вторник, 10 июня 2008 г.

Web's crop of dating sites is ripe for the pickin'

You only need to type the word "dating" in any online search engine to discover that high-tech matchmaking has become a big-time e-business-1,166 pages worth of related Web sites on Yahoo alone.

When the concept of pre-Internet "computer dating" first cropped up in the `70s, the idea of putting the mysteriously complicated mechanics of love in the hands of artificial intelligence seemed both spooky and questionable. But now it's clear many singles are willing to give it a try.

"The closer (we got) to Valentine's Day, the more profiles (we had) posted and the more members we get joining," says Karen Smith, the marketing manager for Ebony.com, a Dallas-based "online African-American singles community." At just barely a year old, Ebony.com already has about 1,400 members, 9,400 posted profiles, one marriage to its credit and another in the works, Smith says.

Like most dating sites, there are free services provided, which allow you to post a profile and photo. But to receive e-mail and communicate with potential mates, you'll have to subscribe, and that adds up to about $17-$20 a month or around $100 a year for discounted annual subscriptions.

Sites range from large national organizations such as Americansingles.com, Match.com or Date.com-the latter boasting more than 1 million users worldwide-to regionalized city and community sites such as TexasMatch.com, which caters exclusively to the Lone Star dating scene. All of the major sites break down their membership by geographic area.

Signing up involves giving some basic personal information that allows members to seek out potential partners based on a variety of criteria.

Gender, sexual orientation, location and age are the big parameters, of course, but you can narrow down the field by hair and eye color, body type, height and weight, ethnicity, religion, occupation, education level, income, smoking and drinking habits and previous marital status. Some sites even go into greater detail about bedroom preferences.

But most sites are quick to point out that they aren't designed entirely for romantic purposes.

"It's a chance to go on at 2 a.m. and just chat with someone," Smith says. "Before, people who frequented these sites were viewed as being desperate. But we're so busy these days, and this is just a different way for busy professionals to find someone.

"We've moved from the club to online singles," Smith says, and then adds with a laugh, "And online, you can also get rid of someone a lot easier."

Workers walk from Mary Esther to jobs here

Lodging is so hard to find in Destin that some summer workers with jobs there are willing to room in Mary Esther and walk to work, Destin librarian Cindy Oberlin says.

"About five or six came in Thursday or Friday to register and get their library cards," Oberlin said. "They'd walked here from Mary Esther in the heat. We gave them bus schedules."

As the summer tourist season has grown over the years, and more and more businesses have opened in Destin, the summer labor market has become excruciatingly tight. A growing number of businesses rely on Eastern Europe as a source of teen and twentysomething summer workers.

One company, Eurohouse Holding Corp., started feeding that market in 2002 by bringing more than 20 workers to Destin in 2002, and the number rose to more than 300 two years later.

Destin Library's Internet computers have become the connection between visiting workers and their families and friends back home. Oberlin said the walkers from Mary Esther, which is about 10 miles west of Destin, told her they wanted to use the library in Destin, rather than in Mary Esther, because it's closer to their job.

Oberlin said the students usually start showing up at the beginning of May, but this year, they didn't arrive until June. A more worrisome change from past years, she said, is that many of them apparently have nowhere to live and sometimes not even a firm job.

"A lot of them are showing up that don't have a place to stay, and they're asking us for information," Oberlin said. "It's very disturbing they don't have any knowledge of any place to stay. I don't know that they're coming with definite places to work."

It's not the first time foreign students have run into problems. In 2004, 11 Polish and Ukrainian summer workers wound up with nowhere to live until landowner Tom Curry gave them permission to pitch tents in the back yard of a home he owned on the Destin's west side. The city decided that didn't meet city codes, but City Manager Greg Kisela found them rent-free housing at Jay Villa Cottages in the harbor area.

Hi-tech giant in free speech dispute

Intel, the US microchip manufacturer, is to fight a legal battle in California that will decide whether large corporations have the right to suppress free speech on their own internal computer systems.

In an appeals case pending before the California Supreme Court, the corporation, valued at $135 billion (Pounds 88 billion), is pitted against Ken Hamidi, a former employee.

Because of the many high-tech companies in California, particularly in Silicon Valley, the state's cyber-law rulings tend to be used as precedent not only elsewhere in the United States but also overseas.

The legal battle began when Mr Hamidi, 55, who was fired by Intel after a protracted dispute over workers' compensation, sent six batches of e-mails to thousands of the company's employees. The e-mails were highly critical of Intel.

Intel accused Mr Hamidi of trespassing on its internet computer system. The company obtained a court order banning Mr Hamidi from sending any further bulk e-mails to its 80,000 employees.

Intel's lawyers said that if free speech did not allow Mr Hamidi to walk into Intel's lobby and talk to employees, then it did not allow him to do the same using the company's internal e-mail system.

Intel's court order is now being appealed, with the case attracting national attention. Big business has lined up behind Intel to provide support while US civil libertarians, who accuse the firm of trying to avoid the First Amendment, have sided with Mr Hamidi, who initially represented himself. The ACLU union, plus 41 law professors and other civil libertarian and activist groups, have offered to help Mr Hamidi.

He is now represented free of charge by William McSwain, who wrote a law review article on the case while he was a student at Harvard Law School.

He said that his client was trying to put across a message that was in the public interest. He argues that the movement of electronic files cannot be regarded as trespassing.

With effort, Mac OS upgrade solves old problems

The release of a new version of the Apple Macintosh operating system evokes mixed feelings in a veteran Mac user.

A new OS will always be better in some way than what it replaces. In the case of OS X 10.4, also known as "Tiger," it's a lot better. But a new operating system -- and there have been four of them in the new century so far -- also brings a certain amount of cost and effort in its wake.

You wonder if your 5-year-old computer, or even your 3-year-old, will be able to handle everything the new operating system has to offer.

I've used Macs almost since the beginning. My first was a Mac 512k-e in 1986. The number stood for 512 kilobytes of memory, or less than one floppy disk. I used it until the early 1990s, when I upgraded to the Mac Performa series and OS 7.5.3. That became my first Internet computer in 1995.

In 1999, I bought a lime green G3 iMac running OS 8.6, and in 2002 a G3 iBook running OS X 10.1.

All four still work fine, although the oldest two are in retirement. I've gradually upgraded the RAM and hard drives of the iMac and iBook as new versions of the Mac operating system were released by Apple.

I might have stayed with OS X 10.2, also known as "Jaguar," with which we were perfectly happy. But alas, I needed OS X 10.3, known as "Panther," to run the newest version of Apple's wonderful iPhoto photo-editing software.

Panther was a roaring disappointment. Performance slowed to a crawl on both Macs. Apple's Mail program and Safari browser took forever to load. Even saving a bookmark took forever. My daughters' older computer games based on OS-9 no longer worked.

If I hadn't discovered that the free Thunderbird e-mail client worked fine on 10.3, I might have dumped it and shifted back to 10.2.

So when OS X 10.4 came along in May, my first thought was that I would do no more operating system upgrades on my two computers and would have to wait until I got a new computer before I could enjoy the many touted new features of Tiger. On its Web site, Apple said any Mac with a G3 chip could run Tiger, so long as it had a Firewire port and at least 256 megabytes of RAM.

I changed my mind. Amazon.com was offering a substantial discount off the $129 retail price of 10.4, so that's where I made the purchase. I knew going in that a DVD-ROM drive is required to install Tiger, unless I wanted to send in a coupon plus $9.95 after the box arrived for a CD version.

My older iMac had a DVD drive, but the laptop didn't. I have an external DVD burner for the laptop, and I bet, correctly as it turned out, that I could boot the disk off it. Installation on the laptop was a breeze. It picked up all my settings, including for my Airport wireless base station.

Miracle of miracles, all the performance problems of 10.3 disappeared in 10.4. Mail worked fine; so did Safari. My Samsung laser printer still worked, even though Samsung had no 10.4 driver for that model.

I turned with enthusiasm to my older iMac and ran head-on into problems.

Every time I got about a third of the way into the installation, it crashed. I was running the minimum recommended 256 megs of RAM, so I upgraded to 640 megs. Still wouldn't load.

Andrew Justice of JustMacs on the West Shore told me my last option was the nuclear option: wiping out the hard drive and installing "clean."

I shuddered. That meant hours of work, first to back up the contents of the hard drive onto an external drive and then to reinstall it. All the settings for e-mail and other things would need to be entered manually. But I had no choice.

Fortunately, it worked. Once again, the performance problems of 10.3 disappeared in 10.4. After some tweaking, the Epson C-62 printer I use with the iMac worked fine. I was one happy Mac guy.

Chris Bourdon, senior product manager for Mac OS X at Apple, believes my problems with 10.3 were caused by issues specific to my computers. He says Apple always strives for performance improvements in new versions of OS X but did nothing specific to make 10.4 work better on older G3 Macs.

"With the G3s, there's not a lot of hardware you can use to accelerate performance," he said.

Bourdon said G3 Mac users who are still running OS-9 can upgrade directly to 10.4, so long as they have sufficient RAM and a Firewire connection. He told me I can put OS-9 back into my computer simply by reinstalling it from an OS-9 install disk. It won't affect 10.4, he said.

I tried that with an OS-9 disk, but got a message that the disk was "read only" and couldn't be used for an install. Hopefully, this too shall pass.

Next week, I'll tell you more about the features of Tiger, which are spectacular.

Mistake in Pakistan detours YouTube users

Most of the world's Internet users lost access to YouTube for several hours Sunday after an attempt by Pakistan's government to block access domestically affected other countries.

The outage highlighted yet another of the Internet's vulnerabilities, coming less than a month after broken fibre-optic cables in the Mediterranean took Egypt off line and caused communications problems from the Middle East to India.

An Internet expert said Sunday's problems arose when a Pakistani telecommunications company accidentally identified itself to Internet computers as the world's fastest route to YouTube.

But instead of serving up videos of skateboarding dogs, it sent the traffic into oblivion.

Last Friday, the Pakistan Telecommunication Authority ordered 70 Internet service providers to block access to YouTube.com, because of anti-Islamic movies on the video-sharing site, which is owned by Google Inc.

The block was intended to cover only Pakistan, but extended to about two-thirds of the global Internet population, starting at 1: 47 p.m. EST Sunday, according to Renesys Corp., a U.S. firm that keeps track of the pathways of the Internet for telecommunications companies and other clients.

The greatest effect was in Asia, where the outage lasted for up to two hours, Renesys said.

YouTube confirmed the outage yesterday, saying it was caused by a network in Pakistan.

"We are investigating and working with others in the Internet community to prevent this from happening again," YouTube said in an email.

Misrouting occurs every year or so among the world's Internet carriers, usually as a result of typos or other errors, according to Todd Underwood, vice-president and general manager of Internet community services at Renesys.

"To be honest, there's not a single thing preventing this from happening to E-Trade, or Bank of America, or the FBI, or the White House, or the Clinton campaign," Underwood said.

"I think it's a useful moment for people to decide just how important it is that we fix problems like this."

Techie pleads guilty to hijacking computers

In the first case of its kind, a 20-year-old California man pleaded guilty Monday to hijacking hundreds of thousands of computers and selling access to others to spread spam and launch Web attacks.

Jeanson James Ancheta of Downey, Calif., admitted to felony charges for breaking into military computers and for selling access to groups of hijacked PCs called bot nets.

Security experts say bot nets have increased dramatically in the past two years, partly driven by a wave of relatively unsophisticated "bot herders" like Ancheta, who tap into tools and instructions widely available on the Internet.

Computer-security giant Symantec says it has been tracking communications between more than 10,000 hijacked PCs per day in the first six months of 2005 -- double what it saw in December 2004. McAfee, another security firm, detected 32,000 distinct bot networks last year, triple that in 2004.

Those numbers probably understate the actual level of activity, since bots "conceal their controller," says Fred Felman, analyst at tech security firm Tenebril. Security experts say elite bot herders go to great lengths to stay hidden, and sometimes raid each others' networks.

"The market has gotten so crowded they're actually fighting for real estate on these compromised PCs," says Charles Renert, security research director for security-software supplier Determina.

Ancheta's activities over 14 months dating back to June 2004 were rudimentary, security experts say. He modified a widely available hijacking program, called rxbot, to usurp control of as many as 700,000 PCs. He earned about $60,000 using bot nets to distribute adware -- advertisements that direct computer users to porn, gambling or other websites, Assistant U.S. Attorney James Aquilina said in a phone interview.

He also earned profits selling bot nets to others to spread spam and launch Web attacks, Aquilina said. Ancheta typically sold access to up to 10,000 machines at a time.

Bot herders sometimes flood commercial websites with bogus requests, shutting down the site. To end the attack and re-open for business, the website owner must pay a fee.

Ancheta forfeited $58,000 he had in cash and a 1993 BMW; he must also pay $19,000 in restitution to the federal government. He could also serve jail time. Sentencing is scheduled for May 1.

"This (hacking) community thinks it's immune to prosecution, but this case sends a message they are not," says Aquilina.

Some stuff and deadly virus

A new computer virus spread over the Internet yesterday in an apparent attempt to destroy one of its predecessors.

The Netsky.b virus e-mails itself to addresses stored on an infected computer. It also copies itself to folders that appear to be shared with other computers.

Infected e-mail has a file attached that contains the computer code necessary for self-propagation.

"As it replicates itself, the infected machine will become extremely slow because all the bandwidth is being utilized to spread the virus," said Jag Sebbag, general manager of anti-virus software company McAfee Security in Canada.

Netsky.b is a difficult virus to spot because the contents of the e-mail and the name of the attached file can vary wildly. Sometimes the file name for the attachment ends simply with the extension .zip.

Sometimes it has a double extension, such as .rtf.pif.

Once a computer has been infected, the virus tries to deactivate two versions of the Mydoom virus that hit the Internet late last month.

Anti-virus experts have speculated Mydoom was created by supporters of the Linux operating system because it attacked Web sites maintained by Microsoft Corp., a Linux competitor, and the SCO Group. The latter company is involved in an intellectual-property dispute over certain aspects of Linux software.

Sebbag said it's possible someone who supports Microsoft or SCO may have written Netsky.b in retaliation for Mydoom.

McAfee rates the virus as a medium risk threat, largely because of the speed at which it is spreading.

"The infection rate is not what it was with the Mydoom or Sobig virus, where they were spreading at incredible speeds," Sebbag said. "But that may pick up."

Missouri Libraries Obey Internet Law to Shield Minors

With the start of a new year, the St. Charles City-County Library District has installed filter software on selected Internet computers at all branches to comply with a new state law directed at protecting patrons under the age of 18 from sexually explicit material.

The new law requires schools and public libraries that provide access to the Internet to either "use filtering software, purchase Internet service through a provider that provides filter services or otherwise restrict minors' access to the Internet by local rule."

Library director Carl Sandstedt said the "current tap-on-the-shoulder policy" doesn't keep children from accessing sites that are inappropriate.

In anticipation of the new law, the library district purchased CyberPatrol, a filtering software, last spring.

"We bought these filtering licenses at a big discount through the state," Sandstedt said. "This has allowed us to comply with the new Missouri law while spending very little money."

Not all computers will be filtered. When a library patron signs up for Internet usage, age will be the only consideration. The libraries' computers will be labeled as filtered or non-filtered.

If a customer using a filtered computer attempts to access a restricted site, they will receive an "Access Denied" message on the computer screen.

The new rule will have no exceptions. "We would be in violation of the law even if we allowed a parent and a child under the age of 18 to sit together at an unfiltered computer," Sandstedt explained. "A parent telling us that their child can use an unfiltered computer is no different than a parent telling a waiter that it is all right to serve their minor child alcohol."

While the software may make the computers a little less vulnerable, they are in no way a complete solution. Sandstedt added, "It is very important for parents to realize that filtering an Internet computer in no way guarantees that access to all sites which they may consider objectionable will be restricted," Sandstedt said. "With the filtering software, there may be some protected sites that will get blocked and some unprotected that will get by. We hope we have achieved a middle ground."

If an adult or any other customer violates the district's policy by accessing inappropriate sites, the current "tap on the shoulder" policy still applies.

what's?? the internet!!

simple computer network. However, it happens to be the biggest computer network in the world.

A computer network is a system for connecting many different computers so they can share information. At schools and businesses, you may have seen cables and wires connecting computers to form a network.

When you are using the Internet you are becoming part of a huge network.

In accessing the Internet from home, you probably use a modern to dial up a local number that connects you to your Internet Service Provider (ISP). When you connect, you become part of their network. The ISP then conects you to a larger network, so that you can get access to any website in which you may be interested.

Every website is stored on a computer somewhere, perhaps thousands of miles away from you. This computer is called a server. But how does your computer know what computer has the website you are looking for?

The Uniform Resource Locator (URL) provides the location for a website. For example, http://www.monkeyshinespublishers.com is the location for the website for Monkeyshines. This address has different parts.

http stands for "hypertext transfer protocol". Protocol is a word that means "communication". http is the way that your computer communicates with the website you are trying to reach.

www stands for "World Wide Web". The World Wide Web is the part of the Internet that anyone can use. The www is the host name, which specifies a certain type of server. A server can actually use any three letters for a web address, but www is available to everyone so it is more familar to us.

A new game on the web

There's a new kind of game on the Internet. When you play it, you do more than simply rack up points or have fun. As you play, you help computers develop new skills.

Computer scientist Luis von Ahn created the games as a way to solve problems that are difficult for computers, even though the problems may seem simple to us. Computers, for example, have a hard time identifying a cat in a photo, while we can spot a cat at a glance.

The idea is to invent online games that people enjoy playing. Then, as people play, they provide data that researchers can use to improve computers. The players don't know that they're helping out. They're just having fun.

"The potential is huge," says computer scientist Manuel Blum, one of von Ahn's colleagues at Carnegie Mellon University in Pittsburgh. "These 'games with a purpose' make use of humans in a wonderful way."

By harnessing the brainpower of thousands of people playing games on the Internet, computers may learn how to identify pictures, translate Web pages into forms that blind people can use, develop common sense, understand foreign languages, and more. Seeing things

Our brains are wired to collect and process lots of information about what we see, von Ahn says.

Computers, on the other hand, simply "see" a grid of dark and light dots, called pixels. It's not obvious to a machine that a certain blob is a cat. Likewise a computer doesn't know that a tiger, a cartoon feline, and a kitty curled up on a couch all belong in the same category: cat.

"If you give me an image of some common animal, I can tell if you if it's a cat or a dog," von Ahn says. "Computers can't do that yet."

Because computers can't make such distinctions, search engines have a hard time finding images on the Internet. And getting people to label each image doesn't work well. There are billions of images, and the job is pretty boring.

The ESP Game (see www.espgame.org), invented by von Ahn and his coworkers, provides a quick, fun way to label images.

When you play the ESP Game, you get randomly paired with another player. Both of you see the same image on the screen, but you can't communicate in any way. You type in a word that describes the image. As soon as your partner types in exactly the same word, you both earn some points and another image appears. You can keep typing in new words until you again get a match, or you can pass and go on to the next image. Each round lasts 180 seconds and includes up to 15 images.

The first time I played the ESP Game, my Internet partner and I had a score that was better than the scores earned by only 40 percent of people who had played before us. We did better on the next round, though. And the next. It was hard to stop.

Although I should have been working, I played without feeling guilty. I knew I was doing something useful. Every match became a label for an image.

After each round of the ESP Game, you and your partner can find out where you stand.

So far, von Ahn's game program has collected more than 20 million descriptions. And the game appears to do its intended job.

"The labels given by the ESP Game are as accurate as ones generated by someone paid to label images," von Ahn says. Players also come up with about the same number of words for an image as paid professionals do, he adds.

Google has now developed Google Image Labeler (see images.google.com/imagelabeler), its own version of the ESP Game. Where's Waldo?

The labels provided by the ESP Game tell you what's in an image. But the game doesn't tell you where in an image a certain object might be.

To help solve this problem, von Ahn and his coworkers invented the two-player game Peekaboom (www.peekaboom.org).

One player sees an image--say, a cat playing with a dog--along with a word related to the picture. The other player sees a blank screen. By clicking on the image, the first player reveals a small piece of the image. The goal is to get the second player to guess the word in as few clicks as possible. After the second player correctly guesses the word or passes, the two players trade places. Each round lasts 4 minutes.

With each correct guess, the computer collects data about where things are within a picture. "That's exactly the type of information needed to train computers to see," von Ahn says.

Another image-labeling game, called Phetch (www.peekaboom.org/phetch), goes even farther. Instead of entering a single word, the first player writes a description of an image. Given that description, three other players then race to pick the right image out of a million or more possibilities. The program collects the descriptions that lead to quick results.

Programmed with such descriptions, computers might eventually be able to describe images to people who can't see. Software already exists that can read aloud words on computer screens, but these "screen readers" can't yet explain pictures. Having fun

As useful as these games are, they won't work unless people play them. That means the games must be fun. And figuring out what's going to be fun is easier said than done.

Like game manufacturers, von Ahn tests his games on people. On the basis of how long people play, what they say about the games, and which ones they choose to play again, von Ahn makes changes until he comes up with something that works.

"Nobody knows what makes games fun," von Ahn says, just like there aren't any rules for what makes a movie popular. "There's no formula," he says. "It's still an art."

Still, von Ahn has noticed some patterns. Randomness and unpredictability help, he says.

Players like to be able to get strategy tips that improve performance, Blum adds. Large point bonuses can't hurt. People like games that are competitive too. Displaying lists of top scores helps keep people playing.

Do you have thoughts about what makes a game great? Send them in, and we'll share them with the researchers. Your ideas could become part of a future formula for fun.

Most people would have no trouble identifying the kitten and two puppies in this photo--a task that a computer can't yet accomplish.

The ESP Game has collected more than 20 million labels for images since it debuted in late 2003.

In Peekaboom, one player tries to guess a word as another player reveals more and more of an image.

The game Phetch is an online treasure hunt that matches descriptions with images.

few more things about the children

One of the ironies of broadcasting is that children's programmes were killed off by someone who had three children (James Boyle, controller of Radio 4 in 1998), but are now being revived by someone who has none (Helen Boaden, the present controller of Radio 4). Go 4 It, which begins tonight after The Archers, is a half-hour magazine show filled with fun, jokes, nifty sound effects, more music than you might expect and a real sense of excitement.

Philip Pullman reads the first episode of his eerie new story, Clockwork, which, with its corpse driving a sleigh through a German winter, with strange metal machinery attached to its heart, chilled me to the bone, though I dare say the target audience of 8- to 11-year-olds will be made of sterner stuff. Cleverly, there is no mention of parents, but a review of the new holiday film Spy Kids does specifically involve both children and grandparents, an adroit use of the generations. There are interviews (by children) with Hear'Say and Sir Steve Redgrave, a "mystery history" slot focusing this week on an Egyptian mummy, and only four uses of the word "cool".

Matt Smith, from BBC1's Football Fever, anchors all this with friendly fluency, neither too patronising nor too lofty. It was odd to hear him use the archaic phrase "pencil and paper", and to find no mention of Easter eggs, but this first edition has a lot of buzz. Ovaltine radio it is not.

Resurrection of children's radio is not confined to Radio 4. Classic FM has been broadcasting a collection of Classic Tales on Sunday at 6pm, which began with Desmond Lynam reading Hansel and Gretel, and ended with Dawn French reading Romeo and Juliet. Partly this was a response to research showing that fewer and fewer children are having bedtime stories read to them. Henry Kelly's school-run slot at 8.15am continues during school holidays. Four new regional digital services (for northwest England, northeast England, the Midlands and south Wales), which go on air this summer and will be run by a powerful consortium called MXR, will include, as part of their line-up, a children's station called Fun, made by Capital Radio. Two of the bids for the third London digital licence also include children's radio as part of their proposed portfolio of services.

The story of children's radio has been one of a slow, painful, withering on the vine: Children's Hour killed off in 1964, Listen With Mother killed off in 1982, Cat's Whiskers (a brave attempt at resuscitation on Radio 4 in 1988) aborted, Radio 5 abolished. The commercial sector has, in general, neglected children. So what explains the new interest? Partly, it is a result of the 12-year campaign waged by Susan Stranks, who used to present the ITV children's show Magpie. Partly a belated acceptance of the importance of 11m people under 15. Partly changes in the political agenda (a new demand for a children's ombudsman, for example). Partly Boaden's genuine belief that Britain's main speech station should offer the same high-quality output for children as it offers for adults, though her commitment would be more palpable if she promised that Go 4 It will be broadcast permanently rather than for "at least a year". And the BBC's commitment to children's output would be rather more demonstrable if it promised that one of its proposed national digital radio services would be for under-15s.

Olivia Seligman, the producer of Go 4 It, forecasts that her new programme will face an uphill struggle against the lure of the television and the computer. That is my belief, too. But she and her colleagues are absolutely right to try and make inroads into their prevalence, and with a bit of luck, they might well succeed.

about he children

Van Hoogmoed's adult children call him a lover of hard work and fun, a man who indulged both passions working on dairy farms and his vineyard as he and his wife raised 10 daughters and sons in Madera.

Mr. Van Hoogmoed died Thursday. He was 82.

A funeral service will be at 9a.m. today in St. Joachim's Catholic Church, and many attending likely will recall seeing the Van Hoogmoeds' 1966 Dodge van with some of the family's 24 arms and legs hanging out the windows.

"My dad was a person who loved fun, jokes, play, ponies, goats, rabbits, chickens, his garden and fruit trees," says Sister Lucille Van Hoogmoed, an older daughter and nun. "He was a farmer all his life. He loved growing things and taking care of things. And he liked to share."

Ask to pick oranges off his trees, and he would say, "Sure." Pick them without asking, and he would order you away.

Mr. Van Hoogmoed was born and raised in Holland. As World War II raged, Nazi soldiers took him to a prison work camp.

Forced labor did not extinguish his love of life.

"He got in trouble for laughing," says son Albert Van Hoogmoed. "No matter how bad it got, he was laughing."

Mr. Van Hoogmoed had a job waiting for him when he immigrated to the United States in 1956 with his wife, Wilma, and their running total of three children.

He had a plan: to work hard and improve his family's standard of living. He worked for a dairy, delivered milk, bought his own dairy and bought a vineyard.

"If he determined to do something," Albert Van Hoogmoed says, "he would get it done and smile and laugh doing it."

Years later, Mr. Van Hoogmoed badly cut his hand, nearly severing fingers. As nurses worked to save them, he was laughing again, Albert says:

"It was his optimism. I don't know where it came from. It seemed to be inside him."

Mr. Van Hoogmoed visited relatives in Holland but never talked about returning to live there.

"He loved it here," Sister Lucille says. "He loved the freedom, all the room, space for the animals. He liked the people here. He put down his roots."

Albert Van Hoogmoed recalls his father's amusement some mornings at meeting inebriated customers returning from nights of celebration just as he was delivering their milk.

"He was the happiest guy you ever saw," Albert says.

about e-mails and spam

Laurie Seim gets loads of e-mail each week, including some that she doesn't even read. At least three times a week she can count on some form of chain e-mail appearing in her in box.

"Just because you receive an e-mail, doesn't mean you have to open it," said Seim, an Appleton resident.

Seim, like just about every other e-mail user, finds her account cluttered with get-rich-quick scheme offers, chain letters promising free merchandise if they're forwarded on and jokes of the day.

Most of what she receives counts as harmless fun, jokes, riddles, pictures and Web site links forwarded from her three children, ages 7, 11 and 15. The kids' friends forward the message to them regularly, Seim said.

"I've got some sweet, sentimental ones -- like ones that say you're the best friend in the universe," she said.

However, not all the messages carry well wishes.

"I did get this really interesting e-mail from the Middle East last week," she said. "Sounds like they were looking for help with money laundering."

Seim uses parental controls to block unknown users from sending such e-mails to her children, she said.

Dan Green, an avid AOL user and Green Bay resident, says about 90 percent of the e-mail he receives falls under the category of spam or chain e-mail. "I delete all mail I don't recognize," he said.

Invites to pornography sites, offers for "lucrative" home-based business opportunities and urban legends have begun to irritate him, he said.

"Like I'll really win a million dollars for passing on hundreds of e-mails," he said.

Nonetheless, the promise of gifts, from money to vacations, causes netizens to keep such e-mails circulating around the Net, sometimes for years, according to About.com's Urban Legend and Hoaxes Web site.

Such electronic messages prey upon people's laziness and wishful thinking, Seim said. "It's easy and quick and promises a payback," she said.

Like hackers and online child predators, there are enough people creating these mailings for harmful reasons -- getting personal information, taking money, sending out viruses.

"They want to say 'Look how many suckers fell for this,'" said Diane Blessing, an Appleton resident. But even experienced Internet users still fall for a hoax once in awhile.

While most of the people interviewed said they purge any reference to prizes or so-called freebies, many of them forwarded the notes when they mentioned "children in need."

Blessing has received stories about victims of drunken driving accidents. At the end of the e-mail, it promises to donate money to an organization like MADD or simply just warns people about the possible results of drinking and driving.

Certain messages do nothing but promote a good cause. For instance, when the U.S. postal Service launched its line of stamps promoting breast cancer awareness, advocates sent out mass mailings to drum up support and sales. That stamp proved to be one of the top sellers, according to Postal Service reports.

One campaign worked a little too well, according to David Emery, About.com's urban legends guide.

In 1989, a 9-year-old boy named Craig Shergold sent out a snail mail chain letter asking people to send him a postcard from their home towns. His goal was to get into "The Guiness Book of World Records."

He made his goal, but cards kept pouring in. They still pour in and his family has appeared on TV asking for it to stop.

Sometime in the 1990s, a well-meaning recipient of the letter took Shergold's (spelling varies in chain e-mails) to the Net. To this day, people still get the note and want to help the little British boy make his dream come true, Emery said.