[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Clips May 20, 2002



Clips May 20, 2002

ARTICLES

Sen. Drafts $32B Anti-Terror Plan
New TSP system set for September
Making a Digital Government
Report on Foreigners, Social Security
At I.B.M., a Tinier Transistor Outperforms Its Silicon Cousins
New Web File-Sharing System Launches
A Web of dreams unrealized: High-speed Net access slow to catch fire
Lawmakers Play Up 'Dot-Kids' Proposals
Law beefs up security at borders
Homeland strategy won't meet all concerns
Senate Panel Backs Computer Security Boost
Looking into disk mirroring
iSCSI may cut mirroring costs
Parenting suffers in e-mail overload
Mass arrests over online child porn
Virus outbreak hits file swappers
Tokyo smart cards challenge cash
Defense IT execs are honored by Women in Technology
File-sharing system gives artists some control
Internet pharmacies stress industry in Canada
Agencies find it's not getting the information, it's how you use it
Central e-learning site for federal workers takes shape
Sharp rise in computer crime in Australia
Hotmail bid to cash in on users
Protecting the extension of your personal space
Outlining Proper Uses Going Online
Radio ID Tags: Beyond Bar Codes
FBI wants to know who took 13,000 credit reports








*********************** Associated Press Sen. Drafts $32B Anti-Terror Plan Thu May 16,11:45 AM ET By ALAN FRAM, Associated Press Writer

WASHINGTON (AP) - Sen. Robert Byrd (news, bio, voting record), chairman of the Senate Appropriations Committee, is showing colleagues a tentative anti-terrorism package that is billions costlier than a $29.4 billion version a House panel has approved, Senate aides said Thursday.


Byrd's draft has a price tag surpassing $32 billion, one said, with virtually all the extra money aimed at domestic security programs. His package, described by aides speaking on condition of anonymity, also exceeds the $27.1 billion that President Bush (news - web sites) requested from Congress in March.


Aides said Byrd, D-W.Va., may alter his draft as he consults with Republicans in hopes of gaining their support. But for now, its size is certain to draw attacks from many congressional conservatives who want to limit the measure's cost to Bush's proposal.

Even moderate Sen. Ted Stevens (news, bio, voting record) of Alaska, the Appropriations Committee's top Republican, who normally crafts spending bills arm-in-arm with Byrd, has told him he wants the package no bigger than the House version.

Byrd's measure takes a shot at Homeland Security Director Tom Ridge by making his position one that would require Senate confirmation. Byrd has clashed with the White House over Ridge's refusal to formally testify before congressional committees, which the administration justifies by saying Ridge is an adviser to Bush who is not approved by the Senate.

Byrd's measure would provide $200 million in extra aid for Israel and $50 million for the Palestinians, which the House provided, though with different terms. And it would provide $100 million to battle AIDS (news - web sites) and other deadly diseases abroad, half the House proposal.

Byrd's committee could vote on the plan as early as next week.

On Wednesday, the House Appropriations Committee used a voice vote to approve its version of the bill after handing Bush a victory in the fight over his decision to withhold money provided last year for overseas family planning efforts.

The House panel gave Bush another win as well, derailing language that would have spared the planned Crusader artillery system from Defense Secretary Donald H. Rumsfeld's budget ax.

Worried their amendment might fail, supporters of the $11 billion weapon settled for a nonbinding provision telling Rumsfeld to "take no action that would precipitously stop work" on the Crusader until Congress has voted on the program's fate. That, in effect, postpones the fight until lawmakers write the 2003 Pentagon (news - web sites) spending bill in a few months.

The full House should vote next week on the overall counterterror package, which is the government's latest response to the Sept. 11 terror attacks.

The bill includes $15.8 billion for the Defense Department; $5.8 billion for domestic security, mostly for aviation and airports; and $5.5 billion to help New York recover from the Sept. 11 attacks.

It provides money for Pell grants for low-income students, overhaul of election systems, veterans benefits and foreign aid, including funds for Israel and the Palestinians.

By a near party-line 32-30 vote, the Appropriations panel approved a Tiahrt provision giving Bush until July 31 to decide whether to spend any of the $34 million for overseas family planning that lawmakers approved and Bush signed into law last December.

Bush has refused to release the money to the U.N. Population Fund, which runs family planning programs in 140 countries. In withholding the money, the administration cited conservatives' accusations that the U.N. agency's activities in China abet forced abortions and involuntary sterilizations.

U.N. officials and their supporters deny the charge, and the U.N. program uses no U.S. funds in China. The Bush administration has sent a commission to China to search for evidence of forced family planning and U.N. links to it, and its report is expected soon after it returns in two weeks.

Wednesday's vote reversed a 32-31 tally by the committee last week approving language requiring Bush to release the $34 million by July 10 unless U.N. complicity in coerced abortions and sterilizations was found.
*************************
Government Computer News
New TSP system set for September
By Brian Friel
bfriel@xxxxxxxxxxx


The $102 billion Thrift Savings Plan will have a new computer system in September that will provide daily updates of the value of the 401k-style retirement accounts held by federal workers and military personnel, the TSP board announced Friday.


The TSP's 2.9 million participants will also be able to move their money among investment options at any time under the new system.



The announcement marks the fourth time in three years that the TSP board has promised to unveil the new system, which will make the TSP more like private sector 401k systems. Such systems have long provided participants with daily valuation and the ability to update accounts at any time.



After three delays in 2000 and 2001, the TSP board in July 2001 fired Fairfax, Va.-based American Management Systems, the original contractor overseeing the TSP's computer modernization. The board hired Alexandria, Va.-based Materials, Communication & Computers Inc. (MATCOM), to take over the contract. While MATCOM has been working on the contract, the Thrift Savings Plan board and American Management Systems have been locked in a legal battle over who is to blame for their failed contract.



TSP officials say MATCOM scrapped the work done by American Management Systems and started over.



TSP board officials plan to close out the current computer system at the end of August and bring the new system into operation on Sept. 16. There will be some limits on participants' account transactions during the transition.



The chart below shows the major changes that TSP participants will see if the new system works as expected in September.
********************
Los Angeles Times
Making a Digital Government
Lawrence Brandt's latest job is to get federal agencies to share technology and information.
By P.J. HUFFSTUTTER


Lawrence Brandt still remembers the day, nearly a decade ago, when he approached a team of University of Illinois students who were working on a software project called Mosaic. The technology offered a revolutionary idea in networked computing--the ability to surf a collection of multimedia images and text stored on remote computers.

Mosaic made the World Wide Web easy to use and ultimately drew millions of people onto the Internet.

Brandt, then a manager with the National Science Foundation, understood that government needed to get on board. Pulling together some grant money for the young developers, Brandt helped coordinate a consortium of government agencies to fund this and other projects evolving out of some of the nation's super computer centers. Among the early recipients: Marc Andreessen, who created Mosaic and later co-founded Netscape Communications Inc.

"I funded Marc for $5 an hour," said Brandt, now the program director of the Digital Government project, an NSF initiative to forge ties between private research and public agencies. "I should have had him pay us in stock."

Brandt has a knack for spotting early-stage technologies that matter. Over the years, the small cluster of grants funneled to computer researchers has grown to a comfortable $10 million a year, all geared toward finding new ways to bring government into the digital age.

This week, more than 200 information technology researchers and software engineers involved in the program will gather in Redondo Beach to demonstrate prototype systems that promise to streamline government processes.

Some will succeed. Others, acknowledged Brandt, will fail. Either way, the dream of a truly electronic government has a long way to go.

"A failure means you learn you can't proceed in a certain direction," Brandt said. "In government, it's sometimes more important to avoid making a mistake than it is to make a home run."

Question: Why has government been so slow to get on the high-tech bandwagon?

Answer: It's very careful and risk averse. In business, if you drop $500 million on a failed technology project, you don't hear about it. In government, it lands you on the front page of the newspapers and launches congressional hearings.

It's also a cultural thing. People in government want to make sure they do the right thing for the public, but there's no clear bottom line. In business, the goal is profitability. In government, you don't have that.

Part of the problem is there are so many pushes and pulls in government. There's Congress looking over their shoulder and wanting one thing. Then, citizens want another. Many citizens don't appreciate what government agencies do. Most of what they do is invisible, and that's the way it should be.

Q: What's the goal of the NSF's Digital Government initiative?

A: The NSF focuses on long-term research and education in all science and engineering disciplines. The goal is to increase our understanding of subjects, even if the research may seem archaic or "out there." Even if a project fails, there is still some sense of success because others won't follow the same path and make the same mistakes.

If a project is a success, it may not be clear why the research matters right now. But it will. In many cases, the practical uses that result from scientific understandings were not apparent at the time the work was being done.

We focus on practical uses. We're funding the academic side of this thing, so that the research community has a chance to work on projects and deal with a scale and type of data they usually wouldn't have access to. These are important problems, some that may not have occurred to them before. We all need practical solutions.

Q: What are some of the key hurdles?

A: Privacy and confidentiality are very big issues that people in government are talking about right now. For many agencies, there's an inherent tension of the job between their mandate to collect data that is considered confidential and their mandate to disseminate some--but not all--of that data to researchers and the general public.

Right now, the way many of them try to maintain confidentiality is to introduce fake data that shows the same statistical trends as the real thing. Obviously, that drives researchers crazy.

We are funding a few Citizen Access projects to try to spark change. I have a person on detail from the U.S. Census who was able to make a really good connection with all the statistical agencies and figure out their needs.

One part of the project with the National Institute of Statistical Analysis is to provide agencies with the tools to better monitor this tension.

Q: How can so many different agencies--both state and federal--have such different goals and restrictions yet still use the same tools?

A: That's the joy of technology. If you're developing mathematical algorithms, they can be applied anywhere. It just needs to be flexible enough for the agencies to customize it to their needs.

We've got one project called Coplink, through the University of Arizona, that's trying to help local law enforcement people share information better. The result is a series of software programs that can be sold to other police departments.

The person in charge of the project already had connections with local agencies. We added base-level funding from the National Institute of Justice. Now, the university and the program manager have created a venture capital firm to spin off the product.

Q: Why wouldn't law enforcement share their information automatically? In light of the Sept. 11 catastrophe, it seems to make sense.

A: The information you hold is your power base. You saw that with Sept. 11 and the FBI's problems. It took someone upstairs to rattle the cage, to say, 'You will take down the barriers and share your information,' to get anything done.

If you talk about sharing the data from Customs and the [Federal Aviation Administration] and the FBI and local agencies, everyone would admit that it was a good thing. Everyone should be able to see the full picture of the elephant, not cling to their own little piece of it.

Part of the problem is that many agencies aren't allowed to share data because of the law. It's the notion of Big Brother. That's obviously a concern for many people. The idea of law enforcement having a unified, composite file on a person's life is a powerful thing. For some people, that's a horror.

On the commercial side, it's not a problem. It would be advertised as a feature.
*********************
Associated Press
Charges Against Internet Pharmacy
Sun May 19, 3:41 PM ET
By TOM COHEN, Associated Press Writer


TORONTO (AP) - In recent years, busloads of Americans have crossed into Canada to buy cheaper prescription drugs with help from Canadian doctors.


Now many of those customers, mostly senior citizens facing large medicine bills, make that trip by the Internet, creating a growing industry that is attracting the attention of regulators.


On May 14, the Ontario College of Pharmacists filed the province's first charges against a Web site selling prescription drugs, accusing it of doing so without a license.

It is the initial salvo in what could be a lengthy battle over how to regulate the Internet prescription drug industry, raising questions about whether technology has advanced faster than the governing laws and policies.

"This is the first time we've done this," Layne Verbeek, spokesman for the Ontario college. "It's a new area."

Verbeek said a body of rulings and court decisions is needed to ascertain if existing laws and regulations properly address the issues.

The charges were filed against The Canadian Drug Store Inc., one of its directors, an Ontario pharmacist, an Ontario pharmacy, an Ontario physician and a Canadian drug wholesaler.

Representatives of the Canadian Drug Store could not be reached for comment.

"There's always entrepreneurs wanting to find ways around the rules to make money. There's nothing wrong with entrepreneurship, but we're really at the beginning of this," Verbeek said. "These won't be the last charges we lay."

One of the most successful internet drug store entrepreneurs is Andrew Strempler, whose Mediplan Health Consulting Inc. in Manitoba fills about 1,000 prescriptions each day for U.S. customers who place orders through the Web sites RxNorth.com and Canadiandrugstore.com.

His operation, which employs more than 100 people including eight pharmacists, only handles non-narcotic orders that have a prescription from doctors licensed in Canada. The service includes having a Canadian-licensed doctor co-sign prescriptions from U.S. doctors for American patients.

While Canadian regulatory bodies say doctors only should sign prescriptions for patients they examine themselves, Strempler called that "kind of a dream."

"How many doctors have prescribed a drug based on another doctor's opinion? That's the reality out there," he said. "The issue isn't whether the patients are receiving proper care. The issue is we are doing something new, and when you do something new, people are going to question it."

Cases like the Ontario charges give the entire industry a bad name, said Strempler, who has a message on his Canadiandrugstore.com site noting it is different from The Canadian Drug Store Inc. cited by Ontario regulators.

"We're fulfilling a need" for American senior citizens who cannot afford the higher-priced medicine south of the border, he said. "There's nothing scandalous in this industry. You'll always have one or two bad apples. We really hope that doesn't ruin the reputation in this industry."

In the Ontario case, the College of Pharmacists filed 15 charges that accuse The Canadian Drug Store Inc. of operating an unaccredited Internet pharmacy without registered pharmacists from November 2001 to February 2002. It said the Toronto-based operation filled prescriptions written by U.S. doctors for U.S. patients.

Along with lacking a license, such an operation violated policies for physicians and pharmacists set by the Ontario College of Pharmacists and the Ontario College of Physicians and Surgeons.

The pharmacists college requires prescriptions written by Canadian doctors, while the physicians and surgeons college requires doctors to physically examine a patient before signing a prescription.

Spokeswoman Kathryn Clarke of the physicians and surgeons college said the policy adopted in November 2000 responded to the busloads of Americans that pull up to walk-in clinics to get prescriptions from Canadian doctors. Now the situation has evolved with the emergence of the Internet industry.

"It's increasing," Clarke said of Internet drug sales. "It's really a very complex issue that involves both countries and is only happening because the drug prices are different."

Drugs are often cheaper in Canada because the government funds the medical system and approves the price of all patented medicines.

The cheaper prices have long attracted Americans on prescription drug-buying sprees, especially in northern states that border Canada. Now it happens on the Internet, with Strempler's sites warning of delays in filling prescriptions due to high demand.
******************
Associated Press
Report on Foreigners, Social Security
Mon May 20, 6:23 AM ET


WASHINGTON (AP) - As many as one in 12 foreigners obtaining new Social Security (news - web sites) numbers illegally use fake documents to get the cards, a recently issued report says.


James Huse Jr., the inspector general of the Social Security Administration (news - web sites), said that a preliminary investigation found that about 8 percent, or more than 100,000 of the 1.2 million original Social Security numbers assigned to noncitizens in the year 2000, may have been obtained with invalid immigration documents.


Fake or illegally obtained Social Security numbers are often the first step in identity theft, obtaining loans or bank accounts illegally and other crimes.

Law enforcers also say the phony documents can be used to get credit cards or to help land jobs that require security clearance at airports and other sensitive locations.

Huse said that fake Social Security numbers can be gotten in many ways, including using false documents in applications to the SSA, stealing another person's number, using the number of someone who has died, or simply making up a number.

"As we have learned through the terrorist investigation, even a legally obtained SSN can be used to facilitate an unlawful act," he said in the report dated May 9.

Some of the hijackers involved in the Sept. 11 terrorist attacks had illegally obtained Social Security numbers and used them to get credit cards and open bank accounts.

In his report, Huse said the administration is looking at ways to better verify the information it receives from applicants, but because of problems of coordinating efforts with the Immigration and Naturalization Service a fix is still six months or more away.
*****************
New York Times
At I.B.M., a Tinier Transistor Outperforms Its Silicon Cousins
By BARNABY J. FEDER



.B.M. researchers have created carbon nanotube transistors that substantially outperform models of even advanced silicon devices without departing from the most common design of silicon chips.


The I.B.M. transistors also have a higher capacity for carrying electrical current a measure related to transistor speed than previously designs using nanotubes.

Nanotubes are tube-shaped molecules of carbon 50,000 times as thin as a human hair. Although commercial products are probably years away, the research provides the strongest indicator yet that carbon nanotubes could be feasible successors to today's silicon devices when developers reach the point where it is impossible to improve microchips by shrinking silicon designs further, according to Dr. Phaedon Avouris, manager of nanoscale science at I.B.M. Research in Yorktown Heights, N.Y.

The research results are being reported today in the Journal of Applied Physics Letters.

Compared with previous designs for nanotube transistors, the I.B.M. models use a more conventional arrangement of the various elements of the transistor, like insulators and the gate that switches current on or off, found in conventional silicon chips. Such arrangements are thought to be well suited to combining many transistors into logic circuits and low power consumption.

I.B.M. said that the nanotube transistors it built also carried two to four times as much current as comparable silicon devices. The devices are commonly called Mosfets (for metal-oxide semiconductor field-effect transistors).

Dr. Avouris said that the nanotube's performance relative to silicon should improve as more is learned about how to build nanotube structures. In addition, I.B.M. expects to achieve big gains in nanotube performance simply by shrinking their dimensions. Right now, several important elements are currently 10 times the size of their counterparts in the silicon models.

"There are some obvious ways of improving the nanotubes," said Dr. Avouris. For all the progress, he said it would be two to three more years before I.B.M. was ready to work on prototypes of future nanotube chips and as many as 10 years before they would be commercially available.

"I don't think we'll see a sharp transition from silicon to nanotubes," said Dr. Avouris. "We expect to move to hybrids first."
*****************
Government Computer News
Council seeks 32 e-gov fellows to learn about leadership


By Dipka Bhambhani
GCN Staff


The Council for Excellence in Government will choose 32 e-government fellows from among federal IT managers, up from 25 last year.


The chosen fellows will get together for two to three days every four weeks for a year beginning in September. They will debate topics such as information assurance, e-commerce, multimedia and information presentation, e-government, data integration, portals and accessibility technology. Chosen vendors and representatives of the National Science Foundation participate in the discussions. NSF assists the fellows in using learning modules and online services.

"We review applications with an eye to finding people who understand that learning about leadership isn't done in a classroom as much as it is by experience," said Martha Johnson, vice president of leadership and performance for the council, headquartered in Washington.

The nominations come from senior agency managers, who sponsor one or two names. The council accepts 90 percent of those sponsored, but "we turn down people who are clearly looking for a more structured, traditional program that allows them to check off a box next to a list of things they need to do to get promoted," Johnson said.

Applicants usually rank at the GS/GM-14 or -15 level or the equivalent in military, state or other systems. Selected fellows will have worked in various IT capacities, Johnson said. A fellow's agency pays $9,750 tuition and $3,000 in travel costs for the year.

The council has awarded general fellowships for many years, but the e-government fellows program is only in its second year.
********************
Associated Press
New Web File-Sharing System Launches
By ANICK JESDANUN, AP Internet Writer


NEW YORK (AP) - Ace Ha and Sammy Brazil of the emerging hip-hop group MaddWest don't mind listeners passing around their music for free over the Internet. All they want is a little control.


The Altnet file-sharing system launches Monday to give MaddWest and other artists a greater role in the otherwise free-for-all world of peer-to-peer networking.


Users could trade music, video and other files among themselves just as they do with KaZaA, LimeWire and others. But with Alnet, songs will be coded with digital rights management technology so artists can limit distribution, or even collect fees before a song will play.

Ha said MaddWest will still give music away for free. But he believes Altnet will take "the care and pains" to ensure available copies are "put up in a way we would find satisfactory."

Some analysts wonder if Internet users will tolerate the added hurdles that come with digital rights management. Users with no qualms about downloading illegal files can already find everything from Britney Spears songs to the latest "Star Wars" movie.

"There is clearly a demand for file swapping," said Matthew Berk, an analyst at Jupiter Media Metrix. "Whether or not if you lay on top of it a DRM system people will be keen on using it is another question."

Even so, Kevin Bermeister, president of the Brilliant Digital Entertainment company behind Altnet, believes people will chose legal file swapping, even for a fee, if it is available.

Beginning Monday, Altnet will distribute its search software with new versions of KaZaA. Once installed, when an Internet user does a search on KaZaA, the Altnet search tool will also check whether anything is available through Altnet.

If an item is available, the user would download the file directly from the content provider, such as a record label.

In July, Altnet will begin to ask KaZaA users to voluntarily lend their spare disk space, and install a second piece of software to run the Altnet sharing network. Music and other files from participating content providers will then be saved on the volunteer computers.

The system will allow listeners to get a requested file directly from volunteer computers. If unavailable there, the listener would got directly to the content provider.

Altnet is hoping to initially get about 20,000 volunteer computers. Computers will require a high-speed Internet connection, at least 400 Megahertz of processing power and five to 15 gigabytes of free disk space.

Participants will be rewarded based on how much their computers are used by listeners obtaining files. Bermeister said the heaviest contributors may get free hotel rooms, air fare and similar gifts. Occasional contributors may get movie tickets or discounts on merchandise.

Though Altnet will initially work only with KaZaA, the company is exploring partnerships with others.

Altnet is also developing a version for Linux (news - web sites) computers. There are no plans for Apple's Macintosh (news - web sites) computers.
********************
Seattle Times
A Web of dreams unrealized: High-speed Net access slow to catch fire
By Jim Landers
The Dallas Morning News


WASHINGTON Federal Communications Commissioner Kathleen Abernathy didn't think she needed a high-speed Internet connection.

"I'm doing messages at home. Why would I need to pay more for broadband?" she asked.

But Abernathy's 6-year-old daughter showed her otherwise. A homework assignment on American presidents, involving lots of color photos, pasting and posters, required interminable waits for dial-up Internet downloads.

Value, however, was an issue. With broadband connections costing $50 or $60 a month, Abernathy wasn't completely satisfied with the return for her investment.

"I should have gone to the library," she said.

She's not alone. More than 70 million homes are online, but only 15 percent have high-speed Internet access, according to estimates from CyberAtlas.

Much of the telecommunications industry argues the lack of broadband use is a result of regulations and other barriers that limit competition and supply.

But technology advisers in the Bush administration and in other parts of the industry are beginning to look for answers on the demand side.

The President's Council of Advisors on Science and Technology held its first meeting last month and made boosting broadband demand one of its four priorities.

Bruce Mehlman, the Commerce Department's assistant secretary for technology policy, said consumers and small businesses think broadband is too expensive.

"Many consumers fail to see the value proposition for investing in broadband, considering it a luxury or not yet worth the investment," he said.

He said his office is concentrating on helping small businesses understand how broadband could boost their productivity.

Need for 'killer application'

For most consumers, however, there is yet to be a "killer application" that would drive broadband adoption. The typical high-speed user is a telecommuter or a computer-games player. Movies-on-demand and other video applications are off to a slow start because the costs of video streaming increase with the number of viewers, and movie downloads introduce difficult copyright issues.

Promising uses of broadband in education, health care and video teleconferencing have not taken off.

Yet three-fourths of the companies offering high-speed Internet access raised prices last year as they struggled to recover some of the tens of billions of dollars invested to supply broadband.

Telephone companies offering DSL, or digital subscriber lines, increased prices an average of 10 percent. Cable-modem Internet providers raised prices 12 percent, and just last week, AT&T Broadband said it was raising cable-modem rates about 15 percent, to $45.95 a month, next month.

Broadband suppliers say prices will fall once broadband access becomes pervasive.

But the Information Technology Association of America (ITAA) released a report in October calling into question this basic premise.

"The assumption: Build it and they will come," the report concluded, using a line from "Field of Dreams," the baseball movie and novel. "This line of thinking has truly proven to be a field of dreams. In this scenario, unfortunately, Shoeless Joe becomes Clueless Joe and the fans stay away in droves."

More than 70 percent of U.S. households had access to broadband last year, and by 2005 the number will increase to 90 percent, the ITAA report found.

"If deployment were the only measure, broadband would be a significant success story," the report found.

Hearing the phone companies

Those arguments outrage officials at companies such as SBC Communications and Verizon Communications who are lobbying to improve the supply side of the broadband equation.

ITAA's biggest member is AT&T, which is heavily invested in cable-television networks that offer broadband access, which competes with regional phone companies.

SBC and Verizon want Congress to free them of an obligation to provide their Internet competitors access to their wires into the nation's homes and shops. Cable firms don't have to provide competitors access to their lines.

A bill freeing the regional phone companies to sell DSL service without competitive piggybacking passed the House in March but faces a struggle in the Senate.


Broadband is "fairly expensive," said Gary Shapiro, president of the Consumer Electronics Association. "But that's because there's not enough competition out there. You need a critical mass that will see prices drop.


"There's no question it's coming," he said. "The question is, are we going to help the companies and the industries that rely on them deploy broadband, or are we going to keep shackling those companies to their competitors?"

The Bush administration and the FCC are listening. Broadband requires attention on the supply and demand sides, Mehlman said.

Abernathy and her two fellow Republican commissioners agree. The commission lacks jurisdiction to work on the demand side for broadband, she said. But it needs to ensure that consumers aren't faced with a monopoly or even just two choices for broadband supply.

"One or two suppliers doesn't give me what I want from the market," she said. "I want three or four competitors. It's up to us to make sure the access is there. Then it's up to the companies to market it."

Harris Miller of the ITAA argues competition won't benefit if regional phone companies are given a monopoly on broadband wires leading into the home.

"There's just a fundamental schism between individuals who believe the solution is to give the monopolists more monopoly power, and those such as ITAA who feel that makes no sense."
******************
USA Today
Companies squander billions on tech


By Jim Hopkins and Michelle Kessler, USA TODAY

SAN FRANCISCO Productivity and economic growth soared in the 1990s as companies poured billions into technology to power everything from e-commerce to inventory management. Research now shows companies also waste billions on tech.

Morgan Stanley estimates that U.S. companies threw away $130 billion in the past two years on unneeded software and other technology, according to its study of 25 years of tech spending. Worldwide, companies waste as much as 20% of the $2.7 trillion spent annually on tech, estimates research firm Gartner, which is based in Stamford, Conn.

They do that because they stampede into the wrong technology, experts say. They buy too much and don't implement new tech properly. They also underestimate the time needed to make it work. And CEOs, especially during the go-go years, often spent too quickly without clear goals.

"People kind of viewed it as black magic, so why understand it?" says Charles Phillips, a tech analyst at Morgan Stanley.

It isn't just small companies that mess up. In recent years, big names such as Nike, Kmart, Gateway and Hershey Foods have lost millions on failed technology. More companies are likely feeling the pain.

Tech spending accounted for a record 4.7% of gross domestic product in 2000, at the height of the Internet boom. Now, tech spending has dropped to 4.2% of GDP.

The backlash has been enormous. As companies, burned by overspending, slash tech budgets to the bone, they deprive the economy of fuel needed to recover. Almost 80% of U.S. companies recently surveyed say they will spend less or the same on technology this year compared with an already weak 2001, research firm In-Stat/MDR says.

The spending spree ended when the tech bubble burst. But a host of bad tech investments had already been made, and continue to be made to some extent, because of:

Fast buying. Corporations, especially during the Internet gold rush of the late 1990s, pumped billions into e-commerce, Web sites and internal company networks. A new breed of executive superhero was born: the chief information officer, unleashed to hurl companies into the New Economy, in which tech-driven efficiencies reigned supreme.
CEOs wrote blank checks to tech departments without asking basic questions, Phillips says. During the boom, at least 85% of tech-buying decisions were made by tech managers with little input from bean counters, estimates Frank Britt, an IBM executive who frequently counsels companies on tech spending.


As a result, U.S. companies threw away more than $1 billion from 1998 to 2000 on Web-server software that did much more than their companies needed, Gartner says.

PC maker Gateway made a different e-commerce mistake. Last year, it wrote off $140 million from its failed effort to power an online store with software from NECX, an e-commerce company it fully purchased in 2000. NECX's software didn't work well with Gateway's existing system. The vision never took off. The remnants of Gateway's online store now run on different software.

Also a cause of panic buying: Y2K a potential computer glitch caused by the 2000 date change. In advance of the new year, experts said computers might falter. As a result, it was feared that electricity might stop flowing, bank ATMs could fail and jets would fall from the sky. Little happened except that corporations got stuck with big tech bills. "Y2K was the biggest boondoggle," CIO magazine publisher Gary Beach says.

Choppy deployment. Many companies think they can install new systems fast and reap immediate results touted by salespeople. But deployment of complex systems can take years and so can benefits, says software analyst Bob Austrian of Banc of America Securities.
Candymaker Hershey Foods provides an example. It finished installing three software packages in the summer of 1999, just as retailers placed orders for Halloween.


But the software, part of a $112 million system, proved incompatible with earlier programs. The results were disastrous. Chocolate Kisses and other treats piled up in warehouses because of missed or delayed deliveries. Hershey lost about $120 million in sales. That cut third-quarter profit almost 20%.

Kmart, to better compete with Wal-Mart, installed software to improve its distribution system in 1997. Last September, it abruptly scrapped $130 million of the technology. The retailer said it would rebuild its distribution system with new software it hoped would work better. It didn't. Five months later, Kmart staggered into bankruptcy protection.

Nike CEO Phil Knight learned about tech failings, too. His company installed software during the past five years to let retailers order direct from Nike. Glitches in the software led to some shoes being overstocked, while more popular ones were scarce contributing to a profit shortfall in 2000. The system was fixed, but not before Knight sniped, "This is what we get for our $400 million?"

Getting stuck paying for unneeded tech. Hardware and software makers have continually added features to products. That makes tech more complex and raises costs. Companies often pay tech consultants $5 in support fees for every $1 spent on software more than twice as much as they did years before, Phillips says.
But companies don't always need what they get. "They overbuy and get more features, more functions than they need," says analyst David Smith of Gartner.


Darlene Arden, a freelance writer in Framingham, Mass., grouses that tech companies leave her no choice. The $1,600 laptop she bought in January has a spreadsheet and games, none of which she needs. All she wants is a word processor, but she could not find one so equipped. "If they're going to charge me," she says, "I wish they'd ask me what I want."

Even tech consultants are frustrated. Minneapolis-based Caveo Technology, which advises companies on tech use in health care and other sectors, upgraded to Microsoft Office 2000 in the past year. The switch added more features, but CEO George McNulty isn't convinced it's making his 10-person staff more productive. He didn't see a choice.

"The market dictates it to you. If you want support from Microsoft, you have to upgrade," McNulty says.

Governments sometimes buy too much, too. California taxpayers might be stuck with a $41 million bill for Oracle database software that state officials agreed to buy last year. The 270,000 software licenses would outfit the entire state government far more than needed, the state's auditor now says. California Gov. Gray Davis is trying to cancel the contract, saying it is unnecessary.

A new dynamic

Experts say future corporate tech spending will be more focused on reaching specific goals such as a 1% increase in revenue. Also, companies will invest in smaller initiatives instead of companywide rollouts.

About 90% of companies planning tech investments in the second quarter are trained on improving customer service, InformationWeek found in a recent survey of 300 executives.

Ranking almost dead last: keeping up with the pace of change a factor many companies cited as a force behind the "me-too" buying binge of the late 1990s.

Software deals now average about $1 million vs. the $50 million buys more common in the late 1990s, Phillips estimates.

These changes reflect the new dynamic: Power has shifted to buyers, says Stephanie Stahl, editor of InformationWeek.

Companies also are cleaning up messes.

St. Louis chemical company Solutia had more than 1,500 computer systems after it was spun off from Monsanto five years ago. That's because each Monsanto division made its own tech-buying decisions. The resulting mishmash was confusing and costly, says Solutia CIO Johnnie Foster.

By this year, Solutia had slimmed to fewer than 300 systems, with help from consulting firm EDS. One piece of software from SAP replaced dozens of others.

The trims let Solutia cut its tech budget by 4% since 1997.

Last summer, Pioneer Investments of Medford, Mass., saved $200,000 a year by renegotiating licenses with Microsoft and other software makers. Before using one reseller Corporate Software Pioneer had different offices make their own deals, thereby missing out on bulk discounts. The company also kept poor track of software and paid for copies that they didn't use. "In the past, we didn't have as much discipline," CIO Carl Underhill says.

Underhill also cut $240,000 from the budget by reducing the number of telephone and Internet service contracts to three from 15.

Tough customers

Tech suppliers, trying to boost sales, will have an especially hard time selling to small enterprises. In a weakened economy, many small firms will resume spending more slowly than will big corporations.

Many small businesses were already slow to embrace technology. About 37% of small U.S. companies as many as 2 million don't have computers at all, says the National Federation of Independent Business trade group.

Arden, the freelance writer, has two computers and a combination fax-answering machine. She didn't get a cell phone until September, when she wanted to feel safer while traveling alone. "I was thrilled not to have one. I think we're overwhelmed by too much technology," she says.

Even so, reflecting the unease of many buyers, Arden is wary of personal digital assistants and other newfangled technologies.

"One short-circuit, and you've lost all your information," she says of tech. "Do I love it? Yes. Do I totally trust it? No."
********************
Washington Post
May 17, 2002
Lawmakers Play Up 'Dot-Kids' Proposals
By David McGuire


The push to create a kids-only Internet domain is gaining ground in Congress, with House lawmakers scheduled to vote next week on a proposal and a leading Democratic senator planning to introduce a similar measure.

Sen. Byron Dorgan (D-N.D.), a member of the Democratic leadership team, has discussed introducing a companion to the House's "Dot-Kids Implementation and Efficiency Act of 2002" with Nevada Republican Sen. John Ensign, said Dorgan spokesman Barry Piatt.

The House bill, which sailed through the Energy and Commerce Committee and was backed by a bipartisan cadre of lawmakers, would create a child-oriented addressing space within America's sovereign "dot-us" Internet domain.

Authored by Rep. John Shimkus (R-Ill.), the House bill represents a step back from an earlier proposal that called for the creation of a stand-alone "dot-kids" suffix to be included alongside dot-com, dot-net and dot-org in the Internet's Domain Name System (DNS).

The U.S. Commerce Department and the Internet Corporation for Assigned Names and Numbers (ICANN) - the entities that share responsibility for the DNS - balked at that proposal, prompting the proposed compromise.

Because of the Internet's hierarchical nature, any domain name owner can create a virtually infinite number of "second-level" domains within a single Internet address. If the U.S. government reserves rights to the address "kids.us," it could assign second-level addresses using the top-level address as a domain (for example, address.kids.us).

Under the Shimkus proposal, Washington D.C.-based NeuStar, which last year won the government contract to operate the dot-us country-code domain, would be responsible for operating the dot-kids second-level domain within dot-us.

Under the pending House language, no Web site with a kids.us address would be permitted to post hyperlinks to locations outside of the kids.us domain. The legislation also now prohibits chat and instant messaging features, except in cases where a site operator can guarantee the features adhere to kid-friendly standards developed for the domain.
********************
USA Today
Senate Panel OKs More Cybercrime Dollars



By Brian Krebs Washtech.com Staff Writer Friday, May 17, 2002; 5:16 PM


The Senate Commerce Committee today voted to increase funding for anti-cybercrime programs, despite claims from software and high-tech groups that last-minute changes to the bill could stifle innovation.


The "Cyber Security Research and Development Act," sponsored by Sen. Ron Wyden (D-Ore.), would give $970 million over five years to the National Science Foundation and National Institute of Standards and Technology to improve government computer and network security.

The technology industry supports the bill, but many businesses dislike changes made by co-sponsor Sen. John Edwards (D-N.C.) that direct NIST to set guidelines for security settings on many common software products used by the federal government.

They argue that such language would put Uncle Sam in the role of setting standards for computer security technologies, and would gut the public-sector market for new security products.

"The establishment of such technological standards would create a ceiling, rather than a floor, for federal government cybersecurity," said Robert Holleyman, president and CEO of the Business Software Alliance.

The Information Technology Association of America also spoke against the changes.

Edwards spokesman Michael Briggs said the language makes no mandate on the private sector.

"The idea was that if enough government agencies had to adopt these practices they would filter down to the private sector once the virtue of these practices is demonstrated," Briggs said.

At today's markup, Wyden promised to work with Sen. George Allen (R-Va.) and other lawmakers sympathetic to the tech community's concerns.

The cybersecurity bill mirrors a similar measure passed in the House of Representatives earlier this year.

The committee also passed another Wyden bill that calls for volunteers from the high-tech community to respond - on the government's behalf - to attacks and other disasters that threaten the nation's technological infrastructure.

The legislation would establish a clearinghouse for evaluating private sector technology proposals designed to combat terrorism.

The version approved by the panel today incorporates several changes sought by the Bush administration, including language that would allow the White House to decide which agency should run the clearinghouse.

The committee also approved a bill that would grant new life to the Commerce Department's Technology Opportunities Program, designed to bring advanced telecommunications and other technologies to rural and poor regions of the country.

The administration's 2003 budget request kills the program.
*******************
USA Today
Senate Panel Votes To Can Spam


Brian Krebs Washtech.com Staff Writer Friday, May 17, 2002; 3:07 PM


Consumers would gain more power to keep junk e-mail out of their inboxes under legislation approved by a Senate committee today.


The bill, passed by the Senate Commerce Committee, requires that unsolicited e-mails, also known as "spam," contain valid return addresses that recipients can use to opt out of receiving more unwanted e-mail.

The "CAN SPAM" act, sponsored by Sens. Conrad Burns (R-Mont.), Ron Wyden (D-Ore.) and Ted Stevens, (R-Alaska), would impose fines and jail terms against spammers who fake their e-mail or physical addresses.

The legislation also would allow state attorneys general to sue on behalf of residents who are continually besieged by unwanted spam. Spammers who willfully violate the provisions of the law could be fined as much as $1.5 million.

"My bill strangles out spam e-mail by imposing steep fines and empowering consumers with the choice to close their doors to hyper-marketing once and for all," Burns said in a statement.

Under pressure from business and financial services groups concerned that the bill would outlaw legitimate communications between companies and their customers, Burns included provisions that would exempt companies that show they have a "preexisting relationship" with the recipient.

A preexisting relationship would constitute any transaction or electronic correspondence initiated by the consumer within the past three years.

The committee also approved an amendment from Sen. Barbara Boxer (D-Calif.) that would make it illegal to send spam to an e-mail address that was harvested from another Web site.

That provision was included at the behest of Ebay, which is frequently targeted by e-mail harvesters because it posts bidders' e-mail addresses on its live auction pages, source said.

Rep. Bob Goodlatte (R-Va.) has offered a more industry-friendly bill in the House of Representatives, which would make it illegal for spammers to "spoof" or fake their return e-mail addresses.

The Senate Commerce Committee also approved a controversial privacy bill that would allow consumers to sue Internet companies that mishandle their personal information.

Despite staunch opposition from Republicans and business groups, the committee approved the measure on Thursday by a vote of 15-8. But Senate lawmakers were prevented from voting to send the bill on to the Senate floor yesterday after Senate Minority Leader Trent Lott (R-Miss.) invoked a procedural move to halt committee action.

The privacy bill, offered by committee Chairman Ernest "Fritz" Hollings (D-S.C.), would require companies ask consumers' permission before collecting or sharing sensitive information such as medical records, financial data or religious affiliation.

The legislation also would preempt state privacy laws and allow consumers to sue companies that mishandle their personal data.
******************
Los Angeles Times
Minnesota Governor Weighs Internet Controls
Associated Press


May 20 2002

Minnesota's Senate and House overwhelmingly approved a bill that backers say would make the state the first to give Internet users control over whether service providers disclose their personal information.

Gov. Jesse Ventura will decide its fate. He has not indicated a position on the bill.

Under the bill, ISPs would have to tell Minnesota consumers whenever they plan to disclose such personal information about them as which Web sites they've visited, their e-mail or home addresses or telephone numbers. They also would have to say how the information would be used. The bill would allow consumers to sue businesses that violate the law, with exceptions for giving information to law enforcement.

Lobbyists from America Online and other Internet giants fought the bill, saying state-by-state regulation of the Internet is unwieldy. The bill wouldn't take effect until March 2003, and any federal law would supersede it.
*******************
Federal Computer Week
Law beefs up security at borders


President Bush signed a border security bill May 14 that requires foreign visitors to carry high-tech visas and passports, mandates computer tracking of visiting students and improves access to electronic databases in U.S. consular offices overseas.

The Enhanced Border Security and Visa Entry Reform Act would make $150 million each available to the Immigration and Naturalization Service and Customs Service to improve technology for protecting U.S. borders.

"We can do a better job of making our borders more secure, and make our borders smart," Bush said. "We must use technology and be wise about how we use technology, to speed the flow of commerce across our borders and to identify frequent travelers who pose no risk."

The bill passed without controversy in both the Senate and the House. Lawmakers pushed it as a way to improve national security and fight terrorism. Its provisions include machine-readable visas, a sophisticated name-matching system to identify and bar possible terrorists and the hiring of 2,000 additional immigration and customs officers (see box).

Sen. Dianne Feinstein (D-Calif.), one of the bill's sponsors, said the Sept. 11 terrorist attacks made clear some of the shortcomings of the U.S. immigration and visa system. "This bill is an important and strong first step toward fixing that system," she said.

The law should help make the U.S. immigration system less vulnerable to exploitation "by aliens who wish to harm Americans," said Rep. F. James Sensenbrenner Jr. (R-Wis.), the chief House sponsor.

Even though congressional appropriators haven't weighed in on the programs authorized by the border security bill, funding for them appears likely.

"Congress seems to want to throw more money at security, so I would expect there will be money available for this and other projects," said Bruce McConnell, a former top official with the Office of Management and Budget and president of McConnell International LLC, a marketing and consulting firm.

Olga Grkavac, executive vice president of the Enterprise Solutions Division at the Information Technology Association of America, said federal money was getting tight, but there was so much congressional support for the legislation that she didn't expect funding problems.

"They are going to find the money," Grkavac said. "Whether or not it's the full amount, it will be close to it. When Congress decides to do something, it's remarkable how quickly they can act."

Although funding isn't likely to be a problem, INS' organizational difficulties could delay the implementation of all but one of the border security programs, industry observers say. The House voted April 25 to split INS into two agencies, although one key technology project also envisioned by the border security bill a system for tracking foreign students is so close to start-up that it is likely to proceed unaffected.

"INS and Customs each were authorized $150 million to upgrade the technology at their inspection facilities, but INS has no clue on how to do that. They need to re-organize first," said Doug Doan, senior vice president of New Technology Management Inc., which is designing and installing several IT systems for Customs along both the Canadian and Mexican borders.

"INS has much bigger issues than how to spend $150 million," McConnell said. "Things there are in somewhat of a holding pattern, so I wouldn't expect the money to be spent right away."

***

Tightening the borders

The Enhanced Border Security and Visa Entry Reform Act would make $150 million each available to the Immigration and Naturalization Service and the Customs Service.

Among the bill's provisions are:

* Requiring that, by 2004, the State Department issue only tamper- resistant visas and other travel documents with machine-readable biometric identifiers. To read the documents, INS will have to install special scanners able to read the documents.

* Supplying electronic data systems to State consular offices that provide instant access to databases of U.S. law enforcement and intelligence agencies. This would be used to block visas from being issued to known and suspected terrorists.

* Creation of a foreign student-tracking system by INS, which announced this month that it would begin operating a Student Exchange and Visitor Information System July 1. This will enable universities and other schools to file electronic reports to INS about student arrivals, changes of address, courses of study and other information. Schools would also be required to notify the government if a foreign student fails to report for classes.

* Requiring all commercial passenger ships and airplanes entering the United States to provide a list of passengers and crew before arrival. This way, border authorities can check their databases to determine if a potential terrorist or other suspect is on board. The bill also provides for the hiring of 2,000 additional immigration inspectors and investigators.
********************
Federal Computer News
Homeland strategy won't meet all concerns


A long-awaited strategy outlining how the Office of Homeland Security expects to use information technology to help secure the nation from terrorist attacks most likely will not address all the concerns of federal agencies and state and local governments, a senior administration official said earlier this month.

The Homeland Security Office's national strategy, due to President Bush in June, should be considered an enterprise architecture for homeland security, which meets the priorities set out in Bush's fiscal 2003 budget request, said the official, who agreed to speak on the condition of anonymity. Those priorities include a description of the current homeland security status, the goal of where the government needs to be and the migration strategy, or "road map," to get there.

In the budget, the administration set four homeland security goals tightening border security, supporting first responders, fighting bioterrorism and using information technology as an enabler. However, many in Congress and elsewhere have criticized the White House for not releasing a strategy along with the budget.

The outline in the budget for the strategy itself set several far-reaching goals (see box below). But the official said because of the short time frame in which the office had to craft the plan, the strategy will be a first version, open to revisions. The first release "serves a slightly different purpose than we'd like it to serve," the official said. "It's not going to satisfy all of the requests for participation at this time."

That is exactly what state and local IT officials have feared, even though they understand the deadline pressures under which the office is working, said Robert Greeves, policy adviser for the Justice Department's Office of Justice Programs, which assists state and local law enforcement agencies.

Those agencies are also concerned that most of the funding requested for the Federal Emergency Management Agency to increase first responders' capabilities is not focused on cyber needs, such as information sharing and communications interoperability, Greeves said.

Integrating all of the stand-alone systems at each level of government, or at least making it possible to access the information within those systems, is a top priority for state and local officials one they are concerned will not be part of this version of the strategy, said Dan Jarvis, chief information officer for Denver.

***

Homeland security goals

Some of the goals set for the homeland security national strategy in the fiscal 2003 budget include:

* Focusing on the long term and not seeking to achieve all goals at once but introducing needed reforms and innovations in stages, according to their importance.

* Making a national plan, not just a federal government strategy, and basing it on the principle of partnership with state and local governments, the private sector and citizens.

* Encompassing the full range of homeland security activities and setting priorities among them.

* Taking into account the existing government institutions and systems for providing homeland security, building those that work well and are sensibly organized, but also planning to improve or reorganize when necessary.
*****************
New York Times
Senate Panel Backs Computer Security Boost
By REUTERS


WASHINGTON (Reuters) - Legislation that would vastly increase federal spending on computer security in the wake of the Sept. 11 attacks on the U.S. came closer to becoming law on Friday when a key Senate committee approved it.

The bill, sponsored by Sen. Ron Wyden, an Oregon Democrat, and Sen. George Allen, a Virginia Republican, would authorize $875 million in grant funds for research and education to deal with potential threats to technology.

The measure, approved on a voice vote of the Senate Commerce Committee, is expected to win easy passage in the full Senate. Similar legislation passed the U.S. House of Representatives overwhelmingly in February.

The hijack attacks of Sept. 11 heightened concerns about the vulnerability of the nation's telecommunications, Internet and other vital networks to computer-based attack.

In several hearings last fall, experts told Congress the nation needed to spend more money to encourage long-term academic research in cybersecurity to supplement efforts by commercial software companies.

The new funds would come on top of roughly $60 million the federal government currently devotes to network security.

Business groups have praised the measure, noting that cybersecurity attacks have increased dramatically in the past several years.

The National Science Foundation and the National Institute for Standards and Technology would hand out the money in the form of research grants, fellowships and internships for students, and funds to improve undergraduate and master's degree programs in network security.

The committee also approved and sent to the floor another bill co-sponsored by Wyden and Allen to provide an organizational structure to quickly locate and mobilize science and technology expertise in times of crisis. It does not yet have a House companion.
*************************
Federal Computer Week
Looking into disk mirroring
Feds weigh options for data protection


It's a classic double whammy. Not only do information technology managers oversee more data than ever before, they also face more threats to this data than ever before. Fires and natural disasters such as floods have long been data center worries. Now add to this list post-Sept. 11 terrorism concerns and the specter of both physical and electronic attacks.

The situation has compelled government agencies to revisit their data protection plans. The time-tested practice of tape-based backup is among the items under evaluation. For many organizations, tape is the main insurance policy against data loss, but restoring data from tape can be time-consuming. Tapes must be retrieved from the backup facility and the data then loaded on disk arrays at the production site, a process that can take days.

This lengthy process has prompted some data center managers to examine an alternative method: disk mirroring. With disk mirroring, an organization continuously replicates selected data from one disk array to another. Replication can be local, within a data center, or remote, to a distant data center.

The key advantage of disk mirroring is speed. Recovery may take just a few minutes, particularly if the system is set to automatically connect to the backup system. Timeliness of data is another plus. Disk mirroring provides a more up-to-date copy of data than tape backup does. Data stored on tape is only as current as the latest backup session, and sessions are typically scheduled 12 or more hours apart.

But disk mirroring, which has been around for years, is no miracle data-protection cure. One drawback is the cost. The price per megabyte of storage is still cheaper for tape than disk, although the gap is narrowing. Disk mirroring may also involve higher network infrastructure costs, because high-bandwidth links may be required between backup and production sites.

Organizations considering disk mirroring must also weigh the different deployment approaches, each of which has its pros and cons.

Still, the attraction of increased data availability has prompted many commercial entities in areas such as financial services to adopt disk mirroring. More federal agencies are also beginning to investigate the approach.

"We're seeing a lot of interest," said Robert Manchise, chief technology officer at Anteon Corp., a Fairfax, Va., government integrator. Government agencies "are following the commercial marketplace."

For example, the Federal Emergency Management Agency knows "the importance of having synchronized data, [in] real time and up to the minute," he said.

Mirroring Issues

Cost tends to be the first issue organizations confront when considering mirroring. Managers who want to mirror to the same brand and model of storage subsystem used in the production facility will pay a price for this duplication. The cost, however, can be reduced if an organization opts for heterogeneous mirroring using less expensive disk arrays at the backup site (see "SANs take on mirroring," Page 34).

Network investment is another factor. Today, mirroring generally requires a separate network infrastructure, distinct from IP traffic. Typically, this means employing Fibre Channel technology. An organization could use Dense Wavelength Division Multiplexing a technology that transmits light signals simultaneously via a single optical fiber to merge data mirroring and voice traffic over IP, but experts say this is an expensive choice.

IP-based storage solutions are beginning to surface, however. In addition, the emerging SCSI over IP, or iSCSI, promises to enable organizations to run storage traffic on existing IP networks (see "iSCSI may cut mirroring costs," Page 33).

Given the expense, technology managers tend to use disk mirroring only for mission-critical datasets.

Mirroring "gets expensive if you have a lot of data," said Bill Swartz, manager of infrastructure computing services at Sandia National Laboratories in Albuquerque, N.M. Accordingly, mirroring is done sparingly in high-performance computing environments, he said.

Michelle Butler, technical program manager for the storage-enabling technologies group at the National Center for Supercomputing Applications, said the center is not mirroring all of its data.

"We are mirroring critical system- dependent file systems," she said. "We are not opposed to tape and still use it. But for disaster recovery, disk is much faster."

Paths to Mirroring

Once a decision is made on which data to mirror, the next step is to determine what mirroring approach to take. The two main paths are synchronous and asynchronous.

In synchronous mirroring, data isn't committed to storage in the production facility until a copy of that data is delivered to the target storage subsystem, which is the mirrored site. When the data is successfully mirrored, the target subsystem acknowledges the receipt to the production facility, which then completes the storage transaction.

This way, if the input/output request fails on the target side, it is not recorded on the production side. Both sides of the storage equation are kept in balance, up to the last completed transaction.

The main drawback of synchronous mirroring is latency. Data has to travel from primary to target storage and back again. The delay may cause applications to time out. Latency is not an issue if the primary and target storage sites are nearby. But to guard against site failure, an organization may locate a backup site miles from its production facility. Storage experts say that if the distance is more than 62 miles, latency will affect application performance.

Asynchronous mirroring, however, may be the solution for mirroring data over great distances. In this approach, the local storage device does not wait for acknowledgment from the remote system before storing data, thus overcoming the latency problem.

But there is a downside. Data inconsistency may occur in the event of a failure, because the asynchronous approach does not wait for the remote storage device to confirm the receipt of data.

"A small number of input/outputs can be lost," said John Selep, product marketing manager for storage solutions at Hewlett-Packard Co. But asynchronous mirroring, he continued, "allows those willing to lose a small number of input/outputs to do continental-level mirroring."

Jay Desai, manager of data protection solutions at Network Appliance Inc., which produces SnapMirror software, said asynchronous mirroring works well except for those applications requiring "100 percent data concurrency."

"Not everyone needs synchronous," mirroring, said Bob Guilbert, vice president of marketing and business development at NSI Software, which markets DoubleTake, a mirroring product.

Still, federal customers and integrators say that the synchronous mirroring approach is the way to go for an agency's most important data. "We see synchronous being more important...for mission-critical" data, said Anteon's Manchise.

"Asynchronous mirroring isn't real-time enough for most enterprise applications and loses transactions during failover," said Dave Puzycki, a senior research scientist with Pacific Northwest National Laboratory's IT infrastructure group. The lab is deploying storage-area network (SAN) architecture and looking into disk mirroring. But it is doing so with deliberation.

"One disadvantage of using disk mirroring is that database corruption can also be mirrored, reducing the possibility of error-free database recovery," Puzycki said.

To compensate, the lab is exploring SAN software technology that can take snapshots, or copies, of a database. "Snapshots can be instantly created and take [up] little space, therefore making it much easier to fall back to a known good state," Puzycki said.

The intricacies of disk mirroring call for cautious steps. But for agencies with sensitive data to protect, mirroring may be worth looking into.

Moore is a freelance writer based in Chantilly, Va.
********************
Federal Computer Week
iSCSI may cut mirroring costs

Disk mirroring could become cheaper.

The emerging SCSI over IP, or iSCSI, is a promising solution for running storage traffic over ubiquitous IP networks. This could reduce the network infrastructure cost of data mirroring, which now tends to involve dedicated network resources. With iSCSI, organizations don't need "a separate communications infrastructure for disk mirroring," said John Selep, product marketing manager for storage solutions at Hewlett-Packard Co.

"We're waiting for the standard to get completed so multiple vendors will have something to sink their teeth into," said Ken Steinhardt, director of technology analysis at EMC Corp.

Robert Manchise, chief technology officer at Anteon Corp., said that he hoped iSCSI would lower the cost of ownership. But he has not introduced the technology to any customers yet, because a definitive standard is still lacking. Most observers believe the iSCSI standard and supporting technology is still months away.
*******************
BBC
Parenting suffers in e-mail overload


Employees in the UK spend more time wading through their messages than playing with their children, according to a government study.

The report by the Department of Trade and Industry found that workers take an average of 49 minutes a day to sort out their inboxes.

By comparison, working parents play with their children for just 25 minutes a day.

Messaging stress

Keeping up with office e-mails can not only be a logistical nightmare, it is also seen as one of the worst causes of stress in the workplace.



Everybody can benefit from a better work-life balance

DTI spokesman
And the messages also contribute to what are thought to be the top two causes of stress at work: constant interruptions and deadline pressures.


According to the DTI, sick days as a result of stress cost business £7.11m a week.



Click here to tell us how you cope with a bursting inbox


With many employees suffering from e-mail overload, some companies are now sending executives on courses to teach them how to communicate more effectively through e-mail without adding to the already bursting inboxes of their staff.


Short lunches

The DTI study confirms that Britons are among the hardest workers in Europe.

It found that the average employee skips 24 minutes of their lunch break every day and only takes the equivalent of approximately two weeks holiday per year.

The DTI research was released to mark the relaunch of its work-life balance website, which offers advice on how to juggle the competing demands of job and home.

A DTI spokesman said: "Everybody can benefit from a better work-life balance.

"More flexible working boosts staff morale, improves employees' commitment to their work, and benefits business through higher productivity."


Do you spend more time on office e-mails than with your children? How do you cope with a bulging inbox? Tell us what you think.



Simple answer, I don't manage to deal with it! I even have clients overseas who are e-mailing me whilst I am asleep. So when I come in I already have a full inbox. I organise mine by putting my e-mails in the alphabetical order of the senders. By the time I am down to reading S you can bet I will have several new e-mails which have shuffled in above this. It's like painting the Golden Gate bridge by the time you're finished you have to start again. Irritating thing is, most of them are either advertising, junk mail or work queries which don't even apply to me.
Bex, UK


E-mail's only stressful if you read it. I work on many projects at once. Each e-mail that is project-related has the project code in the header. I have a folder for each job number that I'm working on, as well as folders for general admin, personal, humour etc. When I'm very busy, e-mails just get dragged unread to the appropriate folder. Then at some point during the day I will make time to read all e-mails related to each subject. This method also ensures that I'm only thinking about the one job at a time. I would recommend this approach to anyone who is stressed out by e-mail, although this does require your company to have e-mail protocol which includes useful subject headers.
Alison A, UK


I cope by deleting any e-mail that I have finished with or that has no relevance. That said, the sooner society makes e-mail advertising (spam) illegal, the better. Once my inbox gets over 50 e-mails, I make time to narrow it down. Not having too many e-mails in there makes you feel less stressed. Move e-mails you need to keep into another folder and keep your inbox tidy. Works for me.
Boomer, UK


By using a facility like Outlook to manage your e-mail you can make specific folders and have all items that you are a cc party auto deliver to a separate folder, same with all your mates stuff, which you can read at your leisure. This will leave just items work orientated and sent directly to you to deal with.
Chris, Suffolk


Delete the lot and go to the pub.
Fred Ashley, UK


I basically scan through the sender and subject information, if I don't recognise either then I delete it without thinking. I just don't have the time to read all the spam offering me low rate mortgages or Viagra online!
Seth Black, UK



Juggling home and work commitments can be trying at the best of times but I all too often only see my children first thing in the morning as they are in bed by the time I get home. Fortunately my husband and I have good nursery and after-school facilities available to us. It is a sad indictment of modern living that children are often only able to see their children for little more than an hour a day.
Sian, UK



What did we do before e-mails, SMS messages, faxes and mobiles? I remember - life was a lot darn easier and less hetic.
David LJ, Isle of Man UK



I receive approximately two to three hundred e-mails a day. I cannot expect to read every one I receive, so I will read what I can when I have the time to do so, the rest I will never read. Any urgent matter should be dealt with in the traditional method - the telephone! Junk and unwanted e-mails are a pain, but you should configure your e-mail application to automatically remove these.
James Sanders, UK



Whenever I am sent an e-mail with a question from a colleague who works in the same office, I always give them the courtesy of a reply in person. I find that we not only build up a better rapport but it saves the hassle of three to four follow-up e-mails to 'clarify the point'. It also helps with the exercise regime.
Rob, UK



Smart companies have e-mail etiquette! This reduces the number of e-mails from colleagues who misguidedly feel you are interested in their updates, supports use of meaningful subject headers and teaches everyone how to communicate concisely! Lobby your IT team today
Max, N Ireland



I only read e-mail twice a day. Once at the start of the day, once at the end. Anything else more urgent can be dealt with in person or by phone. I also get to schedule work better rather than do what is most recent.
Tim, Cambridge


Employees in the UK spend more time wading through their messages than playing with their children, according to a government study.
The report by the Department of Trade and Industry found that workers take an average of 49 minutes a day to sort out their inboxes.
By comparison, working parents play with their children for just 25 minutes a day.
Messaging stress
Keeping up with office e-mails can not only be a logistical nightmare, it is also seen as one of the worst causes of stress in the workplace.
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 can benefit from a better work-life balance 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!
520125
5 55555211163555555540143555552111112555555210111233321111111423324110111111111111111111111110040000002701ffff030000000000
DTI spokesman
And the messages also contribute to what are thought to be the top two causes of stress at work: constant interruptions and deadline pressures.
According to the DTI, sick days as a result of stress cost business £7.11m a week.
Click here to tell us how you cope with a bursting inbox
With many employees suffering from e-mail overload, some companies are now sending executives on courses to teach them how to communicate more effectively through e-mail without adding to the already bursting inboxes of their staff.
Short lunches
The DTI study confirms that Britons are among the hardest workers in Europe.
It found that the average employee skips 24 minutes of their lunch break every day and only takes the equivalent of approximately two weeks holiday per year.
The DTI research was released to mark the relaunch of its work-life balance website, which offers advice on how to juggle the competing demands of job and home.
A DTI spokesman said: "Everybody can benefit from a better work-life balance.
"More flexible working boosts staff morale, improves employees' commitment to their work, and benefits business through higher productivity."
010009000003025b00000000e15a000000000400000003010800050000000b0200000000050000000c021b00ac00030000001e00e15a0000410b2000cc0030004201000000001a00ab0000000000280000004201000030000000010018000000000080b5000000000000000000000000000000000000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7e7e7e7dededed6d6d6d6d6d6d6d6d6dededeefefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7ffffffffffffffffffffffffffffffffffffefefefd6d6d6cececebdbdbdadadad9c9c9c9494949494949494949494948c8c8c9c9c9cc6c6c6e7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7d6d6d6bdbdbdadadad9c9c9c9c9c9ca5a5a5adadadb5b5b5bdbdbdb5b5b5adadad9c9c9c9c9c9cb5b5b5c6c6c6dededefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7d6d6d6b5b5b59c9c9c9c9c9cadadadbdbdbdd6d6d6efefefffffffefefefd6d6d6bdbdbdbdbdbdc6c6c6dededeefefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7ffffffffffffffffffe7e7e7d6d6d6b5b5b5a5a5a5a5a5a5bdbdbdcececee7e7e7fffffffffffffffffff7f7f7bdbdbdbdbdbdc6c6c6dededeefefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7d6d6d6bdbdbdadadadc6c6c6d6d6d6ffffffffffffffffffffffffffffffefefefd6d6d6b5b5b5d6d6d6dededef7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdededeadadadb5b5b5d6d6d6f7f7f7ffffffffffffffffffffffffffffffffffffe7e7e7c6c6c6bdbdbdd6d6d6f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffbdbdbdbdbdbdd6d6d6ffffffffffffffffffffffffffffffffffffffffffffffffd6d6d6bdbdbdc6c6c6f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7f7f7f7f7f7f7fffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd6d6d6adadaddededef7f7f7f!
ffffff
f ffffffffffffffffffffffffffffffffffffffffd6d6d6b5b5b5dededefffffffffffffffffffffffff7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefefefefefefc6c6c6cececec6c6c6cecececececef7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7f7f7f7dededecececec6c6c6cececececececececee7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefefefc6c6c6c6c6c6dededef7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffd6d6d6c6c6c6ded!
edefff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7ffffffffffffffffffffffffffffffffffffffffffe7e7e7dededebdbdbd9c9c9ca5a5a59c9c9c9c9c9cbdbdbdd6d6d6fffffff7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdededebdbdbda5a5a5adadad9c9c9ca5a5a5bdbdbdd6d6d6efefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7efefefdedededededec6c6c6b5b5b5adadadbdbdbde7e7e7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffbdbdbdadadadf7f7f7fffffffffffffffffffffffffffffffffffff7f7f7fffffffffff!
ffffff
f fffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffff7f7f7f7f7f7f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffff7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff9c9c9c181818292929101010212121101010393939949494bdbdbddededef7f7f7fffffffffffffffffffffffff7f7f7fffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffff7f7f7fffffffffffffffffffffffff7f7f7fffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffff7f7f7f7f7f7f7f7f7fffffffffffffffffffffffffffffff7f7f7ffffffefefeff7f7f7fffffffffffff7f7f7ffffffffffffffffff848484292929181818101010181818101010292929949494adadade7e7e7f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7efefefcececeb5b5b5a5a5a59494949c9c9c9c9c9c949494bdbdbdf7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd6d6d6949494949494adadadbdbdbdcececeefefefffffffffffffffffffe7e7e7e7e7e7e7e7e7e7e7e7e7e7e7efefeff7f7f7efefefefefefe7e7e7e7e7e7efefeff!
7f7f7e
7 e7e7e7e7e7d6d6d6d6d6d6dededeefefefe7e7e7e7e7e7e7e7e7efefefefefefffffffffffffffffffefefefe7e7e7e7e7e7e7e7e7dededef7f7f7fffffffffffffffffff7f7f7e7e7e7e7e7e7dedededededed6d6d6dededed6d6d6dededee7e7e7efefeff7f7f7f7f7f7ffffffffffffffffffffffff7b7b7b1818187373738484846363632121210000007b7b7ba5a5a5dededef7f7f7fffffffffffff7f7f7e7e7e7e7e7e7dedededededed6d6d6dedededededee7e7e7efefeffffffff7f7f7efefefe7e7e7e7e7e7dededededededededee7e7e7efefefe7e7e7efefefefefefe7e7e7e7e7e7dededee7e7e7efefefefefeff7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffefefefe7e7e7e7e7e7dedededededededededededededededededee7e7e7f7f7f7efefefdedededededee7e7e7d6d6d6dededededededededee7e7e7efefefefefef7b7b7b101010737373737373737373212121000000737373a5a5a5d6d6d6f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffff7f7f7fffffffffffffffffffffffff7f7f7cececeadadad9c9c9ca5a5a5b5b5b5c6c6c6dededee7e7e7e7e7e7f7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc6c6c6b5b5b59c9c9c9494948484848c8c8c9c9c9cadadadbdbdbdd6d6d6d6d6d6c6c6c6bdbdbdbdbdbdbdbdbdc6c6c6bdbdbdc6c6c6bdbdbdbdbdbdadadadbdbdbdbdbdbdbdbdbdadadadadadadadadadadadadb5b5b5b5b5b5b5b5b5ada!
dadb5b
5 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!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7b5b5b5adadadb5b5b5c6c6c6e7e7e7f7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefefefd6d6d6c6c6c6adadad9494948c8c8c9c9c9c6363637373735252526363636b6b6b8c8c8c7b7b7b7b7b7b7373736363636b6b6b7373737b7b7b5a5a5a3939394a4a4a3939394242425252525a5a5a5a5a5a636363737373636363b5b5b5dededeadadad8484846b6b6b6b6b6b7373736b6b6!
b73737
3 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!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7bdbdbdadadadcececedededef7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefefefcececececece949494000000101010000000080808000000313131212121000000080808000000000000000000181818000000000000313131292929101010000000000000181818080808000000181818a5a5a59c9c9c212121000000080808000000080808080808000000636363b5b5b59c9c9c5a5a5a0808080000000000001818182!
929292
9 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!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffeff7efcececeadadadc6c6c6efefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7dedede181818bdbdbde7e7e7c6c6c6292929393939101010636363cececededede8c8c8c080808000000424242bdbdbde7e7e7ffffffcecece7373738c8c8cdededec6c6c65a5a5a101010a5a5a57b7b7b000000525252cececed6d6d6cecece6363630808085252528c8c8c4a4a4a000000181818737373cececee7e7e7fffffff7f7f7efefefc6c6c66b6b6b101010525252a5adaddee7e7e7f!
7f7fff
f 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!
ffffff
f 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!
feff7e
f 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!
eadd6c
e a5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6cea5ceceadd6ce0000ffffffffffffffffffffffffffffffe7ffffb5ded6add6ce9ccec67b9c94849c94bdc6c6f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000ffffffffffffffffff2929292121211010106b6b6bffffffffffffa5a5a5000000313131ffffffffffffd6d6d65a5a5a313131636363dededeffffffffffff636363212121525252181818212121efefefffffffffffffffffffffffff424a4a101010212929080808949494f7f7f7ffffffe7e7e76b6b6b3939394242425a5a5a9c9c9ccec6ce21212129424263848484b5ad94cece94cec6a5d6cea5c6bd394a4a000000949494fffffffffffffffffff7fff784847b0000002129290000004a4a4ae7efefffffffdee7e77!
37b7b3
9 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!
cd6d69
c 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!
7e7fff
f ffffffff636363000000000000636363ffffffffffffc6bdbd080808000000737373ffffffffffffa5a5a500000042525263847b7b9c9c8cb5b584b5ad8cbdb58cc6bda5d6ce42635a0018100000000808081810104239426b6363b5b5b5eff7f7ffffffefefef181818a5a5a5fffffff7fff76b736b0000000000004a4a4af7f7f7ffffffc6cece081010293131081008101810d6d6d6fffffff7f7f7f7f7efffffffe7e7e7101810081810425a5a6b8c847ba5a59cd6ce8ccec694d6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd!
6d69cc
e ce9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d60000fffffffffffffffffff7fffffffffff7ffffa5bdbd7b9c948cada5bdded6f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000f7f7f7ffffffffffff292929393939212121636363ffffffffffffadadad080808212121bdbdbdffffffffffffc6c6c68c8c8c7b7b7bcececeffffffffffff6b6b6b181818181818080808cececefffffff7f7f75a5a5ac6c6c6ffffffd6dede212121101010313939efefefffffffffffffa5a5a5848484a5a5a5adadad948c948c8c8c8c848c2129291829296b8c8484adad8cbdbda5d6ce9ccec652736b0000006b7373ffffffffffffadadada5ada5f7ffffffffff5a5a52000800000808b5bdbdf7ffffffffff848484000000292929101010525252ffffffffffffdedede000000000000e7e7e7ffffffffffff424a4a000800080808424242ffffffffffffc6c6c!
608080
8 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!
69cd6c
e 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!
831292
1 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!
ccece9
c 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!
ffffff
f ff9c9494524a523939390808080000080808080000000000000000000808101818184a4a4a636363bdbdbdffffffffffffcecece182121000000292929fffff7ffffffeff7ef292929000000cececefffffff7f7ff393939000008394a526b84847ba59c9ccec69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd!
6ce000
0 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!
17b737
3 5a5a5a3931392118184a4a4a9c9c9cffffffffffffb5b5b5080008080000848484ffffffffffffa5a5a5080808000000737373ffffffffffff9c9c9c0000082129296b848484a5a594c6c69cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d60000ffffffffffffffffffffffffc6c6c6c6c6c6fffffffffffff!
ffffff
f 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!
800001
8 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!
ffffff
f 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!
494ced
6 d6b5bdbd424a4a1829318ca5ad94b5bd8cbdbd9ccece9ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce0000ffffffffffffffffffdededecec6c6fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7000000f7f7f7fffffff7f7f71818181010101010103131311818180000000000001818180000000000000000002121212929293939392121210808080808080000000000000000001818180808080000000000000808081818180808080000000000000008080000000000002129210008000008080008002121214242421818180808080808080808081010102121291821211829291029292131310818180008000000000000001010100808080808081010100000000808080000001010100000000810100810100810100008081818182931312121211010100008080000001818181010100000001010180000081010180000082931391829290000001021210000000008080000000008080010100010100000000008080000080000080810100008080010107b9494a5c6c6a5ceceadd6d6add6ce4a6b6b082929000808000808081818293939213131081818000810000808000008000808000808081818102121293939182929102121001010001010001010001010000000001010000000001008000000395a5a52737300080800080800080800101800080808292994b5b594c6c69ccece9cd6d69cd6d!
69cd6c
e a5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6ce0000ffffffffffffffffffc6c6c6dededefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f 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!
ccece9
c d6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d60000ffffffffffffffffffadadadf7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffff7f7f7000000fffffffffffff7f7f7313131212121101010212121a5a5a5ffffffffffffffffffdedede424242292929ffffff8c8c8c313131dededed6d6d6101010212121949494ffffffefefefffffff8c8c8c525252f7f7f7b5b5b5000000b5bdbdefffff525a5a182118737b7b525a5a212929cececee7efef000000181818e7efefd6d6d6000000313131bdbdbdffffffe7e7efeff7f7b5bdbd0810108c9494f7f7f7525252212121000000394242cececeffffffefefeff7fff7b5bdb5000808636b6b848c8c394242101818c6ceceffffffd6dede5a5a5a293131cececef7f7f7f7f7f7efefef5a5a5a0000083142426b7b8494adada5c6c6adceceadd6d6add6d6a5d6cea5d6d69ccecea5cece9cceceadd6d6b5dedeb5dedea5ceceadd6d6a5ceceadd6d69ccec69ccece8cc6c6a5ded6a5ded694cece9cd6d6addedea5d6d69cd6ce9ccecea5d6ce94c6c6a5cecea5ceceadd6d6add6d6b5d6d6a5cecea5cecea5cecea5cecea5cecea5cecea5cecea5cecea5ceceadd6d6add6ceadd6d6a5d6cea5d6ce94cec69ccec69ccece9ccecea5d6d6a5cecea5cecea5cece94c6c6a5dede8cc6c69cd6d68ccece9cd6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd!
6cea5d
6 d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce0000ffffffffffffffffffa5adadf7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000008484848484847b7b7b10101008080!
808080
8 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!
e9cd6c
e 9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce0000ffffffffffffffffffa5adadf7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7181818292929101010292929181818101010101010efefefefefef393939000000000000181818101010393939f!
fffff9
c 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!
5d6d69
c d6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6cea5d6d69cd6ce9cd6d69cd6ce0000fffffffffffff7ffffb5bdbddee7e7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd6d6d6dededee7e7e7e7e7e7dedede5a5a5a292929ffffffdedede0000002121212929292121211818184a4a4affffff8c8c8c101010ffffffc6c6c61010107b7b7bffffff6b6b6b000!
000000
0 00292929393939ffffffdededef7f7f7d6dede212929000808424a4a6b73735a6363101818d6dedee7efef101810313931f7ffffbdc6c6101810b5bdb5ffffff8484846b6b6bfff7fff7eff70000008c8c8cffffff848484424242424242d6d6d6f7f7f76b6b6b94948cf7f7efdee7de000808525a5a6b6b6b000000393939e7efef949494101818000000dededee7e7e7181818000000b5b5b5ffffff212129102121738c948cadada5ceceadd6d69ccece94cece94d6ce8cc6c69cd6d69cd6d69cd6d69cd6d6a5d6d69cceceaddede94cece9cd6d694cece9ccece94c6c69ccece94cece9cd6d69ccece9ccece94cece94cece94c6c69cd6d69cd6d69cd6d69cd6d69cd6d694cece9cd6d69cd6d694cece94cecea5dede94cecea5d6d69cd6d694cece94cecea5d6d69cd6d69ccecea5d6ce9ccec694c6c69cd6cea5d6cea5d6d694c6c694c6c694c6ce9ccece94c6c69cced694c6ce9cced694cece9ccece9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd!
6ce9cc
e ce9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d69ccece9cd6ce9ccece9cd6d60000ffffffffffffffffffbdc6bddee7deffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff6b6b6b212121fffffff7f7f7101010000000080808181818080808393939ffffff848484212121ffffffcecece000000393939dededeefefefb5b5b5c6c6c6949494424242ffffffb5b5b5424242ffffffadb5ad18212!
129312
9 8c9494636b63181818ced6ceffffffbdc6c6e7efefffffffa5adad000000737b7bf7f7f7a5a5a5a5a5a5ffffff9c9494080008adadadffffffefefeff7f7f78484847b7b7bf7f7efb5b5b5949494ffffff8484840808085a635a6363630008089ca59cffffffdee7e7a5adad424a4a737373ffffffc6c6c6bdbdbdffffffb5b5b50008082131318ca5a5a5bdbda5bdbdadceceadd6d6add6d6a5cece9cceceadd6d6add6d69cc6c6add6d6add6d6adcecea5ceceadd6d6add6d6b5ded6add6d6a5ceceb5d6d6b5dedea5c6c6b5dedeadceceadceceadceceadd6d6add6d6add6d6a5ceceadd6d6a5cecea5cecea5ceceadd6d6add6d6add6ce9cc6c6add6d6add6d6add6d6add6d6add6d6a5cecea5cecea5ceceadd6d6a5cec6b5d6d6adceceb5d6d6adcecea5c6c6adceceb5d6d6b5d6d6adced6adced6adced6a5cecea5ceceadceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d!
6a5cec
e add6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5ceceadd6d6a5cece0000ffffffffffffffffffdededeb5bdbdf7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7737373080808bdbdbdffffff9c9c9c2121211818188c8c8c393939393939ffffff8c8c8c1010108484846363630000000808082929299c9c9cbdbdbdadadad424242393939ffffffadadad0000006b6b6b848c8c393939525252dedede848c8c181818dededee7e7e7636363bdbdbd949c9c1!
010100
8 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!
7fffff
f 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!
121292
9 291818182121212929291818180808080808080000000808081010107b7b7bf7f7f7bdbdbd000000424242f7f7f7a5a5a5000000181818080808080808000000080808000000181818636363d6d6d6fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffcececec6c6c6f7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd6d6d64242420000003939396363638484847b7b7b5a5a5a000000181818b5b5b56b6b6b181818bdbdbd9c9c9c1818185a5a5aadadadbdbdbdc6c6c6adadad525252393939adadad737373101010949494b5b5b5b5b5b5e7e7e7ffffff8c8c8c1818189494949c9c9c080808525252a5a5a5adadadf7f7f7e7e7e7c6c6c6c6c6c6bdbdbdbdbdbddededee7e7e7dededed6d6d6dededee7e7e7efefefcececec6c6c6c6c6c6c6c6c6c6c6c!
6d6d6d
6 f7f7f7ffffffe7e7e74242420808084a4a4a292929000000949494c6c6c6c6c6c6bdbdbdc6c6c6c6c6c6cececefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffbdbdbdc6c6c6ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd6d6d66363631818182121212929292929292121211818181010101010101818180000002121211010100808089c9c9cefefeff7f7f7fffffff7f7f7737373000000101010080808000000d6d6d6f7f7f7ffffffffffffffffff9494941818181818181010100808089c9c9cf7f7f7f7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffadadad5a5a5a4a4a4a5a5a5a6b6b6bd!
ededef
7 f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffdededeb5b5b5dededeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffcececeb5b5b5e7e7e7ffffffffffffffffffffffffefefeff7f7f7ffffffffffffffffffefefeffffffffffffffffffff7f7f7fffffffffffffffffff7f7f7fffffff7f7f7fffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffff7f7f7fffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffff7f7f7ffffffffffffffffffffffffdededebdbdbddededeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffcececeb5b5b5dededefffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffd6d6d6b5b5b5dededefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7cececeb5b5b5e7e7e7fffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffff7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffff7f7f7ffffffffffffcececebdbdbdcececef7f7f7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc6c6c6adadade7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffe7e7e7bdbdbdbdbdbddededeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdededeb5b5b5c6c6c6e7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
7f7f7d
6 d6d6c6c6c6c6c6c6e7e7e7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdededebdbdbdb5b5b5dededefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7cececebdbdbdbdbdbdf7f7f7fffffff7f7f7fff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7efefefb5b5b5c6c6c6d6d6d6efefeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe7e7e7cececeadadadbdbdbddededef7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7efefefcececebdbdbda5a5a5d6d6d6e7e7e7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefefefdededec6c6c6b5b5b5b5b5b5c6c6c6dededef7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffefefefdededebdbdbdb5b5b5adadadc6c6c6dededefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7e7e7e7cececebdbdbdadadadb5b5b5b5b5b5bdbdbdc6c6c6d6d6d6d6d6d6e7e7e7e7e7e7e7e7e7dedededededecececec6c6c6bdbdbdb5b5b5adadadadadadbdbdbdd6d6d6efefeffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f7f7f7f7f7e7e7e7e7e7e7d6d6d6cececebdbdbdbdbdbdadadadadadadadadadb5b5b5b5b5b5c6c6c6cececededededededee7e7e7f7f7f7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff!
ffffff
f ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000040000002701ffff030000000000
Do you spend more time on office e-mails than with your children? How do you cope with a bulging inbox? Tell us what you think.
Simple answer, I don't manage to deal with it! I even have clients overseas who are e-mailing me whilst I am asleep. So when I come in I already have a full inbox. I organise mine by putting my e-mails in the alphabetical order of the senders. By the time I am down to reading S you can bet I will have several new e-mails which have shuffled in above this. It's like painting the Golden Gate bridge by the time you're finished you have to start again. Irritating thing is, most of them are either advertising, junk mail or work queries which don't even apply to me.
Bex, UK
E-mail's only stressful if you read it. I work on many projects at once. Each e-mail that is project-related has the project code in the header. I have a folder for each job number that I'm working on, as well as folders for general admin, personal, humour etc. When I'm very busy, e-mails just get dragged unread to the appropriate folder. Then at some point during the day I will make time to read all e-mails related to each subject. This method also ensures that I'm only thinking about the one job at a time. I would recommend this approach to anyone who is stressed out by e-mail, although this does require your company to have e-mail protocol which includes useful subject headers.
Alison A, UK
I cope by deleting any e-mail that I have finished with or that has no relevance. That said, the sooner society makes e-mail advertising (spam) illegal, the better. Once my inbox gets over 50 e-mails, I make time to narrow it down. Not having too many e-mails in there makes you feel less stressed. Move e-mails you need to keep into another folder and keep your inbox tidy. Works for me.
Boomer, UK
By using a facility like Outlook to manage your e-mail you can make specific folders and have all items that you are a cc party auto deliver to a separate folder, same with all your mates stuff, which you can read at your leisure. This will leave just items work orientated and sent directly to you to deal with.
Chris, Suffolk
Delete the lot and go to the pub.
Fred Ashley, UK
I basically scan through the sender and subject information, if I don't recognise either then I delete it without thinking. I just don't have the time to read all the spam offering me low rate mortgages or Viagra online!
Seth Black, UK
Juggling home and work commitments can be trying at the best of times but I all too often only see my children first thing in the morning as they are in bed by the time I get home. Fortunately my husband and I have good nursery and after-school facilities available to us. It is a sad indictment of modern living that children are often only able to see their children for little more than an hour a day.
Sian, UK
What did we do before e-mails, SMS messages, faxes and mobiles? I remember - life was a lot darn easier and less hetic.
David LJ, Isle of Man UK
I receive approximately two to three hundred e-mails a day. I cannot expect to read every one I receive, so I will read what I can when I have the time to do so, the rest I will never read. Any urgent matter should be dealt with in the traditional method - the telephone! Junk and unwanted e-mails are a pain, but you should configure your e-mail application to automatically remove these.
James Sanders, UK
Whenever I am sent an e-mail with a question from a colleague who works in the same office, I always give them the courtesy of a reply in person. I find that we not only build up a better rapport but it saves the hassle of three to four follow-up e-mails to 'clarify the point'. It also helps with the exercise regime.
Rob, UK
Smart companies have e-mail etiquette! This reduces the number of e-mails from colleagues who misguidedly feel you are interested in their updates, supports use of meaningful subject headers and teaches everyone how to communicate concisely! Lobby your IT team today
Max, N Ireland
I only read e-mail twice a day. Once at the start of the day, once at the end. Anything else more urgent can be dealt with in person or by phone. I also get to schedule work better rather than do what is most recent.
Tim, Cambridge
Employees in the UK spend more time wading through their messages than playing with their children, according to a government study.


The report by the Department of Trade and Industry found that workers take an average of 49 minutes a day to sort out their inboxes.

By comparison, working parents play with their children for just 25 minutes a day.

Messaging stress

Keeping up with office e-mails can not only be a logistical nightmare, it is also seen as one of the worst causes of stress in the workplace.

And the messages also contribute to what are thought to be the top two causes of stress at work: constant interruptions and deadline pressures.

According to the DTI, sick days as a result of stress cost business £7.11m a week.

With many employees suffering from e-mail overload, some companies are now sending executives on courses to teach them how to communicate more effectively through e-mail without adding to the already bursting inboxes of their staff.

Short lunches

The DTI study confirms that Britons are among the hardest workers in Europe.

It found that the average employee skips 24 minutes of their lunch break every day and only takes the equivalent of approximately two weeks holiday per year.

The DTI research was released to mark the relaunch of its work-life balance website, which offers advice on how to juggle the competing demands of job and home.

A DTI spokesman said: "Everybody can benefit from a better work-life balance.

"More flexible working boosts staff morale, improves employees' commitment to their work, and benefits business through higher productivity."


Do you spend more time on office e-mails than with your children? How do you cope with a bulging inbox? Tell us what you think.



Simple answer, I don't manage to deal with it! I even have clients overseas who are e-mailing me whilst I am asleep. So when I come in I already have a full inbox. I organise mine by putting my e-mails in the alphabetical order of the senders. By the time I am down to reading S you can bet I will have several new e-mails which have shuffled in above this. It's like painting the Golden Gate bridge by the time you're finished you have to start again. Irritating thing is, most of them are either advertising, junk mail or work queries which don't even apply to me.
Bex, UK


E-mail's only stressful if you read it. I work on many projects at once. Each e-mail that is project-related has the project code in the header. I have a folder for each job number that I'm working on, as well as folders for general admin, personal, humour etc. When I'm very busy, e-mails just get dragged unread to the appropriate folder. Then at some point during the day I will make time to read all e-mails related to each subject. This method also ensures that I'm only thinking about the one job at a time. I would recommend this approach to anyone who is stressed out by e-mail, although this does require your company to have e-mail protocol which includes useful subject headers.
Alison A, UK


I cope by deleting any e-mail that I have finished with or that has no relevance. That said, the sooner society makes e-mail advertising (spam) illegal, the better. Once my inbox gets over 50 e-mails, I make time to narrow it down. Not having too many e-mails in there makes you feel less stressed. Move e-mails you need to keep into another folder and keep your inbox tidy. Works for me.
Boomer, UK


By using a facility like Outlook to manage your e-mail you can make specific folders and have all items that you are a cc party auto deliver to a separate folder, same with all your mates stuff, which you can read at your leisure. This will leave just items work orientated and sent directly to you to deal with.
Chris, Suffolk


Delete the lot and go to the pub.
Fred Ashley, UK


I basically scan through the sender and subject information, if I don't recognise either then I delete it without thinking. I just don't have the time to read all the spam offering me low rate mortgages or Viagra online!
Seth Black, UK



Juggling home and work commitments can be trying at the best of times but I all too often only see my children first thing in the morning as they are in bed by the time I get home. Fortunately my husband and I have good nursery and after-school facilities available to us. It is a sad indictment of modern living that children are often only able to see their children for little more than an hour a day.
Sian, UK



What did we do before e-mails, SMS messages, faxes and mobiles? I remember - life was a lot darn easier and less hetic.
David LJ, Isle of Man UK



I receive approximately two to three hundred e-mails a day. I cannot expect to read every one I receive, so I will read what I can when I have the time to do so, the rest I will never read. Any urgent matter should be dealt with in the traditional method - the telephone! Junk and unwanted e-mails are a pain, but you should configure your e-mail application to automatically remove these.
James Sanders, UK



Whenever I am sent an e-mail with a question from a colleague who works in the same office, I always give them the courtesy of a reply in person. I find that we not only build up a better rapport but it saves the hassle of three to four follow-up e-mails to 'clarify the point'. It also helps with the exercise regime.
Rob, UK



Smart companies have e-mail etiquette! This reduces the number of e-mails from colleagues who misguidedly feel you are interested in their updates, supports use of meaningful subject headers and teaches everyone how to communicate concisely! Lobby your IT team today
Max, N Ireland



I only read e-mail twice a day. Once at the start of the day, once at the end. Anything else more urgent can be dealt with in person or by phone. I also get to schedule work better rather than do what is most recent.
Tim, Cambridge
************************
BBC
Mass arrests over online child porn


Officers from 30 forces searched 43 homes and seized about 30 computers, plus discs and videos.

Operation Ore targeted computer users suspected of accessing US-based websites which sell images of children aged as young as five being sexually abused.

US authorities gave the National Criminal Intelligence Service (NCIS) details of the sites' subscribers between May 1999 and the summer of 2001.



Every image of a child being sexually abused is an image of a crime scene and each photograph is that of a victim

NCIS UK Tactical Services director Vincent Harvey

The NCIS' Serious Sex Offenders Unit identified a "significant number" of suspects, and Monday's operation was co-ordinated by the National Crime Squad.

Those arrested ranged in age from 24 to 65.

They include three men - aged 62, 54 and 35 - being held in Merseyside, a 32-year-old man arrested in Scunthorpe and another, 64, arrested in Grimsby, North Lincolnshire,

Another man, aged 30, was arrested at an address in Normanton, near Wakefield, West Yorkshire where two computers were seized for forensic examinations.

Computer equipment was also seized from an address near Rossendale, Lancashire, where a man, 42, was arrested.

Sexual abuse

In Cwmbran, south Wales, a man in his mid-fifties was arrested with another man and both later released on police bail.

Another man, 28, was arrested in Farnham, Surrey.

Police in south west Surrey also arrested a man at his home in Godalming.

A man, 44, from the Sandbach, Cheshire has also been released on police bail pending further inquiries.

This is the first time we have targeted people who use the internet to buy images of children being sexually abused

Detective Superintendent Peter Spindler

In London, the Metropolitan Police Paedophile Unit also seized computer equipment from two homes in Battersea and Camden.

A man has is also being questioned in Crawley, West Sussex.

Deputy Assistant Commissioner and Association of Chief Police Officers (Acpo) spokeswoman on internet child abuse Carole Howlett said: "A significant proportion of people involved in child abuse online are themselves actual abusers."


NCIS UK Tactical Services director Vincent Harvey added: "Every image of a child being sexually abused is an image of a crime scene and each photograph is that of a victim.



"Using the sophisticated technology along with traditional detective and analytical work we can now make sure there is no place for paedophiles operating online to hide."


The government is determined to give the highest priority to protecting our children, on and off-line

Home Office minister Beverley Hughes

The National Crime Squad's Detective Superintendent Peter Spindler said: "This is an excellent example of all the UK policing agencies coming together in a co-ordinated way to tackle a relatively new and growing problem.

"This is the first time we have targeted people who use the internet to buy images of children being sexually abused.

"We will continue these operations to protect children and show paedophiles that law enforcement agencies will find them regardless of which area of the internet they use."


Home Office minister Beverley Hughes, who chairs the government's task force on child protection on the internet, said the operation sent "a clear signal to such criminals that they cannot hide".


Dangers

"People who access child pornography are fuelling the widespread and often organised sexual abuse of children by paedophiles across the world."

"The government is determined to give the highest priority to protecting our children, on and off-line, and to searching out and arresting those who prey upon them.

"We will continue to work with law enforcement, industry, children's charities and others to tackle the dangers posed by online paedophiles and ensure the UK provides a safe environment for legitimate internet users."
*********************
BBC
Virus outbreak hits file swappers


A malicious computer program, dubbed Benjamin, has been found that spreads by infecting the machines of people who use Kazaa.

Computers infected by Benjamin will find it increasingly difficult to swap data and could find large parts of their hard disk taken up by copies of the virus.

However, anti-virus companies say the program is not too malicious and many have already produced cures for the infection.

Clogged disks

When it first infects a machine, Benjamin creates a directory and copies lots, sometimes thousands, of versions of itself into it.


Even movies can be found on file-sharing networks


The versions have different names based on a list held by the virus.

The directory it creates is open to other Kazaa members and anyone who downloads any of the disguised virus files will become infected.

As well as taking up lots of space on a hard disk, the virus also jams net connections and gradually makes it impossible to swap files via Kazaa.

The malicious file was first discovered by anti-virus firm Kaspersky Labs on 18 May.

Duping users

Kazaa, like Napster, lets members swap the music, image and video files on their computers with other people on the system.

As a peer-to-peer system Kazaa does not have a central server that gives out files to users. Instead the net links connections and machines of people who participate form the network themselves.

According to Sharman networks, which owns Kazaa, the software to use the swapping system has been downloaded more than 81 million times.

Kazaa is not the first peer-to-peer system to be hit by a virus.

In February a worm was discovered that tried to spread via the Gnutella network.

Before now virus writers have tended to concentrate their efforts on e-mail viruses that dupe people into opening them.

However, anti-virus companies say that any popular program is a tempting target for virus writers.
*****************
BBC
Tokyo smart cards challenge cash


Japan's largest train company, Japan Rail East, has just completed the Tokyo introduction of new smart cards to replace traditional commuter passes and has high hopes that one day the cards will even replace the cash in your wallet.

Since the company introduced its Suica smart cards based on integrated circuit technology last November, take-up has been phenomenal.

After only six months, 3.6 million out of the 4.5 million Japanese who use commuter passes on JR East's network are addicted to the smart cards.

By the end of this year, JR East confidently expects almost everyone to have made the move from the old magnetic passes to the new cards.

No waiting

The cards, available upon paying a refundable deposit, work in the same way as standard magnetic train passes.


The card that could replace cash


But the new technology has the added benefit that it can be charged with up to 20,000 yen (£105).

This means a commuter does not have to stand in line to pay an excess fare.

Instead, the fare is automatically deducted when a holder waves their pass over the smart card reader.

The non-contact reader renders the transaction completely invisible, save for a display on the ticket gate that can be read on the way past.

"I like the new cards because I can just zoom through the ticket gates without even having to pause, even if I have to pay an excess fee," said 38-year-old Sumie Kawakami.

For some commuters, the smart card has almost become an object of desire.

"I don't use JR network to get home, so I have to use a traditional pass. Suica is so cool, I wish it was more widely available," said 19-year-old Yoko Onodera.

Smart payments

JR East is the largest train company in Japan, carrying 16 million passengers every day. Last year, its operating revenues rose to 2,546bn yen (£13.4bn).

Its strategy has serious implications for how we might do business in the future.

DoCoMo's successful i-mode business model using mobile phones has shown over the last three years just how easy it is for companies to extract cash from consumers in drips when a micropayment system is available.

Since an automated ticket gate can deduct the equivalent of 50 pence from the Suica cards, the next step is to allow such transactions for non-transport-related purchases.

Smart card readers in shops could perform the same function when buying something as small as a newspaper or a pack of gum.

Although wide scale use of smart cards as cash is still some way off, even in Japan, there are plans for several of the nation's ubiquitous convenience store chains to introduce card readers in the near future.
********************
Government Computer News
Defense IT execs are honored by Women in Technology
By Vanessa Jo Roberts


The Army's Miriam F. Browning and the National Imagery and Mapping Agency's Joan R. Vallancewhitacre received top government honors last week for their contributions to computing from the Women in Technology organization.

Browning, the Army's director of information management, has spent more than three decades in government service, most of it with the Army. Her work at the service has spanned projects ranging from business process re-engineering and year 2000 code rework to her current effort helping the service establish an online knowledge management portal, known as Army Knowledge Online.

Vallancewhitacre, executive officer of information services at NIMA, has spent her career working in the government mapping community. She worked with the Defense Mapping Agency before it combined with the government's other intelligence mapping groups to form NIMA.

WIT also recognized six other government executives as finalists for leadership awards. They were Anne A. Armstrong, president of Virginia's Center for Innovative Technology; Mayi Canales, acting deputy secretary of Treasury for information systems and CIO; Deborah Loudon, associate deputy CIO of the National Reconnaissance Office; Air Force Lt. Col. Chris Reasner of the Pentagon Communications Agency; Debra Stouffer, deputy CIO for IT reform at the Housing and Urban Development Department; and Toni L. Zimmerman, chief of IT services at the IRS.

This is the third year WIT has honored women in the IT community. Besides Browning and Vallancewhitacre, whom WIT recognized for their government work, the nonprofit organization also gave leadership awards to entrepreneurial and corporate executives.

In the corporate category, the honorees were Linda Gooden, president of IT for Lockheed Martin Corp., and Donna Morea, executive vice president for the public sector at American Management Systems Inc. of Fairfax, Va. In the entrepreneur category, the winners were Helena S. Wisniewski, chairman and chief executive officer of Aurora Biometrics Inc. of Rockville, Md., and Corinna E. Latham, president and CEO of AnthroTronix Inc. of College Park, Md.

WIT also gave a lifetime achievement award to Faith Driscoll, a patent attorney with Bull HN Information Systems Inc. of Billerica, Mass.
********************
Government Computer News
Late changes to a security R&D bill call for NIST cybersecurity office


By Jason Miller
GCN Staff


The Senate Commerce, Science and Transportation Committee late last week passed an IT security research bill that would create a cybersecurity office at the National Institute of Standards and Technology. The bill, S 2182, now awaits a vote by the full Senate.


During markup, Sen. Ron Wyden (D-Ore.) amended the Cybersecurity R&D Act, boosting proposed five-year funding from $875 million to $977 million, to better focus government and industry efforts to improve network and software security. Changes in the bill also would give more responsibilities to the Commerce Department's NIST and the National Science Foundation to promote cybersecurity research.

The creation of the NIST office, which would be called the Office for Information Security Programs, was one of three provisions added to the bill. The office would oversee the government's efforts to buttress cybersecurity research, including a program to assist colleges and universities in entering partnerships with companies and government laboratories to conduct such research.

NIST also would have to develop benchmark security standards for agencies to implement and draft security guidelines for common software used by agencies.

The bill would require NSF to award grants for cybersecurity research to colleges, universities and companies. The bill also would encourage graduate students to teach cybersecurity in return for paying their college loans.
**********************
USA Today
More firms replace operators with software


By Jon Swartz, USA TODAY

SAN FRANCISCO Consumers frustrated by touch-tone customer service are in for more aggravation: Hundreds of companies are replacing some service reps with voice software.

In April, AT&T replaced 200 operators with a voice-recognition system to handle night and weekend toll-free directory assistance calls. Operators are still reachable other times.
Qwest Communications is considering replacing operators with voice-recognition systems for more services. It, BellSouth and Verizon Communications already use voice software to solicit city and listing during directory assistance calls. An operator often delivers the number.
A slew of companies, including United Airlines, Charles Schwab, E-Trade and Amazon.com, have added voice systems to handle general calls. AirTran Airways cut customer service costs by 20% by shifting some flight information calls from operators to voice systems last year. It is considering the system for reservations.
Most companies still use operators for complex tasks, such as correcting financial information and retrieving passwords. Emergency services like 911 will continue to be handled by humans for at least another decade because of their critical nature, speculates telecom analyst Jeff Kagan.


But companies will deploy voice systems to 32 million people this year up 60% from a year ago, estimates The Kelsey Group. One-fourth of the Fortune 500 invested in speech systems in 2001, says market researcher Datamonitor Technology, up from 12% in 2000.

Voice systems don't always work. Some cannot understand heavy accents, speech impediments or quiet voices. Databases, too, don't always recognize names. And some make it hard to reach a human. Savvy callers have long skipped touch-tone systems by punching "0" to get an operator. American Airlines now requires callers to press "6" and say "operator." Sprint PCS requires saying "live agent" twice.

"I'm afraid that in three or four years, I won't be able to talk to a human operator," says Ira Gruber, 55, of Reno, who has a strong New York accent. "What happens if there's an emergency and the speech-recognition system doesn't understand me?"

Makers of voice-recognition software say it saves money and improves service. "People are more comfortable with a human voice" than with touch-tone, says Linda Smith, chief marketing officer of software maker Nuance. Its surveys show most consumers prefer voice to touch-tone and operators.

U.S. firms are sold. They'll spend $7.4 billion this year to improve voice and touch-tone. A call handled by a worker costs, on average, $5.50 or 10 times as much as an automated call, says researcher Cahners In-Stat Group.
*********************
USA Today
File-sharing system gives artists some control


NEW YORK (AP) Ace Ha and Sammy Brazil of the emerging hip-hop group MaddWest don't mind listeners passing around their music for free over the Internet. All they want is a little control.

The Altnet file-sharing system launches Monday to give MaddWest and other artists such control in the otherwise free-for-all world of peer-to-peer networking.

Users can trade music, video and other files among themselves just as they do with KaZaA, LimeWire and other peer-to-peer systems.

But with Altnet, songs are coded with digital rights management technology so artists can limit distribution or even collect fees before a song will play.

Though MaddWest will give music away for free, Ha said Altnet will let his band ensure that the copies that are available are of the highest quality.

With traditional file sharing, he said, "whoever is putting whatever out there and maybe not labeling it right, not taking the care and pains to put it up in a way we would find satisfactory."

But will Internet users tolerate the added hurdles that come with digital rights management, or DRM?

After all, free, unprotected but often illegal copies are available elsewhere everything from Britney Spears tunes to the latest Star Wars movie.

"There is clearly a demand for file swapping," said Matthew Berk, an analyst at Jupiter Media Metrix. "Whether or not if you lay on top of it a DRM system people will be keen on using it is another question."

Kevin Bermeister, president of Brilliant Digital Entertainment, the company behind Altnet, is counting on humans' fundamental desire to be honest when given the choice.

Beginning Monday, Altnet will distribute its search software with new versions of KaZaA. Once installed, when a user does a search on KaZaA, the Altnet search tool will also check whether anything is available through Altnet.

If something is available, the user then can download the file directly from the content provider, such as a record label.

In July, Altnet will begin asking KaZaA users to voluntarily lend their spare disk space and install a second piece of software to run the Altnet sharing network. Music and other files from participating content providers will be saved on these volunteer computers.

So when listeners request a file, they can obtain it directly from the volunteer computers. Only if the file isn't available there would the listener go directly to the content provider.

Altnet took some heat earlier this year when Brilliant Digital said in a regulatory filing that it would be installing its own software with KaZaA to set up this network.

"I didn't expect anybody to read it," Bermeister said. "I didn't expect it to be received and scrutinized the way it was."

Bermeister said the company has re-evaluated its software distribution method and will no longer use an installer distributed with KaZaA since February.

Now, users' permission will be sought before the new software is downloaded and activated, he said.

Altnet is hoping to initially get about 20,000 volunteer computers. Computers will require a high-speed Internet connection, at least 400 Megahertz of processing power and five to 15 gigabytes of free disk space.

Participants will be rewarded based on how much their computers are accessed for files. Bermeister said the heaviest contributors may get free hotel rooms, air fare and similar gifts, while occasional contributors may get movie tickets or discounts on merchandise.

Though Altnet will initially work only with KaZaA, the company is exploring partnerships with others.

Altnet is also developing a version Linux computers, but there are no plans for Apple's Macintosh computers.

In about a year, Altnet also will launch a service for sharing spare processing power similar to a popular program at University of California-Berkeley for using millions of idle home computers to search for extraterrestrial intelligence.
****************
MSNBC
The race to save the oldest writings


LOS ANGELES, May 17 Historians using the modern language of computers are assembling a virtual library of the earliest known written documents: clay tablets inscribed more than 4,000 years ago. Begun in 1998, the Cuneiform Digital Library Initiative has taken on new urgency. Experts fear if the texts aren't cataloged electronically, they could be lost forever.
ABOUT 120,000 cuneiform tablets from the third millennium B.C. are scattered throughout the world. Thousands more are plundered each year in Iraq and dumped on the world antiquities market. Tablets even show up on Web auction site eBay, where bidding can start at $1.
"They are just so incredibly dispersed," said Robert Englund, a professor of Near Eastern languages and cultures at the University of California, Los Angeles, who spearheads the project. "It seems to us the only way to get control of the texts is to collect them on the Internet."
Over the next year or two, Englund will try to finish gathering, cataloging and photographing 120,000 tablets, which will then be posted on the Web.
The tablets are the earliest known written documents and record how people lived, labored, ruled and wrote for millennia in ancient Mesopotamia. The library focuses on tablets created by scribes during writing's first millennium, roughly 3300 B.C. to 2000 B.C. The writing looks like a series of little wedges connected by lines; the term cuneiform means "wedge-shaped."
About 60,000 texts are already online.
"It's like being able to walk into the tablet room of a museum and pick up the actual tablets but this can be done from any corner of the planet and by any number of individuals at one time," said Gene Gragg, director of the University of Chicago's Oriental Institute.
Cuneiform collections in England, Germany, Norway, Russia and the United States are still available for students to see.
"It's simply going to change the way we work because access to these texts is slow and painful and can involve traveling thousands of miles to see. That changing to just a click away is going to be huge," said Steve Tinney of the University of Pennsylvania, which is compiling a Web-based dictionary of Sumerian, the first written language.
The best-known cuneiform texts include the earliest known creation myths, legal codes, medical prescriptions and recipes for beer. Most, however, are more mundane and include ledgers, deeds, receipts and lists of everything from types of birds to musical instruments and the woods used to make them.
The detail they contain is unparalleled for any other period in history until perhaps the rise of the Venetian empire in the 1200s. Historians hope the library will prove a boon for economic historians and others who, until now, have ignored cuneiform records.
"We are hoping to bring the richness of Mesopotamian culture to anyone who works on anything. We have agriculture texts, magic texts and medical, legal and religious texts. This is a treasure trove that has not been exploited," Tinney said.
***********************
USA Today
Internet pharmacies stress industry in Canada


TORONTO (AP) In recent years, busloads of Americans have crossed into Canada to buy cheaper prescription drugs with help from Canadian doctors.

Now many of those customers, mostly senior citizens facing large medicine bills, make that trip by the Internet, creating a growing industry that is attracting the attention of regulators.

On May 14, the Ontario College of Pharmacists filed the province's first charges against a Web site selling prescription drugs, accusing it of doing so without a license.

It is the initial salvo in what could be a lengthy battle over how to regulate the Internet prescription drug industry, raising questions about whether technology has advanced faster than laws and policies.

"This is the first time we've done this," Layne Verbeek, spokesman for the Ontario college. "It's a new area."

Verbeek said a body of rulings and court decisions is needed to determine whether existing laws and regulations properly address the issues.

The charges were filed against The Canadian Drug Store Inc., one of its directors, an Ontario pharmacist, an Ontario pharmacy, an Ontario physician and a Canadian drug wholesaler.

Representatives of The Canadian Drug Store could not be reached for comment.

"There's always entrepreneurs wanting to find ways around the rules to make money. There's nothing wrong with entrepreneurship, but we're really at the beginning of this," Verbeek said. "These won't be the last charges we lay."

One of the most successful Internet drug store entrepreneurs is Andrew Strempler, whose Mediplan Health Consulting in Manitoba fills about 1,000 prescriptions each day for U.S. customers who place orders through the Web sites RxNorth.com and Canadiandrugstore.com.

His operation, which employs more than 100 people including eight pharmacists, handles only non-narcotic orders that have a prescription from doctors licensed in Canada. The service includes having a Canadian-licensed doctor co-sign prescriptions from U.S. doctors for American patients.

While Canadian regulatory bodies say doctors should sign prescriptions only for patients they examine themselves, Strempler called that "kind of a dream."

"How many doctors have prescribed a drug based on another doctor's opinion? That's the reality out there," he said. "The issue isn't whether the patients are receiving proper care. The issue is we are doing something new, and when you do something new, people are going to question it."

Cases like the Ontario charges give the entire industry a bad name, said Strempler, who has a message on his Canadiandrugstore.com site noting it is different from The Canadian Drug Store cited by Ontario regulators.

"We're fulfilling a need" for American senior citizens who cannot afford the higher-priced medicine south of the border, he said. "There's nothing scandalous in this industry. You'll always have one or two bad apples. We really hope that doesn't ruin the reputation in this industry."

In the Ontario case, the College of Pharmacists filed 15 charges that accuse The Canadian Drug Store of operating an unaccredited Internet pharmacy without registered pharmacists from November 2001 to February 2002. It said the Toronto-based operation filled prescriptions written by U.S. Doctors for U.S. patients.

Along with lacking a license, such an operation violated policies for physicians and pharmacists set by the Ontario College of Pharmacists and the Ontario College of Physicians and Surgeons.

The pharmacists college requires prescriptions written by Canadian doctors, while the physicians and surgeons college requires doctors to physically examine a patient before signing a prescription.

Spokeswoman Kathryn Clarke of the physicians and surgeons college said the policy adopted in November 2000 responded to the busloads of Americans that pull up to walk-in clinics to get prescriptions from Canadian doctors. Now the situation has evolved with the emergence of the Internet industry.

"It's increasing," Clarke said of Internet drug sales. "It's really a very complex issue that involves both countries and is only happening because the drug prices are different."

Drugs are often cheaper in Canada because the government finances the medical system and approves the price of all patented medicines.

The cheaper prices have long attracted Americans on prescription drug-buying sprees, especially in northern states that border Canada. Now it happens on the Internet, with Strempler's sites warning of delays in filling prescriptions due to high demand.
********************
Government Computer News
Agencies find it's not getting the information, it's how you use it
By Sydney J. Freedberg Jr., National Journal


For more than 50 years, since the twin triumphs of World War II and the Marshall Plan, nothing has summed up American power in the world so much as piles of stuff.

Be it weapons or widgets, rockets or refrigerators, the United States prevailed in war and peace because it could produce the most of the latest stuff. It was global domination through mass production.

But like so much else, this supremacy by manufacture didn't save us on September 11, 2001. Terrorists armed with nothing more sophisticated than box cutters hijacked the high-tech, high-flying products of U.S. industrial might--Boeing airliners--and flew them into the high-rise engineering wonder of the world--the World Trade Center. And in an ironic twist, when U.S. retaliation came, Special Forces soldiers had to ride, literally, to victory on the backs of borrowed horses and on the lethality of air strikes conducted by the oldest aircraft in the Pentagon's inventory--the 50-year-old B-52 bomber.

Certainly, both sides in this new kind of war used the heavy-metal gadgets that have long defined the cutting edge, most obviously long-range jet aircraft (whether owned or stolen) laden with explosive materials (whether smart bombs or jet fuel). But such tangible uses of technology were just the starting point, their availability almost taken for granted. The critical margin of victory for both sides was something altogether more ethereal: It was information.

It was the terrorists' understanding of air transportation, not their box cutters, that was their deadliest weapon on September 11. Thanks to 21st-century information technology, everything they needed was readily available: from manuals and simulators for their pilot training to flight schedules on the Web. They also could glean from news articles that standard procedure called for U.S. aircrews to collaborate with, not confront, hijackers in order to save passengers' lives.

Likewise, it was information that enabled America's lightning campaign in Afghanistan to work so well. Networking software allowed U.S. planners to coordinate nearly nonstop missions over Afghan skies using planes from Central Asian airstrips, aircraft carriers at sea, and bases in the United States. Digital communications gear let Special Forces on the ground transmit precise coordinates to the circling bombers. And an $18,000 upgrade kit let old-fashioned, free-falling bombs steer themselves to those coordinates by tapping into Global Positioning System satellites in space. New technology did make the crucial difference, but it was a new kind of new technology: small, quiet, and relatively cheap computers that told all the big, loud, and expensive machines exactly where to go for maximum effect. Without the information systems, the U.S. military would have just been blasting away at the landscape in a big, set-piece barrage right out of World War II.

A crucial caveat: It was having the right information, in the hands of just a few of the right people, that made the difference. It was not simply a matter of having a lot of data. On 9/11, Mohamed Atta and a band of 18 disciplined and trained hijackers, armed with some key but easily available information, wreaked great terror on America. Similarly, small Special Forces teams made up of just six soldiers each helped destroy an entire regime because of their precise knowledge of the enemy's location in Afghanistan, and because of their ability to transmit that knowledge to the bombers. Said Kenneth Watman, director of warfare analysis and research at the Naval War College in Newport, R.I., "The real working end of this problem is the information end, not the shooting end."

And it's not the quantity of information that counts, as anyone who has used e-mail or searched the Web knows--it's how you use the masses of data to achieve your goal. "Being submerged in data that way is not very productive," said Watman. "You've got to have some sort of intelligent scheme for putting things together."

And that's where government tends to fall down. A bureaucracy built for the Industrial Age has real trouble adapting to an age of information. The private sector is still struggling to master the e-economy, but e-government lags far behind even these first steps. The White House's six-month-old Office of Homeland Security has only just hired a chief information officer to help manage the flood of e-mailed proposals from would-be contractors.

It is not that government never gets the information flowing smoothly. The FBI's National Crime Information Center can electronically alert almost every police chief and sheriff in the country, and some jurisdictions have computer terminals in every squad car. Other government and private groups--from disaster planners to hospitals to medical associations--have their own extensive networks, too. But each network is often too narrow to catch anything unusual: It simply moves information up and down within one organization, not side to side between them. Retired Navy Capt. John Gannon (now with the consulting firm Intellibridge) recalls that in his former job as director of the federal interagency National Intelligence Council, "I had responsibility for coordinating 11 agencies of the U.S. government. I could not communicate with those 11 agencies through one e-mail system."

The greatest tragedy to result from this information arteriosclerosis, of course, was 9/11. "It was the biggest single failure of our federal government," said Rep. Curt Weldon, R-Pa. "You had agencies that were tracking individuals that other agencies weren't aware of, because there was no cross-pollination of data sets." The State Department and the Immigration and Naturalization Service, because they did not get a CIA watch list until too late, let suspected terrorists into the country. A warrant was issued for the arrest of the apparent ringleader, Mohamed Atta, in April 2001 by Florida state police who had ticketed him for driving without a license. But the Florida police had no access to federal intelligence information.

So September 11 gave a new impetus to the long-running struggle to pool information across government. The INS is now trying to merge its database of offenders and fingerprints with the FBI's. A Customs Service pilot project in Arizona automatically checks vehicles crossing the border against both state and federal registers of licenses, and it even suggests which ones have suspicious crossing histories. A follow-on experiment will share the data with every government entity that works an Arizona border post: Arizona agencies, Customs, the Transportation Department, and even the Agriculture Department. Even more ambitious, the military's Special Operations Command has taken over an experimental Army project to "fuse" information from different Pentagon and civilian spy agencies' secret, and currently separate, data systems.

Again, the objective is not simply to accumulate mounds of information. The idea is to fuse together different kinds of data to get different perspectives on a problem from many angles. The simplest example is what the military calls "hyper-spectral" reconnaissance--looking at the same thing with different kinds of sensors. To an infrared camera, a heated metal plate looks like a running tank engine; to an optical camera, a wooden mock-up looks like a real tank. But if both sensors can be pointed at the same suspected target and compared, then the enemy is less likely to fool U.S. targeters.

The idea goes well beyond combining different types of cameras. Disaster planners now build electronic maps that, for example, can show how close fire stations are to chemical plants, or which hospitals can handle an overflow of casualties in a nearby mall's parking lot. Rep. Weldon proposes a "National Operations and Analysis Hub" that can collate transcripts of intercepted phone calls, spy camera imagery, agents' reports, and more into a single coherent picture of the world.

It sounds like an impossible technical challenge. But in fact, large private corporations have used the technology for years in data mining and marketing, Weldon said. But getting the government to make use of the technology, he said, "[has] been a battle with the agencies all along."

So what's the holdup? A big part of the problem is the resistance to change. Even the most seemingly mundane uses of information technology require some fundamental rethinking about how a bureaucracy does things. In February, for example, Navy Secretary Gordon England griped to his staff about the piles of paperwork on his desk and asked whether it could all be computerized. By April, a "paperless" system was in place: Preliminary estimates are that for each routine decision, processing time was cut by 78 percent, the number of staff to handle it by 71 percent, and the cost by 75 percent.

But those savings didn't result from simply speeding up the bureaucratic rounds. In a traditional office, a physical piece of paper goes from official to official to official, each one seeing the preceding handlers' comments and making his or her own before passing the memorandum along. And if one handler along the way really objected, he or she just sat on it. It was what engineers call a linear or "serial" process, where one broken link breaks the entire chain. With the new network, the originators of any proposal post their draft document on an intranet, so anyone can review and comment simultaneously without waiting. That's called a "parallel" process--except that in geometry, parallel lines never intersect, and yet in this network, everyone sees each other's comments and responds. It's all about interaction and intersection. The end result is faster, more flexible, more responsive to everyone's input--and distinctly unsettling to traditional bureaucracies.

Now, this is what can happen inside just one small military secretariat. It is fairly disruptive, but also more productive. Even more destabilizing, and also more valuable, are those networks that link different agencies. Knowledge is power, and is a jealously guarded bureaucratic commodity. But when a new network fuses information from multiple organizations, it creates new knowledge--new power--along the boundaries between them. In the language of the Information Age apostles, power shifts from the center to the edges.

Then those edges begin to blur. Eleven years ago, Desert Storm had an air campaign and then a ground campaign, clearly distinct and elaborately pre-planned; today in Afghanistan, aircraft and teams of ground troops work together from minute to minute on their own initiative. For the wars of tomorrow, the Pentagon's Joint Forces Command is experimenting with new task force headquarters that would deploy only a minimum of staff to a war zone. These headquarters would instead use networks to tap into centers of specialized expertise--military and civilian--back home, much as a small e-business start-up relies on contractors around the world. And a Chicago think tank, the Emergency Response & Research Institute, has proposed "virtual disaster networks" that can expand during a crisis to draw in whatever resources are needed to confront a given fire, flood, earthquake, or terrorist act. The local fire chief on the scene could link electronically to neighboring counties, National Guard units, state officials, the Federal Emergency Management Agency, and appropriate experts anywhere on Earth--perhaps chemists for a Bhopal-style chemical leak or nerve gas attack, or physicians at the Centers for Disease Control and Prevention for an anthrax or smallpox outbreak.

What's the organizational diagram for this future? There isn't one. Instead, there's an ad hocracy that pulls together everything it needs to solve the current problem, then dissolves. "Maybe a better word than `organization' would be `collaborative community,'" said Dave Ozolek, an experimenter at Joint Forces Command.

In this dizzying future, "the technology [is] simply the enabler," Ozolek added. "It's not just buying a commercially available product and getting everybody up on the same screen: It also requires organizational change and cultural change."

No wonder few want to do it. Change is just too hard. At least troops fighting in Afghanistan have a strong incentive: If they can get the new way to work, it will save lives, maybe their own. Back home in Washington, the only certainty is that sticking to the old way will save your job.

So it should be no surprise that the history of government technology projects is littered with overruns, delays, and projects killed outright because different offices could not agree on what to do. And sometimes the inherent flaws in some bureaucracies are so deep that a given agency has to be brought up a level or two before extensive change can be contemplated. Consider the Immigration and Naturalization Service contractors who issued visas recently to two terrorists who had died six months earlier, on 9/11. The problem there was not the lack of sophisticated network technology, it was a failure by humans to connect the names in the newspaper to the names on the visa applications. As tricky as the technical questions can be, said a senior IT consultant to the federal government, "the big problem is the lack of management skill in government."

With the rise of modern information technology, the tools exist to change literally everything the government does, from counter-terrorism to office management. The question is what government will do with them.
*********************
Government Executive
Central e-learning site for federal workers takes shape
By Brian Friel
bfriel@xxxxxxxxxxx


A Transportation Department Web site will be transformed into a one-stop e-learning portal for workers throughout the federal government, according to the Office of Personnel Management.


The Transportation Virtual University site will be recast as the National Learning Center, and will offer a host of courses to federal workers. These will include mandatory training in such areas as ethics and sexual harassment; managerial training in such topics as interviewing techniques; and computer courses in such areas as database management and Web development.



"You can call it a portal, a one-stop shop for online training," OPM Chief Information Officer Janet Barnes told Government Executive.



The e-training site is one of 24 e-government projects that the Bush administration is trying to complete by the end of 2003. Mark Forman, associate director for information technology and e-government at the Office of Management and Budget, is coordinating the projects, which also include a federal electronic recruiting portal, a centralized online rulemaking system and a one-stop federal grants site. The Chief Information Officers Council is helping to coordinate the projects.



Transportation Virtual University is run by the agency's Administrative Service Center. The center has pooled the services of about 60 e-learning companies on the site, including Nashua, N.H.-based SkillSoft and Naperville, Ill.-based NetG.



In addition to Transportation employees, employees from other agencies, including the Housing and Urban Development, Commerce and Veterans Affairs departments have taken courses at the Transportation Virtual University.



Several free courses are already available to employees across government via the National Learning Center prototype site, including courses in project management, Microsoft Office, sexual harassment and personal development.
*********************
Euromedia.net UK
Wanadoo to offer online music subscription service
16/05/2002 Editor: Sean Cornwell


Wanadoo , the European internet services and directories company and a subsidiary of France Telecom, has announced an agreement with On Demand Distribution (OD2) , a European distributor of digital music, to offer an online music subscription service to the 5.75 million customers of Wanadoo in France and in the UK.

The new subscription services will launch on Freeserve in early summer and to customers of Wanadoo in France later this year, with basic subscription packages starting at 8 Euros (£5) per month.

The service, powered by OD2, will offer music from artists signed to some of the world's leading music labels, including BMG, Warner Music, Mushroom, Telstar, V2 and Ministry of Sound, along with tracks from many independent record labels. More agreements with labels are expected.

Customers of Wanadoo in France and Freeserve in the UK will be offered a choice of options to suit their music and subscription preferences, including subscription by genre, a personal play list and permanent downloads.

Consumers of the new service in France and the UK will be offered the Download Manager to automatically download music of their choice, and music recordings will be encoded in the Microsoft Windows Media Audio format and secured with Microsoft DRM technology.

The move is part of the Wanadoo Group's strategy to position music as one of the pillars of its offering of high-speed access and premium content.

Wanadoo is rolling out high-speed broadband internet to consumers in both France, the Netherlands, Spain, Belgium, and in the UK through Freeserve.

Nicolas Dufourcq, Chief Executive Officer of Wanadoo Group, said: "This project..opens up the possibility of digital music distribution across a variety of platforms, including broadband, with a true pan-European reach."
*******************
CNET
Rogues on the web


Alberta's plan to post photos of high-risk crooks blasted by rights group

By RAQUEL EXNER-- Sun Media


EDMONTON -- The province of Alberta is setting up a Web site that posts photos and details of high-risk criminals, The Sun has learned - a plan that has city cops and civil-rights groups fearing it will increase vigilante action and drive more offenders underground.


There's no benefit to "branding" offenders, says Ed O'Neill, past-president of the Criminal Trial Lawyers' Association.

"It would arguably impede their rehabilitation (and) it does drive individuals underground," said O'Neill.

"People are reticent to obtain treatment.

"It's counter productive in many respects."

Police also worry the site will ruin the good rapport detectives have with offenders, and trigger extra work and expenses, said spokesman Wes Bellmore.

"It will more than double the work our dangerous offender unit needs to do," said Bellmore.

Any offender police issue a public warning about will be featured on the site - due to be running by month's end - for one year.

Police are to re-evaluate the risk of each individual annually before deciding if their mugs will remain on the site, which may also be retroactive and feature offenders who've already been the subject of public disclosures.

Bellmore said police currently have to give offenders notice when they issue a public disclosure and that will have to be re-served and re-assessed after a year - meaning a heavier workload for officers - if the convict's mug goes on the site.

Officers also expect some of offenders will object to having their photos on the Internet and that will mean more battles getting them to comply with parole conditions, he said.

But the province insists the information posted is simply for the public good and does not violate any privacy laws.

"The objective is to keep our community safe," said Jean Olynyk, spokesman for the solicitor general.

"Any information that would go up would only be information that the police have already made public."

Police have an obligation under Alberta's freedom of information and protection of privacy law to release information on offenders who pose a high risk to the public.

The law protects police from lawsuits as long as strict procedures are followed: the police chief must approve each warning, the offender must be notified and can object to the warning, and the offender can appeal the decision to the office of Alberta's information and privacy commissioner.

City police always emphasize that vigilante action is not to be taken but the last public disclosure issued in April for convicted sex offender James Holowenko resulted in him being punched several times by a group of people but not injured.

It was the first instance of a public disclosure that resulted in a physical attack.

Stephen Jenuth, president of the Alberta Civil Liberties Association, also fears the Web site will encourage more vigilantism but the biggest problem is one of privacy.

"It's not really designed to help us or protect us, but really it's a public policy type thing designed to help try to garner a few votes at the expense of some people," said Jenuth, who's also worried it will discourage offenders from becoming integrated into the community.

Police have kept tabs on more than 200 high-risk offenders since January 1997, and have done only 29 public disclosures during that period.
******************
Sydney Morning Herald
Sharp rise in computer crime in Australia
Sydney
May 20 2002



Computer crime in Australia has jumped sharply, despite record spending on IT security, a survey has found.


The 2002 Australian Computer Crime and Security Survey found 67 per cent of the 300 companies surveyed had fallen victim to computer crime this year, twice the amount recorded in 1999.

Yet 70 per cent of those organisations had increased security spending.

The survey was jointly produced by Deloitte Touche Tohmatsu, it security company AusCERT and the NSW police.

Deloitte's Head of IT Security Consulting Dean Kingsley said the survey showed not only the growing extent of computer crime in Australia but how the nature of the crimes had changed.



advertisement

advertisement

"Employees continue to represent a significant source of attack with 50 per cent of companies reporting security breaches from within," Mr Kingsley said.

"However, with the increase in e-business and networking between businesses, external attack is now for the first time the greatest threat, affecting 87 per cent of companies reporting security breaches."

Mr Kingsley said although organisations found it difficult to estimate financial loss because of cracking, it was evident computer crime was no longer just a nuisance.

But the surveyed showed 61 per cent of organisations surveyed failed to take legal action following a security breach.

NSW Commercial Crime Detective Superintendent Megan McGowan said the recent strengthening of the NSW Crime Act gave police powers to prosecute hackers simply for entering a company's computer system.

"They (companies) need to realise that what may appear to be benign is often a pathway to something more sinister," she said.

"Companies for various reasons are still too reluctant to involve the police but we can outsmart the hackers by working cooperatively."
********************
Sydney Morning Herald
Hotmail bid to cash in on users


Hotmail, the free e-mail service which was purchased by Microsoft some years back and is now part of the MSN Internet Service, has changed its users' "personal profile" settings by adding and pre-checking a new set of option boxes, according to an article in the Eastside Journal.

These boxes make it appear that the users have allowed Hotmail to share their email address, date of birth, occupation and other information with Web sites run by Microsoft's partners.

The Eastside Journal said 14 Hotmail users had confirmed that Microsoft made the switch at some point without getting their permission or giving them any notice. The change allows any of Microsoft's partners to send uncolicited commercial email, which is also known as spam, to people.

In March, Yahoo did the same thing after changing its members' preferences. The resulting reaction led Yahoo to send out a notice about the changes.

MSN has not changed its privacy settings or its privacy policy to reflect this change, according to the report. The statement of privacy says: "Hotmail will not share your e-mail (sic) address with (Microsoft's) business partners" and "none of your personally identifiable information is shared with the third party Web sites."

Adding insult to injury as it were, Microsoft is trying to get Hotmail users to pay $US19.95 a year for 10 MB of extra email storage. Hotmail is used by over 115 million people.

This story was found at: http://www.smh.com.au/articles/2002/05/17/1021544063692.html
*************************
Sydney Morning Herald
Protecting the extension of your personal space
By Andy Polaine
May 14 2002


Mobile phones are becoming increasingly personal devices, allowing ever-higher degrees of customisation. The car is the only other technology with which we have such an intimate relationship and a large part of this rapport comes from these technologies being an extension of our personal space. Unlike our televisions or PCs, which we turn off and walk away from, we carry our phones everywhere, along with our car keys and wallet. They contain our most intimate phone numbers and give others direct access to us. They allow us to exchange messages via SMS and are a social, commercial and, sometimes, emergency lifeline.

It is precisely because phones and PDAs are so personal that wireless spam is so intrusive. Users tend to react quickly and extremely negatively to marketing messages that are sent without permission. Recently in the UK, supermarket giant Sainsbury's used an SMS to advertise 400 jobs at a store it was opening. Sainsbury's had obtained the phone numbers from a direct marketing agency and the message began "I wnt u, I need u, I cnt get enuff of u" before going on to advertise the jobs along with the phone number of a job centre to call. Although the ad was targeting a youth demographic, the job centre was bombarded with complaints within minutes. The complaints ranged from people concerned with where Sainsbury's obtained their numbers to those whose partners suspected them of infidelity.

According to ZDNet UK, Sainsbury's media officer was less than repentant saying, "It has been a success. We have had 80 inquiries in the two days before the ad was withdrawn."

This suggests that it is OK to spam people if it gets results. Nikki Murrell, wireless Internet analyst at Ovum, says that, with this approach, everyone loses. "Operators risk increased churn," she says. "Vendors risk losing brand equity and, if SMS spam is permitted to grow in the way that e-mail spam has flourished, users are likely to dismiss all SMS-based marketing material, even if they have asked to receive it."

On NTT DoCoMo's network in Japan the situation is further advanced, with heavy spamming and viruses already a problem. Last year, phones on the network were infected with a virus that randomly dialled the emergency services. Some customers found themselves having to explain themselves to the police - prank calls to emergency services are illegal. This forced NTT DoCoMo into adopting anti-spam measures such as only allowing a fixed number of domains to message the user's phone and incorporating anti-virus software in future handsets.

Andrew Scott, a researcher in 3G networks at Telstra, says that, in Australia, it still costs the sender something to send out an SMS, so it is not yet attractive to spammers. However, as we move forward in IP-based systems, this is set to change. "Spam becomes a huge issue," Scott says. "DoCoMo has real problems."

NTT DoCoMo's network architecture is relatively open, allowing spammers to use IP-based services to send out bulk text messages that cost nothing. The problem is compounded by the fact that, on packet-based networks, the customer is paying for all the data they receive, including spam. NTT DoCoMo has resorted to crediting its customers with 400 packets of data a month as a buffer to incoming spam and the associated cost.

I recently travelled through Singapore on my way to Europe and when I turned my phone on in the airport I was immediately sent two text messages from Optus/Sing-Tel. The messages welcomed me to Singapore and told me the exchange rate. I found this novel and also useful but any more would have been intrusive. But Ovum's Murrell points out that Japan already has shops messaging adverts and vouchers to customers as they walk past. Future developments look likely to focus on location-based marketing.

As a result, a market is opening up for intelligent agents that deal with these messages on our behalf. Rocking Frog is a wireless data technology business within BTexact Technologies' corporate incubator Brightstar in the UK. Its aim is to enhance users' relationship with their devices and the world around them by providing relevant, timely, personal and business information appropriate to their location and profile. The user's profile is created when an account is first established and can be modified via a wired or wireless Web interface. The software then modifies the importance of information it

offers based on usage. Immediate benefits are simply finding a service (such as a restaurant) nearby, without having to surf the wireless Web. Your profile already knows you like Italian and gives you the choice of the three restaurants in walking distance.

Rocking Frog ensures the user is always in control, however, it envisages a time when profiles may act on the user's behalf. "While shopping in a department store, your profile communicates with the store's 'objectives' and arrives at an agreement," suggests one of the designers. "New socks, black, cotton, special offer - up one floor and turn left."

MIT and other institutions are researching Augmented Reality (AR), in which information is displayed in the user's field of vision, either by projecting on to special glasses or directly on to the retina. Applications for AR range from military and medical to street directions and advertising.

To display information over the top of the real world, AR knows exactly where you are and even in which direction you are looking, wirelessly. There is potential to overlay virtual advertisements on your view of the world, a technique used in televised sporting events where computer-generated ads appear to be painted on to the pitch.

Although most governments are looking to legislation to outlaw spamming, perhaps the winning combination will be the network whose software agents are smart enough to tread the fine line between advertising and "timely information". Certainly it seems there is potential for battle between advertising or even security agents and those of the user. One thing is certain: our digital assistants look set to become even more personal and part of our intimate lives.

"The phone will be the most personal device someone owns, next to their underpants," says the designer at Rocking Frog.

Andy Polaine is a Sydney-based interactive design consultant and writer.
************************
Peoples Daily
Outlining Proper Uses Going Online

Internet bars are a favourite gathering place among young people, but a new regulation on these establishments now stipulates who and when they can go.

Internet bars are a favourite gathering place among young people, but a new regulation on these establishments now stipulates who and when they can go.

Under the latest State regulation, young people under the age of 16 can only go to Internet bars with their guardians. Minors can only stay in Internet bars no longer than three hours, even on holidays.

The regulation comes after several cases where young people have suffered abnormal behaviour as they become addicted to computer use at Internet bars.

Among the extremes is a 17-year old student in Nanchang in East China's Jiangxi Province who died suddenly after playing Internet games for many hours at an Internet bar.

In another case, a young student disappeared for more than 20 days. His parents employed a private detective and found him at an Internet bar.

The aim of the regulation is understood, since minors cannot control their behaviour and can get easily addicted to new fads.

Interference from regulators therefore, is necessary and even indispensable for the youth.


But policy-makers may have gone awry by imposing such rigid restrictions on young people.
The Internet provides a simple and low-cost channel for people to connect to the outside world. It is invaluable for young people to choose to learn what is happening on the other side of the globe instantly and conveniently.


It is a good learning tool, which the young can benefit much from.

Since not many Chinese families have purchased computers, many young people resort to Internet bars.

Such rigid rules, however, lay obstacles to the convenient use of such an educational tool.

To prevent young people from logging on to websites that have improper content such as violence, sex and undesirous games, Internet bars should install software that can block entry to such websites.

Bar owners who allow young people to play games for long periods of time should also be punished.
*******************
Wired News
Radio ID Tags: Beyond Bar Codes


An emerging technology could usurp the ubiquitous bar code's quarter-century of quiet domination.
Radio frequency identification (RFID) tags, which consist of silicon chips and an antenna that can transmit data to a wireless receiver, could one day be used to track everything from soda cans to cereal boxes.


Unlike bar codes, which need to be scanned manually and read individually (you have to actually see a bar code in order to read it), radio ID tags do not require line-of-site for reading. Within the field of a wireless reading device, it is possible to automatically read hundreds of tags a second.

Not only can these tags be read faster than bar codes, they also contain more information, so they can recall items more efficiently.

"This is the basis of the next 50 years of computing," said Kevin Ashton, executive director of MIT's Auto-ID Center. "The impact will be staggering."

The applications for this technology are seemingly endless. Radio ID tags can be installed in clothing labels, books, packaging, or even implanted beneath skin.

MIT's Auto-ID Center is developing ways to use the tags in consumer product packages with blue chip companies such as Procter & Gamble, Wal-Mart, Gillette, Unilever, Target, Pepsi and Coca-Cola.

Retailing behemoths such as Wal-Mart (WMT) and Home Depot (HD) are investing heavily in Auto-ID's technology to improve supply-chain efficiency and track products from the warehouse to the consumer's doorstep.

"The supply chain today is a black box," Ashton said. "There is very little accurate data about where things are, what they are, how much there is."

"This technology won't just improve the supply chain -- it will revolutionize it in ways we are only just beginning to understand," Ashton said. "Computers are basically blind today. The technology we are developing will enable them to see, for the first time ever."

RFID systems originated in the 1940s, when the U.S. government used transponders to distinguish friendly aircraft from enemy aircraft. Through the 1970s, the federal government primarily used the systems for projects like tracking livestock and nuclear material.

Radio tags have been used commercially for delivering packages, handling luggage, tracking food in supermarkets and monitoring highway tolls.

The airline industry, along with the FAA, has used RFID tags to route baggage and increase air security. McDonald's and ExxonMobile are testing RFID chips to allow customers to pay for food or gas.

The Auto-ID Center is in the final stages of developing a standard way for RFID tags to communicate. The standard could be implemented in a mass production tag that would cost about 5 cents.

Auto-ID researchers recommend placing a 64-bit (or 96-bit, depending on the version) number called an electronic product code (EPC) on an RFID tag. The EPC identifies every inventoried item with a unique serial number.

Approximately 20 companies are participating in what may be the largest scale RFID test to date, prototyping tags based on the Auto-ID Center's protocol.

"Basically, we are doing everything we can to make RFID a mass-production technology," Ashton said.

According to researchers, companies will be able to use smart tags to connect everyday objects to the Internet, potentially saving billions of dollars in lost, stolen or wasted products.

For example, a smart-shelf could tell when a carton of milk or a box of medicine has expired, alerting a store to restock in real time. This type of system could prevent out-of-stock merchandise and reduce obsolete or out-of-date products.

The success of RFID in the mass market ultimately depends upon tying the technology to an open standard network like the Internet, according to researchers.

"The Internet is absolutely crucial for all this," Ashton said. "(The Internet) enables us to put all the data on the network, not the tag, and that makes tags cheaper, better, faster. By the end of this decade, a majority of the data moving across the Internet could well be EPC related."

"We can make the tags cheap by transmitting most of the information on the Internet," agreed Auto-ID Center research director Sanjay Sarma.

According to an Auto-ID Center survey, approximately half of the center's sponsors said they can imagine these tags making a significant impact on their business in the next 2 to 3 years, and many anticipate needing billions of EPC tags by the end of the decade.
Researchers believe that eventually the technology could be used to improve health care, public safety and recycling.


"This isn't just a technology that can help save money," Ashton said. "Used properly, it can help save lives, it can help save the environment."

Despite the promise of this technology, cost and lack of standards have been a major barrier for widespread adoption.

Today, tags cost upwards of 50 cents each. Until the cost of RFID tags drops to less than a nickel, it's unlikely that this technology will see mass-consumer use, experts say.

Researchers believe that the goal of the five cents tag (PDF) is attainable.

"I have little doubt that a five-cent tag is achievable in the next few years, if a market of the right size emerges," Ashton said. "We're probably looking at five cents (tags) in 2005."

Some privacy advocates are concerned that organizations like insurance companies will want to use collected information to track individual consumers.

"Privacy is our biggest single research area," Ashton said. "We need to make sure the technology is not a threat to anyone's privacy and we need to make sure everyone is comfortable with that -- we can't just expect the world to take our word for it."

The Auto-ID center has designed privacy protection measures into the ePC system. The chips contain no useful data -- just a unique code number that refers to information held remotely on the Internet. Access to this information is restricted and controlled. The tags cannot be read through walls or from more than about five feet away.

The Uniform Code Council, creator of the bar code, has endorsed the Auto-ID Center's efforts.

Once costs come down, RFID could become as pervasive as bar codes are today.

"It will probably become more ubiquitous than bar codes, in decades to come -- simply because it is the difference between being blind and being able to see," Ashton said.

Insiders predict that it will take at least three years for smart tags to become pervasive in businesses, and even longer for consumers to adopt the technology at home.

"I wouldn't be at all surprised if there were still bar codes on things 30 years from now," Ashton said. "I also wouldn't be at all surprised if there were ePCs on everything 30 years from now."
******************
Computerworld
FBI wants to know who took 13,000 credit reports
By BRIAN SULLIVAN
MAY 17, 2002


The FBI is investigating how someone made off with 13,000 credit reports from a credit reporting agency, Experian Information Solutions Inc., during a 10-month period by posing as a Ford Motor Credit Co. employee.
According to a letter and statement sent out by Dearborn, Mich.-based Ford Motor Credit, someone collected private information, including the work and home addresses, Social Security numbers, account numbers and credit history of 13,000 people, mostly from affluent neighborhoods around the country. Most of the people weren't Ford customers.


Ford spokesman Dan Jarvis said the company became aware of the breach in March when it was contacted by Orange, Calif.-based Experian, a subsidiary of London-based GUS PLC. Experian customers had complained that Ford Motor Credit had conducted credit checks on them even though they hadn't had any contact with the automaker.

Jarvis said the fraudulent credit checks were distinguished from the legitimate Ford checks because the software the fraudster used was different from Ford's. It isn't clear whether the theft came from a hacker who broke into Ford's system and the company refuses to say how it believes the breach occurred, Jarvis said.

"We're waiting for the FBI to tell us," he said.

Experian spokesman Don Girard said he is still not sure that a hacker was responsible for the breach.

"One scenario could be that an access code was pilfered within Ford," Girard said. Experian gives large companies access codes with which they can gather credit information on potential customers.

"Who we don't give access codes to is Joe Shmo who runs a pawn shop down the street," Girard said.

Girard said no matter how the intruder got the information, Experian will press for prosecution to the fullest extent of the law.


Chris Hoofnagle, legislative counsel for the Washington-based Electronic Privacy Information Center (EPIC), said he wasn't surprised at the ease with which someone made off with the information.


"There is not a lot of market incentive, aside from lawsuits, for the credit agencies to be more responsible," Hoofnagle said. He said credit-reporting agencies have "poor business practices" and don't place thorough safeguards on consumers' private information. He said the agencies should require greater authentication before sending out such information.

Both Hoofnagle and U.S. Federal Trade Commission spokeswoman Claudia Bourne Farrell said the incident reinforces the need for consumers to get copies of their credit reports annually to check for suspicious entries.

Farrell said tracking how many cases of identity theft happen each year is hard to do because many different agencies gather such information. But in 2001, she said, the FTC received 86,182 complaints -- and the average time between when a theft occurs and a consumer notices is 14 months.

Ford said consumers who discover any fraudulent entries should contact the Detroit office of the FBI or call a Ford hotline: 888-838-8176, between 7 a.m. and 8 p.m. CDT, Monday through Saturday.
********************
CNET
Broadband hits a high note
By Margaret Kane
Staff Writer, CNET News.com
May 20, 2002, 11:25 AM PT
http://news.com.com/2100-1033-917952.html


Broadband usage continues to grow rapidly, with a more than 50 percent increase in major cities, according to a new report.
Overall, more than 25.2 million consumers went online using cable modems, digital subscriber lines, ISDN or local area networks in April, a 58 percent increase from the previous year, and a 7 percent increase from March, according to a new report from market researcher Nielsen/NetRatings.


"While some barriers exist to broadband expansion such as increasing costs, there is healthy room for additional growth and adoption of broadband," analyst TS Kelly said in a release. "The largest broadband cities continue to grow."

Indeed, the top two broadband cities, New York and Los Angeles, saw the number of subscribers grow more than 70 percent year over year. New York now has 2.78 million high-speed Internet users, while Los Angeles has 1.76 million. The top five cities were rounded out by Boston, San Francisco and Philadelphia.

The top cities seemed to defy the law of large numbers, with some of the fastest-growing cities having the largest percentage increases year over year. Among the 20 cities with the most broadband users, Orlando, Fla., saw the most growth, with the number of broadband users rising 183 percent year over year to 401,000 in April 2002.

***********************

Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 507
1100 Seventeenth Street, NW
Washington, D.C. 20036-4632
202-659-9711