197009
197009 197009
User Manual: 197009
Open the PDF directly: View PDF .
Page Count: 60
Download | |
Open PDF In Browser | View PDF |
September, 1970 t, - z:d EiBitXiiq CO Vol. 19, No.9 ut e Sr!& la~d automation r£ HNOLOGY JICALS SEC 1263385628 °UBL LIBRARY . RLOS "Cedar Grove" 0104 ST *01270 95113 PICTURE PROCESSING AND PSYCHOPICTORICS edited by BERNICE SACKS LIPKIN, Bethesda, Maryland, and AZRIEL ROSENFELD, University of Maryland, College Park, Maryland This book brings together 'papers on pictorial pattern perception and picture processing. The contributors discuss the factors that influence the detection of objects in complex images, and computl\r techniques for manipulating these factors. They also describe programming systems and computer algorithms for image processing and on-line experimentation. The book covers three classes of psychophysical variables: contrast and border; shape and geometry; and texture. It first reviews psychological data on the role of each factor in perception, and then treats the computer analysis and manipulation of images with respect to the factor. Third Quarter 1970. COMPUTER TECHNIQUES IN IMAGE PROCESSING by HARRY C. ANDREWS, Department of Electrical Engineering, University of Southern California, Los Angeles, California with contributions by WILLIAM K. PRATT, Department of Electrical Engineering, University of Southern California, Los Angeles, California, and KENNETH CASPARI, ITT Electro Physics Laboratories, Hyattsville, Maryland This treatise presents methods of digital computation for digital image processing. It borrows techniques from classical Fourier optics, linear systems, communications, and orthogonal transform theories. Some of the valuable features contained in the book are: a description of optical techniques for image enhancement, emphasizing the earlier results of diffraction and diffraction-limited imaging systems; three different implementation techniques-one entirely optical, a second combining optical and digital techniques, and one purely digital; studies of digital image coding for both digital storage and communication and of the theory of image coding. August 1970, 187 pp., $10.50. METHODOLOGIES OF PATTERN RECOGNITION THE PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON METHODOLOGIES OF PATTERN RECOGNITION HELD AT HONOLULU, HAWAII, ON JANUARY 24-25-26, 1968. edited by SATOSI WATANABE, University of Hawaii, Honolulu, Hawaii Pattern recognition, once considered as being nothing more than a mystifying computer stunt, is quickly becoming a respectable branch of scientific art. This book, which presents articles written by thirty outstanding authorities, evaluates the present and discusses the future of pattern recognition. Each author emphasizes the "philosophy" of his approach rather than the mathematical derivations and experimental data, and provides the reader with a self-contained survey of lasting value. 1969, 579 pp., about 150 figures and illustrations, $16.00. RECURSIVENESS by SAMUEL ElLENBERG, Department of Mathematics, Columbia University, New York, New York, and CALVIN C. ELGOT, IBM Thomas J. Watson Research Center, Yorktown Heights, New York. This monograph provides an algebraic development of elementary aspects of the theory of recursive functions. Its algebraic approach will contribute greatly to the long range goal of developing a theory for digital computer programs using recursive functions. Readers familiar with finite automata theory or mathematical linguistics will note that operations utilized in this monograph also play a central role in those studies. 1970, 89 pp:, $6.50. ADVANCES IN COMPUTERS Series Editors: FRANZ L. ALT, American Institute of Physics, and MORRIS RUBINOFF, University of Pennsylvania and Pennsylvania Research Associates VOLUME 10 Guest Editor: WALTER FREIBERGER, Center for Computer and Information Sciences, Brown University, Providence, Rhode Island CONTENTS: CHARLES DeCARLO: Humanism, Technology, and Language. PETER WEGNER: Three Computer Cultures: Computer Technology, Computer Mathematics, and Computer Science BRYAN THWAITES: Mathematics ill 1984-The Impact of Computers. E. E. DAVID, Jr.: Computing from the Communication Point of View. FREDERICK P. BROOKS, Jr.: Computer-Man Communication: Using Computer Graphics in the Instructional Process. ANDRIES VAN DAM and DAVID E. RICE: Computers and Publishing: Writing, Editing and Printing. ULF GRENANDER: A Unified Approach to Pattern Analysis. ROBERT S. LEDLEY: Use of Computers in Biomedical Pattern Recognition. WILLIAM PRAGER: Numerical Methods of Stress Analysis. J. H. AHLBERG: Spline Approximation and Computer-Aided Design. DANIEL L. SLOTNICK: Logic Per Track Devices. Author Index-Subject Index. September 1970, about 290 pp., $14.50. ACADEMIC . PRESS ' 'i~ ,~. formation is in the box on the i shaved with a blade. Only way Nhiskers off. But for the post two 19 the Abercrombie 60-Second ose, clean, comfortable shove, all lng into my shirt 60 to 62 seconds 'hat's the best port. Inside this box, a new last Wednesday, Ronnie D to us, tried the Abercrombi Did it in 56 second~. Another friend took 64 sec( First time we tried the Aberc cleaned our face smooth, c And you're right - somebo shoving is about the dullel thing a man does. And we thing that would keep yo\. we did the next best thingwhiskers off your face - cl a matter of seconds. over with so fast. ,d Shove comes in a genuine leo. case just by itself - makes a fine ~ ---'----------. ~BIE' & FITCH Iton, Iowa 52732 tpaid Abercrombie 60~ 32.S0each. [oney Order Result! The Abercrombie shave you closely and ( can return it, simple as th Some friends in Europe I Second Shave for us. Tt heads - instead of the difference you see. Flip start purring - covers m method of shoving we'vl Each head is covered w foil screen. A sort of sw __________ ~Zip, ________ haver to cover cost of handling Jew York, New Jersey, Florida, ;olorado and California add ap- 112-299-7-11111610111 .. -_ .... _------,----, Vol. 19, No.9 September, 1970 Editor Edmund C. Berkeley Associate Editor Sharry langdale Assistant Editors linda Ladd Lovett Neil D. Macdonald Software Editor Stewart B. Nelson Advertising Director Art Directors Contributing Editors CDI"I~uters and automation The magazine of the design, applications, and implications of information processing systems. Bernard lane Ray W. Hass Daniel T. Langdale John Bennett Moses M. Berlin Andrew D. Booth John W. Carr III Ned Chapin Alston S. Householder Peter Kugel Leslie Mezei Rod E. Packer Jean E. Sammet Ted Schoeters Richard E. Sprague Advisory Committee T. E. Cheatham, Jr. James J. Cryan Richard W. Hamming Alston S. Householder Victor Paschlc:is Fulfillment Manager William J. McMillan Computers and Privacy 14 REGULATIONS FOR INFORMATION SYSTEMS [A] by Prof. Calvin C. Gotlieb, Univ. of Toronto A classification of information systems is proposed, along with an examination of the goals, methods, and costs of regulating information systems. The Computer Industry 18 PROBLEMS OF LIABILITY FOR THE EDP SERVICES INDUSTRY [A] by Milton R. Wessel, Attorney The attorney for the Association for Data Processing Service Organizations (ADAPSO) discusses the responsibilities in the 1970's of the EDP services industry to: the public, its customers, its shareholders and owners, its employees, and its suppliers. 25 THE USER/MANUFACTURER INTERFACE [A] by David F. Stevens, Lawrence Radiation Laboratory The current state of the uneasy alliance between manufacturers of computer systems and their users - with some specific suggestions on how to improve the relationship between the users and the manufacturers. 6 COMPUTERS, AUTOMATION, AND COMPUTER·ASSISTED ACTIV. ITIES [E] by Edmund C. Berkeley, Editor, Computers and Automation . Implications of the change in emphasis from "automation" to "computer-assisted". 9 RELIABILITY OF INFORMATION IN C&A by Norwood Jones and the Editor Adt'el'lising Contact THE PUBLISHER Berkeley Enterprises, Inc. 815 Washington St., 617-332-5453 Newtonville, Mass. 02160 Editorial Offices BERKELEY ENTERPRISES, INC. 815 WASHINGTON STREET, NEWTONVIllE, MASS. 02160 CIRCULATION AUDITED BY AUDIT BUREAU OF CIRCULATIONS Computers and Automation is published monthly (except two issues in September) at 815 Washington St., Newtonville, Mass. 02160, by Berkeley Enterprises, Inc. Printed in U.S.A. Subscription rates: United States, 11 monthly issues and two issues in September (one of which isa directory issue) - $18.00 for 1 year, $36.00· for. 2 years; 12 monthly issues (without directory issue in September) - $9.50 for 1 year; $18.00 for 2 years. Canada, add 50¢ a year for postage; foreign, add $3.50 a year for postage. Address all U.S. subscription mail ~to: Berkel,ey Enterprises, Inc., 815 Washing. ton St., Newtonville, Mass. 02160. Second Class (>ostage paid at Boston, Mass. .' 10 SJCC 71 - CALL FOR PAPERS by Dr. Nathaniel Macon COMMENT [F] [F] Computer Programs and Syste'ms 22 SYSTEMS TEST [A] by Dwight M. Frazier, Jr., IBM Corp. Systems Mftg. Div. Why computer systems should be tested before they are installed - and specific guidelines for setting up such systems tests. 10 COMPUTERS AND CHEMICAL NOTATIONS by Charles E. Granito Postmaster: Please send all torms 'J!i79 to Berkeley Enterprises, Inc., B15 Washington St., Newtonville, Mass. 02160. © Copyright 1970, by Berkeley Enterprises, Inc. Change of address: If your address changes, please send us both your new address and your old address (as it appears on the magazine address Imprint), and aI/ow three weeks for the change to be made. [F] Computer Applications 28 THE "LANGUAGE EXPERIENCEII APPROACH IN TE,ACHING READ· ING - COMPUTERIZED [A] by Mrs. Florine L. Way How the computer is being used to help teachers use the pupils' own language to create the content of their reading lessons a prize-winning essay in C&A's Martin Luther King Memorial Prize Contest. Computers and Society 33 OUR TOP PRIORITY [A] by William B. Johnson, Pres. and Chrmn. of the Bd., IC Industries Inc. Why the key element of decision-making - the art of choosing priorities - must be applied on a national level in order to .find objective, balanced solutions to problems and terminate obsolete activity. 8 "WHAT WE MUST DOli - COMMENT by John McLeod, Editor, Simulation [F] 9 AUTOMATED POLICE STATE Reprinted from Dataweek magazine [F] Computers, Science, and Assassinations 39 PATTERNS OF POLITICAL ASSASSIN.ATION: How Many Coinci ... dences Make a Plot? [A] by Edmund C. Berkeley, Editor, Computers and Automation How the science of probability and statistics can be used as an instrument of decision to determine if a rare event is: (1) within a reasonable range; (2) unusual strange or suspicious; or (3) the result of correlation or cause or conspiracy. [See detailed contents on page 39.] This Month's Cover The front cover drawing was one of the entries in C&A's Eighth Annual Computer Art Contest (see the August issue). The artist is Lloyd Sumner, Computer Creations, P.O. Box 1842, Charlottesville, Va. 22903. The drawing was programmed in ALGOL and produced with the aid of a B5500 computer and a CalComp 565 plotter. Lloyd Sumner is one of the first people to devote his full time to the development of computer art. He has exhibited his work throughout the world, and has lectured on computer art in Europe and the United States. He holds a degree in Engineering Science from the University of Virginia. or 48 COMPUTER·ASSISTED ANALYSIS OF EVIDENCE REGARDING THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY - PROGRESS REPORT [A] by Richard E. Sprague A report on the nature and progress of a computer project initiated at the National Committee to Investigate Assassinations. Der)(~1'tments 62 Advertising Index 49 Across the Editor's Desk Applications Education News Research Frontier 62 Calendar of Coming Events 62 Classified Ads 7 48 CORRECTION [F] Computers Abroad 32 REPORT FROM GREAT BRITAIN [C] by Ted Schoeters A look at the development of data transmission networks in the UK, including the new Post Office Corp. network, and the facilities of the National Physical Laboratory. Letters to the Editor 59 Monthly Computer Census 57 New Contracts 58 New Installations 52 NewProduds and Services 13 Punch lines •.• Key Computers and Fun 10 NUMBLES [C] by Neil Macdonald, Asst. Editor, Computers and Automation 27 PROBLEM CORNER by Walter Penney, CDP [C] [A] - Article [F] - Readers' Forum [E] - Editorial [C] - Monthly Column EDITORIAL Computers~ Automation, and Computer-Assisted Activities In "the old days" of the computer field, which is about 20 years ago, there was much talk about the "automatic factory", the "automatic office", and "automation". There was a continuing argument about who had composed the word "automation", and there was another continuing argument about whether automation really was anything newer in 1950 than it had ever been before. Ten years ago we published a definition of the word "automation", in the 5th edition of the "Glossary of Terms in Computers and Data Processing": could do something all by themselves, nowadays there is more emphasis on the contribution of the human being and more effort to develop the system of "man and computer working together", each aiding the other. Is this change permanent or temporary? Will machines by themselves unaided by human beings take over almost every productive activity? In the future, will we really have large-scale automation, or will we have large-scale computer-assisted activities? 1. Process or result of rendering machines self-acting or self-moving. 2. Theory or art or technique of making a device or a machine or an industrial process more fully automatic. 3. Making automatic the process of moving pieces of work from one machine tool to the next. I think the present fashion is a temporary turn in the spiral of development. I think in years to come there will be greater and greater strides towards full automation. Here are a few of the reasons: This last kind of automation was sometimes referred to as "Detroit automation", because at one time there was a famous automatic assembly line for automobile engines. This production line had approximately 500 stages or stations; it took in at the front end a raw casting for an automobile engine, and put out at the far end a fully finished and inspected engine for installation in an automobile being constructed. Nowadays, the "in" word is "computer-assisted". There are dozens, and perhaps even hundreds, of processes and activities which are called "computer-assisted". A few of these activities have almost become fields in themselves, such as computer-assisted instruction; computer-assisted education; computer-assisted medical diagnosis; computer-aided design; computer-assisted laboratory instrumentation; etc. A definite change in viewpoint has occurred. Whereas the old viewpoint implied that machines and computers 6 1. Computers will become far cheaper than they are now; 2. More and more programming will include provisions for taking care of more and more exceptions; 3. More and more activities still performed by human beings, such as visual observing and recognizing of objects, will become mechanized, because engineers will find out how to mechanize them. In fact, what seems to be today a permanent hard core of difficult tasks to give to computers, will yield to technical advances. 4. Human beings want to live more, play more, and work less, especially work less in the sense of having uninteresting monotonous tasks to do, like picking grapes or sweeping subway platforms. 5. Repetition of work soon becomes monotonous for any human being - but it is duck soup for a machine which regularly has no emotions designed into it; etc. Prediction for twenty years from now: Less and less "computer-assisted" activities - more and more full automation. What will human beings do? More and more of what they like, less and less of what they must. COMPUTERS and AUTOMATION for September, 1970 Letters To The Editor "The Limitations of Computers" Comment I found your magazine in the new library on Michigan State University's campus in East Lansing: I read your editorial in the June, 1970 issue ["The Limitations of Computers", page 6], and I believe your three points at the end of the editorial are very well said and I enjoyed reading them. Teachers, lawyers, doctors, dentists, accountants and others all have to be certified by the states in which they practice. What is being done about the computer operators and programmers? I would be interested in hearing from anyone who is working on the certification by a state board of computer professionals. THOMAS R. ZICK, SR. 613 Cherry St. Stockbridge, Mich. 49285 Articles That Would Never Appear Elsewhere Presently I am engaged in research involving the future use of mini-computers in large MIS configurations. The finished product of my research may be of interest to your readers, and I will send you a copy for consideration for publication. Regardless of your decision regarding my paper, I intend to continue as one of your subscribers. Perhaps it is because you maintain a paid readership that you are able to publish articles that would never appear elsewhere. STANLEY JAFFIN 211 N. Piedmont St. Arlington, Va. 22203 Patents on Software In the February issue of Computers and Automation, Howard A. Si1ber expressed his feeling that if a computer program were translated into another computer language, it would circumvent copyright protection. [See "A Hypothetical Interview Between the President of a Computer Software - Company and a Patent Attorney Specializing in Protection of Computer Programs", Feb. issue, p. 16.] This is not true with international copyright, which protects the "story line". Inter- national copyright provides protection only if the same function (book) is performed by essentially the same steps (story incidents, sentences). I believe a significant court case could be built by showing that nearly all subroutines in the copy of a computer program did like jobs, with like calling sequences, as did the original program. If such likeness cannot be shown, I believe that even patent protection would be futile for that program, since one would be attempting to exclude something derived by an apparently independent mental process. I would be interested in 'hearing comments from others on this subject. RICHARD MERRILL 34 George Rd. Maynard, Mass. 01754 Railroads Seek Tougher Terminal Railroads want anew, tougher terminal device to communicate data from yards to computers and other terminals. So the Management Systems Dept. of the Association of American Railroads has put together a verbal picture of what's needed. Terminals for the input and output of all kinds of data - waybill information, train consists; payroll reports and the like ~ are noW being used by railroads in some 2,000 locations. The kind of device needed would be able to stand up under conditions found in the typical railroad yard substantial vibration, much dirt, wide variations in heat and humidity - with a minimum of maintenance. Another desirable feature would be suitability for installation in the field and modular features that would allow a user to operate either a simple basic device or to add compatible components. The AAR isn't seeking bids on the deVice, but is sending the specifications to member roads and potential manufacturers. A vendors' meeting will be scheduled if sufficient interest is shown. Any of your readers that are interested are invited to write to me for copies of our specifications. R. A. PETRASH, Executive Director Data Systems Div. Association of American Railroads Washington, D.C. 20036 XEROX FicheFile When We designed a total microforms system for a major farm equipment manufacturer, we developed the FicheFile to meet their microfiche storage needs. Now, for the first time, 4 x 6" microfiche can be instantly located, removed, cleaned, lubricated, and refiled in an attractive, rotating desktop unit. SUPERB PROTECTION. Fiche are sheltered in individual dust- and scratch-proof compartments. MAXIMUM FLEXIBILITY. Three basic capacities to match all storage requirements. Choice of grey or light tan. SPILLpROOF. Fiche are gently but firmly gripped to prevent spillage. XEROX FicheFiles 100 capacity FicheFile .... $69.50 64 capacity FicheFile .... 59.95 32 capacity FicheFile .... 49.95 8 capacity expansion units.. 8.00 F. O. B. Ann Arbor, Michigan Microforms Systems A Service of University Microfilms Xerox Education Group 204 North Zeeb Road Ann Arbor, Michigan 48106 313: 761-4700 "Xerox" is a registered trademark of Xerox corporation· COMPUTERS and AUrOMATION for September, 1970 7 READERS' FORUM "WHAT WE MUST 00" - COMMENT I. To the Editor, from John McLeod, Editor, Simulation, and Executive Director, SCi World Simulation, Simulation Councils, Inc., P. O. Box 2228, La Jolla, Calif. 92037 I appreciate your republishing "What We Must Do" by Dr. John Platt [June issue, p. 41]. I had some strong reactions to that article, which I expressed in a letter to the author [see below] . Incidentally, when I read your very good editorial, "The Limitations of Computers" [June issue, p. 6], I was reminded that I had not complimented you on having the guts, or whatever it takes, to publish the Sprague article in your May . issue. That was a most remarkable - and frightening - study. But, regardless of the proof, there's one thing that I simply can't believe, and that is that 50 people could be involved in a conspiracy of that complexity without somebody "blowing" it! II. Letter to Dr. John Platt, Mental Health Research Institute, Univ. of Michigan, Ann Arbor, Mich. 48104, from John McLeod. I have just finished reading the Computers and Automation reprint of your November 28, 1969 Science article (which I somehow missed). I am impressed by two things: the similarity of our thinking on the subjects which you discussed; and your failure to recognize - or at least to emphasize - the fact that computers, which you acknowledge are a part of the technology that "did not create human conflicts and inequities, but ... has made them unendurable", might be the most powetful tool at our disposal to "devise new mechanisms" and "better ways of heading off these multiple crises ... ". I do not believe that "the application of the full intelligence of our society is likely to be adequate" if that intelligence is unaided. I firmly believe that it is beyond the capability of the human mind to assimilate, correlate, recall, and manipulate all the information required to make the intelligent decisions that will be necessary in the crisis situations which you describe. I firmly believe that, by and large, our decision-makers would select the best (or at least 8 better) courses of action if they could thoroughly understand the situations. with which they are dealing, and the consequences of their actions - but first there must be understanding! Now I will admit to a strong bias (born of 20 years of experience in the synthesis and analysis of complex systems) in favor of computer modeling and simulation, the latter being the use of the model for scientific experimentation. However, although you call for "inventive minds, who can put together methods, organizational designs, or 'social inventions' " you do not mention simulation by name. So, instead of our looking at what I recommend as simulation, let's look at it as a special kind of information storage and retrieval system. In this system we will enter all of the pertinent information relative to the problem under study, but we will also enter information concerning how the individual pieces of data are related to, and influence other pieces of data~ and on what time scale. Then, although input data will be available for retrieval if desired, the normal outputs of the system will not be this raw data but the effect on data of interest when the input data is modified. In other words, the system will answer the question, "what if?". What if some input data were in error?, or what if it were to be modified by changing conditions? You will, of course, recognize the foregoing system as a computer model, and the "what if" exercise as a simulation. Philosophy aside, the time for action has passed, and very little action has been taken. I stated my feelings on the subject a year ago when I proposed a simulation of the world. Current progress, I think, is rather encouraging in view of the fact that we have had no outside funding. Now, however, circumstances preclude further financial support from Simulation Councils; and how fast we can progress on the basis of the voluntary efforts of the Trustees and others who have expressed an interest remains to be seen. I have, therefore, prepared a 'preliminary proposal in the hope of obtaining a grant to carryon our work. I would welcome. your constructive criticism. I hope that you will find our efforts along the lines of those for which you have so lucidly called, and that you can be interested in helping us make this project "fly" - in time! 0 COMPUTERS and AUTOMATION for September, 1970 AUTOMATED POLICE STATE R~printed with permission from Dataweek, Business Publications Ltd., Mercury House, Waterloo Rd., London SE1, England, Vol. 11, No. 10, June 3, 1970. During May, four students were killed by National Guardsmen at Kent State University in Ohio. Hard-hatted construction workers demonstrating their support for President Nixon in New York City bashed peace demonstrators with lead pipes. At Jackson, Mississippi, two black students died and at least a dozen were wounded when ,police opened fire on a crowd with deadly 00 buckshot, reaching far beyond self-defense or crowd control. Augusta, Georgia, suffered a Watts-type riot, and before it was under control six blacks were dead, allegedly shot in the back. Respected American visitors,' short haired, capitalist, often Republican, use words like "revolution", "dictatorship", "polarization", in a way that is chilling. In this context, the innocuous installation of computer systems in Los Angeles and Sacramento to help California law enforcement officers check out stolen' cars and su pected criminals brings mixed emotions. On the one hand, we worry that people will aSClll.J<': Lc the computer great, menacing teeth, and a ferocious snarl that is not at all characteristic of the dumb beast. On the other hand, we worry that people will not comprehend the potential for abuse of a near-perfect, on-line network. It's 14 years yet to 1984, but events in the past year on the social, technical, and ecological fronts make them look like very short years indeed. The power of the computerized information system, and the fear it engenders, may be very strong weapons in the California police arsenal. The system is admirable, a feat of technology, and it represents a successful merging of private industry and government applications. But great care must be taken to ensure that it works for the good of all. The message is, don't be afraid of computers, people; 0 just be afraid of people. RELIABILITY OF INFORMATION IN C&A - COMMENT I. From Norwood Jones Data Processing Officer First National Bank EI Dorado, Ark. 71730 As a user of Burrough's equipment, I have resolved each time I have read your "Monthly Computer Census" figures to write you. Until now the letter has never been written, but here it is. The method used in listing Burrough's equipment and the data in your "Computer. Directory and Buyers' Guide" illustrate a lack of knowledge of their products. I am referring to the models listed as B-IOO, B-200, B-300, and B-500. It would be easy for one unfamiliar with Burrough's equipment to believe these were separate computers, when in reality they are variations of the same machine. In fact, the name as often refers to a contract agreement as to a set of machine specifications. For example, I can change my B-300 in to a B-500 by signing a new contract while keeping all my present hardware. A similar situation would be to list all the models of the IBM 360/20 series as separate computers. Burroughs refers to this series of machines as the B-IOO/B-500 group. The CPU on all these machines is basically the same. The basic instruction set and character representation is identical, but some versions have a larger instruction set and added capabilities. Cycle time is either 10 or 6 microseconds and core memory comes in three sizes: 4.8K, 9.6K or 19.2K. Your effort in presenting the true pictures of these machines would assist in correcting a distorted image of an excellent machine. With reference to your list of characteristics of this COMPUTERS and AUTOMATION for September, 1970 equipment in your Directory, the following changes need to be made: Bits per digit = 6. Digits per Alphabetic = 1. Word length = 12 digits. Number of addressable positions in memory = 4.8K, 9 .6K, or 19.2K. (e) Access Time = 6 u or 10 u. (a) (b) (c) (d) The misinformation on equipment that I know about caused me to distrust your information on the other equipment in your Directory. This is one reason why I did not order it this year. II. From the Editor Thank you very much for your most helpful letter. The processes which we use for gathering information for Computers and Automation for such items as the Census and Characteristics of Digital Computers unhappily do not produce the kind of accuracy and reliability we would like. But because most companies treat this kind of information as proprietary, we have to rely on responses to surveys, and on people approving any information we can gather from outside sources. We do try to indicate the degree of accuracy of information for our readers - in the Census, for example, we use various symbols to show the sources of census figures, to show which figures are estimates, etc. . In the 1970 Directory, we will be publishing the Digital Computer C,haracteristics compiled by Keydata Corp. for their "Computer Characteristics Review". We believe this will be much more accurate and complete. But it is a never-ending struggle to get good, reliable information to 0 publish - and we do appreciate your help. 9 SJCC 71 - CALL FOR PAPERS Dr. Nathaniel Macon '71 SJCC Technical Program Committee P. O. Box 30130 . Bethesda, Md. 20014 . The Spring Joint Computer Conference will be held in Atlantic City, N.J., May 18-20, 1971. The purpose of the technical program at the Conference will be to bring together professional design specialists and users of computer technology, to communicate significant advances and to discuss important issues. Papers are invited in areas of interest such as: Compu ters and Elections Computers and the Media Data Files Versus People Education and Training Historical Perspectives Law Enforcement and Judicial Administration Manpower Survey Techniques and Practices of Embezzlement Teleprocessing The Shaping of our Policies Transportation All of these topics have hardware, software and systems connotations. We seek an interplay among hardware people, software people, and users. Participants will be expected to deliver a talk at the conference, provide an abstract for the technical program, and pr~pare a paper for publication in the proceedings. Deadline for initial submissions is October 9, 1970. Notices of intention to contribute a paper, and inquiries, should be sent to the address above. 0 NUMBLES Neil Macdonald Assistant Editor Computers and Automation A "numble" is an arithmetical problem in which: digits have been replaced by capital letters; and there are two messages, one which can be read right away and a second one in the digit cipher. The problem is to solve for the digits. Each capital letter in the arithmetical problem stands for just one digit to 9. A digit may be represented by more than one letter. The second message, which is expressed in numerical digits, is to be translated (using the same key) into letters so that it may be read; but the spelling uses puns or is otherwise irregular, to discourage cryptanalytic methods of deciphering. . We invite our readers to send us solutions, together with human programs or computer programs which will produce the solutions. This month's Numble was contributed by: Stuart Freudberg Newton High School Newton, Mass. ° NUMBLE 709 ABU S E X =I I S E R DEI 0 + B U I T WD T I B K D = WR ITT KR=BU=WR E NI NT 0 COMPUTERS AND CHEMICAL NOTATIONS 31862 Charles E. Granito, Manager Information Services Institute for Scientific Information 325 Chestnut St. Philadelphia, Pa. 19106 Mr. Wiswesser's article on computers and chernical notations [April 1970, page 35] is a fine contribution, and Computers and Automation is to be congratulated for . bringing this notation to the attention of the computer world. The Institute for Scientific Information has for several years provided subscribers to its Index Chemicus Registry System (ICRS) with computer tapes containing information appearing in Current Abstracts of Chemistry and Index Chemicus. Over 500,000 new compounds in Wiswesser Line Notation (WLN) form have now been covered by this service. In addition, rather sophisticated, though simple to use, software has been developed and tested. The use of the WLN notation will be further enhanced by the publication of lSI's computer produced and permuted WLN printouts, which will enable even those without computers to do many useful chemical substructure searches. We invite your readers to write us at the address above if they are interested in receiving copies of these 0 printouts. 10 36064 77365 87960 Solution to Numble 708 In Numble 708 in the August issue, the digits 9 are represented by letters as follows: D;O H=l L=2 0=3 E,W=4 ° through A,Y= 5 K=6 N=7 T=8 S=9 The message is: "They know as well that do not ask." Our thanks to the following individuals for submitting their solutions to Numble 707: M. Bestgen, Riverdale, N.Y.; Roy J. Boeckler, Milwaukee, Wis.; A. Sanford Brown, Dallas, Tex.; W. S. Butts, Virginia Beach, Va.; Murray A. Chayet, Tucson, Ariz.; H. Royce Culpepper, Jr., Nashville, Tenn.; T. Paul Finn, Indianapolis, Ind.; George Gluck, Rockville, Md.; Hank Green, Durham, N.C.; William A. Leonhardt, Cincinnati, Ohio; Lambert J. Simon, Irving, Tex.; and Robert R. Weden, Edina, Minp. Numble 706: G. P. Petersen, St. Petersburg, Fla. COMPUTERS and AUTOMATION for September, 1970 PUNCH LINES ... The very innovation and change of which we as scientists are so proud, has many people running scared. Whereas the world of science lives with change - in the form of new phenomena and new ideas and new techniques as the steady state - people who find their education outmoded and the skills by which they earn their living superseded are not so sure. When the pace and scale of innovation threatens to outrun the adaptability of "the social system, there's bound to be some strain. That is what we are feeling now on many fronts. More engineers need to learn how to be persuasive in public debate, how to gain mutual respect and confidence for communications with political arms of government from lower levels on up. They need to help win understanding of the impact of new developments and to make science an ally of society. When problems become sufficiently clear to enough segments of society, the legislation and other corrective measures that are needed can be passed and enforced. - Donald Hornig. Vice Pres. and Science Advisor Eastman Kodak Co. 343 State St. Rochester. N. Y. 14650 Everyone should have a health data base that is kept as a valuable paper. It should include not only information on an individual's health history and that of his family, but on other factors, such as economic and social, which may affect his well being. Each individual should carry this "problem oriented" record with him so that ifhe moves or has an emergency the information is readily available. It must be easy and cheap to establish this data base. The collection of information could begin as early as the first grade, when children could answer simple questions about themselves and their families. We must have this informationwritten down, for the human memory is not good enough to accomplish this task of remembering. - Dr. Lawrence L. Weed Prof of Medicine and Community Medicine Univ. of Vermont Burlington. Vt. 05401 Newspapers will look better and be produced more rapidly and economically in the 1970's. Almost one-third of the country's 1,758 daily newspapers are now using computers to drive typesetting equipment. Many are exploring or have adopted offset printing, photographic typesetters, highspeed data transmission, and mailroom automation. Because of this practical experience in changing traditional procedures, the groundwork has been laid for newspapers to utilize advanced communications technology. - Richard B. Tullis. Pres. Harris Intertype Corp. 55 Public Square aeveland. Ohio 44113 COMPUTERS and AUTOMATION for September, 1970 The implication for today's violent dissenters is that technology has provided the establishment with a potential for control far exceeding anything in history. Such items as computer bugging, infra-red surveillance (already in use at the White House), monitoring of telephone calls by satellite, introduction of mind control or disorientation drugs into the environment, and the like, already loom on the immediate horizon. It is time to quit, for continuation of violent protest will only hasten the takeover of technopoly; i.e., the monopolistic domination by technological devices and systems over the thought, feelings, aspirations and behavior of man, and. the resources at his disposal. Perhaps at the community and professional level, channels of analyses and discussion will emerge which will create the constitutional solutions so necessary for the preservation of a system of ordered liberty, in a world rushing headlong toward technopolistic restraint. - Prof Charles S. Padden The John Marshall Law School 315 S. Plymouth Court Chicago. Ill. 60604 While it's easy to see "the knowledge explosion" as a supreme tool, we too seldom see it as a potential tyrant. The hard reality, however, is that in attempting to gather, process, absorb and disseminate information and knowledge today, we find ourselves living more and more in the confusion of tied-up telephones, computer printout, procedure manuals, stacked airplanes, unnecessary correspondence, meetings, mail, memoranda and aging files marked "Must Read". In one way, the basic problem is similar to that faced a. generation ago by nuclear scientists. Given the inevitability of a force that can be of enormous benefit to mankind, we must still insure and maximize its benefit. We must impose control on a potentially infinite and uncontrollable chain of reactions. - C. Peter McColough. Pres. Xerox Corp. Stamford. Conn. 06903 The strength of the computer revolution is now unmistakable, and within 10 to 15 years, 50 per cent of all workers will be affected by or connected with the computer industry. Computers need people, thousands every year. Employers are almost conducting auctions for the services of experienced people - and people with no more than 12 months within the industry are deemed as experienced. ' - George Parkinson. Chairman Data Processing Services Ltd. Stourbridge. England 13 REGULATIONS FOR INFORMA TION SYSTEMS Prof. Calvin C Gotlieb Dept. of Computer Science University of Toronto Toronto 181, Canada "It is possible that introducing regulation and licensing for information systems might exact a price which is unnecessarily high at first, but I prefer to see caution on the side of protecting rights. " Information systems containing data about individuals are needed increasingly in the public sector (census data, tax records, medical statistics, police fields, etc.) and in the private sector (records for banking, credit, insurance, etc.). Governments need these records to carry out their responsibilities; planners and social scientists need them to understand our society and suggest measures to take it in the directions considered desirable; business needs the records for effective operations, service and management. devices are leading to integrated information systems built around computerized data banks. Availability of terminals and ease of communications increase the danger that data about a person may be distributed without restriction and used for purposes detrimental to his interests. The dangers are often aggravated by an unjustified confidence in data coming from a computer. The Trend Toward Integrated Systems This chain of reasoning leads to proposals for regulating data banks, for example, by licensing them. Opponents of regulations argue that they are in general addressed to the wrong problem and in any case unenforceable. Proponents argue that it is essential to adopt firm measures before there is an irretrievable loss of human rights. It is accepted. in this paper that some regulation of information systems is required. No new arguments for regulation are advanced. Most people reading this have There is a strong trend towards integrated systems - i.e., systems that contain heterogeneous information about many people and which are accessible to different authorities for different purposes. The ability to gather more accurate and consistent data, and the advantages of lower costs and better coverage, make such systems irresistible. But our laws offer poor protection against the misuse of such systems. The concept of privacy is very poorly defined in Canadian law. Rules governing which agency may collect what information, how data should be verified and to whom it may be disclosed, exist in only a few situations. As a result the individual is not protected against the misuse of information about him. Technological advances in storage and communications Based on a paper prepared for a conference on "Computers: Privacy and Freedom of Information", held at Queen's University, Kingston, Ontario, Canada, May 21-24, 1970. 14 Controversy Over Regulation "In my opinion the crucial question is: Can effective regulations be formulated and enforced?" probably formed opinions on whether privacy is really bdng eroded. In my opinion the crucial question is: Can effective regulations be formulated and enforced? Many of the arguments against regulation are based on views that: COMPUTERS and AUTOMATION for September, 1970 information systems are too thoroughly woven into the fabric of our technology to be limited; any regulation which would protect privacy would exact unacceptable costs in loss of efficiency and opportunities; and some diminution of privacy is unavoidable. stored on magnetic tapes, or on magnetic disks which may be attached on-line to a computer, will undoubtedly continue for decades. But to make any regulation effective it must be applicable both now and through the transition This paper is an attempt to examine goals and to show that adopting measures to achieve them is not impossibly difficult. "Regulations must be considered for any information system which contains data about individuals, and not simply for computerized data banks. " Goals It is not difficult to list goals which are almost truisms. For example: The rights of an individual to privacy must be protected as much as possible, consistent with the legitimate needs of society. Data concerning individuals must be as accurate as possible. The problems arise when it is necessary to interpret the meanings of specific phrases such as "individual rights", and "legitimate needs of society", in knowing when reasonable steps to provide protection or ensure accuracy are being proposed. The first proposition above implies a middle position in privacy vs. freedom of information. It suggests that a person cannot expect to opt out of society by refusing to recognize that some records must be kept about him - for example, birth registration and social security number. But it does assume that there are rights of privacy for an individual. Since it is generally agreed that the legal concept of privacy is poorly defined in Canadian law, if at all, it follows that there must be legislation to define individual privacy. This is an essential point. If I do not dwell on it further in this paper, it is because I do not regard myself qualified to discuss where in Canadian law such legislation ought to reside - whether it should exist in a provincial law or in federal, or both, and in which sections of the law it would be most appropriate. I hope that very soon specific proposals for legislation will emerge. Relating a Legal Concept to Rules period. Regulations must be considered for any information system which contains data about individuals, and not simply for computerized data banks. Since a system which contains information about a person may take a wide variety of forms, ranging from a telephone book to a security file, it is necessary to identify those systems for which regulation might be needed. A Classification of Information Systems It is proposed here to classify information systems containing data about individuals according to three characteristics, each with two or three categories. The characteristics and categories are shown in Table 1. Table 1 Category Characteristic Data Source P - public record S - supplied by individual o other Distribu tion I - internal E - external Inspection A - automatic R - upon request of individual F - forbidden Although the terms used for the categories convey a general sense of their meaning, precise definitions have to be given. A legal concept of privacy, though necessary, is not enough. It is also necessary to consider how the concept should be interpreted when operating information systems. In particular it is important to relate the concept to the rules which those who are responsible for designing, assembling, and maintaining information systems, are to use in handling data: At present these rules are ambiguous. It will be taken as a general goal here that it is desirable to have an explicit statement of how information is collected, how it is verified and to whom and under what conditions it is transmitted, for any information system, public or private. This is desirable even for a police or security information system. 1 , In this paper the emphasis on the phrase information system, rather than data bank, is deliberate. Although computerized data banks are coming to the fore, most of the data about individuals is still in the conventional form of files or punched cards. The transition toward systems complete print-out of the information about an individual 1 An exception must be admitted for those (hopefully rare) systems, for which because of national security, the existence is not made known. is sent to him at specified points either periodically, or whenever a change is entered. In the "request" category there might conceivably be some small fee charged if a person wishes to see his print-out, so as to discourage COMPUTERS and AUTOMATION for September, 1970 Data Source For Data Source it is clear enough when the data is supplied by the individual himself, and since "other" is defined by exclusion, the definition hinges on what is meant ~y public record. This could be defined by listing those sources which were acceptable - for example, public service awards, vehicle registrations, records of criminal convictions, voters' lists, etc. Careful thought would be needed to choose the list and it would have to be reviewed in the light of experience, but there does not seem to be any inherent problem in arriving at a definition. Inspection For Inspection the "automatic" category means that a 15 nuisance requests, but there should be no other condition imposed. In particular an individual must be allowed to see the whole record (otherwise the category should be "forbidden"), and he should not be required to sign forms which prohibit him from presenting claims for damages arising out of improper operation of the information system. Distribution The most difficult categories to define are "internal" and "external", with respect to the Distributioncharacteristic. Generally internal is intended to mean that distribution of information is restricted to the company or institution which maintains the information system, unless there is explicit permission of the individual about whom the data pertains, in every individual case, to transmit it elsewhere. However, in the case of government, federal or provincial, the organization is so large that it would be necessary to be much more precise than this, if the term "internal" were to have any validity. Perhaps internal should mean a single department or office. For a company , a decision would have to be made whether various subsidiaries were to be considered internal, and even for a university the question arises whether different faculties and schools are all to be considered as internal to the one institution. If it turned out that it were not possible to define internal distribution with enough precision, it might be necessary to consider distribution for specific items of information rather than for the whole contents of the system. This possibility is discussed at greater length below, but for the moment it is assumed that the categories "internal" and "external" are meaningful. Some Sample Oassifications Using this system a number of common information systems are shown in Table 2, along with their classification according to Table 1. It will be observed that fourteen of the eighteen possible types occur in this table. This is some evidence that the classification into types is useful. Most of these information systems have a long history of use, and methods for operating them have evolved to minimize problems of verification and accessibility. In fact problems really .arise only for the types OEF and SEF. Regulation of information systems could therefore proceed by first identifying those of type OEF and SEF. For all others, and this would include the overwhelming majority of systems - company payroll files, who's who lists, newspaper morgues, etc. - no regulations would apply. This would in itself encourage those operating systems to make their data open for inspection to the individual concerned, and to restrict general disclosure if possible, so that regulations would not apply. Where it is judged essential to permit the transfer of records (for example,between one law enforcement jurisdiction and another), or it is judged not desirable for a personalwa)(s to have access to his complete record (as might be the case with a doctor's report), the conditions for allowing disclosure or preserving security would be spelled out. I repeat that the essential purpose of the classification is to allow attention to be focussed on any information system where there are problems of security and disclosure, and not just on computerized data banks. 16 Table 2 Classification of Some Information Systems System Type Bank Account Payroll File Who's Who Medical Report Personnel File Police File OEA OIR SEA OIF OIF OEF Credit Record Tax File Telephone Book Voters List Sales Prospects' File Sales Prospects' File for Sale OER OIF PEA PEA PIF, OIF PEF,OEF Membership List (Club, Professional Society) SIA, SIR SEA, SER (if given to others) Newspaper Morgue Court Records Welfare List Census Record Biographical File of Company OER,OEF PER OER or OEF SIF OEA Security Tags Although this classification system could be adequate for setting up regulations about information systems, in actual operation it will probably be desirable to make much finer distinctions about categories of data. The most difficu1tquestion will continue to be: who should have authority to receive specified items of data? It is impossible to take a simplistic approach on this. Eventually the only satisfactory solu tion will be to attach security tags to every data field, and use these tags to determine under what conditions the information may be disseminated. Eventually the only satisfactory solution will be to attach security tags to every data field, and use these tags to determine under what conditions the informa tion may be disseminated. " In simple cases the user's authorization code may be sufficient to determine which fields are available to him; in more complicated situations it may be necessary to set up a table which relates authorization codes to tags. 2 There are definite overhead costs associated with security tags and these are discussed further below. In my opinion it will come to be recognized that these costs must be paid and a security tag system will be a regular part of every information system. But the lack of experience with such systems, and the fact that they are so far rare and would have to be added to existing systems over a considerable period of time, does not make it practical to suggest that proposed regula tions on information systems make it necessary to include security tags for data. Three types of costs will be associated with the regulation of information systems: direct costs, overhead costs, 2The IBM manual "The Considerations of Data Security in a Computer Environment" discusses, briefly, authorization techniques and tables (p. 16). See also Ware et al.: Spring Joint Computer Conference, 1967, pp. 279-303. COMPUTERS and AUTOMATION for September, 1970 and inhibition costs arising from things which cannot be done. Direct Costs It will obviously take funds to maintain regulatory and licensing agencies. Other direct costs to be paid by the purchaser of hardware will be for scramblers, and other devices for protecting information, detecting possible taps on the communication channels, etc. These devices would certainly come into wider use if the operators of information systems were made to take on legal responsibilities for safeguarding data. Overhead Costs Overhead costs would arise from the more complicated software systems which would be needed. There would be costs in making transcripts of data available to individuals either automatically or on request, or simply in classifying different data fields and assigning tags to them. Care might have to be taken that this task was not expanded to the point where it had a whole mystique attached to it, as is said to be the case with data classified for military security. There would be costs for storing tags and the time taken to decode authorization numbers and match them against tags. On this latter point it should be noted that there are already information systems in which a deal of redundant information is carried in the form of tags attached to data fields. In the Marc II system now being adopted widely for bibliographic information, perhaps 10% of the storage is used for tags that identify data, facilitate access and counting, etc. If this type of storage and processing overhead can be built into a system for handling bibliographic information, it is not too much to expect that it will also be built into systems for handling personal-data. Inhibition Costs which will have significant effects on the preservation of individual privacy if adopted. 1) A legal concept of the invasion of privacy should be introduced in Canadian law. This should go beyond the present laws on nondisclosure governing lawyers, physicians, bankers, employees, spouses. It should be broad enough to be applicable to situations involving wiretapping, credit bureaus, health information systems, and other types of information systems. 2) Certain types of information systems should be. licensed. Legislation could follow the general line suggested in Computers and Freedom 3 and Bill 182 4 , and Privacy and Commercial Reporting Agencies. The licensing should be for information systems and not merely data banks, and should be based on a classification which categorizes systems according to their mode of operation. The transition to computerized information systems should simplify the application of controls. 3) Technical improvements which permit greater se· curity and control over the transference of information should be encouraged. Particularly needed are effective techniques for matching data with authorized users, and inexpensive hardware for maintaining security. The encouragement could take the form of research grants on projects and incentives to manufacturers and software companies to develop and market systems, and publicize the methods and devices already known. Systems analysts and designers should use the tools presently available. Man is learning that not all the effects of technology are beneficial. Our concern over pollution is only one aspect of "Man is learning that not all the effects of technology are beneficial. " There would be inhibition costs because worthwhile activities would be more costly or forbidden. It would be "It would be more difficult or even impossible to carry out certain types of planning studies and experiments in the social sciences if access to personal data became more restricted. " more difficult or even impossible to carry out certain types of planning studies and experiments in the social sciences if access to personal data became more restricted. But we are used to such inhibitions in medical and psychological experimentation involving human beings, where there are very careful legal and other regulations about what may be done, and we accept the necessity for them. We will have to accept similar inhibition costs when using personal information. Proposals This paper concludes with three specific proposals which, it is believed, are capable of implementation, and COMPUTERS and AUTOMATION for September, 1970 the review which has to be undertaken about many side-effects of technology. Especially serious are those cases where the processes are almost impossible to reverse. A polluted lake is a much greater problem than a polluted river. I do not feel that we are far along an irreversible process in the way we are allowing information systems to operate now. But it is noteworthy that every review of the tolerance for pollution or radiation leads to a downward revision of the permitted levels. I feel that it is possible that introducing regulation and licenSing for information systems might exact a price which is unnecessarily high at first,. but I prefer to see caution on the side of protecting rights. Experience has shown that overprotection is in fact, very rare. In my opinion if the problems regarding protection of individual privacy are explained to the public, and to those responsible for political and legislative action, and the alternatives are set out, they will be willing. to pay the price of keeping our social environment healthy. In fact they may well insist that the price be paid. 0 3 NCP Old Queen Street Paper: 8, Conservative Research Department 1968 4 An Act to Provide for Data Surveillance, 2nd Session 28th Legislature,. Ontario 1968-69 17 PROBLEMS OF LIABI,LITY FOR THE EDP SERVICES INDUSTRY Milton R. Wessel Kaye, Scholer, Fierman, Nays and Handler 425 Park Ave. New York, N. Y. 10022 I believe that the decade of the nineteen seventies will see a broad expansion of the liability of the EDP services industry's to all whose lives and businesses it affects. This liability will be founded upon new and far-reaching socioeconomic considerations. The companies which fail to recognize this and take protective action may well be among those which do not survive. Fundamental Shifts in Society Any discussion of this industry's liability problems during the next decade must be predicated in large part upon an evaluation of what is happening in the streets and on the campuses. Protests regarding Southeast Asia and war genenilly, ecology, civil rights and poverty are not simply the passing fancies of a bunch of kids or hot-headed radicals, but a reflection of fundamental shifts in our society which are changing all the rules. Already we have witnessed many of the incidents of private property, until recently a sacrosanct legal cornerstone of democracy and its free enterprise system, give way to a host of intrusions based upon social considerations. No longer can one be secure that he will be permitted to do what he wants, when he wants with what he owns. If you don't agree, ask Consolidated Edison of New York, or General Motors, or the owner of a restaurant in Macon, Georgia, or a home in Chicago. Similarly, the former economic touchstone of gross national product is beginning to yield to considerations of quality and etological preservation, and we already have a new concept of "net" national product, deducting pollution and depletion, with economic and social objectives· modified as a result. Milton R. Wessel is a law partner in the New Yark firm of Kaye, Scholer, Fierman, Hays and Handler. He is also attorney for the Association of Data Processing Service Organizations (ADAPSO), and he represents the American Federation of Information Processing Societies (AFIPS). 18 And so it is all along the line. One has only to examine the decisions of the United States Supreme Court in a variety of areas since the nineteen fifties - civil rights, criminal prosecutions, even t4e Association of Data Processing Service Organization's (ADAPSO's) bank case extending the citizen's right to call government officials to <:1ccount - to see the legal consequences of these enormous changes. The law is in fact developing rapidly, to reflect this economic, social and political revolution. And nowhere are the changes in the law during the seventies likely to be more dramatic than in the EDP services industry, for it is a new one having major societal impact where these modern developments do not meet the resistance of history and tradition - what lawyers call stare decisis - to the same extent as in older established industries. Liability to the Public Industry problems of liability during the 1970's can be considered in terms of the two major groups to which liability extends: (1) the public (including governments and competitors); and (2) those with whom the industry has contractual relationships - customers, owners, employees and suppliers. A recent decision, the impact of which has not yet been fully appreciated either in industry or legal circles, may be helpful in furnishing an overview of the current and anticipated broadening of liability to the first of the groups to which industry liability extends, the public. . A Kentucky citizen, John T. Swarens, purchased an automobile on credit through the Ford Motor Credit Company. Hp paid his monthly charges, but the inevitable error occurred and collection agents visited. Swarens satisfied them by exhibiting cancelled checks. The visit was followed by a second, and Swarens again showed his cancelled checks. But on the third visit, Swarens exhibited only his shotgun and chased the men away, unsatisfied. Ford seized and sold the vehicle, and Swarens brought suit for compensatory and punitive damages. A jury, sustained all the way through, awarded Swarens his full damages plus 250% in punitive damages, a quasi-criminal type of punishment. The Kentucky Court of Appeals went out of its way COMPUTERS and AUTOMATION for September, 1970 "In an effort to avoid liability, EDP services organizations should introduce measures which will: (1) guard against the dissemination of erroneous information from a data bank; and (2) permit members of the public zn appropriate circumstances to obtain assurances concerning their files. " in a final paragraph to make clear the obligations being imposed upon EDP service organizations. It said: Ford explains that this whole incident occurred because of a mistake by a computer. Men feed data to a computer and men interpret the answer the computer spews forth. In this computerized age, the law must require that men in the use of computerized data regard those with whom they are dealing as more important than a perforation on a card. Trust in the infallibility of a computer is hardly a defense, when the opportunity to avoid the error is as apparent and repeated as was here presented. 44 S.W.2d 53, 57 (Oct. 17, 1969) It is significant to add that despite much talk, no legislature has yet imposed a statutory obligation upon computer users to interpose such human judgment between "It is significant that despite much talk, no legislature has yet imposed a statutory obligation upon computer users to interpose human judgment between computer and public. " computer and public. Swarens is thus far more important in its general teaching than in its specific ruling, for the court imposed the obligation on its own, even authorizing sanctions criminal in character. By parity of reasoning, computer services companies which feel secure on the privacy issue must take note, despite their success thus far in blocking any statute giving individuals the right of access to data banks or imposing additional statutory liability for disseminating erroneous information. In a proper case, I predict that a court will take this action on its own without a statute, based upon the expanded social concepts which are entering the law. In an effort to avoid liability, EDP services organizations should, individually and through groups, introduce measures which will: (1) guard against the dissemination of COMPUTERS and AUTOMATION for September, 1970 erroneous information from a data bank; and (2) permit members of the public in appropriate circumstances to obtain assurances concerning their files. The ADAPSO Board of Directors has the matter of privacy and related problems under intensive consideration, but up to this time neither it nor any EDP services organization has taken action. Impact on Licensed Professionals As EDP services continue to expand - and despite the gloom, the present financial crisis is temporary and profitable expansion will return - their impact upon the licensed professions such as accounting, engineering and even medicine and law will increase. I believe that intensified regulatory activity will result during this decade, including injunctive and punitive action against services organizations for unlawful practice. The wise services organization will exercise caution in these areas, as well as take preventive action such as by appending the disclaimer recommended by ADAPSO to its reports.} I regret having to report that only a handful of companies have yet done so. Concentration of Services Industry economic forecasters are agreed that the present trends towards concentration of EDP services into fewer but larger economic units and proliferation of communications applications, will accelerate during the seventies. As services organizations thereby become regional and national rather than strictly local units, their activities are bound to become subject to closer antitrust scrutiny, both by public enforcement agencies and private parties seeking the windfall of treble damages. Liability for violation of the antitrust laws can be huge, not just in terms of damage recoveries, but also because of the enormous direct and indirect costs that litigation of this kind inevitably generates. Despite restrictions seemingly imposed by the United States Supreme Court, I believe that the application of the related· state laws of unfair competition 2 will probably continue to be intensified in this decade as they have been for some time now, with the result that the industry will 19 also experience increased liability to competitors for conduct such as alleged theft of trade secrets or interference with advantageous commerical relations. On the plus antitrust side, I predict that the RobinsonPatman Act provisions relating to price discrimination will continue to enjoy the disrespect of most antitrust· authorities, and that it will not be extended either by statute or judicial construction to apply to purely EDP services. The answer to all of this? Contractual disclaimers and the errors and omissions insurance coverage soon t,o be' offered through ADAPSO will be helpful. But first and foremost EDP services organizations must furnish high quality service, so that there are as few errors as possible. In addition, however, because errors are inevitable in a commercial environment where costs are relevant, caution also Liability to Customers "First and foremost EDP services organizations must furnish high quality service, so that there are as few errors as possible. " The liability of manufacturers and suppliers generally to their customers has been expanding for a half century and more, and the decade of the 1970's will also see the EDP services industry's liability to customers extended far beyond anything which presently exists. A Minneapolis decision, now on appeal, imposed an almost one-half million dollar liability on a service center despite written contractual disclaimers, and without any proof of scienter or "A Minneapolis decision, now on appeal, imposed an almost one-half million dollar liability on a service center despite written contractual disclaimers, and without any proof of specific intention to misrepresen t. " suggests fair dealing with customers through such means as the circularization of the ADAPSO position paper on error-free servicing, designed specifically to guard against this kind of liability. The EDP organization which sends the ADAPSO paper out to customers, has a useful defense to any claim of misrepresentation by one of its employees, for the paper itself constitutes evidence that the customer should not have relied on an obviously unauthorized representation. Here again only a few companies have followed this procedure, in spite of the fact that the organization which fails to send out the paper will have a far heavier burden to satisfy when a client refers to a salesman's promise, and then proves that the company failed to follow industry suggestions to disseminate this paper. Liability to Shareholders and Owners specific intention to misrepresent. A Los Angeles decision, subsequently withdrawn but still significant as suggestive of the trend, sustained a customer's right to sue for one million dollars punitive damages for improper service. These reveal only the top of the iceberg, for underneath lies the possibility of what lawyers call "secondary" or "consequential" damages. One large brokerage house, in folding, blamed its problems in large part upon computer difficulties. The losses to the brokerage house alone were catastrophic; but in addition, the threat of claims by customers who were injured or by the stock exchange which covered some of the losses, has been posed and cannot be ignored. The former legal rule of caveat emptor - "let the buyer beware" - meaning that a seller could say pretty much what he wanted without liability, is already well on its way out, and is being replaced by a variety of bothjudicially-imposed and statutory sanctions protecting the consumer. I believe that this trend favoring the consumer will also be accelerated during the seventies, especially in the EDP services industry, to be replaced by presumptions and rules such as res ipsa loquitur; 3 placing a heaVy burden of responsibility on the vendor of services. Last year a Minnesota legislator introduced a statute which provided: Whoever is injured ... [by computer error] ... shall recover therefor unless the person who caused the injury establishes that he wa~ not negligent. ADAPSO reacted immediately and positively as it should have, and the statute was defeated. But the result was only to gain time, not ultimate victory, for I predict that in a proper case, a court without a statute will impose liability on just this theory, in effect shifting the burden of establishing proper conduct on to the members of this industry. 20 The period since World War II has seen a broad expansion of the liability of directors to shareholders, partners and other owners; although individual director liability is not asserted, the EDP services industry already has a three-quarter billion dollar derivative stockholder action pending for failure to take action to protect the interests of owners.4 I predict this area of liability will also be greatly extended in the seventies, accompanied by an expansion of enforcement activity by the Securities and Exchange Commission (SEC), as soon as that much harassed agency is able to get some of its more current and urgent problems under control. Statutory Software Protection The EDP services industry is characterized by huge investments in software, on the values of which stockholders and owners rely. During the 1970's, there is likely to be established a new statutory form of software protection unlike copyrights, patents and trade secrets, although combining some portions of each. Reliable legal protection for software under any circumstances, however, is still some years off. "Reliable legal protection for software is still some years off. " Today, decisions of the Supreme Court suggest that even trade secret protection may be in danger. The recent write-offs by industry giants of millions of dollars of COMPUTERS and AUTOMATION for September, 1970 intangible software investments, because they proved worthless, are small compared to the losses which would result from invalidation of trade secret protection. There is an obvious exposure to personal liability to stockholders for failure to disclose the possibility of such write-offs or losses based upon presently existing legal impediments which should have been recognized. The answer? Fair disclosure, and far greater caution in valuing intangibles. Let me add parenthetically in connection with relationships with owners, that the present financial crunch has made the raising of money extremely difficult and in many cases impossible, with disastrous consequences. This industry can no longer expect the public funds so sorely needed for expansion to be channeled to it whenever requested, on the expectation of huge multiples of earnings. In addition to a return to the fundamentals of sound economic growth and true (as distinguished from purely accounting) profit, and attention to all the common alternatives of financial planning, it must pay attention during this decade to the special financing techniques which have been used so successfully in some other industries, and which have made them far more attractive than this one to many sophisticated investors. s Liability to Employees During the seventies, as mass production techniques grow - and they must and will if the industry is to prosper - organized labor will enter the industry. It has already done so in a few cases. The EDP manager must know how to deal with it, or he will have added just one more problem to those which he already faces. He should be especially alert to the legal requirements in this field, and companies should work together to counteract the union strategy of "divide and conquer". It seems fair also to anticipate that as population increases, the economy expands, and concepts of freedom mature further, employment restrictions will be more difficult to enforce. Covenants limiting an ~mployee's right to approach customers or otherwise compete during the next decade will be even more confined in space and time than they are today. Moreover, as the industry grows during this decade, enforcement of the Fair Labor Standards Act and similar wage, hour and working condition statutes will become more intensive, perhaps on the basis of a single-industry campaign. This has been the experience in other new or developing industries; the liability for failure to adhere to these laws can be substantial. The industry must also be alert to the possibility of increased governmental and private enforcement of the civil rights and equal opportunity laws, especially as even the smaller services organization becomes no longer a local enterprise. Liability to Suppliers I have kept discussion of liability to suppliers for last, because it is the one area about which I am most optimistic. The chances are that during the 1970's the increased liability of suppliers to the EDP services industry will far outpace any increase in the industry's liability to suppliers. I believe· also that irrespective of their outcomes, the pending antitrust litigations will result as a practical matter in significant competitive benefits to this industry. Indeed, some of these benefits may already have been experienced. COMPUTERS and AUTOMATION for September, 1970 But still a word of caution, added with some trepidation out of fear of being misunderstood because of the strong feelings about IBM held by so many: Too many in this industry blame IBM and SBC for their own commercial failures, and file suit as proof - I count nine major suits against IBM alone and threats of many others. The courts "The EDP manager who regards any litigation as a substitute for proper operation of a business does so at his own peril. " will ultimately determine the merits of these cases, and I certainly am not perspicacious enough to predict their outcome. But the EDP manager who regards any litigation as a substitute for proper operation of a business does so at his own peril. Conclusion What does all this add up to? The EDP services industry will finally grow up during the seventies, in a legal environment in which the rules are not yet defined. However, it is clear that fundamental principles of integrity, quality and the like are going to become more and more dominant. Professionalism and ethical practices are not just moral commitments; they are sound as commercial judgment as well. I believe that in the seventies .industry liability will be broadly expanded. It will be predicated in large part upon morality and ethics, which are far better measures of legal standards of conduct than some of the conceptual considerations of the past. Viewed from afar and very long range, this can only be good, and the EDP company which attends properly to its affairs and survives will be a better one for 0 it. References 1. The disclaimer recommended by ADAPSO states: "The foregoing presentation has been processed electronically by computer from data furnished to us, has not been analyzed by professional [accountants] [engineers] [architects] [doctors] [lawyers] or other persons purporting to have expert knowledge of [accounting] [engineering] [architecture] [medicine] (law] and is furnished without [accounting) [engineering] [architectural) [medical] (legal] opinion of any kind. 2. A federal law of unfair competition may even be enacted. The former Lindsay Bill is now being revised by a National Coordinating Committee of lawyers from the American Bar Association, the United States Trademark Association, and other bar associations, in consultation with the Antitrust Division of the . Department of Justice. 3. Meaning that in the absence of a contrary explanation, certain conduct will be presumed to have been the result of negligence. Literally, "the thing [conduct] speaks for itself". 4. Although this article is concerned only with substantive liability problems, the industry's exposure will also undoubtedly continue to be enlarged during the decade as the result of broadened procedural remedies such as the class and citizen's actions. ADAPSO's bank litigation, in which the United States Supreme Court enlarged the standing to sue concept, is a good example. 5. e.g., the "tax shelter", which is particularly suitable to the EDP services industry and has given it an as yet untapped, but very real,. financial competitive advantage because of limitations imposed on other industries by the Tax Reform Act of 1969. 21 SYSTEMS TEST Dwight M. Frazier, Jr. IBM Corp. P.O. Box 12195 Research Triangle Park, N.C. 27709 An article in the Harvard Business Review, January-February, 1968, reads: "The most successful U.S. manufacturers today are making much greater and more sophisticated use of the computer than they were just three years ago. The day may not be far distant when those who analyze business failures can add another category to their list of causes - failure to exploit the computer." To "exploit the computer," many modern corporations are installing, or planning to install, very complex interplant, inter-divisional, computer-oriented data processing systems which will serve management at all levels, from manufacturing supervisors to corporate presidents. Design and Development Costs Thousands, even millions, of dollars are being invested in the design and development of such systems. When installed, the output from these systems is used to make vital decisions which can mean the success or failure of a corporation. Management must be able to assume that the Dwight M. Frazier, Jr. is an associate programmer at IBM's Systems Manufacturing Div. facility. He was graduated from East Carolina Univ. in 1963 with an A.B. degree in mathematics and a minor in physics. Prior to joining IBM in 1968, he was a programmer-analyst with the Carolina Telephone and Telegraph Co. in Tarboro, North Carolina, for three years. 22 information from these systems will always be available and will always be correct. After installation, what happens if the new system stops working, even for a short period of time? Old systems have been discontinued, and no decision-making data is available. An even graver situation would be an undetected malfunction. Decisions based on incorrect data can be and likely will be wrong, resulting in time, manpower, and dollars lost or wasted. Since today's fast-moving, fast-changing and highly-competitive environment demands the exploitation of the computer for the development and installation of modern data processing systems, how can needed systems be installed and the undesirable consequences such as those mentioned above be avoided? I believe the answer is a step which is often not formally included in the development plans for computer-oriented data-processing systems. This step is called "systems test." What Is a Systems Test? Systems test is a test of all the computer programs and associate procedures which make up a computerized data processing system. Its purpose is to insure that they fit together and perform as specified in pre-programming plans (User Manuals, Design Specifications, etc.). What can a systems test do for you? To help answer this, let's look at an experience which occurred in an IBM manufacturing plant in the southeastern United States. This plant's Systems and Programming department was assigned responsibility to develop a data processing system which could be installed in nine of the corporation's manufacturing plants. They were located in many sections of the United States and one was in Canada. This system was to control orders and bills for certain customized products whose sales amounted to millions of dollars each month. The orders were received at each plant from the corporation's sales division, whose offices were in every state, and several foreign countries. The billing information was to be returned to the sales division at a central location via magnetic tape. Approaching Perfection Management concluded that, to install such an interplant, inter-divisional system at remote'locations, the system itself must very closely approach perfection. To guarCOMPUTERS and AUTOMATION for September, 1970 "It is quite possible that without a good system test, some projects may incur installation problems and be scrapped unnecessarily because of misunderstandings, lack of education, and a natural resistance to change. " • antee this perfection, systems test was included in the development phase for this system. It was to last three weeks, and was to be performed at a location other than the developnig or installing plants. Installing plants were to send representatives (both user and programming personnel) to review the system, watch it operate, and examine the test results. The installing plant's representatives were to have the responsibility of determining if the system could or could not be installed and made operational in their plant's environment. The developing plant assigned impartial personnel the responsibility of preparing for this systems test. Plans were developed and test data were prepared. Most of this test data was run through the system at the developing plant to help programmers unit-test (a test of an individual program) their programs. By doing this, many "bugs" (errors) were discovered, and corrections were made before the official three-week systems test began. Success of the Test Once the systems test began, and logistics problems involved in assembling and making lodging accommodations for fifty or so people had been solved, things went quite well. Every plant reviewed the structured test and added additional test cases. Some even ran sample live data through the system. Program errors were discovered and fixed. Sign-offs were received from all plants stating that the system could be installed and made to operate in their environment. In fact, all plants were running live with the new system within six weeks after the completion of the systems test. This example shows the importance of a systems test and what role it can play in the development cycle of a large, sophisticated system. However, this was only one system and only one systems test. The following is a list of benefits which can usually be derived if systems tests are properly planned and executed: 1. More Reliable System - During the systems test, many errors (hopefully all) will be discovered and fixed. This can greatly reduce the parallel run time necessary after installation. Also, some of these errors will probably be the type that could go undiscovered for years under normal production conditions. Errors discovered and corrected beforehand will therefore not occur after installaCOMPUTERS and AUTOMATION for September, 1970 2. 3. 4. 5. 6. tion, when they may result in time, manpower and dollars lost or wasted. Education and Training - To prepare the test data or examine the results, one must become thoroughly knowledgeable about the system. He is forced to read and understand "User Manuals" and "Design Specifications" to learn how to use the system, how it is maintained, what it does with the data, and how its output is to be interpreted. User Involvement - Because he is preparing test data and examining results, the user becomes acquainted with the system prior to its installation. Otherwise, the testing responsibility is usually left entirely up to Systems and Programming personnel, who often dislike the task and often do not do a thorough job. Now, instead of having to use a system tested entirely by someone else, the user is able to use a system he has helped test. Increased Confidence - Because users have been involved in the testing of the system and have helped make it operate successfully, they will not hesitate to use the system after it is installed. Their confidence in the system is greatly increased. Diagnostic Test Deck - This can be condensed from the system test to be used for a quick system check-out when future program changes or modifications have to be made. Common· Programs and Common Documentation - If the system is to be installed at other locations, this becomes a very important benefit. At the end of systems test, all programs and documentation must be updated to the latest level and released. In this way, all installing locations know what the latest level is and can be assured of receiving it. Systems Test Guidelines Systems tests must be designed to fit the system that is being tested. Since all systems vary in purposes and complexities, no two systems tests will be exactly alike. However, there are certain basic rules and guidelines which should be followed to develop and execute a successful systems test. They are as follows: 23 1. Organize a "test team" as soon as design specifications have been completed. It should consist of representatives from Systems and Programming and from the user areas. This team should report directly to management which is in control of systems and programming and user areas. A chairman should be elected or appointed, and a regular meeting schedule arranged. The following is a list of recommendations for test team activities: A. Study Systems Flow - What programs make up the system, and in which sequence are they executed? B. Study System - What is put into system, and what comes out of system? What does each program in the system do to the data? Usually it is a good idea to look at system output first, then to go back through every program in the system to determine what the original input must be. C. Examine System Environment - What type of hardware (computer) is the system going to be run on? What type of input and output devices will be utilized (cards, disks, tapes, video display, etc.)? What types of software (programs which control the computer) will be utilized? D. Prepare Test Plans - What test cases and runs will be necessary to properly test the system? on what dates will these runs be made? Test plans should be considered very carefully. The test cases themselves will actually determine how good the test is, and the dates will be used as targets which must be met as the test progresses. Any slippage in these dates will also mean a slip in the system's in stallation. E. Design Forms - Forms will furnish input data, and will document expected results. What happens to this data after it goes into the system? Does it come out on a report or go into a master file for on-line retrieval later? Over-lay forms (foils), which will facilitate the reading of non-formatted computer outputs (data set dumps, etc.), are often very useful time savers. As the test progresses, errors will be discovered in programming and documentation. They must be controlled. This establishes a need for a vital form, the "trouble report". F. Establish Control Procedures - These should be used to handle various trouble reports which will arise during the testing of the system. The status of these trouble reports must be known at all times. When was it received? What program was affected? What was the level of the program? Who is working on the problem? Once the problem is fixed, the trouble report must be returned to the originator with an explanation of what corrective action has been taken. G. Establish Control Center - To control (l) flow of data between computers and test.team, (2) system level, (3) program levels within system and (4) Trouble Reports. Without a centralized control center to handle these functions, the system may get out of control and may never be brought to successful completion. This control center should be manned by members of the system test team. For examples of Control Documents see exhibits 1,2 and 3. 24 2. Centralize Final Phase of Test - Bring together at a central location representatives of all installing or using locations. With the developing department's systems analysts, programmers and test team to review systems test results, installing and using representatives may consist of both user and programming personnel. The customers should now be able to add additional test data if it is deemed necessary. However, be wary of attempts to foil the system with _unrealistic data (outside the specifications), which could prolong the test cycle without accomplishing anything really valuable. At this time the control center becomes a very critical part of systems test. Its role is increased to control flow of data between computer, test team, and installing or using representatives. 3. Obtain Sign-Offs - At the end of the final systems test phase, all installing locations or customers should be required to sign a document stating that the system does, or does not, operate according to specs and is, or is not, installable. Even though the system may not do everything that users now want it to do, it must be installed if possible. Otherwise desired modifications and changes could keep the system from being installed indefinitely. Desired modifications and changes. should be documented as possible updates to the system after its installation. If the sign off concludes that the system does not operate according to specs and cannot be installed, the problems should be documented in a written letter to the developing project manager with a copy to all responsible management, including the corporate president. An economic evaluation of the problems and possible solutions should be made, and either a redevelopment cycle scheduled or the system scrapped. Economic Justification The cost of a good systems test will vary from system to system, depending upon variables such as amount of test data necessary, manpower, etc. Actual dollar savings ,as a result of the systems test may be impossible to calculate accura tely. However, the savings resulting from a short installation time, elimination of bad decision-making data, elimination of down time and maintenance time after installation, etc., will certainly repay the cost many times. It is quite possible that without a good system test, some projects may incur installation problems and, be scrapped unnecessarily because of misunderstandings, lack of education, and a natural resistance to change. This results in a one hundred percent loss of the development cost and still leaves the corporation without the needed system. Summary To exploit the computer, corporations need to develop and install computer-oriented data processing systems. However, before installing a computer-oriented data processing system, the corporation must be reasonably certain it will work correctly. To do this, every system should be required to clear a final hurdle before installation - the systems test. If this hurdle is cleared successfully, then the system is declared sound and installable. If not, the system cannot be installed and must be either reworked or scrapped. Regardless of the results, the systems test has 0 worked toward the good of the corporation. COMPUTERS and AUTOMATION for September, 1970 . THE USER/MANUFACTURER INTERFACE David F. Stevens Lawrence Radiation Laboratory Bldg. 50A, Rm. 1135 Univ. of California Berkeley, Calif 94720 "The user must recognize that some change is inevitable; the manufacturer must realize that not all change is desirable. " The relationship between the manufacturer of a computing system and its users was, until recently, a reasonably well-defined, if somewhat nonproductive, affair. Unbundling, however, has introduced a measure of uncertainty into that relationship, and the resulting turbulence may provide us with an opportunity to redefine it (the relationship) in a manner profitable to both parties. The purpose of this article is to examine the current state of this uneasy alliance and to suggest how it can be improved. A Parable That a certain amount of friction has always existed between manufacturer and user is clear from the following story told about the first installation of a large scale system. Since it was, in fact, the first system, it was quite simple. The manufacturer was rather tractable by today's standards: there was only one portion of the system he insisted that the users not diddle - a particularly critical tree structure. But this, of course, was too much for one of the more subtle graduate students, and he convinced the junior systems programmer (there were only two: it was a small installation) that a small change would surely not be disastrous. The manufacturer discovered the change and closed down the installation, driving out the programmers; also, being rather old-fashioned, he laid a curse on the graduate student: " ... dust shalt thou eat all the days of thy life" .... Now this was perhaps over-reaction on the part of the manufacturer, but his attitude is illustrative of current attitudes, and users' behaviour certainly hasn't changed at all. One result of the long cold-war which manufacturer and user have continued to wage against each other has been a self-reinforcing hardening of attitudes, in which each side has created an uncomplimentary stereotyped image of the other and then, to a certain extent, adopted, as a model for its own behaviour, the stereotype created by the other side. Our examination of the current state of the interface begins with a consideration of these stereotypes. COMPUTERS and AUTOMATION for September, 1970 The Manufacturer as Seen by the User The manufacturer, as seen by the user, is possessive: the system is his product, and his pride of creation is inordinate. Because it is his creation, he refuses to recognize its shortcomings or failures. Discrepancies between specifications and product are often eliminated by changing the specifications (the product, being created perfect, is beyond change). Also, during those sensitive formative months when the product is developing, it is jealously screened from all contact with the world, lest reality should accidentally shape that development. Requests by prospective users for any level of detailed information are promptly and firmly denied. To the user, the manufacturer is myopic: his vision is limited not only in distance, but also in direction ( he has tunnel vision). He fails not only to foresee the users' future needs, but also to foresee the uses to which they will put his current products. "The user feels that the small additions which the manufacturer does adopt from him are often accepted in the same spirit of amused toleration with which one accepts a mud pie from a four-yearald." The manufacturer is also condescending: he knows that lie has nothing to learn about computing from the user, and that therefore he is able to create, in a communications vacuum, products of universal utility. What small expertise the user has he acquired from the manufacturer, and it is several years out of date. The user can create nothing of his own, worthy of notice by the manufacturer, and those small additions which the manufacturer does adopt are often accepted in the same spirit of amused toleration with which one accepts a mud pie from a four-year-old .... One especially notices that the toleration becomes ever more strained with each succeeding offering. 25 To the user, the manufacturer is overconfident: he overestimates the performance of his products and he underestimates the time it will take him to deliver them. (There are some users who would state this particular case more strongly; they see the manufacturer as misleading: he overstates the performance of his products and he understates the time it will take him to deliver th((m. The difference is one of intent. I take the more optimistic view here because if the other is, in fact, the true state of affairs, then there is little hope that any measure of cooperation between user and manufacturer can ever be achieved.) He assumes that they will work as advertised. He assumes that he has solved the problems of the world, and that his products will need little correction, less modification, and no extension. Finally, the manufacturer, to the user, is a radical: he subscribes to the Detroit philosophy of planned obsolescence, change for the sake of change. Good programmers are creative people, and he must allow his programmers to express themselves. (That this frequently imposes a distasteful burden upon the users' programmers is unfortunate, of course, but it can't be helped.) Furthermore, it is in his interest to keep the users somewhat off-balance and hence somewhat dependent upon him. The User as Seen by the Manufacturer The user, as seen by the manufacturer, is possessive: the system is his by purchase or lease; possession is nine points of the law. He is unwilling to relinquish one memory cell,'· one storage cycle, no matter how great the benefit. It must be made to work in accordance with his conception of how a system should work regardless of whether his concepts were designed into it or not. Since the system is his, its past and its future must be his also; his curiosity about these matters is insatiable. To the manufacturer, the user is visionary: his estimates of the cost (to the manufacturer) of a "minor" change in direction are unrealistically low; his estimates of the benefits to mankind of the implementation of his pet project are unrealistically high. He ignores side effects. "To the manufacturer, the user's estz"mate of the cost of a "minor" change in direction are unrealistz"cally low; and his estimates of the benef£ts to mankind of the implementation of his pet project are unrealistically high. " in his efforts to secure the realization of his inferences. He is no less skillful in the creation of iron-clad contractual commitments out of preliminary, tentative, incomplete, and inaccurate data. Finally, the manufacturer sees the user as an archconservative: he resists progress at every level if it involves change. ("The old ways are the good ways.") Technological improvements are complications to be mistrusted: old, familiar, trusted tools are not to be abandoned, no matter how much more potent their replacements are. The game is never worth the candle. Who Is Which? It should be emphasized that these stereotypes have broad applicability: the term "manufacturer" is not limited to "hardware manufacturer" any more than the term "user" is limited to "occasional Fortran or Basic user". In fact, most people involved with computing alternate between these roles, sometimes with bewildering rapidity in the course of a single conversation. The lines are most firmly drawn, however, and the stereotypes most firmly entrenched, at two levels (both of which exist in almost every shop): the interface between the outside vendor and the systems programmers, and the interface between the systems and applications programmers. One result of this situation might be that systems programmers, having a foot in each camp, serve as conciliatory agents. They might, when dealing with the outside vendor, remember that they, too, have delivered late; that their own products have been released with live bugs; that their own documentation has been incomprehensible or non-existent. Remembering these things, they might react with sympathy and understanding. They might, when dealing with the applications programmers, remember that they, too, have resisted change; that their own programs have failed to run on new releases; that the documentation they have received has been incomprehensible or non-existent. Remembering these things, they might react with sympathy and understanding. But of course they do not. They remember, certainly, but instead of acting as fIlters they act as amplifiers. The abuse hurled at them by the applications programmers is hurled with increased vigor at the vendor; the scorn heaped upon them by the vendor is heaped even higher upon the applications programmers. The process is iterative and with each iteration the stereotypes become ever more firmly entrenched and reality approximates the stereotypes ever more closely. Changing the Image The user is also selfimportant: his problems are the most important problems in the world, and should be solved first; his solutions are the most promising, and should be tried first. Whatever is in his interest is in the interest of the whole universe of computing. Features he does not use are barnacles on the ship of progress. His is the one clear voice of truth amid the constant tumult and the shouting. The user, to the manufacturer, is implacable: he is unforgiving, vindictive, and possessed of a very long memory. The slightest delay is intolerable, the tiniest imperfection is inexcusable, the least hint of change in specifications is totally unacceptable. The user is an expert in the creative interpretation of reference documentation, and unrelenting 26 It is clear from the above that the relationship between user and manufacturer has become a combative one highly ritualized, it is true, but combative nonetheless. It will continue to be combative until the pejorative stereotypes have been replaced by more cooperative models, for the user as well as for the manufacturer. The substitution need not be instantaneous, but it must be undertaken by "The relationship between user and manufacturer has become a combative one - highly ritualized, it is true, but combative nonetheless. " COMPUTERS and AUTOMATION for September, 1970 both parties or it will be ineffective, incomplete, and quite temporary. The models suggested below may not be optimum, but they are steps in the right direction. The attitude a manufacturer adopts towards his creations should be somewhat akin to parental pride, remembering that good parents recognize and treat illness and injury. Good parents foster the development of their children (and much development takes place outside the home), and recognize that they have limitations beyond which they should not be pushed. The users, on the other hand, should recognize that children are often recalcitrant, and usually require some training before they are capable of behaving properly away from home. Standards of Communication User and manufacturer need to adopt standards of communication not involving ritual attack and defense. The manufacturer should seek the users' advice before he fixes the specifications of a new product; he should recognize that users have a legitimate need for advance information. Users should remember that advance information is often inaccurate or misleading, and should accept that risk when they accept the information. Dialogue concerning bugs should be undertaken with the object of improving the product, not as exercises in invective (by the user) or skillful evasion of responsibility (by the manufacturer). Both manufacturer and user need to broaden their perspectives: The manufacturer needs to recognize that the users harbor a wealth of experience and expertise which could be tapped, if the manufacturer would make the effort. The users need to recognize that the manufacturer must be responsive to other users with other priorities. Both user and manufacturer should try to look at things from the other point of view before criticizing. Progress Exacts Its Toll Finally, user and manufacturer should work together to define and regulate the development of the product. The user should recognize that improvement is rarely achieved without some sacrifice, that progress exacts its toll. The manufacturer should recognize that change must be justified, and that his estimate of the cost of the change should include the cost incurred by the users in adopting it. Th~ user must recognize that some growth (change) is inevita~ bIe; the manufacturer must realize that not all progress (change) is desirable. User and manufacturer should agree upon which changes should be provided by the manufacturer and which should be left to the user. The manufacturer must expect the user to make some changes; those areas where changes are likely should be designed to simplify their installation. The user who makes such changes must be willing to accept the non-conformity he has thus created. In brief, both the user and the manufacturer need to grow .up a little. The present struggle is fun, but it is childish. There is much loose talk about the coming-of-age of the computer (which is a far different thing from the coming age-of-the-computer): The computer cannot achieve maturity until those who direct it do. 0 PROBLEM CORNER Walter Penney, CDP Problem Editor Computers and Automation PROBLEM 709: SQUARES ~ OR SOMETHING Harry was beaming as he punched the keys of his trusty desk calculator. "I'll have to publish this," he said, "I've never seen it in any mathematics book." "What's that?", asked John, "Did you prove Fermaes Last Theorem or something?" "Something, all right. I've been calculating factorials and subtracting each one from the next larger square. And what do you know - every difference is a square. At least for N greater than three." "Are you sure that isn't just coincidence?" "Coincidence? I'm up to 10 ! and everything's working out right. 10 ! is 3,628,800; subtract that from 3,629,025 which is 1905 2 and you get 225 which is 15 2 • Likewise 9 ! is 362,880; subtract that from 603 2 . and you get 729 or 27 2 • And so on down the line." "Yes, you've got something there, all right, but I'm not sure what." . "All right," said Harry. "I'll work out one more case on this cement mixer, and if it's. O.K., I'll write a program for the first 100 factorials. Here goes 11 !" "I'm still skeptical," said John. Has Harry stumbled onto something big? Solution to Problem 708: A Coin Tossing Program The average number of tosses for H H H is 14 and for H THis 10. The number of ways of getting H H H on the third, fourth, ... toss is 1, 1, 2, 4, 7, 13, ... where each value is the sum of the three preceding. For H T H the corresponding figures are 1,2,3,5,9,16 ... where un ::: 2U n -l ~ un~2 + un 3· w Readers are invited to submit prOblems (and their solutions) jor publication in this column to: Problem Editor, Computers and Automation, 815 Washington St., Newtonville. Mass. 02160. Research for this article was done under the auspices of the U.S. Atomic Energy Commission. COMPUTERS and AUTOMATION for September, 1970 27 THE "LANGUAGE EXPERIENCE" APPROACH IN TEACHING READING - COMPUTERIZED Mrs. Florine L. Way P.O. Box 499 Monticello, Fla. 32344 "Both the content and the language of each pupil's reading lessons need to be relevant to his own life experience and understanding. " Learning to read can be inhibited by the use of material that is irrelevant, too difficult, or just plain boring. A pupil's self-image can reach rock-bottom when he fails to learn to read - and when he can't learn without someone beside him helping him with every word. But where are there enough teachers - or even enough dedicated volunteer tutors - to sit beside each pupil who can't read and help him in a one-to-one relationship? There is no single, simple answer to the problem of teaching. everybody to read. relevant content with which to learn the skills of reading. Regardless of the difficulty of the words and concepts he uses, he can already recognize them aurally, understand them, and use them orally, before he dictates them. Once I had to keep a dictionary beside me to spell the technical words that a seventh-grade non-reader used, when he dictated his own experience stories for me to type to create his reading lessons. Real and vicarious experiences can be arranged for the pupils, 'so that their vocabulary and conceptual understanding can be internalized, before dictating their lessons. What is "Language Experience" Reading? Disadvan tages One of the most promising practices for teaching beginning and remedial reading was introduced in the early 1900's by a teacher named Miss Flora Cooke. She used the pupils' own language to create the content of the reading lessons. This way of teaching reading has earned a respected place in education. It has been used to teach: beginning readers, retarded readers, and adult illiterates. It has been used to teach Persian peasants, prison inmates, Maori children in New Zealand, delinquents who were nonreaders, children with limited backgrounds. The most common name by which this method is known is the "Language Experience" approach. In the Language Experience approach, the teacher literally brings together the pupil and his environment to create his reading lessons. The disadvantages of using the Language Experience approach are also clear. Teachers already have too much to do, especially teachers of beginning readers, retarded readers, and adult illiterates. How can they take on the added task of typing or writing for each pupil his own dictated Advantages. The advantages of using each pupil's own language are clear. Regardless of his age, sex, race, social status, or cultural background, each pupil in a classroom can have Mrs. Florine' L. Way is one of the two prizewinners in the Second Annual Martin Luther King Memorial Prize Contest sponsored by Computers and Automation. (See announcement in Aug. issue, page 9.) Mrs. Way has been a classroom teacher for twenty-nine years. She has an A.B. from the Univ. of Miami, and an M.S. from Florida State Univ. 28' "How can the teacher take on the added task of typing or writing for each pupil his own dictated lessons every day? lessons every day? How can they make time to sit beside each pupil until he attains the sound-sight relationship between what he has dictated and what is on the page? How can the teacher have time to make a test for each pupil on his separate lessons to see how well he is learning? What kind of reporting can be done when each pupil dicates . different lessons about different experiences? The teacher needs to have the time to use her humanness and her expertnes') to motivate pupils, to interact with them, to create the environment in which they can learn. In an effort to solve some of the problems that are involved in making the Language Experience approach practical to use in a classroom setting, a small grant from the Florida State University Research Council was obtained, and I conducted an evaluation pilot study at the COMPUTERS and AUTOMATION for September, 1970 Federal Correctional Institution in Tallahassee, Florida, in 1965. This pilot study was successful. The results and the responses of the illiterate inmate pupils (e.g., "Man, you got to do something to get this way of teaching reading so everybody that needs it can use it") indicated that the work should be continued. An Experimental Class o An experimental class at the Institute followed the pilot study. During that time, it was found that technology could be used to perform many of the chores for making the Language Experience approach practical to use in a classroom. From experience as a classroom teacher and from the reactions of the illiterate prison-inmate pupils, I designed and wrote the specifications for a project called DOVACK (Differential, Oral, Visual, Aural, Computerized, Kinesthetic). The Florida State University Computing Center whose director is Dr. E. P. Miles, Jr., developed computer support for this project. In the DOVACK project of implementing the Language Experience approach with a computer, the essential attributes are: (1) to give each pupil a chance to dictate his own reading lessons to be processed by the computer for independent study with his dictaphone; (2) to give each pupil a chance to use multi-sensory techniques in his independent study; (3) to give each pupil a chance to be tested on his own vocabulary; and (4) to provide the teacher with evaluations and reports at regular intervals to be used in finding, and planning for, the needs of each pupil. It was necessary to obtain federal funds in order to field-test and perfect the project. ESEA Title III granted the necessary financial support to the Jefferson County School Board, for me to direct a DOVACK project for three years (1968 to 1971) in Monticello, Florida. The following is a brief description of the project in Monticello. There are two classrooms, two black teachers and four black aides. This year, they serve one hundred pupils a day. (A larger pupil-to-aide and to-teacher ratio is possible under different circumstances. Presently there are many visitors, many other demands on staff time, requirements for field-testing teaching strategies and techniques, etc.) At present, all of the pupils are black. The classes range in size from four beginning readers in kindergarten to fifteen severely retarded readers in the sixth grade. Other classes are for pupils from the first, second, fourth, and fifth grades. It is anticipated that this fall the minimum class size will be thirteen, and that a larger total number of pupils will be served, although the staff will remain the same. Technological Support In this project, technology supports learning, but does not intrude. There is a dictating· machine on each desk, which is used by approximately four pupils at different periods during the day. Teacher aides use these machines for transcribing the dictations of pupils, and the teacher uses them for voice-taping the models of their lessons. Sound-resistant material protects the classrooms from noise. Aides punch cards on key punches to submit to the computer, or use a Teletype for direct communication with the computer at the Florida State University Computing COMPUTERS and AUTOMATION for September, 1970 Center, which is about thirty miles from the project center. The aides have learned on the job how to operate the machines and use the necessary precision in their records. The Teacher It is not necessary for the teacher to understand computer programming or the technical aspects of the project. In order to use a computerized Language Experience method of teaching successfully, the teacher's attitudes, teaching philosophy, and strategies for creating the learning environment, are crucial - just as they are in all teaching. "It is not necessary for a teacher to understand computer programming in order to successfully use a computerized Language Experience method of teaching. " The teacher helps the pupils expand their experiences and broaden their understanding, so that they can internalize their expanded vocabulary and concepts. The teacher supplements the pupils' real experiences with vicarious experiences by reading to them, shQwing films and film strips, etc. All of the techniques and strategies that are used with other Language Experience teaching can be used effectively when the method is computerized. The project capitalizes on the experience, folk humor, and prior comprehension of each pupil. When each pupil dictates his own lessons from his own experience and understanding onto the dictating machine, he uses the language patterns to which he is accustomed to speak, listen, and understand. Both the content and the language of each pupil's reading lessons need to be relevant to his own life experience and understanding, so that each pupil's own self-image and self-confidence are raised by assuring him of positive support for the way in which he communicates with his family and his peers. In addition to the strategies and techniques ordinarily used in the Language Experience approach to teaching reading, there are strategies and techniques peculiar to DOVACK which enable the teacher, supported by technology, to fit to the individual three essential elements or phases: teaching, testing, and reporting. [The documentation for computer support for these three phases, which comprise the DOVACK FORTRAN (and COMPASS) package, is available on request.] Objectives Inherent in all of the educational objectives for this project is the goal of enhancing each pupil's own self-image. The teacher, supported by technological help, works with each pupil to help him achieve the following objectives: - develop skill in manipulating his own equipment and materials; - become independent and self-pacing in his study habits; develop favorable attitudes toward reading; and develop proficiency in word recognition, word attack skills, and general reading achievement. 29 Agenda Each pupil has an Agenda on which various items are listed. He chooses the several activities that he is going to engage in the following day. Then he numbers them on his Agenda in the order in which he plans to do them. Each day, when he comes into the room, he gets his box containing his materials and proceeds independently to follow his Agenda for that day. After he completes a task, he records the time beside it. The Agenda includes such items as: Dictate a story. Read my story to the class. Study WORD ATTACKER, which is a simple device for teaching the sound-sight relationships between the names and sounds of the letters and the consonant blends.) enunciation and standard pronunciation. The pupil keeps it in his box so he can use it for review any time he needs it. As he listens, he follows the text with his eyes. He listens as many times as he feels is necessary and then studies his word list. Then he puts aside his earphones and studies without earphones. When he studies his word list, if he does not know a word, he looks at the number beside the word which shows the line on which it first appears; he goes back and reads that sentence again and recognizes the word in context. With the WORD ATTACKER and other phonics devices, the pupils are taught various other skills that they can use in attacking unrecognized words. Finally, when the pupil finishes studying yesterday's story, he proceeds to the next item on his Agenda. Procedure For example, let's observe a boy in a class, during the week of Martin Luther King's birthday. The teacher has read stories to the pupils about Dr. King and has shown them film strips and pictures. They have discussed his life. Then each pupil dictates into the microphone of his dictating machine what he understands from the lessons. Here is the last part of the dictation of one boy in the fifth grade, severely retarded in reading: . . . He was a good man. They had to walk fifty miles; Boy, they must have been tired. When one had to use the bathroom, they just waved their hand and a truck come along. There was some colored people and some white people walking .... He was a leader of the Negro. He liked to be good to others. He just wanted them to be good to him. All he wanted was peace and white persons and colored to go together. He was a good man. He wanted peace. That is the end of my story. . The pupil finishes dictating his story, removes his dictating record, and takes it to the basket for the aide. The aide transcribes the story on punch cards. The aide spells the words correctly as she transcribes, but she does not change the language usage, nor the grammatical structure of the pupil's dictation. This transcription is included with others, to be submitted to the computer each day for batch , processing. When the pupil returns to his desk, he proceeds to the next item on his Agenda. This might be: study his yesterday's story; join a peer for a mutual sharing of stories; etc. Self-Teaching The next day, this pupil receives the story he dictated the day before, prepared by the computer for his independent study with his dictating machine. Each line of his text is numbered. Each new word in the story is alphabetized with a number beside it showing the line on which the word first appears in the text of the story. He puts on his earphones and listens to the verbatim voice tape the teacher has made of his story. This voice-taping by the teacher of each story for each_pupil serves as a model for clear "Each day, a pupil receives the story he dictated the day before" prepared by the compu.ter for his independent study with a dictating machine. " 30 Testing Every six days this pupil, along with the other pupils in each class, receives a Random Sample Vocabulary Recognition (RSVR) Test. The words in his latest story are compared by the computer with all the words in his stored word bank; all new words in his story are added to the bank. At the time for each RSVR Test, the computer generates a random number and derives each pupil's test from his own stored list of new words that he has used in his dictations for that six-day period. The computer uses a sample size designed to yield a standard deviation equal to 5 per cent of the estimate. Each pupil administers his test to himself at his dictating machine. This is a test of word recognition only. He says the number beside the word (the words are numbered by the computer) and then pronounces the word. Then he takes the dictated record to the test basket. At the same time the computer prints out all of the tests, it punches a card for each pupil with a record of his work for that six-day period. After checking, the tests, the aide completes the record on each pupil's card. The completed deck is returned to the computer for calculating and compiling reports., Reports After each six-day RSVR Test, reports. are printed out. The estimated number of new words learned, and the estimated rate of new words. learned per class period present, are based on results. of the Te,st. There is a ten-item pupil progress. report for each pupil and a summary report of these ten items for each class. Three dig,!ts of each pupiPs identification' number are used to plot his position on the graphs., One histogram shows for each pupil the total number of new words. dictated during that six-day cycle; another shows the: estimated number of new words learned during that cycle. One coordinate, graph shows a plot of type-token ratios against RSVR Test scores. for each pupil in each grade. (The type-token ratio is the ratio of the: number of new words used to the total number of words used.) Another coordinate graph shows for each pupil in each grade a plot of the percentage, of new words learned against the number of new words dictated. For the latter coordinate graph, to supplement the teacher's judgment" a transparent overlay is furnished . The midpoint of the overlay is placed over the computer-located coordinate point of the medians. In each quadrant, a paragraph on the overlay suggests the kind of help that the pupils who fall in that quadrant need. COMPUTERS and AUTOMATION for September, 1970 o Where there's magnetic tape you usually find this. . Reason: MS-200 Magnetic Tape Head Cleaner is recommended by leading manufacturers, prescribed by a major TV network and has proved itself at hundreds of broadcast and computer installations. MS-200 is the safe, thorough, convenient way to get rid of oxide dust. You can even apply it while tape is running. Price: $2.90/ can in cartons of 12 16-oz. cans. Trial order: 4 cans @ $3.75/can. Price~ f.o.b; Los A~geles, Chicago or Danbury, Conn. @ U.S. and foreign patents pending. miller.stephenson chemical co.,lnc. ROUTE 7, DANBURY, CONNECTICUT 06810 Alternate Forms of Communication Following the Reports The teacher and the aides write composite stories for each pupil, using his own vocabulary. These composite stories serve several purposes. They give each pupil a chance to recognize his own vocabulary in a different context. They give him a story to read about himself, and, since they are frequently shared, about his peers. In the composite stories, there is a subtle introduction to standard usage, but the content is still based on each pupil's own vocabulary. During the class periods following the reports, the teacher attempts to meet the needs of the individual pupils as indicated in the reports. Some pupils need to extend their experiences, expand their speaking vocabularies, and use a greater number of new words in their dictations. Some need to work more on using the Language Experience technique for finding and recognizing words in context. Others need to interact more with peers and to exchange . stories with them_ Criteria of Success "Here" is one kindergartener's own story: 'The rooster is to the mama hen. The house is made of wood. The one what drinking water is the sister and the one what ain't is the brother. The hen is looking at the rooster . .. ' " The pupils understand that both ways of communicating are good - the non-standard and the standard. (For example, here is one exuberant kindergartener's own story: "The rooster is to the mama hen. The house is made of wood. The one what drinking water is the sister and the one what ain't is the brother. The hen is looking at the rooster .... ") COMPUTERS and AUTOMATION for September, 1970 Three criteria are being used to judge the success of the field-tests of the project: (1) adaptability to the populations for whom it was deSigned; (2) effectiveness in meeting the specified learning objectives; and (3) economic feasibility. Hard data are being collected for one part of the evaluation. A formal report will be made on this phase of the evaluation when the data are analyzed. Especially interesting should be the analysis of the correlation between each pupil's own rate of learning his own vocabulary and his standardized test scores in mental maturity and in reading achievement. A teleprocessing version of the DOVACK Model is being field-tested this year, ·using paper tape for input and output via telephone line. It is hoped that eventually it can be used on a shared-time, shared-cost basis. D 31 REPORT FROM GREAT BRITAIN While the common carriers in America are under heavy pressure from computer users and manufacturers to provide satisfactory solutions to the network problem, there are signs in Britain that things are on the move. Several significant events in the past month add up to the conclusion that a decision may be forthcoming soon on the form which a UK network (possibly connected to the European continent) could take. The Network of the Post Office Corp. On the side of the monopoly, the Post Office Corporation, a 48 kilobit transmission link has been set up connecting London with Birmingham, and has functioned since July 1 as the fastest data service in Europe. Its main function for the moment is to enable users to familiarize themselves with problems of using such a rapid means of transferring data in bulk. Equally important, if the service is to be a commercial success, is for manufacturers of terminal equipment to use the new switched network to develop 48 K units compatible with Post Office installations - very little standard interface equipment in this group has so far been built. . Almost simultaneously with the 48 K switched network announcement, the Post Office disclosed that the number of terminals in the UK is now 14,000, and is doubling each year. This suggests much higher installation figures than the conservative 50,000 by 1973 and 1/2 million by 1983 that the monopoly common carrier is using for planning purposes. The National Physical Laboratory's Facilities While all this was going on, the "ginger group" at the National Physical Laboratory threw open its doors to the computer press to show what it had achieved in the construction and operation of a digital network. It is providing flexible communications between all parts of the very extensive laboratory, with a spur to the NPL's ship test facili ties. I call it a ginger group because for several years it ·has been prodding the elephantine Post Office in the path it should tread to provide a satisfactory network according to NPL's lights. This would be based on a trunk system with high-speed digital characteristics having small control computers at its nodes. These would function as the nerve centres to which local computers would connect, serving either groups of peripherals or subscribers' own computers. Nodal design would give a response time of ten milliseconds between the five furthest points in Britain. Information is broken up into "packets" of 1,024 bits and the message switching computers at the nodes would have capacity to handle 2,000 of these packets a second. The NPL network now in use applies these principles which have already been adopted by at least one American organization - and has a small computer to which all 32 peripheral equipment connects directly (or through multiplexers if the units are slow in operation). The "node" computer switches packets of information to give intercom· munication between any of the laboratory's devices. These can be simple printers, displays, experiments, and laboratory computers. There will also be a large computercontrolled magnetic file available to all users. The main objective in establishing the design has been to set up a system which will cope with any sudden demands for extra services and which is independent of any particular technology. The Plessey Terminal· A significant feature is the use of a data terminal built by Plessey Telecommunications Research. It operates at 1.152 bits/second or fast enough to transmit all Shakespeare's plays in under two minutes. Plessey has also been the recipient of an important slice of repayable government aid - $10 million to be precise - to which it will add a similar sum. The whole is being applied to the construction of a stored-program control system for electronic telephone exchanges. Traditionalists vs. Innovators This development program, aimed at the second half of the decade, should go a long way to solving the increasingly serious problems of telephone communications in Britain. But will it help in the development of a full-scale switched data network? Many observers think not. This is because there appears to be a fight between the traditionalist telephone engineers and the innovators who believe their biggest customer in the second half of the decade will be the computer. The stored program controller is about as far as the traditionalist will go. Any mention of' a separate data system sets off an immediate panic reaction. This is because - as in America - there is an immense amount of money sunk in local connecu"ons from subscribers to exchanges. In Britain the estimate is for about $1 billion worth of equipment which, the Post Office says, cannot be discarded and must work out its useful life. Nevertheless, we are seeing the emergence of the first, fast, dedicated system linking three major cities now. And, who knows, perhaps it will link all major centres in five years from now. Ted Schoeters Stanmore, Middlesex England COMPUTERS and AUTOMATION for September, 1970 ) liThe House is on Fire" - THE PROFESSION OF INFORMATION ENGINEER Computers and Automation believes that the profession of information engineer includes not only competcm;e in handling information using computers and other means, but also a broad responsibility, in a professional and engineering sense, for: Accordingly, this department of Computers and Automa· tion will publish from time to time articles and other information related to socially useful input and output of data systems in a broad sense. To this end we shall seek to publish here what is unsettling, disturbing, critical - but productive of thought and an improved and safer "house" for all humanity, an earth in which our children and later generations may have a future, instead of facing extinction. The professional information engineer needs to relate his engineering to the most important and most serious problems in the world today: war, nuclear weapons, pollution. the population explosion, and many more. -- The reliability and social significance of pertinent input data; - The social value of the output results. In the same way, a bridge engineer takes a professional responsibility for the reliability and significance of the data he uses, and the safety and efficiency of the bridge he builds. for human beings to risk their lives on. OUR TOP PRIORITY William B. Johnson President and Chairman of the Board IC Industries, Inc. 135 E. 11 th Place Chicago, Ill. 60605 "The blunt truth is that there could be ample warning of almost every emergency and agonizing dilemma before it hits us between the eyes provided we organize to generate the forecasts." Propriety impels me to warn the sqeamish that they are about to see a man walk, quite deliberately, into a vast field of quicksand. I propose to speak of an area where a fellow must be fast on his feet and keep in constant motion to avoid sinking into the morass without a trace. I'm not sure I can avoid that fate, but in my view someone should give it a try. My proposition simply is that an effort must be made to set up on firm ground a system of national priorities for attaining essential, long-range social and economic objectives. Presently, we are lurching erratically from one crisis to the next. We react frantically to current public expressions, which are as volatile as quicksand and involve hidden pitfalls that are just as treacherous. Public opinion is, of course, the decisive voice that influences national policy. Unfortunately, much of the public is often poorly informed and their views are too frequently shaped by emotional forces that distort the rational judgment essential for reaching sound decisions. Further, public attitudes are often conflicting and they change continually, sometimes capriciously. In the absence of priorities, stopgap solutions to problems of current public concern are contrived hurriedly even though the problems should have been anticipated a decade earlier and resolved primarily by logical analysis. This article is based on an address which Mr. Johnson delivered to the Town Hall of California, an organization of 6000 businessmen, in Los Angeles on June 2, 1970. COMPUTERS and AUTOMATION for September, 1970 To underscore the constant shifts in public opinion, let me take you back two short years. At this time in 1968, the Presidential primary campaigns were.reaching a climax here in California. The most controversial issues then were the war in Vietnam, racial conflicts and urban deterioration. The Priorities: Political and Social ~ What are the major political and social issues today? I think you'l1 agree that they are inflation, the war, environmental pollution and the rising incidences of crime and narcotics addiction. None of the difficult problems that commanded the public's attention in 1_968 has been resolved. The problems are just as urgent now as they were two years ago, but with the exception of the war, the nation's demands for decisive action are focused on an entirely new set of priorities. There generally is substantial agreement among architects of our society - economists, sociologists, ecologists, scientists and politicians - on' what should be done to improve the quality of life and promote the nation's welfare. But there invariably is chaos when it comes to deciding which problem should now receive the main thrust of our resources and our coordinated planning and implementation. The normal political reaction is to downgrade the priority issue, to please as many as possible by doing a little bit of everything. The inevitable result, of course, is that nothing is done properly. The band-aids we slap on unsightly sores do not remedy the source of spreading infection. 33 What I'm proposing is practiced by every business executive as a matter of necessity. The component parts of a business enterprise are not different from the various departments of government. The requests for capital expenditures always exceed the money a company can afford, even in boom times. Even when every request can be justified, some projects must be deferred and others abandoned because more urgent plans take precedence in timing or importance. There are many fancy definitions of decision-making, but they mostly boil down to one key element - the art of choosing priorities. Benefits of Evaluating Priorities The country will derive three immediate benefits if public priorities -are evaluated in perspective, by a rational and orderly process. First, problems will be analyzed and approached objectively instead of by quick response to a series of heated emotional emanations. All of us are acutely aware that· shrill propaganda by special pleaders now exerts undue influence on national policy. The squeaky wheel gets the most grease. Congress must at least be exposed to expert analysis, free of political pressures, or there will be no judiciOUS allocation of public funds and public effort. The second benefit is that priorities will help restore a sense of balance and continuity to the federal government. !n a less tur~ulent era, the interrelationship of important Issues was more visible and pointed the way to national goals. Although the thorny issues have increased greatly, they can - and must - be integrated into an overall pattern. That can be done only by weighing alternatives and sticking to the judgments reached. But we are continuing to fling ourselves onto white horses and charge off madly in all directions, pursuing multiple, inconsistent alternatives. We need the benefit of choice~ "A broad-gauged ordering of federal programs will expose an incredible mishmash of bureaucrats who are impeding progress to current goals, by maneuvering to preserve little empires set up to achieve objectives that have become obsolete. " The third benefit brought by a system of priorities will be reflected immediately in the budget. A broad-gauged ordering of federal programs will expose an incredible mishmash of bureaucrats who are impeding progress to current goals by maneuvering to preserve little empires set up to achieve objectives that have become obsolete. Those of us with corporate experience know how insidiously these empires spring up and hang on. We clean them out periodically - although not often enough - but in Washington they keep on growing with every new administration. A Remedy: Known but Unused Twenty-one years ago a commission headed by former President Herbert Hoover submitted a landmark report on the reorganization of the federal government. Its Number 34 One recommendation was the elimination of two-thirds of the agencies reporting to the President. Since then, there has been such a vast proliferation of agencies and commissions and task forces that it's safe to say 75 percent of them can be dropped with a corresponding increase in efficiency - and no loss in terms of achieving "what the world needs now." A typical example of confusion and cross-purpose in Washington is the current study of weather modification. The Department of the Interior looks at it from the standpoint of increasing rainfall. The Department of Agriculture is interested mainly in reducing crop losses. The Federal Aviation Administration is pushing for measures to combat fog. None of the three agencies is concerned primarily, or even significantly, with total systems effects or possible side effects. Sometimes it seems that painful experience has taught us nothing. Just last month a Presidential study group submitted a report to the White House identifying continuing leadership in science and technology as a vital national goal. I quote from the report: "Our national progress will become even more critically dependent upon the excellence of our science and technology. A vigorous, high-quality program aimed at advancing our scientific and technological capabilities - including the social, economic and behavioral components - is vital to all national goals and purposes." Here we go again. The study group threw practically everything into the pot. It is foolhardy, and terribly wasteful, to blaze away indiscriminately with a battery of howitzers instead of appointing a squad of expert riflemen to aim at the most imperative targets. The crux of the s~ory, as reported by The New York Times, came in the closing paragraphs. The study group, tacitly conceding that maybe we cannot dominate the entire scientific spectrum, recommended that the Office of Science and Technology, which is headed by the President's chief science adviser, be designated to establish priorities in the field. It is rather typical that the one realistic note was added as an afterthought. Underaction and Overreaction Look at our overreaction to environmental pollution, which suddenly has assumed the gravity of a full-scale national emergency. Please believe I am not trying to dismiss the problem, nor am I implying that we have been sold an unduly alarming bill of goods. But I do know that we have been bombarded with many wildly conflicting predictions and a great deal of emotionalism and frenzy. As a concerned citizen and businessman, I would like to know whether the dangers of pollution have a more serious physical and psychological impact on American life than the housing shortage, which has been plaguing us for a generation. Before we embark on a giant crash program to stamp out pollution, at any cost, I'd like to know something more about that cost. For example, will a convulsive effort to correct our abuses against nature delay - or derail - the drive to correct other historic abuses perpetrated against our fellowmen. The social climate also is a vital part of our environment. I don't mean to belabor the pollution issue, but it is a conspicuous example of the tendency of government on federal, state and local levels to react too late, and then too violently, to questions that were swept under the rug years COMPUTERS and AUTOMATION for September, 1970 ago. Industry suddenly has become the arch-villain in the agitation against pollution. The crusaders blithely ignore the fact that there has been a drastic and sudden change in the rules of the game. For more than a century, all that the public asked of technology was that it turn out a succession of cheap new products and services that made life a little easier and more convenient. o "Industry suddenly has b~come the arch-villain in the agitation against pollution. Yet for more than a century, all that the public asked of technology was that it turn out a succession of cheap new products and services that made hie a little easier and more convenient. " Since cheap, efficient consumer goods was the public's top priority, industry responded by raising the standard of living in America to unrivaled heights. Now, suddenly, critics are rejecting the benefits of mass production and are applying new criteria to the technology that makes it work. Industry Efforts to Curb Pollution Industry concedes that pollution must be curbed. Some 20 percent of the capital expenditures of steel companies is directed to environmental control, with a resultant drop in productivity per million dollars of investment. Detroit is pouring the equivalent of a fair-sized South American country's annual budget into research to reduce air pollution by automobiles. Manufacturers of bottles, cans and paper cartons are earmarking millions of dollars for the development of self-disintegrating containers. Airlines are experimenting with noise-abatement devices. A lot more will be done as soon as Washington sets up guidelines for questions that surely cannot be ducked indefinitely. But there are also the questions of who is to pay for environmental control and what it will cost the people. What is the top priority - a pollution-free environment or low cost products and services? Suppose the former makes the latter impossible - and surely we can't have it both ways. If Washington yields to popular pressures and makes industry, and thus the product users, absorb the burden of curbing pollution as a cost of doing business, we'll see an unknown degree of violence done to another facet of the environment - the daily cost of living. That may indeed be the best answer, but it should be done knowingly, if at all, and there should be no later surprise at the consequences. The Whipping Boys of Change The growth and stability of small businesses is a highly desirable element of the free enterprise system, but some of us have become aware that the campaign against pollution is beginning to take a heavy toll of small or marginal operations. In states where stringent pollution laws' have been adopted, many small foundries that cannot afford to COMPUTERS and AUTOMATION for September, 1970 comply with the regulations have shut down or are for sale at a sacrifice. It is a predictable cinch that similar difficulties will cause widespread havoc in other sectors of the economy. The Public Utilities What about public utilities? They have been made whipping boys for air and water pollution with complete disregard for the facts. Until a few years ago, regulatory agencies were slow to approve the use of cleaner fuel and the installation of purification equipment in public utility plants. Public Service Commissions, concerned mainly with holding down rates, generally withheld the necessary permission. A knock-down fight is brewing in Chicago, my hometown, over power rates. Chicago always generated its power by burning cheap coal from nearby Illinois mines, but this coal is relatively high in sulphur. In response to today's public agitation, and apparently without considering technological decontaminants, Chicago has simply outlawed the coal of its own state and now is bringing low-sulphur coal from Wyoming. It hardly is necessary to hold a degree from the Harvard School of Business to understand that rates must be increased to meet the cost of hauling more expensive coal halfway across the continent, but the utility's application for the rate increase is bitterly opposed by those whose agitation has contributed to its necessity. This is the public-be-damned attitude with a reverse twist. If the rate increase is not granted, the investors in the utility bonds and stocks will be thrown to the wolves for the benefit of pressure groups who demand higher-cost electricity at the old low rates. It has become a cliche to say that critical events erupt with bewildering rapidity in the pressure-cooker we call our world. It is comforting for our government officials - and businessmen - to take refuge in that bromide to excuse copping out on their responsibilities to take effective action when they are confronted by difficult decisions. The blunt truth is that there could be ample warning of almost every emergency and agonizing dilemma before it hits us between the eyes - provided we organize to generate the forecasts. The Auto: Boon or Bad? Nothing illustrates so clearly the fallacy of identifying national goals by emotion, without consideration of eventual consequences, as the evolution of the automobile. Although the motor vehicle has contributed heavily to the serious financial plight of the railroad industry, of which my business is a part, I must confess that it has had a more profound impact on our society than any invention of the twentieth century. It is impossible to envision the United States as it is today without automobiles and trucks. The majority of the population would be living in abject poverty in rural areas. Industry would be concentrated in huge, dreary complexes that would make the factory towns of Victorian England look like garden spots. The amenities of suburban life, leisure and cultural interests would be confined - as they always had been - to the very rich. Yes, the motor vehicle opened up alluring vistas of freedom, mobility and flexible freight transportation. Who could have foreseen that Henry 35 Ford's marvelous Model T would lead to poisoned air and congestion that is strangling our cities? Yet, innumerable gentlemen made precisely those forecasts when cars began to burgeon on the streets and road~ "There were fewer than 10 million motor vehicles registered in 1920, compared with more than 100 million today. But even then, traffic engineers were drawing up projections of monumental congestz"on in cities and intolerable driving conditions on highways. " of America after World War One. There were fewer than 10 million motor vehicles registered in 1920, compared with more than 100 million today. But even then, traffic engineers were drawing up projections of monumental congestion in cities and intolerable driving conditions on highways in the event that private cars supplanted public transit systems for commuting to work and engaging in social activities. 40 Years of Congestion So the federal government and states proceeded to pour tens of billions of dollars into highways that compounded congestion. Even back when I was going to college in the 1930's, it was, true that a boy on a bicycle could cross . midtown Manhattan faster than an automobile could. Traffic in downtown Boston, Chicago, Philadelphia and other' major cities was a worsening mess. It seemed to be obligatory for every comedian doing a radio or TV show from Hollywood to pull gags about the jams and accidents on the' freeways around Los Angeles - although I doubt that the conditions were a joke to people who had to endure them. Getting to work or going down to see a movie at night became an increasingly harrowing ordeal, and still the top priority in transportation was ignored. In the last 15 years, $200 billion of taxpayer funds have been spent on highways compared with $61 million on railroads, mostly since 1966 in the northeast corridor from Washington to Boston. In 1966, after 20 years of earnest petitions, the federal government finally created a Department of Transportation, but still there is no balanced transportation system or fund allocation to achieve one. Last year $16 billion were spent on highways and only $30 million on railroads. The shape of things to come was seen on last April 22, Earth Day. New York City banned all vehicles from a major traffic artery and closed Fifth Avenue for two hours at noon, turning it into a pedestrian mall. Inevitably, all private cars and trucks will ultimately be banned or heavily taxed during the day in the business sections of all cities, as vehicle registrations keep pace with the population increase. Alternatives - and Costs New York has a serviceable, although deteriorating, subway system that keeps the city viable.. But what will Los Angeles do when it becomes necessary to bar the private cars of workers, shoppers and visitors? Los Angeles is the 36 only city of its size in the Western world that does not have a single commuter railroad line. Its municipal transit system is reput~dly something less than adequate. What is Los Angeles planning to do when the freeways no longer are permitted to disgorge cars into business sections? Has serious consideration been given to constructive plans to cope with the situation? Deciding on the top priority in any broad area that affects the public interest involves something much more profound than comparing the costs of alternatives. It embraces a philosophy of government - and that is the crux of the transportation problem. "Deciding on the top priority in any broad area that affects the public interest involves something much more profound than comparing the costs of alternatives. " Permit me to pose a hypothetical situation that is not as . far-fetched as it may seem. President Nixon recently called for a crash program cutting emissions of pollutants by automobiles up to 93 percent by 1980, regardless of the cost or the effect on the performance of cars. In March, The Wall Street Journal carried a front-page story reporting that many top engineers in Detroit doubted that the internal combustion engine can be redesigned to meet those requirements. Other authorities declared that a cleaner engine will boost the price of cars by several hundred dollars, increase maintenance bills and add to operating costs by yielding from 10 to 16 percent less mileage on unleaded gasoline. Apparently, the President will soon propose a substantial tax on the more efficient leaded gasoline. An Example: Fuel Cells for Automobiles Now, as many of you know, scientists have been experimenting for more than 50 years with the fuel cell, a battery that runs on air by converting it into its chemical components. The fuel cell emits absolutely no pollutants and it is more than a visionary dream. It is the source of electrical power in the Apollo space vehicle and Allis-Chalmers Company has converted it to experimental use in tractors. There are two problems that have barred the adaptation of fuel cells for automobiles. First, the battery must be recharged frequently and there are no facilities to perform that service. That's not a serious obstacle; stations would spring up overnight if they were needed. The more imposing complication, however, is the weight and the cost or the fuel cell which now rule it out as a substitute for the internal combustion engine in cars. No one who is even vaguely familiar with the small miracles wrought by technology in this generation doubts for an instant that the fuel cell eventually will be reduced in weight and cost to make it practical for automobiles. You may recall that when computers were introduced 20 years ago, they had more than 1 ,000 vacuum tubes and were so expensive and bulky that their commercial applications were extremely limited. Today, computers contain no vacuum tubes and compact desk models are on the market. COMPUTERS and AUTOMATION for September, 1970 o Similar advances in the fuel cell unquestionably will be made. Let us assume, as an intellectual exercise, that General Motors is on the verge of the big breakthrough. Officials of the company meet with Congressional committees and tell them: "We can completely eliminate pollutants from cars in three years by spending $200 million on research and development of fuel cells. We can reduce pollutants 90 percent in five years by spending $200 million on redesigning internal combustion engines. We can't underwrite both programs. On which one do you want us to concentrate?" Effects on the Oil Industry Your impulse is to select the fuel cell. It will achieve better results faster. But hold on a minute. The giant oil industry has invested billions of dollars in equipment and installations in this country and abroad. Cutting its market in half will throw a monkey wrench into the nation's economy, perhaps touch off another recession. What about the millions of employees and stockholders of oil companies? Oil still will be vital to the nation's defense. Should the federal government subsidize the industry to ensure ample reserves, and what will the cost be? There are 222,200 gas stations in the United States. They support two million people, counting the families of owners and attendants. What happens to them and the operators' investments, as business dwindles with the gradual disappearance of gasoline-powered vehicles? Incidentally, the 100 million cars and trucks on the roads today would not ordinarily be phased out entirely for some 10 years. Whose obligation will it be to maintain enough gas and service stations to keep them running? nological developments before they reach widespread use. He proposed to set up an Assessment Board to advise Congress - which votes the money for more than half the nation's research programs - on emerging technologies that are likely to be beneficial to society. By the same token, the Assessment Board would spell out for Congress those developments that might lead to unwanted or unintended results and, therefore, should be restricted. The board would solicit the advice of authorities in appraising a wide spectrum of activities affecting the public interest, ranging from human organ transplants to the ecological implications of building dams, from the impact of automation to genetic engineering. In short, Representative Daddario's bill provided the machinery for a system of priorities after considering the benefits and drawbacks of technological trends, much like the procedure of the Food and Drug Administration in studying new medical products for damaging side effects. The bill was shelved in committee. o The Priorities: Sifting and Weighing The solution to the original problem seemed clear at first, but on further thought it opens up a barrel of snakes. There are so many ramifications that Congress is reluctant to choose between the internal combustion engine and the fuel cell. Is a 10 percent reduction of air pollution below a minimum tolerable level, achieved two years sooner than it otherwise might be, worth the economic dislocation it entails? Congress seeks a Presidential recommendation, or leaves the decision wholly to him. 35/e" x 5" x 'l'e" "Is a 10 percent reduction of air pollution below a minimum tolerable level, achieved two years sooner than it otherwise might be, worth the economic dislocation it entails?" R-100-6 Other holders, trays and accessories available. Free sample and information sent upon request. All right, Mr. President, what's your decision? The President is not, of course, personally qualified to make one. He must have the counsel of competent experts who are qualified to reach a balanced judgment on the basis of evidence presented on both sides of the question. Most important, it must be a nonpartisan panel. In 1967 Representative Emilio Daddario of Connecticut introduced a bill to establish an early-warning system to identify the probable consequences, good or bad, of techCOMPUTERS and AUTOMATION for September, 1970 BEEMAK PLASTICS 7424 Santa Monica Blvd. Lo. Angele., Calif. 90046 Phone:.213-87&-1770 37 The Need for an Assessment Board I'm all in favor of something along the lines of Mr. Daddario's proposal - with certain modifications I'll dis~ cuss in a moment. Let me first explain, howeve~, the need for a board to identify national priorities. Friends and associates, who have heard me sound off on this idea, understandably throw up their hands and groan, "Another federal agency! We already have too many bureaus, boards and committees in our hair, driving us up the wall with red tape and regulations." There are, indeed, too many agencies and it is for that precise reason that a master board is needed to coordinate and eliminate hundreds of bureaus that run around aimlessly putting out brush fires. Their activities are fragmented, diffused and often biased because there are no clear guidelines to what national policy should be. Identifying national priorities is an enormously difficult job bristling with political booby-traps, but it is a responsibility the federal government has already assumed, and I merely suggest that it be done in a more sensible way. It may sound new, ,but I believe there is nothing heretical in asserting that a prime function of a republican form of government is to look ahead, recognize trends and practices that hold the seeds of social problems, then chart the courses that best serve the interests and ambitions of the greatest number of citizens. Businessmen have identical responsibilities to their customers, stockholders and communities. Progressive executives meet that obligation by setting up profit centers that draw, upon all available scientific methods to solve their problems. There is no earthly reason why a national priorities board cannot follow a similar procedure of analysis and evaluation, then submit its recommendation - with a minority report where appropriate - to the President. Public Endorsement Public opinion must express itself through duly elected representatives' and under our Constitution the ultimate authority must lie with the Congress, not the exe'cutive of an Assessment Board. This will temper the unwarranted but understandable - objections o"f the people to a dictatorship of eggheads on the board. Franklin D. Roosevelt's Brain Trusters aroused just such antipathy a generation ago, and the influx of Ivy Leaguers who accompanied John F. Kennedy to Washington met similar opposition. National policy must have the strong endorsement of the people to be effective, a lesson several Presidents have learned the hard way. The Political Hazards of Priority-Picking Mr.' Daddario's proposal would set up a 13-man board composed of a director appointed for a six-year term, two Senators, Two Representatives, the Controller General and seven members appointed by the President. I don't want to get bogged down here in the specifics of the board's composition, but surely I would not include members of Congress. The country needs definitions of goals that are not distorted by partisan political considerations. That is one of our major problems now. Another important revision should be made in Mr. Daddario's bill. He would have' the director of the board ' report to the Controller General, who then will send the 38 recommendations to Congress. You know what will happen. The recommendations will be lost in a maze of reports by ad hoc committees, winding up in musty pigeonholes crammed with old blueprints for a brave, new world. "The country needs definitions of goals that are not distorted by partisan political considerations. That is one of our major problems now. " I believe it essential for such ,a board to report directly to the President, just as does the Council of Economic Advisers. The prestige and high visibility of his office must be used to help gain acceptance of policies opposed by special interests. An Obscured View of the Future We must hope that the public will support the right decisions if it possesses a reasoned evaluation of all the facts pertaining to major issues. At least we would have a better chance than we have today. Lord knows we are overwhelmed by facts, but we need broad-gauged analysis of information to put them in proper perspective. A songwriter assures us that on a ,clear day we can see forever. It is comforting to embrace that romantic notion, but on most issues it is a harsh reality that currently we aren't looking much beyond today's crisis - or the next election. And it is not air pollution alone that is obscuring our view of what the future can be. We have no clear concept of our role in the international arena, of our ultimate social goals, of the proper relationship, of capital and labor to government, or of foreign policy versus domestic objectives. Science has given us the tools and techniques for evaluating alternatives and then reaching sound, balanced judgments. A priorities board, chosen for competence rather than political considerations, can help forge policies that will point the way to the attainment of logically reasoned objectives. Formulating a philosophy of government is a task for people with far more imposing credentials than I possess. I'm just a pragmatic businessman with a legal background one who knows the government is dissipating talents and money on opportunistic and bureaucratic wheel-spinning. The main thrust of our attention is now devoted to laws and regulations that are merely ad hoc expedients to meet given situations. But the squeaky wheel should not always get the grease. And although the Daddario proposal may not be the best approach to the problem of defining national priOrities on a reasoned and orderly basis, there should be some approach, so that we do get the three benefits of objectivity, balance and termination of obsolete activity. We really can't do everything that everybody wishes; and decibel count is no basis for making the hard choices. The basic policy problems confronting us are 10ng-hau1. Nothing short of a deliberate and rational process of evaluation will guide us safely through the series of crises that will continue to beset us in our own time. 0 COMPUTERS and AUTOMATION for September, 1970 COMPUTERS, SCIENCE, computers and Automation believes that the possibility of conspiracies in the assassinations of important American leaders in our times is of the utmost interest and significance to every American -- and especially to computer people, because computers can be used: to handle large amounts of information easily, to correlate the information rapidly and accurately; to prove or disprove certain theories or possibilities of conspiracy; etc. Therefore, computer people can make a unique and important contribution to society in this area. Already a computerized analysis of information regarding the assassination of President John F. Kennedy is underway in Washington. AND ASSASSINATIONS Accordingly, Computers and Automation is publishing from time to time articles and reports on: investigations into assassinations; the major evidence; and the application of computers to the evidence. Our purpose is to present important, useful, and authoritative information objectively in order to find out the truth. Since this subject is not receiving adequate and comprehensive coverage anywhere else that we know of, Computers and Automation has taken the responsibility to publish. No scientist, no honest man, ever refuses to consider new evidence or to correct errors. If corrections are needed or new evidence appears, Computers and Automation will publish both. PATTERN.S OF POLITICAL ASSASSINATI'ON: How Many Coincidences Make a Plot? Edmund C. Berkeley, Editor Computers and Automation CONTENTS Are certain killings so extraordinary that the theory "it is just a coincidence" must be abandoned and replaced by the theory "these killings are correlated and there exists a correlation~ cause~ or conspiracy of some kind"? Edmund C. Berkeley concentrated in mathematics while attending Harvard College, and graduated in 1930 with an A.B. summa cum laude. From 1930 to 1948, except for 3-172 years active duty in the U.S. Navy. he did actuarial work, first in the Mutual Life Insurance Co. of New York, and then in the Prudential Insurance Company of America. He passed 12 professional actuarial examinations from 1931 to 1941 and became a Fellow of the Society of Actuaries in 1941. He is the author of 12 books, including "Probability and Statistics: An Introduction through Experiments", 121 pages, published in 1961, which has sold over 15,000 copies. This book also accompanies a scientific kit bearing the same name, which is now published by Math-Master, Big Spring, Texas. He has been editor of Computers and Automation since 1951. COMPUTERS and AUTOMATION for September, 1970 The Case of the Fifteen Russian Generals The Definition of Conspiracy The Varieties of Conspiracy The Conspiracy of Silence: The Concert of Ideas or Attitudes The Argument from Authority The Argument from Tell-Tale Facts The Argument from Statistical Reasoning: Statistical Interlude Calculating the Expected Number of Events Measuring Spread or Scattering Deciding Between Pure Coincidence and Definite Correlation Conditions for the Statistical Distribution of Rare Events to Apply The Instrument for Decision: End of the Statistical Interlude Applying the Instrument for Decision to the Case of the Russian Generals The Case of Political Assassinations in Germany 1918 to 1932 The Case of the Black Panthers The Case of The Assassination of Two Kennedys and Martin Luther King, Jr. 40 40 41 41 41 42 42 42 43 43 43 44 44 45 46 47 Exhibits and Tables Exhibit 1: Three Dispatches from The New York Times Table 1: Categories of Possible Deviations Table 2: Instrument for Decision About Rare Events: Reasonable Variation; Unusual or Strange or Suspicious Correlation or Cause or Conspiracy Exhibit 2: Black Panthers Meeting Violent Death Exhibit 3: Inquest on Dead Panthers Opens Up Many Questions 40 43 44 46 47 39 The Death of Fifteen Russian Generals In The New York Times during May 1969, there appeared three short reports about deaths of Russian generals. These are shown verbatim in Exhibit 1. In summary, according to these reports, 15 Soviet generals died in the period April 19 to May 20, 1969. , This raises a significant question: Are there enough generals in the Soviet army so that 15 of them can die from natural causes in 30 days? or can we confidently conclude from a scientific calculation, that "coincidence" is extremely unlikely and therefore a common element, perhaps a conspiracy, was responsible for their deaths? In order to answer this question a naive person might think of inquiring of the government of the Soviet Union, for it might seem reasonable to ask for more information. But the reticence of the Soviet government to give out information is well known. For example, in the summer of 1966 there was a bad earthquake in Tashkent; I happened to be in Moscow on a vacation at the time, and asked my Intourist guide, "How many persons were killed?" I was told, "In this country we do not make public figures like that." Another example: during at least 40 years, Aeroflot (the Soviet government airline) has been flying scheduled air flights in the Soviet Union;' it seems virtually impossible Exhibit 1 THREE DISPATCHES FROM THE NEW YORK TIMES, MAY, 1969 May 12, 1969: A SOVIET GENERAL IS DEAD; 12th REPORTED IN 3 WEEKS Moscow, May 11 (UPI) -- The Defense Ministry newspaper Krasnaya Zvezda today reported the death of Maj. Gen. Avgust A. Nemme, the 12th Soviet general to have died since April 19. The death was announced in a notice signed by "a group of comrades in arms". Nothing in the recent obituaries of Soviet generals has suggested that there is any connection between them. General Nemme was identified as a retired veteran of the armed forces. His age was not given, but he was described as a veteran of the 1918-1921 civil war and of World War II. No other details were given. May 18, 1969: ANOTHER SOVIET GENERAL DIES Moscow, May 17 (AP) -- The death of another general was announced today, bringing to 14 the number of Soviet generals whose deaths have been disclosed in the last three weeks. Krasnaya Zvezda, the official newspaper of the Soviet Defense Ministry, reported the death of Lieut. Gen. G.K. Volkov at the age of 70. May 22, 1969: SOVIET GENERAL DIES Moscow, May 21 (UPI) -- The military newspaper Krasnaya Zvezda reported today the death after a brief illness of Lieut. Gen. Aleksandr G. Chernyakov. 40 that that airline should have had no accidents in the Soviet Union, resulting in the deaths of passengers. But though I have searched for any announcement by Aeroflot of plane crashes in the Soviet Union, and of the resulting number of deaths, I have never found any reports. There exists however another way to answer the question about the deaths of 15 Russian generals in 30 days -- by a scientific calculation of the probability: 1. We calculate the number of expected deaths. This turns out on conservative assumptions to be 4. 2. We know the reported number of actual deaths: 15. 3. We look in an appropriate probability table to determine what is the chance that a deviation as big as 15 or bigger could occur without correlation, cause, or conspiracy. 4. We determine the answer: the chance is less than 6 out of 100,000. On the basis of this calculation we can come to a very confident conclusion: There definitely exists a ·strong correlation, an extreme departure from normal happenings, in the "coincidental" deaths of 15 Russian generals within one month. One possibility, of course, is that the 15 Russian generals were together in a plane, and the plane crashed. Or that the 15 generals were in a conference room, and the conference room was bombed. Or something else. But the most reasonable explanation of 15 deaths occurring from April 19 to May 20 "after a short illness", appears to be that a secret action of the Soviet government or the Soviet Communist Party produced the deaths of at least 10 or 11 of the 15 generals. The basic reason for this supposition is that the Soviet Union has had a history of purges and liquidations, notoriously while under the rule of Stalin; and even currently, persons who picket, protest, or dissent are treated extremely harshly. The supposition is supported by a scientific calculation which is described later. The scientific calculation of probabilities can also be applied to some questions of tremendous importance to the people of the United States: 1. Are the political assassinations of liberal American leaders during the 1960's truly the work of lone individuals in each case? 2. Does a thorough study of the evidence concerning the assassinations of President John F. Kennedy, Senator Robert F. Kennedy, and Martin Luther King, indicate conspiracies in their deaths? and perhaps even a common conspiracy? 3. What is it that is happening in the United States that has produced the deaths by assassination of three outstanding leaders in five years? It is important for Americans to determine answers to these questions. If we decide that these three deaths are pure coincidence, we take one course of action -- mainly, sit back and hope. If we decide that these three deaths demonstrate correlation or cause or conspiracy, we take other courses of action -- mainly, we organize to put a stop to the assassination of liberal American leaders. The interpretation of events necessarily guides the behavior of citizens. The purpose of this article is to look into some of the facts and some of the science that bears on these questions. The Definition of Conspiracy What is the meaning of the word "conspiracy"? One unabridged dictionary gives this definition: COMPUTERS and AUTOMATION for September, 1970 conspiracy: 1 a: an illegal, treasonable, or treacherous plan to destroy another person, group, or entity; e.g., the conspiracy to murder Caesar; e.g., his theory of the trade union movement as a conspiracy against the unorganized worker -- L. A. Fiedler. b: an agreement manifesting 'itself in words or deeds and made by two or more persons confederating to do an unlawful act, or use unlawful means to do an act which is lawful: confederacy. 2: a combination of persons banded secretly together and resolved to accomplish an evil or unlawful end; e.g., a conspiracy made up of storm troopers and disgruntled aristocrats. 3: a striking concurrence of tendencies, circumstances, or phenomena as though in planned accord; e.g., the portentous conspiracy of night and solitude and silence -- Ambrose Bierce conspiracy of silence: a secret agreement to keep silent about an 6ccurrence, situation or subject, esp. to promote or protect selfish interests, e.g., local manufacturers were accused of a conspiracy of silence on the childlabor situation Webster's Third New International Dictionary, unabridged, published by G. & C. Merriam Co., Springfield, Mass., 1961, 2062 pp. The Varieties of Conspiracy There are many varieties of conspiracy. Over 5000 lynchings of Negroes have occurred in the United States over more than 100 years. Was this a conspiracy by Southern whites? To a large extent, yes, by the Ku Klux Klan at least, and other organizations; but in a wider sense, no. For many of the lynchings were locally organized and sprang from local attitudes of race hatred; akin to the hatred that produces genocide on a very large scale. During the civil rights drive in the 1960's, Medger Evers, a Negro leader working on voter registration, was shot in Mississippi. A white man was arrested and tried; he was tried twice. The evidence was conclusive that he had shot Medger Evers, but in each trial the jury refused to find him guilty. Was this a conspiracy by each of the juries? In one sense, yes. In another sense, no. Certainly, the jurors represented the strong feeling of a great many whites in Mississippi -- that it was trivial for a white man to shoot and kill a black man. The Conspiracy of Silence: The Concert of Ideas or Attitudes In a conspiracy of silence. the members of a certain class of persons, because of their point of view, or the way they tend to behave, or the kind of education which they have received, or their economic interest, etc., stay silent about matters that almost cry to high heaven. No spoken agreement is necessary for this kind of conspiracy to exist: simply the common interests of a group of persons. The principle may be expressed quite simply: "Don't rock the boat". One example is the conspiracy of "respectable" people about the misdoings of their own kind. Tobacco firms, knowing that they will have to cut down their advertising of cigarettes soon, step up their current advertising so as to "hook" more people before they are required to stop; and there is no protest. Drug company XYZ charges as a price ten times the cost of antibiotics, until the Federal government compels it to cut th~ price down to COMPUTERS and AUTOMATION for September, 1970 three times the cost -- but no other drug companies talk about it. The air in Los Angeles is sometimes so dangerous, due to pollution by automobile engines, that school children are forbade to physically exert themselves during recreation time. Yet the automobile and oil industries are certainly not breaking their backs to quickly eliminate the gasoline-driven car. Various important things happen as a result of the conspiracy of silence. The damage that a bad condition produces continues much longer than it otherwise would. The profit which a lawbreaker makes by breaking the law grows much greater, and continues much longer than it otherwise would. The spirit of the young people in a society tends to br,eak, because the older people set a bad example in tolerating and sometimes defending evil conditions that the older people ought to be able to change and ought to try to change. The Argument from Authority In the case of political assassinations, many people take the position that they cannot know whether or not some conspiracy occurred untii accepted authorities have investigated and announced a conclusion. They wait for authorities to speak. For example, the American people by and large suspended judgment after the assassination of President John F. Kennedy in Dallas, Texas, on November 22, 1963. Ten months later, the Warren Commission announced that Lee Harvey Oswald was the sole assassin. Because of the Warren Commission's official prestige, many Americans discarded their previous doubts and accepted the findings. This acceptance allowed them to continue their ordinary way of living without a nagging suspicion of a conspiracy that had been covered up. In 1968, two more political assassinations occurred: Reverend Martin Luther King in Memphis, Tennessee, on April 4, 1968; and Senator Robert F. .Kennedy in Los Angeles on June 5, 1968. Again, the majority of the American people suspended judgment and awaited the conclusions of official investigations. Again, authoritative sources reported that a sole assassin was responsible: James Earl Ray, who pleaded guilty to the murder of Martin Luther King; and Sirhan B. Sirhan, who pleaded not guilty in the shooting of Senator Kennedy. Both were convicted in trials and sentenced. The authorities, the standard newspapers, and the establishment now consider these cases "closed". And it seems as if they have often done their best to stop these cases from being reopened. It is of course sensible to study the findings of official groups in regard to political assassinations. In such study the basic questions to be asked include the following: Has the official group looked into all the important questions, including cui bono (to whose advantage?)? -- ,Have the findings reported on all the evidence systematically and impartially? Has the group honestly and fairly evaluated the evidence that clashes with their own conclusions? It is frequently true that the "authoritative" sources are not disinterested experts. For example, after Senator Kennedy's death the Los Angeles Police Dept. certainly did not want to seem to appear as incompetent as the Dallas Police appeared after President Kennedy's death. Perhaps this is one of the reasons why their report, as expressed by Robert A. Houghton, Chief of Detectives, in his book, Special Unit Senator, deliberately suppressed very important and disturbing evidence of a conspiracy. 41 Likewise, government officials certainly had "a lot at stake" in the report of the Warren Commission. What if there was a conspiracy? How would it affect the nation and the government? The principle of "a lot at stake" also applies to the unofficial investigators who seek the fame that may accompany startling conclusions. Therefore, it is always important to consider the interests of the person or group providing explanations. People should not be misled by the "cult of the expert": that only experts know the truth, and that ordinary people should believe experts, to the degree that the expert has authority. "Truth is not shaped so that it can fit into the hand of a~y one person", says an old maxim. TWo of the most important arguments for dealing with the political assassinations, reports about them, and the question "How many coincidences make a plot?" - are the argument from tell-tale facts, and the argument from statistical reasoning. The Argument from Tell-Tale Facts Although it is sensible (and necessary) to study the findings of official groups in regard to political assassination, it is sometimes difficult or even impossible to consider their conclusions to be true. There are too many "tell-tale" facts, that provide a "dead give-away" of important information. In the case of the political assassinations of two Kennedys and Martin Luther King, important questions appeared immediately after major events in connection with the assassinations. A great many of these questions remain either without answers, or with extremely improbable answers, because of tell-tale facts. Here is only one of the many such questions regarding each of the three assassinations: 1) How could Jack Ruby walk into the Dallas police station on November 25, 1963, with a gun, without being stopped, at just the right time to shoot and kill Lee Harvey Oswald - who had claimed he was a "patsy"? 2) Where and how did James Earl Ray acquire the large sums of money he used while hiding in the United States, Canada, England; Belgium, etc., until his arrest at London airport? 3) Who was the "girl in the polka-dot dress" who was reported to have run down a stairs and said, "We've shot him. We've shot him;~ and who was seen with Sirhan B. Sirhan prior to Senator Kennedy's assassination by at least five witnesses? (Only two of these witnesses are mentioned in the book SpeCial Unit Senator by Robert L. Houghton.) A reasonable estimate is that there are dozens of tell-tale facts of this kind, that upset the official or authoritative conclusions, for both the assassinations of Senator Robert F. Kennedy and Martin Luther King - and hundreds of such facts in regard to the assassination of President John F. Kennedy. After all, there is a single tell-tale fact which if it existed could completely disprove the Warren Commission's conclusion that Lee Harvey Oswald was the sole assassin of President Kennedy. This would be a photograph of the 6th floor easternmost window of the Texas School Book Depository Building between the first shot and the last shot at President Kennedy, showing no one at all in that window. There is reason to believe that such a photograph exists or did exist, taken by a man named N. Similas; that photograph was acquired by the Federal Bureau of Investigation, and is now unavailable. (See the article "The Assassination of President John F. 42 Kenne9Y: The Application of Computers to the Photographic Evidence" by Richard E. Sprague, in the May 1970 issue of Computers and Automation, Table 2, p. 50, and Table 3, p. 56.) But whether or not many tell-tale facts are available, there is often available another very strong and powerful argument: the argument from statistical reasoning. The Argument from Statistical Reasoning: Statistical Interlude Over and over again in ordinary, everyday life, we apply arguments from statistical reasoning, based on the laws of probability. Much of the time we are not even conscious of doing so. Often we use these arguments rather unscientifically, and sometimes incorrectly because of prejudice or habit. But all of us have a practical knowledge of many basic concepts of probability and statistics. This is revealed by words and phrases that we use correc tly over and over: "probably, likely, often, seldom, almost always, almost never, the chance is good that •••• , maybe and maybe not", etc. All of these terms refer to facts studied in the science of probability and statistics. The arguments from statistical reasoning take a variety of forms. Also, they require observations, and counting and classifying of observations. When we are examining rare events, however, events that are reasonably' expected to be unusual, it happens to be easy to apply powerful statistical reasonIng. We then come out with important conclusions, leading to decisions that have an extremely good chance of being relJable. For example, the whole business of insurance is built around the rarity of events insured against. Suppose your house is worth $20,00~ and you insure it against fire for one year. Suppose the annual premium the insurance company asks you to pay is $80. The insurance company has basically two costs: expenses for operating; and the cost of paying claims. Suppose $30 of the premium goes for expenses of operating. Then $50 is available from your premium (and a similar amount from a great many other people's premiums) for paying claims. If the chance of your house burning in one year is 1/500, then the average claim cost for insuring your house (and many similar houses) is $40, and the insurance company has $10 per customer which is left over for profits and contingencies. It is a good bargain on both' sides. You have the important safety of protection against fire; and the insurance company can pay its claims and its expenses and stay in business. In the long run, the risks will all average out. The more contracts the insurance company enters into, the smaller will be the fluctuations, the scattering, the spread. Such fluctuations can wipe out a small company; but a big company can weather them. Calculating the Expected Number of Events First, we have to explain how the expected number of events can be calculated. How is the calculation made? In the science of probability and statistics, the expected number of events is always computed from the following rule: (the population out of which the events occur) TI~ffiS (the probability of the event occurring) EQUALS (the expected number of events) For example, if you toss a coin 100 times, and the probability of getting heads is 1/2 (in other words a 50-50 chance), then the expected number of heads is 50. Of course, common everyday experience will tell you that fluctuation is likely. It would COMPUTERS and AUTOMATION for September, 1970 be unusual if you should obtain exactly 50 heads; the result you would obtain might be 47 heads, or 51 heads, etc. But the ratio of number of heads to total number of tosses will come closer and closer to 1/2, as you toss more and more times. And if that should not happen, you would be certain that some bias was present. Perhaps you are tossing in a biased way, or perhaps the coin is badly made (perhaps bulgy on one side and flat on the other), etc. Human beings have proved this law of probability literally billions of times; it is not possible for the laws suddenly to apply no longer. Measuring Spread or Scattering • Having estimated the expected number of events, and knowing the actual number of events, we now come to a different question: What is the probable spread or scattering or deviation of the number of events? For example, suppose 4 is ·the expected number of events and 15 is the actual number observed? Is 15 a reaso~ably probable fluctuation? This question has a very definite answer, determined by the laws of probability and statistics. The applicability of the laws in this case depend on several conditions which are here true; these conditions will be described more completely further on. The particular law of probability applying here is called the "Poisson Distribution"; this law will also be ~escribed more completely further on. The laws of probability and statistics (including the Poisson Distribution law) have been demonstrated by experience to be valid in literally billions of instances. Drawing on this knowledge, one can calculate with complete correctness that a given wide deviation is extremely rare as a chance coincidence, but is instead almost certainly due to definite correlation or cause or conspiracy. To make this calculation, first,we compute a measure of spread or deviation called the standard deviation. Let us call it S (the statisticians use a small Greek letter S and call it "sigma"). Second, (in this case, the Poissondistribution case), we apply the scientific formula for computing S, which is: (The standard deviation S) EQUALS THE SQUARE ROOT OF (the mean M) Since M is equal to 4, S is equal to ~. The standard deviation is a useful measure of ~egree or extent of deviations. As soon as we measure a deviation (degree of spread) in units equal to the standard deviation, then we can immediately use a probability law to say how common or how rare such a deviation is. This is explained in the next section. Deciding Between Pure Coincidence and Definite Correlation Suppose we consider all the deviations that we may find as actual observations; we can classify them according .to the chances that they will occur. (See Table 1, "Categories of Possible Deviations.") Thjs table says the following: • Deviations that are within two standard deviations away from the mean are in a REASONABLE RANGE; the chance of getting such a deviation is 19 out of 20 • • Deviations that are further out than two standard deviations from the mean but not so far out as four standard deviations from the mean are ·UNUSUAL or STRANGE or SUSPICIOUS; and the chances of getting such a deviation are less than lout of COMPUTERS and AUTOMATION for September, 1970 Table 1 CATEGORIES OF POSSIBLE DEVIATIONS Possible Deviations Categor:y: Chances of Observing 0) (2) (3) Two standard deviations from the mean or closer Reasonable range (R) 19 out of 20 Further than two standard deviations from the mean but nearer than four Unusual, strange or suspicious range (U) Less than 1 out of 20 but more than 6 out of 100,000 Four standard deviations from the mean or still further out Correlation, cause, or conspiracy range (C) Less than 6 out of 100,000 20 but more than 6 out of 100,000. • Deviations that are four standard deviations away from the mean or are further out still are almost certainly due to CORRELATION, or CAUSE, or CONSPIRACY: the chance of such a deviation is less than 6 out of 100,000. Conditions for the Statistical Distribution of Rare· Events to Apply Above we referred to certain conditions which enable the probability law called the Poisson Distribution to apply. This law was named after a French mathematician named Poisson; he was the first person to use it, to study the distribution of rare events. The particular historical case which he first studied was the distribution of deaths of soldiers from kicks by horses in Prussian regiments over the years I From this unusual beginning, the applicability of this probability law has spread far and wide. In the past the law has been called the Law of Small Numbers or the Law of Rare Events -- but these poor names for it have been abandoned. The conditions under which this distribution applies are: 1. The events are independent; in other words, the occurrence of one event (a death) is ~ associated with, has no likely influence upon, the occurrence of any other event in the class of events being consiaered. (Clearly, if fifteen people were together in a plane, and the plane crashed, their deaths would not be independent. ) 2. The ratio of the number of expected events (M) to the number of the "population" out of which the events occur (N) must be "small". "Small" is regularly taken by statisticians to mean less than 1/30. If the proportion of M to N is greater than 1/30, then the formula for the standard deviation changes to a more complicated formula. And the Poisson Distribution changes to another distribution called the Binomial Distribution. If we make these changes, then the formula for defining the standard deviation changes. Of course, we can deal mathematically with this case also, if we desire to. Rut for rare events we do not need to. 43 The Instrument for Decision: tnd of the Statistical Interlude For cases where the Poisson Distribution applies, we can construct a powerful ttInstrument of Decision tt that anyone can use. This is a precalculated table of ranges of fluctuations. We have chosen three ranges of variations or deviations of fluctuations: 1) a range of fluctuations that are reasonable and to be expected; 2) a range of fluctuations that 'are unusual or strange or suspicious; , 3) a range that almost certainly (the chance is of .99994 out of 100,000) indicates correlation or conspiracy or common cause. See Table 2. This table applies when: (1) the number of the population (out of which the events occur) is 30 or more times the expected number of events; and (2) the events are mutually independent -- in other words, the occurrence of one event does not affect or influence the occurrences of any other events. For example, if the expected number of events is 4, it is reasonable that the actual observed number be from 0 to 8 -- the chance is 19 out of 20 that an observation will be in this range. If the actual number of events is 9 or 10 or 11, this is unusual or strange or suspicious -- the chance is less than Table 2 INSTRUMENT FOR DECISION ABOUT RARE EVENTS: - REASONABLE VARIATION (R) i - UNUSUAL OR STRANGE OR SUSPICIOUS (U) i - CORRELATION OR CAUSE OR CONSPIRACY (C). 1!: Category: f: Q: Chance, 19 out of 20 Unusual, Strange, or Suspicious Range: Chance, less than 1/20 but more than 6/100 1 000 Range of Correlation or Cause or Conspiracy: Chance, 6 out of 100,000 or less o to 2 3 or 4 5 or more 2 o to 5 6 or 7 8 or more 3 o to 7 8 or 9 10 or more 4 o to 8 9 to 11 12 or more 5 o to 10 11 to 14 14 or more 6 1 to 11 0, 12 to 15 16 or more 8 2 to 14 0, 1, 15 to 19 20 or more 10 3 to 17 o to 2, 18 to 22 23 or more 15 7 to 23 o to 6, 24 to 30 31 or more 20 10 to 30 3 to 9, 31 to 37 o to 2, 38 or more 25 15 to 35 6 to 14, 36 to 44 o to 5, 45 or more 30 18 to 42 9 to 17, 43 to 51 o to 40 27 to 53 15 to 26, 54 to 65 o to 14, 66 or more 50 35 to 65 22 to 34, 16 to 78 o to 21, 79 or more Reasonable Range: Expected Number of Events 8, 52 or more Note: This statistical table applies when the "population" (out of which the "events" occur) is 30 or more times the expected number of events, and the events are mutually independent. 44 lout of 20 but more than 6 out of 100,000. If the actual number observed is 12 or more, then correlation or conspiracy or common cause is almost certain; the chance of such an observation is less than 6 out of 100,000. The method which we have just described is a powerful method for making decisions regardless of authority. Just as anybody is able to decide correctly and prove to his satisfaction that 2 plus 3 equals 5, so anybody can decide that a figure is far outside of a probable range, so far outside that the figure indicates correlation or conspiracy or common cause. This power to practically decide that some occurrences are not a coincidence, but that there is correlation or conspiracy or common cause, is truly a great power. It increases your independence of authority. It stops the wool from being pulled over your eyes. It enables you to free yourself from some of the misinformation which is offered for you to believe. It helps you distinguish truth from falsehood. Especially in the ttcredibility gaptt between the government and the people of the United States, this method is valuable for distinguishing what is probably true from what is definitely to be classified as untrue. Applying the Instrument for Decision to the Case of the Fifteen Russian Generals Let us return now to the case of the 15 Russian generals. How shall we apply the argument from statistical reasoning, the instrument of decision, to the deaths of 15 Russian generals in one month from April 19 to May 20, 1969? The procedure is: 1. Estimate the number of persons in the population. 2. Choose a typical or average age. 3. Look in an appropriate table of observed annual death rates to determine the death rate that applies to that age. 4. Multiply Item 1 by Item 3, obtaining the expected number of deaths over a year. 5. Find the period of time for which these persons were exposed to death (in years and frac tions) • 6. Multiply Item 4 by Item 5 to obtain the answer, i.e., the expected number of deaths in the period observed. We have very little information about the size of the Soviet army and the number of Soviet generals. So, suppose we make two estimates, one which is likely to produce the highest reasonable number of expected deaths and another which is likely to produce the lowest reasonable number of expected deaths: First Estimate: 1. Suppose we estimate the average age of Soviet generals as 60. (Probably high.) 2. The annual death rate from all causes for men aged 60 is 20 per thousand. (This rate is the actual death rate shown in a widely accepted Mortality Table called the Commissioners 1958 Standard Ordinary Mortality Table. This rate could reasonably apply to another 'advanced i_ndustrialized country like the Soviet Union.) 3. Suppose we estimate that the size of the Soviet Army counting both men on active duty and in the reserves, including veterans, is 12 million soldiers. (Almost certainly overstated. Some of the mentions of Soviet generals in the Army newspaper Red Star imply that a general who is retired from the Army remains classified as a general. The size of COMPUTERS and AUTOMATION for September, 1970 • the active U.S. army is about 3 million men; the size of the reserves perhaps 4 mi Ilion. But the Soviet population is greater than the U.S. population, and the area of the Soviet Union far exceeds that of the U.S.). 4. Suppose that there is one general for' every 5000 soldiers. (This is also probably high. In the American army there is reportedly one general for every division of 20,000 men; it is possible that more than just "full" generals might be classified as generals by Red Star.) With these suppositions, we can calculate how many deaths we would expect: 1. There would be 2400 Soviet generals all together (12,000,000 I 5000). 2. There would be 48 deaths expected in a year's time (2400 x 20 i 1000). 3. In the course of 30 days (or 1/12 of a year), there would be 4 deaihs from natural causes (48 / 12). 4. We look in Table'2 in the line for the expected number of deaths equal to 4. We find that 15 deaths imply correlation or cause or conspiracy. Second Estimate: 1. Suppose we ~stimate the average age of Soviet generals as 55. 2. The corresponding death rate f!om the same mortality table is 13 per thousand. 3. Suppose we estimate the size of the Soviet Army as 4 million men. 4. Suppose we estimate tl!el)umber of generals as 1 per 20,000 soldiers. With these suppositions we again calculate how many deaths we would expect:" 1. There would be 200 Soviet generals all, together (4,000,000 I 20,000). 2. There would be 2~6 deaths expected in a year's time (200 x 13 /1000). 3. In one month there would be 0.2 (2.6 I 12) deaths on the average from natural causes. 4. Suppose arbitrarily we call this 1 death. We look in Table 2 in the line for the expected number of events equal to 1. Again we find 15 deaths to imply correlation or cause or conspiracy. Other possibilities of course exist. For example, suppose that due to errors of reporting by Red Star, a number of deaths of generals spread over several months all happened to be reported in one single month. However, if the information published in Red Star is to be believed, reporting 15 deaths of Russian generals in one month, the probability is overwhelming that a correlation or cause or conspiracy affected the ~5 Russian generals who "died after a short illness", For a final check, let us determine what the effect of 15 deaths of generals per month would~mply per year and per five years: 12 times 15, or 180 dead generals per year; and 180 times 5 or 900 dead generals per five years. This rate of mortality among generals seems on the 'order of magnitude of Stalin's distrust of Soviet generals and their consequent widespread death. The Case of Political Assassinations in Germany, 1918 to 1932 There is important confirmation of a pattern of political assassinations in a number of historical situations. One of these is the ~olitical assassinations that occurred in Germany "after she was defeated in World War I, and before the coming to power of Hitler as Chancellor of the German Reich in 1932. The following account is by E. J. Gumbel who was a professor of statistics at the University of Heidelberg, 1923 to 1932: COMPUTERS and AUTOMATION for September I 1970 ••. The illegal military groups included an array of fanatic terroristic organizations, small in size, but important for their work of political assassination in eliminating first the leaders of the rWeimerJ Revolution, then prominent Republicans, and finally-the enemies of the illegal rearmament •.• _ .•. Within the German population, especially during the inflation period, substantial popular backing, or acquiescence, was given to the evasion of the Versailles Treaty. For the nationalists of all shades these efforts were necessary for the restoration of national honor •••• Terror as an Instrument for Enforcing Support for Illegal Armaments. During the period of illegal German rearmament, terrorist methods were wielded against the opponents of rearmament. These included acts of personal violence carried out by the terroristic nationalist groups supported by manipulation of the legal system. Altogether, there were about four hundred political assassinations of the nationalists' foes. A considerable literature was published in Germany which detailed the charges •.•• The nationalist terrorists who enforced acquiescence in the rearmament of the Reich included many men who later became Hitler's trusted adjutants, for overseeing the mass extermination program which the Nazis carried out during the Second World War ••• The Role of the Law Courts. The political assassinations committed by the members of the former Imperial and the secret armies put a heavy burden on the administration of justice. The murderers had to be acquitted and the victims .had to be shown as guilty. This task was fulfilled by the employment of military courts which sided with the military men when they were accused of murder, by the slowness of the justice enforcing agencies, by inability to find the guilty, by issuance of false papers of identity by the police, etc. Another procedure consisted in accepting at face value the claim of the accused murderer that the victim had tried to escape ••.• To insure sentences members of the Reichswehr responsible for the secret rearmament were called as witnesses for the prosecution. In order to terrorize the public, many more trials were started than could ever be completed .•.• From "Disarmament and Clandestine Rearmament Under the Weimar Republic': (pp 203219) by E. J. Gumbel, in Inspection for Disarmament by Seymour Melman and 19 authors, published 1958 by Columbia University Press, New York, 291 pp. With a number as large as 400 deaths, it is hardly necessary to invoke the instrument of statistical decision. In this case, . there is ample significant and accepted evidence, which is reasonable arid overwhelming proof at first glance of foul plai and not "coincidence". Footnote: E.~. Gumbel was one of a small group of pacifists who exposed the illegal rearmament and the terrorisms connected with it. For this activity he was three times' charged with high treason. In 1932 he was dismissed from the University, and expatriated by the Nazi government on its first list. He eventuall1~~~~ ~~ the United States and taught at Columbia University. During the summers 1953 to 1957 he was Visiting Professor at the Free University of Berlin; and in 1956 his dismissal from the University of Heidelberg was declared void. 45 Exhibit 2 The Case of the Black Panthers Let us now consider the application of the arguments from tell-tale facts and statistical reasoning to the deaths of Black Panthers o The Black Panthers are one of the newer groups of young black men who are challenging the treatment of black people in the United States. Their platform was adopted in October 1966; it contains a number of planks, some progressive, some revolutionary, some expressing condemnation of the existing power structure in strong and derogatory terms. Furthermore, many of them arm themselves, and they refer to policemen as "pigs". In Exhibit 2 is a list of 19 Black Panthers meeting violent death, in the period April 1968 to December 1969. This list is derived from a report in an article in Life magazine, Feb. 6, 1970. Eleven of these 19 men-were shot by the police; and when the inquest was held, the decision in every case was "j ustifiable homicide" 0 The Black Panthers claim that there is a conspiracy to kill them off, and that 28 of their group have been killed in accordance with this conspiracy. Whether or not there is a conspiracy depends partly on the meaning to be assigned to the word "conspiracy", and partly on the interpretation of the events that have happened. Among the tell-tale facts to be considered are these two: • On December 4, 1969, in the predawn neriod, the Chicago police raided the apartment in Chicago where two Black Panther leaders lived. There is str.ong evidence that almost all the shots were fired by the police from outside the room, and that the Black Panthers inside -- some of them sleeping until the police raid -- fired only a few' shots at the police outside. Fred Hampton, Illinois chairman of the Panthers, and his colleague Mark Clark were both killed. See the newspaper account in Exhibit 3. • Wesley C. Uhlman, Mayor of Seattle, Washington, stated in February, 1970, that he had been asked by the federal government (or a part of it) to organize a midnight raid on Black Panther headquarters in Seattle, and he had refused to do so. A question we need to consider with our statistical "instrument of decision" is the significance to be attached to the 28 deaths. The locations of 19 of the deaths are Chicago, Long Beach (Calif.), Los Angeles, New Haven, OaKland, and San Diego. The number of members of the Black Panthers is reported to be about 1200. The number of natural deaths to be expected from a group of 1200 Negro men, average age 25.. say, is about 4 per thousand. Over 1 and 3/4 years the expected ~umber (M) of deaths among such a group of 1200 persons is 8 (1200 x 4 / 1000 x 3/4). If we look in Table 2, on the line"for 8 events, we find that 28 actual deaths would imply correlation, cause, or conspiracy. In this case, a life insurance company would not apply a rate of death from natural causes to this group of persons, but instead a higher rate, because of additional hazards. Consequently, the argument from statistical reasoning is not as sound as it might appear to be on its face. However, the telltale facts together with the statistical argument would seem to be strong evidence of a conspiracy by elements of federal and city governments in the U.S. against the Black Panthers. 46 BLACK PANTHERS MEETING VIOLENT DEATH (Information chiefly from "Black Panthers: the Hard Edge of Confrontation" in Life magazine, pp. 22-27, Feb. 6, 1970, Vol. 68, No.4) 1. Spurgeon Winters, 19, shot by police, Chicago, November 1969. Inquest ruled it "j ustifiable." 2. John Huggins, 23. shot to death, UCLA lunchroom, January,lY69; rival black militants convicted. 3. Walter Pope, 20. shot by police, Los Angeles, October 1969: Inquest: "j ustifiable homicide" • 4. Alprentice Carter, 26, shot, UCLA lunchroom, January 1969; rival black militants convicted. 5. Welton Armstead, 17, shot by police, Seattle, October, 1969. Inquest ruled it "j ustifiable homicide" • 6. Sidney Miller, 21, shot by storekeeper, Seattle, November, 1969; storekeeper was not charged. 7. Fred Hampton, 21, Illinois chairman of the Panthers, shot Dec. 4, 1969, by police, Chicago, in a predawn raid on his apartment. Inquest termed it" justifiable homicide" • 8. Mark Clark, 22, shot by police, Chicago, December 1969. Inquest called it "justifiable homicide" • 9. Tommy Lewis, 18, shot by police, Los Angeles, August 1968. Inquest ruled it "j ustifiable homicide" • 10. Sylvester Bell, 34, beaten and shot, San Diego, August,1969; rival black militants have been accusedo 11. Bobby Hutton, 17, shot by police, Oakland, Calif., April 1968. Grand jury ruled it "justifiable homicide" • 12. Steve Bartholemew, 21, shot by police, Los Angeles, August 1968. Inquest ruled it "justifiable" • 13. John Savage, 21, shot on San Diego street in Mai 1969; rival black militant is awaiting trial. 14. Frank Diggs, 40, found shot to death in Long Beach, Calif., D~cember 1968. Assailant unknown. ~5. Nathaniel Clark, 19, shot by wife, who Panthers say is a police agent, in Los Angeles, September, 1969. 16. Larry Robertson, 20, shot by Chicago police, July, 1969, died in September. Judged "justifiable" • 17. Robert Lawrence, 22, shot by police, Los Angeles, August 1968. Inquest ruled it "j ustifiable". 18. Arthur Morris, 28, shot in 1968, Los Angeles gun fight, not involving police. No one was charged. 190 Alex Rackley, 24, tortured, shot. New Haven, Conn., May 1969. Panthers are charged with murder. COMPUTERS and AUTOMATION for September, 1970 Exhibit 3 The Case of the Assassination of Two Kennedys and Martin Luther King From The Gazette & Daily, York, Pa., January 26, 1970 INQUEST ON DEAD PANTHERS OPENS UP MANY QUESTIONS Chicago -- The finding last Wednesday of a special coroner's jury that the deaths of two Black Panthers in a predawn police raid Dec. 4 were "justified" were based, the verdict noted, "solely and exclusively" on testimony presented by the police and the coroner's office. But that evi: !nce itself appeared to raise a number of questions about the incident, which the police have described as a gun battle lasting at least 10 minutes, touched off by shot-gun blasts from the occupants of the small West Side apartment. Members of the Black Panthers declined to testify because of pending criminal trials. Among the unexplained points raised by the testimony were the following: -- A police firearms expert testified ammunition recovered from the apartment were the shell casings of five .32-caliber bullets. He testified that these did not match any of the alleged Panther weapons the police say they found and that the list of police weapons carried on the raid did not include any of .32 caliber. -- The same'police expert, John M. Sadunas, testified that none of the 130-odd expended shell casings and slugs recovered from the apartment matched 17 of the 19 weapons the police say they seized. -- Sadunas testified that three shot-gun cartridge casings the police said they found in the apartment matched the remaining two shotguns. Yet no slugs or shotgun pellets were recovered from the area where the shotguns were supposed to have been fired. -- Although the police raiders repeatedly testified that there had been a number of shotgun blasts directly out of the doorways of the two bedrooms, no pellets or slugs were recovered from the opposite walls, and visitors to the apartment saw no marks on the walls. -- Police Sgt. Daniel Groth, who led the raid, testified that there was no tear gas "available," although the raiders had drawn three shotguns and a submachine gun from a special weapons arsenal. -- Sergeant Groth also testified that no fingerprints were taken from any of the weapons the police said they seized. -- All 14 policemen who took part in the raid testified thaty they had virtually no prior knowledge of the ~lack Panthers, although they are assigned to the Special Prosecutions unit of the State's Attorney's office, which was set up last spring with a specific mission of keeping an eye on black youth groups and street gangs. -- Despite the heavy volume of fire described by the police, the only injuries they received came when one policeman cut his hand breaking a window with his pistol and another was grazed by gunfire coming through a wall, apparently fired by the police. Testimony about the three shots fired into Hampton, who was the Illinois chairman of the thers, raised a number of questions about the of the bullets that were fired and the nature the wounds. Fred Panpath of COMPUTERS and AUTOMATION for September, 1970 For most Americans, by far the most important and most disturbing instances of political assassination in recent years in the United States are the assassination of two Kennedys (in 1963 and 1968), and of Martin Luther King·(in 1968). President John F. Kennedy was shot to death about 12:30 pm while riding in an open car on November 22, 1963, in a motorcade in Dallas, Texas. Lee Harvey Oswald was arrested in a movie theatre early that afternoon, and charged with the crime, which he steadily denied; then he was shot to death two days later in the basement of the Dallas jail by Jack Ruby, ,while being transferred from one jail to another. Ruby is now dead also. Martin Luther King was shot to death while standing on the second floor balcony of a motor hotel in Memphis, Tennessee, on April 4, 1968. He was shot by a rifle bullet from the window of a rooming house a short distance away. Some months later an escaped convict, James Earl Ray, was arrested in London Airport, and was brought to trial. He pleaded guilty on the advice of his lawyer at the time, was sentenced to 70 years in jail, and is now in jail in Tennessee. Senator Robert F. Kennedy was shot to death about 12:15 am, June 5, 1968, in the kitchen area of the Ambassador Hotel in Los Angeles, just after he had won the California Democratic primary election on June 4. Sirhan B. Sirhan, a Jordanian who became a naturalized American, was arrested in the kitchen, with a gun in his hand, after he had fired eight bullets. Sirhan was tried, pleaded not guilty, and was sentenced to death. He is now in jail in California. A question which confronts a great many people in the United States is: Are these killings so extraordinary that the theory "it is just a coincidence" must be abandoned and replaced by the theory "these killings are correlated, and there exists a cor'relation, cause, or conspiracy of some kind"? At the present time, the answer derived from applying the laws of probability and statistics is inconclusive. It is easy to show that if these were three normal people running ordinary risks, the expected number of deaths out of this group of three young men (two Kennedys and Martin Luther Kin.g") would be very close to zero and that even one death occurring would be in the range of unusual, strange, suspicious. But there is the important question, what kind of death rate should apply to these persons? If the life of such a person was to be insured, a life insurance company would charge an extra premium because this kind of person runs extra risk, extra hazard. Even so, the argument from statistical reasoning declares there is very likely a correlation or cause or conspiracy (or concert of ideas and attitudes), and this is confirmed by the abundance of tell-tale facts about the assassinations. Probably the best summary at present is the following: 1. In regard to the assassination of President John F. Kennedy, there was a conspiracy in Dallas. 2. As to the killing of Martin Luther King, James Ea.rl Ray appears to be ei ther a hired gunman or a "patsy", either of which means a conspiracy. 3. As to the killing of Senator Robert F. Kennedy, there is evidence which points toward conspiracy. 4. As to a possible inter-connection between the three slayings, there are a number of 47 COMPUTER-ASSISTED ANALYSIS OF EVIDENCE REGARDING THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY - PROGRESS REPORT Richard E. Sprague Personal Data Services Hartsdale, N. Y. A computer project has been initiated at the headquarters office of the National Committee To Investigate Assassinations (NCTIA), 927 15th St., N.W., Washington, D.C. The project was started in June, 1970, by the Committee's Executive Director, Bernard Fensterwald, with the assistance of two board members. Twelve volunteer workers have contributed to the project during the summer months. Three of them have designed a coding structure for feeding evidence into a computer system and storing iti they have also coded an appreciable amount of evidence to date. Six workers are contributing to system design and programming work. Three others have offered computer time. Specific Objectives The obj ec tives of the proj ec t are fourfold. First, to organize and store in computer-based form all significant factual evidence pertaining to the John F. Kennedy assassination. Second, to make easily and efficiently available to researchers: (1) .evidence having interest, and (2) answers to queriei peitaining to the evidence. Third, to provide an index to voluminous textual, photographic, and physical material on the assassination, presently located in many different locations around the United States. Fourth, to provide an analytic capability comprised of a combination of information retrieval and computing techniques to augment human efforts in examining the evidence to solve the John F. Kennedy assassination. The fourth objective is of rather longer range than the first three. A pilot analysis program is contemplated in which a specific set of dates, places, persons,· organizations, and events will be analyzed to see whether a proposed solution to part of the planning for the assassination can be verified. Coding Structure The coding structure developed so far provides a general framework for numerically coding raw data elements and relationships among them in the following categories: People, organizations, places, events, times, and objects. A coding form permits parallels in. the cases which might indicate a common modus operandi and which normally would be subject to official, governmental scrutiny. 5. The absence of such scrutiny is extraordinary, and implies collusion of powerful parts of the government and of the establishment. Nowhere in the United States can concerned Americans apply to have their questions about political assassinations answered reasonably. Only a few agencies, such as courts and Congressional committees, have the power to issue subpoenas, compel the appearance of witnesses, and ask direct questions. The rights of the people to know are defective. 0 48 several relationships and data elements to be represented in one grouping. For example, two people met at a certain time in a specific place. Or one person is related to a second person and is also a member of an organization. Utilizing this coding structure, the coding volunteers have ploughed their way th·rough several important sources of evidence and information, producing several thousand completed coding forms for eventual entry into a computer system. The sources include: The Warren Report; NCTIA files of evidence; the book Accessories After the Fact by Sylvia Meagher; the book Oswald in New Orleans by Harold Weisberg; and others. Systems Design Two systems design approaches are under study. The first is a batch-processing approach using punched cards and tapes with standard printed reports. The output in this case would be primarily organized indexes, to be placed in manually available files and scanned by researchers. The second system is a random-access interactive approach using disc files for storing all the evidence in coded form, and an English language translator to produce readable output. The programming language under consideration for this system is Integrated Data Store (IDS). The researcher would be able to formulate a series of questions and enter them through an interactive terminal, receiving online answers at each step of his exploration. Taking the pilot program as an example, the researcher will be able to formulate a problem as follows. He wishes to determine the likelihood that meetings among a group of specified people took place in a specific period of time in a particular place or places in a specific city or geographic area. He can explore via his terminal all of the evidence pertaining to the whereabouts of the group of people during the period of time in question. He can also explore the events which took place in the locations in question during the time period. Thus in the long run he will be able to gather evidence for and against his proposed hypothesis. If any readers of Computers and Automation are able to contribute assistance with key punching, programming, machine time, or money to help continue this research,it is suggested they write to the National Committee To Investigate Assassinations, 927 15th St. N.W., Washington, D.C. 20005. CORRECTION In the May issue, in the article "The Assassination of President Kennedy: the Application of Computers to the Photographic Evidence", in the "Spatial Chart of Northern Half of Dealey Plaza" pages 48 and 49, in the lower center of the chart, in the "scale of feet", please replace the numbers 10, 20, 30, 40 by the numbers 20, 40. 60, 80, respectively: COMPUTERS and AUTOMATION for September, 1970 ACROSS THE EDITOR'S DESK APPLICATIONS REVENUE AGENTS TRACK DOWN CIGARETTE BOOTLEGGING WITH AID OF COMPUTER Georgia revenue agents have put their computer to work to help stop illegal cigarette shipments. Cigarette manufacturers supply all states with monthly computer tape records of cigarette shipments coming into a state. "By comparing computer reports every month we can spot sudden changes in volume that might indicate bootlegging activity. For example, if a city showed a sudden decrease in per capita tax paid cigarette sales, we would suspect it as a point of bootl egging activi ty and send investigators," said Georgi a Tobacco Licensing Chief Jerry Wynn, who spearheaded the program. Al though other states are using the tapes, Georgia is the only state to use them in thi sway. Tapes are fed into the IBM System/360 Model 40. A printout of the information by wholesaler or distributor gives the number of cigarettes, packs, cartons, their destination, their shipping point in the state and computes the tax as well. Manual auditing systems formerly used by the state required as much as a month to complete the audit of each wholesaler - with the computer, time has been cut to one day. Since the system is very new, no accurate figures on collection increases resulting from it are yet available. Georgia's Revenue Commissioner, John A. Blackmon, said, however, that cigarette bootlegging is a national problem that results in an estimated annual revenue loss of nearly $100 million. " ••• Eventually we hope to share information between states, which will help us further in stopping the flow of bootlegging activity from low tax states to high tax states ," he said. POST OFFICE TESTS COMPUTERIZED POSTAGE SYSTEM Two companies working with the Post Office are using computers to determine postage for different size packages and to automatically print the amount on pre-printed labels. Parcel post rates are determined by weight and di stance being mailed. Loa Corporation in Omaha, a catalog mail order house, stores rates from Omaha in their System/360 Model 20. Sarah Coven- try in Newark, N. Y., a maj or di stributor of costume jewel ry, stores rates from Newark in the firm's System/360 Model 40. The computer-aided mailing process bypasses multiple handling of packages by the mailer and by the United States Post Office. As orders arrive, clerks enter a code number designating a specific item of merchandise, its weight and to whom it is being sent. The computer matches thi s information with the proper weight and destination rate i prints the correct postage amount on a pre-printed 1 abel, and, al so prints the name and address of the cus tomer in ZIP Code sequence. The boxes are put in mail bags for delivery to the Post Office from where they are immediately shipped. The mail bags are not even opened at the Post Office. Billing is on a weekly basis. Using computer listings of all mailings, the Post Office charges for total postage as figured by the computer. Periodically, a postal official verifies package weights to ascertain computer-figured postage rates are correct. The computer al so verifies i t8' calculations under direction of a stati stical sampling program. Official s at both firms have reported reduced costs with the computerized mailing process. Postmaster General Winton M. Blount added that by presorting their packages according to ZIP Code, del i very is speeded by 1 to H~ days. bi rds. The system al so keeps track of the egg s, by fl ock, from the day they are laid until they hatch. Thus researchers can determine i f variations in feed and other factors affect the number and quality of the eggs. Additionally, the company plans feed formulations on the computer and figures cost per pound on birds as they are being readied for market. The company was a pioneer in the development of the "MINI", an ~" to 12-pound bird specifically bred for white meat and small size. Williams also raises the traditional 1 arge turkey. Both are produced for national and international markets. COMPUTER PROVIDES INSIGHT TO CHANGES IN GREAT LAKES Researchers at the Great Lakes Fi shery Laboratory at Ann Arbor, Mich., are using a computer to interpret the effect changing lake condi tions are having on the fi sh popul ation in the Great Lakes. Dr. George Y. Harry, director, said laboratory researchers rely on the IBM 1130 computer to interpret the data being gathered both in the lab and on the lakes. CALIFORNIA COMPANY BREEDS TURKEYS BY COMPUTER A computer is keeping records on individual birds and entire flocks, allowing experts at Williams Turkey Breeding Farms, Inc. (Oakdale, Calif.) to conduc t research that results in improved breed lines and rigid quality control. Using an IBM 1130 system, Williams researchers are able to select parent turkeys that will produce poul ts with specific desirable characteristics. These attributes, including superior body conformation, fast weight gain and high meat yield, meet the specific requirements of the market in North America, South America and Europe. Computer records, noting characteristics, are kept on every breeder bird dating back five and six generations. When a turkey with certain characteristics is needed, the computer can give the wing band 'numbers of the tom and hen most likely to produce the"se COMPUTERS and AUTOMATION for September, 1970 Researcher Tom Edsall, shown above, examines a computer printout of data gathered on Lake Trout. The fish are shown in a tunnel-type respirometer, which enables researchers to con trol wa ter pres sure, temperature flow rate, dissolve gasses and vary soluble toxicants and observe fish reactions. The Fishery Lab (operated by the U.S. Department of Interior) operates four research vessels on the lakes, recording data on fish population by geographical area and type, and noting biological, chemical and physical changes taking place in the water. "Researchers combine these da ta wi th "catch" information and other historical records provided by both commercial fishermen and state agencies for computer processing. The computer correlates the d~ta into charts for conservationists. 49 "By unders tanding the changes that are taking place in the lakes," Dr. Harry said, "we can suggest corrective measures to head off developing problems. Changes in species composi tion also give clues about changes taking place in lake water." According to Dr. Harry, measures already have been taken that are aimed at re-storing a biological balance in the lakes. HOSPITAL PROJECT USING COMPUTER SYSTEM TO AID SURVIVAL OF FETUSES At the Department of Obstetrics and Gynecology, Univ. of Chicago Lying-In Hospital (Illinois~ medical researchers are developing a small computer-based moni toring system for obstetric patients in the active stages of labor. The system is designed to recognize those conditions crucial in the care of patients which could" mean the life or death of the fetus. The resiliency and reserve of the human body are such that subtle pathophysiologic changes can occur wi thout being fully assimilated by the obstetrician. All too frequently, it is only when the cumulative effects of many deviations from normal labor become evident that the doctor is aware of a problem. Wi th the system's ability to continuously record the fetal heart rate and the uterine contraction pattern, diagnosis of the patient and fetus can be more accurate as events occur. A PDP-8/I (Digital Equipment Corp.) used in the sys tern, gives the flexibility to alter the mode of data analysis and display as it is necessary. Software in the computer also can be changed as experimentation dictates. COMPUTER LOOKS THROUGH MICROSCOPE The National Bureau of Standards (U.S. Department of Commerce), in a collaborative effort wi th the National Institutes of Health, has adapted a microscope for use wi th a digital computer to direct and to record the presence of obj ects on the slide. The scanning system was designed by Philip Stein (of the Bureau's Center for Computer Sciences and Technology), Dr. Lewis Lipkin (of the National Insti tute of Neurological Diseases and Stroke) and Dr. Howard Shapiro (of the National Cancer Institute). It will be of use in neuropathological studies, in autoradiograph counting, and as a tool in the des ign of systems .for automating image processing. The system consists of a microscope, an image plane scanner, a motor-driven stage, a computer, and the necessary interface hardware. It not only scans automatically in the .2S and y... directions on the microscope slide, but can do so repeatedly at sequential ~ positions to obtain three-dimensional data. Computer control allows the operator to manually posi tion the slide to locate features of interest and to note their locations in the computer memor~ When later instructed, the stage can return to within one step in each axis of every posi tion previously noted - the system automatically performs a scan at each. The scanning microscope was buil t on an existing special-purpose microscope frame. It offers a choice of ei ther wide-spectrum or monochromatic light, the illumination desired being switched by a mirror. A fixed portion of the light is passed through a special lens system to a photomul tiplier tube to provide a reference for specimen illumination. Presently, the "front-end" or data acquisi tion section of the system is an intrauterine catheter and strain gauge for moni toring uterine contractions which feeds into a polygraph. The fetal heart rate is obtained from a skin-clip elec trode and a cardiotachometer, which also is fed into a polygraph. One aim of the development plan is to simplify this section so that physicians, nurses, or obstetric assistants can easily use it. The system also includes a visual display via closed-circui t television - in the patient's room. The display is generated by the DEC KV81 I graphics portion of the computer system and a small storage scope, which is slaved off of the main display scope. The small scope is photographed with a closed-circuit tefevislon camera. 50 NIH. The scan is manipulated by pressing buttons on the operator's console, which interrupts computer control. The system computer controls the scan but processing the resulting data requires large computers. At present a high speed telephone line is the link with an image processing computer. EDUCATION NEWS UNIV. OF PITTSBURGH INAUGURATES NEW PROGRAM IN INFORMATION SCIENCE A new Interdisciplinary Doctoral Program in Information Science at the University of Pittsburgh (Pa.) is headed by Professor Allen Kent, Director of Communications Programs at the University, and Dr. Anthony Debons, professor of information science. It is supported in part by a contract from the Commonweal th of Pennsylvania Science and Engineering Foundation. The program accepts students wi th undergraduate maj ors in almost any discipline, but when they complete their studies in information science they will have well-rounded backgrounds in the behavioral, systems, computing, engineering and basic sciences. The program is designed to provide the student wi th a deep appreciation of the role of man in his use of informatIon and communication technology in day-to-day pursuits. How the human will use computer information is an important concept in information science, Professor Kent points out. The program is one of the few information science programs in the country wi th an interdisciplinary emphasis. Most other academic programs in information science have stressed the technological aspect of the process. POSTAL CLERKS IN ENGLAND TAUGHT BY COMPUTER The scanner is connected in a closed-loop configuration with a small general-purpose computer that controls the scan. The picture shows NBS computer engineer Philip Stein viewing a slide through a computer-controlled microscope that he developed in collaboration with Great Britain's Post Office System plans to integrate a computerized "teaching machine" into its operations that will enable up to 20 operators to' be simultaneously taught letter-coding techniques. (The electronic coding and sorting process will be central to the flow of mail through the new pos t office system.) Using television-like keyboard devices, the Honeywell Model 516 comput"er will be able to display up to 4,000 different lessons on the screen by selecting specific informa tion stored in its memory. The system also can incorporate remedial lessons to correct continuous errors on the part of the operator. COMPUTERS and AUTOMATION for September, 1970 Operators first will be taught to touch type; then to code groups of letters; and third. read and code two addresses simultaneously. Stations will be moni tored by a postal supervisor who can display his comments to trainees via the screen during instruction. The computer itself presents an explanatory text before each lesson, then performs a cri tique based on a "par" for the course of instruction. "TYPING CLASS" AT BOWLING GREEN (OHIO) IS COMPUTER LAB Students preparing for careers in computer science or bus ines s "experiment" in an unusual class at Bowling Green State University. Using typewri ter-like communications 'terminals (IBM 2741s) linked to a central computer, undergraduates wri te their own computer programs and solve complex problems in quanti tative terms as part of two maj or fields of study at Bowling Green. Students maj oring in information systems or computer science are provided with "hands-on" experience. Fifteen terminals are linked to an IBM System/360 Model 50, which serves all terminal users concurrently, while enabling each to proceed through computer-assisted exercises at his own pace. The computer oriented maj ors at Bowling Green are offered by the College of Business Administration and the College of Arts and Sciences. IBM MANUFACTURING CAl NETWORK HELPS EMPLOYEES LEARN MORE THAN 50 SUBJECTS Manufacturing employees at IBM's plant at Poughkeepsie, N.Y., take manufacturing-related courses at are available to IBM employees using this system. An IBM System/360 Model 50 computer located in' ,Poughkeepsie serves terminals at 11 IBM manufacturing plants from coast to coast and in Canada. In addition' to Poughkeepsie, the computer-assisted instruction system embraces IBM manufacturing locations at: Kingston, East Fishkill and Endicott, N.Y.; Rochester, Minn.; Boca Raton, Fla.; Boulder, Colo.; Burlington, Vt.; Raleigh, N.C.; Sari Jose, Calif.; and Toronto, Canada. Other locations are in the process of linking to the system. COMPUTER SCIENCE OFFERED AS ADULT EDUCATION COURSE BY NEW JERSEY HIGH SCHOOL Res idents of this Philadelphia area community (Cherry Hill, N.J.) will have an opportuni ty to learn computer science through an adult education course being offered by the school department this fall. The course will be called Computer Concepts. The teacher will be Sidney Rubenstein, a member of the Mathematics Department of Cherry Hill West High School. A recently acquired PDP-8/L computer (Digital Equipment Corporation) will be used as a demonstration device., Students also will get "hands on" experience with the computer in both the programming and computer operations segments of the courses. " ••• The adult education course will offer the people of our communi ty the chance to increase their knowledge of a force becoming more and more influential in the business world at a price they can easily afford", remarked Mr. Rubenstein. RESEARCH FRONTIER UNIVERSITY OF UTAH SCIENTISTS RESTORE CARUSO RECORDINGS USING DIGITAL COMPUTERS At the Uni vers i ty of Utah, a computer scientist is devising a method of "resurrecting" the voices of recording artists from the muted, hollow-sounding, antique records of the dis tant past. The technique uses digital computers and already has been dramatically demonstrated on the voice of Enrico Caruso, the great Ital ian operatic tenor who died in 1921. computer terminals in the computerassisted instruction system. Over 50 courses, ranging from chemical safety to data processing principles Directing the research is Dr. Thomas G. Stockham, Jr., professor of electrical engineering and a leading au thori ty on "compu ter filtering proces ses:' According to COMPUTERS and AUTOMATION for September, 1970 Dr. Stockham. sound waves from recordings can be fed into a computer. converted into numbers and then re-recorded on numerical tapes. "By using a complex, delicate and precise program in the computer, we can manipulate these numbers wi th the hope of reversing the orig inal recording proces s and coming back out with sounds that have objectionable resonances removed", the computer scientist said. The process is called "numerical dereverberation". Dr. Stockham believes it holds promise for a wide range of future advances in a variety of scientific areas, as well as'in the recording industry. The Caruso experiment actually developed as a sideline to the primary research Dr. Stockham and his colleagues are conducting on contract wi th the Advanced Research Proj ec ts Agency of the Department of Defense. They are investigating the use of digital computers to process pictures and sound, the bas ic elements of human communication.. Using computers, the scientists can restore photographic images that are blurred, enhance details in pictures, eliminate reverberation in sound, and may be able to improve high frequency radio transmission. Work on the antique recordings began one night when, while talking about filtering with some friends, one chanced to remark, "Wouldn't it be nice if computers could be used to res tore the real voice of Caruso. " Dr. Stockham began working with the mechanical problems involved in such a restoration, and was intrigued by the similarity between these problems and others wi th which he had been previously working. Finally he devised the initial computer program from which Caruso's voice was "resurrected." While Caruso had a voice powerful enough that it came through the crude equipment of his day, the low and high frequencies were missing. Distortions were so gross there is reasonable doubt today about the most salient characteristics of his voice. Dr. Stockham believes the computer-restored Caruso voice gives a more accurate sound on which to judge its character and qual i ty. He also is working on the elimination of surface noise and other related problems. Experiments such as the Caruso one, Dr. Stockham says, greatly enhance scientific knowledge about manipulation of pictures and sound. "They are illus trative of how the computer will supplant conventional elec tronics for the future handling of communications information. II he says. 51 NEW PRODUCTS AND SERVICES NAME/ MODEL NO. DESCRIPTION FOR MORE INFORMATION Digital Control Data 3170 System PDP-ll/15 For multiprogramming users / total hardware and software compatibility with CDC's 3300 and 3500 systems / expandable core memory, 49,000 to 131,000 24-bit words / 1.75 usec memory cycle time; 1 usec access time / may be field-upgraded General-purpose computer designed for original equipment manufacturer (OEM) applications / full compatible with, and has same central processor capabilities as, PDP-ll/20 / core memory, 4096 16-bi t words (expandable to 32,768); 1.2 usec cycle time; 500 nsec access time Control Data Corp. 8100 34th Ave. So. Minneapolis, Minn. 55420 Attn: Kent R. Nichols For use supervIsIng operation of several small dedicated control computers, as second-level computer in hierarchical computer system, and as data gathering system in management reporting network / includes PDP-IS processor, 16,384 words core memory and RSX-15 real-time multiprogramming, executive software moni tor For nuclear research and analytical applications / includes a GEOS single or dual parameter 4096-channel analyzer interfaced to DEC's 16-bit PDP-ll/20 computer / system provided with application-oriented software package Card oriented phototypesetting system / allows access to any point in composed material prior to setting of type / chief components are a typesetting keyboard which is connected to a keypunch, and a card reader which activates a phototypesetter Digital Equipment Corp. 146 Main St. Maynard, Mass. 01754 Attn: Edgar E. Geithner Random access system / composed of proprietary COMFILE Data Storage System (storage to 72,000 characters for any mini- to medium-sized computer), a COMFILE plug-in interface; and a COMFILE utility program / average access of 350 msec Modular system can be altered to produce 60 different configurations / 4096-16,000 word capacities available, lengths in 8, 12 and 16-bit formats / 1.6 usec full cycle time with 650 nsec access time for read/regenerate and clear/write operations For Century 200 computers / direct access files with full track disc capaci ty of 29.8 or 59.6 million bytes / average access time including latenc~ 72.5 msec; maximum data'transfer rate, 315,000 bytes per second / the 657-101 is a single-spindle disc unit; 657-102, dual spindles Capacities to 10,240 bits; word lengths to 80 bits per word /90 nsec access time; 190 nsec cycle time / has nonv()latile form of storage that is mechanically al terable; individual bits, words, or entire memory contents can be modified A planar core memory specifically for greater storage capabili ty in N/C systems / for use with UMAC 6 controls, it accepts data in same manne~ thus no operator or programmer retraining is required / reported as more economical means for applications requiring over 32 offsets High speed (7200 rpm) provides 4.4 msec access time / stores 5 million to 20 million bits, densities to 1800 bpi / available with 256, 512 or 1024 tracks, each with own read/write flying head / option - controller logic to interface with user's central processor Compat Corp. 177 Cantiague Rock Rd. Westbury, N.Y. 11590 Attn: W. Craig Meyer Digital Equipment Corp. 146 Main St. Maynard, Mass. 01754 Attn: Dennis C. Goss Special Purpose Systems PDP-15/35 QUANTA~ Analyzer/Computer System RACE (Random Access Composition Equipment) Digital Equipment Corp. 146 Main St. Maynard, Mass. 01754 Attn: Howard Steiner Warlock Computer Corp. Route 7 Georgetown, Conn. 06829 Attn: Allan Kumble Memories COMFILED Memory System ICM-161 Core Memory System NCR 657 Disc Units NANOROM 90 READ-Only Memory System UMACORE Memory SA 8000 Series Drum 52 Honeywell Computer Control Old Connecticut Path Framingham, Mass. 01701 National Cash Register Co. Main & K Sts. Dayton, Ohio 45409 Memory Technology Inc. 83 Boston Post Road Sudbury, Mass. 01776 Attn: Paul Rosenbaum Vickers UMAC Division of Sperry Rand Corp. 2500 Trans Canada Hwy. Point Claire 730 Montreal, Quebec, Canada Systematics/Magne-Head Div. General Instrument Corp. 13040 S. Cerise Ave. Hawthorne, Calif. 90250 COMPUTERS and AUTOMATION for September, 1970 DESCRIPTION NAME/ MODEL NO. FOR MORE INFORMATION (Memories, continued) Varian 620 Disc Drives Four low-cost disc drives, Models 38A, 38B, 38C and 39, for 620 computer product line / storage capacities from 30,000 to 585,000 words / Model 39 (585,000 words) can be expanded with addition of slave for total capacity of 1,170,000 words Varian Data Machines 2722 Michelson Drive Irvine, Calif. 92664 Proprietary installation management package to support IBM System/370 Models 155 and 165 / permits rational cost accounting of multiprogrammed system usage / designed to interface with IBM OS/MVT Control Program / offered on a fully-maintained prepaid lease basis Assembly language subroutine / enables COBOL programmer to test and set bits / requires less than lK of core and relies on register usage for maximum processing speed / distributed on lease basis for one time fee of $595 For churches and synagogues / Contribution Record Reporting System (CRRS) is designed to provide more frequent and in-depth report to individual giving units / Membership Master Profile (MMP) includes complete demographic, interest, activity and membership information about each individual member of congregation / systems are compatible and provide flexibility to fit requirements in congregations of any denomination and size I wri tten in COBOL / available as a complete software system or as a processing service Automatic test data generator for DOS and OS COBOL programs / generates data by actually reading the COBOL Source Program / runs on IBM/360 with 24K of program core available A FORTRAN IV symbolic debugging system / written in AED-O language for operation in an interactive mode on the IBM 360/67 under the CP-67/CMS operating system / uses symbolic notation of source program during debugging Data Set Dump, Update, and Map utility programs for OS/360 users / eliminates most control card preparation / available for a free 21 day trial evaluation Systems Dimensions Ltd. 770 Brookfield Road Ottawa 8, Ontario, Canada Attn: N. L. Williams Software ACCOUNTPAK B2BCONV ("Bi ts .to Bytes Conversion") CHURCH CRRS/MMP DATAGEN FDS MASTER SERIES PIPTO For the trucking industry / a profit improvement program for terminal operations / designed to reduce labor costs and improve productivi~y TOTAL An integrated Data Base Management System / manages virtually unlimited number of data sets and allows for entry and association of each of data sets with any other data set in the data base / system is selfoptimizing_/ minimum design level normally 32K TriValent Enterprises, Ltd. P. O. Box 654 Greenwich, Conn. 06830 Attn: Norman M. Kittredge Tri-Data Systems 7301 Washing Ave. So. Edina, Minn. 55435 Programming Sciences Corp. 6 Eas t 43rd St. New York, N.Y. 10017 Attn: Howard Linzer SofTech, Inc. 391 Totten Pond Rd. Waltham, Mass. 02154 Attn: Alder M. Jenkins Infodata Systems Inc. 1901 No. Fort Myer Drive Arlington, Va. 22209 Attn: Donald H. Stromberg Walter Frederick Friedman and Co., Inc. 280 Madison Ave. New York, N.Y. 10016 Cincom Systems, Inc., 2181 Victory Pkwy. CinCinnati, Ohio, 45206 Attn: Tom Nies or Tom Richley Peripheral Equipment Addo-X Model 25-653-32 Data Input Machine DGC-301 Time-Sharing/Instrument Data Transfer System 531 Series Interface Unit Produces machine readable tape that can be transferred directly to disc or magnetic tape through reader / has optical character recognition capability, programming features, and optional check digit verification Designed for researchers, production test, medical and nuclear analysts, and process control personnel / couples various instruments to remote computer via a time-sharing terminal/accepts BCD data, stores data in memory, decodes data and presents it to terminal / directly compatible with all standard BCD, integrated circui t instruments and most older transistor instruments Ties mini- or midi-computer into System/360 / connects IBM 360 Interface Channel-to-Control unit to the minicomputer's standard I/O / minicomputer/531 combination is exact plug-to-plug replacement for IBM 2803 Controller, he~ce requires no special 360 programming COMPUTERS and AUTOMATION for September, 1970 Addo-X Inc. 437 Madison Ave. New York, N.Y. 10022 Attn: Tom Kibbe Data Graphics Corp. 8402 Speedway Drive San Antonio, Texas 78230 Attn: John Thompson Datawest Corp. 7503 E. Osborn Rd. Scottsdale, Ariz. 55 DESCRIPTION NAME/ MODEL NO. FOR MORE INFORMATION (Peripheral Equipment, continued) KI-680 and KI-880 DATASCRIBE~/Concentrator Magnafax 860 facsimile telecommunications unit Model 9600 Card Reader Optical Mark Reader (OMR 8421) SEACO Model 401 COM Recorder Typeliner Model III Remote Terminal Printer For off-line data acquisition and/or remote batch appli- Vanguard Data Systems, Inc. 1642 Kaiser Ave. cations / communicates with Teletype or IBM 2741 data terminal compatible devices / records in computer comIrvine, Calif. 92664 patible format on 2400 ft. reels of 7 or 9-track magnetic Attn: David A. Bowman tape / includes an unattended answering feature A two-speed model which offers option of 3 minute or 6 Magnavox Systems, Inc. minute transmission for full-page documents through a 80 Park Plaza East coupling to the telephone / can send to or receive from Garden State Pkwy. majority of facsimile units utilizing the Direct Dial' Saddle Brook, N.J. 07662 Tele hone Network / skilled 0 era tor not re uired Attn: Jim O'Malle For IBM System 3 96-column photoelectric device reads Bridge Data Products, Inc. cards at rates to 600 cpm / comes complete with trans738 South 42nd St. port, power supply, electronics, and skins / desk top Philadelphia, Pa. 19104 sized, weighing less than 50 Ibs. / optional field conversion kit gives multiple card capability For daily inventory control applications in department Automata Corp. and chain stores / desk top unit reads pencil marked,3~ 1305 Mansfield Ave. inch wide, fan-fold strip of any length / using inteRichland, Wash. 99352 data coupler, transmits via dial network to central receiver at effective rate of 400 characters per second 'Converts computer output (off-line or on-line) to micro- SEACO Computer-Display, Inc. 2826 West Kingsley Rd. film at rate of 36,000 characters per second / characters and symbols selected from 70-plus set and printed on Garland, Texas 75040 pages up to 140 characters per line, 64 lines per page / formatting under complete control of operator / lease and service contracts available For use with CRT terminals with plug-to-plug compatibil- Data Computing, Inc. 2219 W. Shangri La Rd. ity and with any modem / 80 colums upper and lower case alphabetic and standard ASCII 64 character set / 1001pm Phoenix, Ariz. 85029 Attn: Donald E. Oglesby print speed; printout on pinfeed, fanfold paper in multiple sets up to six and width of 9-7/8" Components Analog Circuit Modules LSls for 16-digit desk calculators Fifteen additions to analog module line includes multiplexers, dual amplifiers, sample and hold modules, D-A and A-D units / all have 12-bit accuracy, are compatible with DTL and TTL circuitry / used mostly for interfacing analog devices to a computer Large scale integrated circuits (LSls) available in 8 types: 2 memory units; five calculation control units; one display control unit / each measures 132" square / cuts overall size, weight to one-half of current machines Digital Equipment Corp. 146 Main St. Maynard, Mass. 01754 Attn: Dennis C. Goss Hitachi America, Ltd. 437 Madison Avenue New York, N.Y. 10022 Data Processing Accessories COM Support Equipment IBM System/3 Accessories Magnetic Ink Character Tester, Model MCT Line of viewer stations and cassette storage equipment for Computer Output Microfilm Systems / includes cantilevered aluminum-frame stations for viewe~ and viewerprinter equipment Coordinated accessory equipment specifically for IBM System/3 / includes small tray to hold 2250 96-column cards; modular cabinets hold to 30 trays and allow front to back or cross access filing, tub file, etc. Examines, evaluates signal level of printed characters to be scanned on a reader/sorter / tells whether documents are properly encoded according to American Banking Assoc. standards / for printers, banks, utilities, etc. Tab Products Co. 2690 Hanover St. Palo Alto, Calif. 94304 Attn: Vernon Craig Wright Line A Div. of Barry Wright Corp. 160 Gold Star Blvd. Worcester, Mass. 01606 Kidder Press Co., Inc. 279 Locust St. Dover, N.H. 03820 Service for libraries and informa tion centers / complete listings and ordering information for Institute of Electrical and Electronics Engineers publications / bi-monthly Technical evaluation of IBM's new computer line / emphasizes hardware and software facilities; discusses its degree of System/360 compatibility / $25.00 per copy IEEE 345 East 47th St. New York, N.Y. 10017 Datapro Research Corp. 2204 Walnut St. Philadelphia, Pa. 19103 New Literature IEEE Publications Bulletin The IBM System/370: an Independent Appraisal 56 COMPUTERS and AUTOMATION for September, 1970 NEW CONTRACTS Sperry Rand Corp., Univac Defense Systems Division, St. Paul, Minn. Lockheed-California Co. Collins Radio Co., Dallas, Texas Litton Industries, Data Systems Division, Van Nuys, Calif. Control Data Corp., Minneapolis, Minn. The National Center for Atmospheric Research (NCAR), Boulder, Colo. Litton Industries, Data Systems Div., Beverly Hills, Calif • Naval Electronics Systems Command Burroughs Corp., Detroit, Mich. U.S. Post Office Department Syner-Data, Inc., Beverly, Mass. Database, Ltd., London, England Computer Sciences Corp., Los Angeles, Calif. National Aeronautics & Space Administration (NASA) Sperry Rand Corp., Univac Division, Philadelphia, Pa. Bundeslanderversicherung, Vienna, Austria URS Data Sciences Co., Falls Church, Va. U.S. Army IBM Corporation, Los Angeles,' Calif • State of California, Dept. of Health Care Services Logicon, Inc., San Pedro, Calif. U.S. Navy Philco-Ford Corp., Communications and Technical Services Div., Ft. Washington, Pa. Stanwick Corp., Washington, D.C. U.S. Army Electronics Command, Ft. Monmouth, N.J. Peripheral Equipment Corp., Chatsworth, Calif. Logicon, Inc., San Pedro, Calif • Hazeltine Corp., Little Neck, N.Y. Computer Machinery Corp., Los Angeles, Calif. U.S. Air Force Space & Missile Organization Jet Propulsion Laboratory, Pasadena, Calif. Conrac Corp., New York, N.Y. Dallas Cowboys Football Club, Inc. , Texas Department of Manpower and Immigration, Ottawa, Canada U.S. Department of Health, Education and Welfare Information Science Industries (Canada), Ltd., Ottawa Computer Sciences Corp., Los Angeles, Calif. U.S. Navy System Development Corp. (SOC), Santa Monica, Calif. County of Los Angeles, Calif. Public Safety Systems Inc., a subsidiary of General Research Corp., Santa Barbara, Calif. American Regitel Corp. San Carlos, Calif. City of Anaheim, Calif. American Industries, Salt Lake City, Utah COMPUTERS and AUTOMATION for September, 1970 Design and development of nine UNIVAC 1832 Multiprocessor computers for the U.S. Navy's S-3A anti-submarine aircraft, and provide all systems software Design, build, test and deliver automatically-controlled communications equipment for the newly designated class of U.S. Navy ships known as LHA, general purpose amphibious assault ships A CDC 7600 computer system to expand current research activities in such areas as mathematical modeling of global atmospheric circulation patterns and convective storm systems, and global studies of long term climatic changes ' Development and production of automated Direct Air Support Centrals (DASC) for the U.S. Marine Corps. DASC will automate control of fighter-bombers and helicopters 50 letter sorter machines used in high speed processing of mail; ninth in the series of contracts to the Company since 1958 for letter sorter equipment, total value of contracts to date is $46.8 million 700 computer printing terminals: contract gives Database exclusive rights to sell and distribute Syner-Data's Alpha line printer and Beta serial printer in the United Kingdom, western Europe, Australia, southeast Asia, and Union of South Africa Operational support to the Simulation Laboratory at NASA's Ames Research Center near Mountain View, Calif. A UNIVAC 1106 computer system: use will include retrieval of data concerning insurance contracts, contract processing and control, various mathematical tasks Continued URS support to the U.S. Army Computer Systems Command (USACSC), Fort Belvoir, Va. Design, develop and install a prototype data based, communications system that will improve processing of claims under the State's Medi-Cal piogram Continuation of work on the TACDEW System (a large digital simulation of the Naval "at-sea" environment) which is used to train Naval personnel in combat direction and electronic warfare A modern telecommunications network expanding communications between Luzon and Cebu islands in the Philippines Continuation of data processing services, by Stanwick's Causality Data Company, related to Navy ship scheduling, budgeting, inventory management. etc. Model 6000 Series tape transports to be used in the CMC9 KeyProcessing Systems Missile guidance and control system performance evaluation studies Develop a Digital-Video Display System for use in support of planetary missions; will use displays and prints in analyzing mission performance Initial phase of a $1.5+ million scoreboard, scoring and information system A computer software system: lSI will provide over-all computerized services A computer-based information system to ass,ist the Rehabilitation Services Administration to increase scope, quality of services, while cutting administrative costs Preparing the design specifications for the County's computerized Regional Justice Information System (RJIS) A computerized traffic records system for use by Police Dept., City Traffic Engineer, count~ state,national safety organizations 100 80-column teleprinters lior use in medical data system) for doctor's offices, clinics $401- million $30 million (approximate) $8.6 million $7.2 million $6.1 million $5.6 million $3.3 million $3 million (approximate) $2.4+ million $2.2 million $1. 6 million $1.5+ million $1.5 million $1.4 million $1 million $849,000 $500,0001$500,0001$350,000 $308,000 $91,000 57 NEW INSTALLATIONS Burroughs B340 system First National Bank, Indiana, Pa. Burroughs B500 system City of Columbia, S.C. First National Bank and Trust Co., Ardmore, Okla. Burroughs B3500 system Oak Park Trust & Savings Bank of Illinois Order of the Sisters of St. Joseph, Orange, Cal if. Control Data 3500 system Hoogovens (the Royal Dutch Blast Furnaces and Steel ~orks) Control Data 6400 system IABG, Munich, Germany Honeywell Model 110 system ALESCO (The American Library and Educational Service Co.), Div. of Paulist Press, Paramus, N.J. Cambrian College, North Bay, Ontario, Canada Weber County, Ogden, Utah Honeywell Model 115 system IBM System 3 Andover Institute of Business, Andover, Mass. Sterl.ing Compu ter Sys tems, Los Angel es , Cal if . Dearborn Public Schools, Dearborn, Mich. Hayes International Corp., Air Force Publications Div., Middle Rive~Md. Refuge Assurance, Manchester, En land Marvin Windows, Warroad, Minn. IBM System/360 Model 25 Gym-Dandy, Inc., Bossier City, La. Honeywell Model 1200 system Honeywell Model 3200 system NCR Century 100 system First National Bank, St. Joseph, Mo. Garden City Cooperative Equity Exchange, Garden City, Kans. Medicenters of America, Inc., Memphis, Tenn. Northland Milk, Minneap·olis, Minn. NCR Century 200 system RCA Spectra 70/35 RCA Spectra 70/45 Univac 9000 Series computers Brockton Public Markets, Brockton, Mass. Hertfordshire County Council, Hertford, England State Revenue Department, Alabama American Home Foods, a div. of American Home Products Corp., Mil ton, Pa. Westinghouse Tele-Computer Systems Corp., Pittsburgh, Pa. (30 systems) Univac 9300 system Anastasi Bros., Inc., Philadelphia, Pa. B. C. Hospitals Association, Vancouver, B.C. Vancouver Stock Exchange Ltd., Vancouver, B.C. Univac 9400 system Escaut Insurance Company, Antwerp, Belgium Univac 9200 system 58 Checking accounts, proof and transit, Golden Passbook,stockholder accounting,account reconciliation (system valued at over $180,000) Water Department billing, collection, analysis; police court docket; traffic division, ticket enforcement, statistical analysis; City data processing, taxes, etc.; automotive accounting, inventory, analysis, of emergency medical services (system valued at over $430,000) General banking applications as well as muniCipal water billing, safe deposit boxes, amortization scheduling; bank is service bureau oriented (system valued at over $500,000) Demand deposit accounts, installment loan, proof/ transit, trust, bond portfolio, etc. (system valued at about $600,000) Processing and storing business and scientific data collected from nine hospitals operated by the Order (system valued at over $413,000) Central data base and information systems development; also expansion of its computerized production control system. presently on dual 3300 installation Expansion of firm's scientific and technical services to German aerospace industry and government. agencies (system valued at $2.5 million) Inventory management, order entry, invoicing and sales information applications Instruction in data processing and for administrative applications Property tax accounting, payroll, budget accounting, voter registration applications Computer education applications Applications including inventory control, accounting services and statistical report preparation Business and school services for the school district, which includes a community college Inventory control and distribution of U.S. Air Force forms and publications All areas of life aSsurance Producing a variety of financial statements and reports Provides production control, parts scheduling, sales monitoring, sales forecasting Personal trust accounting, certificates of deposit, payrOll , etc. Blending feed for cattle, billing, grain inventory; also used several hours daily by Garden City National Bank A patient accounting system for nationwide complex of over 40 recuperative care facilities in 24 states Maintaining route settlement accounts, ice-cream inventory, accounts payable Order billing, inventory control, automatic reorder, sales analysis, and payroll for 580 employees A variety of applications such as costing, stores control, highway design and payrOll for 35,000 Processing state income tax returns, motor vehicle registrations, state sales tax data Chef Boy-Ar-Dee plant customer billing for some 150 warehouses, and general accounting chores (system valued at $1 million) Serving as remote terminals (at various Westinghouse installations throughout U.S.) to a large-scale computer in Tele-Computer Center in Pittsburgh (systems valued at about $2 million) Applications including cost estimating, job cost distribution, payroll and general accounting Expediting operations of 37 hospitals with 16,000 employees Providing instantaneous information on volumes and prices; also prepares statistics and performs accounting operations Correlating accident statistics with premiums charged; also developing improved techniques to provide better and faster service to policy holders COMPUTERS and AUTOMATION for September, 1970 MONTHLY COMPUTER CENSUS Neil Macdonald Survey Editor COMPUTERS AND AUTOMATION The following is a summary made by COMPUTERS AND AUTOMATION of reports and estimates of the number of general purpose electronic digital computers manufactured and installed, or to be manufactured and on order. These figures are mailed to individual computer manufacturers from time to time for their information and review, and for any updating or comments they may care to provide. Please note the variation in dates and reliability of the information. Several important manufacturers refuse to give out, confi rm, or comment on any figures. Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit information for this census. We invite all our readers to submit information that would help make these figures as accurate and complete as possible. The following abbreviations apply: (A) authoritative figures, derived essentially from informat(on sent by the manufacturer directly to COMPUTERS AND AUTO/IATION figure is combined in a total acknowledgment is given to DP Focus, ~larlboro, Mass., for their help in estimating many of these figures figure estimated by CO/IPUTERS AND AUTO/IATION manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any way on those numbers stated here figures derived all or in part from information released indirectly by the manufacturer, or from reports by other sources I ikely to be informed sale only, and sale (not rental) price is stated no longer in production information not obtained at press time C (D) E (N) (R) (S) Part I of the Monthly Computer Census contains reports for United X States manufacturers. Part II contains reports for manufacturers outside of the United States. The two parts are published in alternate months. SUMMARY AS OF AUGUST 15, 1970 DATE OF NAME OF MANUFACTURER Part I. 'Unit~dStat~s'MaM~fact~~~rs Autonet i cs Anaheim, Calif. (R) (1/69) Bailey Meter Co. Wickl iffe, Ohio (R) (6/70) Bunker-Ramo Corp. Canoga Park, Calif. (A) ( 10/69) Burroughs Detroit, Mich. (N) ( 1/69-5/69) Control Data Corp. Minneapol is, Minn. (R) (9/70) NAME OF COMPUTER RECOMP II RECOMP III Bai ley 750 Bai 1ey 756 Bai ley 855 BR-130 BR-133 BR-230 BR-300 BR-330 BR-340 205 220 Bl00/B500 B2500 B3500 B5500 B6500 B7500 B8500 G15 G20 LGP-21 LGP-30 RPc4000 636/136/046 Series 160/8090 Series 924/924A 1604/A/B 1700 3100/3150 3200 3300 3400 3500 3600 3800 6400/6500 6600 6800 7600 FI RST INSTALLATION II/58 6/61 6760 2/65 4/68 10/61 5/64 8/63 3/59 12/60 12/63 1754 10/58 7/65 2/67 5/67 3/63 2/68 4/69 8/67 7155 4/61 12/62 9/56 1/61 AVERAGE OR RANGE OF MONTHLY ·RENTAL $ (000) 2.5 1.5 40-250 (S) 60-400 (s) 100-1000(S) 2.0 2.4 2.7 3.0 4.0 7.0 4.6 14.0 2.8-9.0 5.0 14.0 23.5 33.0 44.0 200.0 NUMBER OF INSTALLAtioNS In Outs i de In World U.S.A. U.S.A. 30 6 32 13 5 160 79 15 18 19 19 25-38 28-31 0 0 3 5 0 52-57 44 65-74 12 18 7 4 o I 1.6 2.1-14.0 11.0 45.0 3.8 10-16 13.0 20-28 18.0 25.0 52.0 53.0 58.0 115.0 130.0 235.0 2/69 5/70 5/69 2/70 12764 10/67 11/60 8/62 9/63 10/64. 11/64 4/65 3/68 9/66 11/68 12/66 11/68 12/67 3/70 9/69 2/16 9/66 8.0 9.6 54-200 33-200 19.5 25.0 3.4 1.7 0.9 10.0 1.3 0.5 0.4. 0.3 X X o I 20 X X 2 2 o o o 27-40 30-33 64-69 '62 72-81 4 o I 295 20 165 322 75 29 610 29 59 106-180 83-110 55-60 200 20 15 39 20 85 85 15.5 0.7 1.3 1.9 5/60 8/61 1/60 5/66 5/64 5/64 9/65 11/64 8/68 6/23 2/66 8/64 8/64 6/67 12/68 30 6 35 18 5 NUMBER OF UNFI LLED ORDERS I I X X X X X X 117 190 8 60 13 5 X X X X X X X X C C C C C C C C C C C C Total: 160 Data General Corp. Southboro, Mass. (A) (6/70) Datacraft Corp. Ft. Lauderdale, Fla. (A) (9/70)Digiac Corp. PI ainview, N.Y. (A) (2/70) Digital Equipment Corp. Marnard, Mass. (A (6170) NOVA SUPERNOVA 602471 6024/3 Dlgiac 3080 Di~iac 3080c PD -I PDP-4 PDP-5 PDP-6 PDP-7 PDP-8 PDP-81l PDP-8/s PDP-8/L PDP-9 PDP-9L PDP-IO PDP-II PDP-12 PDP-15 LI NC-8 COMPUTERS and AUTOMATION for September, 1970 (s) (S) (S1 (S) (5) (S) C 1.1 8.0 10.5 17.0 9 17 14 5 SO 40 90. C C (S) C C C C C C C C 6 0 650 22 9 17 2 52 X 5 10 C C C C C C C C C C C C C 45 100 23 160 1450 X X X C H57 C 1020 2350 C C 6 4~5 41 Ilt4 27 275 15 142' 4 54 X. C C C C C C C Total: 1350 59 NAME OF MANUFACTURER Electronic .Associates Inc. Long Branch! N.J. (A~ (6/70) EMR Computer Minneapolis, Minn. (N) (6/70) NAME OF COMPUTER 640 8400 'EAR 6020 EMR 6040 EMR 6050 EMR 6070 EMR 6120 EMR 6130 EMR 6135 DATE OF FIRST INSTALLATION 4/67 7/65 4765 7/65 2/66 10/66 8/67 AVERAGE OR RANGE OF MONTHL V RENTAL $(000) 1.2 12.0 5.4 6.6 9.0 15.0 0.8 5.0 2.6 NUMBER OF INSTALLATIONS In Outside In Worl d U.S.A. U.S.A. 85 19 C C C C 35 6 120 25 Total: 90 E General Electric Phoen i x, Ariz. (N) (9/70) Process Cont ro 1 Computers: (A) (6170) Hewlett Packard Cupertino, Cal if. (A) (9/70) Honeywell Computer Control Div. Framingham, Mass. (R) (9/70) Honeywe 11 EDP Di v. We 11 es 1ey Hill s , Mass. (R) (6/70) IBA White Plains, N.V. (N) (D) (1/69-5/69) 60 58 105A 105B 10$RTS 115 120 130 205 210 215 225 235 245 255 T/S 265 T/S 275 T/S 405 410 T/S 415 420 T/S 425 430 T/S 435 440 T/S 615 625 635 655 4020 4040 4050 4060 2114A 2115A 2116A~ 2116B DDP-2 DDP-116 DDP-124 DDP-224 DDP-316 DDP-416 DDP-516 H112 H632 H1648 H-1l0 H-115 H-120 H-125 H-200 H-400 H-800 H-1200 H-1250 H-1400 H-1800 H-2200 H-3200 H-4200 H-8200 System 3 305 650 1130 140 I 1401-G 1401-H 1410 1440 1460 1620 1, 11 1800 7010 7030 704 7040 7044 705 7070, 2 7074 7080 7090 7094-1 5170 6/69 6/69 7/69 4/66 3/69 12/68 6/64 7/60 9/63 4/61 4/64 11/68 10/67 10/65 11/68 2/68 11/69 5/64 6/67 6/64 6/69 9/65 7/69 3/68 4/65 5/65 12/70 2/67 8/64 12/66 6/65 10/6B 11/67 11/66 5/63 4/65 3/66 3/65 6/69 9/66 10/69 12/68 11/68 BJ6B 6/70 1/66 12/67 3/64 12/61 12/60 2/66 7/68 1/64 1/64 1/66 2/70 8/68 12/68 1170 12/57 10/67 2/66 9/60 5/64 6/67 11/61 4/63 10/63 9/60 1/66 10/63 5/61 12/55 6/63 6/63 11/55 3/60 3/60 8/61 11/59 9/62 \.0 1.3 1.4 1.2 2.2 2.9 4.5 2.9 16.0 6.0 8.0 12.0 13.0 17.0 20.0 23.0 6.8 11.0 7.3 23.0 9.6 17.0 14.0 25.0 32.0 43.0 47.0 80.0 6.0 3.0 7.0 2.0 0.25 0.41 0.6 2.65 0.9 2.2 3.5 0.6 420-680 620-1080 11 35 15 145 40-60 3 15-20 45-60 0 0 1 15 17 11 35 16 160 57-77 3 15-20 60-90 10 15-45 15-30 10-40 170-300 70-100 240-400 50-100 20-30 70-130 20 6 26 23 20-40 3 3 26 23-43 46 20 1 2 1.2 3.2 12.0 2.7 3.5 4.8 7.0 7.5 10.5 30.0 9.8 12.0 14.0 50.0 18.0 24.0 32.5 50.0 1.1 3.6 4.8 1.5 5.4 2.3 1.3 17.0 4.1 10.0 4.1 5.1 26.0 160.0 32.0 25.0 36.5 38.0 27.0 35.0 60.0 63.5 75.0 180 30 800 150 800 46 58 230 130 4 15 125 20 18 10 0 40 50 2580 2210 420 180 156 1690 194 285 415 67 4 12 35 28 18 10 44 13 4 10 15 2 C C C C Total: 30 E 200-400 148 45 22 18 NUMBER OF UNFI LLED ORDERS 75 160 220 275 40 15 90 55 6 5 60 2 2 3 0 15 18 1227 1836 450 140 116 1174 63 186 148 14 1 1 27 13 3 3 26 2 2 4 194 65 23 20 915 663 1156 90 250 175 60 300 225 700 45 10 15 255 30 960 370 1075 86 73 325 185 10 20 185 22 20 14 70 X 0 X X X X 55 68 3807 4046 870 320 272 2864 257 471 563 81 5 13 2 41 21 13 70 15 6 14 COMPUTERS and AUTOMATION for September, 1970 NAME OF MANUFACTURER IBM (Cont'd.) NAME OF COMPUTER 7094-11 360/20 360/25 360/30 360/40 360/44 360/50 360/65 360/67 360175 I nte rdata Oceanport, N.J. (A) (9/70) NCR Dayton, Ohio (R) (9/70) Phi 1 co Wi Ilow Grove, Pa. (N) (1/69) RCA Cherry Hi 11, N.J. (N) (5/69) Raytheon Santa Ana, Cal if. (A) (9/70) Scientific Control Corp. Dallas, Tex. (A) (6/70) Standard Computer Corp. Los Angeles, Calif. (N) (6/70) Systems Engi neeri ng Laboratories Ft. Lauderdale, Fla. (A) (6/70) UNIVAC (Div. of Sperry Rand) New York, N.Y. (R) ( 1/69- 5/69) Varian Data Machines Newport Beach, Cal if. (A) (9170) Xerox Data Systems El Segundo, Calif. (N) (4170) DATE OF FI RST INSTALLATION 4/64 12/65 1/68 5/65 4/65 7/66 8/65 11/65 10/66 2/66 360/85 360/90 11/67 360/195 Model 2 7768 Model 3 3/67 Model 4 8/68 304 1/60 310 5/61 315 5/62 315 RMC 9/65 390 5/61 500 10/65 Century 100 9/68 Century 200 6/69 1000 6/63 2000-210,211 10/58 2000-212 1/63 301 2161 501 6/59 601 11/62 3301 7/64 Spectra 70/15 9/65 Spectra 70/25 9/65 Spect ra 70/35 1/67 Spectra 70/45 11/65 Spectra 70/46 Spect ra 70/55 11/66 250 12/60 440 3/64 520 10/65 703 10/67 704 3/70 706 5/69 50 5 10/66 655 660 10/65 670 5/66 4700 4169 DCT-132 5/69 I C 4000 12168 IC 6000 5/67 I C 7000 6/69 810 9/65 810A 8/66 810B 9/68 840 11/65 840A 8/66 840MP 1/68 Systems 86 I & II 3/51 & 11/57 III 8/62 Fi Ie Computers 8/56 Solid-State 80 I, II, 90 , I , I I, & Step 8/58 418 6/63 490 Series 12/61 1004 2/63 1005 4/66 1050 9/63 1100 Series (except 1107, 1108) 12/50 1107 10/62 1108 9/65 9200 6/67 9300 9/67 9400 5/69 LARC 5/60 620 11/65 620 i 6/67 R-620 i 4/69 520i 10/68 11170 620 520/DC 12/69 XDS-92 4/65 XDS-910 8/62 XDS-920 9/62 XDS-925 12/64 XDS-930 6/64 XDS-940 4/66 11/64 XDS-9300 Sigma 2 12/66 Sigma 3 12/69 Sigma 5 8/67 Sigma 7 12/66 COMPUTERS and AUTOMATION for September, 1970 AVERAGE OR RANGE OF MONTHLY RENTAL $ (000) 83.0 2.7 5.1 10.3 19.3 11.8 29. I 57.2 133.8 66.9 150.3 (S) 232.0 0.25 0.4 0.6 14.0 2.5 8.7 12.0 1.9 1.5 2.7 7.5 7.0 40.0 52.0 7.0 14.0-18.0 14.0-35.0 17.0-35.0 4.3 6.6 9.2 22.5 33.5 34.0 1.2 3.6 3.2 12.8(S) 9.8(S) 19.0 S 0.5 2.1 2.1 2.7 1.8 0.7 9.0 16.0 17.0 1.1 0.9 1.2 1.5 1.5 '2.0 10.0 25.0 21.0 15.0 NUMBER OF INSTALLATIONS Outside In In Worl d U.S.A. U.S.A. 4 6 10 4690 3276 7966 o 4 4 5075 1260 65 480 175 3144 498 13 109 31 8219 1758 78 589 206 13 17 9 14 o 5 15 4 3 o o 2 8 o 400 125 350 1100 600 150 300 45 600 1550 200 50 )6 16 12 140-290 22-50 o 5 70 95 8 X 17 X X X 2 o 24-60 90-11 0 68-70 65-100 84-180 1-5 35-60 18-25 20-50 21-55 25-65 125-170 86-95 85-150 105-235 100-130 2 1 11 o 1 12 155 20 175 1 20 20 27 181 18 6 4 1 44 23 137 41 9 3 o o o o o o o o o 24 211 75 o 24 5 1 216 76 2 38 31 16 40 6 3 36 31 o 23 25 13 o o o 6 24 6 9 3 3 o 31 1 8 E 10 E X 32 26 X X 2 2 X X X 9 8 o 3 9 11 38 127 106 18 48 38 56 175 144 36 11 628 299 62 o o 112 86 2130 936 200 3 2 7-10 5-12 1 14 o 1 10-15 o 6-18 5-9 X 20 35 20 90 10 E E X X 75 850 550 60 E E E E 2 75 1200 30 125 10-60 150-170 93-120 20 159 28-35 21-25 60-110 10 15":40 24-35 o o X 35.0 57.0 68.0 1.5 3.4 7.0 135.0 0.9 0.5 0.4 0.5 1.6 1.5 2.0 2.9 3.0 3.4 14.0 8.5 1.8 2.0 6.0 12.0 1 12 10 X 16 40 210 76 75 1502 637 138 3 X X X 1 8.0 11.0 30.0 1.9 2.4 8.5 2 x 700 170 950 2650 800 200 240-420 23-51 1 o 18 230 175 1 20 26 161 12 40 23 137 41 NUMBER OF UNF I LLED ORDERS 18 12-62 157-180 98-132 21 173 28-35 22-26 70-125 10 21-58 29-44 X 400 30 330 125 25 61 E E E CALENDAR OF COMING ,EVENTS Sept. 1·3, 1970: 25th National Conference, Association for Computing Machinery, New York Hilton, New York, N.Y.! contact: Sam Matsa, ACM '70 General Chairman, IBM Corp., 410 E. 62nd St., New York, N.Y. 10021 Sept. 2·4, 1970: The Institution of Electrical Engineers (lEE) Conference on Man·Computer Interaction, UK National Physical laboratory, Ted· dington, Middlesex, England! contact: Roger Dence, lEE Press Office, Savoy Place, london WC2, England Sept. 14.15, 1970: Society for Management .Information Systems (SMIS) 1970 Conference, The Shoreham Hotel, Washington, D.C. ! contact: The Society for Management Systems (SMIS), c/o Prof. John F. McCarthy, Jr., P.O. Box 16, Benjamin Franklin Station, Washington, D.C. 20044 Sept. 14·16, 1970: First Canadian Computer Show and Conference, Montreal, Canada / contact: Jack McCaugherty, James Lovick Ltd., Vancouver, British Columbia, Canada Sept. 14·17, 1970: 15th Annual Technical Symposium of The Society of Photo·optical Instrumentation Engineers (SPIE), Anaheim, Calif. / contact: SPIE, Attn: Symposia Vice President, P.O. Box 288, Redondo Beach, Calif. 90277 Sept. 15·17, 1970: 16th Annual Seminar of the American Society for Industrial Security, Sheraton Boston Hotel, Boston, Mass. / contact: Edward G. Goulart, Public Relations Chmn., M.I.T. lincoln laboratory, 244 Wood St., lexington, Mass. 02173 Sept. 16-18, 1970: Digital Equipment Computer Users Society (DECUS) European Branch, Kunsterhaus, Munich, Germany / contact: Martha Ries, DECUS European Secretary, c/o DECUS International Office, 81 Route de l' Aire, 1227 Carouge, Geneva, Switzerland Sept. 17·18, 1970: Computer Science and Statistics Symposium, sponsored by the Los Angeles Chapter of the ACM, University of California, Irvine, Calif./ contact: Dr. Mitchell O. locks, C-E-I-R Professional Services Div., Control Data Corp., 6060 W. Manchester, los Angeles, Calif; 90045; or Dr. Michael E. Tarter, Assoc. Prof., Dept. of Mathematics and Dept. of Medicine, University of California, Irvine, Calif. 92664 Sept. 22·24, 1970: The Computers and Communications Conference (IEEE), The Beeches, Rome, N.Y.! contact: Jerold T. McClure, Conference Chairman, P.O. Box 182, Rome, N.Y. 13440 Sept. 22·24, 1970: Univac Users Association Fall Conference, Roosevelt Hotel, New Orleans, lao / contact: User Group Relations, Univac Division, Sperry Rand Corp., P.O. Box 500, Blue Bell, Pa. 19422 Sept. 14·24, 1970: 1970 FID (International Federation for Documenta· tion) Conference and International Congress on Scientific Informa· tion, Buenos Aires, Argentina! contact: U.S. National Committee for FlO, National Academy of Sciences, 2101 Constitution Ave., Washington, D.C. 20418 Sept. 28·30, 1970: 6th Annual Meeting of the Association of American Railroads Data Systems Div., Annual Equipment Show,· Regency Hyatt House, Atlanta,' Ga. / contact: Trade Associates, Inc., 5151 Wisconsin Ave., N.W., Washington, D.C. 20016 Sept. 15·16, 1970: 4th Annual Instrumentation Fair, Washington Hilton Hotel, Washington, D.C. / contact: Norm Ward, AD-TECH, P.O. Box 475, Mclean, VA 22101 Sept. 29, 1970: 'Symposium on "Present and Future Uses of Computers in the Chemical Industry", sponsored by the Soci'tlty of Consulting Chemists and Chemical Engineers, White Plains Hotel, White Plains, CLASSIFIED ADVERTISEMENTS ADVERTISING INDEX GEORGE S. McLAUGHLIN ASSOCIATES, INC. will buy or sell your used System/ 360, 1400, or 700 Series Special Type Heads Prepared for IBM Selectric Equipment Camwil supplies custom modi· fications of existing IBM and Camwil type heads for Selectric typewriters, Composers, accounting machines, and computer terminals. We also mold new type heads to your specified formats or you may choose from our stock of molded type heads which includes computer and teletype codes, foreign languages, chemical and library formats. CAMWIL, INC. 835 Keeaumoku Street Honolulu, Hawaii 96814 62 201-273-5464 785 Springfield Avenue Summit, New Jersey 07901 PDP9 LEASE FOR SALE STANDARD PAPERTAPE READER ;PUNCH & TTY KG09H Ext Mem Control • MM09A (9, 129) Mem Extension • CR03B Card Reader & Control · KF09A Auto Priority Interrupt KP09A Pow Fail & Auto Restart · DB97A PDP9-PDP7 Interprocess Buffer · BULK STORAGE INTERFACE Control Logic for IBM 2321 Data Cell (800 x 106 bytes; 175-600 ms) · Data Line Interface for Twenty Serial Lines $2762/Mo. C. Miller, Dir; Research Data Facility 2200 Webster St., San Francisco, Cal. 415-346-5135 Following is the index of advertisements. Each item contains: Name and address of the advertiser / page number. where the advertisement appears / name of the agency, if any Abercrombie & Fitch, P. O. Box 2991, Clinton, IA 52732 / Page 3 / Media Selection Corp. Academic Press, Inc., 111 Fifth Ave., New York, NY 10003 / Page 2 / Flamm Advertising Beemak Plastics, 7424 Santa Monica Blvd., Los Angeles, CA 90046. / Page 37 / Camwil, Inc., 835 Keeamoku St. , Honolulu, HI 96814 / Page 62 / Richard T. Clarke Co. Computers and Automation, 815 Washington St., Newtonville, MA 02160 / Page 64 / Miller-stephenson Chemical Co. , Inc., Route 7, Danbury, CT 06810 / Page 31 / Michel-Cather, Inc. University Microfilms, Xerox Education Group, 204 North Zeeb Rd. , Ann Arbor, MI 48106 / Page 7 / Brian Connelly Advertising, Inc. COMPUTERS and AUTOMATION for September, 1970 N.Y. I contact: Association of Consulting Chemists and Chemical Engineers, Inc., 50 East 41st St., New York, N.Y. 10017 York, N.Y. / contact: Data Processing Supplies A~sociation, 1116 Summer St., P.O. Box 1333, Stamford, Conn. 06904 Oct. 5-7, 1970: 1970 Symposium on Feature Extraction and Selection in Pattern Recognition, Argonne National Laboratory, Argonne, III. I contact: David Jacobsohn, Argonne National Laboratory, Argonne, IL 60440 Oct. 26·28, 1970: Forum of Control Data Users (FOCUS) Regional Conference, Statler Hilton Hotel, Washington, D.C. / contact: William I. Rabkin, FOCUS Exec. Sec., c/o Itek Corp., 10 Maguire Rd., Lexington, Mass. 02173 Oct. 5-9, 1970: Computer 7G--lnternational Computer Exhibition, Olympia, London, England I contact: M. F. Webster, Leedex Limited, 100 Whitechapel Road, London, E.l., England Oct. 26-29, 1970: 25th Annual iSA Conference & Exhibit, Civic Center, Ph1ladelphia, Pa. / contact: K. F. Fitch, Meetings Coordinator, Instrument Society of America, 530 William Penn Place, Pittsburgh, Pa. 15219 ./ Oct. 7-9, 1970: American Production and Inventory Control Society 13th Annual International Conference, Ohio Convention Exposition Center, Cincinnati, Ohio I contact: APICS National Office, Suite 504, Watergate Bldg., 2600 Virginia Ave., N.W., Washington, D.C. 20037 Oct. 11-14, 1970: 33rd Annual Meeting of the American Society for Information Science (ASIS), Sheraton Hotel, Philadelphia, Pa. I contact: ASIS 1970 Convention Chairman, Dr. Eugene Garfield, Institute for Scientific Information, 325 Chestnut St., Philadelphia, Pa. 19106 Oct. 12-13, 1970: Sixth National Data Processing Conference of the Information Processing Association of Israel, Tel Aviv Hilton Hotel, Tel Aviv, Israel I contact: S. Shalish, Chmn., Information Processing Association of Israel, P.O.B. 3009, Jerusalem, Israel Oct. 12-14, 1970: SIAM (Society for Industrial and Applied Mathematics') 1970 Fall Meeting, Hotel Lenox, Boston, Mass. I contact: Genera I Chairman, SIAM 1970 Fall Meeting, 33 South 17th St., Philadelphia, Pa. 19103 Oct. 12-16, 1970: USE Fall Conference, Sheraton-Biltmore Hotel, Atlanta, Ga. / contact: User Group Relations, Univac Division, Sperry Rand Corp., P.O. Box 500, Blue Bell, Pa. 19422 Oct. 13, 1970: Second Annual TDCC (Transportation Data Coordinating Committee) Seminar on the Computerization of Transportation Data and Information Systems, Presidential Ballroom, Statler Hilton, Wushington, D.C. / contact: Transportation Data Coordinating Committee, 1101 Seventeenth St. NW, Washington, D.C. 20036 Oct. 14-16, 1970: ADAPSO's 30th Management Conference & 9th Annual Meeting, Paradise Island Hotel, Nassau, Bahamas / contact: ADAPSO (Association of Data Processing Service Organizations, Inc.), 551 Fifth Ave., New York, N.Y. 10017 Oct. 14-16, 1970: IEEE Systems Science & Cybernetics Conference, Webster Hall Hotel, Pittsburgh, Pa. / contact: Prof. A. Lavi, Carnegie-Mellon Univ., Pittsburgh, Pa. 15213 Oct. 14·16, 1970: International Conference on Management Informa· tion Systems, Copenhagen, Denmark / contact: Harald Josefsen, Program Committee Chmn., The Danish EDP Council, Vesterbrogade 1, DK-1620 Copenhagen V, Denmark Oct. 14·16, 1970: Conference on Earth Station Technology, London, England / contact: Helen Kaye, The Institution of Electrical Engineers, Savoy Place, London WC2, England r Oct. 14·17, 1970: International Symposium on Digital Computer Appli· cations in Engineering Sciences, Technical University of Istanbul, Turkey / contact: F. A. Akyuz, I.T.U. Hesap Merkezi (Computation Center), Taskisla 114, Istanbul, Turkey Oct. 15-16, 1970: 1970 Atlantic Div. of Assoc. for Systems Manage. ment Eighth Annual Atlantic Systems Conference, New York Hilton, New York City, N.Y. / contact: Malcolm B. Foster, A.S.C., Box 461, Pleasantville, N.Y. 10570 Oct. 19·20, 1970: 5th Annual Conference, Digitronics Users Association (DUA), Ambassador Hotel, Chicago, III. / contact: Executive Secretary, DUA, Box 113, Albertson, L.I., N.Y. 11507 Oct. 19·21, 1970: 11th National Meeting of The Institute of Management Sciences, Los Angeles Hilton Hotel, Los Angeles, Calif. / con~ tael: Gene Saxby, Security Pacific National Bank, P.O. Box 2097 Terminal Annex, Los Angeles, Calif. 90054 Oct. 20, 1970: Division 11 Fall Conference of the Pittsburgh Chapter of the Data Processing Management Association, Pittsburgh, Pa. / contact: James J. Dean, P.O. Box 2004, Pittsburgh, PA 15230 Oct. 26·28, 1970: Data Processing Supplies Association, Fall General Meeting, The Park Sheraton Hotel, 7th Ave., and 56th St., New COMPUTERS and AUTOMATION for September, 1970 Oct. 26-30, 1970: 12th Annual BEMA Business Equipment Exposition, New York. Coliseum, New York, N.Y. / contact: Business Equipment Manufacturers Association (BEMA), 1828 "L" St. NW, Washington, D.C. 20038 Oct. 27·29, 1970: 12th Annual BEMA Management Conference, American Hotel, New York, N.Y. / contact: Business Equipment Manufacturers Association (BEMA), 1828 "L" St. NW, Washington, D.C. 20038 Oct. 27-30, 1970: Midwest Power Systems Conference and Symposium (IEEE co-sponsor), Iowa State University, Ames, Iowa / contact: H. K. Baker, Engineering Extension, 110 Marston Hall, Iowa State University, Ames, Iowa 50010 Oct. 29-30, 1970: IEEE Joint Engineering Management Conference, Drake Hotel, Chicago, III. / contact: AilE Headquarters, 345 E. 47th St., New York, N.Y. 10017 Nov. 10-12, 1970: National Symposium on Criminal Justice Information and Statistics Systems, Sheraton-Dallas Hotel, Dallas, Texas / contact: Project SEARCH, 1108 14th St. Fifth Floor, Sacramento, Calif. 95814 Nov. 12-13, 1970: Canadian IEEE Symposium on Communications, Queen Elii:abeth Hotel, Montrea I, Quebec, Canada / contact: IEEE Headquarters, Technical Conference Services, 345 E. 47th St., New York, N.Y. 10017 Nov. 12·13, 1970: CAST '70 Conference (AilE), The Americana Hotel, Miami Beach, Fla. I contact: Joseph P. Lacusky, American Institute of Industrial Engineers, Inc., CAST '70, P. O. Box 1081, Miami, Fla. 33148 Nov. 12-13, 1970: 11th IEEE Symposium on Man·Machine Systems, Langford Hotel, Winter Park, Fla. / contact: The Institute of Electrical and Electronics Engineers, Inc., 345 East 47th St., New York, N.Y. 10017 Nov. 16, 1970: ACM Computer Graphics Workshop, Houston, Tex. / contact: Jackie Potts, ACM, SIGGRAPH, Box 933, Blair Station, Silver Spring, MD 20910 Nov. 17-19, 1970: Fall Joint Computer Conference, Astro Hall, Houston, Tex. / contact: L. E. Axsom, IBM Scientific Ctr., 6900 Fannin, Houston, Tex. 77025 Nov. 19·21, 1970: DECUS (Digital Equipment Computer Users Society) 1970 Fall Symposium, Shamrock Hilton, Houston, Texas / contact: DECUS, Digital Equipment Corp., Maynard, Mass. 01754 Dec. 2·3, 1970: Conference on Display Devices, United Engineering Ctr., New York, N.Y. / contact: Sam Stone, Gen'l Tel. & Elec., 208-20 Willets Pt. Blvd., Bayside, N.Y. 11360 Dec. 7-9, 1970: 9th IEEE Symposium on Adaptive Processes: Decision and Control, Univ. of Texas, Austin, Tex. / contact: Prof. D. G. Lainiotis, Engineering Science Bldg., 502, Univ. of Texas at Austin, Austin, Tex. 78712 Dec. 7·9, 1970: 26th Annual National Electronics Conference and Exhibition (NEC/70), Conrad Hilton Hotel, Chicago, III. / contact: NEC, Oakbrook Executive Plaza #2, 1211 W. 22nd St., Oak Brook, III. 60521 Dec. 9·11, 1970: Fourth Conference on Applications of Simulation, Waldorf-Astoria, New York, N.Y. I contact: Association for Computing Machinery, 1133 Avenue of the Americas, New York, N.Y. 11036 Jan. 31-Feb. 5, 1971: IEEE Winter Power Meeting, Statler Hilton Hotel, New York, N.Y. / contact: IEEE Headquarters, Technical Conference Service, 345 E. 47th St., New York, N.Y. 10017 63 THE MA Y ARTICLE THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY: THE APPLICATION OF COMPUTERS TO THE PHOTOGRAPHIC EVIDENCE Computers and Automation, published in its May issue a 32-page feature article, "The Assassination of President Kennedy: the Application of Computers to the Photographic Evidence"o In this article, Richard E. Sprague, President, Personal Data Services, Hartsdale, N.Y., states that analysis of the evidence proves: • that the Warren Commission conclusions (that Lee Harvey Oswald was the sole assassin,_ and that there was no conspiracy) are false; • that there were at least four gunmen firing from four locations, none of whom was Oswald; that the conspiracy to kill Kennedy involved over 50 persons (of whom several are identified in the article) including members of the Dallas police, and elements of the Central Intelligence Agency of the United States; etc. The evidence published in this article includes eleven important photographs. One of them shows Jim Hicks, who admitted he was the radio communicator'among the firing teams at Dealey Plaza, with his radio' transmitter in his back left pocket. The article includes a tabulation of over 500 photographs (counting a movie sequence as one photo) taken in and around Dealey Plaza, Dallas, Texas, Nov. 22,.1963, at the time of President Kennedy's assassination and shortly thereafter~ Both a spatial chart and a timing chart of the events and the photographs are included in this article. Sprague, a computer professional for over 24 years, has as an avocation, studied the old and the _ ~newdevidence for over 6 years,.and has analyzed over 400 of the 500 photographs. The work in computerized analysis of over 300 still photos and over 25,000 frames of movie sequences has been started. To obtain your copy of this extraordinary report, please complete and mail'the following order: - -(may be copied on any piece of paper)To: Computers and Automation, Dept. P 815 Washington St. Newtonville, Mass. 02160 Please send me ( ) copy(ies) of the May 1970 issue containing the article on President Kennedy's assassination. I enclose $4.00 ( ) check ( ) money order for each copy. (Please do not s~d cash.) If not satisfactory, returnable i~ 7 days for full refund (if in salable conditidn)o My name and address are attached. Discount: 10%, 5 to 9 copies; 20%, 10 or more copies Special price: $1.00 for students (attach evidence); $1.00 for non-profit organizations An excerpt from the /.Jay article Part 2. The Photographic Evidence The assassination of President John F. Kennedy was the most photographed murder in history. Approximately 75 photographers took a total of approximately 510 photographs, either before or during or within an hour after the events in Dealey Plaza, and either there or nearby or related to those events. The word "photograph" in.this context includes both still photos and movie s~quences. The number of frames in a movie sequence ranges from about 10 to abortt 500; and in the count of 510 photographs given above, the 10 to 500 frames of a single movie sequence are counted just as ~ photograph. The total number of frames is over 25,000. The Warren Commission examined 26 photographs, about 5 percent of the 510. The FBI examined about ,50 photographs " or about 10 percent. The most famous. of all the photographs is the Zapruder film, which had over 480 frames. Many~f ~he·photographs:were~aken-by professional photographers. About 30 of'the photographers were professionals who worked for newspapers, television .networks ,.:andphotogr,aphic'agencies. TheWarr.en, Commis'sion .did: not interview .a single one of the profes:si.onal'.photographers, nor did the WarrenCommis~ion'see'any'of their-photographs. Fifteen~of~these-professionals-were actually in .-the .Kennedy.motorcade, :no.further than 6 .car .lengths behind the Kennedy car. Five of these photographers were televi sion network . cameramen. The Warren . CommiSsion looked 'at none of their photographs. Two of the photographers were from the White House. One of these men (Thomas Atkins) was the regular photographer for the White House. He made a special film for Lyndon B. Johnson. Atkins used hiS own film plus some footage obtained from the television photographers. Johnson looked at the film and then put it away. This film is now stored with the Kennedy Memorial Library materials in a warehouse in Washington, D.C.; it is stated to be "unavail able" to researchers. The Commi ssion did not see this film, nor did they interview Atkins. Because the professionals used movie cameras of professional quality, their films are exceedingly revealing and valuable as primary evidence. The Warren Commission looked at none of these films. Chart 2 of this article shows the times of about 50 of the photographs taken in Dealey Plaza during Kennedy's passage through it. Table 3 of this article lists over 510 photographs so far identified and known to exist or to have existed -- with possibly a few borderline cases. \ ",' 1 \ " \
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Producer : Adobe Acrobat 9.1 Paper Capture Plug-in Modify Date : 2009:03:24 20:51:56-07:00 Create Date : 2009:03:24 20:51:56-07:00 Metadata Date : 2009:03:24 20:51:56-07:00 Format : application/pdf Document ID : uuid:ae20dc15-3fb7-43ad-aebf-03cb2717a50a Instance ID : uuid:60bfe2a4-97ab-4215-8a75-aa5f6b278c05 Page Layout : SinglePage Page Mode : UseNone Page Count : 60EXIF Metadata provided by EXIF.tools