Jump to content

Trudy & the beast

+Charter Members
  • Posts

    275
  • Joined

  • Last visited

Posts posted by Trudy & the beast

  1. At times there are circumstances...

    if the cache is wet, if the cache is not getting decent traffic or if the cache is not in route for the bug, I can understand some delay.

  2. A few thoughts popped into my mind when I read this string. Some I don't care to share before I muddle through them. Others are important to share. Firstly [i believe that is a word], the cacher with the bug may be on a roadtrip without access to a computer for a few days, but then we wouldn't have his first post. Secondly, if there is some level of urgency in getting this bug to its objective then, perhaps it should have been sent by UPS. icon_rolleyes.gif

  3. A few thoughts popped into my mind when I read this string. Some I don't care to share before I muddle through them. Others are important to share. Firstly [i believe that is a word], the cacher with the bug may be on a roadtrip without access to a computer for a few days, but then we wouldn't have his first post. Secondly, if there is some level of urgency in getting this bug to its objective then, perhaps it should have been sent by UPS. icon_rolleyes.gif

  4. Here is a new twist, I am wondering if anyone else has seen it. I have found a log at one of the caches that we have placed and there is no corresponding log on the geocaching site. I understand that there are people who will falsly log a cache as found on the net to pad their count, but it appears there may be players who keep real finds between themselves and the cache owners...

    very interesting.

  5. For what ever reason... the cache was missing or destroyed, the log was soaked or missing, you were physically, ethically, or psychologically prohibited from placing your hands on it...

    If you feel you are still entitled to the find and you and the cache owner agree on it, then count it. If you still have a doubt in your mind, Then don't count it. This is a game, you are supposed to enjoy it. There is no reason to accumulate a burden of guilt here. You may feel better knowing that you have not taken credit for a cache half-found.

     

    When the game is over [never, I hope] one will not be able to distinguish which tic on the slate was a multi-part 5/5 and which was a drive-by virtual 1/1. They will all look the same. The difference will be logged in the player's mind and the knowledge of how well the game was played.

  6. We have placed 5 micros containing no more than a roll of paper and a few stubby pencils [2 have since been archived]. They have been well received. The advantages to this include enabling the cache hider to be more creative in placement. There is little need to go deep into the brush to place them. The disadvantages include disappointing those seekers who enjoy the swap.

     

    We have also hosted one virtual cache which seems to enjoy considerably less traffic than the micros.

     

    Life is a bowl of Mulligatawny soup, some like the garlic, some like the onions, some like the pepper, or the ginger, the broth or what ever. Like geocaching, there should be something there to please everybody. - Go for the ones you prefer.

  7. I spent a little time researching the links provided by contributors to this string to gain some additional insight here. From what I have seen, I am led to believe that the people objecting to 802.11b use are the big network providers [e.g. Time-Warner] undoubtedly in an effort to protect their own service revenues from competition. God forbid, somebody might compete with a corporate giant.

     

    Additionally, I have noted some free service being offered in London, NY and Boston in bookstores, café’s and the like.

     

    This, one might argue, is all about the almighty dollar.

  8. I am thrilled with the level of discussion in this string. Several well-informed guests presenting compelling arguments on a new subject to me. I don't know a thing about the technology being discussed, but I do have some thoughts on Rights and ethics.

     

    The ninth and tenth amendments to the U.S. Constitution guarantee the rights being discussed here... If it isn’t forbidden, then it is still allowable. "Study the constitution so that you will know what rights they are taking away."

     

    As for ethics, how would the owner of the network (speculatively the victim) view the actions advocated here? Would he even be aware that he is being victimized? And if he were to become aware of an outsider’s use of his network, how would he react?

     

    Now back to the action…

×
×
  • Create New...