197201

197201 197201

User Manual: 197201

Open the PDF directly: View PDF PDF.
Page Count: 60

Download197201
Open PDF In BrowserView PDF
I

SCIENCE & TECHNQtQ9Y

"5 3092

fUL SEiL 21dAAk y

January, 1972
Vol. 21, No.1

CD

Computerized Word Pronouncer

Robert A. Gagnon
Raymond A. Pietak
Michael J. Cerullo
Vern Countryman
Edmund C. Berkeley

Workable, Sound, Data Processing Decisions
The Computer and The Community College
The Satisfaction of Companies with Service Bureaus
Computers and Dossiers - I
Common Sense, Wisdom, General Science, and Computers - II

tl

0 121 9904 7112
126 01572

N

.:l

I::

A

*c

•

95 11 3

DO YOU WANT TO

PREVENT MISTAKES BEFORE THEY HAPPEN?
- avoid pitfalls?
- find new paths around old obstacles?
- apply in practical situations the observations and
wisdom of great scientists and wise men?
- stimulate your resourcefulness?

see new solutions to old problems?
distinguish between sense and nonsense?
increase your accomplishments?
improve your capacities?

IF SO, TRY-

The C&A Notebook on
COMMON SENSE. ELEMENTARY AND ADVANCED
devoted to research, development, exposition, and illustration of one of the most important
of all branches of knowledge, i.e. the subject of WHAT IS GENERALLY TRUE AND IMPORTANT =

+

+

+

+

+

+

+

+

THE FIRST SIX ISSUES ARE FREE - see the coupon - THE NEXT 20 ISSUES ARE:
7. The Elephant and the Grassy Hillside
8. Ground Rules for Arguments
9. False Premises, Valid Reasoning,
and True Conclusions
10. The Investigation of Common Sense,
Elementary and Advanced
11. Principles of General Science, and
Proverbs
12. Common Sense - Questions for
RETURNABLE IN 7 DAYS
Consideration
FOR FULL REFUND, IF
13. Falling 1800 Feet Down a Mountain
NOT SATISFACTORY14. The Cult of the Expert
15. Preventing Mistakes from Failure
WHY NOT TAKE A LOOK?
to Understand
..... HOW CAN YOU LOSE?
16. The Stage of Maturity and Judgment
in any Field of Knowledge
_______________ - _ - - - - - - - - - (may be copied on any piece of paper)
Editor: Edmund C. Berkeley,
author, businessman, actuary,
scientist, computer professional,
first secretary of the Association
for Computing Machinery 1947-53,
editor of Computers and Automation.

To:

COMPUTERS AND AUTOMATION
815 Washington St., R5, NewtonVille, Mass.

17. Doomsday in St. Pierre, Martinique
- Common Sense vs. Catastrophe
18. The History of the Doasyoulikes
19. Individuality in Human Beings, ...
20. How to be Silly
21. The Three Earthworms
22. The Cochrans vs. Catastrophe
23. Preventing Mistakes from Forgetting
24. What is Common Sense? - An Operational Definition
25. The Subject of "What is Generally
True and Important": Common
Sense, Elementary and Advanced
26. Natural History, Patterns, and
Common Sense
- - - - - - - - - - - - - - - - - - -

02160

YES, please enter my subscription to the C&A Notebook on Common Sense at $12 a year,
24 issues (newsletter style), and extras.
Please send me (as FREE premiums for subscribing) the first six issues:
1. Right Answers - A Short Guide to Obtaining Them
4. Strategy in Chess
2. The Empty Column
5. The Barrels and the Elephant
3. The Golden Trumpets of Yap Yap
6. The Argument of the Beard
I enclose $
( ) Please bill me
) Please bill my organization
Name _______________________________ Title_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Organization _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Addrcss ___________________________________________________________
Signature _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ____ Purchase Order No. _ _ _ _ _ _ _ _ _ __

+

QUESTIONS

AND

ANSWERS

about "The C&A Notebook on COMMON SENSE, ELEMENTARY AND ADVANCED"
INTERESTING:

Q: Is the Notebook interesting?

A: We think so - bu t you can judge for yourself.
You can see the issues, and if not satisfactory,
tell us to discontinue your subscription.

Q: Is the Notebook exciting?

EXCITING:

A: Some of the issues. like "Falling 1800 Feet
Down a Mountain" and "Doomsday in St. Pierre.
Martinique". are among the most exciting true
stories we know.

Q: Is the Notebook useful?

USEFUL:

A: It ought to be useful to anybody - as useful
as common sense. There exists no textbook on
common sense; the Notebook tries to be a good
beginning to common sense. science. and wisdom.
UNDERSTANDABLE:

Q: Can I unders tand the Notebook?

A: Yes. It is nontechnical - written in everyday language and using vivid examples.
Q: Do you cover in the Notebook all
parts of common sense, wisdom. and science
in general?

NUMBER OF ISSUES,PER YEAR:

Q: How many issues a

year do you put out?
A: We promise 24 (newsletter style); we anticipate putting out 30 in each yearly volume.

Q: I do not want to miss past issues.
How do I get them?

PAST ISSUES:

A: Every subscriber's subscription starts at
Vol. 1. no. 1. Every subscriber eventually
receives all issues. Here is how it works.
The past issues are sent him four at a time,
every week or two, until he has caught up and thus he does not miss important and interesting issues that never go out of date.
BOOK:

Q: Are you going to publish all the issues
of Volume 1 together as a book?

A: No; they do not fit together into a book.
Q: If I subscribe at the same time to
"Computers and Automation", can I receive
a premiu~ for subscribing to the Notebook?

PREMIUMS:

COVERAGE:

A: Yes, we plan to. The main subjects so far
are: systematic prevention of mistakes; avoiding certain fallacies; important principles;
important concepts; illustrative anecdotes; etc o
Q: Will the Notebook save me from
making important mistakes?

MISTAKES:

A: It ought to. One of the main purposes of the
Notebook is preventing mistakes.
COST:

Q:

Will the Notebook be worth the cost to me?

A: At about 40 Cents per issue (30 issues for
$12). it is hard for you to lose out. EVEN ONE
important mistake prevented, may save you much
time. much trouble. and much money.
Q: If I do not like the Notebook, can
I cancel at any time?

GUARANTEE:

A: Yes. You will receive a refund for the
unmailed portion of your subscription.

*' * *' *

A reprint from

coml?,,!iI.~!'~

FOUR-STAR REPRINT--------.
SCIENCE AND THE ADVANCED SOCIETY. by C. P. Sno""
Ministry of Technology, London, England (April.
1966 issue of Computers and Automation).
THE INFORMATION REVOLUTION AND THE BILL OF RIGHTS,
by Dr. Jerome Bo Wiesner. M.I.T. (May, 1971)
EMPLOYMENT, EDUCATION. AND THE INDUSTRIAL SYSTEM,
by Prof. John Kenneth Galbraith, Harvard Univ.
(Aug. 1965)
CO;I1PUTERS AND THE CONSUMER. by Ralph Nader
Washington. D.C. (Oct. 1970)

A: Yes, the Four Star Reprint description below.

see the

Q; Can I receive the 6 free issues (No. 1
to 6 of the Notebook) without subscribing?
A: No. Here is what happens. You subscribeo
We send you 8 issues and bill you. You can
send them all back in seven days, and the
bill is canceled. If you do pay the bill, you
receive the 6 free issues, 24 more issues of
Vol. I, and six issues of Vol. 2, no. 1 to 6.
- -(may be copied on any piece of paper)- - - - - - - - TO: Computers and Automation
815 Washington St., Newtonville, Mass. 02160
)YES. you have convinced me to try the Notebook
on Com~on Sense, Elementary and Advanced.
Please enter my subscription at $12 a year,
24 issues. newsletter style, and extras.
Please send me Issues 1 to 6 as FREE PREMIUMS
for subscribing.
Please enter my subscription to "Computers
and Automation" at the same time ( ) with
directory $18.50; ( ) without directory
$9.50, and send my FREE premium, the Four
Star Reprint.
I enclose $,_ _ __
Please bi 11 me.
Please bill my organization.
RETURNABLE IN SEVEN DAYS FOR FULL REFUND
IF NOT SATISFACTORY

Name,____________________________
Title,________________________________
OrgBnization,__________________________________
Address _________________________________
Signa ture_________________P. O. No •______

Vol. 21, No.1
January, 1972

The magazine of the design, applications, and implications
of information processing systems.

The Computer Industry - Retrospect
7
Edito1'

Edmund C. Berkeley

Assistant Editors

Linda Ladd Lovett
Neil D. Macdonald

Software Editor

Stewart B. Nelson

Adl1ertisill.f!,
Directol'

Edmund C. Berkeley

Art Directors

Ray W. Hass

Contributin.f!,
Editor.!"

Advisory
Committee

Editorial Offices

John Benne"
Moses M. Berlin
Andrew D. Booth
John W. Carr III
Ned Chapin
Alston S. Householder
Leslie Me:rei
Ted Schoeters
Richard E. Sprague

The Computer Industry - Current
8

Essential Computer Concepts for Top Management - IV [T A]
WORKABLE, SOUND, DATA PROCESSING DECISIONS
by Robert A. Gagnon, Woods Gordon and Co., West
Montreal, Quebec, Canada
How responsibility should be assigned for data processing decisions; and the role of the consultant.

9

THE COMPUTER AND THE COMMUNITY COLLEGE
[T A]
by Raymond A. Pietak, Community College of Philadelphia,
Philadelphia, Pa.
The usefulness of a total systems approach in planning
for a computer installation in a community college;
and a method in eight steps for systematically evaluating institutional needs.

43

[T A]
THE SATISFACTION OF COMPANIES WITH
SERVICES RECEIVED FROM EDP SERVICE BUREAUS
by Michael J. Cerullo, State University of New York,
Albany, N.Y.
A survey of South Central and New England users of
service bureaus employs several measures to examine
client habits, plans, and attitudes ... and finds a high
degree of dissatisfaction with the services received.

24

[T A]
THE CHECKERB'OARDING PROBLEM
Tactical Air Command, Langley AFB, Va.
How two young Air Force sergeants developed a
practical, money saving computer program that
eliminates "checkerboard" storage space, and
stores data according to how frequently it is changed.

Jlmes J. Cryan
Alston S. Householder
Bernard Quint

Berkeley Enterprises, Inc.
S15 Washington St.,
Newtonville, Mass. 02160
617-332-5453

,,{drler/isill;!,
Contact

THE PUBLISHER
Berkeley Enterprise', Inc.
S15 Washington St.,
Newtonville, Mass. 02160
617-332-5453

Computers and Automation is published monthly
(except two issues in June) at 815 Washington
St., Newtonville, Mass. 02160, by Berkeley Enerprises, Inc. Printed in U.S.A.
Subscription rates: United States, 11 monthly
issues and two issues in June (one of which
is a directory issue) - $18.50 for 1 year, $36.00'
for 2 years; 12 monthly issues (without directory
issue in June) - $9.50 for 1 year; $18.00 for
2 years. Canada, add 50¢ a year for postage;
foreign, add $3.50 a year for postage. Address
all U.S. subscription mail to: Berkeley Enterprises,
Inc., 815 Washington St., Newtonville, Mass.
02160. Second Class Postage paid at Boston, Mass.
Postmaster: Please send all forms 3579 to
Berkeley Enterprises Inc., 815 Washington St.,
Newtonville, Mass. 02160. <0 Copyright 1971. by
Berkeley Enterprises, Inc.
Change of address: If your address changes,
please ~end us both your new address and your old
address (as it appears on the magazine address
imprint), and allow three weeks for the change to
be made.

4

[NT A]
EIGHT HUNDRED PEOPLE INTERESTED IN
MECHANICAL BRAINS
by Edmund C. Berkeley, Editor, Computers and Automation
What the Association for Computing Machinery looked
like in 1950, as perceived by its then Secretary.

6

1,5

[NT E]
HURRAY FOR THE UNIVAC DIVISION OF
SPERRY RAND
by Edmund C. Berkeley, Editor, Computers and Automation
The Univac Division of Sperry Rand rescues RCA
customers and sees in its acquisition of RCA computer
installations "a unique opportunity to grow".
[NT F]
COMPUTER-AI DED READING INSTRUCTION
by H. J. Peters, Bell Laboratories, Holmdel, N.J.
An experimental project uses a telephone-computer
connection to help beginning readers.
COMPUTERS and AUTOMATION for January, 1972

Amateur Construction of Computers
25

BUILDING YOUR OWN COMPUTER - Part 2
by Stephen Barrat Gray, Amateur Computer
Society, Darien, Conn.

[T A]

Computers and Society
13

[NT A]
COMPUTERS AND DOSSIERS - Part 1
by Vern Countryman, Harvard Law School,
Cambridge, Mass.
An analysis of the dangers to citizens flowing from the
computerization of dossiers, and a plea for an extension
of the concept of privacy, which Justice Brandeis called
"the right most valued by civilized men".

Front Cover Picture

Computers, Common Sense, Wisdom, and Science in General
11

COMMON SENSE, WISDOM, GENERAL SCIENCE,
[NT A]
AND COMPUTERS-II
by Edmund C. Berkeley, Editor, Computers and Automation
Why is there no textbook on "what is generally true and
important" - a much-neglected branch of significant
knowledge? In the meantime, here is a report and summary of 26 issues of the "C&A Notebook on Common
Sense" so far published.

36

The Most Important of All Branches of Knowledge

[NT F]

2

The C&A Notebook on Common Sense, Elementary
and Advanced

[NT F]

3

Questions and Answers About "The C&A Notebook"

[NT F]

Janet Crotchfelt, a primary grade
student, uses a telephone to enlist a
computer's help in pronouncing a
word she spells. She is participating
in "Operation Bookstrap", a Bell
Labs experimental project at the
Mechanic Street School in Red Bank,
New Jersey. This kind of technique
may help teachers give individual
supplementary instruction, even in
overcrowded classrooms. For more
information, see page 49.

Computers, Science and Assassination
57

37

[NT F]
SPOTLIGHT ON McGEORGE BUNDY AND THE
WHITE HOUSE SITUATION ROOM
by Robert B. Cutler, Manchester, Mass.
An argument that the "lone assassin - no conspiracy"
announcement from the White House Situation Room
could have resulted from information available in
Dallas and Washington prior to the announcement and thus does not actually demonstrate that someone
there had a guilty foreknowledge of the shooting.
[NT F]
"THE PROMOTION OF DOMESTIC DISCORD"
by Vincent J. Salandria, Attorney, Philadelphia, Pa.
An argument in which the author examines the evidence
for CI A polarization of American society, and argues
that our search for the truth about the assassinations
of U.S. political figures is the pressing course which
illuminates plans for social action.

Departments
48

Across the Editor's Desk Computing and Data
Processing Newsletter

59
51

Advertising Index

47
54

Correction
Monthly Computer
Census
New Contracts

Calendar of Coming
Events

52
53

New Installations

Computers and Puzzles
45

Numbles, by Neil Macdonald

[T C]

59

Problem Corner, by Walter Penney, COP

[T C]

Reference Information
25

ANNUAL INDEX OF "COMPUTERS AND
[T R]
AUTOMATION"
An index by author, title, and subjects, of all informative information published in the thirteen 1971 issues
of "Computers and Automation .. (Vol. 20) and also
"The Computer Directory and Buyers' Guide" issue
bearing the date Nov. 30,1970 (Vol. 19, no. 6B)
which came off the press in January, 1971.

COMPUTERS and AUTOMATION for January, 1972

Key
[A] - Article
[C] - Monthly Column
[E] - Editorial
[F] - Forum
[NT] - Not Technical
[R] - Reference Information
[T] - Technical Computer
Information

5

C- a
EDITORIAL

Hurray for the Univac Division of Sperry Rand

An encouraging piece of news as 1971 finishes is that
the Univac Division of Sperry Rand will take over all the
installations of RCA computers in the United States, Canada, and Mexico, paying RCA for them. The Univac Division will make sure that the users of RCA computers
will be taken care of, in regard to maintenance, support,
and delivery of equipment on order. Univac is apparently
devoted to "winning" RCA users as Univac customers
eventually.
Mr. David L. Rau, president of the RCA Computer
Users Association, says that he has been impressed with
the interest and concern shown by the Univac people of
highest level with whom he has talked, and their desire
to please RCA computer users.
This splendid action is in keeping with the historic decision of a prior generation of Remington Rand executives,
when they arranged, more than twenty years ago, to take
over in a very cooperative way the Eckert-Mauchly Computer Corporation. In this way they put the resources of
a great business organization behind the research, development, marketing, and maintenance of automatic digital
computers of the Univac type, "UNIVersal Automatic
Computer" - an Eckert- Mauchly invention and trademark.
In those years hardly any businessman could foresee
the enormous usefulness· or the fantastic possibilities of
automatic computers. But Presper Eckert and John
Mauchly did. The invention of automatic computers is
probably the most significant and most far-reaching
human invention of the twentieth century.
Sperry Rand is to pay RCA on January 2, 1972, $70
million. Additional amounts to be paid in the future are
estimated between $30 million and $60 million. These
figures illuminate another facet of the situation: that the
business decision by the RCA Board of Directors in September to "drop" the computer division precipitously was
an over-reactive and therefore auestionable decision.
There were alternative decisions available to the Board,
and some of the alternatives would have displayed more common sense. For example, the price RCA is now receiv6

ing from Sperry Rand - between $100 and 130 million would likely have been rather higher; and in the meantime
there would have been avoided the shattering of the confidence of users of over 1000 RCA computers.
Mr. Robert E. McDonald, executive vice president of
Sperry Rand and former president of the Univac Division,
looks on the acquisition of the RCA computer ins tall atio ns
"as a unique opportunity to grow".
Growth in the computer field is bound to occur and will
be enormous; and there are many kinds of opportunities
for astute, forward-looking, well-managed organizations.
The possibilities for automatic computers, after some 20
years of commercial development, still have only been
barely scratched.
For example, the standard central processing unit of
the future is likely to be smaller than a football. It will
be attached like a plug-in circuit to a peripheral, such as
an electric typewriter or a line printer.
If a man's brain made of chemicals and protoplasmic
cells can do as much as it does, . think what an automatic
computer made of other kinds of chemicals and other
kinds of cells can do in the future.

We wish the Univac Division of Remington Rand "good
growth" in many directions.

Edmund C. Berkeley
Editor
COMPUTERS and AUTOMATION for January, 1972

Eight Hundred People Interested in Mechanical Brains
Edmund C. Berkeley

"The nameof this new organization is the Association for Computing Machinery;
. . . The dues are $2 a calendar year. . .. The Council has established policy:
to encourage meetings and discussions; to put out mimeographed information
but no printed or more formal publications . .. "

(Reprinted from The American Statistician, June-July'1950,
Vol. IV, No.3, published by the American Statistical Association, Washington, D.C.)

In the last three years an organization eight hundred
strong has come into existence. It is devoted to informal
communication among the men and women who are seriously interested in the new machinery for handling information automatically. These machines are often called
automatic computers, or large-scale calculating machines,
but often nowadays they are called mechanical brains.
The name of this new organization is the Association for
Computing Machinery; and its purposes are to advance the
science, design, construction, and applications of the new
machinery for computing, reasoning, and performing other
operations of mathematics, logic, and kindred fields. Membership is open to anyone who is seriously interested in the
field; dues are $2 a calendar year.
Birth of the Association
How did this organization begin? In January 1947, the
Harvard Computation Laboratory held its first symposium
on "Large Scale Calculating Machinery ," a three-day conference where more than 300 people were present. On the
third day, Professor Samuel H. Caldwell of Massachusetts
Institute of Technology, in the course of a talk, suggested
an association of those who were interested in the new
field of automatic computing machinery. The discussion
of Professor Caldwell's talk at the conference endorsed his
proposal, and in an informal way referred action on it to
the National Research Council committee on large-scale
calculating machinery .
On April 28, the committee held its next subsequent
meeting in New York. The proposal was put before the
committee that it should take the initiative in forming an
association to bring together those who were interested
in automatic computing machinery. The committee was
not convinced that there was as yet sufficient interest, or
that it was desirable to form still another society. They decided that they would take no action until their next committee meeting, a year later.
Such a deciSion did not satisfy some of the younger men
in the field, who felt very much the need for getting together informally with men in other organizations and exgether informally with men in other organizations and exchanging ideas and information. A "Temporary Committee
promptly formed in May. It consisted of two or three men
from each of four centers of computer interest, Boston,
New York, Philadelphia, and Washington. The group in-

cluded E. G. Andrews, E. C. Berkeley, R. V. D. Campbell,
John W. Mauchly, James L. McPherson, John B. Russell,
T. Kite Sharpless, Richard Taylor, and C. B. Tompkins.
The temporary committee sent out an inquiry early in
the summer, received over a hundred expressions of interest, and called a meeting in September at Columbia University. Over seventy-five persons attended that meeting. The
first part of the meeting was devoted to a discussion of the
pilot model of the Edvac, and the second part of the meeting organized the "Eastern Association for Computing Machinery ," with a Council with some temporary officers,
and a mandate to the Council to proceed.
Growth of the Association
In the next few months the Council met several times
and discussed its mission. It gradually established policy;
to keep the organization informal, to encourage meetings
and discussions, to put out mimeographed information but
no printed or more formal publications, and to maintain a
mailing list of persons interested in the field (at first both
members and nonmembers, later only members).
The Council discussed the possibility of becoming a section of some other society that was interested in the field,
such as electrical engineering, or radio, or physics or mathematics; but always came back to the conclusion that that
would be inefficient: it did not want to saddle computing
machinery men with the heavy dues of a regular professional society or send them a large proportion of informatjQn Jhat they would not be interested in.
From a modest beginning of about a hundred members
in the fall of 1947, the Association grew rapidly.
Soon
there was such wide representation of membership that
the Council dropped the term "Eastern," and the association became the "Associ:.ttion for Computing Machinery."
Four of the seven members of the National Research Coun·
cil committee have become members of the AssoCiation.
The Association has in all over eight hundred members
who are located allover the United States, and in many
other parts of the world including Australia, Belgium, Canada, England, France, the Netherlands, and Sweden. At
the present time, discussions are going on for organizing sections in California and Sweden, in addition to the four existing sections in Boston, New York, Philadelphia, and
Washington.
Fields of Interest
Many fields of interest are represented among the members of the association. For example, in the sciences, there

(Please turn to page 46)
COMPUTERS and AUTOMATION for January, 1972

7

Essential Computer Concepts for Top Management:

IV

WORKABLE, SOUND, DATA PROCESSING DECISIONS
Robert A. Gagnon, Senior Consultant
Woods Gordon and Co., Management Consultants
630 Dorchester Blvd.
West Montreal 101, Quebec, Canada

"There are two types of data processing decisions: business decisions concerning the use
and performance of data processing resources and ... decisions concerning data processing
matters specifically. There is a need to make a distinction between the two . . . in
discussing the 'who's and how's' of decision-making. "

In reading the comment, appearing in the October,
1971 issue of "Computers and Automation", I was particularly "grabbed" by the sentence fragment "workable, economically sound data processing decisions".
I believe that the question of D.P. decisions
concerns the role of top management and D.P. staff
in the decision-making process, and that this process is related to, among other things, the allocation of D.P. resources, the determination of systems
specifications, the review of development, progress
and operational performance.

decisions which I am discussing here will most probably be based upon considera tions such as the following:
The degree of economic importance of the
issue to the enterprise and the time span
of effect or involvement.
The type and the size of contribution of
the issue to the achievements of the enterprise's objectives.
Is it a question of resource, system or
performance requirements or is it a question of means?

Decisions

D.P. Knowledge of Top Management

It seems to me that in order to understand the
individual and complementary roles of top management
and D.P. staff, it should be recognized that there
are, in fact, two types of decisions to be made.
Firstly, there are business ~ecisions concerning the
use and performance of D.P. resources and, secondly,
there are decisions concerning data processing matters specifically. I believe that there is a need
to make a distinction between the two types of decisions in discussing the "whos and the hows" of decision-making.

It seems clear to me that in order to understand
the meaning and the value of D.P. resources and concepts the senior executive must have a level of
knowledge sufficient to carryon a useful dialogue
with either the D.P. staff or with other line staff
who are involved or affected by the D.P. issue under
consideration. Over a period of time the senior
executive develops his own feel for each situation
and adds his own weighting to the advice, technical
arguments, or opinions that come into play in such
situations.

All, I believe, will agree thatbusinessdecisions
are the responsibility of top management. In arriving at the decision top management will, when required, ask for advice, detailed analyses, and opinions concerning the issue to be resolved by the decision. D.P. staff will be asked to contribute in
that context to business decisions concerning D.P.
issues. There is no doubt that top management will
welcome any useful contribution prior to and during
the decision-making process. But surely top management does not expect data processing staff to make
the decision.

The question of the level of knowledge would
seem to me to depend very much on the individual
manager's style and method. It is only the language
that changes when one is considering either a warehousing problem, a marketing problem, or a D.P.
problem. The manager generally deals with a variety
of problems; thus he must be conversant with a variety of particular languages or jargons. The level
of knowledge a manager uses is surely a matter of
individual choice. It is also probably very dependent on the level of confidence that the manager has
in his D.P. staff, which is of course a matter of
one man understanding another and the cumulative result of past understandings arrived at over a period
of time. It would seem to me that the D.P. subject
matter that should be taught to managers is a concern for the designers of business school curricula
more than to managers. The manager will take the
course that will provide him with the level of knowledge he wants to acquire.

Top management will delegate, within practical
limits, the responsibility of decision-making concerning D.P. operations specifically to a lower level
manager. The distinction between the two types of
Note: Previous discussion of this topic in "Computers and Automation" may be found in:
I.
"What Top Management Should Know About Computers", editorial by Edmund C. Berkeley, October, 1970
II.
"Essential Computer Concepts for Top Management" by Frank J. Gabriel and the Editor,
May, 1971
III. "Essential Computer Concepts for Top Management - Comment", by Eugene S. Stark, and the
Editor, October. 1971
8

The Consultant's Role

The consultant can have only one role. His specific expertise, experience, and judgment are employed by the senior executive to obtain a better
perspective upon the issue under consideration. The
consultant provides a higher level of knowledge to
the executive. This knowledge can be used in many
ways such as:
(Please turn to page 10)
COMPUTERS and AUTOMATION for January, 1972

THE COMPUTER AND THE COMMUNITY COLLEGE
Raymond A. Pietak, Provost
Community College of Philadelphia
34 South 11 St.
Philadelphia, Pa. 19107

"The governing board. faculty. students and other administrators will begin to question
the appropriateness of a computer installation if it does not do everything and anything
that they think it should do.
The only answer to this questioning is to insure that a
comprehensive plan is developed and implemented."

Administrators with overall responsibility in
community colleges will inevitably face the problem
of what role the computer will play in their institution. Specifically, they may have to ask themselves Some questions: Are we in a position to buy
or lease a computer for our institution? Do we actually have a need? The answers provided by marketing people will undoubtedly be in the affirmative.
The differences among various configurations of one
company's models are sufficiently complex to make
the head of any administrator swim. If the final
decision is based on faulty planning and examination,
the administrator may find that troubled waters run
deep. The governing board, faculty, students and
other administrators will begin to question the appropriateness of a computer installation if it does
not do everything and anything that they think it
should do. The only answer to this questioning is
to insure that a comprehensive plan is developed and
implemented.
Background

I have had some experience in helping to solve
problems in three different community colleges. The
colleges ranged from a medium-sized institution to a
large mul ti-campus district. In each case, the problem was different and the final solution was successful. In retrospect, certain common elements began
to surface as I thought about the process of formulating appropriate solutions. Here I propose one
methodology for examing and evaluating the needs for
a computer in a comprehensive community college environment. l
The need for planning or providing for the orderly
growth and efficient utilization of resources in the
context of a community college is extremely important -- especially when we note the financial constraints present today. I submit that a systematic
and coherent method of planning for the development
of a computer installation must be carefully selected and properly executed. Whether we call it
"comprehensi ve planni ug" or "systema tica 11)' approaching a problem", is unimportantl The fact is that we
must insure that whatever the solution, it meets the
needs that were identified and is sufficiently flexible to be modified as new needs arise.
The plan that is developed must be capable of being put into effect and it must be capable of being
understood by the decision-makers who will permit
its implementation. It must be designed with the
requirements of the institution in mind, with the
possibility of conflict among its various components,
and with a definite consideration of the resources
COMPUTERS and AUTOMATION for January, 1972

that will be available in the years to come. It
must be capable of undergoing a periodic review and
the hardware must be to some extent modular. Once
all these factors have been considered, it is important that a commitment be received from the governing board and all other parties concerned.
Methodology

The first step is to identify the problems and
needs of the institution. This means that the overall goals must be formulated. These goals should be
established on a short-range, mid-range, and longrange basis. In conjunction with these general
goals, specific objectives or aims that are measurable and achievable must be established. It is very
possible that these objectives may be re-formulated
as conditions change. In order to accomplish this
first task, one must have information concerning
instructional needs, administrative needs, financial
parameters, and facilities available. Finally all
of these factors must be considered in terms of their
relationship to each other and to time.
The second task is to develop alternative courses
of action for the short-range, mid-range and longrange objectives. These alternative courses of action are based on objectives, requirements and resources available to the community college.
The third step requires an evaluation of the alternatives. At this point, we must decide which alternative is best for the institution based on preset priorities.
The fourth task is a decision-making step and in
effect asks the administration and staff to either
accept or reject certain alternatives.
The fifth step is to formulate strategies which
will translate the decisions into action. At this
point, concerned parties are asked to make a commitment based on priorities and resource allocations.
The sixth step is the development of an implementation procedure. The program will be implemented
through the insti tution' s organization and structure.
It is also at this point that we develop a set of
performance standards with which to measure the program achievements.
The seventh step may be identified as program
evaluation and review. As the plan is developed
during the above steps, it is necessary to devise
a series of checks in order to evaluate the level
of attainment of our various objectives. Throughout
9

this entire process it is necessary to formulate procedures which will provide feedback so that as new
inputs are generated the system can be changed at
an opportune time.
Finally, the eighth step is what can be called
the recycling of the planning process. This includes
a close re-examination of problems and available resources. It is possible that a whole new set of objectives may have to be developed in order to respond to institutional changes.
In summary this total methodology calls for: (a)
a set of obj ecti ves, (b) the' formulation of an information system and (c) the development of strategies to facili ta te the course of "computery" in an
institution.
General Comments

A consideration of problems and needs must include an examination of administrative and instructional needs. The impact of these two areas on the
computer may have disastrous effects unless sufficient thought has been given to these areas.
As one looks at alternative courses of action
one must consider service bureaus, local industry
and business, the leasing or outright purchase of
equipment, and the use of equipment on the premises
of other educational institutions. Regional planning has much to commend it; however, the actual
realization of this concept may be more a result of
a region's financial resources rather than an actual
willingness on the part of an individual college to
forsake the possibility of its own installation.
Needless to say, not every community college must
have its own computer; although, one may observe that
the ownership of a computer in many circles is regarded as a status symbol.
The evaluation of alternatives includes at least
some of the following factors but does not exclude
others which are a function of an individual situation: (1) Dollars available to include the cost of
hardware, software, and the personnel required to
operate the installation. (2) A configuration which
will meet the needs of the institution presently
and which may be modified as the needs of the institution change. (3) Funds available to provide
in-service education for the faculty who must be
brought to a point where they can significantly influence the course of utilization of a computer installa tion.
This last point brings us to some strategies that
may be used in developing faculty awareness of the
role of "computery" in education. Undoubtedly, a
given institution will have some members of the
faculty who are aware of computer uses in education,
others who may have some programming experience, and
still others who are relatively unaware of its great
potential in the field of education. One strategy
that may be used in attempting to identify the needs
of an institution is the development of seminars for
the faculty which bring to their attention uses of
the computer in education and which also give them
an opportunity to discuss what they would like to do
with the computer in their subjects. A careful
structuring of these seminars along with proper resource personnel will enable faculty to reach realistic aspirations for the computer. Essentially
these seminars will give the administration an idea
of what the needs are and what they might be in the
future. We must also keep in mind that these seminars may generate a great deal of interest which
will result in increased utilization in years to

10

come which may not be foreseen at this point. Visits
to other community college installations and attendance at certain selected conferences, both proprietary and institutional, may also be of great value
to both administrators and faculty.
The development of alternatives over a three year
period may be seen in terms of a simple bar graph.
For example, if x number of dollars are available,
the following configurations can be purchased. These
configurations will allow the institution to do the
following things in the instructional and administrative area with the following personnel requirements. This visual device enables a governing board
to see the total picture and to make decisions based
on meaningful input. When the input is based on
overall goals and specific objectives, the governing
board are in fact attempting to meet the needs as
have been set down by all concerned parties. Once
this initial alternative has been chosen, it is extremely important that the plan be examined and updated each year so that new input can be accommodated.
Conclusion

The prevailing note of caution in this entire
article is a call for total systems approach. To
move into a computer installation on a fragmentized
basis is to ask for the worst kind of chaos, at all
levels in an institution. A great deal of money has
been wasted by business, industry, and education
through faulty planning of total service needs. We
may not be able at the start to implement the ideal
total system, but we must be in a position to attack
module by module the needs of an institution.
Footnotes

1.

Juan A. Casasco, Planning Techniques for University Management, American Council on Education
with the Eric Clearinghouse on Higher Education,
(Washi ngton, D. C. , Ameri can Council on Educa tion,
1970) pp. 1-7 passim.
0

Gagnon - Continued from page 8

Identifying the true (hidden) issue as
opposed to the false (evident) issue,
Evaluating all dimensions of the issue.
Developing the best ways and means to
resolve issues.
Assisting in the design or implementation of systems.
At all times the consultant's role is complementary.
The executive always carries the burden of responsibility. No outsider (consultant) can carry that responsibility. The executive will enter into a dialogue at the level of his choice with those involved
(or that he chooses to involve) in a given si tuation.
His ability to function as an executive depends upon
the quali ty of that dialogue in terms of useful profitable solutions to issues and problems. "The quality
of that dialogue surely depends on the top manager's
level of knowledge. However, as I said before. each
manager wi II tend to have hi s own level of knowledge.
It will tend to conform to his method and style of
doing business.

COMPUTERS and AUTOMATION for January, 1972

Common Sense, Wisdom, General Science, and Computers - II
Edmund C. Berkeley
Editor, Computers and Automation

"This subject could have wide lIsejiilness in dealing with many problems - including
the great unsolved problems facing humanity in the world today . ..

In the April 1971 issue of "Computers and Automation" we published an article "Common Sense, Wisdom,
General Science, and Computers" in which we talked
about a branch of knowledge much neglected in recent
years: "what is generally true and important". This
subject includes: common sense; wisdom; judgment
and maturity; science in general; techniques for
solving problems and for avoiding mistakes; some parts
of operations research and systems analysis; avoidance of logical fallacies; and more besideso This
subject could have wide usefulness in dealing with
many problems, including the great unsolved problems
facing humanity in the world today where wisdom is
needed: control over nuclear weapons; pollution of
the environment; the population explosion; etc
o

We said that for more than a dozen years we had
been gathering material on this subject, ever since
a search in a large and good public library had revealed no textbook on common sense and wisdom. We
have collected data, information, references, principles, topics, definitions, etc. until the accumula ted folders of notes occupy six feet of fi Ie drawers.
Action

Accordingly, we launched in April another publication, newsletter style, 24 issues a year, called
"The C&A Notebook on Common Sense, Elementary and
Advanced." As of present writing 26 issues have
been finished and published. The subjects these
issues deal with are discussed in more detail below.
First, a word about the format.
Format

In presenting short reports on various topics in
the subject of common sense, wisdom, and science in
general to the subscribers to the Notebook, it makes
little sense to be dry or uninteresting or technical
or profound. With a fertile subject like this, it
is easy to be interesting and nontechnical, yetmeaty.
Perhaps thi s "most important of all branches of knowledge" will one day be studied scientifically. Then
will be time enough to be technical, mathematical,
statistical, etc. In the meantime, we need to look
at the forest and the landscape, as well as the
trees, the leaves, and the life that lives on them.
The format of each issue has been a short report
of 2 to 6 pages, often beginning wi th an introductory
note, often finishing with "some questions for further reflection". This amount of space has so far
COMPUTERS and AUTOMATION for January, 1972

provided room for a sufficient number of words to do
justice to a topic.
Subjects

The subjects covered so far may be roughly and
not very systematically classified under eight headings:
1. The Identification of the Subject (the
nature of common sense, wisdom, and
science in general, i.e., what is being
referred to)
2. Collections of Principles
3. General Concepts
4. General Procedures
5. The Systematic Prevention of Mistakes
6. Avoiding Fallacies in Reasoning
7. Parables (invented characters)
8. Anecdotes (true stories)
1. Identification of the Subject

Four issues discuss "what is generally true and
important" or "common sense, elementary and advanced" .
They are:
The Investigation of Common Sense, Elementary
and Advanced (No. 10) / ways to investigate
the subj ect
Common Sense -- Questions for Consideration
(No. 12) / questions for study regarding
the parameters of common sense
What is Common Sense? -- An Operational Definition (No. 24) / a proposed definition
for common sense not using synonyms but
using observable operations
The Subject of "What is Generally True and
Important" -- Common Sense, Elementary
and Advanced (No. 25) / the identification and nature of the subject, with illustrative examples.
2. Collections of Principles

Four issues present some collections of P!inciples
(or in the case of Issue No. 20, "anti-principles"):
Right Answers -- A Short Guide for Obtaining
Them (No. 1) / Example: "An answer may be
wrong, right, both, or neither." / Number:
82 maxims
Strategy in Chess (No.4) / Example: "Use all
your pieces." / Number: 45 maxims
11

Principles of General Science, and Proverbs
(No. ll) / Example: "Nine tenths of Wi sdom is being wise in time." / Number: 8
principles, 46 proverbs
How to be Si lly (No. 20) / Example: "Use
twenty words to say something when two will
do." / Number: 71 recipes for being si lly

The Cochrans vs. Catastrophe (No. 22) / the
history of Mr. and Mrs. Samuel Cochran, Jr.,
who ate some vichyssoise soup

Table 1
THE FIRST 26 ISSUES - TITLES

3. General Concepts

Volume 1, 1971

Three issues present and discuss some concepts
that belong in this subject:
1.
The Cult of the Expert (No. 14) / experts,
and their credibility
The Stage of Maturity or Judgment in any
Field of Knowledge or Experience (No. 16) /
,ifinishing" the learning of a territory of
knowledge
Individuality in Human Beings (No. 19) / the
detailed individual real differences between normal members 01 a class of physical things (such as human beings)

2.
3.
4.
5.
6.
7.
8.
9.
10.

4. General Procedures

Three issues discuss some general procedures:
The Elephant and the Grassy Hillside (No.7) /
the procedure for going from ordinary everyday concepts to the pointer readings of exact science
Ground Rules for Arguments (No.8) / some
procedures for arguing
Natural History, Patterns, and Common Sense
(No. 26) / some techniques for observing
5. The Systematic Prevention of Mistakes (PM)

Preventing Mistakes from Failure to Understand
(No. 15)
Preventing Mistakes from Forgetting (No. 23)

11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.

6. Fallacies in Reasoning

26.
The Barrels and the Elephant (No.5) / truth
vs. believability
The Argument of the Beard (No.6) / the accumulation of small differences may make a
large difference
False Premises, Valid Reasoning, and True
Conclusions (No.9) / the fallacy of asserting that premises must first be correct in order to derive correct conclusions
7. Parables

The Empty Column (No.2) / a parable about
a symbol fo~ zero
The Golden Trumpets of Yap Yap (No.3) / a
parable about the spreading of information
The History of the Doasyoulikes (No. 18) /
the consequences of absence of struggle
The Three Earthworms (No. 21) / a parable about
curiosity, and the making of observations
for oneself
8. Anecdotes

Falling 1800 Feet Down a Mountain (No. 13) /
the story of a skimobiler who fell a third
of a mile down Mt. Washington and was rescued the next day
Doomsday in St. Pierre, Martinique -- Common
Sense vs. Catastrophe (No. 17) / how
30,000 people died from a volcanic eruption, refusing to apply their common sense
12

Right Answers -- A Short Guide to Obtaining
Them
The Empty Column
The Golden Trumpets of Yap Yap
Strategy in Chess
The Barrels and the Elephant
The Argument of the Beard
The Elephant and the Grassy Hillside
Ground Rules for Arguments
False Premises, Valid Reasoning, and True
Conclusions
The Investigation of Common Sense, Elementary
and Advanced
Principles of General Science, and Proverbs
Common Sense -- Questions for Consideration
Falling 1800 Feet Down a Mountain
The Cult of the Expert
Preventing Mistakes from Failure to Understand
The Stage of Maturity and Judgment
Doomsday in St. Pierre, Martinique -- Common
Sense vs. Catastrophe
The History of the Doasyoulikes
Individuality in Human Beings
How to be Silly
The Three Earthworms
The Cochrans vs. Catastrophe
Preventing Mistakes from Forgetting
What is Common Sense? -- An Operational
Definition
The Subj ec t of "Wha tis Generally True and
Important" -- Common Sense, Elementary
and Advanced
Natural History, Patterns, and Common Sense

Evaluation

It is reasonable to consider that these 26 issues
are a fair beginning.
People have been learning from comoarinq experiences and observations ever since prehistor-ic men
began to talk together. The ideas derived from frequent experiences become the principles that go into
common sense, to be tested and filtered by the methods
of science.
Relations to Computers

Thi s "most important of all branches of knowledge"
can be aided in a number of ways by computers. First,
this subject can be assisted in much the same way as
over 2000 other branches of knowledge, by: classifying; sorting; summarizing; making calculations; etc.
Many of the principles of common sense, wisdom,
and science in general can be investigated by computer programs, which can make experiments using sets
of random numbers. The computer can swiftly tryout
and summarize many different experiments. For example, how true is it that "a stitch in time saves
nine"? An swer: try it ou t on a compu ter, under sui table assumptions and variations.
(Please turn to page 46)

COMPUTERS and AUTOMATION for January, 1972

COMPUTERS

AND

DOSSIERS - Part I

Vern Countryman
Harvard Law School
Cambridge, Mass, 02138

''If the trend continues, the day will come when the push of a button will produce a complete "data profile" on every citizen, from his departure from the
womb (or perhaps several months earlier) to . .. after he enters the tomb."

(Reprinted with permission from the "Texas Law
view," May, 1971)

R~­

The compiling of dossiers on individuals is not
new in this country. The Federalists, enforcing
the first Alien and Sedition Acts, doubtless compiled dossiers on known and suspected Jacobins.
But when they had served their purpose in the prosecution of the suspects, or at least when the
Alien and Sedition Acts were repealed, those dossiers were apparently discarded. I find no record
of their having been used for any other purpose.
However, as our numbers have increased, as our
society has grown more complex, and as we have come
to recognize more and more reasons -- political, social and economic -- why one man may have a "legitimate" interest in the affairs of another, the business of compiling personal dossiers has multiplied.
The company that contemplates extending credit ~o,
insuring, or employing John Doe has a "legitimate"
interest in knowing something about his ecomonic
condition and perhaps some of his other characteristics also. An entire industry has developed in response to this "need." And since it is more "efficient" that a new compilation should not be developed from scratch every time a new need arises, this
industry maintains permanent dossiers on each of its
subjects. And the final entry, on the death of one
subject, becomes only an entry along the way in the
dossiers on his heirs.
Beca.use law-enforcement agencies have a "legi timate" interest in a variety of information on suspected'malefactors, they also compile dossiers.
Here again, it is more "efficient" to retain the record permanently, even after the case is closed -and even though it be closed with the conviction of
someone else.
"Preventive" Investigation by Government

During World War II and in the ensuing and apparently endless period of the cold war, it has become fashionable to put trust in a variety of prophylactic measures designed to identify potential
COMPUTERS and AUTOMATION for January, 1972

criminals before they can commit their intended
crimes, and to frustrate them in their supposed intentions. Chief among these efforts are loyalty
programs, a bewildering variety of laws defining sedition and other political crimes, and the antics of
certain legislative committees. To meet the "legitimate need" of government to protect itself, the
same governmental agencies referred to above, and
some new ones, have compiled dossiers on the political beliefs, expressions and the associations of
all who appear, in the eyes of the compilers, to be
"subversive" -- in intent if not yet in deed. And
it is more "efficient" that these dossiers also
should be permanent.
Complete Dossiers by Computer - A Future Threat

But the demands of that most outstanding of American virtues -- efficiency -- do not end here. If
it is efficient for anyone compiler to maintain a
permanent dossier on each subject, so that he need
not start from scratch each time interest in the
subject is renewed, it is by the same token inefficient for one compiler to begin from scratch when
another compiler already has a file on the subject.
Hence, a considerable interchange of data occurs
among the compilers -- within the generous limits
allowed by law, and sometimes beyond those limits.
Even that interchange does not exhaust the demands of efficiency. Technology has provided the
computer, an instrument with endless capacity to
store data and to regurgitate them at lightning
speed. It is, of course, "inefficient" not to use
such an instrument to combine the dossiers on a
given individual that are accumulated by various
private and public compilers: to a considerable extent, that has been done.
Vern Countryman, a professor at Harvard Law
School since 1964, was clerk to Justice William
o. Douglas (1942~43); assistant and associate
professor, Yale Law School (1948-55); and dean,
University of ~ew Mexico Law School (1959-64.
He has published s~veral books.

13

If the trend continues, the day will come when
the push of a button will produce a complete "data
profile" on every citizen, from his departure from
the womb (or perhaps several months earlier) to some
time after he enters his tomb. I cannot say precisely how far off that day may be, because our information about what goes on right now is far from complete. For the same reason, I cannot be precise
about how detailed, or how accurate, the "data profile" wi 11 be.
But enough is known, I believe, to indicate that
I am right about the trend. And enough is known,
I also believe, to indicate that every citizen
should be demanding more information about and more
protection against this development than he is now
disposed to demand. He should be asking more questions and asking them more insistently and at the
highest levels.
Some of those in the private sector who compile
data on individuals, or who support such compilations, do so for profit. Others do so for the purpose of punishing those with whom they disagree, and
still others for more benevolent reasons. We know
most about the agencies that gather data for sale
because Congress has in recent years concerned itself with their operations; they have been the subject of no less than five separate Congressional
hearings, culminating in a new federal statute that
was enacted just a few months ago. These commercial
agencies fall into two categories: the credit bureau
and the so-called "investigatory" reporting agency.
Over 2500 Credit Bureaus Have You Covered

The Commercial Compilers. In a very rough way,
the credit bureau is to the individual seeking personal credit what Dun & Bradstreet's reporting service is to a business organization seeking commercial credit. As consumer credit in the United States
has burgeoned by more than 2,000 per cent in the past
quarter century, so has the business of the credit
bureau.
There are approximately 2,500 credit bureaus in
the country, of which some 2,100 are members of the
major trade association, Associated Credit Bureaus,
Inc. The files of the bureaus affiliated with ACB
include records on approximately 100 million persons,
and those bureaus interchange their information.
ACB is also operating under a 1933 antitrust consent
decree which requires it to interchange data with
the 400 credit bureaus not affiliated with it. In
1968 ACB engaged International Telephone & Telegraph
Corporation to provide a computer service to facilitate the interchange.
Credit Data Corporation

The largest credit bureau operation outside the
ACB is the Credit Data Corporation, which operates
in California, Illinois, Michigan and New York, has
files on 27 million persons, is adding files at the
rate of half a million a month, and is fully computerized. While there is doubtless some overlap between the 100 million ACB files and the 27 million
Credit Data Corporation files, the combined accumulation just about covers the 131 million of us who
are older than 18 -- particularly since most of the
93 million of us who are married will be combined
in some 46 million files with our spouses.
What They Know About You

What sort of information do the credit bureau
files contain, and where does it come from? The
14

content, and its reliability, are pretty well dictated by the three principal sources from which the
credit bureaus draw:
(1) Their own subscribers -- the merchants, banks
and finance companies who buy most of their reports -supply to the bureaus such information as they obtain on their own credit customers as to employment,
approximate income and credit performance. There
are at least three significant limitations on this
data: (a) The credit bureau files will not reveal
the subject's net worth, or whether he is solvent
or insolvent, but only whether or not his accounts
with the bureau's subscribers are delinquent. Those
who extend credit in reliance on a credit bureau report do so on the simplistic assumption that anyone
who is managing to keep up his present payments should
be able to assume one more debt. (b) The credit bureau files will not reveal the approximate amount of'
the subject's debts, since many creditors are not
subscribers. (c) When subscribers report that the
subject's account is delinquent they are rarely
moved to add, where that is the case, that there is
a bona fide dispute over the amount owed (perhaps because a computer has gone awry in the billing procedure, as they all too frequently do) or that there is
a dispute over the quality of the merchandise delivered.
(2) The more enterprising bureaus check officaal
records for notices of such things as arrests, lawsuits, judgments, bankruptcies, mortgages, tax liens,
marriages, divorces, births and deaths. Here again,
there are limitations: the possibility of mistaken
identity is substantial, and official records frequently do not disclose the ultimate disposition of
such things as arrests, lawsuits, judgments, tax
liens and mortgages.
(3) Most credit bureaus also maintain a newsclipping service -- with some, this substitutes for
checking official records. Obviously, this source
contains even more danger of error and omission than
does the check of records.
The Fragile Reliability of Credit Ratings

Both Congressmen and the news media, during the
Congressional hearings on the subject, focused on
the man who is denied credit because of erroneous
adverse information in credit bureau files. But,
since a case of mistaken identity means not only an
incorrect adverse entry in one file but also the
omission of a correct adverse entry in another file,
and since almost all credit files understate the
debts of their subjects, it is obvious that misleading credit bureau reports lead also to some granting
of credit which should not have occurred. It is no
coincidence that, as consumer credit expanded, so
did consumer bankruptcies -- from 8,500 in 1946 to
178,000 in 1970. If a creditor were to compare the
report he received from the bureau with the debts
scheduled by a subject in his bankruptcy proceeding,
he might conclude that the report was not worth the
35¢ to 75¢ paid for it. (That is what it costs the
subscriber to learn what reposes in the compiler's
file at the moment he makes inquiry. If he wants
the file brought up to date by calls to other subscribers. he must pay an additional fee.) During
hearings held in Washington, D. C. in March 1968.
a New York Congressman asked for a demonstration of
Credit Data Corporation's high-speed computerized
retrieval of his New York City credit file. Within
the time consumed by 6 pages of printed hearing record, the report came back -- on one bank loan as of
June 1967, and nothing else. The Congressman's response: "A very inefficient system, thank God!"

COMPUTERS and AUTOMATION for January, 1972

Upon entries of such fragile reliability is your
"credit rating" built. And when the credit bureau
engages also in debt collection -- as many of them
do, finding their ability to affect the credit rating
an effective collection tool -- the reliability of
the entries is even further threatened by a builtin conflict of interest.
But, as the credit bureaus themselves are fond of
stressing, they collect only facts -- if what their
subscribers report to them and what they read in the
newspapers can be regarded as facts. They do not
engage in affirmative investigations of their subjects, save as they may on occasion join with local
merchants to sponsor the Welcome Wagon lady, who reports back to the merchants on the apparent worldly
needs of the newcomers she visits and to the credit
bureau on their apparent worthiness -- and on where
the newcomer came from, so that his file can be obtained from a credit bureau at his former location.
The "Investigatory" Reporting Agency Is More Thorough

For these reasons, credit bureau files do not
satisfy some who contemplate commercial relationships with their customers -- particularly prospective employers and prospective insurers. Such clients turn to the "investigatory" reporting agency.
Congressional committees heard from representatives
of the country's largest agency of this sort -- Retail Credit Company of Atlanta, with 1,225 offices,
7,000 inspectors, and files on 48 million persons.
Retail Credit is not yet computerized.
Inspectors for Retail Credit not only check public records and clip newspapers; they also interview
friends, neighbors, former neighbors, acquaintances,
employers, former employers, business associates -anyone who may know something, or have an opinion
about, the subject. For life insurance companies,
Retail Credit inspectors inquire about, among other
things, the subject's drinking habits (including
the reasons for his drinking), any domestic difficulty, any adverse criticism of "character or morals,"
and whether his living conditions are crowded or
dirty.
For automobile insurers, they will inquire about,
among other things, the quality of neighborhood,
business reputation, morals and "antagonistic-antisocial conduct." Auto insurers are convinced that
there is a correlation between frequency of accident
and all of these factors except antagonistic-antisocial conduct, and that both immorality and antagonistic-antisocial conduct would impair the subject's effectiveness as a witness in the event of
litigation. The latter consideration, of course,
should dictate an inquiry also into harelips, unsightly scars and birthmarks, and the use of deodorants. For employers, Retail Credit will report
whether the subject has any "known connection with
a 'peace movement' or any other organization of a
subversive type," and whether he is reported by
others to be "neurotic or psychotic."
But Is It More Reliable?

When Congressional investigators began to worry
about the reliability of some of the opinions thus
solicited, spokesmen for Retail Credit had two assurances:
(1) Its inspectors are carefully trained persons
of "unusual inspection ability." This assurance
lost some of its force when inquiry revealed that
.th~se highly qualified, well-trained sleuths comman-

COMPUTERS and AUTOMATION for January, 1972

ded a starting salary of $475 to $500 per month,
that they prepared anywhere from two to sixteen reports per day (which Retail Credit sold for from $4
to $200 apiece), and that half of them had no more
than a high school education and another 30 per cent
were college dropouts.
(2) Any adverse information not coming from public records is confirmed from a second source or
reported as unconfirmed. What~ver comfort might
otherwise be drawn from this assurance is somewhat
qualified by evidence that at least one well-trained,
highly qualified inspector, who claimed to have been
told by two sources that the subject had served a
prison term, reported what he had been told as an
unqualified fact, although he could find no confirmation in court or prison records.
Who Can Obtain These Reports?

The legislators wanted to know who has access to
the files of these commercial compilers. Only "reputable" business organizations, they were told,
with a "legitimate" business interest. However,
spokesmen for the credit bureaus admitted that there
had been instances when an employee of a subscriber
to a credit bureau had obtained a report for purpoies unrelated to his employer's business, and Retail Credit's spokesman admitted that it sometimes
gave out reports as a "favor" -- for example, when
an executive of a subscriber asked for information
on a man being considered as a new minister for his
church.
Moreover, the compilers had been under interrogation by Congressional committees for more than a
year when CBS News tried an experiment. Using a
fictitious company name, it sent out twenty letters
to credit bureaus, requesting reports on named individuals. It received ten reports and offers of
two more if it would sign a subscriber's contract.
On a second round, the fictitious company sent out
twenty-eight letters. This time it did not state
that it was considering granting credit -- it simply
asked for a full report. And this time it asked
only about individuals who had been complaining to
Congressional committees about the credit bureaus.
It received only seven of the requested reports -plus one more when it signed a subscriber's contract.
Fourth Amendment No Bar to Government Investigation

The dossiers of the commercial compilers are
available also to the government. This includes
not only such governmental credit-granting agencies
as the Federal Housing Administration and the Veterans Administration, who buy such reports just as
do private subscribers, but also such law-enforcement agencies as the FBI and the Internal Revenue
Service. Members of ACB and the Retail Credit Company make their files available to the law enforcers "as a public service." The Credit Data Corporation took a different view, declining to turn
over its reports to the IRS. It was then met with
a statutory summons calling for "all credit information relative to" named taxpayers. When Credit
Data refused to obey the summons, it was served
with a judicial order of enforcement pursuant to
the statute, requiring it to comply on payment by
the IRS of 75¢ per report, the fee which Credit Data
~harged its regular subscribers.
On appeal, Credit
Data won a great victory. The decision was affirmed in all respects save that the case was remanded
to determine the "fair value" which IRS must pay for
the reports, the rate paid by subscribers not being

15

taken as conclusive because subscribers supply "valuable credit information" to Credit Data.
This result was not surprising. In a long line
of cases, the Supreme Court has sustained judicial
enforcement of an administrative agency's statutory
subpoenas against Fourth Amendment attack, if the
subpoena sought testimony about the affairs of, or
the records of, the person subpoenaed; if the subpoena was sufficiently specific to satisfy the
Fourth Amendment; if the administrative inquiry was
authorized by Congress, and if the evidence sought
was relevant to the inquiry -- the Court's application of the last two requirements when its enforcement order was sought being held to satisfy the
Fourth Amendment's requirement of probable cause.
More than forty-five years ago the Supreme Court
also summarily affirmed a decision that no Fourth
-Amendment question was even presented when the IRS,
investigating the tax liability of a bank depositor,
summoned the bank to produce its records. And after the Credit Data case was decided, the Supreme
Court unanimously extended that ruling to cover an
IRS summons to the taxpayer's employer and, by dictum, to any other third person with no established
legal privilege, such as an attorney, where the taxpayer has "no proprietary interest of any kind" in
the records SUbpoenaed. The Fourth Amendment, therefore, offers no discernible protection to the subject whose file in a credit bureau is subjected to
an administrative subpoena or summons of a governmental agency showing a "legitimate" interest in its
contents.
No Legal Recourse Against Commercial Compilers

No matter who else may see the file, however,
the commercial compilers are uniformly steadfast on
one point -- the subject himself must never see it.
Three reasons are given, one laughable and two believable. First, if the subject ever got his hands
on the file, even in the compiler's office, he might
destroy it. Second, to let the subject see the file
would be to reveal the compiler's sources and would
tend to "dry up" those sources. Third, if the "file"
consists of a computer printout, the subject wouldn't
be able to understand it. Doubtless the second
reason should be expanded to say that nondisclosure
of the files protects not only the compiler's sources but also the compiler himself, from trouble,
including litigation, with the SUbject.
As a result, many subjects have not known, when
they were denied credit, or a job, or insurance
coverage, that the denial might have been caused
by an adverse report from a commercial compiler.
The subject who did learn of that fact, and who believed that the adverse report was erroneous, seldom obtained legal relief. If he sued on a theory
of defamation or interference with economic expectations, he encountered a qualified privilege,
based on the subscriber's "legitimate" interest in
his affairs, which protected the compiler who was
not guilty of gross negligence or malice.
If he resorted, instead, to an action for invasion of his common-law right of privacy he confronted, first, the fact that the famous law review
article by Warren and Brandeis which launched that
right in American jurisprudence was concerned only
with the publicizing, albeit accurately, of private
matters (not matters of public record) in the news
media. If he persuaded the Court that the concept
of a right of privacy had now developed to the point
where it protects against offensive intrusion into
his private affairs regardless of publicity, he
might again have found that his protection against

16

intrusion was qualified by the i'legitimate" interest
of the user of the files.
The Fair Credit Reporting Act of 1970

As previously noted, Congressional investigators
were impressed by the plight of those whose dossiers
were compiled -- at least where the dossiers contained erroneous adverse information~ The compilers
detected that they were impressed and decided that
they could not fight the move f6r reform and had
better join it. The result was the Fair Credit Reporting Act of 1970.
This act, applicable both to credit bureaus and
to "investigatory" reporting agencies, attempts to
guard against inaccurate or stale information in
the reports and to restrict their use by providing
that:
The compilers must maintain "reasonable procedures" to eliminate from their reports bankruptcies after fourteen years and other adverse information after seven years.
The compilers must keep their public record
entries in employment reports up to date to the
extent that the public records are up to date, and
the investigatory agencies must confirm their adverse interview information at least three months
before reporting it.
Users of investigatory reports must notify
the subject that such a report is being made; users
of credit or investigatory reports must advise the
subject whenever credit, insurance or employment is
denied "wholly or partly because of" the report and
must identify the reporting agency; and compilers
reporting adverse public record information for employment purposes must advise the subject of that
fact.
Any compiler, on request of a subject, must
disclose to him the "nature and substance" of the
information on him in its files (but not the file
itself); credit bureau compilers must disclose also
the sources of their data; and all compilers must
reinvestigate any item which the subject disputes
and, if it does not correct the item, include in
future reports his statement of not more than 100
words describing the dispute -- unless the compiler
has "reasonable grounds to believe" the statement
is "frivolous or irrelevant."
The compilers must maintain "reasonable procedures" to confine the furnishing of their reports,
without written consent of the subject, to those
who have "a legitimate business need" for them.
Compilers must not, without written consent
of the subject, furnish to a governmental agency
more than name, address and place of employment of
a subject, except in connection with licensing,
governmental grants or other business transactions
where government has a "legitimate business need"
-- and except in response to court order.
No Limitations on Contents

The Act also authorizes damage actions when
there is negligence in failing to comply with the
Act, punitive damages for willful noncompliance
with the Act, and administrative enforcement by the
FTC. It immunizes compilers and their sources of
information from any other liability save for false
information "furnished with malice or willful intent to injure" the subject. And it imposes crimi-

COMPUTERS and AUTOMATION for January, 1972

nal penalties for officers or employees of compilers who "knowingly and willfully" make unauthorized
disclosures of information and for any person who
"knowingly and willfully" obtains such information
"under false pretenses."
The entire reach of the Act -- about which I will
have more to say later -- is to accuracy of and
access to the reports. No attempt is made to limit
their contents. The report to which the Act applies, whether issued by a credit bureau or an "investigatory" agency, is defined to mean any communication bearing, not only on credit but on "character, general reputation, personal characteristics,
or mode of Ii ving."
The Punitive Compilers

There has been, so far as I can discover, no official investigation of private compilers who assemble dossiers for the purpose of punishing those with
whom they disagree. From what I have been able to
learn and observe of these compilers over a quarter
of a century, they are sponsored and staffed by
right-wing extremists. This is not to say that
right-wing extremists are less restrained by scruples
than left-wing extremists. The much simpler explanation is that official investigations of extremist groups have, with rare exceptions, been aimed
at those on the Left end of the political spectrum
-- although they tend to hit anyone to the Left of
the right-wing extremists. There are two corollaries to this fact: first, private punitive compilers rely for information almost entirely upon official investigations, and there is not enough information available to compile dossiers on rightwing extremists. Second, in the absence of official investigations to whet public interest, there
would be no substantial market for dossiers on
right-wing extremists if they could be compiled.
Some of the punitive compilers attempt to operate for profit. One such is American Business Consultants, organized by three former FBI agents,
which operated effectively, if not at great profit,
during the heyday of Sen. Joseph McCarthy. It published the newsletter Counterattack, which provided
dossiers on those deemed not sufficiently antiCommunist, with special emphasis on the news media,
writers and publishers, and Red Channels, which focused on those thought similarly deficient in the
entertainment business. Other compilers, such as
the Americanism committees of some American Legion
posts, are motivated by their version of patriotism.
Still a third group, which includes the John Birch
Society and Aware, Inc., which also flourished in
the entertainment industry during McCarthy's reign,
profess patriotism.
The punitive compilers' principal aim is to cost
the subject his employment. Since their dossiers
are neither solicited, nor in many cases even wanted, by the subject's employer, they are not well
situated to invoke the "legitimate" needs of the
employer as a justification in either a defamation
or a privacy action. Offsetting their apparent legal vulnerability, however, is the fact that most,
if not all, of them are either completely judgment
proof or incapable of responding in damages for the
full injury they have caused.
Financial Irresponsibility: No Damages for Damage Done

Both of these facts were dramatically demonstrated by a distinguished and courageous graduate of

COMPUTERS and AUTOMATION for January, 1972

the University of Texas, John Henry Faulk, who lost
his position with CBS in 1956 when Aware, Inc. published his dossier -- largely based on erroneous
information in the files of the House Un-American
Activities Committee. In part, also, Mr. Faulk was
dismissed because of an advertising boycott that
was organized by the owner of a chain of grocery
supermarkets after the Aware bulletin was published.
Faulk sued Aware, one of its employees and the supermarket owner for libel, realizing that Aware and
its employee were not capable of responding in damages in any significant amount.
After a trial in which the court ruled that the
defense of qualified privilege was not available
and that defendants had failed to prove the defense
of truth, the jury returned a verdict for $3.5 million -- of which $1 million was actual damages
against Aware, its employee and the supermarket
owner; $1.25 million was punitive damages against
Aware, and $1.25 million was punitive damages against its employee. There was no award of punitive
damages against the supermarket owner because he
died shortly before the case went to the jury. The
judgment against him was settled with his disappointingly small estate for $175,000. After an appeal
by the surviving defendants, during which they were
castigated as "malicious" and "vicious" purveyors of
libel, the judgment was reduced to $450,000 against
Aware and $100,000 against its employee, no part of
which was collectible. No private remedy, even for
false reports, will avail the victims of punitive
compilers who are as irresponsible financially as
they are otherwise.
The Benevolent Compilers

Many who compile personal dossiers, or who support their compilation, have no interest in the individual subjects. They are interested in groups.
In this category of data collectors are government
officials and business executives, who seek to make
informed decisions and plans, and scholars (particularly social scientists), who would promote understanding and aid decision making and planning. But
though they are interested in groups, most of the
information about groups must come from, and relate
to, individuals.
At first blush it might seem that such information could be obtained and compiled without preserving a record of individual identity. Unfortunately, some key to the identity of the subjects
must be retained if group compilations are to be
kept up to date and if they are to be adapted for
uses not contemplated at the time of their original
accumulation. And as long as keys to the identity
of those in the group are retained, these compilations are a potential source of personal dossiers,
either because they fall into unauthorized hands
or because the policy of the compilers changes.
Many of those who use group compilations are so
single-mindedly devoted to their own purposes as
to be heedless of this danger. Thus, a committee
of the Social Science Research Council proposed in
1965 that the Bureau of the Budget establish a Federal Data Center to collect and computerize all machine readable data from all federal agencies, for
use by the government and by individual scholars.
The report was eloquent on the "efficiency" of
such an operation, but took account of the threat
to individual privacy only to the extent of suggesting that where a government agency had obtained
data under a pledge of confidentiality, "it is of-

17

ten possible to disguise the information in such a
way that specific data cannot be traced to any individual respondent." The bureau referred the recommendation for review to a research analyst employed by Resources for the Future, Inc., a private
foundation~
He endorsed the proposal in a report
much concerned with organizational and operational
problems which did not even mention problems of
privacy. The bureau next created a task force, consisting of one statistician and five academicians,
to consider the problem. The task force also endorsed the proposed National Data Center, but its
report took account of hearings on the subject
wherein Congressmen had shown themselves considerably alarmed by the danger to privacy. The task
force viewed this criticism rather lightly,- however, since it thought that Congress could define
an enforceable standard for access to the data in
the center, and that the technical possibility that
the federal computers might themselves be tapped
by other technological means could be met by unspecified "organizational and technical means
available to control and limit the risks."

their subjects and hoping that their successors in
control of the compilation will be similarly scrupulous.
Identifying the Subjects - a Real Danger

The reality of the danger is made vivid by the
steps taken by the United Planning Organization of
Washington, D.C., a private organization devoted to
combating poverty. In the course of its work, UPO
has found it useful to compile data from public records on such matters as juvenile arrests, school
dropouts, evictions and welfare payments. To guard
the identity of its subjects, UPO transferred all
its data to a trustee under an irrevocable trust,
with strictures which permit UPO to have continued
access to it only as long as it does not reveal the
identity of its subjects. Under the terms of the
trust, UPO apparently will indeed lose access to
the data if it changes its policy and identifies
its subjects, or, possibly, if one of its officers
or employees makes an unauthorized disclosure. But,
by that time, personal dossiers on all of its subjects may be in someone else's computer.

The Pursuit of Knowledge vs. Privacy
Publicly Compiled Dossiers and Their Sources

I shall have more to say about the National Data
Center concept later; here I want to add an illustration from my own experience of the scholar's insensitivity to problems of privacy when his thirst
for knowledge is aroused. Early in 1969, a private
foundation sent out to graduate students in colleges
and universities a questionnaire asking their opinions on a variety of subjects ranging, if I remember correctly, from drug use to forcible overthrow
of the government. Since the respondents were to
sign these questionnaires, one graduate student
phoned me to ask if there was any danger, despite
the foundation's assurance of confidentiality, that
his replies might come into the hands of a government agency. I advised him that, in my judgment,
the foundation would have no defense to an administrative or legislative subpoena. Apparently in order to spread this valuable legal advice to other
graduate students, the man to whom I talked reported
it to the Harvard Crimson which printed it.
I thereupon received a long letter of admonishment from a Harvard professor of government. First,
he explained that he had nothing to do with the particular questionnaire, but assured me, on the basis
of his thirty-five years of experience, that it was
"typical of those used by both academic and commercial pollsters." Second, he explained to me -along lines similar to those given above -- why the
identity of those polled must be preserved. Third,
he expressed doubt that any government agency would
seek to obtain the information. Fourth, though he
was not a lwayer, he ventured the opinion that the
courts would very likely create some sort of privilege to block a government subpoena. Fifth, he
pointed out that advice such as mine might well reduce the number of responses to the questionnaire.
Finally, he urged me to "reconsider" and to "issue
another statement on the issue." I declined his
invitation on the grounds that I thought my legal
advice better than his and that I thought the students were entitled to have that advice so that
they, rather than he, I, or the foundation, could
do their own speculating about the likelihood of a
government subpoena.
Not all group compilers are insensitive to the
privacy problem but, even when they are aware of
the danger, there is not much they can do to forestall it -- once they have amassed their compilations -- beyond attempting to guard the identity of
18

If our information on private compilers of dossiers is incomplete, our information on governmental compilers is fragmentary. Most of what we do
know comes from disclosures made by the news media
and from sporadic hearings conducted by a Senate
subcommittee between 1960 and 1967. Some additional information emerged from hearings in early 1971
before another Senate subcommittee.
In some instances the government can compel a
subject to provide information about himself. Obvious examples are the tax and census returns, of
which more later. However, most governmental compilers rely for moot of their information on the
technique used by the Retail Credit Company of Atlanta -- they interview neighbors, associates and
acquaintances of the subject. The investigators
are better paid, and one hopes better qualified and
better trained, than Retail Credit's inspectors,
but the superiority may not be enough to inspire
great confidence in the objectivity of their results. Most of us in academic life are familiar
with the FBI agent and the military investigator
who come to inquire about former students seeking
government employment or a military commission.
Most would agree, I believe, that there is no faster way to get the visitor out of the office than
to make clear that you have nothing derogatory to
say about the subject. And I can testify that the
visitor will depart almost as rapidly if, in a case
where you have something to say that might conceivably be considered derogatory, you tell the investigator you want your secretary to take down your
statement so that you can send a copy to the subject.
Wire Tapping

Governmental compilers have another source of
information disclaimed by Retail Credit, whose representatives emphatically and repeatedly denied
that it ever resorted to wire tapping or bugging.
Governmental compilers resort to both. Because of
what it reveals, both as to their attitudes about
individual privacy and as to the feasibility of
legislative efforts to protect privacy, it will be
instructive to survey briefly the history of their
use of these devices. (See also "Thirty Years of
Wire Tapping" by Athan G. Theoharis, The Nation,
June 14, 1971).
COMPUTERS and AUTOMATION for January, 1972

In 1928 the Supreme Court held that government
wire tapping did not violate the Fourth Amendment.
In the Communications Act of 1934 Congress made it
a crime for anyone, without authority of the sender, willfully to intercept any communication by
wire or radio and to divulge the contents of the
intercepted communication to any other person.
Thereafter, the Court held that, because a wire tap
was illegal, evidence so obtained, including the
"fruit of the poisonous tree," was inadmissible in
federal courts.
Despite the explicit finding that federal agents
commit a federal crime when they tap telephones,
the FBI continued the practice, which it had begun
in 1931, until March 1940, when Attorney General
Jackson ordered it stopped. In May 1940, however,
President Roosevelt issued a secret directive, whose
existence was not made public until after his death,
ordering wire tapping resumed for "persons suspected of subversive activities against the Government
of the United States, including suspected spies."
Thereafter, Attorney General Biddle in 1941 announced that the Department of Justice intended to use
wire tapping in "espionage, sabotage, and kidnapping cases when the circumstances warranted," and
President Truman in 1947 approved a proposal by Atty.
Gen. Tom Clark that wire tapping be used "in cases
vitally affecting the domestic security, or where
human life is in jeopardy." In 1964 President
Johnson issued a directive forbidding wire tapping
by federal agents, except in national security
cases. And in 1965 Attorney General Katzenbach
testified that, "Under present law, [wire tapping]
should be permitted only where national security is
involved" and acknowledged that the department had
sixty-two wire taps then in effect "under my specific direction." In 1967 Atty. Gen. Ramsey Clark issued a memorandum requiring prior written approval
from the Attorney General for any federal wire tap
or electronic bugging save in "national security"
cases which "shall continue to be taken up directly
with the Attorney General in the light of existing
stringent restrictions."
Violating the Communications Act

Since the Communications Act contains no exceptions, it is evident that the Department of Justice
has been violating that Act for most of the time
since its enactment. From time to time spokesmen
for the department have argued that the contents of
wire taps are not "divulged" -- and hence the Communications Act is not violated -- when they are
merely communicated from one federal agent to another, but this proposition has never been tested in
the courts. The Department of Justice has never
seen fit to prosecute an FBI agent or any other
federal agent for violation of the Communications
Act, even in cases where convictions have been reversed because the contents of wire taps were divulged in court.
The practice of electronic bugging was governed
by a series of decisions beginning in 1942 which
held that the Fourth Amendment was not violated by
the interception of communications by means of detectaphones or informers wired for sound, as long
as the interception was accomplished without a physical trespass on defendant's premises.
Hoover's Version of "Approval in Writing"

Regardless of the state of the law or of the current content of executive directives, FBI Director
Hoover has annually since 1965 assured the House
Appropriations Committee that every wire tap under-

taken by the FBI has been "approved in advance and
in writing by the Attorney General," and that all
taps were limited to "national security" or "internal
security" cases. But less than two months after
Hoover gave that testmony in 1969, an FBI agent
testified, during the trial of Cassius Clay under
the Selective Service Act, that the FBI had tapped
the wires of Martin Luther King, Jr. for four years
before his death in 1968. Hoover then produced his
version of an "approval in writing in advance by
the Attorney General" -- a memorandum written by
one of Hoover's own subordinates, reciting that in
1963 Atty. Gen. Robert Kennedy, now also deceased,
had inquired "if it was feasible to use electronic
devices" to check into allegations that Dr. King
"had Marxist leanings." The House Appropriations
Committee found no reason to question Hoover's
credibility when he appeared before it the following year and again testified that "all" wire taps
"were authorized in advance in writing by the Attorney General."
Court vs. Congress on Legal Limits

Meanwhile, both constitutional and statutory requirements applicable to wire tapping and electronic bugging had changed. In 1967 the Court in Berger v. New York invalidated a New York statute authorizing electronic bugging with prior court approval, in a case where physical trespass was involved, because the statute did not satisfy the
Fourth Amendment's requirements of specificity as
to the crime involved or the conversations to be
overheard. Later in the same year, in Katz v. United States, the Court concluded that the Fourth
Amendment applied to both wire tapping and electronic bugging, regardless of physical trespass, thus
requiring prior court approval for employment of
either device under a procedure which would satisfy
the specificity requirements of Berger.
In the Omnibus Crime Control and Safe Streets
Act of 1968 Congress amended the Communications Act
of 1934 so that hs prohibition of interception and
divulgence of communications is confined to radio
communications, and established a procedure for judicial approval of wire tapping and electronic bugging which arguably does not meet the requirements
of the Berger case.
That Act also contains the following remarkable
provision:
Nothing contained in this chapter or in section 605 of the Communications Act of 1934 ••.
shall limit the constitutional power of the
President to take such measures as he deems necessary to protect the nation against actual or
potential attack or other hostile acts of a foreign power, to obtain foreign intelligence information deemed essential to the security of
the United States, or to protect national security information against foreign intelligence activities. Nor shall anything contained in this
chapter be deemed to limit the constitutional
power of the President to take such measures as
he deems necessary to protect the United States
against the overthrow of the Government by force
or other unlawful means or against any clear and
present danger to the structure or existence of
the Government. The contents of any wire or oral communication intercepted by authority of the
President in the exercise of the foregoing powers may be received in evidence in any trial
hearing, or other proceeding only where such interception was reasonable, and shall not be otherwise used or disclosed except as necessary to
implement that power.
(Please turn to page 42)

COMPUTERS and AUTOMATION for January, 1972

19

BUILDING

YOUR

OWN

COM!PUTER

Part II

Stephen Barrat Gray
Amateur Computer Society
260 Noroton Ave.
Darien, Conn. 06820

"... I am against the idea of a commercially prepared computer kit. By placing a kit of this
type on the market, amateur computer builders would not have any· major problems, and few
new ideas would result. . .. If amateur radio gear were not produced commercially, we would
not have as many hams, but those hams together would make more contributions than all of
the hams make today."

Part One of this article, which appeared in
the December issue, discussed the difficulties
facing an amateur who wants to build his own computer. These include, among others, the limitations of existing books on computer schematics
and the availability and adaptation of parts. As
a result, 110 men joined together to form the
Amateur Computer Society in response to the authorvs suggestion that they share information. The
Society's survey of its members revealed the most
common features of their models and showed that
the average cost "so far" for a home-built computer was $650 and that most members had spent
two years on their project.

Members Report on Their Plans

In their letters, the members of the Amateur
Computer Society report on a wide variety of plans
for hardware and software. For example, several
design and etch their own printed-circuit cards,
while others make their cards from Vector boards.
One member, while a Harvard sophomore, wrote
this:
If core is used 9 one can kill two birds
with one stone by using the selection matrix
decoder as the instruction interpretation decoder; if the memory selection decoder were
for a 4K (12 x 12) memory plane, then one 12bit decoder could be used to hold the op code,
while the other could generate the timing signals.
Stephen Wiebking, a first lieutenant now attending the Air Force Institute of Technology in
Fairborn, Ohio, is one of the members who haven't
started building their computers, but are in the
planning or collecting stages. He writes:
I have done very little actual design
work on a machine so far, since I am still in
the parts collecting stage. So far, I have
managed to collect several thousand Ies, which
I am in the process of identifying and testing,
and about 1-1/2 X 10**6 bits of core frames.
Steve has arranged with several semiconductor
manufacturers to buy their reject-but-usable integrated circuits, if there is enough interest among

20

ACS members to enable him to buy in large quantities and thus at low prices.
"Memory" for Cerebral Meningitis Victim

An ACS member in California has an unusual
reason for wanting to build a computer. Some years
ago he had cerebral meningitis. Among other effects,
the accompanying fever damaged his memory considerably, both in the ability to remember things, arid
the memories that were already in it, back to when
he was eleven. At first he couldn't remember the
fact that he couldn't remember things. First he
kept a journal of his activities, and copies of
every letter and order he wrote. This worked for
ten years, but the problem of finding anything in
the mountain of paperwork made him look for another
solution. He hopes to put all the things to be remembered on magnetic tape, and let a computer keep
track of it. His trouble in building a computer is
that any suitable machine is so complex that while
he concentrates on what's going on in one area, the
activity elsewhere escapes him. So he has to depend, much more than most people, on circuit diagrams. But these are usually so large that he gets
lost in the pages and pages of circuitry. He notes:
However, it seems possible that the type
of limited-scope, single-purpose computer I
have in mind might be encompassed in only a
few drawings that I could eventually comprehend.
Completed Computers

Only two of those surveyed reported being anywhere near completion of their computers.
Jim Sutherland, now a Fellow engineer with
Westinghouse in Pittsburgh, noted that his ECHO-4
took a year to build, and would require ten years to
program. ECHO-4 is seven feet long, one and a half
feet deep, and six feet high. The central processor
is complete, but, as with all amateur computers,
the input/output system is still growing. ECHO-4
uses 2N404 transistors and RTL (resistor-transistor
logic) NOR logic elements. The NOR gates were originally used in process-control systems built by
Westi~ghouse a dozen years ago, and had been declared scrap. The gates were mounted on etched circuit boards, with 35-pin connectors. A total of
120 boards was used in the entire system, but only
16 types of boards were used, so "spare boards do
not take up much room."

COMPUTERS and AUTOMATION for January, 1972

The memory unit, an Ampex 4096-RQ-30A, came
from an obsolete process-control computer. Memory
cycle time is six microseconds, but ~ince the NOR
gates require from one to three microseconds to
switch, the add time is pushed down to 216 microseconds.
ECHO-4 has four flip-flop registers, and three
registers in core memory. There are 8,192 words of
15-bit core memory; clock speed is 160 KHz, and
there are 18 instructions.
Input is by six alphanumeric control keyboards,
8-channel paper tape reader, 15 interrupts, and 75
contact closures. Output includes two printers, 60
contact closures, 8-channel paper tape punch, and
four digital clocks. Interconnections are wirewrapped.
Another Completed Computer

In some systems the 100-mfd capacitor
(shunted by a 0.01 to 0.1 disk) just isn't
needed. The only way to find out is to experiment. Take a scope and look across your ground
buss between the power supply terminal (scope
ground) and a ground point in the system. You
will probably see a lot of high-frequency junk
here. Experiment by connecting capacitors at
the point under observation and notice any
change. Use the smallest capacitor that best
minimizes the noise. A O.l-mfd disk fixed my
problem in a recent design.
A Computer Kit?

The April 1967 ACS Newsletter proposed a Standard Amateur Computer Kit, with the acronym of SACK.
As expected, comments on SACK were a mixed bag. Don
Fronek, now an instructor at the University of
Idaho, commented, in part:

Hans Ellenburger, a Swiss member, worked a
year on his computer, and finished it in 1965. A
small desk-top machine, looking something like the
electronic desk calculators now available, the EL65 had a separate keyboard for input, and Nixietube readout.

1. Plug-in cards (can buy ready-made cards, or
cards without components).

A serial-type computer, EL-65 had three registers, 30 words in flip-flip memory, and 15 instructions. Certainly a minimal computer, but within
the ACS definition. According to the January 1968
ACS Newsletter:

3. Power supplies to fit within the frame.

The cost of materials alone was 1500
Swiss francs, which is about $345. Hans tried
to market his computer, calling it "der erste
Schweizer Pult-Elektronenrechner," meaning the
first Swiss desk-top electronic calculator.
But the sales price of 6,000 SF ($1,380) seems
to have put it beyond the means of most Swiss
and also it may have been too much of a novelty on the market. As Hans notes, "It seems
almost impossible for an amateur to build a
c~mputer that can compete with commercial machines. The amateur who can do that would be,
before long, employed by a computer company."
When last heard from, Hans was working on a
new model, with 16 registers, using Philips LTC
cores.

A standard computer should have:

2. Frame construction with card receptacles
(allows the builder to locate his circuits as he wants them).

4. Universal front panel (pre-punched holes
when using the kit-builder's approach).
5. Input/output (plugs should be available at
rear for additional or special outputs).
I find that two things are the most important: (1) printed-circuit boards and (2)
frame chassis mounting hardware. With little
exception, the rest of the machine can be expanded in bits and pieces.
I would also use solderless connectors,
in all the wiring between receptacles. I find
that I am continuously changing circuits. With
close pin spacing, a soldered connection gets
very messy even when you are trying to keep
things neat. The wires get burned, the solder
slops over onto the adjacent pin, and on and
on. This means added cost, but I'll have to
vote for solderless connectors.

Help From the Members

One of the helpful articles sent in by an ACS
member was "What to do with cores of unknown origin," by Sal Zuccaro, who has been designing memories for a dozen years or more, has patents in
core-diode logic, and is now a Research Scientist
with Teledyne Systems in California. Sal devised
a simple set-up using a bidirectional constantcurrent source, with a method that could take readings on a core in or out of a matrix.
There are many small areas of computer design
and construction that the amateur does not recognize as important, or is not skilled enough to
handle. A simple problem for the professional designer is RC decoupling filters. For the amateurs,
Louis Frenzel, who lives in Maryland and is Assistant Director of Education at the National Radio
Institute, wrote several hundred words on these
filters, when and where to use them, and what component values are required. His good advice incl udes:

COMPUTERS and AUTOMATION for January, 1972

Jim Haynes, a development engineer at a university computer center in California, noted:
Seems to be that the essential problem is
trying to decide what you want to do with what
you have. I guess memory is the pacing item.
Anybody who goes in for core, even small core,
is talking about money. Depending on the supply of delay lines, that is probably the way
to go for a cheap machine •.••
Without some storage, there's little
point in building up the instruction execution
logic. And I would really hate to see the
thing get mixed up in a formalized educational
setup, because then a lot of professional education marketers would get into the act, and
the price would go skyhigh.
An ACS member who was a high-school member when
he joined the ACS, and is now with a California
engineering consulting firm, wrote:

21

I must say that I am against the idea of
SACK. By placing a kit of this type on the
market, amateur computer builders would not
have any major problems, and very few new
ideas would result. Amateur radio is a good
case in point. Today most of the gear in use
is not home-brew, but manufactured to commercial standards. This is great for the hams
who don't know how to build, but what is the
purpose of amateur radio? The FCC thinks that
the U.S. hams should increase radio technology.
This is being done, but not to the extent that
it could be. If amateur radio gear was not
produced commercially, we would not have as many
hams, but those hams would make more contributions than all of the hams make today. I might
add that I am also a radio amateur (WB6UHM).
Several ACS members are working independently
on the idea of a computer kit. One is "seriously
dabbltng with the idea of a PDP-8/s kit, since the
logic for the machine is rather simple." Another
is trying to build a small prototype of his computer
kit, and hopes to keep the number of registers down
to a minimum. He says that with the right backing,
he would consider producing the kit commercially.
However, that kind of money is scarce.
Critique

Very few good letters of constructive criticism are received by most publications. Here is
part of the best one yet received, from a Long
Island reader of the ACS Newsletter:
Let me preface my remarks by stating that
I can't help getting the impression that many
members are having considerable trouble with
their machines mainly because they don't seem
to be aware of the huge work effort involved.
Commercial computer manufacturers expend tens
of thousands of manhours designing their products, and with all their engineering talent,
computer aided design, etc., they still have
problemsl I think that for anyone without advanced technical training, knowledge about (or
even access to) computers and programming, designing a computer may prove impossible altogether.
This leaves, in order of decreasing difficulty: improving on the design of an existing computer, copying an existing computer, or
depending on some type of computer kit. I
also think that, in general, members ought to
concentrate more on technique, organization
and planning, instead of diddling around a
flip-flop at a time and considering the soldering of an IC into a circui t a "real" accomplishment as far as the progress of their machine is
concerned. A computer is considerably more
than the sum of all its hardware. Getting a
particular shift register to function is not
the major stumbling block; integrating the system is the problem. Now for some more specific
comment.
In the past issues of the Newsletter, some
rather ingenious instruction sets have been
devised which either simplify hardware, decoding, or subsequent programming. It should be
borne in mind, however, that the use of an instruction set which is already implemented on
a commercial machine means a great reduction
in problems with software, which would then
be readily available. Remember that commercial

manufacturers also look for instruction sets
which tend to optimize both hardware and software, and many machines have instructions worth
copying. If you've never written an assembler
or Fortran compiler, don't just laugh it off
as an easy project; it may well take you longer
than to build the machine itself. Coming up
with a new, unique instruction set may be a
thrilling idea, but getting someone else's instruction set to function with your hardware is
no small feat either.
The report on the PDP-8 in issue #10 of
the Newsletter was most informative. As to
the feasibility of a PDP-8 kit, you laughed
off the possibility of having to do the backpanel wiring yourself as being an invitation to
insanity. It seems to me that this is what
amateur computer building is all about: the
wiring and the insanity.
Renewal Time for the Newsletter

Eight issues had been promised to the ACS members; there was enough money to print eleven. The
eleventh noted that the money had finally run out,
and asked for another $3 for a new subscription.
As any publisher knows, subscription renewal
time is the moment of truth for a periodical. No
matter how many subscribers, if not enough renew,
all is lost. Three months passed before enough
money was received to guarantee publication of at
least eight issues of Volume II of the ACS Newsletter.
As of this writing, over 70 members have renewed their subscriptions. As expected, most of
the overseas members dropped out. They had written
earlier about the scarcity of surplus or used computer components, and the high prices of transistors
and integrated circuits. Most of the Canadians
renewed.
AMATEUR DIGITAL SOCIETY?

Of the six magazines that printed the original
ACS letter, only one had space for the last paragraph:
If there is enough interest in a lowerlevel group, it may be possible to form an
"Amateur Computer Logic Society," for those
interested in constructing logic circuits and
simple computers.
The letter to the first five publications had
said:
To limit the membership to the really
serious, the ACS is open only to those who are
building or operating a homemade computer that
can at least perform automatic multiplication
and division.
Although the definition for the required computer was changed to that described in the opening
letter, because an ACS member pointed out that some
fairly complex computers cannot perform automatic
multiplication and division, the line was still
drawn at the "really serious." This was done to
maintain the ACS as a high-level organization, simply because I didn't have time to answer the interminable questions that would have been sent in,
were the level lowered to "anybody interested in
(Please turn to page 40)

22

COMPUTERS and AUTOMATION for January, 1972

THECOMP
REVOLUTI
Keep up or keep out!
Computer technology is expanding at an incredible
rate. And yesterday's information won't do in today's
world. Keeping up with what's current is what
separates the men from the boys.
The Library of Computer and Information Sciences
can help-has helped thousands of executives, EDP
managers, programmers and technicians to keep on
top of developments, and move ahead in their careers.
With the important books you need - at important
savings. Why not take advantage of this introductory
offer (it'll cost you nothing if you're not satisfied)
and see for yourself?

The Library of Computer and Information
invites you to take any 3 books

(values to $49.00)

all for only $3.95.

if you will agree to join now and accept only 3 more selections
or alternates during the next twelve months.
Extra FREE gift if you act now!
1972 International Reference
Day Book
Packed with useful information
-from world population to
foreign exchange-in a luxurious ·desk calendar you'll use
every day of the year! $13.00

(retail prices shown)
43440. THE ECONOMICS OF COMPUTERS. William F. Sharpe. The first book devoted to the
economic aspects of computers.
$10.00
32270. ADVANCED PROGRAMING. Harry Katzan,
Jr. Up-to-date, incisive and complete. Covers
assemblers, list processing, compilers, time-sharing. Requires some background in FORTRAN
or ALGOL, reasonable grounding in mathematics.
$13.95
34110. APL PROGRAMMING AND COMPUTER
TECHNIQUES. Harry Katzan, Jr. APL-A Programming Language-is a new, amazingly flexible
symbolic programming language. This is the first
introductory work on this revolutionary programming method.
$12.00
84210. 360 PROGRAMMING IN ASSEMBLY LANGUAGE. Ned Chapin. The language, techniques
and methods of programming the 360 family.
Covers arithmetic operations, input, output, job
control, debugging, data manipulation. Ideal for
self-tuition.
$12.50
41990. DESIGN AND USE OF COMPUTER SIMULATION MODELS. James R. Emshoff and Roger
L. Sisson. Explains various simulation techniques
from the ground up with the help of general discussions and fully-worked-out descriptive
examples.
$11.95
59730. MAN-COMPUTER PROBLEM SOLVING:
Experimental Evaluation of Time-Sharing and
Batch Processing. Harold Sackman. Hard facts
about one of the most vital areas in the computer
industry: the cost-effectiveness of Time-Sharing
versus Batch Processing. Filled with dollars-andcents information.
$12.50
60290. MANAGEMENT PLANNING FOR DATA
PROCESSING. Dick H. Brandon. Accents the
quantitative information necessary for anyone concerned with the operation of or planning for computers.
$12.50
40030. COMPUTER ARCHITECTURE. Caxton C.
Foster. Fascinating introduction to this broadly
based, demanding and stimulating aspect of computer science.
$12.50

39980. COMPUTER SOFTWARE: PROGRAMMING
SYSTEMS FOR DIGITAL COMPUTERS. Ivan Flores.
Practical and fact-filled; extremely useful for both
professional programmers and those with only
the briefest acquaintance with computers. $17.30

56540. INTRODUCTION TO MATRIX ANALYSIS,
SECOND EDITION. Richard Bellman. Matrix theory
is central both to computer operation and the
understanding of its associated mathematics. The
$14.75
most authoritative work on the subject.

70770. PROGRAMMER'S GUIDE TO THE IBM
SYSTEM/360. John H. Bradley. A remarkably
thorough, easy to understand and exceptionally
lucid introduction to the use of System/360 Assembly Language.
$13.50

44100. ELECTRONIC INFORMATION HANDLING.
Edited by Allen Kent and Orrin E. Taulbee. Noted
authorities from the fields of education, industry,
and government contribute their expertise to the
understanding of this vital and much neglected
aspect of computer science.
$11.00

65370. ON THE MANAGEMENT OF COMPUTER
PROGRAMMING. Edited by George F. Weinwurm.
The whole spectrum of computer programming
management is covered, including the development of cost and schedule estimates.
$12.50
60950. MATHEMATICAL METHODS FOR DIGITAL
COMPUTERS: Volume I. Edited by Anthony Ralston
and Herbert S. Wilf. The interrelationships between numerical analysis, computer capability,
and coding procedures. Not only is each mathematical technique described, but outlines-in detail -show preCisely how to program them. $11.95
39990. COMPUTER MODELING AND SIMULATION.
Francis F. Martin. Indispensable for computer
programmers, systems analysts, operations analysts, business analysts, mathematicians and
statisticians.
$12.95
56430. INTRODUCTION TO STATISTICAL DATA
PROCESSING. Theodor D. Sterling and Seymour
B. Pollack. Thoroughly covers automatic and
semiautomatic data acquisition, computers and
programming, data-preparation techniques, and
the newest techniques for handling data-rich
situations.
$12.50
40170. CONDENSED COMPUTER ENCYCLOPEDIA.
Philip B. Jordain. This 600-page volurr.e provides
in-depth definitions and discussions of computer
terms and concepts. Easy to use, fully crossreferenced-the ideal source book for virtually
every important generic, specific and specialized
term now current.
$14.50
42150. CHAMBERS' DICTIONARY OF ELECTRONICS AND NUCLEONICS. Edited by L. E. C. Hughes,
R. W. B. Stephens and L. D. Brown. One-volume
reference work with clearly stated definitions of
terms in electronics, nucleonics, computing, electroacoustics, physics, television, and much more.
Over 9,000 cross-referenced entries.
$14.50
62710. MICROPROGRAMMING. Samir S. Husson.
Big, complete, totally authoritative-the best description to date of the revolutionary technique
which is yielding such huge dividends both in
flexibility and compatibility for third generation
computers.
$16.95

39850. COMPUTER SORTING. Ivan Flores. The
first work to take up computer sorting and
its applications to commercial problems, design,
scientific problems, operating systems and list
processing.
$12.95
70790. PROGRAMMING SYSTEMS AND LAN·
GUAGES. Edited by Saul Rosen. So up-to-date
that it treats areas still being developed and
tested.
$14.00

r-

_MEMBERSHIP APPLICATION_ -

,

The Library of Computer & Information Sciences
7 -599
Riverside, N. J. 08075
Ullon accelltance of this order, lllease enroll me as
a member and send tho thret' books I haH! indicated. Bill me only $3.95 for all three. lllus llostage
awl handling. It" not delighted. I will return all
books within ten days and this membershill will be
cancelled. As a member, I need accept only three
more selections during the next 12 months at reduced member prices, llius llostage and handling.
Savings range Ull to 30% and occasionally even more.
I understand that I will receive free advance Heviews which fully describe each month's Main
Selection and Alternates. If I wish the ~lain
Seleetion, I need do nothing; it will come to me
autolllaticallv. If I do not wish to receive the ~Iain
Selection. or I wish an Alternate Selection. I will
adri:;e you hy using the convenient reIlly card llrovided with the monthly Heviews. I understand that
I may choose a bonus book for every four selection~
llurchased. (Introductory offer counts as first sclection toward a bonus book. )
Note: Send no money. Members are billed when
the bool,s have been receired.

Send me my free Day Book.
3 Books for $3.95. (write in numbers):

Name _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Address _ _ _ _ _ _ _ _ _ _ _ _ _ __

THE CHECKERBOARDING PROBLEM

They Said "Checkerboarding" Couldn't be Solved

Tactical Air Command
Langley Air Force Base, Virginia

Various computer experts had known about "checkerboardind' for some time, but said the problem could
not be solved.

Computer experts said it couldn't be done, but
two young Air Force computer programmers at Tactical
Air Command (TAC) headquarters, Langley Air Force
Base, Virginia, refused to believe it, and set out
to prove otherwise.

In between their work with TAC's conversion team,
Sergeants Kennedy and Sperber set out independently
to devise a program to reduce the time lost to
"checkerboarding". They discovered their mutual
interest in July 1969, when th~y were assigned to
the same conversion team at Luke AFB, Arizona.

Efficient Computer Creating Problems
Beating the "Checkerboarding" Problem

Staff Sergeants James D. Kennedy, 25 of Leavenworth, Kan., and Joseph E. Sperber, 24, of Dumont,
N.J., were helping to set up a newly authorized computer system at TAC bases throughout the U.S. late
in 1969 when they discovered that the computer, a
Burroughs 3500, was so efficient it was creating
problems for itself.
Their solution was to design a set of instructions, or "program", even though many experts said
it could not be done.
The B-3500, a third generation system, used by
the Tactical Air Command, possesses a disk storage
capacity of up to 500 million characters and the
ability to handle 10 jobs at the same time. It has
a master control program which performs repetitive
processing functions such as placing data on the
disks, or the "assignment" of disk "files".
Problem of Loss of Control

This process saves numerous man-hours at each
base, but it creates the problem pf loss of control
over disk storage, a control which is necessary if
the overall system is to operate at maximum capacity
and economy.

By March of last year, TAC's conversion program
had reached the stage that the two men could be
taken off the various base teams and returned to
the Data Automation Center at TAC Headquarters.
They were to work full time to find a way to beat
the "checkerboard".
It was no accident that they accomplished their
mission. Both men came to TAC with impressive credentials. Sergeant Sperber's association with computers began in high school and continued with
course work at Purdue University, Lafayette, Ind.
Sergeant Kennedy's background included a bachelor
of science degree in mechanical engineering from the
University of Kansas, Lawrence, Kau., and a fulltime job as systems analyst at the computer center
there.
Both men by-passed the intensive eight-week computer course that the Air Force ordinarily requires
of its computer programmers. Both hold Certificates
of Data Processing, an accreditation with the Data
Processing Management Association of the U.S., which
is similar to the accreditation for a Certified Public Accountant.
They Accomplished the "Impossible"

"Checkerboarded" Syndrome

As the computer, officially designated the Base
Level Standard Air Force Phase II Computer System,
removes data which is not needed, it leaves unused
space. Over a period of time, a disk becomes
"checkerboarded" with random spaces which could
be used for storing information.
"The available space on each disk gets to be
quite significant," Sergeant Kennedy explained recently, "but the computer can only use those individual areas which are large enough to accommodate the various data segments to be stored."
Cumbersome, Expensive Process

Eliminating the wasted space caused by "checkerboarding" was a cumbersome process involving several
data transfers. Computer programmers had to rearrange the stored material so that the unused
spaces formed a continuous segment large enough
for the computer to assign new data.
This manipulation was usually necessary about two
or three times a week for each of the 16 to 20 disks
at each base, and required up to an hour and a half
each time. Some bases required a complete reloading
of the entire system each week, at the cost of an
additional two to four hours. The process is doubly
expensive because of the man-hours involved and because of the normal production time lost while a
disk or the system is being reworked.

A self-imposed workday of 15-18 hours had become
commonplace for the two sergeants while working ~ith
the TAC conversion teams. This type of perseverance,
coupled with the attitude that "there's nothing that
can't be done", paid off early last summer when they
accomplished the "impossible". They developed a
program that reworks storage disks and wipes out the
"checkerboard" in a matter of minutes, as opposed to
several hours required by the old transfer and manipulation process.
"Obviously, all the knowledge wasn't available to
us ," Sergeant Sperber commented recently. "We just
had to find it, and that involved a lot of experimentation."
"We borrowed a lot of techniques from some unlikely sources ," Sergeant Kennedy added. "When we
put them together, we discovered quite a bit about
the capability of the Phase II computer. We could
do one thing here, if we could get something else
to work in another place. Every time we tried
something, even when we failed, we were closer to
the solution."
In June, the finished program was mailed on magnetic tape to each TAC base that had completed conversion to the Phase II system. However, as Sergeant Sperber put it, "Initial response at the base
level was rather disappointing. They didn't seem
to grasp the full significance of the program."
(Please turn to page 47)

24

COMPUTERS and AUTOMATION for January, 1972

ANNUAL INDEX
for Volume 20, 1971 and
Computer Directory and Buyers' Guide Issue, Vol. 19,.. No. 6B
of

A
ABM, "Anti-ABM Essay Contest Announced," by Daniel D. McCracken, 20/3 (Mar.), 33
ACM: "Roster of Chapters of the
Associ~tion for Computing
Machinery," 20/6B (June 30),
167
"Roster of Special Interest
Groups (SIG) and Special Interes t Commi t tees (SIC) of
the Association for Computing Machinery," 20/68 (June
30), 171
APL General Sales Dept., "Batch
to On-Line-System Convers ion, "
20/1 (Jan.), 56
ASCII, "American Standard Code
for Information Interchange
(ASCII) -- Selection": 19
(6B), 151; 20/6B (June 30),
127
Abildgaard, Dr. William H.,
"Velo-Binding -- Instant Books,"
20/12 (Dec.), 45
Accelerator Laboratory, "Construction of National Accelerator Laboratory Moni tored by
Computer," 20/1 (Jan.), 50
"Access to One's Own Records, It

by Bruce Madsen, 20/1 (Jan.),
13
Accident victim treatment, "University of Illinois Uses Computer To Aid Treatment of Accident Victims," 20/6 (June), 50
"ACORN (Automatic COder Report
Narrati ve): An Automated Natural-Language Question-Answering System for Surgical Reports," by Paul A. Shapiro and
David F. Stermole, 20/2 (Feb.),
13
Adams, Belmont W., and Edmund C.
Berkeley, "Dv?rak Simplified
Keyboard -- Experimental Introduction in a Large Office,"
20/11 (Nov.), 34
Adams, Tim, "Computer Aids Builder in Erecting One-of-a-Kind
Building," 20/12 (Dec.), 44
"Adaptive Drive Control, Series
600," Anocut R Engineering Co.,
20/2 (Feb.), 57
"ADAPTS (measurement and control
system)," Varian Data Machines,
20/6 (June), 55
"Address Lists by Computer," by
Michael Manson, 20/4 (Apr,),
36
Advanced Digital Systems, Inc.,
"Automatic Tape Library Control System," 20/5 (May), 43
"Aetna Automates Auto Insurance,"
20/7 (July), '62
"Air Cargo and the Computer,"
by A. L. Jacobs, 20/12 (Dec.),
16
Air, clean, "Bicentennial Celebration Will Have Clean Air,"
20/11 (Nov.), 40
"Air France's $20 Million Alpha
3 Reservation System Averages
3 Second Responses," 20/1
(Jan.), 49
"Air Traffic Control System for
Safety in the Skies," 20/7
(July), 61
Aircraft braking systems, "Design, Develop and Test Aircraft Braking Systems with Aid
of EAI Computer," 20/2 (Feb.),
51

Airline tickets, "United Airlines Is Using Computer System
to Curb Stolen Ticket Use,"
20/3 (Mar.), 47
Algebra, elementary, "Boolean
Algebra and Elementary Algebra
-- Comparative Charts," by
Edmund C. Berkeley, 19 (6B) ,
62
"ALICE," Applied Logic Corp.,
20/4 (Apr.), 48
Allis-Chalmers Data Services
Di v., "Remote Terminal Service," 20/1 (Jan.), 56
Alpha 3 reservation system, "Air
France's $20 Million Alpha 3
Reservation System Averages 3
Second Responses," 20/1 (Jan.),
49
Alphanumeric display terminal,
"VT06 Alphanumeric Display
Terminal," Digital Equipment
Corp .. 20/1 (Jan.), 56
American National Bank of St.
Paul, "Association of Data
Processing Service Organizations Vs. Controller of the
Currency and American National
Bank of St. Paul," by 8ernard
Goldstein, 20/7 (July), 69
American Optical Corp., "Small
Computer Translates Prescription Data into ~yeglass Lenses," 20/1 (Jan.), 50
American Regitel Corp., "Regiscan Re ader," 20/3 (Mar.), 51
American Society of Photogrammetry Convention, "Map Making
Time Reduced by Digi tal Cartographic System," 20/5 (May),
42
"American Standard Code for Information Interchange (ASCII)
-- Selection": 19 (6B), 151;
20/6B (June 30): 127
Ampex Corporation: "Ampex Model 1800 Series Core Memory," 20/4 (Apr.), 47
"Ampex Model RGM Core Memory,"
20/3 (Mar.), 50
"MOdel TMY," 20/1 (Jan.), 55
Ampex Corp., Marketing Communications: "Models ARM-30 and
ARM 2365 core memories,"
20/6 (June), 55
"Terabi t Memory (T8M)," 20/6
(June), 56
"Ampex Model 1800 Series Core
Memory," Ampex Corporation,
20/4 (Apr.), 47
"Ampex Mode 1 RGM Core Memory,"
Ampex Corp., 20/3 (Mar.), 50
Amusement park, "IBM Computer
Works at Fun Center," 20/9
(Sept.), 40
"ANAGRAFIC Software System,"
Input Output Computer Services,
Inc .. 20/2 (Feb.), 56
Anderson Jacobson, Inc., "Model
ADAC 1200 Coupler/Modem," 20/
5 (May), 47
Anderson, John L., and Edmund
C. Berkeley, "Computer: A
Highly Skilled Idiot and Not
a Thinker," 20/4 (Apr.), 35
"Animated Computer-Display Is
New Diagnostic Tool for Heart
Disease," 20/8 (Aug.), 49
"Announcement Regarding the
Fifth Edition of 'Who's Who
in Computers and Data Processing' ," 20/1 (Jan.), 41
"Announcement Regarding the 1970
'Computer Directory and Buy-

ers' Guide' ," 20/1 (Jan.), 41
Annual Index, "Publish Your Annual Index in December," by
Geraldine Gieger, 20/4 (Apr.),
38
"Annual Index for Volume 19, 1970
of 'Computers and Automation', ..
20/1 (Jan.), 23
Anocut R Engineering Co., "Adaptive Drive Control, Series
600," 20/2 (Feb.), 57
Anonymous, and Edmund C. Berkeley,
"Fear," 20/2 (Feb.), 43
Answers: "The Number of Answers
to a Problem," by Edmund C.
Berkeley, 20/3 (Mar.), 6
"Right Answers -- A Short Guide
for Obtaining Them," by Edmund C. Berkeley, 19 (6B), 2
"The Ant and the Octopus," by
Mark Nigberg, 20/5 (May), 55
"Anti-ABM Essay Contest Announced," by Daniel D. McCracken,
20/3 (Mar.), 33
Anti-ballistic missile: "I Believe in an Anti-Ballistic
Missile System," from Robert
L. Glass and Edmund C. Berkeley, 20/9 (Sept.), 33
"One Computer PrOfessional for
the Anti-Ballistic Missile
System," from Ronald G. Windsor, 20/9 (Sept.), 34
"Seven More Computer Experts
Become Sponsors of Group Against ABM," from M. Kozikowski, 20/9 (Sept.), 34
"The Anti-Ballistic Missile System is Defensive," from Patrick M. Cooney, 20/9 (Sept.),
35
Appalachian-area students, "Two
RCA Computers Help Teach Appalachian-Area Elementary and
High School Students," 20/4
(May), 41
"The Application of ElectroniCs
To Composition and Printing,"
by Raymond A. Hay, 20/10 (Oct.),
24
Application of computers: '''The
Assassination of President
John F. Kennedy: The Application of Computers to the
Photographic Evidence' -Comment," by Benj amin L. Schwartz and Edmund C. Berkeley,
20/3 (Mar.), 35
"Over 2000 Applications of
Electronic Computing and
Data Processing Equipment. n

by Linda Ladd Lovet t, 19
(6B), 12
"Over 21 Applications of Computers and Data Processing,"
by Linda Ladd' Lovett, 20/6B
(June 30), 14
ApplIed computer GraphICs corp.,
"SCRIBE," 20/2 (Feb.), 57
Applied Cybernetics Corp., "GENIE," 20/2 (Feb.), 57
Applied Logic Corp., "ALICE,"
20/4 (Apr.), 48
Applied Magnetics Corp., "Magnetic Heads Write 100 Tracks
on Tape One Inch Wide," by R.
E. Norris, 20/12 (Dec.), 45
Apti tudes: "Pictori al Reasoning
Tests, and Aptitudes of PeopIe," by Neil Macdonald, 20/
10 (Oct.), 38
"Pictorial Reasoning Tests,
and Aptitudes of People -II," by Neil' Macdonald, 20/12

(Dec.), 41
Arabic writing system, "ComputerAssisted Instruction in the
Right-to-Left Arabic Writing
System," 20/1 (Jan.), 50
Argonne National Laboratory,
"Construction of National Accelerator Laboratory Monitored
by Computer," 20/1 (Jan.), 50
"ARGOS, Financial Analysis System," LV Computer Systems, Inc.,
20/1 (Jan.), 56
Arithmetic, "Summary of Binary
Arithmetic and Related Number
Systems," by Edmund C. Berkeley, 19 (6B), 57
Arnold, E. Allen, "More and More
People," 20/4 (Apr.), 25
Art-by-computer, "Sculptor's 'Artby-Computer' Is Gift to 1000
of Nation's Corporate Chief Executives," 20/11 (Nov.), 40
Art contest, "Ninth Annual Computer Art Contest," 20/5 (May),
18
"Art Professor Generates 3-D Art
Using Computer." 20/2 (Feb.),
51
Article series, "'Computers and
Automation' in 1970: Two New
Article Series," 20/1 (Jan.),
24
ARTS-l Program, "Service Bureau
for the Blind Gets Under Way
with Its Arts-l Program," 20/4
(Apr.), 43
Ashton, Dr. Alan, "A Computer
Stores, Composes, and Plays
Music," 20/12 (Dec.), 43
Assassination: "'The Assassination of President John F.
Kennedy: The Application of
Computers to the Photographic
Evidence' -- Comment," by
Benj amin L. Schwartz and Edmund C. Berkeley, 20/3 (Mar.),
35
"District Attorney Jim Garrison on the Assassination of
President Kennedy: A Review
of Heri tage of Stone," by
Neil Macdonald, 20/3 (Mar.),
45
"The Federal Bureau of Investigation and the Assassination
of President Kennedy," by Bernard Fensterwald, Jr., 20/9
(Sept.), 26
"Report of the Nati onal Committee to Investigate Assassinations," by Dernard Fenster-

wald, James Lesar, and Robert
Smith, 20/2 (Feb.), 48
"The Right of Equal Access to
Government Information," by
the National Committee to Investigate Assassinations, 20/
4 (Apr.), 32
"Superb Series of Articles on
the Assassinations," by Dan
Ritey, 20/11 (Nov.), 38
"The Assassination of President
John F. Kennedy: A Model for
Explanation," by Vincent J.
Salandria, 20/12 (Dec.), 32
'''The Assassination of President
John F. Kennedy: The Application of Comput~rs to the Photographic Evidence' -- Comment,"
by Benjamin L. Schwartz and
Edmund C. Berkeley, 20/3 (Mar.),
35
"The Assassination of President
Kennedy -- Declassification of

Relevant Documents from the
National Archives," by Richard
E. Sprague, 20/10 (Oct.), 41
"The Assassination of President
Kennedy: The Pattern of Coup
D'E.tat and Public Deception,"
by Edmund C. Berkeley, 20/11
(Nov.), 24
"The Assassination of President
Kennedy: The Spatial Chart
of Events in Dealey Plaza,"
20/5 (May), 27
Associated Press and Edmund G.
Berkeley, "New York Panthers
Acquit ted in Bombing Conspiracy Case," 20/6 (June), 7
Association of Computer Programmers and Analysts, "Basic Computer Technology Course Sponsored by ACPA, Potomac Valley
Chapter," 20/7 (July), 62
Association for Computing Machinery, "Roster of Chapters
of the Association for Computing Machinery," 20/6B (June 30),
167
.
Association for Computing Machinery, "Roster of SpeCial
Interest Groups (SIG) and Special Interest Committees (SIC)
of the Association for Computing Machinery," 20/6B (June
30), 171
"Association of Data Processing
Service Organizations Vs. Controller of the Currency and
American National Bank of St.
Paul," by Bernard Goldstein,
20/7 (July), 69
Association for State Information
Systems, "National Association
for State Information Sys terns, "
by Daniel B. Mcgraw, 20/1 (Jan.),

9
"Astronomers Map New Stars with
Computer's Help," 20/6 (Julie),
50
"Atlanta Baptist College Offering Degree Credi ts to Honeywell Graduates," 20/10 (Oct.),
51
Atlanta schools, "Braille Course
Materials for Blind Students
Are Produced by Computer in
Atlanta Schools," 20/11 (Nov.),
41
Atlantic Software Inc.: "PRINTFAST," 20/5 (May), 44
"SCORE III COBOL Program Generator," 20/1 (Jan.), 55
Atmospheric path, "Laser Beam
Sends Digital Data Over Lengthy
Atmospheric Path," 20/3 (Mar.),
49
Auciello, Joseph, "Soc i al Data
Processing Centers in the Form
of Teleterminal Time," 20/3
(Mar.), 34
"Auctioning a Computer," by R. A,
Rosenblatt, 20/11 (Nov.), 33
Audac Corp., "T-66 Credit Control Terminals," 20/3 (Mar.),
52
Aus tin Sys terns Co., Inc., "Homeowners Rating and Writing System," 20/4 (Apr.), 48
Auto insurance, "Aetna Automates
Auto Insurance," 20/7 (July),
62
"Automatic Calling Unit, ACU1001," Sola Basic Industries,
G-V Controls Div .. 20/3 (Mar.),

51
Automatic COder Report Narrative,

25

Annual Index
"ACORN (Automatic COder Report
Narrative): An Automated Natural-Language Question-Answering System for Surgical Reports," by Paul A. Shapiro and
David F. Stermole, 20/2 (Feb.),
13
Automatic spooling, "DOS ASAP
(~utomatic ~pooling wi th ~syn­
chronous Processing)," Universal Software, Inc., 20/3 (Mar.),
50
"Automatic Tape Library Control
System," Advanced Digital Systems, Inc., 20/5 (May), 43
"AUTOMED," Medic al Data Sys terns
Corporation, 20/5 (May), 47
Automobiles, defective, "Defective Autos Routed Off Streets,
into Repair Shops, with Aid of
Computer," 20/10 (Oct.), 51
Axicom Sys terns, Inc., "GETPUT,"
20/1 (Jan.), 55
Aydelotte, Walter M., "Communications Message Switching -An Analysis," 20/7 (July), 8

B
BPL, "Business Planning Language
(BPL)," International Timesharing Corp., 20/5 (May), 44
"BR-700 Information System," Electronic Systems Div., BunkerRamo Corp., 20/6 (June), 57
B.S, in Computer Science, "Special B.S. Program in Computer
Science for Transfer Students,"
20/9 (Sept.), 42
Baggage Handling System, "United
Air Lines Baggage Handl ing System Uses Minicomputers to Remember Sui tcases' Destinations,"
20/6 (June), 51
Bank Computer Network Corp.:
"Commercialoan Monitor," 20/5
(May), 47
"Margin Monitor (Off-Line Version)," 20/1 (Jan.), 56
"Bank General Ledger System," Information Systems Div., Computer Sciences Corp., 20/2 (Feb.),
56
Banks, "Nine Major NYC Banks Are
Using 'Electronic Money' Network, Known as CIIlPS," 20/1
(Jan.), 49
~
BASIC compiler/interpreter, "Extended BASIC Compiler/Interpreter," Polymorphic Corp.,
20/5 (May), 44
"Basic Computer Technology Course Sponsored by ACPA, Potomac
Valley Chapter," 20/7 (July),
62
"BASIC-I," The National Cash
Register Co., 20/5 (May), 44
"Batch to On-Line System Conversion," APL General Sales Dept.,
20/1 (Jan.), 56
Battersby, Mark E., "Tax Return
Filing by Computer," 20/1
(Jan.), 19
Beckman Instruments, Inc .. I "Electrocomp Model LIC Life Insurance and Investment Computer,"
20/4 (Apr.), 47
Bell Labs.: "Computer Cubism,"
20/3 (Mar.), 49
"Voice-Controlled Device Gives
'Command' Performances," 20/

10 (Oct.), 52
Bentley, Robert R., "Un interruptible Power Supply Protected
NASA Computer During Earthquake," 20/5 (May), 33
Berglund Associates, Inc., "Commpute," 20/4 (Apr.), 49
Berkeley, Edmund C.: "The Assassination of President Kennedy: The Pattern of Coup
D'Etat and Public Deception,"
20/11 (Nov.), 24
"Books, Computers, and.the
Great Future," 20/1 (Jan.),

6
"Boolean Algebra and Elementary Algebra -- Comparative
Charts," 19 (6B), 62
"Can a Computer Apply Common
Sense?," 20/10 (Oct.), 6
"Common Sense, Wisdom, General
Science, and Computers -the Most Important of all
Subjects, and its Relation
to Computers," 20/4 (Apr.),
27
"The Computer Field and the
Economic Depression of 1970,"
19 (6B), 3
"Facts or Logic?," 20/6H
(June 30), 3
"The Handwriting on the Wall,"
20/6 (June), 6
"How an Unemp loyed Computer

26

Professional Might Start His
Own Business and Earn a Reasonable Income as His Own Employer," 20/5 (May), 6
"Is There No Horror Point?,"
20/2 (Feb,), 44
"Learner-Controlled ComputerAssisted Instruction," 20/8
(Aug,), 6
"Lying by the United States
Government: an' Acceptable
Level'?," 20/5 (May), 36
"The Misdirection of Defense,"
20/8 (Aug.), 44
"The Mos t Important of All
Branches of Knowledge": 20/
4 (Apr.), 6; 20/10 (Oct.), 3
"Nine and Ni-Yen," 20/9 (Sept.),

6
"Not Understanding a Computer,"
20/2 (Feb.), 6
"The Number of Answers to a
Problem," 20/3 (Mar.), 6
"Preventing Mistakes from Failure to Unders tand," 20/7
(July), 6
"The RCA Computer Effort -Common Sense vs. Catastrophe,"
20/11 (Nov,), 6
"Right Answers -- A Short Guide
for Obtaining Them," 19
(6B), 2
"The Science and Technology
Division of the New York
Public Library To Close its
Doors on January I, 1972,"
20/10 (Oct.), 56
"The Strategy of Truth-Telling,"
20/12 (Dec.), 6
"Summary of Binary Arithmetic
and Related Number Systems,"
19 (6B), 57
"Summary of Boolean Algebra,"
19 (6B) , 61
"The Unemployed Computer Professional Turned Businessman: Products and Services
Which a New Small Business
Might Produce or Offer," 20/
9 (Sept.), 30
Berkeley, Edmund C., and John L.
Anderson, "Computer: A Highly Skilled Idiot and Not a
Thinker," 20/4 (Apr.), 35
Berkeley, Edmund C., and Anonymous, "Fear," 20/2 (Feb.), 43
Berkeley, Edmund C., and Associated Press, "New York Panthers
Acqui t ted in Bombing Conspi racy Case," 20/6 (June), 7
Berkeley, Edmund C., and Belmont
W. Adams, "Dvorak Simplified
Keyboard -- Experimental Introduction in a Large Office," 20/
11 (Nov.), 34
Berkeley, Edmund C., and George
Capsis, Kenneth M. King, Monroe Newborn, Computer People
for Peace, Michael B. Griswold,
E. C. Witt, "The Case of Clark
Squire: Computer Programmer,
Black Panther, Prisoner -- Interim Report," 20/2 (Feb.), 36
Berkeley, Edmund C., and James
II. Clardy, "Irresponsible and
Un-American," 20/11 (Nov.), 38
Berke ley, Edmund C., and a Computer Programmer, "Hurray for
the Computerized Let ter!," 20/
4 (Apr.), 37
Berkeley, Edmund C., and Daniel
Ellsberg, "Daniel Ellsberg and
the Pentagon Papers," 20/8

Be;~~i~~: i~mund

C.,' and Terrell
L. Elrod, "The Death of Walter
Reuther," 20/5 (May), 34
Berkeley, Edmund C., and Frank
J. Gabriel, "Essential Computer Concepts for Top Management," 20/5 (May), 31
Berkeley, Edmund C., and Robert
L. Glass, "I Believe in an
Anti-Ballistic Missile System,"
20/9 (Sept.), 33
Berkeley, Edmund C., and M. L.
Huber, "'To Help Liberate One's
Mind from Newspeak' -- Comment,"
20/5 (May), 33
Berkeley, Edmund C., and Dr. Kevin R. Jones, '''The Dvorak Simplified Typing Keyboard' -Comment," 20/2 (Feb.), 8
Berkeley, Edmund C., and O. N.
Minot, Neil Macdonald, "Communication and Ciphers wi th a
Hexadecimal Alphabet and Variations," 20/9 (Sept.), 36
Berkeley, Edmund C., and William
Propp, "Legal Decisions by
Computeri zed Sys tems," 20/11
(Nov.), 36
Berkeley, Edmund C., and Michael
Richter, Arthur E. Gardner,
"'Computers and Automation' -Some Views," 20/1 (Jan.), 13

Berkeley, Edmund C., and Benjamin L. Schwartz, "'The Assassination of President John F.
Kennedy: The Application of
Computers to the Photographic
Evidence' -- Comment," 20/3
(Mar.), 35
Berkeley, Edmund C., and Eugene
S. Stark, "'Essential Computer
Concepts for Top Management'
-- Comment," 20/10 (Oct.), 28
Berkeley, Edmund C., and William
E. Thibodeau, "Political Blurp
Sheet," 20/2 (Feb.), 43
Berkeley, Edmund C., and Leonard
Walden, "The Death of Wal ter
Reuther: Accidental or Planned?," 20/1 (Jan.), 45
Berkeley, Edmund C., and Robert
R. Weden, "Numble Challenges,
Given and Returned," 20/7
(July), 69
Berkeley, Edmund C., and James
D. White, "Skepticism of Official Government Explanations,"
20/8 (Aug.), 36
Berry, Rex, "1900S Series Computers," 20/6 (June), 55
Beta Instrument Corp., "Microplot 1000 Digital Microfilm
Plotter," 20/1 (Jan.), 55
"Bicentennial Celebration Will
Have Clean Air," 20/11 (Nov.),
40
Bill of Rights: "Federal Data
Banks and the Bill of Rights,"
by Arthur R. Miller, 20/10
(Oct.), 12
"The Information Revolution -and the Bill of Rights," by
Dr. Jerome B. Wiesner, 20/5
(May), 8
Billboards, "Flying Electronic
Billboards," 20/2 (Feb.), 52
Binary conversion tables, "Some
Binary, Octal, and Decimal
Conversion Tables," 19 (6B),
59
Black Panther: "The Case of
Clark Squire: Computer Programmer, Black Panther, Prisoner -- Interim Report," by
George Capsis, Kenneth M.
King, Monroe Newborn, Computer Peop.le for Peace, Michael
B. Griswold, E. C. Wi t t, and
Edmund C. Berkeley, 20/2
(Feb.), 36
'''Responsible Journalism' -Comment," by Clark Squire,
20/1 (Jan.), 8
"Black Star" (Computer Art), by
Leonard Kilian and Campion
Kulczynski, 20/8 (Aug.), 13
Blind: "Braille Course Materials
for Bl ind St udents Are Produced by Computer in Atlanta
Schools," 20/11 (Nov.), 41
"Service Bure au for the Blind
Gets Under Way with Its
Arts-l Program," 20/4 (Apr.),
43
Blurp Sheet, "Political Blurp
Sheet," by WilliamE. Thibodeau, and Edmund C. Berkeley,
20/2 (Feb.), 43
Bohanon, Edward G., "University
of Illinois Installs CDC 6400
for Deve lopment of Compu ter i zed
Education," 20/4 (Apr.), 39
Bolden, Abraham W., "The Case of
Secret Service Agent Abraham
W. Bolden," by Bernard Fensterwald, 20/6 (June), 41
Bolles, E. E., "Size Shrinkage
of Computers," 20/7 (July), 60
Bombing, "New York Panthers Acquitted in Bombing Conspiracy
Case," by the Associ ated Press
and Edmund C. Berkeley, 20/6
(June), 7
BOOK REVIEW: 20/7 (July), 69
Books, "Velo-Binding -- Instant
Books," by Dr. William H.
Abildgaard, 20/12 (Dec.), 45
"Books, Computers, and the Great
Future," by Edmund C. Berkeley,
20/1 (Jan.), 6
"Books and Other Publications,"
by Stuart Freudberg, 20/5
(May),35
Boolean algebra, "Summary of Boolean Algebra," by Edmund C.
Berkeley, 19 (6B), 61
"Boolean Algebra and Elementary
Algebra -- Comparative Charts,"
by Edmund C. Berkeley, 19 (6B),
62
"Boston Museum of Science Will
Display Computer Public Can
Operate," 20/9 (Sept.), 42
Bowlin, Dr. Oswald D.. Dr. William P. Dukes, and Dr. William
F. Ford, "The Computer, Broker
of the Future: A Speculative
Forecast," 20/4 (Apr.), 8

Boyd, Alan S., "The Computer Revolution -- and the Railroads,"
20/2 (Feb.), 25
"Braided U-Core Read-Only Memory
(ROM)," Datapac, Inc., 20/3
(Mar.), 50
Braille, "Computer Terminal
'Talks' Braille," 20/7 (July),
63
"Braille Course Materials for
Blind Students Are Produced by
Computer in Atlanta Schools,"
20/11 (Nov.), 41
"Braille Printing Developed for
Small Computer," 20/8 (Aug.),
49
Brewster, Dr. Kingman, "The Deeper Unrest," 20/3 (Mar.), 23
Bridge Data Products, Inc., "Model 8600 Card Reader," 20/2
(Feb.),57
"Bridge Over Troubled Water"
(Computer Art), by Goran Sundquist, 20/8 (Aug.), 17
Bright, Herb, "Fortran Comes To
Westinghouse-Bettis, 1957,"
20/11 (Nov.), 17
British Equipment Co. Ltd.,
"SOVAL (Single Operator Validation)," 20/2 (Feb.), 58
Brokerage House Sys tem, "Search
Brokerage House System (SBHS),"
Digital Equipment Corp., 20/6
(June), 55
Broking and sales, "International Broking and Sales Network,"
Computer Sales & Service Ltd.,
20/6 (June), 57
Brooks, Jack, Congressman, "Government Requirements for the
Computer Industry," 20/2 (Feb.),
7
Brush Div., GOUld Inc., "Brush
1100 Graphic Plotter," 20/1
(Jan.),55
"Brush 1100 Graphic Plotter,"
Brush Div., Gould Inc., 20/1
(Jan.), 55
Bryant Computer Products: Series 720 Controllers," 20/3
(M~r.), 50
"Series 2200 Direct Access Storage Facility," 20/4 (Apr.),
48
Buckley, Fletcher J., LTC, "Verification of Software Programs," 20/2 (Feb.), 23
Bugs & Looops, "Understand Computers by Playing 'Bugs &
Looops' ," 20/1 (Jan.), 50
Building, "Computer Aids Builder
in Erecting One-of-a-Kind
Building," by Tim Adams, 20/12
(Dec.), 44
"Building Your Own Computer -Part One," by Stephen B. Gray,
20/12 (Dec.), 25
Bunker-Ramo Corp., "OTC Quote
System Activated by Bunker~
Ramo," 20/5 (May), 40
Bunker-Ramo Corp., Electronic
Systems Div., "BR-700 Information System," 20/6 (June), 57
Burroughs Corp., "New York State
Identification and Intelligence
System," 20/3 (Mar.), 31
"Business Planning Language (BPL)," International Timesharing
Corp., 20/5 (May), 44
Business programmer exam, "434
Out of 1,114 Pass First Registered Business Programmer Exams," 20/4 (Apr.), 44
Busing controversy, "Computers
Enter the Busing Controversy,"
by Robert L. Gl ass, 20/7 (July), 18
"Buyers' Guide to Products and
Services in Computers and Data
Processing": 19 (6B), 92; 20/
6B (June 30), 90

c
"c&A Notebook on Common Sense,"
20/6B (June 30), 2
"The C&A Notebook on Common
Sense, Elementary and Advanced": 20/10 (Oct.), 2; 20/11
(Nov.), 2; 20/12 (Dec.), 2
"The C&A Notebook on Common
Sense, Elementary and Advanced -- News and Developments,"
20/9 (Sept.), 7
CBIS Information Systems, "CBISLEARN," 20/5 (May), 44
"CBISLEARN," CBIS Information
Systems, 20/5 (May), 44
"CCS 120 Remote Printing Station," Custom Computer Systems,
20/2 (Feb.), 57
"CDC CYRER 70 Family," Control
Data Corp., 20/5 (May), 43
CIA, "The Central Intelligence
Agency and the New York Times,"

by Samuel F. Thurston, 20/7
(July), 51
"CMC 761 Printer," Computer MaChinery Corp., 20/5 (May), 47
"CPS-l (Contour Plotting System),"
Unitech, Inc .. 20/6 (June), 56
"CRT Display Terminal, Model
7700," Lear Siegler, Inc.,
20/4 (Apr.), 49
CTIA, "Report of the National
Commi t tee to Investigate Assassinations," by Bernard Fensterwald, James Lesar, and
Robert Smith, 20/2 (Feb.), 48
California Air Resources Board,
"Ford Will Meet Cal iforni a Exhaust Emission Standards with
Help of Computers," 20/7 (July),
61
"Call for Papers -- IEEE Computer Society Conference, 1970,"
20/1 (Jan.), 10
Cambridge Computer Associates,
Inc .. "PROFILE," 20/4 (Apr.),
48
Cambridge Memories, Inc., "ExpandaCore 620," 20/3 (Mar.),
50
Camera computer sys tem, "MDS/ JCC
(Medical Data Systems/Joint
Camera Computer) System," Medical Data Systems, 20/1 (Jan.),
52
"Campaign Financing: Money and
Secrecy," by John W. Gardner,
20/10 (Oct.), 30
"Can a Computer Apply Common
Sense?," by Edmund C. Berkeley,
20/10 (Oct.), 6
Canadian Westinghouse Co. Ltd.,
"Westinghouse 1600 Computer
Terminal," 20/5 (May), 47
Cancer tests, "Microscopes and
Computer Help Italian Center
Report on Women's Cancer Tests,"
20/8 (Aug.), 47
Capsis, George, and Kenneth M.
King, Monroe Newborn, Computer
People for Peace, Michael B.
Griswold, E. C. Witt, Edmund
C. Berkeley, "The Case of Clark
Squire: Computer Programmer,
Bl ack Panther, Prisoner -- Interim Report," 20/2 (Feb.), 36
"Car Pool by Computer," 20/11
(Nov.), 10
Card punch, "Card Reader, Mod
250; Card Punch, Mod 260," UniComp, Inc .. 20/3 (Mar.), 51
Card reader, "Model 8600 Card
Reader," Bridge Data Products,
Inc., 20/2 (Feb.), 57
"Card Reader, Mod 250; Card Punch,
Mod 260," UniComp, Inc., 20/3
(Mar.), 51
Careers, "Classroom on Wheels
Prepares Disadvantaged Students
for Careers in Computing," 20/2
(Feb.), 52
Carter, Robert W., "Publishing
Courage," 20/5 (May), 55
Cartographic system, "Map Making
Time Reduced by Digital Cartographic System," 20/5 (May), 42
"The Case of Clark Squire: Computer Programmer, Black Panther,
Prisoner -- Interim Report,"
by George Capsis, Kenneth M.
King, Monroe Newborn, Computer
People for Peace, Michael B.
Griswold, E. C. Witt, and Edmund C. Berkeley, 20/2 (Feb.),
36
"The Case of Secret Service Agent
Abraham W. Bolden," by Bernard
Fensterwald, 20/6 (June), 41
Casey, Dr. Albert E., "Hippocrates Reversed by Computer: Better Diagnosis and Treatment with
Reduced Costs," 20/7 (July), 14
"Cassette Magnetic Tape Operating
Sys tem (OITOS)," Dicom Industries, 20/6 (June), 57
"Cassette Recorder, Mobark Model
400 T," Mobard Instruments
Corp .. 20/4 (Apr.), 49
"Cas set te Tape System," Interdata Inc., 20/1 (Jan.), 55
Catfish, "Common Catfish Aids Research into Sense of Smell," 20/
9 (Sept.), 41
"CEMIS (Client-Employee Management Information System)," Western Data Sciences, 20/6 (June),
56
CENSTAT, "CYBERNET/CENSTAT System," Control Data Corp., 20/2
(Feb.), 58
"Census Tract Data," National
Planning Data Corp., 20/1 (Jan.),
56
"The Central Intelligence Agency
and the New York Times," by
Samuel F. Thurston, 20/7 (July),
51
Chapin, Dr. Ned, "Perspective on

Annual Index
Flowcharting Packages," 20/3
(Mar.), 16
"Characteristics of Digi tal Computers," by Keydata Corp.: 19
(6B), 22; 20/6B (June 30),24
"Checkless Payroll Saving Hospital Dollars & Time," 20/10
(Oct.), 50
Chemical compounds, "Properties
of Chemical Compounds Predictable Without Actual Measurements Through Use of Co'mputer,"
20/10 (Oct.), 50
CHIPS, "Nine Major NYC Banks Are
Using 'Electronic Money' Network, Known as CHIPS," 20/1
(Jan.), 49
"Churches Announce New Personnel
Information System," 20/5
(May), 40
"Cigarette Smoke Aids Computer
Testing," 20/10 (Oct.), 52
Cipher Data Products, Inc.,
"Read Only Tape Transports,
100R Series," 20/2 (Feb.), 58
Ciphers, "Communication and Ciphers with a Hexadecimal Alphabet and Variations," by O.
N. Minot, Edmund C. Berkeley,
and Neil Macdonald, 20/9
(Sept.), 36
Circuit Systems Corp., "Model
DTU-250, miniature magnetic
tape recorder," 20/6 (June),
56
Ci ties of tomorrow, "Simulated
Environment Model May Aid Cities of TO'llOrrow," 20/2 (Feb.),
55
Clardy, James H., and Edmund C.
Berkeley, "Irresponsible and
Un-American," 20/11 (Nov.), 38
Clark, Askew H., "Opportunities
in the Computer Field," 20/11
(Nov.),34
"Classroom on Wheels Prepares
Disadvantaged Students for
Careers in Computing," 20/2
(Feb.), 52
"CLASS-SET," Composition Systems
Inc.,'20/1 (Jan.), 55
Client-Employee Management Information System, "CE~IIS (Client-Employee Management Information System)," Western Data
Sciences, 20/6 (June), 56
COBOL program generator, "SCORE
III COBOL Program Generator,"
Atlantic Software Inc., 20/1
(Jan.), 55
Cogar Corp.: "Cogar 70," 20/3
(M"r.), 50
"Cogar System 4," 20/3 (Mar.),
50
"Cogar 70," Cogar Corp., 20/3
(Mar.), 50
"Cogar System 4," Cogar Corp.,
20/3 (Mar.), 50
College computer facil i ties,
"Roster of College and Uni Versity Computer Facilities":
19 (6B), 186; 20/6B (June 30),
141
"College of William and Mary Increases Student Services, for
Regional Network," 20/4 (Apr.),
44
Commercial courses, "Roster of
Organizations Offering Commercial Courses, Training, or Instruction in Computing, Programming or Systems," 19 (6B),
143
"Cornmercialoan MODi tor t" Bank

Computer Network Corp., 20/5
(May), 47
"Common Catfish Aids Research
into Sense of Smell," 20/9
(Sept.), 41
Common sense: "C&A Notebook on
Common Sense," 20/6B (June
30), 2
"The C&A Notebook on Common
Sense, Elementary and Advanced": 20/10 (Oct.), 2; 20/
11 (Nov.), 2; 20/12 (Dec.),

2
"The C&A Notebook on Common
Sense, Elementary and Advanced -- News and Developments," 20/9 (Sept.), 7
"Can a Computer Apply Common
Sense," by Edmund C. Berkeley, 20/10 (Oct.), 6
"Common Sense, Wisdom, General
Sc ience, and Computers -- the
Most Important of All Subjects,
and its Relation to Computers,"
by Edmund C. Berkeley, 20/4
(Apr.), 27
"Comm-pute," Berglund Associates, Inc., 20/4 (Apr.), 49
"Communication and Ciphers with
a Hexadecimal Alphabet and
Variations," by O. N. Minot,
Edmund C. Berkeley, and Neil

Macdonald, 20/9 (Sept.), 36
Communications, "One World of
Communications," by Robert W.
Sarnoff, 20/10 (Oct.), 26
"Communications Message Switching
-- An Analysis," by Wal ter M.
Aydelotte, 20/7 (July), 8
Community service: "Computers
in Community Service: Can
the CuI tural Gap be Bridged?,"
by James F. Muench, 20/2
(Feb.), 28
"Computers in Communi ty Service: Can the CuI tural Gap
be Br idged? Part Two," by
James F. Muench, 20/3 (Mar.),
20
"COMPCARD Computer Terminal,"
Image Systems, Inc., 20/2
(Feb.),' 57
Composi tion, "The Application of
Electronics To Composition and
Printing," by Raymond A. Hay,
20/10 (Oct.), 24
Composition Systems Inc., "CLASSSET," 20/1 (Jan.), 55
Compudata Corp., Inc., "Data
Terminal," 20/6 (June), 57
Computek, Inc., "Model GT50/10
Graphics Tablet," 20/3 (Mar.),
51
"Computer: A Highly Skilled
Idiot and Not a Thinker," by
John L. Anderson and Edmund C.
Berkeley, 20/4 (Apr.), 35
"Computer-Aided Technique for
Growing Single-Crystal Silicon
Ingots," 20/3 (Mar.), 47
"Computer Aids Builder in Erec ting One-of-a-Kind Building,"
by Tim Adams, 20/12 (Dec.), 44
"Computer Aids Research of Female Reproductive Cycle," 20/2
(Feb.), 51
"Computer Analysis of Electrocardiograms (ECG)," Pfizer
Inc .. 20/2 (Feb.), 58
"Computer Analyzed Electrocardiograms." Telemed Corp., 20/4
(Apr.), 49
"Computer Artists," 20/8 (Aug.),
23
"Computer Assisted Diagnosis for
Internal Medicine," Mead Johnson Medical Services, 20/3
(Mar.), 52
"Computer-Assisted Instruction
in the Right-to-Left Arabic
Writing System," 20/1 (Jan.),
50
Computer associations: "Roster
of Computer Associations,"
19 (6B), 204
"Roster of Main Computer Associations," 20/6B (June),
160
Computer Automation, Inc., "NAKED-MINI (trademark registration applied for)," 20/4 (Apr.),
47
"Computer Books and Li terature
for North Vietnam." by Joe Hanlon, 20/11 (Nov.), 36
"The Computer, Broker of the Future: A Speculative Forecast,"
by Dr. Oswald D. Bowlin, Dr.
William P. Dukes, and Dr. William F. Ford, 20/4 (Apr.), 8
Computer Census: -- see "Month.
ly Computer Census"
-- see "World Computer Census"
Computer Co-Op, "Twenty-Nine
School Districts in Minnesota
Join in 'Computer CO-Op'," 20/
3 (Mar.), 49
Computer Communications, Inc.,
"Totally Teletype Compatible
Telecommunications Display the
CC-335 TOTELCOM," 20/1 (Jan.),
56
"Computer Cubism?," 20/3 (Mar.),
49
Computer Directory and Buyers'
Guide: "Announcement Regarding the 1970 'Computer Directory and Buyers' Guide',"

20/1 (Jan.), 41
"Forms for Entries in the 1971
'Computer Directory and Buyers' Guide' Issue," 19 (6B),
217
"Forms for Entries in the 1972
'Computer Directory and Buyers' Guide Issue," 20/6B
(June 30), 175
"The Computer Displ ay Review,"
Keydata Corporation, 20/2
(Feb.), 58
"Computer Fair in Japan in October 1970 Nets $2.5 Million in
U. S. Sales -- Spurs Second Fair
in Munich, November 30, 1971."
by Andre Williams, 20/7 (July),
60
"Computer Helps Breeder Find
Right 'Mate' for Farmer's Cow,"

20/7 (July), 62
"Computer Helps Find Undetected
Diseases," 20/9 (Sept.), 40
"Computer Helps Industry Prolong
Forest Beauty," 20/6 (June),
51
"Computer Helps Predict Supreme
Court Actions," 20/8 (Aug.),
48
"Computer Helps Pro Football Teams Make Draft Selections," 20/
3 (Mar.), 47
Computer interruptions, "Patent
Awarded Invention for Reducing
Computer Interruptions," 20/4
(Apr.), 44
Computer journal. "Masquerading
as a Computer Journal," by
Patrick M. Cooney, 20/5 (May),
54
"Computer Law Dictionary," The
Computer Searching Service
Corp., 20/3 (Mar.), 52
Computer Machinery Corp., "CMC
761 Printer," 20/5 (May), 47
Computer-microscope combination,
"Metallurgist Describes Computer-Microscope Combination,"
20/5 (May), 42
Computer Operations, Inc., "Source
Text Editor," 20/6 (June), 57
Computer output microfilming,
"Kodak Course Will Train Top
Systems Analysts in COM," 20/4
(Apr.), 44
Computer People for Peace, and
George Capsis, Kenneth M. King,
Monroe Newborn, Michael B.
Griswold, E. C. Witt, Edmund
C. Berkeley, "The Case of Clark
Squire: Computer Programmer,
Black Panther, Prisoner -- Interim Report," 20/2 (Feb.), 36
"Computer-Prepared 'Maps' Speed
Grocery Deliveries," 20/11
(Nov.), 41
"Computer Prints Kanj i," 20/9
(Sept. ), 42
Computer profess ional, "The Predicament of the Computer Professional," by Joanne Schaefer,
20/7 (July), 58
Computer Programmer, and Edmund
C. Berkeley, "Hurray for the
Computerized Letter! ," 20/4
(Apr.), 37
"The Computer Revolution -- and
the Railroads," by Alan S.
Boyd, 20/2 (Feb.), 25
Computer Sales & Service Ltd.,
"International Broking and
Sales Network," 20/6 (June),
57
Computer Sciences Corp., Informati on Sys tems Div., "Bank General Ledger Sys tem," 20/2
(Feb.), 56
The Computer Searching Service
Corp., "Computer Law Dictionary," 20/3 (Mar.), 52
"Computer Securi ty -- Sabotage
Fears Discounted," by Mel Mandell, 20/10 (Oct.), 29
Computer Services Corp., "Generali zed Table File Mai ntenance
Sys tem (GTFM)," 20/1 (Jan.),
55
.. A Computer Store s, Composes,
and Plays Music," by Dr, Alan
Ashton, 20/12 (Dec.), 43
"Computer Structure" (Computer
Art), by p. Struycken, 20/8
(Aug.), 18
Computer Systems, '" MX030l6',
Generalized Format Print Module," 20/5 (May), 44
"Computer Teaches Teachers in
Early Detection of Handicapped
Chi ldren," 20/3 (Mar.), 48
"Computer Terminal 'Talks' Braille," 20/7 (July), 63
Computer users club, "Second
Generation Computer Users Club,"
by Roger L. Hackman, John R.
Graham, and Jack H. Stokes,
20/11 (Nov.), 34
"Computerized," by Margo, 20/6
(June), 7
"Computerized Buoy Enters Fight
Against Pollution," 20/9
(Sept.), 41
"Computerized Junk Mail," by
Congressman Cornelius E. Gallagher, 20/4 (Apr.), 35
Computers and Automation, "The
1970 Issues of 'Computers and
Automation'," 20/1 (Jan.), 25
"'Computers and Automation' in

1970: Two New Article Series,"
20/1 (Jan.), 24
"'Computers and Automation' --

Some Views," by Michael Richter, Edmund C. Berkeley, and
Arthur E, Gardner, 20/1 (Jan.),
13
"Computers Enter the Busing Con-

troversy," by Robert L. Gl ass,
20/7 (July), 18
"Computers in Community Service:
Can the CuI tural Gap be Bridged?," by James F. Muench, 20/
2 (Feb.), 28
"Computers in Communi ty Service:
Can the Cultural Gap be Bridged? Part Two," by James F.
Muench, 20/3 (Mar.), 20
"Computers in Literature I" by
Prof. Leslie Mezei, 20/7
(July), 58
"Computers Installed in American
Railroads," by R. A. Petrash,
20/11 (Nov.), 19
"Computers and the Nation," by
Dr. Edward E. David, Jr .. 20/
9 (Sept.), 12
"Computerworld", .. $290 ,000 Awarded in Libel Damages to an Insurance Broker Suing Retail
Credit Co .... 20/5 (May), 32
Computing Corp. International,
Inc., "MIAS (~Ianagement Information and Accounting System),"
20/6 (June), 56
Conference: "Call for Papers -IEEE Computer Society Conference, 1970," 20/1 (Jan.), 10
"Experience and Plans in the
Use of Computers for Undergraduate Instruction -- Conference, June 23-25, 1971,"
by Dr. Fred W. Weingarten,
20/3 (Mar.), 30
Connolly, Dr. John A., "Using
Computers to Individualize Instruction: Another Approach,"
20/3 (Mar.), 8
Conspiracy, "New York Panthers
Acqui tted in Bombing Conspiracy Case," by the Associated
Press and Edmund C. Berkeley,
20/6 (June), 7
Construction, "Disruptive 'DigUps' by Construction Contractors Averted with Computerized
'LOOk-Up' Center in Californi a," 20/2 (Feb.), 51
"Construction of National Accelerator Laboratory Monitored by
Computer," 20/1 (Jan.), 50
Consulting services, "Roster of
Organizations Offering Consul ting Services in the Computer
Field," 19 (6B), 146
"Consumer Information System,
Computerized. Ralph Nader Style," by T.D.C. Kuch, 20/2
(Feb.), 44
Contest: -- see "Art Contest"
-- see "Martin Luther King
Memorial Prize Contest"
"Anti-ABM Essay Contest Announced," by Daniel D. McCracken, 20/3 (Mar.), 33
Contour Plotting System, "CPS-l
(Contour Plotting System),"
Unitech, Inc., 20/6 (June), 56
Contracts -- see "New Contracts"
Control Data Corp.: "CDC CYBER
70 Family," 20/5 (May), 43
"CYBERNET/CENSTAT System," 20/2
(Feb.), 58
"Control Data Corporation Establishes National Library of
Shipbuilding Programs," 20/8
(Aug.), 49
Controller of the Currency, "Association of Data Processing
Service Organizations Vs. Controller of the Currency and
American National Bank of St.
Paul," by Bernard Goldstein,
20/7 (July), 69
Controllers, "Series 720 Controllers," Bryant Computer Products," 20/3 (Mar.), 50
Conversion tables, "Some Binary,
Octal, and Decimal Conversion
Tables," 19 (6B), 59
Converter, "VertaTape, Paper Tape
to Magnetic Tape Converter,"
Datascan, Inc., 20/3 (Mar.), 52
Cooney, Patrick M.: "The AntiBallistic Missile System is
Defensive," 20/9 (Sept.), 35
"Masquerading as a Computer
Journal," 20/5 (May), 54
Core memory, "Ampex Model RGM
Core Memory," Ampex Corp., 20/3
(Mar.), 50
"CorPak 8 Memory System," Information Control Corp., 20/6
(June), 55
"CorPac 11, Add on Core Memory
System," Information Control
Corp., 20/4 (Apr.), 48
"Corrections": 20/3 (Mar.), 60;
20/9 (Sept.), 32; 20/9 (Sept.),
48
"Cost Savings Possible in Data
Preparation," by William J.
Primavera, 20/5 (May), 19

"COSYBUG," PDA Systems, Inc.,
20/6 (June), 56
Coupler/controller, "Model 2575A
Coupler/Controller," Hewlet tPackard Co., 20/1 (Jan.), 56
Coupler modem, "Model ADAC
1200 Coupler/Modem," Anderson Jacobson, Inc., 20/5 (May),
47
Cow breeding, "Computer Helps
Breeder Find Right 'Mate' for
Farmer's Cow," 20/7 (July),
62
Criminal Intelligence Systems,
"Data Banks and Criminal Intelligence Systems," by Robert Kahn, 20/7 (July), 59
Crow, James E., and H. Irvin
Smith, "Don't Blame President
Nixon," 20/5 (May), 54
Cubism, "Computer Cubism," 20/3
(Mar.), 49
Culleton, John, "Stop Expressing
Political Polemics," 20/5
(May), 54
CUll inane Corp .. "EDP Auditor,"
20/5 (May), 44
Cultural gap: "Computers in Communi ty Service: Can the
CuI tural Gap be Bridged?,"
by James F. Muench, 20/2
(Feb.), 28
"Computers in Communi ty Service: Can the Cultural Gap
be Bridged? Part Two," by
James F. Muench, 20/3 (Mar.),
20
Custom Computer Systems, "CCS
120 Remote Printing Station,"
20/2 (Feb.), 57
"CYBERNET/CENSTAT System," Control Data Corp., 20/2 ·(Feb.),
58

o
"DO 4314-1 Disk Drive," Potter
Instrument Co., Inc., 20/3
(Mar.), 50
DPMA: "Data Processing Management Association Observing
20th Anniversary," 20/4
(Apr.), 7
"Roster of Data Processing
Management Association," 20/
6B (June 30), 162
Daly, James, "Don Quixote" (Computer Art), 20/8 (Aug.), 23
"Daniel Ellsberg and the Pentagon Papers," by Edmund C. Berkeley and Daniel Ellsberg, 20/
8 (Aug.), 42
"Dartmouth College -- Nation's
Pacemaker in Educational Use
of Computing," 20/6 (June), 51
DASA Corp., "P~IR/50 Portable
Microfiche Reader," 20/1 (Jan.),
56
Data Access Systems, Inc., "Model 420 Portable Printer,"
20/3 (Mar.), 51
"Data Banks and Criminal Intelligence Systems," by Robert
Kahn, 20/7 (July), 59
"Data Banks -- A Posi tion Paper,"
by Prof. Caxton C. Foster, 20/
3 (Mar.), 28
"A Data Bank for Narcotic Addicts -- Comment," by Bruce
Madsen, 20/5 (May), 34
Data Disc Inc., "1771 Disc Memory System:' 20/5 (May), 44
Data extract package, "System/
360 Data Extract Package,"
MEQA, 20/1 (Jan.), 55
Data General Corp., "Jumbo Nova
1200 and 800," 20/5 (May), 43
Data input system, "GTU-l Interacti ve Data Input System,"
Hypertech Corporation, 20/5
(May), 47
Data Management, and Bruce Madsen, "What Is a 'Professional'?"
20/2 (Feb.), 9
Data preparation, "Cost Savings
Possible in Data Preparation,"
by William J. Primavera, 20/5
(May), 19
"Data Processing Can Be Cost
Controlled," by Rudolph E.
Hirsch, 20/12 (Dec.), 8
Data processing centers, "Social
Data Processing Centers in the
Form of Teleterminal Time," by
Joseph Auciello, 20/3 (Mar.),
34
Data Processing Div., IBM Corp.,
"Unit Inventory Techniques
for System/3," 20/3 (Mar.), 51
"Data Processing Education vs.
Data Processing Experience,"
by Phyllis Little, 20/6 (June),
44
Data Processing Management Association: "Roster of Data Pro-

27

Annual Index
cessing Management Association," 20/6B (June 30), 162
"Tax Treatment of Software -Proposed Ruling by the Internal Revenue Service Opposed,"
by Data Processing Management
Association, 20/6 (June), 63
"Data Processing Management Association Observing 20th Anniversary," 20/4 (Apr.); 1
Data processing network, "High
School Data Processing Network
Offers Specialized Computer
Training to Texas Students,"
20/3 (Mar.), 48
Data Processing Security, Inc.,
"Magnetic Tape Preserver," 20/
6 (June), 51
Data processing services, "Roster of Organizations Offering
Computing and Data Processing
Services," 19 (6B), 126
"Data Secretary," Redactron Corp.,
20/2 (Feb.), 51
Data Specialties, Inc., "TM/33
Teletype Tape Handler," 20/3
(Mar.), 52
Data storage unit, "Model DSU
Data Storage Unit," Pulse
Communications, Inc., 20/1
(Jan.), 52
Data Systems Auditors, Inc.,
"STENCIL," 20/5 (May), 44
"Data Terminal," Compudata Corp.,
Inc., 20/6 (June), 51
Data Test Corp., "Model 560
Multi-Channel Tape Reader,"
20/6 (June), 55
Data Usage Corp., "1005 Eliminator," 20/4 (Apr.), 48
Datachron Corporation, "TABS,"
20/4 (Apr.), 48
Datacraft Corp., "Datacraft
Model 6204/5," 20/4 (Apr.),
41
"Datacraft Model 6204/5," Datacraft Corp., 20/4 (Apr.), 41
Datapac, Inc., "Braided U-Core
Read-Only Memory (ROM)," 20/3
(Mar.), 50
Dataplotter, "230 Dataplotter R,"
Electronic Associates, Inc.,
20/3 (Mar.), 52
Datascan, Inc., "VertaTape, Paper Tape to Magnetic Tape Convorter," 20/3 (Mar.), 52
Datssonics, Inc .. "TAXCAL," 20/3
(Mar.), 51
Datum Inc., "Magnetic Tape I/O
System, Model 5091-P/8e," 20/
4 (Apr.), 49
David, Dr. Edward E., Jr .. "Computers and the Nation," 20/9
(Sept.). 12
Davison, A., and D. W. Honey,
"The Liverpool Congestion Control Scheme," 20/10 (Oct.), 8
Dayhoff, Ruth E., and Elaine A.
Roberts, "20,000 Lines Under
the Sea" (Computer Art), 20/8
(Aug.), 19
.
Dayton Gun Headquarters, "Tighter Control Over Guns Provided
by IBI
Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Producer                        : Adobe Acrobat 9.1 Paper Capture Plug-in
Modify Date                     : 2009:03:24 23:01:42-07:00
Create Date                     : 2009:03:24 23:01:42-07:00
Metadata Date                   : 2009:03:24 23:01:42-07:00
Format                          : application/pdf
Document ID                     : uuid:3ef8f616-5119-43a0-b72c-fa323980a543
Instance ID                     : uuid:1f09dd0f-bd68-4b81-8cbc-1abf2e597c3e
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 60
EXIF Metadata provided by EXIF.tools

Navigation menu