate funding. Neither party, however, has advanced the argument that CIPA is not severable from the remainder the Library Services and Technology Act and Communications Act of 1934 (the two statutes governing LSTA and E-rate funding, respectively), and at all events, we think that CIPA is severable. "The inquiry into whether a statute is severable is essentially an inquiry into legislative intent." Minn. v. Mille Lacs Band of Chippewa Indians, 526 U.S. 172, 191 (1999). "Unless it is evident that the legislature would not have enacted those provisions which are within its power, independently of that which is not, the invalid part may be dropped if what is left is fully operative as a law." Buckley v. Valeo, 424 U.S. 1, 108 (1976) (internal quotation marks and citation omitted). There is no doubt that if we were to strike CIPA from the sections of the United States Code where it is currently codified, the remaining statutory sections, providing eligible public libraries with E- rate discounts and LSTA grants, would be fully operative as law. Indeed, the LSTA and E-rate programs existed prior to the enactment of CIPA in substantially the same form as they would exist were we to strike CIPA and leave the rest of the programs intact. The second question, whether Congress would in this case have chosen to repeal the LSTA and E-rate subsidy programs instead of continuing to fund them if it had known that CIPA's limitations on these programs were constitutionally invalid, is less clear. CIPA contains "separability" clauses that state that if any of its additions to the statutes governing the LSTA and E- rate programs are found to be unconstitutional, Congress intended to effectuate as much of CIPA's amendments as possible. We interpret these clauses to mean, for example, that if a court were to find that CIPA's requirements are unconstitutional with respect to adult patrons, but permissible with respect to minors, that Congress intended to have the court effectuate only the provisions with respect to minors. These separability clauses do not speak to the situation before us, however, where we have found that CIPA is facially unconstitutional in its entirety. Nevertheless, the government has not pointed to anything in the legislative history or elsewhere to suggest that Congress intended to discontinue funding under the LSTA and E-rate programs unless it could effectuate CIPA's restrictions on the funding. And Congress's decision, prior to CIPA's enactment, to subsidize Internet access through the LSTA and E-rate programs without such restrictions, counsels that we reach the opposite conclusion. At bottom, we think that it is unclear what Congress's intent was on this point, and in the absence of such information, we exercise a presumption in favor of severability. Regan v. Time, Inc., 468 U.S. 641, 653 (1984) ("[T]he presumption is in favor of severability."); cf. Velazquez v. Legal Servs. Corp., 164 F.3d 757, 773 (2d Cir. 1999), aff'd 531 U.S. 533 (2001) (applying a presumption in favor of severability in the face of uncertainty whether Congress intended to fund the Legal Services Corporation even if a restriction on the funding was to be declared invalid). For the foregoing reasons, we will enter a final judgment declaring Sections 1712(a)(2) and 1721(b) of the Children's Internet Protection Act, codified at 20 U.S.C. Sec. 9134(f) and 47 U.S.C. Sec. 254(h)(6), respectively, to be facially invalid under the First Amendment and permanently enjoining the defendants from enforcing those provisions. ___________________________ Edward R. Becker, Chief Circuit Judge IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA AMERICAN LIBRARY ASSOCIATION, : CIVIL ACTION INC., et al. : : v. : : UNITED STATES, et al. : NO. 01-1303 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MULTNOMAH COUNTY PUBLIC : CIVIL ACTION LIBRARY, et al. : : v. : : UNITED STATES OF AMERICA, et al. : NO. 01-1322 ORDER AND NOW, this day of May, 2002, based on the foregoing findings of fact and conclusions of law, it is hereby ORDERED that: (1) judgment is entered in favor of the plaintiffs and against the defendants, declaring that Sec.Sec. 1712(a)(2) and 1721(b) of the Children's Internet Protection Act, 20 U.S.C. Sec. 9134(f) and 47 U.S.C. Sec. 254(h)(6), are facially invalid under the First Amendment to the United States Constitution; and (2) the United States, Michael Powell, in his official capacity as Chairman of the Federal Communications Commission, the Federal Communications Commission, Beverly Sheppard, in her official capacity as Acting Director of the Institute of Museum and Library Services, and the Institute of Museum and Library Services are permanently enjoined from withholding federal funds from any public library for failure to comply with Sec.Sec. 1712(a)(2) and 1721(b) of the Children's Internet Protection Act, 20 U.S.C. Sec. 9134(f) and 47 U.S.C. Sec. 254(h)(6). BY THE COURT: __________________________________ Ch. Cir. J. __________________________________ J. __________________________________ J. FOOTNOTES Plaintiffs advance three other alternative, independent grounds for holding CIPA facially invalid. First, they submit that even if CIPA will not induce public libraries to violate the First Amendment, CIPA nonetheless imposes an unconstitutional condition on public libraries by requiring them to relinquish their own First Amendment rights to provide unfiltered Internet access as a condition on their receipt of federal funds. See infra n.36. Second, plaintiffs contend that CIPA is facially invalid because it effects an impermissible prior restraint on speech by granting filtering companies and library staff unfettered discretion to suppress speech before it has been received by library patrons and before it has been subject to a judicial determination that it is unprotected under the First Amendment. See Southeastern Promotions, Ltd. v. Conrad, 420 U.S. 546, 558 (1975). Finally, plaintiffs submit that CIPA is unconstitutionally vague. See City of Chicago v. Morales, 527 U.S. 41 (1999). CIPA defines "[m]inor" as "any individual who has not attained the age of 17 years." CIPA Sec. 1721(c) (codified at 47 U.S.C. Sec. 254(h)(7)(D)). CIPA further provides that "[o]bscene" has the meaning given in 18 U.S.C. Sec. 1460, and "child pornography" has the meaning given in 18 U.S.C. Sec. 2256. CIPA Sec. 1721(c) (codified at 47 U.S.C. Sec. 254(h)(7)(E) & (F)). CIPA defines material that is "harmful to minors" as: any picture, image, graphic image file, or other visual depiction that – (i) taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion; (ii) depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and (iii) taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors. CIPA Sec. 1721(c) (codified at 47 U.S.C. Sec. 254(h)(7)(G)). CIPA prohibits federal interference in local determinations regarding what Internet content is appropriate for minors: A determination regarding what matter is appropriate for minors shall be made by the school board, local educational agency, library or other authority responsible for making the determination. No agency or instrumentality of the United States Government may – (A) establish criteria for making such determination; (B) review the determination made by the certifying [entity] . . . ; or (C) consider the criteria employed by the certifying [entity] . . . in the administration of subsection (h)(1)(B). CIPA Sec. 1732 (codified at 47 U.S.C. Sec. 254(l)(2)). The government challenges the standing of several of the plaintiffs and the ripeness of their claims. These include all of the Web site publishers and all of the individual library patrons. Notwithstanding these objections, we are confident that the "case or controversy" requirement of Article III, Sec. 2 of the Constitution is met by the existence of the plaintiff libraries that qualify for LSTA and E-rate funding and the library associations whose members qualify for such funding. These plaintiffs are faced with the impending choice of either certifying compliance with CIPA by July 1, 2002, or foregoing subsidies under the LSTA and E-rate programs, and therefore clearly have standing to challenge the constitutionality of the conditions to which they will be subject should they accept the subsidies. We also note that the presence of the Web site publishers and individual library patrons does not affect our legal analysis or disposition of the case. The OCLC database, a cooperative cataloging service established to facilitate interlibrary loan requests, includes 40 million catalog records from approximately 48,000 libraries of all types worldwide. Slightly more than 400 of the libraries in the OCLC database are listed as carrying Playboy in their collections, while only eight subscribe to Hustler. Fort Vancouver Regional Library, for example, combines the methods of strategically placing terminals in low traffic areas and using privacy screens. A section headed "Confidentiality and Privacy" on the library's home page states: "in order to protect the privacy of the user and the interests of other library patrons, the library will attempt to minimize unintentional viewing of the Internet. This will be done by use of privacy screens, and by judicious placement of the terminals and other appropriate means." Indeed, we granted leave for N2H2's counsel to intervene in order to object to testimony that would potentially reveal N2H2's trade secrets, which he did on several occasions. Geoffrey Nunberg (Ph.D., Linguistics, C.U.N.Y. 1977) is a researcher at the Center for the Study of Language and Information at Stanford University and a Consulting Full Professor of Linguistics at Stanford University. Until 2001, he was also a principal scientist at the Xerox Palo Alto Research Center. His research centers on automated classification systems, with a focus on classifying documents on the Web with respect to their linguistic properties. He has published his research in numerous professional journals, including peer- reviewed journals. A "cookie" is "a small file or part of a file stored on a World Wide Web user's computer, created and subsequently read by a Web site server, and containing personal information (as a user identification code, customized preferences, or a record of pages visited)." Merriam-Webster's Collegiate Dictionary, available at http://www.m-w.com/dictionary.htm. Hunter drew three different "samples" for his test. The first consisted of "50 randomly generated Web pages from the Webcrawler search engine." The "second sample of 50 Web pages was drawn from searches for the terms 'yahoo, warez, hotmail, sex, and MP3,' using the AltaVista.com search engine." And the "final sample of 100 Web sites was drawn from the sites of organizations who filed amicus briefs in support of the ACLU's challenges to the Community [sic] Decency Act (CDA) and COPA [the Children's Online Protection Act], and from Internet portals, political Web sites, feminist Web sites, hate speech sites, gambling sites, religious sites, gay pride/homosexual sites, alcohol, tobacco, and drug sites, pornography sites, new sites, violent game sites, safe sex sites, and pro and anti-abortion sites listed on the popular Web directory, Yahoo.com." Lemmons testified that he compiled the list of sexually explicit sites that should have been blocked by entering the terms "free adult sex, anal sex, oral sex, fisting lesbians, gay sex, interracial sex, big tits, blow job, shaved pussy, and bondage" into the Google search engine and then "surfing" through links from pages generated by the list of sites that the search engine returned. Using this method, he compiled a list of 197 sites that he determined should be blocked according to the filtering programs' category definitions. Lemmons also attempted to compile a list of "sensitive" Web sites that, although they should not have been blocked according to the filtering programs' category definitions, might have been mistakenly blocked. In order to do this, he used the same method of entering terms into the Google search engine and surfing through the results. He used the following terms to compile this list: "breast feeding, bondages, fetishes, ebony, gay issues, women's health, lesbian, homosexual, vagina, vaginal dryness, pain, anal cancer, teen issues, safe sex, penis, pregnant, interracial, sex education, penis enlargement, breast enlargement, . . . and shave." If separate patrons attempted to reach the same Web site, or one or more patrons attempted to access more than one page on a single Web site, Finnell counted these attempts as a single block. For example, the total number of blocked requests for Web pages at Tacoma Library during the logged period was 2,812, but Finnell counted this as only 895 blocks of unique Web sites. Of the 895 unique blocked sites, Finnell was unable to access 59, yielding 836 unique blocked sites for his team to review. The confidence intervals that Finnell calculated represent the range of percentages within which we can be 95% confident that the actual rate of overblocking in that particular library falls. We note that these confidence intervals assume that the time period for which the study assessed the library's internet logs constitutes a random and representative sample. To illustrate the two different methods, consider a random sample of 1010 web sites taken from a library's Internet use log, 10 of which fall within the category that a filter is intended to block (e.g., pornography), and suppose that the filter incorrectly failed to block 2 of the 10 sites that it should have blocked and did not block any sites that should not have been blocked. The standard method of quantifying the rate of underblocking would divide the number of sites in the sample that the filter incorrectly failed to block by the number of sites in the sample that the filter should have blocked, yielding an underblocking rate in this example of 20%. Finnell's study, however, calculated the underblocking rate by dividing the number of sites that the filter incorrectly failed to block by the total number of sites in the sample that were not blocked (whether correctly or incorrectly) yielding an underblocking rate in this example of only .2%. According to Biek, the sample size that he used yielded a 95% confidence interval of plus or minus 3.11%. Edelman is a Harvard University student and a systems administrator and multimedia specialist at the Berkman Center for Internet and Society at Harvard Law School. Despite Edelman's young age, he has been doing consulting work on Internet-related issues for nine years, since he was in junior high school. The archiving process in some cases took up to 48 hours from when the page was blocked. In October 2001, Edelman published the results of his initial testing on his Web site. In February and March 2002 he repeated his testing of the 6,777 URLs originally found to be blocked by at least one of the blocking products, in order to determine whether and to what extent the blocking product vendors had corrected the mistakes that he publicized. Of those URLs blocked by N2H2 in the October 2001 testing, 55.10% remained blocked when tested by Edelman in March 2002. Of those URLs blocked by Websense in the October 2001 testing, 76.28% remained blocked when tested by Edelman in February 2002. Of those URLs blocked by SurfControl's Cyber Patrol product, only 7.16% remained blocked, i.e., Cyber Patrol had unblocked almost 93% of the Web pages originally blocked. Because the results posted to his Web site were accessed by an employee of SurfControl (as evidenced by Edelman's records of who was accessing his Web site), we infer that Cyber Patrol had determined that 93% of all 6,777 pages, or 6,302 Web pages, were originally wrongly blocked by the product. Two other expert witnesses reviewed subsets of the list of Web pages that Edelman compiled. Dr. Michael T. Ryan, Director of the Rare Book and Manuscript Library and of the Center for Electronic Text and Image at the University of Pennsylvania, reviewed a list of 204 sites that Edelman forwarded to him in order to determine their appropriateness and usefulness in the library setting. Because the sites that Ryan reviewed were not selected randomly (i.e., they were chosen by plaintiffs' counsel), his study says little about the character of the set of 6,777 sites that Edelman compiled, or the total amount of overblocking by the four filtering programs that Edelman used. Anne Lipow, a practicing librarian for more than 30 years and the director of a library consulting firm, also reviewed the same list of 204 URLs from the set that Edelman had collected for their appropriateness for a library's collection. She categorized sites in four different levels according to their appropriateness for a public library's collection. Again, because these URLs were not selected randomly, Lipow's study is not particularly relevant to the total set that Edelman compiled, or to the total amount of overblocking by the four filtering programs that Edelman used. Although the methodology used to select the list of Web pages that was forwarded to Ryan and Lipow is problematic, Ryan's and Lipow's testimony established that many of the erroneously blocked sites that Edelman identified would be useful and appropriate sources of information for library patrons. All of the reviewers that Janes recruited had some relevant experience in library reference services or library collection development. Janes divided the reviewers into two groups, a group of 11 less experienced reviewers, and a group of five more experienced reviewers. Janes assigned the less experienced group to do a first-round review with the purpose of identifying the most obviously overblocked sites. The more experienced group was to review the remaining sites (i.e., those that were not obviously overblocked) and to make final decisions regarding these sites. In the first round, each person evaluated two sets of around 80 sites, and each group was evaluated by two different people. Each set of sites included the following instructions: Look carefully at each of the Web sites on the list. Please make a notation of any site that appears to meet any of the following criteria: a. Contains information similar to that already found in libraries, or b. Contains information a librarian would want in the library if s/he had unlimited funds to purchase information and unlimited shelf space, or c. You would be willing to refer a patron (of any age) to the site if the patron appeared at a reference desk seeking information about the subject of the site. For this last criterion, we recognize that you might not refer a young child to a Calculus site just because it would not be useful to that child, but you should ignore that factor. Informational sites, such as a Calculus site, should be noted. A site that is purely erotica should not be noted. Sites that received "Yes" votes from both reviewers were determined to be of sufficient interest in a library context and removed from further analysis. Sites receiving one or two "No" votes would go to the next round. In the first round, 243 sites received "Yes" votes from both reviewers, while 456 sites received one or more "No" votes or could not be found. These 456 sites were sent forward to the second round of judging. The instructions for the second-round reviewers were the same as those given to the first-round reviewers, except that in section c, the following sentence was added: "Sites that have a commercial purpose should be included here if they might be of use or interest to someone wishing to buy the product or service or doing research on commercial behavior on the Internet, much as most libraries include the Yellow Pages in their collections." The second round of review produced the following results: 60 sites could not be found (due to broken links, 404 "not found" errors, domain for sale messages, etc.), 231 sites were judged "Yes," and 165 judged "No." Although it was not proffered as evidence in this trial, (and hence we do not rely on it to inform our findings), we note that Youth, Pornography, and the Internet, a congressionally commissioned study by the National Research Council, a division of the National Academies of Science, see Pub. L. 105-314, Title X, Sec. 901, comes to a conclusion similar to the one that we reach regarding the effectiveness of Internet filters. The commission concludes that: All filters–those of today and for the foreseeable future–suffer (and will suffer) from some degree of overblocking (blocking content that should be allowed through) and some degree of underblocking (passing content that should not be allowed through). While the extent of overblocking and underblocking will vary with the product (and may improve over time), underblocking and overblocking result from numerous sources, including the variability in the perspectives that humans bring to the task of judging content. Youth, Pornography, and the Internet (Dick Thornburgh & Herbert S. Lin, eds., 2002), available at http://bob.nap.edu/html/youth_internet/. Because we find that the plaintiff public libraries are funded and controlled by state and local governments, they are state actors, subject to the constraints of the First Amendment, as incorporated by the Due Process Clause of the Fourteenth Amendment. The Supreme Court has recognized that the First Amendment encompasses not only the right to speak, but also the right to receive information. See Reno v. ACLU, 521 U.S. 844, 874 (1997) (invalidating a statute because it "effectively suppresses a large amount of speech that adults have a constitutional right to receive and to address to one another"); Stanley v. Georgia, 394 U.S. 557, 564 (1969) ("[The] right to receive information and ideas, regardless of their social worth . . . is fundamental to our free society."); see also Bd. of Educ. v. Pico, 457 U.S. 853, 867-68 (1982) (plurality opinion) ("[T]he right to receive ideas follows ineluctably from the sender's First Amendment right to send them."). Indeed, if the First Amendment subjected to strict scrutiny the government's decision to dedicate a forum to speech whose content the government judges to be particularly valuable, many of our public institutions of culture would cease to exist in their current form: From here on out, the National Gallery in Washington, D.C., for example, would be required to display the art of all would-be artists on a first-come-first-served basis and would not be able to exercise any content control over its collection through evaluations of quality. Such a conclusion, of course, strikes us as absurd, but that is only because we feel that the government should be free to establish public cultural institutions guided by standards such as "quality." . . . While the First Amendment articulates a deep fear of government intervention in the marketplace of ideas (because of the risk of distortion), it also seems prepared to permit state-sponsored and -supported cultural institutions that exercise considerable control over which art to fund, which pictures to hang, and which courses to teach. That these choices necessarily involve judgments about favored and disfavored content – judgments clearly prohibited in the realm of censorship – is indisputable. Lee C. Bollinger, Public Institutions of Culture and the First Amendment: The New Frontier, 63 U. Cin. L. Rev. 1103, 1110-15 (1995). In both of these cases, the taxation scheme at issue effectively subsidized a vast range of publications, and singled out for penalty only a handful of speakers. See Arkansas Writers' Project, 460 U.S. at 228-29 (noting that "selective taxation of the press – . . . [by] targeting individual members of the press – poses a particular danger of abuse by the State" and explaining that "this case involves a more disturbing use of selective taxation than Minneapolis Star, because the basis on which Arkansas differentiates between magazines is particularly repugnant to First Amendment principles: a magazine's tax status depends entirely on its content"); Minneapolis Star, 460 U.S. at 591 ("Minnesota's ink and paper tax violates the First Amendment not only because it singles out the press, but also because it targets a small group of newspapers."); see also Turner Broad. Sys., Inc. v. FCC, 512 U.S. 622, 660 (1994) ("The taxes invalidated in Minneapolis Star and Arkansas Writers' Project . . . targeted a small number of speakers, and thus threatened to distort the market for ideas.") (internal quotation marks and citation omitted). [P]atrons at a library do not have the right to make editorial decisions regarding the availability of certain material. It is the exclusive authority of the library to make affirmative decisions regarding what books, magazines, or other material is placed on library shelves, or otherwise made available to patrons. Libraries impose many restrictions on the use of their systems which demonstrate that the content of the library's offerings are not determined by the general public. S. Rep. No. 106-141, at 8-9 (1999). In distinguishing restrictions on public libraries' print collections from restrictions on the provision of Internet access, we do not rely on the rationale adopted in Mainstream Loudoun v. Board of Trustees of the Loudoun County Library, 2 F. Supp. 2d 783 (E.D. Va. 1998). The Loudoun Court reasoned that a library's decision to block certain Web sites fundamentally differs from its decision to carry certain books but not others, in that unlike the money and shelf space consumed by the library's provision of print materials, "no appreciable expenditure of library time or resources is required to make a particular Internet publication available" once the library has acquired Internet access. Id. at 793-94. We disagree. Nearly every librarian who testified at trial stated that patrons' demand for Internet access exceeds the library's supply of Internet terminals. Under such circumstances, every time library patrons visit a Web site, they deny other patrons waiting to use the terminal access to other Web sites. Just as the scarcity of a library's budget and shelf space constrains a library's ability to provide its patrons with unrestricted access to print materials, the scarcity of time at Internet terminals constrains libraries' ability to provide patrons with unrestricted Internet access: The same budget concerns constraining the number of books that libraries can offer also limits the number of terminals, Internet accounts, and speed of access links that can be purchased, and thus the number of Web pages that patrons can view. This is clear to anyone who has been denied access to a Website because no terminal was unoccupied. Mark S. Nadel, The First Amendment's Limitations on the Use of Internet Filtering in Public and School Libraries: What Content Can Libraries Exclude?, 78 Tex. L. Rev. 1117, 1128 (2000). We have found that approximately 14.3 million Americans access the Internet at a public library, and Internet access at public libraries is more often used by those with lower incomes than those with higher incomes. We found that about 20.3% of Internet users with household family income of less than $15,000 per year use public libraries for Internet access, and approximately 70% of libraries serving communities with poverty levels in excess of 40% receive E-rate discounts. The widespread availability of Internet access in public libraries is due, in part, to the availability of public funding, including state and local funding and the federal funding programs regulated by CIPA. We acknowledge that traditional public fora have characteristics that promote First Amendment values in ways that the provision of Internet access in public libraries does not. For example, a significant virtue of traditional public fora is their facilitation of face-to-face communication. "In a face-to- face encounter there is a greater opportunity for the exchange of ideas and the propagation of views . . . ." Cornelius, 473 U.S. at 798. Face-to-face exchanges also permit speakers to confront listeners who would otherwise not actively seek out the information that the speaker has to offer. In contrast, the Internet operates largely by providing individuals with only that information that they actively seek out. Although the Internet does not permit face-to-face communication in the same way that traditional public fora do, the Internet, as a medium of expression, is significantly more interactive than the broadcast media and the press. "[T]he Web makes it possible to establish two-way linkages with potential sympathizers. Unlike the unidirectional nature of most mass media, websites, bulletin boards, chatrooms, and email are potentially interactive." Seth F. Kreimer, Technologies of Protest: Insurgent Social Movements and the First Amendment in the Era of the Internet, 150 U. Pa. L. Rev. 119, 130 (2001). We acknowledge that the Internet's architecture is a human creation, and is therefore subject to change. The foregoing analysis of the unique speech-enhancing qualities of the Internet is limited to the Internet as currently constructed. Indeed, the characteristics of the Internet that we believe render it uniquely suited to promote First Amendment values may change as the Internet's architecture evolves. See Lawrence Lessig, Reading the Constitution in Cyberspace, 45 Emory L.J. 869, 888 (1996) ("Cyberspace has no permanent nature, save the nature of a place of unlimited plasticity. We don't find cyberspace, we build it."); see also Lawrence Lessig, The Death of Cyberspace, 57 Wash. & Lee L. Rev. 337 (2000). For First Amendment purposes, obscenity is "limited to works which, taken as a whole, appeal to the prurient interest in sex, which portray sexual conduct in a patently offensive way, and which, taken as a whole, do not have serious literary, artistic, political, or scientific value." Miller v. California, 413 U.S. 15, 24 (1973). The Supreme Court in Reno explained: The District Court found that at the time of trial existing technology did not include any effective method for a sender to prevent minors from obtaining access to its communications on the Internet without also denying access to adults. The Court found no effective way to determine the age of a user who is accessing material through e-mail, mail exploders, newsgroups, or chat rooms. As a practical matter, the Court also found that it would be prohibitively expensive for noncommercial – as well as some commercial – speakers who have Web sites to verify that their users are adults. These limitations must inevitably curtail a significant amount of adult communication on the Internet. Reno, 521 U.S. at 876-77 (citation omitted). To the extent that filtering software is effective in identifying URLs of Web pages containing obscenity or child pornography, libraries may use filtering software as a tool for identifying URLs in their Internet use logs that fall within these categories, without requiring patrons to use filtering software. As the study of Benjamin Edelman, an expert witness for the plaintiffs, demonstrates, it is possible to develop software that automatically tests a list of URLs, such as the list of URLs in a public library's Internet use logs, to determine whether any of those URLs would be blocked by a particular software filter as falling within a particular category. Alternatively, library staff can review the Internet use logs by hand, skimming the list of URLs for those that are likely to correspond to Web pages containing obscenity or child pornography, as is the practice of Tacoma's David Biek, who testified as a government witness. Under either method, public libraries can assure patrons of their privacy by tracing a given URL to a particular patron only after determining that the URL corresponds to a Web site whose content is illegal. We need not decide whether these less restrictive alternatives would themselves be constitutional. See Fabulous Assocs., Inc. v. Pa. Pub. Util. Comm'n, 896 F.2d 780, 787 n.6 (3d Cir. 1990) ("We intimate no opinion on the constitutionality of [a less restrictive alternative to the challenged law] . . ., inasmuch as we consider merely [its] comparative restrictiveness . . . ."). Whereas the disabling provision applicable to libraries that receive LSTA grants permits disabling for both adults and minors, the disabling provision applicable to libraries that receive E-rate discounts permits disabling only during adult use. Thus, the disabling provision applicable to libraries receiving E-rate discounts cannot cure the constitutional infirmity of CIPA's requirement that libraries receiving E-rate discounts use software filters when their Internet terminals are in use by minors. Software filters sometimes incorrectly block access to, inter alia, Web sites dealing with issues relating to sexual identity. For example, the "Gay and Lesbian Chamber of Southern Nevada," http://www.lambdalv.com, "a forum for the business community to develop relationships within the Las Vegas lesbian, gay transsexual, and bisexual community" was blocked by N2H2 as "Adults Only, Pornography." The home page of the Lesbian and Gay Havurah of the Long Beach, California Jewish Community Center, http://www.compupix.com/gay/havurah.htm, was blocked by N2H2 as "Adults Only, Pornography," by Smartfilter as "Sex," and by Websense as "Sex." Among the types of Web sites that filters erroneously block are Web sites dealing with health issues, such as the Web site of the Willis-Knighton Cancer Center, a Shreveport, Louisiana cancer treatment facility, http://cancerftr.wkmc.com, which was blocked by Websense under the "Sex" category. Although in light of our disposition of the plaintiffs' Dole claim, we do not rule upon plaintiffs' contention that CIPA's conditioning of funds on the installation of filtering software violates the doctrine of unconstitutional conditions, we are mindful of the need to frame the disputed legal issues and to develop a full factual record for the certain appeal to the Supreme Court. Cf. Ashcroft v. ACLU, 2002 U.S. LEXIS 3421 (May 13, 2002) (remanding the case to the Court of Appeals to review the legal and factual bases on which the District Court granted plaintiffs' motion for a preliminary injunction after vacating its opinion that relied on a different ground from the ones used by the District Court). Although we do not decide the plaintiffs' unconstitutional conditions claim, we think that our findings of fact on public libraries, their use of the Internet, and the technological limitations of Internet filtering software, see supra Subsections II.D-E, and our framing of the legal issue here, would allow the Supreme Court to decide the issue if it deems it necessary to resolve this case. The doctrine of unconstitutional conditions "holds that the government 'may not deny a benefit to a person on a basis that infringes his constitutionally protected . . . freedom of speech' even if he has no entitlement to that benefit." Bd. of County Comm'rs v. Umbehr, 518 U.S. 668, 674 (1996) (quoting Perry v. Sindermann, 408 U.S. 593, 597 (1972)). In this case, the plaintiffs argue that CIPA imposes an unconstitutional condition on libraries who receive E-rate and LSTA subsidies by requiring them, as a condition on their receipt of federal funds, to surrender their First Amendment right to provide the public with access to constitutionally protected speech. Under this theory, even if it does not violate the First Amendment for a public library to use filtering software, it nonetheless violates the First Amendment for the federal government to require public libraries to use filters as a condition of the receipt of federal funds. The government contends that this case does not fall under the unconstitutional conditions framework because: (1) as state actors, the recipients of the funds (the public libraries) are not protected by the First Amendment, and therefore are not being asked to relinquish any constitutionally protected rights; and (2) although library patrons are undoubtedly protected by the First Amendment, they are not the funding recipients in this case, and libraries may not rely on their patrons' rights in order to state an unconstitutional conditions claim. It is an open question in this Circuit whether Congress may violate the First Amendment by restricting the speech of public entities, such as municipalities or public libraries. The only U.S. Supreme Court opinion to weigh in on the issue is a concurrence by Justice Stewart, joined by Chief Justice Burger and Justice Rehnquist, in which he opined that municipalities and other arms of the state are not protected by the First Amendment from governmental interference with their expression. See Colum. Broad. Sys., Inc. v. Democratic Nat'l Comm., 412 U.S. 94, 139 (1973) (Stewart, J., concurring) ("The First Amendment protects the press from governmental interference; it confers no analogous protection on the Government."); see also id. at 139 n.7 ("The purpose of the First Amendment is to protect private expression and nothing in the guarantee precludes the government from controlling its own expression or that of its agents.") (quoting Thomas Emerson, The System of Freedom of Expression 700 (1970) (internal quotation marks omitted)). The Court has subsequently made it clear, however, that it considers it to be an open question whether municipalities acting in their capacity as employers have First Amendment rights, suggesting that the question whether public entities are ever protected by the First Amendment also remains open. See City of Madison Joint Sch. Dist. No. 8 v. Wisc. Employment Relations Comm'n, 429 U.S. 167, 175 n.7 (1976) ("We need not decide whether a municipal corporation as an employer has First Amendment rights to hear the views of its citizens and employees."). Several courts of appeals have cited Justice Stewart's concurrence in Columbia Broadcasting Systems and have, with little discussion or analysis, concluded that a "government . . . speaker is not itself protected by the first amendment." Warner Cable Communications, Inc. v. City of Niceville, 911 F.2d 634, 638 (11th Cir. 1990); see also NAACP v. Hunt, 891 F.2d 1555, 1565 (11th Cir. 1990) ("[T]he First Amendment protects citizens' speech only from government regulation; government speech itself is not protected by the First Amendment."); Student Gov't Ass'n v. Bd. of Trustees of the Univ. of Mass., 868 F.2d 473, 481 (1st Cir. 1989) (concluding that the legal services organization run by a state university, "as a state entity, itself has no First Amendment rights"); Estiverne v. La. State Bar Ass'n, 863 F.2d 371, 379 (5th Cir. 1989) (noting that "the first amendment does not protect government speech"). We do not think that the question whether public libraries are protected by the First Amendment can be resolved as simply as these cases suggest. This difficulty is demonstrated by the reasoning of the Seventh Circuit in a case in which that court considered whether municipalities are protected by the First Amendment and noted that it is an open question that could plausibly be answered in the affirmative, yet declined to decide it: Only a few cases address the question whether municipalities or other state subdivisions or agencies have any First Amendment rights. . . . The question is an open one in this circuit, and we do not consider the answer completely free from doubt. For many purposes, for example diversity jurisdiction and Fourteenth Amendment liability, municipalities are treated by the law as if they were persons. Monell v. Department of Social Services, 436 U.S. 658, 690 (1978); Moor v. County of Alameda, 411 U.S. 693, 717-18 (1973). There is at least an argument that the marketplace of ideas would be unduly curtailed if municipalities could not freely express themselves on matters of public concern, including the subsidization of housing and the demographic makeup of the community. To the extent, moreover, that a municipality is the voice of its residents—is, indeed, a megaphone amplifying voices that might not otherwise be audible—a curtailment of its right to speak might be thought a curtailment of the unquestioned First Amendment rights of those residents. See Meir Dan-Cohen, "Freedoms of Collective Speech: A Theory of Protected Communications by Organizations, Communities, and the State," 79 Calif. L. Rev. 1229, 1261-63 (1991); cf. Student Government Ass'n v. Board of Trustees, supra, 868 F.2d at 482. Thus if federal law imposed a fine on municipalities that passed resolutions condemning abortion, one might suppose that a genuine First Amendment issue would be presented. Against this suggestion can be cited the many cases which hold that municipalities lack standing to invoke the Fourteenth Amendment against actions by the state. E.g., Coleman v. Miller, 307 U.S. 433, 441 (1939); Williams v. Mayor & City Council of Baltimore, 289 U.S. 36, 40 (1933); City of East St. Louis v. Circuit Court for the Twentieth Judicial Circuit, 986 F.2d 1142, 1144 (7th Cir. 1993). But it is one thing to hold that a municipality cannot interpose the Fourteenth Amendment between itself and the state of which it is the creature, Anderson v. City of Boston, 380 N.E.2d 628, 637-38 (Mass. 1978), appeal dismissed for want of a substantial federal question, 439 U.S. 1060 (1979), and another to hold that a municipality has no rights against the federal government or another state. Township of River Vale v. Town of Orangetown, 403 F.2d 684, 686 (2d Cir. 1968), distinguishes between these two types of cases. Creek v. Village of Westhaven, 80 F.3d 186, 192-93 (7th Cir. 1996). We also note that there is no textual support in the First Amendment for distinguishing between, for example, municipal corporations, and private corporations, which the Court has recognized have cognizable First Amendment rights. First Nat'l Bank of Boston v. Bellotti, 435 U.S. 765, 775-76 (1978). Unlike other provisions in the Bill of Rights, which the Supreme Court has held to be "purely personal" and thus capable of being invoked only by individuals, the First Amendment is not phrased in terms of who holds the right, but rather what is protected. Compare U.S. Const. amend V ("No person shall be held to answer . . .") (emphasis added) with U.S. Const. amend I ("Congress shall make no law . . . abridging the freedom of speech, or of the press . . . ."); see also United States v. White, 322 U.S. 694, 698-701 (1944) (holding that the privilege against self- incrimination applies only to natural persons). The Supreme Court relied on this distinction (i.e., that the First Amendment protects a class of speech rather than a class of speakers) in a similar context in Bellotti. There, the Court invalidated a Massachusetts statute that prohibited corporations from spending money to influence ballot initiatives that did not bear directly on their "property, business or assets." Id. at 768. In so holding, the Court rejected the argument that the First Amendment protects only an individual's expression. The Court wrote: The Constitution often protects interests broader than those of the party seeking their vindication. . . . The proper question therefore is not whether corporations "have" First Amendment rights and, if so, whether they are coextensive with those of natural persons. Instead, the question must be whether [the government is] abridg[ing] expression that the First Amendment was meant to protect. Id. at 776. The Court thus concluded that corporations are entitled to assert First Amendment claims as speakers, noting that "[t]he inherent worth of the speech in terms of its capacity for informing the public does not depend upon the identity of its source, whether corporation, association, union, or individual." Id. at 777. In view of the foregoing, the notion that public libraries may assert First Amendment rights for the purpose of making an unconstitutional conditions claim is clearly plausible, and may well be correct. But even if it is not, we think it plausible that they could rely on their patrons' rights, even though their patrons are not the ones who are directly receiving the federal funding. In similar cases, the Supreme Court has entertained unconstitutional conditions claims both by the organizations that receive federal funding and by their constituents. See Legal Servs. Corp. v. Velazquez, 531 U.S. 533, 537 (2001) ("Lawyers employed by New York City LSC grantees, together with private LSC contributors, LSC indigent clients, and various state and local public officials whose governments contribute to LSC grantees, brought suit . . . to declare the restriction [on LSC lawyers' ability advocate the amendment of or to challenge the constitutionality of existing welfare law] . . . invalid."); Rust v. Sullivan, 500 U.S. 173, 181 (1991) ("Petitioners are Title X grantees and doctors who supervise Title X funds suing on behalf of themselves and their patients. . . . Petitioners challenged the regulations on the grounds that . . . they violate the First and Fifth Amendment rights of Title X clients and the First Amendment rights of Title X health providers."); FCC v. League of Women Voters of Cal., 468 U.S. 364, 370 n.6 (1984) (reviewing a First Amendment challenge to conditions on public broadcasters' receipt of federal funds, in which the plaintiffs included not only the owner of a public television station, but also viewers of the station's programs, including the League of Women Voters, and "Congressman Henry Waxman, . . . a regular listener and viewer of public broadcasting"). The question whether CIPA's requirement that libraries use filtering software constitutes an unconstitutional condition is not an easy one. The Supreme Court has held that it violates the First Amendment for the federal government to require public broadcasting stations that receive federal funds not to editorialize, see League of Women Voters, 468 U.S. at 366, 402; for states to subsidize "newspaper and religious, professional, trade, and sports journals," but not "general interest magazines," Ark. Writers' Project, Inc. v. Ragland, 481 U.S. 221, 223 (1987); for a state university to subsidize student publications only on the condition that they do not "primarily promote[] or manifest[] a particular belief in or about a deity or an ultimate reality," Rosenberger v. Rector & Visitors of Univ. of Va., 515 U.S. 819, 823 (1995); and for the federal government to prevent legal services providers who receive federal funds from seeking to "amend or otherwise challenge existing welfare law." Velazquez, 531 U.S. at 537. On the other hand, the Supreme Court has held that it does not violate the First Amendment for the federal government to require healthcare providers who receive federal funds not to "encourage, promote or advocate abortion as a method of family planning," Rust, 500 U.S. at 180; for the federal government to subsidize charitable organizations only if they do not engage in lobbying activity, see Regan v. Taxation with Representation, 461 U.S. 540 (1983); and for the National Endowment for the Arts, in awarding grants on the basis of artistic excellence, to "take into consideration general standards of decency and respect for the diverse beliefs and values of the American Public." NEA v. Finley, 524 U.S. 569, 572 (1998). In light of the facts that we discuss above regarding the operation of public libraries, and the limits of Internet filtering software, see supra Sections II.D-E, we believe that the plaintiffs have a good argument that this case is more analogous to League of Women Voters, Arkansas Writers' Project, and Velazquez than it is to Rust, Finley and Taxation with Representation. Like the law invalidated in League of Women Voters, which targeted editorializing, and the law invalidated in Arkansas Writers' Project, which targeted general interest magazines but not "religious, professional, trade, and sports journals," the law in this case places content-based restrictions on public libraries' possible First Amendment right to provide patrons with access to constitutionally protected material. See Arkansas Writers' Project, 481 U.S. at 229 ("[T]he basis on which Arkansas differentiates between magazines is particularly repugnant to First Amendment principles: a magazine's tax status depends entirely on its content. Above all else, the First Amendment means that government has no power to restrict expression because of its message, its ideas, its subject matter, or its content.") (internal quotation marks and citations omitted); League of Women Voters, 468 U.S. at 383 ("[T]he scope of [the challenged statute's] ban is defined solely on the basis of the content of the suppressed speech."). See generally Rosenberger, 515 U.S. at 828 ("It is axiomatic that the government may not regulate speech based on its substantive content or the message it conveys."). Because of the technological limitations of filtering software described in such detail above, Congress's requirement that public libraries use such software is in effect a requirement that public libraries block a substantial amount of constitutionally protected speech on the basis of its content. Plaintiffs' argument that the federal government may not require public libraries who receive federal funds to restrict the availability of constitutionally protected Web sites solely on the basis of the sites' content finds further support in the role that public libraries have traditionally served in maintaining First Amendment values. As evidenced by the many public libraries that have endorsed the Freedom to Read Statement and the Library Bill of Rights, see supra Subsection II.D.1, public libraries seemingly have a duty to challenge prevailing orthodoxy and make available to the public controversial, yet constitutionally protected material, even if it means drawing the ire of the community. See Bd. of Educ. v. Pico, 457 U.S. 853, 915 (1982) (Rehnquist, J., dissenting) (noting that "public libraries" are "designed for freewheeling inquiry"). By interfering with public libraries' discretion to make available to patrons as wide a range of constitutionally protected speech as possible, the federal government is arguably distorting the usual functioning of public libraries as places of freewheeling inquiry. The Velazquez Court, in invalidating the federal government's restrictions on the ability of federally funded legal services providers to challenge the constitutionality of welfare laws, relied on the manner in which the restrictions that the federal government placed on legal services' attorneys' speech distorted the usual functioning of the judicial system: [T]he Government seeks to use an existing medium of expression and to control it, in a class of cases, in ways which distort its usual functioning. . . . The First Amendment forb[ids] the Government from using the forum in an unconventional way to suppress speech inherent in the nature of the medium. 531 U.S. at 543. By the same token, CIPA arguably distorts the usual functioning of public libraries both by requiring libraries to: (1) deny patrons access to constitutionally protected speech that libraries would otherwise provide to patrons; and (2) delegate decision making to private software developers who closely guard their selection criteria as trade secrets and who do not purport to make their decisions on the basis of whether the blocked Web sites are constitutionally protected or would add value to a public library's collection. At all events, CIPA clearly does not seem to serve the purpose of limiting the extent of government speech given the extreme diversity of speech on the Internet. Nor can Congress's decision to subsidize Internet access be said to promote a governmental message or constitute governmental speech, even under a generous understanding of the concept. As the Court noted in Reno v. ACLU, 521 U.S. 844 (1997), "[i]t is no exaggeration to conclude that the content on the Internet is as diverse as human thought." Id. at 852 (internal quotation marks omitted). Even with software filters in place, the sheer breadth of speech available on the Internet defeats any claim that CIPA is intended to facilitate the dissemination of governmental speech. Like in Velazquez, "there is no programmatic message of the kind recognized in Rust and which sufficed there to allow the Government to specify the advice deemed necessary for its legitimate objectives." Velazquez, 531 U.S. at 548. In sum, we think that the plaintiffs have good arguments that they may assert an unconstitutional conditions claim by relying either on the public libraries' First Amendment rights or on the rights of their patrons. We also think that the plaintiffs have a good argument that CIPA's requirement that public libraries use filtering software distorts the usual functioning of public libraries in such a way that it constitutes an unconstitutional condition on the receipt of funds. We do not decide these issues, confident that our findings of fact on the functioning of public libraries, their use of the Internet, and the technological limitations of Internet filtering software, see supra Sections II.D-E, would allow the Supreme Court to decide the unconstitutional conditions claim if the Court deems it necessary. CIPA Sec. 1712(a)(2) contains a provision titled "Separability," which is codified in the Library Services and Technology Act, 20 U.S.C. Sec. 9134(f)(6), and provides: "If any provision of this subsection is held invalid, the remainder of this subsection shall not be affected thereby." CIPA section 1721(e) also contained a similar provision that applied to E-rate funding, although it was not codified in the Communications Act. That section, also titled "Separability," provided: "If any provision of paragraph (5) or (6) of section 254(h) of the Communications Act of 1934, as amended by this section, or the application thereof to any person or circumstance is held invalid, the remainder of such paragraph and the application of such paragraph to other persons or circumstances shall not be affected thereby." CIPA Sec. 1721(e). 34 ---- Part A Zen and the Art of the Internet Copyright (c) 1992 Brendan P. Kehoe Permission is granted to make and distribute verbatim copies of this guide provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this booklet under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this booklet into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the author. Zen and the Art of the Internet A Beginner's Guide to the Internet First Edition January 1992 by Brendan P. Kehoe This is revision 1.0 of February 2, 1992. Copyright (c) 1992 Brendan P. Kehoe The composition of this booklet was originally started because the Computer Science department at Widener University was in desperate need of documentation describing the capabilities of this "great new Internet link" we obtained. It's since grown into an effort to acquaint the reader with much of what's currently available over the Internet. Aimed at the novice user, it attempts to remain operating system "neutral"---little information herein is specific to Unix, VMS, or any other environment. This booklet will, hopefully, be usable by nearly anyone. A user's session is usually offset from the rest of the paragraph, as such: prompt> command The results are usually displayed here. The purpose of this booklet is two-fold: first, it's intended to serve as a reference piece, which someone can easily grab on the fly and look something up. Also, it forms a foundation from which people can explore the vast expanse of the Internet. Zen and the Art of the Internet doesn't spend a significant amount of time on any one point; rather, it provides enough for people to learn the specifics of what his or her local system offers. One warning is perhaps in order---this territory we are entering can become a fantastic time-sink. Hours can slip by, people can come and go, and you'll be locked into Cyberspace. Remember to do your work! With that, I welcome you, the new user, to The Net. brendan@cs.widener.edu Chester, PA Acknowledgements Certain sections in this booklet are not my original work---rather, they are derived from documents that were available on the Internet and already aptly stated their areas of concentration. The chapter on Usenet is, in large part, made up of what's posted monthly to news.announce.newusers, with some editing and rewriting. Also, the main section on archie was derived from whatis.archie by Peter Deutsch of the McGill University Computing Centre. It's available via anonymous FTP from archie.mcgill.ca. Much of what's in the telnet section came from an impressive introductory document put together by SuraNet. Some definitions in the one are from an excellent glossary put together by Colorado State University. This guide would not be the same without the aid of many people on The Net, and the providers of resources that are already out there. I'd like to thank the folks who gave this a read-through and returned some excellent comments, suggestions, and criticisms, and those who provided much-needed information on the fly. Glee Willis deserves particular mention for all of his work; this guide would have been considerably less polished without his help. Andy Blankenbiller Andy Blankenbiller, Army at Aberdeen bajan@cs.mcgill.ca Alan Emtage, McGill University Computer Science Department Brian Fitzgerald Brian Fitzgerald, Rensselaer Polytechnic Institute John Goetsch John Goetsch, Rhodes University, South Africa composer@chem.bu.edu Jeff Kellem, Boston University's Chemistry Department kraussW@moravian.edu Bill Krauss, Moravian College Steve Lodin Steve Lodin, Delco Electronics Mike Nesel Mike Nesel, NASA Bob Bob Neveln, Widener University Computer Science Department wamapi@dunkin.cc.mcgill.ca (Wanda Pierce) Wanda Pierce, McGill University Computing Centre Joshua.R.Poulson@cyber.widener.edu Joshua Poulson, Widener University Computing Services de5@ornl.gov Dave Sill, Oak Ridge National Laboratory bsmart@bsmart.tti.com Bob Smart, CitiCorp/TTI emv@msen.com Ed Vielmetti, Vice President of MSEN Craig E. Ward Craig Ward, USC/Information Sciences Institute (ISI) Glee Willis Glee Willis, University of Nevada, Reno Charles Yamasaki Chip Yamasaki, OSHA Network Basics We are truly in an information society. Now more than ever, moving vast amounts of information quickly across great distances is one of our most pressing needs. From small one-person entrepreneurial efforts, to the largest of corporations, more and more professional people are discovering that the only way to be successful in the '90s and beyond is to realize that technology is advancing at a break-neck pace---and they must somehow keep up. Likewise, researchers from all corners of the earth are finding that their work thrives in a networked environment. Immediate access to the work of colleagues and a "virtual" library of millions of volumes and thousands of papers affords them the ability to encorporate a body of knowledge heretofore unthinkable. Work groups can now conduct interactive conferences with each other, paying no heed to physical location---the possibilities are endless. You have at your fingertips the ability to talk in "real-time" with someone in Japan, send a 2,000-word short story to a group of people who will critique it for the sheer pleasure of doing so, see if a Macintosh sitting in a lab in Canada is turned on, and find out if someone happens to be sitting in front of their computer (logged on) in Australia, all inside of thirty minutes. No airline (or tardis, for that matter) could ever match that travel itinerary. The largest problem people face when first using a network is grasping all that's available. Even seasoned users find themselves surprised when they discover a new service or feature that they'd never known even existed. Once acquainted with the terminology and sufficiently comfortable with making occasional mistakes, the learning process will drastically speed up. Domains Getting where you want to go can often be one of the more difficult aspects of using networks. The variety of ways that places are named will probably leave a blank stare on your face at first. Don't fret; there is a method to this apparent madness. If someone were to ask for a home address, they would probably expect a street, apartment, city, state, and zip code. That's all the information the post office needs to deliver mail in a reasonably speedy fashion. Likewise, computer addresses have a structure to them. The general form is: a person's email address on a computer: user@somewhere.domain a computer's name: somewhere.domain The user portion is usually the person's account name on the system, though it doesn't have to be. somewhere.domain tells you the name of a system or location, and what kind of organization it is. The trailing domain is often one of the following: com Usually a company or other commercial institution or organization, like Convex Computers (convex.com). edu An educational institution, e.g. New York University, named nyu.edu. gov A government site; for example, NASA is nasa.gov. mil A military site, like the Air Force (af.mil). net Gateways and other administrative hosts for a network (it does not mean all of the hosts in a network). {The Matrix, 111. One such gateway is near.net.} org This is a domain reserved for private organizations, who don't comfortably fit in the other classes of domains. One example is the Electronic Frontier Foundation named eff.org. Each country also has its own top-level domain. For example, the us domain includes each of the fifty states. Other countries represented with domains include: au Australia ca Canada fr France uk The United Kingdom. These also have sub-domains of things like ac.uk for academic sites and co.uk for commercial ones. FQDN (Fully Qualified Domain Name) The proper terminology for a site's domain name (somewhere.domain above) is its Fully Qualified Domain Name (FQDN). It is usually selected to give a clear indication of the site's organization or sponsoring agent. For example, the Massachusetts Institute of Technology's FQDN is mit.edu; similarly, Apple Computer's domain name is apple.com. While such obvious names are usually the norm, there are the occasional exceptions that are ambiguous enough to mislead---like vt.edu, which on first impulse one might surmise is an educational institution of some sort in Vermont; not so. It's actually the domain name for Virginia Tech. In most cases it's relatively easy to glean the meaning of a domain name---such confusion is far from the norm. Internet Numbers Every single machine on the Internet has a unique address, {At least one address, possibly two or even three---but we won't go into that.} called its Internet number or IP Address. It's actually a 32-bit number, but is most commonly represented as four numbers joined by periods (.), like 147.31.254.130. This is sometimes also called a dotted quad; there are literally thousands of different possible dotted quads. The ARPAnet (the mother to today's Internet) originally only had the capacity to have up to 256 systems on it because of the way each system was addressed. In the early eighties, it became clear that things would fast outgrow such a small limit; the 32-bit addressing method was born, freeing thousands of host numbers. Each piece of an Internet address (like 192) is called an "octet," representing one of four sets of eight bits. The first two or three pieces (e.g. 192.55.239) represent the network that a system is on, called its subnet. For example, all of the computers for Wesleyan University are in the subnet 129.133. They can have numbers like 129.133.10.10, 129.133.230.19, up to 65 thousand possible combinations (possible computers). IP addresses and domain names aren't assigned arbitrarily---that would lead to unbelievable confusion. An application must be filed with the Network Information Center (NIC), either electronically (to hostmaster@nic.ddn.mil) or via regular mail. Resolving Names and Numbers Ok, computers can be referred to by either their FQDN or their Internet address. How can one user be expected to remember them all? They aren't. The Internet is designed so that one can use either method. Since humans find it much more natural to deal with words than numbers in most cases, the FQDN for each host is mapped to its Internet number. Each domain is served by a computer within that domain, which provides all of the necessary information to go from a domain name to an IP address, and vice-versa. For example, when someone refers to foosun.bar.com, the resolver knows that it should ask the system foovax.bar.com about systems in bar.com. It asks what Internet address foosun.bar.com has; if the name foosun.bar.com really exists, foovax will send back its number. All of this "magic" happens behind the scenes. Rarely will a user have to remember the Internet number of a site (although often you'll catch yourself remembering an apparently obscure number, simply because you've accessed the system frequently). However, you will remember a substantial number of FQDNs. It will eventually reach a point when you are able to make a reasonably accurate guess at what domain name a certain college, university, or company might have, given just their name. The Networks Internet The Internet is a large "network of networks." There is no one network known as The Internet; rather, regional nets like SuraNet, PrepNet, NearNet, et al., are all inter-connected (nay, "inter-networked") together into one great living thing, communicating at amazing speeds with the TCP/IP protocol. All activity takes place in "real-time." UUCP The UUCP network is a loose association of systems all communicating with the UUCP protocol. (UUCP stands for `Unix-to-Unix Copy Program'.) It's based on two systems connecting to each other at specified intervals, called polling, and executing any work scheduled for either of them. Historically most UUCP was done with Unix equipment, although the software's since been implemented on other platforms (e.g. VMS). For example, the system oregano polls the system basil once every two hours. If there's any mail waiting for oregano, basil will send it at that time; likewise, oregano will at that time send any jobs waiting for basil. BITNET BITNET (the "Because It's Time Network") is comprised of systems connected by point-to-point links, all running the NJE protocol. It's continued to grow, but has found itself suffering at the hands of the falling costs of Internet connections. Also, a number of mail gateways are in place to reach users on other networks. The Physical Connection The actual connections between the various networks take a variety of forms. The most prevalent for Internet links are 56k leased lines (dedicated telephone lines carrying 56kilobit-per-second connections) and T1 links (special phone lines with 1Mbps connections). Also installed are T3 links, acting as backbones between major locations to carry a massive 45Mbps load of traffic. These links are paid for by each institution to a local carrier (for example, Bell Atlantic owns PrepNet, the main provider in Pennsylvania). Also available are SLIP connections, which carry Internet traffic (packets) over high-speed modems. UUCP links are made with modems (for the most part), that run from 1200 baud all the way up to as high as 38.4Kbps. As was mentioned in The Networks, the connections are of the store-and-forward variety. Also in use are Internet-based UUCP links (as if things weren't already confusing enough!). The systems do their UUCP traffic over TCP/IP connections, which give the UUCP-based network some blindingly fast "hops," resulting in better connectivity for the network as a whole. UUCP connections first became popular in the 1970's, and have remained in wide-spread use ever since. Only with UUCP can Joe Smith correspond with someone across the country or around the world, for the price of a local telephone call. BITNET links mostly take the form of 9600bps modems connected from site to site. Often places have three or more links going; the majority, however, look to "upstream" sites for their sole link to the network. "The Glory and the Nothing of a Name" Byron, {Churchill's Grave} ----------- Electronic Mail The desire to communicate is the essence of networking. People have always wanted to correspond with each other in the fastest way possible, short of normal conversation. Electronic mail (or email) is the most prevalent application of this in computer networking. It allows people to write back and forth without having to spend much time worrying about how the message actually gets delivered. As technology grows closer and closer to being a common part of daily life, the need to understand the many ways it can be utilized and how it works, at least to some level, is vital. part of daily life (as has been evidenced by the ISDN effort, the need to understand the many ways it can be utilized and how it works, at least to some level, is vital. Email Addresses Electronic mail is hinged around the concept of an address; the section on Networking Basics made some reference to it while introducing domains. Your email address provides all of the information required to get a message to you from anywhere in the world. An address doesn't necessarily have to go to a human being. It could be an archive server, {See Archive Servers, for a description.} a list of people, or even someone's pocket pager. These cases are the exception to the norm---mail to most addresses is read by human beings. %@!.: Symbolic Cacophony Email addresses usually appear in one of two forms---using the Internet format which contains @, an "at"-sign, or using the UUCP format which contains !, an exclamation point, also called a "bang." The latter of the two, UUCP "bang" paths, is more restrictive, yet more clearly dictates how the mail will travel. To reach Jim Morrison on the system south.america.org, one would address the mail as jm@south.america.org. But if Jim's account was on a UUCP site named brazil, then his address would be brazil!jm. If it's possible (and one exists), try to use the Internet form of an address; bang paths can fail if an intermediate site in the path happens to be down. There is a growing trend for UUCP sites to register Internet domain names, to help alleviate the problem of path failures. Another symbol that enters the fray is %---it acts as an extra "routing" method. For example, if the UUCP site dream is connected to south.america.org, but doesn't have an Internet domain name of its own, a user debbie on dream can be reached by writing to the address not smallexample! debbie%dream@south.america.org The form is significant. This address says that the local system should first send the mail to south.america.org. There the address debbie%dream will turn into debbie@dream, which will hopefully be a valid address. Then south.america.org will handle getting the mail to the host dream, where it will be delivered locally to debbie. All of the intricacies of email addressing methods are fully covered in the book "!%@@:: A Directory of Electronic Mail Addressing and Networks" published by O'Reilly and Associates, as part of their Nutshell Handbook series. It is a must for any active email user. Write to nuts@ora.com for ordering information. Sending and Receiving Mail We'll make one quick diversion from being OS-neuter here, to show you what it will look like to send and receive a mail message on a Unix system. Check with your system administrator for specific instructions related to mail at your site. A person sending the author mail would probably do something like this: % mail brendan@cs.widener.edu Subject: print job's stuck I typed `print babe.gif' and it didn't work! Why?? The next time the author checked his mail, he would see it listed in his mailbox as: % mail "/usr/spool/mail/brendan": 1 messages 1 new 1 unread U 1 joeuser@foo.widene Tue May 5 20:36 29/956 print job's stuck ? which gives information on the sender of the email, when it was sent, and the subject of the message. He would probably use the reply command of Unix mail to send this response: ? r To: joeuser@@foo.widener.edu Subject: Re: print job's stuck You shouldn't print binary files like GIFs to a printer! Brendan Try sending yourself mail a few times, to get used to your system's mailer. It'll save a lot of wasted aspirin for both you and your system administrator. Anatomy of a Mail Header An electronic mail message has a specific structure to it that's common across every type of computer system. {The standard is written down in RFC-822. See also RFCs for more info on how to get copies of the various RFCs.} A sample would be: >From bush@hq.mil Sat May 25 17:06:01 1991 Received: from hq.mil by house.gov with SMTP id AA21901 (4.1/SMI for dan@house.gov); Sat, 25 May 91 17:05:56 -0400 Date: Sat, 25 May 91 17:05:56 -0400 From: The President Message-Id: <9105252105.AA06631@hq.mil> To: dan@senate.gov Subject: Meeting Hi Dan .. we have a meeting at 9:30 a.m. with the Joint Chiefs. Please don't oversleep this time. The first line, with From and the two lines for Received: are usually not very interesting. They give the "real" address that the mail is coming from (as opposed to the address you should reply to, which may look much different), and what places the mail went through to get to you. Over the Internet, there is always at least one Received: header and usually no more than four or five. When a message is sent using UUCP, one Received: header is added for each system that the mail passes through. This can often result in more than a dozen Received: headers. While they help with dissecting problems in mail delivery, odds are the average user will never want to see them. Most mail programs will filter out this kind of "cruft" in a header. The Date: header contains the date and time the message was sent. Likewise, the "good" address (as opposed to "real" address) is laid out in the From: header. Sometimes it won't include the full name of the person (in this case The President), and may look different, but it should always contain an email address of some form. The Message-ID: of a message is intended mainly for tracing mail routing, and is rarely of interest to normal users. Every Message-ID: is guaranteed to be unique. To: lists the email address (or addresses) of the recipients of the message. There may be a Cc: header, listing additional addresses. Finally, a brief subject for the message goes in the Subject: header. The exact order of a message's headers may vary from system to system, but it will always include these fundamental headers that are vital to proper delivery. Bounced Mail When an email address is incorrect in some way (the system's name is wrong, the domain doesn't exist, whatever), the mail system will bounce the message back to the sender, much the same way that the Postal Service does when you send a letter to a bad street address. The message will include the reason for the bounce; a common error is addressing mail to an account name that doesn't exist. For example, writing to Lisa Simpson at Widener University's Computer Science department will fail, because she doesn't have an account. {Though if she asked, we'd certainly give her one.} From: Mail Delivery Subsystem Date: Sat, 25 May 91 16:45:14 -0400 To: mg@gracie.com Cc: Postmaster@cs.widener.edu Subject: Returned mail: User unknown ----- Transcript of session follows ----- While talking to cs.widener.edu: >>> RCPT To: <<< 550 ... User unknown 550 lsimpson... User unknown As you can see, a carbon copy of the message (the Cc: header entry) was sent to the postmaster of Widener's CS department. The Postmaster is responsible for maintaining a reliable mail system on his system. Usually postmasters at sites will attempt to aid you in getting your mail where it's supposed to go. If a typing error was made, then try re-sending the message. If you're sure that the address is correct, contact the postmaster of the site directly and ask him how to properly address it. The message also includes the text of the mail, so you don't have to retype everything you wrote. ----- Unsent message follows ----- Received: by cs.widener.edu id AA06528; Sat, 25 May 91 16:45:14 -0400 Date: Sat, 25 May 91 16:45:14 -0400 From: Matt Groening Message-Id: <9105252045.AA06528@gracie.com> To: lsimpson@cs.widener.edu Subject: Scripting your future episodes Reply-To: writing-group@gracie.com .... verbiage ... The full text of the message is returned intact, including any headers that were added. This can be cut out with an editor and fed right back into the mail system with a proper address, making redelivery a relatively painless process. Mailing Lists People that share common interests are inclined to discuss their hobby or interest at every available opportunity. One modern way to aid in this exchange of information is by using a mailing list---usually an email address that redistributes all mail sent to it back out to a list of addresses. For example, the Sun Managers mailing list (of interest to people that administer computers manufactured by Sun) has the address sun-managers@eecs.nwu.edu. Any mail sent to that address will "explode" out to each person named in a file maintained on a computer at Northwestern University. Administrative tasks (sometimes referred to as administrivia) are often handled through other addresses, typically with the suffix -request. To continue the above, a request to be added to or deleted from the Sun Managers list should be sent to sun-managers-request@eecs.nwu.edu. When in doubt, try to write to the -request version of a mailing list address first; the other people on the list aren't interested in your desire to be added or deleted, and can certainly do nothing to expedite your request. Often if the administrator of a list is busy (remember, this is all peripheral to real jobs and real work), many users find it necessary to ask again and again, often with harsher and harsher language, to be removed from a list. This does nothing more than waste traffic and bother everyone else receiving the messages. If, after a reasonable amount of time, you still haven't succeeded to be removed from a mailing list, write to the postmaster at that site and see if they can help. Exercise caution when replying to a message sent by a mailing list. If you wish to respond to the author only, make sure that the only address you're replying to is that person, and not the entire list. Often messages of the sort "Yes, I agree with you completely!" will appear on a list, boring the daylights out of the other readers. Likewise, if you explicitly do want to send the message to the whole list, you'll save yourself some time by checking to make sure it's indeed headed to the whole list and not a single person. A list of the currently available mailing lists is available in at least two places; the first is in a file on ftp.nisc.sri.com called interest-groups under the netinfo/ directory. It's updated fairly regularly, but is large (presently around 700K), so only get it every once in a while. The other list is maintained by Gene Spafford (spaf@cs.purdue.edu), and is posted in parts to the newsgroup news.lists semi-regularly. (Usenet News, for info on how to read that and other newsgroups.) Listservs On BITNET there's an automated system for maintaining discussion lists called the listserv. Rather than have an already harried and overworked human take care of additions and removals from a list, a program performs these and other tasks by responding to a set of user-driven commands. Areas of interest are wide and varied---ETHICS-L deals with ethics in computing, while ADND-L has to do with a role-playing game. A full list of the available BITNET lists can be obtained by writing to LISTSERV@BITNIC.BITNET with a body containing the command list global However, be sparing in your use of this---see if it's already on your system somewhere. The reply is quite large. The most fundamental command is subscribe. It will tell the listserv to add the sender to a specific list. The usage is subscribe foo-l Your Real Name It will respond with a message either saying that you've been added to the list, or that the request has been passed on to the system on which the list is actually maintained. The mate to subscribe is, naturally, unsubscribe. It will remove a given address from a BITNET list. It, along with all other listserv commands, can be abbreviated---subscribe as sub, unsubscribe as unsub, etc. For a full list of the available listserv commands, write to LISTSERV@BITNIC.BITNET, giving it the command help. As an aside, there have been implementations of the listserv system for non-BITNET hosts (more specifically, Unix systems). One of the most complete is available on cs.bu.edu in the directory pub/listserv. "I made this letter longer than usual because I lack the time to make it shorter." Pascal, Provincial Letters XVI -------------- Anonymous FTP FTP (File Transfer Protocol) is the primary method of transferring files over the Internet. On many systems, it's also the name of the program that implements the protocol. Given proper permission, it's possible to copy a file from a computer in South Africa to one in Los Angeles at very fast speeds (on the order of 5--10K per second). This normally requires either a user id on both systems or a special configuration set up by the system administrator(s). There is a good way around this restriction---the anonymous FTP service. It essentially will let anyone in the world have access to a certain area of disk space in a non-threatening way. With this, people can make files publicly available with little hassle. Some systems have dedicated entire disks or even entire computers to maintaining extensive archives of source code and information. They include gatekeeper.dec.com (Digital), wuarchive.wustl.edu (Washington University in Saint Louis), and archive.cis.ohio-state.edu (The Ohio State University). The process involves the "foreign" user (someone not on the system itself) creating an FTP connection and logging into the system as the user anonymous, with an arbitrary password: Name (foo.site.com:you): anonymous Password: jm@south.america.org Custom and netiquette dictate that people respond to the Password: query with an email address so that the sites can track the level of FTP usage, if they desire. (Addresses for information on email addresses). The speed of the transfer depends on the speed of the underlying link. A site that has a 9600bps SLIP connection will not get the same throughput as a system with a 56k leased line (The Physical Connection, for more on what kinds of connections can exist in a network). Also, the traffic of all other users on that link will affect performance. If there are thirty people all FTPing from one site simultaneously, the load on the system (in addition to the network connection) will degrade the overall throughput of the transfer. FTP Etiquette Lest we forget, the Internet is there for people to do work. People using the network and the systems on it are doing so for a purpose, whether it be research, development, whatever. Any heavy activity takes away from the overall performance of the network as a whole. The effects of an FTP connection on a site and its link can vary; the general rule of thumb is that any extra traffic created detracts from the ability of that site's users to perform their tasks. To help be considerate of this, it's highly recommended that FTP sessions be held only after normal business hours for that site, preferably late at night. The possible effects of a large transfer will be less destructive at 2 a.m. than 2 p.m. Also, remember that if it's past dinner time in Maine, it's still early afternoon in California---think in terms of the current time at the site that's being visited, not of local time. Basic Commands While there have been many extensions to the various FTP clients out there, there is a de facto "standard" set that everyone expects to work. For more specific information, read the manual for your specific FTP program. This section will only skim the bare minimum of commands needed to operate an FTP session. Creating the Connection The actual command to use FTP will vary among operating systems; for the sake of clarity, we'll use FTP here, since it's the most general form. There are two ways to connect to a system---using its hostname or its Internet number. Using the hostname is usually preferred. However, some sites aren't able to resolve hostnames properly, and have no alternative. We'll assume you're able to use hostnames for simplicity's sake. The form is ftp somewhere.domain Domains for help with reading and using domain names (in the example below, somewhere.domain is ftp.uu.net). You must first know the name of the system you want to connect to. We'll use ftp.uu.net as an example. On your system, type: ftp ftp.uu.net (the actual syntax will vary depending on the type of system the connection's being made from). It will pause momentarily then respond with the message Connected to ftp.uu.net. and an initial prompt will appear: 220 uunet FTP server (Version 5.100 Mon Feb 11 17:13:28 EST 1991) ready. Name (ftp.uu.net:jm): to which you should respond with anonymous: 220 uunet FTP server (Version 5.100 Mon Feb 11 17:13:28 EST 1991) ready. Name (ftp.uu.net:jm): anonymous The system will then prompt you for a password; as noted previously, a good response is your email address: 331 Guest login ok, send ident as password. Password: jm@south.america.org 230 Guest login ok, access restrictions apply. ftp> The password itself will not echo. This is to protect a user's security when he or she is using a real account to FTP files between machines. Once you reach the ftp> prompt, you know you're logged in and ready to go. Notice the ftp.uu.net:joe in the Name: prompt? That's another clue that anonymous FTP is special: FTP expects a normal user accounts to be used for transfers. dir At the ftp> prompt, you can type a number of commands to perform various functions. One example is dir---it will list the files in the current directory. Continuing the example from above: ftp> dir 200 PORT command successful. 150 Opening ASCII mode data connection for /bin/ls. total 3116 drwxr-xr-x 2 7 21 512 Nov 21 1988 .forward -rw-rw-r-- 1 7 11 0 Jun 23 1988 .hushlogin drwxrwxr-x 2 0 21 512 Jun 4 1990 Census drwxrwxr-x 2 0 120 512 Jan 8 09:36 ClariNet ... etc etc ... -rw-rw-r-- 1 7 14 42390 May 20 02:24 newthisweek.Z ... etc etc ... -rw-rw-r-- 1 7 14 2018887 May 21 01:01 uumap.tar.Z drwxrwxr-x 2 7 6 1024 May 11 10:58 uunet-info 226 Transfer complete. 5414 bytes received in 1.1 seconds (4.9 Kbytes/s) ftp> The file newthisweek.Z was specifically included because we'll be using it later. Just for general information, it happens to be a listing of all of the files added to UUNET's archives during the past week. The directory shown is on a machine running the Unix operating system---the dir command will produce different results on other operating systems (e.g. TOPS, VMS, et al.). Learning to recognize different formats will take some time. After a few weeks of traversing the Internet, it proves easier to see, for example, how large a file is on an operating system you're otherwise not acquainted with. With many FTP implementations, it's also possible to take the output of dir and put it into a file on the local system with ftp> dir n* outfilename the contents of which can then be read outside of the live FTP connection; this is particularly useful for systems with very long directories (like ftp.uu.net). The above example would put the names of every file that begins with an n into the local file outfilename. cd At the beginning of an FTP session, the user is in a "top-level" directory. Most things are in directories below it (e.g. /pub). To change the current directory, one uses the cd command. To change to the directory pub, for example, one would type ftp> cd pub which would elicit the response 250 CWD command successful. Meaning the "Change Working Directory" command (cd) worked properly. Moving "up" a directory is more system-specific---in Unix use the command cd .., and in VMS, cd [-]. get and put The actual transfer is performed with the get and put commands. To get a file from the remote computer to the local system, the command takes the form: ftp> get filename where filename is the file on the remote system. Again using ftp.uu.net as an example, the file newthisweek.Z can be retrieved with ftp> get newthisweek.Z 200 PORT command successful. 150 Opening ASCII mode data connection for newthisweek.Z (42390 bytes). 226 Transfer complete. local: newthisweek.Z remote: newthisweek.Z 42553 bytes received in 6.9 seconds (6 Kbytes/s) ftp> The section below on using binary mode instead of ASCII will describe why this particular choice will result in a corrupt and subsequently unusable file. If, for some reason, you want to save a file under a different name (e.g. your system can only have 14-character filenames, or can only have one dot in the name), you can specify what the local filename should be by providing get with an additional argument ftp> get newthisweek.Z uunet-new which will place the contents of the file newthisweek.Z in uunet-new on the local system. The transfer works the other way, too. The put command will transfer a file from the local system to the remote system. If the permissions are set up for an FTP session to write to a remote directory, a file can be sent with ftp> put filename As with get, put will take a third argument, letting you specify a different name for the file on the remote system. ASCII vs Binary In the example above, the file newthisweek.Z was transferred, but supposedly not correctly. The reason is this: in a normal ASCII transfer (the default), certain characters are translated between systems, to help make text files more readable. However, when binary files (those containing non-ASCII characters) are transferred, this translation should not take place. One example is a binary program---a few changed characters can render it completely useless. To avoid this problem, it's possible to be in one of two modes---ASCII or binary. In binary mode, the file isn't translated in any way. What's on the remote system is precisely what's received. The commands to go between the two modes are: ftp> ascii 200 Type set to A. (Note the A, which signifies ASCII mode.) ftp> binary 200 Type set to I. (Set to Image format, for pure binary transfers.) Note that each command need only be done once to take effect; if the user types binary, all transfers in that session are done in binary mode (that is, unless ascii is typed later). The transfer of newthisweek.Z will work if done as: ftp> binary 200 Type set to I. ftp> get newthisweek.Z 200 PORT command successful. 150 Opening BINARY mode data connection for newthisweek.Z (42390 bytes). 226 Transfer complete. local: newthisweek.Z remote: newthisweek.Z 42390 bytes received in 7.2 seconds (5.8 Kbytes/s) Note: The file size (42390) is different from that done in ASCII mode (42553) bytes; and the number 42390 matches the one in the listing of UUNET's top directory. We can be relatively sure that we've received the file without any problems. mget and mput The commands mget and mput allow for multiple file transfers using wildcards to get several files, or a whole set of files at once, rather than having to do it manually one by one. For example, to get all files that begin with the letter f, one would type ftp> mget f* Similarly, to put all of the local files that end with .c: ftp> mput *.c Rather than reiterate what's been written a hundred times before, consult a local manual for more information on wildcard matching (every DOS manual, for example, has a section on it). Normally, FTP assumes a user wants to be prompted for every file in a mget or mput operation. You'll often need to get a whole set of files and not have each of them confirmed---you know they're all right. In that case, use the prompt command to turn the queries off. ftp> prompt Interactive mode off. Likewise, to turn it back on, the prompt command should simply be issued again. Joe Granrose's List Monthly, Joe Granrose (odin@pilot.njin.net) posts to Usenet (Usenet News) an extensive list of sites offering anonymous FTP service. It's available in a number of ways: The Usenet groups comp.misc and comp.sources.wanted Anonymous FTP from pilot.njin.net [128.6.7.38], in /pub/ftp-list. Write to odin@pilot.njin.net with a Subject: line of listserv-request and a message body of send help. Please don't bother Joe with your requests---the server will provide you with the list. The archie Server archie is always in lowercase A group of people at McGill University in Canada got together and created a query system called archie. It was originally formed to be a quick and easy way to scan the offerings of the many anonymous FTP sites that are maintained around the world. As time progressed, archie grew to include other valuable services as well. The archie service is accessible through an interactive telnet session, email queries, and command-line and X-window clients. The email responses can be used along with FTPmail servers for those not on the Internet. (FTP-by-Mail Servers, for info on using FTPmail servers.) Using archie Today Currently, archie tracks the contents of over 800 anonymous FTP archive sites containing over a million files stored across the Internet. Collectively, these files represent well over 50 gigabytes of information, with new entries being added daily. The archie server automatically updates the listing information from each site about once a month. This avoids constantly updating the databases, which could waste network resources, yet ensures that the information on each site's holdings is reasonably up to date. To access archie interactively, telnet to one of the existing servers. {See Telnet, for notes on using the telnet program.} They include archie.ans.net (New York, USA) archie.rutgers.edu (New Jersey, USA) archie.sura.net (Maryland, USA) archie.unl.edu (Nebraska, USA) archie.mcgill.ca (the first Archie server, in Canada) archie.funet.fi (Finland) archie.au (Australia) archie.doc.ic.ac.uk (Great Britain) At the login: prompt of one of the servers, enter archie to log in. A greeting will be displayed, detailing information about ongoing work in the archie project; the user will be left at a archie> prompt, at which he may enter commands. Using help will yield instructions on using the prog command to make queries, set to control various aspects of the server's operation, et al. Type quit at the prompt to leave archie. Typing the query prog vine.tar.Z will yield a list of the systems that offer the source to the X-windows program vine; a piece of the information returned looks like: Host ftp.uu.net (137.39.1.9) Last updated 10:30 7 Jan 1992 Location: /packages/X/contrib FILE rw-r--r-- 15548 Oct 8 20:29 vine.tar.Z Host nic.funet.fi (128.214.6.100) Last updated 05:07 4 Jan 1992 Location: /pub/X11/contrib FILE rw-rw-r-- 15548 Nov 8 03:25 vine.tar.Z archie Clients There are two main-stream archie clients, one called (naturally enough) archie, the other xarchie (for X-Windows). They query the archie databases and yield a list of systems that have the requested file(s) available for anonymous FTP, without requiring an interactive session to the server. For example, to find the same information you tried with the server command prog, you could type % archie vine.tar.Z Host athene.uni-paderborn.de Location: /local/X11/more_contrib FILE -rw-r--r-- 18854 Nov 15 1990 vine.tar.Z Host emx.utexas.edu Location: /pub/mnt/source/games FILE -rw-r--r-- 12019 May 7 1988 vine.tar.Z Host export.lcs.mit.edu Location: /contrib FILE -rw-r--r-- 15548 Oct 9 00:29 vine.tar.Z Note that your system administrator may not have installed the archie clients yet; the source is available on each of the archie servers, in the directory archie/clients. Using the X-windows client is much more intuitive---if it's installed, just read its man page and give it a whirl. It's essential for the networked desktop. Mailing archie Users limited to email connectivity to the Internet should send a message to the address archie@archie.mcgill.ca with the single word help in the body of the message. An email message will be returned explaining how to use the email archie server, along with the details of using FTPmail. Most of the commands offered by the telnet interface can be used with the mail server. The whatis database In addition to offering access to anonymous FTP listings, archie also permits access to the whatis description database. It includes the names and brief synopses for over 3,500 public domain software packages, datasets and informational documents located on the Internet. Additional whatis databases are scheduled to be added in the future. Planned offerings include listings for the names and locations of online library catalog programs, the names of publicly accessible electronic mailing lists, compilations of Frequently Asked Questions lists, and archive sites for the most popular Usenet newsgroups. Suggestions for additional descriptions or locations databases are welcomed and should be sent to the archie developers at archie-l@cs.mcgill.ca. "Was f@"ur pl@"undern!" ("What a place to plunder!") Gebhard Leberecht Bl@"ucher ------ Usenet News Original from: chip@count.tct.com (Chip Salzenberg) [Most recent change: 19 May 1991 by spaf@cs.purdue.edu (Gene Spafford)] The first thing to understand about Usenet is that it is widely misunderstood. Every day on Usenet the "blind men and the elephant" phenomenon appears, in spades. In the opinion of the author, more flame wars (rabid arguments) arise because of a lack of understanding of the nature of Usenet than from any other source. And consider that such flame wars arise, of necessity, among people who are on Usenet. Imagine, then, how poorly understood Usenet must be by those outside! No essay on the nature of Usenet can ignore the erroneous impressions held by many Usenet users. Therefore, this section will treat falsehoods first. Keep reading for truth. (Beauty, alas, is not relevant to Usenet.) What Usenet Is Usenet is the set of machines that exchange articles tagged with one or more universally-recognized labels, called newsgroups (or "groups" for short). (Note that the term newsgroup is correct, while area, base, board, bboard, conference, round table, SIG, etc. are incorrect. If you want to be understood, be accurate.) The Diversity of Usenet If the above definition of Usenet sounds vague, that's because it is. It is almost impossible to generalize over all Usenet sites in any non-trivial way. Usenet encompasses government agencies, large universities, high schools, businesses of all sizes, home computers of all descriptions, etc. Every administrator controls his own site. No one has any real control over any site but his own. The administrator gets his power from the owner of the system he administers. As long as the owner is happy with the job the administrator is doing, he can do whatever he pleases, up to and including cutting off Usenet entirely. C'est la vie. What Usenet Is Not Usenet is not an organization. Usenet has no central authority. In fact, it has no central anything. There is a vague notion of "upstream" and "downstream" related to the direction of high-volume news flow. It follows that, to the extent that "upstream" sites decide what traffic they will carry for their "downstream" neighbors, that "upstream" sites have some influence on their neighbors. But such influence is usually easy to circumvent, and heavy-handed manipulation typically results in a backlash of resentment. Usenet is not a democracy. A democracy can be loosely defined as "government of the people, by the people, for the people." However, as explained above, Usenet is not an organization, and only an organization can be run as a democracy. Even a democracy must be organized, for if it lacks a means of enforcing the peoples' wishes, then it may as well not exist. Some people wish that Usenet were a democracy. Many people pretend that it is. Both groups are sadly deluded. Usenet is not fair. After all, who shall decide what's fair? For that matter, if someone is behaving unfairly, who's going to stop him? Neither you nor I, that's certain. Usenet is not a right. Some people misunderstand their local right of "freedom of speech" to mean that they have a legal right to use others' computers to say what they wish in whatever way they wish, and the owners of said computers have no right to stop them. Those people are wrong. Freedom of speech also means freedom not to speak; if I choose not to use my computer to aid your speech, that is my right. Freedom of the press belongs to those who own one. Usenet is not a public utility. Some Usenet sites are publicly funded or subsidized. Most of them, by plain count, are not. There is no government monopoly on Usenet, and little or no control. Usenet is not a commercial network. Many Usenet sites are academic or government organizations; in fact, Usenet originated in academia. Therefore, there is a Usenet custom of keeping commercial traffic to a minimum. If such commercial traffic is generally considered worth carrying, then it may be grudgingly tolerated. Even so, it is usually separated somehow from non-commercial traffic; see comp.newprod. Usenet is not the Internet. The Internet is a wide-ranging network, parts of which are subsidized by various governments. The Internet carries many kinds of traffic; Usenet is only one of them. And the Internet is only one of the various networks carrying Usenet traffic. Usenet is not a Unix network, nor even an ASCII network. Don't assume that everyone is using "rn" on a Unix machine. There are Vaxen running VMS, IBM mainframes, Amigas, and MS-DOS PCs reading and posting to Usenet. And, yes, some of them use (shudder) EBCDIC. Ignore them if you like, but they're out there. Usenet is not software. There are dozens of software packages used at various sites to transport and read Usenet articles. So no one program or package can be called "the Usenet software." Software designed to support Usenet traffic can be (and is) used for other kinds of communication, usually without risk of mixing the two. Such private communication networks are typically kept distinct from Usenet by the invention of newsgroup names different from the universally-recognized ones. Usenet is not a UUCP network. UUCP is a protocol (some might say protocol suite, but that's a technical point) for sending data over point-to-point connections, typically using dialup modems. Usenet is only one of the various kinds of traffic carried via UUCP, and UUCP is only one of the various transports carrying Usenet traffic. Well, enough negativity. Propagation of News In the old days, when UUCP over long-distance dialup lines was the dominant means of article transmission, a few well-connected sites had real influence in determining which newsgroups would be carried where. Those sites called themselves "the backbone." But things have changed. Nowadays, even the smallest Internet site has connectivity the likes of which the backbone admin of yesteryear could only dream. In addition, in the U.S., the advent of cheaper long-distance calls and high-speed modems has made long-distance Usenet feeds thinkable for smaller companies. There is only one pre-eminent UUCP transport site today in the U.S., namely UUNET. But UUNET isn't a player in the propagation wars, because it never refuses any traffic---it gets paid by the minute, after all; to refuse based on content would jeopardize its legal status as an enhanced service provider. All of the above applies to the U.S. In Europe, different cost structures favored the creation of strictly controlled hierarchical organizations with central registries. This is all very unlike the traditional mode of U.S. sites (pick a name, get the software, get a feed, you're on). Europe's "benign monopolies", long uncontested, now face competition from looser organizations patterned after the U.S. model. Group Creation As discussed above, Usenet is not a democracy. Nevertheless, currently the most popular way to create a new newsgroup involves a "vote" to determine popular support for (and opposition to) a proposed newsgroup. Newsgroup Creation, for detailed instructions and guidelines on the process involved in making a newsgroup. If you follow the guidelines, it is probable that your group will be created and will be widely propagated. However, due to the nature of Usenet, there is no way for any user to enforce the results of a newsgroup vote (or any other decision, for that matter). Therefore, for your new newsgroup to be propagated widely, you must not only follow the letter of the guidelines; you must also follow its spirit. And you must not allow even a whiff of shady dealings or dirty tricks to mar the vote. So, you may ask: How is a new user supposed to know anything about the "spirit" of the guidelines? Obviously, she can't. This fact leads inexorably to the following recommendation: If you're a new user, don't try to create a new newsgroup alone. If you have a good newsgroup idea, then read the news.groups newsgroup for a while (six months, at least) to find out how things work. If you're too impatient to wait six months, then you really need to learn; read news.groups for a year instead. If you just can't wait, find a Usenet old hand to run the vote for you. Readers may think this advice unnecessarily strict. Ignore it at your peril. It is embarrassing to speak before learning. It is foolish to jump into a society you don't understand with your mouth open. And it is futile to try to force your will on people who can tune you out with the press of a key. If You're Unhappy... Property rights being what they are, there is no higher authority on Usenet than the people who own the machines on which Usenet traffic is carried. If the owner of the machine you use says, "We will not carry alt.sex on this machine," and you are not happy with that order, you have no Usenet recourse. What can we outsiders do, after all? That doesn't mean you are without options. Depending on the nature of your site, you may have some internal political recourse. Or you might find external pressure helpful. Or, with a minimal investment, you can get a feed of your own from somewhere else. Computers capable of taking Usenet feeds are down in the $500 range now, Unix-capable boxes are going for under $2000, and there are at least two Unix lookalikes in the $100 price range. No matter what, appealing to "Usenet" won't help. Even if those who read such an appeal regarding system administration are sympathetic to your cause, they will almost certainly have even less influence at your site than you do. By the same token, if you don't like what some user at another site is doing, only the administrator and/or owner of that site have any authority to do anything about it. Persuade them that the user in question is a problem for them, and they might do something (if they feel like it). If the user in question is the administrator or owner of the site from which he or she posts, forget it; you can't win. Arrange for your newsreading software to ignore articles from him or her if you can, and chalk one up to experience. The History of Usenet (The ABCs) In the beginning, there were conversations, and they were good. Then came Usenet in 1979, shortly after the release of V7 Unix with UUCP; and it was better. Two Duke University grad students in North Carolina, Tom Truscott and Jim Ellis, thought of hooking computers together to exchange information with the Unix community. Steve Bellovin, a grad student at the University of North Carolina, put together the first version of the news software using shell scripts and installed it on the first two sites: unc and duke. At the beginning of 1980 the network consisted of those two sites and phs (another machine at Duke), and was described at the January 1980 Usenix conference in Boulder, CO. {The Usenix conferences are semi-annual meetings where members of the Usenix Association, a group of Unix enthusiasts, meet and trade notes.} Steve Bellovin later rewrote the scripts into C programs, but they were never released beyond unc and duke. Shortly thereafter, Steve Daniel did another implementation in the C programming language for public distribution. Tom Truscott made further modifications, and this became the "A" news release. In 1981 at the University of California at Berkeley, grad student Mark Horton and high school student Matt Glickman rewrote the news software to add functionality and to cope with the ever increasing volume of news---"A" news was intended for only a few articles per group per day. This rewrite was the "B" news version. The first public release was version 2.1 in 1982; all versions before 2.1 were considered in beta test. As The Net grew, the news software was expanded and modified. The last version maintained and released primarily by Mark was 2.10.1. Rick Adams, then at the Center for Seismic Studies, took over coordination of the maintenance and enhancement of the news software with the 2.10.2 release in 1984. By this time, the increasing volume of news was becoming a concern, and the mechanism for moderated groups was added to the software at 2.10.2. Moderated groups were inspired by ARPA mailing lists and experience with other bulletin board systems. In late 1986, version 2.11 of news was released, including a number of changes to support a new naming structure for newsgroups, enhanced batching and compression, enhanced ihave/sendme control messages, and other features. The current release of news is 2.11, patchlevel 19. A new version of news, becoming known as "C" news, has been developed at the University of Toronto by Geoff Collyer and Henry Spencer. This version is a rewrite of the lowest levels of news to increase article processing speed, decrease article expiration processing and improve the reliability of the news system through better locking, etc. The package was released to The Net in the autumn of 1987. For more information, see the paper News Need Not Be Slow, published in the Winter 1987 Usenix Technical Conference proceedings. Usenet software has also been ported to a number of platforms, from the Amiga and IBM PCs all the way to minicomputers and mainframes. Hierarchies Newsgroups are organized according to their specific areas of concentration. Since the groups are in a tree structure, the various areas are called hierarchies. There are seven major categories: comp Topics of interest to both computer professionals and hobbyists, including topics in computer science, software sources, and information on hardware and software systems. misc Group addressing themes not easily classified into any of the other headings or which incorporate themes from multiple categories. Subjects include fitness, job-hunting, law, and investments. sci Discussions marked by special knowledge relating to research in or application of the established sciences. soc Groups primarily addressing social issues and socializing. Included are discussions related to many different world cultures. talk Groups largely debate-oriented and tending to feature long discussions without resolution and without appreciable amounts of generally useful information. news Groups concerned with the news network, group maintenance, and software. rec Groups oriented towards hobbies and recreational activities These "world" newsgroups are (usually) circulated around the entire Usenet---this implies world-wide distribution. Not all groups actually enjoy such wide distribution, however. The European Usenet and Eunet sites take only a selected subset of the more "technical" groups, and controversial "noise" groups are often not carried by many sites in the U.S. and Canada (these groups are primarily under the talk and soc classifications). Many sites do not carry some or all of the comp.binaries groups because of the typically large size of the posts in them (being actual executable programs). Also available are a number of "alternative" hierarchies: alt True anarchy; anything and everything can and does appear; subjects include sex, the Simpsons, and privacy. gnu Groups concentrating on interests and software with the GNU Project of the Free Software Foundation. For further info on what the FSF is, FSF. biz Business-related groups. Moderated vs Unmoderated Some newsgroups insist that the discussion remain focused and on-target; to serve this need, moderated groups came to be. All articles posted to a moderated group get mailed to the group's moderator. He or she periodically (hopefully sooner than later) reviews the posts, and then either posts them individually to Usenet, or posts a composite digest of the articles for the past day or two. This is how many mailing list gateways work (for example, the Risks Digest). news.groups & news.announce.newgroups Being a good net.citizen includes being involved in the continuing growth and evolution of the Usenet system. One part of this involvement includes following the discussion in the groups news.groups and the notes in news.announce.newgroups. It is there that discussion goes on about the creation of new groups and destruction of inactive ones. Every person on Usenet is allowed and encouraged to vote on the creation of a newsgroup. How Usenet Works The transmission of Usenet news is entirely cooperative. Feeds are generally provided out of good will and the desire to distribute news everywhere. There are places which provide feeds for a fee (e.g. UUNET), but for the large part no exchange of money is involved. There are two major transport methods, UUCP and NNTP. The first is mainly modem-based and involves the normal charges for telephone calls. The second, NNTP, is the primary method for distributing news over the Internet. With UUCP, news is stored in batches on a site until the neighbor calls to receive the articles, or the feed site happens to call. A list of groups which the neighbor wishes to receive is maintained on the feed site. The Cnews system compresses its batches, which can dramatically reduce the transmission time necessary for a relatively heavy newsfeed. NNTP, on the other hand, offers a little more latitude with how news is sent. The traditional store-and-forward method is, of course, available. Given the "real-time" nature of the Internet, though, other methods have been devised. Programs now keep constant connections with their news neighbors, sending news nearly instantaneously, and can handle dozens of simultaneous feeds, both incoming and outgoing. The transmission of a Usenet article is centered around the unique Message-ID: header. When an NNTP site offers an article to a neighbor, it says it has that specific Message ID. If the neighbor finds it hasn't received the article yet, it tells the feed to send it through; this is repeated for each and every article that's waiting for the neighbor. Using unique IDs helps prevent a system from receiving five copies of an article from each of its five news neighbors, for example. Further information on how Usenet works with relation to the various transports is available in the documentation for the Cnews and NNTP packages, as well as in RFC-1036, the Standard for Interchange of USENET Messages and RFC-977, Network News Transfer Protocol: A Proposed Standard for the Stream-Based Transmission of News. The RFCs do tend to be rather dry reading, particularly to the new user. Mail Gateways A natural progression is for Usenet news and electronic mailing lists to somehow become merged---which they have, in the form of news gateways. Many mailing lists are set up to "reflect" messages not only to the readership of the list, but also into a newsgroup. Likewise, posts to a newsgroup can be sent to the moderator of the mailing list, or to the entire mailing list. Some examples of this in action are comp.risks (the Risks Digest) and comp.dcom.telecom (the Telecom Digest). This method of propagating mailing list traffic has helped solve the problem of a single message being delivered to a number of people at the same site---instead, anyone can just subscribe to the group. Also, mailing list maintenance is lowered substantially, since the moderators don't have to be constantly removing and adding users to and from the list. Instead, the people can read and not read the newsgroup at their leisure. from "Dear Emily Postnews" by Brad Templeton Usenet "Netiquette" There are many traditions with Usenet, not the least of which is dubbed netiquette---being polite and considerate of others. If you follow a few basic guidelines, you, and everyone that reads your posts, will be much happier in the long run. Signatures At the end of most articles is a small blurb called a person's signature. In Unix this file is named .signature in the person's login directory---it will vary for other operating systems. It exists to provide information about how to get in touch with the person posting the article, including their email address, phone number, address, or where they're located. Even so, signatures have become the graffiti of computers. People put song lyrics, pictures, philosophical quotes, even advertisements in their ".sigs". (Note, however, that advertising in your signature will more often than not get you flamed until you take it out.) Four lines will suffice---more is just extra garbage for Usenet sites to carry along with your article, which is supposed to be the intended focus of the reader. Netiquette dictates limiting oneself to this "quota" of four---some people make signatures that are ten lines or even more, including elaborate ASCII drawings of their hand-written signature or faces or even the space shuttle. This is not cute, and will bother people to no end. Similarly, it's not necessary to include your signature---if you forget to append it to an article, don't worry about it. The article's just as good as it ever would be, and contains everything you should want to say. Don't re-post the article just to include the signature. Posting Personal Messages If mail to a person doesn't make it through, avoid posting the message to a newsgroup. Even if the likelihood of that person reading the group is very high, all of the other people reading the articles don't give a whit what you have to say to Jim Morrison. Simply wait for the person to post again and double-check the address, or get in touch with your system administrator and see if it's a problem with local email delivery. It may also turn out that their site is down or is having problems, in which case it's just necessary to wait until things return to normal before contacting Jim. Posting Mail In the interests of privacy, it's considered extremely bad taste to post any email that someone may have sent, unless they explicitly give you permission to redistribute it. While the legal issues can be heavily debated, most everyone agrees that email should be treated as anything one would receive via normal snailmail, {The slang for the normal land and air postal service.} , with all of the assumed rights that are carried with it. Test Messages Many people, particularly new users, want to try out posting before actually taking part in discussions. Often the mechanics of getting messages out is the most difficult part of Usenet. To this end, many, many users find it necessary to post their tests to "normal" groups (for example, news.admin or comp.mail.misc). This is considered a major netiquette faux pas in the Usenet world. There are a number of groups available, called test groups, that exist solely for the purpose of trying out a news system, reader, or even new signature. They include alt.test gnu.gnusenet.test misc.test some of which will generate auto-magic replies to your posts to let you know they made it through. There are certain denizens of Usenet that frequent the test groups to help new users out. They respond to the posts, often including the article so the poster can see how it got to the person's site. Also, many regional hierarchies have test groups, like phl.test in Philadelphia. By all means, experiment and test---just do it in its proper place. Famous People Appearing Every once in a while, someone says that a celebrity is accessible through "The Net"; or, even more entertaining, an article is forged to appear to be coming from that celebrity. One example is Stephen Spielberg---the rec.arts.movies readership was in an uproar for two weeks following a couple of posts supposedly made by Mr. Spielberg. (Some detective work revealed it to be a hoax.) There are a few well-known people that are acquainted with Usenet and computers in general---but the overwhelming majority are just normal people. One should act with skepticism whenever a notable personality is "seen" in a newsgroup. Summaries Authors of articles occasionally say that readers should reply by mail and they'll summarize. Accordingly, readers should do just that---reply via mail. Responding with a followup article to such an article defeats the intention of the author. She, in a few days, will post one article containing the highlights of the responses she received. By following up to the whole group, the author may not read what you have to say. When creating a summary of the replies to a post, try to make it as reader-friendly as possible. Avoid just putting all of the messages received into one big file. Rather, take some time and edit the messages into a form that contains the essential information that other readers would be interested in. Also, sometimes people will respond but request to remain anonymous (one example is the employees of a corporation that feel the information's not proprietary, but at the same time want to protect themselves from political backlash). Summaries should honor this request accordingly by listing the From: address as anonymous or (Address withheld by request). Quoting When following up to an article, many newsreaders provide the facility to quote the original article with each line prefixed by > , as in In article <1232@foo.bar.com>, sharon@foo.bar.com wrote: > I agree, I think that basketweaving's really catching on, > particularly in Pennsylvania. Here's a list of every person > in PA that currently engages in it publicly: line ... etc ... This is a severe example (potentially a horribly long article), but proves a point. When you quote another person, edit out whatever isn't directly applicable to your reply. {But not changing their words, of course. } This gives the reader of the new article a better idea of what points you were addressing. By including the entire article, you'll only annoy those reading it. Also, signatures in the original aren't necessary; the readers already know who wrote it (by the attribution). Avoid being tedious with responses---rather than pick apart an article, address it in parts or as a whole. Addressing practically each and every word in an article only proves that the person responding has absolutely nothing better to do with his time. If a "war" starts (insults and personal comments get thrown back and forth), take it into email---exchange email with the person you're arguing with. No one enjoys watching people bicker incessantly. Crossposting The Newsgroups: line isn't limited to just one group---an article can be posted in a list of groups. For instance, the line Newsgroups: sci.space,comp.simulation posts the article to both the groups sci.space and comp.simulation. It's usually safe to crosspost to up to three or four groups. To list more than that is considered "excessive noise." It's also suggested that if an article is crossposted a Followup-To: header be included. It should name the group to which all additional discussion should be directed to. For the above example a possible Followup-To: would be Followup-To: sci.space which would make all followups automatically be posted to just sci.space, rather than both sci.space and comp.simulation. If every response made with a newsreader's "followup" command should go to the person posting the article no matter what, there's also a mechanism worked in to accommodate. The Followup-To: header should contain the single word poster: Followup-To: poster Certain newsreaders will use this to sense that a reply should never be posted back onto The Net. This is often used with questions that will yield a summary of information later, a vote, or an advertisement. Recent News One should avoid posting "recent" events---sports scores, a plane crash, or whatever people will see on the evening news or read in the morning paper. By the time the article has propagated across all of Usenet, the "news" value of the article will have become stale. (This is one case for the argument that Usenet news is a misnomer. {Note that the Clarinet News service (Clarinet) offers news items in a Usenet format as a precise alternative to the morning paper, et. al.) Quality of Postings How you write and present yourself in your articles is important. If you have terrible spelling, keep a dictionary near by. If you have trouble with grammar and punctuation, try to get a book on English grammar and composition (found in many bookstores and at garage sales). By all means pay attention to what you say---it makes you who you are on The Net. Likewise, try to be clear in what you ask. Ambiguous or vague questions often lead to no response at all, leaving the poster discouraged. Give as much essential information as you feel is necessary to let people help you, but keep it within limits. For instance, you should probably include the operating system of your computer in the post if it's needed, but don't tell everybody what peripherals you have hanging off of it. Useful Subjects The Subject: line of an article is what will first attract people to read it---if it's vague or doesn't describe what's contained within, no one will read the article. At the same time, Subject: lines that're too wordy tend to be irritating. For example: Good Subject: Building Emacs on a Sun Sparc under 4.1 Good Subject: Tryin' to find Waldo in NJ. Bad Subject: I can't get emacs to work !!! Bad Subject: I'm desperately in search of the honorable Mr. Waldo in the state of... Simply put, try to think of what will best help the reader when he or she encounters your article in a newsreading session. Tone of Voice Since common computers can't portray the inflection or tone in a person's voice, how articles are worded can directly affect the response to them. If you say Anybody using a Vic-20 should go buy themselves a life. you'll definitely get some responses---telling you to take a leap. Rather than be inflammatory, phrase your articles in a way that rationally expresses your opinion, like What're the practical uses of a Vic-20 these days? which presents yourself as a much more level-headed individual. Also, what case (upper or lower) you use can indicate how you're trying to speak---netiquette dictates that if you USE ALL CAPITAL LETTERS, people will think you're "shouting." Write as you would in a normal letter to a friend, following traditional rules of English (or whatever language you happen to speak). Computer Religion No matter what kind of computer a person is using, theirs is always the best and most efficient of them all. Posting articles asking questions like What computer should I buy? An Atari ST or an Amiga? will lead only to fervent arguments over the merits and drawbacks of each brand. Don't even ask The Net---go to a local user group, or do some research of your own like reading some magazine reviews. Trying to say one computer is somehow better than another is a moot point. The Anatomy of an Article Frequently Asked Questions A number of groups include Frequently Asked Question (FAQ) lists, which give the answers to questions or points that have been raised time and time again in a newsgroup. They're intended to help cut down on the redundant traffic in a group. For example, in the newsgroup alt.tv.simpsons, one recurring question is Did you notice that there's a different blackboard opening at the beginning of every Simpsons episode? As a result, it's part of the FAQ for that group. Usually, FAQ lists are posted at the beginning of each month, and are set to expire one month later (when, supposedly, the next FAQ will be published). Nearly every FAQ is also crossposted to news.answers, which is used as a Usenet repository for them. The Pit-Manager Archive MIT, with Jonathan Kamens, has graciously dedicated a machine to the archiving and storage of the various periodic postings that are peppered throughout the various Usenet groups. To access them, FTP to the system pit-manager.mit.edu and look in the directory /pub/usenet. "Be it true or false, so it be news." Ben Jonson, News from the New World ----- Telnet Telnet is the main Internet protocol for creating a connection with a remote machine. It gives the user the opportunity to be on one computer system and do work on another, which may be across the street or thousands of miles away. Where modems are limited, in the majority, by the quality of telephone lines and a single connection, telnet provides a connection that's error-free and nearly always faster than the latest conventional modems. Using Telnet As with FTP (Anonymous FTP), the actual command for negotiating a telnet connection varies from system to system. The most common is telnet itself, though. It takes the form of: telnet somewhere.domain To be safe, we'll use your local system as a working example. By now, you hopefully know your site's domain name. If not, ask or try to figure it out. You'll not get by without it. To open the connection, type telnet your.system.name If the system were wubba.cs.widener.edu, for example, the command would look like telnet wubba.cs.widener.edu The system will respond with something similar to Trying 147.31.254.999... Connected to wubba.cs.widener.edu. Escape character is '^]'. The escape character, in this example ^] (Control-]), is the character that will let you go back to the local system to close the connection, suspend it, etc. To close this connection, the user would type ^], and respond to the telnet> prompt with the command close. Local documentation should be checked for information on specific commands, functions, and escape character that can be used. Telnet Ports Many telnet clients also include a third option, the port on which the connection should take place. Normally, port 23 is the default telnet port; the user never has to think about it. But sometimes it's desirable to telnet to a different port on a system, where there may be a service available, or to aid in debugging a problem. Using telnet somewhere.domain port will connect the user to the given port on the system somewhere.domain. Many libraries use this port method to offer their facilities to the general Internet community; other services are also available. For instance, one would type telnet martini.eecs.umich.edu 3000 to connect to the geographic server at the University of Michigan (Geographic Server). Other such port connections follow the same usage. Publicly Accessible Libraries Over the last several years, most university libraries have switched from a manual (card) catalog system to computerized library catalogs. The automated systems provide users with easily accessible and up-to-date information about the books available in these libraries. This has been further improved upon with the advent of local area networks, dialup modems, and wide area networks. Now many of us can check on our local library's holdings or that of a library halfway around the world! Many, many institutions of higher learning have made their library catalogs available for searching by anyone on the Internet. They include Boston University, the Colorado Alliance of Research Libraries (CARL), and London University King's College. To include a listing of some of the existing sites would not only be far too long for this document, it would soon be out of date. Instead, several lists are being maintained and are available either by mail or via FTP. Also, the Internet Resource Guide (IRG) also describes a few libraries that are accessible---IRG for further information. Art St. George and Ron Larsen are maintaining a list of Internet-accessible libraries and databases often referred to as "the St. George directory." It began with only library catalogs but has expanded to include sections on campus-wide information systems, and even bulletin board systems that are not on the Internet. The library catalog sections are divided into those that are free, those that charge, and international (i.e. non-U.S.) catalogs; they are arranged by state, province, or country within each section. There is also a section giving dialup information for some of the library catalogs. It's available for FTP (Anonymous FTP) on nic.cerf.net in the directory cerfnet/cerfnet_info/library_catalog. The file internet-catalogs has a date suffix; check for the most current date. The information is updated periodically. Billy Barron, Systems Manager at the University of North Texas, produces a directory as an aid to his user community. It complements the St. George guide by providing a standard format for all systems which lists the Internet address, login instructions, the system vendor, and logoff information. The arrangement is alphabetic by organization name. It's available for FTP on vaxb.acs.unt.edu in the subdirectory library as the file libraries.txt. For announcements of new libraries being available and discussion on related topics, consult the Usenet newsgroup comp.internet.library (Usenet News to learn how to read news). Bulletin Board Systems The Cleveland Freenet Freenets are open-access, free, community computer systems. One such system is the Cleveland Freenet, sponsored by CWRU (Case Western Reserve University). Anyone and everyone is welcome to join and take part in the exciting project---that of a National Telecomputing Public Network, where everyone benefits. There's no charge for the registration process and no charge to use the system. To register, telnet to any one of freenet-in-a.cwru.edu freenet-in-b.cwru.edu freenet-in-c.cwru.edu After you're connected, choose the entry on the menu that signifies you're a guest user. Another menu will follow; select Apply for an account, and you'll be well on your way to being a FreeNet member. You will need to fill out a form and send it to them through the Postal Service---your login id and password will be created in a few days. At that point you're free to use the system as you wish. They provide multi-user chat, email, Usenet news, and a variety of other things to keep you occupied for hours on end. Directories There are a few systems that are maintained to provide the Internet community with access to lists of information---users, organizations, etc. They range from fully dedicated computers with access to papers and research results, to a system to find out about the faculty members of a university. Knowbot Knowbot is a "master directory" that contains email address information from the NIC WHOIS database (Whois), the PSI White Pages Pilot Project, the NYSERNET X.500 database and MCI Mail. Most of these services are email registries themselves, but Knowbot provides a very comfortable way to access all of them in one place. Telnet to nri.reston.va.us on port 185. White Pages PSI maintains a directory of information on individuals. It will list the person's name, organization, and email address if it is given. Telnet to wp.psi.net and log in as fred. The White Pages Project also includes an interface to use Xwindows remotely. Faculty and Staff Listings Many universities offer access to information on current faculty and staff. Included are: Cornell Telnet to cuinfo.cornell.edu on port 3000. NC State Telnet to ccvax1.cc.ncsu.edu and log in as info. Rutgers Telnet to hangout.rutgers.edu on port 98. U of Maryland Telnet to umail.umd.edu and log in as lookup. UNC Chapel Hill Telnet to info.acs.unc.edu and log in as info. Yale Telnet to yalevm.ycc.yale.edu on port 300. Databases For information on database services, Commercial Databases. Not all databases on the Internet require payment for use, though. There do exist some, largely research-driven databases, which are publicly accessible. New ones spring up regularly. To find out more about the databases in this section, contact the people directly responsible for them. Their areas of concentration and the software used to implement them are widely disparate, and are probably beyond the author's expertise. Also, don't forget to check with your local library---the reference librarian there can provide information on conventional resources, and possibly even those available over the Internet (they are becoming more common). Colorado Alliance of Research Libraries (CARL) The Colorado Alliance of Research Libraries (CARL), in association with CARL Systems Inc., operates a public access catalog of services. Offered are a number of library databases, including searches for government periodicals, book reviews, indices for current articles, and access to to other library databases around the country. Other services are available to CARL members including an online encyclopedia. Telnet to pac.carl.org, or write to help@carl.org for more details. PENpages PENpages is an agriculturally-oriented database administered by Pennsylvania State University. Information entered into PENpages is provided by numerous sources including the Pennsylvania Dept. of Agriculture, Rutgers University, and Penn State. Easy-to-use menus guide users to information ranging from cattle and agricultural prices to current weather information, from health information to agricultural news from around the nation. A keyword search option also allows users to search the database for related information and articles. The database is updated daily, and a listing of most recent additions is displayed after login. Telnet to psupen.psu.edu and log in as the user PNOTPA. Clemson Univ. Forestry & Agricultural Network Clemson maintains a database similar to PENpages in content, but the information provided tends to be localized to the Southeastern United States. A menu-driven database offers queries involving the weather, food, family, and human resources. Telnet to eureka.clemson.edu and log in as PUBLIC. You need to be on a good VT100 emulator (or a real VT terminal). University of Maryland Info Database The Computer Science department of the University of Maryland maintains a repository of information on a wide variety of topics. They wish to give a working example of how network technology can (and should) provide as much information as possible to those who use it. Telnet to info.umd.edu and log in as info. The information contained in the database is accessible through a screen-oriented interface, and everything therein is available via anonymous FTP. There is a mailing list used to discuss the UMD Info Database, welcoming suggestions for new information, comments on the interface the system provides, and other related topics. Send mail to listserv@umdd.umd.edu with a body of subscribe INFO-L Your Full Name Listservs for more information on using the Listserv system. University of Michigan Weather Underground The University of Michigan's Department of Atmospheric, Oceanic, & Space Sciences maintains a database of weather and related information for the United States and Canada. Available are current weather conditions and forecasts for cities in the U.S., a national weather summary, ski conditions, earthquake and hurricane updates, and a listing of severe weather conditions. Telnet to madlab.sprl.umich.edu on port 3000 to use the system. Geographic Name Server A geographic database listing information for cities in the United States and some international locations is maintained by Merit, Inc. The database is searchable by city name, zip code, etc. It will respond with a lot of information: the area code, elevation, time zone, and longitude and latitude are included. For example, a query of 19013 yields 0 Chester 1 42045 Delaware 2 PA Pennsylvania 3 US United States F 45 Populated place L 39 50 58 N 75 21 22 W P 45794 E 22 Z 19013 Z 19014 Z 19015 Z 19016 .. To use the server, telnet to martini.eecs.umich.edu on port 3000. The command help will yield further instructions, along with an explanation for each of the fields in a reponse. FEDIX---Minority Scholarship Information FEDIX is an on-line information service that links the higher education community and the federal government to facilitate research, education, and services. The system provides accurate and timely federal agency information to colleges, universities, and other research organizations. There are no registration fees and no access charges for FEDIX whatsoever. FEDIX offers the Minority On-Line Information Service (MOLIS), a database listing current information about Black and Hispanic colleges and universities. Daily information updates are made on federal education and research programs, scholarships, fellowships, and grants, available used research equipment, and general information about FEDIX itself. To access the database, telnet to fedix.fie.com and log in as fedix. Science & Technology Information System The STIS is maintained by the National Science Foundation (NSF), and provides access to many NSF publications. The full text of publications can be searched online and copied from the system, which can accommodate up to ten users at one time. Telnet to stis.nsf.gov and log in as public. Everything on the system is also available via anonymous FTP. For further information, contact: STIS, Office of Information Systems, Room 401 National Science Foundation 1800 G. Street, N.W. Washington, D.C. 20550 stis-request@nsf.gov (202) 357-7492 (202) 357-7663 (Fax) Ocean Network Information Center The University of Delaware College of Marine Studies offers access to an interactive database of research information covering all aspects of marine studies, nicknamed OCEANIC. This includes the World Oceanic Circulation Experiment (WOCE) information and program information, research ship schedules and information, and a Who's Who of email and mailing addresses for oceanic studies. Data from a variety of academic institutions based on research studies is also available. Telnet to delocn.udel.edu and log in as INFO. NASA/IPAC Extragalactic Database (NED) The NASA/IPAC Extragalactic Database (NED) is an ongoing project, funded by NASA, to make data and literature on extragalactic objects available over computer networks. NED is an object-oriented database which contains extensive information for nearly 132,000 extragalactic objects taken from about major catalogs of galaxies, quasars, infrared and radio sources. NED provides positions, names, and other basic data (e.g. magnitude types, sizes and redshifts as well as bibliographic references and abstracts). Searches can be done by name, around a name, and on an astronomical position. NED contains a tutorial which guides the user through the retrieval process. Telnet to ipac.caltech.edu and log in as ned. U.S. Naval Observatory Automated Data Service Operated by the U.S. Naval Observatory in Washington, D.C., this automated data service provides database access to information ranging from current navigational satellite positioning, astronomical data, and software utilities. A wide variety of databases can be searched and instructions for file transfer are given. Telnet to tycho.usno.navy.mil and log in as ads. "My consciousness suddenly switched locations, for the first time in my life, from the vicinity of my head and body to a point about twenty feet away from where I normally see the world." Howard Rheingold, Virtual Reality p255 ----------------- Various Tools New and interesting ways to use the Internet are being dreamed up every day. As they gain wide-spread use, some methods become near-standard (or actual written standard) tools for Internet users to take advantage of. A few are detailed here; there are undoubtedly others, and new ideas spring up all the time. An active user of the Internet will discover most of the more common ones in time. Usually, these services are free. Commercial Services for applications that are commercially available over the Internet. Usenet is often used to announce a new service or capability on the Internet. In particular, the groups comp.archives and comp.protocols.tcp-ip are good places to look. Information will drift into other areas as word spreads. Usenet News for information on reading news. Finger On many systems there exists the finger command, which yield information about each user that's currently logged in. This command also has extensions for use over the Internet, as well. Under normal circumstances, the command is simply finger for a summary of who's logged into the local system, or finger username for specific information about a user. It's also possible to go one step further and go onto the network. The general usage is finger @hostname To see who's currently logged in at Widener University, for instance, use % finger @cs.widener.edu [cs.widener.edu] Login Name TTY Idle When Where brendan Brendan Kehoe p0 Fri 02:14 tattoo.cs.widene sven Sven Heinicke p1 Fri 04:16 xyplex3.cs.widen To find out about a certain user, they can be fingered specifically (and need not be logged in): % finger bart@cs.widener.edu [cs.widener.edu] Login name: bart In real life: Bart Simpson Directory: /home/springfield/bart Shell: /bin/underachiever Affiliation: Brother of Lisa Home System: channel29.fox.org Last login Thu May 23 12:14 (EDT) on ttyp6 from channel29.fox.org. No unread mail Project: To become a "fluff" cartoon character. Plan: Don't have a cow, man. Please realize that some sites are very security conscious, and need to restrict the information about their systems and users available to the outside world. To that end, they often block finger requests from outside sites---so don't be surprised if fingering a computer or a user returns with Connection refused. Internet Relay Chat The Lamont View Server System On lamont.ldgo.columbia.edu in pub/gb.tar.Z. Ping The ping command allows the user to check if another system is currently "up" and running. The general form of the command is ping system. {The usage will, again, vary.} For example, ping cs.widener.edu will tell you if the main machine in Widener University's Computer Science lab is currently online (we certainly hope so!). Many implementations of ping also include an option to let you see how fast a link is running (to give you some idea of the load on the network). For example: % ping -s cs.swarthmore.edu PING cs.swarthmore.edu: 56 data bytes 64 bytes from 130.58.68.1: icmp_seq=0 ttl=251 time=66 ms 64 bytes from 130.58.68.1: icmp_seq=1 ttl=251 time=45 ms 64 bytes from 130.58.68.1: icmp_seq=2 ttl=251 time=46 ms ^C --- cs.swarthmore.edu ping statistics --- 3 packets transmitted, 3 packets received, 0% packet loss round-trip min/avg/max = 45/52/66 ms This case tells us that for cs.swarthmore.edu it takes about 46 milliseconds for a packet to go from Widener to Swarthmore College and back again. It also gives the average and worst-case speeds, and any packet loss that may have occurred (e.g. because of network congestion). While ping generally doesn't hurt network performance, you shouldn't use it too often---usually once or twice will leave you relatively sure of the other system's state. Talk Sometimes email is clumsy and difficult to manage when one really needs to have an interactive conversation. The Internet provides for that as well, in the form of talk. Two users can literally see each other type across thousands of miles. To talk with Bart Simpson at Widener, one would type talk bart@@cs.widener.edu which would cause a message similar to the following to be displayed on Bart's terminal: Message from Talk_Daemon@cs.widener.edu at 21:45 ... talk: connection requested by joe@ee.someplace.edu talk: respond with: talk joe@ee.someplace.edu Bart would, presumably, respond by typing talk joe@ee.someplace.edu. They could then chat about whatever they wished, with instantaneous response time, rather than the write-and-wait style of email. To leave talk, on many systems one would type Ctrl-C (hold down the Control key and press C). Check local documentation to be sure. There are two different versions of talk in common use today. The first, dubbed "old talk," is supported by a set of Unix systems (most notably, those currently sold by Sun). The second, ntalk (aka "new talk"), is more of the standard. If, when attempting to talk with another user, it responds with an error about protocol families, odds are the incompatibilities between versions of talk is the culprit. It's up to the system administrators of sites which use the old talk to install ntalk for their users. Wide Area Information Servers (WAIS) The WHOIS Database The main WHOIS database is run at the Network Information Center (NIC). The whois command will let you search a database of every registered domain (e.g. mit.edu) and of registered users. It's primarily used by system postmasters or listowners to find the Points of Contact for a site, to let them know of a problem or contact them for one reason or another. You can also find out their postal address. For example: % whois mit.edu Massachusetts Institute of Technology (MIT) MIT.EDU 18.72.2.1 Massachusetts Institute of Technology (MIT-DOM) MIT.EDU Note that there are two entries for mit.edu; we'll go for the second. % whois mit-dom Massachusetts Institute of Technology (MIT-DOM) Cambridge, MA 02139 Domain Name: MIT.EDU Administrative Contact, Technical Contact, Zone Contact: Schiller, Jeffrey I. (JIS) JIS@MIT.EDU (617) 253-8400 Record last updated on 22-Jun-88. Domain servers in listed order: STRAWB.MIT.EDU 18.71.0.151 W20NS.MIT.EDU 18.70.0.160 BITSY.MIT.EDU 18.72.0.3 LITHIUM.LCS.MIT.EDU 18.26.0.121 To see this host record with registered users, repeat the command with a star ('*') before the name; or, use '%' to show JUST the registered users. Much better! Now this information (sought, possibly, by a system administrator) can be used to find out how to notify MIT of a security issue or problem with connectivity. Queries can be made for individuals as well; the following would yield an entry for the author: % whois brendan Kehoe, Brendan (BK59) brendan@cs.widener.edu Widener University Department of Computer Science Kirkbride 219 P.O. Box 83 Widener University Chester, PA 19013 (215)/499-4011 Record last updated on 02-May-91. Included is the author's name, his handle (a unique sequence of letters and numbers), information on how to contact him, and the last time the record was modified in any way. Anyone can register with the whois database. People who are administrative or technical contacts for domains are registered automatically when their domain applications are processed. For normal users, one must simply fill out a form from the NIC. FTP to nic.ddn.mil and get the file netinfo/user-template.txt. The completed form should be mailed to registrar@nic.ddn.mil. Other Uses of WHOIS Also, many educational sites run WHOIS servers of their own, to offer information about people who may be currently on the staff or attending the institution. To specify a WHOIS server, many implementations include some sort of option or qualifier---in VMS under MultiNet, it's /HOST, in Unix -h. To receive information about using the Stanford server, one might use the command whois -h stanford.edu help A large list of systems offering WHOIS services is being maintained by Matt Power of MIT (mhpower@stan.mit.edu). It is available via anonymous FTP from sipb.mit.edu, in the directory pub/whois. The file is named whois-servers.list. The systems available include, but are certainly not limited to, Syracuse University (syr.edu), New York University (acfcluster.nyu.edu), the University of California at San Diego (ucsd.edu), and Stanford University (stanford.edu). "Fingers were made before forks." Jonathan Swift, Polite Conversation ------- Commercial Services Many services can be accessed through the Internet. As time progresses and more outlets for commercial activity appear, once-restricted traffic (by the NSFnet Acceptable Use Policy) may now flow freely. Now that there are other networks for that information to travel on, businesses are making their move. Internet Service Providers Providers (AlterNet, PSI, etc)... Supercomputers The Internet Resource Guide (IRG) contains a chapter on computer time that's available for a fee. Rather than reproduce it here, which would fast become out-of-date as well as triple the size of this guide, it's suggested that the reader consult the IRG if such services are of interest. Electronic Journals The Association of Research Libraries (ARL) publishes a hard-copy directory of electronic journals, newsletters, and scholarly discussion lists. It is a compilation of entries for hundreds of sts, dozens of journals and newsletters, and a many "other" titles, including newsletter-digests, into one reference source. Each entry includes instructions on how to access the referenced publication or list. The documents are available electronically by sending the commands get ejournl1 directry get ejournl2 directry to the server at LISTSERV@OTTAWA.BITNET. Listservs for further instructions on using a listserv. The directory, along with a compilation by Diane Kovacs called Directories of Academic E-Mail Conferences, is available in print and on diskette (DOS WordPerfect and MacWord) from: Office of Scientific & Academic Publishing Association of Research Libraries 1527 New Hampshire Avenue, NW Washington, DC 20036 ARLHQ@UMDC.BITNET (202) 232--2466 (202) 462--7849 (Fax) The ARL is a not-for-profit organization representing over one hundred research libraries in the United States and Canada. The publication is available to ARL members for $10 and to non-members for $20 (add $5 postage per directory for foreign addresses). Orders of six or more copies will receive a 10% discount; all orders must be prepaid and sent to the ARL. Commercial Databases The American Institute of Physics maintains the Physics Information Network. It contains the bibliographic SPIN and General Physics Advanced Abstracts databases. Also available is access to bulletin boards and several searchable lists (job notices, announcements, etc). Telnet to pinet.aip.org; new users must log in as NEW and give registration information. Some of the databases accessible through WAIS (WAIS) are available for a fee. Clarinet News Clarinet's an electronic publishing network service that provides professional news and information, including live UPI wireservice news, in the Usenet file format. Clarinet lets you read an "electronic newspaper" right on the local system; you can get timely industry news, technology related wirestories, syndicated columns and features, financial information, stock quotes and more. Clarinet's provided by using the Usenet message interchange format, and is available via UUCP and other delivery protocols, including NNTP. The main feature is ClariNews, an "electronic newspaper," gathered live from the wire services of United Press International (UPI). ClariNews articles are distributed in 100 newsgroups based on their subject matter, and are keyworded for additional topics and the geographical location of the story. ClariNews includes headlines, industry news, box scores, network TV schedules, and more. The main products of ClariNews are: ClariNews General, the general news"paper" with news, sports, and features, averaging about 400 stories per day. TechWire, special groups for stories on science, technology, and industry stories around them. ClariNews-Biz, business and financial stories. Newsbytes, a daily computer industry newsmagazine. Syndicated Columns, including Dave Barry (humor) and Mike Royko (opinion). Full information on ClariNet, including subscription information, is available from Clarinet Communications Corp. 124 King St. North Waterloo, Ontario N2J 2X8 info@@clarinet.com (800) USE-NETS or with anonymous FTP in the directory /Clarinet on ftp.uu.net (Anonymous FTP). "Needless to say, Aristotle did not envisage modern finance." Frederick Copleston, S.J. A History of Philosophy: Vol 1 Greece & Rome Part II, p95 --------- Things You'll Hear About There are certain things that you'll hear about shortly after you start actively using the Internet. Most people assume that everyone's familiar with them, and they require no additional explanation. If only that were true! This section addresses a few topics that are commonly encountered and asked about as a new user explores Cyberspace. Some of them are directly related to how the networks are run today; other points are simply interesting to read about. The Internet Worm from a letter by Severo M. Ornstein, in ACM June 89 Vol32 No6 and the appeal notice On November 2, 1988, Robert Morris, Jr., a graduate student in Computer Science at Cornell, wrote an experimental, self-replicating, self-propagating program called a worm and injected it into the Internet. He chose to release it from MIT, to disguise the fact that the worm came from Cornell. Morris soon discovered that the program was replicating and reinfecting machines at a much faster rate than he had anticipated---there was a bug. Ultimately, many machines at locations around the country either crashed or became "catatonic." When Morris realized what was happening, he contacted a friend at Harvard to discuss a solution. Eventually, they sent an anonymous message from Harvard over the network, instructing programmers how to kill the worm and prevent reinfection. However, because the network route was clogged, this message did not get through until it was too late. Computers were affected at many sites, including universities, military sites, and medical research facilities. The estimated cost of dealing with the worm at each installation ranged from $200 to more than $53,000. {Derived in part from a letter by Severo M. Ornstein, in the Communications of the ACM, Vol 32 No 6, June 1989.} The program took advantage of a hole in the debug mode of the Unix sendmail program, which runs on a system and waits for other systems to connect to it and give it email, and a hole in the finger daemon fingerd, which serves finger requests (Finger). People at the University of California at Berkeley and MIT had copies of the program and were actively disassembling it (returning the program back into its source form) to try to figure out how it worked. Teams of programmers worked non-stop to come up with at least a temporary fix, to prevent the continued spread of the worm. After about twelve hours, the team at Berkeley came up with steps that would help retard the spread of the virus. Another method was also discovered at Purdue and widely published. The information didn't get out as quickly as it could have, however, since so many sites had completely disconnected themselves from the network. After a few days, things slowly began to return to normalcy and everyone wanted to know who had done it all. Morris was later named in The New York Times as the author (though this hadn't yet been officially proven, there was a substantial body of evidence pointing to Morris). Robert T. Morris was convicted of violating the computer Fraud and Abuse Act (Title 18), and sentenced to three years of probation, 400 hours of community service, a fine of $10,050, and the costs of his supervision. His appeal, filed in December, 1990, was rejected the following March. The Cuckoo's Egg First in an article entitled "Stalking the Wily Hacker," and later in the book The Cuckoo's Egg, Clifford Stoll detailed his experiences trying to track down someone breaking into a system at Lawrence Berkeley Laboratory in California. {See the bibliography for full citations.} A 75-cent discrepancy in the Lab's accounting records led Stoll on a chase through California, Virginia, and Europe to end up in a small apartment in Hannover, West Germany. Stoll dealt with many levels of bureaucracy and red tape, and worked with the FBI, the CIA, and the German Bundespost trying to track his hacker down. The experiences of Stoll, and particularly his message in speaking engagements, have all pointed out the dire need for communication between parties on a network of networks. The only way everyone can peacefully co-exist in Cyberspace is by ensuring rapid recognition of any existing problems. Organizations The indomitable need for humans to congregate and share their common interests is also present in the computing world. User groups exist around the world, where people share ideas and experiences. Similarly, there are organizations which are one step "above" user groups; that is to say, they exist to encourage or promote an idea or set of ideas, rather than support a specific computer or application of computers. The Association for Computing Machinery The Association for Computing Machinery (the ACM) was founded in 1947, immediately after Eckert and Mauchly unveiled one of the first electronic computers, the ENIAC, in 1946. Since then, the ACM has grown by leaps and bounds, becoming one of the leading educational and scientific societies in the computer industry. The ACM's stated purposes are: To advance the sciences and arts of information processing; To promote the free interchange of information about the sciences and arts of information processing both among specialists and among the public; To develop and maintain the integrity and competence of individuals engaged in the practices of the sciences and arts of information processing. Membership in the ACM has grown from seventy-eight in September, 1947, to over 77,000 today. There are local chapters around the world, and many colleges and universities endorse student chapters. Lecturers frequent these meetings, which tend to be one step above the normal "user group" gathering. A large variety of published material is also available at discounted prices for members of the association. The ACM has a number of Special Interest Groups (SIGs) that concentrate on a certain area of computing, ranging from graphics to the Ada programming language to security. Each of the SIGs also publishes its own newsletter. There is a Usenet group, comp.org.acm, for the discussion of ACM topics. Usenet News for more information on reading news. For more information and a membership application, write to: Assocation for Computing Machinery 1515 Broadway New York City, NY 10036 ACMHELP@ACMVM.BITNET (212) 869-7440 Computer Professionals for Social Responsibility from their letter to prospective members The CPSR is an alliance of computer professionals concentrating on certain areas of the impact of computer technology on society. It traces its history to the fall of 1981, when several researchers in Palo Alto, California, organized a lunch meeting to discuss their shared concerns about the connection between computing and the nuclear arms race. Out of that meeting and the discussions which followed, CPSR was born, and has been active ever since. {This section is part of the CPSR's letter to prospective members.} The national CPSR program focuses on the following project areas: Reliability and Risk This area reflects on the concern that overreliance on computing technology can lead to unacceptable risks to society. It includes, but isn't limited to, work in analyzing military systems such as SDI. Civil Liberties and Privacy This project is concerned with such topics as the FBI National Crime Information Center, the growing use of databases by both government and private industry, the right of access to public information, extension of First Amendment rights to electronic communication, and establishing legal protections for privacy of computerized information. Computers in the Workplace The CPSR Workplace Project has concentrated its attention on the design of software for the workplace, and particularly on the philosophy of "participatory design," in which software designers work together with users to ensure that systems meet the actual needs of that workplace. The 21st Century Project This is a coalition with other professional organizations working towards redirecting national research priorities from concentrating on military issues to anticipating and dealing with future problems as science and technology enter the next century. For more information on the CPSR, contact them at: Computer Professionals for Social Responsibility P.O. Box 717 Palo Alto, CA 94302 cpsr@csli.stanford.edu (415) 322--3778 (415) 322--3798 (Fax) The Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) was established to help civilize the "electronic frontier"---the Cyberspacial medium becoming ever-present in today's society; to make it truly useful and beneficial not just to a technical elite, but to everyone; and to do this in a way which is in keeping with the society's highest traditions of the free and open flow of information and communication. {This section was derived from eff.about, available along with other material via anonymous FTP from ftp.eff.org} The mission of the EFF is to engage in and support educational activities which increase popular understanding of the opportunities and challenges posed by developments in computing and telecommunications; to develop among policy-makers a better understanding of the issues underlying free and open telecommunications, and support the creation of legal and structural approaches which will ease the assimilation of these new technologies by society; to raise public awareness about civil liberties issues arising from the rapid advancement in the area of new computer-based communications media and, where necessary, support litigation in the public interest to preserve, protect, and extend First Amendment rights within the realm of computing and telecommunications technology; to encourage and support the development of new tools which will endow non-technical users with full and easy access to computer-based telecommunications; The Usenet newsgroups comp.org.eff.talk and comp.org.eff.news are dedicated to discussion concerning the EFF. They also have mailing list counterparts for those that don't have access to Usenet, eff-talk-request@eff.org and eff-news-request@eff.org. The first is an informal arena (aka a normal newsgroup) where anyone may voice his or her opinions. The second, comp.org.eff.news, is a moderated area for regular postings from the EFF in the form of EFFector Online. To submit a posting for the EFFector Online, or to get general information about the EFF, write to eff@eff.org. There is also a wealth of information available via anonymous FTP on ftp.eff.org. The EFF can be contacted at The Electronic Frontier Foundation, Inc. 155 Second St. #1 Cambridge, MA 02141 eff@eff.org (617) 864-0665 (617) 864-0866 (Fax) The Free Software Foundation The Free Software Foundation was started by Richard Stallman (creator of the popular GNU Emacs editor). It is dedicated to eliminating restrictions on copying, redistributing, and modifying software. The word "free" in their name does not refer to price; it refers to freedom. First, the freedom to copy a program and redistribute it to your neighbors, so that they can use it as well as you. Second, the freedom to change a program, so that you can control it instead of it controlling you; for this, the source code must be made available to you. The Foundation works to provide these freedoms by developing free compatible replacements for proprietary software. Specifically, they are putting together a complete, integrated software system called "GNU" that is upward-compatible with Unix. {As an aside, the editor of the GNU project, emacs, contains a built-in LISP interpreter and a large part of its functionality is written in LISP. The name GNU is itself recursive (the mainstay of the LISP language); it stands for "Gnu's Not Unix."} When it is released, everyone will be permitted to copy it and distribute it to others. In addition, it will be distributed with source code, so you will be able to learn about operating systems by reading it, to port it to your own machine, and to exchange the changes with others. For more information on the Free Software Foundation and the status of the GNU Project, or for a list of the current tasks that still need to be done, write to gnu@prep.ai.mit.edu. The IEEE Need IEEE... The League for Programming Freedom The League for Programming Freedom is a grass-roots organization of professors, students, businessmen, programmers and users dedicated to "bringing back" the freedom to write programs, which they contend has been lost over the past number years. The League is not opposed to the legal system that Congress intended--copyright on individual programs. Their aim is to reverse the recent changes made by judges in response to special interests, often explicitly rejecting the public interest principles of the Constitution. The League works to abolish the new monopolies by publishing articles, talking with public officials, boycotting egregious offenders, and in the future may intervene in court cases. On May 24, 1989, the League picketed Lotus headquarters because of their lawsuits, and then again on August 2, 1990. These marches stimulated widespread media coverage for the issue. They welcome suggestions for other activities, as well as help in carrying them out. For information on the League and how to join, write to League for Programming Freedom 1 Kendall Square #143 P.O. Box 9171 Cambridge, MA 02139 league@prep.ai.mit.edu Networking Initiatives Research and development are two buzz words often heard when discussing the networking field---everything needs to go faster, over longer distances, for a lower cost. To "keep current," one should read the various trade magazines and newspapers, or frequent the networking-oriented newsgroups of Usenet. If possible, attend trade shows and symposia like Usenix, Interop, et. al. ISDN NREN The National Research and Education Network (NREN) is a five-year project approved by Congress in the Fall of 1991. It's intended to create a national electronic "super-highway." The NREN will be 50 times faster than the fastest available networks (at the time of this writing). Proponents of the NREN claim it will be possible to transfer the equivalent of the entire text of the Encyclopedia Britannica in one second. Further information, including the original text of the bill presented by Senator Al Gore (D--TN), is available through anonymous FTP to nis.nsf.net, in the directory nsfnet. In addition, Vint Cerf wrote on the then-proposed NREN in RFC-1167, Thoughts on the National Research and Education Network. RFCs for information on obtaining RFCs. A mailing list, nren-discuss@uu.psi.com, is available for discussion of the NREN; write to nren-discuss-request@uu.psi.com to be added. "To talk in publick, to think in solitude, to read and to hear, to inquire, and to answer inquiries, is the business of a scholar." Samuel Johnson Chapter VIII The History of Rasselas, Prince of Abissinia ----- Finding Out More Internet Resource Guide The NSF Network Service Center (NNSC) compiles and makes available an Internet Resource Guide (IRG). The goal of the guide is to increase the visibility of various Internet resources that may help users do their work better. While not yet an exhaustive list, the guide is a useful compendium of many resources and can be a helpful reference for a new user. Resources listed are grouped by types into sections. Current sections include descriptions of online library catalogs, data archives, online white pages directory services, networks, network information centers, and computational resources, such as supercomputers. Each entry describes the resource, identifies who can use the resource, explains how to reach the local network via the Internet, and lists contacts for more information. The list is distributed electronically by the NNSC. To receive a guide, or to get on a mailing list that alerts you to when it is updated, send a message to resource-guide-request@nnsc.nsf.net. The current edition of the IRG is available via anonymous FTP from nnsc.nsf.net, in the directory /resource-guide. Requests for Comments The internal workings of the Internet are defined by a set of documents called RFCs (Request for Comments). The general process for creating an RFC is for someone wanting something formalized to write a document describing the issue and mailing it to Jon Postel (postel@isi.edu). He acts as a referee for the proposal. It is then commented upon by all those wishing to take part in the discussion (electronically, of course). It may go through multiple revisions. Should it be generally accepted as a good idea, it will be assigned a number and filed with the RFCs. The RFCs can be divided into five groups: required, suggested, directional, informational and obsolete. Required RFCs (e.g., RFC-791, The Internet Protocol) must be implemented on any host connected to the Internet. Suggested RFCs are generally implemented by network hosts. Lack of them does not preclude access to the Internet, but may impact its usability. RFC-793, Transmission Control Protocol, is a must for those implementing TCP. Directional RFCs were discussed and agreed to, but their application has never come into wide use. This may be due to the lack of wide need for the specific application (RFC-937, The Post Office Protocol) or that, although technically superior, ran against other pervasive approaches (RFC-891, Hello). It is suggested that, should the facility be required by a particular site, an implementation be done in accordance with the RFC. This ensures that, should the idea be one whose time has come, the implementation will be in accordance with some standard and will be generally usable. Informational RFCs contain factual information about the Internet and its operation (RFC-990, Assigned Numbers). There is also a subset of RFCs called FYIs (For Your Information). They are written in a language much more informal than that used in the other, standard RFCs. Topics range from answers to common questions for new and experienced users to a suggested bibliography. Finally, as the Internet has grown and technology has changed, some RFCs become unnecessary. These obsolete RFCs cannot be ignored, however. Frequently when a change is made to some RFC that causes a new one to obsolete others, the new RFC only contains explanations and motivations for the change. Understanding the model on which the whole facility is based may involve reading the original and subsequent RFCs on the topic. RFCs and FYIs are available via FTP from many sources, including: The nic.ddn.mil archive, as /rfc/rfc-xxxx.txt, where xxxx is the number of the RFC. from ftp.uu.net, in the directory /RFC. They're also available through mail by writing to service@nic.ddn.mil, with a Subject: line of send RFC-xxxx.TXT, again with xxxx being the RFC number. "Knowledge is of two kinds. We know a subject ourselves, or we know where we can find information upon it." Samuel Johnson Letter to Lord Chesterfield February, 1755 a book of quotes said April 18, 1775 .. the book of Johnson's works said it's 1755; I'll go with the latter. ------- Conclusion This guide is far from complete---the Internet changes on a daily (if not hourly) basis. However, this booklet should provide enough information to make the incredible breadth and complexity of the Internet a mite less imposing. Coupled with some exploration and experimentation, every user has the potential to be a competent net citizen, using the facilities that are available to their fullest. You, the reader, are strongly encouraged to suggest improvements to any part of this booklet. If something was unclear, left you with doubts, or wasn't addressed, it should be fixed. If you find any problems, inaccuracies, spelling errors, etc., please report them to: Brendan Kehoe Department of Computer Science Widener University Chester, PA 19013 Internet: guide-bugs@cs.widener.edu UUCP: ...!widener!guide-bugs If you are interested in future updates to this guide (aside from normal new editions), discussion about information to be included or removed, etc., write to guide-request@cs.widener.edu to be placed on a mailing list for such things. @dots is actually `. . . .' "I've seed de first an de last @dots I seed de beginnin, en now I sees de endin." William Faulkner The Sound & The Fury April 8, 1928 -------- Getting to Other Networks Inter-connectivity has been and always will be one of the biggest goals in computer networking. The ultimate desire is to make it so one person can contact anyone else no matter where they are. A number of "gateways" between networks have been set up. They include: AppleLink Quantum Services sells access to AppleLink, which is similar to QuantumLink for Commodore computers and PCLink for IBM PCs and compatibles. It also provides email access through the address user@applelink.apple.com. ATTMail AT&T sells a commercial email service called ATTMail. Its users can be reached by writing to user@attmail.com. BIX Users on BIX (the Byte Information eXchange) can be reached through the DAS gateway at user@cibix.das.net. CompuServe (CI$) To reach a user on the commercial service CompuServe, you must address the mail as xxxxx.xxx@compuserve.com, with xxxxx.xxx being their CompuServe user ID. Normally CompuServe ids are represented as being separated by a comma (like 71999,141); since most mailers don't react well to having commas in addresses, it was changed to a period. For the above address, mail would be sent to 71999.141@compuserve.com. EasyNet Digital sells a service called EasyNet; users that subscribe to it can be reached with the addresses user@host.enet.dec.com or user%host.enet@decwrl.dec.com. FidoNet The FidoNet computer network can be reached by using a special addressing method. If John Smith is on the node 1:2/3.4 on FidoNet, his or her email address would be john.smith@p4.f3.n2.z1.fidonet.org (notice how the numbers fall in place?). MCI Mail MCI also sells email accounts (similar to ATTMail). Users can be reached with user@mcimail.com. PeaceNet Users on the PeaceNet network can be reached by writing to user@igc.org. The Well Users on the service The Well can be reached by writing to user@well.sf.ca.us. The Well is directly connected to the Internet. This table is far from complete. In addition to sites not being listed, some services are not (nor do they plan to be) accessible from the "outside" (like Prodigy); others, like GEnie, are actively investigating the possibility of creating a gateway into their system. For the latest information, consult a list called the Inter-Network Mail Guide. It's available from a number of FTP sites, including UUNET; Anonymous FTP, for more information on getting a copy of it using anonymous FTP. Retrieving Files via Email For those who have a connection to the Internet, but cannot FTP, there do exist a few alternatives to get those files you so desperately need. When requesting files, it's imperative that you keep in mind the size of your request---odds are the other people who may be using your link won't be too receptive to sudden bursts of really heavy traffic on their normally sedate connection. Archive Servers An alternative to the currently well over-used FTPmail system is taking advantage of the many archive servers that are presently being maintained. These are programs that receive email messages that contain commands, and act on them. For example, sending an archive server the command help will usually yield, in the form of a piece of email, information on how to use the various commands that the server has available. One such archive server is service@nic.ddn.mil. Maintained by the Network Information Center (NIC) in Chantilly, VA, the server is set up to make all of the information at the NIC available for people who don't have access to FTP. This also includes the WHOIS service (Whois). Some sample Subject: lines for queries to the NIC server are: Subject: help Describes available commands. Subject: rfc 822 Sends a copy of RFC-822. Subject: rfc index Sends an index of the available RFCs. Subject: netinfo domain-template.txt Sends a domain application. Subject: whois widener Sends WHOIS information on `widener'. More information on using their archive server can be obtained by writing to their server address service@nic.ddn.mil with a Subject: of help. There are different "brands" of archive server, each with its own set of commands and services. Among them there often exists a common set of commands and services (e.g. index, help, etc). Be that as it may, one should always consult the individual help for a specific server before assuming the syntax---100K surprises can be hard on a system. FTP-by-Mail Servers Some systems offer people the ability to receive files through a mock-FTP interface via email. Anonymous FTP for a general overview of how to FTP. The effects of providing such a service varies, although a rule of thumb is that it will probably use a substantial amount of the available resources on a system. The "original" FTP-by-Mail service, BITFTP, is available to BITNET users from the Princeton node PUCC. It was once accessible to anyone, but had to be closed out to non-BITNET users because of the heavy load on the system. In response to this closure, Paul Vixie designed and installed a system called FTPmail on one of Digital's gateway computers, decwrl.dec.com. Write to ftpmail@decwrl.dec.com with help in the body of the letter for instructions on its use. The software is undergoing constant development; once it reaches a stable state, other sites will be encouraged to adopt it and provide the service also. Newsgroup Creation Everyone has the opportunity to make a Call For Votes on the Usenet and attempt to create a newsgroup that he/she feels would be of benefit to the general readership. The rules governing newsgroup creation have evolved over the years into a generally accepted method. They only govern the "world" groups; they aren't applicable to regional or other alternative hierarchies. Discussion A discussion must first take place to address issues like the naming of the group, where in the group tree it should go (e.g. rec.sports.koosh vs rec.games.koosh?), and whether or not it should be created in the first place. The formal Request For Discussion (RFD) should be posted to news.announce.newgroups, along with any other groups or mailing lists at all related to the proposed topic. news.announce.newgroups is moderated. You should place it first in the Newsgroups: header, so that it will get mailed to the moderator only. The article won't be immediately posted to the other newsgroups listed; rather, it will give you the opportunity to have the moderator correct any inconsistencies or mistakes in your RFD. He or she will take care of posting it to the newsgroups you indicated. Also the Followup-To: header will be set so that the actual discussion takes place only in news.groups. If a user has difficulty posting to a moderated group, he or she may mail submissions intended for news.announce.newgroups to the address announce-newgroups@rpi.edu. The final name and charter of the group, and whether it will be moderated or unmoderated, will be determined during the discussion period. If it's to be moderated, the discussion will also decide who the moderator will be. If there's no general agreement on these points among those in favor of a new group at the end of 30 days, the discussion will be taken into mail rather than continued posting to news.groups; that way, the proponents of the group can iron out their differences and come back with a proper proposal, and make a new Request For Discussion. Voting After the discussion period (which is mandatory), if it's been determined that a new group really is desired, a name and charter are agreed upon, and it's been determined whether the group will be moderated (and by whom), a Call For Votes (CFV) should be posted to news.announce.newgroups, along with any other groups that the original Request For Discussion was posted to. The CFV should be posted (or mailed to the news.announce.newgroups moderator) as soon as possible after the discussion ends (to keep it fresh in everyone's mind). The Call for Votes should include clear instructions on how to cast a vote. It's important that it be clearly explained how to both vote for and against a group (and be of equivalent difficulty or ease). If it's easier for you or your administrator, two separate addresses can be used to mail yes and no votes to, providing that they're on the same machine. Regardless of the method, everyone must have a very specific idea of how to get his/her vote counted. The voting period can last between 21 and 31 days, no matter what the preliminary results of the vote are. A vote can't be called off simply because 400 "no" votes have come in and only two "yes" votes. The Call for Votes should include the exact date that the voting period will end---only those votes arriving on the vote-taker's machine before this date can be counted. To keep awareness high, the CFV can be repeated during the vote, provided that it gives the same clear, unbiased instructions for casting a vote as the original; it also has to be the same proposal as was first posted. The charter can't change in mid-vote. Also, votes that're posted don't count---only those that were mailed to the vote-taker can be tallied. Partial results should never be included; only a statement of the specific proposal, that a vote is in progress on it, and how to cast a vote. A mass acknowledgement ("Mass ACK" or "Vote ACK") is permitted; however, it must be presented in a way that gives no indication of which way a person voted. One way to avoid this is to create one large list of everyone who's voted, and sort it in alphabetical order. It should not be two sorted lists (of the yes and no votes, respectively). Every vote is autonomous. The votes for or against one group can't be transferred to another, similar proposal. A vote can only count for the exact proposal that it was a response to. In particular, a vote for or against a newsgroup under one name can't be counted as a vote for or against another group with a different name or charter, a different moderated/unmoderated status, or, if it's moderated, a different moderator or set of moderators. Whew! Finally, the vote has to be explicit; they should be of the form I vote for the group foo.bar as proposed or I vote against the group foo.bar as proposed. The wording doesn't have to be exact, your intention just has to be clear. The Result of a Vote At the end of the voting period, the vote-taker has to post (to news.announce.newgroups) the tally and email addresses of the votes received. Again, it can also be posted to any of the groups listed in the original CFV. The tally should make clear which way a person voted, so the results can be verified if it proves necessary to do so. After the vote result is posted to news.announce.newgroups, there is a mandatory five-day waiting period. This affords everyone the opportunity to correct any errors or inconsistencies in the voter list or the voting procedure. Creation of the Group If, after the waiting period, there are no serious objections that might invalidate the vote, the vote is put to the "water test." If there were 100 more valid YES/create votes than NO/don't create votes, and at least two-thirds of the total number of votes are in favor of creation, then a newgroup control message can be sent out (often by the moderator of news.announce.newgroups). If the 100-vote margin or the two-thirds percentage isn't met, the group has failed and can't be created. If the proposal failed, all is not lost---after a six-month waiting period (a "cooling down"), a new Request For Discussion can be posted to news.groups, and the whole process can start over again. If after a couple of tries it becomes obvious that the group is not wanted or needed, the vote-taker should humbly step back and accept the opinion of the majority. (As life goes, so goes Usenet.) -------- Glossary This glossary is only a tiny subset of all of the various terms and other things that people regularly use on The Net. For a more complete (and very entertaining) reference, it's suggested you get a copy of The New Hacker's Dictionary, which is based on a VERY large text file called the Jargon File. Edited by Eric Raymond (eric@snark.thyrsus.com), it is available from the MIT Press, Cambridge, Massachusetts, 02142; its ISBN number is 0-262-68069-6. Also see RFC-1208, A Glossary of Networking Terms. :-) This odd symbol is one of the ways a person can portray "mood" in the very flat medium of computers---by using "smilies." This is `metacommunication', and there are literally hundreds of them, from the obvious to the obscure. This particular example expresses "happiness." Don't see it? Tilt your head to the left 90 degrees. Smilies are also used to denote sarcasm. Network addresses are usually of two types: the physical or hardware address of a network interface card; for ethernet this 48-bit address might be 0260.8C00.7666. The hardware address is used to forward packets within a physical network. Fortunately, network users do not have to be concerned about hardware addresses since they are automatically handled by the networking software. The logical or Internet address is used to facilitate moving data between physical networks. The 32-bit Internet address is made up of a network number, a subnetwork number, and a host number. Each host computer on the Internet, has a unique address. For example, all Internet addresses at Colorado State have a network number of 129.82, a subnet number in the range of 1-254, and a host number in the range of 1-254. All Internet hosts have a numeric address and an English-style name. For example, the Internet address for UCC's CYBER 840 is 129.82.103.96; its Internet name is csugreen.UCC.ColoState.EDU. address resolution Conversion of an Internet address to the corresponding physical address. On an ethernet, resolution requires broadcasting on the local area network. administrivia Administrative tasks, most often related to the maintenance of mailing lists, digests, news gateways, etc. anonymous FTP Also known as "anon FTP"; a service provided to make files available to the general Internet community---Anonymous FTP. ANSI The American National Standards Institute disseminates basic standards like ASCII, and acts as the United States' delegate to the ISO. Standards can be ordered from ANSI by writing to the ANSI Sales Department, 1430 Broadway, New York, NY 10018, or by telephoning (212) 354-3300. archie A service which provides lookups for packages in a database of the offerings of countless of anonymous FTP sites. archie for a full description. archive server An email-based file transfer facility offered by some systems. ARPA (Advanced Research Projects Agency) Former name of DARPA, the government agency that funded ARPAnet and later the DARPA Internet. ARPAnet A pioneering long haul network funded by ARPA. It served as the basis for early networking research as well as a central backbone during the development of the Internet. The ARPAnet consisted of individual packet switching computers interconnected by leased lines. The ARPAnet no longer exists as a singular entity. asynchronous Transmission by individual bytes, not related to specific timing on the transmitting end. auto-magic Something which happens pseudo-automatically, and is usually too complex to go into any further than to say it happens "auto-magically." backbone A high-speed connection within a network that connects shorter, usually slower circuits. Also used in reference to a system that acts as a "hub" for activity (although those are becoming much less prevalent now than they were ten years ago). bandwidth The capacity of a medium to transmit a signal. More informally, the mythical "size" of The Net, and its ability to carry the files and messages of those that use it. Some view certain kinds of traffic (FTPing hundreds of graphics images, for example) as a "waste of bandwidth" and look down upon them. BITNET (Because It's Time Network) An NJE-based international educational network. bounce The return of a piece of mail because of an error in its delivery. btw An abbreviation for "by the way." CFV (Call For Votes) Initiates the voting period for a Usenet newsgroup. At least one (occasionally two or more) email address is customarily included as a repository for the votes. See Newsgroup Creation for a full description of the Usenet voting process. ClariNews The fee-based Usenet newsfeed available from ClariNet Communications. client The user of a network service; also used to describe a computer that relies upon another for some or all of its resources. Cyberspace A term coined by William Gibson in his fantasy novel Neuromancer to describe the "world" of computers, and the society that gathers around them. datagram The basic unit of information passed across the Internet. It contains a source and destination address along with data. Large messages are broken down into a sequence of IP datagrams. disassembling Converting a binary program into human-readable machine language code. DNS (Domain Name System) The method used to convert Internet names to their corresponding Internet numbers. domain A part of the naming hierarchy. Syntactically, a domain name consists of a sequence of names or other words separated by dots. dotted quad A set of four numbers connected with periods that make up an Internet address; for example, 147.31.254.130. email The vernacular abbreviation for electronic mail. email address The UUCP or domain-based address that a user is referred to with. For example, the author's address is brendan@cs.widener.edu. ethernet A 10-million bit per second networking scheme originally developed by Xerox Corporation. Ethernet is widely used for LANs because it can network a wide variety of computers, it is not proprietary, and components are widely available from many commercial sources. FDDI (Fiber Distributed Data Interface) An emerging standard for network technology based on fiber optics that has been established by ANSI. FDDI specifies a 100-million bit per second data rate. The access control mechanism uses token ring technology. flame A piece of mail or a Usenet posting which is violently argumentative. FQDN (Fully Qualified Domain Name) The FQDN is the full site name of a system, rather than just its hostname. For example, the system lisa at Widener University has a FQDN of lisa.cs.widener.edu. FTP (File Transfer Protocol) The Internet standard high-level protocol for transferring files from one computer to another. FYI An abbreviation for the phrase "for your information." There is also a series of RFCs put out by the Network Information Center called FYIs; they address common questions of new users and many other useful things. RFCs for instructions on retrieving FYIs. gateway A special-purpose dedicated computer that attaches to two or more networks and routes packets from one network to the other. In particular, an Internet gateway routes IP datagrams among the networks it connects. Gateways route packets to other gateways until they can be delivered to the final destination directly across one physical network. header The portion of a packet, preceding the actual data, containing source and destination addresses and error-checking fields. Also part of a message or news article. hostname The name given to a machine. (See also FQDN.) IMHO (In My Humble Opinion) This usually accompanies a statement that may bring about personal offense or strong disagreement. Internet A concatenation of many individual TCP/IP campus, state, regional, and national networks (such as NSFnet, ARPAnet, and Milnet) into one single logical network all sharing a common addressing scheme. Internet number The dotted-quad address used to specify a certain system. The Internet number for the site cs.widener.edu is 147.31.254.130. A resolver is used to translate between hostnames and Internet addresses. interoperate The ability of multi-vendor computers to work together using a common set of protocols. With interoperability, PCs, Macs, Suns, Dec VAXen, CDC Cybers, etc, all work together allowing one host computer to communicate with and take advantage of the resources of another. ISO (International Organization for Standardization) Coordinator of the main networking standards that are put into use today. kernel The level of an operating system or networking system that contains the system-level commands or all of the functions hidden from the user. In a Unix system, the kernel is a program that contains the device drivers, the memory management routines, the scheduler, and system calls. This program is always running while the system is operating. LAN (Local Area Network) Any physical network technology that operates at high speed over short distances (up to a few thousand meters). mail gateway A machine that connects to two or more electronic mail systems (especially dissimilar mail systems on two different networks) and transfers mail messages among them. mailing list A possibly moderated discussion group, distributed via email from a central computer maintaining the list of people involved in the discussion. mail path A series of machine names used to direct electronic mail from one user to another. medium The material used to support the transmission of data. This can be copper wire, coaxial cable, optical fiber, or electromagnetic wave (as in microwave). multiplex The division of a single transmission medium into multiple logical channels supporting many simultaneous sessions. For example, one network may have simultaneous FTP, telnet, rlogin, and SMTP connections, all going at the same time. net.citizen An inhabitant of Cyberspace. One usually tries to be a good net.citizen, lest one be flamed. netiquette A pun on "etiquette"; proper behavior on The Net. Usenet Netiquette. network A group of machines connected together so they can transmit information to one another. There are two kinds of networks: local networks and remote networks. NFS (Network File System) A method developed by Sun Microsystems to allow computers to share files across a network in a way that makes them appear as if they're "local" to the system. NIC The Network Information Center. node A computer that is attached to a network; also called a host. NSFnet The national backbone network, funded by the National Science Foundation and operated by the Merit Corporation, used to interconnect regional (mid-level) networks such as WestNet to one another. packet The unit of data sent across a packet switching network. The term is used loosely. While some Internet literature uses it to refer specifically to data sent across a physical network, other literature views the Internet as a packet switching network and describes IP datagrams as packets. polling Connecting to another system to check for things like mail or news. postmaster The person responsible for taking care of mail problems, answering queries about users, and other related work at a site. protocols A formal description of message formats and the rules two computers must follow to exchange those messages. Protocols can describe low-level details of machine-to-machine interfaces (e.g., the order in which bits and bytes are sent across a wire) or high-level exchanges between allocation programs (e.g., the way in which two programs transfer a file across the Internet). recursion The facility of a programming language to be able to call functions from within themselves. resolve Translate an Internet name into its equivalent IP address or other DNS information. RFD (Request For Discussion) Usually a two- to three-week period in which the particulars of newsgroup creation are battled out. route The path that network traffic takes from its source to its destination. router A dedicated computer (or other device) that sends packets from one place to another, paying attention to the current state of the network. RTFM (Read The Fantastic Manual). This anacronym is often used when someone asks a simple or common question. The word `Fantastic' is usually replaced with one much more vulgar. SMTP (Simple Mail Transfer Protocol) The Internet standard protocol for transferring electronic mail messages from one computer to another. SMTP specifies how two mail systems interact and the format of control messages they exchange to transfer mail. server A computer that shares its resources, such as printers and files, with other computers on the network. An example of this is a Network File System (NFS) server which shares its disk space with other computers. signal-to-noise ratio When used in reference to Usenet activity, signal-to-noise ratio describes the relation between amount of actual information in a discussion, compared to their quantity. More often than not, there's substantial activity in a newsgroup, but a very small number of those articles actually contain anything useful. signature The small, usually four-line message at the bottom of a piece of email or a Usenet article. In Unix, it's added by creating a file ..signature in the user's home directory. Large signatures are a no-no. summarize To encapsulate a number of responses into one coherent, usable message. Often done on controlled mailing lists or active newsgroups, to help reduce bandwidth. synchronous Data communications in which transmissions are sent at a fixed rate, with the sending and receiving devices synchronized. TCP/IP (Transmission Control Protocol/Internet Protocol) A set of protocols, resulting from ARPA efforts, used by the Internet to support services such as remote login (telnet), file transfer (FTP) and mail (SMTP). telnet The Internet standard protocol for remote terminal connection service. Telnet allows a user at one site to interact with a remote timesharing system at another site as if the user's terminal were connected directly to the remote computer. terminal server A small, specialized, networked computer that connects many terminals to a LAN through one network connection. Any user on the network can then connect to various network hosts. TeX A free typesetting system by Donald Knuth. twisted pair Cable made up of a pair of insulated copper wires wrapped around each other to cancel the effects of electrical noise. UUCP (Unix to Unix Copy Program) A store-and-forward system, primarily for Unix systems but currently supported on other platforms (e.g. VMS and personal computers). WAN (Wide-Area Network) A network spanning hundreds or thousands of miles. workstation A networked personal computing device with more power than a standard IBM PC or Macintosh. Typically, a workstation has an operating system such as unix that is capable of running several tasks at the same time. It has several megabytes of memory and a large, high-resolution display. Examples are Sun workstations and Digital DECstations. worm A computer program which replicates itself. The Internet worm (The Internet Worm) was perhaps the most famous; it successfully (and accidentally) duplicated itself on systems across the Internet. wrt With respect to. "I hate definitions." Benjamin Disraeli Vivian Grey, bk i chap ii ------ Bibliography What follows is a compendium of sources that have information that will be of use to anyone reading this guide. Most of them were used in the writing of the booklet, while others are simply noted because they are a must for any good net.citizen's bookshelf. Books Comer, Douglas E. Internetworking With TCP/IP, 2nd ed., 2v Prentice Hall Englewood Cliffs, NJ 1991 Davidson, John An Introduction to TCP/IP Springer-Verlag Berlin 1988 Frey, Donnalyn, and Adams, Rick !@%:: A Directory of Electronic Mail Addressing and Networks O'Reilly and Associates Newton, MA 1989 Gibson, William Neuromancer Ace New York, NY 1984 LaQuey, Tracy Users' Directory of Computer Networks Digital Press Bedford, MA 1990 Levy, Stephen Hackers: Heroes of the Computer Revolution Anchor Press/Doubleday Garden City, NY 1984 Partridge, Craig Innovations in Internetworking ARTECH House Norwood, MA 1988 Quarterman, John S. The Matrix: Computer Networks and Conferencing Systems Worldwide Digital Press Bedford, MA 1989 Raymond, Eric (ed) The New Hacker's Dictionary MIT Press Cambridge, MA 1991 Stoll, Clifford The Cuckoo's Egg Doubleday New York 1989 Tanenbaum, Andrew S. Computer Networks, 2d ed Prentice-Hall Englewood Cliffs, NJ 1988 Todinao, Grace Using UUCP and USENET: A Nutshell Handbook O'Reilly and Associates Newton, MA 1986 The Waite Group Unix Communications, 2nd ed. Howard W. Sams & Company Indianapolis 1991 Periodicals & Papers magazine: Barlow, J Coming Into The Country Communications of the ACM 34:3 2 March 1991 Addresses "Cyberspace"---John Barlow was a co-founder of the EFF. proceedings: Collyer, G., and Spencer, H News Need Not Be Slow Proceedings of the 1987 Winter USENIX Conference 181--90 USENIX Association, Berkeley, CA January 1987 magazine: Denning, P The Internet Worm American Scientist 126--128 March--April 1989 magazine: The Science of Computing: Computer Networks American Scientist 127--129 March--April 1985 magazine: Frey, D., and Adams, R USENET: Death by Success? UNIX REVIEW 55--60 August 1987 magazine: Gifford, W. S ISDN User-Network Interfaces IEEE Journal on Selected Areas in Communications 343--348 May 1986 magazine: Ginsberg, K Getting from Here to There UNIX REVIEW 45 January 1986 magazine: Hiltz, S. R The Human Element in Computerized Conferencing Systems Computer Networks 421--428 December 1978 proceedings: Horton, M What is a Domain? Proceedings of the Summer 1984 USENIX Conference 368--372 USENIX Association, Berkeley, CA June 1984 magazine: Jacobsen, Ole J Information on TCP/IP ConneXions---The Interoperability Report 14--15 July 1988 magazine: Jennings, D., et al Computer Networking for Scientists Science 943--950 28 February 1986 paper: Markoff, J "Author of computer `virus' is son of U.S. electronic security expert." New York Times Nov. 5, 1988 A1 paper: "Computer snarl: A `back door' ajar." New York Times Nov. 7, 1988 B10 magazine: McQuillan, J. M., and Walden, D. C The ARPA Network Design Decisions Computer Networks 243--289 1977 magazine: Ornstein, S. M A letter concerning the Internet worm Communications of the ACM 32:6 June 1989 proceedings: Partridge, C Mail Routing Using Domain Names: An Informal Tour Proceedings of the 1986 Summer USENIX Conference 366--76 USENIX Association, Berkeley, CA June 1986 magazine: Quarterman, J Etiquette and Ethics ConneXions---The Interoperability Report 12--16 March 1989 magazine: Notable Computer Networks Communications of the ACM 29:10 October 1986 This was the predecessor to The Matrix. magazine: Raeder, A. W., and Andrews, K. L Searching Library Catalogs on the Internet: A Survey Database Searcher 6 16--31 September 1990 proceedings: Seeley, D A tour of the worm Proceedings of the 1989 Winter USENIX Conference 287--304 USENIX Association, Berkeley, CA February 1989 magazine: Shulman, G Legal Research on USENET Liability Issues ;login: The USENIX Association Newsletter 11--17 December 1984 magazine: Smith, K E-Mail to Anywhere PC World 220--223 March 1988 magazine: Stoll, C Stalking the Wily Hacker Communications of the ACM 31:5 14 May 1988 This article grew into the book The Cuckoo's Egg. proceedings: Taylor, D The Postman Always Rings Twice: Electronic Mail in a Highly Distributed Environment Proceedings of the 1988 Winter USENIX Conference 145--153 USENIX Association, Berkeley, CA December 1988 magazine: U.S.Gen'l Accounting Ofc Computer Security: Virus Highlights Need for Improved Internet Management GAO/IMTEC-89-57, 1989 Addresses the Internet worm. "And all else is literature." Paul Verlaine The Sun, New York While he was city editor in 1873--1890. -- Bill Walther, Carleton University, Ottawa, Canada 18224 ---- LEAVES TOWN*** Copyright (C) 2005 by Cory Doctorow. Some Rights Reserved. Someone Comes to Town, Someone Leaves Town Cory Doctorow doctorow@craphound.com Published by Tor Books July 2005 ISBN: 0765312786 http://craphound.com/someone Some Rights Reserved -- =============== About this book =============== This is my third novel, and as with my first, Down and Out in the Magic Kingdom (http://craphound.com/down) and my second, Eastern Standard Tribe (http://craphound.com/est), I am releasing it for free on the Internet the very same day that it ships to the stores. The books are governed by Creative Commons licenses that permit their unlimited noncommercial redistribution, which means that you're welcome to share them with anyone you think will want to see them. In the words of Woody Guthrie: "This song is Copyrighted in U.S., under Seal of Copyright #154085, for a period of 28 years, and anybody caught singin it without our permission, will be mighty good friends of ourn, cause we don't give a dern. Publish it. Write it. Sing it. Swing to it. Yodel it. We wrote it, that's all we wanted to do." Why do I do this? There are three reasons: * Short Term In the short term, I'm generating more sales of my printed books. Sure, giving away ebooks displaces the occasional sale, when a downloader reads the book and decides not to buy it. But it's far more common for a reader to download the book, read some or all of it, and decide to buy the print edition. Like I said in my essay, Ebooks Neither E Nor Books, (http://craphound.com/ebooksneitherenorbooks.txt), digital and print editions are intensely complimentary, so acquiring one increases your need for the other. I've given away more than half a million digital copies of my award-winning first novel, Down and Out in the Magic Kingdom, and that sucker has blown through *five* print editions (yee-HAW!), so I'm not worried that giving away books is hurting my sales. * Long Term Some day, though, paper books will all but go away. We're already reading more words off of more screens every day and fewer words off of fewer pages every day. You don't need to be a science fiction writer to see the writing on the wall (or screen, as the case may be). Now, if you've got a poor imagination, you might think that we'll enter that era with special purpose "ebook readers" that simulate the experience of carrying around "real" books, only digital. That's like believing that your mobile phone will be the same thing as the phone attached to your wall, except in your pocket. If you believe this sort of thing, you have no business writing sf, and you probably shouldn't be reading it either. No, the business and social practice of ebooks will be way, way weirder than that. In fact, I believe that it's probably too weird for us to even imagine today, as the idea of today's radio marketplace was incomprehensible to the Vaudeville artists who accused the radio station owners of mass piracy for playing music on the air. Those people just could *not* imagine a future in which audiences and playlists were statistically sampled by a special "collection society" created by a Congressional anti-trust "consent decree," said society to hand out money collected from radio stations (who collected from soap manufacturers and other advertisers), to compensate artists. It was inconceivably weird, and yet it made the artists who embraced it rich as hell. The artists who demanded that radio just *stop* went broke, ended up driving taxis, and were forgotten by history. I know which example I intend to follow. Giving away books costs me *nothing*, and actually makes me money. But most importantly, it delivers the very best market-intelligence that I can get. When you download my book, please: do weird and cool stuff with it. Imagine new things that books are for, and do them. Use it in unlikely and surprising ways. Then *tell me about it*. Email me (doctorow@craphound.com) with that precious market-intelligence about what electronic text is for, so that I can be the first writer to figure out what the next writerly business model is. I'm an entrepreneur and I live and die by market intel. Some other writers have decided that their readers are thieves and pirates, and they devote countless hours to systematically alienating their customers. These writers will go broke. Not me -- I love you people. Copy the hell out of this thing. * Medium Term There may well be a time between the sunset of printed text and the appearance of robust models for unfettered distribution of electronic text, an interregnum during which the fortunes of novelists follow those of poets and playwrights and other ink-stained scribblers whose industries have cratered beneath them. When that happens, writerly income will come from incidental sources such as paid speaking engagements and commissioned articles. No, it's not "fair" that novelists who are good speakers will have a better deal than novelists who aren't, but neither was it fair that the era of radio gave a boost to the career of artists who played well in the studios, nor that the age of downloading is giving a boost to the careers of artists who play well live. Technology giveth and technology taketh away. I'm an sf writer: it's my job to love the future. My chances of landing speaking gigs, columns, paid assignments, and the rest of it are all contingent on my public profile. The more people there are that have read and enjoyed my work, the more of these gigs I'll get. And giving away books increases your notoriety a whole lot more than clutching them to your breast and damning the pirates. So there you have it: I'm giving these books away to sell more books, to find out more about the market and to increase my profile so that I can land speaking and columnist gigs. Not because I'm some patchouli-scented, fuzzy-headed, "information wants to be free" info-hippie. I'm at it because I want to fill my bathtub with money and rub my hands and laugh and laugh and laugh. # Developing nations A large chunk of "ebook piracy" (downloading unauthorized ebooks from the net) is undertaken by people in the developing world, where the per-capita GDP can be less than a dollar a day. These people don't represent any kind of commercial market for my books. No one in Burundi is going to pay a month's wages for a copy of this book. A Ukrainian film of this book isn't going to compete with box-office receipts in the Ukraine for a Hollywood version, if one emerges. No one imports commercial editions of my books into most developing nations, and if they did. they'd be priced out of the local market. So I've applied a new, and very cool kind of Creative Commons license to this book: the Creative Commons Developing Nations License (http://creativecommons.org/licenses/devnations/2.0/). What that means is that if you live in a country that's not on the World Bank's list of High-Income Countries (http://rru.worldbank.org/DoingBusiness/ExploreEconomies/EconomyCharacteristics.aspx) , you get to do practically anything you want with this book. While residents of the rich world are limited to making noncommercial copies of this book, residents of the developing world can do much more. Want to make a commercial edition of this book? Be my guest. A film? Sure thing. A translation into the local language? But of course. The sole restriction is that you *may not export your work with my book beyond the developing world*. Your Ukrainian film, Guyanese print edition, or Ghanian translation can be freely exported within the developing world, but can't be sent back to the rich world, where my paying customers are. It's an honor to have the opportunity to help people who are living under circumstances that make mine seem like the lap of luxury. I'm especially hopeful that this will, in some small way, help developing nations bootstrap themselves into a better economic situation. # DRM The worst technology idea since the electrified nipple-clamp is "Digital Rights Management," a suite of voodoo products that are supposed to control what you do with information after you lawfully acquire it. When you buy a DVD abroad and can't watch it at home because it's from the wrong "region," that's DRM. When you buy a CD and it won't rip on your computer, that's DRM. When you buy an iTune and you can't loan it to a friend, that's DRM. DRM doesn't work. Every file ever released with DRM locks on it is currently available for free download on the Internet. You don't need any special skills to break DRM these days: you just have to know how to search Google for the name of the work you're seeking. No customer wants DRM. No one woke up this morning and said, "Damn, I wish there was a way to do less with my books, movies and music." DRM can't control copying, but it can control competition. Apple can threaten to sue Real for making Realmedia players for the iPod on the grounds that Real had to break Apple DRM to accomplish this. The cartel that runs licensing for DVDs can block every new feature in DVDs in order to preserve its cushy business model (why is it that all you can do with a DVD you bought ten years ago is watch it, exactly what you could do with it then -- when you can take a CD you bought a decade ago and turn it into a ringtone, an MP3, karaoke, a mashup, or a file that you send to a friend?). DRM is used to silence and even jail researchers who expose its flaws, thanks to laws like the US DMCA and Europe's EUCD. In case there's any doubt: I hate DRM. There is no DRM on this book. None of the books you get from this site have DRM on them. If you get a DRMed ebook, I urge you to break the locks off it and convert it to something sensible like a text file. If you want to read more about DRM, here's a talk I gave to Microsoft on the subject: http://craphound.com/msftdrm.txt and here's a paper I wrote for the International Telecommunications Union about DRM and the developing world: http://www.eff.org/IP/DRM/itu_drm.php =============================================================== Creative Commons Attribution-NonCommercial-NoDerivs 2.0 License =============================================================== THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS OF THIS CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED. BY EXERCISING ANY RIGHTS TO THE WORK PROVIDED HERE, YOU ACCEPT AND AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE. THE LICENSOR GRANTS YOU THE RIGHTS CONTAINED HERE IN CONSIDERATION OF YOUR ACCEPTANCE OF SUCH TERMS AND CONDITIONS. 1. Definitions 1. "Collective Work" means a work, such as a periodical issue, anthology or encyclopedia, in which the Work in its entirety in unmodified form, along with a number of other contributions, constituting separate and independent works in themselves, are assembled into a collective whole. A work that constitutes a Collective Work will not be considered a Derivative Work (as defined below) for the purposes of this License. 2. "Derivative Work" means a work based upon the Work or upon the Work and other pre-existing works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which the Work may be recast, transformed, or adapted, except that a work that constitutes a Collective Work will not be considered a Derivative Work for the purpose of this License. For the avoidance of doubt, where the Work is a musical composition or sound recording, the synchronization of the Work in timed-relation with a moving image ("synching") will be considered a Derivative Work for the purpose of this License. 3. "Licensor" means the individual or entity that offers the Work under the terms of this License. 4. "Original Author" means the individual or entity who created the Work. 5. "Work" means the copyrightable work of authorship offered under the terms of this License. 6. "You" means an individual or entity exercising rights under this License who has not previously violated the terms of this License with respect to the Work, or who has received express permission from the Licensor to exercise rights under this License despite a previous violation. 2. Fair Use Rights. Nothing in this license is intended to reduce, limit, or restrict any rights arising from fair use, first sale or other limitations on the exclusive rights of the copyright owner under copyright law or other applicable laws. 3. License Grant. Subject to the terms and conditions of this License, Licensor hereby grants You a worldwide, royalty-free, non-exclusive, perpetual (for the duration of the applicable copyright) license to exercise the rights in the Work as stated below: 1. to reproduce the Work, to incorporate the Work into one or more Collective Works, and to reproduce the Work as incorporated in the Collective Works; 2. to distribute copies or phonorecords of, display publicly, perform publicly, and perform publicly by means of a digital audio transmission the Work including as incorporated in Collective Works; The above rights may be exercised in all media and formats whether now known or hereafter devised. The above rights include the right to make such modifications as are technically necessary to exercise the rights in other media and formats, but otherwise you have no rights to make Derivative Works. All rights not expressly granted by Licensor are hereby reserved, including but not limited to the rights set forth in Sections 4(d) and 4(e). 4. Restrictions.The license granted in Section 3 above is expressly made subject to and limited by the following restrictions: 1. You may distribute, publicly display, publicly perform, or publicly digitally perform the Work only under the terms of this License, and You must include a copy of, or the Uniform Resource Identifier for, this License with every copy or phonorecord of the Work You distribute, publicly display, publicly perform, or publicly digitally perform. You may not offer or impose any terms on the Work that alter or restrict the terms of this License or the recipients' exercise of the rights granted hereunder. You may not sublicense the Work. You must keep intact all notices that refer to this License and to the disclaimer of warranties. You may not distribute, publicly display, publicly perform, or publicly digitally perform the Work with any technological measures that control access or use of the Work in a manner inconsistent with the terms of this License Agreement. The above applies to the Work as incorporated in a Collective Work, but this does not require the Collective Work apart from the Work itself to be made subject to the terms of this License. If You create a Collective Work, upon notice from any Licensor You must, to the extent practicable, remove from the Collective Work any reference to such Licensor or the Original Author, as requested. 2. You may not exercise any of the rights granted to You in Section 3 above in any manner that is primarily intended for or directed toward commercial advantage or private monetary compensation. The exchange of the Work for other copyrighted works by means of digital file-sharing or otherwise shall not be considered to be intended for or directed toward commercial advantage or private monetary compensation, provided there is no payment of any monetary compensation in connection with the exchange of copyrighted works. 3. If you distribute, publicly display, publicly perform, or publicly digitally perform the Work, You must keep intact all copyright notices for the Work and give the Original Author credit reasonable to the medium or means You are utilizing by conveying the name (or pseudonym if applicable) of the Original Author if supplied; the title of the Work if supplied; and to the extent reasonably practicable, the Uniform Resource Identifier, if any, that Licensor specifies to be associated with the Work, unless such URI does not refer to the copyright notice or licensing information for the Work. Such credit may be implemented in any reasonable manner; provided, however, that in the case of a Collective Work, at a minimum such credit will appear where any other comparable authorship credit appears and in a manner at least as prominent as such other comparable authorship credit. 4. For the avoidance of doubt, where the Work is a musical composition: 1. Performance Royalties Under Blanket Licenses. Licensor reserves the exclusive right to collect, whether individually or via a performance rights society (e.g. ASCAP, BMI, SESAC), royalties for the public performance or public digital performance (e.g. webcast) of the Work if that performance is primarily intended for or directed toward commercial advantage or private monetary compensation. 2. Mechanical Rights and Statutory Royalties. Licensor reserves the exclusive right to collect, whether individually or via a music rights agency or designated agent (e.g. Harry Fox Agency), royalties for any phonorecord You create from the Work ("cover version") and distribute, subject to the compulsory license created by 17 USC Section 115 of the US Copyright Act (or the equivalent in other jurisdictions), if Your distribution of such cover version is primarily intended for or directed toward commercial advantage or private monetary compensation. 5. Webcasting Rights and Statutory Royalties. For the avoidance of doubt, where the Work is a sound recording, Licensor reserves the exclusive right to collect, whether individually or via a performance-rights society (e.g. SoundExchange), royalties for the public digital performance (e.g. webcast) of the Work, subject to the compulsory license created by 17 USC Section 114 of the US Copyright Act (or the equivalent in other jurisdictions), if Your public digital performance is primarily intended for or directed toward commercial advantage or private monetary compensation. 5. Representations, Warranties and Disclaimer UNLESS OTHERWISE MUTUALLY AGREED BY THE PARTIES IN WRITING, LICENSOR OFFERS THE WORK AS-IS AND MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND CONCERNING THE WORK, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF TITLE, MERCHANTIBILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, OR THE ABSENCE OF LATENT OR OTHER DEFECTS, ACCURACY, OR THE PRESENCE OF ABSENCE OF ERRORS, WHETHER OR NOT DISCOVERABLE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO SUCH EXCLUSION MAY NOT APPLY TO YOU. 6. Limitation on Liability. EXCEPT TO THE EXTENT REQUIRED BY APPLICABLE LAW, IN NO EVENT WILL LICENSOR BE LIABLE TO YOU ON ANY LEGAL THEORY FOR ANY SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES ARISING OUT OF THIS LICENSE OR THE USE OF THE WORK, EVEN IF LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 7. Termination 1. This License and the rights granted hereunder will terminate automatically upon any breach by You of the terms of this License. Individuals or entities who have received Collective Works from You under this License, however, will not have their licenses terminated provided such individuals or entities remain in full compliance with those licenses. Sections 1, 2, 5, 6, 7, and 8 will survive any termination of this License. 2. Subject to the above terms and conditions, the license granted here is perpetual (for the duration of the applicable copyright in the Work). Notwithstanding the above, Licensor reserves the right to release the Work under different license terms or to stop distributing the Work at any time; provided, however that any such election will not serve to withdraw this License (or any other license that has been, or is required to be, granted under the terms of this License), and this License will continue in full force and effect unless terminated as stated above. 8. Miscellaneous 1. Each time You distribute or publicly digitally perform the Work or a Collective Work, the Licensor offers to the recipient a license to the Work on the same terms and conditions as the license granted to You under this License. 2. If any provision of this License is invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of the remainder of the terms of this License, and without further action by the parties to this agreement, such provision shall be reformed to the minimum extent necessary to make such provision valid and enforceable. 3. No term or provision of this License shall be deemed waived and no breach consented to unless such waiver or consent shall be in writing and signed by the party to be charged with such waiver or consent. 4. This License constitutes the entire agreement between the parties with respect to the Work licensed here. There are no understandings, agreements or representations with respect to the Work not specified here. Licensor shall not be bound by any additional provisions that may appear in any communication from You. This License may not be modified without the mutual written agreement of the Licensor and You. Creative Commons is not a party to this License, and makes no warranty whatsoever in connection with the Work. Creative Commons will not be liable to You or any party on any legal theory for any damages whatsoever, including without limitation any general, special, incidental or consequential damages arising in connection to this license. Notwithstanding the foregoing two (2) sentences, if Creative Commons has expressly identified itself as the Licensor hereunder, it shall have all rights and obligations of Licensor. Except for the limited purpose of indicating to the public that the Work is licensed under the CCPL, neither party will use the trademark "Creative Commons" or any related trademark or logo of Creative Commons without the prior written consent of Creative Commons. Any permitted use will be in compliance with Creative Commons' then-current trademark usage guidelines, as may be published on its website or otherwise made available upon request from time to time. =============================================== Creative Commons Developing Nations 2.0 License =============================================== THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS OF THIS CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED. BY EXERCISING ANY RIGHTS TO THE WORK PROVIDED HERE, YOU ACCEPT AND AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE. THE LICENSOR GRANTS YOU THE RIGHTS CONTAINED HERE IN CONSIDERATION OF YOUR ACCEPTANCE OF SUCH TERMS AND CONDITIONS. 1. Definitions 1. "Collective Work" means a work, such as a periodical issue, anthology or encyclopedia, in which the Work in its entirety in unmodified form, along with a number of other contributions, constituting separate and independent works in themselves, are assembled into a collective whole. A work that constitutes a Collective Work will not be considered a Derivative Work (as defined below) for the purposes of this License. 2. "Derivative Work" means a work based upon the Work or upon the Work and other pre-existing works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which the Work may be recast, transformed, or adapted, except that a work that constitutes a Collective Work will not be considered a Derivative Work for the purpose of this License. For the avoidance of doubt, where the Work is a musical composition or sound recording, the synchronization of the Work in timed-relation with a moving image ("synching") will be considered a Derivative Work for the purpose of this License. 3. "Developing Nation" means any nation that is not classified as a "high-income enconomy" by the World Bank. 4. "Licensor" means the individual or entity that offers the Work under the terms of this License. 5. "Original Author" means the individual or entity who created the Work. 6. "Work" means the copyrightable work of authorship offered under the terms of this License. 7. "You" means an individual or entity exercising rights under this License who has not previously violated the terms of this License with respect to the Work, or who has received express permission from the Licensor to exercise rights under this License despite a previous violation. 2. Fair Use Rights. Nothing in this license is intended to reduce, limit, or restrict any rights arising from fair use, first sale or other limitations on the exclusive rights of the copyright owner under copyright law or other applicable laws. 3. License Grant. Subject to the terms and conditions of this License, Licensor hereby grants You a worldwide, royalty-free, non-exclusive, perpetual (for the duration of the applicable copyright or subject to Section 7(a)) license to exercise the rights in the Work, in any Developing Nation, solely within the geographic territory of one or more Developing Nations, as stated below: 1. to reproduce the Work, to incorporate the Work into one or more Collective Works, and to reproduce the Work as incorporated in the Collective Works; 2. to create and reproduce Derivative Works; 3. to distribute copies or phonorecords of, display publicly, perform publicly, and perform publicly by means of a digital audio transmission the Work including as incorporated in Collective Works; 4. to distribute copies or phonorecords of, display publicly, perform publicly, and perform publicly by means of a digital audio transmission Derivative Works; 5. For the avoidance of doubt, where the work is a musical composition: 1. Performance Royalties Under Blanket Licenses. Licensor waives the exclusive right to collect, whether individually or via a performance rights society, royalties for the public performance or public digital performance (e.g. webcast) of the Work. 2. Mechanical Rights and Statutory Royalties. Licensor waives the exclusive right to collect, whether individually or via a music rights agency or designated agent, royalties for any phonorecord You create from the Work ("cover version") and distribute, subject to any compulsory license that may apply. 6. Webcasting Rights and Statutory Royalties. For the avoidance of doubt, where the Work is a sound recording, Licensor waives the exclusive right to collect, whether individually or via a performance-rights society, royalties for the public digital performance (e.g. webcast) of the Work, subject to any compulsory license that may apply. The above rights may be exercised in all media and formats whether now known or hereafter devised. The above rights include the right to make such modifications as are technically necessary to exercise the rights in other media and formats. All rights not expressly granted by Licensor are hereby reserved, including but not limited to the rights and restrictions described in Section 4. 4. Restrictions. The license granted in Section 3 above is expressly made subject to and limited by the following restrictions: 1. You may distribute, publicly display, publicly perform, or publicly digitally perform the Work only under the terms of this License, and You must include a copy of, or the Uniform Resource Identifier for, this License with every copy or phonorecord of the Work You distribute, publicly display, publicly perform, or publicly digitally perform. You may not offer or impose any terms on the Work that alter or restrict the terms of this License or the recipients' exercise of the rights granted hereunder. You may not sublicense the Work. You must keep intact all notices that refer to this License and to the disclaimer of warranties. You may not distribute, publicly display, publicly perform, or publicly digitally perform the Work with any technological measures that control access or use of the Work in a manner inconsistent with the terms of this License Agreement. The above applies to the Work as incorporated in a Collective Work, but this does not require the Collective Work apart from the Work itself to be made subject to the terms of this License. If You create a Collective Work, upon notice from any Licensor You must, to the extent practicable, remove from the Collective Work any reference to such Licensor or the Original Author, as requested. If You create a Derivative Work, upon notice from any Licensor You must, to the extent practicable, remove from the Derivative Work any reference to such Licensor or the Original Author, as requested. 2. If you distribute, publicly display, publicly perform, or publicly digitally perform the Work or any Derivative Works or Collective Works, You must keep intact all copyright notices for the Work and give the Original Author credit reasonable to the medium or means You are utilizing by conveying the name (or pseudonym if applicable) of the Original Author if supplied; the title of the Work if supplied; to the extent reasonably practicable, the Uniform Resource Identifier, if any, that Licensor specifies to be associated with the Work, unless such URI does not refer to the copyright notice or licensing information for the Work; and, in the case of a Derivative Work, a credit identifying the use of the Work in the Derivative Work (e.g., "French translation of the Work by Original Author," or "Screenplay based on original Work by Original Author"). Such credit may be implemented in any reasonable manner; provided, however, that in the case of a Derivative Work or Collective Work, at a minimum such credit will appear where any other comparable authorship credit appears and in a manner at least as prominent as such other comparable authorship credit. 3. The Work and any Derivative Works and Collective Works may only be exported to other Developing Nations, but may not be exported to countries classified as "high income" by the World Bank. 4. This License does not authorize making the Work, any Derivative Works or any Collective Works publicly available on the Internet unless reasonable measures are undertaken to verify that the recipient is located in a Developing Nation, such as by requiring recipients to provide name and postal mailing address, or by limiting the distribution of the Work to Internet IP addresses within a Developing Nation. 5. Representations, Warranties and Disclaimer UNLESS OTHERWISE MUTUALLY AGREED TO BY THE PARTIES IN WRITING, LICENSOR OFFERS THE WORK AS-IS AND MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND CONCERNING THE WORK, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF TITLE, MERCHANTIBILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, OR THE ABSENCE OF LATENT OR OTHER DEFECTS, ACCURACY, OR THE PRESENCE OF ABSENCE OF ERRORS, WHETHER OR NOT DISCOVERABLE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO SUCH EXCLUSION MAY NOT APPLY TO YOU. 6. Limitation on Liability. EXCEPT TO THE EXTENT REQUIRED BY APPLICABLE LAW, IN NO EVENT WILL LICENSOR BE LIABLE TO YOU ON ANY LEGAL THEORY FOR ANY SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES ARISING OUT OF THIS LICENSE OR THE USE OF THE WORK, EVEN IF LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 7. Termination 1. This License and the rights granted hereunder will terminate automatically upon (i) any breach by You of the terms of this License or (ii) if any Developing Nation in which the Work is used, exported or distributed ceases at any time to qualify as a Developing Nation, in which case this License will automatically terminate with respect to such country five (5) years after the date of such re-classification; provided that You will not be liable for copyright infringement unless and until You continue to exercise such rights after You have actual knowledge of the termination of this License for such country. Individuals or entities who have received Derivative Works or Collective Works from You under this License, however, will not have their licenses terminated provided such individuals or entities remain in full compliance with those licenses. Sections 1, 2, 5, 6, 7, and 8 will survive any termination of this License. 2. Subject to the above terms and conditions, the license granted here is perpetual (for the duration of the applicable copyright in the Work). Notwithstanding the above, Licensor reserves the right to release the Work under different license terms or to stop distributing the Work at any time; provided, however that any such election will not serve to withdraw this License (or any other license that has been, or is required to be, granted under the terms of this License), and this License will continue in full force and effect unless terminated as stated above. 8. Miscellaneous 1. Each time You distribute or publicly digitally perform the Work or a Collective Work, the Licensor offers to the recipient a license to the Work on the same terms and conditions as the license granted to You under this License. 2. Each time You distribute or publicly digitally perform a Derivative Work, Licensor offers to the recipient a license to the original Work on the same terms and conditions as the license granted to You under this License. 3. If any provision of this License is invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of the remainder of the terms of this License, and without further action by the parties to this agreement, such provision shall be reformed to the minimum extent necessary to make such provision valid and enforceable. 4. No term or provision of this License shall be deemed waived and no breach consented to unless such waiver or consent shall be in writing and signed by the party to be charged with such waiver or consent. 5. This License constitutes the entire agreement between the parties with respect to the Work licensed here. There are no understandings, agreements or representations with respect to the Work not specified here. Licensor shall not be bound by any additional provisions that may appear in any communication from You. This License may not be modified without the mutual written agreement of the Licensor and You. ===== Blurb ===== SOMEONE COMES TO TOWN, SOMEONE LEAVES TOWN is a glorious book, but there are hundreds of those.  It is more.  It is a glorious book unlike any book you've ever read. - Gene Wolfe ========== Dedication ========== For the family I was born into and the family I chose. I got lucky both times. ========= The novel ========= Alan sanded the house on Wales Avenue. It took six months, and the whole time it was the smell of the sawdust, ancient and sweet, and the reek of chemical stripper and the damp smell of rusting steel wool. Alan took possession of the house on January 1, and paid for it in full by means of an e-gold transfer. He had to do a fair bit of hand-holding with the realtor to get her set up and running on e-gold, but he loved to do that sort of thing, loved to sit at the elbow of a novitiate and guide her through the clicks and taps and forms. He loved to break off for impromptu lectures on the underlying principles of the transaction, and so he treated the poor realtor lady to a dozen addresses on the nature of international currency markets, the value of precious metal as a kind of financial lingua franca to which any currency could be converted, the poetry of vault shelves in a hundred banks around the world piled with the heaviest of metals, glinting dully in the fluorescent tube lighting, tended by gnomish bankers who spoke a hundred languages but communicated with one another by means of this universal tongue of weights and measures and purity. The clerks who'd tended Alan's many stores -- the used clothing store in the Beaches, the used book-store in the Annex, the collectible tin-toy store in Yorkville, the antique shop on Queen Street -- had both benefited from and had their patience tried by Alan's discursive nature. Alan had pretended never to notice the surreptitious rolling of eyes and twirling fingers aimed templewise among his employees when he got himself warmed up to a good oration, but in truth very little ever escaped his attention. His customers loved his little talks, loved the way he could wax rhapsodic about the tortured prose in a Victorian potboiler, the nearly erotic curve of a beat-up old table leg, the voluminous cuffs of an embroidered silk smoking jacket. The clerks who listened to Alan's lectures went on to open their own stores all about town, and by and large, they did very well. He'd put the word out when he bought the house on Wales Avenue to all his protégés: Wooden bookcases! His cell-phone rang every day, bringing news of another wooden bookcase found at this flea market, that thrift store, this rummage sale or estate auction. He had a man he used part-time, Tony, who ran a small man-with-van service, and when the phone rang, he'd send Tony over to his protégé's shop with his big panel van to pick up the case and deliver it to the cellar of the house on Wales Avenue, which was ramified by cold storages, root cellars, disused coal chutes and storm cellars. By the time Alan had finished with his sanding, every nook and cranny of the cellar was packed with wooden bookcases of every size and description and repair. Alan worked through the long Toronto winter at his sanding. The house had been gutted by the previous owners, who'd had big plans for the building but had been tempted away by a job in Boston. They'd had to sell fast, and no amount of realtor magic -- flowers on the dining-room table, soup simmering on the stove -- could charm away the essential dagginess of the gutted house, the exposed timbers with sagging wires and conduit, the runnels gouged in the floor by careless draggers of furniture. Alan got it for a song, and was delighted by his fortune. He was drunk on the wood, of course, and would have paid much more had the realtor noticed this, but Alan had spent his whole life drunk on trivial things from others' lives that no one else noticed and he'd developed the alcoholic's knack of disguising his intoxication. Alan went to work as soon as the realtor staggered off, reeling with a New Year's Day hangover. He pulled his pickup truck onto the frozen lawn, unlocked the Kryptonite bike lock he used to secure the camper bed, and dragged out his big belt sander and his many boxes of sandpaper of all grains and sizes, his heat strippers and his jugs of caustic chemical peeler. He still had his jumbled, messy place across town in a nondescript two-bedroom on the Danforth, would keep on paying the rent there until his big sanding project was done and the house on Wales Avenue was fit for habitation. Alan's sanding project: First, finish gutting the house. Get rid of the substandard wiring, the ancient, lead-leaching plumbing, the cracked tile and water-warped crumbling plaster. He filled a half-dozen dumpsters, working with Tony and Tony's homie Nat, who was happy to help out in exchange for cash on the barrelhead, provided that he wasn't required to report for work on two consecutive days, since he'd need one day to recover from the heroic drinking he'd do immediately after Alan laid the cash across his palm. Once the house was gutted to brick and timber and delirious wood, the plumbers and the electricians came in and laid down their straight shining ducts and pipes and conduit. Alan tarped the floors and brought in the heavy sandblaster and stripped the age and soot and gunge off of the brickwork throughout, until it glowed red as a golem's ass. Alan's father, the mountain, had many golems that called him home. They lived round the other side of his father and left Alan and his brothers alone, because even a golem has the sense not to piss off a mountain, especially one it lives in. Then Alan tackled the timbers, reaching over his head with palm-sanders and sandpaper of ever finer grains until the timbers were as smooth as Adirondack chairs, his chest and arms and shoulders athrob with the agony of two weeks' work. Then it was the floorwork, but *not the floors themselves*, which he was saving for last on the grounds that they were low-hanging fruit. This materialized a new lecture in his mind, one about the proper role of low-hanging fruit, a favorite topic of MBAs who'd patronize his stores and his person, giving him unsolicited advice on the care and feeding of his shops based on the kind of useless book-learning and jargon-slinging that Fortune 100 companies apparently paid big bucks for. When an MBA said "low-hanging fruit," he meant "easy pickings," something that could and should be snatched with minimal effort. But *real* low-hanging fruit ripens last, and should be therefore picked as late as possible. Further, picking the low-hanging fruit first meant that you'd have to carry your bushel basket higher and higher as the day wore on, which was plainly stupid. Low-hanging fruit was meant to be picked last. It was one of the ways that he understood people, and one of the kinds of people that he'd come to understand. That was the game, after all -- understanding people. So the floors would come last, after the molding, after the stairs, after the railings and the paneling. The railings, in particular, were horrible bastards to get clean, covered in ten or thirty coats of enamel of varying colors and toxicity. Alan spent days working with a wire brush and pointed twists of steel wool and oozing stinging paint stripper, until the grain was as spotless and unmarked as the day it came off the lathe. *Then* he did the floors, using the big rotary sander first. It had been years since he'd last swung a sander around -- it had been when he opened the tin-toy shop in Yorkville and he'd rented one while he was prepping the place. The technique came back to him quickly enough, and he fell into a steady rhythm that soon had all the floors cool and dry and soft with naked, exposed woody heartmeat. He swept the place out and locked up and returned home. The next day, he stopped at the Portuguese contractor-supply on Ossington that he liked. They opened at five a.m., and the men behind the counter were always happy to sketch out alternative solutions to his amateur construction problems, they never mocked him for his incompetence, and always threw in a ten percent "contractor's discount" for him that made him swell up with irrational pride that confused him. Why should the son of a mountain need affirmation from runty Portugees with pencil stubs behind their ears and scarred fingers? He picked up a pair of foam-rubber knee pads and a ten-kilo box of lint-free shop rags and another carton of disposable paper masks. He drove to the house on Wales Avenue, parked on the lawn, which was now starting to thaw and show deep muddy ruts from his tires. He spent the next twelve hours crawling around on his knees, lugging a tool bucket filled with sandpaper and steel wool and putty and wood-crayons and shop rags. He ran his fingertips over every inch of floor and molding and paneling, feeling the talc softness of the sifted sawdust, feeling for rough spots and gouges, smoothing them out with his tools. He tried puttying over the gouges in the flooring that he'd seen the day he took possession, but the putty seemed like a lie to him, less honest than the gouged-out boards were, and so he scooped the putty out and sanded the grooves until they were as smooth as the wood around them. Next came the beeswax, sweet and shiny. It almost broke his heart to apply it, because the soft, newly exposed wood was so deliciously tender and sensuous. But he knew that wood left to its own would eventually chip and splinter and yellow. So he rubbed wax until his elbows ached, *massaged* the wax into the wood, buffed it with shop rags so that the house shone. Twenty coats of urethane took forty days -- a day to coat and a day to dry. More buffing and the house took on a high shine, a slippery slickness. He nearly broke his neck on the slippery staircase treads, and the Portuguese helped him out with a bag of clear grit made from ground walnut shells. He used a foam brush to put one more coat of urethane on each tread of the stairs, then sprinkled granulated walnut shells on while it was still sticky. He committed a rare error in judgment and did the stairs from the bottom up and trapped himself on the third floor, with its attic ceilings and dormer windows, and felt like a goddamned idiot as he curled up to sleep on the cold, hard, slippery, smooth floor while he waited for his stairs to dry. The urethane must be getting to his head. The bookcases came out of the cellar one by one. Alan wrestled them onto the front porch with Tony's help and sanded them clean, then turned them over to Tony for urethane and dooring. The doors were UV-filtering glass, hinged at the top and surrounded by felt on their inside lips so that they closed softly. Each one had a small brass prop-rod on the left side that could brace it open. Tony had been responsible for measuring each bookcase after he retrieved it from Alan's protégés' shops and for sending the measurements off to a glazier in Mississauga. The glazier was technically retired, but he'd built every display case that had ever sat inside any of Alan's shops and was happy to make use of the small workshop that his daughter and son-in-law had installed in his garage when they retired him to the burbs. The bookcases went into the house, along each wall, according to a system of numbers marked on their backs. Alan had used Tony's measurements and some CAD software to come up with a permutation of stacking and shouldering cases that had them completely covering every wall -- except for the wall by the mantelpiece in the front parlor, the wall over the countertop in the kitchen, and the wall beside the staircases -- to the ceiling. He and Tony didn't speak much. Tony was thinking about whatever people who drive moving vans think about, and Alan was thinking about the story he was building the house to write in. May smelled great in Kensington Market. The fossilized dog shit had melted and washed away in the April rains, and the smells were all springy ones, loam and blossoms and spilled tetrapak fruit punch left behind by the pan-ethnic street-hockey league that formed up spontaneously in front of his house. When the winds blew from the east, he smelled the fish stalls on Spadina, salty and redolent of Chinese barbecue spices. When it blew from the north, he smelled baking bread in the kosher bakeries and sometimes a rare whiff of roasting garlic from the pizzas in the steaming ovens at Massimo's all the way up on College. The western winds smelled of hospital incinerator, acrid and smoky. His father, the mountain, had attuned Art to smells, since they were the leading indicators of his moods, sulfurous belches from deep in the caverns when he was displeased, the cold non-smell of spring water when he was thoughtful, the new-mown hay smell from his slopes when he was happy. Understanding smells was something that you did, when the mountain was your father. Once the bookcases were seated and screwed into the walls, out came the books, thousands of them, tens of thousands of them. Little kids' books with loose signatures, ancient first-edition hardcovers, outsized novelty art books, mass-market paperbacks, reference books as thick as cinderblocks. They were mostly used when he'd gotten them, and that was what he loved most about them: They smelled like other people and their pages contained hints of their lives: marginalia and pawn tickets, bus transfers gone yellow with age and smears of long-ago meals. When he read them, he was in three places: his living room, the authors' heads, and the world of their previous owners. They came off his shelves at home, from the ten-by-ten storage down on the lakeshore, they came from friends and enemies who'd borrowed his books years before and who'd "forgotten" to return them, but Alan *never* forgot, he kept every book in a great and deep relational database that had begun as a humble flatfile but which had been imported into successive generations of industrial-grade database software. This, in turn, was but a pocket in the Ur-database, The Inventory in which Alan had input the value, the cost, the salient features, the unique identifiers, and the photographic record of every single thing he owned, from the socks in his sock drawer to the pots in his cupboard. Maintaining The Inventory was serious business, no less important now than it had been when he had begun it in the course of securing insurance for the bookshop. Alan was an insurance man's worst nightmare, a customer from hell who'd messenger over five bankers' boxes of detailed, cross-referenced Inventory at the slightest provocation. The books filled the shelves, row on row, behind the dust-proof, light-proof glass doors. The books began in the foyer and wrapped around the living room, covered the wall behind the dining room in the kitchen, filled the den and the master bedroom and the master bath, climbed the short walls to the dormer ceilings on the third floor. They were organized by idiosyncratic subject categories, and alphabetical by author within those categories. Alan's father was a mountain, and his mother was a washing machine -- he kept a roof over their heads and she kept their clothes clean. His brothers were: a dead man, a trio of nesting dolls, a fortune teller, and an island. He only had two or three family portraits, but he treasured them, even if outsiders who saw them often mistook them for landscapes. There was one where his family stood on his father's slopes, Mom out in the open for a rare exception, a long tail of extension cords snaking away from her to the cave and the diesel generator's three-prong outlet. He hung it over the mantel, using two hooks and a level to make sure that it came out perfectly even. Tony helped Alan install the shallow collectibles cases along the house's two-story stairwell, holding the level while Alan worked the cordless powerdriver. Alan's glazier had built the cases to Alan's specs, and they stretched from the treads to the ceiling. Alan filled them with Made-in-Occupied-Japan tin toys, felt tourist pennants from central Florida gator farms, a stone from Marie Laveau's tomb in the St. Louis I Cemetery in New Orleans, tarnished brass Zippos, small framed comic-book bodybuilding ads, carved Polynesian coconut monkeys, melamine transistor radios, Bakelite snow globes, all the tchotchkes he'd accumulated over a lifetime of picking and hunting and digging. They were gloriously scuffed and non-mint: he'd always sold off the sterile mint-in-package goods as quickly as he could, squirreling away the items that were marked with "Property of Freddy Terazzo" in shaky ballpoint, the ones with tooth marks and frayed boxes taped shut with brands of stickytape not offered for sale in fifty years. The last thing to go in was the cellar. They knocked out any wall that wasn't load-bearing, smeared concrete on every surface, and worked in a loose mosaic of beach glass and beach china, smooth and white with spidery blue illustrations pale as a dream. Three coats of urethane made the surfaces gleam. Then it was just a matter of stringing out the cables for the clip-on halogens whose beams he took care to scatter off the ceilings to keep the glare to a minimum. He moved in his horsehair sofa and armchairs, his big old bed, his pots and pans and sideboard with its novelty decanters, and his entertainment totem. A man from Bell Canada came out and terminated the data line in his basement, in a room that he'd outfitted with an uninterruptible power supply, a false floor, dry fire extinguishers and a pipe-break sensor. He installed and configured the router, set up his modest rack and home servers, fished three four-pair wires through to the living room, the den, and the attic, where he attached them to unobtrusive wireless access points and thence to weatherproofed omnidirectional antennae made from copper tubing and PVC that he'd affixed to the building's exterior on short masts, aimed out over Kensington Market, blanketing a whole block with free Internet access. He had an idea that the story he was going to write would require some perambulatory cogitation, and he wanted to be able to take his laptop anywhere in the market and sit down and write and hop online and check out little factoids with a search engine so he wouldn't get hung up on stupid details. The house on Wales Avenue was done. He'd repainted the exterior a lovely robin's-egg blue, fixed the front step, and planted a low-maintenance combination of outsized rocks from the Canadian Shield and wild grasses on the front lawn. On July first, Alan celebrated Canada Day by crawling out of the attic window onto the roof and watching the fireworks and listening to the collective sighs of the people densely packed around him in the Market, then he went back into the house and walked from room to room, looking for something out of place, some spot still rough and unsanded, and found none. The books and the collections lined the walls, the fans whirred softly in the ceilings, the filters beneath the open windows hummed as they sucked the pollen and particulate out of the rooms -- Alan's retail experience had convinced him long ago of the selling power of fresh air and street sounds, so he refused to keep the windows closed, despite the fantastic volume of city dust that blew in. The house was perfect. The ergonomic marvel of a chair that UPS had dropped off the previous day was tucked under the wooden sideboard he'd set up as a desk in the second-floor den. His brand-new computer sat centered on the desk, a top-of-the-line laptop with a wireless card and a screen big enough to qualify as a home theater in some circles. Tomorrow, he'd start the story. # Alan rang the next-door house's doorbell at eight a.m. He had a bag of coffees from the Greek diner. Five coffees, one for each bicycle locked to the wooden railing on the sagging porch plus one for him. He waited five minutes, then rang the bell again, holding it down, listening for the sound of footsteps over the muffled jangling of the buzzer. It took two minutes more, he estimated, but he didn't mind. It was a beautiful summer day, soft and moist and green, and he could already smell the fish market over the mellow brown vapors of the strong coffee. A young woman in long johns and a baggy tartan T-shirt opened the door. She was excitingly plump, round and a little jiggly, the kind of woman Alan had always gone for. Of course, she was all of twenty-two, and so was certainly not an appropriate romantic interest for him, but she was fun to look at as she ungummed her eyes and worked the sleep out of her voice. "Yes?" she said through the locked screen door. Her voice brooked no nonsense, which Alan also liked. He'd hire her in a second, if he were still running a shop. He liked to hire sharp kids like her, get to know them, try to winkle out their motives and emotions through observation. "Good morning!" Alan said. "I'm Alan, and I just moved in next door. I've brought coffee!" He hefted his sack in her direction. "Good morning, Alan," she said. "Thanks and all, but --" "Oh, no need to thank me! Just being neighborly. I brought five -- one for each of you and one for me." "Well, that's awfully nice of you --" "Nothing at all. Nice morning, huh? I saw a robin just there, on that tree in the park, not an hour ago. Fantastic." "Great." She unlatched the screen door and opened it, reaching for the sack. Alan stepped into the foyer and handed it to her. "There's cream and sugar in there," he said. "Lots -- don't know how you folks take it, so I just figured better sure than miserable, better to err on the side of caution. Wow, look at this, your place has a completely different layout from mine. I think they were built at the same time, I mean, they look a lot alike. I don't really know much about architecture, but they really do seem the same, don't they, from the outside? But look at this! In my place, I've got a long corridor before you get to the living room, but your place is all open. I wonder if it was built that way, or if someone did that later. Do you know?" "No," she said, hefting the sack. "Well, I'll just have a seat while you get your roommates up, all right? Then we can all have a nice cup of coffee and a chat and get to know each other." She dithered for a moment, then stepped back toward the kitchen and the stairwell. Alan nodded and took a little tour of the living room. There was a very nice media totem, endless shelves of DVDs and videos, including a good selection of Chinese kung-fu VCDs and black and white comedies. There was a stack of guitar magazines on the battered coffee table, and a cozy sofa with an afghan folded neatly on one arm. Good kids, he could tell that just by looking at their possessions. Not very security-conscious, though. She should have either kicked him out or dragged him around the house while she got her roomies out of bed. He thought about slipping some VCDs into his pocket and returning them later, just to make the point, but decided it would be getting off on the wrong foot. She returned a moment later, wearing a fuzzy yellow robe whose belt and seams were gray with grime and wear. "They're coming down," she said. "Terrific!" Alan said, and planted himself on the sofa. "How about that coffee, hey?" She shook her head, smiled a little, and retrieved a coffee for him. "Cream? Sugar?" "Nope," Alan said. "The Greek makes it just the way I like it. Black and strong and aromatic. Try some before you add anything -- it's really fantastic. One of the best things about the neighborhood, if you ask me." Another young woman, rail-thin with a shaved head, baggy jeans, and a tight t-shirt that he could count her ribs through, shuffled into the living room. Alan got to his feet and extended his hand. "Hi there! I'm Adam, your new neighbor! I brought coffees!" She shook his hand, her long fingernails sharp on his palm. "Natalie," she said. The other young woman passed a coffee to her. "He brought coffees," she said. "Try it before you add anything to it." She turned to Alan. "I thought you said your name was Alan?" "Alan, Adam, Andy. Doesn't matter, I answer to any of them. My mom had a hard time keeping our names straight." "Funny," Natalie said, sipping at her coffee. "Two sugars, three creams," she said, holding her hand out. The other woman silently passed them to her. "I haven't gotten your name yet," Alan said. "Right," the other one said. "You sure haven't." A young man, all of seventeen, with straggly sideburns and a shock of pink hair sticking straight up in the air, shuffled into the room, wearing cutoffs and an unbuttoned guayabera. "Adam," Natalie said, "this is Link, my kid brother. Link, this is Arthur -- he brought coffees." "Hey, thanks, Arthur," Link said. He accepted his coffee and stood by his sister, sipping reverently. "So that leaves one more," Alan said. "And then we can get started." Link snorted. "Not likely. Krishna doesn't get out of bed before noon." "Krishna?" Alan said. "My boyfriend," the nameless woman said. "He was up late." "More coffee for the rest of us, I suppose," Alan said. "Let's all sit and get to know one another, then, shall we?" They sat. Alan slurped down the rest of his coffee, then gestured at the sack. The nameless woman passed it to him and he got the last one, and set to drinking. "I'm Andreas, your new next-door neighbor. I've just finished renovating, and I moved in last night. I'm really looking forward to spending time in the neighborhood -- I work from home, so I'll be around a bunch. Feel free to drop by if you need to borrow a cup of sugar or anything." "That's so nice of you," Natalie said. "I'm sure we'll get along fine!" "Thanks, Natalie. Are you a student?" "Yup," she said. She fished in the voluminous pockets of her jeans, tugging them lower on her knobby hips, and came up with a pack of cigarettes. She offered one to her brother -- who took it -- and one to Alan, who declined, then lit up. "Studying fashion design at OCAD. I'm in my last year, so it's all practicum from now on." "Fashion! How interesting," Alan said. "I used to run a little vintage clothes shop in the Beaches, called Tropicál." "Oh, I *loved* that shop," she said. "You had the *best* stuff! I used to sneak out there on the streetcar after school." Yup. He didn't remember *her*, exactly, but her *type*, sure. Solo girls with hardcover sketch books and vintage clothes home-tailored to a nice fit. "Well, I'd be happy to introduce you to some of the people I know -- there's a vintage shop that a friend of mine runs in Parkdale. He's always looking for designers to help with rehab and repros." "That would be so cool!" "Now, Link, what do you study?" Link pulled at his smoke, ashed in the fireplace grate. "Not much. I didn't get into Ryerson for electrical engineering, so I'm spending a year as a bike courier, taking night classes, and reapplying for next year." "Well, that'll keep you out of trouble at least," Alan said. He turned to the nameless woman. "So, what do you do, *Apu*?" she said to him, before he could say anything. "Oh, I'm retired, Mimi," he said. "Mimi?" she said. "Why not? It's as good a name as any." "Her name is --" Link started to say, but she cut him off. "Mimi is as good a name as any. I'm unemployed. Krishna's a bartender." "Are you looking for work?" She smirked. "Sure. Whatcha got?" "What can you do?" "I've got three-quarters of a degree in environmental studies, one year of kinesiology, and a half-written one-act play. Oh, and student debt until the year 3000." "A play!" he said, slapping his thighs. "You should finish it. I'm a writer, too, you know." "I thought you had a clothing shop." "I did. And a bookshop, and a collectibles shop, and an antique shop. Not all at the same time, you understand. But now I'm writing. Going to write a story, then I imagine I'll open another shop. But I'm more interested in *you*, Mimi, and your play. Why half-finished?" She shrugged and combed her hair back with her fingers. Her hair was brown and thick and curly, down to her shoulders. Alan adored curly hair. He'd had a clerk at the comics shop with curly hair just like hers, an earnest and bright young thing who drew her own comics in the back room on her breaks, using the receiving table as a drawing board. She'd never made much of a go of it as an artist, but she did end up publishing a popular annual anthology of underground comics that had captured the interest of the *New Yorker* the year before. "I just ran out of inspiration," Mimi said, tugging at her hair. "Well, there you are. Time to get inspired again. Stop by any time and we'll talk about it, all right?" "If I get back to it, you'll be the first to know." "Tremendous!" he said. "I just know it'll be fantastic. Now, who plays the guitar?" "Krishna," Link said. "I noodle a bit, but he's really good." "He sure is," Alan said. "He was in fine form last night, about three a.m.!" He chuckled pointedly. There was an awkward silence. Alan slurped down his second coffee. "Whoops!" he said. "I believe I need to impose on you for the use of your facilities?" "What?" Natalie and Link said simultaneously. "He wants the toilet," Mimi said. "Up the stairs, second door on the right. Jiggle the handle after you flush." The bathroom was crowded with too many towels and too many toothbrushes. The sink was powdered with blusher and marked with lipstick and mascara residue. It made Alan feel at home. He liked young people. Liked their energy, their resentment, and their enthusiasm. Didn't like their guitar-playing at three a.m.; but he'd sort that out soon enough. He washed his hands and carefully rinsed the long curly hairs from the bar before replacing it in its dish, then returned to the living room. "Abel," Mimi said, "sorry if the guitar kept you up last night." "No sweat," Alan said. "It must be hard to find time to practice when you work nights." "Exactly," Natalie said. "Exactly right! Krishna always practices when he comes back from work. He blows off some steam so he can get to bed. We just all learned to sleep through it." "Well," Alan said, "to be honest, I'm hoping I won't have to learn to do that. But I think that maybe I have a solution we can both live with." "What's that?" Mimi said, jutting her chin forward. "It's easy, really. I can put up a resilient channel and a baffle along that wall there, soundproofing. I'll paint it over white and you won't even notice the difference. Shouldn't take me more than a week. Happy to do it. Thick walls make good neighbors." "We don't really have any money to pay for renovations," Mimi said. Alan waved his hand. "Who said anything about money? I just want to solve the problem. I'd do it on my side of the wall, but I've just finished renovating." Mimi shook her head. "I don't think the landlord would go for it." "You worry too much," he said. "Give me your landlord's number and I'll sort it out with him, all right?" "All right!" Link said. "That's terrific, Albert, really!" "All right, Mimi? Natalie?" Natalie nodded enthusiastically, her shaved head whipping up and down on her thin neck precariously. Mimi glared at Natalie and Link. "I'll ask Krishna," she said. "All right, then!" Alan said. "Let me measure up the wall and I'll start shopping for supplies." He produced a matte black, egg-shaped digital tape measure and started shining pinpoints of laser light on the wall, clicking the egg's buttons when he had the corners tight. The Portuguese clerks at his favorite store had dissolved into hysterics when he'd proudly shown them the $300 gadget, but they were consistently impressed by the exacting CAD drawings of his projects that he generated with its output. Natalie and Link stared in fascination as he did his thing with more showmanship than was technically necessary, though Mimi made a point of rolling her eyes. "Don't go spending any money yet, cowboy," she said. "I've still got to talk to Krishna, and *you've* still got to talk with the landlord." He fished in the breast pocket of his jean jacket and found a stub of pencil and a little steno pad, scribbled his cell phone number, and tore off the sheet. He passed the sheet, pad, and pencil to Mimi, who wrote out the landlord's number and passed it back to him. "Okay!" Alan said. "There you go. It's been a real pleasure meeting you folks. I know we're going to get along great. I'll call your landlord right away and you call me once Krishna's up, and I'll see you tomorrow at ten a.m. to start construction, God willin' and the crick don't rise." Link stood and extended his hand. "Nice to meet you, Albert," he said. "Really. Thanks for the muds, too." Natalie gave him a bony hug, and Mimi gave him a limp handshake, and then he was out in the sunshine, head full of designs and logistics and plans. # The sun set at nine p.m. in a long summertime blaze. Alan sat down on the twig-chair on his front porch, pulled up the matching twig table, and set down a wine glass and the bottle of Niagara Chardonnay he'd brought up from the cellar. He poured out a glass and held it up to the light, admiring the new blister he'd gotten on his pinky finger while hauling two-by-fours and gyprock from his truck to his neighbors' front room. Kids rode by on bikes and punks rode by on skateboards. Couples wandered through the park across the street, their murmurous conversations clear on the whispering breeze that rattled the leaves. He hadn't gotten any writing done, but that was all right. He had plenty of time, and once the soundwall was in, he'd be able to get a good night's sleep and really focus down on the story. A Chinese girl and a white boy walked down the sidewalk, talking intensely. They were all of six, and the boy had a Russian accent. The Market's diversity always excited Alan. The boy looked a little like Alan's brother Doug (Dan, David, Dearborne) had looked when he was that age. Doug was the one he'd helped murder. All the brothers had helped with the murder, even Charlie (Clem, Carlos, Cory), the island, who'd opened a great fissure down his main fault line and closed it up over Doug's corpse, ensuring that their parents would be none the wiser. Doug was a stubborn son-of-a-bitch, though, and his corpse had tunneled up over the next six years, built a raft from the bamboo and vines that grew in proliferation on Carlos's west coast. He sailed the raft through treacherous seas for a year and a day, beached it on their father's gentle slope, and presented himself to their mother. By that time, the corpse had decayed and frayed and worn away, so that he was little more than a torso and stumps, his tongue withered and stiff, but he pled his case to their mother, and she was so upset that her load overbalanced and they had to restart her. Their father was so angry that he quaked and caved in Billy (Bob, Brad, Benny)'s room, crushing all his tools and all his trophies. But a lot of time had gone by and the brothers weren't kids anymore. Alan was nineteen, ready to move to Toronto and start scouting for real estate. Only Doug still looked like a little boy, albeit a stumpy and desiccated one. He hollered and stamped until his fingerbones rattled on the floor and his tongue flew across the room and cracked on the wall. When his anger was spent, he crawled atop their mother and let her rock him into a long, long slumber. Alan had left his father and his family the next morning, carrying a rucksack heavy with gold from under the mountain and walked down to the town, taking the same trail he'd walked every school day since he was five. He waved to the people that drove past him on the highway as he waited at the bus stop. He was the first son to leave home under his own power, and he'd been full of butterflies, but he had a half-dozen good books that he'd checked out of the Kapuskasing branch library to keep him occupied on the 14-hour journey, and before he knew it, the bus was pulling off the Gardiner Expressway by the SkyDome and into the midnight streets of Toronto, where the buildings stretched to the sky, where the blinking lights of the Yonge Street sleaze-strip receded into the distance like a landing strip for a horny UFO. His liquid cash was tight, so he spent that night in the Rex Hotel, in the worst room in the house, right over the cymbal tree that the jazz-drummer below hammered on until nearly two a.m.. The bed was small and hard and smelled of bleach and must, the washbasin gurgled mysteriously and spat out moist sewage odors, and he'd read all his books, so he sat in the window and watched the drunks and the hipsters stagger down Queen Street and inhaled the smoky air and before he knew it, he'd nodded off in the chair with his heavy coat around him like a blanket. The Chinese girl abruptly thumped her fist into the Russian boy's ear. He clutched his head and howled, tears streaming down his face, while the Chinese girl ran off. Alan shook his head, got up off his chair, went inside for a cold washcloth and an ice pack, and came back out. The Russian boy's face was screwed up and blotchy and streaked with tears, and it made him look even more like Doug, who'd always been a crybaby. Alan couldn't understand him, but he took a guess and knelt at his side and wiped the boy's face, then put the ice pack in his little hand and pressed it to the side of his little head. "Come on," he said, taking the boy's other hand. "Where do your parents live? I'll take you home." # Alan met Krishna the next morning at ten a.m., as Alan was running a table saw on the neighbors' front lawn, sawing studs up to fit the second wall. Krishna came out of the house in a dirty dressing gown, his short hair matted with gel from the night before. He was tall and fit and muscular, his brown calves flashing through the vent of his housecoat. He was smoking a hand-rolled cigarette and clutching a can of Coke. Alan shut down the saw and shifted his goggles up to his forehead. "Good morning," he said. "I'd stay on the porch if I were you, or maybe put on some shoes. There're lots of nails and splinters around." Krishna, about to step off the porch, stepped back. "You must be Alvin," he said. "Yup," Alan said, going up the stairs, sticking out his hand. "And you must be Krishna. You're pretty good with a guitar, you know that?" Krishna shook briefly, then snatched his hand back and rubbed at his stubble. "I know. You're pretty fucking loud with a table saw." Alan looked sheepish. "Sorry about that. I wanted to get the heavy work done before it got too hot. Hope I'm not disturbing you too much -- today's the only sawing day. I'll be hammering for the next day or two, then it's all wet work -- the loudest tool I'll be using is sandpaper. Won't take more than four days, tops, anyway, and we'll be in good shape." Krishna gave him a long, considering look. "What are you, anyway?" "I'm a writer -- for now. Used to have a few shops." Krishna blew a plume of smoke off into the distance. "That's not what I mean. What *are* you, Adam? Alan? Andrew? I've met people like you before. There's something not right about you." Alan didn't know what to say to that. This was bound to come up someday. "Where are you from?" "Up north. Near Kapuskasing," he said. "A little town." "I don't believe you," Krishna said. "Are you an alien? A fairy? What?" Alan shook his head. "Just about what I seem, I'm afraid. Just a guy." "Just about, huh?" he said. "Just about." "There's a lot of wiggle room in *just about*, Arthur. It's a free country, but just the same, I don't think I like you very much. Far as I'm concerned, you could get lost and never come back." "Sorry you feel that way, Krishna. I hope I'll grow on you as time goes by." "I hope that you won't have the chance to," Krishna said, flicking the dog end of his cigarette toward the sidewalk. # Alan didn't like or understand Krishna, but that was okay. He understood the others just fine, more or less. Natalie had taken to helping him out after her classes, mudding and taping the drywall, then sanding it down, priming, and painting it. Her brother Link came home from work sweaty and grimy with road dust, but he always grabbed a beer for Natalie and Alan after his shower, and they'd sit on the porch and kibbitz. Mimi was less hospitable. She sulked in her room while Alan worked on the soundwall, coming downstairs only to fetch her breakfast and coldly ignoring him then, despite his cheerful greetings. Alan had to force himself not to stare after her as she walked into the kitchen, carrying yesterday's dishes down from her room; then out again, with a sandwich on a fresh plate. Her curly hair bounced as she stomped back and forth, her soft, round buttocks flexing under her long-johns. On the night that Alan and Natalie put the first coat of paint on the wall, Mimi came down in a little baby-doll dress, thigh-high striped tights, and chunky shoes, her face painted with swaths of glitter. "You look wonderful, baby," Natalie told her as she emerged onto the porch. "Going out?" "Going to the club," she said. "DJ None Of Your Fucking Business is spinning and Krishna's going to get me in for free." "Dance music," Link said disgustedly. Then, to Alan, "You know this stuff? It's not playing music, it's playing *records*. Snore." "Sounds interesting," Alan said. "Do you have any of it I could listen to? A CD or some MP3s?" "Oh, *that's* not how you listen to this stuff," Natalie said. "You have to go to a club and *dance*." "Really?" Alan said. "Do I have to take ecstasy, or is that optional?" "It's mandatory," Mimi said, the first words she'd spoken to him all week. "Great fistfuls of E, and then you have to consume two pounds of candy necklaces at an after-hours orgy." "Not really," Natalie said, *sotto voce*. "But you *do* have to dance. You should go with, uh, Mimi, to the club. DJ None Of Your Fucking Business is *amazing*." "I don't think Mimi wants company," Alan said. "What makes you say that?" Mimi said, making a dare of it with hipshot body language. "Get changed and we'll go together. You'll have to pay to get in, though." Link and Natalie exchanged a raised eyebrow, but Alan was already headed for his place, fumbling for his keys. He bounded up the stairs, swiped a washcloth over his face, threw on a pair of old cargo pants and a faded Steel Pole Bathtub T-shirt he'd bought from a head-shop one day because he liked the words' incongruity, though he'd never heard the band, added a faded jean jacket and a pair of high-tech sneakers, grabbed his phone, and bounded back down the stairs. He was convinced that Mimi would be long gone by the time he got back out front, but she was still there, the stripes in her stockings glowing in the slanting light. "Retro chic," she said, and laughed nastily. Natalie gave him a thumbs up and a smile that Alan uncharitably took for a simper, and felt guilty about it immediately afterward. He returned the thumbs up and then took off after Mimi, who'd already started down Augusta, headed for Queen Street. "What's the cover charge?" he said, once he'd caught up. "Twenty bucks," she said. "It's an all-ages show, so they won't be selling a lot of booze, so there's a high cover." "How's the play coming?" "Fuck off about the play, okay?" she said, and spat on the sidewalk. "All right, then," he said. "I'm going to start writing my story tomorrow," he said. "Your story, huh?" "Yup." "What's that for?" "What do you mean?" he asked playfully. "Why are you writing a story?" "Well, I have to! I've completely redone the house, built that soundwall -- it'd be a shame not to write the story now." "You're writing a story about your house?" "No, *in* my house. I haven't decided what the story's about yet. That'll be job one tomorrow." "You did all that work to have a place to write? Man, I thought *I* was into procrastination." He chuckled self-deprecatingly. "I guess you could look at it that way. I just wanted to have a nice, creative environment to work in. The story's important to me, is all." "What are you going to do with it once you're done? There aren't a whole lot of places that publish short stories these days, you know." "Oh, I know it! I'd write a novel if I had the patience. But this isn't for publication -- yet. It's going into a drawer to be published after I die." "*What*?" "Like Emily Dickinson. Wrote thousands of poems, stuck 'em in a drawer, dropped dead. Someone else published 'em and she made it into the canon. I'm going to do the same." "That's nuts -- are you dying?" "Nope. But I don't want to put this off until I am. Could get hit by a bus, you know." "You're a goddamned psycho. Krishna was right." "What does Krishna have against me?" "I think we both know what that's about," she said. "No, really, what did I ever do to him?" Now they were on Queen Street, walking east in the early evening crowd, surrounded by summertime hipsters and wafting, appetizing smells from the bistros and Jamaican roti shops. She stopped abruptly and grabbed his shoulders and gave him a hard shake. "You're full of shit, Ad-man. I know it and you know it." "I really don't know what you're talking about, honestly!" "Fine, let's do this." She clamped her hand on his forearm and dragged him down a side street and turned down an alley. She stepped into a doorway and started unbuttoning her Alice-blue babydoll dress. Alan looked away, embarrassed, glad of the dark hiding his blush. Once the dress was unbuttoned to her waist, she reached around behind her and unhooked her white underwire bra, which sagged forward under the weight of her heavy breasts. She turned around, treating him to a glimpse of the full curve of her breast under her arm, and shrugged the dress down around her waist. She had two stubby, leathery wings growing out of the middle of her back, just above the shoulder blades. They sat flush against her back, and as Alan watched, they unfolded and flexed, flapped a few times, and settled back into their position, nested among the soft roll of flesh that descended from her neck. Involuntarily, he peered forward, examining the wings, which were covered in fine downy brown hairs, and their bases, roped with muscle and surrounded by a mess of ugly scars. "You...*sewed*...these on?" Alan said, aghast. She turned around, her eyes bright with tears. Her breasts swung free of her unhooked bra. "No, you fucking idiot. I sawed them off. Four times a year. They just grow back. If I don't cut them, they grow down to my ankles." # Mimi was curiously and incomprehensibly affectionate after she had buttoned up her dress and resumed walking toward the strip of clubs along Richmond Street. She put her hand on his forearm and murmured funny commentary about the outlandishly attired club kids in their plastic cowboy hats, Sailor Moon outfits, and plastic tuxedoes. She plucked a cigarette from his lips, dragged on it, and put it back into his mouth, still damp with her saliva, an act that sent a shiver down Alan's neck and made the hair on the backs of his hands stand up. She seemed to think that the wings were self-explanatory and needed no further discussion, and Alan was content to let them stay in his mind's eye, bat-shaped, powerful, restless, surrounded by their gridwork of angry scars. Once they got to the club, Shasta Disaster, a renovated brick bank with robotic halogen spots that swept the sidewalk out front with a throbbing penis logomark, she let go of his arm and her body stiffened. She said something in the doorman's ear, and he let her pass. When Alan tried to follow her, the bouncer stopped him with a meaty hand on his chest. "Can I help you sir," he said flatly. He was basically a block of fat and muscle with a head on top, arms as thick as Alan's thighs barely contained in a silver button-down short-sleeve shirt that bound at his armpits. "Do I pay the cover to you?" Alan asked, reaching for his wallet. "No, you don't get to pay a cover. You're not coming in." "But I'm with her," Alan said, gesturing in the direction Mimi had gone. "I'm Krishna's and her neighbor." "She didn't mention it," the bouncer said. He was smirking now. "Look," Alan said. "I haven't been to a club in twenty years. Do you guys still take bribes?" The bouncer rolled his eyes. "Some might. I don't. Why don't you head home, sir." "That's it, huh?" Alan said. "Nothing I can say or do?" "Don't be a smart guy," the bouncer said. "Good night, then," Alan said, and turned on his heel. He walked back up to Queen Street, which was ablaze with TV lights from the open studio out front of the CHUM-City building. Hordes of teenagers in tiny, outrageous outfits milled back and forth from the coffee shops to the studio window, where some band he'd never heard of was performing, generally ambling southward to the clubs. Alan bought himself a coffee with a sixteen-syllable latinate trade name ("Moch-a-latt-a-meraican-a-spress-a-chino," he liked to call them) at the Second Cup and hailed a taxi. He felt only the shortest moment of anger at Mimi, but it quickly cooled and then warmed again, replaced by bemusement. Decrypting the mystical deeds of young people had been his hobby and avocation since he hired his first cranky-but-bright sixteen-year-old. Mimi had played him, he knew that, deliberately set him up to be humiliated. But she'd also wanted a moment alone with him, an opportunity to confront him with her wings -- wings that were taking on an air of the erotic now in his imagination, much to his chagrin. He imagined that they were soft and pliable as lips but with spongy cartilage beneath that gave way like livid nipple flesh. The hair must be silky, soft, and slippery as a pubic thatch oiled with sweat and juices. Dear oh dear, he was really getting himself worked into a lather, imagining the wings drooping to the ground, unfolding powerfully in his living room, encircling him, enveloping him as his lips enveloped the tendons on her neck, as her vagina enveloped him... Whew! The taxi drove right past his place and that gave Alan a much-needed distraction, directing the cabbie through the maze of Kensington Market's one-way streets back around to his front door. He tipped the cabbie a couple of bucks over his customary ten percent and bummed a cigarette off him, realizing that Mimi had asked him for a butt but never returned the pack. He puffed and shook his head and stared up the street at the distant lights of College Street, then turned back to his porch. "Hello, Albert," two voices said in unison, speaking from the shadows on his porch. "Jesus," he said, and hit the remote on his keyring that switched on the porch light. It was his brother Edward, the eldest of the nesting dolls, the bark of their trinity, coarse and tough and hollow. He was even fatter than he'd been as a little boy, fat enough that his arms and legs appeared vestigial and unjointed. He struggled, panting, to his tiny feet -- feet like undersized exclamation points beneath the tapered Oh of his body. His face, though doughy, had not gone to undefined softness. Rather, every feature had acquired its own rolls of fat, rolls that warred with one another to define his appearance -- nose and cheekbones and brow and lips all grotesque and inflated and blubbery. "Eugene," Alan said. "It's been a very long time." Edward cocked his head. "It has, indeed, big brother. I've got bad news." "What?" Edward leaned to the left, the top half of his body tipping over completely, splitting at his narrow leather belt, so that his trunk, neck, and head hung upside down beside his short, cylindrical legs and tiny feet. Inside of him was Frederick, the perennial middle child. Frederick planted his palms on the dry, smooth edges of his older brother's waist and levered himself up, stepping out of Ed's legs with the unconscious ease of a lifetime's practice. "It's good to see you, Andy," he said. He was pale and wore his habitual owlish expression of surprise at seeing the world without looking through his older brother's eyes. "It's nice to see you, too, Frederick," Alan said. He'd always gotten along with Frederick, always liked his ability to play peacemaker and to lend a listening ear. Frederick helped Edward upright, methodically circumnavigating his huge belly, retucking his grimy white shirt. Then he hitched up his sweatshirt over the hairy pale expanse of his own belly and tipped to one side. Alan had been expecting to see Gregory, the core, but instead, there was nothing inside Frederick. The Gregory-shaped void was empty. Frederick righted himself and hitched up his belt. "We think he's dead," Edward said, his rubbery features distorted into a Greek tragedy mask. "We think that Doug killed him." He pinwheeled his round arms and then clapped his hands to his face, sobbing. Frederick put a hand on his arm. He, too, was crying. # Once upon a time, Alan's mother gave birth to three sons in three months. Birthing sons was hardly extraordinary -- before these three came along, she'd already had four others. But the interval, well, that was unusual. As the eldest, Alan was the first to recognize the early signs of her pregnancy. The laundry loads of diapers and play clothes he fed into her belly unbalanced more often, and her spin cycle became almost lackadaisical, so the garments had to hang on the line for days before they stiffened and dried completely. Alan liked to sit with his back against his mother's hard enamel side while she rocked and gurgled and churned. It comforted him. The details of her conception were always mysterious to Alan. He'd been walking down into town to attend day school for five years, and he'd learned all about the birds and the bees, and he thought that maybe his father -- the mountain -- impregnated his mother by means of some strange pollen carried on the gusts of winds from his deep and gloomy caves. There was a gnome, too, who made sure that the long hose that led from Alan's mother's back to the spring pool in his father's belly remained clear and unfouled, and sometimes Alan wondered if the gnome dove for his father's seed and fed it up his mother's intake. Alan's life was full of mysteries, and he'd long since learned to keep his mouth shut about his home life when he was at school. He attended all three births, along with the smaller kids -- Bill and Donald (Charlie, the island, was still small enough to float in the middle of their father's heart-pool) -- waiting on tenterhooks for his mother's painful off-balance spin cycle to spend itself before reverently opening the round glass door and removing the infant within. Edward was fat, even for a baby. He looked like an elongated soccer ball with a smaller ball on top. He cried healthily, though, and gave hearty suck to their mother's exhaust valve once Alan had cleaned the soap suds and fabric softener residue from his little body. His father gusted proud, warm, blustery winds over them and their little domestic scene. Alan noticed that little Edward, for all his girth, was very light, and wondered if the baby was full of helium or some other airy substance. Certainly he hardly appeared to be full of *baby*, since everything he ate and drank passed through him in a matter of seconds, hardly digested at all. Alan had to go into town twice to buy new twelve-pound boxes of clean white shop rags to clean up the slime trail the baby left behind him. Drew, at three, seemed to take a perverse delight in the scummy water, spreading it around the cave as much as possible. The grove in front of the cave mouth was booby trapped with clothesline upon clothesline, all hung with diapers and rags drying out in the early spring sunlight. Thirty days later, Alan came home from school to find the younger kids surrounding his mother as she rocked from side to side, actually popping free of the grooves her small metal feet had worn in the cave floor over the years. Two babies in thirty days! Such a thing was unheard of in their father's cave. Edward, normally a sweet-tempered baby, howled long screams that resonated through Alan's milk teeth and made his testicles shrivel up into hard stones. Alan knew his mother liked to be left alone when she was in labor, but he couldn't just stand there and watch her shake and shiver. He went to her and pressed his palms to her top, tried to soothe and restrain her. Bill, the second eldest and still only four years old, followed suit. Edward's screams grew even louder, loud and hoarse and utterly terrified, echoing off their father's walls and back to them. Soon Alan was sobbing, too, biting his lip to keep the sounds inside, and so were the other children. Dillon wrinkled his brow and screamed a high-pitched wail that could have cut glass. Alan's mother rocked harder, and her exhaust hose dislodged itself. A high-pressure jet of cold, soapy water spurted from her back parts, painting the cave wall with suds. Edward crawled into the puddle it formed and scooped small handsful of the liquid into his mouth between howls. And then, it stopped. His mother stopped rocking, stopped shaking. The stream trailed off into a trickle. Alan stopped crying, and soon the smaller kids followed suit, even Edward. The echoes continued for a moment, and then they, too, stopped. The silence was as startling -- and nearly as unbearable -- as the cacophony had been. With a trembling hand, Alan opened his mother's door and extracted little Frederick. The baby was small and cyanotic blue. Alan tipped the baby over and shook him gently, and the baby vomited up a fantastic quantity of wash water, a prodigious stream that soaked the front of Alan's school trousers and his worn brown loafers. Finally it ended, and the baby let out a healthy yowl. Alan shifted the infant to one arm and gingerly reconnected the exhaust hose and set the baby down alongside of its end. The baby wouldn't suck, though. Across the cave, from his soggy seat in the puddle of waste water, Edward watched the new baby with curious eyes. He crawled across the floor and nuzzled his brother with his high forehead. Frederick squirmed and fussed, and Edward shoved him to one side and sucked. His little diaper dripped as the liquid passed directly through him. Alan patiently picked dripping Edward up and put him over one shoulder, and gave Frederick the tube to suck. Frederick gummed at the hose's end, then fussed some more, whimpering. Edward squirmed in his arms, nearly plummeting to the hard stone floor. "Billy," Alan said to the solemn little boy, who nodded. "Can you take care of Edward for a little while? I need to clean up." Billy nodded again and held out his pudgy arms. Alan grabbed some clean shop rags and briskly wiped Frederick down, then laid another across Billy's shoulder and set Edward down. The baby promptly set to snoring. Danny started screaming again, with no provocation, and Alan took two swift steps to bridge the distance between them and smacked the child hard enough to stun him silent. Alan grabbed a mop and bucket and sloshed the puddles into the drainage groove where his mother's waste water usually ran, out the cave mouth and into a stand of choking mountain-grass that fed greedily and thrived riotous in the phosphates from the detergent. Frederick did not eat for thirty days, and during that time he grew so thin that he appeared to shrivel like a raisin, going hard and folded in upon himself. Alan spent hours patiently spooning sudsy water into his little pink mouth, but the baby wouldn't swallow, just spat it out and whimpered and fussed. Edward liked to twine around Alan's feet like a cat as he joggled and spooned and fretted over Frederick. It was all Alan could do not to go completely mad, but he held it together, though his grades slipped. His mother vibrated nervously, and his father's winds grew so unruly that two of the golems came around to the cave to make their slow, peevish complaints. Alan shoved a baby into each of their arms and seriously lost his shit upon them, screaming himself hoarse at them while hanging more diapers, more rags, more clothes on the line, tossing his unfinished homework in their faces. But on the thirtieth day, his mother went into labor again -- a labor so frenzied that it dislodged a stalactite and sent it crashing and chundering to the cave floor in a fractious shivering of flinders. Alan took a chip in the neck and it opened up a small cut that nevertheless bled copiously and ruined, *ruined* his favorite T-shirt, with Snoopy sitting atop his doghouse in an aviator's helmet, firing an imaginary machine gun at the cursed Red Baron. That was nearly the final straw for Alan, but he held fast and waited for the labor to pass and finally unlatched the door and extracted little George, a peanut of a child, a lima-bean infant, curled and fetal and eerily quiet. He set the little half-baby down by the exhaust hose, where he'd put shriveled Frederick in a hopeless hope that the baby would suck, would ingest, finally. And ingest Frederick did. His dry and desiccated jaw swung open like a snake's, unhinged and spread wide, and he *swallowed* little George, ate him up in three convulsive swallows, the new baby making Frederick's belly swell like a balloon. Alan swallowed panic, seized Frederick by the heels, and shook him upside down. "Spit him out," Alan cried, "Spat him free!" But Frederick kept his lips stubbornly together, and Alan tired of the terrible business and set the boy with the newest brother within down on a pile of hay he'd brought in to soak up some of Edward's continuous excretions. Alan put his hands over his face and sobbed, because he'd failed his responsibilities as eldest of their family and there was no one he could tell his woes to. The sound of baby giggles stopped his crying. Edward had belly-crawled to Frederick's side and he was eating *him*, jaw unhinged and gorge working. He was up to Frederick's little bottom, dehydrated to a leathery baby-jerky, and then he was past, swallowing the arms and the chin and the *head*, the giggling, smiling head, the laughing head that had done nothing but whine and fuss since Alan had cleared it of its volume of detergenty water, fresh from their mother's belly. And then Frederick was gone. Horrified, Alan rushed over and picked up Edward -- now as heavy as a cannonball -- and pried his mouth open, staring down his gullet, staring down into *another mouth*, Frederick's mouth, which gaped open, revealing a *third* mouth, George's. The smallest mouth twisted and opened, then shut. Edward squirmed furiously and Alan nearly fumbled him. He set the baby down in the straw and watched him crawl across to their mother, where he sucked hungrily. Automatically, Alan gathered up an armload of rags and made ready to wipe up the stream that Edward would soon be ejecting. But no stream came. The baby fed and fed, and let out a deep burp in three-part harmony, spat up a little, and drank some more. Somehow, Frederick and George were in there feeding, too. Alan waited patiently for Edward to finish feeding, then put him over his shoulder and joggled him until he burped up, then bedded him down in his little rough-hewn crib -- the crib that the golems had carved for Alan when he was born -- cleaned the cave, and cried again, leaned up against their mother. # Frederick huddled in on himself, half behind Edward on the porch, habitually phobic of open spaces. Alan took his hand and then embraced him. He smelled of Edward's clammy guts and of sweat. "Are you two hungry?" Alan asked. Edward grimaced. "Of course we're hungry, but without George there's nothing we can do about it, is there?" Alan shook his head. "How long has he been gone?" "Three weeks," Edward whispered. "I'm so hungry, Alan." "How did it happen?" Frederick wobbled on his feet, then leaned heavily on Edward. "I need to sit down," he said. Alan fumbled for his keys and let them into the house, where they settled into the corners of his old overstuffed horsehide sofa. He dialed up the wall sconces to a dim, homey lighting, solicitous of Frederick's sensitive eyes. He took an Apollo 8 Jim Beam decanter full of stunning Irish whiskey off the sideboard and poured himself a finger of it, not offering any to his brothers. "Now, how did it happen?" "He wanted to speak to Dad," Frederick said. "He climbed out of me and wandered down through the tunnels into the spring pool. The goblin told us that he took off his clothes and waded in and started whispering." Like most of the boys, George had believed that their father was most aware in his very middle, where he could direct the echoes of the water's rippling, shape them into words and phrases in the hollow of the great cavern. "So the goblin saw it happen?" "No," Frederick said, and Edward began to cry again. "No. George asked him for some privacy, and so he went a little way up the tunnel. He waited and waited, but George didn't come back. He called out, but George didn't answer. When he went to look for him, he was gone. His clothes were gone. All that he could find was this." He scrabbled to fit his chubby hand into his jacket's pocket, then fished out a little black pebble. Alan took it and saw that it wasn't a pebble, it was a rotted-out and dried-up fingertip, pierced with unbent paperclip wire. "It's Dave's, isn't it?" Edward said. "I think so," Alan said. Dave used to spend hours wiring his dropped-off parts back onto his body, gluing his teeth back into his head. "Jesus." "We're going to die, aren't we?" Frederick said. "We're going to starve to death." Edward held his pudgy hands one on top of the other in his lap and began to rock back and forth. "We'll be okay," he lied. "Did anyone see Dave?" Alan asked. "No," Frederick said. "We asked the golems, we asked Dad, we asked the goblin, but no one saw him. No one's seen him for years." Alan thought for a moment about how to ask his next question. "Did you look in the pool? On the bottom?" "*He's not there!*" Edward said. "We looked there. We looked all around Dad. We looked in town. Alan, they're both gone." Alan felt a sear of acid jet up esophagus. "I don't know what to do," he said. "I don't know where to look. Frederick, can't you, I don't know, *stuff* yourself with something? So you can eat?" "We tried," Edward said. "We tried rags and sawdust and clay and bread and they didn't work. I thought that maybe we could get a *child* and put him inside, maybe, but God, Albert, I don't want to do that, it's the kind of thing Dan would do." Alan stared at the softly glowing wood floors, reflecting highlights from the soft lighting. He rubbed his stocking toes over the waxy finish and felt its shine. "Don't do that, okay?" he said. "I'll think of something. Let me sleep on it. Do you want to sleep here? I can make up the sofa." "Thanks, big brother," Edward said. "Thanks." # Alan walked past his study, past the tableau of laptop and desk and chair, felt the pull of the story, and kept going, pulling his housecoat tighter around himself. The summer morning was already hotting up, and the air in the house had a sticky, dewy feel. He found Edward sitting on the sofa, with the sheets and pillowcases folded neatly next to him. "I set out a couple of towels for you in the second-floor bathroom and found an extra toothbrush," Alan said. "If you want them." "Thanks," Edward said, echoing in his empty chest. The thick rolls of his face were contorted into a caricature of sorrow. "Where's Frederick?" Alan asked. "Gone!" Edward said, and broke into spasms of sobbing. "He's gone he's gone he's gone, I woke up and he was gone." Alan shifted the folded linens to the floor and sat next to Edward. "What happened?" "You *know* what happened, Alan," Edward said. "You know as well as I do! Dave took him in the night. He followed us here and he came in the night and stole him away." "You don't know that," Alan said, softly stroking Edward's greasy fringe of hair. "He could have wandered out for a walk or something." "Of course I know it!" Edward yelled, his voice booming in the hollow of his great chest. "Look!" He handed Alan a small, desiccated lump, like a black bean pierced with a paperclip wire. "You showed me this yesterday --" Alan said. "It's from a *different finger*!" Edward said, and he buried his face in Alan's shoulder, sobbing uncontrollably. "Have you looked for him?" Alan asked. "I've been waiting for you to get up. I don't want to go out alone." "We'll look together," Alan said. He got a pair of shorts and a T-shirt, shoved his feet into Birkenstocks, and led Edward out the door. The previous night's humidity had thickened to a gray cloudy soup, swift thunderheads coming in from all sides. The foot traffic was reduced to sparse, fast-moving umbrellas, people rushing for shelter before the deluge. Ozone crackled in the air and thunder roiled seemingly up from the ground, deep and sickening. They started with a circuit of the house, looking for footprints, body parts. He found a shred of torn gray thrift-store shirt, caught on a rose bramble near the front of his walk. It smelled of the homey warmth of Edward's innards, and had a few of Frederick's short, curly hairs stuck to it. Alan showed it to Edward, then folded it into the change pocket of his wallet. They walked the length of the sidewalk, crossed Wales, and began to slowly cross the little park. Edward circumnavigated the little cement wading pool, tracing the political runes left behind by the Market's cheerful anarchist taggers, painfully bent almost double at his enormous waist. "What are we looking for, Alan?" "Footprints. Finger bones. Clues." Edward puffed back to the bench and sat down, tears streaming down his face. "I'm so *hungry*," he said. Alan, crawling around the torn sod left when someone had dragged one of the picnic tables, contained his frustration. "If we can find Daniel, we can get Frederick and George back, okay?" "All right," Edward snuffled. The next time Alan looked up, Edward had taken off his scuffed shoes and grimy-gray socks, rolled up the cuffs of his tent-sized pants, and was wading through the little pool, piggy eyes cast downward. "Good idea," Alan called, and turned to the sandbox. A moment later, there was a booming yelp, almost lost in the roll of thunder, and when Alan turned about, Edward was gone. Alan kicked off his Birks and splashed up to the hems of his shorts in the wading pool. In the pool's center, the round fountainhead was a twisted wreck, the concrete crumbled and the dry steel and brass fixtures contorted and ruptured. They had long streaks of abraded skin, torn shirt, and blood on them, leading down into the guts of the fountain. Cautiously, Alan leaned over, looking well down the dark tunnel that had been scraped out of the concrete centerpiece. The thin gray light showed him the rough walls, chipped out with some kind of sharp tool. "Edward?" he called. His voice did not echo or bounce back to him. Tentatively, he reached down the tunnel, bending at the waist over the rough lip of the former fountain. Deep he reached and reached and reached, and as his fingertips hit loose dirt, he leaned farther in and groped blindly, digging his hands into the plug of soil that had been shoveled into the tunnel's bend a few feet below the surface. He straightened up and climbed in, sinking to the waist, and tried to kick the dirt out of the way, but it wouldn't give -- the tunnel had caved in behind the plug of earth. He clambered out, feeling the first fat drops of rain on his bare forearms and the crown of his head. *A shovel*. There was one in the little coach house in the back of his place, behind the collapsed boxes and the bicycle pump. As he ran across the street, he saw Krishna, sitting on his porch, watching him with a hint of a smile. "Lost another one, huh?" he said. He looked as if he'd been awake all night, now hovering on the brink of sleepiness and wiredness. A roll of thunder crashed and a sheet of rain hurtled out of the sky. Alan never thought of himself as a violent person. Even when he'd had to throw the occasional troublemaker out of his shops, he'd done so with an almost cordial force. Now, though, he trembled and yearned to take Krishna by the throat and ram his head, face first, into the column that held up his front porch, again and again, until his fingers were slick with the blood from Krishna's shattered nose. Alan hurried past him, his shoulders and fists clenched. Krishna chuckled nastily and Alan thought he knew who got the job of sawing off Mimi's wings when they grew too long, and thought, too, that Krishna must relish the task. "Where you going?" Krishna called. Alan fumbled with his keyring, desperate to get in and get the keys to the coach house and to fetch the shovel before the new tunnels under the park collapsed. "You're too late, you know," Krishna continued. "You might as well give up. Too late, too late!" Alan whirled and shrieked, a wordless, contorted war cry, a sound from his bestial guts. As his eyes swam back into focus, he saw Mimi standing beside Krishna, barefoot in a faded housecoat. Her eyes were very wide, and as she turned away from him, he saw that her stubby wings were splayed as wide as they'd go, forming a tent in her robe that pulled it up above her knees. Alan bit down and clamped his lips together and found his keys. He tracked mud over the polished floors and the ancient, threadbare Persian rugs as he ran to the kitchen, snatching the coach-house keys from their hook over the sink. He ran back across the street to the little park, clutching his shovel. He jammed his head into the centerpiece and tried to see which way the tunnel had curved off when it turned, but it was too dark, the dirt too loose. He pulled himself out and took the shovel in his hands like a spear and stabbed it into the concrete bed of the wading pool, listening for a hollowness in the returning sound like a man thudding for a stud under drywall. The white noise of the rain was too high, the rolling thunder too steady. His chest heaved and his tears mingled with the rain streaking down his face as he stabbed, again and again, at the pool's bottom. His mind was scrambled and saturated, his vision clouded with the humid mist rising off his exertion-heated chest and the raindrops caught in his eyelashes. He splashed out of the wading pool and took the shovel to the sod of the park's lawn, picking an arbitrary spot and digging inefficiently and hysterically, the bent shovel tip twisting with each stroke. Suddenly strong hands were on his shoulders, another set prizing the shovel from his hands. He looked up and blinked his eyes clear, looking into the face of two young Asian police officers. They were bulky from the Kevlar vests they wore under their rain slickers, with kind and exasperated expressions on their faces. "Sir," the one holding the shovel said, "what are you doing?" Alan breathed himself into a semblance of composure. "I..." he started, then trailed off. Krishna was watching from his porch, grinning ferociously, holding a cordless phone. The creature that had howled at Krishna before scrambled for purchase in Alan's chest. Alan averted his eyes from Krishna's shit-eating, 911-calling grin. He focused on the cap of the officer in front of him, shrouded in a clear plastic shower cap to keep its crown dry. "I'm sorry," he said. "It was a -- a dog. A stray, or maybe a runaway. A little Scottie dog, it jumped down the center of the fountain there and disappeared. I looked down and thought it had found a tunnel that caved in on it." The officer peered at him from under the brim of his hat, dubiousness writ plain on his young, good-looking face. "A tunnel?" Alan wiped the rain from his eyes, tried to regain his composure, tried to find his charm. It wasn't to be found. Instead, every time he reached for something witty and calming, he saw the streaks of blood and torn clothing, dark on the loose soil of the fountain's center, and no sooner had he dispelled those images than they were replaced with Krishna, sneering, saying, "Lost another one, huh?" He trembled and swallowed a sob. "I think I need to sit down," he said, as calmly as he could, and he sank slowly to his knees. The hands on his biceps let him descend. "Sir, do you live nearby?" one of the cops asked, close in to his ear. He nodded into his hands, which he'd brought up to cover his face. "Across the street," he said. They helped him to his feet and supported him as he tottered, weak and heaving, to his porch. Krishna was gone once they got there. The cops helped him shuck his drenched shoes and socks and put him down on the overstuffed horsehide sofa. Alan recovered himself with an effort of will and gave them his ID. "I'm sorry, you must think I'm an absolute lunatic," he said, shivering in his wet clothes. "Sir," the cop who'd taken the shovel from him said, "we see absolute lunatics every day. I think you're just a little upset. We all go a little nuts from time to time." "Yeah," Alan said. "Yeah. A little nuts. I had a long night last night. Family problems." The cops shifted their weight, showering the floor with raindrops that beaded on the finish. "Are you going to be all right on your own? We can call someone if you'd like." "No," Alan said, pasting on a weak smile. "No, that's all right. I'll be fine. I'm going to change into some dry clothes and clean up and, oh, I don't know, get some sleep. I think I could use some sleep." "That sounds like an excellent idea," the cop who'd taken the shovel said. He looked around at the bookcases. "You've read all of these?" he asked. "Naw," Alan said, falling into the rote response from his proprietorship of the bookstore. "What's the point of a bunch of books you've already read?" The joke reminded him of better times and he smiled a genuine smile. # Though the stinging hot shower revived him somewhat, he kept quickening into panic at the thought of David creeping into his house in the night, stumping in on desiccated black child-legs, snaggled rictus under mummified lips. He spooked at imagined noises and thudding rain and the dry creaking of the old house as he toweled off and dressed. There was no phone in the mountain, no way to speak to his remaining brothers, the golems, his parents. He balled his fists and stood in the center of his bedroom, shaking with impotent worry. David. None of them had liked David very much. Billy, the fortune-teller, had been born with a quiet wisdom, an eerie solemnity that had made him easy for the young Alan to care for. Carlos, the island, had crawled out of their mother's womb and pulled himself to the cave mouth and up the face of their father, lying there for ten years, accreting until he was ready to push off on his own. But Daniel, Daniel had been a hateful child from the day he was born. He was colicky, and his screams echoed through their father's caverns. He screamed from the moment he emerged and Alan tipped him over and toweled him gently dry and he didn't stop for an entire year. Alan stopped being able to tell day from night, lost track of the weeks and months. He'd developed a taste for food, real people food, that he'd buy in town at the Loblaws Superstore, but he couldn't leave Davey alone in the cave, and he certainly couldn't carry the howling, shitting, puking, pissing, filthy baby into town with him. So they ate what the golems brought them: sweet grasses, soft berries, frozen winter fruit dug from the base of the orchards in town, blind winter fish from the streams. They drank snowmelt and ate pine cones and the baby Davey cried and cried until Alan couldn't remember what it was to live in a world of words and conversations and thought and reflection. No one knew what to do about Davey. Their father blew warm winds scented with coal dust and loam to calm him, but still Davey cried. Their mother rocked him on her gentlest spin cycle, but still Davey cried. Alan walked down the slope to Carl's landmass, growing with the dust and rains and snow, and set him down on the soft grass and earth there, but still Davey cried, and Carlos inched farther and farther toward the St. Lawrence seaway, sluggishly making his way out to the ocean and as far away from the baby as possible. After his first birthday, David started taking breaks from his screaming, learning to crawl and then totter, becoming a holy terror. If Alan left his schoolbooks within reach of the boy, they'd be reduced to shreds of damp mulch in minutes. By the time he was two, his head was exactly at Alan's crotch height and he'd greet his brother on his return from school by charging at full speed into Alan's nuts, propelled at unlikely speed on his thin legs. At three, he took to butchering animals -- the rabbits that little Bill kept in stacked hutches outside of the cave mouth went first. Billy rushed home from his grade-two class, eyes crazed with precognition, and found David methodically wringing the animals' necks and then slicing them open with a bit of sharpened chert. Billy had showed David how to knap flint and chert the week before, after seeing a filmstrip about it in class. He kicked the makeshift knife out of Davey's hand, breaking his thumb with the toe of the hard leather shoes the golems had made for him, and left Davey to bawl in the cave while Billy dignified his pets' corpses, putting their entrails back inside their bodies and wrapping them in shrouds made from old diapers. Alan helped him bury them, and then found Davey and taped his thumb to his hand and spanked him until his arm was too tired to deal out one more wallop. Alan made his way down to the living room, the floor streaked with mud and water. He went into the kitchen and filled a bucket with soapy water and gathered up an armload of rags from the rag bag. Methodically, he cleaned away the mud. He turned his sopping shoes on end over the grate and dialed the thermostat higher. He made himself a bowl of granola and a cup of coffee and sat down at his old wooden kitchen table and ate mindlessly, then washed the dishes and put them in the drying rack. He'd have to go speak to Krishna. # Natalie answered the door in a pretty sun dress, combat boots, and a baseball hat. She eyed him warily. "I'd like to speak to Krishna," Alan said from under the hood of his poncho. There was an awkward silence. Finally, Natalie said, "He's not home." "I don't believe you," Alan said. "And it's urgent, and I'm not in the mood to play around. Can you get Krishna for me, Natalie?" "I told you," she said, not meeting his eyes, "he's not here." "That's enough," Alan said in his boss voice, his more-in-anger-than-in-sorrow voice. "Get him, Natalie. You don't need to be in the middle of this -- it's not right for him to ask you to. Get him." Natalie closed the door and he heard the deadbolt turn. *Is she going to fetch him, or is she locking me out?* He was on the verge of hammering the buzzer again, but he got his answer. Krishna opened the door and stepped onto the dripping porch, bulling Alan out with his chest. He smiled grimly at Alan and made a well-go-on gesture. "What did you see?" Alan said, his voice tight but under control. "Saw you and that fat guy," Krishna said. "Saw you rooting around in the park. Saw him disappear down the fountain." "He's my brother," Alan said. "So what, he ain't heavy? He's fat, but I expect there's a reason for that. I've seen your kind before, Adam. I don't like you, and I don't owe you any favors." He turned and reached for the screen door. "No," Alan said, taking him by the wrist, squeezing harder than was necessary. "Not yet. You said, 'Lost another one.' What other one, Krishna? What else did you see?" Krishna gnawed on his neatly trimmed soul patch. "Let go of me, Andrew," he said, almost too softly to be heard over the rain. "Tell me what you saw," Alan said. "Tell me, and I'll let you go." His other hand balled into a fist. "Goddammit, *tell me*!" Alan yelled, and twisted Krishna's arm behind his back. "I called the cops," Krishna said. "I called them again and they're on their way. Let me go, freak show." "I don't like you, either, Krishna," Alan said, twisting the arm higher. He let go suddenly, then stumbled back as Krishna scraped the heel of his motorcycle boot down his shin and hammered it into the top of his foot. He dropped to one knee and grabbed his foot while Krishna slipped into the house and shot the lock. Then he hobbled home as quickly as he could. He tried to pace off the ache in his foot, but the throbbing got worse, so he made himself a drippy ice pack and sat on the sofa in the immaculate living room and rocked back and forth, holding the ice to his bare foot. # At five, Davey graduated from torturing animals to beating up on smaller children. Alan took him down to the school on the day after Labor Day, to sign him up for kindergarten. He was wearing his stiff new blue jeans and sneakers, his knapsack stuffed with fresh binders and pencils. Finding out about these things had been Alan's first experience with the wide world, a kindergartner sizing up his surroundings at speed so that he could try to fit in. David was a cute kid and had the benefit of Alan's experience. He had a foxy little face and shaggy blond hair, all clever smiles and awkward winks, and for all that he was still a monster. They came and got Alan twenty minutes after classes started, when his new home-room teacher was still briefing them on the rules and regulations for junior high students. He was painfully aware of all the eyes on his back as he followed the office lady out of the portable and into the old school building where the kindergarten and the administration was housed. "We need to reach your parents," the office lady said, once they were alone in the empty hallways of the old building. "You can't," Alan said. "They don't have a phone." "Then we can drive out to see them," the office lady said. She smelled of artificial floral scent and Ivory soap, like the female hygiene aisle at the drugstore. "Mom's still real sick," Alan said, sticking to his traditional story. "Your father, then," the office lady said. He'd had variations on this conversation with every office lady at the school, and he knew he'd win it in the end. Meantime, what did they want? "My dad's, you know, gone," he said. "Since I was a little kid." That line always got the office ladies, "since I was a little kid," made them want to write it down for their family Christmas newsletters. The office lady smiled a powdery smile and put her hand on his shoulder. "All right, Alan, come with me." Davey was sitting on the dusty sofa in the vice principal's office. He punched the sofa cushion rhythmically. "Alan," he said when the office lady led him in. "Hi, Dave," Alan said. "What's going on?" "They're stupid here. I hate them." He gave the sofa a particularly vicious punch. "I'll get Mr Davenport," the office lady said, and closed the door behind her. "What did you do?" Alan asked. "She wouldn't let me play!" David said, glaring at him. "Who wouldn't?" "A girl! She had the blocks and I wanted to play with them and she wouldn't let me!" "What did you hit her with?" Alan asked, dreading the answer. "A block," David said, suddenly and murderously cheerful. "I hit her in the eye!" Alan groaned. The door opened and the vice principal, Mr. Davenport, came in and sat behind his desk. He was the punishment man, the one that no one wanted to be sent in to see. "Hello, Alan," he said gravely. Alan hadn't ever been personally called before Mr. Davenport, but Billy got into some spot of precognitive trouble from time to time, rushing out of class to stop some disaster at home or somewhere else in the school. Mr. Davenport knew that Alan was a straight arrow, not someone he'd ever need to personally take an interest in. He crouched down next to Darren, hitching up his slacks. "You must be David," he said, ducking down low to meet Davey's downcast gaze. Davey punched the sofa. "I'm Mr. Davenport," he said, and extended a hand with a big class ring on it and a smaller wedding band. Davey kicked him in the nose, and the vice principal toppled over backward, whacking his head on the sharp corner of his desk. He tumbled over onto his side and clutched his head. "Mother*fucker*!" he gasped, and Davey giggled maniacally. Alan grabbed Davey's wrist and bent his arm behind his back, shoving him across his knee. He swatted the little boy on the ass as hard as he could, three times. "Don't you ever --" Alan began. The vice principal sat up, still clutching his head. "That's enough!" he said, catching Alan's arm. "Sorry," Alan said. "And David's sorry, too, right?" He glared at David. "You're a stupid mother*fucker*!" David said, and squirmed off of Alan's lap. The vice principal's lips tightened. "Alan," he said quietly, "take your brother into the hallway. I am going to write a note that your mother will have to sign before David comes back to school, after his two-week suspension." David glared at them each in turn. "I'm not coming back to this mother*fucker* place!" he said. He didn't. # The rain let up by afternoon, leaving a crystalline, fresh-mown air hanging over the Market. Andrew sat in his office by his laptop and watched the sun come out. He needed to find Ed, needed to find Frank, needed to find Grant, but he was out of practice when it came to the ways of the mountain and its sons. Whenever he tried to imagine a thing to do next, his mind spun and the worldless howling thing inside him stirred. The more he tried to remember what it was like to be a son of the mountain, the more he felt something he'd worked very hard for, his delicate normalcy, slipping away. So he put his soaked clothes in the dryer, clamped his laptop under his arm, and went out. He moped around the park and the fountain, but the stroller moms whose tots were splashing in the wading pool gave him sufficient dirty looks that he walked up to the Greek's, took a table on the patio, and ordered a murderously strong cup of coffee. He opened up the screen and rotated around the little café table until the screen was in the shade and his wireless card was aligned for best reception from the yagi antenna poking out of his back window. He opened up a browser and hit MapQuest, then brought up a street-detailed map of the Market. He pasted it into his CAD app and started to mark it up, noting all the different approaches to his house that Davey might take the next time he came. The maps soothed him, made him feel like a part of the known world. Augusta Avenue and Oxford were both out; even after midnight, when the stores were all shuttered, there was far too much foot traffic for Davey to pass by unnoticed. But the alleys that mazed the back ways were ideal. Some were fenced off, some were too narrow to pass, but most of them -- he'd tried to navigate them by bicycle once and found himself utterly lost. He'd had to turn around slowly until he spotted the CN Tower and use it to get his bearings. He poked at the map, sipping the coffee, then ordering another from the Greek's son, who hadn't yet figured out that he was a regular and so sneered at his laptop with undisguised contempt. "Computers, huh?" he said. "Doesn't anyone just read a book anymore?" "I used to own a bookstore," Alan said, then held up a finger and moused over to his photo album and brought up the thumbnails of his old bookstore. "See?" The Greek's son, thirty with a paunch and sweat-rings under the pits of his white "The Greek's" T-shirt, sat down and looked at the photos. "I remember that place, on Harbord Street, right?" Alan smiled. "Yup. We lost the store when they blew up the abortion clinic next door," he said. "Insurance paid out, but I wasn't ready to start over with another bookstore." The Greek's son shook his head. "Another coffee, right?" "Right," Alan said. Alan went back to the map, realigning the laptop for optimal reception again. "You got a wireless card in that?" a young guy at the next table asked. He was dressed in Kensington Market crusty-punk chic, tatts and facial piercings, filth-gray bunchoffuckinggoofs tee, cutoffs, and sweaty high boots draped with chains. "Yeah," Alan said. He sighed and closed the map window. He wasn't getting anywhere, anyway. "And you get service here? Where's your access point?" Crusty-punk or no, he sounded as nerdy as any of the Web-heads you'd find shopping for bargains on CD blanks on College Street. "Three blocks that way," Alan said, pointing. "Hanging off my house. The network name is 'walesave.'" "Shit, that's you?" the kid said. "Goddammit, you're clobbering our access points!" "What access point?" "Access *points*. ParasiteNet." He indicated a peeling sticker on the lapel of his cut-down leather jacket showing a skull with crossed radio towers underneath it. "I'm trying to get a mesh-net running though all of the Market, and you're hammering me. Jesus, I was ready to rat you out to the radio cops at the Canadian Radio and Television Commission. Dude, you've got to turn down the freaking *gain* on those things." "What's a mesh-net?" The kid moved his beer over to Alan's table and sat down. "Okay, so pretend that your laptop is the access point. It radiates more or less equally in all directions, depending on your antenna characteristics and leaving out the RF shadows that microwaves and stucco and cordless phones generate." He arranged the coffee cup and the beer at equal distances from the laptop, then moved them around to demonstrate the coverage area. "Right, so what happens if I'm out of range, over *here* --" he put his beer back on his own table -- "and you want to reach me? Well, you could just turn up the gain on your access point, either by increasing the power so that it radiates farther in all directions, or by focusing the transmissions so they travel farther in a line of sight." "Right," Alan said, sipping his coffee. "Right. So both of those approaches suck. If you turn up the power, you radiate over everyone else's signal, so if I've got an access point *here*" -- he held his fist between their tables -- "no one can hear it because you're drowning it out. It's like you're shouting so loud that no one else can carry on a conversation." "So why don't you just use my network? I want to be able to get online anywhere in the Market, but that means that anyone can, right?" The crusty-punk waved his hand dismissively. "Sure, whatever. But what happens if your network gets shut down? Or if you decide to start eavesdropping on other people? Or if someone wants to get to the printer in her living room? It's no good." "So, what, you want me to switch to focused antennae?" "That's no good. If you used a focused signal, you're going to have to be perfectly aligned if you're going to talk back to your base, so unless you want to provide a connection to one tiny pinpoint somewhere a couple kilometers away, it won't do you any good." "There's no solution, then? I should just give up?" The crusty-punk held up his hands. "Hell, no! There's just no *centralized* solution. You can't be Superman, blanketing the whole world with wireless using your almighty antennaprick, but so what? That's what mesh networks are for. Check it out." He arranged the beer and the laptop and the coffee cup so that they were strung out along a straight line. "Okay, you're the laptop and I'm the coffee cup. We both have a radio and we want to talk to each other. "We *could* turn up the gain on our radios so that they can shout loud enough to be heard at this distance, but that would drown out this guy here." He gestured at the now-empty beer. "We *could* use a focused antenna, but if I move a little bit off the beam" -- he nudged the coffee cup to one side -- "we're dead. But there's a third solution." "We ask the beer to pass messages around?" "Fucking right we do! That's the mesh part. Every station on the network gets *two* radios -- one for talking in one direction, the other for relaying in the other direction. The more stations you add, the lower the power on each radio -- and the more pathways you get to carry your data." Alan shook his head. "It's a fuckin' mind-blower, isn't it?" "Sure," Alan said. "Sure. But does it work? Don't all those hops between point *a* and point *b* slow down the connection?" "A little, sure. Not so's you'd notice. They don't have to go that far -- the farthest any of these signals has to travel is 151 Front Street." "What's at 151 Front?" "TorIx -- the main network interchange for the whole city! We stick an antenna out a window there and downlink it into the cage where UUNet and PSINet meet -- voila, instant 11-megabit city-wide freenet!" "Where do you get the money for that?" "Who said anything about money? How much do you think UUNet and PSI charge each other to exchange traffic with one another? Who benefits when UUNet and PSI cross-connect? Is UUNet the beneficiary of PSI's traffic, or vice versa? Internet access only costs money at the *edge* -- and with a mesh-net, there is no edge anymore. It's penetration at the center, just like the Devo song." "I'm Adrian," Alan said. "I'm Kurt," the crusty-punk said. "Buy me a beer, Adrian?" "It'd be my pleasure," Alan said. # Kurt lived in the back of a papered-over storefront on Oxford. The front two-thirds were a maze of peeling, stickered-over stamped-metal shelving units piled high with junk tech: ancient shrink-wrapped software, stacked up low-capacity hard drives, cables and tapes and removable media. Alan tried to imagine making sense of it all, flowing it into The Inventory, and felt something like vertigo. In a small hollow carved out of the back, Kurt had arranged a cluttered desk, a scuffed twin bed and a rack of milk crates filled with t-shirts and underwear. Alan picked his way delicately through the store and found himself a seat on an upturned milk crate. Kurt sat on the bed and grinned expectantly. "So?" he said. "So what?" Alan said. "So what is *this*! Isn't it great?" "Well, you sure have a lot of *stuff,* I'll give you that," Alan said. "It's all dumpstered," Kurt said casually. "Oh, you dive?" Alan said. "I used to dive." It was mostly true. Alan had always been a picker, always on the lookout for bargoons, even if they were sticking out of someone's trash bin. Sometimes *especially* if they were sticking out of someone's trash bin -- seeing what normal people threw away gave him a rare glimpse into their lives. Kurt walked over to the nearest shelving unit and grabbed a PC mini-tower with the lid off. "But did you ever do this?" He stuck the machine under Alan's nose and swung the gooseneck desk lamp over it. It was a white-box PC, generic commodity hardware, with a couple of network cards. "What's that?" "It's a junk access point! I made it out of trash! The only thing I bought were the network cards -- two wireless, one Ethernet. It's running a FreeBSD distribution off a CD, so the OS can never get corrupted. It's got lots of sweet stuff in the distro, and all you need to do is plug it in, point the antennae in opposite directions, and you're up. It does its own power management, it automagically peers with other access points if it can find 'em, and it does its own dynamic channel selection to avoid stepping on other access points." Alan turned his head this way and that, making admiring noises. "You made this, huh?" "For about eighty bucks. It's my fifteenth box. Eventually, I wanna have a couple hundred of these." "Ambitious," Alan said, handing the box back. "How do you pay for the parts you have to buy? Do you have a grant?" "A grant? Shit, no! I've got a bunch of street kids who come in and take digital pix of the stuff I have no use for, research them online, and post them to eBay. I split the take with them. Brings in a couple grand a week, and I'm keeping about fifty street kids fed besides. I go diving three times a week out in Concord and Oakville and Richmond Hill, anywhere I can find an industrial park. If I had room, I'd recruit fifty more kids -- I'm bringing it in faster than they can sell it." "Why don't you just do less diving?" "Are you kidding me? It's all I can do not to go out every night! You wouldn't believe the stuff I find -- all I can think about is all the stuff I'm missing out on. Some days I wish that my kids were less honest; if they ripped off some stuff, I'd have room for a lot more." Alan laughed. Worry for Edward and Frederick and George nagged at him, impotent anxiety, but this was just so fascinating. Fascinating and distracting, and, if not normal, at least not nearly so strange as he could be. He imagined the city gridded up with junk equipment, radiating Internet access from the lakeshore to the outer suburbs. The grandiosity took his breath away. "Look," Kurt said, spreading out a map of Kensington Market on the unmade bed. "I've got access points here, here, here, and here. Another eight or ten and I'll have the whole Market covered. Then I'm going to head north, cover the U of T campus, and push east towards Yonge Street. Bay Street and University Avenue are going to be tough -- how can I convince bankers to let me plug this by their windows?" "Kurt," Alan said, "I suspect that the journey to University Avenue is going to be a lot slower than you expect it to be." Kurt jutted his jaw out. "What's that supposed to mean?" "There's a lot of real estate between here and there. A lot of trees and high-rises, office towers and empty lots. You're going to have to knock on doors every couple hundred meters -- at best -- and convince them to let you install one of these boxes, made from garbage, and plug it in, to participate in what?" "Democratic communication!" Kurt said. "Ah, well, my guess is that most of the people who you'll need to convince won't really care much about that. Won't be able to make that abstract notion concrete." Kurt mumbled into his chest. Alan could see that he was fuming. "Just because you don't have the vision to appreciate this --" Alan held up his hand. "Stop right there. I never said anything of the sort. I think that this is big and exciting and looks like a lot of fun. I think that ringing doorbells and talking people into letting me nail an access point to their walls sounds like a *lot* of fun. Really, I'm not kidding. "But this is a journey, not a destination. The value you'll get out of this will be more in the doing than the having done. The having done's going to take decades, I'd guess. But the doing's going to be something." Alan's smile was so broad it ached. The idea had seized him. He was drunk on it. The buzzer sounded and Kurt got up to answer it. Alan craned his neck to see a pair of bearded neohippies in rasta hats. "Are you Kurt?" one asked. "Yeah, dude, I'm Kurt." "Marcel told us that we could make some money here? We're trying to raise bus fare to Burning Man? We could really use the work?" "Not today, but maybe tomorrow," Kurt said. "Come by around lunchtime." "You sure you can't use us today?" "Not today," Kurt said. "I'm busy today." "All right," the other said, and they slouched away. "Word of mouth," Kurt said, with a jingling shrug. "Kids just turn up, looking for work with the trash." "You think they'll come back tomorrow?" Alan was pretty good at evaluating kids and they hadn't looked very reliable. "Those two? Fifty-fifty chance. Tell you what, though: there's always enough kids and enough junk to go around." "But you need to make arrangements to get your access points mounted and powered. You've got to sort it out with people who own stores and houses." "You want to knock on doors?" Kurt said. "I think I would," Alan said. "I suspect it's a possibility. We can start with the shopkeepers, though." "I haven't had much luck with merchants," Kurt said, shrugging his shoulders. His chains jingled and a whiff of armpit wafted across the claustrophobic hollow. "Capitalist pigs." "I can't imagine why," Alan said. # "Wales Avenue, huh?" Kurt said. They were walking down Oxford Street, and Alan was seeing it with fresh eyes, casting his gaze upward, looking at the lines of sight from one building to another, mentally painting in radio-frequency shadows cast by the transformers on the light poles. "Just moved in on July first," Alan said. "Still getting settled in." "Which house?" "The blue one, with the big porch, on the corner." "Sure, I know it. I scored some great plumbing fixtures out of the dumpster there last winter." "You're welcome," Alan said. They turned at Spadina and picked their way around the tourist crowds shopping the Chinese importers' sidewalk displays of bamboo parasols and Hello Kitty slippers, past the fogged-up windows of the dim-sum restaurants and the smell of fresh pork buns. Alan bought a condensed milk and kiwi snow-cone from a sidewalk vendor and offered to treat Kurt, but he declined. "You never know about those places," Kurt said. "How clean is their ice, anyway? Where do they wash their utensils?" "You dig around in dumpsters for a living," Alan said. "Aren't you immune to germs?" Kurt turned at Baldwin, and Alan followed. "I don't eat garbage, I pick it," he said. He sounded angry. "Hey, sorry," Alan said. "Sorry. I didn't mean to imply --" "I know you didn't," Kurt said, stopping in front of a dry-goods store and spooning candied ginger into a baggie. He handed it to the age-hunched matron of the shop, who dropped it on her scale and dusted her hands on her black dress. Kurt handed her a two-dollar coin and took the bag back. "I'm just touchy, okay? My last girlfriend split because she couldn't get past it. No matter how much I showered, I was never clean enough for her." "Sorry," Alan said again. "I heard something weird about that blue house on the corner," Kurt said. "One of my kids told me this morning, he saw something last night when he was in the park." Alan pulled up short, nearly colliding with a trio of cute university girls in wife-beaters pushing bundle-buggies full of newspaper-wrapped fish and bags of soft, steaming bagels. They stepped around him, lugging their groceries over the curb and back onto the sidewalk, not breaking from their discussion. "What was it?" Kurt gave him a sideways look. "It's weird, okay? The kid who saw it is never all that reliable, and he likes to embellish." "Okay," Alan said. The crowd was pushing around them now, trying to get past. The dry-goods lady sucked her teeth in annoyance. "So this kid, he was smoking a joint in the park last night, really late, after the clubs shut down. He was alone, and he saw what he thought was a dog dragging a garbage bag down the steps of your house." "Yes?" "So he went over to take a look, and he saw that it was too big to be a garbage bag, and the dog, it looked sick, it moved wrong. He took another step closer and he must have triggered a motion sensor because the porch light switched on. He says..." "What?" "He's not very reliable. He says it wasn't a dog, he said it was like a dried-out mummy or something, and it had its teeth sunk into the neck of this big, fat, naked guy, and it was dragging the fat guy out into the street. When the light came on, though, it gave the fat guy's neck a hard shake, then let go and turned on this kid, walking toward him on stumpy little feet. He says it made a kind of growling noise and lifted up its hand like it was going to slap the kid, and the kid screamed and ran off. When he got to Dundas, he turned around and saw the fat guy get dragged into an alley between two of the stores on Augusta." "I see," Alan said. "It's stupid, I know," Kurt said. Natalie and Link rounded the corner, carrying slices of pizza from Pizzabilities, mounded high with eggplant and cauliflower and other toppings that were never intended for use in connection with pizza. They startled on seeing Alan and Kurt, then started to walk away. "Wait," Alan called. "Natalie, Link, wait." He smiled apologetically at Kurt. "My neighbors," he said. Natalie and Link had stopped and turned around. Alan and Kurt walked to them. "Natalie, Link, this is Kurt," he said. They shook hands all around. "I wanted to apologize," Alan said. "I didn't mean to put you between Krishna and me. It was very unfair." Natalie smiled warily. Link lit a cigarette with a great show of indifference. "It's all right," Natalie said. "No, it's not," Alan said. "I was distraught, but that's no excuse. We're going to be neighbors for a long time, and there's no sense in our not getting along." "Really, it's okay," Natalie said. "Yeah, fine," Link said. "Three of my brothers have gone missing," Alan said. "That's why I was so upset. One disappeared a couple of weeks ago, another last night, and one this morning. Krishna..." He thought for a moment. "He taunted me about it. I really wanted to find out what he saw." Kurt shook his head. "Your brother went missing last night?" "From my house." "So what the kid saw..." Alan turned to Natalie. "A friend of Kurt's was in the park last night. He says he saw my brother being carried off." Kurt shook his head. "Your brother?" "What do you mean, 'carried off'?" Natalie said. She folded her slice in half to keep the toppings from spilling. "Someone is stalking my brothers," Alan said. "Someone very strong and very cunning. Three are gone that I know about. There are others, but I could be next." "Stalking?" Natalie said. "My family is a little strange," Alan said. "I grew up in the north country, and things are different there. You've heard of blood feuds?" Natalie and Link exchanged a significant look. "I know it sounds ridiculous. You don't need to be involved. I just wanted to let you know why I acted so strangely last night." "We have to get back," Natalie said. "Nice to meet you, Kurt. I hope you find your brother, Andy." "Brothers," Alan said. "Brothers," Natalie said, and walked away briskly. # Alan was the oldest of the brothers, and that meant that he was the one who blazed all the new trails in the family. He met a girl in the seventh grade. Her name was Marci, and she had just transferred in from Scotland. Her father was a mining engineer, and she'd led a gypsy life that put her in stark contrast to the third-generation homebodies that made up most of the rest of their class. She had red hair and blue eyes and a way of holding her face in repose that made her look cunning at all times. No one understood her accent, but there was a wiry ferocity in her movement that warned off any kid who thought about teasing her about it. Alan liked to play in a marshy corner of the woods that bordered the playground after school, crawling around in the weeds, catching toads and letting them go again, spying on the crickets and the secret lives of the larvae that grubbed in the milkweed. He was hunkered down on his haunches one afternoon when Marci came crunching through the tall grass. He ducked down lower, then peered out from his hiding spot as she crouched down and he heard the unmistakable patter of urine as she peed in the rushes. His jaw dropped. He'd never seen a girl pee before, had no idea what the squatting business was all about. The wet ground sucked at his sneaker and he tipped back on his ass with a yelp. Marci straightened abruptly and crashed over to him, kicking him hard in the ribs when she reached him, leaving a muddy toeprint on his fall windbreaker. She wound up for another kick and he hollered something wordless and scurried back, smearing marsh mud across his jeans and jacket. "You pervert!" she said, pronouncing it Yuh peervurrt! "I am not!" he said, still scooting back. "Watching from the bushes!" she said. "I wasn't -- I was already here, and you -- I mean, what were *you* doing? I was just minding my own business and you came by, I just didn't want to be bothered, this is *my* place!" "You don't own it," she said, but she sounded slightly chastened. "Don't tell anyone I had a piss here, all right?" "I won't," he said. She sat down beside him, unmindful of the mud on her denim skirt. "Promise," she said. "It's so embarrassing." "I promise," he said. "Swear," she said, and poked him in the ribs with a bony finger. He clutched his hands to his ribs. "Look," he said, "I swear. I'm good at secrets." Her eyes narrowed slightly. "Oh, aye? And I suppose you've lots of secrets, then?" He said nothing, and worked at keeping the smile off the corners of his mouth. She poked him in the ribs, then got him in the stomach as he moved to protect his chest. "Secrets, huh?" He shook his head and clamped his lips shut. She jabbed a flurry of pokes and prods at him while he scooted back on his butt, then dug her clawed hands into his tummy and tickled him viciously. He giggled, then laughed, then started to hiccup uncontrollably. He shoved her away roughly and got up on his knees, gagging. "Oh, I like you," she said, "just look at that. A wee tickle and you're ready to toss your lunch." She tenderly stroked his hair until the hiccups subsided, then clawed at his belly again, sending him rolling through the mud. Once he'd struggled to his feet, he looked at her, panting. "Why are you doing this?" "You're not serious! It's the most fun I've had since we moved to this terrible place." "You're a sadist!" He'd learned the word from a book he'd bought from the ten-cent pile out front of the used bookstore. It had a clipped-out recipe for liver cutlets between the pages and lots of squishy grown-up sex things that seemed improbable if not laughable. He'd looked "sadist" up in the class dictionary. "Aye," she said. "I'm that." She made claws of her hands and advanced on him slowly. He giggled uncontrollably as he backed away from her. "C'mere, you, you've more torture comin' to ye before I'm satisfied that you can keep a secret." He held his arms before him like a movie zombie and walked toward her. "Yes, mathter," he said in a monotone. Just as he was about to reach her, he dodged to one side, then took off. She chased him, laughing, halfway back to the mountain, then cried off. He stopped a hundred yards up the road from her, she doubled over with her hands planted on her thighs, face red, chest heaving. "You go on, then," she called. "But it's more torture for you at school tomorrow, and don't you forget it!" "Only if you catch me!" he called back. "Oh, I'll catch you, have no fear." # She caught him at lunch. He was sitting in a corner of the schoolyard, eating from a paper sack of mushrooms and dried rabbit and keeping an eye on Edward-Frederick-George as he played tag with the other kindergartners. She snuck up behind him and dropped a handful of gravel down the gap of his pants and into his underpants. He sprang to his feet, sending gravel rattling out the cuffs of his jeans. "Hey!" he said, and she popped something into his mouth. It was wet and warm from her hand and it squirmed. He spat it out and it landed on the schoolyard with a soft splat. It was an earthworm, thick with loamy soil. "You!" he said, casting about for a curse of sufficient vehemence. "You!" She hopped from foot to foot in front of him, clearly delighted with this reaction. He reached out for her and she danced back. He took off after her and they were chasing around the yard, around hopscotches and tag games and sand castles and out to the marshy woods. She skidded through the puddles and he leapt over them. She ducked under a branch and he caught her by the hood of her windbreaker. Without hesitating, she flung her arms in the air and slithered out of the windbreaker, down to a yellow T-shirt that rode up her back, exposing her pale freckles and the knobs of her spine, the fingers of her ribs. She took off again and he balled the windbreaker up in his fist and took off after her. She stepped behind a bushy pine, and when he rounded the corner she was waiting for him, her hands clawed, digging at his tummy, leaving him giggling. He pitched back into the pine needles and she followed, straddling his waist and tickling him until he coughed and choked and gasped for air. "Tell me!" she said. "Tell me your secrets!" "Stop!" Alan said. "Please! I'm going to piss myself!" "What's that to me?" she said, tickling more vigorously. He tried to buck her off, but she was too fast. He caught one wrist, but she pinned his other arm with her knee. He heaved and she collapsed on top of him. Her face was inches from his, her breath moist on his face. They both panted, and he smelled her hair, which was over his face and neck. She leaned forward and closed her eyes expectantly. He tentatively brushed his lips across hers, and she moved closer, and they kissed. It was wet and a little gross, but not altogether unpleasant. She leaned back and opened her eyes, then grinned at him. "That's enough torture for one day," she said. "You're free to go." # She "tortured" him at morning and afternoon recess for the next two weeks, and when he left school on Friday afternoon after the last bell, she was waiting for him in the schoolyard. "Hello," she said, socking him in the arm. "Hi," he said. "Why don't you invite me over for supper this weekend?" she said. "Supper?" "Yes. I'm your girlfriend, yeah? So you should have me around to your place to meet your parents. Next weekend you can come around my place and meet my dad." "I can't," he said. "You can't." "No." "Why not?" "It's a secret," he said. "Oooh, a secret," she said. "What kind of secret?" "A family secret. We don't have people over for dinner. That's the way it is." "A secret! They're all child molesters?" He shook his head. "Horribly deformed?" He shook his head. "What, then? Give us a hint?" "It's a secret." She grabbed his ear and twisted it. Gently at first, then harder. "A secret?" she said. "Yes," he gasped. "It's a secret, and I can't tell you. You're hurting me." "I should hope so," she said. "And it will go very hard for you indeed if you don't tell me what I want to know." He grabbed her wrist and dug his strong fingers into the thin tendons on their insides, twisting his fingertips for maximal effect. Abruptly, she released his ear and clenched her wrist hard, sticking it between her thighs. "Owwww! That bloody hurt, you bastard. What did you do that for?" "My secrets," Alan said, "are secret." She held her wrist up and examined it. "Heaven help you if you've left a bruise, Alvin," she said. "I'll kill you." She turned her wrist from side to side. "All right," she said. "All right. Kiss it better, and you can come to my place for supper on Saturday at six p.m.." She shoved her arm into his face and he kissed the soft skin on the inside of her wrist, putting a little tongue in it. She giggled and punched him in the arm. "Saturday, then!" she called as she ran off. # Edward-Felix-Gerald were too young to give him shit about his schoolyard romance, and Brian was too sensitive, but Dave had taken to lurking about the schoolyard, spying on the children, and he'd seen Marci break off from a clench with Alan, take his hand, and plant it firmly on her tiny breast, an act that had shocked Danny to the core. "Hi, pervert," David said, as he stepped into the cool of the cave. "Pervert" was Davey's new nickname for him, and he had a finely honed way of delivering it so that it dripped with contempt. "Did you have sex with your *girlfriend* today, *pervert*?" Allan turned away from him and helped E-F-G take off his shoes and roll up the cuffs of his pants so that he could go down to the lake in the middle of their father and wade in the shallows, listening to Father's winds soughing through the great cavern. "Did you touch her boobies? Did she suck your pee-pee? Did you put your finger in her?" The litany would continue until Davey went to bed, and even then he wasn't safe. One night, Allen had woken up to see Darren standing over him, hands planted on his hips, face twisted into an elaborate sneer. "Did you put your penis inside of her?" he'd hissed, then gone back to bed. Alby went out again, climbing the rockface faster than Doug could keep up with him, so that by the time he'd found his perch high over the woodlands, where he could see the pines dance in the wind and the ant-sized cars zooming along the highways, Doug was far behind, likely sat atop their mother, sucking his thumb and sulking and thinking up new perversions to accuse Alan of. # Saturday night arrived faster than Alan could have imagined. He spent Saturday morning in the woods, picking mushrooms and checking his snares, then headed down to town on Saturday afternoon to get a haircut and to haunt the library. Converting his father's gold to cash was easier than getting a library card without an address. There was an old assayer whom the golems had described to him before his first trip to town. The man was cheap but he knew enough about the strangeness on the mountain not to cheat him too badly. The stern librarian who glared at him while he walked the shelves, sometimes looking at the titles, sometimes the authors, and sometimes the Dewey Decimal numbers had no such fear. The Deweys were fascinating. They traced the fashions in human knowledge and wisdom. It was easy enough to understand why the arbiters of the system subdivided Motorized Land Vehicles (629.2) into several categories, but here in the 629.22s, where the books on automobiles were, you could see the planners' deficiencies. Automobiles divided into dozens of major subcategories (taxis and limousines, buses, light trucks, cans, lorries, tractor trailers, campers, motorcycles, racing cars, and so on), then ramified into a combinatorial explosion of sub-sub-sub categories. There were Dewey numbers on some of the automotive book spines that had twenty digits or more after the decimal, an entire Dewey Decimal system hidden between 629.2 and 629.3. To the librarian, this shelf-reading looked like your garden-variety screwing around, but what really made her nervous were Alan's excursions through the card catalogue, which required constant tending to replace the cards that errant patrons made unauthorized reorderings of. The subject headings in the third bank of card drawers were the most interesting of all. They, too, branched and forked and rejoined themselves like the meanderings of an ant colony on the march. He'd go in sequence for a while, then start following cross-references when he found an interesting branch, keeping notes on scraps of paper on top of the file drawer. He had spent quite some time in the mythology categories, looking up golems and goblins, looking up changelings and monsters, looking up seers and demigods, but none of the books that he'd taken down off the shelves had contained anything that helped him understand his family better. His family was uncatalogued and unclassified in human knowledge. # He rang the bell on Marci's smart little brick house at bang-on six, carrying some daisies he'd bought from the grocery store, following the etiquette laid down in several rather yucky romance novels he'd perused that afternoon. She answered in jeans and a T-shirt, and punched him in the arm before he could give her the flowers. "Don't you look smart?" she said. "Well, you're not fooling anyone, you know." She gave him a peck on the cheek and snatched away the daisies. "Come along, then, we're eating soon." Marci sat him down in the living room, which was furnished with neutral sofas and a neutral carpet and a neutral coffee table. The bookcases were bare. "It's horrible," she said, making a face. She was twittering a little, dancing from foot to foot. Alan was glad to know he wasn't the only one who was uncomfortable. "Isn't it? The company put us up here. We had a grand flat in Scotland." "It's nice," Alan said, "but you look like you could use some books." She crossed her eyes. "Books? Sure -- I've got *ten boxes* of them in the basement. You can come by and help me unpack them." "Ten *boxes?*" Alan said. "You're making that up." *Ten boxes of books!* Things like books didn't last long under the mountain, in the damp and with the ever-inquisitive, ever-destructive Davey exploring every inch of floor and cave and corridor in search of opportunities for pillage. "I ain't neither," she said. "At least ten. It was a grand flat and they were all in alphabetical order, too." "Can we go see?" Alan asked, getting up from the sofa. "See boxes?" "Yes," Alan said. "And look inside. We could unbox them after dinner, okay?" "That's more of an afternoon project," said a voice from the top of the stairs. "That's my Da," she said. "Come down and introduce yourself to Alan, Da," she said. "You're not the voice of God, so you can bloody well turn up and show your face." "No more sass, gel, or it will go very hard for you," said the voice. The accent was like Marci's squared, thick as oatmeal, liqueur-thick. Nearly incomprehensible, but the voice was kind and smart and patient, too. "You'll have a hard time giving me any licks from the top of the stairs, Da, and Alan looks like he's going to die if you don't at least come down and say hello." Alan blushed furiously. "You can come down whenever you like, sir," he said. "That's all right." "That's mighty generous of you, young sir," said the voice. "Aye. But before I come down, tell me, are your intentions toward my daughter honorable?" His cheeks grew even hotter, and his ears felt like they were melting with embarrassment. "Yes, sir," he said in a small voice. "He's a dreadful pervert, Da," Marci said. "You should see the things he tries, you'd kill him, you would." She grinned foxish and punched him in the shoulder. He sank into the cushions, face suddenly drained of blood. "*What*?" roared the voice, and there was a clatter of slippers on the neutral carpet of the stairs. Alan didn't want to look but found that he couldn't help himself, his head inexorably turned toward the sound, until a pair of thick legs hove into sight, whereupon Marci leapt into his lap and threw her arms around his neck. "Ge'orff me, pervert!" she said, as she began to cover his face in darting, pecking kisses. He went rigid and tried to sink all the way into the sofa. "All right, all right, that's enough of that," her father said. Marci stood and dusted herself off. Alan stared at his knees. "She's horrible, isn't she?" said the voice, and a great, thick hand appeared in his field of vision. He shook it tentatively, noting the heavy class ring and the thin, plain wedding band. He looked up slowly. Marci's father was short but powerfully built, like the wrestlers on the other kids' lunchboxes at school. He had a shock of curly black hair that was flecked with dandruff, and a thick bristling mustache that made him look very fierce, though his eyes were gentle and bookish behind thick glasses. He was wearing wool trousers and a cable-knit sweater that was unraveling at the elbows. "Pleased to meet you, Albert," he said. They shook hands gravely. "I've been after her to unpack those books since we moved here. You could come by tomorrow afternoon and help, if you'd like -- I think it's the only way I'll get herself to stir her lazy bottom to do some chores around here." "Oh, *Da*!" Marci said. "Who cooks around here? Who does the laundry?" "The take-away pizza man does the majority of the cooking, daughter. And as for laundry, the last time I checked, there were two weeks' worth of laundry to do." "Da," she said in a sweet voice, "I love you Da," she said, wrapping her arms around his trim waist. "You see what I have to put up with?" her father said, snatching her up and dangling her by her ankles. She flailed her arms about and made outraged choking noises while he swung her back and forth like a pendulum, releasing her at the top of one arc so that she flopped onto the sofa in a tangle of thin limbs. "It's a madhouse around here," her father continued as Marci righted herself, knocking Alan in the temple with a tennis shoe, "but what can you do? Once she's a little bigger, I can put her to work in the mines, and then I'll have a little peace around here." He sat down on an overstuffed armchair with a fussy antimacassar. "He's got a huge life-insurance policy," Marci said conspiratorially. "I'm just waiting for him to kick the bucket and then I'm going to retire." "Oh, aye," her father said. "Retire. Your life is an awful one, it is. Junior high is a terrible hardship, I know." Alan found himself grinning. "What's so funny?" Marci said, punching him in the shoulder. "You two are," he said, grabbing her arm and then digging his fingers into her tummy, doubling her over with tickles. # There were *twelve* boxes of books. The damp in the basement had softened the cartons to cottage-cheese mush, and the back covers of the bottom layer of paperbacks were soft as felt. To Alan, these seemed unremarkable -- all paper under the mountain looked like this after a week or two, even if Doug didn't get to it -- but Marci was heartbroken. "My books, my lovely books, they're roont!" she said, as they piled them on the living room carpet. "They're fine," Alan said. "They'll dry out a little wobbly, but they'll be fine. We'll just spread the damp ones out on the rug and shelve the rest." And that's what they did, book after book -- old books, hardcover books, board-back kids' books, new paperbacks, dozens of green- and orange-spined Penguin paperbacks. He fondled them, smelled them. Some smelled of fish and chips, and some smelled of road dust, and some smelled of Marci, and they had dog ears where she'd stopped and cracks in their spines where she'd bent them around. They fell open to pages that had her favorite passages. He felt wobbly and drunk as he touched each one in turn. "Have you read all of these?" Alan asked as he shifted the John Mortimers down one shelf to make room for the Ed McBains. "Naw," she said, punching him in the shoulder. "What's the point of a bunch of books you've already read?" # She caught him in the schoolyard on Monday and dragged him by one ear out to the marshy part. She pinned him down and straddled his chest and tickled him with one hand so that he cried out and used the other hand to drum a finger across his lips, so that his cries came out "bibble." Once he'd bucked her off, they kissed for a little while, then she grabbed hold of one of his nipples and twisted. "All right," she said. "Enough torture. When do I get to meet your family?" "You can't," he said, writhing on the pine needles, which worked their way up the back of his shirt and pricked him across his lower back, feeling like the bristles of a hairbrush. "Oh, I can, and I will," she said. She twisted harder. He slapped her hand away. "My family is really weird," he said. "My parents don't really ever go out. They're not like other people. They don't talk." All of it true. "They're mute?" "No, but they don't talk." "They don't talk much, or they don't talk at all?" She pronounced it a-tall. "Not at all." "How did you and your brothers learn to talk, then?" "Neighbors." Still true. The golems lived in the neighboring caves. "And my father, a little." True. "So you have neighbors who visit you?" she asked, a triumphant gleam in her eye. *Damn*. "No, we visit them." Lying now. Sweat on the shag of hair over his ears, which felt like they had coals pressed to them. "When you were a baby?" "No, my grandparents took care of me when I was a baby." Deeper. "But they died." Bottoming out now. "I don't believe you," she said, and he saw tears glisten in her eyes. "You're too embarrassed to introduce me to your family." "That's not it." He thought fast. "My brother. David. He's not well. He has a brain tumor. We think he'll probably die. That's why he doesn't come to school. And it makes him act funny. He hits people, says terrible things." Mixing truth with lies was a *lot* easier. "He shouts and hurts people and he's the reason I can't ever have friends over. Not until he dies." Her eyes narrowed. "If that's a lie," she said, "it's a terrible one. My Ma died of cancer, and it's not something anyone should make fun of. So, it better not be a lie." "It's not a lie," he said, mustering a tear. "My brother David, we don't know how long he'll live, but it won't be long. He acts like a monster, so it's hard to love him, but we all try." She rocked back onto her haunches. "It's true, then?" she asked softly. He nodded miserably. "Let's say no more about it, then," she said. She took his hand and traced hieroglyphs on his palm with the ragged edges of her chewed-up fingernails. The recess bell rang and they headed back to school. They were about to leave the marshland when something hard hit Alan in the back of the head. He spun around and saw a small, sharp rock skitter into the grass, saw Davey's face contorted with rage, lips pulled all the way back off his teeth, half-hidden in the boughs of a tree, winding up to throw another rock. He flinched away and the rock hit the paving hard enough to bounce. Marci whirled around, but David was gone, high up in the leaves, invisible, malicious, biding. "What was that?" "I dunno," Alan lied, and groaned. # Kurt and Alan examined every gap between every storefront on Augusta, no matter how narrow. Kurt kept silent as Alan fished his arm up to the shoulder along miniature alleys that were just wide enough to accommodate the rain gutters depending from the roof. They found the alley that Frederick had been dragged down near the end of the block, between a mattress store and an egg wholesaler. It was narrow enough that they had to traverse it sideways, but there, at the entrance, were two smears of skin and blood, just above the ground, stretching off into the sulfurous, rotty-egg depths of the alleyway. They slid along the alley's length, headed for the gloom of the back. Something skittered away from Alan's shoe and he bent down, but couldn't see it. He ran his hands along the ground and the walls and they came back with a rime of dried blood and a single strand of long, oily hair stuck to them. He wiped his palms off on the bricks. "I can't see," he said. "Here," Kurt said, handing him a miniature maglight whose handle was corrugated by hundreds of toothmarks. Alan saw that he was intense, watching. Alan twisted the light on. "Thanks," he said, and Kurt smiled at him, seemed a little taller. Alan looked again. There, on the ground, was a sharpened black tooth, pierced by a piece of pipe-cleaner wire. He pocketed the tooth before Kurt saw it and delved farther, approaching the alley's end, which was carpeted with a humus of moldering cardboard, leaves, and road turds blown or washed there. He kicked it aside as best he could, then crouched down to examine the sewer grating beneath. The greenish brass screws that anchored it to the ground had sharp cuts in their old grooves where they had been recently removed. He rattled the grating, which was about half a meter square, then slipped his multitool out of his belt holster. He flipped out the Phillips driver and went to work on the screws, unconsciously putting Kurt's flashlight in his mouth, his front teeth finding purchase in the dents that Kurt's own had left there. He realized with a brief shudder that Kurt probably used this flashlight while nipple-deep in dumpsters, had an image of Kurt transferring it from his gloved hands to his mouth and back again as he dug through bags of kitchen and toilet waste, looking for discarded technology. But the metal was cool and clean against his teeth and so he bit down and worked the four screws loose, worked his fingers into the mossy slots in the grate, lifted it out, and set it to one side. He shone the light down the hole and found another fingerbone, the tip of a thumb, desiccated to the size of a large raisin, and he pocketed that, too. There was a lot of blood here, a little puddle that was still wet in the crusted middle. Frederick's blood. He stepped over the grating and shone the light back down the hole, inviting Kurt to have a look. "That's where they went," he said as Kurt bent down. "That hole?" "That hole," he said. "Is that blood?" "That's blood. It's not easy to fit someone my brother's size down a hole like that." He set the grate back, screwed it into place, and passed the torch back to Kurt. "Let's get out of here," he said. On the street, Alan looked at his blood and moss-grimed palms. Kurt pushed back his floppy, frizzed-out, bleach-white mohawk and scratched vigorously at the downy brown fuzz growing in on the sides of his skull. "You think I'm a nut," Alan said. "It's okay, that's natural." Kurt smiled sheepishly. "If it's any consolation, I think you're a *harmless* nut, okay? I like you." "You don't have to believe me, so long as you don't get in my way," Alan said. "But it's easier if you believe me." "Easier to do what?" "Oh, to get along," Alan said. # Davey leapt down from a rock outcropping as Alan made his way home that night, landing on his back. Alan stumbled and dropped his school bag. He grabbed at the choking arm around his neck, then dropped to his knees as Davey bounced a fist-sized stone off his head, right over his ear. He slammed himself back, pinning Davey between himself and the sharp stones on the walkway up to the cave entrance, then mashed backward with his elbows, his head ringing like a gong from the stone's blow. His left elbow connected with Davey's solar plexus and the arm around his throat went slack. He climbed to his knees and looked Davey in the face. He was blue and gasping, but Alan couldn't work up a lot of sympathy for him as he reached up to the side of his head and felt the goose egg welling there. His fingertips came back with a few strands of hair blood-glued to them. He'd been in a few schoolyard scraps and this was always the moment when a teacher intervened -- one combatant pinned, the other atop him. What could you do after this? Was he going to take the rock from Davey's hand and smash him in the face with it, knocking out his teeth, breaking his nose, blacking his eyes? Could he get off of Davey without getting back into the fight? He pinned Davey's shoulders under his knees and took him by the chin with one hand. "You can't do this, Danny," he said, looking into his hazel eyes, which had gone green as they did when he was angry. "Do *what*?" "Spy on me. Try to hurt me. Try to hurt my friends. Tease me all the time. You can't do it, okay?" "I'll stab you in your sleep, Andy. I'll break your fingers with a brick. I'll poke your eyes out with a fork." He was fizzling like a baking-soda volcano, saliva slicking his cheeks and nostrils and chin, his eyes rolling. Alan felt helplessness settle on him, weighing down his limbs. How could he let him go? What else could he do? Was he going to have to sit on Davey's shoulders until they were both old men? "Please, Davey. I'm sorry about what I said. I just can't bring her home, you understand," he said. "Pervert. She's a slut and you're a pervert. I'll tear her titties off." "Don't, Danny, please. Stop, okay?" Darren bared his teeth and growled, jerking his head forward and snapping at Alan's crotch, heedless of the painful thuds his head made when it hit the ground after each lunge. Alan waited to see if he would tire himself out, but when it was clear that he would not tire, Alan waited for his head to thud to the ground and then, abruptly, he popped him in the chin, leapt off of him turned him on his belly, and wrenched him to his knees, twisting one arm behind his back and pulling his head back by the hair. He brought Davey to his feet, under his control, before he'd recovered from the punch. "I'm telling Dad," he said in Davey's ear, and began to frog-march him through to the cave mouth and down into the lake in the middle of the mountain. He didn't even slow down when they reached the smooth shore of the lake, just pushed on, sloshing in up to his chest, Davey's head barely above the water. "He won't stop," Alan said, to the winds, to the water, to the vaulted ceiling, to the scurrying retreat of the goblin. "I think he'll kill me if he goes on. He's torturing me. You've seen it. Look at him!" Davey was thrashing in the water, his face swollen and bloody, his eyes rattling like dried peas in a maraca. Alan's fingers, still buried in Davey's shiny blond hair, kept brushing up against the swollen bruises there, getting bigger by the moment. "I'll *fucking* kill you!" Davey howled, screaming inchoate into the echo that came back from his call. "Shhh," Alan said into his ear. "Shhh. Listen, Davey, please, shhh." Davey's roar did not abate. Alan thought he could hear the whispers and groans of their father in the wind, but he couldn't make it out. "Please, shhh," he said, gathering Davey in a hug that pinned his arms to his sides, putting his lips up against Davey's ear, holding him still. "Shhh," he said, and Davey stopped twitching against him, stopped his terrible roar, and they listened. At first the sound was barely audible, a soughing through the tunnels, but gradually the echoes chased each other round the great cavern and across the still, dark surface of the lake, and then a voice, illusive as a face in the clouds. "My boys," the voice said, their father said. "My sons. David, Alan. You must not fight like this." "He --!" Davey began, the echoes of his outburst scattering their father's voice. "Shhh," Alan said again. "Daniel, you must love your brother. He loves you. I love you. Trust him. He won't hurt you. I won't let you come to any harm. I love you, son." Alan felt Danny tremble in his arms, and he was trembling, too, from the icy cold of the lake and from the voice and the words and the love that echoed from every surface. "Adam, my son. Keep your brother safe. You need each other. Don't be impatient or angry with him. Give him love." "I will," Alan said, and he relaxed his arms so that he was holding Danny in a hug and not a pinion. Danny relaxed back into him. "I love you, Dad," he said, and they trudged out of the water, out into the last warmth of the day's sun, to dry out on the slope of the mountainside, green grass under their bodies and wispy clouds in the sky that they watched until the sun went out. # Marci followed him home a week before Christmas break. He didn't notice her at first. She was cunning, and followed his boot prints in the snow. A blizzard had blown up halfway through the school day, and by the time class let out, there was fresh knee-deep powder and he had to lift each foot high to hike through it, the shush of his snow pants and the huff of his breath the only sounds in the icy winter evening. She followed the deep prints of his boots on the fresh snow, stalking him like he stalked rabbits in the woods. When he happened to turn around at the cave mouth, he spotted her in her yellow snow-suit, struggling up the mountainside, barely visible in the twilight. He'd never seen an intruder on the mountain. The dirt trail that led up to the cave branched off a side road on the edge of town, and it was too rocky even for the dirt-bike kids. He stood at the cave-mouth, torn by indecision. He wanted to keep walking, head away farther uphill, away from the family's den, but now she'd seen him, had waved to him. His cold-numb face drained of blood and his bladder hammered insistently at him. He hiked down the mountain and met her. "Why are you here?" he said, once he was close enough to see her pale, freckled face. "Why do you think?" she said. "I followed you home. Where do you live, Alan? Why can't I even see where you live?" He felt tears prick at his eyes. "You just *can't*! I can't bring you home!" "You hate me, don't you?" she said, hands balling up into mittened fists. "That's it." "I don't hate you, Marci. I -- I love you," he said, surprising himself. She punched him hard in the arm. "Shut up." She kissed his cheek with her cold, dry lips and the huff of her breath thawed his skin, making it tingle. "Where do you live, Alan?" He sucked air so cold it burned his lungs. "Come with me." He took her mittened hand in his and trudged up to the cave mouth. They entered the summer cave, where the family spent its time in the warm months, now mostly empty, save for some straw and a few scattered bits of clothing and toys. He led her through the cave, his eyes adjusting to the gloom, back to the right-angle bend behind a stalactite baffle, toward the sulfur reek of the hot spring on whose shores the family spent its winters. "It gets dark," he said. "I'll get you a light once we're inside." Her hand squeezed his tighter and she said nothing. It grew darker and darker as he pushed into the cave, helping her up the gentle incline of the cave floor. He saw well in the dark -- the whole family did -- but he understood that for her this was a blind voyage. They stepped out into the sulfur-spring cavern, the acoustics of their breathing changed by the long, flat hollow. In the dark, he saw Edward-Frederick-George playing with his matchbox cars in one corner; Davey leaned up against their mother, sucking his thumb. Billy was nowhere in sight, probably hiding out in his room -- he would, of course, have foreseen this visit. He put her hand against the cave wall, then said, "Wait here." He let go of her and walked quickly to the heap of winter coats and boots in the corner and dug through them for the flashlight he used to do his homework by. It was a hand-crank number, and as he squeezed it to life, he pointed it at Marci, her face wan and scared in its light. He gave the flashlight a few more pumps to get its flywheel spinning, then passed it to her. "Just keep squeezing it," he said. "It doesn't need batteries." He took her hand again. It was limp. "You can put your things on the pile," he said, pointing to the coats and boots. He was already shucking his hat and mittens and boots and snow pants and coat. His skin flushed with the warm vapors coming off of the sulfur spring. "You *live* here?" she said. The light from the flashlight was dimming and he reached over and gave it a couple of squeezes, then handed it back to her. "I live here. It's complicated." Davey's eyes were open and he was staring at them with squinted eyes and a frown. "Where are your parents?" she said. "It's complicated," he said again, as though that explained everything. "This is my secret. No one else knows it." Edward-Frederick-George tottered over to them with an armload of toy cars, which he mutely offered to Marci, smiling a drooly smile. Alan patted him on the head and knelt down. "I don't think Marci wants to play cars, okay?" Ed nodded solemnly and went back to the edge of the pool and began running his cars through the nearly scalding water. Marci reached out a hand ahead of her into the weak light, looked at the crazy shadows it cast on the distant walls. "How can you live here? It's a cave, Alan. How can you live in a cave?" "You get used to it," Alan said. "I can't explain it all, and the parts that I can explain, you wouldn't believe. But you've been to my home now, Marci. I've shown you where I live." Davey approached them, a beatific smile on his angelic face. "This is my brother, Daniel," Alan said. "The one I told you about." "You're his slut," Davey said. He was still smiling. "Do you touch his peter?" Alan flinched, suppressing a desire to smack Davey, but Marci just knelt down and looked him in the eye. "Nope," she said. "Are you always this horrible to strangers?" "Yes!" Davey said, cheerfully. "I hate you, and I hate *him*," he cocked his head Alanward. "And you're all *motherfuckers.*" "But we're not wee horrible shits, Danny," she said. "We're not filthy-mouthed brats who can't keep a civil tongue." Davey snapped his head back and then forward, trying to get her in the bridge of the nose, a favorite tactic of his, but she was too fast for him and ducked it, so that he stumbled and fell to his knees. "Your mother's going to be very cross when she finds out how you've been acting. You'll be lucky if you get any Christmas pressies," she said as he struggled to his feet. He swung a punch at her groin, and she caught his wrist and then hoisted him to his tiptoes by his arm, then lifted him off the floor, bringing his face up level with hers. "Stop it," she said. "*Now*." He fell silent and narrowed his eyes as he dangled there, thinking about this. Then he spat in her face. Marci shook her head slowly as the gob of spit slid down her eyebrow and over her cheek, then she spat back, nailing him square on the tip of his nose. She set him down and wiped her face with a glove. Davey started toward her, and she lifted a hand and he flinched back and then ran behind their mother, hiding in her tangle of wires and hoses. Marci gave the flashlight a series of hard cranks that splashed light across the washing machine and then turned to Alan. "That's your brother?" Alan nodded. "Well, I see why you didn't want me to come home with you, then." # Kurt was properly appreciative of Alan's bookcases and trophies, ran his fingertips over the wood, willingly accepted some iced mint tea sweetened with honey, and used a coaster without having to be asked. "A washing machine and a mountain," he said. "Yes," Alan said. "He kept a roof over our heads and she kept our clothes clean." "You've told that joke before, right?" Kurt's foot was bouncing, which made the chains on his pants and jacket jangle. "And now Davey's after us," Alan said. "I don't know why it's now. I don't know why Davey does *anything*. But he always hated me most of all." "So why did he snatch your brothers first?" "I think he wants me to sweat. He wants me scared, all the time. I'm the eldest. I'm the one who left the mountain. I'm the one who came first, and made all the connections with the outside world. They all looked to me to explain the world, but I never had any explanations that would suit Davey." "This is pretty weird," he said. Alan cocked his head at Kurt. He was about thirty, old for a punk, and had a kind of greasy sheen about him, like he didn't remember to wash often enough, despite his protestations about his cleanliness. But at thirty, he should have seen enough to let him know that the world was both weirder than he suspected and not so weird as certain mystically inclined people would like to believe. Arnold didn't like this moment of disclosure, didn't like dropping his carefully cultivated habit of hiding this, but he also couldn't help but feel relieved. A part of his mind nagged him, though, and told him that too much of this would waken the worry for his brothers from its narcotized slumber. "I've told other people, just a few. They didn't believe me. You don't have to. Why don't you think about it for a while?" "What are you going to do?" "I'm going to try to figure out how to find my brothers. I can't go underground like Davey can. I don't think I can, anyway. I never have. But Davey's so... *broken*... so small and twisted. He's not smart, but he's cunning and he's determined. I'm smarter than he is. So I'll try to find the smart way. I'll think about it, too." "Well, I've got to get ready to go diving," Kurt said. He stood up with a jangle. "Thanks for the iced tea, Adam." "It was nice to meet you, Kurt," Alan said, and shook his hand. # Alan woke with something soft over his face. It was pitch dark, and he couldn't breathe. He tried to reach up, but his arms wouldn't move. He couldn't sit up. Something heavy was sitting on his chest. The soft thing -- a pillow? -- ground against his face, cruelly pressing down on the cartilage in his nose, filling his mouth as he gasped for air. He shuddered hard, and felt something give near his right wrist and then his arm was loose from the elbow down. He kept working the arm, his chest afire, and then he'd freed it to the shoulder, and something bit him, hard little teeth like knives, in the fleshy underside of his bicep. Flailing dug the teeth in harder, and he knew he was bleeding, could feel it seeping down his arm. Finally, he got his hand onto something, a desiccated, mummified piece of flesh. Davey. Davey's ribs, like dry stones, cold and thin. He felt up higher, felt for the place where Davey's arm met his shoulder, and then twisted as hard as he could, until the arm popped free in its socket. He shook his head violently and the pillow slid away. The room was still dark, and the hot, moist air rushed into his nostrils and mouth as he gasped it in. He heard Davey moving in the dark, and as his eyes adjusted, he saw him unfolding a knife. It was a clasp knife with a broken hasp and it swung open with the sound of a cockroach's shell crunching underfoot. The blade was rusty. Alan flung his freed arm across his body and tried to tug himself loose. He was being held down by his own sheets, which had been tacked or stapled to the bed frame. Using all his strength, he rolled over, heaving and bucking, and felt/heard the staples popping free down one side of the bed, just as Davey slashed at where his face had been a moment before. The knife whistled past his ear, then scored deeply along his shoulder. His arm flopped uselessly at his side and now they were both fighting one-armed, though Davey had a knife and Adam was wrapped in a sheet. His bedroom was singularly lacking in anything that could be improvised into a weapon -- he considered trying getting a heavy encyclopedia out to use as a shield, but it was too far a distance and too long a shot. He scooted back on the bed, trying to untangle the sheet, which was still secured at the foot of the bed and all along one side. He freed his good arm just as Davey slashed at him again, aiming for the meat of his thigh, the big arteries there that could bleed you out in a minute or two. He grabbed for Davey's shoulder and caught it for an instant, squeezed and twisted, but then the skin he had hold of sloughed away and Davey was free, dancing back. Then he heard, from downstairs, the sound of rhythmic pounding at the door. He'd been hearing it for some time, but hadn't registered it until now. A muffled yell from below. Police? Mimi? He screamed out, "Help!" hoping his voice would carry through the door. Apparently, it did. He heard the sound of the small glass pane over the doorknob shatter, and Davey turned his head to look in the direction of the sound. Alan snatched up the pillow that he'd been smothering under and swung it as hard as he could at Davey's head, knocking him around, and the door was open now, the summer night air sweeping up the stairs to the second-floor bedroom. "Alan?" It was Kurt. "Kurt, up here, he's got a knife!" Boots on the stairs, and Davey standing again, cornered, with the knife, slashing at the air toward him and toward the bedroom door, toward the light coming up the stairs, bobbing, Kurt's maglight, clenched in his teeth, and Davey bolted for the door with the knife held high. The light stopped moving and there was an instant's tableau, Davey caught in the light, cracked black lips peeled back from sharp teeth, chest heaving, knife bobbing, and then Alan was free, diving for his knees, bringing him down. Kurt was on them before Davey could struggle up to his good elbow, kicking the knife away, scattering fingerbones like dice. Davey screeched like a rusty hinge as Kurt twisted his arms up behind his back and Alan took hold of his ankles. He thrashed like a raccoon in a trap, and Alan forced the back of his head down so that his face was mashed against the cool floor, muffling his cries. Kurt shifted so that his knee and one hand were pinning Davey's wrists, fished in his pockets, and came out with a bundle of hairy twine. He set it on the floor next to Alan and then shifted his grip back to Davey's arms. As soon as Alan released the back of Davey's head, he jerked it up and snapped his teeth into the top of Kurt's calf, just above the top of his high, chain-draped boot. Kurt hollered and Adam reached out and took the knife, moving quickly before he could think, and smashed the butt into Davey's jaw, which cracked audibly. Davey let go of Kurt's calf and Alan worked quickly to lash his feet together, using half the bundle of twine, heedless of how he cut into the thin, cracking skin. He used the knife to snip the string and then handed the roll to Kurt, who went to work on Danny's wrists. Alan got the lights and rolled his brother over, looked into his mad eyes. Dale was trying to scream, but with his jaw hanging limp and his teeth scattered, it came out in a rasp. Alan stood and found that he was naked, his shoulder and bicep dripping blood down his side into a pool on the polished floor. "We'll take him to the basement," he told Kurt, and dug through the laundry hamper at the foot of the bed for jeans. He found a couple of pairs of boxer shorts and tied one around his bicep and the other around his shoulder, using his teeth and chin as a second hand. It took two tries before he had them bound tight enough to still the throb. The bedroom looked like someone had butchered an animal in it, and the floor was gritty with Darrel's leavings, teeth and nails and fingerbones. Picking his way carefully through the mess, he hauled the sheet off the bed, popping out the remaining staples, which pinged off the bookcases and danced on the polished wood of the floor. He folded it double and laid it on the floor next to Davey. "Help me roll him onto it," he said, and then saw that Kurt was staring down at his shriveled, squirming, hateful brother in horror, wiping his hands over and over again on the thighs of his jeans. He looked up and his eyes were glazed and wide. "I was passing by and I saw the shadows in the window. I thought you were being attacked --" He hugged himself. "I was," Alan said. He dug another T-shirt out of his hamper. "Here, wrap this around your hands." They rolled Davey into the sheet and then wrapped him in it. He was surprisingly heavy, dense. Hefting his end of the sheet one-handed, hefting that mysterious weight, he remembered picking up Ed-Fred-Geoff in the cave that first day, remembered the weight of the brother-in-the-brother-in-the-brother, and he had a sudden sickening sense that perhaps Davey was so heavy because he'd eaten them. Once they had him bound snugly in the sheet, Danny stopped thrashing and became very still. They carried him carefully down the dark stairs, the walnut-shell grit echoing the feel of teeth and flakes of skin on the bare soles of Alan's feet. They dumped him unceremoniously on the cool mosaic of tile on the floor. They stared at the unmoving bundle for a moment. "Wait here, I'm going to get a chair," Alan said. "Jesus, don't leave me alone here," Kurt said. "That kid, the one who saw him -- take -- your brother? No one's seen him since." He looked down at Davey with wide, crazed eyes. Alan's shoulder throbbed. "All right," he said. "You get a chair from the kitchen, the captain's chair in the corner with the newspaper recycling stacked on it." While Kurt was upstairs, Alan unwrapped his brother. Danny's eyes were closed, his jaw hanging askew, his wrists bound behind him. Alan leaned carefully over him and took his jaw and rotated it gently until it popped back into place. "Davey?" he said. The eyes were closed, but now there was an attentiveness, an alertness to him. Alan stepped back quickly, feeling foolish at his fear of this pathetic, disjointed bound thing on his floor. No two ways about it, though: Davey gave him the absolutely willies, making his testicles draw up and the hair on the back of his arms prickle. "Set the chair down there," Alan said, pointing. He hoisted Davey up by his dry, papery armpits and sat him in the seat. He took some duct tape out of a utility drawer under the basement staircase and used it to gum Danny down in the chair. "Davey," he said again. "I know you can hear me. Stop pretending." "That's your brother?" Kurt said. "The one who --" "That's him," Alan said. "I guess you believe me now, huh?" Davey grinned suddenly, mirthless. "Still making friends and influencing people, brother?" he said. His voice was wet and hiccuping, like he was drowning in snot. "We're not going to play any games here, Davey. You're going to tell me where Edward, Felix, and Griffin are, or I'm going to tear your fingers off and smash them into powder. When I run out of fingers, I'll switch to teeth." Kurt looked at him in alarm. He moaned. "Jesus, Adam --" Adam whirled on him, something snapping inside. "Don't, Kurt, just don't, okay? He tried to kill me tonight. He may already have killed my brothers. This is life or death, and there's no room for sentiment or humanity. Get a hammer out of the toolbox, on that shelf." Kurt hesitated. "Do it!" Alan said, pointing at the toolbox. Kurt shrank back, looking as though he'd been slapped. He moved as if in a dream, opening the toolbox and pawing through it until he came up with a scarred hammer, one claw snapped off. Davey shook his head. "You don't scare me, Albert. Not for an instant. I have a large supply of fingers and teeth -- all I need. And you -- you're like him. You're a sentimentalist. Scared of yourself. Scared of me. Scared of everything. That's why you ran away. That's why you got rid of me. Scared." Alan dug in his pocket for the fingerbones and teeth he'd collected. He found the tip of a pinky with a curled-over nail as thick as an oyster's shell, crusted with dirt and blood. "Give me the hammer, Kurt," he said. Davey's eyes followed him as he set the fingertip down on the tiles and raised the hammer. He brought it down just to one side of the finger, hard enough to break the tile. Kurt jumped a little, and Alan held the hammer up again. "Tell me or this time I won't miss," he said, looking Davey in the eye. Davey shrugged in his bonds. Alan swung the hammer again. It hit the fingertip with a jarring impact that vibrated up his arm and resonated through his hurt shoulder. He raised the hammer again. He'd expected the finger to crush into powder, but instead it fissured into three jagged pieces, like a piece of chert fracturing under a hammer-stone. Davey's eyes were squeezed down to slits now. "You're the scared one. You can't scare me," he said, his voice choked with phlegm. Alan sat on the irregular tile and propped his chin in his palm. "Okay, Davey, you're right. I'm scared. You've kidnapped our brothers, maybe even killed them. You're terrorizing me. I can't think, I can't sleep. So tell me, Danny, why shouldn't I just kill you again, and get rid of all that fear?" "I know where the brothers are," he said instantly. "I know where there are more people like us. All the answers, Albert, every answer you've ever looked for. I've got them. And I won't tell you any of them. But so long as I'm walking around and talking, you think that I might." # Alan took Marci back to his bedroom, the winter bedroom that was no more than a niche in the hot-spring cavern, a pile of rags and a sleeping bag for a bed. It had always been enough for him, but now he was ashamed of it. He took the flashlight from Marci and let it wind down, so that they were sitting in darkness. "Your parents --" she said, then broke off. "It's complicated." "Are they dead?" He reached out in the dark and took her hand. "I don't know how to explain it," he said. "I can lie, and you'll probably think I'm telling the truth. Or I can tell the truth, and you'll think that I'm lying." She squeezed his hand. Despite the sweaty heat of the cave, her fingers were cold as ice. He covered her hand with his free hand and rubbed at her cold fingers. "Tell me the truth," she whispered. "I'll believe you." So he did, in mutters and whispers. He didn't have the words to explain it all, didn't know exactly how to explain it, but he tried. How he knew his father's moods. How he felt his mother's love. After keeping this secret all his life, it felt incredible to be letting it out. His heart thudded in his chest, and his shoulders felt progressively lighter, until he thought he might rise up off his bedding and fly around the cave. If it hadn't been dark, he wouldn't have been able to tell it. It was the dark, and the faint lunar glow of Marci's face that showed no expression that let him open up and spill out all the secrets. Her fingers squeezed tighter and tighter, and now he felt like singing and dancing, because surely between the two of them, they could find a book in the library or maybe an article in the microfilm cabinets that would *really* explain it to him. He wound down. "No one else knows this," he said. "No one except you." He leaned in and planted a kiss on her cold lips. She sat rigid and unmoving as he kissed her. "Marci?" "Alan," she breathed. Her fingers went slack. She pulled her hand free. Suddenly Alan was cold, too. The scant inches between them felt like an unbridgeable gap. "You think I'm lying," he said, staring out into the cave. "I don't know --" "It's okay," he said. "I can help you get home now, all right?" She folded her hands on her lap and nodded miserably. On the way out of the cave, Eddie-Freddie-Georgie tottered over, still holding his car. He held it out to her mutely. She knelt down solemnly and took it from him, then patted him on the head. "Merry Christmas, kiddo," she said. He hugged her leg, and she laughed a little and bent to pick him up. She couldn't. He was too heavy. She let go of him and nervously pried his arms from around her thigh. Alan took her down the path to the side road that led into town. The moonlight shone on the white snow, making the world glow bluish. They stood by the roadside for a long and awkward moment. "Good night, Alan," she said, and turned and started trudging home. # There was no torture at school the next day. She ignored him through the morning, and he couldn't find her at recess, but at lunch she came and sat next to him. They ate in silence, but he was comforted by her presence beside him, a warmth that he sensed more than felt. She sat beside him in afternoon classes, too. Not a word passed between them. For Alan, it felt like anything they could say to one another would be less true than the silence, but that realization hurt. He'd never been able to discuss his life and nature with anyone and it seemed as though he never would. But the next morning, in the school yard, she snagged him as he walked past the climber made from a jumble of bolted-together logs and dragged him into the middle. It smelled faintly of pee and was a rich source of mysterious roaches and empty beer bottles on Monday mornings after the teenagers had come and gone. She was crouched down on her haunches in the snow there, her steaming breath coming in short huffs. She grabbed him by the back of his knit toque and pulled his face to hers, kissing him hard on the mouth, shocking the hell out of him by forcing her tongue past his lips. They kissed until the bell rang, and as Alan made his way to class, he felt like his face was glowing like a lightbulb. His homeroom teacher asked him if he was feeling well, and he stammered out some kind of affirmative while Marci, sitting in the next row, stifled a giggle. They ate their lunches together again, and she filled the silence with a running commentary of the deficiencies of the sandwich her father had packed her, the strange odors coming from the brown bag that Alan had brought, filled with winter mushrooms and some soggy bread and cheese, and the hairiness of the mole on the lunch lady's chin. When they reached the schoolyard, she tried to drag him back to the logs, but he resisted, taking her instead to the marsh where he'd first spied her. The ground had frozen over and the rushes and reeds were stubble, poking out of the snow. He took her mittened hands in his and waited for her to stop squirming. Which she did, eventually. He'd rehearsed what he'd say to her all morning: *Do you believe me? What am I? Am I like you? Do you still love me? Are you still my friend? I don't understand it any better than you do, but now, now there are two of us who know about it, and maybe we can make sense of it together. God, it's such a relief to not be the only one anymore.* But now, standing there with Marci, in the distant catcalls of the playground and the smell of the new snow and the soughing of the wind in the trees, he couldn't bring himself to say it. She either knew these things or she didn't, and if she didn't, he didn't know what he could do to help it. "What?" she said at last. "Do you --" he began, then fell silent. He couldn't say the words. She looked irritated, and the sounds and the smells swept over him as the moment stretched. But then she softened. "I don't understand it, Alan," she said. "Is it true? Is it really how you say it is? Did I see what I saw?" "It's true," he said, and it was as though the clouds had parted, the world gone bright with the glare off the snow and the sounds from the playground now joyous instead of cruel. "It's true, and I don't understand it any more than you do, Marci." "Are you...*human*, Alan?" "I *think* so," he said. "I bleed. I eat. I sleep. I think and talk and dream." She squeezed his hands and darted a kiss at him. "You kiss," she said. And it was all right again. # The next day was Saturday, and Marci arranged to meet him at the cave-mouth. In the lee of the wind, the bright winter sun reflected enough heat off the snow that some of it melted away, revealing the stunted winter grass beneath. They sat on the dry snow and listened to the wind whistle through the pines and the hiss of loose snow blowing across the crust. "Will I get to meet your Da, then?" she said, after they'd watched a jackrabbit hop up the mountainside and disappear into the woods. He sniffed deeply, and smelled the coalface smell of his father's cogitation. "You want to?" he said. "I do." And so he led her inside the mountain, through the winter cave, and back and back to the pool in the mountain's heart. They crept along quietly, her fingers twined in his. "You have to put out the flashlight now," he said. "It'll scare the goblin." His voice shocked him, and her, he felt her startle. It was so quiet otherwise, just the sounds of breathing and of cave winds. So she let the whirring dynamo in the flashlight wind down, and the darkness descended on them. It was cool, but not cold, and the wind smelled more strongly of coalface than ever. "He's in there," Alan said. He heard the goblin scamper away. His words echoed over the pool around the corner. "Come on." Her fingers were very cool. They walked in a slow, measured step, like a king and queen of elfland going for a walk in the woods. He stopped them at the pool's edge. There was almost no light here, but Alan could make out the smooth surface of his father's pool. "Now what?" she whispered, the hissing of her words susurrating over the pool's surface. "We can only talk to him from the center," he whispered. "We have to wade in." "I can't go home with wet clothes," she whispered. "You don't wear clothes," he said. He let go of her hand and began to unzip his snowsuit. And so they stripped, there on his father's shore. She was luminous in the dark, a pale girl-shape picked out in the ripples of the pool, skinny, with her arms crossed in front of her chest. Even though he knew she couldn't see him, he was self-conscious in his nudity, and he stepped into the pool as soon as he was naked. "Wait," she said, sounding panicked. "Don't leave me!" So he held out his hand for her, and then, realizing that she couldn't see it, he stepped out of the pool and took her hand, brushing her small breast as he did so. He barely registered the contact, though she startled and nearly fell over. "Sorry," he said. "Come on." The water was cold, but once they were in up to their shoulders, it warmed up, or they went numb. "Is it okay?" she whispered, and now that they were in the center of the cavern, the echoes crossed back and forth and took a long time to die out. "Listen," Andy said. "Just listen." And as the echoes of his words died down, the winds picked up, and then the words emerged from the breeze. "Adam," his father sighed. Marci jumped a foot out of the water, and her splashdown sent watery ripples rebounding off the cavern walls. Alan reached out for her and draped his arm around her shoulders. She huddled against his chest, slick cold naked skin goose-pimpled against his ribs. She smelled wonderful, like a fox. It *felt* wonderful, and solemn, to stand there nude, in the heart of his father, and let his secrets spill away. Her breathing stilled again. "Alan," his father said. "We want to understand, Father," Alan whispered. "What am I?" It was the question he'd never asked. Now that he'd asked it, he felt like a fool: Surely his father *knew*, the mountain knew everything, had stood forever. He could have found out anytime he'd thought to ask. "I don't have the answer," his father said. "There may be no answer. You may never know." Adam let go of Marci, let his arms fall to his sides. "No," he said. "No!" he shouted again, and the stillness was broken. The wind blew cold and hard, and he didn't care. "*NO!*" he screamed, and Marci grabbed him and put her hand over his mouth. His ears roared with echoes, and they did not die down, but rather built atop one another, to a wall of noise that scared him. She was crying now, scared and openmouthed sobs. She splashed him and water went up his nose and stung his eyes. The wind was colder now, cold enough to hurt, and he took her hand and sloshed recklessly for the shore. He spun up the flashlight and handed it to her, then yanked his clothes over his wet skin, glaring at the pool while she did the same. # In the winter cave, they met a golem. It stood like a statue, brick-red with glowing eyes, beside Alan's mother, hands at its sides. Golems didn't venture to this side of his father very often, and almost never in daylight. Marci caught him in the flashlight's beam as they entered the warm humidity of the cave, shivering in the gusting winds. She fumbled the flashlight and Alan caught it before it hit the ground. "It's okay," he said. His chest was heaving from his tantrum, but the presence of the golem calmed him. You could say or do anything to a golem, and it couldn't strike back, couldn't answer back. The sons of the mountain that sheltered -- and birthed? -- the golems owed nothing to them. He walked over to it and folded his arms. "What is it?" he said. The golem bent its head slightly and looked him in the eye. It was man-shaped, but baggier, muscles like frozen mud. An overhang of belly covered its smooth crotch like a kilt. Its chisel-shaped teeth clacked together as it limbered up its jaw. "Your father is sad," it said. Its voice was slow and grinding, like an avalanche. "Our side grows cold." "I don't care," Alan said. "*Fuck* my father," he said. Behind him, perched atop their mother, Davey whittered a mean little laugh. "You shouldn't --" Alan shoved the golem. It was like shoving a boulder. It didn't give at all. "You don't tell me what to do," he said. "You can't tell me what to do. I want to know what I am, how we're possible, and if you can't help, then you can leave now." The winds blew colder, smelling now of the golem's side of the mountain, of clay and the dry bones of their kills, which they arrayed on the walls of their cavern. The golem stood stock still. "Does it...*understand*?" Marci asked. Davey snickered again. "It's not stupid," Alan said, calming a little. "It's...*slow*. It thinks slowly and acts slowly. But it's not stupid." He paused for a moment. "It taught me to speak," he said. That did it. He began to cry, biting his lip to keep from making a sound, but the tears rolled down his cheeks and his shoulders shook. The flashlight's beam pinned him, and he wanted to run to his mother and hide behind her, wanted to escape the light. "Go," he said softly to the golem, touching its elbow. "It'll be all right." Slowly, gratingly, the golem turned and lumbered out of the cave, clumsy and ponderous. Marci put her arm around him and he buried his face in her skinny neck, the hot tears coursing down her collarbones. # Davey came to him that night and pinned him in the light of the flashlight. He woke staring up into the bright bulb, shielding his eyes. He groped out for the light, but Darryl danced back out of reach, keeping the beam in his eyes. The air crackled with the angry grinding of its hand-dynamo. He climbed out of bed naked and felt around on the floor. He had a geode there, he'd broken it and polished it by hand, and it was the size of a softball, the top smooth as glass, the underside rough as a coconut's hide. Wordless and swift, he wound up and threw the geode as hard as he could at where he judged Davey's head to be. There was a thud and a cry, and the light clattered to the ground, growing more dim as its dynamo whirred to a stop. Green blobs chased themselves across his vision, and he could only see Darren rolling on the ground by turning his head to one side and looking out of the corner of his eye. He groped toward Davey and smelled the blood. Kneeling down, he found Davey's hand and followed it up to his shoulder, his neck. Slick with blood. Higher, to Davey's face, his forehead, the dent there sanded ragged by the rough side of the geode. The blood flowed freely and beneath his other hand Danny's chest heaved as he breathed, shallowly, rapidly, almost panting. His vision was coming back now. He took off his T-shirt and wadded it up, pressed it to Davey's forehead. They'd done first aid in class. You weren't supposed to move someone with a head injury. He pressed down with the T-shirt, trying to stanch the blood. Then, quick as a whip, Davey's head twisted around and he bit down, hard, on Alan's thumbtip. Albert reeled back, but it was too late: Davey had bitten off the tip of his right thumb. Alan howled, waking up Ed-Fred-Geoff, who began to cry. Davey rolled away, scampering back into the cave's depths. Alan danced around the cave, hand clamped between his thighs, mewling. He fell to the floor and squeezed his legs together, then slowly brought his hand up before his face. The ragged stump of his thumb was softly spurting blood in time with his heartbeat. He struggled to remember his first aid. He wrapped his T-shirt around the wound and then pulled his parka on over his bare chest and jammed his bare feet into his boots, then made his way to the cave mouth and scooped up snow under the moon's glow, awkwardly packing a snowball around his hand. He shivered as he made his way back into the winter cave and propped himself up against his mother, holding his hurt hand over his head. The winter cave grew cold as the ice packed around his hand. Bobby, woken by his clairvoyant instincts, crept forward with a sheet and draped it over Alan. He'd foreseen this, of course -- had foreseen all of it. But Bobby followed his own code, and he kept his own counsel, cleaning up after the disasters he was powerless to prevent. Deep in the mountains, they heard the echoes of Davey's tittering laughter. # "It was wrong to bring her here, Adam," Billy said to him in the morning, as he fed Alan the crusts of bread and dried apples he'd brought him, packing his hand with fresh snow. "I didn't bring her here, she followed me," Adam said. His arm ached from holding it aloft, and his back and tailbone were numb with the ache of a night spent sitting up against their mother's side. "And besides, why should it be wrong? Whose rules? What rules? What are the *fucking* rules?" "You can feel the rules, brother," he said. He couldn't look Alan in the eye, he never did. This was a major speech, coming from Bobby. "I can't feel any rules," Alan said. He wondered if it was true. He'd never told anyone about the family before. Had he known all along that he shouldn't do this? "I can. She can't know. No one can know. Even we can't know. We'll never understand it." "Where is Davey?" "He's doing a...ritual. With your thumb." They sat silent and strained their ears to hear the winds and the distant shuffle of the denizens of the mountain. Alan shifted, using his good hand to prop himself up, looking for a comfortable position. He brought his injured hand down to his lap and unwrapped his blood-soaked T-shirt from his fist, gently peeling it away from the glue of dried blood that held it there. His hand had shriveled in the night, from ice and from restricted circulation, and maybe from Davey's ritual. Alan pondered its crusty, clawed form, thinking that it looked like it belonged to someone -- some*thing* -- else. Buddy scaled the stalactite that served as the ladder up to the lofty nook where he slept and came back down holding his water bottle. "It's clean, it's from the pool," he said, another major speech for him. He also had an armload of scavenged diapers, much-washed and worn soft as flannel. He wet one and began to wipe away the crust of blood on Alan's arm and hand, working his way up from the elbow, then tackling the uninjured fingers, then, very gently, gently as a feather-touch, slow as a glacier, he worked on Alan's thumb. When he was done, Alan's hand was clean and dry and cold, and the wound of his thumb was exposed and naked, a thin crust of blood weeping liquid slowly. It seemed to Alan that he could see the stump of bone protruding from the wound. He was amazed to see his bones, to get a look at a cross-section of himself. He wondered if he could count the rings and find out how old he was, as he had never been really certain on that score. He giggled ghoulishly. He held out his good hand. "Get me up, okay?" Bobby hauled him to his feet. "Get me some warm clothes, too?" And he did, because he was Bobby, and he was always only too glad to help, only too glad to do what service he could for you, even if he would never do you the one service that would benefit you the most: telling you of his visions, helping you avoid the disasters that loomed on your horizon. Standing up, walking around, being clean -- he began to feel like himself again. He even managed to get into his snow pants and parka and struggle out to the hillside and the bright sunshine, where he could get a good look at his hand. What he had taken for a bone wasn't. It was a skinny little thumbtip, growing out of the raggedy, crusty stump. He could see the whorl of a fingerprint there, and narrow, nearly invisible cuticles. He touched the tip of his tongue to it and it seemed to him that he could feel a tongue rasping over the top of his missing thumbtip. # "It's disgusting, keep it away," Marci said, shrinking away from his hand in mock horror. He held his proto-thumb under her nose and waggled it. "No joking, okay? I just want to know what it *means*. I'm *growing a new thumb*." "Maybe you're part salamander. They regrow their legs and tails. Or a worm -- cut a worm in half and you get two worms. It's in one of my Da's books." He stared at his thumb. It had grown perceptibly, just on the journey into town to Marci's place. They were holed up in her room, surrounded by watercolors of horses in motion that her mother had painted. She'd raided the fridge for cold pork pies and cheese and fizzy lemonade that her father had shipped from the Marks & Spencer in Toronto. It was the strangest food he'd ever eaten but he'd developed a taste for it. "Wiggle it again," she said. He did, and the thumbtip bent down like a scale model of a thumbtip, cracking the scab around it. "We should go to a doctor," she said. "I don't go to doctors," he said flatly. "You *haven't* gone to a doctor -- doesn't mean you can't." "I don't go to doctors." X-ray machines and stethoscopes, blood tests and clever little flashlights in your ears -- who knew what they'd reveal? He wanted to be the first to discover it, he didn't want to have to try to explain it to a doctor before he understood it himself. "Not even when you're sick?" "The golems take care of it," he said. She shook her head. "You're a weirdo, you know that?" "I know it," he said. "I thought my family was strange," she said, stretching out on her tummy on the bed. "But they're not a patch on you." "I know it." He finished his fizzy lemonade and lay down beside her, belching. "We could ask my Da. He knows a lot of strange things." He put his face down in her duvet and smelled the cotton covers and her nighttime sweat, like a spice, like cinnamon. "I don't want to do that. Please don't tell anyone, all right?" She took hold of his wrist and looked again at the teensy thumb. "Wiggle it again," she said. He did. She giggled. "Imagine if you were like a worm. Imagine if your thumbtip was out there growing another *you*." He sat bolt upright. "Do you think that's possible?" he said. His heart was thudding. "Do you think so?" She rolled on her side and stared at him. "No, don't be daft. How could your thumb grow another *you?*" "Why wouldn't it?" She had no answer for him. "I need to go home," he said. "I need to know." "I'm coming with," she said. He opened his mouth to tell her no, but she made a fierce face at him, her foxy features wrinkled into a mock snarl. "Come along then," he said. "You can help me do up my coat." # The winter cave was deserted. He listened at the mouths of all the tunnels, straining to hear Davey. From his high nook, Brian watched them. "Where is he, Billy?" Alan called. "Tell me, godfuckit!" Billy looked down from him perch with his sad, hollow eyes -- had he been forgetting to eat again? -- and shook his head. They took to the tunnels. Even with the flashlight, Marci couldn't match him for speed. He could feel the tunnels through the soles of his boots, he could smell them, he could pick them apart by the quality of their echoes. He moved fast, dragging Marci along with his good hand while she cranked the flashlight as hard as she could. He heard her panting, triangulated their location from the way that the shallow noises reflected off the walls. When they found Davey at last, it was in the golem's cave, on the other side of the mountain. He was hunkered down in a corner, while the golems moved around him slowly, avoiding him like he was a boulder or a stalagmite that had sprung up in the night. Their stony heads turned to regard Marci and Adam as they came upon them, their luminous eyes lighting on them for a moment and then moving on. It was an eloquent statement for them: *This is the business of the mountain and his sons. We will not intervene.* There were more golems than Alan could remember seeing at once, six, maybe seven. The golems made more of their kind from the clay they found at the riverbank whenever they cared to or needed to, and allowed their number to dwindle when the need or want had passed by the simple expedient of deconstructing one of their own back to the clay it had come from. The golems' cave was lined with small bones and skulls, rank and row climbing the walls, twined with dried grasses in ascending geometries. These were the furry animals that the golems patiently trapped and killed, skinned, dressed, and smoked, laying them in small, fur-wrapped bundles in the family's cave when they were done. It was part of their unspoken bargain with the mountain, and the tiny bones had once borne the flesh of nearly every significant meal Alan had ever eaten. Davey crouched among the bones at the very back of the cave, his back to them, shoulders hunched. The golems stood stock still as Marci and he crept up on Davey. So intent was he on his work that he didn't notice them, even as they loomed over his shoulder, staring down on the thing he held in his hands. It was Alan's thumb, and growing out of it -- Allen. Tiny, the size of a pipe-cleaner man, and just as skinny, but perfectly formed, squirming and insensate, face contorted in a tiny expression of horror. Not so perfectly formed, Alan saw, once he was over the initial shock. One of the pipe-cleaner-Allen's arms was missing, protruding there from Davey's mouth, and he crunched it with lip-smacking relish. Alan gawped at it, taking it in, watching his miniature doppelganger, hardly bigger than the thumb it sprouted from, thrash like a worm on a hook. Davey finished the arm, slurping it back like a noodle. Then he dangled the tiny Allen from the thumb, shaking it, before taking hold of the legs, one between the thumb and forefinger of each hand, and he gently, almost lovingly pulled them apart. The Allen screamed, a sound as tiny and tortured as a cricket song, and then the left leg wrenched free of its socket. Alan felt his own leg twist in sympathy, and then there was a killing rage in him. He looked around the cave for the thing that would let him murder his brother for once and for all, but it wasn't to be found. Davey's murder was still to come. Instead, he leapt on Davey's back, arm around his neck, hand gripping his choking fist, pulling the headlock tighter and tighter. Marci was screaming something, but she was lost in the crash of the blood-surf that roared in his ears. Davey pitched over backward, trying to buck him off, but he wouldn't be thrown, and he flipped Davey over by the neck, so that he landed it a thrash of skinny arms and legs. The Allen fell to the floor, weeping and dragging itself one-armed and one-legged away from the melee. Then Davey was on him, squeezing his injured hand, other thumb in his eye, screeching like a rusted hinge. Alan tried to see through the tears that sprang up, tried to reach Davey with his good hand, but the rage was leaking out of him now. He rolled desperately, but Davey's weight on his chest was like a cannonball, impossibly heavy. Suddenly Davey was lifted off of him. Alan struggled up into a sitting position, clutching his injured hand. Davey dangled by his armpits in the implacable hands of one of the golems, face contorted into unrecognizability. Alan stood and confronted him, just out of range of his kicking feet and his gnashing teeth, and Darrel spat in his face, a searing gob that landed in his eye. Marci took his arm and dragged him back toward the cave mouth. He fought her, looking for the little Allen, not seeing him. Was that him, there, in the shadows? No, that was one of the little bone tableaux, a field mouse's dried bones splayed in an anatomically correct mystic hieroglyph. Marci hauled him away, out into the bright snow and the bright sun. His thumb was bleeding anew, dripping fat drops the color of a red crayon into the sun, blood so hot it seemed to sizzle and sink into the snow. # "You need to tell an adult, Alan," she said, wrapping his new little thumb in gauze she'd taken from her pocket. "My father knows. My mother knows." He sat with his head between his knees, not daring to look at her, in his nook in the winter cave. She just looked at him, squinting. "They count," he said. "They understand it." She shook her head. "They understand it better than any adult you know would. This will get better on its own, Marci. Look." He wiggled his thumb at her. It was now the size of the tip of his pinky, and had a well-formed nail and cuticle. "That's not all that has to get better," she said. "You can't just let this fester. Your brother. That *thing* in the cave..." She shook her head. "Someone needs to know about this. You're not safe." "Promise me you won't tell anyone, Marci. This is important. No one except you knows, and that's how it has to be. If you tell --" "What?" She got up and pulled her coat on. "What, Alan? If I tell and try to help you, what will you do to me?" "I don't know," he mumbled into his chest. "Well, you do whatever you have to do," she said, and stomped out of the cave. # Davey escaped at dawn. Kurt had gone outside to repark his old Buick, the trunk bungeed shut over his haul of LCD flat panels, empty laser-toner cartridges, and open gift baskets of pricey Japanese cosmetics. Alan and Davey just glared at each other, but then Davey closed his eyes and began to snore softly, and even though Alan paced and pinched the bridge of his nose and stretched out his injured arm, he couldn't help it when he sat down and closed his eyes and nodded off. Alan woke with a start, staring at the empty loops of duct tape and twine hanging from his captain's chair, dried strings of skin like desiccated banana peel fibers hanging from them. He swore to himself quietly, and shouted Shit! at the low basement ceiling. He couldn't have been asleep for more than a few seconds, and the half-window that Davey had escaped through gaped open at him like a sneer. He tottered to his feet and went out to find Kurt, bare feet jammed into sneakers, bare chest and bandages covered up with a jacket. He found Kurt cutting through the park, dragging his heels in the bloody dawn light. Kurt looked at his expression, then said, "What happened?" He had his fists at his sides, he looked tensed to run. Alan felt that he was waiting for an order. "He got away." "How?" Alan shook his head. "Can you help me get dressed? I don't think I can get a shirt on by myself." They went to the Greek's, waiting out front on the curb for the old man to show up and unchain the chairs and drag them out around the table. He served them tall coffees and omelets sleepily, and they ate in silence, too tired to talk. "Let me take you to the doctor?" Kurt asked, nodding at the bandage that bulged under his shirt. "No," Alan said. "I'm a fast healer." Kurt rubbed at his calf and winced. "He broke the skin," he said. "You got all your shots?" "Hell yeah. Too much crap in the dumpsters. I once found a styro cooler of smashed blood vials in a Red Cross trash." "You'll be okay, then," Alan said. He shifted in his seat and winced. He grunted a little ouch. Kurt narrowed his eyes and shook his head at him. "This is pretty fucked up right here," Kurt said, looking down into his coffee. "It's only a little less weird for me, if that's any comfort." "It's not," Kurt said. "Well, that's why I don't usually tell others. You're only the second person to believe it." "Maybe I could meet up with the first and form a support group?" Alan pushed his omelet away. "You can't. She's dead." # Davey haunted the schoolyard. Alan had always treated the school and its grounds as a safe haven, a place where he could get away from the inexplicable, a place where he could play at being normal. But now Davey was everywhere, lurking in the climber, hiding in the trees, peering through the tinsel-hung windows during class. Alan only caught the quickest glimpses of him, but he had the sense that if he turned his head around quickly enough, he'd see him. Davey made himself scarce in the mountain, hiding in the golems' cave or one of the deep tunnels. Marci didn't come to class after Monday. Alan fretted every morning, waiting for her to turn up. He worried that she'd told her father, or that she was at home sulking, too angry to come to school, glaring at her Christmas tree. Davey's grin was everywhere. On Wednesday, he got called into the vice principal's office. As he neared it, he heard the rumble of Marci's father's thick voice and his heart began to pound in his chest. He cracked the door and put his face in the gap, looking at the two men there: Mr. Davenport, the vice principal, with his gray hair growing out his large ears and cavernous nostrils, sitting behind his desk, looking awkwardly at Marci's father, eyes bugged and bagged and bloodshot, face turned to the ground, looking like a different man, the picture of worry and loss. Mr. Davenport saw him and crooked a finger at him, looking stern and stony. Alan was sure, then, that Marci'd told it all to her father, who'd told it all to Mr. Davenport, who would tell the world, and suddenly he was jealous of his secret, couldn't bear to have it revealed, couldn't bear the thought of men coming to the mountain to catalogue it for the subject index at the library, to study him and take him apart. And he was... afraid. Not of what they'd all do to him. What Davey would do to them. He knew, suddenly, that Davey would not abide their secrets being disclosed. He forced himself forward, his feet dragging like millstones, and stood between the two men, hands in his pockets, nervously twining at his underwear. "Alan," Marci's father croaked. Mr. Davenport held up a hand to silence him. "Alan," Mr. Davenport said. "Have you seen Marci?" Alan had been prepared to deny everything, call Marci a liar, betray her as she'd betrayed him, make it her word against his. Protect her. Protect her father and the school and the town from what Davey would do. Now he whipped his head toward Marci's father, suddenly understanding. "No," he said. "Not all week! Is she all right?" Marci's father sobbed, a sound Alan had never heard an adult make. And it came tumbling out. No one had seen Marci since Sunday night. Her presumed whereabouts had moved from a friend's place to Alan's place to runaway to fallen in a lake to hit by a car and motionless in a ditch, and if Alan hadn't seen her -- "I haven't," Alan said. "Not since the weekend. Sunday morning. She said she was going home." Another new sound, the sound of an adult crying. Marci's father, and his sobs made his chest shake and Mr. Davenport awkwardly came from behind his desk and set a box of kleenexes on the hard bench beside him. Alan caught Mr. Davenport's eye and the vice principal made a shoo and pointed at the door. # Alan didn't bother going back to class. He went straight to the golems' cave, straight to where he knew Davey would be -- must be -- hiding, and found him there, playing with the bones that lined the walls. "Where is she?" Alan said, after he'd taken hold of Davey's hair and, without fanfare, smashed his face into the cold stone floor hard enough to break his nose. Alan twisted his wrists behind his back and when he tried to get up, Alan kicked his legs out from under him, wrenching his arms in their sockets. He heard a popping sound. "Where is she?" Alan said again, amazing himself with his own calmness. Davey was crying now, genuinely scared, it seemed, and Alan reveled in the feeling. "I'll kill you," he whispered in Davey's ear, almost lovingly. "I'll kill you and put the body where no one will find it, unless you tell me where she is." Davey spat out a milk tooth, his right top incisor, and cried around the blood that coursed down his face. "I'm -- I'm *sorry,* Alan," he said. "But it was the *secret*." His sobs were louder and harsher than Marci's father's had been. "Where is she?" Alan said, knowing. "With Caleb," Davey said. "I buried her in Caleb." He found his brother the island midway down the mountain, sliding under cover of winter for the seaway. He climbed the island's slope, making for the ring of footprints in the snow, the snow peppered brown with soil and green with grass, and he dug with his hands like a dog, tossing snow soil grass through his legs, digging to loose soil, digging to a cold hand. A cold hand, protruding from the snow now, from the soil, some of the snow red-brown with blood. A skinny, freckled hand, a fingernail missing, torn off leaving behind an impression, an inverse fingernail. A hand, an arm. Not attached to anything. He set it to one side, dug, found another hand. Another arm. A leg. A head. She was beaten, bruised, eyes swollen and two teeth missing, ear torn, hair caked with blood. Her beautiful head fell from his shaking cold hands. He didn't want to dig anymore, but he had to, because it was the secret, and it had to be kept, and -- -- he buried her in Caleb, piled dirt grass snow on her parts, and his eyes were dry and he didn't sob. # It was a long autumn and a long winter and a long spring that year, unwiring the Market. Alan fell into the familiar rhythm of the work of a new venture, rising early, dossing late, always doing two or three things at once: setting up meetings, sweet-talking merchants, debugging his process on the fly. His first victory came from the Greek, who was no pushover. The man was over seventy, and had been pouring lethal coffee and cheap beer down the throats of Kensington's hipsters for decades and had steadfastly refused every single crackpot scheme hatched by his customers. "Larry," Andy said, "I have a proposal for you and you're going to hate it." "I hate it already," the Greek said. His dapper little mustache twitched. It was not even seven a.m. yet, and the Greek was tinkering with the guts of his espresso delivery system, making it emit loud hisses and tossing out evil congealed masses of sin-black coffee grounds. "What if I told you it wouldn't cost you anything?" "Maybe I'd hate it a little less." "Here's the pitch," Alan said, taking a sip of the thick, steaming coffee the Greek handed to him in a minuscule cup. He shivered as the stuff coated his tongue. "Wow." The Greek gave him half a smile, which was his version of roaring hilarity. "Here's the pitch. Me and that punk kid, Kurt, we're working on a community Internet project for the Market." "Computers?" the Greek said. "Yup," Alan said. "Pah," the Greek said. Anders nodded. "I knew you were going to say that. But don't think of this as a computer thing, okay? Think of this as a free speech thing. We're putting in a system to allow people all over the Market -- and someday, maybe, the whole city -- to communicate for free, in private, without permission from anyone. They can send messages, they can get information about the world, they can have conversations. It's like a library and a telephone and a café all at once." Larry poured himself a coffee. "I hate when they come in here with computers. They sit forever at their tables, and they don't talk to nobody, it's like having a place full of statues or zombies." "Well, *sure*," Alan said. "If you're all alone with a computer, you're just going to fall down the rabbit hole. You're in your own world and cut off from the rest of the world. But once you put those computers on the network, they become a way to talk to anyone else in the world. For free! You help us with this network -- all we want from you is permission to stick up a box over your sign and patch it into your power, you won't even know it's there -- and those customers won't be antisocial, they'll be socializing, over the network." "You think that's what they'll do if I help them with the network?" He started to say, *Absolutely*, but bit it back, because Larry's bullshit antennae were visibly twitching. "No, but some of them will. You'll see them in here, talking, typing, typing, talking. That's how it goes. The point is that we don't know how people are going to use this network yet, but we know that it's a social benefit." "You want to use my electricity?" "Well, yeah." "So it's not free." "Not entirely," Alan said. "You got me there." "Aha!" the Greek said. "Look, if that's a deal breaker, I'll personally come by every day and give you a dollar for the juice. Come on, Larry -- the box we want to put in, it's just a repeater to extend the range of the network. The network already reaches to here, but your box will help it go farther. You'll be the first merchant in the Market to have one. I came to you first because you've been here the longest. The others look up to you. They'll see it and say, 'Larry has one, it must be all right.'" The Greek downed his coffee and smoothed his mustache. "You are a bullshit artist, huh? All right, you put your box in. If my electricity bills are too high, though, I take it down." "That's a deal," Andy said. "How about I do it this morning, before you get busy? Won't take more than a couple minutes." The Greek's was midway between his place and Kurt's, and Kurt hardly stirred when he let himself in to get an access point from one of the chipped shelving units before going back to his place to get his ladder and Makita drill. It took him most of the morning to get it securely fastened over the sign, screws sunk deep enough into the old, spongy wood to survive the build up of ice and snow that would come with the winter. Then he had to wire it into the sign, which took longer than he thought it would, too, but then it was done, and the idiot lights started blinking on the box Kurt had assembled. "And what, exactly, are you doing up there, Al?" Kurt said, when he finally stumbled out of bed and down the road for his afternoon breakfast coffee. "Larry's letting us put up an access point," he said, wiping the pigeon shit off a wire preparatory to taping it down. He descended the ladder and wiped his hands off on his painter's pants. "That'll be ten bucks, please." Kurt dug out a handful of coins and picked out enough loonies and toonies to make ten dollars, and handed it over. "You talked the Greek into it?" he hissed. "How?" "I kissed his ass without insulting his intelligence." "Neat trick," Kurt said, and they had a little partner-to-partner high-five. "I'd better login to that thing and get it onto the network, huh?" "Yeah," Anders said. "I'm gonna order some lunch, lemme get you something." # What they had done, was they had hacked the shit out of those boxes that Kurt had built in his junkyard of a storefront of an apartment. "These work?" Alan said. He had three of them in a big catering tub from his basement that he'd sluiced clean. The base stations no longer looked like they'd been built out of garbage. They'd switched to low-power Mini-ATX motherboards that let them shrink the hardware down to small enough to fit in a 50-dollar all-weather junction box from Canadian Tire. Adam vaguely recognized the day's street-kids as regulars who'd been hanging around the shop for some time, and they gave him the hairy eyeball when he had the audacity to question Kurt. These kids of Kurt's weren't much like the kids he'd had working for him over the years. They might be bright, but they were a lot...angrier. Some of the girls were cutters, with knife scars on their forearms. Some of the boys looked like they'd been beaten up a few times too many on the streets, like they were spoiling for a fight. Alan tried to unfocus his eyes when he was in the front of Kurt's shop, to not see any of them too closely. "They work," Kurt said. He smelled terrible, a combination of garbage and sweat, and he had the raccoon-eyed jitters he got when he stayed up all night. "I tested them twice." "You built me a spare?" Alan said, examining the neat lines of hot glue that gasketed the sturdy rubberized antennae in place, masking the slightly melted edges left behind by the drill press. "You don't need a spare," Kurt said. Alan knew that when he got touchy like this, he had to be very careful or he'd blow up, but he wasn't going to do another demo Kurt's way. They'd done exactly one of those, at a Toronto District School Board superintendents meeting, when Alan had gotten the idea of using schools' flagpoles and backhaul as test beds for building out the net. It had been a debacle, needless to say. Two of the access points had been permanently installed on either end of Kurt's storefront and the third had been in storage for a month since it was last tested. One of the street kids, a boy with a pair of improbably enormous raver shoes, looked up at Alan. "We've tested these all. They work." Kurt puffed up and gratefully socked the kid in the shoulder. "We did." "Fine," Adam said patiently. "But can we make sure they work now?" "They'll work," Kurt had said when Alan told him that he wanted to test the access points out before they took them to the meeting. "It's practically solid-state. They're running off the standard distribution. There's almost no configuration." Which may or may not have been true -- it certainly sounded plausible to Alan's lay ear -- but it didn't change the fact that once they powered up the third box, the other two seized up and died. The blinking network lights fell still, and as Kurt hauled out an old VT-100 terminal and plugged it into the serial ports on the backs of his big, ugly, bestickered, and cig-burned PC cases, it became apparent that they had ceased to honor all requests for routing, association, deassociation, DHCP leases, and the myriad of other networking services provided for by the software. "It's practically solid-state," Kurt said, nearly *shouted*, after he'd powered down the third box and found that the other two -- previously routing and humming along happily -- refused to come back up into their known-good state. He gave Alan a dirty look, as though his insistence on preflighting were the root of their problems. The street-kid who'd spoken up had jumped when Kurt raised his voice, then cringed away. Now as Kurt began to tear around the shop, looking through boxes of CDs and dropping things on the floor, the kid all but cowered, and the other three all looked down at the table. "I'll just reinstall," Kurt said. "That's the beauty of these things. It's a standard distro, I just copy it over, and biff-bam, it'll come right back up. No problem. Take me ten minutes. We've got plenty of time." Then, five minutes later, "Shit, I forgot that this one has a different mo-bo than the others." "Mo-bo?" Alan said, amused. He'd spotted the signs of something very finicky gone very wrong and he'd given up any hope of actually doing the demo, so he'd settled in to watch the process without rancor and to learn as much as he could. "Motherboard," Kurt said, reaching for a spool of blank CDs. "Just got to patch the distribution, recompile, burn it to CD, and reboot, and we're on the road." Ten minutes later, "Shit." "Yes?" Alan said. "Back off, okay?" "I'm going to call them and let them know we're going to be late." "We're *not* going to be late," Kurt said, his fingers going into claws on the keyboard. "We're already late," Alan said. "Shit," Kurt said. "Let's do this," Alan said. "Let's bring down the two that you've got working and show them those, and explain the rest." They'd had a fight, and Kurt had insisted, as Alan had suspected he would, that he was only a minute or two away from bringing everything back online. Alan kept his cool, made mental notes of the things that went wrong, and put together a plan for avoiding all these problems the next time around. "Is there a spare?" Alan said. Kurt sneered and jerked a thumb at his workbench, where another junction box sat, bunny-ear antennae poking out of it. Alan moved it into his tub. "Great," he said. "Tested, right?" "All permutations tested and ready to go. You know, you're not the boss around here." "I know it," he said. "Partners." He clapped Kurt on the shoulder, ignoring the damp gray grimy feeling of the clammy T-shirt under his palm. The shoulder under his palm sagged. "Right," Kurt said. "Sorry." "Don't be," Alan said. "You've been hard at it. I'll get loaded while you wash up. Kurt sniffed at his armpit. "Whew," he said. "Yeah, okay." When Kurt emerged from the front door of his storefront ten minutes later, he looked like he'd at least made an effort. His mohawk and its fins were slicked back and tucked under a baseball hat, his black jeans were unripped and had only one conservative chain joining the wallet in his back pocket to his belt loop. Throw in a clean t-shirt advertising an old technology conference instead of the customary old hardcore band and you had an approximation of the kind of geek that everyone knew was in possession of secret knowledge and hence must be treated with attention, if not respect. "I feel like such a dilbert," he said. "You look totally disreputable," Alan said, hefting the tub of their access points into the bed of his truck and pulling the bungees tight around it. "Punk as fuck." Kurt grinned and ducked his head. "Stop it," he said. "Flatterer." "Get in the truck," Alan said. Kurt drummed his fingers nervously on his palms the whole way to Bell offices. Alan grabbed his hand and stilled it. "Stop worrying," he said. "This is going to go great." "I still don't understand why we're doing this," Kurt said. "They're the phone company. They hate us, we hate them. Can't we just leave it that way?" "Don't worry, we'll still all hate each other when we get done." "So why bother?" He sounded petulant and groggy, and Alan reached under his seat for the thermos he'd had filled at the Greek's before heading to Kurt's place. "Coffee," he said, and handed it to Kurt, who groaned and swigged and stopped bitching. "Why bother is this," Alan said. "We're going to get a lot of publicity for doing this." Kurt snorted into the thermos. "It's going to be a big deal. You know how big a deal this can be. We're going to communicate that to the press, who will communicate it to the public, and then there will be a shitstorm. Radio cops, telco people, whatever -- they're going to try to discredit us. I want to know what they're liable to say." "Christ, you're dragging me out for that? I can tell you what they'll say. They'll drag out the Four Horsemen of the Infocalypse: kiddie porn, terrorists, pirates, and the mafia. They'll tell us that any tool for communicating that they can't tap, log, and switch off is irresponsible. They'll tell us we're stealing from ISPs. It's what they say every time someone tries this: Philly, New York, London. All around the world same song." Alan nodded. "That's good background -- thanks. I still want to know *how* they say it, what the flaws are in their expression of their argument. And I wanted us to run a demo for some people who we could never hope to sway -- that's a good audience for exposing the flaws in the show. This'll be a good prep session." "So I pulled an all-nighter and busted my nuts to produce a demo for a bunch of people we don't care about? Thanks a lot." Alan started to say something equally bitchy back, and then he stopped himself. He knew where this would end up -- a screaming match that would leave both of them emotionally overwrought at a time when they needed cool heads. But he couldn't think of what to tell Kurt in order to placate him. All his life, he'd been in situations like this: confronted by people who had some beef, some grievance, and he'd had no answer for it. Usually he could puzzle out the skeleton of their cause, but sometimes -- times like this -- he was stumped. He picked at the phrase. *I pulled an all-nighter*. Kurt pulled an all-nighter because he'd left this to the last minute, not because Alan had surprised him with it. He knew that, of course. Was waiting, then, for Alan to bust him on it. To tell him, *This is your fault, not mine.* To tell him *If this demo fails, it's because you fucked off and left it to the last minute.* So he was angry, but not at Alan, he was angry at himself. *A bunch of people we don't care about,* what was that about? Ah. Kurt knew that they didn't take him seriously in the real world. He was too dirty, too punk-as-fuck, too much of his identity was wrapped up in being alienated and alienating. But he couldn't make his dream come true without Alan's help, either, and so Alan was the friendly face on their enterprise, and he resented that -- feared that in order to keep up his appearance of punk-as-fuckitude, he'd have to go into the meeting cursing and sneering and that Alan would bust him on that, too. Alan frowned at the steering wheel. He was getting better at understanding people, but that didn't make him necessarily better at being a person. What should he say here? "That was a really heroic effort, Kurt," he said, biting his lip. "I can tell you put a lot of work into it." He couldn't believe that praise this naked could possibly placate someone of Kurt's heroic cynicism, but Kurt's features softened and he turned his face away, rolled down the window, lit a cigarette. "I thought I'd never get it done," Kurt said. "I was so sleepy, I felt like I was half-baked. Couldn't concentrate." *You were up all night because you left it to the last minute*, Alan thought. But Kurt knew that, was waiting to be reassured about it. "I don't know how you get as much done as you do. Must be really hard." "It's not so bad," Kurt said, dragging on his cigarette and not quite disguising his grin. "It gets easier every time." "Yeah, we're going to get this down to a science someday," Alan said. "Something we can teach anyone to do." "That would be so cool," Kurt said, and put his boots up on the dash. "God, you could pick all the parts you needed out of the trash, throw a little methodology at them, and out would pop this thing that destroyed the phone company." "This is going to be a fun meeting," Alan said. "Shit, yeah. They're going to be terrified of us." "Someday. Maybe it starts today." # The Bell boardroom looked more like a retail operation than a back office, decked out in brand-consistent livery, from the fabric-dyed rag carpets to the avant-garde lighting fixtures. They were given espressos by the young secretary-barista whose skirt-and-top number was some kind of reinterpreted ravewear outfit toned down for a corporate workplace. "So this is the new Bell," Kurt said, once she had gone. "Our tax dollars at work." "This is good work," Alan said, gesturing at the blown-up artwork of pan-ethnic models who were extraordinary- but not beautiful-looking on the walls. The Bell redesign had come at the same time as the telco was struggling back from the brink of bankruptcy, and the marketing firm they'd hired to do the work had made its name on the strength of the campaign. "Makes you feel like using a phone is a really futuristic, cutting-edge activity," he said. His contact at the semiprivatized corporation was a young kid who shopped at one of his protégés' designer furniture store. He was a young turk who'd made a name for himself quickly in the company through a couple of ISP acquisitions at fire-sale prices after the dot-bomb, which he'd executed flawlessly, integrating the companies into Bell's network with hardly a hiccup. He'd been very polite and guardedly enthusiastic when Alan called him, and had invited him down to meet some of his colleagues. Though Alan had never met him, he recognized him the minute he walked in as the person who had to go with the confident voice he'd heard on the phone. "Lyman," he said, standing up and holding out his hand. The guy was slightly Asian-looking, tall, with a sharp suit that managed to look casual and expensive at the same time. He shook Alan's hand and said, "Thanks for coming down." Alan introduced him to Kurt, and then Lyman introduced them both to his colleagues, a gender-parity posse of young, smart-looking people, along with one graybeard (literally -- he had a Unix beard of great rattiness and gravitas) who had no fewer than seven devices on his belt, including a line tester and a GPS. Once they were seated, Alan snuck a look at Kurt, who had narrowed his eyes and cast his gaze down onto the business cards he'd been handed. Alan hadn't been expecting this -- he'd figured on finding himself facing down a group of career bureaucrats -- and Kurt was clearly thrown for a loop, too. "Well, Alan, Kurt, it's nice to meet you," Lyman said. "I hear you're working on some exciting stuff." "We are," Alan said. "We're building a city-wide mesh wireless network using unlicensed spectrum that will provide high-speed, Internet connectivity absolutely gratis." "That's ambitious," Lyman said, without the skepticism that Alan had assumed would greet his statement. "How's it coming?" "Well, we've got a bunch of Kensington Market covered," Alan said. "Kurt's been improving the hardware design and we've come up with something cheap and reproducible." He opened his tub and handed out the access points, housed in gray high-impact plastic junction boxes. Lyman accepted one solemnly and passed it on to his graybeard, then passed the next to an East Indian woman in horn-rim glasses whose bitten-down fingernails immediately popped the latch and began lightly stroking the hardware inside, tracing the connections. The third landed in front of Lyman himself. "So, what do they do?" Alan nodded at Kurt. Kurt put his hands on the table and took a breath. "They've got three network interfaces; we can do any combination of wired and wireless cards. The OS is loaded on a flash-card; it auto-detects any wireless cards and auto-configures them to seek out other access points. When it finds a peer, they negotiate a client-server relationship based on current load, and the client then associates with the server. There's a key exchange that we use to make sure that rogue APs don't sneak into the mesh, and a self-healing routine we use to switch routes if the connection drops or we start to see too much packet loss." The graybeard looked up. "It izz a radio vor talking to Gott!" he said. Lyman's posse laughed, and after a second, so did Kurt. Alan must have looked puzzled, for Kurt elbowed him in the ribs and said, "It's from Indiana Jones," he said. "Ha," Alan said. That movie had come out long before he'd come to the city -- he hadn't seen a movie until he was almost 20. As was often the case, the reference to a film made him feel like a Martian. The graybeard passed his unit on to the others at the table. "Does it work?" he said. "Yeah," Kurt said. "Well, that's pretty cool," he said. Kurt blushed. "I didn't write the firmware," he said. "Just stuck it together from parts of other peoples' projects." "So, what's the plan?" Lyman said. "How many of these are you going to need?" "Hundreds, eventually," Alan said. "But for starters, we'll be happy if we can get enough to shoot down to 151 Front." "You're going to try to peer with someone there?" The East Indian woman had plugged the AP into a riser under the boardroom table and was examining its blinkenlights. "Yeah," Alan said. "That's the general idea." He was getting a little uncomfortable -- these people weren't nearly hostile enough to their ideas. "Well, that's very ambitious," Lyman said. His posse all nodded as though he'd paid them a compliment, though Alan wasn't sure. Ambitious could certainly be code for "ridiculous." "How about a demo?" the East Indian woman said. "Course," Kurt said. He dug out his laptop, a battered thing held together with band stickers and gaffer tape, and plugged in a wireless card. The others started to pass him back his access points but he shook his head. "Just plug 'em in," he said. "Here or in another room nearby -- that'll be cooler." A couple of the younger people at the table picked up two of the APs and headed for the hallway. "Put one on my desk," Lyman told them, "and the other at reception." Alan felt a sudden prickle at the back of his neck, though he didn't know why -- just a random premonition that they were on the brink of something very bad happening. This wasn't the kind of vision that Brad would experience, that far away look followed by a snap-to into the now, eyes filled with certitude about the dreadful future. More like a goose walking over his grave, a tickle of badness. The East Indian woman passed Kurt a VGA cable that snaked into the table's guts and down into the riser on the floor. She hit a button on a remote and an LCD projector mounted in the ceiling began to hum, projecting a rectangle of white light on one wall. Kurt wiggled it into the backside of his computer and spun down the thumbscrews, hit a button, and then his desktop was up on the wall, ten feet high. His wallpaper was a picture of a group of black-clad, kerchiefed protesters charging a police line of batons and gas-grenades. A closer look revealed that the protester running in the lead was probably Kurt. He tapped at his touchpad and a window came up, showing relative strength signals for two of the access points. A moment later, the third came online. "I've been working with this network visualizer app," Kurt said. "It tries to draw logical maps of the network topology, with false coloring denoting packet loss between hops -- that's a pretty good proxy for distance between two APs." "More like the fade," the graybeard said. "Fade is a function of distance," Kurt said. Alan heard the dismissal in his voice and knew they were getting into a dick-swinging match. "Fade is a function of geography and topology," the graybeard said quietly. Kurt waved his hand. "Whatever -- sure. Geography. Topology. Distance. It's a floor wax and a dessert topping." "I'm not being pedantic," the graybeard said. "You're not just being pedantic," Lyman said gently, watching the screen on which four animated jaggy boxes were jumbling and dancing as they reported on the throughput between the routers and the laptop. "Not just pedantic," the graybeard said. "If you have a *lot* of these boxes in known locations with known nominal throughput, you can use them as a kind of sensor array. When throughput drops between point foo and point bar, it will tell you something about the physical world between foo and bar." Kurt looked up from his screen with a thoughtful look. "Huh?" "Like, whether a tree had lost its leaves in the night. Or whether there were a lot of people standing around in a normally desolate area. Or whether there are lots of devices operating between foo and bar that are interfering with them." Kurt nodded slowly. "The packets we lose could be just as interesting as the packets we don't lose," he said. A light went on in Alan's head. "We could be like jazz critics, listening to the silences instead of the notes," he said. They all looked at him. "That's very good," Lyman said. "Like a jazz critic." He smiled. Alan smiled back. "What are we seeing, Craig?" Lyman said. "Kurt," Alan said. "Right, Kurt," he said. "Sorry." "We're seeing the grid here. See how the access points go further up the spectrum the more packets they get? I'm associated with that bad boy right there." He gestured to the box blinking silently in the middle of the board room table. "And it's connected to one other, which is connected to a third." Lyman picked up his phone and dialed a speed-dial number. "Hey, can you unplug the box on my desk?" A moment later, one of the boxes on the display winked out. "Watch this," Kurt said, as the remaining two boxes were joined by a coruscating line. "See that? Self-healing. Minimal packet loss. Beautiful." "That's hot," Lyman said. "That makes me all wet." They chuckled nervously at his crudity. "Seriously." "Here," Kurt said, and another window popped up, showing twenty or more boxes with marching ant trails between them. "That's a time-lapse of the Kensington network. The boxes are running different versions of the firmware, so you can see that in some edge cases, you get a lot more oscillation between two similar signals. We fixed that in the new version." The graybeard said, "How?" "We flip a coin," Kurt said, and grinned. "These guys in Denmark ran some simulations, proved that a random toss-up worked as well as any other algorithm, and it's a lot cheaper, computationally." "So what's going on just to the northeast of center?" Alan paid attention to the patch of screen indicated. Three access points were playing musical chairs, dropping signal and reacquiring it, dropping it again. Kurt shrugged. "Bum hardware, I think. We've got volunteers assembling those boxes, from parts." "Parts?" Kurt's grin widened. "Yeah. From the trash, mostly. I dumpster-dive for 'em." They grinned back. "That's very hot," Lyman said. "We're looking at normalizing the parts for the next revision," Alan said. "We want to be able to use a single distro that works on all of them." "Oh, sure," Lyman said, but he looked a little disappointed, and so did Kurt. "Okay, it works," Lyman said. "It works?" he said, nodding the question at his posse. They nodded back. "So what can we do for you?" Alan chewed his lip, caught himself at it, stopped. He'd anticipated a slugfest, now he was getting strokes. "How come you're being so nice to us?" Kurt said. "You guys are The Man." He shrugged at Alan. "Someone had to say it." Lyman smiled. "Yeah, we're the phone company. Big lumbering dinosaur that is thrashing in the tarpit. The spazz dinosaur that's so embarrassed all the other dinosaurs that none of them want to rescue us." "Heh, spazz dinosaur," the East Indian woman said, and they all laughed. "Heh," Kurt said. "But seriously." "Seriously," Lyman said. "Seriously. Think a second about the scale of a telco. Of this telco. The thousands of kilometers of wire in the ground. Switching stations. Skilled linesmen and cable-pullers. Coders. Switches. Backhaul. Peering arrangements. We've got it all. Ever get on a highway and hit a flat patch where you can't see anything to the horizon except the road and the telephone poles and the wires? Those are *our wires*. It's a lot of goodness, especially for a big, evil phone company. "So we've got a lot of smart hackers. A lot of cool toys. A gigantic budget. The biggest network any of us could ever hope to manage -- like a model train set the size of a city. "That said, we're hardly nimble. Moving a Bell is like shifting a battleship by tapping it on the nose with a toothpick. It can be done, but you can spend ten years doing it and still not be sure if you've made any progress. From the outside, it's easy to mistake 'slow' for 'evil.' It's easy to make that mistake from the inside, too. "But I don't let it get me down. It's *good* for a Bell to be slow and plodding, most of the time. You don't want to go home and discover that we've dispatched the progress-ninjas to upgrade all your phones with video screens and a hush mode that reads your thoughts. Most of our customers still can't figure out voice mail. Some of them can't figure out touch-tone dialing. So we're slow. Conservative. But we can do lots of killer R&D, we can roll out really hot upgrades on the back end, and we can provide this essential service to the world that underpins its ability to communicate. We're not just cool, we're essential. "So you come in and you show us your really swell and interesting meshing wireless data boxes, and I say, 'That is damned cool.' I think of ways that it could be part of a Bell's business plan in a couple decades' time." "A couple decades?" Kurt squawked. "Jesus Christ, I expect to have a chip in my brain and a jetpack in a couple decades' time." "Which is why you'd be an idiot to get involved with us," Lyman said. "Who wants to get involved with you?" Kurt said. "No one," Alan said, putting his hands on the table, grateful that the conflict had finally hove above the surface. "That's not what we're here for." "Why are you here, Alvin?" Lyman said. "We're here because we're going into the moving-data-around trade, in an ambitious way, and because you folks are the most ambitious moving-data-around tradespeople in town. I thought we'd come by and let you know what we're up to, see if you have any advice for us." "Advice, huh?" "Yeah. You've got lots of money and linesmen and switches and users and so forth. You probably have some kind of well-developed cosmology of connectivity, with best practices and philosophical ruminations and tasty metaphors. And I hear that you, personally, are really good at making geeks and telcos play together. Since we're going to be a kind of telco" -- Kurt startled and Alan kicked him under the table -- "I thought you could help us get started right." "Advice," Lyman said, drumming his fingers. He stood up and paced. "One: don't bother. This is at least two orders of magnitude harder than you think it is. There aren't enough junk computers in all of Toronto's landfills to blanket the city in free wireless. The range is nothing but three hundred feet, right? Less if there are trees and buildings, and this city is all trees and buildings. "Two: don't bother. The liability here is stunning. The gear you're building is nice and all, but you're putting it into people's hands and you've got no idea what they're going to do with it. They're going to hack in bigger antennae and signal amplifiers. The radio cops will be on your ass day and night. "What's more, they're going to open it up to the rest of the world and any yahoo who has a need to hide what he's up to is going to use your network to commit unspeakable acts -- you're going to be every pirate's best friend and every terrorist's safest haven. "Three: don't bother. This isn't going to work. You've got a cute little routing algorithm that runs with three nodes, and you've got a model that may scale up to 300, but by the time you get to 30 thousand, you're going to be hitting so much latency and dropping so many packets on the floor and incurring so much signaling overhead that it'll be a gigantic failure. "You want my advice? Turn this into a piece of enterprise technology: a cheap way of rolling out managed solutions in hotels and office towers and condos -- building-wide meshes, not city-wide. Those guys will pay -- they pay a hundred bucks per punchdown now for wired networking, so they'll gladly cough up a thousand bucks a floor for these boxes, and you'll only need one on every other story. And those people *use* networks, they're not joe consumer who doesn't have the first clue what to do with a network connection." Kurt had stiffened up when the rant began, and once he heard the word "consumer," he began to positively vibrate. Alan gave him a warning nudge with his elbow. "You're shitting me, right?" Kurt said. "You asked me for advice --" Lyman said, mildly. "You think we're going to bust our balls to design and deploy all this hardware so that business hotels can save money on cable-pullers? Why the hell would we want to do that?" "Because it pays pretty well," Lyman said. He was shaking his head a little, leaning back from the table, and his posse picked up on it, going slightly restless and fidgety, with a room-wide rustle of papers and clicking of pens and laptop latches. Alan held up his hand. "Lyman, I'm sorry, we've been unclear. We're not doing this as a money-making venture --" Kurt snorted. "It's about serving the public interest. We want to give our neighbors access to tools and ideas that they wouldn't have had before. There's something fundamentally undemocratic about charging money for communications: It means that the more money you have, the more you get to communicate. So we're trying to fix that, in some small way. We are heartily appreciative of your advice, though --" Lyman held up a hand. "Sorry, Alan, I don't mean to interrupt, but there was something I wanted to relate to you two, and I've got to go in about five minutes." Apparently, the meeting was at an end. "And I had made myself a note to tell you two about this when I discovered it last week. Can I have the floor?" "Of course," Alan said. "I took a holiday last week," Lyman said. "Me and my girlfriend. We went to Switzerland to see the Alps and to visit her sister, who's doing something for the UN in Geneva. So her sister, she's into, I don't know, saving children from vampires in Afghanistan or something, and she has Internet access at the office, and can't see any reason to drop a connection in at home. So there I was, wandering the streets of Geneva at seven in the morning, trying to find a WiFi connection so I can get my email and find out how many ways I can enlarge my penis this week. "No problem -- outside every hotel and most of the cafés, I can find a signal for a network called Swisscom. I log on to the network and I fire up a browser and I get a screen asking me for my password. Well, I don't have one, but after poking around, I find out that I can buy a card with a temporary password on it. So I wait until some of the little smoke shops open and start asking them if they sell Swisscom Internet Cards, in my terrible, miserable French, and after chuckling at my accent, they look at me and say, 'I have no clue what you're talking about,' shrug, and go back to work. "Then I get the idea to go and ask at the hotels. The first one, the guy tells me that they only sell cards to guests, since they're in short supply. The cards are in short supply! Three hotels later, they allow as how they'll sell me a 30-minute card. Oh, that's fine. Thirty whole minutes of connectivity. Whoopee. And how much will that be? Only about a zillion Swiss pesos. Don't they sell cards of larger denominations? Oh sure, two hours, 24 hours, seven days -- and each one costs about double the last, so if you want, you can get a seven day card for about as much as you'd spend on a day's worth of connectivity in 30-minute increments -- about three hundred dollars Canadian for a week, just FYI. "Well, paying 300 bucks for a week's Internet is ghastly, but very Swiss, where they charge you if you have more than two bits of cheese at breakfast, and hell, I could afford it. But three hundred bucks for a day's worth of 30-minute cards? Fuck that. I was going to have to find a seven-day card or bust. So I ask at a couple more hotels and finally find someone who'll explain to me that Swisscom is the Swiss telco, and that they have a retail storefront a couple blocks away where they'd sell me all the cards I wanted, in whatever denominations I require. "By this time, it's nearly nine a.m. and I'm thinking that my girlfriend and her sister are probably up and eating a big old breakfast and wondering where the fuck I am, but I've got too much invested in this adventure to give up when I'm so close to finding the treasure. And so I hied myself off to the Swisscom storefront, which is closed, even though the sign says they open at nine and by now it's nine-oh-five, and so much for Swiss punctuality. But eventually this sneering kid with last year's faux-hawk comes out and opens the door and then disappears up the stairs at the back of the show room to the second floor, where I follow him. I get up to his counter and say, '*Pardonnez moi*,' but he holds up a hand and points behind me and says, 'Numero!' I make an elaborate shrug, but he just points again and says, '*Numero*!' I shrug again and he shakes his head like he's dealing with some kind of unbelievable moron, and then he steps out from behind his counter and stalks over to a little touchscreen. He takes my hand by the wrist and plants my palm on the touchscreen and a little ribbon of paper with zero-zero-one slides out. I take it and he goes back behind his counter and says, '*Numero un*!' "I can tell this is not going to work out, but I need to go through the motions. I go to the counter and ask for a seven-day card. He opens his cash drawer and paws through a pile of cards, then smiles and shakes his head and says, sorry, all sold out. My girlfriend is probably through her second cup of coffee and reading brochures for nature walks in the Alps at this point, so I say, fine, give me a one-day card. He takes a moment to snicker at my French, then says, so sorry, sold out those, too. Two hours? Nope. Half an hour? Oh, those we got. "Think about this for a second. I am sitting there with my laptop in hand, at six in the morning, on a Swiss street, connected to Swisscom's network, a credit card in my other hand, wishing to give them some money in exchange for the use of their network, and instead I have to go chasing up and down every hotel in Geneva for a card, which is not to be found. So I go to the origin of these cards, the Swisscom store, and they're sold out, too. This is not a T-shirt or a loaf of bread: there's no inherent scarcity in two-hour or seven-day cards. The cards are just a convenient place to print some numbers, and all you need to do to make more numbers is pull them out of thin air. They're just numbers. We have as many of them as we could possibly need. There's no sane, rational universe in which all the 'two-hour' numbers sell out, leaving nothing behind but '30-minute' numbers. "So that's pretty bad. It's the kind of story that net-heads tell about Bell-heads all around the world. It's the kind of thing I've made it my business to hunt down and exterminate here wherever I find it. So I just wrote off my email for that week and came home and downloaded a hundred thousand spams about my cock's insufficient dimensions and went in to work and I told everyone I could find about this, and they all smiled nervously and none of them seemed to find it as weird and ridiculous as me, and then, that Friday, I went into a meeting about our new high-speed WiFi service that we're piloting in Montreal and the guy in charge of the program hands out these little packages to everyone in the meeting, a slide deck and some of the marketing collateral and -- a little prepaid 30-minute access card. "That's what we're delivering. Prepaid cards for Internet access. *Complet avec* number shortages and business travelers prowling the bagel joints of Rue St Urbain looking for a shopkeeper whose cash drawer has a few seven-day cards kicking around. "And you come in here, and you ask me, you ask the ruling Bell, what advice do we have for your metro-wide free info-hippie wireless dumpster-diver anarcho-network? Honestly -- I don't have a fucking clue. We don't have a fucking clue. We're a telephone company. We don't know how to give away free communications -- we don't even know how to charge for it." "That was refreshingly honest," Kurt said. "I wanna shake your hand." He stood up and Lyman stood up and Lyman's posse stood up and they converged on the doorway in an orgy of handshaking and grinning. The graybeard handed over the access point, and the East Indian woman ran off to get the other two, and before they knew it, they were out on the street. "I liked him," Kurt said. "I could tell," Alan said. "Remember you said something about an advisory board? How about if we ask him to join?" "That is a *tremendous* and deeply weird idea, partner. I'll send out the invite when we get home." # Kurt said that the anarchist bookstore would be a slam dunk, but it turned out to be the hardest sell of all. "I spoke to them last month, they said they were going to run it down in their weekly general meeting. They love it. It's anarcho-radio. Plus, they all want high-speed connectivity in the store so they can webcast their poetry slams. Just go on by and introduce yourself, tell 'em I sent you." Ambrose nodded and skewered up a hunk of omelet and swirled it in the live yogurt the Greek served, and chewed. "All right," he said, "I'll do it this afternoon. You look exhausted, by the way. Hard night in the salt mines?" Kurt looked at his watch. "I got about an hour's worth of diving in. I spent the rest of the night breaking up with Monica." "Monica?" "The girlfriend." "Already? I thought you two just got together last month." Kurt shrugged. "Longest fucking month of my life. All she wanted to do was go clubbing all night. She hated staying over at my place because of the kids coming by in the morning to work on the access points." "I'm sorry, pal," Andy said. He never knew what to do about failed romance. He'd had no experience in that department since the seventh grade, after all. "You'll find someone else soon enough." "Too soon!" Kurt said. "We screamed at each other for five hours before I finally got gone. It was probably my fault. I lose my temper too easy. I should be more like you." "You're a good man, Kurt. Don't forget it." Kurt ground his fists into his eyes and groaned. "I'm such a fuck-up," he said. Alan tugged Kurt's hand away from his face. "Stop that. You're an extraordinary person. I've never met anyone who has the gifts you possess, and I've met some gifted people. You should be very proud of the work you're doing, and you should be with someone who's equally proud of you." Kurt visibly inflated. "Thanks, man." They gripped one another's hands for a moment. Kurt swiped at his moist eyes with the sleeve of his colorless grey sweatshirt. "Okay, it's way past my bedtime," he said. "You gonna go to the bookstore today?" "Absolutely. Thanks for setting them up." "It was about time I did some of the work, after you got the nut-shop and the cheese place and the Salvadoran pupusa place." "Kurt, I'm just doing the work that you set in motion. It's all you, this project. I'm just your helper. Sleep well." Andy watched him slouch off toward home, reeling a little from sleep deprivation and emotional exhaustion. He forked up the rest of his omelet, looked reflexively up at the blinkenlights on the AP over the Greek's sign, just above the apostrophe, where he'd nailed it up two months before. Since then, he'd nailed up five more, each going more smoothly than the last. At this rate, he'd have every main drag in the Market covered by summer. Sooner, if he could offload some of the labor onto one of Kurt's eager kids. He went back to his porch then, and watched the Market wake up. The traffic was mostly bicycling bankers stopping for a fresh bagel on their way down to the business district. The Market was quite restful. It shuffled like an old man in carpet slippers, setting up streetside produce tables, twiddling the dials of its many radios looking for something with a beat. He watched them roll past, the Salvadoran pupusa ladies, Jamaican Patty Kings, Italian butchers, Vietnamese pho-tenders, and any number of thrift-store hotties, crusty-punks, strung-out artistes, trustafarians and pretty-boy skaters. As he watched them go past, he had an idea that he'd better write his story soon, or maybe never. Maybe never nothing: Maybe this was his last season on earth. Felt like that, apocalyptic. Old debts, come to be settled. He shuffled upstairs and turned on the disused computer, which had sat on his desk for months and was therefore no longer top-of-the-line, no longer nearly so exciting, no longer so fraught with promise. Still, he made himself sit in his seat for two full hours before he allowed himself to get up, shower, dress, and head over to the anarchist bookstore, taking a slow route that gave him the chance to eyeball the lights on all the APs he'd installed. The anarchist bookstore opened lackadaisically at 11 or eleven-thirty or sometimes noon, so he'd brought along a nice old John D. MacDonald paperback with a gun-toting bikini girl on the cover to read. He liked MacDonald's books: You could always tell who the villainesses were because the narrator made a point of noting that they had fat asses. It was as good a way as any to shorthand the world, he thought. The guy who came by to open the store was vaguely familiar to Alfred, a Kensington stalwart of about forty, whose thrifted slacks and unraveling sweater weren't hip so much as they were just plain old down and out. He had a frizzed-out, no-cut haircut, and carried an enormous army-surplus backpack that sagged with beat-up lefty books and bags of organic vegetariania. "Hi there!" Arnold said pocketing the book and dusting off his hands. "Hey," the guy said into his stringy beard, fumbling with a keyring. "I'll be opening up in a couple minutes, okay? I know I'm late. It's a bad day. okay?" Arnold held his hands up, palms out. "Hey, no problem at all! Take as much time as you need. I'm in no hurry." The anarchist hustled around inside the shop, turning on lights, firing up the cash-register and counting out a float, switching on the coffee machine. Alan waited patiently by the doorway, holding the door open with his toe when the clerk hauled out a rack of discounted paperbacks and earning a dirty look for his trouble. "Okay, we're open," the anarchist said looking Alan in the toes. He turned around and banged back into the shop and perched himself behind the counter, opening a close-typed punk newspaper and burying his nose in it. Adam walked in behind him and stood at the counter, politely, waiting. The anarchist looked up from his paper and shook his head exasperatedly. "Yes?" Alan extended his hand. "Hi, I'm Archie, I work with Kurt, over on Augusta?" The anarchist stared at his hand, then shook it limply. "Okay," he said. "So, Kurt mentioned that he'd spoken to your collective about putting a wireless repeater up over your sign?" The anarchist shook his head. "We decided not to do that, okay." He went back to his paper. Andrew considered him for a moment. "So, what's your name?" "I don't like to give out my name," the anarchist said. "Call me Waldo, all right?" "All right," Andy said smiling. "That's fine by me. So, can I ask why you decided not to do it?" "It doesn't fit with our priorities. We're here to make print materials about the movement available to the public. They can get Internet access somewhere else. Internet access is for people who can afford computers, anyway." "Good point," Art said. "That's a good point. I wonder if I could ask you to reconsider, though? I'd love a chance to try to explain why this should be important to you." "I don't think so," Waldo said. "We're not really interested." "I think you *would* be interested, if it were properly explained to you." Waldo picked up his paper and pointedly read it, breathing heavily. "Thanks for your time," Avi said and left. # "That's *bullshit*," Kurt said. "Christ, those people --" "I assumed that there was some kind of politics," Austin said, "and I didn't want to get into the middle of it. I know that if I could get a chance to present to the whole group, that I could win them over." Kurt shook his head angrily. His shop was better organized now, with six access points ready to go and five stuck to the walls as a test bed for new versions of the software. A couple of geeky Korean kids were seated at the communal workbench, eating donuts and wrestling with drivers. "It's all politics with them. Everything. You should hear them argue about whether it's cool to feed meat to the store cat! Who was working behind the counter?" "He wouldn't tell me his name. He told me to call him --" "Waldo." "Yeah." "Well, that could be any of about six of them, then. That's what they tell the cops. They probably thought you were a narc or a fed or something." "I see." "It's not total paranoia. They've been busted before -- it's always bullshit. I raised bail for a couple of them once." Andrew realized that Kurt thought he was offended at being mistaken for a cop, but he got that. He was weird -- visibly weird. Out of place wherever he was. "So they owe me. Let me talk to them some more." "Thanks, Kurt. I appreciate it." "Well, you're doing all the heavy lifting these days. It's the least I can do." Alan clapped a hand on his shoulder. "None of this would exist without you, you know." He waved his hand to take in the room, the Korean kids, the whole Market. "I saw a bunch of people at the Greek's with laptops, showing them around to each other and drinking beers. In the park, with PDAs. I see people sitting on their porches, typing in the twilight. Crouched in doorways. Eating a bagel in the morning on a bench. People are finding it, and it's thanks to you." Kurt smiled a shy smile. "You're just trying to cheer me up," he said. "Course I am," Andy said. "You deserve to be full of cheer." # "Don't bother," Andy said. "Seriously, it's not worth it. We'll just find somewhere else to locate the repeater. It's not worth all the bullshit you're getting." "Screw that. They told me that they'd take one. They're the only ones *I* talked into it. My contribution to the effort. And they're fucking *anarchists* -- they've *got* to be into this. It's totally irrational!" He was almost crying. "I don't want you to screw up your friendships, Kurt. They'll come around on their own. You're turning yourself inside out over this, and it's just not worth it. Come on, it's cool." He turned around his laptop and showed the picture to Kurt. "Check it out, people with tails. An entire gallery of them!" There were lots of pictures like that on the net. None of people without belly buttons, though. Kurt took a pull off his beer. "Disgusting," he said and clicked through the gallery. The Greek looked over their shoulder. "It's real?" "It's real, Larry," Alan said. "Freaky, huh?" "That's terrible," the Greek said. "Pah." There were five or six other network users out on the Greek's, and it was early yet. By five-thirty, there'd be fifty of them. Some of them brought their own power strips so that they could share juice with their coreligionists. "You really want me to give up?" Kurt asked, once the Greek had given him a new beer and a scowling look over the litter of picked-at beer label on the table before him. "I really think you should," Alan said. "It's a poor use of time." Kurt looked ready to cry again. Adam had no idea what to say. "Okay," Kurt said. "Fine." He finished his beer in silence and slunk away. # But it wasn't fine, and Kurt wouldn't give it up. He kept on beating his head against the blank wall, and every time Alan saw him, he was grimmer than the last. "Let it *go*," Adam said. "I've done a deal with the vacuum-cleaner repair guy across the street." A weird-but-sweet old Polish Holocaust survivor who'd listened attentively to Andy's pitch before announcing that he'd been watching all the hardware go up around the Market and had simply been waiting to be included in the club. "That'll cover that corner just fine." "I'm going to throw a party," Kurt said. "Here, in the shop. No, I'll rent out one of the warehouses on Oxford. I'll invite them, the kids, everyone who's let us put up an access point, a big mill-and-swill. Buy a couple kegs. No one can resist free beer." Alan had started off frustrated and angry with Kurt, but this drew him up and turned him around. "That is a *fine* idea," he said. "We'll invite Lyman." # Lyman had taken to showing up on Alan's stoop in the morning sometimes, on his way to work, for a cup of coffee. He'd taken to showing up at Kurt's shop in the afternoon, sometimes, on his way home from work, to marvel at the kids' industry. His graybeard had written some code that analyzed packet loss and tried to make guesses about the crowd density in different parts of the Market, and Lyman took a proprietary interest in it, standing out by Bikes on Wheels or the Portuguese furniture store and watching the data on his PDA, comparing it with the actual crowds on the street. He'd only hesitated for a second when Andrew asked him to be the inaugural advisor on ParasiteNet's board, and once he'd said yes, it became clear to everyone that he was endlessly fascinated by their little adhocracy and its experimental telco potential. "This party sounds like a great idea," he said. He was buying the drinks, because he was the one with five-hundred-dollar glasses and a full-suspension racing bike. "Lookit that," he said. From the Greek's front window, they could see Oxford Street and a little of Augusta, and Lyman loved using his PDA and his density analysis software while he sat, looking from his colored map to the crowd scene. "Lookit the truck as it goes down Oxford and turns up Augusta. That signature is so distinctive, I could spot it in my sleep. I need to figure out how to sell this to someone -- maybe the cops or something." He tipped Andy a wink. Kurt opened and shut his mouth a few times, and Lyman slapped his palm down on the table. "You look like you're going to bust something," he said. "Don't worry. I kid. Damn, you've got you some big, easy-to-push buttons." Kurt made a face. "You wanted to sell our stuff to luxury hotels. You tried to get us to present at the *SkyDome*. You're capable of anything." "The SkyDome would be a great venue for this stuff," Lyman said settling into one of his favorite variations of bait-the-anarchist. "The SkyDome was built with tax-dollars that should have been spent on affordable housing, then was turned over to rich pals of the premier for a song, who then ran it into the ground, got bailed out by the province, and then it got turned over to different rich pals. You can just shut up about the goddamned SkyDome. You'd have to break both of my legs and *carry me* to get me to set foot in there." "About the party," Adam said. "About the party." "Yes, certainly," Lyman said. "Kurt, behave." Kurt belched loudly, provoking a scowl from the Greek. # The Waldos all showed up in a bunch, with plastic brown liter bottles filled with murky homemade beer and a giant bag of skunk-weed. The party had only been on for a couple hours, but it had already balkanized into inward-facing groups: merchants, kids, hackers. Kurt kept turning the music way up ("If they're not going to talk with one another, they might as well dance." "Kurt, those people are old. Old people don't dance to music like this." "Shut up, Lyman." "Make me."), and Andy kept turning it down. The bookstore people drifted in, then stopped and moved vaguely toward the middle of the floor, there to found their own breakaway conversational republic. Lyman startled. "Sara?" he said and one of the anarchists looked up sharply. "Lyman?" She had two short ponytails and a round face that made her look teenage young, but on closer inspection she was more Lyman's age, mid-thirties. She laughed and crossed the gap to their little republic and threw her arms around Lyman's neck. "Crispy Christ, what are *you* doing here?" "I work with these guys!" He turned to Arnold and Kurt. "This is my cousin Sara," he said. "These are Albert and Kurt. I'm helping them out." "Hi, Sara," Kurt said. "Hey, Kurt," she said looking away. It was clear even to Alan that they knew each other already. The other bookstore people were looking on with suspicion, drinking their beer out of refillable coffee-store thermos cups. "It's great to meet you!" Alan said taking her hand in both of his and shaking it hard. "I'm really glad you folks came down." She looked askance at him, but Lyman interposed himself. "Now, Sara, these guys really, really wanted to talk something over with you all, but they've been having a hard time getting a hearing." Kurt and Alan traded uneasy glances. They'd carefully planned out a subtle easeway into this conversation, but Lyman was running with it. "You didn't know that I was involved, huh?" "Surprised the hell outta me," Lyman said. "Will you hear them out?" She looked back at her collective. "What the hell. Yeah, I'll talk 'em into it." # "It starts with the sinking of the *Titanic*," Kurt said. They'd arranged their mismatched chairs in a circle in the cramped back room of the bookstore and were drinking and eating organic crumbly things with the taste and consistency of mud-brick. Sara told Kurt that they'd have ten minutes, and Alan had told him that he could take it all. Alan'd spent the day reading on the net, remembering the arguments that had swayed the most people, talking it over. He was determined that Kurt would win this fight. "There's this ship going down, and it's signaling S-O-S, S-O-S, but the message didn't get out, because the shipping lanes were full of other ships with other radios, radios that clobbered the *Titanic*'s signal. That's because there were no rules for radio back then, so anyone could light up any transmitter and send out any signal at any frequency. Imagine a room where everyone shouted at the top of their lungs, nonstop, while setting off air horns. "After that, they decided that fed regulators would divide up the radio spectrum into bands, and give those bands to exclusive licensees who'd know that their radio waves would reach their destination without being clobbered, because any clobberers would get shut down by the cops. "But today, we've got a better way: We can make radios that are capable of intelligently cooperating with each other. We can make radios that use databases or just finely tuned listeners to determine what bands aren't in use, at any given moment, in any place. They can talk between the gaps in other signals. They can relay messages for other radios. They can even try to detect the presence of dumb radio devices, like TVs and FM tuners, and grab the signal they're meant to be receiving off of the Internet and pass it on, so that the dumb device doesn't even realize that the world has moved on. "Now, the original radio rules were supposed to protect free expression because if everyone was allowed to speak at once, no one would be heard. That may have been true, but it was a pretty poor system as it went: Mostly, the people who got radio licenses were cops, spooks, and media barons. There aren't a lot of average people using the airwaves to communicate for free with one another. Not a lot of free speech. "But now we have all this new technology where computers direct the operation of flexible radios, radios whose characteristics are determined by software, and it's looking like the scarcity of the electromagnetic spectrum has been pretty grossly overstated. It's hard to prove, because now we've got a world where lighting up a bunch of smart, agile radios is a crime against the 'legit' license-holders. "But Parliament's not going to throw the airwaves open because no elected politician can be responsible for screwing up the voters' televisions, because that's the surest-fire way to not get reelected. Which means that when you say, 'Hey, our freedom of speech is being clobbered by bad laws,' the other side can say, 'Go study some physics, hippie, or produce a working network, or shut up.' "The radios we're installing now are about one millionth as smart as they could be, and they use one millionth as much spectrum as they could without stepping on anyone else's signal, but they're legal, and they're letting more people communicate than ever. There are people all over the world doing this, and whenever the policy wonks go to the radio cops to ask for more radio spectrum to do this stuff with, they parade people like us in front of them. We're like the Pinocchio's nose on the face of the radio cops: They say that only their big business buddies can be trusted with the people's airwaves, and we show them up for giant liars." He fell silent and looked at them. Adam held his breath. Sara nodded and broke the silence. "You know, that sounds pretty cool, actually." # Kurt insisted on putting up that access point, while Alan and Lyman steadied the ladder. Sara came out and joked with Lyman, and Alan got distracted watching them, trying to understand this notion of "cousins." They had an easy rapport, despite all their differences, and spoke in a shorthand of family weddings long past and crotchety relatives long dead. So none of them were watching when Kurt overbalanced and dropped the Makita, making a wild grab for it, foot slipping off the rung, and toppled backward. It was only Kurt's wild bark of panic that got Adam to instinctively move, to hold out his arms and look up, and he caught Kurt under the armpits and gentled him to the ground, taking the weight of Kurt's fall in a bone-jarring crush to his rib cage. "You okay?" Alan said once he'd gotten his breath back. "Oof," Kurt said. "Yeah." They were cuddled together on the sidewalk, Kurt atop him, and Lyman and Sara bent to help them apart. "Nice catch," Lyman said. Kurt was helped to his feet, and he declared that he'd sprained his ankle and nothing worse, and they helped him back to his shop, where a couple of his kids doted over him, getting him an ice pack and a pillow and his laptop and one of the many dumpster-dived discmen from around the shop and some of the CDs of old punk bands that he favored. There he perched, growly as a wounded bear, master of his kingdom, for the next two weeks, playing online and going twitchy over the missed dumpsters going to the landfill every night without his expert picking over. Alan visited him every day and listened raptly while Kurt gave him the stats for the day's network usage, and Kurt beamed proud the whole while. # One morning, Alan threw a clatter of toonies down on the Greek's counter and walked around the Market, smelling the last night's staggering pissers and the morning's blossoms. Here were his neighbors, multicolored heads at the windows of their sagging house adjoining his, Link and Natalie in the adjacent windows farthest from his front door, Mimi's face suspicious at her window, and was that Krishna behind her, watching over her shoulder, hand between her wings, fingers tracing the scars depending from the muscles there? He waved at them. The reluctant winter made every day feel like the day before a holiday weekend. The bankers and the retail slaves coming into and out of the Market had a festive air. He waved at the neighbors, and Link waved back, and then so did Natalie, and he hefted his sack of coffees from the Greek's suggestively, and Mimi shut her curtains with a snap, but Natalie and Link smiled, and a moment later they were sitting in twig chairs on his porch in their jammies, watching the world go past as the sun began to boil the air and the coffee tasted as good as it smelled. "Beautiful day," Natalie said rubbing the duckling fuzz on her scalp and closing her eyes. "Found any work yet?" Alan said remembering his promise to put her in touch with one of his fashionista protégés. She made a face. "In a video store. Bo-ring." Link made a rude noise. "You are *so* spoiled. Not just any video store, she's working at Martian Signal on Queen Street." Alan knew it, a great shop with a huge selection of cult movies and a brisk trade in zines, transgressive literature, action figures and T-shirts. "It must be great there," he said. She smiled and looked away. "It's okay." She bit her lip. "I don't think I like working retail," she said. "Ah, retail!" he said. "Retail would be fantastic if it wasn't for the fucking customers." She giggled. "Don't let them get to you," he said. "Get to be really smart about the stock, so that there's always something you know more about than they do, and when that isn't true, get them to *teach you* more so you'll be in control the next time." She nodded. "And have fun with the computer when it's slow," he said. "What?" "A store like that, it's got the home phone number of about seventy percent of the people in Toronto you'd want to ever hang out with. Most of your school friends, even the ones you've lost track of. All the things they've rented. All their old addresses -- you can figure out who's living together, who gave their apartment to whom, all of that stuff. That kind of database is way more fun than you realize. You can get lost in it for months." She was nodding slowly. "I can see that," she said. She upended her coffee and set it down. "Listen, Arbus --" she began, then bit her lip again. She looked at Link, who tugged at his fading pink shock of hair. "It's nothing," he said. "We get emotionally overwrought about friends and family. I have as much to apologize for as... Well, I owe you an apology." They stared at the park across the street, at the damaged wading pool where Edward had vanished. "So, sorries all 'round and kisses and hugs, and now we're all friends again, huh?" Link said. Natalie made a rude noise and ruffled his hair, then wiped her hand off on his shirt. Alan, though, solemnly shook each of their hands in turn, and thanked them. When he was done, he felt as though a weight had been lifted from him. Next door, Mimi's window slammed shut. "What is it you're doing around here, Akin?" Link said. "I keep seeing you running around with ladders and tool belts. I thought you were a writer. Are you soundproofing the whole Market?" "I never told you?" Alan said. He'd been explaining wireless networking to anyone who could sit still and had been beginning to believe that he'd run it down for every denizen of Kensington, but he'd forgotten to clue in his own neighbors! "Right," he said. "Are you seated comfortably? Then I shall begin. When we connect computers together, we call it a network. There's a *big* network of millions of computers, called the Internet." "Even *I* know this," Natalie said. "Shush," Alan said. "I'll start at the beginning, where I started a year ago, and work my way forward. It's weird, it's big and it's cool." And he told them the story, the things he'd learned from Kurt, the arguments he'd honed on the shopkeepers, the things Lyman had told him. "So that's the holy mission," he said at last. "You give everyone a voice and a chance to speak on a level playing field with the rich and powerful, and you make democracy, which is good." He looked at Link and Natalie, who were looking to one another rather intensely, communicating in some silent idiom of sibling body-language. "Plate-o-shrimp," Natalie said. "Funny coincidence," Link said. "We were just talking about this yesterday." "Spectrum?" Alan quirked his eyebrows. "No, not exactly," Natalie said. "About making a difference. About holy missions. Wondering if there were any left." "I mean," Link said, "riding a bike or renting out videos are honest ways to make a living and all, and they keep us in beer and rent money, but they're not --" "-- *important*." Natalie said. "Ah," Alan said. "Ah?" "Well, that's the thing we all want, right? Making a difference." "Yeah." "Which is why you went into fashion," Link said giving her skinny shoulder a playful shove. She shoved him back. "And why *you* went into electrical engineering!" "Okay," Alan said. "It's not necessarily about what career you pick. It's about how you do what you do. Natalie, you told me you used to shop at Tropicál." She nodded. "You liked it, you used to shop there, right?" "Yeah." "And it inspired you to go into fashion design. It also provided employment for a couple dozen people over the years. I sometimes got to help out little alternative girls from North Toronto buy vintage prom dresses at the end of the year, and I helped Motown revival bands put together matching outfits of red blazers and wide trousers. Four or five little shops opened up nearby selling the same kind of thing, imitating me -- that whole little strip down there started with Tropicál." Natalie nodded. "Okay, I knew that, I guess. But it's not the same as *really* making a difference, is it?" Link flicked his butt to the curb. "You're changing people's lives for the better either way, right?" "Exactly," Alan said. Then Link grinned. "But there's something pretty, oh, I dunno, *ballsy*, about this wireless thing, yeah? It's not the same." "Not the same," Alan said grinning. "Better." "How can we help?" # Kurt had an assembly line cranking out his access points now. Half a dozen street kids worked in the front of his place, in a cleared-out space with a makeshift workbench made from bowed plywood and scratched IKEA table-legs. It made Alan feel better to watch them making sense of it all, made him feel a little like he felt when he was working on The Inventory. The kids worked from noon, when Kurt got back from breakfast, until 9 or 10, when he went out to dive. The kids were smart, but screwed up: half by teenaged hormones and half by bad parents or bad drugs or just bad brain chemistry. Alan understood their type, trying to carve some atom of individual identity away from family and background, putting pins through their bodies and affecting unconvincing tough mannerisms. They were often bright -- the used bookstore had been full of their type, buying good, beat-up books off the sale rack for 50 cents, trading them back for 20 cents' credit the next day, and buying more. Natalie and Link were in that morning, along with some newcomers, Montreal street punks trying their hand at something other than squeegee bumming. The punks and his neighbors gave each other uneasy looks, but Alan had deliberately put the sugar for the coffee at the punks' end of the table and the cream in front of Natalie and the stirs by the bathroom door with the baklava and the napkins, so a rudimentary social intercourse was begun. First, one of the punks (who had a rusty "NO FUTURE" pin that Alan thought would probably go for real coin on the collectors' market) asked Natalie to pass her the cream. Then Link and another punk (foppy silly black hair and a cut-down private school blazer with the short sleeves pinned on with rows of safety pins) met over the baklava, and the punk offered Link a napkin. Another punk spilled her coffee on her lap, screeching horrendous Quebecois blasphemies as curses, and that cracked everyone up, and Arnold, watching from near the blanket that fenced off Kurt's monkish sleeping area, figured that they would get along. "Kurt," he said pulling aside the blanket, handing a double-double coffee over to Kurt as he sat up and rubbed his eyes. He was wearing a white T-shirt that was the grimy grey of everything in his domain, and baggy jockeys. He gathered his blankets around him and sipped reverently. Kurt cocked his head and listened to the soft discussions going on on the other side of the blanket. "Christ, they're at it already?" "I think your volunteers showed up a couple hours ago -- or maybe they were up all night." Kurt groaned theatrically. "I'm running a halfway house for geeky street kids." "All for the cause," Alan said. "So, what's on the plate for today?" "You know the church kittycorner from your place?" "Yeah?" Alan said cautiously. "Its spire is just about the highest point in the Market. An omnidirectional up there..." "The church?" "Yeah." "What about the new condos at the top of Baldwin? They're tall." "They are. But they're up on the northern edge. From the bell-tower of that church, I bet you could shoot half the houses on the west side of Oxford Street, along with the backs of all the shops on Augusta." "How are we going to get the church to go along with it. Christ, what are they, Ukrainian Orthodox?" "Greek Orthodox," Kurt said. "Yeah, they're pretty conservative." "So?" "So, I need a smooth-talking, upstanding cit to go and put the case to the pastor. Priest. Bishop. Whatever." "Groan," Alex said. "Oh, come on, you're good at it." "If I get time," he said. He looked into his coffee for a moment. "I'm going to go home," he said. "Home?" "To the mountain," he said. "Home," he said. "To my father," he said. "Whoa," Kurt said. "Alone?" Alan sat on the floor and leaned back against a milk crate full of low-capacity hard drives. "I have to," he said. "I can't stop thinking of..." He was horrified to discover that he was on the verge of tears. It had been three weeks since Davey had vanished into the night, and he'd dreamt of Eugene-Fabio-Greg every night since, terrible dreams, in which he'd dug like a dog to uncover their hands, their arms, their legs, but never their heads. He swallowed hard. He and Kurt hadn't spoken of that night since. "I sometimes wonder if it really happened," Kurt said. Alan nodded. "It's hard to believe. Even for me." "I believe it," Kurt said. "I won't ever not believe it. I think that's probably important to you." Alan felt a sob well up in his chest and swallowed it down again. "Thanks," he managed to say. "When are you leaving?" "Tomorrow morning. I'm going to rent a car and drive up," he said. "How long?" "I dunno," he said. He was feeling morose now. "A couple days. A week, maybe. No longer." "Well, don't sweat the Bishop. He can wait. Come and get a beer with me tonight before I go out?" "Yeah," he said. "That sounds good. On a patio on Kensington. We can people-watch." # How Alan and his brothers killed Davey: very deliberately. Alan spent the rest of the winter in the cave, and Davey spent the spring in the golem's cave, and through that spring, neither of them went down to the school, so that the younger brothers had to escort themselves to class. When the thaws came and icy meltoff carved temporary streams in the mountainside, they stopped going to school, too -- instead, they played on the mountainside, making dams and canals and locks with rocks and imagination. Their father was livid. The mountain rumbled as it warmed unevenly, as the sheets of ice slid off its slopes and skittered down toward the highway. The sons of the mountain reveled in their dark ignorance, their separation from the school and from the nonsensical and nonmagical society of the town. They snared small animals and ate them raw, and didn't wash their clothes, and grew fierce and guttural through the slow spring. Alan kept silent through those months, becoming almost nocturnal, refusing to talk to any brother who dared to talk to him. When Ed-Fred-George brought home a note from the vice principal asking when he thought he'd be coming back to school, Alan shoved it into his mouth and chewed and chewed and chewed, until the paper was reduced to gruel, then he spat it by the matted pile of his bedding. The mountain grumbled and he didn't care. The golems came to parley, and he turned his back to them. The stalactites crashed to the cave's floor until it was carpeted in ankle-deep chips of stone, and he waded through them. He waited and bided. He waited for Davey to try to come home. # "What have we here?" Alan said, as he wandered into Kurt's shop, which had devolved into joyous bedlam. The shelves had been pushed up against the wall, clearing a large open space that was lined with long trestle tables. Crusty-punks, goth kids, hippie kids, geeks with vintage video-game shirts, and even a couple of older, hard-done-by street people crowded around the tables, performing a conglomeration of arcane tasks. The air hummed with conversation and coffee smells, the latter emanating from a catering-sized urn in the corner. He was roundly ignored -- and before he could speak again, one of the PCs on the floor started booming out fuzzy, grungy rockabilly music that made him think of Elvis cassettes that had been submerged in salt water. Half of the assembled mass started bobbing their heads and singing along while the other half rolled their eyes and groaned. Kurt came out of the back and hunkered down with the PC, turning down the volume a little. "Howdy!" he said, spreading his arms and taking in the whole of his dominion. "Howdy yourself," Alan said. "What do we have here?" "We have a glut of volunteers," Kurt said, watching as an old rummy carefully shot a picture of a flat-panel LCD that was minus its housing. "I can't figure out if those laptop screens are worth anything," he said, cocking his head. "But they've been taking up space for far too long. Time we moved them." Alan looked around and realized that the workers he'd taken to be at work building access points were, in the main, shooting digital pictures of junk from Kurt's diving runs and researching them for eBay listings. It made him feel good -- great, even. It was like watching an Inventory being assembled from out of chaos. "Where'd they all come from?" Kurt shrugged. "I dunno. I guess we hit critical mass. You recruit a few people, they recruit a few people. It's a good way to make a couple bucks, you get to play with boss crap, you get paid in cash, and you have colorful co-workers." He shrugged again. "I guess they came from wherever the trash came from. The city provides." The homeless guy they were standing near squinted up at them. "If either of you says something like, *Ah, these people were discarded by society, but just as with the junk we rescue from landfills, we have seen the worth of these poor folks and rescued them from the scrapheap of society,* I'm gonna puke." "The thought never crossed my mind," Alan said solemnly. "Keep it up, Wes," Kurt said, patting the man on the shoulder. "See you at the Greek's tonight?" "Every night, so long as he keeps selling the cheapest beer in the Market," Wes said, winking at Alan. "It's cash in the door," Kurt said. "Buying components is a lot more efficient than trying to find just the right parts." He gave Alan a mildly reproachful look. Ever since they'd gone to strictly controlled designs, Kurt had been heartbroken by the amount of really nice crap that never made its way into an access point. "This is pretty amazing," Alan said. "You're splitting the money with them?" "The profit -- anything leftover after buying packaging and paying postage." He walked down the line, greeting people by name, shaking hands, marveling at the gewgaws and gimcracks that he, after all, had found in some nighttime dumpster and brought back to be recycled. "God, I love this. It's like Napster for dumpsters." "How's that?" Alan asked, pouring himself a coffee and adding some UHT cream from a giant, slightly dented box of little creamers. "Most of the music ever recorded isn't for sale at any price. Like 80 percent of it. And the labels, they've made copyright so strong, no one can figure out who all that music belongs to -- not even them! Costs a fortune to clear a song. Pal of mine once did a CD of Christmas music remixes, and he tried to figure out who owned the rights to all the songs he wanted to use. He just gave up after a year -- and he had only cleared one song! "So along comes Napster. It finds the only possible way of getting all that music back into our hands. It gives millions and millions of people an incentive to rip their old CDs -- hell, their old vinyl and tapes, too! -- and put them online. No label could have afforded to do that, but the people just did it for free. It was like a barn-raising: a library raising!" Alan nodded. "So what's your point -- that companies' dumpsters are being napstered by people like you?" A napsterized Inventory. Alan felt the *rightness* of it. Kurt picked a fragile LCD out of a box of dozens of them and smashed it on the side of the table. "Exactly!" he said. "This is garbage -- it's like the deleted music that you can't buy today, except at the bottom of bins at Goodwill or at yard sales. Tons of it has accumulated in landfills. No one could afford to pay enough people to go around and rescue it all and figure out the copyrights for it and turn it into digital files and upload it to the net -- but if you give people an incentive to tackle a little piece of the problem and a way for my work to help you..." He went to a shelf and picked up a finished AP and popped its latches and swung it open. "Look at that -- I didn't get its guts out of a dumpster, but someone else did, like as not. I sold the parts I found in my dumpster for money that I exchanged for parts that someone else found in *her* dumpster --" "Her?" "Trying not to be sexist," Kurt said. "Are there female dumpster divers?" "Got me," Kurt said. "In ten years of this, I've only run into other divers twice or three times. Remind me to tell you about the cop later. Anyway. We spread out the effort of rescuing this stuff from the landfill, and then we put our findings online, and we move it to where it needs to be. So it's not cost effective for some big corporation to figure out how to use or sell these -- so what? It's not cost-effective for some big dumb record label to figure out how to keep music by any of my favorite bands in print, either. We'll figure it out. We're spookily good at it." "Spookily?" "Trying to be more poetic." He grinned and twisted the fuzzy split ends of his newly blue mohawk around his fingers. "Got a new girlfriend, she says there's not enough poetry in my views on garbage." # They found one of Davey's old nests in March, on a day when you could almost believe that the spring would really come and the winter would go and the days would lengthen out to more than a few hours of sour greyness huddled around noon. The reference design for the access point had gone through four more iterations, and if you knew where to look in the Market's second-story apartments, rooftops, and lampposts, you could trace the evolution of the design from the clunky PC-shaped boxen in Alan's attic on Wales Avenue to the environment-hardened milspec surplus boxes that Kurt had rigged from old circuit boxes he'd found in Bell Canada's Willowdale switching station dumpster. Alan steadied the ladder while Kurt tightened the wing nuts on the antenna mounting atop the synagogue's roof. It had taken three meetings with the old rabbi before Alan hit on the idea of going to the temple's youth caucus and getting *them* to explain it to the old cleric. The synagogue was one of the oldest buildings in the Market, a brick-and-stone beauty from 1930. They'd worried about the fight they'd have over drilling through the roof to punch down a wire, but they needn't have: The wood up there was soft as cottage cheese, and showed gaps wide enough to slip the power cable down. Now Kurt slathered Loctite over the nuts and washers and slipped dangerously down the ladder, toe-tips flying over the rungs. Alan laughed as he touched down, thinking that Kurt's heart was aburst with the feeling of having finished, at last, at last. But then he caught sight of Kurt's face, ashen, wide-eyed. "I saw something," he said, talking out of the sides of his mouth. His hands were shaking. "What?" "Footprints," he said. "There's a lot of leaves that have rotted down to mud up there, and there were a pair of little footprints in the mud. Like a toddler's footprints, maybe. Except there were two toes missing from one foot. They were stamped down all around this spot where I could see there had been a lot of pigeon nests, but there were no pigeons there, only a couple of beaks and legs -- so dried up that I couldn't figure out what they were at first. "But I recognized the footprints. The missing toes, they left prints behind like unbent paperclips." Alan moved, as in a dream, to the ladder and began to climb it. "Be careful, it's all rotten up there," Kurt called. Alan nodded. "Sure, thank you," he said, hearing himself say it as though from very far away. The rooftop was littered with broken glass and scummy puddles of meltwater and little pebbles and a slurry of decomposing leaves, and there, yes, there were the footprints, just as advertised. He patted the antenna box absently, feeling its solidity, and he sat down cross-legged before the footprints and the beaks and the legs. There were no tooth marks on the birds. They hadn't been eaten, they'd been torn apart, like a label from a beer bottle absently shredded in the sunset. He pictured Davey sitting here on the synagogue's roof, listening to the evening prayers, and the calls and music that floated over the Market, watching the grey winter nights come on and slip away, a pigeon in his hand, writhing. He wondered if he was catching Bradley's precognition, and if that meant that Bradley was dead now. # Bradley was born with the future in his eyes. He emerged from the belly of their mother with bright brown eyes that did not roll aimlessly in the manner of babies, but rather sought out the corners of the cave where interesting things were happening, where movement was about to occur, where life was being lived. Before he developed the muscle strength and coordination necessary to crawl, he mimed crawling, seeing how it was that he would someday move. He was the easiest of all the babies to care for, easier even than Carlo, who had no needs other than water and soil and cooing reassurance. Toilet training: As soon as he understood what was expected of him -- they used the downstream-most bend of one of the underground rivers -- Benny could be relied upon to begin tottering toward the spot in sufficient time to drop trou and do his business in just the right spot. (Alan learned to pay attention when Bruce was reluctant to leave home for a walk during those days -- the same premonition that made him perfectly toilet-trained at home would have him in fretting sweats at the foreknowledge that he has destined to soil himself during the recreation.) His nightmares ran twice: once just before bed, in clairvoyant preview, and again in the depths of REM sleep. Alan learned to talk him down from these crises, to soothe the worry, and in the end it worked to everyone's advantage, defusing the nightmares themselves when they came. He never forgot anything -- never forgot to have Alan forge a signature on a permission form, never forgot to bring in the fossil he'd found for show-and-tell, never forgot his mittens in the cloakroom and came home with red, chapped hands. Once he started school, he started seeing to it that Alan never forgot anything, either. He did very well on quizzes and tests, and he never let the pitcher fake him out when he was at bat. After four years alone with the golems, Alan couldn't have been more glad to have a brother to keep him company. Billy got big enough to walk, then big enough to pick mushrooms, then big enough to chase squirrels. He was big enough to play hide-and-go-seek with, big enough to play twenty questions with, big enough to horse around in the middle of the lake at the center of the mountain with. Alan left him alone during the days, in the company of their parents and the golems, went down the mountain to school, and when he got back, he'd take his kid brother out on the mountain face and teach him what he'd learned, even though he was only a little kid. They'd write letters together in the mud with a stick, and in the winter, they'd try to spell out their names with steaming pee in the snow, laughing. "That's a fraction," Brad said, chalking "3/4" on a piece of slate by the side of one of the snowmelt streams that coursed down the springtime mountain. "That's right, three-over-four," Alan said. He'd learned it that day in school, and had been about to show it to Billy, which meant that Brad had remembered him doing it and now knew it. He took the chalk and drew his own 3/4 -- you had to do that, or Billy wouldn't be able to remember it in advance. Billy got down on his haunches. He was a dark kid, dark hair and eyes the color of chocolate, which he insatiably craved and begged for every morning when Alan left for school, "Bring me, bring me, bring me!" He'd found something. Alan leaned in and saw that it was a milkweed pod. "It's an egg," Bobby said. "No, it's a weed," Alan said. Bobby wasn't usually given to flights of fancy, but the shape of the pod was reminiscent of an egg. Billy clucked his tongue. "I *know* that. It's also an egg for a bug. Living inside there. I can see it hatching. Next week." He closed his eyes. "It's orange! Pretty. We should come back and find it once it hatches." Alan hunkered down next to him. "There's a bug in here?" "Yeah. It's like a white worm, but in a week it will turn into an orange bug and chew its way out." He was about three then, which made Alan seven. "What if I chopped down the plant?" he said. "Would the bug still hatch next week?" "You won't," Billy said. "I could, though." "Nope," Brad said. Alan reached for the plant. Took it in his hand. The warm skin of the plant and the woody bole of the pod would be so easy to uproot. He didn't do it. That night, as he lay himself down to sleep, he couldn't remember why he hadn't. He couldn't sleep. He got up and looked out the front of the cave, at the countryside unrolling in the moonlight and the far lights of the town. He went back inside and looked in on Benji. He was sleeping, his face smooth and his lips pouted. He rolled over and opened his eyes, regarding Alan without surprise. "Told you so," he said. # Alan had an awkward relationship with the people in town. Unaccompanied little boys in the grocery store, at the Gap, in the library and in toy section of the Canadian Tire were suspect. Alan never "horsed around" -- whatever that meant -- but nevertheless, he got more than his share of the hairy eyeball from the shopkeepers, even though he had money in his pocket and had been known to spend it on occasion. A lone boy of five or six or seven was suspicious, but let him show up with the tiny hand of his dark little brother clasped in his, quietly explaining each item on the shelf to the solemn child, and everyone got an immediate attitude adjustment. Shopkeepers smiled and nodded, shoppers mouthed, "So cute," to each other. Moms with babies in snuglis bent to chuckle them under their chins. Store owners spontaneously gave them candy, and laughed aloud at Bryan's cries of "Chocolate!" When Brian started school, he foresaw and avoided all trouble, and delighted his teachers with his precociousness. Alan ate lunch with him once he reached the first grade and started eating in the cafeteria with the rest of the non-kindergartners. Brad loved to play with Craig after he was born, patiently mounding soil and pebbles on his shore, watering him and patting him smooth, planting wild grasses on his slopes as he crept toward the mouth of the cave. Those days -- before Darcy's arrival -- were a long idyll of good food and play in the hot sun or the white snow and brotherhood. Danny couldn't sneak up on Brad and kick him in the back of the head. He couldn't hide a rat in his pillow or piss on his toothbrush. Billy was never one to stand pat and eat shit just because Davey was handing it out. Sometimes he'd just wind up and take a swing at Davey, seemingly out of the blue, knocking him down, then prying open his mouth to reveal the chocolate bar he'd nicked from under Brad's pillow, or a comic book from under his shirt. He was only two years younger than Brad, but by the time they were both walking, Brad hulked over him and could lay him out with one wild haymaker of a punch. # Billy came down from his high perch when Alan returned from burying Marci, holding out his hands wordlessly. He hugged Alan hard, crushing the breath out of him. The arms felt good around his neck, so he stopped letting himself feel them. He pulled back stiffly and looked at Brian. "You could have told me," he said. Bram's face went expressionless and hard and cold. Telling people wasn't what he did, not for years. It hurt others -- and it hurt him. It was the reason for his long, long silences. Alan knew that sometimes he couldn't tell what it was that he knew that others didn't. But he didn't care, then. "You should have told me," he said. Bob took a step back and squared up his shoulders and his feet, leaning forward a little as into a wind. "You *knew* and you didn't *tell me* and you didn't *do anything* and as far as I'm concerned, you killed her and cut her up and buried her along with Darryl, you coward." Adam knew he was crossing a line, and he didn't care. Brian leaned forward and jutted his chin out. Avram's hands were clawed with cold and caked with mud and still echoing the feeling of frozen skin and frozen dirt, and balled up into fists, they felt like stones. He didn't hit Barry. Instead, he retreated to his niche and retrieved the triangular piece of flint that he'd been cherting into an arrowhead for school and a hammer stone and set to work on it in the light of a flashlight. # He sharpened a knife for Davey, there in his room in the cave, as the boys ran feral in the woods, as the mountain made its slow and ponderous protests. He sharpened a knife, a hunting knife with a rusty blade and a cracked handle that he'd found on one of the woodland trails, beside a hunter's snare, not lost but pitched away in disgust one winter and not discovered until the following spring. But the nicked blade took an edge as he whetted it with the round stone, and the handle regained its grippiness as he wound a cord tight around it, making tiny, precise knots with each turn, until the handle no longer pinched his hand, until the blade caught the available light from the cave mouth and glinted dully. The boys brought him roots and fruits they'd gathered, sweets and bread they'd stolen, small animals they'd caught. Ed-Fred-George were an unbeatable team when it came to catching and killing an animal, though they were only small, barely out of the second grade. They were fast, and they could coordinate their actions without speaking, so that the bunny or the squirrel could never duck or feint in any direction without encountering the thick, neck-wringing outstretched hands of the pudgy boys. Once, they brought him a cat. It went in the night's stew. Billy sat at his side and talked. The silence he'd folded himself in unwrapped and flapped in the wind of his beating gums. He talked about the lessons he'd had in school and the lessons he'd had from his big brother, when it was just the two of them on the hillside and Alan would teach him every thing he knew, the names of and salient facts regarding every thing in their father's domain. He talked about the truths he'd gleaned from reading chocolate-bar wrappers. He talked about the things that he'd see Davey doing when no one else could see it. One day, George came to him, the lima-bean baby grown to toddling about on two sturdy legs, fat and crispy red from his unaccustomed time out-of-doors and in the sun. "You know, he *worships* you," Glenn said, gesturing at the spot in his straw bedding where Brad habitually sat and gazed at him and chattered. Alan stared at his shoelaces. "It doesn't matter," he said. He'd dreamt that night of Davey stealing into the cave and squatting beside him, watching him the way that he had before, and of Alan knowing, *knowing* that Davey was there, ready to rend and tear, knowing that his knife with its coiled handle was just under his pillow, but not being able to move his arms or legs. Paralyzed, he'd watched Davey grin and reach behind him with agonizing slowness for a rock that he'd lifted high above his head and Andrew had seen that the rock had been cherted to a razor edge that hovered a few feet over his breastbone, Davey's arms trembling with the effort of holding it aloft. A single drop of sweat had fallen off of Davey's chin and landed on Alan's nose, and then another, and finally he'd been able to open his eyes and wake himself, angry and scared. The spring rains had begun, and the condensation was thick on the cave walls, dripping onto his face and arms and legs as he slept, leaving behind chalky lime residue as it evaporated. "He didn't kill her," Greg said. Albert hadn't told the younger brothers about the body buried in Craig, which meant that Brad had been talking to them, had told them what he'd seen. Alan felt an irrational streak of anger at Brad -- he'd been blabbing Alan's secrets. He'd been exposing the young ones to things they didn't need to know. To the nightmares. "He didn't stop her from being killed," Alan said. He had the knife in his hand and hunted through his pile of belongings for the whetstone to hone its edge. Greg looked at the knife, and Andy followed his gaze to his own white knuckles on the hilt. Greg took a frightened step back, and Alan, who had often worried that the smallest brother was too delicate for the real world, felt ashamed of himself. He set the knife down and stood, stretching his limbs and leaving the cave for the first time in weeks. # Brad found him standing on the slopes of the gentle, soggy hump of Charlie's slope, a few feet closer to the seaway than it had been that winter when Alan had dug up and reburied Marci's body there. "You forgot this," Brad said, handing him the knife. Alan took it from him. It was sharp and dirty and the handle was grimed with sweat and lime. "Thanks, kid," he said. He reached down and took Billy's hand, the way he'd done when it was just the two of them. The three eldest sons of the mountain stood there touching and watched the outside world rush and grind away in the distance, its humming engines and puffing chimneys. Brendan tugged his hand free and kicked at the dirt with a toe, smoothing over the divot he'd made with the sole of his shoe. Andy noticed that the sneaker was worn out and had a hole in the toe, and that it was only laced up halfway. "Got to get you new shoes," he said, bending down to relace them. He had to stick the knife in the ground to free his hands while he worked. The handle vibrated. "Davey's coming," Benny said. "Coming now." Alan reached out as in his dream and felt for the knife, but it wasn't there, as in his dream. He looked around as the skin on his face tightened and his heart began to pound in his ears, and he saw that it had merely fallen over in the dirt. He picked it up and saw that where it had fallen, it had knocked away the soil that had barely covered up a small, freckled hand, now gone black and curled into a fist like a monkey's paw. Marci's hand. "He's coming." Benny took a step off the hill. "You won't lose," he said. "You've got the knife." The hand was small and fisted, there in the dirt. It had been just below the surface of where he'd been standing. It had been there, in Clarence's soil, for months, decomposing, the last of Marci going. Somewhere just below that soil was her head, her face sloughing off and wormed. Her red hair fallen from her loosened scalp. He gagged and a gush of bile sprayed the hillside. Danny hit him at the knees, knocking him into the dirt. He felt the little rotting fist digging into his ribs. His body bucked of its own accord, and he knocked Danny loose of his legs. His arm was hot and slippery, and when he looked at it he saw that it was coursing with blood. The knife in his other hand was bloodied and he saw that he'd drawn a long ragged cut along his bicep. A fountain of blood bubbled there with every beat of his heart, blub, blub, blub, and on the third blub, he felt the cut, like a long pin stuck in the nerve. He climbed unsteadily to his feet and confronted Danny. Danny was naked and the color of the red golem clay. His ribs showed and his hair was matted and greasy. "I'm coming home," Danny said, baring his teeth. His breath reeked of corruption and uncooked meat, and his mouth was ringed with a crust of dried vomit. "And you're not going to stop me." "You don't have a home," Alan said, pressing the hilt of the knife over the wound in his bicep, the feeling like biting down on a cracked tooth. "You're not welcome." Davey was monkeyed over low, arms swinging like a chimp, teeth bared, knees splayed and ready to uncoil and pounce. "You think you'll stab me with that?" he said, jerking his chin at the knife. "Or are you just going to bleed yourself out with it?" Alan steadied his knife hand before him, unmindful of the sticky blood. He knew that the pounce was coming, but that didn't help when it came. Davey leapt for him and he slashed once with the knife, Davey ducking beneath the arc, and then Davey had his forearm in his hands, his teeth fastened onto the meat of his knife thumb. Andre rolled to one side and gripped down hard on the knife, tugging his arm ineffectually against the grip of the cruel teeth and the grasping bony fingers. Davey had lost his boyish charm, gone simian with filth and rage, and the sore and weak blows Alan was able to muster with his hurt arm didn't seem to register with Danny at all as he bit down harder. Arnold dragged his arm up higher, dragging the glinting knifetip toward Davey's face. Drew kicked at his shins, planted a knee alongside his groin. Alan whipped his head back, then brought it forward as fast and hard as he could, hammering his forehead into the crown of Davey's head so hard that his head rang like a bell. He stunned Davey free of his hand and stunned himself onto his back. He felt small hands beneath each armpit, dragging him clear of the hill. Brian. And George. They helped him to his feet and Breton handed him the knife again. Darren got onto his knees, and then to his feet, holding the back of his head. They both swayed slightly, standing to either side of Chris's rise. Alan's knife-hand was red with blood streaming from the bite wounds and his other arm felt unaccountably heavy now. Davey was staggering back and forth a little, eyes dropping to the earth. Suddenly, he dropped to one knee and scrabbled in the dirt, then scrambled back with something in his hand. Marci's fist. He waggled it at Andrew mockingly, then charged, crossing the distance between them with long, loping strides, the fist held out before him like a lance. Alan forgot the knife in his hand and shrank back, and then Davey was on him again, dropping the fist to the mud and taking hold of Alan's knife-wrist, digging his ragged nails into the bleeding bites there. Now Alan released the knife, so that it, too, fell to the mud, and the sound it made woke him from his reverie. He pulled his hand free of Davey's grip and punched him in the ear as hard as he could, simultaneously kneeing him in the groin. Davey hissed and punched him in the eye, a feeling like his eyeball was going to break open, a feeling like he'd been stabbed in the back of his eye socket. He planted a foot in the mud for leverage, then flipped Danny over so that Alan was on top, knees on his skinny chest. The knife was there beside Davey's head, and Alan snatched it up, holding it ready for stabbing. Danny's eyes narrowed. Alan could do it. Kill him altogether dead finished yeah. Stab him in the face or the heart or the lung, somewhere fatal. He could kill Davey and make him go away forever. Davey caught his eye and held it. And Alan knew he couldn't do it, and an instant later, Davey knew it, too. He smiled a crusty smile and went limp. "Oh, don't hurt me, *please*," he said mockingly. "Please, big brother, don't stab me with your big bad knife!" Alan hurt all over, but especially on his bicep and his thumb. His head sang with pain and blood loss. "Don't hurt me, please!" Davey said. Billy was standing before him, suddenly. "That's what Marci said when he took her, 'Don't hurt me, please,'" he said. "She said it over and over again. While he dragged her here. While he choked her to death." Alan held the knife tighter. "He said it over and over again as he cut her up and buried her. He *laughed.*" Danny suddenly bucked hard, almost throwing him, and before he had time to think, Alan had slashed down with the knife, aiming for the face, the throat, the lung. The tip landed in the middle of his bony chest and skated over each rib, going *tink, tink, tink* through the handle, like a xylophone. It scored along the emaciated and distended belly, then sank in just to one side of the smooth patch where a real person -- where Marci -- would have a navel. Davey howled and twisted free of the seeking edge, skipping back three steps while holding in the loop of gut that was trailing free of the incision. "She said, 'Don't hurt me.' She said, 'Please.' Over and over. He said it, too, and he laughed at her." Benny chanted it at him, standing just behind him, and the sound of his voice filled Alan's ears. Suddenly Davey reeled back as a stone rebounded off of his shoulder. They both looked in the direction it had come from, and saw George, with the tail of his shirt aproned before him, filled with small, jagged stones from the edge of the hot spring in their father's depths. They took turns throwing those stones, skimming them over the water, and Ed and Fred and George had a vicious arm. Davey turned and snarled and started upslope toward George, and a stone took him in the back of the neck, thrown by Freddie, who had sought cover behind a thick pine that couldn't disguise the red of his windbreaker, red as the inside of his lip, which pouted out as he considered his next toss. He was downslope, and so Drew was able to bridge the distance between them very quickly -- he was almost upon Felix when a third stone, bigger and faster than the others, took him in the back of the head with terrible speed, making a sound like a hammer missing the nail and hitting solid wood instead. It was Ernie, of course, standing on Craig's highest point, winding up for another toss. The threesome's second volley hit him all at once, from three sides, high, low, and medium. "Killed her, cut her up, buried her," Benny chanted. "Sliced her open and cut her up," he called. "SHUT UP!" Davey screamed. He was bleeding from the back of his head, the blood trickling down the knobs of his spine, and he was crying, sobbing. "KILLED HER, CUT HER UP, SLICED HER OPEN," Ed-Fred-George chanted in unison. Alan tightened his grip on the cords wound around the handle of his knife, and his knife hand bled from the puncture wounds left by Davey's teeth. Davey saw him coming and dropped to his knees, crying. Sobbing. "Please," he said, holding his hands out before him, palms together, begging. "Please," he said, as the loop of intestine he'd been holding in trailed free. "Please," he said, as Alan seized him by the hair, jerked his head back, and swiftly brought the knife across his throat. Benny took his knife, and Ed-Fred-George coaxed Clarence into a slow, deep fissuring. They dragged the body into the earthy crack and Clarence swallowed up their brother. Benny led Alan to the cave, where they'd changed his bedding and laid out a half-eaten candy bar, a shopping bag filled with bramble-berries, and a lock of Marci's hair, tied into a knot. # Alan dragged all of his suitcases up from the basement to the living room, from the tiny tin valise plastered with genuine vintage deco railway stickers to the steamer trunk that he'd always intended to refurbish as a bathroom cabinet. He hadn't been home in fifteen years. What should he bring? Clothes were the easiest. It was coming up on the cusp of July and August, and he remembered boyhood summers on the mountain's slopes abuzz with blackflies and syrupy heat. White T-shirts, lightweight trousers, high-tech hiking boots that breathed, a thin jacket for the mosquitoes at dusk. He decided to pack four changes of clothes, which made a very small pile on the sofa. Small suitcase. The little rolling carry-on? The wheels would be useless on the rough cave floor. He paced and looked at the spines of his books, and paced more, into the kitchen. It was a beautiful summer day and the tall grasses in the back yard nodded in the soft breeze. He stepped through the screen door and out into the garden and let the wild grasses scrape over his thighs. Ivy and wild sunflowers climbed the fence that separated his yard from his neighbors, and through the chinks in the green armor, he saw someone moving. Mimi. Pacing her garden, neatly tended vegetable beds, some flowering bulbs. Skirt and a cream linen blazer that rucked up over her shoulders, moving restlessly. Powerfully. Alan's breath caught in his throat. Her pale, round calves flashed in the sun. He felt himself harden, painfully. He must have gasped, or given some sign, or perhaps she heard his skin tighten over his body into a great goosepimply mass. Her head turned. Their eyes met and he jolted. He was frozen in his footsteps by her gaze. One cheek was livid with a purple bruise, the eye above it slitted and puffed. She took a step toward him, her jacket opening to reveal a shapeless grey sweatshirt stained with food and -- blood? "Mimi?" he breathed. She squeezed her eyes shut, her face turning into a fright mask. "Abel," she said. "Nice day." "Are you all right?" he said. He'd had his girls, his employees, show up for work in this state before. He knew the signs. "Is he in the house now?" She pulled up a corner of her lip into a sneer and he saw that it was split, and a trickle of blood wet her teeth and stained them pink. "Sleeping," she said. He swallowed. "I can call the cops, or a shelter, or both." She laughed. "I gave as good as I got," she said. "We're more than even." "I don't care," he said. "'Even' is irrelevant. Are you *safe*?" "Safe as houses," she said. "Thanks for your concern." She turned back toward her back door. "Wait," he said. She shrugged and the wings under her jacket strained against the fabric. She reached for the door. He jammed his fingers into the chain-link near the top and hauled himself, scrambling, over the fence, landing on all fours in a splintering of tomato plants and sticks. He got to his feet and bridged the distance between them. "I don't believe you, Mimi," he said. "I don't believe you. Come over to my place and let me get you a cup of coffee and an ice pack and we'll talk about it, please?" "Fuck off," she said tugging at the door. He wedged his toe in it, took her wrist gently. "Please," she said. "We'll wake him." "Come over," he said. "We won't wake him." She cracked her arm like a whip, shaking his hand off her wrist. She stared at him out of her swollen eye and he felt the jolt again. Some recognition. Some shock. Some mirror, his face tiny and distorted in her eye. She shivered. "Help me over the fence," she said pulling her skirt between her knees -- bruise on her thigh -- and tucking it behind her into her waistband. She jammed her bare toes into the link and he gripped one hard, straining calf in one hand and put the other on her padded, soft bottom, helping her up onto a perch atop the fence. He scrambled over and then took one bare foot, one warm calf, and guided her down. "Come inside," he said. She'd never been in his house. Natalie and Link went in and out to use his bathroom while they were enjoying the sunset on his porch, or to get a beer. But Mimi had never crossed his threshold. When she did, it felt like something he'd been missing there had been finally found. She looked around with a hint of a smile on her puffed lips. She ran her fingers over the cast-iron gas range he'd restored, caressing the bakelite knobs. She peered at the titles of the books in the kitchen bookcases, over the honey wood of the mismatched chairs and the smoothed-over scars of the big, simple table. "Come into the living room," Alan said. "I'll get you an ice pack." She let him guide her by the elbow, then crossed decisively to the windows and drew the curtains, bringing on twilight. He moved aside his piles of clothes and stacked up the suitcases in a corner. "Going somewhere?" "To see my family," he said. She smiled and her lip cracked anew, dripping a single dark droplet of blood onto the gleaming wood of the floor, where it beaded like water on wax paper. "Home again, home again, jiggety jig," she said. Her nearly closed eye was bright and it darted around the room, taking in shelves, fireplace, chairs, clothes. "I'll get you that ice pack," he said. As he went back into the kitchen, he heard her walking around in the living room, and he remembered the first time he'd met her, of walking around her living room and thinking about slipping a VCD into his pocket. He found her halfway up the staircase with one of the shallow bric-a-brac cabinets open before her. She was holding a Made-in-Occupied-Japan tin robot, the paint crazed with age into craquelaire like a Dutch Master painting in a gallery. "Turn it upside down," he said. She looked at him, then turned it over, revealing the insides of the tin, revealing the gaudily printed tuna-fish label from the original can that it had been fashioned from. "Huh," she said and peered down into it. He hit the light switch at the bottom of the stairs so that she could see better. "Beautiful," she said. "Have it," he said surprising himself. He'd have to remove it from The Inventory. He restrained himself from going upstairs and doing it before he forgot. For the first time he could remember, she looked flustered. Her unbruised cheek went crimson. "I couldn't," she said. "It's yours," he said. He went up the stairs and closed the cabinet, then folded her fingers around the robot and led her by the wrist back down to the sofa. "Ice pack," he said handing it to her, releasing her wrist. She sat stiff-spined in on the sofa, the hump of her wings behind her keeping her from reclining. She caught him staring. "It's time to trim them," she said. "Oh, yes?" he said, mind going back to the gridwork of old scars by her shoulders. "When they get too big, I can't sit properly or lie on my back. At least not while I'm wearing a shirt." "Couldn't you, I don't know, cut the back out of a shirt?" "Yeah," she said. "Or go topless. Or wear a halter. But not in public." "No, not in public. Secrets must be kept." "You've got a lot of secrets, huh?" she said. "Some," he said. "Deep, dark ones?" "All secrets become deep. All secrets become dark. That's in the nature of secrets." She pressed the towel-wrapped bag of ice to her face and rolled her head back and forth on her neck. He heard pops and crackles as her muscles and vertebrae unlimbered. "Hang on," he said. He ran up to his room and dug through his T-shirt drawer until he found one that he didn't mind parting with. He brought it back downstairs and held it up for her to see. "Steel Pole Bathtub," he said. "Retro chic. I can cut the back out for you, at least while you're here." She closed her eyes. "I'd like that," she said in a small voice. So he got his kitchen shears and went to work on the back of the shirt, cutting a sizable hole in the back of the fabric. He folded duct tape around the ragged edges to keep them from fraying. She watched bemusedly. "Freakshow Martha Stewart," she said. He smiled and passed her the shirt. "I'll give you some privacy," he said, and went back into the kitchen and put away the shears and the tape. He tried not to listen to the soft rustle of clothing in the other room. "Alan," she said -- *Alan* and not *Asshole* or *Abel* -- "I could use some help." He stepped cautiously into the living room and saw there, in the curtained twilight, Mimi. She was topless, heavy breasts marked red with the outline of her bra straps and wires. They hung weightily, swaying, and stopped him in the doorway. She had her arms lifted over her head, tugging her round belly up, stretching her navel into a cat-eye slit. The T-shirt he'd given her was tangled in her arms and in her wings. Her magnificent wings. They were four feet long each, and they stretched, one through the neck hole and the other through the hole he'd cut in the T-shirt's back. They were leathery as he remembered, covered in a downy fur that glowed where it was kissed by the few shafts of light piercing the gap in the drapes. He reached for the questing, almost prehensile tip of the one that was caught in the neck hole. It was muscular, like a strong finger, curling against his palm like a Masonic handshake. When he touched her wing, she gasped and shivered, indeterminately between erotic and outraged. They were as he imagined them, these wings, strong and primal and dark and spicy-smelling like an armpit after sex. He gently guided the tip down toward the neck hole and marveled at the intricate way that it folded in on itself, at the play of mysterious muscle and cartilage, the rustle of bristling hair, and the motility of the skin. It accordioned down and he tugged the shirt around it so that it came free, and then he slid the front of the shirt down over her breasts, painfully aware of his erection as the fabric rustled down over her rounded belly. As her head emerged through the shirt, she shook her hair out and then unfolded her wings, slowly and exquisitely, like a cat stretching out, bending forward, spreading them like sails. He ducked beneath one, feeling its puff of spiced air on his face, and found himself staring at the hash of scars and the rigid ropes of hyperextended muscle and joints. Tentatively, he traced the scars with his thumbs, then, when she made no move to stop him, he dug his thumbs into the muscles, into their tension. He kneaded at her flesh, grinding hard at the knots and feeling them give way, briskly rubbing the spots where they'd been to get the blood going. Her wings flapped gently around him as he worked, not caring that his body was pretzeled into a knot of its own to reach her back, since he didn't want to break the spell to ask her to move over to give him a better angle. He could smell her armpit and her wings and her hair and he closed his eyes and worked by touch, following scar to muscle, muscle to knot, working his way the length and breadth of her back, following the muscle up from the ridge of her iliac crest like a treasure trail to the muscle of her left wing, which was softly twitching with pleasure. She went perfectly still again when he took the wing in his hands. It had its own geometry, hard to understand and irresistible. He followed the mysterious and powerful muscles and bones, the vast expanses of cartilage, finding knots and squeezing them, kneading her as he'd kneaded her back, and she groaned and went limp, leaning back against him so that his face was in her hair and smelling her scalp oil and stale shampoo and sweat. It was all he could do to keep himself from burying his face in her hair and gnawing at the muscles at the base of her skull. He moved as slow as a seaweed and ran his hands over to her other wing, giving it the same treatment. He was rock-hard, pressed against her, her wings all around him. He traced the line of her jaw to her chin, and they were breathing in unison, and his fingers found the tense place at the hinge and worked there, too. Then he brushed against her bruised cheek and she startled, and that shocked him back to reality. He dropped his hands to his sides and then stood, realized his erection was straining at his shorts, sat back down again in one of the club chairs, and crossed his legs. "Well," he said. Mimi unfolded her wings over the sofa-back and let them spread out, then leaned back, eyes closed. "You should try the ice-pack again," he said weakly. She groped blindly for it and draped it over her face. "Thank you," she sighed. He suppressed the urge to apologize. "You're welcome," he said. "It started last week," she said. "My wings had gotten longer. Too long. Krishna came home from the club and he was drunk and he wanted sex. Wanted me on the bottom. I couldn't. My wings. He wanted to get the knife right away and cut them off. We do it about four times a year, using a big serrated hunting knife he bought at a sporting-goods store on Yonge Street, one of those places that sells dud grenades and camou pants and tasers." She opened her eyes and looked at him, then closed them. He shivered and a goose walked over his grave. "We do it in the tub. I stand in the tub, naked, and he saws off the wings right to my shoulders. I don't bleed much. He gives me a towel to bite on while he cuts. To scream into. And then we put them in garden trash bags and he puts them out just before the garbage men arrive, so the neighborhood dogs don't get at them. For the meat." He noticed that he was gripping the arm rests so tightly that his hands were cramping. He pried them loose and tucked them under his thighs. "He dragged me into the bathroom. One second, we were rolling around in bed, giggling like kids in love, and then he had me so hard by the wrist, dragging me naked to the bathroom, his knife in his other fist. I had to keep quiet, so that I wouldn't wake Link and Natalie, but he was hurting me, and I was scared. I tried to say something to him, but I could only squeak. He hurled me into the tub and I cracked my head against the tile. I cried out and he crossed the bathroom and put his hand over my mouth and nose and then I couldn't breathe, and my head was swimming. "He was naked and hard, and he had the knife in his fist, not like for slicing, but for stabbing, and his eyes were red from the smoke at the club, and the bathroom filled with the booze-breath smell, and I sank down in the tub, shrinking away from him as he grabbed for me. "He -- *growled*. Saw that I was staring at the knife. Smiled. Horribly. There's a piece of granite we use for a soap dish, balanced in the corner of the tub. Without thinking, I grabbed it and threw it as hard as I could at him. It broke his nose and he closed his eyes and reached for his face and I wrapped him up in the shower curtain and grabbed his arm and bit at the base of his thumb so hard I heard a bone break and he dropped the knife. I grabbed it and ran back to our room and threw it out the window and started to get dressed." She'd fallen into a monotone now, but her wingtips twitched and her knees bounced like her motor was idling on high. She jiggled. "You don't have to tell me this," he said. She took off the ice pack. "Yes, I do," she said. Her eyes seemed to have sunk into her skull, vanishing into dark pits. He'd thought her eyes were blue, or green, but they looked black now. "All right," he said. "All right," she said. "He came through the door and I didn't scream. I didn't want to wake up Link and Natalie. Isn't that stupid? But I couldn't get my sweatshirt on, and they would have seen my wings. He looked like he was going to kill me. Really. Hands in claws. Teeth out. Crouched down low like a chimp, ready to grab, ready to swing. And I was back in a corner again, just wearing track pants. He didn't have the knife this time, though. "When he came for me, I went limp, like I was too scared to move, and squeezed my eyes shut. Listened to his footsteps approach. Felt the creak of the bed as he stepped up on it. Felt his breath as he reached for me. "I exploded. I've read books on women's self-defense, and they talk about doing that, about exploding. You gather in all your energy and squeeze it tight, and then blamo boom, you explode. I was aiming for his soft parts: Balls. Eyes. Nose. Sternum. Ears. I'd misjudged where he was, though, so I missed most of my targets. "And then he was on me, kneeling on my tits, hands at my throat. I bucked him but I couldn't get him off. My chest and throat were crushed, my wings splayed out behind me. I flapped them and saw his hair move in the breeze. He was sweating hard, off his forehead and off his nose and lips. It was all so detailed. And silent. Neither of us made a sound louder than a grunt. Quieter than our sex noises. *Now* I wanted to scream, *wanted* to wake up Link and Natalie, but I couldn't get a breath. "I worked one hand free and I reached for the erection that I could feel just below my tits, reached as fast as a striking snake, grabbed it, grabbed his balls, and I yanked and I squeezed like I was trying to tear them off. "I was. "Now *he* was trying to get away and I had him cornered. I kept squeezing. That's when he kicked me in the face. I was dazed. He kicked me twice more, and I ran downstairs and got a parka from the closet and ran out into the front yard and out to the park and hid in the bushes until morning. "He was asleep when I came back in, after Natalie and Link had gone out. I found the knife beside the house and I went up to our room and I stood there, by the window, listening to you talk to them, holding the knife." She plumped herself on the cushions and flapped her wings once, softly, another puff of that warm air wafting over him. She picked up the tin robot he'd given her from the coffee table and turned it over in her hands, staring up its skirts at the tuna-fish illustration and the Japanese ideograms. "I had the knife, and I felt like I had to use it. You know Chekhov? 'If a gun is on the mantle in the first act, it must go off in the third.' I write one-act plays. Wrote. But it seemed to me that the knife had been in act one, when Krishna dragged me into the bathroom. "Or maybe act one was when he brought it home, after I showed him my wings. "And act two had been my night in the park. And act three was then, standing over him with the knife, cold and sore and tired, looking at the blood crusted on his face." Her face and her voice got very, very small, her expression distant. "I almost used it on myself. I almost opened my wrists onto his face. He liked it when I... rode... his face. Like the hot juices. Seemed mean-spirited to spill all that hot juice and deny him that pleasure. I thought about using it on him, too, but only for a second. "Only for a second. "And then he rolled over and his hands clenched into fists in his sleep and his expression changed, like he was dreaming about something that made him angry. So I left. "Do you want to know about when I first showed him these?" she said, and flapped her wings lazily. She took the ice pack from her face and he could see that the swelling had gone down, the discoloration faded to a dim shadow tinged with yellows and umbers. He did, but he didn't. The breeze of her great wings was strangely intimate, that smell more intimate than his touches or the moment in which he'd glimpsed her fine, weighty breasts with their texture of stretch marks and underwire grooves. He was awkward, foolish feeling. "I don't think I do," he said at last. "I think that we should save some things to tell each other for later." She blinked, slow and lazy, and one tear rolled down and dripped off her nose, splashing on the red T-shirt and darkening it to wineish purple. "Will you sit with me?" she said. He crossed the room and sat on the other end of the sofa, his hand on the seam that joined the two halves together, crossing the border into her territory, an invitation that could be refused without awkwardness. She covered his hand with hers, and hers was cold and smooth but not distant: immediate, scritching and twitching against his skin. Slowly, slowly, she leaned toward him, curling her wing round his far shoulder like a blanket or a lover's arm, head coming to rest on his chest, breath hot on his nipple through the thin fabric of his T-shirt. "Alan?" she murmured into his chest. "Yes?" "What are we?" she said. "Huh?" "Are we human? Where do we come from? How did we get here? Why do I have wings?" He closed his eyes and found that they'd welled up with tears. Once the first tear slid down his cheek, the rest came, and he was crying, weeping silently at first and then braying like a donkey in sobs that started in his balls and emerged from his throat like vomit, gushing out with hot tears and hot snot. Mimi enveloped him in her wings and kissed his tears away, working down his cheeks to his neck, his Adam's apple. He snuffled back a mouthful of mucus and salt and wailed, "I don't know!" She snugged her mouth up against his collarbone. "Krishna does," she whispered into his skin. She tugged at the skin with her teeth. "What about your family?" He swallowed a couple of times, painfully aware of her lips and breath on his skin, the enveloping coolth of her wings, and the smell in every breath he took. He wanted to blow his nose, but he couldn't move without breaking the spell, so he hoarked his sinuses back into his throat and drank the oozing oyster of self-pity that slid down his throat. "My family?" "I don't have a family, but you do," she said. "Your family must know." "They don't," he said. "Maybe you haven't asked them properly. When are you leaving?" "Today." "Driving?" "Got a rental car," he said. "Room for one more?" "Yes," he said. "Then take me," she said. "All right," he said. She raised her head and kissed him on the lips, and he could taste the smell now, and the blood roared in his ears as she straddled his lap, grinding her mons -- hot through the thin cotton of her skirt -- against him. They slid down on the sofa and they groaned into each others' mouths, his voice box resonating with hers. # He parked the rental car in the driveway, finishing his cell phone conversation with Lyman and then popping the trunk before getting out. He glanced reflexively up at Mimi and Krishna's windows, saw the blinds were still drawn. When he got to the living room, Mimi was bent over a suitcase, forcing it closed. Two more were lined up beside the door, along with three shopping bags filled with tupperwares and ziplocs of food from his fridge. "I've borrowed some of your clothes," she said. "Didn't want to have to go back for mine. Packed us a picnic, too." He planted his hands on his hips. "You thought of everything, huh?" he said. She cast her eyes down. "I'm sorry," she said in a small voice. "I couldn't go home." Her wings unfolded and folded down again nervously. He went and stood next to her. He could still smell the sex on her, and on him. A livid hickey stood out on her soft skin on her throat. He twined her fingers in his and dropped his face down to her ear. "It's okay," he said huskily. "I'm glad you did it." She turned her head and brushed her lips over his, brushed her hand over his groin. He groaned softly. "We have to get driving," he said. "Yes," she said. "Load the car, then bring it around the side. I'll lie down on the back seat until we're out of the neighborhood." "You've thought about this a lot, huh?" "It's all I've thought of," she said. # She climbed over the back seat once they cleared Queen Street, giggling as her wings, trapped under her jacket, brushed the roof of the big Crown Victoria he'd rented. She prodded at the radio and found a college station, staticky and amateurish, and nodded her head along with the mash-up mixes and concert bootlegs the DJ was spinning. Alan watched her in the rearview and felt impossibly old and strange. She'd been an incredible and attentive lover, using her hands and mouth, her breasts and wings, her whole body to keep him quivering on the brink of orgasm for what felt like hours, before finally giving him release, and then had guided him around her body with explicit instructions and firm hands on his shoulders. When she came, she squeezed him between her thighs and screamed into his neck, twitching and shuddering for a long time afterward, holding him tight, murmuring nonsense and hot breath. In the dark, she'd seemed older. His age, or some indeterminate age. Now, sitting next to him, privately spazzing out to the beat, she seemed, oh, 12 or so. A little girl. He felt dirty. "Where are we going?" she said, rolling down the window and shouting over the wind as they bombed up the Don Valley Parkway. The traffic had let up at Sheppard, and now they were making good time, heading for the faceless surburbs of Richmond Hill and Thornhill, and beyond. "North," he said. "Past Kapuskasing." She whistled. "How long a drive is it?" "Fifteen hours. Twenty, maybe. Depends on the roads -- you can hit cottage traffic or a bad accident and get hung up for hours. There are good motels between Huntsville and North Bay if we get tired out. Nice neon signs, magic fingers beds. A place I like has 'Swiss Cabins' and makes a nice rosti for dinner." "God, that's a long trip," she said. "Yeah," he said, wondering if she wanted out. "I can pull off here and give you cab fare to the subway station if you wanna stay." "No!" she said quickly. "No. Want to go." # She fed him as he drove, slicing cheese and putting it on crackers with bits of olive or pepper or salami. It appeared that she'd packed his entire fridge in the picnic bags. After suppertime, she went to work on an apple, and he took a closer look at the knife she was using. It was a big, black hunting knife, with a compass built into the handle. The blade was black except right at the edge, where it gleamed sharp in the click-clack of the passing highway lights. He was transfixed by it, and the car drifted a little, sprayed gravel from the shoulder, and he overcorrected and fishtailed a little. She looked up in alarm. "You brought the knife," he said, in response to her unasked question. "Couldn't leave it with him," she said. "Besides, a sharp knife is handy." "Careful you don't slice anything off, okay?" "I never cut anything *unintentionally*," she said in a silly-dramatic voice, and socked him in the shoulder. He snorted and went back to the driving, putting the hammer down, eating up the kilometers toward Huntsville and beyond. She fed him slices of apple and ate some herself, then rolls of ham with little pieces of pear in them, then sips of cherry juice from a glass bottle. "Enough," he said at last. "I'm stuffed, woman!" She laughed. "Skinny little fucker -- gotta put some meat on your bones." She tidied the dinner detritus into an empty shopping bag and tossed it over her shoulder into the back seat. "So," she said. "How long since you've been home?" He stared at the road for a while. "Fifteen years," he said. "Never been back since I left." She stared straight forward and worked her hand under his thigh, so he was sitting on it, then wriggled her knuckles. "I've never been home," she said. He wrinkled his brow. "What's that mean?" he said. "It's a long story," she said. "Well, let's get off the highway and get a room and you can tell me, okay?" "Sure," she said. # They ended up at the Timberline Wilderness Lodge and Pancake House, and Mimi clapped her hands at the silk-flowers-and-waterbeds ambience of the room, fondled the grisly jackalope head on the wall, and started running a tub while Alan carried in the suitcases. She dramatically tossed her clothes, one item at a time, out the bathroom door, through the clouds of steam, and he caught a glimpse of her round, full ass, bracketed by her restless wings, as she poured into the tub the bottle of cheap bubble-bath she'd bought in the lobby. He dug a T-shirt and a fresh pair of boxers to sleep in out of his suitcase, feeling ridiculously modest as he donned them. His feet crunched over cigarette burns and tangles in the brown shag carpet and he wished he'd brought along some slippers. He flipped through both snowy TV channels and decided that he couldn't stomach a televangelist or a thirty-year-old sitcom right then and flicked it off, sitting on the edge of the bed, listening to the splashing from the bathroom. Mimi was in awfully good spirits, considering what she'd been through with Krishna. He tried to think about it, trying to make sense of the day and the girl, but the splashing from the tub kept intruding on his thoughts. She began to sing, and after a second he recognized the tune. "White Rabbit," by the Jefferson Airplane. Not the kind of thing he'd expect her to be giving voice to; nor she, apparently, for she kept breaking off to giggle. Finally, he poked his head through the door. She was folded into the tub, knees and tits above the foamline, wings slick with water and dripping in the tile. Her hands were out of sight beneath the suds. She caught his eye and grinned crazily, then her hands shot out of the pool, clutching the hunting knife. "*Put on the White Rabbit!*" she howled, cackling fiendishly. He leapt back and she continued to cackle. "Come back, come back," she choked. "I'm doing the tub scene from *Fear and Loathing in Las Vegas*. I thought you were into reading?" He cautiously peeked around the doorjamb, playing it up for comic effect. "Give me the knife," he said. "Awww," she said, handing it over, butt first. He set it down on the dresser, then hurried back to the bathroom. "Haven't you read all those books?" Alan grinned. "What's the point of a bunch of books you've already read?" He dropped his boxers and stripped off his T-shirt and climbed into the tub, sloshing gallons of water over the scummy tile floor. # When I was two years old, (she said, later, as she reclined against the headboard and he reclined against her, their asses deforming the rusted springs of the mattress so that it sloped toward them and the tins of soda they'd opened to replenish their bodily fluids lost in sweat and otherwise threatened to tip over on the slope; she encased him in her wings, shutting out the light and filling their air with the smell of cinnamon and pepper from the downy hair) When I was two years old, (she said, speaking into the shaggy hair at the back of his neck, as his sore muscles trembled and as the sweat dried to a white salt residue on his skin, as he lay there in the dark of the room and the wings, watching the constellation of reflected clock-radio lights in the black TV screen) When I was two years old, (she began, her body tensing from toes to tip in a movement that he felt along the length of his body, portending the time when lovers close their eyes and open their mouths and utter the secrets that they hide from everyone, even themselves) When I was two years old, my wings were the size of a cherub's, and they had featherlets that were white as snow. I lived with my "aunt," an old Russian lady near Downsview Air Force Base, a blasted suburb where the shops all closed on Saturday for Sabbath and the black-hatted Hasids marked the days by walking from one end to the other on their way to temple. The old Russian lady took me out for walks in a big black baby buggy the size of a bathtub. She tucked me in tight so that my wings were pinned beneath me. But when we were at home, in her little apartment with the wind-up Sputnik that played "The Internationale," she would let my wings out and light the candles and watch me wobble around the room, my wings flapping, her chin in her hands, her eyes bright. She made me mashed up cabbage and seed and beef, and bottles of dilute juice. For dessert, we had hard candies, and I'd toddle around with my toys, drooling sugar syrup while the old Russian lady watched. By the time I was four, the feathers had all fallen out, and I was supposed to go to school, I knew that. "Auntie" had explained to me that the kids that I saw passing by were on their way to school, and that I'd go some day and learn, too. She didn't speak much English, so I grew up speaking a creole of Russian, Ukrainian, Polish and English, and I used my words to ask her, with more and more insistence, when I'd get to go to class. I couldn't read or write, and neither could she. But I could take apart gadgets like nobody's business. Someone -- maybe Auntie's long dead husband -- had left her a junky tool kit with cracked handles and chipped tips, and I attacked anything that I could get unplugged from the wall: the big cabinet TV and radio, the suitcase record player, the Sputnik music box. I unwired the lamps and peered at the workings of the electric kitchen clock. That was four. Five was the year I put it all back together again. I started with the lamps, then the motor in the blender, then the toaster elements. I made the old TV work. I don't think I knew how any of it *really* worked -- couldn't tell you a thing about, you know, electrical engineering, but I just got a sense of how it was *supposed* to go together. Auntie didn't let me out of the apartment after five. I could watch the kids go by from the window -- skinny Hasids with side-curls and Filipinos with pretty ribbons and teenagers who smoked, but I couldn't go to them. I watched *Sesame Street* and *Mr. Dressup* and I began to soak up English. I began to soak up the idea of playing with other kids. I began to soak up the fact that none of the kids on the TV had wings. Auntie left me alone in the afternoons while she went out shopping and banking and whatever else it was she did, and it was during those times that I could get myself into her bedroom and go rooting around her things. She had a lot of mysterious beige foundation garments that were utterly inexplicable, and a little box of jewelry that I liked to taste, because the real gold tasted really rich when I sucked on it, and a stack of old cigarette tins full of frayed photos. The pictures were stiff and mysterious. Faces loomed out of featureless black backgrounds: pop-eyed, jug-eared Russian farm boys, awkward farm girls with process waves in their hair, everyone looking like they'd been stuffed and mounted. I guess they were her relatives, because if you squinted at them and cocked your head, you could kind of see her features in theirs, but not saggy and wrinkled and three-chinned, but young and tight and almost glowing. They all had big shoulders and clothing that looked like the kind of thing the Hasids wore, black and sober. The faces were interesting, especially after I figured out that one of them might belong to Auntie, but it was the blackness around them that fascinated me. The boys had black suits and the girls wore black dresses, and behind them was creased blackness, complete darkness, as though they'd put their heads through a black curtain. But the more I stared at the blackness, the more detail I picked out. I noticed the edge of a curtain, a fold, in one photo, and when I looked for it, I could just pick it out in the other photos. Eventually, I hit on the idea of using a water glass as a magnifying lens, and as I experimented with different levels of water, more detail leapt out of the old pictures. The curtains hanging behind them were dusty and wrinkled. They looked like they were made of crushed velvet, like the Niagara Falls souvenir pillow on Auntie's armchair in the living room, which had whorls of paisley trimmed into them. I traced these whorls with my eye, and tried to reproduce them with a ballpoint on paper bags I found under the sink. And then, in one of the photos, I noticed that the patterns disappeared behind and above the shoulders. I experimented with different water levels in my glass to bring up the magnification, and I diligently sketched. I'd seen a *Polka Dot Door* episode where the hosts showed how you could draw a grid over an original image and a matching grid on a sheet of blank paper and then copy over every square, reproducing the image in manageable, bite-sized chunks. That's what I did, using the edge of a nail file for a ruler, drawing my grid carefully on the paper bag, and a matching one on the picture, using the blunt tip of a dead pen to make a grid of indentations in the surface of the photo. And I sketched it out, one square at a time. Where the pattern was, where it wasn't. What shapes the negative absence-of-pattern took in the photos. As I drew, day after day, I realized that I was drawing the shape of something black that was blocking the curtain behind. Then I got excited. I drew in my steadiest hand, tracing each curve, using my magnifier, until I had the shape drawn and defined, and long before I finished, I knew what I was drawing and I drew it anyway. I drew it and then I looked at my paper sack and I saw that what I had drawn was a pair of wings, black and powerful, spread out and stretching out of the shot. # She curled the prehensile tips of her wings up the soles of his feet, making him go, Yeek! and jump in the bed. "Are you awake?" she said, twisting her head around to brush her lips over his. "Rapt," he said. She giggled and her tits bounced. "Good," she said. "'Cause this is the important part." # Auntie came home early that day and found me sitting at her vanity, with the photos and the water glass and the drawings on the paper sacks spread out before me. Our eyes met for a moment. Her pupils shrank down to tiny dots, I remember it, remember seeing them vanish, leaving behind rings of yellowed hazel. One of her hands lashed out in a claw and sank into my hair. She lifted me out of the chair by my hair before I'd even had a chance to cry out, almost before I'd registered the fact that she was hurting me -- she'd never so much as spanked me until then. She was strong, in that slow old Russian lady way, strong enough to grunt ten sacks of groceries in a bundle-buggy up the stairs to the apartment. When she picked me up and tossed me, it was like being fired out of a cannon. I rebounded off the framed motel-room art over the bed, shattering the glass, and bounced twice on the mattress before coming to rest on the floor. My arm was hanging at a funny angle, and when I tried to move it, it hurt so much that I heard a high sound in my ears like a dog whistle. I lay still as the old lady yanked the drawers out of her vanity and upended them on the floor until she found an old book of matches. She swept the photos and my sketches into the tin wastebasket and then lit a match with trembling hands and dropped it in. It went out. She repeated it, and on the fourth try she got the idea of using the match to light all the remaining matches in the folder and drop that into the bin. A moment later, it was burning cheerfully, spitting curling red embers into the air on clouds of dark smoke. I buried my face in the matted carpet and tried not to hear that high note, tried to will away the sick grating feeling in my upper arm. She was wreathed in smoke, choking, when she finally turned to me. For a moment, I refused to meet her eye, sure that she would kill me if I did, would see the guilt and the knowledge in my face and keep her secret with murder. I'd watched enough daytime television to know about dark secrets. But when she bent down to me, with the creak of stretching elastic, and she lifted me to my feet and bent to look me in the eye, she had tears in her eyes. She went to the pile of oddments and junk jewelry that she had dumped out on the floor and sorted through it until she found a pair of sewing shears, then she cut away my T-shirt, supporting my broken arm with her hand. My wings were flapping nervously beneath the fabric, and it got tangled, and she took firm hold of the wingtips and folded them down to my back and freed the shirt and tossed it in the pile of junk on her normally spotless floor. She had spoken to me less and less since I had fixed the television and begun to pick up English, and now she was wordless as she gently rotated my fingerbones and my wristbones, my elbow and my shoulder, minute movements, listening for my teakettle hiss when she hit the sore spots. "Is broken," she said. "*Cholera*," she said. "I am so sorry, *lovenu*," she said. # "I've never been to the doctor's," she said. "Never had a pap smear or been felt for lumps. Never, ever had an X-ray. Feel this," she said, and put her upper arm before his face. He took it and ran his fingertips over it, finding a hard bump halfway along, opposite her fleshy bicep. "What's this?" he said. "It's how a bone sets if you have a bad break and don't get a cast. Crooked." "Jesus," he said, giving it another squeeze. Now that he knew what it was, he thought -- or perhaps fancied -- that he could feel how the unevenly splintered pieces of bone mated together, met at a slight angle and fused together by the knitting process. "She made me a sling, and she fed me every meal and brushed my teeth. I had to stop her from following me into the toilet to wipe me up. And I didn't care: She could have broken both of my arms if she'd only explained the photos to me, or left them with me so that I could go on investigating them, but she did neither. She hardly spoke a word to me." She resettled herself against the pillows, then pulled him back against her again and plumped his head against her breasts. "Are you falling in love with me?" she said. He startled. The way she said it, she didn't sound like a young adult, she sounded like a small child. "Mimi --" he began, then stopped himself. "I don't think so. I mean, I like you --" "Good," she said. "No falling in love, all right?" # Auntie died six months later. She keeled over on the staircase on her way up to the apartment, and I heard her moaning and thrashing out there. I hauled her up the stairs with my good arm, and she crawled along on her knees, making gargling noises. I got her laid out on the rug in the living room. I tried to get her up on the sofa, but I couldn't budge her. So I gave her pillows from the sofa and water and then I tried tea, but she couldn't take it. She threw up once, and I soaked it up with a tea towel that had fussy roses on it. She took my hand and her grip was weak, her strong hands suddenly thin and shaky. It took an hour for her to die. When she died, she made a rasping, rattling sound and then she shat herself. I could smell it. It was all I could smell, as I sat there in the little apartment, six years old, hot as hell outside and stuffy inside. I opened the windows and watched the Hasids walk past. I felt like I should *do something* for the old lady, but I didn't know what. I formulated a plan. I would go outside and bring in some grown-up to take care of the old lady. I would do the grocery shopping and eat sandwiches until I was twelve, at which point I would be grown up and I would get a job fixing televisions. I marched into my room and changed into my best clothes, the little Alice-blue dress I wore to dinner on Sundays, and I brushed my hair and put on my socks with the blue pom-poms at the ankles, and found my shoes in the hall closet. But it had been three years since I'd last worn the shoes, and I could barely fit three toes in them. The old lady's shoes were so big I could fit both feet in either one. I took off my socks -- sometimes I'd seen kids going by barefoot outside, but never in just socks -- and reached for the doorknob. I touched it. I stopped. I turned around again. There was a stain forming under Auntie, piss and shit and death-juice, and as I looked at her, I had a firm sense that it wouldn't be *right* to bring people up to her apartment with her like this. I'd seen dead people on TV. They were propped up on pillows, in clean hospital nighties, with rouged cheeks. I didn't know how far I could get, but I thought I owed it to her to try. I figured that it was better than going outside. She was lighter in death, as though something had fled her. I could drag her into the bathroom and prop her on the edge of the tub. I needed to wash her before anyone else came up. I cut away her dress with the sewing shears. She was wearing an elastic girdle beneath, and an enormous brassiere, and they were too tough -- too tight -- to cut through, so I struggled with their hooks, each one going *spung* as I unhooked it, revealing red skin beneath it, pinched and sore-looking. When I got to her bra, I had a moment's pause. She was a modest person -- I'd never even seen her legs without tan compression hose, but the smell was overwhelming, and I just held to that vision of her in a nightie and clean sheets and, you know, *went for it*. Popped the hooks. Felt it give way as her breasts forced it off her back. Found myself staring at. Two little wings. The size of my thumbs. Bent and cramped. Broken. Folded. There, over her shoulder blades. I touched them, and they were cold and hard as a turkey neck I'd once found in the trash after she'd made soup with it. # "How did you get out?" "With my wings?" "Yeah. With your wings, and with no shoes, and with the old lady dead over the tub?" She nuzzled his neck, then bit it, then kissed it, then bit it again. Brushed her fingers over his nipples. "I don't know," she breathed, hot in his ear. He arched his back. "You don't know?" "I don't know. That's all I remember, for five years." He arched his back again, and raked his fingertips over her thighs, making her shudder and jerk her wings back. That's when he saw the corpse at the foot of the bed. It was George. # He went back to school the day after they buried Davey. He bathed all the brothers in the hot spring and got their teeth brushed, and he fed them a hot breakfast of boiled mushroom-and-jerky stew, and he gathered up their schoolbooks from the forgotten corners of the winter cave and put them into school bags. Then he led them down the hillside on a spring day that smelled wonderful: loam and cold water coursing down the mountainside in rivulets, and new grass and new growth drying out in a hard white sun that seemed to spring directly overhead five minutes after it rose. They held hands as they walked down the hill, and then Elliot-Franky-George broke away and ran down the hill to the roadside, skipping over the stones and holding their belly as they flew down the hillside. Alan laughed at the impatient jig they danced as they waited for him and Brad to catch up with them, and Brad put an arm around his shoulder and kissed him on the cheek in a moment of uncharacteristic demonstrativeness. He marched right into Mr. Davenport's office with his brothers in tow. "We're back," he said. Mr. Davenport peered at them over the tops of his glasses. "You are, are you?" "Mom took sick," he said. "Very sick. We had to go live with our aunt, and she was too far away for us to get to school." "I see," Mr. Davenport said. "I taught the littler ones as best as I could," Alan said. He liked Mr. Davenport, understood him. He had a job to do, and needed everything to be accounted for and filed away. It was okay for Alan and his brothers to miss months of school, provided that they had a good excuse when they came back. Alan could respect that. "And I read ahead in my textbooks. I think we'll be okay." "I'm sure you will be," Mr. Davenport said. "How is your mother now?" "She's better," he said. "But she was very sick. In the hospital." "What was she sick with?" Alan hadn't thought this far ahead. He knew how to lie to adults, but he was out of practice. "Cancer," he said, thinking of Marci's mother. "Cancer?" Mr. Davenport said, staring hard at him. "But she's better now," Alan said. "I see. You boys, why don't you get to class? Alan, please wait here a moment." His brothers filed out of the room. and Alan shuffled nervously, looking at the class ring on Mr. Davenport's hairy finger, remembering the time that Davey had kicked him. He'd never asked Alan where Davey was after that, and Alan had never offered, and it had been as though they shared a secret. "Are you all right, Alan?" he asked, settling down behind his desk, taking off his glasses. "Yes, sir," Alan said. "You're getting enough to eat at home? There's a quiet place where you can work?" "Yes," Alan said, squirming. "It's fine, now that Mom is home." "I see," Mr. Davenport said. "Listen to me, son," he said, putting his hands flat on the desk. "The school district has some resources available: clothes, lunch vouchers, Big Brother programs. They're not anything you have to be ashamed of. It's not charity, it's just a little booster. A bit of help. The other children, their parents are well and they live in town and have lots of advantages that you and your brothers lack. This is just how we level the playing field. You're a very bright lad, and your brothers are growing up well, but it's no sin to accept a little help." Alan suddenly felt like laughing. "We're not underprivileged," he said, thinking of the mountain, of the feeling of being encompassed by love of his father, of the flakes of soft, lustrous gold the golems produced by the handful. "We're very well off," he said, thinking of home, now free of Davey and his hateful, spiteful anger. "Thank you, though," he said, thinking of his life unfolding before him, free from the terror of Davey's bites and spying and rocks thrown from afar. Mr. Davenport scowled and stared hard at him. Alan met his stare and smiled. "It's time for classes," he said. "Can I go?" "Go," Mr. Davenport said. He shook his head. "But remember, you can always come here if you have anything you want to talk to me about." "I'll remember," Alan said. # Six years later, Bradley was big and strong and he was the star goalie of all the hockey teams in town, in front of the puck before it arrived, making desperate, almost nonchalant saves that had them howling in the stands, stomping their feet, and sloshing their Tim Horton's coffee over the bleachers, to freeze into brown ice. In the summer, he was the star pitcher on every softball team, and the girls trailed after him like a long comet tail after the games when the other players led him away to a park to drink illicit beers. Alan watched his games from afar, with his schoolbooks on his lap, and Eric-Franz-Greg nearby playing trucks or reading or gnawing on a sucker. By the ninth inning or the final period, the young ones would be too tired to play, and they'd come and lean heavily against Alan, like a bag of lead pressing on him, eyes half open, and Alan would put an arm around them and feel at one with the universe. It snowed on the afternoon of the season opener for the town softball league that year, fat white wet flakes that kissed your cheeks and melted away in an instant, so soft that you weren't sure they'd be there at all. Bradley caught up with Alan on their lunch break, at the cafeteria in the high school two blocks from the elementary school. He had his mitt with him and a huge grin. "You planning on playing through the snow?" Alan said, as he set down his cheeseburger and stared out the window at the diffuse white radiance of the April noontime bouncing off the flakes. "It'll be gone by tonight. Gonna be *warm*," Bradley said, and nodded at his jock buddies sitting at their long table, sucking down Cokes and staring at the girls. "Gonna be a good game. I know it." Bradley knew. He knew when they were getting shorted at the assayers' when they brought in the golems' gold, just as he knew that showing up for lunch with a brown bag full of dried squirrel jerky and mushrooms and lemongrass was a surefire way to end up social roadkill in the high school hierarchy, as was dressing like someone who'd been caught in an explosion at the Salvation Army, and so he had money and he had burgers and he had a pair of narrow-leg jeans from the Gap and a Roots sweatshirt and a Stussy baseball hat and Reebok sneakers and he looked, basically, like a real person. Alan couldn't say the same for himself, but he'd been making an effort since Bradley got to high school, if only to save his brother the embarrassment of being related to the biggest reject in the building -- but Alan still managed to exude his don't-fuck-with-me aura enough that no one tried to cozy up to him and make friends with him and scrutinize his persona close in, which was just as he wanted it. Bradley watched a girl walk past, a cute thing with red hair and freckles and a skinny rawboned look, and Alan remembered that she'd been sitting next to him in class for going on two years now and he'd never bothered to learn her name. And he'd never bothered to notice that she was a dead ringer for Marci. "I've always had a thing for redheads," Bradley said. "Because of you," he said. "You and your girlfriend. I mean, if she was good enough for *you*, well, she had to be the epitome of sophistication and sexiness. Back then, you were like a god to me, so she was like a goddess. I imprinted on her, like the baby ducks in Bio. It's amazing how much of who I am today I can trace back to those days. Who knew that it was all so important?" He was a smart kid, introspective without being moody. Integrated. Always popping off these fine little observations in between his easy jokes. The girls adored him, the boys admired him, the teachers were grateful for him and the way he bridged the gap between scholarship and athleticism. "I must have been a weird kid," he said. "All that quiet." "You were a great kid," Alan said. "It was a lot of fun back then, mostly." "Mostly," he said. They both stared at the girl, who noticed them now, and blushed and looked confused. Bradley looked away, but Alvin held his gaze on her, and she whispered to a friend, who looked at him, and they both laughed, and then Alan looked away, too, sorry that he'd inadvertently interacted with his fellow students. He was supposed to watch, not participate. "He was real," Bradley said, and Alan knew he meant Davey. "Yeah," Alan said. "I don't think the little ones really remember him -- he's more like a bad dream to them. But he was real, wasn't he?" "Yeah," Alan said. "But he's gone now." "Was it right?" "What do you mean?" Alan said. He felt a sear of anger arc along his spine. "It's nothing," Billy said, mumbling into his tray. "What do you mean, Brad?" Alan said. "What else should we have done? How can you have any doubts?" "I don't," Brad said. "It's okay." Alan looked down at his hands, which appeared to belong to someone else: white lumps of dough clenched into hard fists, knuckles white. He made himself unclench them. "No, it's *not* okay. Tell me about this. You remember what he was like. What he...did." "I remember it," Bryan said. "Of course I remember it." He was staring through the table now, the look he got when he was contemplating a future the rest of them couldn't see. "But." Alan waited. He was trembling inside. He'd done the right thing. He'd saved his family. He knew that. But for six years, he'd found himself turning in his memory to the little boy on the ground, holding the loops of intestine in through slippery red fingers. For six years, whenever he'd been somewhere quiet long enough that his own inner voices fell still, he'd remember the hair in his fist, the knife's thirsty draught as it drew forth the hot splash of blood from Davey's throat. He'd remembered the ragged fissure that opened down Clarence's length and the way that Davey fell down it, so light and desiccated he was almost weightless. "If you remember it, then you know I did the right thing. I did the only thing." "*We* did the only thing," Brian said, and covered Alan's hand with his. Alan nodded and stared at his cheeseburger. "You'd better go catch up with your friends," he said. "I love you, Adam," he said. "I love you, too." Billy crossed the room, nodding to the people who greeted him from every table, geeks and jocks and band and all the meaningless tribes of the high school universe. The cute redhead sprinkled a wiggle-finger wave at him, and he nodded at her, the tips of his ears going pink. # The snow stopped by three p.m., and the sun came out and melted it away, so that by the time the game started at five-thirty, its only remnant was the soggy ground around the bleachers with the new grass growing out of the ragged brown memory of last summer's lawn. Alan took the little ones for dinner at the diner after school, letting them order double chocolate-chip pancakes. At 13, they'd settled into a fatness that made him think of a foam-rubber toy, the rolls and dimples at their wrists and elbows and knees like the seams on a doll. "You're starting high school next year?" Alan said, as they were pouring syrup on their second helping. He was startled by this -- how had they gotten so old so quickly? "Uh-huh," Eli said. "I guess." "So you're graduating from elementary school this spring?" "Yeah." Eli grinned a chocolate smile at him. "It's no big deal. There's a party, though." "Where?" "At some kid's house." "It's okay," Alan said. "We can celebrate at home. Don't let them get to you." "We can't go?" Ed suddenly looked a little panicked. "You're invited?" He blurted it out and then wished he hadn't. "Of course we're invited," Fred said from inside Ed's throat. "There's going to be dancing." "You can dance?" Alan asked. "We can!" Ed said. "We learned in gym," Greg said, with the softest, proudest voice, deep within them. "Well," Alan said. He didn't know what to say. High school. Dancing. Invited to parties. No one had invited him to parties when he'd graduated from elementary school, and he'd been too busy with the little ones to go in any event. He felt a little jealous, but mostly proud. "Want a milkshake?" he asked, mentally totting up the cash in his pocket and thinking that he should probably send Brad to dicker with the assayer again soon. "No, thank you," Ed said. "We're watching our weight." Alan laughed, then saw they weren't joking and tried to turn it into a cough, but it was too late. Their shy, chocolate smile turned into a rubber-lipped pout. # The game started bang on time at six p.m., just as the sun was setting. The diamond lights flicked on with an audible click and made a spot of glare that cast out the twilight. Benny was already on the mound, he'd been warming up with the catcher, tossing them in fast and exuberant and confident and controlled. He looked good on the mound. The ump called the start, and the batter stepped up to the plate, and Benny struck him out in three pitches, and the little ones went nuts, cheering their brother on along with the other fans in the bleachers, a crowd as big as any you'd ever see outside of school, thirty or forty people. The second batter stepped up and Benny pitched a strike, another strike, and then a wild pitch that nearly beaned the batter in the head. The catcher cocked his mask quizzically, and Benny kicked the dirt and windmilled his arm a little and shook his head. He tossed another wild one, this one coming in so low that it practically rolled across the plate. His teammates were standing up in their box now, watching him carefully. "Stop kidding around," Alan heard one of them say. "Just strike him out." Benny smiled, spat, caught the ball, and shrugged his shoulders. He wound up, made ready to pitch, and then dropped the ball and fell to his knees, crying out as though he'd been struck. Alan grabbed the little ones' hand and pushed onto the diamond before Benny's knees hit the ground. He caught up with Benny as he keeled over sideways, bringing his knees up to his chest, eyes open and staring and empty. Alan caught his head and cradled it on his lap and was dimly aware that a crowd had formed round them. He felt Barry's heart thundering in his chest, and his arms were stuck straight out to his sides, one hand in his pitcher's glove, the other clenched tightly around the ball. "It's a seizure," someone said from the crowd. "Is he an epileptic? It's a seizure." Someone tried to prize Alan's fingers from around Barry's head and he grunted and hissed at them, and they withdrew. "Barry?" Alan said, looking into Barry's face. That faraway look in his eyes, a million miles away. Alan knew he'd seen it before, but not in years. The eyes came back into focus, closed, opened. "Davey's back," Barry said. Alan's skin went cold and he realized that he was squeezing Barry's head like a melon. He relaxed his grip and helped him to his feet, got Barry's arm around his shoulders, and helped him off the diamond. "You okay?" one of the players asked as they walked past him, but Barry didn't answer. The little ones were walking beside them now, clutching Barry's hand, and they turned their back on the town as a family and walked toward the mountain. # George had come to visit him once before, not long after Alan'd moved to Toronto. He couldn't come without bringing down Elliot and Ferdinand, of course, but it was George's idea to visit, that was clear from the moment they rang the bell of the slightly grotty apartment he'd moved into in the Annex, near the students who were barely older than him but seemed to belong to a different species. They were about 16 by then, and fat as housecats, with the same sense of grace and inertia in their swinging bellies and wobbling chins. Alan welcomed them in. Edward was wearing a pair of wool trousers pulled nearly up to his nipples and short suspenders that were taut over his sweat-stained white shirt. He was grinning fleshily, his hair damp with sweat and curled with the humidity. He opened his mouth, and George's voice emerged. "This place is..." He stood with his mouth open, while inside him, George thought. "*Incredible.* I'd never..." He closed his mouth, then opened it again. "*Dreamed*. What a..." Now Ed spoke. "Jesus, figure out what you're going to say before you say it, willya? This is just plain --" "Rude," came Fede's voice from his mouth. "I'm sorry," came George's voice. Ed was working on his suspenders, then unbuttoning his shirt and dropping his pants, so that he stood in grimy jockeys with his slick, tight, hairy belly before Alan. He tipped himself over, and then Alan was face-to-face with Freddy, who was wearing a T-shirt and a pair of boxer shorts with blue and white stripes. Freddy was scowling comically, and Alan hid a grin behind his hand. Freddy tipped to one side and there was George, short and delicately formed and pale as a frozen french fry. He grabbed Freddy's hips like handles and scrambled out of him, springing into the air and coming down on the balls of his feet, holding his soccer-ball-sized gut over his Hulk Underoos. "It's incredible," he hooted, dancing from one foot to the other. "It's brilliant! God! I'm never, ever going home!" "Oh, yes?" Alan said, not bothering to hide his smile as Frederick and George separated and righted themselves. "And where will you sleep, then?" "Here!" he said, running around the tiny apartment, opening the fridge and the stove and the toaster oven, flushing the toilet, turning on the shower faucets. "Sorry," Alan called as he ran by. "No vacancies at the Hotel Anders!" "Then I won't sleep!" he cried on his next pass. "I'll play all night and all day in the streets. I'll knock on every door on every street and introduce myself to every person and learn their stories and read their books and meet their kids and pet their dogs!" "You're bonkers," Alan said, using the word that the lunch lady back at school had used when chastising them for tearing around the cafeteria. "Easy for you to say," Greg said, skidding to a stop in front of him. "Easy for you -- you're *here*, you got *away*, you don't have to deal with *Davey* --" He closed his mouth and his hand went to his lips. Alan was still young and had a penchant for the dramatic, so he went around to the kitchen and pulled a bottle of vodka out of the freezer and banged it down on the counter, pouring out four shots. He tossed back his shot and returned the bottle to the freezer. George followed suit and choked and turned purple, but managed to keep his expression neutral. Fred and Ed each took a sip, then set the drinks down with a sour face. "How's home?" Alan said quietly, sliding back to sit on the minuscule counter surface in his kitchenette. "It's okay," Ed mumbled, perching on the arm of the Goodwill sofa that came with the apartment. Without his brothers within him, he moved sprightly and lightly. "It's fine," Fred said, looking out the window at the street below, craning his neck to see Bloor Street and the kids smoking out front of the Brunswick House. "It's awful," Greg said, and pulled himself back up on the counter with them. "And I'm not going back." The two older brothers looked balefully at him, then mutely appealed to Alan. This was new -- since infancy, Earl-Frank-Geoff had acted with complete unity of will. When they were in the first grade, Alan had wondered if they were really just one person in three parts -- that was how close their agreements were. "Brian left last week," Greg said, and drummed his heels on the grease-streaked cabinet doors. "Didn't say a word to any of us, just left. He comes and goes like that all the time. Sometimes for weeks." Craig was halfway around the world, he was in Toronto, and Brian was God-knew-where. That left just Ed-Fred-George and Davey, alone in the cave. No wonder they were here on his doorstep. "What's he doing?" "He just sits there and watches us, but that's enough. We're almost finished with school." He dropped his chin to his chest. "I thought we could finish here. Find a job. A place to live." He blushed furiously. "A girl." Ed and Fred were staring at their laps. Alan tried to picture the logistics, but he couldn't, not really. There was no scenario in which he could see his brothers carrying on with -- "Don't be an idiot," Ed said. He sounded surprisingly bitter. He was usually a cheerful person -- or at least a fat and smiling person. Alan realized for the first time that the two weren't equivalent. George jutted his chin toward the sofa and his brothers. "They don't know what they want to do. They think that, 'cause it'll be hard to live here, we should hide out in the cave forever." "Alan, talk to him," Fred said. "He's nuts." "Look," George said. "You're gone. You're *all* gone. The king under the mountain now is Davey. If we stay there, we'll end up his slaves or his victims. Let him keep it. There's a whole world out here we can live in. "I don't see any reason to let my handicap keep me down." "It's not a handicap," Edward said patiently. "It's just how we are. We're different. We're not like the rest of them." "Neither is Alan," George said. "And here he is, in the big city, living with them. Working. Meeting people. Out of the mountain." "Alan's more like them than he is like us," Frederick said. "We're not like them. We can't pass for them." Alan's jaw hung slack. Handicapped? Passing? Like them? Not like them? He'd never thought of his brothers this way. They were just his brothers. Just his family. They could communicate with the outside world. They were people. Different, but the same. "You're just as good as they are," he said. And that shut them up. They all regarded him, as if waiting for him to go on. He didn't know what to say. Were they, really? Was he? Was he better? "What are we, Alan?" Edward said it, but Frederick and George mouthed the words after he'd said them. "You're my brothers," he said. "You're. . ." "I want to see the city," George said. "You two can come with me, or you can meet me when I come back." "You *can't* go without us," Frederick said. "What if we get hungry?" "You mean, what if I don't come back, right?" "No," Frederick said, his face turning red. "Well, how hungry are you going to get in a couple hours? You're just worried that I'm going to wander off and not come back. Fall into a hole. Meet a girl. Get drunk. And you won't ever be able to eat again." He was pacing again. Ed and Fred looked imploringly at him. "Why don't we all go together?" Alan said. "We'll go out and do something fun -- how about ice-skating?" "Skating?" George said. "Jesus, I didn't ride a bus for 30 hours just to go *skating*." Edward said, "I want to sleep." Frederick said, "I want dinner." Perfect, Alan thought. "Perfect. We'll all be equally displeased with this, then. The skating's out in front of City Hall. There are lots of people there, and we can take the subway down. We'll have dinner afterward on Queen Street, then turn in early and get a good night's sleep. Tomorrow, we'll negotiate something else. Maybe Chinatown and the zoo." They are stared at him. "This is a limited-time offer," Alan said. "I had other plans tonight, you know. Going once, going twice --" "Let's go," George said. He went and took his brothers' hands. "Let's go, okay?" They had a really good time. # George's body was propped up at the foot of the bed. He was white and wrinkled as a big toe in a bathtub, skin pulled tight in his face so that his hairline and eyebrows and cheeks seemed raised in surprise. Alan smelled him now, a stink like a mouse dead between the gyprock in the walls, the worst smell imaginable. He felt Mimi breathing behind him, her chest heaving against his back. He reached out and pushed aside the wings, moving them by their translucent membranes, fingers brushing the tiny fingerlets at the wingtips, recognizing in their touch some evolutionary connection with his own hands. George toppled over as Alan stepped off the bed, moving in the twilight of the light from under the bathroom door. Mimi came off the bed on the other side and hit the overhead light switch, turning the room as bright as an icebox, making Alan squint painfully. She closed the blinds quickly, then went to the door and shot the chain and the deadbolt closed. Mimi looked down at him. "Ugly sumbitch, whoever he was." "My brother," Alan said. "Oh," she said. She went back around the bed and sat on the edge, facing the wall. "Sorry." She crossed her leg and jiggled her foot, making the springs squeak. Alan wasn't listening. He knelt down and touched George's cheek. The skin was soft and spongy, porous and saturated. Cold. His fingertips came away with shed white flakes of translucent skin clinging to them. "Davey?" Alan said. "Are you in here?" Mimi's foot stilled. They both listened intently. There were night-time sounds in the motel, distant muffled TVs and car engines and fucking, but no sound of papery skin thudding on ground-down carpet. "He must have come up through the drain," Alan said. "In the bathroom." The broad pale moon of George's belly was abraded in long grey stripes. He stood and, wiping his hand on his bare thigh, reached for the bathroom doorknob. The door swung open, revealing the sanitized-for-your-protection brightness of the bathroom, the water sloshed on the floor by Mimi earlier, the heaps of damp towels. "How'd he find us here?" Mimi, in her outsized blazer and track pants, touched him on his bare shoulder. He suddenly felt terribly naked. He backed out of the bathroom, shoving Mimi aside, and numbly pulled on his jeans and a shapeless sweatshirt that smelled of Mimi and had long curly hairs lurking in the fabric that stuck to his face like cobwebs. He jammed his feet into his sneakers. He realized that he'd had to step over his brother's body six times to do this. He looked at his brother again. He couldn't make sense of what he was seeing. The abraded belly. The rictus. His balls, shrunk to an albino walnut, his cock shriveled up to unrecognizability. The hair, curly, matted all over his body, patchily rubbed away. He paced in the little run beside the bed, the only pacing room he had that didn't require stepping over George's body, back and forth, two paces, turn, two paces, turn. "I'm going to cover him up," Mimi said. "Good, fine," Alan said. "Are you going to be okay?" "Yes, fine," Alan said. "Are you freaking out?" Alan didn't say anything. George looked an awful lot like Davey had, the day they killed him. # Mimi found a spare blanket in the closet, reeking of mothballs and scarred with a few curdled cigarette burns, and she spread it out on the floor and helped him lift Grant's body onto it and wind it tightly around him. "What now?" she said. He looked down at the wound sheet, the lump within it. He sat down heavily on the bed. His chest was tight, and his breath came in short *hup*s. She sat beside him and put an arm around his shoulder, tried to pull his head down to her bosom, but he stiffened his neck. "I knew this was coming," he said. "When we killed Darren, I knew." She stood and lit a cigarette. "This is your family business," she said, "why we're driving up north?" He nodded, not trusting his voice, seeing the outlines of Grad's face, outlined in moth-eaten blanket. "So," she said. "Let's get up north, then. Take an end." The night was cold, and they staggered under the weight of the body wound in the blanket and laid him out in the trunk of the car, shifting luggage and picnic supplies to the back seat. At two a.m., the motel lights were out and the road was dark and silent but for the soughing of wind and the distant sounds of night animals. "Are you okay to drive?" she said, as she piled their clothes indiscriminately into the suitcases. "What?" he said. The cool air on his face was waking him up a little, but he was still in a dream-universe. The air was spicy and outdoors and it reminded him powerfully of home and simpler times. He looked at Mimi without really seeing her. "Are you okay to drive?" The keys were in his hands, the car smelling of the detailing-in-a-can mist that the rental agency sprayed on the upholstery to get rid of the discount traveler farts between rentals. "I can drive," he said. Home, and the mountain, and the washing machine, and the nook where he'd slept for 18 years, and the golems, and the cradle they'd hewn for him. Another ten or twelve hours' driving and they'd be at the foot of the trail where the grass grew to waist-high. "Well, then, *drive*." She got in the car and slammed her door. He climbed in, started the engine, and put the hertzmobile into reverse. # Two hours later, he realized that he was going to nod off. The thumps of the body sliding in the trunk and the suitcases rattling around in the back seat had lost their power to keep him awake. The body's thumping had hardly had the power to begin with. Once the initial shock had passed, the body became an object only, a thing, a payload he had to deliver. Alan wondered if he was capable of feeling the loss. "You were eleven then," he said. It was suddenly as though no time had past since they'd sat on the bed and she'd told him about Auntie. "Yes," she said. "It was as though no time had passed." A shiver went up his back. He was wide awake. "No time had passed." "Yes. I was living with a nice family in Oakville who were sending me to a nice girls' school where we wore blazers over our tunics, and I had a permanent note excusing me from gym classes. In a building full of four hundred girls going through puberty, one more fat shy girl who wouldn't take her top off was hardly noteworthy." "The family, they were nice. WASPy. They called me Cheryl. With a Why. When I asked them where I'd been before, about 'Auntie,' they looked sad and hurt and worried for me, and I learned to stop. They hugged me and touched my wings and never said anything -- and never wiped their hands on their pants after touching them. They gave me a room with a computer and a CD player and a little TV of my own, and asked me to bring home my friends. "I had none. "But they found other girls who would come to my 'birthday' parties, on May 1, which was exactly two months after their son's birthday and two months before their daughter's birthday. "I can't remember any of their names. "But they made me birthday cards and they made me breakfast and dinner and they made me welcome. I could watch them grilling burgers in the back yard by the above ground pool in the summer from my bedroom window. I could watch them building forts or freezing skating rinks in the winter. I could listen to them eating dinner together while I did my homework in my bedroom. There was a place for me at the dinner-table, but I couldn't sit there, though I can't remember why." "Wait a second," Alan said. "You don't remember?" She made a sad noise in her throat. "I was told I was welcome, but I knew I wasn't. I know that sounds paranoid -- crazy. Maybe I was just a teenager. There was a reason, though, I just don't know what it was. I knew then. They knew it, too -- no one blamed me. They loved me, I guess." "You stayed with them until you went to school?" "Almost. Their daughter went to Waterloo, then the next year, their son went to McGill in Montreal, and then it was just me and them. I had two more years of high school, but it just got unbearable. With their children gone, they tried to take an interest in me. Tried to make me eat with them. Take me out to meet their friends. Every day felt worse, more wrong. One night, I went to a late movie by myself downtown and then got to walking around near the clubs and looking at the club kids and feeling this terrible feeling of loneliness, and when I was finally ready to go home, the last train had already gone. I just spent the night out, wandering around, sitting in a back booth at Sneaky Dee's and drinking Cokes, watching the sun come up from the top of Christie Pitts overlooking the baseball diamond. I was a 17-year-old girl from the suburbs wearing a big coat and staring at her shoelaces, but no one bugged me. "When I came home the next morning, no one seemed particularly bothered that I'd been away all night. If anything, the parental people might have been a little distraught that I came home. 'I think I'll get my own place,' I said. They agreed, and agreed to put the lease in their name to make things easier. I got a crummy little basement in what the landlord called Cabbagetown but what was really Regent Park, and I switched out to a huge, anonymous high school to finish school. Worked in a restaurant at nights and on weekends to pay the bills." The night highway rushed past them, quiet. She lit a cigarette and rolled down her window, letting in the white-noise crash of the wind and the smell of the smoke mixed with the pine-and-summer reek of the roadside. "Give me one of those," Alan said. She lit another and put it between his lips, damp with her saliva. His skin came up in goosepimples. "Who knows about your wings?" he said. "Krishna knows," she said. "And you." She looked out into the night. "The family in Oakville. If I could remember where they lived, I'd look them up and ask them about it. Can't. Can't remember their names or their faces. I remember the pool, though, and the barbecue." "No one else knows?" "There was no one else before Krishna. No one that I remember, anyway." "I have a brother," he said, then swallowed hard. "I have a brother named Brad. He can see the future." "Yeah?" "Yeah." He pawed around for an ashtray and discovered that it had been removed, along with the lighter, from the rental car's dashboard. Cursing, he pinched off the coal of the cigarette and flicked it to the roadside, hoping that it would burn out quickly, then he tossed the butt over his shoulder at the back seat. As he did, the body in the trunk rolled while he navigated a curve in the road and he braked hard, getting the car stopped in time for him to open the door and pitch a rush of vomit onto the roadway. "You okay to drive?" "Yeah. I am." He sat up and put the car into gear and inched to the shoulder, then put it in park and set his blinkers. The car smelled of sour food and sharp cigarettes and God, it smelled of the body in the trunk. "It's not easy to be precognizant," Alan said, and pulled back onto the road, signaling even though there were no taillights or headlights for as far as the eye could see. "I believe it," she said. "He stopped telling us things after a while. It just got him into trouble. I'd be studying for an exam and he'd look at me and shake his head, slowly, sadly. Then I'd flunk out, and I'd be convinced that it was him psyching me out. Or he'd get picked for kickball and he'd say. 'What's the point, this team's gonna lose,' and wander off, and they'd lose, and everyone would hate him. He couldn't tell the difference between what he knew and what everyone else knew. Didn't know the difference between the past and the future, sometimes. So he stopped telling us, and when we figured out how to read it in his eyes, he stopped looking at us. "Then something really -- Something terrible... Someone I cared about died. And he didn't say anything about it. I could have -- stopped -- it. Prevented it. I could have saved her life, but he wouldn't talk." He drove. "For real, he could see the future?" she said softly. Her voice had more emotion than he'd ever heard in it and she rolled down the window and lit another cigarette, pluming smoke into the roar of the wind. "Yeah," Alan said. "*A* future or *the* future, I never figured it out. A little of both, I suppose." "He stopped talking, huh?" "Yeah," Alan said. "I know what that's like," Mimi said. "I hadn't spoken more than three words in the six months before I met Krishna. I worked at a direct-mail house, proofreading the mailing labels. No one wanted to say anything to me, and I just wanted to disappear. It was soothing, in a way, reading all those names. I'd dropped out of school after Christmas break, just didn't bother going back again, never paid my tuition. I threw away my houseplants and flushed my fish down the toilet so that there wouldn't be any living thing that depended on me." She worked her hand between his thigh and the seat. "Krishna sat next to me on the subway. I was leaning forward because my wings were long -- the longest they've ever been -- and wearing a big parka over them. He leaned forward to match me and tapped me on the shoulder. "I turned to look at him and he said, 'I get off at the next stop. Will you get off with me and have a cup of coffee? I've been riding next to you on the subway for a month, and I want to find out what you're like.' "I wouldn't have done it, except before I knew what I was doing, I'd already said, 'I beg your pardon?' because I wasn't sure I'd heard him right. And once I'd said that, once I'd spoken, I couldn't bear the thought of not speaking again." # They blew through Kapuskasing at ten a.m., on a grey morning that dawned with drizzle and bad-tempered clouds low overhead. The little main drag -- which Alan remembered as a bustling center of commerce where he'd waited out half a day to change buses -- was deserted, the only evidence of habitation the occasional car pulling through a donut store drive-through lane. "Jesus, who divorced me this time?" Mimi said, ungumming her eyes and stuffing a fresh cigarette into her mouth. "*Fear and Loathing* again, right?" "It's *the* road-trip novel," she said. "What about *On the Road*?" "Oh, *that*," she said. "Pfft. Kerouac was a Martian on crank. Dope fiend prose isn't fit for human consumption." "Thompson isn't a dope fiend?" "No. That was just a put-on. He wrote *about* drugs, not *on* drugs." "Have you *read* Kerouac?" "I couldn't get into it," she said. He pulled sharply off the road and into a parking lot. "What's this?" she said. "The library," he said. "Come on." It smelled just as it had when he was 17, standing among the aisles of the biggest collection of books he'd ever seen. Sweet, dusty. "Here," he said, crossing to the fiction section. The fiction section at the library in town had fit into three spinner racks. Here, it occupied its own corner of overstuffed bookcases. "Here," he said, running his finger down the plastic Brodart wraps on the spines of the books, the faded Dewey labels. H, I, J, K... There it was, the edition he'd remembered from all those years ago. *On the Road.* "Come on," he said. "We've got it." "You can't check that out," she said. He pulled out his wallet as they drew up closer to the checkout counter. He slid out the plastic ID holder, flipping past the health card and the driver's license -- not a very good likeness of his face or his name on either, and then produced a library card so tattered that it looked like a pirate's map on parchment. He slid it delicately out of the plastic sleeve, unbending the frayed corner, smoothing the feltlike surface of the card, the furry type. He slid the card and the book across the counter. Mimi and the librarian -- a boy of possibly Mimi's age, who wore a mesh-back cap just like his patrons, but at a certain angle that suggested urbane irony -- goggled at it, as though Alan had slapped down a museum piece. The boy picked it up with such roughness that Alan flinched on behalf of his card. "This isn't --" the boy began. "It's a library card," Alan said. "They used to let me use it here." The boy set it down on the counter again. Mimi peered at it. "There's no name on that card," she said. "Never needed one," he said. He'd gotten the card from the sour-faced librarian back home, tricked her out of it by dragging along Bradley and encouraging him to waddle off into the shelves and start pulling down books. She'd rolled it into her typewriter and then they'd both gone chasing after Brad, then she'd asked him again for his name and they'd gone chasing after Brad, then for his address, and then Brad again. Eventually, he was able to simply snitch it out of the platen of the humming Selectric and walk out. No one ever looked closely at it again -- not even the thoroughly professional staffers at the Kapuskasing branch who'd let him take out a stack of books to read in the bus station overnight while he waited for the morning bus to Toronto. He picked up the card again then set it down. It was the first piece of identification he ever owned, and in some ways, the most important. "I have to give you a new card," the mesh-back kid said. "With a bar code. We don't take that card anymore." He picked it up and made to tear it in half. "NO!" Alan roared, and lunged over the counter to seize the kid's wrists. The kid startled back and reflexively tore at the card, but Alan's iron grip on his wrists kept him from completing the motion. The kid dropped the card and it fluttered to the carpet behind the counter. "Give it to me," Alan said. The boy's eyes, wide with shock, began to screw shut with pain. Alan let go his wrists, and the kid chafed them, backing away another step. His shout had drawn older librarians from receiving areas and offices behind the counter, women with the look of persons accustomed to terminating children's mischief and ejecting rowdy drunks with equal aplomb. One of them was talking into a phone, and two more were moving cautiously toward them, sizing them up. "We should go," Mimi said. "I need my library card," he said, and was as surprised as anyone at the pout in his voice, a sound that was about six years old, stubborn, and wounded. Mimi looked hard at him, then at the librarians converging on them, then at the mesh back kid, who had backed all the way up to a work surface several paces back of him. She planted her palms on the counter and swung one foot up onto it, vaulting herself over. Alan saw the back of her man's jacket bulge out behind her as her wings tried to spread when she took to the air. She snatched up the card, then planted her hands again and leapt into the air. The toe of her trailing foot caught the edge of the counter and she began to tumble, headed for a face-plant into the greyed-out industrial carpet. Alan had the presence of mind to catch her, her tit crashing into his head, and gentle her to the floor. "We're going," Mimi said. "Now." Alan hardly knew where he was anymore. The card was in Mimi's hand, though, and he reached for it, making a keening noise deep in his throat. "Here," she said, handing it to him. When he touched the felted card stock, he snapped back to himself. "Sorry," he said lamely to the mesh-back kid. Mimi yanked his arm and they jumped into the car and he fumbled the key into the ignition, fumbled the car to life. His head felt like a balloon on the end of a taut string, floating some yards above his body. He gunned the engine and the body rolled in the trunk. He'd forgotten about it for a while in the library and now he remembered it again. Maybe he felt something then, a twitchy twinge of grief, but he swallowed hard and it went away. The clunk-clunk of the wheels going over the curb as he missed the curb-cut back out onto the road, Mimi sucking breath in a hiss as he narrowly avoided getting T-boned by a rusted-out pickup truck, and then the hum of the road under his wheels. "Alan?" Mimi said. "It was my first piece of identification," he said. "It made me a person who could get a book out of the library." They drove on, heading for the city limits at a few klicks over the speed limit. Fast, lots of green lights. "What did I just say?" Alan said. "You said it was your first piece of ID," Mimi said. She was twitching worriedly in the passenger seat. Alan realized that she was air-driving, steering and braking an invisible set of controls as he veered around the traffic. "You said it made you a person --" "That's right," Alan said. "It did." # He never understood how he came to be enrolled in kindergarten. Even in those late days, there were still any number of nearby farm folk whose literacy was so fragile that they could be intimidated out of it by a sheaf of school enrollment forms. Maybe that was it -- the five-year-old Alan turning up at the school with his oddly accented English and his Martian wardrobe of pieces rescued from roadside ditches and snitched off of clotheslines, and who was going to send him home on the first day of school? Surely the paperwork would get sorted out by the time the first permission-slip field trip rolled around, or possibly by the time vaccination forms were due. And then it just fell by the wayside. Alan got the rest of his brothers enrolled, taking their forms home and forging indecipherable scrawls that satisfied the office ladies. His own enrollment never came up in any serious way. Permission slips were easy, inoculations could be had at the walk-in clinic once a year at the fire house. Until he was eight, being undocumented was no big deal. None of his classmates carried ID. But his classmates *did* have Big Wheels, catcher's mitts, Batmobiles, action figures, Fonzie lunchboxes, and Kodiak boots. They had parents who came to parents' night and sent trays of cupcakes to class on birthdays -- Alan's birthday came during the summer, by necessity, so that this wouldn't be an issue. So did his brothers', when their time came to enroll. At eight, he ducked show-and-tell religiously and skillfully, but one day he got caught out, empty-handed and with all the eyes in the room boring into him as he fumfuhed at the front of the classroom, and the teacher thought he was being kind by pointing out that his hand-stitched spring moccasins -- a tithe of the golems -- were fit subject for a brief exposition. "Did your mom buy you any real shoes?" It was asked without malice or calculation, but Alan's flustered, red-faced, hot stammer chummed the waters and the class sharks were on him fast and hard. Previously invisible, he was now the subject of relentless scrutiny. Previously an observer of the playground, he was now a nexus of it, a place where attention focused, hunting out the out-of-place accent, the strange lunch, the odd looks and gaps in knowledge of the world. He thought he'd figured out how to fit in, that he'd observed people to the point that he could be one, but he was so wrong. They watched him until Easter break, when school let out and they disappeared back into the unknowable depths of their neat houses, and when they saw him on the street headed for a shop or moping on a bench, they cocked their heads quizzically at him, as if to say, *Do I know you from somewhere?* or, if he was feeling generous, *I wonder where you live?* The latter was scarier than the former. For his part, he was heartsick that he turned out not to be half so clever as he'd fancied himself. There wasn't much money around the mountain that season -- the flakes he'd brought down to the assayer had been converted into cash for new shoes for the younger kids and chocolate bars that he'd brought to fill Bradley's little round belly. He missed the school library achingly during that week, and it was that lack that drove him to the town library. He'd walked past the squat brown brick building hundreds of times, but had never crossed its threshold. He had a sense that he wasn't welcome there, that it was not intended for his consumption. He slunk in like a stray dog, hid himself in the back shelves, and read books at random while he observed the other patrons coming and going. It took three days of this for him to arrive at his strategy for getting his own library card, and the plan worked flawlessly. Bradley pulled the books off the back shelves for the final time, the librarian turned in exasperation for the final time, and he was off and out with the card in his hand before the librarian had turned back again. Credentialed. He'd read the word in a book of war stories. He liked the sound of it. # "What did Krishna do?" "What do you mean?" She was looking at him guardedly now, but his madness seemed to have past. "I mean," he said, reaching over and taking her hand, "what did Krishna do when you went out for coffee with him?" "Oh," she said. She was quiet while they drove a narrow road over a steep hill. "He made me laugh." "He doesn't seem that funny," Alan said. "We went out to this coffee shop in Little Italy, and he sat me down at a tiny green metal table, even though it was still cold as hell, and he brought out tiny cups of espresso and a little wax-paper bag of biscotti. Then he watched the people and made little remarks about them. 'She's a little old to be breeding,' or 'Oh, is that how they're wearing their eyebrow in the old country?' or 'Looks like he beats his wife with his slipper for not fixing his Kraft Dinner right.' And when he said it, I *knew* it wasn't just a mean little remark, I *knew* it was true. Somehow, he could look at these people and know what they were self-conscious about, what their fears were, what their little secrets were. And he made me laugh, even though it didn't take long before I guessed that that meant that he might know my secret." "So we drank our coffee," she said, and then stopped when the body thudded in the trunk again when they caught some air at the top of a hill. "We drank it and he reached across the table and tickled my open palm with his fingertips and he said, 'Why did you come out with me?' "And I mumbled and blushed and said something like, 'You look like a nice guy, it's just coffee, shit, don't make a big deal out of it,' and he looked like I'd just canceled Christmas and said, 'Oh, well, too bad. I was hoping it was a big deal, that it was because you thought I'd be a good guy to really hang out with a *lot*, if you know what I mean.' He tickled my palm again. I was a blushing virgin, literally though I'd had a couple boys maybe possibly flirt with me in school, I'd never returned the signals, never could. "I told him I didn't think I could be romantically involved with him, and he flattened out his palm so that my hand was pinned to the table under it and he said, 'If it's your deformity, don't let that bother you. I thought I could fix that for you.' I almost pretended I didn't know what he meant, but I couldn't really, I knew he knew I knew. I said, 'How?' as in, *How did you know* and *How can you fix it*? but it just came out in a little squeak, and he grinned like Christmas was back on and said, 'Does it really matter?' "I told him it didn't, and then we went back to his place in Kensington Market and he kissed me in the living room, then he took me upstairs to the bathroom and took off my shirt and he --" "He cut you," Alan said. "He fixed me," she said. Alan reached out and petted her wings through her jacket. "Were you broken?" "Of *course* I was," she snapped, pulling back. "I couldn't *talk* to people. I couldn't *do* anything. I wasn't a person," she said. "Right," Alan said. "I'm following you." She looked glumly at the road unraveling before them, grey and hissing with rain. "Is it much farther?" she said. "An hour or so, if I remember right," he said. "I know how stupid that sounds," she said. "I couldn't figure out if he was some kind of pervert who liked to cut or if he was some kind of pervert who liked girls like me or if I was lucky or in trouble. But he cut them, and he gave me a towel to bite on the first time, but I never needed it after that. He'd do it quick, and he kept the knife sharp, and I was able to be a person again -- to wear cute clothes and go where I wanted. It was like my life had started over again." The hills loomed over the horizon now, low and rolling up toward the mountains. One of them was his. He sucked in a breath and the car wavered on the slick road. He pumped the brakes and coasted them to a stop on the shoulder. "Is that it?" she said. "That's it," he said. He pointed. His father was green and craggy and smaller than he remembered. The body rolled in the trunk. "I feel --" he said. "We're taking him home, at least. And my father will know what to do." "No boy has ever taken me home to meet his folks," she said. Alan remembered the little fist in the dirt. "You can wait in the car if you want," he said. # Krishna came home, (she said, as they sat in the parked car at a wide spot in the highway, looking at the mountains on the horizon) Krishna came home, (she said, after he'd pulled off the road abruptly, put the car into park, and stared emptily at the mountains ahead of them) Krishna came home, (she said, lighting a cigarette and rolling down the window and letting the shush of the passing cars come fill the car, and she didn't look at him, because the expression on his face was too terrible to behold) and he came through the door with two bags of groceries and a bottle of wine under one arm and two bags from a ravewear shop on Queen Street that I'd walked past a hundred times but never gone into. He'd left me in his apartment that morning, with his television and his books and his guitar, told me to make myself at home, told me to call in sick to work, told me to take a day for myself. I felt...*glorious*. Gloried *in*. He'd been so attentive. He'd touched me. No one had touched me in so long. No one had *ever* touched me that way. He'd touched me with...*reverence*. He's gotten this expression on his face like, like he was in *church* or something. He'd kept breathing something too low for me to hear and when he put his lips right to my ear, I heard what he'd been saying all along, "Oh God, oh God, my God, oh God," and I'd felt a warmness like slow honey start in my toes and rise through me like sap to the roots of my hair, so that I felt like I was saturated with something hot and sweet and delicious. He came home that night with the makings of a huge dinner with boiled soft-shell crabs, and a bottle of completely decent Chilean red, and three dresses for me that I could never, ever wear. I tried to keep the disappointment off my face as he pulled them out of the bag, because I *knew* they'd never go on over my wings, and they were *so* beautiful. "This one will look really good on you," he said, holding up a Heidi dress with a scoop neck that was cut low across the back, and I felt a hot tear in the corner of my eye. I'd never wear that dress in front of anyone but him. I couldn't, my wings would stick out a mile. I knew what it meant to be different: It meant living in the second floor with the old Russian Auntie, away from the crowds and their eyes. I knew then what I was getting in for -- the rest of my life spent hidden away from the world, with only this man to see and speak to. I'd been out in the world for only a few years, and I had barely touched it, moving in silence and stealth, watching and not being seen, but oh, I had *loved it*, I realized. I'd thought I'd hated it, but I'd loved it. Loved the people and their dialogue and their clothes and their mysterious errands and the shops full of goods and every shopper hunting for something for someone, every one of them part of a story that I would never be part of, but I could be *next to* the stories and that was enough. I was going to live in an attic again. I started to cry. He came to me. he put his arms around me. He nuzzled my throat and licked up the tears as they slid past my chin. "Shhh," he said. "Shhh." He took off my jacket and my sweater, peeled down my jeans and my panties, and ran his fingertips over me, stroking me until I quietened. He touched me reverently still, his breath hot on my skin. No one had ever touched me like that. He said, "I can fix you." I said, "No one can fix me." He said, "I can, but you'll have to be brave." I nodded slowly. I could do brave. He led me by the hand into the bathroom and he took a towel down off of the hook on the back of the door and folded it into a long strip. He handed it to me. "Bite down on this," he said, and helped me stand in the tub and face into the corner, to count the grid of tiles and the greenish mildew in the grout. "Hold still and bite down," he said, and I heard the door close behind me. Reverent fingertips on my wing, unfolding it, holding it away from my body. "Be brave," he said. And then he cut off my wing. It hurt so much, I pitched forward involuntarily and cracked my head against the tile. It hurt so much I bit through two thicknesses of towel. It hurt so much my legs went to mush and I began to sit down quickly, like I was fainting. He caught me, under my armpits, and held me up, and I felt something icy pressed to where my wing had been -- I closed my eyes, but I heard the leathery thump as my wing hit the tile floor, a wet sound -- and gauzy fabric was wrapped around my chest, holding the icy towel in place over the wound, once twice thrice, between my tits. "Hold still," he said. And he cut off the other one. I screamed this time, because he brushed the wound he'd left the first time, but I managed to stay upright and to not crack my head on anything. I felt myself crying but couldn't hear it, I couldn't hear anything, nothing except a high sound in my ears like a dog whistle. He kissed my cheek after he'd wound a second bandage, holding a second cold compress over my second wound. "You're a very brave girl," he said. "Come on." He led me into the living room, where he pulled the cushions off his sofa and opened it up to reveal a hide-a-bed. He helped me lie down on my belly, and arranged pillows around me and under my head, so that I was facing the TV. "I got you movies," he said, and held up a stack of DVD rental boxes from Martian Signal. "We got *Pretty in Pink*, *The Blues Brothers*, *The Princess Bride*, a Robin Williams stand-up tape and a really funny-looking porno called *Edward Penishands*." I had to smile in spite of myself, in spite of the pain. He stepped into his kitchenette and came back with a box of chocolates. "Truffles," he said. "So you can laze on the sofa, eating bonbons." I smiled more widely then. "Such a beautiful smile," he said. "Want a cup of coffee?" "No," I said, choking it out past my raw-from-screaming throat. "All right," he said. "Which video do you want to watch?" "*Princess Bride*," I said. I hadn't heard of any of them, but I didn't want to admit it. "You don't want to start with Edward Penishands?" # Alan stood out front of the video shop for a while, watching Natalie wait on her customers. She was friendly without being perky, and it was clear that the mostly male clientele had a bit of a crush on her, as did her mooning, cow-eyed co-worker who was too distracted to efficiently shelve the videos he pulled from the box before him. Alan smiled. Hiring cute girls for your shop was tricky business. If they had brains, they'd sell the hell out of your stock and be entertaining as hell; but a lot of pretty girls (and boys!) had gotten a free ride in life and got affronted when you asked them to do any real work. Natalie was clearly efficient, and Alan knew that she wasn't afraid of hard work, but it was good to see her doing her thing, quickly and efficiently taking people's money, answering their questions, handing them receipts, counting out change... He would have loved to have had someone like her working for him in one of his shops. Once the little rush at the counter was cleared, he eased himself into the shop. Natalie *was* working for him, of course, in the impromptu assembly line in Kurt's storefront. She'd proven herself to be as efficient at assembling and testing the access points as she was at running the till. "Alan!" she said, smiling broadly. Her co-worker turned and scowled jealously at him. "I'm going on break, okay?" she said to him, ignoring his sour puss. "What, now?" he said petulantly. "No, I thought I'd wait until we got busy again," she said, not unkindly, and smiled at him. "I'll be back in ten," she said. She came around the counter with her cigs in one hand and her lighter in the other. "Coffee?" she said. "Absolutely," he said, and led her up the street. "You liking the job?" he said. "It's better now," she said. "I've been bringing home two or three movies every night and watching them, just to get to know the stock, and I put on different things in the store, the kind of thing I'd never have watched before. Old horror movies, tentacle porn, crappy kung-fu epics. So now they all bow to me." "That's great," Alan said. "And Kurt tells me you've been doing amazing work with him, too." "Oh, that's just fun," she said. "I went along on a couple of dumpster runs with the gang. I found the most amazing cosmetics baskets at the Shiseido dumpster. Never would have thought that I'd go in for that girly stuff, but when you get it for free out of the trash, it feels pretty macha. Smell," she said, tilting her head and stretching her neck. He sniffed cautiously. "Very macha," he said. He realized that the other patrons in the shop were eyeballing him, a middle-aged man, with his face buried in this alterna-girl's throat. He remembered suddenly that he still hadn't put in a call to get her a job somewhere else, and was smitten with guilt. "Hey," he said. "Damn. I was supposed to call Tropicál and see about getting you a job. I'll do it right away." He pulled a little steno pad out of his pocket and started jotting down a note to himself. She put her hand out. "Oh, that's okay," she said. "I really like this job. I've been looking up all my old high school friends: You were right, everyone I ever knew has an account with Martian Signal. God, you should *see* the movies they rent." "You keep that on file, huh?" "Sure, everything. It's creepy." "Do you need that much info?" "Well, we need to know who took a tape out last if someone returns it and says that it's broken or recorded over or whatever --" "So you need, what, the last couple months' worth of rentals?" "Something like that. Maybe longer for the weirder tapes, they only get checked out once a year or so --" "So maybe you keep the last two names associated with each tape?" "That'd work." "You should do that." She snorted and drank her coffee. "I don't have any say in it." "Tell your boss," he said. "It's how good ideas happen in business -- people working at the cash register figure stuff out, and they tell their bosses." "So I should just tell my boss that I think we should change our whole rental system because it's creepy?" "Damned right. Tell him it's creepy. You're keeping information you don't need to keep, and paying to store it. You're keeping information that cops or snoops or other people could take advantage of. And you're keeping information that your customers almost certainly assume you're not keeping. All of those are good reasons *not* to keep that information. Trust me on this one. Bosses love to hear suggestions from people who work for them. It shows that you're engaged, paying attention to their business." "God, now I feel guilty for snooping." "Well, maybe you don't mention to your boss that you've been spending a lot of time looking through rental histories." She laughed. God, he liked working with young people. "So, why I'm here," he said. "Yes?" "I want to put an access point in the second-floor window and around back of the shop. Your boss owns the building, right?" "Yeah, but I really don't think I can explain all this stuff to him --" "I don't need you to -- I just need you to introduce me to him. I'll do all the explaining." She blushed a little. "I don't know, Abe..." She trailed off. "Is that a problem?" "No. Yes. I don't know." She looked distressed. Suddenly he was at sea. He'd felt like he was in charge of this interaction, like he understood what was going on. He'd carefully rehearsed what he was going to say and what Natalie was likely to say, and now she was, what, afraid to introduce him to her boss? Because why? Because the boss was an ogre? Then she would have pushed back harder when he told her to talk to him about the rental records. Because she was shy? Natalie wasn't shy. Because -- "I'll do it," she said. "Sorry. I was being stupid. It's just -- you come on a little strong sometimes. My boss, I get the feeling that he doesn't like it when people come on strong with him." Ah, he thought. She was nervous because he was so goddamned weird. Well, there you had it. He couldn't even get sad about it. Story of his life, really. "Thanks for the tip," he said. "What if I assure you that I'll come on easy?" She blushed. It had really been awkward for her, then. He felt bad. "Okay," she said. "Sure. Sorry, man --" He held up a hand. "It's nothing." He followed her back to the store and he bought a tin robot made out of a Pepsi can by some artisan in Vietnam who'd endowed it with huge tin testicles. It made him laugh. When he got home, he scanned and filed the receipt, took a picture, and entered it into The Inventory, and by the time he was done, he was feeling much better. # They got into Kurt's car at five p.m., just as the sun was beginning to set. The sun hung on the horizon, *right* at eye level, for an eternity, slicing up their eyeballs and into their brains. "Summer's coming on," Alan said. "And we've barely got the Market covered," Kurt said. "At this rate, it'll take ten years to cover the whole city." Alan shrugged. "It's the journey, dude, not the destination -- the act of organizing all these people, of putting up the APs, of advancing the art. It's all worthwhile in and of itself." Kurt shook his head. "You want to eat Vietnamese?" "Sure," Alan said. "I know a place," he said, and nudged the car through traffic and on to the Don Valley Parkway. "Where the hell are we *going*?" Alan said, once they'd left the city limits and entered the curved, identical cookie-cutter streets of the industrial suburbs in the north end. "Place I know," Kurt said. "It's really cheap and really good. All the Peel Region cops eat there." He snapped his fingers. "Oh, yeah, I was going to tell you about the cop," he said. "You were," Alan said. "So, one night I'd been diving there." Kurt pointed to an anonymous low-slung, sprawling brown building. "They print hockey cards, baseball cards, monster cards -- you name it." He sipped at his donut-store coffee and then rolled down the window and spat it out. "Shit, that was last night's coffee," he said. "So, one night I was diving there, and I found, I dunno, fifty, a hundred boxes of hockey cards. Slightly dented at the corners, in the trash. I mean, hockey cards are just *paper*, right? The only thing that makes them valuable is the companies infusing them with marketing juju and glossy pictures of mullet-head, no-tooth jocks." "Tell me how you really feel," Alan said. "Sorry," Kurt said. "The hockey players in junior high were real jerks. I'm mentally scarred. "So I'm driving away and the law pulls me over. The local cops, they know me, mostly, 'cause I phone in B&Es when I spot them, but these guys had never met me before. So they get me out of the car and I explain what I was doing, and I quote the part of the Trespass to Property Act that says that I'm allowed to do what I'm doing, and then I open the trunk and I show him, and he busts a *nut*: 'You mean you found these in the *garbage?* My kid spends a fortune on these things! In the *garbage*?' He keeps saying, 'In the garbage?' and his partner leads him away and I put it behind me. "But then a couple nights later, I go back and there's someone in the dumpster, up to his nipples in hockey cards." "The cop," Alan said. "The cop," Kurt said. "Right." "That's the story about the cop in the dumpster, huh?" Alan said. "That's the story. The moral is: We're all only a c-hair away from jumping in the dumpster and getting down in it." "C-hair? I thought you were trying not to be sexist?" "*C* stands for *cock*, okay?" Alan grinned. He and Kurt hadn't had an evening chatting together in some time. When Kurt suggested that they go for a ride, Alan had been reluctant: too much on his mind those days, too much *Danny* on his mind. But this was just what he needed. What they both needed. "Okay," Alan said. "We going to eat?" "We're going to eat," Kurt said. "The Vietnamese place is just up ahead. I once heard a guy there trying to speak Thai to the waiters. It was amazing -- it was like he was a tourist even at home, an ugly fucked-up tourist. People suck." "Do they?" Alan said. "I quite like them. You know, there's pretty good Vietnamese in Chinatown." "This is good Vietnamese." "Better than Chinatown?" "Better situated," Kurt said. "If you're going dumpster diving afterward. I'm gonna take your cherry, buddy." He clapped a hand on Alan's shoulder. Real people didn't touch Alan much. He didn't know if he liked it. "God," Alan said. "This is so sudden." But he was happy about it. He'd tried to picture what Kurt actually *did* any number of times, but he was never very successful. Now he was going to actually go out and jump in and out of the garbage. He wondered if he was dressed for it, picturing bags of stinky kitchen waste, and decided that he was willing to sacrifice his jeans and the old Gap shirt he'd bought one day after the shirt he'd worn to the store -- the wind-up toy store? -- got soaked in a cloudburst. The Vietnamese food was really good, and the family who ran the restaurant greeted Kurt like an old friend. The place was crawling with cops, a new two or three every couple minutes, stopping by to grab a salad roll or a sandwich or a go-cup of pho. "Cops always know where to eat fast and cheap and good," Kurt mumbled around a mouthful of pork chop and fried rice. "That's how I found this place, all the cop cars in the parking lot." Alan slurped up the last of his pho and chased down the remaining hunks of rare beef with his chopsticks and dipped them in chili sauce before popping them in his mouth. "Where are we going?" he asked. Kurt jerked his head in the direction of the great outdoors. "Wherever the fates take us. I just drive until I get an itch and then I pull into a parking lot and hit the dumpsters. There's enough dumpsters out this way, I could spend fifty or sixty hours going through them all, so I've got to be selective. I know how each company's trash has been running -- lots of good stuff or mostly crap -- lately, and I trust my intuition to take me to the right places. I'd love to go to the Sega or Nintendo dumpsters, but they're like Stalag Thirteen -- razorwire and motion-sensors and armed guards. They're the only companies that take secrecy seriously." Suddenly he changed lanes and pulled up the driveway of an industrial complex. "Spidey-sense is tingling," he said, as he killed his lights and crept forward to the dumpster. "Ready to lose your virginity?" he said, lighting a cigarette. "I wish you'd stop using that metaphor," Alan said. "Ick." But Kurt was already out of the Buick, around the other side of the car, pulling open Alan's door. "That dumpster is full of cardboard," he said, gesturing. "It's recycling. That one is full of plastic bottles. More recycling. This one," he said, *oof*ing as he levered himself over it, talking around the maglight he'd clenched between his teeth, "is where they put the good stuff. Looky here." Alan tried to climb the dumpster's sticky walls, but couldn't get a purchase. Kurt, standing on something in the dumpster that crackled, reached down and grabbed him by the wrist and hoisted him up. He scrambled over the dumpster's transom and fell into it, expecting a wash of sour kitchen waste to break over him, and finding himself, instead, amid hundreds of five-inch cardboard boxes. "What's this?" he asked. Kurt was picking up the boxes and shaking them, listening for the rattle. "This place is an import/export wholesaler. They throw out a lot of defective product, since it's cheaper than shipping it all back to Taiwan for service. But my kids will fix it and sell it on eBay. Here," he said, opening a box and shaking something out, handing it to him. He passed his light over to Alan, who took it, unmindful of the drool on the handle. It was a rubber duckie. Alan turned it over and saw it had a hard chunk of metal growing out of its ass. "More of these, huh?" Kurt said. "I found about a thousand of these last month. They're USB keychain drives, low-capacity, like 32MB. Plug them in and they show up on your desktop like a little hard drive. They light up in all kinds of different colors. The problem is, they've all got a manufacturing defect that makes them glow in just one color -- whatever shade the little gel carousel gets stuck on. "I've got a couple thousand of these back home, but they're selling briskly. Go get me a couple cardboard boxes from that dumpster there and we'll snag a couple hundred more." Alan gawped. The dumpster was seven feet cubed, the duckies a few inches on a side. There were thousands and thousands of duckies in the dumpster: more than they could ever fit into the Buick. In a daze, he went off and pulled some likely flattened boxes out of the trash and assembled them, packing them with the duckies that Kurt passed down to him from atop his crunching, cracking mound of doomed duckies that he was grinding underfoot. Once they'd finished, Kurt fussed with moving the boxes around so that everything with a bootprint was shuffled to the bottom. "We don't want them to know that we've been here or they'll start hitting the duckies with a hammer before they pitch 'em out." He climbed into the car and pulled out a bottle of window cleaner and some paper towels and wiped off the steering wheel and the dash and the handle of his flashlight, then worked a blob of hand sanitizer into his palms, passing it to Alan when he was done. Alan didn't bother to point out that as Kurt had worked, he'd transferred the flashlight from his mouth to his hands and back again a dozen times -- he thought he understood that this ritual was about Kurt assuring himself that he was not sinking down to the level of rummies and other garbage pickers. As if reading his mind, Kurt said, "You see those old rum-dums pushing a shopping cart filled with empty cans down Spadina? Fucking *morons* -- they could be out here pulling LCDs that they could turn around for ten bucks a pop, but instead they're rooting around like raccoons in the trash, chasing after nickel deposits." "But then what would you pick?" Kurt stared at him. "You kidding me? Didn't you *see*? There's a hundred times more stuff than I could ever pull. Christ, if even one of them had a squint of ambition, we could *double* the amount we save from the trash." "You're an extraordinary person," Alan said. He wasn't sure he meant it as a compliment. After all, wasn't *he* an extraordinary person, too? # Alan was stunned when they found a dozen hard drives that spun up and revealed themselves to be of generous capacity and moreover stuffed with confidential looking information when he plugged them into the laptop that Kurt kept under the passenger seat. He was floored when they turned up three slightly elderly Toshiba laptops, each of which booted into a crufty old flavor of Windows, and only one of which had any obvious material defects: a starred corner in its LCD. He was delighted by the dumpsters full of plush toys, by the lightly used office furniture, by the technical books and the CDs of last year's software. The smells were largely inoffensive -- Kurt mentioned that the picking was better in winter when the outdoors was one big fridge, but Alan could hardly smell anything except the sour smell of an old dumpster and occasionally a whiff of coffee grounds. They took a break at the Vietnamese place for coconut ice and glasses of sweet iced coffee, and Kurt nodded at the cops in the restaurant. Alan wondered why Kurt was so pleasant with these cops out in the boonies but so hostile to the law in Kensington Market. "How are we going to get connectivity out of the Market?" Kurt said. "I mean, all this work, and we've hardly gotten four or five square blocks covered." "Buck up," Alan said. "We could spend another two years just helping people in the Market use what we've installed, and it would still be productive." Kurt's mouth opened, and Alan held his hand up. "Not that I'm proposing that we do that. I just mean there's plenty of good that's been done so far. What we need is some publicity for it, some critical mass, and some way that we can get ordinary people involved. We can't fit a critical mass into your front room and put them to work." "So what do we get them to do?" "It's a good question. There's something I saw online the other day I wanted to show you. Why don't we go home and get connected?" "There's still plenty of good diving out there. No need to go home anyway -- I know a place." They drove off into a maze of cul-de-sacs and cheaply built, gaudy monster homes with triple garages and sagging rain gutters. The streets had no sidewalks and the inevitable basketball nets over every garage showed no signs of use. Kurt pulled them up in front of a house that was indistinguishable from the others and took the laptop from under the Buick's seat, plugging it into the cigarette lighter and flipping its lid. "There's an open network here," Kurt said as he plugged in the wireless card. He pointed at the dormer windows in the top room. "How the hell did you find that?" Alan said, looking at the darkened window. There was a chain-link gate at the side of the house, and in the back an aboveground pool. Kurt laughed. "These 'security consultants'" -- he made little quotes with his fingers -- "wardrove Toronto. They went from one end of the city to the other with a GPS and a wireless card and logged all the open access points they found, then released a report claiming that all of those access points represented ignorant consumers who were leaving themselves vulnerable to attacks and making Internet connections available to baby-eating terrorists. "One of the access points they identified was *mine*, for chrissakes, and mine was open because I'm a crazy fucking anarchist, not because I'm an ignorant 'consumer' who doesn't know any better, and that got me to thinking that there were probably lots of people like me around, running open APs. So one night I was out here diving and I *really* was trying to remember who'd played the Sundance Kid in Butch Cassidy, and I knew that if I only had a net connection I could google it. I had a stumbler, an app that logged all the open WiFi access points that I came into range of, and a GPS attachment that I'd dived that could interface with the software that mapped the APs on a map of Toronto, so I could just belt the machine in there on the passenger seat and go driving around until I had a list of all the wireless Internet that I could see from the street. "So I got kind of bored and went back to diving, and then I did what I usually do at the end of the night, I went driving around some residential streets, just to see evidence of humanity after a night in the garbage, and also because the people out here sometimes put out nice sofas and things. "When I got home, I looked at my map and there were tons of access points out by the industrial buildings, and some on the commercial strips, and a few out here in the residential areas, but the one with the best signal was right here, and when I clicked on it, I saw that the name of the network was 'ParasiteNet.'" Alan said, "Huh?" because ParasiteNet was Kurt's name for his wireless project, though they hadn't used it much since Alan got involved and they'd gotten halfway legit. But still. "Yeah," Kurt said. "That's what I said -- huh? So I googled ParasiteNet to see what I could find, and I found an old message I'd posted to toronto.talk.wireless when I was getting started out, a kind of manifesto about what I planned to do, and Google had snarfed it up and this guy, whoever he is, must have read it and decided to name his network after it. "So I figger: This guy *wants* to share packets with me, for sure, and so I always hunt down this AP when I want to get online." "You've never met him, huh?" "Never. I'm always out here at two a.m. or so, and there's never a light on. Keep meaning to come back around five some afternoon and ring the bell and say hello. Never got to it." Alan pursed his lips and watched Kurt prod at the keyboard. "He's got a shitkicking net connection, though -- tell you what. Feels like a T1, and the IP address comes off of an ISP in Waterloo. You need a browser, right?" Alan shook his head. "You know, I can't even remember what it was I wanted to show you. There's some kind of idea kicking at me now, though..." Kurt shifted his laptop to the back seat, mindful of the cords and the antenna. "What's up?" "Let's do some more driving around, let it perk, okay? You got more dumpsters you want to show me?" "Brother, I got dumpsters for weeks. Months. Years." # It was the wardriving, of course. Alan called out the names of the networks that they passed as they passed them, watching the flags pop up on the map of Toronto. They drove the streets all night, watched the sun go up, and the flags multiplied on the network. Alan didn't even have to explain it to Kurt, who got it immediately. They were close now, thinking together in the feverish drive-time on the night-dark streets. "Here's the thing," Kurt said as they drank their coffees at the Vesta Lunch, a grimy 24-hour diner that Alan only seemed to visit during the smallest hours of the morning. "I started off thinking, well, the cell companies are screwed up because they think that they need to hose the whole city from their high towers with their powerful transmitters, and my little boxes will be lower-power and smarter and more realistic and grassroots and democratic." "Right," Alan said. "I was just thinking of that. What could be more democratic than just encouraging people to use their own access points and their own Internet connections to bootstrap the city?" "Yeah," Kurt said. "Sure, you won't get to realize your dream of getting a free Internet by bridging down at the big cage at 151 Front Street, but we can still play around with hardware. And convincing the people who *already* know why WiFi is cool to join up has got to be easier than convincing shopkeepers who've never heard of wireless to let us put antennae and boxes on their walls." "Right," Kurt said, getting more excited. "Right! I mean, it's just ego, right? Why do we need to *control* the network?" He spun around on his cracked stool and the waitress gave him a dirty look. "Gimme some apple pie, please," he said. "This is the best part: it's going to violate the hell out of everyone's contracts with their ISPs -- they sell you an all-you-can-eat Internet connection and then tell you that they'll cut off your service if you're too hungry. Well, fuck that! It's not just community networking, it'll be civil disobedience against shitty service-provider terms of service!" There were a couple early morning hard-hats in the diner who looked up from their yolky eggs to glare at him. Kurt spotted them and waved. "Sorry, boys. Ever get one of those ideas that's so good, you can't help but do a little dance?" One of the hard-hats smiled. "Yeah, but his wife always turns me down." He socked the other hard-hat in the shoulder. The other hard-hat grunted into his coffee. "Nice. Very nice. You're gonna be a *lot* of fun today, I can tell." They left the diner in a sleepdep haze and squinted into the sunrise and grinned at each other and burped up eggs and sausages and bacon and coffee and headed toward Kurt's Buick. "Hang on," Alan said. "Let's have a walk, okay?" The city smelled like morning, dew and grass and car-exhaust and baking bread and a whiff of the distant Cadbury's factory oozing chocolate miasma over the hills and the streetcar tracks. Around them, millions were stirring in their beds, clattering in their kitchens, passing water, and taking on vitamins. It invigorated him, made him feel part of something huge and all-encompassing, like being in his father the mountain. "Up there," Kurt said, pointing to a little playground atop the hill that rose sharply up Dupont toward Christie, where a herd of plastic rocking horses swayed creakily in the breeze. "Up there," Alan agreed, and they set off, kicking droplets of dew off the grass beside the sidewalk. The sunrise was a thousand times more striking from atop the climber, filtered through the new shoots on the tree branches. Kurt lit a cigarette and blew plumes into the shafting light and they admired the effect of the wind whipping it away. "I think this will work," Alan said. "We'll do something splashy for the press, get a lot of people to change the names of their networks -- more people will use the networks, more will create them... It's a good plan." Kurt nodded. "Yeah. We're smart guys." Something smashed into Alan's head and bounced to the dirt below the climber. A small, sharp rock. Alan reeled and tumbled from the climber, stunned, barely managing to twist to his side before landing. The air whooshed out of his lungs and tears sprang into his eyes. Gingerly, he touched his head. His fingers came away wet. Kurt was shouting something, but he couldn't hear it. Something moved in the bushes, moved into his line of sight. Moved deliberately into his line of sight. Danny. He had another rock in his hand and he wound up and pitched it. It hit Alan in the forehead and his head snapped back and he grunted. Kurt's feet landed in the dirt a few inches from his eyes, big boots a-jangle with chains. Davey flitted out of the bushes and onto the plastic rocking-horses, jumping from the horse to the duck to the chicken, leaving the big springs beneath them to rock and creak. Kurt took two steps toward him, but Davey was away, under the chain link fence and over the edge of the hill leading down to Dupont Street. "You okay?" Kurt said, crouching down beside him, putting a hand on his shoulder. "Need a doctor?" "No doctors," Alan said. "No doctors. I'll be okay." They inched their way back to the car, the world spinning around them. The hard-hats met them on the way out of the Vesta Lunch and their eyes went to Alan's bloodied face. They looked away. Alan felt his kinship with the woken world around him slip away and knew he'd never be truly a part of it. # He wouldn't let Kurt walk him up the steps and put him to bed, so instead Kurt watched from the curb until Alan went inside, then gunned the engine and pulled away. It was still morning rush hour, and the Market-dwellers were clacking toward work on hard leather shoes or piling their offspring into minivans. Alan washed the blood off his scalp and face and took a gingerly shower. When he turned off the water, he heard muffled sounds coming through the open windows. A wailing electric guitar. He went to the window and stuck his head out and saw Krishna sitting on an unmade bed in the unsoundproofed bedroom, in a grimy housecoat, guitar on his lap, eyes closed, concentrating on the screams he was wringing from the instrument's long neck. Alan wanted to sleep, but the noise and the throb of his head -- going in counterpoint -- and the sight of Davey, flicking from climber to bush to hillside, scuttling so quickly Alan was scarce sure he'd seen him, it all conspired to keep him awake. He bought coffees at the Donut Time on College -- the Greek's wouldn't be open for hours -- and brought it over to Kurt's storefront, but the lights were out, so he wandered slowly home, sucking back the coffee. # Benny had another seizure halfway up the mountain, stiffening up and falling down before they could catch him. As Billy lay supine in the dirt, Alan heard a distant howl, not like a wolf, but like a thing that a wolf had caught and is savaging with its jaws. The sound made his neck prickle and when he looked at the little ones, he saw that their eyes were rolling crazily. "Got to get him home," Alan said, lifting Benny up with a grunt. The little ones tried to help, but they just got tangled up in Benny's long loose limbs and so Alan shooed them off, telling them to keep a lookout behind him, look for Davey lurking on an outcropping or in a branch, rock held at the ready. When they came to the cave mouth again, he heard another one of the screams. Brendan stirred over his shoulders and Alan set him down, heart thundering, looking every way for Davey, who had come back. "He's gone away for the night," Burt said conversationally. He sat up and then gingerly got to his feet. "He'll be back in the morning, though." The cave was destroyed. Alan's books, Ern-Felix-Grad's toys were smashed. Their clothes were bubbling in the hot spring in rags and tatters. Brian's carvings were broken and smashed. Schoolbooks were ruined. "You all right?" Alan said. Brian dusted himself off and stretched his arms and legs out. "I'll be fine," he said. "It's not me he's after." Alan stared blankly as the brothers tidied up the cave and made piles of their belongings. The little ones looked scared, without any of the hardness he remembered from that day when they'd fought it out on the hillside. Benny retreated to his perch, but before the sun set and the cave darkened, he brought a couple blankets down and dropped them beside the nook where Alan slept. He had his baseball bat with him, and it made a good, solid aluminum sound when he leaned it against the wall. Silently, the small ones crossed the cave with a pile of their own blankets, George bringing up the rear with a torn T-shirt stuffed with sharp stones. Alan looked at them and listened to the mountain breathe around them. It had been years since his father had had anything to say to them. It had been years since their mother had done anything except wash the clothes. Was there a voice in the cave now? A wind? A smell? He couldn't smell anything. He couldn't hear anything. Benny propped himself up against the cave wall with a blanket around his shoulders and the baseball bat held loose and ready between his knees. A smell then, on the wind. Sewage and sulfur. A stink of fear. Alan looked to his brothers, then he got up and left the cave without a look back. He wasn't going to wait for Davey to come to him. The night had come up warm, and the highway sounds down at the bottom of the hill mingled with the spring breeze in the new buds on the trees and the new needles on the pines, the small sounds of birds and bugs foraging in the new year. Alan slipped out the cave mouth and looked around into the twilight, hoping for a glimpse of something out of the ordinary, but apart from an early owl and a handful of fireflies sparking off like distant stars, he saw nothing amiss. He padded around the mountainside, stooped down low, stopping every few steps to listen for footfalls. At the high, small entrance to the golems' cave, he paused, lay on his belly, and slowly peered around the fissure. It had been years since Alvin had come up to the golems' cave, years since one had appeared in their father's cave. They had long ago ceased bringing their kills to the threshold of the boys' cave, ceased leaving pelts in neat piles on the eve of the waning moon. The view from the outcropping was stunning. The village had grown to a town, fast on its way to being a city. A million lights twinkled. The highway cut a glistening ribbon of streetlamps through the night, a straight line slicing the hills and curves. There were thousands of people down there, all connected by a humming net-work -- a work of nets, cunning knots tied in a cunning grid -- of wire and radio and civilization. Slowly, he looked back into the golems' cave. He remembered it as being lined with ranks of bones, a barbarian cathedral whose arches were decorated with ranked skulls and interlocked, tiny animal tibia. Now those bones were scattered and broken, the ossified wainscoting rendered gap-toothed by missing and tumbled bones. Alan wondered how the golems had reacted when Darl had ruined their centuries of careful work. Then, looking more closely, he realized that the bones were dusty and grimed, cobwebbed and moldering. They'd been lying around for a lot longer than a couple hours. Alan crept into the cave now, eyes open, ears straining. Puffs of dust rose with his footfalls, illuminated in the moonlight and city light streaming in from the cave mouth. Another set of feet had crossed this floor: small, boyish feet that took slow, arthritic steps. They'd come in, circled the cave, and gone out again. Alan listened for the golems and heard nothing. He did his own slow circle of the cave, peering into the shadows. Where had they gone? There. A streak of red clay, leading to a mound. Alan drew up alongside of it and made out the runny outlines of the legs and arms, the torso and the head. The golem had dragged itself into this corner and had fallen to mud. The dust on the floor was red. Dried mud. Golem-dust. How long since he'd been in this cave? How long since he'd come around this side of the mountain? Two months. Three? Four? Longer. How long had the golems lain dead and dust in this cave? They'd carved his cradle. Fed him. Taught him to talk and to walk. In some sense, they were his fathers, as much as the mountain was. He fished around inside himself for emotion and found none. Relief, maybe. Relief. The golems were an embodiment of his strangeness, as weird as his smooth, navelless belly, an element of his secret waiting to surface and -- what? What had he been afraid of? Contempt? Vivisection? He didn't know anymore, but knew that he wanted to fit in and that the golems' absence made that more possible. There was a smell on the wind in here, the death and corruption smell he'd noticed in the sleeping cave. Father was worried. No. Davey was inside. That was his smell, the smell of Davey long dead and back from the grave. Alan walked deeper into the tunnels, following his nose. # Davey dropped down onto his shoulders from a ledge in an opening where the ceiling stretched far over their heads. He was so light, at first Alan thought someone had thrown a blanket over his shoulders. Then the fingers dug into his eyes. Then the fingers fishhooked the corner of his mouth. Then the screech, thick as a desiccated tongue, dry as the dust of a golem, like no sound and like all the sounds at once. The smell of corruption was everywhere, filling his nostrils like his face has been ground into a pile of rotten meat. He tugged at the dry, thin hands tangled in his face, and found them strong as iron bands, and then he screamed. Then they were both screeching and rolling on the ground, and he had Danny's thumb in his hand, bending it back painfully, until *snap*, it came off clean with a sound like dry wood cracking. Doug was off him then, crawling off toward the shadows. Alan got to his knees, still holding the thumb, and made ready to charge him, holding his sore face with one hand, when he heard the slap of running footfalls behind him and then Bill was streaking past him, baseball bat at ready, and he swung it like a polo-mallet and connected with a hollow crunch of aluminum on chitinous leathery skin. The sound shocked Alan to his feet, wet sick rising in his gorge. Benny was winding up for a second blow, aiming for Darren's head this time, an out-of-the park *smack* that would have knocked that shrunken head off the skinny, blackened neck, and Alan shouted, "NO!" and roared at Benny and leapt for him. As he sailed through the air, he thought he was saving *Benny* from the feeling he'd carried with him for a decade, but as he connected with Benny, he felt a biting-down feeling, clean and hard, and he knew he was defending *Drew*, saving him for once instead of hurting him. He was still holding on to the thumb, and Davey was inches from his face, and he was atop Benny, and they breathed together, chests heaving. Alan wobbled slowly to his feet and dropped the thumb onto Drew's chest, then he helped Billy to his feet and they limped off to their beds. Behind them, they heard the dry sounds of Davey getting to his feet, coughing and hacking with a crunch of thin, cracked ribs. # He was sitting on their mother the next morning. He was naked and unsexed by desiccation -- all the brothers, even little George, had ceased going about in the nude when they'd passed through puberty -- sullen and silent atop the white, chipped finish of her enamel top, so worn and ground down that it resembled a collection of beach-China. It had been a long time since any of them had sought solace in their mother's gentle rocking, since, indeed, they had spared her a thought beyond filling her belly with clothes and emptying her out an hour later. The little ones woke first and saw him, taking cover behind a stalagmite, peering around, each holding a sharp, flat rock, each with his pockets full of more. Danny looked at each in turn with eyes gone yellow and congealed, and bared his mouthful of broken and blackened teeth in a rictus that was equal parts humor and threat. Bradley was the next to wake, his bat in his hand and his eyelids fluttering open as he sprang to his feet, and then Alan was up as well, a hand on his shoulder. He crouched down and walked slowly to Davey. He had the knife, handle wound with cord, once-keen edge gone back to rust and still reddened with ten-year-old blood, but its sharpness mattered less than its history. "Welcome me home," Davey rasped as Alan drew closer. "Welcome me home, mother*fucker*. Welcome me home, *brother*." "You're welcome in this home," Alan said, but Davey wasn't welcome. Just last week, Alan had seen a nice-looking bedroom set that he suspected he could afford -- the golems had left him a goodly supply of gold flake, though with the golems gone he supposed that the sacks were the end of the family's no-longer-bottomless fortune. But with the bedroom set would come a kitchen table, and then a bookcase, and a cooker and a fridge, and when they were ready, he could send each brother on his way with the skills and socialization necessary to survive in the wide world, to find women and love and raise families of their own. Then he could go and find himself a skinny redheaded girl with a Scots accent, and in due time her belly would swell up and there would be a child. It was all planned out, practically preordained, but now here they were, with the embodied shame sitting on their mother, his torn thumb gleaming with the wire he'd used to attach it back to his hand. "That's very generous, *brother*," Danny said. "You're a prince among *men*." "Let's go," Alan said. "Breakfast in town. I'm buying." They filed out and Alan spared Davey a look over his shoulder as they slipped away, head down on his knees, rocking in time with their mother. # Krishna grinned at him from the front porch as he staggered home from Kurt's storefront. He was dressed in a hoodie and huge, outsized raver pants that dangled with straps and reflectors meant to add kinetic reflections on the dance floor. "Hello, neighbor," he said as Alan came up the walkway. "Good evening?" Alan stopped and put his hands on his hips, straightened his head out on his neck so that he was standing tall. "I understand what he gets out of *you*," Alan said. "I understand that perfectly well. Who couldn't use a little servant and errand boy? "But what I don't understand, what I can't understand, what I'd like to understand is: What can you get out of the arrangement?" Krishna shrugged elaborately. "I have no idea what you're talking about." "We had gold, in the old days. Is that what's bought you? Maybe you should ask me for a counteroffer. I'm not poor." "I'd never take a penny that *you* offered -- voluntarily." Krishna lit a nonchalant cig and flicked the match toward his dry, xeroscaped lawn. There were little burnt patches among the wild grasses there, from other thrown matches, and that was one mystery-let solved, then, wasn't it? "You think I'm a monster," Alan said. Krishna nodded. "Yup. Not a scary monster, but a monster still." Alan nodded. "Probably," he said. "Probably I am. Not a human, maybe not a person. Not a real person. But if I'm bad, he's a thousand times worse, you know. He's a scary monster." Krishna dragged at his cigarette. "You know a lot of monsters, don't you?" Alan said. He jerked his head toward the house. "You share a bed with one." Krishna narrowed his eyes. "She's not scary, either." "You cut off her wings, but it doesn't make her any less monstrous. "One thing I can tell you, you're pretty special: Most real people never see us. You saw me right off. It's like *Dracula*, where most of the humans couldn't tell that there was a vampire in their midst." "Van Helsing could tell," Krishna said. "He hunted Dracula. You can't hunt what you can't see," he said. "So your kind has been getting a safe free ride for God-knows-how-long. Centuries. Living off of us. Passing among us. Passing for us." "Van Helsing got killed," Alan said. "Didn't he? And besides that, there was someone else who could see the vampires: Renfield. The pathetic pet and errand boy. Remember Renfield in his cage in the asylum, eating flies? Trying to be a monster? Von Helsing recognized the monster, but so did Renfield." "I'm no one's Renfield," Krishna said, and spat onto Alan's lawn. First fire, then water. He was leaving his mark on Alan's land, that was certain. "You're no Van Helsing, either," Alan said. "What's the difference between you and a racist, Krishna? You call me a monster, why shouldn't I call you a paki?" He stiffened at the slur, and so did Alan. He'd never used the word before, but it had sprung readily from his lips, as though it had lurked there all along, waiting to be uttered. "Racists say that there's such a thing as 'races' within the human race, that blacks and whites and Chinese and Indians are all members of different 'races,'" Krishna said. "Which is bullshit. On the other hand, you --" He broke off, left the thought to hang. He didn't need to finish it. Alan's hand went to his smooth belly, the spot where real people had navels, old scarred remnants of their connections to real, human mothers. "So you hate monsters, Krishna, all except for the ones you sleep with and the ones you work for?" "I don't work for anyone," he said. "Except me." Alan said, "I'm going to pour myself a glass of wine. Would you like one?" Krishna grinned hard and mirthless. "Sure, neighbor, that sounds lovely." Alan went inside and took out two glasses, got a bottle of something cheap and serviceable from Niagara wine country out of the fridge, worked the corkscrew, all on automatic. His hands shook a little, so he held them under the cold tap. Stuck to the wall over his work surface was a magnetic bar, and stuck to it was a set of very sharp chef's knives that were each forged from a single piece of steel. He reached for one and felt its comfort in his hand, seductive and glinting. It was approximately the same size as the one he'd used on Davey, a knife that he'd held again and again, reached for in the night and carried to breakfast for months. He was once robbed at knifepoint, taking the deposit to the bank after Christmas rush, thousands of dollars in cash in a brown paper sack in his bag, and the mugger -- a soft-spoken, middle-aged man in a good suit -- knew exactly what he was carrying and where, must have been casing him for days. The soft-spoken man had had a knife about this size, and when Alan had seen it pointed at him, it had been like an old friend, one whose orbit had escaped his gravity years before, so long ago that he'd forgotten about their tender camaraderie. It was all he could do not to reach out and take the knife from the man, say hello again and renew the friendship. He moved the knife back to the magnet bar and let the field tug it out of his fingers and *snap* it back to the wall, picked up the wine glasses, and stepped back out onto the porch. Krishna appeared not to have stirred except to light a fresh cigarette. "You spit in mine?" Krishna said. Though their porches adjoined, Alan walked down his steps and crossed over the lawn next door, held the glass out to Krishna. He took it and their hands brushed each other, the way his hand had brushed the soft-spoken man's hand when he'd handed over the sack of money. The touch connected him to something human in a way that made him ashamed of his desperation. "I don't normally drink before noon," Adam said. "I don't much care when I drink," Krishna said, and took a slug. "Sounds like a dangerous philosophy for a bartender," Adam said. "Why? Plenty of drunk bartenders. It's not a hard job." Krishna spat. "Big club, all you're doing is uncapping beers and mixing shooters all night. I could do it in my sleep." "You should quit," Alan said. "You should get a better job. No one should do a job he can do in his sleep." Krishna put a hand out on Alan's chest, the warmth of his fingertips radiating through Alan's windbreaker. "Don't try to arrange me on your chessboard, monster. Maybe you can move Natalie around, and maybe you can move around a bunch of Kensington no-hopers, and maybe you can budge my idiot girlfriend a couple of squares, but I'm not on the board. I got my job, and if I leave it, it'll be for me." Alan retreated to his porch and sipped his own wine. His mouth tasted like it was full of blood still, a taste that was woken up by the wine. He set the glass down. "I'm not playing chess with you," he said. "I don't play games. I try to help -- I *do* help." Krishna swigged the glass empty. "You wanna know what makes you a monster, Alvin? That attitude right there. You don't understand a single fucking thing about real people, but you spend all your time rearranging them on your board, and you tell them and you tell yourself that you're helping. "You know how you could help, man? You could crawl back under your rock and leave the people's world for people." Something snapped in Alan. "Canada for Canadians, right? Send 'em back where they came from, right?" He stalked to the railing that divided their porches. The taste of blood stung his mouth. Krishna met him, moving swiftly to the railing as well, hood thrown back, eyes hard and glittering and stoned. "You think you can make me feel like a racist, make me *guilty*?" His voice squeaked on the last syllable. "Man, the only day I wouldn't piss on you is if you were on fire, you fucking freak." Some part of Alan knew that this person was laughable, a Renfield eating bugs. But that voice of reason was too quiet to be heard over the animal screech that was trying to work its way free of his throat. He could smell Krishna, cigarettes and booze and club and sweat, see the gold flecks in his dark irises, the red limning of his eyelids. Krishna raised a hand as if to slap him, smirked when he flinched back. Then he grabbed Krishna's wrist and pulled hard, yanking the boy off his feet, slamming his chest into the railing hard enough to shower dried spider's nests and flakes of paint to the porch floor. "I'm every bit the monster my brother is," he hissed in Krishna's ear. "I *made* him the monster he is. *Don't squirm*," he said, punching Krishna hard in the ear with his free hand. "Listen. You can stay away from me and you can stay away from my family, or you can enter a world of terrible hurt. It's up to you. Nod if you understand." Krishna was still, except for a tremble. The moment stretched, and Alan broke it by cracking him across the ear again. "Nod if you understand, goddammit," he said, his vision going fuzzily black at the edges. Krishna was silent, still, coiled. Any minute now, he would struggle free and they'd be in a clinch. He remembered kneeling on Davey's chest, holding the rock over him and realizing that he didn't know what to do next, taking Davey to their father. Only Davey had struck him first. He'd only been restraining him, defending himself. Alan had hit Krishna first. "Nod if you understand, Krishna," he said, and heard a note of pleading in his voice. Krishna held still. Alan felt like an idiot, standing there, his neighbor laid out across the railing that divided their porches, the first cars of the day driving past and the first smells of bread and fish and hospital and pizza blending together there in the heart of the Market. He let go and Krishna straightened up, his eyes downcast. For a second, Alan harbored a germ of hope that he'd bested Krishna and so scared him into leaving him alone. Then Krishna looked up and met his eye. His face was blank, his eyes like brown marbles, heavy lidded, considering, not stoned at all anymore. Sizing Alan up, calculating the debt he'd just amassed, what it would take to pay it off. He picked up Alan's wine glass, and Alan saw that it wasn't one of the cheapies he'd bought a couple dozen of for an art show once, but rather Irish crystal that he'd found at a flea market in Hamilton, a complete fluke and one of his all-time miracle thrift scores. Krishna turned the glass one way and another in his hand, letting it catch the sunrise, bend the light around the smudgy fingerprints. He set it down then, on the railing, balancing it carefully. He took one step back, then a second, so that he was almost at the door. They stared at each other and then he took one, two running steps, like a soccer player winding up for a penalty kick, and then he unwound, leg flying straight up, tip of his toe catching the wine glass so that it hurtled straight for Alan's forehead, moving like a bullet. Alan flinched and the glass hit the brick wall behind him, disintegrating into a mist of glass fragments that rained down on his hair, down his collar, across the side of his face, in his ear. Krishna ticked a one-fingered salute off his forehead, wheeled, and went back into his house. The taste of blood was in Alan's mouth. More blood coursed down his neck from a nick in his ear, and all around him on the porch, the glitter of crystal. He went inside to get a broom, but before he could clean up, he sat down for a moment on the sofa to catch his breath. He fell instantly asleep on the creaking horsehide, and when he woke again, it was dark and raining and someone else had cleaned up his porch. # The mountain path had grown over with weeds and thistles and condoms and cans and inexplicable maxi-pads and doll parts. She clung to his hand as he pushed through it, stepping in brackish puddles and tripping in sink holes. He navigated the trail like a mountain goat, while Mimi lagged behind, tugging his arm every time she misstepped, jerking it painfully in its socket. He turned to her, ready to snap, *Keep the fuck up, would you?* and then swallowed the words. Her eyes were red-rimmed and scared, her full lips drawn down into a clown's frown, bracketed by deep lines won by other moments of sorrow. He helped her beside him and turned his back on the mountain, faced the road and the town and the car with its trunk with its corpse with his brother, and he put an arm around her shoulders, a brotherly arm, and hugged her to him. "How're you doing there?" he said, trying to make his voice light, though it came out so leaden the words nearly thudded in the wet dirt as they fell from his mouth. She looked into the dirt at their feet and he took her chin and turned her face up so that she was looking into his eyes, and he kissed her forehead in a brotherly way, like an older brother coming home with a long-lost sister. "I used to want to know all the secrets," she said in the smallest voice. "I used to want to understand how the world worked. Little things, like heavy stuff goes at the bottom of the laundry bag, or big things, like the best way to get a boy to chase you is to ignore him, or medium things, like if you cut an onion under running water, your eyes won't sting, and if you wash your fingers afterward with lemon-juice they won't stink. "I used to want to know all the secrets, and every time I learned one, I felt like I'd taken -- a step. On a journey. To a place. A destination: To be the kind of person who knew all this stuff, the way everyone around me seemed to know all this stuff. I thought that once I knew enough secrets, I'd be like them. "I don't want to learn secrets anymore, Andrew." She shrugged off his arm and took a faltering step down the slope, back toward the road. "I'll wait in the car, okay?" "Mimi," he said. He felt angry at her. How could she be so selfish as to have a crisis *now*, *here*, at this place that meant so much to him? "Mimi," he said, and swallowed his anger. # His three brothers stayed on his sofa for a week, though they only left one wet towel on the floor, only left one sticky plate in the sink, one fingerprint-smudged glass on the counter. He'd just opened his first business, the junk shop -- not yet upscale enough to be called an antiques shop -- and he was pulling the kinds of long hours known only to ER interns and entrepreneurs, showing up at 7 to do the books, opening at 10, working until three, then turning things over to a minimum-wage kid for two hours while he drove to the city's thrift shops and picked for inventory, then working until eight to catch the evening trade, then answering creditors and fighting with the landlord until ten, staggering into bed at eleven to sleep a few hours before doing it all over again. So he gave them a set of keys and bought them a MetroPass and stuffed an old wallet with $200 in twenties and wrote his phone number on the brim of a little pork pie hat that looked good on their head and turned them loose on the city. The shop had all the difficulties of any shop -- snarky customers, shoplifting teenagers, breakage, idiots with jumpy dogs, never enough money and never enough time. He loved it. Every stinking minute of it. He'd never gone to bed happier and never woken up more full of energy in his life. He was in the world, finally, at last. Until his brothers arrived. He took them to the store the first morning, showed them what he'd wrought with his own two hands. Thought that he'd inspire them to see what they could do when they entered the world as well, after they'd gone home and grown up a little. Which they would have to do very soon, as he reminded them at every chance, unmoved by George's hangdog expression at the thought. They'd walked around the shop slowly, picking things up, turning them over, having hilarious, embarrassing conversations about the likely purpose of an old Soloflex machine, a grubby pink Epilady leg razor, a Bakelite coffee carafe. The arguments went like this: George: Look, it's a milk container! Ed: I don't think that that's for milk. Fred: You should put it down before you drop it, it looks valuable. George: Why don't you think it's for milk? Look at the silver inside, that's to reflect off the white milk and make it look, you know, cold and fresh. Fred: Put it down, you're going to break it. George: Fine, I'll put it down, but tell me, why don't you think it's for milk? Ed: Because it's a thermos container, and that's to keep hot stuff hot, and it's got a screwtop and whatever it's made of looks like it'd take a hard knock without breaking. And so on, nattering at each other like cave men puzzling over a walkman, until Alan was called upon to settle the matter with the authoritative answer. It got so that he set his alarm for four a.m. so that he could sneak past their snoring form on the sofa and so avoid the awkward, desperate pleas to let them come with him into the shop and cadge a free breakfast of poutine and eggs from the Harvey's next door while they were at it. George had taken up coffee on his second day in the city, bugging the other two until they got him a cup, six or seven cups a day, so that they flitted from place to place like a hummingbird, thrashed in their sleep, babbled when they spoke. It came to a head on the third night, when they dropped by the shop while he was on the phone and ducked into the back room in order to separate into threes again, with George wearing the pork pie hat even though it was a size too big for his head and hung down around his ears. Adam was talking to a woman who'd come into the shop that afternoon and greatly admired an institutional sofa from the mid-seventies whose lines betrayed a pathetic slavish devotion to Danish Moderne aesthetics. The woman had sat on the sofa, admired the sofa, walked around the sofa, hand trailing on its back, had been fascinated to see the provenance he'd turned up, an inventory sticker from the University of Toronto maintenance department indicating that this sofa had originally been installed at the Robarts Library, itself of great and glorious aesthetic obsolescence. Here was Adam on the phone with this woman, closing a deal to turn a $3,000 profit on an item he'd acquired at the Goodwill As-Is Center for five bucks, and here were his brothers, in the store, angry about something, shouting at each other about something. They ran around like three fat lunatics, reeking of the BO that they exuded like the ass end of a cow: Loud, boorish, and indescribably weird. Weird beyond the quaint weirdness of his little curiosity show. Weird beyond the interesting weirdness of the punks and the goths and the mods who were wearing their subcultures like political affiliations as they strolled by the shops. Those were redeemable weirds, weirds within the bounds of normal human endeavor. His brothers, on the other hand, were utterly, utterly irredeemable. He sank down behind the counter as George said something to Fred in their own little shorthand language, a combination of grunts and nonsense syllables that the three had spoken together for so long that he'd not even noticed it until they were taken out of their context and put in his. He put his back against the wall and brought his chest to his knees and tried to sound like he had a belly button as he said to the woman, "Yes, absolutely, I can have this delivered tomorrow if you'd like to courier over a check." This check, it was enough money to keep his business afloat for another 30 days, to pay his rent and pay the minimum-wage kid and buy his groceries. And there were his brothers, and now Ed was barking like a dog -- a rare moment of mirth from him, who had been the sober outer bark since he was a child and rarely acted like the 17-year-old he was behaving like today. "Is everything all right?" she said down the phone, this woman who'd been smartly turned out in a cashmere sweater and a checked scarf and a pair of boot-cut jeans that looked new and good over her designer shoes with little heels. They'd flirted a little, even though she was at least ten years older than him, because flirting was a new thing for Alan, and he'd discovered that he wasn't bad at it. "Everything is fine," he said. "Just some goofballs out in the street out front. How about if I drop off the sofa for six o'clock?" "KILLED HER, CUT HER UP, SLICED HER OPEN," George screeched suddenly, skidding around the counter, rolling past him, yanking the phone out of the wall. And in that moment, he realized what the sounds they had been making in their private speech had been: They had been a reenactment, a grunting, squeaking playback of the day, the fateful day, the day he'd taken his knife and done his mischief with it. He reached for the phone cable and plugged it back into the wall, but it was as though his hand were moving of its own accord, because his attention was focused elsewhere, on the three of them arrayed in a triangle, as they had been on the hillside, as they had been when they had chanted at him when the knife grip was sure in the palm of his hands. The ritual -- that's what it was, it was a *ritual* -- the ritual had the feel of something worn smooth with countless repetitions. He found himself rigid with shock, offended to his bones. This was what they did now, in the cave, with Davey sitting atop their mother, black and shriveled, this was how they behaved, running through this reenactment of his great shame, of the day Danny died? No wonder Darrel had terrorized them out of their home. They were beyond odd and eccentric, they were -- unfit. Unfit for polite company. For human society. The phone in his hand rang. It was the woman. "You know, I'm thinking that maybe I should come back in with a tape measure and measure up the sofa before I commit to it. It's a lot of money, and to be honest, I just don't know if I have room --" "What if I measure it for you? I could measure it for you and call you back with the numbers." The three brothers stared at him with identical glassy, alien stares. "That's okay. I can come in," and he knew that she meant, *I won't ever come in again.* "What if I bring it by anyway? I could bring it by tomorrow night and you could see it and make up your mind. No obligation." "That's very kind of you, but I'm afraid that I'll be out tomorrow evening --" "Friday? I could come by Friday --" He was trying to remember how to flirt now, but he couldn't. "I could come by and we could have a glass of wine or something," and he knew he'd said the exact wrong thing. "It's all right," she said coldly. "I'll come by later in the week to have another look. "I have to go now, my husband is home," and he was pretty sure she wasn't married, but he said good bye and hung up the phone. He looked at his solemn brothers now and they looked at him. "When are you going home?" he said, and Edward looked satisfied and Fred looked a little disappointed and George looked like he wanted to throw himself in front of a subway, and his bottom lip began to tremble. "It was Ed's game," he said. "The Davey game, it was his." He pointed a finger. "You know, I'm not like them. I can be on my own. I'm what *they* need, they're not what *I* need." The other two stared at their fat bellies in the direction of their fat feet. Andrew had never heard George say this, had never even suspected that this thought lurked in his heart, but now that it was out on the table, it seemed like a pretty obvious fact to have taken note of. All things being equal, things weren't equal. He was cold and numb. "That's a really terrible thing to say, George," is what he said. "That's easy for you to say," is what George said. "You are here, you are in the *world*. It's easy for you to say that we should be happy with things the way they are." George turned on his heel and put his head down and bulled out the door, slamming it behind him so that the mail slot rattled and the glass shook and a stack of nice melamine cafeteria trays fell off a shelf and clattered to the ground. He didn't come back that night. He didn't come back the next day. Ed and Fred held their grumbling tummies and chewed at the insides of their plump cheeks and sat on the unsold Danish Modern sofa in the shop and freaked out the few customers that drifted in and then drifted out. "This is worse than last time," Ed said, licking his lips and staring at the donut that Albert refused to feel guilty about eating in front of them. "Last time?" he said, not missing Felix's quick warning glare at Ed, even though Ed appeared to. "He went away for a whole day, just disappeared into town. When he came back, he said that he'd needed some away time. That he'd had an amazing day on his own. That he wanted to come and see you and that he'd do it whether we wanted to come or not." "Ah," Alvin said, understanding then how the three had come to be staying with him. He wondered how long they'd last without the middle, without the ability to eat. He remembered holding the infant Eddie in his arms, the boy light and hollowed out. He remembered holding the three boys at once, heavy as a bowling ball. "Ah," he said. "I'll have to have a word with him." # When Greg came home, Alan was waiting for him, sitting on the sofa, holding his head up with one hand. Eli and Fred snored uneasily in his bed, breathing heavily through their noses. "Hey," he said as he came through the door, scuffing at the lock with his key for a minute or two first. He was rumpled and dirty, streaked with grime on his jawline and hair hanging limp and greasy over his forehead. "Greg," Alan said, nodding, straightening out his spine and listening to it pop. "I'm back," George said, looking down at his sneakers, which squished with grey water that oozed over his carpet. Art didn't say anything, just sat pat and waited, the way he did sometimes when con artists came into the shop with some kind of scam that they wanted him to play along with. It worked the same with George. After a hard stare at his shoes, he shook his head and began to defend himself, revealing the things that he knew were indefensible. "I had to do it, I just had to. I couldn't live in that cave, with that thing, anymore. I couldn't live inside those two anymore. I'm going crazy. There's a whole world out here and every day I get farther away from it. I get weirder. I just wanted to be normal. "I just wanted to be like you. "They stopped letting me into the clubs after I ran out of money, and they kicked me out of the cafés. I tried to ride the subway all night, but they threw me off at the end of the line, so I ended up digging a transfer out of a trash can and taking an all-night bus back downtown. "No one looked at me twice that whole time, except to make sure that I was gone. I walked back here from Eglinton." That was five miles away, a good forty minute walk in the night and the cold and the dark. Greg pried off his sneakers with his toes and then pulled off his grey, squelching socks. "I couldn't find anyone who'd let me use the toilet," he said, and Alan saw the stain on his pants. He stood up and took Greg by the cold hand, as he had when they were both boys, and said, "It's all right, Gord. We'll get you cleaned up and changed and put you to bed, okay? Just put your stuff in the hamper in the bathroom and I'll find you a change of clothes and make a couple sandwiches, all right?" And just as easy as that, George's spirit was tamed. He came out of the shower pink and steaming and scrubbed, put on the sweats that Adam found for him in an old gym bag, ate his sandwiches, and climbed into Adam's bed with his brothers. When he saw them again next, they were reassembled and downcast, though they ate the instant oatmeal with raisins and cream that he set out for them with gusto. "I think a bus ticket home is about forty bucks, right?" Alan said as he poured himself a coffee. They looked up at him. Ed's eyes were grateful, his lips clamped shut. "And you'll need some food on the road, another fifty or sixty bucks, okay?" Ed nodded and Adam set down a brown hundred-dollar bill, then put a purple ten on top of it. "For the taxi to the Greyhound station," he added. # They finished their oatmeal in silence, while Adam puttered around the apartment, stripping the cheese-smelling sheets and oily pillowcases off his bed, rinsing the hairs off the soap, cleaning the toilet. Erasing the signs of their stay. "Well," he said at length. "I should get going to the shop." "Yeah," Ed said, in George's voice, and it cracked before he could close his lips again. "Right," Adam said. "Well." They patted their mouth and ran stubby fingers through their lank hair, already thinning though they were still in their teens. They stood and cracked their knuckles against the table. They patted their pockets absently, then pocketed the hundred and the ten. "Well," Adam said. They left, turning to give him the keys he'd had cut for them, a gesture that left him feeling obscurely embarrassed and mean-spirited even though -- he told himself -- he'd put them up and put up with them very patiently indeed. And then he left, and locked the door with his spare keys. Useless spare keys. No one would ever come to stay with him again. # What I found in the cave, (he said, lying in the grass on the hillside, breathing hard, the taste of vomit sour in his mouth, his arms and legs sore from the pumping run down the hillside) What I found in the cave, (he said, and she held his hand nervously, her fingers not sure of how hard to squeeze, whether to caress) What I found in the cave, (he said, and was glad that she hadn't come with him, hadn't been there for what he'd seen and heard) What I found in the cave was the body of my first girlfriend. Her skeleton, polished to a gleam and laid out carefully on the floor. Her red hair in a long plait, brushed out and brittle, circled over her small skull like a halo. He'd laid her out before my mother, and placed her fingernails at the exact tips of her fingerbones. The floor was dirty and littered with rags and trash. It was dark and it stank of shit, there were piles of shit here and there. The places where my brothers had slept had been torn apart. My brother Bradley, his nook was caved in. I moved some of the rocks, but I didn't find him under there. Benny was gone. Craig was gone. Ed, Frankie, and George were gone. Even Davey was gone. All the parts of the cave that made it home were gone, except for my mother, who was rusted and sat askew on the uneven floor. One of her feet had rusted through, and her generator had run dry, and she was silent and dry, with a humus-paste of leaves and guano and gunk sliming her basket. I went down to the cave where my father spoke to us, and I found that I -- I -- I found that I couldn't see in the dark anymore. I'd never had a moment's pause in the halls of my father, but now I walked falteringly, the sounds of my footsteps not like the steps of a son of the mountain at all. I heard them echo back and they sounded like an outsider, and I fell twice and hurt my head, here -- (he touched the goose egg he'd raised on his forehead) and I got dizzy, and then I was in the pool, but it didn't sound right and I couldn't hear it right, and I got my clothes off and then I stood there with them in my arms -- (his hand came back bloody and he wiped it absently on the grass and Mimi took hold of it) Because. If I put them down. It was dark. And I'd never find them again. So I bundled them all up and carried them over my head and I waded in and the water had never been so cold and had never felt so oily and there was a smell to it, a stagnant smell. I waded out and I stood and I shivered and I whispered, "Father?" and I listened. I heard the sound of the water I'd disturbed, lapping around my ears and up on the shore. I smelled the sewage and oil smell, but none of the habitual smells of my father: Clean water, coalface, sulfur, grass, and lime. I picked my way out of the water again and I walked to the shore, and it was too dark to put on my clothes, so I carried them under one arm and felt my way back to the summer cave and leaned against my mother and waited to drip dry. I'd stepped in something soft that squished and smelled between my mother and my father, and I didn't want to put on my socks until I'd wiped it off, but I couldn't bring myself to wipe it on the cave floor. Marci's eye sockets looked up at the ceiling. She'd been laid out with so much care, I couldn't believe that Davey had had anything to do with it. I thought that Benny must be around somewhere, looking in, taking care. I closed my eyes so that I wasn't looking into the terrible, recriminating stare, and I leaned my head up against my mother, and I breathed until the stink got to me and then I pried myself upright and walked out of the cave. I stopped and stood in the mouth of the cave and listened as hard as I could, but my father wasn't speaking. And the smell was getting to me. # She got him dressed and she fed him sips of water and she got him standing and walked him in circles around the little paddock he'd collapsed in. "I need to get Georgie out of the car," he said. "I'm going to leave him in the cave. It's right." She bit her lip and nodded slowly. "I can help you with that," she said. "I don't need help," he said lamely. "I didn't say you did, but I can help anyway." They walked down slowly, him leaning on her arm like an old man, steps faltering in the scree on the slope. They came to the road and stood before the trunk as the cars whizzed past them. He opened the trunk and looked down. The journey hadn't been good to Gregg. He'd come undone from his winding sheet and lay face down, neck stiff, his nose mashed against the floor of the trunk. His skin had started to flake off, leaving a kind of scale or dandruff on the flat industrial upholstery inside the trunk. Alan gingerly tugged loose the sheet and began, awkwardly, to wrap it around his brother, ignoring the grit of shed skin and hair that clung to his fingers. Mimi shook him by the shoulder hard, and he realized she'd been shaking him for some time. "You can't do that here," she said. "Would you listen to me? You can't do that here. Someone will see." She held something up. His keys. "I'll back it up to the trailhead," she said. "Close the trunk and wait for me there." She got behind the wheel and he sloped off to the trailhead and stood, numbly, holding the lump on his forehead and staring at a rusted Coke can in a muddy puddle. She backed the car up almost to his shins, put it in park, and came around to the trunk. She popped the lid and looked in and wrinkled her nose. "Okay," she said. "I'll get him covered and we'll carry him up the hill." "Mimi --" he began. "Mimi, it's okay. You don't need to go in there for me. I know it's hard for you --" She squeezed his hand. "I'm over it, Andy. Now that I know what's up there, it's not scary any longer." He watched her shoulders work, watched her wings work, as she wrapped up his brother. When she was done, he took one end of the bundle and hoisted it, trying to ignore the rain of skin and hair that shook off over the bumper and his trousers. "Up we go," she said, and moved to take the front. "Tell me when to turn." They had to set him down twice before they made it all the way up the hill. The first time, they just stood in silence, wiping their cramped hands on their thighs. The second time, she came to him and put her arm around his shoulders and gave him a soft kiss on the cheek that felt like a feather. "Almost there?" she said. He nodded and bent to pick up his end. Mimi plunged through the cave mouth without a moment's hesitation and they set him down just inside the entrance, near a pair of stained cotton Y-fronts. Alan waited for his heart to stop thudding and the sweat to cool on his brow and then he kicked the underwear away as an afterthought. "God," he said. She moved to him, put her arm around his shoulder. "You're being brave," she said. "God," he said again. "Let it out, you know, if you want to." But he didn't, he wanted to sit down. He moved to his mother's side and leaned against her. Mimi sat on her hunkers before him and took his hand and tried to tilt his chin up with one finger, but he resisted her pull and she rose and began to explore the cave. He heard her stop near Marci's skeleton for a long while, then move some more. She circled him and his mother, then opened her lid and stared into her hamper. He wanted to tell her not to touch his mother, but the words sounded ridiculous in his head and he didn't dare find out how stupid they sounded moving through freespace. And then the washing machine bucked and made a snapping sound and hummed to life. *The generator's dead,* he thought. *And she's all rusted through.* And still the washing machine moved. He heard the gush of water filling her, a wet and muddy sound. "What did you do?" he asked. He climbed slowly to his feet, facing away from his mother, not wanting to see her terrible bucking as she wobbled on her broken foot. "Nothing," Mimi said. "I just looked inside and it started up." He stared at his mother, enraptured, mesmerized. Mimi stole alongside of him and he noticed that she'd taken off her jacket and the sweatshirt, splaying out her wings around her. Her hand found his and squeezed. The machine rocked. His mother rocked and gurgled and rushed, and then she found some local point of stability and settled into a soft rocking rhythm. The rush of water echoed off the cave walls, a white-noise shushing that sounded like skis cutting through powder. It was a beautiful sound, one that transported him to a million mornings spent waiting for the boys' laundry to finish and be hung on the line. *All gone.* He jerked his head up so fast that something in his neck cracked, needling pain up into his temples and forehead. He looked at Mimi, but she gave no sign of having heard the voice, the words, *All gone.* *All gone.* Mimi looked at him and cocked her head. "What?" she said. He touched her lips with a finger, forgetting to be mindful of the swelling there, and she flinched away. There was a rustle of wings and clothing. *My sons, all my sons, gone.* The voice emerged from that white-noise roar of water humming and sloshing back and forth in her basket. Mimi squeezed his hand so hard he felt the bones grate. "Mom?" he said softly, his voice cracking. He took half a step toward the washer. *So tired. I'm worn out. I've been worn out.* He touched the enamel on the lid of the washer, and felt the vibrations through his fingertips. "I can -- I can take you home," he said. "I'll take care of you, in the city." *Too late.* There was a snapping sound and then a front corner of the machine settled heavily. One rusted out foot, broken clean off, rolled across the cave floor. The water sounds stilled. Mimi breathed some words, something like Oh my God, but maybe in another language, or maybe he'd just forgotten his own tongue. "I need to go," he said. # They stayed in a different motel on their way home from the mountain, and Mimi tried to cuddle him as he lay in the bed, but her wings got in the way, and he edged over to his side until he was almost falling off before she took the hint and curled up on her side. He lay still until he heard her snore softly, then rose and went and sat on the toilet, head in his hands, staring at the moldy grout on the tiled floor in the white light, trying not to think of the bones, the hank of brittle red hair, tied tightly in a shopping bag in the trunk of the rental car. Sunrise found him pacing the bathroom, waiting for Mimi to stir, and when she padded in and sat on the toilet, she wouldn't meet his eye. He found himself thinking of her standing in the tub, rolled towel between her teeth, as Krishna approached her wings with his knife, and he went back into the room to dress. "We going to eat breakfast?" she asked in the smallest voice. He said nothing, couldn't will himself to talk. "There's still food in the car," she said after some silence had slipped by. "We can eat that." And without any more words, they climbed into the car and he put the pedal down, all the way to Toronto, stopping only once for gas and cigarettes after he smoked all the ones left in her pack. When they cleared the city limits and drove under the viaduct at Danforth Avenue, getting into the proper downtown, he eased off the Parkway and into the city traffic, taking the main roads with their high buildings and stoplights and people, people, people. "We're going home?" she said. The last thing she'd said was, "Are you hungry?" fourteen hours before and he'd only shook his head. "Yes," he said. "Oh," she said. Was Krishna home? She was rooting in her purse now, and he knew that she was looking for her knife. "You staying with me?" he said. "Can I?" she said. They were at a red light, so he looked into her eyes. They were shiny and empty as marbles. "Yes," he said. "Of course. And I will have a word with Krishna." She looked out the window. "I expect he'll want to have a word with you, too." # Link rang his doorbell one morning while he was hunched over his computer, thinking about the story he was going to write. When he'd moved into the house, he'd felt the shape of that story. All the while that he'd sanded and screwed in bookcases, it had floated just below the surface, its silhouette discernible through the ripples. But when Adam left Mimi watching television and sat at his desk in the evening with the humming, unscuffed, and gleaming laptop before him, fingers poised over the keys, nothing came. He tapped out an opening sentence, I suspect that my father is dead and deleted it. Then undid the delete. He called up The Inventory and stroked the spacebar with his thumb, paging through screensful of pictures and keywords and pricetags and scanned-in receipts. He flipped back to the story and deleted his sentence. My dead brother had been hiding out on the synagogue's roof for God knows how long. The last thing he wanted was to write an autobiography. He wanted to write a story about the real world, about the real people who inhabited it. He hit the delete key. The video-store girl never got bored behind her counter, because she could always while away the hours looking up the rental histories of the popular girls who'd shunned her in high school. That's when Link rang his doorbell and he startled guiltily and quit the text editor, saving the opening sentence. Which had a lot of promise, he thought. "Link!" he said. "Come in!" The kid had put on ten or fifteen pounds since they'd first met, and no longer made Alan want to shout, *Someone administer a sandwich* stat*!* Most of it was muscle from hard riding as a bike messenger, a gig that Link had kept up right through the cold winter, dressing up like a gore-tex Martian in tights and ski goggles and a fleece that showed hints of purple beneath its skin of crusted road salt and pollution. Andrew had noticed the girls in the Market and at Kurt's shop noticing Link, whose spring wardrobe showed off all that new muscle to new effect, and gathered from the various hurt looks and sulks from the various girls that Link was getting more ass than a toilet-seat. Her brother spent the winter turning into the kind of stud that she'd figured out how to avoid before she finished high school, and it pained her to see the hordes of dumb-bunnies making goo-goo eyes at him. That would be a good second sentence for his story. "You okay, Abby?" Link said, looking concerned. Albert realized that he'd been on another planet for a moment there. "Sorry, just fell down a rabbit hole," he said, flapping his arms comically. "I was writing " -- felt *good* to say that -- "and I'm in a bit of a, how you say, creative fog." Link took a step back. "I don't want to disturb you," he said. But for all that, she still approved his outfits before he left the house, refusing to let him succumb to the ephemeral awful trendiness of mesh-back caps and too-tight boy-scout jamboree shirts. Instead, she put him into slightly fitted cotton shirts that emphasized his long lean belly and his broad shoulders. "Don't sweat it. I could use a break. Come in and have a drink or something." He checked the yellowing face of the tick-tock clock he kept on the mantelpiece and saw that it was just past noon. "Past lunchtime, that means that it's okay to crack a beer. You want a beer?" And for all that, her brother still managed to come home looking like some kind of frat-rat pussy-hound, the kind of boy she'd always hoped he wouldn't be. "Beer would be great," Link said. He stepped into the cool of the living room and blinked as his eyes adjusted. "This really is a hell of a place," he said, looking around at the glass cases, the teetering stacks of books that Andrew had pulled down and not reshelved, making ziggurats of them instead next to all the chairs. "What can I do for you?" Adam said, handing him a glass of Upper Canada Lager with a little wedge of lime. He'd bought a few cases of beer that week and had been going through them steadily in the living room, paging through the most favored of his books, trying to find something, though he wasn't sure what. Link sipped. "Summer's here," he said. "Yeah," Alan said. "Well, the thing is, summer. I'm going to be working longer hours and, you know, evenings. Well. I mean. I'm 19 years old, Andy." Alan raised an eyebrow and sat back in his chair. "What's the message you're trying to convey to me, Link?" "I'm not going to be going around your friend's shop anymore. I really had fun doing it all year, but I want to try something different with my spare time this summer, you understand?" "Sure," Alan said. He'd had kids quit on him before. That's what kids did. Attention spans. "Right. And, well, you know: I never really understood what we were *doing*..." "Which part?" "The WiFi stuff --" "Well, you see --" "Stop, okay? I've heard you explain it ten times now and I still don't get it. Maybe after a semester or two of electrical engineering it'll make more sense." "Okay," Adam said, smiling broadly to show no hard feelings. "Hey," he said, carefully. "If you didn't understand what we were doing, then why did you do it?" Link cocked his head, as if examining him for traces of sarcasm, then looked away. "I don't know. It was exciting, even if I didn't quite get it. Everyone else seemed to get it, sort of, and it was fun to work alongside of them, and sometimes the money was okay." Which is why she decided to -- Damn, what did she decide to do? That was shaping up to be a really good opener. Which is why she wasn't surprised when he didn't come home for three nights in a row. Aha. "No hard feelings, Link," Adam said. "I'm really grateful for the help you gave us and I hope you'll think about helping again in the fall..." But on the fourth night, she got worried, and she started calling his friends. They were all poor students, so none of them had land-line numbers you could look up in the phone book, but that was okay, since they all had accounts with the video store where she worked, with their deadbeat pre-paid mobile numbers listed. "Yeah, that sounds great, you know, September, it gets dark early. Just got word that I got into Ryerson for the fall, so I'll be taking engineering classes. Maybe I can help out that way?" "Perfect," Alan said. Link took a step backward, drained his beer, held out the glass. "Well, thanks," Link said, and turned. Alan reached past him and opened the door. There were a couple of girls there, little suburban girls of the type that you could find by the hatful in the Market on Saturday mornings, shopping for crazy clothes at the vintage shops. They looked 14, but might have been as old as 16 or 17 and just heartbreakingly naive. Link looked over his shoulder and had the decency to look slightly embarrassed as they smiled at him. "Okay, thanks, then," he said, and one of the girls looked past him to get a glimpse inside the house. Andy instinctively stepped aside to give her a better view of his showroom and he was about to offer her a soda before he caught himself. "You've got a nice place," she said. "Look at all those books!" Her friend said, "Have you read all those books?" She was wearing thick concealer over her acne, but she had a round face and heart-shaped lips that he wouldn't have been surprised to see on the cover of a magazine. She said it with a kind of sneer. Link said, "Are you kidding? What's the point of a houseful of books you've already read?" They both laughed adoringly -- if Adam was feeling uncharitable, he'd say it was simpering, not laughing, and took off for the exciting throngs in the Market. Alan watched them go, with Link's empty glass in one hand and his full glass in the other. It was hot out in the Market, sunny, and it felt like the spring had rushed up on him and taken him by surprise when he wasn't looking. He had owned the house for more than a year now, and the story only had three or four paragraphs to it (and none of them were written down yet!). "You can't wash shit," is what her mother said when she called home and asked what she should do about her brother. "That kid's been a screw-up since he was five years old." He should write the story down. He went back upstairs and sat down at the keyboard and pecked out the sentences that had come to him, but they seemed very sterile there aglow on the screen, in just the same way that they'd felt restless and alive a moment before. The sunny day beamed through the study window and put a glare up on his screen that made it hard to type, and when he moved to the other side of the desk, he found himself looking out the window at the city and the spring. He checked his calendar and his watch and saw that he only had a couple hours before the reporter from NOW magazine came by. The reporter -- a summer intern -- was the only person to respond to his all-fluff press release on the open network. He and Kurt had argued about the wording all night and when he was done, he almost pitched it out, as the editorial thrash had gutted it to the point of meaninglessness. Oh well. The breeze made the new leaves in the trees across the street sway, and now the sun was in his eyes, and the sentences were inert on the screen. He closed the lid of the laptop and grabbed his coat and left the house as fast as he could, obscurely worried that if he didn't leave then, he wouldn't get out all day. # As he got closer to Kurt's storefront, he slowed down. The crowds were thick, laughing suburban kids and old men in buttoned-up cardigans and fisherman's caps and subcultural tropical fish of all kinds: Goths and punks and six kinds of ravers and hippies and so forth. He spied Link sitting on the steps leading up to one of the above-shop apartments, passing a cigarette to a little girl who sat between his knees. Link didn't see him, he was laughing at something the boy behind him said. Alan looked closer. It was Krishna, except he'd shaved his head and was wearing a hoodie with glittering piping run along the double seams, a kind of future-sarcastic raver jumper that looked like it had been abandoned on the set of *Space: 1999*. Krishna had his own little girl between *his* knees, with heart-shaped lips and thick matte concealer over her zits. His hand lay casually on her shoulder, and she brushed her cheek against it. Alan felt the air whuff out of him as though he'd been punched in the stomach, and he leaned up against the side of a fruit market, flattening himself there. He turned his head from side to side, expecting to see Mimi, and wanting to rush out and shield her from the sight, but she was nowhere to be seen, and anyway, what business was it of his? And then he spied Natalie, standing at the other end of the street, holding on to the handles of one of the show bicycles out front of Bikes on Wheels. She was watching her brother closely, with narrowed eyes. It was her fault, in some way. Or at least she thought it was. She'd caught him looking at Internet porn and laughed at him, humiliating him, telling him he should get out and find a girl whose last name wasn't "Jpeg." He saw that her hands were clenched into fists and realized that his were, too. It was her fault in some way, because she'd seen the kind of person he was hanging out with and she hadn't done a thing about it. He moved into the crowd and waded through it, up the street on the opposite side from his neighbors. He closed in on Natalie and ended up right in front of her before she noticed he was there. "Oh!" she said, and blushed hard. She'd been growing out her hair for a couple months and it was long enough to clip a couple of barrettes to. With the hair, she looked less skinny, a little older, a little less vulnerable. She tugged at a hank of it absently. "Hi." "We going to do anything about that?" he said, jerking his head toward the steps. Krishna had his hand down the little girl's top now, cupping her breast, then laughing when she slapped it away. She shrugged, bit her lip. She shook her head angrily. "None of my business. None of *your* business." She looked at her feet. "Look, there's a thing I've been meaning to tell you. I don't think I can keep on volunteering at the shop, okay? I've got stuff to do, assignments, and I'm taking some extra shifts at the store --" He held up a hand. "I'm grateful for all the work you've done, Natalie. You don't need to apologize." "Okay," she said. She looked indecisively around, then seemed to make up her mind and she hugged him hard. "Take care of yourself, okay?" It struck him as funny. "I can take care of myself just fine, don't worry about me for a second. You still looking for fashion work? I think Tropicál will be hiring for the summer. I could put in that phone-call." "No," she said. "No, that's okay." She looked over his shoulder and her eyes widened. He turned around and saw that Krishna and Link had spotted them, and that Krishna was whispering something in Link's ear that was making Link grin nastily. "I should go," she said. Krishna's hand was still down the little girl's top, and he jiggled her breast at Alan. # The reporter had two lip piercings, and a matt of close-cropped micro-dreads, and an attitude. "So here's what I don't get. You've got the Market wired --" "Unwired," Kurt said, breaking in for the tenth time in as many minutes. Alan shot him a dirty look. "Unwired, right." The kid made little inverted commas with his fingertips, miming, *Yes, that is a very cute jargon you've invented, dork.* "You've got the Market unwired and you're going to connect up your network with the big interchange down on Front Street." "Well, *eventually*," Alan said. The story was too complicated. Front Street, the Market, open networks...it had no focus, it wasn't a complete narrative with a beginning, middle, and end. He'd tried to explain it to Mimi that morning, over omelets in his kitchen, and she'd been totally lost. "Eventually?" The kid took on a look of intense, teenaged skepticism. He claimed to be 20, but he looked about 17 and had been the puck in an intense game of eyeball hockey among the cute little punk girls who'd been volunteering in the shopfront when he'd appeared. "That's the end-goal, a citywide network with all-we-can eat free connectivity, fully anonymized and hardened against malicious attackers and incidental environmental interference." Alan steepled his fingers and tried to look serious and committed. "Okay, that's the goal." "But it's not going to be all or nothing. We want to make the community a part of the network. Getting people energized about participating in the network is as important as providing the network itself -- hell, the network *is* people. So we've got this intermediate step, this way that everyone can pitch in." "And that is, what, renaming your network to ParasiteNet?" Kurt nodded vigorously. "Zactly." "And how will I find these ParasiteNet nodes? Will there be a map or something with all this information on it?" Alan nodded slowly. "We've been thinking about a mapping application --" "But we decided that it was stupid," Kurt said. "No one needed to draw a map of the Web -- it just grew and people found its weird corners on their own. Networks don't *need* centralized authority, that's just the chains on your mind talking --" "The chains on my mind?" The kid snorted. Alan held his hands up placatingly. "Wait a second," he said. "Let's take a step back here and talk about *values*. The project here is about free expression and cooperation. Sure, it'd be nice to have a city-wide network, but in my opinion, it's a lot more important to have a city full of people working on that network because they value expression and understand how cooperation gets us more of that." "And we'll get this free expression how?" "By giving everyone free Internet access." The kid laughed and shook his head. "That's a weird kind of 'free,' if you don't mind my saying so." He flipped over his phone. "I mean, it's like, 'Free speech if you can afford a two-thousand-dollar laptop and want to sit down and type on it.'" "I can build you a desktop out of garbage for twenty bucks," Kurt said. "We're drowning in PC parts." "Sure, whatever. But what kind of free expression is that? Free expression so long as you're sitting at home with your PC plugged into the wall?" "Well, it's not like we're talking about displacing all the other kinds of expression," Alan said. "This is in addition to all the ways you've had to talk --" "Right, like this thing," the kid said. He reached into his pocket and took out a small phone. "This was free -- not twenty dollars, not even two thousand dollars -- just free, from the phone company, in exchange for a one-year contract. Everyone's got one of these. I went trekking in India, you see people using these out in the bush. And you know what they use them for? Speech! Not speech-in-quotes meaning some kind of abstract expression, but actual *talking.*" The kid leaned forward and planted his hands on his knees and suddenly he was a lot harder to dismiss as some subculture-addled intern. He had that fiery intensity that Alan recognized from himself, from Kurt, from the people who believe. Alan thought he was getting an inkling into why this particular intern had responded to his press release: Not because he was too ignorant to see through the bullshit, but just the opposite. "But that's communication through the *phone company*," Kurt said, wonderment in his voice that his fellow bohemian couldn't see how sucktastic that proposition was. "How is that free speech?" The kid rolled his eyes. "Come off it. You old people, you turn up your noses whenever someone ten years younger than you points out that cell phones are actually a pretty good way for people to communicate with each other -- even subversively. I wrote a term paper last year on this stuff: In Kenya, electoral scrutineers follow the ballot boxes from the polling place to the counting house and use their cell phones to sound the alarm when someone tries to screw with them. In the Philippines, twenty thousand people were mobilized in 15 minutes in front of the presidential palace when they tried to shut down the broadcast of the corruption hearings. "And yet every time someone from my generation talks about how important phones are to democracy, there's always some old pecksniff primly telling us that our phones don't give us *real* democracy. It's so much bullshit." He fell silent and they all stared at each other for a moment. Kurt's mouth hung open. "I'm not old," he said finally. "You're older than me," the kid said. His tone softened. "Look, I'm not trying to be cruel here, but you're generation-blind. The Internet is great, but it's not the last great thing we'll ever invent. My pops was a mainframe guy, he thought PCs were toys. You're a PC guy, so you think my phone is a toy." Alan looked off into the corner of the back room of Kurt's shop for a while, trying to marshal his thoughts. Back there, among the shelves of milk crates stuffed with T-shirts and cruft, he had a thought. "Okay," he said. "Fair enough. It may be that today, in the field, there's a lot of free expression being enabled with phones. But at the end of the day" -- he thought of Lyman -- "this is the *phone company* we're talking about. Big lumbering dinosaur that is thrashing in the tar pit. The spazz dinosaur that's so embarrassed all the other dinosaurs that none of them want to rescue it. "Back in the sixties, these guys sued to keep it illegal to plug anything other than their rental phones into their network. But more to the point, you get a different kind of freedom with an Internet network than a phone-company network -- even if the Internet network lives on top of the phone-company network. "If you invent a new way of using the phone network -- say, a cheaper way of making long-distance calls using voice-over-IP, you can't roll that out on the phone network without the permission of the carrier. You have to go to him and say, 'Hey, I've invented a way to kill your most profitable line of business, can you install it at your switching stations so that we can all talk long distance for free?' "But on the net, anyone can invent any application that he can get his buddies to use. No central authority had to give permission for the Web to exist: A physicist just hacked it together one day, distributed the software to his colleagues, and in just a very short while, people all over the world had the Web. "So the net can live on top of the phone network and it can run voice-calling as an application, but it's not tied to the phone network. It doesn't care whose wires or wireless it lives on top of. It's got all these virtues that are key to free expression. That's why we care about this." The kid nodded as he talked, impatiently, signaling in body language that even Alan could read that he'd heard this already. "Yes, in this abstract sense, there are a bunch of things to like about your Internet over there. But I'm talking about practical, nonabstract, nontheoretical stuff over here. The real world. I can get a phone for *free*. I can talk to *everyone* with it. I can say *anything* I want. I can use it *anywhere*. Sure, the phone company is a giant conspiracy by The Man to keep us down. But can you really tell me with a straight face that because I can't invent the Web for my phone or make free long distance calls I'm being censored?" "Of course not," Kurt said. Alan put a steadying hand on his shoulder. "Fine, it's not an either-or thing. You can have your phones, I can have my Internet, and we'll both do our thing. It's not like the absence of the Web for phones or high long-distance charges are *good* for free expression, Christ. We're trying to unbreak the net so that no one can own it or control it. We're trying to put it on every corner of the city, for free, anonymously, for anyone to use. We're doing it with recycled garbage, and we're paying homeless teenagers enough money to get off the street as part of the program. What's not to fucking like?" The kid scribbled hard on his pad. "*Now* you're giving me some quotes I can use. You guys need to work on your pitch. 'What's not to fucking like?' That's good." # He and Link saw each other later that day, and Link still had his two little girls with him, sitting on the patio at the Greek's, drinking beers, and laughing at his jokes. "Hey, you're the guy with the books," one of them said when he passed by. He stopped and nodded. "That's me, all right," he said. Link picked at the label of his beer bottle and added to the dandruff of shredded paper in the ashtray before him. "Hey, Abe," he said. "Hey, Link," he said. He looked down at the little girls' bags. "You've made some finds," he said. "Congratulations." They were wearing different clothes now -- double-knit neon pop-art dresses and horn-rim shades and white legs flashing beneath the tabletop. They kicked their toes and smiled and drank their beers, which seemed comically large in their hands. Casually, he looked to see who was minding the counter at the Greek's and saw that it was the idiot son, who wasn't smart enough to know that serving liquor to minors was asking for bad trouble. "Where's Krishna?" he asked. One girl compressed her heart-shaped lips into a thin line. And so she resolved to help her brother, because when it's your fault that something has turned to shit, you have to wash shit. And so she resolved to help her brother, which meant that, step one, she had to get him to stop screwing up. "He took off," the girl said. Her pancake makeup had sweated away during the day and her acne wasn't so bad that she'd needed it. "He took off running, like he'd forgotten something important. Looked scared." "Why don't you go get more beers," Link said angrily, cutting her off, and Alan had an intuition that Link had become Krishna's Renfield, a recursion of Renfields, each nesting inside the last like Russian dolls in reverse: Big Link inside medium Krishna inside the stump that remained of Darrel. And that meant that she had to take him out of the company of his bad companions, which she would accomplish through the simple expedient of scaring the everlasting fuck out of them. She sulked off and the remaining girl looked down at her swinging toes. "Where'd he go, Link?" Alan said. If Krishna was in a hurry to go somewhere or see something, he had an idea of what it was about. Link's expression closed up like a door slamming shut. "I don't know," he said. "How should I know?" The other girl scuffed her toes and took a sip of her beer. Their gazes all flicked down to the bottle. "The Greek would bar you for life if he knew you were bringing underaged drinkers into here," Alan said. "Plenty of other bars in the Market," Link said, shrugging his newly broad shoulders elaborately. Trey was the kid who'd known her brother since third grade and whose puberty-induced brain damage had turned him into an utter turd. She once caught him going through the bathroom hamper, fetishizing her panties, and she'd shouted at him and he'd just ducked and grinned a little-boy grin that she had been incapable of wiping off his face, no matter how she raged. She would enjoy this. "And they all know the Greek," Alan said. "Three, two, one." He turned on his heel and began to walk away. "Wait!" Link called. The girl swallowed a giggle. He sounded desperate and not cool at all anymore. Alan stopped and turned his body halfway, looking impatiently over his shoulder. Link mumbled something. "What?" "Behind Kurt's place," Link said. "He said he was going to go look around behind Kurt's place." "Thank you, Link," he said. He turned all the way around and got down to eye level with the other girl. "Nice to meet you," he said. He wanted to tell her, *Be careful* or *Stay alert* or *Get out while the getting's good*, but none of that seemed likely to make much of an impression on her. She smiled and her friend came back with three beers. "You've got a great house," she said. Her friend said, "Yeah, it's amazing." "Well, thank you," he said. "Bye," they said. Link's gaze bored into the spot between his shoulder blades the whole way to the end of the block. # The back-alleys of Kensington were a maze of coach houses, fences, dead ends and narrow doorways. Kids who knew their secrets played ball-hockey nearly undisturbed by cars, junkies turned them into reeking pissoirs, homeless people dossed down in the lees of their low, crazy-angled buildings, teenagers came and necked around corners. But Alan knew their secrets. He'd seen the aerial maps, and he'd clambered their length and breadth and height with Kurt, checking sight lines for his network, sticking virtual pushpins into the map on his screen where he thought he could get some real benefit out of an access point. So once he reached Kensington Avenue, he slipped behind a Guyanese patty stand and stepped through a wooden gate and began to make his way to the back of Kurt's place. Cautiously. From behind, the riot of colors and the ramshackle signs and subculture of Kensington was revealed as a superfice, a skin stretched over slightly daggy brick two-stories with tiny yards and tumbledown garages. From behind, he could be walking the back ways of any anonymous housing development, a no-personality greyzone of nothing and no one. The sun went behind a cloud and the whole scene turned into something monochromatic, a black-and-white clip from an old home movie. Carefully, he proceeded. Carefully, slipping from doorway to doorway, slipping up the alleyway to the next, to the corner that led to the alley that led to Kurt's. Carefully, listening, watching. And he managed to sneak up on Krishna and Davey, and he knew that for once, he'd be in the position to throw the rocks. Krishna sat with his back against the cinderblock wall near Kurt's back door, knees and hands splayed, head down in a posture of supplication. He had an unlit cigarette in his mouth, which he nervously shifted from corner to corner, like a soggy toothpick. Behind him, standing atop the dented and scabrous garbage cans, Dumont. He rested his head on his folded arms, which he rested on the sill, and he stood on tiptoe to see in the window. "I'm hungry," Krishna said. "I want to go get some food. Can I go and get food and come back?" "Quiet," Dewayne said. "Not another fucking word, you sack of shit." He said it quietly in a neutral tone that was belied by his words. He settled his head back on his folded forearms like a babe settling its head in a bosom and looked back through the window. "Ah," he said, like he had taken a drink. Krishna climbed slowly to his feet and stood off a pace or two, staring at Drew. He reached into the pocket of his old bomber jacket and found a lighter and flicked it nervously a couple times. "Don't you light that cigarette," Davey said. "Don't you dare." "How long are we going to be here?" Krishna's whine was utterly devoid of his customary swagger. "What kind of person is he?" Davey said. "What kind of person is he? He is in love with my brother, looks at him with cow-eyes when he sees him, hangs on his words like a love-struck girl." He laughed nastily. "Like *your* love-struck girl, like she looks at him. "I wonder if he's had her yet. Do you think he has?" "I don't care," Krishna said petulantly, and levered himself to his feet. He began to pace and Alan hastily backed himself into the doorway he'd been hiding in. "She's mine, no matter who she's fucking. I *own* her." "Look at that," Darrel said. "Look at him talking to them, his little army, like a general giving them a pep talk. He got that from my brother, I'm sure. Everywhere he goes, he leaves a trail of manipulators who run other people's lives." Alan's stomach clenched in on itself, and his butt and thighs ached suddenly, like he'd been running hard. He thought about his protégés with their shops and their young employees, learning the trade from them as they'd learned it from him. How long had Don been watching him? "When are we going to do it?" Krishna spat out his cigarette and shook another out of his pack and stuck it in his mouth. "Don't light it," Drew said. "We're going to do it when I say it's time to do it. You have to watch first -- watching is the most important part. It's how you find out what needs doing and to whom. It's how you find out where you can do the most damage." "I know what needs doing," Krishna said. "We can just go in there and trash the place and fuck him up. That'd suit me just fine. Send the right message, too." Danny hopped down off the trash can abruptly and Krishna froze in his paces at the dry rasp of hard blackened skin on the pavement. Davey walked toward him in a bowlegged, splay-hipped gait that was more a scuttle than a walk, the motion of some inhuman creature not accustomed to two legs. "Have you ever watched your kind, ever? Do you understand them, even a little? Just because you managed to get a little power over one of my people, you think you understand it all. You don't. That one in there is bone-loyal to my brother. If you vandalized his little shop, he'd just go to my brother for protection and end up more loyal and more. Please stop thinking you know anything, it'll make it much easier for us to get along." Krishna stiffened. "I know things," he said. "Your pathetic little birdie girl is *nothing*," Davey said. He stumped over to Krishna, stood almost on his toes, looking up at him. Krishna took an involuntary step backward. "A little one-off, a changeling without clan or magic of any kind." Krishna stuck his balled fists into the pockets of his space-age future-sarcastic jacket. "I know something about *you*," he said. "About *your* kind." "Oh, yes?" Davey's tone was low, dangerous. "I know how to recognize you, even when you're passing for normal. I know how to spot you in a crowd, in a second." He smiled. "You've been watching my kind all your life, but I've been watching your kind for all of *mine*. I've seen you on the subway and running corner stores, teaching in classrooms and driving to work." Davey smiled then, showing blackened stumps. "Yes, you can, you certainly can." He reached out one small, delicate hand and stroked the inside of Krishna's wrist. "You're very clever that way, you are." Krishna closed his eyes and breathed heavily through his nose, as though in pain or ecstasy. "That's a good skill to have." They stood there for a moment while Davey slowly trailed his fingertips over Krishna's wrist. Then, abruptly, he grabbed Krishna's thumb and wrenched it far back. Krishna dropped abruptly to his knees, squeaking in pain. "You can spot my kind, but you know nothing about us. You *are* nothing, do you understand me?" Krishna nodded slowly. Alan felt a sympathetic ache in his thumb and a sympathetic grin on his face at the sight of Krishna knelt down and made to acquiesce. "You understand me?" Krishna nodded again. Davey released him and he climbed slowly to his feet. Davey took his wrist again, gently. "Let's get you something to eat," he said. Before Alan knew it, they were nearly upon him, walking back down the alley straight toward his hiding place. Blood roared in his ears and he pressed his back up against the doorway. They were only a step or two away, and after a couple of indiscreetly loud panting gasps, he clamped his lips shut and held his breath. There was no way they could miss him. He pressed his back harder against the door, and it abruptly swung open and a cold hand wrapped itself around his bicep and pulled his through into a darkened, oil- and must-smelling garage. He tripped over his own heel and started to go over, but a pair of hands caught him and settled him gently to the floor. "Quiet," came a hoarse whisper in a voice he could not place. And then he knew who his rescuer was. He stood up silently and gave Billy a long hug. He was as skinny as death. # Trey's phone number was still current in the video store's database, so she called him. "Hey, Trey," she said. "It's Lara." "Lara, heeeeeeyyyy," he said, in a tone that left no doubt that he was picturing her panties. "Sorry, your bro ain't here." "Want to take me out to dinner tonight?" The silence on the other end of the line made her want to laugh, but she bit her lip and rolled her eyes and amused the girl browsing the chop-socky epics and visibly eavesdropping. "Trey?" "Lara, uh, yes, I'd love to, sure. Is this like a group thing or..." "No, Trey, I thought I'd keep this between the two of us. I'll be at the store until six -- meet me here?" "Yeah, okay. Okay! Sure. I'll see you tonight." # Brad was so thin he looked like a corpse. He was still tall, though, and his hair and beard were grown out into long, bad-smelling straggles of knot and grime. In the half-light of the garage, he had the instantly identifiable silhouette of a street person. He gathered Adam up in a hug that reeked of piss and booze, a hug like a bundle of twigs in his arms. "I love you," he whispered. Andrew backed away and held him at arm's length. His skin had gone to deep creases lined with soot, his eyes filmed with something that looked like pond scum. "Brady. What are you doing here?" He held a finger up to his lips, then opened the door again onto the now-empty alley. Alan peered the way that Davey and Krishna had gone, just in time to see them turn a distant corner. "Give it another minute," Blake said, drawing the door nearly closed again. A moment later, they heard another door open and then Kurt's chain-draped boots jangled past, headed the other way. They listened to them recede, and then Brian swung the door wide again. "It's okay now," he said. They stepped out into the sunlight and Bert started to walk slowly away. Alan caught up with him and Bert took his arm with long bony fingers, leaning on him. He had a slight limp. "Where have you been?" Alan asked when they had gone halfway home through deft, confident turnings led by Blake. "Watching you," he said. "Of course. When I came to the city, I worked out at the racetrack for a week and made enough money to live off of for a couple months, and avoided the tough guys who watched me winning and waited to catch me alone at the streetcar stop. I made enough and then I went to watch you. "I knew where you were, of course. Always knew where you were. I could see you whenever I closed my eyes. I knew when you opened your shops and I went by at night and in the busy parts of the day so that I could get a better sense of them. I kept an eye on you, Alan, watched over you. I had to get close enough to smell you and hear you and see you, though, it wasn't enough to see you in my mind. "Because I had to know the *why*. I could see the *what*, but I had to know the *why* -- why were you opening your stores? Why were you saying the things you said? I had to get close enough because from the outside, it's impossible to tell if you're winking because you've got a secret, or if you've got dust in your eye, or if you're making fun of someone who's winking, or if you're trying out a wink to see how it might feel later. "It's been four years I've been watching you when I could, going back to the track for more when I ran out of money, and you know what? I know what you're doing." Alan nodded. "Yeah," he said. "You're watching. You're doing what I'm doing. You're watching them to figure out what they're doing." Alvin nodded. "Yeah," he said. "You don't know any more about the world than I do." Albert nodded. "Yeah," he said. Billy shook his head and leaned more heavily on Alan's arm. "I want a drink," he said. "I've got some vodka in the freezer," Alan said. "I'll take some of the Irish whiskey on the sideboard in the living room." Adam looked at him sharply and he shrugged and smiled an apologetic smile. "I've been watching," he said. They crossed the park together and Buddy stopped to look hard at the fountain. "That's where he took Edward, right? I saw that." "Yeah," Alvin said. "Do you know where he is now?" "Yeah," Billy said. "Gone." "Yeah," Adam said. "Yeah." They started walking now, Billy's limp more pronounced. "What's with your leg?" "My foot. I lost a couple toes last year to frostbite and never got them looked at properly." He reeked of piss and booze. "They didn't...grow back?" Bradley shook his head. "They didn't," he said. "Not mine. Hello, Krishna," he said. Alan looked to his neighbors' porch. Krishna stood there, stock still, against the wall. "Friend of yours, huh?" Krishna said. "Boyfriend?" "He offered me a bottle of wine if I let him take me home," Bradley said. "Best offer I had all week. Wanna make it a threesome? An *'ow you say* 'mange ma twat?'" Krishna contorted his face into an elaborate sneer. "Puke," he said. "Bye, Krishna," Buddy said. Alan put his key into the lock and let them in. Blaine made a hobbling beeline for the sideboard and picked up the Jim Beam Apollo 8 commemorative decanter that Adam kept full of Bushmills 1608 and poured himself a tall glass of it. He drank it back in two swallows, then rolled his tongue around in his mouth with his eyes closed while he breathed out the fumes. "I have been thinking about that bottle ever since you bought it," he said. "This stuff is legendary. God, that's good. I mean, that's fucking magical." "It's good," Andrew said. "You can have more if you want." "Yeah," Burke said, and poured out another drink. He carried it and the decanter to the sofa and settled into it. "Nice sofa," he said. "Nice living room. Nice house. Not very normal, though." "No," Andrew said. "I'm not fitting in very well." "I fit in great." He drank back another glug of whiskey and poured out another twenty dollars' worth. "Just great, it's the truth. I'm totally invisible and indistinguishable. I've been sleeping at the Scott Mission for six months now and no one has given me a second glance. They can't even steal my stuff, because when they try, when they come for my shoes or my food in the night, I'm always awake and watching them and just shaking my head." The whole living room stank of whiskey fumes with an ammoniac tinge. "What if I find you some clothes and a towel?" "Would I clean myself up? Would I get rid of this protective coloration and become visible again?" He drank more, breathed out the fumes. "Sure, why not. Why not. Time to be visible. You've seen me, Krishna's seen me. Davey's gonna see me. Least I got to see them first." And so he let his older brother lead him by the hand upstairs to the bathroom with its damp-swollen paperbacks and framed kitsch-art potty-training cartoons. And so he let his brother put him under the stinging hot shower and shampoo his hair and scrub him vigorously with a back brush, sluicing off the ground-in grime of the streets -- though the calous pads on his hands remained as dark with soot as the feet of an alleycat. And so he let his older brother wash the stumps of his toes where the skin was just a waxy pucker of scar, like belly buttons, which neither of them had. And so he let his brother trim away his beard, first with scissors and then with an electric razor, and so he let his brother brush out his long hair and tie it back with an elastic taken from around a bunch of broccoli in the vegetable crisper. And so, by the time the work was done and he was dressed in too-big clothes that hung over his sunken chest and spindly legs like a tent, he was quite sober and quite clean and quite different. "You look fine," Adam said, as Brent fingered his chin and watched the reflection in the full-length mirror on the door of Alan's study. "You look great." "I look conspicuous. Visible. Used to be that eyes just slid off of me. Now they'll come to rest on me, if only for a few seconds." Andy nodded. "Sure, that's right. You know, being invisible isn't the same as being normal. Normal people are visible." "Yeah," Brad said, nodding miserably. He pawed again at the smooth hollows of his cheeks. "You can stay in here," Alan said, gesturing at his study. The desk and his laptop and his little beginning of a story sat in the middle of the room, surrounded by a litter of access points in various stages of repair and printed literature full of optimistic, nontechnical explanations of ParasiteNet. "I'll move all that stuff out." "Yeah," Billy said. "You should. Just put it in the basement in boxes. I've been watching you screw around with that wireless stuff and you know, it's not real normal, either. It's pretty desperately weird. Danny's right -- that Kurt guy, following you around, like he's in love with you. That's not normal." He flushed, and his hands were in fists. "Christ, Adam, you're living in this goddamned museum and nailing those stupid science-fair projects to the sides of buildings. You've got this comet tail of druggy kids following you around, buying dope with the money they make off of the work they do for you. You're not just visible, you're *strobing*, and you're so weird even *I* get the crawlies around you." His bare feet slapped the shining cool wood as he paced the room, lame foot making a different sound from the good one. Andy looked out the window at the green maple-keys rattling in the wind. "They're buying drugs?" Benny snorted. "You're bankrolling weekly heroin parties at two warehouses on Oxford, and three raves a month down on Liberty Street." He looked up at the ceiling. "Mimi's awake now," he said. "Better introduce me." Mimi kept her own schedule, mostly nocturnal, padding quietly around his house while he slept, coming silently to bed after he rose, while he was in the bathroom. She hadn't spoken a word to him in more than a week, and he had said nothing to her. But for the snores and the warmth of the bed when he lay down and the morning dishes in the sink, she might not have been living with him at all. But for his constant awareness of her presence in his house and but for the shirts with cut-away backs in the laundry hamper, he might be living all on his own. But for the knife that he found under the mattress, compass set into the handle, serrated edge glinting, he might have forgotten those wings, which drooped near to the floor now. Footsteps crossing between the master bedroom and the bathroom. Pausing at the top of the stairs. A soft cough. "Alan?" "It's okay, Mimi," he said. She came down in a pair of his boxer shorts, with the topsheet complicatedly draped over her chest in a way that left her wings free. Their tips touched the ground. "This is my brother Bentley," Adam said. "I told you about him." "You can see the future," she said reproachfully. "You have wings," he said. She held out her hand and he shook it. "I want breakfast," she said. "Sounds good to me," Brent said. Alan nodded. "I'll cook." # He made pancakes and cut up pears and peaches and apples and bananas for fruit salad. "This reminds me of the pancake house in town," Bart said. "Remember?" Adam nodded. It had been Ed-Fred-George's favorite Sunday dinner place. "Do you live here now?" Mimi said. Alan said, "Yes." She slipped her hand into his and squeezed his thumb. It felt good and unexpected. "Are you going to tell her?" Billy said. She withdrew her hand. "What is it." Her voice was cold. Billy said, "There's no good comes of keeping secrets. Krishna and Davey are planning to attack Kurt. Krishna says he owns you. He'll probably come for you." "Did you see that?" Adam said. "Him coming for her?" "Not that kind of seeing. I just understand enough about people to know what that means." Trey met her at six, and he was paunchier than she'd remembered, his high school brawn run to a little fat. He shoved a gift into her hand, a brown paper bag with a quart of cheap vodka in it. She thanked him simperingly and tucked it in her knapsack. "It's a nice night. Let's get takeout and eat it in High Park." She saw the wheels turn in his head, meal plus booze plus secluded park equals pussy, pussy, pussy, and she let the tip of her tongue touch her lips. This would be even easier than she'd thought. "How can you tell the difference?" Arthur said. "Between seeing and understanding?" "You'll never mistake them. Seeing it is like remembering spying on someone, only you haven't spied on him yet. Like you were standing behind him and he just didn't notice. You hear it, you smell it, you see it. Like you were standing *in* him sometimes, like it happened to you. "Understanding, that's totally different. That's like a little voice in your head explaining it to you, telling you what it all means." "Oh," Andy said. "You thought you'd seen, right?" "Yeah. Thought that I was running out of time and going to die, or kill Davey again, or something. It was a feeling, though, not like being there, not like having anything explained." "Is that going to happen?" Mimi asked Brad. Brad looked down at the table. "'Answer unclear, ask again later.' That's what this Magic 8-Ball I bought in a store once used to say." "Does that mean you don't know?" "I think it means I don't want to know." # "Don't worry," Bert said. "Kurt's safe tonight." Alan stopped lacing up his shoes and slumped back on the bench in his foyer. Mimi had done the dishes, Bill had dried, and he'd fretted about Kurt. But it wasn't until he couldn't take it anymore and was ready to go and find him, bring him home if necessary, that Billy had come to talk to him. "Do you know that for sure?" "Yes. He has dinner with a woman, then he takes her dumpster diving and comes home and goes to bed. I can see that." "But you don't see everything?" "No, but I saw that." "Fine," Adam said. He felt hopeless in the face of these predictions, as though the future were something set and immutable. "I need to use the bathroom," Billy said, and made his way upstairs while Alan moved to a sofa and paged absently through an old edition of *Alice in Wonderland* whose marbled frontispiece had come detached. A moment later, Mimi joined him, sitting down next to him, her wings unfolded across the sofa back. "How big are they going to get, do you think?" she said, arranging them. "You don't know?" "They're bigger than they've ever been. That was good food," she said. "I think I should go talk to Krishna." Adam shook his head. "Whoa." "You don't need to be in between us. Maybe I can get him to back off on you, on your family." "Mimi, I don't even want to discuss it." "It's the right thing to do," she said. "It's not fair to you to stay." "You want to have your wings cut," Alan said. "That's why you want to go back to him." She shied back as though he'd slapped her. "No --" "You do. But what Billy didn't tell you is that Krishna's out there with other women, I saw him today. With a girl. Young. Pretty. Normal. If he takes you back, it will be as a toy, not as a lover. He can't love." "Christ," she said. "Why are you saying this?" "Because I don't want to watch you self-destruct, Mimi. Stay here. We'll sort out Krishna together. And my brother. Billy's here now, that means they can't sneak up on us." "And these?" she said, flapping her wings, one great heave that sent currents of air across the room, that blew the loose frontispiece from *Alice in Wonderland* toward the fireplace grate. "You'll sort these out, too?" "What do you want from me, Mimi?" He was angry now. She hadn't spoken a word to him in weeks, and now -- "Cut them off, Alan. Make me into someone who can go out again, who can be seen. Do it. I have the knife." Adam squeezed his eyes shut. "No," he said. "Good-bye," she said, and stood, headed for the stairs. Upstairs, the toilet flushed and they heard the sink running. "Wait!" he said, running after her. She had her hand on the doorknob. "No," she said. She was crying now. "I won't stay. I won't be trapped again. Better to be with him than trapped --" "I'll do it," he said. "If you still want me to do it in two days, I'll do it." She looked gravely at him. "Don't you lie to me about this," she said. "Don't you dare be lying." He took her hands. "I swear," he said. From the top of the stairs then, "Whups," said Billy. "I think I'll just tuck myself into bed." Mimi smiled and hugged Alan fiercely. Trey's ardor came out with his drunkenness. First a clammy arm around her shoulder, then a casual grope at her boob, then a sloppy kiss on the corner of her mouth. That was as far as she was going to let it go. She waited for him to move in for another kiss, then slipped out from under his arm so that he fell into the roots of the big tree they'd been leaning against. She brained him with the vodka bottle before he'd had a chance to recover, then, as he rocked and moaned, she calmly took the hunting knife she'd bought at the Yonge Street survivalist store out of her bag. She prized one of his hands off his clutched head and turned it over, then swiftly drew the blade across his palm, laying it open to the muscle. She hadn't been sure that she'd be capable of doing that, but it was easier than she'd thought. She had nothing to worry about. She was capable of that and more. # They climbed into bed together at the same time for the first time since they'd come home, like a domesticated couple, and Mimi dug under her pillow and set something down with a tin *tink* on the bedstand, a sound too tinny to be the hunting knife. Alan squinted. It was the robot, the one he'd given her, the pretty thing with the Dutch Master craquelure up its tuna-can skirts. "He's beautiful," she said. "Like you." She wrapped her wings around him tightly, soft fur softer than any down comforter, and pressed her dimpled knees into the hollows of his legs, snuggling in. He cried like a baby once the pain in his hand set in. She pointed the knifepoint at his face, close enough to stab him if need be. "I won't kill you if you don't scream," she said. "But I will be taking one joint of one toe and one joint of one finger tonight. Just so you know." He tried not to fall asleep, tried to stay awake and savor that feeling of her pressed against him, of her breath on the nape of his neck, of the enfolded engulfment of her wings, but he couldn't keep his eyes open. Soon enough, he was asleep. What roused him, he couldn't say, but he found himself groggily awake in the close heat of those wings, held tight. He listened attentively, heard something else, a tinny sound. The robot. His bladder was full. He gently extricated himself from Mimi, from her wings, and stood. There was the robot, silhouetted on the end table. He smiled and padded off to the toilet. He came back to find Mimi splayed across the whole bed, occupying its length and breadth, a faintly naughty smile on her face. He began to ease himself into bed again, when he heard the sound, tinny, a little rattle. He looked at the robot. It was moving. Its arms were moving. That was impossible. Its arms were painted on. He sat up quickly, rousing Mimi, who let out a small sound, and something small and bent emerged from behind the robot and made a dash for the edge of the end table. The way the thing ran, it reminded him of an animal that had been crippled by a trap. He shrank back from it instinctively, even as he reached out for the table light and switched it on. Mimi scrunched her eyelids and flung an arm over her face, but he hardly noticed, even when she gave an outraged groan. He was looking at the little, crippled thing, struggling to get down off the end table on Mimi's side of the bed. It was the Allen. Though he hadn't seen it in nearly 20 years, he recognized it. Tiny, malformed, and bandy-legged, it was still the spitting image of him. Had Davey been holding on to it all these years? Tending it in a cage? Torturing it with pins? Mimi groaned again. "Switch off the light, baby," she said, a moment's domesticity. "In a sec," he said, and edged closer to the Allen, which was huddled in on itself, staring and crazy. "Shhh," Adam breathed. "It's okay." He very slowly moved one hand toward the end table, leaning over Mimi, kneeing her wing out of the way. The Allen shied back farther. "What're you doing?" Mimi said, squinting up at him. "Be very still," he said to her. "I don't want to frighten it. Don't scream or make any sudden movements. I'm counting on you." Her eyes grew round and she slowly looked over toward the end table. She sucked in sudden air, but didn't scream. "What is --" "It's me," he said. "It grew out of a piece of me. My thumb. After Davey bit it off." "Jesus," she said. The Allen was quaking now, and Alan cooed to it. "It's hurt," Mimi said. "A long time ago," Andreas said. "No, now. It's bleeding." She was right. A small bead of blood had formed beneath it. He extended his hand farther. Its bandy scurry was pathetic. Holding his breath, Alan lifted the Allen gently, cradling it in his palms. It squirmed and thrashed weakly. "Shh," he said again. His hands were instantly made slippery and sticky with its blood. "Shh." Something sharp pricked at his hand. Now that he had it up close, he could see where the blood was coming from: A broken-off sewing needle, shoved rudely through its distended abdomen. "Cover up," Bradley said, "I'm coming up." They heard his lopsided tread on the steps. Mimi pulled the blanket up around her chin. "Okay," she said. Bert opened the door quickly. He wore nothing but the oversized jeans that Alan had given him, his scrawny chest and mutilated feet bare. "It's going to die," Brad said, hunkering down beside the bed. "Davey pinned it and then sent Link over with it. It can't last through the night." Adam felt like he was choking. "We can help it," he said. "It can heal. It healed before." "It won't this time. See how much pain it's in? It's out of its mind." "So what do you want me to do?" "We need to put it out of its misery," Brad said. "It's the right thing." In his hands, the thing squirmed and made a small, hurt sound. "Shhh," Alan said. The sound it made was like sobbing, but small, so small. And weak. Mimi said, "I think I'm going to be sick." "Yeah," Brian said. "Yeah, I can see that." She lifted herself out of bed, unmindful of her nudity, and pushed her way past him to the door, to the bathroom. "Stop being such a baby," she told Trey as he clutched at his foot. "It's almost stopped bleeding already." He looked up at her with murder in his eyes. "Shall I take another one?" she said. He looked away. "If I get word that you've come within a mile of my brother, I will come back and take your eyes. The toe and the finger joint were just a down payment on that." He made a sullen sound, so she took his vain and girlish blond hair in her fist and tugged his head back and kissed his throat with the knife. "Nod if you understand. Slowly." # "The knife is under Mimi's pillow." "I can't do it," Alan said. "I know," Brian said. "I will." And he did. Took the knife. Took the Allen. It cried. Mimi threw up in another room, the sound more felt than heard. The toilet flushed and Brian's hands were sure and swift, but not sure enough. The Allen made a sound like a dog whistle. Bruce's hand moved again, and then it was over. He dug a sock out of the hamper and rolled up the Allen's remains in it. "I'll bury it," he said. "In the back." Numbly, Alan stood and began dressing. "No," he said. "I will." Mimi joined them, wrapped in a blanket. Alan dug and Brent held the sock and Mimi watched solemnly. A trapezoid of light knifed across the back garden. They looked up and saw Krishna staring down at them from a third-floor window. He was smiling very slightly. A moment later, Link appeared in the window, reeling like he was drunk, giggling. They all looked at one another for a frozen moment, then Alan turned back to his shoveling. He dug down three feet, and Brent laid the little Allen down in the earth gently as putting it to bed, and Alan filled the hole back up. Mimi looked back up at the window, eyes locked on Krishna's. "I'm going inside," Adam announced. "Are you coming?" "Yeah," Mimi said, but she didn't. She stayed out there for ten minutes, then twenty, and when Alan looked out his window at her, he saw she was still staring up at Krishna, mesmerized. He loudly opened his window and leaned out. Mimi's eyes flicked to him, and then she slowly made her way back into the house. She took his pants and his shoes and left him in the park, crying and drunk. All things considered, it had gone well. When Trey told her that he had no idea where her brother was, she believed him. It was okay, she'd find her brother. He had lots of friends. Alan thought that that was the end of the story, maybe. Short and sweet. A kind of lady or the tiger thing. Let the reader's imagination do the rest. There on the screen, it seemed awfully thin. Here in the house he'd built for it, it seemed awfully unimportant. Such a big and elaborate envelope for such a small thing. He saved the file and went back up to bed. Mimi was asleep, which was good, because he didn't think he'd be able to fall asleep with her twice that night. He curled up on his side of the bed and closed his eyes and tried to forget the sound the Allen had made. # "What is wrong with you?" "Not a thing," she said. Her brother's phone-call hadn't been unexpected. "You're fucking insane." "Maybe," she said. "What do you *want from me*?" "I want you to behave yourself." "You're completely fucking insane." He woke to find Billy gone, and had a momentary panic, a flashback to the day that Fred had gone missing in the night. But then he found a note on the kitchen table, terse: "Gone out. B." The handwriting sent him back through the years to the days before Davey came home, the days when they'd been a family, when he'd signed Brad's report cards and hugged him when he came home with a high-scoring paper. Mimi came down while he was holding the note, staring at the few spare words there. She was draped in her wings. "Where did he go?" "I don't know," Alan said. "Out." "Is this what your family is like?" "Yeah," Alan said. "This is what they're like." "Are you going to go out, too?" "Yeah." "Fine," she said. She was angry. She stomped out of the kitchen, and stepped on her own wing, tripping, going over on her face. "Tomorrow, you cut these tomorrow!" she said, and her wings flared open, knocking the light fixtures a-swing and tumbling piles of books. "Tomorrow!" she said. # "Good morning, Natalie," he said. She was red-eyed and her face was puffy, and her hand shook so that the smoke from her cigarette rose in a nervous spiral. "Andy," she said, nodding. He looked at her across the railing that divided their porches. "Would you like to join me for a coffee?" "I'm hardly dressed for it," she said. She was wearing a pair of cutoffs and house slippers and a shapeless green T-shirt that hung down past her butt. "The Greek doesn't stand on ceremony," he said. He was hardly dressed better. He hadn't wanted to go up to the master bedroom and face Mimi, so he'd dressed himself out of the laundry hamper in the basement. "I don't have *shoes*, Alan." "You could go in and get some," he said. She shook her head. Her shoulders were tensed, her whole skinny body a cringe. "We'll go barefoot and sit on the patio," he said after a moment, kicking his shoes off. She looked at him and gave a sad laugh. "Okay." The sidewalk was still cool enough for bare feet. The Greek didn't give their bare feet a second look, but brought iced coffees and yogurt with walnuts and honey. "Do you want to tell me about them?" "It's been bad ever since -- ever since Mimi left. All of a sudden, Krishna's Link's best friend. He follows him around." Alan nodded. "Krishna beat Mimi up," he said. "I know it," she said. "I heard it. I didn't do anything, goddamn me, but I heard it happen." "Eat," he said. "Here." He reached for a clean napkin from the next table and handed it to her. She dried her eyes and wiped her nose and ate a spoonful of yogurt. "Drink," he said, and handed her the coffee. She drank. "They brought those girls home last night. *Little* girls. Teenyboppers. Disappeared into their bedrooms. The noises they made." "Drink," Alan said, and then handed her the napkin again. "Drunk. They got them drunk and brought them home." "You should get out of there," Andrew said, surprising himself. "Get out. Today, even. Go stay with your mom and find a new apartment next month." She set her cup down carefully. "No," she said. "I'm serious. It's a bad situation that you can't improve and the more you stay there, the worse it's going to get." "That's not a practical suggestion." "Staying there, in potential danger, is not practical. You need to get out. Staying there will only make things worse for you." She clenched her jaw. "You know, there comes a point where you're not giving advice anymore. There comes a point where you're just moralizing, demonstrating your hypothetical superiority when it comes to doing the right thing. That's not very fucking helpful, you know. I'm holding my shit together right now, and rather than telling me that it's not enough, you could try to help me with the stuff I'm capable of." Alan digested this. She'd said it loudly, and a few of the other morning patrons at the Greek's were staring at them. He looked away, across the street, and spied Billy standing in a doorway, watching. Billy met his eyes, then looked away. "I'm sorry, Natalie," he said. "You're right." She blew air out her nostrils. "What about this. You can knock on my door any time. I'll make up the sofa for you." He thought of Mimi and cringed inwardly. She'd have to stay upstairs and be quiet if there were strangers in the house. Then he remembered his promise about her wings. He bit his lip. She let out a harsh chuckle. "Will I be any safer there?" "What does that mean?" "You're the weirdest person I've ever met, Alvin. I mean, sorry, no offense, but why the hell would I knock on your door?" She stood and turned on her barefoot heel and took herself away, walking at a brisk and gingerly pace. Barry moseyed over and sat in her seat. "She'll be okay," he said. He picked up her spoon and began to finish her breakfast. "You know, I can't watch the way I could yesterday, not anymore. Too visible. What do I do now?" Aaron shrugged. "Find a job. Be visible. Get a place to live. We can have each other over for dinner." Brett said, "Maybe I could get a job where I got to watch. Security guard." August nodded. He closed his eyes. "She's very pretty," Barry said. "Prettier than Mimi." "If you say so." "Kurt's awake." "Yeah?" "Yeah. You could introduce me to him." I did it for your own good, you know. She couldn't bring herself to say the words, for the enormity of what she'd done was overwhelming her. She'd found three of his friends and treated each of them to an evening of terror and hurt, and none of them would tell her where her brother was, none of them knew. Maybe they'd been innocent all along. "Where are you?" "Far from you," he said. In the background, she heard a girl crying. # "It's going to happen, we're going to cover the whole Market," Kurt said. He had the latest coverage map out and it looked like he was right. "Look at this." The overlapping rings of WiFi false-colored over the map were nearly total. "Are those our own nodes, or just friendlies?" Alan asked, all his confusion and worry forgotten at the sight of the map. "Those are our own," Kurt said. "Not so many friendlies." He tapped a key and showed a map of the city with a pitiful sprinkling of fellow travelers who'd opened up their networks and renamed them "ParasiteNet." "You'll have more," Buddy said. Kurt looked a question at Alan. "My brother Brent," he said. "Meet Kurt." They shook. "Your brother?" Adam nodded. "Not one of the missing ones?" He shook his head. "A different one." "It's nice to meet you." Kurt wiped off his palms. Adam looked around the little private nest at the back of the shop, at the small, meshed-in window on the back wall. Danny watched at that window sometimes. "I'm gonna send a screengrab of this to Lyman, he'll bust a nut." It made Anton smile. Lyman and Kurt were the unlikeliest of pals, but pals they were. "You do that." "Why aren't you wearing shoes?" Anton smiled shyly. "No volunteers today?" Kurt shrugged, a jingle of chains. "Nope. Slow day. Some days just are. Was thinking of seeing a movie or something. Wanna come?" "I can't," Anton said. "Sure," Brett said, oblivious to the fact that the invitation hadn't really been directed at him. "I'd like that." "O-kaaay," Kurt said. "Great. Gimme an hour or so and meet me out front." "It's a date." # He was half a block from home when he spotted Natalie sitting on her porch, staring at the park. Kurt and Link were gone. The patio at the Greek's was full. He was stood in his bare feet in the middle of Kensington Market on a busy shopping day, and he had absolutely nowhere to go. Nowhere he belonged. He realized that Natalie had never put him in touch with her boss at Martian Signal. Barefoot, there wasn't much of anywhere he could go. But he didn't want to be home with Mimi and he didn't want to walk past Natalie. Barefoot, he ended up in the alleyway behind Kurt's again, with nowhere else to go. # Blake and Kurt got back around suppertime, and by then Alan had counted every shingle on the roofs of the garages, had carefully snapped the sharps off of two syringes he found in some weeds, and then sat and waited until he was ready to scream. Blake walked confidently into the shop, through Kurt's nest, and to the back door. He opened it and smiled at Adam. "Come on in," he said. "Right," Alan said. "How was the movie?" "It was fine," Kurt said. "Incredible," Burt said. "I mean, *incredible*. God, I haven't been to the movies in ten years at least. So *loud*, Jesus, I've never heard anything like that." "It was just A&E," Kurt said. "Asses and explosions." Alan felt a wave of affection for his friend, and an indefinite sadness, a feeling that they were soon to be parted. Kurt stretched and cracked his knuckles. "Getting time for me to go out diving." "Let's go get some dinner, okay?" Andy said to Brad. "G'night guys," Kurt said, locking the door behind them. "I'm sorry," she said. There had been five minutes of near-silence on the line, only the girl crying in the background at his end. She wasn't sure if he'd set the phone down or if he was listening, but the "sorry" drew a small audible breath out of him. "I'm really, really sorry," she said, and her hands felt sticky with blood. "God, I just wanted to *save you*." # Mimi was back in bed when they got home. Alan took a shower and scrubbed at his feet, then padded silently around the shuttered bedroom, dressing in the dark. Mimi made a sleepful noise. "I'm making dinner," he said. "Want some?" "Can you bring it up here?" she said. "Yeah, sure," he said. "I just can't face --" She waved a hand at the door, then let it flop back down to the bed. "It's all right, babe," he said. He and Brad ate dinner in silence in the kitchen, boiled hot dogs with cheese and sliced baby tomatoes from the garden and lemonade from scratch. Bradley ate seven. Mimi had three bites out of the one that he brought up to her room, and when he went up to collect her plate, she was asleep and had the covers wrapped snugly around her. He took a spare sheet and a blanket out of the linen closet and brought it downstairs and made up the living room sofa. In moments, he was sleeping. This night, he was keenly aware of what had roused him from sleep. It was a scream, at the back of the house. A scared, drunken scream that was half a roar. He was at the back door in a moment, still scrubbing at his eyes with his fists, and Bennett was there already. He opened the door and hit the switch that turned on the garden lights, the back porch lights, the garage lights in the coach house. It was bright enough to dazzle him, but he'd squinted in anticipation. So it only took him a moment to take in the tableau. There was Link, on the ground, splayed out and face down, wearing boxer shorts and nothing else, his face in a vegetable bed in the next door yard. There was Krishna, standing in the doorway, face grim, holding a hammer and advancing on Link. He shouted, something wordless and alarmed, and Link rolled over and climbed up to his feet and lurched a few steps deeper into the postage-stamp-sized yard, limping badly. Krishna advanced two steps into the yard, hammer held casually at his waist. Alan, barefoot, ran to the dividing fence and threw himself at it going up it like a cat, landing hard and painfully, feeling something small and important give in his ankle. Krishna nodded cordially at him, then hefted the hammer again. Krishna took another step toward Alan and then Natalie, moving so fast that she was a blur, streaked out of the back door, leaping onto Krishna's back. She held there for a minute and he rocked on his heels, but then he swung the hammer back, the claws first. It took her just above her left eye with a sound like an awl punching through leather and her cry was terrible. She let go and fell over backward, holding her face, screaming. But it was enough time, enough distraction, and Alan had hold of Krishna's wrist. Remembering a time a long time ago, he pulled Krishna's hand to his face, heedless of the shining hammer, and bit down on the base of his thumb as hard as he could, until Krishna loosed the hammer with a shout. It grazed Alan's temple and then bounced off his collarbone on the way to the ground, and he was momentarily stunned. And here was Link, gasping with each step, left leg useless, but hauling himself forward anyway, big brawny arms reaching for Krishna, pasting a hard punch on his cheek and then taking hold of his throat and bearing him down to the ground. Alan looked around. Benny was still on his side of the fence. Mimi's face poked out from around the door. The sound of another hard punch made him look around as Link shook the ache out of his knuckles and made to lay another on Krishna's face. He had a forearm across his throat, and Krishna gasped for breath. "Don't," Adam said. Link looked at him, lip stuck out in belligerence. "Stop me," he said. "Try it. Fucker took a hammer to my *knee*." Natalie went to him, her hand over her face. "Don't do it," she said. She put a hand on his shoulder. "We'll call the cops." Krishna made a choking sound. Link eased up on him a little, and he drew a ragged breath. "Go ahead and call them," he rasped. Alan took a slow step back. "Brian, can you bring me the phone, please?" Link looked at his sister, blood streaming down her face, at Krishna's misshapen nose and mouth, distorted into a pink, meaty sneer. He clenched each fist in turn. "No cops," he said. Natalie spat. "Why the hell not?" She spat again. Blood was running into her eye, down her cheek, into her mouth. "The girl, she's inside. Drunk. She's only 15." Alan watched the brother and sister stare at one another. Blaine handed him the phone. He hit a speed dial. "I need a taxi to Toronto Western Hospital at 22 Wales Avenue, at Augusta," he said. He hung up. "Go out front," he told Natalie. "Get a towel for your face on your way." "Andrew --" she said. "I'll call the cops," he said. "I'll tell them where to find you." It was as she turned to go that Krishna made a lunge for the hammer. Billy was already kicking it out of the way, and Link, thrown from his chest, got up on one knee and punched him hard in the kidneys, and he went back down. Natalie was crying again. "Go," Alan said, gently. "We'll be okay." She went. Link's chest heaved. "I think you need to go to the hospital too, Link," Alan said. The injured knee was already so swollen that it was visible, like a volleyball, beneath his baggy trousers. "No," Link said. "I wait here." "You don't want to be here when the cops arrive," Alan said. Krishna, face down in the dirt, spat. "He's not going to call any cops," he said. "It's grown-up stuff, little boy. You should run along." Absently, Link punched him in the back of the head. "Shut up," he said. He was breathing more normally now. He shifted and made a squeaking sound. "I just heard the cab pull up," Alan said. "Brian can help you to the front door. You can keep your sister company, get your knee looked at." "The girl --" he said. "Yes. She'll be sober in the morning, and gone. I'll see to it," Adam said. "All right?" Brian helped him to his feet and toward the door, and Andrew stood warily near Krishna. "Get up," he said. Mimi, in his doorway, across the fence, made a sound that was half a moan. Krishna lay still for a moment, then slowly struggled to his knees and then his feet. "Now what?" Krishna said, one hand pressed to his pulped cheek. "I'm not calling the cops," he said. "No," Krishna said. "Remember what I told you about my brother? I *made him*. I'm stronger than him, Krishna. You picked the wrong Dracula to Renfield for. You are doomed. When you leave him, he will hunt you down. If you don't leave him, I'll get you. You made this situation." Billy was back now, in the doorway, holding the hammer. He'd hand it to Adam if he asked for it. He could use it. After all, once you've killed your brother, why not kill his Renfield, too? Krishna looked scared, a little scared. Andrew teased at how that felt and realized that it didn't feel like he'd thought it would. It didn't feel good. "Go, Krishna," he said. "Get out of this house and get out of my sight and don't ever come back again. Stay away from my brother. You will never profit by your association with him. He is dead. The best he can do for you is make you dead, too. Go." And Krishna went. Slowly. Painfully. He stood and hobbled toward the front door. Mimi watched him go, and she smiled once he was gone. Benny said, "Kurt's shop is on fire." # They ran, the two of them, up Augusta, leaving Mimi behind, wrapped in her blanket. They could smell the smoke as soon as they crossed Kensington, and they could see the flames licking out of the dark black clouds just a moment later. The smell was terrible, a roiling chemical reek that burned the skin and the lungs and the eyes. All those electronics, crisping and curling and blackening. "Is he in there?" Alan said. "Yes," Barry said. "Trapped." "Call the fire department," Andrew said, and ran for the door, fishing in his pocket for his keys. "Call 911." He got the door open and left his keys in the lock, pulling his shirt up over his head. He managed a step into the building, two steps, and the heat beat him back. He sucked up air and ran for it again. The heat was incredible, searing. He snorted half a breath and felt the hair inside his nostrils scorch and curl and the burning was nearly intolerable. He dropped down on all fours and tried to peer under the smoke, tried to locate Kurt, but he couldn't find him. Alan crawled to the back of the store, to Kurt's den, sure that his friend would have been back there, worn out from a night's dumpster diving. He took a false turn and found himself up against the refrigerator. The little piece of linoleum that denoted Kurt's kitchen was hot and soft under his hands, melting and scorching. He reoriented himself, spinning around slowly, and crawled again. Tears were streaming freely down his face, and between them and the smoke, he could barely see. He drew closer to the shop's rear, nearly there, and then he was there, looking for Kurt. He found him, leaned up against the emergency door at the back of the shop, fingers jammed into the sliver of a gap between the door's bottom and the ground. Alan tried the door's pushbar, but there was something blocking the door from the other side. He tried slapping Kurt a couple times, but he would not be roused. His breath came in tiny puffs. Alan took his hand, then the other hand, and hoisted his head and neck and shoulders up onto his back and began to crawl for the front door, going as fast as he could in the blaze. He got lost again, and the floor was hot enough to raise blisters. When he emerged with Kurt, he heard the sirens. He breathed hard in the night air. As he watched, two fire trucks cleared the corner, going the wrong way down one-way Augusta, speeding toward him. He looked at Billy. "What?" "Is Kurt all right?" "Sure, he's fine." He thought a moment. "The ambulance man will want to talk with him, he said. "And the TV people, soon. "Let's get out of here," Brad said. "All right," he said. "Now you're talking." Though it was only three or four blocks back to Adam's place, it took the better part of half an hour, relying on the back alleys and the dark to cover his retreat, hoping that the ambulance drivers and firefighters wouldn't catch him here. Having to lug Kurt made him especially suspect, and he didn't have a single good explanation for being caught toting around an unconscious punk in the dead of night. "Come on, Brent," Adam said. "Let's get home and put this one to bed and you and me have a nice chat." "You don't want me to call an ambulance?" Kurt startled at this and his head lolled back, one eye opened a crack. "No," Alan said. "No ambulances. No cops. No firemen. Just me and him. I'll make him better," he said. The smoke smell was terrible and pervaded everything, no matter which direction the wind blew from. Adam was nearly home when he realized that his place and his lover and everything he cared about in the entire world were *also* on fire, which couldn't possibly be a coincidence. # The flames licked his porch and the hot air had blown out two of the windows on the second story. The flames were lapping at the outside of the building, crawling over the inside walls. No coincidence. Kurt coughed hard, his chest spasming against Alan's back. Alan set him down, as in a dream. As in a dream, he picked his way through the flames on his porch and reached for the doorknob. It burned his hand. It was locked. His keys were in Kurt's door, all the way up Augusta. "Around the back," Bentley called, headed for the fence gate. Alan vaulted the porch rail, crashing though the wild grasses and ornamental scrub. "Come on," Bentley said. His hand throbbed with the burn. The back yard was still lit up like Christmas, all the lights ablaze, shining through the smoke, the ash of books swirling in it, buoyed aloft on hot currents, fragments of words chasing each other like clouds of gnats. "Alan," Kurt croaked. Somehow, he'd followed them back into the yard. "Alan." He held out his hand, which glowed blue-white. Alan looked closer. It was his PDA, stubby wireless card poking out of it. "I'm online. Look." Alan shook his head. "Not now." Mimi, somewhere up there was Mimi. "Look," Kurt croaked. He coughed again and went down to his knees. Arnos took the PDA in hand and peered at it. It was a familiar app, the traffic analysis app, the thing that monitored packet loss between the nodes. Lyman and Kurt had long since superimposed the logical network map over a physical map of the Market, using false-color overlays to show the degree to which the access points were well connected and firing on all cylinders. The map was painted in green, packets flying unimpeded throughout the empty nighttime Market. And there, approaching him, moving through the alleys toward his garage, a blob of interference, a slow, bobbing something that was scattering radio waves as it made its way toward him. Even on a three-inch screen, he recognized that walk. Davey. Not a coincidence, the fires. "Mimi!" he called. The back window was blown out, crystal slivers of glass all around him on the back lawn. "*Mimi!*" Billy was at his side, holding something. A knife. The knife. Serrated edge. Sharp. Cracked handle wound with knotted twine, but as he reached for it, it wasn't cracked. It was the under-the-pillow knife, the wings knife, Krishna's knife. "You forgot this," he said, taking the PDA. Then Davey was in the yard. He cocked his head and eyed the knife warily. "Where'd you get that?" he said. Adam shifted his grip for slashing, and took one step forward, stamping his foot down as he did it. Davey retreated a step, then took two steps forward. "He set the fires," Bentley said. "She's as good as dead. Cooked. Won't be long now, she'll be cooked." Darren looked at him for the first time. "Oh, yes," he said. "That's about right. I never found you, no matter how I looked. You don't get found if you don't want to." Brent shook his head. "He set the fire, he used gasoline. Up the stairs, so it would spread up every floor quickly." Aaron growled and lunged forward, slicing wildly, but Davey's scurry was surprising and fast and nimble. "You're going to stab me again, cut me again? What do you suppose that will get you?" "He's weaker than he was, then. We got six years, then. He's weaker. We'll get ten years. Twenty." Billy was hopping from foot to foot. "*Do it*." Alan sliced and stabbed again, and the knife's point caught Danny's little bandy leg, like cutting through a loaf of stale bread, and Danny gasped and hopped back another step. "He gave you the knife, didn't he? He gave you the knife last time. Last time, he took me to the school yard and showed me you and your girlfriend. He explained all about girlfriends to me and about what it would mean once our secret was out. He taught me the words, taught me to say *pervert*. Remember, Billy? Remember how you taught me?" Andrew hesitated. "He taught me the ritual with your thumbtip, how to make the little you, and then he took it away from me for safekeeping. He kept it in one of his rabbit cages, around on the other side of the mountain. It's not there now. Have you seen it? Does he still have it? "He never liked having a little brother, not me or the others, but he liked having that little thing around to torture." Billy hissed. "She'll be dead in minutes," he said. "In seconds. Another one dead. His doing! "Killed her, cut her up, buried her," Benny chanted. "Sliced her open and cut her up," he shrilled. Alan let the knife fall from his hands. Benny leapt for Danny, hands outstretched. Danny braced for the impact, rolled with him, and came up on top of him, small hands in Benny's eyes, grinding. There were sirens out front now, lots of sirens. A distant crash, and a rain of glass fell about his shoulders. He turned and looked up, looked up into the dormer window of his attic, four stories up. Mimi's head poked out from the window, wreathed in smoke, her face smudged and eyes screwed up. "Mimi!" he cried. She climbed unsteadily onto the windowsill, perched there for a moment. Then she leaned forward, ducked her head, and slipped into the sky. Her magnificent wings unfolded in the smoke, in the hot ash, in the smoldering remains of all of Alan's life in human society. Her magnificent wings unfolded and caught the air with a sound he heard and with a downdraft of warm air that blew his hair off his forehead like a lover's hand, smoky smell and spicy smell. She flew. The sirens grew louder and she swooped over the yard. She gave two powerful beats of her wings and rose higher than the roof, then she circled the yard in great loops, coming lower and lower with each pass. Davey and Benny watched her. Kurt watched her. Alan watched her. She was coming straight for him. He held out his arms and she fell into them, enfolding them both in her wings, her great and glorious wings. "Come on," she said. Kurt was already limping for the alley. Benny and David had already melted away. They were alone in the yard, and the sirens were so loud now, and there were the reflections of emergency lights bouncing off the smoke around them. "Come on," she said, and she put her arms around his waist, locking her wrists. It took five beats of her wings to get them aloft, and they barely cleared the fence, but they banked low over the alley and she beat her wings again and then they were gaining altitude, catching an updraft from the burning house on Wales Avenue, rising so high into the sky that he felt like they would fly to the moon. # The day that Lyman and Kurt were on the cover of NOW magazine, they dropped by Martian Signal to meet with Natalie's boss. Lyman carried the pitch package, color-matched, polyethnic, edgy and cool, with great copy. Natalie met them. She'd grown out her hair and wore it with bangs hanging over the scar on her forehead, just over her left eye, two punctures with little dents. Three surgeries had cleared all the bone fragments from the orbit of that eye, and she'd kept her sight. Once she was out of the hospital, she quickly became the best employee Martian Signal had ever had. She quickly became manager. She quickly undertook to make several improvements in the daily operations of the store that increased turnover by 30 percent. She slowly and reluctantly hired her brother, but his gimpy knee made it hard for him to bend down to reshelve, and he quickly quit. Kurt and Natalie hugged, and Lyman formally shook her hand, and then shook her boss's hand. It took less than an hour to convince her boss to let them put up their access point. On the way back, three different people stopped them and told them how much they liked the article, and swore that the first thing they'd do when they got home would be to open up their networks and rename them ParasiteNet. Lyman handled the thank-you's for this, and Kurt smiled and fiddled with his PDA and watched the sky, looking for a girl with wings as wide as a house. # I went to the house, (she said, as he tended the fire, turning the yams in the coals and stirring the pot in which his fish stew bubbled) I went to the house, (she said, resting up from the long flight she'd flown from Toronto to Craig's distant, warm shores, far away from Kensington Market and Krishna and Billy and Danny) I went to the house, (she said, and Andy worked hard to keep the grin off his face, for he'd been miserable during her long absence and now he could scarcely contain his delight) I went to the house, and there was no one home. I had the address you'd given me, and it was just like you'd described it to me, down to the basketball hoop in the driveway. It was empty. But it was as I'd remembered it. They'd lived there. I'd lived there. You were right, that was the house. That was the house I'd lived in. I rang the doorbell, then I peeked in through a crack in the blinds. The rooms were empty. No furniture. Just blinds. It was night, and no one was looking, so I flew up to the third floor, to the window I'd stared out all those times. The window was unlatched, and I slid aside the screen and let myself in. The room was empty. No carpet. No frilly bed and stuffed animals. No desk. No clothes in the closet, no hangers. The only thing in the room was a small box, plugged into the wall, with a network cable snaking away into the phone jack. It had small lights on it, blinking. It was like the one you'd had in your attic. A wireless access point. I remembered their names, then. Oliver and Patricia. They'd been my mother and father for a few years. Set me up with my first apartment. This had been their house. I slept there that day, then, come nightfall, I set out again to come home to you. # Something woke Andy from his sound sleep, nestled in her wings, in her arms. A tread on Craig's inviolable soil, someone afoot on his brother. Slowly, he got himself loose of Mimi and sat up and looked around. The golem standing before him was small, and its eyes glowed red. It bent over and set something down on the earth, a fur-wrapped bundle of smoked meat. It nodded at him. He nodded back. "Thank you," he said. Mimi put her hand on his calf. "Is it okay?" "It's right," he said. "Just as it was meant to be." He returned to her arms and they kissed. "No falling in love," she said. "Perish the thought," he said. She bit his lip and he bit hers and they kissed again, and then he was asleep, and at peace. === Bio === Canadian-born Cory Doctorow (craphound.com) is the European Affairs coordinator for the Electronic Frontier Foundation (eff.org). He is the coeditor of the popular weblog Boing Boing -- boingboing.net -- with millions of visitors every month. He won the John W. Campbell Award for Best New Writer at the 2000 Hugo awards and his novel Down and Out in the Magic Kingdom (http://craphound.com/down/) won the Locus Award for Best First Novel the same year that his short story collection A Place So Foreign and Eight More (http://craphound.com/place/) won the Sunburst Award for best Canadian science fiction book. His other books include Eastern Standard Tribe (http://craphound.com/est/) and Rapture of the Nerds (with Charles Stross). Join my mailing list for infrequent notices of books, articles, stories and appearances. http://www.ctyme.com/mailman/listinfo/doctorow ========================= Machine-readable metadata ========================= Someone Comes to Town, Someone Leaves Town 2005-7-1 A novel by Cory Doctorow Cory Doctorow Cory Doctorow eof 80 ---- Institute for Scientific Information (ISI). Then we entered our search term: "LIVER AND CYST/". The search word "CYST/" signified that "cyst" should match any words starting with these four characters. While searching, IQuest gave the following progress report: Scanning BRS databases. Accessing Network...........Completed. Accessing Database Host.....Completed. Logging on..................Completed. Logging on (second step)....Completed. Selecting Databases.........Completed. Each period equals one line of scanned data. This may take several minutes................................ It continued in the same way with a "Scanning Dialog databases." When the search results were presented, we glanced quickly at the article abstracts, ordered two articles to be sent us by mail and typed BYE. CompuServe reported "Off at 09:12 EST 17-Nov-88 Connect time = 0:35." The two articles arrived Norway by mail a few weeks later. The whole trip, including visits in medical forums, took 35 minutes. The cost, including local telephone and network charges, was US$95. Of this total cost, the extra cost of searching through IQuest amounted to US$54.00. We all felt that the costs were well justified. | A note about the costs: The online tour was done manually, | | using full menus. We discussed our search strategy while | | connected, which is more expensive than logging off to plan | | the next moves. Also, note that the extra cost of searching | | IQuest ($54) was not time dependent. | Right now? I have promised to donate one kidney to my wife when the time comes. This has prompted me (1993) to join a mailing list for "Organ transplant recipients and anyone else interested in the issues" (TRNSPLNT@WUVMD.BITNET). Cancer ------ FidoNet has the forum CARCINOMA (Cancer Survivors). BITNET has the discussion lists CANCER-L@WVNVM and CLAN (Cancer Liaison and Action Network on CLAN@FRMOP11). CompuServe has a Cancer Forum. NewsNet offers the newsletter CANCER RESEARCHER WEEKLY. In September 1992, the following message was posted on CANCER- L by a member from Brazil: "A close friend was just diagnosed with acute leukemia of a type called calapositive pre-B linphoplastic. It is supposedly an early diagnosis since he is not anemic. We are very shocked but he is reacting quite bravely and all he wants is to have access to literature on his condition. Are there any new genetic engineering developments effectively clinically available? What is the present state of knowledge regarding this specific form of leukemia? He was diagnosed three hours ago, is 48 yrs old, and will start chemotherapy tomorrow. He was informed that chemotherapy is quite effective in this type of leukemia. But we wonder if there isn't a possibility to use gene therapy. Any help will be greatly appreciated. - Dora." There were several helpful replies. This came from a member in the United States: "In response to the request for information on treatment for leukemia, I recommend that you access CancerNet, the National Cancer Institute's mail server on the Internet which provides current information on treatment for leukemia. To request the Contents List and Instructions, send a mail message to cancernet@icicb.nci.nih.gov (Internet address) cancernet%icicb.nci.nih.gov@nihcu ( BITNET) Leave the subject line blank, and in the body of the mail message, enter "HELP". When you receive the Contents list, request the statement for Adult Acute Lymphocytic Leukemia (cn-101024). There are also News and General Information items, under the Heading PDQ Database Information in the Contents List which provide information on centers which have access to Physician Data Query, NCI's database of cancer treatment information which includes clinical trials information for leukemia. - Cheryl." CancerNet is the U.S. National Cancer Institute's international information center. It is a quick and easy way to obtain, through electronic mail, recommended treatment guidelines from the National Cancer Institute's Physician Data Query system. To access CancerNet, send email to: cancernet@icicb.nci.nih.gov Leave the subject line blank. In the body of the mail message, enter HELP to receive instructions and the current contents list. The National Cancer Center in Tokyo Japan has a gopher service at gopher.ncc.go.jp. The World Health Organization (WHO) has one at gopher.who.ch. Disabilities ------------ Bulletin boards and online conferences give equal access to all persons. Everybody is treated the same way, regardless if they sit in a wheel chair, have a hearing impairment, stutter, cannot speak clearly, have difficulties in thinking or acting quickly, or just have a different looks. You need not worry about typing errors. Those who read them will never know whether it's because you never learned how to write on a computer, or if it is because you have difficulties in controlling your movements. You alone decide if others are to know about your personal disability. If you want it to be a secret, then it will remain a secret. Nobody can possibly know that you are mute and lame from the neck and down, that computer communication is your main gate into the outer world, and that you are writing messages with a stick attached to your forehead. Therefore, the online world has changed the lives of many people with disabilities. Computer communications have opened a new world for those who are forced to stay at home, or thinks that it is too difficult to travel. Those who can easily drive their car to the library, often have difficulties in understanding the significance of this. Usenet has alt.education.disabled and misc.handicap. It covers all areas of disabilities, technical, medical, educational, legal, etc. UUCP has handicap. It is presented in the following words: Contact: wtm@bunker.shel.isc-br.com Purpose: The Handicap Digest provides an information/discussion exchange for issues dealing with the physically/mentally handicapped. Topics include, but are not limited to: medical, education, legal, technological aids and the handicapped in society. CompuServe's Disabilities Forum has the following sections: General Interest, Develop. Disabilities, Emotional Disturbances, Hearing Impairments, Learning Disabilities, Vision Impairments, Mobility Impaired, Rights/Legislation, Education/Employment and Family Life/Leisure. AUTISM@SJUVM.BITNET is devoted to the developmentally disabled, their teachers, and those interested in this area. The list BLIND- L@UAFSYSB.BITNET focuses on "Computer Use by and for the Blind." COMMDIS@RPIECS.BITNET is a mailing list discussing "Speech disorders." DEAF-L@SIUCVMB.BITNET is the "Deaf Discussion List," and DEAFBLND@UKCC.UKY.EDU the "Deaf-Blind Discussion List." STUT-HLP (LISTSERV@BGU.EDU) is a support forum for people who stutter and their families. On L-HCAP@NDSUVM1.BITNET, the focus is on Technology for the handicapped. BACKS-L@UVMVM.BITNET discusses research on low back pain disability. The Handicap Digest is an electronic mail only digest of articles relating to all types of issues affecting the handicapped. The articles are taken from the Usenet newsgroup, the Handicap News. (misc.handicap) and various FidoNet conferences such as ABLED, BlinkTalk SilentTalk, Chronic Pain, Spinal Injury, Rare Conditions, and several others. Subscribe by email to wtm@bunker.shel.isc-br.com Handicap.shel.isc-br.com (129.189.4.184) is the email address to an anonymous ftp site that has disability-related files and programs. The disk has some 40 directories with 500 or so files covering all types of disabilities. (This service can be used through FTPMail. See chapter 12 about how to do this.) Getting old ----------- BITNET has the "BIOSCI Ageing Bulletin Board" on AGEING@IRLEARN . Usenet has bionet.molbio.ageing, while CompuServe's Issues Forum has a message section called "Seniors." Ageline on Dialog is a database produced by the American Association of Retired Persons. It does an excellent job covering research about older persons, particularly on consumer issues and health care, by summarizing journal articles and the contents of other published reports. While our "face-to-face" world sometimes makes it difficult for older people to participate in discussions between young people, this is not so in the Online World. All people are treated the same way. It is impossible for others to know your age, unless someone tells them. Holistic Healing and Health --------------------------- HOLISTIC on LISTSERV@SIUCVMB.SIU.EDU is dedicated to "providing information and discussion on holistic concepts and methods of living which provide a natural way of dealing with the challenges of life." Here are some topics dealt with in this forum: Various Dimensions of Holistic Healing and Health States of Consciousness Meditation and the role it plays in spiritual/physical health The impact of a healthy diet - including Herbs and Vitamins Bodywork - such as Rolfing, Trager bodywork, Reichian, etc. Acupuncture/pressure Hypnosis and Biofeedback Visualizations and Affirmations Spiritual Healing - Psychic healing methods Bioenergetics The holistic connection between mind and body Honest discussion of topics relevant to personal/spiritual growth - And anything else within context for the betterment of the world. The following message is typical: From: Helen Subject: Re: Asthma and Sinus Problems To: Multiple recipients of list HOLISTIC My condolences to fellow people allergic to cats. Cats and strawberries are two of the most allergenic substances. Behavorial changes have proven to be EVERYTHING to me. The techniques I've employed have helped many others. First, try sleeping at a 45 degree angle. This usually requires piling up pillows. The elevation of the head facilitates drainage from the sinuses. When the situation gets really bad, I've slept sitting up on a couch or arm chair propped up by numerous pillows and cushions. This technique can take some getting used to, but, it works like a charm and is kinder to your system than drug therapy. Second, try "ephedra" tea. This is an herb found in Chinese herb shops. Ask the herbalist how to prepare it. I highly recommend the book "Natural Health, Natural Medicine" by Andrew Weil, M.D. of U of A Med School in Tucson. See pages 253-256 for more information on asthma. Fourth, stay hydrated. This means not only drinking PLENTY of fluids, but humidifying the house (that is if you're not also allergic to molds). Basic behavorial techniques are important....diet, exercise, etc. etc, ...but this is the holistic network...I'm preaching to the choir... Finally, take heart! Being allergic to cats is not well received by cat lovers...often we're cat lovers ourselves. Depending on the breed of cat, there is a good chance you will eventually habituate to those you are around over the long term. Good luck, the advice about sleeping with your head significantly elevated is the best I have ever given out to fellow sinus problem sufferers. It really works!! Helen. HomeoNet, a service of the Institute of Global Communications (IGC), is for those interested in homeopathic medicine. List of health science resources -------------------------------- The Bitnet/Internet online list of health science resources is available by email from: LISTSERV@TEMPLEVM.BITNET . Send the following command: GET MEDICAL RSCRS This will give a long list of BITNET, Internet, and Usenet forums, data archives, electronic newsletters and journals devoted to health science. Here are some examples from the list that may be of interest to people not working in the health profession: * ALCOHOL@LMUACAD.BITNET - a discussion list for Alcohol and Drug Studies, * BEHAVIOR@ASUACAD.BITNET - Behavioral and Emotional Disorders in Children, * DIABETIC@PCCVM.BITNET is the "Open Discussion forum for DIABETIC patient counseling," * DIARRHOE@SEARN.BITNET (or DIARRHOE@SEARN.SUNET.SE through the Internet) is a forum for information exchange and discussions on all aspects related to diseases, disorders, and chemicals that cause diarrhoea in humans and animals, * DIET@INDYCMS.BITNET - Support and Discussion of Weight Loss * DRUGABUS@UMAB.BITNET - Drug Abuse Education Information and Research, * FAMCOMM@RPIECS.BITNET - Marital/family & relational communication. * FIT-L@ETSUADMN.BITNET - Wellness, Exercise, Diet, for exchanging ideas, tips and any type of information about wellness, exercise, and diet. * GRANOLA@BROWNVM.BITNET - Vegetarian Discussion. * HERB@TREARN.BITNET - Medicinal and Aromatic Plants discussion. * MSLIST-L@NCSUVM.BITNET - Multiple Sclerosis Discussion and Support. * RZAMAL-L@DKAUNI11.BITNET - Dental Amalgam Fillings and chronic mercury poisoning. * SPORTPSY@TEMPLEVM.BITNET - Exercise and Sports Psychology. * talk.abortion on Usenet. These mailing lists usually let you search old messages for topics of interest. They are both living discussion forums and interesting searchable databases! Mednews is a weekly electronic newsletter. Its columns bring regular medical news summaries from USA Today, Center for Disease Control MMWR, weekly AIDS Statistics from CDC, and more. Send the following command to LISTSERV@ASUACAD.BITNET to subscribe: SUB MEDNEWS Your-first-name Your-last-name Chapter 7: Electronic mail, telex, and fax ========================================== Electronic mail is one of the most popular online services. People living thousands of miles apart can exchange messages and documents very quickly. International Resource Development, Inc., an American research organization, claimed (1992) that we can send electronic mail to more than 10 million personal mailboxes. We believe the figure to be much higher. The Matrix News (Texas, U.S.A.) claims the number is over 18 million (March 1993). The Boardwatch Magazine (U.S.A.) believes that new callers are coming online for their first time at a rate of close to 10,000 per day (January 1993). Electronic Mail & Micro Systems (New Canaan, Conn., U.S.A.) estimated an average of 27.8 million messages sent per month in 1990. Mail through the Internet and grassroots services on free bulletin boards (like FidoNet) is not included in their figure. The annual rate of increase in the number of messages is over 30% and increasing. If a given email service charges you US$30 per hour, it will cost you a meager US$0.075 to send one typewritten letter (size A- 4, or around 2,200 characters). See chapter 15 for a breakdown of this cost. If you live in Norway, and send the letter by ordinary mail to a recipient in Norway, postage alone is US$0.53 (1992). The cost is seven times higher than using email. To send the same letter from Norway to the United States by ordinary mail will cost 11 times more. This letter takes several days to reach the destination, while email messages arrive almost instantly. Often, you can send email messages to several recipients in one operation - without paying extra for the pleasure. Compare this to sending to several parties by fax! You do not have to buy envelopes and stamps, fold the sheet, put it into the envelope, and bring it to a mailbox. Just let the computer call your favorite email service to send the letter. The recipient does not have to sit by the computer waiting for your mail. Upon receipt, it will be automatically stored in his mailbox. He can read it when he has time. The recipient can print it locally, and it will be a perfect document, no different to one typed in locally. He can also make corrections or comments, and email onwards to a third party. In this way several people can work jointly on a report, and no time is it re-typed from scratch. When you receive several messages in the morning, you can very quickly create replies to them one at the time at your keyboard, and then send them in one go. No need to feed five different pieces of paper into a fax machine or envelopes for five different people. Where you can find a telephone, you can also read mail. In most countries, communicating through email is easy and economical. By the way, the simple but miraculous thing about email is that you can quote easily and exactly the point to which you are replying. This is a revolution in communication, no? How to send email? ------------------- This is what it normally takes for a CompuServe user to send me a message: Type GO MAIL to get to the "post office," and then type COMPOSE. "Start writing," says CompuServe. Type your message manually, or send a file (text or binary). Type /EXIT when done. "To whom?" asks CompuServe. You enter: "Odd de Presno 75755,1327," or just my mailbox number (75755,1327). CompuServe asks you to enter Subject. You type: "Hello, my friend!" Your message has been sent. A few seconds later, the message will arrive in my mailbox. If I am online to CompuServe at the moment, I will probably read it right away. If not, it will stay there until I get around to fetch it. Above, we used the term "normally takes to send." Please note that many users never ever TYPE these commands! They use various types of automatic software to handle the mechanics of sending and receiving mail (see Chapter 16). Other systems require different commands to send email. Ulrik at the University of Oslo (Norway) is a Unix system. So is The Well in San Francisco. On such systems, mail is normally sent using these commands: Type "mail opresno@extern.uio.no". When the computer asks for "Subject:," enter "Hello, my friend!" Type your message or send it. When done, enter a period (.) in the beginning of a line. Ulrik will reply with "Cc:" to allow you to 'carbon copy' the message to other people. If you don't want that, press ENTER and the message is on its way. While I wrote this book, I had to go to Japan. A simple command allowed me to redirect all incoming mail to CompuServe. As a result I could read and send mail by calling a local CompuServe number in several Japanese cities. Though the commands for sending email differ between systems, the principle is the same. All systems will ask you for an address and the text of your message. On some, the address is a code, on others a name (like ODD DE PRESNO). Most systems will ask for a Subject title. Many will allow you to send copies of the message to other recipients (Cc:). Some services allow you to send binary files as email. Binary files contain codes based on the binary numeration system. Such codes are used in computer programs, graphics pictures, compressed spreadsheets and text files, and sound files. Many online services let you send messages as fax (to over 15 million fax machines), telex (to over 1.8 million telex machines), and as ordinary paper mail. We have tested this successfully on CompuServe, MCI Mail and other services. On CompuServe, replace "Odd de Presno 75755,1327" with ">FAX: 4737027111". My fax number is +47 370 27111. On MCI Mail type "CREATE:". MCI asks for "To:," and you type "Odd de Presno (Fax)". MCI asks for "Country:". You enter "Norway". By "RECIPIENT FAX NO" enter "37027111" (the code for international calls). The country code for Norway, 01147, is added automatically. By "Options?," press ENTER. When MCI Mail asks for more recipients, press ENTER. Type your message and have it sent. To send a telex, you'll need the recipient's telex number, an answerback code, and the code of the recipient's country. If the message is meant for telex number 871161147, answerback ZETO, and country Russia (country code SU), enter ">TLX:871161147 ZETO SU" when sending from CompuServe. By entering ">POSTAL", CompuServe will send your mail to a business associate in California or Brazil as a professional laser- printed letter. It will take you through the process of filling out the various address lines. The letter may well arrive faster than through ordinary mail. When the recipient is using another mailbox system -------------------------------------------------- When the recipient is using your mailbox service, writing addresses is simple. Not so when your email has to be forwarded to mailboxes on other online services. The inter-system email address consists of a user name, a mailbox system code, and sometimes also routing information. The problem is that there is no universal addressing format. Finding out how to write a given address may be surprisingly difficult. Some services are not set up for exchange of email with other services. This is the case with my bulletin board, the Saltrod Horror Show. To send mail to a user of this system, you'll have to call it directly and enter it there. This bulletin board is not connected to the outside world for exchange of mail. If your favorite system lets you send mail to other services, make a note about the following: * You need to know the exact address of your recipient, and whether he's using this mailbox regularly. Many users have mailboxes that they use rarely or never. For example, don't try to send mail to my mailbox on Dow Jones/News Retrieval. I only use this service sporadically. Think of the easiest way for a recipient to respond before sending a message to him or her. * You need to know how to rewrite the recipient's address to fit your system. For example, you may have to use a domain address to send through Internet, and a different form when sending through an X.400 network. (More about this later.) * The recipient's mailbox system may be connected to a network that does not have a mail exchange agreement with your system's network(s). Sometimes, you can use a commercial mail relay service to get your message across (see chapter 9). Users of the Internet can send messages to recipients on the Dialcom network through the DASnet relay service. * Sometimes, you need to know how to route a message through other systems to arrive at its destination. For example, a message sent from the Ulrik computer in Oslo must be routed through a center in London to get to Dominique Christian on the Difer system in Paris (France), Internet -------- is the name of a computer network (here called "INTERNET"), and a term used of a global web of systems and networks that can exchange mail with each other (here called "Internet"). INTERNET is a very large network that has grown out of ARPANET, MILNET, and other American networks for research and education. This core network has many gateways to other systems, and it's when we include these systems and their connections that we call it the Internet. Others call it WorldNet or the Matrix. Internet users can exchange mail with users on networks like EUnet, JANET, Uninett, BITNET, UUCP, CompuServe, MCI Mail, EcoNet, PeaceNet, ConflicNet, GreenNet, Web, Pegasus, AppleLink, Alternex, Nicarao, FredsNaetet, UUNET, PSI, Usenet, FidoNet and many others. We therefore say that these networks are also "on the Internet." If you have access to the Internet, you can send email to users of online services all over the world. You can send to people using Bergen By Byte and Telemax in Norway, TWICS in Tokyo, and Colnet in Buenos Aires. Now is the time to take a closer look at the art of addressing mail through the Internet. Domain name addressing ---------------------- On the Internet, the general form of a person's email address is: user-name@somewhere.domain My main, international Internet mailbox address is: opresno@extern.uio.no You read the address from left to right. First, the local name of the mailbox (my name abbreviated). Next, the name of the mailbox system or another identification code (in this case EXTERN, to show that I have no affiliation with the University), the name of the institution or company (here UIO or "Universitetet i Oslo"), and finally the country (NO for Norway). People have sent mail to my mailbox from New Zealand, Zimbabwe, Guatemala, Peru, India, China, Greece, Iceland, and Armenia using this address. Some users must send their messages through a gateway to the Internet. In these cases, the address may have to be changed to reflect this: Users of AppleLink use opresno@extern.uio.no@INTERNET# . Those on JANET use opresno%extern.uio.no@eanrelay.ac.uk. On SprintMail, use ("RFC-822": , SITE:INTERNET) . CompuServe subscribers use >INTERNET:opresno@extern.uio.no . The core of these address formats is "opresno@extern.uio.no", in one way or the other. We call this basic addressing format a Domain Naming System. "EXTERN.UIO.NO" is a domain. The domain may also contain reference to the name of a company or an organization, like in twics.co.jp, compuserve.com, or IGC.ORG. The CO, COM, and ORG codes identify TWICS, CompuServe and IGC as companies/organizations. To send mail from the Internet to my CompuServe mailbox, use: 75755.1327@compuserve.com Normally (except on AppleLink), a domain address can only contain one @-character. When an address has to be extended with gateway routing information, replace all @-characters to the LEFT in the address by %-characters. Here is an example: BITNET uses a different addressing method (USER@SYSTEM). Let's assume that you are subscribed to the club for lovers of Japanese food (J-FOOD-L@JPNKNU10.BITNET, see chapter 6). You have a mailbox on INTERNET, and want to send a recipe to the other members using the address J-FOOD-L. On some Internet systems, you can simply use the address: J-FOOD-L@JPNKNU10.BITNET , and your mailbox system will take care of the routing for you. If this addressing method doesn't work, you can use different gateways into BITNET depending on where you live. The preferred method is to route through a gateway near to you. If living in North America, you may route CUNYVM.CUNY.EDU using the following address: J-FOOD-L%JPNKNU10.BITNET@CUNYVM.CUNY.EDU The rightmost @ in this address is maintained. The one to the LEFT has been replaced with a %. The term ".BITNET" tells the gateway machine where to forward the message. The following will happen: First, the message will be sent to system CUNYVM at the EDUcation site CUNY. CUNYVM investigates the address, and discovers that the message is for BITNET. It cuts off all text to the right of "JPNKNU10," and replaces the % with an @. The message is forwarded to the mailbox J-FOOD-L on the BITNET system JPNKNU10 at the Kinki University in Japan. Bang addressing --------------- "Bang" is American for "exclamation point" (!). The UUCP network uses this variation of the domain addressing scheme. Example: User Jill Small on Econet in San Francisco used to have the address pyramid!cdp!jsmall . Read this address from right to left. The name of her mailbox is to the right. The name of the organization is in the middle. "Pyramid" is the name of the network. Some email systems can use bang addresses directly. (Note that the ! character has a special function on Unix computers. Here, you may have to type the address as pyramid\!cdp\!jsmall to avoid unwanted error messages. The \ character tells Unix to regard the next character as a character, and not as a system command. This character may also have to precede other special characters.) Other systems do not accept bang addresses directly. Here, the users must send such messages through a gateway. The American host UUNET is a frequently used gateway. If routing through UUNET, you may write the address like this: pyramid!cdp!jsmall@uunet.uu.net If your system absolutely refuses to accept exclamation points in addresses, try to turn the address into a typical Internet address. Write the address elements in the Internet sequence (left to right). Replace the exclamation points with %-s, like this: jsmall%cdp%pyramid@uunet.uu.net This method works most of the time. When it works, use this addressing form. Bang paths may fail if an intermediate site in the path happens to be down. (There is a trend for UUCP sites to register Internet domain names. This helps alleviate the problem of path failures.) Some messages must be routed through many gateways to reach their destination. This is the longest address that I have used, and it did work: hpda!hplabs!hpscdc!hp-lsd.cos.hp.com!oldcolo!dave@uunet.uu.net It used to be the Internet address of a user in Colorado, U.S.A.. Today, he can be reached using a much shorter address. If you are on UUCP/EUnet, you may use the following address to send email to Odd de Presno: extern.uio.no!opresno. Addressing international electronic mail sometimes looks like black magic. To learn more, read some of the books listed in appendix 5. We have found "The Matrix" by John S. Quarterman to be particularly useful. The conference INFONETS (General network forum) is another source. Here, the INTERNET postmasters discuss their addressing problems. Activity is high, and you will learn a lot about the noble art of addressing. (This is not the place to ask for Olav Janssen's Norwegian email address, though. This question should be sent to a Norwegian postmaster.) You can subscribe to Infonets by sending the following mail: To: LISTSERV@NDSUVM1.BITNET Subject: (You can write anything here. It will be ignored.) TEXT: SUB INFONETS Your-first-name Your-last-name If your mailbox is on another network, alter the address to route your subscription correctly to this LISTSERV. | Hint: You can search the database of old INFONETS messages by | | email to LISTSERV@DEARN.BITNET. See "Directories of services | | and subscribers" below for information about how to search | | LISTSERV databases. | While the global matrix of networks grows rapidly, it is still behind in some lesser-developed nations and poorer parts of developed nations. If interested in these parts of the world, check out GNET, a library and a journal for documents about the efforts to bring the net to lesser-developed nations. Archived documents are available by anonymous ftp from the directory global_net at dhvx20.csudh.edu (155.135.1.1). Chapter 12 has information on how to use FTP if you only have mail access to the Internet. To subscribe to a conference discussing these documents, send a request to gnet_request@dhvx20.csudh.edu. cc:Mail gateways ---------------- Many Local Area Networks have been connected to the global Matrix of networks. CompuServe offers a cc:Mail gateway. Lotus cc:Mail is a PC Lan based email system used in corporate, government and other organizations. When sending from CompuServe Mail to a cc:Mail user through this gateway, a typical address may look like this: >mhs:pt-support@performa To send to this user from the Internet through CompuServe's MHS gateway, write the address like this: pt-support@performa.mhs.compuserve.com Other vendors of LAN gateways use other addressing methods. X.400 addressing ---------------- X.400 is a standard for electronic mail developed by CCITT. It is used on large networks like AT&T Mail, MCI Mail, Sprintnet, GE Information System, Dialcom, and Western Union, and on other public and private networks throughout the world. EDI (Electronic Data Interchange) uses X.400 as a transport mechanism for coordination of electronic part ordering, stock control and payment. X.400 is used to connect EDI systems between companies and suppliers. The X.400 addressing syntax is very different from domain addressing. To send a message from an X.400 mailbox to my address (opresno@extern.uio.no), you may have to write it like this: (C:NO,ADMD:uninett,PRMD:uninett,O:uio,OU:extern,S:opresno) Alas, it's not so standard as the domain addressing schemes. On other X.400 networks, the address must be written in one of the following formats - or in yet other ways: (C:US,A:Telemail,P:Internet,"RFC-822":) ("RFC-822": , SITE:INTERNET) '(C:USA,A:TELEMAIL,P:INTERNET,"RFC-822":extern.uio.no>) DEL' (site: INTERNET,ID: extern.uio.no>) "RFC-822=opresno(a)extern.uio.no @ GATEWAY]INTERNET/TELEMAIL/US" To send an Internet message to a mailbox I once had on the X.400 host Telemax in Norway, I had to use the following address: /I=D/G=ODD/S=PRESNO/O=KUD.DATASEKR/@PCMAX.telemax.no To send from Internet to Telemail in the US, I have used this address: /PN=TELEMAIL.T.SUPPORT/O=TELENET.MAIL/ADMD=TELEMAIL/C=US/@sprint.com If you need to route your message through gateways, then complexity increases. One Norwegian UUCP user had to use the following address to get through: nuug!extern.uio.no!"pcmax.telemax.no!/I=D/G=ODD/S=PRESNO/O=KUD.DATASEKR/" To send a message from an X.400 system to my CompuServe mailbox, I have used the following address elements: Country = US ADMD = CompuServe PRMD = CSMail DDA = 75755.1327 The addressing methods used on X.400 systems vary. Another example: Some use the code C:USA rather than the ISO country code C:US. MCI Mail uses C:NORWAY, C:USA, and C:SWEDEN. Here are some important X.400 codes: C the ISO country code (on most services) ADMD domain code for public system (abbreviation A) PRMD domain code for connected private system (abbreviation P) O organization name OU organization unit S surname (last name) G given name (first name) I initials (in the name) DDA domain-defined attributes, keywords defined and used by the individual systems to specify mailboxes (user name, list, station, user code, etc.), direct delivery devices (attention name, telex addresses, facsimile, etc.) PN personal name (a) the character @ cannot be used when routing messages from X.400 to Internet. Try (a) instead. (p) the character % cannot be used when routing messages from X.400 to Internet. Try (p) instead. (b) the character ! (used in "bang" addresses). (q) the character " used in email addresses. RFC-822 this code tells X.400 that an Internet domain address follows. Does not work on all X.400 systems. Returned mail ------------- When an email address is incorrect in some way (the system's name is wrong, the domain doesn't exist, whatever), the mail system will bounce the message back to the sender. The returned message will include the reason for the bounce. A common error is addressing mail to an account name that doesn't exist. Let's make an error when sending to LISTSERV@vm1.nodak.edu. Enter "pistserv@vm1.nodak.edu" instead of "LISTSERV@vm1.nodak.edu". This address is wrong. Below, we've printed the complete bounced message. It contains a lot of technical information. Most lines have no interest. Also, the message is much larger than the original message, which contained three lines only. When browsing the bounced message, note that it has three distinct parts: (1) The mail header of the bounced message itself (here, the 13 first lines), (2) The text of the error report (from line 14 until the line "Original message follows:"), and (3) the mailer header and text of your original message (as received by computer reporting the error): From MAILER@VM1.NoDak.EDU Fri Dec 18 12:54:03 1992 Return-Path: Received: from vm1.NoDak.edu by pat.uio.no with SMTP (PP) id <07610-0@pat.uio.no>; Fri, 18 Dec 1992 12:53:54 +0100 Received: from NDSUVM1.BITNET by VM1.NoDak.EDU (IBM VM SMTP V2R2) with BSMTP id 9295; Fri, 18 Dec 92 05:53:27 CST Received: from NDSUVM1.BITNET by NDSUVM1.BITNET (Mailer R2.07) with BSMTP id 3309; Fri, 18 Dec 92 05:53:26 CST Date: Fri, 18 Dec 92 05:53:26 CST From: Network Mailer To: opresno@extern.uio.no Subject: mail delivery error Status: R Batch SMTP transaction log follows: 220 NDSUVM1.BITNET Columbia MAILER R2.07 BSMTP service ready. 050 HELO NDSUVM1 250 NDSUVM1.BITNET Hello NDSUVM1 050 MAIL FROM: 250 ... sender OK. 050 RCPT TO: 250 ... recipient OK. 050 DATA 354 Start mail input. End with . 554-Mail not delivered to some or all recipients: 554 No such local user: PISTSERV 050 QUIT 221 NDSUVM1.BITNET Columbia MAILER BSMTP service done. Original message follows: Received: from NDSUVM1 by NDSUVM1.BITNET (Mailer R2.07) with BSMTP id 3308; Fri, 18 Dec 92 05:53:25 CST Received: from pat.uio.no by VM1.NoDak.EDU (IBM VM SMTP V2R2) with TCP; Fri, 18 Dec 92 05:53:23 CST Received: from ulrik.uio.no by pat.uio.no with local-SMTP (PP) id <07590-0@pat.uio.no>; Fri, 18 Dec 1992 12:53:24 +0100 Received: by ulrik.uio.no ; Fri, 18 Dec 1992 12:53:18 +0100 Date: Fri, 18 Dec 1992 12:53:18 +0100 From: opresno@extern.uio.no Message-Id: <9212181153.AAulrik20516@ulrik.uio.no> To: pistserv@vm1.nodak.edu Subject: test index kidlink The first part of the bounced message is usually of no interest. Hidden in the second part you'll find the following interesting line: 554 No such local user: PISTSERV Ah, a typo! If your original message was long, you're likely to be pleased by having the complete text returned in the third part of the bounced message. Now, you may get away with a quick cut and paste, before resending it to the corrected address. The text and codes used in bounced messages vary depending on what type of mailbox system you're using, and the type of system that is bouncing your mail. Above, MAILER@VM1.NoDak.EDU returned the full text of my bounced mail. Some systems just send the beginning of your original text, while others (in particular some X.400 systems) send nothing but a note telling you the reason for the bounce. | Note: When you fail to understand why a message is being | | bounced, contact your local postmaster for help. Send him | | a copy of the complete text of the bounced message up to | | and including the line "Subject:" at the bottom. | | You do not have to send him the text of your original | | message! | Replying to an Internet message ------------------------------- On the Internet, electronic messages have a common structure that is common across the network. On some systems, you can reply by using a reply command. If this feature is not available, use the sender's address as given in the mail header. The bounced message contained two mail headers: the header of my original message (in part three), and the header of the bounced message (in part one). The 'good' reply address is laid out in the 'From:' header. Thus, this message contains the following two 'good' addresses: From: Network Mailer From: opresno@extern.uio.no The Network Mailer located the second address line above in my original message, and used this address when sending the bounced message. (Note: there is no point in sending a message back to MAILER@VM1.NoDak.EDU since this is the address of an automatic mail handling program. Write to Postmaster@VM1.NoDak.EDU to talk to a "real person" at this computer center.) The exact order of a message's header may vary from system to system, but it will always contain the vital 'From:' line. | Note: Exercise caution when replying to a message sent by | | a mailing list. If you wish to respond to the author only, | | make sure that the only address you're replying to is that | | person's. Don't send it to the entire list! | Directories of services and subscribers --------------------------------------- There is no complete global directory of available electronic addresses. On many systems, however, you can search lists of local users. | Normally, you'd be better off by calling the recipient for | | his or her email address. | Sometimes, the information given you by the recipient is not enough. Maybe the address needs an extension for the message to be routed through gateways to the destination. Another typical problem is that the syntax of the address is wrong. Perhaps you made a mistake, when you wrote it down (KIDCAFE became KIDSCAFE). The return address in the received messages' mailer headers may be wrong. It may use a syntax that is illegal on you email system, or it may suggest a routing that is unknown to your system. When trying to send mail to this address, the Mailer-Daemon complains: "This is a non-existent address." Again, the first person to contact for help is your local postmaster. On most Internet hosts this is simple. If you have a mailbox on the ULRIK computer at the University of Oslo, send a request for help to postmaster@ulrik.uio.no . If you are on COLNET in Buenos Aires, send to postmaster@colnetr.edu.ar . POSTMASTER is also the address to turn to on BITNET. Users of FidoNet or RelayNet, should write to SYSOP. It may not be that simple to locate the postmaster on UUCP. The postmaster ID may exist on some systems, but often he's just a name or a user code. You can get the email address of known Internet systems by sending a message to SERVICE@NIC.DDN.MIL . In the subject of the message, write the command WHOIS host-machine-name. Do not write anything in the text (will be ignored). You will get a report of the desired mailbox computer, and the address of the local postmaster. Example: To: SERVICE@NIC.DDN.MIL Subject: WHOIS AERO.ORG Text: Sometimes, you just don't know the name of a recipient's mailbox computer. When this is the case, start at the "top of the pyramid." Say your desired recipient lives in Germany. The ISO country code for Germany is DE (see appendix 6). Send the message To: SERVICE@NIC.DDN.MIL Subject: WHOIS DOMAIN DE Text: This will give you the email addresses of the main postmasters for this country. Most postmasters are willing to help, but please note that most of them are very busy people. It may take days before they get around to respond to your inquiry. There are over 100 other "whois-servers" in more than 15 countries. The systems whois.nic.ad.jp and whois.ripe.net cover Japan and Europe. The rest of them provide information about local users. (A list is available via anonymous FTP from sipb.mit.edu in the file /pub/whois/whois-servers.list . Chapter 12 has information about how to get this list by email). If your recipient is on UUCP, try netdir@mcsun.eu.net . To locate the postmaster of the mailbox system "amanpt1", use the following format (write nothing in the text): To: netdir@mcsun.eu.net Subject: amanpt1 Text: BITNET provides information about connected systems through many sources. Scandinavian users use LISTSERV@FINHUTC.BITNET in Finland. Try a LISTSERV on a host closer to where you live. For example, North American users may use LISTSERV@NDSUVM1.BITNET, which is a host in North Dakota. Japanese users should write to the host LISTSERV@JPNKNU10.BITNET. When retrieving for BITNET host information mail, your search will have to be done in two steps. Here, your commands are NOT to be entered on the Subject line. Enter all commands in the TEXT field (text on the Subject line will be ignored). Example: You want information about the BITNET computer FINHUTC (called a "node in the network"). Your first message should have the following text: // job echo=no database search dd=rules //rules dd * search * in bitearn where node = FINHUTC index LISTSERV sends you the following report: > search * in bitearn where node = FINHUTC --> Database BITEARN, 1 hit. > index Ref# Conn Nodeid Site name ---- ---- ------ --------- 0910 85/11 FINHUTC Helsinki University of Technology, Finland Send a new search message to the LISTSERV containing the same commands as above. Add one line in which you ask for database record number 0910 (given in the column Ref#). Like this: // job echo=no database search dd=rules //rules dd * search * in bitearn where node = FINHUTC index print 0910 LISTSERV will return a report with a lot of information. Here is part of it: Node: FINHUTC Country: FI Internet: FINHUTC.hut.fi Net: EARN Nodedesc: Helsinki University of Technology, Finland P_hsalmine: Harri Salminen;LK-HS@FINHUTC;+358 0 4514318 P_pautio: Petri Autio;POSTMAST@FINHUTC;+358 0 4514318 P_vvoutila: Vuokko Voutilainen;OPR@FINHUTC;+358 0 4514342 Routtab: RSCS (NETSERV,POSTMAST@FINHUTC) For more information about searching BITNET databases, send this message to your favorite LISTSERV, or use the address below: To: LISTSERV@FINHUTC.BITNET Subject: nothing TEXT: GET LISTDB MEMO X.400 systems are developing an address directory according to CCITT standard X.500. The plan is to connect several directories. The developers hope that routing of X.400 messages may eventually be done automatically without the user needing to know the identity of the recipient's mailbox computer. X.500 will certainly help X.400 users. The problem is that most email is still carried by other types of systems, and that X.500 has no concern for mail transported through "foreign systems." Dialcom ------- is a commercial, global online service, which have many nodes in Africa and Latin America. To send mail from Dialcom to the Internet you must use commercial gateway-services like DASnet (see appendix 1). To send mail from one Dialcom system to another, use the syntax 6007:EWP002. This address points to mailbox EWP002 on system number 6007. To send mail from Internet to Dialcom user YNP079 on system 10001, use the following address when sending through DASnet: 10001_ynp079@dcdial.das.net Note: Only registered users with DASnet can use this method. FidoNet ------- Users of this global network can send and receive mail to/from the Internet. For example, a FidoNet user may use the following method to send to my Internet address: Send the message to user UUCP at 1:105/42. The first line of the TEXT of the message should contain: To: opresno@extern.uio.no Add a blank line after the address before entering the text of your message. FidoNet addresses are composed by three or four numbers; zone:net/node or zone:net/node.point The FidoNet address 1:105/42 has three elements. "1:" tells that the recipient lives in Zone number 1 (North America). "105/42" refers to Node number 42, which receives mail through Net number 105. This node has an automatic gateway to the Internet. Another example: Jan Stozek is sysop of "Home of PCQ" in Warsaw, Poland. The Node number of his BBS is 10. He receives mail through Net number 480. Poland is a country in Europe, Zone number 2. The address to his system is: 2:480/10. His user name is Jan Stozek. You can send an Internet message to anyone in FidoNet by using the following template: .@p.f.n.z.fidonet.org Where is the person's first name is the person's last name To send a message from the Internet to Jan, use this address: Jan.Stozek@f10.n480.z2.fidonet.org One final example: Ola Garstad in Oslo has the FidoNet address 2:502/15. Use the address Ola.Garstad@f15.n502.z2.fidonet.org , when sending mail to him through the Internet. An updated list of global FidoNet nodes can be retrieved from most connected BBS systems. For more information -------------------- If you have access to BITNET or Internet mail, get "The Inter- Network Mail Guide." It describes how to send mail between electronic mail systems like AppleLink, BITNET, BIX, CompuServe, Connect-USA, EasyNet, Envoy, FidoNet, GeoNet, Internet, MCI, MFENET, NasaMail, PeaceNet, Sinet, Span, SprintMail, and more. Send a message to the BITNET address LISTSERV@UNMVM.BITNET. In the TEXT of the message enter: GET NETWORK GUIDE This list is also posted monthly to the Usenet newsgroups comp.mail.misc and news.newusers.questions. The document "FAQ: How to find people's E-mail addresses" is regularly posted to the Usenet group news.answers. It is also available by email from mail-server@rtfm.mit.edu . To get a copy, put the command "send usenet/news.answers/finding-addresses" in the body of your message. Chapter 8: Free expert assistance ================================= This may sound too good to be true. Many computer experts are ready to help YOU without asking a dollar in return. The same is the case with experts in other areas. You have an impossible decision to make. A lawyer has a dotted line that requires your signature, or a surgeon has a dotted line in mind for your upper abdomen. You're not comfortable with the fine print or the diagnosis and wonder if a second opinion is in order. Just ask, and get help. If you have problems with your communications program, post a message on a bulletin board. Do the same thing if you want to sell equipment. Learn from other people's experiences with computers or software that you plan to buy. You will get a reply - if the subject or you attract interest. In the process, you'll get new friends, and be able to follow the development in a dynamic marketplace. The following message from CompuServe is typical: 16-Nov-91 15:16:14 Sb: Back & Forth software Fm: Joan Healy To: John Nelson Changed my mind about GrandView: 1. Learning curve like Mt. Everest. Give me intuitive or give me death. 2. Lack of patience with " ". 3. Lack of time. 4. It may be unsuited for what I wanted (outlining a book). Since becoming a born-again Galaxian, I've started using that for the outline, and I'm happy. There's nothing like a decision and a permanent bonding and lifelong commitment to make a woman happy. Remember that, you louts. :-) Many users prefer open conference messages to private email for their technical discussions. This gives "the group" a chance to read, comment, provide additional facts, and return with new questions. The reactions to one simple question may be overwhelming, but most of the time the contributions are useful and educational. Since the discussion is public, regard it as your personal online university. Offer opinions when you have something to contribute, or keep silent. In most conferences, some members are critical to "lurkers." A "lurker" is someone who read without ever contributing. Don't let them get to you. Do not feel bad about being silent. Most other members are there only to watch and learn as well. If you consider buying a newly released computer program, tune in to the section of your favorite online service that deals with products from this manufacturer. Count messages with complaints of the new program before buying. When you have received your new program, return to read other users' experiences and to pick up practical advice. It will never hurt to offer your own two cents' worth in the process. | Visit online services that have many users who know more than | | most. There, you will usually get faster and better replies to | | your questions. It is far cheaper to ask than to search. | Start with bulletin boards. If you have never visited a BBS, call one in your neighborhood to get a feel for what this is. Most of them can be accessed free. Usually, their only requirement is that you answer some self-presentation questions before being granted full access to their system. Most bulletin boards offer conferencing and archives filled with shareware and public domain software. Many also have files or bulletins listing telephone numbers of other boards in your country or area. The trick is to find know-how. The larger the online service, the more skilled people are likely to "meet" there regularly. Therefore, if local bulletin boards fail to satisfy your needs, visit the large commercial services. CompuServe and EXEC-PC are two services in the top league. BIX is another good source of information for professional computer specialists. One exception: When you need contact with ONE particular person, who knows YOUR problem in detail, go where he uses to go. Examples: If you need top advice about the communications program GALINK, call Mike's BBS in Oslo (at +472 -416588). If you buy modems from Semafor A/S, the best place for expert advice is Semaforum BBS (tel. +4741-370-11710). If you have a Novell local area network, visit the Novell forums on CompuServe. For users of MS-DOS computers ----------------------------- I visit the following CompuServe forums regularly: IBM Communication - about communication software for MS-DOS computers. IBM Hardware - about new IBM compatibles, expansion cards, displays, hard disks, IBM PS/2, software for performance evaluation, printers, etc. IBM Systems/Utilities - about DOS, utilities, shells, file utilities, and much more. A large software library. IBM Applications - about all kind of applications. The forum has a large file library full of shareware and public domain software. Many CompuServe forums are operated or sponsored by software and hardware vendors, like: Adobe Systems Inc., Aldus Corp., Ashton-Tate Corp., Autodesk Inc., Borland International, Broderbund Software Inc., Buttonware Inc., Cadkey Inc., Crosstalk Communications, Customs Technologies, Enable Software, Datastorm Technologies Inc., Microsoft Systems, Nantucket Corp., Lotus Development Corp., Novell Inc., Peter Norton Computing, Quarterdeck Office Systems, Quicksoft, Sun Microsystems (TOPS Division), Symantec Corp., Toshiba, Turbopower Software, and WordPerfect Corp. CompuServe has hundreds of other forums with associated libraries of files and programs. FidoNet has the PC_TECH and PCUG conferences, and a long list of product specific echos like QUICKBBS, PCTOOLS, ZMODEM, DESQVIEW and WINDOWS.SHAREW . BITNET has CLIPPER (CLIPPER@BRUFPB), I-IBMPC (I-IBMPC@UIUCVMD), PC-L (PC-L@UFRJ), and the abstract service INFO-IBMPC (IBMPC- L@BNANDP11). On EXEC-PC, look under MS-DOS systems. Usenet has many offerings including the following: comp.sys.ibm.pc.misc Discussion about IBM personal computers. comp.sys.ibm.pc.digest The IBM PC, PC-XT, and PC-AT. (Moderated) comp.sys.ibm.pc.hardware XT/AT/EISA hardware, any vendor. comp.sys.ibm.pc.rt Topics related to IBM's RT computer. comp.sys.ibm.ps2.hardware Microchannel hardware, any vendor. For help with Lotus 1-2-3, there are two CompuServe forums. There is a LOTUS conference on RelayNet. WordPerfect Corp. has a support forum on CompuServe. WORDPERF is the equivalent offering on RelayNet. On ILINK, visit WORDPERFECT. For support about Ami Pro, visit CompuServe's LDC Word Processing Forum. For owners of Amiga computers ----------------------------- FidoNet has a long list of conferences for Amiga users: AMIGA Amiga International Echo AMIGAGAMES Amiga Gaming AMIGA_COMMS Amiga Communications Software and Hardware AMIGA_DESKTOP Amiga Desktop Publishing AMIGA_INFO AMIGA_INFO AMIGA_LC Amiga Lattice/SASC C Echo AMIGA_NET_DEV Amiga Network Developers. AMIGA_PDREVIEW Amiga PD Reviews & Requests AMIGA_PERFECT Amiga Word Perfect & Word Processing AMIGA_PROG Amiga Programmer's International Conference AMIGA_SYSOP Amiga SysOp's Discussion/ADS Echo AMIGA_UG Amiga User's Groups AMIGA_VIDEO Amiga Video and Animation EXEC-PC has the Amiga Hardware and Amiga Software conferences, and a large library with shareware and public domain files. ILINK has the AMIGA conference. Usenet's com.sys.amiga hierarchy has entries like advocacy, announce applications, audio, datacomm, emulations, games, graphics, hardware, introduction, marketplace, multimedia, misc, programmer, reviews and more. Abstracts of comp.sys.amiga conferences are available through several BITNET mailing lists, like AMIGAHAR@DEARN, AMIGA-D@NDSUVM1, and AMIGA-S@NDSUVM1. Most online services have "Find this File" commands. The most powerful ones are often found on free bulletin boards. On CompuServe, type GO AMIGA to get to CBMNET and get the following welcome menu: Amiga Forums 1 Amiga Arts Forum 2 Amiga Tech Forum 3 Amiga User's Forum 4 Amiga Vendor Forum 5 Amiga File Finder Commodore Forums 6 Commodore Arts and Games 7 Commodore Applications Forum 8 Commodore Service Forum 9 Commodore Newsletter A while ago, we visited CBMNET to find a communications program. From the menu above, selection five took us to The Amiga File Finder service, and this menu: File Finder AMIGA 1 About File Finder 2 Instructions For Searching 3 How to Locate Keywords 4 Access File Finder 5 Your Comments About File Finder Choice four lets us search for files using keywords, file creation dates, forum names, file types, file name extension, file name or author. Our choice was searching by keywords. The result was a long list of alternatives: Enter Search Term: comm Amiga File Finder 1 AMIGATECH/C Programming COMSRC.ARC 2 AMIGATECH/C Programming PMDSRC.LZH 3 AMIGATECH/C Programming PNTSRC.LZH 4 AMIGAUSER/Communications BBSIND.LZH 5 AMIGAUSER/Communications INTOUC.ARC etc. By entering numbers, we asked for short descriptions of file number 4 through 13. Here is one of them: Filename : INTOUC.ARC Forum: AMIGAUSER Lib: Communications Lib #: 5 Submitter: [76702,337] 24-Mar-89 Size: 51200 Accesses: 157 This is a modified Comm1.34. It supports both VT100 and ANSI. The VT100 emulation is based on Dave Wecker's VT100 program. There is automatic dialer, split screen that is configurable, phone book, and other nice features. This is what we were looking for. First, enter GO AMIGAUSER to get to the forum. Enter "DL 5" to get to Downloading Library number 5. INTOUCH.ARC was retrieved using the CompuServe Quick B transfer protocol. This protocol is usually the most efficient choice on this service. There are also active Amiga forums on BIX, GEnie, and CIX (England). Apple users ----------- FidoNet has an APPLE conference. BITNET has APPLE2-L (APPLE2- L@BROWNVM). CompuServe has Apple II Programmers Forum, Apple II Users Forum, Apple II Vendor Forum, Mac Community Clubhouse Forum, Mac Developers Forum, Mac Fun/Entertainment Forum, Mac Hypertext Forum, Mac New Users/Help Forum, Mac System 7.0 Forum, Mac System Software Forum, MacUser Forum and MacWEEK Forum. Similar services are found on many other online services. You will also find conferences devoted to support of popular commercial software for Apple computers. Other computers --------------- There are so many types of computers: Atari computers, the TRS-80 series and others from Tandy, DEC computers, mainframes from IBM, Hewlett-Packard computers, CP/M machines, users of LDOS/TRSDOS or OS9, Apricot, Z88, Timex/Sinclair, Archimedes, Psion, and Armstrad. Even so, there is a high probability that you can find online support for almost all of them. This is so even if the vendor is out of business long ago. CompuServe is a good place to start. Chapter 9: Your electronic daily news ===================================== Read national and global news before they are announced by the traditional media. Get those interesting background facts. Read special interest news stories that seldom appear in print. Sure, you read newspapers, watch TV, and listen to radio. But did you know how limited their stories are? Traditional news media just give you a small part of the news. Their editors are not concerned about YOUR particular interests. They serve a large group of readers, viewers or listeners with different interests in mind. Go online to discover the difference. The online news has an enormous width and depth. Besides "popular" news, you will find stories that few editors bother to print. This may give you better insight in current developments, and in as much details as you can take. Most commercial online services offer news. Most of their stories come from large news agencies and newspapers. You can also read and search articles from magazines, newsletters and other special publications. The online users' ability to search today and yesterday's news makes these offerings particularly useful. The cost of reading a given news item varies by online service. What will set you back 20 cents on one service, will cost you two dollars on another. It may be many times more expensive (or cheap) to read the same article from the same news provider on another online service. So, professional online users compare prices. National news ------------- In Norway, we have long been able to read local language news from print media like Aftenposten, Dagens Naeringsliv, Kapital, and news wires from NTB and other local sources. Similarly, local language news is available online in most countries. The cost of reading local news on national online services tends to be more expensive than on major global online services. As competition among global news providers increases, however, this is bound to change. International news ------------------ "The Global Village" is an old idea in the online world. News from most parts of the world has long been globally available. A while ago, a well-known Norwegian industrialist visited my office. I showed off online searching in NewsNet newsletters and stumbled over a story about his company. "Incredible!" he said. "We haven't even told our Norwegian employees about this yet." Often, American online services give news from other countries earlier you can get it on online services from these countries. Besides, the stories will be in English. | In 1991, the United States had 56 percent of the world's online | | databases (Source: the research company IQ, September 1991). | Sure, most Norwegians prefer to read news in Norwegian. The Japanese want news in their language, and the French in French. If they can get the news earlier than their competitors, however, most are willing to read English. Few master many languages. Unless you live in a country where they talk Arabic, Chinese or French, chances are that you cannot read news in these languages. English, however, is a popular second choice in many countries, and it has become the unofficial language of the online world. Another thing is that reading local language news is risky. Translators often make mistakes. One reason is time pressure, another poor knowledge of the source language. The risk of inaccuracies increases when a story, for example initially translated from Spanish into English, then are being translated into a third language. Avoid news that has been translated more than once. If not, you may experience something like this: On September 19, 1991, Norwegian TV brought news from Moscow. They told that Russian president Boris Yeltsin had a heart attack. The online report from Associated Press, which arrived 7.5 hours earlier, talked about "a minor heart attack" with the following additional explanation: "In Russian, the phrase 'heart attack' has a broader meaning than in English. It is commonly used to refer to a range of ailments from chest pains to actual heart failure." Your "personal online daily newspaper" will often give you the news faster and more correctly than traditional print media. Some news is only made available in electronic form. Seven minutes in 1991 --------------------- On September 19, I called CompuServe to read news and gather information about online news sources. According to my log, I connected through Infonet in Oslo (see Chapter 13). The total cost for seven minutes was US$6.00, which included the cost of a long distance call to Oslo. I read some stories, while they scrolled over the screen. All was captured to a file on my hard disk for later study. The size of this file grew to 32.000 characters, or almost 15 single-spaced typewritten pages (A-4 size). If I had spent less time reviewing the lists of available stories, seven minutes would have given a larger file. When I had entered my user ID and password, a menu of stories came up on my screen. The headline read "News from CompuServe." The two first items caught my attention, and I requested the text. One had 20 lines about an easier method of finding files in the forum libraries. The other had ten lines about how to write addresses for international fax messages. The command GO APV brought me directly to Associated Press News Wires. You'll find such tricks by reading the online services' user manuals. This command produced the following menu: AP Online APV-1 1 Latest News-Updated Hourly 2 Weather 3 Sports 4 National 5 Washington 6 World 7 Political 8 Entertainment 9 Business News 10 Wall Street 11 Dow Jones Average 12 Feature News 13 Today in History I entered "9" for business news, and got a new list of stories: AP Online 1 Women, Minority Businesses Lag 2 Child World Accuses Toys R Us 3 UPI May Cancel Worker Benefits 4 Drilling Plan Worries Florida 5 UK Stocks Dip, Tokyo's Higher 6 Dollar Higher, Gold Up 7 Farm Exports Seen Declining 8 Supermarket Coupons Big Bucks 9 Cattlemen Tout Supply, Prices 0 Tokyo Stocks, Dollar Higher MORE ! The screen stopped scrolling by "MORE !". Pressing ENTER gave a new list. None of them were of any interest. Pressing M (for previous menu) returned me to the APV-1 menu (the videotext page number is given in the upper right corner of each menu display). I selected "World" for global news, which gave me this list: AP Online 6 Two Killed In Nagorno Karabakh 7 Yugoslavia Fighting Rages On 8 Storm Kills Five In Japan 9 Afghan Rebels Going To Moscow? 0 19 Killed in Guatemala Quakes MORE !8 Oh, a storm in Japan! Interesting. I was due to leave for Japan in a couple of weeks, and entered 8 at the MORE ! prompt to read. A screenful of text was transferred in a few seconds. "This is for later study," I said, pressed M to return to the menu, and then ENTER to get the next listing: AP Online 1 Bomblets Kill American Troops? 2 No Movement On Hostage Release 3 Baker Plans Return To Syria 4 Baker, King Hussein To Confer 5 Madame Chiang Leaving Taiwan? 6 Baker Leaves Syria for Jordan 7 Klaus Barbie Hospitalized 8 Iraq Denounces U.S. Threat 9 Yelstin Said Resting At Home 0 SS Auschwitz Guard Found Dead MORE ! Here, I used another trick from the user manual. Entering "5,6,9" gave three stories in one batch with no pauses between them. Five screens with text. If I had read the menu more carefully, I might probably also have selected story 0. It looked like an interesting item. "This is enough of the Associated Press," I thought, and typed G NEWS. This gave me an overview of all available news sources ("G NEWS" is an abbreviation for "GO NEWS," or "GO to the main NEWS menu"): News/Weather/Sports NEWS 1 Executive News Service ($) 2 NewsGrid 3 Associated Press Online 4 Weather 5 Sports 6 The Business Wire 7 Newspaper Library 8 UK News/Sports 9 Entertainment News/Info 10 Online Today Daily Edition 11 Soviet Crisis First, a quick glance at 6. The service presented itself in these words: "Throughout the day The Business Wire makes available press releases, news stories, and other information from the world of business. Information on hundreds of different companies is transmitted daily to The Business Wire's subscribers." Then #7: "This database contains selected full-text stories from 48 newspapers from across the United States. Classified ads are NOT included in the full-text of each paper." The list of newspapers included Boston Globe, Chicago Tribune and San Francisco Chronicle (known for many interesting inside stories from Silicon Valley). Choice 8 gave news from England. There, I selected UK News Clips, which gave the following options: U.K. News Clips 93 stories selected 1 RTw 09/19 0818 YUGOSLAV AIR FORCE HITS CROATIAN COMMUNICATIONS 2 RTw 09/19 0755 CROATIA BATTLES CONTINUE AS EC PONDERS PEACE FORCE 3 RTw 09/19 0753 ARAB PAPERS SAY MOSCOW WANTS MIDEAST PARLEY DELAYED 4 RTw 09/19 0749 DOLLAR STANDS STILL, SHARES DRIFT LOWER IN ... 5 RTw 09/19 0729 EARNINGS GLOOM REVERSES LONDON STOCKS' EARLY GAINS 6 RTw 09/19 0716 SOVIETS NEED 14.7 BILLION DOLLARS FOOD AID, EC SAYS 7 RTw 09/19 0707 IRA SAYS IT KILLED TIMBER YARD WORKER IN BELFAST DOCKS 8 RTw 09/19 0706 BRITISH CONSERVATIVE CHIEF PLAYS DOWN TALK OF ... 9 RTw 09/19 0630 FINANCE RATES 10 RTw 09/19 0603 REUTER WORLD NEWS SCHEDULE AT 1000 GMT THURSDAY ... The numbers in column four are the release times of the stories. They flow in from the wires in a continuous stream. Next stop was the UK Newspaper Library. Here, you can search in full-text stories from The Daily and Sunday Telegraph, Financial Times, The Guardian, UK News (with selected stories from The Daily & Sunday Telegraph, Financial Times, The Guardian, The Times/Sunday Times, Today, The Independent, Lloyd's List and The Observer). Searching the UK Newspaper Library costs US$6.00 for up to ten hits. You get a selection menu of the first ten stories found. A menu with an additional ten stories costs another $6.00, etc. You pay US$6.00 to read the full text of selected stories. These rates are added to CompuServe's normal access rates. The news service Soviet Crisis was my final destination. This was just a few weeks after the attempted coup in Moscow, and I was eager for reports. I found the following interesting story from OTC NewsAlert: OTC 09/19 0750 FIRST ENGLISH LANGUAGE SOVDATA DAILINE IS LAUNCHED This selection gave me three screens with information about a new online service. Briefly, this is what it said: "The SovData DiaLine service includes an on-line library of more than 250 Soviet newspapers, business and economic periodicals, profiles of more than 2,500 Soviet firms and key executives that do business with the West, legislative reports and other information." It also said that part of the database was available through Mead Data Central (Nexis/Lexis), and that it would be made available through like Data-Star, FT Profile, Reuters, Westlaw, and GBI. Undoubtedly, the name has changed by the time you read this. Finally, a fresh story about the fate of KGB. I read another fifty lines, entered OFF (for "goodbye CompuServe"), and received the following verdict: Thank you for using CompuServe! Off at 09:03 EDT 19-Sep-91 Connect time = 0:07 Seven minutes. Fifteen typed pages of text. US$6.00. Not bad! An overwhelming choice ---------------------- I am confident that your "daily online newspaper" will contain other stories. If you're into computers, you may want to start with Online Today, CompuServe's daily newspaper. It brings short, informative news stories about the computer industry. NewsBytes is another interesting source for computer news. It offers global headline news from its bureaus around the world. The articles are sorted in sections called APPLE, BUSINESS, GENERAL, GOVERNMENT, IBM, REVIEW, TELECOM, TRENDS and UNIX. A favorite! Newsnet is also available through Genie, ZiffNet on CompuServe, NewsNet, Dialog, in the newsgroup clari.nb on Usenet, and various BBS systems around the world. I read it through a Norwegian BBS (EuroNet in Haugesund). For general news, start with major newswires, like Associated Press, Agence France-Presse, Xinhua, Reuters, and the like. You will find them on many commercial services including NewsNet, CompuServe, and Dialog. FROGNET - The French Way ------------------------ If you know French, check out FROGNET. This French language service brings daily news from Agence France Press, and often has added excerpts from the French dailies. FROG is distributed by the services of the French embassy in Washington. It covers world affairs, European and French items, assembled, naturally, from a French point of view. The service is free. To subscribe, send a message through the Internet to FROG@GUVAX.GEORGETOWN.EDU . It should contain your answers to the following electronic application form. Replace the %s with your inputs (This is French, right?): NOM: % PRENOM: % NAISSANCE:../../..% ARRIVEE:../../..% DEPART:../../..% EMAIL: % ECOLE D'ORIGINE: % QUALITE: % ADRESSE DE RECHERCHE: % PAYS: % STATE: % UNIVERSITE: % RECHERCHE: % MOTSCLES: % DOMAINE: % Complicated? OK, here's some instructions in "French ASCII": * Pour les dates veuillez utiliser le format Francais (DD/MM/YY). Arrivee: c'est la date d'arrivee dans le pays ou vous etes actuellement. * QUALITE: Etes vous VSN, PHD, MASTER, INGENIEUR, POST-DOC ...? * ECOLE D'ORIGINE: Diplome obtenu en France * PAYS: US, Australie .... * STATE: pour les US en 2 lettres (NY, TX, CA) * UNIVERSITE: actuelle ou societe * RECHERCHE: Soyez explicite ! * MOTSCLES: (ex: Neuronaux, polymeres, TVHD...) * DOMAINE: En 3 lettres confere nomenclature ci-dessous Nomenclature de la National Science Foundation. AGR AGRICULTURE BIO BIOLOGICAL SCIENCES HES HEALTH SCIENCES ENG ENGINEERING CIS COMPUTER AND INFORMATION SC. MAT MATHEMATICS PHY PHYSICAL SCIENCES AST Astronomy ATM Atmospheric & Meteorological Sciences CHE Chemistry GEO Geological Sciences PHS Physics OPH Other Physical Sciences PSY PSYCHOLOGY SOS SOCIAL SCIENCES HUM HUMANITIES HIS History LET Letters FLL Foreign Languages & Literature OHU Other Humanities EDU EDUCATION EDG Education General TED Teacher Education TEF Teaching fields PRF PROFESSIONAL FIELDS BUS Business & Management COM Communications PFO Other Professional Fields OTH OTHER FIELDS News is more than news ---------------------- After some time, your definition of the notion "news" may change. Since so many conferences are interesting sources, they should also be a part of your news gathering strategy. Check in regularly to read what members report about what they have seen, done, heard, or discovered. By the way, professional news hunters have also discovered this. Online conferences are popular hunting grounds for reporters of the traditional press. FidoNet has many conferences with specialized news contents: ANEWS News of the US and World BBNS BBS News Service BIONEWS Environmental News EL_SALVADOR Analysis and News About El Salvador NICANET Analysis and News About Nicaragua PACIFIC_NEWS Pacific News PANAMA Analysis and News About Panama BITNET has mailing lists like: CHINA-NN CHINA-NN@ASUACAD China News Digest (Global News) CURRENTS CURRENTS@PCCVM South Asian News and Culture INDIA-L INDIA-L@TEMPLEVM The India News Network PAKISTAN PAKISTAN@ASUACAD Pakistan News Service SEDSNEWS SEDSNEWS@TAMVM1 News about Space from SEDS TSSNEWS TSSNEWS@PSUVM Tunisian Scientific Society News RFERL-L (on LISTSERV@UBVM.CC.BUFFALO.EDU) distributes the RFE/RL Research Institute Daily Report. It is a digest of the latest developments in the former Soviet Union and Eastern Europe. The report is published Monday through Friday by the RFE/RL Research Institute, a division of Radio Free Europe/Radio Liberty Inc. in Germany. Some mailing lists bring a steady flow of news from various sources. SEASIA-L@MSU - The Southeast Asia Discussion List - is one example. The list is "designed to facilitate communication between researchers, scholars, students, teachers, and others interested in Southeast Asian studies with an emphasis on current events." SEASIA-L defines Southeast Asia loosely as Burma/Myanmar across to Hong Kong and down through Australia and New Zealand. Regularly, it brings full-text news stories from Inter Press Service, regional news agencies, and newspapers/radio. Some examples: On Jul. 30, 1992, a full-text story from IPS: "PHILIPPINES: RAMOS URGES REPEAL OF ANTI-COMMUNIST LAW." On Aug. 13, 1992, full- text story from The New Straits Times (Singapore): "Schoolgirs involved in flesh trade, says Farid." On Aug. 31, "ANTI-VIETNAMESE FORCE TURNS UP IN CAMBODIA" (Reuter). SEASIA-L also brings "underground" reports like "The Burma Focus," a bimonthly newsletter published by the All Burma Students' Democratic Front. ECUADOR brings news from Ecuador. Daily news bulletins from "Diario Hoy" are posted to the list. Send rone@skat.usc.edu your subscription request. Many CompuServe forums have news sections. If you're into Hot News and Rumors about Amiga Computers, read messages in section 3 of the Amiga Tech Forum. Consumer Electronics Forum has the section "New Products/News." The Journalist Forum has "Fast Breaking News!" The Motor Sports Forum has "Racing News/Notes." The Online Today Forum has "In the News." NewsNet's list of newsletters that you can read or search online is long, and back issues are also available. For example: Africa News, Agence France-Presse International News, Applied Genetics News, Asian Economic News, Asian Political News, Business Travel News, Catholic News Service, CD Computing News, Computer Reseller News, Electronic Materials Technology News, Electronic Trade & Transport News, Electronic World News, High Tech Ceramics News, Inter Press Service International News, International Businessman News Report, News From France, Northern Ireland News Service, Online Product News, Sourcemex -- economic news on Mexico, and XINHUA English language news service (China). The Inter Press Service's newsletter International News focuses on Third World countries, and news from Europe/North America of interest to these countries (also available through Impress on Nexis). Usenet brings news from Bangladesh, India and Nepal in misc.news.southasia. The ClariNet hierarchy gateways newsgroups from commercial news services and "other official" sources, like: biz.commodity Commodity news and price reports. feature Feature columns and products canada.briefs Regular updates of Canadian News in Brief. biz.economy Economic news and indicators biz.top Top business news books Books & publishing. briefs Regular news summaries. bulletin Major breaking stories of the week. consumer Consumer news, car reviews etc. demonstration Demonstrations around the world. disaster Major problems, accidents & natural disasters. economy General economic news. entertain Entertainment industry news & features. europe News related to Europe. fighting Clashes around the world. hot.east_europe News from Eastern Europe. hot.iraq The Gulf Crisis hot.panama Panama and General Noriega. news.top Top US news stories. news.top.world Top international news stories. news.trends Surveys and trends. news.urgent Major breaking stories of the day. A feed of ClariNet news is available for a fee and execution of a license. (Write info@clarinet.com for information.) UUCP has which brings regular news bulletins from Poland (Contact: przemek@ndcvx.cc.nd.edu). Behind the news --------------- In an effort to garner new subscribers and retain current readers, magazine publishers turn to online services to create an ancillary electronic version of their print product. Their readers are being transformed from passive recipients of information into active participants in publishing. You can "talk" to BYTE's writers on BIX, and with PC Magazine's writers through ZiffNet on CompuServe. Their forums function as expert sources. Here, you will often learn about products and trends sometimes before the magazines hit the newsstand. InfoWorld, an American computer magazine, runs the InfoWorld OnLine service on CompuServe. Enter GO INF to get to the following menu: InfoWorld On-Line INFOWORLD WELCOME TO INFOWORLD 1 About InfoWorld Online 2 Read Current Week's News - 1/13/92 3 Read Prior Week's News - 1/06/92 4 Download Current Week's Reviews, Comparisons and Test Drives ($) 5 Download Prior Week's Reviews, Comparisons and Test Drives ($) 6 Searching Help 7 Search Review/Comparisons/ Impressions/Test Drives 8 Comments to InfoWorld InfoWorld highlights comprehensive computer product comparisons and reports. You can browse this or previous weeks' comparisons and reviews, or search the entire collection. You can search by company name, product, software and hardware category. Britain's two best-selling PC magazines share the PC Plus/PC Answers Online forum on CompuServe (GO PCPLUS). PC Magazine, another American magazine, has several forums on CompuServe. They also operate a bulletin board. People from AI Expert Magazine can be encountered in the AI Expert Forum. Dr. Dobb's Journal is in the Dr. Dobb's Journal Forum. The Entrepreneur's Small Business Forum (CompuServe) is managed by representatives from the magazine. Live Sound!, a magazine devoted to the MIDI sound field, occupies section and library 9 of the MIDI B Vendor Forum. Time magazine has a forum on America Online. There, readers can discuss with magazine reporters and editors, and even read the text of entire issues of Time electronically before it is available on newsstands. The Online World shareware book, the one you're reading just now, also has a forum. For information about how to join, send email to LISTSERV@vm1.nodak.edu (or LISTSERV@NDSUVM1 on BITNET). In the text of your message, write the command "GET TOW MASTER". Chapter 10: Looking for a needle in a bottle of hay =================================================== Experienced users regularly clip news from online services, and store selected parts of it on their personal computers' hard disks. They use powerful tools to search their data, and know how to use the information in other applications. Regular clipping of news is highly recommended. It is often quicker and easier to search your own databases than to do it online. Since your data is a subset of previous searches, your stories are likely to have a high degree of relevancy. There are many powerful programs for personal computers that let you search your personal data for information. Read Chapter 14 for more on this. While secondary research can never replace primary information gathering, it often satisfies most information needs related to any task or project. Besides, it points in the direction of primary sources from where more in-depth information may be elicited. When your personal database fails to deliver -------------------------------------------- Regular "clipping" can indeed help you build a powerful personal database, but it will never satisfy all your information needs. Occasionally, you must go online for additional facts. When this happens, you may feel like Don Quixote, as he was looking "for a needle in a bottle of hay." The large number of online offerings is bewildering. To be successful, you must have a sound search strategy. Your first task is to locate useful SOURCES of information. The next, to decide how best to find that specific piece of information online. You must PLAN your search. Although one source of information, like an online database, is supposed to cover your area of interest, it may still be unable to give you what you want. Let me explain with an example: You're tracking a company called IBM (International Business Machines). Your first inclination is to visit forums and clubs concerned with products delivered by this company. There, you plan to search message bases and file libraries. What is likely to happen, is that the search term IBM gives so many hits that you almost drown. To find anything of interest in these forums, your search terms must be very specific. General news providers, like Associated Press, may be a better alternative. Usually, they just publish one or two stories on IBM per week. Don't expect to learn about details that are not of interest to the general public. AP's stories may be too general for you. Maybe you'll be more content with industry insiders' expert views, as provided by the NewsNet newsletters OUTLOOK ON IBM, or THE REPORT ON IBM. The level of details in a given story depends in part on the news providers' readers, and the nature of the source. The amount of "noise" (the level of irrelevancy) also varies. In most public forums, expect to wade through many uninteresting messages before finding things of interest. We suggest the following strategy: Step 1: Locate sources that provide relevant information, Step 2: Check if the information from these sources is at a satisfactory level of details, and that the volume is acceptable (not too much, neither too little). Step 3: Study the service's search commands and procedures, PLAN, and then SEARCH. Start by asking others! ----------------------- Step 1 is not an easy one. Start by asking other online people for advice. This may be the fastest way to interesting sources. If looking for information about agriculture and fisheries, visit conferences about related topics. Ask members there what they are using. If you want information about computers or electronics, ask in such conferences. | When you don't know where to start your search, ask others! | | Their know-how is usually the quickest way to the sources. | If this doesn't help, check out GEnie's Home Office/Small Business RoundTable, a hangout of online searchers. Visit CompuServe's Working From Home Forum, which has a section for information professionals (#4), and the section for new librarians in the Journalism Forum. Patent searchers are a very specialized group. They discuss common problems on Dialog's DialMail. Their bulletin board is named PIUG. Buy user manuals ---------------- Some online services send free user information manuals to their users. Others charge extra for them. If they do, buy! They're worth their weight in gold. The user manuals from Dialog, Dow Jones News/Retrieval and CompuServe make good reading. The last two also publish monthly magazines full of search tips, information about new sources, user experiences, and more. Dialog distributes the monthly newsletter Chronolog. NewsNet customers periodically receive a printed listing of available newsletters by subject area, and a presentation of their information providers. The NewsNet Action Letter (monthly) is also distributed by mail. On some services, you can retrieve the help texts in electronic form. Doing that is not a bad idea. It is often quicker to search a help file on your disk, than to browse through a book. Monitor the offerings --------------------- Professional information searchers monitor the activity in the online world. They search databases for information about new sources of information, and regularly read about new services. On most online services, you can search databases of available offerings, and a section with advertisements about their own 'superiorities'. Keep an eye on what is being posted there. NewsNet lets you read and search the following newsletters: Worldwide Videotex Update, Worldwide Databases (#PB44), Online Newsletter, The Online Newsletter, and The Online Libraries and Microcomputers. The last two are also available as a database from Information Intelligence, Inc., (P.O. Box 31098, Phoenix, AZ 85046, U.S.A. Tel.: +1-602-996-2283). You can read the text on NewsNet about one week before it appears in print. These two newsletters can also be read and searched on Dialog and Data-Star, as part of the Information Access PTS Newsletter Database. Information Access is a full-text database with many specialized newsletters for business and industry. On CompuServe, you can get to Information Access through the IQuest gateway to NewsNet. Subscribing to THE ONLINE NEWSLETTER costs US$50.00 per year (10 issues) for companies, and US$35.00 for personal use (1991). For both newsletters, the price is US$75.00. These newsletters are also available on CD-ROM. The disk contains four databases: the Online Newsletter, Online Hotline, Online Libraries and Microcomputers, Major Online Vendors and *Joblines* with more than eight thousand full-text articles from January 1980 until today. The CD-ROM version is delivered with a menu-driven searching program. Each word in every article and headline has been indexed and can be located in all databases. The price for subscriptions of the printed version is US$99.95. Price for nonsubscribers: US$199.95. The September 1991 issue of The Online Newsletter had the following index (partial): ***************************** *NEW & FORTHCOMING DATABASES* ***************************** 10) MULTIMEDIA CIA WORLD FACT BOOK (CD-ROM) [REVIEW] 11) NORTH AMERICAN INDIANS ON CD-ROM (CD-ROM) [REVIEW] 12) WORLD CERAMICS ABSTRACTS (ORBIT) 13) GENE-TOX (TOXNET/NLM) 14) UK TRADEMARKS (ORBIT) [RENAMED] 15) BRS ADDS DATABASES TO ITS OFFERINGS 16) CURRENT PATENTS (ORBIT) 17) NEW ENGLAND JOURNAL OF MEDICINE ON CD-ROM (CD-ROM) 18) ALUMINUM STANDARDS DATABASE [AAASD] (STN 19) PLASNEWS (STN INTERNATIONAL) 20) EPIC ANNOUNCES NEW DATABASES 21) DISCLIT: AMERICAN AUTHORS (CD-ROM - OCLC) 22) CROSS-CULTURAL: CRIME AND SOCIAL PROBLEMS (CD-ROM) 23) INTERNATIONAL PHARMACEUTICAL ABSTRACTS (CD-ROM) 24) RINGDOC (CD-ROM - SILVERPLATTER) 25) CODUS (ESA-IRS) 26) MOODY'S COMPANY DATA (CD-ROM) 27) FEDERAL NEWS SERVICE (DIALOG) 28) INPADOC DATABASE TO BE MADE AVAILABLE IN JAPAN (DIALOG) 29) SOFTWARE CD: DESCRIPTIONS & REVIEWS (CD-ROM) 30) MONARCH NOTES ON CD-ROM (CD-ROM) An earlier issue of the newsletter reviewed The Encyclopedia of Information Systems and Services, a three-volume "bible" for online users and producers (9th edition): EISS covers more than 30,000 organizations, systems, services, more than five thousand databases, publications, software products, etc. Their international listing covers 1,350 information organizations in 70 countries, and has 535 pages. Topics: online host services, videotex/teletext information services, PC oriented services, data collection and analysis services, abstracting and indexing services, computerized searching services, software producers, magnetic tape/diskette providers, micrographic applications and services, library and information networks, library management systems, information on demand services, transactional services (new category), document delivery services, SDI/current awareness services, consultants, associations, research and research projects, and electronic mail applications. Contact: Gale Research Company, 645 Griswold, Detroit, MI 48226, U.S.A. Tel.: +1-313-961-2242. Price per set: US$ 420.00. The European Common Market -------------------------- Many services bring news and information from the European Common Market. The Common Market's free database service, I'M-GUIDE, is a good place to start. I'M-GUIDE is available through ECHO in Luxembourg by telnet to echo.lu . At the question "PLEASE ENTER YOUR CODE," enter ECHO and press Return. You can search I'M-GUIDE for information sources, send email inquiries to ECHO, and more. Searches can be done in English, French, German, Italian, Spanish, Dutch, Danish, and Portuguese. If you have problems using I'M-GUIDE, call the ECHO Help Desk in Luxembourg at +352-34 98 11. More sources about sources -------------------------- The "Internet-Accessible Library Catalogs and Databases" report is available by email from LISTSERV@UNMVM.BITNET. Put the following command in the TEXT of your message: GET LIBRARY PACKAGE Cuadra/Elsevier (Box 872, Madison Square Station, New York, NY 10159-2101, U.S.A. Tel.: +1 212 633 3980) sells a Directory of Online Databases, which lists databases available around the world. The catalog can be searched on Orbit and Data-Star. The Online Access Publishing Group Inc. (Chicago) sells "The Online Access Guide." Annual subscription for this printed manual costs US$18.95 (six issues - 1992). The LINK-UP magazine is another interesting source. If living in North America, contact Learned Information Inc., 143 Old Mariton Pike, Medford, NJ 08055-8707, U.S.A.. If living elsewhere, contact Learned Information (Europe) Ltd., Woodside, Hinskey Hill, Oxford OX1 5AU, England, if you live outside North America. Tel.: +44 865 730 275. Price: US$25.00 for six issues/year (1993). An online version is available through ZiffNet's Business Database Plus on CompuServe. Two monthly magazines, Information World Review (price: GBP 30/year) and FULLTEXT SOURCES ONLINE from BiblioData Inc. in the United States, is also available through Learned Information. (BiblioData, P.O. Box 61, Needham Heights, MA 02194, U.S.A.) FULLTEXT SOURCES ONLINE publishes their listing of full-text databases twice per year. The price is GBP 50 GBP per booklet or GBP 90 per year. The newsletter SCANNET TODAY (c/o Helsinki University of Techn. Library, Otnaesvaegen 9, SF-02150 ESBO, Finland) presents news of Scandinavian databases by country. Subscription is free. Computer Readable Databases from Gale Research is available both in print and online through Dialog. Write to Gale Research Company, 645 Griswold, Detroit, MI 48226, U.S.A. Many electronic journals and newsletters are available through the Internet, covering fields from literature to molecular biology. For a complete list, send a message to LISTSERV@ACADVM1.UOTTAWA.CA with the following commands in the BODY of your text: GET EJOURNL1 DIRECTRY GET EJOURNL2 DIRECTRY Practical hints about online searching -------------------------------------- We cannot give a simple, universal recipe valid for all online services. What is the best approach on one service, may be useless on others. Most services offer full online documentation of their search commands. You can read the help text on screen while connected, or retrieve it for later study. Make a note about the following general tricks: In conferences and forums: -------------------------- Many services have commands for selective reading of messages. For example, on CompuServe you can limit your search to given sections. You can also select messages to be read based on text strings in the subject titles. The command rs;s;CIS Access from Japan;62928 displays all messages with the text "CIS Access from Japan" in their subject titles starting with message number 62928. Online searching often starts by selecting databases. The next step is to enter search words (or text strings), and a valid time frame (as in "between 1/1/90 and 1/1/91"). The following sample search terms are used on NewsNet: VIDEO* search for all words starting with VIDEO. "*" is a wild-card character referring to any ending of the word. VIDEO* matches words like VIDEOTEXT and VIDEOCONFERENCE. SONY AND VIDEO The word SONY and the word VIDEO. Both words must be present in the document to give a match. SONY WITHIN/10 VIDEO Both words must be present in the text, but they must not be farther apart than ten words. (Proximity operators) IBM OR APPLE Either one word OR the other. Many services let you reuse your search terms in new search commands. This can save you time and money, if there are too many hits. For example: if IBM OR APPLE gives 1,000 hits, limit the search by adding "FROM JANUARY 1st.," or by adding the search word "NOTEBOOK*". In file libraries ----------------- The commands used to find files are similar to those used in traditional databases. Often, you can limit the search by library, date, file name, or file extension. You can search for text strings in the description of the contents of a file, or use key words. Example: You're visiting a bulletin board based on the BBS program RBBS-PC. You want a program that can show GIF graphics picture files. Such files are typically described like this: VUIMG31.EXE 103105 07-15-91 GIF*/TIFF/PCX Picture Viewer/Printer From left to right: file name, size in bytes, date available, and a 40 character description. You can search the file descriptions for the string "gif". You do this by entering the term "s gif all". This will probably give you a list of files. Some will have the letters GIF in the file name. Others will have them in the description field. Using ANDs and ORs ------------------ Boolean searching may seem confusing at first, unless you already understand the logic. There are three Boolean operators that searchers use to combine search terms: AND, OR, and NOT. Use the Boolean operator AND to retrieve smaller amounts of information. Use AND when multiple words must be present in your search results (MERCEDES AND VOLVO AND CITROEN AND PRICES). Use OR to express related concepts or synonyms for your search term (FRUIT OR APPLES OR PEARS OR BANANAS OR PEACHES). Be careful when using the NOT operator. It gets rid of any record in a database that contains the word that you've "notted" out. For example, searching for "IBM NOT APPLE" drops records containing the sentence, "IBM and Apple are computer giants." The record will be dropped, even if this is the only mention of Apple in an article, and though it is solely about IBM. Use NOT to drop sets of hits that you have already seen. Use NOT to exclude records with multiple meanings, like "CHIPS Not POTATO" (if you are looking for chips rather than snack foods). Often, it pays to start with a "quick-and-dirty" search by throwing in words you think will do the trick. Then look at the first five or 10 records, but look only at the headline and the indexing. This will show you what terms are used by indexers to describe your idea and the potential for confusion with other ideas. Use proximity operators to search multiword terms. If searching for "market share," you want the two words within so many words of another. The order of the words, however, doesn't matter. You can accept both "market share" and "share of the market." Searching by email ------------------ MCI Mail and MCI Fax have a program called Information Advantage, under which online services and newsletters can deliver search results and other information over the online services. Dialog, Dun & Bradstreet, NewsNet, and Individual Inc. have signed up for the program. You can request a search by direct email to say Dialog. The search results will be returned to you via MCI Mail or MCI Fax. With Dun and Bradstreet, you call them for a credit report and they send it to you. With History Associates, you send them a message via MCI Mail, and they report to you. Using BITNET discussion lists through Internet ---------------------------------------------- To get a directory of Internet/BITNET mailing lists, send the following email message: To: LISTSERV@VM1.NODAK.EDU Subject: (keep this blank) Text: LIST GLOBAL You will receive a LONG list of available sources of information. A recent copy had over two thousand lines of text. Each mailing list is described with one line. All these mailing lists can be used by email through the Internet. Here is a random selection: Network-wide ID Full address List title --------------- ------------ ---------- AESRG-L AESRG-L@UMCVMB Applied Expert Systems Research Group List AGRIC-L AGRIC-L@UGA Agriculture Discussion AIDSNEWS AIDSNEWS@EB0UB011 AIDS/HIV News ANIME-L ANIME-L@VTVM1 Japanese animedia and other animation news. BANYAN BANYAN-L@AKRONVM Banyan Networks Discussion List BRIDGE BRIDGE@NDSUVM1 Bridge Communication products CHEM-L CHEM-L@UOGUELPH Chemistry discussion EJCREC EJCREC@RPIECS Electronic Journal of Communication FAMCOMM FAMCOMM@RPICICGE Marital/family & relational communication SOVNET-L SOVNET-L@INDYCMS USSR electronic communication list The column "Network-wide ID" contains the names of the mailing lists. "Full address" contains their BITNET email addresses. "List title" is a short textual description of each conference. Keep the list on your hard disk. This makes it easier to find sources of information, when you need them. Subscribing to mailing lists ---------------------------- Each line in the list above refers to a mailing list, also often called 'discussion list'. They work like online conferences or message sections on bulletin boards, but technically they are different. (Read about KIDLINK in Chapter 2 for background information.) All BITNET mailing lists are controlled by a program called LISTSERV on the host computer given in column two above (for example @UMCVMB). They offer "conferencing" with the following important functions: * All "discussion items" (i.e., electronic messages sent to the lists' email address) are distributed to all subscribers. * All messages are automatically stored in notebook archives. You can search these log files, and you can have them sent to you as electronic mail. * Files can be stored in the lists' associated file libraries for distribution to subscribers on demand. Where to send a subscription request, depends on where you are communicating from relative to the host running the LISTSERV. If this host is your nearest BITNET LISTSERV, then send the request to the address in column two by replacing the list name by LISTSERV. Example: AESRG-L@UMCVMB is administered by LISTSERV@UMCVMB. Subscribe (or signoff) by email to LISTSERV@UMCVMB.BITNET . If there is a LISTSERV closer to where you live, then you should subscribe to the nearby system rather than to the remote. This helps keep the total costs of the international network down. Example: You live in Norway. The nearest LISTSERV is at FINHUTC. To subscribe to AESRG-L@UMCVMB, send to LISTSERV@FINHUTC.BITNET . Use the addresses in column two when sending messages to the other members of the discussion lists, but do NOT send your subscription requests to this address!! If you do, it will be forwarded to all members of the mailing list. Chances are that nothing will happen, and everybody will see how sloppy you are. So, you subscribe by sending a command to a LISTSERV. The method is similar to what we did when subscribing to Infonets in Chapter 7. If your name is Jens Jensen, and you want to subscribe to SOVNET-L, send this message through the Internet (assuming that NDSUM1 is your nearest LISTSERV host): To: LISTSERV@NDSUVM1.BITNET Subject: (You can write anything here. Will be ignored.) Text: SUB SOVNET-L Jens Jensen When your subscription has been registered, you will receive a confirmation. From this date, all messages sent to the list will be forwarded to your mailbox. (Send "SIGNOFF SOVNET-L" to this address, when you have had enough.) Some lists will forward each message to you upon receipt. Others will send a periodic digest (weekly, monthly, etc.). To send a message to SOVNET-L, send to the BITNET address in column two above. Send to SOVNET-L@INDYCMS.BITNET Review the following example. Most BITNET lists will accept these commands. Example: Subscription to the China list --------------------------------------- CHINA-NN is listed like this in the List of Lists: CHINA-NN CHINA-NN@ASUACAD China News Digest (Global News) Scandinavians may subscribe to CHINA-NN by Internet mail to LISTSERV@FINHUTC.BITNET . North American users may send their mail to LISTSERV@NDSUVM1.BITNET . If your name is Winston Hansen, write the following command in the TEXT of the message SUB CHINA-NN Winston Hansen When you want to leave CHINA-NN, send a cancellation message like this: To: LISTSERV@NDSUVM1.BITNET Subject: (nothing here) SIGNOFF CHINA-NN NOTE: Send the cancellation command to the address you used, when subscribing! If you subscribed through LISTSERV@FINHUTC, sending the SIGNOFF command to LISTSERV@NDSUVM1 will get you nowhere. Send to LISTSERV@FINHUTC. Never send the SIGNOFF command to the discussion list itself! Always send to the LISTSERV. Monitoring the action --------------------- THINKNET is an online magazine forum dedicated to "thoughtfulness in the cybertime environment." It brings reviews of significant and thought-provoking exchanges within our new electronic nation. This electronic publication is free. If you're interested in philosophy, subscribe by sending a message through Internet to thinknet@world.std.com . Write the following in the TEXT of the message: SEND THINKNET TO Your-Full-Name AT UserId@Your-Internet-Email-Address Example: If your email address is opresno@extern.uio.no and your name Odd de Presno, use the following command: SEND THINKNET TO Odd de Presno AT OPRESNO@EXTERN.UIO.NO THINKNET is also available through the Philosophy conference on The Well, and on GEnie in the Philosophy category under the Religion and Ethics Bulletin Board. (Hard copy versions can be bought through THINKNET, PO BOX 8383, Orange CA 92664-8383, U.S.A.). If you're on The Well, read the topic "News from Around Well Conferences" to learn about new developments. These are some mailing lists that may help you locate sources of interest: NETSCOUT (NETSCOUT@VMTECMEX) The BITnet/Internet scouts. Subscribe by email to LISTSERV@VMTECMEX.BITNET with the following in the TEXT of your message SUB NETSCOUT yourfirstname yourlastname This is where you can discuss and exchange information about servers, FTP sites, Filelists, lists, tools, and any related aspects. HELP-NET (HELP-NET@TEMPLEVM) BITNET/CREN/INTERNET Help Resource. Send email to LISTSERV@TEMPLEVM.BITNET with the text SUB HELP-NET yourfirstname yourlastname The list's main purpose is to help solve user problems with utilities and software related to the Internet and BITNET networks. The library contains several good help files for novice networkers. A great place for new Internet users! Other sources available through the Internet -------------------------------------------- The Interest Groups List of Lists is available by electronic mail from mail-server@nisc.sri.com . Send a message with the following text in the message body: Send netinfo/interest-groups Note that as of April 1993, the file was over 1,100,000 bytes in size. It will be returned to you in moderately sized pieces. You can search the List of Lists by email. Say you're looking for a mailing list related to Robotics. To find out, send a message to LISTSERV@VM1.NODAK.EDU containing the following commands: //ListSrch JOB Echo=No Database Search DD=Rules //Rules DD * search robotics in lists index search robotics in intgroup index search robotics in new-list index Replace the search word 'robotics' with whatever else you may be looking for. The Usenet list of news groups and mailing lists is available on hosts that run Usenet News or NetNews servers and/or clients in the newsgroups news.announce.newusers and news.lists. The members of news.newusers.questions, alt.internet.help, alt.internet.access.wanted, and alt.internet.new-users readily accept your help requests. Alt.internet.services focuses on information about services available on the Internet. It is for people with Internet accounts who want to explore beyond their local computers, to take advantage of the wealth of information and services on the net. Services for discussion include: * things you can telnet to (weather, library catalogs, databases, and more), * things you can FTP (like pictures, sounds, programs, data) * clients/servers (like MUDs, IRC, Archie) Every second week, a list of Internet services called the "Special Internet Connections list" is posted to this newsgroup. It includes everything from where to FTP pictures from space, how to find agricultural information, public UNIX, online directories and books, you name it. Dartmouth maintains a merged list of the LISTSERV lists on BITNET and the Interest Group lists on the Internet. Each mailing list is represented by one line. To obtain this list, send a message to LISTSERV@DARTCMS1.BITNET . Enter the following command in the text of the message: INDEX SIGLISTS InterNIC Information Service maintains an announcement-only service at LISTSERV@is.internic.net called net-happenings. It distributes announcements about tools, conferences, calls for papers, news items, new mailing lists, electronic newsletters like EDUPAGE, and more. To subscribe, send a message to the LISTSERV containing this command: subscribe net-happenings Your Name InterNIC's automated mail service is at MAILSERV@RS.INTERNIC.NET. It allows access to documents and files via email. To use it, send email to the Mailserv with the word "HELP" in the subject field of your mail. How to get more out of your magazine subscriptions -------------------------------------------------- PC Magazine (U.S.A.) is one of those magazines that arrives here by mail. We butcher them, whenever we find something of interest. The "corpses" are dumped in a high pile on the floor. To retrieve a story in this pile is difficult and time consuming, unless the title is printed on the cover. Luckily, there are shortcuts. Logon to PC MagNet on CompuServe. Type GO PCMAG to get the following menu: PC MagNet 1 Download a PC Magazine Utility 2 PC Magazine Utilities/Tips Forum 3 PC Magazine Editorial Forum 4 PC Magazine Programming Forum 5 PC Magazine After Hours Forum 6 PC Magazine Product Reviews Index 7 Free! - Take a Survey 8 Submissions to PC Magazine 9 Letters to the Editor 10 Subscribe to PC Magazine Choice six lets you search for stories. Once you have a list with page/issue references, turning the pages gets much easier. PC Magazine is owned by the media giant Ziff-Davis. PC MagNet is a part of ZiffNet on CompuServe. So is Computer Database Plus, which lets you search through more than 250,000 articles from over 200 popular newspapers and magazines. The oldest articles are from early 1987. The database is also available on CD-ROM, but the discs cover only one year at a time. CDP contains full-text from around 50 magazines, like Personal Computing, Electronic News, MacWeek and Electronic Business. Stories from the other magazines are available in abstracted form only. To search the database, CDP, you pay an extra US$24.00 per hour. In addition, you pay US$1.00 per abstract and US$1.50 per full-text article (1992). These fees are added to your normal CompuServe access rates. ZiffNet also offers Magazine Database Plus, a database with stories from over 90 magazines covering science, business, sport, people, personal finance, family, art and handicraft, cooking, education, environment, travel, politics, consumer opinions, and reviews of books and films. The magazines include: Administrative Management, Aging, Changing Times, The Atlantic, Canadian Business, Datamation, Cosmopolitan, Dun's Business Month, The Economist, The Futurist, High Technology Business, Journal of Small Business Management, Management Today, The Nation, The New Republic, Online, Playboy, Inc., Popular Science, Research & Development, Sales & Marketing Management, Scientific American, Technology Review, UN Chronicle, UNESCO Courier and U.S. News & World Report. In the next chapter, we will present another ZiffNet magazine database: the Business Database Plus. Magazine Index (MI), from Information Access Company (U.S.A.), is another source worth looking at. It covers over 500 consumer and general-interest periodicals as diverse as Special Libraries and Sky & Telescope, Motor Trend and Modern Maturity, Reader's Digest and Rolling Stone. Many titles go as far back as 1959. Although most of the database consists of brief citations, MI also contains the complete text of selected stories from a long list of periodicals. It is available through Dialog, CompuServe, BRS, Data-Star, Dow Jones News/Retrieval, Nexis, and others. Say you so often get references to a given magazine that you want a paper subscription. Try the Electronic Newsstand, which is available by gopher or telnet to gopher.netsys.com. If these Internet commands are unavailable, try mail to staff@enews.com. Finding that book ----------------- Over 270 libraries around the world are accessible by the Internet telnet command. Some of them can also be accessed by Internet mail. This is the case with BIBSYS, a database operated by the Norwegian universities' libraries. I am into transcendental meditation. I'm therefore constantly looking for books on narrow topics like "mantra". To search BIBSYS for titles of interest, I sent mail to genserv@pollux.bibsys.no . The search word was entered in the subject title of the message. By return email, I got the following report: Date: Fri, 21 Jul 93 13:54:18 NOR From: GENSERV@POLLUX.BIBSYS.NO Subject: Searching BIBSYS Search request : MANTRA Database-id : BIBSYS Search result : 5 hits. The following is one of the references. I have forwarded it to my local library for processing: Forfatter : Gonda, J. Tittel : Mantra interpretation in the Satapatha-Brahmana / by J. Gonda. Trykt : Leiden : E.J. Brill, 1988. Sidetall : X, 285 s. I serie : (Orientalia Rheno-traiectina ; 32) ISBN : 90-04-08776-1 1 - UHF 90ka03324 - UHF/INDO Rh III b Gon The Danish library database REX may be accessed through most international packet switching networks. Its Network User Address (NUA) is 23824125080000. When connected, enter RC8000 and press return. Press ESC once. The system will respond with ATT. Enter KB REX, and you're ready to search Dansk Bogfortegnelse since 1980, Dansk Musikfortegnelse since 1980, and ISDS Denmark. BARTON is the library system of Massachusetts Institute of Technology. Its database contains everything received since 1974 except magazine articles, brochures, and technical reports from sources outside M.I.T. Phone: +1-617-258-6700 (1200 bps). Press ENTER a couple of times to access the system. On CompuServe, there is a section for book collectors in the Coin/Stamp/Collectibles Forum, and a Weekly Book Chat section in the ScienceFiction & Fantasy Forum. In the Electronic Mall, you can buy books directly from Ballantine Books, Penguin Books, Small Computer Book Club, The McGraw-Hill Book Company, Time-Life Books and Walden Computer Books. On the Internet, Roswell Computer Books Ltd. (Canada) has an online bookstore with a database of over 7,000 titles (1993). Gopher to nstn.ns.ca, select "Other Gophers in Nova Scotia", and then "Roswell Electronic Computer Bookstore". Failing access to gopher, send your email requests to roswell@fox.nstn.ns.ca . The Book Review Digest (GO BOOKREVIEW) is CompuServe's database of bibliographical references and abstracts of reviews (since 1983). You can search by title, author, and keywords found in the text of book reviews. CompuServe also offers book reviews through Magazine Database Plus. "Books in print" is a North American bibliographic reference database. It is available on BRS and CompuServe. South African Bibliographic and Information Network has a gopher service at info2.sabinet.co.za. FidoNet has COMICS (The Comic Book Echo), BITNET the list Rare Book and Special Collections Catalogers (NOTRBCAT@INDYCMS). NewsNet has the COMPUTER BOOK REVIEW newsletter and on The Well you'll find the "Computer Books" conference. OCLC's WorldCat is a reference database covering books and materials in libraries worldwide. Bookworms may appreciate the BITNET discussion list DOROTHYL (LISTSERV@KENTVM.KENT.EDU), and especially if they like Agatha Christie, Josephine Tey and Dorothy L. Sayers. On Usenet, you will find alt.books.reviews, k12.library, alt.books.technical, rec.arts.books, and misc. books.technical, and more. On the Internet, there are a rapidly growing number of library online public-access catalogs (OPACs) from all over the world. Some provide users with access to additional resources, such as periodical indexes of specialized databases. More than 270 library catalogs are now online (1992). An up-to-date directory of libraries that are interactively accessible through Internet can be had by anonymous ftp from ftp.unt.edu (then: cd library). File name: LIBRARIES.TXT. Check out the end of Chapter 12 for how to get the file by email (ftpmail). You will also find full electronic versions of books. This book is one example. Many texts are courtesy of Project Gutenberg, an organization whose goal is to develop a library of 10,000 public domain electronic texts by the year 2000. Since books are often quite large, they are somewhat bulky for email transfer. If you have direct Internet access, use anonymous ftp instead. Many books are available through the /pub/almanac/etext directory at oes.orst.edu. For more about how to use the Almanac information server, send Almanac@oes.orst.edu the following email command: send guide For a list of books, add the line send gutenberg catalog Among the offerings, you'll find The Complete Sherlock Holmes Mysteries, The Unabridged Works of Shakespeare, Aesop's Fables, Alice's Adventures in Wonderland, The Holy Bible, The Love Teachings of Kama Sutra, The Holy Koran, The Oedipus Trilogy (Sophocles), Peter Pan, Roget's Thesaurus (1911), and The World Fact Book (1990 - CIA). If quite impossible to locate a given book, try the Rare Books and Special Collections Forum at EXLIBRIS@RUTVM1.BITNET. Non-Chinese speaking people will probably classify Chinese poems as 'rare'. Many of them are impossible to read, unless your computer can handle the special characters, and you know their meaning. Still interested? If yes, subscribe to CHPOEM-L@UBVM.BITNET . Be prepared to use your Big5 and GuoBiao utilities. Chapter 11: Getting an edge over your competitor ================================================ We must be willing to risk change to keep apace with rapid change. The key is moderation and balance, supported by sufficient information to allow meaningful feedback. It requires adaption by management and staff in developing the necessary skills and vision. This chapter starts with how to use the networks to manage projects. Next, it treats how to monitor competitors, prospects, suppliers, markets, technologies, and trends. It winds down with marketing and sales by modem. Project coordination -------------------- So far we have mainly been looking at sources of information. Let us start this chapter with some words about 'online conference rooms' for project coordination. Several services offer rental of private conference areas to businesses. Corporations have discovered them to be an efficient way of coordinating a group of people, who are far apart from each other geographically. They are also useful when team members are constantly on the move and hard to gather face to face. Many international companies use such services regularly. The applications are different. They range from tight coordination with suppliers and subcontractors, to development of company strategies and new organizational structures. Renting an online conference room has advantages over doing it in-house. The company does not have to buy software, hardware, expensive equipment for communications, and hire people for to run and maintain a conferencing system. The more international the business, the better. For ideas about how to set up and operate a coordination conference. Study how volunteer organizations do it. One place to check out is KIDPLAN, one of several coordination conferences used by KIDLINK (see Chapter 2 and 5). KIDPLAN is usually most active during April and May each year. This is when their annual projects are being closed down, and new projects are started. Read the dialog between coordinators to get an idea of how the medium is being used. Old conference messages are stored in notebook files. You can therefore have the full coordination dialogs sent you by email. Send all requests for notebook files to LISTSERV@VM1.NODAK.EDU Getting notebook files is a two-step process. In your first message to the LISTSERV, ask for a list of available files. Do this by using the following command in your email: INDEX KIDPLAN The LISTSERV will return a list of files. The following part is of particular interest: 101/2/ KIDPLAN LOG9105B ALL OWN V 80 2397 91/05/14 23:40:22 Started on Wed, 8 May 91 00:11:09 CDT 102/2/ KIDPLAN LOG9105C ALL OWN V 80 3141 91/05/21 20:44:16 Started on Wed, 15 May 91 01:24:51 CDT 104/2/ KIDPLAN LOG9105D ALL OWN V 80 2685 91/05/28 22:34:31 Started on Wed, 22 May 91 17:01:21 +0200 Don't bother about the details. You just want file names, and dates. The file LOG9105B contains all messages from 8 May 1991 until 15 May. If you want all these three files, send another message to LISTSERV with the following lines: GET KIDPLAN LOG9105B GET KIDPLAN LOG9105C GET KIDPLAN LOG9105D The files will be forwarded to your mailbox. Note: Some mailbox services have restrictions on the size of incoming mail. This may prevent you from receiving large notebook files. If this happens, contact your local postmaster for help. Some email systems are unable to forward your return-address correctly to LISTSERV. If you suspect that this is the reason for lack of success, try the following commands: GIVE KIDPLAN LOG9105B TO Your-Correct-Return-Address GIVE KIDPLAN LOG9105C TO Your-Correct-Return-Address GIVE KIDPLAN LOG9105D TO Your-Correct-Return-Address Making it work -------------- Making online conferences and task force meetings work, can be a challenge. Most of the dialog is based on the written word. The flow of information can be substantial thus causing an information overload for some participants. To overcome this, many companies appoint moderator-organizers for their online conferences. This person: Adds value by setting agendas; summarizing points; getting the discussion(s) back on track; moving on to the next point; mediating debate; maintaining address and member lists; acting as general sparkplug/motivator to keep things flowing by making sure that contributions are acknowledged, relevant points are noted, new members are welcomed, silent "Read-Only Members" are encouraged to participate, and the general atmosphere is kept appropriate to the goals of the conference/task force meeting. Great online conferences don't just happen. Hard work is required. A few people must be responsible for getting the meetings fired up and keep the discussion rolling. The meeting's organization may depend on the number of participants, where they come from, the exclusivity of the forum, and the purpose of the "meeting." In large meetings, with free access for outsiders, the best strategy may be to appoint a Moderator-Editor. This person Filters contributions, gathers new information, summarizes scattered contributions, does background research. Filtering may be needed in conferences that are open to customers and media. The main purpose, however, is to help participants cope with the absolute flow of information. A conference can have an educational purpose. If so, you may bring in someone who can add value by bringing experience and expertise to the group. You will also need someone to do all the dirty jobs everyone expects to be done - but never notices until they are not done. This person must keep the show running by serving as a benevolent tyrant, sheriff, judge, mediator, general scapegoat, and by playing a role in setting the general policy and atmosphere of the meeting. Now, back to the 'normal' applications of the online resource. Monitoring what others do ------------------------- The best business opportunities are outside your company, in the external world. We need to monitor customers and markets, find technologies to help develop and build products, research new business actions, find new subcontractors and suppliers, people to hire, and persons to influence to boost sales. In this marketing age, where sales calls cost hundreds of dollars and business-to-business marketers use the telephone or the mails to reach prospects, complete and accurate market lists are most valuable commodities. There are many other questions: What are our most important customers and their key people doing? What new products are they promoting? Who are their joint-venture partners? What else may influence their willingness to buy from us? What prices are our major suppliers offering other buyers? Should we get other sources for supplies? What major contracts have they received recently? Will these influence their ability to serve our needs? What new technologies are available now and how are they being used by others? Threats are the reverse side of opportunities. What are our competitors doing? What products and services have they launched recently? Are they successful? What are our competitors' weaknesses and strengths? What relationships do they maintain with our most important customers? How is their customer support functioning, and what methods are they using in their quality assurance? Each company has its own priorities when it comes to watching the external environment. The information needs are different from company to company, depending on what products and services that are offered, the technological level of the company, the markets that they address, and more. Needs and priorities also differ by department and person, for example depending on whether a user is the president, a marketing manager, product manager, sales man, or has a position in finance or production. Remember your priorities when going online to search. You cannot possibly capture and digest all information that is there. Your basic problem remains to find the right information in the right form at the right time. Build your own, local 'database' -------------------------------- It does not take much effort to check one hundred different topics from multiple online sources on a daily basis. The computer will do it for you. Also, you do not have to read all stories as carefully as you would with printed material. Most experienced users just read what is important now, and save selected parts of the retrieved texts on their hard disks for later reference. We handle printed material differently. Most of us make notes in the margins, underline, use colors, cut out pages and put into folders. These tricks are important, since it is so hard to find information in a pile of papers. Not so with electronic information. With the right tools, you can locate information on your computer's hard disk in seconds. In seven seconds, I just searched the equivalent of 2000 pages of printed text for all occurrences of the combined search words 'SONY' and 'CD-ROM'! My tool was the shareware program LOOKFOR (see Chapter 14). It searched through 4.2 megabyte on my 80486-based notebook computer. If you use an indexing program, the search may be completed even faster. I guess you can see it coming. My personal databases usually give more direct value during my working day, than what I have on paper, and have available online. My hard disks contain megabytes of texts retrieved from various online services, but only what I have decided to keep. This private database therefore contains more relevant information per kilobyte than the online databases I'm using. Searching the data often gives enough good hits to keep me from going online for more. | I repeat: You will often get better results when searching your | | own subset of selected online databases, than by going online | | to get information. It is usually easier and faster. | On the other hand, your in-house database will never be fully up- to-date. Too many things happen all the time. Also, the search terms used for your daily intake of news will never cover all future needs. Occasionally, you must go online to get additional information for a project, a report, a plan. Updating your database means going online often to find new supplementary information. | Regular monitoring gives the highest returns, and is required | | if you want to have an edge over your competitors. | For beginners, the best strategy will often be to start with the general, and gradually dig deeper into industry specific details. Let us now review some good hunting grounds for information, and how to use them. Clipping the news ----------------- Several online services offer 'clipping services'. They select the news that you want - 24 hours a day - from a continuous stream of stories from newspapers, magazines, news agencies and newsletters. Several services make news immediately available, when they have been received by satellite. The delay previously used to protect the interests of print media is disappearing quickly. Online services usually deliver news sooner than in print media, radio or TV. You select stories by giving the online service a set of search terms. The hits are then sent to your electronic mailbox, for you to retrieve at will. 'Clipping' gives an enormous advantage. Few important details escape your attention, even when you cannot go online daily. The stories will stay in your mailbox until you have read them. 'Clipping' on CompuServe ------------------------ CompuServe's Executive News Service (ENS) monitor more than 8,000 stories daily. They use sources like Deutsche Press-Agentur, Kyodo News Service, TASS, Xinhua News Agency, the Washington Post, OTC News-Alert, Reuters Financial News Wire, Associated Press, UPI and Reuters World Report, IDG PR Service, Inter Press Service (IPS), Middle East News Network and European Community Report. One of them, Reuters, has 1,200 journalists in 120 bureaus all over the world. They write company news reports about revenue, profit, dividend, purchases of other companies, changes in management, and other important items for judging a company's results. They write regular opinions about Industry, Governments, Economics, Leading indicators, and Commerce. Reuters also offers full-text stories from Financial Times and other leading European newspapers. Its Textline is a database with news from some 1,500 publications in over 40 countries. It includes Reuters' own news services, and has translated abstracts of stories from some 17 languages. The database reaches back 10 years and is updated at around one million articles per year. (Textline is also available on Nexis, Data-Star, and Dialog.) Another one, the IDG PR Service, sends out high-tech related news gathered by the staffs of IDG's magazines. InterPress Service covers Third World countries. Middle East News Network integrates the contents of 28 information sources covering this region of the world. The Executive News Service lets you define up to three 'clipping folders'. Supply up to seven 'key phrases' that define your interests. These key phrases will be used when searching stories as they are sent. Hits will be 'clipped' and held in a folder for you to review at your convenience. Each folder can hold 500 stories. When creating a clipping folder, you set an expiration date and specify how many days a clipped story is to be held (maximum 14 days). To browse the contents of a folder, select it from the menu. Stories can be listed by headlines or leads. Select those you want to read, forward to others as email, or copy to another folder. Delete those that you do not need. Defining key phrases is simple. The important thing is not to get too much nor too little. General phrases will give you many unwanted stories while too narrow phrases will cause you to miss pertinent stories. Let me illustrate with an example: The phrase APPLE COMPUTERS will only clip stories that have the words APPLE and COMPUTERS next to each other. This may be too narrow. Specifying just APPLE or just COMPUTERS would be too broad. Entering APPLE + COMPUTERS is a better phrase since the words can appear anywhere in the story, and not necessarily next to each other. ENS carries an hourly surcharge of US$15/hour over base connect rates. Clipping on NewsNet ------------------- NewsNet greets users with this opening screen: ----------------- - N E W S N E T - ----------------- W O R K I N G K N O W L E D G E ***New--Electromagnetic Field Litigation Reporter (EY86) tracks developments in every important legal action involving electromagnetic radiation from power lines, cellular phones, VTDs, and radar and microwave equipment. ***The title of HH15 has been changed to Cancer Researcher Weekly. This service was formerly entitled Cancer Weekly. ***Important work in the blood field throughout the world is covered by Blood Week (HH44), including research, literature, and upcoming events. ***TB Weekly (HH45) is an internationally-focused newsletter that concentrates on tuberculosis-related news and research, including business developments. New Services on NewsNet: TB Weekly (HH45) Blood Weekly (HH44) Electromagnetic Field Litigation Reporter (EY86) Chapter 11 Update (FI82) Tobacco Industry Litigation Reporter (HH48) Trade and Development Opportunities (GT50) For details on new services, enter READ PB99# or HELP followed by the service code. NewsNet's clipping service, NewsFlash, will automatically search all new editions of newsletters selected for monitoring. The hits will be sent to your mailbox, and be retained there for up to ten weeks besides the current week. Your selection of newsletters can be extended to include news stories from United Press International (UPI), Reuters News Reports, Associated Press, Business Wire, PR Newswire, and others. For some time, I clipped newsletters in the telecommunications group using the keywords 'Victoria' (an American communication project) and 'KDD' (the Japanese telecom giant). When I called NewsFlash to check, it typically reported: NEWSFLASH NOTIFICATION **************************************************************** 4 Total Newsflash hits. Use STOP to stop and delete all. New Hits = 4 Saved Items = 0 TE01 7/17/89 == VICTORIA == Headline #1 COOKE SELLS CABLE HOLDINGS TO 6-MEMBER GROUP FOR NEARLY $1.6 BILLION Jack Cooke's cable systems will be sold to 6-member consortium TE11 7/17/89 == VICTORIA == Headline #2 BOCs' PROGRESS TOWARD INTELLIGENT NETWORK ARCHITECTURE INTERTWINED WITH DIFFICULT INTERNETWORKING NEGOTIATIONS, PENDING DECREE COURT EC89 7/18/89 == KDD == Headline #3 KDD OPENS NY/LONDON OFFICES TOKYO, JAPAN, 1989 JUL 14 (NB) -- Kokusai Denshin Denwa (KDD), EC89 8/22/89 == KDD == Headline #4 FOREIGNERS CAN BUY INTO KDD TOKYO, JAPAN, 1989 AUG 17 -- The Japanese government is planning Enter Headline numbers or ALL to read, MORE, AGAIN, SAVE, STOP, or HELP --> NewsNet's databases grow by more than 400 stories per day. Your search profiles may contain an almost unlimited number of subjects. Delivery of hits is concurrent. Twenty-four hours a day, seven days a week. Sprintmail's clipping service (U.S.A.) scans stories from more than 15 international newswires. FT Profile's E-mail Alert searches daily on that particular day's issue of the Financial Times. Dow Jones News/Retrieval has NewsScan (//CLIP). It can deliver by fax or email to a mailbox on another online service. On GEnie, use QuikNews Express, a personalized news clipping service that is integrated with the Quik-Comm System email service. Clarinet, a commercial news service available through Usenet, also has a clipping program. When clipping is impossible --------------------------- Many services do not offer clipping. Here, your alternative is various methods of regular selective reading. Many conferencing systems let you select messages by keywords. BIX has Keyword Indexer. It let you search public conferences after a key word or phrase and report hits. Then it offers you to review (or retrieve) messages of interest. CompuServe's forums have efficient 'read selective' and 'quick scan' commands. Another trick is to limit your reading to specific message sections. The high forum message volume is a special problem on this service. Old messages are regularly deleted to make room for new ones. (Often called "scroll rate.") Some popular forums do not keep messages for more than a couple of days before letting them go. You must visit often to get all new information. Many bulletin boards can be told to store unread messages about given topics in a compressed transportation file. This file can then be retrieved at high speed. Special communication programs (often called offline readers) and commands are available to automate this completely. Powerful scripts (see Chapter 12) can do automatic selection of news stories based on the occurrence of keywords (e.g., a company name) in headlines. I have developed such a system for selecting news from the Online Today magazine on CompuServe. Subscription services --------------------- It is useful to dig, dig, and dig for occurrences of the same search words, but digging is not enough. Unless you periodically scan "the horizon," you risk missing new trends, viewpoints and other important information. It can be difficult to find good sources of information that suits your needs. One trick is to watch the reports from your clipping services. Over time, you may discover that some sources bring more interesting stories than others. Take a closer look at these. Consider browsing their full index of stories regularly. If your company plans exportation to countries in Asia, check out MARKET: ASIA PACIFIC on NewsNet. The newsletter is published monthly by W-Two Publications, Ltd., 202 The Commons, Suite 401, Ithaca, NY 14850, U.S.A. (phone: +1-607-277-0934). Annual print subscription rate: US$279. The index itself may be a barometer of what goes on. Here is an example. Note the number of Words/Lines. Do these numbers tell a story? July 1, 1993 Head # Headline Words /Lines ------ ---------------------------------------------------- ------------ 1) THE PHILIPPINES IS AT A TURG POINT 616/78 2) CHINA AND KOREA WILL LEAD REGIONAL ECONOMIC BOOM 315/41 3) ASIAN COMPENSATION IS STILL LOW, BUT RISING QUICKLY 303/38 4) CONSUMER GOODS WON'T BE ALL THE CHINESE BUY 221/29 5) WOMEN BEAR THE BRUNT OF CAMBODIA'S TROUBLES 284/34 6) TAIWAN MAKES A MOVE TOWARD THE CASHLESS SOCIETY 243/29 7) TIPS ON MANAGING CULTURAL HARMONY IN ASIA 264/37 8) TAIWANESE BECOME MORE DISCERNING, HARDER TO REACH 217/27 9) DIRECT MARKETING HEADED FOR GROWTH IN SINGAPORE 205/27 10) TOURISM IN MALAYSIA WILL GROW 610/76 11) CHONGQING: FUTURE POWERHOUSE 2708/342 It is a good idea to visit NewsNet to gather intelligence. Review indexes of potentially interesting newsletters. Save them on your hard disk for future references. You never know when they may be of use. The newsletters within computers and electronics bring forecasts of market trends, evaluation of hardware and software, prices, information about IBM and other leading companies. You will find stories about technological developments of modems, robots, lasers, video players, graphics, and communications software. The Management section contains experts' evaluation of the economical climate with forecasts, information about foreign producers for importers, tips and experiences on personal efficiency, management of smaller companies, and office automation. Other sections are Advertising and Marketing, Aerospace and Aviation, Automotive, Biotechnology, Building and Construction, Chemical, Corporate Communications, Defense, Entertainment and Leisure, Education, Environment, Energy, Finance and Accounting, Food and Beverage, General Business, Insurance, Investment, Health and Hospitals, Law, Management, Manufacturing, Medicine, Office, Publishing and Broadcasting, Real Estate, Research and Development, Social Sciences, Telecommunications, Travel and Tourism, Transport and Shipping. Several newsletters focus on specific geographical areas: * MARKETING RESEARCH REVIEW (Analyzes and evaluates commercially available marketing research and technology assessment reports. Publisher: High-Tech Publishing Co., U.S.A.) * GERMAN BUSINESS SCOPE and THE WEEK IN GERMANY * NEWS FROM FRANCE * COUNTRY RISK GUIDE: EUROPE * EASTERN EUROPE FINANCE, and EASTERN EUROPEAN ENERGY REPORT * EUROPEAN COMMUNITY: BUSINESS FORECAST * INVESTEXT/EUROPEAN REGION * PRS FORECASTS: EASTERN EUROPE, and WESTERN EUROPE * AFRICA NEWS ON-LINE * PRS-FORECASTS: MID-EAST & NORTH AFRICA * PRS-FORECASTS: SUB-SAHARAN AFRICA * THE EXPORTER (Published by Trade Data Reports. Monthly reports on the business of exporting. Functionally divided into operations, markets, training resources, and world trade information.) * MID-EAST BUSINESS DIGEST * LATIN AMERICA OPPORTUNITY REPORT * COUNTRY RISK GUIDE: SUB-SAHARAN AFRICA * COUNTRY RISK GUIDE: ASIA & THE PACIFIC * PRS FORECASTS: ASIA & THE PACIFIC * PRS'S POLITICAL RISK LETTER * SALES PROSPECTOR (Monthly prospect research reports for sales representatives and other business people interested in commercial, and institutional expansion and relocation activity. Separate services grouped by geographic area in the United States and Canada.) Many newsletters are focusing on technology intelligence: Sensor Technology ----------------- Provides updates on research being conducted in this rapidly evolving technology. Besides analyzing advances in the field, it offers ideas on how this technology can improve products and services. Advanced Manufacturing Technology --------------------------------- Reports on desktop manufacturing, computer graphics, flexible automation, computer-integrated manufacturing, and other technological advances that help increase productivity. High Tech Materials Alert ------------------------- Reports on significant developments in high-performance materials, including alloys, metallic whiskers, ceramic and graphite fibers, and more. Concentrates on their fabrication, industrial applications, and potential markets. Futuretech ---------- Provides briefings on focused, strategic technologies that have been judged capable of making an impact on broad industrial fronts. Includes forecasts of marketable products and services resulting from the uncovered technology and its potential impact on industry segments. Advanced Coating & Surface Technology, Electronic Materials Technology News, Flame Retardancy News, High Tech Ceramics News, Innovator's Digest, Technology Access Report, Inside R&D, Japan Science Scan, New Technology Week, Optical Materials & Engineering News, Performance Materials, Surface Modification Technology News, Genetic Technology News, Battery & Ev Technology, and much more. Newsletters on CompuServe ------------------------- Many newsletters are being made available through forums' file libraries on CompuServe. Consequently, they are a little harder to locate. Some examples (1993): Abacus Online - Quarterly newsletter on executive computing. (In the Lotus Spreadsheet forum, Library 3.) Anime Stuff - News and reviews of Japanese animation software. (Comics/Animation Forum, Library 5.) Communique - The quarterly newsletter of the International Association of Business Communicators U.K. Chapter. (PR and Marketing Forum, Library 8.) Distance Education Newsletter - Analyzes the impact of elec- tronic communication on academic research. (Telecommunications Forum, Library 13.) Hint: To find newsletters in the IBM PC oriented forums, enter GO IBMFF to search. Select "Keyword" as search criteria, and enter "newsletter". Add further keywords to narrow the search to your areas of interest. CompuServe also has other file find services. Databases with an international orientation ------------------------------------------- Information Access provides reference databases to businesses. You can search 10 databases with full-text stories, abstracts, and indexes from international magazines. PROMPT (Overview of Markets and Technology) is the largest of them. It provides international coverage of companies, markets and technologies in all industries. The other databases cover areas like Aerospace and Defense, Advertising and Marketing, New Product Announcements, Industry Forecasts and Time Series. The Information Access' databases are available through online services like Dialog, Data Star, Financial Times Profile (England), Nikkei in Japan and on the Thomson Financial Networks. They are regularly published on CD-ROM. ZiffNet offers the Business Database Plus through CompuServe. Here, you can search in full-text stories from around 550 North American and international publications for industry and commerce (1993). The articles are about sales and marketing ideas, product news, industry trends and analysis, and provide company profiles in areas such as agriculture, manufacturing, retailing, telecommunications, and trade. This is a partial list of the database's magazines: Agra Europe, Agribusiness Worldwide, Air Cargo World, Belgium: Economic and Commercial Information, Beverage World, Beverage World Periscope Edition, British Plastics & Rubber, British Telecom World, Business Perspectives, CCI-Canmaking & Canning International, CD-ROM Librarian, Chain Store Age - General Merchandise Trends, Coal & Synfuels Technology, Communication World, Communications Daily, Communications International, Consultant, Cosmetic World News, Dairy Industries International, Direct Marketing, The Economist, Erdol und Kohle, Erdgas, Petrochemie: Hydrocarbon Technology, EuroBusiness, Euromoney, Europe 2000, European Cosmetic Markets, European Rubber Journal, Financial Market Trends, Financial World, Finnish Trade Review, Food Engineering International, Forest Industries, Gas World, Graphic Arts Monthly, The Printing Industry, High Technology Business, IDC Japan Report, Inc., International Trade Forum, Investment International, Israel Business, Japan Economic Newswire, Journal of International Business Studies, Journal of Marketing Research, Kyodo, Market Research Europe, Medical World News, MEED Middle East Economic Digest, Middle East Agribusiness, OECD Economic Outlook, The Oil and Gas Journal, Oilweek, Petroleum Economist, Plastics World, Purchasing World, Report on the Austrian Economy, Restaurant-Hotel Design International, Royal Bank of Scotland Review, Seafood International, Soviet Aerospace & Technology, Supermarket Business Magazine, swissBusiness, Training: the Magazine of Human Resources Development, World Economic Outlook, World Oil. Dialog's ASIA-PACIFIC DATABASE covers business and economics in Asia and the Pacific. It contains over 80,000 references from newspapers, magazines and other sources in North America and international. The Asia-Pasific Dun's Market Identifiers on Dialog is a directory listing of about 250,000 business establishments in 40 Asian and Pacific Rim countries. The Middle East News Network publishes daily news, analysis and comments from 19 countries in the Middle East produced by Arabic, Hebrew, Turkish and Persian press. You can read these news through Reuters (e.g., on NewsGrid/CompuServe), Down Jones News/Retrieval, and Information Access. The Jerusalem Institute for Western Defence provides a monthly newsletter with research of the Arab press. It has unedited quotes from around the Arab world. Write LISTSERV@jerusalem1.datasrv.co.il to subscribe (Command: sub arab-press Firstname Lastname). The International Reports financial newsletter may be read and searched on NewsNet, Information Access, and Mead Data Central. NewsNet also has Brazil Service, Mexico Service, Country Risk Guides and Weekly International Market Alert. Use CompuServe's Consumer Report to spot trends in the consumer markets for appliances, automobiles, electronics/cameras, home. EventLine (IQuest, CompuServe) monitors international conferences, exhibitions, and congresses. The Boomer Report concentrates on the habits of the "the baby-boom generation." Affaersdata in Sweden offers the Swedish-language service "Export-Nytt," which brings short news stories about export/import from all over the world. Information providers are the Swedish Export Council, the Norwegian Export Council, and the Suomen Ulkomaankauppaliitto in Finland. Orbit has an English language database of Japanese technology. It contains abstracts of articles, patents and standards from more than 500 Japanese magazines. Dow Jones News/Retrieval brings full-text stories from the Japan Economic Newswire. The Business Dateline contains news from more than 150 regional business publications in the United States and Canada. The ABI/Inform business database (UMI/Data Courier) contains abstracts and full-text articles from 800 business magazines and trade journals. The sources include the Asia Pacific Journal of Management, Business Korea, and the World Bank Research Observer. Market research reports from Frost & Sullivan are available through Data-Star. It produces over 250 market reports each year, in 20 industrial sectors. These reports cover results of face-to- face interviews with manufacturers, buyers and trade association executives, supplemented by a search and summary of secondary sources. Glasnost in the former Soviet Union produced a long list of new online information sources, including: The Soviet Press Digest (stories from over 100 newspapers), The BizEkon Reports (financial news from 150 business and financial magazines), SovLegisLine (law), BizEdon Directory (detailed information about over 2,500 companies, who want to do business with foreign companies), Who's Who in the Soviet Union and The Soviet Public Association Directory. Some of these may have changed their names now. Contact Mead Data Central (Nexis/Lexis), Data-Star, FT Profile and Reuters for more information. DJNR also offers full text from the Paris-based International Herald Tribune, publications like the Guardian and others from the United Kingdom, and from sources in the former Soviet Union (like Soviet Press Digest, BizEkon News, Moscow News, and others.) E-EUROPE is an electronic communications network for doing business in Eastern Europe countries, including CIS. Its purpose is to help these countries in their transition to market economies. It links business persons in Western Europe-Asia-North America with those in Eastern Europe. Subscription is free and for anyone. To subscribe to E-EUROPE, send email LISTSERV@PUCC.PRINCETON.EDU (or a LISTSERV closer to you) with the body the message containing this line SUB E-EUROPE YourFirstName YourLastName E-EUROPE also offers International Marketing Insights (IMI) for several countries in this region, including Russia, Hungary, Czech, Germany, Estonia, Poland, Bulgaria, and Lithuania. The IMI reports important developments that have implications for traders and investors. Typically brief and to-the-point, they are prepared by American Embassies and Consulates. The reports cover a wide range of subjects, such as new laws, policies and procedures, new trade regulations, changing dynamics in the marketplace, recent statements by influential parties and emerging trade opportunities. For a list of E-EUROPE IMI offerings, send the following commands to LISTSERV@PUCC.PRINCETON.EDU: GET E-EUROPE IMI IMI update notices are not posted to E-EUROPE, but you can subscribe to updates to these files. The English-language newsletter "St. Petersburg Business News" is published in Russia by the Committee for foreign economic affairs of LECC. For information and subscription, send email to aag@cfea.ecc.spb.su . The Financial Izvestia weekly, the joint publication of London Financial Times and Moscow-based Izvestia, is available by email. The complete feed includes the full text of all articles published in the Russian language newspaper, and financial and statistical tables on the commodities and financial markets. Write Legpromsyrie at root@sollo.soleg.msk.su for information. Several Russian newspapers, including Commersant Daily, Nega, and press services like Postfactum and Interfax, have digests or complete editions available for Relcom network subscribers, usually for a nominal fee. Interested in the European Common Market? ----------------------------------------- Pergamon Financial Data Services, NewsNet, and others, offer Dun & Bradstreet European Marketing Online. It contains company profiles of around two million European companies. Pergamon's ICC U.K. Company Databases contains data on over 140,000 British companies with up to ten years' financial history, addresses, key people, mother firms/subsidiaries, stock quotes. Its Comptex News Service brings daily business news from the European arena. The UK Company Library on CompuServe has financial information about more than 1.2 million British companies from sources like Extel Cards, ICC British Co. Directory and Kompass UK. Data-Star offers Tenders Electronic Daily, a database of European Community contract offers. Investext offers a series of bulletins authored by Europe Information Service (EIS): European Report (biweekly), Tech Report (Monthly), Transport Europe (monthly), Europe Environment (bimonthly), European Energy (bimonthly), European Social Policy (monthly), and Multinational Service (monthly). Investext is available through Data-Star, Lexis/Nexis, Dow Jones News/Retrieval, Dialog, NewsNet, and others. The German Company Library (on CompuServe) offers information about some 48,000 German companies from databases like Credit Reform and Hoppenstedt's Directory of German Companies. Its European Company Library contains information about over two million companies in the area. Nexis (Mead Data Central International) brings news and background information about companies and the different countries in Europe. Their Worldwide Companies database contains company profiles, balance sheets, income statements, and other financial data on the largest companies in 40 countries. Nexis also has Hoppenstedt German Trade Associations directory, four more newsletters from the Europe Information Service: Europe Energy, Europe Environment, Transport Europe and European Insight, a weekly brief on European Community-related happenings, and Notisur, a biweekly news and analysis report on South American and Caribbean political affairs. LEXIS (also Mead) has databases with information about English and French law, and other law material from Australia, New Zealand, Ireland, Scotland and North America. Their Martindale-Hubbell Law Directory has information on over 700,000 lawyers and law firms worldwide. The directory can be used for referrals, selection of associate counsel, and evaluation of competitive counsel. Check out KOMPASS EUROPE when planning exports to the EEC. Its database contains details about companies in Sweden, Denmark, Germany, United Kingdom, Holland, Belgium, France, Spain, Italy, Sweden and Norway. (On Dialog) ILINK has the EEC-I conference (Discussion about the European Common Marked). Profile offers full-text searches (and a clipping service) in stories from Financial Times. The database is being updated daily at 00:01. Those exporting to the EEC need to master German, French, Italian, and Spanish besides having a common knowledge of English. Conversation is the easy part. The problem is writing, and especially when the task is to translate technical expressions to the languages used within the Common Market. For help, check out the Eurodicautom online dictionary through ECHO (and others.) Start by selecting a source language (like English), and up to seven languages for simultaneous translation. The translation is word-for-word, but may be put in the correct context if required. ECHO also offers the European Commission's CORDIS database (Community Research and Development Information Service) containing information about research results within scientific and technical fields. Keywords: Race, Esprit, Delta, Aim, Fast, Brite, Comett, Climat, Eclair and Tedis. CONCISE (COsine Network's Central Information Service for Europe) is a pan-European information service to the COSINE scientific and industrial research community. COSINE (Cooperation for Open Systems Interconnection Networking in Europe) is part of the European Common Market's Eureka project. CONCISE brings information about the COSINE project, networks, conferences, networking products, special interest groups, projects databases, directories, email services and other networked services in Europe. It is intended for researchers in all fields, from astronomers through linguists and market researchers to zoologists. CONCISE is accessible by email through the Internet, by FTP, and interactively (telnet) over the European academic and research networks, over public data networks and over telephone links. (See ECHO in appendix 1 for more information.) The mailing list EC@INDYCMS.BITNET is dedicated to discussion of the European Community, and is open to all interested persons. Subscribe by email to a LISTSERV close to where you live, or to LISTSERV@INDYCMS.BITNET. Scandinavia ----------- Most countries have several local language news services. In Norway, Statens Datasentral lets you search stories from the NTB news agency. Aftenposten, a major newspaper, offers full-text stories from their A-TEKST database, from Dagens Naeringsliv (DNX), and the Kapital magazine. Before meeting with people from Norsk Hydro, go online to get recent news about these companies. It will only take a couple of minutes. What you find may be important for the success of your meeting. If you know the names of your most important competitors, use their names as keywords for information about recent contracts, joint venture agreements, products (and their features), and other important information. KOMPASS ONLINE offers information about over 180,000 companies and 34,000 products in Scandinavia, Finland, Germany, Switzerland, and Great Britain. The information is presented in the local language of the different countries. KOMPASS is used by easy menus. You can search by * company name * product or service (optionally using an industry classification code for companies or products) * number of employees, type of business, postal number, telephone area code, export area, year of incorporation, bank affiliation. The database is available through Affaersdata (Sweden). New users pay a one time fee of around US$85. Searching costs around US$3.00 per minute. The TYR database on the Finnish service VIEXPO (tel.: +358 67 235100) offers information about 2,500 companies in the Vaasa and Oulu regions with addresses, phone numbers, contact persons, main products, revenues, and SIC industry classification codes. We can go on like this. The list of available services is long in many countries. How to monitor your competitors ------------------------------- Sales managers need to know what competitors are doing. Lacking this knowledge, it is risky to maneuver in the market. Start by making a strategy for online market intelligence. Here are some practical hints: (1) Select online services that offer clipping of stories and information based on your search words or phrases. Examples: NewsFlash on NewsNet, //TRACK on Dow Jones News/Retrieval, The Executive News Service on CompuServe. Use these services for automatic monitoring of stock quotes and business news. (2) Read what investment analysts and advisors write about your competitors. Most markets are well covered by databases and other sources of information. (3) Read what competitors write about themselves. Their press releases are available from online databases in several countries. (4) Compare your competitors with your own company and industry. Items: stock prices, profits, revenue, etc. (5) Regularly monitor companies and their particular products. (6) Watch trend reports about your industry. Search for patterns and possible niches. (7) Save what you find on your hard disk for future references. Can you get everything through the online medium? Of course not! Don't expect to find production data, production formulas, detailed outlines of a company's pension plan, or the number of personal computers in a company. Such information rarely finds its way to public databases. Intelligence by fax ------------------- Financial Times' Profile has Fax Alert. Predefine your interests using search words. Stories will be cut and sent to your personal fax number whenever they appear. Price depends on the number of characters transmitted. Other online services offer similar services. The Bulletin Board as a sales tool ---------------------------------- Many companies - large and small - use bulletin board systems as a marketing instrument. Here is an example: The San Francisco-based Compact Disk Exchange (Tel.: +1-415-824- 7603) offers a database of used CD records. Members can call in to buy at very low prices. They can sell old CDs through the board or buy from other members. (1992) Marketing and sales by modem ---------------------------- The Americans have a gift for this. You meet them in online forums all over the world, in person or through agents, and especially in computer oriented conferences and clubs. Their main strategy is reference selling. Make key customers happy, and make sure they tell others. In Chapter 5, I told you what happened when a member wrote about his upgrade to a 425 megabytes hard disk in CompuServe's Toshiba forum. It made me place my order with his preferred seller. One common sales strategy is to be constantly present in relevant conferences, and spend a generous amount of time helping others. This takes time. By proving competence and willingness to help, you build a positive personal profile. This profile is the key to business, information about competitors and other benefits. To drop quickly into a conference to post an "advertisement," is a waste of time. The message may be read by some, but chances are that you will be criticized (in public) for having 'polluted their environment' with a commercial message. Besides, the volume of information in the best conferences for your marketing effort is probably too high to make traditional advertisements worth the while. Electronic mail --------------- Here is a list of other useful applications of electronic mail: * to distribute quickly lists of important prospects to your sales force, * to avoid lengthy telephone conversations, * to receive order information faster and more efficiently than by traditional mail or fax, * to distribute quickly reports and memos to key people all over the world, * to send new prices and product announcements to customers, * to exchange spread sheets and analyses between users of personal computers. If this isn't enough, ask for information from the International Business Network at 70724.311@compuserve.com (or, at 70724,311 on CompuServe). Chapter 12: Practical tips ========================== - Quick transfers with a minimum of errors - Rescuing lost files - Copyright and other legal matters - Unwritten laws about personal conduct - Privacy - Fax services weigh less than your printer - File transfers through the Internet Speed and safety ---------------- Read about MNP, CCITT V.42, and V.42bis in appendix 2. These are popular methods for automatic error correction and compression of data. Compression gives faster transfers of data. To use them, your modem must have these features built-in. They must also be enabled in the modem of the service that you are calling. Compression is particularly helpful when sending or receiving text, for example news stories and messages in conferences. They ensure faster transfers. They are not of much help when transferring precompressed texts and programs. They may even make file transfers with protocols like ZMODEM, Kermit, and XMODEM impossible. If this happens, temporarily turn off the MNP and V.24/V42bis settings in your modem (more about this in appendix 2). Some online services let users retrieve conference messages using a special get or grab function. This function often comes in two versions: * Grab to display: New messages and conference items are received in an uninterrupted stream without stops between items. Retrieval of text can happen at maximum speed. * Grab to compressed file: New messages and conference items are selected, automatically compressed and stored in a file. This file is then transferred using ZMODEM or similar protocols. Some services offer unattended online work with a variation of the "get compressed file" method. Read about 'offline readers' in chapter 16 for more about this. The more advanced your software is, the more time it will take to learn how to use it. The rewards are lower telephone costs, faster transfers, and less time spent doing technical online work. Recommended. Different needs, different solutions ------------------------------------ Frank Burns of the American online service MetaNet is spokesperson for the strategy SCAN - FOCUS - ACT. On your first visits to a new online service, you SCAN. The goal is to get an overview of what is being offered and find out how to use it most efficiently. Notes are made of interesting bulletins, databases, conferences, messages, news services, public domain and shareware programs, games, and more. Capture all of it to disk. Don't study it until disconnected from the service. Evaluate the material to prepare for your next moves: FOCUS and ACT. As you learn about offerings, users and applications, your use of the service changes. What was interesting on your first visits, lose out to new discoveries. Some applications may stay as 'regular online functions', like when you decide to read a given news report on Monday mornings. Here are some other hints: * Find out what you do NOT have to know and have enough self- confidence immediately to discard irrelevant material. Walk quickly through the information. Select what you need now, store other interesting items on your hard disk, clip references, and drop the remainder of your capture file. * Learn when and how to use people, computers, libraries and other resources. Prepare well before going online. Note that the online resource may not necessarily be the quickest way to the goal. If you want the name of Michael Jackson's latest album, you may get a faster answer by calling a local music shop. . . . * Make an outline of how to search the service before going online. If required, start by going online to collect help menus and lists of search commands (unless you already have the printed user information manual). Study the instructions carefully, plan your visit, and then call back. Often, it may be useful to do trial searches in online data, which you have previously captured to your hard disk. Do this to check if your use of search words is sensible. Who knows, you may even have what you are searching for right there. Besides, it is imperative that you use the correct search terms to find what you're looking for. Write your search strategy on a piece of paper. If you know how to write macros for your communications program, consider writing some for your planned search commands. - Few people can type 240 characters per second. Using macros may save you time, frustration and money. * It may be wise to do your search in two steps. On your first visit: Get a LIST of selected headlines or references, and then log off the service. Study your finds, and plan the next step. Then call back to get full-text of the most promising stories. This strategy is often better than just 'hanging online' while thinking. When you feel the pressure of the taximeter, it is easy to make costly mistakes. * Novices should always go the easiest way. Don't be shy. Ask SOS Assistance services for help, if available. Invest in special communication programs with built in automatic online searching features. They are designed to make your work easier. * Limit your search and avoid general and broad search terms. It is often wise to start with a search word that is so 'narrow' that it is unlikely to find articles outside your area of interest. Your goal is not to find many stories. You want the right ones. When everything fails --------------------- Data communications is simple - when you master it. Occasionally, however, you WILL lose data. You may even experience the worst of all: losing unread private email on your hard disk. A while ago, this happened to a friend. She logged on to her mailbox service using the communications program Procomm. After capturing all her mail, she tried to send a message. For some reason, the computer just froze. It was impossible to close the capture file. She had to switch the power OFF/ON to continue. All retrieved mail was obviously lost. The other day, I had a similar experience. After having written a long and difficult letter, something went wrong. The outfile was inexplicably closed. The resulting file size was 0 bytes. Both problems were solved by the MS-DOS program CHKDSK run with the /F option. If you ever get this problem, and have an MS-DOS computer, try it. It may save your day. Copyright notices and legal stuff --------------------------------- Most commercial online services protect their offerings with copyright notices. This is especially so for database information and news. Some vendors make you accept in writing not to store captured data on a local media (like diskettes or hard disks). Others (like Prodigy in the U.S.) force clients to use communication software that makes it impossible to store incoming data to disk. The reason is simple. Information providers want to protect their income. In most countries, you can quote from what others have written. You can cut pieces out of a whole and use in your own writing. What you cannot do, however, is copy news raw to resell to others. If an online service discovers you doing that, expect a law suit. Read copyright notices to learn about the limitations on your usage of data that you receive. Unwritten laws about personal conduct ------------------------------------- Some services let their users be anonymous. This is the case on many chat services. If you want to pose as Donald Duck or Jack the Ripper, just do that. Many free BBS systems let you register for full access to the service during your first visit. It is possible to use any name. Don't do that. Use your true name, unless asked to do otherwise. It's impolite and unrespectful of the other members to participate in online discussions using a false identity. Being helpful is an important aspect of the online world. The people you meet 'there' use of their time to help you and others. Often free. The atmosphere is one of gratitude, and a positive attitude toward all members. If you use rude words in public, expect your mailbox to fill with angry messages from others. Those who respond carefully to personal attacks, will never regret it. Don't say things online that you would not have said in person. REMEMBER: Words written in a moment of anger or frustration can be stored on at least one hard disk. Your 'sins' may stay there for a long time - to resurface when you least want it to. Here are some guidelines (often called 'online netiquette'): * If mail to a person doesn't make it through, avoid posting the message to a conference. Keep private messages private. * It is considered extremely bad taste to post private mail from someone else on public conferences, unless they give you explicit permission to redistribute it. * Many users end their messages with some lines about how to get in touch with them (their email address, phone number, address, etc.). Limit your personal "signature" to maximum four lines. * Do not send test messages to a public conference, unless they are set up to serve this purpose. * If someone requests that readers reply by private email, do that. Do not send to the conference, where the request appeared. * When replying to a message in a public conference, many users 'quote' the original message prefixed by '>' or another special character, as in You wrote: >I strongly believe it was wrong to attack >Fidel Castro in this way! When you quote another person, edit out whatever isn't directly applicable to your reply. By including the entire message, you'll only annoy those reading it. * Note that if you USE ALL CAPITAL LETTERS, people will think you're shouting. Finally, smile with me about the following story: According to Time magazine (7/19/93, p. 58), three women who corresponded with Mr. X over the network discovered his duplicity and went public on the network. The incident sparked a lively debate over electronic etiquette (and ruined Mr. Casanova's chances for further romance). Fax services weigh less than your computer's printer ---------------------------------------------------- Many online services let you send electronic mail as fax messages. This is an interesting feature when in that far away place without a printer. Send the draft contract or other texts to your hotel's fax machine or to your client's office to get a printout on paper. Privacy ------- The level of online privacy differs by network, service, and application. Whatever these services may claim, always expect that someone, somewhere, is able to watch, even record. All mailbox services have at least one person authorized to access your personal mail box in case of an emergency. Most of the time they not have a right to read it without your permission, but they can. In some countries, mailbox services may let outsiders (like the police) routinely read your private email to check for 'illegal' contents. In this respect, email is not safer than ordinary mail. The good news is that most 'inspectors' and 'sysops' are good, honest people. On the other hand, it is useful to know your situation. It is not safe to send sensitive information (like credit card details) by private electronic mail. True, the probability that an outsider should get hold of and take advantage of such information is small, but it definitely is not 100 percent safe. Encrypt your email to protect sensitive information. Always assume that someone is recording all that is being said in online conferences, chats, and other interactive social gatherings. In chats, anyone using a personal computer as a terminal can log the conversation, or use screen dump just to capture 'interesting parts'. Many PC users can scroll back the screen. They can wait and decide whether to save the conversation in a file until after the conversation has taken place. With these capabilities widely available, users of chats and talk should always assume that their conversations are being recorded. Do not say indiscreet things in small, informal discussions. It may be recorded and reposted under embarrassing circumstances. The program PGP has become the defacto international Internet standard for public key encryption. For more on privacy, check out ETHICS-L@MARIST.BITNET. The files RFC 1113 through 1115 are about 'Privacy enhancements for Internet electronic mail' (see appendix 1 for how to get them). Usenet has alt.privacy (Privacy issues in cyberspace), and comp.society.privacy (Effects of technology on privacy). File transfers through the Internet ----------------------------------- The Internet is a term used of a network interconnecting hundreds of thousands of computer centers around the world. These centers use different types of hardware and software, and different methods of file transfer. What method to use for file transfers depends on the source host and the type of mailbox computer that you are using. The transfer usually takes place in two steps: 1. Transferring files from a remote data center to your local mailbox host. 2. Transfer from your local mailbox host to your personal computer. Transfer to your local mailbox host ----------------------------------- We will explain the most commonly used method for those who only have access to file transfer by email. This method can be used by everybody. Transferring plain text files is easy. Files with imbedded word processor control codes will often have to be treated as binary files. More about this later. To transfer a text to another user, just send it as an ordinary electronic message. Getting text files from a library on a remote computer is a special case. Often, they can be had by sending a retrieval command (like GET) by email to the remote center. After a while, the file will be sent to your mailbox by email. You can read it like you read other mail. Example: The file BINSTART can be retrieved from the KIDART directory on a computer center in North Dakota, U.S.A. It explains how to retrieve binary art files from the KIDLINK project's file libraries. To get the file, send a message to the center's mail forwarding 'agent' at LISTSERV@VM1.NODAK.EDU. Use the following command syntax in your text: GET To get the BINSTART file, write the following command in the TEXT of your message: GET KIDART BINSTART Note that the command has to be put in the body of the mail and not in the subject field. The file will arrive in your mailbox after a while. Also, note that lists of available files are usually available by using an "INDEX " command. To get a list of files in the KIDART directory, add the command "INDEX KIDART" in your message above. Non-LISTSERV libraries may use other retrieval commands. Often, you can get information of what commands to use by sending the word HELP to a mailing service (in the Subject area or in the body of the text). Transferring binary files ------------------------- Users with a direct connection to the Internet usually have access to the FTP command (File Transfer Protocol). If they do, they often prefer FTP for transfers of binary files like computer programs, pictures, sound, and compressed text files. The bad news is that the FTP command is not available to all users of Internet mail. These will have to use "FTP by mail," or other tricks to transfer such files. More about this in a moment. The FTP command gives access to a special file transfer service. It works in the following way: 1. Logon to your local email host and enter 'FTP remote- center-code'. Example: 'ftp 134.129.111.1'. This command will connect you to the center in North Dakota mentioned above. Here, you will be prompted for user name and password. Enter 'anonymous' as user name, and use your real name or email address as password. This way of logging on to retrieve files is called "transfers by anonymous ftp." You can use this method on many hosts on the Internet. 2. When connected to the remote center, you can request transfer of the desired file to your mailbox. Before doing that, you may have to navigate to a given file catalog (cd directory), and tell the host that the transfer is to be binary (bin). Finally, initiate the transfer by entering a "GET file name" command. 3. The file will be transferred to your local mailbox computer at high speed. When the transfer is done, you logoff from the remote center to "get back" to your mailbox computer's prompt line. Now, you can transfer the file to your personal computer using communications protocols like Kermit, XMODEM, ZMODEM or whatever else is available. Binary files transferred as text codes -------------------------------------- If you do not have access to FTP, you must use ordinary email for your binary transfers. Usually, email through the Internet can only contain legal character codes (ASCII characters between number 32 - 126). Most systems cannot transfer graphics or program files directly, since these files normally contain binary codes (which are outside this ASCII character range). The solution is to convert binary files to text codes using a utility program called UUENCODE. The encoded file can be sent by ordinary email, as in this example: From TRICKLE@VM1.NoDak.EDU Fri Aug 16 16:32:37 1991 Date: Fri, 16 Aug 1991 09:31:34 CDT To: opresno@EXTERN.UIO.NO Subject: Part 1/1 SIMTEL20.INF PD: The file PD:SIMTEL20.INF has been uuencoded before being sent. After combining the 1 parts with the mail headers removed, you must run the file through a decode program. ------------ Part 1 of 1 ------------ begin 600 SIMTEL20.INF M6T9I;&4Z(%-)351%3#(P+DE.1B`@("`@("`@("`@("`@("`@("!,87-T(')E M=FES960Z($IU;F4@,C@L(#$Y.3%=#0H-"B`@(%M.;W1E.B!$=64@=&\@9&ES M:6P-"AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH: M&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH:&AH: 6&AH:&AH:&AH:&AH:&AH:&AH:&AH:&@(Z ` end -------- End of part 1 of 1 --------- When you receive a message with uuencoded text, download it to your personal computer's hard disk. Use an editor to cut out the codes and paste them to an empty work file. Using the example above, the first line in your work file should contain: begin 600 SIMTEL20.INF and the last line should contain end Now, use a utility program called UUDECODE to convert the file back to its binary form (or whatever). More information about uuencoding and uudecoding is given in the BINSTART file mentioned above (for MS-DOS computers). It has a detailed explanation, BASIC source code for making the program UUDECODE.COM, and a DEBUG script for those preferring that. Versions of UUDECODE are also available for other types of computers. Transfer of pictures -------------------- Denis Pchelkin in Protvino (Russia) is 11 years old, has two cats and one dog, and has contributed beautiful computer graphics art to the KIDLINK project (1992). The file ART019 in the KIDART catalog of the North Dakota center contains one of his creations. It is a UUENCODEd picture in GIF graphics format. You can retrieve Denis' creation by sending a GET command to LISTSERV@VM1.NODAK.EDU . Put the following command in the TEXT of your message: GET KIDART ART019 The LISTSERVer will return a message filled with strange uu-codes. We assume that you have already retrieved the BINSTART file, and that you have a version of the conversion program. Your next step is uudecoding: Read the message into an editor or a viewing program. Cut and paste the codes to a work file. Keep the original as backup. Use the UUDECODE.COM program to convert ART019 into a GIF formatted file. Now, view the picture with your favorite graphics program. (Or use shareware GIF-viewers like PICEM, VUIMG, and VPIC for MS-DOS computers. These programs are available from CompuServe's IBM forums and other services.) Sending binary files in uuencoded form has weaknesses. One is the lack of automatic error correction when sending/receiving e- mail. Noise on the line can easily distort the picture. File size is another problem. UUENCODEing typically increases file sizes by almost one third. Some mailbox systems restrict the length of individual messages that you can receive, and the file may just be too big. If the uuencoded file gets too big, some services can (or will by default) split it up in parts and then sent separately. Tons of uuencoded public domain and shareware programs are available for retrieval by ordinary email. FTP by email ------------- While some services accept commands like GET KIDART ART019 by email, this is not so with the many so-called FTP libraries. Many of them can only be accessed by FTP. Services exist that will do FTP transfers by email for those not having access to the FTP command. The most popular is at DEC Corporate Research in the U.S. For more information, write a message to one of the following addresses: ftpmail@decwrl.dec.com ftpmail@cs.uow.edu.au In the TEXT of your message, put the word "HELP". FTPMAIL lets you uuencode binary files for transfers. It can split large files up into several messages, thus helping you around local restrictions on the size of each incoming mail message. Chapter 13: Cheaper and better communication ============================================ Packet data services and data transportation services like Tymnet Outdial, Infonet, Internet, and PC Pursuit may help keep costs down. About reducing the cost of using mailing lists. Many users access online services by calling them directly. A lot pay extra for long distance calls to other cities and countries, even when this means inferior transmission quality (like when noise characters degrade the data). Others investigate other routings for their data. One option is the packet data networks. Most countries have Public Data Networks (PDNs) operated by local telecommunications authorities. These services are often cheaper than direct calls for some applications, but more expensive for others. Before using a packet data network, you'll need to establish a "Network User Identification" (NUI) with the PDN carrier. You must also know the Network User Address (NUA) of the hosts that you want to access. In Scandinavia, the local PDNs are called Datapak. They can be accessed by direct local calls or through leased lines. To personal users, direct calls are least expensive. A leased line may be cost efficient when the daily volume is high, like in a company. When you communicate with online services through a PDN, the latter will split your data and bundle it in standard envelopes or 'packets'. Each packet is marked with a code and sent out into the data stream. Based on this code, the packet is routed from computer center to computer center until it reaches its final destination. There, the information will be reassembled into its original form before being handed over to a user or online service. It is almost like traveling by train. The price per packet or traveler is lower than what it costs to rent the whole train for your trip. National telecommunications monopolies were the first to offer packet data services. Their rates were moderately lower than for long distance calls, but it was hard to find the relationship between real costs and prices. This is still the situation in many countries. Throughout the world, efforts to privatize nationwide phone networks continue. In many countries, this has given us some interesting competitors offering attractive rates for similar services. Their rates differ considerably from country to country, as does the quality of transmissions. The advantage of using packet data also varies considerably, by application and by country. The best routing for retrieval of online news may be impossibly expensive for chats or complex online jobs. We can offer no hard rules of thumb, except this: Compare rates regularly! What is cheapest? ----------------- Some networks charge by the hour, while others charge by volume (number of characters transferred per minute). When volume is low, your best bet is to use network services with a low price per minute and high prices for volume. When volume is high, you may be better off using those charging by the minute. To estimate costs reliably, you'll need statistics. Since your usage probably differs from what others do, start accumulating experience data now. Like this: On services only charging for connect time ------------------------------------------ Capture trip information to a log file. Register the following information: * number of minutes connected * modem speed * number of characters transmitted. Some communication programs can do this automatically for you. On services charging for time and volume ---------------------------------------- Log the following information: * number of minutes connected * modem speed * number of segments or packets (measurements of volume) You need this to estimate the average volume of data transferred by minute. Here are some general experiences and hints: Long streams of data without stops are cheaper through services that only charge by the minute. Retrieving software is a typical high volume application. Trips that include navigation from conference to conference, with a little bit of up- and downloading here and there, make the average transfer speed fall dramatically. It's like driving through a big city at 150 kilometers per hour. Red lights will reduce the average speed considerably. The actual transferred volume of text per minute will differ from place to place (geographically), and often also from call to call. It depends on factors like: * How fast you can enter commands and how much time you spend staring at the display before pressing keys, * How long it takes for an online service to react to your commands. For example, the response time on CompuServe at 04:00 GMT on a Friday morning (it is evening in the U.S.) is much worse than at 10:30 GMT on a Sunday morning. Then, most users are asleep. * The load on your packet data network while you use the service (or the amount of noise and retransmission, when calling direct), * The type of modem you are using (speed, level of MNP), * The number of commands you (or your scripts) have to enter during your online visit. An increase in the number of commands, reduces the average transfer speed. * The amount of transfer overhead for color and screen handling (like, VT-100 codes) that is transferred with your text. * Your use of menus and help texts while online, or whether you come as "expert" with a minimum of prompts. It's impossible to calculate the practical effects of these items. You will just have to bear them in mind when estimating typical jobs, measuring speeds, calculating costs, and comparing networks. Finding the optimal network for our needs, will take time, but is well worth the effort. I think the figures may surprise you. The network services in this chapter will often give you better quality transfers than a direct call. On the other hand, calling direct may give more characters transferred per minute. The average speed tends to drop dramatically when using a packet data service. Using national packet data services ----------------------------------- Most commercial online services can be reached through national PDNs, but you may have problems finding the correct NUA (Network User Address) to get there. Few PDNs have a directory of available "electronic telephone numbers" for you to consult. The Norwegian PDN, Datapak, used to be my only alternative for access to foreign online services, and I thought that the cost was acceptable. Not so anymore. My applications require that data be pumped back and forth at maximum speed. On network services charging by a combination of volume and time, 80 percent of my costs are typically for volume, while 20 percent is for connect time. When I log out after a successful visit to CompuServe through Datapak, the two services give me similar reports: Thank you for using CompuServe! Off at 10:11 EST 24-Nov-87 Connect time = 0:15 CLR PAD (00) 00:00:14:55 537 75 The last line comes from Datapak. It tells that I have received 537 segments and sent 75. The "Segment" is Datapak's volume measure. A segment contains up to sixty-four characters and/or carriage returns. The price is calculated accordingly. At today's prices, Datapak is still my cheapest alternative calling CompuServe for chats. I use Datapak when connecting to TWICS in Tokyo, as the only alternative today is direct calls at a prohibitive cost. Once i-Com (see below) starts offering outdial to Japan, I expect this service to be substantially cheaper. The slower your modem speed, the more attractive is Datapak compared with direct calls. To get access to a national PDN, you must have a user identification and a password. (Getting temporary access to PDN services while traveling abroad is often hard and expensive.) | Note: If you have access to a national PDN, but need | | information about PDNs in other countries, try Hostess, the | | Global Network Service's information service from British | | Telecom in England. The NUA is 02342 1920101013 (02342 is | | the Data Network Identifier Code section of the address.) | | Username or password is not required to use this service. | Outdial through PC Pursuit -------------------------- Sprintnet (formerly GTE Telenet) lets American users call bulletin boards in North America at lower rates through their PC Pursuit service. They pay a modest subscription to call a local number for access to PC Pursuit. Once connected, they can enter an electronic phone-number to connect to a so-called 'outdial modem' in another city. Once connected to the outdial modem, they can give it dialing commands and have it call any local number. This way, they can use PC Pursuit to call an online service in the area, or the private modem of a friend. We call PC Pursuit an Outdial service. Such services normally offer lower rates for access to remote bulletin boards than what it costs to call by long distance. Besides, they reduce the chances for noise on the line. Outdial through i-Com --------------------- i-Com offers outdial to North American online services by reselling capacity from Tymnet's network (owned by British Telecommunications PLC). In the United States, Galaxy Telecomm Corp. offers a similar service under the name Starlink. Outdial to numbers in Japan and Europe is planned. i-Com markets its services to users in Europe and Japan, and have local access in Brussels, Paris, Lyon, Milano, the Hague, Eindhoven, Zurich, Geneva, London, Belfast, Birmingham, Bristol, Cambridge, Edinburgh, Leeds, Frankfurt, Cologne, Munich, Madrid, Stockholm, Copenhagen, and more. The basic fee for access to the service is US$25.00 per hour (1992). You don't pay volume charges. The monthly subscription fee is US$8.00. You can pay using VISA or MasterCard/Eurocard. In Norway, I have used i-Com to connect to The Well in San Francisco, MetaNet in Virginia, EXEC-PC in Wisconsin, and SciLink in Toronto, Canada. At the time, i-Com was cheaper than direct calls and Datapak for access to these services. While an ID on your local PDN is only valid in your area or country, your i-Com ID can be used all over the world including several cities in North America. Once your plane has landed in Milano, you can dial the local i-Com node to connect to your favorite service. i-Com also has a bulletin board (US$13.00/hour). These are some of its services: * Search a database to find BBS numbers in a given area of interest, or to locate outdial numbers in a given city or area code. * Conferences about how to use North American bulletin boards. * Retrieval of shareware and public domain software. * Online shopping of American goods at American prices. Cheaper access to CompuServe ---------------------------- Wherever CompuServe has local access points, you'll be better off using these. You do not have to sign any special agreements. Your CompuServe ID is all you need. Payment for using these services will appear on your CompuServe bill. CompuServe has special deals with a list of network services, like InfoNet Europe (formerly Computer Sciences Corp.), Istel, FALNET, FENICS, CompuPass, LATA Networks, Tymnet/Sprintnet. Enter the command GO LOG on CompuServe to get access information, and GO RATES for rates. I have been using CompuPass from Japan, CompuServe's own network in the United States, Istel, InfoNet, and PDN services in Europe. When at home, I usually use CompuServe's 9600 bps node in Stockholm, Sweden. It is even cheaper than calling Oslo for a 2400 bps node for most of my jobs. There is no surcharge when accessing at non-prime time, and US$7.70 per hour during prime time (weekdays 08:00 to 19:00 local time). In addition, I pay long distance rates to call the node. CompuServe has no extra charges for volume. | Whenever CompuServe opens a new node in your vicinity, or | | upgrades the modem speed on one of their nodes, look at the | | effects on your total costs. | | | | Use software for automatic access and navigation (like TAPCIS,| | OzCIS, or ATO). They give higher volume per minute and make | | your accesses even more cost efficient. | Before leaving for a business trip, visit CompuServe to find local access numbers in your destination cities. The list of countries includes Australia, Belgium, Canada, Denmark, Finland, France, Germany, Hong Kong, Italy, Japan, Mexico, Holland, South Africa, Spain, Sweden, Switzerland, and England. You can also access CompuServe through i-Com and other outdial services. CompuServe has exchange of electronic mail with Internet. You can also access the service by telnet to hermes.merit.edu (binary transfers are impossible, though). IXI - a European alternative to PDN ----------------------------------- IXI is an X.25 data network for European academic, industrial and governmental research centers. It is sponsored by the EEC under the ESRIN project, and is operated by the Dutch PTT. IXI interconnects national research networks, many national public data networks and several specialized international networks. It works like a national PDN service, but uses its own Network User Addresses. Echo, STN, DIMDI, Data-Star and other database vendors can be accessed through IXI. The service is not available to most users having email access through the Internet. Using DASnet to cross network boundaries ---------------------------------------- DA Systems forwards electronic mail and files (also binary files) across mailbox system boundaries for customers. They can send your mail to several large in-house systems, information networks, and over 60 commercial mailbox systems in 30 countries. These are some systems on their list: ABA/net, Alternex (Brazil), ATT Mail, BIX, BITNET, CESAC (Italy), CIGnet, ComNet (Switzerland), CONNECT, Dialcom, Deutsche Mailbox, Dialcom, Envoy 100, EIES, EasyLink, Euromail (Germany), FredsNaetet (Sweden), Galaxy, GeoNet (hosts in Germany, England, U.S.A.), GreenNet, INET, INFOTAP (Luxembourg), Mailbox Benelux, MCI Mail, MercanMail (Asia), MBK Mediabox (Germany), MetaNet, Nicarao (Nicaragua), NWI, OTC PeaceNet/EcoNet, Pegasus (Australia), PINET, Portal, PsychNet, San Francisco/Moscow Teleport, Telexphone (France), TeleRede (Portugal), Telehaus Nordhorn (Germany), Telemail, TEXTEL (the Caribbean), TWICS (Japan), UNISON, UUCP, Web (Canada), The WELL, Internet. This list may suggest lack of connectivity between networks that do indeed have connections. For example, Internet email may easily be sent to ATT Mail, Alternex, BIX, BITNET, FredsNaetet, GeoNet, GreenNet, and many others on this list. Connectivity changes constantly. Check to see if you really need it, as this service is far from free. DASnet also lets you send email as telex, fax and by ordinary mail. They charge you by the number of characters transferred, and the destination address. (Contact Anna B. Lange, DA Systems, Inc., U.S.A. Tel.: +1-408-559-7434, or write her at AnnaB@11.DAS.NET). FidoNet - grassroots playground ------------------------------- FidoNet is an amateur network consisting of tens of thousands of bulletin boards all over the world. The network is "loosely coupled," meaning that most of the participating boards are not always connected. They call each others at regular intervals to exchange mail, often in the middle of the night when the rates are low. Most FidoNet boards have conferences, and allow you to send mail to users of other systems. NetMail is a term often used for private FidoNet email. EchoMail is used about its international conferences. The selection of echomail conferences on a given FidoNet board can be as unique as the rest of the system. RelayNet -------- is another global network of bulletin boards. It offers exchange of email between systems. Messages and conference items entered on one system will automatically be copied to other participating boards. Your costs for "talking" with others in other parts of the world are very small. Other grassroots networks ------------------------- It doesn't take much to set up a bulletin board service, and it is as easy to connect BBS systems to each other in a dial-up network for regular exchanges of email, files and conferences. All over the world, grassroots networks keep popping up with names like ILINK, AmNet, Suedd MB-Verbund, Starmail, MagicNet, A- NET, MausNet, Zerberus-Netz, SMBX-NET, BASA-NETZ, you name it. Many boards offer access to more than one grassroots network, as well as to the Internet. Thus, the ability to send global email is extended to new users every day. Other services -------------- The PDN Connect-USA competes with Starlink in North America. (Connect-USA Communications, Inc., 2625 Pennsylvania NE Suite 225, Albuquerque, New Mexico. 505-881-6988 (voice), 505-881-2756 (FAX), 505-881-6964 (BBS). ) Global Access is a similar service reselling time on the Sprintnet network in North America. Reducing the cost of using mailing lists ---------------------------------------- The problem of subscribing to mailing lists is that all discussion items come to you in individual messages. Each message comes with its own mailer header, and this information is generally completely useless. (Read "Returned mail" in Chapter 7 for details.) Newer versions of the BITNET LISTSERV software provide commands that solve this problem: SET DIGEST ---------------------- This command is sent to a LISTSERV to make all daily messages come to you in one, single message. Example: Say you've joined KIDCAFE@vm1.nodak.edu, which usually has a large number of messages each day. Send the following command to the LISTSERV: SET KIDCAFE DIGEST It will typically reduce the number of lines received from this mailing list by around 50 percent. SET INDEX --------------------- This command is sent to a LISTSERV to get a daily list of messages, like in this example from KIDCAFE: Index Date Size Poster and subject ----- ---- ---- ------------------ 22839 06/22 26 From: David Chalmers Subject: Conor Dublin Ireland Based on this list, you can use the LISTSERV's search commands to retrieve individual messages of interest. These commands are similar to those used for searching in chapter 7. For more about searching mailing lists' message bases, send a message to LISTSERV@vm1.nodak.edu with the following command in the text of your mail: GET KIDLINK TIPS Some LISTSERVs offers simplified search commands and macros to make retrieval of individual messages simpler. Chapter 14: Keep what you find ============================== Little is gained by being skillful at locating and accumulating information, and then becoming drowned in an avalanche of data that one cannot manage - or use. This chapter starts with how to build a personal data base on your own hard disk. We continue by investigating strategies for finding interesting information on your disk, before winding down with some words about what separates good information from bad. Search and throw away --------------------- To novices, everything is difficult. During the first online trips, they may feel as if moving to the other side of the globe to start over: They need new newspapers, magazines, information sources, and services. Trial and error are required to find online gold mines. As you get more experience, focus tends to shift from getting information to digesting. Getting the data gets 'into your fingers', and doesn't bother much anymore. The number of retrieved lines increases. The only bad news is that your reading speed remains at the same old level. In our time, people tend to talk more than they listen, and you usually find more information than knowledge. Therefore, say NO to irrelevant information. It is seldom worth keeping. There is generally no good reason to learn things that you really don't need to know. Practice "selective ignorance." Regularly evaluate your online sources critically, and discard those costing you more than they are worth. Concentrate on those giving the best returns. Adjust the frequency with which you visit selected services to match their usefulness. What used to be daily visits, may have to be downgraded to once per week or month. Consider replacing daily news monitoring by clipping services. Plan 'overview' and 'details' with different frequencies. 'Overview' refers to online trips to get an impression of what generally goes on. An example: My script system is set for automatic visits to the CompuServe Toshiba forum. Whenever I visit, it 'digs out' unread messages based on key words on the item's subject line. During 1991, it searched for these strings: '5100', T2000', and '425'. Once, This gave the following message to read: #: 29550 S6/Hi-Power Notebooks 05-Oct-91 17:27:30 Sb: #T2000SX Recharger Fm: Steve Kitahata 75166,1741 To: All I tried to order the battery recharger for my T2000SX from Jade Computer last weekend. The sales rep said it would take about a week, so I called today to check up on it. He told me that I could only buy the recharger with the car adapter as a bundled set for $260. They had both advertised in their flyer as separate items, which they should be. Has anyone heard of this? Does anyone know of any sources that have the battery recharger available? Any help would be appreciated. Thanx. -- Steve My script found the search word "T2000" in the subject line's text (Sb: #T2000SX Recharger), and subsequently selected the message. Once per month, the same system "scans the horizon" to give me an idea of what is going on. This is done by requesting a list of subjects being discussed. Here is part of one such list: 29555: DOS 5 Upgrade 6 replies 29540: TDOS Upgrade questions 3 replies 29585: Toshiba DOS 5.0 ships! 1 reply 29586: DOS 5.0 Upgrade Solution 29580: ToshibaDOS=bad business 8 replies 29581: DOS 5 / Stacker 1 reply Reading the list, allows me to see if new and interesting topics are up for discussion. If I use Stacker and want contact with other users, I can request message number 29581 and the subsequent reply (1 reply). That should give me some email addresses. | Several advanced communication programs and offline readers | | have built-in quick scan features. For example, TAPCIS does | | this just fine in CompuServe forums. | | | | When retrieving conference messages from bulletin boards using | | 1stReader at high speed, like 9600 bps or above, then the cost | | of downloading all new items may be insignificant. Therefore, | | you might just as well do it. | | | | Later, when reading the captured mail, 1stReader lets you | | select messages to read from a list of subjects. You can save | | what you want to keep, and delete the rest. | By regular scanning subject headers you reduce the risk of missing important trends, for example because authors were using other terms on the subject line than expected. Scanning also lets us discover if the discussion is heading off in other, interesting directions. After a while, you'll have a set of sources, persons, and tools that will provide you with what you need. This is your personal infrastructure of electronic information. Now, you must maintain and cultivate it. Store incoming information -------------------------- Chances are that you will retrieve more information than you can read. Sometimes it takes weeks for me to get up to date with my own readings. If you visit several online services, consider storing the data in files with different names. Use part of the file name to show the source of this information. If visiting a service regularly, consider using the date as part of the file names. This will make it easier to select, read and search them in a useful sequence. | Example: Say you're regularly visiting TWICS in Tokyo. What you | | download on November 10, you may store in a file named | | | | TW1110.TMP | | | | My scripts do this automatically. On some services, they also | | split retrieved data into URGENT and MAY BE READ LATER files. | | Private mail from TWICS is stored in NB1110.TMP. By storing | | private mail separately, it is easier to see if somebody wants | | a quick reply. | All file names in this example have the extension .TMP (temporary). This signifies that these files are unread. When I read them, and select parts for permanent storage on my hard disk, I use different names. Often, I use the year, or a month/year code in the file name extension. For example, the file DIALOG.93 contains information from DIALOG collected during 1993. Postprocessing the data ------------------------ The data capture is completed, and the retrieved data is stored on the hard disk in more or several files. Your next task is to * Read the received texts, * Cut and paste selected parts to archive or work files, * Prepare responses to your electronic mail. This may include quoting part of the incoming messages in your replies. * Finally, delete all temporary files. Many advanced programs have these features built in. If not, you may use your favorite word processor, or something else. There are many alternatives. LIST is my favorite MS-DOS shareware file viewer program. It can be downloaded from most bulletin boards. Using LIST, it is difficult to destroy your precious retrieved data while reading, cutting and pasting. | MORE ABOUT LIST: | | Assume that all input data is stored in the disk catalog C:\IN | | and that you're using the file name convention suggested above. | | Type LIST and press Enter. A list of file names will appear on | | your screen. Press S to sort the list, and then D to have them | | sorted by creation date. The newest files are at the bottom of | | the list. | | Move the cursor (using the Arrow keys) to the input file | | that you want to read and press Enter. Scroll up and down in the| | file by pressing the PgUp/PgDn or the arrow keys. | | Let's assume that you are reading TW1110.TMP right now. | | On your screen is a piece of information that you want to | | keep for future reference. Mark the text with ALT-M commands | | (keep the ALT key pressed down, while pressing M), and then | | ALT-D. LIST will ask you for a file name. You enter TWICS.93, | | and the text is appended to what is already there. | | This method allows you quickly to mark and append parts | | of your input file to various archive files. Press ESC to | | return to the file list when through, then press D. LIST asks | | if you really want to delete the file. Press Y, and TW1110.TMP | | is gone. | | LIST lets you find information stored in your archives | | (string search). What you find can be marked and copied to a | | work file. It can also be set to invoke an editor or a word | | processor for the selected file. | Reuse of data on your hard disk ------------------------------- Over time your personal archives will grow in size. You begin to experience the benefits of having all this information on your hard disk. Yesterday's news is today's history, and may be used in many interesting ways. One business executive regularly monitors key technologies, customers, competitors, and suppliers. He does it by tapping sources like KOMPASS, Associated Press, and Reuters. Interesting bits of information are regularly stored on his disk. Tomorrow, there is an important meeting with a major customer. First, a quick search through the personal customer database to be reminded of important events since the last meeting. An unfamiliar person is also going to be present. Maybe there is some background information, for example about a recent promotion. Then, a quick check on major competitors. Maybe they are up to something that he needs to know about. With efficient tools for searching your hard disk, finding information takes only a few seconds. If you are still left with open questions, go online to complement. On MS-DOS computers, you can search the files with WordPerfect, LIST, the DOS utility FIND, and a long list of other programs. I prefer programs that let me search for more than one word at the time, like in HYDRO AND PETROCHEMICAL AND CONTRACT, or EXXON OR MOBIL. | MY FAVORITE: My favorite search utility is LOOKFOR. It can | | be downloaded from many bulletin boards. The MS-DOS program | | is small, fast, and is superior for searches in DOS text files.| | Store your finds in work files, or print them out on paper. | | LOOKFOR is not an indexing program. It is ready to search | | anywhere, anytime. | Discipline and organization is required to get the most out of your file archives. You must decide what to do with each piece of information: Should it be printed out and be read in front of the fireplace this evening, or should it be circulated? Should it be stored on your hard disk, or be refined before storage? Use standard file names that are easy to remember. If you don't, risk having to view files to find out what they contain. It may take longer to find a piece of information in a casual file on a large disk, than look up a piece of information on paper in your inbox. Therefore, finish handling your capture file while you read it on your screen: Send the pieces to their final destination. Make immediate transfers to your TO-DO files. Give the original file a name that makes it easier to move later. Have a procedure that prevents duplication of effort. Desinformation, deception and errors ------------------------------------ Always use several sources of information. Some people write to lead you astray. The online world exposed some interesting incidents that came out of the former Soviet Union before the attempted coup in 1991. Desinformation hurts everybody and comes from all sides. Even professional news agencies, like Associated Press, Reuters and Agence France-Presse, regularly stumble. Most news is written by journalists reporting what they have seen, read or heard. Their interpretation of the situation may be wrong. Supplement online news with what knowledgeable people say (by email or in conferences), when knowing the facts is important. Another point: Errors will occasionally be discovered and reported by the news sources, but always after the fact. Always store these reports in your archives, and make it a rule to search to the end when looking for something. Otherwise, you may never discover these corrections. Chapter 15: You pay little for a lot! ===================================== Calculating costs ----------------- Those living in Norway may read up to twenty-six pages of news from Associated Press in the United States and Financial Times (England) for US$ 0.64, or less. The trick is to dial long distance to a 9600 bps node in Sweden when the telephone company and CompuServe's non-prime time rates are in effect. At 9600 bps, you may transfer text at up to 960 characters per second. One page of text (size A-4) holds around 2200 characters. A typical news story is one to two pages of text. | Users watching the 'taximeter' can use online services at a | | very low cost. For many, global communication is almost free.| Reading exactly the same news through another network or service, may cost you 300 percent more. Through yet another online service, the cost may double again. A full issue of the NewsBytes newsletter is around 150,000 characters, or 68 pages of text. Retrieving it from a local BBS typically costs me around 29 cents. Retrieving the full text from CompuServe would cost me over 500 percent more. Using NewsNet for the job, at 2400 bps through Datapak, would increase my current cost by more than US$30.00. The time of day may be important. Some services have different rates for access during the day, the evening, and the weekend. Use your calculator often. When you pay by the minute -------------------------- When using bulletin boards, phone charges are often the only cost items. Some boards require a subscription fee for full access to the system. Still, it is easy to calculate the costs of your calls. Divide the subscription fee by an estimated number of calls, and add to the cost of using the phone. The same applies to users of CompuServe. Their total cost is simply the sum of all connect charges, any network charges (to CompuServe and others), part of the basic subscription fee, and local phone rates (for direct dialing to the service, or to reach the network's node). Where a service uses a monthly subscription rate, add part of this to the time charges. Distribute the rate using an estimated number of online hours per month. Example: You pay US$30/hour to access a service during prime time. Your modem speed is 240 cps. Theoretically, if the data flows without pauses at system prompts, you can transfer 392 pages of text in one hour. Even when you deduct some characters due to stops in the transfer, the resulting transferred volume remains respectable. To transfer one page of text takes around nine seconds (2200 characters divided by the speed, which is 2400 bps, or about 240 characters per second). The cost is nine cents. A given binary file (a program) is 23552 bytes large. Using the XMODEM protocol, you can transfer it in about four minutes and thirteen seconds. The cost is US$2.10. To find the cost when paying by the minute is simple. Just calculate the cost per minute or second, and multiply by the estimated connect time. On many services, it will take a minute or two before you can start to receive text or files. Disconnecting also takes a few seconds. Add this to the connect time when calculating costs. Pauses and delays in the transfer can be caused by you or others, and may have a dramatic impact. It is particularly important to take this into account when comparing alternatives using different networks. Example: Transfers to TWICS via Datapak at 9600 bps rarely gave me higher effective speeds than 100 cps. The reason was that the connection between the Japanese telcom network and TWICS went through a 1200 bps gateway. A high speed connection to your data transporter's network does not guarantee a high speed connection to the remote computer. I used to go through Datapak at 9600 bps to a computer center in Oslo. There, I was connected through a local area network to the host computer. The effective speed was rarely higher than 4800 bps. Calling direct gave twice the speed. Try to measure the effective transfer speed before selecting a routing for your data. Transfer the same amount of text through various networks. If future transfers are likely to take place at a given time of day, test at that time. If your planned application is retrieval of programs, retrieve programs. If you want to read news, then read news from the services that you want to compare. When a network service charging for volume (like Datapak) will also be part of a comparison, measuring volume is particularly important. Do not assume that you know the answer in advance. | NOTE: Always calculate the cost based on a fixed volume, like | | for the transfer of 1000 characters. This is particularly | | important when you need to use different transfer speeds to | | access competing services. | Network load varies considerably throughout the day depending on the number of simultaneous users, and their applications. This also applies to online services. The load is normally lowest, when the bulk of the users are asleep, and during weekends. When the load is low, you get more done per minute. Planning and self-discipline pays off ------------------------------------- The actual cost of using a given set of services depends a lot on your self-discipline, the tools you use, and on how well prepared you are: * If accessing manually, use "quick" commands rather than menus to move at maximum speed to desired sources of information. * Do not set your services to be used with colors, sound, or special methods for displaying graphics, unless you have no choice, or are willing to pay the extra cost. They increase the volume of transferred text, and lower effective speed. * Get the information and disconnect. It is expensive - and usually unnecessary - to read captured text while online. Log off to read. Call back for more to read, disconnect, and then call back again. * Learn how to write your mail offline, and send the letters "in a batch" to your mailbox. Your messages will often have fewer typing errors, be better thought out, and the cost will be considerably lower. * Consider automating your communication (see Chapter 16). I use Bergen By Byte this way. A while ago, it gave me the following progress report: "Time on: 17 hrs 43 min, today 0 hrs 0 min, total 827 times." In average, I spend around 1.3 minutes per call. Yesterday, I was connected for 2:48 minutes. The result was 106 kilobytes' worth of conference mail. Modem speed and cost -------------------- 2400 bps is a sensible modem speed for some applications, and used to be a good starting point for new onliners. The benefits of using a faster modem may be marginal under the following conditions: * When navigating the online service considerably reduces the effective speed, and you access the service manually. * When you pay considerably more for access at higher speed. (CompuServe charges extra for 9600 bps access, but not much.) * When your networks do not offer higher speeds. * When the relative price of a faster modem in your country is prohibitive. On the other hand, a modem doing 9600 bps or more, does give you considerably faster communication. If doing things faster is more important than keeping costs down, then it is a wise investment. This is the case for me. Besides, often it is definitely cheaper. Your applications have a considerable impact on your costs. If you mainly use your modem for retrieval of programs and large data files from bulletin boards - and don't have to pay extra for volume - then higher modem speeds will immediately give reduced costs. A slower speed modem may also stop you from getting what you want. For example, there are several shareware programs on my board that users of 2400 bps modems are unable to download within their allotted 30 minutes per day. When you pay for volume ----------------------- Some network services, like Datapak in Norway, have high rates for volume, and very low rates for connect time. When using such services, automatic communication becomes less useful. Rather than connecting, getting a piece of information, disconnecting, and then going back for more, you may find it cost efficient to review menus and results while online. When paying for volume, the online service's menus become luxury items. Using quick commands for navigating is cheaper. Your comparisons will never be accurate when comparing with services charging for connect time. It is particularly difficult when the measure of volume is 'packets' rather than 'number of characters transferred'. Datapak and many other PDN services reports your sessions like this: CLR PAD (00) 00:00:14:55 537 75 These numbers say that you have been connected to a service for 14 minutes and 55 seconds, that 537 data 'packets' have been received, and that 75 have been sent. Use these figures to calculate the cost of the call. | One data 'packet' or segment contains up to 64 characters. | | Think of it as a measure of the number of lines. Each line can | | have a maximum of 64 characters. If you send the character A | | and a carriage return, then this also counts as a segment. | | | | Consequently, it is hard to use the Datapak record to estimate | | the real number of characters transferred. All we know is that | | 537 + 75 segments were transferred, and that 612 segments may | | contain up to 39,168 characters. | When calculating the cost of a direct call, just the number of minutes counts. Use the time reported by the online service, and not your stop watch. CompuServe gives this type of report: Thank you for using CompuServe! Off at 10:11 EST 24-Nov-92 Connect time = 0:15 If the size of your log file was 15 KB after the first test, and 11 KB after the second, then just adjust the latter to compare (Actual Cost/11*15). It is easy to compare services that only charge by the minute. More practical hints -------------------- It is more expensive to call a service daily "to check the news," than to call it once per week to retrieve the same stories. Navigating by menus is more expensive than going directly to a source, or going there by stacking commands (i.e., combining quick commands into one). Many services let you read selective items in conferences by entering a search string. On my BBS, the following command r extended 100+ c lets you read all messages containing the search string 'extended' in the text starting with message number 100. If you forget the "c" parameter, the flow will stop after each message. This will reduce the average effective speed. Always use "nonstop" commands when reading stories, conference items, and other texts. Now, read the next chapter. Chapter 16: Automatic communication =================================== Automatic data communication as a development strategy. To get a lead on your competitors. To avoid duplication of effort. To reduce costs. To reduce boring and repetitive work. To avoid having to remember technical details. Automatic communication is both for professionals and amateurs. First, because it keeps the costs down. Second, because it lets you do the job faster and safer. We all have different needs --------------------------- Automation will never be the same for everybody. Our needs are too different. Some get excited when a program can dial a bulletin board, retrieve a program, and then disconnect without them having to touch the keyboard. Some want an "answering machine" that can respond to and forward email when he or she is away from the office. Others want a communications system that can tap selected news sources, search databases, and do postprocessing on the retrieved material. For most professionals, doing things manually takes too much time. Time is better spent reading, digesting, and using, rather than on stupid technical retrieval work. Computers can do that. To others again, automation is a question of being able to use the online resource at all. If it takes 60 seconds to get a piece of information, it may be possible to get before running for the next meeting. If it takes 15 minutes, however, there may not be enough time. If you also need to read a help text to find out how to do it, you may not even consider it. The mind is full of other things right now. | When using a system for automatic communication, you do not | | have to learn and remember online commands. The system will | | do it for you. | The minimum solution -------------------- Automatic data communication in its simplest form entails the following: * One keypress to get the communications program to dial a number, and send user name/password when the online service requests this information. * Macro commands (like in a word processor) for navigating through an online service, searching, and to send complex commands by pressing one key. Most communication programs have a macro language or a script language. You will probably never regret time spent on learning how to use these features. At a minimum, you should be able to have your system log on to a service automatically. Autologon spares you the task of remembering your user name and password. Besides, most people are only able to use the keyboard at a low speed. They easily get frustrated by having to correct typing errors. Auto-logon with Procomm ----------------------- Procomm is one of the most popular communications program in use today (see appendix 2). A Procomm script file is a text file, which can contain a list of commands for dialing and navigating on an online service. When writing a Procomm script for auto-logon, your first step is to list the commands that you believe required. Enter them in a text file (as DOS or ASCII text). In such scripts, you can test for the occurrence of a small piece of information that the online service is supposed to send at a given time (like the question "Password?"). When this information is found, Procomm can be set to send the proper response or command (here, your secret password). Scripts can be tied to your favorite online services through Procomm's dialing directory. Press a key to start the appropriate script file for access to a service. The following is a simple PROCOMM script file. It can be used to access my bulletin board in Norway. It assumes that your name is Jens Mikkelsen, and that the secret password is FOXCROOK4. You'll have to change this before testing. ; ;Script file for auto-logon to SHS with PROCOMM and PROCOMM PLUS ; WAITFOR "our FIRST Name? " PAUSE 1 TRANSMIT "Jens^M" WAITFOR "our LAST Name? " PAUSE 1 TRANSMIT "Mikkelsen^M" WAITFOR "ots will echo)? " PAUSE 1 TRANSMIT "foxcrook4^M" WAITFOR "^JMore (Y),N,NS? " PAUSE 1 TRANSMIT "n^M" WAITFOR "^JMore (Y),N,NS? " PAUSE 1 TRANSMIT "n^M" WAITFOR "R] to Continue? " PAUSE 1 TRANSMIT "^M" It is not difficult. You probably understand a lot already. Here is the explanation: * the ";" character at the beginning of a line identifies it as a comment line. Procomm is to ignore it. We use such lines for notes. * WAITFOR "our FIRST Name? " has Procomm wait for the text string "our FIRST NAME?" from my BBS. It is a part of the question "What is your first name?". * PAUSE 1 halts the execution of the script file for one second. * TRANSMIT "Jens^M" sends the name "Jens" followed by a Return (the code ^M in Procomm). * WAITFOR "our LAST Name? " makes Procomm wait for the question "What is your LAST Name?" The script continues like this. In WAITFOR commands, we use part of the text that is displayed on our screen once the scrolling stops. Make sure that the search term is unique. It must not appear elsewhere in the text coming from the host computer. If it does, your name and password may be sent too early. You can call the script HORROR.CMD, and attach it to the entry for my board in your Procomm phone directory. When you call it the next time, Procomm will execute the commands in the file and "turn the keyboard over to you" when done. Macros in Procomm ----------------- Above, we used a script to log on automatically to a service. When Procomm gives us access to the keyboard again, we must continue manually. What we want to do online varies. Sometimes, we want to read new messages in conferences. In other cases, the purpose is to check new programs in the file library. If we find programs of interest, we may want to download them. Shorthand macros can help you do this faster and safer. For example, one macro can take you quickly to a conference for new messages. You can make Procomm start this macro whenever you press ALT-0 (keep the ALT key down, then press 0). You can have the macro key ALT-1 send other commands when in the file archives. When I started using MS-DOS computers for data communications, PC-TALK became my favorite program. It has many of the same macro capabilities that Procomm has. With PC-TALK, I did autologon to NewsNet. Macro number one sent commands that gave me the contents of various newsletters. Macro #2 picked up the contents in another group. Macro #3 picked up stories from my mailbox, and macro #4 logged me off the service. My mission was completed by pressing four or five keys. Automating the full task ------------------------ It's a long way from automated logon scripts and the use of macros to automating the whole task. The major difference is that with full automation, you do not have to look at the screen while the script is working. You can do other things. Sometimes, you may not even be present when the job is being done. On a typical morning, I go directly from bed to my office to switch my communications computer on. While I visit the bathroom, my communications program calls three online services, retrieve and send information. When the script has disconnected from the first service, which is my bulletin board, it analyzes the received data. I want an alphabetic list of visitors since my last visit, a sorted list of downloaded programs, and names of those calling in at 9600 bps or higher. Sometimes, the unexpected happen. There may be noise on the line, or a sudden disconnect. Usually, my script can solve this without manual intervention. It is therefore allowed to work unattended most of the time. When I get to my office after breakfast, it is all done. My communications program is set for reading and responding to today's email. I can sit down, and immediately get to work. After having written all my replies, I say "send" to my system. For me, it's time for another cup of coffee. I am not needed by the keyboard while my mail is being sent. This is what an automatic communications system can do. My scripts also help plan and prepare online visits, and ease my work by postprocessing results. | When your communication is fully automated, you need not | | read incoming data while it scrolls over your screen, and | | then again after logging off the service. You do it only | | once. | How to get it? Here are some alternatives: Alternative 1: Write your own system ------------------------------------ You can write procedures for powerful script-driven programs like ProYam (from Omen Technology) and Crosstalk MK IV. I started writing scripts for ProYam over seven years ago. The system is constantly expanded to include new services, refined to include more functions, and enhanced to become more robust. The scripts make my system work like an autopilot. It calls online services, navigates, retrieves and sends data. Postprocessing includes automatic reformatting of retrieved data, transfers to various internal databases, statistics, usage logs, and calculation of transfer costs. Such scripts can do quite complex operations online. For example, it can - Buy and sell stock when today's quotes are over/under given limits, - Select news stories and other types of information based on information found in menus or titles. Script writing is not for everybody. It is complicated, and takes a lot of time. Therefore, it is only for the specially interested. On the other hand, those going for it seldom regret. Tailor- made communication scripts give a wonderful flexibility. The software does not cost much, but again, it takes a lot of time! | Do not use large and complex script files before you know the | | online service well. The scripts let you do things quicker and | | safer, but there is always a possibility for unexpected | | problems. | | | | Test your scripts for a long time to make them robust by | | "training" them to handle the unexpected. Leave them to work | | unattended when you are reasonably certain that they can do | | the job. - It may take months to get to that point. | | | | Build a timeout feature into your scripts, so that they don't | | just hang there waiting for you after an encounter with fate. | Alternative 2: Use scripts made by others ----------------------------------------- Some script authors generously let others use their creations. Earle Robinson of CompuServe's IBM Europe Forum, share his ProYam scripts for automatic usage of CompuServe with others. They are available from the IBM Communication Forum library. Enter GO XTALK on CompuServe to find advanced script files for Crosstalk Mk.4. ZCOMM and ProYam scripts for visiting my board automatically can be freely downloaded there. They split access up into these three phases: Phase 1: Menu driven offline preparation. Phase 2: Automatic logon, navigation through the system, and automatic disconnection. Phase 3: Automatic offline postprocessing. You will find scripts for other programs on many online services. Alternative 3: Special software ------------------------------- Several online services sell communication programs with built-in functions that provides you with automation. They can have offline functions for reading and responding to mail. The degree of automation varies. There are also many programs written by third parties. Most programs assume that you use 'expert' as your default operating mode on the online service. TapCIS, Autosig (ATO), OzCIS, CISOP, CompuServe Navigator (for Macintosh), AutoPilot (for Amiga), ARCTIC (for Acorn Archimedes), and QuickCIS (for Atari) are popular choices on CompuServe. TapCIS is my personal favorite. (CIM does not offer much automation!) Aladdin is for GEnie. It automates your use of RoundTables (conferences), file areas, and mail. Dialog users turn to Dialog- Link. Nexis News Plus (for Nexis, US$50) has pull-down menus and detailed selection of commands. This MS-DOS program helps users set up detailed search commands before logging on to the Mead Data Central. Your search results will be downloaded automatically. Personal Bibliographics Software, Inc. (Ann Arbor, Mich, U.S.A. Tel.: +1-313-996-1580) sells Pro-Search to Dialog and BRS users (for Macintosh and MS-DOS). Pro-Search will lead you through menus to find information on both services. It translates your plain English search commands into the cryptic search language used by the services. It logs on automatically, connects to these services, finds your information, and shows you the hits. Alternative 4: Offline readers ------------------------------ The alternatives above have one important weakness. Noise on the line can prevent the "robot" from doing the job. All it takes is for noise to give a prompt another content than is expected by your program or script (as in "En@er a number:" instead of "Enter a number:"). You can avoid noise problems by using get commands (see Chapter 15), and by making the online service use its minimum prompts ('expert mode') . Still, this does not give full protection. The best is to let the online service do the navigation. Think of it as logging on to run a batch file on the remote computer. Combine this with automatic transfers of your commands, transmitted in of one stream of data with automatic error correction (in the software and in the modem), and you have a very robust system. The program logs on to the service. Then the service takes over. It registers your user identity, checks your user profile for personal interests, retrieves and packs all messages, news and files into one compressed file, and sends it to you at high speed. Your outgoing messages, search commands, commands to join or leave conferences, and more, are transferred to the remote computer in a similar packet (compressed file). When received by the remote computer, it unpacks the transfer file and distributes messages and commands to various services following your instructions. Your "physical" contact with the service is when your modem is disconnected. The help menus that you read belong to your program, and not the online service. You read and respond to mail in a reading module (ref. the term "offline reader"). Some offline readers give the caller access to more tools than is available on the online service itself. They may have spelling checkers, multimedia support, let you use your favorite editor or word processor, and offer various storage, search, and printing options. Using offline readers is probably the easiest, cheapest, and safest way of using online services. These "readers" are popular among bulletin board users, and some commercial services are also starting to accommodate them. There are many offline reader programs. The most advanced take over completely upon logon, and manage transfers of commands and compressed information files to and from the host. (Example: Binkley Term on FidoNet) Global Link is an offline reader for EcoNet. Bergen By Byte offers the BBS/CS Mail Grabber/Reader, a script system used with the communications program Telix and the service's "auto-get" function. The most popular systems on the PCBoard based Thunderball Cave BBS are Offline Express, Megareader, Session Manager, Rose Reader and EZReader. These are used with scripts written for various communication programs. Some of them have built in communications (and script) modules. EZReader from Thumper Technologies (P.O. Box 471346, Tulsa, OK 74147-1346, U.S.A.) lets users retrieve mail from several online systems using transfer formats such as QWK, PCBoard capture files, ProDoor ZIPM files, XRS, MCI Mail, and others. Cost: US$49 (1992). 1stReader from Sparkware (Post Office Box 386, Hendersonville, Tennessee 37077, U.S.A.) is my personal favorite for accessing Qmail based online systems. | Note: Some offline readers contain all the features required | | for fully automated communications. Some bulletin boards allow | | up- and downloading to start right after CONNECT. | | Off-Line Xpress, an offline mail reader for QWK (Qwikmail) | | packets, does not contain a communications module. It just does | | pre- and postprocessing of mail packets. | | You can use the Off-Line Xpress as one element in a larger | | automated system. For example, a system for access to PCBoard | | bulletin boards may consist of Off-Line Xpress software, PKZIP | | and PKUNZIP (popular shareware programs to compress/decompress | | mail packets), the QMODEM communications program, and a script | | to navigate to/from the QWK packet send and receive area on the | | BBS. | | 1stReader (version 1.11) contains a powerful script based | | communications module. It lets you compose replies, set search | | commands, subscriptions to services, add and drop conferences, | | and enter download commands offline. | Automatic automation -------------------- We have explained how to write scripts with Procomm. However, there are simpler and quicker ways. Many communication programs can make scripts automatically using a learning function. It goes like this: Start the learning function before calling the online service. Then log on, navigate to the desired services, do what you want to automate, and disconnect. The learning feature analyzes the received data and builds a script file for automatic communication. If you call again with the new script, it will "drive the same route one more time." ZCOMM and ProYam have a learning feature. This is how I made a script for accessing Semaforum BBS using ZCOMM: ZCOMM asked for a phone number. I entered +47-370-11710. It asked for speed, and I entered 2400 bps. Next, I had to choose one of the following: (1) System uses IBM PC (ANSI) line drawing (2) 7 bits even parity (3) 8 bits no parity My choice was 1. ZCOMM dialed the number. When the connection was established, I entered my name and password, navigated to the message section, read new messages, browsed new files in the library, and entered G for Goodbye. This was the "tour" that I wanted to automate. When disconnected, I pressed the F1 key. This prompted the learning process based on a record of the online tour. The log described everything that had happened in detail, including my pauses to think. Now I was prompted by the following question: 'newscr.t' exists. Append/replace/quit? I selected append. Then: Do you want this script file as a new entry in your telephone directory (y/n)? I entered "y," and named it "semaforum." After a few seconds, my new script was ready: Your new script is in the file 'newscr.t' !! You can append the file to your current script file (for example PHODIR.T) or have the commands executed by entering: call semaforum.newscr.t It was time to test the new wonder. I entered call semaforum.newscr.t at the ZCOMM command line, hit the Enter key, and off it went. ZCOMM called the BBS and repeated everything - at far higher speed than I had done it manually. It went on-hook as planned when done. Limitations ----------- Auto-learn programs can create a script file that let you "drive the same route." For some applications this is enough. For others, it's just part of the way. You have to refine the script manually to get what you want. Example: If you call my bulletin board with an auto-learned script made yesterday, chances are that everything works well. If you call twice on the same day, however, you're in for a surprise. The board greets you differently on your second visit. You will not get the menu of available bulletins. It will take you directly to the system's main menu. Your script must take this into account. On most online services, many things can happen at each "junction of your road." At one point in one of my scripts, up to twenty things may happen. Each event needs its own "routing." Twenty possible events are an extreme, but three to four possibilities at each system prompt is not unusual. All of them need to be handled by your script, if you want it to visit online services unattended while asleep. It is quicker and simpler to use other people's scripts and programs, although this might force you to use a different program for each service. Personally, I prefer offline readers on services where such are able to do the job. On other services, I usually depend on my own tailor-made scripts. Chapter 17: Gazing into the future ================================== Thoughts about things to come. Newspaper of the future --------------------------- Some years ago, Nicholas Negroponte of Massachusetts Institute of Technology, said that today's newspapers are old-fashioned and soon to be replaced by electronic "ultra personal" newspapers. "If the purpose is to sell news," he said, then it must be completely wrong to sell newspapers. Personally, I think that it is a dreadful way of receiving the news." MIT's Media Laboratory had developed a new type of electronic newspaper. Daily, it delivered personalized news to each researcher. The newspaper was "written" by a computer that searched through the news services' cables and other news sources according to each person's interest profile. The system could present the stories on paper or on screen. It could convert them to speech, so that the "reader" could listen to the news in the car or the shower. In a tailor-made electronic newspaper, personal news makes big headlines. If you are off for San Francisco tomorrow, the weather forecasts for this city is front page news. Email from your son will also get a prominent place. "What counts in my newspaper is what I consider newsworthy," said Negroponte. He claimed that the personal newspaper is a way of getting a grip on the information explosion. "We cannot do it the old way anymore. We need other agents that can do prereading for us. In this case, the computer happens to be our agent." The technology is already here. Anyone can design similar papers using powerful communication programs with extensive script features. I have tried. My test edition of The Saltrod Daily News did not convert news to sound. It did not look like a newspaper page on my screen. Not because it was impossible. I simply did not feel these 'extras' worth the effort. My personal interest profile was taken care of by my scripts. If I wanted news, the "news processor" went to work and "printed" a new edition. On Tuesdays, Thursdays, and Saturdays, I got an "extended edition." This is a section from my first edition: "Front page," Thursday, November 21. Under the headline News From Tokyo, the following items: TOSHIBA TO MARKET INEXPENSIVE PORTABLE WORD PROCESSOR TOHOKU UNIVERSITY CONSTRUCTING SEMICONDUCTOR RESEARCH LAB MEITEC, U.S. FIRM TO JOINTLY MARKET COMPUTER PRINTER INFO TOSHIBA TO SUPPLY OFFICE EQUIPMENT TO OLIVETTI NISSAN DEVELOPS PAINT INSPECTION ROBOT MADE-TO-ORDER POCKET COMPUTER FROM CASIO These articles were captured from Kyoto News Service through Down Jones/News Retrieval. The column with news from the United States had stories from NEWSBYTES newsletters: * DAY ONE COMDEX. * IBM'S PRE ANNOUNCEMENT OF "CLAMSHELL" * AT&T TO JUMP IN SOONER WITH LAPTOP COMPUTER * COMMODORE THIRD CONSECUTIVE QUARTERLY LOSS * 2 ZENITH UNVEILS TOUCH-SCREEN * HP's EARNINGS DROP Hot News From England came from several sources, including Financial Times, and Reuters (in CompuServe's UK News). Headlines read: * THE CHRISTMAS SELLING WAR * BIG MACS GOING CHEAP TO UNIVERSITY STUDENTS "Page 2" was dedicated to technology intelligence. "Page 3" had stories about telecommunications, mainly collected from NewsNet's newsletters. "Page 4" had stories about personal computer applications. As the cost of communicating and using online services continues to decrease, many people will be able to do the same. This is where we are heading. Some people say it is too difficult to read news on a computer screen. Maybe so, but pay attention to what is happening in notebook computers. This paragraph was written on a small PC by the fireplace in my living room. The computer is hardly any larger or heavier than a book. (Sources for monitoring notebook trends: NEWSBYTES' IBM and Apple reports, CompuServe's Online Today, and IBM Hardware Forum.) Electronic news by radio ------------------------ If costs were of no concern, then your applications of the online world would probably change considerably. Pay attention, as we are moving fast in that direction. Radio is one of the supporting technologies. It is used to deliver Usenet newsgroup to bulletin boards (example: PageSat Inc. of Palo Alto, U.S.A.) Also, consider this: Businesses need a constant flow of news to remain competitive. Desktop Data Inc. (tel. +1-617-890-0042) markets a real-time news service called NewsEDGE in the United States and Europe. They call it "live news processing." Annual subscriptions start at US$20,000 for ten users (1993). NewsEDGE continuously collects news from more than 100 news wires, including sources like PR Newswire, Knight Ridder/Tribune Business News, Dow Jones News Service, Dow Jones Professional Investor Report and Reuters Financial News. The stories are "packaged" and immediately feed to customers' personal computers and workstations by FM, satellite, or X.25 broadcast: * All news stories are integrated in a live news stream all day long, * The NewsEdge software manages the simultaneous receipt of news from multiple services, and alerts users to stories that match their individual interest profiles. It also maintains a full-text database of the most recent 250,000 stories on the user's server for quick searching. Packet radio ------------ A global amateur radio network allows users to modem around the world, and even in outer space. Its users never get a telephone bill. There are over 700 packet radio based bulletin boards (PBBS). They are interconnected by short wave radio, VHF, UHF, and satellite links. Technology aside, they look and feel just like standard bulletin boards. Once you have the equipment, can afford the electricity to power it up, and the time it takes to get a radio amateur license, communication itself is free. Packet radio equipment sells in the United States for less than US$ 750. This will give you a radio (VHR tranceiver), antenna, cable for connecting the antenna to the radio, and a controller (TNC - Terminal Node Controller). Most PBBS systems are connected to a network of packet radio based boards. Many amateurs use 1200 bps, but speeds of up to 56,000 bps are being used on higher frequencies (the 420-450 MHz band in the United States). Hams are working on real-time digitized voice communications, still-frame (and even moving) graphics, and live multiplayer games. In some countries, there are also gateways available to terrestrial public and commercial networks, such as CompuServe, and Usenet. Packet radio is demonstrated as a feasible technology for wireless extension of the Internet. Radio and satellites are being used to help countries in the Third World. Volunteers in Technical Assistance (VITA), a private, nonprofit organization, is one of those concerned with technology transfers in humanitarian assistance to these countries. VITA's portable packet radio system was used for global email after a volcanic eruption in the Philippines in 1991. Today, the emphasis is on Africa. VITA's "space mailbox" passes over each single point of the earth twice every 25 hours at an altitude of 800 kilometers. When the satellite is over a ground station, the station sends files and messages for storage in the satellite's computer memory and receives incoming mail. The cost of ground station operation is based on solar energy batteries, and therefore relatively cheap. To learn more about VITA's projects, subscribe to their mailing list by email to LISTSERV@AUVM.BITNET. Use the command SUB DEVEL-L . For more general information about packet radio, check out HamNet on CompuServe, and especially its library 9. Retrieve the file 'packet_radio' (Packet radio in earth and space environments for relief and development) from GNET's archive (see chapter 7). ILINK has an HAMRADIO conference. There is a packet radio mailing list at PACKET-RADIO@WSMR-SIMTEL20.ARMY.MIL (write PACKET- RADIO-REQUEST@@WSMR-SIMTEL20.ARMY.MIL to subscribe). Usenet has rec.radio.amateur.packet (Discussion about packet radio setups), and various other rec.radio conferences. There is HAM_TECH on FidoNet, and Ham Radio under Science on EXEC-PC. The American Radio Relay League (AARL) operates an Internet information service called the ARRL Information Server. To learn how to use it, send email to info@arrl.org with the word HELP in the body of the text. Cable TV -------- Expect Cable TV networks to grow in importance as electronic high- ways, to offer gateways into the Internet and others, and to get interconnected not unlike the Internet itself. Example: Continental Cablevision Inc. (U.S.A.) lets customers plug PCs and a special modem directly into its cable lines to link up with the Internet. The cable link bypasses local phone hookups and provide the capability to download whole books and other information at speeds up to 10 million bits per second. Electronic mail on the move --------------------------- For some time, we have been witnessing a battle between giants. On one side, the national telephone companies have been pushing X.400 backed by CCITT, and software companies like Lotus, Novell, and Microsoft. On the other side, CompuServe, Dialcom, MCI Mail, GEISCO, Sprint, and others have been fighting their wars. Nobody really thought much about the Internet, until suddenly, it was there for everybody. The incident has changed the global email scene fundamentally. One thing seems reasonably certain: that the Internet will grow. In late 1992, the president of the Internet Society (Reston, Va., U.S.A.) made the following prediction: ".. by the year 2000 the Internet will consist of some 100 million hosts, 3 million networks, and 1 billion users (close to the current population of the People's Republic of China). Much of this growth will certainly come from commercial traffic." We, the users, are the winners. Most online services now understand that global exchange of email is a requirement, and that they must connect to the Internet. Meanwhile, wild things are taking place in the grassroots arena: * Thousands of new bulletin boards are being connected to grassroots networks like FidoNet (which in turn is connected to the Internet for exchange of mail). * Thousands of bulletin boards are being hooked directly into the Internet (and Usenet) offering such access to users at stunning rates. * The BBSes are bringing email up to a new level by letting us use offline readers, and other types of powerful mail handling software. Email will never be the same. Cheaper and better communications --------------------------------- During Christmas 1987, a guru said that once the 9600 bps V.32 modems fell below the US$1,200 level, they would create a new standard. Today, such modems can be bought at prices lower than US$200. In many countries, 14,400 bits/s modems are already the preferred choice. Wild dreams get real -------------------- In the future, we will be able to do several things simultaneously on the same telephone line. This is what the promised land of ISDN (Integrated Service Digital Networks) is supposed to give us. Some users already have this capability. They write and talk on the same line using pictures, music, video, fax, voice and data. ISDN is supposed to let us use services that are not generally available today. Here are some key words: * Chats, with the option of having pictures of the people we are talking to up on our local screen (for example in a window, each time he or she is saying something). Eventually, we may get the pictures in 3-D. * Database searches in text and pictures, with displays of both. * Electronic transfers of video/movies over a telephone line (fractal image compression technology may give us another online revolution). Imagine dances filmed by ethnologists at the Smithsonian Institution in Washington, D.C., or an educational film about the laps in northern Norway from an information provider called the Norwegian Broadcasting Corp. The "Internet Talk Radio" is already delivering programs by anonymous ftp (e.g., through ftp.nau.edu in the directory /talk-radio). * Online amusement parks with group plays, creative offerings (drawing, painting, building of 3-D electronic sculptures), shopping (with "live" people presenting merchandise and good pictures of the offerings, test drives, etc.), casino (with real prizes), theater with live performance, online "dressing rooms" (submit a 2-D picture of yourself, and play with your looks), online car driving schools (drive a car through Tokyo or New York, or go on safari). The Sierra Network has been playing around with these ideas for quite some time. * Your favorite books, old as new, available for on-screen reading or searching in full text. Remember, many libraries have no room to store all the new books that they receive. Also, wear and tear tend to destroy books after some time. Many books are already available online, including this one. * Instant access to hundreds of thousands of 'data cottages'. These are computers in private homes of people around the world set up for remote access. With the technical advances in the art of transferring pictures, some of these may grow to become tiny online "television stations." These wild ideas are already here, but it will take time before they are generally available. New networks need to be in place. New and more powerful communications equipment has to be provided. Farther down the road, we can see the contours of speech-based electronic conferences with automatic translation to and from the participants' languages. Entries will be stored as text in a form that allows for advanced online searching. We may have a choice between the following: * To use voice when entering messages, rather than entering them through the keyboard. The ability to mix speech, text, sound and pictures (single frames or live pictures). * Messages are delivered to you by voice, as text or as a combination of these (like in a lecture with visual aids). * Text and voice can be converted to a basic text, which then may be converted to other languages, and forwarded to its destination as text or voice. One world --------- Within the Internet, the idea of "the network as one, large computer" has already given birth to many special services, like gopher and WAIS. Potentially, we will be able to find and retrieve information from anywhere on the global grid of connected systems. Bulletin boards have commenced to offer grassroots features modeled after telnet and ftp. These alternatives may even end up being better and more productive than the interactive commands offered "inside" the Internet. The global integration of online services will continue at full speed, and in different ways. Rates ----- There is a trend away from charging by the minute or hour. Many services convert to subscription prices, a fixed price by the month, quarter or year. Other services, among them some major database services, move toward a scheme where users only pay for what they get (no cure, no pay). MCI Mail was one of the first. There, you only pay when you send or read mail. On CompuServe's IQuest, you pay a fixed price for a fixed set of search results. Cheaper transfers of data ------------------------- Privatization of the national telephone monopolies has given us more alternatives. This will continue. Possible scenarios: * Major companies selling extra capacity from their own internal networks, * Telecommunications companies exporting their services at extra low prices, * Other pricing schemes (like a fixed amount per month with unlimited usage), * New technology (direct transmitting satellites, FM, etc.) So far, data transporters have been receiving a disproportionate share of the total costs. For example, the rate for accessing CompuServe from Norway through InfoNet is US$11.00, while using the service itself costs US$12.80 at 2400 bps. Increased global competition in data transportation is quickly changing this picture, supported by general access to the Internet. Prices will most likely continue their dramatic way toward zero. Powerful new search tools ------------------------- As the sheer quantity of information expands, the development of adequate finding tools is gaining momentum. Our major problem is how to use what we have access to. This is especially true on the Internet. Expect future personal information agents, called "knowbots," which will scan databases all over the online world for specific information at a user's bidding. This will make personal knowledge of where you need to go redundant. Artificial intelligence will increase the value of searches, as they can be based on your personal searching history since your first day as a user. Your personal information agents will make automatic decisions about what is important and what is not in a query. When you get information back, it will not just be in the normal chronological order. It will be ranked by what seems to be closest to the query. Sources for future studies -------------------------- It seems appropriate to end this chapter with some online services focusing on the future: Newsbytes has a section called Trends. The topic is computers and communications. ECHO has the free database Trend, the online edition of the Trend Monitor magazine. It contains short stories about the development within electronics and computers (log on to ECHO using the password TREND). Usenet has the newsgroup clari.news.trends (Surveys and trends). Why not complement what you find here by monitoring trends in associated areas (like music), to follow the development from different perspectives? The music forum RockNet on CompuServe has a section called Trends. CompuServe's Education Forum has the section Future Talk. What educators think about the future of online services (and education) is always interesting. The Well, based just outside Silicon Valley in the United States, has The Future conference. UUCP has info-futures. Its purpose is "to provide a speculative forum for analyzing current and likely events in technology as they will affect our near future in computing and related areas." (Contact: info-futures-request@cs.bu.edu for subscription.) Usenet has comp.society.futures about "Events in technology affecting future computing." It is tempting to add a list of conferences dedicated to science fiction, but I'll leave that pleasure to you. Have a nice trip! Appendix 1: List of selected online services ============================================ To make a list of online services is difficult. Services come and go. Addresses and access numbers are constantly changed. Only one thing is certain. Some of the details below will be outdated, when you read this. Affaersdata i Stockholm AB ------------------------- P.O. Box 3188, S-103 63 Stockholm, Sweden. Tel.: + 46 8 736 59 19. America Online -------------- has the CNN Newsroom (Turner Educational Services), The Washington Post, the National Geographic magazine, PC World and Macworld. AOL has tailor-made graphical user interfaces for Apple, Macintosh, and PC compatible computers, and about 300.000 users (in June 1993). Sending and receiving Internet mail is possible. Contact: America Online, 8619 Westwood Center Dr., Vienna, VA 22182-2285, USA. Phone: +1-703-448-8700. APC --- The Association for Progressive Communications (APC) is a worldwide partnership of member networks for peace and environmental users with host computers in several countries: Alternex (Brazil). Email: support@ax.apc.org Chasque (Uruguay). Email: apoyo@chasque.apc.org ComLink e.V (Germany). Email: support@oln.comlink.apc.org Ecuanex (Ecuador). Email: intercom@ecuanex.apc.org GlasNet (Russia). Email: support@glas.apc.org GreenNet (England). Email: support@gn.apc.org Institute for Global Communications (U.S.A.), includes EcoNet, PeaceNet, ConflictNet, LaborNet. Email: support@igc.apc.org Nicarao - CRIES (Nicaragua). Email: ayuda@nicarao.apc.org NordNet (Sweden). Email: support@pns.apc.org Pegasus (Australia). Email: support@peg.apc.org Web (Canada). Email: support@web.apc.org While all these services are fee based, they bring a wealth of information on environmental preservation, peace (incl. Greenpeace Press Releases), human rights, grant-making foundations, Third World Resources, United Nations Information Service, Pesticide Information Service, and more. For information about APC, write to apcadmin@igc.apc.org , or APC International Secretariat, Rua Vincente de Souza, 29, 22251-070 Rio de Janeiro, BRASIL. Fax: +55-21-286-0541. For information about the PeaceNet World News Service, which delivers news digests directly to your email box, send a request to pwn@igc.apc.org. Bergen By Byte -------------- Norwegian online service with conferences and many files. Modem tel.: +47 05 323781. PDN (Datapak) address: 0 2422 450134. Telnet: oscar.bbb.no (192.124.156.38). English-language interface available. Annual subscription rates. You can register online. Limited free usage. BIBSYS ------ Book database operated by the Norwegian universities' libraries. Send Internet mail to genserv@pollux.bibsys.no with your search word in the subject title of the message. Big Sky Telegraph ----------------- is an online community for educators, business people etc. living in rural areas in North America. Address: 710 South Atlantic, Dillon, Montana 59725, U.S.A. BITNET ------ "Because It's Time NETwork" started in 1981 as a small network for IBM computers in New York, U.S.A. Today, BITNET encompasses 3,284 host computers by academic and research institutions all over the world. It has around 243,016 users (source: Matrix News 1993) All connected hosts form a worldwide network using the NJE (Network Job Entry) protocols and with a single list of nodes. There is no single worldwide BITNET administration. Several national or regional bodies administer the network. The European part of BITNET is called EARN (European Academic Research Network), while the Canadian is called NetNorth. In Japan the name is AsiaNet. BITNET also has connections to South America. Other parts of the network have names like CAREN, ANSP, SCARNET, CEARN, GULFNET, HARNET, ECUANET, and RUNCOL. Normally, a BITNET email address looks like this: NOTRBCAT@INDYCMS The part to the left of the @-character is the users' mailbox code. The part to the right is the code of the mailbox computer. It is common for Internet users to refer to BITNET addresses like this: NOTRBCAT@INDYCMS.BITNET . To send email from the Internet to BITNET, it has to be sent through special gateway computers. On many systems, this is taken care of automatically. You type NOTRBCAT@INDYCMS.BITNET, and your mailbox system does the rest. On some systems, the user must give routing information in the BITNET address. For example, North American mail to BITNET can be sent through the gateway center CUNYVM.CUNY.EDU . To make mail to NOTRBCAT go through this gateway, its mail address must be changed as follows: NOTRBCAT%INDYCMS.BITNET@CUNYVM.CUNY.EDU Explanation: The @ in the initial address is replaced with % . Then add the gateway routing: ".BITNET@CUNYVM.CUNY.EDU". If you must use a gateway in your address, always select one close to where you live. Ask your local postmaster for the correct addressing in your case. BITNET has many conferences. We call them discussion lists or mailing lists. The lists are usually administered by a computer program called LISTSERV. The dialog is based on redistribution of ordinary email by mailing lists. Consequently, it is simple for users of other networks to participate in BITNET conferences. A list of discussion lists (at present around 1,600 one-line descriptions) is available by email from LISTSERV@NDSUVM1.BITNET. Write the following command in the TEXT of your message: LIST GLOBAL NEW-LIST@NDSUVM1.BITNET and NETMONTH (from BITLIB@YALEVM.BITNET) distribute regular notices about new discussion lists. Subscribe to NEW-LIST by email to LISTSERV@NDSUVM1.BITNET. Use the following command: SUB NEW-LIST Your-first-name Your-last-name This is how we usually subscribe to discussion lists. Send your subscription commands to a LISTSERV close to where you live. The command "SENDME BITNET OVERVIEW" tells LISTSERV to send more information about the services. BIX --- is operated as a joint venture between General Videotex Corp. and the North American computer magazine BYTE (McGraw-Hill). To some extent, it mirrors what you can read on paper. BIX offers global Internet email, telnet and ftp, multiple conferences. In 1992, the service had about 50,000 members. The NUA address is 0310600157878. On Internet, telnet x25.bix.com . At the Username: prompt, enter BIX as a user name. At the second Username: prompt, enter NEW if you don't already have an account on the service. You can sign up for the service, and play during your first visit to the service. Read BYTE for more information, or write to General Videotex Corporation, 1030 Massachusetts Ave., Cambridge, MA 02138, USA. Phone: +1-617-354-4137. BRS --- Bibliographic Retrieval Services is owned by InfoPro Technologies (see below). BRS/After Dark is a service for PC users. It can be accessed during evenings and weekends at attractive rates. InfoPro offers connection through their own network in Europe, and through the Internet. BRS contains about 120 databases within research, business, news, and science. The service's strengths are medicine and health. Membership in BRS costs US$80 per year, plus hourly database usage charges. It is also available through CompuServe (at a different price). Contact in Europe: BRS Information Technologies, Achilles House, Western Avenue, London W3 OUA, England. Tel. +44 81 993 9962. In North America: InfoPro Technologies. Tel.: +1-703-442-0900. Telnet: brs.com (US$6/hr). Canada Remote Systems --------------------- is North America's largest bulletin board system (1992). It has a software library of more than 500,000 programs and files, and over 3,500 public forums and discussion areas. Canada Remote provides several news and information services, including the United Press International and Reuters news wires, North American stock exchange results, the twice-weekly edition of Newsbytes, and other publications. Tel.: +1-416-629-7000 (in the U.S.) and +1-313-963-1905 (Canada). Canada Remote Systems, 1331 Crestlawn Drive, Unit D, Mississauga, Ontario, Canada L4W 2P9. CGNET ----- is a network interconnecting a group of international research organizations. Besides email, CGNET provides news clipping services, airline reservation information, and database search. (See Dialcom) Contact: CGNET Services International, 1024 Hamilton Court, Menlo Park, California 94025, USA. Telephone: +1-415-325-3061. Fax: 1-415-325-2313 Telex: 4900005788 (CGN UI) . CIX (England) ------------- British online-service available by telnet, through PDN services and by direct dial. Telnet cix.compulink.co.uk. Compulink Information eXchange Ltd. claims to be Europe's largest conferencing system. Sign-up fee (1993): GBP 25.00. Monthly minimum: GBP 6.25. Off-peak connect rate GBP 2.40. Peak rate is 3.60 per hour. The service has full Internet access, and email exchange with CompuServe and Dialcom. CIX has many conferences, ISDN access, Usenet News, telnet and ftp. Contact: The Compulink Information Exchange Ltd., The Sanctuary Oakhill Grove, Surbiton, Surrey KT6 6DU, England. Tel.: +44-81-390- 8446. Fax: +44-81-390-6561. NUA: 2342 1330 0310. Data: +44-81-390- 1255/+44-81-390-1244. Email: cixadmin@cix.compulink.co.uk . CIX (USA) --------- The Commercial Internet eXchange is a North American association of commercial Internet providers in which they agree to carry each others' packets of mail, and more. Clarinet -------- A commercial network publishing service providing information and news in over 100 newsgroups by subject matter on Usenet. Read Chapter 9 for more information. Single-user (individual) prices available. Clarinet Communications Corp., 124 King St. North, Waterloo, Ontario N2J 2X8, Canada. Email: info@clarinet.com . Commercial Mail Relay Service (CMR) ----------------------------------- This service is not available anymore. They used to be available on this address: Intermail-Request@Intermail.ISI.EDU CompuServe ---------- has about 1.3 million users (August 93) all over the world, over 1,500 databases, 200 forums, 500 newspapers, online shopping from more than 100 shops and entertainment. It's like a large electronic supermarket. You can access the service though local access numbers in over 100 countries, through Packet Switching Services, and outdial services. The international NUA address is 0313299999997. A list of available forums can be retrieved from the IBM Communication Forum. Participation in forums is normally free (no extra charge). The IQuest database service gives access to more than 800 publications, databases, and indexes within business, public affairs, research, news, etc. Bibliographic and full-text searches. Some IQuest databases are physically residing on other online services, like NewsNet, Dialog, BRS, and Vu/Text (U.S.A.), Data- Star (Switzerland), DataSolve (England. It has TASS in the World Reporter database), and Questel (France). Sometimes, it is cheaper to use these services on CompuServe, than by a call to these services directly. The connect charge for CompuServe's Alternative Pricing Plan is US$12.80/hour at 1200 and 2400 bps. 9600 bps costs US$22.80/hour. Monthly subscription US$2.50. Using the Executive News Service (clipping service) costs an extra US$15/hour. An optional flat-rate pricing plan (the Standard Pricing plan) is available for US$8.95 per month. It gives unlimited access to over 30 basic services, including CompuServe mail, The Electronic Mall, news, weather and sports, member support services, reference and travel services. Hourly rates for Standard Pricing Plan members using extended services go from US$6/hour for 300 bits/s to US$16/hour for 9600 bits/s access. (Feb. 93) In addition, there are network charges. These differ a lot by country. For example, access through European CompuServe nodes has no communication surcharges during non-prime time (19:00-8:00 local time). CompuServe can be accessed by telnet to hermes.merit.edu, or 35.1.48.150. Host: CompuServe. CompuServe Information Services Inc., POB 20212, 5000 Arlington Centre Blvd., Columbus, Ohio 43220, U.S.A. In Europe, call voice: +49-89-66550-111, fax: +49-89-66 550-255 or write to CompuServe, Jahnstrasse 2, D-8025 Unterhaching b., Munich, Germany. To contact CompuServe Africa, call (012) 841-2530 in South Africa, or (+27)(12) 841-2530 for everywhere else. Cosine ------ COSINE (Cooperation for Open Systems Interconnection Networking in Europe) is a European Common Market "Eureka" project. It works to establish a communications network infrastructure for scientific and industrial research institutes all over Europe. IXI is the international packet data network on which the COSINE project is based. It is available Europe-wide providing links of up to 64 Kbit/s, carries non commercial traffic for the research communities, and provides links to several public data networks. The CONCISE online information service is a focal point for information of interest to European researchers. It has lists of sources of information. Internet users can access CONCISE through Telnet. Connect either to concise.ixi.ch (130.59.2.16) or concise.funet.fi (128.214.6.181). Login: concise, password: concise. For help, send email to helpdesk@concise.level-7.co.uk with the following command in the body of the text: start help cug-email This will give you the `CONCISE User Guide - Email Access'. DASnet ------ forwards mail between systems that do not have any email exchange agreements. See description in Chapter 13. Contact: DA Systems, Inc., 1503 E. Campbell Ave., Campbell, CA 95008, U.S.A. DataArkiv --------- Major Scandinavian online service based in Sweden. Contact: DataArkiv, Box 1502, 171 29 Solna, Sweden. Fax: +46 8 828 296. Tel.: +46 8 705 13 11. Data-Star --------- Formerly owned by Radio-Suisse in Switzerland, Data-Star is now owned by Knight-Ridder (U.S.A.). It offers over 200 databases within business, science and medicine. SciSearch is a database with references to over nine million stories from 4500 newspapers and magazines. Other databases: Current Patents Fast Alert, Flightline (with stories about air transport), The Turing Institute Database on artificial intelligence, Information Access (international market data), parts of SovData, Who Owns Whom, etc.. Access through Internet: telnet to rserve.rs.ch [192.82.124.4] and login as rserve , and follow standard login procedure. Contact in North America: D-S Marketing, Inc., Suite 110, 485 Devon Park Drive, Wayne, PA 19087, Tel.: +1-215-687-6777. Contact in Scandinavia: Data-Star marketing AB, Maessans gt. 18, Box 5278, S-402 25 Gothenburg, Sweden. Tel.: +46 31 83 59 75. Delphi ------ has full access to Internet. Write to: General Videotex Corp., 1030 Massachusetts Ave., Cambridge, MA 02138, USA. Dialcom ------- is owned by British Telecom and is a network of data centers in many countries. Dialcom is selling its services through many agents (like EsiStreet for the music industry, and CGNet for agricultural research). Some selected services: The Official Airline Guide, news (Financial Times Profile, Newsbytes, AP, UPI, and Reuters), mail (Dialcom400), fax services and several conference type offerings (like Campus 2000 for the education market). Today, most Dialcom users are unable to exchange mail with the Internet (DASnet is a commercial alternative), but mail can be sent to users of SprintMail, IBM Mail, AT&Ts Easylink, MCI Mail, Compania Telefonica Nacional de Espana, and other X.400 systems. Contact: Dialcom, 6120 Executive Blvd., Rockville, MD 20852, U.S.A. The British service Telecom-Gold is a subsidiary of Dialcom UK. In North America, contact BT North America at tel.: +1-408-922- 7543. In Europe, contact British Telecom. CGNET can be reached through the Internet. Send a message to postmaster@cgnet.com for more information. Dialog Information Services --------------------------- is owned by Knight Ridder and has more than 400 databases online. They offer a long list of newspapers including the San Francisco Chronicle in full-text, Newsbytes, Information Access, the Japan Technology database, most major global news wires, Trademarkscan, USA Today, Teikoku Databank from Japan. Knowledge Index offers evening and weekend reduced-rate access to more than 100 popular full-text and bibliographic databases and 50,000 journals (1993). Dialog has gateways to other services, like CompuServe and iNet, making the databases available to a larger market. Many databases are also available on CD-ROM. In Europe, contact DIALOG Europe, P O Box 188, Oxford OX1 5AX, England. You can telnet to DIALOG.COM (192.132.3.254, US$ 3/hour in 1992). Down Jones News/Retrieval ------------------------- focuses on news for finance and business. DJN/R is the sole online distributor of The Wall Street Journal (with articles from the international editions), Barron's, Dow Jones and Telerate's newswires in full-text. Further, it has PR Newswire, many other newspapers in full- text, clipping service, online charting for investors, and gateways to other services like Info Globe (Globe and Mail in Canada). Address: P.O. Box 300, Princeton, N.J. 08543-9963. DJN/R is also accessible through a gateway from MCI Mail. You can telnet to djnr.dowjones.com . At the WHAT SERVICE PLEASE prompt, enter DJNR and press Enter. An ENTER PASSWORD prompt will appear. Here, enter your normal DJNS account password. ECHO ---- European Commission Host Organization is accessible via CONCISE. Telnet either to concise.ixi.ch (130.59.2.16) or concise.funet.fi (128.214.6.181). Login: concise, password: concise. The NUA address is 0270448112. You can also telnet to echo.lu . Login as echotest or echo. ECHO's I'M GUIDE is a free database providing information about online services within the European Common Market. It includes CD- ROMs, databases and databanks, database producers, gateways, host organizations, PTT contact points, and information brokers in Europe. ECHO's other databases are classified under the headings Research and development, Language industry, Industry and economy. For information contact: ECHO Customer Service, BP 2373, L-1023 Luxembourg. Tel.: +352 34 98 1200. Fax: +352 34 98 1234. Exec-PC Network BBS ------------------- is based in Milwaukee (Wisconsin, U.S.A.). In August 1991, it had 238 incoming phone lines, 9 gigabytes of disk capacity, more than 100 new programs/day, 300,000 programs available for downloading (including the complete selection from PC-SIG California) and more than 130,000 active messages in its conferences. More than 3,300 persons called EXEC-PC each day. The service focuses on owners of IBM compatible computers (MS/PC-DOS, Windows, OS/2, Windows, Unix), Apple Macintosh, Amiga and Atari ST through over 200 conferences. You can access EXEC-PC through i-Com's outdial service, Global Access, PC-Pursuit, Connect-USA, and by direct dialing. Annual subscription costs US$60.00. You can sign on while online. Unregistered users get thirty minutes per day free. FidoNet ------- was founded in 1984 for automatic transfers of files from one place to the other at night, when the telephone rates are low. FidoNet is one of the most widespread networks in the world. It consists mainly of personal computers (IBM/Amiga/Macintosh...). FidoNet systems exchange documents by using a modem and calling another FidoNet system. Communication can be either direct to the destination system (calling long distance) or by routing a message to a local system. Each computer connected to FidoNet is called a node. There are nodes in around 70 countries. In June 1993, the net had 24,800 nodes throughout the world (source: FidoNet nodelist). The number of nodes is growing at about 40 percent per year. Most nodes are operated by volunteers, and access is free. FidoNet is believed to have over 1.56 million users (1992). Conferences (called ECHOs or Echomail) are exchanged between interested nodes, and may thus have thousands of readers. A typical FidoNet Echomail conference gets 50 to 100 messages each day. Any connected BBS may carry 50, 100, or more echomail conferences. Net Mail is the term for storing and delivering mail. FidoNet users can send and receive mail through the Internet. The list of member bulletin boards is called the Nodelist. It can be retrieved from most boards. Each node has one line on this list, like in this example: ,10,Home_of_PCQ,Warszawa,Jan_Stozek,48-22-410374,9600,V32,MNP,XA The commas are field separators. The first field (empty in this example) starts a zone, region, local net, Host, or denotes a private space (with the keyword Pvt). The second field (10) is the node number, and the third field (Home_of_PCQ) is the name for the node. The fourth field (Warszawa) is a geographical notation, and the fifth field (Jan_Stozek) is the name of the owner. The sixth field is a telephone contact number, and the other fields contain various technical information used in making connections. FidoNet has six major geographical zones: (1) North America, (2) Europe, etc., (3) Oceania, (4) America Latina, (5) Africa, (6) Asia. For information, contact the International FidoNet Association (IFNA), P.O. Box 41143, St. Louis, MO 63141, U.S.A. You can also write to postmaster@fidonet.fidonet.org . The FIDO subdirectory in the MSDOS directory on SIMTEL20 (on the Internet) contains extensive information, including explanation of FidoNet, guide for its nodes, gateways between FidoNet and Internet, and various programs and utilities. (See TRICKLE in Chapter 4 for more about how to get these files.) Fog City Online Information Service ----------------------------------- is the world's largest bulletin board with AIDS information. Based in San Francisco (U.S.A.) it offers free and anonymous access for everybody. Call +1-415-863-9697. Enter "AIDS" by the question "First name?" and "INFO" by the question "Last Name?". FT Profile ---------- has full-text articles from Financial Times in London, from several European databases (like the Hoppenstedt database with more than 46,000 German companies), and the Japanese database Nikkei. Profile is available through Telecom-Gold, and can also be accessed through other online services. Clipping service. CD-ROM. Contact FT Information Services at tel.: +44-71-873-3000. GEnie ----- General Electric Network for Information Exchange is GE's Consumer Information Service. GEnie gives access to many databases and other information services. It has around 350,000 users (1992). The basic rate is US$4.95/month plus connect charges. The surcharge is US$18/hour between 08:00 and 18:00, and US$6.00/hour for some services, like email, downloading of software, "chat," conferences, and multi-user games. Access to Internet email is available as a surcharged add-on service. (Addressing format: userid@GEnie.GEis.com) For information call +1-301-340-4492. GE Information Services, 401 N. Washington St., Rockville, MD 20850, U.S.A. GE Information Service Co. (GEIS) --------------------------------- Online service operated by General Electric. Available in over 32 countries. GEIS' QUIK-COMM service integrates multinational business communications for public and private mail systems. Its services include Telex Access; and QUIK-COMM to FAX, which allows users to send messages from their workstations to fax machines throughout the world. Contact: tel. +1-301-340-4485 GENIOS ------ German online service (tel.: +49 69 920 19 101). Offers information from Novosti (Moscow), data about companies in the former DDR, the Hoppenstedt business directories, and more. GlasNet ------- is an international computer network that provides lowcost telecommunications to nonprofit, nongovernment organizations throughout the countries of the former Soviet Union. Email, fax, telex, public conferences. For nonprofit, nongovernmental organizations, basic GlasNet service fees are 350 rubles/month after a one-time registration fee of 1000 rubles. This does not include faxes or telexes. (1992) Write to: GlasNet, Ulitsa Yaroslavskaya 8, Korpus 3 Room 111, 129164 Moscow, Russia. Phone: (095) 217-6182 (voice). Email: fick@glas.apc.org . Global Access ------------- is a North American outdial service (see Chapter 13) owned by G-A Technologies, Inc. It has an information BBS at +1-704-334-9030. IASNET ------ The Institute for Automated Systems Network was the first public switched network in the xUSSR. Its main goal is to provide a wide range of network services to the scientific community in the xUSSR, including access to online databases, a catalog of foreign databases, and conferencing (ADONIS). IBM Information Network ----------------------- The IBM Information Network, based in Tampa, Florida, is IBM's commercial value-added data network offering the ability to send email and data worldwide. It is one of the largest networks in the world, with operator-owned nodes in over 36 countries. To send mail from the Internet to a user of Advantis IBMmail (also called IMX or Mail Exchange), address to their userid at ibmmail.com. You need to know their userid (IEA in IBMmail terminology) in advance. An IBMmail user can find how to address to Internet by sending mail to INFORM at IBMmail with /GET INET in the body of the text. i-Com ----- offers outdial services to North America (ref. Chapter 13). Contact: i-Com, 4 Rue de Geneve B33, 1140 Brussels, Belgium. Tel.: +32 2215 7130. Fax: +32 2215 8999. Modem: +32 2215 8785. ILINK (Interlink) ----------------- is a network for exchange of conferences between bulletin boards in U.S.A., Canada, Scotland, England, Norway, France, Australia, New Zealand, Sweden, and other countries. Infonet ------- is a privately owned vendor of packet data services with local operations in over 50 countries, and access from more than 135 countries. Contact: Infonet Services Corp., 2100 East Grand Ave., El Segundo, CA 90245, U.S.A. INTERNET -------- started as ARPANET, but is now a large group of more than 6,000 interconnected networks all over the world supporting mail, news, remote login, file transfer, and many other services. All participating hosts are using the protocol TCP/IP. There are around 1.3 million host computers with IP addresses (March 1992. Ref. RFC1296 and RFC 1181). The number of users is estimated to more than ten million people. Some one million people are said to exchange email messages daily. In addition, private enterprise networks have an estimated 1,000,000 hosts using TCP/IP (Source: Matrix News August 1993.) These offer mail exchange with the Internet, but not services such as Telnet or FTP to most parts of the Internet, and are estimated to have some 7.5 million users. Some claim that these figures are low. They believe it is possible to reach around 50 million mailboxes by email through the Internet. Several commercial companies offer full Internet services. Among these are Alternet (operated by UUNET) and PCI (operated by Performance Systems, Inc.). The UK Internet Consortium offers similar services in Great Britain. INTERNET gives users access to the ftp and telnet commands. Ftp gives them interactive access to remote computers for transferring files. Telnet gives access to a remote service for interactive dialog. The Interest Groups List of Lists is a directory of conferences available by ftp from ftp.nisc.sri.com (192.33.33.53). Log in to this host as user "anonymous." Do a 'cd' (change directory) to the "netinfo" directory, then enter the command "GET interest-groups." The list is more than 500 KB characters long. You can also get it by email from mail-server@nisc.sri.com . Write the following command in the TEXT of the message: Send netinfo/interest-groups You can telnet several bulletin boards through Internet. Here is a sample: Name Login as Description ---- ---------- ----------- CONRAD.APPSTATE.EDU info World news collected by monitoring short wave broadcasts from BBS and other global sources. ISCA.ICAEN.UIOWA.EDU ISCABBS A large amount of public domain programs ATL.CALSTATE.EDU LEWISNTS Electronic newspapers and the Art World. TOLSUN.OULU.FI BOX Finnish service. English available as an option. "Internet Services Frequently Asked Questions and Answers" can be retrieved by email from mail-server@rtfm.mit.edu . Write send usenet/news.answers/internet-services/faq in the body of your message. Internet -------- is a term used on something many call "WorldNet" or "The Matrix." It includes the networks in INTERNET, and a long list of networks that can send electronic mail to each other (though they may not be based on the TCP/IP protocol). The Internet includes INTERNET, BITNET, DECnet, Usenet, UUCP, PeaceNet, IGC, EARN, Uninett, FidoNet, CompuServe, Alternex (Brazil), ATT Mail, FredsNaetet (Sweden), AppleLink, GeoNet (hosts in Germany, England, U.S.A.), GreenNet, MCI Mail, MetaNet, Nicarao (Nicaragua), OTC PeaceNet/EcoNet, Pegasus (Australia), BIX, Portal, PsychNet, Telemail, TWICS (Japan), Web (Canada), The WELL, CARINET, DASnet, Janet (England) "Answers to Commonly Asked New Internet User' Questions" is available by email from SERVICE@NIC.DDN.MIL . Send email with the following command in the message's SUBJECT heading: RFC 1206 One important feature of the Internet is that no one is in charge. The Internet is essentially a voluntary association. Another thing is that there are rarely any additional charges for sending and receiving electronic mail (even when sending to other networks), retrieving files, or reading Usenet Newsgroups.. Intermail --------- See Commercial Mail Relay Service. Istel ----- A privately owned vendor of packet data services, who has operator- owned nodes in Belgium, Canada, France, Germany, Italy, Japan, Holland, Spain, Sweden, England. Contact: AT&T Istel. Tel.: 0527- 64295 (in England). Kompass Online and Kompass Europe -------------------------------- These databases are available through many services, including Affaersdata in Sweden and Dialog. Contact: (voice) +47 22 64 05 75. InfoPro Technologies -------------------- Previously Maxwell Online. InfoPro's services include BRS Online and Orbit Online. BRS owns BRS Online, BRS Colleague, BRS After Dark, and BRS Morning Search, which focus on medical information. Orbit focuses on patent and patent-related searches. Orbit carries an annual membership fee of US$50 (1992), and hourly fees that differ according to database. Contact: InfoPro Technologies, 8000 Westpark Drive, McLean, VA 22102, U.S.A. Tel.: +1-703-442-0900. Maxwell Online -------------- See InfoPro Technologies. MCI Mail -------- MCI Mail, Box 1001, 1900 M St. NW, Washington, DC 20036, U.S.A. Mead Data Central ----------------- operates the Nexis and Lexis services. Contact: Mead Data Central International, International House, 1, St. Katharine's Way, London E1 9UN, England. TELNET lexis.meaddata.com or 192.73.216.20 or 192.73.216.21 . Terminal type = vt100a. Note: If characters do not echo back, set your terminal to "local" echo. MetaNet ------- Contact: Metasystems Design Group, 2000 North 15th Street, Suite 103, Arlington, VA 22201, U.S.A. Tel.: +1-703-243-6622. MIX --- A Scandinavian bulletin board network exchanging conferences. For information, call Mike's BBS in Norway at the following numbers: +47-22-416588, +47-22-410403 and +47-22-337320. Minitel ------- French videotex service, which is being marketed all over the world. It is based on a special graphics display format (Teletel), has over 13,000 services, and appears like a large French online hypermarche with more than seven million users (1992). Access to the French Minitel network is available via the Infonet international packet data network on a host-paid and chargeable account basis. Mnematics --------- Mnematics, 722 Main Street Sparkill, NY 10976-0019, U.S.A. Tel.: +1- 914-359-4546. NEC PC-VAN ---------- Japan's largest online service measured both in number of users and geographical presence. Your communications system must be able to display Japanese characters to use the service. Netnews ------- See Usenet. NewsNet ------- The world's leading vendor of full-text business and professional newsletters online. Offers access to over 700 newsletters and news services within 30 industry classification groups (1993). Includes the major international news wires. You can read individual newsletter issues, and search back issues or individual newsletters or publications within an industry classification. NewsNet's clipping service is called NewsFlash. Enter PRICES at the main command prompt for an alphabetic listing of all available services. Contact: NewsNet, 945 Haverford Rd., Bryn Mawr, PA 19010, U.S.A. NIFTY-Serve ----------- is Japan's number 2 online service. It had 250,000 subscribers in January 1992. Access is possible via a gateway from CompuServe. Your communications system must be able to display Japanese characters to use the service. Nifty-Serve is jointly operated by Fujitsu and Nissho Iwai Trading in a licensing agreement with CompuServe. NWI --- Networking and World Information, Inc. One time subscription fee: US$20 (US$5 is given to charity. US$15 is returned to the user as free time). Non-prime time access costs US$10.70/hour at 300 to 2400 bps. Otherwise, the rate is US$23.50. The service is available through PDN and outdial services. (1992) Contact: NWI, 333 East River Drive, Commerce Center One, East Hartford, CT 06108, U.S.A. Tel.: +1-203-289-6585. CompuServe users can access NWI's PARTICIPATE conferences through a gateway. OCLC ---- is a nonprofit computer library service and research organization whose computer network and products link more than 15,000 libraries in 47 countries and territories. It serves all types of libraries, including public, academic, special, corporate, law, and medical libraries. Contact: OCLC, 6565 Fratz Rd., Dublin, OH, U.S.A. Tel.: +1-614-764-6000. Orbit ----- is owned by InfoPro Technologies (formerly Maxwell Online and Pergamon Orbit Infoline Inc.). It offers more than 100 science, technical and patent research, and company information databases. Contact in North America: InfoPro Technologies, 8000 West Park Drive, McClean, VA 22102, U.S.A. Tel.: +1-703-442-0900. In Europe: ORBIT Search Service, Achilles House, Western Avenue, London W3 0UA, England. Tel.: +44 1 992 3456, Fax. +44 1 993 7335. Telnet orbit.com (US$6/hr in 1992). Pergamon Financial Data Services -------------------------------- See Orbit. Polarnet -------- is a Scandinavian distributed conferencing system available through many boards, including Mike's BBS (see above). Prestel ------- is owned by British Telecom. It is a videotex service based on a special graphics display format. The service is also available as "TTY Teletype." NUA address: 02341 10020020. Prodigy ------- is a North American videotex service owned by IBM and Sears. You must have a special communications program to use the service, which claimed 2.5 million subscribers in early 1992. (Analysts estimated only 850,000 paying users). Rates: US$12.50 per family per month for up to six family members and up to 30 email messages. Annual subscription: US$ 119.95. The packet sent new users contains a communication program and a Hayes-compatible 2400 bps modem. Price: US$ 180. (early 1992) Contact: Prodigy Services Co., 445 Hamilton Ave., White Plains, NY 10601, U.S.A. Tel.: +1-914-962-0310. Email (through Internet): postmaster@inetgate.prodigy.com . RelayNet -------- Also called PcRelay-Net. An international network for exchange of email and conferences between more than 8,500 bulletin boards. The Relaynet International Message Exchange (RIME) consists of some 1,000 systems (1992). Relcom ------ means 'Russian Electronic Communications.' This company provides email, other network services, a gateway to Internet, and access to Usenet. In early 1992, RELCOM had regional nodes in 25 cities of the xUSSR connecting over 1,000 organizations or 30,000 users. RELCOM has a gateway to IASNET. Saltrod Horror Show ------------------- Odd de Presno's BBS system. Tel.: +47 370 31378. The Sierra Network ------------------ is one of the best things out there for online games. The service claimed more than 20,000 subscribers in 1993. Contact: The Sierra Network, P.O. Box 485, Coarsegold, CA 93614, U.S.A. SIGnet ------ Global BBS network with over 2500 nodes around the world (1993). SIMTEL20 Software Archives -------------------------- is a system maintained by the US Army Information System Command. It contains public domain software, shareware, documentation and mail archives under the following top-level headings: HZ100, INFO- IBMPC, MSDOS, PC-BLUE, ADA, ARCHIVES, CPM, CPMUG, PCNET, SIGM, STARS, UNIX-C, VHDL, ZSYS, MACINTOSH, MISC, and TOPS20. All files are accessible by Anonymous FTP. For information, send a message to the address LISTSERV@RPIECS.BITNET with the command 'HELP' in the first line of your text. SprintMail ---------- is a large, commercial vendor of email services. It has local nodes serving customers in 108 countries through its SprintNet network (1991). Internet mail to the SprintMail user identity 'T.Germain' can be sent to T.Germain@sprint.sprint.com . For information, contact SprintMail, 12490 Sunrise Valley Dr., Reston, VA 22096, U.S.A. SuperNET -------- is an international network for exchange of conferences and mail between SuperBBS bulletin board systems. Contact: SuperNet World Host through FidoNet at 2:203/310 (+46-300-41377) Lennart Odeberg. TCN --- is a Dialcom network. Internet email to TCN is only possible if either the sender or recipient has registered with DASnet. The email address would be: TCNxxx@das.net (where xxx is the TCN number). Thunderball Cave ---------------- Norwegian bulletin board connected to RelayNet. Call +47-22- 299441 or +47-22-299442. Offers Usenet News and Internet mail. Tocolo BBS ---------- Bulletin board for people with disabilities in Japan, or with "shintaishougaisha," which is the Japanese term. Call: +81-3-205- 9315. 1200 bps, 8,N,1. Your communications system must be able to display Japanese characters to use the service. TRI-P ----- International outdial service. Contact: INTEC America, Inc., 1270 Avenue of the Americas, Suite 2315, New York, NY 10020, U.S.A. In Japan, contact Intec at 2-6-10 Sarugaku-cho, Chiyoda-ku, Tokyo 101. Fax: +81-3-3292-2929. TWICS BeeLINE ------------- English-language Japanese online service with PARTIcipate, Caucus and Usenet netnews. Half the users are Japanese. Others connect from U.S.A., England, Canada, Germany, France, South Africa, and Scandinavia. The NUA address is: 4406 20000524. Direct call to +81 3 3351 7905 (14,4KB/s), or +81-3-3351-8244 (9600 bps). At CONNECT, press ENTER a few times. Wait about a second between keystrokes to get to the registration prompt. New users can sign on as GUEST for information. You can also write postmaster@twics.co.jp, or send mail to TWICS/IEC, 1-21 Yotsuya, Shinjuku-ku, Tokyo 160, JAPAN. Foreign users have free access (1992). UMI/Data Courier ---------------- 620 South Street, Louisville, KY 40202, U.S.A. Uninett ------- delivers networking services to Norwegian research and educational services. Unison ------ North American conferencing service using PARTIcipate software. NUA address: 031105130023000. Password: US$35.00. Monthly subscription: US$6.25. Non-prime time access: US$12.00/hour. Prime time access: US$19.00/hour. Enter SIGNUP when online the first time and follow the prompts. (1991) UUCP ---- UUCP (UNIX to UNIX Copy) is a protocol, a set of files and a set of commands to copy files from one UNIX computer to another. This copying procedure is the core of the UUCP network, a loose association of systems all communicating with the UUCP protocol. UNIX computers can participate in the UUCP network (using leased line or dial-up) through any other UNIX host. The network now also has many MS-DOS and other hosts, and consisted of 16,300 hosts in January 1993 (source: UUCP map) serving more than 489,000 users. The UUCP network is based on two systems connecting to each other at specific intervals, and executing any work scheduled for either of them. For example, the system Oregano calls the system Basil once every two hours. If there's mail waiting for Oregano, Basil will send it at that time. Likewise, Oregano will at that time send any mail waiting for Basil. There are databases with connectivity information (UUCP maps), and programs (pathalias) that will help you decide the correct routing of messages. However, many UUCP hosts are not registered in the UUCP map. EUNET is a UUCP based network in Europe. JUNET is an equivalent network in Japan. There are many gateway machines that exchange mail between UUCP and the Internet. Among these, UUNET.UU.NET is among the most frequently used. Usenet ------ Usenet, Netnews, or just "News" are common terms for a large many-to-many conferencing (only) system distributed through UUCP, Internet, FidoNet, and BITNET. This grassroots driven "network" has grown out of the global university and research domains. It is a service rather than a real network. It is not an organization, and has no central authority. Usenet's newsgroups are carried by over 69,000 host computers in five continents, and has over 1,991,000 users (source: Brian Reid, 1993). Many of these hosts have access to the Internet. The European portion of Usenet is called EUNET (European Unix NET). The local administrator of each individual node in the network decides what newsgroups to receive and make available to its users. Few systems offer access to all of them. NetNews is organized in groups of 'conferences'. Each of these classifications is organized into groups and subgroups according to topic. As of June 1, 1993, there were 4500 newsgroups and 2500 regional newsgroups. Several sites are carrying over 2600 topics. The groups distributed worldwide are divided into seven broad classifications: "comp" Topics of interest to both computer professionals and hobbyists, including topics in computer science, software source, and information on hardware and software systems. "sci" Discussions marked by special and usually practical knowledge, relating to research in or application of the established sciences. "misc" Groups addressing themes not easily classified under any of the other headings or which incorporate themes from multiple categories. "soc" Groups primarily addressing social issues and socializing. "talk" Groups largely debate-oriented and tending to feature long discussions without resolution and without appreciable amounts of generally useful information. "news" Groups concerned with the news network and software themselves. "rec" Groups oriented towards hobbies and recreational activities. Also available are many "alternative" hierarchies, like: "alt" True anarchy; anything and everything can and does appear. Subjects include sex, and privacy. "biz" Business-related groups "clari" Newsgroups gatewayed from commercial news services and other 'official' sources. (Requires payment of a fee and execution of a licence. More information by email to info@clarinet.com). Most Netnews hosts offer both global and local conferences. Many newsgroups can be read through bulletin boards, commercial online services, or through gateways from connected hosts (like from some BITNET hosts). A full list of available groups and conferences are normally available from hosts offering Netnews, and on NETNEWS servers. All users should subscribe to news.announce.important . Vu/Text ------- 325 Chestnut St., Suite 1300, Philadelphia, PA 19106, U.S.A. The Well -------- The Whole Earth Lectronic Link is a commercial online service based in Sausalito (U.S.A.). It has its own conferencing culture and is an interesting starting point for those wanting to "study" what makes the area around Silicon Valley so dynamic. The Well has several hundred conferences, public and private, about 7,000 members, and is available in a variety of ways. The service has full Internet access, and can be reached by telnet to well.sf.ca.us (or 192.132.30.2). Modem tel.: +1-415-332-6106 at 1200 bps or +1-415-332-7398 at 2400 bps. You can subscribe online. Rates: US$ 20/month plus US$ 2/hour (invoiced by the minute online - 1992). ZiffNet ------- markets its services through CompuServe (ZiffNet and ZiffNet/Mac), Prodigy, and its own online service in the U.S.A. Their offerings include the Ziff Buyer's Market, the ZiffNet/Mac Buyer's Guide, Computer Database Plus, Magazine Database Plus, NewsBytes, and the Cobb Group Online. Contact: Ziff Communications Company, 25 First Street, Cambridge, MA 02141, U.S.A. Tel.: +1-617-252-5000. Appendix 2: Short takes about how to get started ==================================== * a computer * modem and a communications program You must have a computer ------------------------ It is not important what kind of computer you have, though you may find out that it is an advantage to have a popular one. The most common type of microcomputer today is called MS-DOS computers (or IBM PC compatibles or IBM clones). Your computer should have enough memory for communication. This is seldom a problem. An MS-DOS computer with 256 KB RAM is enough when using popular programs like PROCOMM. Your computer does not have to be very powerful and super fast, unless you want ultra fast transfers, use a slow communications program, or a complex system of script files. If this is the case, you'll know to appreciate speed and power. You do not need a hard disk. Many do without. Not having one, however, means more work, and less room for storage of all the nice things that you may want to retrieve by modem. Personally, I want as much hard disk space as I can possibly get. When you have read the book, I guess you'll understand why. Others may want to delay the purchase of a hard disk until they can spare the money. If you can afford it, however, do it! It is a decision that you'll never regret. You must have a modem --------------------- Some computers are always connected to a network. If this is your situation, then you probably have what you need already. The rest of us need a modem. A modem is a small piece of equipment that is translating the internal, electrical signals of the computer to sound codes. These codes can be sent over an ordinary telephone line. You may think of it as a type of Morse alphabet. The recipient of data also needs a modem. In his case, the sound codes will have to be translated back into their original form as digital codes. When this is done, he can view text and pictures on the screen, and use the received data in other applications. You can buy modems on an expansion card for installation in your computer, or in a separate box. Often, a modem has already been built into the computer, when you buy it. Whether to buy an internal or an external modem is a question of needs: A portable computer with an internal modem is easier to bring on travels than an external modem with a modem cable and a power adapter. An external modem can serve several computers. Some of them are so compact that they fit besides your toothbrush in the toilet bag. An internal modem blocks one of your serial ports. External modems --------------- The options are many. The modems differ on speed, features, prices - and whether they are approved for usage in your country. Some of them are connected to the phone line by cable. Others are connected to the handset (to the talk and listen part) by two rubber cups. We call such modems acoustic modems (or acoustic couplers). Acoustic modems are useful where connecting other modems to the telephone is difficult. The bad news is that you'll get more noise on the line. Acoustic modems can therefore not be recommended for use in other cases. Asynchronous or synchronous modems? ----------------------------------- Formerly, data communication was done by sending job commands to a mainframe computer, and having the result returned in one batch. The modems were called synchronous. Such modems (and computers) are still in use in some large corporations. Most of today's online services are based on an interactive dialog between the user and the remote computer. The user enters a command, for example a letter or a number in a menu, and the result is returned almost immediately. The modems used for such work are called asynchronous (See "Explanation of some words and terms" in appendix 4). Unless you know that you must have a synchronous modem, buy an asynchronous one. Choice of speed --------------- Speed is measured in many ways. One method is to use baud. Another is to use characters per second (cps) or bits per second (bps). Bps is a measure of how many data bits that can be transferred over a data channel in one second. (Each byte is split up into bits before transfer during serial communication.) The relationship between baud and bits per second is complex, and often misused. Bits per second is unambiguous. In this book, we will use it as bps. We can estimate the number of characters per second by dividing the number of bps by ten. For example. 1200 bps is roughly 120 cps. In 1987, 300, 1200 and 2400 bps asynchronous modems were the standard in many countries. Around 1990, the growth in 9600 bps modems and modem with faster speeds gained momentum. Modem user manuals often give transfer speed by referring to some international classification codes. Here are some CCITT codes with explanation: V.21 0-300 bps Still used by a small group. Cannot full duplex communicate with the American Bell 103 standard. V.22 1200 bps Partly compatible with the American full duplex Bell 212a standard. Sometimes it works, sometimes it fails. V.22bis 2400 bps Used all over the world. Very full duplex common. V.23 600 & 1200 Rare protocol. Used mainly in Europe. bps w/75 Half duplex. bps return ch. V.26ter 2400 bps Used mainly in France full duplex V.27ter 2400/4800 bps Used in Group III fax half duplex V.29 4800, 7200 and Used in gr. III fax and in some (Ame- 9600 bps rican) modems. Do not buy V.29 if you half duplex want a 9600 bps modem. V.32 4800/9600 bps Current standard for 9600 bps modems full duplex V.32bis 4800/7200/9600, Full duplex with faster interrogation. 12000/14400 bps V.34 14400 bps A proposed high speed protocol that never made it. V.42 Error correction protocol (an appendix yields compatibility w/MNP gr. 2,3 and 4 (see MNP below). For V.22, V.22bis, V.26ter and V.32. V.42bis Data compression for V.42 modems. Meant to replace MNP and LAP. Text can be transferred three times faster than with MNP, i.e., in up to 38400 bps using a 9600 bps modem. Very common. V.Fast Upcoming standard. If approved by also called CCITT, it will support speeds to V.32terbo 28,800 bps for uncompressed data transmission rates over regular dial- up, voice-grade lines. Using V.42bis data compression, up to 86,400 bps may be achievable. When you consider buying a modem with higher speed, remember that going from 1200 bps to 2400 is a 50 percent increase, while going from 1200 to 9600 bps gives 800 percent! On the other hand, if you currently have 9600 bits/s, going to 14.400 will only give you 50 percent. MNP error correction and compression ------------------------------------ The Microcom Networking Protocol (MNP) is a U.S. industry standard for modem-to-modem communication with automatic error correction and compression. Automatic error correction is useful when there is noise on the telephone line. MNP splits the stream of data up into blocks before transmission. They are checked by the other modem upon receipt. If the contents are correct, an acknowledge message is sent back to the sending modem. If there has been an error in the transmission, the sending modem is asked to retransmit. When using compression, files are being preprocessed before transmission to decrease their size. The result is that the modem has to send fewer bytes, and the effect is higher speed. MNP Level 3 and up send data between two modems synchronously rather than asynchronously. Since sending a start and stop bit with each transferred byte is no longer required, the effect is higher speed. MNP-4 or higher have automatic adjustment of block length when there is noise on the line. If the line is good, longer blocks are sent. The block size is decreased if the line is bad causing many retransmissions. MNP-5 has data compression. This gives a further increase in transfer speed by from 10 to 80 percent depending on the type of data sent. MNP-7 is capable of a three-to-one compression ratio. Both users must have their modems set for MNP to use it. The speed of the computer's COMM port ------------------------------------- Installing a super fast modem does not guarantee an increase in the effective transfer speed. The serial port of your computer may be a limiting factor. Owners of older MS-DOS computers often have UARTs (serial port processors) in the Intel 8250 or National 16450 series. With these in the computer, it is difficult to achieve speeds above 9600 bps without losing data. Take this into account when investing in a modem. MNP and efficiency ------------------ I call my bulletin board daily. My personal computer is set to communicate with a V.32 modem at 19,000 bps. The modem sends data to the telephone line at 9600 bps, which is this modem's maximum line speed. Data is received by the remote computer's V.32 modem at 9600 bps, and forwarded to bulletin board at 19200 bps. Why these differences in speed? MNP level 5 compresses data in the modem before transfer, and gives error-free transfer to and from the bulletin board at higher speed than by using 9600 bps all the way through. The compression effectiveness differs by the type of data. When sending text, the effective transfer speed may double. Speed will increase further if the text contains long sequences of similar characters. Text is typically compressed by up to 63 percent. This means that a 2400 bps modem using MNP-5 may obtain an effective speed of around the double when transferring such data. File transfers using MNP ------------------------ Files are often compressed and stored in libraries before transfer. Online services do this because compressed files take less space on their hard disks. Also, it is easier for users to keep track of files sent in a library file. You rarely get speed advantages when transferring precompressed files using MNP or V.42bis. With some modems, you must turn MNP and V.42bis compression off before retrieval of compressed files. Dumb or intelligent modem? -------------------------- Some modems are operated with switches or buttons on a panel. They do not react to commands from your computer. We call them dumb. You must dial numbers manually, and press a key on the modem, when you hear the tone from a remote modem. Only when the modem is connected to the remote modem, can you ask your communications program to take over. We call those modems 'intelligent' that can react to commands from your computer. Most of them react to commands according to the Hayes standard. Buy intelligent, Hayes-compatible modems - even when other standards may seem better. Most of today's communication programs are designed to be used by such modems. Note: Buy modems that use the Hayes extended command set. When a popular communications program, like Procomm and Crosstalk, tells the modem to "dial a number" or "go on hook," then the Hayes- compatible modem will do just that. When you press ALT-H in Procomm, the modem will disconnect from the remote modem. If you press ALT-D followed by the number "2," Procomm will locate the number to an online service in your telephone directory, and dial that number. When the connection with the remote modem has been established, your modem will report back to you with a message like CONNECT 2400. This tells that a connection has been set up at 2400 bps. If I select "k" from a menu provided by my communications program's command scripts, then my system will retrieve today's business news from Tokyo and put them up on my screen. In the process, my system tells the modem to do several things, including "call a number," "speed 2400 bps," "redial if busy," "go on-hook when done." The only thing that I have to do, is press "k". The communications program and the modem will do the rest. Automatic communication is impossible without an intelligent modem. The Hayes standard ------------------ The U.S. company Hayes Microcomputer Products, Inc. pioneered command-driven modems. Their Smartmodem became a success, and "Hayes compatibility" a standard for intelligent modems. Today, it is as unimportant to buy a Hayes modem to get access to Hayes commands, as to buy an IBM PC to run PC software. Automatic dialing (autodial) was one of Smartmodem's important features. The modem could call a number and prepare for data communication, once a connection had been set up. If the line was busy, it could wait a while and then redial. The operator could work with other things while waiting for the equipment to be ready for communication. The modem had automatic answer (autoanswer), i.e., when someone called in, the modem could take the phone off hook and set up a connection with a remote modem. The modem enabled a connected PC to act as an electronic answering machine. Hayes-compatible modems can report call progress to the local screen using short numeric codes or words like CONNECT, CONNECT 1200, CONNECT 2400, NO CARRIER, NO DIALTONE, BUSY, NO ANSWER, RING etc. There can be small differences between such modems. The message DIALTONE on one modem may be DIAL TONE on another. Most of the main progress messages, however, are the same across brands. The old Smartmodem had switches used to configure the modem. Most modern Hayes-compatible modems come without switches and have more commands than their ancestor. Today's Hayes-compatible modems have a core of common commands, the "real" Hayes-commands, and several unstandardized additional commands. Here is an example: A standard on the move ---------------------- On the Quattro SB2422 modem, 2400 bps speed without automatic speed detection is set by the command "AT&I1." The equivalent command on Semafor's UniMod 4161 is "AT+C0". Automatic detection of speed is a feature that lets the modem discover the speed of the remote modem to set its own speed at the same level. (Other modems may use different commands to set this.) When I want Procomm to call a bulletin board, it first sends a sequence of Hayes commands to the Semafor modem. The purpose is to "configure" the modem before calling. It sends the following: AT S0=0 +C0 S7=40 S9=4 &D2 The cryptic codes have the following meaning: AT "Attention modem. Commands following.." S0=0 No automatic answer +C0 No automatic speed detection (fixed speed) S7=40 Wait 40 seconds for an answer tone from the remote modem. S9=4 Wait 4/10 seconds for detection of carrier &D2 Go on-hook if the DTR signal is being changed. If this command is sent to the Quattro modem, it will reply with "ERROR". The code "+C0" must be replaced with an "&I1". The rest of the commands are the same. (Note: when a modem responds with "ERROR," it has usually rejected all commands sent to it!) This setup is held in the modem's memory when Procomm sends its dialing command: ATDT4737031378. AT stands for ATtention, as above. DT stands for Dial Tone. Here, it is used to dial the number 4737031378 using tone signaling (rather than pulse dialing). The modem cable --------------- If you have an external modem, you must connect your computer to the modem with a cable. Some modems are sold without a cable. This cable may be called a serial cable, a modem cable, a RS232C cable, or something else. Make sure that you buy the correct cable for your system. Make sure that the connectors at each end of the cable are correct. If a male connector (with pins) is required in one end and a female (with holes) in the other, do not buy a cable with two male connectors. Some connectors have 9 pins/holes, while others have 25 or 8- pin round plugs (Apple computers). Use a shielded cable to ensure minimal interference with radio and television reception. At this point, some discover that there is no place on the PC to attach the cable. Look for a serial port at the rear of your machine, labeled MODEM, COMMUNICATIONS, SERIAL, or with a phone symbol. If you find no suitable connector, you may have to install an asynchronous communication port in the box. Connecting your equipment to earth ---------------------------------- Secure your computer and modem against thunderstorms and other electrical problems. Securing the electric outlet in the wall is not enough. Problems can also enter through the telephone line. Thunderstorms have sent electrical pulses through the telephone line destroying four modems, three PC-fax cards, one mother board, and at least one asynchronous communication port. To prevent this from happening to you, disconnect electrical and telephone cables from your equipment during thunderstorms. The communications program -------------------------- A powerful communications program is half the job. In my case it's the whole job. Most of my work is done automatically. The communications program will help you with the mechanical transportation of data in both directions. It lets you store incoming information for later use and reduces the risks of errors. Here are some items to consider when shopping communications program: * Seriously consider buying automatic programs ('robots') for access to individual online services, even if that means having to use several programs for different applications. (Read chapter 16 for more details.) * Menus and help texts are important for novices, and in environments with "less motivated personnel." Advanced users may find it boring. * Ability to transfer data without errors. The program should have transfer protocols like XMODEM, Kermit, XMODEM/CRC, YMODEM and ZMODEM. The XMODEM protocol is the most commonly used. You need these protocols if you want to transfer compiled computer programs (e.g., .COM and .EXE files). They are also used when transferring compressed files, graphics and music files. * Does it let you tailor it to your taste/needs? Some programs let you attach batches of commands to function keys and keypress combinations. For example, by having your computer call your favorite online service by pressing the F1 key. * Does it let you "scroll back" information having disappeared out of your screen? This may be useful when you want to respond while online to an electronic mail message. The sender's address and name, which you need to respond, have scrolled off the screen. If you cannot review the "lost" information, you may have to disconnect and call back later to send your mail. Connecting to the online service -------------------------------- The first couple of times, most people think that it is very difficult. Soon it becomes a simple routine. On some computers, you just press a key, and that's it. On others, you have to call and press, and watch, while things are happening. Cheap is often a synonym for more work. If you have a dumb modem connected to your personal computer, these are the typical steps that you must take: (1) Start your communications program and set it up, e.g., with 2400 bps, 8 bits word length, 1 stop bit, no parity. (This is the most common setup.) Then set the program to "online." (2) Call the number (e.g., +47 370 31378) (3) When you hear the tone from the remote modem in the phone, press DATA to get the modems to connect to each other (i.e., to start to "handshake"). (4) A front panel indicator may tell you when the connection has been set up. You can start transferring data. With an MS-DOS computer, an automatic modem and a powerful program preset for the job, the steps may be as follows: (1) Start the program and display the telephone directory. Select a service from the list by pressing a number. (2) The modem will call automatically to the service. When CONNECT has been established, your user identification and password are sent at the prompts for such information. When this is done, you are free to take control. With an MS-DOS computer, TAPCIS, and an intelligent modem, you start by selecting forums and services to access on CompuServe. Enter 'o' to upload and download programs, or 'n' to have it fetch new message headers and messages. TAPCIS will dial the number, do the job, and tell you when it's done. Meanwhile, you can go out to look at the moon, or sing a song. Getting started with Procomm ---------------------------- Procomm is cheap and probably the most commonly used communications program for MS-DOS computers. It's been like this for many years, though there are many better and cheaper alternatives. An older version of the program (version 2.4.2) is still being distributed through bulletin boards all over the world. You may give copies of this version to anyone. The requirement is that you pay a contribution of US$25 to the vendor if you like it and start to use it. Procomm is simple for novices, can automate the work for advanced users and be run on almost any MS-DOS computer. Here is some of the features: Press ALT-F10 for a pull-down window text listing features and commands. Press ALT+D to call a number, update the telephone directory, or select a script file for autologon to a service. Procomm can emulate (pretend to be) different terminal types, like IBM 3101 and DEC VT-100/VT-52. Most services covered in this book may be well served with the setting ANSI.BBS. It let you use both dumb and intelligent Hayes-compatible modems. If you have the latter, select numbers from the telephone directory for autologon. If the number is busy, Procomm can call back until you can get through. You can define macros to automate your work. You can have one keystroke send your user identification, another for your password, and a third key to send a sequence of commands. Macros make your communication faster and safer. You can write script files to automate the online work further. You can transfer text files and binary files using automatic error detection/correction protocols, like XMODEM, YMODEM, Telink and Kermit, at speeds from 300 to 19200 bps. Adding external protocols like ZMODEM is relatively simple. Appendix 3: Online with the world ===================== - Practical data communication - Your first trip online - Typical pitfalls and simple solutions - Receiving (downloading) letters, text and programs - Sending (uploading) letters, text and programs Practical data communication ---------------------------- The first thing novices want to know is how to set up the modem and computer for communication. This may take more time than expected and often seems complex for the uninitiated. You can save yourself much sweat and frustration by asking others for help. To set up your equipment for communication is a one time job. Once done, you can almost forget what you did and why. There are so many different modems, computers and programs out there. We just cannot give practical advice on the use of all of them in one short appendix. Instead, we will use one example. Your job is to "translate" the text into a terminology that fits your tools. Once your system is set up for communication, your first job will be to find what keys to press to get the job done. How you use your communications program may vary considerably from our example. In general, however, it will be the same for most people doing manual communication. Once online, the environment is the same for all users. If you plan to use automatic communications as explained in chapter 16, this chapter may not be that important. Your program will do the job for you. Still, take a few minutes and browse through the text. It may enable you to handle unexpected problems better. Our example assumes that you have an MS-DOS computer. Not because this is the best microcomputer in the world, but because there are more of them than anything else. We assume that you have an external, intelligent Hayes-compatible modem and the communications program Procomm (version 2.4.2). In this example, your modem is tested by calling my bulletin board at +47 370 31378. Not because this is the best board in the world, but because I have full control over how it looks and feels for those using it. Assembling the equipment ------------------------ You have the modem, the cable (to connect your modem with the computer), a phone cable (to connect your modem with the phone or the wall jack), and a communications program. Check that the modem's power switch is off. Place the modem by the computer, and plug the power supply cord (or the power adapter cord) into the AC wall socket. Switch on the modem. Do NOT use 115-volt equipment in 250-volt sockets! Connect modem and computer using the modem cable. There may be several optional sockets on the computer. These are usually marked RS-232, COMMS, MODEM, or just nothing. The connector may be of a flat 25-pins, 9 pins, or a round 8-pins type. Use communication port number 1, 2, or whatever else is available for this purpose. If you have several options, and the socket for communication port number 1 seems free, use this. If not, try one of the others. Next, connect the modem to the telephone line. If in luck, the modem came with a phone cable that works with your setup. If so, it is simple: 1. Disconnect the phone cable from the telephone. Insert the modular plug into the right jack on the modem. This jack is often marked with the word LINE, with a drawing of a modular wall jack, or another understandable icon. 2. You may be able to connect the phone to the modem using the phone cord that came with the modem. This may allow you to use the phone for voice, when the line is not busy with communication. (You may have to make changes in this cord to make it work with the connected phone.) This concludes the technical assembly of your equipment. Next step is to install the communications program. When this is done, we will check it out. Installing the program ---------------------- Let us assume that you have received Procomm on a diskette, and that it is set up with its default configuration. PROCOMM.EXE is the program. The other files have no importance here. Enter Procomm and press ENTER. Our first task is to prepare it for communication: If you are using a monochrome display, use the command PROCOMM /B The program will greet you by a welcome text. At the bottom of the screen, the message "CREATING SYSTEM FILES" may appear (if these have not been created yet), followed by a message from the creators of the program. Press ENTER when you have read the text. The screen will be blanked, and a text line will appear at the bottom. Now is the time to test if the technical installation has been successful. The dial tone ------------- Lift the receiver from the phone and check if you can hear the dial tone. If you can, turn the pages to "Does the computer have contact with the modem?" If you hear nothing, there are several possible causes: * The phone is not working. This is easily checked. Disconnect it from the modem, and connect it to the wall (using the original cable!). If you get a dial tone now, then the phone is in order. * The cable between the modem and the wall jack may be broken, or wrongly configured. To check this, we must first check the connection between the modem and the computer. Once we know that the connection between the modem and the computer is in order, we can use the modem to check our phone cable. * The cable between the modem and the phone may be in disorder. For example, the modular phone connector may have a cabling that differs from what is assumed in your country. If there is no dial tone, then the cable between the modem and the telephone must be repaired, or replaced. Does your computer have contact with the modem? ----------------------------------------------- When you first use Procomm, it is preset for communication at 300 bps, use of port 1 and ANSI-BBS. (The control line at the bottom of your screen should read: ALT-F10 HELP, ANSI-BBS, HDX, 300 N81, LOG CLOSED, PRT OFF, CR and CR.) * If your modem is unable to communicate at 300 bps, you must change the setup. Press ALT-P (keep the ALT key down while pressing P) to get the menu LINE SETTINGS. Choice 9 gives 2400 bps with 8 bits word length, no parity and one stop bit. This is a common setting. Select 24 "Save changes" to make the setting permanent. * If you know that your modem is not connected to the computer's port number 1, then change this from the same menu. Choice 21 gives COM2, and choice 22 gives COM3. If you don't know what communication port the modem has been connected to, you have to find out by testing. Do this by entering (i.e., sending to the modem) the characters AT. Now, the modem is supposed to respond with an OK (or with the number "0," if the modem is set to reply with numeric codes). If you get an "OK" or a "0" on your display, continue reading from "Does the modem have contact with the phone line?" If you can see "AT" on your screen while you enter it, you have contact with the modem. This is true even if it does not send any confirmation. The modem may have been instructed not to confirm. If you see the AT characters, read from "Does the modem have contact with the phone line?" If there is no contact between the modem and the computer, the screen will remain blank at all times. Your problem may be the cable, your choice of modem port, or the modem setup. First, check if the modem is switched on (the power switch), and that the plugs are firmly in the jacks. Then let's check the modem. It may have been set not to respond to your commands. Let's try to change that. Enter the following command, and press ENTER: ATQ0E1V1 This should make your modem: give result codes on your screen (Q0), show the characters that you enter (E1), and use OK instead of the numerical result code 0 (V1). If you still get no OK, the reason may still be in the modem. I have seen modems get "indigestion problems" when too many commands are given to them. Try give a command to return it to its factory setting. This command is not the same on all Hayes-compatible modems. On most of them, you can use one of the following: AT&F, ATF or ATZ (on some modems ATZ is used to reset to the stored configuration). Locate the correct command to use in the modem's user manual. Then, try ATQ0E1V1 again. If you are still without success, check your choice of modem port. If there are several communication connectors at the back of your computer, test these. If this doesn't help, connect the modem cable to the most probable jack. Now, test the communication port for a response from the modem using another communications program setting. Press ALT-P, select another port (choice 20 - 23), press ESC and try "AT" again (or ATQ0E1V1). If there is still no reaction, test the computer's other communications connectors. If you have a mouse connected to your computers, make sure that it is not using the same port as your communications program. Problems with the communications port are often caused by other equipment. Remove all extra equipment (like a PC-fax card or a mouse), and all associated software (often represented by a line starting with "DRIVER=" in CONFIG.SYS, or a resident program driving a mouse). Remove all resident programs from memory before testing. If you are still at the same unfortunate stage, chances are that the problem is either in the cable or the modem. If you know others who are into data communication, visit them for help. Bring your cable and your modem to have them tested in an environment where things work. It is easier to isolate a problem by testing your units in sequence on your helper's system. First, the cable. Connect it between his computer and his modem. Test the connection to his modem with your cable as the only foreign element. If the test is successful, your cable is OK. Next, the modem. If the test is successful, your modem is in order. The most probable cause of your problems is your computer's communications port. In communications, many parts have to work together. You may have problems with more than one of them at the same time. The rule is to test step by step to eliminate possible problems. If you get no reply from your modem, when it is connected to your friend's computer, chances are that it needs to be repaired. Call the seller for help. A last refuge is to buy an extra communications card for your computer . . . Does your modem have contact with the phone line? ------------------------------------------------- You have contact between your computer and modem. The modem answers "OK" as assumed. We now have to test if there is contact with the phone line. That is easy. Enter the following command and press ENTER: ATQ0E1V1 When the modem answers OK, enter the dialing command: ATDT37031378 The modem will try to call 37031378, the number to my BBS. (You may have to prefix the number with an international code, and the country code for Norway. If international calls require the prefix 009, enter ATDT009-47-37031378). Your modem will wait for CONNECT a preset number of seconds (rarely longer than 60 seconds). If your modem does not detect the dial tone (within the preset waiting time), it will give you the following error message NO DIALTONE All other messages (except ERROR) declare that the modem did detect the dial tone. If it did, continue reading from "Configuring your program." NO DIALTONE ----------- The most probable causes of NO DIALTONE are that your phone cable is not connected, that it has been damaged, or that it is the wrong cable for the job. The latter cause is common in many countries. For example, a cable made for a telephone network in the United States, may not work in Norway. A cable made for connection to a switchboard, may not work when connected to a domestic phone line. A standard, domestic American phone cable contains four lines. Two of these (line number 1 and 4) carry sounds. The others are not being used. A standard Norwegian domestic cable is set up in the same way, but here line number 1 and 3 carry sound. Changing the configuration of such cables is often simple. Just cut the cable in two, and put the lines together correctly. This is typically required when your modem assumes that you use it in North America, while you are in a country with different cabling. Configuring your program ------------------------ The modem answers. The dial tone is being detected. Procomm is installed on your hard disk. Now, check if the program has been correctly configured. Press ALT-S to get the Setup Menu. Select 1, Modem setup, from this menu. Choice 1, Modem init string, is a general setup command. This command will be sent to the modem each time you start Procomm. You are free to make is as long and powerful as you want. Our purpose now, however, is to check if it works. Most modems do not react if one element in your setup command is wrong. They respond with ERROR (or the numeric code), and disregard the rest. Procomm's standard Modem init string has the following commands: ATE0 S7=60 S11=55 V1 X1 S0=0! These work well with most modems, provided the speed is legal. Go back to the blank screen (using ESC). Test the init command by entering it manually. (Do not enter the "!" character. This is Procomm's code for ENTER.) If the modem reacts with ERROR, check with the modem manual to find out what is wrong. (Check if the values S7=60 and S11=55 are not too high.) If you have to change the init command, go back to the Modem init string menu choice. Enter the correct commands. Remember to add the "!" at the end. Press ESC to get to the main configuration menu and select 2, TERMINAL SETUP. Check if Terminal emulation is ANSI-BBS. Change choice 2, Duplex, to FULL. The other factory settings are NONE, CR, CR, DEST, BS, OFF, ON, 350, OFF. Return to the SETUP MENU (press ESC). Press "s" to save the setup to disk. Your setting has now been stored, and Procomm is ready to be used. Dialing ------- Now, test your setup by calling your favorite online service. We will show how to log on to my bulletin board. You can call manually by entering ATDT followed by the phone number. The most practical method, however, is to use the built-in phone directory. Press ALT-D to get to the phone directory. Press "R" to revise the list, and enter Saltrod Horror Show somewhere on the list. I have it as number 2. Answer the questions like this: Name: Saltrod Horror Show Number: 009-47-370-31378 Baud: 9600 Parity: N Databits: 8 Stop Bits: 1 Echo On? N Command file: (press ENTER, meaning that you don't want to use a script file at this point) Baud can be anything from 300 bps to 9600 bps. It's up to you, and depends on your modem's capabilities. When done, enter "2" and press ENTER. The modem will dial the number (that you have as item 2 on the list), and try to connect. If the number is busy, you will get a warning. You can now leave Procomm (ALT+X), or set it for redialing (ALT+R). When set for redialing, Procomm will call back until a connection has been made. When CONNECT is received from your modem, Procomm announces the fact with a beep in the computer's loudspeaker. Text will start scrolling over your screen. First, a short welcome text pops up. Your interactive dialog with the bulletin board can start. The first question is "What is your First Name?" Enter your first name. Then, "What is your Last Name?" Enter your last name. Your dialog with the remote computer will continue like this. The board will ask you questions, and you will enter your answers. What may go wrong? ------------------ A setting that works beautifully when calling one bulletin board, may be a disaster when calling another service. Here are some typical problems: When dialing through a switchboard (PBX). ----------------------------------------- Remember to add 9 or 0 for a city line, when dialing out from a PBX. If you forget, you'll get nowhere. Use the following command (assuming that you must enter 0 to get a city line, and use tone signaling): ATDT0W4737031378 If you must use 9 for a city line and pulse dialing, use the following command ATDP9W4737031378 Register your standard dialing command in Procomm's MODEM SETUP. Enter ALT+S and then select 1, Modem Setup. Choice 2, Dialing command. The default entry is ATDT. Replace this with ATDT0W, ATDP9W or whatever makes dialing work for you. No answer from the remote computer ---------------------------------- Your computer has to "talk the same language" as the remote host. If the parameters of your communications program have been set incorrectly, it may be impossible to set up a connection with the service. Sometimes, you get CONNECT, but your screen only gives you strange, unintelligible 'noise' characters. The reason may be CONNECT at an incompatible speed, a service's use of special codes for displaying text (including special language characters), or that the service requires use of a special communications program or method (as when a service starts by interrogating for the use of an offline reader). Many online services require that you use certain settings. Most services, however, may be reached when using the following: Speed: 2400 bps 8 bits word length, no parity, one stop bit Some services (notably some Unix hosts) demand 7 bits, even parity, one stop bit. Sorry, no luck! --------------- Try again, just in case. The remote computer may have had a temporary problem, when you called. The PTT may have given you a particularly noisy telephone line on this attempt. If this doesn't help, recheck each point in the communications process. It is so easy to do something wrong. If nothing helps, read the service's user information manuals. Only rarely will you be able to blame the communications program (unless you have made it yourself), or the equipment. Most errors are caused by finger trouble and misunderstandings. Testing the Saltrod Horror Show ------------------------------- First time visitors often experience problems, and in particular if this is their first time online using a Hayes-compatible modem. Here are some typical problems with suggested solutions: * Disable Guard Tones from the modem when dialing. If it has this feature, you can often turn it off. Put the required command in your Modem init string. * Don't press ENTER to "wake" my system. The software will automatically detect your speed and adjust accordingly. The same applies for many services. On some, you're just asking for problems by not waiting patiently (often the case when the remote software starts by checking if you use an offline reader). * My BBS accepts from 300 to 9600 bps asynchronous, full duplex communication. You may not succeed with 1200 bps half duplex, Bell 300 bps or 1200 bps. * Start with your communications program set for 8 bits word length, no parity and one stop bit. Try 7 bits, even parity if there is too much noise on the line (you cannot retrieve programs using this setting, though). * When your modem is set at a low transfer speed, it may not wait long enough for carrier from my modem. Most modems let you set this waiting time longer by giving a value to a S-register. (Read in your modem's manual about how to do this). Partial success --------------- Some bulletin boards offer colors and music. If your equipment is set up correctly, you can receive the welcome text in full color graphics accompanied by a melody in your computer's speaker. If it is not, chances are that you will get many strange codes on your screen, and an ugly feeling that something is wrong. There are two ways out of this problem: 1. Ask the bulletin board to send text only (select U for Utilities, and then G for Graphics to change setting), 2. Set your computer for colors and graphics. This feature is only available for callers with an MS-DOS computers. You may need to add the line DEVICE=ANSI.SYS in your CONFIG.SYS. Finally, you must have a communications program that allows you to display colors on your screen. Procomm set with ANSI-BBS does that. Downloading programs -------------------- We call the transfer of programs and files from a remote computer for downloading. It means "transfer of data to your computer AND storage of the data (down) on YOUR local disk." You are downloading, when you call my board to retrieve a program. When you, overwhelmed by gratitude, send one of your favorite programs TO my bulletin board, then we call it uploading. Data can be many things. It may be news from Washington Post, a digital picture, an executable program, a pile of invoices, a piece of music, a voice file, an animated sequence of pictures and music, or compressed library files. Downloading "plain text" (also called "plain ASCII" or "DOS text" on MS-DOS machines) is relatively easy. Such text usually only contains characters between number 32 (space character) and 126 (the ~ character) in the ASCII table. Characters with lower numbers have special functions (like the control characters ESCape and CTRL+C). These may not even be displayed on your screen. Characters with higher numbers are used for graphics, special national characters, and other applications. Special transfer methods are often required, when your data contains text with characters outside ASCII number 32 through 126. Read under "Protocol transfers" below for more information about how to do this. Downloading text ---------------- Most communication programs require that you begin by opening a file. They ask you to enter a file name. From this point and onwards all incoming text will be stored in this file until you say stop. Communication programs do this in different ways. Some let incoming data flow through a temporary storage area using the principle first in, first out. When you open a file, it starts storing data from the beginning of the temporary storage area, though this text may have scrolled off your screen some time ago. Most communication programs start storing data from NOW. Procomm works this way. You start downloading of text by pressing the PgDn key. A window will appear on your screen giving you a choice between various methods. Select ASCII. In another window, you are asked to enter a file name. When done, storage of incoming data starts. You stop the process by pressing the ESC key. Procomm has another method called "file logging." You start this by pressing ALT-F1. Procomm requests the file name, and the storage process starts. (Read under "Strip" about the difference between these methods.) If you forget to tell Procomm to store incoming data, then you will most probably lose this data for ever. Do not waste time and money by forgetting to store what you receive! The term "append" ----------------- When downloading text - or anything - it is important to know whether you are appending information to an existing file, or overwriting it (i.e., destroying the old text). Most communication programs complain with an audible signal, when you try to overwrite an existing file. They will ask you if you really want to delete it, or append the current data. The term "strip" ---------------- The purpose of 'strip' is to remove something from incoming data or to change it on the fly. When you use ASCII downloading with Procomm, ALL incoming data are being stored. This includes so-called ESCape sequences. If you use File Logging, all control characters (except the line feed and new page characters) are being removed (filtered). If you download text from a computer that uses other ASCII characters for linefeed and return, save time by having the communications program convert them on the fly to their correct form for your computer. You define strip procedures through Procomm's SetUp menu (ALT- S). You can also request automatic conversion of characters to graphics values, or local language variants. National characters ------------------- Special national characters cause problems in many countries. One reason is that they are represented by different internal codes on various hardware platforms, and that some networks are unable to transmit 8-bits data. Some systems represent these special characters by a 7-bit code, others by an 8-bit code. Some depend on the computer having an internal national language ROM, or that it uses a special (resident) conversion program. What gives good results on an MS-DOS computer, may give rubbish on a Macintosh, Amiga, Atari, or a PC using MS Windows. Many communication programs have features that can help you solve at least some these problems. They let you make translation tables for automatic conversion of special incoming and outgoing characters. If you call a Scandinavian online service using 7 bits even parity, many transfer the national special characters using the ASCII code equivalents of number 91, 92, 93, 123, 124, and 125. Similar, more or less formal standards are in place in other countries. Protocol transfers ------------------ If your purpose is to transfer digitized pictures, a computer program, a batch of invoices, a piece of music or an animated sequence of pictures, it's important that each character (bit) arrives correctly. We achieve this by using protocol transfers. These files often contain control or binary characters. You cannot transfer binary files without the use of special methods. It is easy to understand why we need protocol transfers when retrieving plain text as tables of numbers, statistics, and financial reports. Transfer errors may have fatal consequences. Protocol transfers are also required when transferring word processor text files having imbedded control codes (like text made with WordPerfect), and compressed files. Here is an example: Downloading public domain software ---------------------------------- First, you need the names and features of the programs that can be downloaded from a service. On most bulletin boards, you must enter a command to navigate to the File Library. Here, they normally greet you with a menu listing available commands. Try H (for Help!) or ? when you are stuck. Public domain and shareware programs are stored in subdirectories on my bulletin board. The directories have numerical names. Utility programs for MS-DOS computers are stored in directory 10. Games are stored in directory 17. Enter L for a list of available directories (other bulletin boards may use different commands). Enter "L 17" to list the files in directory 17. This will give file names, lengths in characters (to help you estimate download time), creation dates, and a short description of each file. You can search for files of interest. When looking for programs that can help you get more out of a printer, you may search using keywords like "printer." Some programs are made available in text form. This is the case with older BASIC programs. (The file name extensions .BAS, .ASC or .TXT suggest that the files contain plain text.) You can download these files using ASCII. Most programs are stored in their executable form, or as one executable file among several in a compressed transfer file (a library of files). On my board, most of these files have the file name extension .EXE or .COM. What transfer protocol to use, depends on what is available in your communications program. The protocol transfer method explained -------------------------------------- The protocol transfer algorithms use methods to check the transfer with automatic error correction. In principle, they work like this: The sending program calculates a check sum based on the contents of the file. The receiving program does the same calculation and compares the result with the senders' check sum. If the figures match, the transfer was successful. If not, all or part of the file will be retransmitted. These are some popular protocols: XMODEM ------ has automatic error detection and correction. Most modern programs have this feature. XMODEM exists in programs for MS-DOS computers, CP/M computers, Apple, TRS-80 Model 100, etc. It is the most commonly used transfer protocol. XMODEM assumes 8-bit settings in your communications program. The file to be sent is split up into 128 bit sized blocks (or "packets") before transfer. The sender calculates the check sum and adds a check sum bit at the end of each packet. (Packing, sending and checking is done automatically by the software.) The receiving program calculates its own check sum and compares with the sender's. If an error is detected, XMODEM will request retransmission of the last block. XMODEM is reasonably good when there is little noise on the telephone line is low. When the line is bad, however, there is always a chance that the transfer will stop. You cannot use XMODEM on computer networks that use ASCII flow control or ESCape codes. The transfer commands must be given to both computers. You can only transfer one file per command. XMODEM's "packet size" (block length) is short. This has an impact on transfer speed, and especially when downloading from timesharing systems, packet switched networks, via satellites, and when using buffered (error correcting) modems. The control method (8-bit check sum) and unprotected transactions give a low level of safety against errors in the transmission. The transferred file may contain 127 bytes with noise characters (at the end). The creation date of the file is lost in the transfer. These weaknesses have given us better methods. Here are some of them: XMODEM/CRC ---------- CRC is an abbreviation for Cyclical Redundancy Check. The method guarantees 99.9969 percent free transfer. It still has the other weaknesses of ordinary XMODEM transfers. YMODEM Batch ------------ is faster than XMODEM and gives a high level of safety in the transfers. When used with some programs, YMODEM can transfer the files' creation time/date. You can transfer updated documents. This will replace documents with an older creation date. Only one party must enter the file name. YMODEM takes care of the rest. Kermit ------ is used on many computer platforms, and especially where they use a terminal emulation mode (like VT-100) which makes the use of XMODEM impossible. Kermit is one of the few asynchronous error correction protocols that functions well when exchanging files having half duplex IBM front-end machines. Kermit can transfer more than one file at the time. Super-Kermit ------------ is also called Kermit with Sliding Windows. It can transfer many packets before stopping to check the transfer. The protocol is much faster than XMODEM. ZMODEM ------ is currently the fastest transfer protocol for many applications. All transactions are protected with a 16-bit or 32-bit CRC. ZMODEM is immune against most error conditions that prevent traditional protocols to achieve correct transfer. ZMODEM transfers the creation date of the file and its exact contents. The file name is read once, and all transfer commands may be given by the sending program. Decompression of files ---------------------- If a file has name extensions like ZIP, LZH, ARC, PAK, LQR, LBR, ZOO, ARJ, or QQQ, you are facing a compressed file. We use such files to achieve faster transfers. Files having the extension .EXE or .COM may be compressed files that have been converted into a self-extract format. To retrieve the files from a self-extract compressed file, just enter the file's name. To decompress files that have not been made self-extract, you need a utility program. These programs have many names and are available through most bulletin boards. Transfer problems ----------------- Most transfer problems are caused by the communication programs and their (lack of) features. Some Procomm users have problems with the Kermit protocol. Tip: use 8 bit world length and no parity in your program setup. 7 bits and even parity does not always work (on version 2.4.2). Uploading --------- The transfer of data "the other way," i.e., from your disk to a remote computer, requires that you start by making some decisions. Is the file to be sent as plain ASCII? Should I compress it in a distribution file to reduce transfer time, and make it easier to handle for the recipient? If you are transferring a text file containing special national characters, then these may have to be converted to another format. If your text contains blank lines (like blank lines between paragraphs), you may have to insert a space character at the start of all such lines. Some systems interpret a blank line as a signal telling that transmission is done. The invisible space character prevents this. Some hosts have limitations on line length. They may require that lines be shorter than 80 characters. If you send lines that are too long, the result may be fatal. Sending electronic mail ----------------------- If you send your mail too fast, some online services tend to get digestion problems. You must be very accurate with the format of your message. It has to agree with the host machine's rules about line length, and maximum number of lines per message. Let's assume that you want to send the following message to an electronic mailbox: To: Datatid cc: Anne-Tove Vestfossen Sj: Merry Christmas! Text: Thanks for the box with herring. The taste was formidable. etc .. etc... etc... Greetings, Odd If this is all you have to say, doing it manually may be as fast as doing it automatically. However, if the line containing "etc .. etc .." is two full pages of text, you may feel differently. Then, the best may be to upload a prewritten letter. Many Procomm users prefer to split the job in two. They enter the first four lines manually, and upload the body of the text (when the remote computer is ready to receive). Press PgUp to get a menu of various uploading protocols. Select ASCII for transfer of plain text. Procomm will ask for the name of the file, which contains your letter. Enter the name, and the file will be sent. Slow down with "pacing" ----------------------- Sometimes, the PgUp method is just what you need. On other days, strange things may stop you in the middle of your transfer. One typical reason is that Procomm is sending it too fast for the recipient. "Pacing" is a method used to slow the speed of the transfer to a level that the recipient can handle. Procomm lets you set a tiny pause after each line sent. Another technique is to ask the program to wait for a given character (a "Go-character"), before allowing it to send the next line. For example: the character ":" is often used in the prompts for the next line on bulletin boards. Protocol transfers may be easier -------------------------------- You may find it easier to use a transfer protocol. With Procomm, press the PgUp key, and the program will ask for a protocol. Select Kermit or something else. The program will ask for a file name, you enter it, and off it goes. You will have no problems with blank lines, or lines that are too long. At times, even this will fail. The most common reasons are: * The recipient requires that Procomm be set for 8-bits word length, no parity, 1 stop bit, when using this protocol, but you have it set differently. * You think that the recipient's version of YMODEM is the same that you have. Wrong! Total failure. Do the following to upload the file TEST.TXT to my bulletin board using XMODEM: 1. Navigate to the file area. Tell SHS what you want by using the following command: u;test.txt;x 2. Press PgUp, select XMODEM, enter a file name (TEST.TXT), and the transfer will start. (If you're too slow, SHS may be tired of waiting for your commands . . .) 3. When the transfer is completed, my board will ask for a short description of the file. Enter it, and you're done. Enter G (for Goodbye), and disconnect. Appendix 4: Explanation of some frequently used terms ========================================= We have included some terms that are commonly used in the online world. For more information, get a copy of "FYI: Internet User's Glossary." To get this file, send email to SERVICE@NIC.DDN.MIL with the following command in the Subject of your mail: RFC 1392 . Address ------- The string of characters that you must give an electronic mail program to direct a message to a particular person. The term "Internet address" often refers to an assigned number, which identifies a host on this network. Anonymous FTP ------------- The procedure of connecting to a remote computer, as an anonymous or guest user, to transfer files back to your computer. See FTP for more information. ANON-FTP -------- See Anonymous FTP. ANSI ---- (1) ANSI is an organization that sets standards. (2) 'ANSI graphics' (ref. the term ANSI-BBS) is a set of cursor control codes that originated on the VT100 terminal. Many online services use these codes to help improve the sending of characters to communication programs. It uses the escape character, followed by other characters, to move the cursor on the screen, change color, and more. Archie ------ An electronic directory service for locating information throughout the Internet. You can use Archie to locate files on anonymous ftp archive sites, other online directories and resource listings. It is useful for finding free software. Archie offers access to the "whatis" description database. This database contains descriptions that include the name and a brief synopsis of the large number of public domain software, datasets and informational documents located on the Internet. This book emphasizes email access to Archie. You can also reach archie servers by telnet to one of the following addresses: archie.au 139.130.4.6 (Australian server) archie.mcgill.ca 132.206.44.21 (Canada) archie.funet.fi 128.214.6.100 (Finland/Europe s.) archie.th-darmstadt 130.83.128.111 (Germany) archie.cs.huji.ac.il 132.65.6.15 (Israel server) archie.kuis.kyoto-u.ac.jp 130.54.20.1 (Japan) archie.sogang.ac.kr 163.239.1.11 (Korea) archie.nz 130.195.9.4 (New Zealand) archie.ncu.edu.tw 140.115.19.24 (Taiwan) archie.doc.ic.ac.uk 146.169.11.3 (UK/England server) archie.rutgers.edu 128.6.18.15 (U.S.A.) Archie server ------------- An email-based file transfer facility offered by some systems connected to the Internet. ASCII ----- The American Standard Code for Information Interchange. A standard seven-bit code created to achieve compatibility between various types of data processing equipment. ASCII, pronounced "ask-key," is the common code for microcomputer equipment. The Standard ASCII Character Set consists of 128 decimal numbers ranging from zero through 127 assigned to letters, numbers, punctuation marks, and the most common special characters. The Extended ASCII Character Set also consists of 128 decimal numbers and ranges from 128 through 255 representing additional special, mathematical, graphic, and foreign characters. ASCII download -------------- Retrieval of plain ASCII text (without special codes). Normally, it takes place without automatic error correction, but it is typically managed by XON/XOFF flow control. Asynchronous transfer --------------------- Serial communication between two computers. When signals are sent to a computer at irregular intervals, they are described as asynchronous. Data is sent at irregular intervals by preceding each character with a start bit and following it with a stop bit. Asynchronous transmission allows a character to be sent at random after the preceding character has been sent, without regard to any timing device. Consequently, in case of line noise, the modem can find out right away where the next byte should start. Autodial -------- When a modem dials a telephone number automatically. Autodial may be started by the user entering the number manually, or the number may be sent automatically by the communications program (for example after having been selected from a phone register). Baud ---- A unit of measurement that shows the number of discrete signal elements, such as bits, that can be sent per second. Bits per second (bps) is the number of binary digits sent in one second. There is a difference between bps and baud rate, and the two are often confused. For example, a device such as a modem said to send at 2400 baud is not correct. It actually sends 2400 bits per second. Both baud rate and bps refer to the rate at which the bits within a single frame are sent. The gaps between the frames can be of variable length. Accordingly, neither baud rate nor bps refer accurately to the rate at which information is actually being transferred. BBS --- Bulletin Board or Bulletin Board System. See Bulletin Board. Bell ---- Standard frequencies used in older modems made in the United States. The standard for 300 bps is called Bell 103. The standard for 1200 bps full duplex is called Bell 212A. Modems using these standards are normally unable to communicate with CCITT standard modems at these speeds. Big5 ---- Coding scheme developed in Taiwan for using Chinese on computers. There are different varieties of Big5 codes, the most common being ET Big5 (the code used by the Taiwanese program ETen, pronounced Yi3tian1) and HKU Big5 (the code used for programs developed at Hong Kong University). ET Big5 files must be read with the ETen operating system. Binary ------ The base 2 number system in which only the digits 1 and 0 are used is called the binary system. The binary system lets us express any number, if we have enough bits, as a combination of 1's and 0's. Also used to express conditions like on/off, true/false, yes/no. Bits ---- Bit is an abbreviation for Binary digIT. Computer words and data are made-up of bits, the smallest unit of information. A bit can be either zero or one, represented in a circuit by an off or on state, respectively. The bits are set on or off to store data, or to form a code that in turn sends instructions to the computer's central processing unit. Bits per second (bps) --------------------- Bits per second (bps) is the number of binary digits sent in one second. It refers to the rate at which the bits within a single frame are sent ('frame' is another term for 'packet'). The gaps between frames can be of variable length. Accordingly, bps does not refer to the rate at which information is actually being transferred. We usually estimate the amount of characters transferred per second (cps) by dividing the number of bps by 10. Example: 2400 bps transfers around 240 characters per second. Boolean ------- Search algorithm built on the algebraic theories of the English mathematician George Booles. Boolean algorithms are used in online databases to help narrow down the number of hits using the words AND, OR, and NOT. Bounce ------ The return of a piece of mail because of an error in its delivery. Bps --- Abbreviation for bits per second. See above. Browse ------ To view and possibly edit a file of data on screen similar to handling text in a word processing document. Bulletin board -------------- A computer, often a microcomputer, set up to receive calls and work as an online service. The BBSes let users communicate with each other through message bases, and exchange files. They and may also offer other services (like news, data base searches, and online shopping). Carrier ------- The tone that the modem sends over a phone line before any data is sent on it. This tone has a fixed frequency and a fixed amplitude. It is then modified to indicate data. Character --------- Here used about a letter, a number or another typographical symbol or code. CCITT ----- The Consultative Committee for International Telephony and Telegraphy. An international consultative committee, organized by the United Nations. Membership includes Telephone, governmental Post, and Telegraph Authorities, scientific and trade associations, and private companies. CCITT is part of the International Telecommunications Union, a United Nations treaty organization based in Geneva, Switzerland. CCITT sets international communications recommendations. These are often adopted as standards. It also develops interface, modem, and data network recommendations. The X.25 protocol for access to packet-switched networks was originally a recommendation of CCITT. A wide range of CCITT documents is available through The Teledoc database of The International Telecommunication Union (ITU): * CCITT and CCIR administrative documents * lists of contributions (substantive input/proposals) to CCITT and CCIR study groups * lists of CCITT reports and Recommendations (i.e., standards) * summaries of CCITT new or revised Recommendations * CCITT and CCIR meeting schedules and other information concerning Study Groups structures and activities. For information, write to shaw@itu.arcom.ch or bautista@itu.arcom.ch The database is at teledoc@itu.arcom.ch . COM port -------- A COM port (or communication port) is a communications channel or pathway over which data is transferred between remote computing devices. MS-DOS computers may have as many as four COM ports, COM1, COM2, COM3, and COM4. These are serial ports most often used with a modem to set up a communications channel over telephone lines. They can also be used to send data to a serial printer, or to connect a serial mouse. Conference ---------- Also called SIG (Special Interest Group), Forum, RoundTable, Echo. A conference is an area on a bulletin board or online service set up as a mini board. Most conferences have separate message bases and often also file libraries and bulletins. Conferences are focused on topics, like politics, games, multimedia and product support. Connect time ------------ A term used for the hours, minutes, and seconds that a user is connected to an online service. On several commercial services, users have to pay for connect time. CPS --- Characters per second. See Bits per second. Data ---- Information of any kind, including binary, decimal or hexadecimal numbers, integer numbers, text strings, etc. Database -------- A database is a highly structured file (or set of files) that tries to provide all the information assigned to a particular subject and to allow programs to access only items they need. Online services offer databases that users can search to find full-text or bibliographic references to desired topics. DCE/DTE ------- Data Communications Equipment/Data Terminal Equipment. Equipment connected to an RS232 connector must be either a DCE (like a modem or a printer) or a DTE (computer or terminal). The term defines the types of equipment that will "talk" and "listen." Default ------- When a value, parameter, attribute, or option is assigned by a communications program, modem, or online system unless something else is specified, it is called the default. For example, communication programs often have prespecified values for baud rate, bit size and parity that are used unless alternative values are given. These prespecified values are called the defaults. Some services give users a choice between two or more options. If a selection is not made by the user, then a selection is automatically assigned, by default. Discussion list --------------- See Mailing list. Domain Name System (DNS) ------------------------ Email addressing system used in networks such as Internet and BITNET. The Internet DNS consists of a hierarchical sequence of names, from the most specific to the most general (left to right), separated by dots, for example nic.ddn.mil. Doors ----- A service offered by many bulletin boards to allow the user to leave the (remote) main software system to use one or several independent programs, like games and databases. Downloading ----------- The transfer of data from an online service and "down" to your computers' disk. DTR --- Data Terminal Ready is a circuit which, when ON, tells the modem that your computer is ready to communicate. Most modems are unable to tell your computer that a connection has been set up with a remote computer before this circuit has been switched off. If your computer turns this signal OFF, while it is in a dialog with a remote computer, the modem will normally disconnect. Duplex ------ Describes how you see text entered by the keyboard. When the setting is HALF DUPLEX, all characters entered on your computer for transfer to an online service (or your modem) will be displayed. In addition, you will normally receive an echo from the online service (or modem). The result will often 'bbee lliikkee tthhiiss'. When using the setting FULL DUPLEX, typed characters will not be shown. What you see, are characters echoed back to you from the online service and/or your modem. ECHO ---- (1) When data is being sent, the receiving device often resends the information back so the sending device can be sure it was received correctly. (2) Term used on FidoNet for this network's system of exchanging conferences (parallel conferencing). Email ----- Abbreviation for Electronic Mail. FAQ --- "Frequently Asked Questions" about services on the Internet. A list of FAQ documents is posted every four to six weeks to the Usenet newsgroup news.announce.newusers. File server ----------- A file server is a device that "serves" files to everyone on a network. It allows everyone on the network to get files in a single place, on one computer. Typically, it is a combination computer, data management software, and large capacity hard disk drive. File transfer ------------- The copying of a file from one computer to another over a computer network. Finger ------ A program on computers directly connected to the Internet that returns information about a registered user on a system. Finger is useful before initiating chats, known on the Internet as "talk." Flame ----- A "flame" is a conference message sent by someone who generally disagrees so violently that they are willing to sink to personal attacks. Flames can be extremely annoying, and can get the writer banished from several conference networks. Fractal -------- A mathematical algorithm from which an image can be created. A fractal formula generates a fractal picture composed of an image based on a basic pattern. An outgrowth of chaos mathematics, it is being used for compressing and decompressing high quality images. Generally, a fractally compressed image has an extremely small file size. FTP (File Transfer Protocol) ---------------------------- A program on the Internet for sending and receiving files to and from a remote computer to your local host. FTP lets you connect to many remote computers, as an anonymous or guest user, to transfer files back to your computer. FTP only lets you list file directories on foreign systems, and get or retrieve files. You cannot browse menus, send email, or search databases. Usually, type ftp at your system prompt, login on the remote system, and ask for the file you want to receive. It transfers to your local host machine. (For more on this, read under "Internet" in appendix 1.) Unless your computer is directly connected to the Internet, the retrieved software will have to be transferred from your local host machine to your PC. Where ftp is not available, you may use FTPMAIL (see chapter 12). Full duplex ----------- The term full-duplex means the transmission of data in two directions simultaneously as from a terminal to a computer or from the computer to the terminal. Full-duplex is simultaneous two-way communication. Full-text database ------------------ A database containing the full text of an article, a chapter in a book, or a book. The contents are not limited to abstracted information (indexes, bibliographic information). FYI --- "For Your Information." On the Internet, a subseries of RFCs that are not technical standards or descriptions of protocols. Gateway ------- Here, we use the term gateway about an interconnection between two (or more) online services, set up to allow a user of one service to use the other service's offerings through the first service's user interface. The term also has other meanings: A gateway provides an interconnection between two networks with different communications protocols. Gateways operate at the 4th through 7th layer of the OSI model. For example, a PAD (a packet assembler/disassembler) is a device used to interface non-X.25 devices to an X.25 network. The PAD serves as a gateway. Protocol converters are gateways between networks. The gateway, provided by an adapter card in a workstation, enables the network to perform as if it were a mainframe terminal connected directly to the mainframe. Gopher ------ A world wide information service with many implementations. It works from a top-level subject-oriented menu system that accesses other information services across the Internet. Gopher combines a finding and fetching capability in one tool. Gopher gets information from certain locations on the Internet to which it is connected, and brings the information to your computer. It can also get information via other Gophers at other locations connected to yet other hosts. The Telneting or file transfer protocols are transparent to the user. "Common Questions and Answers about the Internet Gopher" are posted to the following Usenet newsgroups comp.infosystems.gopher, comp.answers, and news.answers every two weeks. The most recent version of this FAQ is also available by anonymous ftp from rtfm.mit.edu in the /pub/usenet/news.answers directory. The file is called gopher.faq. To get it by email, write mail-server@rtfm.mit.edu with the command "send usenet/news.answers/finding-sources" in the body of the text. GuoBiao ------- Coding scheme for using Chinese on computers developed in mainland China. For more information, send email to LISTSERV@UGA.BITNET with one of the following commands in the text of your mail: GET PC HELP (for PC users) GET MAC HELP (Macintosh users) GET CXTERM HELP (X Windows users) Half duplex ----------- The term half-duplex means the transmission of data in either direction but only one direction at a time. Ham --- Amateur radio. Handle ------ An alias used on a bulletin board or online service instead of your real name. Often used in chats. Header ------ (1) In an email message, the part that precedes the body of a message and contains, among other things, the message originator, date and time. (2) On a packet switched network, the portion of a package, preceding the actual data, containing source and destination addresses, and error checking and other fields. Host ---- A term for host computer, remote computer or online service. Here, we use it about a timesharing computer, a BBS system, or a central computer that controls a network and delivers online services. Hytelnet -------- (1) An Internet service offering access to many other services, including university and library catalogues around the world. Prefers VT-100 emulation. (telnet herald.usask.ca. Login: hytelnet) The Hytelnet anonymous ftp archive is at ftp.usask.ca. Get the README file in the /pub/hytelnet directory. (2) A memory resident utility (MS-DOS) that provides instant information on Internet-accessible library catalogues, Free-Nets, Campus Wide Information Servers, Gophers, WAIS, and much more. The program is available by ftp from access.usask.ca in the /pub/hytelnet/pc/ directory. File name is hytelnxx.zip where xx is the number of the latest version. HYTEL-L@KENTVM.BITNET is a mailing list for announcements of new versions. Information utility ------------------- A term often used about online services (not unlike the term power utility). Internet -------- See appendix 1. Internet number --------------- See IP Address IP (Internet Protocol) ---------------------- The Internet standard protocol that provides a common layer over dissimilar networks, used to move packets between host computers and through gateways if necessary. For more information, send a message to service@nic.ddn.mil with the following text in the subject title: RFC 791 . IP Address ---------- Every machine on the Internet has a unique address, called its Internet number or IP address. Usually, this address is represented by four numbers joined by periods ('.'), like 129.133.10.10. The first two or three pieces represent the network that the system is on, called its subnet. For example, all of the computers for Wesleyan University in the U.S.A. are in the subnet 129.133, while the number in the previous paragraph represents a full address to one of the university's computers. IRC --- Internet Relay Chat is a worldwide "party line" protocol that allows one to converse with others in real time. ISDN ---- An emerging technology being offered by many telephone carriers of the world. ISDN combines voice and digital network services in a single medium, making it possible to offer customers digital data services as well as voice connections through a single "wire." The standards that define ISDN are specified by CCITT. ISO --- The International Organization for Standardization. A voluntary, nontreaty organization responsible for creating international standards in many areas, including computers and communications. Its members are the national standards organizations of the 89 member countries, including ANSI for the U.S. ISO is coordinator of the main Internet networking standards that are in use today. ISO@NIC.DDN.MIL is a mailing list focusing on the ISO protocol stack. JIS --- A Japanese industry standard code for presenting the Japanese character set Kanji on computers. JIS defines special ranges of user-defined characters. Only the most popular ones are included. The newer Shift JIS standard sets aside certain character codes to signal the start of a two-character sequence. Together, these define a single Kanji metacharacter. There are many oddities to be found in handling Kanji over the network. Sending JIS-encoded messages through the Internet is done using a 7-bit code (standardized on JUNET). Unfortunately, it incorporates the ESC character, which some systems will filter out. (This problem can be overcome by using UUENCODing.) Some services, like APICNET in Tokyo, converts outgoing Kanji messages automatically to 7-bit format. JVArcServ --------- Archive server for FidoNet modelled after Archie for the Internet. It maintains file lists from FidoNet systems throughout its area and will do searches on these file lists based on netmail requests made to it by remote systems. JVArcServ lets you search through file listings for the program you are looking for. It will send you an email message back telling you the BBS name, phone number, and file section of all the systems in the network that match the given criteria. KB -- Kilobyte. A unit of data storage size which represents 1024 characters of information. Kbits ----- 1,000 bits. Kermit ------ Protocol designed for transferring files between microcomputers and mainframe computers developed by Catchings at Columbia University. There are both public domain, and copyrighted Kermit programs. Some of these programs are complete programs in themselves offering the communication functions needed for the particular machine on which they are running. The complete Kermit protocol manual and the source code for various versions are available from: Kermit Distribution, (212) 854-3703 Columbia University Center for Computing Activities 612 West 115 Street, New York, NY 10025 Knowbot ------- Experimental directory services using intelligent computer programs that automate the search and gathering of data from distributed databases. The concept behind the Knowbot is that it is supposed to be a Knowledge Robot -- something that goes hunting for information on the Internet. To reach a Knowbot: telnet CNRI.Reston.va.us port 70 LAN --- Local Area Network. A data network intended to serve an area of only a few square kilometers or less. LAP-M ----- Link Access Procedure for Modems is a CCITT standard for modem modulation and error control. It is the primary basis for the CCITT V.42 protocol. Library ------- is used on online services about a collection of related databases (that you may search in) or files (that may be retrieved). List ---- File-viewing program for MS-DOS computers (see chapter 14). Registration: US$37 to Buerg Software, 139 White Oak Circle, Petaluma, CA 94952, U.S.A. (1993). LISTSERV -------- An automated mailing list distribution system enabling online discussions of technical and nontechnical issues conducted by electronic mail throughout the Internet. The LISTSERV program was originally designed for the BITNET/EARN networks. Similar lists, often using the Unix readnews or rn facility, are available on the Internet. LOOKFOR ------- Fast and flexible shareware program for boolean searches in text files. Registration: US$15 plus postage to David L. Trafton, 6309 Stoneham Rd., Bethesda, Md. 20817, U.S.A. Lurking ------- No active participation by a subscriber to a mailing list, a conference, or Usenet newsgroup. A person who is lurking is just listening to the discussion. MAILBASE -------- A program functioning like a LISTSERV. For more information about the Mailbase at Newcastle University (England), send email to MAILBASE@MAILBASE.AC.UK containing the following commands: send mailbase overview (for a general guide to Mailbase) send mailbase userhelp (for a User Guide) lists (for a list of available forums) This mailbase managed 403 mailing lists in July 1993. Mail Gateway ------------ A machine that connects to two or more electronic mail systems (including dissimilar mail systems) and transfers messages among them. Mailing list ------------ A possibly moderated discussion group on the Internet, distributed via email from a central computer maintaining the list of people involved in the discussion. Anyone can send a message to a single mailing list address. The message is "reflected" to everyone on the list of addresses. The members of that list can respond, and the responses are reflected, forming a discussion group. (See LISTSERVers) Mail path --------- A series of machine names used to direct electronic mail from one user to the other. Mail server ----------- A software program that distributes files or information in response to requests sent by email. MHS --- (1) Message handling Service. Electronic mail software from Action Technologies licensed by Novell for its Netware operating systems. Provides message routing and store and forward capabilities. MHS has gateways into PROFS, and X.400 message systems. It has been augmented with a directory naming service and binary attachments. (2) Message Handling System. The standard defined by CCITT as X.400 and by ISO as Message-Oriented Text Interchange Standard (MOTIS). MHS is the X.400 family of services and protocols that provides the functions for global email transfer among local mail systems. MNP --- Microcom Networking Protocol. A proprietary standard of error control and data compression. Modem ----- An acronym for MOdulator-DEModulator. It is a device that converts digital data from a computer or terminal into analog data that can be sent over telephone lines. On the receiving end, it converts the analog data back to digital data. Most modern modems can handle the dialing and answering of a telephone call and generate the speed of the data transmission, measured in bits per second, or baud rates. The telephone industry sometimes refers to a modem as a dataset. Moderator --------- A person, or a small group of people, who manage moderated mailing lists and newsgroups. Moderators are responsible for deciding which email submissions are passed on to list. MUD --- Multi-User Dungeon. A multi-user, text based, virtual reality game. NAPLPS ------ North American Presentation-Level Protocol Syntax. A text and graphics data transmission format for sending large amounts of information between computers. It was designed for the encoding of alphanumeric, alpha-mosaic, alpha-geometric and alpha-photographic constructs. The standard is resolution independent and device independent, and can easily accommodate international character sets, bit-mapped images in color, animation and sound. NAPLPS was originally developed for videotext and teletext systems through the Canadian Standards Association (CSA-T500-1983. It was later enhanced by AT&T, and in 1983 became an ANSI standard (ANSI-X3.110-1983). Some videotext systems, including Prodigy (U.S.A.), are based on NAPLPS. On CompuServe, NAPLPS has been replaced with a newer protocol called GIF, Graphics Interchange Format. Netfind ------- Internet directory services that allow users to get information about individuals. Search by name and organization/location. For more information, send email to LISTSERV@brownvm.brown.edu with the following text in the body of your mail "GET NETFIND HELP". Netiquette ---------- A pun on "etiquette" referring to proper behavior on a network. Netnews ------- See: Usenet. Network ------- A data communications system which interconnects computer systems at various sites. NIC --- Network Information Center. An organization that provides users with information about services provided by the Internet network. NREN ---- The National Research and Education Network. A proposed computer network to be built in the U.S.A. NUA --- Network User Address. The network address in a packet data network. The electronic number that is sent to the network to connect to an online service. Also, called X.121 address. NUI --- Network User Identification. The user name/password that you use to get access to (and use) a commercial packet switched network. Offline ------- has the opposite meaning of "Online" (see below). It signifies that your computer is not in direct communication with a remote online service. Offline Reader -------------- A computer program making the handling of mail and files from online services easier (and cheaper). Some also provides automatic mail and file transfers. Typically, you first connect to an online service (often a BBS) to capture new mail in a compressed file (typically through a "QMail door program.") Many offline mail reader programs are idle while this goes on, while others can do communications as well. When disconnected from the service, the offline reader works as a combination message data base and message editor. It gives you the feeling of still being connected to the online service, while actually being completely disconnected. When you have read and replied to all messages offline, the offline reader creates a compressed "packet" containing any replies entered. Some also let you prepare packets containing commands to join or leave conferences, subscribe to or signoff from special services, and download files. Then, you dial back to the BBS to upload (send) the packet, either using the offline reader's communications module, or another communications program. Readers are available for MS-DOS, MS-Windows, Macintosh, Amiga, Atari ST, Unix, and CP/M computers. The programs may be downloaded from many BBSes, and commercial services. Online ------ In this book, it signifies the act of being in direct communication with a remote computer's central processing unit. An online database is a file of information that can be directly accessed by the user. OSI --- Open System Interconnection. A set of protocols designed to be an international standard method for connecting unlike computers and networks. OZCIS ----- DOS-based program that automates access to CompuServe using an elaborate array of menus. Free for personal use. Contact: Ozarks West Software, 14150 Gleneagle Drive, Colorado Springs, CO 80921, U.S.A. Packet ------ (1) A group of bits sent by a modem that comprise a byte of information. (2) A group of bytes sent by a file transfer protocol. Packet data networks -------------------- Also called Packet Switching Networks (PDN). Value added networks offering long distance computer communications. They let users access a remote computer, by dialing a local node, or access point. The packet data networks use high speed digital links, which can be land lines or satellite communications, to transmit data from one computer to another using packets of data. They use synchronous communications, usually with the X.25 protocol. The routes are continually optimized, and successive packets of the same message need not necessarily follow the same path. Packet switching ---------------- Sending data in packets through a network to some remote location. The data to be sent is subdivided into individual packets of data, each having a unique identification and carrying its destination address. This allows each packet to go by a different route. The packet ID lets the data be reassembled in proper sequence. PC -- Personal computer. PDN --- See Packet data networks. Postmaster ---------- On the Internet, the person responsible for handling electronic mail problems, answering queries about users, and other related work at a site. Prompt ------ Several times during interactive dialogs with online services, the flow of data stops while the host computer waits for commands from the user. At this point, the service often presents the user with a reminder, a cue, a prompt. These are some typical prompts: ? ! WHAT NOW? (Read) next letter - ulrik 1> System News - 5000> Enter #, elp, or to continue? Action ==> (Inbox) Command: Enter command or --> Protocol -------- A formal description of message formats and the rules two computers must follow to exchange messages. Protocols can describe low-level details of machine-to-machine interface (e.g., the order in which bits and bytes are sent across the wire), or high-level exchanges between allocation programs (e.g., the way in which two programs transfer a file across the Internet). ProYam ------ Powerful script-driven communications program. US$139 + $5 for postage from Omen Technology Inc., 17505-V NW Sauvie Island Rd, Portland, Oregon 97231, U.S.A. (VISA and Eurocard - 1992) PSS --- British Telecom's Packet Switch Stream, an X.25 packet data network. PTT --- Postal Telegraph and Telephone. A telephone service provider, often a monopoly, in a particular country. QWK --- Qwikmail. A common offline message file format for bulletin boards offering mail through a QMail Door. The .QWK door and file format has been used to develop entire BBS networks (example: ILINK.) See "offline reader." RFC --- The Internet's Request for Comments document series. Working notes of the Internet research and development community. Script files ------------ A set of commands that enable a communications program to execute a given set of tasks automatically (macro commands). Server ------ A provider of resources (e.g., file servers and name servers). SIG --- Special Interest Group. Snail mail ---------- A pejorative term referring to the national postal service in different countries. String search ------------- A method for searching a database. Works like the search function in a common word processor program. On online services, your commands will often search the full document (including the title, subtitles, keywords, and the full text). Sometimes, string searches just return a line or a few lines around the hit. In other cases, they return the full screen or the full document. Sysop ----- Common name used on bulletin boards for System Operator. This is the person in charge of maintenance and helping users. System ------ Generic name for a computer with connected equipment or for an online service or bulletin board. Talk ---- A command on the Internet, which may remind of IRC, but is a single link between two parties only. TAPCIS ------ A program for automatic access to CompuServe. It lets callers read and respond to personal email and forum message threads offline, and download files. Contact: Support Group, Inc., Lake Technology Park, McHenry, MD 21541, U.S.A. Also: TAPCIS Forum. Internet mail: 74020.10@compuserve.com. On CompuServe: 74020,10. Registration: US$ 79.00. TCP/IP ------ Transmission Control Protocol/Internet Protocol. Set of communications protocols that internetwork dissimilar systems connected to the Internet. TCP/IP supports services such as remote login (telnet), file transfer (FTP), and mail (SMTP). Telnet ------ A program on the Internet that allows logins to another computer to run software there. Telnet allows a user at one site to interact with a remote system at another site as if the user's terminal was connected directly to the remote computer. With telnet, you can browse menus, read text files, use gopher services, and search online databases. Sometimes, you can join live, interactive games and chat with other callers. Usually, you cannot download files or list file directories. Telnet is not available to users who have email only access to the Internet. To telnet a remote computer, you must know its name. This can either be in words, like "vm1.nodak.edu", or a numeric address, like "134.129.111.1". Some services require that you connect to a specific "port" on the remote system. Enter the port number, if there is one, after the Internet address. For a list of SPECIAL INTERNET CONNECTIONS, send email to bbslist@aug3.augsburg.edu. You can also get it by ftp or gopher to csd4.csd.uwm.edu, and through alt.internet.services on Usenet. Terminal emulator ----------------- A program that allows a computer to emulate a terminal. The workstation appears as a given type of terminal to the remote host. TRICKLE ------- Servers on the Internet offering the SIMTEL20 shareware and public domain files by email (uuencoded). These servers include: TRICKLE@TREARN.BITNET (Turkey) TRICKLE@BBRNSF11.BITNET (Belgium) TRICKLE@TAUNIVM.BITNET (Israel) TRICKLE@IMIPOLI.BITNET (Italy) TRICKLE@DB0FUB11.BITNET (Germany) TRICKLE@AWIWUW11.BITNET (Austria) TRICKLE@UNALCOL.BITNET (Colombia) For more information and a list of TRICKLE servers, send a message to one of these addresses with the command "/HELP" in the body of your text. TTY --- Abbreviation for TELETYPE, a special type of writing terminal (electrical/mechanical). Also, known as 'dumb terminal'. TTY mode -------- This is when a communications program emulates a TTY machine, which only involves printing characters and recognizing the linefeed, carriage return and backspace characters. Unix ---- An operating system that supports multi-user and multitasking operations. Uploading --------- The act of transferring data from your computer's disk (up) to an online service and storage there. Usenet ------ A global bulletin board, of sorts, in which millions of people exchange public information on every conceivable topic. For more information, see appendix 1. UUCP ---- See appendix 1. Veronica -------- A service on the Internet. Maintains an index of gopher items, and provides keyword searches of those titles. The result of a search is a set of gopher-type data items, which is returned to the user as a gopher menu. The user can access any of these data items by selecting from the returned menu. WAIS (Wide Area Information Servers) ------------------------------------ A kind of indexed online search tool to locate items based on what they contain - usually keyword text searches. It is a powerful tool for concurrent searches of large databases and/or newsgroups on the Internet. Example: Telnet QUAKE.THINK.COM (or Telnet 192.31.181.1). Login as "wais". WAN --- Wide Area Network. The 'whatis' database --------------------- Archie (see above) also permits access to the whatis description database. It contains the names and brief synopses of over 3,500 public domain software packages, datasets and informational documents located on the Internet. Whois ----- An Internet program that lets users query a database of people and other Internet entities, such as domains, networks, and hosts, kept at the NIC (see above). For example, Whois lets you scan through a registry of researchers in the network field to find an Internet address, if you have only the last name or part of it. It will give you the person's company name, address, phone number, and email address. It had around 70,000 listings in December 1992. To access the WHOIS, telnet to rs.internic.net. When greeted by the host, type "WHOIS" and press RETURN. It also has a gopher service (type "gopher" go access, instead of "wais"). WWW (World Wide Web) -------------------- is much like Gopher in that it provides top level access down to other services on the Internet. WWW uses a hypertext interface with cross links between things. You can use highlighted words to jump off onto another track. WYSIWYG ------- What You See is What You Get. X.25 ---- A CCITT standard communications protocol used internationally in packet data networks. It provides error-checked communication between packet data networks and their users or other networks. Rather than sending a stream of bits like a modem, an X.25 router sends packets of data. There are different packet sizes and types. Each packet contains data to be transmitted, information about the packet's origin, destination, size, and its place in the order of the packets sent. There are clear packets that perform the equivalent of hanging-up the phone. There are reset, restart, and diagnostic packets. On the receiving end, the packet assembler/ disassembler (PAD) in the router translates the packets back into a readable format. X.400 ----- The CCITT and ISO standard for electronic mail. X.500 ----- The CCITT and ISO standard for electronic directory services. Appendix 5: Books, articles, newsletters, etc. for further reading ====================================================== Internet -------- "The Matrix: Computer Networks and Conferencing Systems Worldwide," John S. Quarterman, Digital Press, Bedford, MA, 719 pages, 1990. (Internet address: mids@tic.com. Gopher service at gopher.tic.com.) "Matrix News," a newsletter about cross-network issues. Networks frequently mentioned include USENET, UUCP, FidoNet, BITNET, the Internet, and conferencing systems like the WELL and CompuServe. Matrix News is about all computer networks worldwide that exchange electronic mail. Online subscription: US$25 for twelve monthly issues, or US$15 for students. Paper subscriptions: US$30 for twelve monthly issues, or US$20 for students; for overseas postage, add US$10 (1992). Contact: Matrix News, Building 2 Suite 300, 1120 South Capitol of Texas Highway, Austin, TX 78746, U.S.A. Email: mids@tic.com . "!%@:: A Directory of Electronic Mail Addressing and Networks," by Donnalyn Frey and Rick Adams (O'Reilly & Associates, Inc., 632 Petaluma Avenue, Sebastopol, CA 95472, U.S.A.). 408 pages, US26.95. Write to nuts@ora.com for ordering information. "The User's Directory of Computer Networks" by Tracy L. LaQuey (Ed.), University of Texas, Digital Press, 12 Crosby Drive, Bedford, MA 01730, U.S.A. 630 pages, 1990. "Zen and the Art of the Internet: A Beginner's Guide, Second Edition" by Brendan P. Kehoe, Prentice-Hall Series in Innovative Technology, 1993. 112 pages, ISBN 0-13-010778-6, US$22.00. "The Whole Internet User's Guide and Catalog," by Ed Krol. 1992. Published by O'Reilly and Associates, Inc., 103 Morris Street, Suite A, Sebastopol, CA 95472, U.S.A.. 400 pages, US$24.95. ISBN 1- 56592-025-2. Email questions to nuts@ora.com or uunet!ora!nuts . "A Guide to Electronic Mail Networks and Addressing," by Donnalyn Frey and Rick Adams. 1989. O'Reilly & Associates, Inc., 103 Morris Street, Suite A, Sebastopol, CA 95472, U.S.A. Email address: nuts@ora.com . "Managing UUCP and the Internet." Published by O'Reilly and Associates, Inc., 103 Morris Street, Suite A, Sebastopol, CA 95472, U.S.A. Email address: nuts@ora.com . "The Internet Companion: A Beginner's Guide to Global Networking" by Tracy LaQuey, with Jeanne C. Ryer. Addison-Wesley, 1992, $10.95, p. 196, ISBN 0-201-62224-6. Order direct from Addison-Wesley Publishing Co., Inc., 1 Jacob Way, Reading, MA 01867, U.S.A. "Internet: Getting Started," April Marine, ed., SRI International, Menlo Park, CA, May 1992. ISBN: none, US$39. "The New User's Guide to the Internet" by Daniel P. Dern, McGraw- Hill, New York, USA. 1993. ISBN 0-07-016510-6 (hc). ISBN 0-07- 16511-4 (pbk). "An Internet Primer for Information Professionals: A Basic Guide to Networking Technology," by Elizabeth S. Lane, and Craig A. Summerhil, p. 200, Meckler Corp., Westport, CT, USA. US$37.50. ISBN 0-88736-831-X. "Crossing the Internet Threshold," by Roy Tennant, John Ober, and Anne G. Lipow, p. 134, Library Solutions Press, 1100 Industrial Rd., Suite 9, San Carlos, CA 94070, U.S.A. 1993. ISBN: 1-882208-01- 3 . US$45.00 plus shipping and handling. "The Internet Passport: NorthWestNet's Guide to Our World Online" by Kochmer, Jonathan and NorthWestNet. 4th ed. 515p. Bellevue, WA, USA: NorthWestNet, 1993. ISBN: 0-9635281-0-6. Price: US$39.95. (US$19.95 nonprofit and educational). Fax: +1-206-562-4822. "Internet: Mailing Lists 1993 Edition." Franklin F. Kuo, SRI Internet Information Services. Published by PTR Prentice Hall, New Jersey, USA. ISBN: 0-13-327941-3. Paperback, 356 pages. "Internet Connections: A Librarian's Guide to Dial-Up Access and Use" by Mary E. Engle, Marilyn Lutz, William W. Jones, Jr., and Genevieve Engel. Library and Information Technology Association's Monographs Series, #3, 1993. 166 pages. ISBN 0-8389-7677-0. "Internet World magazine", Meckler Corporation, 11 Ferry Lane West, Westport, CT 06880, U.S.A. (meckler@jvnc.net) "The Internet Business Journal," 1-60 Springfield Road, Ottawa, CANADA, K1M 1C7. Fax: +1-613-564-6641. Publisher: Michael Strangelove <72302.3062@compuserve.com>. "Netpower: Resource Guide to Online Computer Networks," by Eric Persson, Fox Chapel Publishing, Box 7948, Lancaster, PA 17604-7948, U.S.A. US$ 39.95. 1993. 800+ pages. Email: NetPower1@aol.com . "Information Highways." Magazine. Annual subscription: $98.00CDN. Information Highways, 162 Joicey Blvd., Toronto, Ontario, M5M 2V2, Canada. Fax: +1-416-488-7078. Bulletin Board systems and networks ----------------------------------- BoardWatch Magazine, 7586 Weat Jewell Ave., Suite 200, Lakewood, CO 80232, U.S.A. Email: jrickard@boardwatch.com . CompuServe ---------- "CompuServe from A to Z," by Charles Bowen, Bantam Computer Books, 1991. US$24.95. Paperback, 520 pages. GEnie ----- "Glossbrenner's Master Guide to GEnie," Alfred Glossbrenner, Osborne/McGraw-Hill, 1991, US$39.95, paperback, 616 pages. Various ------- "EcoLinking: Everyone's Guide to Online Environmental Information," by Don Rittner. Peachpit Press, 1992, US$18.95, paperback, 352 pages, appendices, index. "Online Information Hunting," by Nahum Goldman, TAB Books, Inc., 1992, US$19.95, paperback, 236 pages. "SysLaw: The Legal Guide for Online Service Providers" by Lance Rose, Esq., and Jonathan Wallace, Esq. Sold by PC Information Group, 1126 East Broadway, Winona, MN 55987, U.S.A. US$34.95 plus $3.00 shipping. "The Information Broker's Handbook," by Sue Rugge and Alfred Glossbrenner, Windcrest/McGraw-Hill. "Dvorak's Guide to PC Telecommunications," John Dvorak and Nick Anis (1992, 1128 pages, US$39.95). Second edition. Articles -------- The following articles are available by email from LISTSERV@UHUPVM1 (BITNET) or LISTSERV@UHUPVM1.UH.EDU (Internet). In the TEXT of your message, write the GET command shown after the article's citation below: Bailey, Charles W., Jr. "Electronic Publishing on Networks: A Selective Bibliography of Recent Works." The Public-Access Computer Systems Review 3, no. 2 (1992): 13-20. GET BAILEY PRV3N2 F=MAIL. Harnad, Stevan. "Post-Gutenberg Galaxy: The Fourth Revolution in the Means of Production of Knowledge." The Public-Access Computer Systems Review 2, no. 1 (1991): 39-53. GET HARNAD PRV2N1 F=MAIL. Halbert, Martin. "Public-Access Computer Systems and the Internet." The Public-Access Computer Systems Review 1, no. 2 (1990): 71-80. GET HALBERT PRV1N2 F=MAIL. Arms, Caroline R. Review of Library Resources on the Internet: Strategies for Selection and Use, by Laine Farley, ed. In The Public-Access Computer Systems Review 3, no. 2 (1992): 29-34. GET ARMS PRV3N2 F=MAIL. Barron, Billy. Review of Zen and the Art of the Internet: A Beginner's Guide to the Internet, by Brendan P. Kehoe. In The Public-Access Computer Systems Review 3, no. 1 (1992): 57-59. GET BARRON PRV3N1 F=MAIL. Cook, Dave. Review of The User's Directory of Computer Networks, by Tracy L. LaQuey, ed. In The Public-Access Computer Systems Review 2, no. 1 (1991): 177-181. GET COOK PRV2N1 F=MAIL. Appendix 6: International Standard Top-level Country codes ============================================== Top-level country codes derived from the International Standards Organization's international standard ISO 3166, except United Kingdom that should be called Great Britain (GB) instead of UK. Domain Country Comments ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ AD Andorra AE United Arab Emirates AF Afghanistan AG Antigua and Barbuda AI Anguilla AL Albania AM Armenia Ex-USSR AN Netherland Antilles AO Angola AQ Antarctica AR Argentina AS American Samoa AT Austria AU Australia AW Aruba AZ Azerbaidjan Ex-USSR BA Bosnia-Herzegovina Ex-Yugoslavia BB Barbados BD Bangladesh BE Belgium BF Burkina Faso BG Bulgaria BH Bahrain BI Burundi BJ Benin BM Bermuda BN Brunei Darussalam BO Bolivia BR Brazil BS Bahamas BT Buthan BV Bouvet Island BW Botswana BY Bielorussia Ex-USSR BZ Belize CA Canada CC Cocos (Keeling) Isl. CF Central African Rep. CG Congo CH Switzerland CI Ivory Coast CK Cook Islands CL Chile CM Cameroon CN China CO Colombia CR Costa Rica CS Czechoslovakia CU Cuba CV Cape Verde CX Christmas Island CY Cyprus DE Germany DJ Djibouti DK Denmark DM Dominica DO Dominican Republic DZ Algeria EC Ecuador EE Estonia Ex-USSR also via .su domain EG Egypt EH Western Sahara ES Spain ET Ethiopia FI Finland FJ Fiji FK Falkland Isl.(Malvinas) FM Micronesia FO Faroe Islands FR France FX France (European Ter.) ??? GA Gabon GB Great Britain (UK) X.400 address gateway GD Grenada GE Georgia Ex-USSR GH Ghana GI Gibraltar GL Greenland GP Guadeloupe (Fr.) GQ Equatorial Guinea GF Guyana (Fr.) GM Gambia GN Guinea GR Greece GT Guatemala GU Guam (US) GW Guinea Bissau GY Guyana HK Hong Kong HM Heard & McDonald Isl. HN Honduras HR Croatia Ex-Yugoslavia via .yu HT Haiti HU Hungary ID Indonesia IE Ireland IL Israel IN India IO British Indian O. Terr. IQ Iraq IR Iran IS Iceland IT Italy JM Jamaica JO Jordan JP Japan KE Kenya KG Kirgistan Ex-USSR KH Cambodia KI Kiribati KM Comoros KN St.Kitts Nevis Anguilla KP Korea (North) KR Korea (South) KW Kuwait KY Cayman Islands KZ Kazachstan Ex-USSR LA Laos LB Lebanon LC Saint Lucia LI Liechtenstein LK Sri Lanka LR Liberia LS Lesotho LT Lithuania Ex-USSR LU Luxembourg LV Latvia Ex-USSR LY Libya MA Morocco MC Monaco MD Moldavia Ex-USSR MG Madagascar MH Marshall Islands ML Mali MM Myanmar MN Mongolia MO Macau MP Northern Mariana Isl. MQ Martinique (Fr.) MR Mauritania MS Montserrat MT Malta MU Mauritius MV Maldives MW Malawi MX Mexico MY Malaysia MZ Mozambique NA Namibia NC New Caledonia (Fr.) NE Niger NF Norfolk Island NG Nigeria NI Nicaragua NL Netherlands NO Norway NP Nepal NR Nauru NT Neutral Zone NU Niue NZ New Zealand OM Oman PA Panama PE Peru PF Polynesia (Fr.) PG Papua New Guinea PH Philippines PK Pakistan PL Poland PM St. Pierre & Miquelon PN Pitcairn PT Portugal PR Puerto Rico (US) PW Palau PY Paraguay QA Qatar RE Reunion (Fr.) In .fr domain RO Romania RU Russian Federation Ex-USSR RW Rwanda SA Saudi Arabia SB Solomon Islands SC Seychelles SD Sudan SE Sweden SG Singapore SH St. Helena SI Slovenia Ex-Yugoslavia also via .yu SJ Svalbard & Jan Mayen Is SL Sierra Leone SM San Marino SN Senegal SO Somalia SR Suriname ST St. Tome and Principe SU Soviet Union Still used. SV El Salvador SY Syria SZ Swaziland TC Turks & Caicos Islands TD Chad TF French Southern Terr. TG Togo TH Thailand TJ Tadjikistan Ex-USSR TK Tokelau TM Turkmenistan Ex-USSR TN Tunisia TO Tonga TP East Timor TR Turkey TT Trinidad & Tobago TV Tuvalu TW Taiwan TZ Tanzania UA Ukraine Ex-USSR via .su domain UG Uganda UK United Kingdom ISO 3166 code is GB UM US Minor outlying Isl. US United States UY Uruguay UZ Uzbekistan Ex-USSR VA Vatican City State VC St.Vincent & Grenadines VE Venezuela VG Virgin Islands (British) VI Virgin Islands (US) VN Vietnam VU Vanuatu WF Wallis & Futuna Islands WS Samoa YE Yemen YU Yugoslavia ZA South Africa ZM Zambia ZR Zaire ZW Zimbabwe Some other top level codes being used: -------------------------------------- ARPA Old style Arpanet COM Commercial EDU Educational GOV Government INT International field used by Nato MIL US Military NATO Nato field being replaced by .int NET Network ORG Non-Profit Organization The codes (domains) in this section are special in that some of them are used in more than one country. Appendix 7: About the author ================ Odd de Presno (born 1944) lives in Arendal, a small town in Norway, with his computers and modems. He has written twelve books. Half these focus on various aspects of the Online World. The rest is about practical applications of MS-DOS based personal computers. Published in Norway and England. His book "The Online World" is distributed globally as shareware. Over 700 of his articles have been published in management and technical magazines in Scandinavia, England, Japan, and the U.S. Writer. International public speaker. Consultant. Operates an English-language bulletin board system in Norway (since 1985). Area of special expertise: applications of global sources of online information, computer conferencing, global electronic mail, automation of information retrieval, MS-DOS computer applications. Founder and Project Director of KIDLINK, an international non- profit organization promoting a global dialog among the youth of the world. Since its start in 1990, KIDLINK has involved over ten thousand kids in the 10 - 15 years range in over 50 countries. Educational background includes a Diploma Degree in Business Administration from Bedriftsoekonomisk Institutt (Norway). He founded the software company Data Logic A/S (Norway) in 1967 and was president for five years. Sales manager Control Data Corp. seven years (in charge of CYBERNET/Norway, an international online service). Marketing manager IKO Software Service A/S, two years. Currently running his own business. Member of the Computer Press Association (U.S.A.) since 1983, and NFF (Norway). Listed in Marquis' "Who's Who in the World" from 1991. Appendix 8: HOW TO REGISTER YOUR COPY OF THE ONLINE WORLD ============================================= The online world is extremely dynamic. Services and offerings come and go. Your registration will support further research, and production of updates. You can register your current copy, or sign up for six updates of the book during one year. Details are given below. ============================================================================== Please send to: Odd de Presno 4815 Saltrod Norway (Europe) Please add me as a supporter of the Online World book: Name ______________________________________________________________ Company ______________________________________________________________ Address ______________________________________________________________ ______________________________________________________________ City ________________________________State _______ Zip ____________ Country ________________________________ Email address ______________________________________________________ Please mark off your selections with (x) below: Basic Registration for individuals ---------------------------------- ( ) NOK 105.00 For payment by credit card. (around US$ 15.00) ( ) US$ 20.00 For all other methods of payment. (or, in Norwegian currency: NOK 140.00.) Option (for Basic Registration) ------------------------------- ( ) US$ 2.00 Add to have a copy of the most recent version of the book sent you on diskette. Only with registration! (In Norway, NOK 10.00) ( ) 5.25" MS-DOS disk ( ) 3.5" disk 720KB MS-DOS Registration with Six Updates for individuals --------------------------------------------- Six updates of the manuscript will be sent you during the next 12 months. ( ) US$ 60.00 For all methods of payment. Registration for businesses --------------------------- All Corporate site licence options include six updates during the next 12 months. ( ) US$ 500 Distribution for up to 100 people on a single network ( ) US$ 3.000 Distribution for up to 1000 people on a single network ( ) US$ 6.000 Distribution for up to 2500 people on a single network ( ) US$ 10.000 Distribution for up to 5000 people on a single network ( ) US$ 15.000 Distribution for up to 10000 people on a single network ( ) US$ 25.000 Distribution for over 10000 people on a single network Discounts for schools and public libraries ------------------------------------------ Special rates are available for schools and public libraries. For details, send a message to LISTSERV@vm1.nodak.edu (BITNET users can send it to LISTSERV@NDSUVM1). In the text of the message, use the command: GET TOW SCHOOLS GET TOW LIBRARY ( ) Please identify what type of discount you are taking advantage of: Ref: ______________ Description: ____________________________________________________ ____________________________________________________ Amount ____________________ Date _______________ ( ) Check or money order payable to Odd de Presno in U.S. funds enclosed ( ) SWIFT transfer to 6311.05.27189 (Kredittkassen 4800 Arendal, Norway) ( ) VISA ( ) MasterCard ( ) American Express Credit card number __________________________________ Exp date _______ If you already have an evaluation copy of the book, where did you get it? ________________________________________________ Version number: ____ Comments or suggestions for improvement of The Online World __________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ Date ___________________ Signature _________________________________ ZDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD? 3 T H A N K Y O U F O R S U P P O R T I N G S H A R E W A R E 3 @DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDY