197103
197103 197103
User Manual: 197103
Open the PDF directly: View PDF .
Page Count: 60
Download | |
Open PDF In Browser | View PDF |
.' 1. gJ!" 3630 SCIENCE & TECHNOLOG'G I' • 7 2M a .. . . ...~ ... ••• ' . March, 1971 . Vo l. 20, No . 3 ~~I. ~,.mla~H~!!!:i~ . . . ..• . • f Conversation with a Computer ---- Think Before You Speak! ~ PER I aD I l, -A,-L.-;--------,~-" J..., ,''''_&-. _ _ _ , 0104 180 W SAN CARLOS ST *D1271 SAN JOSE CA 95113 ADAPTATION AND LEARNING IN AUTOMATIC SYSTEMS A Volume in MATHEMATICS IN SCIENCE AND ENGINEERING Series Editor: RICHARD BELLMAN by VA. Z. TSVPKIN, The Institute of Automation and Telemechanics, Moscow, USSR Translated by Z. J. NIKOLIC Presents a unified treatment of the theory of learning, self-learning, and adaptation in automatic systems. Because of the complexity of many existing and developing systems, traditional methods do not guarantee the optimal operating conditions of such systems. The book presents an adaptive approach to these problems using probabilistic iterative methods as a foundation. This approach simplifies the solution of well-known problems in control theory, reliability theory, operations research, game theory, the theory of finite automata, etc., and permits the solution of many new problems. A detailed survey of the literature on adaptive and learning systems is given at the end of the book. 1971, 312 pp., $16.50. COMPUTATIONAL METHODS IN OPTIMIZATION: A Unified Approach A Volume in MATHEMATICS IN SCIENCE AND ENGINEERING Series Editor: RICHARD BELLMAN by E. POLAK, Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, California Presents a large number of optimization, root finding, and boundary value algorithms in the light of a unifying theory that deals with convergence, synthesis, and computational efficiency. Among the unconstrained optimization algorithms discussed are various gradient, quasi-Newton, conjugate gradient and variable metric methods, with proofs of convergence and rate of convergence. Varrous constrained optimization algorithms discussed include penalty function methods, metnods of center, first and second order methods of feasible directions, and gradient projection methods. Proofs of convergence, efficient implementation and applications to optimal control are given. March 1971, about 320 pp., $17.50. INTRODUCTION TO PROBABILISTIC AUTOMATA A Volume in COMPUTER SCIENCE AND APPLIED MATHEMATICS Series Editor: WERNER RHEINBOLDT by AZARIA PAZ, Department of Computer Science and Mathematics, Israel Institute of Technology, Haifa, Israel This book-the first to be published in English on the subject-discusses both the practical and theoretical aspects of probabilistic automata and sequential machines. The first chapter, dealing with state theory from an engineering standpoint, covers the synthesis of stochastic machines, state minimization, equivalence, coverings and input-output relations. Chapter two is devoted to nonhomogeneous Markov chains, which provide the mathematical model on which stochastic automata are based. The final chapter presents a theory of formal stochastic languages and events, including such topics as closure properties, decision problems, and characterizations. March 1971, 248 pp., $13.00. INTRODUCTION TO THE MATHEMATICAL THEORY OF CONTROL PROCESSES Volumes 1 and 2 Volumes in MATHEMATICS IN SCIENCE AND ENGINEERING Series Editor: RICHARD BELLMAN by RICHARD BELLMAN, Departments of Mathematics, Electrical Engineering, and Medicine, University of Southern California, Los Angeles, California Volume 1: LINEAR EQUATIONS AND QUADRATIC CRITERIA CONTENTS: Introduction. What is Control Theory? SecondOrder Linear Differential and Difference Equations. Stability and Control. Continuous Variational Processes: Calculus of Variations. Dynamic Programming. Review of Matrix Theory and Linear Differential Equations. Multidimensional Contro: Processes via the Calculus of Variations. Multidimensional Control Processes via Dynamic Programming. Functional Analysis. Miscellaneous Exercises. Bibliographies and Comments. 1967, 245 pp., $11.50 Volume 2: NONLINEAR PROCESSES CONTENTS: The Basic Concepts of Control Theory. Discrete Control Processes and Dynamic Programming. Computational Aspects of Dynamic Programming. Continuous Control Processes and the Calculus of Variations. Computational Aspects of the Calculus of Variations. Continuous Control Processes and Dynamic Programming. Limiting Behavior of Discrete Processes. Asymptotic Control Theory. Duality and Upper and Lower Bounds. Abstract Control Processes and Routing. Reduction of Dimensionality. Distributed Control Processes and the Calculus of Variations. Distributed Control Processes and Dynamic Programming. Some Directions of Research. 1971,324 pp., $16.00 INTEGER PROGRAMMING A Volume in MATHEMATICS IN SCIENCE AND ENGINEERING Series Editor: RICHARD BELLMAN by HAROLD GREENBERG, Department of Operations Analysis, Naval Postgraduate School, Monterey, California Presents all the material necessary for the understanding and solution of integer programs. It includes examples of the subject, the theory of integer programming, and numerous methods to solve practical problems. Topics covered include: applications of integer programming, a review of linear programming, the all -integer and continuous solution methods presented in a parametric context from which the underlying principles, covergence proofs, and algorithmic results are developed, and upper bound variable problems. March 1971, 208 pp., $11.50. NONLINEAR PROGRAMMING edited by J. B. ROSEN, O. L. MANGASARIAN, and K. RITTER, all at the University of Wisconsin, Madison, Wisconsin Concerned with those algorithms and related theory which lead to efficient computational methods for solving nonlinear programming problems. One of its main purposes is to strengthen the existing relationships between theory and the computational aspects of this subject. Among the more active areas of research covered are algorithms for nonlinear constraint problems, investigation of convergence rates, and the use of nonlinear programming for approximation. This book presents the proceedings of a Symposium conducted by the Mathematics Research Center, The University of Wisconsin, Madison, May 4-6, 1970.1970,502 pp., $10.50. ACADEMIC PREss \(!J m N E w YORK AND LONDON 111 FIFTH AVENUE, NEW YORK, N. Y. 10003 ti()s~it~llgr()~m~ti()il Srsterns~ r:.i~ m~~~et iil t~e 7()'s- . Wlt~ ~Ieilt>.:: ()r~()()rn r()~ ileW r~ces. Our new in-depth analysis and forecast can help you plan your moves. From coast to coast, hospitals are rapidly discovering that automation is the answer to keeping costs in check while, at the same time providing better care for patients. This recognition is expected to spur hardware and software sales to an annual growth rate of about 17% through the decade. The 70's will see great changes in the market. Now, nearly 90% of the systems installed are used only for "bookkeeping" functions. New functions like online complete pharmacy control, patient monitoring, medical history and laboratory reporting, diagnosis, menu control and meal distribution and teaching are in the offing. To help supplyir profiles of poter growth by numb C(I n !:' U'1' !~ !"-1 SAN D A U'1' 0-" provides projects Software and hl ous projects an amined for their :lly. Vari; are ex- Requirements fc access and disp 1980. The relati' progress is diSCI t, remote Hhrough . R&D in Price $295. OrdE use this coupon. 3-1080 or Please en! _ _ Ch€ ~y. Please ser reports chI he _ _ Has -_Spe _ _ Cor _ _ Mi" _ _ Dl _ _ Pc _ _ Pr _ _ In I Name-l Title_ Compan) Address/ Telepho! Vol. 20, NO.3 March,1971 computers and automation The magazine of the- design, applications, and implications of information processing systems. Editor Edmund C. Berkeley /l.rsistallt Editors Linda Ladd Lovett Neil D. Macdonald Sojttl'are Editor Stewart B. Nelson /ldz Jertisillg Director Bernard Lane Art Directol'S Ray W. Hass Computers and Education 8 USING COMPUTERS TO INDIVIDUALIZE INSTRUCTION: [A] ANOTHER APPROACH by Dr. John A. Connolly How computers are being used to adapt instruction to individual differences in reading, mental ability, learning style, and cognitive style, at the Conwell Middle Magnet School in Philadelphia. 14 [A] LET US BUILD INTELLIGENT COMPUTER TUTORS by Laurent Siklossy How computers can be made to "know" many of the subject areas that we wish to teach - with examples of the application of this principle to elementary set theory and computer information stru ctu res. 30 EXPERIENCE AND PLANS IN THE USE OF COMPUTERS FOR UNDERGRADUATE INSTRUCTION [G] - CONFERENCE, JUNE 23-25, 1971 by Dr. Fred W. Weingarten, Director, Computer Services, Claremont Colleges Daniel T. Langdale COlltriblltillg Editors John Bennett Moses M. Berlin Andrew D. Booth John W. Carr III Ned Chapin Alston S. Householder Leslie Mezei Ted Schoeters Richard E. Sprague AdzJ;sory Committee Fulfillment Manager James J. Cryan Alston S. Householder Bernard Quint William J. McMillan Computer Programming and Software [C/i/ol;aIOffices Berkeley Enterprises, Inc. 16 [A] PERSPECTIVE ON FLOWCHARTING PACKAGES by Dr. Ned Chapin, Contributing Editor Flowcharting packages are classified in eleven ways by the input they accept, the kind of flowchart they produce, the pattern of flow, etc., in order to provide an objective, quantitative basis for comparing packages. 33 [G] ANTI-ABM ESSAY CONTEST ANNOUNCED by Daniel D. McCracken, Chairman, Computer Professionals Against ABM The insoluble problem of checking out a giant software system without any operating experience. 815 Washington St., Newtonville, Mass. 02160 617·332·5453 /ldz'el'tisillg Contact THE PUBLISHER Berkeley Enterprises, Inc. 815 Washington St., Newtonville, Mass. 02160 617-332·5453 Computers and Privacy Computers and Automation is published monthly (except two issues in June) at 815 Washington St" Newtonville, Mass. 02160, by Berkeley En· terprises, Inc, Printed in U.S.A. Subscription rates: United States, I I monthly issues and two issues in June (one of which is a directory issue) - $18.50 for 1 year, $36.00 for 2 years; 12 monthly issues (without directory issue in June) - $9.50 for 1 yCilr; $ 18.00 for 2 years. Canada, add SO¢ iI year for postage; foreign, add $3.50 iI year for postage. Address all U.S. subscription milil to: Berkeley Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160. Second Class Postilge paid at [loston, Mass. Postmaster: Please scnd all forms 3579 to Berkeley Enterprises, Inc., 815 Wilshington SI., Newtonville, Mass. 02160. (i) Copyright 1971, by Berkeley En· terprises, Inc. Change of address: If your ilddrcss changes, please send us both your new address and your old address (as it appears on the m~gilzine address imprint and allow thrcc wecks for the change to be made. 4 28 [G] DATA BANKS - A POSITION PAPER by Prof. Caxton C. Foster, University of Massachusetts A penetrating analysis of future likely developments of data banks, "when every interaction of an individual with society can be collected, sifted, and analyzed at low cost" producing erosion of constitutional rights. 31 NEW YORK STATE IDENTIFICATION [G] AND INTELLIGENCE SYSTEM Burroughs Corp., Business Machines Group, Public Relations Office The current operation of a computerized record-keeping agency which holds more than 7 million fingerprints and associated records. COMPUTERS and AUTOMATION for March, 1971 Computer Applications 20 COMPUTERS IN COMMUNITY SERVICE: [A] CAN THE CULTURAL GAP BE BRIDGED? Part Two by James F. Muench, Computer Consultant Why a "computer person" must understand the perceptions, language, non-verbal communication, humor, and other characteristics of people of the community before he can effectively provide computer services to the community. 7 INFORMATION TECHNOLOGY AND PUBLIC DECISION-MAKING by Alim F. Westin [F] Front Cover Picture Computers and Society 23 [A] THE DEEPER UNREST by Dr. Kingman Brewster, President, Yale University How an unwillingness to admit the crises which we face with regard to conservation, over-population, politics, economics, nuclear power, etc., has prevented positive progress in dealing with those crises. 34 SOCIAL DATA PROCESSING CENTERS, IN THE FORM OF TELETERMINAL TIME by Joseph Auciello, Director, Computer Job Bank [G] A young visitor from Curtis Jr. High School, Sudbury, Mass., "has a conversation with" a computer at Digital Equipment Corp., Maynard, Mass. It looks as if he is much interested - and it seems safe to predict that sooner or later he will be "hooked" on computers. Computers, Science, and Assassinations 35 "THE ASSASSINATION OF PRESIDENT KENNEDY: The Application of Computers to the Photographic Evidence" - COMMENT Departmen ts 35 I. ANOTHER VIEW by Benjamin L. Schwartz, Ph.D. A polemical attack on "The Assassination of President Kennedy: the Application of Computers to the Photographic Evidence" by Richard E. Sprague published May 1970. 40 II. RESPONSE by Edmund C. Berkeley, Editor, Computers and Automation 45 DISTRICT ATTORNEY JIM GARRISION ON THE ASSASSINATION OF PRESIDENT KENNEDY: A Review of Heritage of Stone by Neil Macdonald, Assistant Editor, Computers and Automation [A] 62 60 57 [A] 55 56 50 Compu ters and the Philosophy of Science 6 THE NUMBER OF ANSWERS TO A PROBLEM by Edmund C. Berkeley, Editor, Computers and Automation Across the Editor's Desk Applications Education News Research Frontier Miscellaneous Advertising Index Calendar of Coming Events Classified Advertisements Corrections Monthly Computer Census New Contracts New Installations New Products and Services Readers' Forum 47 47 48 49 49 62 61 [E] 7 Computers and Puzzles 63 62 NUMBLES by Neil Macdonald [C] PROBLEM CORNER by Walter Penney, COP [C] Key [A] - Article [C] - Monthly Column [E] - Editorial [F] - Readers' Forum The Golden Trumpet 34 REDUCING DUES FOR UNEMPLOYED MEMBERS by the Institute of Electrical and Electronic Engineers COMPUTERS and AUTOMATION for March, 1971 [G] - The Golden Trumpet [G] [R] - Reference Information 5 EDITORIAL The Number of Answers to a Problem Rudyard Kipling, well-known English poet and author (1865-1936, winner of the Nobel Prize for literature in 1907) once wrote in a poem (In the Neolithic Age): There are nine and sixty ways of constructing tribal lays And -every -single-one-of-them-is-right. I doubt that Kipling could have defended the number 69. If he had been a scientist, he might have said: "The number of ways of writing national epic poems correctly, based on my extensive investigation of this important subject, appears to be 70, plus or minus half a dozen." Pleasantries aside, one of the important ways of classifying problems of all kinds is according to the number of answers. Problems may have many answers, just one answer, or no answer. The run of problems in the ordinary undergraduate textbook containing problems (in mathematics, computers, physics, or almost any of the "hard" sciences) gives a completely misleading impression of the real world, because the characteristic problem in the ordinary textbook has a single answer. This is nice for the student, because when he finds the one answer, he can stop working, and nice for the teacher, because when he examines the single answer, he can judge rather well how the student has worked. But in the real world problems with a single answer are rare. The problems that come up in the real world, and for which you and I and other people have to gather data before we even start to solve them, usually have many answers - or no answers. For example: How shall I live on an income of $120 a week dividing it among my expenses? In the United States in 1971 this is a reasonably satisfactory income for a single person, and there are literally thousands of answers to the problem, depending on the distribution of the income among food, shelter, clothing, and other expenses and payments. For another example of a problem: How will 90 million people be fully employed in 80 million jobs? The answer is, "It's impossible." And retraining, or reeducation, or computer-assisted education, or computerassisted instruction, or the Office of Economic Opportunity, etc., and all the other bright-eyed and bushy-tailed proposals from the world of training and education simply 6 alter the identity of the persons who are holding the jobs, as in a game of musical chairs - although in many other ways the education and training is of course useful. In the field of the application of computers, the design of computer programs, and the development of computerized systems, nobody really expects a single answer, even though a single answer has to be chosen. People expect any one of a large number of answers to be feasible, and they seek to choose that one which has the largest number of apparent advantages and the smallest number of apparent disadvantages. But it is regularly impossible to prove conclusively that a chosen answer is the best answer - usually it is only a relatively optimal answer. This fact has many important consequences: 1. A practical answer is regularly an approximation to the solution of a problem, and therefore does not entirely solve it. 2. Better approximations are possible and should be expected. 3. As time goes on, as conditions change, as knowledge increases, as requirements alter, improved answers should be determined. 4. Any answer that is adopted should be modifiable and improvable without too much sand in the gears. In· other words, it should have built-in facilities for change. 5. To obtain better and better approximate answers and to install them at appropriate times is always a requirement of good judgment and a responsibility of good management. For many problems in the real world, not only are there many answers, but static answers may change from good to poor, as time goes on and as the real world with its kaleidoscopic multiplicity of factors continues to operate. Which is just another way of course, of expressing Murphy's Second Law: If left to themselves, things always go from bad to worse. Edmund C. Berkeley Editor COMPUTERS and AUTOMATION for March, 1971 READERS' FORUM INFORMATION TECHNOLOGY AND PUBLIC DECISION·MAKING Alan F. Westin From the "Sixth Annual Report", 1969-70 Harvard University Program on Technology and Society Cambridge, Mass. 02138 This project is investigating the use of computerized information systems as decision-making aids by public agencies; it seeks to identify the changes that introduction of these systems leads to in the organization and policies of those agencies, and to explore the social implications of the changes. The study has been under way during a time in which much negative sentiment about technology arose from the belief that governmental decisions that affect people would no longer be made by traditional political processes in which the people have a voice, but by a few experts with computers, in ways that people would not understand and that would threaten their privacy and their freedom. What has thus been seen as a threat by some, has appeared to others as a promise of increased competence and effectiveness in policy-making. Through the immense data-handling capacities of electronic computers and the speed and flexibility of telecommunication systems, it was held, man could examine his social system in all of its patterns and tremors, and could create monitoring and feedback systems to achieve cybernetic levels of competence. As computer usage transformed mathematical calculations, opened new horizons in scientific inquiry, supplied automated systems for many basic production processes in industry, and fostered vast space and missile programs, many influential voices declared that this technology could be used to improve our domestic governmental process as well. The same tools that had put men into space, it was argued, could be applied also to the painfully intractable domestic problems confronting all levels of American government during the Kennedy and Johnson years. These proposals raised a host of questions that needed to be explored. Could information technology really deliver more timely and useful data for program evaluation and policy formulation? How would introduction of information technology into government agencies affect their internal structures, role relationships, and decision-making processes? How would such a development affect legislative and judicial oversight of executive-agency policy-making? What would be the psychological reactions of those who were the subjects, clients, and customers of government programs? Would there be changes in the relationships of COMPUTERS and AUTOMATION for March, 1971 government agencies to the intermediate political process (interest groups, the press, the party system) and to popular participation through the electoral system? And how would a trend toward such systems affect basic distributions of power in society between haves and have-nots? It was to explore these questions, and to provide detailed factual knowledge about exactly what was happening in this area, that the present study was initiated in 1967. Some of the larger issues of information technology and democratic government that are emerging from our research can be indicated here. First, the anti-technology literature of the 1960's expressed grave fears that computers and telecommunication systems would lead to the capture of decision-making by "the machines," or at least by those technicians and their superiors who controlled the information systems. Whatever the facts in the military and intelligence areas may be, there has been no such take-over yet in the civilian agencies of American local and national government. The distant future may tell a different story, but in 1970 it requires a powerful flight of ideological or philosophical imagination to go from the current pedestrian uses being made of computers to move paper and perform basic transactions to anything resembling sophisticated, data-rich decisionmaking; nor is there the slightest sign of a displacement of the traditional leadership elites of top and middle management in government by the information specialists. Second, it is possible to conclude that computers have been a factor in consolidating rather than in redistributing governmental power; computers and their associated equipment are fearfully expensive, and the poor, the black, the students, and the anti-war movements cannot harness computers to their causes. Also, to the extent that organs of government might adopt restrictive policies toward the civil liberties of dissenters or the socio-economic claims of the poor and the black, there is little doubt that information technology can make the execution of such policies more efficient. While there have been thoughtful suggestions by writers such as Robert Fano and Donald Michael that computer systems should be designed for power-sharing uses by the public and by the organs of criticism, no sign of such sharing has yet appeared in the development of computerized data banks in government. Third, one is led to ask whether the contrast between the shimmering visions painted by computer manufacturers, software firms, and allied consultants in the early 1960's, and the bleak record of accomplishment as of 1970 suggests a case of civic fraud. Enormous sums of money from public treasuries were spent to buy computers and (Please turn to page 60) 7 USING COMPUTERS TO INDIVIDUALIZE INSTRUCTION: ANOTHE'R APPROACH "When a perfect match between a student's abilities and a learning packet is found, the student is told, 'This packet is just your style. ' When only a very poor match can be found, the student receives the instruction, 'This packet may be hard for you. Ask for help zf you have trouble. ' " Dr. John A. Connolly American Institutes for Research 135 N. Bellefield Ave. Pittsburgh, Pa. 15213 John Lee came up with the winning name in the name-the-computer contest - Cornelius Computer. Cornelius works with John and 250 other eighth grade students in a school located in a poverty area in Philadelphia. A typical exchange between the computer and a student like John is quite simple: CORNELIUS: JOHN: CORNELIUS: JOHN: CORNELIUS: JOHN: CORNELIUS: P LEASE TYPE YOUR FIRST NAME, SPACE, AND LAST NAME JOHN LEE LEE JOHN ID #0892 JOHN, PLEASE ENTER THE FULL NUMBER OF THE PACKET YOU HAVE JUST COMPLETED 1100050005 HAS THIS PACKET BEEN SUCC E SSFULL Y COMPLETED? TYPE IN YES OR NO YES YOUR RECORD NOW SHOWS THIS PACKET WAS COMPLETED . PACKET 1100060007 ASSIGNED, WHY STUDY? (T APE) LEVEL 1 MATCH THIS SHOULD BE EASY TO DO. Matching Individual Aptitudes Dr. John A. Connolly is a Senior Research Scientist at the American Institutes for Research with previous experience with Educational Testing Service. He received a Ph.D. from Columbia University. His previous publications are in the fields of psychological measurement and evaluative research. 8 The final statement in this dialogue is not just a word of encouragement. It represents three years of effort to build a prototype system of individualized instruction. The computer's assignment of a particular learning packet results from matching John's measured learning characteristics to a catalog of many curricular options. The matching process is a central feature of a computer-based system for managing instruction currently being developed under a Title III grant at Conwell Middle Magnet School. COMPUTERS and AUTOMATION for March, 1971 Computers have frequently been used in programs of individualized instruction to track students through an instructioHal sequence on an individual basis, and to branch the learning sequence to adjust to individual variations in performance. This article describes a computer system which, in addition, adapts instruction to individual differences in aptitudes. The article concludes with a review of the tracking, branching, and adapting functions of the system with reference to the future of programs of individualized instruction. The Basic System Structure In simple terms, the system under development is designed to find out what children need, and to supply the most appropriate learning experiences to meet their individual needs. The prototype consists of three basic components: (1) a set of instruments and techniques for assessing student needs and characteristics; (2) a bank of learning packets which are cataloged in terms of those needs and characteristics; and (3) a computer program for matching the student's assessments and packet history to the curriculum options at each step of the learning sequence. The evaluative and curricular aspects of the model are described first in order to set the background for a more detailed discussion of the matching program. 1. Student Evaluation System An individualized program begins with an evaluation of the strengths and weaknesses ·of each student. These are determined by means of four different kinds of assessments. Terminal tests are used to evaluate mastery or deficiency with reference to 67 basic school objectives. Diagnostic tests indicate which of the available learning materials the student should be assigned. Progress tests are designed to measure student proficiency on the materials presented in each learning unit. Aptitude measures, the focus of the present article, attempt to determine the most effective way to teach each child. Chart #1 shows the four aptitude variables which are measured. These aptitudes were selected for experimental use on the basis of research evidence suggesting that they may be important dimensions of learning ability. a. Reading. Learning may be enhanced by adjusting the reading level of materials to the .student's capabilities. Reading test scores are divided into three relatively gross categories and stored in the student data bank. b. Mental abilities. Educators tend to feel that different MEASURES OF LEARNING APTITUDES RELEVANT GENERAL DESCRIPTION TEST Reading Achievement Iowa Test of Basic Skills Mental Ability RESEARCH 0-2nd grade 1 • 3-Sth grade 2 '" 6 th and above 3 - No information Lorge-Thorndike Intelligence Tests Academic Promise Tests Keislar & Stern Visual Learning Test Auditory Learning Test Ingersoll Learning Style DATA BANK INPUT o- Kinesthetic Learning Test O· Below average 1 .. Average or above 2 '" No information 0 .. Visual 1 • Audi tory 2 • Kinesthetic 3 .. Mixed 4 • No information Cognitive Style Raven Progressive Matrices Memory for Numbers Tes t ~ o - Concrete 1 .. Abstract 2 No difference 3 '"' No information lit COMPUTERS and AUTOMATION for March, 1971 teaching methods are reqUired for teaching students with above average and below average mental ,abilities. Although there is some doubt at the present time that such generalized abilities will prove effective in the present model, a very gross index of mental ability is entered in the student file. c. Learning style. Three distinct sensory pathways - the visual, auditory, and kinesthetic - convey most of the information from which the student learns. Some students appear to have strengths or weaknesses in learning by means of one or another of these pathways. Three measures were. constructed and administered to all students in order to assess their relative abilities in learning comparable tasks presented through each modality. A specific learning style is entered in the evaluation file only if a student shows marked superiority in one of these tests. Otherwise the "mixed" code is used. d. Cognitive style. A student's mental processes may be especially suited to learning either abstract or concrete relationships. For example, one student might find that the learning of number systems is facilitated by a considerable amount of practice with numbers, while another student might need to be taught only the principles involved. Again, a student is given a particular deSignation only if he shows large score differences on the measures of cognitive style. These scores and all other evaluative information on each child are maintained in a randomly-accessed disk file. The computer system will facilitate a study of the effectiveness of these variables as data accumulates on student progress. Some other kinds of learning aptitude variables (e.g., interests) are being considered for insertion in the system on an experimental basis. 2. Curriculum Cataloging System Curriculum materials were prepared in order to provide effective learning treatments for students with specified learning aptitudes. All curriculum materials are presented in the form of learning packets, which are brief curriculum units involving independent or semi-independent learning activities. Some packets were developed by local school teachers or project staff members and others were adapted from published curriculum materials. Each packet attempts to teach one segment of a particular learning objective. Mastery of most of the basic objectives requires the student to perform or comprehend a number of component operations or concepts, each representing one segment of the total objective. For example, the concept of place values in numbers is one component of the objective, "Arithmetic Skills." The structure for coding the treatment characteristics of packets for entry into the curriculum data bank is shown in Chart #2. Cataloging of packets relies heavily on teacher judgment. The teachers are provided with a set of instructions for coding the treatment characteristics of curriculum packets in a way which corresponds to the measured learning aptitudes of children. The structuring of learning experiences in this manner results in 72 possible combinations which are hypothetically different ways of teaching any single learning unit. Learning style might be varied, for example, by asking the student to read written materials (visuaI), listen to a taped version of the same material (auditory), or manipulate some 9 CURRICULU01 CODING STRUCTURE COllEll CllARACnRI ST I C CODING CATAGORIES DATA [lANK INPUT 0-2nd grade 3-Sth grade 6 th and above Reading Level Difficulty Level Simple Average or above r---------------+----------------~--------------- Teaching Visual Auditorv ~!ode Kincsth~tic ~Iixed Cogni tivc ~Icthod Abstract Concrete ~lixed tangible object such as an abacus (kinesthetic). The other treatment characteristics can be varied in similar ways. Thousands of possible packet variations can be conceived for teaching a complex subject involving many discrete learning steps (e.g., reading). The actual preparation of so many variations is not practical. Nor would it be desirable at this stage in the development of an untested model. Enough variations have been written for many topics, however. to serve as a basis for testing the usefulness of these variables in structuring the learning experiences of children. The computer system permits detailed analyses of curriculum availability and effectiveness. 3. Computer Matching System The computer performs a variety of functions in the overall operation of the instructional management system. The following discussion is limited to the computer's role in prescribing a learning packet for the student corresponding to his individual needs by matching the student's assessment file to the curriculum catalog. a. System configuration. A remote computer terminal (IBM 2740-2) is located in the Center for Individually Prescribed Learning Activities at Conwell School. Telephone lines link the terminal to a 2701 Transmission Control unit at the Philadelphia Board of Education Building. The control unit is attached to an IBM System 360, Model 30, central processing unit with core storage partitioned for multi-programming. The foreground partition, with 14K core storage locations, is dedicated to the present system. Data files are stored on a disk pack mounted on an IBM 2311 disk drive. The operating programs reside on a second, permanently mounted, systems disk pack. The system operates mainly in the on-line processing mode, with provision for remote batch opera1.ion as well. The major on-line request is for new packet assignments. Students request their own packet assignments by interacting with the computer through the terminal and receive virtually immediate decisions. The remote batch mode is used when the full computer system is needed. This occurs when a new student is added or a new packet is entered into the curriculum file, and in other situations. These requests are transmitted during the school day, queued on the disk pack, and processed during the night. 10 h. Matching algorithm. The rapid selection of the appropriate packet for a particular student at a given point in time is one major reason for automating the system to utilize the speed of a computer. The packet choice is based on a matching algorithm which follows the logic shown in Chart #3. The algorithm consists of six procedural steps, as follows: (I) Search for a perfect (Level 0) match between the student's measured learning characteristics and the coded packet characteristics for an instructional unit. The computer first relates reading level, aptitude level, learning style, and cognitive style to the coded dimensions of the available packet variations in an effort to find an exact match. If a packet matching all of the student's measured characteristics is available, the instruction to take that packet is transmitted to the student. If not, the computer moves to the next step in the process. (2) Search for an imperfect (Level 1) match. There is an implicit hierarchy in each of the four dimensions used for coding packet characteristics. Packets involving little or no reading, or reading at the 3rd to 5th grade level, for instance, are well within the capabilities of a student who reads at the 6th grade level or above. Similarly, the student with average aptitude can handle materials at a simple level; students with a strength in any of the three learning modes should prove capable of working with mixed learning modes, and the abstract learner can be taught using either a concrete or a mixed presentation. (The formulas referred to in the chart involve a detailed development of these general principles.) If a packet is available that is within ~ COMPUTER HATCIIING ALGORITHM' stART HERE LOOKING AT FIRST PACKET IN SEGMENT. (MATCH LEVEL ¢ IS ON.) COMPUTERS and AUTOMATION for March, 1971 the student's capabilities on all four variables, that packet assignment is given to the student. If not, the computer search continues. (3) Search for an imperfect (Level 2) match disregarding the measured cognitive style of the student. At this point the computer is searching for a packet which is within the student's reach using three variables only - reading, aptitude, and learning style. Cognitive style has been eliminated first since its validity seems least firmly established. Again the student gets an assignment if one can be found. (4) Search for an imperfect (Level 3) match disregarding both cognitive style and learning style. The search is continued with only two variables brought into play. (5) Search for an imperfect (Level 4) match disregarding cognitive style, learning style, and aptitude level. (6) Search for an imperfect' (Level 5) match disregarding all four variables. In effect, assign anything that is available on the requested topic. The result of this process is an instruction to a student to take a particular learning packet. The level of the match which was obtained is shown along with a statement to the student about the packet he was assigned. For example, when a perfect match is found, the student is told, "This packet is just your style." When only a very poor match can be found, the student receives the instruction, "This packet may be hard for you. Ask for help if you have trouble." No student has had serious difficulty learning the operating procedures required to "talk" with the computer. Their apparent enjoyment of this process is believed to be an important motivational factor. The average student completes the entire exchange in about two minutes. The terminal's response time is about two seconds for each transmission. The interactive language and the equipment configuration are currently under study in an effort to make the exchange more effective and more efficient. A New Role for the Computer? In what sense does this approach offer a new role for the computer? What are the current functions of the computer in the individualization of instruction? What changes may occur in the future? All forms of individualized instruction, no matter how diverse in other ways, involve individual as opposed to group pacing of students. Computers are sometimes used to keep track of large numbers of students who are moving at different paces through one or more learning sequences. The collection, storage, and retrieval of student progress data is one basic approach of computer systems designed to individualize instruction. vals, and prescribing different learning assignments depending on where a particular score falls. Computer branching of a learning sequence to adjust to variations in individual performance is another approach to individualized instruction. Adapting Techniques of Instruction The approach described in this article is an effort to adapt instructional techniques to individual differences in children. It assumes that students will learn best when taught in a way which conforms to their particular learning abilities. A computerized matching algorithm is used to prescribe a learning assignment which represents the best fit between the student's learning abilities on the one hand and the available variations in ways of learning on the other. Computer adapting of ways of learning to individual abilities may be a new direction for future programs of individualized instruction. Computers can be used to track, branch, and adapt instruction within a single system. These are complementary functions and all seem to hold promise for delivering improved instructional techniques to students. It is virtually certain that computers will also play an important role in the collection and analysis of research evidence on the effectiveness of these various techniques for the individualization of instruction. Efficient computer programs do not by themselves produce good programs of individualized instruction. Effective tracking, branching, or adapting of instruction can be done with or without computers. The real justification for the use of computers in education lies in their ability to help educators in their efforts to solve the complex and urgent problems which they face. 0 References Baker, Frank B. Computer Based Instructional Management Systems: A First Look, Review of Educational Research, In Press. Connolly, John A. A Computer-Based Instructional Management System: The Conwell Approach, Interim Report. Silver Spring, Maryland: American Institutes for Research, 1970. Cronbach, Lee J. How Can Instruction be Adapted to Individual Differences? in Robert M. Gagne (Ed.), Learning and Individual Differences. Columbus, Ohio: Charles E. Merrill Books, Inc., 1967, pp. 23-29. Edling, Jack V. Individualized Instruction: A Manual for Administrators. Corvallis, Oregon: Oregon State University, 1970. Ingersoll, Gary M. The Effects of Presentation of Modalities and Modality Preferences on Learning and Recall. Pennsylvania State University: Doctoral Dissertation, 1970. Prescribing Alternate Learning Paths Computers are also used to prescribe alternate learning paths for students. The system typically reviews performance data on tests administered at periodic intervals through the learning sequence in order to reach a decision about the next learning assignment. The prescription is often based on table look-up procedures which involve dividing the test score distribution into several score interCOMPUTERS and AUTOMATION for March, 1971 Jensen, Arthur R. How Much Can We Boost IQ and Scholastic Achievement? Harvard Educational Review, Vol. 39, No.1, Winter 1969. Keislar, Evan R. and Stern, Carolyn. Differentiated Instruction in Problem Solving for Children of Different Mental Ability Levels, Journal of Educational Psychology, Vol. 61, No.6, Part 1, December 1970, pp. 445-450. 13 LET US BUILD INTELLIGENT C OMPUTEIR TUTORS "The advances in artlficial intelligence indicate that computers can perform activities at a level of sophistication that we would be quite happy to see many students (and even teachers) attain. " Laurent Siklbssy The University of Texas Department of Computer Sciences Austin, Texas 78712 The numeric capabilities of computers can render many services in the educational system. Besides services such as record keeping planning that go with any sizable operation, computers can schedule classes and help instructors with the tasks of grading and evaluation. We shall be most interested here in the tutorial capabilities of computers. CAl (Computer-Assisted Instruction) has seen the development of drill-and-practice sessions handled entirely by the computer. But many workers in the field are quick to point out that computers are only a help to the teacher and should in no way be considered a threat to his position. On the contrary, their function is to relieve him of unpleasant chores. A "Good" Teacher Why has the computer been condemned so soon to not becoming a full-fledged tutor? The advances in artificial intelligence indicate that computers can perform activities at a level of sophistication that we would be quite happy to see many students (and even teachers) attain. Perhaps it is felt that the computer can never become a "good" teacher, because a teacher understands what he teaches, and the computer does not understand anything, but only does what it has been told. What is understanding? We shall not answer the question, but instead shall quote a paradox, attributed to the English physicist J. J. Thomson: "We never understand anything; we only get used to it!" We have felt that it was more productive to try to design seemingly intelligent computer tutors than to argue about the possibilities of such a design. The extent to which our early results indicate hope of future progress is for the reader to judge. General Schema for a Computer Tutor There are many tasks that the computer can become After an early interest in Mathematics and physics (B.A., Yale Univ.; M.A., Harvard Univ.), Laurent Sikl6ssy received his doctorate in Computer Science at Carnegie-Mellon University. He has been on the faculty of the University of California at Irvine, and is presently in the Computer Sciences Dept. at the University of Texas at Austin. Mr. Sikl6ssy's principal research interest is artificial intelligence, particularly in the areas of learning, problem solving, speech processing, and the development of intelligent computer tutors. Later this year Prentice-Hall will publish Representation and Meaning, which Siklossy coedited with H. A. Simon. 14 used to performing. From among such tasks we have selected two different areas: the manipulative capabilities necessary for solving problems in set theory, and the capabilities that go with understanding and getting used to information structures used in computer science (such as stacks, trees, queues, list structures, etc.). Although we shall give examples from the two systems that we have programmed, that teach elementary set theory and computer information structures, we shall try to stress the generality of our approach. Programs That Perform Tasks At the heart of our teaching systems are programs that can perform the tasks that we wish our students to learn to perform too. When we teach set theory, we wish the COMPUTERS and AUTOMATION for March, 1971 student to learn about the union of two sets. Thus, our teaching system includes programs that can calculate the union of two sets. This, of course, assumes programs that can recognize when something, whether produced by some program or by the student, is in,fact a set. When we wish to teach about binary trees, we first need programs that act as if they understood binary trees. Such programs should be able to answer questions about particular trees, such, for example, as: Which node is the father of node ABC? How many sons does node ABC have? What is the length of the path from node ABC to the root of the tree? In the areas that we have considered, elementary set theory and information structures, the type of performance programs that we have mentioned are easy to write. To the core of our tutor, we must add input/output routines that permit communication between tutor and student. Input routines preprocess the student's message, and protect the heart of the tutor. Our routine to calculate the union of two sets would fall sick if it were not given two sets as input. The output routines transmit answers, comments and suggestions to the student. inputs from the student, or they can be generated by an internal program, a set generator that can produce an extremely large number of different sets. Programs can calculate the union but, more importantly, they can compare "intelligently" the student's answer with the calculated union. The tutor will verify that (V T A S) is an acceptable answer, while (B S T) is not. Moreover, it will determine that (B S T) is not acceptable because part of set (A S) is missing in the union, as well as part of set (V T). (In each case, the tutor also identifies the particular missing parts.) Furthermore, the element B in the student's answer should not be there, since it belongs to neither of the two given sets. If necessary, the tutor can take these two sets and go step by step through the method it uses to calculate their union. The student is then presented with a working model that works in front of his eyes, and which he can imitate. Learning by Practice and Imitation The goal of the tutor is to transmit the knowledge, stored in his "heart", to the student. We try to achieve this by getting the student used to the subject matter. The student solves problems, that he himself has dreamed up, or that have been suggested by the tutor. The tutor will carefully compare the student's answer with an answer that it has calculated and base the future course of the tutorial dialogue on its diagnosis. The tutor can also show explicitly, by running through a problem, the methods that it uses to. obtain solutions. The student therefore learns by practice and imitation. We shall give examples of diagnostic capabilities in the next section. IF YOV WISt< TO STOP , TYPE YES Figure 2. The tree before and after the addition of node FF. Dynamic Capabilities WHICH tlODE DO YOV WISH TO ~DD TO Figure 1. At the student's request, the tutor draws a tree. Diagnostic Capabilities A simple example demonstrates the diagnostic capabilities of our computer tutor. Suppose that we ask the student to calculate the union of the sets (A S) and (V T). An answer is the set (A S V T), but since the order of elements in a set is immaterial, so is (S T V A). For that matter, there are 4! = 24 correct forms of the answer. It is not appealing to store all these 24 answers! So suppose that we follow the multiple-choice road: Which is the union of (A S) and (V T): (a) (A V), (b) (A S V T), (c) (), (d) (A S T) ? Now suppose that our student somehow calculates his answer. What happens if he finds (V T A S), or if he finds (B S T) ? The multiple-choice road does not help at all. In our system/ the sets are not even stored. They can be COMPUTERS and AUTOMATION for March, 1971 Unlike the human instructor, the computer is not limited to the use of a blackboard. In teaching information structures, it is essential to make the student familiar with the transformation in time of these structures. The blackboard does not lend itself to dynamic manipulations. On the other hand, the graphic display or CRT of a computer provides a superior medium for showing the changes in structures. Figure 1 shows the CRT during a lesson on binary trees. 2 The student has already built a tree with nodes labelled AAA, ABC and ART. The nodes have (optional) contents and left and right links. The program is building the tree at the student's request. Figure 2 shows the state of affairs somewhat later. The tree has grown further and the student has just requested that node FF, with contents C, be added as a right node to node UU2. The tutor shows how the OLD tree looked, and how the NEW tree appears. (Since the new tree is bigger, smaller boxes were used in drawing it by the general tree drawing routine!) It is hard to deny that our tutor knows something about 1 The set theory teacher is programmed in LISP. 15 PERSP,ECTIVE ON FLOWCHARTING PACKAGES "The SFL (Symbolic Flowchart Language) family is the only one that currently offers to the user any really effective degree of control over the level of detailin the flow diagram. " Dr. Ned Chapin 1190 Bellair Way Menlo Park, Calif 94025 The computer user today has a wide choice of packaged programs available for doing flowcharting. To see one's way through the welter, it helps to classify the offerings. This article attempts to make useful classifications, based upon a historical survey and an intensive study of a sample of currently available packages. languages most commonly supported have been COBOL, FORTRAN, and symbolic languages (such as IBM-360 Assembly Language). For some languages, such as SNOBOL, LISP, and APT, the author has been unable to find any flowcharting packages at all. Some languages are supported by only a limited number of packages, such as PL/l and RPG. Families of Flowcharting Packages The flowcharting packages available can be divided into three convenient categories based upon the input they accept. Historically the oldest and currently the most popular is the family that accepts the programer~written source code. That is, it accepts as input an ordinary source program written in a programing language. In practice the SFL Input A second family of flowcharting packages accepts SFL input. SFL (Symbolic Flowchart Language) was devised by F. David Lewis and his colleagues at IBM. This family has enjoyed considerable activity over many years. The input language is convenient and easy to use, but does require some way of converting the source language in the program to input language. The two alternatives commonly available for this are manual translation and machine translation. The manual translation permits introducing various degrees of summarization and provides the high degree of control over the format of the resulting flowchart. Machine translation typically proceeds by a process over which the user has little control, and hence produces a relatively standardized translation and flowchart. Other Inputs Dr. Ned Chapin has been a data processing consultant with InfoSci, Inc. in Menlo Park, Calif. since 1965. He has been in the consulting field since 1954, and his broad range of experience includes: EDP systems analysis and design; file and data base design and implementation; programming of computer applications; software design, implementation, and evaluation; and evaluation of computer manufacturer bids. Dr. Chapin earned his Ph.D. in Business and Economics at the Illinois Institute of Technology. He has taught many college courses, and has published several books and more than 100 articles, papers, reviews, etc. His professional activities include: ACM National Lecturer; Member, DPMA Curriculum Committee; Accreditation team member for the National Association of Trade and Technical Schools; and Program Chairman for COMPSO. He is a contributing editor for Computers and Automation. 16 The third family of flowcharting packages accepts other inputs. Typically these inputs are specialized languages designed for particular user needs and used only in one package, or used only in sharply modified form with other packages. Historically in terms of the volume of flowcharts produced, this has been a very important family, since it includes the AUTOCHART series of programs widely used within IBM for software documentation. The family, however, has little acceptance outside of its regular users because of the difficulty of learning the specialized languages which have no wide adaptability. Because this subdivision into families based on input proVides a comprehensive and operationally practical classification basis from the users' point of view, it is the one featured in the chart shown in Figure 1. A full historical review can be found elsewhere. 1 Detail on a selection of the most common packages available currently is given in Figure 2. 1 Ned Chapin, Flowcharts (Princeton, N.J.: Brandon/Systems Pr~ss, Inc., 1970), Chapter 6. COMPUTERS and AUTOMATION for March, 1971 Among the packages which produce flow diagrams, a classification can be made in terms of the level of detail shown in the flow diagram. Most of the packages create a flow diagram at the same level of detail as the level of detail in the source program. That is, the level of detail obtained by reading the source language is the same as the level of detail obtained by reading the flow diagram produced by the package. Two exceptions can be observed. One is in the SFL family, since SFL permits the user to control the level of detail. The user with SFL can achieve any level of summari- Flowcharts Produced Another basis of classification is in terms of the kind of flowchart the packages produce. The two main varieties are flow diagrams for the algorithm used within a program, and system charts showing the interrelationship by input and output of a series or sequence of programs. In practice the latter are all members of the SFL family and are represented by only one or two packages. As a de facto matter therefore, the primary emphasis is upon flow diagrams in the available packages. Figure 1. Classification of Flowcharting Packages YEAR 1957 1959 1958 1962 1961 1960 1963 7070 AUTOCHART ::J 1964 1965 1966 1967 1968 1969 1401 360 AUTOcHART·AUTOcHART-:o:------------- r----------------,-----FLUSH-- Q. C FLOWRITE---- FLOGEN PRECHART t-----------------SBDS-----~I-·R.oberts L- Hain r------~~~CRKT-COMCHART--- \ - - - - - - - - - F L O B OL-N~V:~t- ~~~!------ " IDYNACHART---- '"'"::J c '" ~~:~~~~,-----------~~;~~~~7- Q. C UJ a: w ~ . If not delighted, I ~e~;~\;(l\~~ir ~~e~n~~W~~. 11sd~y~r~d:e~~~~i ace\ I ~~~~ tiC~~nfg;: Jl ~~r~e~~~~Zr~~~~:~~ri~~; I Address ..............................••....... I I I City .•.................. State •...... Zip ....... . nooks bought for professional purposes may be a tax-deductible expenS(l. (Olfer good in Continental U.S. :md Canada only.) 7-353 II Each ~i~in~~if~~~~ ;g~o ~~~~in!d ~c~~~~~t~dm~~~ month, I will receive advance reviews deI ~~~~~~fenro~~~~mf~rg r~~~~~lf~~' aNeO~~teWistSec~ I ~i~~csh~;er I b~~y ~ho~l;~ !O~o;~~rybo~k~el(i~~~~~ I ductory olfers counts as first selection). 3 books for only $1 each I (write in numbers) I I I Name ••................••........... ····.·· ..• ~----------------~ DATA BANKS A POSITION PAPER Prof. Caxton C. Foster University of Massachusetts Amherst, Mass. Data banks are not a new problem. Hamurabi kept an extensive clay tablet library of legal transactions several thousand years ago in Babylon. What has happened with the advent of computers is that the cost of operating such data banks has dropped by several orders of magnitude. Consider a clerk who can perhaps examine one record per second and is paid $1.80 an hour. He (or she) can then examine about 2000 records at a cost of $1.00. Now consider a computer that can scan records at a rate of 500,000 per second and rents for $250 an hour. For the same cost of $1.00 it can examine 7,200,000 records. Done by hand, a comparable search would cost $3,600 instead of $1.00. This drastic reduction in cost has made economically feasible things that could only be dreamed of yesterday. New and exciting services can be provided to individuals, organizations and researchers. We need not extoll their virtues here. Many others are doing that elsewhere. Data banks are inevitable and essential in a complex society. Our civilization would quickly strangle in the flood, of paper work if computerized files were eliminated. Although the potential for good inherent in data banks is very large, we are afraid that the potential for evil is infinite. When every interaction of an individual with society can be collected, sifted and analyzed at low cost, he will be paralyzed by fear -- fear that today's innocent behavior, recorded indelibly on the data bank, can become tomorrow's subversive activity. As we see it the most serious problem related to the establishment and growth of data banks is the erosion of our constitutional rights. Once surrendered these rights will be most difficult to regain. "Big Brother" armed with computerized data banks is very big indeed and will ~e almost impossible to displace. If this is indeed the case, and we firmly believe it is, then this country should be very careful of allowing such a possible instrument of repression to be forged. In what follows we will attempt first to show that the above described danger is very real, indeed inevitable, unless strong action is taken immediately. Second, we will try to outline some of the "strong action" we think might be helpful. form. By themselves, these separate data files are reasonably innocent, but unfortunately, they don't stay by themselves; they tend to agglomerate -- in the name of efficiency, economy and service. Agency A and Agency B each have computerized files, and, to some extent, each could utilize some of the other agency's information. So they set up a joint operation, halve their operating costs and 1984 is one step closer. This "gossiping" among supposedly benign agencies could presumably be prevented by appropriate laws. The second way that data banks grow is by gathering more and more peripheral information. It seems that every time one fills out a new form it has more questions on it than the last one; more personal and more irrelevant questions. While not yet asked to list one's grandmother's maiden name on a form. it may be expected any day. To some of us this is not sensitive data. To some it might well be. Other information is more sensitive. What may be very pertinent in one's family physician's files would be impertinent in the extreme in the hands of a direct mail advertiser. The individual should be free to refuse to answer any question on any form that he considers personal, and it should take a court case for the interrogating agency to deny to him, on this basis alone, the services it purports to deliver. Now let us turn to more malign groups - a wouldbe dictator, or perhaps organi~ed crime. Some computer experts say that data banks can be made secure. At best these people can be called over-enthusiastic. As many husbands discovered at least as long ago as the crusades, any lock caribe opened by a skilled smith with enough time and enough incentive. Let us look at some of the 'ways this might happen. The Development in the Near Future Machine Failure - We have all heard of computers printing out checks for $1,000,000. What one does not hear of, unless he works in or around a machine room, is the number of times a day programs are rerun because of transient hardware errors; but the number is not insignificant. More and more organizations are finding it advantageous to develop data banks. Motor vehicle registries, income tax agencies, armed forces, police departments, credit bureaus, banks, insurance companies, direct mail advertisers, and many others are collecting, or are about to begin collecting, little bits and pieces of our lives in machine readable Logical Errors - Although most logical errors are caught in the program development stage, some persist for a long time. Every large program has undiscovered flaws in it. One very famous example concerns FORTRAN - perhaps the most'widely used of all computer languages. The manuals describing the system said that an attempt to take the square root '28 COMPUTERS and AUTOMATION for March, 1971 of a negative number would result in a value of zero. It was many years after FORTRAN was designed and had gained world-wide acceptance that someone discovered that the square root routine actually returned, not zero, but the square root of the absolute value of a negative number. If this supposedly glaring error could pass undetected for years, what subtle flaws could there not be in a data bank supervisory program? Wiretapping - If a data bank is remotely accessible, then an enterprising group could soon have copies of most of its data by tapping one or more of the phone lines leading between the central computer and the remote terminals. Of course "scramblers" are available, but that just brings us back to the problem of locks again. Unintentional Compromise - When a request arrives for data out of the bank, there must exist some kind of validation procedure that establishes the requestor's right to the data in question. Now, if there are many different people requesting information, the validation procedure cannot be too complicated if the system is going to be useful. Generally speaking, the computer industry has relied on the use of one or more "passwords" for gaining access to a system. If a person signs on the system, says he is Mr. Smith, then presents the secret code word that "only" Mr. Smi th knows, we generally let him in. This, of course, can be elaborated into many levels with new and different' passwords (secret codes) being required at each.succeedingly more sensitive level. We can change the code words every day; every 15 minutes if necessary. But eventually, if the user presents the right keys at the right times, we open the locks. If Mr. Jones should somehow get hold of Mr. Smith's secret codes, we would have to believe he was Mr. Smith (if he said he was) and let him into the system. Pseudo Sign-On- A couple of enterprising high school students in Amherst wrote the following program for their own "amusement." We have several teletypes in the computing center that are permanently connected to the computer. Operation over permanent leased lines is quite common and would be equivalent. These boys wrote a program which mimicked the normal sign-on procedure of the system and requested (as usual) the user to give his user number and secret code. They would leave the terminal running with this program in the machine and an unsuspecting user coming up to the terminal in question would think he was talking to the system, while actually he would be talking to their program. Once the user number and secret code were captured, the program would write them out onto a file so the students could examine them later, and then it would fake a "disaster" (system crash) so that the user would be forced to sign-on again - this time to the real system, and never know that his code was no longer secret. By the time they were caught these students had "secret" codes of over 100 users. Fortunately, we don't keep classified information on our time-sharing system. Eavesdropping - We have a second generation machine (CDC-3600) which has write and execute protection but no "read" protection. With third generation machines this situation could be simulated by judiciously grounding out the read protection circuits. Since reading "out of bounds" is not a usual activity, this might go undetected for a long time. How many systems have incorporated in them a check of that circuit? In any event a computer science graduate student wrote a fairly simple program-that would eavesdrop on the I/O buffer of any COMPUTERS and AUTOMATION for March, 1971 other terminal and reproduce a copy of all transactions on his own terminal. The programming consultants at our center now use this program regularly to help distant users debug their programs. With a bit of modification this program could scan all the ports looking only for sign-on codes and list them as they appeared. Mini Computer Code Crackers - Mini computers of high capability are now available for under $5000. For an additional $1000 one can purchase about 10 telephone adapters (data-sets or modems) and set up a lucrative business cracking codes. The mini computer calls up the time-sharing system, presents a user number, and "tries" a particular secret code. If it doesn't work the mini calls again and tries a new one. Now on a typical system a secret code is any combination of four letters, say: ABCD. There are roughly 360,000 possible codes (26 4 ). If each try takes 10 seconds and we have 10 data sets working, we are making one try per second or 3600 per hour. With average luch we should hit on the proper code after trying half the possible codes, or in about 50 hours of trying. If the time-sharing system is operating 16 hours a day, that represents an average of two codes cracked per week. Suppose the entire mini computer plus data sets costs as much as $10,000. At typical leasing costs this would rent for about $200 per month, or $50 per week. This makes the cost of cracking a code a ridiculously low $25. Subversion of Operation Staff - Perhaps the weakest point in the security of any system is the staff that operates the machine. Peter Ustinov in the movie "Hot Millions" has explained this fully. Bad Data - Erroneous data entered into a bank unintentionally is bad enough, but the possibilities for character assassination available by entering intentionally false and derogatory information into a data bank are staggering. Authorized Misuse - So far, we have mentioned hardware, software and personnel problems, against which some safeguards can be provided. What will be the most difficult to control will be the overzealous administrator who can, and must, because of his job, have access to the data banks at will. I don't think we will ever appreciate how lucky we are that Hitler and Company were defeated before computerized data banks became available. Suggested Paths of Action In the previous section we have tried to point out that any data banks at all contain dangers that can only be partially guarded against. Yet data banks already exist and will undoubtedly proliferate. In this section, we wish to suggest some possible paths of action that might prevent some of the most serious abuses of these systems. These fall into two broad categories: Protection of the individual, and control of the agencies maintaining data banks. Protection of the Individual - There are a number of steps which can be taken to protect individual rights. Some might require new laws, some, new interpretations of existing laws. All might possibly be contained in a new amendment to the constitution. The right to refuse to answer non-pertinent or impertinent questions. The 5th Amendment protects 29 the citizen in court. Military codes of ethics require prisoners-of-war to give only name, rank and serial number. The private citizen needs to be protected from being forced (however subtly) to answer questions he considers to be personal. An agency collecting data should be required by law to accept a "refuse" answer as fulfilling all its requirements for information until it can be established in court that the desired information is indeed necessary to enable it to do business properly. Obviously, loan agencies need to know how deeply one is in debt before deciding whether they will lend money or not. Other examples are legion. Right of Access - A citizen is guaranteed the right to face his accusers in court. He should also be permitted to examine any files, anywhere, that relate to him. Semiannually copies of files should be automatically mailed to each individual. Other copies might be provided at cost. Right of Challenge - If an individual feels that a file contains erroneous information about him, he should have the right to 1) add explanatory information, and 2) challenge the validity of the file. This second course of action should have the effect of removing that file from the data bank until the challenge is resolved in some legal fashion. The provision of local Ombudsmen will simplify these actions for the average citizen. Right of Restriction - An individual should have the right to restrict, at his discretion, the circulation of a file concerning him. Perhaps a more positive approach to this would require his cooperation (signature, for example) before the file could be opened and/or copied. Regulation of Data Banks At the other end of the scale there must be control and regulation of those maintaining data banks. The problems concerning those data banks which are necessarily secret must be examined carefully with the interests of the private citizen in the forefront. Regulatory Commission - Congress should establish a regulatory commission with full powers over the collection, use and dissemination of personal information. This should be autonomous, but subject to Congressional control lest these very guardians be left unguarded. They should be provided with the very best of technical counsel on their own payroll. Some areas within their spheres of interest might include: Disclosure of Distribution - All questionnaires should list the agencies that will have access to data supplied by the individual thereon. Disclosure of Access - The individual should be notified whenever anyone examines his file. This notification should include the date, the agency examining, and the reason for the examination. The Cost of Protection of the Individual - Let us take as a starting point the cost of a bank check. This is typically around 10¢. For this price a bank will take a piece of paper and convert it into money and provide you with a monthly record of all transactions. Particularly if the check must go from one bank to another, there are several humans involved in the processing so one cannot assign more than a penny to the computer processing involved. This would seem to be a small cost to impose on say a credit bureau which charges several dollars for a credit reference. 30 Flying Squads - The Commission should maintain one or more "flying squads" of programmers and engineers who, without prior notice, appear at a data bank and" take over" to test its compliance wi th the law. This will help to keep the computer room personnel honest. Devil's Advocates - The Commission should retain several astute, devious, highly trained programmerengineers whose job it is to try to find ways to "crack" the various data banks. These people should be rewarded sufficiently well as to make selling out unprofitable, or at least unnecessary. Mergers - Data banks should not be merged without the permission of the Commission, and then only for compelling reasons .. Keeping data banks sufficiently segmented is a built-in safeguard that will make it much more difficult to misuse total information on an individual. Bonafide research in Public Health or Sociology would be helped, not hindeLed, by strict control of data banks, because it would increase the people's confidence that data collected would be treated confidentially. Conclusions Perhaps the problem of data banks could be greatly alleviated if the concept of "property" were to be extended to cover information about an individual. There is probably some precedent for this in common law, where a man's "good name" is his most precious possession. If the law recognized that information about John Smith belonged to John Smith to do with as he chose, many problems could be easily handled. Maintaining a data bank would then be a privilege, not a right, and hence could be licensed and controlled. John could lend information about himself, or he could sell it-rrhe desired, but it could not be forcefully, or covertly wrested from him. Name, address and social security number are required by law. All other information is at the owner's discretion. EXPERIENCE AND PLANS IN THE USE OF COMPUTERS FOR UNDERGRADUATE INSTRUCTION - CONFERENCE, JUNE 23-25,1971 Dr. Fred W Weingarten, Director Computer Services Claremont College Claremont, CA 91771 A grant of $50,000 has been awarded by the National Science Foundation to Dartmouth College for a Conference on Computers in the Undergraduate Curricula. The Conference is to be held at Dartmouth College in Hanover, New Hampshire, June 23, 24, 25, 1971. The purpose of the conference is the dissemination of actual experience and plans in the use of computers in undergraduate instruction. Referred submitted papers will comprise the bulk of the conference, which will have parallel sessionsj invited papers, panel discussions, and demonstrations will rou~d out the meeting. The scope of the Conference will be national. Content will be broad enough to encompass most academic fields at two and four-year colleges as well as at undergraduate schools of universities. For a similar conference held last summer at the University of Iowa, nearly 200 papers were submitted. COMPUTERS and AUTOMATION for March, 1971 NEW YORK STATE IDENTIFICATION AND INTELLIGENCE SYSTEM Burroughs Corporation, Business Machines Group, Public Relations Office Second A ve. at Burroughs Detroit, M I 48232 • , In the State of New York, fewer innocent citizens are detained for a significant length of time and more criminals are arraigned more quickly as the result of efforts by the state supported criminal justice agency located in Albany, New York. The New York State Identification and Intelligence System (NYSIIS) is a computerized recordkeeping agency which houses more than seven million criminal and non-criminal fingerprints and corresponding identification and case history data. The agency makes the data available through a communication network to over 3,600 agencies of criminal justice in New York State. NYSIIS was created by statute in 1965, as an agency within the Executive Department of the New York State Government. Objectives The ultimate objectives of NYSIIS are twofold: (1) improvement of criminal justice administration through systemic computerized information sharing, and (2) protection and enhancement of civil liberties. NYSIIS has made significant strides toward these objectives since its establishment over five years ago. Here is an example of how NYSIIS can protect civil liberties. A person is arrested and fingerprinted by the Nassau County Police Department. The Nassau County Police Department (NCPQ) has one of the forty-one facsimile installations located throughout the state which can electronically transmit to NYSIIS a copy of the set of fingerprints in a total of 14 minutes. Following receipt at NYSIIS and classification of the prints, the NYSIIS computer, a Burroughs B5500 soon to be replaced by a larger B6500, searches more than two million stored classifications in no more than 35 seconds to ascertain if there is a prior criminal history on file in the agency for the individual. If there is, a record of it will be sent in 4.5 minutes by facsimile to the Nassau County Police Department. The entire process takes no more than three hours. Gallati, "More rapid and positive identification of perpetrators of criminal acts means that the innocence of possible suspects is established sooner and with more certainty. Victims may be more readily compensated for their suffering and financial loss and they are spared undue harassment from lengthy and traumatic investigation. Offenders' rights are likewise better protected for they may, in appropriate cases, receive summonses in lieu of arrest, or if arrested, be discharged on their own recognizance. JUdicial officers will have the necessary data to fix bailor sentence, or otherwise rapidly dispose of cases, thereby preserving the civil liberties of offenders and according them due process, while at the same time, knowledgeably protecting society from those offenders who are a threat to the community." If the arrestee in the above example had a record, the Nassau County Police Department would recei ve a '''rap sheet" defining hi s criminal hi story. This information would then be used by agencies along the criminal justice continuum to see that his case is handled appropriately. These summary case histories contain such information as: personal description, arrest charges, dates and places of arrest, arresting agencies, court dispositions, sentences, institution data and information concerning parole and probation. It is planned to expand these case histories to include considerable additional data as the system evolves. NYSIIS began to produce "rap sheets" directly from the computer during 1969, becoming the first agency in the world producing summary case histories by computer. The NYSIIS computer prints out "rap sheets" at the rapid rate of 1,040 lines of record information per minute from a vast computerized data base containing mor& than 400 million bits of criminal history information. Fingerprints sent to NYSIIS during calendar year 1969 via the Statewide Facsimile Tramsmission Network reached a total of 57,847 compared with totals of 46,956 in calendar 1968 and 25,062 in 1967. Facsimile Network Time for Fingerprint Search Previously, the fingerprint search routine took from seven to ten days during which time many persons were unnecessarily detained without bail, or, in the alternative, released when the record would warrant their being held. Aocording to NYSIIS Director, Dr. Robert R. J. COMPUTERS and AUTOMATION for March, 1971 With the completion of new installations during 1969, the facsimile network now covers 41 locations of which 32 are in law enforcement agencies and the remaining nine are used to service the courts, probation departments and district attorney's offices in the five boroughs of New York City. The heaviest contributor of facsimile prints during 1969 was the New York City Police Department 31 with a total of 34,483, followed by the Nassau County Police Department which submitted 7,517 sets of fingerprints. Although budgetary constraints make it impossible for NYSIIS to install facsimile equipment in all of the criminal'justice agencies throughout the state, wherever such equipment has been installed it is with the agreement that the equipment be 60nstantly available for the use of all criminal justice agencies in the immediate area. Agencies that do not have facsimile equipment available on site should bring fingerprint cards to the nearest facsimile installation, with the request that such prints be transmitted to NYSIIS at the earliest possible moment. Fingerprint Identification and Coding Approximately 60 percent of the fingerprints received by NYSIIS (currently averaging 1,850 per day) are not "identified" as a result of the name search that is conducted in the Name Index Section. This means that every day about 1,100 sets of fingerprints -- or 11,000 individual prints -- must be carefully analyzed and fully classified before a technical search is conducted by the computer or, in certain cases, by manual means. The purpose of the technical search, of course, is to determine whether the individual does have a prior record under a different name, which would explain why the search in the Name Index Section had proven negative. During the course of one year~ a technical employee assigned to the Classification Section will carefully study and analyze approximately 200,000 fingerprint patterns. The task of a classifier is to study the ridges in each pattern and then make a determination, based on specific rules contained in the American System of Fingerprint Classification textbook, as to whether the pattern meets the loop, whorl or arch requirements. ' There are small loops and large loops, small whorls and large whorls -- and varying ridge counts are actually the basis of the formula that the computer uses in selecting one particular classification from among the hundreds of thousands of other similar classifications within its memory. Latent Fingerprints Another area of fingerprint record-keeping that NYSIIS makes available to the New York State criminal justice agencies is the Scene-of-the Crime (Latent) Fingerprint File. This latent file, one of the largest in the nation and continually being expanded, contains scene-of-the-crime latent prints and the fingerprints of several thousand selected individuals well known to the police -- individuals who have been convicted of homicide, burglary, robbery, car theft and similar felonies. Fingerprints developed at the crime scenes (latents) are submitted to the NYSIIS Latent Fingerprint Section for searching and comparison. Latents not identified are added to the base file and are continually compared against incoming arrest prints. In 1969, trying to develop an even more effective Latent Fingerprint Processing System, NYSIIS and the law enforcement agencies in Onondaga County participated in a pilot research study called, "The Latent Value Field Study." 32 A small defined area of Onondaga County, with a high burglary cr~me rate, was selected for the study site. All burglary crime scenes within this designated area were searched for latent prints by the investigating police officers. The Criminalistics Research Bureau of NYSIIS used experimental semiautomatic coding techniques to prepare a base file for the area against which incoming latent fingerprints were rapidly checked. As a result of this pilot study, 69 latent fingerprint cases were submitted to the NYSIIS Latent Fingerprint Section for searching. Six perpetrator identifications were made on the basis of only sceneof-the-crime prints without other clues or any other reason to suspect the previously unknown individuals who committea the crimes. "The latent fingerprint records are one of the most important areas in which NYSIIS is involved," Gallati said. "Because criminal mObility from ci ty to city is quite frequent, and because our criminal and latent fingerprint files are two of the largest in the nation, we have become a valuable service to all agencies of criminal justice throughout the State of New York. "If law enforcement agencies take the initiative to detect latent fingerprints at crime locations and send them to NYSIIS, we know that we have an excellent chance of making a 'hit' on rapists, murderers, arsonists and other criminals," Gallati stated. Computer Capacity NYSIIS was originally computerized in 1968 and is in the process of installing a new, larger computer to handle their rapidly growing data files. A Burroughs B6500 computer will replace the present B5500 which is operating at virtually 100 percent of capacity around the clock every day of the year. Its data storage already exceeds maximum load for a single processor. Grants "One of our greatest contributions to the criminal justice system has really been from a scientific technology point of view," Gallati said. "Thanks to confidence displayed in NYSIIS by the Governor and the legislature and hundreds of thousands of dollars in Federal Grants, we have been communicating with most leading research and development people throughout the country. We have also visited major research laboratories'around the country and we are continuously relating new technologies to our needs in the interest of new c?pabilities, improved efficiencies and lower costs." NYSIIS received $425,000 in Federal Grants for new and ongoing projects in 1969. These projects include: a personal appearance study; an auto related crime study; an evaluation of organized crime; a concept evaluation of modus operandi (methodology used in committing crimes); a nationwide computerized retrieval system for criminal history; research and development on modus operandi; a probation and parole system requirements study, and development of a name search technique. COMPUTERS and AUTOMATION for March, 1971 ANTI-ABM ESSAY CONTEST ANNOUNCED Daniel D. McCracken, Chairman Computer Professionals Against ABM 4 Inningwood Road Ossining, New York 10562 This is to announce an essay contest on the topic, 'Would you trust the lives of your children to a highly complicated computer system that cannot be checked out?" The contest is inspired by a letter in the January, 1970, issue of Modern Data, signed by Dr. John S. Foster, Jr., Director of the Office of Defense Research and Engineering in the Department of Defense. Dr. Foster's letter was in response to the statement of Computer Professionals Against ABM, in which we argue that a complex real-time system can only be brought to reliable operational status through an evolutionary process of testing and development under actual operating conditions. This is inherently impossible with the ABM (the Anti Ballistic Missile system). We believe it is extremely dangerous to turn over the control of hundreds of nuclear missiles to a highly complicated computer system that cannot be checked out. Dr. Foster's reply was that all the individual parts of the Safeguard Anti Ballistic Missile system (radars, missiles, and computers) have been tested separately, and, "thus, the only real task that the Safeguard system has, is to integrate all of these functions in the computer programs and to. check thoroughly and test out the programs before the system is made operational." He explained that the testing would be done with simulation tapes "so that the system is exercised just as it would be in a real battle." If statements like these were made by a student in his first course in computing, you'd give him a C-minus and forget about it; in his second course you'd flunk him and forget about it. But when they are made by a person who controls an annual military R&D budget in excess of $10 billion, you have to think about trying to educate the man. Hence, the contest. I think 500 to 700 words would be about right. Please send copies to me, Computers and Automation, Dr. Foster (The Pentagon, Washington, D.C. 20310), and (very important) your Senators (The United States Senate, Was-hfngton, D.C. 20510). If you can't think of better ones, here are a few points to use for Dr. Foster's edification. -- The full-scale operating system for the IBM System/360 is of the same general order of magnitude of size and complexity as the ABM software. It was thoroughly tested by IBM before release, using simulation tapes as it happens, but after it was released customers discovered literally thou- COMPUTERS and AUTOMATION for March, 1971 sands of programming errors when they used it under actual operating conditions. ·(Five thousand, to be precise, when my highly-placed source told me the story two years ago.) This isn't a slap at IBM; that's just how it is with big computer systems. -- American Airlines has spent, in round numbers, ten years and $100 million developing a passenger reservations system. It was a near-disaster the day it first went on line with real passengers although it had been thoroughly tested, but after a process of development under actual operating conditions it was brought to a state of high reliability and usefulness. This might qualify as an example of a system that had been tested by itself. So what happened recently when two other airlines tried to do essentially the same job? Well, one result is a $70 million suit by TWA against Burroughs, after cancellation of the contract because the system wouldn't work. -- NASA, which Dr. Foster cites to show that complex computer systems can be made to work, freezes program changes 120 days prior to a launch, then devotes 30 to 45 days to a fUll-time simulation based on all the lessons learned in previous Mercury, Gemini, and Apollo flights. The computers are run during the simulation by the programmers who wrote the programs in the first place, and later during the real thing the computers are also run by the same programmers. Does Dr. Foster expect the Russians (or the Chinese, or the Portugese, or whoever he's afraid of this week -- it changes from time to time) to give 120 days notice of a planned attack? Landing men on the moon doesn't prove that we can make the ABM computer work -- on the contrary, it demonstrates all the things that would have to be done that cannot be -- ---done. -- A RAND study shows that when a single instruction is changed in a large program, the program works less than half of the time when it is first tried after the change. Since the ABM software would be in a constant state of flux to keep up with changes in the offensive threat as well as modifications for other reasons (such as the complete change of computer now under study), how would it ever be possible to get the programs stabilized long enough to get the errors out? And you can be sure that the offensive threat would change: since the Russians have an ABM system of their own, which their scientists privately say is useless, they already know that the simplest way to incapacitate ours would be to keep forcing us to change it. (When NASA sends men to the moon, nobody jerks the moon out of orbit just as they start their descent.) 33 REDUCING DUES FOR UNEMPLOYED MEMBERS CONTEST PRIZE Computers and Automation will award a prize of $100 to the best essay in this contest meeting the requirements mentioned above and below. The closing date for receipt of essays (copies of letters) is May 31, 1971 in the office of Computers and Automation, 815 Washington St., Newtonville, Mass., 02160. The judges will be Daniel McCracken and Edmund C. Berkeley, Editor of C&A; their judgment will be conclusive. It is expected that the winning essay(s) will be published in the August issue of c&A. n. The essay should be written in such a way as to be convincing to a senator or representative in Congress. The length of the essay may be less than 500 words. The essay should meet ordinary requirements for being publishable. All entries will become the property of Computers and Automation. Two copies of the essay should be submitted. The author's name and address and three or four sentences of biographical information about him should accompany the essay. In case of ties, the prize will be divided. The prize will not be awarded if in the opinion of the judges no sufficiently good essay is received. . Let me close on a positive note, with a constructive suggestion: I urge the ABM computer system designers to provide a thorough system trace, writing the inputs and the system's responses on to tape units deep underground, so the units could survive a nuclear holocaust. Then if the Safeguard system is ever used, the designers of the ABM system for the next civilization -- if any -- will have the benefit of one debugging run. The group -"Computer Professionals Against the ABM" includes (organizations are listed for identification only): Executive Committee Daniel D. McCracken, Chairman, Consultant Paul Armer, Stanford University Prof. Joseph Weizenbaum, Mass. Inst. of Technology Gregory P. Williams, Phoenix, Ariz. Sponsors (incomplete list) John W. Backus, International Business Machines, Corp. Prof. Richard Bellman, Univ. of Southern California R. W. Bemer, Phoenix, Ariz. Howard Bromberg, Information Management, Inc. Prof. Fernando J. Corbato, Mass. Inst.of Technology Phillip H. Dorn, Union Carbide Corp. Prof. William S. Dorn, University of Denver Prof. Robert M. Fano, Mass. Inst. of Technology Prof. Edward A. Feigenbaum, Stanford University Robert B. Forest, Datamation Prof. George E. Forsythe, Stanford University Prof. Walter Hoffman, Wayne State University Prof. Alston S. Householder, Univ. of Tennessee Prof. Harry D. Huskey, Univ. of Calif., Santa Cruz Prof. Donald E. Knuth, Stanford University Prof. J. C. R. Licklider, Mass. Inst. of Technology Prof. John McCarthy, Stanford University Prof. Marvin L. Minsky, Mass. Inst. of Technology Prof. Allen Newell, Carnegie Mellon University Max Palevsky, Scientific Data Systems Prof. Anthony Ralston, State Univ. of N.Y., Buffalo Prof. Norman R. Scott, University of Michigan Eric A. Weiss, Springfield, Penn. 34 Inst. of Electrical and Electronics Engineers, Inc. 345 East 47 Street New York, NY 10017 The Board of Directors of the Institute of Electrical and Electronics Engineers. has authorized the reduction~ by 50%, of all dues and fees for those members of the Institute currently unemployed. This step was taken in recognition of the economic conditions currently prevailing. IEEE members, who are currently unemployed through involuntary termination and are actively seeking re-employment, may continue their IEEE membership through December 1971, with all privileges, publications and services covered by membership dues (and by Group or Society fees, and subscription fees, if any) by payment of one-half of the established dues and fees. To take ~dvantage of this arrangement, please inquire of IEEE Headquarters regarding details. SOCIAL DATA PROCESSING CENTERS IN THE FORM OF TELETERMINAL TIME Joseph Auciel/o, Director Computer Job Bank 10 Upland Road Plympton, MA 02367 Perhaps I can make a suggestion that will eliminate some of the misunderstanding between certain student groups and the data processing industry. I suggest tnat "social data processing centers" be set up to make computer power available to individuals or groups who are working on problems whose solutions will benefit our society as a whole. The data centers would be manned on a volunteer basis by computer professionals. The computer time would be given thru telecommunication links by computer users; they would be free to give as much or as little CPU time as they choose to the social data center. This proposal would allow some computer manufacturers and users a way of expressing (to varying degrees) their social concern. By computer use for people and society and their problems~ the computer perhaps will cease to be known by some as a mechanical monster responsible for our social ills, but rather will be viewed more properly as an extension of man's mind and intelligence. 1 COMPUTERS, SCIENCE, AND ASSASSINATIONS Computers and Automation believes that the possibility of conspiracies in the assassinations of important American leaders in our times is of the utmost interest and significance to every American -- and especially to computer people, because computers can be used: to handle large amounts of information easily; to correlate the information rapidly and accurately; to prove-or disprove certain theories or possibilities of conspiracy; etc. Therefore, computer people can make a unique and important contribution to society in this area. Accordingly, Computers and Automation is publishing from time to time articles and reports on: _ investigations into assassinations; the major evidence; and the application of computers to the evidence. Our purpose is to present important, useful, and authoritative information objectively in order to find out the truth. COMPUTERS and AUTOMATION for March, 1971 t , liThe Assassination of President John 'F. Kennedy: ANOTHER VIEW 'The Application of Computers to t,he Photographic Evidence Benjamin L. Schwartz, Ph. D; McLean, Va. ll Comment Outline Note by Edmund C. Berkeley, Editor: In the May 1970 issue, "Computers and Automation" published a 32-page article by Richard E.; Sprague, computer professional, with the foregoing title. This article contained: (1) eleven photographs related to the assassination; (2) a two-page chart of Dealey Plaza, Dallas, Texas, where President Kennedy was shot, showing (a) geographical details, (b) the location (or probabl~ location) of many events in regard to the assassination, and (c) the locations of many of the 75 photographers; (3) a tabulation made over many years by Sprague of some 510 photographs that were taken, and some details about each one; (4) a bibliography of 22 references; and (5) about ten pages of text. This article reported a number of aspects of a study of this assassination made by Sprague from 1963 to 1970. Part 3 of the article discussed how computers could be applied to the photographic evidence, consisting of over 25,000 frames plus 350 still pictures, a task seemingly beyond the capacity of any human being unaided by a computer. See the notice and advertisement about this article on page .44. The following article by Dr. Benjamin L. Schwartz, a mathematician and an operations research specialist, has been received, commenting on Sprague's article. We are glad to publish Schwartz's article since it is a thoughtful, important, and significant polemical attack on Sprague's article, and also on "Computers and Automation" for publishing Sprague's article. Mr. Sprague has said that he does not wish to reply to Schwartz's article. But I do wish to, and following Schwartz's article, I have put a response. For readers who enjoy a donnybrook, the two articles are recommended. I should like to add that in the course of an interesting (and friendly) conversation with Dr. Schwartz, he said his basic position in regard to an argument about a theorem is not whether the theorem is or is not true, but whether the theorem is proved by the evidence offered. In other words, a mathematical paper is acceptable and publishable when the author demonstrates what he says he is setting out to demonstrate, and otherwise it is not acceptable and not publishable. COMPUTERS and AUTOMATION for March, 1971 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Introduction Statement of Position I Statement of Position II Commentary I Commentary II Inconsistency I Inconsi stency II Computer Relevancy Editorial License Retreat I An Impossibility Retreat II -- An Invisibility Insanity -- Retreat III An Inaccuracy An Implausibility A Contradiction Another Contradiction An Irrelevancy On Scientific Attitudes Conclusion Introduction In the May 1970 issue of Computers and Automation, Richard Sprague published a remarkable article enti tIed: "The Assa:ssination of President John F. Kennedy: The Application of Computers to the Photographic Evidence". That article claimed to show a number of spectacular things about the assassination. Among them were that the assassination stemmed from a conspiracy; that more than 50 persons were involved in the conspiracy; that among these people were members of the Dallas police force, the CIA, anti-Castro Cuban exiles, and others; that Lee Harvey Oswald was involved in the conspiracy, but did not do any shooting; and that knowledge of all the preceding items has systematically been denied to the American people by a (second) conspiracy of silence and/or distortions engaged in by the news media and certain public figures. Unfortunately, Mr. Sprague failed to prove his case, in my opinion and apparently that of many other readers. In subsequent issues, he has withdrawn many of the claims that he has provided conclusive proof. He still holds to his contention that his version of the assassination is true, but he has admitted implicitly that many of his arguments, as presented last May, were faulty. The present article brings together a number of objections to the May article, including some that Mr. Sprague has acceded to, and some other, new ones. The reader should read (or reread) the original article in considering the material below. You may feel that I am being unfair to Mr. Sprague when I attack an argument of his which he has subsequently already abandoned. However, I feel it is appropriate to include both the original claim and 35 the objections that forced him to withdraw it. The reason is this: Mr. Sprague's own credibilityis part of the issue. In the article, he included many assertions of additional facts about the assassination for which he gave the reader no evidence. For example, he says (p. 50-51) "A .. . conclusion ... drawn: from photographic evidence .. . (is that) ... Oswald did not shoot Officer Tippit; ... two other men did." But Mr. Sprague does not show us the photographic evidence that supports this claim. We have to take his word for its existence. 'Hence, it is very much to the point to know how good he is at drawing sound conclusions from evidence. When he is shown to be vulnerable on other points, it must reflect in the credence we give to such of his claims as the foregoing. Statement of Position I with my article; read additionally as you feel necessary; and then take sides. Before going on, I would note one point On which Mr. Sprague and I agree: the Warren Commission report is seriously defective. But I will show you that Mr. Sprague and the National Commission to Investigate Assassinations (NCTIA) are even further away from meeting any objective scientific criteria for accuracy, in either reporting or deductive reasoning. Mr. Sprague claims to show positively thot "There was a conspiracy"; " ... at least three gunmen .. . fired ... at President Kennedy"; ... "Oswald ... did no shooting." (p. 30) He furthermore claims that he will show thi s "to be true on the ba si s of substantial conclusive evidence", because" ... there is conclusive evidence". You, the reader, are certainly entitled to know where each of us stands. For my own part, I certainly do not claim to be an expert on the events of Dallas 1963. I am an interested layman, like yourself, willing to consider new points of view as they appear in the public media, but certainly not so involved as to have made any original investigations. It does not suffice, for Mr. Sprague to demolish the Warren Commission: and indeed that had already been done before him. Rather he must build his Own case with "undeniable evidence" (p. 30) to survive the same exacting scrutiny that was given the Warren Commission report. On the basis of the evidence I have seen and the arguments I have heard, my current belief about Dallas 63 is the following: Oswald was the lone assassin who shot and killed John Kennedy; there was no conspiracy; there are many unexplained details, but all alternate explanations I have heard are so far-fetched as to strain credibility beyond reason and leave even more loose ends. Mr.' Sprague's basic position is certainly a hard one to attack. If evidence for the first conspiracy is fragmentary, uncoordinated and unsubstantial, that merely "proves" how effective the second conspiracy has been. If you find any of the "strange" events of the second conspiracy to be not so strange in your eyes, -- well, Mr. Sprague has already admitted that each separate event has a reasonable explanation. These opinions are not strongly held, and all are subject to change if new evidence comes to my attention. But with the increased passage of time, I think it less likely tha~ there will be change. This expectation is reinforced by seeing Mr. Sprague's miscellaneous collection of loosely COnnected tidbits offered under the claim of "incontestable proof". Statement of Position II If I read him correctly, Mr. Sprague has for his main thesis the following: John F. Kennedy was shot to death in Dallas by several members of a large conspiracy, which Mr. Sprague calls the first conspiracy. There was also a second conspiracy, which came into being spontaneously, after the killing. The members of the second conspiracy were public figures and officials. The objective of the second conspiracy was to suppress and conceal evidence of the first. The evidence for the first conspiracy was in large part successfully destroyed, distorted, or hidden from the public by the second conspiracy. The evidence for the second conspiracy is a number of what Mr. Sprague calls "strange events". Each of them separately, he admits, has a reasonable explanation. The combination of all of them, however, is too unlikely, in his view, to be accidental. Commentary I For reasons explained in more detail in the final section, the writer thinks that it is important for each reader to consider carefully the conflicting positions. Read Sprague's article: read here36 Commentary II However, it seems to me that the relative invulnerability of Mr. Sprague's position is less a proof of its validity than a tribute to his debating style~ He is ingeniously turning any apparent damaging circumstance into an actual asset. Inconsistency I This ability to work both sides of the street is manifest many times in the article. For example, consider the question of people departing from the murder scene. On page 36, he describes how several men have been photographed shortly after the killing, running away. At least one of them leaves in a conveniently parked, nearby car. This hasty departure is taken as evidence of guilt. But a little later on (p. 50), he considers a hypothetical conspiracy member called the umbrella man. Does he make a fast getaway? Indeed notl Mr. Sprague~escribes the many pictures taken later on in the day that still show the umbrella man hanging around aimlessly. This delay Sprague seems to find also suspicious. If both early and later departures can be interpreted as signs of guilt, I wonder what the innocents didl (We shall return later for more about the umbrella man.) I nconsistency II Another example of Mro Sprague's unusual logic is seen in his attitude toward the Warren Commission and its members o He has bitter words (po 34) for the unwillingness of Justice Warren and others to COMPUTERS and AUTOMATION for March, 1971 give ear to and respond to the many criticisms of their report. Their silence is construed as evidence confirming the NCTIA theory.l But when one of the Commission (Sen. Richard Russell v p. 59) does speak out along the lines Mr. Sprague seems to desire 9 that too is taken as being in full accord with Sprague's theories o Both the open mind and the closed one work in his favor. He had devised chains of argument under which any evidence 9 or no evidence at al1 9 can be construed to help his case. these has anything to do with the computer business. But his other reason does. The article, he claims "focuses on 0000 computer-assisted analysis of 000. data 0.0. to solve a crime"o But as I have noted v that certainly is not the "focus" of the article: and the degree of justification obtainable from this one. rather contrived, argument would not, I am sure, win admission for any other subject as remote from the main stream of interest of readers of C&A. Computer Relevancy Retreat I I confess to having originally plunged into the article eagerly in hope of finding both new insight into the John Kennedy assassination and new information about computer applications o Both hopes were futile. I claim that the material is not computerrelated 9 and should not have appeared in C&Ao Mr. Sprague has now admitted the correctness of this objection. In the July 1970 issue of C&A he saysv "The conclusions stated in the article were arrived at by the author before the computer appli~ cations to photographic evidence were begun". Some quantitative facts tell the story. The article occupies 32 pages of the issue. Of this 9 about one third is narrative text: another third is tables 9 notes 9 and similar material: and the remainder comprises photographs and drawings. Of these 32 pages 9 less than three (1-1/2 text; 1-1/3 tables) are given to computer applications. In this brief section v the material consists of vague generalities about how computers might be used. There is no description of any actual use of computers. Neither is the material sufficiently specific to permit an analyst to reduce the suggestions to practice. In correspondence with me 9 Mr. Berkeley also has admitted to me that the computer relevance of the article is marginal. But Mr. Berkeley has also pointed out that C&A does publish non-computer related material v e.g., Kingman Brewster's article in the February 1970 issue. However, according to the announced editorial policy concerning such articles, they are to appear in a special department ("The House is on Fire") specifically created to carry such papers. Mr. Sprague's article was not published in that department o It tried to "make it" on computer relevance, and failed. In short 9 the conclusion this writer reaches is that the computer part of the article title v and the computer related addendum (Section 3) of the article were afterthoughts v appended to give a tenuous justification for this particular journal to publish the article. Editorial License Granting that this is simply this writer 9 s inference. there is some additional evidence to support it. I suspect that the editor 9 Mro Berkeleyv believes Mro Sprague's thesis of a conspiracy and desires to publicize ito I also suspect he is aware of the defects in Mro Sprague's presentation. Mro BerkeleY9 in his editorial (po 6). refers to the article as "one of the most important 0000 we have ever published". Among the reasons he cites for his decision to publish are the "opportunity to help important truths become known"o Yet even while believing that Mr. Sprague has an "important truth." Mro Berkeley admits "It is possible that 0000 Sprague's article does not prove 000 nor adequately support 0000" the assertions. .. 0. Among Mro Berkeley's other stated reasons for publishing are a social conscience: the use of glossy paper in C&A (permitting high quality reproduction of the photographic evidence for the readers to examine): and his relative freedom from advertiser pressure as a paid circulation magazine o None of IMy own conjecture is that Justice Warren had foisted off on him a difficult and unpleasant job for which he was not qualified by training or temperament. After doing his best in the year of the Commission's existence. he had no stomach for further acrimony over a distasteful topic o Of course. my making such a suggestion automatically makes me suspect as a member of the second conspiracyo Indeed v I have been asked bluntly about my connections with the CIAI Needless to sayv there are none. COMPUTERS and AUTOMATION for March, 1971 An Impossibility On page 32, Mro Sprague describes an "interesting event" concerning the discovery of Jim Hicks by New Orleans District Attorney Jim Garrison. "(Hicks) showed up voluntarily in Garrison's office o Garrison and 0000 Jones Harris suddenly realized that they had seen his picture before 0000 the photograph Harris had seen is a picture of Hicks (See Figure II)". (po 32)0 Figure 11, on page 33 is a somewhat blurred 7 x 9 enlargement. It shows several men SEEN FROM THE REAR. The one identified in the caption as Hicks has visible no part of his face whatever. It is simply impossible that anyone could "suddenly recognize" the subject of that picture. 0 ••• Mro Sprague has subsequently explained that the identification by Jones Harris was based upon the build v hair style. and clothing of the subjecto Since these are the only visible features of the man in Figure 11. there seems to be nothing new in these comments. If a reader previously doubted that a person could be identified from a rear view9 he will still doubt ito (Another input supplied by Harris is that Mrs. Hicks supposedly confirmed the identification v afte~ the facto Obviously, this has no bearing on Harris's original ·sudden realization'.) In fact v as far as I can see, Mro Sprague has added nothing except that he has nothing to add o Neither do I. I am quite willing to have the reader examine Figure 11 and decide whether he believes that a person like Jones Harris. who did not know the subject, could identify him from the picture. Retreat II - An Invisibility In the original article 9 Sprague claimed that the picture showed that Hicks was carrying radio equipment in his hip pocket. and an antenna could be seen trailing behind him. This claim has now been withdrawn. It is acknowledged that no antenna can be seen. (C&A, July 1970, p.32) 37 However, Mr. Sprague still claims that the antenna is there, and he cites as proof that he has another print of the same photograph in which this object is visible. Mr. Sprague adds that he will show this to anyone who wishes to see it and comes to see him. It is clearly impossible for more than a few of among the thousands of subscribers to C&A (many from abroad) to make such a visit. For the vast majority of the reading audience, the argument has been changed. The original theme was: "Lookl Here it isl See for yours~ifl" It has now become, "I, Richard Sprague, have seen the evidence. Take my word for itl Believe in mel" There can be no doubt that Mr. Sprague is honest in his conviction. He has investigated, and he is deeply convinced of the truth of his claims. His sincerity is not at issue, and never has been. His credibility is. For that reason, I cannot accede to his plea that I should take his word for somethingi and I do not think that other members of the general readership should either. Mr. Sprague is well aware of the extent to which an argument is emasculated when the evidence in support of it, instead of being openly published for all to see, is limited to a small audience. This is one of his main complaints about the Second Conspiracy. He can hardly expect that we will exempt him from the same criticism when it applies to the other side of the case. Insanity - Retreat III Sprague adds that Hicks is now confined to a mental institution. Perhaps we are to believe that this is part of the national conspiracy to suppress the truth. For myself, I find it perfectly reasonable that Mr. Hicks may be deranged. Even casual readers of criminology literature are well aware that every sensational crime brings forth a large number of guilt-seeking mental cases to "confess". Mr. Hicks mayor may not be onei but if he is not, it is up to Mr. Sprague to show this. not be sure.) His mouth is hidden by the shoulder of the passenger in front of him. His expression is masked from us. If Mr. Sprague sees the face "contorted" he is using a vivid imagination, not a scientific detachment. This point has no apparent bearing on the assertion of conspiracy. I mention it because Mr. Sprague raised it in the first place. Perhaps he thinks it relates to his case. It certainly does have a significance in our evaluation of his competence in photointerpretation. An Implausibility On page 34, Mr. Sprague discusses the 6th floor window from which the shots were alleged to have come. He gives us two photographs that show this window, respectively" •••• exactly 5.7 seconds before •••• and exactly 3.5 seconds after" the shooting. I am impressed with the preclslon of the time measurement: 100 millisecond accuracy I But I must question how such precise determinais possible. Regarding a different photograph (Flgure 10) he explains carefully how precise time determination is accomplished. In the razor-sharp print of photographer Altgen's picture, the auto wheel position can be measured relative to the center stripe. A comparison with the Zapruder movies permits exact time matching. ti~n But for Figure 6 and 7, such an argument will not do. Figure 7 is sharp, but it shows only a building wall, with no distinguishing feature, no moving elements (except people), no way to relate to other pictures. In Figure 6, the street can be seen, but the print is so fuzzy that the vehicles cannot even be identified as to make, much less exact position on the road. So the precise time determination, if done at all, must be accomplished by some other mechanism. But without being told what it is, the reader is asked to accept that these "two pictures destroy the Warren Commission's findings". (p. 35.) I don't think Mr. Sprague has proved his case. A Contradiction On the question of Mr. Hicks' mental competence, Mr. Sprague has been eloquently silent, despite several reader inquiries. He gives his source of information on Hicks confinement as a newspaper story (despite his mistrust of the news media). He leaves us no reason to doubt that Mr. Hicks is actually a valid mental case. It leads one to wonder how good the case for conspiracy can be when one of the star witnesses is apparently psychotic o The exact question was addressed in the Clay Shaw trial in New Orleans, cited by Mr. Sprague (p. 31). The decision made by the jury there is well known: No conspiracy. Let us remain with those two pictures of the fatal window. Mr. Sprague correctly says "the first •••• shows the window with only a box appearing in it. The second •••• show~ the window with only the box in it." He is right. 2 But look again. THE BOX HAS MOVED! Although we may now know exactly when the pictures were taken, or even which came first, we are sure that somebody was at the window between those two exposures. If Mr. Sprague's times are accepted as correct, then in the IS-second period covering the shooting, someone was in the room, at the window. An Inaccu racy By far the clearest of the pictures in the article is Figure 10, understandably taken by a professional photographer, James Altgens. Mro Sprague rightly draws many conclusions from a careful examination of that picture. But one of them is certainly wrong. He says "Governor Connally had been hit .0 •• He can be seen with his face contorted." (p. 47). Well, hardlyl The person identified as Gov. Connally is turned away from the camerai and we can see only a 1/4 view of his face. His ear and cheek are clearly visible. The tip of his nose shows in profile. And a corner of the left eye. (I think the eye is open, but even with a magnifier, I can38 Yet Mr. Sprague has flatly asserted (p. 30): "At least three gunman •••. (none of whom were in the sixth floor easternmost window of the Texas School Depository Building) ...• fired •••• at President Kennedy." (My emphasis). And again (p. 35) "No one fired 2.!!Y shots from the window." (Emphasis in original). How Mr. Sprague converts certain evidence that somebody was present (the moved box) into the conclusion that no shot was fired is a step that evades me. 2Almost. A small corner of a second box shows also in Figure 7. But that might be because of a different angle of view. COMPUTERS and AUTOMATION for March, 1971 Another Contradiction Mr. Sprague considers a hypothetical "umbrell a man" (mentioned previously), (p. 50) who might have been the on-the-scene commander. The umbrella man is supposed to be seen in Figure 9 with his umbrella "open and low over his head". Figure 9 is too fuzzy to be sure of. But there is, in fact, in Figure 8, a corner of something that might well be an umbrella. But the man himself cannot be seen; he is hidden by the shoulder in the foreground. The statement that he is holding it "close over his head" comes from the same vivid imagination that created Gov. Connally's facial contortion. More important is the umbrella man's position, In the text (p. 50), Mr. Sprague places him "in front of the Stemmons Freeway sign", which is confirmed by the drawing on pages 48-49. Even the reason is given: "So that people on the western side can't readily see him and people in front of the sign are facing away from him." (p. 50), But he was not in front of the sign. If there was an umbrella it was behind the sign. In Figure 8, the left hand vertical standard of the sign can clearly be seen in front of the presumed umbrella. Or perhaps Mr. Sprague wishes us to believe that the umbrella ~ is in front of the sign, but the umbrella is behind. An Irrelevancy Mr. Sprague devotes four pages of pictures and half a page of text to "the 'Tramps f and the tPhoney I am at a loss to explain why. They prove nothing about the supposed conspiracy. All they show is that there are some loose ends in this case. But that was known and acknowledged long ago. Poli~emanf". Mr. Sprague appears to find it" signifiean't" (p. 36) that the tramps were questioned but no record exists of their being booked. He seems to feel this is unusual. It is not. Every day, all ove the country, people are detained for questioning, 3 sometimes in the station house, and then released without being booked. It is commonplace. It has happened to me. It will happen several hundred times on the day you read this. For Mr. Sprague to appear to find something suspicious in it indicates either a lack of candor or an incredible naivete about police procedures. On Scientific Attitudes Are Richard Sprague and the NCTIA prophets without honor, or are they cranks: It l! important to decide. Martin Gardner i in his witty and scholarly book on pseudo-science, Fads and Fallacies in the Name of Science (Dover, 1957) includes a chilling reminder that in the 1930's, a renaissance of German quasi-science paralleled the rise of Hitler. He asks pointedly "If the German people had been better trained to distinguish good from bad science, would they have swallowed so easily the insane racial theories of the Nazi anthropologists?" I share with Sprague, Berkeley, and Gardner the concern that the people should be informed. In his opening chapter, Gardner gives several clues that often help identify the quack or quack group. Here is that list. COMPUTERS and AUTOMATION for March, 1971 I. They work alone, without interacting with other organizations in the field (in this case, criminal investigation). 2. They claim this isolated status is involuntary and due to the prejudice of the establishment. 3. They continually remind readers of earlier historical suppression of truth. 4. They publish out$ide conventional channels. 5. They believe themselves to be geniuses, and those who oppose them, idiots. 6. Everyone is out of step but them; and they proclaim their dedication to truth, and their absolute assurance that they have found ito 7. They believe that any opposition is the result of a "dastardly plot", a conspiracy, if you will, of the establishment o 8. Their attacks are aimed at the highest persons and the best-established theories. 9. And finally. they often invent their own jargon. Gardner makes it clear that no one crank is expected to fit all these characteristics. Certainly Mr. Sprague does not. He does not claim genius status for himself, nor invent any private jargon. And his target, the Warren Commission report, is not sacrosanct. But he does appear to believe absolutely in the "truth" he has discovered; and that there is a vast conspiracy opposing him (points 6, 7). Not only does the NCTIA not work with the FBI and other criminal investigation organizations. it classes them with the conspiracy (points 1 and 2). Sprague believes that all the news media in the country except one newspaper gave a "very distorted" report of Clay Shaw's trial in New Orleans (po 30). All but the one were out of step (point 6). In addition, Mr. Sprague has not succeeded in getting a hearing in the normal channels and has aired his view in a journal whose mainstream interests are entirely foreign to his subject matter (point 4). He blames this lack of access to public eye on the conspiracy of the publishers. (point 2)~ rather than the quality of his manuscript. (On thls point, the reader must be his own judge.) He also inserts an entirely irrelevant comment (p. 30), reminding the readers that (over 60 years ago) the press was reluctant to believe and publicize the accomplishments of the Wright Brothers (point 3). The reader may find other matching characteristics. Conclusion Are those enough reasons to dismiss Mr. Sprague and the NCTIA as cranks (in the criminology field, at least)? I think SOi especially when they are combined with inaccurate photointerpreting. But each reader must decide for himself. And I believe Mr. Sprague will agree with me on this one final point, if on nothing else. Each of you shoulQ decide for yourself. 3In common, though slightly inaccurate parlance i this is called "arrest". 39 2. Proof of Proposition I Response Edmund C. Berkelev Editor, Computers and Automation Outl ine 1. Two Propositions 2. Proof of Proposition I: "Oswald was not the sole assassin and there was a conspiracy." 3. Evidence for Proposition II: Sprague's alternate hypothesis 4. The Dimensions of an Article in "Computers and Automation" 5, The Computer-Relatedness of Sprague's article 6, The Case of Jim Hicks 7. The Decision of the New Orleans Jury in the First Trial of Clay Shaw 8, The Chart of Times of Events 9. Some Other Specific Points 10. Clues for Identifying Quacks and Cranks II, Mental Resistance to New Ideas 12. Defects in the Warren Commission Report 1. Two Propositions There are two completely different propositions (or groups of propositions) put forward in the May 1970 article by Sprague (see page 30 of the May issue). One is a very narrow proposition, which I shall call here Proposition I: The conclusion of the Warren Commission [that Oswald was the sole assassin and that there was no conspiracyJ cannot be considered true by any person who carefully considers the crucial evidence -- such as the physics of the shooting. the timing of a number of events, and other important and undeniable facts. In other words. Oswald was not the sole assassin, and there was a conspiracy [page 30J. Only in regard to this Proposition I does the article assert: This article will develop that thesis. prove it to be true on the basis of substantial. conclusive evidence, and in particular some analysis of the photographic evidence [page 30J. The other proposition (or group of propositions) I shall call it here Proposition II -- relates to a number of topics: (1) the number of persons in the first conspiracy ("more than 50 persons were involved in the conspiracy at the time of the firing of the shots"); (2) the number of shots fired (Sprague maintains that 6 shots were fired. while another of the authorities, Josiah Thompson. a professor of philosophy at Haverford College, author of "Six Seconds in Dallas", maintains that four shots were fired); (3) the second conspiracy to cover up the first one; (4) arrests, with no record of persons arrested; etc. In the May article by Sprague, evidence is offered for Proposition II. But no assertion is made that Propo si tion II is demonstrated. Instead, in many places there are queries and questions about wh?t the details might be for the alternate hypotheSIS. 40 Proposition I is that: Oswald was not the sole assassin, and there was a conspiracy. The proof is extremely easy, because there are many undeniable pieces of evidence, anyone of which if firmly established is sufficient. (In the same way it is easy to prove the negative theorem that not all odd numbers are exactly divisible by 7, by exhibiting a single odd number (such as 11) which is not exactly divisible by 7.) Here is what seems to me the simplest proof that I am aware of: 1. It was physically impossible for one man, shooting during the time the target (President Kennedy) was in line of fire from the 6th floor easternmost window of the Texas School Book Depository Building, to have fired all the shots (at least four, and probably five or six) for which there is overwhelming physical evidence. 2. Therefore, since two or more men were firing in precisely the same interval of approximately 6 seconds. there was a conspiracy to assassinate Kennedy, and Oswald (it is entirely conceivable that he might have done some of the shooting) was however not the sole assassin. Of all the proof which I have seen or studied, the most spectacular and convincing to me is the explosion of President Kennedy's head, to the left and backwards at the time of the fatal shot, shown in the Zapruder film at frame 313 (see p. 35 of the May article by Sprague). I studied physics in preparatory school and again in college, and I know that when an object is hit hard from a given direc~ tion, that object has a tendency to move in the direction from which the hit comes, because of the law of momentum. It is impossible for any shot from the direction of the Texas School Book Depository Building to have driven the President's head backward and to the left as revealed by the sequence of frames Z312, Z313, Z314. The Warren Commission saw the Zapruder film, and looked at it at least several times. For them to have accepted the conclusion that Oswald was the sole assassin and that there was no conspiracy demonstrates (from my point of view) that they cheated. It also demonstrates a second conspiracy. For LIFE magazine to continue to refuse to show the original, clear Zapruder film year after year since 1963, to my mind, demonstrates the enormous, continuing power of the second conspiracy the slogan of which is "national security." , I watched a bootleg copy of the Zap ruder film on May 1, 1970; I watched it played over and over; run forwards, run backwards, and stopped, at various frames for study. The copy, though not very g'ood, showed plainly the explosion of Kennedy's head when struck by the fatal bullet. "Computers and Automation" can make arrangem~nts to show a bootleg copy of the Zapruder film to audiences almost ariywhere in the United States and Canada. If any reader is interested, he should write Computers and Automation, Dept. F, 815 Washington St o , Newtonville, Mass., 02160. COMPUTERS and AUTOMATION for March, 1971 3. Evidence for Proposition II: Sprague's Alternate Hypothesis A large number of statements in the May article are included in Proposition II. But Proposition II is in the nature of an alternative hypothesis, advanced by Sprague. It is evident that many of the details of any alternative hypothesis may and probably will differ from one investigator to another, as each one reflects on the evidence he is familiar with and as he attempts to reconstruct what he thinks probably happened. In regard to Proposition II, the May article does not assert proof; the article expresses simply the normal position of an author of any article: "Here is my view of the situation; and here are some of the reasons which support my view." And my function as editor is essentially to make sure that the author states his view of the situation in a clear and fairly reasonable way, and offers clear and fairly reasonably supporting evidence for his view. Among the supporting evidence are these facts: that Sprague has over six years studied the photographic evidence and other evidence; has read many of the references carefully; has put together from primary evidence a number of strands of secondary evidence; that he personally has made many trips to Dallas and elsewhere to see the scenes and to interview witnesses and photographers; that he has in his files copies of 200 of the photographs; that he has written descriptions of 200 more photographs which he did not secure copies of; that he has failed to see only some 100 of the photographs -- or 20%; that he attended many of the days of the New Orleans trial of Clay Shaw; etc. This background makes Sprague a well-qualified author to put forward Proposition II; but that proposition in the May article is not asserted as "true on the basis of substantial, conclusive evidence," as a careful reading of the article will plainly show. 4. The Dimensions of an Article in "Computers and Automation" One of the charges made by Dr. Schwartz relates to not giving evidence or supporting information for some of the statements included in Proposition II -for example, a statement that Oswald did not shoot Officer Tippet. The charge is that the statement was made, and not supported by any details. An article is not the same as a book or a treatise; it is much shorter. Inevitably, an article will not have room to contain for every controversial statement the data, analysis and reasoning which may constitute reasonable support of a statement. Furthermore, it is not necessary in an article to deal with all the background of each statement made. Four significant and important references are on page 35 of the May article, and a commentary is given for each of these. In addition a bibliography containing references to 18 more books is given on page 60. ci~ed 5. The Computer-Relatedness of Sprague's Article The charge is made that the material is not comCOMPUTERS and AUTOMATION for March, 1971 puter-related and should not have appeared in "Computers and Automation"; and that this non computerrelated article did not appear in the "House is on Fire" department of "Computers and Automation"o It is simply not true that the article is not computer-related. Part 3 of the article (see pages 56 to 58) discusses at length a number of ways in which computers should be and could be applied to the massive problems of information handling that are involved in dealing with over 25,000 pictorial frames recording various aspects of an important historical event. The title of the article was: The Assassination of President Kennedy: the Application of Computers to the Photographic Evidence With the benefit of hindsight, I now believe that it would have been better (in the sense that there would have been less misquotation of the article) if the title had actually been:. The Assassination of President Kennedy: the Prospective Application of Computers to the Photographic Evidence However, it is right, proper, and adequate to say "the application of" when one means "the prospective application of". For example, for many years articles on "the application of computers to the game of chess necessarily had to mean "the prospective application". For only in the last few years have computers had reasonably good computer programs for playing chess. As editor, if I had the same decision to make again, I would again have included this article in our magazine. I would have known now some of the minor corrections which have been been published in later issues of "Computers and Automation" -- of which the most unfortunate perhaps is in the spatial chart of Dealey Plaza; the numbers in the scale of the chart, namely 10, 20, 30, 40, should be replaced by 20, 40, 60, 80 respectively. It is certainly not necessary that a computer related article be published in the C&A department "The House is on Fire". 6. The Case of Jim Hicks In regard to Jim Hicks, several charges are made: "The S-shaped loop of the antenna is not visible in the picture as published in 'Computers and Automation' in May." (See page 33). This is true. The picture that went to the printer showed the antenna, faintly; the picture as printed in the magazine did not show it. This point is discussed in the July 1970 issue of "Computers and Automation" on page 32. The charge is made that "It was impossible for Jones Harris to recognize Jim Hicks from the back when Harris was in District Attorney Jim Garrison's office in New Orleans." This charge is ridiculous. The event actually happened o I have talked to Jones Harris in New York in recent weeks and he confirmed that this did happen. The charge is made: "If Mr. Hicks is now confined to a mental institution, it may well be that Hicks is a mental case o " This supposition is undeniable. However, from 1963 to early 1969 when he was in District Attorney Jim Garrison's office in New Orleans, Hicks was not so confined, and it is 41 quite plausible that during that time he was sane o It is even likely that he did what he said he did 9 establish a radio communications center in the Adelphi Hotel in Dallas so that radio communication among the firing teams could take placeo 7. The Decision of the New Orleans Jury in the First Trial of Clay Shaw In the first trial of Clay Shaw in New Orleans in February and March of 1969 the jury found Clay Shaw "not guilty" of participation in the conspiracy to assassinate President Kennedyo The May article (see page 31) says:. The record of the trial as published in The Times Picayune contains many indications that: 10 Clay Shaw did know and meet with Lee Harvey Oswald (dead)9 David Ferrie (dead)9 and Jack Ruby (dead)9 and exchange money with them o Twelve witnesses saw them together in twos and threes at various times and pI aces der film (roughly ten seconds after the last shot) up to the first of Murray's photos (about 3 minutes) is covered by several movies and TV sequences. The charge is made that "The precise method of time determination is not stated, and the reade~ is asked to accept 5.7 seconds before and 3.5 seconds after". Wel1 9 how detailed can you get in a magazine article of limited length? If one has over 25,000 frames and 350 still pictures, and persons and cars moving through a scene with 75 photographers; if one coordinates all that one can find out, with the positions of the tires of the Kennedy limousine in the motorcade, the Zapruder frames~ and the time scale figured out by the Warren Commission and the FBI; etc. etc. etc o -one should be able to go quite a way in establishing times. Actually, a detailed description of the method of computation of the 3.5 and 5.7 second times exists, and is available on request from Sprague. 0 20 There were at least three gunmen in Dealey Plaza firing at President Kennedy on November 229 1963~ from at least two directions v and therefore there was a conspiracy What Garrisoi failed to prove to the satisfaction of the jury was that Clay Shaw was involved in the conspiracyo The charge is made that "The decision made by the jury in New Orleans was no conspiracy." This is not the decision that was made by the jurY9 and the charge is false. The jury was not asked nor empowered to give any verdict on the question of a conspiracy to shoot President Kennedyo The jury simply decided, on the basis of evidence put before them~ that it was not proved that Clay Shaw participated in such a conspiracY9 whether or not such a conspiracy existed. 8. The Chart of Times of Events The May article contains on page 51 Chart 2, a schematic timing chart of photographs 9 movies, and events in Dealey Plaza around 12:30 pm on November 22, 1963. On page 57 appears the following text. The FBI and the Warren Commission staff made a careful analysis of the timing of the frame s in the Zapruder filmv and correlated these times with the positions of the presidential limousine and the other cars in the motorcade. (See Chart I). Consequently, there exists an accepted time scale at 1/18 second intervals which applies to the events in the photographs: the scale consists of eighteenths of a second (named with the frame numbers of the Zapruder film) during the crucial 6.8 seconds of the fatal interval. I was able to extend this _~eference technique by using four other movies stretched end to end to cover the period from the moment Kennedy rounded the corner of Houston and Main Sts. up to the beginning of the Zapruder film. A preliminary correlation of the times in the various movie sequences and still photographs is shown in Chart 2 [not "Table 1" -- the correction was published in the June issue of "Computers and Automation", page 22J for the period of Kennedyts travel through Dealey Plaza ••••• The period from the end of the Zapru42 I think the charge is an example of the fallacy of pettyfogging. 9. Some Other Specific Points The charge is made that "the second photo of the 6th floor easternmost window of the TSDB shows that 'THE BOX HAS MOVED'." Actually, the second photo is taken from a different angle and a different distance; the box has not moved, as may be shown by more photos besides. The charge is made that "the four and a half pages of pictures of the tramps and the phoney policemen prove nothing about the supposed conspiracy." Actually they do prove something significant: the presence at the scene of persons who have not been accounted for, and who therefore might have been involved in the conspiracy. In regard to the "phoney policeman", the May article says (page 39) "There is no record of this man being a member of the Dallas police force. He is the only Dallas policeman of those appearing in the hundreds of photographs taken Nov. 22 who is wearing an earpiece or radio communication device in his right ear (see Figure 2). Why?" I consider it remarkable that the one man in a Dallas police uniform who cannot be identified as a Dallas policeman is the one who is equipped with a device which could be a communicating device. (How many policemen on active duty as police have to wear hearing aids?) The charge is made that it not unreasonable to detain persons, question them, and then release them without making any record whatever -- even on an occasion when the President of the United States has been assassinated. Well, that is not the way it seems to me. It seems to me remarkably careless not to make a record of the names and other information of such persons on such an occasion -- so careless that there might well have been some intention not to. The charge is made that "the umbrella man is hypothetical". This is perhaps a friendly word for "imaginary," or "fictitious," or "nonexistent". Actually, there are at least half a dozen picCOMPUTERS and AUTOMATION for March, 1971 • tures showing the umbrella man (see the account on page 50 of the May article). And there is a good picture of all of him (with his umbrella folded) on page 228 of "Six Seconds in Dallas" by Josiah Thompson. 10. Clues for Identifying Quacks and Cranks Nine clues listed by Martin Gardner in his book "Fads and Fallacies in the Name of Science" are present~d by Schwartz. The charge is made that Sprague and his article, (and the act of "Computers and Automation" in publishing it) are to be classified as the behavior of quacks and cranks, by reason of satisfying (assertedly) 7 of the 9 clues. This is an argument from a generalization (not a universal statement) and is. not logically sound for every case. Over and over again a generalization, however suggestive it may be, fails because it does not conform with all the cases. Not one word by Dr. Schwartz admits even that the subject is important and worth investigating -whereas any scientist must always admit that an important subject in which evidence is offered for judgment is worth investigation. Sprague's article is like an iceberg with a little tip above water. Not once does Dr. Schwartz say "I'd like to look at more of your evidence." Actually, McLean, Va., where Dr. Schwartz lives, is within a few miles of the openly accessible, large central collection of the evidence in the case, at the headquarters of the National Committee to investigate Assassinations, 927 15 St., N.W., Washington, D.C. 20005. 12. Defects in the Warren Commission Report Dr. Schwartz says "I agree that the Warren Commission Report is seriously defective". But Dr. Schwartz does not say how in detail. For example, one of the strongest possible generalizations (on the basis of our experience with all the days that men have lived) is that "the sun will rise tomorrow". Yet in the far distant future (some ten billion years from now) it is predicted by astronomers and physicists that the sun will explode, having exhausted its supply of hydrogen for its nuclear furnace, and when that happens the entire earth will be vaporized in the solar nuclear explosion. Then there will no longer be a solid earth to turn on its axis, and therefore there will be no more tomorrows. Actually, the Warren Commission Report is so defective that it is flatly and fatally wrong: 11. Mental Resistance to New Ideas The clear and obvious reason is that they did not want to get to the bottom. And the clear and obvious reason for that lack of desire is that there were indications that the Central Intelligence Agency was involved in Kennedy's assassination and probably the FBI was also involved -- and so "national security" was at stake. Furthermore, the Commissioners did not know what the people of the country would do if they were officially and soon told "the Central Intelligence Agency had a hand in killing President Kennedy" and "The FBI knew about the plot ahead of time and issued no warnings". And so the Commissioners drew back from that chasm that yawned in front of them. Facts are stubborn things. Once a person accepts the demonstrated fact that "Oswald was not the sole assassin; there was more than one person firing; and therefore there was a conspiracyv" a foundation stone is loosened, and the theory that the Warren Commission sought to establish comes tumbling down, like a collapsing building. A great deal of human progress occurs because of stubborn facts; and often in human history persecution and death has been the reward for those who insisted on them. To balance the quotation from Martin Gardner, I would like to quote from "The Art of Scientific Investigation" by W. 1. B. Beveridge published by Mercury Books, London, 1950: The mental resistance to new ideas is partly due to the fact that they have to displace established ideas. New facts are not usually accepted unless they can be correlated with the existing body of knowledge; it is often not sufficient that they can be demonstrated on independent evidence. Therefore premature discoveries are usually neglected and lost. An unreasoning, instinctive mental resistance to novelty is the real basis of excessive scepticism and conservatism. In my opinion, Dr. Schwartz displays (1) excessive skepticism, (2) extraordinary resistance to new knowledge, (3) a profound ignorance, and (4) an extraordinary cockiness since he is aware of his ignorance. Not one word in his polemical attack on the May article by Sprague acknowledges the obviously extensive research and investigation and the accumulation of evidence which Sprague (and various other authors and researchers) have amassed. COMPUTERS and AUTOMATION for March, 1971 - Oswald was not the sole assassin; - there was more than one gunman firing; - there was a conspiracy. Furthermore, the Commissioners had the money, the resources, and the subpoena power to get to the bottom of the plot. They clearly did not choose to get to the bottom (at least a majority did not so choose). I do not blame the Commissioners for not wanting to get to the bottom of the plot -- they may well have saved their own lives that way. However, their report was a betrayal of the people of the United States. I have not tried in this response to deal with every single one of the points raised by Dr. Schwartz in his thorough and well-organized,{but most one-sided attack) on the article: "The Assassination of President Kennedy: The Application of Computers to the Photographic Evidence" by Richard E. Sprague publIshed in our May, 1970 issue. (Footnote: I believe I could deal with all of his points!) However, I do agree with Dr. Schwartz: The best procedure is to recommend to each reader who is interested that he read Sprague's article and consider it for himself. If you are interested and cannot find an easily accessible copy of the May, 1970, issue, please order it from us (see the notice on page 44). Then read the article, return the issue to us in 7 days in salable condition, and you will owe us nothing. In this way, you can judge for yourself. 43 THE MA Y ARTICLE THE ASSASSINATION OF PRES IDENT JOHN F. KENNEDY: THE APPLICATION OF COMPUTERS TO THE PHOTOGRAPHIC EVIDENCE Computers and Automation, published in its May issue a 32-page feature article, "The Assassination of President Kennedy: the Application of Computers to the Photographic Evidence"o In this article, Richard E. Sprague, President, Personal Data Services, Hartsdale, N.Y., states that analysis of the evidence proves: • that the Warren Commission conclusions (that Lee Harvey Oswald was the sole assassin, and that there was no conspiracy) are false; • that there were at least four gunmen firing from four locations, none of whom was Oswald; that the conspiracy to kill Kennedy involved over 50 persons (of whom several are identified in the article) including members of the Dallas police, and elements of the Central Intelligence Agency of the United States; etc. The evidence published in this article includes eleven important photographs. One of them shows Jim Hicks, who admitted he was the radio communicator among the firing teams at Dealey Plaza, with his radio transmitter in his back left pocket. The article includes a tabulation of over 500 photographs (counting a movie sequence as one photo) taken in and around Dealey Plaza, Dallas, Texas, Nov. 22, 1963, at the time of President Kennedy's assassination and shortly thereafter. Both a spatial chart and a timing chart of the events and the photographs are included in this article. Sprague, a computer professional for over 24 years, has as an avocation, studied the old and the new evidence for over 6 years, and has analyzed over 400 of the 500 photographs. The work in computerized analysis of over 300 still photos and over 25,000 frames of movie sequences has been started. To obtain your copy of this extraordinary report, please complete and mail the following order: - -(may be copied on any piece of paper)To: Computers and Automation, Dept. P 815 Washington St. Newtonville, Mass. 02160 Please send me ( ) copy(ies) of the May 1970 issue containing the article on President Kennedy's assassination. I enclose $4.00 ( ,) check ( ) money order for each copy. (Please do not send cash.) If not satisfactory, returnable in 7 days for full refund (if in salable condition), My name and address are attached. Discount: 10%, 5 to 9 copies; 20%, 10 or more copies Special price: $1.00 for students (attach evidence); $1.00 for non-profit organizations 44 An excerpt from the Nay article Part 2. The Photographic Evidence The assassination of President John F. Kennedy was the most photographed murder in history. Approximately 75 photographers took a total of approximately 510 photographs, either before or du~ing or within an hour after the events in Dealey Plaza, and either there or nearby or related to those events. The word "photograph" in this context includes both still photos and movie sequences. The number of frames in a movie sequence ranges from about 10 to about 500; and in the count of 510 photographs given above, the 10 to 500 frames of a single movie sequence are counted just as one photograph. The total number of frames is over 25,000. The Warren Commission examined 26 photographs, about 5 percent of the 510. The FBI examined about 50 photographs, or about 10 percent. The most famous of all the photographs is the Zapruder film, which had over 480 frames. Many of the photographs were taken by professional photographers. About 30 of the photographers were professionals who worked for newspapers, television networks, and photographic agencies. The Warren Commission did not interview a single one of the professional photographers, nor did the Warren Commission see any of their photographs. Fifteen of these professionals were actually in the Kennedy motorcade, no further than 6 car lengths behind the Kennedy car. Five of these photographers were television network cameramen. The Warren Commission looked at none of their photographs. Two of the photographers were from the White House. One of these men (Thomas Atkins) was the regular photographer for the White House. He made a special film for Lyndon B. Johnson. Atkins used his own film plus some footage obtained from the television photographers. Johnson looked at the film and then put it away. This film is now stored with the Kennedy Memorial Library materials in a warehouse in Washington, D.C.; it is stated to be "unavailable" to researchers. The Commission did not see this film, nor did they interview Atkins. Because the professionals used movie cameras of professional quality, their films are exceedingly revealing and valuable as primary evidence. The Warren Commission looked at none of these films. Chart 2 of this article shows the times of about 50 of the photographs taken in Dealey Plaza during Kennedy's passage through it. Table 3 of this article lists over 510 photographs so far identified and known to exist or to have existed -- with possibly a few borderline cases. COMPUTERS and AUTOMATION for March, 1971 District Attorney Jim Garrison on The Assassination of President Kennedy: A Review of Heritage of Stone Neil Macdonald Assistant Editor Computers and Automation This book is important and interesting. The words used, the narrative thread, reveals an entirely sane but deeply angry man, and a remarkably courageous one, who is appalled at the assassination of political leaders in the United States. Whether or not you believe that District Attorney Jim Garrison of New Orleans, La., is a publicity seeking charl?tan and fool as the Establishment press has portrayed him, or an honest and brave investigator as the press has NOT portrayed him, this book is very significant, well and clearly written, and filled with facts, But there is no substitute for reading the book for yourself which this reviewer highly recommends. Interestingly enough, there is no mention in the book per se of the defendant Clay Shaw nor mention of his trial by Garrison in New Orleans in February and March, 1969 -- except that three footnotes do mention ,Clay Shaw. Presumably this is because the second trial of Clay Shaw (for perjury in denying that he knew certain persons) which began in January 1971 would be prejudiced by the inclusion of such material in Garrison's book. The book mainly discusses persons such as David Ferrie (dead) who knew Lee Harvey Oswald, and other persons who knew Oswald, while he lived in New Orleans. Beginning of Garrison's Interest On one occasion, in the autumn of 1966 Garrison was in New York talking to Senator Russell Long of Louisiana, and the talk turned to the assassination of Presiden_~ Kennedy. Garri son reports he was astonished to;hearLong say that he felt there was a question about the Warren Commission's inquiry. Up to then Garrison had assumed that the question had been "fully and honestly" looked into by the Warren Commission. After Long's remark, when Garrison went back to New Orleans, he began to read the 26 volumes of the Warren'Commission'sHearings and Evidence, and also the Commission's conclusions. It became clear to Garrison that the official conclusion that Kennedy had been killed by a single man with a rifle shooting at him from behind was totally impossible. It even began to seem to Garrison that Lee Oswald quite possibly had not fired any shots, and had been a mere scapegoat. So what was the meaning of these 26 volumes of evidence? Why was the government lying to the people? Who had killed President Kennedy? and why? These questions took Garrison down a long road, and involved him in a great collision with what he called an "enormous domestic intelligence organization which would seek to discredit and destroy anyone who dared to challeng~ its authority." COMPUTERS and AUTOMATION for March, 1971 Heritage of Stolle / Jim Garrison / G. P. Putnam's Sons, 200 Madison Ave., New York, N.Y. 10016/ 1970, hardbound, 253 pp, $6.95 He inventories a long list of efforts and successes by many parts of the federal government, both official and unofficial, to impede, prevent, and discredit his investigation, deny him subpoenaed evidence, etc. Some Evidence that the Warren Commission Conclusions are False Referring to the end of the day of President Kennedy's assassination, November 22, 1963, Garrison writes: "The leaders of our government knew that President Kennedy was not killed by Lee Oswald." Garrison cites as evidence: - the testimony of the overwhelming majority of the witnesses at the scene; - what the doctors in Parkland Hospital in Dallas observed and reported; - what the color movie film taken by Abraham Zapruder showed. This evidence, says Garrison, makes it "perfectly clear" that the shot that killed Kennedy and'blew his brains out came from the front, and not from the rear where supposedly Oswald was firing from the 6th floor of the Texas School Book Depository Building. In another place Garrison points out that Dr. Pierre Finck (one of the doctors) testified that more lead was removed from Texas Governor John B. Connolly's wrist than was missing from the bullet that the Warren Commission asserted had gone through the President and the Governor. Garrison says that this testimony "virtually destroys the official conclusions of the Warren Commission". This is the same John B. Connolly, Jr., who has just been appointed by President Nixon to be Secretary of the Treasury of the United States a man who knows from personal experience and other information that the Warren Commission conclusions are false; a man who has never publicly stated "President Kennedy was assassinated by a conspiracy." Why Was Kennedy Assassinated? Garrison writes vigorously and well, even if not scientifically. He discusses the reasons why Kennedy was assassinated. He advances the statement: "A man who cares too much for the human race may find himself living in a hostile environment. His humanity may not be regarded as dangerous so long as his voice cannot be heard by too many people but if he is eloquent, or if he is in a position to affect the affairs of the nation, then his 45 humanity will be regarded by some men as a great threat". He comments that: "All superstates engaged in efforts to gain power must maintain extensive intelligence efforts at home. They must seek to maintain control of individuals and ideas lest their international war adventures lose the support of the populace at home •... The issue is power, immense power "After the United States ascended to the position of the most powerful military nation in history, in the midst of its accumulation of the most effective death machinery of all time, there occurred the accident of the election of a President who regarded the entire human race with compassion. By the time this happened, the cold war had become our major industry, and the Central Intelligence Agency had become the clandestine arm of our military-industrial complex, and, in the process, the most effective assassination machine in the world." Unfortunately, Garrison nowhere in his book raises the question of what the Central Intelligence Agency may be doing outside of the United States, nor the question of the vast (and wicked even if thoughtless) assent given by the American people and by the United States Congr-ess to the assignment of the CIA to commit assassinations and carry out other violent, corrupt, hidden, etc., interference with other nations and other governments outside of the United States all actions financed by an authorized budget of billions of dollars a year. The United States of course has no moral right whatever to engage in such practices in the rest of the world. Diligent vs. Careless Investigation Garrison comments: "When an assassination of a national leader is not supported by elements of the government, it is predictable that the government investigation will be effective and relentless. ... All information contributing to the discovery of the whole truth will be welcome .•. When the criminals are caught, the machinery of justice will be firm and uncompromising. " •.. However it is another matter when an assassination is supported by powerful forces within the government. The ••. protective guard of the President suddenly will have become curiously impotent, for its operation will be known intimately by the assassins. The assassination apparatus will be extraordinarily effective. Federal investigative agents ... will move like sleepwalkers. High officials reviewing the affair will diligently examine many irrelevant items" such as Lee Oswald's record of a smallpox vaccination in 1951 - "but will casually overlook the most pertinent evidence relevant to the assassination." The Cover Story Garrison says: "In a country with advanced technology for news distribution, the removal of a nation's leader will never be attempted unless those sponsoring the murder feel assured that they will have an effective degree of control over the dissemination of the news. Government control must be at a high enough level to guarantee the subsequent distribution of official news releases encouraging the belief, that however tragic the accident, it was essentially meaningless and all 46 is well •... Creation of a believable cover for an assassination is routine for an intelligence agency of a major government. The cover story which is initially distributed by the press release creates a degree of acceptance virtually impossible to dislodge. This is the case especially when the official fiction is supported by the prearranged activities of a decoy pointing in the direction of a false sponsor of the assassination. The actual events of the assassination become irrelevant. All that remains relevant is the cover story issued to the press and the power to control the investigation and conceal the evidence. Understanding of the Forces "We must begin to recognize history as it is happening to us", says Garrison. "We can no longer toy with illusions. Our war adventures in Asia are not related to national security in any rational sense .•.• " To understand the forces involved [in the murder of Jack Kennedy] and their motivation is to understand all of the once-mysterious assassinations of the 1960's, which in each instance achieved the elimination of a public figure who opposed our massive military expedition into Asia: If The Link of Assassination to War Garrison remarks that: "A new political instrument has been created. It provides for the permanent removal of men whose philosophies do not coincide with that of the dominant power structure of the United States. .•• Justice is not so blind that it pursues the most powerful forces in the country. Nor is the press so. committed to truth that it wants the burden of knowledge of what is happening. Sooner or later the relationship of assassination at home and war abroad must come to be understood. ..• I have written this book so that the truth about the murder of John Kennedy finally may be brought out for every American to see. • .• I have sought to show what has been done to our country by men who believe in solving problems by the use of force •••• I wrote [this book] in the hope that it might illuminate the peril which surrounds us. Welcome to the fight. Nature and Quality of the Book The contents consists of: acknowledgments; Foreword; One Friday in November; Part 1, Illusion, with five chapters, The Execution, Ornaments, Power, the Quarry, Justice; Part 2, Reality, with five chapters, The Craft of Deception, Traces of Intrigue, The Ides of November, Nightfall, The War Machine; 'an Appendix, John Kennedy and Nuclear Militarism; Notes; and Index. This is a scholarly book: over 300 notes are given in pages 233 to 244; and over 1500 entries appear in the index pages 245 to 253. Thus a great deal of evidence is carefully cited for many details. But it is not a scientific book, in the sense that substantial evidence is offered for hypotheses of great generality. Errata noticed by this reviewer: p. 95, line 6: replace "Xaxier" by Xavier"; p. 104, line 16: replace "Accessibility" by "Access". This book is worth reading, rereading, and studying, and the knowledge in it should be applied by every American. COMPUTERS and AUTOMATION for March, 1971 ACROSS THE EDITOR'S DESK APPLICATIONS SEARCH FOR UNDERGROUND OIL AIDED BY COMPUTER-STORED HISTORY OF OIL DRILLING ACTIVITY Hi stories of 700,000 oil well s drilled in the United States since the 1890s are stored on 2,600 reel s of magnetic tape in an unusual library at Petroleum Information, Inc., Denver, Colo. The firm is using an IBM computing system to keep track of almost every important well ever drilled in thi s country, as an aid to geologi sts faced with increasingly difficul t drilling decisions. Bill Goodin, executive vice president of the firm (which gathers and distributes information to the petroleum industry), said that 2.5 million oil well s have been drilled in the United States. Many wells have been drilled in each of the major petroleum basins. It is estimated that 60% of the area under thi s country has sedimentary deposits of rock and sand that could c~ntain oil. Geologists seeking oil can receive reports on an area's hi story to aid in determining where to drill. The oil well hi story file was started on an IBM System/360 Model 40 and now contains information on 700,000 well s. Each day new reports are added to the file (each year 32,000 newwells are drilled). The company soon will transfer the information to an IBM System/370 Model 155. Information for the file, as well as for the company's other reports and publications, is gathered through the cooperation of maj or petroleum producers, individual smaller operators, and state and federal governmental agencies. UNITED AIRLINES IS USING COMPUTER SYSTEM TO CURB STOLEN TICKET USE Uni ted Air Lines has installed a special purpose computer system, developed by TRW Data Systems, Torrance, Calif., to check for stolen and counterfeit airline tickets at Los Angeles International Airport. Capt. Frank Beeson of the Los Angeles Pol ice Department, described Los Angeles as the nation's bl ack market capitol for peddling stolen airline tickets. He said United Air Lines is the first major carrier to take a substanti al positive step COMPUTERS and AUTOMATION for March, 1971 in helping to combat the serious and increasing use of stolen airline tickets. The TRW system utilizes 23 keyboard terminals, 17 located at boarding gates and 6 at the ticket counters of United's two airport satellite buildings. As passengers check in, the ticket number is put into the computer through the touchtone terminal by United counter or check in personnel. An instantaneous reply from the computer with a green light indicates the ticket is valid; a red light indicates that the ticket may be stolen. Numbers of tickets stolen anywhere in the country can be entered into the system. It is estimated that there is more than $90 million outstanding in stolen airline tickets in the Los Angeles area. Los Angeles International Airport has the highest rate in the country in the use of stolen tickets. COMPUTER-AIDED TECHNIQUE TECHNIQUE FOR GROWING SINGLE-CRYSTAL SILICON INGOTS Computers have been harnessed wi th crystal growing furnaces to produce low dislocation - density single-crystal sil icon ingot s, such as the one shown at the left in the picture. Such ingots, 2~ inches and larger in diameter, are sliced and pol i shed to form the sil icon wafers which are then processed in a series of complex operations to produce monolithic logic and memory chips. These chips are then packaged, as shown, to form the circuitry for IBM computers. The technique utilizes an IBM 1800 Data Acqui si tion and Control System to monitor and control cri tical process parameters such as silicon melt termperature, crystal lift and rotation speeds, and crucible 1 ift and rotation speeds. The Teal-Little modification of the Czochralski process is used to produce the ingots. Computer-:aided techniques minimize thermal disturbances during the crystal grow- ing process, which can result from comparatively gross adjustments by human operators. Consequently, the computer enables a more consistent production of low dislocation-density single crystals. The technique was described by Kenneth E. Domey (of the IBM Components Division East Fishkill Facility, Hopewell Junction, New York) at the Semiconductor/IC Processing and Production Conference and Exhibi tion which was hel d 1 ast month in Anaheim, Calif., in a presentation titled "Computer Controlled Growth of Single-Crystal Ingots." MODERN MARINERS AIDED BY OCEAN-GOING MINICOMPUTERS AND ORBITING SATELLITES A small ocean-going computer is the heart of a satell ite navigation shipboard system which can pinpoint the position of a ship anywhere in the world, regardless of the weather, time of day or distance from land. The modern mariner no longer has to climb on the deck and shoot stars wi th hi s sextant to determine hi s posi tion; he can now reI ax in a heated cabin and watch a teletype automatically print out the latitude and longi tude to wi thin 150 feet of his actual position. The Transi t Navigation System (developed originally for Navy submarine use, but since made available to non-mili tary users) couples a Hewlett-Packard minicomputer wi th a speci al ized communication recei ver. The system automatically digests information transmitted from orbiting satellites and prints out a ship's longitude and latitude on a teletype. More than 60 shipboard navigation systems buil t and programmed by Magnavox are now in use; most are controlled by HP minicomputers. Because of their compactness, entire systems are frequently transferred between ships. About half the systems are aboard oceanographic research or support ships. The other half are'used by navigators of oil exploration ships, commercial transports, passenger ships, cable laying ships and Navy and Coast Guard ships. COMPUTER HELPS PRO FOOTBALL TEAMS MAKE DRAFT SELECTIONS A direct communications link to a 1 arge-scare computer helped 8 National Football League teams pick among the top college prospects during this year's draft on Janu- 47 ary 28-29. The computer, an 1108 located at Univac's Midwestern Computer Center, supplied immediate ratings on players to BLESTO VIII, an organization of the Chicago Bears, Detroit Lions, Philadelphia Eagles, Pittsburgh Steelers, Minnesota Vikings, Baltimore Colts, Miami Dolphins, and Buffalo Bills. (BLESTO VIII is a wholly owned subsidiary of the eight member teams.) The 8 teams were able to request and receive information on a UNIVAC DCT-500 Data Communication Terminal installed in the Philadelphia Eagles' office and linked to the UNIVAC 1108 in Oak Brook, Ill. Using the information, each team advi sed its representative at the draft in New York on which names to choose. (The computer contains files on 957 college players.) The ratings of the top draft pro spec t s were compil ed from numerous reports of scouts. These reports cover ten general traits, 12 position traits, and the individuaI's size, speed, school, and injury hi story. Members of BLESTO VIII pay a fixed fee to support. eight area scouts and five scout supe~visors throughout the U.S. This is believed the first time a direct link to a computer has supplied immediate data on progress of the draft to professional football teams. Other scouting organizations al so use computers extensively, but not for immediate information on the draft itself. FLORIDA FIRM USING COMPUTE R TO I DENTI FY NEW PRODUCTS, PROCESSES AVAILABLE FOR LICENSING A Florida-based firm is using an IBM System/360 Model 20 to collect and disseminate information on new ·products and processes that can be licensed to other companies. On January 4, 1971, Dr. Dvorkovitz & Associates began issuing continuous reports on the newest available offerings from around the world to U.S. and foreign fi rms in the pharmaceutical and chemical process industries, and for patented electronic and mechanical devices. Dvorkovi tz representatives scout all parts of the world for products and processes which may be of interest to firms in other countries. Dr. Vladimir Dvorkovitz, founder and president of the firm, sends clients in many countries computerproduced reports on such unusual items as the formula for a plastic that self-destructs in sunlight and a real butter that needs no refrigeration and can ,be produced in ei ther 1 iquid or sol id form. Several hundred items are reported every week. 48 "Our computer-based system, which was under development for more than two years, enables us to provide each client with a highly individualized report that will always be up to date", said Dr. Dvorkovitz. The computer automatically indexes each offering by its basic process or product line, and print-outs incl ude such information as a basic description of each item; worldwide patent status on a country-bycountry basi s i degree of commercialization; and identification of geographic areas where 1 icensing is possible. The name, address and responsible party as licensor are 1 i sted and direct contact may be made immediately. Every licensable offering is required to meet rigid quality standards before it is accepted for listing. There are over 1800 items currently housed in the computer's memory bank. EDUCATION NEWS COMPUTER TEACHES TEACHERS IN EARLY DETECTION OF HANDICAPPED CHILDREN Elementary school eacers are learning to recognize characteristics of handicapped children with the aid of a new computer-assisted instruction program recently developed by Penn State University, University Park, Pa. The program is funded by U.S. Office of Education's Bureau of Educational Personnel Development and Bureau for the Education of the Handicapped. An IBM 1500 system, including di spl ay terminal s, image proj ectors and synchronized audio equipment, is housed in a van which will travel throughout Pennsylvania for on-site presentations to teachers. Some 1000 teachers per year throughout the State of Pennsylvania are expected to receive instructions on the IBM system. Teachers, seated at computerdriven terminals, receive instructional materi al on spotting such tell tale signs of brain damage or other handicaps as garbled speech patterns and resistance to discipline procedures. The teacherstudent responds to graphically di spl ayed material by touching a 1 ight probe to the screen or by typing answers into the system over the unit's keyboard. Dr. Harold E. Mitzel, director of the Penn State proj ect, said that nearly one out of every six children in the primary grades suffers from some form of handicap that requires special recognition in an educational program. OSU STUDENTS LEARN WITH AID OF COMPUTER-CONTROLLED TAPE MACHINES A bank of magnetic tape machines controlled by a computer is helping Ohio State University students learn everything from basic French to advanced chemistry. The system, recently implemented as a supplement to classroom instruction, consists of approximately 440 student li stening devices or stations, linked to the central control unit from varied campus locations by telephone lines. Equipped with headsets and telephone dials, the learning stations are located in libraries, dormitories, schools within the uni veri sty and even some fraternities and sororities. Seated at one of the stations, the student di al s a three-digit figure representing the self-study or lecture which interests him. An IBM 1800 data acquisition and control system, located at OSU's Listening Center, accept s the student's call and connects him with the desired course. If the tape is currently being used by others, the student monitors' the recording to completion and the computer automatically recycles it for his benefit. This is done until all students on line to any particular course of instruction disconnect. The system is currently handling approximately 4,000 student call s a day. HIGH SCHOOL DATA PROCESSING NETWORK OFFERS SPECIALIZED COMPUTER TRAINING TO TEXAS STUDENTS Built around two RCA Spectra 70 computers in Houston's (Texas) Region IV Education Service Center, a new educational data processing network will support 200,000 Texas high school students by 1972 in 34 of the region's 56 districts. Using classroom teletypewrtier terminal s and the simplified computer 1 anguage known as BASIC, student s sol ve mathematic al probl ems associated with chemistr~ physics, physical science, computer science and general mathematics courses. These terminals operate in a timesharing mode with the Spectra 70/46 and Spectra 70/45. Student training in computer operation and program preparation, offered in vocation-technical and computer science courses, is handled through card reader-printer terminals, thus giving students access to the computer systems through the day. The network also will be used by teachers and school officials for classroom scheduli ng , grade and attendance COMPUTERS and AUTOMATION for March, 1971 reporting, test scoring, tax accounting and other administrative tasks. TWENTY-NINE SCHOOL DISTRICTS IN MINNESOTA JOIN IN 'COMPUTER CO-OP' A "computer co-op" is providing a quarter million students and teachers in 29 independent school districts in Minnesota with complete low -cost compu t~r services. Services range from demonstrations of a computer's problem-solving abili ty and classroom compu ter-aided instruction to unrestricted use of a time-sh~red computer plus the more usual administrative handling capabilities of payroll and scheduling, and computer analysis of data for research projects and experiments. The Minnesota School Districts Data Processing Joint Board, which operates as TIES (Total Information for Educational Systems) has a staff of approxima te ly 30 professionals who administer the educational programs and operate the million dollar computer center. TIES ~tilizes two computer systems. The first is a recently acquired Hewlett-Packard 2000A Time Shared Basic system with telephone links to 16 remote terminals. Seventy terminals will be used by the schools in the TIES project during the current school yeaL This system supplies demonstrations of a computer's abilities and computeraided instruc tional programs. A professional staff, many of whom are trained both in teaching and computer technology, instruct and assist the students from kindergarten through the twelfth grade. The other system, which primarily handles the administrative duties, is a Burroughs 3500 system wi th 34 data input and display terminals ins taIled in the districts. Ten high-speed line printers, for lis ting of long reports, are to be ins taIled at centrally located schools The study of the potential use of computers in elementary and secondary education began in the St. Paul-Minneapolis area as a voluntary proj ec t in 1963. The 19691970 school year marked the first year of services to member school districts in seven counties. The member districts contributed approximately $3.50 per student during the pas t two years to cover partial expenses of the program. This took up the s lack as a federal grant ran out in 1970. Costs for the coming school year (1970-1971) to cover complete operating expenses are expected to be around $5.00 per student. Previous to TIES, inCOMPUTERS and AUTOMATION for March, 1971 di vidual schools were purchas ing time from commercial systems at $10 to $12 per hour. Costs for the same service now are approximately $1.50/hour. WWhere once there was a demand for more time than schools could afford, they now use all the time they need and cos ts are included in the $5.00 per student yearly charge. RESEARCH FRONTIER LASER BEAM SENDS DIGITAL DATA OVER LENGTHY ATMOSPHERIC PATH Lockheed Palo Al to Research Laboratory (Calif.) has announced it is using a laser beam to send digi tal data at a high rate over a 1. 2-mile path across the nearby hi lIs. The new overland link consisting of a brilliant green beam shot from a laboratory peephole to a hillside receiver - has a transmission speed of 300 million data "bits" per second. Dr. Romayne F. Whitmer, head of the firm's Electro-Optical Systems Laboratory, said, "We believe this is the highest rate ever achieved over a long path through the atmosphere. Such a link could have large commercial and military uses." He said with advanced terminal equipment, the link could transmit the entire 23 volumes of Encyclopedia Britannica in five seconds. Dense fog, heavy snow and other extremely poor weather condi tions probably would hamper the new laser system just as they would hamper other optical links al though foul-weather tests have yet to be run, according to DL WhitmeL But he said the sys tern's proven superiority in normal weather is still a maj or step forward. The link alleviates the problem of atmospheric distortion because it uses a "frequency modulated microwave subcarrier" to impress the information on the laser beam. The result is an FM system which, like FM radio, is far less vulnerable to distrubances than other forms of transmission. One application may be in the field of cable television. Laser beams could carry 30 or 40 TV channels each - simultaneously - from a city or regional distribution center out to smaller centers, which then would send the signals by cable into viewers' homes. He said this could bring immense savings in cable-system construction costs. A second use would be to link computers, scattered around a city or region, so they could pass data back and forth automatically. Many large compan ies and governmen t agencies require such communica tion between computers. This now is done primarily wi th more cos tly cable networks. Some early use of such a laser communication system is expected between satellites in space, which is free of the disturbances found in the earth's envelope of air. Bu t the new link acros s the Palo Al to foothills proves there are also many earthbound possibilities. MISCELLANY COMPUTER CUBISM? No, this is a well known face that has been precisely blurred by a computer. It is part of an experiment by Leon D. Harmon at Bell Laboratories, Murray Hill, N. J . , to learn the least amount of visual information a picture may contain and still be recognizable. The picture is divided in to about 200 squares, with each square rendered in an even tone from one of 16 intensities of gray. If you still don't recognize theportrait, try looking at it from 15 feet or more, or while it's in motion, or while you're squinting, or wi th your eyeglasses removed. Studies of the "information content" of a picture may be useful for designing future PICTUREPHONE® systems, and for devising techniques for computer storage of pictures. (UTOOUn weqe~Q\f JO sllle~uod aql) 49 NEW PRODUCTS AND SERVICES NAM.E/ MODEL. 'Digital - NO. Cogar System 4 GRI-909 computer Honeywell Series 200 computers UT-l system FOR MORE INFORMATION DESCRIPTION A stand-alone minicomputer designed for word handling as well as numerical computation / data system includes fully p~ogrammable, random-access, monolithic memory (2K expandable to 16K bytes), keyboard, two tape decks and a CRT display Four new models fully software compatible wi thtlie original GRI-909 / Model 10 is designed for system control applications; basic memory is lK x 16 read-write, expandable /Model 20, similar to Model 10 wi th operator's console for interaction with computer / Model 30 has 4K x 16 memor ex andable Model 40 series lar est New models, 115 2, 1015 and 2015 have elements of Model 115 / Series family spans small-to-medium price-performance range / main memory sizes range from 16,384 to 262,144 characters; cycle times from 2.75 usec per character on the 115 to 1.3 usec for two characters on the 2015 Functions both as off-line computing sys tem and as programmable remote batch data communications terminal for time sharing applications / configured around the Data General NOVA 1200 computer, system offers wide range of peripherals Cogar Corp. Information Systems Div. Cosby Manor Rd. Schuyler, N.Y. 13502 Attn: Stephen Robbins GRI Computer Corp. 230 Needham St. Newton, Mass. 02164 Attn: Irwin M. Stone Honeywell Information Sys tems 60 Walnut St. Wellesley Hills, Mass. 02181 UNITECH, Inc. 1005 E. St. Elmo Rd. Austin, Texas 78745 Attn: Frank Milstead Memories Ampex Model RGM Core Memory Braided U-Core ReadOnly Memory (ROM) Cogar 70 DO 4314-1 Dl'sk Drive ExpandaCore 620 MEGAMEMORY 1000 Micromemory 4000 Series 720 Controllers For military and other severe-environment applications/ 400 nsec access time; full cycle time, 1 msec / four basic word-size configurations; capacities of 4,096 by 18 and by 36 bits, 8,192 words by 18 bits and 16,384 words by 18 bi ts Model MP 256/36A for airborne and field service use / a 256 x 36 bit (9K) ROM / 500 nsec cycle time; access time is 250 nsec / physical size is 1.25" x 4.5" x 9.0" for a packing densi ty of over 180 bi ts per cu. inch Monoli thic add-on memory for 360 computers /262K bytes expandable to a one megabyte system in plug-in increments of 262K bytes / 425 access time; cycle time of 750 nsec / a complete. self-contained system Replaces IBM 2314 and 2319 Drives; up to 9 drives may be connected to matching control unit, DC 5314 / less than 30 msec average access times / transfer rate is 321,000 bytes per second or 624,000 digits per second with packed decimal data Plug-compatible expansion memory for Varian 620/i 4K to a maximum of 32K words / a 3D, 3-wire core memory / 1.8 msec full cycle timej access time is 750 nsec Flexible, 2-wire, 2VzD core system for main frame memory extension or as peripheral memory / 850 nsec access time with a 1.5 usec cycle time / storage capacities -32,768 words, 32-160 bits per word up to 524,288 words of from 8-14 bits per word 2-wire, 2VzD organization / basic module capacity is 32,768 words of 18 bits per word / 800 nsec access time, 1.5 nsec cycle-time / key features are price, 1-0 flexibility. packaging density Provides minicomputer users with upward compatible plugin data storage system capability / allows user to expand his storage from 0.6 million bits to over 70 million bi ts depending on which of 8 memory systems are used Ampex Corporation 9937 West Jefferson Blvd. Culver City, Calif. 90230 Attn: Chris Hoppin Datapac, Inc. 3839 South Main St. Santa Ana, Calif. 92702 Attn: Tom Lee/Ben Garrett Cogar Corp. Technology Div. All Angeles Rd. Wappingers Falls, N.Y. 12590 Potter Instrument Co., Inc. 532 Broad Hollow Rd. Melville, N.Y. 11746 Attn: R. T. Grunenwals Cambridge Memories, Inc. 285 Newtonville Ave. Newton, Mass. 02160 Electronic Memories 12621' Chadron Ave. Hawthorne, Calif. 90250 Attn: LeNore Plotkin Bryant Computer Products 850 Ladd Rd. Walled Lake, Mich. 48088 Software DOS ASAP (Automatic ~ooling-with Asynchronous frocessing) 50 For users of IBM 360 under the Disk Operating System / alleviates dependence of CPU on relatively slow unit record devices / provides print, punch and card read operations at maximum device speed Universal Software, Inc. 12 Horseshoe Drive Danbury, Conn. 06810 Attn: David W. Kearns COMPUTERS and AUTOMATION for March, 1971 DESCRIPTION NAME/MODEL NO. FOR MORE INFORMATION (Software, continued) EASY PLOT General Ledger System A non-programmer application language for engineers and other non-programmer professions to generate plotter ou~put / need only a keyhoard terminal (such as a Teletype) and a plotter (works with most standard plotters) Time-sharing system for public accounting firms / reduces accountant's write-up tIme by 50-85% / accessed by remote terminal/no programming knowledge required / applicable to all types of business COBOL preprocessor / provides programmer with unlimited abbreviation capability throughout all COBOL divisions by both supplied and user defined abbreviations / macro facility, syntax checking. output formatting, also supplied PROFACTS (PROduct For- Provides current information for management review and mulation~ccount production purposes / written in COBOL for an IBM System/360 Model 30 or larger, using DOS / minimum of 64K, ing, and ~osl ~s tern) 4 tape drives and 2 disc drives QWIK-TRIEVE"" A generalized interactive data storage and retrieval system for time-shared computers / stores data in direct access files / handles both formatted data and free data / responds to English-like query statements SIRE (Symbolic InforIntegrated information storage, file management main~ mation Retrieval) tenance and retrieval system / provides capability to write applications in any language (English, French, German, Japanese, etc.) / no technical programming background required / available for UNIVAC 1106 and 1108, IBM 360/50 "and larger (minimum core,270K bytes)/ developed as in-house system by Boeing Company; Script has exclusive world-wide marketing license agreement Calculates federal, state and local withholding taxes TAXCAL handling calculations in one pass / modularized / written in COBOL / requires 2500 to 18,000 bytes of core Unit Inventory TechFor small department stores, specialty shops and other niques for System/3 retailers / produces time-saving inventory data reports using IBM's System/3 Model 10 / written in English-like RPG II programming language MAGIC-Shorthand Tymshare 525 Uni vers i ty Ave., Sui te 220 Palo Alto, Calif. 94301 Attn: Jim Harrison Honeywell Information Services Operations Mail Station Gl124 2701 Fourth Avenue South Minneapolis, Minn. 55408 Information Management, Inc. 447 Battery St. San Francisco. Calif. 94111 Fortex Data Corp. 230 North Michigan Ave. Chicago, Ill. 60601 Westinghouse Tele-Computer Systems Corp. 2040 Ardmore Blvd. Pittsburgh, Pa. 15221 Script Associates, Inc. 225 108 NE Bellevue, Wash. 98004 Datasonics, Inc. 663 Fifth Ave. New York, N.Y. 10022 Attn: Martin Burack IBM Corp., Data Processing Div. 112 East Post Rd. White Plains, N.Y. 10601 Peripheral Equipment Automatic Calling Unit, For interfacing business machines and computers with Sola Basic Industries, G-V ACU-1801 with tone or pulse dialing telephone systems / unit acControls Division cepts stored telephone numbers in binary code, converts 101 Okner Pkwy. to digital code, and automatically dials those numbers Livingston, N.J. 07039 over any standard telephone line / four available models Card Reader, Mod 250 Specifically for use with minicomputers / both handle UniComp, Inc. Card Punch, Mod 260 80 column cards / Reader has vacuum pick finge~ handles 18219 Parthenia St. 300 cards per minute; is 14"W, 18"D, 18"H, 47 pounds / Northridge, Calif. 91324 Punch operates 120 cards per minute; is 22Yz"H x 19"W DigiNet® 160 Series Private line data multiplex systems equipped with "inGeneral Electric Co., Telecommunications Products Dept. ternal diagnostics" / moves information over leased or Section P, P.O. Box 4197 private four-wire voice-grade circuits / connects diLynchburg, Va. 24502 rectly to telephone line, no data set reauired / has channel speed intermix capabil i ty / modul arl y con structed For time-sharing and communications applications / has Model 420 Portable Data Access Systems, Inc. Printer built-in acoustic coupler / operates at switched speeds 503 Route 10 of 10, 15, and 30 cps using non-impact thermal print Dover, N.J. 07801 head i prints 80 characters per line ! teletype compatible Attn: Robert T. Coppoletta Model GT50/10Graphics High speed 10-bit device for converting hand drawn data Computek, Il,lc. Tablet to digi tal form / wri ting surface is 11~" x ll~tt / may 143 Albany St. be used with graphic display terminals or as a standCambridge, Mass. 02139 alone unit Attn: Dou las Drane Punched-tape optical Operates continuously designed specifically for Decitek batch-type, continuous tape runs / tape transported on reader 15 Sagamore Rd. dual-sprocket, capacitor-start/capacitor-run AC motor Worcester, Mass. 01605 drive at 700 characters per second Attn: I. E. Spalding Regiscan Reader Hand-held automatic price tag reader for retailing / a American Regitel Corp. 4 oz., trigger-operated device using light-emitting and 870 Industrial Rd. photosensing diodes! automatically senses price and San Carlos, Calif. 94070 merchandising information from Kimball or Dennison Attn: Jerome Turk tickets I reading time is less than one millisecond ':'QWIK-TRIEVE is a service mark of the Westinghouse Tele-Computer Systems Corporation COMPUTERS and AUTOMATION for March, 1971 51 NAME/MODEL NO. DESCRIPTION FOR MORE INFORMATION (Peripheral Equipment, continued) T-66 Credit Control Terminals 230 Dataplottetv VertaTape, Paper Tape to Magnetic Tape Converter A credit card reading terminal; automatically communicates with a computer, obtains credit authorizations in seconds / operates over public telephone network I can be programmed to access anyon-line computer in continental United States Designed for time-share users I self-contained, desktop device, compatibly interfaced to keyboard terminals and acoustic couplers / operates at maximum speed in all directions'l includes easy-to-use FORTRAN plot ting subroutines Makes conversion all off line I converts coded information from 5, 6, 7 or 8 channel paper tape to 64 character magnetic tape code set and edited for computer input I plug-in patch-board programmed for each customer's particular application Audac Corp. 175 Bedford St. ourlington, Mass. 01803 Attn: Peter Bryan Electronic Associates, Inc. 185 Monmouth Pkwy. West Long Branch, N.J. 07764 Attn: Ed Sharpe Datascan, Inc. 1111 Paulison Ave. Clifton, N.J. 07013 Attn: Doug Schwartz Data Processing Accessories Magnetic Tape Cartridge Completely compatible with IBM Magnetic Tape Selectric Typewriters I 120-foot / exacting computer tape quality standards I backed by a one-year warranty TM/33 Teletype An automatic tape handling system may be used to simultaneously feed and collect tape for reading or simply collect tape after perforating I mounts rigidly to the Teletype, no tools or modifications required Tape Handler Memorex Corp. 1180 Shulman Ave. Santa Clara, Calif. 95050 Attn: Jerome M. Kell Data Specialties, Inc. 1548 Old Skokie Rd. Highland Park, Ill. 60035 Computer. Related Services Computer Assisted Diagnosis for Internal Medicine Computer Law Dictionary Moonlighters' JobMatching Service Gives physician ready access to diagnostic information screened from medical literature I computer is called by way of teletypewriter installed in doctor's office, hospital or other central point; findings are entered into computer via numbers corresponding to those listed beside particular findings in operating manual; computer compares these with memory bank; responds with a printed listing of those diseases or syndromes found to be supported by the findings / computer also provides a literature reference and additional findings physician should look for in determining diagnosis I program encompasses diagnoses in general area of adult medicine For use by legal profession / contains over 50,000 words and terminologies used by the profession -- in essence, the language of the lawyer I Omnitec 800 portable data terminal is link between the 'dictionary' and computer stored data relevant to United States Court decisions / when queried computer searches memory, finds proper response in form of legal citations, transmits response via telephone and terminal automatically types it out / service will be operational initially in and for Pennsylvania; dictionary soon will serve all of state and federal computer libraries A computerized "job bank" and referral system that matches skills of moonlighters (temporary and part time employees) with specialized requirements of employers / encompasses virtually all skills required by industry and the professions I free to employers; available to moonlighters for a one-time registration fee of $10 Mead Johnson Medical Services Evansville, Ind. 47721 Attn: Rolland M. Eckels The Computer Searching Service Corp. 11 Erie St. Garfield, N.J. 07026 Moonlighters, Inc. 9060 Santa Monica Blvd. Los Angeles, Calif. 90069 Attn: Robert L. Rod New Literature Magnetic Disk Memories 52 A 72-page report on the industry covering 51 manufacturers / study encompasses four main aspects of the industry: markets, technology, products, and companies I designed to permit rapid evaluation of competitive products, annual shipments, price changes, technological developments, competitive new products and growth opportunities for major and independent manufacturers plus breakout for minicomputer disks High Technology West 1060 Crenshaw Blvd. Los Angeles, Calif. 90019 Attn: Eugene Kurchak COMPUTERS and AUTOMATION for March, 1971 NEW CONTRACTS Computer Sciences Corp., Los Angeles, Calif. RCA Corporation Computer Technology Inc., Dallas, Texas Barnett First National Bank of Jacksonville, Fla. Philco-Ford Corp., Willow Grove, Pa. U.S. Army Electronics Command, Ft. Monmouth, N.J. The Medicus Corp., Dallas, Texas Electronic Associates, Inc., West Long Branch, N.J. Baptist Medical Centers of Birmingham, Ala. American Electric Power System Greatermans Group, South Africa The National Cash Register Co., Dayton, Ohio Burroughs Corp., Detroit, Mich. Univac Division of Sperry Rand Ltd., London, England U.S. Postal Service British European Airways Entrex, Inc., Lexington, Mass. Computer Sciences Corp., Los Angeles, Calif. Redifon Data Systems United Kingdom U.S. Naval Electron Systems Command, Special Communi6ations Project Office Peripheral Equipment Corp., Calif. Consolidated Computer Princeton Electronic Products, Inc., North Brunswich, N.J. Ampex Corp., Culver City, Calif. Smith, Kline & French, Inc., Smith, Kline Instruments Burroughs Corp., Detroit, Mich. U.S. Air Force Sierra Research Corp., Computer Products Group, Burlington, Mass. The Center for Research Libraries, Chicago, Ill. Babcock and Wilcox Co., Naval Nuclear Fuel Div., Lynchburg, Va. Ford Foundation Chatswo~th, I Sigmatics, Newport Beach, Cal i f. Carnegie-Mellon Univ., Graduate School of Industrial Administration, PittSburgh, Pa. National Archives Texas A & M University Defense Atomic Systems Agency Field Command, New Mexico The Richard King Mellon Charitable Trusts Ford Foundation M.I.T., Dept. of Architecture Architecture Machine Gp., Cambridge, Mass. RCA, Cherry Hill, N.J. Graham Foundation for Advanced Studies in the Fine Arts U.S. Army, Pacific Comma Corp., Data Processing Financial & General Corp., Diebold Computer Leasing, Inc., Randolph Computer Corp., and Talcott Computer Leasing COMPUTERS and AUTOMATION for March, 1971 A five-year contract to develop elements of software for U.S. Navy Aegis defensive missile system including radar processing, command & control & training A three-year data processing facilities contract to handle design and operation of bank's computer applications; also for BankAmericard service center Expansion of Defense Department's Overseas Automatic Digital Network; for receiving, storing & routing messages Installation of a medical data processing center in the two-hospital system A computer-controlled simulator of a power plant control room for fossilfueled power plant training in the electric industry Retail data-capturing equipment, initially 300 NCR 5 control registers for point of sale data collection; additional 200 registers to follow Design, development and installation of a Code Controlled Letter Sorting Machine Two hundred UNISCOPE 100 visual display units; will enable 22 European cities to be visually linked to BEA's BEACON seat reservation system Ten System 480's, computer based data entry equipment, to be called "SEE-CHECK" Providing technical support and management assistance in communications; will provide studies and analyses in support of naval communications projects A contract including 250 PEC 6000 Series tape transports for new KEY-EDIT data preparation system Electronic display equipment to be utilized in medical data processing systems Model ECM-65 core memory systems and TM1624 magnetic tape units to be linked to an IBM 360/65 system Development of an advanced aerospace multiprocessing computer to be used in future high performance aircraft and space vehicles Installation of an SDA-770 System for factory data collection, planning and control A grant for support of a program to provide widest access to machine readable forms of 1970 Census Summary Data and public use samples on magnetic tape; also to reduce cost of using data for research purposes Provision of programming support for an automated financial management system Development of a management information control system to upgrade efficiency of hospital administration; study of ambulatory care facilities A two-year grant for indexing the papers of the Coritinental Congress Support of a fellowship program for advanced study in computer-aided architecture Seven Spectra 70 systems, having a sales value of $11.7 million, to provide automated logistic support for U.S. Troops in Sotheast Asia; contract includes an option for additonal 14 Spectras Computer maintenance agreements; authorizes Comma to sign computer maintenance contracts with any of leasing companies' customers, should they so desire; approximately $600 million of IBM/36O equipment is owned and leased by the four firms $11 million $5+ million $2,685,000 $2.2 million $2+ million $1.5+ million $1.3 million $1.2 million $1+ million $1 million $750,000 $670,000 $475,000+ $469,000 $300,000+ $225,000 $219,380 $200,000 $150,000 $40,000 55 NEW INSTALLAliONS Control Data 3170 system North Carolina Agricultural and .Technical State University, Greensboro, N.C. Control Data 3300 system Massachusetts Registry of Motor Vehicles, Boston, Mass. Control Data 7600 system Westinghouse Electric, Westinghouse Nuclear Center, Monroeville, Pa. J. C. Penney Company, Inc., New York, N.Y. Blue Cross of Southern California, Los Angeles, Calif. Hewlett-Packard 2000B system Honeywell Model 4200 system Honeywell 8200 system The American Mutual Liability Insurance Co., Wakefield, Mass. IBM System/3 Auburn Hosiery Mills, Inc., Auburn, Ky. The Fate-Root-Health Co., Plymouth, Ohio IBM System/3 Model 10 .IBM System/360 Model 20 IBM System/370 Model 155 George R. hlein News Co., Cleveland, Ohio Blue Cross and Blue Shield of Alabama, Birmingham, Ala. IBM 1130 system Samuel Gary Oil Producer, Denver, Colo. IBM 1800 sys tem The Budd Company, Automotive Division, Detroit, Mich. Gemini Chit Fund Corp., Singapore Guaranty Bond State Bank, Mt. Pleasant, Texas Revillon, Paris, France NCR Century 100 system NCR Century 200 system UNIVAC 118-11 and 1106 systems UNIVAC 1106 system Alliance Machine Co., Alliance, Ohio U.S. Ceramic Tile Co., Canton, Ohio Swedish Government Office of Organization and Management (Statskontoret), Stockholm, Sweden (4 systems: two 1106s and tw0418-IIs) Mankato State Colleg~ Mankat~ Minn. New Holland Division of Sperry Rand Corp., New Holland, Pa. Ontario Government, Computer Services Center, Toronto, Canada UNIVAC 9200 system UNIVAC 9400 system Shrewsbury Borough Council, England The Roman Catholic Archdiocese of New York, Data Systems Center XDS Sigma 3 system Goodyear Tire & Rubber Co., Bakersfield, Calif. Link-Miles Ltd., London, England XDS Sigma 5 system American Council on Education XDS Sigma 6 system University of Tulsa, Kendall Campus, Tulsa, Okla. XDS CE16 systems 56 Administrative, training and scientific data processing applications; also plans to offer computer time to local small colleges (system valued at $600,000i Building and maintaining automobile registration files; providing remote inquiry arid retrieval system on driver record and related information; generating accident and statistical reports; preparing excise tax bills for cities and towns; issuing driver license renewals; other related applications Use in designing reactor systems for nuclear power plants An in-house time-sharing system dedicated entirely to business applications The ini tial step in a maj or program to speed its data processing operations; second H4200 will be delivered in the spring Replacing three present systems; H8200 will be used for writing and rating policies, collection, claims processing and administrative functions Providing customers with in-depth data and sameday order filling Labor and payroll reports, orders, invoices~ later applications will include job order costing and production control Daily sales analysis of newspaper and magazines; helps 'keep stockroom empty' Speeding benefit payments to over 1 million Alabama menmers; facilitating the full claims service for enrollees in Medicaid and in parts A and B of Medicare Helping monitor oilfields of independent oil producer and handling complex division-of-interest accounting for producer's investors; also bill processing, cost accounting, monthly reports for state and federal governments Providing production reports; monitoring production of 250 machines which make automobile body components Processing some 22,000 depositor accounts The heart of a new Central ·Information File A variety of data processing tasks including billing, stock and statistical work; will later include the entire banking application InventoTY control, handling accounts payable; also processing accounts receivable and payroll Preparation of payrolls and general accounting Use of the Centrala Bilregistret (Stockholm), the central automobile registration agency for Sweden; systems also be used for census work (systems valued at $4~6 million) Administrative and. academic work; also for use by 3 other colleges and later some high schools Heart of multi-million dollar world-wide management information center (system valued at $2 million) Various departments of the provincial government requiring data processing including Treasury and Economics, Revenue, Labor, Lands and Forests, etc. (system valued at about $1.25 million) Local government applications including payroll, mortgage and investment loans and taxes Use in administrative offices, education office and in student/teacher training; includes e.g., fund raising reports, pension plans for both layment and' pri~sts; grade reporting, student scheduling, etc. Incorporation into process control systems to automate automobile seat cushion production facilities Use in flight simulator being built for BOACjwill be used to train pilots and flight engineers Assisting in studies of nation's higher education problems (over 400 colleges are participating)j main use as massive data storage and computing system for researchers Student instruction; administrative processing; research activities (both for graduate students and faculty); and information storage and retrieval services for the petroleum industry - the North Campus will have a remote job entry terminal COMPUTERS and AUTOMATION for March, 1971 MONTHLY COMPUTER CENSUS Neil Macdonald Survey Editor Q)MPUTERS AND AUTOMATION The following is a summary made by Q)MPUTERS AND AUTOMATION of reports and estimates of the number of general purpose electronic digital computers manufactured and installed, or to be manufactured and on order. These figures are mailed to individual computer manufacturers from time to time for their information and review, and for any updating or comments they may care to provide. P lease note the variation in dates and reliability of the information. Several important manufacturers refuse to give out, confirm, or comment on any figures. Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit information for this census. We invite all our readers to submit information that would help make these figures as accurat~ and complete as possible. The following abbreviations apply: (A) -- authori tati ve figures, derived es senti ally from information sent by the manufacturer directly to COMPUTERS AND AUTOMATION ' C figure is combined in a total (D) acknowledgment is given to DP FOCUS, Marlboro, Mass., for their help in estimating many of these figures E figure estimated by COMPUTERS AND AUTOMATION (N) -- manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any way on those numbers stated here (R) figures derived all or in part from information released indirectly by the manufacturer, or from reports by other sources likely tO'be informed (S) sale only, and sale (not rental) price is stated X -- no longer in production information not obtained at press time Part I of the Monthly Computer Census contains reports for United States manufacturers. Part II contains reports for manufacturers outside of the united States. The two parts are published in alternate months. SUMMARY AS OF FEBRUARY 15, 1971 NAME OF MANUFACTURER Part 1. United States Manufacturers Autonetics Anaheim, Calif. (R) (1/69) Bailey Meter Co. Wickliffe, Ohio (A) (2/71) Bunker-Ramo Corp. Westlake Village, Calif. (A) (12/70) Burroughs Detroit, Mich. (N) (1/69-5/69) Computer Automation, Inc. Newport Beach, Calif. (12/70) Control Data Corp. Minneapolis, Minn. (A) (R) (9/70) NAME OF COMPUTER RECOMP II RECOMP III Bailey 750 Bailey 755 Bailey 756 Bailey 855 BR-130 BR-133 BR-230 BR-300 BR-330 BR-340 BR-1018 205 220 BIOO/B500 B2500 B3500 B5500 B6500 B7500 B8S00 208/808 216/816 GIS G20 LGP-2l LGP-30 RPC4000 636/136/046 Series 160/8090 Series 924/924-A l604/A/B 1700 3100/3150 3200 3300 3400 3500 3600 3800 6400/6500 6600 6800 7600 DATE OF FIRST INSTALLATION 11/58 6/60 11/61 2/65 4/68 10/61 5/64 8/63 3/59 12/60 12/63 6/71 1/54 10/58 7/65 2/67 5/67 3/63 2/68 4/69 8/67 6/68 3/69 7/55 4/61 12/62 9/56 1/61 5/60 8/61 1/60 5/66 5/64 5/64 9/65 11/64 8/68 6/23 2/66 8/64 8/64 6/67 12/68 AVERAGE OR RANGE OF MONTHLY RENTAL $(000) 2.5 40-250 200-600 60-400 100-1000 2.0 2.4 2.7 3.0 4.0 7.0 23.0 4.6 14.0 2.8-9.0 5.0 14.0 23.5 33.0 44.0 200.0 5.0 8.0 1.6 15.5 0.7 1.3 1.9 (S) (S) (S) (S) NUMBER OF INSTALLATIONS Outside In In World U.S.A. U.S.A. NUMBER OF UNFILLED ORDERS 30 o 30 X 32 6 13 o 35 6 18 o o 5 8 o 8 17 160 79 15 18 19 19 X X X X X X (S) 25-38 28-31 27-40 30-33 X X 117 190 o 64-69 62 72-81 4 o o o 1 143 157 o 52-57 44 65-74 4 (S) (S) 12 18 7 7 13 2.1-14.0 11.0 45.0 3.8 10-16 13.0 20-38 18.0 25:0 52.0 53.0 58.0 115.0 130.0 235;0 8 60 13 1 150 170 295 20 165 322 75 29 610 29 59 106-180 83-ll0 55-60 200 20 15 39 20 85 85 1 1 130 215 X X X X X X X X o C C C C C C C C C C C Total: 160 E Data General Corp. Southboro, Mass. (A) (2/71) Datacraft Corp. Ft. Lauderdale, Fla. (A) (10/70) DC Digiac Corp. Plainview, N.Y. (A) (12/70) Digital-Computer Controls, Inc. Fairfield, N.J. (A) (2/71) Digi tal Equipment Corp. Maynard, Mass. (A) (2/71) COMPUTERS and AUTOMATION for March, 1971 8.0 9.6 5.4 (S) (S) 6.9 (S) (S) (S) NOVA SUPERNOVA NOVA 1200 NOVA 800 SUPERNOVA SC 6024/1 6024/3 Digiac 3060 Digiac 3080 Digiac 3080C D 112 2/69 5/70 12/70 4/71 6/71 5/69 2/70 1/70 12/64 10/67 8/70 11.9 54-200 33-200 9.0 19.5 25.0 10.0 PDP-l PDP-4 PDP-5 PDP-6 PDP-7 PDP-8 ll/60 8/62 9/63 10/64 ll/64 4/65 3.4 1.7 0.9 10.0 1.3 0.5 813 102 8 (S) (S) (S) (S) (S) (S) 9 21 25 16 o 9 21 5 o 7 9 1 48 40 90 10 C C C 4 45 C C C 10 50 45 100 23 160 1440 1 200 X X X X X C 57 NAME OF MANUFACTURER Digital Equipment Corp. (Cont'd) Electronic Associates Inc. LongBranch, N.J. (A) (2/71) EMR Computer Minneapolis, Minn. (N) (12/70) NAME OF COMPUTER PDP-8/1 PDP-8/S PDP-8/L PDP-9 PDP-9L PDP-I0 PDP-11 PDP-12 PDP-IS LINC-8 DATE OF FIRST INSTALLATION 3/68 9/66 11/68 12/66 11/68 12/67 3/70 9/69 2/16 9/66 640 8400 EMR 6020 EMR 6040 EMR 6050 EMR 6070 EMR 6130 EMR 6135 EMR 6155 4/67 7/67 4/65 7/65 2/66 10/66 8/67 ~VERAGE OR RANGE OF MONTHLY RENTAL $(000) 0.4 0.3 1.1 8.0 10.5 17.0 1.2 12.0 5.4 6.6 9.0 15.0 5.0 2.6 (S) NUMBER OF INSTALLATIONS Outside In In U.S.A. World U.S.A. C 3698 C C C 1024 3902 C C C 436 C C C 48 C 145 C 546 C C 475 C C 6 C 15 C 142 C 5 19 Total: 103 E General Automation, Inc. Anaheim, Calif. (R) (6/70) Hewlett Packard Cupertino, Calif. (A) (2/71) Honeywell Information Systems Wellesley Hills, Mass. (A) (2/71) 58 SPC-12 SPC-16 System 18/30 2114A, 2114B 2115A 2116A, 2116B, 2116C G58 GI05A GI05B GI05RTS G1l5 G120 G130 G205 G210 G215 G225 G235 G245 G255 T/S G265 T/S G275 T/S G405 G410 T/S G415 G420 T/S G425 G430 T/S G435 G440 T/S G615 G625 G635 G655 H-110 H-115 H-120 H-125 H-200 H-400 H-800 H-1200 H-1250 H-1400 H-1800 H-2200 H-3200 H-4200 H-8200 DDP-24 DDP-1l6 DDP-124 DDP-224 DDP-316 DDP-416 DDP-516 H112 H632 G3010 G4010 G4020 G4040 G4050 G4060 H1602 H1642 H1644 H1646 H1648 H1648A 1/68 5/70 7/69 10/68 11/67 11/66 5/70 6/69 6/69 7/69 4/66 3/69 12/68 6/64 7/60 9/63 4/61 4/64 11/68 10/67 10/65 11/68 2/68 11/69 5/64 6/67 6/64 6/69 9/65 7/69 3/68 4/65 5/65 12/70 8/68 6/70 1/66 12/67 3/64 12/61 12/60 2/66 7/68 1/64 1/64 1/66 2/70 8/68 12/68 5/63 4/65 3/66 3/65 6/69 9/66 10/69 12/68 0.25 0.41 0.6 1.0 1.3 1.4 1.2 2.2 2.9 4.5 2.9 16.0 6.0 8.0 12.0 13.0 17.0 20.0 23.0 6.8 11.0 7.3 23.0 9.6 17.0 14.0 25.0 32.0 43.0 47.0 80.0 2.7 3.5 4.8 7.0 7.5 10.5 30.0 9.8 12.0 14.0 50.0 18.0 24.0 32.5 50.0 2.65 0.9 2.2 3.5 0.6 6 2/67 8/64 12/66 6/65 11/68 12.0 C C C C C C C C C Total: 1350 E 6 o C C C C C Total: 15 E 11 1075 663 1252 200-400 11 420-680 o o 35 15 145 40-60 3 15-20 45-60 15-30 10-40 5 170-300 50-100 20 1 15 17 70-100 20-30 6 23 20-40 180 30 800 150 800 46 58 230 130 4 15 125 20 18 10 155 45 23 18 620-1080 11 35 16 160 57-77 3 15-20 60-90 10 15-45 240-400 70-130 26 26 23-43 75 160 220 275 40 15 90 55 6 5 60 2 2 1.2 3.2 2.0 6.0 6.0 3.0 7.0 2.0 40 25 C C C C C NUMBER OF UNFILLED ORDERS C 45 20 1 255 30 960 370 1075 86 73 325 185 10 20 185 22 20 14 90 250 250 60 450 350 900 75 12 o 200 65 24 20 60 X X X x X X X X 20 COMPUTERS and AUTOMATION for March, 1971 NAME OF MANUFACTURER IBM White Plains, N.Y. (N) (D) (1/69-5/69) Interdata Oceanport, N.J. (A) (2/71) NCR Dayton, Ohio (R) (2/71) Phi1co Willow Grove, Pa. (N) (1/69) RCA Cherry Hill, N.J. (N) (5/69) Raytheon Santa Ana, Calif. (A) (2/71) Scientific Control Dallas, Tex. C~rp. (A) (6/70) Standard Computer Corp. Los Angeles, Calif. (N) (12/70) . SystemS Engineering Laboratories Ft. Lauderdale, Fla. (A)] (6/70) UNIVAC J;)iv. _of Sperry Rand New York, N.Y. (A) (2/71) COMPUTERS and AUTOMATION for March, 1971 DATE OF FIRST NAME OF INSTALLATION COMPUTER System 3 1/70 305 12/57 650 10/67 1130 2/66 1401 9/60 1401-G 5/64 1401-H 6/67 1410 11/61 1440 4/63 1460 10/63 1620 1, 11 9/60 1800 1/66 7010 10/63 7030 5/61 704 12/55 7040 6/63 7044 6/63 705 11/55 7020, 3/60 7074 3/60 7080 8/61 7090 11/59 7094-1 9/62 7094-11 4/64 360/20 12/65 360/25 1/68 360/30 5/65 4/65 360/40 360/44 7/66 360/50 8/65 360/65 11/65 360/67 10/66 360/75 2/66 360/85 12/69 360/90 11/67 360/195 Model 1 12/70 Model 5/67 Model 4 8/68 ModelS 11/70 Model 15 1/69 304 1/60 310 5/61 315 5/62 315 RMC 9/65 390 5/61 500 10/65 Century 100 9/68 Century 200 6/69 1000 6/63 200-210,211 10/58 2000-212 1/63 301 2/61 501 6/59 601 11/62 3301 7/64 Spectra 70/15 9/65 Spectra 70/25 9/65 Spectra 70/35 1/67 Spectra 70/45 11/65 Spectra 70/46 Spectra 70/55 11/66 250 12/60 440 3/64 520 10/65 703 10/67 704 3/70 706 5/69 650 5/66 655 10/66 660 10/65 670 5/66 4700 4/69 DCT-132 5/69 IC 4000 12/68 IC 6000 5/67 IC 7000 8/70 810 9/65 810A 8/66 810B 9/68 840 11/65 840A 8/66 840MP 1/68 Systems 86 I & II 3/51 & 11/57 8/62 III 8/56 File Computers Solid-State 80 I,ll, 90, I, II, & Step 8/58 418 6/63 490 Series 12/61 1004 2/63 AVERAGE OR RANGE OF MONTHLY RENTAL $ (000) 1.1 3.6 4.8 1.5 5.4 2.3 1.3 17.0 4.1 10.0 4.1 5.1 26.0 160.0 32.0 25.0 36.5 38.0 27.0 35.0 60.0 63.5 75.0 83.0 2.7 5.1 10.3 19.3 11.8 29.1 57.2 133.8 66.9 150.3 (S) 232.0 11.0 20.0 15.0 25.0 35.0 14.0 2.5 8.7 12.0 1.9 1.5 2.7 7.5 7.0 40.0 52.0 7.0 14.0-18.0 14.0-35.0 17.0-35.0 4.3 6.6 9.2 22.5 33.5 34.0 1.2 3.6 3.2 12.8 (S) 9.8 (S) 19.0 (S) 0.5 2.1 2.1 2.7 1.8 0.9 9.0 16.0 17.0 1.1 0.9 1.2 1.5 1.5 2.0 10.0 25.0 21.0 15.0 8.0 11.0 30.0 1.9 NUMBER OF INSTALLATIONS In In Outside U.S.A. U.S.A. World o o 40 50 2580 2210 420 180 156 1690 194 285 415 67 4 12 35 28 18 10 15 18 1227 1836 450 140 116 1174 63 186 148 14 55 68 3807 4046 870 320 272 2864 257 1 27 13 13 44 26 13 4 10 6 4690 o 5075 1260 65 480 175 9 14 o 5 45 N/A 280 9 N/A 15 8 400 150 950 1100 1100 350 16 16 12 140-290 22-50 2 4 4 3276 4 3144 498 13 109 31 4 3 NUMBER OF UNFILLED ORDERS 471 563 81 41 21 13 70 15 6 14 10 7966 4 8219 1758 78 589 206 13 17 o o o 1 20 260 300 40 64 17 70 X 90 30 13 o 8 X 300 45 500 1800 300 90 700 195 1450 2900 1400 440 20 X X X X 100-130 1 240-420 23-51 o 24-60 90-110 68-70 65-100 84-180 1 11 115 20 26 171 14 54 23 137 41 1 19 45 8 9 4 24 111 75 3 36 31 o 23 25 1-5 35-60 18-25 20-50 21-55 o 1 20 1 31 78 14 o o o o o o o o o o 5 1 25-65 125-170 86-95 85-150 105-235 1 12 175 20 27 202 49 68 23 137 41 2 3 11 X 0 0 X 4 23 8 6 9 4 24 X 216 76 32 26 X X 38 31 2 o X X X 6 31 36 11 628 112 86 35 E 2130 20 E 13 210 76 75 1502 X X 19 45 o o o X X 20 E 59 NAME OF MANUFACTURER UNIVAC (Cont I d.) Varian Data Machines Newport Beach, Calif. (A) (2/71) Xerox Data Systems E1 Segundo, Calif. (R) (2/71) DATE OF NAME OF FIRST INSTALLATION COMPUTER 1005 4/66 1050 9/63 1100 Series (except 1107,1108) 12/50 1107 10/62 1108 9/65 9200 6/67 9300 9/67 9400 5/69 LARC 5/60 620 11/65 620i 6/67 R-620i 4/69 520i 10/68 520/DC 12/69 620/f 11/70 XDS-92 4/65 XDS-910 8/62 XDS-920 9/62 XDS-925 12/64 XDS-930 6/64 XDS-940 4/66 XDS-9300 11/64 Sigma 2 12/66 Sigma 3 12/69 Sigma 5 8/67 Sigma 6 6/70 Sigma 7 12/66 Sigma 9 AVERAGE OR RANGE OF MONTHLY RENTAL $ (000) 2.4 8.5 35.0 57.0 68.0 1.5 3.4 7.0 135.0 0.9 0.5 0.4 1.6 0.5 1.5 2.0 2.9 3.0 3.4 14.0 8.5 1.8 2.0 6.0 12.0 12.0 35.0 NUMBER OF INSTALLATIONS In outside In U.S.A. U.S.A. World 299 637 936 62 138 200 9 8 87 1051 387 8 10-60 150-170 93-120 20 159 28-35 21-25 60-110 10 15-40 7-10 5-12 1 14 0 1 10-15 0 6-18 9 11 56 175 144 3 2 75 1300 50 150 25 7 12-62 157-180 98-132 21 173 28-35 22-26 70-125 10 21-58 24-35 5-9 29-44 3 114 822 49 0 0 NUMBER OF UNFILLED ORDERS 90 E 10 E X X 75 850 550 60 E E E E X 400 30 330 25 125 Westin - Continued from page 7 peripheral equipment and expensive consulting services to recommend, design, and install information systems. This may, represent a typical instance of early development costs of a powerful tool before its true potential is realized. Furthermore, in a capitalist system, with its basic principle of caveat emptor, the political. answer may be that the consumer (even the government consumer) has to learn through some costly experiences just what the new mousetrap can and cannot do. There is at any rate nothing to suggest that socialist or communist nations have leaped over these early experimental stages, or that they have conducted them at lesser cost per advance. Be all that as it may, our interviews show that a new tough-minded attitude has been developing among government professionals, agency officials, department executives, and key legislators 'who oversee data processing expenditures. This suggests that the first era of bandwagon effects and easy money may be over, and that systems in the 1970's will be under much more severe requirements to pay their way. Nevertheless, there may still remain a need - in the interests of protecting democratic government - for some new processes and institutions (or at least for even greater awareness by existing agencies) to review the creation and use of computerized information systems, not only to secure citizen rights to privacy and due process, but also to bring the political assumptions and policy preferences embedded in data bank systems under far better and more open public scrutiny than was true in the 1960's. The detailed findings of our study deal with the early effects of data bank developments on the internal structures and role relationships of the government agencies that adopted them, with the changing relationships of those agencies to other government agencies, with some new patterns of intergovernmental relationships, and with the relationship of data bank-owning agencies to legislative and interest group processes. For these findings, and for a general analysis of possible trends in the next five years, readers will be able to consult our finished report. 60 CORRECTIONS In the February 1971 i.ssue of Computers and Automation, the followi ng corrections should be made: Page 18, Figure 5e: In W903, line 2, replace "SUBRAPUBIC" by "SUPRAPUBIC". Page 42, "The Golden Trumpet": In the la st paragraph, line 3, replace "Gold" by"Quin". Page 49, col. 1: Replace "spectographic" by "spectrographic" in six places - the subheading at the top of the page, and in lines 10, 20, 30, 44, and 46. Page 63, Advertising Index, col. 2, line 1: replace "Page 3" by "Page 2". (The proofreader for certain parts of our February issue qualifies as Rip Van Winkle.) TIME-SHARING PHONE BOOK Eugene C. Gaines, Jr., Pres. Time-Sharing 'Enterprises, Inc. 3401 Market St. Philadelphia, PA 19104 Thank you for your letter requesting a review copy of our Time-Sharing Phone Book. A copy is enclosed. I hope things are going well for you and for your magazine. A note of explanation -- the TIME-SHARING PHONE BOOK is intended to attract new users to time-sharing, by making them aware of the great wealth of time-sharing services which are as close as a local telephone call. The time-sharing field needs help -- and new customers -- now. I will much appreciate your mentioning "helps you get started in choosing a time-sharing service" in anything you might wish to print about the Time Sharing Phone Book. COMPUTERS and AUTOMATION for March, 1971 Siklossy - Continued from page 15 CALENDAR OF COMING EVENTS Mar. 1-3, 1971: Data Processing Supplies Association, Spring Membership Meeting, The Doral Hotel & Country Club, Miami, Fla. / contact: Data Processing Supplies Association, 1116 Summer St., Stamford, Conn. 06905 Mar. 1-3, 1971: First International Symposium on Fault-Tolerant Computing, Huntington-Sheraton Hotel, Pasadena, Calif. / contact: Dr. Francis P. Mathur, Sec'y, IEEE Technical Comm. on Fault-Toleranl Computing, Jet Propulsion laboratory, Calif. Institute of Tech., 4800 Oak Grove Dr., Pasadena, Calif. 91 i03 Mar. 9-13, 1971: INfL 71, the 5th International Exhibition of Industrial Electronics, Basel, Switzerland I contact: Sekretariat INEL 71, CH-4000, Basel 21, Switzerland WRON_ CC 15 THE FATHER OF CE Figure 3. A quiz on another tree proposed by the student. trees, since it draws them so prettily. But it knows more than has been apparent so far. The tutor can ask questions about the tree that the student has made it draw. Figure 3 shows the tutor's comment on an answer from the student. The student was asked to select a node from the tree and node CE was selected. The student was asked which node was the father of CE, and answered UFO. I mpossible Problems The diagnostic capabilities represent a major asset of our teaching system. They free the designer from having to think out all possible answers a student might be expected to give. Maybe more important still, they are very helpful in making use of "impossible" problems for tutorial purposes. For example, in Figure 3, the question: "Which node is the father of BC?" does not make sense, since BC is not the label, but the contents of a node. Some other examples of impossible problems are: Giveme a set with -2 elements, (there are no such sets); Is the set A a subset of the set (B A C), (A is not a set). We feel that impossible problems have excellent pedagogical value, since we wish our students to learn not only how to, but also when to and when not to. Conclusion Computers know, or can be made to know, many of the subject areas that we wish to teach. We have given examples of two computer teaching systems that have, at their hearts, programs that understand, in an operative sense, what they are trying to teach. The two subject areas that we have described are elementary set theory and computer information structures. In the latter area, the competence of the computer tutor is enhanced by its superior display abilities. Using a CRT, past and present events can be exhibited concurrently, and dynamic motions can be explicated. 0 Reference Sikl6ssy, L. Computer Tutors that Know what they Teach, Proceedings FlCC, 1970, p. 251-255. 2 The information structures teacher is programmed in FORTRAN on the CDC 6600 computer and uses the CDC 252 display system. The figures are photographic prints of microfilm pictures of the CRT. COMPUTERS and AUTOMATION for March, 1971 March 10, 1971: Fourth Annual Symposium on .Automatic Data Processing (sponsored by Federal Executive Board of Federal ADP Council of New England), Sheraton-Boston Hotel, Prudential Center, Boston, Mass. / contact: Thomas T. Donovan, Air Force Computer Operations Div. (MCCO), l. G. Hanscom Field, Bedford, Mass. 01730 March 17-18, 1971: Spring Conference of The Association for Systems Management, Royal York Hotel, Toronto, Ontario, Canada / contact: Donald T. laughton, Chmn., Special Conference, North American life Assurance Co., 105 Adelaide St. West, Toronto 1, Ontario, Canada Mar. 22-24, 1971: Ninth Annual Symposium on Biomathematics and Computer Science in the Life Sciences, Univ. of Texas Graduate School of Biomedical Sciences / contact: Office of the Dean, Univ. of Texas Graduate School of BiomediCal Sciences at Houston, Div. of Continuing Education, P.O. Box 20367, Houston, Tex. 77025 Mar. 22-24, 1971: Numerical Control Society'S Eighth Annual Meeting and Technical Conference, Disneyland Hotel, Anaheim, Calif. / contact: William H. White, Numerical Control Society, 44 Nassau St., Princeton, N. J. 08540 Mar. 22-25, 1971: IEEE International Convention & Exhibition, Coliseum & N.Y. Hilton, New York, N.Y. I contact: IEEE Headquarters, 345 E. 47th St., New York, N.Y. 10017 Mar. 23-26, 1971: Third National Meeting of the Information Industry Assoc., Host Farm Resort, Lancaster, Pa. / contact: Paul G. Zurkowski, IIA Washington, 1025 Fifteenth St., N.W., Washington, D.C. 20005 Mar. 29-Apr. 2, 1971: Datafair '71 Conference, Nottingham Univ., Nottingham, England I contact: Datafair '71 Conference Office, The British Computer Society, 21 Lamb's Conduit St., london, W.C.1, England Apr. 1-2, 1971: ACM Symposium on Information Storage and Retrieval, Univ. of Maryland, College Park, Md. / contact: Dr. Jack Minker, Computer Science Center, Univ. of Maryland, College Park, Md. 20742 Apr. 1-2, 1971: Virginia Computer Users' Conference, Virginia Polytechnic Institute and State Univ., Blacksburg, Va. / contact: Prof. Bruce Klein or Joe Collins, Computer Science Dept., VPI & SU, Blacksburg, Va. 24061 Apr. 5-8, 1971: The First National Educational Technology Conference, American Hotel, New York, N.Y. / contact: Conference Manager, Educational Technology, Englewood Cliffs, N.J. 07632 Apr. 13-16, 1971: Ninth Annual Convention of the Association for Educational Data Systems, Royal York Hotel, Toronto, Ontario, Canada I contact: AEDS Convention, P.O. Box 426, Don Mills, Ontario, Canada May 3-5, 1971: Data Processing Supplies Association, Affiliate Membership Meeting, Copenhagen, Denmark / contact: Data Processing Supplies Association, 1116 Summer St., Stamford, Conn. 06905 May 11-13, 1971: IEEE (Institute of Electrical and Electronic Engineers) 1971 Region Six Conference, Wood lake Inn, Sacramento, Calif. / contact: Dr. D. H. Gillot, Co-Chmn, IEEE Region 6 Conference, Sacramento State College, Dept. Of Electrical Engineering, 6000 Jay St., Sacramento, Calif. 95819; or, Dr. R. F. Soohoo, Program Chmn., IEEE Region 6 Conference, Univ. of California at Davis, Dept. of Electrical Engineering, Davis, Calif. 95616 61 Classified Advertisements PROBLEM CORNER 360's BOUGHT AND SOLD ALSO 360 LEASES - 360's - 7074's - 1401's - Other Mfgs. Complete Systems or Components GEORGE S. HcLAUGHLIN ASSOCIATES, INC. 785 Springfield Avenue Summit, New Jersey 07901 (201) 273-5464 1316 DISK PACKS (IBM) $95-$125 Guaranteed 24 packs used until January 1971. 2-5 years old. Buy any number. F.O.B. Walla Walla. Contact: H.R. Magnuson, Controller Whitman College Walla Walla, Wash. 99362 Walter Penney, CDP Pro blem Editor Computers and Automation PROBLEM 713: A FAMI L Y PROBLEM "What's that you're drawing - a family tree?", asked Joe coming upon Pete deep in thought. '''Well, in a way, yes. You might say it's a family tree of three-bit numbers", said Pete, pointing to the diagram he was studying. 1 /~ 10 11 IBM ENGINEER RECEIVES $50,000 AWARD Michael J. Ambrosio IBM Systems Development Division Poughkeepsie, NY 12602 IBM Senior Engineer William F. Beausoleil has received a $50,000 award for an outstanding contribution. A check for the award amount was presented to Mr. Beausoleil on Jan. 26 in Poughkeepsie, N. Y., for his work in devising a low-cost technique that results in significant increases in usable monolithic circuit memory modules for computers. During his 14 years in IBM, Mr. Beausoleil has received nine other awards. He also holds five U.S. and eight foreign patents. Announcement 100 101 110 III "It's something that came up in our Data Structure course." "Nice, but except for showing that each number has two descendants in the next generation I don't see much to it." "The idea is that if we have a tree like this with all the binary numbers from 1 to 2 n - 1 and scanned it from left to right we'd like to know what would be the kth one we hit", Pete explained. "What do you mean by scanning from left to right?", asked Joe. "It's what's called postorder. In this example we'd have 4,2,5, 1,6,3, 7." "Well, it shouldn't be too diffIcult to figure out the position of any number or the number in any position." What number is in position k? COMPUTER DIRECTORY AND BUYERS' GUIDE, 1971 Solution to Problem 712: A New Gematria? The 17th annual COMPUTER DIRECTORY AND BUYERS' GUIDE issue of Compu ters and Automation, a special directory issue, will be published in June 1971. It wi 11 contain more than twenty kinds of valuable reference information, including an alphabetical Roster of Organizations in the field of computers and data processing and a Buyers' Guide of Products and Services in the computing field. All listings in the DIRECTORY issue are FREE. If your organization has recently entered this field - or if you are not sure that we have your organization's name on our mailing list to receive an entry form forthis year's directory - please use the entry fQrm appearing in the 1970 directory issue (or a copy of it) - or wri te us at once asking for an entry form: Directory Editor Computers and Automation 815 Washington Street Newtonville, Mass. 02160 Entry forms will be mailed shortly. The closi ng date for recei pt of entry forms for thi s year's directory is April 15, Thursday, in our office. 62 The three cases which involved all six letters are CB X ED = ABEF, DB X ED = CABF and EB X DD = CADF. Of these only the last (corresponding to 235 X 221 = 51935) has one letter occurring three times and the other letters once each. Readers are invited to submit problems (and their solutions) for publication in this column to: Problem Editor, Computers and Automation, 815 Washington St., Newtonville, Mass. 02160. ADVERTISING INDEX Following is the index of advertisements. Each item contains: name and address of the advertiser / page number where the advertisement appears / name of agency, if any ACADEMIC PRESS, III Fifth Ave., New York, N.Y. 10003 / Page 2 / Flamm Advertising FROST & SULLIVAN, INC., 106 Fulton St., New York, N.Y. 10038/ Page 3/ Austin Kelley Advertising NEW YORK TIMES Book & Education Div., 229 West 43 St., New York, N.Y. 10036 / Page 64 / Kingen Feleppa O'Dell PROFESSIONAL & TECHNICAL ·PROGRAMS, INC., 866 Third Ave., New York, N.Y. 10022 / Page 27 / Henderson & Roll, Inc. WM. C. BROWN COMPANY PUBLISHERS, 135 S. Locust St., Dubuque, Ia. 52001 / Page 63 I COMPUTERS and AUTOMATION for March, 1971 ....... __ ............_ . _ - - - - - - - - - - - - - - **************************** NUMBLES NUMBER PUZZLES FOR NIMBLE MINDS -AND COMPUTERS Neil Macdonald Assistant Editor Computers and Automation Los Angeles Trade - Technical College and V.C.L.A. Extension A "numble" is an arithmetical problem in which: digits have been replaced by capital letters; and there are two messages, one which can be read right away and a second one in the digit cipher. The problem is to solve for the digits. Each capital letter in the arithmetical problem stands for just one digit 0 to 9. A digit may be represented by more than one letter. The second message, which is expressed in numerical digits, is to be translated (using the same key) into letters so that it may be read; but the spelling uses puns or is otherwise irregular, to discourage cryptanalytic methods of deciphering. We invite our readers to send us solutions, together with human programs or computer programs which will produce the solutions. This month's Numble was contributed by: Stuart Freudberg Newton High School Newton, Mass. NUMBLE 713 MAN I S x H CRT H H CFL = STM = CTN S 0 AHCS R ADD I R D H Prob. 600 pages-7V4" x 9Va"-cloth-1971-Prob. $9.95 INTRODUCTION TO DATA PROCESSING emphasizes the fundamental principles, the importance of data processing and the necessary guides for successful data processing appl ications. From the introductory explanations the reader is ;·ven a concise, clear and basic understanding of data proc ssing, and the important aspects of the field. To facilitate co plete coverage of the area, subjects such as data processing history, the role of punched card, data representation in the computer, computer components and programming, modern third generation programming languages (BAL, COBOL, RPG, FORTRAN, PL1), are covered. Emphasis throughout is on business data processing applications. The final section deals with the management function of a computer system. Of Special Note ... Workbook, Teacher's Manual Available • • No previous knowledge of data processing is required. Comprehensive presentation of important programming languages. Inclusion of IBM/3, a most recent added dimension to Punched Card Data Processing. Coverage of BASIC programming language. * I ** ** I* ** ** ** ** ** I 480 pages-8V2" x 11"-paper-1969-$8.75 THE AF E I S L *t UJcb brings you t three books by ••• *t Carl Feingold, CPA, CDP *** ~~ INTRODUCTION TO I** '4IlII DATA PROCESSING * ** ** * *** *** * .. ** . ** FUNDAMENTALS OF PUNCHED CARD DATA PROCESSING *** ** # * 4278 0963 5595 Solution to Numble 712 In Numble 712 in the February issue, the digits 0 through 9 are represented by letters as follows: S=O F,V=5 R=1 N=6 H=2 E=7 T=3 0=8 D=4 U=9 The message is: The fed hound never hunts. Our thanks to the following individuals for submitting their solutions - to Numble 711: C. L. Agrawal, Claymont, Del.; Marijoe Bestgen, Riverdale, N.Y.; Debra Bruno, Cliffside Park, NJ.; T. P. Finn, Indianapolis, Ind.; John H. MacMullen, Eden Prairie, Minn.; L. J. Mathiason, Chillicothe, Ohio; G. P. Petersen, st. Petersburg, Fla.; Vincent K. Roach, New York, N.Y.; Harold L. Smith, Thomson, Ga.; and Robert R. Weden, Edina, Minn. - to Numble 7012: Marijoe Bestgen, Riverdale, N.Y. and G. P. Petersen, St. Petersburg, Fla. - to Numble 7011: Bill Call, Saginaw, Mich. and Lee Olson, Delaware, Ohio - to Numble 7010: SSG Raymond L. Cowen, Gunter AFB, Ala. and Krishna Moorthy, Kanpur, India. COMPUTERS and AUTOMATION for March, 1971 I I ** ** ** ** ** ** ** ** ** *** **# I FUNDAMENT ALS OF PUNCHED CARD DATA PROCESSING presents the basic operations of punched card equipment. Initially, the book explains the various punched card machines as to operations as well as the wiring of necessary control panels. Then it considers the relationships of punched card equipment and the computer, emphasizing such items as flow charting principles. Each chapter contains the operational and panel wiring. A Teacher's Manual is available. Of Special Note ... • Composite catalogue of basic machine operations which lists entire operation of each machine. • Presents wiring of necessary control panels with operational and panel wiring in each chapter. • Shows relationship and function of machines. • Considers relationship of punched card operations to computer processing. Teacher's Manual contains: Key to questions after each chapter in text, answers to problems at end of text. Semester project and overall solution to it, and teaching suggestions. FUNDAMENTALS OF COBOL PROGRAMMING 272 pages-8V2" x 11"-palJer-1969-$6.95 FUNDAMENTALS OF COBOL PROGRAMMING is written in simple outline form and describes the characteristics of COBOL and provides rules for writing in COBOL. Illustrative programs and examples of COBOL statements are included. Geared to the 360 Computer, this text contains detailed explanations accompanied by examples with step-by-step presentation of rules for writing in COBOL. Of Special Note ... • Includes latest COBOL specifications and all new improvements of COBOL. • Describes characteristics of COBOL in detail. For examination copies write Mrs. Carolyn Gantz VVM. C. BROVVN COMPANY PUBLISHERS 135 South Locust Street, Dubuque. Iowa 52001 *** ** ** ** ** ** ** ** ** ** I I ** # ************************** The New York Times and Computers and Automation announce a practical guide to the most elusive components in computers and data processing ... PEOPLE Who they are ... What they do ... Where they do it ... I \ '1 .. , • H .1 ~ •i ~ 15 ~ 2 ~ It fnH !§H ~I !~ ~ ~ ~; ~ ~ l.l<. f§ ~ =~ I ~ ~ ~H ~gij 1~. BH g~c aD !1lI Z. tilz ~c :1 ~~ ~~ ~ifj I z I.~ t » 0 t r g I: ~ ~ -~ ffi I ? i? Until now, it has been well-nigh impossible to keep track of the thousands of highly skilled professionals engaged in the world's fastest growing profession. The painstaking task required to inventory the qualifications and backgrounds of the 15,000 most necessary professionals in every branch of the computer field has now been accomplished. The oldest magazine in the field, Computers and Automation, and the information retrieval services of The New York Times have pooled their resources to produce the Fifth Edition of WHO'S WHO IN COMPUTERS AND DATA PROCESSING This is the most extensive register of computer professionals ever published - the first of its kind in seven years. It is arranged for your convenience in three volumes: 1. Systems Analysts and Programmers 2. Data Processing Managers and Directors 3. Other Computer Professionals (from professors of computer science to attorneys versed in the computer field) Each of the more than 15,000 specialists is covered by a separate capsule biography detailing: Birth Date ... Education . .. Year Entered Computer Field ... Title ... Honors ... Memberships . .. Special Skills (from applications to logic to sales) ... PLUS both home and business addresses. For example: CHAPIN, Ned / consultant / born: 1927 / educ: PhD, lIT; MBA, Univ of Chicago / entered computer field: 1954 / main interests: applications, business, logic, management, programming, systems, data structures / title: data processing consultant / organization: InfoSci Inc, Box 464, Menlo Park, CA 94025 / publications, honors: 3 books, over 50 papers; member, over 12 associations; CDP; lecturer for ACM / home address: 1190 Bellair Way, Menlo Park, CA 94025 This unique reference is particularly useful not only for personnel managers, employers and recruiting organizations but also for libraries, conference planners, directors of computer installations . . . anyone who needs to keep up with the peopIe who count in the field. - Reduced Pre-publication Price. h . bill b T e reservatIOn form e ow wi ring you the 3-volume set at the reduced price of $60 ... an immediate saving of $15 from the regular price of $75. There is no risk involved. 10Day Free Examination. WHO'S WHO IN COMPUTERS AND DATA PROCESSING Edited by Edmund C. Berkeley 3 volumes in durable hard-cover bindings Retail price $75 the set Pre-Publication Price $60 - --- - - - - - - - - - - - - - - - --- - - - - - - Who's Who in Computers and Data Processing, -", 815 Washington St., Newtonville, Mass. 02160 Please send 3-volume set WHO'S WHO IN COMPUTERS AND DATA PROCESSING at pre-publication price of $60 (regularly $75). You will bill me after delivery and I may return the set within 10 days if not fully satisfied. l t l r NAME I TITLE ORGANIZATION ADDRESS CITY YOUR SIGNATURE STATE & ZIP P.o. # (IF COMPANY ORDER) o Check here if you also wish to receive COMPUTER DIRECTORY AND BUYER'S GUIDE Comprehensive geographical listing of: Computer and data-processing services, commercial time-shared services, courses and seminars, consulting services, leased equipment, software, campus computer centers, computer associations, users groups. PLUS: More than 2,000 applications of computer and data processing equipment, a world computer census - and more! Order now at $20 L~~~~icatio~25~ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _~ I I )
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Producer : Adobe Acrobat 9.1 Paper Capture Plug-in Modify Date : 2009:03:24 21:45:23-07:00 Create Date : 2009:03:24 21:45:23-07:00 Metadata Date : 2009:03:24 21:45:23-07:00 Format : application/pdf Document ID : uuid:7d43d3e2-61fd-490e-b3e2-0f62a10f1f02 Instance ID : uuid:4363ff25-29db-47c7-a46a-69e31fed8d1e Page Layout : SinglePage Page Mode : UseNone Page Count : 60EXIF Metadata provided by EXIF.tools