{"title":"Lassoing your modem's NVRAM (and other bis-ness)","authors":"A. DeSimone","doi":"10.1145/1098861.1098863","DOIUrl":"https://doi.org/10.1145/1098861.1098863","url":null,"abstract":"Interesting device, the modem. Either a small box attached externally to your computer or a card placed inside your computer, the modem can connect you to information sources all over the world. Modems have been around a long time. Like all computing devices, they have become more sophisticated and more complex. With this complexity, however, have come better ways to control how your modem operates.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129590059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Life on the Internet: portrait of a collaboration","authors":"M. Peterson","doi":"10.1145/1098861.1098862","DOIUrl":"https://doi.org/10.1145/1098861.1098862","url":null,"abstract":"This article was first published in the North American Review, University of Iowa, Cedar Falls, Iowa in November 1993. The interviews for this article were conducted over the Internet. A review copy of Cardiyakking in manuscript, which Ms. Peterson received over the network from Dr. Phillips, is the source for quoted material in this article.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127559974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing researchers' productivity through an integrated computational environment: the MetaCenter","authors":"S. Sides","doi":"10.1145/1098858.1098859","DOIUrl":"https://doi.org/10.1145/1098858.1098859","url":null,"abstract":"Scientists' and engineers' demands on high-performance computing technology continue to stay several steps ahead of technology's ability to meet them. These demands are motivating the development of ever more powerful computer platforms, visualization capabilities, and communications.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132609801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating a multimedia classroom","authors":"G. Mathis, P. Clarke","doi":"10.1145/1098854.1098856","DOIUrl":"https://doi.org/10.1145/1098854.1098856","url":null,"abstract":"By tradition, Carnegie Mellon University seeks innovative ways to integrate computing and advanced technology into research and education. This ambition extends to classroom design as well.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some suggested guidelines for serving customers with electronic mail","authors":"J. E. Bucher","doi":"10.1145/1098854.1098855","DOIUrl":"https://doi.org/10.1145/1098854.1098855","url":null,"abstract":"Electronic mail (usually referred to as e-mail) is no longer a luxury; for most of us it is a requisite of the academic computing life, a ubiquitous method of communication. Especially for individuals employed in university and college computing organizations, e-mail is now a very regular and important method for contacting and interacting with our customers. This is true for everyone in the organization: from the director to the administrative assistants to front line consultants and training staff. Not only do we use this medium to communicate with our traditional customers, i.e., faculty, staff, and students, but it is also a useful and necessary tool for intra-departmental communication as well.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"593 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120846376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software piracy","authors":"Teresa Tenisci, Wendy Alexander","doi":"10.1145/149422.149426","DOIUrl":"https://doi.org/10.1145/149422.149426","url":null,"abstract":"When we speak of pirates in today's world, two different visions come to mind. The first is of a latter-day swashbuckling ruffian who captures cargo ships and steals the riches and wealth aboard for himself. The second is of a person who copies software from a source to their own PC, without purchasing it from a legal vendor. We may see both as underdogs, fighting the injustice of \"the system,\" while remaining worthy at heart, and therefore somehow admirable. No wonder software piracy is not viewed as a crime by most people. In fact, software piracy is a crime. It is theft.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CorelDRAW: a Canadian success story","authors":"M. Hazelwood, Carson Harding","doi":"10.1145/149422.149424","DOIUrl":"https://doi.org/10.1145/149422.149424","url":null,"abstract":"Would Matisse have given up his paints for CorelDRAW? Maybe not, but CorelDRAW's sophistication and colour-handling capabilities make it easy to create striking illustrations like the recreation of Madame Matisse. (See Figure 1.)","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple stochastic model for computer terminal availability","authors":"S. Stevens, R. Brookshire","doi":"10.1145/142086.142094","DOIUrl":"https://doi.org/10.1145/142086.142094","url":null,"abstract":"Queueing models have been widely applied in the analysis of computer performance, as well as in the study of systems in which service is rendered to human customers by multiple servers. Rarely, however, have queueing theory techniques been applied to the problem of providing computing services to the human beings who require them.We develop a simple queueing model for the availability of computer terminals in an academic computing laboratory, then compare the statistics predicted by the model to those actually observed in several laboratories. Among the statistics considered is the likelihood that a new arrival to the laboratory finds no free terminals, a quantity which is comparable to standard performance measures for communications equipment. The model also generates measures of resource availability which may be analyzed dynamically. Examples of the use of this model are provided.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125992588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Instructional data requirements from administrative systems","authors":"John C. Biddle","doi":"10.1145/142086.142092","DOIUrl":"https://doi.org/10.1145/142086.142092","url":null,"abstract":"Administrative computing has certainly come a long way from its meager beginning in the financial records area in most institutions to the present where every administrative area has at least one system running, usually on the institution's mainframe, with immediate access to the records in the database. In most institutions, these systems are required for the administrative personnel to complete their required assignments.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"30 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer ethics survey","authors":"S. Stager","doi":"10.1145/142086.142097","DOIUrl":"https://doi.org/10.1145/142086.142097","url":null,"abstract":"In preparation for the panel discussion, computer center directors completed a survey about the frequency of breeches of acceptable computing behavior, and opinions about key legal and ethical issues. About 52% of the directors attending the conference completed the survey. The majority (61%) of the respondents were from public, four-year institutions. The following article discusses the results of the survey.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132733066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}