Pat, the Editor

For your convenience in reading: Subject lines are printed in RED and Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News
Add this Digest to your personal   or  

 

TELECOM Digest     Tue, 16 Aug 2005 17:52:00 EDT    Volume 24 : Issue 370

Inside This Issue:                             Editor: Patrick A. Townson

    New Focus on Cyber Terrorism (Nathaniel Hoopes)
    New Worm Targeting Windows (Reuters News Wire)
    2 PRIs - Failover (rmalarc)
    Jun Murai Recognized With the Internet Society Postel Award (P. Godwin)
    VoIP Provider Appeals FCC's 911 Deadline (USTelecom dailyLead)
    Museum of Communications - Seattle (and Others) (Bob Vaughan)
    Re: Telephone Exchange Usage in Low-Volume States (jared)
    Re: Telephone Exchange Usage in Low-Volume States (John Levine)
    Re: Telephone Exchange Usage in Low-Volume States (Joseph)
    Re: Telephone Exchange Usage in Low-Volume States (Robert Bonomi)
    Re: Classic Six-Button Keysets - Cost During 1970s (BV124@aol.com)
    Re: Classic Six-Button Keysets - Cost During 1970s (Bob Vaughan)
    Re: Classic Six-Button Keysets - Cost During 1970s? (Joseph)
    Six-Button Keysets - Additional Lines in Europe (Charles G Gray)
    Re: Urgent Help Needed With Internet Explorer IE 6.0 (William Warren)
    Re: FSK Signal For Voicemail on MCI (Fred Atkinson)
    Re: How Long Can a Telephone Extension Cord Be? (Robert Bonomi)
    Re: Stock Market Ticker Tape Machines? (R (jared)
    Re: Stromberg Carlson Company? (Steven Lichter)

Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.  

----------------------------------------------------------------------

From: Nathaniel Hoopes <csm@telecom-digest.org>
Subject: New Focus on Cyber Terrorism 
Date: Tue, 16 Aug 2005 14:28:31 -0500


     At risk: computers that run power grids, refineries.

By Nathaniel Hoopes, Contributor to The Christian Science Monitor

Buried deep in America's new energy legislation is a requirement
that power companies step up their safeguards against computer attack.

Why does a law aimed at boosting energy production address the dangers
of hackers, software "worms," and computer viruses? Because the
automatic networks that run so-called "critical infrastructure" are
emerging as a vital - and weak - link in America's defense against
terrorism.

Networks run everything from water-treatment plants and oil refineries
to power grids and transport networks. They constantly read data and
adjust, opening a valve here, closing a tank there, often keeping the
facility operating 24/7. In the wrong hands, however, such systems
could be compromised.

"People downplay the importance of cyber-security, claiming that no
one will ever die in a cyber-attack, but they're wrong," says Richard
Clarke, a former terrorism and cyber-security czar in the Bush
administration. "This is a serious threat."

In March, for instance, hackers gained access to the electronic
control systems of the nation's electric power grid, says Dave Powner
a cyber-security specialist at the US Government Accountability Office
(GAO). In 2003, a computer "worm" on the Internet may have helped
delay power companies' response to the major Midwest and Northeast
power outage, although the electric industry says it has found no
evidence of a cyber-related effect. In all, the first half of 2005 saw
237 cyber-attacks worldwide - a 50 percent rise from the same period
last year, according to IBM's global security intelligence team.

From a national security viewpoint, the real danger is that a
determined and talented cyber-terrorist could break into a utility or
chemical plant's computer network and manipulate the sensor-control
systems, experts say. That could set off an "accident" that could kill
not just workers at the plant, but thousands of civilians in the
surrounding area. Nearly 300 critical-infrastructure facilities lie in
densely populated regions with 50,000 or more local residents,
according to the Department of Homeland Security (DHS).

"An attack on the scale of the Bhopal disaster in India is not
impossible," says Mr. Clarke, citing the chemical leak that killed
some 3,800 people in 1984.

Despite such a nightmare scenario, federal officials are more
immediately focused on the threat of a dual attack, says Mr. Powner of
the GAO. "There is a lot of concern in government about what the FBI
calls a swarming terrorist attack. You have a physical attack and a
simultaneous cyber-attack on critical infrastructure -- that really
hurts your ability to respond."

The cascading effect of such an attack could cost the nation billions
of dollars. And getting the incredibly complex systems up and running
again wouldn't be easy, security experts say.

Many experts say that DHS is still relatively unprepared to protect
America's critical infrastructure against a cyber-attack.

"In government, when it came to senior level focus after Sept. 11,
99.9 percent was skewed towards physical protection, and
cyber-security took a back seat," says Paul Kurtz, director of the
Cyber Security Industry Alliance and a former Bush administration
official. But he is optimistic that attitudes are changing.

Facing mounting pressure, DHS is creating a national cyberspace
response system. Supporters claim it will help the government work
with the private sector to prevent, detect, and respond to cyber
incidents.  In November, DHS will launch its first major national
exercise -- code-named "Cyberstorm" -- to test the government's
ability to partner with the private sector in response to a major
cyber incident.

Last month, DHS Secretary Michael Chertoff created a new post,
assistant secretary of cyber and telecommunications security, a
position that Mr. Kurtz says will carry the necessary clout.

But Clarke points out that the position hasn't been filled yet.
"So far it's been all talk," he says.

Power companies aren't waiting around for governments to protect
them. "Ultimately industry has to be responsible for protecting its
own assets," says Ellen Vancko of the North American Electric
Reliability Council. The council is developing cyber-security
standards, which its members will have to uphold.

The industry has a lot to address, Clarke says. "Every time the
government has tested the security of the electric power industry,
we've been able to hack our way in - sometimes through an obscure
route like the billing system," he says. "Computer-security officers
at a number of chemical plants have indicated privately that they are
very concerned about the openness of their networks and how easily
they might be penetrated."

Copyright 2005 The Christian Science Monitor.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, Christian Science Publishing Society. 

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

------------------------------

From: Reuters News Wire <reuters@telecom-digest.org>
Subject: New Worm Targeting Windows
Date: Tue, 16 Aug 2005 15:26:57 -0500


A new Internet virus targeting recently uncovered flaws in Microsoft
Corp.'s Windows operating system is circulating on the Internet, an
anti-virus computer software maker said on Monday.

The ZOTOB virus appeared shortly after the world's largest software
maker warned of three newly found "critical" security flaws in its
software last week, including one that could allow attackers to take
complete control of a computer.

Trend Micro Inc. said that the worm exploits security holes in
Microsoft's Windows 95, 98, ME, NE, 2000 and XP platforms and can give
computer attackers remote access to affected systems.

"Hundreds of infection reports were sighted in the United States and
Germany," Tokyo-based Trend Micro said.

But computer security engineers at Microsoft said that the worm is
only targeting Windows 2000 and not the other versions of Windows.

"It only affected Windows 2000," said Stephen Toulouse, a manager at
Microsoft's Security Response Center. "So far its has shown a very
limited impact -- we're not seeing any widespread impact to the
Internet, but we remain vigilant."

The latest virus drops a copy of itself into the Windows system folder
as BOTZOR.EXE and modifies the system's host file in the infected
user's computer to prevent the user from getting online assistance
from anti-virus Web sites, Trend Micro added.

The worm can also connect to a specific Internet relay chat server and
give hackers remote control over affected systems, which can be used
to infect other unpatched machines in a network and slow down network
performance.

"Since most users may not be aware of this newly announced security
hole so as to install the necessary patch during last weekend, we can
foresee more infections from WORM_ZOTOB," it said.

Last Tuesday, Microsoft issued patches to fix its security flaws as
part of its monthly security bulletin. The problems affect the Windows
operating system and Microsoft's Internet Explorer Web browser.

Microsoft has warned that an attacker could exploit a vulnerability in
its Internet Explorer Web browser, lure users to malicious Web pages
and could run a software code on the user's PC giving the attacker
control of the affected computer.

Computer users should update their anti-virus pattern files and apply
the latest Microsoft patches to protect their computer systems, Trend
Micro said.

More than 90 percent of the world's PCs run on the Windows operating
system and Microsoft has been working to improve the security and
reliability of its software.


Copyright 2005 Reuters Limited. 

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

------------------------------

From: rmalarc <rmalarc@msn.com>
Subject: 2 PRIs - Failover
Date: 16 Aug 2005 05:54:11 -0700


Hello,

I currently have a PRI with a bunch of DIDs operating in site A. We
are planning to set up a site B with its own PRI and its own DIDs. I
would like to be able to also set up PRI B so it serves as a backup to
PRI A.

Here are the options I've thought of:

-. All calls ring PRI A and should it be down they ring PRI B

-. All calls to PRI A ring PRI A and PRI B simultanously. Calls to PRI
B only ring in PRI B.

Are these options feasable? Is there another way to set them up?

A few more questions:

-. should any carrier be able to set this up?

-. do both PRIs have to be with the same carrier?

Regards,


Renato A.

------------------------------

From: Peter Godwin <godwin@isoc.org>
Date: Tue, 16 Aug 2005 12:43:39 +0200
Organization: Internet Society
Subject: Jun Murai Recognized With the Iinternet Society's Postel Award


2005 award goes to pioneer behind development of the Internet in the Asia
Pacific region

Reston, VA - 16th August 2005 - Professor Jun Murai is this year's
recipient of the Internet Society's prestigious Jonathan B. Postel
Service Award. The award recognises Professor Murai's vision and
pioneering work that helped countless others to spread the Internet
across the Asia Pacific region.

The Postel Award was presented during the 63rd meeting of the Internet
Engineering Task Force (IETF) in Paris, France by Daniel Karrenberg,
chair of this year's Postel award committee, and Lynn St. Amour,
President and CEO of the Internet Society.

"Jun Murai has always encouraged, inspired and helped others,
particularly his students and his colleagues in other parts of the
Asia Pacific region," said Karrenberg. "He has also played a key role
in creating structures for Internet coordination in the region
(particularly APNIC), and he is widely recognised for his recent
pioneering work in IPv6 implementation."

Jun Murai is currently Vice-President, Keio University in Japan, where
he is a Professor in the Faculty of Environmental Information. In
1984, he developed the Japan University UNIX Network (JUNET), and in
1988 established the WIDE Project (a Japanese Internet research
consortium) of which he continues to serve as the General
Chairperson. He is President of the Japan Network Information Center
(JPNIC), a former member of the Board of Trustees of the Internet
Society and a former member of ICANN's Board of Directors.

The Jonathan B. Postel Service Award was established by the Internet
Society to honor those who have made outstanding contributions in
service to the data communications community. The award is focused on
sustained and substantial technical contributions, service to the
community, and leadership. With respect to leadership, the nominating
committee places particular emphasis on candidates who have supported
and enabled others in addition to their own specific actions.

The award is named after Dr. Jonathan B. Postel, who embodied all of
these qualities during his extraordinary stewardship over the course
of a thirty-year career in networking. He served as the editor of the
RFC series of notes from its inception in 1969, until 1998. He also
served as the ARPANET "numbers Czar" and the Internet Assigned Numbers
Authority over the same period of time. He was a founding member of
the Internet Architecture Board and the first individual member of the
Internet Society, where he also served as a trustee.

Previous recipients of the Postel Award include Jon himself
(posthumously and accepted by his mother), Scott Bradner, Daniel
Karrenberg, Stephen Wolff, Peter Kirstein and Phill Gross. The award
consists of an engraved crystal globe and $20,000.

ABOUT ISOC

The Internet Society (http://www.isoc.org) is a not-for-profit
membership organization founded in 1992 to provide leadership in
Internet related standards, education, and policy. With offices in
Washington, DC, and Geneva, Switzerland, it is dedicated to ensuring
the open development, evolution and use of the Internet for the
benefit of people throughout the world. ISOC is the organizational
home of the Internet Engineering Task Force (IETF) and other
Internet-related bodies who together play a critical role in ensuring
that the Internet develops in a stable and open manner. For over 13
years ISOC has run international network training programs for
developing countries and these have played a vital role in setting up
the Internet connections and networks in virtually every country
connecting to the Internet during this time.

FOR FURTHER DETAILS:

Peter Godwin
Communications Manager, Internet Society
E-mail: godwin@isoc.org
4, rue des Falaises
1205 Geneva
Switzerland

------------------------------

Date: Tue, 16 Aug 2005 12:39:35 EDT
From: USTelecom dailyLead <ustelecom@dailylead.com>
Subject: VoIP Provider Appeals FCC's 911 Deadline


USTelecom dailyLead
August 16, 2005
http://www.dailylead.com/latestIssue.jsp?i=23877&l=2017006

		TODAY'S HEADLINES
	
NEWS OF THE DAY
* VoIP provider appeals FCC's 911 deadline
BUSINESS & INDUSTRY WATCH
* Icahn, Time Warner's Parsons to meet
* Sprint, NFL ink wireless deal
* Broadband growth sluggish in Q2
* NTT DoCoMo executive champions "wallet phones"
USTELECOM SPOTLIGHT 
* TELECOM '05:  Preparing You for What's NEXT
EMERGING TECHNOLOGIES
* Vendors claim data transmission record
REGULATORY & LEGISLATIVE
* India's government blocks Huawei

Follow the link below to read quick summaries of these stories and others.
http://www.dailylead.com/latestIssue.jsp?i=23877&l=2017006

------------------------------

From: techie@tantivy.tantivy.net (Bob Vaughan)
Subject:  Museum of Communications - Seattle (and Others)
Date: Tue, 16 Aug 2005 20:22:27 UTC
Organization:  Tantivy Associates


I should probably remember to mention the Museum of Communications in
Seattle, (formerly the Vintage Telephone Equipment Museum), operated
by Washington Chapter 30, TelecomPioneers.

The musuem is located at:
	7000 East Marginal Way S
	Seattle, Washington 98108
	(206) 767-3012

	(just down the street from the Museum of Flight)
	and is open Tuesdays from 8:30am to 2:00pm or by appointment.

	www.museumofcommunications.org

They have a large collection of phones, switches, tools, etc covering 
several floors. They share building space with a USWest central office.

 From the moment you walk in the door, you are surrounded by old 
communications technology, from magneto phones to broadcast radio 
transmitters, from telegraph to teletype.

They have working #1, #5 and #755 crossbar, Step-by-Step, and #3ESS, 
as well as a Panel switch, believed to be the only working panel switch 
anywhere in the world.

If you are ever in Seattle, check it out ... Arrive early, as there is a
lot to see. It is amazing just how much equipment they have managed to
shoehorn into the space that they have.

              ===========================

Pacific Bell also has/had a small museum at their headquarters at 
140 New Montgomery Street in San Francisco. I have not been there in years,
and I do not know the status of it. 
http://www.sfvisitor.org/visitorinfo/html/Soma.html

              ============================

The Roseville Telephone Company (Now SureWest) has a telephone museum in
Roseville, California (Near Sacramento)
http://www.rosevilletelephonemuseum.org/

              ============================

for more links see:
www.scn.org/tech/telmuseum/links.html 
http://www.stepintoplaces.com/Resource%20Guide/Industry/Telecommunication.htm

I also came across a page of recordings of telephone sounds.
Equipment, announcements, intercepts, etc.
http://www.wideweb.com/phonetrips/


               -- Welcome My Son, Welcome To The Machine --
Bob Vaughan  | techie @ tantivy.net 		  |
	     | P.O. Box 19792, Stanford, Ca 94309 |
-- I am Me, I am only Me, And no one else is Me, What could be simpler? --

------------------------------

Date: Mon, 15 Aug 2005 21:51:11 -0600
From: jared@nospam.au (jared)
Subject: Re: Telephone Exchange Usage in Low-Volume States


> 2) Five digit dialing in some areas not well populated or served by
> community dial offices?

Having lived in a town where an ESS was being installed, forcing
7-digit dialing, I asked a friend who worked for the then Bell Labs
why an ESS couldn't be programmed to retain 5 digits. His response was
that the opposite problem was more of a concern, i.e. allowing for 7
and 10 digit local dialing, giving as an example the situation in
Silicon Valley at the time, where the 415 and 408 area codes were
across the street from each other.

------------------------------

Date: 16 Aug 2005 05:13:46 -0000
From: John Levine <johnl@iecc.com>
Subject: Re: Telephone Exchange Usage in Low-Volume States
Organization: I.E.C.C., Trumansburg NY USA


> 1) Traditional party line service, since it's not worth the cost to
> upgrade lines out to people's farms?

I doubt it.  Private lines make moves and changes and maintenance
vastly cheaper.  My relatives who are trying to sell their small rural
telco in Vermont converted everything to private lines years ago.  For
the few people who still have grandfathered party lines, they tie the
lines together at the CO.

> 2) Five digit dialing in some areas not well populated or served by
> community dial offices?

Not since 1+7D went away.  I think these days you'll find that CDOs
are all remotes from modern switches that provide all of the digital
bells and whistles.  They certainly are around here.

Remember that due to the magic of USF accounting, small rural telcos
have an incentive to gold plate their plant.  That's why the CO down
the street from me has a GTD-5 with two remotes that handles a total
of about 10,000 lines.

R's,

John

------------------------------

From: Joseph <JoeOfSeattle@yahoo.com>
Subject: Re: Telephone Exchange Usage in Low-Volume States
Date: Tue, 16 Aug 2005 06:26:48 -0700
Reply-To: JoeOfSeattle@yahoo.com


On 15 Aug 2005 13:40:56 -0700, hancock4@bbs.cpcn.com wrote:

> 1) Traditional party line service, since it's not worth the cost to
> upgrade lines out to people's farms?

I am of the belief that anyone who wants a private line these days can
get one.  It used to be that if you could get a private line at all
you could only be a relatively short distance from the CO not to incur
a "mileage" charge if you wanted anything other than 8-party service.
I believe you can still get two-party service in some areas at a
reduced per month rate, but I believe private line service is pretty
much available in all but the most remote areas now.

> 2) Five digit dialing in some areas not well populated or served by
> community dial offices?

I'd say off the top of my head probably not.  When CDO's were all
step-by-step offices dialing patterns as little as three digits were
available determined by the number of subscribers and optionally could
be dialed with all seven numbers with the first few digits "absorbed"
for local callers.  When ESS came into being that all ended.

------------------------------

From: bonomi@host122.r-bonomi.com (Robert Bonomi)
Subject: Re: Telephone Exchange Usage in Low-Volume States
Date: Tue, 16 Aug 2005 13:20:06 -0000
Organization: Widgets, Inc.


In article <telecom24.369.2@telecom-digest.org>,
<hancock4@bbs.cpcn.com> wrote:

> In many places in the U.S. the demand for telephone exchanges is very
> high for a variety reasons.  This has result in area code splits and
> overlays.  NJ started off with one area code and now has nine.

> But some states still only have one area code.  I understand some
> states are not growing very fast in population, indeed, some rural
> towns are losing population.  This includes:  Alaska, Idaho, Montanna,
> North Dakota, South Dakota, and Wyoming.  (Not counting some other
> single-code states).

> Given the rural/low growth aspect of places in some of these states, I
> was wondering if telephone service may still have some old fashioned
> features to it.  For example, would such areas have:

> 1) Traditional party line service, since it's not worth the cost to
> upgrade lines out to people's farms?

Yes.

> 2) Five digit dialing in some areas not well populated or served by
> community dial offices?

*VERY* rare. Gotta have full numbers, to handle direct-dial inbound
calls from outside that exchange. Recognizing 'short cut' dialing
within the exchange raises all sorts of complexities, having to do
with 'variable length' numbers, and detecting 'end of dialing'.

------------------------------

From: BV124@aol.com
Date: Tue, 16 Aug 2005 00:53:31 EDT
Subject: Re: Classic Six-Button Keysets - Cost During 1970s
 

Joe of Seattle wrote: 

> And as far as "hunt" goes Telco (Southwestern Bell in particular)
> did not want to give me hunt on a residential line with sequential
> line numbers when I had two lines. Actually it doesn't matter if
> it's sequential or not. Even #5 Crossbar had "jump" hunt readily
> available. In any case they didn't want to provision my residential
> line with hunt capability.  

SBC gave it to me, for non-sequential lines, in Glendale, California
for $.38/month.  I don't know if it was a "true" hunt or what they
advertise as "busy call forwarding."  In any event, they charged me
$38.00 labor to install it!  And then they refused to "alias" the
voice mail to the 1st line from the 2nd line.  They sure aren't the
Pacific Tel or AT&T of old.  I'm with you Pat, I hate those people.

------------------------------

From: techie@tantivy.tantivy.net (Bob Vaughan)
Subject:  Re: Classic Six-Button Keysets - Cost During 1970s
Date: Tue, 16 Aug 2005 19:38:03 UTC
Organization:  Tantivy Associates


In article <telecom24.369.9@telecom-digest.org>, Joseph
<JoeOfSeattle@yahoo.com> wrote:

> On Sun, 14 Aug 2005 21:01:08 -0400, Michael Muderick
> <michael.muderick@verizon.net> wrote:

>> I don't know the cost of all the features, but they were a la carte.
>> However the hunting feature was done at the CO and there was no charge
>> for that as far back as I can remember.  Remember, it meant another
>> completed call for Ma Bell, rather than a busy signal, so it was to
>> their advantage to give hunting away free, lest someone decide to opt
>> out of it.  

> And something I've always wondered about is the use of multiple lines
> in countries outside of the US such as in Europe and in Asia.  Often
> I'd see numbers advertised or on signage on the order of 123456/7
> meaning that you could reach that business by dialing either 123456 or
> 123457.  Does this mean that these step-by-step/Strowger or other
> electromechanical exchanges did not have trunk hunt and that this is
> just a North American "invention."  I can't think of any other reason
> for listing for the public both numbers if they were sequential other
> than the facility for automatic trunk hunt was not available.

The step-by-step switches were certainly capable of sequential hunting.

On the Western Electric 711B PBX, it was simply a matter of adding or
removing an insulating sleeve on one of the relay contacts to route a
connection thru adjacent lines.. I think it was the ground that was
routed, and the call would hunt until it found ground, and completed
the circuit, allowing the line relay to be closed.

In theory, you could do non-sequential hunting, but it would require
the addition of jumpers of the switch frame, while sequential hunting
could be setup by a switch tech in a minute or two.

> And as far as "hunt" goes Telco (Southwestern Bell in particular) did
> not want to give me hunt on a residential line with sequential line
> numbers when I had two lines.  Actually it doesn't matter if it's
> sequential or not.  Even #5 Crossbar had "jump" hunt readily
> available.  In any case they didn't want to provision my residential
> line with hunt capability.

I'm going to guess that they didn't normally provide hunting on
residential lines, and thus were not expecting to have to clear it
when the line was disconnected, especially if the switch served mostly
residential customers.


               -- Welcome My Son, Welcome To The Machine --
Bob Vaughan  | techie @ tantivy.net 		  |
	     | P.O. Box 19792, Stanford, Ca 94309 |
 -- I am Me, I am only Me, And no one else is Me, What could be simpler? --

------------------------------

From: Joseph <JoeOfSeattle@yahoo.com>
Subject: Re: Classic Six-Button Keysets - Cost During 1970s?
Date: Tue, 16 Aug 2005 06:17:23 -0700
Reply-To: JoeOfSeattle@yahoo.com


On 15 Aug 2005 11:06:12 -0700,[Telecom Digest Editor] wrote:

> [TELECOM Digest Editor's Note: But the most ancient arrangement I ever
> saw was a phone with the six buttons in a separate box next to it.
> This one was in the clock tower at Holy Family Catholic Church on West
> Roosevelt Road in Chicago, back in 1972 or so. A relatively ancient
> wall phone (with a side ringer, yet) and the feed to it coming from a
> somewhat newer but still ancient side box with six round buttons on it.

I'm surprised you don't remember that all the while when "565" sets
were available for desk use there was no similar model for wall mount.
For wall mount they had a 500 set with a separate "key" box that had
the same keys as you'd find on a 565 desk set usually in the reverse
order that you'd find on the desk set with the hold button on the
extreme right and also with round keys.  It was only later that a six
button wall keyset was developed with the big square keys and the
handset which rested on top of the set.

------------------------------

Subject: Classic Six Button KeySets - Additional Lines in Europe 
From: Charles G Gray <graycg@okstate.edu>
Date: Tue, 16 Aug 2005 08:43:59 -0500


I saw your question about multiple line hunt phone numbers in the Digest. 

As for Europe, (at least in Germany) most of the stepper switches were
Siemens/Halske RP-40.  It was first manufactured beginning in the
mid-1930s, and some was still in operation as late as 1980.  I managed
the US Army's phone system in Europe 1971-1976 and we still had
bunches of RP-40.  Siemens stopped making repair parts in about 1972,
and from then on our German switch techs pieced together what they
could.  Rotary hunt was available for the RP-40, but the Army wasn't
using it.  

We had an Italian gentleman who understood the equipment inside out,
but none of the Americans would listen to him.  I had been to school
with AT&T for a year, and I knew the benefits of rotary hunt.  Since I
was brought in as the "expert", I didn't have any trouble convincing a
couple of generals and a bunch of colonels of the benefits of rotary
hunt, so we went on a big campaign to install the little brass
clip-things that made it possible. In fact, I used to carry one of
them in my pocket to show them just how simple it was to install.
Actually, we improved traffic handling on the network tremendously by
reducing the number of busy tones and re-dials.  Mr. DiBernardo and I
made a great team, and many people thought we were "magic".  Actually,
we were just pretty good engineers.

We did some other neat things as well, such as instituting one-way
trunks, with overflow to two-way that increased network traffic
capacity by over 50% and didn't cost the Army (American Taxpayer) a
single dime for new equipment.  The capability was there all along,
but nobody wanted to listen to Mr. DiBernardo. We implemented circuit
"gooming" before it was a popular concept here,which also resulted
dramatic increases in traffic capacity.

Just a historical note, we still had the switch in the I.G. Farben
Building in Frankfurt that had been installed in 1937-39.  The
original switch was 400 lines of RP-40.  By the time I was there it
had grown to about 3,000 lines -- but still RP-40.

I did write a plan for a completely new digital electronic switching
system in 1974, known as the "European Telephone System Plan".  It
went into the Army budget cycle and was approved in 1975, calling for
installation of American made equipment.  I wanted it to be portable
so when we moved bases and troops around we could take it with us.
Then politics entered the game.  Mr. Rumsfeld who was the Secretary of
Defense at the time (the youngest one ever), received a hand-written
note from his counterpart in the German Ministry of Defense that said
something like: "Dear Don.  I understand that the US Army is
considering replacing their telephone system in Germany.  I just want
to remind you that Siemens is eminently qualified to undertake this
work".  Soon after that Siemens in Munich was awarded the contract --
even though they had never built a digital switch before.  Good old
Mr. DiBernardo ("Mr. Di" to his friends) provided months of "free"
consulting work to Siemens R&D in Munich guiding them through the
design process so they could build something to sell to the Army.  Of
course, the Army paid his TDY expenses from Heidelberg to Munich.  He
may have gotten some "free" lunches from Siemens.

As for multiple sequential numbers listed on signage, I think that
was/is a psychological thing -- at least in Europe.  A company that
listed only one number might be considered "small", while a company
that listed multiple numbers might be considered "large".  Of course,
they also listed fax numbers, TELEX, and anything else that might
bolster their public image.  It happens here, too, but for different
reasons.  I just randomly looked in our phone directory and the Owl
Drug Store in Wagoner, OK lists two numbers -- no way to know if they
are in rotary hunt or not.  The "Land of Oz" in Tulsa is the same way.
I suspect that there are hundreds of them here.  In the US, it
typically happens because the telephone company sales reps that handle
business lines don't have a clue about rotary hunt, and the users
don't know enough to ask.  So if a company has one number, and decides
to add another one (or more) due to business needs, nobody ever thinks
about hooking them together in a hunt group, and the directory bunch
just punches in another number.

Enough of my rambling for now.  I'm sure that this may be "too much 
information", but once I got started, it just kind of went on.

Regards.

Charles G. Gray
Senior Lecturer, Telecommunications
Oklahoma State University - Tulsa
(918)594-8433

------------------------------

Date: Tue, 16 Aug 2005 13:18:21 -0400
From: William Warren <william_warren_nonoise@comcast.net>
Subject: Re: Urgent Help Needed With Internet Explorer IE 6.0


Bill Matern wrote:

> PAT,

> I had a similar problem before.  A good lesson was learned by my kids
> about downloading stuff from web pages.  It took me days to clean the
> mess up.

> The procedure that worked the best for me was using as many "free"
> spyware removes as possible: Spybot search and destroy and others.  I
> needed three (don't remember the other two) before I got the mess
> cleaned up.  I don't know if this will work for you or not, but it is
> worth a try.
[snip]

> [TELECOM Digest Editor's Note: The problem is now cured, and it was a
> thing about running one Spybot thing after another. I had found out
> earlier that all the facilities worked fine under a non-administrator
> account called 'ptownson', so I thought why not run the Spy Bot and
> AdAware and Grisoft AVG under that account also since all three of
> those things are at least partially dependent on IE 6.0 to run 
> correctly anyway, which they were refusing to do under the admin 
> account. By running them over and over, getting to the point of
> 'found and cured X files; could not cure Y files since they are
> locked, reboot and let (whoever) run first thing once again, while
> those files are still unlocked, etc. It took some doing, but then 
> on one test of the results, presto, things were back to normal again.
> PAT]

Pat,

You have my deepest sympathy: there's nothing more frustrating about
computers than having a child trash one just by following a link or
trying to play an online game.

Adware and spyware has gotten a lot more tenacious and intrusive since
it started, and it's an order of magnitude more difficult to remove
than a virus. After all, virus writers don't get paid (hmmm ...), and
adware vendors do, so they've gotten very good very quickly. Of
course, the ad/spyware vendors depend on children to spread their
sleezeware, but the damage and wasted time they cause is what an MBA
would call an "externality": cleanup is _your_ problem.

The good news is that there is a lot of help available and you've done
the most important thing already, which is to admit you need it.

Here's the list I use when I set up a new machine for my SOHO
customers.  HTH.

1. Copy the system partition as soon as the OS and any "office"
    software has been registered. Since new disk drives typically
    have at least 20GB of storage, it's a quick and easy precaution.
    In event of a software meltdown, I simply roll the copy back
    over the original and they're back in business twenty minutes
    later. [This is, BTW, an excellent use for the ~2GB drives you
    have hanging around in your old 486 or can get for free at
    the recycling center. You can plug the drive in for the backup,
    and then take it out and put it on a shelf out of harm's
    reach, thus guarding against both software _and_ hardware
    failures.]

2. If children will have access to the computer, take these
    precautions:

   A. Enable a power-on password to prevent late-night
      adventures.
   B. Set a password on the screen saver, and set the timeout to
      5 minutes. This keeps the kids out of _your_ account
      and helps limit damage to your data.
   C. Warn the user to NEVER use the Administrator account
      for day-to-day tasks.
   D. Install the hisecws (or hisecws4) security template,
      and use it to post a logon warning that all internet usage
      will be logged.
   E. Use a group policy to prevent users erasing their history
      files, and show the owner how to check.
   F. Install TeaTimer or similar monitoring software to flag
      attempted registry changes. Of course, the kids always
      click "yes", but there'll be a log and it'll help to
      keep the adults out of trouble as well.

3. Make sure the owner knows about backup options and the
    costs of each one: online vs. CD-RW vs. disk, etc. I make
    sure the user knows that it's a question of "When", not
    "If", especially with children involved. I emphasize the
    need for backups just before any family gathering, just
    in case.

There's another option that you should consider: set aside your old
computer for use by the kids, and warn them they if it breaks, they
get to keep both pieces and you don't want to hear any whining. I do
this with mine, and the one time it got adware on it, I told them I'd
get to it in a couple of weeks and in the meantime they could walk to
the library or stay after school and use the machines there. It's
never happened again.

I know this is locking the barn door, but (especially in your job)
it's only a matter of time before something slips past your first line
of defense. Next time, the result can be a shrug and a few minutes of
copying while you enjoy a coffee break. Sound good?

William Warren

(Filter noise from my address for direct emails)



[TELECOM Digest Editor's Note: It does all sound like good advice. I
know that the password on my Administrator account (all my logins and
passwords actually) are on autologin. That is to say, I turn on the
computer, sit back and wait while it boots up, the 'network user name'
and 'network password' boxes are filled in automatically, all the
programs which are 'run on start up' such as the atomic clock synchronizer
the 'tclockex' program (which provides fancy script and additional
features to the Windows clock) starts, Zone Alarm and AVG get started,
etc. Sometimes also one or more virus scanning programs run as needed.
Then, and only then, do I start doing my thing. And _despite_ the
hardware firewall (cable router and modem), the Zone Alarm software
firewall, an email 'spam examination program' and other goodies, I
still get jumped on now and then. 

It appears the 'Administrator' profile got trashed by something, which
is what caused Internet Explorer to quit operating. I went in the
Documents and Settings, renamed that profile to 'Administrator.old',
then shut down, powered back up and let Windows build an all new
profile for Administrator. The 'ptownson' profile (also an
administrator account) worked okay. Now I can be on 'ptownson' or
on 'Administrator' and log off that account and switch to the other
one which I do sometimes. But for some reason I am unable to switch
to the old 'Administrator.old' account to benefit from his files,
etc. Apparently just renaming one profile to something else, to force
Windows to construct a new profile for who you want to be does not
in the process require the old user 'Administrator.old' to come to
life any longer. Ergo, things like the Outlook Express mailbox name
and address book is now unreachable. I log out of 'ptownson' or 
'administrator' and attempt to login in as 'administrator.old' (in 
order to access his files, etc) but it just won't work.   PAT]

------------------------------

From: Fred Atkinson <fatkinson@mishmash.com>
Subject: Re: FSK Signal For Voicemail on MCI 
Date: Tue, 16 Aug 2005 05:08:31 -0400


As long as you talk to their customer service people, they won't know,
either.  That's the norm for most companies these days.

I've long since lost count of how many times customer service and even
technical support people have given me bad information.  It's really
pretty sad.

I wrote an article for the local computer club in Columbia, SC a
couple of years ago.  I entitled it, 'Customer Service, an oxymoron'.
The editor of the newsletter changed the title to 'Is Customer Service
an oxymoron' (he did it without telling me.  I would've objected to
the change if I had had an opportunity before he published it).  It
detailed some of my experiences and pointed out that these companies
are hiring entry level people to keep costs down.

The telephone, cable, and other high tech companies are hiring lost
cost people due to the state of the economy over the last few years.
A number of experienced people have been practically unable to get a
position during this time.  They are told they are 'overqualified'
when they apply.  But, the folks they hire are underqualified.  And
they don't do an adquate job of training the ones they do hire.  The
truth is, these companies don't want to pay for experience right now.

I am frequently given bad information when I talk to these folks.  And
when I point out the error of their ways, they insist they could not
possibly be wrong.  Yet, when I pursue the matter on my own, I
generally prove them to be wrong.

Sad, but true.


Fred Atkinson

------------------------------

From: bonomi@host122.r-bonomi.com (Robert Bonomi)
Subject: Re: How Long Can a Telephone Extension Cord Be?
Date: Tue, 16 Aug 2005 12:56:47 -0000
Organization: Widgets, Inc.


In article <telecom24.369.6@telecom-digest.org>, Phil McKerracher
<phil@mckerracher.org> wrote:

> John Levine <johnl@iecc.com> wrote in message
> news:telecom24.366.5@telecom-digest.org:

>> I think the limit is about 18,000 feet.  Then you might have trouble
>> carrying DSL over it ...

> Correct, but that's the approximate limit for the total length from
> the switch to the telephone.

Strange, isn't it, that the limit for ISDN (with an extender) is over
_25,000_ ft?  <grin>

In rural areas, for POTS service, 75,000+ ft  of wire is not uncommon.

> Beyond that, the signal is typically attenuated too much, mainly by
> cable resistance, and gets buried in noise.

Circa 18,000 ft is a general practical limit for _DSL_ circuits, only.
*NOT* due to cable "resistance", by the way -- but rather due to the
cumulative effect of distributed capacitance, and the 'blurring' of
high-frequency signal transitions that occurs as a result thereof.

------------------------------

Date: Mon, 15 Aug 2005 22:05:29 -0600
From: jared@nospam.au (jared)
Subject: Re: Stock Market Ticker Tape Machines? (R


> Only within the last 20 years did the US Navy move away from
> electromechanical Teletype Model 28s and variations thereof. When I
> was the communications officer aboard the then state-of the-art fleet
> flagship USS Blue Ridge in Yokosuka in 1987

Memories of 75 baud circuits using Baudot encoding ... the wily shift
symbol ... some of the low speed circuits were for naval communication
over very noisy channels and so I think the low rate was necessary
(esp in those days before FEC and/or IP).

------------------------------

From: Steven Lichter <shlichter@diespammers.com>
Reply-To: Die@spammers.com
Organization: I Kill Spammers, Inc.  (c) 2005 A Rot in Hell Co.
Subject: Re: Stromberg Carlson Company?
Date: Tue, 16 Aug 2005 04:10:43 GMT


hancock4@bbs.cpcn.com wrote:

> Would anyone know any history of this company?  I know that they once
> made telephones, radios, and PA systems.  I understand "Comdial"
> phones are an outgrowth of them.  I presume they are long out of
> business.

> I've never seen a home audio product, but have seen commercial PA
> systems and telephone sets made by them in the 1950s.

> I get the impression they were a modest sized company in both
> telephones and audio products.  I don't recall seeing too many of
> their ads in old magazines compared to other electronic outfits.

> [TELECOM Digest Editor's Note: They also made motion picture
> projectors like Bell and Howell did.   PAT]

I believe the equipment manufacturing division moved to Florida and is
part of General Dynamics.  They were really big in Rochester, Ny.
Used the old Rochester Telephone for testing.


The only good spammer is a dead one!!  Have you hunted one down today?
(c) 2005  I Kill Spammers, Inc.  A Rot in Hell Co.

------------------------------


TELECOM Digest is an electronic journal devoted mostly to telecomm-
unications topics. It is circulated anywhere there is email, in
addition to various telecom forums on a variety of networks such as
Compuserve and America On Line, Yahoo Groups, and other forums.  It is
also gatewayed to Usenet where it appears as the moderated newsgroup
'comp.dcom.telecom'.

TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.

Contact information:    Patrick Townson/TELECOM Digest
                        Post Office Box 50
                        Independence, KS 67301
                        Phone: 620-402-0134
                        Fax 1: 775-255-9970
                        Fax 2: 530-309-7234
                        Fax 3: 208-692-5145         
                        Email: editor@telecom-digest.org

Subscribe:  telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org

This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information:        http://telecom-digest.org

Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
  (or use our mirror site: ftp.epix.net/pub/telecom-archives)

RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html
  For syndication examples see http://www.feedrollpro.com/syndicate.php?id=308
    and also http://feeds.feedburner.com/TelecomDigest

*************************************************************************
*   TELECOM Digest is partially funded by a grant from                  *
*   Judith Oppenheimer, President of ICB Inc. and purveyor of accurate  *
*   800 & Dot Com News, Intelligence, Analysis, and Consulting.         *
*   http://ICBTollFree.com, http://1800TheExpert.com                    *
*   Views expressed herein should not be construed as representing      *
*   views of Judith Oppenheimer or ICB Inc.                             *
*************************************************************************

ICB Toll Free News.  Contact information is not sold, rented or leased.

One click a day feeds a person a meal.  Go to http://www.thehungersite.com

Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

              ************************

DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD!  REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM   SIGN UP AT http://www.easy411.com/telecomdigest !

              ************************

Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.

The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum.  Classes
are available in Stillwater, Tulsa, or through distance learning.

Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu

              ************************

   ---------------------------------------------------------------

Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list. 

All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.

End of TELECOM Digest V24 #370
******************************

Return to Archives**Older Issues