197207
197207 197207
User Manual: 197207
Open the PDF directly: View PDF .
Page Count: 52
Download | |
Open PDF In Browser | View PDF |
/ - 1.,1 SCIENCE & TECHNOlOG~ - July, 1972 Vol. 21, No. 7 co LA PENSE USE Management Information Systems: The Trouble with Them Education for Data Processing: Yesterday , Today , Tomorrow The Impact of the Computer on Society - Some Comments Barriers in Applying Computers The Neglect of Significant Subjects, and the Information Engineer The Shooting of Presidential Candidate George C. Wallace: A Systems-Analysis Discussion / - Col. T. B. Mancinelli Thomas R. Tirney Joseph Weizenbaum E. C. Berkeley Peter J. Nyikos - Thomas Stamm SAI T CH1 ti a 1PO 2 12 114 7F 6 730 1 • - :I I I ! If?~ Y *N TtCH lCAl ScRVICE~ 00808 180 w SAf CARLOS ST • SA~ JOSt cA 95 1 13 Sample page from the Fifth Edition, ''WHO'S WHO IN COMPUTERS AND DATA PROCESSING" Who's Who in Computers ANDERSEN, Hans Peter Brostrup / console operator / b: 1946 / ed: Denmark / ent: 1966 / m-i: B Ma P Sa / t: console operator / org: Tretorn Data Center, AB, 25225 Halsingborg, Sweden / pb-h: / h: Tranemansgatan 14 3:e van, S-252 44 Halsingborg, Sweden ANDERSON, Alfred O. / inathematician / b: 1928 / ed: BS, math / ent: 1953 / m-i: P / t: mathematician / org: Aberdeen Proving Ground, MD 21005 / pb-h: ACM / h: 602 Market St, Aberdeen, MD 21001 ANDERSON, Carl S. / systems analyst / b: 1934 / ed: BS, Univ of Kansas School of Business / ent: 1962 / m-i: A Mg Sy / t: computing systems analyst' / org: The Boeing Co, 3801 S Oliver, Wichita, KS 67210 / pb-h: CDP / h: 806 N Florence, Wichita, KS 67212 ANDERSON, Edward J. / computer systems scientist / b: 1932 / ed: BS, Univ of California at Berkeley; MA, aero,space operations management, Univ of Southern California; MS, systems engineering, West Coast Univ / ent: 1959 / m-i: D Mg Sy / t: computer systems scientist / org: Computer Sciences Corp, p50 N Sepulveda, El Segundo, CA 90245/ pb-h: ACM, IEEE, "Design Considerations for a Telemetry Ground Support System", AIAA Aerospace Computer Systems Conference, 1969 / h: 1440 Florida St, Apt 8, Long Beach, CA 90812 ANDERSON, Frederick J. / engineer / b: 1923 / ed: Stanford Univ / ent: 1947 / m-i: A C / t: director of engineering / org: Sylvania Electric Products, Inc, 100 First Ave Waltham, MA 02154 / pb-h: - / h: 66 Woodridge Rd, Wayland, MA 01778 / ·C64 ANDERSON, Herbert E. / senior programmer / b: 1927 / ed: Univ of California, Univ of New Mexico / ent: 1957 / m-i: A P; statistics / t: staff associate / org: Sandia Corp, Sandia. Base, Albuquerque, NM 87115 / pb-h: ACM, CDP, several papers / h: 501 Mesilla NE, Albuquerque, NM 87108 ANDERSON, Jess / systems specialist / b: 1935 / ed: BA / ent: 1955 / m-i: A P Sy; research in physical sciences / t: specialist / org: Univ ofWisconsin, PO Box 6, Stoughton, WI 53589 / pb-h: several papers / h.1 2838 Stevens St, Madison, WI 53705 ANDERSON, Kermit C. / systems analyst / b: 1943 / ed: BS, Penn State Univ / ent: 1969 / m-i: L Ma P Sy / t: systems analyst / org: Marsh & McLennan,70 Pine St, New York, NY 10005/ pbh: - / h: 2 Park Ave, Green Brook, NJ 08812 ANDERSON, Marilyn B. (Mrs.) / junior engineer / b: 1927 / ed: Miami Univ / ent: 1949 / m-i: P / 2 Abbreviations include: b: ed: ent: m-i: t: org: pb-h: h: v: born education entered computer field main interests title organization publications, honors, memberships, other distinctions home address volume number Main Interests: A B C D L Applications Business Construction Design Logic Mg Ma P Sa Sy Management Mathematics Programming Sales Systems ANDERSON, Walter R. / president / b: 1929 / ed: AB, Clark Univ; BSEE, Worcester Poly tech Inst / ent: 1958 / m-i: Ma / t: president / org: Spiras Systems Inc, 332 Second Ave, Waltham, MA 02154 / pb-h: IEEE, Committee on Numerical Control EIA TR-31 / h: 36 Winsor Rd, Sudbury, MA 01776 ANDERSON, Walter W. / systems auditor / b: 1934 / ed: BBA North Texas State Univ / ent: 1962 / m-i: A Sy / t: electr.onic data processing analyst / org: El Paso Natural Gas Co, PO Box 1492, El Paso, TX 79999 / pb-h: CDP / h: 10256 Luella, El Paso, TX 79925 ANDERSON, William M. / systems programmer / b: 1947 / ed: - / ent: 1967 / m-i: A P Sy / t: assistant data processing supervisor / org: Midway Platt Co, 2233 University, St Paul, MN 55104 / pb-h: - / h: 441 Lynnhurst W, St Paul, MN 55104 ANDRADE, Luciano P. / programmer / b: 1918/ ed: high school / ent: 1962 / m-i: P / t: senior computer programmer / org: HUD, Washington, DC 20410 / pb-h: - / h: 6419 Maplewood Dr, Falls Church, VA 22041 ANDREE, Richard V. / professor, author, lecturer, consultant / b: 1919 / ed: BS, Univ of Chicago, PhD, Univ of Wisconsin / ent: 1948 / m-i: A Ma P Sy; writing, information science / t: professor of math, research associate in computing science / org: Univ of Oklahoma, Norman, OK 73069 / pbh: ACM, AEDS, ASL, DPMA, MAA, NCTM, SIAM lecturer, American Assn for the Advancement of Science, American Math Society, American Society for Engineering Education, Mu Alpha Theta, Pi Mu Epsilon, Sigma Xi, 3 fellowships, numerous committees, Who's Who in America, World Who's Who, editor, 12 books, 8 paperbacks, about 20 articles / h: 627 E Boyd, Norman, OK 73069 COMPUTERS and AUTOMATION for July, 1972 PEOPLE THE MOST ESSENTIAL COMPONENTS IN COMPUTERS AND DATA PROCESSING Who they are ... What they do ... Where they do it ... NOW YOU CAN STAY UP-TO-DATE ON "WHO'S WHO IN COMPUTERS AND DATA PROCESSING" ... Each computer professional has a capsule biography detailing: last name; first name and middle initial (if any); occupation; year of birth; university education and degrees; year entered the computer field; job title; organization and its address; publications, honors, and memberships; home address. See sample page opposite. Effective in April 1972, "Who's Who in Computers and Data Processing" was changed to an annual subscription basis as follows: 1. The latest Cumulative Edition (the 5th edition published 1971, containing over 15,000 capsule biographies, over 1,000 pages long, 3 volumes, hardbound) PLUS 2. At least 3 Updating Supplements per year, expected to total over 3,000 entries PLUS 3. An Inquiry Service: At your request we will obtain and report to you as a subscriber the capsule biography of any person in the computer field (if we can find his address and if he replies), to the extent of a dozen requests per year. ALL for $49.50 per year in any year when a cumulative edition is supplied ... and $22.00 per year in any year when a cumulative edition is not supplied. We are confident that you will find the subscription will repay you many times over - one day when this wealth of material gives you the inside track with someone important to you, you'll find the information PRICELESS: the most essential component in EDP is GOOD PEOPLE. RETURNABLE IN 10 DAYS FOR FULL REFUND (if not satisfactory) r- - - - - - I (may be copied on any piece of paper)- - - ---.: - - - - - - - - WHO'S WHO IN COMPUTERS AND DATA PROCESSING 815 Washington St., Newtonville, Mass. 02160 ( ) YES, please enroll me as a subscriber to WHO'S WHO IN COMPUTERS AND DATA PROCESSING at the following rate: ( ) $49.50 including the last cumulative edition OR ( ) $22.00 since I already have access to the last cumulative edition I understand that in each 12 months: (a) I shall receive at least BASED ON "Computers and Automation" 's continual data gathering from computer professionals 3 updating supplements, expected to total over 3000 entries; and (b) that I can ask for and receive a dozen capsule biographies of specified computer persons (if the address can be found and if they respond). This refe,rence will be particularly useful for: Personnel managers Libraries Conference planners Directors of computer installations Suppliers to the computer industry Executive search organizations Prospective authors Prospective speakers ... anyone who needs to keep up with the important people in the field. COMPUTERS and AUTOMATION for July, 1972 RETURNABLE IN 10 DAYS FOR FULL REFUND (if not satisfactory) Name Title Organization , Address City State & Zip Your Signature P.O. No. (if company order) 3 Vol. 21, No. 7 July, 1972 Editor Edmund C. Berkeley Assistant Editors Barbara L. Chaffee Linda Ladd Lovett Neil D. Macdonald Software Editor Stewart B. Nelson Advertising Director Edmund C. Berkeley Art Director Ray W. Hass Publisher's Assistants Paul T. Moriarty Janet M. Rysgaard Contributing Editors John Bennett Moses M. Berlin Andrew D. Booth John W. Carr III Ned Chapin Alston S. Householder Leslie Mezei Ted Schoeters Richard E. Sprague Advisory Committee James J. Cryan Alston S. Householder Bernard Quint Editorial Offices computers and automation The Computer Industry Berkeley Enterprises, Inc. 815 Washington St. Newtonville, Mass. 02160 617 -332-5453 [T A] 11 MANAGEMENT INFORMATION SYSTEMS: The Trouble With Them by Colonel T. B. Mancinelli, USA, Naval War College, Newport, R.I. Four of the most important problems with management information systems, and what might be done about them. [T A] 14 EDUCATION FOR DATA PROCESSING: Yesterday, Today, Tomorrow by Thomas R. Tirney, Asst. Prof. of Economics and Business, Univ. of Vermont, Burlington, Vt. Options, costs, and timetables for filling the demand for persons qual ified for careers in data processing. [NT A] 24 BARRIERS IN APPLYING COMPUTERS by Edmund C. Berkeley, Editor, Computers and Automation Half a dozen very solid obstacles to applying computers, and some discussion of the importance of being aware of these obstacles. 50 The Computer Directory and Buyers' Guide, 1972 - [NT R] Announcement Computers and Society [NT A] SOME COMMENTS by Joseph Weizenbaum, Professor of Computer Science, Mass. Institute of Technology, Cambridge, Mass. "ThEi' computer scientist must be aware constantly that his instruments are capable of having gigantic direct and indirect amplifying effects." 18 THE IMPACT OF THE COMPUTER ON SOCIETY Advertising Contact THE PUBLISHER Berkeley Enterprises, Inc. 815 Washington St. Newtonville, Mass. 02160 617 -332-5453 "Computers and Automation" is published monthly, -12 issues per year, at 815 Washfngton St., Newtonville, Mass. 02160, by Berkeley Enterprises, Inc. Printed in U.S.A. Second Class Postage paid at Boston, Mass., and additional mailing points. Subscription rates: United States, $9.50 for one year, $18.00 for two years. Canada: add 50 cents a year for postage; foreign, add $;3.50 a year for postage. NOTE: The above rates do not include our publication "The Computer Directory and, Buyers' Gu ide"; see "Directory Notice" on the page stated in the Table of Contents. If you elect to receive "The Computer Directory and Buyers' Guide", please add $9.00 per year to your subscription rate. Please .address all mail to: Berkeley Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160. Postmaster: Please send all forms 3579 to Berkeley Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160; @ Copyright 1972, by Berkeley Enterprises, Inc. Change of address: If your address changes, please send us both your new address and your old address (as it appears on the magazine address imprint), and allow three weeks for the change to be made. 4 Computer People, Aptitudes, and Pictorial Reasoning Tests 26 PICTORIAL REASONING TESTS - PART 6 by Neil Macdonald, Assistant Editor [NT F] [NT 27 Pictorial Reasoning Test - C&A No.7 A new style of test of recognition of "properties". F] 2, 3 "Who's Who in Computers and Data Processing" [NT G] The 5th edition, continuing supplements, and an inquiry service to obtain new capsule biographies. The Profession of Information Engineer and the Pursuit of Truth 35 Unsettling, Disturbing, Critical [NT F] Statement of policy by Computers and Automation 30 The Neglect of Significant Subjects, and the Information [NT A] Engineer by Peter J. Nyikos, Edgewood Arsenal, Md., and Edmund C. Berkeley, Editor What is the cause of the neglect of a great many significant subjects by the mass media and the public? COMPUTERS and AUTOMATION for July, 1972 The magazine of the design, applications, and implications of information processing systems - and the pursuit of truth in input, output, and processing. The Profession of Information Engineer and the Pursuit of Truth (continued) [NT A] 32 The Shooting of Presidential Candidate George C. Wallace: A Systems-Analysis Discussion by Thomas Stamm, Bronx, N.Y., and Edmund C. Berkeley, Editor An analysis of the shooting of Governor Wallace of Alabama; and a discussion of systematic methods for protecting American leaders from violent attacks. 10 The Shooting of Governor George C. Wallace, Candidate for President by Edmu nd C. Berkeley, Editor Editorial [NT E] [NT G] 37 PACIFICATION: The Story of Ba Toi by the American Friends Service Committee, Cambridge, Mass. A thumb-nail sketch of the human meaning of bringing "peace" to Indochina by heavy firepower and bombing. Front Cover Picture La Penseuse, "the th inker", is Catherine Taylor, a junior at Trenton High School; she is listening during an evening class in basic computer logic and programming given at the YMCA in Trenton. The class is intended for students interested in careers in the computer fields and is designed, organized, and taught by Chauncey Herring, an engineer at Western Electric Research Center, Princeton, N.J. See page 42. Common Sense, Wisdom, Science in General, and Computers NOTICE 6 COMMON SENSE, WISDOM, AND INFORMATION [NT A] PROCESSING: The C&A Notebook on Common Sense, Elementary and Advanced by Edmund C. Berkeley, Editor, Computers and Automation An appraisal of the first subscription year of the Notebook on Common Sense, and what has been accomplished. [NT G] 7 What May be the Most Important of All Branches of Knowledge "That which is generally true and important": what would it be? 8 Preventing Mistakes Before They Happen [NT G] 9 Questions and Answers About liThe C&A Notebook" [NT G] The Golden Trumpet 36 Computer-Field Information vs. Social Rag [NT G] by Arthur Martin, President, Computer Covenant Corp., Ridgewood, N.J., and the Editor 38 Unhappy Subscriber to Satisfied One [NT G] by John Kaler and the Editor [T C) by Neil Macdonald 26 Advanced Numbles by Neil Macdonald COMPUTERS and AUTOMATION for July, 1972 Departments 40 Across the Editor's Desk Computing and Data Processing Newsletter 50 Advertising Index 49 Calendar of Coming Events 38 Corrections 46 Monthly Computer Census 44 New Contracts 45 New Installations Key Computers, Games, and Puzzles 26 Numbles *0 ON YOUR ADDRESS IMPRINT MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTER DIRECTORY. *N MEANS THAT YOUR PRESENT SUBSCRIPTION DOES NOT INCLUDE THE COMPUTER DIRECTORY. [T C) [A] [C) [E) [F) [G) [NT] [ R] [T] Article Monthly Column Editorial Forum The Golden Trumpet Not Techn ical Reference Information Technical 5 Advertisement Common Sense, Wisdom, and InFormation Processing: The Notebook on Common Sense, Elementary and Advanced Edmund C. Berkeley Editor, Computers and Automation 1. A New and Important Subject The engineering of wisdom -The training and development of advanced common sense -The systematic elimination of mistakes -The application of advanced common sense to the computer field and many other fields -A logical development and expansion of computing and data processing A subject that is probably more important than mathematics and which has been thoroughly neglected for more than 50 years -A new and "glamorous" field with the opportunity to "get in on the ground floor" -These are some of the properties of the subject which, starting a year ago, "Computers and Automation" began to report on in a new publication, "The C&A Notebook on Common Sense, Elementary and Advanced". We promised at least 24 issues, newsletter style, for the first annual subscription. We have delivered 36 for good measure. For the ti tIes. see Table 1 below. 2. Successful Project Now a year later, we know that this project is a success. The Notebook has won -- and continues to win -- many enthusiastic subscribers. Here are a few of their comments: Harold J. Coate, EDP Manager, St. Joseph, Mo.: I believe these to be the best, if not the most important, reading that I have had this year. William Taylor, Vice President, Calgary, Alberta: Very good articles; something all "managers should read. Edward K. Nellis, Director of Systems Development, Pittsford, N.Y.: As I am involved with systems work, I can always use one of the issues to prove a point or teach a lesson. David Lichard, Data Processing Manager, Chicago: Thoroughly enjoy each issue. Richard Marsh, Washington, D.C.: Keep it up. All are good and thought-provoking which in itself is worthwhile. Ralph C. Taylor, Manager of Research and Development, West Chester, Ohio: Especially liked "Right Answers". 6 Jeffrey L. Rosen, Programmer, Toronto, Canada: Your tendency to deal with practical applications is very rewarding. The project began with an announcement in the April 1971 issue in the form of an editorial "The Most Important of All Branches of Knowledge". That edi torial (updated) appears on the next page in case some readers have not previously read it. 3. Operational Definitions One of the results of the investigation stimulated by producing the Notebook has been the proposing of an operational definition of common sense and wisdom (See Notebook Issue No. 24, "What is Common Sense? An Operational Definition", and No. 36, "Wisdom -- An Operational Definition"). An operational definition is one in which operations that can be performed (tests that can be made) are used in order to define a term. This kind of defini tion avoids the fallacy shown in "food is grub", "grub is chow", "chow is food". The fa llacy of ci rcular definition using synonyms is a common (and almost unavoidable) fault in most dictionaries. 4. An Operati.onal Definition of Common Sense Common sense behavior by an organism in regard to a problem implies that the organism: is observant and perceptive; shows initiative; demonstrates ordinary or common knowledge; displays intelligent behavior; modifies its behavior so as to adjust suitably to new factors; and effectively solves a large proportion of that kind of problem. The behavior of a squirrel in regard to marauding a bird feeder often shows common sense -- though his behavior in regard to finding buried nuts often shows a poor memory. 5. Future Issues Among the next dozen issues are: The Concept of Feedback and Feedback Control Sixty Excuses for a Closed Mind Benjamin Franklin, Scientist of Common Sense Key Unlocking Information The Evening Star and the Princess Preventing Mistakes from Unforeseen Hazards And we have a list of over 100 topics, that seem to us very significant, for covering in future issues. We invite every reader of this brief report to try the Notebook. See the guaranteed "no-like-no-cost" offer on pages 8 and 9. We hope you will take advantage of the present offer. We expect that subscription rates may have to be increased. COMPUTERS AND AUTOMATION for July, 1972 The Most Important of All Branches of Knowledge (Based on an editorial in Computers and Automation published by Berkeley Enterprises Inc., 815 Washington St., Newtonville, Mass. 02160) It may be that there is a branch of knowledge which is the most important of all. If so, we would maintain that it is a subject which used to have the name "wisdom" but nowadays does not have a recognized scientific name, or in any college a recognized department or faculty to teach it. This subject currently is a compound of common sense, wisdom, good judgment, maturity, the scientific method, the trained capacity to solve problems, systems analysis, operations research, and some more besides. Its earmark is that it is a general subject, not a special one like chemistry or psychology or astronautics. Useful names for this subject at this time are "generalogy" or "science in general" or "common sense, elementary and advanced" or perhaps "wisdom". Many editorials published in "Computers and Automation" have in one way or another discussed or alluded to this su bj ect : Examples, Understanding, and Computers / December 1964 The Barrels and the Elephant: Crackpot vs. Pioneer / May 1965 Some Questions of Semantics / August 1965 Perspective / April 1966 Computers and Scientific Models / May 1967 New Ideas that Organize Information / December 1967 How to Spoil One's Mind - As Well as One's Computer / August 1968 The Catching of Errors by Inspection / September 1968 Tunnel Vision / January 1969 The Cult of the Expert / May 1969 Computers, Language, and Reality / March 1970 Computers and Truth / August 1970 The Number of Answers to a Question / March 1971 In the editorial "The Cult of the Expert" we offered a leaflet that belongs in this subject, "Right Answers - A Short Guide for Obtaining Them". More than 600 readers asked for a C9PY; so clearly this subject is interesting. This subject is related to computers and the computer field in at least two ways: First, many of the general principles which this subject contains can be investigated in experimental or real situations by means of a computer. In fact, far more can be investigated by computer than can possibly be investigated by ordinary analytical mathematics. Second, since computer professionals are in charge of computing machines, many people consider these professionals responsible for the worthwhileness of the results of computers. Because of "garbage in, garbage out", computer professionals-have a responsibility to apply common sense and wisdom in at least three ways: COMPUTERS and AUTOMATION for July, 1972 Input - in the selection and acceptance of the data with which they begin; Processing - in the processing through a system; Output - in the interpretation and use of the answers. Then the computerized systems will produce strong structures that human beings can use and rely on, and not weak structures which will crash with false information or ridiculous results. "Computers and Automation" has published two articles "Common Sense, Wisdom,General Science, and ComputersH, which deal with this subject. For more than a dozen years, we have been studying this subject - ever since we searched in a very large and good public library for a textbook on common sense or wisdom and found none at all. There is, however, a great deal of information to be gathered on this subject because a large number of great men and great scientists, ancient, medieval, and modern, have made remarks and comments (usually while talking or writing about something else) that belong in this subject. The subject of wisdom is particularly important in these modern days. The subject has been neglected, while special sciences have been cultivated. Investigators have pursued the special sciences with the enthusiasm of a child with a new toy. Specialized science and specialized technology have rendered our earthly world almost unrecognizable: All major cities on the planet are only a few hours apart by jet plane; Millions upon millions of people who otherwise would be dead are alive because of modern public health practices - thus creating a population explosion; Nuclear weapons if used can destroy mankind and civilization in a few hours; etc. To deal with so many diverse, vast problems we need wisdom. To use wisdom we should study it. We have decided that it is desirable to make the drawers full of information we have been collecting on this subject more accessible and more widely distributed. We have decided to publish a series of notes in newsletter style called "The C&A Notebook on Common Sense, Elementary and Advanced" . We invite you, our readers, to join us in the pursuit of this subject, as readers of the Notebook, and as participators with us in the research and study. Wisdom is a joint enterprise - and truth is not shaped so that it can fit into the palm of anyone person's hand. ~~C.~ Edmund C. Berkeley Editor 7 DO YOU WANT TO PREVENT MISTAKES BEFORE THEY HAPPEN? - see new solutions to old problems? - distinguish between sense and nonsense? - increase your accomplishments? - improve your capacities? - avoid pitfalls? - find new paths around old obstacles? - apply in practical situations the observations and wisdom of great scientists and wise men? - stimulate your resourcefulness? IF SO, TRY- The C&A Notebook on COMMON SENSE. ELEMENTARY AND ADVANCED devoted to research, development, exposition, and illustration of one of the most important of all branches of knowledge, i.e. the su bject of WHAT IS GENERALLY TRUE AND IMPORTANT = + + + + + + + + Editor: Edmund C. Berkeley, author, businessman, actuary, scientist, computer professional, first secretary of the Association for Computing Machinery 1947-53, editor of Computers and Automation. + RETURNABLE IN 7 DAYS FOR FULL REFUND, IF NOT SATISFACTORYWHY NOT TAKE A LOOK? ..... HOW CAN YOU LOSE? _______ .- ___________ - - _ - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - - COMPUTERS AND AUTOMATION 815 Washington St. , R 7, Newtonville, Mass. 02160 YES, please enter my subscription to the C&A Notebook on Common Sense at $12 a year, 24 issues (newsletter style), and extras. Please send me (as FREE premiums for subscribing) the first six issues: 1. Right Answers - A Short Guide to Obtaining Them 4. Strategy in Chess 2. The Empty Column 5. The Barrels and the Elephant 3. The Golden Trumpets of Yap Yap 6, The Argument of the Beard I enclose $ ( ) Please bill me ) Please bill my organization Name ____________________________________ Title___________________ To: Organization ________________________________________________________ Address ____________________________________________________________ Signature_________________________________ Purchase Order No. _ _ _ _ _ _ _ _ _ __ 8 COMPUTERS and AUTOMATION for July, 1972 QUESTIONS AND ANSWERS about "The C&A Notebook on COMMON SENSE, ELEMENTARY AND ADVANCED" INTERESTING: : Q: Is the Notebook interesti ng? A: We think so -- but you can judge for yourself. You can see the issues, and if not satisfactory, tell us to discontinue your subscription. Q: Is the Notebook exciting? EXCITING: A: Some of the issues, like "Falling 1800 Feet Down a Mountain" and "Doomsday in St. Pierre, Martinique", are among the most exciting true stories we know. USEFUL: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Q: Is the Notebook useful? A: It ought to be useful to anybody -- as useful as common sense. There exists no textbook on common sense; the Notebook tries to be a good beginning to common sense, science, and wisdom. UNDERSTANDABLE: 13. 14. 15. 16. Q: Can I understand the Notebook? A: Yes. It is nontechnical -- written in everyday language and using vivid examples. Q: Do you cover in the Notebook all parts of common sense, wisdom, and science in general? COVERAGE: A: Yes, we plan to. The main subjects so far are: systematic prevention of mistakes; avoiding certain fallacies; important principles; important concepts; illustrative anecdotes, etc. Q: Wi 11 the Notebook save me from making important mistakes? MISTAKES: A: It ought to. One of the main purposes of the Notebook is preventing mistakes. COST: TITLES - Q: Wi 11 the Notebook be worth the cost to me? A: At about 40 cents per issue (30 issues for $12), it is hard for you to lose out. EVEN ONE important mistake prevented, may save you much time, much trouble, and much money. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. NUMBER OF ISSUES PER YEAR: Q: How many issues a year do you put out? A: We promise 24 (newsletter style); we anticipate putting out at least 30 in each year. PAST ISSUES: Q: I do not want to miss past issues. How do I get them? A: Every subscriber's subscription starts at Vol. 1, no. 1. Every subscriber eventually receives all issues. Here is how it works. The past issues are sent him four at a time, every week or two, until he has caught up -and thus he does not miss important and interesting issues that never go out of date. Q: If I do not like the Notebook, can I cancel at any time? GUARANTEE: A: Yes. (1) You may return the first batch of issues we send you, for FULL REFUND, if not sati sfactory. (2) Thereafter, you may cancel at any time, and you will receive a refund for the unmailed portion of your subscription. -- We want only happy and satisfied subscribers. TITLES: Q: What are the titles of the issues in the first annual subscription? A: See the list in the next column. COMPUTERS AND AUTOMATION for July, 1972 32. 33. 34. 35. 36. FIRST YEAR SUBSCRIPTION Right Answers -- A Short Guide to Obtaining Them The Empty Column The Golden Trumpets of Yap Yap Strategy in Chess The Barrels and the Elephant The Argument of the Beard The Elephant and the Grassy Hillside Ground Rules for Arguments False Premises, Valid Reasoning, and True Conclusions The Investigation of Common Sense, Elementary and Advanced Principles of General Science, and Proverbs Common Sense -- Questions for Consideration Falling 1800 Feet Down a Mountain The Cult of the Expert Preventing Mistakes from Failure to Understand The Stage of Maturity and Judgment in any Field of Knowledge and Experience Doomsday in St. Pierre, Martinique -- Common Sense vs. Catastrophe The History of the Doasyoulikes Individuality in Human Beings How to be Silly The Three Earthworms The Cochrans vs. Catastrophe Preventing Mistakes from Forgetting What is Common Sense? -An Operational Definition The Subject of "What is Generally True and Important": Common Sense Elementary and Advanced Natural History, Patterns, and Common Sense Rationalizing and Common Sense Opposition to New Ideas A Classification and Review of the Issues of Volume 1 Index to Volume 1 (first 30 issues) Adding Years to Your Life Through Common Sense The Number of Answers to a Problem "Stupidity has a Knack of Getting Its Way" Time, Sense, and Wisdom Some Notes Time, Sense, and Wisdom Some Proverbs and Maxims Wisdom -- An Operational Definition r - - -(may be copied on any piece of paper)- - TO: Computers and Automation 815 Washington St., Newtonville, MA 02160 YES, please enter my subscription to the Notebook, at $12 a year, 24 issues, newsletter style, and extras. Please send me issues 1 to 6 as FREE PREMIUMS for subscribing. I enclose ) Please bill me. ( ) Please bill my organization. Name ______________________Title_____________ Organization________________________________ Address ____________________________________ Signature __________________Order No. _______ 9 EDITORIAL The Shooting of Governor George C. Wallace, Candidate for President On May 15, about 4:00 p.m., in Laurel, Md., Governor George C. Wallace of Alabama was shot. He was shot outdoors in a suburban shopping center, between a drive-in bank and a variety store, on his way to his car. At the time, he was escorted by a group of guards, and was shaking hands with persons greeting him in a crowd. He had just finished a campaign talk to about 1000 persons, where he had talked from a podium behind a transparent bullet-proof shield. These questions are discussed at length in an article by Thomas Stamm and the Editor, in this issue, en titled "The Shooting of Presidential Candidate George C. Wallace: A Systems-Analysis Discussion" and including sections entitled: - Questions - The Number of Bullets, Guns, and Wounds Most fortunately Governor Wallace, although shot many times, is at present writing recovering, except for the effect of a bullet lodged in or near his spine which so far is paralyzing his legs. So this event must be classified as an attempted assassination rather than a fulfilled one. - The Expenses of the Suspect One suspect was immediately seized by bystanders and guards, and arrested by the police of Prince George's County, Maryland. His name is Arthur Herman Bremer; his last address was 2433 Michigan Ave., Milwaukee, Wisconsin; he is 21 years old. From February 15 to date he was unemployed. - Systems Analysis Applied to the Protection of a Presidential Candidate A long summarizing article about him, written by Douglas E. Kneeland, and based on reporting by him and four more reporters, was printed in the New York Times of May 22; it contains much important information. Bremer was indicted on May 23 by Federal and county grand juries on 28 charges. No other person has yet been indicted. - Cui Bono? (Who Profits?) - Gun Control We hope that these and related questions will interest our readers. We invite additional data, discussion, and comment. The United States must become a country where presidential candidates can live through their campaigning and live through their presidency without successful violent attacks upon them. . Two crucial questions of course are: - How should this event be classified - as the effort of a psychopathic criminal operating alone? or as the result of a conspiracy? - How can assassination attempts and violent attacks on presidential candidates be prevented? 10 Edmund C. Berkeley Editor COMPUTERS and AUTOMATION for July, 1972 MANAGEMENT INFORMATION SYSTEMS: The Trouble With Them Colonel T. B. Mancinelli u.s. Army College of Naval Warfare Naval War College Newport, R.I. 02840 "Often the problems incident to the manual part and the automated part of a management information system are not even recognized, so that both parts go on their merry way uncoordinated." During the past decade, in the business management arena, the popular phrase, "management information system(s) (MIS)", has become as common as mom's apple pie. For management writers it has become the sexy front cover often found on paperback fiction. If one wants to attract the notice of serious business readers, then including in the title some mention of ma~gement information systems, is a sure attention getter. A Management Information System Jungle Certainly there is no lack of scholarly writing on man~gement information systems. Harold Koontz wrote of the "Management Theory Jungle" 1, and few would disagree that a "management information system theory jungle" has engulfed the business community. A visit to any well-stocked library and perusal through the card catalog will reveal hundreds of books and articles that deluge management with this fascinating and seemingly new topic. Most of these works are aimed at defining a MIS, telling how to design, to control, redesign, use, and misuse one. Also, there are some writings that adopt a negative approach, and, claiming that MIS do not exist, cannot be developed, are a utopia, and so on. Why More on Management Information Systems? If what has just been outlined is true, and few will disagree, then why this article on Management Information Systems? During the past several years the author has, in two different positions, worked with a management information system in the U.S. Army. Few others can match this MIS in size and complexity. Actually, the Army doesn't call it an MIS, but by generally accepted definition, it is that. In Army terminology, it is called the Personnel Information System. Its purpose is to support, through the use of computers and automatic data processing, the management of Army personnel: their-procure-ment; their individual training; their assignments; their use; and their eventual separation. Since the Army's mu~ter totals around a million personnel scattered to the four corners of the earth, COMPUTERS AND AUTOMATION for July, 1972 the magnitude of the task is obvious. Add the fact that tens of thousands of personnel enter and leave the service each month, and tens of thousands of others are continually moving from one place to another, the magnitude and the complexity of the Army's Personnel Information System becomes staggering. Based on some scholarly effort, considerable practical experience, and untold 'frustration, I have developed rather strong views and opinions concerning management information systems. Some of those views are set forth in this paper. They may be of some small value, I hope, to others grappling with the real-life problems of developing an effective MIS. The views set down here have been considerably influenced by actual experience in the Army's Personnel Information System. Nevertheless, it seems that some of these experiences reported and lessons learned are applicable to any management information system. In sum, these views are the practitioners' view rather than the conceptual or academic views so often found in today's literature. What is a Management Information System? Thus far the term "management information system" has been used at least a half dozen times and remains undefined. Taking the words literally, the definition of a MIS would be something like this: Management: Getting things done through other people. Information: That part ·of data of most value to the user. System: A group of inter-related parts making an irreducible whole. Putting these ideas together with connectors, the definition of an MIS comes out like this: Gettipg things done through other people using that part of data of most value to the user so as to operate a group of inter-related parts making an irreducible whole. 11 Such a defini tion seems logical i f not entirely clear. A better definition might be: A system that collects, processes, and provides management personnel with needed information for decision making that will result in the successful accomplishment of the organization's mission. This latter definition is the one used in this article. Even Moses Had One Although the term, management information system, is somewhat new, in fact, management information systems have existed since the beginning of time. The Bible tells of the problems that Moses encountered in developing a MIS. Every organization in the past has had a MIS. All organizations in being today have one -- and some have two or more. Although MIS are not new nor are their uses, yet there are some distinct differences between those of the present century and those of prior years. Four characteristics distinguish today's management information systems. Enter the Computer First and foremost, is the use of the computer and automatic data processing. Today, most large organizations have computers or some form of ADP. Increasingly, this is also true for smaller organizations. These so-called space-age marvels have been introduced into management information systems as a n~w tool -- a new aid for helping management get their JQb done. It has always been necessary to collect and use data to operate organizations. Up until the Qomputer age this was all done manually. Now management has a very efficient machine to help do this job. One might argue that the age-old definition of management now needs recasting to: "Getting things done through other people and machines". Organizations Have Multiple MIS Second, organizations that have introduced the oompu.ter have in reali ty at least two management information systems. There is the one that existed before the computer arrived -- the manual MIS. Although it is probably true that the original MIS has been in part automated, yet some parts of the noncompu.ter MIS still exist. Besides, there is the newly developed automated MIS, which has some parts of the Qld MIS and some new parts. No organization has yet developed a totally automated MIS, and in this century, there is little likelihood that any will. John Dearden of the Harvard Business School wrote ot' the "Myth of Real Time Management Information,,2, and it is a myth that any organization has a single integrated MIS. Large organizations may have a half dozen MIS, each with an automated and manual portion. Some of the problems inherent in this multiplicity of MIS are discussed below. More and More Data Requirements Third, organizations that have introduced the computer have developed an insatiable lust for more data. Invariably, the arrival of the computer in an organization triggers a new craze for more and more data. And all of this new data is needed in a more timely, accurate, and complete fashion. Functions and missions may not change but the claimed need for more data grows on and on. Functional managers insist that they must have more data and the data processors love this, for that enlarges the scope of their operations. 12 If one looks at the data available in an organization several years after the introduction of the computer, and compares it to what was available in the pre-computer days, the difference is almost always staggering. One wonders how the organization ever existed in the good old manual days. Centralization is "In" Fourth, and finally, present day MIS are characterized by increased decision-making at the top level. Decisions that were left to middle management and lower management in the pre-computer days are being moved to the "front office". Creeping centralization of the decision-making process is found in every large organization. It is found in the White House, in all governmental agencies, in the miiitary, and in the business community. Likewise, the process of centralization is found more and more in our modern society in general. We are living in an age of centralization, like it or not. Centralization is" in" and decentralization is "out". Organizations appear to have no more chance of returning to the goop old days of decentralization than there is a likelihood of returning to the horse and buggy. What impact and what problems evolve from the aforementioned characteristics of present day management information systems? There are many. Here, only four of the more consequential will be touched on. Incompatibility of Manual VS. Automated MIS First, there is the problem of integration pf the manual and automated elements of a MIS. ~erhaps it is the lack of integration that is the perplexing problem. The larger and the more diversified the organization, the more difficult the issue becomes. A MIS as a system has four inter-related parts: Input, Processing, Output, and Storage. When the computer is introduced into an organization, the parts of the MIS do not change, but their arrangement does. The parts in a manual MIS are arranged from Input, to Processing, to Use or Output, and finally to Storage. Not so for the automated part of the MIS. The arrangement is from Input to Storage to Processing and then to Ouput or Use. This change in the arrangement of the elements of the MIS happens because when the computer is used, traditional methods for data processing are changed. Input is still collected as the first step, but then it is put into storage -- into data banks, and then processed -- by machine ,and then finally used. This incompatibility in the arrangement of the parts of the automated versus the manual elements of the MIS creates a number of organizational problems. The automated element, with few exceptions, is run by computer people -- technicians, while the manual side is always in the hands of functional managers. What occurs is: duplicate and redundant data collection and processing; use of different criteria; lack of adequate communication; lack of coordination between the two parts, etc. And this mentions but a few of Frequently, there are disputes lity of information, with each the more accurate and complete the consequences. concerning credibiside claiming to have data. COMPUTERS AND AUTOMATION for July, 1972 Timely, Accurate and Complete Data: The Biggest Problem The number one problem in tOday's computer supported MIS is the lack of timeliness, accuracy, and completeness of data. Some may disagree with this assertion. However, based on painful experience, no other factor can have a more serious impact on achieving an effective MIS than an inability to obtain needed data that is sufficiently accurate, complete, and available in a timely way. C.C. Weinmeister recently defined a successful MIS as "a system designed to provide operational management with accurate information upon which to make sound decisions that will result in the success of the endeavor".3 The trouble with this defini tion is that it seeks to design a system tha t wi 11 provide accurate information. A computer system can be designed that will process accurate information, but it cannot be designed to provide only accurate information. True, there are numerous computer techniques for editing, checking, comparing, and testing for the validity of data. but as yet no one has designed the failsafe computer system that furnishes only accurate information on a timely basis. Data processors can design a highly efficient computer system that wi 11, regrettably. a Iso process inaccurate data just as efficiently as it processes accurate q'ata. To make the situation even worse, several factors work against data accuracy. Functional managers -the users -- expect to be furnished the data they need in a timely and accurate fashion. They feel that the question of data accuracy, completeness, and timeliness is a technical problem to be solved by the data processors. On the other hand, the data processors see their job as computer systems designers and operators. Data accuracy is a management responsibility, say the data processors. With management personnel demanding more and more data, this conflict is escalated, and in large organizations, it can lead to a continuing unmanageable crisis. The original claims for obtaining a computer were based on "how good things will be when the new system is operational". Thus, nowhere in the organization is the critical "data management" responsibility clearly assigned. Nor are the people available needed to do the job. Just as man cannot live by bread alone, computer systems cannot provide accurate information by machines alone. Changing Role of Middle Management The third problem results from the creeping centralization found in present day management information systems. As an organization moves more of the decisions to the apex, the front office, the former middle management decision makers lose both authority and responsibility. No matter how much better the decisions may be, lower-level management personnel are anti-computer and anti-centralization. This is understandable for they are being stripped, slowly 'but inexorably, of their authori ty, responsibi Ii ty, and'former decision-making powers. What are they being given in return to compensate for their loss? Mainly, more requirements to collect and submit data to the new decision makersl Is it any wonder that middle and lower level management personnel show little enthusiasm for data accuracy, completeness, and timeliness? Especially in large organizations, middle and lower level management are being required, COMPUTERS AND AUTOMATION for July, 1972 more and more, to operate strictly wi thin the" syste~'. There is little room left for individual initiative and the important role at this level is becoming more input oriented. This represents a most serious human problem to be overcome in highly centralized automated management information systems, and thus far no one has come up wi th many good answers. Need for I nformation Managers The fourth problem concerning present day automated management information systems is the lack of qualified "Information Managers". Some years ago one wri ter said, "Today (1958) an abi li ty to make correct decisions most of the time on the basis of inadequate information is the mark of a good manager, even on the middle management level. In the future, the good middle management executive will be distinguished by his ability to utilize all of the data before making a decision, and then to make a decision in accordance with the dictates of the data.,,4 The future is now -- but who is training the manager to work under these new conditions? Unfortunately, too little training of real value in this area is available. Instead, everywhere there are executive training courses in computers and MIS that pay scant attention to the question of information management. Generally, these charm courses get all involved in technical hardware, software, and programming areas. Rather than telling executives how to manage a MIS. these courses teach him binary coded decimal notation, Boolean algebra, and FORTRAN. Often they send home executives enthusiastic for a "Real Time Management Information System". From the content of some of these courses, one can draw the conclusion that the computer people are trying to buffalo management into believing that computer technology is so complex that management had better let the data processors worry about a computer supported MIS. No Easy Solutions As is the case in many situations, it is much easier to define the problems than it is to offer concrete solutions. The answers to the problems cited in this article are not easy and not readymade. Nonetheless, any executives that have an automated MIS must at least remove their heads from the sand and recognize these problems as a starting point. Often, the problems incident to the manual part and the automated part of a MIS are not even recognized, so that the both parts go on their merry way uncoordinated. Data accuracy is often treated as a minor and insignificant matter while the organization rushes to design and implement more complex computer systems -- all using the same poor data. Many organizations are now going through the craze for sophisticated mathematical models, often overlooking the fact that the baseline data for such models is the same inaccurate data used in less sophisticated systems. Too little attention has been given to the issue of how middle and lower level management personnel can be motivated to provide timely, accurate, and complete data in the new era of centralization. Uppermost, there is the critical need for a new type of training in the science of information management. This needs to be training of management by management, training management by data processing personnel. Available computer hardware and software has far outdistanced man's progress in the human aspects of developing effective management information systems. What is needed now is not fourth and fifth generation computers, but rather a new emphasis on the people part of MIS -- a new emphasis on the second generation of management information systems. [] 13 EDUCATION FOR DATA PROCESSING: Yesterday I Today I Tomorrow Thomas R. Tirney Asst. Prof. of Economics and Business University of Vermont Burlington, Vt. 05401 "The colleges and the universities are in the best position of all formal education institutions to provide for the need of the community and the organization in this area. " Demand The demand for qualified operators, programmers, systems analysts, and project leaders continues to be strong in a slow economy. Even though the number of advertised positions for these occupations decreased over the past year, the field of data processing still constitutes the highest percentage of jobs available - for confirmation, look in any large metropolitan newspaper. The future for careers in this area seems brighter than ever before. It is my conclusion that qualified individuals now in the field and individuals qualifying themselves for careers in data processing will have unlim~ted opportunities. This conclusion is based upon the following reasons: 1. Increased dependence on the EDP system to reduce inefficiencies within the organization 2. Development of new uses for the EDP system in order to increase productivity within the organization 3. Need for faster data communication in providing information for decision-making for top 14 management down level to the lowest management 4. Acceptance of the computer by the computeroriented manager in using the computer system as a tool in accomplishing his objectives 5. Rapid growth in the next few years in the number of organizations that will be computeroriented and the number of computers in operation 6. Rapid growth of foreign nations in developing their inventory of computer installations and their sophistication in use of their computer system, coupled with the trend of many United States corporations to become multi-national in nature The latter two trends, chiefly, will create a most impressive growth of opportunites in the field of data processing. Number of Computers and Installations One recent survey (';'1) of general purpose computers estimated that there are 48,152 installations in the United States and 32,211 installations in foreign countries. In addition there are 13,879 COMPUTERS AND AUTOMATION for July, 1972 unfilled orders. Thus a total of 80,363 installations in operation as of April 1, 1971, with a potential of 93,879 within 18 months (by the end of 1972). This assumes that, when the computers on order are delivered, these new systems will not release "used" computers to the secondary computer market. If this assumption is not valid (and there is no reason to expect it to be completely valid), then it is quite possible that by the end of 1972 there could be close to or over 100,000 general purpose computers in operation. This is in contrast to a projection made in 1966 (*2) that by 1975, 85,000 computers, both domestic and non-domestic, would be in operation. It seems that this forecast was met in early 1972. The number of variables that are involved in forecasting is vast, but if the trend continues, it is not inconceivable to have between 125,000 to 135,000 general purpose computers in operation by about 1975 to 1978. This growth, plus the drive for more effective and efficient use of the compu ter system, will create a heavy demand for qualified individuals in the field of data processing. The demand is foreseeable, but the supply of qualified individuals is not. What will be done by the manufacturers, the educational institutions, and the users of the computers to try to meet the forecast needs? Before seeking to answer this question, it will be useful to put this question in perspective, as to what has been done and what is now being done. A Dozen Years Ago By 1959-60 the EDP Industry had grown to 6000+ computers in operation. This was in relation to 10 to 15 computer installations in 1949-50. The second generation computers were on line. The third generation computer was a blueprint on drawing boards. The career opportunities were unlimited. It was not uncommon that a "good" man could increase his annual salary $4,000 to $6,000 by job hopping. The job hop reminded many of the game of "musical chairs". In a survey conducted in 1959~*3) in which 4,647 individuals working in systems responded, 47% of them changed jobs one or more times. The demand for operators, programmers, and systems analysts was far greater than the supply. The basic premise that a programmer would be a coding clerk for the systems analyst was lost in the need to fill positions and to keep up with the work load. The programmer became an apprentice systems analyst. The programmers were in on the problem from the begin~ing: working with the "client", laying out the problem, designing input and output, constructing the flow-chart, coding the program, testing and debugging the program, and then finally creating the documentation for the operation of the program. Thus the programmer was a person who performed all the functions on a given program while the systems analyst was responsible for all the programs in a given system, while working on one of the programs himself. In practice it was hard to tell the difference between the two positions. Even in some companies the terms were interchangeable. oneself when the wherewithal to do so was not available. At this time very few courses in data processing were being taught at the college level. And where courses were offered there was little or no opportunity to interact with the machine. If you were lucky and happened to hit on a "programming" course with computer time available, it was usually a first-generation computer. The lack of courses at formal education insti tutions was easily explained. If you were good enough to teach, then you were able to command a high salary for your talents in the work-a-day world. Thus how was one to "break" into the field of data processing? The career path to a systems analyst was fairly simple. First, graduate from college with a degree in Accounting, Business Administration, or Mathematics. Then take a "programming aptitude test." If you passed that, you were on your way. After a few weeks of orientation and on-the-job training it was off to school again -- but this time it was for only two, three, or four weeks the computer manufacturer's type of school. Instructors The "instructors" for these courses were selected from the ranks of the manufacturer's personnel who had had experience in using that particular language. They were not educators, only experienced program-~ mers. Thus in many, many cases they were unable to communicate to the students the fundamentals and complexities of the language. As these instructors acquired the experience in the "teaching role," they were usually transferred to another position in the company or they left for a better position. In addition, it was not uncommon to have two or three or more "instructors" during a two- or three-week course. Since the instructors were "technical experts" in a particular language and/or system, they were called into the field whenever a problem arose in their area of expertise. These courses in programming language usually did not provide any machine time in which the student could "test" his new knowledge. Tests were administered, but in most cases these tests required retention and memorization rather than understanding. These students were "graduated" back to their organization as programmers. It was fortunate that the qualifications of the future programmer were high. It was for this reason that most of the "graduates" from manufacturer's schools learned almost in spite of the course. But hold on, these courses were free. What did you expect for nothing? Yes, the courses were free, but the users of the computer paid the price for educating their programmers. The price was paid in wasted computer time, wasted production time, and inefficient programs. Many recognized these problems, but I am sure their reply to the state of the education in the EDP field at this time would have been: "The industry is young. We are still learning. The educational process of the future will be better." Pay and Qualifications In 1969 The average individual involved in systems work in this period was well paid ($12,000 median salary) (*3), h~ghlyeducated (68% had at least an undergraduate degree)' (':'3), experienced (82% had four or more years of systems experience) (':'3), and in the prime of his life (54% were under 40 years of age). The normal advice to college students was to pursue the career path 'that would lead to the EDP field. It was good advice, but the problem was how to prepare COMPUTERS AND AUTOMATION for July, 1972 By 1969 it seemed like the prophesy was coming true. A great many universities were now committed to provide education for students wishing to pursue careers in data processing. All across the nation computer schools had sprung up to provide instruction for future programmers. The manufacturers seemed to be setting up separate divisions for the EDP education process. 15 The opportunities were still available for individuals. The number of computers now in operation exceeded 40,000. Many third generation computers were on line with hundreds on order. The demand for EDP personnel far outnumbered the available supply. Job hopping was still a way of moving up the organization structure quicker but to a lesser degree than in 1959. Although the educational requirements were somewhat relaxed for entry into the EDP field (high school graduates passing the aptitude test), the median salary had increased to $16,000. There were also more younger (58% under 40 years of age) individuals working in this field. Thus the advice of pursuing a career in data processing still seemed valid. There were 251 institutions of higher education offering majors in Data Processing and Computers, or Information Science *3). In addition there were many other universities planning or ready to implement a major degree in this field. The basic problem that all of these institutions faced was acquiring the qualified personnel to staff these programs. This need placed an additional burden on a market already short on qualified individuals. The graduates of four-year programs might provide some relief to the high manpower demand -- but this relief will not materialize for another two to five years and will be directed at posi tions above the programming level. The reasons are: 1. The demand for teachers at the university and college level is still high. The "cream of the graduating" classes will be influenced to pursue a graduate degree (MBA or Ph.D.) while teaching at the university level. 2. The graduates with majors in data processing will not accept jobs as programmers because in most cases they will have knowledge and experience far superior to individuals at this level. The positions which they would seck and expect would be at a higher level. Commercial. Computer Schools Outside of the delay, the college programs seem to fit well with the dev~loping education system, since computer schools supposedly would provide the programmers and operators that would be needed. But an article in the Wall Street Journal by Dan Rottenberg entitled, "Many Computer Schools Charged Wi th Offering A Useless Education" (';'4), quickly deflated the value of computer schools for supplying manpower for these positions. Mr. Rottenberg points out cases of misrepresentation of the school's facilities to the student, the example of the unflunkable aptitude tests, the outright fraud by some schools, the financial failure of schools with the students left holding the bag, the poor facilities of sachools (many do not own a computer nor do they rent computer time for the students), and the poor qualifications of the instructors. Mr. Epstein, of the Massachusetts Attorney General's office, stated that "Computer schools have become the latest version of the old shell game." "About 75% of [these] schools should. be closed. The training they provide simply does not prepare their s tuden ts for the kind of jobs that are available." commented Anton Myse, the coordinator of data processing for the U.S. General Services Administration in six midwestern states. As the final blow to the credibility of these schools, most firms will not give preference to computer school graduates even 16 when it comes to filling the lowest level of computer operator aides. Manufacturers Schools This left the responsibility of providing manpower needs to the schools sponsored by the manufacturers of the computers. At this same time the manufacturers announced that these educational services were no longer free. Even though many users were upset over the additional cost, they envisioned a better educational effort by the manufacturers, thus providing better qualified "graduates." The expectation of the users did not materialize. The manufacturers changed little if anything in providing education to users personnel, except in charging a fee. The quality of the "graduated" programmer did not get betteri it got worse. No longer could the "students" learn in spite of the material because the educational background of the class was heterogenous. Many companies were hiring high school graduates for program trainee positions. In a survey conduc~ ted in 1970 (*5) 62.5% of the responding companies indicated that their educational requirement for a program trainer was a high school degree. These courses thus became a two-way exchange between the instructor and a dominant sub-group and, in most cases, this sUb-group was the college graduates. The resul t was that most of the students (the high school students) learned little. " The results were: a small number of college graduates majoring in data processing available for employmenti almost unemployable graduates of the computer schools, and. the deterioration of the education received in the manufacturer's school. So it seems that the educational aspects of the EDP profession have reached an all time low. Now the retort from the majority of users had changed from "will be better" to "must be better." Organization Within-House Instruction The failure of external sources has required more and more companies to look within the organization for the resources to meet their educational needs in data processing. The 1970 survey (5) revealed that 33.8% of the organizations indicated that they had created in-house educational programs for data processing personnel. Of the 61.5% who are continuing to use outside sources, approximately half (30.1%) stated that this reliance would be temporary until they too were able to perform this function themselves. The remainder would use external resources as their primary source of education with on-the-job training as a supplement, because of the financial expenses incurred for an in-house training program. Learner-Controlled Instruction As the years roll by, the in-house training centers will evolve into the type of educational environment envisioned by Simon Ramo (6) in 1957: ... this [enVironment] has some special equipment. Each chair includes a speCial set of push buttons .... A motion picture wi 11 provide the material for the student. He is asked questions about the material just presented, usually in the form of alternatives. Sometimes he is told that the concept will be repeated and the questions reasked .•.. lie may even be asked whether, in his opinion, he understood what was being presented. COMPUTERS AND AUTOMATION for July, 1972 This environment requires little human guidance or need for full-time instructors. The student will be able to progress at his own speed and to fit his education into his schedule at his discretion. The "expert" would be called upon only to clarify or to answer questions that develop from the presentation. The student will be able to review any or all sections of a course. The interaction between student and machine provides immediate feedback during the presentation of the material. The available film library will include courses for the operators, programmers, systems analysts, and other personnel in the organization. The approach can be used by a large group or a single individual. Joint Training Centers , Some companies will combine their resources to provide for joint training centers. This center, in ad,dition to providing for their nee~, would offer education to small organizations not in a financial position to create an in-house center, to social organizations such as hospitals and non-profit agencies, and to local and state government. The availability to social organizations and government may be on a cost basis, or as a tax credit, or without cost as a gesture of the organization 9 s social responsibili ty. The future function of the manufacturer's school will be primarily that of providing courses of special inter~st such as the unique aspects of their own systems. The computer programming schools, unless a new approach is taken, will fade out of existence. College Cou rses College and universities will step into this gap by providing certificate programs in data processing. The program will include courses in program languages, theory of computers, communication, mathematics and statistics; management, accounting, finance, information systems, and many, many hours on their secondgeneration and third-generation computers. The emphasis will be the integration of the computer into all phases of the program. The students will have access to qualified professional educators, excellent facilities, and will be in an atmosphere and environment conducive to learning. These programs will usually be offered at night and be designed to be completed within two years, if the student attends classes for two nights a week. The two-year part-time college programs will open the door quickly to individuals interested in data proce~sing careers. The in-house training programs will provide the need for personnel to update their skill and to further their knowledge in order to progress along their career paths. The four-year college program will fulfill the supply for personnel at the systems level and executi ve level. Cost and Timetable In answering the question "What is being done by manufacturers, educational institutions, and users of computers to meet the need for qualified personnel in data processing?" other questions are generated. These questions deal with cost and the timetable for realizing these predictions. Simon Ramo recognizes that his system would be an "enormously expensive operation." One course would not involve one or two hours of film, but ten to fifteen hours. He stated that, "if we pay something COMPUTERS AND AUTOMATION for July, 1972 like fifty cents an hour to see an ordinary motion picture, then [say] a trigonometry course would cost thousands of dollars per student" (':'6). In 1957 this may have been true. But with today's advances in method and technology and the use of video tape the cost is no longer a prohibitive factor. Although the cost to implement this concept in a school system would run into millions of dollars for equipment and software programs, the cost for a specific course, say FORTRAN V Programming language, is well within the budget of the majority of today's organizations. In fact there exist many video tape courses in the field of data processing but without the concept of interaction. The machine of which Simon Ramo spoke is no longer a concept of the future. It is here today -- responsive television. During 1972 this machine and accompanying software programs on various data processing subjects will be available through membership in a data processing education network. Certificates in Data Processing So far little effort has been made by universities and colleges in providing certificate programs in data processing. But universities and colleges all across the nation are re-evaluating their relation and purpOBe to the community and the organizations which are the employers of their products. Members of the community need direction and education in order to pursue a worthwhile career. The education that the majority of individuals require is below a college degree. But organizations need skilled· and educate'd personnel. With the expert professional educator and thei r compu ter faci Ii ties, the uni versi ties are in the best posi tion of all formal education insti tutions to provide for the need of both the community and the organization in this area. A beginning has been made at some universities. For example, Temple University in Philadelphia, Pennsylvania, has a Certificate Program in Data Processing. At last report (Spring 1971) this two-year night program had 75 to 100 students enrolled. Thus the ingredients for tomorrow's education are here today. The growth, expansion, and effectiveness of these ingredients to meet the needs for qualified data processing personnel will depend upon the foresight and ingenuity of educators, organizational executives, and data processing professionals. [J References (1) "EDP Industry Report," April 1,1971; by International Data Corporation, Newtonville, Mass. (2) trThe State of the Information Processing Industry," Datamation Data Sheet, 1966. (3) "Profile of a Systems Man," Association for Systems Management, 1970, Cleveland, Ohio. (4) Rottenberg, Dan, "Many Computer Schools Charged Wi th Offering a Useless Education," in Wall Street Journal, June 10, 1970. (5) The results of a survey conducted in a large metropolitan area in the summer of 1970 by University Affiliates, a consulting firm; 227 companies responded to a mail questionnaire pertaining to equipment, training. and recruitment. (6) Ramo, Simon, "A New Technique of Educntion," in "Engineering and Science Monthly," Vol. 21, October, 1957. 17 The Impact of the Computer on Society - Some Comments Joseph Weizenbaum Prof. of Computer Science Mass. Institute of Technology Cambridge, Mass. 02139 UThe computer industry is rather like an island economy in which the natives make a living by taking in each other's laundry. " The structure of the typical essay on "The impact of computers on society" is ,as follows: First there is an "on the one hand" statement. It tells all the goodnhings computers have already done for society and often even attempts to argue that the social order would already have collapsed were it not for the "computer revolution." This is usually followed by an "on theother hand" caution which tells of certain problems the jntroduction of computers brings in its wake. The threat posed to individual privacy by large data banks and the danger of largescale unemployment induced by industrial automation are usually mentioned. Finally, the glorious present and prospective achievements of the computer are applauded, while the dangers alluded to in the second part are shown to be capable of being alleviated by sophisticated technological fixes. The closing paragraph consists of a plea for generous societal support for more, and more large-scale, computer research and development. This is usually coupled to the more or less subtle assertion that only computer science, hence only the computer scientist, can guard the world against the admittedly hazardous fallout of applied computer technology. 'In fact, the computer has had very considerably less societal impact than the mass media would lead us to believe. Certainly, there are enterprises like space travel that could not have been undertaken without computers. Certainly the computer industry, and with it the computer education industry, has grown to enormous proportions. But much of the industry is self-serving. It is rather like an island economy -:in which the natives make a living by taking in each-other's laundry. The part that is not self-serving is largely supported by government agencies and other gigantic enterprises that know the v,alue of everything but the price of notlhing, that is, that know 1lhe short-range utility of computer systems but have no idea of their ultimate social cost. [n any case, ~airline reservation systems and computerized hospitals serve only a tiny, largely the most afHu- (Reprinted with permission from the author and from Science, Volume 176, No. 4035, 12 May 1972, published by the American Association for the Advancement of Science, 1515 Massachusetts Ave., NW, Washington, D.C. 20005) 18 ent, fraction of society. Such things cannot be said to have an impact on society generally. Side Effects of Technology The more important reason that I dismiss the 'argument which I have caricatured is that the dIrect sc;>cietal effects of any pervasive new technology are as nothing compared to its much more subtle and ultimately much more important side effects. In that sense, the societal impact of the computer has not yet been felt. To help firmly fix the idea of the importance of subtle indirect effects of technology, consider the impact on society of the invention of the microscope. When it was invented in the middle of the 17th century, the dominant commonsense theory of disease was fundamentally that disease was a punishment, visited upon an individual by God. The sinner's body was thought to be inhabited by various so-called humors brought into disequilibrium in accordance with divine justice. The cure for disease was therefore to be found 'first in penance and second in the balancing of humors as, for example, by bleeding. Bleeding was, after all, both painful, hence punishment and penance, and potentially balancing COMPUTERS and AUTOMATION for July, 1972 in that it actually removed substance from the body. The microscope enabled man to see microorganisms and thus paved the way for the germ theory of disease. The enormously surprising discovery of extremely small living organisms also induced the idea of a continuous chain of life which, in turn, was a necessary intellectual precondition for the emergence of Darwinism. Both the germ theory of disease and the theory of evolution profoundly altered man's conception of his contract with God and consequently his selfimage. Politically these ideas served to help diminish the power of the Church and, more generally, to legitimize the questioning of the basis of hitherto unchallenged authority. I do not say that the microscope alone was responsible for the enormous social changes that followed its invention. Only that it made possible the kind of paradigm shift, even on the commonsense level, without which these changes might have been impossible. Is it reasonable to ask whether the computer will induce similar changes in man's image of himself and whether that influence will prove to be its most important effect on society? I think so, although I hasten to add that I don't believe the computer has yet told us much about man and his nature. To come to grips with the question, we must first ask in what way the computer is different from man's many other machines. Man has built two fundamentally different kinds of machines, nonautonomous and autonomous. An autonomous machine is one that operates for long periods of time, not on the basis of inputs from the real world, for example from sensors or from human drivers, but on the basis of internalized models of some aspect of the real world. Clocks are examples of autonomous machines in that they operate on the basis of an internalized model of the planetary system. The computer is, of course, the example par excellence. It is able to internalize models of essentially unlimited complexity and of a fidelity limited only by the genius of man. It is the autonomy of the computer we value. When, for example, we speak of the power of computers 'as increasing with each new hardware and software development, we mean that, because of their increasing speed and storage capacity, and possibly thanks to new programming tricks, the new COMPUTERS and AUTOMATION for July, 1972 computers can internalize ever more complex and ever more faithful models of ever larger slices of reality. It seems strange then that, just when we exhibit virtually 'an idolatry of autonomy with respect to machines, serious thinkers in respected academies [I have in mind B. F. Skinner of Harvard University (1)] can rise to question autonomy as a fact for man. II do not think that the appearance of this paradox at this time is accidental. To understand it, we must realize that man's commitment to science has .always had a masochistic component. Time after time science has led us to insights that, at least when seen superficially, diminish man. Thus Galileo removed man from the center of the universe, Darwin removed him from his place separate from the animals, and Freud showed his rationality to be an illusion. Yet man pushes his inquiries further and deeper. I cannot help but think that there is an analogy between man's pursuit of scientific knowledge ,and an individual's commitment to psychoanalytic therapy. Both are undertaken in the full realization that what the inquirer may find may well damage his self-esteem. Both may reflect his determination to find meaning in his existence through struggle in truth, however painful that may be, mther than to live without meaning in a world of ill-disguised illusion. However, I am also aware that sometimes people enter psychoanalysis unwilling to put their illusions at risk, not searching for a deeper reality but in order to convert the insights they hope to gain to personal power. The analogy to man's pursuit of science does not break down with that observation. Each time a scientific discovery shatters a hitherto fundamental cornerstone of the edifice on which man's self-esteem is built, there is an enormous reaction, just as is the case under similar circumstances in psychoanalytic therapy. Powerful defense mechanisms, beginning with denial ·and usually terminating in rationalization, are brought to bear. Indeed, the psychoanalyst suspects that, when a patient appears to accept a soul-shattering insight without resistance, his very casualness may well mask his refusal to allow that insight truly operational status in his selfimage. But what is the psychoanalyst to think about the patient who positively embraces tentatively proffered, profoundly humiliating self-knowledge, when he embraces it land instantly converts it to a new foundation of his life? Surely such an event is symptomatic of a major crisis in the mental life of the patient. I believe we are now at the beginning of just such a crisis in the mental life of our civilization. The microscope, I have argued, brought in its train a revision of man's image of himself. But no one in the mid-17th century could have foreseen that. The possibiHty that the computer will, one way or another, demonstrate that, in the inimit'able phrase of one of my esteemed colleagues, "the brain is merely a meat machine" is one that engages academicians, industrialists, and journalists in the here and now. How has the computer contributed to bringing about this very sad state of affairs? It must be said right away that the computer alone is not the chief causative agent. It is merely an extreme extmpolation of technology. When seen as an inducer of philosophical dogma, it is merely the reductio ad absurdum of a technological ideology. But how does it come to be regarded as a source of philosophic dogma? Theory versus Performance We must be clear about the fact that a computer is nothing without a program. A program is fundamentally a transformation of one computer into another that has autonomy and that, in a very real sense, behaves. Programming languages describe dynamk processes. And, most importantly, the processes they describe can be actually carried out. Thus we can build models of any aspect of the real world that interests us and that we understand. And we can make our models work. But we must be careful to remember that la computer model is a description that works. Ordinarily, when we speak of A being a model of B, we mean that a theory about some aspects of the behavior of ·B is also a theory of the same aspects of the behavior of A. It follows that when, for example, we consider a computer model of paranoia, like that published by Colby et al. (2), we must not be persuaded that it tells us anything about paranoia on the groundf'. that it, in some sense, mirrors the behavior of a paranoiac. After all, a plain typewriter in some sense mirrors the behavior of an lautis19 tic child (one types a question and gets no response whatever), but it does not help us to understand autism. A model must be made to stand or fall on the basis of its theory. Thus, while programming languages may have put a new power in the hands of social scientists in that this new notation may have freed them from the vagueness of discursive descriptions, their obligation to build defcnsibl.e the.oriesis in no way diminished. Even errors can be pronounced wHh utmost formality and eloquence. But they are n.ot thereby transmuted to truth. The failure .to make distinctions between descriptions, even those that "work," and theories accounts in large part for the fact that those who refuse to accept the view of man as machine have been put on the defensive. Recent advances in computer understanding of natural language offer an excellent case in point. Halle .and Chomsky, to mention only· the two with whom I am most familiar, have long labored on a theory of language which any model of language behavior must satisfy (3). Their aim is Jike that of the physicist who writes .a set of differential equations that anyone riding a bicycle must satisfy. No physicist claims that a person need know, let alone be able to solve, such differential equations in order to become a competent cyclist. Neither do Halle and Chomsky claim that humans know or knowingly obey the rules they believe to govern language behavior. Halle and Chomsky also strive, as do physical theorists, to identify the constants and parameters of their theories with components of reality. They hypothesize that their rules constitute a kind of projective description of certain aspects of the structure of the human mind. Their problem is thus not merely to discover economical rules to account for language behavior, but also to infer economic mechanisms which determine that precisely those rules are to be preferred over all others, Since they are in this way forced to attend to the human mind, not only that of speakers of English, they must necessarily be concerned with all human language behavior-,-not just that related to the understanding of English. The enormous scope of their task is illustrated by their observation that in all human languages declarative sentences are often transformed into questions by a permutation of two of their 20 words. (John is here --- Is John here?) It is one thing to describe rules that transform declarative sentences into questions-a simple permutation rule is clearly insufficient-but another thing to describe a "machine" that necessitates those rules when others would, all else being equal, be simpler. Why, for example, is it not so that declarative sentences read backward transform those sentences into questions? The answer must be that other constraints on the "machine" combine against this local simplicity in favor of a more nearly global economy. Such examples illustrate the depth of the level of explanation that HalIe and Chomsky are trying to achieve. No wonder that they stand in awe of their subject matter. Workers in computer comprehension of natural language operate in what is usually called performance mode. It is as if they are building machines that can ride bicycles by following heuristics like "if you feel a displacement to the left, move your weight to the left." There can be, and often is, a strong interaction between the development of theory and the empirical task of engineering systems whose theory is not yet thoroughly understood. Witness the synergistic cooperation between aerodynamics and aircraft design in the first quarter of the present century. Still. what counts in performance mode is not the elaboration of theory but the performance of systems. And the systems being hammered together by the new crop of computer semanticists are beginning (just beginning) to perform. Since computer scientists have recognized the importance of the interplay of syntax, semantics, and pragmatics, and with it the importance of computermanipulable knowledge, they have made progress. Perhaps by the end of the present decade, computer systems will exist with which specialists, such as physicians and chemists and ·mathematicians, wilI converse in natural language. And surely some part of such achievements will have been based on other successes in, for example, computer simulation of cognitive processes. It is understandable that any success in this area, even if won empirically and without accompanying enrichments of theory, can easily lead to certain delusions being planted. Is it, after all, not terribly tempting to believe that a computer that understands natural lan- guage at all, however narrow the context, has captured something of the essence of man? Descartes himself might have believed it. Indeed, by way of this very understandable seduction, the computer comes to bea source of philosophical dogma. I am tempted to recite how performance programs are composed and how things that don't work quite correctly are made to work via all sorts of strategems which do not even pretend to have any theoretical foundation. But the very asking of the question. "Has the computer captured the essence of man?" is a diversion and, in that sense, a trap. For the real question "Does man understand the essence of man?" cannot .be answered by technology and hence certainly not by any technological instrument. The Technological Metaphor asked earlier what the psychoanalyst is to think when a patient grasps a tentatively proffered deeply humiliating interpretation and attempts to convert it immediately to a new foundation of his life. I now think I phrased that question too weakly. What ·if the psychoanalyst merely coughed and the cough entrained the consequences of which I speak? That is our situation today. Computer science, particularly its artificial intelligence branch, has coughed. Perhaps the press has unduly amplified that cough- but it is only a cough nevertheless. I cannot help but think that the eagerness to believe that man's whole nature has suddenly been exposed by that cough, and that it has been shown to be a clockwork. is a symptom of ·something terribly wrong. What is wrong, I think, is that we have permitted technological metaphors, what Mumford (4) calls the "Myth of the Machine," and technique itself to so thoroughly pervade our thought processes that we have finally abdicated to technology the very duty to formulate questions. Thus sensible men correctly perceive that large data banks and enormous networks of computers threaten man. But they leave it to technology to formulate the corresponding question. Where a simple man might ask: "Do we need these things?", technology asks "what electronic wizardry will make them safe?" Where a simple man will ask "is it good?", techCOMPUTERS and AUTOMATION for July, 1972 nology asks "will it work?" Thus science, even wisdom, becomes what technology and most of all computers can handle. Lest this be thought to be an exaggeration, I quote from the work of H. A. Simon, one of nhe most senior of American computer scientists (5): As we succeed in broadening and deepening our knowledge-theoretical and empirical-about computers, we shall discover that in large part their behavior is governed by simple general laws, that what appeared as complexity in the computer program was, to a considerable extent, complexity of the environment to which the program was seeking to adapt its behavior. To the extent that this prospect can be realized, it opens up an exceedingly important role for computer simulation as a tool for achieving a deeper understanding of human behavior. For if it is the organization of components, and not their physical properties, that largely determines behavior, and if computers are organized somewhat in the image of man, then the computer becomes an obvious device for exploring the consequences of alternative organizational assumptions for human behavior. and A man, viewed as a behaving system, is quite simple. The apparent complexity of his behavior over time is largely a reflection of the complexity of the environment in which he finds himself. . . . I believe that this hypothesis holds even for the whole man. We already know that those aspects of the behavior of computers which cannot be attributed to the complexity of their programs is governed by simple general laws-ultimately by the laws of Boolean algebra. And of course the physical properties of the computer's components are nearly irrelevant to its behavior. Mechanical relays are logically equivalent to tubes and to transistors and to artificial neurons. And of course' the complexity of computer programs is due to the complexity of the environments, including the computing environments themselves, with which they were designed to deal. To what else could it possibly be due? So, what Simon sees as prospective is already realized. But does this collection of obviolls and simple facts lead to the conclusion that man is as simple as are computers? When Simon leaps to that conclusion and then formulates the issue as ,he has done here, that is, when he suggests that the behavior of the whole mall may be understood in terms of the behavior of computers as govCOMPUTERS and AUTOMATION for July, 1972 erned by simple general laws, then the very possibility of understanding man as an autonomous being, as an individual with deeply internalized values, that very possibility is excluded. How does one insult a machine? The question "Is the brain merely a meat machine?", which Simon puts in a so much more sophisticated form, is typical of the kind of question formulated by, indeed formulatable only by, a technological mentality. Once it is accepted as legitimate, arguments as to what a computer can or cannot do "in principle" begin to rage and themselves become legitimate. But the legitimacy of the technological questionfor example, is human behavior to be understood either in terms of the organization or of the physical properties of "components"-need not be ·admitted in the first instance. A human question can be asked instead. Indeed, we might begin bv asking what has already become of "the whole man" when he can conceive of computers organized in his own image. The success of technique and of some technological explanations has, as I've suggested, tricked us into permitting technology to formulate important questions for us-questions whose very forms severely diminish the number of degrees of freedom in our range of decision-making. Whoever dictates the questions in large part determines the answers. In that sense, technology, and especially computer technology, has bec'ome a self-fulfilling nightmare reminiscent of that of the lady who dreams of being raped and begs her attacker to be kind to her. He answers "it's your dream, lady." We must come to see that technology is our dream and that we must ultimately decide how it is to end. I have suggested that the computer revolution need not and ought not to call man's dignity and autonomy into que1stion, that it is a kind of pathology that moves men to wring from it unwarranted, enormously damaging 'interpretations. Is then the computer less threatening that we might have thought? Once we realize that our visions, possibly nightmarish visions, determine the effect of our own creations on us and on our society, their threat to us is surely diminished. But that is ,not to say that this realization alone will wipe out all danger. For e".ample, apart from the erosive effect of a technological mentality on man's self-image. there are practical attacks on the freedom and dignity of man in which computer technology plays a cr,itical role. I mentioned earlier that computer science has come to recognize the importance of building knowledge into machines. We already have a machine -Dendral-(6) that commands more chemistry than do many Ph.D. chemists, and another-Mathlab-(7) that commands more applied mathematics than do many applied mathematicians. Both Dendral and Mathlab contain knowledge that can be evaluated in terms of the explicit theories from which it was derived. If the user be· lieves that a result Mathlab delivers is wrong, then, apart from possible program errors, he must be -in disagreement, not with the machine or its programmer, but with a specific mathematical theory. But what about the many programs on which management, most particularly the government and the military, rely, programs which can in no sense be said to rest on explicable theories but are instead enormous patchworks of programming techniques strung together to make them work? Incomprehensible Systems In our eagerness to exploit every advance in technique we quickly incorporate the lessons learned from machine manipUlation of knowledge in theory-based systems into such patcihworks. They then "work" better. I have in mind systems like target selection systems used in Vietnam and wa'r games used in the Pentagon, ,and so on. These often g,igantic systems are put together by teams of programmers, often working over a time span of many years. But by the time the systems come into use, most of the original programmers have left or turned their attention to other pursuits. It is precisely when gigantic systems begin to be used that their inner workings can no longer be understood by any single person or by a small team of individuals. Norbert Wiener, the father of cybernetics, foretold this phenomenon in a remarkably prescient article (8) published more than a decade ago. He said there: It may well be that in principle we can- not make any machine the elements of whose behavior we cannot comprehend sooner or later. This does not mean in any way that we shall be able to comprehend these elements in substantially less 21 time than the time required for operation of the machine, or even within any given number of years or generations. An intelligent understanding of [machines'] mode of performance may be delayed until long after the task which they have been set has been completed. This means that though machines are theoretically subject to human criticism, such criticism may be ineffective until long after it is relevant. This situation, which is now upon us, has two consequences: first that decisions are made on the basis of rules and criteria no one knows explicitly, and second that the system of rules and criteria becomes immune to change. This is so because, in the absence of detailed understanding of the inner workings of a system, any substantial modification is very likely to render the system altogether inoperable. The threshold of complexity beyond which this phenomenon occurs has a1reapy been crossed by many existing systems, including some compiling and computer operating systems. For example, no one likes the operating systems for certain large computers, but they cannot be substantially changed nor can they be done away with. Too many people have become dependent on them. An awkward operating system is inconvenient. That is not too bad. But the growing reliance on supersystems that were perhaps designed to help people make analyses and decisions, but which have since surpassed the understanding of their users while at the same time becoming indispensable to them, is another matter. In modern war it is common for the soldier, say the bomber pilot, to operate at an enormous psychological distance from his victims. He is not responsible for burned children because he never sees their village, his bombs, and certainly not the flaming children themselves. Modern technological rationalizations of war, diplomacy, politics, and commerce such as computer games have an even more insidious effect on the making of policy. Not only have policy makers abdicated their decision-making responsibility to a technology they don't understand, all the while maintaining the illusion that they, the policy makers, are formulating policy questions and answering them, but responsibility has altogether evaporated. No human is any longer responsible for "what the machine says." Thus there can be neither right nor wrong, no question of justice, no theory with which one 22 can agree or disagree, and finally no basis on which one can challenge "what the machine says." My father used to invoke the ultimate authority by saying to me, "it is written." But then I could read what was written, imagine a human author, infer his values, and finally agree or disagree. The systems in the Pentagon, and their counterparts elsewhere in our culture, have in a very real sense no authors. They therefore do not admit of exercises of imagination that may ultimately lead to human judgment. No wonder that men who live day in and out with such machines and become depe"ndent on them begin to believe that men are merely machines. They are reflecting what they themselves have become. The potentially tragic impact on society that may ensue from the use of systems such as I have just discussed is greater than might at first be imagined. Again it is side effects, not direct effects, that matter most. First, of course, there is the psychological impact on individuals living in a society in which anonymous, hence irresponsible, forces formulate the large questions of the day and circumscribe the range of possible answers. It cannot be surprising that large numbers of perceptive individuals living" in such a society experience a kind of impotence and fall victim to the mindless rage that often accompanies such experiences. But even worse, since computerbased knowledge systems become essentially unmodifiable except in that they can grow, and since they induce dependence and cannot, after a certain threshold is crossed, be abandoned, there is an enormous risk that they will be passed from one generation to another, always growing. Man too passes knowledge from one generation to another. But because man is mortal, his transmission of knowledge over the generations is at once a process of filtering and accrual. Man doesn't merely pass knowledge, he rather regenerates it continuously. Much as we may mourn the crumbling of andent civilizations, we know nevertheless that the glory of man resides as much in the evolution of his cultures as in that 'Of his brain. The unwise use of ever larger and ever more complex computer systems may well bring this process to a halt. It could well replace the ebb and flaw 'Of culture with a world without values, a world in which what counts for a fact has long ago been determined and forever fixed. Positive Effects I've spoken of some potentially dangerous effects of present computing trends. Is there nothing positive to be said? Yes, but it must be said with caution. Again, side effects are more important than direct effects. In particular, the idea of computation and of programming languages is beginning to become an important metaphor which, in the long run, may well prove to be responsible for paradigm shifts in many fields. Most of the commonsense paradigms in terms 'Of which much of mankind interprets the phenomena of the everyday world, both physical and social, are still deeply rooted in fundamentally mechanistic metaphors. Marx's dynamics as well as those of Freud are, for example, basically equilibrium systems. Any hydrodynamicist could come to understand them without leavi!lg the jargon of his field. Languages capable "of desaibing ongoing processes, particularly in terms of modular subprocesses, have already had an enormous effect on the way computer people think of every aspect of their worlds, not merely those directly related to their work. The information..,processing view of the world so engendered qualifies as a genuine metaphor. This is attested to by the fact that it (i) constitutes an intellectual framework that permits new questions to be asked about a wide-ranging set of phenomena, and (ii) that it itself provides criteria for the adequacy of proffered answers. A new metaphor is important not in that it may be better than existing ones, but rather in that ,it may enlarge man's vision by giving him yet another perspective on his world. Indeed, the very effectiveness of a flew metaphor may seduce lazy minds to adopt it as a basis for universal explanations and as a source of panaceas. Computer simulation of social processes has already been advanced by single-minded generalists as leading to general solutions of all of mankind's problems. The metaphors given us by religion, the poets, and by thinkers like Darwin, Newton, Freud, and Einstein have rather quickly penetrated to the language of ordinary people. These metaphors have thus been instrumental in shaping our entire civilization's imaginative reconstruction of our world. The computing metaphor is as yet available to only an extremely small set of people. Its acquisition and internalization, hopefully as only one of COMPUTERS and AUTOMATION for July, 1972 many ways to see the world, seems to require experience in program composition, a kind of comput.ing literacy. Perhaps such literacy will become very widespread in the advanced .societal sectors of the advanced countries. But, should it become a dominant mode of thinking and be restricted to certain social classes, it will prove not merely repressive in the ordinary sense, but an enormously divisive societal force. For then classes which do and do not have access to the metaphor will, in an important sense, lose their ability to communicate with one another. We know already how difficult it is for the poor and the oppressed to communicate with the rest of the society in which they are embedded. We know how difficult it is for the worl.d of science to communicate with that of the arts and of the humanities. In both instances the ,communication difficulties, which have grave consequences, are very largely due to the fact that the respective communities have un sharable experiences out of which unsharable metaphors have grown. Responsibility Given these dismal possibilities, what is the responsibility of the computer scientist? First I should say that most of the harm computers can potentially entrain is much more a function of properties people attribute to computers than of what a computer can or cannot actually be made to do. The nonprofessional has little choice but to make his attributions of properties to computers on the basis of the propaganda emanating from the computer community and amplified by the press. The computer professional therefore has an enormously important· responsibility to be modest in his claims. This advice would not even have to be voiced if computer science had a tradition of scholarship and of self-criticism such as that which characterizes the established scien"ces. The mature scientist stands in aWe before the depth of his subject matter. His very humility is the wellspring of his strength. I regard the instilling.of just this kind of hum il- COMPUTERS ·and AUTOMATION for July, 1972 ity, chiefly by the example set by teachers, to be one of the most important missions of every university. department of computer science. The computer scientist must be aware constantly that his instruments are capable of having gigantic direct and indirect amplifying effects. An error in a progmm, for example, could have grievous direct results, including most certainly the loss of much human life. On 11 September 1971, to cite just one example, a computer programming error caused the simultaneous destruction of 117 high-altitude weather balloons whose instruments were being monitored by an earth satellite (9). A similar error in a military command and control system could launch a fleet of nuclear tipped missiles. Only censorship prevents us from knowing how many such events involving nonnuclear weapons have already occurred. Clearly then, the computer scientist has a heavy responsibility to make the fallibility and limitations of the systems he is capable of designing brilliantly clear. The very power of his systems should s~rve to inhibit the advice he is ready to give and to constrain the range of work he is willing to undertake. Of course, the computer scientist, like everyone else, is responsible for his actions and their consequences. Sometimes that responsibility is hard to accept because the corresponding authority to decide ,what is and what is not to be done appears to rest with distant and anonymous forces. That te,chnology itself determines what is to be done by a process of extrapolation and that individuals are powerless to intervene in that determination is precisely the kind of self~fulfiUing dream from which we must awaken. Consider gigantic computer systems. They are, of course, natural extrapolations of the large systems we already have. Computer nebworks are another point on the same curve extrapolated once more. One may ask whether such systems can be used by anybody except by governments and very large corporations and whether such organizations will not use them mainly for antihuman purposes. Or consider speech reco gn i- tion systems. Will they not be used primarily to spy on private communioations? To answer such questions by saying that big computer systems, com.puter networks, and speech recognition systems are inevitable is to surrender one's ihumani~. For such ,an ,answer must be based either on one's profound conviction that society has already lost control over its technology or on the thoroughly immoral position that "if I don't do it, ~orileone else will." I don't say that systems such as I have mentioned are necessarily evilonly that they may be and, what is most important, that their inevitability cannot be. accepted by individuals claiming autonomy, freedom, and dignity. The individual computer scientist can and must deoide. The determination of what the impact of computers on society is to be is, at least in part, in his hands. Finally, the fundamental question the computer scientist must ask himself is the one that every scientist, indeed every human, must ask. It is not "what shall I do?" but rather "what shall I beT' I cannot answer that for anyone save myself. But I will say again that if technology is a nightmare that appears to have its own inevitable logic, it is our nightmare. It is possible, given courage and insight, for man to deny technology the prerogative to formulate man's questions. It is possible to ask human questions and to find humane answers. 0 References and Notes 1. B. F. Skinner, Beyond Freedom IUtd Dignity (Knopf, New York, 1971). 2. K. M. Colby, S. Weber, F. D. Hilf, Arti/. In tell. 1, 1 (1971). 3. N. Chomsky, Aspects 0/ the Theory 0/ Syntax (M.LT. Press, Cambridge, Mass., 1965); - - and M. Halle, The Sound Pattern 01 English (Harper & Row, New York, 1968). 4. L. Mumford, The Pentagon 01 Power (Harcourt, Brace, Jovanovich, New York, 1970). 5. H. A. Simon, The Sciences 0/ the Artificial (M.LT. Press, Cambridge, Mass., 1969), pp. 22-25. 6. B. Buchanan, G. Sutherland, E. A. Feigenbaum, in Machine Intelligence, B. Meltzer, Ed. (American Elsevier, New York, 1969). 7. W. A. Martin and R. J. Fateman, "The Macsyma system," in Proceedings 0/ the 2nd Symposium on Symbolic and Algebraic Manipulation (Association for Computer Machines, New York, 1971); J. Moses, COm11l1m. Assoc. Computer Mach. 14 (No. 8), 548 (1971). 8. N. Wiener, Science 131, 1355 (1960). 9. R. Gillette, ibid. 174, 477 (1971). 23 BARRIERS IN APPLYING COMPUTERS Edmund C. Berkeley Editor, Computers and Automation "The neglect of important barriers in applying computers has .caused a probable loss of at least 10% and perhaps as much as 30% of all the money that has been spent on seeking to apply automatic computers. " Outline 1. 2. 3. 4. 5. 6. 7. 8. The Newness of Computers 2100 Applications to Date Barrier: Insufficient Speed Barrier: Insufficient Capacity Barrier: Organizing Sensory Data Into Objects Barrier: Understanding Words and Sentences Barrier: Deriving Meanings from Objects Barrier: Putting Together Information from Many Sources 9. Barrier: Automatically Correcting Wrong Instructions 10. A Convincing Example of When Not To Use a Computer 11. Conclusions One of the questions that all computer people either think about or are asked about, or both, is this one: Will computers eventually perform every activi ty in problem solving and handling information? or are there definite barriers or limits? and if so, what are they? and how permanent are they? 1. The Newness of Computers ated with numbers of 23 decimal digits, performed 3 additions per second, and could hold in erasable storage 72 such numbers at one time. In contrast, recent powerful automatic digi tal computers may hold numbers of 9 decimal digits, may perform more than a million addi tions per second, and may hold in erasable storage over 200 thousand numbers. Such computers represent a revolutionary change in society' s capacity to handle information automatically. 2. 2100 Applications To Date In 1944 the Harvard IBM Automatic Sequence Controlled Calculator was devoted almost entirely to one application: computing a numerical table of the values of Bessel functions. Its output constituted page after page of the Annals of the Harvard Computation Laboratory. From 1960 to 197i a list of known applications of computers has been published each year in "The Computer Directory and Buyers Guide" annual issue of "Computers and Automation". In the 1960 issue the number of listed applications was a little over 300; in 1971, the number of listed applications was over 2100. Computers have been functioning for less than 30 years. The first automatic digital computer began operating in 1944. It was called the Harvard IBM Automatic Sequence Controlled Calculator; it oper- In the 1971 listing, there are four main categories: (1) "Business and Manufacturing in General", wi th two main divisions, "Office" and "Plant and Production"; (2) "Business, Specific Fields", with 24 categories from "Advertising" to "Transportation" and a 25th one "Miscellaneous"; (3) "Science and Engineering" with 26 categories from "Aeronautics and Space Engineering" to "Statistics"; and finally (4) "Humanities" with the categories and applications shown in Table 1. (This article is based on an article by Edmund C. Berkeley, contributed to the Kodansha Encyclopedia, Tokyo, Japan) There thus exists an actual inventory of noticed applications of computers which has continued from year to year; and it provides a useful historical record of the remarkable increases in the applications of computers. To try to answer these questions completely and finally now in 1972 is hardly reasonable, because human experience with computers is still brief; but it is worthwhile examining the questions. 24 COMPUTERS AND AUTOMATION for July, 1972 Table 1 APPLICATIONS OF COMPUTERS IN THE AREA OF HUMANITIES (Source: Computer Directory and Buyers' Guide, 1971, p. 23) 1. Anthropology Cords and string: analysis Content analysis for cross-cultural values study o 2. Archeology American Indians, prehistoric cultures: analysis and cataloging Archeological data: information retrieval and analysis Artifacts found at sites: analysis, classific_a t ion, recons truct i ng Museum accession records: information retrieval and analysis Pottery, Egyptian: cataloging, classification, storage and retrieval Pottery shards found at sites: analysis, classification, reconstruction Stones found at sites:: determination whether of natural or human origin based on analysis of angles and other characteristics 3. Art Designs by computer Graphic representation by computer Paintings by computer: inks, oils, water colors Pictures by computer Sevres porcelain: cataloging, classification, forgery detection Three-dimensional art, generation of 4. Games of Skill Bridge, bidding: championship play Chess: excellent play Gomoku: excellent play Instant Insanity: excellent play Kalah: excellent play Nim: perfect play Quad: excellent play Tit-tat-toe: perfect play 5. Genealogy Cataloging Data analysis Research Surnames: storage and retrieval 6. Geography Map production Record matching Spatial pattern analysis Theory testing 7. History Census records - ecological implications:: analysis, summaries Congressional voting records - social implications: analysis, summaries Court records and decisions - impl:ications: analysis, summaries Diplomatic records - implications re prevailing attitudes~ analysis. summaries Election statistics - implications: anal'ysis, forecas ting results" summaries Ship sailing records - historical and: eC'onomic' implications: analysis, summaries 8. Language Ambiguity determinations Dead languages: deciphering, transla'ting Human voice~ analysis, simulation COMPUTERS AND' AUTOMATION for July; 1972 Language analysis Navaj 0 dictionary: compilation Syntax pattern analysis Translation from one language to another Verification of translations Vocabulary trends: analysis Word classification: analysis, summaries Word frequency counts: analysis 9. Literature Author determination via key function words Author determination via style analysis Automatic abstracting Biblical research Bibliography construction Concordance construction Index construction Poetry style: analysis Proofreading "Quik-index" by keyword of ti tIes in context 10. Music Composition Composition features such as range, phrases, patterns, refrains, cadences, etc.: analysis, simUlation, synthesis Harmonies:: analysis Musical information: analysis, retrieval, storage Music prin ting Pitch for singers~ instruction Simula tion and models Sounds: analysis, synthesis Statistical analysis of style Stereophonic music: play In fact, there is no doubt that digltal computers can be applied in every fieldof science and knowledge in Which, observa tions are made and records are kept and correlated, or where m:lthematics, logic, statistics, classification, and other methOds of precise reasonin~ may be applied. But it is not now demonstrable that computers will eventually apply to every activity in recognition of problems, solVing problems and handling information. The barriers and limits t~ the applications- of computers are serious and are likely to continue for many years. Som~ of the barriers will now be pointed out. 3;, Barrier: Insufficii:mt· Speed Although; the speed of a modern powerful computer is over a minion Cl06} calculating operations a second, there are probl'ems of such magnitude that even this speed will not sol've them. One' example is looking ahead: in the game of chess, to foresee the consequences of a move. In order to determine all the consequences of a: move at the start of a chess game,: it has been calculated tha t even if a computer could' perform a trillion ( 0 12 ) calculating operations per second, mbrethan 10 bill ion ClaW) years of computation would be required (the expected future life time of the sun and planets) and even the~ only a very small part of the calculations necessary would have been' made. Another example is' the calculation of an accurate forecast eveW for 24 hDurs ahead. This also would require so many calculating operations that they could, not be completed' until after the forecasted' weather had arrived; so, to deal with this problem, practical approximations are needed, and in: fact are' being! worked out and' used. weathe~ The !'imitation: (r'om speed' makes it necessary to modtfy compu fer programs>,: changing them from accurate (please turn to page 28) 25 PICTORIAL REASONING TESTS-Part 6 NUMBLES Neil Macdonald Assistant Editor, Computers and Automation Neil Macdonald Assistant Editor Computers and Automation "There undoubtedly is a place for non-verbal, nonmathematical testing which is not culture-limited, not occupation-limited, and not background-limited ... and which would enable finding and employing many useful people -- including programmers -- who do not have American, middle-class backgrounds." A "numble" is an arithmetical problem in which: digits have been replaced by capital letters; and there are two messages, one which can be read right away and a second one in the digit cipher. The problem is to solve for the digits. Each capital letter in the arithmetical problem stands for just one digit 0 to 9. A digit may be represented by more than one letter. The second message, which is expressed in numerical digits, is to be translated (using the same key) into letters so that it may be read; but the spelling uses puns or is otherwise irregular, to discourage cryptanalytic methods of deciphering. We invite our readers to send us solutions, together with human programs or computer prOgrams which will produce the solutions. This month's Numble was contributed by: Andrew M. Langer, Newton High School, Newton, Mass. The pictorial reasoning tests which we have been publishing since October, 1971, require observation, perception, comparison, recognition of shapes and designs, and reasoning. These operations are difficult for a computer program (except for the reasoning), yet stimulating to a human being. The techniques needed are those which we as human beings have had to use (and improve) all our lives -- and it is fun to do something you're good at! The readers of "Computers and Automati on" are a group of alert and intelligent people -- so far as we can tell -- and they seem to like contributing to the explorations we are making through these pictorial reasoning tests. NUMBLE 727 Prior articles on Pictorial Reasoning Tests (PRTs) in "Computers and Automation" are: THE x HAS T Y SOT 0 o A L U Y V HH R N V I THE U LTV H S HOP HYO LEA P S UVT HS E x 0 V E R E Y S Aptitudes of People -- I / Aptitudes of People -- II / Aptitudes of People Analysis and Answers / Part 5 / Test 6 In case any reader has missed these articles, we can supply back copies at moderate cost. E E VI + Oct. 1971 / PRTs and Test 1 Dec. 1971 / PRTs and Test 1 (repeated) Feb. 1972 / PRTs and III / Tests 2, 3 March 1972 / PRTs -Tests 4, 5 Apri 1 1972 / PRTs -- = E 0 E I ETTEA= EOEI 4216 0069 8752 E T TEA 8231 Solution to Numble 726 In Numble 726 in the June issue, the digits 0 through 9 are represented by letters as follows: U o M 5 H 6 2 G,F 7 N 3 T 8 S,R 4 o 9 E The message is: The night is the mother of thoughts. Our thanks to the following individuals for submitting their solutions - to Numble 725: D. F. Martin, Los Angeles, Calif.; and David P. Zerbe, Reading, Pa. ADVANCED NUMBLES - Our thanks to Dr. Mitchell Snyder, Ramat-Gan, Israel for submitting his solutions to New Styles of Test In this issue we publish a sample of a new style of test, Style 4: the fi rst three frames di splay three samples of a property; the question for each of the next seven frames is "Is the same property shown?" Answers The answers and comments that you, our readers, send us are very useful and gi ve us much data to work from and think about. Our warm thanks to all of you. It is not easy to respond to individual persons who ask to know "the answers". But we have decided to publish eventually the answers to all of our tests. The "correct;' answers to C&A Reasoning Test No. 1 (which was print~d in October 1971 and again in December 1971) were printed in the March 1972 iSsue. In many cases, it is impossible to prove that a certain answer is correct; accordingly, what we publish are so-called correct answers, denoted using quotation marks, as "correct" answers. "The figures have been drawn freehand and not too carefully. It is a myth that all figures sho.uld be drawn professionally; one can do a great deal with an author's freehand, approximate drawings, and the reader's eyes to interpret them; and such drawings make the gap between the author and the reader less formidable." Advanced Numble Nos. 72031 and 72032. 26 o COMPUTERS AND AUTOMATION for July, 1972 r.I IJ PICTORIAL REASONING TEST: 1. The following is a test to see how carefully you can observe and reason. It is not timed. 2. In each item the first three pictures A, B, and C are samples that express a certain property of objects or sets of objects. For each of the remaining seven pictures (0 to J), consider the question "Does the picture express the same property?" Then write the code for your choice of answer in the cell provided. The codes are: V for "yes"; X for" no"; P for" logica lly, perhaps yes. perhaps no"; N for" not applicable". I " Correct l' I U % 2. 3 - IVVVV ~ G I/; 1:. ---X A C *" 8 . + ZJ 0 0 0 • 0 (' E ~ B § ~ ~g ~ 10 ~ m0 ~ + • 7 0 IV\...IVl.J ® -- 1/ ~ C£> 8 g @J -00 ~ ~e) 0 ~ lSJ 0 ~ IVt/ r G F ;."""'- g; *I DO ~ ~I"I'I''' 00 * + % / ODOO ........ 0 § 0 • tl .+ .0- ~ * ~ 0 ~ IJ q . 1 ill S E1 B 0 ~ GC) & W & J) A ---l 0 J1 ®B .()XIO § ()X) ?j /' ~ @] e. / 8 ~ 9 0 E9 # 0 X X =F err 0 0 ~ ~ c:;:::::;:::::J W P N V X B A o C&A No.7 - (may be copied on any piece of paper) ~ --0 .~.'Jt. 0 tJ /8) °0 :r f ~ C<:a <=60 ~ [:::::::0- t:> t:::::==:- 8 -=::::J 1i6 ~ r=J D 0 O f2 H Item 0 E F I Item 0 E F G I J G H J Answer: 1 6 In each cell, 2 7 insert the 8 3 code for your 4 9 choice of 10 5 answer: Survey Data: 1. Name 2. Ti tle_ _ _ _ _ _ _ _ __ 3. Organization_____________________________________________________________________________________ 4. Address Other (l2lease sl2 ecif y) Average? Good? Excellent? Not your field? 5. In comp uter programming, are you: 6. In syst ems analysis, are you: 7. In mana ging, are you: 8. What fields (not mentIoned above) are you faIrly good In (or even expert In)?~~-----------------------9. What other capacities do you have? (Please don't be bashful -- but be objective) ________________________ 10. Any remarks?________________________________________________________________~--~------~----~~ (attach p;)I)(!r if needed) When completed, please send to: Neil Macdonald, Survey Editor, Computers and Automation, 815 Washington St., Newtonville, MA 02160 COMPUTERS AND AUTOMATION for July, 1972 27 Berkeley - continued from page 25 to approximate, so that the solution will be obtained in the time needed in order for the solution to be useful. The computer of course permits much more extensive and elaborate approximations than unaided human beings can use - but the approximations are still approximate. 4. Barrier: Insufficient Capacity The capacity of a computer to hold a quantity of information is also limited. A computer may hold in its most rapidly accessed store or memory 256,000 items of information, each of 36 bits (where a bit is a yes or no, a report true or false, a one or a zero, etc.). This amount is approximately equal to 107 bits. Let's compare this with an ordinary collegiate dictionary. Data: 1000 pages of text; 2 columns per page; each column, about 100 lines; each line, about 11 words; each word, about 5.5 characters; and each character, 7 bits. Multiplying out, we find that this one book contains approximately 108 bits, ten times as much data. The Library of Congress in Washington, D.C., probably contains about 10 16 bits of information. Capacity therefore is another limitation which restricts the application of computers. 5. Barrier: Organizing Sensory Data into Objects, etc. Another barrier is that no computer can rapidly perceive, observe, recognize, organize, and synthesize many facets or aspects of a situation or environment, thus converting sensations into recognized objects or things, such as a traffic light or a rose perfume. In order to notice the operation of converting sensations into recognized objects, try this experiment on some of your friends: Part 1: Take 20 small objects that commonly occur in a household or office, such as a pin, a nail, a thumbtack, a button, an eraser, etc., and place them separately on a tray under a cover. Then uncover the tray in front of some friends, and allow them to look for just one minute. Then cover the tray and ask them to make a list from memory of the objects which they have just seen. Most people will list between 14 and 18 of the 20 objects. Part 2: Then take 20 small metal stampings produced by a stamping machine, such as a washer, a clip, a fastening, a rivet, a glider, a pr()ng, etc. Display them for just one minute. Then ask your friends to make a list from memory of what they have seen. Most people will list (or draw pictures of) 3 to 5 of the 20 obj ec ts. In other words, what we see depends enormously on what is in our minds already in the form of knowledge or experience - stored recognizable concepts. The same sort of barrier applies to sounds, s.mells, tastes, feelings, etc. How does one know which smell is the smell of rose? How does a good telephone operator at a company swi tchboard, in less than a quarter of a second, recognize the voice of each of the company's 500 employees who, when making acall, talk to her? In the absence of knowing clearly how the process works with human beings, it is hard to imagine how we might program a computer to perform it. 6. Barrier: Understanding Words and Sentences Another major "barrier is that a computer cannot quickly understand the meaning of spoken or written words and symbols, so that ideas may be acquired and communicated. 28 Every normal human child learns to understand spoken words and to use them himself, first singly, then in groups of two or three, and finally in long sentences; and he learns this behavior before he is four or five years old. The vocabulary of a fiveyear old child is regularly more than 5000 words. It makes no difference what language he may be immersed in - and there are approximately 1700 spoken languages on earth. Often the child will learn more than one language. 1I0w this learned behavior occurs with human beings is a great mystery. In spite of much study, only small corners of the curtain concealing the process have been lifted. It is clear that a loving family to teach the child, and an environment presenting common objects and common situations, are very desirable factors for learning and may even be necessary. But the process using inherited capacity and environmental experience by which human beings learn a language with which to communicate seems to be barred to a computer. So it is hard to imagine how a computer could be programmed to learn a language and use it intelligently to express ideas. When the words are written down in characters and the characters are presented to a computer, it is of course possible to teach the computer to respond to the meaning of some of the characters or character sets. Thus the character "5" or even the string of characters "five" can be interpreted by a computer so that it will perform a specified operation five times. However, deciding upon meanings in a context of free vocabulary and free sentences may be beyond the power of any computer program of the present day, though ten years from now, it may not be. 7. Barrier: Deriving Meanings from Objects The purpose of an animal in recognizing objects in the environment is to classify them relative to the goals or purposes of the animal. Some objects are food to be sought; some objects are danger to be avoided; some Objects are shelter in which to rest or sleep; etc. A higher animal, such as most mammals, is not usually born with the capacity to identify appropriately all the objects in its environment. It has to learn. Sometimes it is taught by its mother and father, sometimes by older animals, sometimes by experience, sometimes by observing what other members of its species do, etc. An inexperienced dog learns the hard way abou t porcupines - by get ti ng pa infully pricking quills in its nose. But the dog learns, or it dies. A computer however does not move, but sits still in a room. It has no perceptors to perceive its environment. It has no instinct to survive. Its food is electricity and maintenance service. Its shelter is the computer room. It is presumably never in a danger to which it must react, to stay "alive". And accordingly all the meanings of the objects it deals wi th - the numbers, data, and programs that it deals with - are rather irrelevant to it, for it is just a manipulator of ones and zeroes, yeses and noes, binary digi ts, in extraordinarily intricate pa tterns. Whatever meanings the computer deals wi th. at present must be bottle-fed to it by the human programmer. 8. Barrier: Putting Together Information from Many Sources Animals, including human beings, have a capacity to put together information from many sources, and thus "understand" a situation. COMPUTERS AND AUTOMATION for July, 1972 Q o Once, in June, 1964, I watched a squirrel raid a bird feeder. The experience was so impressive I have never forgotten it. The bird feeder was an inverted glass cylinder, with a wide, sloping, conical lid to keep out rain, and a round base trough, into which sunflower seeds and other seeds fed slowly by gravi ty through openings. The feeder was tied by a short string to a pole; the pole rested in a forsythia bush projecting about two feet beyond the bush. When I first saw the squirrel, he was investigating and eating some of the fallen sunflower seeds on the ground below the bird feeder, and then he rose up and tried to reach the bird feeder from the ground; but it was too high for him, and he could not reach it. A little later I saw him crawling out on the pole towards the bird feeder. Then, holding on to the pole with his right hind paw only, he lowered himself slowly along the bird feeder, preventing it from swinging out wi th his left hind paw. He stretched his full length upside down towards the base of the feeder, got his front paws on the seeds, and pr9ceeded to eat all he wanted for about five minutes, remaining head downward. Finally, he drew himself back up to the pole, and left along the pole through the bush. I have often thought about that squirrel. He could not have had instincts that dealt with bird feeders: they are too recent. He did not have language, by means of which older and wiser squirrels might have instructed him how to solve that kind of problem. He did not have instructions from a human programmer, as a computer faced with that problem might have had. But that squirrel made a number of deductions and traveled a long way around to solve his sunflower seed problem: he had a good idea, and I would say that the squirrel understood the si tuation! The squirrel's idea however is not demonstrable because I cannot look into the squirrel's mind, and of course he cannot tell me anything about what is in his mind, because we do not speak each other's language. But the squirrel's "understanding" is demonstrable: he showed he was able to perceive relevant features of the situation, adapt means to ends, and fulfill his goal. A computer has capacity to put together information from many sources, and behave "sensibly" about the information, but only if programmed, never by itself, never independently. 9. Barrier: Automatically Correcting Wrong Instructions A human being usually has the capacity not to do something which is obviously stupid. For example, if you tell a boy "mow the lawn", and the lawn contains a small flower bed, the boy usually will not mow the flower bed but leave the flowers standing, even if you did not mention the flower bed to him. In other words, a human being (unlike a computer) is likely to do what you mean and nqt what you say, when the words of your instructions contain small mistakes. But the computer will not. The computer will do what you say, regardless of what you mean. The computer is thus an "idiot savant" which, doing just what you say, will do the wrong thing a million times a second. The day may eventually come when a computer will be able to apply "common sense" and "j udgment" - and correct "wrong" instructions. The capacity is not magic, and derives from good, well-debugged supervisory programs. But this capacity regularly provided is probably some time in the future. No software house seems yet to be advertising software with "common sense". COMPUTERS AND AUTOMATION for July, 1972 10. A Convincing Example of When Not to Use a Computer On one occasion I visited the central office of a large paper company in New York. This office had to produce weekly and monthly summary reports for some 200 produc ts produced by 29 pI an ts here and there all over the United States and Canada. At one time, they had had a punch card ins tallation wi th some 8 machines and 7 people for the purpose, and they found they could not obtain their summaries quickly and correctly. That installation was gone. They now used an ordinary table, some perforated forms, and an arrangement of pins. The forms listed all possible products in the same sequence for every plant; zero would apply if some product was not produced at a plant; and for each reporting period the completed forms giving the production figures were mailed in from allover the country. As soon as the 29th report was in, the forms were aligned by the pins on the table, and a clerk would go across each row on the forms, picking up the figures for a particular product, adding them with an adding machine, and entering the total on a 30th form. Then another clerk would check the adding machine tape and the entry. Thus the office avoided the entire input, output, sorting, and collating of punch card operations. They handled each figure only twice, once for adding and once for checking. Here is a fine example of a simple, direct, fast, efficient method avoiding both computer and punch card machines. In almost every case where a figure is going to be added only once, it makes no sense to put it into some input device, add it inside a computer, and then take it out through some output device. It is better to use some other process. Basically there is always the same flaw in poor or wasteful applications of computers, and in application failures where computers are subsequently thrown ou t. This flaw is the failure of a group of human beings to understand: - What computers are good for, and what they aren't good for at all; - The ironclad necessity for correct programming, covering all the possible cases, more than most clerks encounter in 10 years of working at a clerical job; - The need for sensible trials on a small scale before operating on a large scale; - The importance of investigating improvements in methods that do not use computers. 11. Conclusions Al though computers are powerful and even marvelous machines, they have limitations, and they cannot be applied indiscriminately. It is necessary to think about their input, output, storage, speed, programming, etc., and particularly how a computer will mesh with other requirements of the system in which it is to be used. The neglect of important barriers in applying computers has caused a probable~ loss of at least 10% and perhaps as much as 30% of all the money that has been spent on seeking to apply automatic computers. 0 29 The Neglect of Significant Subjects, and the Information Engineer by Peter J. Nyikos and Edmund C. Berkeley "It is far more realistic to consider the silence '" as part of the unfathomable mystery of what the media (and by inference, the public) consider newsworthy. " 1. Introductory Note Edmund C. Berkeley, Editor Computers and Automation It has been a long time since "Computers and Automation" has received a communication from a reader which to us has seemed as important and significant as the letter we have received from Peter J. Nyikos published below. I think that Mr. Nyikos has put his finger on a most important issue: 1. Many subjects that are significant and important for human society receive almost no attention, discussion, or reporting. 2. Conservatives, liberals, newspapers, magazines, socialists, capitalists, alike -even persons who want to call themselves information engineers, -- devote almost no attention or discussion to these subjects. 3. The problem, he says, cuts across all conceivable ideological lines. It does. 2. "Why No Wide Publication?" - Comment Peter J. Nyikos Management Information Systems Directorate Edgewood Arsenal, Md. -21010 Your brief comment "Why no Wide Publication?" on page 33 of the May issue touched off a flurry of ideas. I hope you find them in keeping with your remarks on input and output of data systems in a broad sense on page 28. "Why is information about atrocities of these kinds not widely published and distributed throughout the newspapers and media of the United States? So that Americans with a sense of common decency can roar their protests? "There seem to be :two answers: One is the cooperation of the American press with the American es30 tablishment. The other is the to be as concerned about Asian can cancer victims as they are ed American soldiers. This is failure of Americans civilians and Americoncerned about drafta moral failure."] [May issue, p. 28: See policy statement entitled "Unsettling, Disturbing, Cri tical", reprinted in this issue -- see Table of Contents.] The first answer to your question is "the cooperation of the American press with the American Establi shment ." In vi ew of, say, Agnew's complai nts about the press and TV, or the repeated denunciations of U.S. Vietnamese policy in the New York Times and the WaShington Post (to name only two important publications), or the wide coverage given to "antiwar" (more about this moniker in a minute) protests and the views of McGovern and other Democratic and Republican "antiwar" candidates -- in view of these and like phenomena, I don't think "cooperation" is the lead to pursue. I think it is far more realistic to consider the silence you speak of as part of the unfathomable mystery of what the media (and, by inference, the public) consider newsworthy. This problem cuts across all conceivable ideological lines. Not only U.S. atrocities but also those of the VC, NVA, and the ARVN, are largely ignored. Wars and uprisings in Yemen, Sudan, and Angola, and goodness knows where else, seldom make the pages of newspapers or news magazines. If I want to find out what is going on in these places, as well as in such formerly and potentially (and, for all I know, presently) explosive areas as Tibet, Cuba, Venezuela, Panama, Brazil, Burma, Iraq, Cyprus, Nigeria, the Congo (or whatever it is called ~oday), Indonesia, Southern Rhodesia, etc., I have little recourse but to wait for the next yearbook of the Encyclopedia Britannica or some similar end-of-the-year publication. Nor are international affairs the only area in which these deficiencies exist. The bulk of coverage of medical research, science,and religion seems to be devoted to endless articles on heart transplants, the hazards of smoking, cyclamates, and other food additives, space "spectaculars" (not including weather and communications satellites, let COMPUTERS AND AUTOMATION for July, 1972 alone those for reconnaissance), defections from the priesthood, and loosenings, real or imaginary, of long-standing religious rules. There is some slight hope in that some subjects which were once hardly mentioned have finally attained the status of "good copy": pollution, conservation of natural resources, battered children, unsafe automobiles. But, whether it is from the media misreading public interests, or some fault at the bottom of American society itself, we have a long way to go. o As you suggest, there is a "failure of Americans to be as concerned about Asian civilians ... as they are concerned about drafted American soldiers." This is true of most liberals as well as conservatives. For ~xample, last month I heard a liberal commentator on a national TV news program say smilingly that he did not give a hoot about what happened to the Vietnamese, it was Americans he was concerned about - and calling his conservative counterpart a "bleeding heart" for his concern for the South Vietnamese. There is ethnocentrism in the very terminology applied to this war. Protesters against American involvement in the Vietnam war have been labeled "antiwar" protesters from the very beginning. Yet from public statements it should have been clear that the only facet of the war that most "doves" objected to was U.S. participation therein. Then, too, almost no one on either the Left or the Right objected to Nixon's equating withdrawal of American troops with "winding down the war" and "bringing the war to an end". All of this betrays a deep-rooted insularity. As for solutions, I of course have none. One small step in the right direction, though, might be to run a regular column in your magazine listing "neglected subjects." If there is enough reader interest, the names of the subjects alone should take up quite a bit of space. 3. Escaping Limitations in Thinking and Perceiving Edmund C. Berkeley, Editor Computers and Automation Ever since I was a child loaded with curiosity and a student asking questions that my teachers could not (or would not) answer, I have been wondering about limitations in thinking, knowing, and perceiving. Over and over again I would say to my parents, "Why shouldn't I?" Father often gave me good answers. Mother usually gave me the answer, "Wha t would people think if ... It; that never satisfied me but made me rebellious. I remember Mr. William Francis who taught me college algebra at Phillips Exeter Academy explaining synthetic division to the class; I held up my hand and asked "Sir, if that is synethic division, what would synthetic multiplication be?" He said "That's a good question. Work it out, and bring it in to class tomorrow." (And I did. ) 1. Doesn't evolution operate in thousands of situations, not only the evolution of living species? (Preliminary answer: - Yes, of course; see, for example, the evolution of inventions, the evolution of landscapes, the evolution of a group of people waiting for a bus, etc.) 2. What are the limits to solving problems with computers? (Preliminary answer: - See an article in this issue "Barriers in Applying Computers".) COMPUTERS AND AUTOMATION for July, 1972 3. What are the most important ideas and concepts in communication? (See an enormously interesting book, "Language and Communication", by George A. Miller, published by McGraw-Hill Book Co., New York, N.Y., 1951,298 pp.) 4. Does language prevent you from thinking certain ideas that you could think if you had words more fitted to reality? (See a very interesting book "Language, Thought, and Reality" by Benjamin Lee Whorf, jointly published by Technology Press, Mass. Inst. of Techn., Cambridge, Mass., and John Wiley & Sons, New York, N.Y., 19~6, 278 pp.) How do we escape the "deep rooted insularity" which Nyikos speaks of, and which almost all human beings so clearly suffer from, so that we can find the significant subjects? Here are the steps that it seems to me can be usefully taken 1. See, observe, notice the problem of relative invisibility. 2. Maintain and publish a list of significant subjects, as Nyikos suggests. 3. Look for news, books, and information on these subj ects. 4. Prod various publishers (some of them are looking for material to publish) to publish on one or more of these subjects. 5. Cultivate the discussion of these subjects among one's friends, in letters to the editor, etc. 6. If you can, persuade some prominent person to talk about it - a national leader, a senator, a presidential candidate (not quite as good), a college president (not nearly as good), etc. 7. Never give up. Take the subject of Boolean algebra, for example. Starting in 1934, I used to talk about this subject to friends of mine in actuarial work in the life insurance company home office where I used to work. I even wrote a paper and got it published in 1937 in an actuarial journal, "Boolean Algebra (The Technique for Manipulating AND, OR, NOT and Conditions) and its Applications to Insurance". I knew if I did not put the definition into the title nobody would even be curiou~ enough to find out what I was talking aboutl For six years I talked. I used to describe my progress as "in six years I went from a blank stare to a broad smile". But Boolean algebra is a recognized subject now. It has "arrived" in the design of computer circuits, in the new math, etc. Take the subject of unidentified flying objects (UFOs) for example. To date there have been many thousands of reports of visual observations, probably over 50 photographs, and probably over 1000 radar observations of unidentified flying objects. Many of these reports have clearly been decorated with misinformation, exaggeration, or lies by the reporter. But many_ other reports certainly have not been. One proffered explapation is extra-terrestrial visitors. But what have the establishments done? Not one government, not one national scientific association, that I know of has acted in a scientific way about these reports. Instead, ridicule of the reporters, and attempts to press psychological (please turn to page 35) 31 The Shooting of Presidential Candidate George C. Wallace: A Systems-Analysis Discussion Thomas Stamm 2705 Bainbridge Ave. Bronx, N. Y. 10458 and Edmund C. Berkeley Editor, Computers and Automation o "A systems analysis discussion of . .. the protection of presidential candidates against violent attacks hinges on the study of two systems: the system of pursuit and attack used by the assassination team or individuals; and the system of protection used by the presidential candidate." Outline by Thomas Stamm 1. Questions by Edmund C. Berkeley 2. The Number of Bullets, Guns, and Wounds 3. The Expenses of the Suspect 4. Cui Bono? (Who Profits?) 5. Gun Control 6. The Systematic Protection of Presidential Candida~s by Thomas Stamm: 1. Questions The attempt to kill Governor Wallace in Laurel, Maryland, on May 15, bristles with problems. Let me indicate a few. According to the New York Times accounts, the hand gun used by the would-be assas-sin had a capacity of five bullets. All were fired, at virtually point-blank range, and frontally. Wai-· lace and three other individuals were wounded. Each of the three beside Wallace sustained single wounds. But confusion surrounds the number suffered by Wallace: One bullet, the doctors said, passed through the upper arm and another through the right forearm. One or both of two wounds in the chest are thought to have been possibly caused by bullets that passed through the arm first. Wounds in the right shoulder and left shoulder blade [the times diagram identifies both shoulder blades] were superficial and evidently the bullets causing them did not lOdge in the body. A bullet is lodged against the first lumbar vertebra, just below the ribs, and is presumed to be the cause of the present paralysis inGovernorWallace'slegs (p. 28, col. 3). 32 Four days later, James T. Wooten, leading off the Times "The Week In Review" with a piece on Wallace, did not enumerate all of Wallace's wounds, nor note any inaccuracy in the Times listing of May 17, but referred to "two superficial wounds in his back" and implied yet another wound with the statement, "One bullet was removed from his abdominal cavity ... " By the Times account of May 17 five bullets inflicted ten wounds on four individuals. It is possible, but is it so? If Wallace's abdominal wound is added, the total number of wounds is eleven. And if the back wounds are also added the total may rise to thirteen, which strains credulity. Does the confusion resulting from these discrepant and ambiguous statements derive from usual journalistic imprecision? or is it evidence of something more sinister, hidden from view, and to be dug out? What happened to the bullets? Two lodged in Wallace, none, apparently, in the other victims. One bullet was removed from Wallace's abdominal cavity. Another, at this writing, is soon to be removed from his spinal canal. Where are the bullets'whichcaused his arm, ches t, and superficial shoulder-blade wounds, and/or the superficial back wounds? And the wounds of the other victims? Were other bullets recovered? Also, what should we make of the late discovery by the local police of another hand gun in a wheel well beneath the trunk of the would-be assassin's car several days after the FBI and Secret Service, according to the Times, virtually took the car apart but, it seems, missed the weapon? Is it characteristic incompetence on the part of police agencies or is evidence being manufactured? To what end? Can the second gun have some bearing on the difficulty of explaining how one gun fired five bullets into four persons, causing ten or eleven or thirteen wounds? Is there another explanation? Wallace is a candidate for nomination by the Democratic Party for President of the United States. His attempted murder was a political act which has had and will continue tohave political consequences. What was the motive? COMPUTERS AND AUTOMATION for July, 1972 I found no statement by the would-be assassin, or by any official source. Only the usual irrelevant comment by politicians, journalists, and psychiatrists on the climate of violence in the country and the "senseles s" criminali ty of al iena ted, sexually incompetent loners. Has anyone come across anything meaningful? Is the goverament of Nixon, like the government of Johnson, unable to find motivation for political murder and attempted assassination? Or is it suppressing the motive? 3. The Expenses of the Suspect According to an important summary report by Donald Kneeland, published in the New York Times, May 22, Bremer stopped working at his last job in Milwaukee on February 15. Then he did a lot of traveling, which included a visit to Ottawa, a two night stay in the Waldorf Astoria in New York, trips to Michigan, Maryland, and other places. Then Kneeland writes: How did the former bus boy and janitor, who earned $3016 last year according to a Federal income tax form found in his apartment, support himself during his unemployment, and manage to buy the guns, tape recorder, portable radio with police band, binoculars, and other equipment he was carrying, as well as finance his travels? by Edmund C. Berkeley: 2. The Number of Bullets, Guns, and Wounds A "systems-analysis" discussion of the assassination attempt on Governor Wallace, and the protection of presidential candidates against violent attacks hinges on a study of two systems: - The system of pursuit and attack used by the assassination team or individuals; and - The system of protection used by the presidential candidate. The offense looks for a ~eak link in the protective system. The defense looks for the maximum amount of protection that can be found, constructed, or arranged. Neither system produces a probability of 100% success, but a very great deal can be done that affects probabilities. We will begin with a discussion of the number of bullets, guns, and wounds. The gun which the suspect, Arthur Herman Bremer, used was a Charter Arms, .38-caliber, snub-nosed, five-shot revolver, bought by Bremer for about $80, on January 13, in Milwaukee. "The New York Times" on May 17 showed in a diagram the locations of eight bullet wounds in Governor Wallace. One or two bullets lodged in him. In addition, three other persons were wounded: - Captain E. C. Dothard of the Alabama State Highway Patrol (shot in the abdomen); - U.S. Secret Service Agent Nicholas Zarvos, second in command of the security detail assigned to protect Governor Wallace; (bullet lodged in left jaw); - Wallace campaign worker Mrs. Dora Thompson of Hyattsville, Md. (shot in the leg). • It seems to me rather remarkable that five shots could produce 11 wounds; but there was a dense crowd around the shooting. There has been no report so far of the number of bullets collected and where found. If there were 6 or more, then there would have to be more than one person shooting. Edward Walsh and Bob Woodward of the Washington Post reported in a dispatch published on May 19: Police in Prince George's County, Maryland, yesterday found a 14-shot semi-automatic pistol often used as a military weapon in Bremer's car. The local police discovered the 9mm weapon after the FBI had thoroughly searched Bremer's 1968 Rambler .... There was no explanation of why the FBI, which had searched Bremer's car Tuesday, failed to discover the second weapon. COMPUTERS AND AUTOMATION for July, 1972 Kneeland does not answer the question he raises. But he does suggest that savings accumulated by Bremer in an account with the Mitchell Street Savings Bank in Milwaukee might have provided the funds. The bank refused to give information to the investigating news reporters. Kneeland's report further says: Agents of the Federal Bureau of Investigation, who are also retracing that puzzling path [the path of Bremer over the last year] have told many potential sources not to talk to newsmen. instructions by the FBI are illegal and have no force of law. Furthermore, such instructions are wrong in a democracy, because they prevent the public from knowing what the public has a right to know. It is regrettable that many people take at face value misinformation that they receive from FBI agents. Su~h 4. Cui Bono? (Who Profits?) In any contest where there are many candidates, the elimination of anyone candidate favors all the others. In a presidential contest for votes, the elimination of a conservative "law and order" candidate would tend to favor to great extent other conservative candidates standing for "law and order." According to this reasoning, the candidate who would receive the most benefit from the elimination of Governor George C. Wallace -- especially if Wallace were running as a third party candidate -would be the candidate holding a position closest to Wallace's platform. It is conceivable therefore that a de facto conspiracy interested in supporting another conservative "law and order" candidate would consider that the elimination of Governor Wallace would be beneficial to their intentions. But it is almost inconceivable that such ade facto conspiracy would use such a clumsy and ineffective agent and method as the ones chosen on this occasion. One would expect greater efficiency from a carefully planned conspiracy. The National Commission on the Causes and Prevention of Violence examined over 80 attacks on presi~ dents, congressmen, state governors, and other officeholders and found: In case after case the [study] reveals the attacks were prompted by fanatic allegiance 33 to a political cause or revenge for some petty slight or imagined evil. The thesis most often offered in newspaper reports to date has been Now Arthur Bremer is known This correlates with Bremer's taking out two books from the Milwaukee Public Library on the assassination of Robert F. Kennedy, which were found in his car. 5. Gun Control Another systems aspect that has been much talked about is gun control. The "Wall Street Journal" on May 17 published The first of a series of articles on guns, where people get them, what people do with them, and what people think about them. The yearly toll in the United States from death by guns is over 21,000, or an average of 57 a day. The article was unusual and interesting, becauseit named 12 persons who died from gun shots in the 24 hours from noon May 15 to noon May 16, and told a little about each person -- so as to give a sampling of what the statistics mean. Unfortunately, the article made no comparison with other countries, where the death rate from guns is less than a hundredth of the death rate in the United States. The use of guns in the United States is pretty much dictated by the "gun lobby" led by the National Rifle Association with a million members. It consists of an alliance of hunters, target shooters, and gun manufacturers. Its vote-getting ability recently was a major element in retiring former Senator Tydings of Maryland, who had spoken out in favor of much more extensive gun control. Governor Wallace's own remarks (before he was shot) express an important point of view: Restrictive gun legislation ~herever it might be -- at the national level or the state level -- really in the long run restricts the law-abiding citizen who owns a gun. But the law violator doesn't pay attention to any law whether it is gun control or any other law ... If I were convinced that gun control legislation would control crime in this country and would stop the high homicide rate and crimes of passion, and the other planned crimes, I would be for it ... But we know that it is not going to do that. This false liberalism that in the last decade or so has brought about such legislation as gun controls at the national level and the state levels in many states is the same liberalism that has brought heroin addiction in the streets ... [If restrictive gun legislation came about] it would arm completely the outlaws, and that's no way to reduce crime. From the point of view of a useful, systemsanalysis action now, to protect presidential candidates in this 1972 election, any gun control legislation is completely unrealistic. Even if "gun control" could be enacted widely before November 1972, the enormous supply of probably more than two million guns at present in the posses34 sion of individuals allover the country would not dry up. So, it is a futility, a waste of breath, to talk about gun control. Instead, systematic protection of candidates against guns and against efforts to assassinate them is an important factor to be considered. 6. The Systematic Protection of Presidential Candidates In regard to the defense of a presidential candidate against attempts to assassinate him, there are a number of procedures (belonging to common sense, wisdom, safety engineering, systems analysis, and general strategy), that can be adopted quite easily. 1. Ambush. What an assassination team or individual needs most is reliable information ahead of time as to where the candidate will be. Once they or he knows that, a place for the ambush can be chosen deliberately and plans can be implemented. 2. Travel Information and Itinerary. The candidate should therefore make systematic efforts to prevent the preparation of ambush. He should announce he will travel by one route but when the time comes he should use another. His staff should say he will leave the speaking hall by one route, but when the time comes, he should use another. Etc. In the assassination of Senator Robert Kennedy, Sirhan B. Sirhan waiting in the hotel pantry repeatedly inquired "Is he coming out this way?" 3. Private Plane Travel. ever be used repeatedly. No private plane should In the case of Walter Reuther, auto union leader who died in an airplane crash in Michigan in May 1970, there was an official report many months later that the altimeter in his rented plane had been put together defectively, so that it read a higher altitude than the real altitude. Reuther threw away many opportunities for protection by systematically using the same privately rented plane to fly from Detroit to the UAW vacation resort on weekends. 4. Bulletproof Shield when talking. When the candidate talks before an aUdience, he should use a bullet proof shield. Wallace probably would have been shot and perhaps killed by Bremer from his seat in the audience if there had not been the bulletproof transparent plastic shield around Wallace's podium. . 5. Bulletproof Vest. On occasions when planned shooting might occur, the candidate should wear a bulletproof vest, such as policemen in anticipated shoot-outs wear. Wallace probably would not now have paralyzed legs, if he had been wearing a bulletproof vest. 6. Shaking Hands. Whenever a group of people want to shake hands with a candidate, on an occasion which is not absolutely spontaneous (as for example when the candidate suddenly chooses to stop his car at Pennsylvania Ave. and 12 St.), they should be invi ted to form into a single line, and the line should be checked by the same kind of metal detectors that some airlines have installed to detect hijackers. It would be easy to explain this arrangement to supporters of the candidate, in the same way as many airline passengers are reassured by the checking, by accomplished metal detectors as they walk into their COMPUTERS AND AUTOMATION for July, 1972 plane, for it reduces their fears that their plane may be hij acked. 7. Secret Service Guards. The Secret Service guards assigned to presidential candidates certainly do some good. But they did not do Wallace any good on May 15. They are far from being enough. Why were they so incompetent? 8. Distraction. The greatest advantage that an assassin can have is distraction. It is truly remarkable how much one can accomplish by distraction: you focus people's attention on one thing, and then you suddenly do something else. To prevent the use of the technique of distraction, one or two trustworthy guards should be continually assigned to pay no attention to the number one thing going on but to watch for the number two thing that may start to happen. Bremer is supposed to have engaged in distraction. The "New York Times" on May 16 reported: "Hey George, Hey George! Come over here: Come over here:", the man shouted insistently according to several witnesses. 9. Systems Analysis and Information Engineering. The entire system of the protection of a presidential candidate against assassination (or violent attack) should be studied by a competent group of trustworthy assistants to the candidate, and sensible procedures adopted, wi th the benefi t of modern technology. And the fas ter and the sooner, the bet ter. The United States cannot afford to lose presidential candidates or presidents, to violent illegal attacks, or elimination, or liquidation, or death.[] Nyikos - continued from page 31 interpretations upon the public have been made. subject of UFOs has not "arrived". The What is the nature of the obstacles to recognizing significant subjects that are unrecognized? - Failure to understand and apply the scientific method; - The preference for simple explanations over more complicated ones; - Ignorance; - Prejudice and bias; - Contentment with a narrow point of view; - Authoritarianism: "What ... says is good enough for me"; - The desire of establishments to mold public opinion; - The desire of many people to have their thinking done for them because it is easier that way; - The desire of advertisers to have people listen to commercial advertising; - The desire of experts to have a monopoly of expertise; - The addling of people's minds by a great deal of TV, radio, and newspapers; - The moral failure of being exhausted after putting out a certain amount of moral indignation; etc. The list is a long one. Unsettling, Disturbing, Critical Computers and Automation, established 1951 and therefore the oldest magazine in the field of computers and data processing, believes that the profession of information engineer includes not only competence in handling information using computers and other means. but also a broad responsibility. in a professional and engineering sense, for: The reliability and social significance of pertinent input data; The social value and truth of the output results. • In the same way, a bridge engineer takes a professional responsibility for the reliability and significance of the data he uses, and the safety and efficiency of the bridge he builds, for human beings to risk their lives on. Accordingly, Computers and Automation publishes from time to time articles and other informatjon related to socially useful input and output of data systems in a broad sense. To this end we seek to publish what is unsettling, disturbing, critical -- but productive of thought and an improved and safer" house" for all humani ty. an earth in whi ch our children ~nd later generations may have a future, instead of facing extinction. The professional information engineer needs to relate his engineering to the most important and most serious problems in the world tOday: war, nuclear weapons, pollution, the population explos{on, and many more. . COMPUTERS AND AUTOMATION for July, 1972 Knowing the nature of the obstacles, information engineers should find it easier to deal with them. 4. Significant Subjects that are Inadequately Covered Proposed List Genocide in Vietnam, Laos, Cambodia Genocide in the past in: Turkey; Armenia; Indonesia; Germany; Romans vs. Carthaginians in Carthage; Americans vs. Indians and Negroes in the U.S.; etc. . Genocide, causes of Wars and/or uprisings in: Tibet; Cuba; Venezuela; Panama; Brazil; Burma; Thailand; Iraq; Cyprus; Nigeria; Congo; Indonesia; Southern Rhodesia; Philippines; South Africa; Haiti; Uruguay; Guatemala Disarmament, inspection for Population explosion, different limits in different countries United Nations, more accomplishments by Man in perspective Civilization,.nature of, vs. the "American Way" 0 35 Computer-Field Information vs. Social Rag I. From: Arthur Martin, President Computer Covenant Corp. 1156 East Ridgewood Ave. Ridgewood, N.J. 07451 To: Computers and Automation May 18, 1972 I read your subscription renewal letter with interest. We have been a subscriber to C~A for a number of years, but do not plan to renew. The reason is quite simple -- your magazine does not provide what you say it does. or at least not according to priori ties of design, applications', and implications of information processing. At one time we looked to G&A to supply application design techniques, but the magazine has turned into a social rag. We are not questioning your editor's politics, but only saying that if you portray that you are in the computer information business, why not produce it? II. From: Edmund C. Berkeley Editor, Computers and Automation May 23, 1972 Your letter has been referred to me. First, thank you for expressing plainly and directly your point of view, and for signing your letter. Many letters like yours come to us unsigned, and with no address -- and so we do not know how to reply to the writer. I enclose copies of the tables of contents of the April and of the May issues of G&A. There are six standard computer-field articles in the April issue, and four standard, computer-field articles in the May issue, and in both issues additional standard, computer-field items of information. Now it is quite possible (and indeed normal) for a reader to simply pass over and pay no attention t9 any parts of a newspaper or magazine he is not interested in. Thus some readers pass over the real estate pages in a Sunday newspaper because they have absolutely no interest in real estate. But these readers do not write to the Sunday paper and say, "If you continue to publish real estate ~nformation, I won't continue to buy your Sunday paper." Could you please tell me how the collection of computer-field articles and items in the April and May issues fall short of giving you a good monthly bill of fare in the computer field? I'd like to know. We are trying our best to publish in each month interesting and important articles in the computer field, to the same degree as in the past -- no matter how much we fill up the pages that used to be advertising pages with matter related to "the pursuit of truth in input, output, and processing". If you would prefer to telephone me instead of writing, would you please call me station-to-station collect; and if I am not in, the call will not be accepted. III. Note: Up to our going-to-press date June 10, no reply from Mr. Martin had been received. 36 ~ """,", _-"'" ..•. ' , l ~ ~~:~~;/~~@~\f%::?>:::' . Ba Toi COMPUTERS AND AUTOMATION for July, 1972 PACIFICATION: The Story of Ba Toi American Friends Service Committee 48 Inman Street Cambridge, Mass. 02139 Ba Toi's mother, Ph am Thi Toi, was 24 when American troops visited her village of My Lai. Her family was woiking near their hut when the Americans took them away from the village. Later the remains of Ba Toi's mother, old uncle, oldest brother and sister, and two younger boys were found in a pile of bodies. Ba Toi and her ~ister had not been near the hut when the soldiers arrived. They ran and hid and survived. tired." She said, "I'm tired of war and being hurt. I'm tired of death. Please give me something to sleep." After another operation on her stump, Ba Toi lay in the province hospital for two days. She lay nude, a heavy blanket thrown over her mid-section, her breasts and three remaining stumps lying bare. She was hitched up to an intravenous bottle, but the nurses at the desk didn't notice when it stopped runing. On the night of the second day, she died. None of the survivors of the massacre were allowed to return to their village. They were rounded up by the South Vietnamese government and ordered to build a fence around an American outpost. Though the people protested that the site chosen for the camp was heavily mined. the American and ARVN soldiers forced them to go ahead with the work of gathering bamboo for the fence and driving stakes into the ground. The same day, two A37 subsonic jets flew from Danang and dropped bombs on the refugee camps near My Lai. The death and destruction resulting from United States intervention in Indochina has far exceeded the most pessimistic predictions. In response to the devastation the American Friends Service Committee has committed itself deeply to efforts to end the war in Indochina and to relieve its victims. The story of Ba Toi was taken from reports written by staff members of the Quaker Rehabilitation Center in Quang Ngai. Ba Toi was bending over picking up bamboo when she triggered a mine that blew off both her legs. Both her arms were badly damaged as well and had to be amputated at the province hospital. Ba Toi remained in the province hospital for several months, and then began to receive treatment at a Quaker rehabi Ii tation center on the hospi tal grounds. There she had another operation on her stumps and was fitted with artificial legs and arms. One of the arms had a hook that could be manipulated like fingers, and the other had a plastic hand that could 'carry objects. Ba Toi made a great effort to master her artificial legs and arms, and by the time she left the rehabilitation center she was able to walk quite well and was very proud of her achievement. When she left the center, the Quakers also gave Ba Toi a small amount of money -- the equivalent of ten American dollars -- to buy what she would need to start a small concession. • Ba Toi returned to the refugee camp where the survivors of My Lai were being kept. She and her sister built a small lean-to which became their home and shop. They soon began to earn a little money, selling canned milk, tobacco and cooking supplies to their neighbors in the refugee compound. They did not make enough, however, to buy all the rice they needed. Last April. the NLF began to advance rapidly down the road toward My Lai, burning the refugee camps and telling the people to return to their villages. During the fighting ARVN troops lobbed American shells into Ba Toi's camp. One of the shells landed in Ba Toi' s hut. Her sister was killed, and shrapnel hit Ba Toi in the stomach. As she struggled to put on her legs and get into the bunker, she was caught in a cross fire, and a bullet penetrated the stump of one of her arms. It was several hours before a friend could get Ba Toi to the province,hospital. She didn't complain of pain but repeated that she was "tired, very COMPUTERS AND AUTOMATION for July, 1972 Present American policy means ation of the war in Indochina -the massive automated bombing of Toi and her family, few American silent consent. indefinite continuwar which features civilians like Ba casualties, and our You can use your voice to help stop that war now. Let the Congress and President know where you stand. Demand that Congress reassert its constitutional authority in regard to war, peace, and national priorities. Take what direct action you can in opposition to the war. If you need more information on American involvement in the war, fill out the attached coupon and mail it to us. Ba Toi is dead. How many more Ba Tois will there be? Can we -- will we -- work for life? I I -(may be copied on any piece of paper)American Friends Service Commi ttee 48 Inman St., Cambridge, Mass. 02139 I was interested in the story "PACIFICATION: The Story of Ba Toi" publi shed in the July 1972 issue of Computers and Automation Please send me the paper INDOCHINA 1972: PERPETUAL WAR Enclosed is a check to support the peace work of the AFSC. Name ________________________________________ Address _____________________________________ Ci ty _ _ _ _ _ _ _State _ _ _ _Zi p_ _ __ 37 Unhappy Subscriber to Satisfied One I. From: John Kaler 1610 Richvale Lane Houston, Texas 77058 February 6. 1972 About 3 months ago you wrote me stating that my subscription to Computers and Automation had lapsed. I replied that I had sent you a check for a year's subscription in May 1971 so my subscription must be good at least until the renewal date in 1972. With the letter I enclosed a photostat of the cancelled check. I stated that perhaps the error was due to the processing of a change of address for me last summer when I moved from 330 Arrowhead Blvd .• Apt. 34-0. Atlanta. Georgia. 30236. to the address shown above. My subscription has still not been reinstated and I would appreciate your immediate attention to this matter. For your reference. the numbers shown on my address label were 4877058 KALE161J80 06117105. When the reinstatement is accomplished would you please extend it to whatever point is necessary so that I will receive 12 i~sues of the magazine as a result of the last renewal. II. From: Edmund C. Berkeley Editor, Computers and Automation May 17. 1972 This is a checkup on the matters referred to in your letter of February 6 to us in regard to your subscription to "Computers and Automation" and your nonreceipt of it. You appear not to be on our roll of subscribers at this time receiving copies regularly. as I believe you should be. and I want to make sure that you are put on. If you will let me know which issues you think you should have received. and do not have. I will gladly send those issues to you from this office. Also. would you be kind enough to send us again a photostat of your cancelled check? (I enclose $1 on account of your expenses in dealing with us.) We want all our subscribers to be happy and satisfied. I enclose a business reply envelope marked "Personal" so that I shall be sure to see your reply when it comes. I regret very much that we have not treated you in the red carpet way in which we like to treat our subscribers. III. From: John Kaler May 20. 1972 I do not know exactly which issues I did not receive. I wrote to you first about this matter on 11/1/71 and had not received any issues for several months prior to that time. I think it is safe to assume that the July or August issue was the last one that I received. Rather than get copies of the back issues I would much prefer to go back as a current subscriber and get the next 9 or 10 issues. if this is possible. I have always enjoyed your magazine very much and have especially enjoyed the change in editorial emphasis that has taken place over the past several years. I am enclosing a check for $10.00 and would like you to use it for current expenses in publishing your magazine or for any other purposes that you might feel to be appropriate. IV. From: the Editor June 19. 1972 Thank you very much for you~ letter of May 20. the copy of your check of May 1971. and your current check for $10. Your kind remarks and your contribution to us (and to what we are working for) overwhelm me. Thank youl Separately I am sending you the June issue which came out on June 13. and which you may not hpve received in the regular course. I have not yet received the June galley for checking to make sure that you are included. We are reentering your subscription currently to run from June 1972 to May 1973. Although you suggest that you do not need the back issues. I believe that they may be of sufficient interest to you to be worth scanning the table of contents; so I am also sending you the back issues July 1971 to May 1972; if they are not useful. you may return them to us at our expense (we will refund your postage). I am truly glad that you say: I have always enjoyed your magazine very much. and have especially enjoyed the change in emphasis that has taken place over the past several years. As you know. I believe it is more than time for computer professionals to lift their sights to the broad horizon and prepare to become "information engineers". socially responsible human beings wi th professional competence in dealing with information and wi th truth. 0 CORRECTION In the May 1972 issue of Computers and Automation, the name of the author of "Effective Management of an Instrument Pool" was printed incorrectly in several places: Please replace liD. H. Townsend" by liD. R. Townsend" on the cover page, page 4, and page 8. We regret the error. As you requested in your letter dated 5/17/72 I am sending along a photostat of the check which I sent you in 1971 for a renewal subscription. I am also sending along a copy of my address as it appeared on your records at time of lapse. 38 COMPUTERS AND AUTOMATION for July, 1972 These six people have helped set the stage for an outstanding ACM 72. The stage is set for ACM 72, our Silver Anniversary Conference to be held at the Sheraton Boston August 14-16. These six committee chairmen have helped make sure it will be the most complete program ever presented at an ACM annual conference. With Boston the background for the entire performance! Besides complete, innovative technical and commercial programs, there will be a number of special events, including the ACM Silver Anniversary evening and awards presentations. Plus cultural, historic and computing tours of the Boston area-and other summertime activities. Plan to be at ACM 72. If you are not an ACM member, convert part of your admission fee to annual dues and save $25. If you're a data processing executive, send some of your people and urge them to join ACM. With Boston the backdrop. Technical Program Sessions 1 Featu re Session: Current Research in Computer Science. 2 Debates: The GOTO Controversy and English as a Query Language. 15 Papers/Panel Discussions: Topics from Advances in Microprogramming to Privacy and Protection in Operating Systems. 18 Paper Sessions: Topics from Artificial Intelligence to Simulation Tools. 6 Tutorials: Leading Edge Areas in Artificial Intell igence. What is a Data Base? Generation of Automatic Logic Test Data. Microprogramming and Emulation. Formal Definition of Programming Languages. Social Science Computing: Tools for Policy Making and Education. 2 Workshops: Exploring the Issues in Data Base Technology. Computer-Aided Graphics in Architecture and Planning. Commercial Program 2 Panels: Venture Capital. Presidents' Panel. 11 Sales-oriented Presentations: Computer Software-The State of the Art (vendor presentations on the latest in software products). Photo: from left to right. Ken Scott, Printing and Mailing. John Donovan, Technical Program. Rosemary Shields, Technical Program. Jack Crowley, Commercial Program. Jeff DeVeber, Special Events. Jim Donohue, Local Arrangements. Association for Computing Machinery ACROSS THE EDITOR'S DESK Computing and Data Processing Newsletter Table of Contents APPLICATIONS Gravity Effects Studied Under Computer-Controlled Experiments Computer Helps Analyze Worldwide Political Behavior Cashless-Society Project Reports Progress in N.Y. Computer Increasing Criminal Arrests by 10 Per Cent 40 40 41 42 APPLICATIONS GRAVITY EFFECTS STUDIED UNDER COMPUTER-CONTROLLED EXPER IMENTS Wenner-Gren Research Laboratory University of Kentucky Limestone & Euclid Lexington, Ky. 40506 Monkeys are riding thousands of miles around and around a large laboratory at the University of Kentucky as researchers try to learn more about the effects of gravity. Computer-controlled experiments involving a 50foot radius centrifuge have two aims, according to Prof. James F. Lafferty of the Wenner-Gren Research Laboratory: "First, we are trying to determine what effects increased gravity has on an organism'; behavior; and, coincidentally with those studies, we are trying to determine the effects upon an organism's health." A single IBM 1800 data acquisition and control system runs each experimental effort on a large' rotating centrifuge. As its speed increases, the centrifuge creates conditions of increased gravitational pullan the capsule and experimental subject riding in it. "We have found that rats can feel very small changes in gravity -- as little as a tenth of a G -- and some monkeys are quite sensitive to changes, too," Prof. Lafferty said. Designing a series of experiments to learn how much a monkey will do to avoid higher and higher levels of gravity pull, the research team has programmed the computer to increase the centrifuge speed until the monkey activates a lever inside his capsule. Tripping the lever notifies the computer to reduce speed for 20 seconds. If the lever is tripped again, speed is further reduced for a 20second period. As the monkey experiences less and less gravi ty, he may .ignore the lever for 20 seconds or more. Then, speed picks up again until he notices increased gravi ty and again activates the lever. Miss Sandra Beaver, a research assistant trained in pSYChology, noted, "We give the monkeys no training. They learn by trial and error to activate the lever if they want to reduce gravity. Now we are running from 1.05 to 2.05 G's to insure no physical harm comes to the animals. Each is examined on a 40 EDUCATION NEWS Helping Out Dental School Explores Computer-Aided Instruction Canadian Colleges and High Schools Are Members of Dartmouth's Time-Sharing Computer Network 42 43 43 regular basis to determine what effects, if any, the increased G'S have on health." As the experiments continue, massive amounts of data are gathered by the IB~ system. At the conclusion of each run, it prints ~ummary statistics, including the average gravitational force on the monkey during the hour-long runs, his response time at various levels of gravity and other analytic values. "We will be correlating a wide variety of data later," ~Iiss Beaver said, "to determine wi th precision how well the animals detect gravity changes and how much they will do to avoid high levels of gravity." Some hints on the effects of weightlessness, the opposite of increased gravity, may result from the studies, too, Prof. Lafferty said. "As longer and deeper space missions evolve, we hope to know in advance what weightlessness will do to man's health and behavior," he said. "Artificial gravity may have to be designed into space vehicle engineering to assure astronaut safety and ability to perform tasks." COMPUTER HELPS ANALYZE WORLDWIDE POLITICAL BEHAVIOR University of Southern California University Park Los Angeles, Calif. 90007 Dr. Charles A. McClelland, an inventive political scientist at the University of Southern California, believes computer analysis can help experts anticipate future trouble spots in the complex realm of international political behavior. He uses a computer in USC's computing center to compile a historical file of relations between countries. lie can illustrate this interplay with computer-generated graphs showing the ups and downs of political life between any of 169 nations around the world more than 25,000 pairs of countries in all. Now in its fifth year, the federally funded project is built on thousands of facts culled from the Los Angeles Times, London Times and New York Times. The studies are being carried on in the international relations department's research institute, which Dr. McClelland directs. "We're able to reconstruct a simplified record of what has happened in a certain international situation, compare it with today's events and draw some COMPUTERS AND AUTOMATION for July, 1972 conclusions about the possible resul t," he said. "\lie want to try to find out if the big, eyeball-to-eyeball confrontations so common today have any predictable pattern." One of Dr. McClelland's biggest tasks is in keeping up with his data. Each item from the three source newspapers dealing with international affairs is clipped, and a coded version goes onto a punched card and is stored in the computer. A single day's crop may exceed one hundred articles. "We clip every item that crosses a national boundary," he explained. "As long as it in some way relates to the dealings between two countries, we include it in our model." The coding system is simple, quick and understandable. "First we assigned each nation a permanent code number," he said. "Then we established 63 categories of international political activity, from the mildest sort of action to outright war. "Number 013, for instance, records a nation's admission of guilt, an apology to another nation or verbal retreat. From there we go through comments, praise, promises and assurances, expressions of regret, diplomatic recognition, giving economic aid, giving military aid, agreements and proposals." After that the mood changes. The next category is rejection -- of a treaty offer, for instance. Then come such increasingly offensive actions as charges, denunciations, complaints, protests, demands, threats, demonstrations, armed displays, cancellation of treaties or aid, breaking off of diplomatic relations, expulsion of envoys, detentions and arrests, non-military injury or destruction and finally military force. "Thus when Denmark recently announced that it planned formal recognition of the new nation of Bangladesh, the item was coded 390-025-765 on the IBM card," Dr. McClelland said. "The 390 is Denmark's permanent number, the 025 reflects a statement of policy and 765 represents Bangladesh." When Denmark formally recognizes the new Asian nation, the action will be coded 390-064-765, the 064 denoting diplomatic recogni tion. "At any time, then, we can get back from the computer a complete listing of all the goings-on between any two countries," Dr. McClelland said. "And when we direct the IBM system to plot out the results in graph form, we can see both the number of transactions between these countries and the seriousness of those actions." The USC professor feels automated systems such as his offer a new perspective on the world situation. "It seems apparent that patterns of international conduct can be boiled down and sorted out by computer," he said. "For instance, we can expect to discover that a certain nation always makes threats before it strikes, always says things in the same kind of language. Once such a pattern is established, we could be better able to figure out in advance what's likely to happen in a particular world trouble spot -- or pinpoint such a trouble spot before the si tuation gets totally out of hand." similar project is being tested at the U.S. Naval Post-Graduate School in Monterey, Calif., and a system modeled after USC's was begun in January at the U.S. Naval Academy. CASHLESS-SOCIETY PROJECT REPORTS PROGRESS IN N.Y. Digimatics Inc. TOOO Franklin Avenue Garden City, N. Y. 11530 Today, in the Long Island community of Syosset, the nation's first fully automated point-of-sale funds transfer system is replacing cash, checks and credit cards in hundreds of retail transactions. The system, called "Instant Transaction" (IT), was developed over a three year period by Digimatics, Inc. for the Hemps tead Bank to overcome certain limitations that exist in the present payment system, such as fraud and a constantly increasing volume of paper processing. First units were installed at 32 retail establishments. Consisting of an optical card reader, standard 12 button touch-tone keyboard and a printer, each point-of-sale terminal can not only complete a transaction in 30 seconds but requires no technically trained personnel for its operation. IT was designed to be independent of the subscriber's accounting system. Thus, any subscriber can utilize IT by merely issuing cards meeting the specifications of machine readability; forwarding cardholder balance files in a fixed format to the host computer; and accepting transaction files from the host computer in a fixed format. At the start of each business day, the bank forwards a file containing the account number and "available funds" (any combination of balances or credit lines defined by the bank) for each of its cardholders to the computer. During the day, the computer continuously updates the cardholder's available funds as his transactions are processed and simultaneously makes two records of the transaction -- one to debit the cardholder's account and the other to credit the participating merchant. This data is then posted by the bank at the close of business. The number bedded is not IT identification card contains an account and a secret code. The code, which is emin the ~ard, is of a proprietary nature. It detectable by x-rays, ultraviolet light, etc. Dr. McClelland emphasized that the goal of the research is to perfect the system of computer procedures that facili tates the analysis of patterns in international events. "Government information sources that, in some cases, may be many times more detailed than the available newspaper facts ultimately can be used in the system," he said. The computer is an IBM System/370 Model 155. Upon activation of the terminal, the sales clerk inserts a multi-part sales slip which is locked in the printer. The customer then enters his secret code in the verifier board. If a valid code comparison is made, the computer signals that it is ready to receive transaction data and the clerk enters the amount of the transaction. If there are sufficient funds in the customer's account and a verification "go" signal was received,the customer's and merchant's accounts are updated by the transaction amount, a transaction record is generated and stored on both magnetic tape and disk, and a valid transaction message is formatted and transmitted back to the terminal. This message includes the date, customer's account number, merchant's account number, transaction code and the amount of the transaction. Though the system is still being developed, it already has attracted attention from the Navy. A At this point, the system shuts itself off releasing the sales slip, one copy of which is given COMPUTERS AND AUTOMATION for July, 1972 41 to the customer as his receipt and the other is retained by the sales clerk as a permanent record of the transaction. According to Digimatics president E. Paul Leedom, the IT system is not a new type of credit card but a new means through which the consumer can have access to whatever funds the card issuer makes available to him. These funds might consist of checking or savings account balances or various lines of credit. Although only the Hempstead Bank is presently on the IT system, the established procedures would apply to future subscribers, such as other banks and credit card issuers, without major modification. The computer also produces special reports on request. These can include, for example, reports on the type of businesses most frequently burglarized during ihe su~mer monihs, the correlation between strong-arm robberies and week of the month, type of item most often stolen from cars during the past two months, or any of hundreds of other combinations of crime factors. For more information contact Beryl O'Donovan. EDUCATION NEWS HELPING OUT COMPUTER INCREASING CRIMINAL ARRESTS BY 10 PER CENT RCA Government and Commercial Systems Moorestown, N.J. 08057 A computer normally used for scientific purposes has been credi ted by. police authori ties wi th increasing criminal arrests by 10 per cent in Camden, N.J. Located at the RCA Advanced Technology Laboratories in Camden, the computer makes it possible to deploy police forces more effectively by providing a weekly analysis of the location, day of week and hour that crimes are most likely to occur. "Computer runoffs, which are easy to interpret, make it possible to concentrate police efforts in predicted high-crime areas during hours when crimes are most likely to occur;" according to Joseph Benton, who heads the crime-fighting computer program for the police. The computer is particularly valuable in deploying Camden's 27-man Tactical Force, a group which has no permanent assignment, but reinforces regular patrols in locations forecast by the computer as trouble spots. Recently, for example, the computer data indicated a high rate of larceny from automobiles was occurring in the vicinity of Rutgers University. Officers dispatched to the area placed notes on windshields of parked cars, asking drivers to help prevent thefts by keeping doors locked. The result was a drop of more than 95 per cent in larcenies from vehicles during the forecasted period. Western Electric Company, Inc. 195 Broadway New York, N. Y. 10007 For better or no, the young Huck Finns of yesterday are gone. In today's frenetic society there is precious little time for loafing by the riverbank; youth are quickly caught up in a technological, computer-oriented society that promises the moon but demands early dedication to one of a diversity of specialized fields. Western Electric people are helping young people make a sound choice. On their own time, with skills honed through experience and with a desire to use these skills in social settings, Western Electric employees around the country are volunteering to help the next generation cope with a frighteningly complex world. Chauncey Herring, Jr. is a good example. Chauncey Herring is a Western Electric engineer at the company's Princeton, N.J. Research Center. Since last October, he and a dozen Trenton, N.J. junior and senior high school students have been meeting each Tuesday and Thursday night at the "Y" for exercises in basic computer logic and programming. It's part of a computer education program designed, organized and taught by Chauncey for the Central Branch of the Trenton YMCA. The program is aimed at students interested in possible careers with computers, and includes everything from computer numbering systems through programming logic. And it's not all book learning either. The weekly analysis produced by the computer is based on information programmed into it on offenses that occurred during the previous two weeks. Evidence on each crime is broken down according to location, time, day of week, item stolen, mode of operation and details on the victim and perpetrator. When he sold the YMCA Youth Director on the course idea last fall, Chauncey also arranged to borrow a mini-computer from the Princeton Junior Museum to give the students actual experience with programming and de-bugging. The class is a long time dream come true for Chauncey. He's been searching for some time for a way to work with kids in an educational setting. A recent profile on purse snatching, for example, specified nine of the 43 sectors of Camden in which they were predicted to occur, with the highest rate on Thursday and Friday, between the hours of noon and 4: 00 p. m., and currency as the prime target. Victims were listed as females, 30 years of age and upward, with attacks occurring chiefly at bus stops. The perpetrators generally were described as being under 18 years of age, ranging in height· from 5 feet 6 inches to 6 feet, and weighing between 121 and 140 pounds. "It's amazing what kids can absorb, if you just present it right," he said. "I remember when we first started. I told them we'd be covering things like Boolean Algebra and Hexidecimal numbers and you could just see the fright in their faces. But I didn't do anything about it right away. I just started teaching the basics at a level they could understand. After a couple of weeks I announced that we weren't going to cover Boolean Algebra after all. Then I told them we'd just finished it." Each seven-day profile run off by the computer is first reviewed by police District Commanders who inform their men on the forecasts, he pointed out. Chauncey has two main goals for the class: first, to give each class member enough of the basics of computer logic and programm~ng to enable him to go on to further development, either 42 COMPUTERS AND AUTOMATION for July, 1972 also have CAl segments ranging from a review of anatomy to 16 problem situations involving simulated patients, their symptoms and histories. "Our effort is not directed at replacing teachers. There is no substitute for personal teaching and learning. However, because of our increased emphasis on service to the student in a period of manpower shortages and rising costs, we see CAl as one means of varying the rate at which students complete their dental educations." In a typical student-computer interchange, dental students communicate with an IBM System/360 Model 65 in the university's computing center by means of a typewriter-like terminal. The student signs on with his assigned computer number and begins the program he has chosen. The computer states information about a patient or dental problem and then asks the student a question. The computer analyzes the student's answer, telling him if he was right or guiding him to the right answer if he was wrong. It might suggest that he consult slides projected alongside the terminal. At the end of each session, the computer tells the student his total score. "The immediate feedback which is a part of CAl is what makes it such a good teaching device," said Prof. Smith. "The student knows right away whether his answer is right or wrong and why. This way he can remember the material better, a fact which has been proved in many educational studies." with a job or more education; and second, to see the class become self-sustaining, with old-timers teaching the basics to newcomers. In the first area, he reported that one of his students has already found a computer trainee job for the summer and plans to enroll as a computer science major in college this fall. To help the class become self-sustaining, Chauncey periodically reviews recent study material by asking the students to run the class and to present the material to each other. "That way we get a good idea of how well they understand it and can present it to someone else. When we bring in new kids for the next class, it'll be a lot easier to get to them with another student who's been through the same program and speaks the same language." DENTAL SCHOOL EXPLORES COMPUTER-AIDED INSTRUCTION University of Kentucky Limestone & Euclid Lexington, Ky. 40506 Dental students at the University of Kentucky "talk" wi th a computer as part of a' program to speed them through their studies. Dedicated to a flexible curriculum that will permit brighter students to complete coursework in less than four years, the College of 'Dentistry is studying how best to use computer-assisted instruction (CAl). Four courses involve CAl -- oral pathology is taught entirely by CAl, with all third-year Oral Pathology students receiving facts and questions from a typewriter-like IBM 2741 communications terminal and a slide viewer alongside. Dental practice environment, oral anatomy and endodontic technique COMPUTERS AND AUTOMATION for July, 1972 CANADIAN COLLEGES AND HIGH SCHOOLS ARE MEMBERS OF DARTMOUTH'S TIME-SHARING COMPUTER NETWORK Dartmouth College Office of Information Services 302 Crosby Hall Hanover, N.H. 03755 Twelve Canadian colleges and high schools are now members of the Kiewit Educational Time-Sharing Computer Network operated by Dartmouth College. The Canadian institutions join some 50 other colleges and high schools in the United States who regularly use the Dartmouth Time-Sharing System (DTSS). According to officials of the Kiewit Computation Center, the Canadian institutions logged 860 hours of computer terminal time, 11,313 seconds of 'computer processing time, and stored 128,000 words in memory during the month of March. The DTSS system, which can handle 160 simultaneous users, and the widely used computer language BASIC, a combination of English and high school algebra, were developed in the early 1960s by a team of Dartmouth undergraduates and Dartmouth President John G. Kemeny and Mathematics Professor Thomas E. Kurtz, director of Kiewit. The Kiewit Educational Network was extended into Canada in 1971 under an agreement with the firm of Joseph and Chambers, Ltd., of Montreal, sole Canadian representatives of DTSS in that country. In addition to the Canadian network, Dartmouth provides time-sharing computer services for its 3,800 undergraduate and graduate students and 500 faculty members; some 10,000 students at schools in seven eastern states; a private foundation and a major hospital in New York City; and a number of commercial firms. 43 NEW CONTRACTS Univac Division of Sperry Rand France, Blue Bell, Pa, French National Railway Co. (SNCF), Paris, France Computer Terminal Corp., San Antonio, Texas Codex Corp., Newton, Mass. North American Corp., New York, N.Y. Defense Communications Agency UNIVAC 1110 systems (3) for direct message switching in national network to expedite freight car control, keep track of equipment maintenance, prepare train schedules, traffic flow surveys , and compiling statistics Purchase of C.T.'s Datapoint equipment $12 million Data com~unications equipment and related services for The Fefense Communications $7.5 million (approximate) $13 million (approximate) _______________________~s~y~s~t~e~m~s~H~i~g~h~S~p~e~e~d~C~hannel~P~a~c~k~i~n~g~S~u~b~s~y~s~t~e~m~~~~~~77----Model DS-8430 disk storage systems to re$3.15 million place Fastrand drum storage systems and add storage capaci ty to Univac computers at four Naval data processing centers Honeywell, Inc., Tampa, U.S. Air Force Oklahoma City Nine AN/UCC-4 multiplexer systems each $2.7 million =F~I~a~.__~~__~__________________~A~i~r_j~Ma~t~e~r~l~·a~I~A~r~e~a~,~O~k~l~a~.~·________~f~o~r~a ~ific military communications site Control Data Corp., Washington Metropolitan Area Designing automatic fare collection system $2.5 million Minneapolis, Minn. Transi t Authority (WMATA), for 98-mlle subway system being-constructed Washington, D.C. in D.C. and adjacent areas in Md. and Va.; ini tial phase of contract covers engineering development services; production portion includes negotiated maximum production prices on 4 major types of terminals for first 37 stations of the 86-station system; equipment for remaining stations to be negotiated later; estimate of manufacture, installation, and maintenance of entire system will cost approximately $46.4 million Rapidata, Inc., Fairfield, New York Telephone Co., A renewed and expanded long term contract to $1. 7+ million N.. _____________________ ~N~e~w~Y~o~.r~k~.~N~.~Y~.__________________~in~c~·I~u~d~e~a~s~e~c~o~n~d~dedicated computer system $1.6+ million SYSTEMS Engineering LaboraSikorsky Aircraft Div., A large SYSTEMS 86 computer system to be tories, Inc., Fort LauderStratford, Conn. used as the hub of firm's Flight Data ProcessingCenter Ground Station in Stratford dale. Fla. Datacraft Corp., Fort LauHarris-Intertype Corp. 66 computers to be used in a number of $1.5 million (approxim3te) products produced by the firm's divisions derdale. Fla. Univac Division of Sperry UNIVAC 1106, to be delivered in 1973, will $1.5 million Societe Europeenne de Pro(approximate) Rand Corp., Blue Bell, Pa, pulsion (SEP), Puteaux, process technical and scientific calculaParis, France tions resulting from SEP's activities in both civil and military fields of rocket propulsion $1.26 million Varian Data Machines, PRD Electronics, Syosset, A series of R622/i computer systems used Irvine, Calif. N.Y. in Navy's AN/USM-247 Versatile Avionic Shop Test (VAST) System; PRD Electronics ________________________________________~ime contractor for the program $1.1 mi 11 ion Univac Division of Sperry Companhia Portuguesa de UNIVAC 1106 system for scientific work and Rand Corp., Blue Bell, Pa, Electricidade (CPE), Lisbon establishing management information sysPortugal tem; later will include real-time monitoring of electric power network throughout Portug-al $1+ million Univac Division of Sperry Lebole Euroconf, S.p.A. of UNI VAC 1106 computer sys tem for produc tion Rand Corp., Blue Bell, Pa, Italy, Arezzo, Italy control, budgeting, inventory control, general accounting. and I)ayroll processing $900,000 A real-time interactive computer graphics SYSTEMS Engineering LaboraWestern Electric Co., Win(approximate) system to be used in the Defense Activitories, Inc., Fort Lauderston-Salem, N.C. ties Division to generate SAFEGUARD Maindale, Fla. tenance Data System (MDS) data frames $250,000 Upgrading firm's existing EMR 6100 Series Gulf Research and Development EMR Computer, Minneapolis, Computer System which is used to process Minn. Co., Houston, Texas seismic exploration data at Gulf's Houston installation $150,000 Research and development of a new form of U.S. Passport Office, WashComputer Sciences Corp. (CSC), Los Angeles, Calif. ington, D.C. travel document to replace the present ______ ________ ____________ __ _____________ __ ______ __ __________________________________________ Computer Sciences Corp. Manufacturers Bank, Los AnPerforming all data processing required (CSC), Los Angeles, Calif. geles, Calif. by Manufacturers and its correspondent banks. for five years Lease of Series 6000 system known as TiInternational Brotherhood of Honeywell, Inc., Wellesley tan (Teamsters International -- Terminal Teamsters, Washington, D.C. Hills, Mass. and Accounting Network) for an on-line network to handle dues, health and welfare accounting, for over 2 million union members in the U.S., Puerto Rico and Canada A model 1642 time-sharing system to impleSuburban Police Automated InHoneywell, Inc., Wellesley ment Suburban Police Automated Information Hills, i,lass. formation System, Quincy, System (SPAIS); joint use by 4 communities Milton, Braintree and Weywill provide COmmon source of information mouth, Mass. pertaining to crime wi thin their jurisdiction Total data processing for 3 year period Cardo Automotive Products, TRILOG Associates, Inc. Ampex Corp., Marina del Rey, Calif. U.S. Navy ~J~. ~ 44 ~ ~ ~ ~ ~ ~~ ~p~a~s~s~p~o~rt ~~~ COMPUTERS AND AUTOMATION for July, 1972 NEW INSTALLATIONS Control Data 3400 system oneywell Model 2015 system IBM System/3 Model 10 IBM System/7 IBM System 7 IBM System/360 Model 195 Petroleum Data Consultants, Lafa ette La. Associated Hospital Service of Arizona, Phoenix, Ariz. (2 systems) Velva Sheen, Cincinnati, Ohio Buckbee-Mears Company, St. Paul, Minn. Motion Picture Laboratories, Inc., Memphis, Tenn. Mellon National Bank and Trust Co., Pittsburgh, Pa. IBM System/370 Model 135 Bertea Corp., Irvine, Calif. NCR Century 50 system Bowling Green-Warren County Hospital, Bowling Green, Ky. Farmers Co-op, Van Buren, Ark. Howard Community College, Columbia, Md. Multiple Listing Service of Greater Baltimore, Inc., Baltimore, Md. Peterson-Puri tan Co. , Danville, Ill. Smith Cabinet Manufacturing Co., NCR Century 100 system Anthony Co., Streator, Ill. Financial Data Corp., Baltimore, Md. Richland Memorial Hospital, Columbia, S.C. NCR Century 200 system UNIVAC 1106 system UNIVAC 1110 system UNIVAC 9200 system UNIVAC 9200 II system UNIVAC 9211 B system UNIVAC 9300 system Riddle Memorial Hospital, Media, Pa. City National Bank, FortSmith, Ark. Sunbrand Corp., Chamblee, Georgia Canadian Department of National-Rev--enue and Taxation, Ottawa, Canada University of Paris, Paris, France Anaconda Company, Sahuarita, Ariz. Housing and Commercial Development Inc. (HUD) , Newport Beach, Calif. (2 systems) University of Western Ontario Computer Sciences Department, London, On t. , Canada Chem Tech Company, St. Louis, Mo. Louisiana Wild Life and Fisheries Commission, New Orleans, La. Fred Sanders Co., Detroit, Mich. UNIVAC 9400 system ADP Service Center, Colorado State Hospital, Colorado Dept. of Institutions, Pueblo. Col. University of Houston's College of Business, Houston, Texas Xerox Sigma 8 system COMPUTERS AND AUTOMATION for July, 1972 NASA Ames Research Center, Mountainview, Calif. Supporting data processing services tothe petroleum industr and to commercial business enter rises A variety of hospital- and insurance-related data processing services for 36 member hospi tals throughout the state i replaces three Honeywell Series 200 systems Production control, inventory control and financial support functions Monitoring one of its highly automated production lines that makes a component of color television Monitoring the printing of 25 kinds of raw film on each of firm's automated, high-speed printers Helping process almost 2 million bank and financial account records each day; the multi-million-dollar system enables reduction of the number of separate computers in use from a high of 22 in 1969 to 3 by mid-1973, and simultaneously serves future marketing support needs of the bank Production control; involved in every step of design and production processes Post-discharge accounting, payroll processing and general accounting Managing patronage accounts and other general accounting purposes Administrative and teaching purposes Inventory control of homes listed, sales statistics and general accounting Inventory control and payroll preparation Payroll, order billing, invoicing, inventory control and accounts receivable Production scheduling, accounts payable and receivable and payroll processing Processing savings accounts, certificates of deposit and mortgages, and general accounting for 11 branches of two firms Accounts payable and receivable, in patient records, inventory control, general ledger and payroll accounting, and medical audit statistics Payroll and in-patient records and post-discharge accounting Managing its Central Information File Order processing, inventory management, sales analysis and manufacturing control Management Information System enabling inquiries to be handled from 28 district offices Use in the scientific research program of the Laboratory for Theoretical Physics and High Energy (system valued at $2.5 million) Payroll processing and general accounting Business and administrative applications, e.g., patient billing Bnd payroll processing, maintenance scheduling, mortgage-loan accounting Supplementing its UNIVAC 9300 computer which is used for student instruction in data processing Sales analysis, invoicing, inventory control, and general accounting Keeping track of all motor boat registrations and commercial licenses; maintaining data from oyster surveys, records of funds received from Federal Government, and perform payroll and accounting tasks the Commission and the New Orleans Levee Board Inventory and production control, scheduling and general accounting Increasing data processing capacity to provide improved handling of management information. office applications and many clinical operations including patient movement; other state institutions will be able to use the computer Student "hands-on" operating experience as well as simultaneously processing problems derived from classroom instruction Simulating flight characteristics of advanced aircraft; will also be used by FAA for aircraft certification studies and research on flying quality requirements by the National Transportation Safety Board for investigation of accidents (system valued at $1.2 million) 45 MONTHLY COMPUTER CENSUS Neil Macdonald Survey Editor COMPUTERS AND AUTOMATION The following is a sunnnary made by COMPUTERS AND AUTOMATION of reports and estimates of the number of general purpose electronic digital computers manufactured and installed, or to be manufactured and on order. These figures are mailed to individual computer manufacturers from time to time for their information and review, and for any updating or comments they may care to provide. Please hote the variation in dates and reliability of the information. Several important manufacturers refuse to give out, confirm, or comment on any figures. Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit information for this census. We invite all our readers to submit information that would help make these figures as accurate and complete as possible. Part I of the Monthly Computer Census contains reports for United States manufacturers. Part II contains reports for manufacturers outside of the United States. The two parts are published in alternate months. The following abbreviations apply: (A) -- authoritative figures, derived essentially from information sent by the manufacturer directly to COMPUTERS AND AUTOMATION C figure is combined in a total (D) acknowledgment is given to DP Focus, Marlboro, Mass., for their help in estimating many of these figures E figure estimated by COMPUTERS AND AUTOMATION (N) manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any way on those numbers stated here (R) figures derived all or in part from information released indirectly by the manufacturer, or from reports by other sources likely to be informed (S) sale only, and sale (not rental) price is stated X no longer in production information not obtained at press time SUMMARY AS OF JUNE 15, 1972 NAME OF MANUFACTURER Part 1. United States Manufacturers Autone tics Anaheim l Calif. (R) (1/69) Bailey Meter Co. Wickliffe, Ohio (A) (6/72) Bunker-Ramo Corp. Westlake Village, Calif. (A) (4/72) Burroughs Detroit, Mich. (N) (1/69-5/69) Computer Automation, Inc. Newport, Calif. (A) (4/71) Consultronics, Inc. Garland, Texas (A) (6/72) Control Data Corp. Minneapo lis, Minn. (R) (7/71) Data General Corp. Southboro, Mass. (A) (6/72) Datacraft Corp. Ft. Lauderdale. Fla. {A} Pl72} Digiac Corp. PlainView, N.Y. (A) (5/72) 46 NAME OF COMPUTER RECOMP II RECOMP III Metrotype Bailey 750 Bailey 755 Bailey 756 Bailey 855/15 Bailey 855/25 Bailey 855/50 BR-130 BR-133 BR-230 BR-300 BR-330 BR-340 BR-10l8 205 220 BIOO/B500 B2500 B3500 B5500 B6500 B7500 B8500 108/208/808 116/216/816 4700 DCT-132 DATE OF FIRST INSTALLATION 11/58 6/61 10/57 6/60 ll/6l 2/65 12/72 4/68 3/72 10/61 5/64 8/63 3/59 12/60 12/63 6/71 1/54 10/58 7/65 2/67 5/67 3/63 2/68 4/69 8/67 6/68 3/69 4/69 5/69 AVERAGE OR RANGE OF MONTHLY RENTAL $ (000) X X 40-200 40-250 200-600 60-400 50-400 100-1000 100-1000 X X X X X X 23.0 2.8-9.0 4.0 14.0 23.5 33.0 44.0 200.0 5.0 8.0 X X X X X 5/60 8/61 1/60 5/66 5/64 5/64 9/65 11/64 8/68 6/63 2/66 8/64 8/64 6/67 12/68 X X X Nova Supernova Nova 1200 Nova 800 Nova 1210 1 1220 6024/1 6024/3 2'/69 5/70 12/71 3/71 2/72 5/69 2/70 l2L71 1/70 12/64 10/67 Digiac 3060 Digiac 3080 Digiac 3080C 0 0 0 15 0 12 0 0 0 52-57 44 65-74 4 (S) (S) 12 18 7 X X X X 0 0 0 2 2 0 12 27-40 30-33 X X 64-49 62 72-81 4 ll7 190 8 60 13 5 110 225 1 165 215 10 20 1 175 235 18 35 0 85 18 120 295 20 165 322 75 29 610 29 59 425-475 83-110 55-60 205 15 15 40 20 108 85 5 8 3.8 10-16 13.0 20-38 18.0 25.0 52.0 53.0 58.0 115.0 130.9 235.0 9.2 9.6 5.4 6.9 4.2;5.2 54-300 33-200 16 50 9.0 30 6 8 52 7 27 0 16 0 X X X X X X 25-38 28-31 1.8 0.9 7/55 4/61 12/62 9/56 1/61 30 6 8 37 7 15 0 16 0 160 79 15 18 19 19 NUMBER OF UNFILLED ORDERS (S) X X G15 G20 LGP-2l LGP-30 RPC4000 636/136/046 Series 160/8090 Series 92l/924-A 1604/ A/B l700/SC 3100/3150 3200 3300 3400 3500 3600 3800 6200/6400/6500 6600 6700 7600 6024L5 (S) (S) (S) (S) (S) (S) (S) NUMBER OF INSTALLATIONS Outside In In World U.S.A. U.S.A. (S) (S) (S) (S) (S) (S) (S) {S2 (S) 16 94 2 78 16 8 0 13 0 910 190 1350 190 10 16 107 2 78 16 8 X X X X X X X X 0 C C C C C C C C C C C Total: 160 E 2 53 35 8 X X COMPUTERS and AUTOMATION for July, 1972 NAME OF MANUFACTURER Digital Computer Controls, Inc. Fairfield, N.J. (A) ~6/72) Digital Equipment Corp. Maynard, Mass. (A) (5/72) Electronic Associates Inc. Long Branch, N.J. (A) (4/72) EMR Computer Minneapolis, Minn. (A) (4/72) General Automation, Inc. Anaheim, Calif. ~A~ ~6L722 General Electric Wes t Lynn, Mass. (Proces s Control Computers) (A) (6/72) Hewlett Packard Cupertino, Calif. (A) ~8/71) Honeywell Information Systems Wellesley Hills, Mass. (R) (6/72) NAME OF COMPUTER D-112 0-116 PDP-1 PDP-4 PDP-5 PDP-6 PDP-7 PDP-8 PDP-8/1 PDP-8/S PDP-8/L PDP-8/E PDP-8/M PDP-8/F PDP-9 PDP-9L DECSys tem-10 PDP-ll/20 PDP-llR20 PDP-ll/05 PDP-ll/45 PDP-12 PDP-IS LINC-8 640 8400 PACER 100 EMR 6020 EMR 6040 EMR 6050 EMR 6070 EMR 6130 EMR 6135 EMR 6000 SPC-12 SPC-16 Sys tern 18/30 GE-PAC 3010 GE-PAC 4010 GE-PAC 4020 GE-PAC 4040 GE-PAC 4050 GE-PAC 4060 2114A, 2114B 2115A 2116A , 2116B I 2116C G58 G105A G105B G105RTS G115 G120 G130 G205 G210 G215 G225 G235 G245 G255 T/S G265 T/S G275 T/S G405 G410 T/S G415 G420 T/S G425 G430 T/S G435 G440 T/S G615 G625 G635 H-110 H-1l5 H-120 H-125 H-200 H-400 H-800 H-1200 H-1250 H-1400 H-1800 H-2200 H-3200 H-4200 H-8200 DDP-24 DDP-1l6 DDP-124 DDP-224 DDP-316 COMPUTERS and AUTOMATION for July, 1972 DATE OF FIRST INSTALLATION 8/70 1/72 11/60 8/62 9/63 10/64 11/64 4/65 3/68 9/66 11/68 5/72 12/66 11/68 12/67 9/69 2/61 9/66 4/67 7/67 4/65 7/65 2/66 10/66 8/67 1/68 5/70 7/69 5/70 10/70 2/67 8/64 12/66 6/65 10/68 11/67 11/66 5/70 6/69 6/69 7/69 4/66 3/69 12/68 6/64 7/60 9/63 4/61 4/64 11/68 10/67 10/65 11/68 2/68 11/69 5/64 6/67 6/64 6/69 9/65 7/69 3/68 4/65 5/65 8/68 6/70 1/66 12/67 3/64 12/61 12/60 2/66 7/68 1/64 1/64 1/66 2/70 8/68 12/68 5/63 4/65 3/66 3/65 6/69 AVERAGE OR RANGE OF MONTHLY RENTAL $~OOO) 10.0 10.0 (S) (S) X X X X X X X X X 4.9 3.9 3.9 (S) (S) (S) X X 700-3000 10.8 13.8 10.8 17.0 (S) (S) (S) (S) (S) X 1.2 12.0 17.2 5.4 6.6 9.0 15.0 5.0 2.6 2.0 6.0 6.0 X 7.0 X 0.25 0.41 0.6 1.0 1.3 1.4 1.2 2.2 2.9 4.5 X X X X X X X X X 6.8 1.0 7.3 23.0 9.6 17.0 14.0 25.0 32.0 X 47.0 2-7 3.5 4.8 7.0 7.5 10.5 30.0 9.8 12.0 14.0 50.0 18.0 24.0 32.5 50.0 2.65 X X X 0.6 (S) NUMBER OF INSTALLATIONS Outside In In U.S.A. World U.S.A. 87 583 496 2 71 69 48 40 90 C C C C C C C 2 5 10 C C C C C C C c c C C C C C C 0 0 C C C C C C C C C 0 0 C C C 107 20 0 60 8 0 10 21 197 45 23 18 0 3 59 20 2 2 50 45 100 23 100 1402 3127 918 3699 3787 365 2 436 40 243 2740 14 0 0 620 545 200 Total: 18456 167 28 0 48 28 53 1200 400 150 10 24 256 65 25 20 1182 333 1171 200-400 420-680 620-1080 11 35 15 145 40-60 3 15-20 45-60 0 0 1 15 17 11 35 16 160 57-77 3 15-20 60-90 10 15-45 15-30 10-40 70-100 240-400 240-400 50-100 20-30 70-130 20 23 20-40 180 30 800 150 800 46 58 230 130 4 15 125 20 18 10 NUMBER OF UNFILLED ORDERS X X X X X X X X X X X X 4 1 0 0 8 1 25 32 36 X 1 X X X X X X X X X X 26 3 3 7 160 220 275 40 15 90 55 6 5 60 2 2 3 26 23-43 255 30 960 370 1075 86 73 320 185 10 20 185 22 20 13 90 250 250 60 450 X 0 X X X X X X X X 47 NAME OF MANUFACTURER (cont I d) Honeywell IBM White Plains, N.Y. (N) (D) (6/71) Interdata Oceanport, N.J. (A) (4/72) Microdata Corp. Santa Ana, Calif. (A) ~4/72) NCR Dayton, Ohio (A) (2/72) Philco Willow Grove, Pa. (N) (1/69) Raytheon Data Systems Co. Norwood, Mass. (A) (4/72) Scientific Control Corp. purchased by Cons u1 tronics, Inc., which see Standard Computer Corp. Los Angeles, Calif. (A) (6/72) Systems Engineering Laboratories Ft. Lauderdale, Fla. (A) (6/72) 48 DATE OF FIRST NAME OF INSTALLATION COMPUTER DDP-416 DDP-516 9/66 H112 10/69 H632 12/68 H1602 H1642 H1644 H1646 H1648 11/68 H1648A 305 12/57 650 10/67 1130 2/66 1401 9/60 1401-G 5/64 1401-H 6/67 1410 11/61 1440 4/63 1460 10/63 1620 I, II 9/60 1800 1/66 7010 10/63 7030 5/61 704 12/55 7040 6/63 7044 6/63 705 11/55 7020, 3/60 7074 3/60 7080 8/61 7090 11/59 7094-1 9/62 7094-Il 4/64 System/3 Model 6 3/71 System/3 Model 10 1/70 System/7 11/71 360/20 12/65 360/25 1/68 360/30 5/65 360/40 4/65 360/44 7/66 360/50 8/65 360/65 11/65 360/67 10/65 360/75 2/66 360/85 12/69 360/90 11/67 360/190 360/195 4/71 370/135 5/72 370/145 9/71 370/155 2/71 370/165 5/71 370/195 6/73 Model 1 12/70 Model 3 5/67 Model 4 8/68 ModelS 11/70 Model 15 1/69 Model 16 5/71 Model 18 6/71 Model 50 5/72 Model 70 10/71 Micro 400 12/70 Micro 800 12/68 Micro 1600 12/71 304 1/60 310 5/61 315 5/62 315 RMC 9/65 390 5/61 500 10/65 Century 50 2/71 Century 100 9/68 Century 200 6/69 Centu!2: 300 2/72 1000 6/63 200-210,211 10/58 2000-212 1/63 250 12/60 440 3/64 520 10/65 703 10/67 704 3/70 706 5/69 IC 4000 IC 6000-6000/E IC 7000 IC-9000 SYSTEMS 810B SYSTEMS 71 SYSTEMS 72 SYSTEMS 85 SYSTEMS 8? 12/68 5/67 8/70 5/71 9/68 8/72 9/71 7/72 6/70 AVERAGE OR RANGE OF MONTHLY RENTAL $(000) X 1.2 3.2 NUMBER OF INSTALLATIONS Outside In In U.S.A. World U.S.A. 350 900 75 12 12.0 40 50 2580 2210 420 180 156 1690 194 285 415 67 4 12 35 28 18 10 44 13 4 10 6 7161 1112 5487 2453 109 1135 601 57 50 11 5 13 15 18 1227 1836 450 140 116 1174 63 186 148 17 1 1 27 13 3 3 26 2 2 4 4 55 68 3807 4046 870 320 272 2864 257 471 563 84 5 13 2 41 21 6075 759 2535 1524 57 445 144 6 17 1 13236 1871 8022 3977 166 1580 745 63 67 12 5 15 13 70 15 6 14 10 1780 1287 1363 39 662 562 99 12 55 48 232.0 14.4 23.3 48.0 98.7 190.0-270.0 3.7 8.5 X 20.0 X X 6.8 6.8 1. 8-30 1. 8-30 1.8-30 X X 7.0 9.0 0.7 1.0 1.6 2.6 7.0 21.0 X X X X X X 9.0 16.0 17.0 400.0 2.6 .9 1.0 6.0 10.0 X 20 3.6 4.8 1.5 5.4 2.3 1.3 17.0 4.1 10.0 4.1 5.1 26.0 160.0 32.0 25.0 36.5 38.0 27.0 35.0 60.0 63.5 75.0 83.0 1.0 1.1 0.35 and up 2.7 5.1 10.3 19.3 11.8 29.1 57.2 133.8 66.9 150.3 (S) 12.5 B.O 19.0 NUMBER OF UNFILLED ORDERS (S) (S) (S) 175 70 270 70 40 1 2 3 130 100 1340 50 5 8 425 125 250 1000 200 1500 460 0 16 16 12 115 20 26 175 195 69 115 20 24 5 6 1 15 0 400 2 2 0 300 50 375 1700 3 (S) 4 1 162 525 215 0 20 1 31 44 14 135 20 27 206 239 83 0 0 0 0 8 170 12 24 245 200 385 90 64 6 8 4 145 100 1740 52 7 8 725 175 625 2700 200 2025 675 0 100 X 40 X X X X 15 110 X X X X X X X X 0 30 3 1 15 1 25 COMPUTERS and AUTOMATION for July, 1972 NAME OF MANUFACTURER UNIVAC Div. of Sperry Rand New York, N.Y. (A) (4/72) UNIVAC - Series 70 Blue Bell, Pa. (A) (5/72) Varian Data Machines Newport Beach, Calif. (A) (6/72) Xerox Data Systems E1 Segundo, Calif. (N) (2/72) AVERAGE OR RANGE DATE OF FIRST OF MONTHLY RENTAL NAME OF $(000) COMPUTER INSTALLATION I & II X 3/51 & 11/57 III X 8/62 File Computers X 8/56 Solid-State 80 I, II, X 90, I, II, & Step 8/58 418 6/63 11.0 490 Series 12/61 30.0 1004 2/63 1.9 1005 4/66 2.4 1050 9/63 8.5 1100 Series (except 1107, 1108) 12/50 X 1107 10/62 X 1108 68.0 9/65 9200 6/67 1.5 9300 9/67 3.4 9400 5/69 7.0 LARC 5/60 135.0 301 2/61 7.0 501 6/59 14.0-18.0 601 11/62 14.0-35.0 3301 7/64 17.0-35.0 Spectra 70/15, 25 9/65 4.3 Spectra 70/35 1/67 9.2 Spectra 70/45 11/65 22.5 Spectra 70/46 33.5 Spec tra 70/55 11/66 34.0 Spectra 70/60 11/70 32.0 Spectra 70/61 4/70 42.0 70/2 16.0 5/71 70/3 25.0 9/71 70/6 25.0 9/71 70/7 12/71 35.0 620 11/65 X 620i X 6/67 R-620i 4/69 520/DC, 520i 12/69 ;10/68 620/f 11/70 620/L 4/71 620/f-100 620/L-100 5/72 Varian i3 XDS-92 4/65 1.5 XDS-910 8/62 2.0 XDS-920 9/62 2.9 XDS-925 12/64 3.0 XDS-930 6/64 3.4 XDS-940 4/66 14.0 XDS-9300 11/64 8.5 Sigma 2 12/66 1.8 Sigma 3 12/69 2.0 Sigma 5 8/67 6.0 Sigma 6 12.0 6/70 Sigma 7 12/66 12.0 Sigma 9 35.0 NUMBER OF INSTALLATIONS Outside In In World U.S.A. U.S.A. 23 31 25 13 210 80 76 1522 617 136 9 8 103 1106 412 82 2 154 20 3 78 23 116 312 38 14 10 10 50 2 13 3 NUMBER OF UNFILLED ORDERS X X X X 23 E 15 39 14 610 248 59 119 90 2132 865 195 0 3 129 835 62 41 0 9 11 232 1941 474 123 2 X X 58 E 725 510 E 83 E 75 l300 80 350 199 436 X X 43 170 120 10-20 159 28-38 25-30 60-110 10 15-40 4 7-10 5-12 1 14 3 4 10-15 0 6-18 47 177-180 125-132 10-21 173 28-41 25-34 70-125 10 21-58 24-35 5-9 29-44 72 10 125 18 15 5 CALENDAR OF C'OMING EVENTS Aug. 6-12, 1972: Rio Symposium on Computer Education for Developing Countries, Rio de Janeiro, Brazil/contact: Luiz de Castro Martins, C.P. 38015 - ZC-20, Rio de Janeiro - GB Brazil Aug. 7-11, 1972: SHARE Meeting, Toronto, Canada / contact: D.M. Smith, SHARE, Inc., Suite 750, 25 Broadway, New York, N.Y. Aug. 15-17, 1972: Seminar on ADP in Law Enforcement, Washington, D.C. / contact: ADP Management Training Center, U.S. Civil Service Commission, Washington, D.C. Aug. 21-23, 1972: Sixth Annual Mathematical Programming Seminar and Meeting, Vail, Colo. / contact: George M. Lowel, Symposium Directory, Haverly Systems Inc., 4 Second Ave., Denville, N.J. 07834 Oct. 1-4, 1972: New York State Assoc. for Educational Data Systems' 7th Annual Conference, Fallsview Hotel, Ellensville, N.Y. / contact: Alfred N. Willcox, Educational Data Processing Center, 17 Westminster Ave., Dix Hills, N.Y. 11746 Oct. 3-5, 1972: AFIPS and IPSJ USA-Japan Computer Conference, Tokyo, Japan / contact: Robert B. Steel, Informatics Inc., 21050 Vanowen St., Canoga Park, Calif. 91303 Oct. 8-11, 1972: I nternational Conference on Systems, Man and Cybernetics, Shoreham Hotel, Washington, D.C. / contact: K.S. Nurendra, Yale Univ., 10 Hill House, New Haven, Conn. 06520 Oct. 16-20, 1972: IBI-ICC World Conference on Informatics in Government, Venice, Italy / contact: Intergovernmental Bureau for Informatics (lBI-ICC),23 Viale Civita del Lavoro, 00144 Rome, Italy Nov. 9-10, 1972: Second National Conference of Society for Computer Medicine, Williamsburg, Va. / contact: Society for Computer Medicine, Box M488, Landing, N.J. 07850 Nov. 15-17, 1972: DATA CENTRE '72, Sheraton-Copenhagen Hotel, Copenhagen, Denmark / contact: Data Centre '72, Danish lAG, DIAG, 58 Bredgade, OK 1260, Copenhagen K, Denmark Nov. 20-21, 1972: Aviv Hilton, Tel Assoc. of Israel, ing Conference, 8th Data Processing Conference in Israel, Tel Aviv, Israel/contact: Information Processing Programme Committee, The 8th Data ProcessP.O.B. 16271, c/o "Kenes", Ltd., Tel Aviv December 5-7, 1972: Fall Joint Computer Conference, Anaheim Convention Center, Anaheim, Calif . ./ contact: AFIPS Headquarters, 210 Summit Ave., Montvale, N.J. 07645 Jan. 17-19, 1973: 1973 Winter Simulation Conference, San Francisco, Calif. / contact: Robert D. Dickey, Bank of California, 400 California St., San Francisco, Calif. 94120 Jan. 31-Feb. 1, 1973: San Diego Biomedical Symposium, SheratonHarbor Island Hotel, San Diego, Calif. / contact: Dr. Robert H. (please film to page 50) COMPUTERS and AUTOMATION for July. 1972 49 Calendar - Continued from page 49. Riffenburgh, Program Chmn, San Diego Biomedical Symposium P.O.Box 965, San Diego, Calif. 92112 Mar. 4-9, 1973: SHARE Meeting, Denver, Colo. I contact: D.M. Smith, SHARE, Inc., Suite 750, 25 Broadway, New York, N.Y. April 10-12, 1973: Datafair 73, Nottingham University, Nottingham, England I contact: John Fowler & Partners Ltd.~ 6-8 Emerald St., London, WC1 N3QA, England April 10-13, 1973: PROLAMAT '73, Second International Conference on Programming Languages for Numerically Controlled Machine Tools, Budapest, Hungary I contact: IF IP Prolamat, '73, Budapest 112, P.O.Box 63, Hungary May 14-17, 1973: Spring Joint Computer Conference, Convention Hall, Atlantic City, N.J. I contact: AFIPS Hdqs., 210 Summit Ave., Montvale, N.J. 07645 THE 18th ANNUAL EDITION OF THE COMPUTER DIRECTORY AND BUYERS' GUIDE, 1972 • . . will be published additionally in July, 1972, as a special 13th issue of Computers and Automation The COMPUTER DIRECTORY is: • an annual comprehensive directory of the firms which offer products and services to the electronic computing and data processing industry • the basic buyers' guide to the products and services available for designing, building, and using electronic computing and data processing systems "THE COMPUTER DIRECTORY AND BUYERS GUIDE" ISSUE OF "COMPUTERS AND AUTOMATION" NOTICE The U.S. Postmaster, Boston, Mass., ruled in Jdnuary 1972, that we may no longer include "The Computer Directory and Buyers' Guide" issue of "Computers and Automation", calling it an optional, thirteenth issue of "Computers and Automation" regularly published in June, and mailing it with second class mailing privileges. The plan mentioned previously for publishing the directory as a quarterly with second class mailing privileges has been disapproved and disallowed by the Classification Section of the U.S. Postal Service in Washington, D.C. Accordingly, in 1972 "The Computer Directory and Buyers' Guide", 18th annual issue, will be published in one volume as a book, and mailed as a book. The domestic price for "The Computer Directory and Buyers' Guide" will be $14.50, but regular subscribers to "Computers and Automation" may subscribe to the directory at $9.00 a year (there is thus no change for them). "The Computer Directory and Buyers' Guide" issue of "Computers and Automation" has been published in every year from 1955 to 1971, and 1972 will not be an exception. ADVERTISING INDEX Following is the index of advertisements. Each item contains: name and address of the advertiser / name of the agency, if any / page number where the advertisement appears. ACM (ASSOCIATION FOR COMPUTING MACHINERY), 1133 Avenue of the Americas, New York, N.Y. 10036/ Corporate Presence, Inc. / Page 39 THE C&A NOTEBOOK ON COMMON SENSE, ELEMENTARY AND ADVANCED, published by Computers and Automation, 815 Washington St., Newtonville, Mass. 02160 / Pages 6, 7, 8, 9 COMPUTERS AND AUTOMATION, 815 Washington St., Newtonville, Mass. 02160 / Page 50 GML CORPORATION, 594 Marrett Rd., Lexington, Mass. 02173 / Page 52 UN IVE RSITY OF NAI ROBI, P.O.Box 30197, Nairobi, Kenya / Page 51 50 CONTENTS: Roster of Organizations in Computers and Data Processing Buyers' Guide to Products and Services in Computers and Data Processing Geographic Roster of Organizations in Computers and Data Processing Characteristics of Digital Computers Roster of Programming Languages, 1972 Over-' 2200 Applications of Computers and Data Processing Roster of College and University Computer Facilities . Roster of Main Computer Associations Roster of Chapters of the Data Processing Management Association Roster of Chapters of the Association for Computing Machinery Roster of Special Interest Groups and Special Interest Committees of the Association for Computing Machinery Roster of Computer Users' Groups . . . and much more PRICE: • Prepublication price for subscribers to Computers and Automation whose present subscription does not include the Directory (magazine address label is marked *N) • • • • $9.00 • Special prepublication price for non-subscribers • . . . . . • • . • • $12.00 (After publication, price to . non-subscribers is $14.50) • The Directory is included in the $18.50 full annual subscription (13 issues) to Computers and Automation (magazine address label is marked *D) Send prepaid orders to: cDrnI;!,H~!!!:i! 815 Washington Street Newtonville, Mass. 02160 If not satisfactory, the DIRECTORY is returnable in seven days for full refund. COMPUTERS AND AUTOMATION for July, 1972 UNIVERSITY OF NAIROBI • KENYA -- openings LECTURERS -- COMPUTING CENTRE Four Positions Applications are invited for the following posts:AC/4/91/72 LECTURER (4 POSTS) - COMPUTING CENTRE c' The lecturers are to give courses and advice to computer users 011 programming and the applications of computer methods in research. They should have had experience in at least two of the following languages: PLAN, FORTRAN, ALGOL and COBOL. They should be versed in one of the following fields of Computer application: Linear Programming, Simulation, Statistical Analysis. ments are for tours each of two years, renewable, and include passage for up to 5 adults on appointment, on termination, and between tours. Applicants should hold a degree which includes subjects in Computer Science, and a higher degree in Computer Science, or should have several years of equivalent experience. An applicant should give the names and addresses of three academic references, and at the same time request those persons to forward promptly their recommendations in regard to him to the Registrar. The Central University computing facilities are based on ICL 1902 system. Applications should be made in writing, 6 copies, and give full details in regard to age, marital status, educational qualifications including subjects and degrees, experience, and present employment; and should be addressed to:- Salary Range: K£ 1500 + £84, £2256 + £108, £2580 per annum. Applicants from government or parastatal organizations should forward their applications through the heads of their departments. The Registrar, University of Nairobi, P.O. Box 30197 NAIROBI, Kenya. Terms of service include membership in: a senior staff annuity fund or F.S.S.U.; a non-contributory Medical Scheme; and a generous housing allowance or in case of contract staff, subsidized housing. Expatriate appointI Applications should reach the t COMPUTERS and AUTOMATION for July, 1972 R~gistrar not later than 15th August, 1972. 51 A Quick,Easy, Fingertip Reference COMPUTER CHARACTERISTICS REVIEW the most current, complete, compact, professional computer reference source available anywhere. 'i I $25/YEAR I J t Three issues, Each over 250 pages of objective, authoritative, detailed data on all computers (mini, midi, maxi), associated peripherals (auxiliary storage, magnetic tapes, card equipment, line printers, paper tape equipment, alphanumeric displays, interactive graphic displays), applications, systems configurations and power classification. A directory of manufacturers is standard, to)\l>t"fElt CIIARACttIllSTlts IlEVIEW Wl\UYf, lCtiQ-:Z \I ' (POCKET SIZE) BITS PER MICROSECOND SAMPLE PAGES: Biispn Micro_ C,cleTime uC01ld 2181.81 1185.18 800.00 800.00 185.51 160.00 128.00 112.50 ~.OO emtral Proct!UOf' ~Z~~g~~~~Hi7~~L PROCESSORS 145 LDATA!800 KEN TRHO ~ERAL SUPERNOVA I \\3103 "l l!JP! 1/ Jfl u4l07 01>0 a.ailal GML C Inlor:atiOn~ _, ,1/66 - ~ not yet receive' n ca'P:lbHity. U M((Cpt: A.-"'L~~':rcPOft gC1.\cr a1o '.XB~~"h. R_ ,:;~.::;;:~, T- "",<.,h.""g· '(, ZIP ICA I ; so aVa'/able ~ a'a 604 540, 1560 ________ B 120 l Or ~HIL/PS ELECTR:L;;;;:OllJ,ta 33 ' D2020 SICA 1530~ Control D . ....--- .---=:. c ~ft"'" ,-~;o~:;:''''~~·~i~;;rirt~·~~~~:o;'jo;: Il"N. lA_m' Q 99 ~ 5 6_________ 1~0 fo; 1560." N 601 8 '550 _______________ .. Ote. DeVices 01/ of Control Data 607. _____ odified "(>1'"SI 1560. C. II S'l'lCS PROCESSORS 32 GML CORPORATION Publishers of Computer Display Review 8 1I0LOG/CA PI064~b/,1 .1/so a\·.iia~5 and 112.5 ip I a 37.5c 16 e. s • so pencling "pon <'-o\lac\O«" -···mured b - - -lunctlu" --------------------- - r··· - - - - - -ou ----------- .. 37.5 c >( D.'amec _ b Ie m.o'Pu\."OO~ ~.~~:.~\~~\~;~d',~e~\i::'::~:~ ,dd,,,,,og. ~_I\;lati!lP; poll:tti~I~5,M_nHl\lIP'COpet 90 e City 15 -'\6 - 2 2~ ~~ ~e~ IS;~v~i~~~feulatOw ~~I' 1100 P'06I~ :crROLDS/CA .. c~trI~lators ;\;';i';nction as .nu<~'=------ " .. 36012 11/11 - .85.1.1. . orporatlon Address 1/66 3.6 D 58 16 58 2 8 8 .0.8 d I B II-'e< per tWO b~' ~!~ ~ C D 1.0 I"e~ per b~~e:~, index registers.' - tt.leks al '0 !. : lerands Name 11/71 . 15 16 - ore to core u' .4.2~1 1 Q.A"utrle,c - I 'l the acknowledged reference source in the field of display technology, ~ ,notyetrec
Source Exif Data:File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Producer : Adobe Acrobat 9.1 Paper Capture Plug-in Modify Date : 2009:03:24 23:49:22-07:00 Create Date : 2009:03:24 23:49:22-07:00 Metadata Date : 2009:03:24 23:49:22-07:00 Format : application/pdf Document ID : uuid:a6d65de7-f1ea-470d-a46a-8d2bca89de61 Instance ID : uuid:3c02662c-e849-45b2-8033-c7b20434e168 Page Layout : SinglePage Page Mode : UseNone Page Count : 52EXIF Metadata provided by EXIF.tools