197205

197205 197205

User Manual: 197205

Open the PDF directly: View PDF PDF.
Page Count: 52

Download197205
Open PDF In BrowserView PDF
5

F SS

0

"

' Q S 5 &

SCIENCE · & TECHNOLOGY

May, 1972
Vol. 21, No.5

CD

"SAILBOA T"

-

Effective Management of an Instrument Pool
EDP Axioms - A Critical Analysis
Academic Computer Practices, and Their Deficiencies
Deciphering an Unknown Computer Program, as Compared With Deciphering Ancient Writing

~TECH180

1

U'.I.<-401. • .

TECHNICAL SERVICES
180 W SAN CARLOS ST
SAN JO~E CA

00808

*N

95113

D.
W.
H.
E.

H. Townsend
L. Sanford
E. Humbert
C. Berkeley

• If you could prevent just one important mistake before it happens . . . .
• If you could find just one good new path around an old obstacle . . . .
• If you could considerably improve your capacity to judge wisely ..
HOW MUCH WOULD THAT BE WORTH TO YOU?

We are publishing

The C&A Notebook on
COMMON SENSE. ELEMENTARY AND ADVANCED
It deals with one of the most important of all branches of knowledge, i.e., the subject of

WHAT IS GENERALLY TRUE AND IMPORTANT

=

+

+

+

+

+

+

+

+

Each volume includes 24 issues, newsletter style, plus several extra issues - "dividends" - free
to subscribers. Volume 1 has a total of 30 issues. (Subscription, $12 a year - amounting to 40 cents
an issue.)
We invite you to try the Notebook .... at no risk to you.

RETURNABLE IN 7 DAYS
FOR FULL REFUND, IF
NOT SATISFACTORY -

WHY NOT TAKE A LOOK? HOW CAN YOU LOSE?
Editor: Edmund C. Berkeley,
author, businessman, actuary,
scientist, computer professional,
first secretary of the Association
for Computing Machinery 1947-53,
editor of Computers and Automation.

For an idea of what the issues are like,
see the titles and summaries of the first
30 issues .... on the next page.

_______________ -:- _______ -(may be copied on any piece of paper) _______________________ _ _.J_
To:

COMPUTERS AND AUTOMATION
815 Washington St., R5, Newtonville, Mass.

02160

YES, please enter my subscription to the C&A Notebook on Common Sense at $12 a year,
24 issues (newsletter style), and extras.
Please send me (as FREE premiums for subscribing) the first six issues:
1. Right Answers - A Short Guide to Obtaining Them
4. Strategy in Chess
2. The Empty Column
5. The Barrels and the Elephant
3. The Golden Trumpets of Yap Yap
6. The Argument of the Beard
I enclose $
( ) Please bill me
) Please bill my organization
Name _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ____ Title_ _ _ _ _ _ _ _ _ _ _ _ _ __
Organization _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Addrcss __________ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
~

~

Signaturc _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
2

Purchase Order No. _______________
COMPUTERS and AUTOMATION for May, 1972

INVENTORY OF THE ISSUES OF

-

TITLES AND SUMMARIES

THE C&A NOTEBOOK ON COMMON SENSEI VOLUME 1
1. Right Answers -- A Short Guide to
Obtaining Them
A collection of 82 principles and maxims.
Example: "The moment you have worked out
an answer, start checking it -- it probably i sn' t right."
2. The Empty Column
A parable about a symbol for zero, and the
failure to recognize the value of a good
idea.
3. The Golden Trumpets of Yap Yap
4. Strategy in Chess
S. The Barrels and the Elephant
A discussion of truth vs. believability
6. The Argument of the Beard
The accumulation of many small differences
may make a huge difference.
7. The Elephant and the Grassy Hillside
The concepts of the ordinary everyday world
vs. the pointer readings of exact science.
8. Ground Rules for Arguments
9. False Premises, Valid Reasoning, and True
Conclusions
The fallacy of asserting that the premises
must first be correct in order that
correct conclusions be derived.
10. The Investigation of Common Sense
11. Principles of General Science and Proverbs
8 principles and 42 proverbs
12. Common Sense -- Questions for Consideration
13. Falling 1800 Feet Down a Mountain
The story of a skimobiler who fell 1/3
of a mile down Mt. Washington, N.H.,
and was rescued the next day; and how ;:~
used his common sense and survived.
14. The Cult of the Expert
Rules for testing expert advice.
IS. Preventing Mistakes from Failure to Understand
Even though you do not understand the
cause of some trouble, you may still
be able to deal with it. The famous
example of a cure for malaria.
16. The Stage of Maturity and Judgement
17. Doomsday in St. Pierre, Martinique -- Common
Sense vs. Catastrophe
How 30,000 people refusing to apply their
common sense died from a volcanic eruption.
18. The History of the Doasyoulikes
A parable in which the stern old fairy
Necessity plays a part.
19. Individuality in Human Beings
Their chemical natures are as widely
varied as their external features.
20. How to be Silly
71 recipes for being silly. Example:
"Use twenty words to say something when
two wi 11 do."
21. The Three Earthworms
A parable about curiosity; and the importance of making observations for oneself.
22. The Cochrans vs. Catastrophe
The history of Samuel Cochran, Jr.,
who ate some vichyssoise soup.
23. Preventing Mistakes from Forgetting
The commonest cause for mistakes probably
js forgetting. So~e remedies.
24. What is Common Sense? -- An Operational
Definition
A proposed definition of common sense
not using synonyms but using behavior
that is observable.
2S. The Subject of What is Generally True and
Important-- Common Sense, Elementary and
Advanced
COMPUTERS and AUTOMATION for May, 1972

26. Natural History, Patterns, and Common Sense
Some important techniques for observing.
27. Rationalizing and Common Sense
Coming to believe what you want tobelieve;
and some antidotes for thi s common mi stake.
28. Opposition to New Ideas
Some of the common but foolish reasons
for opposing new ideas.
29. A Classification and Review of
the Issues of Vol. 1
30. Index to Volume 1
Some Comments from Subscribers

Harold J. Coate, EDP Manager, St. Joseph, Mo.:
I believe these to be the best, if not the
most important, reading that I have had this
year.
William Taylor, Vice President, Calgary, Alberta:
Very good articles; something all managers
should read.
Edward K. Nellis, pirector of Systems Development,
Pit t s ford, N. Y. :
As I am involved with systems work, I can
always use one of the issues to prove a point
or teach a lesson.
David Lichard, Data Processing Manager, Chicago:
Thoroughly enjoy each issue.
Richard Marsh, Washington, D.C.:
Keep it up. All are good and thought-provoking -- which in itself is worthwhile.
Ralph C. Taylor, Manager of Research and Development, West Chester, Ohio:
Especially liked "Right Answers".
Jeffrey L. Rosen, Programmer, Toronto, Canada:
Your tendency to deal with practical applications is very rewarding.
As a new subscriber, you do not miss
past issues. Every subscriber's subscription
starts at Vol. 1, no. 1, and he eventually receives all issues. The past issues are sent to
him usually four at a time, every week or two,
until he has caught up, and thus he does not
miss important and interesting issues that never
go out of date.

PAST ISSUES:

(1) You may return the fi rst batch of
issues we send you, for FULL REFUND, if not satisfactory. (2) Thereafter, you may cancel at any
time, and you will receive a refund for the unmailed portion of your subscription. -- We want
only happy and satisfied subscribers.

GUARANTEE:

- - -(may be copied on any piece of paper)To:

- - - - - - - -

Computers and Automation
81S Washington St., Newtonville, Mass. 02160
YES, I would like to try the "Notebook on
Common Sense, Elementary and Advanced".
Please enter my subscription at $12 a year,
24 issues, newsletter style, and extras.
Please send me issues 1 to 6 as FREE PREMIUMS
for subscribing.
I enclose
) Please bill me.
Please bill my organization.

Name ________________________Title________________
Organization______________________________________
Address ___________________________________________
Signature _______________________.P.O. No. _________
3

Vol. 21, No.5
May, 1972
Editor

Edmund C. Berkeley

Assistant Editors Barbara L. Chaffee
Linda Ladd Lovett
Neil D. Macdonald

computers
and automation

u

Software Editor Stewart B. Nelson

u
AdvertisillR
Director

Edmund C. Berkeley

A rt Director

RayW. Hass

Publisher's
Assistant

Paul T. Moriarty

ContributillR
Editors

John Bennett
Moses M. Berlin
Andrew D. Booth
John W. Carr III
Ned Chapin
Alston S. Householder
Leslie Mezei
Ted Schoeters
Richard E. Sprague

Advisorv
Comi'I1'llee

The Computer Industry

James J. Cryan
Alston S. Householder
Bernard Quint

EditorialOffices Berkeley Enterprises,lnc.
815 Washington St.,
Newtonville, Mass. 02160
617-332-5453

AdvertisinR
Contact

THE PUBLISHER
Berkeley Enterprises,lnc.
815 Washington St.,
Newtonville, Mass. 02160
617-332-5453

"Computers and Automation" is published monthly, 12 issues per year, at 815
Washington St., Newtonville, Mass. 02160,
by 8erkeley Enterprises Inc.
Printed in
U.S.A.
Second Class Postage paid a.t
80ston, Mass.
Subscription rates: United States, $9.50 for
one year, $18.00 for two years. Canada:
add 50 cents a year for postage; foreign,
add $3.50 a year for postage.
NOTE: The above rates do not include
our publication "The Computer Directory
and 8uyers' Guide"; see "Directory Notice"
on the page stated in the Table of Contents.
If you elect to receive "The Computer Directory and Buyers' Guide", please add
$9.00 per year to your subscription rate.
Please address all mail to:
Berkeley
Enterprises Inc., 815 Washington St.,
Newtonville, Mass. 02160.
Postmaster: Please send all forms 3579
to Berkeley Enterprises Inc., 815 Washington St., Newtonville, Mass. 02160.
© Copyright 1972, by Berkeley Enterprises, Inc.
Change of address:
If your address
changes, please send us both your new
address and your old address (as it appears on the magazine address imprint),
and allow three weeks for the change to
be made.

4

8 EFFECTIVE MANAGEMENT OF AN INSTRUMENT [T A]
POOL
by D. H. Townsend, Lockheed Missile and Space Co.,
Sunnyvale, Calif.
How a centralized system for managing testing instruments was implemented and produced a large saving.
[T A]
12 EDP AXIOMS - A CRITICAL ANALYSIS
by W. Leon Sanford, Touche Ross & Co., St. Louis, Mo.
Many of the "rules of thumb" that did apply to first
generation and second generation computers no longer
apply to third generation computers in a third generation environment.
[T R]
48 IBM COMPUTERS INSTALLED AND ON ORDER
by George M. Luhowy, GML Corporation, Lexington, Mass.
Some estimates of the number of IBM computers installed and on order: new data in Monthly Computer
Census
29 On the Legal Side: COMPANY NAME SELECTION
by Milton R. Wessel, Attorney, New York, N.Y.

[T F)

40 liThe 1972 Computer Directory and Buyers' Guide",
18th Annual Issue - Notice

[T G)

Computers and Education
[T A]
16 ACADEMIC COMPUTER PRACTICES, AND
THEIR DEFICIENCIES
by Dr. Herbert E. Humbert, Director of Learning
Resources, Lorain County Community College,
Elyria, Ohio
An argument that indifference or antipathy towards
computers in education evaporates when faculty groups
(rather than other agencies) actually control computer
personnel and computer time.

Computers and Programming
[T A]
19 DECIPHERING AN UNKNOWN COMPUTER PROGRAM, AS CqMPARED WITH DECIPHERING
ANCIENT WRITING
by Edmund C. Berkeley, President, Berkeley Enterprises,
Inc., Newtonville, Mass.
The methods and principles used in deciphering the
ancient Cretan system of writing called Linear B; and
their utility and application in deciphering an unknown
computer program.

COMPUTERS and AUTOMATION for May, 1972

=

The magazine of the design, applications, and implications
of information processing systems - and the pursuit of
truth in input, output, and processing.

The Profession of Information Engineer and the Pursuit of Truth
28 Unsettling, Disturbing, CritiCilI ...
[NT F]
Statement of policy by "Computers and Automation"
6 THE DEATH OF THE DEMOCRATIC PARTY CAN- [NT E)
DIDATE FOR THE PRESIDENCY, 1972
by Ed mu nd C. Berkeley, Ed itor
A prediction, together with the grounds for it.

[NT R]
7 POLITICAL ASSASSINATION IN THE UNITED
STATES
Inventory of articles published on this subject in
"Computers and Automation" May 1970 to May
1972: Titles, Authors, and Summaries
[NT A]
34 DALLAS: WHO, HOW, WHY? - Part III
by Mikhail Sagatelyan, Moscow, USSR
A report published in Leningrad, USSR, by a leading
Soviet reporter about the circumstances of the assassination of President John F. Kennedy and their significance from a Soviet point of view: Part 3.
31

[NT A]
HOW FIENDISH CAN YOU GET?
by Helsingen Sanomat, Ian Low, and others
A round-up of information and news on the developments in "atrocity engineering" by the Pentagon and
other organizations.

Common Sense, Wisdom, Science in General, and Computers
3 The C&A Notebook on Common Sense,' Elementary
[NT G)
and Advanced
Titles, Thirty Issues of Volume 1, and Some Summaries
2 What May be the Most Important of All Branches of
Knowledge

[NT G)

[T G)

28 Missing Issues of "Computers and Automation"
[NT F)
by Stanley Jaffin, Arlington, Va., and the Editor
29 Ode in Celebration of R FPs
by Michael Lipp, Bogota, N.J.

Departments
41

Across the Editor's Desk Computing and Data
Processing Newsletter
Advertising Index
Calendar of Coming
Events
Monthly Computer
Census
New Contracts
New Installations
Who's Who Entry Form

29

51

44
45
30

[NT G]

Key

Computers, Games, and Puzzles
26 Problem Corner
by Walter Penney, CDP

[T C]

49 Numbles
by Neil Macdonald

[T C)

33 Advanced Numbles
by Neil Macdonald

[T C]

COMPUTERS and AUTOMATION for May, 1972

"Sailboat" was produced by B.C.
Munday, III, of Plantation, Florida,
and was one of the entries in the
Ninth Annual Computer Art Contest of "Computers and Automation" (see the August 1971 issue).
Five basic algorithms were used to
generate the points that produce
the sails; the hull and masts are
formed by standard point to point
plotting.
"Sailboat" was programmed in FORTRAN IV on a
SE L 840 MP computer and plotted
by a Calcomp 565.
"Computers and Automation"
cordially invites entries in the Tenth
Annual Computer Art Contest (see
page 40).

46

The Golden Trumpet
40 The Tenth Annual Computer Art Contest - Notice

Front Cover Picture

[A]
[C]
[E)
[F)
[G)
[NT]
[R]
[T]

Article
Monthly Column
Editorial
Forum
The Golden Trumpet
Not Technical
Reference Information
Technical

5

C- a
EDITORIAL

The Death of the Democratic Party Candidate
for the Presidency, 1972

As most of our readers know, "Computers and Automation" has published from May 1970 on, a series of articles
and reports on the assassinations and deaths of important
leaders in the United States who are opposed to the de facto
alliance of the military-industrial complex, the Central
Intelligence Agency, the Pentagon, and the office of the
Presidency, which has been carrying on the war in South
East Asia.
Among those who have died from assassination or from
alleged accidents in the 1960's are:
- President John F. Kennedy (shot by at least one
assassin, 1963)
- Senator Robert F. Kennedy (shot by at least one
assassin, 1968)
- Reverend Martin Luther King (shot by one assassin,
1968)
- Adlai Stevenson (died suddenly on a street in London,
1964)
- Waiter Reuther (auto workers union leader, killed
with 5 other persons in a chartered airplane accident in Michigan, 1970)
- Joseph A. Yablonski (shot with 2 other members of
his family in his sleep, 1969 - a miners union leader
who opposed Tony Boyle for president)
Also, Senator Edward Kennedy had an extraordinary and
still largely unexplained accident at Chappaquiddick Island,
in which he narrowly escaped death; and he has chosen so
far not to run for president this year.
It is reasonable to conclude that the United States contains a remarkably unhealthy climate for liberal American
leaders.
On the basis of the evidence that "Computers and
Automation" has published in the two years since May
1970 (see the list starting on page 7 of this issue), and
more evidence besides, I make the following prediction:

1. If the Democratic candidate for president is not
acceptable to the de facto alliance of the militaryindustrial complex, the Pentagon, the Ce-ntral Intelligence Agency, and the present occupant of the
Presidency, he will be eliminated before coming into
the power of the Presidency.
2. Senator Edward Kennedy and Senator George
McGovern are not acceptable.
What is the force opposing the fruition of the choice in
1972 of the American people for a different president?
Probably, about 10% of industry, business, and labor in
the United States, and 90% of the military have a profound
stake in military solutions to problems of the United States.
They are diverting to themselves upwards of $50 oillion a
year out of the United States budget"beyond the needs of
reasonable defense. This is large-scale theft, decorated
with the phrase "national security". They have convinced
6

themselves that the United States ought to spend billions
of dollars a year defending the interests of certain businesses, such as oil, all over the world, including South
East Asia. They are deeply opposed to communism (where
communism is defined as any system that does not permit
private ownership of the means of production). They are
killing Asians through air war at a rate of over 500
persons a day. They have killed more than 50,000
Americans in the war in South East Asia. Why not kill
a few more Americans at home who oppose them?
I am certain that most of the conspiracy is a "silent
conspiracy", groups acting together because of common
interests. But some of it is conscious conspiracy and
organizes the deaths. That is very simple for any organizations that may 4ave the efficacy of the Central Intelligence
Agency, which has not hesitated to use assassination and
death as instruments to attain power outside of the
United States. Examples: Ngo Dinh Diem in Vietnam;
Patrice Lumumba in the Congo; Che Guevara in South
America. The list goes on and on.
The point where serious danger to the Democratic
candidate becomes almost certain is when the nominee
for president of the Democratic Party becomes almost
certain. Take the example of Senator Robert Kennedy,
assassinated a little after midnight after his victory celebration in the California primary in 1968. The assassination of Senator Robert Kennedy made Richard Nixon's
victory in the election a very much safer bet. There were
10 bullets found at the scene; Sirhan's gun contained only
8. (See "Computers and Automation", August, 1970,
p. 48.) The sooner the liquidation takes place after it
becomes "clearly necessary", the better for the de facto
alliance. And all public-spirited citizens can go to his
funeral and mourn publicly - but ,the office of commanderin-chief, the Presidency, will still be safely in the hands of
the de facto alliance.
I deeply hope my prediction is wrong. But I am very
much afraid it is right. The stakes are too great for the
de facto alliance to ever again risk having another president
like John F. Kennedy.
As for the credibility, honesty, honor, and any other
possible virtues of the de facto alliance, the Pentagon
Papers released by Daniel Ellsberg, the Anderson Papers
on the Tonkin Gulf incident and on the deal between
ITT and the Department of Justice in which an antitrust
suit was called off for $100,000 (or $400,000) to be
given to the Republican Party, etc., provide a ·little of
the evidence of what these people really amount to:
thieves, liars, scoundrels, and killers, wrapped in a cloak
of words, illusions, and "holy war" against communism.

Edmund C. Berkeley, Editor
COMPUTERS and AUTOMATION for May, 1972

not one but two conspiracies relating to the
assassination of Senator Robert F. Kennedy.

Political Assassination In the
United States
56
Articles Published in Computers and Automation
May 1970 to May 1972: I nventory of
Titles, Authors, and Summaries

INDEX TO "SPECIAL UNIT SENATOR: The Investigation of the Assassination of Senator Robert F.
Kennedy"
An index is supplied for the Random House
book written by Robert A. Houghton, of the
Los Angeles Police Department, about the
investigation of the assassination of
Senator Robert F. Kennedy.
November 1970

May 1970
THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY:
THE APPLICATION OF COMPUTERS TO THE PHOTOGRAPHIC
EVIDENCE
by Richard E. Sprague
A reexamination of some of the evidence relating to the assassination of John F. Kennedy -- with emphasis on the possibilities
and problems of computerized analysis of the
photographic evidence.

30

44

CONFIDENTIAL AND SECRET DOCUMENTS OF THE WARREN
CO~~ISSION DEPOSITED IN THE U.S. ARCHIVES
by Neil Macdonald, Assistant Editor
A list of the subjects of over 200 documents
of the Warr~n Commission which ~ere classified confidential, secret, and top secret.

39

THE ASSASSINATION OF REVEREND MARTIN LUTHER
KING, JR., THE ROLE OF JA~ffiS EARL RAY, AND THE
QUESTION OF CONSPIRACY
by Richard E. Sprague
James Earl Ray says he ~as coerced into
entering a plea of guilty to killing Martin
Luther King ... and contrary evidence (plus
other evidence) have led to filing of legal
peti tions for "post-conviction relief".

45

THE DEATH OF WALTER REUTHER:
ACCIDENTAL OR PLANNED?
by Edmund C. Berkeley and Leonard Walden
Some significant questions about the plane
crash in May 1970 in which Walter Reuther
was _ki lled.

December 1970

July 1970
29

THE MAY ARTICLE, "THE ASSASSINATION OF PRESIDENT
JOHN F. KENNEDY: THE APPLICATION OF COMPUTERS TO
THE PHOTOGRAPHIC EVIDENCE" -- REPORT NO.2:
32 More About Jim Hicks
32 Confirmation of FBI Knowledge 12 Days Before
Dallas of a Plot to Kill President Kennedy,
by Edmund C. Berkeley
35 The Second Conspiracy About the Assassination
of President Kennedy, bv Richard E. Sprague

January 1971

August 1970
48

THE ASSASSINATION OF SENATOR ROBERT F. KENNEDY:
Preface, by Edmund C. Berkeley
Two Men With Guns Drawn at Senator Kennedy's
Assassination: Statem~nt to the Press, by
Theodore Charach
50 Map of the Scene of the Assassination of
Senator Robert Kennedy
51 The Pantry Where Senator Robert Kennedy Was
Assassinated
52 Bullet Hole in the Frame of a Door
53 Two Bullet Holes in the Center Divider of the
Pantry Door

48
50

February 1971
48

September 1970
39

48

PATTERNS OF POLITICAL ASSASSINATION: How Many
Coincidences Make a Plot?
by Edmund C. Berkeley, Edi tor, "Computers and
Automation"
How the science of probability and statistics
can be used as an instrument of decision to
determine if a rare event is: (1) within a
reasonable range; (2) unusual or strange or
suspicious; or (3) the result of correlation
or cause or conspiracy.

52

March 1971
35

"THE ASSASSINATION OF PRESIDENT KENNEDY: THE
APPLICATION OF COMPUTERS TO THE PHOTOGRAPHIC
EVIDENCE" -- COMI\ffiNT
35 I. ANOTHER VIEW
by Benjamin L: Schwartz, Ph.D.
A polemical attack on "The Assassination
of President Kennedy: the Application of
Computers to the Photographic Evidence"
by Richard E. Sprague published May 1970.
40 II. RESPONSE
by Edmund C. Berkeley, Editor, "Computers
and Automation"

45

DISTRICT ATTORNEY JIM GARRISON ON THE
ASSASSINATION OF PRESIDENT KENNEDY:
A Review of Heritage of Stone
by Neil Macdonald, Assistant Editor, "Com-'
puters and Automation"

COMPUTER-ASSISTED ANALYSIS OF EVIDENCE REGARDING
THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY
-- PROGRESS REPORT
by Richard E. Sprague
October 1970
THE CONSPIRACY TO ASSASSINATE SENATOR ROBERT F.
KENNEDY AND THE SECOND CONSPIRACY TO COVER IT UP
by Richard E. Sprague
.A summary of what researchers are uncovering
in their investigation of what appears to be

COMPUTERS and AUTOMATION for May, 1972

THE REPORT OF THE NATIONAL COI\IMITTEE
TO INVESTIGATE ASSASSINATIO~S
by Bernard Fensterwald, James Lesar, and
Robert Smith
What the National Committee in Washington,
D.C. is doing about computerizing files of
evidence, initiating lawsuits to obtain information, etc., and comments on two new
books by District Attorney Jim Garrison and
Robert Blair Kaiser.

(please turn to page 50)

7

Effective Management of an Instrument Pool
D.H. Townsend, Supervisor
Standard Tool and Instrument Operations
Lockheed Missile and Space Co.
P.O. Box 504
Sunnyvale, Calif. 94088

"Utilization of the instruments included in the Instrument Pool Data System has increased
from 56% to 87%, and the number of instruments has decreased from 20,000 to 12,000
with no loss of effectiveness."

The Basic Pool Function

In the early years of a rapidly expanding new company, management decisions must be made to establish
tool cribs, instrument pools, office supply facilities, etc. At the Lockheed Missile and Space Company (LMSC) this problem became rather significant in
late 1961 in relation to the test instrument inventory. During this period LMSC was growing by leaps
and bounds as was this expensive inventory. From
essentially no inventory in 1957, the number of calibrated test instruments had grown to over 45,000, with
a value of approximately $30,000,000, by 1963. These
instruments were custodially assigned to organizations
throughout the plant.
Interest in a pool concept was emphasized through
the results of both customer and corporate audits conducted during this period. An Instrument Pool would
provide the disciplines considered lacking at the
time, namely:
a. Centralized management
b. Increased inventory flexibility
c. Common control systems
d. Improved utilization
e. Lower calibration costs.
Implementation

The implementation of the Instrument Pool .at IMSC
could only be accomplished through the complete awareness of top management that the need existed and positive benefits would be realized. Management was
aware, by early 1962, that action must be taken to
effectively control the dramatic instrument inventory
growth and realize the five benefits identified above.
Company policies and procedures were established in
1962 that basically created the Instrument Pool functions and responsibilities that exist tOday. These
policies and procedures stipulated that all calibratable, general purpose, portable test instruments
were to be controlled by a centralized Instrument
Pool Organization. Based upon these established
functions and responsibilities an Instrument Pool
organization was created and m~nned in mid-1962.
Crib facilities were planned and initial control
systems established.
The major difficulty at this point was to effectively motivate test organizations to comply with the
intent of established company policy. This was primarily accomplished through a company wide publicity
campaign entitled "Operation Roundup". The campaign

8

was carried out through a company letter signed by
the general manager instructing all managers and supervisors to transfer property to the pool as outlined
in the "Operation Roundup" instruction packet issued
to them. The campaign was also widely publicized
through the company newspaper. The overall effect
was awareness of management's intent at all levels of
the company structure. Most importantly, each division was given a goal they were to attain in order
to effectively accomplish the objectives of the campaign. Weekly tracking information was circulated
to top management reporting the ability of each division to attain targeted goals. "Operation Roundup" was completed in December, 1963 with the transfer of approximately 5,000 items to the Instrument
Pool.
At this point, a significant effect was achieved
that would pay considerable dividends in years to
come; namely, the awareness of all test instrument
users of the purpose of the Instrument Pool and the
interest of top management in its success.
The Instrument Pool Organization Today

As mentioned earlier, the test instrument inventory had grown very rapidly in the first six to seven
years after the company was founded. The pool was
created to control this growth and ensure centralized
management of general-purpose equipment. This function of the pool was achieved rather quickly through
a reduced total inventory growth rate and the concurrent increased control the pool exerci sed over the
inventory. The Instrument Pool inventory grew from
approximately 2,000 in 1962 to over 20,000 in January.
1967. The inventory currently consists of government
funded facilities and special test equipment in addition to Lockheed funded equipment.
During the initial coordination and planning with
the test labs in establishing an Instrument Pool, it
became apparent that Instrument Pool control stations
should be located in each of the major buildings rather than having one centralized station servicing
the entire facility. This philosophy is practiced
today with five control stations located at strategic
points throughout the plant. Each of the stations
also act as a depot for the pickup and delivery of
all instrumentation requiring calibration. Specially
designed instrument carrying trailers are pulled by
tugs for the movement of instruments between stations
and the centralized calibration laboratories. One
station exists which, to a large extent, exemplifies
COMPUTERS and AUTOMATION for May, 1972

r~
I

Photo ·No. 2

Photo No.1

Photo No.3
COMPUTERS and AUTOMATION for May, 1972

Photo No.4
9

a primary benefit of a strong Instrument Pool. The
Storage/Retirement Station typically has an inventory
that ranges from 800 to approximately 1900 and has
been the clearing house for over 25,000 excess instruments in the past five years. Each of the major stations is manned by an industrial engineer with electronics and test lab experience in addition to a sufficient staff of station attendents to satisfactorily
control the inventory. There are three engineers and
nine attendants performing this function at the present time.
The single most important element in the control
of any inventory of this size, diversity, and value
is a system that will adequately and accurately report
the condi tions of the inventory wi thin reasonable cost.
Instrument Pool Data System

The present Instrument Pool Data System (IPDS)
consists of RCA Remote Data Input (RDI) terminals in
each station which process inventory status data to
a central computer system as each transaction occurs.
The data consists of the instrument property tag number, description, borrowing employee number, loan date
and promised return date.
The current system is the outgrowth of a first phase
charge-a-plate, five part loan form that required considerable manual filing and keypunch support in addition to efforts to decipher the handwritten data entered by the attendants. This handwritten data included loan dates, instrument description, borrowing employee data, etc.
The second phase was the conversion of the station
records to prepunched tab cards contai ni ng the identi ty
and description of each item and requiring only the
entry of each specific transaction on the loan cards.
This second phase required periodic collection of all
loan cards and considerable keypunch support prior to
batch processing to the computer for the generation
of utilization reports. This involved the collection
of approximately 15,000 loan cards, keypunch processing, verification and return of the original cards
to the submitting station. This whole process had to
be completed in 7 working days on a quarterly basis.
The result of this effort was a test instrument utilization report which was never seriously used as a
management tool due to the high data c'ollection and
processing error rate. .
The current system requires. little keypunch
effort. The status of the inventory is automatically maintained by the station attendants as the
transactions take place through the use of remote
terminals. (Photo ttl). Based on this information
the IPDS generates three reports -- a weekly, biweekly, and a monthly.
These reports are:
1. Weekly Inventory Status Report
2. Bi-Weekly Loan Recall Report by Organization
3. Monthly Utilization Report
The implementation of the OPDS in November 1967
has accounted for the highest instrument retirement
levels achieved at LMSC: 6000 in 1968, over 5800 in
1969 and 4088 in 1970. The utilization rates, based
upon days available for loan vs. days on loan, have
increased from 56% to a high of 87%. The inventory
has been decreased from a high of over 20,000 in
January 1967 to approximately 12,000 today with no
loss in the effectiveness of Instrument Pool functions.

10

During initial installation of the Instrument
Pool Data System (IPDS), it was particularly important to obtain the cooperation of the station attendants in the use and benefits of the Remote Data
Input (RDI) terminals. Job instructions were written and modified as needed based upon suggestions
from the attendants and engineers. Concurrently,
training sessions were held explaining the use and
benefits of the RDI terminals and the workings of
the computer system. The uses of the computer reports were explained and most importantly, what information these reports would provide.
Monthly Utilization Report - Exhibit A

The first reliable utilization report generated
by the system indicated that 56% of the inventory
was on loan with 44% on the shelf -- idle. The first
reaction was to consider the report inaccurate and
of no use. Inventory audit samples, however, proved
the report to have considerable validity. The
monthly utilization report is currently the basic
source of data for determining inventory excesses,
developing retirement decisions and justifying procurement needs. Current figures average around 80%
on loan with a high of over 87%.
The report detail identifies for each unit within
a manufacturer/model the percentage utilization for
the past six months. The six month figure is used
to stabilize decision making as related to the possible variances that may be experienced in monthly
data.
Currently the utilization report is analyzed on a
bi-monthly basis to determine those specific instruments having less than acceptable utilization. This
information is then keypunched and listings prepared
for each specific Instrument Control Station. The
cards are routed to the responsible engineer for re.tirement disposi tion or retention justification.
Weekly Inventory Status Report - Exhibit B

The weekly report identifies the status of each
instrument within the Instrument Pool as of the previous Friday. Each Monday this report is routed to
each control station and also the central procurement screening desk for status reference. This report is sequenced by instrument manufacturer and
model and identifies if the instrument is on loan,
in calibration, storage or pending retirement. If
the item is on loan it identifies the borrowing employee by name and number, his department, the day
the item is to be returned, and if overdue from
loan, the number of days overdue from loan and the
calibration due date.
The information provided allows each Control Station to have access to the information as to the
availabili ty of all the test instruments assigned to
the Pool. There is no need to call other stations
in the plant on a hit or miss basis. The calls are
limited to those stations that have equipment available. If none are available and an item is in calibration, a request for expedited calibration is negotiated and the request satisfied in this manner.
Bi-Weekly Instrument Pool Loan Recall

The bi-weekly report identifies all the Instrument Pool inventory overdue from loan. The report
is sequenced by department number and then by employee name listing each instrument overdue from
loan charged to that employee. The sequence of the
report was deliberately established by employee name
COMPUTERS and AUTOMATION for May, 1972

Exhibit A

Monthly Utilization Report
TOR 064-71

OF.TAIL U-1SC

PAGE

INSTRLMENT POOL EQUIPMENT UTlLllATICN FOR THE SIX MONTHS ENOED 10-30-71, "'FG DAY 863

20

----··---··--o--r"------------------L-A-s,-T-cS--:"I-X-Mo-N-T-H-S,--------L-A~ST=--M..,O,.,.N-::T".,Hc-:-:-N-N'-O-.--:O,-:-N,--:-:"M:::-FG::---cC:c"U"'"'R--::C-,-A:-L7
IB::------

-.MANllEAC.:ruRER

O"NG W Y
CR IBN 1'.PBOP~BT.Y.

MODEL. _. __ NCUN .___

BARBER COLMAN

6024-2600

RECCROE~

BARBER COLMAN

74C3-1

CCNTRCLLER

709'> L 1

BARBER COLMAN

74(:3-11108 CCNTRCLlER

7099 L 1

OYS ---PERCENTAGE UTILIlATION---- A TRN LOAN CAY STR CUE DATE YR
_(;~I,.IB_TO.TA1_LQA~L C~LIB..LX_NS___ I.L_IN!' -.!l_YS_'lO_I!!...Y.!L~.f--i

J AC NO. _A'LL LO_AN
127

96.1

5.5 101.6 1 0 0 . 0 . 0

78496 00 127

47.2

3.1

TOTAL

.0

16.0

_12_1 .. _47 ...2

.0

16.0

78497 00 127 100.0

.0 100.0 100.0

.0

TOTAL

BA-:-R-B-=E-=-R-C=-0=-L:-M=-A:-N-~7-,-4-03---:1:-1-:1-0--'B-C

CNTRc:l

LE R --·-----T-O-T-A C- _. - · - - - - 1 2 7

SCURCE I-R
BARNES ENGINHR RSBB

SOURCE

BARNES ENGINEFR TCBB

CCNTRCLlER

. 7C99 L 1

I-I<

CONTRCLLER

.._.0.100.9 __ 100.0

.C

127 100.0

.IJ 100.0 100.0

.0

59467 00 127 100.0

.0 100.( 100.0

.0

,0 100.0 ~.O.Q.O

_._C.

127 100.9.

TOTAL

.Q lQQ.,8.100.0

.0

127 100.8

.0 10C.6 100.0

.0

13371 OC 127 100.8

.0 100.6 100.0

.0

CO 127 100.0

.0 100.C 100.C

.C

127 1CO.0

.0 10C.0 100.0

.0

"'SL . 22ll0. OiL. 1.27. 100.0

_.0 100.C H2.0.0

.0

.Q

127 100.0

.0 100.0 100.0

.0

o

.0 10C.8 1CO.0
.0 100.8 100.0
.0 100.8 100.0_

.0
.0

.0 100.8 100.C

.0

10PSI

GAGE PRESS

TOTAL

BARTON INST CO

10f'PSI

----" --.GAGE PRESS

------..----- --- - .. - 7092 N 4

.J3ARlillL.J NS.L '.0._1 ClI)P SI _._ GA_GE. P R. E SS
BARTON INST CO

15PSI

GAGE PRESS

BARTON INST CO

15PSI

GAGE PRESS

BARTON INST CO

30PSI

GAGE PRESS

cn

50PSI
50PSI
.SQP_Sl

GAGE PRESS

5CPSI

GAGE PRESS

GAGE PRESS

8ARTON I NST

BARTON INST CO

S

BALANCE

.1lECKER.. C.HRlS_CD...l\.a-4 .

BALAtlCE

BECKER CHRIS CO SG7

7092

N 4

436

TOTAL
7092 L.4
TOTAL

TOTAL

254 100.8
MSL

75982 00

LHSC

INSTR~"'E~T

TOTAL
7099 L 4

P~CL

HSL

66735 00

It.~tt.T[HY

av

L~~IhG

Ckld

o T
F 4

f

ACTIV

STRD

o

ACTIY

a

PiluPERTY TAG NO. r-;Cl't.
F 501542 STF
bE('KI"JlI\ 11\5TI--

7So~

F
N
F
F
F

2
2
3
2

S1205

60S4 "'" CSCILLATCR
17~15 v~ (SCILLATCk
>42ees Lv CSCILlATOR
47
42t~ ~t CSCILLATGR

EHK"A/\ I:-'S11<
EElKHAt. II\':'T;':
BU.K.'Al\ 11\511<
Et:LKI"A/\ jl\Slf,.

7:;:;1.:1\

101

N
N

S1708~

N 3
L

1

F

3

l

4

L
L

L 1

co

CSCILLATOR

(C CCuNTcrt

7e9£
7C'>2
1 ;;99

61111511

6j

11 72
I I 72

2

4 72

b"

:( 821

u)

i'4ElEl< PH

M· E1723 UO ~YGR(.~cTl::R
M 16ea7 co HYGMC~ETcR
M 76686 CO hYGkGI'ETEK

DC:

11 d; 71

I ..
14

61

750:-h

5, 11 ,6 71

56

tijv.R

7095

L2

bECKMAI\ Il\STk

~6

I;;ELKMAl\ Il\STi(
BECKMAI\ 11\5Tk
HCK~.A/\ 1/\::,T"

97(,_'-'

1'-~4

S7v~J

,iL9S
7.;95

91-·0"

,,6
t2
62

Z£ 1£
Lt 72

17
12

17
I2

32
:;2

910 Eo CCMLING
6544
910 .. E Hell S E M'~A'"N:------,7:;c3;-;1!-;4;------

58

22

900 AJ

SSl

7C94

6<;'

99S

1(.94

te,

N 4
F 4

Lv OSCILLATCR
C~

CSCILlATCR

tEHLKAN thGrt (e h-AIB
EtHLI'AN EI\Gk LL ~-.la

71.99

5tS273

62
1 28 72
(3 12 31 71

53
174

F 4

S 5776€t

~.

esc IllA TeR

BE:HL'-':Al> El\GR L(

4 7<-

177

72

1~9

N 4
N 4

17t31

O~

PO~E~

SUPPLY

1~S9

[.$(1-4,,,,

hS9

(;4

EI\GR Cc CS(1-8~~
EthL~Al\ E~GR CL cS~I-a~~
BEHL~AI\ tl\GR CC O~Cl-8u(
EEHLI"AI\ i:I\CR CC U5Cl-B'JeJ
EEhLMAh [I\GR CL USCl-800

7:82

b':i

7C92
1L92

0"

7~92

U'r

7(99

;;\.

BEHL~Ah

1~94

63

7\.91
7(92

(~

t~HLMAh

tNGR CC RlclA

~INSLLw

7..)72

7 12

11\5TI<

M

7570

9C3 SJ RACle

II\SIR

'C

7072

920 JC

~ECK~AI\

1

882 JC hINSLOiN

~5

Et(~MAl\

F 2

4

42

CO TESTER Ie

l

6434
1570

56

91646 GL TESlER 1(,

4
4
4
4

920 JE llUkNS
862 OJ PLLHI:

33

Slt47

N
N
N
N

4

42

~6

i

'>63386 0~ CSCILLATCR
E989 LC CSClLlA1LK
7554 ~J CSCILLATCR
9053 Q~ CSClLLATCi<
8il72 1.0 (SCHLATCR

14
b

33

2 25 72

L I

N 2

8434
b434

4 1£

L

~C:4

67B RL RICHAkCS
899 RL RICHAROS

64
21

7~u·Jk

453715 OG COUNTl::k
I'SL

138

75t:~h

B!:LKMA!, I1,ST I<
bl('lqiAl\ Ii,5TH

<.

C ..

8
4

"

eA~MAN

4804

13- 865 vY LEE

7S44

7- 811
21
899 DB hCOOARD

I'.Sl
8434

72

8- 870
9152 U( OSCIlLATCR
9151 UC CSCILLATCR

EEhL~Ah

Et.GR CO
tEhLMAN EI\GR C(

COMPUTERS and AUTOMATION for May, 1972

I-lBuJ
l-i8~(

Lv

6 I t 72
72

(please turn to page 30)
11

EDP AXIOMS - A Critical Analysis
w.

Leon Sanford
Touche Ross & Co.
Railway Exchange Bldg.
St. Louis, Mo. 63101
"Data processing is so young a field that none of its self-evident truths" can be
accepted as true without questioning and validating.

This article is not intended to convey the idea
that computer programmers and systems analysts are
either unintelligent or naive -- in fact my experience has indicated that they are generally above
average in intelligence, highly motivated to perform
their job, well qualified (technically), logical in
their approach to problem solving and generally work
20% more hours per week (without pay since most are
salaried) than th~ir counterparts in business. However, this article is written from,the businessmen's
point of view and from this angle the author recognizes several habits that bear closer scrutiny.
In this article, the author takes to task several
"rules of thumb" currently being appl ied on a day-today basis by computer programmers and sy.stems analysts.
These "rules of thumb" were logical when developed
during an earlier era of computers, but for various
reasons are no longer val id. One of the reasons that
these items have not been subjected to more scrutiny
is that today's "third generation" EDP manager was a
programmer or systems analyst when these axioms were
developed and they were logical at that time. Unless
these "rules of thumb" are quickly subjected to an
objective review, today's manager will find that he
is attempting to enforce a set of outdated standards.
Third-generation "novice" programmers and systems
analysts, those never exposed to first and second
generation computers, will probably be the key "to the
detection of, and hopefully correction of, illogical
procedures being employed in the day-to-dayoperation
of the average EDP shop. Today's EDP managers would
do well to listen intently when questions are raised
and suggestions are put forth by neophyte systems
analysts and programmers. It can be tough, even for
the most astute manager, to listen objectively as a
fledgling programmer or analyst questions the validity of (pseudo) standards in daily use by an EDP
shop, but the manager must listen if the EDP function
is ever going to attain real stature in the typical
company.
What Are EPP Axioms?

Upon close inspection it becomes readily apparent
that data processing just like any other field of
endeavor has developed a "folk lore" that is being
passed from (computer) generation to generation of
computer specialists. This means that new generations are springing up every five years. I have
chosen to refer to the components of this""folk lore"
as axioms since they represent:
- Maxims that are widely accepted on their
intrinsic merit "(one of the characteristics of an axiom according to Webster's
dictionary)
12

- Propositions that are regarded as selfevident truths (ibid.)
In the author's opinion there is a great danger
involved in the application of seemingly "self-evident" truths that have not withstood the test of
time -- data processing is so young relative to other
fields that none of its "self-evident" truths have
been exposed to the jaundiced eye of the non-believer
over an extensive period of time. Though it is undoubtedly true that a number of the axioms currently
employed by data processing personnel will withstand
the test of time, the author firmly believes that
several of these EDP "golden rules" are of doubtful
value and others are totally worthless. This article
is devoted to a discussion of selected EDP axioms
that, in the author's opinion, are producing negative
and undesirable results.
"Axiomatic" Phrases

The following phrases are indicative of EDP axioms
being employed:
1. "Reject all transactions as early as possible
in a system ------".
In other words: Incomplete or erroneous transactions should be detected and rejected as soon as
possible in a computerized system.

2. "Programmer A's programs, eat up core as
though it were going out of style".
In other words: Emphasis should be placed on reducing each program to a minimum core size to
promote operational efficiency.
3. "That program is no good (i t is process
bound), it cannot be used in a multiprogramming
environment".
4. "We are going to be a mUltiprogramming
shop -- we must develop programs which will function in a multiprogramming type environment.
In other words: Multiprogramming is the key to
the future and new systems should be designed
to function in a multiprogramming environment.
5. "Wish we could get rid of those tables in
our programs, it seems as though we are constantly
recompiling programs to add or change items in
these tables".
In other words: Having to recompile programs to
change data in tables is a necessary evil which
must be endured because the use of tables is such
a powerful feature of the computer.
6~ '''An Operations Supervisor is giving instructions to the night shift operators" "Don't forget
this is the last day of the sales month for XYZ
system; today is Friday and program 1204 must be
notified to purge the weekly production data ____

ft.

COMPUTERS and AUTOMATION for May, 1972

In other words: Having computer operators respond
to automated systems to indicate such things as
last day of sales month, today is Wednesday, etc.
is unde~irable, but to do anything else is too
time consuming and/or complicated.
Each of These Axioms Is Being Overemphasized
By Many EDP Shops

In the author's opinion the preceding axioms are
being overemphas ized by many EDP shops and this overemphasis is detrimental to the EDP profession inparticular and to organizations in general because:
• The reason for employing some of these
axioms no longer exists and has not existed since the advent of 3rd generation
computers.
• Better alternates exist and should be
employed just as fervently as the axioms
are being applied today.
• Undue emphasis is being placed on techniques that are destined to be obsolescent in the near future.
• The axioms are being applied as absolutes,
when in fact they should be applied based
upon the characteristics of each individual situation.
Invalid Transaction

(Axiom ~l): Invalid or incomplete transactions
generally should not be rejected.
The axiom that invalid or incomplete transactions
should be detected and rejected by a computerized
system as quickly as possible is absurd today - good
computer programs always test each transaction for
~ errors before rejecting them which is logical,
but the early rejection of transactions containing
errors should be avoided. A well designed system
should handle errors in this way:
- Test each transaction for all error conditions
and notify the user of each error detected.
- Hold the·error transaction in limbo (generally
by logging the transaction onto a disk) until the
user has supplied the missing information ~ the error
listing generally can be designed such that it is a
turn-around document for the re-entry of incorrect
information.
- Continue to highlight erroneous, incorrect or
missing data elements. Having the automated system
"remember" the status of rejects eliminates the need
for elaborate control systems to assure that rej ~cted
items are resubmitted, since the system will automatically highlight all errors during the next reporting cycle.
- Hold errors in.abeyance to facilitate the generation of error statistics (by type of error encountered) and the number of corrective attempts made.
NOTE: This philosophy is just as valid with online data entry applications as off-line applications. Consider the situation in which the terminal
operator is keying data as it appears on her source
document, but the automated system is telling her
that a field is in error because of a logic test:
It is generally best, in the interest of efficiency,
to accept the partial transaction and log it on a
disk error file if the reason for the rejection cannot easily (and quickly) be determined. The system
should always highlight such inconiplete transactions
during successive reporting cycles until the missing
data has been supplied and the transaction can be
handled as any other valid transaction.
COMPUTERS and AUTOMATION for May, 1972

Saving Core

(Axiom ~2): Programmers should not be given blanket instructions to save core.
Core storage is the most economically priced component of today's computer, relative to its capabili ty to perform. In the author's opinion core storage
was moderately priced in the second generation; its
cost was halved with the third generation and it is
currently being slashed again with the 3~ generation
computer models being announced.
To dramatize, let's take a look at typical ways
in which programmers conserve core storage:
- First, he shortens all of the long descriptive error messages so that they become meaningless.
- Second, he resorts to the elimination of
all descriptive error messages and provides an error code instead.
- As his next to last resort, he will combine several different error messages
under one code. This particular aspect
of core conservation has caused untold
hours of wasted effort on the part of
users who must analyze each error in an
attempt to decipher the real reason a
transaction was rejected.
- The last resort is to reduce the blocking
factor of one or more files; programmers
hate to do this because this step makes
their programs operate less efficiently.
Some programmers never determine how much
longer the program will run (30 seconds
or 14 hours) in order to evaluate this degrading of their system against the overall benefits to be gained.
Process-Boufld Programs

(Axiom
fective.

~3):

Process-bound programs are often ef-

In the average (business oriented) computer shop
it is common for process bound programs to be criticized by operations personnel because they cannot be
efficiently run in a multiprogramming environment.
To determine whether such a program is good or bad
it is first necessary to ascertain why the program
is process bound. Common reasons are:
1) Poor systems design.
2) Sloppy or illogical programming.
3) Extensive logic checking between input/
output instructions.
4) Extensive arithmetic manipulations between input/output instructions.
Naturally, if a program is process bound because
of poor systems design or illogical programming
techniques, it should properly be criticized and the
errors corrected as quickly as possible if practical.
If, on the other hand, the program is process bound
because it performs extensive logic checks or does
massive arithmetic calculations and is thus "properly" process bound, it will seriously degrade the
performance of any input/output programs that are
being run at the same time, and thus it will be a
poor candidate for use in a mul tiprogramming environment.
The percentage of properly designed programs that
logically are process bound has been steadily increasing for several reasons:
13

• The experience level of systems analysts
and programmers has increased significantly; experienced personnel tend to design and implement more complex systems
(which generally means numerous logic
tests) which are more likely to be process
bound.
• The mere fact that recent generations of
computers have large core storage capacity
has tended to encouraye the creation of
larger, more sophisticated programs. It
is a well known fact that you quickly
reach a point of diminishing returns by
increasing record blocking factors as a
means of utilizing increased core, storage
-- operating efficiencies quickly diminish
after block length exceeds a few thousand
characters plus the fact that manufacturer
supplied sorts have relatively small maximum block sizes. Once these optimum block
maximums have been reached, it is only natural for programmers and analysts to expand programs in an effort to utilize as
much of available core storage as possible.
• The systems being implemented today are orders of magnitude more complex than their
predecessors -- this additional complexity
usually translates itself into additional
logic and/or arithmetic instructions and
an increased likelihood that a program will
be process bound.
Multiprogramming

(Axiom U4): Multiprogramming may not exist in the
fourth generation.
To put this axiom into its proper perspective we
must realize that multiprogramming today exists for
one basic reason -- The Fact That The Central Processing Unit Is Much Faster Than The Average Input/
Output Device and thus the cpu is often ~dle while
waiting for input/output operations to be completed.
Multiprogramming is the interim solution created
to improve the productivity of the cpu by allowing
it to control the I/O units of two or more programs
at the same time. Consequently, the need for multiprogramming will eventually disappear (in the author's
opinion it may well occur with the 4th generation of
computers) :
• Let us assume that the major'input/output
device of the future will bea mass-storage device (s).
• Let us further assume that present increases
in efficiency continue to the point that
such mass storage devices are so fast that
no cpu is fast enough to handle two input/
output operations while executing other
instructions.
An initial tendency might be to criticize a cpu
that is not fast enough that it can handle such high
speed I/O devices, but in fact we will have improved
the situation greatly by establishing a proper bal-'
ance between the speeds of the two components of the
computer. In fact a situation in which the speeds
of the two components were the same would be a major
improvement over today's multiprogramming environment
-- such a situation would have removed the imbalance
that initially gave rise to multiprogramming (a mismatch between the speed of the cpu and I/O devices).
It Is Not Outside The Realm Of Possibility That
The 4th Generation Of Computers May Create a Need For
14

"Multi-I/O-ing", the opposite of multiprogramming -where I/O devices are faster than cpu's such that two
or more cpu's must function in tandem to keep p~ce
with an I/O unit.
Table Look-Up

(Axiom U5): Data for table look up operations
should not be part of source programs
The practice of including the elements of a table
lookup operation as part of a computer program necessitates recompiling the program each time an element
must be added or changed. More logically, the data
for all table lookup operations would be stored on
disk and read into core each time the program is run.
Changes to tables would be handled just like the updating of any master file -- the user does it as a
clerical function. In this environment an update
program is written to handle changes and/or additions
to all tables on disc. A single, generalized routine
is inserted in each program to retrieve the tables
required for that particular program.
Operator Responses

(Axiom U6):'Operators should never have to respond
to a system: Today is the last day of month; Today is
Monday; today is a holiday; today is the 5th of the
month; etc.
Operators have traditionally had to make this type
response to computer programs to permit the program
to determine if files are to be purged; if payroll is
being run at mid-month or at the end of the month; if
today is sales closing, etc. A system can be designed whereby data concerning day of month, week,
etc. is placed on a disk and each individual program
makes its own determination (with nothing more than
current date) as to what special things are to happen
each processing cycle. This type of system gives the
operator an option to override any automatic decision
made by the computer. In one instance a system has
been operational for a number of years, when the computer programs are able to determine the prop~r,
course of action to take each processing cycle with
90% accuracy -- the operator overrides the programs
10% of the time.
Business Benefits Should Be Emphasized

Finally there is a general criticism of the EDP
function, which is not specifically related to the
axioms in this article, that must be mentioned.
This is the continuing need for the EDP technician
to become much more cognizant of the business benefits he and his automated systems must provide. lie
must be willing to acknowledge that technical perfaction does not always result in satisfied users,
nor does it necessarily provide profitable results.
In a large company a computer program is constantly criticized by EDP technicians because it
cannot be used effectively in a multiprogramming environment. From a technical point of view these
computer professionals are to be congratulated
(their timing tests proved that the program was process bound 97% of the time) upon the conclusion
reached. However, if the business benefits had been
considered by those individuals it would have been
readily apparent that whether or not the program was
"process bound" was irrelevant, -- a program which
produces a quarter of ~ million dollars in benefits
(as is projected for this one) throughout its useful
life could have a number of undesirable aspects from
a technical point of view and still be perfectly
sound from the businessman's vantage point.
COMPUTERS and AUTOMATION for May, 1972

Had the businessman's perspective been utilized
in the foregoing example, not one minute would have
been wasted to determine if the program was input/
output bound (and thus a good candidate for multiprogramming) -- the benefits are so staggering that
this program must be used regardless of whether or
not it is practical for another program to be run at
the same time. Other examples of "technical excellence but business folly" that the author has encountered are listed below.
• A programmer once boasted to me about his
inventory reporting system that produced 66
boxes of output (at maximum printer speed)
each month. The problem here is that a
whole army of human beings could not possibly assimilate this much data.
• A system manager once convince~ a user that
he did not need a particular systems improvement because it would increase computer run
time by 10%. The program in question required 20 minutes per day and would have an
additional 2 minutes with the modification.
This particular computer center has a minimum of 5 hours per day available on each of
its 1. computers.
• Some programmers like to keep refining programs to obtain the maximum rated speed of
one or more input/output devices and/or reduce the number of micro-seconds for a complex arithmetic operation. Generally speaking, these minor improvements are worthless
unless the EDP shop is nearing its computer
capacity (on a 24-hour basis).
Standards for Measuring Performance

The time has come for computers to be measured by
the same standards as any other tool. The same
should apply to data processing people. Management
criteria such as objectives, results, benefits and
budgets are just as applicable to data processing as
any other segment of the business. The following
elements (though not an all-inclusive list) should
be utilized in managing any business-oriented EDP
function:
1. Potential projects to be automated are identified and given priorities for development based on
the cost to develop versus the benefits to be realized from implementation of the system.
2. Emphasis will be placed on implementing projects in the sequence which produces the best net
cash flow.
3. Sophisticated project control techniques will
be utilized to plan and control projects. Such a
technique will include:
a. A defini tion of the maj or tasks, to be performed to install each project.
b. Identification of the various types and
quantity of technical skills required to
perform each task.
c. The assignment of overall project responsibility as well as responsibility assignment
for each major task.
d. A periodic reporting mechanism that accurately records the status of partially completed tasks in addition to the status of
fully completed tasks.
e. A definition of the sequence in which tasks
must be implemented and an identification
of the "critical" items that will determine
the final implementation date.
4. A "creeping-commitment" approach will be utilized whereby each project passes through several
COMPUTERS and AUTOMATION for May, 1972

"go" or "no go" stages and any decision to continue
is based upon the latest information available regarding benefits to be gained and further implementation costs to be encountered.
5. Documentation should be produced as a normal
by-product of the systems management process, thus
making it possible to interrupt any project (because
another project logically should be given a higher
priority) and continue the process at a later date
without losing the benefit of efforts expended prior
to the interruption of the project.
6. Equipment planning is done based upon the composite requirement of the various projects to be installed on the equipment throughout its estimated
useful life.
7. The number of, and capabilities of, personnel
in the systems development and programming area are
based upon the requirements of the projects to be
developed and installed together with the implementation time frame desired by management.
8. Each potential development project is evaluated to assure that it is in fact an independent project (not a modification to another system) and that
its development will be compatible with management's
overall objectives.
In essence such an approach tends to remove the
awe or mystique commonly associated with the management of the EDP facility.

Oonclusion

As was stated earlier, many of these axioms were
valid with second and earlier generation computers,
but generally are not valid today because of the increased capabilities of the various components of
modern computers. What is really needed today is
for EDP technicians to continually test the logic
behind the guidelines (axioms) being used when automation is applied, much as they test a user's logic as
part of the problem definition of any new system.
In essence EDP technicians must make an extra effort
to assure that the tools of their trade are consistently applied in an objective manner.
Actually, many of these axioms can still be applicable to particular situations today and when it is
logical they should be applied. I am not advocating
that they all be abolished and the negative form of
each blindly followed -- this would be just as foolhardy as what is happening now. I do strongly recommend that all EDP axioms, not just the few listed
here, be recognized for what they are and then be
tested for reasonableness before being applied.
One of the best ways I can think of for EDP technicians to test the validity of their axioms is to
attempt to explain to a "hard nosed" businessman why
each is logical and its application is consistent
with the solution of the immediate problem and with
the overall objectives of the company. Many illogical axioms can be detected in this manner, but more
importantly, this can be a step toward breaking the
communications gap that exists between technicians
and managemen t.
Sound management practices dictate that the expertise of the EDP technician and the business manager must be optimized if today's computers are to
be used effectively. For this to happen these two
elements of an organization must communicate with
each other. Hopefully, a conscientious effort on
the part of both parties plus a "schooling" of each
in the rudiments of the discipline of the other,
will eventually permit these two diverse elements to
function as a cohesive unit.
0
15

Academic Computer Practices, and Their DeFiciencies
Dr. Herbert E. Humbert
Director of Learning Resources
Lorain County Community Col/ege
Elyria, Ohio 44035

"Teachers are behind in computer know-how and use:

The Report to the President and the Congress of
the United States by the Commission on Instructional
Technology, March, 1970, enti tled "To Improve Learning", among other things, dealt with the causes of
technology's lack of impact on American education.
The causes listed are:
1) Indifference or antipathy toward us~ng technology in education;
2) Poor programs;
3) Inadequate equipment;
4) Inaccessibility;
5) Teachers not trained in Instructional Technology;
6) Media specialists excluded from central
planning;
7) Limited staff.
The use of computers in education, when measured
against these seven reasons for lack of impact,
fails in all seven areas.
School Computer

The computer presents a different problem from
other educational media primarily for two reasons:
1) The school computer is already functioning well
in areas other than educational, such as financial
accounting and student records, and therefore has a
group of users with a vested interest; 2) There is
already a vested interest in computer education by a
group of professional and technical computer people
and teachers of the computer. The combination of
these two interest groups presents a very formidable
wall for teachers. They must break through that wall
in order to improve learning through computerization
of methodology and learner assessment. The techniques that these two interest groups use to prevent
the introduction of th~ teacher to the computer field
are subtle, and they seem very reasonable, although
the end result is restricted use or no use by the
faculty.
I will attempt in this article to identify and
describe some of the techniques used by these interest groups and show how they demotivate potential
users- of the computer and prevent its wide-spread
use in instruction. What I have to say will be objected to vehemently by professional and technical
computer men because it will strike directly at the
basis of their operation, which is based on exclusive control and independent decision-making on
their part.
16

it is time to catch up."

Division 01 Authority

One of the biggest arguments that goes on within
educational institutions today concerns the question: Where should the authority and responsibility
for computer management lie? Shall data processing
services be attached directly to the president, the
vice' president for academic affairs, or the vice
president for business affairs? Or, should they be
controlled by an independent administrative board?
This question would not be so difficult of resolution if administrators knew as much about computers
as they do about adding machines and bookkeepers.
It is the mystery and the mysticism of the computer
that makes the non-computer mind assume that it is
different from older forms of data processing. In
reality it is not. The computer is essentially
nothing more nor less than an adding machine, or an
abacus, or marks on the wall of a cave. The computer deserves no more honor or respect than an adding
machine, plus a typewriter plus a tape recorder.
This mysticism has placed educators in a position
of having to rely almost entirely on the professional and technical computerman to establish his own
objectives, set up his own department, including
equipment and procedures, and determine his own services.
The greatest problems in educational institutions
with computers seem to come from the services offered and for this reason various organizational
forms have been tried to control computer services.
At the present stage of development, the committee
seems to be the most effective. This is probably
because the committee can spend more time collectively studying computer problems. Also it has
more possibility of having some educators on the
committee who are fairly knowledgeable about computers, as compared to having the computer services
under a single boss. The single boss is apt to be
preoccupied with the traditional expectations of his
office. When the responsibility for the computer
function is overlaid on his office, he will slough
it off onto the professional and technical computerman, rather than seek to make himself informed so
that he can ~nteliigentfy direct the development of
all computer use in the educational institution, including instruction.
Advisory Committee:

A Dead End

It seems to me that the establishment of an advisory committee to control computer operations virtuCOMPUTERS and AUTOMATION for May, 1972

ally makes the data processing services in,educational institutions an independent agency. Because
data processing personnel have been educated and
trained in business divisions of colleges, services
to business activities of an educational institution
are usually good and evoke little criticism. However, if these personnel try to function in an instructional setting, they immediately encounter
problems which they do not understand because of
their business experience and training background.
Since it is an independent agency, academic administrators and instructors are very apt to yield, because not only do they run into a lack of~~nder­
standing of their problems but also they find themselves powerless to bring any power to bear on the
computer operation. As a result:
• educators look in other directions than the
computer to improve learning;
they are indifferent or antipathetic toward
the computer;
• the available programs remain mediocre or
poor;
• the equipment remains inadequate for learning,
however adequate it may be for business functions;
• the equipment and programmers remain inaccessible behind ,the curtain of an independent
agency; teachers remain untrained in the 'uses
of the computer in learning and teaching;
they remain excluded from central planning
processes because they are not computer users.
Nothing militates against educational uses of the
computer as much as independently established computer agencies. We could not design a system that
would more effectively "kill off" the use of computers by teachers if we sat down intellectually and
carefully and tried to design a plan to do it.
Mystical Computer

Various practices of professional and technical
computer personnel are designed to keep the computer
mystical. One of the most effective of these practices is: to use no headings on ~omputer printouts;
or, if headings are used, ihey include non-standard
abbreviations and code numbers and letters which
make it virtually impossible for any of the uninitiated to understand what is on that printout.
Only a continuous user can remember the meanings of
the abbreviations and words. This practice prevents
teachers from becoming familiar with what kinds of
uses the computer is providing because they cannot
understand the printouts that they may see in meetings or see on other colleagues' desks. This practice also perpetuates the ignorance of administrators because they cannot understand the printouts
that their subordinates use on a daily basis. So
the computer remains a mystery.
Rejection of Responsibility for Educating

Another practice of professional and technical
computermen is to tell the teacher that they will
make programs for him if he will just describe what
he wants the program to do. This is understandable
as most computermen are oriented in a business tradition, not an educational tradition, and to some degree they do not know what to provide for a teacher.
However, this practice has become a fetish, to the
extent that it represents a solid brick wall between
data processing services and a teacher who is ignorant of what the computer can do for him. People
working in computer services traditionally accept no
responsibility whatsoever for familiarizing themCOMPUTERS and AUTOMATION for May, 1972

selves with what is going on in educational institutions nationwide that would provide a basis for them
to help teachers to get started with computer uses
in their own institutions. We would not tolerate
this from other divisions within our educational institutions but because of the mysticism of the computer we allow this to exist in data processing services. The professional educator must stand up and
demand that these practices on the part of administration and computer services stop. All other professional fields are proceeding to develop technical
and equipment support both in quality and quantity
beyond that which is available to the teachers.
Hospitals are the most easily understood illustration of this point. As much as we detest the high
cost of illnesses, no one questions the medical
competence of the practitioners.
Proposed Changes

I propose that the following changes in educational institutions are necessary in order to promote rapid and high quality uses of the computer at
the learner-teacher level:
1. The computer, computer time, and computer personnel must be fractionated so that those,persons
being served have both responsibility and authority
over the equipment and personnel which will be doing
their work. This is becoming easier as various kinds
of computei terminals become more wide-spread. This
development will siop all arguments about priorities,
projects, division of expenditures, competence of
programmers and systems analysts, development of programs and systems, and many of the other arguments
now plaguing educational institutions in regard to
the computer users and uses and,will relegate these
problems directly to the responsible user. They will
then be resolvable on an operational basis among the
people and proj ects concerned., Thi sis no different
from what has always been in school work, where secretaries, office machine operator~~ store keepers,
librarians, and media producers, have been attached
directly to academic groups.
Bosses

2. Computer people should have bosses, not operating committees. This is a natural result of the development mentioned above. When I make this statement.
I do not imply departure from the normal committee
structure of any educational institution which will
bring its educational thinking to bear on what is going on. Faculty meetings, department meetings, divisional meetings, administrative meetings, and all
committees that are assigned some form of control
will offer direction to computer people. But, the
computer operation does not deserve or require an
operating~ommittee, any more than do the girls who
run the adding machines or prepare reports for the
administrators. Administrative councils and committees should exercise control over computer people as
part of their overall responsibility structure, and
thereby make this function a part of an integrated
whole rather than an isolated phenomenon.
Titling of Reports

3. A uniform rule in educational institutions in
regard to computer printouts should be followed. This
rule is: Every report and every column in a report
shall be titled. The titles should not include abbreviations or codes. One only has to think of various financiai reports he has read over his lifetime
to realize that almost all of these are well titled;
the exceptions have been those with poorly selected
titles or titles too abbreviated or titles containing
17

terminology unfamiliar to the viewer. This requirement is really just a matter of good English usage
that any writer would expect to follow; we would not
consider publishing articles or books without proper
chosen titles and headings on the graphic and illustrative material. any more than we would publish a
newspaper without headlines.
4. Institutions should provide funds for travel
and conference attendance so that computer people can
find out what is going on with computers in other educational institutions.
We have seen fit to supply computers and appropriate peripheral equipment for business uses in educational institutions. These uses have come first probably because it is very easy to see savings in terms
of personnel and the instantaneous availability of
coordinated information somewhere down the road. These
uses are primarily substituting computer production
for what we formerly did by hand and by fewer machines.
If we can do these jobs faster, the ~bvious result
should be eventual reduction in cost.
Institutional Computer Uses

Instructional computer uses are different. The
projected uses computers have in instruction add instructional elements that are new, currently lacking
in education:
• they speed up student learning by doing large
scale calculating rapidly;
• they group and regroup students on the basis
of selected criteria. which will lead to personalized and individualized learning (and to
eventual discard of the semester and class
system);
• they provide for student record-keeping, and
faculty information services upon which instruction can be based, on a vast scale that
has never been available before.

3. Inadequate equipment -- Money supplied specifically for this purpose will add to existing computers used for other purposes and provide an equipment basis for use in instruction.
4. Inaccessibili ty -- If specific time is assigned
for computer use and specific personnel are assigned
for programming and systems work,then the problem of
inaccessibi li ty is reduced to a manageable level. Communication between business-oriented computer personnel and instruction-oriented teachers will become the
maj or problem and a "pressure" will build up to sol ve it.
5. Teachers not trained in instructional technology
When responsibi li ty and authori ty of computer uses
are placed at the academic level, the necessity to
become knowledgeable or trained in this field will
become apparent, and will motivate teachers to become able to function with the computer and with
computer programmers.
6. Media specialists excluded from central planning -- When authority and responsibility resides
with teachers who are competent in the computer
field, the problem of making oneself felt at the
planning level is largely resolved.
7. Limited staff -- The staff necessary as a resuI t of sol vi ng the six above problems wi 11 clearly delineate what kinds of staff are needed and how many.
Computer practices have militated against instructional uses long enough. It is time that we alter
the practices which prevent instructional computer
uses. Teachers are behind in computer know-how and
use. It is time to catch up.
0

The dream of dramatically increased quality and
quantity of learning is just now beginning to materialize because of the computer and other forms of
automation. Academic uses of the computer actually
increase costs; so if we hope to improve learning
significantly. additional funding for computers, peripheral equipment. and personnel that wi 11 make thi s
improvement possible must be provided. Categorical
aid must become a reality -- general aid to the state
and to schools and institutions of higher education
is not good enough. Past experience with non-categorical aid has proved that most of this aid goes
into salaries. To achieve the optimum in computer
use and its resultant i~provementin learning, we
must ask for funds to be spent for this purpose as
well as for other automation facilities for learning
and teaching.
Remedy

Let's review here the six causes of technology's
lack of impact on education, and consider how the
suggested reforms would help to eliminate these causes.
1. Indifference or antipathy toward technology in
education -- This cause evaporates as responsibility
and authority move to the level of use. Having control of computer time and personnel, faculty groups
will do as they have always done -- they will use the
new force to improve learning.
2. Poor Programs -- As the suggested reforms are
put into practice over a period of time, the quantity
of programs available and the continued use by learners and teachers will refine the programs and develop
quality computer software.
18

FOR 35MM FILM
For Cartridges and Reels.
15 x 15" Screen. Up to 24 X Magnifica~ion.
Optional: Image Rotation, Odometersl et~.

into Cartridges.
Also 16 mm and 35 mm film
onto reels. High speed. Instant Braking.
Optional: Magnifying mirror for scanning
Dealers Invited.

miCROFilM PRODUCTS. INC.
D,.,s,on of Equity EnterprISes, Inc
212--243-3443

40 West 15th St,. N.Y. 10011 Dept

COMPUTERS and AUTOMATION for May, 1972

Deciphering an Unknown Computer Program l as Compared
With Deciphering of Ancient Writing

Edmund C. Berkeley, President
Berkeley Enterprises Inc.
815 Washington St.
Newtonville, Mass. 02160

"In working on the problem of deciphering a computer program, we can be helped by
comparing the deciphering of other systems of symbols, and noticing the principles used."

Outline

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.

The Problem of Unknown Computer Programs
Documentation, an Old Problem
Analogies with Other Deciphering Problems
Deciphering the System of Ancient Writing,
Linear B
Arthur Evans
The Urge to Discover Secrets and the Flair for
Learning Languages
Astonishingly Rapid Thought and the Power of
Seeing Order in Apparent Confusion
The Existence and the Availability of Adequate
Material
The ·Conjectural Method, i.e. Guesswork
The Nature of the Language as Seen Through the
the Script
The Recognition of Variant Forms and the Distinction of Separate Signs
Orderly Analysis
Any Code in Theory Can Be Broken
Linear B, Basically a Syllabic System

Edmund C. Berkeley concentrated in mathematics
while attending Harvard College and graduated in
1930 with an A.B. summa' cum laude. He did actuarial work in the life insurance business 1930
to 1948 except for 3~ years on active duty in
the U.S. Navy 1941-45. He is a Fellow of the
Society of Actuaries; a founder of the Association for Computing Machinery; its first secretary, 1947-53; the author of 13 books on computers and related subjects; an invited lecturer
on computers in the United States, Canada, England, Japan, the Soviet Union, and Australia.
He implemented the programming language LIS'P for
the DEC PDP-9 computer. He has been editor of
"Computers and Automation" since 1951, and president of Berkeley Enterprises, Inc. since 1954.

COMPUTERS and AUTOMATION for May, 1972

15. The Science of Cryptanalysis
16. A Definite Interpretation
17. Principles in Decipherment of Computer Programs,
Contrasted with Principles in Decipherment of
Ancient Wri ting
18. References
The subject of this article is the interesting
parallel between two problems:
- the documentation of an unknown computer program; and
- the decipherment of a system of unknown
anci en t wri ti ng .
Both these problems consist of finding and reporting
the meaning of a recipe, a procedure. A computer
program is a recipe or. procedure for making a cal.culation, for computing some desired information. A
piece of writing is a recipe or procedure for conveying a message.
When a computer program is adequately documented,
the programmer who reads the documentation kno~s
just what part of the program does what job. He
knows just how to change or mOdify or replace any
part of the program so that he can do something
else that he may wish to do.
When a system of ancient writing is adequately
documented, a human being who reads a script knows
what is being said; and he knows just how to use
the signs in some other sequence so that something
else can be said instead.
This report is based on research supported under
Contract NOOI4-C-70-0225 from the Office of Naval
Research, on computer-assisted documentation of Navy
computer programs.
19

The Problem of Unknown Computer Programs

In almost all computer installations, it is very
easy to be confronted with the problem of unknown
computer programs. Among other reasons are the
following:
1. No Programmer. The programmer who wrote the
computer program has left to work elsewhere
and is not available to answer questions.
2. No Recollection. The programmer who wrote
the program does not remember what he did,
because much time has gone by.
3. No Glossary. If mnemonic symbols are used in
the symbolic program which assembled gives
the working binary program, the meanings of
the mnemonic symbols have to be guessed,
for there exists no glossary of the mnemonics with their explanations. For example,
on one occasion it took me several weeks to
guess that the mnemonic PDL stood for "pushdown list"; and I still do not know what the
mnemonic ZORCH means.
4. No Recordi ng of What is "Obvi ous". The programmer who produced the computer program
did not write down "what everybody of course
knows because it's obvious" - so that when,
for example, peripheral equipment changes,
many undefined symbols are left as relics
in the program.
5. Accidental Incompleteness. The programmer
"forgot" to record some of the essential information. For example, on one occasion it
took me several hours of effort and two long
distance phone calls to discover that a carriage return had been omitted from the operating instructions at a certain point in the
operation of an interactive program.
Etc., etc., etc., as the King of Siam said.

For example, the understanding of the hieroglyphic
writing of ancient Egypt was lost for at least a
thousand years. Its successful deciphering began
with the finding of what is called the "Rosetta'
Stone". This was found near the port of Rosetta in
Egypt by a French army engineering officer in 1799.
This stone is a basalt stele inscribed in three languages and systems of writing: ancient Greek; Egyptian hieroglyphic; and Egyptian demotic, a simplified form of cursive Egyptian writing used for books,
deeds, etc. The Rosetta Stone expressed in three
parallel texts a decree by priests at Memphis in
regard to Ptolemy V, Epiphanes, around 190 B.C. The
demotic and Greek parts of the stone were quite complete; the hieroglyphic part was rather incomplete.
But the Rosetta Stone gave enough clues so that with
other information, the French scholar, J. F. Champollion, effectively began the deciphering of Egyptian hieroglyphic writing. He worked at this problem from 1802 (when he was aged 11) until his death
in 1832. In 1822, he had essenti ally "broken the
back" of the problem, and had establi shed the meaning and significance of about 14 of the hieroglyphic
characters denoting sounds.
A much harder problem was the deciphering of what
is called "Linear B", a system of ancient wri ting
used in the Island of Crete about 1450 B.C. by the
Minoan and Mycenaean civilizations. Here there existed no "Rosetta Stone", no translatIon of the same
text into two or more scripts, one of which was
known

Deciphering the System of Ancient Writing:

Linear B

It is useful and instructive to study the account
of deciphering Linear B. We can examine the principles that were applied, and compare them with
those useful in deciphering and documenting an unknown working binary program for a computer.

Documentation, an Old Problem

Documentation is an old, old problem. Whenever
a person A has written something without deliberate
intention to conceal, and later on other persons
have read it and tried to understand what A meant
when A wrote it, the problem of deciphering what A
meant has arisen. For example, in Shakespeare's
play (published 1603) Hamlet says:
Who would fardels bear
To grunt and sweat under a weary life,
But that the dread of something after death,
The undiscover'd country from whose bourn
No traveler returns, puzzles the will
And makes us rather bear the ills we have
Than fly to others that we know not of?
But we who live more than 300 years later, need to
be told by the documenter that "fardels" means "burdens", and "bourn" means "boundary" (though in another of Shakespeare's plays it means "brook").
Analogies With Other Deciphering Problems

In working on the problem of deciphering a computer program, we can be helped by comparing the deciphering of other systems of symbols, and noticing
the principles used.
There are basically two cases. Case 1 is where
the writer has attempted to conceal his message, as
in all systems of ordinary cryptographic writing.
Case 2 is where the writer has made no attempt to
conceal his message, as in a system of ancient writing to which the key has been lost. Our situation
resembles Case 2.
20

A book that is interesting and important, and
that sheds much light on thi s deci pherment is "The
Deci pherment of Li near B", by John Chadwi ck, a
scholar of the University of Cambridge, England,
second edition, published by Oxford University
Press, 1967~ softbound, 164 pages.
In this article, we shall select from that book
a number of passages that shed light on problems and
principles. For frequently when a group of scientists work on a difficult and complicated problem,
and afterwards describe what they did and how they
achieved success, they succeed in noticing and expressing principles that are much more widely applicable than in just the field of the problem they
are working on. A good investigator generalizes
from his experience in solving a problem; and many
of his generalizations are useful to those who come
after him.
In the case of Linear B, there existed somewhat
over 3000 clay tablets that had been found in archeological excavations at the ruins of a palace at
Knossos in Crete (and from a few other locations).
This palace had been built of timber and bricks,
stood for many years, and burned about 1400 B.C.,
thus firing the sun-dried clay tablets which otherwise would not have survived even one thorough
wetting.
The language was unknown. The script was unknown. The message was unknown.
The problem of decipherment was worked on by several dozen investigators from about 1890 to about
1960. The person who contributed the most to the
COMPUTERS and AUTOMATION for May, 1972

decipherment was an Englishman named Michael Ventris, an architect and brilliant schol~r who was
unfortunately killed outright in an automobile accident in Sept. 1956 at the age of 34. John Chadwick was his friend and collaborator, and the author
of the book above mentioned.
Arthur Evans

The first English investigator of the tablets
from Crete was Arthur Evans, who was the first
archeologist who excavated at Knossos in Crete. He
wrote in 1901 (Beginning of quotation):
From the frequency of ciphers on these tablets
it is evident that a great number of them refer to
accounts relating to the royal stores and arsenal.
The general purport of the tablet, moreover, is in
many cases supplied by the introduction of one or
more pictorial figures. Thus on a series of tablets,
from the room called after them the Room of the
Chariot Tablets, occur designs of a typical Mycenaean chariot, a horse's head, and what seems to be
a cuirass .•• Among other subjects thus represented
were human figures, perhaps slaves, houses or barns,
swine, ears of corn, various kinds of trees, saffron flowers, and vessels of clay of various
shapes ... Besides these were other vases of metallic forms -- implements such as spades, singleedged axes, and many indeterminate objects ...
In the present incomplete state of the material
it is undesirable ,to go beyond a very general statement of the comparison attainable. Among the linear
characters or letters in common use -- about 70 in
number -- 10 are practically identical with signs
belonging to the Cypriote syllabary and about the
same number show affinities to later Greek letterforms .•. The words on the tablets are at times divided by upright lines, and from the average number
of letters included between, it is probable that
the signs have a syllabic value. The inscriptions
are invariably written from left to right .•.. (End
of quotation)
Linear B eventually turned out to be the result
of adapting the Minoan script to the writing of an
early form of Greek -- though this was not guessed
prior to the discovery and proof. In fact, the hypothesis that the script expressed an early form of
the Greek language was among the experts extremely
unfashionable, "ridiculous", and heretical, for
half a century.
The Urge to Discover Secrets,
and the Flair for Learning Languages

(Quoted, p.l)
The urge to discover secrets is deeply ingrained
in human nature; even the least curious mind is
roused by the promise of sharing knowledge withheld
from others. Some are fortunate enough to find a
job which consists in the solution of mysteries,
whether it is the physicist who tracks down a hitherto unknown nuclear particle or the policeman who
detects a criminal. But most of us are driven to
sublimate this urge by the solving of artificial
puzzles devised for our entertainment. Detective
stories or crossword puzzles cater for the majority;
the solution of secret codes may be the hobby of a
few. This [book] is the story of the solving of a
genuine mystery which had baffled experts for half
a century.

anniversary of the British School of Archaeology at
Athens. They heard a lecture by the grand old man
of Greek archaeology, Sir Arthur Evans; he told them
of hjs discovery of a long forgotten civilization in
the Greek island of Crete, and of the mysterious
wri~ing used by this fabulous people of pre-history.
In that hour a seed was planted that was dramaticclly to bear fruit sixteen years later; for this
boy was already keenly interested in ancient scripts
and languages. At the age of seven he had bought
and studied a German book on the Egyptian hieroglyphs. He vowed then and there to take up the
challenge of the undeciphered Cretan writing; he
began to read the books on it; he even started a
correspondence with the experts. ,And in the fullness of time he succeeded where they had failed.
His name was Michael Ventris . . . .
. As this book is largely the story of his achievement, it will not be out of place to begin with a
short account of his life. He was born on 12 July
1922 .•. His schooling ... was unconventional; he
went to school at Gstaad in Switzerland, where he
was taught in French and German. Not content with
this, he quickly mastered the local Swiss-German
dialect -- an accomplishment that later on endeared
him at once to the Swiss scholars whom he met -and even taught himself Polish when he was six. He
never outgrew this love of languages; a few weeks
in Sweden after the war were enough for him to become 'profi cient in Swedi sh and get a temporary job
on the strength of it. Later he corresponded with
Swedish scholars in their own language. He had not
only a remarkable visual memory, but, what is rarely
combined with it, the ability to learn a language by
ear.
Astonishingly Rapid Thought, and the Power of
Seeing Order in Apparent Confusion

(Quoted, p. 4)
If we ask what were the special qualities that
made possible his achievement, we can point to his
capacity for infinite pains, his powers of concentration, his meticulous accuracy, his beautiful
draughtsmanship. All these were necessary; but
there was much more that is hard to define. His
brain worked with astonishing rapidity, so that he
could think out all the implications of a suggestion almost before it was out of your mouth. He
had a keen appreciation of the realities of a situation; the Mycenaeans were to him no vague abstrac~
tions, but living people whose thoughts he could
penetrate. He himself laid stress on the visual approach to the problem; he made himself so familiar
with the visual aspect of the texts that large sections were imprinted on his mind simply as visual
patterns, long before the decipherment gave them
meaning. But a merely photographic memory was not
enough, and it was here that his architectural
training came to his aid. The architect's eye sees
in a 'building not a mere facade, a jumble of ornamental and structural features; it looks beneath the
appearance and distinguishes the significant parts
of the pattern, the structural elements and framework of the building. So too Ventris was able to
discern among the bewildering variety of the mysterious signs, patterns and regularities which betrayed the underlying structure. It is this quality, the power of seeing order in apparent confusion, that has marked the work of all great men.
The Existence and the Availability
of Adequate Material

(Quoted, p. 26)
In 1936 a fourteen-year-old schoolboy was among
a party who visited Burlington House in London to
see an exhibition"organized to mark the fiftieth
COMPUTERS and AUTOMATION for May, 1972

The success of any decipherment depends upon the
existence and availability of adequate materIal.
21

How much is needed depends upon the nature of the
problem to be solved, the character of the material,
and so forth. Thus a short 'bilingual' inscription,
giving the same textJin two languages, may be used
as a crib, and may supply enough clues to enable the
rest of the material to be interpreted. Where, as
in this case, no bilingual text exists, a far larger
amount of text is required. Moreover, restrictions
may be imposed by the type of test available; for
instance, the thousands of Etruscan funerary Inscriptions known have permitted us to gain only a
very limited knowledge of the language, since the
same phrases are repeated over and over again.
There are two methods by which one can proceed.
One is by a methodical analysis, and this approach
will form the subject of the next chapter; the other
is by more or less pure guesswork. Intelligent
guessing must of course play some part in the first
case; but there is a world of difference between a
decipherment founded upon a careful internal analysis and one obtained by trial and error. Even this
may produce the correct result; but it needs to be
confirmed by application to virgin material, since
it can gain no probability from its origin. A cool
judgement is also needed to discriminate between
what a text is likely or unlikely to contain. This
faculty was notably lacking among those who risked
their reputations on the conjectural method.

The Conjectural Method, i.e. Guesswork

(Quoted, p. 26)
Evans and the more cautious of his followers had
observed that with few apparent exceptions all the
documents were lists or accounts. The reasons for
this will be discussed later on. But this did not
prevent some amateurs from venturing upon interpretations of their own. In most cases these would-be
decipherers began by guessing the lan~uage of the
inscriptions -- most of them treated LLinear] A and
[Linear] B and even the Phaistos Disk as all specimens of the same language. Some chose Greek, though
the Greek which they obtained would not stand philological examination. Others chose a language with
obscure affinities or one imperfectly known: Basque
and Etruscan were proposed as candidates. Others
again invented languages of their own for the purpose, a method which had the advantage that no one
could prove them wrong. One attempt, by the Bulgarian Professor V. Georgiev, presented an ingenious
melange of linguistic elements, which resembled
Greek when it suited his purpose and any other language when it did not. Almost all decipherers made
resemblances with the Cypriot script their startingpoint.
(Quoted, p. 31):
The Bulgarian V. Georgiev summed up a series of
earlier publications in a book entitled (in Russian)
Problems of the Minoan Language published in Sofia
in 1953. He dealt somewhat scornfully with his
critics, but recognized that his theory would take
a long time to perfect and could not convince everyone at once. The Minoan language was, he believed,
a dialect of a wide-spread pre-Hellenic language
spoken in Greece before the coming of the Greeks
and possibly related to Hittite and other early
Anatolian languages. This theory, which in one
form or another has enj oyed considerable populari ty,
undoubtedly contains an element of truth, though we
are still unable to say how much. One thing that
is certain is that most Greek place-names are not
composed of Greek words: There are a few that are,
22

like Thermopulai "Hot-gates"; but a good number,
like Athenai (Athens), Mukenai (Mycenae), Korinthos,
Zakunthos, Halikarnassos, Lukabettos, are not only
devoid of meaning, but belong to groups with a restricted range of endings; just as Engl~sh names
can be recognized by endings like -bridge, -ton,
-ford. The preservation of place-names belonging
to an older language is a common phenomenon: in
England many Celtic names survive, such as the
various rivers called Avon (Welsh afon 'river'),
though Celtic has not been spoken in their neighbourhood for more than a thousand years. The attempt has therefore been made to establish the
pre-Hellenic language of Greece through the medium
of these place-names; but although the fact of its
existence is clear, its nature is still very much
disputed.
The Nature of the Language as Seen
through the Barrier of the Script

(Quoted, p. 35)
The most valuable contribution came a little
later (1943-50), from the American Dr. Alice E.
Kober. She died at the early age of forty-three in
1950, just too soon to witness and take part in the
decipherment for which she had done so much to prepare the way.
She was the first to set out methodically to
discover the nature of the language through the
barrier of the script. The questions she asked
were simple ones. Was it an inflected language,
using different endings to express grammatical
forms? Was there a consistent means of denoting a
plural? Did it distinguish genders?
Her solutions were partial, but none the less a
real step forward. She was able to demonstrate, for
instance, that the totalling formula, clearly shown
by summations on a number of tablets, had two forms:
one was used for men and for one class of animals;
the other for women, another class of animals, and
also for swords and the like. This was not only
clear evidence of a distinction of.gender; it also
led to the identification of the means by which the
sex of animals is represented (that is, by adding
marks to the appropriate ideograms).
Even more remarkable was her demonstration that
certain words had two variant forms, which were
longer than the simple form by one sign. These are
now commonly, and irreverently, known as "Kober's
triplets". She interpreted them as further evidence
of inflexion; but they were destined to play an even
more important role in the final decipherment.
I do not think there can be any doubt that Miss
Kober would have taken a leading part in events of
later years, had she been spared; she alone of the
earlier investigators was pursuing the track which
led Ventris ul timately to the solution of the problem.
The Recognition of Variant Forms and
the Distinction of Separate Signs

(Quoted, p. 38)
E. L. Bennett, Jr., working on new material, proceeded with sound sense and caution. 0 . ' His outstanding contribution is the establishment of the
signary: the recognition of variant forms and the
distinction of separate signso How difficult the
task is only those who have tried can tell. It is
easy enough for us to recognize the same letter in
our alphabet as written by half a dozen different
people, despite the use of variant forms. But if
you do not know what is the possible range of letters, nor the sound of the words they spell, it is
COMPUTERS and AUTOMATION for May, 1972

impossible to be sure if some of the rare ones are
separate letters or mere variants. This is still
the position with regard to Linear B. The characters no. 18 and 19 (see the table at tne end of
this book) occur only a few times; are they variants
of no. 17 or not? It is to Bennett's credit that
few such problems remain; diligent comparison enabled him to set up a table of variants which made
it clear in the case of all but the rarest signs
what was its possible range of variation. By con~
trast, it is one of the weaknesses of Scripta Minoa
1! that different signs are sometimes confused, and
variants of the same are treated as distinct.
Orderly Analysis

,

(Quoted, p. 39)
With the publication of The Pylos Tablets in 1951
the scene was set for the decipherment. Orderly
analysis, begun by Miss Kober and Bennett, could now
take the place of speculation and guesswork; but it
requi red clear judgment to percei ve the right methods,
concentration to plod through the laborious analysis,
perseverance to carryon despite meagre gains, and
finally the spark of genius to grasp the right solution when at last it emerged from the painstaking
manipulation of meaningless signs •••.
(Quoted, p. 40):

•

There is an obvious resemblance between an unreadable script and a secret code; similar methods
can be employed to break both. But the differences
must not be overlooked. The code is deliberately
designed to baffle the investigator; the script is
only puzzling by accident. The language underlying
the coded text is ordinarily known; in the case of
a script there are three separate possibili ties. The
language may be known or partially known, but wri tten
in an unknown script; this, for instance, was the
case with the decipherment of the Old Persian inscriptions by the German scholar Grotefend in 1802;
the cuneiform signs were then quite unknown, but the
language, as revealed by recogni tion of proper' names,
turned out to be largely intelligible through the
medium of the Avestan texts. Secondly, the script
may be known, the language unknown. This is the
case of Etruscan, which is written in a modified
form of the Greek alphabet that presents little
difficulty to the understanding of its sounds; but
no language has yet been found sufficiently closely
related. to throw any light on the meaning of the
words. Thus in spite of a large collection of inscriptions our knowledge of Etruscan is still very
elementary and uncertain. Lastly, we have the situation which confronted the decipherers of the Minoan
script [Linear B], an unknown script and an unknown
language. The fact that the language subsequently
proved to be known in irrelevant; that fact could
not be used in the first stages of the decipherment .
(Quoted, p. 41):

is now generally known that any code can in theory
be broken, provided sufficient examples of coded
texts are available; the only method by which to
achieve complete security is to ensure continuous
change in the coding system, or to make the code so
complicated that the amount of material necessary
to break it can never be obtained. The detailed
procedures are irrelevant, but the basic principle
is the analysis and indexing of coded texts sothat
underlying patterns and regularities can be discovered. If a number of instances can be collected,
it may appear that a certain group of signs in the
coded text has a particular function; it may, for
example, serve as a conjunction. A knowledge of
the circumstances in which a message was sent may
lead to other identifications, and from these tenuous gains further progress becomes possible, until
the meaning of most of the coded words is known.
The application of this method to unknown languages is obvious; such methods enable the decipherer to determine the meaning of sign-groups without
knowing how to pronounce the signs. Indeed it is
possible to imagine a case where texts in an unknown language might be understood without finding
the phonetic value of a single sign.
The fi rst step is of course to determi ne the type
of system employed and, in the case of Linear B,
this is not so difficult as it seems at first sight.
There are only three basic ways of committing language to writing, and all known graphic systems use
one or a combination of these.
The simplest method is to draw a picture to represent a word; these pictograms are then often simplified until they become unrecognizable, but the
principle remains that one sign represents one word.
This is called "ideographic" writing, and it has
been carried to the high-est stage of development by
the Chinese, who still write in this way, although
the Communist government is now trying to introduce
reforms. For instance: ... is "man"; ... is "woman"; non-pictorial concepts have of course to be
expressed by oblique means.: thus ..• is "big" it is a picture of the fisherman telling you how
big the one was that got away!; or ... "eye" (much
modified) is equipped with a pair of legs ... to
mean "see".
The significant fact about ideographic systems
is that they require an enormous number of signs to
cope with even a simple vocabulary. Every literate
Chinese has to be able to read and write several
thousand different signs, and the large dictionaries
list as many as 50,000. Even in English we still
use ideograms' on a restri cted scale. The numeral s
are the most conspicuous example: 5 is not a sign
for the word "five", but for the concept of five;
and one can often see abbreviations like Charing X
for "Charing Cross".
Linear B Basically a Syllabic System

In the last case decipherments have usually been
judged to be possible only when they could start
from a bilingual text. The Egyptian hieroglyphs
began to yield their secret only when the discovery
of the Rosetta stone, with the Egyptian text repeated in Greek, made it possible to equate the
royal names in the two versions. No such document
exists for Minoan; but it was useless to sit back
and wait for one to appear.
Any Code can in Theory be Broken

(Quoted p. 41)
Cryptography [cryptanalysis] has contributed a
new weapon to the student of unknown scripts. It
COMP'UTERS and AUTOMATION for May, 1972

(Quoted, p. 43)
Equipped with this knowledge we can turn to our
Linear B texts. These consist of groups of signs
separated by small vertical bars; the length of the
groups varies from two to eight signs. Accompanying these in many cases are other signs which stand
alone followed by a numeral; many of these are recognizable pictograms. It is easy to guess that
single signs standing alone are probably ideographic, that is, representing a whole word; those used
in groups are likely to be either syllabic or alphabetic. A count of these signs shows that they
number about eighty-nine - the exact total is still
disputed, because some are very rare, and it is not
23

yet clear whether certain forms are separate signs
or variants of others.

proof of the break, remain for a while isolated;
only gradually does the picture become filled out.

But the number is significant; it is far too
small for a wholly ideographic system, and it is
too large for an alphabet. It must therefore be
syllabic, and a fairly simple form of syllabary like
Cypriot or Japanese, not the more complicated systems of the cuneiform script. This elementary deduction was neglected by many of the would-be
decipherers.

In June 1952 Ventris fel t that the Linear B script
had broken. Admittedly the tentative Greek words
suggested in Work Note 20 were too few to carry conviction; in particular they implied an unlikely set
of spelling conventions. But as he transcribed
more and more texts, so the Greek words began to
emerge in greater numbers; new signs could now be
identified by recognizing a word in which one sign
only was a blank, and this value could then be
tested elsewhere. The spelling rules received confirmation, and the pattern of the decipherment became clear.

(Quoted, p. 46):
Thus in many cases it was possible to deduce the
general subject-matter of the tablets before a
single syllable could be read; almost without exception it was clear that they were lists, inventories. or catalogues. For instance, a list of
single sign-groups ("words"), each followed by the
ideogram ~~N and the numeral I, was clearly a list
of men's names, a muster roll or the like. If the
names were followed by WOMAN I, then they sometimes
had added small numbers of children, the word for
which had been pointed out by Cowley. On the other
hand, where a word was followed by ~~N and a number
larger than one, and this collocation was repeated
on a number of different tablets, the word was
likely to be a descriptive title or occupational
term, like "cow-herds", "tailors" or "men of Phaistos". A similar series of words could be deduced
[or women. If a word is regularly associated with
a particular ideogram, it is likely to be the name
of the obj ec t denoted by tha t ideogram; bu t if there
are several varying words associated with the same
ideogram, then they may be epithets denoting the
various types.
(Quoted, p. 46):
Thi s method of deducti on, si nce it depends chi efly
on studying the same words in different combinations, is often called "combinatory". Its usefulness is not exhausted at thIs stage, but it does
even at the outset lead to some valuable conclusions about the meaning or sort of meaning possessed
by certain words. At a later stage these can also
act as a check on the correctness of a decipherment,
because they are completely independent of the syllabic values. If a word so identified as an occupational term turns out, when transcribed phonetically,
to mean "cow-herds", this confirms the interpretation. On the other hand, interpretations which do
not agree with this preliminary classification are
at once suspect, due allowance being made for errors.
The Science of Cryptanalysis

(Quoted, p. 67)
Cryptography [= cryptanalysis] is a science of
deduction and controlled experiment; hypotheses are
formed, tested, and often discarded. But the residue which passes the test grows and grows until finally there comes a point when the experimenter
feels solid ground beneath his feet: his hypotheses
cohere, and fragments of sense emerge from their
camouflage. The code "breaks". Perhaps this is
best defined as the point when the likely leads appear faster than they can be followed up. It is
like the initiation of
chain-reaction in atomic
physics; once the critical threshold is passed, the
reaction propagates itself.

a

Only in the simplest experiments or codes does
it complete itself with explosive violence. In the
more difficult cases there is much work still to be
done, and the small areas of sense, though sure
24

(Quoted, p. 71):
Secondly, the mere fact of being able to translate the tablet ["At Pylos: slaves of the priestess
on account of sacred gold: 14 women"] does not
automatically answer all the questions. Why were
these women slaves of the priestess? Which priestess? What was the sacred gold? What was the state
of affairs or the transaction that this tablet was
meant to record?
All these are questions which we cannot answer;
the facts were known to the writer of the tablet,
and he did not expect it to be read by anyone who
did not have the same knowledge; just as many of us
make jottings in our diaries which convey a clear
message to us, but would be meani ngless to a stranger
ignorant of the circumstancei in which they were
written.
This problem is still with us, and will always
remain; we cannot know all the facts and events of
which the tablets are an only partial record. We
have to examine them as minutely as we can, to compare them with similar documents elsewhere, to check
them against the archaeological evidence. Imagination may help to fill in the gaps, and in Chapter 7
I shall attempt to look beyond the texts at life in
the Mycenaean world; but it is no good pretending
we know more than we do.
A Definitive Interpretation

(Quoted, p. 84)
[Professor M. S. Ruiperez wrote:] Although it may
be susceptible of further refinements and corrections the interpretation .•. (which comes to crown
many years of tenacious effort by the young English
architect Mr. Michael Ventris) unites -- let us say
it at once -- all the guarantees which can be demanded (reading of whole phrases with meaning suited
to that expected from the ideograms, reading of
known place and personal names, perfect coherence
in orthography and grammar) and must in consequence
be regarded as definitive.
(Quoted, p. 85):
For this [changing Dr. Platon's mind] I canclaim
a small share of credit. In the spring of 1955 I
was able to spend a week in Crete working on the
Knossos tablets. In the course of conversation, Dr.
N. Platon [the director of the Iraklion Museum] told
me that since Bennett left the year before, he had
found in the museum storerooms some trays containing fragments of tablets; they had been exposed to
the weather when the museum was damaged during the
war, and he thought they would be useless. They
were certainly in a poor way; some had crumbled to
dust or disintegrated at a touch. But I was able
to salvage a large number of pieces that were reaCOMPUTERS and AUTOMATION for May, 1972

Table 1

sonably hard. Time prevented me from making a
proper job of it, and it was left fDr Ventris to
finish later in the year.

COMPARISON OF THE IMPORTANCE OF FACTORS

•

But I had one great stroke of luck. I found a
largish piece which was the left-hand end of a twoline tablet; the break showed plainly half of a
horse's head - the ideographic sign for "horse".
Now horses appear in the Knossos tablets only in
the records of the chariot force, which have a
quite different form, and in an isolated tablet
showing horses and foals -- a famous tablet on
which Evans had identified, and discarded, the word
for."foal". The left-hand edge of this was missing;
was this the piece? I cleaned it hurriedly and carried it downstairs to the glass case where the tablet was on exhibition. I laid it on the glass; it
looked a good fit. Platon came and opened the case,
and the join was sure. A happy discovery; but there
was something on this fragment which shook Platon's
scepticism, for we now had the introductory words
for each Ii ne, and they read: i -go "horses" and
o-no "asses". Again Blegen's question could be
asked: is coincidence excluded? What are the
chances that two series of equine heads will be inttoduced by words exactly corresponding to the Greek
for horses and asses? Such probabilities are beyond mathematical analysis; we can only have recourse to the guidance of common sense. Again difficulties have been raised by our critics: why are
the asses not more markedly distinguished from the
horses in the drawings? Perhaps the simple answer
is that the scribe having written the appropriate
words did not feel it worth the effort. It is also
probable that there was a standard ideographic sign
for "horse", but none for "ass"; what could be more
natural then to employ the same sign but with the
phonetic indication to show the difference? (End
of Quotations)
These many quotations from "The Decipherment of
Linear B" are however not a good substitute for the
book. The book is very interesting, a fascinating
detective story from real life, excellently written,
inspiring in its reporting on Michael Ventris, and
is highly recommended. PLEASE GET IT AND READ IT!
Principles in Decipherment of Computer Programs,
Contrasted with Principles in
Decipherment of Ancient Writing

A number of factors have been described or mentioned in the foregoing account of the decipherment
of Linear B. In Table 1 we present a list of many
of these factors, and briefly contrast their importance in the decipherment of ancient writing and of
computer programs.

t

One of the interesting questions is "What are the
kinds of characters that a computer program contains?
Are they ideographic, syllabic, or alphabetic?"
They are not alphabeti c (even though the symboli c
form of machine language is written with letters,
digits, and other symbols) because these letters
and symbols (or meaningful sound units) do not express the phonemes of a spoken language that expresses computer programs.
They are not syllabic, because the characters of
a computer program do not express the syllables of
a spoken language that expresses computer programs.
The characters of a computer program are ideographic. They are ideograms under conditions where
the ideograms have to be combinations of letters
and other symbols on the typewriter. Theideographic
signs of a computer program (spelled in letters,
COMPUTERS and AUTOMATION for May, 1972

U)

(3)
Decipherment of:
Ancient
Computer
Writing
Programs

Needed

Needed

2. The flair for learning languages

Needed

Probably not
needed

3. Astoni shingly rapid
thinking processes

Needed

Can largely be
delegated to
the computer

1. The urge todiscover

secrets

4. The power to see or- Greatly
der in apparent confu- needed
sion, to see structural regularities
underneath a facade

Greatly
needed

5. The existence of
~dequate material

Needed

More material
can be manufactured

6. The availabili ty of
adequate material

Needed

More material
can be produced

7. Intelligent guesswork (the "probable
words")

Some is
needed

Some is
needed

8. The power to recognize the nature of
the language as seen
through the barrier
of the script

Much is
needed

Much is
needed

9. The recognition of
variant forms of the
same sign

Result of
hard work

No problem
at all

10. The dis tingui shing
of-separate signs

Result of
hard work

Usually no
problem at all

11. Orderly, methodical analysis

Much is
needed

Much is needed,
and the computer can take
on the heavy
load

12. Ideographic charac ters

Entirely ideoPossibili ty:
many thousands graphic
of different
characters

13. Syllabic charac ters

None
Possibility:
about 70 to 150
different
characters

14. Alphabetic charac ters

None
Possibility:
about 15 to 45
different
characters

15. The power to discriminate between
what a text is likely
or unlikely to contain

Much is
needed

Only a small
problem because of the
operating
instructions
25

digits, etc.) are an outgrowth of the ideographic
signs of mathematics. They are spelled in common
symbols and mixtures of them, in the same way as
ideograms in, say, trigonometry are spelled, such
as SIN, COS, TAN, COT, SEC, and CSC. The reason
was that mathematicians could not think up satisfactory arbi trary signs like ".;- (for" square root"
or "root") and 00 (for "infinity"), to designate
all that they wanted to talk about.
Unfortunately, in present years, the ideographic
signs of a computer program are limited in usage to
one or a few persons, the programmers of that particular program. Consequently, the evolutionary
processes of language cannot work on them well; and
consequently, there are very many different systems
of ideograms, usually differing from each program
to the next; and so it is very difficult to keep
them all in mind.

PROBLEM CORNER
Walter Penney, cOP
Problem Editor
Computers and Automation
PROBLEM 725: STUCK-UP STICK-ONS

"Someone gummed things up this time," said Joe in a
tone of exasperation, "and I mean that literally."
"How come?" asked Pete.
"Someone made up the instructions for this flowchart
by typing them on those stick-ons. I think some of the
instructions got stuck on the wrong boxes." Joe pointed
to the chart on his desk.

However, because of the power of the computer,
once a good ideographic system for expressing the
underlying language of working binary computer programs is developed, the computer should be usable
to produce the translation of each binary program
into the good ideographic system.
In the determi nati on of "what a text is li kely
to contai n", a computer program is agai n a much more
favorable case than ancient writing. The operating
instructions imply what the program does. For example, if you can operate a program so that it will
read tape, then the program must contain some instructions that will read tape. Etc.

o

In applying "orderly methodical analysis" and
"intelligent guesswork", the power of the computer
is available to implement guesses, test them rapidly, and examine and analyze the results rapidly.
Probably the most important difference between
the decipherment of ancient scripts and the decipherment of working computer programs is "the existence and availability of adequate material", to work
with in decipherment. In deciphering ancient writing, we are at the mercy of luck. Nothing we can
do easily and certainly can increase the amount of
material. Digging in likely archeological sites may
increase the material, but that is far from certain.
In deciphering a working computer program, however, we can operate it, on example after example,
on exercise after exercise, and thus increase the
amount of material available for decipherment as
much as we wish.
This is such an enormous advantage that we can
confidently assert that the deciphering and the
documentation of a working computer program should
in all cases be possible. So the problem reduces
to deciphering it as efficiently as possible.
References

"What makes you think some of the instructions got
stuck on the wrong boxes?"
"Well, this is supposed to be' a flowchart to compute e.
I've tried to go through the steps, but all I get is zero divided by zero."
What is wrong?

1. Chadiwick, John / The Decipherment of Linear B:
Second Edition / Cambridge University Press, .
32 East 57 St., New York, N.Y. 10022 / second
edition, 1967, softbound, 164 pp
2. Berkeley, Edmund C. / Computer-Assisted Documentation of Computer Programs, Vol. 1 / Information International Inc., Boston, Mass. (available from Berkeley Enterprises Inc., 815 Washington St., Newtonville, Mass. 02160) / 1969,
softbound, 128 pp.
3. Berkeley, Edmund C. / Computer-Assisted Documentation of Computer Programs, Vol. 2 / Berkeley
Enterprises Inc., 815 Washington St., Newton~
ville, Mass. 02160 / 1971, softbound, 112 pp

26

Solution to Problem 724: Chafing at the Bit

The equivalents selected for 0 to 7 could be respectively:
0, 1 0, 1 0, 0 1 1, 1 1 1, 11 0, 11 0 1 0, and
11 0 1 1. This will lead to an average of 2.6 bits per experiment yet will allow a stream to be separated into indiVidual vaJues without ambiguity.

°

°

°

Readers are invited to submit problems (and their
solutions) for publication in this column to: Problem
Editor, Computers and Automation, 815 Washington St.,
Newtonville, Mass. 02160.
COMPUTERS and AUTOMATION for May, 1972

I.

f,

i,

\~

'\

•

1.·.··J.·.·. :. 1J

Start with ACM 72.

Walter Carlson is President of ACM
through this May. In a long career in
the information business he's formed
some pretty savvy conclusions on
what it takes to bring fresh thinking
into organizations.
"We're going through a tough period,"
says Walter. "Every company I know
is running lean and hard-looking for
ideas to build on and expecting more
from its computer people. The best
way I can think of to get new ideas
and sharpen skills is to attend-or
send people to- an ACM technical
conference, where people exchange
ideas face-to-face.

"ACM 72 will be held August 14-16 in
Boston. John Donovan has built a
superb technical program. We'll have
tutorial sessions to bring anyone upto-speed who doesn't feel comfortable
with a specialized topic. Plus debates,
mini-tutorials, workshops, joint
sessions and a number of other
innovations that bring people together
on the nitty-gritty of this business.
"This will be the Silver Anniversary
Conference for ACM. In addition to
our program on current technologies,
we'll have the people who formed
ACM 25 years ago talking about the
ideas that created our industry. Some

Association for Computing Machinery
1133 Avenue of the Americas
New York, New York 10036
I would like to consider ACM and
ACM 72. Please send more information.

If you're an ACM member, plan to be
at ACM 72. If you're not a member,
jOin us there and convert part of your
admission fee to annual dues. If
you're a data processing executive
who's looking for new ideas, send
some of your people and encourage
them to join ACM.
Send in the coupon for more
information today!

ac
Association
for Computing
Machinery

Name
Position
Address

City

of the original concepts discarded
long ago are coming back now.
Microprogramming, for example. It
should be a great conference."

State

Zip

C·a

FORUM
MISSING ISSUES OF
"COMPUTERS AND AUTOMATION"
1. From Stanley Jaffin
211'North Piedmont St.
Arlington, Va. 22203

Thank you for sending me one more copy of the
February 1972 issue to replace the one that I as a
subscriber never received.
During the last five weeks, a copy of the February issue of C&A, in a special envelope, was delivered. The other copy mentioned in your letter will
be returned as per your request. The regular copy,
sent under your normal mailing label, normally delivered before the end of the second week of its
respective month, has never surfaced.
Perhaps a note of explanation is in order.
The past year has seen the customer-directed service of many of the well-known publications in the
fields of management, information technology, etc.,
drop off into oblivion. Included in this definition
are those who do not acknowledge renewals, do not
make an attempt to resend missing issues, and those
that bill for phantom subscriptions. Their names
would read like a Who's Who of the professional literature field. Oddly enough, the pages of their
publications are full of exhortations to the readership to act like "professionals" in the management
of their computer systems, and to be ever mindful of
what possible bugs are doing to the customers.
Apparently, their staffs cannot comprehend their own
articles. I can see C&A isn't one of them. I regret any inconvenience-ihis matter has caused. Unfortunately, missing issues, subscriptions, etc.,
are a very sore issue for me.
In the past four years C&A has taken many steps
for the better. It is refreshing to find a publication no~ beating the same horses to death every
month.
Of course, no one can match C&A's breadth of coverage of events outside the normally accepted areas
of information technology. Other publications feel
safe attacking only IBM, bureaucracy, and other conventional ogres.
There is a certain amount of courage in taking a
sLand that loses subscribers. Few magazines have
that courage.

2. From the Editor

Starting in October and November we found a
steady stream of complaints from our subscribers in
our incoming mail: two and three letters written
with no response; failure on our part to understand
some detail of payment; rebilling on subscriptions
renewed a month before and earlier still; etc.

28

We promptly discontinued with that computerized
fulfilment service and changed to another one, which
had a much larger staff of personnel to deal with
subscribers' requests and needs. The change became
effective with January and February. We hope very
much that grounds for complaints will be far less.
The second fulfilment service and we agreed that
irrespective of any information in the files, if
there seemed to be a reasonable chance that the subscriber was right, we would immediately send any
missing issues, and immediately reply, and we would
unravel the records later.

G

We appreciate your nice remarks about the courage
of C&A.
We happen to believe that professionals in the
field of information engineering should be professional -- and acknowledge their responsibility for
the pursuit of truth -- truth in input, truth in
output, and truth in processing information.
We also believe that the issue of reliable information is becoming so important for humanity that it
affects the survival of humanity on our spaceship
Earth.

Unsettling, Disturbing, Critical
computers and Automation, established 1951 and
therefore the oldest magazine in the field of computers and data processing, believes that the profession of information engineer includes not only
competence in handling information using computers
and other means, but also a broad responsibility,
in a professional and engineering sense, for:
The reliability and social significance of
pertinent input data;
The social value and truth of the output
results.
In the same way, a bridge engineer takes a professional responsibility for the reliability and
significance of the data he uses, and the safety
and efficiency of the bridge he builds, for human
beings to risk their lives on.
Accordingly, Computers and Automation publishes
from time to time articles and other information
related to socially useful input and output of data
systems in a broad sense. To this end we seek to
publish what is unsettling, disturbing, critical
-- but productive of thought and an improved and
safer "house" for all humanity, an earth in which
our children ~nd later generations may have a future, instead of facing extinction.
The professional information engineer needs to
relate his engineering to the most important and
most serious problems in the world tOday: war,
nuclear weapons, pollution, the population explosion, and many more.

COMPUTERS and AUTOMATION for May, 1972

t

ODE IN CELEBRATION OF RFPs
Michael Lipp
Bogota, N.J.

To the Editor:
There I was with the 500th "request for proposal"
in front of me, having to prepare my 500th response.
But poetry emerged ahead of proposal:
We Are Pleased
At such time as several vendors
have been selected -Per our conversation -we are looking forward
to looking forward
to looking forward.
We are using the supported monitor.
We envision making changes.
Our application is acquisition,
and we are looking forward.
Attached is our attachment.
It is specifically preliminary
The specifications are also preliminary,
specifically preliminary,
and general, too.
So we are looking forward.
If it did crash, recovery may not be tolerable,
so we are looking forward.
Our evaluation will include
specifications in general and, specifically,
redundancy.
Our primary reason for this venture
is collection -- to any great degree.
Consequently we require
response,
extremely short and fast response.
This phase is considered minor.
In the interim we generally develop
a preliminary feel for scope.
In the interim please respond.
In the interim the magnitude
of our application is acquisition.
And we are looking forward.

I.

We are pleased and thank you,
Thank you for this opportunity,
Thank you for your response,
And we'll be looking forward
to hearing from you,
to your response,
from our response.
And in the future.
And we are pleased
to thank you
for looking forward
to our response.

On The Legal Side:
COMPANY NAME SELECTION
Milton R. Wessel, Attorney
New York, N. Y.

I recall sitting with a client in an underwriter's
office four years ago, and being told that the underwriter could market 100,000 shares at $5 a share of
!QY company -- no matter how speculative and whatever
COMPUTERS and AUTOMATION for May, 1972

the earnings, net worth or what-have-you -- provided
the company's name at least remotely suggested the
computer business. No wonder the directories of EDP
organizations are so filled with companies whose
trade names contain the prefix "Compu-" and the word
"Data" .
But times have changed. The financial world no
longer responds automatically and enthusiastically to
an EDP name, finally acknowledging that true economic
value must be predicated on the fundamentals of product, earnings, sales, growth, market, liquidity and
the like. Selection of EDP company names and product
trademarks -- if ever justified on any other basis -should now certainly be predicated solely upon marketing essentials, of which the most important will
always be distinctiveness.
An organization which selects at its inception a
name which is purely descriptive runs the risk of not
having a protectible. name. So does the company which
picks a name which is exciting and localli useful,
but which will not stand the test of distinctiveness
in expanded future geographic or product markets.
Yet but a glance at any listing of EDP organizations,
such as are included in the several stock exchange
and over-the-counter lists published in The Wall
Street Journal, The New York Times and elsewhere
(particularly the regional lists), reveals that many
industry names continue to be employed without apparent regard to distinctiveness. One service center
directory lists fifteen company names beginning with
the prefix "Com" (eleven of which are the word "Computer"). Tne National Quotation Bureau in fact lists
so many similar names that over-the~counter traders
even make mistakes.
Already there have been litigated controversies
based on alleged likelihood of confusion (Advanced
Techniques Corporation v. Advance Computer Techniques, Inc., United Data Processing Services v. United Computer Systems, Inc., and Comsat v. Comcet) and
administrative determinations denying registration to
names as merely descriptive ("Scientific Data Systems"). The burden of going through such lengthy and
expensive proceedings alone should be more than enough
to justify name selection on a different basis.
It's time to get back to fundamentals. A corporate
name or trademark should be selected -- or changed -so as to distinguish and identify a product or service, without confusion now or in the event of future
expansion, geographically or to new products.
Purely descriptive names should be avoided like
the plague, and trademark and corporate name searches
in Washington and all toe applicable state and local
jurisdictions should be a routine part of the selection and use of any name.

ADVERTISING INDEX
Following is the index of advertisements. Each item contains:
name and address of the advertiser / name of the agency, if
any / page number where the advertisement appears.

ACM, 1133 Ave. of Americas, New York, N.Y. 10036 /
Corporate Presence, Inc. / Page 27
COMPUTERS AND AUTOMATION, 815 Washington St., Newtonville, Mass. 02160 / Pages 2, 3
GML CORPORATION, 594 Marret Rd., Lexington, Mass.
02173 / Page 52
MICROFILM PRODUCTS, INC., 40 West 15 St., New York,
N.Y. 10011 / S. Frederic Auerbach Co., Inc. /
Page 18
29

Who's Who in Computers and Data P~ocessing
A CONTINUING PUBLICATION:
FIFTH EDITION AND SUPPLEMENTS
:> SIXTH EDITION

Who's Who in Computers and Data Processing is
published jointly by Quadrangle Books (a New York
Times Company) and Computers and Automation.
In view of the financial depression in the computer field, the Who's Who will until further notice
be published as the FIFTH-EDITION plus a number of
SUPPLEMENTS.
The annual subscription rate is $49.50; it includes at least two updating supplements per year,
AND the Fifth Cumulative Edition, 1970-71, hardbound,
3 volumes, over 1000 pages, over 15,000 capsule biographies. Persons who already have the Fifth Edition
may subscribe at $22 per year until the Sixth Cumulative Edition is scheduled.
If you wish to be considered for inclusion in the
Who's Who (or if information for you has been previously published and requires updating), please complete the following entry form (or a copy of it), and
send it to us.
WHO'S WHO ENTRY FORM
(may be copied on any piece of paper)
1. Name? (Please print)~~________________________
2. Home Add_ress (wi th Zip)? _______________
3. Organization?~~~~~-----------------------4. Its Address (with Zip)? ______________
5. Your Title? _____________________________________
6. Your Main Interests? ________~~--~~------~~
- Applications ( ) Logic
Sales
Business
( ) Management
Systems
Construction ( ) Mathematics
Other
Design
( ) Programming
(Please specify)
Year of Birth? ______~---------------------Education and Degrees?~~~---------------Year Entered Computer Field? ____________________
Your Present Occupation?~--~~----~--~----Publications, Honors, Memberships, and other
Distinctions? __________~------------------~
~~----~~--------------~(attach paper if needed)
) Yes ( ) No
12. Do you have access to a computer?
a. If yes, what kind of computer?
Manufacturer?
Model?
--------------------------------------b. Where is it installed:
Organization? _______________________________________
7.
8.
-9.
10.
11.

Address? __________~--~~~~~----~--~~~~--c. Is your access: Batch? ( ) Time-shared? (
Other? ( ) Please explain:
d. Any remarks? _____________________________________
13. In which volume or volumes of the Who's Who -(a) Have you been included?
~see
~
(b) Do you think you should be included? tbelowj
Vol. 1:
Vol. 2:
Vol. 3:

Systems Analysts and Programmers
Data Processing Managers and
Directors
Other Computer Professionals

(a)
(--)

(b)
(-)

Townsend - Continued from page 11

within the organization to better enable the manager
to identify any employees that were not complying
with the intent of the program. The number of instruments overdue from loan was reduced 65% during
the first 19 months the report was distributed.
System Operation

Prepunched card sets are filed by instrument noun
in book leaf kardex for each instrument assigned to
an Instrument Control Station. For example, a request for a Hewlett Packard, Model 614, signal generator is processed by locating the instrument loan
card in the kardex by noun, manufacturer and model
number (photo U2). The appropriate prepunched loan
card is removed and presented to the requesting employee to sign and enter his employee number, telephone, organization and building (photo u3). The
attendant then places the loan card in the Remote
Data Input (RDI) terminal. The variable levers are
set to reflect the borrowing employeeVs number and
the promised return date. A token is permanently
assigned to the terminal which identifies the submitting station and building. The terminal is then
activated to process the prepunched tab card data,
variable- lever information and token information
(photo U4). The data is gathered on daily journal
tapes ~hich are processed weekly against two master
files. 1) The instrument identification data input
from the prepunched tab card is matched with the
company property master file to assure proper instrument identity. 2) The employee number is
matched with the company payroll file to properly
establish the borrowing employee's name anq drganization. From these two master files and the terminal
data, the Instrument Pool Data System (IPDS) master
file is updated with the weekvs activity and the
weekly and bi-weekly reports are published for distribution and use the following Monday.
Monthly system audits are conducted, using statistical sampling techniques, to verify overall system accuracy and utilization figures. These audit
checks are used to maintain system discipline and
establish awards for Zero Defects performance. Results of each monthly audit are distributed to all
personnel within the Instrument Pool.
Looking Forward

Feasibility studies are currently being conducted
in relation to on-line input, inquiry and response.
The ability to establish utilization parameters for
exception reporting to be used in retir-ement and
procurement analysis is also being considered.
Unfortunately, the need for these capabilities
has a relatively high dollar cost in relation to
terminals, computer programming and the normal cost
constraints of an on-line system.
Conclusion

14. Do you subscribe to Computers and Automation?
( ) Yes ( ) No
15. Associates or colleagues who should be sent
Who's Who entry forms? Name and Address?

(attach paper if needed)
When completed, please send promptly to:
Who's Who Editor, Computers and Automation,
815 Washington St., Newtonville, MA 02160
30

The implementation of the IPDS has produced the
following results for LMSC in the past four years:
1) Increased instrument pool inventory utilization from 56% to an average of 87%.
2) Reduced the inventory from 20,000 to 12,000
with no loss of effectiveness.
3) Resulted in the highest retirement activity
in the history of the company.
4) Accounted for calibration savings in excess
of 780,000 hours.

D

COMPUTERS and AUTOMATION for May, 1972

,.

HOW FIENDISH CAN YOU GET?

by Helsinqen Sanomat, Helsinki, Finland; Ian Low, "New
Scientist", Jan. 20, 1972; Judy Bellin, Women's Strike
for Peace, New York, N. Y.; Congresswoman Bella Abzug,
House of Representatives, Washington, D.C.

'j!\

more atrocious, more refined, and more cunning form of warfare is being intensified. "

Outline

1. Less Visible War against Civilians, with IBM
Computerized Guidance
by Helsingen Sanomat
2. Lethal Technology
by Ian Low
3. Total Body Radiation on Human Beings for the
Pentagon
by Judy Bellin
4. Biological Weapons
by Judy Bellin
5. A Lawbreaker, Guilty of Contempt of Congress
by Congresswoman Bella Abzug
6. Why No Wide Publication?
by Edmund C. Berkeley
1. Less Visible War Against Civilians with
IBM Computerized Guidance
Helsingen Sanomat
Helsinki, Finland

The war in Indochina is changing -- it is becoming a silent war. The battlefields are shaking less
because the big bombs have given way to small, harmful splinter bombs, to steel bullet bombs and fragment bombs. It has become a war personified by
small mines camouflaged by leaves or sand; they
wound rather than kill. And the newspapers are covering it less because there seems to be less happening.
This has been the major goal of Vietnamization:
to forestall defeat implicit in a peaceful settleCOMPUTERS and AUTOMATION for May, 1972

ment by making the war less visible, allowing it to
be carried on quietly into 1973 so that Mr. Nixon
does not have to run for re-election as the only
American president to have lost a war. Costs have
been cut, troops are being withdrawn and American
casualties have been reduced to make the Vietnamization plan look respectable to the American people
and to the world. But behind the misleading statistics lies a new and equally destructive Vietnam War
controlled from the White Igloo.
The White Igloo sounds as peaceful and innocent
as an Eskimo hut on polar ice. But it is a cover
name for something far more complicated -- automated
warfare planned and carried out bX electronic machines. One U.S. Senator called it a "seismic and
acoustic Christmas tree", another picturesque term
which doesn't quite suit this system which is responsible for massive, blind-folded air strikes in
Laos and along the Ho Chi Minh Trail.
The White Igloo operates without troops. Acoustic and seismic "sensors" and "reconnoiters" are
built inside long poles which are dropped from
planes in great quantities. They implant themselves upright in the ground. A radio transmitter
and receiver is dropped by parachute; it may settle
in a tree or shrub after which the chute self-destructs so that the radio will not be easily found
by the enemy. The poles then receive sounds and vibrations from the environment which are relayed via
the radio to a reconaissance plane which circles at
very high altitude overhead.
The messages are forwarded to a control center in
Nakhon Phanom, Thailand, where they are fed into
computers. Professional "target-seekers" determine
the source of the messages; if they conclude that
they originate from hostile troops, an air attack
order is issued.
31

An IBM machine (Type IBM 360-65) analyzes the
source of movement, indicating its numerical
strength, speed and position. It is not of course
misled by camouflage, darkness, fog or cloud cover.
The control center orders an attack against the
area. The order goes to airbases in Thailand or
South Vietnam or to the aircraft carriers which circle the Vietnamese coast. IBM machines in the airplanes receive the attack signal, and they automatically fly directly to the target, unerringly dropping their bombs. General Evans, one of the directors of the White Igloo system, has noted that the
splinter-bombs used in this type of procedure have
achieved "excellent results".
Hundreds of different weapons have been created
to fight the automated war in Indochina. There are
laser and TV-guided bombs that find their own targets. There is the Starlight Scope, a powerful
light source that destroys the camouflage of night.
There are binoculars that can see the trademark of
a golf ball at over a thousand yards.
There are devices that react to the secretions
and temperature changes of the human body. And
automatic rapid-fire guns that fire 5000 shots per
minute, mowing down everything like a scythe. There
are magneticd~vices that register all metallic
items and relay their messages to the IBM machines,
dozens of miles away. And there are weapons specifically designed to mutilate human beings without
causing property losses: they can crush a person's
leg but don't damage automobile tires.
There are grapeshot bombs, which bounce up to
chest-level before they explode, releasing a round
of 500 shots. Their bullets are a little bigger
than those of a hunting gun and are obviously designed to kill, as they necessarily hit vital organs -- except when a small child is struck by this
spray of bullets at a distance, in which case he
will likely carry them around for the paralyzed remainder of his life.
Round bullets are considered too humanitarian for
certain purposes, and are often replaced by small,
sharp-edged splinters (which inflict severe wounds
and are more difficult to remove). Plastic and
fiber bullets which escape X-ray detection are now
being used.
There are cobweb bombs, which are dropped from
airplanes. Upon hitting the ground, they send out
lO-yard-Iong feelers called "reconnoi terers" in
every direction. When the reconnoiterers hit something, the bomb explodes.
American war theoreticians have calculated that
it is better psychological warfare, and better public relations at home, to disable people rather than
kill them. A dead person is buried and forgotten;
but an invalid has to be taken care of, perhaps for
the rest of his life. When disabling weapons are
used in large quantities, the Vietnamese must devote
their energies to caring for the wounded.
It is not easy to fight these technical monsters.
The Vietnamese guerrillas have managed to confuse
the computers in several ways: for instance, they
have hung bags of human urine on trees to confuse
devices that record the location of human secretions.
The automation of the war in Indochina is still
in its early stages, but improvements are rapid and
continuous. We are facing a revolution in war tech-

32

nology the consequences of which are impossible to
estimate. The peoples of Indochina must be saved
from the agonies of the new "electronic battlefield".
2. Lethal Technology

Ian Low
"New Scientist", Jan. 20, 1972

While the rest of the world is beginning to hope
that the Vietnam war may at last be ended -- President Nixon may have found, as Eisenhower did, a winning slogan in "Bring the boys home" -- there is evidence of grisly developments in military technOlogy
for which no tactical or strategical reason seems
valid. It looks uncommonly like brutality for its
own sake.
A letter in Le Monde (15 January) from Professor
Andre Roussel, deputy director of the French National Institute of Health and Medical Research, refers
to some of the things going on in Vietnam and the
misgivings they aroused at an international conference on medicine in the Vietnam war, held in Paris
at the end of last year. Both American and Vietnamese doctors who attended referred to the daily use
of a variety of bombs -- napalm, magnesium, and a
device containing a mixture of phosphorus and aluminum which, according to Professor Roussel, "leaves
monstrous wounds". The anti-personnel bombs have
progressed from those which, bursting several feet
above the ground, scattered hundreds of steel missiles the size of billiard balls. These penetrated
the body and ricocheted, reaching several organs in
turn. The most recent model, however, uses plastic
missiles which defy detection by radiography so that
it is virtually impossible for the surgeon to remove
them.
Professor Roussel also refers to the "earthquake"
bomb used to clear ground for helicopters to land.
It also has the effect, however, of dislocating the
bone in the inner ear, producing deafness in adults,
and leaving young children deaf and dumb. A form of
booby trap bomb parachutes to earth where it sends
out, in different directions, eight threads of nylon
each about 8 metres long. The threads are almost
invisible but the least disturbance of one of them
causes the bomb to explode. Roussel is also disturbed by an ethical development among doctors. He
claims that psychologists -- half doctors, half combatants, called "aid men" -- are being sent on missions to carry out psychological warfare.
As Roussel says, it is unimportant that land
forces are being withdrawn if a "more atrocious,
more refined, and more cunning form of warfare goes
on and is even intensified".
3. Total Body Radiation on Human Beings for the Pentagon
Judy Bellin

Women's Strike for Peace
New York, N. Y.

The Pentagon has paid the University of Cincinnati $850,000 to test the effects of total body radiation on troops in a possible atomic war.
Terminal cancer patients were selected as guinea
pigs and the sinister experiments have continued for
the past 11 years. The Washington Post reported
that the patients were not told of the Pentagon
funding or the main purpose of the research. Senator Edward Kennedy has demanded a full report from
Defense Secretary Laird.
COMPUTERS and AUTOMATION for May, 1972

In addition to guaranteeing certain death, the
hideous radiation treatments heighten the agony of
the victims, causing nausea, vomiting and severe
depression.
4. Biological Weapons
Judy Bellin
Women's Strike for Peace
New York, N. Y.

In November 1969 Nixon announced that the US
would never use biological weapons in war and would
never be the first to use lethal gas. Existing
stocks of chemical and biological (CB) weapons and
ingredients for their manufacture were to be destroyed; such CB "research" facilities as Fnrt. Detrick would be converted to civilian use. This fall
the US and the USSR co-sponsored a UN resolution
(as well as a draft treaty at Geneva) banning the
production and stockpiling of biological weapons
(but not their use!) -- reference to chemicals such
as the defoliants and nausea agents used in Vietnam
were discreetly omitted.
The following facts would suggest that instead of
decreasing, US plans for CBW are escalating:
-- The 1972 military budget provides for doubling US
purchases of CBW weapons (from $25.3 million in 1971
to $50.8 million in 1972).
Weapons destruction was not very meaningful: at
Rocky Mt. Arsenal it involved "some obsolf'te types,
not compatible with tOday's high-performance aircraft," and at Pine Bluff Arsenal it meant destruction only of obsolete (WWII) nerve gas -- the arsenal will continue to study such weapons as the
M36E2 cluster, an incendiary anti-personnel weapon.
-- The US Army chemical center at Ft. McClellan,
where officers (including those from Greece and S.
Arabia) are trained, continues to use a manual on
how to spread germ warfare. Although the course
now claims to train for defensive purposes only,
civilian protection is almost ignored -- in fact, it
is suggested that this may be impossible in any
case.
-- The Defense Marketing Survey (an industry newsletter) reported April 1971: "Despite public anno~ncements to the contrary, the military agencies
are not discontinuing CBW research. Work in these
areas is continuing at funding levels equal to or
exceeding those prior to the "public relations" announcements of cessation of these efforts. CBW research is merely being conducted in a different environment, and ... with less public attention."
-- American Report, 9/17/71, said that new contracts will include the manufacture of nerve gases,
incapacitating, riot control and harassing agents,
defoliants, herbicides, and biological agents, including anthrax, Rocky Mt. spotted fever and tularemia.
-- Last fall the Army started construction on a new
$27 million facility on the grounds of the Presidio.
45% of its funding has been authorized for CB "de_
fense" research. The Army insists this research
will be solely for treatment purposes, but the Institute's design is based on that of Fort Detrick.
Did the Army perhaps turn Ft. Detrick over to civilian CUSPHsi use because it was outmoded, and in order to build itself a new facility in safer surroundings?
COMPUTERS and AUTOMATION for May, 1972

5. A Lawbreaker, Guilty of Contempt of Congress
Congresswoman Bella Abzug
House of Representatives
Washington, D. C.

"When the President recently signed the $21.4
billion Military Procurement Act, he said that because he didn't agree with one section of that law
he would ignore it . . . .
"I submit that by his words and his actions
President Nixon, who represents himself as a lawand-order advocate, is actually himself a lawbreaker, gui lty of contempt of Congress."
(Address to the National Youth Caucus at Loyola
University, December 4, 1971)
6. Why No Wide Publication?
Edmund C. Berkeley
Editor, Computers and Automation'

Why is information about atrocities of these
kinds not widely published and distributed throughout the newspapers and media of the United States?
So that Americans with a sense of common decency can
roar their protests?
There seem to be two answers. One is the cooperation of the American press with the American Establishment. The other is failure of Americans to
be as concerned about Asian civilians and American
cancer victims as they are concerned about drafted
American soldiers. This is a moral failure.

ADVANCED NUMBLES
Neil Macdonald
Assistant Editor
Computers and Automation
We regret that an error occurred in the April Advanced
The problem should have read:

Numble No. 72401.

ADVANCED NUMBLE NO. 72401

Find one solution to: ONE x TEN = SEVEN
We wish to thank those who wrote to us pointing out
that the Numble as published had no solution. You are
correct. The solution to the correct Advanced Numble
No. 72401 will be published next month for those who
wish to try their hand again.
Solution to Advanced Numble 72402

E=4
H=9
0=8

R=O
T = 1
W =3

TWO

x TWO

138 x 138

=
=

THREE
19044

We invite our readers to send us solutions, together with
human programs or a computer program which will produce the solution.
33

DALLAS: WHO, HOW, WHY? - Part III
Mikhail Sagatelyan
Moscow, USSR

"The fact that an enormous quantity of documents having a bearing on the crime
[of assassinating President Kennedy} were classified for a period of 75 years by
the Warren Commission without a word of explanation ... evoked grave suspicion.~'

Ten months later, early morning on September 25,
1964, in a long corridor of the Executive Office
building which neighbours on the White House, several hundred American and foreign correspondents
queued up for the just released Report of the Warren
Commission. It was a thick volume consisting of 888
pages. Press reports were embargoed until Sunday
evening, September 27, 1964, so reporters had twoand-a-half days to sift through the findings and
compose their copy. So much has been written since
about the Warren Report and about the official version of the "crime of the century" that there is no
need here to recapitulate the whole thing in detail.
I will limit myself to a brief resume of the main
points made in the Warren Report: Lee Harvey Oswald
was acting on his own initiative, so was Jack Ruby.
and neither killing in Dallas was the result of a
conspiracy -- either American or foreign.
Without giving their readers an opportunity to
actually familiarise themselves with the contents
of the Report, the American mass media of information in its majority unleashed a flood of commentaries and articles frankly designed to persuade the
reader to accept the Report as definitive and indisputable. Here are some indicative examples.
Walter Lippmann, writing in The New York
Herald Tribune on September 29, 1964, expressed his
conviction that future historians would uncover nothing that might cast a shadow on the absolute honesty
and integrity of the seven members of the Commission
and their findings. No one, at home or abroad, Lippmann stated, should question the validity of their
verdict.
In The Washington Post and Times Herald, Marquis
Child wrote on the 28th of the same month that the
Report was a monument to the painstaking sifting and
analysis of facts, rumours, suspicions and wild surmises examined by the Commission. It would not satisfy those who insisted on a conspiracy. For the
ultra-leftists, Lee Harvey Oswald was a pawn in the
hands of the right. The ultra-right declared.it was
a plot hatched in Moscow or Havana. But the thorough
investigation must convince the honest, Childs maintained, that the killer was a loner.
In an editorial,The New York Times wrote on the
same day that the facts presented by the Commission
(Parts 1 and 2 were published in the March and April 1972
issues respectively, of Computers and Automation. Reprinted
from Sputnik, published by Novosti Press Agency, Moscow,
USSR.)
34

destroyed the ground from under the feet of those
who alleged there was a conspiracy.
I was not able to follow everything that the eminent columnists had to say on the subject subsequently, but two years later The New York Times ran
an open letter addressed to Earl Warren which asked
whether Kennedy was not destroyed as a result of an
organised attempt to change the political course of
the United States and whether or not it was true
that within the national political and military
power structure there was a functioning internal opposi tion which had attempted to gain its ends through
the murder of the Chief Executive and that there was
a conspiracy not only directed against the person of
John Kennedy, but also directed against his attempts
to end the cold war.
But to return to the Report. Two characteristic
peculiarities catch the eye upon an attentive reading of the main conclusions.
In the first place, the Warren Commission tried
to combine a truth -- there was no "communist plot"
-- with an untruth -- there was no conspiracy of any
kind. These two artificially combined conclusions,
one well-founded and the other more than questionable, were served up to America and the rest of the
world on one plate, in the hope they would be swallowed together.
The psychological sleight-of-hand worked like
this: since it was easy to prove that neither Oswald
nor Ruby were "foreign agents", then by a sort of
psychological inertia, the strength and force of
those proofs could be used to lend credence to the
Commission's finding that Oswald and Ruby were both
operating alone and that they were "psychologically
unbalanced". The Commission also stated that in committing their crimes (and it must be noted that Oswald's guilt was not proved by the Commission) the
men were governed by purely personal and emotional
motives and reasons. In short, in the Report everything appeared to be clear and simple -- there was
no conspiracy either on the part of right extremists
or on the part of communists.
Secondly, the formulations and presentation of
the conclusions reached by the Commission were somewhat odd. In the opening paragraphs where the Commission promises to reveal the "whole truth" and
boasts about the thoroughness of its investigation,
the language is concise and assured. But in the
conclusions, when such questions are touched on, for
example, as Oswald's connections with the FBI and
the CIA, then the language suddenly loses its crispness and becomes convoluted. This is how the ComCOMPUTERS and AUTOMATION for May, 1972

mission dealt with OswaldQs connection with the FBI
and the CIA: "Judging by the facts available to the
Commission •.• ".6 And at the end of the paragraph:
"All of the contacts of these bodies with Oswald
were established in the routine carrying out of
their duties.,,7 Is this a denial?
With respect to others being involved in the actions of Oswald and Ruby, the Commission reported
that if such evidence existed, it was not available
to investigating bodies of the United States and
the Commission knew nothing of such proofs.
So what remained inaccessible to the Warren Commission and investigating bodies? A check on the
files of the FBI and CIA in order to establish
whether or not Oswald and Ruby were in fact agents
of one or the other of these organisations? It
seems to. So then what "independent investigation"
could there be?
In fact, out of the 26 supplementary volumes
(they were published much later than the Report), it
is possible to pick out scores if not hundreds of
absolutely convincing facts which refute the Warren
Commission's claim of impartiality of investigation.
Here is only one glaring example.
In the Report it is stated that as a result of
Oswald's request to allow him to return with his
wife to the United States, on May 9, 1962, by request of the State Department, the US Immigration
and Naturalisation Service agreed to temporarily
waive the limitation imposed by law which prevented
the issuing of an American visa to a Russian wife until she had left the Soviet Union. The Commission
revealed another interesting fact: it seems that
the American Embassy in Moscow paid out $435.71 to
Oswald to pay for plane tickets to the United
States.
Why were such exceptions made for a man who
called himself a "communist" and who at one time had
renounced his American citizenship (although he prudently took no legal steps to do so)? Why existing
immigration laws were waived in order to allow his
wife -- a Soviet citizen -- to enter the States and
why government funds were allotted to pay their
fares, the Report did not explain.
On the whole, the triumphant fanfare that greeted
the Warren Commission Report proved in the final
count futile. The only section of the "investigation" which sounded convincing was the part that
stated that communists, American or foreign, had nothing to do with the assassination of John Kennedy.
Everything else was open to doubt. The fact that
the enormous quantity of documents having a bearing
on the crime were classified for 75 years by the
Commission without a word of explanation also
evoked grave suspicion.
Abroad the Report was not accepted. Within a
week of its publication, The New York Times was
forced to admit that the conclusion that President
Kennedy's assassination was the work of one man not
belonging to any conspiracy had met with widespread
scepticism and frank disbelief in many newspapers in
many countries. Rather typical of the reaction
abroad to the Warren Commission Report was Guy Mol~et's, General Secretary of the French Socialist
Party. He suggested that someone in the United
States had found an "invaluable" killer -- he was a
Communist, a Marxist and a Castro:ite all rolled
~nto one.
It was simply too good to be true. They
were not very original in their fantasies, Mollet
went on to say. It had all been done by Hitler beCOMPUTERS and AUTOMATION for May, 1972

fore them and the whole business reminded one of the
Reichstag fire •..
The American reaction to the Heport was more
complex. In the beginning quite a few fell for the
psychological sleight-of-hand -- the "neither left
nor right" approach. However their acceptance of it
lasted only the length of time it took various American writers, professors and journalists to study the
Report themselves, reach their own conclusions and
challenge the Commission's findings. When they did,
they repudiated only those conclusions that insisted
there was no internal conspiracy of the right. I
have in mind the works of Mark Lane, Thomas Buchanan,
Joachim Yosten and a whole number of other American
writers. The vast majority are known to the reader
and I shall not repeat their crushing analyses of
the report, the accusations of suppressing and falsifying evidence, ignoring vital information, etc .. directed at the Commission.
However, mention must be made of William Manchester's book, Death of a President, (now available in
Russian) which came out in 1966. Manchester performed a Herculean task of gathering statements from
witnesses. Everyone he requested for an interview
agreed to meet with him except for two people -- Lyndon Johnson and Oswald's widow, Marina, who was jealously guarded by the FBI. Marina Oswald was quick to
refuse to see Manchester -- it was obvious that the
FBI had simply forbidden her to do so. But Johnson
was another story. At least twice he promised to see
the writer and both times at the last moment avoided
an encounter. "He found he could not bear to do so,"
Manchester explains rather suggestively (just as he
could not bear to talk to Rose Kennedy). Finally
Johnson agreed to reply in writing to submitted questions. However, he replied by no means to all of the
questions raised, Manchester points out in his book.
Precisely what questions were ignored by Johnson,
Manchester does not say. This, along with the obvious
fact that much in Death of a President is only hinted
at, left unsaid. and what is said sometimes contradicts the real content of the book (for instance the
author's avowal that he agrees with the findings of
the Warren Commission) is not hard to understand:
Manchester was writing his book at a time when Johnson was still President. Nevertheless, Death of a
President had considerable influence on the American
evaluation of the Warren Report.
Two years after the Report was published, the
Louis Harris Institute of Public Opinion conducted a
national poll. The results were reported in the
press and must have caused uneasiness in some quarters in Washington and Dallas. Three out of five
Americans did not accept the main tenet of the Report
that the assassination was the work of one man and
were inclined to think the killing was part of a wide
conspiracy. The majority believed that the Report of
the Warren Commission did not contain the whole story.
Figures were given: 46 per cent thought the assassination of Kennedy was part of a wide-spread conspiracy; 34 per cent thought it was the work of one individual; 20 per cent doubted the trustworthiness of
the Report but had no firm opinions as to underlying
motives. Therefore, 66 per cent of those questioned
disbelieved the validity of the conclusions presented
by the Commission.
It should be noted that the same poll revealed
that in spite of the attempted brainwashing as to a
communist conspiracy, few Americans had accepted it.
In reply to more detailed questions as to who precisely was behind the Kennedy assassination, only two
per cent said "Oswald and the Russians" and only one
per cent -- "Castro". Two per cent had the temerity
35

to assert: "Lyndon Johnson."
A little while later the same Harris Institute
conducted another poll on the same subject. The results were still more depressing for both Johnson and
the Warren Commission. The percentage of those who
thought the Report was false had risen to 72. Ten
per cent simply doubted it but could not give (or did
not wish to give?) any reason. Only 18 per cent
stated that the Warren Report had fully illuminated
the killing in Dallas.
When I was in Oklahoma once, I saw an old grave
in the local cemetery that had survived from cowboy
times. On a simple tombstone the words were carved:
"Sam Jones. Hanged by mistake. 1896." I was reminded of that stone when I read the results of the
polls. In their own way, they are a tombstone in
the cemetery of history: "The Warren Commission Report. Composed with evil designs. 1964."
That is why loud and insistent demands were
raised in the United States for a new investigation
of the circumstances of John Kennedy's assassination. Among others, Life Magazine, The Saturday
Evening Post, Look Magazine and several important
weeklies called for a new inquiry. Pressure was
also exerted on Earl Warren to personally reply to
the numerous accusations levelled by the public.
How did the government react to these demands?
For one thing, through journalists close to the Administration it spread the following explanation of
the demands for a re-examination of the "Kennedy
Case": it was all part of Robert Kennedy's political game; he was preparing to fight Johnson in 1968
for the presidential nomination and was not above
exploiting his brother's death for his own ends and
had therefore raised the fuss around the Warren Report.
Such an explanation had a certain validity. However, it in no way invalidated the just demands for
a new inquiry. Notwithstanding personal political
ambitions, Robert Kennedy did not erect the symbolic
tombstone over the Warren Report. The American
people did it themselves.
Subsequently the government replied to the appeals to re-open the case and replied directly. At
a regular White House press conference Johnson announced that he had no grounds to question the findings of the Commission. The same thing was said
earlier bY,J. Edgar Hoover,director of the FBI,
only a little more crudely.' There was no evidence,
he said, of Oswald having had an accomplice or accomplices. The head of the FBI did not stop there.
He told off the millions of doubting Americans and
demanded that they show a little more respect for
the available facts.
'

In Moscow, shortly after the Warren Report came
out, the chief editor of one American weekly said to
me:
"It doesn't seem to me that the Russians should
criticise the Warren Report. It's no good for you
or us or for anyone who'd like to see tensions relaxed between Washington and Moscow ..• "
In answer to my "how so?" the American at first
tried to get away with generalisations about "inevitable worsening of Soviet-US relations in such a
case, even if you're not to blame, but still it
would entail a deterioration". At last he became
irritated with my "denseness" and said: "For some
real big shots in our country the whole subject is
like waving a red rag at a bull ..• "
"But what you're saying is pure blackmail!" I
finally exploded.
"It may be, it may very well be so ... But bear
in mind that it's not my blackmail, I only raised
the whole thing in order to explain the situation.
Believe me, personally I'd be very happy if things
were otherwise .•. "

Another foreign colleague who knew Russian and
Russian literature quite well, suddenly recalled
Griboyedov when we started discussing the Warren
Commission Report:
"How does he put it?" he said with a thin smile.
"He says, 'What a commission, oh Lord Creator!' Well,
the creator is Lyndon Johnson. He's the one who
must answer for it. But no one wants to put the
questions: the Americans are a bit afraid -- after
all, he is the~President! And then they're ashamed
for their country. We allies -- don't dare: But
what a wonderful title for an article: 'What a commission, oh Lord Creator!' Only a question mark at
the end. Followed by dot, dot, dot. Not bad, eh,
Mike?"
The Thorny Path of Jim Garrison

There probably isn't a newspaper reader in the
world who doesn't know the name of Jim Garrison,
District Attorney of New Orleans. He is better
known than all the authors of all the books on the
killing in Dallas put together. Why is that? In
the first place, because he, like they, wished to
raise the c,urtain on the mystery surrounding the
death of John Kennedy. Secondly; and more importantly, the New Orleans District Attorney is the
first and so far the only person i~ a position of
authori ty in the Uni ted State,~, who has at tempted to
carry out a new investigation of the crime. Various
writers have only demanded such an investigation~
Jim Garrison pursued it.

The Warren Commission Report, the' criticism of it
by competent American investigators, the reaction to
the criticism on the pirt of the White House and the
FBI (other government departments preferred to say
lno-ihing):Led to a situation where people allover
the world were beginning to ask themselves questions
of this kind: why does the President ignore the
opinions of the American people? What threat to
himself does Johnson envisage in the attempt to investigate the "Kennedy Case" more fully, unless he
himself is mixed up in it or powerful political
forces not subject to his control?

Who is this Jim Garrison? An American 20th-century Don Quixote, fearlessly challenging official
Washington windmills? A smart politician hoping to
make capital out of a burning issue? Or perhaps a
shrewd, calculating one, acting in the interests of
some grouping which wishes to settle accounts with
its enemies and the tragedy in Dallas presents an
excellent opportunity? And finally, did his investigation and subsequent court case in any way help
to uncover the truth? Did it bring us any closer to
the sources of the conspiracy?

But facts incriminating the President and significant episodes continued to crop up, including thousands of miles from the shores of America.

In October 1966 -- in other words, at a time when
demands that the Lyndon Johnson administration reopen the inquiry into the circumstances of John Kennedy's assassination were at a height -- Russell B.

36

COMPUTERS and AUTOMATION for May, 1972

Long, Democratic Senator from Louisiana, expressed
his grave doubts to Garrison about the Warren Commission's'conclusions thai Lee Harvey Oswald was a
lone assassin. The-Senator pointed out that before
the shooting in Dallas Oswald had lived in New Orleans for several months and his activities there
could bear investigation. Senator Long added that
Garrison could count on his support •••
The Qistrict Attorney certainly wasn't acting on
his own.. Behif1,d him there was a special committee
composed of over 50 prominent New Orleans businessmen led by the millionaire Roli. This committee
raised additional finances over the meagre official
budget of the D.A.'s office in order to cover the
far-ranging investigation which Garrison launched
shortly after his conversation with Senator Long.
Garrison was also supported in his endeavour by
Cardinal: Cushing of Boston, close friend and fatherconfessor to the Kennedy family. "I think they
should follow it through," the Cardinal said of the
New Orleans probe. "I never believed that the assassination was the work of one man."
Garrison maintained that Robert Kennedy approved
of his investigation.
And so, in the fall of 1966, without any publicity, the New Orleans District Attorney's office
opened an investigation into the circumstances of
the assassination of President Kennedy.
On February 17, 1967, the New Orleans States-Item
reported the fact. Several dozen reporters from New
York, Washington, Chicago and a number of foreign
correspondents immedIately. converged on New Orleans.
By February 19 the press was quoting Garrison:
We have been investigating the role of the
city of New Orleans in the assassination of
President Kennedy, and we have made some progress -- I think substantial progress
what's more, there will be arrests.
I won't go into details concerning the people arrested by Garrison, the charges levelled against them
and the court findings. All that has been thoroughly
publicised. I just want to tell briefly the story of
the New Orleans case.
Clay Shaw, a New Orleans businessman, was accused
of being party (under the name Clay Bertrand) to
preparations to assassinate President Kennedy. The
plotters included David Ferrie, & former civil aviation pilot, Lee Harvey Oswald and a number of others
who met in Ferrie's apartment in the presence of witness Perry Russo. The charge, as Garrison reiterated
more than once, was painstakingly documented.
On March 14, 1967, a preliminary hearing was held
in New Orleans to determine whether there was enough
evidence against Shaw to bring him to trial. On
March 17, after a four-day hearing, the three presiding judges ruled there was sufficient evidence
to hold Clay Shaw for trial.
All the sessions of the grand jury were held in
camera and it heard Garrison's evidence against Clay
Shaw and hisacco.mplices (most of whom were dead -Oswald, Ruby and Ferrie). The American press believed that Garrison would lose'his case since members of the grand jury were in possession of the
Warren Commission Report which stated that both Oswald and Ruby were operating on their own initiative. As far as the press knew, the District Attorney had only one witness -- Perry Russo.
COMPUTERS and AUTOMATION for May, 1972

And then, on the 22nd of March, after examining
the evidence against the accused, the grand jury
concluded that there was .~ conspiracy directed
against President Kennedy, that Clay Shaw was a participant, that the evidence was overwhelming on this
score, and that the trial must proceed. This decision of the grand jury created a sensation: an American .£Q!!!.!. had in fact repudiated the Report of the
Warren Commission both as a document and as an official verdict. The sceptics had miscalculate~ Jim
Garrison was triumphant ••.
After innumerable delays and postponements insisted upon mainly by the defence, the trial took place
at last in February 1969. Clay Shaw was acquitted.
Obviously, unlike during the closed grand jury hearings, the prosecution witnesses did not sound very
convincing. The District Attorney himself seemed to
have lost interest in his case and turned up at only
two or three sessions.
What had happened? Why was Garrison's case lost?
Why, after putting so much effort and energy into
investigating the "crime of the century" did the
D.A. cool off? And finally, does the fact that the
case was lost prove that there was no conspiracy and
that the Warren Report was correct? Not at all.
All the investigations and preparations for the
·trial serve as vivid, ff indirect, proof that the
charges were based on truth. The justice o~ this
conclusion will be seen if one examines the obstacles that were placed in the way of the District
Attorney. The very fact that Garrison had such a
difficult time of it is in itself convinciug proof
that he was on the right track and had arrived at
the truth.
As already mentioned, on February 17, 1967, the
world learned that an investigation into the Kennedy
assassination was underway in New Orleans. The next
day the White House made public a document drawn up
by a special commission which called on the nation
to fight the crime syndicate, Cosa Nostra. The document contained quite a number of breath-taking sensations and exposures. Is it possible that the publication of the document on the day following the
news from New Orleans was pure coincidence? Of
course. But the practice of killing one undesirable
sensation with the help of another or other sensations is so widespread in America that the coincidence puts one on guard, to say the least. Whatever
the case, it proved impossible to deflect, attention
away from New Orleans. After Garrison's investigation became known, events moved swiftly and evoked
mounting interest throughout the world.
On February 19 Jim Garrison told reporters that
the Warren Commission was wrong and that he would
prove it.
Washington made no comment. Not a single highly
placed official had a word to say in the two weeks .
following the New Orleans announcement. However, in
the very first days after the press reports appeared,
someone's mysterious hand made itself felt. On the
evening of February 18, 1967, in one of New Orleans'
numerous bars, the District Attorney met a former
employee,of Batista's secret police, the counterrevolutionary exile, Seraphino Eladio del Valle.
Garrison showed del Valle a picture of Oswald to-.
gether with "an unidentified man". That is how the
photograph was called in the Warren Report where it
is listed under No. 237. Del Valle recognized the
"unidentified man" right away -- it was one of the
leaders of the Cuban counterrevolutionaries in the
37

United States, one Manuel Garcia Gonzales. Del Valle agreed to arrange a meeting between Garrison and
Gonzales. On the evening of February 20 both Cubans
disappeared. Three days later the mutilated body of
del Valle was found -in a'n abandoned car in Miami.
Gonzales simply disappeared from Louisiana.
On February 22 David Ferrie was found dead in his
apartment. Traces of cyanide were discovered on
fragments of a broken tumbler. The police hesitantly presumed suicide. In any case, with the death of
Ferrie, Jim Garrison lost a vital witness for the
prosecution, a connecting link between Clay Shaw
and Lee Harvey Oswald.
The day after the body of Ferrie was discovered,
Jim Garrison stated that Ferrie had been the key to
many mysteries surrounding the killing in Dallas and
then incautiously added that he feared for the safety of others involved before the investigation was
completed. On February 24, Jack Martin, a New Orleans private detective who had gathered significant
information concerning the assassination for the
District Attorney, left the city for an unknown destination, leaving word with a friend that he did so
for reasons of "personal safety". At the end of
February another leader of the Cuban counter-revolutionaries disappeared whom Garrison believed to be
directly connected with the conspiracy.
Only then did Washington break its silence. The
new Attorney General, Ramsey Clark, and President
Johnson himself made statements.
In a brief interview given to the press, Clark
stated that he was aware of Garrison's investigation
and did not consider it had any foundation. According to evidence possessed by the FBI there was no
connection between Clay Shaw and the assassination
in Dallas, he said. In reply to persistent questioning on the matter by reporters, Clark again confirmed that Shaw had been checked out in this connection and cleared of suspicion.
The same day at a White House press conference,
a reporter asked President Johnson about his attitude to the New Orleans investigation in view of the
fact that it set out to demolish the Warren Report
and considering that Johnson had recently stated he
saw no reason to doubt the conclusions reached by
the Commission.
Johnson replied he saw no reason now to repudiate
any of his earlier statements.
Thus both the Attorney General and more cautiously, the President, had spoken up for Clay Shaw. Only
three months later, on June 3, the Department of Justice was forced to admit that Mr. Ramsey Clark had
lied on March 2: the FBI had never questioned or investigated Clay Shaw in connection with the assassination of John Kennedy. Washington's battle with Jim
Garrison had taken a scandalous turn: in an effort
to preserve some credibility on the part of the public in the Warren Report, the Attorney General had
resorted to an outright lie.
On March 2 another attempt was made to thwart
Garrison's inquiries. The New York radio reporter
of the Hearst World International Service announced
that Garrison intended to prove that the assassination of President Kennedy was carried out on Fidel
Castro's orders and that the real reason for Oswald's trip to Mexico was not to obtain a Cuban
visa, but in order to receive instructions from the
Cuban embassy_ The American press picked up the
statement and began to comment on it.

38

At the back of the whole provocative manoeuvre,
lay the desire to undermine faith in the "Clay
Shaw case". Well aware that by 1967 almost no one
in America or abroad accepted the "Communist conspiracy" version, the enemies of the New Orleans District Attorney counted on the fact that if people
thought that that red herring was the purpose of
Garrison's investigation, they would lose interest.
However, it didn't work. Jim Garrison denied the
Hearst allegations as to the trend of his investigations and flatly announced that no foreign state was
involved in the assassination of John Kennedy. When
the whole truth became known, he went on, a lot of
people, including the President of the United States,
were going to lose some sleep.
On top of everything, Garrison was seeking another witness who could shed light on the conspiracy. His name was Gordon Novel and he was the owner
of one of the biggest bars in New Orleans. However,
having been warned, he sold his business and disappeared on the eve of his impending arrest. After a
considerable search, Garrison's men located Novel in
Columbus, Ohio. In response to a request from New
Orleans, the local authorities at first detained
Novel. Then the real fun started.
In reply to the official request for Novel's extradition made by the State of Louisiana in order to
have him appear before the grand jury in the trial
of Clay Shaw, the Governor of Ohio stated that Novel
would be handed over only i f the New Orleans D.A ..
office gave a written affidavit that Novel would not
be questioned about "events connected with the assassination of President Kennedy"!
Gordon Novel was a key witness in the Clay Shaw
case because he was a CIA agent. This is not surmise or logical guesswork on the part of Garrison
and his investigators. Here is the proof. On May
23, 1967, Novel's lawyer, Stephen Plotkin, was
forced to admit that "(his) client served as an intermediary between the CIA and anti-Castro Cubans in
New Orleans and Miami prior to the April 1961 Bay of
Pigs invasion".
The same day the Associated Press reported that
when Novel first fled from New Orleans, he
headed straight for McLean, Virginia, which
is the Central Intelligence Agency suburb.
This is not surprising, because Gordon Novel
was a CIA employee in the early sixties.
This did not represent the whole truth. In Novel's abandoned flat in New Orleans, a valuable document was found thai testifie~,to the fact that Novel had not only been a CIA agent in the past, but
remained one up to the time he fled the city. The
paper, written in Novel's hand (which handwriting
experts testified to), was a draft of a report made
by Novel to his CIA superior, "Mr. Weiss". It is
an interesting fact that Novel's attorney also admitted later that: "Everything in the letter as
far as Novel is concerned is actually the truth."
Here are the highlights of the draft report:
I took the liberty of writing you direct and
apprising you of current situation expecting
you to forward this through appropriate channels. Our connection and activity of that
period involved individuals presently about
to be indicted as conspirators in Mr. Garrison's investigation.
COMPUTERS and AUTOMATION for May, 1972

Novel goes on to warn that Garrison's probe was
threatening to expose his ties with the Double-Check
Corporation in Miami and therefore it was essential
to take necessary counter-measures through military
intelligence since Novel himself, his associates and
lawyers, had run out of legal loopholes to forestall
the District Attorney.
Knowing enough about the ways and means resorted
to by the CIA in the case of blown agents whose existence threatens to throw light on the super-secret
operations of the "Langley Monster", Novel warned Mr.
Weiss that his death would not be in the interests of
his employers.
Our attorneys and others are in possession of
complete sealed files containing all information concerning this matter.
In case of his disappearance, accidental or otherwise, the files would be made public in different
areas of the country simultaneously.
Apparently Novel's threat was duly noted. His
life was spared and he himself was spared the necessity of giving evidence to Garrison.
Needless to say, Novel's report was couched in
such a way that it does not reveal directly what
actions are under discussion, but it does show that
they are relevant to Garrison's investigation. The
whole world knows that the District Attorney was investigating ~ conspiracy to kill President Kennedy.
So after Novel's draft report, is it possible to
doubt that the CIA was involved in some way in the
events in Dallas? Also, Novel's reference to the
Double-Check Corporation is additional evidence of
CIA involvement. Back in 1965, in a book written by
two Washington reporters, Thomas Ross and David Wise,
entitled The Invisible Government, the Double-Check
Corporation was unmasked as a CIA front engaged in
preparations for the invasion of Cuba in April 1961.
And now Double-Check had turned up in Dallas~
To anyone who followed the press, it became obvious that notwithstanding the law, Washington was
interfering with the District Attorney of New Orleans and the President was maintaining a discreet
silence with regard to the curious doings surrounding the case.
It is my deepest conviction that the facts concerning overt and covert obstacles placed in the way
of Garrison provided the lacking weight on the scales
of public opinion in the United States and abroad and
sent the Warren Commission Report plunging to oblivion and conversely strengthened the feeling that
Lyndon Johnson was behaving in a manner that suggested he was in some way mixed up in the Dallas crime.
That is why the actions (or inaction) of the Federal authorities, when they became known to the public, did not discredit the New Orleans District Attorney, but on the contrary, gave added substance to
his inquiries.
The trial in New Orleans continued, as did the attempts of the Federal authorities to end it. A considerable section of the press accused Garrison, as
he put it, of "every kind of unethical practice except child molesting" and he added with black humour,
"I expect that allegation to come shortly ••. " Garrison received many death threats by letter and. telephone. He kept a gun beside him at all times and
hung on. "On my tombstone," he joked, "may be inscribed: 'Curiosity killed the D.A. It, At one point
COMPUTERS and AUTOMATION for May, 1972

he confessed that he was glad he had not known of
the troubles in store for him when he launched his
investigation. If he had, he might have had second
thoughts, but as it was, he had no regrets.
So, after clearly demonstrating that Garrison's
investigation was impeded, to put it mildly, let us
now turn to the question of what new facts he was
able to uncover. He told about them himself as soon
as he realised that his best defence against both
physical reprisals and newspaper slanders lay in
making whatever information he possessed, public.
The following is the gist of two or three lengthy
interviews given by Garrison with the absolute understanding that he had corroborative proof in the
form of documents, photographs or statements by witnesses for each fact presented.

Q: Who was Lee Harvey Oswald and what was his
role in the assassination?
A: Oswald was a CIA agent. He was recruited
while still a US marine. He was sent to the Soviet
Union by the CIA with two main tasks: to spy and to
disinform. Oswald arrived in Moscow with data concerning the American radar network around and in
Japan. He underwent special training on a US military base at Atsugi preparatory to his trip to the
Soviet Union. He studied Russian and "communist
theory" and was allowed to subscribe to Pravda. This
is why, having failed in his mission due~e vigilance of Soviet counter-intelligence, Oswald was not
prosecuted on his return to the USA for giving secret
information to the Soviet Union. By request of the
CIA, the American embassy in Moscow paid the plane
fares to America for Oswald and his wife. Despite
existing American laws, the CIA also arranged to have
an entry visa issued to Oswald's Russian wife.
After returning to the United States, Oswald received a new assignment: to take part in the training of a special CIA terrorist group consisting of
Cuban counter-revolutionary exiles. The terrorists
were supposed to land in Cuba and assassinate Fidel
Castro.
The organising of the group took place in the geographical triangle Miami - New Orleans - Dallas.
They were trained in a special school on the shores
of Lake Ponchartrain near New Orleans. Jack Ruby,
David Ferrie and Gordon Novel were all there. Ruby
was also a CIA agent, Ferrie and Novel were operatives.
Oswald's assignment was to pretend to be a "communist". With this in mind, he organised a fictitious branch of the Fair Play for Cuba Committee and
distributed leaflets in its name and even spoke on
the radio. However, Oswald made one serious error
which almost cost him the game. He gave as the address of the New Orleans branch of the Committee the
address of a private detective agency which was widely known in the ci ty as the headquarters of ul traright organisations and which served as a cover address for Cuban counter-revolutionary groups. Later
this mistake of Oswald's cost th~ lives of both owners of the detective agency -- they died in mysterious circumstances in 1964, just as did so many others
who knew too much about the killing in Dallas.
In the summer of 1963 the CIA received strict instructions from the Administration to stop its preparations for an attempt on the life of Fidel Castro.
However, the CIA did not carry out the orders, merely
switched objectives. All the above-named participants
in the preparations for terrorism in Cuba, both Amer39

icans and Cubans. were fascist-minded reactionaries
who hated Kennedy. Oswald. who was a right-winger.
as his connections in Dallas and New Orleans testify.
also hated him. Garrison was able to pin-point these
connections of Oswald's. Clay Shaw, under the name
Clay Bertrand. took on the leadership of the conspirators who decided, "for the good of America" that Ken:"
nedy had to be liquidated.
From the very beginning, Oswald was assigned the
role of sacriff~ial goat. though he himself did not
suspect it. He was chosen because of his past contacts with communism - his "defection" to the USSR,
his "work" with the Fair Play for Cuba Committee, his
trip to Mexico to make contact with the Cuban and
USSR embassies. At first the plan was to organise
a trip to Cuba for Oswald just before the assassination to make the "communist conspiracy" more convincing.However, due to the vigilance of Soviet and
~uban security organs, Oswald was not allowed entry
to Cuba.
Oswald participated in the conspiracy against Kennedy, but he did not shoot at him.
Garrison was not able to establish what Oswald's
role in the conspiracy was, but he was able to show
that others, not Oswald, fired the shots.
Footnotes

1. Retranslated from the Russian. Tr.
2. ibid.

"THE COMPUTER DIRECTORY AND BUYERS GUIDE"
ISSUE OF "COMPUTERS AND AUTOMATION"
NOTICE
The U.S. Postmaster, Boston, Mass., ruled in Jdnuary
1972, that we may no longer include "The Computer
Directory and Buyers' Guide" issue of "Computers and
Automation", calling it an optional, thirteenth issue of
"Computers and Automation" regularly published in June,
and mailing it with second class mailing privileges.
The plan mentioned previously for publishing the directory as a quarterly with second class mailing privileges has
been disapproved and disallowed by the Classification Section of the U.S. Postal Service in Washington, D.C.
Accordingly, in 1972 "The Computer Directory and
Buyers' Guide", 18th annual issue, will be published in
one volume as a book, and mailed as a book.
The domestic price for "The Computer Directory and
Buyers' Guide" will be $14.50, but regular subscribers to
"Computers and Automation" may subscribe to the directory at $9.00 a year (there is thus no change for
them).
"The Computer Directory and Buyers' Guide" issue
of "Computers and Automation" has been published in
every year from 1955 to 1971, and 1972 will not be
an exception.

(To be continued in the next issue.)

You qre invited to enter our

COMPUTER ART CONTEST
the special feature of the August, 1972 issue of

computers
.and automation
815 Washington St., Newtonville, Mass. 02160

"Seahorses"
- Dflrbv Scanlon

GUIDELINES FOR ENTRY
I. Any interesting and artistic dr~wing, design or sketch made by
COmputer (~nalog or digital) may be entered.
2. Entries shol.1ld be submitted on white paper in black ink for
best reproduction. Color entries are acceptable, but they may
b~ published in blledcOtnl'l
Note
____

t etre«wed
A. In{ortnatlon not yet recc"'-'
_A

"

i.t C. is for D?<)
I.uk tllX:?,... rpu

.~ROLOSICA PI06I~

0 Please enter my subscription 0 Payment enclosed 0 Bill me
0 Send information on THE COMPUTER DISPLAY REVIEW

16.131.1
25

j

.6 0

enrr.41pro(e~~o

.

594 Marrett Road • Lexington, MA 02173 • (617) 861-0515

1;\4101 aM ava,l

II

.:

Iltel/an

GML Corporation

1

1S

~

not yet receival.

IIUGIIES 11·3314
_A
3/65

l

S.131

fo~

0 i5

.5

COMPUTER CHARACTERISTICS REVIEW

2

~

lS 3.6 . 1S
1S
-

on (' G

9E

800
r .ltJd Illlfhbn of

1S

1;\4101 aho availa

In[Onnauon~.

IIUGIIESII.3,,8M
_A
1/GG

------------------___________________________

b~

D2~ r

!ai::b:; 60 (or
n ...... ,'

1S 36 . 1S
1S .;;

-

A. Price' l
120
300
Cf!ntraJ p/s or two rape dr'
16 1
I
OATASAA oce"or Used.
IVes.
.1. Varies (ro"; 68
_J
8
534
B 2131·1, 2131'2~5
to 1078 depend'
B
9·36
45 c
109 on

L DATA 3800

W.

MAGNETIC TAPE

'"

145

1

60
64
64
64
64

PROCESSORS C

UNIVAC 1110
'''''tROUGHS B6700
360/65. 67

'WELL 6000/6080
WELL 200/8200
OL DATA 6400
:JL DATA 6500
)L DATA 6600

4140 ~so available.

Cycle

0.0275
0.054
0.08
0.08
0.345

360/75
160/go·
OUGHS B6500
:YWELL 600/635
YWELL 6000/6070

l262 U.. ,

Bilspn

(iRmin-o_
ucon
Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Producer                        : Adobe Acrobat 9.1 Paper Capture Plug-in
Modify Date                     : 2009:03:24 23:33:32-07:00
Create Date                     : 2009:03:24 23:33:32-07:00
Metadata Date                   : 2009:03:24 23:33:32-07:00
Format                          : application/pdf
Document ID                     : uuid:e31850fe-0ac9-4d69-8229-c74b6c75d9af
Instance ID                     : uuid:b759c9bd-5593-4c2e-a96f-a685b8a12fbf
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 52
EXIF Metadata provided by EXIF.tools

Navigation menu