197109

197109 197109

User Manual: 197109

Open the PDF directly: View PDF PDF.
Page Count: 52

Download197109
Open PDF In BrowserView PDF
/

.

SCIENCE Be TECHNOLOGY

September, 1971
Vol. 20, No.9

CDI •• puters
and automation

Computer
Prints
Kanji

IN THIS ISSUE: Management, the Computer, and Society

-

Martin Ernst

Computers and the Nation

-

Dr. Edward E. David, Jr.

Security in On-Line Systems

-

Richard A. Hirschfield

Information Systems in Urban Governments -

~

PERl180

b

Dr. Robert Keston

'-.

IP02121 9904 7112

1[2'III- 01572 *0

PERIUDICAL f
180 W SAN CARLOS ST
SA J SE CA

95113

Announcement

The Most Important of All Branches of Knowledge
(Based on the editorial in the April 1971 issue of Computers and Automation)
It may be that there is a branch of knowledge which is
the most important of all.
I[ so, I would maintain that it is a subject which used to
have the name "wisdom" but nowadays does not have a
recognized scientific name, or in any college a recognized
department or faculty to teach it. This subject currently is a
compound of common sense, wisdom, good judgment,
maturity, the scientific method, the trained capacity to
solve problems, systems analysis, operations research, and
some more besides. Its earmark is that it is a general
subject, not a special one like chemistry or psychology or
astronautics. Useful names for this subject at this time are
"generalogy" or "science in general" or "common sense,
elementary and advanced".
Many editorials published in <'Computers and Automation" have in one way or another discussed or alluded to
this subject:

Examples, Understanding, and Computers / Decemberl964
The Barrels and the Elephant: Crackpot vs. Pioneer /
May 1965
Some Questions of Semantics / August 1965
Perspective / April 1966
Computers and Scientific Models / May 1967
New Ideas that Organize Information / December
1967How to Spoil One's Mind - As Well as One's
Computer / August 1968
The Catching of Errors by Inspection / September
1968
Tunnel Vision / January 1969
The Cult of the Expert / May 1969
Computers, Language, and Reality / March 1970
Computers and Truth / August 1970
The Number of Answers to a Question/March 1971
In the editorial "The Cult of the Expert" we offered a
leaflet that belongs in this subject, "Right Answers - A
Short Guide for Obtaining Them". More than 600 readers
asked for a copy; so clearly this subject is interesting to the
readers of C&A.
This subject is related to computers and the computer
field in at least two ways:
First, many of the general principles which this subject
contains can be investigated in experimental or real situations by means of a computer. In fact, far more can be
investigated by computer than can possibly be investigated
by ordinary analytical mathematics.
Second, since computer professionals are in charge of
computing machines, many people consider these professionals responsible for the worthwhileness of the results of
computers. Because of "garbage in, garbage out", computer
professionals have a responsibility to apply common sense
and wisdom in at least three ways:

Input - in the selection and acceptance of the data
with which they begin;
Processing - in the processing through a system;
Output - in the interpretation and use of the answers.
Then the computerized systems will produce stIOng structures that human beings can use and rely on, and not weak
structures which will crash with false information or ridiculous results.
" 'C~mputers and Automation" for April 1971 contains an
article, "Common Sense, Wisdom, General Science, and Computers", which deals with this subject. For more t~an a dozen years I have been studying this subject - ever SInce I searched in avery large and good public library for a textbook ?n
common sense or wisdom and found none at all. There IS,
however, a great deal of Information to be gathered on this
subject because a large number of great men, ancient, medieval, and modern, have made remarks and comments (usually while talking or writing about something else) that belong
in this subject.
. . ,
. The subject of wisdom is parttcularly Important III these
modern days. The subject has been neglected, while special
sciences have been cultivated. Investigators have pursued
the special sciences with the enthusiasm of a child with a
new toy. Specialized science and specialized technology
have rendered our earthly world almost unrecognizable:
All major cities on the planet are only a few hours
apart by jet plane.
.
Millions upon millions of people who otherwIse
would be dead are alive because of miracle drugs,
- thus creating a population explosion;
Nuclear weapons if used can destroy mankind and
civilization in a few hours; etc.
To deal with so many diverse, vast ,problems we need
wisdom. To use wisdom we should study it.
The staff of "Computers and Automation" have decided
that it is desirable to make the drawers full of information
we have been collecting on this subject more accessible and
more widely distributed. We have decided to publish twice
a month a publication of newsletter type called "The C&A
Notebook on Common Sen~e, Elementary and Advanced".
For more details, see the announcement on page 3 opposite.
(The first few issues of the Notebook are free.)
We invite you, our readers, to join us in the pursuit of
this subject, as readers of the Notebook, and as participators with us in the research and study.
Wisdom is a joint enterprise - and truth is not shaped so
that it can fit into thepalm of anyone person's hand.

DO YOU WANT TO

PREVENT MISTAKES BEFORE THEY- HAPPEN?
- avoid pitfalls?
- find new paths around old obstacles?
- apply in practical situations the observations and
wisdom of great scientists and wise men?
- stimulate your resourcefulness?

IF SO, TRY-

- see new solutions to old problems?
distinguish between sense and nonsense?
increase your accomplishments?
improve your capacities?

The C&A Notebook on
\ND ADVANCED

dE

le of the most important
f\IT=

+

+

+

+

:oupon - THE NEXT 16 ISSUES ARE:

Editor: Edmund C. Berkeley,
author, businessman, actuary,
scientist, computer professional
first secretary of the Associatio
for Computing Machinery 194J
editor of Computers and Auton

RETURNABLE IN 7 DAYS
FOR FULL REFUND, IF
NOT SATISFACTORY WHY NOT TAKE A LOOK?
..... HOW CAN YOU LOSE?

?reventing Mistakes from Failure
to Understand
['he Stage of Maturity and Judgment
in any Field of Knowledge and
Experience
'oomsday in St. Pierre, Martinique
- Common Sense vs. Catastrophe
he History of the Doasyoulikes
dividuality in Human Beings, .••
)w to be Silly
Ie Three Earthworms
.e Cochrans vs. Catastrophe

San Jose

Public Library
fOR OVERllME A GHARGE Of 5 GENTS

~

DAY

I
of books is expected and any soiling,
COMPUTERS AND.
Careful usu~e .
b
uid for by the borrower,
815 Washington St. ,
damage or loss 1S to c P
___ ~~uUHVll .::len'se at $12 a year,
YES, please e
24 issues ,___ .. ~.L"'''''C.L· :;LYle), and extras.
Please send me (as FREE premiums for subscribing) the first six issues:
1. Right Answers - A Short Guide to Obtaining Them
4. Strategy in Chess
2. The Empty Column
5. The Barrels and the Elephant
3. The Golden Trumpets of Yap Yap
6. The Argument of the Beard
I enclose $
( ) Please bill me
) Please bill my organization
Name ______________________________________________________ Title_______________________

To:

Organization ________________________________________________________________________________________
Address ____________________________----_____________________________________________________________
Signature___________________________________________________ Purchase Order No, ______________________

+

Vol. 20, NO.9
September, 1971

corn I?nHE!,!:i!

The magazine of the design, applications, and implicat?:ons
of infoTmation pTocessing systems.

Computers and Security of the Business
15
Editor

Edmund C. Berkeley

Assistant Editors

Linda Ladd Lovett
Neil D. Macdonald

Software Editor

Stewart B. Nelson

Advertising
Director

Edmund C. Berkeley

Art Directors
Contributing
Editors

Advisory
Committee

Ray W. Hass
Daniel T. Langdale

Compu ters and Cities
21

John BenneH
Moses M. Berlin
Andrew D. Booth
John W. Carr III
Ned Chapin
Alston S. Householder
Leslie Mezei
Ted Schoeters
Richard E. Sprague

SECURITY IN ON-LINE SYSTEMS - A PRIMER FOR
[T A]
MANAGEMENT
by Richard A. Hirschfield, Executive Vice President, Computer
Audit Systems, Inc.
How an on-line computer system can be protected by: preventing illegal access to data; controlling the data received at the
computer from remote locations; providing for back-up systems;
and auditing the system.

[T A]
INFORMATION SYSTEMS IN URBAN GOVERNMENTS
by Dr. Robert Keston, President, Keston Associates
The integration and reorganization of various units of local
government permits successful use of computerized information systems for solving urban problems.

Computers Abroad
18

James J. Cryan
Alston S. Householder
Bernard Quint

THE JAPANESE COMPUTER MARKET - CHARACTERISTICS
ADVERSELY AFFECTING U.S. TRADE INTERESTS
[T A]
.... Part Two
by Stephen T. McClellan, Analyst, U.S. Department of Commerce
How the Japanese government protects its computer industry
by financial controls on foreign computers.

Computers and Society
Editorial Offices

Advertising
Contact

Berkeley Enterprises, Inc.
815 Washington St.,
Newtonville, Mass. 02160
617-332-5453

THE PUBLISHER'
Berkeley Enterprises, Inc.
815 Washington St.,
Newtonville, Mass. 02160
617-332-5453

Computers and Automation is published monthly
(except two issues in June) at 815 Washington
St., Newtonville, Mass. 02160, by Berkeley Enerprises, Inc. Printed in U.S.A.
SUDscription rates: United States, 11 monthly
issues and two issues in .June (one of which
is a directory issue) - $18.50 for 1 year, $36.00
for 2 years; 12 monthly issues (without directory
issue in June) - $9.50 for 1 year; $18.00 for
2 years. Canada, add 50¢ a year for postage;
foreiqn, add $3.50 a year for postage. Address
all U.S. subscription mail to: Berkeley Enterprises,
Inc., 815 Washington St., Newtonville, Mass.
02160. Second Class Postage paid at Boston, Mass.
Postmaster: Please send all forms 3579 to
Berkeley Enterprises, Inc., 815 Washington St.,
Newtonville, Mass. 02160. © Copyright 1971, by
Berkeley Enterprises, Inc.
Change of address: If your address changes,
please send us both your new addre~~ and your old
address (as it appears on the magazine address
imprint), and allow three weeks for the change to
be made.

4

8

[T A]
MANAGEMENT, THE COMPUTER, AND SOCIETY
by Martin Ernst, Arthur D. Little, Inc., Cambridge, Mass.
Large groups of people can be hurt by expansion in the range of
computer activities ... and it is desirable for businessmen to
recognize these problems, and make an effort to overcome them.

12

[NT A]
COMPUTERS AND THE NATION
by Dr. Edward E. David, Jr., Science Adviser to President
Richard M. Nixon
How computers might become a major resource for the nation.

Computers, Common Sense, Wisdom, and Science in General
6

NINE AND NI-YEN
[NT E]
by Edmund C. Berkeley, Editor, Computers and Automation
Human beings are able to function with many kinds of inaccuracies, confusions, and perplexities. Computers can't. The
interaction is producing a desirable pressure on the conventional behavior of human beings.

2

THE MOST IMPORTANT OF ALL BRANCHES OF
KNOWLEDGE
Common sense, wisdom, and science in general.

[NT F]

3

THE C&A NOTEBOOK ON COMMON SENSE, ELEMENTARY
AND ADVANCED
[NT F]
Announcement

7

NEWS AND DEVE LOPMENTS

[NT F]

COMPUTERS and AUTOMATION for September, 1971

Computers, Communications, and Cryptography
36

COMMUNICATION AND CIPHERS, WITH A HEXADECIMAL
ALPHABET AND VARIATIONS
[T A]
by O. N. Minot, Lexington Research, the Editor, and
Neil Macdonald, Assistant Editor
The use of computers to produce ciphers, to perform enciphering and deciphering, and to solve ciphering systems, probably
allows a new level of complexity in ciphering systems to become practical.

Front Cover Picture
Computers, Science, and Assassinations
26

THE FEDERAL BUREAU OF INVESTIGATION AND THE
ASSASSINATION OF PRESIDENT KENNEDY
[NT A]
by Bernard Fensterwald, Jr., Attorney
How J. Edgar Hoover and the FB I withheld much pertinent information from the Warren Commission, flooded them with
irrelevant information, and altered some important evidence,
thus concealing Oswald's connections with the FBI.

Computers and Unemployment
30

THE UNEMPLOYED COMPUTER PROFESSIONAL TURNED
BUSINESSMAN: PRODUCTS AND SERVICES WHICH A
NEW SMALL BUSINESS MIGHT PRODUCE OR OFFER
[NT A]
by Edmund C. Berkeley, Editor
How an unemployed computer professional might go into
business for himself and earn a reasonable income as his own
employer.

The Golden Trumpet
32

"90 Million People Fully Employed in 80 Million Jobs"
- Comments

[NT G]

Computers in an Anti-Ballistic Missile System
33

I Believe in an Anti-Ballistic Missile System
by R,obert L. Glass and the Editor

33

A Publication that Thinks About the Profession and the
Relation of the Profession to Society
by Michael Lipp, Cybermatics Inc.

34

One Computer Professional for the Anti-Ballistic Missile System
by Ronald G. Windsor, Harford Junior College

34

Seven More Computer Experts Become Sponsors of Group
Against ABM
by M. Kozikowski, Computer Professionals Against ABM

[T F]

[T F]

[T F]

[T F]

35

"The Anti-Ballistic Missile System is Defensive"
from Patrick M. Cooney to Daniel D. McCracken

[T F]

35

Gathering Force Against the ABM
[T F]
based on a report by Victor K. McElheny, "The Boston Globe"

Computers and Puzzles
7
48

Problem Corner, by Walter Penney, COP

[T C]

Numbles, by Neil Macdonald

[T C]

COMPUTERS and AUTOMATION for September, 1971

The front cover shows an impact printer which, together with
a keyboard attachment, can input
or output to a computer over
10,000 different characters. These
may be ideographic, alphabetic,
or symbolic, including Kanji ideograms (shown in the background),
the Hiragana and Katakana alphabets, the Roman alphabet (upper
or lower case), Arabic numerals,
and other symbols. The two peripherals will be manufactured in
Japan by I BM Japan Ltd. For
more information, see page 43.
NOTICE
*0 ON YOUR ADDRESS IMPRINT
MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTER
DIRECTORY. *N MEANS THAT
YOUR PRESENT SUBSCRIPTION
:DOES NOT INCLUDE THE COMPUTER DIRECTORY.

Departments
40
40
41
42
48
49

Across the Editor's Desk
Applications
Education News
Mi scell aneous
Advertising Index
Calendar of Coming
Events
32, 48 Corrections
45
Monthly Computer
Census
43
New Contracts
44
New Installations

Key
[A]
[C]
[E]
[F]
[G]
[NT]
[T]

-

Article
Monthly Column
Editorial
Forum
Golden Trumpet
Not Technical
Technical Computer
Information
5

c. a

EDITORIAL

NINE AND NI-YEN

The use of computers is having a wholesome and
beneficial influence on a number of strands of the conventional behavior of human beings. In this respect, computers
are exerting an influence like the influence of big capital
cities, and like mass communication systems such as radio
and TV; these have caused the decline of linguistic dialects
and the decrease of provincialism, among other things.
Computers are exerting profound influences on the human
uses of symbols and language.
More Systematic Symbols
For example, mathematicians have had until recently a
habit of designating various rather simple mathematical
ideas with ideographic symbols that are rather strange and
forbidding to ordinary human b,eings. For example, an
integral is often designated by the ideogram J ; an ideogram
is a single picture, a diagram, or nonalphabetic symbol for
an idea; the biggest ideographic system in existence is the
system of Chinese characters. The ideogram J is derived
from an old form of capital letter S, and Was chosen in
order to allude to the initial letter of the word sum; it refers
to the fact that an integral is a certain kind of sum. The
symbol has an exact meaning that usually takes about
twenty words to express, but is often read aloud by
mathematicians as "the integral of'.
But if a mathematician wishes to use this concept in a
computer programming language, he regularly has to submit
to the diScipline of a regular typewriter keyboard with 42
keys and two shifts for producing 84 letters, figures, and
signs. And so he is compelled to use the far more general
and basically much more sensible alphabetic system of
symbolizing which employs a string of several letters together, such as INT or INTG to stand for "the integral of".
In trigonometry the alphabetic system has been used for
more than 70 years; the usual trigonometric symbols are
SIN, COS, TAN, COT, SEC, and CSC.
The alphabetic form of symbolizing will increase, the
ideographic form will decrease, as the result of the use of
computers.
6

More Distinguished Sounds
When we turn to spoken symbols, we notice that the use
of machines to understand spoken words is just beginning.
Among the first words which a listening machine (or
listening peripheral for a computer) will need to distinguish
are the spoken words for the ten decimal digits: ONE,
TWO, THREE, FOUR, FIVE, SIX, SEVEN, EIGHT, NINE,
ZERO (or OH). Nowadays even human beings listening
often have trouble deciding whether a speaker is saying
FIVE or saying NINE. So the telephone company has
suggested using the pronunciation NI-YEN.
This suggestion often calls forth from many human
beings the silly laughter and ridicule which expresses their
resistance to change. These are the people who would
rather believe what they already believe than make any
effort to change their minds for valid reasons. In other
words, they would rather die than think - and often do. It
is an unusual person who can reply like the famous
Irishman who, when asked why he had changed his mind
and run away from a battle, replied, "I'd r-r-ruther be a
cowar-r-rd for five minutes than a cor-r-rpse for the r-r-rest
of me life."
NI-YEN is a good suggestion, and there are many more
like it. Everybody who is interested in a better future - one
which holds less confusion than our days do _. should try
to implement NI-YEN and its relatives. In this way we give
the listeners the breaks, rather than the dictionaries, which
regularly report only good current usage - and do not add
such a remark as "the recommended new pronunciation is
NI-YEN".
Less Sloppiness
Another significant influence of computers on conventional human behavior is the increased requirement computers place on human beings to be more accurate and
more complete - less sloppy. Nowadays, computer programs only rarely apply common sense to words and
figures, and "recognize from the context" that certain
COMPUTERS and AUTOMATION for September, 1971

words must be wrong. In the printing of an article to be
read by human beings, a proofreader can let slip by the
word "bandwith" instead of "bandwidth" (as we unfortunately did on page 30 of "Computers and Automation"
for April). Human beings (though not computers) are likely
to guess the correction needed, in fact may not even detect
the error.
But a computer is sensitive to the spelling of the symbols
that its program works with. There is on record the miss of
a Mariner space probe to Mars; it missed Mars, as I recollect,
because at one point in the computer program there was a
hyphen instead of a blank.
Human beings are able to function with ideograms,
insufficiently distinct pronunciations, incorrect spellings,
imprecise words, and many other kinds of inaccuracies,
confusions, and perplexities. This occurs mainly because
human beings come equipped with a built-in evaluating
function which uses observations, context, surroundings,
experience, judgement, and capacity to decide. So a human
being can easily say, "She told me 'I hate you', but I know
she did not mean that." A computer program can't behave
that way at all easily.
This evaluating function clearly is derived from more
than 300 million years of evolution, during which living
species developed capacities to solve problems of finding
food, judging food, finding shelter, escaping from danger,
etc. I would like to call the evaluating function "the old
brain". The evaluating function does not include symbolic
language, a facility which probably has not evolved for
much more than 3 million years, although the evaluating
function can of course be applied to symbolic language.
The handling of symbolic language is in "the new brain", in
the human brain and perhaps in the dolphin's brain.
Computers behave very differently. Within a computer
there is a very close correspondence between ideas and
strings of symbols. Computer programming for reasonable
operations, and computer representations for reasonable
data, are very systematic. And so computers require from
human beings behavior which is more sensible, reasonable,
accurate, complete, and systematic than human beings have
ever been accustomed to providing. This is a desirable
pressure.

PROBLEM CORNER

Walter Penney, CDP
Problem Editor
Computers and Automation
PROBLEM 719: MESSAGES IN MATH?

"Abe is a queer combination of mystic and computer
Pete said. "He sees all sorts of meanings in things
we'd never give a second thought to."
"What is he seeing now?" asked Dick. "Not some more
hexadecimal output spelling out his name, I hope."
"No, not this time. He's trying to figure out why he got
the number of this year as a solution to one of his
problems. He's sure there's something significant there."
"What problem is that?"
"Well, he decided he would try to disprove. Fermat's
Last Theorem by fmding an integral solution of Y! + y3 =
z3. He had the crazy idea that he might be able to creep up
on it by easy stages, first solving x 2 + y2 = Z3, then x 2 + y3 =
Z3, and fmally x 3 + y3 =r."
"Did he ever succeed?" Dick was beginning to get
interested.
"No, of course not. Actually he got sidetracked and
never got beyond the first equation. The first solution he
had x = 1971 and he was sure the
got for x2 + y2 =
computer was trying to tell him something. I don't know
how much machine time he's wasted trying to figure this
out."
"What were the values of y and z?"
"Suppose we leave that as an exercise for the student",
said Pete with a smile.
man'~,

r

What were the values of y and z?

Solution to Problem 718: Odds on Aces

The probability of getting an Ace in the first seven cards

24-23-22-21-20-19-18
is 1 - 26-25-24-23-22-21-20

=

154
.
325 or .474 approxl-

mately. Hence the odds were against Joe.

Edmund C. Berkeley
Editor

Readers are invited to submit problems (and their solutions) for
publication in this column to: Problem Editor, Computers and
Automation, 815 Washington St., Newtonville, Mass. 02160.

The C&A Notebook on COMMON SENSE, ELEMENTARY AND ADVANCED We are much encouraged by the subscription enrollment so
far in "The C &A Notebook on Common Sense, Elementary and
Advanced". Although no subscription solicitations have been
mailed so far, our subscribers to the Notebook (at present
writing almost 200) include many very thoughtful people and a
number of large, important organizations.
As a result, it seems clear: first, that the Notebook is filling a definite need; and second, that we can do some things that
we had hoped to do, but were not at the start ready to promise
to do, namely:
(1) Include as dividends in the first volume at least 6 more
issues, making the total issues in Volume 1 at least 30;
(2) Focus from time to time on ideas that are worth their
weight in gold;
COMPUTERS and AUTOMATION for September, 1971

NEWS AND DEVELOPMENTS

(3) Continue to mail all issues by first class mail; and
(4) Continue to start all subscribers at Vol. 1, No.1, so
that no one loses earlier published information.
The contributions of essays and reports that have so far
been received from the two dozen Participators in the project
are in general much more interesting and much more squarely
on the subj ect than we had anticipated.
So the project of investigating common sense, wisdom,
and science in general, and their relations to computers appears to be one of the most interesting and important projects
that "Computers and Automation" and its supporters have ever
undertaken. Of course, computers are an ideal resource for investigating situations, environments, and problems in general.
For more information, see pages 2 and 3 of this issue.
7

MANAGEMENT, THE COMPUTER, AND SOCIETY

"It is important to recognize the existence of many factors which can operate
to make the compu ter socially unpalatable. "

Martin Ernst
Arthur D. Little, Inc.
25 Acorn Park
Cambridge, Mass. 02140

(Based on a talk to businessmen in Boston, Mass., June 9, 1971)

Seventeen years ago the first attempt was made to put a
computer to routine industrial use. In 1953, General Electric tried to place their local payroll on a computer at
Appliance Park. From all accounts, they had a terrible time.
It took many months; major difficulties were encountered;
and, all in all, it was a very painful process.
If you want to buy a computer today, Neiman-Marcus
will be glad to supply you with a Honeywell machine for
home use - if you can figure out what you want to do with
it. So, computers have moved from a rarity to something
we encounter almost every day in one form or another.
Cost Reductions

Growth in the computer business has been fed by
technological advances that have made computing equip-

ment cheaper and better each year; and technological
progress is defmitely going to continue at a high rate for at
least another decade. For example, we can expect approximately a doubling in speed of large central processors,
during the next five years or so and a halving in cost per
unit of computer power. Even more dramatic improvements in mini-computer cost-effectiveness seem assured.
Gains by a factor of as high as ten may be possible prior to
1980.
For a long time, high speed core memory has been an
expensive item in computer configurations. These memories
will probably improve in access time by a factor of four in
the next decade, and their costs will probably decrease by a
factor of between four and eight. Low speed memory in the
past has tended to be monopolized by magnetic tapes or by
fairly clumsy random access equipment. Now it is technically possible to build devices that, for all practical
purposes, have infinite memory capacity and modest costs,
although they will be relatively slow of access.
Cheaper Peripherals

Martin L. Ernst pioneered in operations analysis and systems
development. As Associate Director, he was responsible for
most of the research done by the Operations Analysis Group
operated by Massachusetts Institute of Technology for the
Chief of Naval Operations. His projects at Arthur D. Little
include one of the world's largest non-government on-line
systems and the currept attack on Wall Street's paper crisis.
Mr. Ernst is a past President of the Operations Research
Society of America.

8

With these equipment cost reductions under way,
peripherals such as input/output terminals have become a
major factor in the cost of modern installations; but even
these are going to become cheaper as we move from
mechanical devices, with their high production and maintenance costs, to all-electronic systems. Finally, there is a
strong likelihood that the entire data insertion process will
be revolutionized before the end of the next decade
through the introduction of voice control mechanisms and
COMPUTERS and AUTOMATION for September, 1971

inexpensive, broadly useful character recognition equipment.
Stage Three

As equipment is becoming more diverse, efficient and
cheaper, we are entering what sometimes is called Stage
Three of computer usage. We have passed through the
earlier periods, when the computer's capability was limited
to performing 'simple clerical operations, or to producing
routine decisions in areas such as inventory control. Now
the primary excitement is in how computers can aid in
major management decisions.
Social Problems of Computers

I could devote considerable space to discussing the
problems of using computers for management decisionmaking, but there is another family of problems that is even
more deserving of attention - what I will call the social
problems associated with the use of computers. First, let
me explain why I have selected this subject. Fundamentally, I happen to be a believer in computers - in the sense
that I think they can help us perform a great range of tasks
better, while relieving us of a lot of boring, routine, human
operations. However, I think it important to recognize the
existence of many factors which can operate to make the
computer socially unpalatable.
There are large groups of people who can be hurt by
expansion in the range of computer activities and there is a
lot of fear - both justified and unjustified - of such
developments. Many of the sources of concern arise in a
business context and businessmen can alleviate some of
them. So, I seek to call the attention of businessmen to
these problems in the hope that you will recognize them in
your own use of computers and will make the effort to
overcome them. By doing this it will be possible to tay-e
relatively full advantage of computers without paying undue social penalties.
Although I repeatedly refer to the computer, I am
concerned not with the computer itself but with the many
activities and operations which it makes possible and
economical. The computer is a tool and no more responsible for its use than the gun employed in a murder;
however, in both instances, those who build and sell these
tools, and those who have legitimate and desirable uses for
them, have an obligation to participate actively in measures
to prevent their misuse. The problem of personification of
computers is not a theoretical one: a small society of
professionals has already been organized to combat this
tendency. Somewhat related, a major computer manufacturer is placing advertisements devoted to the question
of whether computers are "for or against us."
Early Warnings of Social Dangers

We have had early warnings of the social dangers in the
growth of computer usage; for example, Norbert Weiner
raised important questions many years ago in his first book
on cybernetics. However, until recently these warnings
meant very little - computers played too small a role in
society to make their unpleasant aspects very painful. Our
period of grace is now coming to an end. It would be good
to give you a well structured and orderly statement of the
origins of our problems and their potential cures. But, I
don't believe we have reached a stage in understanding that
permits this. The best I can do is to share with you some
COMPUTERS and AUTOMATION for September, 1971

examples, ideas, and suggestions that are still in a formative
stage, in an effort to begin more productive thinking.
To help present these tentative ideas, I have divided
computer impact into three broad areas: depersonalization,
talent bias and vulnerability. These terms can best be
explained by citing some examples.
Depersonalization

The origins of depersonalization lie in the high degree of
standardization needed to use computers efficiently. As
computer activities spread their influence, individuals tend
to feel that they are being molded to fit the computer's
needs rather than that the computer is being employed to
meet their needs. It probably is no accident that, during the
first of the major campus riots at Berkeley, resentment was
directed to the punch cards and computers that students
claimed made them feel more like numbers than like
people.
Airlines Systems

A more concrete example lies in airlines reservations
systems. A few of the largest airlines have been able to plan
and develop computer reservations systems tailored to meet
their own particular needs, but this process is difficult and
expensive. Smaller airlines have no choice but to select an
existing package of programs and attempt to modify them
to fit their own character and style. I know of one case
where a review indicated a need for some 60 significant
program changes in an available package if the resulting
system was to match the operating procedures and philosophy of the airline. When the effort for performing such a
surgical operation was investigated, the airline decided it
could afford almost none of these desirable changes. It now
operates like every other airline employing the same basic
system and has lost a bit of its special personality and
flavor.
Billing Operations

Another unpleasant encounter with computers, which I
am sure we all face, involves dealing with a company that
has automated its billing operations. At first I had faith that
this would be a transient situation but during the preparations for this talk I found that this is not the case. One
associate of mine is currently going through the excruciating process of unsnarling his financial obligations to a
successful, widely known and highly efficient organization,
while another associate went through exactly the same
process - and for the same reasons - with the same
company as much as six years ago. The problem arises from
the fact that it is always difficult to insert an exception into
a computer run. This difficulty is compounded if an
organization seeks to get by with minimum training of the
clerical staff that examines the customer input of payments
and complaints about misbilling. The final result is that the
customer writes letter after letter into a non-answering
void, with resentment growing at each cycle.
There are ways for the individual to deal with these
mis-billings and to achieve fairly prompt satisfaction. However, it's probably only the more sophisticated of our
population who will learn these methods. The poor and the
less educated are ill-prepared to deal with these situations;
they are far more apt to accept errors and try to pay, but
they do this with a sense of resentment and growing
dissa tisfaction.
9

Dealing With Exceptions

I regard this as a real business failure. Planning to deal
with exceptions has been completely inadequate in the
design of most computer billing systems and their associated manual procedures. There seems to be little excuse for
this. Very few companies have difficulty picking up changes
of address in the blank spaces provided for this purpose on
most bills. No company with which I have had contact has
similarly provided a set of blank spaces for their customers
to register disagreement with the billing data reported to
them!
Load Balancing

There are many other examples associated with standard
customer-business relationships. We are all subject to some
of the penalties of load balancing, which has become an
important requirement of all major computer installations.
Instead of consistently getting bills to be paid by the ttmth
of the month, as was the case in my father's day, bills keep
streaming in throughout the month as various service
installations attempt to keep their computers loaded
evenly. With delays in computer output and mail delivery,
and interest penalties for slow payment, one has to keep
the checkbook constantly on hand.
These are all minor matters if viewed singly, but, when
accumulated, they boost our frustration level alarmingly
and seem to chip away at our individuality and personality.
Privacy

A second area of depersonalization concerns privacy.
Privacy considerations occur most frequently in regard to
credit information, though even more serious invasions may
occur in the collection and transmission of health, employment and other information. We have collected and employed credit information for a very long time, but neyer
with the degree of completeness and nationwide access
made possible by high speed communications and electronic data processing equipment. I wonder how many of
you are completely satisfied that the information concerning your own credit is based on appropriate inputs? How
many of you would like to see this information, to make
sure that failure to pay a bill during some past period
because the circumstances justified your delay does not
appear on your records as a negative mark.
Rights to Individuals to Discover what Credit
Organizations Have on File About Them

Fortunately, some solid steps have been taken in this
area of credit information. A national law now gives
significant rights to individuals to discover what information concerning themselves is being held on file. S('me of
the better credit associations took equivalent or even
stronger steps prior to the passage of this law. Unfortunately, as with most legal steps, there are a number of
loopholes; and we again face the problem that the least
sophisticated among us are not apt to discover and apply
their rights even though they are the ones who probably
suffer most from the system.
Further, credit information is by no means the only area
of concern. There are many reasons for developing good
medical data banks but the issues of privacy and access
must be solved before these banks can be made effective.
The subject of psychiatric information is a particularly
10

difficult one since, without proper safeguards it could be
used for blackmail purposes.
Displacement by Computers

A third area of depersonalization has to do with the
opportunities for white collar workers to get started in
business. The current situation, as most of you are aware, is
one wherein more and more clerks are being displaced by
computers. So far, this displacement has been largely made
up for by the increasing numbers of people needed to
handle the input and output information, to design computer programs, and to undertake the variety of services
necessary to use computers effectively. However, one very
large component of this work force - the personnel
responsible for preparing input - is threatened by the
development of efficient and economical character recognition devices. I feel that in the next decade a significant
component of the current work force in this area will be
eliminated. This means that a certain type of starting job
for the white collar worker will disappear in much the sense
that the automatic elevator removed a kind of starting
opportunity for the least trained blue collar workers. We do
not seem to have particularly good alternatives available for
the starting clerical worker, so a certain range of opportunities is going to be cut off and there undoubtedly will be
resentment about this process.
Disenfranchisement of People Through Credit Cards

Finally, and an extreme case, the use of computers can
lead to a form of disenfranchisement of people. This
possibility shows up most clearly in the area of credit cards,
a phenomenon whose growth is closely tied to computers.
The use of these cards is increasing at a rapid rate, and over
a period of time, we can visualize approaching an almost
cashless society. One can ask the question: what happens
then to a man who cannot get credit and cannot obtain a
credit card? Will he, in a valid sense, be banned from a form
of equal opportunity in our society?
We have other examples of indirect forms of disenfranchisement already operating and some of them are quite
painful. People who, because of age or disability, are not
able to drive private automobiles, are disenfranchised from
a considerable portion of our social activity because they
have almost completely lost a mobility on which our
society depends as our public transport degenerates.
They fmd themselves limited as to where they can live
and where they can work; they are not only restricted in
activities but very likely must pay more for the basic
elements of living because of these restrictions.
The beginnings of this type of disenfranchisement in the
credit card area are already beginning to be evident. When
one registers at a hotel in a number of U.S. cities, there is a
sign behind the registration desk to the effect that the local
innkeepers' association "requires" that guests either provide
an acceptable credit card or pay for their room in advance.
This may make good business sense for the hotels, but it is
also a minor indignity. The passing of blame for the act to
an innkeepers' association has a ring of phoniness and
deprives the consumer - and, at least in theory, the hotels
- of their freedom of choice in the market.
Talent Bias

A second broad area of social impact by computers
concerns the extension of an existing talent bias - a bias in
COMPUTERS and AUTOMATION for September, 1971

favor of technical training and experience as opposed to the
humanities. As we move into Stage Three of the computer
revolution, there will be changes in the requirements for
talent to serve business effectively. Previously, computers
have been devoted to clerical areas which, by their nature,
already had to be routinized within a given company.
Management decisions are not standard and we rarely have
a library of procedures available that can be programmed
into a computer. If we wish to use the computer effectively, we are going to have to develop new techniques. We
will have to acquire large numbers of personnel for developing these techniques and analyzing the output of computer
runs. For example, a lot has been written and some
excellent work has been done on the role of simulations in
the decision-making process. But just a few minutes of time
on a computer, running a complex simulation, can call for
many man-months of analysis to understand the implications of the output. One result will be enormous requirements for analytical skills in business staffs.
Analytical Skills Not Backed With Practical Experience

Analytical skills unbacked with realistic experience can
lead to a variety of difficulties. Our military organization
has often been a leader in trying new techniques; so it is
worthwhile taking a quick look at what has been happening
recently in the Pentagon. During the McNamara era, enormous emphasis was placed on employing analytical techniques to establish and justify expenditure levels. There
were many cases in which these techniques were not well
employed because we did not have the skills available yet.
Failures due to misapplication have approached a very
strong reaction to the analytical approach for developing
expenditure budgets. These skills are now being employed
far less by the military.
We face a situation where competition will demand
effective employment of skills in short supply. Either the
performance will be poor, leading to backtracking and loss
of efficiency, or new procedures will be necessary for
providing both a larger supply of technical skills and a basis
for combining these skills with practical experience.
Addiction of Playing Games With Computers

Another area of talent bias arises in training and education. Some months ago Datamation Magazine published a
rather interesting science fiction-type article which, among
other things, discussed a future period where playing games
with computers had become a sociological disease very
equivalent to narcotics addiction. It was an amusing article
but it lost some of its humor when we made a recent survey
for a major university concerned with planning for their
development and use of computers. We encountered a
number of students who had become so fascinated with the
computers made available to them that they lost all interest
in their courses and were devoting essentially all of their
time to playing with the computers!
New Demands for Skills

We face a number of problems in educational institutions in that the future demands of business call for certain
talents to a greater extent than they probably are naturally
present in the human race. These demands tend to cut
down the stature and role of the student studying humanities as he visualizes his position in future society. The new
COMPUTERS and AUTOMATION for September, 1971

demands place great emphasis on mathematical and analytical skills and tend to split the student body into two
components - technically-oriented and humanitiesoriented. I believe this split is resented, and some evidence
of a rather emotional getting-together of the segments of
the student body was quite visible in the recent riots and
protests. It should also be pointed out that a significant
number of faculty members in most of our schools have an
extreme distaste or even fear of the computer. Some of this
will begin to come through to the students that they train,
as the computer develops a bigger and bigger role in
university and daily life.
Loss of a Training Ground for Management

The talent bias also has an impact on management
training. The use of computers has often led to elimination
of some echelons in the organization of companies. This
may achieve greater efficiency, but you also can lose a very
important training ground for future management. The
result may be an increasing trend for progress to senior
managerial positions to come through staff rather than line
positions. There are some reasons to suspect that over time,
this trend could have disastrous results. As the computer
plays more and more of a role, there will be less and less
opportunity to develop junior and intermediate management skills. This must be faced as a real threat for the
future.
VulneraJ>ility

The third general topic is that of vulnerability. There are
a number of forms which this can take. First, I do not think
we have even begun to see the extent to which fraud can
take place through the use of computers. There have been a
limited number of examples, but skills in manipulating
computers can unquestionably be employed in ways we
have not yet visualized to milk companies and to perpetrate
fraud or thefts. This subject has not received adequate and
serious study.
Reliability Problems

Second, we are going to face a variety of reliability
problems. I was once told of an occasion when the head of
the American Airlines automated reservations systems paid
a visit to the U.S. Air Defense Command. During a
discussion, one of the officers turned to him and said in
effect: "You know, you people really have the reliability
problem. Our equipment can go down for an hour or so,
and if the Russians don't choose that period to attack, we
bring it up again and nobody knows anything has happened! But if you go down for an hour or so, you have got
a lot of angry customers who are aware that you have been
having difficulties." We can extrapolate this further. There
has been a lot of attention paid to the problems of floor
automation on Wall Street. To my mind, one of the most
legitimate barriers to progress has been the reliability of
equipment. An airline may get into difficulty if its reservations equipment goes down for an hour. On the trading
floor, a five minute failure of a computer can lead to nearly
disastrous results.
I ncreased Vulnerability

In the future we are going to be faced with problems as
our banking system, our mutual funds, our stock exchange
(Please turn to page 14)
11

COMPUTERS AND THE NATION

"We all have an awesome task to convert the image of computers from the image
of an unwelcome intruder and a disagreeable agent of change, to the image of a
benevolent helper and resource for our country. "

Dr. Edward E. David, Jr.
Science Adviser to President Richard M. Nixon
The White House
Washington, D. c.

(Based on a talk to the Computer Science and Engineering Board
of the National Academy of Sciences, June 25, 1971, Washington,
D.C.)

What can computers do for the nation as a whole?
I am eager that the best minds in the computer field
look upon the computing field as a national resource, and
not as a closed community for disciplinary effort with only
financial connections to the outside world.
The future wellbeing of computing depends at least in
part upon the resolution of questions of communication
about computers to the general public and to potential
users - for in my present position I find a profound
skepticism of projected beneficial uses of computers.
People Unwilling to Accept Computers
It seems very clear that the most frequent barrier to the
use of computers in imaginative ways is that people and
institutions are not ready for them.
For example, I understand that physicians and hospital
personnel in some places have shown themselves unwilling
to accept the complete change in their professional habits
that effective computer usage requires. This seerris to arise
primarily because these people seem not to understand the
nature of their own work. Such a situation is often a
precursor to rejection of automated techniques. In effect,
people want simply to mechanize their usual ways of going
about their jobs, rather than asking how computers will
enable them to do things differer.tly and more efficiently.
I know that this is a familiar story to most computer
people, but it is ill understood by officialdom, whether in
government, industry, or universities and coJIeges.

condition which he calls "future shock". Actually, my
social scientist friends tell me that there is little evidence
for the existence of this phenomenon. However, there is
good evidence that people can adapt to change when they
themselves are controlling it. They do not adapt when
change is imposed upon them by some outside force. As all
good computer people know, this observation provides the
key to using the computer efficiently as a catalyst for
change in institutions, This process involves communication
about computers to the layman, to the person who is wary
of computers, or who has encountered them only as an
impediment to correct department store billing. It is no
easy task.
I look upon the computer as a resource for the nation;
and indeed there are many national problems to which it
seems central.
Decline in Productivity Increase

One of these is the area of productivity. As many of you
know, the rate of productivity increase in our economy in
the past few years has been slowly declining. This means
that the output per worker is not increasing as rapidly as it
did in the past. The figures are something like this: The
average yearly productivity increase from 1948 through
1968 was about 3.2%. Since that time it has dropped to
between 1 and 2%, although recently we have observed a
higher rate. Some economists have said that the lag in
increase of productivity is a cause of inflation, since wages
have been going up more rapidly than productivity. When
one looks into the structure of the economy, the importance of the computer in the productivity context becomes
evident.

Adapting to Rapid Social Change

The computer is indeed a catalyst for change and people
tend to resist change when they do not control it themselves.
Change as a social phenomenon is something which has
been addressed by Alvin Toffler in his book, Future Shock.
Toffler's thesis in that book is that when the rate of change
is too great, people are not able to adapt and go into a
12

Service Industries Increasing

Currently, the people working in agriculture and manufacturing are about 45% of the total U.S. work force, while
55% are engaged in rendering services of one kind or
another including, for example, education, health care,
government operations, and the like. This implies that more
than half of our workers are engaged in the service indusCOMPUTERS and AUTOMATION for September, 1971

tries as opposed to those which produce real goods. If we
look into the future, we find an even more startling
situation. In 1980 it is estimated that 65% will be in the
service industries. Taken with the growth of jobs, this
implies a rather startling fact: namely, nine out of every ten
new jobs which are created between now and 1980 will be
in the service industries.
Improving Productivity in Service Industries

If we are to improve productivity markedly, therefore, a
substantial part of that improvement must come in the
service industries as opposed to improvements in manufacturing productivity. I might add that since only 5% of the
work force is engaged in agriculture, and that figure is still
shrinking, productivity improvements in agriculture will
have little overall effect on productivity figures.
Now, computers and computer-related technologies have
a high potential for improving productivity ~n services; but
as you well know, to do so is not simple. In addition to the
necessity for allowing users to participate in the process of
computer-induced change, there are several other
necessities.
One clear-cut necessity concerns economies of scale.
Often and often the prospective economies leading to
improved productivity depend upon high levels of traffic,
and this involves system considerations including (1) communication techniques to cover geographically-distributed
populations and (2) multi-programming as an aid to sharing
facilities among many users. Finding a critical mass of users
to generate the necessary traffic is only one of the many
impediments to applying computers in the service sector.
Another necessity is reduction of the cost of terminals.
This is a major hurdle. The point is that we clearly need
focussed efforts to solve such problems. Needless to say,
their solutions would be good for the computer industry
but also, of course, good for the nation.

Computers Protecting Individuality

Now, it is often said that computers are a challenge to
the privacy of the individual and to individuality itself.
Indeed, it cannot be denied that computers have been used
in just these ways in the past. However, .these effects are
not intrinsic to the computer itself. Computers can be used
to protect people's privacy. In fact, a well-designed computer system can be made more nearly private than the
manual filing methods used today. The technology and
technique to accomplish this is in hand or nearly so. Some
further innovative effort can provide further advances, but
the problem is that system designers and their customers
have not seen fit to utilize the available technology to
protect people's privacy. Again, in this area the question of
efficiency and costs arises. It may well be true that special
hardware will have to be incorporated into computing
systems to facilitate the elaborate protective mechanisms
which in the end will be required for adequate privacy. The
impetus for these developments has been slow in coming,
but I believe we will see incentives by government for such
developments. Senator Ervin has held hearings at which
issues concerning privacy and computers have been examined.
Establishing Privacy Standards

The executive branch of the government also is looking
at these problems, and it may be that the day will come
when we will see privacy standards established and published. This should not be necessary, but many people
believe that it is. It is not too much to say that the
government will not shirk its duty in this regard.
As for individuality, again computers can be the key to
the individually-tailored service or product. Yet, we do not
see a widespread attempt to use computers in this fashion.
Again, I think that the future health of the computer
industry depends upon successful attempts in this direction.

Disquieting Performance in Foreign Trade

Malevolent Effects of Technology

A similar situation exists in foreign trade. Here again our
index of performance as a nation is disquieting. We have
seen our foreign trade balance dwindle to about $1 billion
out of about $40 billion of total exports. We do best in
high technology products; we run a large deficit in laborintensive products. This story is also undoubtedly wellknown, but again a close examination of the anatomy of
the problem indicates that many of our manufacturing
industries cannot compete because of (1) the differential· in
wage rates and (2) antiquated plant. Here again computers
can provide a way of overcoming the differential, but there
are the difficulties in gaining the necessary rapport with
traditional industries. The labor unions as well look with
some suspicion on computers. Solving this set of problems
in a humanitarian and effective way is a real challenge to
the computer community.

I feel strongly about all these matters because we as
scien tists and engineers are getting clear signals from the
public about the malevolent effects of technolorr. ~s y~u
know, computers are in the forefront of people s mmds ill
this regard; This syndrome has led some to conclude that
there is a strong wave of anti-technology overtaking us.
They point to the vote on the supersonic transport and to
environmental extremism and other supposed evidences. It
is easy to identify some people who are negative about
technology. There are some highly-respected people such as
Lewis Mumford and Marshall McLuhan whose utterances
range from rational attacks on rationality to extolling the
irrational and occult. Movements in this spirit can succeed
at times, particularly when we as a community show our
technological teeth rather than displaying our human values but overall I find no wave of anti-technology in the
exe~utive or legislative branches. In fact, quite the opposite.
I find people in responsible positions very receptive to
responsible proposals for advancing science and technology.

Improving the Quality of Life

So far I have been talking about using computers to
improve the performance of our economy and our economic situation in the world. But the nation requires also
that computers be used to improve the quality of life. Here
one can think of many possible applications, but the one
that appeals to me the most lies in the areas of privacy and
individuality.
COMPUTERS and AUTOMATION for September, 1971

Collisions re Energy Supply

The President's recent energy message to Congress is an
interesting case in point. His message confronts the collision
between environmental values and energy supply. The
13

solution he proposes is a pluralistic one based on research
and development aimed at new technology. The nuclear
breeder reactor is the centerpiece of the new effort because
it today holds. the greatest near-term promise for the
generation of clean energy. Recognizing that other technologies will be needed, however, the President has proposed
two other initiatives related to recovery of clean energy
from fossil fuels. In addition, he has asked me to evaluate
longer-range possibilities, among them fusion power and
solar power.
It is interesting and significant that this energy message
was, as nearly as I can determine, the first message from a
President to a Congress whose thrust was an R&D effort
aimed at solving a national problem. I hope and.expect that
this is but the first of many others to follow, and it seems
clear to me that computers must play an important role in
many of them.

Presidential Message on Computers

A criterion of success for ambition to "communicate
about computers" is this: success will be achieved when
there is a Presidential message recognizing computing as a
resource to solve national problems. Unfortunately, we are
not close to this result at present.
In fact, in my office's forthcoming annual report on
science and technology, there is no chapter on computing.
Of course, computing is referred to in other chapters.
What should such a chapter say if there were to be one?
The report is intended to be a report to the Congress and
the nation at large. The standard format we have adopted is
first a recital of significant accomplishments; second, exposure of the issues confronting the field; and finally a
projection of the possibilities for resolving them, coupled
with a discussion of the attendant policies. I invite computer people to write to me concretely about this matter.
Communicating to the Public About Computers

It is necessary to communicate with the public so that
computers become more acceptable and less frightening to
them. It is necessary to gain the participation of people
whose lives and jobs will be affected by computers, if they
are to accept computers and if they are to use them wisely
and effectively. Many opportunities exist for the infusion
of computing into the service and manufacturing industries.
In fact, I believe this infusion is a necessity if productivity
and our foreign trade are to be kept healthy.
In addition, as computers become more and more a part
of our society, the reliability of both hardware and software must be geared to avoid human tragedies. Computers
must be used to protect people's privacy and to insure their
individuality.
Changing the Image of Computers

We all have an awesome task to convert the image of
computers from the image of an unwelcome intruder and a
disagreeable agent of change; to the image of a benevolent
helper and resource for our country. Changing this image
will require the computing community to communicate
about ·computers in ways which it has not done before.
In addition, there must be communication within the
computer community to increase its level of professionalism and its responsibility for its own impact on society. 0
14

Ernst - Continued from page 11
and other institutions make increasing use of electronic
records. We already have cases where records were destroyed by mistake or were lost; a small mutual fund, for
example, has had the embarrassment of having to write its
customers to find out how many shares they owned! No
system is perfect in reliability; and no matter what steps we
take, sooner or later there are going to be errors and
failures. As we build bigger systems and become more
dependent on them, we faced increased vulnerability. The
size of the largest organization in a given field of endeavor
tends to approach the maximum that is manageable. The
use of the computer increases the manageable size of a
company; but it also increases the vulnerability of that
company if something happens to the computer.
Sabotage

There is also the question of sabotage. It is probably no
accident that quite a number of efforts of the radical left
and students in their bombing attempts, building seizures
and such, have involved computer systems. We are not too
vulnerable now, but in the future these actions can cause
far greater difficulties.
Industrial Espionage

In addition to straightforward sabotage, I think we have
to look forward to problems of increased industrial espionage. If it is known that a company bases its marketing
plans very heavily on a simulation it has developed, the
simulation itself can become a target for a competitor. And
it is not too difficult in normal situations to arrange for the
disappearance of a program or the disappearance of input
data from most of our current computer systems.
More Filtering of Data for Decision Making

Finally, we face the fact that management itself will
become more vulnerable in its decision-making:' As we use
more complex decision-making tools, and as we rely more
heavily on large data banks, there will be more flltering of
information by management staffs before materials for
decisions are presented to the senior management. Even
today, I feel that a large fraction of the decisions of senior
managers are not made by them. They are forced on them
by the selectivity of their staffs in providing data and in
presenting arguments. As the staffs grow bigger and the
data base more complex, the ftltering mechanism will
expand and senior managers will find it more difficult to
exercise effective personal control.
Business Will Suffer from Failures to Deal with Problems

In this brief review, I have described some of the
problems of computers I have encountered in a variety of
work for business, universities and governmental organizations. The list is obviously not complete. Though the
examples range from fairly trivial to moderately serious, all
are characterized by the fact that they will become far more
extensive and very likely far more dangerous as our use of
computers broadens. At the moment, these problems don't
hurt us very much. I don't believe they will be painless for
much longer, however, and I do believe businessmen have
an important responsibility for helping solve these problems. If they do not, business will certainly be among the
first groups to suffer from our failure to deal with them. 0
COMPUTERS and AUTOMATION for September, 1971

SECURITY IN ON-LINE SYSTEMSA Primer for Management

"How about the clandestine intruder who . .. through illegal or unauthorized
access at a remote terminal, steals or manipulates your data? ... Or brief power
failures that leave you with a three-day recovery problem? .. How does one
secure his system to prevent such occurrences?"

Richard A. Hirschfield
Computer Audit Systems, Inc.
725 Park Ave.
E. Orange, N.J. 07017

This article concerns "on-line computer systems" breeds of computer systems replete with central processors
and terminals in a myriad of configurations. Little attempt
has been made to distinguish the differences in security
requirements for various types of on-line systems, such as
on-line batch dial-up, dedicated real-time inquiry, etc.
Rather, the approach here is generic; it is concerned with
the inherent problems whenever you attach a terminal
outside of your data center to your central processor and
thus expose your data files to remote access.

Richard A. Hirschfield is Executive Vice President of
Computer Audit Systems, a firm specializing in computer
security, EDP auditing and related fields, where he has
responsibility for product development, training, and on-line
computer security. He has over a decade of experience in the
planning and installation of data processing equipment and
software, and is a frequent speaker before management
groups.
Mr. Hirschfield is a graduate of Rutgers University with a
B.A. degree, and served for four years on active 'duty in the
U.S. Air Force, specializing in the installation and operation
of ICBM computer guidance systems.

COMPUTERS and AUTOMATION for September, 1971

Just for a moment, visualize your computer center. Is it
well situated? secured with badge lock controls, magnetic
detectors, automatic fire alarm systems and other similar
physical security devices? If the answer is yes, and we hope
it is, is it a secure installation? Probably quite secure against
a frontal assault.
But how about the clandestine intruder who does not
steal a tape but, through illegal or unauthorized access at a
remote terminal, steals or manipulates your data? Even
worse, do you even know this happened until your stockholders list shows up in the hands of a firm selling cancer
cures by mail? Or how about just simple accidents that can
clobber your data files? Or brief power failures that leave
you with a three-day recovery problem and a system that's
out of balance by four transactions, but no one knows
which ones; or by $4,000 and no one knows why.
Well, enough of the potential. The question is how does
one secure his system to prevent such occurrences? We
believe the control problem can be viewed as having four
dimensions:
1. Preventing illegal or unauthorized access to the
computer and its data files and programs.
2. Control over data transferred from remote locations to the central computer.
3. Back-up and recovery systems for the computer
complex.
15

4. System auditability system.

the ability to audit the

Access Control
Access control is an area which requires early and
comprehensive evaluation. The umbrella of security which
is inherent in computer and file access can only provide
adequate protection if the structure of the system itself will
allow the appropriate access control mechanisms to function. Thus, proper security cannot be built in after the
system is built. Security must be an integral part of the
systems planning, for as in any construction, the architectural scheme must be determined before the first brick is
laid.
Security in on-line systems begins at the same point as in
self-contained, non-terminal systems - with the physical
security of the installation. In the case we are considering,
however, a new dimension is added: physical security must
be extended to the outlying terminal locations, for they
may be rightly viewed as your first line of defense. Not
only must access to them be controlled, but the materials
associated with their use must be carefully handled, for
these materials can be a valuable source of information for
someone aspiring to enter your system on an unauthorized
basis using legal codes and procedures. These physical
control functions, however, are straightforward. They are
similar to practices already in existence if your data center
is well controlled; so we will not dwell on them here.
Rather, we wish to concentrate on those areas of security
more directly pertinent to on-line systems.
First, appoint someone to be responsible for the security
provisions of the system. To extend a previous metaphor,
he is the architect and the contracting engineer for systems
security. He should be one person, reporting at a high
enough level to insure that proper attention is given to
essential security matters. Ideally, he should have the
experience of a senior systems analyst or programmer, the
tenacity of a skeptical auditor, and the patience of Job.
For, let me warn you, security provisions are easily discarded. They are expensive, time-consuming to implement
and process, and in general, a pain in the neck to the
systems developers. So pick a good man and give him the
responsibility and the authority to back up that responsibility. Give him the tools sufficient to impede hasty and
ill-conceived systems decisions affecting security.
All right, we are physically secure. We have a security
manager who is qualified and ready to do his job. What
next? The answer is so simple it is often not done. We
examine the problem; the data, the files, the needs of the
user, from the viewpoint· of how can we minimize the
security problem before we begin. There are several things
that can be done to secure a system before the fmal design
ever begins. Among them:
1. To the extent possible restrict the number and
location of terminals and the categories of system

users.
2. Don't put sensitive data into files that will be
available to terminal users unless the data is absolutely essential.

3. Establish and maintain a system to purge unneeded data from the files periodically. Aside from
being a generally good practice in any systems
deSign, the periodic purging of unnecessary data
will lessen security requirements. It will also tend
16

to have a corollary benefit in certain types of
organizations, i.e. the protection of the individual's right to privacy by not storing, in an accessible and manipulative form, extraneous and gratuitous information about that individual. Public
pressures will make the question of protection of
individual rights in computer systems a crucial area
of concern to systems designers in the future, and
rightly so. Attention to this area now may preclude many headaches later. However, this consideration has broad implications which are not the
subject of this article, so we will not dwell on it
here.
Let us then assume we have taken the pre-design steps to
insure that unnecessary sensitive data will not complicate
our control needs and the number of users and terminals
are restricted by the basic principles of the right and need
to know.
What next? First, we need a system for controlling
access to the computer from remote terminals. Such systems are usually called password control systems. In their
most basic form they insure that an authorized terminal
and user is requesting access to the system. In dial-up
systems this requires entry of a terminal and user code. In
directly connected terminals only the user code may be
necessary. The problem of access, however, is complicated
by the necessity of being more selective than simply the
granting or refUSing of access. For example, files containing
sensitive information cannot be available to all persons
having general access to the system. Thus, a comprehensive
password system may contain several levels of access information such as terminal identifiers and user codes which
identify the individual and his access classification. The
access classification code may, in turn, simply delineate the
data files that are available to that individual and/or
terminal or may be much more complex; restricting readwrite access on ea<;:h file or making individual fields or
groups of fields on a data file inaccessible.
The determination of the type of access restrictions is
based on several factors. Among them are:
a) The nature of the data - Obviously, access to
sensitive data such as marketing planning information, stockholder lists, customer information and
the like must be more strictly controlled than your
inventory of office furniture.
b) The structure of the data files - For example, files
which have data of similar security classification
stored independently are normally less costli to
secure than files imbedded with a varying level of
sensitivity. The former allows record level control
while the latter may preclude it.
c) The cost of security - Generally, as the level of
control becomes more discreet, i.e. moves toward
the field level, the cost of security goes up rapidly.
The cost being measured in terms of computer
storage required, processing time for security measures, implementation costs and, often overlooked,
the cost of maintaining, utilizing and verifying the
security measures.
We should note that we are discussing only data which is
stored in a record structure. For list structures and other
non-record formats, the parameters of the relationship of
security level to cost will be the same although the method
of measurement may be greatly different.
COMPUTERS and AUTOMATION for September, 1971

So, we have planned ahead "and designed cost-effective
access controls into our system and have assured a secure
physical environment. We are on the way to a secure on-line
system, but the path is still long and difficult. Let's look at
another factor to be considered: the transfer of data from
the terminals to the central processor.
Data Transfer Controls

Several levels of controls are necessary in data transfer.
The most common are the familiar terminal and line
checking features such as horizontal and vertical parity, bit
counts and sequential message numbering. All of these are
important and should be used where appropriate; but for
our purposes we need to cover some less familiar yet
potentially critical data transfer controls, i.e., computer
logs, encrypting of data and closed loop verification.
Computer Logs

In an on-line system a complete computer log should be
kept of every terminal and operator access to the system.
The log will record the time of access, the terminal number
and user password, the purpose of the access and other
information deemed pertinent. It must be maintained on a
"real-time" basis and information printed out from it
periodically for review and analysis. Items of special interest, such as attempts to gain access to fIles with illegal
passwords or unusual halts, should be flagged for frequent
investigation by the security officer. In addition, in dial-up
systems, a user requesting access with an illegal password
should be allowed a few erroneous attempts to allow for
honest error, and then be bumped from the system. This
will be a serious deterrent to the casual interloper who is
trying to figure out your password system through trial and
error. Such system-generated terminations should be items
for follow-up action for they might be the first and perhaps
only indication of an attempted illegal access.
Closed-Loop Verification

In addition to the log, we recommend strongly the use
of closed loop verification to insure that all data transmitted to the system has been received as transmitted. This
positive confirmation, transmitted from the computer to
the terminal contains the message number, the time of day,
and a character or bit count which should correspond to
the character and bit count transmitted. This method
assures that no data has been lost in transmission and
facilitates recovery in case of system failure (a subject
which will be covered later in this article). A similar
technique can be used in processing. If each item of update
input data is viewed as a trigger for certain processing steps,
then positive verification can indicate that the data has
passed preselected points and the appropriate files have
been affected. As part of the normal back-up-restart pattern, a predetermined level of closed loop control points
will be necessary.
Encrypting of Data

Another method of data transfer security, encrypting of
data, is not designed to prevent loss due to transmission
error, but to prevent theft of sensitive data during transmission. All public lines are subject to being electronically
monitored without the user's knowledge. Even private lines
are not completely secure and microwave may prove to be
COMPUTERS and AUTOMATION for September, 1971

the least secure of all. Thus, when sensitive data is transmitted, the user must realize that through a concentrated
effort on the part of a malicious intruder, this data can be
obtained. If the data is sensitive enough, the only recourse
is to encrypt it. The use of encrypting is growing among
many companies who transmit confidential data and of
course is heavily used by the U.S. government. Many users
have even begun encrypting the actual data files in the
computer for maximum security.
Back-up and Recovery from Systems Failure

The functions that have been built into the on-line
system for control and security purposes are essential for
recovery in case of systems failure. The combination of
computer logs, back-up files and closed-loop verification
provide a dynamic status which is necessary if the user is to
restart the system with minimum loss of time and money.
Without such controls, transactions may be mishandled,
processed twice or even lost. The subject of back-up
systems is one which assumes critical importance in an
on-line environment. Often the applications processed and
their immediacy do not allow the system to be down for
any extended period of time. Depending on the criticalness
of the processing, on-line systems may have to be duplexed
or in some cases even triplexed to assure an uninterrupted
flow of processing. However, an often overlooked point, is
that if the user is to go to this expense and difficulty he
must also consider the back-up requirements of his power
supply, air conditioning, etc., and provide proper switching
mechanisms to assure that back-up transfer can be effected
when necessary.
Back-up of data files and programs is another consideration. How often do you want to copy these files? The
answer will be determined by the nature of the applications
and the restart requirements determined by management.
For inquiry fIles, perhaps a daily back-up for fIles is
enough. For files that are being updated by transactions
during the day, perhaps the updated records should be
duplicated concurrently with the update cycle. In this way,
if the master file is destroyed, the back-up fIle (which can
be physically protected), in conjunction with the back-up
master with which processing began, can be used to quickly
recreate the master up through the last transaction processed. The question again is one of cost weighed against
the nature of your business and the structure and criticality
of the application(s).
System Auditability

If you have implemented the appropriate security measures outlined in this article, or similar effective measures
you should be feeling quite secure and rightly so, for, to the
extent possible, you have prevented accidental or malicious
intrusion into your system. All right then, publish your
security procedures. Describe them. Tell in detail the
security measures in effect. Let it all hang out. If the
security system can't stand scrutiny, it will not be effective,
for in one way or another it will be scrutinized. For
example, a basic design criteria of sophisticated encrypting
systems is that, even if you have available a message in its
"clear" and encrypted forms you cannot determine the
encryption formula. Thus, a second encrypted' message
would be untranslatable and useless to you. So, open your
security system up. Let it be audited. It will stand or fall on
its power to withstand knowledge of its internal workings.
(Please turn to page 25 )
17

THE JAPANESE C'OM,PUTER MARKET CHA:RACTE!RISTICS ADVERSELY AFFECTING
U.S. TRA:DE INTEIRESTS
Part Two
"A number of measures, legal in nature, are enforced by the Japanese
Government in order to reduce the impact of foreign competition,
mainly Us., on the domestic manufacturers. These measures include
restrictions, licensing, tariffs, and quota control and all serve to ex-owned Japanese-based compu ter
clude imports and discourage
manufacturing operations. "

us.

Stephen T. McClellan
108 Sagamore Rd.
Tuckahoe, N. Y. 10707

Part One of this article, which appeared in the
August issue, discussed Japan's efforts to give financial assistance to domestic computer manufacturers.
This has been accomplished through two semi-governmental organizations: the Ministry of International
Trade and Industry (MITI) and the Japan Electronic
Computer Company (JECC). The MITI subsidizes the
computer industry and coordinates the industry's
work through "administrative guidance." The JECC is
a leasing firm that gives capital to computer manufacturers by renting computers at many times the rental
fee.

Japan Development Bank

The Japan Development Bank (JDB) lends money to
JECC at 7.5%. This subsidized interest rate is quite competitive to U.S. computer firms in Japan. JDB's funds
however are not unlimited especially in light of the fact
that Japanese firms are all heavily debt financed (80-90%)
rather than equity financed. Thus there is great demand for
capital in Japanese industry and JECC receives only a
limited amount. Because of JECC's capital constraints in
the face of increased computer leasing business, the organization was forced to reject some computer manufacturer's leasing and installment selling contracts for the first
time in 1969. JECC's share of the computer rental and
installment sales market thus fell somewhat.
Under MITI and JECC are other quasi-governmental
bodies whose specific financial activities aid Japanese computer manufacturers at the expense of U;S. computer
vendors in Japan.

for the development of advanced software and data information. Loans are also extended to JECC for the purchase
of software. Terms are 6 years including a two year grace
period at 6.5% interest per annum. The amount of the loans
ranges from $6.7 to $22 million annually. In addition to
financing software development this organization also purchases privately developed software and leases it out to
users much like JECC does computers.
Japan Electronic I ndustry Development Association

The Japan Electronic Industry Development Association
(JEIDA) is a government supported organization comprised
of the leading Japanese manufacturers of electronic equipment. Its purpose is mainly that of educational and research
coordination in order to further rationalize the industry.
The Government gives limited financial support to the
group and thus stimulates Japanese international competitiveness by improving manufacturing and market techniques, and developing new and improved equipment. 7
Other Bodies

In addition to the previously described organizations
there are several other groups which receive government
financial, manpower, and advisory support. These include
the Electronic Computer Usage Development Corp. (promotes computer usage), the Information Processing Development Center (trains systems engineers and programmers),
and the System Technology Development Center (develops
sophisticated software packages). All of these organizations
give the Japanese computer industry a competitive advantage over the U.S. computer interests in Japan. A major
factor in the viability of these organizations is the Government financial support.

I nformation Processing Promotion Corporation

Financial Controls

The Information Processing Promotion Corporation is an
organization which promotes Japanese data processing
firms by extending loans, on liberal terms, to general
business companies, service firms, and software developers

A number of measures, legal in nature, are enforced by
the Japanese Government in order to reduce the impact of
foreign competition, mainly U.S., on the domestic computer manufacturers. These measures include restrictions,

18

COMPUTERS and AUTOMATION for September, 1971

Table 3
Effect of Japanese Import Restrictions on U. S. Computer Exports in 1967*
(All Data = $ OOO's)

Country

A

714.2005
Electronic computers,
digital, including
process control computers

U. S. Exports 1967
B
A+B
714.2010
Electronic computers,
not elsewhere classified
including process
control computers

Gross domestic
fixed c api tal
formation*

A+B
C

%
.029
.016
.018
.010
.014

152,545

77,645,000

.01964

38,877

37,765,000

.01029

14,215
11,726
33,575
8,425
963

49,513
47,340
51,038
38,877
4,654

205,947

107,446

313,393

United Kingdom)
France
)
West Germany)
Rep. SAF
)

92,066

60,479

Japan

30,452

8,425

Total U. S. Exports

Ratio

17,196,000
28,800,000
28,500,000
37,765,000
3,149,000

35,298
35,614
17,463
30,452
3,691

United Kingdom
France
West Germany
Japan
Rep. SAF

C

.00935
Estimated U. S. Trade Loss in 1967 = .00935 X $37,765,000 = $35,310,000.
*United Nations, Monthly Bulletin of Statistics, June 1969, pp. 189-195.

licensing, tariffs, and quota control and all serve to exclude
imports and discourage U.S. owned Japanese-based compu ter manufacturing operations.
Quantitative restrictions are imposed on imported computers in accordance with the Japanese Negative LiSt. 12
Such a restriction limits the quantity of U.S. computers by
type that can be imported into Japan. Further restriction
comes in the form of required MITI authorization to bring
in operating capital, open branch offices to engage in
importing and direct selling, and be assured of repatriation
of earnings. This actlon falls under the Foreign Investment
Law of 1950 and as a result, because of consistent opposition from MITI, few U.S. computer firms have been
authorized to engage in direct sales of computers.
The effect of Japan's import restrictions on U.S. exports
of computers may be roughly estimated by comparing the
ratio of U.S. computer exports over gross domestic fixed
capital formation in Japan, to that ratio in other comparable markets. The amount by which this ratio is lower in
Japan than it is in other markets may be attributed to the
effect of Japan's restrictions.
An estimated U.S. trade loss in computers of
$35,310,000 in 1967 is derived by taking the ratio (A+B)/C
for the United Kingdom, France, West Germany, and the
Rep. of South Africa (.01964) and subtracting (A+B)/C for
Japan (.01029) and multiplying the difference (.00935)
times Japan's gross domestic fixed capital formation
($37,765,000,000), C. This calculation is shown in Table 3.
The result, a $35 million opportunity cost to the U.S.,
reveals the effectiveness of the Japanese restrictions. U.S.
trade interests have suffered accordingly.
Another financial control is the import licensing requirement. Computers cannot be imported into Japan unless the
import is approved by MITI. All importers must submit to
COMPUTERS and AUTOMATION for September, 1971

MITI import application forms that carry an attachment
requiring, among other things, the name of the end-user of
the imported computer. End-users normally are asked by
MIT I to justify their purchases' of imported equipment. At
times, pressure to use domestic equipment is applied and
financial backing is arranged to permit purchase from a
domestic firm. Domestic manufacturers are notified of the
potential sale so that they may compete for the business.
The net result of this arbitrary system of import licensing is
that the domestic computer manufacturing industry is given
a high degree of protection. 13
Japan places comparatively high tariffs on imported
computers and related equipment. The rate for computers
is 15%, input-output peripheral equipment 25%, and integrated circuits 15%.14 This compares to the U.S. duty on
these items of 10%. While other countries are reducing the
duty rates on such commodities as computers in conjunction with the Kennedy Round talks, Japan retains the high
tariff rate. The Common Market countries (EEC) for
example, are reducing tariff rates on imported computers to
7% by 1972.
Meanwhile the U.S. has forcefully argued with the
Japanese Government to reduce the restrictions on U.S.
computer imports, thus far without material success. Formal talks commenced in May 1969 between the Secretary
of Commerce and the Japanese and were followed up by a
Cabinet level bilateral discussion in July 1969 and an
Assistant Secretary of Commerce presentation in October
1969. 15 The U.S. Embassy in Tokyo has continued the plea
since.
Japan's six leading computer manufacturers have petitioned their government and business leaders to exclude
computers from the import liberalization list scheduled to
be completed in fiscal 1972. 16 This action was a result of
19

the Government's consideration to liberalize small-scale
computers by 1972. The Japanese have been all promises so
far and no action. Summer 1970 is presently promised as
the time to expect Japanese announcement of her intentions concerning this matter. Import restrictions such as
these are illegal under the GATT Agreement to which Japan
is a participant. A further problem is the U.S. Government's
lack of support by the major U.S. computer producers in
convincing the Japanese to liberalize. This is due to fears
that if forced to remove restrictions the Japanese will
retaliate by tightening the screws even tighter on the U.S.
producers' subsidiary operations in Japan.
U.S. Advantage: Japanese Incurring Problems

Despite the determined effort to stimulate the domestic
computer industry at the expense of U.S. trade interests the
Japanese computer manufacturers are still incurring financial problems. None of the firms are making a profit on
their computer operations. Sales volume is too low to cover
costs. MITI is attempting to reduce the industry's costs by
urging more specialization and restricting the number of
models. Aggregate savings accruing from this effort, however, may not be enough.
Japanese computer firms presently spend little money
on research and development. Expenditures are woefully
inadequate because stockholders are not willing to invest
substantial funds in this field which may not yield large and
early dividends. Thus a technology gap exists between U.S.
and Japanese computers. All but one Japanese computer
manufacturer are dependent on U.S. firms for technology.
The dependency is in the form of license agreements.
Export expansion into the international market is, according to the Japanese, the means by which to increase sales
volume, become profitable, and undertake R&D so as to
break the ties with U.S. firms and become competitive. This
indeed is beginning to take place as Japanese computer
exports are appearing in Europe, United States, and the
Soviet Union.
Conclusion

Mr. Kaoru Ando, president of Fujitsu Facom, Ltd.,
Japan's leading computer manufacturer, admits the Japan
Government financially fosters the domestic computer industry. In explaining the basis for such policies he states,
"the key word is government guidance." He further explains, "Japan's computer industry, like any other of its
growth industries, receives government protection from
foreign interests and from excessive competition from
domestic circles." I 7
This reveals the philosophical belief which underlies the
concerted guidance and support effort being directed at the
Japanese computer industry by the Japanese Government
at the expense of U.S. computer firms. The practice is
thorough and effective. It is mainly centered around financial supports, controls, and barriers. Being faced with such
competition the U.S. has voiced opposition but nothing
more. Presently the situation is a standoff. MITI may have
enough power to harass IBM out of Japan, but IBM could
cripple the budding Japanese computer industry by withholding IBM patent licenses. I8 Both governments have too
much at stake to directly confront one another. In the
meanwhile, the U.S. computer vendors are losing much
potential business and being kept out of a lucrative computer market by unfair, unilateral practices.
20

What will be the fate of U.S. computer vendors in the
Japanese market? Speculation on the future suggests gradual liberalization but only after Japanese manufacturers are
totally capable of competing on equal terms with U.S.
manufacturers. By this time it will be too late for the U.S.
to benefit from such liberalization. It will be like the
Japanese competing with IBM in the U.S. market. U.S.
firms will not be able to match the Japanese computer
firms' advantages in their own market.
The decade of the 70's will find the Japan Government
investing more heavily in the domestic computer industry.
"Such investments must be made in conjunction with what
is determined to be the most effective schedule for progress
after due consideration of the special governmental, economic, and social features of the country.,,19
The direction in which the Japanese Government will
head is evidenced by the proposed course of action as
stated in the Computer Usage Development Institute's
White Paper of 1969. 8
(1) That the Government should actively aid in the
establishment of local and specialized data
banks ...
(2) That the Government should aid in the research
and development of the hardware and software
necessary for time sharing at private research
laboratories through the granting of substantial
funds.
(3) That the Government should take special measures
against inroads by foreign enterprises into the
information industry until Japan's industry has
reached a certain level of independence.
Obviously, much of the adverse development and control actions will be financial in nature. Whether it be due to
financial aid to develop the domestic computer industry or
financial restrictions to repel U.S. sales efforts, Japanese
market penetration by U.S. computer vendors will be
increasingly difficult in the future.
D
Footnotes
1. Japan Times. Oct. 30, 1969
2. State Dept. Tokyo Airgram A-43, Jan. 16, 1970
3. Sandra DiGioia, "Computers," Chase Manhattan Bank, Economic Research
4. State Dept. Tokyo Airgram A-2290, Dec. 6, 1969
5. Sherman R. Abrahamson, "The Manufacture of Computers in
Japan," Dept. of State Case Study. 1969, p. 8
6. State Dept. Tokyo Airgram A-710, July 28, 1969
7. State Dept. Tokyo Airgram A-2290, Dec. 6, 1968
8. Ibid
9. Computer White Paper. Japan Computer Usage Development
Institute, 1969, p. 10
10. Electronic News. June 15, 1970, p. 32
11. "Japanese Courting Foreign EDP Sales," Electronic News. Apr.
13,1970, p. 27
12. Business Machines in Japan. 1962-67. U.S. Department of
Commerce OBR 68-88, Dec. 1968
13. Sherman Abrahamson, "The Manufacture of Computers in
Japan," Dept. of State Case Study. 1969, p. 7
14. U.S. Dept. of Commerce, Kennedy Round Special Report. Feb.
1970,p.12
15. "Japan Resists U.S. Efforts to Ease EDP Import Restrictions,"
Electronic News. Feb. 23, 1970, p. 21
16. "Don't Ease Computer Imports," Electronic News. Apr. 6,
1970,p.44
17. "Japanese Courting Foreign EDP Sales," Electronic News. Apr.
13, 1970, p. 27
18. "Japan's Computer Industry -- Wait Till 1980," Forbes. Dec.
15, 1969, p. 37
19. Computer White Paper. Japan Computer Usage Development
Institute, 1969,p. 81
COMPUTERS and AUTOMATION for September, 1971

INFORMATION SYSTEMS IN URBAN GOVERNMENTS

"In the past, municipal functions were separated to make manual record
keeping tasks manageable. With the availability of ADP, it makes little sense
to sus~-ain this situation. Systems analysis reveals that ADP technology
demands a more sensible integration of these functions. So what we are
talking about is not the integration of information systems, but rather the
integration and reorganization of basic municipal functions themselves. "

t

Dr. Robert Keston
Keston Associates
11317 Old Club Road
Rockville, Md. 20852

The purpose of this article is to summarize the current
status of Automatic Data Processing (ADP) in local government and to project several major themes for future
development. The broader topic of information systems
will be considered as the principal element of management
in public administration. Information is, in fact, the major
element and a primary commodity in local government, for
local government does not produce physical products in the
industrial sense. The local administrator deals with a massive flow of information concerning public finance, the
physical environment, and the community which he serves.
The Current State of Affairs

Based on our observations over the past four years, the
current state of affairs in local government in regard to
ADP can be summarized as follows:
1. Computers have penetrated extensively into local
government; in particular, small municipalities in
the range of 10,000 to 50,000 population are
introducing ADP at an increasing pace.
2. ADP development is generally insular in nature,
with little transfer of experience and poor communications.
3. Public administrators generally have a meager
knowledge of computer technology and are often
unwilling to be exposed to educational opportunities.
4. ADP utilization is highly constrained by political,
economic, legal, inter-governmental and traditional considerations.
5. The majority of local government users are led
blindly by ADP "sophisticates" and the many
special economic interests in the field including
vendors of hardware, software, education, and
services.
6. Some cities, counties, and municipalities have
made significant strides in the effective utilization
of ADP, and have demonstrated the feasibility and
effectiveness of such advanced technology when
properly applied.
COMPUTERS and AUTOMATION for September, 1971

Dr. Robert Keston, President of Keston Associates, is a consultant on urban information systems.
He has prepared comprehensive training programs on
Automatic Data Processing (ADP) for local government administrators, and the planning and evaluation
techniques which he has developed are currently
being used in major urban areas.
Dr. Keston received his A.B. degree in Philosophy
and his Ph.D. in Experimental Psychology at New
York University. His doctoral dissertation in the field
of human color vision was based on analysis which
explored computer capabilities for correlating
psychophysiological data.
His professional memberships include the Urban
and Regional Information Systems Association, the
Association for Computer Machinery, and the Society
for Information Displays.
Areas of Concern

On the basis of this state of affairs, we see three major
areas of concern regarding the development and social
impact of ADP in urban society.
Fir,st, the effective utilization of advanced technology
will result in far-reaching changes in the management,
politics, organization and procedure in local government.
The thesis that information system technology is merely a
service function which supports or replaces manual procedures on a one-for-one basis while carefully sustaining the
status quo is a great myth. Data processing technology, in
order to be effectively utilized, must become an integral
part of the basic administrative processes rather than an
awkward encumbrance. Recognition of this sometimes
painful fact will enhance the ability of administrators to
cope with the situation, and to use it to their advantage. We
recommend the concept of "enlightened self-interest" as a
management attitude toward automation.
Second, there is a pressing need for a concerted attack
on urban problems through the close coordination of
diverse but related public administration services including
21

welfare, health, housing, recreation, education, etc.; ADP
technology can facilitate this effort by making available
comprehensive information on the socio-economic status of
the community and by facilitating evaluation of the effectiveness of social programs.
Third, a "clearinghouse" is needed for the sharing of
local government ADP capabilities and reduction of the
"re-invention of the wheel," so common in this field.
ADP Penetration

According to a 1970 survey conducted by the International City Management Association (lCMA)l , there are
844 municipalities in the U.S. known to have computer
installations or TAB equipment. This represents a growth of
213% over the estimate of 270 installations in 1967. Total
expenditures for ADP in 1970 were estimated to be about
$70,550,000. Annual ADP budgets had a mean value of
$225,367 in 1970 compared to $53,000 in 1967. The range
was $1,000 to $6,164,000 in 1970 compared to $1,500 to
$3,900,000 in 1967. (See Figure 1.) However, it should be
emphasized that only 1,562 of 3,303 municipalities responded, and no assumptions can be properly made concerning the use of ADP in the remainder.
Central ization

ADP has generally been implemented on a fragmentary
departmental basis, resulting in incompatible sub-systems
and a lack of broad socio-economic data on urban localities.
However, a strong trend toward centralization has been
fostered primarily by economic considerations. In 1967,
Surveyed - 3,303 Cities; 1,562 Responded

Finance ~partment - in 70% of the localities, although
14% of them had separate ADP departments.
The current trend is toward departmental systems.
Finance, public utilities and personnel are the most common; planning, public works and police are intermediate;
social services are rare. Finance usually represents the most
obvious use of ADP and can most often produce real dollar
savings. Law enforcement, public utilities and education
most often justify and maintain separate ADP facilities due
to special requirements and frequent jurisdictional independence.
Data Banks

The Urban Planning function most often demands comprehensive information concerning the community as a
whole. This demand cuts across functional lines and encompasses real-property, health, welfare, police and other data.
To meet this need there is a growing trend toward the
development of urban "data banks." They are usually
independent of departmental operations, based on one-time
surveys, and rarely maintained current and up-to-date.
Consequently, the data are static, the costs are excessive
and difficult to justify (for planning alone), utilization is
often low, and effective information retrieval and display
techniques are frequently lacking.
Because of the fundamental role of maps in urban
administration, a strong trend has developed toward the
"Geographically-Oriented Urban Data Base" concept. This
technique involves the relation of diverse urban data to
maps by means of coordinate indexing using digitizing
devices. The advantages include: a common denominator
correlating urban data; geo-retrieval; potential for graphics
display; and socio-economic indicators. (See Figure 2.)

844 or 21% Used ADP in Municipal Operations

Costs

Municipal Use of ADP
PO:Qulation

No. of Cities

Over 250K
100-250K
50-lOOK
25- 50K
10- 25K
Totals

54
96
232
477
1213
3303

1962
31-58%
37-38%
39-13%
30- 6%
28- 2%
178- 5%

1965
30-55%
37-38%
46-20%
67-14%
180- 8%

1968
38-70%
48-50%
50-25%
70-15%
57- 5%
272- 8%

1970
45-83%
76-79%
147-63%
226-47%
242-20%
844-26%

Annual ADP Budgets in 1970
Population
Over 500K
250-500K
100-250K
50-lOOK
25- 50K

No. of Cities
27
27
96
232
477

~

Medium

High

$115,000
31,000
5,000
1,000
1,000

$1,755,158
507,954
209,431
80,478
43,478

$6,164,000
1,595,000
990,000
364,000
480,000

Figure 1 - Survey of ADP in Municipal Government
June, 1970 - I.C.M.A.

81.7% of 246 "automated" cities had implemented hardware centralization; 41.9% were developing functional applications for single departments, 9.4% had interdepartmental "data banks," and 11.8% claimed a "Management
Information System (MIS)" approach.2 Problems encountered in centralization include sacrifice in responsiveness to users and the batch processing "bottleneck".
Management responsibility for ADP was found to be in the
22

The acquisition of a computer installation will almost
invariably create more administrative problems and costs
than will be resolved for the first several years. The
computer hardware is only one source of expense; to this
must be added facilities, installation, personnel, supplies,
software, consulting services, etc. Inadequate selection
decisions and lack of planning at tIns point can result in
disastrous future results.
As an example, a small IBM System/360 Model 30
would lease for about $12,000 per month or $144,000 for
the first year. To this must be added various supporting
services. On the average the basic hardware costs of
$144,000 must be supplemented with $190,000 in the first
year, a ratio of 1.3 to 1, for a total budget of $334,000.
(See Figure 3.) Of course, smaller installations can provide
useful results, and some of these costs will be reduced in
future years.
A minimum budget for an effective in-house ADP
installation would probably be about $100,000 per year,
would more likely average about $350,000 and can readily
approach $1,000,000. Therefore, questions of economic
feasibility become highly relevant and consideration of
automation alternatives such as a service-bureau, timesharing or shared facilities become crucial.
Expenditures for ADP usually range from 0.4% to 2.0%
of total budgets, with an average around 1.0%. (See Figure
4.) In many cases, however, the adequacy of the percent is
questionable.
COMPUTERS and AUTOMATION for September, 1971

No.

Agency

1

St. Louis County,
Mo.

Title
Geo-Coding

Plan.

OPI>.

X

Digitized
Level
P.C.
S.1.

•

DASD

Applications

On-Line

Update

Software

Tax Billing
Land-Use
Re-Districtlng
Title Search

No

No

Sporadic

Custom

No

No

HegularBatch

Custom

RegularBatch

Planned
General
Purpose

2

Santa Clara
County, Calif.

Local
Government
Information
Control LOGIC

X

P.C.

Real Property
Voter
Registration
Planning

3

Los Angeles,
Calif.

Automatic
Planning
Operations File
APOF

X

P.C.

Planning
Socio-Economic
Economic

4

New York City,
N.Y.

Geographic
Information
System GIST

X

S.1.

Planning
Assessor

No

No

Department
Responsibility

DIME

5

Portland, Oreg.
Metropolitan
Planning
Commission

Map-Model
System

X

Polygon/
Districts

Land Use

No

No

Field
Survey

FORTRAN/
PLit

6

Kansas City, Mo.

Metropolitan
Planning
Commission
Geo-Plan
System

X

S.I./
Districts

Planning

No

Sporadic

Graphic
Output
Cobol!
Fortran

7

Washington
Council of
Governments

Metropolitan
Parcel File

X

Census
Tracts
Block
Centroids

Transportation
Land Use

No

No

Annual

Custom

8

New Haven, Conn.
Ce.nsus Use Study

Dual
Independent
Map Encoding
DIME
Technique

Research

S.1.

Census
Planning

No

No

N/A

DIl\lE

9

IBM/FSD
Alexandria, Va.

GeographicallyOriented Urban
Data Hase

Research

S.1.

Public Works
Planning

Yes

Yes

N/A

FASTER
Geo- Het l'i('v al

I

No
(Plan)

No
Summary
Files on
Disk

No
(Plan)

Figure 2 - Geo-Data Base Systems Currently Under Development

Political Aspects

There is at present, an explosion of urban problems - in
the physical, personal, social, economic and governmental
aspects of the environment. Secretary Romney of HUD
emphasizes the severity of these problems as follows:
... urgent needs and problems press in upon Our
cities and those who try to govern them: youthful
immorality and drug addiction, idleness, traffic jams,
IBM System/360 Model 30 Disk
@ $12, OOO/Mo. Lease
Facility Rental, 3, 000 Sq. Ft.
@ $5. OO/Sq. Ft.
Site Preparation
Personnel
Supplies
Data Preparation (Key Punch, etc.)
Software
Consulting Services
Education
Total

COMPUTERS and AUTOMATION for September, 1971

District of Columbia
Montgomery County
Prince George's County
Arlington County
Fairfax County
Alexandria

POEulation*

808
341
357
173
249
115

Total
Budget*

ADP
Budget*

Per
Per
Cent CaEita

$750,000
71,000
93,000
31,000
68,000
37,000

$6,000
630
1,063
300
1,350
187

0.7
0.9
1.1
1.0
2.0
0.5

$7.42
1. 85
3.00
1. 73
5.40
1. 62

*In thousands.

Figure 4 - Examples of ADP Budgets in the D.C. Area
$144,000
15,000
30,000
85,000
10,000
12,500
10,000
25,000
2,500
$334,000

Hardware
$144,000
Operating Expenses $190,000
Ratio
1.3

Figure 3 - A Simulated ADP Budget

Jurisdiction

polluted air and water, filth and ugliness, deteriorating education, rising crime, intractable poverty racial, ethnic, social and economic tension.
Against the tide of problems, city governments are
fighting a heroic but generally losing rear guard action
with inadequate citizen concern and involvement,
balkanized and archaic state and local governments,
hostile state and local relationships, inflation, excessive self-defeating property tax structure, and lack of
money.
The crises of hope in local government is the direct
result of a growing sense that problems of the city
cannot be solved, that its government cannot govern,
and that its life cannot be made livable. 3
23

Solving Urban Crises

We will contend that information systems technology
(including ADP) can contribute to solution of these urban
crises. I t can:
• Provide answers to the growing demands for comprehensive socio-economic information on urban
localities to accurately pin-point problems, describe actual conditions, and provide the basis for
the evaluation of social programs.
• Assist local government in meeting the growing
onus of federal & state reporting requirements
associated with grants in aid.
.. Rationalize many administrative tasks through the
process of systems analysis required prior to automation. Procedures must be minimized; the opportunity exists for the elimination or reduction of
unnecessary and unproductive record keeping
tasks.
• Strengthen the planning process as an essential
management tool for the coordination of governmental services rather than a supernumerary function, often separate and independent from the
operational departments.
• Facilitate the operational service functions through
desperately needed automation in such areas as
health, welfare, employment security, licensing,
courts, and many others in which the complexities
and time consumed in standing in lines often
discourages those people most in need of essential
services from utilizing them.
There are two categories of public administration functions that provide further understanding of the political
aspects of information systems.
The first is the internal administration and finance which
involves the ·management and control of municipal organization and resources, such as payroll, personnel, accounting, etc. Internal functions can usually be handled in an
insular fashion without substantial impact from other units
of government, although taxation is often an exception.
The second is public and social services which address
regional problems which do not respect municipal boundaries such as crime, poverty, transportation, pollution, etc.
These service functions often cannot be adequately handled
without close coordination and cooperation with adjacent
jurisdictions.
Too Many Local Government Units

Metropolitan areas are a conglomeration of multiple
levels and numbers of independent jurisdictions. The number of local government units in the 40 largest SMSA's
(Standard Metropolitan Statistical Area) range from 28 to
1,060, are relatively independent of population, and result
in both vertical and horizontal conflicts. (See Figure 5.)
There are several approaches to the solution of this
problem oftoo many local government units.
One solution is the establishment of Regional Councils.
Regional Councils are growing at the rate of over 40% in
the Eastern U.S., according to the National Service to
Regional Councils directories for 1969 vs. 1970. Whether
these agencies can solve the problems, or in some cases
represent only one more jurisdiction to further compound
the problem, remains to be seen. But they appear to be a
step in the right direction.
24

A second way to decrease the number of government
units is the political merger of county and municipal
governments. This has been done in several areas, including
Nashville, Tenn., and Jacksonville, Florida.
The functions performed by local government units vary
depending on their level of jurisdiction. Municipalities
concentrate heavily on public finance; counties usually
perform the real property assessment function; welfare and
employment security are usually administered at the state
level. This factor enhances the importance of regional
cooperation and inter-governmental relations.
Effective Implementation

Internal politics within jurisdictions raises questions
about the effective implementation of ADP, particularly
when a centralized approach is attempted. The functions of
municipal government represent strong vested interests;
furthermore, the possession of information is in itself a
major element of administrative power and influence. The
development of urban information systems cutting across
departmental lines, in which a wide variety of functional

•

1965
Estimated
Rank

SMSA Ci

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40

New York
Chicago
Los Angeles
Philadelphia
Detroit
San Francisco
Boston
Pittsburgh
St. Louis
Washington
Cleveland
Baltimore
Newark
Minn.-st. Paul
Houston
Buffalo
Milwaukee
Cincinnati
Paterson
Dallas
Seattle
Kansas City
San Diego
Atlanta
Indianapolis
Miami
Denver
New Orleans
Portland (Ore.)
Providence
San Bernardino
Tampa
Columbus
Rochester
Dayton
Louisville
Bi~mingham

San Antonio
Anaheim-Santa Ana
Memphis

Local
Governments
11366
6689
6765
4664
3987
2918
3205
2372
2249
2408
2000
1854
1857
1612
1696
1320
1275
1347
1307
1289
1179
1183
1136
1216
984
1061
1073
1027
897
739
1026
873
847
804
791
771
644
808
1107
740

555
1060
234
963
242
346
125
806
482
84
205
28
204
261
166
153
238
259
196
198
281
338
140
84
311
32
205
31
374
72
250
40
128
224
162
129
79
59
114
46

(Dept. of Commerce, Bureau of the Census;
"Census of Governments" 1962, Vol. V,
Local Governments in Metropolitan Areas.)

Figure 5 - Local Government Units in Standard
Metropolitan Statistical Areas

COMPUTERS and AUTOMATION for September, 1971

•

information may be readily accessible to many individuals,
is often conceived to represent a threat to these vested
interests.
Typically, municipal functions have not been developed
in the context of advanced technology for handling information. Separation of functions was required to make
manual record keeping tasks manageable, leading to extensive fragmentation. Legislative, political and economic
motives also led in this direction.
With the availability of ADP it makes little sense to
sustain this situation; e.g. financial management is often
fragmented into separate accounting, budget, revenue, purchasing, payroll and other segments. Systems analysis reveals these factors and ADP technology demand a more
sensible integration of functions. So what we are talking
about is not information system integration, but rather the
integration and reorganization of basic municipal functions.
The organizational locus of the ADP organization also
presents a tense political problem. Although, it often
originates in the Finance department, its broad service
responsibilities often lead to an independent status under
the chief administrative officer. Department heads often
come to feel that the ADP group usurps their authority.
This is often due to the failure to make ADP techniques an
inherent part of the administrative process.
The administrative weakness 'of the planning function,
contrasted with its heavy demands on the use of ADP, also
compounds the problem. There is need for more effective
use of planning as a viable tool for urban management.
Management must interact continuously with operations,
receive information feedback, and provide evaluative data
on the effectiveness of programs.
The "Privacy" Issue
The cross-correlation and availability of comprehensive
data on persons raises serious questions concerning the
individual's rights to "privacy". This issue is with us at
present and is not brought about by ADP alone. Solution
will involve legislative and administrative safeguards to
establish proper guidelines (which often do not exist at
present) and the use of technological restrictions such as
scrambling, keyword, physical security and limited access.
This issue is often confused with that of confidentiality,
which refers to the proprietary possession of data by
specific departments (which may otherwise be in the public
domain). This is another internal political constraint that
may be difficult to justify, but it often results in significant
obstacles to effective system development and implementation.
If management adopts the concept of "enlightened
self-interest" in this sphere, the result can be the concurrent
strengthening of both administrative procedures and political entrenchment. Many have concluded that "our localities
have suffered a reduction in their capacity to govern
themselves." I maintain that the effective utilization of
information system technology can begin to close this gap.

D
References
1. Malchus, Watlington, "ADP in Municipal Government," Urban
Data Service, International City Manager's Association, Oct.
1970, Vol. 2, No. 10.
2. Howe, G. and K. L. Kraemer, "Automated Data Processing in
Municipal Government", 1968 Municipal Yearbook, International City Manager's Association, p. 293.
3. 46th Annual Congress of Cities, December, 1969.
COMPUTERS and AUTOMATION for September, 1971

Hirschfield - Continued from page 17
Of course, auditing of the system is a much more
extensive subject and one of great concern for both the
internal and external auditors of an organization. For
auditors must not only be capable of reviewing the integrity
of the controls and security in an on-line system, they must
determine the effectiveness of these controls and, most
important, be able to detect any changes to the system
which affect control and security levels. With less hard copy
being produced, the traditional "audit trail" is vanishing;
and the auditor must develop new techniques for validating
the effectiveness of control and security measures. Some of
the techniques that we recommend are:
I. Involvement of the auditor in the systems development effort to insure that adequate controls are
built in initially and that the auditor is aware of
the control points and satisfied with the systems
auditability. Should an auditor experienced in
electronic data processing be your Security Officer? It might be a good idea.
2. The use of error analysis systems, particularly in
new systems, to indicate weaknesses in systems
design which may affect controls.
3. The use of computer audit programs to evaluate
the accuracy of data files. An even more advanced
approach is the development of resident audit
modules in the system which can be triggered
either externally or internally by a dynamic happening in the application process.
4. The use of the mini-company concept, wherein a
fictitious set of records is processed in the same
stream and by the same programs or modules that
perform normal processing. In this way the results
of processing can be verified without affecting live
data.
None of these techniques can stand alone. In fact, in many
installations the use of all these techniques is advisable to
evaluate the effectiveness of systems controls. The key
point is that the auditor will want to be, and should be,
heavily involved in the areas of on-line security and control.
No system is self-auditing, and exposure to the auditing
process may be the best guarantee for the systems developers that the system is truly secure.
Summary
Obviously, in a short article, the requirements of on-line
security and control can only be lightly covered. Many
extensive volumes and papers have been written on each of
the subject areas covered. The purpose of this article is to
point out some of the problems inherent in securing on-line
systems and some potential avenues of solution.
The selection of the appropriate avenues is a task
requiring careful evaluation, for implementation can be
complicated, costly, and add greatly to systems overhead.
Therefore, the user must carefully evaluate and cost justify
the security measures. He must question critically, What is
the data worth? What are the true ramifications of the
computer system being out of operation one hour; two
hours; a day? Ramifications may take the form of direct
loss, interruption of customer service, or a failure to fulfill
legal obligations. In short, what are the problems and what
alternatives exist? Then, and only then, can the user decide
on an adequate level of security that he is prepared to pay
the price to achieve.
D
25

The Federal Bureau of Investigation and the
Assassination of President Kennedy

"Although the Warren Commission had a substantial staff of lawyers, it had no
true investigative staff of its own. Consequently, the Commission relied upon
other agencies - the FBI, Central Intelligence Agency, Secret Service, etc. - for
field investigations and laboratory work. Of these agencies, the FBI acted as the
principal investigative arm of the Warren Commissioll . ..

Bernard Fensterwald, Jr., Attornev
927 15th St., N.W.
Washington, D.C. 20005

The President's Commission on the Assassination
of President John F. Kennedy, popularly known as
the "Warren Commission", was appointed by President
Lyndon B. Johnson on November 29, 1963. Less than
a year later the Warren Commission submitted its
report to President Johnson.
Reliance on Other Agencies for Investigation

Although the Warren Commission had a substantial
staff of lawyers, it had no true investigative staff
of its own. Consequently, the Commission relied
upon other agencies -- the FBI, Central Intelligence
Agency, Secret Service, etc. -- for field investigations and laboratory work. Of these agencies,
the FBI acted as the principal investigative arm of
the Warren Commission.
Theoretically, at least, the FBI was the agent
of the Warren Commission and did what the Commission
instructed it to do. In actual fact, the relationship between the two was not that simple. But whatever the complexities of the relationship, the role
played by the FBI was key to the Commission's working processes and its ultimate product -- the Warren
Report.
~his article focuses upon some aspects of the
FBI's role in the investigation into President
Kennedy's assassination. It concludes that the FBI
did not properly perform its duties. The article
charges, among other things, that:

•

the FBI withheld much pertinent information
from the Warren Commission;

•

the FBI flooded the Commission with reams of
irrelevant data;

•

the FBI altered some items of evidence, and

• in some instances the FBI procrastinated in
investigating and reporting relevant information.

26

A. The FBI Dominated the Investigation:
Did It Do Its Job Well?

1. Assigned by President Johnson to conduct a
"full and thorough" investigation of the assassination [IJ, the FBI produced a Summary Report [2J,
complete with embossed cover and plastic binder,
barely two weeks after the murder of President
Kennedy and before the Warren Commission could even
organize its staff or appoint its Chief Counsel
[3J. That report, and a similarly glossy FBI ~­
plementary Report [4J date January 13, 1964, contained allegations of medical findings and other
basic evidence which are in irreconcilable conflict
with the Commission's own findings on the same
evidence.
Premature Commitment

In addition, these reports prematurely committed
the FBI -- and probably the Commission as well -to the thesis that Oswald and Oswald alone was
guilty of having assassinated President Kennedy.
The FBI's errors on the evidence -- if that is what
they were -- were so embarrassing to the Commission
that these FBI reports were suppressed in the Commission's own Report and in its 26 volumes of Hearings and Exhibits as well [5]. The contents of
these two FBI reports, which seriously conflicted
with the Warren Commission thesis, were not disclosed until 1966 [6J.
Bullet Fragments and Data

2. The FBI withheld much pertinent information
from the Warren Commission. For example, the FBI
did not supply to the Commission the essential details of the spectrographic analyses of the bullet
and bullet fragments.
Yet this was absolutely crucial evidence, as it
could have shown whether all the projectiles and
the bullet were identifiable with a single batch of
ammunition. Instead, the FBI reported only that
COMPUTERS and AUTOMATION for Sepfember, 1971

,

the composi tion of these items was "similar" [7J.
Parenthetically, it should be stated that the
Warren Commission did not demand the details of the
spectrographic analyses, though it should have.
On the other hand, when members of the Commission
staff made inquiries about neutron activation analysis of the areas surrounding the alleged bullet hole
in the President's shirt collar and the nick on his
necktie, FBI Director J. Edgar Hoover personally
shunted aside any effort in this direction by throwing cold water on the usefulness of such tests as
an aid in understanding the origin of the hole and
the nick [8J. Yet neutron activation analysis is
a test several times more refined than spectrographic
analysis and might have resolved conclusively certain questions about the origin of the hole in the
President's shirt collar and the frayed area on his
necktie. As a consequence, these tests could have
answered questions as to whether a single bullet did
in fact inflict all seven wounds on both President
Kennedy and Governor Connally, a claim which the
Commission made and which was essential to its contention that the President was assassinated by a
lone rifleman.
Oswald's Records of FBI Agent Hosty

3. In a different form of dereliction, the FBI
sometimes procrastinated in reporting to the Commission the results of its investigations. Thus,
in one instance the FBI delayed seven weeks in reporting the contents of selected pages from Oswald's
notebook. These are the pages which contained the
name, address, phone number, and other data about
FBI Agent James P. Hosty, and which suggested a
possible informant-agent relationship between the
two men [9J.
Dental Charts of Jack Ruby's Mother

4. Meanwhile, the FBI did not hesitate to swamp
the Commission with time-consuming irrelevancies.
These included the dental charts of Jack Ruby's
mother [lOJ and the subtle distinctions between the
Caucasion, Negroid, and Mongoloid hairs [llJ. Recently it has come to light that the FBI sent to
the Commission two copies of a 48 page compilation
it made of Marina Oswald's medical records for the
period of her pregnancy [12J.
5. The FBI also meddled with evidence on occasion.
Thus, a camera said to have been used by Oswald
to have his picture taken ,holding the alleged assassination weapon was mended by the FBI prior to
duplicating the photographs [13J. The original
Oswald-with-rifle photographs themselves were belatedly examined for fingerprints by the FBI in
1968, while in the possession of the National Archives, and they are no longer in recognizable
condition [14J.

is 73, and 3 other employees are named as being absent from work that day [15]. Yet the Secret Service had previously identified 80 employees on December 7, 1963 [16J. Another employee, Gordon Wayne
Smith, who did work on November 22, 1963 and was in
the same group as Oswald, had been interviewed superficially by the FBI on November 27, 1963 [17J.
There is no record of a subsequent report on him
by either the Secret Service or the FBI. Scattered
references in the testimony and various Commission
exhibits establish that several other persons are
known to have been in the TSBD on the morning of
November 22, 1963, but some of these have not been
identified to this day [18].
B. Oswald Took the Rap: But Was He an FBI "Subject"?
an FBI "Informant"? or Both?

1. Texas Attorney General Waggoner Carr, based
on information supplied to him by Dallas District
Attorney (and former FBI agent) Henry Wade and
others, informed the Warren Commission in January,
1964, that there was evidence that Oswald had been
an FBI informant [19J.
The Emergency Meeting of the Warren Commission
That Was Unreported

This information occasioned an emergency meeting
of the Warren Commission on January 22, 1964. The
stenographic record of this meeting was confiscated
and never written up [20J. Carr and Wade were among
those then invited to Washington to discuss this
allegation with the Commission. The meeting was
held in total secrecy on January 24; even the stenographic reporters were excluded [21J. The proceedings have neVer been published.
The Commission resolved the dilemma which this
allegation posed by asking J. Edgar Hoover if Oswald was an FBI informant. The FBI Director responded that Oswald was not an FBI informant, after
which the Commission dropped the matter.
Oswald Sought an FBI Interview
When Jailed in New Orleans

2. On August 9, 1963 Oswald was arrested in New
Orleans for disturbing the peace. This charge arose
out of an altercation which occurred when Oswald
distributed leaflets on behalf of a purported New
Orleans chapter of the Fair Play For Cuba Committee
(FPCC), a national organization suspect~d as subve~~
sive by the FBI. Strangely, Oswald asked for and
promptly got an interview with an FBI agent [22J.
Would a "true" subversive seek an FBI interview
upon being jailed? The FBr-Iater explained to the
Commission that it was apparent from the interview
that Oswald "was making a self-serving statement"
[23J but the FBI also charged that Oswald had told
the agent numerous lies during the interview and
they neglected to show how any of this served Oswald's supposed purposes.

Lack of Identification of at Least 7 Persons

6. The FBI never interviewed or even identified
some of the persons who were employed at the Texas
School Book Depository (TSBD) at the time of the
murder.
Yet certain of these persons might have been
among the most important witnesses in the entire
investigatian. A letter from J. Edgar Hoover to
the Commission, date April 3, 1964, purported to
forward statements "from each person known to have
been in the Texas School Book Depository on November 22, 1963." The number of statements forwarded
COMPUTERS and AUTOMATION for September, 1971

Seven FBI Agents Associated with Oswald

3. At least seven different FBI agents are known
to have been associated with Oswald during the year
and a half after his return from Russia and before
the assassination, several of them through personal
interview of Oswald [24J.
One agent, Warren DeBrueys, prepared a report
dated October 25, 1963, concerning the "Fair Play
For Cuba Committee - New Orleans Division" [25J.
Published references to this report seem to indicate that it is entirely or almost entirely about
27

Oswald [26J, although by this date Oswald had departed New Orleans at least a month previously and
the FBI later stated that its investigations during
the Summer of 1963 "disclosed no existence of organized FPCC activities in the New Orleans area"
and, in fact, "the only activities in behalf of the
FPCC appeared to be those efforts made by Oswald"
[27J. The DeBrueys report, while apparently made
available to the Warren Commission, is not printed
in the Commission volumes and has never been released to the public by the FBI.
4. FBI Director J. Edgar Hoover, in a letter to
the Commission on May 4, 1964, submitted an itemized list of "the contents of the FBI headquarters
file concerning Lee Harvey Oswald up to the time
of the assassination ... " [28J. The list contains
no fewer than 69 items, but despite its length there
are at least two known FBI reports concerning Oswald,
prepared prior to the assassination, which are not
included [29J. Hoover's letter offered no explanation for such omissions.
5. FBI Director J. Edgar Hoover submitted a letter and affidavit to the Commission in February,
1964, in which he stated "categorically" that Oswald
had never been an informant for the FBI [30J. Taken
in context, Hoover's statement is a response to the
allegation that Oswald had been a paid informant for
the FBI. Consequently, the refutation of this allegation overshadowed other ticklish questions about
the nature of Oswald's contacts with the FBI. The
Commission itself published FBI reports of interviews
of Oswald on June 26 and August 16, 1962 [31J, which
state that Oswald had promised to cooperate ~ith the
FBI by reporting "any contacts, or attempted contacts,
by the Soviets under suspicious circumstances or
otherwise." On its face, it seems rather strange
that an alleged Marxist who defected to Russia should
agree to cooperate with the FBI to the detriment of
the Soviet Union.
C. Unanswered Questions About the FBI's Knowledge
of Oswald Prior to the President's Assassination

Convincing evidence exists that Oswald could not
have been the lone assassin of President Kennedy-.-Close examination of the available evidence suggests
extensive fabrication and cover-up, and also suggests
the clear possibility that Oswald was framed for a
crime with which he had no connection, particularly
not as a rifleman [32J.
But assuming for the sake of argument that, although contrary to the evidence, the Warren Commission thesis about Oswald is true, there remain embarrassing but unanswered questions.
1. Dallas FBI Agent James P. Hosty was assigned
to investigate Oswald prior to the assassination of
President Kennedy. Hosty is reported to have asserted to a Dallas Police Detective on the afternoon of
the assassination that the FBI was aware of Oswald
and that they had infor~ation that Oswald '~as capable of committing the assassination of President
Kennedy" [33J. Hosty later denied making any such
statement, contrary to convincing evidence that he
had [34J.
2. FBI Director J. Edgar Hoover defended Hosty
and claimed that the FBI did not have "any indication that this man was a dangerous character ... "
and that there had been no information to justify
referral to the Secret Service [35J. The Commission
disagreed, and after recounting Oswald's history of
hostile and erratic behavior, all of which was well
known to the FBI, observed: '~ll this does seem to
28

amount to enough to have induced an alert agency,
such as the FBI, possessed of this information to
list Oswald as a potential threat to the safet~ of
the President" [36J.
3. Marina Oswald lived at the residence of Ruth
and Michael Paine in Irving, Texas, for some weeks
prior to the assassination and Lee Oswald frequently
stayed there. For reasons said to have been related
to Oswald, the FBI initiated a full field investigation of the Paines in late October, 1963, actually
visiting the Paine residence on November 1 and 5,
1963 [37J. FBI Agent Hosty claims that he learned
of the Oswalds' living with the Paines only after
learning of a change of address filed by Oswald in
New Orleans [38J.
FBI Interception of Oswald's Mail

4. Numerous FBI reports, some only recently declassified, establish conclusively that Oswald's
correspondence with certain organizations was being
intercepted and supplied by confidential informers
to the FBI. One such report cites the contents of
an Oswald letter to the FPCC in April, 1963, the
source being described as "Dallas confidential informant T-2" [39J. A New York informer reported an
Oswald letter to The Worker in June, 1963 [40J.
Another FBI report shows awareness of Oswald's correspondence with the Soviet Embassy in Washington
in August, 1962 [41J. The FBI neither admitted nor
denied operating a mail cover on Oswald, although
this would have been a simple and logical extension
of the FBI's investigation of him. The existence
of a mail cover on Oswald is, however, a legitimate
question, for if such a mail cover was placed on
Oswald prior to March, 1963, then the FBI may have
known of Oswald's receipt by mail of the rifle
which he allegedly used to assassinate President
Kennedy. Knowledge of Oswald's receipt of this
weapon would clearly have signalled his "capability"
for violence which the FBI claimed was unknown.
5. The FBI possessed a massive dossier on Oswald
and his activities for several years [42J. FBI Agent
James P. Hosty, who knew intimately of Oswald's past
and his place of employment at the TSBD, claimed to
have been totally unconcerned about Oswald as a
threat to the President [43J. Yet this same Hosty
said he took it upon himself on November 21, 1963,
to inform the Secret Service of certain right-wing
activities and threats to the President in Dallas
[44J. proving that there was no lack of opportunity
for the FBI to have warned about Oswald.
D. Does the FBI Mislead Its Bosses?

1. The day after District Attorney Jim Garrison
arrested New Orleans businessman Clay Shaw and
charged him with having conspired to murder President Kennedy, Ramsey Clark, who was in the midst of
Senate proceedings to confirm him as Attorney General, asserted that the FBI had included Shaw in
an investigation into the assassination it made in
November and December of"1963. Clark then claimed:
"On the evidence that the FBI has, there was no
connection found" [45J.
2. Three months later the Justice Department
issued another statement which proclaimed that
Clark's earlier statements were in error and admitted that the FBI did not investigate Shaw during
its probe of President Kennedy's assassination [46J.
3. J. Edgar Hoover has recently asserted that
Ramsey Clark was a "jellyfish" - the worst Attorney
General he had ever served under. "He was worse
than Bobby," Hoover said [47J.
COMPUTERS and AUTOMATION for September, 1971

However, the incidents related above raise a
serious question about Hoover. Did Hoover's FBI
mislead Attorney General Clark as to whether the
FBI had ever investigated Clay Shaw during its probe
of President Kennedy's assassination?
CITATIONS

Following is the explanation of abbreviations used
in the citations below:

•

WR

Warren Report

CE

Commission Exhibit (Printed in one or
another of the 26 volumes of Hearings
and Exhibits; these can be located by
exhibi t number.)

CD -- Commission Document (These are not printed but are available for examination at
the National Archives, provided they are
not still classified.)
Certain exhibits, e.g. Gallagher Exhibit 1,
are referred to by the name of the p~rson testifying at the time they were introduced; these are
printed in the 26 volumes and can be located by
name and number in the appropriate volume as identified by the binder.
Testimony is cited by volume and page number,
followed in parenthesis by the name of the person
testifying, e.g., "5HIO:::> (J. Edgar Hoover)" means
volume 5, page 100, testimony of J. Edgar Hoover.
In a few instances involving references to lengthy
exhibits, this same notation is used to specify
a particular volume and page number to facilitate
the location of the information being cited.

18. For example, see 6H366-367 (Danny Arce); Decker
Exhibi t 5323 (19H511 re a "Joe Loraine") i CD
897, pp. 35-36 (re a Mr. & Mrs. Hawkings).
19. Congressman Gerald R. Ford, Portrait of the Assassin, pp. 13-25
20. Records of Ward & Paul, Court Reporters, Washington, D.C., 1964
21. Ibid. (no entry); the meeting itself is described by Ford, QQ Cit., pp. 13-14.
22. WR, pp. 436-437; CE 833, p. 7
23. CE 833, p. 10; see also 5Hll (Alan Belmont)
24. CD 821 through 824, 826, 829, and 833
25. CE 833, pp. 7 & 9
26. Ibid.
27. Ibid.
28. CE 834
29. Known to be in existence but not included in
Hoover's list are the Fain report of 5/12/60
(see CE 821) and the DeBrueys report of 10/25/63
(see CE 833, p. 7-9). See also 5H26 (Alan Belmont) re certain Hosty notes or reports in
October-November, 1963.
30. CE 825 and 835
31. CE 823, p. 13; CE 824, pp. 1 & 6

1. 5HIOO (J. Edgar Hoover)

3. WR, pp. x-xi

32. See particularly the works by Sylvia Meagher
(Accessories After the Fact) and Harold Weisberg (Whitewash II: The FBI-Secret Service
Cover-Up and Photographic Whitewash).

4. CD 107 and 107.1

33. WR, p. 441

5. No part of CD 1, 107, or 107.1 is printed in the
Report or Volumes. Neither J. Edgar Hoover
nor Alan Belmont (Asst. to Hoover) refer to
them in testimony.

34. WR, pp. 441-442; CE 709 & 711

2. CD 1

6. "List of Basic Source Materials," National Archives, released to public in 1966. See also
Sylvia Meagher, Accessories After the Fact,
Bobbs-Merrill, 1967, pp. 147-148.

35. WR, pp. 442-443; CE 833, p. 2 of cover letter
36. WR, p. 443
37. CE 830; CE 833, pp. 12 & 13; 4H446-448 (James
P. Hosty); 5H26 (Alan Belmont)
38. 4H447 (Hosty); CE 833, p. 13

7. 5H67 (Frazier)
•

17. CD 5, p. 375; see also CE 1949 (23H751)

39. CE 829, p. 2; CE 833, p. 5

8. Gallagher Exhibit
9. CD 833, p. 15; 5Hl12 (Hoover); the actual entries
may be seen in CE 18 (16H64)

40. CE 833, p. 6; see also CD 28, pp. 3-4; CD75,
pp. 672-673 (declassified in 1970)
41. CE 824, pp. 1 & 4

10. CE 1281

42. WR, pp. 433-440

11. CE 668 through 670

43. 4H460 (Hosty)

12. CD 884

44. Ibid.

13. 4H284
14. Information from the National Archives

45. New York Times, March 2, 1967, p. 22
46. Ibid., June 3, 1967, p. 64

15. CE 1381

47. Washington Post, November 17, 1970, p. 1
16. CD 87, Secret Service

~491

COMPUTERS and AUTOMATION for September, 1971

29

THE UNEMPLOYED COMPUTER PROFESSIONAL
TURNED BUSINESSMAN: Products and Services
Which a New Small Business Might Produce or OFFer
" ... Outside the computer field the opportunities for an unemployed computer
professional as a businessman seem to be brighter. "

Edmund C. Berkeley
Editor, Computers and Automation

Note: This article is printed as a result of
receiving many requests from subscribers for
a memorandum offered at the end of the editorial in the May 1971 issue:
How an Unemployed Computer Professional
Might Start His Own Business and Earn a
Reasonable Income as his own Employer

In these days when unemployment has overtaken
many computer professionals, some of them might
well go into business for themselves.
This course of action naturally raises a number
of questions. One of the first questions is "Shall
I stay in the computer field?"
Computer Field

The computer field in my opinion is not likely
to be a good field for a new small business for
a number of reasons, such as
There is intense competition;
Many well-trained sales staffs make very
active sales efforts;
Most computer products, after they have
been sold, require servicing, over a wide
geographic area;
Customers may not stay sold;
Most computer products require advanced
professional engineering, which takes
time and is costly;
As competition increases, the prices of
computer products are likely to go down
and down;
Good business management and good technical
engineering are not usually combined in the
same unemployed person; etc.
In fact, there has been intense cultivation of
the computer field as a glamor economic field for
at least fifteen years; and most of the economic
prizes have been and will be awarded to the bigger
companies.
Outside the computer field the opportunities for
an unemployed computer professional as a businessman seem to be brighter.

30

Small Businesses in Towns or Suburbs

A large number of small businesses operate and
survive in small geographical areas. These include:
carpenter, electrician, painter, roofer, plumber,
etc. Also repairing services for: automobiles;
typewriters and other office machines; clothes
washing machines, dishwashing machines, and other
household appliances; etc. Also, gift shops, music
shops, fabric shops, florists, and other local
suppliers of merchandise. Some of these occupations
naturally have training requirements or local governmental requirements to be met.
The classified advertising pages of the local
telephone directory should give a full panorama of
possibilities in this area.
Anybody who considers paying a carpenter $10 an
hour for moderately good work might well prefer to
pay $6 an hour to an unemployed computer professional who is able to do carpentering work just as
well.
Guides to many of these businesses and occupations should be obtainable from the Department of
Labor or the Department of Commerce.
Small Businesses in Large Cities

In larger cities there are many more pos~ibili­
ties for businesses, built around unusual products.
Examples I have recently noticed in New York include:
-- A maker of "high-fashion" leather sandals,
who had developed quite a reputation in
Greenwich Village.
A maker and repairer of umbrellas, who
offers excellent products at reasonable
prices. For example, he provides among
other things men's folding umbrellas
(which can be carried in a briefcase
unt i l it ra ins) .
-- A French pastry shop, making delicious,
unusual baked goods, a shop which seems
to be always full of customers paying high
prices.
One way to find a large number of possibilities
would be to compare the classified telephone directory for one's own city with the classified telephonp. directory for New York or San Francisco.
Unusual Products

There is a fascination about unusual products,
which often can lead to a ·success in a new business.

COMPUTERS and AUTOMATION for September, 1971

•

Among products and services which are new (do
not yet exist) or are not new but are unusual (or
difficult to some extent to obtain) are the following:
1. Unbreakable Electric Alarm Clock. The common
electric alarm clock breaks as soon as it is dropped.
It ought to be possible to transfer the works of
any electric alarm clock into an unbreakable plastic case and otherwise engineer it, so that if
dropped it will not break nor stop running.
2. Novel Foods. There is apparently a considerable
of demand for health foods, and foods produced by organic gardening. People are willing to
pay more for what they think is really good food.
Several kinds of unusual bread have become famous
in this way.

~psurge

3. Sunny Window Greenhouse. It should be possito provide materials, controls, and instructions
for a combination greenhouse-terrarium (a "greenarium"), which would be placed in a sunny window
in the home. By its means, tomatoes and other
vegetables and food ought to be able to be grown
year-round in the home. (This project has been
tried, not very successfully, in the past; but
sufficient research and development work has probably never been invested.)
bl~

4. Artificial Emeralds. It should be possible to
make artificial emeralds (aluminum beryllium silicate,
colored with chromium oxide) in a small electric
furnace. I have heard a rumor that someone is already doing this, using a secret process of his own
invention. Natural emeralds are very rare, in fact
much rarer and much more valuable than diamonds'
synthetic emeralds would be very beautiful and '
should sell for a good price.
5. Home-Programmed Knitting Machine. It should be
possible to make a small knitting machine for home
use that could be programmed from a bought punched
paper tape, and which would enable unskilled people
at home to knit socks, sweaters, undershirts, etc.
6. Home Grinding Machine. It should be possible
to provide small electric-motor driven machines for
home grinding of wheat, rye, corn, other grains,
dried peas and beans, coffee beans, etc., so that
fresh on-the-spot flour or meal could be provided
for home cooking. Probably such a machine already
exists -- but is not vigorously marketed.
7. Stockings and Panty Hose -- Spray. It ought to
be possible to find a spray to make stockings and
panty hose not run ~ so that if snagged the tear
remains small and does not spread. The spray might
tack together the crossing stitches in the hose so
that they would no longer unravel.
8. Stockings and Other Fabrics Which Do Not Unravel. It ought to be possible to weave nylon,
etc., into stockings and other fabrics that will not
succumb to runs. Such stockings ought to capture
the market from stockings that can have runs.
9. "Minuteries Electriques." This is a French
name for time-delay relay devices which close an
electric circuit only for a short time. They can
be used for lavatory lights, hall lights, etc.
They are used very widely in France (where electricity is very expensive).

removing your shoes. Made in France for Air France,
and given to airline passengers as a gift.
11. Eye Covers, or Blinders. To place over your
eyes when there is bright light around you, so
that you can rest or sleep in the dark. Made in
Japan for Pan-Am Airlines and distributed to airline passengers as a gift.
12. Scientific and Engineering Specimen Collections. Collections of different kinds of paper, with
explanations. Collections of different kinds of
artificial crystals. Collection of different kinds
of cleavages (calci te, galena, feldspar, sphalerite,
fluorite -- see a textbook on mineralogy). Collections of common fastenings and stampings and descriptions of what they are used for. Etc.
13. Rechargeable Flashlight Battery. Cheap.
Easy to recharge. Proof against leaking.
14. Hair Cutting Kit. So that a man can cut and
style his hair for himself in the way he himself
chooses -- without paying a barber $100 a year.
Including mirrors so that he can see the back, the
sides, and the top of his head. (Also, similar kit
for girls.)
15. Gardening Kit. So that a person can remove
weeds from and grow flowers in his flower beds much
more efficiently. Including various kinds of pestkilling devices and materials, such as praying manti ses, sprays, fertilizers ," etc., with directions.
With soil testing kit.
16. Ec~logical..Recycling Kit. So that a person
can use ( recycle) autumn leaves, ,glass, waste
paper, cans, manure, and other debris from his
house, kitchen, bathroom, etc., to make humus,
wrapping paper, furnace oil, etc. One way to grow
rich might be to convert all one's trash into useful productsl
17. Solar Heating Equipment. So that you could
cut down your fuel bill to 1/2 or 2/3 of what it
was before.
18. Light-Weight Shopping Bag with H8ndles. In
France,Great Britain, Switzerland, etc., when you
buy goods in a store, the store almost never gives
you a large paper bag to carry them away. Usually,
you bring your own very light-weight, very sturdy
shopping bag, to hold all your purchases. This
type of bag (on sale in many local stores in Europe)
is usable over and over, durable, and folds up
smaller than a handkerchief.

19. Old-Fashioned Products No Longer Sold. Compare an old Sears-Roebuck catalog with a current
one; and see which products have gone out of use
(like a bread-making machine). Choose some of these
products that are appealing and produce them and
offer them again.
20. Small Vacuum Cleaner: Improved; easy to take
apart and put together again; fan ahead of the dust
bag.
21. Snow Shovel. With replaceable blades so that
you do not have to throwaway the whole snow shovel
when the blade you are using gives up.

Ideas Which Can Lead to New Products

10. Slippers of Fabric. Very light. For traveling. Enables you to rest your feet while traveling,

COMPUTERS and AUTOMATION for September, 1971

Finally, there are many ideas, questions, prin31

ciples, and schemes which can lead to new products,
such as the following:
1. Can you make it more convenient?
2. Can you make it last twice as long? or
much longer still?
3. Can you make it replenishable or refillable
or reusable or otherwise increase its life
and usefulness? and decrease trashing?
4. Can you engineer it from the point of view
of the consumer (who is often neglected) -not the point of view of the manufacturer
who wants to make more, nor the point of
view of the salesman who wants to sell more.
5. Can you make it more desirable, filling more
needs, more comfortable to use, more of a
help to the user, more of a friendly expression to the customer who was good
enough to you to buy it from you?
6. Can you make the use of it take half the
time that the old one required?
7. Can you make it repairable? (Think of the
toys that fifty years ago could be mended
with nuts and bolts in holes;-and that nowadays cannot be mended because they are
made of plastic and the plastic has broken.)
8. Can a product which is in wide use in a foreign country be wanted here and used here?
(Example: the Volkswagen).
9. Can you apply a new source of modern power
(like an electric motor) in the home, so
that a big external business is no longer
needed? (Example: Because of the electric
motor, the entire business of making flour,
it would seem, could be replaced by grinding
grain on the premises where the flour is to
be used.)
I hope these suggestions and ideas may be of use
to unemployed computer professionals who are interested in starting their own businesses.
But the road to success is long and hard, and
requires much work, much knowledge, and much common sense, both elementary and advanced.

"90 MILLION PEOPLE FULLY EMPLOYED IN 80 MILLION
JOBS" - COMMENTS
From "Speculation"
Bethesda, MD

The editorial in the March issue of C&A ("The
Number of Answers to a Problem") intrigued me as
well as tickled my fancy. However, you overlooked
the warning Rudyard Kipling offered in the 69 ways
for making tribal lays in that" ... every-singleone-of-them-is-right ... " and your own advice that
" ... 70, plus or minus half a dozen, ... " might be
offered.
You concluded that it is "impossible" for 90 million people to be fully employed in 80 million jobs.
I offer the very recent "Wall Street Journal"
page one article of 23 March 1971 in contradiction.
It is enti tled "The Seven-Day Week" (get 26 weeks
32

off per year at full pay). Simply put, 160 million
people could be fully employed in 80 million jobs.
In fact, the concept of "time-off" is readily acceptable as "any-part-of-the-day" for shift work.
Putting aside religious issues, for discussion's
sake, why can't the American economy and business
community go to a concept of "work every'day"?
The enterprise would be manned 7 days a week 24
hours a day except for a few (10 to 15) national
holidays.
The individuals involved would be employed in
staggered shifts, staggered hours, staggered periods
of no work and vacations.
More managers, services, employees ... , in fact
everything, would be required. The result would be
an instantaneous (almost) shortage of every skill,
every resource, men, machines, materials, factories,
services, money, etc. Ah, yes, and an increase in
the by-products -- waste ecological overloading -but why not solutions, too?
There are many answers and many values for those
answers.
I [ear tha t Murphy's Second Law -- "If left to
themselves, things always go from bad to worse" -is an excuse for procrastination.
As a systems analyst, I prefer gambler Leoz's
laws:
(1) The breaks are what you make for yourself;
(2) Avoid paralysis by analysis;
(3) A committee of one gets things done; and
(4) If it works, take care of it.
Not only is proof not always needed but it could be
costly and undesirable.
Since I am just speculati ng "out loud," you may
print this letter and sign it "Speculation".
Not until after I get my postgraduate degree (PhD)
will I care to obtain personal pUblicity and then I
hope it will be through a much more professional
article for C&A, whose standards I admire.

From Karl Force
Prudential Ins. Co. of America
Newark, N.J. 17101

Re your editorial in the March issue: your imagination is drooping. It is not impossible to fit
90 million people into 80 million jobs ... especially if we consider that an actuary may become an
editor of a computer magazinel
REDUCE THE WORK WEEKI

CORRECTIONS

In the April 1971 issue of Computers and Automation? the following corrections should be made:
Page 30, "7. The Case of The Superseding of
the Vacuum Tube": In paragraph 2, line 11?
replace "bandwi th" by "bandwidth"; in paragraph 4?line 5, replace "board" by "broad".
COMPUTERS and AUTOMATION for September, 1971

I BELIEVE IN AN ANTI-BALLISTIC MISSILE SYSTEM

1. From Robert L. Glass
26414 124th Ave. SE
Kent, Washington 98031

The question I have been asked is "Would you
trust your children's lives to a computer system
which cannot be checked out?"
I am a computer programmer, one who has been
around long enough to remember "CLA" and even "RAU" ,
a couple of machine instructions for computers long
since obsolete. And I have never yet written a
checked out program.
Oh, I have a lot of confidence in my programs.
I believe in them. But I never believe they are
really checked out.
So my answer to that question is another series
of questions:
"Would you trust your children's lives to a
school class scheduling program which is not checked
out?"
"Would you trust your children's lives to an
air traffic control program which is not checked
out?"
"Would you trust your children's lives to a
mandatory school busing program which is not checked
out?"
My answer, of course, is yes ... 1 dodoit,andI
would do it. And my question to those who would
ask me such questions is "Would you trust your
children's lives to a non-computerized diplomatic
system which cannot be checked out?"
I don't expect an answer.
time.

We all do, all the

As a computer professional who has worked on
complex military and non-military systems, I
believe in an anti-ballistic missile system, ABM.
I believe in it as a bargiining tactic in a world
gritting its teeth but on the brink of peace, and
I believe in it as a necessary strategic element
in maintaining that peace. I believe in it as a
defensive force in a world saturated with stockpiled offensive forces. I believe in it as an element in a defensive posture that I also believe in.
And I believe in the computer system, even unchecked-out, as an essential part of that total
system.
You see, I know some of the people who have
built military and aerospace systems. When they are
working in an area of doubt and risk, they understand the importance of doubt and risk. I believe
in those people, and in their integrity. I also
believe in the integrity of those who oppose ABM,
but I believe they are wrong.
One thing we share, I hope -- and they hope -- it
will never come down to finding out which of us is
right.
2. From Robert L. Glass

Above is an entry for your ABM contest. As is
often the case in my correspondence with you, you
will find that I do not agree wi th your implied
position in announcing the contest. I hope that
this opposition will not cause my essay to be dis-

COMPUTERS and AUTOMATION for September, 1971

qualified. You have been fair in the past, as with
my article "Intolerance" in the April, 1970 "House
Is On Fire."
My background includes 15 years in the aerospace
industry as a computing specialist dealing in research and development of advanced systems. For the
past year I have been on the staff of the University
of Washington computer center. I have published
several articles on various facets of computing, in
publications ranging from the ACM Surveys Journal
(Spring, 1969) to the British Computer Bulletin
(Sept., 1968) to Software Age (July, 1968). I am
a contributor to Computerworld, and am deeply involved in local civil rights organizations as
my primary non-technical interest.
3. From the Editor

Thank you for your letter and your entry in our
ABM contest.
You are right in saying that our opInIons of the
ABM ~ystem are not the same, but your position is
well stated and certainly publishable.
A PUBLICATION THAT THINKS ABOUT THE PROFESSION
AND THE RELATION OF THE PROFESSION TO SOCIETY

Michael Upp
Gybermatics Inc.
2460 Lemoine Ave.
Fort Lee, NJ 07024
C&A attempts to support itself on subscriptions
plus some advertising in order to achieve editorial
independence. As a result, you have developed a
forceful, provocative product. It is the one computer publication that I would like to see on every
college campus -- for many reasons. I would be
glad to pay an increased subscription rate if by
doing so, you would be able to circulate copies to
Universities at no cost. It is important t~at college students know that there are issues; that they
are discussed; that there are possible actions, etc.

Certainly, every single article in the March
issue is absolutely pertinent at the concerned student level: community service and the racial issue,
education, the pattern of assassinations, data banks
and privacy, anti-ABM, Brewster's s~eech. Anyone
of those articles would classify such an issue of
the usual trade publications as "worthwhile." You
have cornered the "meaningful" market.
On the Data Bank article by Professor Foster:
this is the first honest presentation on non-security
I have ever seen. No system that I have ever worked
on (and I have worked on many) is free from erroneous data release or malicious attempts at getting
the data. I have seen no solution algorithms that
do not result in a totally unusable system. I endorse Professor Foster's position completely. You
should solicit further endorsements from your
readers and make sure that Senator Ervin receives
the article and endorsements.
On the ABM: it is easier to comment than to formulate an essay. One reason why McCracken's nondebuggable argument will not penetrate is the unstated crux of the pro-ABM argument. To wit, its
existence should prevent its ever being used. This,
incidentally is the "justification" for BMEWS as
well. This is incredible reasoning! It is escalation by bluff, defense by projected reciprocal
body count. The major risk is that in time the existence theorem is forgotten and the operational presumption remains.

33

Incidentally, I'm teaching part time at Columbia
University. The series of "assasination" articles
have become a staple of my course. In addition to
provoking much thought vis-a-vis government, media,
truth, etc., they are immensely useful for probing
the potential social usefulness of our technology.
The course is one of general computing topics for
management. I've found it useful to open it with a
discussion of the literature. C&A comes off well as
the only publication that thinks about itself, the
profession, and the relation of the profession to
society,

ONE COMPUTER PROFESSIONAL FOR
THE ANTI-BALLISTIC MISSILE SYSTEM
Ronald G. Windsor
Director, Research and Data Processing Service
Harford Junior College
401 Thomas Run Road
Bel Air, MD 21014.

(Organization mentioned foridentification
purposes only)
This is written in the belief that Computers and
Automation is read by computer professionals in favor
of the ABM, as well as computer professionals against
the AmI. Niththisinmind I ask that you print this
letter.
Daniel D. McCracken's announcement of the AntiABM Contest in your March, 1971 issue, is impalatable
on several counts.
First, the examples used (5000 programming errors
in the 360, American Airlines' reservation system,
TWA's suit against Burroughs, NASA's program freezes,
the Rand study, not moving the moon, and his positive (?) note about trace tapes) to illustrate that
the ABM computer system cannot be tested, can serve
just as well to show that no such system can be
checked out short of nuclear disaster. (By the way,
the ABM system is ~t. fully automatic; humans are
required, particularly at the critical point -- the
decision to fire). Although I cannot accept Mr.
McCracken's line of reasoning, the fact remains that
other defense systems combine computers and nuclear
devices. Surely, the same logic applies to these
systems. Does Mr. McCracken want all of these
scrapped? Evidently not, because the name of the
group he chairs is "Computer Professional Against
the ABM." Why only the ABM?
Second, Mr. McCracken's remarks about Dr. Foster
("If statements like these were made by a student
in his first course in computing, you'd give him a
C-minus and forget .about it, in his second course
you 'd flunl~ him and forget it. ") are, to me, unjustified and pernicious.
Third, the essay topic, "Would you trust the lives
of your children to a highly complicated computer
system that cannot be checked out?", is a play on
the emotional. I can think of a host of words to
put after the first nine that would arouse negative
attitudes on a multitude of subjects.
So, until either a better system is proposed or
until mankind can live together in peace and harmony, I am for the ABM.
I ask those readers sharing this view to please

34

write Computers and Automation and (most important)
their Sen~tors and Representatives.
One computer professional for the ABM.

SEVEN MORE COMPUTER EXPERTS BECOME
'
SPONSORS OF GROUP AGAINST ABM
M. Kozikowski
Computer Professionals Against ABM
4 Inningwood Road
Ossining, NY 10562

Seven more computer experts have enlisted as
sponsors of Computer Professionals Against ABM,
an ad hoc organization of more than 500 computer
people which has been formed to oppose the ABM
Safeguard system on purely technical grounds. The
signers of the group's statement come from allover
the U.S., from both industry and education, and include some of the industry's pioneers in the development and application of computers.
The seven new sponsors are:
Professor Charles H. Davidson of the University
of Wisconsin;
Professor Aaron Finerman of the State University
of New York at Stony Brook;
Professor Robert W. Floyd of Stanford University;
Dr. Herbert R.J. Grosch of the National Bureau
of Standards;
Peter Zilahy Ingerman of Willingboro, N.J.;
Professor Melvin Klerer of New York University;
Dr. Donald L. Shell of Schenectady, N.Y.
The organization has developed a compelling case
for why the ABM cannot work and cannot be expected
to work -- that is, perform the function it is assigned to do. Successful operation of a complex
computer system is critical to the ABM's reliability.
The founder and chairman of the group, Daniel D.
McCracken, has addressed organizations of professionals in the computer industry on the subject in 15
cities in February and March, 1971. D.O. McCracken
is a computer consultant and the author of ten textbooks on computer programming that have sold over
a million copies.
In addition to Mr. McCracken, the Executive Committee of Computer Professionals Against ABM includes:
Paul Armer of The Harvard Program on Technology and
Society; Joseph Weizenbaum, Professor of Computer
Science at The Massachusetts Instutute of Technology;
and Gregory P. Williams, a computer technologist in
Phoenix, Arizona.
In addition to attracting the attention and support of computer professionals and national media,
the Computer Professionals Against ABM has taken
its message to Congress in the past few months. Mr.
McCracken has briefed various groups of Senate staff
personnel on· the inherent unreliability of the Safeguard computer system.

COMPUTERS and AUTOMATION for September, 1971

liTHE ANTI-BALLISTIC MISSILE SYSTEM IS DEFENSIVE"
From: Patrick M. Cooney
RD6
Carmel, NY 10512
To:

Daniel D. McCracken
4 Inningwood Road
Ossining, NY

According to the March 1971 issue of "Computers
and Automation", you are sponsoring a "contest", the
apparent aim being to put pressure on the U.S.
government to cease ABM development, deployment,
etc. You've said that copies of opinions (i.e.,
contest entries) should also be sent to various
officials in Washington, I shall do so.
The stated theme of your "contest" is "would you
trust the lives of your children to a highly complicated computer system that cannot be checked out?"
The future lives of my children are currently in
the hands of various educational computer systems
whose effect on my children and the future of our
society isn't "checked out", and whose developers
certainly aren't "checked out", I consider that
this is a real threat to our future; much larger
than your, at best, misguided idea that the ability
to defend ourselves is somehow bad.
I would agree however, that allowing computers to
make the decision that a threat to us exists and that
offensive missiles should be launched is wrong, Man
must keep this prerogative to himself. In my mind,
the key to the shakiness of your position is that
ABM is defensive; offensive war-making capability
is not at issue here, Would you keep in mind the
fact that, with the offensive weapons the Soviets
have deployed both on the earth and in orbit, we
need something that at least has a chance against
incoming missiles and satellite weapons. Are you
"for" anything or just "against"?
The ABM concept was tested (without nuclear warheads) in the Pacific. A ballistic missile was
fired from Vandenburg AFB and was "successfully"
intercepted by the proposed Safeguard system, whose
defensive missiles were fired from a South Pacific
island. These were "computer-controlled" tests. I
think therein lies one of the differences between
people like yourself and people like me. I will
believe information given out by my government, as
long as it's within reason and I have no factual
evidence to the contrary. There is none relative
to Safeguard.
You seem to have a large worry about computer
control of missile flight. All missile flights
now are controlled, at least in their powered portion, by computers; "ground to ground", "flir to
ground", "ground to air", "sea to ground", etc.,
etc.
Is it your contention that they don't really
work? We know that at least some of them do; from
Vietnam where some are in use, from NASA work which
you seem to disregard, from Poseidon~tests, etc. A
word about NASA whose experience you sneer at.
One of the complexities which must be dealt with
in manned flights so far, is the use of liquid fuels
This one fact requires an unbelievable increase in
missile complexity, hence the 30 to 45 day simulatiol
for checkout. My point here is that you're talking
about two different systems designed to do two different jobs. They can be related in overall terms
(complex computer use), but not in specifics (120
day freeze). You and your ilk are comparing apples
and oranges and then going into a funk because
they're not the same color.
COMPUTERS and AUTOMATION for September, 1971

A note about your organization, if I may: Of the
listed sponsors, I note that 16 of the 23 are connected with various universities as "professorial
talent". A majority of people from the academic
~orld have displayed over the past several years,
no real un~erstanding of the world or human nature.
They are certainly not responsible in any way for
the defense of the United States, indeed, in some
cases don't even seem to care. The quality of their
judgment, and handiwork, can be seen in the disruption of educational processes in many universities.
Just as a small minority of students were capable
of such disruptions with the, at best, passive acceptance of a majority of the "professorial talent",
now a small minority of "computer professionals"
are attempting to negate the ability of the U.S. to
protect itself as a society. By what possible
stretching of the imagination do you set yourself
up to say how wecan best protect our country when
you don't have all the information that is necessary
to make that decision. Much of it is of a "secret"
nature and must be so. Your conclusions in such a
context must be suspect.
This is the first time I have written a letter
such as this, but I couldn't let your "Computer
Professionals against ABM" and your sister organization "Computer Professionals for Peace" speak for
me. I have been in the Programming/Systems line of
work for 11 years, and I consider myself a "computer
professional". Your group does not speak for me,
nor I suspect, will it ever. You apparently see the
world as you wish it were, rather than as it really
is. Laudable for your OW? peace of mind certainly,
but not a view Americans, as a people, can afford
in this very predatory world. Would it were otherwise, but it isn't.

GATHERING FORCE AGAINST THE ABM

(Based on a report by Victor K. McElheny, "The
Boston Globe" April 4, 1971)
Daniel D. McCracken, chairman of the national
group called Computer Professionals Against ABM,
is traveling around the country addressing computer
engineers' groups on the vulnerability of the ABM's
computers. In an interview, McCracken said he is
leaving aside other opponents' charges about the
vulnerability of the ABM system's radars or the
possibility that an enemy would simply build more
offensive missiles, equipped with increasingly accurate multiple warheads, to overwhelm any defense.
Among the sponsors of the Computer Professionals
Against ABM are such well-known computer engineers
as Prof. Robert M. Fano of the MAC computer timesharing project at MIT; Prof. J.C.R. Licklider, who
succeeded Fano as MAC's director; and Prof. Marvin
L. Minsky, who concentrates on "artificial intelligence."
The computer engineers argue that every major
system tried up to now, such as airline
reservations set-ups, has always had major breakdowns in the period immediately after entering service.

~omputer

After a time, the "bugs" are ironed out and the
system works. But with the ABM there would be no
time. It would have to work right in its first and
possibly sole test. The computer engineers say that
20 years experience with new systems makes it a sure
bet that the system wouldn't work to its design efficiency the first time.
35

COMMUNICAliON AND CIPHERS
with a Hexadecimal Alphabet and Variations
"With the advent of computers to produce ciphers, to perform enciphering and deciphering
and to solve ciphering systems, probably a new level uf complexity in ciphering systems
becomes thoroughly practical. "

1. D.N. Minot
Lexington Research
10 Muzzey St.
Lexington, MA 02173

MR EDMUND BERKELEEE
COMPUTERS AND AUTOMATAEON

Julius Caesar

SUPPOSE YOU HAVE ONLEE A HECSADECAEMAL ALPHABET
OR SAECSTEEN CHARACTERS.
YOU CAN NEVERTHELESS COMMVNAECATE PRETTEE VVELL.
DGUST PHOR ECSAMPLE CONSAEDER: DSERO ONE TVVO
THREE PHOUR PHAEVE SAECS SEVEN EAEGHT NAENE TEN
ELEVEN TVVELVE.
USE lIH PHOR BLANCCS AND HHHH PHOR STOPS.

o N MAENOT
LECSAENGTON RESEARCH
ABC D E PH G H AE DG CC L M N 0 P CV R S T V V
VV CS EE DS
- - -

----

2. From the Editor

MR O. N. MAENOT
LECSAENGTON RESEARCH
DEAR MR MAE NOT
THANCC EEOU PHOR EEOUR STAEMULATAENG SUGGESTAEON OPH
A HECSADECAEMAL ALPHABET. AE HOPE THAT VVE AT
COMPUTERS AND AUTOMATAEON CAN DO SOMETHAENG AENTERESTAENG VVAETH AET.
EEOURS SAENCERELEE
EDMUND Co BERKELEEE
3. Neil Macdonald
Assistant Editor, Computers and Automation

Interest in ciphers has persisted probably for
much longer than 3000 years. The first known historical instance of true cryptography -- use of a
cipher for purposes of secrecy -- is contained in
a tiny cuneiform tablet only about 3 inches by
2 inches dating from about 1500 B.C. and found
on the site of ancient Seleucia on the banks
of the Tigris. It contains the earliest known
formula for the making of glazes for pottery.
(from p. 75, The Code Breakers, by David Kahn,
published by the Macmillan ·Co., New York, 1967,
1164 pp.)

In the first century B.C., Julius Caesar used a
cipher in which each letter of the plaintext was
replaced by the third letter down the alphabet.
Thus the word "Gallia" would be changed into the
word JDOOLD (using our alphabet, not the Roman one),
since J is the third letter from G, D is the third
letter from A, etc. The ciphers in which each letter is replaced by the same other letter are called
substitution ciphers; they are regularly extremely
easy to solve because they do not conceal the frequency with which letters occur. The commonest letter is almost always E; the next group is TAO N;
the next group after that is IRS H; until finally
the rarest letters are Q X J Z (See Table 3).
Disguising the Frt!quency of Letters

Now if we use an alphabet with less than 26 characters into which we put a message, we are compelled
to make some conventions so that all the letters of
the plaintext are expressed. And we have an intriguing possibility that we might be able to disguise
greatly the frequency of the letters and thus enhance
the security of the cipher. However we have to pay
a cost: we incur the risk of giving the reader so
much trouble that he cannot easily decipher what we
are seeking to tell him.
For example in his hexadecimal alphabet, Minot
proposes the digram AE for I. The digram AE is
exceedingly rare in modern English words; so the
reader would have almost no trouble guessing whenever he sees it that I is intended. But Minot
proposes EE for Y. The digram EE is not rare in
English; in fact, it occurs in many words such as
"been", "meet" etc., and so the reader has the burden of determining from the context whether EE is
intended or Y is intended; probably examples could
be constructed in which a small neighboring context
would not be sufficient to resolve the ambiguity.
The Minot Hexadecimal Alphabet has the following
properties:
10 letters have gone: F I J K Q U W X Y Z

7 letters remain, unambiguous: B L M NOR T
9 letters have become ambiguous: A C D E G H
P S V
Appearance

The Seleucian scribe used cuneiform signs for
syllables for encip'hering, selecting rare meanings
of the signs. His method resembles the method of
George Bernard Shaw in spelling "fish" as "GHOTI",
using "GH" as in "rough", 0 as in "women" and TI as
in "nation".
36

Probably the first question to be asked then is
this: Suppose we use the Minot Hexadecimal Alphabet
(MHA). What would the results look like in a number
of passages? Would they be easily readable? Could
the resulting ambiguities be easily handled by the
COMPUTERS and AUTOMATION for September, 1971

recognizing capacity that ordinary human beings acquire?
As a test, we placed the MHA into an enciphering
program on our DEC PDP-9 computer and encoded a number of sample passages. The results are shown in
Table 1. (For the explicit decipherment of these
passages, see Table 2). From insp-ection of the samples in Table 1, it seems that it would be relatively
easy to communicate using the MHA.
Frequency of Letters

The next question to be asked is: How would this
alphabet affect the frequency of letters, which is
the key to deciphering a message? Table 3, columns
(1) and (2) show the usual frequency of letters in
English. This table is taken from a report published
in "Elementary Cryptanalysis" by Helen Fouch~ Gaines,
published by the American Photographic Publishing
Co., Boston, Mass., 1939 (reprinted by Dover Publications, New York, 1956).
Using the frequency shown in Column (2), we can
calculate the frequency that would result in long
passages using the MHA. This is shown in Column (3)
of Table 3. E would become much more frequent still,
and the three least frequent letters would be B, G,
and M. Probably, deciphering substitution ciphers
would remain far too easy.

Expansion of the Principle
of the Minot Hexadecimal Alphabet

When we abandon the one-to-one correspondence of
the ordinary substitution cipher (which we do with
the Minot Hexodecimal alphabet), we have the following general situation:
1. We choose n different letters to constitute the-enciphering alphabet, 5-= n~25.
2. Some letters of the plaintext alphabet are
represented by a pair of letters in the
cipher alphabet, other letters by a single letter.
3. We can use the left-over letters for any
purpose we desire including (1) random
"nulls," letters which have no meaning
or (2) al ternati ves to letters which
have meaning.
4. We can have an exact deciphering or an
ambiguous deciphering (as with the MHA)
The Macdonald Decimal Alphabet

We can extend the principles of the MHA in a
number of directions. One example of its extension
is what we might call the Macdonald Decimal Alphabet:

Table 1

Table 2

THE MINOT HEXADECIMAL ALPHABET
USED IN SOME SAMPLE PASSAGES

THE SAMPLE PASSAGES IN ORDINARY ENGLISH

AT THE SAME TAEME THAT THAES MAAEN
STREAM OPH AVTOMATAEC DAEGAETAL
COMPVTAENG HAS BEEN DEVELOPAENG
AND ECSPANDAENGI OTHER STREAMS OPH
AVTOMATAEC HANDLAENG OPH AENPHORMATAEON
HAVE ALSO DEVELOPED AND ECSPANDED.

AT THE SAME TIME THAT THIS MAIN STREAM
OF AUTOMATIC DIGITAL COMPUTING HAS
BEEN DEVELOPING AND EXPANDINGI OTHER
STREAMS OF AUTOMATIC HANDLING OF
INFORMATION HAVE ALSO DEVELOPED AND
EXPANDED.

THE MOST ADVANCED COMPVTERS OPH THE
PRESENT DAEE ARE CALLED SOLAED STATE
COMPVTERSI BECAVSE THEEE MACCE
ECSTENSAEVE VSE OPH SOLA ED STATE
ELECTRONAEC DEVAECES SVCH AS
TRANSAESTORSI GERMANAEVM DAEODESI
AND MAGNETAEC SHAEPHT REGAESTERSI
NOT ELECTRONAEC TVBES.

THE MOST ADVANCED COMPUTERS OF THE
PRESENT DAY ARE CALLED SOLID STATE
COMPUTERSI BECAUSE THEY MAKE EXTENSIVE
USE OF SOLID STATE ELECTRONIC DEVICES
SUCH AS TRANSISTORSI GERMANIUM DIODESI
AND MAGNETIC SHIFT REGISTERSI NOT
ELECTRONIC TUBES.

TO VSE PVNCH CARD MACHAENESI VVE
PHAERST CONVERT THE ORAEGAENAL
AENPHORMATAEON AENTO PATTERNS OPH
HOLES AEN CARDS.
THEN VVE PHEED
THE CARDS AENTO THE MACHAENES.
ELECTRAECAL AEMPVLSES READ THE PATTERN
OPH HOLES AND CONVERT THEM AENTO
A PATTERN OPH TAEMED ELECTRAECAL
C VRRENTS.

TO USE PUNCH CARD MACHINESI WE FIRST
CONVERT THE ORIGINAL INFORMATION
INTO PATTERNS OF HOLES IN CARDS.
THEN WE FEED THE CARDS INTO THE
MACHINES.
ELECTRICAL IMPULSES READ
THE PATTERN OF HOLES AND CONVERT
THEM INTO A PATTERN OF TIMED ELECTRICAL
CURRENTS.

VVHAT A COMPVTER DOES PHROM ONE
OPERATAEON TO THE NECST AES DETERMAENED
BEE THE CONTROL VNAET.
THE CONTROL
VNAET CONSAESTS BASAECALLEE OPH A
REGAESTER VVHAECH CONTAAENS AN
AENSTRVCTAEONI THE CVRRENT AENSTRVCTAEON
VVHAECH SETS THE SVVAETCHES THROVGHOVT
THE MACHAENE PHOR THE NECST TRANSPHER
OPH AENPHORMATAEON.

WHAT A COMPUTER DOES FROM ONE OPERATION
TO THE NEXT IS DETERMINED BY THE
CONTROL UNIT.
THE CONTROL UNIT CONSISTS
BASICALLY OF A REGISTER WHICH CONTAINS
AN INSTRUCTIONI THE CURRENT INSTRUCTION
WHICH SETS THE SWITCHES THROUGHOUT
THE MACHINE FOR THE, NEXT TRANSFER
OF INFORMATION.

COMPUTERS and AUTOMATION for September, 1971

37

1. The vowels A E IOU remain single letters
and are replaced by C G K Q W respectively.
2. The remaining letters are grouped:
group B is BCD;
group F is F G H;
.group J is J K L M N;
group P is P Q R S T;
and group V is V W X Y Z.
3. The consonants from B to Z are expressed by
pairs of letters as follows:
B C D-

F GH-

BB
BF
BJ

FB
FF
FJ

J KL MN-

JB
JF
JJ
JP
JV

P QRS T -

PB
PF
PJ
PP
PV

V - VB
W-VF
X - VJ
Y - VP
Z - VV

The scheme of representation is quite evident.
There is no ambiguity. The 10 letters that are
used are B C F G J K P Q V W. The l~ letters that
are not used are A D E H I L M NOR STU X Y Z.
These 16 letters are nulls. They can be sprinkled
in the message in any desired or random fashion
which might conceal the frequencies of the significant letters, which are the tell-tale indications
by means of which decipherment may be achieved.

Table 3

The results of using the Macdonald Decimal Alphabet but without inserting nulls on the passages given
in Table 2 are shown in Table 4.

Comments

In the literature of cryptography and cryptanalysis, I have not seen any discussion of ciphering
systems such as the Minot Hexadecimal Alphabet and
the Macdonald Decimal Alphabet. With the advent of
computers to produce ciphers, to perform enciphering and deciphering, and to solve ciphering systems,
probably a new level of complexity in ciphering
systems becomes thoroughly practical.
"Computers and Automation" invites discussion of
enciphering, deciphering, and cryptanalytic systems
using computer methods.
Table 4
THE SAME PASSAGES IN MACDONALD DECIMAL
ALPHABET ARRANGED IN FIVE-LETTER GROUPS

CPVPV
JKPPJ
CPVKB
FFFJC
JVBJG
VPJGC
BJJJK
JCVBG
GVJPB

FJGPP
PCKJV
FBJKF
PPBBG
VJPBC
JPPPQ
JVFFQ
CJJPP
CJVBJ

CJPGP
PPPVP
FKPVC
GJVBJ
JVBJK
FBCWP
FBKJV
QBJGV
GBJ

VKJPG
JGCJP
JJBFQ
GVBGJ
JVFFQ
VQJPC
FBQPJ
BGJJQ

PVFJC
QFBCW
JPPBW
JQPBK
PVFJG
PVKBF
JPCPV
PBGBJ

PVPVF
PVQJP
PVKJV
JVFFC
PJPPP
FJCJV
KQJVF
CJVBJ

PVF JG
PBWPV
BJCVP
VCPVG
PVFJG
GQFBP
QJVKB
JCJVP
BJKQB
JKFBP
B F'PVP

JPQPP
GPJPP
CPJGB
BFQJP
VPJPC
PQJJK
FBJGV
PKPPP
JGPPC
VPJGF
JQJVK

PVCBJ
QFBPV
FCJJJ
PBWPV
JF'GGV
BJPPP
BKBFG
VQPJP
JVBJJ
FKPPP
BF'PV\.,J

VBCJV
FJGPB
JGBJP
GPJPP
JPVGJ
VCPVG
PPPPW
PF'F'GP
PC FF' J
VGPJP
BBGPP

BFGBJ
PJGPP
PQJJK
BBGBF
VPPKV
GJJGB
BF'FJC
JJPCJ
VGPVK
PJVQP

BF'QJP
GJVPV
BJPPP
CWPPG
BGWPP
FPVPJ
PPPVP
VKWJP
BF'PPF
VGJJG

RELATIVE FREQUENCY OF LETTERS
(1)

Letter
A
B
C
D
E

7.81
1.28
2.93
4.11
13.05

12.81
1.12
3.70
3.89
20.08

F

2.88
1.39
5.85
6.77
.23

0
1.62
7.67
0
0

L
M
N
0

.42
3.60
2.62
7.28
8.21

0
3.16
2.30
6.40
7.21

P
Q
R
S
T

2.15
.14
6.64
6.46
9.02

4.42
0
5.83
6.02
7.92

U
V
W

2.77
1.00
1.49
.30
1. 51
.09

0
0
0
0
0
0

G

H
I
J
K

X
Y
Z

Total
38

(2)
(3)
Relative Frequency
Relative
Frequency in
in Minot
Ordinary English Hexadecimal
(Qercent)
(Qercent)

100%

PVQWP
KJVGP
PVFJG
KQJVK
JJGPP
GBJPV
CBFFJ
PB\.JJJ
JJVQF
VPVFJ
PVKJP
JGJVP
VFF'JC
JQJPQ
VGVJP
VFJGB
JVPVP
BCPPK
JVFFJ
PPVPJ
VKJVP
GPVPP
QWFFF
JPVFJ
KJVFB

PGPBW
PVFGF
QPJKF
JVPVQ
KJVBF
FJGBF
KJVGP
PPGPP
BFJQJ
GJPKJ
GBJGJ
VPP
PVCBF
JVGQP
VKPPB
FQJVP
JQJJW
BFCJJ
KBF'F J
WBF'PV
PPVPJ
PVFJG
JQWPV
GJVGV
QPJJP

JVBFF
BKPJP
F'KJVC
PBCPV
CPJBJ
CPJBJ
PGJJG
PJGCB
JGPPC
VPVQC
JGBFP

QJPPB
BGPJC
JGPVG
VPJQJ
JVKPV
JJVPQ
BFQJV
KQJVP
WBFPV
PPVFK
PVFJG
JPVPV
CPVKQ

JBFCP
PPVBF'
JJKJV
PVGPJ
PPPVF
PPKJV
BFPVP
JPVF'J
JVBJB
PBCPV
VPJKB

WPVGP
PVKQJ
PJJPK
JWJVK
BFQJV
FBCPJ
PVCKJ
VF'JGB
KQJVV
PVBF'F
JPCBF
PJCJV
JV

JBJJP
QJVV8
FBQPJ
JVPfQ
JGJVV
PVQPV
JKBFC
GPBCP
F'QJVV
PVGPJ
FCJJB

JBJQG
VPVQP
JVGBJ
PVPVF'
PPKPP
GFFKP
VPPCJ
FWPJP
FFJKB
JGPPP
FJKJV
PPFBG

CB 1'1' J
GPJPV
JPCPV
FBFJQ
FGF'B G
FJGJP
JJKJP
VPVGP
BGPJP
JVQFB
FWPJP

PPFBP
VFJGJ
BBVPP
JGBF'Q
PVPPB
PPVGP
VKJVP
JGJVP
FFJPP
VI' JPJ
GFBQP
PJQFB

100%
COMPUTERS and AUTOMATION for September, 1971

As "Grass Roots"
Goals Committee
Chairman, he's
battling the blamethe-computer
syndrome.
David Wollin, B.S. Engineering
Science, is a Senior Systems Analyst
with a ticket reservations systems
service, developing application
software. He joined ACM in 1966,
fresh out of college. "After four years,
I wanted more involvement as a computer professional," says Dave. "More
than meetings, lectures and technical
publications. ACM seemed sort of
clannish. I felt the average member
wasn't encouraged to participate.
"Last October I wrote ACM President
Walter Carlson with some specific

suggestions. Now I'm heading the
newly-formed "Grass Roots" Committee. Our job is to critique ACM's
proposed goals on membership development, special interest activities,
EDP curricula and public education.
And come up with other goals we
think are just as important.
"This effort could mean a lot in the
next few years. I've wanted to speak
up on some things that have been
bugging me. Things I see ACM taking
a stronger stand on. Like people
blaming mistakes on the computer.

The need to cut down on hard copy
to avoid waste. The privacy issue.
The whole question of the computer's
impact on society, I guess."
Dave is only one of 27,000 members
of ACM, the oldest and most
respected professional association
in the computer field. He's enriching
his career. Making a contribution
to the computer profession. And
being heard.
Look into joining ACM. Fill out and
mail the coupon today.

Association for Computing Machinery
1133 Avenue of the Americas
New York, New York 10036
I would like to consider joining ACM.
Please send more information.
Association
for Computing
Machinery

Name

Position
Address

City

State

Zip

ACROSS THE EDITOR'S DESK
APPLICATIONS
METALS INVENTORY SYSTEM
BASED ON PRODUCT NAMES
INSTEAD OF 10-DIGIT NUMBERS

Standard Brass & Manufacturing
Co., Port Arthur, Texas, has ins talled an IBM Sys tem/3 Model 10 to
handle a complex metals inventory
system based on product description,
rather than conventional product
numbers. The Port Arthur company,
a producer and wholesaler of aluminum, brass, copper and steel, devised the novel approach to simplify its method of accounting
for stock.
"This significant departure from
the traditional way of tracking our
stock wi 11 improve our accuracy,"
said F. V. Wilson, company presiiden t, "and our people no longer
will have to thumb through-- -thick
stock code books to code -- or decode -- items of merchandise."
Us ing numbers to account for its
supplies, an order for a rec tangularshaped ingot of free-cutting brass
would have had to be recorded as
an order for a 030011001~ The IBM
system, however, will accept the
description "rectangular free-cutting brass," a standard term in
the metals industry. The only numbers now involved will be the quantity and the dimensions desired.
To further s impl ify the inventory
procedure, the computing system is
being programmed to accept abbreviations, such as "rect" for rectangular and "FC" for free-cutting.
The IBM system will keep up-todate inventory reports for the
firm's nine warehouses, located in
Houston, Port Arthur and Beaumont,
Texas, and New Orleans, Lafayette,
Shreveport and Baton Rouge, La.
COMPUTER HELPS FIND
UNDETECTED DISEASES

A new medical testing program
for detecting diseases even before
early symptoms appear, especially_
among inner-city residents, is un~
derway at Good Samaritan Hospi tal
(Cincinnati, Ohio). The federallyfunded pilot proj ect has enabled
doctors, using an IBM computer, to
uncover illnesses and diseases among
people who didn't realize they were
sick.
The program, funded by a
Regional Medical Program grant froll
the U.S. Department of Health.
Education and Welfare, also is used
in conj unc tion wi th neighborhood

40

organizations to provide many innerci ty residents free annual checkups.
"We have revealed 50 diabetics
and hypertensive people, placed 300
overweight people on weight reduction programs and found several
cases of elevated cholesterol, thyroid disease and breas t cancer -all among people who were not aware
they suffered from these problems
but had been referred to the hospi tal for other reasons," explained
Dr. George Shields, director of
medical systems.
The program, called "mul ti-phas ic
testing", involves a series of basic
tes ts which are adminis tered to
newly admi t ted patients by qual ified
professionals such as nurses and
technicians. The tes ting procedure
begins shortly after the patient is
admitted.
He fills out a preprinted computer form describing
his medical history and specifies
any health problems or complaints.
Nurses then administer several routine tests. The results, analyzed
automatically by the computer, are
presented in a convenient format
for quick reference by doctors.
At present, only those patients
whose doctors have specifically
reques ted it are tes ted by the
new system.
"A patient treated under the new
program does not feel he is being
subj ected to anything different,"
Dr. Shields said. "The tests given
are the same as before.
But, because thepatient's doctor is freed
from routine testing responsibilities, he has more time for diagnosis
and counselling."
IBM COMPUTER WORKS
AT FUN CENTER

An IBM Sys tem/3 Model 10 computer
has been put to work behind the
scenes at Cedar Point (Sandusky,
Ohio) so that vis i tors to the northwestern Ohio amusement park can have
more fun. For the fiscal year ended
March 31, 1971, visitors to Cedar
Point took 41.5 million rides on
such things as dodgems, double ferris
wheel, antique cars, roller coasters
and a variety of boa ts. The compu ter is enabling operating and administrative personnel to better manage
the people and resources required
for the park, which last year hosted
some 2.5 million people.
Some of the requirements of the
operation are unusual among businesses.
For example, in preparation for the peak season, employmen t jumps from approxima te ly 200

people to over 2,300.
Processing
of paychecks, hours worked and other
employment cons iderations alone have
been greatly reduced and simplified
by the new sys tern.
The computer
also produces accounts payable re-

-- Controller Phil Lauser
reviews computer printout
ports, controls inventory of souvenirs and other sale items, and
tabulates such things as unit cost
per ride.
A reservation system for
the park's "Breaker's" hotel also
will be added to the system soon.
PUBLIC LIBRARY INSTALLS
COMPUTER FOR PUBLIC USE

Simple mathematical or complex
engineering and scientific problems
can be solved on the coin-operated
computer which has been added to the
services offered by the Monterey
Public Library in Monterey, Calif.
It is the first coin-operated computer for public use in the United
States, according to the library.
The installation operates the
same _as coin-operated telephones.
typewriters, and copy machines.
The user simply inserts a coin which
allows him to use the computer for
a predetermined amount of time. A
red light comes on when less than
60 seconds remain which allows him
to ei ther complete his problem or
insert additional coins.
The computer, a Hewlett-Packard
9100 system, has 16 storage registers and a 196-s tep program memory.
Operation and programming is simple
as there is no progranming "language"
to learn. Data is entered through
either the keyboard, magnetic card
reader, or an attached HP-9160A
Marked Card Reader.
This enables
the user to prepare his programs at
the office, home or school. No key-

COMPUTERS and AUTOMATION for September, 1971

punch equipment is required. Output
is via a cathode ray display tube
which displays three registers. A
printer can also be added i f desired.

and ethyl mercaptan - which smells
like rotten eggs. He then records
the resulting electrical activity
in their brains.

Free key code cards, program
cards and programming sheets are
available at the computer. In addition, programs can be recorded on
a wallet-size magnetic program card.
Data can be entered and/or displayed
in fixed or floating decimal point
notation.

The odor-induced changes in the
brain's electrical activi ty cause
the alternating current voltage to
rise from a norm of 50-100 microvol ts to around 500 microvol ts.
There also are significant changes
in the electrical patterns and frequencies generated by the brain.
By studting the statistical analyses
produced by the IBM sys tern, Dr.
Benignus hopes to determine how the
brain codes information from the
sense of smell. The factors he uncovers also may apply to the other
senses and to humans as well as
lower animals.
Some researchers
suspect there may be connections between the sense of smell and such
traits as learning and behavior.

M. J. B. Flippin, Technical Director and founder of the Monterey
firm, Computer Rental Service, which
installed the computer, said, " •••
We feel there is a large segment of
the population who would like to
use a small computing system ••. Our
installation is aimed primarily at
those of today's society who are
familiar wi th mathematics and the
computer and what it can do for
them •.• Typical users would be students, professional engineers, land
surveyors and so forth." In addition to individual uses of the machine, it is recommended by the library for preliminary work to save
time on larger computer services.
COMMON CATFISH
AIDS RESEARCH INTO
SENSE OF SMELL

Dr. Vernon A. Benignus, a Trini ty
Universi ty psychologist, is using
an IBM computer, catfish and foulsmelling chemicals to learn more
about the olfactory mechanism or sense of smell the leastunderstood of the five animal senses.
When a fish is exposed to unpleasant odors, says Dr. Benignus, the
electrical activi ty in its brain
suddenly increases.
He believes
that smells are coded by an animal's
brain into electrical signals. Understanding this code could reveal
secrets of the olfactory sense and
also provide valuable knowledge
about how the brain works.

In hi s experimen ts, Dr. Benignus
surgically implants tiny electrodes
into the brains of catfish. He exposes the fish to very small doses
of chemicals such as morphylene
which smells 1 ike dirty socks -

HEART DISEASE TREATMENT
AND RESEARCH AT REINGOLD
ECG CENTER

The Reingold Elec trocardiographic
Center (Evanston, 111.), an example
of shared services in the Northwestern University-McGaw Medical
Center, was organized in 1964 to
provide
complete elec trocardiographic services on a 24-hour-a-day
basis. Electrocardiograms are transmitted by common carrier telephone
lines from Chicago Wesley Memorial
and Passavant Memorial hospi tals,
the Rehabilitation Institute of
Chicago, and the Northwestern Medical School clinics to the Center.
The installation of a new computer facility in the Reingold ECG
Center provides virtually immediate
interpretation of electrocardiograms. Previously, 24 to 48 hours
were required for the participating
hospi tals to receive interpreted
records.
The ECG Center also is devoted
to basic and clinical research in
the broad field of elec trocardiology, including cardiac elec trophys iology. Particular emphas is is
placed on studies designed to find
the causes of disturbances of cardiac rate and rhythm in patients wi th
heart disease, the modes of action
of drugs used to treat these disturbances, and on techniques for
diagnostic and therapeutic use in
patients. There are, currently on
file in the Center, more than
125,000 electrocardiograms, recording over 6,000,000 heartbea ts. Au tomation of data acquisi tion, processing and analysis accomplished by the
new computer facili tates both teaching and research in the Center.
Northwes tern's ECG sys tern, the
fi rs t of its type in the country,

COMPUTERS and AUTOMATION for September, 1971

permits ready expansion of service
to addi tional interested insti tutions irrespective of their distance to the University. All that
is needed to install the system is
an ECG transmitter and one or more
standard telephone wall jacks.
COMPUTERIZED BUOY
ENTERS FIGHT AGAINST
POLLUTION

A giant, computerized buoy has
entered the fight against water
pollution in Massachusetts Bay. The
114-foot, 18, OOO-pound buoy was anchored this past July, at a point in
the Bay four miles north of Boston
Ligh t Vessel, by a team of divers
and crew riggers, for Profes sor
Erik Mollo-Christensen of the Massachusetts Institute of Technology.
The buoy's new research undertaking
is being sponsored by the Office
of Naval Research and the National
Science Foundation. (The data also
will be used in research programs
sponsored by the National Oceanographic and Atmospheric Administration under the Sea Grant Program.)
The buoy is to be a key element
in the Mas sachuset ts Bay Area Study.
The importance of the buoy's da ta
to this study involves how pOllutan ts and other properties of the
wa ter are transported in the Bay
and adj acent waters by currents and
eddies.
Prof. MollO-Christensen,
who designed the buo~ says it will
be used to do "research on air-sea
interaction and transport and mixing processes in a ir and wa ter".
The buoy has been used in other airsea in terac t ion research for the
Rast year at a point off the coast
of Martha's Vineyard.
For its new undertaking in the
Bay, the buoy is equipped wi th a
variety of instruments.
A fortyfoot radio tower atop the buoy will
beam the data from these instruments
to a tower on the 20-s tory M. 1. T.
Center for Earth Sciences building
in Cambridge (Mass.). The data then
will be fed into a computer in the
Earth Sc ience Building, where it
will be stored and available for
recall and summarization.

EDUCATION NEWS
LEHIGH UNIVERSITY'S COMPUTER
TO SERVICE 6 OTHER COLLEGES
THROUGH REMOTE FACILITIES

Beginning this month, Lafayette
College, Moravian College, Muhlenberg College, Cedar Crest College,
Allentown College, and Wilkes College (all of Pennsylvania), will

41

be linked to Lehigh Universi ty' 5
CDC 6400 compu ter through a new
computer network. Supported by an
ini tial grant of $81,000 from the
National Science Foundation, the
Lehigh Universi ty-based network has
bee-n designed to increase the utilization of computers in the undergraduate educational processes of
the 6 other colleges, which, together
with Lehigh,willcontribute approximately $150,000 to the project.
Dr. John E. Walker, associate
professor of economics and Computer
Center manager of user applications
at Lehigh, will direct the Lehighbased network, which will be known
as the Lehigh Valley Regional Computing Network (LVRCN).
In preparation for the September
s tart of the network, Lehigh Uni versi ty conducted an intensive,. sixweek seminar and workshop program
this summer for 19 faculty members
from the 6 other colleges. Related
training programs will be held for
them a t Lehigh during the 1971-72
academic year and again next summer
(1972). The training programs for
the faculty members of the 6 participating colleges are being conducted
at Lehigh to aid them in developing
new computer-oriented curricula on
their own campuses.
Similar college computer networks
are being established in various
parts of the country with funding
by NS~ including those at the University of Pittsburgh and Pennsylvania State University. The three
networks in Pennsylvania, including
the one at Lehigh, will form the
nucleus of PRISE (Pennsylvania's
Regional Instructional System for
Education).
SPECIAL B.S. PROGRAM
IN COMPUTER SCIENCE

FOR TRANSFER STUDENTS
Hofstra University, Hempstead,
N. Y., is inaugurating a special
Bachelor of Science program in Computer Science and Systems Analysis
~esigned specifically for transfer
students from two-year colleges who
have maj ored in the computer science
field.
This new program, not yet available to students who attend Hofstra
from their freshman year, allows
the transfer student who has taken
a program of basic computer courses
at a two-year institution, to apply
those credits wi th full academic
.) tanding up to 64 credi t hours,
toward a Bachelor of Science degree
from Hofstra. For information about
thi s new program, con tac t :
Dean;
Rich~rd T. Bennett, Dean of Admissions and Financial Aid, Hofstra
University, Hempstead, NY 11550.

42

PEPPERDINE UNIV. GRANTS
DEGREE CREDITS TO
HONEYWELL GRADUATES

Students completing a course in
computer sciences at any of the
Honeywell Institute of Information
Sciences (HIlS) schools will be
eligible to recei ve 20 credi ts toward
a bachelor of science degree in
administrative science at Pepperdine University in Los Angeles, it
is announced by Honeywell and the
university.
Pepperdine becomes the first
universi ty in California to award
college credi t to graduates of an
industry-operated computer institute. Dr. Donald R. Sime, dean of
the Universi ty's School of Business,
said the agreement wi th Honeywell
is part of the university's continuing policy of cooperating wi th
industry in developing programs that
relate to present-day requirements
of the business community.
Stephen V. Tri tto, manager of
Honeywell's Insti tute in Southern
California, said about 40 per cent
of s tuden ts attending the Ins ti tu te' s
schools do not have college degrees
and therefore can benefit from the
new agreement with the university.

MISCELLANEOUS

COMPUTER PRINTS KANJI

IBM Japan, Ltd., recently announced the IBM Kanj i Da ta Proces sing System.
The system, designed
to serve the linguistic needs of
many East Asian peoples, can enter
'into a computer, or print out, any
of approximate ly 10,000 Kanj i characters, ideographs widely used in
all forms of written communication
in Japan and in the Chinese-speaking
areas of Asia. The system consists
of an impact printer, a Kanji keyboard at tachmen t to the IBM 029
card punch and a matrix character
generation program package.
The system's printer, the IBM
2245, opera tes a t a speed of 330
lines a minute,with 16 Kanji characters to a line.
Characters are
printed by.a series of overlapping
"dots" which create straight or
curved lines.
The Kanji keyboard
consists of an array of 3,600 selected characters or symbols.
An
additional 7,000 characters can be
printed by use of 100 reference
codes and character references.
The system is sui ted for computer
applications in the printing of
mailing addresses, stock and insurance certific~tes~ bills, invoices

and a wide range of financial documents. It also can be used in information retrieval applications
and to provide proof copy in prin ting and publishing applications.
In addition to Kanji, thesystem
also can print letters in the Japanese Hiragana and Katakana alphabets, the Roman alphabet, numerals
and other symbols. The printer and
Kanj i keyboard attachment will be
manufactured at the IBM Japan, Ltd.
plant in Fujisawa, Japan.
BOSTON MUSEUM OF SCI ENCE
WILL DISPLAY COMPUTER
PUBLIC CAN OPERATE

The Boston Museum of Science and
Honeywell Inc. have announced that
a compu ter exhibi t "designed to cas t
aside the shroud of mystery surrounding these tools" will be the
largest industry-sponsored ex~ibit
in the Museum's new West Wing. (The
museum is located in Boston, Mass.)
Museum President D.Reid Weedon Jr.
said the Honeywell gift, first for
the Wing, will give visitors "an
unequalled opportuni ty to get acquainted wi th one of the most widely
used, and yet least understood,
technological achievements."
At the meeting announcing the
exhibit, C. W. Spangle, Honeywell
executive vice president, said,
"Today many people are afraid of
compu ters.
People think of compu ters as things tha t get credi t
card accounts into such a state
that one's credit rating is destroyed. Or, worse yet, that computers are collecting dossiers on
all of us and hence invading our
privacy." Actually, he said, computers expand the capabili ties of
the human brain - and always at
the di rec tion of humans.
Other
tools have helped ease man's physical labor, but the computer "is
helping man's mind," Spangle said.
The museum's exhibi t will center
on aworking Model 316with statior.s
where visi tors may try their hand
at computer operation. A choice of
programs will allow the visitor to
solve mathematical problems, simulate a moon landing, play word
games or test his knowledge of current events~ It will be operative
when the West Wing opens in a few
months.
The second part of the exhibit,
scheduled to be installed by mid1972, will illustrate present and
fu ture uses of the computer wi th
slide shows, films, pushbutton devices and recordings.

COMPUTERS and AUTOMATION for September, 1971

NEW CONTRACTS
ITT Arctic Services, Inc.,
Paramus, N.J.

u.s.

GTE Sylvania Inc., Communication Systems Div.,
Needham, Mass.

Air Force Space and Missile
Systems Organization

Federal Electric Corp. (ITT
Service Associate), Paramus,
N.J.

National Aeronautics and Space
Administration

The National Cash Register
Co., Dayton, Ohio

Sumitomo Bank, Osaka,
Japan

Singer Co., Librascope Div.,
Glendale, Calif.

U.S. Naval Ordnance Systems
Command

The Ingersoll Milling Machine Co., Rockford, Ill.
Data Products Corp., Telecommunications Div., Stamford, Conn.

Cummins Engine Co., Inc.,
Columbus, Ind.
Federal Aviation Agency

Burroughs Corp., Detroit,
Mich.

Ohio Valley Data Control, Inc.
Belpre, Ohio

Computer Sciences Corp.,
Los Angeles, Calif.

NASA

NORTEC Electronics Corp.,
Santa Clara, Calif.
General Dynamics, San Diego,
Calif.

Omron Tateisi Electronics Co.
of Japan
Air Force Space and Missile
Systems Organization

Ampex Corp., Redwood City,
Calif.

Illinois Dept. of Law Enforcement, Springfield, Ill.

University Computing Co.,
Dallas, Texas
Digital Development Corp.,
San Diego, Calif.
Computer Systems Engineering,
Inc., North Billerica, Mass.

Taylor Publishing Co.,
Dallas, Texas
Rohr Corp., Chula Vista,
Calif.
Federal Aviation Administration

Computer Communications, Inc.,
Culver City, Calif.

Boeing Computer Services, Inc.

Trans-A-File Systems Co.,
Sunnyvale, Calif.

Colonial Penn Group Data Corp.

Cornell Aeronautical Laboratory, Inc.} Buffalo, N.Y.
SYSTEMS Engineering Laboratories, Fort Lauderdale, Fla.
Conrac Corporation,
New York, N. Y.

Federal Bureau of Investigation

Air Force

Cummins Engine Co., Columbus,
Indiana
Continental Illinois National
Bank and Trust Co. of Chicago

Biochemical Procedures,
North Hollywood, Calif.

U.S. Army

ENTREX, Inc., Burlington,
Mass.

Agricultural Records Cooperative, Madison, Wis.

Computer Identics Corp.,
Westwood, Mass.

General Trading Corp.,
Carlstadt, N.J.

Conrac Corp., Datex Div.,
Duarte , Calif.

Montreal International Airport,
Dorval, Province of Quebec~
Canada

Collins Radio Co.,
Dallas, Texas

State of Iowa Office for Planning and Programming,
Cedar Rapids, Iowa

COMPUTERS and AUTOMATION for September, 1971

Fiscal year funding for operation and main- $25.1 million
tenance of Distant Early Warning (DEW) System, a chain of radar and communications
sites extending from Western Alaska across
Canada and Greenland to the United Kingdom
$21.8 mi Ilion
Design, development of command and control
system that will increase targeting and communications capabilities of Minuteman intercontinental ballistic missile system
Extension (fifth year) of communications and $18,210,325
instrumentation support contract at Kennedy
Space Center bringing five year total to
$93,993,844
Four NCR Century 300 computers expanding
$9.4 million
one of world's largest on-line banking networks; installation of two systems each in
data centers in Osaka and Tokyo
Production of first units of improved anti- $7 million
submarine warfare weapon-control system for (approximate)
deployment aboard submarines
An automated manufacturing system more than $6.5+ million
700 feet in length
Addition to contract for Data Modems to be
$3.9 million
used in new nationwide FAA en-route air control system
100 Burroughs RT 2501 currency dispensers
$2.3 million
and a B 3500 computer system; fi rm performs
data processing for 32 banks and several commercial concerns throughout Ohio Valley and
West Virginia
Mathematical, analytical and operational
$2.2 million
(approximate)
support to Goddard Institute for Space
Studies in New York Cit
$2 million
MOS LSI calculator circuits for use in low
cost "personal" calculators
Development of major element of system that $1. 75 million
will overcome language barrier between different computers and permit pooling of computerized space launch vehicle guidance data
$1.2 million
A Videofile information system; will automate police records, expand state's fingerprint identification capability
Electronic pagination service for produc$1+ mi Ilion
tion of college catalogs and bulletins
DOC Model 7313 Disc Memory Systems for use in $1 million
the Rohr Automotive Material Handling System (approximate)
Design, programming and operational testing
$831,000
of metering and spacing program at Atlanta,
Ga. airport as part of FAA Automated Radar
Terminal System (ARTS) advanced system
$640,000
Two CC-70 Computer Communicator Systems to
serve as "front-ends" to large complexes of
IBM and Control Data mainframes in Seattle
and Philadelphia
TRANS-A-FILE System for total automation of $600,000
accident and health claim files and general
correspondence/policy service files
$391,248
Final phase in development and fabrication
of prototype high-speed fingerprint reader
Multiple SYSTEMS 810B computers for research $285,000+
and engineering testing of diesel engines
Computer-controlled bond board display sys- $150,000
tem; replaces existing hand-operated board;
will be controlled by firm's remote System 360
Conducting a drug identification program for
servicemen in the Sixth Army and the Pacific
Command except Vietnam and Thailand
System 480 equipment for use in preparation
of input for ARC's "Dairy Herd Improvement
Program"
An "IDENTIC" Information and Control System
to "read" order picking labels, printed by
computer, on moving cartons
An information display system including a
"Greeter's Board"; gate signs directing passengers to proper baggage claiming areas;
baggage dispenser signs; belt loading signs
A communications oriented computer system to
be used in state-wide data network TRACIS -for Traffic Records and Criminal Justice Information System
43

NEW I NSlALLAliONS
Burroughs B3500 system

Blue Cross of North Dakota,
Fargo, No. Dakota

Digital Equipment PDP-IO system

Dept. of Energy, Mines, and
Resources (EMR) , Remote Sensing
Center, Ottawa, Ontario, Canada

Digital Equipment PDP-II computer

United Bristol Hospitals,
Bristol, England
(2 systems)
Y-ARD Consultants, Ltd. (Y-ARD
for Yarrow Admiralty Research
Department), Glasgow, Scotland
Gateway Press Inc.,
Monroeville, Pa.

Digital Equipment PDP-15/40 system
Honeywell Model 58 system
Honeywell Model 200 system

Honeywell Model 1250 system
Honeywell Model· 2015 system
Honeywell Model 6040 system
IBM System/3 Model 10
IBM System/370 Model 145
IBM System/370 Model 155

Hibbing Area Technical Institute,
Hibbing, Minn.
The Levinson Steel Co.,
PittSburgh, Pa.
First Federal Savings and Loan
Association, Gary, Ind.
Littlewoods Mail Order Stores,
Liverpool, England
Fidelity National Bank,
Lynchburg, Va.
Lynch Corporation,
Manchester, N.H.
Franciscan Hospitals Datacenter,
St. Clare Area House of Government,
Cincinnati, Ohio
Brown and Root, Inc.,
Houston, Tex.
Collins & Aikman, Charlotte, N.C.

Richman Brothers, Cleveland, Ohio
IBM System 370, Model 165
NCR Century 50 computer

NCR Century 100 computer

Ohio State University,
Columbus, Ohio
Asbury Park, N.J., Board of
Education
Martin Zippel Co.,
Phillipsburg, N.J.
H. A. Berkheimer Associates,
Bangor, Pa.
Cumberland County, New Jersey
City of Oceanside, California

RCA 2 system

UNIVAC 1106 system

UNIVAC 9200 system

Gulf Oil Co.-U.S.,
Atlanta , Ga.
Reader's Digest Inc.,
Pleasantville, N.Y.
Rheinische Braunkohlenwerke A.G.
(Rheinbraun) Cologne, West
Germany

Commercial Carriers Inc.,
Romulus, Mich.
Computer Information SOP,
Oklahoma City, Okla.

UNIVAC 9400 system

44

Iowa State Education Association,
Des Moines, Iowa
Southern Mortgage Associates,
Miami , Florida
Chicago Museum of Science and
Industry, Chicago, Ill.
Takashimaya Corporation,
Tokyo, Japan
Victor Company, Japan, Ltd.,
Tokyo, Japan

Processing Blue Cross, Blue Shield of North Dakota,
and Medicare tasks such as enrollment, claims adjudication, provider payments, and general accounting
(system valued at more than $1 million)
Essential part of a program to help Canada obtain
more ecological and environmental information than
was ever before feasible; system will let Canada
share data from satellite with United States
Controlling clinical laboratory equipment; maintaining in-patient, and outpatient, laboratory records
(system valued at $108,000)
Upgrading EAI 680 analog computer to a full hybrid
system to be used in marine and industrial control
systems design
PayrOll, billing, general ledger applications; also
service-bureau-type work for publisher of weekly
newspapers and printer of advertising tabloids
Student instruction in 2-year EDP course; also for
administrative work
Accounting and inventory applications
Savings account applications; will handle over
40,000 accounts
Inventory control, order processing and billing
Commercial banking applications
Cost control; accounts payable, payroll and inventory control will be added soon
Hospital drug control for seven participating hospitals; helping to comply with tougher federal drug
control laws
Design and analysis of large offshore oil platforms
Variety of applications ranging from printouts of
accounting statements, product schedules and inventory analyses to special simulation studies of profi t
projections, employee turnover and product mixes
Analyzing fast-shifting sales patterns in clothing
style, fabric, size, even geographical variation
amon 300 retail stores nationall
Upgrading main instruction and research computer
facility
Payroll, appropriation accounting, and attendance
and grade reporting
Inventory control and billing preparation
Administering its operations and processing a wide
variety of data
Variety of processing tasks; replaces smaller EDP
system
General accounting purposes; also for use by the
Police Department and the Harbor District
Sales analysis, accounts payable, inventory control
and general accounting for operations in 9 states
Controlling large number of peripheral devices
used in addressing bills and other documents
Profi tabili ty analysis of mining operations; processing engineering operations; analyzing aerial photograph measurements; also data processing for trading
companies, marketing associations, and benefit associations providing assistance for home building
(system valued at about $2 million)
Payroll processing, general accounting, financial
statements, miscellaneous reports, expense ledgers
and fixed assets accounting
Preparation of financial statements for public accountants and general ledger work; also, making
time available to students attending the Oklahoma
School of Business and Technology
Processing enrollments and accounting tasks, and
provision of statistical information
Assisting firm in servicing some 4,000 mortgages
Inventory control, purchasing, budget functions, and
payroll processing
Inventory control, accounting and payroll processing
. A material management system incorporating order
entry, order history and inventory control
COMPUTERS and AUTOMATION for SepTember, 1971

MONTHLY COMPUTER CENSUS
Neil Macdonald
Survey Editor
COMPUTERS AND AUTOMATION
The following is a summary made by COMPUTERS AND AUTOMATION of reports and estimates of the number of general purpose electronic digital computers manufactured and installed, or to be manufactured and on
order. These figures are mailed to individual computer manufacturers
from time to time for their information and review, and for any updating or comments they may care to provide. Please note the variation
in-dates and reliability of the information. Several important manufacturers refuse to give out, confirm, or comment on any figures.
Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit information for this census. We invite all our readers to submit information that would help make these figures as accurate and complete as
possible.
Part I of the Monthly Computer Census contains reports for United
States manufacturers. Part II contains reports for manufacturers
outside of the United States. The two parts are published in alternate months.

The following abbreviations apply:
(A) -- authoritative figures, derived essentially from information
sent by the manufacturer directly to COMPUTERS AND
AUTOMATION
C
figure is combined in a total
(D)
acknowledgment is given to DP Focus, Marlboro, Mass., for
their help in estimating many of these figures
E
figure estimated by COMPUTERS AND AUTOMATION
(N)
manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any
way on those numbers stated here
(R)
figures derived all or in part from information released
indirectly by the manufacturer, or from reports by other
sources likely to be informed
(S)
sale only, and sale (not rental) price is stated
X
no longer in production
information not obtained at press time

SUMMARY AS OF AUGUST 15, 1971
NAME OF
MANUFACTURER
Part 1. United States Manufacturers
Autonetics
Anaheim, Calif, (R) (1/69)
Bailey Meter Co.
Wickliffe, Ohio
(A) (8/71)

Bunker-Ramo Corp.
Westlake Village, Calif.,
(A)
(7/71)

Burroughs
Detroit, Mich.
(N)
(1/69-5/69)

Computer Automation, Inc.
Newport Beach, Calif.
(A) (6/71)
Control Data Corp
Minneapolis, Minn.
(R)
(7/71)

Data General Corp.
Southboro, Mass.
(A) (8/71)
Datacraft Corp.
Ft. Lauderdale, Fla.
(A) (6/71)
Digiac Corp.
Plainview, N.Y.
(A) (7/71)
Digital Computer Controls, Inc.
Fairfield, N.J. (A) (7/71)
Digital Equipment Corp.
Maynard, Mass.
(A) (2/71)

NAME OF
COMPUTER
RECOMP II
RECOMP III
Bailey 750
Bailey 755
Bailey 756
Bailey 855/15
Bailey 855/25
Bailey 855/50
BR-l30
BR-133
BR-230
BR-300
BR-330
BR-340
BR-l018
205
220
BIOO/B500
B2500
B3500
B5500
B6500
B7500
B8500
108/208/808
116/216/816

DATE
FIRST
INSTALLATION

AVERAGE OR MNGE
OF MONTHLY RENTAL
$(000)

11/58
6/61
6/60
11/61
2/65

2.5
1.5
40-250
200-600
60-400
50-400
100-1000
100-1000
2.0
2.4
2.7
3.0
4.0
7.0
23.0
4.6
14.0
2.8-9.0
5.0
14.0
23.5
33.0
44.0
200.0
5.0
8.0

4/68
10/61
5/64
8/63
3/59
12/60
12/63
6/71
1/54
10/58
7/65
2/67
5/67
3/63
2/68
4/69
8/67
6/68
3/69

GIS
G20
LGP-2l
LGP-30
RPC4000
636/136/046 Series
160/8090 Series
924/924-A
l604/A/B
l700/SC
3100/3150
3200
3300
3400
3500
3600
3800
6400/6500
6600
6700
7600

5/60
8/61
1/60
5/66
5/64
5/64
9/65
11/64
8/68
6/63
2/66
8/64
8/64
6/67
12/68

2.1-14.0
11.0
45.0
3.8
10-16
13.0
20-38
18.0
25.0
52.0
53.0
58.0
115.0
130.9
235.0

NOVA
SUPERNOVA
NOVA 1200
NOVA 800
SUPERNOVA SC
6024/1
6024/3
6024/5
Digiac 3060
Digiac 3080
Digiac 3080C
D-112

2/69
5/70
12/71
3/71
6/71
5/69
2/70
12/71
1/70
12/64
10/67
8/70

8.0
9.6
5.4
6.9
11.9
54-300
33-200
16-50
9.0
19.5
25.0
10.0

PDP-l
PDP-4
PDP-5

11/60
8/62
9/63

3.4
1.7
0.9

COMPUTERS and AUTOMATION for -September, 1971

7/55
4/61
12/62
9/56
1/61

(S)
(S)
(S)
(S)
(S)
(S)

NUMBER OF INSTALLATIONS
Outside
In
In
U.S.A.
World
U.S.A.
30
6
35
6
22
0
11
0

NUMBER OF
UNFILLED
ORDERS

30
6
32
6
16
0
11
0
160
79
15
18
19
19

0
0
3
0
6
0
0
0

25-38
28-31

2
2

27-40
30-33

X
X

52-57
44
65-74
4

12
18
7

64-69
62
72-81
4

117
190
8
60

X
X

0
0
2
2
3
12
X
X
X
X
X
X

(S)

13

(S)
(S)

1
165
215

10
20

1
175
235
295
20
165
322
75
29
610
29
59
425-475
83-110
55-60
205
15
15
40
20
108
85
5
8

1.6
15.5
0.7
1.3
1.9

(S)
(S)
(S)
(S)
(S)
(S)
(S)
(S)
(S)
(S)
(S)
(S)

0
6
0

911
169
502
56
15
12
48
0

5
110
225
X
X
X
X
X
X
X
X

0
C
C
C
C
C
C
C
C
C
C
C
Total:
160 E

12
42
0
45
16
8
115

15

130

300

48
40
90

2
5
10

50
45
100

X

3

46
5
7

o
1

X
X

45

NAME OF
MANUFACTURER
Digital Equipment Corp. (cont'd)

Electronic Associates Inc.
Long Branch J N.J. {A) (7/71)
EHR Computer
Hinneapo lis, }finn.
(A)
(2/71)

NAME OF
COHPUTER
PDP-6
PDP-7
PDP-8
PDP-81l
PDP-8/S
PDP-8/L
PDP-9
PDP-9L
PDP-10
PDP-11
PDP-12
PDP-IS
LINC-8

640
8400
EHR 6020
EMR 6040
EMR 6050
EMR 6070
EMR 6130
EMR 6135
EMR 6155

DATE OF
FIRST
INSTALLATION

10/64

11/64
4/65
3/68
9/66
11/68
12/66
11/68
12/67
3/70
9/69
-/69
9/66

4/67
7/67
4/65
7/65
2/66
10/66
8/67

AVERAGE OR RANGE
OF MONTHLY RENTAL
$(000)
0.5
0.4
0.3
0.4
0.3
1.1
8.0
10.5
17.0

1.2
12.0
5.4
6.6
9.0
15.0
5.0
2.6

(S)

NUMBER OF INSTALLATIONS
Outside
In
In
World
U.S.A.
U.S.A.
23
C
C
C
C
160
C
C
1440
C
C
3698
C
1024
C
C
C
3902
C
C
436
C
C
48
C
C
145
C
C
546
C
C
475
C
377
C
C
C
134

100
21
C
C
C
C
C

60
6

160
27

NUMBER OF
UNFILLED
ORDERS
X
X

C
C
C
C
C
C
C
C
C
C
C
Total:
1350 E
6
0
C
C
C
C
C
Total:
1350 E

General Automation, Inc.
Anaheim, Calif.
~R) (7/71)
General Electric
West Lynn, Mass.
(Process Control Computers)
(A)
(8/71)
Hewlett Packard
Cupertino, Calif.
~A) (8/71)
Honeywell Information Systems
Wellesley Hills, Mass.
(A) (2/71)

46

SPC-12
SPC-16
S:z:stem 18/30
GE-PAC 3010
GE-PAC 4010
GE-PAC 4020
GE-PAC 4040
GE-PAC 4050
GE-PAC 4060
2114A, 2114B
2115A
2116A 1 2116B 1 2116C
G58
G105A
G105B
G105RTS
G115
G120
G130
G205
G210
G215
G225
G235
G245
G255 T/S
G265 T/S
G275 T/S
G405
G410 T/S
G415
G420 T/S
G425
G430 T/S
G435
G440 T/S
G615
G625
G635
G655
H-110
H-115
H-120
H-125
H-200
H-400
H-800
H-1200
H-1250
H-1400
H-1800
H-2200
H-3200
H-4200
H-8200
DDP-24
DDP-116
DDP-124
DDP-224
DDP-316
DDP-416
DDP-516
H112
H632
H1602
H1642
H1644
H1646
H1648
H1648A

1/68
5/70
7/69
5/70
10/70
2/67
8/64
12/66
6/65
10/68
11/67
11/66
5/70
6/69
6/69
7/69
4/66
3/69
12/68
6/64
7/60
9/63
4/61
4/64
11/68
10/67
10/65
11/68
2/68
11/69
5/64
6/67
6/64
6/69
9/65
7/69
3/68
4/65
5/65
12/70
8/68
6/70
1/66
12/67
3/64
12/61
12/60
2/66
7/68
1/64
1/64
1/66
2/70
8/68
12/68
5/63
4/65
3/66
3/65
6/69

2.0
6.0
6.0
3.0
7.0
2.0
0.25
0.41
0.6
1.0
1.3
1.4
1.2
2.2
2.9
4.5
2.9
16.0
6.0
8.0
12.0
13.0
17 .0
20.0
23.0
6.8
11.0
7.3
23.0
9.6
17.0
14.0
25.0
32.0
43.0
47.0
80.0
2.7
3.5
4.8
7.0
7.5
10.5
30.0
9.8
12.0
14.0
50.0
18.0
24.0
32.5
50.0
2.65
0.9
2.2
3.5
0.6

2
7
186
45
23
18

0
0
52
20
2
2

900
70
70
2
7
238
65
25
20
1182
333
1171

200-400

420-680

620-1080

11
35
15
145
40-60
3
15-20
45-60

0
0
1
15
17
15-30

10-40

5

11
35
16
160
57-77
3
15-20
60-90
10
15-45

170-300

70-100

50-100

20-30

20
23
20-40

X
X
X

240-400
70-130
26

3
3
75

26
23-43

9/66
10/69
12/68

1.2
3.2

255
30
960
370
1075
86
73
320
185
10
20
185
22
20
13
90
250
250
60
450
350
900
75
12

11/68

12.0

20

180
30
800
150
800
46
58
230
130
4
15
125
20
18
10

16
30
46

160
220
275
40
15
90
55
6
5
60
2
2
3

0

X

X

X
X

X

COMPUTERS and AUTOMATION for September, 1971

NAME OF
MANUFACTURER
IBM
White Plains, N.Y.
(N) (D)
(1/69-5/69)

Interdata
Oceanport, N.J.
(A) (6/71)
NCR
Dayton, o.hio
(A) (7/71)

Phil co
Willow Grove, Pa.
(N) (1/69)
RCA
Cherry Hill, N.J.
(N)
(5/69)

Raytheon
Santa Ana, Calif.
(A)
(7/71)

Scientific Control Corp.
Dallas, Texas
(A)
(8/71)
Standard Computer Corp.
Los Angeles, Calif.
(A) (6/71)
Systems Engineering Laboratories
Ft. Lauderdale, Fla.
(A)
(6/70)

UNIVAC Div. of Sperry Rand
New York, N.Y.
(A) (2/71)

NAME OF
COMPUTER
System/3 Model
System/3 Model
System/7
305
650
1130
1401
1401-G
1401-H
1410
1440
1460
1620 I, II
1800
7010
7030
704
7040
7044
705
7020,
7074
7080
7090
7094-1
7094-II
360/20
360/25
360/30
360/40
360/44
360/50
360/65
360/67
360/75
360/85
360/90
370/l35
370/145
370/155
370/165
370/195
Modell
Model 3
Model 4
Model 5
Model 15
304
310
315
315 RMC
390
500
Century 50
Century 100
Century 200
Centu!JI: 300
1000
200-210,211
2000-212
301
501
601
3301
Spectra 70/15
Spectra 70/25
Spectra 70/35
Spectra 70/45
Spectra 70/46
SEectra 70/55
250
440
520
703
704
706
650
655
660
4700
DCT-132
IC 4000
IC 6000
IC 7000
810
810A
810B
840
840A
840MP
S:l:':stems 86
I & II
III
File Computers
Solid-S tate 80
90, I, II, &

COMPUTERS and AUTOMATION for September, 1971

6
10

DATE OF
FIRST
INSTALLATION
3/71
1/70
11/71
12/57
10/67
2/66
9/60
5/64
6/67
11/61
4/63
10/63
9/60
1/66
10/63
5/61
12/55
6/63
6/63
11/55
3/60
3/60
8/61
11/59
9/62
4/64
12/65
1/68
5/65
4/65
7/66
8/65
11/65
10/65
2/66
12/69
11/67
5/72
7/71
2/71
5/71
4/71
12/70
5/67
8/68
11/70
1/69
1/60
5/61
5/62
9/65
5/61
10/65
2/71
9/68
6/69
2/72
6/63
10/58
1/63
2/61
6/59
11/62
7/64
9/65
9/65
1/67
11/65
11/66
12/60
3/64
10/65
10/67
3/70
5/69
5/66
10/66
10/65
4/69
5/69
12/68
5/67
8/70
9/65
8/66
9/68
11/65
8/66
1/68

3/51 & 11/57
8/62
8/56
I, II,
Step
8/58

AVERAGE OR RANGE
OF MONTHLY RENTAL
$(000)
1.0
1.1
0.35 and up
3.6
4.8
1.5
5.4
2.3
1.3
17.0
4.1
10.0
4.1
5.1
26.0
160.0
32.0
25.0
36.5
38.0
27.0
35.0
60.0
63.5
75.0
83.0
2.7
5.1
10.3
19.3
11.8
29.1
57.2
l33.8
66.9
150.3
(S)
14.4
23.3
48.0
98.7
232.0
3.7
8.5
10.5
20.0
10.0
1.0
7.0
9.0
0.8
1.0
1.6
2.6
7.5
20.0
7.0
40.0
52.0
7.0
14.0-18.0
14.0-35.0
17.0-35.0
4.3
6.6
9.2
22.5
33.5
34.0
1.2
3.6
3.2
(S)
12.5
(S)
8.0
(S)
19.0
0.5
2.1
2.1
1.8
0.9
9.0
16.0
17.0
1.1
0.9
1.2
1.5
1.5
2.0
10.0
25.0
21.0
15.0
8.0

NUMBER OF INSTALLATIONS
In
Outside
In
U.S.A.
U.S.A.
World

40
50
2580
2210
420
180
156
1690
194
285
415
67
4
12
35
28
18
10
44
13
4
10
6
4690
0
4075
1260
65
480
175
9
14

15
18
1227
1836
450
140
116
1174
63
186
148
17
1
1
27
13
3
3
26
2
2
4
4
3276
4
3144
498
13
109
31
4
3

NUMBER OF
UNFILLED
ORDERS

55
68
3807
4046
870
320
272
2864
257
471
563
84
5
l3
62
41
21
l3
70
15
6
14
10
,7966
4
7219
1758
78
589
206
l3
17
5

45
N/A
200
25
40
10
8
350
125
290
1100
75
1400
40.5
0
16
16
12
140-290
22-50
2
24-60
90-110
68-70
65-100
84-180
1
11
115
20
26
172
100
60
23
l37
41
18
41
9
9
5
24
111
75
3
36
31
0
23
25
13
210

10
100
15
24
2
0
375
50
440
1800
450
155
0

55
200
300
40
64
12
8
725
175
730
2900
75
1850
560
0

70
X

90
50
l3
X
X

X
X
X

100-l30
1
0
1-5
35-60
18-25
20-50
21-55
0
1
20
1
31
35
14
0
0
0
0
0
0
0
0
0
5
1
0
2
0
0
6

240-420
23-51
2
25-65
125-170
86-95
85-150
105-235
1
12
l35
20
27
203
135
74
23
l37
41
18
41

9

9
5
24
116
76
3
38
31
0
31

X
X
X

2
50
0
X

0
0
4
4
X

32
26
X
X

2
2
X
X
X
X

47

NAME OF
MANUFACTURER
UNIVAC (Cont'd)

NAME OF
COMPUTER
418
490 Series
1004
1005
1050
1100 Series (except
1107, 1108)
1107
1108
9200
9300
9400
LARC
620
620i
R-260i
520i
520/DC
620/f
620/L
XDS-92
XDS-910
XDS-920
XDS-925
XDS-930
XDS-940
XDS-9300
Sigma 2
Sigma 3
Sigma 5
Sigma 6
Sigma 7
Sigma 9

Varian Data Machines
Newport Beach, Calif.
(A) (7/71)

Xerox Data Sys terns
E1 Segundo, Calif.
(R)
(2/71)

DATE OF
FIRST
INSTALLATION
6/63
12/61
2/63
4/66
9/63
12/50
10/62
9/65
6/67
9/67
5/69
5/60
11/65
6/67
4/69
10/68
12/69
11/70
4/71
4/65
8/62
9/62
12/64
6/64
4/66
11/64
12/66
12/69
8/67
6/70
12/66

AVERAGE OR RANGE
OF MONTHLY RENTAL
$(000)
11.0
30.0
1.9
2.4
8.5
35.0
57.0
68.0
1.5
3.4
7.0
135.0

1.5
2.0
2.9
3.0
3.4
14.0
8.5
1.8
2.0
6.0
12.0
12.0
35.0

NUMBER OF INSTALLATIONS
In
Outside
In
U.S.A.
U.S.A.
World
76
112
36
11
75
86
1501
628
2129
637
299
936
62
138
200
0
3
114
822
49
0
0

9
8
87
1051
387
8
2

10-60
150-170
93-120
20
159
28-35
21-25
60-110
10
15-40 "

2
7-10
5-12
1
14
0
1
10-15
0
6-18

9
11
201
1873
436
8
2
75
1300
50
150
25
60
12
12-62
157-180
98-132
21
173
28-35
22-26
70-125
10
21-58

24-35

5-9

29-44

NUMBER OF
UNFILLED
ORDERS
20 E
35 E
20 E
90 E
10 E
X
X
75
850
550
60

E
E
E
E

X
400
30
330
25
40
250

Solution to Numble 718

NUMBLES

In Numble 718 in the August issue, the digits 0 through
9 are represented by letters as follows:

NUMBER PUZZLES FOR NIMBLE MINDS
-AND COMPUTERS

B,V=O
Y=l
M,T=2
R=3
F,L=4

Neil Macdonald
Assistant Editor
Computers and Automation
A "numble" is an arithmetical problem in which: digits
have been replaced by capital letters; and there are two
messages, one which can be read right away and a second
one in the digit cipher. The problem is to solve for the
digits.
Each capital letter in the arithmetical problem stands for
just one digit 0 to 9. A digit may be represented by more
than one letter. The second message, which is expressed in
numerical digits, is to be translated (using the same key)
into letters so that it may be read; but the spelling uses
puns or is otherwise irregular, to discourage cryptanalytic
methods of deciphering.
We invite our readers to send us solutions, together with
human programs or computer programs, which will produce
the solutions. This month's Numble was contributed by:
Stuart Freudberg, Newton High School, Newton. Mass.
NUMBLE 719

A=5
D,H=6
S=7
E=8
0=9

The message is: Eyes are the ambassadors of love.
Our thanks to the following individuals for submitting
their solutions - to Numble 717: A. Sanford Brown,
Dallas, Texas; Twite S. Emerick, Harrisburg Pa.; T. P. Finn,
Indianapolis, Ind.; Abraham Schwartz, Jamaica, N.Y.; and
David P. Zerbe, Reading, Pa. - to Numble 716: Vaughn E.
Mers, Hazelwood, Mo.; and G. P. Petersen, St. Petersburg,
Fla.

CORRECTION

In the July 1971 issue of Computers and Automation,
the following correction should be made:
Page 6, Editorial: Col. 2, eighth line: replace
"nineteen hundreds" with "nineteenth century"

HUM A N
x L I FE I S

EE AI LN

ADVERTISING INDEX

F H N lEE
CFM

U A H K S

= KHS

CKEIUL
HFNIEE
K ADS H E

= C N A U MAL
48

D USN

49125

ASSOCIATION FOR COMPUTING MACHINER~ 1133 Avenue of
the Americas, New York, N. Y. 10036 / Page 39 /
Corporate Presence, Inc.
COMPUTERS AND AUTOMATION, 815 Washington St., Newtonville, Mass. 02160 / Pages 2, 3
NEW YORK TIMES Book &Education Div.;" 299 West 43 St.,
New York, N. Y. 10036 / Page SO/Kingen Feleppa
O'Dell

158042
COMPUTERS and AUTOMATION for September, 1971

CALENDAR OF COMING EVENTS
Sept. 1.3, 1971: Second International Joint Conference on Artificial
Intelligence, Imperial College, London, England J contact: The
British Computer Society, Conference Department, 29 Portland
Place, London, W.l., U.K.

Oct. 25, 1971: Second Annual SIGCOSIM (ACM Special Interest Group
on Computer Systems Installation Management) Symposium, Washington, D.C. / contact: I. Feldman, Wiley Systems, Inc., 6400
Goldsboro Rd., Bethesda, Md. 20034

Sept. 6.10, 1971: DISCOP Symposium (IFAC Symposium on Digit~1
Simulation of Continuous Processes), Gyor, Hungary I contact:
The Organizing Committee, Synposium on Simulation, Budapest
112, P.O.B. 63, Hungary

Oct. 25·29, 1971: IEEE Joint National Conference on Major Systems,
Disneyland Hotel, Anaheim, Calif. / contact: Institute of Electrical
and Electronics Engineers, Inc., 345 East 47th St., New York, N.Y.
10017

Sept. 7.9, 1971: lEE 1971 Conference on Computers for Analysis and
Control in Medical and Biological Research, University of Sheffield,
Sheffield, England I contact: Manager, Conference Dept., lEE, Savoy
Place, London WC2R OBL, England

Oct. 25.29, 1971: Systems Science & Cybernetics Conference & 1971
ORSA (Operations Research Society of America) Meeting, Disneyland Hotel, Anaheim, Calif. / contact: Dr. Michael W. Lodato, Xerox
Data Systems, 701 So. Aviation Blvd., EI Segundo, Calif. 90245

Sept. 9.10, 1971: Third Annual Conference of the Society for
Management Information Systems, Denver, Colo. I contact: Gerald
M. Hoffman, Secy., Society for Management Information Systems,
One First National Plaza, Chicago, III. 60670

Oct. 29, 1971: Sixth Annual ACM Urban Symposium, New York Hilton
Hotel, New York, N.Y. / contact: Gerald M. Sturman, Parsons
Brinckerhoff, 111 John St., New York, N.Y. 10038

Sept. 14·17, 1971: Canadian Information Processing Society (CIPS)
Annual National Conference, Royal York Hotel, Toronto, Canada i
contact: Jack McCaugherty, James Lovick Ltd., Vancouver, British
Columbia, Canada

Nov. 1·2, 1971: Computer Science and Statistics: Fifth Annual Sym.
posium on the Interface, Oklahoma State University, Stillwater,
Okla. / contact: Dr. Mitchell 0.' Locks, Oklahoma State Univ.,
Stillwater, Okla. 74074

Sept. 15·17, 1971: Canadian Computer Conference and Show, Royal
York Hotel, Toronto, Canada / contact: Conference Chairman, P.O.
Box 343, Toronto Dominion Centre, Toronto 111, Ontario, Canada

Nov. 4-5, 1971: 1971 American Production & Inventory Control So.
ciety (APICS) International Conference, Chase Park Plaza Hotel,
St. Louis, Mo. I contact: Henry F. Sander, American Production &
Inventory Control Society, Inc., Suite 504 Watergate Bldg., 2600
Virginia Ave. N.W., Washington, D.C. 20037

Sept. 27.29, 1971: Elettronica '71 - lst International Conference on
Applications of Electronics in the Industry, 21 st International Technical Exhibition, Turin, Italy I contact: Dr. Ing. Giovanni Villa, Elettronica 71, Corso Massimo d'Azeglio 15, 10126 Turin, Italy
Oct. 4-6, 1971: International Electrical & Electronics Conference & Ex·
hibition, Automotive Bldg., Exhibition Park, Toronto, Ontario,
Canada I contact: Conference Office, 1819 Yonge St., Toronto 7,
Ontario, Canada
Oct. 4-7, 1971: 26th Annual ISA Instrumentation·Automation Conference
& Exhibit, McCormick Place, Chicago, III. / contact: Daniel R. Stearn,
Public Relations Manager, Instrument Society of America, 400 Stanwix St., Pittsburgh, Pa. 15222
Oct. 6·8, 1971: Conference on "Two·Dimensional Digital Processing",
Univ. of Missouri·Columbia, Columbia, Mo. / contact: Prof. Ernest
L. Hall, Dept. of Electrical Engineering, Univ. of Missouri-Columbia,
Columbia, Mo. 65201
Oct. 10·12 1971: First Annual ASM Southwest Division Conference
(sponsored by Assoc. for Systems Management, Div. Council 18),
Jung Hotel, New Orleans, La. / contact: Albert J. Krail, 636
Baronne St., New Orleans, La. 70113
Oct. 11·13, 1971: Input/Output Systems Seminar '71, The Regency
Hyatt House·O'Hare, Chicago, III. / contact: C. A. Greathouse,
Exec. Director, DPSA (Data Processing Supplies Assoc.), P.O. Box
1333, Stamford, Conn. 06904
Oct. 14·20, 1971: Interkama '71, Dusseldorf, Germany / contact: I. A.
Stader, Dusseldorfer Messegesellschaft mbH - NOWEA - 4 Dusseldorf, Messegelande
Oct. 18·20, 1971: 27th Annual National Electronics Conference and
Exhibition (NEC/71), Pick-Congress Hotel, McCormick Place, Chicago,
III. / contact: NEC, Oakbrook Executive Plaza #2, 1211 W. 22nd
St., Oak Brook, III. 60521
Oct. 18·20, 1971: International Computer Forum & Exposition, McCormick Place-On-The-Lake, Chicago, III. / contact: International
Computer Forum & Exposition, Oak Brook Executive Plaza #2,
1211 West 22nd St., Oak Brook, III. 60521
Oct. 20·22, 1971: ACM/IEEE Second Symposium on Problems in the
Optimization of Data Communications Systems, Palo Alto, Calif. /
contact: Dr. P. E. Jackson, Room 2B-434, Bell Laboratories, Holmdel, N.J. 07733
Oct. 21.22, 1971: ADAPSO 33rd Management Conference·Annual
Meeting; lst Software Management Conference (concurrently),
Brown Palace Hotel, Denver, Colo. I contact: Association of Data
Processing Service Organizations, Inc., 551 Fifth Ave., New York,
N.Y. 10017

COMPUTERS and AUTOMATION for September, 1971

Nov. 7.11, 1971: 34th Annual Meeting of the American Society for
Information Science (ASIS), Denver Hilton Hotel, Denver, Colo. I
contact: Miss Sheryl Wormley, ASIS, 1140 Connecticut Ave., N.W.,
Suite 804, Washington, D.C. 20036
Nov. 16·18, 1971: Fall Joint Computer Conference, Las Vegas
Convention Center, Las Vegas, Nev. / contact T. C. White, AFIPS
Headquarters, 210 Summit Ave., Montvale, N. J. 07645
Nov. 30·Dec. 3, 1971: Systems '71, Munich, Germany / contact: Andre
Williams, BIC-938, Commercial Exhibitions Div., U.S. Department of
Commerce, Washington. D.C. 20230
Dec. 16-18, 1971: IEEE Conference on Decision and Control (incl uding
the 10th Symposium on Adaptive Processes), Americana of Bal Harbour, Miami Beach, Fla. / contact: Prof. J. T. Tou, Univ. of Florida,
Gainesville,· Fla.
Feb. 2·4, 1972: 1972 San Diego Biomedical Symposium, Sheraton
Hotel, Harbor Island, San Diego, Calif. / contact: Norman R. Silverman, M.D., San Diego Biomedical Symposium, P.O. Box 965, San
Diego, Calif. 92112
Mar. 20.23, 1972: IEEE International Convention & Exhibition, Coliseum & N. Y. Hilton Hotel, New York, N.Y. / contact: IEEE Headquarters, 345 E. 47th St., New York, N. Y. 10017
April 5.8, 1972: "Teaching Systems '72", Internationa I Congress,
Berlin Congress Hall, Berlin, Germany / contact: AMK Berlin,
Presse
und
Public
Ausstellungs-Messe-Kongress-GmbH,
Abt.
Relations, 0 1000 Berlin 19, Messedamm 22, Germany
May 15·18, 1972: Spring Joint Computer Conference, Convention Ctr.,
Atlantic City, N.J. / contact: AFIPS Headquarters, 210 Summit Ave.,
Montvale, N.J. 07645
May 16-17, 1972: liT Research Institute Second International Sympo.
sium on Industrial Robots, Chicago, III. I contact: K. G. Johnson,
Symposium Chairman, liT Research Institute, lOWest 35 St., Chicago, III. 60616
May 22·26, 1972: Fifth Australian Computer Conference, Brisbane,
Australia I contact: K. Arter, Honorary Secretary, Australian Computer Society, Inc., P.O. Box 63, Watson, A.C.T. 2602 Australia
May 24·26, 1972: Second Annual Regulatory Information Systems Con·
ference, Chase-Park Plaza Hotel, St. Louis, Mo. / contact: William
R. Clark, Missouri Public Service Commission, Jefferson City, Mo.
65101
June 19.21, 1972: International Symposium on Fault·Tolerant Com.
puting, Boston, Mass. I contact: John Kirkley, IEEE Computer Society, 8949 Reseda Blvd., Suite 202, Northridge, Calif. 91324
49

The New York Times and
Computers and Automation
have published· a practical guide to
the most elusive components in
computers and data processing ...

PEOPLI:
Who they are ...
What they do ...
Where they do it ...
Until now, it has been well-nigh impossible to keep track of the thousands of highly skilled professionals
pngaged in the world's fastest growmg profession.
The painstaking task required to inventmy the qualifications and backgrounds
of the 15,000 "most necessary" professionals in every branch of the computer field has been accomplished. The
oldest magazine in the field, Computers
and Automation, and the information
retrieval services of The New York
Times have pooled their resources to
produce the Fifth Edition of

WHO'S WHO IN
COMPUTERS AND
DATA PROCESSING
This is the most extensive register of
computer professionals ever published.
It is arranged in three volumes:
1. Systems Analysts and Programmers
2. Data Processing Managers and
Directors
3. Other Computer Professionals
(from professors of computer science to attorneys versed in the
computer field)
Each volume has an index to the entire
set of entries.
Each compu ter specialist has a capsule
biography detailing: Birth Date . ..
Education . .. Year Entered Computer
Field . .. Title . .. Honors . .. Memberships . .. Special Skills (from applications to logic to sales) ...

PLUS both home and business ad- dresses. For example:
CHAPIN, Ned / consultant / born: 1927 /
educ: PhD, lIT; MBA, Univ of Chicago /
entered computer field: 1954 / main interes is: applications, business, logic, management, programming, systems, data
structures / title: data processing consultant / organization: InfoSci Inc, Box 464,
Menlo Park, CA 94025 / publications,
honors: 3 books, over 50 papers; member,
over 12 associations; CDP; lecturer for
ACM / home address: 1190 Bellair Way,
Menlo Park, CA 94025

This reference is particularly useful for:
personnel managers; employers; recruiting organizations; libraries; conference
planners; directors of compu ter installations; ... anyone who needs to keep up
with the important people in the field.

FIFTH EDITION - Over 1000 pages
The coupon below will bring you the 3volume set at the price of $75. There is
no risk in:volved. 1 D-Day Free Examination.

WHO'S WHO IN COMPUTERS
AND DATA PROCESSING
Edited by Edmund C. Berkeley
3 volumes in durable hard-cover
bindings
Retail price $75 the set

- - - - - - - - - ( m a y be copied on any piece of paper) --------1

Who's Who in Computers and Data Processing,
815 Washington St., Newtonville, Mass. 02160

(

(
(

) Please send the 3-volume set WHO'S WHO IN COMPUTERS AND DATA
PROCESSING at $75. You will bill me after delivery and I may return
the set within 10 days if not fully satisfied.
) Please make this order a standing order for the 5th and later editions - so
that I will receive all updating supplements free automatically.
) I have already bought the 5th Edition. Please change my record of purchase to a standing order, and send me Supplement 1 FREE.
NAME
TITLE
ORGANIZATION
ADDRESS
CITY

STATE&ZIP
P.O. # (IF COMPANY ORDER)

J

L ______________________________

I

YOUR SIGNATURE

~

SEVEN RECENT ARTICLES IN

cDrnI?,HE!!!:i~

lit

30

-- seven reasons why you should subscribe for your

U

...

own copy each month.

lit

...a:

THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY, THE
APPLICATION OF COMPUTERS TO THE PHOTOGRAPHIC
EVIDENCE, by Richard E. Sprague (May 1970, p. 29)
A reexamination of some of the evidence relating
to the assassination of John F. Kennedy -- with
emphasis on the possibilities and problems of
computerized analysis of the photographic evidence.
EFFECTIVE PROGRAM DESIGN, by David W. Packer (July
1970, p. 37)
"The tendency of many programmers is to just
start drawing a detailed flowchart, solving
each problem as it occurs. This is analogous
to building a house without a plan -- one
brick at a time. The result in either case
is likely to be the creation of a monster."

-~

1 ft
In
1ft
1ft

Z

0
'= ...

~

a:
III

I
I

COMMUNICATIONS MESSAGE SWITCHING -- AN ANALYSIS,
by Walter M. Aydelotte (July 1971, p. 8)
Ilow to organize the switching of communications
of data between remote business locations, and
how to use delay in transmission to great advnntage.

These are just seven of the interesting, informative,
provocative articles published recently in C&A.
WE INVITE YOUR SUBSCRIPTION
at no risk to you -- you can cancel at any time and
receive a refund for the unmailed portion of your
subs cr i pt i on.

0

U

!

'"
~

...wi

.....IV

~

A.

~

=>

III

-=c

d

"0

II!:

Z

cu

~
...c

-

~

>-

..I
D.

III

a:

lit
lit
III

Z

Vi

;:)

III

w

<

Q)

Q

~

0

)-

Vi

m

Z

<

0

~

;(

~cu

w

m

cu

...J
...J

a.
E
IV
ti
cu
no

~

C

....III
;:)
a.

t:

0

.(

tV)

0

N

iii

'"a

0

~

t:

.Ii

'"a

.:;:
t:

~
an

~Q)

eo

Z

~
8 ...

W

t!

-0

'"CII: ..z::.m

a..

u

0

...

;:)

III

IV

CC

....0

t;

E

..I

~

~

o!!

~

~

...ei

·c

III

Z
0

~

Vl
"0

THE SCIENCE OF INFORMATION MANAGEMENT, by Col. Carl
J. Weinmeister, III (April 1971, p. 20) .
A development of two theses: (1) Information
management systems have failed because of inadequate attention to data base construction;
and (2) A new science of information manage~ent
must be developed before really successful, .
large management information systems can evolve.

MAYBE THE COMPUTERS CAN SAVE US AFTER ALL, by Edward
Yourdon (May 1971, p. 21)
A proposal for a privately owned and operated
National Information Bureau which would serve
as a central source of information for anyone
on any subject of reasonable interest. -"If part of the average ci tizen 's feeling of
impotence and disillusionment is caused by a
lack of organized and readily-available information, would it not be possible to put
such information at his fingertips with a
computer?"

lit

III

A-

DATA BANKS -- A POSITION PAPER, by Prof. Caxton C.
Foster (March 1971, p. 28)
A penetrating analysis of future likely developments of data banks, "when every interaction of an individual with society can be
collected, sifted, and analyzed at low cost"
producing erosion of constitutional rights.

USINC; THE COMPUTER TO STEAL, by Harvey S. Gellma n
(April 1971, p. 16)
Ilow computers are being used for fraud and theft.
'~he typical computer centre offers an open
invitation to the thief or vandal; most computer systems are not presently protected
against destruction, or unauthorized access
or manipulation."

~

Z

0

a..

'"a.

0

0

Z

cut here

YES,

start my subscription to COMPUTERS AND AUTOMATION according to the
instructions checked below.

One Year (including the Computer Directory and Buyers'
Guide -- 13 issues) U.S. only. 0 $18.50
One Year (excluding the Computer Directory and Buyers'
Guide -- 12 issues) U.S. only. 0 $9.50
9/71

Name: _ _ _ _ _ _ _ _ _ _ _ _ _ _ Title _ _ _ _ __
Organization: ____________________
Address: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
City: _ _ _ _ _ _ _ _ _ Zip Code: _ _ _ State: _ __
Country if not U.S. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __

o
o

Payment enclosed
Bill me

o
o

Renewal
New subscription

To SPEED the processing of your order, please check the one best
descriptor in each of the two categories below. (This information
will be used for sratistical purposes only.)

BUSINESS TYPE
_01-Computer Manufacturer
_02-Aerospace / Aircraft
Manufacturer
_03-other Manufacturing
o4-Raw Materials Processing;
(chemical, primary metal,
petroleum, food, etc.)
_05-Mining and Construction
_OS-Computing & Consulting
o7-Finance, Insurance, Pub!',
and Service Organizations
_DB-Transportation Companies
_OS-Public Utilities
10-Research
-1 I-Wholesale, Retail, Sales,
and Marketing Firms
_12-Educational; (College,
University, or School)
_13-Government and Military
14--Libraries

JOB FUNCTION
__ I-Technical Management; (computer
installation management, program
management, or engineering mgmt.l
_ 2-Computer Center Personnel;
(methods & procedure analysts,
and operators)
_ 3-Programming Personnel; (systems,
application & research programmers)
_ 4-Professional: (systems analysts,
mathematicians, operations
researchers, and professors)
___ 5-General Management Executives;
(corporate officers, owners, and
partners)
6-EnEineering Personnel; (systems
enEineers, research & development engineers)
7-Research Personnel
_. 8-Students
_ 9-Library Subscription
_JD-Subscription in Company Name
Only

YES,

start my subscription to COMPUTERS AND 4UTOMATION according to the
instructions checked below.

SIX RECENT ARTICLES IN

corn e,~a~!=!!:i~

One Year (including th~ Computer Directory and Buyers'
Guide 13 issues) ,U,S. on'Iv.;O $18.50

six reasons why you should subscribe for your
own copy each month.

One Year (excluding the Computer Directory and Buyers'
Guide -

12 issues) U.S. only.

0

COMPUTERS AND THE CONSUMER, by Ralph Nader
(October 1970, p. 14)
A searching commentary on how computers to date
have affected consumers, citizens, and the public, and how they might be used for wider advantageo -

$9.50
9/71

Name: _ _ _ _ _ _ _ _ _ _ _ _ _ _ Title _ _ _ _ _ __
Organization: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Address: _______________________________________
City: ________________ Zip Code: _ _ _ State: _ __
Country if not U.S. _______________________________

n

5.

"At the present time the capability for gathering and providing information about products and services for consumer use is as
primitive as the Gutenberg printing press."

:r(I)

o
o

Paymen~

o
o

enclosed

Bill me

Renewal
New subscription

;;

OPTICAL CHARACTER RECOGNITION (OCR), by Alan I
Frank, Chrmn. of the Board, Scan-Data Corp.
(November 1970, p. 24)
A tutorial article on the growth and development of'OCR technology, including classifications of OCR systems. a discussion of various
ways machines can identify images, and an evaluation of different types of document feeders.

To SPEED the processing of your order, please check the one best
descriptor in each of the two categories below, (This information
will be used for statistical purposes only.)

BUSINESS TYPE
-'--Ot-Computer Manufacturer
__ 02-Aerospace / Aircraft
Manufacturer
__ 03-0ther Manufacturing
__ 04-Raw Materials Processing;
(chemical, primary metal,
petroleum, food, etc.)
_05-Mining and Construction
__ OS-Computing&. Consulting
07-Finance, Insurance, Pub I.,
and Service Organizations
__ DB-Transportation Compal1ies
_09-Public Utilities
_to-Research
l1-Wholesale, Retail, Sales,
-'
and Marketing Firms
_t2-Educational; (College,
University, or Schoof)
_l3-Government Ind Military
14-Libraries

JOB FUNCTION
I-Technical Manaltement; (computer
installation' management, program
management, or engineering mgmtl
_ 2-Computer Center Personnel;
(methods&. procedure analysts,
and operators)
_ 3-Programming Personnel; (systems,
application&' research proltrammers)
__ 4-Professional: (systems analysts,
mathematicians, operations
researchers, and professors)
_ 5-General Management Executives;
(corporate officers, owners, and
partners)
_ 6-Engineering Personnel; (systems
engineers, research &. development engineers)
7-Research Personnel
B-Students
_ 9-Library Subscription
_IO-Subscription in Company Name
Only

_

cut here

AUTOMATIC DATA PROCESSING IN THE DEPARTMENT OF
DEFENSE, by Gilbert W. Fitzhugh, and 15 more
authors, Blue Ribbon Defense Panel (December 1970,
p. 21)

"The challenge which the Department of
Defense continues to fnce is that of design
and development of standard, Departme~t­
wide, AOP systems."
THE EUP MANAGER - AND THE COMPUTER PROFIT DRAIN,
by Walter J. Schroeder, Principal, A. T. Kearney
& Co., Inc. (January 1971, p. 14)
Why have the predictions of the 1960's regarding the use of computers in making management
decisions, and the movement of EDP managers
into company presidencies, failed to materialize? -

---------1
z

0
1J
0

~

0

Z

CD

~

0'

:s

~.

~cn
~

D

III

!II

0
....,

0-

0

CO

'"~
D

III

~

:s

CD

0'

:s

S
~
"'G

C

-t

,.,'"

'"
:..

!!'
...

Z
0

!

:..

CD

OQ

>(')

~

-i

m

~

rr-

m
m

~

~

0

m

-<

...

til
;III

:1'1:

-t

F!

0

~

...
Z

0
Z

III

III

C

~

~

~

-4

;

III
III

3

1J
:J
III

III

"U

-<

-<

~

~

r-

3
n;a.
5'
III

S-

n

5.

III

:r-

C

(I)

~
III

;i

~

'"
Z

"r-

~

a.

,!II

Z

~

III

ACOHN (Automatic COder Report Narrative): AN
AUTOMATED NATURAL-LANGUAGE QUESTION-ANSWERING
SYSTEM For Surgical Reports, by Paul A. Shapiro
and DaviLi F. Stermole, (February 1971, p. 13)
A highly successful pilot model of a system
(at a cancer research institute in Buffalo,
N.Y.) for (1) storing post-operative surgical
reports written by doctors in ordinary English;
and (2) allowing researchers to question this
great catalog of stored data, using ordinary
English.

lit
ell
ell

n

."

;III

m

C
~

;;

e:.

VEHIFICATION OF SOFTWAHE PROGRAMS, by Fletcher J.
Buckley, U.S. Army Computer Systems Command
(February 1971, p. 23)
How a Formal Qualification Test (FQT) of a
software program can be used to verify that
each of the individual requirements in the
specification has been met - and why this
general method is more reliable and more
useful than other appro;lches. -

"

Ii'

III

en

These are just sixof the interesting, informative, provocative articles published recently in

!'

CLA.
WE INVITE YOUR SUBSCRIPTION

"U

m

lit

ell

~

"
a~ =iZ ""-t"
0

ell

~

~

at no risk to you - you can cancel at any time nnci
receive n refund for the unmailed portion of your
subscription.

P n
w
W

VI

I

, .1

E
ell

W

.

>,



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Producer                        : Adobe Acrobat 9.1 Paper Capture Plug-in
Modify Date                     : 2009:03:24 22:34:58-07:00
Create Date                     : 2009:03:24 22:34:58-07:00
Metadata Date                   : 2009:03:24 22:34:58-07:00
Format                          : application/pdf
Document ID                     : uuid:a6854359-cd6c-4b50-a451-e98d076c030a
Instance ID                     : uuid:7c1bf4fd-c15a-4a5f-a08a-2e2f0412080c
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 52
EXIF Metadata provided by EXIF.tools

Navigation menu