197102
197102 197102
User Manual: 197102
Open the PDF directly: View PDF .
Page Count: 60
Download | |
Open PDF In Browser | View PDF |
SCiENee & TECHN010GV February, 1971 Vol. 20, No. 2 CD Studying Electronic Circuits ~~t ~0'11 /,'J..ltl V --- The New York Times and Computers and Automation announce a practical guide to the most elusive components in computers and data processing ... PEOPLE Who they are ... What they do ... Where they do it ... Until now, it has been well-nigh impossible to keep track of the thousands of highly skilled professionals engaged in the world's fastest growing profession. The painstaking task required to inventory the qualifications and backgrounds of the 15,000 most necessary professionals in every branch of the computer field has now been accomplished. The oldest magazine in the field, Computers and Automation, and the information retrieval services of The New York Times have pooled their resources to produce the Fifth Edition of PLUS both homp WHO'S WHO IN COMPUTERS AND DATA PROCESSING ( This is the most extensive register of computer professionals ever published - the first of its kind in seven years. It is arranged for your convenience in three volumes: 1. Systems Analysts and Programmers 2. Data Processing Managers and Directors 3. Other Computer Professionals (from professors of computer science to attorneys versed in the computer field) Each of the more than 15,000 specialists is covered by a separate capsule biography detailing: Birth Date ... Education . .. Year Entered Computer Field . .. Title . .. Honors . .. Memberships . .. Special Skills (from applications to logic to sales) ... ~nll hm,;no",... ....1 ~ ;:. ';:~ ': 1;' g ;~i. ~. :-: -~. l;:~; 1.: It ~ ~ D I,:' L': d U ji R '{ 1 ~l 7 1 .65 re-publication Price. tion form below will bring 'olume set at the reduced D . . . an immediate sav[rom the regular price of is no risk involved. 10xamination. 10 IN COMPUTERS ~ PROCESSING tmund C. Berkeley n durable hard-cover \ I r I I I I I I $75 the set ation Price $60 '---------', sing, UTERS AND DATA lrly $75). You will bill s if not fully satisfied. I I I I I I I I I I t II I I I IF COMPANY ORDER) insive geographical list;hared services, courses npus computer centers, 'plications of computer lOre! Order now at $20 L ______________________________ ~ BRANDON'S BACK in PUBLIC TRAINING with fin expflnded series fJf systems trflining ..... Problem Analysis for Information Systems Practical Systems Design Basic Business Systems Analysis New York, March 29-April4 Washington, May 24-28 New York, March 15-19 Washington, May 3-7 Chicago, June 14-18 Washington, March 22-26 Chicago, April 19-23 New York, May 17-21 find the new wfJrkshfJps in develfJping methfJds ffJr mfJre effective perffJrmflnce ..... Systems Standards Project Control Standards Programming Standards Computer Operations Standards Washington, April 12-13 Chicago, May 10-11 New York, June 7-8 Washington, April 14-15 Chicago, May 12-13 New York, June 9-10 Washington, April 26-27 Chicago, May 24-25 New York, June 21-22 Washington, April 28-29 Chicago, May 26-27 New York, June 23-24 FfJr further inffJrmfltifJn fJr registrfltifJn, coIl fJr write BRANDON SYSTEMS INSTITUTE 1700 Broadway New York, N. V. 10019 Tel.: (212) 757-2100 1611 North Kent Street Arlington. Va. 22209 Tel.: (703) 525-2620 640 North LaSalle Street Chicago. III. 60610 Tel.: (312) 751-0100 A Division of BRANDON APPLIED SYSTEMS. INC. Vol. 20, No.2 February, 1971 computers and automation The magazine of the design, applications, and implications of information processing systems. Editor Edmund C. Berkeley AHistant Editors Linda Ladd Lovett Neil D. Macdonald Software Editor Stewart B. Nelson AdtJcrtising Director Bernard Lane Art Directors Contributing Editors AdtJisory Committee Fulfillment Manager Computer Programming and Software 13 23 VERIFICATION OF SOFTWARE PROGRAMS 19 SOURCE LANGUAGE DEBUGGING [A] by LTC Fletcher J. Buckley, U.S. Army Computer Systems Command How a Formal Qualification Test (FaT) of a software program can be used to verify that each of the individual requirements in the specification has been met - and why this general method is more reliable and more useful than other approaches. [A] by Richard C. Taylor, Senior Project Analyst, United Aircraft Research Laboratories An example of source language debugging (in FORTRAN on a Univac 1108 computer) which demonstrates a technique that could James J. Cryan Alston S. Householder Bernard Quint be used with other higher level languages on other computers. William J. McMillan Computers and Competition 7 Edilorial Offices [A] by Paul A. Shapiro and David F. Stermole A highly successful pilot model of a system (at a cancer research institute in Buffalo, N. Y.) for: (1) storing post-operative surgical reports written by doctors in ordinary English; and (2) allowing researchers to question this great catalog of stored data, using ordinary English. Ray W. Hass Daniel T. Langdale John Bennett Moses M. Berlin Andrew D. Booth John W. Carr III Ned Chapin Alston S. Householder Leslie Mezei Ted Schoeters Richard E. Sprague ACORN (Automatic COder Report Narrative): AN AUTOMATED NATURAL-LANGUAGE QUESTION-ANSWERING SYSTEM For Surgical Reports [F] by Congressman Jack Brooks The government is working towards a system of procurement based on all-out competition on cost versus quality. Berkeley Enterprises, Inc. 815 Washington St., Newtonville, Mass. 02160 617-332-5453 GOVERNMENT REQUIREMENTS FOR THE COMPUTER INDUSTRY 8 liTHE DVORAK SIMPLIFIED TYPING KEYBOARD" COMMENT [F] by Kevin R. Jones and the Editor An increased typing speed of 30% to 50% appears probable with the Dvorak keyboards; "Computers and Automation" hopes to sponsor speed contests in keyboard typing to promote competition in keyboard design. Adrel'tising Contact THE PUBLISHER Berkeley Enterprises, Inc. 815 Washington St., Newtonville, Mass. 02160 617-332-5453 Computer Applications 25 4 [AJ by Alan S. Boyd, Pres., Illinois Central Railroad How the use of computers to simpiify transportation data could eliminate some of the more-than-trillion existing rates, and could result in enormous savings for shippers, carriers, and the public. 28 Computers and Automation is published monthly (except two issues in November) at 815 Wash ing· ton St., Newtonville, Mass. 02160, by Berkeley Enterprises, Inc. Printed in U.S.A. Subscription rates: United States, 11 monthly issues and two issues in November (one of which is a directory issue) - $18.50 for 1 year, $36.00 for 2 yeArS; 12 monthly issues (without directory issue in November) '- $9.50 for 1 year; $18.00 for 2 years. Canada,' add 50¢ a year for po~tage; foreign, add $3.50 a year for postage. Address all U.S. subscription mail to: Berkeley Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160. Second Class Postage paid at Boston, Mass. Pos1master: Please send all forms 3579 to Berkeley Enterprises, Inc., 815 Washington St., Newtonvi lie, Mass. 02160. © Copyright 1971, by Berkeley Enterprises, Inc. Change of address: If your address changes, please send us both your new address and your old address (as it appears on the magazine address imprint and allow three weeks for the change to be made. THE COMPUTER REVOLUTION - AND THE RAILROADS COMPUTERS IN COMMUNITY SERVICE: CAN THE CULTURAL GAP BE BRIDGED? Part One [A] by James F. Muench, Computer Consultant An "instruction manual" for the computer worker-techniciansalesman who seeks to move his product - his terminal, his software, his computer utilization advice - into the wide-open market of community service. 44 CONSUMER INFORMATION SYSTEM COMPUTERIZED, RALPH NADER STYLE [G] by T.D.C. Kuch, National Cancer Institute, Supervisory Computer Specialist The launching of a group of volunteer computer professionals, to assist the Public Interest Research Group of Ralph Nader, in studying and appraising a computerized consumer information system. COMPUTERS and AUTOMATION for February, 1971 Computers and Society 31 THE SOCIAL CONTROL OF SCIENCE [A] by Dr. Lee A. DuBridge, Science Advisor to the President What kinds of controls do individuals, universities, commercial companies, consumers, and federal, state and local governments really have over what scientists will investigate and how scientific knowledge will be used? 63 MARTIN LUTHER KING, JR., [F) MEMORIAL PRIZE CONTEST - THIRD YEAR A $300 prize for the best article on the application of information sciences and engineering to the problems of improvement in human society. 36 THE CASE OF CLARK SQUIRE: COMPUTER PROGRAMMER, [A] BLACK PANTHER, PRISONER - INTERIM REPORT by George Capsis, Kenneth M. King, Monroe Newborn, Computer People for Peace, Michael B. Griswold, E. C. Witt, and the Editor Action and recommendation by the Council to the Association for Computing Machinery; reports by its Ad Hoc Committee regarding Clark Squire, computer programmer; other reports; and comments and questions raised. Computers and Philosophy 6 NOT UNDERSTANDING A COMPUTER [E) by Edmund C. Berkeley, Editor, Computers and Automation There is a great future in working out better models (such as maps, pictures, patterns, frameworks, etc.) for human understanding so that people can understand computers, and much more besides. 9 [F) WHAT IS A PROFESSIONAL? by Data Management and Bruce Madsen A challenge to a definition of "professional" because the definition left out "the important words responsibility and social value". Front Cover Picture Michael H. Boyd of Omaha, Nebraska, first year student at Rochester Institute of Technology, Rochester, N.Y., uses a terminal linked to an IBM 1500 instruction system to study electronic circuit analysis. Mr. Boyd is using a "light pen" to indicate his answer to a problem. The course is one of several sponsored by the National Technical Institute for the Deaf to help deaf students prepare for college-level technical studies. For more information, see page 55. Computers, Science, and Assassinations 48 [A] THE REPORT OF THE NATIONAL COMMITTEE TO INVESTIGATE ASSASSINATIONS by Bernard Fensterwald, James Lesar, and Robert Smith What the National Committee in Washington, D.C. is doing about computerizing files of evidence, initiating lawsuits to obtain information, etc.; and comments on two new books by District Attorney Jim Garrison and Robert Blair Kaiser. Departments Across the Editor's Desk Applications Education News Research Frontier Advertising Index Calendar of Coming Events Classified Advertisement Monthly Computer Census New Contracts New Installations New Products and Services Readers' Foru m 51 51 52 53 63 47 Computers and Puzzles 35 10 NUMBLES by Neil Macdonald [C) PROBLEM CORNER by Walter Penney, COP [C) The Golden Trumpet 42 43 43 44 [G) THE GOLDEN TRUMPETS OF YAP YAP by Mike Gold An adventure of the famous explorer Dr. Emery Hornsagle on the little known island of Yap Yap. FEAR [G) by Anonymous and the Editor Fear within a staid organization of being found reading something radical such as assassination articles in "Computers and Automation" . POLITICAL BLURP SHEET by William E. Thibodeau and the Editor Articles devoted to politics instead of computers. [G) [E) IS THERE NO HORROR POINT? by Edmund C. Berkeley An editorial about not printing a computer applications article on the spreading of poison gas, reprinted from "Computers and Automation," February, 1958. COMPUTERS and AUTOMATION for February, 1971 10 61 59 60 56 7 Key [A] - Article [C] - Monthly Column [E] - Editorial [F] - Readers' Forum [G] - The Golden Trumpet [R] - Reference Information 5 EDITORIAL Not Understanding A Computer One afternoon recently I tried for about four hours to explain what is inside a computer and how a computer works, to a very intelligent attorney. The purpose of our session was to try to organize a massive file of evidence into a computerized data base: • What kind of information or data might go in? • How should the coding brief be designed? • What instructions should be given to the coding clerks? • What sorts of problems would we want the computer system to deal with? • What kinds of answers would we like the system to give us? • What was feasible? What was trivial? What was impossible? At the end of the afternoon I had the unhappy feeling~ that almost no progress had occurred, that due to some strange difference between his mind and my mind, he still had no systematic picture or concept or model of a computer in his mind from which he could correctly conclude what was reasonable and what was not reasonable for the desired computer system to produce. He did not understand a computer; it almost seemed to me as if he would not be able to; and I was very much surprised. In order to grapple with this surprising experience, I started to wonder to what extent a person who drives a car understands a car. I inquired of my wife, who drives a car much better than I do. Did she know why a car goes? Did she know what the flywheel does? Did she know what the transmission is? Did she know why if one rear wheel is spinning, she can get no traction out of the other? I was utterly astonished by what seemed to me a surprising lack of understanding. She displays an excellent capacity to use and drive a car, together with what seems to me a primitive and even mistaken understanding of a car and how it works, and therefore what it is reasonable to expect a car to do. "Understanding" according to several dictionaries has a number of synonyms such as "comprehending, grasping", etc. These words say nothing to an investigator, for they define one unknown in terms of another. But in one 6 dictionary I did find a good definition, "the capacity to distinguish truth from falsehood, and to adapt means to ends". This is a definition one can operate with. Basically, to understand something is, I believe, to have in your mind a model (or concept or pattern or picture or map) such that: • You can derive conclusions from the model; • The conclusions can be applied in the real world; • When they are so applied, they enable you to distinguish between truth and falsehood, they enable you to adapt means to ends, they enable you to make decisions that work reasonably well - or even very well -, and they keep you out of many kinds of trouble and mistakes. For example, when does an assistant understand an instruction? I may ask a high-school student who works in the afternoon in my office to "go along Walnut St. to my house and bring back the 1966 World Almanac from my library". When he starts, he finds Walnut St. blocked by police on account of an accident; so he comes back and says, "I can't go right now - Walnut St. is blocked". So I then chide him gently and tell him to go another way, using Lowell Ave., a longer way, of course, but avoiding the blockage. He says to me, "But you told me to go along Walnut St." And thus he reminds me of the first version of a computer program which often does just what you say without understanding what you mean. There is an immense future in working out better models for "understanding" things: maps, pictures, patterns, which people can take into their minds, and by means of which they can make better decisions and gain more understanding, including understanding of cars, instructions, and computers. Editor COMPUTERS and AUTOMATION for February, 1971 READERS' FORUM GOVERNMENT REQUIREMENTS FOR THE COMPUTER INDUSTRY Congressman Jack Brooks U.S. House of Representatives Washington, D.C. 20515 In any discussion of the effects of government requirements on the computer industry, we should distinguish between the sovereign powers of the United States, as contrasted to the proprietary interests of the government as the largest user of data processing in the world. Sovereign actions in fields such as antitrust, the granting of patents and trademarks, the regulation of communications by the Federal Communications Commission, and the establishment of foreign trade policy, will continue to have a fundamental impact on the growing computer industry, which some experts have predicted will be the largest industry in America by 1985. As computers extend the fundamental intellectual capacity of the individual, computer technology must be applied to the solution of that broad spectrum of social and economic problems that confront the nation. Progressive, forward-looking, and enlightened sovereign policies must, therefore, be evolved and maintained to encourage the effective and efficient use of computers and to maintain the overwhelming technological advantage the United States has in this area. But, in practical terms, on a day-by-day basis, it is the federal government as the largest computer user, that will continue to have the most significant impact on the computer industry. Procurement Computer management, and particularly computer procurement, is an area of primary impact. For a number of Based on remarks made at the Fall Joint Computer Conference, Houston, Texas, November 19, 1970. COMPUTERS and AUTOMATION for February, 1971 years, the computer market, insofar as the cost is concerned, has been artificially influenced by the predominance of IBM and the antitrust consent decree that came about in the late 1950's. In the absence of this decree, IBM could, if the corporation had chosen to do so, imperil the existence of its smaller competitors through drastic price reduction. To a very great extent, the nation's computer industry operates under a price umbrella, making it impossible for the government or for private users generally to obtain truly competitive prices on computer equipment. Somehow (and I am not certain of the solution) we must discard this umbrella and bring true price competition to the market place. The government is working toward a system of procurement based upon all-out competition on cost versus quality. Our goal is to develop performance specifications for computers and peripheral equipment, allowing the government to satisfy its computer needs by procurement of computer capacity rather than equipment of some specific manufacturer. The impact of this policy on the computer industry will be that those vendors desiring to compete for government business will ultimately have to compete directly with IBM on a "no holds barred" cost competition basis. Software In this same general area, the federal government, as the world's largest computer user must, in a management sense, gain control over software. Fifty percent or more of the funds expended for computer acquisition flow into software, an area that - after 25 years - remains as abstract and as uncontrolled, in a procurement sense, as in the past. The development of procurement gUidelines and overall procurement control over software in government would have a tremendous impact upon the computer industry. For the software elements of the industry, it would be a traumatic experience, but the industry as a whole would benefit. Cleaner software procurement would increase computer exploitation and, therefore, sales and profits. 7 Compatibility This leads to the area of computer compatibility. As the largest computer user, the benefits to the government of reasonable standards are more obvious and perhaps more pronounced than they are to the average smaller user. In 1962, the Government Activities Subcommittee, which I serve as Chairman, supported a federal standards effort with primary reliance upon a voluntary industry-wide approach to these problems. As a policy, I still believe in a voluntary standards effort, with the government as an active participant reflecting the level of importance these standards can have on government computer operations. During the past eight years, the government has participated in the nation's standards effort. And, we have developed federal standards in some instances when appropriate. Standards The effort, however, has not moved along at a satisfactory rate. And, while continued federal participation on a voluntary basis is essential for an optimum result, the industry must recognize that it is not the sole alternative. If compIlcating and frustrating factors continue to retard progress in standards essential to the government's interests, then I believe the industry can logically expect the federal government to exercise sovereign powers in this area, despite the obvious disadvantages inherent in this approach. Federal procurement policies regarding standardization, therefore, can and will continue to have a significant effect on the industry and on the degree to which computers can be efficiently and effectively applied throughout the economy. The Need for IJser Orientation In these areas that I have discussed, it is, of course, of fundamental importance that the federal government develop and maintain goals and policies that, on a long-range basis, accrue to the benefit of the nation as a whole. Foremost in these goals and policies should be the effort to make computers user-oriented. After 25 years, the user of a computer is limited to the trained technician. The time has come for the computer industry to respond to the needs of the consumer. Through development of more sophisticated software and hardware, the industry should make it possible for people in government, business, and industry who need computers to use them without months of training. This goal is entirely reasonable, despite the monumental problems in achieving it. The problems will be a meaningful challenge to the industry. The achievement of this goal will broaden computer utilization and put computers at the forefront of American industry. As the world's largest user of computers, this will be the purpose and the goal of the federal government. Research and Development In the area of research and development, the federal government will continue to spend countless billions annually in the development of sophisticated defense and space systems. The impact of the development and the procurement of these systems on the industry is to allow for a continuing advancement in the state of the art of 8 general benefit to all segments of the nation's economy. Federal funds invested in advanced military command and control systems, for example, can be translated into improved computer systems directly beneficial to all segments of the nation's business and industry. The industry must take full advantage of this research and development and see that the advances in the state of the arts that are brought into being for purposes of defense and space are translated into the general good of the entire economy. If we are to exploit data processing techniques to the fullest in the government so as to have a lasting and beneficial impact on the computer industry and the nation as a whole, it is essential that all segments of the government fully appreciate and understand the importance of computers to the country. Throughout the spectrum of federal activities in the Executive Branch, we must have sophisticated and capable policy makers who can rely upon the full support of the computer industry in the course of their efforts in determining federal policy. Should we, at any time, lose our overwhelming technological advantage over the rest of the world so as to become a second-rate computer power, we will at the same time, become a second-rate power in the world. o "THE DVORAK SIMPLIFIED TYPING KEYBOARD" - COMMENT ( I. Introductory Note: In the December 1970 issue of "Computers and Automation" on page 8 is a discussion of the Dvorak Simplified Typing Keyboard, by Bob McCauley and the Editor. The sequence of letters on the three rows of the Dvorak keyboard is: P Y A 0 Q J G C R E U K X F I D H T N S whereas the sequence keyboard is: Q W E A S D Z X C L BMW V Z of letters on the ordinary "standard" R F V T G B Y H N U J I K 0 L P M The questions were raised: (1) How difficult is it for an adult who has learned the standard keyboard, to learn the Dvorak keyboard? (2) What kinds of adults relearn easily and what kinds cannot? (3) After such a person has "relearned" the Dvorak keyboard, can he or she confidently expect a substantial gain in typing speed? (4) Is it not possible to provide an electrical overlay so that the Dvorak keyboard would be impulsed but the impulses would be rerouted electrically to the mechanical keys, so that exactly the same mechanical keyboard structure could be used? II. From Dr. Kevin R. Jones Director, Computing Center University of Delaware Newark, Del. The Dvorak keyboard was developed by a man of the same name during World War II. At that time questions 1,2 and 3 were, in effect, answered: COMPUTERS and AUTOMATION for February, 1971 1. Between test and control groups of beginning typists, those using the Dvorak progressed faster and reached higher final rates. The difference was so great that it could be called qualitative, not merely a few percentage points. 2. An experienced typist who was willing to take the trouble found little difficulty in learning the new keyboard. The experiments, as I remember, did not reveal anyone who could not learn the Dvorak keyboard. don't recall the time required for retraining but my impression is that it took around a month to get back to the same speed on the new keyboard. From there on, speed was all upward. 3. Everyone who "relearned" the new keyboard came out with an improved speed. In general this would be 30 to 50% greater speed for someone who just went back to work after a short retraining period. There may have been some "Hawthorne effect" here, but by no means enough to account for the great difference. The last question (no. 4) wasn't asked in those days. What was asked was how this would affect the marketing aspects of the typewriter business. Of course, the whole point is that for the Dvorak keyboard to be used with any real effect, it must supersede the present keyboard, not for some specific application, but everywhere. You couldn't effectively use one keyboard for typing and another for time-sharing. You couldn't have a secretary who used a different keyboard unless she could supply her own typewriter (some do). And, except for experimental purposes, no one is going to retrain himself to use a piece of equipment which is not generally available. From much experience on keypunches, teletypes, and typewriters, I have become a fairly good typist. I would be happy to retrain myself to the Dvorak keyboard, but only if I can expect it to be available on all three. It could be done. Every piece of equipment (even standard typewriters) can be converted. It would take a while, and there would be a cost, but the benefits to be gained within a reasonable time would be worth it, to say nothing of the tremendous favor it would do for future generations. But the shame is that the typewriter companies had the chance to do it in 1945 when it would have been relatively easy and, instead, they consciously decided against it. Right after the war when much of our equipment was due for replacement and when there was much less equipment than now, they could have made the change, to the benefit of all of us now. I never did understand why the manufacturers made the wrong decision. I would have thought that they would have sold many more new typewriters, to say nothing of change kits for old ones. In any case, the manufacturers made the wrong decision and then carried it out with a vengeance. An example of what I think of as a "conspiracy", is that the decision killed typing contests. Before the war there were regular speed contests including "World Championships" and all. After the war suddenly there were no more. It wasn't for lack of interest. No, the fact was that everyone knew that the winner would be using a Dvorak keyboard. In order to forestall this, the companies quit sponsoring the speed contests. I knew the man who would have won any contest. I clocked him in bursts of a minute at 195 words per minute. COMPUTERS and AUTOMATION for February, 1971 He could go at nearly 160 for an hour. At that time the record was around 150 (on electrics - manuals were slower). Good luck to anyone who wants to promote the Dvorak keyboard. He will be right. I doubt that he will be successful. III. From the Editor It is evident that: 1. The Dvorak keyboard could be very beneficial to great numbers of persons; 2. Any electrical standard typing keyboard could be easily equipped with a supplementary alternate electrical Dvorak keyboard, so that either could be used at any time on any electrically aperated keybaard with no mechanical changes, just a plug-out plug-in change; 3. A typing speed gain of 30 to. 50% for almost everybady is a huge gain in productivity; 4. Mare and mare persans who. deal with camputers through keybaards at camputer terminals can abtain a 30 to. 50% greater speed from a keybaard af better design (than the standard keybaard) from the paint af view af human engineering. Accordingly, "Camputers and Autamatian" hapes to spansor ane or mare keybaard typing speed cantests - at which the Dvarak ar ather nanstandard keybaards may demanstrate their advantages in abjective co.mpetitian. The way to. begin a change is to. begin it. For organizations laaking for new and valuable products, here is an apportunity. Any persans interested are invited to. write to. the editar. WHAT IS A IIPROFESSIONALII? I. Reprinted from "QA Sharing - The EDP Managers' Problem Corner", page 58, Data Management for Oct. 1970. Dear Q/A: Seminars, editorials and articles urge us to become "professionals." I have a degree and I thought that made me a professional, but I'm not so sure after I read some of the editorial comments. What in your opinion separates a professional from a non-professional? Q/A says: The saying that you may have seven years of experience or one year of experience seven times sums up the difference between the professional and the non-professional. This may seem like an over-simplification, but it implies that the true professional has a good base of knowledge and then continues to perfect and add to that base of knowledge. He learns and uses the knowledge he acquires, to progress to more complex and responsible tasks. In our opinion, the true professional gives a little more of himself, but not to the extent that he ceases to be true to himself as an individual. He performs each task meticulously, organizes his work, and is infused with a high degree of integrity. The true professional has an interest in acquiring more knowledge and applying it to the task he is doing. He is continually preparing himself for the next "rung on the ladder." The non-professional, on the other hand, "takes" from his present employer, then hops to another job, and repeats the same year of experience. 9 II. From Bruce Madsen 10332 E. Lake Rd., RD-1 North East, Pa. 16428 (Letter sent to Data Management, with a copy to e&A, in response to the above.) I must disagree with an answer given in your October 1970 "QA Sharing" column. The question was, "What ... separates a professional from a non-professional?" The answer was, essentially, that a professional works hard, tries to learn his job well, and tries to advance in his job, while a non-professional learns from more than one employer and (by inference) does not advance in his job. There are many problems with the given answer. The distinguishing characteristics are not mutually exclusive. More important, the "professional" described is an ambitious worker, nothing more. A better description comes from Computers and Automation: . . . the professional ... includes not only competence in handling information using computers and other means, but also a broad responsibility, in a professional and engineering sense, for: The reliability and social significance of pertinent input data; the social value of the output results. In the same way, a bridge engineer takes a professional responsibility for the reliability and significance of the data he uses, and the safety and efficiency of the bridge he builds for human beings to risk their lives on. The important words are responsibility and social value. The responsibility is to society, not to one employer. The strong implication is a code of ethics. 0 THE LATENESS OF THE 111970 COMPUTER DIRECTORY AND BUYERS' GUIDE ISSUEII I. From L. E. Hetland, Marketing Manager SISCO - Western Operations 477 Division St. Campbell, Calif. 95008 I will be the first to admit that your EDP periodical is superior to all the others. But this year I've been more and more disappointed with the delay of your Directory issue. The first "story" was publication in June, as in previous years. Then other months were given as the date of publication, and here it is December, and I still have nothing. What is going on? I've had many needs for reference to the Directory, and each time I get more irritated when I am reminded that it is not here. Because of the delay, I can't help but think how outdated some of the information will be before I ever see it. I want to continue my subscription to C&A, but only if and when your fulfillment of our agreement is completed. II. From the Editor By the time this February issue of Computers and Automation is printed, all copies of the 1970 Directory issue should have been mailed to our subscribers. On Dec. 30, 1970, the entire issue was in the hands of the printer and was scheduled for completion of printing on January 18. As we explained in the "Preface and Editorial" to the Directory issue, we encountered unforeseen and unbelievable delays in our efforts to have a substantial portion of the Directory issue typeset by computer. We will not allow that to happen again. We are indeed· sorry for the lateness of the 1970 Directory issue - and greatly appreciate the patience our subscribers have shown in accepting this delay. We believe that the 1970 Computer Directory and Buyers Guide issue of Computers and Automation is better and more useful than any of the 15 previous editions. We know that it is 220 pages long as compared with 200 pages last year, and contains some new kinds of reference information not previously published. We hope it will prove to be really valuable to all of our subscribers who receive the directory issue (*D on your mailing label). 0 10 PROBLEM CORNER Walter Penney, CDP Problem Editor Computers and Automation PROBLEM 712: A NEW GEMATRIA? "I think it would have been much better if they had made up some completely new symbols for those six hexadecimal digits instead of using the poor overworked letters," Al said to no one in particular. "Oh, I don't know," said Bob who happened to hear this. "Once you get used to them it's not so bad." "Seems like it's becoming the new gematria. People are trying to read meanings into numbers expressed by letters in hex." "Is that what you're doing?" asked Bob, seeing Al working on a sheet covered with the letters A, B, C, D, E and F. "No, I'm trying to reconstruct a problem Charlie worked out. It consisted only of letters and looked like one of those enciphered arithmetic problems. It involved two two-digit numbers, or rather two-letter numbers multiplied together to produce a four-letter number. I remember all six letters were used." "Wouldn't eight letters be necessary even if you didn't show the partial products? And wouldn't this mean that two letters would have to be repeated?" "No. Actually one of the digits occurred three times and the others only once." What were the numbers? Solution to Problem 711: Chrystal or Crystal According to the flow chart, A would be computed as 1 + 2 2 + 2 7f2 _ 1 4,,(2 - 1 97T 2 - 1 which = csc 1. Therefore, E = sin I, or approximately .84147. The reference was to Chrystal's Textbook of Algebra, p. 361, where the formula (in effect) is derived. Readers are invited to submit problems (and their solutions) for publication in this column to: Problem Editor, Computers and Automation, 815 Washington St., Newtonville, Mass. 02160. CLASSIFIED ADVERTISEMENTS 360 LEASES - LONG OR SHORT TERM WE ALSO BUY AND SELL - 360's - 7074's - 1401's Complete Systems or Components SUMMIT COMPUTER CORPORATION 785 Springfield Avenue Summit, New Jersey 07901 (201) 273-6900 COMPUTERS and AUTOMATION for February, 1971 ACORN (AUTOMATIC CODER RE,PORT NAR,RATIVE): AN AUTOMATED NATURAL·LANGUAGE QUESTION.ANSWERING SYSTEM FOR SUIRGICAL REPORTS Paul A. Shapiro and David F. Stermole Department of Biostatistics Roswell Park Memorial Inst. 666 Elm St. Buffalo, N. Y. 14203 "ACORN, we believe, demonstrates the feasibility of a linguistically-based, automated, retrieval system, which allows a user to communicate with the system in his own natural language. " A problem of growing concern in all fields of research today is that of handling an enormous and continually expanding volume of information. At Roswell Park Memorial Institute (a cancer research institute in Buffalo, New York), for example, productive avenues of investigation are often blocked not because of a lack of raw data, but because the data is totally unstructured and unmanageable in form. For this reason, a project was initiated in 1964 by Dr. Irwin D. J. Bross, Director of the Biostatistics Department at the Institute, to investigate the feasibility of automating both the storage of post-operative surgical reports written in ordinary English and the retrieval of informa tion from them. The primary goal was to determine whether modern theories of linguistic analysis could aid in constructing a computer system which would allow surgeons to dictate their reports in a free, unrestricted style and still allow researchers to question this great catalog of stored data, also using natural English. In other words, the goal is to set up a system in such a way that no unnatural restrictions whatsoever are placed upon the human beings using the system. The initial linguistics research on the project was done by Miss Barbara Anderson, now at the University of New Brunswick. She concluded that for our purposes, the linguistic theories of Dr. Zellig Harris of the University of Pennsylvania were the most useful. Although Dr. Harris' work was used as a basis, many modifications had to be made by the authors of this paper, because of peculiarities of the surgeon's jargon and limitations imposed by the computer system being used. The programming on the project was done by the au thors during the summers from 1965 through 1970 with the aid of National Science Foundation summer students! and the assistance of Dr. Roger Priore, Director of Computer Research at the Institute. 1 Lawrence Perletz (1965); George Olshevsky, Francine Homburger, Peter McHugh (1966); Daniel Hansburg (1967); David Myerson, Greta Heintz, Benjamin Yalow (1968); Helen Means (1969); Thomas Giancarlo (1970). This investigation was supported by Public Health Service Research Grant No. CA-11531 from the National Cancer Institute. COMPUTERS and AUTOMATION for February, 1971 Outline of the System In this paper, we present a brief outline of the system called ACORN (Automatic Coder Of Report Narrative) now running at the State University of New York at Buffalo (SUNYAB) Computing Center. We include examples of the analysis and storage of actual post-operative reports and of the retrieval of answers to actual specific questions. Readers interested in more detailed descriptions of the system are directed to the references to previous publications listed at the end of this article. The hardware structure of ACORN is shown in Figure 1. ACORN DRIVER PROGRAM ON P.D.S. IBM 360/40 COMMUNICATION CHANNEL ADAPTOR ACORN SYSTEM ON P.D.S. CDC 6400 P.D.S.=Permanent Disk Storage Figure 1 Hardware configuration for ACORN System The structured catalog of stored informatIOn is created in the following manner: First, the surgeon describes the sequence of events which occurred during the operation just completed into an ordinary recording device, speaking as he ordinarily would and with no external restrictions imposed on him at all. Next, a stenographer transcribes this natural-language document on to a magnetic disk file via the IBM 2741 communications terminal and the A.T.S. (Administrative Terminal System). A.T.S. is a software system on the IBM 360/40 for storing documents via a 13 typewriter terminal; it provides sophisticated editing capabilities for the user. Documents can be saved, deleted, and corrected with a minimum of effort. The driver program for the entire ACORN system is stored on an A.T.S. permanent file, and the surgical report just entered becomes the data for the ACORN programs. The system is activated from the terminal by submitting the job (consisting of the driver program and the surgical report as its data) to the Control Data Corp. CDC 6400 computer via SUNY AB's TJE (Terminal Job Entry) system. TJE is a software system which permits submission of an A.T.S. permanent file as a job to be run on the CDC 6400 by means of a communications adaptor between the IBM 360/40 and the CDC 6400. This eliminates the need for card input and permits output to be listed back at the user's terminal. This system also allows for ACORN to be activated from any A.T.S. terminal authorized to make use of it. When the job reaches the top of the 6400 input queue, the ACORN system programs (in binary code) are extracted from the 6400 permanent disk storage unit and ACORN is loaded and executed in 15 fragments known as "overlays". This fragmentation means that the independent modules of ACORN do not reside in core simultaneously but rather successively, enabling the entire process to be carried out within a maximum program size of 55k octal.memory locations. By minimizing the program size in this way, the priority of the job in the CDC 6400's multiuser environment remains high, and tum-around time is excellent. In fact, an average sentence or question requires about 1 second of central processor time. Turn-around time at the terminal for retrieval of information is approximately 3 minutes on the average. Once execution begins, the first step consists of a "dictionary lookup" (see the first block in Figure 2). In this operation each word in the sentence is looked up in an alphabetic dictionary by a search, in order to determine the part-of-speech and the "seme-number" of each word. The seme-number is a number denoting the meaning of the word; synonyms and related words are given similar semenumbers. -1 DICTIONARY LOOKUP SYNTACTIC ANALYSIS we see: Report number, sentence number, word number within sentence, word, seme-number, and part-of-speech. Syntactic Analysis The next step of the process consists of a syntactic analysis of the sentence using our modified version of Harris's cycling cancellation automaton (References 2 and 3), in order to determine the syntactic relationships between: What is the subject? What is the main verb? Which words and phrases modify each other? and so forth. 0047 0047 0047 0047 0047 0047 0047 0047 0047 (i) 013 013 013 013 013 013 013 013 013 1 2 3 4 5 6 7 8 THE 024140 FASCIA 009361 WAS 026430 ALSO 001850 002477 CLOSED 026740 WITH INTERRUPTED 012680 021750 SILK .9 STITCHES 022710 Figure 3a Dictionary lookup ART NBOD VB ZZZ DZDA VINE P ZZZ N N AUZA The fascia was also closed with interrupted silk sti tches. ARt NBOD VB ? VINE DP A~N~N (----J ~ ( I (ii) AUTOMATIC SYNTACTIC ANALYSIS BEGINNING TOUCHDOWN** ANALYSIS COMPLETE WELL-FORMED SIMPLE SENTENCE ANALYSIS OF SENTENCE RESIDUAL FORM CLASSES NBOD VB SYNTACTIC ANALYSIS OF SENTENCE LEFT 0 ART 0 0 0 0 0 A N MIDDLE ART NBOD VB 0 VINE DP A N N RIGHT 0 0 VINE 0 DP N 0 0 0 Figure 3b Syntactic analysis TRANSFORMATIONSf--_ _ _~ Figure 2 Diagram of ACORN System for Storing Document Information Sample Sentence· As an example, we will first consider the sample sentence "The fascia was also closed with interrupted silk stitches". Figure 3a is a print-out of the dictionary lookup process for this sentence. From left to right on each line, 14 This analysis will be used in the next phase of ACORN, in which the actu~l extraction of the information contained in a sentence occurs. A detailed description of the syntactic analysis component can be found in References 4 and 5. Figure 3b is the output from the syntactic analysis programs for our sample sentence. After completion of analysis, the sentence was judged to be a well-formed simple sentence whose subject is "fascia" (part-of-speech: "NBOD" or "NOUN of BODY") and whose main verb is "was" (part-of-speech: "VB" or "VERB of BEING"). Part (ii) of figure 3b is a vertical representation of the manner in which the words in the sentence connect to each other. It is COMPUTERS and AUTOMATION for February, 1971 a short-hand notation for the interconnection schematically shown in Part (i). The analysis therefore conveys the following vital information: (1) "the" is an article modifying "fascia". (2) "also" is an adverb modifying "closed". (3) "interrupted" is an adjective modifying "stitches". (4) "silk" is a noun modifying "stitches". (5) "stitches" is the object of the preposition "with". (6) The entire prepositional phrase is an adverbial modifier of the verb "closed". (7) The past participle "closed" connects to the main verb "was". Semantic Analysis Now, the final major stage of analysis occurs - the use of the linguistic transformation programs to decompose the sentence into its "kernels" or basic units of meaningful information. Although a given piece of information can be expressed in many ways in natural language, each paraphrase should of course produce the same kernels. A kernel regularly has three parts, F, X, and Y, which will now be explained. For example,"the tumor was removed" and "removal of the tumor" and "the surgeon excised the tumor" are all decomposed by appropriate transformations into the very same kernel: OP(TUMOR) = REMOVED. This kernel denotes that the surgeon performed an operative act (OP) on the tumor (TUMOR) - namely, it was removed (REMOVED). Notice that the format for kernels is the mathematical function notation F(X) = Y. This says that a function F of the entity X has a value Y. Y need not be (and often will not be) a single value. 0047 EXISTS (FASCIA 7 09361013 0047 DSCRP (STITCHES 7 22710013 912680013 0047 DSCRP (STITCHES 7 22710013 ) = SILK 921750013 8 0047 OP 4 0 ) = INTERRUPTED 7 Table 1 THE NATURE OF FUNCTIONS F (1) Value of Function F (2) Meaning of Function EXISTS To denote the existence of an object or condition SIZE To specify physical size DSCRP To specify any description of an object or condition DEGREE To specify the degree of a description or condition ACT2 To denote any action by the patient (person 2) during the operation ACT3 To denote any activity by a body organ or tissue (entity 3) OP To denote any operation by the surgeon (person 1) MEANS To specify the means by which any action was accomplished MANNER To specify the manner in which an action occurred WHEN To specify the time when an action or event occurred WHERE To specify the location of an object or condition POSSES To specify the possessor of an object or condition QUANT To specify the quantity of objects of a particular type which are present ative act of closure upon the fascia. Finally, the fifth kernel is generated by (5) and (6) above and specifies the means of closure. Semantic Functions 0047 (FASCIA 09361013 202477013 ) = CLOSED 5 MEANS (CLOSED 02477013 522710013 ) = STITCHES 9 10 Figure 3c Kernels of information Let us return now to the sample sentence: The fascia was also closed with interrupted silk stitches. For this sample sentence, the kernels were extracted by the transformations shown in Figure 3c. The first kernel in figure 3c signifies that the body-noun "fascia" was mentioned in this report; so, if a question was later posed asking which reports dealt with "fascia", one of the answers would be "report #47". The next two kernels are triggered by the syntactic information of (3) and (4) above, and signify that the "stitches" can be described as being "interrupted" and "silk". The fourth kernel is generated from the subject and main verb of the sentence and (7) above, and denotes that the surgeon performed the operCOMPUTERS and AUTOMATION for February, 1971 It is worth stopping for a moment and stating the functions being used in this system of information retrieval. At present, we are using a set of approximately 20 different functions in working with the surgical texts at Roswell Park Memorial Institute. In general, however, the nature of the set of functions and kernels will depend upon the particular universe of discourse being analyzed. In our surgical texts, the most common of the functions that arise are shown in Table 1. Examples of each of these functions, with sample sentences of text from which they might be generated, are shown in Table 2. It should be noted that the kernel of information that Roswell uses evolved quite naturally from the punch-card format of standard data-manipulation procedures. Suppose, for example, that column 10 of the "tumor" punch-card was designated as the column for "location" of the tumor. Thinking in terms F(X) = Y this means that X corresponds to the particular punch-card on which a punch will be made, F corresponds to the particular column or field chosen, and Y corresponds to the particular character which will be punched. Thus a punch of 6 in column 10 of 15 Table 2 EXAMPLES OF KERNELS F(X) =Y (1) (2) (3) Example No. Sample Sentence of Text Expression in Kernels l An 8 x 10 cm. mass was discovered EXISTS(MASS) SIZE(MASS) 2 The mass was slightly irregular = 8 X10 CM. DSCRP(MASS) = IRREGULAR DEGREE(IRREGULAR) = SLIGHTLY 3 The patient tolerated the procedure .well ACT2(PATIENT) = TOLERATED PROCEDURE 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 0046 005 005 005 005 005 005 005 005 005 005 005 005 005 005 005 005 005 005 005 005 There were four lesions present 6 = FOUR The tumor extended into the colon ACT3(TUMOR) = EXTENDED INTO COLON ART NPAR POF ART N VB VINE P N C ART N VB ZZZ VOINE ZZZ TOZP NSPP N ZZZ DZPIN A N The tissue was approximated with sutures OP(TISSUE) = APPROXIMATED A CONJUNCTION BRANCH IS BEING ATTEMPTED WELL-FORMED COMPOUND SENTENCE ANALYSIS OF SENTENCE RESIDUAL FORM CLASSES NPAR VB C N VB MEANS(APPROXIMATED) = SUTURES 7 Dressing was applied after approximation WHEN(APPLIED) = AFTER APPROXIMATION 8 Lesions were present in the stomach WHERE(LESIONS) = IN STOMACH 9 The patient's condition was good POSSES(CONDITION) = PATIENT'S the "tumor" card might be equivalent to WHERE(TUMOR) = STOMACH. However, there is one very significant advantage of the kernel format of storage over the traditional format of punch cards. Suppose a situation arises like the following: Prior to operation 3243, no tumors had ever been discovered in the liver, but in operation 3243 a tumor was found in this location. Here a novel situation has arisen; chances are that no code number for "liver" exists for column 10; and a code-clerk would be stymied. ACORN, however, is not stymied; it simply generates "where" functions automatically from certain syntactic patterns in the text, and so it would respond with a kernel WHERE(TUMOR) = LIVER, with LIVER as the Y-value instead of STOMACH. ACORN should do this of course for any possible English paraphrase such as "A tumor was found in the liver". It is for this reason that much of the future work on ACORN will be devoted to improving the syntactic analysis and transformation components so as to handle a wider range of paraphrase constructions. Once the kernels of information have been extracted from a large group of reports, they are stored on a permanent random-access disk file. The method of storage of the "F(X) = Y" kernels is to sort them first numerically by the seme-number of X. Then, each group of kernels with the same X value are sorted according to F value. Finally, 16 024140 007984 016350 024140 001213 026434 002470 026740 021750 001980 024140 017450 026430 020330 024690 017452 021330 012542 001445 005430 AUTOMATIC SYNTACTIC ANALYSIS BEGINNING TOUCHDOWN*~' ANALYSIS COMPLETE EXISTS(LESIONS) QUANT(LESIONS) 11 12 13 14 15 16 17 18 19 20 THE MARGINS OF THE DEFECT WERE APPROXIMATED WITH SILK AND THE PATIENT WAS RETURNED TO HIS DIVISION IN SATISFACTORY CONDITION Figure 4a Dictionary lookup MANNER(TOLERATED) = WELL 4 1 2 3 4 5 6 7 8 9 10 SYNTACTIC ANALYSIS OF SENTENCE LEFT MIDDLE RIGHT 0 ART 0 0 ART 0 0 0 ART NPAR POF ART N VB VINE DP N C ART N VB VINE DP NSPP N P A N 0 POF N 0 0 VINE DP N 0 0 0 0 VINE DP N 0 P N 0 0 0 0 0 ART 0 0 0 0 NSPP 0 0 A DP Figure 4b Syntactic analysis each of these groups is sorted numerically by the semenumber of Y. The result is a structured catalog of kernels of information. Another Sample Sentence The complete analysis of a more complex sentence is reproduced in Figure 4a. The steps in the process are identical to those above. COMPUTERS and AUTOMATION for February, 1971 For this second sample sentence, the kernels (see Figure 4c) convey the following information: (1) "Margins", "detect", "silk", and the "patient" were mentioned in this report. (2) The "division" involved was that of the patient (a male). (3) The patient's "condition" was described as "satisfactory". (4) A descriptive restriction ("DREST" function) on any mention of the "defect" in any of the kernels is that only the "margins" of the "defect" are involved. (5) The next kernel says that location of the "division" is the "condition" and is a "garbage kernel" of pseudo-information generated by the syntactic ambiguity of the phrase "in satisfactory condition" which could modify either "division" or "returned". Experience has shown that storage of these garbage kernels (of which there are very few, running under 5%) is harmless since they are rarely retrieved. 3 3 3 3 3 3 3 3 3 101 101 101 101 101 101 101 101 101 10001 10002 10003 10004 10005 10006 10007 10008 10009 THROUGH WHAT KIND OF INCISION WAS THE ABDOMEN ENTERED 024352 026550 025351 016350 012002 026430 024140 001150 016471 P NPRO N POF N VB ART N VINE Figure Sa Dictionary lookup of question DECLARATIVE FORM OF QUESTION 10007 THE 10008 ABDOMEN 10006 WAS 10009 ENTERED 10001 THROUGH o ADJ 10005 INCISION 024140 001150 026430 016471 024352 032767 012002 ART N VB VINE P A N Figure 5b Conversion of interrogative to declarative Synonyms EXISTS 0046 (MARGINS 7 07984005 2 0 0 EXISTS 0046 7 (DEFECT 01213005 5 0 0 EXISTS 0046 (SILK 7 21750005 9 0 0 EXISTS 0046 (PATIENT 7 1745000512 0 0 0 0 ) = HIS POSSES (DIVISION 0046 13 21330005171745200516 DSCRP 0046 Questions (CONDITION ) = SATISFACTORY 0 7 05430005200144500519 DREST 0046 (DEFECT ) = MARGINS 20 01213005 507984005 2 WHERE 0046 (DIVISION ) ~ IN 12 213300051712542005180543000520 0 (DEFECT ) = APPROXIMATED 0 4 01213005 502470005 7 OP 0046 MEANS 0046 (APPROXIMATED ) = SILK 10 02470005 721750005 9 (PATIENT ) = RETURNED 4 17450005122033000514 OP 0046 0 0 CONDITION 0 0 0 0 0 0 WHERE 0046 (RETURNED ) = TO 12 203300051424690005152133000517 DIVISION 0 MANNER 0046 (RETURNED ) = IN 9 203300051412542005180543000520 CONDITION 0 Figure 4c Kernels of Information (6) The operative act of "approximation" was performed on the "defect". (7) The means of "approximation" was "silk". (8) The "patient" was "returned" by a member of the surgical staff. (9) The place he was returned to was the "division". (10) The manner he was returned was in a "condition" previously described as "satisfactory". COMPUTERS and AUTOMATION for February, 1971 It is worth mentioning at this point that the problem of synonymy is handled in a very simple fashion by ACORN. Words which are synonymous with one another have seme-numbers which differ only in their final digit. For example, in the first sample sentence above "closed" is listed with seme-number 02477 and in the second sentence "approximated" is listed with seme-number 02470; later, when a question is asked, the retrieval programs are designed to ignore this final digit when searching through the kernel catalog of stored information. Once a kernel catalog has been permanently created by the process discussed above, it becomes a relatively simple matter to interrogate it. A user wishing to ask a question submits it as a job" for the CDC 6400' from the same typewriter terminal previously described. He uses the same driver program that is used to submit surgical documents, but specifies that the input is in the interrogative mode. ACORN then analyzes the question in a manner almost completely analogous to the analysis of a document. First, its dictionary-lookup program produces the same output as it would for a sentence in a post-operative report. As an example, Figure 5a shows the dictionary-lookup output for the question "Through what kind of incision 'Yas the abdomen entered?" At this point, a special program used in the analysis of questions but not documents is loaded into core. Its function is simply to convert the question into a declarative form amenable to analysis by the remaining ACORN analysis programs already described. Frequently this special program must generate a "dummy" word to represent the unknown element in the question. For example, the phrase "what kind of" in the sample question generates the dummy adjective word "adj" appearing in Figure 5b. From this point through the generation of the' kernels, analysis proceeds just as it would for a sentence from a post-operative report. Figures 5c and 5d show the' syntactic analysis and kernel extraction respectively for the sample question. . The kernels for the question convey the following informa tion: 17 (1) The operative act of "entering" was performed AUTOMATIC SYNTACTIC ANALYSIS BEGINNING TOUCHDOWN** ANALYSIS COMPLETE upon the abdomen". (2) The location of "entering" was through an "incision" . (3) The type of "incision" is the unknown element in the question. WELL-FORMED SIMPLE SENTENCE ANALYSIS OF SENTENCE RESIDUAL FORM CLASSES Question Answering N VB SYNTACTIC ANALYSIS OF SENTENCE LEFT MIDDLE o ART ART N o o VB VINE DP o o RIGHT o o VINE DP N o A A o N Figure Sc Syntactic analysis of question DSCRP 3follow to learn less painfully how to function here and how COMPUTERS and AUTOMATION for February, 1971 to take what has been learned here as the point of departure for carrying on the work further. This amounts to an instruction manual. If it supports the transcendent goals of Ralph Nader and the editor of Computers and Automation, good! But that is not its prime purpose. and medical purposes) the names of a family using the facilities of a clinic. If the clinic serves a middle-class area, there is no problem. The data collection form may look something like this: PLEASE WRITE YOUR NAME BELOW Requirements of the Computer Technician There is a hierarchy of requirements laid on the computer technician who plies his trade successfully in the community, whether it be selling or the implementation of computer services. 1. The technician must have superior knowledge of his own discipline, together with an ability to stand on his own two professional feet. (This is the only requirement which does not differ from requirements generally laid on him.) 2. He must recognize that there are two cultures, each superimposed on the other geographically, but different from each other functionally and representationally. 3. He must realize that both perception and the language used to express what is perceived are different in each of the two cultures. 4. He must accept the span of the other culture's language which extends beyond mere words. It includes intonation, gestures, stance, and dress. It is often a language of attitudes. 5. He must understand the use and meaning of humor in the other culture, and avoid misusing his own humor. 6. He must learn to distinguish each culture's membership, exerting care to address the members of each in ways indigenous to their own culture. Superior Technical Knowledge and Self-Reliance Computer technicians rarely have to stretch their technology to its ultimate in dealing with problems from out of their own culture. They do need to stretch in connecting computer solutions to community problems. The community culture tends to be analog, drawing from art to life, mixing the apples and oranges of existence without regard to classification. Part of the distance to be travelled by the computer culture in dealing with the community culture is the absence of a sense of the discrete and of the finite in community respondents, and a lack of concern for the rigors of digital disciplines. This is not necessarily undesirable in a life style, but it is an absence which is unacceptable where needed to institute or maintain a technical operation. It is hard to make up for the absence. The orientation of the computer culture is embedded in its members by the time they are six. In dealing with members of his own culture, even those the least quantitative, the computer technician is dealing with those culturally at least ten years more mature, in his terms of course. To speak to members of the community culture in the same terms means bridging a ten-year gap. The Acceptance of Forms To illustrate this, let us assume a problem of a sort common to the computer culture, of collecting (for billing COMPUTERS and AUTOMATION for February, 1971 - 1 11 - 2 - 3 - 12 13 4 - 5 6 - - 14 15 16 7 17 8 - 9 (Last Name) 10 (First Name) 18 (Middle Initial) 19 PLEASE ENTER ON THE FOLLOWING LINE THE SUM OF THOSE ITEMS WHICH APPLY (Status in the Family) 20 1 if you 2 if you o if you 2 if you 4 if you 6 if you 8 if you 10 if you are are are are are are are are male; female; the family head; the spouse of the family head; a child of the family head; a parent of the family head; another blood relation; and not related by blood. No part of the above form can be used to collect data from a community respondent. The hostility of the members of the community culture to any form is high. The hostility towards forms disciplining each stroke of the pencil is very high. The computer culture associates service with impersonal forms: electric, gas, and water. It accepts time cards, military forms, job-application forms. The community culture does not. Much of the hurt the members of the community feel they have received from the established culture has come to them in the shape of impersonal forms: summonses, payment-overdue notices, eviction notices, welfare terminations. What's in a Name? The part of the form in the example above which deals with the name speaks to usage the computer 'culture assumes normal and all-encompassing, but which is not part of the community culture. For example, if a man's name is Jose Figueres Alvarez Gonzalez, his last name is probably not his family name. It is his mother's. To be addressed by it is a slur on a man's machismo and ensures his withdrawal from activities associated with the slur. The father's name is probably Alvarez and that is the name a man looks to see himself in. To handle both the conventions of the community culture and its mechanical divergences from the computer culture, the computer technician must ask more of his programming than he needs ask of it when he deals with people like himself. 29 To handle the name, it appears worthwhile to give the respondent the freedom of a large unboxed space and his own choice of the style in which to write his name. Thus: add up the digital values of entries which apply to his family status! 118 I Obtaining Useful Responses PLEASE WRITE CLEARLY YOUR NAME, IN YOUR USUAL WAY. PUT A DASH (-) JUST BEFORE YOUR FAMILY NAME. PUT A DASH (-) JUST AFTER YOUR FAMILY NAME. 119 I There is no problem in the computer handling either Jose Figueres -Alvarez- Gonzalez or John Paul -Jones-. Assembly language, COBOL, and PL/I allow instructions to the computer which say, in effect: Scan the data stream. When you come to a 1181, note that what is about to come next, until you reach a 1191, is going to be a name. Scan the name. When you come to a dash, note t4at what is about to come after it, until you reach another dash, is going to be the family name. That which comes in front of the first dash are elements of the given name. Each element is separated by a space. That which comes after the second dash, if anything, are elements of the family name. If any name elements come after the second dash, alert the billing and information systems of the installation to the need for Spanish translations in its mailing to this name. This is no great task for programming, but it is a technique rarely requested where respondents are disciplined to perform functions as the technicians direct them. It is a task which represents the kind of stretching the technicians operating in community environments must do much more of. Family Status The format requesting an indication of the family status of the respondent irritates many community sensitivities in the same way as other products of the computer culture often do. Families in the community are not necessarily constituted in the way members of the computer culture think they should be. A family may be any group which lives together. A family from Puerto Rico that lives in East Harlem may be made up of a group from a village back home where the functional relationships are not the same as the blood relationships. The family head may be the twenty-five-year-old son who works and assumes the responsibility for holding the family together. He makes command decisions despite the presence of both his 45year-old blood father and blood mother who may function more as a dependent aunt and uncle. Youngsters functioning as his children, for whom he accepts parental responsibility, may be unrelated by blood, and may not be the same persons from year to year. Children are freely rotated between the island and the mainland and between parents. No member of the community culture, be it city-black, Appalachian-white, or Indian, is going to tolerate having to 30 The community-member's response to a form he does not like, is to fill it out spuriously, ot to dictate spurious answers to the interrogator, in order to get the service represented by the use of the form. Organizations involved in providing computerized services to a community are advised to employ a "translator" familiar with the community culture being served - migrant worker, Indian, core-city - who reviews the completed forms, making such adjustments as speed their conversion into machine terms. The desire (or need) to structure the community culture in ways familiar to the computer culture is one of several selfish desires or needs the computer culture must abandon. The only questions which can be asked in the case of family status- are: Whom do you turn to in your family when you need help? What is your sex? What is your age? These must be asked in a way invoking a single response for each possibility, not in the form of complex decision paths confronting the respondent with several choices. Because of these types of considerations, there is more need for self-reliance on the part of the computer technician operating within the community than there is in his home territory. He follows the rule-books he knows when at home. In the community, the rule-books have not yet been written. The Realization of Two Cultures The hardest concept in the world for a member of a dominant culture to accept in a multi-cultural society is the possibility that his world is not all-encompassing. This must have been a problem for the first several generations of the French-speaking Norman conquerors of England. It must have been a problem for the children of the Latin-speaking overlords of Gaul. It is a problem for the members of the technical class in this country. We realize there are those we see on the street who are not members of our own group, but we see them as individual outsiders not able to deal with us. We do not see them as insiders of some other group, as good as ours perhaps, or even better, which we are not able to deal with in turn. We rarely see a burden on ourselves to learn to communicate with them. If they want what we have, they will learn to talk with us! Did the Norman learn AngloSaxon? Did the Roman learn Celtic? The answer is that the Norman who wanted mutton on his table did learn at least enough Anglo-Saxon to call his mutton "sheep" when in the field. The Roman who wanted his troops safe did learn enough Celtic to ask the native scouts the way back to camp. The computer technician who wants to move his wares into the community culture will do that culture the courtesy of acknowledging its existence. The community has something the computer culture needs today: it has jobs to be done. It has business for the computer culture. Part Two of this article is planned for next month's issue. It will consider the following aspects of the community culture: perception and language, the span of language, humor, and culture membership. COMPUTERS and AUTOMATION for February, 1971 I THE SOCIAL CONTROL OF SCIENC,E "We do not have, and we do not want, any organized social controls over the active pursuit of basic science, other than the inherent controls which exist in the minds and hearts of the scientific investigators themselves. " Dr. Lee A. DuBridge 415 South Hill Ave. Pasadena, Calif. 91106 The subject of the social control of science is, of course, a broad one and a difficult one to discuss. It is hard to find two people who agree on what is meant by social control; in addition, people do not always agree on what is meant by science. accumulated. All we can do is ask how that storehouse may be enlarged - by pursuing science in the active sense, or how that knowledge is to be 'put to use - the subject of applied science, which I shall dISCUSS later. My first thesis is that we do not have, and, ~e do n~t want, any organized social controls over the actIve purswt of basic science - the pursuit of new knowledge - other than the inherent controls which exist in the minds and hearts of the scientific investigators themselves. Scientists must be free to pursue the truth wherever they can hope to find it. <_- What I s Science? I shall arbitrarily assume, for the purposes of this article, that when we speak of science, we are talking about natural science - that is, the study of nature. Thus, I shall not discuss the social sciences, but only the physical and life sciences. But at once we face the critical question: as we speak of science are we referring to the basic sciences themselves the pure search for knowledge? Or are we talking ab.out the applications of the knowledge we have already gamed to the solution of practical problems of whatever kind we may think of - industrial products, military defense, the cure of disease, the growing of more food, the improvement of the comforts of living, or the alleviation of many social ills? Let me say at once that when I use no qualifying adjectives or phrases, I shall refer to BA~IC science. Bu~, I shall use the term science in both the actIve and the paSSIve sense. In the passive sense, basic science means the body of knowledge about nature which has been accumulated over the many centuries during which men have sought to probe the secrets of nature. In the active sense, science means the search for new knowledge about nature - new knowledge about the atoms and the stars, about matter and energy, about simple and complex molecules, about living cells and the process of heredity and th~ mechanism of the brain. When we speak of science in the passive sense, I assume we must all agree that there is not much we can do about it. The knowledge is there; it exists. Nothing we can do will diminish the storehouse of knowledge which we have Dr. Lee A. DJ.lBridge has been a Science Advisor to President Richard M. Nixon. This article is based on an address he gave at a Conference on the Social Control of Science and Its Applications at the University of Chicago in 1969. Dr. DuBridge was formerly the president of the California Institute of Technology, having served in that office from 1946 to 1969. COMPUTERS and AUTOMATION for February, 1971 I nadvertent Control s There may, of course, be inadvertent controls over the areas which a scientist investigates, because some investigations are more expensive than others, and therefore the necessary funds are harder to find. Most private and public sources of funds have their own special interest and programs, and thus we may easily find that some fields of inquiry are less adequately funded than others. The total supply of money which any nation can make available for scientific purposes is limited, and hence not everyone can get all he wants or all that he, with perhaps perfectly good reasons, thinks he needs. The persuasiveness of a particular investigator or group of investigators may, of course, sometimes uncover new sources of funds or succeed in attracting funds from other areas which are at the moment less popular or less glamorous, or are represented by less ardent advocates~ But all of thl'STs inherent in the nature of things in any society whether it be democratic or autocratic. These are the inadvertent controls over the pursuit of knowledge which, however they may affect individuai cases, are not going to go away. I know of no one who has proposed a way for getting unlimited funds for scientific research - or who has discovered how to find a single person or invent a single agency which is so wise that it can distribu te limi ted funds in a way that is right in the minds of everyone. It is, however, a lot easier to get adequate funds for more kinds of research in this country today than it was )yhen I was a post-doctoral fellow forty years ago. .~~ point is that no federal, state, or local agency, public or private, nor any combination of such agencies in the United States, is now trying to suppress or prevent the 31 "The House is on Fire"THE PROFESSION OF INFORMATION ENGINEER AND HIS BRIDGES TO SOCIETY Computers and Automation believes that the profession of information engineer includes not only competence in handling information using computers and other means, but also a broad responsibility, in a professional and engineering sense, for: - The reliability and social significance pertinent input data; - The social value of the output results. of In the same way, a bridge engineer takes a professional responsibility for the reliability and Significance of the data he uses, and the safety and efficiency of the bridge he builds, for human beings to risk their lives on. valid pursuit of scientific knowledge in any field. Quite the contrary, there are many agencies, public and private, which are actively seeking out scientists with good ideas whom they can support within the limits of the funds available to them. And taking all these agencies together, there is support available for essentially any field of basic science. On that basis, I will repeat my thesis: We do not want and we do not have any social controls over the pursuit of basic knowledge. We do not desire special controls over how a man thinks or what he seeks to learn. All we want is more money! What Is Social Control? /Put if we agree that there CAN be no social control over ~~knowledge which already exists, and we do not want social controls over the pursuit of new knowledge, then what do we mean by the social control of science? Do we mean the control of applied science by the government federal, state or local? Do we mean control by society at large, through the powerful force of a pervasive public opinion? Do we mean control by the scientists themselves by choosing, in accord with their own consciences or interests, the field of applied science in which they choose to work? Do we mean that the scientists who uncover new knowledge about the physical world shall somehow be organized in such a way as to dictate how that knowledge shall be used? (If we mean this, how do we bring in people like Newton, Galileo, Lavoisier, Darwin, Maxwell, Bohr, Einstein and all the rest who are no longer with us?) In short, what kind of social controls over applied science do we want, what kind do we have, and ~hat is the purpose of social control? Whether we like it or not, social controls over applied science do exist and will always exist. The nature and direction of these controls will vary from one nation to another, even from one year to the 'next, and from one subject to another. But they are there - in a variety of forms and with a variety of objectives. The question is are they the right forms and do they aim at the right objectives? 32 " Accordingly, this department of Computers and Automation will publish from time to time articles and other information related to socially useful input and output of data systems in a broad sense. To this end we shall seek to publish here what is unsettling, disturbing, critical - but productive of thought and an improved and safer "house" for all humanity, an earth in which our children and later generations may have a future, instead of facing extinction. The professional information engineer needs to relate his engineering to the most important and most serious problems in the world today: war, nuclear weapons, pollution, the population explosion, and many more. Before we can answer this we must examine just what these controls now are, how they operate, where they succeed and where they fail. Let us enumerate some of the ways in which what we might call social controls now operate. Control Exerted by the Individual First, of course, there is the control exerted by the individual - acting either alone or in concert with his colleagues, through formal or informal organizations or associations, large or small. When individuals in some numbers, independently or together, decide they will or will not work in a certain field of applied science, this will result in a certain degree of control over progress in that field. This can, of course, if widespread, bea very important source of control. In recent years, for example, large numbers of able college students have elected NOT to seek degrees in engineering. Thus, enrollments in this area have levelled off or even declined. Applied science as a whole is therefore not progressing as rapidly as it would had there been an inctease in engineering degrees. Some areas such as civil engineering have been affected more than others, such as electronics. No scientist or engineer can possibly be forced to work or study in any field of pure or applied scie,nce (or in science at all) if he does not so choose. No scientist or engineer can be forced to accept a job in a brewery, a tobacco company, in a pharmaceutical company, in a space laboratory, in a military laboratory, or in the laboratory of any company or agency which is engaged in any kind of work of which he disapproves qr for which he has no taste. By the same token, no one has the right, of course, to prevent any other individual from accepting or continuing a position in any legally constituted laboratory of his choice. The success of a company, a government agency, or an educational institution in recruiting talented people for any area of applied science in which it is interested will, of course, determine the rate of progress of their work - may even determine whether such work can be pursued or not. Here, then, is a social control of very potent possibilities, COMPUTERS and AUTOMATION for February, 1971 depending in a perfectly democratic way on the voluntary choices and/or the persuasive efforts of many individuals. People being what they are, we cannot of course expect that such voluntary action by individuals or groups will very often bring to a complete halt any specific area of applied science - for other individuals or groups may think this endeavor very worthwhile or important or attractive and will enter into it with enthusiasm and effectiveness. When an individual argues therefore for additional social controls over applied science, he is not advocating something which will force him to do what he does not choose to do, but he is seeking to interfere with the free choice of others. But there are, of course, other social controls more potent than these kinds of action by individuals or informal groups. Control by Universities The second agency of control is the universities which can fund, or fail to fund, depending on their resources and objectives, specific applied science projects. Many institutions are now funding research and development in urban affairs, food, population, health, the technology of developing countries, aeronautics, communications, space technology, and hundreds of other specific areas. Each such institution is seeking to apply our knowledge of science to areas which it deems appropriate, desirable or important to the general welfare. Collectively such institutions have great influence on the directions which applied science is taking or may take. If universities as a group do not pursue applied research in a particular field, the progress in that field will be hampered. Lack of talent or of funds may impede progress in some areas and emphasis may then turn to other areas where such shortages are less serious. But funding levels available may depend on conditions outside the control of a particular institution. A private university may find donors willing to fund some specific areas, but find no one to fund other specific areas. State universities must depend on actions by legislatures. Both public and private institutions will depend on federal funds in certain fields - but will again fail to secure them in others. However, universities plus their non-governmental funding sources do constitute a control and set a direction for applied research. . ~. Control by Commercial Companies Commercial companies carryon a large segment of our applied science activities. Leaving aside for the moment that portion which is supported through federal sources, companies have powerful incentives to pursue engineering and development work in areas which will improve their productive efficiency or result in new or improved products for the consumer. Out of industrial research there has emerged in the 20th century, and especially in the last 20 years, an amazing array of products which have enormous appeal, desirability and usefulness to millions of people in this country and throughout the world. community. And many an industrial company has found that a huge investment in research and development on some consumer product has come to naught because consumers in large numbers do not buy the product. The control by the market place can be a very powerful one, and is one that can be altered markedly through the action of individuals and voluntary or governmen t organizations. Consumer organizations can encourage pe6ple to buy one product and discourage the purchase of others. Massive advertising campaigns can have pervasive market influences, positive or negative. We are witnessing right now a twosided campaign for and against the smoking of cigarettes. The market effect of this is still uncertain - but in the end it may be very great indeed. However, there are those who believe that though the control of the market place is great and, for the most part, constructive, it is not enough. People insist on buying things that are not good for them, or buying things that are useless or things that may harm others. But the market place is there, and it is very powerful. Our task is to find ways to use it and guide it into even more constructuve channels. Public information campaigns, government regulations to enforce truth in advertising, consumer organizations which test products and disseminate their findings these and other mechanisms in which we as individuals can participate and which we can encourage may greatly influence the use of scientific knowledge in the field of consumer products. Control by Government But we turn now to a major mechanism of social control of science which most of us think of first when we discuss this subject - control by government - federal, state or local. Yet before coming to this subject, I did want to emphasize the importance of all these other non-governmental controls which are in use and which are available to us. Governmental agencies may exert control over applied science in several ways: 1) by the regulations which they adopt and enforce on the advertising and/or the use of products which are judged to be harmful or dangerous or which have adverse environmental or other effects; 2) by the way in which funds are allocated for the pursuit of research and development aimed at specific end-products; and 3) by the things which government agencies build or buy, or seek to buy, be they military weapons, airplanes, highways, dams, power stations or any of the hundreds of products or facilities which government agencies believe are needed to promote the public welfare or to satisfy a public requirement - some of which, of course, are not happily received by some segments of the public. It would, of course, take a very large book to describe and evaluate all of the actions of government which influence thg way in which scientific knowledge is put to use. I'3/'tot~ they constitute an enormously powerful and pervasive \ocial control over applied science. And this control can, in the long run, be expanded, contracted or altered in whatever ways the public, through its elected representatives, may demand. Control by the Market Place Here we find the great example of social control in a democratic society - the control of the market place. No one is forced to purchase a product which he does not like or which he thinks is harmful to himself, his family, or his COMPUTERS and AUTOMATION for February, 1971 How Should Social Controls Be Used? The problem, therefore, is not so much how to invent social controls, as it is how we shall use more effectively 33 and constructively the ones that we already have. The mechanism for. social control is already present. The question is: What do we want these controls to achieve that they are not now achieving? It is not difficult to set forth in a general way the goals we all seek to achieve in the use of scientific knowledge. In the negative sense, we all wish to prevent or discourage applications of science which are harmful to individuals or to groups of individuals, or which despoil our environment, or which unnecessarily waste our precious natural resources, or impede our progress toward social welfare and justice and toward world peace. On the positive side we wish to encourage and support those applications of science which enhance the welfare of people, which make-Abr country and the world a better place in which to live, which will improve the quality of life in yut cities and in rural areas, which will reduce the dangers of wars between nations. .jf"An Example: Air Pollution ,All this is easy to say and ver hard to acco~For example, w . 0 reduce air pollution. ne way to do this (in part) would be to prohibit the use of any vehicle which burns gasoline or to prohibit the ~ale of gasoline itself. (That would cure the smog problem in Los Angeles, for example.) We might also prohibit the operation of any industrial facility which discharges contaminating products into the atmosphere. But such sledgehammer methods are clearly undesirable and unworkable. A better way is to encourage research aimed at the development of better technology for reducing such pollution. And then when better technology is available, to encourage or require its utilization. This is indeed being done - though the pace of advance may seem slow. More funds are needed for the support of research in pollution technology and for environmental technology in general.· New knowledge and new technologies are needed as well as better regulation and management, using existing technologies. This is but one example in which a primary role of government should be a positive and not solely a negative one - where government should not retard but should advance the progress in applied science in a variety of ways which will contribute to social progress. Science, throughout the ages, has on the whole been put to enormous beneficial uses - and even greater opportunities lie ahead. Positive measures to enhance our opportunities to capitalize on our knowledge and on our talents can pay great dividends. An important role of government is to remove barriers and to speed progress in many fruitful areas. American universities can assist in this endeavor. They can invent innovative ways for organizing interdisciplinary programs for bringing our knowledge and our talents in science and social science to bear on the problems of .out society. I hope that private and local funds can be found for these enterprises, since Federal funding is bound to be slow and cumbersome and often inhibiting when wholly new and radical approaches are being studied. Control of the Science of Military Weapons Now let us approach the real issue which is usually in mind when we talk about the social control of science namely, how do we prevent scientific knowledge being used .for producing lethal military weapons or other devices 34 which will be either purposely or inadvertently harmful to large numbers of human beings? I left this subject to the end because I first wanted to emphasize the positive social mechanisms which we have which can be used to put scientific knowledge to work for beneficial purposes. What, then, about military weapons? First, I must express my conviction that during World War I and World War II, the scientists and engineers of this nation did a tremendous service to their country and to the free world by bringing their knowledge and talents to bear so' effectively to help the Allied Nations survive and to win those two horrible conflicts. Without the help of scientists and engineers, the results might have been tragically different. Everyone in this nation and in the free world would have been most happy if, after the conclusion of World War II, it would have been possible to establish a world of peace, friendship and confidence among nations so that all our military weapons could have been buried for all time to come. Unhappily this did not happen. The United States offered to give up nuclear weapons and other weapons of mass destruction provided other nations would do likewise. This offer was not accepted. The long and difficult· and frustrating efforts to reach such agreements are all painfully familiar to many of us. We failed - and an era of tragic danger has ensued. And in an era of danger every great and free nation must attend to its defenses. No nation has ever insured peace for itself and its friends solely by failing to be prepared to defend itself and its allies from a military attack, when unfriendly nations were clearly building their own military machines. Sorrowfully and reluctantly, therefore, the U.S. has devoted great efforts and large resources to building a military force adequate to deter or to defeat an aggressive attack against us. The Responsibilities of Scientists for Defense Systems There are, of course, those who think we have overdone this job, and others who think we have not done enough. Still others think we might have proceeded more effectively or more economically or with a better balance among our various defense weapon systems. These matters are, however, beside the point for our present purposes. The question is: If a defense system of some kind is nece·ssary, is it not appropriate for scientists and engineers, if they wish, to participate in the endeavor to make the system as effective and economical as possible? Whether we like our present system or not, or whether or not we object to certain aspects of it, I can assure you it would all have been much worse if talented scientists and engineers had not participated energetically and effectively in developing newer and better equipment and techniques and advised the military services how such new equipment could best be used. If we had allowed military research and development to come to a halt after World War II or if we allow it to come to a halt now we would now or soon be in very grave danger indeed. A weak or disarmed America would be an invitation to the destruction of the free world. This will continue to be the case until firm disarmament agreements are reached which we all hope will be soon. The question, in my opiniorl ('!pd this has been my opinion foithe- pasL20 years; not just since I came into Government) is not whether we need the help of scientific and engineering knowledge and talent to insure the defense COMPUTERS and AUTOMATION for February, 1971 of our country, but how shall that talent be used to give us the most effective and economical defense system possible. \.... Responsibilities of Universities • a NUMBLES / I agree with those who say that it is not appropriate for secret military research to be carried on within university campuses. Not many universities do this now, and I would urge others to phase out any classified weapons research which they are doing. There are other laboratories where such work can be done. I do not agree with those who say that universities should not accept any research support from the Department of Defense. Many agencies within DOD have for many years been supporting in a fine and intelligent way, excellent basic research projects in physics, chemistry, astronomy, mathematics, aeronautics and other fields without any visible relationship to weapons work and without any restriction on full publication of the results. This is fine, and I hope such research support will continue. Under present circumstances we need every nickel of help we can get for basic university research - of the sort that the university itself thinks it appropriate and educationally val uable to carryon. Civilian Advisors and Employees for DOD also believe it quite appropriate for university professors to voluntarily advise the government on its problems of defense technology. A most wholesome influence on the military establishment can be and is being exerted by independent advisory bodies. Civilian scientists and engineers can also fruitfully serve as full time civilian employees in the defense establishment for long or short periods. Many scientists and engineers have found such work exciting and valuable - though, of course, no one needs to participate in any of these ways if he does not so wish. Have we then lost social control of science when we use scientific knowledge to help in the defense of the nation? Certainly not! A powerful mechanism of social control is the Federal Government. We look to it to encourage and support beneficial applications of science. We also look to it to insure that our country is reasonably safe from military attack. The government would be remiss if it dId not bring to this task all the knowledge and talent that we can muster. If we do not maintain a free society, we will have no free science and no free opportunity to develop and use its beneficial applications. Today about two billion dollars a year of federal funds are going to the support of basic university science. About seven billion dollars of federal money and several billion dollars of private money is going into non-military applied science. These sums are of an order of magnitude greater effort than any nation has ever spent on the extension of knowledge and its beneficial applications. We hope these sums can soon become even larger. If you wish to insure this, write to your Congressmen and ask them to support in full the budget requests of such agencies as the National Science Foundation, the National Endowment for the Arts and Humanities, the National Institutes of Health, and the research budgets of HUD, Interior, Agriculture and similar departments. That is a kind of social control which we should all 0 welcome. COMPUTERS and AUTOMATION for February, 1971 C NUMBER PUZZLES FOR NIMBLE MINDS -AND COMPUTERS Neil Macdonald Assistant Editor Computers and Automation A "numble" is an arithmetical problem in which: digits have been replaced by capital letters; and there are two messages, one which can be read right away and a second one in the digit cipher. The problem is to solve for the digits. Each capital letter in the arithmetical problem stands for just one digit 0 to 9. A digit may be represented by more than one letter. The second message, which is expressed in numerical digits, is to be translated (using the same key) into letters so that it may be read; but the spelling uses puns or is otherwise irregular, to discourage cryptanalytic methods of deciphering. We invite our readers to send us solutions, together with human programs or computer programs which will produce the solutions. This month's Numble was contributed by: Stuart Freudberg Newton High School Newton, Mass. NUMBLE 712 The x FED H 0 U N D H HUN T DDD F RNN DF UH R RD0 67571 Solution to Numble 711 R N N H F T T N 29630 In Numble 711 in the January issue, the digits 0 through 9 are represented by letters as follows: 0=0 Y=1 R=2 A=3 M=4 N=5 S,U,V= 6 G,T=7 E=8 C=9 The message is: Many can argue, not many converse. Our thanks to the following individuals for submitting their solutions - to Numble 7012: A. Sanford Brown, Dallas, Texas; Gordon and Debbie Bruno, Cliffside Park, _N.}.; T. P. Finn, Indianapolis, Ind.; Frank Komorowski, Philadelphia, Pa.; Robert R. Weden, Edina,_ Minn.; and Brian C. Whitaker, San Diego, Calif. - to Numble 7011: Edward A. Bruno, North Bergen, N. J.; G. P. Petersen, St. Petersburg, Fla.; Vince Roach, New York, N. Y.; and D. F. Stevens, Berkeley, Calif. - to Numble 708: SSG Raymond L. Cowen, Gunter AFB, Ala. 35 THE CASE OF CLARK SQUIRE: COMPUTER PROGRAMMER" BLACK PANTHER, PRISONER - INTERIM REPORT Contents 1. Action by the Council of the Association for Computing Machinery: Announcement 2. Report of the ACM Ad Hoc Committee Introduction George Capsis Kenneth M. King 3. Report of the ACM Ad Hoc Committee Continued Preface Brief Resume of Clark Squire Squire's Activities in the Black Panther Party Arrest Record of Squire What Computer People for Peace would like the ACM to do about Squire What Happens to the Money that is Collected by CPP? Monroe Newborn Kenneth M. King 4. Report of the ACM Ad Hoc Committee Conclusion 5. Report of the ACM Ad Hoc Committee Appendices -- List 6. $50,000 Bail for Clark Squire Raised; then Judge declares Bail is $100,000; then Judge Declares "No Bail" for Nine Defendants still in Jail Computer People for Peace 7. The Quality of Judge Murtagh as a Justice Edmund C. Berkeley 80 Addressing Relevant Social Problems in "Computers and Automation" Michael B. Griswold 9. Ridiculous Lack of Objectivity E. C. Witt 10. Response Edmund C. Berkeley Note For prior discussion of this case, see: .The Life and Times of Clark Squire: Computer Programmer, Black Panther, Prisoner -- article in C&A, November, 1970, p. 36 Responsible Journalism -- editorial in C&A, November, 1970, p. 7 "Responsible Journalism" -- Comment -- in Forum in C&A, January, 1971, po 8 Joe Hanlon Edmund C. Berkeley Clark Squire 1. ACTION BY THE COUNCIL OF THE ACM: ANNOUNCEMENT George Capsis Association for Computing Machinery 1133 Ave. of the Americas New York, N. Y. 10036 In an effort to give the Council information on which to make a judgement, Council member Herbert Grosch had requested of President Walter Carlson the formation of a fact-finding committee. In response to a plea to help raise bail for imprisoned computer programmer Clark Squire, the Council of the Association for Computing Machinery, on December 3, 1970, agreed that while individual members might respond, ACM action was outside of its constitutional purposes. The chairman of that committee, Dr. Kenneth King, delivered his report on December 3 to the Council. The Council further urged members of the Association as individuals to familiarize themselves with the facts in this case and to take whatever action they regard as appropriate. The request for aid came from '~omputer People for Peace" during ACM's September conference in New York. 36 The 40-page report (including appendices) was based on interviews with: former employers of Squire; the District Attorney's offices of Bronx and New York County; the American Civil Liberties Union; the attorney for the defendant; representatives of the CPP; attorneys for ACM; and a written interview with Clark Squire obtained during the trial in New York. The report is available at ACM Headquarters in New York City. COMPUTERS and AUTOMATION for February, 1971 2. REPORT OF THE ACM AD HOC COMMITTEEINTRODUCTION Kenneth M. King c/o ACM In brief, this Committee was invoked as a result of the following circumstances. At ACM 70, a group of ACM members and non-members identifying themselves as members of "Computer People for Peace", distributed a flier calling on attendees to aid them in raising bail for a computer programmer named Clark Squire (included as Appendix I is a copy of the flier). At a press conference at ACM 70, Mr. Edward Elkind, an ACM member and member of CPP, issued a statement on Clark Squire (a rough transcript of this statement is included as Appendix II). At a public town hall meeting at ACM 70, members of CPP issued a plea for funds to be used for bail for Clark Squire and passed a basket through the audience soliciting contributions. Subsequently, a member of the Council expressed the view that ACM had an obligation to determine whether or not "Clark Squire in fact existed" and I. was asked by Walter Carlson to head an ad hoc committee to answer the question and to report at the next ACM Council meeting. With the help of Professor Monroe Newborn of Columbia University and Gordon Smith and George Capsis of the ACM staff, the following information has been elicited. Clark Squire "in fact exists" and is presently on trial with 20 other defendants in New York City on a variety of charges. The defendants have been collectively referred to in the press as the "Panther 21" A copy of the indictment handed down by a New Yo~k County Grand Jury which includes the charges agaInst Clark Squire and,21 other defendants is included as Appendix III. (One of the defendants in this indictment, Fred Richardson, had his bail reduced to $25,000 and has subsequently disappeared according to Assistant DA Weinstein). Clark Squire has been in jail since April 2, 1969. His bail has been set at $50,000 and he has been unable as of.this dat: to raise that amount. Attorneys representIng a varIety of organizations, including the American Civil Liberties Union, have attempted to get bail reduced and, according to Assistant DA Weinstein, have appeared before 42 judges, all of whom have refused to reduce bail. Appeals have been carried unsuccessfully all the way to the Supreme Court. Included as Appendix IV is a copy of a,brief filed with the U.S. Supreme Court on behalf of Clark Squire and 13 other defendants in this case requesting a reduction of bail. (This brief was supplied by Barbara Shack of the New York Civil Liberties Union.) George Capsis and Gordon Smith were asked by me to contact the attorneys prosecuting Clark Squire to obtain whatever information they could about Clark Squire. Since the case was about to go to trial, these attorneys stated they were unable to divulge any details not already made public. Mr. Weinstein, an Assistant District Attorney, stated that the following was recorded on Squire's police record: 1. 8/9/65 - Arrested for drug violation convicted. 2. 5/3/66 - Queens County - arrested for possession of drugs and a gun - convicted - placed on probation - probation to expire on 11/6/69. 3. 1/18/69 - Arrested for possession of drugs. 4. 2/6/69 - Arrested for attempted robbery, possession of weapon and reckless endangerment - charges still pending. 5. 4/2/69 - Arrested on charges including conspiracy. attempted murder, and arson - trial commenced 10/19/70. Clark Squire is presently represented by Attorney Charles T. McKinney of 401 Broadway, New York City. A search of ACM records by Irene Hollister reveals that Clark Squire has apparently never been a member of ACM. Monroe Newborn was asked by me: to attempt to obtain biographical data on Clark Squire; to obtain from Clark Squire, his attorney, or friends, Clark Squire's version of the events leading to his present indictment; to obtain from Computer People for Peace a statement of what they think ACM should do about this case; and what their plans were with respect to any bail money raised; and to develop any other information he could elicit on the character of Clark Squire. His report follows: 3. REPORT OF THE ACM AD HOC COMMITTEECONTINUED Monroe Newborn c/o ACM Preface The following information was gathered in one week of effort. While there are still several points that could use greater elaboration, I believe it presents a reasonable picture of Clark Squire as gathered by (1) communicating with him via his attorney (see Appendix V), (2) talking with his~Attorney, Charles McKinney, (3) talking with one of his former employers, George Langnas, (4) observing the trial in person on the day of November 10, 1970, (5) receiving background information from the CPP (Computer People for Peace). Perhaps three points should have been investigated in greater detail. (1) To my understanding, (based on the CPP), his present employer is willing to have him return to his job when he becomes free. I would have liked to confirm this by direct communication with his employer but was unable to contact his employer. (2) I would like to have had a better explanation of his narcotics background. From all that I can gather, he never used hard drugs. (3) I would have liked to have had knowledge of several other similar court cases so that I could have, in fact, confirmed the charge that bail wa~ extremely high. In discussions with the CPP, it was discussed that in some cases where bombings had actually occurred, bail was much less. The material is presented by me in as unbiased a manner as possible. The activities of the last week have been quite rewarding. The witnessing of the trial was an action that I would encourage others to take. The Association for Computing Machinery, a professional society of more th~n 26,00? co~puter speci~lists, is dedicated to advancing the science and art of computer usage. T~rough Its pub~Icat~ons: educatIona~ programs, chapters, and committee activities, ACM promotes and prov~des for the dIssemInatIon of technIcal and non-technical computing information to its members and the publIC. COMPUTERS and AUTOMATION for February, 1971 37 Brief Resume of Clark Squire (source: Squire and CPP) Age: 33 Born. Decatur. Texas College: At 15 (or maybe 16) went to Prairie View A&M College of Texa~ (affiliated with Texas A&M). Graduated at age of 19 (1956). Slightly above average student (in his own words). Degree in math. The following statement appeared in a letter to members and friends from the CPP Squire Committee. "He was arrested in January 1969 bec~use a car he had rented was being driven by another defendant, Miss Joan Bird, at the time of her arrest, Miss Bird was accused of shooting at the police in an incident on the Harlem River Drive in New York City. Squire was arrested for complicity. Two weeks later, charges in this case were dropped for lack of evidence; and Squire was ~earrested in the courtroom for armed robbery of a subway change booth in the Bronx. This robbery was alleged to have occurred three months earlier and was totally unrelated to the initial charge." This case is stiil pending. Work Record: According to Squire, he worked for NASA in California, November 1956-November '57. Had "Secret Clearance" then and for subsequent work at Rome Air Dev. Center at Griffus AFB, Rome, N.Y. Had clearance until age of 26. Subsequently employed by Compo App. Inc. 1964-66. Then Real Time Systems, Inc. (1966-68), then Computer Decisions Inc. (now called Computer Deductions, Inc.) until now (about 2-1/2 months). According to Squire, his salary while at CAl was about $14,000. At time of arrest, was making about $17,000. Former employer at CAl, George Langnas, stated that Squire was "very competent, personable, highly regarded, qependable, worked long hours. No problems with the law or drugs." He also stated salary figure of $14,000. Work was described by Squire as in the area of "systems analysis, systems design, proposal writing and estimations, programming and project leader." The present arrest for conspiracy occurred on April 2, 1969. (A copy of the indictment is included as Appendix III). It appears that his name is mentioned explicitly in regard to: 1. Possessing a 38 caliber Smith and Weston [sic] revol ver and a 308 automatic rifle; 2. Possessing.a bomb; 3. Being Lieutenant for Finance in New York City. He appears implicated by his involvement in the party, to be charged with other crimes and the conspiracy to commit other crimes. What the CPP Would Like the ACM To Do About Clark Squire (as obtained from the CPP Squire Committee) CPP feels ACM should become involved in the Clark Squire case because ACM has responsibility for the well-being of members of the profession. In this case, a member in good standing of the profession is having his constit.utional rights violated. In particular: Activities in the Black Panther Party (as indicated by Squire) He was "active in community control, school programs, hospitals, made and distributed survey forms asking Black community what were their important problems and suggestions for solutions, also breakfast for children's program." He was also "finance officer - keep financial records and money transactions. Attend political education classes, sell papers, assist in laying out community programs, attend meetings with other organizations, and general party work." His attorney, Charles McKinney, stated that Squire was a member of the BPP for less than 4 or 5 months. 1. An individual is assumed to be innocent until proven guilty, and further, 2. One is entitled to a speedy trial. In this case, Squire has been deprived of his freedom for 18 months and in violation of both points (1) and (2). 3. His bail is extremely excessive ($50,000) and far out of line for a person with Squire's background. His bail effectively guarantees that he will remain in jail -- which is not the purpose of bail. Other individua"ls in political groups have actually bombed buildings and received less bail. (Jane Alpert bombed a building in New York City and received $20,000 bail). Arrest Record According to the information gathered by George Capsis, Squire was arrested four times, twice on narcotics charges (1~65, 1966) and twice in 1969. Narcotics charges: In discussions with Squire's attorney and former employer, both stated that they knew of no hard drug use by Squire. Squire stated in response to a badly asked question that "the narcotics involved in my '66 arrest were a few leaves of marijuana scraped from my jacket pocket following a strip-down search at JFK airport upon returning from overseas. The narcotics charge was subsequently dropped." 38 4. While in prison, his rights have also been violated. Most importantly, he has effectively been denied the opportunity to prepare his case. His visitors are limited to his own relatives and lawyers. Reporters cannot visit him. His treatment in prison has been unreasonably cruel. Thus, CPP is asking that the ACM endorse the collection of bail money for Clark Squire and send out a mailing to its members to collect bail money for the CPP. COMPUTERS and AUTOMATION for February, 1971 What Happens to the Money that is Collected by the CPP? (as stated by Joan Dublin and Ed Elkind of the CPP Squire Committee) Several possibilities exist in this regard. If the money is not used for bail -- (1): All the money whose source can be identified will be re~ turned. Money not identified would be used in the future for bail in other cases deemed appropriate by the CPP. (2): The National Committee to Defend the Panthers (853 Broadway, NYC) and CPP would discuss mutually how to use the money most effectively. If the money is used for bail and returned, then option (1) above would be followed. If the money is used for bail and not returned, the contributors would not receive their money back. 4. REPORT OF THE ACM AD HOC COMMITTEE CONCLUSION Kenneth M. King c/o ACM The Clark Squire case raises, in my view, a number of issues, the most important of which is what kind of an issue is it, and does the ACM constitution permit us as an organization to deal with it. Legal counsel for the ACM has provided us with the followi ng comment: "Any acti vi ty on the part of ACM in this issue other than the humanitarian effort to d.etermine (a) that he has a good lawyer and (b) that institutions such as the American Civil Liberties Union are aware of the circumstances, represents ACM taking sides in a controversy completely unrelated to its purposes." From a legal standpoint, when ACM goes outside the legal terms of its Charter, it is "ultra vires", which means it is going "beyond its powers". Our legal counsel therefore indicates that neither ACM, its President, nor the Council has the right to intervene in this action without a change in the Constitution and Charter. If the issue is regarded as a deeply political and social question, a recent ACM referendum would be relevant. In response to the question "Shall the Constitution of the ACM be revised to permit Association comment or action on deeply political and social questions?", the ballot count was 2,059 yes and 7,938 no. (See Appendix VI) Joan Dublin of CPP has stated that in her view, the issue is whether or not ACM should permit the violation of the civil rights of a member of our profession in good standing. It is my hope that this report will be useful to the members of the Council. 5. REPORT OF THE ACM AD HOC COMMITTEE APPENDICES - LIST Following are the six appendices to the report: 1) Resume of Clark Squire (1 page) 2) Transcript of a statement made by a representative of the Computer People for Peace at the ACM '70 tonference (2 pages) COMPUTERS and AUTOMATION for February, 1971 3) Grand Jury indictment of 22 Persons including Clark Squire (22 pages) 4) Petition to the United States Supreme Court for Relief for 13 persons including Clark Squire -- Additional Supplemental Memorandum re writ of certiari in the matter of granting Reasonable Bail (6 pages) 5) Questions directed to Clark Squire by Monroe Newborn, and his Answers (2 pages) 6) Reprint (1 page) from the "Communications of the ACM", July, 1969, reporting the result of a ballot of members on: Shall the Constitution of the ACM be revised to permit Association comment or action on deeply political or social questions? These appendices are available on request from the ACM, 1133 Ave. of the Americas, New York, N.Y. 10036, so long as the supply lasts. 6. $50,000 BAIL FOR CLARK SQUIRE RAISED; THEN JUDGE DECLARES BAIL IS $100,000; THEN JUDGE DECLARES "NO BAIL" FOR NINE DEFENDANTS STILL IN JAIL Computer People for Peace The Dolphin Center 137A West 14 St. New York, N.Y. 10011 After four months of hard work, the CPP Squire Committee succeeded in raising $50,000 bail for Clark Squire, programmer and Panther 21 co-defendant. However, on December 28, 1970, Judge Murtagh claimed that Clark's bail was $100,000 despite the fact that in May, 1969 Judge Shapiro had lowered Clark's bail to $50,000. Judge Murtagh then stated "whatever his bail was, it does not matter, it's now NO BAIL." According to the New York Times on December 29: Justice Murtagh said that because of "information in the possession of the court" relating "not only to the defendant Squire but relating to all the defendants present", he was revoking bail "for the remainder of the trial" for the defendants who were in jail. The seven held in lieu of bail have been in jail since April 2, 1969, following indictment of all 13 on charges of conspiring to bomb public places and murder policemen and possession of dangerous weapons and explosives. A trial is supposed to be an integral part of the democratic process. - But how can we have democratic process when excessive bail is set? (Defendants in jail cannot gather evidence nor find witnesses.) - What is the meaning of democratic process when even after the money for bail is raised, the bail is revoked? People are told to play by the rules and when they do the rules are changed. How is democratic process served when bail is used as leverage against defense counsel? (Judge Murtagh stated that he would entertain motions for bail reduction only if the defendants and their lawyers "improve their behavior.") 39 7. THE QUALITY OF JUDGE MURTAGH AS A JUDGE Edmund C. Berkeley Editor, Computers and Automation The Bill of Rights in the Constitution of the United States contains: Article VI: to Speedy Trial, Witnesses, etc. : In all criminal prosecutions, the. accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which districts shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor; and to have the assistance of counsel for his defense. R~ght Article VIII: Excessive Bailor Fines and Cruel Punishment Prohibited: Excessive bail shall not be required nor excessive fines imposed nor cruel and unusual punishments inflicted. It is clear that the behavior of Judge Murtagh and the actions of the associated court system in New York County are in violation of the Constitution of the United States -- as well as in violation of elementary principles of fair play. i) Judge Murtagh has set excessive bail, two and then four times the amount of $25,000 set in similar cases, when there were white defendants who had actually exploded bombs. (The grand jury indictme~ of the Panthers arrested in New York on April 2, 1969, contains no charge that the arrested Panthers had actually exploded any bombs.) This violates Article VIII. ii) Judge Murtagh (according to the New York Times account) has "information in the possession of the court" which he is not disclosing, which is therefore secret, and therefore cannot be challenged as to truth or falsehood, and therefore ~ be false. This violates Article VI, that the accused shall know "the nature and cause" of the accusation. iii) On the basis of this secret information, after several months of trial with bail established, as soon as it appears as if one of the defendants (computer programmer Clark Squire) has raised the bail of $50,000, then Judge Murtagh doubles the amount of bail to $100,000 -- and promptly thereafter decl ares "no bail" for any of the defendants not already out on bail. Such action is contrary to the elementary rules of fair play, and Article VIII. iv) For almost a year and a half these defendants have been in New York County jails before being brought to trial. This is far from the "speedy trial" guaranteed by the U.S. Constitution, and violates Article VI. v) The entire reason for any trial is to test the validity of an accusation. Many accusations are untrue, for many sorts of reasons. In the United States a man who is accused is legally innocent (and entitled to be free on bail) until proved guilty. It is not true that an accused person is legally guilty (and to be imprisoned) until proved innocent. The behavior of Judge Murtagh would be appropriate for a Nazi judge in Hitler's Germany in the 1930's not for an American judge in the United States. 40 Such behavior is calculated to infuriate oppressed members of society in the United States -- especially since such behavior is never used towards business men, or wealthy people, or even members of the American middle classes. It is as if Judge Murtagh had been hired by a group of persons desiring to overturn the constitutional American system of justice, by means of the policy: "Oppress them, infuriate them play the tyrant, and when their tolerance breaks and they become violent, shoot them or imprison them in the name of 'law and order', and then say on television to the people of the United States, 'You see, we told you these persons were dangerous and violent and good for nothing.'" The behavior of Judge Murtagh is a disgrace to the Constitution of the United States, and to the traditional English and American system of evenhanded justice begun with Magna Carta in.1216. If computer programmer Clark Squire and the other Panthers being tried in New York County are legally and fairly determined to be guilty of any crimes, then they should be sentenced and punished according to established law. But it is wrong to punish them (or anybody) by extra-legal and unconstitutional actions of any kind. And no respect for the United States or admiration for the United States can be fostered by tyrannical actions or "frame-ups" -of any kind. 8. ADDRESSING RE.LEVANT SOCIAL PROBLEMS IN "COMPUTERS AND AUTOMATION" Michael B. Griswold 4437 Brighton Ave. San Diego, Calif. 92107 This is just a note of encouragement for your position of addressing relevant social problems in your technical publication. The case of Mr. Squire is only a recent example of an exemplary policy. In this instance you are doing for the computer industry what sports journalism should have done for Cassius Clay and boxing. Technical achievement is meaningless without corresponding social accomplishment. As an increasingly vital segment of our community, computer professionals should be concerned less with the quality of systems and concerned more with the quality of life. That responsible technical literature espouses such an ideal is indeed gratifying. Thank you. 9. RIDICULOUS LACK OF OBJECTIVITY E. C. Witt 7933 Berkshire Blvd. Powell, Tenn. 37849 The editorial and article pertaining to Clark Squire in your November issue are so lacking in objectivity as to border on the ridiculous. His personal success stQ.,M\'~prior to his becoming active in a revolutionary organization) refutes his own charge that a black man can't expect a decent break in our society. Any society would react violently against a group which thinks shooting policemen and bombing buildings are justified and equivalent responses to exploitation, poverty, ignorance and disease. Both COMPUTERS and AUTOMATION for February, 1971 Mr. Squire and you are confusing "political activity" with revolutionary activity, which is prohibited even in a democracy. It was reasonable for the police to conclude that Clark Squire either was in his auto when they were fired upon from it, or that he at least conspired with those who were. The circumstantial evidence was extremely strong, even though the case was later officially dismissed for insufficient evidence. Last year there were over 80 uniformed officers assassinated from ambush, mostly in black neighborhoods. Many of these men were never the object of criticism for racism, indeed some were themselves black. They were simply murdered because they symbolized the establishment. Any prime suspect in such a crime should be considered (and handled as) armed and dangerous. A robbery charge is not necessarily absurd just because the accused makes a good living. A wellto-do youth recently charged with robbery in a large city explained that his act was required for admission into a neighborhood gang. As for the charge that '$50,000 bail is outrageous . . . ', Black Panthers, Weathermen, and other such radicals have a way of disappearing after release on bond, only to show up later in some Communist country. Bail is intended to guarantee appearance; the comparison with that of the Minutemen indicates only that theirs was too low, not that Squire's is too high. You define responsible journalism as "important, factual, useful", and yet in the same editorial admit that you'll publish anything if the author signs his name and "stands back of what he's saying", whatever that means. Thus you're caught in your own web of confusion. Hanlon's general irresponsibility is typified by such things as his comment on page 37 that "(damage was minor and there were no injuries)" in two bombings attributed to the Panthers -- as though this made the act triviall Clark Squire diagnosed his own problem -- he became schizoid. I close with one simple question -- which would you prefer to have roaming about your society with guns and explosives, FBI ~gents or Black Panthers? 10. RESPONSE Edmund C. Berkeley Editor, Computers and Automation What I like about Mr. Witt's letter is the clarity, vigor, and degree of logic with which he expresses his views, and the almost complete absence of name-calling and other unfair propaganda devices (two exceptions are "web of confusion" which is name-calling, and "which would you prefer •.• ", which is the false dilemma. Furthermore, I do not know if Clark Squire and other Black Panthers engaged in plotting bombings in or around New York City. They might have, and they may be dangerous men. I am not in favor of such violence any more than I am in favor of the violent shooting of Vietnamese civilians (old people, women, children, and babies) that took place at My Lai -or the violence of chemical defoliating of 20% of South Vietnam, which is wicked. COMPUTERS and AUTOMATION for February, 1971 But the treatment the arrested Panthers are receiving is not fair and not just and not constitutional. If a man has jumped bail and become a fugitive from the law, then it makes sense to hold him when caught again without further bail. If he has not become a fugitive from a justice, but someone "thinks" he will be -- that is not sufficient according to the Constitution of the United States to deny him bail. Finally, when the set bail of $50,000 has been offered to the judge, for the judge to raise the bail to $100,000, that is wrong and wicked. To reply to Mr. Witt's last question in a brief and preliminary way, I prefer that nobody whatever "roam around my society with guns and explosives". In London, England, I understand no policemen are armed; from my own experience I know they are courteous, friendly yet firm, towards everyone; and I believe they are held in high esteem by almost everybody including the underworld, who are said to have an unwritten understanding that they will never shoot a policeman. Let us hope that someday New York will become that civilized. There is much more to be said about Mr. Witt's points. I challenge his assumptions and more besides but that will have to be gone into at some other time. The following are copied from the engraved mottoes at the entrance to the building at 100 Centre St., Borough of Manhattan, New York, N.Y., which holds the Supreme Court of New York State (On the 13th floor of this building the trial of the 21 Panthers is taking place.) IMPARTIALITY IS THE LIFE OF JUSTICE, AS JUSTICE IS OF GOOD GOVERNMENT. THE ONLY TRUE PRINCIPLE OF HUMANITY IS JUSTICE. JUSTICE IS DENIED TO NO ONE. On Monday, January 18, I stood in line for two hours in the corridor on the 13th floor waiting behind wooden barricades for admission into the courtroom as a member of the public. Then at 10:45 am. court was adjourned for two days, because the assistant District Attorney prosecuting had no witnesses to be heard. And the line in the corridor of some twenty people standing (or sitting on the floor), waiting to go into the courtroom, went away. I did not see the interaction between the attorneys and the judge from 10:30 to 10:45 while the adjournment decision was being reached -- nor even the inside of the courtroom. And even a subway provides some seats on the platform for those waiting for trains. There are many ways of indicating"to the "lower classes": "we provide one kind of consideration to some people and another kind of consideration to others." 41 THE GOLDEN TRUMPET This department of Computers and Automation is devoted to providing a "golden trumpet" for any computer people (and probably some other people) who wish to argue and perhaps shout their views -- and who thus collide with other people's opposing views. In this way we can give a voice to some of the parts of public opInIon. However, name-calling and other logically fallacious arguments will be drastically edited or cut before publication. Most of the emphasis here will be on topics related to computers and society. The reason for the phrase "golden trumpet" will be clear from the following parable by Mike Gold written more than thirty years ago. THE GOLDEN TRUMPETS OF YAP YAP presslons of public opinion and take some photographs. " On the next afternoon, Dr. Hornsnagle had the opportunity he desired. The people of the whole island were assembled in the palace courtyard to decide an important issue. They numbered about three thousand and were all quite naked except for loin cloths. However, just before the ceremony was about to begin, four richly clothed gentlemen were carried in on bejeweled litters. Glittering with priceless gems and reeking with perfume, they were deposited at the very front of the crowd, where they squatted on silken pillows and were fanned with peacock feathers by attendants. "Who are they?" asked Hornsnagle. "They," replied the Slobob, "are the richest men on the island." Immediately after the arrival of the wealthy class, the High Priest read off his scroll. Then the Slobob stepped forward ~nrl raised his right hand. The famous explorer, Dr. Emery Hornsnagle, in his recent book, Strange Customs of the People of Yap ~. makes some interesting observations on the practice of free speech among the inhabitants of that little-known island. The four wealthy citizens all lifted golden trumpets and blew lustily. While being entertained in the palace of Iggy Bumbum (High Chief), the Slobob of Yap Yap, Dr. Hornsnagle asked the ruler whether free expression of public sentiment was allowed by the law. The Slobob now lifted his left hand. "All those opposed, blow," he shouted. Not a sound came from the giant assemblage. "It is so decided," announced the Slobob, and the affair was over. "Yes, indeed," replied the Slobob. "The people of our island have absolute freedom of speech, and the government is conducted in exact conformity to public opinion." Later on, Dr. Hornsnagle asked the Slobob why the four wealthy citizens were the only ones who blew trumpets. "Just how does that work?" asked Dr. Hornsnagle. "By what method are you able to tell what public opinion thinks about the various matters that come up?" "That is very simple," explained the Slobob. "Whenever any policy has to be decided, we assemble the entire population in the large courtyard of the palace. The High Priest then reads from a scroll to inform them of the business at hand. When that is finished, I determine the will of my people by listening to the Golden Trumpets." "And what are the golden trumpets?" asked Hornsnagle. "Golden Trumpets," said the Slobob, "are the only means by which public opinion may b~ expressed. I raise my right hand above my head and callout: 'All those in favor blow.' Instantly, all those in favor of the proposed action blow upon golden trumpets. Then I raise my left hand and call out: 'All those opposed, blow.' This time the opposition blows golden trumpets. The side making the loudest noise is naturally the majority and the issue is decided in their favor." "That," said Dr. Hornsnagle, "is to my mind the most complete democracy I have ever heard of. I would like very much to wi tness one of these exCOMPUTERS and AUTOMATION for February, lQ71 "All those in favor, blOW," he shouted. "They are the only ones who can afford to own Golden Trumpets," explained the Slobob. "The rest are only poor working people." "That doesn't seem very much like free speech to me," remarked Hornsnag Ie. "All it amounts to is a group of rich men blowing their own horns. In America we have real public expression." "Is that so?" exclaimed the Slobob. you do it in America?" "And how do "In America," said Hornsnagle, "instead of having Golden Trumpets, we have newspapers, magazines and radio broadcasting stations." "That is very interesting," said the Slobob. "But who owns these newspapers, magazines and broadcasting stations?" "The rich men," replied Hornsnagle. "Then it is the same as Yap Yap," said the Slobob. "It is the rich men blowing their own horns that make all the noise." From "Dangerous Thoughts", pp. 26-27, by Mike Quin, published by "The People's World", San Francisco, Calif., 1940, softbound, 102 pp. 42 FEAR I. From "Anonymous" Brooklyn, N.Y. I regret having to write anonymously, but as programming manager of a staid, well-known, corporate giant, I feel I must. If not, my comments could prove embarrassing to my company by association. I believe Dick Sprague's articles have no place in your magazine. There was a connection in the first article which appealed for computer time and programming to try to prove a thesis. The later articles, including the one in your December issue, have no relations to computers at all. As they say in Brooklyn ... "enough, already." II. From the Editor The above request from "Anonymous", as he calls himself, needs a reply, although regularly we pay no attention to unsigned letters. The reason is that he brings up the important subject of FEAR within an organization, fear of being out of line, fear of being found reading something "radical" by one's supervisors and colleagues, etc. This fear is then rationalized into arguing that "Computers and Automation" being a computer magazine should not cover the prospective applications of computers to the difficult problem of solving important political assassinations, etc. I know that fear. I have felt that fear myself. I remember once working in the home office of a large life insurance company. There I was completely sure that a number of unpleasant things would happen to me if I seriously stepped out of line, such as joining a union. I would not be fired, no. I would not be totally ostracized, no. But I would lose all my chances of promotion, PERMANENTLY. In addition to the label which I bore, "Ed Berkeley always goes off on tangents", I would have another label o and this label would mean essentially: does not play the game according to the rules; rebelious; undependable; pink; leftist; not a good organization man; not reliable; and the like. I am sure that the same kind of fear exists in the majority of large American business organizations o because the same causes operate. But that fear is wrong o and is un-American. Discrimination against anybody on account of race o color of skin, creed, nationality, sex, age, or similar irrelevant factors is wrong also. The fact of its existence must be adjusted to from time to time, sad to say -- but not at the expense of morally agreeing with it as desirable and appropriate. In regard to prospective applications (as yet unimplemented) of computers in sensitive areas such as political assassinations, I wish to make two comments. One is the comment expressed by Dr. E. S. Savas, Deputy City Administrator, of the City of New York [see the October, 1970 issue, page 7J: "I sense that talented professionals in the computer field are beginning to realize ••• that their systems-oriented way of thinking can ••• be applied successfully to larger problems -- even to important problems in which information need not be sanc~ tified by traversing the innards of an electronic computer prior to its useful employment." COMPUTERS and AUTOMATION for February, 1971 The othe~ comment is that not so very long ago all the applications of computers that were talked about in magazines were prospective and unrealized. In the early 1950's in the computer field, it was often said that the computers worked only Thursday afternoons when the moon was full. And almost all the articles being published about applications of computers that people had boldly planned, but had not yet happened. POLITICAL BLURP SHEET I. From William E. Thibodeau Sarnia, Ontario, Canada The evolution of Computers and Automation is evident. It has gone from "an ordinary magazine" (May, 1970 editorial) to a political blurp sheetl It appears to start this trend in July,1969, and not "since 1957" (November, 1970, editorial) with "The Social Impact of Information Systems". Since July, 1969, Multi-Access Forum and far too many articles and editorials, devoted to politics, ar~ taking up space in a magazine that used to be of value to computer professionals. ~uite I feel that the November, 1970 issue finally proves that C&A no longer pretends to be a computer~ oriented magazine. That issue included: "Confidential and Secret Documents of the Warren Commission Deposited in the U.S. Archives"; "Patterns of Political Assassinations"; "The Life and Times of Clark Squire"; and "Responsible Journalism." On your postcard insert you state: "Change Who? Us? No, not for the sake of change ••• but we do strive to improve." My query is: Towards what are you striving? II. From the Editor First, I would like to correct the timing that Mr. Thibodeau refers to. "Computers and Automation I' ceased being a "respectable", computer-oriented trade journal in 1957. In February, 1958, we published an editorial which should have borne the title, "Is There no Horror Point?", and which read substantially as shown in the adjacent exhibit. Ever since that time "Computers and Automation" has been devoting some space quite often to the subject of: the social responsibilities of computer people; the implications of computers for society; and the social aspects of the profession of "information engineer". Our circulation now is more than three times our circulation then. Second,we believe that it makes good editorial sense to devote a large portion of our magazine rather pertinently and strictly to the computer field, and a small portion to peripheral matters, especially those of great importance outside of the computer field. Finally, anybody who does not wish to read something that is published in our magazine may skip i~ of course there may be other readers who would like to read it, and so we should retain that information. In our editorial opinion there are a significant number of readers who are interested in "off-beat" subjects. In fact, in a ballot held by the Association for Computing Machinery not long ago, about one fifth (2,059) of those voting (9,997) thought the ACM should comment or act on "deeply political and social questions". 43 IS THERE NO HORROR POINT? Edmund C. Berkeley (Editor, Computers and Automation) (Reprinted, with some condensing, from "Computers and Automation", February, 1958) One of the papers recently submitted to "Computers and Automation" to consider for publication was enti tled something like "Diffusion Calculations on the [trade name] Electronic Computer". It came from a writer at the U.S. Army Chemical Corps, and referred to a "chemical munition, which is designed to disseminate an agent in the form of a gaseous or aerosol cloud which will travel near the surface of the earth." The phrase "poison gas" was avoided, but that is the concept which leapt into your editor's mind. This paper reminded me of some of the problems which the Nazis put into arithmetic books for young German boys to study in the days when Hitler was developing the Nazi state. One problem that I remember asked a youngster to calculate how many bombs would be required to destroy a circular town, given that one bomb would destroy such and such an area, and given the diameter of the town. I can well imagine that if automatic electronic digital computers had been available in Nazi Germany, they would have been applied to computations such as finding out how much nerve gas would be economically necessary to kill stated numbers and distributions of Jews in the concentration camps of Buchenwald, Dachau, Maidanek. •.• (The Nazis in fact put to death over 6 million Jews, unarmed and captive.) There are weapons which can be used for defense and not for offense, like a radar-warning network. There are weapons which can be used for defense and offense both, like a fighter air- CONSUMER INFORMATION SYSTEM, COMPUTERIZED, RALPH NADER STYLE To the Editor from T. D. C. Kuch 7554 Spring Lake Drive Bethesda, MD 20034 Ralph Nader's Public Interest Research Group has given me your name as one of those who responded to his call at ACM70 for volunteers to aid in the use of computers for the consumer. The scope of the work to be done is very great. The initial task is to conduct a feasibility study on a computerized Consumer Information System of retail goods and services. Basically, we should provide recommendations to the P.I.R.G. on what can be done at what cost. Can a small, expandible system be implemented, or would it become useful only if it were done on a large scale initially? How should it be designed? These are some of the questions that immediately come to mind. We should focus on technical feasibility first, financial feasibility (cost/effectiveness) 44 craft. And there are weapons that can be used for offense only, like poison gas and biological warfare, such as the spreading of a mortal disease that only one combatant has an antitoxin for ... Incidentally, successful biological warfare is probably more scientifically efficient than any kind of atomic bomb because it selects human beings and puts them to death, leaving enemy property intact and the air and earth uncontaminated by any radioactivity To look back in history, there are other weapons used for offense only, and especially against captives: torture, starvation, operations to change the character or virility of a prisoner, the torture of the prisoner's wife and children in front of him ••• All these fields are open to science, the scientific method of experiment and investigation, the solving of intricate problems by automatic computing machinery. But is there no horror point? Is there no point at which a self-respecting human being should say "I cannot do this -- I cannot study this, investigate this, publish this, ••• I cannot have anything to do with this, this is horrible"? President Eisenhower on January 10, 1958, in his State of the Union Message to Congress, said, "In the last analysis there is only one solution to the grim problems that lie ahead. The world must stop the present plunge towards more and more destructive weapons and war, and turn the corner that will put our steps firmly on the path towards lasting peace." In agreement with that view, we trust it will be a very long time, if ever, before "Computers and Automation" publishes articles dealing with "diffusion calculations" on the spreading of poison gas. second. Althoug~ legal questions will enter into any discussions of this sort, they should be, as much as possible, left to the attorneys on the P.I.R.G. staff. Following is some material which may help you get started, in the form of quotations from letters and articles. Although most of us are members of ACM, I would like to emphasize that we are doing this as individuals, and no presentation to the P.I.R.G., to Congress, etc., will imply that any opinion is the opinion of ACM or of any of our various employers. The initial membership of this volunteer group is 32 persons, who volunteered at ACM70. There is room for perhaps 50 Or 60 more volunteers before it will become unwieldy. If any reader of Computers and Automation is interested, would~ please write to me? Since you may not know me, I should introduce myself: I am a supervisory computer specialist with the National Cancer Institute, have been an ACM member since 1962, am a member of ACM SICCAS, a senior member and local officer of ACPA, and a COMPUTERS and AUTOMATION for February, 1971 sometime contributor to DatamatIon, Computers and Automation, and other computer publications. Our group contains some of the best-known names in the field of computers and data processing, and I am looking forward to working with each of you. If we apply our expertise energetically, we can be of great service to our country, and to our profession. Supplement: A Consumer Information System: Material for Study 1. From Ralph Nader, "Computers and the Consumer" in Computers and Automation, October 1970 (adapted from the keynote address to ACM70): "The first subject that interests me is the use of the computer in the consumer area; its use fits in beautifully with classical economic theory. "The basic theory of the free market system which of course doesn't exist any more in the world, much less in this country -- is buyer knowledge. Without buyer knowledge the free market mechanism feeding back preferences and dispreferences to the producer or seller, is impossible. "Moreover the quality of competition that increases in excellence rather than decreases toward trivia, shoddiness, and camouflage must rest, again, on buyer knowledge about various competing products and services. That is the only way the market mechanism can aggregate the rational choices of consumers in such a way as to reward the superior product~ and servic~s, and penalize the shoddy products or fraudulent services. "We need the kind of feedback which is based on the disclosure of product and service information "The consumer and the computer should be a major concern of somebody in the society. At the present time the capability for gathering and providing information about products and services for consumer use is as primitive as the Gutenberg printing press. It has not gone any further." 2. From a lette~ from Ralph Nader to T.D.C. Kuch, November 18, 1970: "There are areas in which computers could render great benefits to the consumer; for individuals, maintaining ready ,access to medical records and accident reports; for specific products, providing comprehensive data on test results, accident reports, consumer complaints, useful life, safety and similar factual information necessary for a rational choice in the marketplace. A highly developed consumer information service, utilizing computers, could offset the fantasyland of media advertising with much-needed information .... "What is neederl for the present is for you to give us your pertinent ideas, materials and recommended priorities for utilization of computers as a tool to serve the consumer. You who understand computer technology and who see the directions in which it is headed must devis~ systems for the consumer. The question is whet~er the data bank will remain the tool of the corporation or whether it will become an information resource for the benefit of the public to use." COMPUTERS and AUTOMATION for February, 1971 3. From a letter from Christian S. White (Public Interest Research Group) to T.D.C. Kuch, December 8, 1970: "One area in which computers can be of great value to the consumer is in providing a service comparable to credit reporting for consumers with questions about specific businesses. Storage and retrieval of complaints, accident and inj ury reports, and similar data by store, manufacturer, and product model are some uses which come to mind. Are the elements necessary to such a system in existence? Is the cost of such a system in the range of feasibility? Obviously this will be a massive undertaking. As you can see, much expertise is needed for this project. I look forward to hearing any proposals that you have." 4. From Computerworld, December 9, 1970, article "Consumers Get a Data Bank": "MADISON, Wis.--Wisconsin has set up a data bank to analyze consumer complaints. The attorneygeneral ••• said the programs were developed to show how initial sales contracts were made, the industries involved, and the nature of the practices that gave substance to the complaints •••• "The state's Bureau of Systems and Data Processing's IBM 360/50 runs the program for the bank •••• The data bank, the state said, will enable authorities to pinpoint trouble sources by industry, location, and type of offense with the vendors guilty of unfair practices categorized and located more easily." The WANG 700 Series _ Now a calculator that lets you write your own programs and store them on a tape cassette It's easy to store, enter or change programs with a 700 Series and there are no language problems. You already have the knowledge in the math steps you're now using to solve your problems. With the Wang 700 you'll have more than a calculator. There are 16 special function keys that make it personally yours - you can determine the function each performs. And a choice of typewriter or printer/plotter output turns the 700 Series into a fully programmable calculating system. And to make it even easier, Wang offers a library of preprogrammed cassettes for the many standard needs. Want a demonstration? Call Mr. Courtney collect at 617-851-7211 or send us the coupon. r---------------------, 1Wang Laboratories, Inc. Dept. CA·2 1836 North Street. Tewksbury. Mass. 01876 I'd like a 700 demonstration as soon as possible. Call me at I for a date. I-----(-P-h-o-ne--nu-m-b-e-r-)----- 1 I Name I I Company I I I I 1Street 1 IL City State zip _1 ____________ ______ __ __ _ ~ 45 EDITORIAL (Reprinted from February ~ 19 70) "Th·e House is on Fire" In the computer field, there are basically two kinds of attitudes about the applications of computers and data processing-information handling-to the solving of problems. On the one hand there is the attitude: Computers are tools like matches-:-and we ~re )ust mechanics. We take the data as given (the kindling). Our responsibility is the processing-swift, economical, correct (making a fire with matches). The answers belong to our employer (he uses the fire as he sees fit). The group who holds this attitude-let's call it Group 1takes the data and the problem as given-given by the corporation or the government, the employer or the client, who has the problem. This group works on payrolls, etc.-and on the targeting of nuclear missiles and on calculations of the dissemination of nerve gases. And they work on the latter with the same "I'm just doing my job" attitude that they work on the former. In Nazi Germany Group I would have worked "under orders" on the design of ovens for efficient mass incineration of thousands of corpses from the gas chambers. (The Nazis put to death in concentration camps over 11 million Jews, Russians, Poles, Czechs, French, etc., in pursuit of the "final solution".) If you read "Treblinka" by Jean-Francois Steiner (Simon & Schuster, New York, 1967) you find out how one Nazi scientist graded corpses from fat to thin so the fires would burn better. On the other hand there is the attitude: Computers are tools like bridges-and we are professional engineers. We take the data as given (the materials and the site) but we check the data independently. Our responsibility is not only processing-swift, economical, correct (building a bridge with girders)but also worthwhile answers (bridges that work). The bridges we build must carry people, and we don't want them to crash. The group who holds this attitude-let's call it Group II -works on payrolls, etc.-but they will refuse to work on calculations for the dissemination of nerve gases, or on calculations for targeting of nuclear weapons, or on calculations for the design -of crematoria for thousands of human corpses. They see a responsibility greater than that to their government or employer-they see a primary responsibility to their fellowman. A recent vote of members of the Association for Computing Machinery indicated that the proportion of Group I to Group II is about two to one. I n other words, twothirds of the computer people who replied to the survey on the "questions of importance", voted that the ACM should not "take a stand on deeply political questions." The attitude of Group I is a characteristically conservative attitude: liThe world is going along pretty well"-"Let us not rock the boat"-"The existing system should be tolerated"-"Things will eventually work out all right""Professional people have their major allegiance to the persons who pay them"-"A computer professional has no social responsibility different from that of the nonprofessional man".... The attitude of Group II is a characteristically liberal attitude: "The world can be a much better place than it is now"-"It is important to try to improve the world""Such a vast number of sad and evil things happen in the 46 world that everybody must do something significant to help prevent them"-"The fact that thousands of human beings have been killed by both sides in the Viet Nam conflict requires people everywhere to seek withdrawal of foreign armed forces from that unhappy civil war." Scientifically it is easy to show that the attitude of Group I will lead to the destruction and extinction of the human race, just as the dinosaurs became extinct. Scientifically it is not possible to show that tne attitude of Group II will lead to the survival of human beings on the earth: it is only possible to show that the attitude of Group II offers human beings some hope of survival in the increasingly more difficult environment on earth, the "house" for aII of us. For lithe house is on fire": the earth as an environment for human beings has changed enormously in the last 25 years and is deteriorating fairly rapidly. Before 1945, the factor of sufficient distance from a danger could almost always save human beings alive. Now, distance is not enough. Now, because of interlocking planet-wide systems of consequences, the environment of the earth is no longer safe for human beings. For example: Large-scale nuclear war (and its radioactivity) between two countries in the Northern hemisphere can kill all the inhabitants of that hemisphere. International anarchy allows this to break out at the choice of one government. The explosive increase in the number of human beings alive-the so-called population explosionseriouslY threatens the power of the earth to support them. Worldwide anarchy allows any man and woman to bear children unrestrictedly. Pollution of the air, the water, and the land by man's activities is becoming world-wide. Again, international anarchy allows this to happen everywhere. Etc. "The house is on fire". So it is necessary for all persons living in the "house" to take some time away from their play rooms, their work rooms, and their bedrooms, their computer rooms, their laboratories, and their ivory towersand to try to help put out the fire. The fire is licking at the edges of the roof and the walls and the floors-and time is pressing and will not wait. Accordingly, Computers and Automation with this issue is starting a department in the magazine which for the present will bear the subtitle liThe House is on Fire" and the title "The Profession of Information Engineer." Here we plan to publish information from time to time which will help focus the attention of computer professionals in the direction of becoming information engineers, IIbridge" engineers,-not mechanics, not artisans. For we are, first of all, human beings with professional training, and secondly, we are computer professionals. We need to shed light on major urgent problems of the earth today. These are the great problems which cause our children to be lIa generation in search of a future," to use the phrase of Professor George Wald, Nobel prizewinner in biochemistry. These are the great problems which raise the great question: Will there be any future at all for our children? t~C.~~ Editor \ COMPUTERS and AUTOMATION for February, 1971 CALENDAR OF COMING EVENTS Feb. 17·19, 1971: Sixth Annual Conference on Use of Digital Com· puters in Process Control, Louisiana State Univ., Baton Rouge, La. / contact: Dr. Cecil L. Smith, Dept. of Chemical Engineering, Louisiana State Univ., Baton Rouge, La. 70803 Apr. 13·16, 1971: Ninth Annual Convention of the Association for Educational Data Systems, Royal York Hotel, Toronto, Ontario, Canada / contact: AEDS Convention, P.O. Box 426, Don Mills, Ontario, Canada Feb. 18·19, 1971: 31st Management Conference of the Association of Data Processing Service Organization (ADAPSO), Mountain Shadows Hotel, Phoenix, Ariz. / contact: ADAPSO, 551 Fifth Ave., New York, N.Y. 10017 May 3·5, 1971: Data Processing Supplies Association, Affiliate Mem· bership Meeting, Copenhagen, Denmark / contact: Data Processing Supplies Association, 1116 Summer St., Stamford, Conn. 06905 Feb. 22·24, 1971: DPl's 1971 Data Processing Conference and Trade Show, Skyline Hotel, Ottawa, Ontario, Canada / contact: Revett Eldred, Conference 71 Publicity, Data Processing Inst., Box 2458, Postal Station D, Ottawa 4, Ontario, Canada Feb. 22·24, 1971: San Diego Biomedical Symposium - 1971, Ramada Inn, Harbor Island, San Diego, Calif. / contact: Richard D. Yoder, M.D., Univ. of California, San Diego, University Hospital of San Diego County, 225 West Dickinson St., San Diego, Calif. 92103 Mar. 1·3, 1971: Data Processing Supplies Association, Spring Mem· bership Meeting, The Doral Hotel & Country Club, Miami, Fla. / contact: Data Processing Supplies Association, 1116 Summer St., Stamford, Conn. 06905 May 11.13, 1971: IEEE (Institute of Electrical and Electronic Engi. neers) 1971 Region Six Conference, Wood Lake Inn, Sacramento, Calif. / contact: Dr. D. H. Gillot, Co-Chmn, IEEE Region 6 Confer· ence, Sacramento State College, Dept. Of Electrical Engineering, 6000 Jay St., Sacramento, Calif. 95819; or, Dr. R. F. Soohoo, Program Chmn., IEEE Region 6 Conference, Univ. of California at Davis, Dept. of Electrical Engineering, Davis, Calif. 95616 May 12·14, 1971: 22nd Annual Conference of the American Institute of Industrial Engineers (AilE), Boston, Mass. / contaci: Anthony J. Jannetti, Exhibit Manager, c/o Charles B. Slack, Inc., Pitman, N.J. 08071 May 18·20, 1971: Spr.ing Joint Computer Conference, Convention Ctr., Atlantic City, N.J. / contact: AFIPS Headquarters, 210 Summit Ave., Montvale, N.J. 07645 Mar. 1·3, 1971: First International Symposium on Fault·Tolerant Com· puting, Huntington-Sheraton Hotel, Pasadena, Calif. / contact: Dr. Francis P. Mathur, Sec'y, IEEE Technical Comm.on Fault-Tolerant Computing, Jet Propulsion Laboratory, Calif. Institute of Tech., 4800 Oak Grove Dr., Pasadena, Calif. 91103 May 24·26, 1971: Power Industry Computer Appllcations Technical Confere.nce, Statler Hilton Hotel, Boston, Mass. / contact: P. L. Dandeno, Hydro Electric Power Commission of Ontario, 620 University Ave., Toronto, Ontario, Canada Mar. 9·13, 1971: INEL 71, the 5th International Exhibition of Industrial Electronics, Basel, Switzerland / contact: Sekretariat INEL 71, CH-4000, Basel 21, Switzerland May 24·28, 1971: 2nd International IFAC Conference and Exhibition "P.R.P .•Automation", Centenary Halls, Brussels, Belgium / contact: IFAC/P.R.P.-Automation, Jan van Rijswijcklaan 58, B-2000 Antwerp, Belgium March 10, 1971: Fourth Annual Symposium on Automatic Data Processing (sponsored' by Federal Executive Board of Federal ADP Council of New England), Sheraton-Boston Hotel, Prudential Center, Boston, Mass. / contact: Thomas T. Donovan, Air Force Computer Operations Div. (MCCO), L. G. Hanscom Field, Bedford, Mass. 01730 March 17·18, 1971: Spring Conference of The Association for Sys. tems Management, Royal York Hotel, Toronto, Ontario, Canada / contact: Donald T. Laughton, Chmn., Spe~ial Conference, North American Life Assurance Co., 105 Adelaide St. West, Toronto 1, Ontario, Canada Mar. 22·24, 1971: Ninth Annual Symposium on Biomathematics and Computer Science in the Life Sciences, Univ. of Texas Graduate School of Biomedical Sciences / contact: Office of the Dean, Univ. of Texas Graduate School of Biomedical Sciences at Houston, Div. of Continuing Education, P.O. Box 20367, Houston, Tex. 77025 Mar~ 22·24, 1971: Numerical Control Society's Eighth Annual Meeting and Technical Conference, Disneyland Hotel, Anaheim, Calif. / contact: William H. White, Numerical Control Society, 44 Nassau St., Princeton, N. J. 08540 Mar. 22·25, 1971: IEEE International Convention & Exhibition, Coliseum & N.Y. Hilton, New York, N.Y. / contact: IEEE Headquarters, 345 E. 47th St., New York, N.Y. 10017 Mar. 23·26, 1971: Third National Meeting of the Information Industry Assoc., Host Farm Resort, Lancaster, Pa. / contact: Paul G. Zurkowski, IIA Washington, 1025 Fifteenth St., N.W., Washington, D.C. 20005 ,Mar. 29·Apr. 2, 1971: Datafair '71 Conference, Nottingham Univ., Nottingham, England / contact: Datafair '71 Conference Office, The British Computer Society, 21 Lamb's Conduit St., London, W.C.l, England Apr. 1·2, 1971: ACM Symposium on Information Storage and Re· trieval, Univ. of Maryland, College Park, Md. / contact: Dr. Jack Minker, Computer Science Center, Univ. of Maryland, College Park, Md. 20742 Apr. 5·8, 1971: The First National Educational Technology Conference, American Hotel, New York, N.Y. / contact: Conference Manager, Educational Technology, Englewood Cliffs, N.J. 07632 COMPUTERS and AUTOMATION for February, 1971 June 1·4, 1971: Seventh Annual Data Processing and Automation Conference, National Rural Electric Cooperative Assoc., Marriott Motor Hotel, Atlanta, Ga. / contact: C. E. Aultz, NRECA, 2000 Florida Ave. N.W., Washington, D.C. 20009 June 2·5, 1971: 3rd IFAC/IFIP Conference on Digital Computer Appli. caHons to Process Control, Technical University, Otaniemi, Finland / contact: 3rd IFAC/IFIP Conference, Box 10192, Helsinki 10, Finland June 3·5, 1971: Conference on Area.Wide Health Data Network, School of Medicine, State Univ. of New York at Buffalo, Buffalo, N.Y. / contact: Continuing Medical Education, 2211 Main St., Buffalo, N.Y. 14214 June 7·9, 1971: International Computer Forum and Exposition (Com. For), McCormick Place-on-the-Lake, Chicago, III. / contact: National Electronics Conference, Inc., Oakbrook Executive Place II, 1211 W. 22nd St., Oak Brook, III. 60521 June 21·22, 1971: Ninth Annual Conference of the Special Interest Group on Computer Personnel Research of the Association for Computing Machinery, Center for Continuing Education, Univ. of Chicago, III. / contact: Fred A. Gluckson, EDP Systems Dept., National Bank of Detroit, Detroit, Mich. 48232· July 26·29, 1971: First International Computer Exposition for Latin Amer.ica, sponsored by the Computer Society of Mexico, Camino Real Hotel, Mexico City, Mexico I contact: Bernard Lane, Computer Exposition, Inc., 254 West 31st St., New York, N.Y. 10001 Aug. 3·6, 1971: IFAC Symposium on The Operator, Engineer and Man. agement Interface with the Process Control Computer, Purdue University, Lafayette, Ind. / contact: Dr. Theodore J. Williams, Purdue Laboratory for Applied Industrial Control, Purdue University, Lafayette, Ind. 47907 Aug. 11.13, 1971: Joint Automatic Control Conference, Washington Univ., St. Louis, Mo. / contact: R. W. Brockett, Pierce Hall, Harvard Univ., Cambridge, Mass. 02138 Aug. 16·19, 1971: International Symposium on the Theory of Ma· chines and Computations, Technion Israel Institute of Technology, Haifa, Israel/contact: Sheldon B. Akers, Secretary, IEEE Technical Comm. on Switching and Automata Theory, General Electric Co., Bldg. 3, Room 226, Electronics Park, Syracuse, N.Y. 13201 47 REPORT OF THE NATIONAL COMMITTEE TO INVESTIGATE ASSASSINATIONS Bernard Fensterwald, James Lesar, and RObert Smith CTIA ASSASSINATION LAWSUITS Note: Following are a number of excerpts from "The CTIA News", January 1971 issue, Vol. 1, No.1. This bulletin is to be published quarterly by the Committee to Investigate Assinations, 927 15th St., N.W., Room 409, Washington, D.C., 20005. Bernard Fensterwald, an attorney, is executive director of the committee. Any persons interested are invited to write to the Committee, ask to receive the bulletin, and make a contribution to the Committee's work. CTIA COMPUTER PROJECT The CTIA has undertaken to computerize some voluminous files of written data compiled in the course of the investigation into the assassination of President John F. Kennedy. At p~esent, we are storing data on various kinds of association or connection between people, places, organizations, and activities (including dates or other chronological data) as reported in selected source documents. The information is tabulated on a coding sheet, converted to numbers according to a numerical key, and then punched into IBM cards for input into computer storage and processing. When complete, we expect to be able to supply quick answers, within the limits of the data available to such questions as: Where was Lee Harvey Oswald on November 5, 1963? What acquaintances, if any, did Jack Ruby and David Ferrie have in common? What organizations did Marina Oswald belong to while living in Minsk? Questions of this type frequently come up. yet are often beyond the reach of the memories of individual experts. The computer, on the other hand, can store large volumes of such data, sort it out in various ways, and print it out on demand. The coding system for this project was devised during the summer of 1970 through the collaborative efforts of Dick Sprague, Bud Fensterwald, Bob Smith and Dick Ehlke. Most of the coding that has been done to date, which includes the Warren Report, several books, and many of the CTIA office files, is the work of Dick Ehlke. Others are developing the programs for storage, retrieval, and correlation of the data. The CTIA needs help from persons willing to spend time reading and extracting data from source documents in their possession. This work requires no knowledge of computers, but demands careful and systematic tabulation of information. Standard forms and instructions are available from CTIA offices. Write us if you can help. Most of the 26 volumes of Hearings and Evidence published by the ~arren Commission still await extraction; so there IS plenty to do. 48 1. James Earl Ray On the judicial battlefront, a number of assassination-related suits are slowly wending their way through the courts. Foremost, perhaps, is James Earl Ray's petition for a new trial~ [Ray was convicted, by an act of plea-bargaining, of the murder of Reverend Martin Luther King, Jr.; see the article "The A.ssassination of Martin Luther King, Jr., the Role of James Earl Ray, and the Question of Conspiracy" by R. E. Sprague, in "Computers and Automation", December, 1970, p. 39.J Midway through the September 2nd hearing in Memphis, Tenn., Judge Williams indicated a desire for further details in support of Ray's allegations, particularly the allegation that Ray's former attorney, Percy Foreman, negotiated the guilty plea directly with Judge Battle rather than with the District Attorney's office. To meet this request, the hearing was continued over. We subsequently filed a supplemental petition containing many additional facts in support of our allegations. Our next bout in court is now set for February 23rd. That is five months from September 22nd, when we filed our Supplemental Petition. It took the State of Tennessee two and a half months to produce a two-page reply to the Supplement. However brief, this time the State's reply clearly joined issue by denying the facts alleged in our Supplement, rather than merely asserting, as in the past, that our petitions contained tinly "conclusionary allegations" which were insufficient grounds for holding an evidentiary hearing. This means that on February 23rd we will move for an evidentiary hearing, since the State's denial of our allegations has created issues of fact which can only be resolved by such a hearing. Under Tennessee law James Earl Ray is required to testify at such evidentiary hearing. 2. Sirhan B. Sirhan On the west coast, Sirhan Sirhan's appeal is getting under way. Sirhan's attorney, Luke McKissack, recently filed a 700-page brief alleging some 18 grounds for relief. It is now rumored that Melvin Belli will represent Sirhan on appeal. COMPUTERS and AUTOMATION for February, 1971 3. Spectographic Analysis In an attempt to shake loose some of the vast mound of suppressed assassination documents, a ,number of civil suit~ have been filed under the Freedom of Information Act. More such suits will be filed in the near future. The Freedom of Information Act suit with perhaps the greatest potential -- one which may ultimately go all the way to the Supreme Court -- is the "Spectro suit." This suit, filed by Harold Weisberg, seeks access to the spectographic analyses made of bullets, bullet fragments, and the clothing of President Kennedy. Judge Sirica recently granted a motion by the United States Attorney to dismiss the Spectro suit. Oral argument on the Spectro complaint was severely circumscribed by the ~Judge - to less than 30 minutes. Assistant United States Attorney Robert Werdlg asserted that it had been determined by the Justice Department it was "not in the national interest" to make public the spectographic analyses. While the Freedom of Information Act provides that certain agency records may be exempt from public disclosure on grounds of "national security," the law says nothing at all about "national interest," and, in any event, neither can be invoked purely on the say-so of an assistant U.S. Attorney. In addition, it is difficult to see how it would be against the national interest to learn whatever truth may be revealed by scientific tests like spectographic analysis. 4. Nuclear Activation Analysis Somewhat along the same lines as the Spectro suit is a complaint filed by Dr. John Nichols in Topeka, Kansas. The Nichols suit requests that he be allowed to examine the bullets, bullet fragments, and articles of clothing of President Kennedy by a process known as nuclear activation analysis. There are two important advantages to nuclear activation analysis. The first is that the tests may be performed without in any way mutilating, diminishing, or even marking the specimens which are analyzed. Secondly, nuclear activation is ten times more refined than spectographic analysis; it can detect very minute quantities of a trace element which might not be revealed by spectographic examination alone, thus improving the chances of making a unique determination of the origin or history of the specimen. Unfortunately, when Warren Commission staff member Melvin Eisenberg raised the question of whether nuclear activation analyses would show if a bullet had passed through President Kennedy's tie or shirt collar, J. Edgar Hoover rejected any inquiry in that direction, merely asserting "it is not felt that the increased sensitivity of neutron activation analyses would contribute substantially to the understanding of the origin of this hole and frayed area." (Vol. XX, p. 2) 5. Clothing of President Kennedy There are two other Freedom of Information suits now before the courts. Harold Weisberg has filed COMPUTERS and AUTOMATION for February, 1971 a sui t, pro se, ,which asks that he be given access to inspect articles of the President's clothing, or, alternatively, that photographs of the clothing be made for him or copies of existing photographs of the clothing made by the Archives be given him. The first hearing on this suit will probably come in early 1971 before U.S. District Judge Gerhard Gesell. 6. Access to FBI File for Senator Kennedy In the second suit, the Committee to Investigate Assassinations has filed a complaint against the Department of Justice for access to the 6,000page FBI report on the RFK assassination. This file was made available to Sirhan's defense counsel and to author Robert Blair Kaiser (author of "F.:.F.K. Must Die"), but the Justice Department has ref~ to grant us access to it. A number of other Freedom of Information suits relative to the assassination of President Kennedy are being contemplated. These include suits for access to: (1) the FBI reports on David Ferrie; (2) the file on Lee Harvey Oswald which the Russians turned over to the U.S. Government; and (3) the raw materials used by the autopsy panel which Ramsey Clark convened just prior to the trial of Clay Shaw in New Orleans. NEW ASSASSINATION BOOKS In the literary field. two books dealing with assassinations have been published recently, and a third is expected to hit the bookstands in early 1971. Robert Blair Kaiser has authored the first critical examination of the investigation into the RFK assassination. "R.LK. Must Die: A History of the Robert Kennedy Assassination and its Aftermath," published by E.P. Dutton Co., presents the thesis that Sirhan shot Kennedy under the influence of post-hypnotic suggestion and points to a possible conspiracy in that assassination. It contains much data not o~herwise available in published form. A Heritage of Stone, by District Attorney Jim Garrison of New Orleans, has also been published by G.P. Putnam's Sons, New York. A favorable review of it appeared in the New York Times. Garrison's book largely avoids any discussion of the Clay Shaw trial. Instead, Garrison concentrates on the politics of the assassination. Basically, the book argues the thesis that President John F. Kennedy was assassinated because he threatened the pOlitical interests of the military-industrial-intelligence complex. In particular, Garrison feels that the JFK assassination was tied to policies which the President had begun to implement to abate Cold War tensions, including a planned withdrawal of American troops from Vietnam. Harold Weisberg has now written a book on the assassination of Dr. Martin Luther King. It is to be published early next year by Outerbridge and Dienstfry, New York, under the title of Frame-Up. The book argues very persuasively that: 1) James Earl Ray did not shoot Dr. King, 2) the assassination could not have been carried out as officially described, and 3) there is abundant evidence of a conspiracy. 49 DOES THE ARMY MONITOR ASSASSINATIONS, TOO? Grounds for belief that intelligence components of the military services might have been conducting surveillance operations at the scene of the assassinations of Martin Luther King, Jr., and Senator Robert Kennedy were established by disclosures made during NBC's "First Tuesday" telecast on December 1 st, 1970. The second hour of the tel ecast, narrated by Sander Vanocur~ documented numerous and widespread instances in which agents gathered data on attendees at various political functions. Some of the fUnctions covered include the 1968 political conventions in Miami and Chicago, the MLK funeral, and the Poor People's March on Washington. According to various former Army agents who appeared on the telecast, the Army monitored communications, took photographs, and prepared detailed reports of individuals observed at these functions, purportedly in the interest of preventing civil disturbance. Extensive files from these surveillances are stored at Fort Holabird, Md. Although not mentioned in the telecast, the visit of Martin Luther King~ Jr.,to Memphis and the campaign wind-up of Senator Robert F. Kennedy in Los Angeles were events of the same character as had drawn the attentions of the Army observers, both on earlier and later occasions. Notwithstanding the absence of public reports in these instances, the presumption is that they were covered, at least in some degree •. Or if not, it might be asked, why not? In a subsequent statement published in the Washington Star, former Defense Secretary Clark Clifford denied any knowledge that such things were going on. Therefore he implied that the military operates independently of the Office of the Secretary of Defense in such matters. Apparently, surveillance of the American public by our own military services can and does occur without the knowledge of responsible officials. Senator Ervin has now announced that he will hold hearings on the subject sometime in late February or early March. The possibility that some sort of early version of such surveillance might have been operating in Dallas ought not to be dismissed. Students of the assassination of President Kennedy were aware long ago that an agent of the Army Intelligence Corps was present in Dealey Plaza. He took a photograph of the TSBD some 30 seconds after the shots and subsequently entered the building and "worked wi th the Sheriff's Deputies at the rear." He reported to the FBI that he had submitted a report of his activities to his unit and that the report would be made available on request (see pp. 312-313 in "Six Seconds in Dallas", by Josiah Thompson, published by Bernard Geis and Associates, New York). Neither his photograph nor his report have ever been disclosed, nor is his name mentioned in the Warren Report or the 26 volumes of "Hearings and Evidence" . We hope that Senator Ervin will see fit to ask questions about the Army's possible knowledge of these assassinations. Was it present, officially or unofficially, at any of the three major assassinations? Where are its reports? Why, in its se1£appointed role as monitor of potential civil disturbances, has the Army been unable to provide any protection to our leaders? 50 "Computers And Automation" New Article Series: Computers, Science, And Assassinations "The Assassination of President John F. Kennedy: The Application of Computers to the Photographic Evidence" - Richard E. Sprague Computer Consultant May, 1970 "Computer-Assisted Analysis of Political Assassinations" - Edmund C. Berkeley Editor, Computers and Automation May "Visual Re-creation of a Scene by Computer Graphics" - Leslie Mezei Prof., Univ. of Toronto July "Confirmation of FBI Knowledge 12 Days Before Dallas of a Plot to Kill President Kennedy" - Edmund C. Berkeley Editor, Computers and Automation July "The Second Conspiracy About the Assassination of President Kennedy: - Richard E. Sprague Computer Consultant July "The Assassination of Senator Robert August F. Kennedy: Two Men with Guns Drawn at Senator Kennedy's Assassination" - Statement to the Press by Theodore Charach, Free-Lance Journalist "Patterns of Political Assassination: How Many Coincidences Make a Plot?" - Edmund C. Berkeley Edi to'r, Computers and Automation September "Computer-Assisted Analysis of Evidence Regarding the Assassination of President John F. Kennedy -- Progress Report" - Richard E. Sprague Computer Consultant September "The Conspiracy to Assassinate Senator Robert F. Kennedy and the Second Conspiracy to Cover It Up" - Richard E. Sprague Computer Consultant October "Index to 'Special Unit Senator: The Investigation of the Assassination of Senator Robert F. Kennedy'" October "Confidential and Secret Documents of the Warren Commission Deposited in the U.S. Archives" - Neil Macdonald, Assistant Editor Computers and Automation November "The Assassination of Reverend Martin Luther King, Jr., The Role of James Earl Ray, and the Question of Conspiracy" - Richard E. Sprague Computer Consultant December 1971 "The Death of Walter Reuther: Accidental or Planned?" - Edmund C. Berkeley, Editor, and Leonard Walden, Investigator Ja~y COMPUTERS and AUTOMATION for February, 1971 ACROSS THE EDITOR'S DESK APPLICATIONS COMPUTER AIDS RESEARCH OF FEMALE REPRODUCTIVE CYCLE At the Universi ty of Illinois Medical Center Campus in Chicago, Neena B. Schwartz, director of the psychiatry· department's Biology Laboratory in the U. of I. College of Medicine, is using a computer to simulate the female ovulation process. The computer-simulated model permi ts the tes ting of many hypotheses on rats in a laboratory. Among the many possible experiments, the compu ter model helps identify the cri tical ones that must be performed on the rats, explained Dr. Schwartz. "The critical element, ultimately. is not how the computer model behaves, bu t how the ra ts behave," she said. Wi th the help of Paul Wal tz of Equation Models Associates in Arlington Hgts., Ill., Dr. Schwartz is gradually developing an increasingly complex computer model, a "systems analys is" of the role ovulation plays in regulating reproductive cycles. Creating a realistic computer model has helped Dr. Schwartz to refine her laboratory research, forcing her to make new biological measurements that previously were not made, e.g., measuring how much Luteinizing Hormone (LH) is necessary to cause es trogen (a sexual hormone in females) secretion from the ovary. "This sort of by-product is one of the real payoffs from the computer," she said. (Dr. Schwartz is a physiologist specializing in "neuroendocrinology" (study of the brain's relation to hormone secretions in the body). Using IBM's special simulation language "Continuous'Systems Modeling Program," which permi ts continuous systems to be simulated in a digital computer, models are being formed to simulate ovulation, estrogen secretion and LH secretion. Various kinds of data are programmed into the computer, including the negative feedback effect of estrogen on LH and the 24-hour "clock" that simulates hours of lightness and darkness (which affect rats' reproductive cycles). Eventually the computer simulation leads back to the laboratory for verification of the computer's results. search would ge in preventing conception in women who, for medica~ reasons, cannot take the birth control pill and would be endangered by pregnancy. More generally, the research is aimed at helping determine what factors account for the various cycleswi thin the human body. ART PROFESSOR GENERATES 3-D ART USING COMPUTER University of Massachusetts Art Professor Robert Mallary has been using a computer as an assistant in generating three-dimens ional art. Mr. Mallary is'one of the pioneers in this country in developing specific computer programs for sculpture which allow the computer to determine shapes. TRAN 2. Mr. Mallary's program,establishes sets of numerical co-ordinates in the computer's memory which can be used to sketch out an abstract, threedimensional shape. Varying the numbers can squeeze, stretch or twist this shape in a nearly infini te number of variations. He uses an IBM 1130 computer because its output hardware includes a computer driven plotter that can draw out his shapes. The computer and plotter can be programmed to draw the shape from a variety of sides and a variety of angles. The plotter also can be directed to draw out a set of contour slices: The contour printout is photographed, projected onto plastic, plywood or other material, thus forming the pattern for the sections of the finished sculpture. Mr. Mallary cuts out the sections, drills a center axis, and cements the slices into the finished shape around a metal center rod. Smoothing and finishing completes the piece. All of the laboratory and computer studies are aimed at a more complete understanding of the ovulation process to give man the power to stop or start it. One eventual clinical use for Dr. Schwartz' reCOMPUTERS and AUTOMATION for February, 1971 Quad III His firs t computer work, a laminated plexiglass piece, named Quad I, was exhibited at the Insti tute of Con temporary Art in London in the summer of 1968. Quad III, at the left, a laminated luaun veneer piece sixty inches high, was included ina 1968 Whitney Museum exhibition of the contemporary American.sculp ture, and the following spring at the Contemporary Crafts Mu:" seum in New York Ci ty. Mr. Mallary sees a big future for computer sculpture. "Linked to a tape-dri ven machine tool a compu ter might produce 100 or 200 small carvings an hour. Most of these might be thrown away bu t one or two could become the prototypes for large~ scale works." He predicts that ul tima tely the compu ter may even be able to "learn" the stylistic preferences and idiosyncracies of the sculptor. who is using it, retain this information and be able to produce works "in the manner of" the sculptor. DESIGN, DEVELOP AND TEST AIRCRAFT BRAKING SYSTEMS WITH AID OF EAI COMPUTER Goodyear Tire & Rubber Company t s Aviation Products Division is using an EAI 580 computer system (manufactured by Electronic Associates Inc., Long Branch, N.J.) in a new aircraft simulation' program. The computer has been taught to "perform" like an airplane to help engineers design and develop new braking systems for present and future aircraft. The equipment simulates the dynamics of an airplane during taxiing, take off and landing and the resul ting action of wheels, brakes, tires and antiskid equipment. The EAI 580 can operate exclusively wi th mathematical models of aircraft and landing gear characteristics or with a combination of math models and actual gear hardware. This means that new landing gear equipmen t can be checked for proper performance during all stages of development. Total Braking System Respons ibili ty reduces flight tes ting time requi red for new landing gear equipment by integrating components into a single system. This permits engineers to know exactly how all components will perform before they are actually installed and test flown on the aircraft. Firs t aircraft programmed for computerized take-offs and landings was the McDonnell Douglas DC-IO, a new wide-body tri-jet airliner that made its maiden flight in July. DISRUPTIVE "DIG-UPS" BY CONSTRUCTION CONTRACTORS AVERTED WITH COMPUTERIZED "LOOK-UP" CENTER IN CALIF. A new computer-based service, to prevent disruptive "dig-ups" of underground telephone facili ties I has been put into operation by General Telephone Compant of Cal51 ifornia 9 a subsidiary of General Telephone &Electronics Corp. Initiated this past fall throughout the telephone company's operating territory, early results have been termed 'good' - wi than average of 12 calls a day from contractors requesting the location of underground fa cil i ti e s up 1500/0 since the service was established. Under the arrangement, all contractors planning to dig into the ground are asked to make collect telephone calls to the company's underground "look-up" center in Monrovia. At the center a clerk queries a time-shared compu ter which (by means of a display screen) tells her whether or not any underground telephone facili ties are located in the area to be excavated. If the reply is negative, she tells the contractor to proceed wi th hi s digging. When the computer reports a cable or other facili ties in the vi cini ty of the work t the clerk arranges a meeting between the contractor and a telephone company inspector at the construction si te to spot the exact location to be avoided. (The file of conduit and buried cable locations stored in the computer's memory was compiled by General Telephone of California engineers from maps showing the locations of outside plant equipment.) In 1969 t' General Telephone of California paid out $456,000 to repair damage to underground cables, condui ts, manholes, and other facilities caused by contractors' digging acti vi ties. About $134 ,000 of the total represented a loss to the company, while the balance had to be collected from the contractors. Based on about 1500 calls a month (the number the company ul timately expects to be receiving), estimated cost for the look-up service wi 11 be $36,000 a year a sizeable reduction over the cost for repai rs to damaged faci li ties in 1969. OHIO STATE UNIVERSITY'S LIBRARY CIRCULATION SYSTEM NOW IN FULL OPERATION Ohio State University President Novice G. Fawcett placed a telephone call, on November 16, 1970, from his office to the circulation center in the campus main library. He requested a book enti tIed "Lives and Letters," by Ohio State Professor of English, Dr. Richard Altick. The operator typed the name of the book and author into thE computer keyboard. Instantaneously the display screen showed that copies of the volume were available in the main library, the English graduate library and in the undergraduate library, President Fawcett told the 52 opera tot he wan ted the rna in library copy. The operator typed Dr. Fawcett's faculty number onto the keyboard, and the book he reques ted was charged to him, then taken from the shelves, and held at the main desk for pickup. The new system ties in the more than 2,400,000 books, 400 000 music scores, 677,000 microfilm uni ts and 150,000 maps to one of the ins titu tion' s several computers - the IBM System 360, Model 50, located in the Learning Resources Computer Center. (In addition to keeping track of all library materials, the computer will continue its support in 0 ther areas.) All 23 of Ohio States' campus libraries are included in the system. A full-time sys terns analys t-compu ter programmer, Daniel Underwood, will monitor and adjust the system continuously. 9 Wi th a telephone call from any phone, anywhere, a student or facul ty member can find but in seconds if the books he needs are available and have them reserved for pickup. (A book also may be taken from the shel ves by a patron and brought to the circulation desk where the library assistantatthe desk types the transaction into the computer.) As the computer records a book check-out, it also stores the name and number of the user and the da te. The computer will send out notices to users of overdue books (indicating the amount of the overdue cost) and notify the library circulation cen ter of the overdue i tern. When a library user returns a book, he must return it to the same library from which it was obtained. Return information is typed onto the computer keyboard, and the account is squared. The system is designed to link in to any 0 ther library in the s ta te if that library has the proper equipment. This is a very distinct possibility for the future, said Dr. John T. Bonner Jr., vicepresident for Educational Services. This would mean that any user in any part of Ohio could, by calling on the telephone, find out immediately if a book, map, microfilm or mus ic score was available in any library in the network. The caller could reserve the item and pick it up or have it mailed. Librarians and adminis trators from institutions across thenation already have inquired about the new system. Manyvisited the campus in Columbus to observe its ins tall at ion and early testing. Hugh Atkinson, assistant director of libraries, said, "The Ohio State library is now by far the most modern and usable of any library anywhere." FLYING ELECTRONIC BI LLBOARDS Two of the famous Goodyear blimps. the America and Columbia, recently were outfitted with electronics by their manufacturer, Goodyear Aerospace Corporation. On each side of each airship, 3,780 red, blue, green, and yellow lamps are linked by 80 miles of wiring to form patterns measuring 24~ feet high by 105 feet wide. The lamps may be controlled individually or in a variety of intricate combinations. The coordinated four-color animation that resul ts shows brightlyIi t public service and holiday messages which Goodyear calls "Super Skytaculars". The blimps' simple, light-hearted messages result from a complex procedure which begins in an electronics laboratory at Wingfoot Lake, near Akron, Ohio. A technician, at the computer facility, using a light pencil draws cartoons by outline on a cathode ray tube (CRT) receiver that simulates the relative positions of the blimp's "lamps. As he paints the picture frame by frame, the CRT transfers the animations to a Xerox Data Systems Sigma 2 computer which converts it to digital format. The computer transfers data on to magnetic tape wi th one of Ampex Corporation's TM-9 tape drives. For word messages, the operator ins truc ts the compu ter as to wha t size lettering is desired and then types the message on a keyboard. As he types each letter, the Sigma 2 draws the letter on the screen and transfers it to the tape wi th the TM-9 tape drive. A second Ampex tape dri ve enables the technician to add more digi tal words and pic tures and edi t the tape according to his script. Once completed, the tapes are copied" by using the TM-9s in tandem operation. They are then sent to the blimps' home bases in Hous ton and Los Angeles. Aboard the blimp, the tapes are fed into electronic "readers" which control lamp and color selection and the speed at which messages are run. A typical six-minute tape con tains 40 million "on-off" instructions to the blimp's 7,560 lamps_. EDUCATION NEWS CLASSROOM ON WHEELS PREPARES DISADVANTAGED STUDENTS FOR CAREERS IN COMPUTING Since early Spring of 1970, a giant trailer truck has rumbled the streets of San Diego wi th an unusual cargo a medium well-equipped classroom and a general purpose IBM COMPUTERS and AUTOMATION for February, 1971 computer. On the outside of the trailer, foot-high letters spell out "Computer Jobs Through Training". According to Or. M. Granger Morgan, Direc tor of Compu ter Jobs Through Training (CJTT), more than five introduc tory programming c las ses have been run for disadvantaged San Diego area junior and senior high school students during 1969 and 197U Operating from the San Diego campus of the Uni vers i ty of Cal ifornia, CJTT's mobile classroom makes it possible to take the training facilities directly into the student's own community. Compu ter programming has an aura of excitement associated with it which is very important in student recruitment and motivation. More importantly, unlike other high entry level jobs, it requires few cuI tural prerequisites, such as the ability to speak dialect free English or a working familipri ty wi th business world interpersonal rela tions. To capture the excitement of the program, CJTT ins truc tors have eliminated formal lecture presentations and rely heavily on the 'hands-onthe quipment 'approach. This approach, augmented wi th visuals, has proven very effectiv~ according to Dr. Morgnn. By the end of the formal course, s tuden ts have learned the fundamental spects of programming and it is apparent which students are sui ted for the various available jobs. The students then enter a Terminal Workshop of intensive full-time training for a period of several weeks which readies them for their jOb. DEAF STUDENTS LEARN MATHEMATICS VIA COMPUTER The computer has been diagnosing educational shortcomings of deaf students and teaching them secondary mathematics. Sponsored by the National Technical Insti tute for the Deaf, the program is called Mathematics Diagnostic System (MDS) and is unusual because this is the first time computers have been used diagnos tically in education on such a large scale. The program uses an IBM 1500 Instructional System and thirty-two terminals to ascertain student difficiencies in pre-college mathematics and to provide remedial instruction in subjects ranging fromarithmetic to analytic geometry. The computer was selected for this pilot proj ect in remedial diagnosis because of its ability to use conditional branching to sift, winnow and select output data in response to the nature of the input. As the deaf s tuden t en ters the program, he immediately interacts with the computer. The computer asks pertinent ques tions, and based on the responses of each s tuden t is able to evaluate exactly those areas tha t the s tuden t has no t learned. Once the diagnosis is made, the computer then can proceed - at the pace required for the individual student - to present the necessary information to 'teach' the concep t. Add i tiona 1 d i agnos tic tests are given to the student, throughout the process, to determine his level of proficiencey on each conceptual task. Deaf students are especially handicapped in learning, due to the obvious communications problems. The MDS program is particularly beneficial for deaf students, bec ause the compu ter has infini te "patience" to combat the comr.1unications difficul ties. MDS works in such a way that it teaches only what the student doesn't know, and does not repeat information previously learned. At the same time, it enables a student to spend as long as he needs in a spec ific area to master the concept in question. The National Technical Insti tute for the Deaf, a division of the Rochester Institute of Technology, is the only educational entity devoted exclusively to education of the deaf in technical and scientific studies beyond the secondary level. SCHOOL/PTA BID WINS COMPUTER TIME FOR ITS ELEMENTARY STUDENTS Students at an elementary school in Berea, Ohi~ recently had access to a time-shared computer located in Kansas City, Missouri. The unusual learning opportuni ty occurred when a combined School/PTA bid was - Students at R. H. Lechner Elementary School working on math problems successful in obtaining the computer time donated by Uni ted Computing Sys tems, Inc., during the local COMPUTERS and AUTOMATION for February, 1971 Educational Television auction to raise money. station's Volunteer parents taught some of the sixth grade students problem analys is, flow charting, and programming using the BASIC language. After abou t ten hours of ins truction the students could wirte programs involving looping. Students punched, debugged, and ran their programs at a Teletype terminal. Some younger students had a chance to practice math facts using programs writtenbyparents. First graders concentrated on addition, while third graders worked on subtrac tion and mul tiplication as well. RESEARCH FRONTIER SIMULATED ENVIRONMENT MODEL MAY AID CITIES OF TOMORROW Ci ties of the future wi 11 be designed on a far more rational basis than those now in existence, predicts a Universi ty of Utah engineer, Dr. Harold R. Jacobs, associate professor of mechanical engineering, along with D~ S. K. Kao, professor of meteorology, and Dr. Po-Cheng Chang, assistant professor of civil engineering, is developing a compu ter model of atmospheric pollu tion patterns in the Sal t Lake valley from which they should be able to formulate proj ected patterns for any part of the nation. Their assaul t on the problem involves designing both a mathematical computer model and a physical scale model of the Sal t Lake valley, incorporating all of the region's prominent topographical and atmospheric characteristics. The first seven months of the U.S. Public Heal th Service-sponsored research, has been spent constructing the two models and perfec ting Utah's first wind tunnel capable of duplicating atmospheric wind motion. The miniature of the Sal t Lake valley is ins talled ins ide the closed environment of the wind tunnel. It is equipped with a maze of tiny pipes that belch pollutant gases in the proper quantities and locations to simulate contaminants in the Salt Lake valley. Wind veloci ty and direc tion also are varied to duplicate normal atmospheric conditions. The capabili ty to predict pollution diffusion patterns will make it pas sible to determine where heavy industry and new population centers should be loca ted to minimize environmental damage and optimize heal thful living conditions. Cities already with a pollution crisis wili also benefi t frommathematical models of pollution flow patterns. 55 NEW PRODUCTS AND SERVICES NAME/ MODEL NO. FOR MORE INFORMATION DESCRIPTION Digital ICL System 4-52 NCR Century 50 PDP-12 based systems Increased peripheral handling capability by a total throughput rate of 1.3 million bytes per second and low central processor hesitation time associated with selector channels' accesses to store I compatibility with System 4 software I full range of store sizes; basic 32K bytes with successive steps to 64K. 128K. 256K For small businesses I fully compatihle wi th NCR's Century Series I an 800 nsec thin-film rod memory; an 8.4 \nillion-byte dual-disc unit; and a 200 line-a-minute alpha-numeric printer are standard I options for 1 arger capaci ties available I will be in competi tion wi th IBM's System 3 Four new PDP-12 based systems -- PDP-12/10; for users with fund restrictions, or first time computer users who want a simple system, yet easily expanded; can be used for real-time computer programming and scientific calcul ations I PDP-12/20: uQ-to -date version of DEC's Laboratory Instrument Computer System (LINC); for a variety of life and physical science laboratory uses I PDP-12/30(Advanced LINC System): for a variety of industrial testing, educational. analytical, and clinical chemistry applications I PDP-12/40: adds Floating point Processor (FPP-12) to the PDP-12/30 enhancing its performance in such applications as gathering and manipulating data from analytical instruments wi th high data rates International Computers Ltd. ICL House Putney, S.W.15 London, England Attn: Dudley Paget-Brown 1024-bit read-write chip I maximum access time, 400 nsec; minimum write cycle time, 650 nsec I full input TTL/DTL compatibil ity I for use in small memory systems; al so provides greater packing density. less noise generation for large main memory systems . For high speed information storage and retrieval appl ications I contains 1024 words; up to 10 bi ts on one printed ci rcui t card I input-output section has NonDestructive Read Out I read-wri te cycle time , 600 nsec A 256-bit array consisting of silicon and amorphous semiconductors combined on a monol ithic chip I ci rcui t has non-volatility, electrical alterability, random access. fast read speed. non-destructive readout lappI ications incl ude microprogramming. ch aracter generation, sequencing and logic control Mostek Corp .• an affil i ate of Sprague Electric Co. 1400 Upfield Drive Carrollton, Texas 75006 Attn: Gordon Hoffman Standard Logic Inc. 1630 South Lyon St. Santa Ana, Calif. 92705 Attn: Bruce Billington Energy Conversion Devices. Inc. 1675 West Maple Rd. Troy, Mich. 48084 Operates with a Science Accessories Corp. (SAC) Graf/Pen connected on-line to a PDP-8 Computer I provides convenient. low cost means of digitizing data for direct input to the computer I modular design permits expansion for operation with wide range of output devices I applications include as a laboratory tool, a design facility, a production or quality control instrument For use in unit or branch banking with processing capabili ty for single and mul tiple banks I daily and monthly reports; modular design; wide range of price and service options I wri tten in COBOL: operates on IBM 360' s Affords NOVA or SUPERNOVA user the adVantages of a macro assembler and linkage editor to prepare NOVA programs on a more powerful 1130 computer system I system incl udes a free-form macro assembler, a flexible subroutine binder (linkage editor), macro and subroutine libraries, and a NOVA on-line debugging package Input Output Computer Services, Inc. 142 Mt. Auburn St. Cambridge, Mass. 02138 Attn: Thomas A. Farrington The National Cash Register Co. Main & K Streets Dayton. Ohio 45409 Digital Equipment Corp. 146 Main St. Maynard, Mass. 01754 Attn: Dimitri Dimancesco, Jr. Memories MK4Q06 p •.random access MOS memory RAMM 1024 MOS Memory System Read-Mostly Memory (RM-256) Software ANAGRAFIC Software System Bank General Ledger System 1130 NOVA Support System 56 Information Systems Division Computer Sciences Corp. Century City Los Angeles, Calif. 90067 Intercomp 243 Vassar St. Cambridge, Mass. 02139 Attn: Michael L. Mark COMPUTERS and AUTOMATION for February, 1971 DESCRIPTION NAME/MODEL NO. FOR MORE INFORMATION (Software, continued) GENIE MACH I SCRIBE SERIES SUPERDOS II TOPS-IO A proprietary software package which generates files of data for testing of computer programs where input files of data are not available I a stand-alone COBOL program / may be used under either IBM DOS/360 or OS/360; requires minimum configuration of 32K, a reader, and one output device A demand deposi t reserve system / posting throughput up to 1/5 million accounts per hour / allows banks to incorporate processing for a personal line of credit (by account option) as integral function of system provides wide range of bank options for mul ti-bank processing / runs on IBM 360 or 370 under DOS or OS A subroutine for plotter and CRT users / will draw curved letters, which at user option can be italicized / proprietary software package can be used with or instead of the common plotter subroutine called SYMBOL basic package consists of 46 characters; extra characters and symbols available / A comprehensive information systems development tool / includes a higher level language which assists users in designing systems and producing COBOL programs I comprised of three integrated parts: the Program Generator; advanced File Structures and Access Methods; and On-Line Services / available under new 6O-day trial lease/purchase plan A DOS supervi sor modification which reduces I/O overhead during fetching or loading of core image phases I multiphased applications may often achieve a 10% or greater reduction in running time A second version of operating system for PDP-IO computer systems / new performance features and increased documentation include: improvements to communications system; real-time programming during time-sharing at the FORTRAN level; capability to lock privileged jobs in core Applied Cybernetics Corp. 1285 Forgewood Ave. Sunnyvale, Calif. 94086 Attn: Michael F. Nolan Scientific Computers, Inc. 919 Second Avenue South Minneapolis, Minn. 55402 Attn: Dave Jorve or R. A. Walter Applied Computer Graphics Corp. 816 Thayer Ave., Suite 300 Silver Spring, Md. 20910 Information Systems Management, Inc., a subsidiary of Western Operations, Inc. 120 Montgomery St. San Francisco, Calif. 94104 Universal Software, Inc. 12 Horseshoe Drive Danbury, Conn. 06810 David W. Kearns Digital Equipment Corp. 146 Main St. Maynard, Mass. 01754 Attn: Edgar E. Geithner Peripheral Equipment Adapti ve Drive Control, Single and multi-axis servo drive control systems inSeries 600 clude the prime mover; the servo valve; a s~rvo amplifier (if electric motor is used); the digital feedback unit; and the solid-state controller / measures to 100 milli on pound s per inch I speed ra ti 0 is over 100,000: 1 / interfaces with tape control, direct computer control or manual data insertion / standard and custom units available for OEM and retrofit use CCS 120 Remote Pri nting Teletype replacement requiring no software changes I Station chain printer; 64 character ASCII set; 80 column; 120 lines per minute / uses voice-grade telephone lines at rates to 1800 band / accommodates multipart forms up to 11-3/4" COMPCARD Computer Micro"fiche storage and retrieval system holds up to Terminal 73,500 pages of data; displays any page in four seconds or less / system includes firm's CARd0 uni t wi th Teletype, Selectric typewri ter or CRT display / reduces transmission, mass stora e and ro rammin loads Data Secretary Editing typewriter for general office use uses magnetic tape cassettes or magnetic cards for word and format storage; can be edited or repeated indefinitely / erase typing errors simply by backspacing, retype correct word and go on / utilizes program control techni ues of di i tal com uters Model 8600 Card Reader For computer input or terminal applications 96-column wi th rated capaci ty 1,000 cpm / read error rate is less than one in 300 x 10 possible data bi ts / input hopper holds 1,000 cards; stackers, (2) have 1,000 card capacit each OCR S 2000 Document Designed for European banks provides high volume opProcessor tical reading of bank documents including checks, plus microfilming, endorsing, and sorting of documents / reads single lines of machine-printed numerics in OCR-B and 1403 fonts / throughput rate in excess of 2000 documents a minute / plugs directly into IBM 360 and 370 0t COMPUTERS and AUTOMATION for February, 1971 Anocut® Engineering Co. 2375 Estes Ave. Elk Grove Village, 111.60007 Electronic Systems Group Attn: Dr. Yechiel Shulman Custom Computer Systems 40 South Mall Plainview, N.Y. 11803 Attn: Don Whi te Image Systems, Inc. 11244 Playa Court Culver City, Calif. 90230 Attn: H. D. Sandeffer Redactron Corp. 100 Parkway Drive South Hauppauge, N.Y. 11787 Attn: Ros Willett Bridge Data Products, Inc. 738 South 42nd St. Philadelphia, Pa. 19104 Attn: Gene Gibbons Recognition Equipment Inc. 1500 W. Mockingbird Lane Dallas, Texas 75222 Attn: Bob E. Killian 57 DESCRIPTION NAME/ MODEL NO. FOR MORE INFORMATION (OCR/S 2000 Document, Continued) Read_Only Tape Transports, 100R Series SOVAL (Single Operator Validation) TELEX 6000 Series Magnetic Tape subsystem computers as well as Recognition Equipment's Programmed Controller IBM compatible, specifically aimed at Computer Output Microfilm, offline, printing and plotting, typesetting / packing densi ties: 200, 556, 800 bpi /7- and 9-track configurations / search/read feature permi ts search at high speed and read at lower speed of output device Data verification system can be operated accurately and quickly by one operator / document field, operator and machine form a closed loop system tolerating no errors / heart of SOVAL is an optical jumbling and electronic system / maximum acceptable word or field length depends only on number of channels in optical modules and length of memory Comprised of Telex 6803 Tape Controllers and 6420 Magnetic Tape Drives / direct replacements for IBM's 3803 controller and 3420 tape drives / fully compatible wi th both IBM Systems 370 and 360/ free 30-day evaluation trial offered Cipher Data Products, Inc. 7655 Convoy Court San Diego, Calif. 92111 Attn: Peter Gilbody British Equipment Co. Ltc. 51 WandIe Rd. Croydon CR9 IBL, England Attn: A. E. Cox Telex Computer Products, Inc. 6422 East 41st Tulsa, Okla. 74135 Attn: Harry Ashbridge Data Processing Accessories MEDIA Magnetic Tape Universal Perforator Tape 100% certified for 3200 FCI operation, double cleaned, conditioned / fully compatible with all current computer systems / available in all popular configurations / has lifetime guarantee / 48 hour delivery New paper-mylar laminate (patent pending) reduces punchand-die wear and downtime in computer, data processing, office machine and numerical control applications / conventional rolls (ZPMA-15) and fanfold style (RP~~-15) in 1,000-foot lengths / certified 100% opacity General Kinetics Inc. 11425 Isaac Newton Sq. So. Reston, Va. 22070 Attn: Lynn C. Metcalf Robins Industries Corp. Data Products Div. 15-58 127th st. College Point, N.Y. 11356 Computer-Related Services CYBERNET/CENSTAT System Joint undertaking with Westat Research, Inc., Rockville, Md., to provide statistics from 1970 U.S. Census data for government planners and market researchers / available through CDC' 5 CYBERNET network / includes access to 1970 Census summary tapes and CENSTAT, a computer software program for census statistics Computer Analysis of System (developed by Telemed Corp. , Schi ller Park, Ill.) Electrocardiograms permits instant, two-way communication between Telemed computer center and medical facilities via ordinary (ECG) telephone lines / mobile ECG uni t allows technician to record patient's ECG while simultaneously transmitting ECG trace to computer facili ty / computer analysis is telet ed back in minutes for h sician's assessment Designed for next business gay delivery message origiMAILGRAM Service nate on teleprinter in senders office; routed over WU' s circuits by computer to receiving post office near final destination / delivered as first class mail / service offered i~-12·cities on test basis last year; plans include eneral ublic b earl summer Telprice 70 Historical For research departments of banks, brokerage houses and insurance companies / provides 75-day review of market Pricing File action and other data on nearly 12,000 securities / also contains a.year's background of weekly closing prices / data provided on magnetic tape / adjustable to needs of subscribers Control Data Corp .. 8100 34th Ave. So. Minneapolis, Minn. 55420 Attn: Kent R. Nichols Pfizer Inc. 235 East 42nd St. New York, N.Y. 10017 Attn: Joseph P. Callahan Western Union 60 Hudson St. New York, N. Y. 10013 Attn: R. V. Spelleri Telstat Systems Inc. c/o Jack Bernstei n Associa tes, Inc. 37 West 57 Street New York, N.Y. 10019 New Literature The Co~puter Review 58 Display A four-volume, 2,000 page reference source / contains a state-of-the-art hardware and software tutorial, review and analysis of commercially available display devices / extracted data is available wi thout charge in a pamphlet, giving prices and technical characteristics of 73 alphanumeric and 46 line-drawing display devices Keydata Corporation Publications Div., Dept. T-l 108 Water St. Watertown, Mass. 02172 COMPUTERS and AUTOMATION for February, 1971 NEW CONTRACTS Control Data Corp., Minneapolis, Minn. CERN (European Organization for Nuclear Research), Geneva, Switzerland Datacraft Corp., Ft. Lauderdale, Fla. North Electric Co., Galion, Ohio National Cash Register Co., Dayton, Ohio United States Postal Service Univac Division of Sperry Rand Corp., Blue Bell, Pal Systems, Science and Software, La Jolla, Calif. Ampex Corp., Culver City, Cali f. Autonetics Div. of North American Rockwell Corp., Anaheim, Calif. RCA Corp., New York, N.Y. United States Air Force Indian Hill Lab. of Bell Laboratories, Naperville, Ill. United States Army Computer Automation, Inc., Newport Beach, Calif. Interdata, Inc., Oceanport, N. J. Intercole Systems Ltd., London, England Pan American Petroleum Corp., Tulsa, Okla. Middle Atlantic Educational & Research Center (MERC), Lancaster, Pa. Recognition Equipment France, S.A., Dallas, Tex. United States Steel Foundation U~iversity of Michigan Societe Generale de Banque, Belgium Office of Naval Research, Arlington, Va. Computer Sciences Corp., Los Angeles, Calif. LFE Corp., Waltham, Mass. Synergistic Computer Systems, Inc., Fullerton, Calif. Geolabs, Inc., Santa Ana, Calif . Univac Division of Sperry Rand Corp., Blue Bell, Pal Italsider S.p.A., Genoa, Italy Beaumont, Hiller & Sperling, Inc., Reading, Pal EMR Computer, Minneapolis, Minn. Biomedical Computer Services, Inc., St. Paul, Minn. State of Washington Burroughs Corp., Detroit, Mich. American Bank & Trust Co., Baton Rouge, La. Decision Making Systems, Department of American Cyanamid Co., Bound Brook, N.J. McDonnell Douglas Automation Co., St. Louis, Mo. Trans World Airlines, New York, N.Y. Federal Reserve Board, Washington, D.C. IBM Corp., Federal Systems Division, Owego, N.Y. Sanders Associates, Inc., Nashua, N.H. Lockheed Missiles & Space Co., Division of Lockheed Aircraft Co., Sunnyvale, Calif. General Dynamics, Electro Dynamic Div., Orlando, Fla. Children's Hospital, San Francisco, Calif. Northern Michigan Computer Center, Division of Belfour Stulen, Inc., Traverse City, Mich. Executive Computer Systems, Oakbrook, Ill. Burroughs Corp., Detroit, Mich. Central & Southern Florida Flood Control District, Or! ando, Fl a . College of American Pathologists, Chicago, Ill. Chicago Board of Trade, Chicago, Ill. State of Colorado, Division of Employment COMPUTERS and AUTOMATION for February, 1971 A CDC 7600 system to be used with an existing CDC 6500 system by 12 nations in international research, principally in sub-nuclear physics A large quantity of DC-38 core memory systems to be used in electronically controlled switching system Five contracts for research in new concepts and equipment including facer-canceler machines, sorting coder, encoding desk, letter sorter, & airmail dispatcher A 1110 computer system for calculations on scientific business & commercial proj ects including computer aids for doctors A supply of core memory stacks to be used in the carrier aircraft computer of the new U.S. Air Force short range attack missile (SRAM) system Development of a communications system to link ground-based & airborne computers that help control the nation's nuclear retaliatory forces Checking the data programming of electronic switching systems for telephones, using Model 3DM-2000 core memory systems Core memories for research 0 development work on the U.S. Army SAFEGUARD Ballistic Missile System Fifth Model 216 & 808 minicomputers to be used in the company's Compulog systems Purchase of three Model 4 computers for use directly in oil fields to analyze data at production locations A grant to support computer software packages to improve the efficiency of college & university alumni fund raising Lease of a large-scale optical character recognition system, with purchase value of $1 million; to capture transfer orders from bank''; 220,000 customer accounts Research to improve design & performance of man-computer interactive decision systems following the Navy approach that computers are best used as an aid in making complex decisions An award to develop an automated system to control airport traffic on taxiways at John F. Kennedy In ternati onal Ai rpo rt , N. Y. SYNCOMP MICRO/l designed specifically to process engineering, plotting & management accounting requirements of engineering & architectural firms Four computers including two 418-II1 & 1106 & 9300 systems to augment two 490s oriented to study& utilization of decisional models Installation of a computerized medical & management health information system Complete hardware & software for two EMR 6135 systems to give law enforcement officials immediate access to vital data concerning criminals & criminal activity A B3500 system valued at $570,000+ to provide a total information system & an online inquiry operation A contract for development of an automatic baggage tag reading system to facilitate luggage handling at major airline terminals A consulting service to examine computer operations & recommend ways to improve them, including computer hardware, software, facilities & staffing resources A subcontract award to produce an advanced airborne drum memory system for the Navy's Submarine hunting aircraft, Lockheed S-3A Contract for a computer system to control hospital business office operations including payroll & staffing analysis Award of a contract to study remote control water management, analyzing application of communications systems for water control Providing data processing services for a new nationwide, daily medical quality assurance program made available by the professional association of pathologists A long-term contract for off-site computerized price reporting & management information system on contracts bought & sold A B3500 system used to process employment applications, referrals&jobopenings, unemployment insurance & cost accounting $9 million $3.5 million (approximate) $2.6 million $2.5 million (approximate) $575,000+ $575,000 $500,000 $384,000 $250,000 $87,000+ $10,000 59 NEW INSTALLAliONS Burroughs B2500 system ITeaumont Hospital, Royal Oak, Mich. Burroughs B3500 system Tactical Air Command (TAC) , U.S. Air Force, Little Rock, Ark. Control Data 3100 & 1700 systems LIB, Northrhine-Westfalia State Center for Air Pollution Control & Preservation of Land Use, Essen, Germany Control Data 3300 system Procesos y Sistemas de Informacion, S.A., Subsidiary of Ingenieros Civiles Asociados, Mexico City, Mexico Cambridge University Engineering Department, West CamLridge, England City of Pasadena, Pasadena, Tex. Digital Equipment PDP-12 Honeywell MOdel 110 system Honeywell Model 115 system Honeywell Model 120 system Honeywell Model 3200 system Model 4200 system Model 8200 system IBM System/3 Model 6 IBM System/~ Model 10 IBM System/360 Model 50 IBM 1130 system NCR Century 200 system City of Crawley, Crawley, England City of San Buena Ventura, San Buena Ventura, Calif. Blue Cross / Blue Shield, Service Cent~r, Detroit, Mich. Matco Transportation, Inc., Kearny, N.J. SI I!andli ng Sys tems, Inc., Easton, Pa. KPRS Broadcasting Corp., Kansas City, Mo. Prince William Hospital, Manassas, Va. University of Notre Dame, Notre Dame, Ind. Arabian American Oil Co., New York, N.Y. Bank of New Hampshire, Manchester, N.H. Community College, Auburn, N.Y. UNIVAC 1108 system UNIVAC 9200 system Max Planck Institute, University of Goettingen, West Germany Documentation Computer Institute, Flushing, N.Y. Fawick Airflex Division, Cleveland, Ohio Great Lakes Towing Co., Cleveland, Ohio H. Corenzwit & Coo, Hillside, N.J. lIillcn~st Foods, Inc., Lewiston, Me. UNIVAC 9300 system D. Meredew Ltd., Letchworth, Hertfordshire, England Yasuda Gakuen Senior High School, Tokyo, Japan Tobu Railway Company, Tokyo, Japan UNIVAC 9400 system Fairview Hospitals, Minneapolis, Minn. UNIVAC 9400 system Northwestern State University, Natchitoches, La. Union County, Elizabeth, N.J. 60 Keeping track of maintenance schedules for everything from fan motors in air conditioning equipment to transistorized patient monitoring A worldwide computer network to process records & management information in personnel, accounting, payroll, maintenance aircraft & aircrews, etc. Two systems including the 3100 as the central system for research analysis of measured data & scientific & statistical calculations & the 1700 for monitoring of air pollution & data collection (system valued at $700POO) Handling technical & design applications, solving engineering problems, processing payroll & other administrative applications (system valued at $720,000) Direct digital control applications in Turbomachinery Laboratory & on-line recording of the performance of machinery under test Utility billing, payroll & municipal accounting applications Handling routine accounting applications, street lighting & housing rent applications Water billing, budget, payroll, business licenses, cost accounting & fixed asset inventory Four computers for routine accounting & claims processing functions as well as a management tool in long-range, complex decisions Processing accounts payable & receivable, maintenance, fuel, rate changes & management control Payroll, simulated operation of the company's automated lines of handling systems & advertising in several hundred publications Composing daily logs for AM & FM broadcast days, weekly time availability studies, sales analysis, payroll, billing & general accounting Inventory & medical records, expansion of a central pricing system, accounting & meal planning Lease of the system to increase Notre Dame's research & teaching capability until the IBM 370/ 155 is ready for delivery (system valued at $1.4 million) Production planning, projecting & updating inventory & coordinating shipments at world ports Two computers to be the nucleus of an advanced Central Information File system to maintain complete records of customer banking activities Use as a teaching & administrative tool, including 90% of its time training students; remainder of time for processing of COllege records Specific use as research in physics; will also be used by the University's social science and economics departments Student training in programming & computer operation, including programming languages, RPG&BAL Communications to parent company, Eaton Yale & Towne, in manufacturing & inventory control applications as well as financial reporting Business operations for the company's fleet of tugboats, including accounting, billing, payroll processing & sales analysis Applications of billing, accounts receivable, and inventory control for the company, Flock control, production control, inventory, billing, general ledger & payroll processing for the poultry & food processing firm Order analysis, sales analysis, job ticketing & accounting applications in furniture manufacture Provision of computer training for students One of the largest private railroads in Japan to use in compiling statistical information on passenger traffic as well as payroll processing for 1700 employees Expediting retrieval of patient medical records & business procedures; also providing shared services to rural hospitals as well as serving the two Fairview facilities in the Minneapolis area Assisting the University in student applications files, enrollment, financial aid, payroll, library research & other administrative programs; will aid the student in registration, grading & the provision of material for personal instruction Enabling probate court judges to gain immediate access to all county records through UNISCOPE 100 visual display terminals situated on the bench; also county-wide aid for law enforcement officials & payroll, budget & welfare analysi s & tax billing (system valued at $640,000) COMPUTERS and AUTOMATION for February, 1971 MONTHLY COMPUTER CENSUS Neil Macdonald Survey Editor COMPUTERS AND AUTOMATION The following is a summary made by COMPUTERS AND AUTOMATION of reports and estimates of the number of general purpose electronic digital computers manufactured and installed, or to be manufactured and on order. These figures are mailed to individual computer manufacturers from time to time for their information and review, and for any updating or comments they may care to provide: Please note the variation in dates and reliability of the information. Several important manufacturers refuse to give out, confirm, or comment on any figures. Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit information for this census. We invite all our readers to submit information that would help make these figures as accurate and complete as possible. The following abbreviations apply: (A) -- authoritative figures, derived essentially from information sent by the manufacturer directly to COMPUTERS AND AUTOMATION C figure is combined in a total (D) acknowledgment is given to DP FOCUS, Marlboro, Mass., for their help in estimating many of these figures E figure estimated by COMPUTERS AND AUTOMATION (N) manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any way on those numbers stated here (R) -- figures derived all or in part from information released indirectly by the manufacturer, or from reports by other sources likely to be informed (S) sale only, and sale (not rental) price is stated X -- no longer in production information not obtained at press time Part I of the Monthly Computer Census contains reports for United States manufacturers. Part II contains reports for manufacturers outside of the united States. The two parts are published in al ternate months. SUMMARY AS OF JANUARY 15, 1971 NAME OF NAME OF MANUFACI'URER COMPUTER Part II. Manufacturers Outside United States A/S Norsk Data Elektronikk NORD-l Oslo,. Norway NORD-2B (A)' (Dec. 1970) NORD-5 A/S Regnecentralen GIER Copenhagen, Denmark RC 4000 (A) (Sept. 1970) Elbi t Computers Ltd. Elbi t-100 Haifa, Israel (A) (Dec. 1970) Series 90-2/10/20 GEC-AEI Automation Ltd. New Parks, Leicester, England 25/30/40/300 (R) S-Two (Jan. 1969) 130 330 959 1010 1040 CON/PAC 4020 CON/PAC 4040 CON/PAC 4060 International Computers, Ltd. (ICL) Atlas 1 & 2 London, England Deuce (Al KDF 6 - 10 (Sept. 1970) KDN 2 Leo 1, 2, Mercury Orion 1 & 2 Pegasus Sirius 503 803 A, B, C 1100/1 1200/1/2 1300/1/2 1500 2400 1900-1909 Elliott 4120/4130 System 4-30 to 4-75 DATE OF FIRST INSTALLATION 8/68 8/69 12/60 6/67 10/67 AVERAGE OR RANGE OF MONTHLY RENTAL $(000) 2.0 4.0 o (S) o o o 2.3-7.5 3.0-20.0 4.9 NUMBER OF INSTALLATIONS Outside In In World U.S.A. U.S.A. 43 43 4 4 o o 40 11 o 210 75 13 1 X X X (S) 9 1 8 1 o o o o o o o o o o o o o o o o o o o o 65.0 10-36 10-24 20.0 5.0 3.9 4.0 6.0 23.0 3-54 2.4-11.4 5.2-54 15 10 40 11 1/66 3/68 12/64 3/64 -/65 12/61 7/63 5/66 12/66 1/62 4/55 9/61 4/63 -/53 -/57 1/63 4/55 -/61 -/64 12/60 -/60 -/55 -/62 7/62 12/61 12/64 10/65 10/67 NUMBER OF UNFILLED ORDERS 6 58 1 59 13 17 30 22 16 83 22 68 196 110 9 5 6 1 6 X X X X X 58 X X X 1 X 59 13 17 30 22 16 83 22 68 196 110 X X 4 4 1690 160 138 1690 160 138 X X X X X X X X X X C C C Total: 525 Japanese Mfrs. (N) (Sept. 1970) Marconi Co., Ltd. Chelmsford, Essex, England (A) (Jan. 1970) .Saab-Scania Aktiebolag Linkoping, Sweden (Al (Dec. 1970) Selenia S.p.A. Roma, Italy (A) (Jan. 1971) Siemens Muni ch, Germany (A) (Sept. 1970) (Mfrs. of various models.include: Nippon Electric Co., Fujitsu, Hitachi, Ltd., Toshiba, Oki Electric Industry Co., and Mitsubishi Electric Corp.) (S) Myriad I n36.0-n66.0 o 3/66 (S) Myriad II o 10/67 n22.0-n42.5 D21 D22 D220 GP-16 GP-16R 301 302 303 304 305 306 2002 3003 4004S 4004/15/16 4004/25/26 4004/35 4004/45 COMPUTERS and AUTOMATION for February, 1971 12/62 1.1/68 4/69 7/69 6/70 11/68 9/67 4/65 5/68 11/67 7.0 15.0 10.0 13.7 10.6 0.75 1.3 2.0 2.8 4.5 6.5 6/59 12/63 13.5 10/65 1/66 2/67 7/66 13.0 4.0 5.0 8.3 11.8 22.5 o o o (S) (S) 37 17 Total: 4150 E 37 17 Total: 800 E 9 12 38 24 10 39 38 24 10 39 21 1 1 1 56 27 67 57 73 C 40 35 4 97 47 164 208 C 43 C C C C C C C C C 61 NAME OF COMPUTER 4004/46 4004/55 404/3 NAME OF MANUFACTURER Siemens (Cont'd,) DATE OF FIRST INSTALLATION 4/69 12/66 AVERAGE OR RANGE OF MONTHLY RENTAL $ (000) 34,0 NUMBER OF INSTALLATIONS In Outside In U.S.A. U.S.A. World 3i,3 NUMBER OF UNFILLED ORDERS 7 C 16 C C 1·,1 Total: BESM 4 BESM 6 MINSK 2 MINSK 22 MIR NAIR 1 ONEGA 1 ONEGA 2 URAL 11/14/16 and others USSR (N) (May 1969) 274 C C C C C C C C C C C C C C Total: 6000 E C C C C C C Total: 2000 E 16th Annual COMPUTER DIRECTORY AND BUYERS' GUIDE Issue of Computers and Automation softbound edition, 220 pages, off press January 18, 1971, and IN STOCK Table of Contents First Section: 3 12 22 53 6 57 61 62 59 2 151 65 92 To: General THE COMPUTER FIELD AND THE ECONOMIC DEPRESSION OF 1970: Editorial by Edmund C. Berkeley OVER 2000 APPLICATIONS OF COMPUTERS AND DATA PROCESSING by Linda L. Lovett CHARACTERISTICS OF DIGITAL COMPUTERS by Keydata Corp. WORLD COMPUTER CENSUS ROSTER OF PROGRAMMING LANGUAGES, 1970 by Jean E. Sammet SUMMARY OF BINARY ARITHMETIC AND RELATED NUMBER SYSTEMS SUMMARY OF BOOLEAN ALGEBRA BOOLEAN ALGEBRA AND ELEMENTARY ALGEBRA COMPARATIVE CHARTS SOME BINARY, OCTAL, AND DECIMAL CONVERSION TABLES RIGHT ANSWERS - A SHORT GUIDE FOR OBTAINING THEM AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE (ASCII) - Selection Second Section: Names, Addresses, and Details of Organizations MAIN ROSTER OF ORGANIZATIONS IN COMPUTERS AND DATA PROCESSING BUYERS' GUIDE TO PRODUCTS AND SERVICES IN COMPUTERS AND DATA PROCESSING 126 132 134 137 143 146 152 186 204 216 217 GEOGRAPHIC ROSTERS OF ORGANIZATIONS OFFERING: Computing and Data Processing Services Commercial Time-Shared Computing Services Leasing of Computing and Data Processing Equipment Software Courses, Training, or Instruction in ComputinQ, Programming, or Systems (Commercial Or9anizations Only) Consulting Services in Computers and Data Processing SUPPLEMENTARY ROSTER OF ORGANIZATIONS IN COMPUTERS AND DATA PROCESSING ROSTER OF COLLEGE AND UNIVERSITY FACILITIES ROSTER OF COMPUTER ASSOCIATIONS ROSTER OF COMPUTER USERS' GROUPS FORMS FOR ENTRIES IN THE 1971 "COMPUTER DIRECTORY AND BUYERS' GUIDE" ISSUE NOTICE: ':' 0 ON YOUR ADDRESS IMPRINT MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTER DIRECTORY. ':' N MEANS THAT YOUR PRESENT SUBSCRIPTION DOES NOT INCLUDE THE COMPUTER DIRECTORY, ORDER YOUR COpy - RETURNABLE IN SEVEN DAYS FOR FULL REFUND - - - - - - - - - - - - - - - - -(may be copied on any piece of paper)- - - - - - - - - - - - - - - - - - - - - - - - COMPUTERS AND AUTOMATION 815 Washington St., Newtonville, Mass. 0216u Please send me the 16th Annual Computer Directory and Buyers' Guide, softbound issue, at ( scriber price ( ) $14.50 nonsubscriber price. ) $12.00 sub- Returnable in seven days for full refund if not satisfactory (if in salable condition). I enclose $_______ Please bill me ( ); the purchase order number is _____________ Name,_________________________Signature__________________________ Title___________________________________ Organization,___________________________________________________________________________________________ Address _______________________________________________________________________________________________ 62 COMPUTERS and AUTOMATION for February, 1971 MARTIN LUTHER KING MEMORIAL PRIZE CONTEST -THIRD YEAR (Please post this notice) Computers and Automation has received an anonymous gift and announces the annual Martin Luther King Memorial Pri/e, of $300, to be awarded each year for the best article on an important subject in the general field of: The application of information sciences and engineering to the problems of improvement in human society. The judges in 1971 will be: Dr. Fran! L. Alt of the American I nstitute of Physics; Prof. John W. Carr III of the Univ. of Pennsylvania; Dr. William H. Churchill of Howard Univ.; and Edmund C. Berkeley, Editor of Computers and Automation. The closing date for the receipt of manuscripts this year is April 30, 1971, in the office of Computers and Automation, 815 Wash ington St., Newtonvi lie, Mass. 02160. The winning article, if any, will be published in the JlJly issue of Computers and Automation. The deci sion of the judges will be conclusive. The priLe will not be awarded if, in the opinion of the judges, no sldficiently good article is received. Following are the details: The article should be approximately 2500 to 3500 words in length. The article should be factual, useful, and understandable. The subject chosen should be treated practically and realistically with examples and evidence - but also with imagination, and broad vision of possible future developments, not necessarily restricted to one nation or culture. The writings of Martin Luther King should b(~ included among the references used by the author, btlt it is not necessary that any quotations be inclllded in the article. Articles should be typed with double line spacing and should meet reasonable standards for publication. Four copies should be submitted. All entries will become the property of Computers and Automation. The article should bear a title,and a date, but not the name of the author. The author's name and address and four or five sentences of biographical information about him, should be included in an accompanying letter - which also specifies the title of the article and the date. "Many people fear nothing more terribly than to take a position which stands out sharply and clearly from the prevailing opinion. The tendency of most is to adopt a view that is so ambiguous that it wi II include everything and so popular that it will include everybody .... Not a _few men who cherish noble ideals hide them under a bushel for fear of being called different." "Wherever unjust laws exist, people on the basis of conscience have a right to disobey those laws." "There is nothing that expressed massive civil disobedience any more than the Boston Tea Party, and yet we give th is to our young people and our students as a part of the great tradition of our nation. So I think we are in good company when we break unjust laws, and I think that those who are willing to do it and accept the penalty are those who are a part of the saving of the nation." - From "/ Have a Dre-am" - The Quotations of Martin Luther King, Jr., compiled and edited by Lotte Haskins, Grosset and Dunlap, New York, 1968. Reverend Martin Luther King, Jr., was awarded the Nobel Peace Prile in 1964, when he was age 35. He was in jail in the United States more than 60 times. He was assassinated in Memphis, Tennessee, April 4, 1968. ADVERTISING INDEX Following is the index of advertisements. Each item contains: name and address of the advertiser / page number where the advertisement appears / name of agency, if any BRANDON SYSTEMS INSTITUTE, 1700 Broadway, New York, N.Y. 10019 / Page 3 Page 3 / Kingen Feleppa O'Dell GATES ACOUSTINET, INC., Box 1406, Santa Rosa, Calif. 95403 / Page 64 / Gates AdvertiSing WANG LABORATORIES, INC., 836 North St., Tewksbury, Mass. 01876 / Page 45 / Chirurg & Cairns, Inc. NEW YORK TIMES Book & Education Div., 229 West 43 St., New York, N.Y. 11036 / WM. C. BROWN COMPANY PUBLISHEP£, 135 S. Locust St., Dubuque, Ia. 52001 / Page 22 COMPUTERS and AUTOMATION for February, 1971 63 4 good numbers to quiet any noisy machine 1,(14,' ~-;:'''~~'''''_,,:"'':''"'«; ":>'~""'" ~'~<~~ w.""~>v ''''',\·<>"~~~,"",:,_wW",,:'';''$'~ " ..... , ",. ,," ". t ,,",:Telex ' f,. ~0D OO~U~i L:-."2,;<:".~';;,.w;~,.'.;;".w.w.:'w:"':::~' :,i;., . . .~·w:":,~,E. ~L,,. :~~:,:\~,~:,,~.: ,.,.~ ".,.w~~,~':~~~~;;; :~~\.: .•Lw,J Simply dial the Telex number and give full p'articulars* on the noisy machine bothering you. We will prescribe the appropriate Gates Acoustinet model number to solve your problem. There is a model to fit any budget, each doing a progressively more effective job of sound control at the source. Each one enables you to bring that machine out of its closed-in room. Surround that sound now-bring peace and quietto your office! We also have enclosures for all types of business machines-IBM MTST units, key punches, accounting machines-you name it. The answer to any question is as near as your Teletype; dial 34-0376 for an immediate reply. *Machine make, ,model # and width THE QUIET SOLUTION FOR NOISY BUSINESS MACHINES P.O. Box 1406-CA Santa Rosa, CA 95403 (707)54~-2711
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Producer : Adobe Acrobat 9.1 Paper Capture Plug-in Modify Date : 2009:03:24 21:36:47-07:00 Create Date : 2009:03:24 21:36:47-07:00 Metadata Date : 2009:03:24 21:36:47-07:00 Format : application/pdf Document ID : uuid:f33156d5-8113-415b-a857-6b1a5ed4ea15 Instance ID : uuid:342a4c42-1ec4-4e0e-a850-ee38214f7b00 Page Layout : SinglePage Page Mode : UseNone Page Count : 60EXIF Metadata provided by EXIF.tools