Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 15 Issue 16

eZine's profile picture
Published in 
Atari Online News Etc
 · 5 years ago

  

Volume 15, Issue 16 Atari Online News, Etc. April 19, 2013


Published and Copyright (c) 1999 - 2013
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:

Fred Horvat



To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #1516 04/19/13

~ Boston Area Lockdown! ~ People Are Talking! ~ Support for CISPA!
~ Anonymous CISPA Protest ~ Bombings Are Scam Bait! ~ Bring Back "Start"!
~ Capcom Halves Forecast! ~ Web Sales Tax Vote Soon ~ Mobile Web Browsing

-* "Aggressive" In-App Purchases *-
-* House Passes the Cybersecurity Bill *-
-* White House Threatens Veto on Cybersecurity *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



Boston Strong, Boston Proud! That is the mantra being shouted throughout the
city and surrounding areas tonight. On Monday, as most of you are probably
aware, there were two explosions at the Boston Marathon. Three spectators
were killed, and almost two hundred fans were injured - many critically.

After countless hours of tips and investigation, possible suspects were
determined, and a massive manhunt ensued to track them down. On Thursday
evening, early Friday morning, the suspects were involved in more horrific
terrorist activities; and one suspect was killed. The other managed to
escape the immediate area, and another manhunt began.

In the neighboring town of Watertown, the investigation continued throughout
the day today. Late this evening, the second suspect was discovered holed
up in boat sitting in a neighborhood yard. After an exchange of gunfire,
the suspect was taken into custody and brought to an area hospital.

Also, three additional suspects were detained and in custody in a city
south of Boston. No information regarding the relation to the Marathon
bombings has been publicized yet, but surely any connection will become
known soon.

Hopefully, this will be some closure to the week's events, and some justice
will be served for the victims of the events of this week. As a former
resident of some of the neighborhoods near where some of these tragedies
occurred this week, I feel a sense of community because I recognized some
of the areas directly affected. And, as a resident of a town less than
20 miles from Boston, we feel that we're still a part of that area. As
a resident of Massachusetts, I'm elated that all of the various law
enforcement agencies were able to work together effectively, keep the public
safe, and capture these two suspects (one suspect was ultimately killed).
The people of Boston and surrounding areas now have a reason to utter a
huge sigh of relief, and might be able to get some much-needed sleep tonight.

Until next time...



=~=~=~=



->In This Week's Gaming Section - Capcom Halves Forecast, Blames "Excessive Outsourcing"!
""""""""""""""""""""""""""""" UK Government To Investigate 'Aggressive' In-app Purchases





=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



Capcom Halves Forecast, Blames "Excessive Outsourcing"


Capcom has revised down sales forecasts for its big games of the last
year, blaming "excessive outsourcing" for hindering the quality of the
finished products, among other factors.

In a note to investors, the company reports that it's halving its profit
forecast due to planned restructuring of the company in a bid to
modernise the business.

It explains, "In view of the sudden and significant changes in the
operating environment of the digital contents business, Capcom reviewed
its business expansion strategy for the sector and restructured its game
development organization."

An accompanying presentation reveals that this will mean "the
discontinuation of development of titles" that have yet to be announced,
including overseas outsourced projects that are "no more compatible with
the current business strategy."

The other factor behind the downcast of profits is revised sales figures
for the likes of Resident Evil 6, Monster Hunter and DmC: Devil May Cry.
The company now predicts it'll shift 4.9 million copies of Resi 6; when
the game first launched, this number was 7 million. For DmC, the number's
gone down to 1.15 million when it was originally 2 million.

Three reasons were given for the disappointing sales: a "delayed response
to the expanding digital contents market"; "insufficient coordination
between the marketing and the game development divisions in overseas
markets"; and, most interestingly, a "decline in quality due to excessive
outsourcing".

While we don't know whether Monster Hunter 4 will be released in the west,
the company still has a number of exciting projects due to release this
financial year including Remember Me and Deep Down.



UK Government To Investigate 'Aggressive' In-app Purchases


The UK Government will be examining whether free to download apps are
putting unfair pressure on kids to pay up for additional content within
the game through in-app purchases.

Office of Fair Trading, UK, will be carrying out the investigation of
games that include ‘commercially aggressive’ in-app purchases after a
number of cases have been reported whereby parents have incurred huge
bills after their kids have spent huge amounts on in-app purchases.

February, this year, saw 5-year old Danny Kitchen spending £1700 on in-app
purchases while playing the otherwise free Zombies vs. Ninjas game.
Similar was the case with Cameron Crossan unwittingly spent over £3700 on
in-app purchases. We believe they could have averted it if they would have
turned off in-app purchases in their iOS devices.

OFT wants to hear from parents who believe or have otherwise dealt with
games / apps that push children to buy in-game content. Generally there
are objects such as gems or coins within games, which if bought, will
allow kids to advance through the games faster. Such tactics may lure kids
to go ahead with in-app purchases.

Cavendish Elithorn, OFT's Senior Director, said "We are concerned that
children and their parents could be subject to unfair pressure to purchase
when they are playing games they thought were free, but which can actually
run up substantial costs." The government is not looking to ban in-app
purchases but it wants to be sure that the game developers are complying
with the relevant laws.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



White House Threatens Veto of House Cybersecurity Bill


The White House on Tuesday threatened to veto a House of Representatives
bill aimed at improving U.S. cybersecurity, citing among other things
concerns about privacy protections.

In a repeat of last year's events, the Obama administration issued a new
veto threat on the cybersecurity bill co-authored by House Intelligence
Committee Chairman Mike Rogers, saying it needed to better protect
private information and gave too much liability protection to companies.

"The Administration still seeks additional improvements and if the bill,
as currently crafted, were presented to the president, his senior
advisors would recommend that he veto the bill," the statement of
administration policy said on Tuesday.

The House is expected to vote on the bill later this week.

To try to gain support of the White House and in an effort to appease
concerns of civil liberties groups, Intelligence Committee leaders made
some changes to the wording of the bill, which is very similar to a bill
passed by the House in 2012 that focused on helping companies and the
U.S. government share information on cyber threats.

Changes this year include a provision preventing companies from using
information they receive for anything but cybersecurity purposes. It also
includes added roles for privacy and civil liberties oversight.

"The Committee adopted several amendments to (the bill) in a good faith
effort to incorporate some of the administration's important substantive
concerns. However (it) ... still does not address these fundamental
priorities adequately," said Caitlin Hayden, a National Security Council
spokeswoman.

In 2012, legislation authored by Rogers and Democrat Dutch Ruppersberger
passed the House but died in the Democratic-controlled Senate after
President Barack Obama similarly threatened to veto it.

The White House has sought a more comprehensive piece of legislation that
would also set minimum security standards for critical companies.

Michelle Richardson of the American Civil Liberties Union on Tuesday called
the veto threat "completely justified" and said it did not bode well for
the bill's future in the Senate.

Rogers' office did not immediately comment.



House Passes Cybersecurity Bill As Privacy Concerns Linger


The House of Representatives passed legislation on Thursday designed to
help companies and the government share information on cyber threats,
though concerns linger about the amount of protection the bill offers for
private information.

This is the second go-around for the Cyber Intelligence Sharing and
Protection Act after it passed the House last year but stalled in the
Senate after President Barack Obama threatened to veto it over privacy
concerns.

The bill drew support from House Democrats, passing on a bipartisan vote
of 288-127, although the White House repeated its veto threat on Tuesday
if further civil liberties protections are not added.

Some lawmakers and privacy activists worry that the legislation would
allow the government to monitor citizens' private information and
companies to misuse it.

U.S. authorities have recently elevated the exposure to Internet hacks and
theft of digital data to the list of top threats to national security and
the economy.

Though thousands of companies have long been losing data to hackers in
China and elsewhere, the number of parties publicly admitting such loss
has been growing. The bill's supporters say a new law is needed to let
the government share threat information with entities that don't have
security clearances.

"If you want to take a shot across China's bow, this is the answer," said
the House bill's Republican co-author and Intelligence Committee Chairman
Mike Rogers.

While groups such as the American Civil Liberties Union are displeased,
House Democratic Whip Steny Hoyer called the new version of the bill "a
significant improvement from what was passed last year."

Senator Jay Rockefeller, the West Virginia Democrat who chairs the Senate
Commerce Committee, said he will work with Republican Senator John Thune
of South Dakota and leaders of other committees to bring cyber legislation
to a vote in the Senate as soon as possible.

"Today's action in the House is important, even if CISPA's privacy
protections are insufficient," Rockefeller said in a statement. "There is
too much at stake - our economic and national security - for Congress to
fail to act."

House Intelligence Committee leaders have made refinements and endorsed
several amendments to the bill to try to put to rest some of the privacy
concerns. In particular, these specify that the Department of Homeland
Security and the Department of Justice rather than any military agencies
would be the clearinghouses of the digital data to be exchanged - to
"give it a civilian face," as Rogers put it.

"We felt very strongly that it had to be civil," said the bill's
Democratic co-author Dutch Ruppersberger of Maryland. "If you don't have
security, you don't have privacy."

House Democratic leader Nancy Pelosi reflected concerns shared by the
White House and many civil liberties groups, that the bill did not do
enough to ensure that companies, in sharing cyber threat data with the
government and each other, strip out any personal data of private
citizens.

"They can just ship the whole kit and caboodle and we're saying minimize
what is relevant to our national security," Pelosi said. "The rest is none
of the government's business."

Still, the future of cybersecurity legislation in the Senate remains
unclear, given Obama's veto threat and the lingering concerns of many
privacy-focused lawmakers and groups.

Late Thursday, the Obama administration reiterated that cybersecurity is
a top priority and said it would work with both parties to build on the
House legislation and get a bill through the Senate.

"While CISPA has been improved in each of the administration's priority
areas since its introduction this year, the bill does not yet adequately
address our fundamental concerns," said Laura Lucas, a spokeswoman for
the White House's National Security Council. "We are hopeful that
continued bipartisan, bicameral collaboration to incorporate our core
priorities will produce cybersecurity legislation that addresses these
critical issues and that the president can sign into law."

Industry groups that supported the measure welcomed the House's action.

Backers included the wireless group CTIA, the U.S. Chamber of Commerce and
TechNet, which represents big technology companies such as Google Inc,
Apple Inc, Yahoo! Inc and Cisco Systems Inc.



Boston Residents on Lockdown Share Fear on Twitter, Facebook


As Boston has been put on lockdown as authorities conduct a "massive
manhunt" to find the second Boston Marathon bombing suspect, residents of
the city have taken to Facebook and Twitter to share with friends and
family that while they are frightened, they are safe and remaining
indoors.

At 7:19 a.m. this morning Juliana Hatfield (@julianahatfield) tweeted a
photo of a sign that was left on her door by police in the City of
Cambridge. She also told her followers that "I'm fine - thanks for the
concern, everyone … i wasn't planning on leaving my apartment today
anyway - now i have more."

i fell asleep to the sound of helicopters overhead and woke up to this on
my front door-whoa twitter.com/julianahatfiel…

— Juliana Hatfield (@julianahatfield) April 19, 2013

"Residents of Watertown asked to stay indoors," the Boston Police
Department tweeted. "Do not answer door unless instructed by a police
officer." Public transportation has been suspended and authorities told
people at closed stops and stations to go home. The situation is scary, to
say the least. In fact, #scared was a trending term on Twitter in Boston
this morning.

I wish I could say that I'm not scared, but I've never been more terrified
in my life.

— Kenny Benjamin (@KennyBenjamin) April 19, 2013

I shouldn't be scared to live in my own city #Boston

— Eliza Gulbis (@ElizaGabrielle) April 19, 2013

I'm seriously scared right now. Way to close to my house. (2blcks)Afraid
of explosives. Everything. Be safe people #watertown #bostonstrong

— Barry (@barrygagne) April 19, 2013

I miss the days when we stayed home because it snowed. #Boston

— Carl (@CMorriss87) April 19, 2013

Many others, who weren't even in Boston, also shared their fear for the
people living in the city.

And like we saw on Monday after the bombing, the non-Boston community, has
been sharing their support and prayers for the community.

#PRAYERS for Boston & This World.

— Steve Smith (@steve21smith) April 19, 2013

Wow. thinking about Boston and the surrounding areas. Sending love and
prayers.

— Sara Bareilles (@SaraBareilles) April 19, 2013



Boston Bombings Used as Malware Scam Bait


Just hours after the Boston Marathon bombings Monday (April 15), scammers
were already using the tragedy to fuel their malware campaigns, according
to a study by Romanian anti-virus firm Bitdefender.

The study found that the words "marathon," "Boston" and "explosion" found
their way into the subject headers of one out of every five spam messages
in the hours and days following the event.

The use of news events to spread malware is nothing new for scammers. Just
last month, scammers used the news of the pope's installment as bait for
email victims. Emails containing links to malware-laden sites were
circulated with subject lines such as "New Pope Sued for Not Wearing
Seatbelt in Popemobile."

But this week’s spam strikes a more somber note. With subject headers such
as "Aftermath to Explosion at Boston Marathon" and "Boston Explosion
Caught on Video," these emails aim to ensnare those looking for more
information about the attacks.

According to Bitdefender's Hot for Security blog, the emails contain links
to malicious websites using URLs ending with "news.html" and
"boston.html."

How to Avoid Boston-Bombing Online Scams

When clicked, the links direct users to a seemingly innocuous YouTube page
displaying videos of the bombings. But after a short delay, an executable
file is activated and the malware installs itself on victims' computers.

Bitdefender identified the malware as Trojan.GenericKDZ.14575, a component
of the infamous RedKit browser exploit pack — the same malware that
recently infected visitors to the NBC website.

The Trojan is a password stealer that can grab users’ account passwords
directly from their browsers. The malware also monitors network traffic of
infected computers and may be used to steal Bitcoin wallets, send emails
and download other malware.

As TechNewsDaily reported in the hours following the Boston bombings,
Internet users need to remain alert in the wake of major news events.

Be wary of unsolicited emails, even those you receive from friends. If you
want to donate to victims, do so only through charity organizations you
know and trust.

Last but not least, make sure your anti-virus software warns your Web
browser about malicious links.



Tech Group Representing Google, Yahoo Backs CISPA


A trade association that represents Google, Yahoo, Cisco and Oracle has
come out in support of a controversial cybersecurity bill that is slated
to be voted on in the House next week.

In a letter sent to the leaders of the House Intelligence panel on
Wednesday, TechNet CEO Rey Ramsey said the cybersecurity bill addresses
the need for industry and government to be able to send and receive
information about cyber threats to one another in real time. He also
commended the Intelligence panel leaders for taking steps to address
privacy concerns with their bill, the Cyber Intelligence Sharing and
Protection Act (CISPA), but also said the trade group looked forward to
continuing talks on "further privacy protections."

"We commend the committee for providing liability protections to companies
participating in voluntary information-sharing and applaud the committee's
efforts to work with a wide range of stakeholders to address issues such
as strengthening privacy protections," Ramsey writes. "As the legislative
process unfolds, we look forward to continuing the dialogue with you and
your colleagues on further privacy protections, including discussions on
the role of a civilian interface for information sharing."

Privacy and civil liberties groups have been pushing for the bill to be
amended so it would put a civilian agency, like the Department of Homeland
Security, in charge of information-sharing efforts between industry and
the government. Privacy advocates have argued that a civilian agency
should be in charge of receiving cyber threat data, such as malicious
source code, from companies first before passing it on to other
intelligence agencies, such as the National Security Agency.

The bill would allow companies to share cyber threat data directly with
the NSA, along with other government agencies.

While privacy groups have staunchly opposed CISPA, it has received backing
from several industry groups, such as the U.S. Chamber of Commerce and
Information Technology Industry Council.

Several high-profile tech executives sit on TechNet's executive council,
including Yahoo CEO Marissa Mayer, Google Executive Chairman Eric Schmidt,
Oracle President Safra Catz and venture capitalist John Doerr. A list of
the members on TechNet's executive council are printed on the letter that
the trade group sent to House Intelligence Chairman Mike Rogers (R-Mich.)
and Dutch Ruppersberger (D-Md.).

CISPA is aimed at encouraging industry and the government to share
information about malicious source code and other online threats with each
other in real time, so companies and government agencies can take steps to
thwart cyberattacks.

The bill is intended to remove the legal hurdles that discourage companies
from sharing cyber threat data with the government. Companies have said
they are hesitant to share threat information with the government because
it may result in legal action against them.

CISPA passed the House Intelligence panel on a 18-2 vote on Wednesday and
is headed to the House floor for a vote next week. Reps. Adam Schiff
(D-Calif.) and Jan Schakowsky (D-Ill.) voted against the measure, citing
privacy concerns.

The White House issued a veto threat against CISPA last year, in part,
because of concerns that it lacked sufficient privacy protections for
people's information online.

Following Wednesday's markup, a White House spokeswoman said the changes
adopted to CISPA "reflect a good faith effort" to address some of the
substantive concerns it has with the measure, but don't go far enough to
solve its "fundamental" issues with the bill.



Anonymous Calls for ‘Internet Blackout Day’ To Protest CISPA


The Cyber Intelligence Sharing and Protection Act (CISPA), which passed
the House of Representatives this week, has drawn a lot of criticism from
activist groups such as the Electronic Frontier Foundation for potentially
undermining users’ online privacy. In particular, the EFF has said that
the bill gives Internet companies the right “to monitor user actions and
share data – including potentially sensitive user data – with the
government without a warrant” and also “overrides existing privacy law,
and grants broad immunities to participating companies.”

Hacker collective Anonymous this week called for a massive online protest
against CISPA to occur on April 22nd through an “Internet Blackout Day” by
asking “web developers and website owners to go dark” and to also “display
a message as to why you are going dark, and encourage others to do the
same.” The group’s call for an online blackout day echoes a similar
protest that occurred last year against the Stop Online Piracy Act (SOPA)
in which Reddit and Wikipedia both went dark to protest the bill while
Google blacked out its famous Google doodle to symbolize its opposition.



Senate Edges Closer To Vote on Internet Sales Tax


Legislation giving states the power to compel retailers outside their
borders to collect online sales taxes, a touchy subject for Internet
merchants, is likely to move forward in the Senate next week.

Senate Majority Leader Harry Reid on Thursday filed a motion in support of
the measure. Currently, states rely on consumers to self-report, which
they rarely do.

If approved, the change would be a win for brick-and-mortar stores like
Wal-Mart Stores Inc., the world's biggest retailer, which backs the
legislation.

At the moment, states can only require online merchants with physical
stores or affiliates within their borders to collect sales tax, giving
online-only retailers such as Amazon.com Inc a price advantage in many
markets.

As a results of Reid's motion, the Senate was expected to vote on Monday
on whether to end debate and move the measure forward. A vote on the
legislation could come later in the week. Backers say they have the 60
votes needed to end debate.

Momentum has been building since 75 of 100 senators last month voted for a
nonbinding version of the bill. The road ahead for the measure is bumpier
in the House of Representatives, where some Republicans view it as a tax
hike.

One House sponsor, conservative Representative Steve Womack, has been
lobbying fellow Republicans to support the measure, according to an aide.

But Republican Bob Goodlatte, chairman of the Judiciary Committee, where
the bill would have to go through, said he is skeptical.

"While it attempts to make tax collection simpler, it still has a long way
to go," Goodlatte said.

Womack is from Arkansas, home of Walmart. Amazon.com also supports the
measure, but others including eBay Inc oppose it.



Microsoft Told To Bring Back Start Button


While Windows 8 has a lot going for it, it’s also proven to be a very
polarizing operating system that many users have criticized for departing
too much from earlier versions. The most common complaint lobbed at
Windows 8 is that it lacks the classic Start button that Microsoft users
have long relied on as a central navigation tool. But with rumors
percolating that Microsoft is considering dialing back some of the changes
it made to Windows with the next major update to the operating system,
Forrester analyst J.P. Gownder is encouraging the company to go all-out
and bring back the Start button as a nod to users’ constructive
criticisms.

“Numerous Start Button emulators with names like StartIsBack, Pokki, and
StartMenu are proliferating — and many of them are free,” Gownder writes.
“Yet I&O departments can’t support users easily with these emulators and
would prefer a Start Button that’s simply part of the OS.”

Gownder also addresses potential concerns that Microsoft may have about
selling its vision of touch-enabled PCs short by bringing back the Start
button. In essence, Gownder thinks users will happily accept the return
of the Start button and will be thankful to the company for taking their
concerns into account.

“During the period when the Windows Store’s modern UI apps continue to
grow in number and sophistication, Windows 8 users need to have the
strongest possible Desktop Mode experience,” he writes. “Empowering users
with familiar tools wouldn’t be a sign of surrender, but rather a sign
that Microsoft listens to its customers.”



Mobile Web Browsing Not Great, Says Mozilla CEO


Chances are you spend most of your time in apps on your phone, while the
web browser takes a backseat. Mozilla, the maker of the popular Firefox
browser, acknowledges that the industry has fallen short in improving
mobile web browsers.

"We haven't done a great job [on mobile browsing]. I'm expecting someone
will do a Apple on the whole browsing experience," Mozilla CEO Gary Kovacs
said at the All Things D: Dive Into Mobile conference today in New York
City.

Kovacs is referring to, of course, how Apple revolutionized or changed the
entire phone business with the iPhone. He added that he anticipates that
at some point the mobile browser will provide an "entirely different
experience," rather than just a shrunken down version of the desktop
browser.

What that experience might look like Kovacs didn't detail, but Mozilla is
betting big on the browser being at the center of the mobile phone
experience. The company announced its Firefox OS earlier this year; the
operating system for phones is based on its Firefox browser. The phones
that will run the Firefox OS software will launch in select countries this
June. While they will launch in Venezuela, Poland, Brazil, Portugal and
others this year, they will come to the U.S. in 2014.

The company has already partnered with Sprint.

Currently Mozilla offers a mobile version of its Firefox browser for
Android. It's not available on the iPhone, Kovacs said, because "iOS has
a policy where you have to use their web engine. Our web engine is very
different." The company does not want to adjust that, he explained.

Kovacs announced today that he would be stepping down as the CEO of
Mozilla this year. "I learned in college that you don't want to stay at a
party too long," he said at the conference. "It's time for me to move on
to other things."



If It Ain't Broke, Don't Fix It: Ancient Computers in Use Today


It’s easy to wax nostalgic about old technology - to remember fondly our
first Apple IIe or marvel at the old mainframes that ran on punched cards.
But no one in their right mind would use those outdated, underpowered
dinosaurs to run a contemporary business, let alone a modern weapons
system, right?

Wrong!

While much of the tech world views a two-year-old smartphone as hopelessly
obsolete, large swaths of our transportation and military infrastructure,
some modern businesses, and even a few computer programmers rely daily on
technology that hasn’t been updated for decades.

If you’ve recently bought a MetroCard for the New York City Subway or
taken money from certain older ATMs, for instance, your transaction was
made possible by IBM’s OS/2, an operating system that debuted 25 years
ago and faded out soon after.

A recent federal review found that the U.S. Secret Service uses a
mainframe computer system from the 1980s. That system apparently works
only 60 percent of the time. Here’s hoping that uptime statistics are
better for the ancient minicomputers used by the U.S. Department of
Defense for the Minuteman Intercontinental Ballistic Missile system, Navy
submarines, fighter jets, and other weapons programs. Those systems,
according to the consultants who help keep them going, will likely be used
until at least the middle of this century.

Here are a few stories of the computers that time forgot, and the people
and institutions that stubbornly hold on to them.

Sparkler Filters of Conroe, Texas, prides itself on being a leader in the
world of chemical process filtration. If you buy an automatic nutsche
filter from them, though, they’ll enter your transaction on a “computer”
that dates from 1948.

Sparkler’s IBM 402 is not a traditional computer, but an automated
electromechanical tabulator that can be programmed (or more accurately,
wired) to print out certain results based on values encoded into stacks
of 80-column Hollerith-type punched cards.

Companies traditionally used the 402 for accounting, since the machine
could take a long list of numbers, add them up, and print a detailed
written report. In a sense, you could consider it a 3000-pound
spreadsheet machine. That's exactly how Sparkler Filters uses its IBM 402,
which could very well be the last fully operational 402 on the planet.
As it has for over half a century, the firm still runs all of its
accounting work (payroll, sales, and inventory) through the IBM 402. The
machine prints out reports on wide, tractor-fed paper.

Of course, before the data goes into the 402, it must first be encoded into
stacks of cards. A large IBM 029 key-punch machine - which resembles a
monstrous typewriter built into a desk - handles that task.

Carl Kracklauer, whose father founded Sparkler Filters in 1927, usually
types the data onto the punch cards. The company sticks with the 402
because it's a known entity: Staffers know how to use it, and they have
over 60 years of company accounting records formatted for the device.

The key punch isn't the only massive accessory in Sparkler's arsenal. The
402 also links to an IBM 514 Reproducing Punch, which has been broken for
three years. When it works properly, the 514 spits out punched "summary
cards," which typically contain the output of the 402's operation (such as
sum totals) for later reuse. Sparkler stores all of its punched data cards
- thousands and thousands of them - in stacks of boxes.

The company also possesses dozens of 402 programs in the form of IBM
plugboards. Computer programming in the 1940s commonly involved arranging
hundreds of individual wires in a way that would likely drive a modern
software engineer insane. In the 402's case, a spaghetti-like pattern of
wires attached to hundreds of connectors on each plugboard determines the
operation of the machine, and different plugboards can be pulled out and
replaced as if they were interchangeable software disks. So you might
insert one plugboard for handling, say, accounts receivable, and a
different one for inventory management.

Sparkler’s 402 is a such a significant computing relic that the Computer
History Museum in Mountain View, California, sent a delegation to the
company last year to try and convince its executives to move to a more
modern accounting system and donate the 402 to the museum. That will
someday be an appropriate resting place for the 402, but as long as it
still does its duty, the Texas company has no problem keeping its digital
dinosaur living a little while longer.

When you see reports about the small, remote-controlled drones that the
military uses to gather intelligence and target enemies in Pakistan and
Afghanistan, it’s easy to assume that all our weaponry is equally modern.
Some significant weapons systems that our military depends on today,
though, run on technology that dates back, in some instances, to the
Vietnam War era.

The U.S. Navy’s ship-based radar systems and Britain’s Atomic Weapons
Establishment, which maintains that country’s nuclear warheads, use PDP
minicomputers manufactured in the 1970s by Digital Equipment Corporation
(DEC). Another user of the PDP is Airbus, the French jetliner
manufacturer.

The PDP was among the second wave of mainframes called minicomputers
because they were only the size of a couple of refrigerators instead of
big enough to fill a room.

The F-15 and F-18 fighters, the Hawk missile systems, parts of the U.S.
Navy submarine fleet, and Navy fighter test systems on aircraft carriers
use DEC’s VAX minicomputers from the 1980s for various purposes,
according to Lynda Jones of The Logical Company in Cottage Grove, Oregon,
which helps keep these antiquated systems functioning.

Because of their critical nature, many of these systems will be in
continuous service long into the future, perhaps to the middle of this
century. For instance, the Minuteman ICBM program, which uses DEC VAX
systems for testing, recently received funding that will keep it going
until 2030.

"These legacy systems are integrated into multibillion dollar systems as
control or test systems," Jones says. Replacing these old systems with
modern machines, she explains, would cost millions of dollars and could
potentially disrupt national security.

As it turns out, replacing those systems with modern hardware designed to
work like the antiquated components is a decidedly less risky venture.
Jones' company is one of many that create systems to simulate older DEC
minicomputers using newer, smaller, and less power-hungry electronic
parts. The replacement computers emulate the exact functionality of the
original hardware - and run the same vintage software - so it appears to
the rest of the system as if nothing has changed.

That's important because most of Logical's customers are defense
corporations refreshing old weapons technology under contract with the
U.S. Department of Defense. "There are thousands of DEC systems in use for
military applications around the world," says Jones, "including PDPs from
the 1970s, VAXes from the 1980s, and Alphas from the 1990s."

The United States developed many fighter jet and missile systems during the
Cold War era using DEC hardware for test and control functions, says Jones,
because the company's minicomputers were among the very first
general-purpose machines that did not require water cooling and could be
used in harsh environments.

The biggest problem with maintaining such ancient computer systems is that
the original technicians who knew how to configure and maintain them have
long since retired or passed away, so no one is left with the knowledge
required to fix them if they break.

Even if someone does know how to fix them, finding replacement parts can
be tricky. Stanley Quayle, a computer emulation consultant, has seen
contractors desperate to find the parts they need. "I have a prospective
customer supporting a U.S. missile defense system that is buying parts on
eBay," says Quayle. "Any parts they do find are as old or older than their
system," meaning they’re sometimes no more reliable than the pieces they
replace.

Lots of people fell in love with the Apple IIe when it was released in
1983. It supported a wide variety of software and hardware, it was
reliable, and its seven internal expansion slots made it extremely
flexible.

For Kevin Huffman, who owns and operates Huffman Industrial Warehouse in
Eden, North Carolina, that love has never waned. His firm stores and ships
out goods for companies that rent his warehouse space, and he regularly
uses his vintage Apple IIe to track inventory and keep accounts.

Huffman got started with the Apple II line in college and later bought two
identical Apple IIe systems from his brother-in-law in the mid-1980s, one
of which he uses today. (He keeps the other unit as an emergency backup.)

Huffman's Apple IIe setup is nothing fancy, but it is fully stocked. It's
equipped with 128 kilobytes of RAM, the standard 1MHz 6502 CPU, and
AppleSoft BASIC in ROM. It contains five expansion cards: a printer card,
two disk interface cards, a serial port card, and an 80-column video card.
For peripherals, he uses an Apple DuoDisk unit, a 10-inch amber video
monitor, and a trusty workhorse of a printer - a Star NP-10 that "is
still going strong at 26-plus years old," he says.

Huffman runs an application suite on the Apple IIe called "The Business
Accountant," first published by Manzanita Software in 1984. Of the six
applications in the suite, he uses five: General Ledger, Accounts Payable,
Accounts Receivable, Inventory, and Payroll. All of his data resides on
the once-standard 5.25-inch floppy disks, but he's not worried about data
security: "I back up the floppies with a program called Copy II+."

Huffman uses a modern PC for word processing, email and Web browsing, but
he's reluctant to move away from his trusty Apple IIe for accounting work.

"I still use the machine because it is so simple to use, I know the
software, and I can still update the tax tables manually." He adds, "The
only glitch in the entire system is that it does not recognize the year
2000, so all my printed financial reports say 1912. But on the invoices,
checks, and other forms, it prints in the 11/14/12 format."

He's even tried emulating the Apple IIe and his favorite software on a
modern machine, but to him, the full experience matters. "I thought about
changing over to a more modern system, but there is nothing to be gained.
As the old saying goes, 'If it ain't broke, don't fix it.'"

Few vintage computers inspire as much active devotion as the Tandy Color
Computer 3, first introduced in 1986. The CoCo 3 (as it is affectionately
called by its fans) never sold as many units as home computers from Atari
or Commodore, but that engendered an even stronger loyalty in its users.

The CoCo 3 marked the end of a well-received line of Color Computer
products from RadioShack, which launched the first model in 1980. The
third model in the series turned out to be an impressive swan song, adding
support for 512KB of memory and implementing advanced graphics and sound
enhancements - all while retaining backward compatibility with pre-CoCo 3
software.

It's understandable, then, that some folks refuse to let go of their CoCo
3 units for either work or play. One such loyal user, John Kowalski, a
former console game developer, still considers his CoCo 3 an indispensable
tool.

"I turn it on, type in a quick program to do something I need done, and
let it run to get the results," says Kowalski. "I think of it as my
personal assistant - sometimes I program it to do tedious or repetitive
tasks like automated document reformatting, and I can continue working
while it works beside me."

Kowalski began his journey in CoCo-land with a Color Computer 2 in 1984.
He traded up to the CoCo 3 in 1986 and stuck with the platform through the
years, performing various hardware upgrades (upping the system RAM to 2MB
and overclocking the 6809 CPU to a blistering 3.5MHz) along the way.

When Kowalski was programming console video games at Crystal Dynamics in
the mid-to-late 1990s, his vintage CoCo 3 played a prominent role. "Every
game I worked on had at least some data in it created on the CoCo," he
says. Titles like Namco Museum 50th Anniversary and Tron 2.0: Killer App
benefited from the vintage machine, which Kowalski used as if it were a
powerful programmable scientific calculator.

For an original title like Tron 2.0 for the Xbox, Kowalski used the CoCo 3
to test 3D techniques used in the game. "Many of the data sets used by the
3D engine were generated on the CoCo, like the tables for calculating
depth and perspective in the 3D view, and the data for fish-eye reduction
of the view," he says. "The texture map graphics used in the game were
also translated into program data by a conversion tool I wrote on the
CoCo."

If speed wasn't an issue, Kowalski would quickly type up a program in the
CoCo's built-in BASIC interpreter. In the cases that involved large
amounts of graphics or sound data, he would turn to assembly language.

The latter technique proved quite handy when working on Namco Museum or
Atari Anniversary, which both contained reworkings of classic 1980s arcade
games. Kowalski used the CoCo to extract, convert, and edit graphics data
from the original arcade ROMs into formats a PlayStation 2 console could
use. He also used the CoCo to translate vintage arcade source code and
clean up sound samples used in the games.

With such an old machine, you might think it would be hard to export the
working data to a more modern PC, but Kowalski has found no such problems.
For years, he swapped standard 5.25-inch disks between his CoCo 3 and a
Windows PC. Today, he simply connects a serial port between the CoCo and a
PC, with the PC acting as a virtual disk drive emulator.

Kowalski says his current job designing electronics hardware doesn't call
for much data generation, so he doesn’t use the CoCo as frequently. But he
hasn't retired the classic machine; Kowalski keeps the 25-year-old PC on
his main computer desk, ready to be called back into service at a moment's
notice.



=~=~=~=




Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT