For your convenience in reading: Subject lines are printed in RED and Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News


TELECOM Digest     Sat, 19 Mar 2005 17:09:00 EST    Volume 24 : Issue 122

Inside This Issue:                             Editor: Patrick A. Townson

    Bank Regulator Says Banks Must Warn of ID Theft (Lisa Minter)
    Piracy Row Widens After Swedish Internet Firm Raid (Lisa Minter)
    What to Expect of 'Spamalot'? A Lot of Spam (Monty Solomon)
    Growth of Wireless Internet Opens New Path for Thieves (Monty Solomon)
    Dangling Broadband From the Phone Stick (Monty Solomon)
    Colleges on Their Guard Against ID Security Threats (Monty Solomon)
    Feds: Criminals Luuuuv Those Open 802.11 Networks (Danny Burstein)
    Re: Iridium II: Is Satellite Radio Doomed? (Isaiah Beard)
    Re: What Happened To Channel 1 (Marcus Didius Falco)
    Re: What Happened To Channel 1? (Michael D. Sullivan)

Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.  

----------------------------------------------------------------------

Date: 18 Mar 2005 17:31:57 -0800
From: Lisa Minter<lisa_minter2001@yahoo.com>
Subject: Bank Regulator Says Banks Must Warn of ID Theft


The 5-0 vote by the agency's board of directors come in the wake of a
flurry of announcements of the theft of personal data affecting
hundreds of thousands of consumers.

The changes have won approval from the Office of the Comptroller of
the Currency and Office of Thrift Supervision, and still require
Federal Reserve Board approval. Fed spokesman Andrew Williams said the
board is considering the matter.

Banks will be required to notify customers when they learn of
unauthorized access to sensitive customer information and, after a
reasonable investigation, determine the information was misused or
there is a "reasonable possibility" of misuse.

The notices must describe the incidents, detail measures taken to
protect customers, provide phone numbers for further information,
remind customers to be vigilant and describe how customers may put
fraud alerts in their credit reports.

Sensitive customer information is defined as a customer's name,
address or phone number, in conjunction with his or her Social
Security or driver's license numbers; account, credit or debit card
numbers; or an identification number or password that would permit
access to an account.

It also includes any combination of data that would allow a thief to
access an account.

Obtaining Social Security numbers is often considered a key to
identity theft scams involving banks, which regularly use the numbers
as a unique way to identify customers.

Identity theft cost businesses $47.6 billion and consumers $5 billion
in 2002, Federal Trade Commission estimates show.

Financial institutions regularly targeted by scammers include
Citibank, Wells Fargo, Washington Mutual, U.S. Bank, SunTrust, and
Capital One.

A common form of identity theft involving banks is "phishing," derived
from the act of computer thieves who "fish" for private data.

Phishers typically tell prospective victims in e-mails that there is a
problem with their accounts, and ask them to verify personal
information through a link to a real-looking Web site.  They e-mail
either known customers of a particular bank, or many people with the
hope of reaching actual bank customers.

Many phishing e-mails contain return addresses at sites such as
Yahoo.com, or typographical or grammatical errors.

Among companies to have reported thefts of customer data this year are
data brokers ChoicePoint Inc.  and LexisNexis, a unit of Anglo-Dutch
Reed Elsevier (ELSN.AS) (REL.L), as well as DSW Shoe Warehouse, a unit
of Retail Ventures Inc.

Meanwhile, Bank of America Corp.  the No. 3 U.S.  bank, last month
said computer tapes with credit card records of more than 1 million
U.S. government employees were lost.

NOTE: For more telecom/internet/networking/computer news from the daily
media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra . Hundreds of new articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, Associated Press. 

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

------------------------------

Date: 18 Mar 2005 17:33:14 -0800
From: Lisa Minter <lisa_minter2001@yahoo.com>
Subject: Piracy Row Widens After Swedish Internet Firm Raid


By Patrick Lannin

STOCKHOLM (Reuters) - A raid on a Swedish internet firm last week,
hailed by the entertainment industry as a blow against piracy of songs
and movies, has sparked a debate in the high-tech country over
confidentiality rights and file sharing.

Bailiffs and police raided Internet firm Bahnhof seeking pirate files
on servers. The Motion Picture Association of America (MPAA),
representing major Hollywood studios, said digital film and music was
seized which would take 3-1/2 years to watch and listen to.

The raid was initiated by a group called the Antipirate Bureau, which
represents the music and film industry.

But now the investigators are being investigated. The government-owned
Data Inspection Office and the telecoms sector supervisor want to see
whether the Bureau broke confidentiality rules by obtaining the
Internet Protocol (IP) addresses of people it suspects of illegal file
sharing.

An IP address, which is given to computers for identification and data
traffic regulation on the Internet, enables investigators to identify
a computer and hence an individual.

But under Swedish law, access to IP addresses is strictly regulated.

"We are likely to open an investigation after Easter," said a
spokeswoman for the Data Inspection.

The National Post and Telecom agency said it would investigate whether
the IP addresses were obtained from telecoms operators, in which case
it would be the operators that would have to be investigated further.

The Antipirate Bureau, whose Web Site has been hacked, was not
available to comment.

One of its managers, lawyer Henrik Ponten, told newspaper Svenska
Dagbladet this week that the industry could not stand by "with its
arms folded while the sector is robbed."

MORE COUNTER ATTACKS

But high-profile figures from Sweden's tech world have also come
forward to attack the tactics of raiding Bahnhof.

Jonas Birgersson, who founded one of Sweden's most successful dotcom
consultancies and is still involved in the Internet via his Labs2
business, said the raid was heavyhanded and smacked of "1984" methods,
referring to the George Orwell novel about an imaginary police state.

He said the music business should go the other way, and offer films
and music at affordable prices to download.

"Why do we start using these risky methods? We think people would like
to pay if it was cheap enough," he told Reuters.

A group called the Pirate Bureau, which supports file sharing and
scaled-down copyright laws, said it estimated that around 100 million
downloads of movies are made a year.

The incident has sparked a wider debate about the legality of file
sharing.

In Sweden, it is legal to download copyrighted movie and music files,
but making them available for sharing is illegal.  The legal loophole,
however, is about to be closed.

The Justice Ministry has just proposed a law to make both illegal,
bringing Sweden into line with the rest of the EU.

Still, without power to identify IP addresses, that new law may not
help the entertainment industry.

The MPAA says the film industry loses $3.5 billion a year to
videotapes and DVDs sold on the black market, but it has no estimate
for how much Internet piracy costs the industry.

NOTE: For more telecom/internet/networking/computer news from the daily
media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra . Hundreds of new articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, Reuters Limited.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

------------------------------

Date: Sat, 19 Mar 2005 09:52:01 -0500
From: Monty Solomon <monty@roscom.com>
Subject: What to Expect of 'Spamalot'? A Lot of Spam


By DAVID F. GALLAGHER

"Spamalot" fans who signed up for a newsletter on the Broadway 
musical's official Web site may end up getting, well, spammed a lot. 
"Movin' Out" devotees may have the same problem. A security glitch -- 
now fixed -- exposed the names and postal and e-mail addresses of more 
than 31,000 people to savvy computer users.

Up until Thursday evening, when a reporter from The New York Times 
pointed out the problem to the Web sites' developer, visiting a 
specific address on the shows' sites produced a long page with 
mailing-list data. The security hole was not obvious to casual Web 
surfers because the address was buried in the site's code. But it 
could have been discovered by someone deliberately seeking the list 
data, or by a kind of program used by spammers to scour the Web for 
new e-mail addresses to bombard.

http://theater2.nytimes.com/2005/03/12/theater/newsandfeatures/12hack.html

------------------------------

Date: Sat, 19 Mar 2005 09:57:52 -0500
From: Monty Solomon <monty@roscom.com>
Subject: Growth of Wireless Internet Opens New Path for Thieves


By SETH SCHIESEL
March 19, 2005

The spread of the wireless data technology known as Wi-Fi has reshaped
the way millions of Americans go online, letting them tap into
high-speed Internet connections effortlessly at home and in many
public places.

But every convenience has its cost. Federal and state law enforcement
officials say sophisticated criminals have begun to use the unsecured
Wi-Fi networks of unsuspecting consumers and businesses to help cover
their tracks in cyberspace.

In the wired world, it was often difficult for lawbreakers to make 
themselves untraceable on the Internet. In the wireless world, with 
scores of open Wi-Fi networks in some neighborhoods, it could hardly 
be easier.

Law enforcement officials warn that such connections are being 
commandeered for child pornography, fraud, death threats and identity 
and credit card theft.

http://www.nytimes.com/2005/03/19/technology/19wifi.html?ex=1268888400&en=51d90e7518bba5d6&ei=5090


[TELECOM Digest Editor's Note: To read the full New York Times on line
each day with no login or registration requirements, please login to
http://telecom-digest.org/td-extra/nytimes.html where several
publications -- in addition to nytimes -- are updated continually
around the clock, 24/7.    PAT]

------------------------------

Date: Sat, 19 Mar 2005 10:53:06 -0500
From: Monty Solomon <monty@roscom.com>
Subject: Dangling Broadband From the Phone Stick


By MATT RICHTEL

SAN FRANCISCO, March 18 - To gauge the potential consumer impact of
the consolidation sweeping the telephone industry, look no further
than the silver-toned plastic phone gathering dust on the desk in
Justin Martikovic's studio apartment.

Mr. Martikovic, 30, a junior architect who relies on a cellphone for
his normal calling, says he never uses the desk phone -- but he pays
$360 a year to keep it hooked up.

"I have to pay for a service I'm never using," he said.

He has no choice. His telephone company, SBC Communications, will not
sell him high-speed Internet access unless he buys the phone service,
too. That puts him in the same bind as many people around the country
who want high-speed, or broadband, Internet access but no longer need
a conventional telephone. Right now, their phone companies tend to
have a "take it or leave it" attitude.

Consumers "are not forced to go with SBC," said Michael Coe, a company
spokesman. "If they just want a broadband connection, I'd recommend
they look around for people who can provide just a broadband
connection."

The nation's other two largest phone companies, Verizon Communications
and BellSouth, have similar policies: broadband service is available
only as a bundle with phone service.


http://www.nytimes.com/2005/03/19/technology/19phone.html?ex=1268888400&en=b8329ca7e98c5ee3&ei=5090


[TELECOM Digest Editor's Note: And so it is here in Independence, KS
also. SBC's attitude is "take us as is ... no phone service, then no
high speed internet." The reason that backfired on them around here is
due to services like Cable One, we get high speed internet anyway.  To
show you how sleazy SBC has gotten, the latest offer in the US Mail to
get me back now offers monthly service (full service package) for
_$2.95_ per month (that's two dollars, ninety five cents) per month
for one year. It has been said that in long ago times, the Bell tactic
for getting rid of their competitors -- who could not afford such
things -- was if neccessary, *give away their service* until the
competitors gave up and went away. Are they going to start that again
in places like Kansas, where Prairie Stream is fully licensed to do
business state-wide, and gradually getting weaned off of Southwestern
Bell?  SBC for a long time was threatening to get rid of UNE-P but its
not at all certain that will work either. So, they fall back on the
old 'give it away until we don't have any competition' routine when
they have to.  PAT]

------------------------------

Date: Sat, 19 Mar 2005 01:20:26 -0500
From: Monty Solomon <monty@roscom.com>
Subject: Colleges on Their Guard Against ID Security Threats


Computer breach prompts BC to limit Social Security data

By Hiawatha Bray, Globe Staff  |  March 18, 2005

While Boston College warns 120,000 alumni that their Social Security
numbers may have been stolen by Internet thieves, computer
administrators at other Boston-area colleges say they long ago took
steps to reduce the threat.

James Stone, director of consulting services for the Office of
Information Technology at Boston University, said his school and many
others throughout the United States once routinely used Social
Security numbers for identification on internal files and documents.
But by the late 1990s, BU officials began to doubt the wisdom of this
approach.

http://www.boston.com/business/technology/articles/2005/03/18/colleges_on_their_guard_against_id_security_threats/

------------------------------

From: Danny Burstein <dannyb@panix.com>
Subject: Feds: Criminals Luuuuv Those Open 802.11 Networks
Date: Sat, 19 Mar 2005 04:24:34 -0500
Organization: PANIX Public Access Internet and UNIX, NYC


"... Of those suspects, half regularly used the open Wi-Fi connections
of unsuspecting neighbors. Four suspects, in Canada, California and
Florida, were logged in to neighbors' Wi-fi networks at the moment law
enforcement agents, having tracked them by other means, entered their
homes and arrested them, Secret Service agents involved in the case
said.  ...

" 'We had this whole network set up to identify these (suspects) but
the one thing we had to take into consideration was Wi-fi', (former
Secret Service agent) Mr. Gilhooly said. 'If I get to an Internet
address and I send a subpoena to the Internet provider and it gets me
a name and physical address, how do I know that that person isn't
actually bouncing in from next door?'

(rest at: )

http://www.nytimes.com/2005/03/19/technology/19wifi.html

_____________________________________________________
Knowledge may be power, but communications is the key
 		     dannyb@panix.com
[to foil spammers, my address has been double rot-13 encoded]

------------------------------

From: Isaiah Beard <sacredpoet@sacredpoet.com>
Subject: Re: Iridium II: Is Satellite Radio Doomed?
Date: Sat, 19 Mar 2005 14:20:36 -0500
Organization: Posted via Supernews, http://www.supernews.com


John Levine wrote:

> I suppose that in theory GM could try to invent their own proprietary
> sat rad network (don't they still own Hughes satellite?) but I don't
> see them heading down that rat hole.

Actually, they don't HAVE to.  GM owns a significant stake in XM, and I 
beleive they have one or two people on their board.

And the current status quo is doing quite well. With GM, Honda and a
few other car manufacturers, a satellite radio option exists for a
number of models as an option package.  If someone wants it, they can
add the option in, and not only do they get a radio, but the first
year of service is built in to the purchase price of the car (exactly
the same model as OnStar).  Once the subscriber is "hooked," they're
likely (as has proven true in previous SEC filings) to pay for the
service once the first year is up.

Not everyone opts for this though.  Personally, I think GM needs to
reduce the size and improve the appearance of their satellite radio
antenna.  It currently looks like a big ugly black wart on the roof of
the car, regardless of the car's paint color, and usually the
placement isn't even centered, so anyone who is interested in
preserving the lines and look of the vehicle will have issue with it.
On the other hand, the aftermarket satellite radio systems have a tiny
magnet mount antenna no larger than a postage stamp, and you can get
creative as to where you place it.  I opted for aftermarket, placed
the antenna on the trunk lid where it's not too distracting, and got
the added bonus of having a removable unit that can be taken and used
indoors as well.


E-mail fudged to thwart spammers.
Transpose the c's and a's in my e-mail address to reply.

------------------------------

Date: Fri, 18 Mar 2005 22:41:00 -0500
From: Marcus Didius Falco <falco_marcus_didius@yahoo.co.uk>
Subject: Re: What Happened To Channel 1


Fred Atkinson <fatkinson@mishmash.com> responded to What Happened To
Channel 1 on 18 Mar 2005 15:11:26 GMT>

> Another fellow I knew (Jim) was in Florence, SC.  Jim was parked in
> front of a beauty salon waiting for his wife to come out.  He was
> having a good, long conversation with another ham who was in
> Fayetteville, NC on his two meter set while he waited.  A CBer pulled
> up behind him and parked.  He saw Jim talking on his radio and he
> dialed through all the CB channels trying to pick him up.  After a
> while, he got out of his car and walked up to Jim telling him 'Good
> buddy, your CB isn't modulating'.  Jim responded by telling the ham in
> Fayetteville to about this CBer and asking him to tell the guy where
> he was located.  He responded that he was in Fayetteville, NC.  The
> CBer's eyes almost popped out when he heard that come over Jim's
> radio.  He went back to his car, pulled his CB out, set it on the
> sidewalk, and took it apart to work on it.  When Jim's wife returned
> to the car, Jim got out and spoke to the guy explaining that that CB
> would never pick up his signals.  The guy insisted that his radio
> would pick up any CB.  Jim informed him that his radio was not a CB
> then got in his car and drove off leaving the poor guy sitting on the
> sidewalk with his CB completely disassembled.  While funny, I think it
> was also a little mean.

This may have been another reason the FCC dropped Channel 1: too much 
interference. Back in the 50s, during the sunspot peak, there were a LOT of 
instances of some Channel 2 in Texas wiping out Channel 2 in NY. It 
happened, IIRC, mostly on Channel 2, and rarely on Channel 4. Channel 1 
would have been worse.

> [TELECOM Digest Editor's Note: And that was the main conflict with
> television 'channel one' I think. A conflict with other services in
> the 50-54 megs area.

The very high power of TV stations, however well filtered, would have
caused problems. Nearbly broadcast towers can cause serious problems
far outside their band, even for good receivers.

------------------------------

From: Michael D. Sullivan <userid@camsul.example.invalid>
Subject: Re: What Happened To Channel 1?
Date: Sat, 19 Mar 2005 08:02:17 GMT


A simpler explanation for the use of channel numbers for TV and
frequencies for FM and AM radio is that (1) AM radio operated in a
contiguous band covered by an analog variable tuning capacitor and
never had separate channel numbers, so (2) people were used to tuning
in radio stations by frequency on a dial, and (3) FM radio likewise
was in a contiguous band covered by a an analog variable tuning
capacitor, so people were comfortable tuning in the station by
frequency.

Television, on tho other hand, started out in two discontiguous VHF 
bands, with somewhat variable spacing between channels and a need for 
precise tuning, and tuning in on a single band by twiddling an analog 
variable tuning capacitor to the right frequency would have been 
difficult.  This tuning method was used on some early TVs; I don't know 
whether they were tuned by numeric frequency or by channel number, but 
it would not have been very convenient.  The TV industry instead 
standardized on TV tuners that had 12 discrete fixed settings, pre-tuned 
to channels 2-13, with a fine tuning control that allowed one to tune 
the frequency higher or lower to account for offsets.  Later on, tuners 
had separate fine-tuners for each channel so one wouldn't need to retune 
when switching from station to station.  Given the move to fixed-
position tuning, the use of "digital" numbering of channels instead of 
analog-like frequency designations was an obvious simplification.  

When UHF was added, it used a single contiguous band, and most sets 
initially required a separate converter box, which had an analog-style 
variable tuning capacitor that required careful attention to get the 
station one wanted (the pointer is between 30 and 40, is that channel 33 
or 36?), but the tradition of using channel numbers instead of 
frequencies prevailed due to the established TV tradition.  Eventually, 
TVs incorporated the analog-style continuously variable UHF tuner and 
later adopted a fixed-position tuner for UHF.  Modern technologies, 
including Phase Locked Loop tuning and digital input and display, have 
relegated the dual-dial tuner and the fine tuning control to the dustbin 
of history.


Michael D. Sullivan
Bethesda, MD, USA
Replace "example.invalid" with ".com".


[TELECOM Digest Editor's Note: This is true, however if you look at
some FCC documents on FM radio frequency allocations (for example,
documents on which frequencies are available on which places for
'low power' FM). All those documents show both 'frequency' and
'channel number' for the spaces between 87.6 FM and 108.1 FM. I 
think they have the 'channels' beginning at 201 and numbering
upward.  PAT]

------------------------------


TELECOM Digest is an electronic journal devoted mostly but not
exclusively to telecommunications topics. It is circulated anywhere
there is email, in addition to various telecom forums on a variety of
networks such as Compuserve and America On Line, Yahoo Groups, and
other forums.  It is also gatewayed to Usenet where it appears as the
moderated newsgroup 'comp.dcom.telecom'.

TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.

Contact information:    Patrick Townson/TELECOM Digest
                        Post Office Box 50
                        Independence, KS 67301
                        Phone: 620-402-0134
                        Fax 1: 775-255-9970
                        Fax 2: 530-309-7234
                        Fax 3: 208-692-5145         
                        Email: editor@telecom-digest.org

Subscribe:  telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org

This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information:        http://telecom-digest.org

Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
  (or use our mirror site: ftp.epix.net/pub/telecom-archives)

Email <==> FTP:  telecom-archives@telecom-digest.org 

      Send a simple, one line note to that automated address for
      a help file on how to use the automatic retrieval system
      for archives files. You can get desired files in email.

*************************************************************************
*   TELECOM Digest is partially funded by a grant from                  *
*   Judith Oppenheimer, President of ICB Inc. and purveyor of accurate  *
*   800 & Dot Com News, Intelligence, Analysis, and Consulting.         *
*   http://ICBTollFree.com, http://1800TheExpert.com                    *
*   Views expressed herein should not be construed as representing      *
*   views of Judith Oppenheimer or ICB Inc.                             *
*************************************************************************

ICB Toll Free News.  Contact information is not sold, rented or leased.

One click a day feeds a person a meal.  Go to http://www.thehungersite.com

Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

              ************************

DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD!  REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM   SIGN UP AT http://www.easy411.com/telecomdigest !

              ************************

Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.

The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum.  Classes
are available in Stillwater, Tulsa, or through distance learning.

Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu

              ************************

   ---------------------------------------------------------------

Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list. 

All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.

End of TELECOM Digest V24 #122
******************************

Return to Archives**Older Issues