1998-03-30 - pals

Header Data

From: bill payne <billp@nmol.com>
To: jy@jya.com
Message Hash: 83fa227793a788abcd8904fc21689ca2ed3538e777a5be57250222c9e7b14f02
Message ID: <35201CB7.66B@nmol.com>
Reply To: N/A
UTC Datetime: 1998-03-30 22:34:31 UTC
Raw Date: Mon, 30 Mar 1998 14:34:31 -0800 (PST)

Raw message

From: bill payne <billp@nmol.com>
Date: Mon, 30 Mar 1998 14:34:31 -0800 (PST)
To: jy@jya.com
Subject: pals
Message-ID: <35201CB7.66B@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


Monday 3/30/98 3:21 PM

John Young

The information contained in

http://www.research.att.com/~smb/nsam-160/pal.html

appears from my knowledge accurate.

One must consider possible malfunction when

  With the CAT B, it is also possible to check the code, relock the
  weapon, or rekey it. 

and

 limited-try feature disables the bomb if too many incorrect keys are
 entered. Most references omit the CAT C. It may just be a later model   
of the CAT B. 

The new keys loaded were occasionally not the ones intended to be
loaded.  

Back to Pantex for disassembly was the fix.

The bubble memory of the T1563 was one of the problems
in rekeying reliability,  I was told..

Bugs in the about 112,000 lines of rca 1802 assembler code was also a 
problem.

Kent Parsons asked me to look at the code and make a recommendation
about what to do.

Later
bill







Thread