From sentto-44114-2085-mark=kli.org@returns.onelist.com Sun Feb 27 09:56:10 2000 Return-Path: Delivered-To: shoulson-kli@meson.org Received: (qmail 20470 invoked from network); 27 Feb 2000 09:56:09 -0000 Received: from zash.lupine.org (205.186.156.18) by pi.meson.org with SMTP; 27 Feb 2000 09:56:09 -0000 Received: (qmail 15365 invoked by uid 40001); 27 Feb 2000 09:59:28 -0000 Delivered-To: kli-mark@kli.org Received: (qmail 15362 invoked from network); 27 Feb 2000 09:59:28 -0000 Received: from fk.egroups.com (208.48.218.17) by zash.lupine.org with SMTP; 27 Feb 2000 09:59:28 -0000 X-eGroups-Return: sentto-44114-2085-mark=kli.org@returns.onelist.com Received: from [10.1.10.37] by fk.egroups.com with NNFMP; 27 Feb 2000 09:59:22 -0000 Received: (qmail 15310 invoked from network); 27 Feb 2000 09:59:21 -0000 Received: from unknown (10.1.10.27) by m3.onelist.org with QMQP; 27 Feb 2000 09:59:21 -0000 Received: from unknown (HELO imo19.mx.aol.com) (152.163.225.9) by mta2.onelist.org with SMTP; 27 Feb 2000 09:59:21 -0000 Received: from Pycyn@aol.com by imo19.mx.aol.com (mail_out_v25.3.) id h.a7.1f027c7 (7332) for ; Sun, 27 Feb 2000 04:59:17 -0500 (EST) Message-ID: To: lojban@onelist.com X-Mailer: AOL 4.0 for Windows sub 30 MIME-Version: 1.0 Mailing-List: list lojban@onelist.com; contact lojban-owner@onelist.com Delivered-To: mailing list lojban@onelist.com Precedence: bulk List-Unsubscribe: Date: Sun, 27 Feb 2000 04:59:17 EST X-eGroups-From: Pycyn@aol.com From: pycyn@aol.com Subject: Re: [lojban] Digest Number 374 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit From: pycyn@aol.com <> Talk about your metaphors! I suppose it would be hard to argue that computer viruses are not literally software, but it is surely the case that viruses are not exactly hardware (nor, for that matter, is any part of a living system) nor software neither. So, viruses are hardware in the sense that they are material objects, spatially locatable, and so on. But they are software in the sense of being introduced into a piece of "hardware" to get it to perform a certain function; they are basically code (as noted) with some carrier facility -- a plug-in at best, as hardware; even the carrier facility is largely a code for cracking a variety of security systems. On the whole, I think the software analogy (which could be extended for quite a while, while the hardware one is about run out) is a fruitful one, in the way the hardware one is not. Of course, as a metaphor, it is also ultimately false. But the revelation may have doen its work before that little problem arises (wish the same could be said for the metaphors about, say, God). pc ------------------------------------------------------------------------ Why wait for a credit decision? Get one instantly! Apply for the Capital One 9.9% Fixed APR Visa Platinum! http://click.egroups.com/1/1895/1/_/17627/_/951645562/ ------------------------------------------------------------------------ To unsubscribe, send mail to lojban-unsubscribe@onelist.com