From: editor@telecom-digest.org (unknown)
To: ptownson@massis.lcs.mit.edu
Subject: [telecom] TELECOM Digest V22 #131
Date: Mon, 18 Nov 2002 14:16:12 -0500 (EST)


TELECOM Digest     Mon, 18 Nov 2002 14:15:00 EST    Volume 22 : Issue 131

Inside This Issue:                             Editor: Patrick A. Townson

    By Choice or by Chance: How the Internet Is Used (Monty Solomon)
    The Lives and Death of Moore's Law (Monty Solomon)
    Corporate Cyberstalking: An Invitation to Build Theory (Monty Solomon)
    Qwest Erases $358M More From Profits (Monty Solomon)
    The 'Digital Divide' Among Financially Disadvantaged (Monty Solomon)
    Examining the Determinants of Who is Hyperlinked to Whom: (Monty Solomon)
    Exploring the Future of Digital Divide Through Ethnographic (M. Solomon)
    Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Net (M. Solomon)
    Re: Visa, Mastercard Seen Foiling Rivals ( my_name@is.invalid )
    Re: Visa, Mastercard Seen Foiling Rivals (Paul Wallich)
    Re: Visa, Mastercard Seen Foiling Rivals (Ed Ellers)
    Re: Visa, Mastercard Seen Foiling Rivals (Gary Novosielski)
    Re: Debit vs. Credit Cards, was: Re: Retailers' Suit  (John R. Levine)
    Free World Dialup 3.0 has Launched! (Jeff Pulver)
    Have Fax on ACS R3.1 System Ring Only For Calls on Line 4 (Mike Sweeden)
    Re: Anti Telemarketer Phone (Thomas A. Horsley)
    Re: Telephone Answering Machines (Thomas A. Horsley)
    Re: ECLong Distance and Calling 1-800 Numbers (Joseph)
    Definity (CatFinder)
    Charter Cable Leak: Reporting It (j debert)

All contents here are copyrighted by Patrick Townson and the
individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email. WE DO NOT PERMIT NAME/EMAIL ADDRESS HARVESTING FROM THIS
JOURNAL. 'SALTED' EMAIL ADDRESSES APPEAR HEREIN TO VERIFY THIS. YOU
GET SUED IN SMALL CLAIMS COURT IF YOU GET CAUGHT SPAMMING OR SENDING
VIRUSES. DON'T DO IT.

See the bottom of this  issue for subscription and archive details and
the name of our lawyer; other stuff of interest.


Date: Sun, 17 Nov 2002 13:21:58 -0500 From: Monty Solomon <monty@roscom.com> Subject: By Choice or by Chance: How the Internet Is Used By Choice or by Chance: How the Internet Is Used to Prepare for, Manage, and Share Information about Emergencies by Laurie Putnam Abstract Access to reliable information is essential for emergency managers, whether they're facing tornados or terrorist attacks. How well information is managed before, during, and after a disaster can have a direct influence on how well the crisis is managed. Today the Internet plays a recurring role in all phases of emergency information management. As a communication system and an information repository, a strategic tool and a populist medium, the Internet can be a powerful element in crisis situations. It has been readily used in recent crises and it will, no doubt, be used in the next emergency, by choice or by chance. The choice must be made to use it well. This article explores the implications of the Internet for agencies that work to mitigate, prepare for, and respond to natural and human-made disasters. It also looks at implications of the Internet for members of the general public who are directly or indirectly affected by disasters. Contents Managing emergency information Internet applications Internet complications What next? http://firstmonday.org/issues/issue7_11/putnam/index.html
Date: Sun, 17 Nov 2002 13:33:54 -0500 From: Monty Solomon <monty@roscom.com> Subject: The Lives and Death of Moore's Law by Ilkka Tuomi Abstract Moore's Law has been an important benchmark for developments in microelectronics and information processing for over three decades. During this time, its applications and interpretations have proliferated and expanded, often far beyond the validity of the original assumptions made by Moore. Technical considerations of optimal chip manufacturing costs have been expanded to processor performance, economics of computing, and social development. It is therefore useful to review the various interpretations of Moore's Law and empirical evidence that could support them. Such an analysis reveals that semiconductor technology has evolved during the last four decades under very special economic conditions. In particular, the rapid development of microelectronics implies that economic and social demand has played a limited role in this industry. Contrary to popular claims, it appears that the common versions of Moore's Law have not been valid during the last decades. As semiconductors are becoming important in economy and society, Moore's Law is now becoming an increasingly misleading predictor of future developments. Contents 1. Introduction 2. Moore's original formulation 3. Reformulations of Moore's Law 4. Losing the memory 5. Empirical evidence on Moore's Law 6. Computers and development http://firstmonday.org/issues/issue7_11/tuomi/index.html
Date: Sun, 17 Nov 2002 13:45:59 -0500 From: Monty Solomon <monty@roscom.com> Subject: Corporate Cyberstalking: An Invitation to Build Theory by Paul Bocij Abstract Cyberstalking describes a relatively new form of stalking behaviour where technology is used as the medium of harassment. The term corporate cyberstalking is often used to describe incidents that involve organisations, such as companies and government departments. This paper uses a number of case studies in order to propose a typology of corporate cyberstalking. It is suggested that incidents involving corporate cyberstalking can be divided into two broad groups, depending on whether or not the organisation acts as a stalker or as a victim. Examining the motivations behind corporate cyberstalking allows these groups to be subdidvided further. The motives behind corporate cyberstalking can range from a desire for revenge against an employer to cyberterrorism. The paper also briefly discusses definitions of stalking and cyberstalking, concluding with a revised definition of cyberstalking that is more in keeping with the material discussed. Contents Introduction What Is Corporate Cyberstalking? Categories of Corporate Cyberstalking Conclusion http://firstmonday.org/issues/issue7_11/bocij/index.html
Date: Sun, 17 Nov 2002 13:53:28 -0500 From: Monty Solomon <monty@roscom.com> Subject: Qwest Erases $358M More From Profits DENVER (AP) - Qwest Communications International Inc. said it has found more accounting mistakes that will force it to erase $358 million more in earnings before interest, taxes, depreciation and amortization for 2000 and 2001. Qwest previously disclosed that it overstated revenue by $1.86 billion in 2000 and 2001, affecting $1.2 billion in earnings. The new disclosures in a regulatory filing Thursday bring the total affected earnings to $1.56 billion. Qwest also said it could have trouble meeting debt service obligations in 2004, even if it sells the rest of its QwestDex phone directory arm, if economic conditions do not improve. The first half of the $7.05 billion deal closed last week. Shares were up 5 cents to $3.76 in midday trading Friday on the New York Stock Exchange. The phone company said it misclassified some costs associated with designing, deploying and testing facilities, erasing $200 million in adjusted earnings before interest, taxes, depreciation and amortization for 2000 and 2001, and it improperly deferred commissions, erasing another $158 million for 2001. - http://finance.lycos.com/home/news/story.asp?story=29741815
Date: Sun, 17 Nov 2002 13:57:02 -0500 From: Monty Solomon <monty@roscom.com> Subject: The 'Digital Divide' Among Financially Disadvantaged Families The 'Digital Divide' Among Financially Disadvantaged Families in Australia by Jennifer McLaren and Gianni Zappal Despite figures suggesting that Australia is a high consumer of information and communication technologies (ICT), it is well documented that the pattern of this consumption is not spread evenly across the population; a 'digital divide' exists. In general, research suggests that people from higher socioeconomic backgrounds have greater access to ICT compared to those from lower socioeconomic backgrounds. A less well-researched area is the factors that may influence ICT access and usage within certain demographic and socioeconomic groups. This paper presents new data on the access and usage of ICT (computers and the Internet) by 3,404 households and 6,874 children from financially disadvantaged backgrounds. Fifty-nine per cent of the sample had a home computer and just under one-third had the Internet connected at home. The most common location for accessing the Internet was at school. A striking finding was the strong association between the level of parental education and ICT access and use. Schools are important in closing or levelling the access gap, as most students use computers and the Internet at school. However, considering the importance of having home Internet access for children's educational performance, the fact that almost three-quarters of students in this study did not use the Internet at home is of concern, particularly given that almost half of a comparable Australian population have home Internet access. Finding ways to increase the home access of low-income families to the Internet should therefore remain a policy priority for all sectors aiming to bridge the digital divide. Policies aimed at bridging the digital divide should also ensure that programs provide appropriate parenting support and emphasise the educational importance of having home access to computers and the Internet. Contents Introduction The 'digital divide' revisited ICT Access and Usage in Australia Background to the data Profile of the Sample Key Findings Discussion and Conclusions http://firstmonday.org/issues/issue7_11/mclaren/index.html
Date: Sun, 17 Nov 2002 14:01:48 -0500 From: Monty Solomon <monty@roscom.com> Subject: Examining the Determinants of Who is Hyperlinked to Whom: Examining the Determinants of Who is Hyperlinked to Whom: A Survey of Webmasters in Korea by Han Woo Park This paper assesses the determinants of who is hyperlinked to whom on the Web. It details the results of a conducted survey with 64 Korean Webmasters to examine the reasons Web sites form hyperlink networks with other sites. The results indicated that Webmasters consider the credibility of hyperlinked Web sites to be above average when deciding to hyperlink. Particularly, the item "usefulness" had the highest score, indicating that Web sites are more likely to hyperlink to Web sites possessing practical content, information, or services. Additionally, the qualitative analysis reveals that hyperlinking motivations and advantages are largely grouped into two dimensions: navigational functionality and for business purposes. Contents Hyperlink Research: Overview and Methodological Aspects Determinants of Hyperlinking: Web Site Credibility Research Question Methods Results Discussion http://firstmonday.org/issues/issue7_11/park/index.html
Date: Sun, 17 Nov 2002 14:04:05 -0500 From: Monty Solomon <monty@roscom.com> Subject: Exploring the Future of the Digital Divide Through Ethnographic Exploring the Future of the Digital Divide through Ethnographic Futures Research by Matthew M. Mitchell Abstract This study examines leaders who work for social change in an information society. Grounded in the notion that leadership and social change are necessarily future oriented, this study attempts to learn how those who lead the effort to ameliorate the digital divide in Washington State perceive the optimistic, pessimistic, and most probable futures. In this study, the digital divide is framed as a social problem that is caused, in part, by inequities in the ability to access and to use information communication technologies. Further- more, this study is concerned that the digital divide impacts the opportunities for participation in social and economic arrangements, which may be a threat to social and economic justice. Although the scope of the digital divide is global, this study narrows its focus in three ways. First, the digital divide is explored only within the context of Washington's sociocultural system. Second, only the perspectives of those who lead efforts to bridge the digital divide were sought. Third, only perceptions and cognitions of possible future sociocultural systems were explored. The method used in this study is called Ethnographic Futures Research (EFR). EFR is a type of ethnography adapted for use in studying perceptions of a culture's future. Thirteen individuals who lead various efforts to bridge the digital divide in Washington State were interviewed using the EFR method. In each interview, three possible scenarios (optimistic, pessimistic, and most probable) of Washington State's sociocultural system set in the year 2016 were elicited. The interviewees then provided recommendations of what action is required to render the optimistic scenario more probable by the year 2016. The digital divide was discussed within the context of the future sociocultural systems described in the three scenarios and the recommendations. The findings of this study include a) multiple definitions of the digital divide; b) descriptions of the forces perceived to be driving the digital divide; and, c) suggestions for future efforts to ameliorate the digital divide. A general discovery made by this study is that significant optimism exists that Washington State will build and maintain a more just and equitable sociocultural system in the future. http://firstmonday.org/issues/issue7_11/mitchell/index.html
Date: Sun, 17 Nov 2002 13:17:16 -0500 From: Monty Solomon <monty@roscom.com> Subject: Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet Abstract This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from non-violent 'Use' at one end to 'Cyberterrorism' at the other. Rejecting the idea that cyberterrorism is widespread, the focus here is on terrorist groups' 'use' of the Internet, in particular the content of their Web sites, and their 'misuse' of the medium, as in hacking wars, for example. Terrorist groups' use of the Internet for the purpose of inter-group communication is also surveyed, partly because of its importance for the inter-networked forms of organisation apparently being adopted by these groups, but also due to the part played by the Internet in the events of September 11 and their aftermath. Contents Introduction What is Cyberterrorism? 'Use' and 'Misuse': Some Empirical Observations (Inter)Networking and 9-11 The Internet and 9-11: The Aftermath Conclusion http://firstmonday.org/issues/issue7_11/conway/index.html
Subject: Re: Visa, Mastercard Seen Foiling Rivals From: my_name@is.invalid Organization: Not Much Date: Sun, 17 Nov 2002 16:08:00 GMT In article <telecom22.130.14@telecom-digest.org>, Thomas A. Horsley <tom.horsley@att.net> wrote: >> ...and even trying to disguise their debit cards so merchants >> couldn't tell them from credit cards > Just for curiosity, why should merchants be able to tell the > difference? As long as they get their money, why do they care if the > buyer uses a debit or a credit card? Because they *DON'T* 'get their money', not all of it, that is. Card issuers _charge_ those who accept cards for that 'convenience'. I speak as a merchant who _accepts_ credit-cards for payment, and there is a *significant* difference. The 'service charges' I have to pay on a transaction against a debit card are nearly *DOUBLE* those I pay for processing a real 'credit' card. VISA also has another 'wrinkle', the 'corporate' charge-card. This is a credit card that provides a number of 'enhanced' services to the card-holder -- 'classification' of expenses, mgmt summaries, etc. Unfortunately, the merchant who _accepts_ that card as payment for his services, *pays* for those services for the customer. I pay more than 30% _more_ for accepting a 'corporate' card than I do for accepting a regular card. And there is *ABSOLUTELY*NO*WAY* to determine in advance _which_ kind of a card it is. I don't know, and _can't_find_out_ what this transaction is going to cost, until *after* I've been charged for it. My clearinghouse has told me this, and VISA _itself_ has confirmed it. > [TELECOM Digest Editor's Note: Anyway, who says they 'disguise' the > cards? My card says rather plainly on it, 'Commerce Bank Check Card' > although it does have a VISA logo on it, and the number sequence is > a usual VISA type number: twelve digits beginning with '4'. If the card is not present, as in telephone or mail-order sales, or over the internet, for that matter, there is *NO*WAY* to determine which kind of a card it is. I take telephone orders -- I found out about this the "hard way". Note: for "card not present" transactions, VISA _could_ claim that =any= arbitrary transaction was a 'debit', or 'corporate' card, and the *merchant* CANNOT verify whether they're telling the truth or not. [TELECOM Digest Editor's Note: But as a merchant, I am sure you know quite well the costs involved in carrying your own paper ... in fact very few stores attempt to maintain their own credit departments any longer, much preferring to pass off the paperwork and risks to large creditors like Visa. And regards debit cards, would you rather have to collect on NSF checks all the time or have a guarentee from Visa for some fee per item? PAT]
From: Paul Wallich <pw@panix.com> Subject: Re: Visa, Mastercard Seen Foiling Rivals Date: Sun, 17 Nov 2002 11:18:00 -0500 Organization: PANIX Public Access Internet and UNIX, NYC In article <telecom22.130.14@telecom-digest.org>, tom.horsley@att.net (Thomas A. Horsley) wrote: >> ...and even trying to disguise their debit cards so merchants >> couldn't tell them from credit cards > Just for curiosity, why should merchants be able to tell the > difference? As long as they get their money, why do they care if the > buyer uses a debit or a credit card? Because, according to the articles, the debit version, if authenticated with a PIN, carries a fee of about 9-20 cents, while the credit version carries a fee of about 25 cents to $1.50. So for a store with a lot of small and mid-ticket sales, debit vs credit means the difference between making or losing money on a particular sale. > [TELECOM Digest Editor's Note: Anyway, who says they 'disguise' the > cards? My card says rather plainly on it, 'Commerce Bank Check Card' > although it does have a VISA logo on it, and the number sequence is > a usual VISA type number: twelve digits beginning with '4'. I'll > grant you Commerce Bank is having a promotion all the time called > 'skip the PIN' where they suggest in stores with terminals where the > customer swipes the card (like Walmart) to punch in 'credit' rather > than 'debit' and not be asked for a PIN. The daily floor limit of > half your available balance or $1000, whichever is more, still > applies. Of course if you use the card at the ATM in front of the > bank to get cash you still can't skip the PIN. PAT] "Skip the PIN and let us charge your merchant an extra buck." Nice campaign. Let;s just say that a disguise doesn't have to be completely effective to still make a big difference. If you have to train each checkout clerk to read the card for any of the various code words that might indicate it's a debit card, and to double-check with the customer which way to ring the transaction, that's an extra cost to doing business. It's kinda ironic that online verification should be deprecated because it interferes with profits, considering that the pervasive US telecom infrastructure is one of the reasons that we have credit and debit instead of smartcards in the first place ... paul [TELECOM Digest Editor's Note: Whatever extra the bank charges the merchants goes for the prizes Visa/Commerce Bank gives to the winners of their monthly drawings on 'skip the PIN'. PAT]
From: Ed Ellers <ed_ellers@msn.com> Subject: Re: Visa, Mastercard Seen Foiling Rivals Date: Sun, 17 Nov 2002 00:20:33 -0500 Thomas A. Horsley <tom.horsley@att.net> wrote: > Just for curiosity, why should merchants be able to tell the > difference? As long as they get their money, why do they care if > the buyer uses a debit or a credit card? That's just it -- they don't get all the money you pay; the credit card company and issuing bank hold back some of it. Merchants tend to prefer debit card networks other than Visa or MasterCard because that holdback is often much lower; Visa and MC want merchants to accept all their branded cards in order to keep the advantage of universal acceptability that makes their debit cards more attractive than others. The merchants in this case apparently want to be able to refuse Visa and MC debit cards, to steer their customers toward other debit card networks that offer a better deal to the merchant, while still accepting Visa and MC credit cards.
From: Gary Novosielski <gpn@suespammers.net> Subject: Re: Visa, Mastercard Seen Foiling Rivals Date: Mon, 18 Nov 2002 02:27:16 GMT Thomas A. Horsley <tom.horsley@att.net> wrote in message news:telecom22.130.14@telecom-digest.org: > Just for curiosity, why should merchants be able to tell the > difference? As long as they get their money, why do they care if the > buyer uses a debit or a credit card? > [TELECOM Digest Editor's Note: ... I'll grant you Commerce Bank is > having a promotion all the time called 'skip the PIN' where they > suggest in stores with terminals where the customer swipes the card > (like Walmart) to punch in 'credit' rather than 'debit' and not be > asked for a PIN....] And that should tell you something. Merchants have to pay far more (often MANY TIMES as much) in processing fees to process a "credit" payment rather than a "debit" payment. That is why merchants would much prefer you to use your debit card as a debit card, and also why your bank probably makes your debit card look as much like a credit card as possible (often making it impossible to tell) and tries to convince you that punching in a PIN is soooooo inconvenient, and that you should tell the merchant it is really a credit card.. If you ask me, punching in a PIN is more convenient than trying to sign the usually malfunctioning touch screen, or even signing the register tape, but I have a long name. If you like your banker and hate your merchant, always tell them "Credit" and if you like your merchant and hate your banker, always tell them "Debit". If you either like them both or hate them both, use cash, or write a check. Gary [TELECOM Digest Editor's Note: But if I write a check, then Walmart is the *only* store in town which makes me show a driver's license or in my case, the state ID card (since I do not know how to drive a car). The other stores (in the downtown area) just accept my check since they have seen me before. But almost all the 'regular' stores downtown have a sign on the door which refers to the 'Kansas Bad Check law' and the store's right to charge three times the value of the check if it gets returned to them even once. That's why I cut my deals with the bank manager, in the event my money runs out before my next social security check comes in; she covers my checks and notifies me, but does charge me $10 (ten dollars) when it happens. PAT]
Date: 16 Nov 2002 23:16:27 -0500 From: johnl@iecc.com (John R. Levine) Subject: Re: Debit vs. Credit Cards, was: Re: Retailers' Suit Organization: I.E.C.C., Trumansburg NY USA > I can get an ATM card, but it can't be used for purchases. Indeed. That's what that humongous class action against MC and Visa is about. On the other hand, my friendly local bank offers a variety of pieces of plastic. They have a Visa branded debit card which costs $12/yr, money comes directly out of my account immediately, in case of dispute I'm out the money until and unless I get the charge unwound. They also have a Visa branded gold credit card which costs $0/yr if I set it up for auto-pay so the money comes out of my account on the day the monthly grace period is over so I get to hold on to the money for an extra month, in case of dispute I can tell them not to pay the fraudulent item so the money's still in my bank account, and it has a bunch of other minor freebies such as rental car insurance. The only advantage that the debit card has is that if I'm away from home and have time to kill, I can walk into other banks and get an over the counter "cash advance" from the debit card, thereby saving the $2.50 it would cost to use it at an ATM, but I'd have to do that five times a year to save the annual fee, which I don't. (Yes, this works and really doesn't cost anything. I did it a few times when I had a debit card.) I have three Visa credit cards, all of which have an auto-pay option so I never pay any interest. Unless their credit rating is so bad that they can't get a credit card at all, why would anyone use a debit card? Regards, John Levine johnl@iecc.com Primary Perpetrator of "The Internet for Dummies", Information Superhighwayman wanna-be http://iecc.com/johnl Sewer Commissioner "I dropped the toothpaste", said Tom, crestfallenly. ObTelecom: both debit and credit cards work at Bell Canada payphones, and cost less than using an AT&T or LEC calling card, but it's even cheaper to use a prepaid smart card with embedded chip.
From: jeff@pulver.com (Jeff Pulver) Subject: Free World Dialup 3.0 Has Launched! Date: 16 Nov 2002 08:53:17 -0800 Organization: http://groups.google.com/ Hi All, The Free World Dialup Network ( http://pulver.com/fwd ) has lauched! Details with the latest FWD news is available at: http://pulver.com/fwd/fwd30news.html . The Free World Dialup (FWD) Network is the free peer-to-peer worldwide community telephone service for people with broadband Internet access. It provides a great free way for people to keep in touch with their friends and family members who also have broadband internet access. Two devices (endpoints) that we have tested and are known to work with FWD are the Cisco 7960 (with the SIP image) and the Cisco ATA-186. We are currently working on making enhancements to support additional devices. You need to own a supported device to use FWD. Please contact your local Cisco office to find a local reseller where you can purchase these devices. You can subscribe to the FWD Mailing list by visiting: http://listserv.pulver.com/cgi-bin/wa.exe?SUBED1=fwd&A=1 . Kind regards, Jeff
From: Michael Sweeden <michaelsweeden@comcast.net> Subject: Fax on Partner ACS R3.1 System Ring Only For Calls on Line 4? Date: Sat, 16 Nov 2002 10:18:39 -0500 I have a Partner ACS R3.1 system with multiple phone lines. On one extension I have both a fax machine and a system phone. The phone and the fax machine both ring on incoming calls. I am told that the system used to be configured so that the fax machine only rang when a call came in on line 4 while the system phone on that extension rang on all incoming calls. I do not know how to do this. I know I can turn off ringing for the first 3 lines, but that would turn of ringing on the system phone as well. Line 4 is the last line in the rollover, and has a different ring when it is dialed directly than when it rings as a result of rollover. Can the system be configured so that the fax machine only rings for calls on line 4 while the system phone on the same extension rings on all incoming lines, and, if so, then how? Thanks!
Subject: Re: Anti Telemarketer Phone From: tom.horsley@att.net (Thomas A. Horsley) Organization: AT&T Worldnet Date: Sat, 16 Nov 2002 16:15:23 GMT I just got my Avinta VN100 which was designed as a small home or business PBX, but (since you have to dial an extension number), also works as a box that can require a code to be punch in before your phone will ring. Unfortunately, it doesn't really work as well as advertised, but I did manage to get it working somewhat. The docs for it say to plug your answering machine into the phone line (so the recording message can tell folks about the code to punch in), then the VN100 into the answering machine. In that configuration, the VN100 never recognizes the extension number. Maybe there is something about the answering machine. Can't say for sure what is wrong. However, I did find that if I plug the answering machine and the VN100 in parallel (on a splitter), it does work (but you have to dial a number before the extension -- that's the way you use it as an intercom locally). The other problem is that you are supposed to be able to plug an answering machine into the VN100 instead of just a phone, so if you really aren't there, the 2nd answering machine can be used to leave a message. I've never gotten this to work at all. The phone does ring when plugged in to the VN100, but the answering machine plugged into it never picks up. There must be something not quite right about the ring signal it generates. Conclusion: Seems to be useable, but not nearly as spiffy as advertised. I too would rather have a all in one box (and I'd really rather have one that would accept lots of different codes so I could give out individual ones). At least my phone doesn't ring off the hook all the time anymore. Peace at last! :-). >>==>> The *Best* political site <URL:http://www.vote-smart.org/ >>==+ email: Tom.Horsley@worldnet.att.net icbm: Delray Beach, FL <URL:http://home.att.net/~Tom.Horsley> Free Software and Politics<<==+
Subject: Re: Telephone Answering Machines From: tom.horsley@att.net (Thomas A. Horsley) Organization: AT&T Worldnet Date: Sat, 16 Nov 2002 16:20:56 GMT The GE Digital answering machine (model # 29869GE2) I have seems to work pretty well (it is highly recommended on amazon.com which is where I got it). One of the options you can configure is how long an individual message can be (it can do a total of 40 minutes recording). >>==>> The *Best* political site <URL:http://www.vote-smart.org/> >>==+ email: Tom.Horsley@worldnet.att.net icbm: Delray Beach, FL | <URL:http://home.att.net/~Tom.Horsley> Free Software and Politics <<==+
From: Joseph <joeofseattle@yahoo.com> Subject: Re: ECLong Distance and Calling 1-800 Numbers Date: Sat, 16 Nov 2002 12:31:01 -0800 Organization: Posted via Supernews, http://www.supernews.com Reply-To: joeofseattle@yahoo.com On 14 Nov 2002 16:52:19 -0800, ian@jardine.net (Ian) wrote: > Let me ask another question somewhat off topic, but here goes. > A friend from Overseas has two children studying at a private High > School in NJ (and then on to College in the USA). They have no credit > rating in the USA and no SS#s. > They want to give the two kids cellphones for use in NA and they want > to provide a means of the children calling their parents (in > Singapore) at decent rates. > I can only think of a prepaid cellphone service which is pretty darn > expensive allied to some form of prepaid international telephone card > which can be charged to an International Credit Card number. > Anyone got a better solution? I think that with the numbers of > International students in the USA this could be a large market. Pre-paid is not the cheapest solution, but if your kids do not "gab" it is workable. Using T-Mobile's pre-paid "Easy Speak" plan it's $25 with a month's expiry on the time. Very often you can find a deal in a store (often pharmacies and the like) where you can get a handset with a SIM card which includes $30 of talk time. I've seen these packages go for $69 to $79. Amazon often has good prices on the T-Mobile pre-paid if you wish to go that route. There are other pre-paids that you may want to look at from AT&T or Verizon. Larger denomination cards give you more talk time at a cheaper per minute rate. If you have a pre-paid service that includes long distance in the air time (such as T-Mobile's) you simply call a number in New York City, NY get a dial tone and dial the international number. If you do not have long distance included you can call a toll-free "866" number though there is a 15 cent surcharge on calls made through the 866 number. Calls to Singapore are 9 cents per minute. To use the service you have to register a credit card (Visa/Master Card/Amex) and they will debit cost of calling from your credit card. http://gorillamobile.com/ Replies are seldom read. Please reply in the group
From: fgwing@adimexico.com.mx (CatFinder) Subject: Definity Date: 16 Nov 2002 13:16:56 -0800 Organization: http://groups.google.com/ Hi, I have recently started work at a company that uses a definity PBX and we want to implement authorization codes but our servicce providor tells us that we need to make an upgrade on our system. I kow nothing about the Definity system so I;m not sure if this is correct or not, Can someone help?? Thanks. John W.
From: j debert <jdebert@garlic.com> Subject: Charter Cable Leak: Reporting it Date: Sat, 16 Nov 2002 14:53:33 -0800 Organization: Posted via Supernews, http://www.supernews.com I just got off the phone with Charter re a possible leak on their system in Hollister CA. Told them it was heard on air and Public Safety bands. The call-taker did not want to hear about it unless it was a "customer with a problem" and almost got away without being told the location. How long should one wait before follow-up? A week? On next follow up, if nothing seems to be done, I may mention filing complaints with FCC and CPUC: the signal interferes with local police and fire freqs and probably even with LifeFlight and other operations at the local hospital, which is right next to the apparent leak. This leak appears to have started just within the past 6 weeks, and sounds like intermod on some freqs, but tuning makes the signal sound better, as does switching from narrow to wide FM. j d e b e r t < a t > g a r l i c < d o t > c o m
TELECOM Digest is an electronic journal devoted mostly but not exclusively to telecommunications topics. It is circulated anywhere there is email, in addition to various telecom forums on a variety of networks such as Compuserve and America On Line, and other forums. It is also gatewayed to Usenet where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Patrick Townson. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. Contact information: Patrick Townson/TELECOM Digest Post Office Box 50 Independence, KS 67301 Phone: 620-870-9697 Fax 1: 775-255-9970 Fax 2: 775-306-8390 Fax 3: 775-642-0603 Fax 4: 530-309-7234 Email: editor@telecom-digest.org Subscribe: telecom-subscribe@telecom-digest.org Unsubscribe:telecom-unsubscribe@telecom-digest.org This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the second oldest e-zine/ mailing list on the internet in any category! URL information: http://telecom-digest.org Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives (or use our mirror site: ftp.epix.net/pub/telecom-archives) Email <==> FTP: telecom-archives@telecom-digest.org Send a simple, one line note to that automated address for a help file on how to use the automatic retrieval system for archives files. You can get desired files in email.
* TELECOM Digest is partially funded by a grant from * * Judith Oppenheimer, President of ICB Inc. and purveyor of accurate * * 800 & Dot Com News, Intelligence, Analysis, and Consulting. * * http://ICBTollFree.com, http://1800TheExpert.com * * Views expressed herein should not be construed as representing * * views of Judith Oppenheimer or ICB Inc. *
ICB Toll Free News. Contact information is not sold, rented or leased. Access to Premium (P) links requires upgrade to a paid subscription. One click a day feeds a person a meal. Go to http://www.thehungersite.com Only subscribers or registered users of ICB Toll Free News web site will be able to access all or some of the full text of URLs provided. LEGAL STUFF: TELECOM Digest (sm) is owned by Patrick Townson. Copyright 2000 ICB, Inc. and TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. In addition, gifts from Mike Sandman, Chicago's Telecom Expert have enabled me to replace some obsolete computer equipment and enter the 21st century sort of on schedule. His mail order telephone parts/supplies service based in the Chicago area has been widely recognized by Digest readers as a reliable and very inexpensive source of telecom-related equipment. Please request a free catalog today at http://www.sandman.com
Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of twenty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization. End of TELECOM Digest V22 #131
-- "Good intentions will always be pleaded for every assumption of authority. It is hardly too strong to say that the Constitution was made to guard the people against the dangers of good intentions. They promise to be good masters, but they mean to be masters." -- Noah Webster

Visit the Crazy Atheist Libertarian
Check out "David Dorn" - Hate Monger
Check out Atheists United - Arizona
Visit my atheist friends at Heritics, Atheists, Skeptics, Humanists, Infidels, and Secular Humanists - Arizona
Arizona Secular Humanists
Paul Putz Cooks the Arizona Secular Humanist's Check Book
News about crimes commited by the police and government
News about crimes commited by religious leaders and beleivers
Some strange but true news about the government
Some strange but real news about religion
Interesting, funny but otherwise useless news!
Libertarians talk about freedom
Cool Useless Photos, Cool gif files, Cool jpg files
Legal Library
Gif, JPG, and other images you can use on your web pages
David Dorn Insuranse