197007

197007 197007

User Manual: 197007

Open the PDF directly: View PDF PDF.
Page Count: 60

Download197007
Open PDF In BrowserView PDF
aJ.II=====~.~6IS SOl~tlJv') NtiS3S0rM NtiS
08t
OLZ10*
~OlO
A~tI~9Il 19nd 3sor NtiS
8Z9~8£f9ZT J3S SlVJIOOI~3d

co
Thinking . ... Computer - Aided

SCIENCE & TECHNOLOGY

July, 1970

Vol. 19, No.7

THE MA Y ARTICLE
THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY:
THE APPLICATION OF COMPUTERS
TO THE PHOTOGRAPHIC EVIDENCE

Computers and Automation, published in its May
issue a 32-page feature article, "The Assassination
of President Kennedy: the Application of Computers
to the Photographic Evidence"o
In this article,Richard E. Sprague, President,
Personal Data Services, Hartsdale, N.Y., states
that analysis of the evidence proves:
•

that the Warren Commission conclusions
(that Lee Harvey Oswald was the sole assassin, and that there was no conspiracy)
are false:

•

that there were at least four gunmen firing
from four locations, none of whom was
Oswald:
that the conspiracy to kill Kennedy involved over 50 persons (of whom several are
identified in the article) including members of the Dallas police, and elements of
the Central Intelligence Agency of the
United States: etc.

The evidence published in this article includes
eleven important photographs. One of them shows
Jim Hicks, who admitted he was the radio communicator among the firing teams at Dealey Plaza, with
his radio transmitter in his back left pocket. The
article includes a tabulation of over 500 photographs (counting a movie sequence as one photo)
taken in and around Dealey Plaza, Dallas, Texas,
Nov. 22, 1963, at the time of President Kennedy's
assassination and shortly thereafter. Both a spatial chart and a timing chart of the events and the
photographs are included in this article.
Sprague, a computer professional for over 24
years, has as an avocation, studied the old and the
new evidence for over 6 years, and has analyzed
over 400 of the 500 photographs.
The work in computerized analysis of over 300
still photos and over 25,000 frames of movie sequences has been started.
To obtain your copy of this extraordinary report,
please complete and mail the following order:
- -(may be copied on any piece of paper)To:

Computers and Automation, Dept. P
815 Washington St.
Newtonville, Mass. 02160

Please send me ( ) copy(ies) of the May 1970
issue containing the article on President
Kennedy's assassination. I enclose $4.00
( ) check ( ) money order for each copy.
(Please do not send cash.) If not satisfactory, returnable in 7 days for full refund (if
in salable condition)o
My name and address are attached.
Discount:

10%, 5 to 9 copies;
20%, 10 or more copies
Special price: $1.00 for students (attach evidence);
$1.00 for non-profit organizations

An

excerpt from the /.Jay article

Part 2. The Photographic Evidence

The assassination of President John F. Kennedy
was the most photographed murder in history. Approximately 75 photographers took a total of approximately 510 photographs, either before or during or
within an hour after the events in Dealey Plaza, and
either there or nearby or related to those events,
The word "photograph" in this context includes both
still photos and movie sequences. The number of
frames in a movie sequence ranges, from about 10 to
about 500; and in the count of 510 photographs given
above, the 10 to 500 frames of a single movie sequence are counted just as one photograph. The total number of frames is over 25,000.
The Warren Commission examined 26 photographs,
about 5 percent of the 510. The FBI examined about
50 photographs, or about 10 percent. The most famous of all the photographs is the Zapruder film,
which had over 480 frames.
Many of the photographs were taken by professional photographers. About 30 of the photographers
were professionals who work~d for newspapers, television networks, and photographic agencies.
The Warren Commission did not interview a single
one of the professional photographers, nor did the
Warren Commission see any of their photographs.
Fifteen of these professionals were actually in
the Kennedy motorcade, no further than 6 car lengths
behind the Kennedy car. Five of these photographers were television network cameramen. The Warren
Commission looked at none of their photographs.
Two of the photographers were from the White
House. One of these men (Thomas Atkins) was the
regular photographer for the White House. He made
a special film for Lyndon B. Johnson. Atkins used
his own film plus some footage obtained from the
television photographers. Johnson looked at the
film and then put it away. This film is now stored
with the Kennedy Memorial Library materials in a
warehouse in Washington, D.C.; it is stated to be
"unavail able" to researchers. The Commi ssion did
not see this film, nor did they interview Atkins.
Because the professionals used movie cameras of
professional quality, their films are exceedingly
revealing and valuable as primary evidence. The
Warren Commission looked at none of these films.
Chart 2 of this article shows the times of about
50 of the photographs taken in Dealey Plaza during
Kennedy's passage through it.
Table 3 of this article lists over 510 photographs so far identified and known to exist or to
have existed -- with possibly a few borderline cases.

Are you keeping pace with the
giant strides in computer science?
It isn't easy. But The Library of Computer and Information Sciences helps

Special Introductory Offer:

Take any 3(v:!~~~o\O
for only $100 each
with a short trial membership in

The Library of Computer
and Information Sciences
(retail prices shown)
56430. INTRODUCTION TO STATISTICAL DATA
PROCESSING. Theodor D. Sterling and Seymour
V. Pollack. The first and only comprehen c "
book, including brilliant summaries of hf
tic techniques and multivariate analysef
pages.
'

you tune in with what's happening. By providing you with the most advanced, most essential, most significant bboks in the exploding world of
computer science.
Each month, the Library carefully screens hundreds of manuscripts, and
chooses only the most informative and most important. Books on programming. Software. Hardware. Theory. Management uses of the computer. Books
that help thousands of executives, EDP managers, programmers and technicians keep up-to-date. And move ahead in their careers.
All books are yours at discounts of up to 30% (sometimes more). And for
each four books you buy, you get your choice of a fifth-a free bonus book.
The strides computer technology is taking daily are boundless. No matter
how alert you are, it's tough to keep in step. Unless you take advantage of this
special introductory offer-now.

c

39990. COMPUTER MODELING AND SIMULATION.
Francis F. Martill. Lucid introduction to this
powerful new technique. Clear and beautifully reasoned.
$12.95

64520. NEW POWER FOR MANAGEMENT.
Hertz. The definitive work on the revol '
ary management sciences. Indispensable

C Gj; PUT S!iS ArID AUIOHAT lO'"
JUL:: lC1'lU

70070. PRINCIPLES OF HOLOGRAPHY. H
M. Smith. The history, theory and PI
of one of the fastest-moving areas in ~:~,;'~""I:!j' C

I

:.::I::i.[::~~:~:~ P~'l l:\JV{.~·.:":)·,~.~·
[J';:.~'.\;\,;;.~:::~l':; t~·l:"';.'::

0':~:i:;"~'

S

::.)l;_~l);'";

I. . " lC:.:,,:j"::::,:!-.:':?

iJ';':'

1~,,)53,

I

\";::;j:O

in

(1.'

GO~j:-J ::;'~",',ij:,:o (;:1':;0;

(',:"1:) -:c.:-~-r.::·.7-:':":'::::·::':::C:::-~·;;0.7::::.~~;·,·:~:;·;.:·~:;70;

C.7;i_1J_'~1 C.~·_I '::::0

~::-:13.:,:.

~;~',1

j a:J

)?~.'.I~;~~~,~~O~"i t;~;r;; ;f" .~'...

:~::;:~;, i>~O:luil;, lo' i.,Qj1l:D.A...
lWVElj:3ER 9, 1963-

en !,:ovat;j~)cr. 2.6, 19G3 ~ a GO'l1'J:(!C 1"1ho h~D :t;ln:n:t~llcd
:;.~..; li.:1~) lc :Ln:(o:((:1·:~t:Lo;1 :Ln t}:l.C pc:.~t r~!l.d :til :'.d(l:t ti.O~1 b,:.::...:;
f:11~:J.1:;.[)tc~ CO:i!3 In:i:oj::n:t'j;:i..on that: could not b~ vorif::'cd Oi:
COi::;:O~)ot·Cl.t(!d

J

cclv:i.zcd SA 1?Z'.I~;2r.GC:J Cl:J :Eo 11c.:;;:;:

s.

On !':OV~j:~);)c:t." 2.3;; 1963;1
A. l.~LLrilE.i.~R \"7/1G in t:h~
U~·~:to~) ?:I';:nin StC11::tO',"J 3.~c!\Dor:::l;.11e, JYlo:(.i.Qn, nud nt:· (~~)Ol;t

~:~~5 (~;;r;;l:' ~~ ~~~~~:l.~;~~~ ~;~~~~~~~g./~c ~1;:~~;..:;~~~~{ G~:~:~~~C:~;~~-:~~>~~I::_"G

;:....,n, t:;..1.10 :;0 fu:f.·i.1.
I t\.~cGn you
",hen I .s[1.:~.(1 he \ioulc1 be kilJ::;d

thOli~h,: I ,'n1G k:LC.L(1:tt·<~ you
n \'1:~.n(JO\1 ,·7:i.t:l·l ~ hi~~'j,'"

f:(.\)n1

~~~H~~~:~~~-il~~;'T~~"i~;~~~i~~~~~:~~~~o~~~ t~~~~~~~:~~~~;~~~L Ie
,~o

:lny [;l1~GGln.3."

J.20

33

The Federal Bureau of Investigation has requested
that certain pages of this document not be disclosed. This request was incorporated in a letter
of August 13, 1965, to Dr. Wayne C. Grover, Archivist of the United States from Norbert A. Schlei,
Assistant Attorney General, Office of Legal Counsel,
Department of Justice
Commission Document Number:
Pages Withheld:

to Dr. l.Tayn8 C. Grover} In:clllvist of tbe united Stutes

1347

121

MM 89-35

3.
A characterization of the Association of South
Carolina Klans follows. Sources therein have furnished reliable information in the past.
After their arrival, MILTEER stated that there
was no point in discussing President KENNEDY, and
again stated, "We must now concentrate on the Jews."
MILTEER advised that he was preparing a pamphlet
which he wanted to disseminate throughout the country. Prior to concluding their discussion, information was received that JACK RUBY had killed LEE
HARVEY OSWALD. In view of this, MILTEER said he
would have to alter the information he was setting
out in his pamphlet.
The source advised that based on his contact
with MILTEER, he could not definitely state whether
MILTEER was acquainted with either RUBY or OSWALD.

J.J.·;L

I ..
J.\.;~I..:i.t~blc

;;o:LjG·~1C.

::~n[o~:~·:~.:1t.:ion

Aftc:,:
'~';'~;G

'i;h~:~J.

5.n

tl"'..::1 f ..~~cc.~j.:U;~.on 0); Sou ~:~.\

S0Ljj:l.;(~J

t::'J.8:;:.:}:;.n

h{tv(!

J:U).:.dj.ch~::(~

th·~ P:1C;\";.

. . . :;:;;. . lv(.1.1)

:{:~:(/.l~>·;).~!t :Jt.:(~;;:~d

ell':lt:

t~l(::':~

riO p·o:T.rd; in ~J~\.L!).

1.
Re:

(;.h~j:."'.r; t;:! ',i:.i.:~;.\.t:J.on or

C::!:oJ3.r·.. {~ :O.ni''l8

h::.. f3

MM 89-35
FPG:ggr

~Si·.. 35

.~.~

).22

Threat to Kill President KENNEDY
by J. A. MILTEER t Miami, Florida,
November 9, 1963

J. A. MILTEER is also known as JOSEPH ADAMS MILTEER. He was born February 26, 1902, at Quitman,
Georgia, and lives at Quitman and Valdosta, Georgia.
He reportedly is a wealthy bachelor who inherited
an estimated $200,000 from his father. He is reported to have no familYt no employment and to
spend a great deal of time traveling throughout the
Southeastern United States. He has been unsuccessful in city politics in Quitman and publishes a
weekly pamphlet criticizing the operation of the
Quitman City Government. MILTEER has associated
himself with the Constitution Party of the United
States and attended a convention of this party held
at Indianapolis, Indiana, during October, 1963. He
was reprimanded by this party for describing himself as being the party regional chairman for the
Southeastern states. MILTEER reportedly became disillusioned with the Constitution Party of the United
States and has attempted to form a party known as
the Constitutional American P~rties of the United
States. MILTEER allegedly intends to use the Constitutional American Parties of the United States
as a front to form a hard core underground for possible violence in combatting integration.

l'tc ~

Th:cerl t to' 1<.i JJ.

P~:CG:i.cJCi.11: ~~.":,}~HElJY

by J. 1~. L'D:I,'l'I~~~:~:Z,)
NovC!r.l 0Cl:' 9, 1963

Ni8i~1:i,

Flo1~j (.13)

.

J'. A. }[(L'l'ZETI. i;:; c.1J.so·l(fl0~Tl1 [IS J'03~~1')II /\nA~·~~) :.~:(T/J::~:":":R.
lIe \7t;;:. bo':.:n l-\:~bj:U~l'):J 26, 190!.;. a~ Q"-,,'.5,trn:H1, Gco·i:i.:;lrJ J ;](!<.1 J.:1.l.1CJ
c,t Qld.t:j:~ri'-' (a~cJ V~11c1o~ji:~q, Gcoj':~~iu. He X'(:~.\oj:t:e(11y is [1 \;·~~J.l.:~·ii
J)~:ch;~J.()T ~1:10 li.1hoJ::ttcd C1n cctlL-:';(;t"!t1 $~OO,OOO £\'0;':1 hie f;;.!t:h::;:l·.
H~ :i.[j 1'(:IJD').-t:0d to lVJvc~ no ftnni 1)'; 1':0 (';i.·!1~)J.oy;l:cnt c:1nd to f.,~;:~nl~i u

~:;;~~~s ~1.3Q ;i.~ ~~ ~5'~~'J~;:~~~~;~;'~~~~~;~~~ur~~O~~ t~h~oi~~~~~~" ~:~c~:~:\ ~~~:;:~~C(;
0

Dj:(~ l)'uhJ.:i.~~h;~D ~1 !]C!c!~J.)' pC;4'J1)hlc'~ cj:il:i}~:i.ilg th~ (J~).:;:~:fltlon 0':: t:h·3
Q·~t:l \.:j"(~:H/. C:i, ty GOV8j:n,I::)nt •. , r'rCL\'EEi1 h~ G t'.! 330C:i.r. i:ccl h:i.~i.1Gi_'lf 't}~;. ti:;,
t~j,~ CO".\"'..;.,tit\.1t:~on l."'u·J;i..:y of t.h:.: U-"1~i.t('!G Stat\.!G ~H1(~ Ot.:t.(;i.1IJ~J c~

.cO'(~'\I;~:nl:iol1 o:~ chJ.G pa:r:I:yh::~).d ;:t :':ndi.:n~:~~)c)J.:tr-j, J:nr:15."nt1) <,h\j:5,u:;
O~;~:O~.i'::::(:~ lS03.
11::! HD~~ j':(~~):.:;;.rr"'I'ild-:;<1 11y t:h:l3 P['11:l:Y [:0;: (t::;3Cl,";'b ..·
:;.j:t.~'), h:·:v,1~cj.r [l~; h:::.:i,n~ tli,:~ l)Oi:~:Y ·.I:~0:i_O):1':-'J.. CbD::.)~l~:'!:,n -;'01.· tllJ:'~
S\Ji.r\:~1;~~~C·i.:(,~:/~1 :Ji:[Itf]G.
I'D:L'I:!~j~:l{ rOl')OJ;t:,~~I:1J.y b(;(~c:ro.l3 (~i.:J=:,J.J.1'l8:~O!Jc:J
'o:i,'~h t:ho· CO~1~i;:ttut:i.OLi. 1).Jj:ty 0,;; th; Uu::.tou St.:1to~ u~'ld h(~::.;

[: c.:l:c:~-~l:'f\:cd to 1:0:(:',:1 n p.:Jj~"·\:Y l'~no;:'i'fl. [!;J th(! Conet::. ttli'. :Lon.J J. !~1.1~j:~;,C..:11~
l'~~:,:t :t.::':3 0 f: t:l::~ Un::, ted S'i;~ t:e~~ •
~·~):r./.I~~~Tnl II J..J.qr.;G(D,y i j:rl:~nd:~ t, 0
\.\~:~ t:h~ COl'~ctil.:ut5.on:"IJ. J\lilcn::i,cfl).'). l'C'I!:r;:i.c!J of th~ United Stf.1tG:':
"s' ,) fj:or~t to fOj:;n .n h:Jj:d CO:':3 tU',.dcl.'3j:olJnU fol" poc~;:i,l>le V::,o1(;~1c'~ j.n cO\i.~bai:ting in\.:(!ZJ.\~u..::ton.

123

123
1

DL 89-43
PEW/ds

1

The interview of JOSEPH ADAMS MILTEER, as well
as additional information regarding him, is contained on pages 24-26 of the report of Special Agent
CHARLES S. HARDING t Atlanta, Georgia, dated December I, 1963 t in the case entitled "LEE HARVEY OSWALDj INTERNAL SECURITY - RUSSIA".
124

'i·~1;.~
:;.~'::(1:! :·.i.·:;l'!.a.~,

~,jl'~;Ll:'1j,(n' of :JO;J}!~~)~'( j"}').:'i:;·~ .\.ri:r,,'rBj~:l1,

,i..:n;;O~'Tt~il·~:..tlj~~J

:,::-,S·;'::L·'JJ.l11j h5. Y.11 i.:J

,!:1

ct"Jn:,:,:;'d,11~(.1

\·.~o11

;)3

1)~1 p'~~CJQa

:-U1···').(> 0;;; t:l:1 j,:'-':~Jlij~"~ 0;:; G.,;)~~r.!:l,i.1J. l.,t.i\::;il~; c::'·!\.nTJ;·:G fi. l'T.,",,11.D}:i:7G I
..\·!~.1.;::·,~,t;,\ I G\."'JtJ:..~~5,,~ I • (l;;:·:~~:.d j),-;Ct~,,)j:.:;~c J. I 19G:~ I i.~1 tllQ c~:~;.;c
(.~l£.t\:J,:..":d f1J.. I~:~! L.;\1~V;~7 O;~'71\:':.j)i J.~:·:\"BrG:'[J\L ::)l:X":l;"J,\:F~:l ... r~:C;SG:.cAn.

12(:
34

COMPUTERS and AUTOMATION for July, 1970

used and still use to absolve themselves is "on
grounds of national security". There is evidence
that people are still joining the second conspiracy,
having concluded that it is to the advantage of the
United States or to their own advantage not to admit
the existence of the first conspiracyo
The evidence for this second conspiracy is very
different from the evidence for the first conspiracy.
The evidence for the first conspiracy include5 such
things as photographs, confessions, court testimony,
the physics of bullets and guns, and other very solid
evidence.
'
The evidence for the second conspiracy consists
essentially of a large number of "strange events".
Separately, each one can be "explained reasonably".
Together these events make a mass of evidence that
cannot possibly be "explained reasonably" in the
same way as a person who steals funds from his employer can "explain reasonably" once, and a person
who steals funds from his employer twenty times can
no longer "explain reasonably".
A very recent example of an act covering up the
first conspiracy occurred when former President
Lyndon Bo Johnson was interviewed by Walter Cronkite
on a Columbia Broadcasting System television news
special on May 2, 1970. On April 29, 1970, the New
York Times printed a story entitled "Johnson TV Interview Abridged at His Request". (The Times story
had actually been leaked to the press three days before the scheduled broadcast by someone at CBS who

THE SECOND CONSPIRACY

Richard E. Sprague
Hartsdale, N.Y.
Question: (composi te -- from several inqui rers)
I think you assert that there were two conspiracies: a first conspiracy, i.e., one before President
Kennedy's assassination, "involving over 50 people",
and a second conspiracy later, when a much larger
number of persons realized that President Kennedy had
been assassinated as a result of a conspiracy, and
yet these persons proceeded to cover it up in the
interests of what they called "national security".
Could you please describe the essential elements
of the second conspiracy?
What is the main evidence for it?
Answer: by Richard E. Sprague
There was a second conspiracy, and it continues
today.
The second conspiracy began when a large number of
important and highly-placed persons in the United
States government (and outside of it) realized (on
Novo 22, 1963, and in the next few days) that there
had been a conspiracy to assassinate President Kennedyo They decided -- one by one, or in groups, or
as a result of threats, or choice, or being told in
confidence, etc o -- we do not know with what hesitation or pangs of conscience -- but they decided to
cover up the first conspiracy. The phrase which they

Exhibit 2
Original facsimile record of bills charged to the Warren Commission,
to pay for the stenographic reporting of sessions of the Commission.
PC-2

PAGE

'01.
10.

REPORTER

PLACE

DATE
1964

"

;-

I

Ai (:.

,::9 /tj

;

//

? {;h-..(/---.L,

),:(-.

TOP SECRET

~?J7/jJi

,-;'X'7

/76

/U.:::r.:::::t'.

die.
lj,C.

TOP SECRET

.:.-..

~:"'-4

TOP ,C!F'rR'P'r

TSp/~d~i"
p, hi .0:-"':'

rop

gEcnr.~

TOP SECRET
TOP SECRE'l

I

£/C

'T'~~

SECRET

.{)(;

TOP SECRET

~.(~

TOP SECRET

tJi ,C

it

,'/'-/

l~'.(.

.'.5~~'

I,(l f l-(,
:

./

,-/,p'

,'~~ ,j.:i:'1

. //",#

,

--;J, ,/": r .1, --.',
(...tOP SECRET
%OPSI;~

TOP SECRET

.-?-,C;~

-i~_Jt7

TOP SECRET
/

t} ~~7
l()

-/ j/J/

.;l~?i

c:./ 5-=

Aj.C.

~'<'-

/ ) l ,.-I: ( ~-('/

,.-S 7 '/

,6> ,().

!tj ,·;L~I

,-:;

j':A

~

3:;,,)

~{·Co

.:"/.

~:Jvv.d"- -<- ~~

(/

..2

:~

~, ~

.Y?u-it.?

·-?-A/.,

/.:1 7

/-' 1;),.1.';'.~. "

,i [,

:/'

J-~

(;.'7!f1!J
~..,y

--7Z)

,LJJC.

/h

.~~
~~

No.

Skipped

/-2:/

7l

.3.3 ...;

.~/~-

,.

/,:)../

/

/ n,.,

~

VO\,

Extra

Actual

To

s-

£1' ('

:LJ ~/
). I !//'/
'1{
"' "'l I .f'JU

'/ i

1'OP SECRET {

/'. ,C.

('')./-:>-

,

/' )". ~': .. : ,. \
TOP ~vr"~

c~/I

71

( .'1

A-"t

-.<.' ,

1/ /.,"
•
Top ~~~~:('

~.

'I

TOP SECRET
'<,1.1);, .1;,.

..:}oIIL-__ _ n-r-9_-l

\l/
(May use routines)

(May use routines)

FIRST LEVEL
SUBROUTI NES

SECOND LEVEL
SUBROUTI NES

LOWEST
LEVEL
SUBROUTI NES

Write New Master

[]

Erroneous
Trans

Read Old Master

Read Next Trans

Add To Master

Move Trans - To Print - Line

[]

Write Print Line

[]

FIGURE 1

Conceptually, both mainstream and subroutine modules
are a set of "building block" programs that can be written,
tested, and maintained by themselves - they are highly
independent.

Overall Program Structure
The block diagram shown in Figure 1 is a convenient
way to represen t the heirarchical structure of a program.
Each box indicates a program module. Along the top are
mainstream modules, which are always in con trol of the
program's operations. Note that there may be several
mainstreams; typically there is an initial section (initialization, setup, etc.), followed by the main processing section
or sections (if the program is doing a series of sequential
jobs), and an ending section (wrap up, final totals, closes of
files, etc.).
At the next level are what I call first level routines, the
major subroutines referred to in the mainstream. Since
these are in fact programs, they may use more detailed
routines, creating a structure several levels deep. As one
goes deeper into the structure, one normally finds that
routines have functions of increasingly limited scope. For
example, at the lowest level are subroutines that do such
things as write print lines, read tape, read disk files, etc.
The block diagram representation of a program is a
useful tool for teaching and for stimulating good design
concepts. It shows every module of the program and will
quickly bring to light fallacious design concepts (for exampie, an undesigned program will show up as one monstrous
block), excessive use of subroutines, etc.
40

Design Considerations - An Example
Here, let me discuss a representative example of program
design consideration. It is typical of a wide variety of rather
general design questions that come up in a broad range of
programs.
The design consideration is how to handle the several
possible outcomes of a modular subroutine. For example,
the mainstream may say, "PERFORM READ-CUSTOMERRECORD." Then the question is, how can we account for
the possibility that the customer record will not be found
by the subroutine that is "performed"?
There are two approaches: First, to have the subroutine
handle the error condition, i.e., go to an error routine that
returns to the mainstream section. Second, to have an
indicator set at the end of the subroutine that will tell the
mainstream logic whether the record has or has not been
found. (f the error indicator is set or "on," then the
mainstream logic can handle the error condition. I believe
that the indicator is usually the better method, because it
puts back into the mainstream logic for a condition that is
in fact a part of the broad function of the program - what
to do when an error is found. Thus the mainstream may
read:
PERFORM FIND-CUSTOMER-RECORD
IF ERROR INDICATOR IS ON, PERFORM CANTFIND CUSTOMER.
"CANT -FIND-CUSTOMER" is another program module
that would print the program messages and take appropriate action. Thus again the reader of the program knows,
from the mainstream alone, that errors can occur and how
they are handled.
COMPUTERS and AUTOMATION for July, 1970

In most programs, there are many such design considerations. The good programmer will find the opportunity for
creativity, innovation, and personal satisfaction if he recognizes such opportunities and exploits them.
Generality and Flexibility

.,

An important design consideration that does not relate
directly to program structure is that of generality. Essentially, this means setting up a program to do a general task,
rather than a series of highly specific jobs. Generality buys
flexibility, for it creates programs that are adaptive, without modification, to the normally changing business
environmen t.
Almost every program of any substance contains opportunities for generality. For example:
Don't include today's specific numbers in programs (like
stockrooms, parts, orders). They may (and usually will)
change. Include them as parameters, or data, that is an
input to the program and can be changed at run time.
Make dates printed by programs in the format "N week
period ending MM-DD-YY" so that the same program can
be used for weekly, monthly, quarterly, or yearly reports as
a function of the input data. Allow for full dates (decades
do change, about once every 10 years).
Format reports in a way that allows expansion. Normally a vertical arrangement is best; printing summary
items across the page limits expandability and means
program changes whenever a new item is added or
changed.

"A program should be designed to do a general
task, rather than a series of highly speczfic jobs. "

Don't cut corners based on current requirements. Always design for the general case. For example, if there is a
four-digit account number, where the first two digits are
constants (today), don't set up records and programs to use
only two digits ("But, the other two don't matter!" today). Use the whole number. Avoid the crises of "But,
that means revising 30 programs!" by designing it for the
general case the first time. Also, in fixed records, allow
extra spaces - you will need them sometime. Don't lump
items together unnecessarily ("They say they only need the
total, so why keep an extra field in the master file?"). The
keynote is:
Think Ahead
Understand Why
Design Systems that Live in a World of Change
(Remember Heraclitus)
Avoid Future Crises
Of course, there are tradeoffs. A highly generalized
system is expensive to build and operate. In many cases,
however, a general approach is as easy to implement as a
specific one. It just requires more thought in the design
stage. Sometimes (often) it's even easier, because the extra
thought results in generality that avoids programming
specifically all the oddities of the way things work now.
COMPUTERS and AUTOMATION for July, 1970

"Think in terms of alternatives and draw flow
diagrams at a general enough level so that it is
possible to re-think and re-draw until one finds a
design that is satisfactory. "

The Design Process
How does one really set to work to design a program? I
think the answer to this question is relatively simple, and it
takes the form of evaluating various alternatives to good
program design. The first step normally is to start drawing
flowcharts. These should not be detailed flowcharts; and in
fact, even in the case of relatively complex programs it
should not take more than ten to twenty blocks to show
what is really being done. In other words, the flowchart
blocks should all fit on a single piece of 8Yz x II" paper, if
the designer is thinking broadly about the function of the
program and is really starting at the highest level before
becoming enmeshed in detailed design of individual portions of the program.
The basic approach here is to think in terms of alternatives and to draw flow diagrams at a general enough level so
that it is possible to re-think and re-draw until one finds a
design that is satisfactory. The process one goes through
here is like many other creative processes. One starts with
some assumption of how the total program should be
structured and starts to diagram it. In the process, one will
often see difficulties and objections with that particular
method. From these objections one will get ideas for.
another way that will make the logic look simpler and more
easily implemented.
Because of this process, it is important to start at a fairly
general level. By "general" I do not mean vague. It is
important to be precise but not to worry about too many
of the details. If one starts drawing a detailed flowchart,
one thing that often happens is that the effort to revise it
evokes a normal emotional bias against really examining
alternatives.
The flow diagram at this stage will normally be a
detailed diagram of the key mainstream section, showing all
of its decision logic and showing all first level subroutine
modules, each with a brief description.
Many programmers do not begin design at this level, an
indication of a nonmodular approach to the problem.
Instead, the tendency is to just start drawing a detailed
flowchart, solving each problem as it occurs. This is analogous to building a house without a plan - one brick at a
time. The result in either case is likely to be the creation of
a monster.
If we are to have well designed programs, the concept of
design as a discipline must be accepted, taught, and developed. The concept of design is essentially unrelated to the
material in the programming manuals; the information
there provides only the raw materials that design converts
to reality.
0
41

LORD HALSBURY SPEAKS ON COMPUTER PRIVACY
The Earl of Halsbury
President and Chairman of Council
The British Computer Society,'
29 Portland Place
'
London WI, England

"One of the basic human rights should be: 'No secret information on a
computer, and right of print-out for the person to whom the computer
records relate. ' "
The British Computer Society, as often happens iil
modern technological societies, combines the functions of a
learned society, publishing a scientific journal, with the
functions of a professional institution concerned with
education and ethical standards. We are particularly concerned with ethical standards and we have set up our own
working party to consider this matter. 1 feel sure that the
whole sympathy of the computer scientists is with the
potential victims of any misuse of their science. The
potential victims and the scientists are on the one side, and
the impersonal, hard-hearted administrative machine, which
neither understands the techniques of the one nor sympathises with the needs orthe other, is the common enemy.
I am not going to take up time with reciting'a panegyric
upon the use of computers,·nlthough computers have been,
perhaps, the centre of my emotional life :for the iast 20
years. Some 20 years ago 1 found my-self, as managing
director of the National Research Development Corporation, virtually the sole means of channelling public money
from the public purse to the computing industry, then in its
period of gestation.

For we have the accomplishment of what is called multiaccess computation - that is to say, that you have one
computer with a large number of people working into it,
and not one of them knows that the others exist.

Multi-Access Computation

Warning: Security Systems Call Be Beaten

After 10 years of that work 1 thought that I was out of
it, and lay fallow for a couple of years. But some six or
seven years ago 1 found myself chairman of the Software
Committee which was set up by the Science Research
Council, and this particular subject has been my personal
subject for the last seven years. The subject has attained a
new level of achievement, on the one hand, or approached a
new level of difficulty or even embarrassment, on the other.

It is extremely important not to get starry-eyed about
the security provided by the security system. These systems
can be beaten, but the kind of proposition which runs 'the
system cannot be beaten', has the same logical status as the
proposition which says: 'I have forgotten nothing' - because it is obvious that if I had, 1 would not know that I
had forgotten it. The great overload facility for the British
universities at Chilton, known as the Atlas Laboratory,
where one of the six Atlas computing machines - which
were of most enormous credit to this country in the days
when they were young - is installed, recently acquired a
very large disc file, and then a satellite computer, together
with 16 on-line consoles, some of which are in Oxford and
some at the Chilton Laboratory. These enable people to
communicate direct on-line, simultaneously" apparently,
with the Atlas computer.

"The kind of proposition which runs 'the system
cannot be beaten', has the same logical status as
the proposition which says: '1 have forgotten nothing' - because it is obvious that zf 1 had, 1 would
not know that 1 had forgotten it. "
42

The Need for File Security
Arising out of this has come the need for file security. It
would be disastrous if one person wrote something into
another person's file. In the case of a written document, if
anybody alters it an expert can tell that the document has
been altered. The document may be merely expunged, as
they did in the Middle Ages, or have a line drawn through
it, as later, or the ink may be scratched out with a knife and
something overwritten; but there is always a trace left. In
the case of a magnetic mark on a tape no trace is left. A
particular dot, or bit, as it is sometimes called, can be
written and overwritten many times without leaving a trace.
So it is impos~,ible to find out whether something has been
overwritten or not, and it is necessary to have a security
system to make sure that it is not.

COMPUTERS and AUTOMATION for July, 1970

I was chairman of the Atlas Computer Laboratory
management committee during the six months when we set
up the file security and were trying to break it. There was,
of course, nothing improper in doing this; the people who
had designed the security system had an open invitation to
break it if they could. They broke it over and over again,
but with decreasing frequency. There was an occasion when
I was at the laboratory playing with the thing myself, and
somebody actually broke it and interfered with what I was
doing while I was doing it. That was a personal reminder' to
me that one ought not to get starry-eyed about the efficacy
of these security systems.
I should like to quote a remarkable person on this
subject who would, I think, highly commend herself to
noble Ladies in this House, because it can be but rarely that
a member of their sex achieves the distinction of being both
a professor in an American university and a Commander in
the United States Navy. I refer to Doctor, as I first knew
her, then Professor and now Commander Grace Hopper, the
doyenne of software in computer use, who has been writing
difficult higher-order software from a time to which the
memory of computers runs not to the contrary. We were
discussing this very problem in connection with her status
as consultant-in-chief to the United States Navy. She made
two statements to me that I have her permission to quote.
The first is that these systems are proliferating throughout the United States everywhere, and not one of them has
not been beaten within six months by somebody clever
enough to do it. Of course, an amateur could not, but the
man who designs the system, or his assistant, can usually
break it if he tries hard enough.
Automatic Right of Print-Out
The second is that she has persuaded the United States,
Departments which rely on her advice to grant every
member of every public department who has records on a
computer an automatic right of print-out. Anybody whose
records are kept on a computer has an unqualified right at
any time to say: 'I want to see what the compUter says
about me.' So if anything happens to change his status he
knows that the computer has 'a record of it and can demand
a print-out in intelligible form while there is time for
human memory to be still available to correct the thing if it
is wrong.
In all matters where the computer is going to be the
interface between man and the machine - and I do not care
whether it is a physical engineering machine in a workshop,
or an administrative machine, or a social machine - we
must be prepared to invest a little extra money in a
soft-sell. You cannot send people to prison because the
computer says so; there has to be a better reason than that.
This soft-sell has got to come from running the conventional system and the computerised system in parallel, at
some extra cost, long enough for people to gain confidence
in the system. This, with the right of print-out, will, I think,
gradually make people accept the new way of going abqut
things. In other words, we are not entering a phase of the
computerisation of everything; we are entering an in,termediate phase in which the two systems must be run in
parallel for long enough for everybody to gain confidence
in both.
COMPUTERS and AUTOMATION for July, 1970

"You cannot send people to prison because the
computer says so; there has to be a better reason
than that. "

Some Records Should Not

G~

on the Computer

There is another matter which I think is essential, and
that is that the administrator cannot have it both ways. If
matters are to be kept secret, then they must be kept by
the conventional system; if they are to be put on a
computer, then there must be a right of print-off. We
cannot mix the two. There are, of course, certain matters
which it is very proper to keep secret. The whole system of
references and referees depends on security between the
referee and the potential employer to whom the reference
is addressed. If a man applies for a job and gives references,
and those references are taken up, they must remain
confidential as between the referee and the future employer, for the very simple reason that nobody will give
references if, on those occasions when bad references are
given, they are landed with it personal embarrassment
through breach of confidence. Therefore references must
not go on the computer. And there may be other records
which should not go on the computer.
.
At this stage of our knowledge nothing should go on a
computer unless we are prepared to grant the person to
\ whom the 60mputer records relate the right of print-out.
The same applies to what I might call inter-Ministerial data
transfers - and I do not mean those as between ministers,
but as between ministries. I do not think one ministry
should have automatic right of access to the data files of
another except by authorisation at some appropriate level,
possibly at the level of the Minister himself. I do not see
why the Minister of Education needs to know that somebody has been to prison unless he is applying for a job as a
schoolmaster, in which case, if there are records about these
matters kept at the Home Office, the Home Secretary's
permission would have to be obtained for a particular piece
of information to be available - not in general, but in
particular terms - to the ministry that asks for it.
Human Rights
If we will think of it as some kind of principle which
could almost be added to the list of human rights, then one
of the basic human rights should be: 'No secret information
on a computer, and right of prin t-out for the person to
whom the computer records relate.' These, I believe, are
basic freedoms which are necessary for all those who might
easily become the victims of mistakes, let alone malice,
D
unless we take precautions against it.

Based on an address by Lord Halsbury who spoke in the House of
Lords in the debate on computer privacy.
43

liThe House is on Firel l

-

THE PROFESSION OF INFORMATIO N ENGINEER

The reliability and social significance of pertinent input
data;
The social value of the output results.

systems in a broad sense. To this end we shall seek to
publish here what is unsettling, disturbing, critical - but
productive of thought and an improved and safer "house"
for all humanity, an earth in which our children and later
generations may have a future, instead of facing extinction.
The professional information engineer needs to relate his
engineering to the most important and most serious problems in the world today: war, nuclear weapons, pollution,
the population explosion, and many more.

In the same way, a bridge engineer takes a professional
responsibility for the reliability and significance of the data
he uses, and the safety and efficiency of the bridge he
builds, for human beings to risk their lives on.
Accordingly, this department of Computers and Automation will publish from time to time, articles and other
information related to socially useful input and output data

The article which follows is based on an address by
Kingman Brewster, Jr., President of Yale University, at the
57th anniversary dinner of the Bureau of Advertising of the
American Newspaper Publishers' Association in New York
on April 21,1970. We feel it is significant and thoughtprovoking.

Computers and Automation believes that the profession
of information engineer includes not only competence in
handling information using computers and other means, but
also a broad responsibility, in a professional and engineering
sense, for:

The Dangers of Silence
Kingman Brewster, Jr., President
Yale University
206 Elm St.
New Haven, Conn. 06520

"If the country does not re-discover its own sons and daughters, no amount
of law and order or 'crisis management' will make much dzfference in the
long run."
There is one silence which I think is greatly misinterpreted; a state of mind which I think is dangerously
misunderstood. I mean the attitude and outlook of the
majority of university students these days, no matter how
calm the surface of their particular campus may be.
The Silent Student Majority
I am not talking about those bent upon the destruction
of the institutions of society. Nor am I talking about those
who seem to be slipping in to private, personal self-destruction. Their lot is dramatic, sordid, and sad. Their numbers
are still very small. I am talking, rather, about the relatively
silent student majority.
I would assert that even though the disruptive violence
on many campuses is less this year than before, the
underlying morale of great numbers of students is worse,
even on the campuses which are superficially placid. The
malaise, the disenchantment with life and its prospects, is
greater now than a year ago among most American students.
The futility of violence may have been learned by many.
Measures to deal with disruption have generally been
improved. Faculties and administrators are no longer as
44

split on the issue of willful coercion as they were two years
ago at Columbia, or a year ago at Harvard.
The press would be misinterpreting and the public and
the politicians would be misled, however, if they believed
that the violence or non-violence of the few is a measure of
the morale, the state of mind, of the many.
Nor is the level of violence the most important measure
of university life. Peace on the campus is wonderful - you
don't have to persuade a college president of that! But far
more important to the country is the attitude, the motivation, and the potential of the majority of the nation's
students.
Like it or not, among them are your children's future
leaders. If they are constructive, purposeful, hopeful, we
will survive any passing violent aberrations by their classmates. But if the best students turn cynical, sour, negative;
then, no matter how orderly their campuses may be, the
country will not be safe when their time of responsibility
comes.
Our preoccupation with the choppy seas and currents of
the moment tends to distract us. Deeper tides may have a
lot more to do with where in fact we are headed.
How do I know that the majority of students are less
hopeful, more dejected than they were a year ago? Of
COMPUTERS and AUTOMATION for July, 1970

"Our preoccupation with the choppy seas and currents of the moment tends to distract us. Deeper
tides may have a lot more to do with where in fact
we are headed. "

On The Home Front
course I cannot prove it. But I feel it; from bull session
conversations on my own campus and elsewhere. I find it
confirmed, without exception, by faculty members, deans,
and officers; and by presidents of other universities to
whom I have put the question.

Deeper Misgivings
There are some plausible explanations why misgivings
might be deeper now than they were a year ago:
The killing in Vietnam goes on without prospect
of an end.
The poor get poorer. Urban poverty, housing, and
health programs are curtailed. Inflation reduces the
power of everyone to buy food and clothing, shelter
and fuel, and hits hardest those who can absorb it
least.
The dedication to racial equality is pushed back to
the inner limits of constitu tional necessity. Even this
is grudgingly accepted and narrowly defined.
Topical symptoms of such deepening human distress
might be easier for the younger generation to take if there
were some indication that basic problems were being
tackled or admitted. It would be reassuring if it were felt, at
the very least, that discussion of fundamental problems was
welcomed.
Foreign Affairs
Yet many basic questions seem to be ducked, glossed
over, or ruled out of debate. For example, in foreign
affairs:
If we are not to police aggression everywhere,
what is the rationale of United States self-interest which
would tell us when commitment of our force is justified?
If peace is indivisible, even though we are not the
world's policeman, are we willing to support the United
Nations, or some other world policeman, even though he
is not under our exclusive control?
So far the only answer is the "Nixon doctrine". Neither
its assumptions nor its practical consequences are made
explicit. One is reminded of the British cartoonist Low's
characterization of Stanley Baldwin's policy in the late
thirties: "Trust me" was its first and final plea symbolized in pen and ink by a mouth sealed with adhesive
tape.
COMPUTERS and AUTOMATION for July, 1970

On the home front, even more fundamental issues seem
to be evaded; or at least their discussion is discouraged:
What is the rationale for defining priorities? Is the
decision for the SST to be made simply to keep the
Aerospace industry alive, as Mr. Volpe suggests? Is a
space program to be pursued for the advancement of
human welfare? for the advancement of understanding?
or primarily for the advancement of chauvenistic selfcongratulation?
How can concern with the "quality of life" be
squared with exclusive reliance on cost, price, and profit
to decide what shall be built and what shall be produced,
where, and how? These touchy questions are bound to
be raised. Will their exposure be welcomed, or will they
be disparaged by the smug, or vilified by the fearful?
How can one reconcile the distribution of income
in terms of the value a person contributes to society
with the ease with which capital can beget capital
without adding value? Or how can one reconcile private
power and the public interest when sanitary workers,
transportation workers, and government employees feel
they have to use their indispensability to blackmail the
public to achieve a fair wage? How can one determine
the proper levels of wages which may in fact be deserved
when they bear no necessary relation either to productivity or to competition?
How can one reconcile federal commitment to full
employment with control of inflation? Is it possible for
a representative democracy to tax constituents adequately and also to avoid excessive expenditures? "Truth or
Keynesequences?" might be the proper query to a
system which favors the election of those who vote for
expenditures and vote against taxes.
How can one reconcile democracy and laissez-faire
with social emergency? Will democratic capitalism ever
be able to mobilize for a constructive war on poverty
and racial degradation? Can a democracy muster a will
and a sacrifice for social objectives as great as that it
would arouse in order to defend the nation against
foreign enemies?
These are not rhetorical questions. They are real ones.
Their reality is more convincing because the students who
ask them don't pretend to have the answers. Most students
are smart enough to know that there are no easy answers.
But they would like their elders to admit that the questions
are real.
45

"Perhaps because students are themselves dissenting social critics, they do have an acute awareness
that criticism will never stand a chance of persuading the majority to change things zf everyone
can be frightened easily into silence. "

They would like their government to try to call such
questions to the attention of all of America. Instead they
see their leaders using the alleged complacency of "middle
America" as an excuse for evading the challenges which
matter most. They would especially welcome encouragement and respect for people who do try to raise such issues.
Instead there is a widespread sense that no-one in the
government establishment is moved to urgent, controversial
action. Thoughtful reports, like the Kerner Report on Civil
Disorders and the Eisenhower Report on Violence, have
provoked no concerted executive or legislative follow-up.
In the Name of "Law and Order"
Most frustrating of all to the most highly motivated,
concerned students is the glorification of silence; the disparagement of dissent and non-conformity; and the ease
with which the presumption of innocence is overridden in
the nar:ne of "law and order".
It is not surprising that potentially constructive critics,
skeptics, and heretics - what I would call "considerate
radicals" - are being driven into the ranks of those enraged
destructivists who would tear down the system.
It would be wrong to say that the young "blame" the
President in a personal sense. They did not expect much
better of a hucksterized process, whoever was, whichever
package, was "sold" and "bought".
They assume that the mainsprings of political ambition
require most politicians to be governed by a crass calculation of popularity. They can even explain, if not excuse,
the Vice President as a pawn in the strategic effort to
co-opt the right wing, to head off a Wallace candidacy.
Political Realism
Political realism, however, does not in their eyes explain
away the apparent disregard for the quality and the political integrity of the Supreme Court of the United States. A
generation quick to detect, even falsely to accuse, its elders
of hypocrisy does not take well to scolding preachments
about respect for law. Such pontifications set very poorly
when they are coupled with shoddy research into the
credentials for nomination to membership on the law's
highest tribunal, and acceptance of mediocrity as a satisfactory standard.
46

Because of their respect for constitutional values, rather
than in scorn of them, many members of the silent
disaffected majority of students are deeply concerned that
order seems to have risen above justice as the objective of
law.
Perhaps because they are themselves dissenting social
critics, they do have an acute awareness that criticism will
never stand a chance of persuading the majority to change
things if everyone can be frightened easily into silence.
If the police are not restrained from wire tapping,
unlawful· entry and seizure, and preventive detention, students know that the politically unpopular will be the first
to feel the brunt.
The greatest blame, the sharpest resentment, however, is
not aimed at the officers of government. It is focused on
those in nominal political opposition. It is aimed also at
those in positions of private power.
Partisan opposition seems petty, timid, and disorganized.
Active, organized political opposition sponsors little criticism of government policy on a scale and at a level worthy
of the hopes and fears which preoccupy the student
generation.
The young would admit that it may be the counsel of
"realism" for a politician, even an opposition politician, to
be dominated by an effort - as the saying goes - "to
preserve the options".
But where, oh where, are the "citizen spokesmen"?
"Competition of Ideas"
We all talk about the "competition of ideas in the
market place". We appeal to "pluralism" as democracy's
answer to the totalitarians' blueprint.
But if there is only one establishment voice; if silence is
honored above dissent, what do these cliches about freedom and diversity mean?
If the system is closed by threat and frozen into timid
conformity, what does it mean to "work through the
system?"
You, the press, and we, the universities, have something
to do with whether the young continue to believe in the
openness of the "open society".
Your profession - journalism; my profession - law;
Your colleagues - editors and reporters; my
colleagues - teachers and scholars;
Your institution - the newspaper; my institution, the
university,
- each of these has a special obligation, a special
COMPUTERS and AUTOMATION for July, 1970

"The press would be misinterpreting and the public
and the politicians would be misled, however, 1f
they believed that the violence or non-violence of
the few is a measure of the morale, the state of
mind, of the many."

mission. It is your job as well as mine to see to it that the
most talented members of the oncoming generation arrive
at their age of public responsibility as constructive, hopeful
leaders and citizens. If they lose confidence in the rule of
law, if they lose confidence in the integrity of learning, if
they lose confidence in the freedom of press and of
opinion, then we will have lost them.
If they cannot keep the faith, then their generation, in
turn, may well forfeit much that America has stood for.
Truly independent - sometimes nose-thumbing courts, universities, and newspapers are, of course, a continuous irritation" and frequently real trouble-makers for
any government.

"lvlost students are smart enough to know that
there are no easy answers. But they would like
their elders to admit that the questions are real. "

It is the unique Anglo-American heritage, however, to
have preserved and protected these critics as needling
monitors of official accountability - accountability to law,
accountability to professional criticism, and accountability
to public opinion.
Beyond the Reach of Official Retribution
The judicial, academic, and journalistic critics have been,
for the most part, remarkably and convincingly beyond the
reach of official retribution. The brief periods when they
have been tampered with, or persecuted, by officialdom are
counted by history as the dark days of the Republic.
All citizens, of course, bear a responsibility for that
vigilance upon which liberty depends. Those to whom
constitutional and other privileges are given in order that
they may be watchdogs and critics have a special responsibility. Your institution and mine are among these.
The scope of the Bill of Rights includes all the media.
But some media are more free than others.
The privileges and immunities of academic freedom
include all universities. But some universities, also, are more
free than others.
COMPUTERS and AUTOMATION for July, 1970

The newspaper, precisely because it is not licensed by
government, has a special obligation to be sure that the
franchised media, too, remain free of official recrimination.
Many newspapers, I gather, did just this in the Pacifica case.
The private university, precisely because it is not predominantly dependent upon government funding, has a
special obligation to exercise the full scope of its liberty. It
also has traditionally shouldered the duty of spokesmanship
for university autonomy generally, not only for itself alone
but also in behalf of those more vulnerable to harassment
by state or federal officials.
These obligations, to be stalwart in the exercise as well
as the defense of freedom, are going to be sorely tested in
our time.
The illness of the world calls for a diagnosis which
questions inherited assumptions. Yet the powers that be,
public and private, are bound to get "uptight" and seek to
smother dissent in blandness, scare it with slander, or
clobber it with the billy club.
. The stakes are terribly high, for those who will by the
simple passage of time inherit the earth, are now at the
crossroads.
The problems raised by the young, the questions they
ask, are not going to be solved speedily, or even in the time
of your generation and mine. But the chance of our
children to solve them, to answer them, will depend greatly
on two things;
First,' whether or not the younger generations feel
that the critic, the skeptic, the heretic are still welcome,
even honored and respected, in the United States.
Second, whether or not they feel that the channels of
communication, persuasion and change are truly open,
as the 'Bill of Rights intended they should be.
The ability of universities and newspapers to defend and
to utilize their freedom will have much to do with the
ability of the young to keep their faith in freedom.
My experience is limited. My lot as a college president
has for the most part been favored. But I have seen the
challenge of the nation in the microcosm of my own
campus. Students have tested my patience. I certainly have
tested theirs. But if you disregard the ugly among them,
and if you disregard the ugly among us, I am optimistic.
Experience as well as hope give me confidence that they
will not fail us if we do not fail them.
D
47

TRAINING FOR COMPUTER PROGRAMMERS
Lorin G. Vogeding, Chairman
Computer Science Dept.
Tri-Countv Area Technical- Vocational School
6101 Nowata Rd.
Bartlesville, Okla. 74003

We are all aware that we must train and place on the job
500,000 new programmers during the first half of this
decade. This figure is twice the number now work ing in the
industry. How can we accomplish such a task? This article
will review past and present methods of training computer
programmers, and will suggest a new concept for programmer training that may prove to be the answer to this
question.

The Qualified Beginning Programmer
Before we examine how we train programmers, it is
necessary to determine what experience and knowledge are
required of good beginning programmers. I n general, a
qualified beginning programmer is a person who:
1. Is competent in two or more third-generation
computer languages.
2. Has had "hands-on" experience and knowledge of
how software works.
3. Has acquired knowledge of business and accounting procedures.
4. Has the ability to do basic systems work such as
flow charting, etc.
5. Can produce useful work for an employer in three
months or less. (It takes about three months to
learn specific company procedures.)

Training by the Computer Manufacturer
When business computers first came into use, the training of computer programmers, for the most part, was left to
the manufacturer. Programmer trainees were sent to a
course or two which taught them the basic concepts about
the particular computer their company had "purchasGld."
They were taught how to read a reference man ual on the
language that the manufacturer's equipment dictated they
use. Then the programmer, who was still relatively nonproductive, was brought into the company, and through
trial and error he tried to learn the basics of the black art of
programming. If he was successful, within about two years
he became a productive, competent programmer.
I n many cases, the programmer had to go back to the
manufacturer's school to learn a new language when his
48

company got new equipment. The programmer who was
trained in this manner was limited in scope to the things
that he learned from the manufacturer. He was very
dependent on the manufacturer, whose ideas and concepts
were accepted without question. While some good programmers came out of th is type of training, a good many
potentially good programmers were lost. The cost of this
type of training was extremely high.
As more and more computers were placed in operation,
new ways to train programmers were sought. To increase
the chances of success through training by manufacturers,
companies began h iring college graduates who had proven
learning record which allowed them to be trained at an
accelerated rate. When it appeared that these college graduates also had management potential, companies began to
turn to the computer department as a source of new
management talent. As a result, some computer departments became training grounds for company managers, as
well as computer programmers.

a

C.olleges and Universities
Most colleges and universities got into the programmer
training business through the back door. The computer was
first considered a tool to further the study of subjects such
as math or engineering. Courses were offered which were
directly related to the discipline involved. As competition
for new programmers became more severe, some institutions saw the need for training in business-oriented languages. But these courses were still slanted to the discipline
of the department control I ing the computer faci I ities. Most
courses were heavily math oriented. This was fine for
training scientific programmers, but did little to meet the
needs of business data processing other than provide a
slightly improved student for the manufacturer's process.
Some institutions now include a four-year course in
business data processing with some 20 to 30 hours of
computer-related subjects. But a graduate of this type of
program usually only meets the qualifications for an entry
level programmer in industry. And these programmers are
usually sent for further training from manufacturer of the
computer they will be using.
COMPUTERS and AUTOMATION for July, 1970

The goal of most colleges and universities In computer
education has been to prepare for further education; their
goal has not been vocational. Thus colleges and universities
are, in most cases, not meeting most of the needs of
industry.

Private EDP Schools
As the need for programmers increased, private computer schools emerged. These schools grew rapidly in
numbers, and many were exploited for quick financial gain
on the part of the owners. For the most part, the subject
matter was limited, the hardware antiquated, and the
teaching staff sub-standard. The students which these
schools turned out had little or no "hands-on" experience
and limited useful information. This caused industry to be
very cautious about hiring private EDP school graduates.
A few of these schools, however, have succeeded in
offering a course of study that does adequately train entrylevel programmers. The successful schools are typically
franchised operations. They screen their students with an
aptitude test which hopefully indicates the students potential for becoming an entry-level programmer; i.e., someone
who can code from a flow chart. But students in private
EDP schools learn little or nothing about business, and
usually need additional extensive training before they become productive for their employers.

The Area Technical Vocational Schools
So we have the manufacturers, colleges and un iversities,
and private EDP schools all attempting to train computer
programmers - and all meeting with limited success. There
is a fourth training program which may be able to avoid
some of the pitfalls that seem inherent in the above
programs. That source is the area technical vocational
schools which were established under the Vocational Education Act of 1963. These schools are dedicated solely to
the trarning of vocational and technical students. They
offer an excellent vehicle for training computer programmers, because they can offer courses that are tailored
to the specific need of the student in achieving competency
in a specific area, without offering all of the general
education courses usually taken during the first two years
of college. Technical-vocational schools are oriented toward
the high school and post high school training, and most
offer both day and night programs.
My experience in training computer programmers in
these schools has been at the Tri-County Tech in Bartlesville, Oklahoma. In designing our computer programming
course, our goal was to tailor our program in such a manner
as to turn out a person who would meet the requirements
outlined at the beginning of this article. We also wanted to
design a program to accomplish th is goal in the shortest
possible period of time, taking into consideration the type
of students that are attracted to such a program.
The following is a brief course outl ine as it was developed:
COMPUTERS and AUTOMATION for July, 1970

COMPUTER PROGRAMMING
LENGTH: Four 12-Week Quarters

1st Quarter
I ntroduction to Computer Programming
Physical Level Language
Business Math
Accounting I
Communications I

Hours Per Week
4
15
3
5
3

2nd Quarter
Assembly Language
Algebra
Accounting II
Technical Report Writing
Business Organization

15

4
5
3
3

3rd Quarter
Report Program 6 Weeks
15
Fortran 6 Weeks
Business Statistics
Accounting III
Oral Communications
Management Concepts

4
5
3
3

4th Quarter
Cobol
Systems Analysis
Accounting Systems

15
10
5

This course covers four quarters of twelve weeks
each, with students spending six hours a day in class. The
average student in the program has had one and a half years
of college training prior to coming into the program. All
courses are directly related to the art of computer programming. One half of the student's time is spent developing his
skills as a computer programmer. The other half of his time
is spent on courses such as business mathematics; accounting, communications skills, both written and oral; business
organizati9n and management concepts; as well as a course
in the concepts of systems analysis. The program is taught
by people with a background in business data processing.
This type of training is Indeed practical. A student
can learn the essentials of programming, and obtain a basic
business background in a relatively short period of time.
The course is also ideal for training and updating existing
programming talent. It is possible, for example, for a
programmer who has a need to update his skills in
accounting to attend only that section of the program.
Upon completion of th is program, students do meet
the requirements for being a good beginning programmer.
The big question to be resolved is: Will industry accept
people trained in this manner? Can we break down the
prejudice against persons without college degrees, or has
this become an enigma to the programming industry?
D
49

ACROSS THE EDITOR'S DESK
APPLICATIONS
SEASONAL MOSQUITO BATTLE
GETS COMPUTER ASSIST

The Metropolitan Mosqui to Control
District (MMCD) in St. Paul. Minn.,
is using a Univac 9300 computer in
their seasonal battle against mosqui toes. The computer is provid~ng
quick. easy access to a mass of Information that assists crews from
the MMCD in their work. (The MMCD
includes six counties -- Hennepin.
Ramsey, Scott, Dakota, Washington
and Anoka -- in and around Minneapolis and· St. Paul.
It is the
largest mosquito control district
in the nation -- 2,850 square miles.
Mosqui to breeding sites cover._14%
of the total land area in the district.) A. W. Buzicky, MMCD director. explained how the computer
helps in their battle against the
mosquito.
MMCD crews (about 80) takesamples
from some 56,000 mosquito breeding
sites in the district. Inspection
crews estimate the number of mosqui to larvae in the ·samples. taken
from each site. At the MMCD laboratory various species of mosqui toes
are identified from the samples.
All the information is compiled on
the Univac computer (operated by
the Rams ey Coun ty Da ta Proces sing
Department) and provides the MMCD
wi th a master file listing the type
and numbers of mosquitoes found at
each site.
The type and kind of treatment
are added to the site mas ter file
as the season progresses.
Crews
continue site sampling throughout
the season and reports are inserted
into the master file tokeep it updated. When rain initiates growth
of the larvae, the master file shows
which si tes had a particular species
of mosquito.
The crews return to
the sites for another check and can
provide treatment immediately, if
needed. As Mr. Buzicky exp~ained,
"What we have is easy access to a
large quantity of accurate information. We are saving time by avoiding sites tha t don't have to be
checked."
FOOD CHAIN PUTS REAL COST
ON 4,000 ITEMS USING
IBM SYS'fEM/360

Benner Tea Co., Bur 1 ing ton, Iowa,
is one of the first U.S. food chains
to provide the ac tual price of food
or other i terns by weight or measure
in all its stores.
Using an IBM
Sys tem/360 Model 25.
Benner has
50

calculated the "Tru-Price" of about
4,000 items, nearly all of which
come in different size cans orpackages.
In the past, the housewife
selecting a canned vegetable, for
example, would be uncertain of the
real cos t of a 12-ounce can compared
wi th a 16-ounce can.
As of June
3rd, a housewife shopping in any
of 23 Benner, Giant or Star stores
in Iowa, Illinois and Missouri,
could tell a t a glance the per unit
cost of and item -- including canned
foods, packaged foods, soaps, paper
towels or aluminum foil.
Benner's computer prints the
labels necessary to give the housewife the price information. Easyto-read labels contain:
the TruPrice (such as l2¢ per oz), produc t
name, total content, and total cost
(such as' 26¢ per can).
The same
label also contains stock information to help store employees mark
prices on each item and place it
properly on shel ves. For easy identification, three differen~.colors
are used for Tru-Price, total
price. and the stock information.
ChArles C. Fi tzmorris, Jr., Benner
president, said that wi thout a co~­
puter Benner's could not offer unIt
pricing since there are just too
many different prices on too many
different sized cans , cartons and
packages for any chain to figure
the price by hand.
LEVELS AT WHICH CARBON
MONOXIDE IMPAIRS HEALTH
ARE PINPOINTED BY COMPUTER

Research at Marquette School of
Medicine (Milwaukee. Wis.) confirms
the suspicion that carbon monoxide
(CO) can injure people long before
it kills them. The study is aimed
at providing information to aid in
the formulation of air pollution
control standards and programs.
Research at present concentrates
on CO because it is a major pollutant in cities.
Later study will
focus on other pollutants, individually and in combination with each
other.
Preliminary test results of the
computer-aided study show that. carbon monoxide in heavy trafflc or
severe smog conditions slows down
human activity.
Scientists are
exposing volunteers to increasing
levels of CO to test the gas's effect on human performance. Volunteers spend from 1 to 24 hours in
a carefully controlled environmental
chamber performing such tasks as
driving, exercising. estimating distance and time, and solving simple

math problems. Doctors constantly
monitor the subjects physical con-

di tion during the time the volunteers are in the special chamber.
At 200 parts per million of air.
CO has a strong impact on performance of such everyday ac tiv i ties as
driving and working.
Dr. Richard
Stewart, environmental medicine department chairman at the school,
said a person exposed to high carbon monoxide concentrations ,for
several hours develops a headache.
loses manual dexteri ty and has a
noticeably longer reaction time to
stimuli.
Test data is compiled and processed by an IBM System/360 Model
40 computer. It prepares analytic
summaries used to evaluate all aspects of the tests. During experiments, scientists measure the percentage of CO in the oxygen-carrying part of the blood. At a 15-20%
carboxyhemoglobin saturation, the
brain wave pa t tern changes and headache develops; manual dexterity is
impaired at 30% blood saturation;
and at above 50% saturation, damage
to 'heart and brain may occur in
healthy people. Sick persons. especially those with heart d~sease,
may be inj ured at concen tratIons as
low as 10% -- a concentration easily
reached by their smoking two packs
of cigarettes a day.
The study,
financed by the U.S. Public Health
Service the Automobile Manufacturer' s As~ociation and the American
Petroleum Institute. will take three
years to complete.
DOD REFERRAL PROGRAM FOR
RETIRING MILITARY PERSONNEL

The Department of Defense has
instituted a computerized referral
program to assist the more. t~an
65,000 military personnel retIrIng
annually in seeking second caree:s.
For most military personnel, WIth
COMPUTERS and AUTOMATION for July, 1970

20 to 30 years total service, retirement comes at 41 or 51 a
time when family obligations are
mos t likely to be heavy, and the
retiree cannot live solely on his
retirement pay.
The retiree is
often stationed thousands of miles
from his planned retirement home
and has no effective way of knowing
what job opportuni ties exist in the
area.
The referral program is designed
to enlist the aid of both government
and industry. ' Retiring miU tary
personnel have to register for the
program within six months prior to
discharge,while employers from the
public and private sectors may list
their j ob orders through the Department of Defense beginning August 1
of this year. The computerized system will match the man to the job
and forward the matched resumes to
prospective employers.
Intended
primarily as an improved means of
communication for servicemen wi th
prospective employers, the program
has a limited amount of matching
elements. They include job title,
location, availability date, pay,
education and investment, if any.
Retirees interested in the program should report to the neares t
military installation. Prospective
employers contact: Centralized Referral Activi ty, Defense Elec tronics
Supply Agency, ATTN: DESC-R, Dayton, OH 45401; o~Director, Transitional Manpower Programs, ATTN:
Referral Program Coordinator, OASD
(M&RA) , Room 3D271,Pentagon, Washington, DC 20301.

EDUCATION NEWS
EDUCATIONAL FILMS
AVAILABLE FROM GE

Educational films available from
General Electric include "You and
the Computer" and a new film, "Computers at Work".
The films are
produced especially for students in
secondary schools, colleges, business,and industrial training. The
films, designed to be free of commercial content, are available in
16 mm, sound and color.
"You and the Compu ter" demonstrates the basic functions of a
Clear t 1 ayman' s terms
compu ter:
make this film useful for anyone
des iring a bas ic unders tanding of
the subj ect.
The film uses live
action, plus animation, to focus on
an item that is close to everyone
- the issuance of a paycheck. The
viewer is in the center of action
and sees that we 'all are involved
with computer functions. The film
runs 9 minutes.
COMPUTERS and AUTOMATION for July, 1970

The new film, "Computers at
Work" helps the viewer see the computer in actual working conditions
- improving instruction techniques
in schools, helping launch spaceships,preparing better-tasting cake
mixes, etc. By showing how computers
are used, this film (which runs 12
minutes) provides an effective complement to "You and the Computer".
Further information on these,
and other non-commercial films in
GEt s series of educational films,
is contained in a new bulletin,
GIZ-2203, available free of charge
from: General Electric Educational
Films, 60 Washington Ave., Schenectady, NY 12305.
"TOTAL EDUCATION SYSTEM"
BEING MARKETED BY
COMPUTER SCIENCES CORP.

Computer Sciences Corp. is marketing a packaged "total education
system," complete from furniture
to instruc tional materials, which
enables business concerns to provide a continuing program of education in effective computer usage
to management and technical personnel, at their own facilities. The
system, known as Advanced Computer
Training In a Versatile Environment
(ACTIVE), includes a 24-seat classroom, graphics and communications
equipment, four courses in computer
technology, and advanced ins tructional techniques. Educational support services are 'provided over a
five-year period. For more inforrna tion, wri te to: Computer Sc iences
Corp., 1901 Ave. of the Stars, Century City, Los Angeles, CA 90067.
PROGRAMMING REVIEW COURSE
TO BE OFFERED IN WASHINGTON
IN PREPARATION FOR DPMA EXAM

Compudemics, Inc. (Washington,
D.C.) will hold a review course
within the Washington-Metropolitan
area in preparation for the DPMA
Registered Business Programmer Examination.
The Data Processing
Management Association (DPMA) awards
the Registration, on the recommendation of the Certification Council,
to individuals who have satisfactorily passed the examination. The
examination is being given in Washington, on October 10, 1970, at the
George Washington University.
Compudemics' review course will
be held on September 26 and October
3. Registrants will receive an intensive, formal review of the maj or
areas of computer programming in a
course especially designed to comply wi th the official Registered
'Business Programmer Study Guide,
published by the DPMA.
(Review
courses may be arranged at any 10-

cation that interested organizations wish to make them available.)
The fee for the course is $60; the
course text may be ordered separately for $10.
Further information may be obtained from Compudemics, Inc., 1629 K Street, N.W.,
Washington, DC 20006.
PRACTICAL APT PART PROGRAMMING CORRESPONDENCE COURSE

A Practical APT Numerical Control Part Programming Correspondence Course, announced by NC Sciences, Inc., reflects 108 hours of
equivalent classroom instruction.
The course is an adaptation of a
proven classroom version taught by
NC Sciences, Inc. (both on-s ite and
resident courses) to trainees from
a variety of technical and manufacturing disciplines.
The course begins with a basic
introduction to APT (Automatic Programmed Tools) and continues in to
a study of a wide range of programming concepts Including point-topoint or posi tional programming and
up to three-axis computer assisted
continuous path programming. It is
designed to acquaint the manual
part programmer with the basics of
the APT language while giving him
a working understanding of the complete APT system. Further information may be obtained by contacting:
Donna DiSario, NC Sciences, Inc.,
c/o Rynham Assoc., 623 Penn Square
Bldg., Philadelphia, PA 19107.
SIEMENS COMPUTER SCHOOL
IN MUNICH, GERMANY

Siemens AG in Munich has founded
one of the largest data processing
schools ever opened by a computer
manufacturer.
The new school has
30 instruction rooms, one lecture
hall and two computer training centers where nearly 100 lecturers may
train about 800 people at a time.
A dozen computers (worth more than
DM 20 million and including the
most modern models) are installed
in the two computer centers.
The existing public and private
training schools are not yet in a
posi tion to turn out enough trained
computer personnel. Computer manufacturers must still support the
maj or share of the training load.
Last year Siemens trained a total
of 12,000 people in their facilities
at home and abroad.
According to a report by the
Federal Minister for Education and
Science, compu ter manufac turers and
users require about 1,500 to 2,000
academically trained data process":
ing experts per year; in addition,
there is a great demand for spe-

51

cial ized sys tem analys ts and programmers. Wi th an es timated 15,000
data processing systems installed by
1975 in the Federal Republic of
Germany alone (requiring at least
20,000 operators and 30,000 programmers for their operation), one gets
an idea of the training effort that
will have to be made.

RESEARCH FRONTIER
UCLA ROBOT,
A PROMISING AIDE
FOR ASTRONAUTS AND AMPUTEES

An automaton, that learns by
watching its human master, adapts
to its environment, and reacts to
reward and punishment. recently demonstrated its skills at the University of California, Los Angeles
(UCLA) • The Au tonomous Con tro 1 SubSystem (ACS) was designed and buil t
by Dr. Amos Freedy as a research
project for his Ph.D. in engineering.
ACS consists of an IBM 1800
process control computer which is
connected by a small analog computer
to a manipulator arm and claw, known
as the learning arm.
In the demonstration, Dr. Freedy
operated the learning arm to arrange
a number of blocks in a given pattern using a joystick control to
move the arm in three dimensions up and down, forward and backward,
and sideways - and a foot pedal to
open and close the claw. The robot
gradually picked up the behavior and
manipulations, until it learned
enough to take over mos t of the
movements and controls.
Working wi th Dr. John Lyman,
head of the UCLA Biotechnology Laboratory, Dr. Freedy has incorporated
some psychological techniques of
the learning process into the ACS.
The robo t responds to reward (after
getting an electronic pat on the
back) and punishment, changes its
behavior wi th changes inj ob assignment, and forgets old routines, but
relearns them faster than it picks
up new ones. When ACS doesn't have
enough background experience to
handle a new task, it flashes a red
light, or guesses at the right move
on the bas is of highes t probabili ty.
The robot's ability to pick up
and take over many complicated functions makes the robot a promising
assistant for astronauts or amputees, or for any j ob demanding quick
manipulation of many different controIs, according to Dr. Freedy. He
believes the device eventually can
be made small and light enough to
be integrated into artificial arms
for amputees.
Supporting his research, and reflecting its potential
52

range of applications, are the Defense Department and the Social
Rehabilitation Service, U.S. Dept.
of Health, Education and Welfare.
COMPUTER CONVERTS
'TEXT' TO 'T ALK'
AT BELL LABORATORIES

Speech researchers have tried
many methods for producing synthetic
speech - all required human translation of each message into special
machine terms. Now, Bell Labs scientists can produce nearly natural
sounding synthetic speech directly
and automatically from ordinary
English text.
Recent experiments
take advan tage of an improved understanding of speech patterns - the
way people really use their language
and tailor it to match their intended meaning.
Bell researchers gave the compu ter ma thema tical approximations
to the shapes and motions the human
vocal tract assumes when uttering
common sounds and sound sequences.
They programmed the computer wi th
a bas ic dic tionary of word categories and defini tions in digi tal
form. They then approximated, for
compu ter storage, the complex rules
of timing, pitch, and stress which
people use in every day conversation, e.g., timing cues were provided that distinguish expressions
such as 'a nice man' / 'an iceman'.

In the experiments, passages are
typed and sent to the computer from
a teletypewriter. The computer analyzes the sentence, assigns stress
and timing to each word, and finds
a phonetic description of each word
from the dictionary stored in the
computer's memory. Mathematical descriptions of vocal-tract motions
are computed and these are used to
generate electrical speech signals
which may be heard over a loudspeaker or a telephone.

AUTOMATION
GE'S MAN-MATE INDUSTRIAL
BOOM LIFTS LOADS TO 370 LBS.

Handling sheets of glass up to
sizes as large as 12 x 12 feet is
effec ti vely done wi th General Electric's Man-Mate boom, one of a number of advanced "Cybernetic Anthropomorphous Machine Systems" - CAMS
- under development by GE. It is
cybernetic because man is retained
in the sys tem and provides the bas ic
computer capability. It is anthropomorphous because it is man-like
in form and uses the operator's
dexteri ty, judgment, and ability
to adapt to unpredictable circumstances.

The text-to-speechconverter was
devised by Cecil H. Coker (shown at
the computer console), wi th the help
of Mrs. Noriko Umeda and other members of Bell Labs' Acous tics Research
and Human Information Processing
Departments at Murray Hill, N.J.
The oscilloscope (shown) connected
to the computer produces a line
drawing of the model vocal tract,

and displays the change in position of the throat, jaw, tongue,
and lips as different sounds are
produced. The oscilloscope, though
unnecessary for text-to-speech conversation, aids researchers in moni toring the
performance of the
. system.

The new mode 1, CAM 1400, now being in troduced can 1 ift loads up to
370 pounds. The principle of force
feedback control gives the operator
a sense of feeling as if he himself
were pi~king up the obj ect wi th his
hand.
The end effector used here
is a set of vacuum cups. Other end
effectors such as mechanical grippers or hooks give the machine versatili ty in industrial applications.
Unskilled operators can master the
machine wi th a minimum of training.
The Man-Mate boom, as well as other
materials handling products, is
manufactured by GEts Specialty Materials Handling Products Operation, Schenectady, N.Y.

COMPUTERS and AUTOMATION for July, 1970

NEW PRODUCTS

Description and Notes

Product Name/Model No.

For More Information:

Digital

501 Datamanager

CDC 5100 Minicomputer

Data Processing Elephant
411

cd 200 Minicomputer

Model 980 Minicomputer

Models 1.0, 2.0, 3.7

Atron Corp.
For business oriented applications / processor's macro1256 Trapp Rd.
instructions and data structure handles data in strings
as well as single characters / software support provides St. Paul, Minn.
Attn: Jack Germaine
system simple enough for turnkey operation / basic
machine sells for under $6000 in quantity
Control Data Corp.
Originally for military shipboard use, will operate
8100 34th Ave., South
under extreme evironmental conditions / has lithium
Minneapolis, Minn.
ferrite core destructive read-out memory, 16-bit interAttn: Kent R. Nichols
nal I/O channel, four 32-word file registers, two external interrupts / CDC 1700 peripherals compatible
Telefile Computer Corp.
Stores 500 million bits and handles 56 computer appli2000 Commonwealth Ave.
cations at the same time / combines three computers
Newton, Mass. 02166
into a single system / uses real-time COBOL computer
Attn: Mr. S. L. Rankin
programs / provides quick turn-around
Computer Development Corp.
For general data acquisition, industrial process con3001 S. Daimler St.
trol, communication systems / direct memory access,
Santa Ana, Calif. 92705
direct peripheral-to-peripheral data paths / allows
intermixing memories of different types / operates on
8-bit b tes and 16-bit words
Digital Systems Div.-Houston
For applications in processing and control
available
as stand alone, complete hardware and software / 16Texas Instruments Inc.
bits, 1 ~s memory cycle time, 400 ns memory access
Houston, Texas 77006
time / 4096 word capacity expandable to 65,536 words
For general business, scientific, and engineering appli- Clary Datacomp Systems
cations / all models have time-sharing capability / each 408 Junipero Serra Dr.
designed around Datacomp 404 processor with various
San Gabriel, Calif. 91776
packaging, memory, I/O, and peripheral options

Special Purpose Systems

Regitel System, a pointof-sale transaction
system
DATAPLE

T

System

Network of electronic cash registers with own minicomputer / provides edited data to store's central
computer / programmed registers lead sales people
throu h ste s / rovides for cash transactions
For data acquisition and preparation
uses Recording
Typewriters to capture all computer data on tape cassettes as by-product of routine business typing / provides for data transmission via telephone

American Regitel Corp.
1011 Commercial St.
San Carlos, Calif. 94070

Provides PDP-8 users with up to 3,325,952 12-bit words
of storage / handles up to four disks / 154 msec average
access time / software monitor requires 8,192 words of
core memory and high-speed paper tape reader or magnetic
tape storage
Interfaces with 8, 12, and 16-bit minicomputers / storage capacity is 64,000 8-bit, 48,000 12-bit, or 32,000
16-bit words / 8.5 msec average access time / 1.2 MHz
data transfer rate / system drives up to 8 discs
Two board arrangementi one with all clocking and timing,
the other contains memory array / 1024 8-bit word system with 1 msec cycle time / used as direct replacement
for core memories with com arable stora e ca acit
For register, scratch-pad, and buffer applications
ECL logic compatible / have 64-bit 7 nsec memory device and storage support circuit / typical access
time, 12 nsec / Model 1288E, 128-words x 8-bitsi
Model 1298E, 128-words x 9-bits
For use with minicomputers J Series 130 includes disk
drive, power supplies and controller with computer
coupler / Series 140 incorporates IBM compatible synchronous Write/synchronous Read tape transports and
controllers complete with computer couplers

Digital Equipment Corp.
146 Main St.
Maynard, Mass. 01754

Data Instruments Co.
16611 Roscoe Place
Sepulveda, Calif. 91343
Attn: Ellsworth Hill

Memories

RK8 Disk Pack System

Model 501 disc memory

Mostak II

Models 1288E and 1298E
read-wri te memory cards

Disk Cartridge Memories,
DSD Series 130
Magnetic Tape Memories,
DSD Series 140

COMPUTERS and AUTOMATION for July, 1970

Dynacoustics, Inc.
1980 National St.
Hayward, Calif. 94545
Attn: Dennis Setera
Electronic Arrays, Inc.
System Division
9060 Winnetka Ave.
Northrid e, Calif. 91324
Advanced Memory Sys terns, mc.
1276 Hammerwood
Sunnyvale, Calif. 94086
Data Systems Design
1122 University Ave.
Berkeley, Calif. 94702
Attn: W. C. Crawford, Jr.

55

Product Name/Model No.

DescriDtion and Notes

For More Information:

Software

AlMES III (Automated Inventory Management
Evaluation System)
AUTO-SOURCE

BASIC (for PDP-II)

COBOL-MAP

DEEP 360

HEARTS

Hill System of Engineering Computations

IAL (Investment Analysis
Language)

Designed to optimize inventory performance for retail
merchants / yields wide variety of reports / modular
structure of AIMES permits selection of only those
reports needed / available through Data Link centers
or for lease/purchase on own equipment
Virtually eliminates program pilferage and tampering /
cryptographic techniques scramble programs it protectsj
passwords prevent unauthorized access, modifications /
available for IBM System/360 installations
Requires 4,096 words of core memory, but can be used on
larger systems as well/BASIC programs for other computers often can be run on PDP-II without modification /
has machine language calling capability / free
Reference aid comprised of three programs, two IBM DOS
sorts, and compiler interface / provides two listings:
a standard alphabetical reference directorYj a substitute for COBOL com iler's listin
199.95
A 3K subroutine linked into problem program to inhibit
"data exception" type program checks / is called only
twicej all logic spanned by these calls is protected /
OVRLAY2 (auxialiary package) permits DEEP/360 usage in
COBOL overlay programs / for DOS use only / $225
A 12-lead ECG analysis program / for use with Sigma 5,
6 and 7 computers / certified by Nat'l Center for Health
Research and Development / off-line portion available
without charge; on-line real-time portion, later in year
Allows easy computations by engineers and architects,
requires no programming, offers various problem solving
methods / office terminals connect with XDS Sigma 5 over
phone lines / programs now include Building Analysis Design, Member Design, Truss Analysis
To assist bank management in solution of investment and
financial problems / A.B.A. certified for distribution
through time-sharing suppliers / currently has 59 commands in system

Data Link Div., UCC
1949 Stemmons Freeway
Dallas, Texas 75207
Attn: Jim D. Fleming

Provides NC conversion for used equipment (Giddings &
Lewis Model 330, 340 or 350 horizontal table type boring
milling and drilling machines / includes Model 2200
numerical control (2- or 3-axis solid state)j magnetic
controlj hydraulic drives / manual control unaffected
All-computer numerical contouring control/incorporates
Prodac® 2000 CPU as logic element / operates on instructions from any punched paper tape system or from a general
purpose computer as part of DNC hierarchy system

The Bunker-Ramo Corp.
Numerical Control Sys. Div.
Highland Hgts., Ohio 44143
Attn: Robert Denega

Rapid Response Sys tems, Inc.
1040 Avenue of the Americas
New York, N.Y. 10018
Digital Equipment Corp.
146 Main St.
Maynard, Mass. 01754
Attn: Dennis C. Goss
Pioneer Data Sciences, Inc.
P.O. Box 236
Wilbraham, Mass. 01095
Attn: Bob Burnham
Macro Services Corp.
131 Tremont St.
Boston, Mass. 02111
Attn: Joseph Battista
Xerox Data Systems
701 So. Aviation Blvd.
El Segundo, Calif. 90245
Attn: Ken Allen
Transdata Corp.
4808 N. Central Ave.
Phoenix, Ariz. 85012
Autom. and Tech. Research
The American Bankers Assoc.
90 Park Ave.
New York, N.Y. 10016
Attn: John MacDougall

Numerical Control

Bar Mill Retrofit Package

New World

Westinghouse Electric Corp.
Box 868
Pittsburgh, Pa. 15230
Attn: R. J. Benke

Peripheral Equipment

Reads 8-column cards at over 300 cpm / field conversion
kit adds capability of reading IBM System/3 96-column
cards / desk top size (about 2' x 2' X 2')
Statos-5 Printer/Plotter Iransforms digital info directly into graphics at 800,000
plot points per second / 1400 styli across 14 1f-wide chart
Model 514
grid / variable paper transport speeds / interfaces with
computer to print own chart paper, time bars,etc./ also
prints own alphanumeric annotations electrostatically
Provides bi-directional tape speeds to 45 ips / preciSC 1035 Tape Transport
sion edge guidance / 9-channel, 800 bpi or 7-channel,
dual density, NRZI format
Transmits and receives letter-sized documents over standXerox 400 Telecopier
ard phones at speed of 4 minutes per page I portable
(18 Ibs), carrying case available / designed for'broad,
decentralized office use
A CRT display and keyboard terminal for batch and real
Seventy Series Model 73
time applications / plug interchangeable with Model 33
Interactive Display
and 35 Teletypes® / on-line and block/edit operating modes

Model 8000 Card Reader
(photoelectric)

56

Bridge Data Products, Inc.
738 South 42nd St.
Philadelphia, Pa. 19104
Varian Assoc., Graphics Div.
611 Hansen Way
Palo Alto, Calif. 94303
Attn: Robert Pecotich
Potter Instrument Co., Inc.
East Bethpage Rd.
Plainview , L. I., N.Y. 11803
Xerox Business Produc ts Group
Xerox Square
Rochester, N.Y~ 14603
Attn: Robert L. Stearns
Data 100 Corp.
7450 France Ave. South
Minneapolis, Minn. 55435

COMPUTERS and AUTOMATION for July, 1970

Description and Notes

Product Name/Model No.
BR 22BO. Scopewriter

LPll Line Printer
TRACE (Time Repetitive
Analog Contour
Equipment)
Logiport/l

A/D Converter, Model
6409
"500" Reader-Printer

AAT-lOl TV Display
Driver

Hard copier for reproducing CRT data displays / up to
960 characters in 12 seconds, about l¢ per copy / operates with any of Series 2200 CRT data terminals / no
special operator required / 36"L x 20"W x 23"H
For PDP-II minicomputer / prints 356 eighty-column lines
a minute / uses 64 characters / an impact printer / can
take six-part forms, using fan-fold paper, 4 to 9-7/B"W
Console CRT display unit provides seven display modes /
push-button control/compatible with all analog and
hybrid computers
Portable CRT computer terminal/includes standard
typewriter keyboard, integral acoustic coupler,5l2-character alphanumeric display (folds down forportability)/
two operating modes / teletype interchangeable
9-bit, high-speed (over 250,000 conversions/second) /
complete with internal reference, clock generator, control logic and data register / fully contained on
double printed circuit board with sgle edge connector
Produces enlarged Dry-Silver, low-cost, ;hard copies /
BJ2 x l2J2" prints / 12 x 16 inch screen-; easy-to-load
Dry-silver 500-foot roll paper / automatic paper cutting / minimum maintenance
Converts any TV or 525-line video monitor into 256character alphanumeric display / memory I/O is 6-bits
parallel at TTL levels / data can be loaded, read or
exchanged asynchronously at rates up to 120 cps

For More Information:
The Bunker-Ramo Corp.
Business and Industry Div.
445 Fairfield Ave.
Stamford, Conn. 06904
Digital Equipment Corp.
146 Main St.
Maynard, Mass. 01754
Basic Computing Arts Inc.
3555 Torrance Blvd.
Torrance, Calif. 90503
Log i tron Inc.
197 Albany St.
Cambridge, Mass. 02139
Data Technology Corp.
1050 East Meadow Circle
Palo Alto, Calif. 94303
Attn: Gary Mickelson
3M Company, Microfilm Products Div., Dept. MiO-30
St. Paul, Minn. 55101
Attn: W. Doug McLuen
Ann Arbor Terminals Inc.
9lB Greene St.
Ann Arbor, Mich. 48104
Attn: Edward F. Zimmer

Data Processing Accessories

Hi-Line Security

Prefabricated Clean
Rooms with Air Conditioning
Memorex Mag Cards

Jet-12 Paper Shredder

Digital coding system / transmits alarm signal to a
police monitor / attempt to compromise the random and
complex set of signals will cause alarm, yet not given
to false alarms / signals differ for different problems
Available up to 1000 sq. ft. in size / factory engineer
supervises erection at customer's plant / clean rooms
pass requirements as stated in Fed. Std. 209a for Class
100 in first air areas
Fully compatible with IBM MAG CARD SELECTRIC typewriters / prices begin at $26.25 for 25 Mag Cards with
folders / protective indexing folder allows fingertip
filing or retrieving of Mag Card
Portable paper shredder / destroys outdated confidential documents at rate of up to 550 pounds per hour /
plastic bag attachment facilitates disposal

Mosler
1561 Grand Blvd.
Hamilton, Ohio 45012
Agnew-Higgins, Inc.
P.O. Box 857
Garden Grove, Calif. 92642
Memorex Corp.
1180 Shulman Ave.
Santa Clara, Calif. 95050
Shredmaster Corp.
891 So. Ocean Ave.
Freeport, L.1., N.Y. 11520

New Literature

Government Industrial
Complex

DECUS Catalog

Reports
(three volumes)
Minicomputer Notebook
(one volume)
Mini~omputer

Abstracts from the
Computer Software
Library, Vol. I

A marketing notebook, 1000 pp / describes marketing
opportunities for all organizations in computer field
with the Government and the top Government prime contractors / identifies computer installations, users,
selection and reviewing offices, procurement procedures I directory of companies in U.S. doing business
with Government is included as appendix
Annual spring revision of the Digital Equipment Computer
Users Society (DECUS) program catalog I lists over 70
programs available for PDP-lOj this is in addition to
standard software supported by PDP-lO product line
For EDP manufacturers, users, marketing organizations
and consultants I'looseleaf references / both include
hardware characteristics comparison charts, price data
lists, summaries of commercially available minicomputers, monthly updates I more comprehensive "Reports"
serves different level of information needs
Concise abstracts of software available for purchase
through COMSEC (COMputer Software Exchange Center,
Inc.) I each program fully evaluated and run with
test data to verify its accuracy, before listing I
periodically up-dated to keep subscriber informed
on the lastest information about software that
is available

COMPUTERS and AUTOMATION for July, 1970

Stearns House Company
1747 Summer St.
Stamford, Conn. 06905

DECUS Program Librarian
DECUS Office
Digital Equipment Corp.
Maynard. Mass. 01754
Auerbach Info, Inc.
121 N. Broad St.
Philadelphia, Pa. 19107
Attn: Mr. R. G. Scott
COMSEC, Inc.
One Gateway Center
Fifth at State
Kansas City, Kans. 66101

57

NEW CONTRACTS
General Electric Co., Phoenix,
Ariz~

U.S. General Services Admn.,
Washington, D.C.

Moll Associates, Inc., Watertown, Mass.

Computer Catalogs, Inc. (CC!),
Boston, Mass.

General Instrument Corp.,
Hicksville, L.I., N.Y.

Viatron Computer Systems
Corp., Bedford, Mass.

Computer Sciences Corp.,
Los Angeles, Calif.

NASA, Goddard Space Flight
Center, Greenbelt, Md.
U.S. Army Combat Developments
Command, Fort Leavenworth, Kan.

Sanders Associates,
Nashua. N.H.
RCA Computer Systems Div.,
Cherry Hill, N.J.
Philco-Ford Corp., Willow
Grove, Pa.
RCA Computer Systems Div.,
Cherry Hill, N.J.
Computone Systems, Inc.,
Atlanta, Ga.
RCA Computer Systems Div.,
Cherry Hill, N.J.
Precision Instrument Co.,
Palo Alto, Calif.

Federal Aviation Admn.
So. Carolina State, Dept. of
Education, Columbia, S.C.
U.S. Air Force
Macro Services Corp., Boston,
Mass.
Bowles, Andrews and Towne,
Atlanta, Ga.
Jefferson and Boulder Valley
Counties, Public School Systems, Lakewood, Colo.
Univ. of Illinois

Wyle Laboratories, EI
Segundo, Calif.

Dept. of Transportation (DOT),
Federal Railroad Admn.

Astrodata, Inc., Anaheim,
Calif •

State of California, Dept.
of Water Resources

System Development Corp.,
Santa Monica, Calif.

U.S. Air Force, Electronic
Systems Division

Programming Methods Inc.,
New York, N.Y.

Sylvania Electric Products,
Inc.,

Conrac Corp., New Jersey
Div., Caldwell, N.J.
Ampex Corp., Culver
City, Calif.

Teledyne-Ryan Aeronautical Co.
Eclectic Computer Corp.,
Dallas, Texas
Data Pathing, Inc. (DP!) ,
Sunnyvale, Calif.

Sanders Associates,
Nashua, N.H.

International Reservations
Limited of England

Clary Corp., Precision
Instruments Div., San
Gabriel! Calif.
Computer Products, Inc.,
Fort Laude~dale, Fla.

IMC

Univ. of Calif. at Los
Angeles
Singer-Libras cope,
Glendale, Calif.
Aspen Systems Corp., Pittsburg, Pa.
58

Florida State Univ., Geophysical Fluid Dynamics
Institute
National Institutes of Health,
Division of Dental Health
Inventory Management Systems,
Los Angeles, Calif.
State of Utah

A dual GE-615 information system to be installed at Wright-Patterson AFB, Dayton,
Ohio; proposed complex called CREATE (Computational Resources for Engineering and Simulation Training and Education) will link
bases across nation to Wright-Patterson AFB
Implementation and management of a computerized information retrieval system, called
"Compulog," designed to serve the automotive
parts distribution industry
Packaged MOS arrays for use in Viatron's
data management terminal, as well as the
Model 2140 and 2150 general purpose computers
Extensive services in systems analysis
and computer programming; Goddard Center
serves as hub of NASA's worldwide tracking,
communications network for space missions
Scientific and analytical studies and provide technical support to the Command's
war gaming facilities
Developing prototype of radar air traffic
control display subsystem
An RCA Spectra 70/55 computer system to
serve as hub of a computerized network for
the entire state education system
A telecommunications network to be installed in Europe
An RCA Spectra 70/46 remote computing system; firm offers full line of services to
business and industry
1,475 portable KeyPact computer terminals

$7.3 million

RCA Spectra 70/45 system to be used in a
pilot program for computer-assisted instruction
A one trillion-bit computer mass memory
storage unit for the Illiac IV computer
complex
Development of a rail transportation equipment test facility to enable laboratory
testing of high speed railroad and rapid
transi t cars at simulated speeds to 300 mph
Supervisory Control System complete with
central processor, display panel, control
console, remote telemetering station and
associated communication eguipment
Development of computer programs for Army's
White Sands Missile Range Air Surveillance
System
Front-End Communications Facility (FCF),
a complete turn-key message switching
computer system; will be installed at
Sylvania's computer center, Camillis, N.Y.
Air data computers for use aboard the
supersonic Firebee II Drone
Model TMZ digital tape drives; used in
Eclectic 640 system which interfaces with
DEC PDP-8 computers to read/write IBM compatible tapes
Model TMZ digital tape memory systems for
incorporation in a new DPI system for a
wide range of industrial data-collection
uses
Forty Sanders 720® Data Display systems;
will be part of hotel reservation network
eventually spanning the Atlantic
Modified Clary Model 1900 serial entry
printers to be used in a retail point-ofsale data entry system known as Registron
An Electronically Controlled 2,000-Channel
Digital Data Acquisition System; will be
used in weather and atmospheric research
Development of a computer-aided instruction course in introductory biostatistics
500 Ll07 minimemories to be used with a
computerized checkout and inventory system for supermarkets
A l5-month period of unlimited computer
searches of Utah Code and statutes of
other states

$1 million

$5 million

$3.5 million

$3 million

$3 million
(approximate)
$2.7 million
$2 million
$1.8 million
$1.6 million
$1.5 million

$1 million
$999,958

$889,000

$864,000
$700,000

$500,00Ot
$350,000

$350,000
(approximate)
$240,000
$200,00Ot
$138,800
$133,380

COMPUTERS and AUT,OMATION for July, 1970

NEW INSTALLATIONS

Burroughs B350 system

Georgia Bank & Trust Co., Macon,
Ga.

Burroughs B500 system

Sugarman Brothers, Medford, Mass.

Burroughs B2500 system

Chaffey College, Alto Loma, Calif.

Burroughs B3500 system

Diversified Computer Applications
(DCA), Palo Alto, Calif.
Irving Bank and Trust Co., Irving,
Texas
Reilly Tar & Chamical Corp.,
Indianapolis, Ind.

Control Data 3500 system
Digital Equipment PDP-8/S

Tri-Valley Growers, San Francisco,
Cal if.
Bell Telephone Laboratories,
Holmdel, N.J.
British Milk Marketing Board,
Alfreton, Derbyshire, England

Digital Equipment PDP-IO

Graphic Controls Corp., Computer
Systems Div., Buffalo, N.Y.

IBM System/3

Allied Computer Technology, Inc.,
Santa Monica, Calif.
Bryce E. Dressel & Co., New
Orleans, La.
Keller-Crescent, Evansville, Ind.
City of Painesville, Ohio
Sutliff Chevrolet, Harrisburg,Pa.

IBM System/360 Model 40
IBM System/360 Model 85

NCR Century 100 system

Zero-Max Industries, Minneapolis,
Minn.
McCall Information Services Co.,
Dayton, Ohio
Standard Oil Co. (Indiana),
Chicago, Ill.
U.S. Dept. of Defense, Strategic
Air Command, 544th Aerospace Reconnaissance Technical Wing (ARTW) ,
Offutt AFB, Nebr.
Marlboro Hospital, Marlboro, Mass.
Westminster College, Fulton, Mo.

RCA Spectra 70/45

United Press International, New
York, N.Y.
(two systems)

UNIVAC 418-111 Real Time System

Ashikaga Bank, Utsunomiya, Japan

UNIVAC 1106 system

Denver School District
Denver, Colo.

UNIVAC 9200 system

Hood Dairy Inc., St. Petersburg,
Fla.
H. E. Schurig & Co., Houston, Tex.
Washtenaw Community College,
Ypsilanti, Mich.
Colon~e Central Schools,
Albany, N. Y.
Comet Rice Mills Inc., Houston,Tex.
Crowley's Milk Co., Inc., Binghamton, N.Y.
National Bank of Detroit, Mich.

UNIVAC 9300 system

UNIVAC 9400 system

COMPUTERS and AUTOMATION for July, 1970

~l,

Motorists Mutual Insurance Co.,
Columbus, Ohio

Internal banking applications; also mortgage loan
amortization schedule for banks and other financial
institutions throughout the state
(system valued at approximately $230,000)
Implementation of company's change-over to
computerization; Burroughs B2500 on order for
on-line system later this year
Instructional tool (80%) and administrative tasks
(system valued at about $300,000)
On-line and batch processing services to clients
(system valued at about $600,000)
All data processing for bank; also for Trinity
Industries (18 locations and about 2,000 employees)
(system valued at over $575,000)
Engineering, production simulation and forecasting;
some chemical research activities; business data
processing operations
A food processing total information system
(system valued at over $1.2 million)
Upgrading hybrid (analog/digital) system
Inventory control and process monitoring of a
recently opened creamery
(system valued at $10,000)
Meeting expanding market for Remote Terminal Computing Services; substantially increases computer
capaci ty
Proving out development of several new interfaces
for own line of peripheral hardware
Analyzing the individual business needs of the
outboard motor distributor's 186 dealers
Expanding activities in a number of client service
areas, including market and media analysis
Financial and accounting functions, including preparation of city income tax bills, utility bills and
payroll
Helping handle paperwork and keeping inventory on
17,000-item spare parts business
Producing more complete sales reports and handling
a variety of financial statements
Handling increasing workloads in subscription fulfillment and other business applications; will
allow computer support for remote locations
Processing commercial and scientific information for
parent company and three Chicago-based subsidiaries:
American Oil Co., Amoco International Oil Co., and
Amoco Chemicals Corp.
Support of the intelligence requirements of the
Joint Strategic Target Planning Staff, the SAC
deputy chief of staff, intelligence, and the 544th
ARTWj replaces five computers formerly used by ARTW
Financial and general administrative data processing; planning various medical uses later
Administrative data processing, student training,
research projects -- shared by Westminster and
nearby William Woods College
Providing its newspaper clientele with updated
stock market reports ready for immediate high-speed
typesetting throughout the trading day
(systems valued at $1.5 million)
Serving as heart of an on-line system connection
to 84 branches
(system valued at about $5 million)
Instructional, administrative and business applIcations for all schools within its administration
(system valued at $1.2 million)
Route accounting, payroll processing and inventory control
Creating necessary documents for foreign shipments
"Hands-on" student training in computer programming
and operation; also administrative applications
Administrative operations and student instruction
General accounting and sales reporting
Route accounting, sales analysis, general accounting, payroll processing
Processing bond programs and for preparing data
for entry into other computers
Processing claims; future plans include use in billing, file maintenance, a variety of insurance
accounting applications
59

MONTHLY COMPUTER CENSUS
Neil Macdonald
Survey Editor
COMPUTERS AND AUTOMAT ION
The following is a summary made by COl1PUTERS AND AUTOMATION of reports and estimates of the number of general purpose electronic digital computers manufactured and installed, or to be manufactured and on
order. These figures are mailed to individual computer manufacturers
from time to time for their information and review, and for any updating or comments they may care to provide. Please note the variation
in dates and reliability of the information. Several important manufacturers refuse to give out, confi rm, or comment on any fi gures.
Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit information for this census. We invite all our readers to submit information that would help make these figures as accurate and complete as
poss ib Ie.

The following abbreviations apply:
(A) -- authoritative figures, derived essentially from information
sent by the manufacturer directly to COMPUTERS AND
AUTO~1ATION
.
figure is combined in a total
C
(D)
acknowledgment is given to DP Focus, Marlboro, Mass., for
their help in estimating many of these figures
figure estimated by COMPUTERS AND AUTOMATION
E
(N)
manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any
way on those numbers stated here
(R)
figures derived all or in part from information released
indirectly by the manufacturer, or from reports by other
sources likely to be informed
(S)
sale only, and sale (not rental) price is stated
no longer in production
X
information not obtained at1>ress time

Part I of the Monthly Computer Census contains reports for United
States manufacturers. Part I I contains reports for manufacturers
outside of the United States. The two parts are published in alternate months.
SUMMARY AS OF JUNE 15, 1970
NAME OF
t1ANUFACTURER
Pa rt 1. United States Manufacturers
Autonet i cs
Anaheim, Calif. (R) (1/69)
Bai ley Meter Co.
Wickliffe, Ohio (R) (6170)
Bunker-Ramo Corp.
Canoga Park, Calif.
(A)
(10/69)
Burroughs
Det roi t, Mi ch.
(N)
( 1/69-5/69)

Control Data Corp.
Minneapolis, Minn.
(N)
(2/69-4/69)

Data General Corp.
Southboro, Mass. (A) (6170)
Datacraft Corp.
Ft. Lauderdale! Fla. (A) (6170)
Digiac Corp.
Plainview, N.Y. (A) (2170)
Digital Equipment Corp.
Maynard, Mass.
(A)
(6170)

60

NAME OF
COMPUTER
RECOMP II
RECOMP III
Bai ley 750
Bai ley 756
Bai ley 855
BR-130
BR-133
BR-230
BR- 300
BR- 330
BR-340
205
220
Bl00
B200
B300
B500
B2500
B3500
B5500
B6500
B7500
B8500
G15
G20
LGP-21
LGP- 30
RPc4000
636/136/046 Series
160/8090 Series
924/924A
1604/A/B
1700
3100/3150
3200
3300
3400
3500
3600
3800
6400/6500
6600
6800
7600
NOVA
SUPERNOVA
DC6024
Dc6024/3
Digiac 3080
Di 9 i ac 3080C
PDP-l
PDP-4
PDP-5
PDP-6
PDP-7
PDP-8
PDP-81l
PDP-8/s
PDP-8IL
PDP-9
PDP-9L
PDP-l0
PDP-II

DATE OF
FI RST
I NSTALLAT ION

AVE RAGE 0 R RANGE
OF MONTHLY RENTAL
$ (000)

11/58
6/61
6/60
2/65
4/68
10/61
5/64
8/63
3/59
12/60
12/63
1/54
10/58
8/64
11/61
7/65
10/68
2/67
5/67
3/63
2/68
4/69
8/67
7/55
4/61
12/62
9/56
1/61

2.5
1.5
40-250 (S)
60-400 (s)
100-1000(S)
2.0
2.4
2.7
3.0
4.0
7.0
4.6
14.0
2.8
5.4
9.0
3.8
5.0
14.0
23.5
33.0
44.0
200.0
1.6
15.5
0.7
1.3
1.9

5/60
8/61
1/60
5/66
5/64
5/64
9/65
11/64
8/68
6/23
2/66
8/64
8/64
6/67
12/68

2.1-14.0
11.0
45.0
3.8
10-16
13.0
20-28
18.0
25.0
52.0
53.0
58.0
115.0
130.0
235.0

2/69

8.0
11.7
54-200
33-200
19.5
25.0
3.4
1.7
0.9
10.0
1.3
0.5
0.4
0.3

5170

5/69
2170

12/64
10/67
11/60
8/62
9/63
10/64
11/64
4/65
3/68
9/66
11/68
12/66
11/68
12/67
3170

30
6
32
13
5
160
79
15
18
19
19
25-38
28-31
90
370-800
180-370
0
52-57
44
65-74
4
0
1

65-130
68-90
40-45
38-100
12
1
30
18
23-50
32-40
1
1
(S)
(S)
(S)
(S)
(S)
(S)

1.1
8.0
10.5

NUMBER OF INSTALLATIONS
In
Outs ide
In
U. S.A.
World
U.S .A.

(S)

445
8
7
3
14
5
50
40
90
C
C
C
C
C
C
C
C
C
C

0
0
3
5
0

2
2
13
70
40
0
12
18
7
0
0
0

41-50
15-20
15
17-25
4
0
9
2
14-17
11
0
0

30
6
35
18
5

27-40
30-33
103
440-870
220-410
0
64-69
62
72-81
4
0
1
295
20
165
322
75
29
610
29
59
106-180
83-110
55-60
55-125
16
1
39
20
37-67
43-51
1
1

58
1
0
0

503
9
7
3

2
5
10
C
C
C
C
C
C
C
C
C
C

52
45
100
23
160
1450
2157
1020
2350
425
41
144
27

NUMBER OF
UNFI LLED
ORDERS
X
X

0
1
20
X
X
X
X
X
X
X
X
X

31
150
70
117
190
8
60
13
5
X
X
X
X
X
X
X
X

C
C
C
C
C
C
C
C
C
C
C
C
Total:
160
1200
100
5
64
2
1
X
X
X
X
X

C
C
C
C
C
C
C
C

COMPUTERS and AUTOMATION for July, 1970

NAME OF
tlANUFACTURER
Di gi ta 1 Equipment Corp. (Cont' d.)

,,,

Electronic Associates Inc.
Long Branch, N.J. (A) (6/70)
EMR Computer
Minneapol is,_ Minn.
(N)
(6/70)

NAME OF
CO/·1PUTER
PDP-12
PDP-15
L1NC-8

640
8400
EMR 6020
EMR 6040
EMR 6050
EMR 6070
EMR 6120
EMR 6130
EMR 6135

DATE OF
FI RST
INSTALLATION
9/69
2/16
9/66

4/67
7/65
4/65
7/65
2/66
10/66
8/67

AVERAGE OR RANGE
OF MONTHLY RENTAL
$(000)
17.0

1.2
12.0
5.4
6.6
9.0
15.0
0.8
5.0
2.6

NUMBER OF INSTALLATIONS
Outside
In
In
U.S.A.
World
U.S.A.
C
C
275
6
C
15
C
C
142

85
19
C
C
C
C

35
6

120
25

Total:
90 E
General Electric
Phoenix, Ari z.
(N)
(6/70)

Process Cont ro 1 Computers:
(A)
(6/70)
Hewlett Packard
Cupertino, Calif.
(A) (6/70)
HoneY'0/e 11
Computer Control Div.
Framingham, Mass.
(R)
(6/70)

Honeywell
EDP Div.
We 11 es 1ey Hi lis, Mass.
(A)
(6/70)

IBM
White Plains, N.Y.
(N) (D)
(1/69-5/69)

105A
105B
105RTS
115
120
130
205
210
215
225
235
245
255 T/S
265 T /S
275 T/S
405
410 T /S
415
420 T /S
425
430 T/S
435
440 T/S
615
625
635
655
4020
4040
4050
4060
2114A
2115A
2116A, 2116B
DDP-24
DDP-l16
DDP-.124
DDP- 224
DDP-316
DDP-416
DDP-516
H632
H1648
H-110
H-115
H-120
H-125
H-200
H-400
H-800
H-1200
H-1250
H-1400
H-1800
H-2200
H- 3200
H-4200
H-8200
System 3
305
650
1130
1401
1401-G
1401-H
1410
1440
1460
1620 I,ll
1800
7010
7030
704
7040
7044
705
7070, 2
7074

COMPUTERS and AUTOMATION for July, 1970

6/69
6/69
7/69
4/66
3/69
12/68
6/64
7/60
9/63
4/61
4/64
11/68
10/67
10/65
11/68
2/68
11/69
5/64
6/67
6/64
6/69
9/65
7/69
3/68
4/65
5/65
2/67
8/64
12/66
6/65
10/68
11/67
11/66
5/63
4/65
3/66
3/65
6/69
9/66
12/68
11/68
8/68
6/70
1/66
12/67
3/64
12/61
12/60
2/66
7/68
1/64
1/64
1/66
2/70
8/68
12/68
1/70
12/57
10/67
2/66
9/60
5/64
6/67
11/61
4/63
10/63
9/60
1/66
10/63
5/61
12/55
6/63
6/63
11/55
3/60
3/60

1.3
1.4
1.2
2.2
2.9
4.5
2.9
16.0
6.0
8.0
12.0
13.0
17.0
20.0
23.0
6.8
11.0
7.3
23.0
9.6
17.0
14.0
25.0
32.0
43.0
47.0
80.0
6.0
3.0
7.0
2.0
0.25
0.41
0.6
2.65
0.9
2.2
3.5
0.6
1.2
3.2
12.0
2.7
3.5
4.8
7.0
7.5
10.5
30.0
9.8
12.0
14.0
50.0
18.0
24.0
32.5
50.0
1.1
3.6
4.8
1.5
5.4
2.3
1.3
17.0
4.1
10.0
4.1
5.1
26.0
160.0
32.0
25.0
36.5
38.0
27.0
35.0

Total:
30 E

200-400

420-680

620-1080

11
35
15
145
60-100

0
0
1
15
17

11
35
16
160
77-117

10-40
170-300
50-100
20

NUMBER OF
UNFI LLED
ORDERS
C
C
C
Total:
1350 E
15
2
C
C
C
C

15-45
70-100
20-30
6

240-400
70-130
26

26
23-43

23
20-40
148
45
22
18

46
20
1
2

150

70

800
120
800
46
58
230
130
4
15
125
0
15
8
0
40
50
2580
2210
420
180
156
1690
194
285
415
67
4
12
35
28
18
10
44

160
220
275
40
15
90
45
6
5
55
0
2
3
0
15
18
1227
1836
450
140
116
1174
63
186
148
14
1
1
27
13
3
3
26

194
65
23
20
843
661
1102
90
250
150
60
230
225
635
10
12
220

70

0

960
340
1075
86

X
X

73
325
175
10
20
180
0
17
11

X
X

55
68
3807
4046
870
320
272
2864
257
471
563
81
5
13
2
41
21
13
70

61

NAHE OF
HANUFACTURER
IBM (Cont'd.)

Interdata
Oceanport, N. J.
(A) (6/70)
NCR
Dayton, Ohio
(R)
(2/70)

Ph i lco
Willow Grove, Pa.
(N) (1/69)
RCA
Cherry Hi 11, N.J.
(N)
(5/69)

Raytheon
Santa Ana, Calif.
(A)
(6/70)

Scientific Control Corp.
Da 11 as, Tex.
(A)
(6/70)
Standard Computer Corp.
Los Angeles, Calif.
(N) (6/70)
Systems Engineering Laboratories
Ft. Lauderdale, Fla.
(A)
(6/70)

UNIVAC (Div. of Sperry Rand)
New York, N.Y.
(R)
(1/6~-5/69)

Varian Data Machines
Newport Beach, Calif.
(A) (6/70)

Xerox Data Systems
El Segundo, Calif.
(N)
(4/70)

62

NAME OF
CO~IPUTER

7080
7090
7094-1
7094-11
360/20
360/25
360/30
360/40
360/44
360/50
360/65
360/67
360/75
360/85
360/90
360/195
Model 2
Mode 1 3
Model 4
304
310
315
315 RMC
390
500
Century 100
Century 200
1000
2000-210, 211
2000-212
301
501
601
3301
Spectra 70/15
Spect ra 70/25
Spectra 70/35
Spect ra 70/45
Spectra 70/46
Spect ra 70/55
250
440
520
703
704
706
650
655

660
670
4700
DCT-132
I C 4000
IC 6000
I C 7000

810

DATE OF
FI RST
I NSTALLAT I ON
8/61
11/59
9/62
4/64
12/65
1/68
5/65
4/65
7/66
8/65
11/65
10/66

2/66
11/67
7/68
3/67
8/68
1/60
5/61
5/62
9/65
5/61
10/65
9/68
6/69
6/63
10/58
1/63
2/61
6/59
11/62
7/64
9/65
9/65
1/67
11/65
11/66
12/60
3/64
10/65
10/67
3/70
5/69
5/66
10/66
10/65
5/66
4/69
5/69
12/68
5/67
6/69
9/65
8/66
9/68
11/65
8/66
1/68

810A
810B
840
840A
840MP
Systems 86
t & II
3/51 & 11/57
III
8/62
Fi Ie Computers
8/56
Solid-State 80 I, I I,
90,1,11, & Step
8/58
418
6/63
490 Series
12/61
1004
2/63
4/66
1005
l050
9/63
1100 Series (except
1107, 1108)
12/50
1107
10/62
1108
9/65
9200
6/67
9300
9/67
9400
5/69
LARC
5/60
620
11/65
620i
6/67
R-620i
4/69
520 i
10/68
620/F
8/70
12/6q
520/DC
XDS-92
4/65
XDS-910
8/62
XDS-920
9/62
XDS-925
12/64
XDS-930
6/64
XDS-940
4/66
XDS-9300
11/64
Sigma 2
12/66
Sigma 3
12/69
Sigma 5
8/67
Sigma 7
12/66

AVERAGE OR RANGE
OF MONTHLY RENTAL
$ (000)
60.0
63.5
75.0
83.0
2.7
5.1
10.3
19.3
11. 8
29.1
57.2
133.8
66.9
150.3
(S)
232.0
0.25
0.4
0.6
14.0
2.5
8.7
12.0
1.9
1.5
2.7
7.5
7.0
40.0
52.0
7.0
14.0-18.0
14.0-35.0
17.0-35.0
4.3

6.6
9.2
22.5
33.5
34.0
1.2
3.6
3.2
(5)
(S)
(S)
0.5
2.1
2.1
2.7
1.8
0.7
9.0
16.0
17.0
1.1
0.9
1.2
1.5
1.5
2.0
10.0
25.0
21.0
15.0

NUMBER OF I NSTALLAT 10tJS
Outside
In
In
U. S .A.
World
U.S .A.
2
13
15
2
4
6
4
10
14
4
6
10
4690
3276
7966

o

4

4

5075
1260
65
480
175

3144
498
13
109
31

9

4

3

8219
1758
78
589
206
13
17

2

18
223
154
17

14

o
5

15
8
460
125
240
1700
550
100
16
16
12
140-290
22-50
2
24-60
90-110
68-70
65-100
84-180
1
11
155
20
26
148

5
29
23
137
41
1
16
40

o
o

o
400
45
500
950
150
50

o
77
98

x
X

860

170
740
2650
800
150

1-5
35-60
18-25
20-50
21-55

25-65
125-170
86-95
85-150
105-235
1
12
175
20
27
178

o

o

1
20
1
20
2

4

5
1

23
25
13

8

240-420
23-51

24
211
75

o

5

100-130
1

6
9
3

3

o

X
X
X

o
o
o
o
o
o
o
o
o

36
31

NUMBER OF
UNFILLED
ORDERS

o

o
2

o
o

2

7

33
23
137
41
1
16
40

6
9
3
24
216
76

3
38
31

o

6

31

36
11
628
299
62

112
86
2130
936
200

X
X
X

5
15
15
X

o
o

X
1
24

8E

10 E
X
32
26
X
X
2

2
X
X
X

X
20
35
20
90
10

8.0
11.0
30.0
1.9
2.4
8.5

210
76
75
1502
637
138

35.0
57.0
68.0
1.5
3.4
7.0
135.0
0.9
0.5

9
8

o

9

3

38
127
106
3
2

18
48
38

11
56
175
144

X
X
75 E
850 E
550 E

3

60 E

0.4
0.5
1.6
1.5
2.0
2.9
3.0
3.4
14.0
8.5

L8
2.0

6.0
12.0

o
o

2

7-10
5-12
1
14

o

1
10-15

o

6-18
5-9

E

E
E

2

75
1200
30
110
10-60
150-170
93-120
20
159
28-35
21-25
60-110
10
15-40
24-35

E
E

15
12-62
157-180
98-132
21
173
28-35
22-26
70-125
10
21-58
29-44

X
400
30
330
125
25

COMPUTERS and AUTOMATION for July, 1970

ADVERTISING
INDEX
Following is the index of advertisements. Each item contains:
Name and address of the advertiser / page number where the
advertisement appears / name
of the agency, if any
ComDatu Corporation, 7544 W. Oakton St., Niles, IL 60648 / Page 63 /
Ross Llewellyn, Inc.
Computers and Automation, 815 Washington St., Newtonville, MA 02160 /
Pages 2 and 64 / Professional & Technical Programs,
Inc., 8G6 Third Ave., New York,
NY 10022 / Page 3 / Henderson &
Roll, Inc,

a[fffi[[]OlJffi[]J@~ [{]DmD@D®[]J

multiplexer

(FIVE CHANNEL VERSION SHOWN)

FEATURES ...

18 CHANNELS MAXIMUM

MULTI DROP: Drop one or more channels at a number
of locations.
MULTIPLE ACCESS: Multi drop channels have equal oppor·
tunity contention for processor channels.
BUSY·OUT: Busy·Out control of remote data sets.
VOICE·PLUS·DATA: Simultaneous voice channel with four
data channels.

PER CHANNEL END

LOOP·BACK: Test features provide rapid system diagnostics.

$3,880

DATA RATES: Mix 110, 135, 150 and 300 baud channels.
CONTROLS: Processes all data set control functions.

Complete, current, thorough directories of computer installation
sites: Northern California (500
sites) / Southern California (1800
sites) / New York City (1500 sites,
ready November) / New England
(1200 Hites, ready November)

BASIC UNIT

OPTIONS: Many other optional features.

SAVE
4-WAVS

1
2
:3

4

TOTAL COST
5 CHANNEL SYSTEM
OR

$140/MONTH
(3 Year Lease

No high speed data sets required.
With Purchase Option)
No private line conditioning required.
Modular construction permits starting with one channel
and adding others as needed.
Eliminate long distance phone calls with voice·plus·data.

Data Channel Concentrators and Expanders, Modems, Line Test Units and other Data Communication Equipment

. COMOATA CORPORATION

COl\J PUTER 70 DIRECTORIES

7544 W. OAKTON ST.

Producer and publisher:
KLII Associates
578 Folsom st.
San Francisco, Calif. 91405
We invite your inquiries!

CORRECTIONS
In the June 1970 issue of Computers and Automation, the
following corrections should be made:
Page 4, Letters to the Editor, "March Front Cover Comments If: The last two sentences of the first paragraph should be combined to read: "This picture
depicts the real meaning of data processing to me
- the honest-to-goodness hard work that it is, and
the meaningful contribution which computers can
make to society. "
Page 24, col. 1, paragraph two: The statement, "In
fact, it is desirable ... and adverse reactions. II,
should be attributed to Dr. Otto Barnett of Massachusetts General Hospital as quoted in "The New
Physician", Feb. 1970.
Page 25, col. 1, paragraph 1: The sentence "Medical
records are really composed ... " should read "Medical records are rarely composed ... ".
Page 34, col. 2, paragraph 1: The last sentence
should read "Over the past ten years, ... in many
cases, only because of the knowledge that several
key clerical employees have of the systems I inherent idiosyncrasies. "
Page 34, col. 2, paragraph 5: "black book" should be
replaced with "black box".

0

NILES, ILLINOIS 60648

0

312/692-6107

>

CLASSIFIED ADVERTISEMENTS
Rates for Classified Ads: 909 per word - minimum,
20 words. First line all capitals - no charge. Ads
must be prepaid.
Send copy to: Computers and Automation, 815 Washington St., Newtonville, MA 02160.
FOR SALE
32K CONTROL DATA 3300
COMPLETE COMPUTER SYSTEM
Manufacturer's Maintenance
Also Extensive Software
For Petroleum & Mineral
Exploration Data Processing
Box 403

Computers & Automation

GEORGE S. McLAUGHLIN ASSOCIATES, INC.
will buy or sell your used System/360, 1400, or 7000
Series
201-273-5464
785 Springfield Avenue
Summit, New Jersey 07901

JI

•

l

.~

..:

.

The 16th Annual Edition of the

COMPUTER DIRECTORY
AND
BUYERS' GUIDE
will be published jointly by
The New York Times Book and Educational Division and Computers and Automation
as the Midyear issue of Computers and Automation (in soft cover)
and as Volume 4 of WHO'S WHO IN COMPUTERS AND DATA PROCESSING (in hard cover)

CONTENTS
- A R~ster of Organizations in the Electronic Computing and Data ProceSSing Industry
- A Buyers' Guide to Products and Services in the Electronic Computing and Data Processing Field
- Special Geographic Rosters of:
1. Organizations selling computing and data processing services
2. Organizations selling commercial time-shared computing services
3. Commercial organizations offering courses, seminars or instruction in
computing, programming, or systems
4. Organizations selling consulting services to the computer field
5. Organizations offering computing and data processing equipment on a lease basis
6. Organizations selling software or computer programs
- Characteristics of General Purpose Digital and Analog Computers
- A Roster of College and University Computer Centers
- Rosters of Computer Associations and Computer Users' Groups
- A Roster of Programming Languages
- A List of Over 1700 Applications of Electronic Computing and Data ProceSSing Equipment
- A World Computer Census
- A Summary of Binary Arithmetic and Related Number Systems
- Some Binary, Octal, and Decimal Conversion Tables
- A Summary of Boolean Algebra (Contrasted with Elementary Algebra)
- Ranges of Current Computer Speeds
- A Glossary of Key Ideas in the Computer Field
... and much more

PRICE

for the COMPUTER DIRECTORY AND BUYERS' GUIDE, 1970 in SOFT COVER:

- Price for subscribers to Computers and Automation whose present subscription. . . . . . . . . . . $ 9.00
does not include th.e Directory (magazine address label is marked *N)
- Special prepublication price for non-subscribers (effective through July 31, 1970). . . . . . . . . . $12.00
(After publication, price to non-subscribers is $14. 50)
- The Directory is included in the $18.50 full annual subscription (13 issues) to
Computers and Automation (magazine address label is marked *D)

Send prepaid orders to: COMPUTERS AND AUTOMATION, 815 Washington Street, Newtonville, Mass. 02160
If not satisfactory, the DIRECTORY is returnable in seven days for full refund.

rlt.



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Producer                        : Adobe Acrobat 9.1 Paper Capture Plug-in
Modify Date                     : 2009:03:24 20:33:18-07:00
Create Date                     : 2009:03:24 20:33:18-07:00
Metadata Date                   : 2009:03:24 20:33:18-07:00
Format                          : application/pdf
Document ID                     : uuid:8c5ef888-92be-49aa-8ef3-c62b377a81b9
Instance ID                     : uuid:2d4b78df-eae0-42a5-a33c-602baaee8673
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 60
EXIF Metadata provided by EXIF.tools

Navigation menu