197301

197301 197301

User Manual: 197301

Open the PDF directly: View PDF PDF.
Page Count: 52

Download197301
Open PDF In BrowserView PDF
.SCIENCE & TECFThiQL¢GY

January, 1973

CD

puters

and automation
and people

"PHROPASE"

~.

- Donald Michie
- Marshall J. Farr

The Path to Championship Chess by Computer
Computer-Assisted Instruction Activities in
Naval Research
Databanks in a Free Society
The Social Responsibility of Computer Specialists
President Richard M. Nixon, the Bay of Pigs, and
the Watergate Incident .

5106049 01 0 P 7401
TECHN CAL SERV CES

r

J5 5P ' ml

180 W SAN CA R.lOS ST
SA
JOSE CA

- Alan F. Westin
- Harvey S. Gellman
- Richard E. Sprague

201721
018
95 113

Vo l. 22, No. 1

IF YOU COULD PREVENT JUST

ONE IMPORTANT MISTAKE BEFORE IT HAPPENED -

- like the Democratic Party's mistake with Senator Eagleton
- like the Republican Party's mistake with the Watergate Bugging
like the West German government's mistake in not catching the Arab
guerrillas before they penetrated to the Israeli Olympic Team's building
like Southern Airways' mistake in allowing three hijackers with guns on to
one of their planes

HOW MUCH

WOULD THAT BE WORTH TO YOU - $100? - $1000?

more?

Our considered estimate is that 10 to 20% or more of the cost of operation of most businesses is the cost of
mistakes. (Just one foreseeable mistake that "Computers and Automation" made in 1970 has cost us $4000.)

WOULDN'T YOU AGREE

THAT SENSE, COMMON AND UNCOMMON,
OUGHT TO BE THE KEY TO PREVENTING MISTAKES?

I
\

f

In a number of the issues of liThe Notebook on Common Sense, Elementary and Advanced", we examine
systematically the prevention of mistakes, such as:
No. 15:

Preventing Mistakes from Failure to Understand

)

No. 23:

Preventing Mistakes from Forgetting

- Volume 1, first
subscription year

No. 38:

The Concepts of Feedback and Feedback Control )

No. 41:

Preventing Mistakes from Unforeseen Hazards

- Volume 2, second
su bscription year

Among the forthcoming issues of the Notebook in Volume 2 are:
- Preventing Mistakes from Camouflage
- Preventing Mistakes from Placidity
and we are planning at least 20 more issues in Volumes 2 to 4 under this general heading.

WHY NOT TRY THE NOTEBOOK ON COMMON SENSE?
GUARANTEE: (1) You may return (in 7 days) the
first batch of issues we send you,
REFUND, if not satisfactory. (2)
may cancel at any time, and you
a refund for the unmailed portion
scription.

PAST ISSUES: As a new subscriber, you do not miss past

for FULL
Thereafter, you
will receive
of your sub-

issues. Every subscriber's subscription starts at Vol. 1,
No.1, and he eventually receives all issues. The past
issues are sent to him usually four at a time, every week
or two, until he has caught up, and thus he does not miss
in')Portant and interesting issues that never go out of date.

HOW CAN YOU LOSE?
- - - - - - - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - - - - - - -

To:

COMPUTERS AND AUTOMATION AND PEOPLE
815 Washington St., R12, Newtonville, Mass. 02160
(
(

) YES, please enter my subscription to the Notebook on Common Sense at $12 a year,
24 issues (newsletter style), and extras.
) Please send me (as FREE premiums for subscribing) the first six issues:
1. Right Answers - A Short Guide to Obtaining Them
2. The Empty Column
3. The Golden Trumpets of Yap Yap

(

) I enclose $

(

) Please bill me

4. Strategy in Chess
5. The Barrels and the Elephant
6. The Argument of the Beard

( ) Please bill my organization

NAME _______________________________________________ TITLE _________________________________
ORGANIZATION ______________________~-----------------------------------------------------ADDRESS ___________________________________________________________________________________
SIGNATURE ___________________________________________ Purchase Order No. _______________________
2

I

COMPUTERS and AUTOMATION for January. 1973

I

INVENTORY OF THE 36 ISSUES OF

- TITLES AND SUMMARIES

THE NOTEBOOK ON COMMON SENSE, FIRST YEAR
VOLUME 1
1. Right Answers - A Short Guide to Obtaining Them
A collection of 82 principles and maxims. Example:
"The moment you have worked out an answer, start
checking it - it probablY isn't right."
2. The Empty Column
A parable about a symbol for zero, and the failure
to recognize the value of a good idea.
3. The Golden Trumpets of Yap Yap
4. Strategy in Chess
5. The Barrels and the Elephant
A discussion of truth vs. believability.
6. The Argument of the Beard
The accumulation of many small differences may
make a huge difference.
7. The Elephant and the Grassy Hillside
The concepts of the ordinary everyday world vs.
the pointer readings of exact science.
8. Ground Rules for Arguments
9. False Premises, Valid Reasoning, and True Conclusions
The fallacy of asserting that the premises must first
be correct in order that correct conclusions be
derived.
10. The Investigation of Common Sense
11. Principles of General Science and Proverbs
8 principles and 42 proverbs.
12. Common Sense - Questions for Consideration
13. Falling 1800 Feet Down a Mountain
The story of a skimobiler who fell 1/3 of a mile
down Mt. Washington, N.H., and was rescued the
next day; and how he used his common sense and
survived.
14. The Cult of the Expert
15. Preventing Mistakes from Failure to Understand
Even though you do not understand the cause of
some trouble, you may still be able to deal with
it. The famous example of a cure for malaria.
16. The Stage of Maturity and Judgement
17. Doomsday in St. Pierre, Martiniq'ue - Common Sense
vs. Catastrophe
How 30,000 people refusing to apply their common
sense died from a volcanic eruption.
18. The History of the Doasyoulikes
19. Individuality inHuman Beings
Their chemical natures are as widely varied as
their external features.
20. How to be Silly
71 recipes for being silly. Example: "Use twenty
words to say something when two will do."
21. The Three Earthworms
A parable about curiosity; and the importance of
making observations for oneself.
22. The Cochrans vs. Catastrophe
The history of Samuel Cochran, Jr., who ate some
vichyssoise soup.
23. Preventing Mistakes from Forgetting
24. What is Common Sense? An Operational Definition
A proposed definition of common sense not using
synonyms but using behavior that is observable.
25. The Subject of What is Generally True and Important Common Sense, Elementary and Advanced
26. Natural History, Patterns, and Common Sense
Some important techniques for observing.
27. Rationalizing and Common Sense
28. Opposition to New Ideas
Some of the common but foolish reasons for
opposing new ideas.
29. A Classification and Review of the Issues of Vol.
30. Index to Volume 1
COMPUTERS and AUTOMATION for January, 1973

VOLUME 2
31. Adding Years to Your Life Through Common Sense
32. The Number of Answers to a Problem
33. "Stupidity has a Knack of Getting Its Way"
34 and 35. Time, Sense, and Wisdom
36. Wisdom - An Operational Definition
.... 24 issues promised, 36 issues delivered, for good measure

Some Comments from Subscribers
believe these to be the best, if not the most important,
readi ng that I have had th is year.
- Harold J. Coate, EDP Manager, St. Joseph, Mo.
Your concept is brilliant, and a welcome antidote to much
which is passed off as useful knowledge these days. Keep
up the good work.
- Charles E. Abbe, Data Systems Analyst, Pasadena,
Calif.
Very good articles; something all managers should read.
- William Taylor, Vice President, Calgary, Alberta
As I am involved with systems work, I can always use one
of the issues to prove a point or teach a lesson.
- Edward K. Nellis, Director of Systems Development,
Pittsford, N.Y.
Thoroughly enjoy each issue.
- David Lichard, Data Processing Manager, Chicago, III.
All are good and thought-provoking - which in itself
is worthwhile. Keep it up.
- Richard Marsh, Washington, D.C.
Especially like "Right Answers".
- Ralph E. Taylor, Manager of Research and Development, West Chester, Ohio
Your tendency to deal with practical applications is very
rewarding.
- Jeffrey L. Rosen, Programmer, Toronto, Canada
PAST ISSUES: As a new subscriber, you do not miss past issues. Every subscriber's subscription starts at Vol. 1, no.
1, and he eventually receives all issues. The past issues
are sent to him usually four at a time, every week or
two, until he has caught up, and thus he does not miss
important and interesting issues that never go out of date.
GUARANTEE: (1) You may return (in 7 days) the first batch
of issues we send you, for FULL REFUND, if not satisfactory. (2) Thereafter, you may cancel at any time, and
you will receive a refund for the unmailed portion of
your subscription. ~

WE WANT ONLY HAPPY AND SATISFIED SUBSCRIBERS.
- - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - To: Computers and Automation and People
815 Washington St., R1, Newtonville, Mass. 02160
) YES, I would like to try the "Notebook on Common
Sense, Elementary and Advanced". Please enter my
subscription at $12 a year, 24 issues, newsletter style,
and extras. Please send me issues 1 to 6 as FREE
PREMIUMS for subscribing.
I enclose

) Please bill me.

) Please bill my organization.
Name _ _ _ _ _ _ _ __

Title _ _ _ _ _ _ _ _ __

Organization _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Signature _ _ _ _ _ _ _ _ _ Purch. Order No. _ _ __
3

Vol. 22, No.1
January, 1973

computers
and 'automation
and people

Editor

Edmund C. Berkeley

Assistant
Editors

Barbara L. Chaffee
Linda Ladd Lovett
Neil D. Macdonald

Software
Editor

Stewart B. Nelson

Advertising
Director

Edmund C. Berkeley

Art Director

Ray W. Hass

Contributing
Editors

John Bennett
Moses M. Berlin
Andrew D. Booth
John W. Carr III
Ned Chapin
Leslie Mezei
Ted Schoeters
Richard E. Sprague

Advisory
Committee

James J. Cryan
Bernard Qu int

Editorial
Offices

Berkeley Enterprises, Inc.
815 Washington St.
Newtonville, Mass. 02160
617 -332-5453

Advertising
Contact

The Publisher
Berkeley Enterprises, Inc.
815 Washington St.
Newtonville, Mass. 02160
617 -332-5453

"Computers and Automation" is published monthly, 12 issues per year, at 815
Washington St., Newtonville, Mass. 02160,
by Berkeley Enterprises, I nco Printed in
U.S.A. Second Class Postage paid at Boston,
Mass., and additional mailing points.
Subscription rates: United States, $9.50
for one year, $18.00 for two years. Canada:
add 50 cents a year for postage; foreign, add
$3.50 a year for postage.
NOTE: The above rates do not include
our publication "The Computer Directory
and Buyers' Guide".
If you elect to receive "The Computer Directory and Buyers'
Guide", please add $9.00 per year to your
subscription rate.
Please address all mail to:
Berkeley
Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160.
Postmaster: Please send all forms 3579
to Berkeley Enterprises, Inc., 815 Washington St .. Newtonville, Mass. 02160.
© Copyright 1973, by Berkeley Enterprises, Inc.
Change of address:
If your address
changes, please send us both your new
address and your old address (as it appears on the magazine address imprint), and
allow three weeks for the change to be
made.

4

Computers and the Intellectual Frontier
[T A]
7 The Path to Championship Chess by Computer
by Professor Donald Michie, Director, Department of
Machine Intelligence, Edinburgh University, Scotland
How a computer can probably be programmed to exceed
the talent of the best human chess players ...... and "if
we can find out how to program world championship chess,
then we can program anything."

Computers and Education
[T A]

10 Computer-Assisted Instruction Activities in
Naval Research
by Dr. Marshall J. Farr, Office of Naval Research,
Arlington, Va.
A report on some of the areas of computer-assisted
instruction in which the Office of Naval Research has
a strong interest in research and development.

Computers and Society
[NT A]
Project on Computer Databanks
by Professor Alan F. Westin, Columbia University, New
York, N.Y., and many associates
A summary of a nationwide factual study (under the
auspices of the National Academy of Sciences) of:
what the use of computers is actually doing to recordkeeping in the United States; and what the growth of
large-scale databanks, both manual and computerized,
implies for citizens' rights to privacy and the due
process of law.

18 Databanks in a Free Society: A Summary of the

14 The Social Responsibility of Computer Specialists

[NT A]

by Dr. Harvey S. Gellman, Toronto, Canada
How computer systems (and other technology) often
produce unexpected, troublesome, and even harmful
side-effects - wh ich are made worse by the nonprofessional attitudes of many computer specialists.
6 From "Computers and Automation" to
"Computers and People;'
by Edmund C. Berkeley, Editor, Computers and

[NT E]

Automation and People
How and why the time has come when a change in the
name of Computers and Automation should be considered, and be put into effect, gradually.

COMPU~ERSand

,AUTOMATION for January, 1973

The magazine of the design, applications, and implications of
information processing systems - and the pursuit of truth in
input, output, and processing, for the benefit of people.

Computer People and Aptitude Tests
31

Eight Photographs of a Bush: AnswersPictorial Reasoning Tests - Part 8
by Neil Macdonald, Assistant Editor
How close observation and common-sense reasoning
can lead to the answers to the pictorial reasoning
test published in the October 1972 issue.

[NT F]

Front Cover Picture

The Profession of Information Engineer and the Pursuit of Truth
33 President Richard M. Nixon, the Bay of Pigs, and
[NT A]
the Watergate Incident
by Richard E. Sprague, Hartsdale, N.Y.
How President Nixon lied in 1960 about the plans for
the Bay of Pigs Invasion, and is suppressing in 1972
the investigations of the Watergate Incident.

The front cover drawing, called
"Phropase", was produced by an
Algol 60 program, drawing straight
lines ax + by + c = 0, where a, band
c were "stepped arithmetically in
nested loops". The computer used
was an ICL 1904A, driving a Calcamp 1934/6 plotter. The programmer-artist is Nihan Lloyd-Thurston,
Kings Mill Lane, South Nutfield,
Surrey, England.

37 The Frenchman Who Was To Kill Kennedy
[NT A]
by Phillippe Bernert and Camille Gilles, L 'Aurore, Paris,
France; translated by Ann K. Bradley,

Computers and Automation and People
Engl ish translation of the f=rench newspaper report on
Jose Luis Romero, which was reprinted in French in the
December issue of Computers and Automation
[NT A]
40 Why I Distrust the Romero Story
by Robert P. Smith, Director of Research, Committee
to Investigate Assassinations, Washington, D.C.
The Romero report reprinted from L 'Aurore has many
earmar.ks indicating that it is very difficult to believe.
13 Unsettling, Disturbing, Critical
[NT F]
Statement of pol icy by Computers and Automation and People

Reference Information
23 Annual Index for Volume 21 (1972) of

[T R]

Computers and Automation
An index by author, title, and subjects, to the
thirteen 1972 issues of Computers and Automation

NOTICE
*0 ON YOUR ADDRESS IMPRINT
MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTE R
DIRECTORY.
*N MEANS THAT
YOUR PRESENT SUBSCRIPTION
DOES NOT INCLUDE THE COMPUTER DIRECTORY.

Departments
41

50
46
47
44
45

Across the Editor's Desk Computing and Data
Processing Newsletter
Advertising Index
Calendar of Coming Events
Monthly Computer Census
New Contracts
New Installations

Computers and Puzzles
32 Numbles
by Neil Macdonald

[T C]

36 Problem Corner
by Walter Penney, CDP

[T C]

COMPUTERS and AUTOMATION for January, 1973

Key
[A]
[C]
[E]
[F]
[G]
[NT]
[T)

-

Article
Monthly Column
Editorial
Forum
The Golden Trumpet
Not Technical
Technical
5

EDITORIAL

From nComputers and Automation"
. to nComputers and People"
1. Names

When this magazine was first published in 1951, it was
called "The Computing Machinery Field". That was a
time when many people were still searching for a short
name for "computers". The word "computer" at that
time always implied a human being computing, and not a
machine. The same view influenced the choice of name
of the "Association for Computing Machinery."
In 1953 this magazine changed its name to "Computers
and Automation," and has retained that name for twenty
years. These years have seen great changes in "the computing machinery field", which has become "the computer
field". A great deal of automation also has occurred, but
computers and not automation have occupied the limelight of public attention.
The three-syllable term "computers", it seems to me,
is still preferable to any of:
- data processing, five syllables, plebeian, more and
more out of date because much more is processed than just data;
- information processing, seven syllables, more accurate, but also incomplete because it leaves
out "idea processing", "artificial intelligence",
and other really important extensions of computer programming;
- "electronic data processing", nine sy IIables (clumsy),
having all the disadvantages of "data processing"
plus the disadvantage of "electronic" which implies omission of "optical", "magnetic", etc.;
- "automatic data processing''; nine syllables (also
clumsy), having all the disadvantages of "data
processing" plus the disadvantage of "automatic" which leaves out the essential contributions of human guidance, human adapting
to applications, etc.
It is interesting that the persons who tried so hard to nam{.
the field using an attitude of "keep your feet on the
ground" are the persons left behind - largely by the development of computer programs that express an ever
greater degree of reasoning, calculating, and sophistication.
2. Substance

A great many of the important technical computer
problems of the last 20 years have been largely solved; a
great many of the important social computer problems are
very much unsolved.
For several years it has been evident that the most important field of unsolved problems related to computers is
the field of the relations of computers to people. To name
just a few of these problems:
-

privacy and computers
monopoly and computers
crime and computers
electronic warfare and computers

-

medicine and computers
traffic control and computers
antiballistic missile systems and computers
urban problems and computers
the side effects of computers upon society
the prevention of doomsday and the application
of computers thereto
3. Policy

As we have said before, we believe that the profession
of information engineer includes not only competence in
handling information using computers and other means but
also a wide responsibility towards people, a professional and
engineering responsibility. This includes making sure of:
- the reliability and social validity of the input data;
- the correctness of the processing; and
- the reliability and social validity of the output
results.
in the same way, a bridge engineer takes a professional
responsibility for the reliability and significance of the
data he accepts and uses, and the safety and efficiency of
the bridges he constructs on which human beings will cross
chasms risking their lives.
Accordingly, as our readers know, we often publish
articles and other information related to socially useful input and output of information systems. We seek to publish what is unsettling, disturbing, critical - but productive
of thought and a better and safer earth for all humanity to
live in - the fragile spaceship in which our children and
future generations may have a future instead of facing
extinction.
The professional information engineer needs to relate
his engineering to the most important and most serious
problems in the world today: war; nuclear weapons; pollution; the population explosion; the frightening economics
of growth; widespread deception; and much more. In fact,
an especially serious and troublesome problem is systematic
misrepresentation, deception, and lying by vested interests
- a problem we focus on.
4. Name Change

In recognition of these facts and this policy, we have
decided that the time has come when "Computers and
Automation" will change its name to "Computers and
People", in a gradual process using an intermediate name
"Computers and Automation and People" - for short,
"CAP" instead of "C&A". To change the name is reasonable and seems necessary and desirable; to change
gradually seems much better than to change abruptly.

E:~C.~
Edmund C. Berkeley
Editor
COMPUTERS and AUTOMATION for January, 1973

The Path to Championship Chess By Computer
Professor Donald Michie, Director
Dept. of Machine Intelligence
Edinburgh University
Edinburgh, Scotland

"If we could program world championship chess, then we could program anything."

Based on a,l article "Programmer's Gambit" in The New Scientist for August 17, 1972, an international weekly review of science and technology, 128 Long Acre, London we 2, England, and
reprinted with permission.

Has something gone wrong with computer chess? If
so, what? In a recent New Scientist article (20 July
1972, vol. 55, p. 134) Peter Wason discussed the psychology of the game. He also referred to computer
chess programs and, with an element of courteous understatement, observed "they are certainly below master strength."
The first point to remark is that the task is far,
far more difficult than some early optimists supposed
-- so much so that quite radical advances in machine
intelligence, not just in programming and hardware
technology, are required if chess programs are ever
to break through to master play.
The "Grandmaster Barrier"

The reasons for what may be called the "grandmaster barrier" are connected with powers of abstraction,
generalisation and learning, all of which are still
absent from tOday's chess programs. Chess at master
level makes such searching demands on these abilities
that it offers a life-time's dedication for outstanding intellects. Hence, although it has been one of
the earliest task domains to be chosen for machine
intelligence studies, chess remains one of the most
illustrative and one of the most elusive. The distinguished applied mathematician, I. J. Good, himself
an expert chess player, believes that when a chess
program has been developed capable of defeating the
world champion, we shall be no more than five years
away from the appearance of the "ultra-intelligent
machine", intellectually superior to man in all departments of thought. While supporting Good's evaluation, I would prefer to phrase it in other terms and
to say that if we could program world championship
chess then we could program anythingl

COMPUTERS and AUTOMATION for January, 1973

It is possible to take up two exaggerated and opposite positions concerning contemporary chess programmes. Both are mistaken.
Position 1: The attempt to match human intellectual
skill across the chessboard has failed.
The Current Strength of Computer Chess

Hubert Dreyfus, the Rand Corporation mathematician, pronounced a few years ago that no computer
could play even amateur chess. He was challenged to
play against the Greenblatt chess program and was ignominiously defeated. This program is one of those
which regularly take part in American tournaments, including tournaments restricted to computer programs.
Two other programs of similar playing strength are
those of Atkins and Slate and of Gillogly, currently
rated around 1400 to 1500 on the US Chess Federation
scale which is calculated on the basis of past tournament performance. Table 1 may be of help in calibrating this scale. Bobby Fischer's last USCF rating was 2824, the highest ever awarded.
Position 2: Computer programs will attain grandmaster rating in the near future.
Those who hold this position usually believe that
it is simply a matter of developing and extending
present-day principles of chess programming, aided
by the continued rapid growth of hardware speeds and
storage capacities of computers. This second position is wrong for more subtle reasons than the first,
and cannot be dismissed so cursorily.
Chess Knowledge

Consider the following two apparently unrelated
facts:

7

1. Not one of the three leading chess programs occupies more than 20,000 locations of computer memory
(by this I mean "fixed" memory, not the working space
occupied for transient periods by the intermediate
products of calculation). Stanford Research Institute's program for planning a robot's movements occupies more than five times this number.
2. Although for the past century or more chess games
at grandmastet level have usually ended in draws,
Bobby Fischer recently won 19 consecutive games
against grandmasters.
The interpretation which some chess experts place
on the second fact is that Fischer has discovered new
areas of knowledge about chess, and in some sense has
a deeper understanding of the game than his opponents.
I have put emphasis upon "knowledge" and "understanding" because these words give a clue to the extraordinarily small machine memory space occupied by all
the above-mentioned chess programs. When we look inside these programs we find virtually nothing there
which corresponds to "knowledge" or "understanding".
What we do find can best be described as a finely
tuned mechanism for making the best possible job of
playing chess without knowing anything about the game
or understanding what one is doing.
Table 1
THE PERFORMANCE OF THE BEST
CONTEMPORARY CHESS PROGRAM

Bobby Fi scher

Machine Intelligence

Chess i like any other highly developed intellectual sk 11 in that it can be subdivided into two
categories
1. What the player knows, and
2. What he can do with this knowledge.
These two subdivisions mirror very clearly two
areas of machine intelligence research in which progress has and has not been made. Virtually all the
progress before 1970 was concerned with category (2),
i.e. with the mechanisation of processes of search
and deduction whereby the direct implications of category (1) may be efficiently extracted. Category
(1) itself, in the machine intelligence context, is
concerned with finding principles whereby large
bodies of knowledge may be represented in the machine
in forms sui table: for indirect and analogical reasoning; for the formation of new generalisations; and
for the automatic modification and extension of the
"knowledge base" via learning processes.
In the 1950s and 1960s little progress was made
with category (1). Hence experimental programs, for
chess as for everything else, necessarily took the
form of "toy systems" in which all the program's ingenuity went to extracting the most out of a minimal
repertoire of stored facts. We have seen that in the
case of chess such facts might be (a) the rules of
chess, (b) evaluation rules which can say of any two
board positions "this one is probably stronger than
that", and (c) stored "book" openings.

28

International grandmasters

26 to 28

International masters

23 to 26

American masters

21 to 23

Expert players

19 to 21

Strong amateurs

16 to 18

Best chess program
Most amateurs

15
up to 14

The figures are the U.S. Chess Federation rating
scale with 00 omitted. This scale is calculated on
the basis of past tournament performance.

Figure 1 Two chess
positions conforming
to a single relational
description (see text).
White has the move

Look-Ahead

This mechanism is essentially that of looking
ahead along a tree of possibilities, evaluating the
terminal nodes of the look-ahead tree according to
some "evaluation function", and then "backing up"
these values to the root of the tree by a process
known as "minimaxing". The various branches at the
root correspond to the immediately available moves;
the backed-up values associated with these branches
are used as the basis for selecting the next move.
The only chess "knowledge" is that contained in the
legal move generator (i.e. knowledge of the rules of
chess), in the evaluation function itself, and in
stored "book" openings (where these are employed).
Such knowledge is a grain of sand beside the mountains amassed even by amateur players, and it is a
tribute to what can be accomplished by the look-ahead
process, and by sheer brute-force calculation, that
these chess programs can hold their own at all. Of
course, if their authors knew how to program some of
the missing knowledge into the machine they would do
so.
8

Chess Theorems

Why should we not add to this bare cupboard the
good things which make a chess master what he is,
COMPUTERS and AUTOMATION for January, 1973

,)

starting with the vast mass of trite chess theorems,
such as:

and sequences of schemas ("themes", "main variations"), resorting to detailed look-ahead, for which
the human brain is ill-equipped, only when he has to.

"Bishops cannot attack squares of opposite
colour."
"A piece blocking an enemy isolated pawn is
safe from pawn attack."
"King and Rook against King is a won game."
and going on to deeper theorems and postulates which
separate the expert's knowledge from the club player's, the master's from the expert's, and the grandmaster's from the master's? After all, a great deal
even of this last and highest body of knowledge is
explicitly recorded in the published chess literature. Why not just put it all into the machine?
The short answer is that the problem of how to
represent knowledge (whether of chess or of any
other complex and ill-structured domain) in machineoriented form is the focal question for machine intelligence research in the 1970s; although intensive
studies are now under way, and preliminary gains have
been reported, we must expect to wait awhile before
the front decisively cracks.
Computer Language for Salient Features

The heart of the problem is concerned with description -- with the development of computer languages and notations with powerful facilities for
describing the salient and significant features of
any situation. Let us try an impressionistic sketch,
using both chess and non-chess examples, of some of
the issues involved.

Relational Descriptions

A compact notation for descriptions of the kind
shown is given by the use of "relational structures"
illustrated graphically in Figure 2. Note that such
a description typically covers many positions, and a
second position is shown, Figure 1 (b), which also
conforms to the scheme of Figure 2. In the case
chosen for illustration they do indeed have much in
commonj in both cases white can mate taking advantage
of two pins. Moreover, this notation extends in a
natural and easy way to all the usual basic concepts
-- "forks", "blocks", "discovered checks" and so
forth.
OR

OB~OR

\~

08 Figure 2 A relational
description of the
chess positions of
Figure 1 drawn as a
labelled directed
graph (White in italics;
black in bold type)

\

KR

\ u'~::~K

K -KKtP .KR'

\

'KKtP

Key: _

Defends

===> Attacks
_ _ Pins

-- - ~ Can check

Not only do descriptive schemes of this kind correspond intuitively to the way in which chess positions are grouped for purposes of recall or for the
specification of sub-goals. They are ·beginning to
playa prominent part in mechanisation techniques in
areas of machine intelligence superficially unrelated
to chess.

Figure 1 (a) shows a chess position, and we wish
to describe it. The exhaustive specification of
where every piece is has no use beyond the calculation of the tree of possibilities for look-ahead purposes. If we want to think in a broader style about
the position we need a broader style of description.
The use of a few relations between pieces with a more
or less conventional notation might give us something
like Table 2. (Pieces belonging to the side with
the move -- white -- are shown in italics, black
in bold)

o

Scene

/l "'"

O~O~O

,,\/
Qarick

Table 2
PINS, ATTACKS, DEFENSES, POSSIBLE CHECKS
pins OB
pins KKtP
defends QR
can check K
OR attacks QB
KR attacks KKtP
K defends KKtP
K defends OS
K defends KKtP
OR defends KR
KR defends OR
OR can check K
KR can check K
KR
QB
QB
QR

We might or might not wish to add, for some purpose
or other, information concerning certain key pieces,
such as "WK on KRl".
The important thing is that a schematic description of this kind defines a large class of positions
the members of which are hopefully (if the descriptors have been well chosen) "essentially" similar to
each other. The chess master reasons about schemas
COMPUTERS and AUTOMATION for January, 1973
'\

I

Key:

Figure:5 Graphic
notation analogous
to that in Figure 2,
applied to a visual
object

--+-

==>
~

Part of
Supported by
Kind of

Figure 3 depicts relational descriptions, using
essentially the same graphic notation, not of chess
positions but of visual scenes. These structures are
manipulated by a computer program written by Pat Winston and others at MIT. Its task is to construct descriptions of s~enes inspected through the television
camera. The figure shows a number of objects all
conforming to the description for ARCH. The program
can be "taught" to improve its descriptions by being
shown examples and counter-examples.
The entire program occupies many times more computer memory (again, we are speaking of program
space, not workspace) than the chess programs. Winston's task is an intrinsically easier one than
theirs, but his program approaches it in a much
deeper fashion. What are the prospects of introducing a similar degree of depth into the approach to
computer chess, and what are the likely consequences
of doing so?
(please turn to page 36)

9

Computer-Assisted I nstruction Activities
in Naval Research
Dr. Marshall J. Farr
Office of Naval Research
800 No. Quincy St.
Arlington, Va. 22217

'The computer is infinitely patient, and its programs can represent the
teaching approaches and knowledge of the best minds in pedagogy."

Computer-Assisted Instruction (CAl) refers to the
use of the computer for instruction, i.e., as a
means of presenting material to, and interacting
with, astudent. Navy activity in this domain is directed toward utilization of the computer to provide
adaptive, individualized instruction of the highest
quality. Because computer technology and its programming arts are already so advanced, and are continuing to progress so rapidly, on-line interactive,
man-computer communication need not be stilted and
impersonal.
Advantages and Limitations

Research in CAl indicates that some students relate better to an interactive computer than to a human instructor. And, of course, a computer is not
subject to human frailties. Modern time-sharing
computers are highly reliable, work overtime without
complaint, and never go on strike. Moreover, the
computer is infinitely patient, and its programs can
represent the teaching approaches and knowledge of
the best minds in pedagogy as well as in diverse
subject areas.
Despite the many advantages of CAl it should be
recognized that the computer's tutorial effectiveness is limited by what we still do not know about
basic learning processes, about why we learn, how
we learn, how we remember, and how we integrate bits
of knowledge into a coherent whole.

man-computer relationship in which either party can
take the initiative, i.e., ask and answer questions
and engage in discussion. The Bolt, Beranek and
Newman approach with SCHOLAR generates the computer
dialogue out of a data base that is a complex but
well-defined structure in the form of a semantic
network of facts, concepts and procedures. A semantic information structure or network is an organization of units of information in terms of their
meaning and mutual relationships. In contrast, when
a network is based on how words are organized sequentially or grammatically within a sentence, it is
serving as a syntactic structure.
SCHOLAR is different from the traditional approach to CAl, which may be considered to be frameoriented. In such a system, a frame (each single
display presented to the trainee) is constructed out
of specific pieces of text, specific questions with
their predicted answers, errors and anticipated
branching. All frames in this kind of system are
entered in advance by the teacher or programmer.
In such a system, the student is capable of little
or no initiative, and must communicate with the
computer in a relatively restricted form of language. And the teacher has the burden of preparing
questions, answers, and branching strategies. Here,
the system controls the student; but it is incapable
of real initiative or decision power of its own.
Information-Structure Oriented

These kinds of questions have been the subjects
of investigations sponsored by the Office of Naval
Research and directed toward the advancement of CAl
technology. These studies shed light on such aspects as individual differences in learning and
means for identifying and taking advantage of an
individual's unique aptitudes and abilities, while

~~~ n.Lt~~~a~ n.L:I'lh~ s ~esire,t~ _1 ~~~~: _, ~_? ~ ~t~~~, ~~;~~,
\JM~

.........n.. . . . . . . .

~~

0';"

1l1U\.dl

l"VJl\.d:;J.I1CU

v¥J.I.;U

t;l\.pJ.V.LJ.JJ~

the learning process as with controlling it.
Mixed-Initiative Dialogue

Under ONR sponsorship, Dr. Jaime Carbonell of
Bolt, Beranek and Newman is pursuing research with
a system called "SCHOLAR," which is characterized
by a mixed-initiative dialogue between learner and
computer. The term mixed-initiative indicates a
Reprinted with permission from Naval Research Reviews, vol. 25, no. 9,
September, 1972, published by the Department of the Navy, Office of
Naval Research, Arlington, Va. 22217

10

In contrast to a frame-oriented system, SCHOLAR's
semantic network system represents what Carbonell
calls an Information-Structure-Oriented (ISO) approach. The network allows SCHOLAR to generate the
material to be presented to the student in reasonably natural conversational English. In its present
implementation, the experimental program, which uses
Dr. Marshall J. Farr is Director of the Personnel
and Training Research Program in the Psychological
Sciences Division of ONR. He also has served as
Assistant Director of ONR's Engineering Psychology
From 1960-1964, he was a Research PsyProgram.
chologist at the U.S. Naval Training Device Center,
then located at Port Washington, New York.
Dr.
Farr has taught in the Psychology Departments of
Fairleigh Dickinson University and the New School
(formerly the New School for Social Research) in
New York City.

COMPUTERS and AUTOMATION for January, 1973

South American geography as its subject, is aimed at
reviewing the student's knowledge in this field.
But it is being designed with a good degree of modularity in both program and data base, in order to
assure ready generalization to many other examples
and fields of application. A good description, with
illustrations of the way SCHOLAR works, is contained
in Carbonell's article in the October 1971 issue of
Naval Research Reviews. Carbonell will shortly begin to evaluate the instructional merit of the full
mixed-initiative capability as compared to a reduced, less interactive, version of SCHOLAR. Both
versions will operate on the data base.
Performance Training

Dr. Joseph Rigney, who directs the Behavioral
Technology Laboratories at the University of Southern California, has been working on a method for
computer-assisted performance training, using a
computer time-sharing system to help trainees to
learn serial tasks, from operating equipment to
electronic troubleshooting.
TASKTEACH is the generic name of two large computer programs for this tutorial system. TASKTEACH
provides the student with variable amounts of learning support, as he requests it, to help him organize
the material and the processes which lead to mastery. During each learning session, TASKTEACH continuously updates the history of the student's
progress and the state of the equipment or task
structure that it is simulating. Thus it can generate responses to the student from this updated information. TASKTEACH logic is made specific to a
particular equipment or task structure by relatively
short lists which describe elements and relationships among them in sufficient detail for the simulation. These lists replace the conventional,
frame-by-frame description of the typical CAl instructional sequence.
Trou bleshooting

To use TASKTEACH to learn to troubleshoot electronic devices from front-panel controls and indicators, the student selects a course, e.g., on the
AN/SPA-66 radar repeater, and enters a problem number. This directs the program to simulate a failure
in a particular circuit of the equipment. The computer then describes to the student, during its interaction with him, those front-panel indicator
symptoms that the malfunction would produce. The
student proceeds to collect symptoms from indicators
by manipulating the front-panel controls in patterns
that will (1) make particular kinds of information
visible on each indicator when the equipment is
functioning normally, and (2) uncover all possible
symptoms of abnormal functioning. The student can
do this symptom-collecting in any order he chooses.
He is not constrained to a fixed procedural sequence. Furthermore, he can either ask for only one
type of information at a time, or he can make a
whole series of front-panel tesLS by entering a list
of indicators and control settings in one input message. By using some of the commands in TASKTEACH
that give him detailed knowledge of results, and
that allow him to "look -ahead" and test hypotheses
about the malfunction, the student 'can learn about
the effectiveness of each test he makes, and can increase his knowledge of possible causes of symptoms.
In this way, he can learn to improve his troubleshooting strategy.
"Backwards Troubleshooting"

The student can also ask the program to "insert"
a known malfunction in the equipment. He can then
COMPUTERS and AUTOMATION tor January. 1973

test his knowledge of the symptoms it would produce
by attempting to predict the indicators and the
types of information displayed by each, as they
would be affected by this known malfunction. The
program wi 11, in thi s "backwards troubleshooting"
mode, evaluate the student's predictions and correct
those that are wrong.
Since equipment like the AN/SPA-66 radar repeater
and the AN/URC-32 radio transceiver have from 20 to
40 front panel controls that have to be set in the
right patterns before symptom information is visible
on an indicator, the student must, of course, learn
these patterns. The troubleshooting section of
TASKTEACH not only corrects the student's incorrect
patterns, but also includes a provision for drill
in making these settings. The student can select
the particular information he wants made known by
some indicator. He then instructs the computer to
set the controls in the correct pattern, and is
given error-correcting knowledge of results by the
program. The student can run through a series of
these drills any time he chooses, in conjunction
with a troubleshooting session.
Goal-Action Hierarchies

In addition to the troubleshooting program, TASKTEACH includes a program to help students learn
other types of task structures. Radio operators,
for example, could learn how to tune the transmitter
in the AN/URC-32, or how to set it up in a particular one-of-five "receive modes." Similarly, a mechanic could learn how to disassemble, repair, and
reassemble a mechanical device such as a carburetor.
As indicated earlier, this program is made specific
to a particular task by list-structures which describe goals, subgoals, actions, and constraints
that specify the ways these elements are organized
sequentially. Since almost all human work can be
described in terms of goal-action hierarchies, this
part of TASKTEACH is potentially widely applicable.
The TASKTEACH programs were designed to be used
with a variety of terminals, including on-line
front-panel simulators analogous to those currently
being used by IBM for their in-house computer maintenance training. However, these programs currently
are used with teletypes or alphanumeric CRTs and
random-access slide projectors under program control. The projectors are used to display color
photographs of controls and indicators on the particular equipment that is the subject of the training.
In summary of TASKTEACH, it represents a capability which provides a number of learner options, and
which can be used in a number of different ways or
modes. The student need not have control over the
learning-support functions. They can be made automatic, left to the instructor to control, or, with
a little additional programming, they can be made
part of an adaptive scheme. In a similar way different kinds of troubleshooting strategies could be
included as models for the student to learn.
CAl Course in Computer Programming

Professor Richard Atkinson. Chairman of the Psychology Department at Stanford University, has been
in charge of administering a CAl course in computer
programming at Di Anza College (a junior college
near Stanford) and at UCLA. Students receive college credit for this course, which was originally
developed with support from NASA Ames. For this
ONR contract, Atkinson and his staff have been designing data-collection routines to measure student
11

performance at frequent intervals during the course.
In addition, the program has been constructed so as
to analyze a student-written program to see if it
will run on the computer. If not, the instructional
program assists the student in debugging his own
material.
The computer program for this course allows the
learner to control what material is displayed to
him, as well as his rate of learning. As the student goes through the course, his response history
is recorded automatically in terms of how frequently
he requests reviews, how long he devotes to various
items and modules, how rapidly he responds, and so
on. The Stanford group will analyze the dominant
patterns of learner behavior, and correlate each
individual's response-history with his course
achievement. The findings will be examined to determine such things as the best time to branch, to
repeat material, and to provide feedback to the
student.
In the next phase of this research, two additional CAl modes will be tried. Their structure will be
based on the recommendations for optimal patterns of
presentation, review, feedback, etc., toward which
the research on the ongoing learner-controlled CAl
wi 11 lead.
Best Instruction Strategies?

Why is the mode of learner-controlled instruction
a model from which optimal instructional strategies
can be derived? When the student performs at his
own rate, he is not constrained by a program. In a
sense, he automatically selects what is most motivating to him, what he feels he needs and wants to
learn. Learning might really turn out to be funo
Good students can tackle complex problems and can
concentrate on conceptual rather than computational
matters. But most of all, who knows better than the
pupil himself what he is ready to learn next, and
when he is ready? After all, learning takes place,
in the final analysis, between the ears.

.

Now, returning to Atkinson's work: The first additional mode, a response-insensitive one, will be
a straight-line, completely canned course. This
means that what is presented to the learner will be
inflexible, and completely independent of his responses.
The second additional mode involves a responsesensitive program, which contains the necessary
logic to branch (e.g., for enrichment or remedial
purposes) based on the student's ongoing course
achievement and his pre-course knowledge base.
Here, although the computer program tailor-makes
the instruction provided to each student, based on
continually-updated course-achievement information,
the learner has no option to tell the program how
he would like it to interact with him, or what he
would like it to offer.
After these three different modes of CAl have
been implemented, they will be compared with each
other in terms of learning speed and quality. Each
student's performance will also be examined in relation to certain personality characteristics: for
example, to see whether certain types of individuals
habitually do better in a highly structured, nonpermissive learning environment.

range of research efforts. Hedl, in his doctoral research under the contract, has demonstrated the
feasibility and validity of an interactive approach
to the individualized assessment of intelligence.
Test items from the Slosson Intelligence Test, developed in 1963, were individually presented on a
CRT. Students typed in their answers for immediate
computer evaluation. The answer-analysis algorithm
was based upon a key word/phrase dictionary for each
item, which was developed from previous test-item
protocols. The computer in this case, for the first
time, was used for automatically administering an
intelligence test, and for reaf-time response-evaluation. If a student's answer was either correct or
incorrect, the program moved to the next item. If
the answer was interpreted as partially correct, the
computer instructed the student to explain more fully his response. If time limits for a given item
were exceeded, the computer asked the learner to
"please answer the question or type pass," and then
gave him another chance at the question. If time
ran out again, the item was scored as wrong, and the
program went on to the next item. The computerbased version of the Slosson Intelligence Test was
experimentally compared with the oral administration
of the traditional Slosson Test, as well as with
the Wechsler Adult Intelligenc~ Scale (WAIS). The
computer-based Slosson Intelligence Test correlated
.75 with its traditional version. Equivalent concurrent validity relationships with the WAIS, for a
college population were: a .54 correlation between
the WASI and CB-SIT; and a .52 correlation between
the WASI and the traditional SIT.
Anxieties

In other studies under this'FSU contract, measures of both "trait anxiety" and "state anxiety"
were taken of students engaged in learning mathematical material in a CAl mode. According to Dr.
Charles Speilberger of FSU, who first conceptually
differentiated these two anxiety conditions, "trait"
anxiety represents the anxiety potential or proneness of an individual, or in other words, how likely
he is to develop anxiety in situations commonly
thought to provoke it. On the other hand, "state"
anxiety is a temporary, transitory condition of
actual apprehension and heightened autonomic nervous system activity. The common psychological test
for measuring anxiety, the Taylor Manifest Anxiety
Scale, seems to measure trait anxiety, even though
Taylor, its author, propounded.a theory based on
state anxiety. Taylor never conceptualized two
different dimensions of anxiety.
The CAl math learning investigations showed that
high state-anxiety students make more errors on the
difficult learning material than do low state-anxiety learners. On the easier material, both stateanxiety levels did equally well. The trait-anxiety
level was not found to be related to performance.
Further FSU work on the effects of trait and
state anxiety on CAl performance is more complicated, combining the types of anxiety with types
of material (non-technical vs. technical) and various types of responses the subjects are called upon
to make. Results here have been difficult to interpret because of interaction effects. More research is planned in this area.
Curiosity?

Assessment of Intelligence

A Florida State University (FSU) investigation in
CAl was established as part of the THEMIS program.
Because of this heritage, it deals with a broad
12

The FSU researchers conceptualized curiosity as
also being either trait curiosity or state curiosity. A "State Curiosity Scale" (SCS) was developed
to measure this type. Since curiosity is a motiCOMPUTERS and AUTOMATION for January. 1973

vational construct, it can aid in stimulating the
acquisition of knowledge or skills (which is, after
all, the aim of all training). The particular type
of curiosity studied by FSU, that most relevant to
the learning process, was given the fancy name of
epistemic curiosity, which merely referred to knowledge-seeking curiosity behavior. Research by FSU
indicated that, when levels of curiosity are high,
levels of anxiety are low. Given the debilitating
effect of high-anxiety on performance and mental
functioning, it can readily be seen that maximizing
curiosity to minimize anxiety has definite implications for an optimal learning environment.
Computer-Managed Instruction

Project ENRICH, another major FSU research director, refers to a CAI/CMI effort undertaken by the
Naval Reserve Training Facility (NRTF) in Tallahassee with the very close support of the FSU CAl Center. What is CMI? It stands for Computer-Managed
Instruction, and, in contrast to CAl, refers to the
off-line use of the digital computer to collect and
analyze data about a student's cumulative performance and session-to-session learning progress, and
then to diagnose his learning problems and make
individualized decisions with regard to the optimum
next learning step for the trainee. In CMI, then,
the computer is not in the loop with the learner;
rather, it serves as a record keeper, test scorer,
decision-maker, and selector of appropriate remedial
material.
Although CMI can playa valuable role in the instructional domain, the technology behind using a
computer mainly to store information and process
data is not really central to instructional psychology or the tutorial side of education. The FSU research involved both CAl and CMI, in that it focused
on using the computer to manage the training of, and
do some instruction for, Seaman Recruit Reserves in
the subject of Basic Military Requirements (BMR).
The material programmed on the computer by the NRTF
was taken from the Test Manual of the BMR Correspondence Course for advancement to pay grade E-2.
Part of the material was taught on a CRT display
under computer control. Part was monitored self
study, assigned by the computer, and part was homework to read selected BMR chapters or to complete
Correspondence Course assignments. The effectiveness of the program was determined by comparing the
performance of the Seaman Recruits trained with CMI
procedures to that of recruits of comparable ability
who were conventionally trained at NRTF, Tallahassee,
during previous years. The main measure of performance achieved was the Standard Navy Advancement Examination for Seaman Apprentice. Unfortunately, although 30 Seaman Recruits were requested, only six
were made available. Although their average score
on the final exam was no better than the average of
the Seaman Recruits in the comparison group, they
reached this level of achievement in about 33% less
time.
Project ENRICH has demonstrated the potential
value of computer-aided instruction and management
in training Naval Reserve personnel. The results
suggest that it would be worthwhile to carry out
more definitive studies to determine the range of
useful application of computer-assisted procedures
in various types of Navy training programs.
Assessing Effectiveness

There are several directions in CAl that could
usefully be emphasized in the future. To permit
optimum utilization of the computer for instruction
(rather than merely use it as an automated textCOMPUTERS and AUTOMAliON for January. 1973

book), it is desirable to develop improved methods
for assessing learning progress and adjusting the
pace of the computer teaching process accordingly.
Learner control of the tutorial process would take
into account the fact that the student himself may
very well know better than anyone else when he is
prepared to tackle the next task. Research is also
required to show what types of information and
skills can best be taught by computer, and to determine to what extent the costs involved can be amortized through many additional uses of the computer
both ashore and onboard ship. Examples are record
keeping, job aids, instant technical manual update,
and the like. The possibility of using satellites
for remote-source instructional input to the computer on a ship should also be investigated.
Another effort which could be pursued with advantage would explore the use of the visual-display
capabilities of computers in CAl. Computer graphics
might allow evaluation of the extent to which "one
picture is worth a thousand words" in a particular
pedagogical process. The computer can, among other
things, show three-dimensional representations, move
complex figures through space, and depict the flow
of electricity in electronic circuits.
Finally, there is need to evaluate the instructional effectiveness of CAl relative to conventional
approaches. CAl, used in its most flexible way -interactively, with learner control -- calls for a
continual restructuring of content to adapt in real
time to a students' needs and abilities. In comparisons of this approach to older methods, new
kinds of base-line criteria may be required. Obviously, cost, although not an instructional criterion, will ultimately be a significant consideration.
0

Unsettling, Disturbing, Critical
Computers and Automation, established 1951 and
therefore the oldest magazine in the field of computers and data processi ng, believes that the profession of information engineer includes not only
competence in handling information using computers
and other means, but also a broad responsibility,
in a professional and engineering sense, for:
-- The reliability and social significance
of pertinent input data;
-- The social value and truth of the
output results.
In the same way, a bridge engineer takes a professional responsibility for the reliability and
significance of the data he uses, and the safety
and efficiency of the bridge he builds, for human
beings to risk their lives on.
Accordi ngly, Compu ters and Au tomati on publi she s
from time to time articles and other information
related to socially useful input and output of data
systems in a broad sense. To this end we seek to
publish what is unsettling, disturbing, critical
-- but productive of thought and an improved and
safer "house" for all humani ty, an earth in whi ch
our chi ldren and later generations may have a future, instead of facing extinction.
The professional information engineer needs to
relate his engineering to the most important and
war,
most serious problems fn the world today:
nuclear weapons, pollution, the population explosion, and many more.

13

The Social Responsibility of Computer Specialists
Dr. Harvey S. Gellman
DCF Systems Ltd.
74 Victoria St.
Toronto 210, Ontario, Canada

"We must recognize that the computer specialist that develops a system used by the
public will certainly affect the pUblic. ... The unfortunate thing about technology
is that the adverse effects tend to show up too late."

I would like to begin this article by asking a
question: Can you, the reader, identify any connections or similarities among the following items?
Item 1. The New Yorker magazine in its issue
of November 21, 1970 1 bemoaned the fact that
the wondrous diversity of strange names in
a big, broad and once generous country like
the United States was being squashed by
the computer. It refers to ominous signs that
people with long names now face censorship by
truncation -- at least, in New Jersey. The
magazine describes a letter received by an
individual from the Assistant Director of the
New Jersey Division of Motor Vehicles. Part
of the letter states that " ..• because of space
limitations, our electronic equipment cannot
produce your name on your license in the exact
manner you have requested. Only one first
name of not more than nine letters, one middle
initial and a surname of no more than thirteen
letters can be printed on the driver license
or registration certificate.
" ••• there are lengthy names which cannot be
printed in their entirety. In these cases,
the last letters will be abandoned."
Item 2. A few years ago, I went to the Toronto
Airport to meet my son who was returning from
New York. When he was not among the arriving
passengers on his scheduled flight, Iwent to
the airline agent to find out whether he was
booked on the next flight. The airline agent
was able to press a few buttons on the keyboard of the computer terminal and within
seconds was able to tell me that my son was on
the next flight and would be arriving within
the hour. I found that computer service useful and impressive.
Item 3. About two years ago a Federal Government department in Ottawa hired a new employee
to fill an important engineering position.
This man refused to apply for a Social Insurance Number because he felt that it would reduce his worth as a human being. The man's
boss tried to help him achieve his objective,
only to learn that if a Social Insurance Number was not issued, the man could not participate in the Federal Government's pension
plan. After a lengthy exchange of correspondence and noble efforts, the boss finally decided to issue a special number on behalf of
the man (without the man's knowledge) to prevent the loss of pension benefits.
Based on a talk before the Toronto Section of the Canadian Information
Processing Society. November 1972
14

Item 4. The Apollo space missions would not
have been feasible without computers.
Item 5. About a year ago, a newspaper account 2
told of a man who never had an oil company
credit card, but kept receiving bills from the
company. He wrote several letters to the
company, but his letters to the credit department went unanswered and the newspaper quoted
his as saying, "It is as if I were not writing
to anyone at all."
Similarities or Connections?

Now, let me repeat the question I asked at the
beginning. Can you identify any connections or similarities among the items I have just described?
Are there any common threads that link them? You
will probably be able tospot several common threads,
but I would like to select two:
• First, computers can have profound effects on
people; and these effects can be beneficial
or harmful.
• Second, excessive emphasis on a systematic
approach and a careless use of computers can
erode our humanity.
My objectives in this article are:
• to discuss some effects of computers;
• to show that computer specialists play a dominant role in determining how computers affect
people; and
• to discuss the computer specialist's responsibility to society.
Because of the computer's awesome speed Clnd power,
many people are beginning to realize that huge files
containing information about people can be assembled,
and they can influence us in profound ways. For example, we are not too far away from being able to
Harvey Gellman is President of DCF Systems Ltd., a
company of management consultants that specializes
in computer information systems. He holds a Ph.D.
in Applied Mathematics from the Uni versi ty of Toronto. DCF Systems is the Consulting Division of
AGT Data Systems Ltd., of which Dr. Gellman is a
Vice-President a nd Director. Dr. Gellman ha s
served onmany national and provincial government
commissions, and held positions of leadership in
the management consultant field. In 1966 he was
named winner of the International System Award of
the Association for Systems Management, the first
Canadian to be so honored.
COMPUTERS and AUTOMATION for January. 1973

have a credit card computer system that could know
when Mr. Smith entered a highway, where he got off,
what he bought at the liquor store, who paid the
rent for the girl in apartment 4B, and the hotel at
which Mrs. Smith spent the rainy afternoon last Sunday. Does this sound farfetched? It is not!

But I believe that it is important to insure
a personal identification number is not adopted
Canada either wilfully or by default, without a
examination and public debate of its merits and
tential adverse consequences.

that
in
full
po-

Some Canadian History
Stolen Credit Cards

Mr. Milton Lipson, the vice-president in charge
of corporate security at American Express, is proud
of his computers and especially proud of their ability to track people who use stolen or invalid cards.
He claims and can demonstrate that his system can
track a person using a 'flagged' credit card with a
time delay of less than twenty-four hours. 3
Some of you may recall the news reports last
year when Yves Geoffroy asked for and was granted
Christmas leave from a Canadian Federal penitentiary
to marry. Geoffroy decided not to return to prison
but his use of an American Express credit card led
police to his hideaway in Spain. 4 My reason for
telling you this is not to steer those of you who
want to steal with credit cards away from American
Express and towards another credit card. I merely
want to demonstrate that today's computers are capable of keeping track of our actions.
Valid Credit Cards

In passing, I might ask, isn't it ironical that
the American Express Company has a more effective
computer system to handle its stolen credit cards
than to handle its valid credit cards? In fairness,
I should add that the American Express billing system is much better today than it was two years ago
and appears to be improving steadily.
Some people say that an honest person does not
need to worry about a computer's ability to track
him, or about the existence of massive computer
files containing information about him. But who is
to say what constitutes honest or proper behaviour?
The things we do today may be considered acceptable
today, but will they also be acceptable ten or twenty years from now?
Blacklists

For example, there were many talented and creative people in the United States during the depression years who were attracted to communist organizations because their failure to find employment led
them to become disillusioned with the free enterprise system. In the early 1950's, some of these
people found themselves "blacklisted'" and unable to
find work because of their earlier political affiliations. And yet in 1972, the President of the United States visited Communist China and all the writers and actors who were formerly "blacklisted'" are
now absolved of their old "crimes".
Unique Personal Identification Number

Some computer specialists I have spoken with are
not concerned about the introduction of a universal
personal identification number and many are advocating that the Social Insurance Number should be
used in Canada for this purpose. They argue that
if a unique personal identification number were
available and used widely in Canada, there could be
economic benefits from using these numbers to exchange data among various governmental and commercial organizations, such as credi t bureaus, chartered
banks, etc. I expect to see increasing pressure
from commercial organizations for the adoption of
such a number.
COMPUTERS and AUTOMATION for January, 1973

In the Canadian House of Commons on April 8,
1964, Mr. Diefenbaker, the leader of the Opposition,
asked Mr. Pearson, the Prime Minister, whether the
Social Insurance Number would be used for income tax
records. Mr. Pearson replied, "Certainly not". On
December 20, 1967, Mr. J. E. Pascoe, the Member from
Moose Jaw-Lake Centre, asked Mr. Pearson, the Prime
Minister, "Is it now Government policy to make it
mandatory for all Canadians to obtain social security numbers before filing this year's income tax returns, as indicated in a recent notice sent out by
the Department of National Revenue?" Mr. Pearson
replied, "I would like to look into this matter, Mr.
Speaker, but my impression is that this is the law
now."
The revised Statutes of Canada of 1970 dealing
with income tax state clearly that, "Every person
who has filed a return of his income for a taxation
year after 1966 and has failed to show therein the
Social Insurance Number that has been assigned to
him or for which he is required by this section to
apply shall be deemed to have failed to complete the
information on a prescribed form as required by or
pursuant to section 49. 1966-67, c.91, s.21."
So you see, when some people argue that we have
nothing to worry about as long as we have a benevolent government, I would ask, "Do you consider
Mr. Pearson to be malevolent?" And yet, this development, in which Pearson played a role, could
prove harmful in the-future. I submit that every
citizen has a responsibility to speak out against
the politicians and bureaucrats who think nothing
of infringing on a person's freedom, liberty or
privacy.
Potential Effects of Technology

We need to be concerned about the potential effects of technology on our society. We can see examples of the effects produced by such technological
developments as the automobile and television. When
we look at computer technology we must admit that it
tends to make people depend on machines instead of
people. It can therefore drive people apart and
make our society less humane.
Some people argue that computer specialists do
not have any significant effects on society. They
equate the computer specialist with the mathematician. But we must recognize that the computer specialist who develops a system used by the public
will certainly affect the public. A responsible
computer specialist will say, "Computers are tools
like bridges. The bridges we build must carry
people and we do not want them to crash." The
quality of the systems produced by computer specialists, and the use to which these systems are
put, will determine whether they have good or bad
effects on society.
Adverse Effects are Late to Appear

The unfortunate thing about technology is that
the adverse effects tend to show up too late. They
are rarely visible in the early stages. So, if we
let our information systems develop haphazardly we
run the risk of losing control of our computer systems.
15

If the computer specialist does not exercise
social responsibility, he may find himself suffering
both as a computer specialist and as a human being.
As a computer specialist, he may find himself coming
under government regulation. As a human being, he
should never forget that bad systems can affect him
adversely as a citizen. The growth of consumerism
is not a passing fad and we may get government regulation if we do not improve our computer systems.
Dehumanizing
A recent survey conducted by the American Federation of Information Processing Societies and Time
magazine 5 showed that 54% of the respondents believe
computers are dehumanizing people and turning them
into numbers. Sixty-two percent are concerned that
some large organizations keep information about millions of people. In addition, 53% believe computerized information files might be used to destroy individual freedom; 58% feel computers will be used in
the future to keep people under surveillance.
About a year ago, there was a news report 6 of a
lady who received a bill from a department store for
$369.78. She had made no purchases. The store
threatened to sue her. The matter was finally settled, but the lady believes that her credit record
has been damaged with other stores.
Ralph Nader's Suggestion
Ralph Nader has commented on this problem7 and
has suggested that it is not a computer problem, but
a department store problem. He suggests that we
need to have complaint centres manned by citizens.
Many people respect Ralph Nader. I wonder what computer specialists will do when he decides to tackle
the computer community? I believe it would be a
pity if the computer community behaves irresponsibly
and brings on itself government regulation.
If the picture I have painted so far appears unduly gloomy, let me make a few comments to balance
the perspective. I am basically quite optimistic
about the future and firmly believe that most cdmputer specialists do and will continue to behave
responsibly towards society. I do not agree with
the prophets of doom who see nothing but chaos and
destruction in our world. These prophets of doom
tend to ignore man's ability to adapt to change.
For example, the New York Times book review of The
Limits to Growth, a gloomy report on the predicament of mankind, stated: 8 "If the telephone company
were restricted to turn-of-the-century technology,
20 million operators would be needed to handle today's volume of calls. Or, as British editor Norman
Macrae has observed, an extrapolation of the trends
of the 1880's would show today's cities buried under
horse manure."
Kind-Hearted AND Competent
Most computer specialists whom I know are kindhearted. But it is not enough for them to have good
hearts, they must also have competence. I do not
see how we can have effective systems that produce
beneficial results unless the computer specialists
working on those systems are competent. In fact, if
I had my chOice, I would prefer them to be excellent
rather than merely competent. /
To be excellent in something, a person must have
several essential characteristics. First, he must
have talent for the work he is doing. Second, he
must enjoy what he is doing. Third, and perhaps
most important, he must be a fanatic. A fanatic is
someone who has excessive enthusiasm.
16

There appears to be a trend today for people to
strive for jobs which are enjoyable. But you cannot
have excellence if you insist that your work must be
completely enjoyable. An excellent athlete has to
go through a lot of hard work and painful conditioning exercises in order to equip himself to perform
excellently.
The Pianist Gieseking
I understand that the wonderful pianist, the late
Walter Gieseking, used to practice diligently. He
was not satisfied that he had mastered a piece of
music until he could play it twenty. consecutive times
without a single error. Much as Gieseking probably
enj oyed playing the pi ano, I am sure that these practice sessions could not have been pure joy for him.
And yet, in my opinion, the effort was worthwhile
because some of his recordings are rare examples of
excellence that have given pleasure to many listeners. The point is that there is no such thing as a
perfect job -- a job that has only pleasure and no
pain. And yet, many people today are looking for
jobs that are constantly challenging, interesting
and enj oyable.
I know some computer specialists who are good
performers as long as they are working on the interesting parts of a project, but they lose interest
artd perform badly when the time comes to complete
the necessary detailed work. They are not interested
in the details because working on details is not
challenging enough for them.
Achieving Excellence
Fortunately, I have met many computer specialists,
both young and old, who have a realistic recognition
of the necessary joys and pains of their work and
who perform with great competence.
I mentioned earlier that to achieve excellence a
person must be a fanatic. I believe this is true,
but unfortunately most fanatics are not easy to live
with; so I would be willing to settle for a high level of competence and would not insist on excellence.
But it is important to emphasize that without a high
level of competence, the computer specialist cannot
fulfill his duty to society because the results he
produces will be deficient.
Competence is essential, but it is not enough.
The computer specialist should also have a high
level of integrity and ethical standards.
The Aircraft Brake Scandal
In April, 1972, Harper's magazine published an
article entitled "The Aircraft Brake Scandal".9 A
major American corporation received a contract from
an aircraft manufacturer to build brake assemblies
for a new Air Force plane. The brake was designed
by one of the company's most capable engineers, and
he in turn assigned the task of producing the final
production design to a newcomer in the company.
The new engineer conducted some tests of the prototype in accordance with the design and after three
prototype models of the brake system had burned out,
he realized that the fault lay not in defective
parts or unsuitable lining material but in the basic
design of the brake itself. The brake design should
have included five disks instead of four in order to
provide enough surface area to stop the aircraft
without generating the excessive heat that caused
the linings to fail.
COMPUTERS and AUTOMATION for January, 1973

The new engineer took his problem to his boss
who had designed the brake. but his boss was too
proud to admit that he had made a mistake.
During the next several months~ many people in
the corporation knew of the problems but kept hiding them from the customer. trying to rationalize
test data to make things look good. Finally. after
several near airplane crashes. the young engineer and
another member of the project team told the customer
what was happening. Both men resigned from the company. The young man was hired by the customer. The
other man did not have a university degree and found
it more difficult to find employment. He turned to
journalism and is the author of the article in
Harper's.

..

Computer specialists should be less concerned 'wi th
the forms of professionalism and more with its substance. The computer specialist can only become a
professional when he demonstrates the abilities of
a professional. ProfessionalS are known as professionals because of their performance records.
I believe that the various associations of systems and computer specialists can play useful roles
by helping their members earn professional status in
the eyes of their customers. They can do this through
education, through development of performance measures and codes of ethics. The associations could
provide guidance to their members on what is right
and wrong, and I believe that such guidance could
have a pervasive influence on the members' employers.

Lack of Integrity

Performance Measurement and Social Responsibility

Now you might ask. ,what is the connection between
the Aircraft Brake Scandal and the integrity of computer specialists? I suggest that the Aircraft
Brake Scandal was caused by a lack of integrity in
the design engineer •. I have seen several cases
where computer specialists have been too proud or
afraid to admit their mistakes and this has created
severe difficulties for their employers. For exampIe. in one case. a computer sys terns manager ,refused
to admit to his employer that he and his team were
not ready to begin operations on a newly installed
computer. As a result. the company found itself
operating with a deficient system. It lost control
of its warehouse shipments and its accounts receivables and it took a considerable amount of time and
money to regain control.

I know that it is not easy to measure the performance of systems people, but it can be done. There
are ways of separating the competent people from the
incompetent people, and I believe that the "professional associations" should play leading roles in
maintaining some kind of current record about a person's performance.

Integrity implies that the computer specialist
should be more service-centred and less self-centred.
He should be more willing to let his customers become involved in specifying what they want in their
systems. Some computer specialists behave like some
medical doctors~ When a friend of mine was an army
rookie. he had a cold and went to the army doctor.
The doctor asked him what was wrong and my friend
said. "I have a cold." The doctor barked. "Just
tell me your symptoms. I'll decide whether you
have a cold." In a similar way, some computer specialists try to keep their customers in a subordinate position. I find it hard to see how the computer specialist's employer can achieve full benefits from his computer systems if the computer
specialist is not interested in serving the users
of the systems.
I think it is fair to say that most computer
specialists are intelligent and industrious. Moreover, most of them cherish their freedom. This is
shown by their hatred of standards and rules for
documentation. If computer specialists cherish
their own freedom, then they should be willing to
protect the freedom of computer users and citizens
who might be adversely affected by computer systems.
Specialist vs. Professional

You may have noticed that I have kept referring
to the computer specialist and have not used the term
computer professional. We hear a lot of talk about
professionalism. Every person working for a living
wants to be called a professional. We have professional writers. golfers, salesmen, nurses, hockey
players, musicians, doctors, lawyers and soldiers.
It is therefore difficult to produce a good definition of the word professional. The definition
which I prefer is: "A. professional is someone who
can do something better than most other people, even
under adverse conditions."

COMPUTERS and AUTOMATION for January, 1973

I would like to conclude wi,th a brief summary of
my main points:
• Computers can have profound effects on our
lives, either beneficial or harmful.
• Computer specialists can playa dominant role
in determining what these effects will be.
• If the computer specialist does not fulfill
his responsibility to society he will suffer
as a human being and as a computer specialist.
• The essential requirements for computer specialists are competence and integrity.
• "Professional associations" can help their
members in both of these areas.
I still believe that most Canadians retain a
steadfast respect for the rights of the individual.
I also believe that most computer specialists are
good people. They know they should pay more attention to the goals of their systems and less attention to their tools; otherwise they may become the
tool of their tools.
We computer specialists know that in the long
run, what is good for computer users will also be
good for us. We know that we need to preserve our
competence and integrity, and we know how to do it.
All we need is the will to do it.
References

1. The New Yorker, November 21, 1970, p. 55.
2. Hanlon, J., Computerworld, September, 1971.
3. Powledge, F., "Learning to Live with the Credit
Card", Esgui re, September, 1971.
4. The Toronto Star, March 8, 1972. p. 10.
5. "A National Survey of the Public's Attitudes
Towards Computers". A joint project of the
American Federation of Information Processing
Societies and Time Magazine, 1971.
6. Ross, I., "The Credit Card's Painful Coming-ofAge", Fortune, October, 1971, p. lOB.
7. Nader, R., "Computers and the Consumer", Computers and Automation,· October, 1970, p. 21.
B. The Financial Post, April 22, 1972, p. 6.
9. Vandi vi er, Kermit, "The Ai reraft Brake Seanda 1"
Harper's magazine, April, 1972, p. 45.
[J

17

DATABANKS IN A FREE SOCIETY:
A Summary of the Proiect on Computer Databanks

Professor Alan F. Westin
Department of Political Science
Columbia University
420 West 118th Street
New York, N. Y. 10027
and many associates

"Our task is to see that appropriate safeguards for the individual's rights to
privacy, confidentiality, and due process, are embedded in every major record
system in the nation."

Based on a summary of the Project on Computer Databanks and of its report "Databanks in a
Free Society" published 1972 by Quadrangle Books, a New York Times Company, 330 Madison
Ave., New York, N.Y. 10017.

The United States has become a records-oriented
society.
In each major zone of personal and CIVIC life
(education, employment, credit, taxation, health,
welfare, licensing, law enforcement, etc.), formal,
cumulative records are assembled about each of us
by hundreds of private and government record-keeping
organizations. These personal histories are relied
on heavily by the collecting organizations in making
many decisions about our rights, benefits, and opportunities. Informal networks for sharing recordinformation among public and private organizations
have become a common feature of organizational life
heavily dependent On credentials.
During the past two decades, as most government
agencies and private organizations have been computerizing their large-scale files, the American public
has become concerned that dangerous changes might be
taking place in this record-keeping process. Because
of the computer's enormous capacities to record,
store, process, and distribute data, at great speeds
and in enormous volumes, many people have feared

that far more personal data might be assembled about
the individual than it had been feasible to collect
before; that much greater sharing of confidential
information might t~ke place among the holders of
computerized records; and that there might be a lessening of the individual's ability to know what records have been created about him, and to challenge
their accuracy or completeness.
The book Databanks in a Free Society (currently
being published by Quadrangle Books, a New York Times
subsidiary) is the report of the first nationwide,
factual study of what the use of computers is actu~ doing to record-keeping processes in the United
States, and what the growth of large-scale databanks, both manual and computerized, implies for
the citizen's constitutional rights to privacy and
due process. This article is a summary of the book.
The book also outlines the kinds of public policy
issues about the use of databanks in the 1970's that
must be resolved if a proper balance between the individual's civil liberties and society's needs for
information, is to be achieved.
How the Study was Conducted

Alan F. Westin is Professor of Public Law and Government at Columbia Uni versi ty and a member of the
District of Columbia Bar. For the past two decades
he had written about the law and politics of civil
liberties and civil rights.
In 1968 he received
several nati onal awards for hi s book Pri vacy and
Freedom, a comprehensive study of the social and
political functions of privacy in a democratic society.
Prof. Westin is a member of the National
Academy of Sci ences' Computer Sci ence and Engi neering Board and served as Director of the Academy's
Proj ect on Computer Databanks, 1969-72.
He is
also Chairman of the American Civil Liberties
Union's Pri vacy Commi ttee and a member of the ACLU
National Board.

18

The book is the report of the "Project on Computer
Data Banks", a three-year research study conducted
under the auspices of the Computer Science and Engineering Board of the National Academy of Sciences,
under grants of $164,000 from the Russell Sage Foundation. The Director of the Project was Dr. Alan F.
Westin, Professor of Public Law and Government, Columbia University, and author of Privacy and Freedom, published in 1967. An inter-disciplinary staff
of seven scholars from the fields of law, computer
science, and the social sciences collaborated in the
research. The project received continuing guidance
not only from the Computer Science and Engineering
Board but also a special Advisory Board of 18 prominent figures in public life whose views spanned the
COMPUTERS and AUTOMATION for January, 1973

full spectrum of opInIon on issues of databanks and
civil liberties.* The final report of the project
was written by Dr. Westin and Mr. Michael A. Baker,
Assistant Director of the Project and an Instructor
in Sociology at Brooklyn College of the City University of New York.

Mutual of Omaha Insurance Company
R. L. Polk & Company
Massachusetts Institute of Technology
Church of Latter Day Saints
Office of Research, American Council on Education
Kaiser-Permanente Health Plan

Sources

The major sources collected and used by the Project include:
1. Documentary materials on computerized record
systems in more than 500 government agencies
and private organizations.
2. Detailed on-site staff visits to 55 of the
most advanced computerizing organizations,
ranging across the most sensitive fields of
personal record-keeping.
3; Replies from over 1500 organizations in a national mail survey of developments in computerization and record-keeping among government
agencies and private organizations.
4. Extensive interviews with officials from computer companies, software houses, systems consulting firms, industry associations, civil
liberties groups, labor unions, consumer organizations, minority-rights organizations,
and professional associations.
5. Legal, legislative and regulatory-agency materials dealing with databank issues in 25
distinct major fields of personal record-keeping.
6. Materials and interviews on the state of databank developments and regulatory controls in
23 foreign nations, for purposes of comparison
with the United States.
Organization of the Report

The Report is organized into five parts:
Part I presents a brief, orienting discussion of
computer systems and civil liberties concepts for
general readers.
Part II consists of "profiles" of 14 governmental,
commercial, and private organizations, drawn from the
55 to which the Project staff made on-site visits.
Each profile describes the nature and function of the
organization, its pre-computer record-keeping, its
move into computer usage, the effect of automation on
its record-keeping about people, previous civil liberties issues involving the organization's manual
record-keeping, the effect of computerization on
civil liberties protections, and the organization's
plans for further computerization in the next five
years.
The 14 organizations given this detailed treatment are:
The U.S. Social Security Administration
The F.B.I. 's National Crime Information Center
Kansas City (Missouri) Police Department
New York State Department of Motor Vehicles
City of New Haven, Connecticut
Santa Clara County, California
Bank of America
TRW -- Credit Data Corporation

*

Names of staff and Advisory Board members appear
later in this summary.

COMPUTERS and AUTOMATION for January. 1973

Part III has three chapters which present and analyze the Project's principal findings. These include
an overview of what kinds of files have and have not
been computerized in advanced organizations; an analysis of computer effects on civil liberties that are
not taking place as yet; and a description of those
changes in record-keeping that the use of computers
and communication systems is producing in these organizations.
Part IV is an analysis of the way in which the reception of computer technology is affected by organizational, legal, and socio-political factors, followed by a forecast of developments in new computer
and communications technologies that are likely to
occur in the remainder of the 1970's, and an analysis of their implications for civil liberties interests.
Part V discusses public policy choices in the
1970's in light of the project's findings and forecasts. The first chapter analyzes the larger socio-political significance of the computer's arrival in the late 1950's and 1960's; it goes on to
suggest the basic civil liberties principles that
ought to be followed when seeking to safeguard citizen rights in large-scale record systems, especially
in the increasingly computerized sectors of American
organizational life. The final chapter of the report presents an agenda for the 1970's, identifying
six areas of priority for public policy and civic
action.
Three appendixes to the report present: the results from the Project's survey of organizations;
an analysis of public opinion literature on privacy
and the computer; and information about the experience of other advanced industrial nations in dealing
with the databanks-and-privacy problem.
Highlights of the Report

A great many commentators have warned that the
spread of computers is fundamentally altering the
balance between information policies of organizations and individual rights to privacy that marked
past eras of record-keeping. Compared to what was
done in the manual era, it is said, the new capacities of the computer inevitably lead organizations:
to collect more detailed and intrusive personal information about individuals; to consolidate confidential information from previously separate files;
and to share confidential personal data with government agencies and private organizations that had not
received it before.
The Project's findings from visits to 55 organizations with highly advanced computer applications
is that computerization is not yet having such effects in the overwhelming majority of such organizations. For a combination of technological and organizational reasons, central databank developments
are far from being as advanced as many public commentaries have assumed. Organizations have so far
failed to achieve the "total" consolidation of their
information about individuals which raised civil liberties alarms when such goals were announced in the
1960's by various government agencies or private organizations.
19

Continuance of Policies
Further, in computerizing their records on individuals, organizations have generally carried over
the same policies on data collection and sharing
that law and administrative traditions in each field
had set in the pre-computer era. Where new law or
practices have evolved to protect individual liberties over the past decade, organizations with computerized systems have followed such new policies
as fully as those that still use manual files and
procedures. Even the most highly computerized organizations continue to rely heavily on manual record-keeping and retain in their paper files the most
sensitive personal information they possess.
Another widely held fear is that computerization
makes it more difficult for the individual to know
what is in the file about him, to have errors corrected, or have the data erased where public policy
specifies that certain information about an individual's past should be ignored.
The Project's inspection of advanced systems
showed that notice to the individual about a
record's existence, opportunity to inspect and
challenge that record, and policies as to the removal of out-of-date or irrelevant information were
not being substantially altered by computerization.
Where policies affording individuals rights of due
process such as the above had been provided in an
organization prior to computerization, those rules
are being followed in the new computerized systems
as well. Where no such rights were given, the
adoption of computers has not made the situation
either worse or better. Neither has computerization
introduced impersonal decision-making in systems
where this was not present before, nor forced organizations into greater reliance on "the record" in
making decisions about clients, customers or citizens. Where abuses along these lines were present
in computerized systems -- raising serious due process questions -- they had been carried over from
the high-volume "processing" of people in the manual
era.
Public Misunderstanding
Over and over again, the Project's findings indicate profound public misunderstanding about the effect of computers on large scale record systems. To
some extent, the inflated claims and proposals of
organizational managers about the capacities of
their computer systems helped to generate what were
in fact baseless concerns for privacy on the part
of the public.
In addition, as the Report shows with respect to
law enforcement uses and airline-reservations and
charge-card systems, many commentators on computers
and privacy issues have failed to do adequate research into the actual operations of systems about
which they write, and have presented entirely incorrect pictures to the press and public about how
these computer systems work. The danger in this,
the report points out, is that we may give up the
fight in the belief we have already lost:
If we assume that computer users are already
doing things that they are not, we risk surrendering without a fight the border between
properly limited and surveillance-oriented
computer applications ••• ~ The question of
what border control measures should be adopted
can hardly be understood and properly considered •.. if the public and opinion leaders
assume that the borders have already been
obli terated.
20

Efficiency
Computerization in advanced organizations is producing changes in record-keeping methods that can
increase the efficiency with which organizations
carry out their basic decision-making about the people they process or serve. Computerization is making it possible for many organizations to: maintain
more up-to-date and complete records; obtain faster
responses to inquiries about a given individual; and
make more extensive use of information already in
the files. Computers have also made possible dramatic expansion of networks for exchange of data
among organizations that have shared data since precomputer days; and the creation of some large data
bases of information about people that would not
have been feasible without automation. These changes
have been felt already in police information systems, national credit reporting systems, charge
card systems, and others.
Data-Sharing
Looking at technological trends for the remaining
years of the 1970's, the Report forecasts that while
there will be important continued increases in computer capabilities, no developments are now foreseeable that will alter the technological, organizational, and socio-political considerations that presently frame the databanks and civil liberties issue.
Organizations will have more flexible, reliable, and
cost-effective computer systems to use in pursuit
of their policies, but these will not represent a
radical departure from the computer capabilities
presently available. The most important development
with implications for civil liberties interests will
be an increase in the ease with which data can be
shared among organizations which have computers,
coupled with a reduction in the cost of doing so.
This will make it imperative that legal boundaries
as to data-sharing are set as clearly as possible.
Augmenting the Power of Organizations
The Project concluded that the real issue of
databanks and civil liberty facing the nation today
is not that revolutionary new capacities for data
surveillance have come into being as a result of
computerization. The real issue is that computers
arrived to augment the power of organizations just
when the United States entered a period of fundamental debate over social policies and organizational practices, and when the traditional authority of
government institutions and private organizations
has become the object of wide-spread dissent.
Challenge of Goals
Important segments of the population have challenged the goals of major organizations that use
personal records to control the rights, benefits,
and opportunities of Americans. There is also debate over the criteria that are used to make such
judgments (religious, racial, political, cultural,
sexual, educational, etc.), and over the procedures
by which the decisions are reached, especially those
that involve secret proceedings and prevent individuals from having access to their own records.
Distrust of Organizational Record-Keeping
Computers are making the record-keeping of many
organizations more efficient precisely at the moment when trust in many large organizations is low
and when major segments of the American population
are calling for changes in values that underly various social programs. for new definitions of perCOMPUTERS and AUTOMATION for January. 1973

sonal rights, and for organizational authorities to
make their decision-making procedures more open to
public scrutiny and to the review of specific individuals involved.
Little Legislation

Despite the rapid spread. of computers, there has
been little so far by way of new legislation, judicial rulings, regulatory-agency rules, or other legal remedies defining new rights to privacy and due
process in major record systems. The Report stresses
that, because of the increased efficiency of recordkeeping and the growing intensity of the pUblic's
concern, the middle 1970's is the moment when lawmakers and the public must confront both long-standing and newly-raised civil liberties issues, and
evolve a new structure of law and policy to apply
principles of privacy and due process to large-scale
record-keeping.
The Report identifies six areas of priority for
public action, and presents examples of specific
policy measures under each of these that ought to
be seriously considered by policy makers:
Right of Access and Challenge

Development of laws to give the individual a right
of access and challenge to almost every file in which
records about him are kept by city, county, state, or
government agencies: At stake here is the possibility
that, denied access to records being used for decisions about himself, the citizen is left with "feelings of powerlessness and the conviction that government authority is fundamentally arbitrary."
At the very least, citizens ought to know what
record systems exist in government agencies. A
Citizen's Guide to Files, published at every appropriate level of government jurisdiction, should
"provide the citizen with a thorough, detailed and
non-technical directory of the record systems that
contain information about him, and the general rules
under which it is being held and used." Providing
adequate due process protection in government files,
the Report suggests, is best achieved by assuming
that any individual should be able to see and get
a copy of any records used to affect him or her
personally - wi th the record-keeping agency "bear
ing the burden of proving that some specific public interest justifies denying access."
Explicit Rules

Develop of explicit laws or rules balancing confidentiality and data-sharing in many sensitive record systems that today do not have clearly defined
rules: Among these would be rules governing the provision of information to law enforcement agencies
from bank accounts, travel and entertainment card
records, airline and hotel reservation systems,
etc. The Report predicts that one or two large
systems will come to dominate in each of these areas.
This development will make the individual's
account record more comprehensive and a very
inviting target for investigators of all
kinds. With that rise in sensitivity and
attractiveness ought to go legislative enactments spelling out retention and destruction policies, confidentiality rules, and
procedures for protecting individual rights
when outsiders seek to obtain access for
what are asserted to be lawful and necessary
purposes.
COMPUTERS and AUTOMATION for January. 1973

As a case study in how not to build new record
systems, the Report discusses some of the major
Administration and Congressional proposals for
national welfare reform, which generally hinge on
the availability of computers for massive data
storage and exchange. Several of the welfare system proposals contain "sweeping authorizations for
data collection and sharing but almost nothing by
way of confidentiality standards and due-process
review procedures." The Report points out that we
may be "creating one of the largest, most sensitive,
and highly computerized record systems in the nation's history, without explicit protections for
the civil liberties of millions of persons whose
lives wi 11 be profoundly affected ... "
Records of the Wrong Kind

Limit the collection of personal information
where a proper regard for the citizen's right to
privacy suggests that records ought not to be maintained at all by certain organizations, or never
furnished for certain uses in the society: Among
the examples are the use of arrest-only records in
licensing and employment decisions, and the selling
to commercial advertising services of names and addresses collected by government under its licensing
and regulatory powers, unless the individual specifically consents to such use.
In the case of arrest records, the Report stresses that:
A democratic society should not allow arrest records to be collected and circulated
nationwide with increasing efficiency without
considering directly the actual social impact
of their use in the employment and licensing
spheres, and without examining the possibility
that dissemination beyond law-enforcement
agencies represents an official stigmatization of the citizen that ought to be either
forbidden by law, or closely regulated.
Social Policy

Increased work by the computer industry and professionals within it on technological safeguards
which will make it possible to implement confidentiality policies more effectively than is now feasible: The Report notes that:
No 'technological fix' can be applied to the
databank problem. Protection of privacy is
a matter of social policy, on which computer
profes si onal s are fellow-ci tizens, not experts.
But the Project calls for more research, development
and testing efforts to be undertaken by the computer industry to see that the computer's capacities
for protection of confidentiality and insurance of
proper citizen access are turned into "available
and workable products". Law and public pressure,
the Report suggests, require that such measures be
taken by managers of sensitive record systems when
they are computerized, thereby stimulating the "user
demand" to provide a practical market for such devices and techniques.
No Extension of Use of Social Security Number

Reconsideration by Congress and the executive
branch of the current permissive policies toward use
of the social security number in an increasing number of government and private record systems: The
Report notes that having such a number is not a prerequisite for linking files within or between or21

~anizations,

but notes that a common numbering system clearly makes record linkage easier and cheaper.
Further, the Project concludes that resolving the
critical civil liberties issues in record keeping
"will require that a minimum level of trust be
maintained between American citizens and their government. Under these conditions, adopting the social security number as a national identifier or
letting its use spread unchecked cannot help but
contribute to public distrust of government."
Information-T ru st Agencies

Experimentation with special information-trust
agencies to hold particularly sensitive bodies of
personal data: For example, the Report suggests
that the handling of both national crime statistics
and summary criminal histories ("rap sheets") might
be taken away from the Federal Bureau of Investigation and placed in an independent national agency
under control of a board that would have public
representatives as well as law enforcement officials on it. Such an agency would have to be established "with a clear legislative mandate to be
a 'guardian' institution," paying attention to
civil liberties interests as well as law enforcement needs.
Critical Period, 1973-78

The Report stressed that the next five years
would be a critical period in the reception and
control of sensitive personal record systems, especially those managed by computers. More sensitive areas of record-keeping are being entered by
many computerizing organizations; many larger online (instant access) networks are being brought
into operations; and more consolidations of presently scattered records about individuals can be
seen as a trend in certain areas, such as criminal
justice, credit and financial transactions, and
welfare. The Report stresses that unless lawmakers
and organizational managers develop proper safeguards for privacy and due process, and create
mechanisms for public scrutiny and review, the record systems they are building could sharpen the
already serious debate in American society over the
way to apportion rights, benefits, and opportuni ties
in a credential-oriented society, and leave organizational uses' of records to control individual futures too far outside the rule of law.
In its closing paragraphs, the Report sums up the
databanks and civil liberties problem as follows:
If our empirical findings showed anything,
they indicate that man is still in charge of
the machines. What is collected, for what
purposes, with whom information is shared,
and what opportunities individuals have to
see and contest records are all matters of
policy choice, not technological determinism.
Man cannot escape his social or moral responsibilities by murmuring feebly that "the Machine made me do it."
There is also a powerful tendency to romanticize the pre-computer era as a time of robust privacy, respect for individuality in
organizations, and "face-to-face" relations
in decision-making. Such arcadian notions
delude us. In every age, limiting the arbitrary use of power, applying broad principles
of civil liber~y to the troubles and challenges of that time, and using technology to
advance the social well-being of the nation
represent terribly hard questions of public
policy, and always will. We do not help re22

solve our current dilemmas by thinking that
earlier ages had magic answers.
Computers are here to stay. So are large organizations and the need for data. So is the
American commitment to civil liberty. Equally
real are the social cleavage~ and cultural
reassessments that mark our era. Our task is
to see that appropriate safeguards for the
individual's rights to privacy, confidentiality, and due process are embedded in every
major record system in the nation, particularly the computerizing systems that promise
to be the setting for most important organizational uses of information affecting individuals in the coming decades.
Notes

Staff and Advisory Bodies to the Project
Staff Associates for the Project were:
Robert F Boruch, Assistant Professor, Department
of Psychology, Northwestern University
Howard Campaigne, Professor of Mathematics, Slippery Rock State College
Gerald L. Grotta, Associate Professor of Journalism,
Southern Illinois University
Lance J. Hoffman, Assistant Professor of Electrical
Engineering and Computer Sciences, University of
California, Berkeley
Charles Lister, Attorney at Law, Washington, D.C.
Advisory Group

The Proj ect had duri ng its exi stence an Advi sory
Group that provided the staff with a wide range of
diverse viewpoints on the databanks and civil liberties issue and helped shape the project's studies. Members of the Advisory Group were:
Edgar S. Dunn, Jr.
Resources for the Future, Inc.
The Honorable Cornelius E. Gallagher
House of Representatives
Richard Freund
First National City Bank
Justice Nathan L. Jacobs
New Jersey Supreme Court
Nicholas deB. Katzenbach
Vice President and General Counsel, IBM Corp.
John H. Knowles
President, Rockefeller Foundation
Arthur R. Mi ller
Professor of Law, Harvard University Law School
George A. Miller
Institute for Advanced Study, Princeton, N.J.
Ralph Nader
Attorney, Washington, D.C.
Arthur Naftalin
Professor of Public Affairs, Univ. of Minnesota
Anthony G. Oettinger
Harvard University
John R. Pierce
California Institute of Technology
The Honorable Ogden R. Reid
House of Representatives
L. F. Rei ser
Corporate Director, Personnel and Industrial
Relations, CPC International Inc.
Richard Ruggles
Department of Economics, Yale University
Roderick O. Symmes
Director, Data Systems & Statistics Staff, U.S.
Dept. of Housing and Urban Development
Roy Nutt
Vice President, Computer Sciences Corporation []
COMPUTERS and AUTOMATION for January. 1973

ANNUAL INDEX
for Volume 21, 1972
of

COrn~H~!!!:i!
A
ASCII, "Amer ican St andard Code
for Information Interchange,"
21/6B (Aug.), 180
Abzug, Bella, and Helsingen Sanomat, Ian Low, Judy Bellin, Edmund C. Berkeley, "How Fiendish
Can You Get?," 21/5 (May), 31
"Academic Computer Practices, and
Their Deficiencies," by Dr.
Herbert E. Humbert, 21/5 (May),
16
Accounting Principles Board,
"IBM's Powerful Partner: The
Accounting Principles Board,"
from Samson Science Corp., 21/
4 (Apr.), 31
"Achieving 'Personal' Response
from a Computer," by Edmund C.
Berkeley, 21/3 (Mar.), 6
"The Activities of the Central
Intelligence Agency, at Six
Billion Dollars a Year," by
Edmund K. DeLong, 21/2 (Feb.),
38
ADAPSO, "Justice Department Interested in ADAPSO Hearings,"
21/3 (Mar.), 41
ADVANCED ND~IlLES, by Neil Macdonald: 21/3 (Mar.), 45; 21/4
(Apr.), 43; 21/5 (May), 33; 21/
6 (June). 42; 21/7 (July), 26
"Adversity" (Computer Art), by
James Lipscomb, 21/8 (Aug.), 9
"Aerial Photography and Computers
Aid the Bat tIe Against Bl ight
and Pollution," by Dr. David
Landgrebe, 21/1 (Jan.). 48
"Air-Pollution Game To Deal with
Environmental Problems," by
Prof. Matthew J. Reilly. 21/1
(Jan.),50
"The Alaska Pipeline Heading Lesson." by Stewart M. Brandborg,
21/6 (June). 30
Alexander, Jame s p .. "Operat ion
Clean Sweep -- A Ci ty' s War on
Crime," 21/2 (Feb.), 51
Algebra, "New Algebra Option
Promises Breakthrough in Calculator Programming," 21/8
(Aug.), 44
American Friends Service Cammi ttee, "Pacification: The Story
of Ba Toi." 21/7 (July), 37
"American Standard Code for Information Interchange, ASCII,"
21/6B (Aug.), 180
Ancient writing, "Deciphering an
Unknown Computer Program, as
Compared with Deciphering of
Ancient Writing," by Edmund C.
Berkeley, 21/5 (May). 19
"Annual Index for Volume 20, 1971 and Computer Directory and
Buyers' Guide Issue, Vol. 19,
No. 6B of 'Computers and Automation' ," 21/1 (Jan.), 25
Anthropology, "The Importance of
Being Human," by W. W. Howells,
21/10 (Oct.), 12
"The Antisocial Use of Computers ,"
by Donn B. Parker, 21/8 (Aug.),
')')

Applications: "Barriers in Applying Computers," by Edmund
C. Berkeley, 21/7 (July), 24
"Counting the Number of Applications of Computers." by
Edmund C. BerKeley, 21/6B
(Aug.), 3
"Over 2300 Applications of
Computers and Data Processing," by Linda Ladd Lovett,
21/6B (Aug.), 137
Appropriations Commi ttee, "Lead
Poisoning: The Hypocrisy of
the Presidency, and of the Appropriations Committee of the
House of Representatives," by
William L. Clay, 21/8 (Aug.),
7

Apti tudes, "Pictorial Reasoning
Tests and Aptitudes of People

-- III," by Neil Macdonald,
21/2 (Feb.), 29
"Architecture Students Turning
to Computer 10 Improve Design,
Creativity," 21/5 (May), 42
Arithmetical tables, "Some Basic
Ari thmetical Tables," 21/6B
(Aug.), 179
Arrests, "Computer Increasinq
Criminal Arrests by 10 Per Cent,"
21/7 (July), 42
Art contest, "Tenth Annual Computer Art Contest": 21/5 (May),
40; 21/6 (June), 41; 21/8 (Aug.),
8
Art curriculum, "Computer Science
Is Added to COllege's Art Curriculum," 21/3 (Mar.), 40
Artists, "Computer Artists," 21/
8 (Aug.). 19
Ass assination: "Dallas: Who,
How, Why? Part II," by Mikhail Sagatelyan, 21/4 (Apr.),
37
"Political Assassination in the
United States," 21/5 (May). 7
"The Assassination of Senator
Robert F. Kennedy: Proofs of
Conspiracy and of Two Persons
Firing," by Richard E. Sprague
and William W. Harper, 21/9
(Sept.), 24
Association for Computing Machinery, "Horizons and Rebellion,"
by Edmund C. Berkeley, 21/9
(Sept.), 36
Association of Data Processing
Service Organizations, Inc.,
"Justice Department Interested
in ADAPSO Hearings," 21/3 (Mar.),
41
"Association for the Prevention
of Doomsday -- News and Ideas,"
21/10 (Oct.), 36
Associations, "Roster of Computer
Associations," 21/6B (Aug.),
168
Aston, William W., "Personal
Rapid Transi t, Computerized, in
Morgantown, West Virginia, Part
I: The Plan," 21/6 (June), 11
Athearn, Inc., "Computer Keeps
'Railroad' Running Smoothly,"
21/3 (Mar.), 40
Axioms, "EDP Axioms -- A Critical
Analysis," by W. Leon Sanford,
21/5 (.Ilay) , 12

BR-1018, "Telephone-Sized Computer, BR-1018. Moves Into Production," 21/10 (Oct.), 45
Ba Toi, "Pacification: The Story
of Ba Toi," American Friends
Service Committee, 21/7 (July),
37
"The Bad Image That Computers
Are Earning," from Harold W. G.
Gearing and others, 21/4 (Apr.),
29
Baggage inspection, "X-Rays Air
Luggage for Bombs at lIigh
Speed," 21/5 (May), 43
Banking, "Computers in Banking,"
by J. Q. Hallam, 21/8 (Aug.),
20
"Barriers in Applying Computers,"
by Edmund C. Berkeley, 21/7
(July),24
"Baton Houge Moni tors Sewers wi th
New Computer System," 21/11
(Nov.), 41
Beauni t Corp., "Color MatChing
by Computer Creates a New Business," by J. Mark Raiteri, 21/
1 (Jan.), 50
Bedside teaching, "University
Computer Helps Doctors wi th
'Bedside Teaching' ," 21/11
(Nov.), 42
Bell, Lucy, Mrs., and Mrs. Ruth
Shapin, William II. Wynne, Rainer ~1. Goes, Thomas D. Bryant,

"Encouragement for the Pursui t
of Truth," 21/11 (Nov.), 38
Bell Telephone Laboratories,
"No.4 ESS Will Triple Toll
Call Capacity," 21/8 (Aug.), 45
Bellin, Judy, and Helsingen Sanomat, Ian Low, Bella Abzug, Edmund C. Berkeley, "How Fiendish Can You Get?," 21/5 (~Iay),
31
"Benchmarking vs. Simulation, tI

by Fred C. Ihrer, 21/11 (Nov.),
8
Berezin, Evelyn, "How Technology
Is Freeing the Secretary," 21/
10 (Oct.), 15
Berkeley, Edmund C.: "Achieving
'Personal' Response from a
Computer," 21/3 (Mar.), 6
"Barriers in Applying Computers," 21/7 (July), 24
"Bernard L. Barker: Portrait
of a Watergate 8urglar," 21/
11 (Nov.), 26
"Books": 21/10 (Oct.), 34; 21
/11 (Nov.), 40
"Chess and Computers," 21/9
(Sept.), 6
"Common Sense, Wisdom, General
Science, and Computers - II,"
21/1 (Jan.), 11
"Computers and Spelling," 21/
11 (Nov.), 6
"The Construction of Living
Robots -- Part 1," 21/8
(Au.g.), 27
"Counting the Number of Applications of Computers," 21/6B
(Aug.), 3
"The Curse of a Magazine," 21/
2 (Feb.), 6
"The Death of the Democratic
Party Candidate for the Presidency, 1972," 21/5 (May), 6
"Ueciphering an Unknown Computer
Program, as Compared with Deciphering of Ancient Writing,"
21/5 (.Ilay) , 19
"Doomsday -- Class A Hazards,"
21/11 (Nov.), 38
"Eight Hundred People Interested in Mechanical Brains,"
21/1 (Jan.), 7
"Fall Joint Computer Conference:
Topics," 21/4 (Apr.), 33
"Horizons and Rebellion," 21/
9 (Sept.), 36
"The House Is on Fire": 21/2
(Feb.), 37; 21/8 (Aug.), 38
"Hurray for the Univac Di vi sian
of Sperry Rand," 21/1 (Jan.),
6
"The Most Important of All
Branches of Knowledge": 21/
1 (Jan.), 36; :!1/2 (Feb.), 2;
21/6 (June), 50; 21/7 (July),
7
"The Old Brain, the New Brain,
the Giant Brain, and Common
Sense," 21/4 (Apr.), 6
"The Pursui t of Truth in Input,
Output. and Processing," ~1/8
(Aug.), 6
"The Shooting of Governor George
C. Wallace, Candidate for
President," 21/7 (July), 10
"The Shortage of Good Typists
-- and the JJ Comm"nd," 21/(,
(June),6
"Some liard Facts, and What To
Do About Them," 21/10 (Oct.),
3
"Statistics -- A Guide to the
Unknown," 21/10 (OC t. ), 6
"ZINGO -- A New Computer Game,"
21/:! (Feb.), 32
Berkeley, Edmund C., and M. Egan,
"Publ ishing Articles on Issues
that DOlI't Get the At tent ion
They Deserve," :!1/1O (Oct.),
38
Berkeley, Edmund C., and William
W. Harper, "Correction and Retraction," 21/12 (Dec.), 21
Berkeley, Edmund C., and Stanley

Jaffin, "Missing Issues of
'Computers and Automation',"

21/5 (May), 28
Berkeley, Edmund C., and Jim
Johnson, "Subscription Error s:
C&A Will Correct," 21/11 (Nov.),
39
Berkeley, Edmund C., and John
Kaler, "Unhappy Subscriber to
Satisfied One," 21/7 (July),
38
Berkeley, Edmund C., and Arthur
Martin, "Computer-Field Information vs. Social Rag," 21/7
(July), 36
Berkeley, Edmund C., and Peter
J. Nyikos, "The Neglect of
Significant Subjects, and the
Information Engineer," 21/7
(July),30
Berkeley, Edmund C., and Frederic O. Parlova, "CDC vs IBM,"
21/4 (Apr.). 32
Berkeley, Edmund C., and Montgomery Phister, Jr., "PostMaturity in the Computer Field,"
21/12 (Dec.), 6
Berkeley, Edmund C., and Tore
Rambol, "On the JJ Command,"
21/10 (Oct.), 37
Berkeley, Edmund C., and Helsingen Sanomat, Ian Low, Judy Bellin, Bella Abzub, "lIow Fiendish Can You Get"I," 21/5 (May),
31
Berkeley, Edmund C., and Thomas
Stamm, "The Shooting of Presidential Candidate George C.
Wallace: A Systems-Analysis
Discussion," 21/7 (July), 32
"Bernard L. Barker: Portrait of
a Watergate Burglar," by Edmund C. Berke ley, 21/11 (Nov.),
26
8ernert, Philippe, and Camille
Gilles, "Le Francais Qui Devait
Tuer Kennedy (The Frenchman Who
Was To Kill Kennedy)," 21/12
(Dec.). 38
Black colleges, "Faculty Loans
to Black Colleges," by E. Nanas, 21/2 (Feb.), 52
Blight, "Aerial Photography and
Computers Aid the Battle Against Blight and Pollution," by
Dr. David Landgrebe, 21/1 (Jan.),
48
Blind, "M.1.T.-Braillemboss Being Used by Blind IRS Representative," 21/9 (Sept.), 43
Bache, Raymond E., "The High Cost
of Vendor's Software Practices:
Why?," 21/12 CDec.), 20
Bombing, "North Vietnam and American Bombing: Six American
Government Lies," by Bill Zimmerman, 21/9 (Sept.), 33
Bombs, "X-Rays Air Luggage for
Bombs at High Speed," 21/5
Olay) , 43
"Books," by Edmund C. Berkeley:
21/10 (Oct.), 34; 21/11 (Nov.),

in Indochina," 21/2 (Feb.), 41
Bress, Dennis L., "Computers and
Cartography," 21/8 (Aug.), 25
Bright, Herb, "SHARE and the
Mult iply Carry Bug," 21/2
(Feb.), 50
Brooks, Jack, "What Have Computers Done for Us Lately?," 21/
10 (Oct.), 7
Bryant, Thomas D., and Mrs. Ruth
Shapin, Mrs. Lucy Bell, William
H. Wynne, Rainer M. Goes, "Encouragement for the Pursuit of
Truth," 21/11 (Nov.), 38
"Building Your Own Computer -Part II," by Stephen Barrat
Gray, 21/1 (Jan.), 20
Bundy, McGeorge, "Spotlight on
McGeorge Bundy and the Whi te
House Situation Room, November
22, 1963," by Robert B. Cutler,
21/1 (Jan.), 57
"Bunker-Ramo Activates New Nationwide Market Data System," 21/
10 (Oct.), 45
Bunker-Ramo Corp., "TelephoneSized Computer, BR-1018, Moves
Into Production," 21/10 (Oct.),
45
Burton, Joseph M., Clerk, "District's Superior Court Uses
Computer To Keep Track of
100,000 Criminal Cases," 21/2
(Feb.), 52
Bush, "Eight Photographs of a
Bush: Pictorial Reasoning
Tests -- Part 7," by Neil Macdonald, 21/10 (Oct.), 27
"Business Programmer Exam Announcements and Study Guides Now
Avail able," 21/9 (Sept.), 42
Business Week, and Richard E.
Sprague, Norman R. Carpenter,
"3400 Organizations Required
by Court Order to Furnish Confidential Data to IBM - II,"
21/3 (Mar.), 19
Busing, '''Computers Enter the
Busing Controversy' -- Addendum,"
by Robert L. Glass, 21/4 (Apr.),
7
Buyers' Guide, "Computer Directory
and Buyers' Guide, 1972": 21/7
(July), 50; 21/8 (Aug.), 39;
21/9 (Sept.), 39; 21/10 (Oct.),
34; 21/11 (Nov.), 40; 21/12
(Dec.), 51
Buyers' Guide: "The Computer Directory and Buyers' Guide Issue 1973 -- Notice," 21/6B
(Aug.), 178
"Free Entries for Your Organization in the 1973 Computer
Directory and Buyers' Guide
Issue -- Notice," 21/6B (Aug.),
176
"Buyers' Guide to Products and
Services in Computers and Data
Processing," 21/6B (Aug.), 63

c

40

Bookstrap, "'Operation Bookstrap'
Is lJelping Johnny To Read," by
II. J. Peters, 21/1 (Jan.), 49
Brai llembos s, "~1. I. T. -Brai llemboss Being Used by mind IRS
Representative," 21/9 (Sept.),
43
Brain, "The Old Brain, The New
Brain, The Giant Brain, and Common Sense," by Edmund C. Berkeley, 21/4 (Apr.), 6
"BRAINIAC Homeowner's Protective
Kit K40," 21/3 (Mar.), 3
Brains, mechanical, "Eight Hundred People Interested in Mechanical Brains," by Edmund C.
Berkeley, 21/1 (Jan.), 7
Brandborg, Stewart M., "The Alaska Pipeline Reading Lesson,"
21/6 (June), 30
Branfman, Fred, and Steve Cohn,
"The CIA: A Visible Governm('nt

"The C&A Notebook on Common Sense,"
21/4 (Apr.), 2
"The C&A Notebook on Common Sense,
'Common Sense vs. Catastrophe' ,"
21/12 (Dec.), 37
"The C&A Notebook on Common Sense,
Elementary and Advanced": 21/1
(Jan.), 2; 21/2 (Feb.), 3; 21/5
(May), 2
"The C&A Notebook on Common Sense,
First Year": 21/8 (Aug.), 37;
21/9 (Sept.), 2; 21/11 (Nov.), 2;
21/12 (Dec.), 2
"C&A Notebook on Common Sense:
'!low To Be Silly'," 21/12 (Dec. J,
49
"The C&A Notebook on Common Sense:
Second Year of Subscription,
197~," "1/12 (Dcc.), 40
"The U,\ Notebook on Common Sense,
Vulu",,' I," "1/6 (June), 51

23

Annual Index
C&A notebook: "Common Sense,
Wisdom, and Information Processing: The Notebook on COIlmon Sense, Elementary and Advanced," 21/7 (July), 6
"Inventory of the Issues of
the C&A Notebook on Common
Sense, Volume I," 21/5 (May),

3
"Questions and Answers About
'The C&A Notebook' ," 21/4
(Apr.), 3
"Questions and Answers about
'The C&A Notebook on Common
Sense, Elementary and Advanced"': 21/1 (Jan.), 3;
21/7 (July), 9
"CAl (Computer-Aided Instruction)
Shortens Physician Learning
Process," 21/12 (Dec.), 43
"CDC vs IBM -- Correction," from
Frederic O. Parlova and Edmund
C. Berkeley, 21/4 (Apr.), 32
CIA: "The Activities of the
Central Intelligence Agency,
at Six Billion Dollars a
Year," by Edward K. DeLong,
21/2 (Feb.), 38
"The Central Intelligence Agency: A Short His tory to
Mid-1963 -- Part I," by James
Hepburn, 21/11 (Nov.), 32
"The Central Intelligence Agency: A Short His tory to
Mid-1963 -- Part 2," by James
Hepburn, 21/12 (Dec.), 34
"The CIA: A Visible Government
in Indochina," by Fred Branfman and Steve Cohn, 21/2 (Feb.).
41
"CalComp Plotter Purchased for
Russian Ministry of Chemical
Industry," 21/8 (Aug.), 45
Calculator programming, "New
Algebra Option Promises Breakthrough in Calculator Programming," 21/8 (Aug.), 44
Camden, N. J., "Computer Increasing Criminal Arrests by 10 Per
Cent," 21/7 (July), 42
"Camera Plus Computer for Traffic Regulation: A New Observing System for Multi-Purpose
Data Gathering," by Stanley E.
Wilkes, Jr., 21/9 (Sept.), 7
"Canadian Colleges and High
Schools are Members of Dartmouth's Time-Sharing Computer
Network," 21/7 (July), 43
Car maintenance, "Computer Tells
Car Owners When Maintenance Is
Needed," 21/10 (Oct.), 43
Car production, "Pontiac Dealers
Use Computer To Track Car Production for Consumers," by
William F. Grimshaw, 21/2
(Feb.), 51
Carpenter, Norman R., and Leon
Davidson, John D. French, Philip Neville, "3400 Organizations
Required by Court Drder to Furnish Confidential Data to IBM,"
21/2 (Feb.), 21
Carpenter, Norman R., and Richard E. Sprague, Business Week,
"3400 Organizations Required
by Court Order to Furnish Confidential Data to IBM - II,"
21/3 (Mar,), 19
Cartography, "Computers and Cartography," by Dennis L. Bress,
21/8 (Aug.), 25
"The Cashless, Checkless Society: On Its Way?," by Alan
Wetterhuus, 21/11 (Nov.), 14
"Cashless-Society Project Reports
Progress in N.Y.," 21/7 (July),
41
Catania, Salvatore C., "Computer
System Models," 21/3 (Mar.),
14
Catastrophe, "The C&A Notebook
on Common Sense, 'Common Sense
vs. Catastrophe'," 21/12 (Dec.),
37
Central Intelligence Agency:
"The Activities of" the Central
Intelligence Agency, at Six
Billion Dollars a Year," by
Edward K. DeLong, 21/2 (Feb,),
38
"The CIA: A Visible Government in Indochina," by Fred
Branfman and Steve Cohn, 21/
2 (Feb.), 41
"The Central Intelligence Agency:
A Short History to Mid-1963 -Part 1," by James Hepburn, 21/
11 (Nov.), 32
"The Central Intelligence Agency:
A Short History 1'0 Mid-1963 -Part 2," by James Hepburn, 21/
l2(Dec.),34
Cerullo, Michael J., "Satisfaction of Companies wi th Servi-

24

ces Received from EDP Service
Bureaus," 21/1 (Jan.), 43
"Characteristics of Digital Computers," by GML Corp., 21/6B
(Aug.), 92
Cheatham, Thomas E., Jr., "Chinese Computer Science: A Visit
and a Report," 21/11 (Nov.), 16
"The Checkerboarding Problem,"
by Tactical Air Command, 21/1
(Jan.), 24
Checkless society, "The Cashless,
Checkless Society: On Its
Way?," by Alan Wetterhuus, 21/
11 (Nov.), 14
Chess, "Winner of U.S. Chess
Championship," 21/11 (Nov.), 43
"Chess and Computers," by Edmund
C. Berkeley, 21/9 (Sept.), 6
"Chinese Computer Science More
Advanced Than Expected," 21/10
(Oct.), 45
"Chinese Computer Science: A
Visit and a Report," by Thomas
E. Cheatham, Jr., 21/11 (Nov.),
16
Ciphers, "Computers, Ciphers,
and Cryptography," by Oti s
Minot, R. A. Sobieraj, and K.
D. Streetman, 21/2 (Feb.), 47
Clay, William L., "Lead Poisoning: The Hypocrisy of the
Presidency, and of the Appropriations Committee of the
House of Representat i ves," 21/
8 (Aug.), 7
Cleveland-Cliffs Iron Company,
"Small Computer 'Tracks' Great
Lakes Sailors," 21/9 (Sept.),
41
Coat, "Forty + One Ways To Cut
a Coat," by Vectors' Staff, 21/
3 (Mar.), 22
Cohn, Steve, and Fred Branfman,
"The CIA: A Visible Government
in Indochina," 21/2 (Feb.), 41
Colleges, "Roster of College and
University Computer Facilities,"
21/6B (Aug.), 149
"Color Matching by Computer Creates a New Bus iness," by J.
Mark Raiteri, 21/1 (Jan.), 50
"Columbus Plus Two" (Computer
Art), by Mike Seaters, 21/8
(Aug.), 15
"Combinatorial Framework of the
Ordinal 15" (Computer Art), by
Manfred Mohr, 21/8 (Aug.), 14
Commager, Henry Steele, "A Concerted Campaign To Deny the
American People Essential Knowledge About the Operation of
Their Government," 21/4 (Apr.),

33
Common Sense: "The C&A Notebook
on Common Sense," 21/4 (Apr.),

2
"The C&A Notebook on Common
Sense, Elementary and Advanced": 21/1 (Jan.), 2; 21/2
(Feb.), 3; 21/5 (May), 2
"The C&A Notebook on Common
Sense, 'Common Sense vs.
Catastrophe'," 21/12 (Dec.),
37
"The C&A Notebook on Common
Sense, First Year": 21/8
(Aug.), 37; 21/9 (Sept.), 2;
21/11 (Nov.), 2; 21/12 (Dec.),
2
"c&A Notebook on Common Sense:
'How To Be Silly'," 21/12
(Dec.), 49
"The C&A Notebook on Common
Sense: Second Year of Subscription, 1972," 21/12
(Dec.), 40
"The C&A Notebook on Common
Sense, Volume I," 21/6 (June),
51
"Inventory of the Issues of
the C&A Notebook on Common
Sense, Volume I," 21/5 (May),
3
"The Old Brain, The New Brain,
The Giant Brain, and Common
Sense," by Edmund C. Berkeley, 21/4 (Apr.), 6
"Questions and Answers about
'The C&A Notebook on Common
Sense, Elementary and Advanced''': 21/1 (Jan.), 3; 21/7
(July), 9
"Common Sense, Wis dom, General
Science, and Computers -- 11,"
by Edmund C. Berkeley, 21/1
(Jan.), 11
"Common Sense, Wisdom, and Information Processing: The Notebook on Common Sense, Elementary and Advanced," 21/7 (July),
6
Communications, "Computers and
Communicat ions," by R. C.
Scr i vener, 21/9 (Sept.), 10

Communi ty college, "The Compu ter
and the Community College," by
Raymond A. Pietak, 21/1 (Jan.),
9
"Computer Artists," 21/8 (Aug.),
19
Computer Census -- see "Monthly
Computer Census"
-- see "World Computer Census"
"The Computer and the Communi ty
College," by Raymond A. Pietak,
21/1 (Jan.), 9
Computer Directory and Buyers'
Guide: "Annual Index for Volume 20, 1971 and Computer
Directory and Buyers' Guide
Issue, Vol. 19, No. 6B of
'Computers and Automation',"
21/1 (Jan.), 25
"Free Entries for Your Organization in the 1973 Computer
Directory and Buyers' Guide
Issue -- Notice," 21/6B
(Aug.), 176
"'The Computer Directory and
Buyers' Guide' Issue of "Computers and Automation', Notice": 21/5 (May), 40; 21/6
(June), 7
"The Computer Directory and
Buyers' Guide Issue 1973 -Notice," 21/6B (Aug.), 178
"Computer Directory and Buyers'
Guide, 1972": 21/7 (July), 50:
21/8 (Aug.), 39; 21/9 (Sept.),
39; 21/10 (Oct.), 34; 21/11
(Nov.), 40; 21/12 (Dec.), 51
"Computer Employed in Inner-City
Heal th Program," 21/8 (Aug.),
43
"Computer Helps Analyze Worldwide Political Behavior," 21/7
(July), 40
"Computer Helps Develop Tomorrow's
Telephone System," 21/9 (Sept.),
41
"Computer Helps Firm Produce Tiffany-Inspired Lampshades," 21/
8 (Aug.), 42
"Computer Helps a Tree-Care Company Schedule and Plan," 21/6
(June), 44
"Computer Increasing Criminal Arrests by 10 Per Cent," 21/7
(July), 42
"The Compu ter and the I nte llec tual Frontier," by Dr. Richard
W. Hamming, 21/6 (June), 25
"Computer Keeps 'Railroad' Running Smoothly," 21/3 (Mar.),
40
"A Computer Laboratory for Elementary Schools," by Dr. Seymour Papert, 21/6 (June), 19
"Computer Loaned to Massachusetts
Prisoners," 21/5 (May), 43
Computer manufacturer, "How To
Get the Best Out of a Computer
Manufacturer," by David Futcher,
21/2 (Feb.), 8
"Computer Music in 1972," by
Stuart Smith, 21/10 (Oct.), 16
"Computer Now Rides Up Front in
Police Cruisers," by Chuck
Gillam, 21/1 (Jan,), 50
"Computer Plays Key Role at Hillsborough Communi ty College,"
21/8 (Aug.), 43
"Computer Science Is Added to
College's Art Curriculum," 21/
3 (Mar.), 40
"Computer System Models," by
Sal vatore C. Catania, 21/3
(Mar.), 14
"Computer Tells Car Owners When
Maintenance Is Needed," 21/10
(Oct.), 43
"Computer Thinking," by G. M. R.
Graham, 21/3 (Mar.), 17
Computer-aided instruction, "CAl
(Computer-Ai ded Ins truc t ion)
Shortens Physician Learning
Process," 21/12 (Dec.), 43
"Compu ter-As s is ted Analys i sand
Documentation of Computer Programs," 21/10 (Oct,), 32
"Computer-Field Information vs.
Social Rag," by Arthur Martin
and Edmund C. Berkeley, 21/7
(July), 36
"Computerizing A Membership Association," by William R. Pollert, 21/4 (Apr.), 21
Computer-Link Corp., "Lessons
Learned from Recent Floods of
Computer Rooms," 21/11 (Nov.),
39
Computers and Automation, "Missing Issues of 'Computers and
Automation'," from Stanley Jaffin, and Edmund C. Berkeley,
21/5 (May), 28
"Computers in Banking," by J. Q.
Hollom, 21/8 (Aug.), 20

"Computers and Cartography," by
Dennis L. Bress, 21/8 (Aug.),
25
"Computers, Ciphers, and Cryptography," by Otis Minot, R.A.
Sobieraj, and K. D. Streetman,
21/2 (Feb.), 47
"Computers and Communications,"
by R. C. Scrivener, 21/9
(Sept.), 10
"Computers at Crisis," by Milton
R. Wessel, 21/2 (Feb.), 10
"Computers and Dossiers -- Part
1," by Vern Countryman, 21/1
(Jan.), 13
"Computers and Dossiers -- Part
II," by Vern Countryman, 21/2
(Feb.), 14
'''Computers Enter the Busing
Controversy' -- Addendum," by
Robert L. Glass, 21/4 (Apr.),

Criminal cases, "District's Superior Court Uses Computer To
Keep Track of 100,000 Criminal
Cases," Joseph M. Burton, Clerk.
21/2 (Feb,), 52
Cryptography, "Computers, Ciphers, and Cryptography," by
Otis Minot, R. A. Sobieraj,
and K. D. Streetman, 21/2
(Feb.), 47
"Cryptology, The Computer, and
Data Privacy," by M. B. Girsdansky, 21/4 (Apr.), 12
",The Curse of a Magazine," by
Edmund C. Berkeley, 21/2
(Feb.), 6
Cutler, Robert B., "Spotlight
on McGeorge Bundy and the
White House Situation Room,
November 22, 1963," 21/1 (Jan.),
57

7
"Computers To Handle Problems on
National Economy, Power Neto
works and Ecology," 21/6 (June),
"DEC's New School Computer Sys45
"Computers and Spelling," by
tems," 21/12 (Dec.), 44
DPMA, "Business Programmer Exam
Edmund C. Berkeley, 21/11
(Nov.), 6
Announcements and Study Guides
"A Concerted Campaign To Deny
Now Available," 21/9 (Sept.),
the American People Essential
42
Knowledge About the Operation
DTSS, Inc., "Dartmouth College
of Their Government," by Henry
Announces Formation of DTSS,
Steele Commager, 21/4 (Apr.),
Inc.," 21/12 (Dec.), 45
"Dallas: Who, How, Why? -- Part
33
Conference, "Fall Joint Computer
1," by Mikhail Sagatelyan, 21/
Conference: Topics," by Edmund
3 (Mar.), 28
C. Berkeley, 21/4 (Apr.), 33
"Dallas: Who, How, Why? Part
Confidential data: "3400 OrganiII," by Mikhail Sagatelyan,
zations Required by Court
21/4 (Apr.), 37
Order to Furni sh Confiden"Dallas: Who, How, Why? -tial Data to IBM," by Leon
Part III," by Mikhail SagatelDavidson, John D. French,
yan, 21/5 (May), 34
Norman R. Carpenter, and
"Dallas: Who, How, Why? -- Part
Philip Neville, 21/2 (Feb.),
IV: Conclusion," by Mikhail
21
Sagatelyan, 21/6 (June), 34
"3400 Organizations Required
D' Anna, Anthony J., "A Transby Court Order to Furnish
portation Information System,"
Confidential Data to IBM -21/9 (Sept.), 14
II," by Richard E. Sprague,
Dartmouth College, "Canadi an
Norman R. Carpenter, and
Colleges and High Schools are
Business Week, 21/3 (Mar.),
Members of Dartmouth's Time19
Sharing Computer Network," 21/
Conservation, "The Alaska Pipe7 (July), 43
line Reading Lesson," by Stew"Dartmouth College Announces Forart M. Brandborg, 21/6 (June),
mation of DTSS, Inc.," 21/12
(Dec.), 45
30
Conspiracy, "The Assassination
"Data Banks Endangering Personal
of Senator Robert F. Kennedy:
Liberty: Report of Debate in
Proofs of Conspiracy and of
Parliament, London, Engl and,
Two Persons Firing," by RichApril 21, 1972," 21/6 (June),
ard E. Sprague and William W.
40
Harper, 21/9 (Sept.), 24
"Data Center Services Offered
Construction, "Datran Receives
Smaller Stores Installing ElecInitial Construction Permits,"
tronic POS Equipment," 21/8
21/6 (June), 45
(Aug.),44
"The Construction of Living RoData system, "The Meaning of an
bots -- Part 1," by Edmund C.
Integrated Data System," by W.
Berkeley, 21/8 (Aug.), 27
R. Larson, 21/4 (Apr.), 35
Consultant, "The Management Con"Datran Receives Initial Consul tant' s Role in Assessment
struction Permits," 21/6 (June),
of Data Processing Activities,"
45
by James K. McKenna, Jr., 21/
Davey Tree Surgery Company, "Com10 (Oct.), 9
puter Helps a Tree-Care Company
Contest -- see "Art Contes t"
Schedule and Plan," 21/6 (June),
-- sec "Martin Luther King
44
Memorial Prize Contest"
Davidson, Leon, and John D, French,
Contracts -- see "New Contracts"
Norman R. Carpenter, Philip
Correction, "CDC vs IBM -- CorNeville, "3400 Organizations
rection," from Frederic O. ParRequired by Court Order to Furlova and Edmund C. Berkeley,
nish Confidential Data to IBM,"
21/4 (Apr.), 32
21/2 (Feb.), 21
"Corrections": 21/1 (Jan.), 47;
Davis, Ruth M., "The U.S. Center
21/4 (Apr.), 32; 21/6 (June),
for Computer Sciences and Tech49; 21/7 (July), 38
nology," 21/3 (Mar.), 7
"Correction and Retraction," by
Dayhoff, Judy, "Whiskered Frisby"
William W. Harper and Edmund
(Computer Art), 21/8 (Aug.), 13
C. Berkeley, 21/12 (Dec.), 21
"Dealing with Today's Problems,"
Correctional institution, "New
by John Skowronski, 21/4 (Apr.),
Jersey Correctional Institut7
ion Pioneers Data Processing
"The Death of the Democratic ParEducation for Inmates," by G.
ty Candidate for the Presidency,
Thompson Durand, 21/2 (Feb.),
1972," by Edmund C. Berkeley,
52
21/5 (May), 6
"Counting the Number of ApplicaDebate, "Data Banks Endangering
tions of Computers," by Edmund
Personal Liberty: Report of
C. Berkeley, 2l/6B (Aug.), 3
Debate in Parliament, London,
Countryman, Vern: "Computers and
England, April 21, 1972," 21/6
Dossiers -- Part I," 21/1
(June),40
(Jan.), 13
'''Debugging System' for Computers
"Computers and Dossiers -- Part
Patented by Goodyear Tire & RubII," 21/2 (Feb.), 14
ber," 21/2 (Feb.), 53
Court, "District's Superior Court
"Deciphering an Unknown Compu ter
Uses Computer To Keep Track of
Program, as Compared with De100,000 Criminal cases," Joseph
ciphering of Ancient Writing,"
M. Burton, Clerk, 21/2 (Feb.),
by Edmund C. Berkeley, 21/5
52
(May), 19
Crime: "Computer Increasing Crim- Decisions, "Essential Computer
inal Arrests by 10 Per Cent,"
Concepts for Top Management: IV,
21/7 (July), 42
Workable, Sound, Data Processing
"Do You Want To Stop Crime?,"
Decisions," by Robert A. Gagnon,
by William p. Wood, III, 21/4
21/1 (Jan.), 8
(Apr.), 31
Dellums, Ronald V., Representative,
"Operation Clean Sweep -- A
"Wor 1 d Pe ace Tax Fund Ac t -City's War on Crime," by James
Proposed Legislation," 21/10
P. Alexander, 21/2 (Feb.), 51
(Oct.), 36

Annual Index

I,

,

DeLong, Edward K., "The Activities of the Central Intelligence Agency, at Six Billion
Dollars a Year," 21/2 (Feb.),
38
Democratic party: "The Death of
the Democratic Party Candidate for the Presidency,
1972," by Edmund C. Berkeley,
21/5 (May), 6
"Wal ter Sheridan -- Democrats'
Investigator? or Republicans'
Countermeasure?," by Richard
E. Sprague, 21/11 (Nov.), 29
Democrat ic party headquarters:
"Bernard L. Barker: Portrait
of a Watergate BurgI ar," by
Edmund C. Berkeley, 21/11
(Nov.), 26
"The June 1972 Raid on Democratic Party Headquarters,"
by Richard E. Sprague, 21/8
(Aug.), 33
"The June 1972 Raid on Democratic Party Headquarters
(The Watergate Inci dent) -Part 2," by Richard E. Sprague, 21/10 (Oct.), 18
"The June 1972 Raid on Democratic Party Headquarters
(The Watergate Incident) -Part 3," by Richard E. Sprague, 21/12 (Dec.), 24
"Dental School Explores ComputerAided Instruction," 21/7
(July), 43
Digital computers, "Charac teristics of Digi tal Computers,"
by G~L Corp., 21/6B (Aug.), 92
Digital Equipment Corp., "DEC's
New School Computer Sys terns, "
21/12 (Dec.), 44
Director, corporate, "On the
Legal Side: The Outside Director," by Milton R. Wessel,
21/4 (Apr.), 7
Directory and Buyers' Guide,
"The Computer Directory and
Buyers' Guide Issue 1973 -Notice," 21/6B (Aug.), 17B
Discovery, "Statistics -- A
Guide to the Unknown," by Edmund C. Berkeley, 21/10 (Oct.),
6
Discriminat ion, "The Mas ter Discriminatory Tool," by Douglas
Wright, 21/9 (Sept.), 22
District of Columbia: "District's Superior Court Uses
Computer To Keep Track of
100,000 Criminal Cases,"
Joseph M. Burton, Clerk, 21/
2 (Feb.), 52
"Operation Clean Sweep -- A
Ci ty' s War on Crime," by
Jame s P. Alexander, 21/2
(Feb.), 51
"District's Superior Court Uses
Computer To Keep Track of
100,000 Criminal Cases," Joseph M. Burton, Clerk, 21/2
(Feb.), 52
'" Do What I Mean': The Programmer's Assistant," by Warren Teitelman, 21/4 (Apr.), 8
"Do You Want To Stop Crime?,"
by William P. Wood, III, 21/4
(Apr.), 31
DoctorsAid, "Mini-Based System
Takes Low Cost Patient Medical History," 21/12 (Dec.), 44
Documentation, "Computer-Ass isted ·Analysis and Documentation
of Computer Programs," 21/10
(Oct.), 32
"Does Telephone Regulation Protect the User?," by Bernard
Strassburg, 21/12 (Dec.), 11
Domestic discord, "The Promotion of Domestic Discord," by
Vincent J. Salandria, 21/1
(Jan.), 37
"Don't Die, Ducky, Don't Die •.• ,"
by Bradley Yaeger & Associates, 21/8 (Aug.), 40
Doomsday, "Association for the
Prevention of Doomsday -News and Ideas," 21/10 (Oct.),
36
"Doomsday -- Class A Hazards,"
from Edmund C. Berkeley, 21/
11 (Nov.), 38
Dossiers: "Computers and Dossiers -- Part I," by Vern
Countryman, 21/1 (Jan.), 13
"Computers and Dossiers -Part II," by Vern Countryman, 21/2 (Feb.), 14
Drew Health Center, "Computer
Employed in Inner-City Health
Program," 21/8 (Aug.), 43
Dreyer;· J. L." "Secrecy in the
Data Process ing Industry,"
21/8 (Aug.), 24
Ducky, "Don't Die, Ducky, Don't

Die •.• ," by Bradley Yaeger &
Associates, 21/8 (Aug.), 40
Dunker, Kenneth F., and Paul
Shao: "Lak Gou" (Computer
Art), 21/8 (Aug.), 16
"Nine Perspective Projections,"
(Computer Art), 21/8 (Aug.),
10
Durand, G. Thompson, "New Jersey Correctional Institution
Pioneers Data Processing Education for Inmates," 21/2
(Feb.), 52
"The Dvorak Simplified Keyboard:
Forty Years of Frustration,"
by Robert Parkinson, 21/11
(Nov.), 18

"EDP Axioms -- A Cri tical Analysis," by W. Leon Sanford, 21/
5 (May), 12
EDP service bureaus, "Sati sfaction of Companies with Services Received from EDP Service
Bureaus," by Michael J. Cerullo, 21/1 (Jan.), 43
Ecology: "Computers To Handle
Problems on National Economy, Power Networks and Ecology," 21/6 (June), 45
"Don't Die, Ducky, Don't Die
•.• ," by Bradley Yaeger &
Associates, 21/8 (Aug.), 40
"Two Wisconsin Rivers Are
Cleaner -- Officials Credit
Computer," 21/9 (Sept.), 41
Economy, "Computers To Handle
Problems on National Economy,
Power Networks and Ecology,"
21/6 (June), 45
EDITORIAL: "Achieving 'Personal'
Response from a Computer,"
by Edmund C. Berkeley, 21/3
(Mar.), 6
"Chess and Computers," by Edmund C. Berkeley, 21/9
(Sept.), 6
"Computers and Spelling," by
Edmund C. Berkeley, 21/11
(Nov.), 6
"Counting the Number of Applications of Computers," by Edmund C. Berkeley, 21/6B
(Aug.), 3
"The Curse of a Magazine," by
Edmund C. Berkeley, 21/2
(Feb.), 6
"The Death of the Democratic
Party Candidate for the
Presidency, 1972," by Edmund
C. Berkeley, 21/5 (May), 6
"The House Is on Fire," by
Edmund C. Berkeley: 21/2
(Feb.), 37; 21/8 (Aug.), 38
"Hurray for the Univac Division of Sperry Rand," by
Edmund C. Berkeley, 21/1
(Jan.), 6
"The Old Brain, The New Brain,
The Giant Brain, and Common
Sense," by Edmund C. Berkeley, 21/4 (Apr.), 6
"Post-Maturity in the Computer
Field," by Edmund C. Berkeley and Montgomery Phister,
Jr .. 21/12 (Dec.), 6
"The Pur sui t of Truth in Input, Output, and Processing,"
by Edmund C. Berkeley, 21/8
(Aug.), 6
"The Shooting of Governor
George C. Wallace, Candidate
for President," by Edmund C.
Berkeley, 21/7 (July), 10
"The Shortage of Good Typists
-- and the JJ Command," by
Edmund C, 8erkeley, 21/6
(June),6
"Statistics -- A Guide to the
Unknown," by Edmund C. Berkeley, 21/10 (Oct.), 6
Education: "A Computer Laboratory for Elementary Schools,"
by Dr. Seymour Papert, 21/6
(June),19
"Health and Education of Migrant Workers Is Being Watched by a Computer," 21/6
(June), 44
"Helping Out," 21/7 (July), 42
"New Jersey Correctional Insti tution Pioneers Data Process ing Education for Inmates," by G, Thompson Durand, 21/2 (Feb.), 52
"Education for Data Processing:
Yesterday, Today, Tomorrow,"
by Thomas R, Tirney, 21/7
(July), 14
"Educational Television Transmission System Connects Universities and Industries," by J.

P. Shanks, 21/1 (Jan.), 49
"Effective Management of an
Instrument Pool," by D. R.
Townsend, 21/5 (May), 8
Egan, M., and Edmund C. Berkeley,
"Publishing Articles on Issues
that Don't Get the Attention
They Deserve," 21/10 (Oct.),
38
"Eight Hundred People Interested
in Mechanical Brains," by
Edmund C. Berkeley, 21/1 (Jan.),
7
"Eight Photographs of a Bush:
Pictorial Reasoning Tests -Part 7," by Neil Macdonald,
21/10 (Oct.), 27
Elemen tary schools, "A Computer
Laboratory for Elementary
Schools," by Dr. Seymour Papert, 21/6 (June), 19
Elias, Dr. Samy E. G., and R. E.
Ward, Michael Wilson, "Personal Rapid Transit, Computerized,
in Morgantown, West Virginia,
Part II: The Computer as the
Heart of Personal Rapid Transit," 21/6 (June), 13
"Emission-I" (Computer Art), by
Sozo Hashimoto, 21/8 (Aug.),
13
"Encouragemen t for the Pursuit
of Truth," from Mrs. Ruth
Shapin, Mrs. Lucy Bell, William
H. Wynne, Rainer M. Goes, and
Thomas D. Bryant, 21/11 (Nov.),
38
England, "Computers in Banking,"
by J. Q. Hallam, 21/8 (Aug.),
20
"English College's Timesharing
System Has 3000 Users," 21/11
(Nov.), 42
Environment, "Air-Pollution Game
To Deal with Environmental
Problems," by Prof. Mat thew J.
Reilly, 21/1 (Jan.), 50
Environmental health, "Ohio State
Uni vers i ty Probing Effect of
Environmental Changes on Ilody,"
21/10 (Oct.), 44
"Essenti al Computer Concepts for
Top Management: IV, Workable,
Sound, Data Processing Decisions," by Robert A. Gagnon,
21/1 (Jan.), 8

Fabric cutting, "Forty + One
Ways To Cut a Coat," by Vectors' Staff, 21/3 (Mar.), 22
Fa'C't'S, "Some Hard Facts, and
What To Do About Them," by Edmund C. Berkeley, 21/10 (Oct.),
3
"Faculty Loans to Black Colleges," by E. Nanas, 21/2 (Feb.),
52
"Fall Joint Computer Conference:
Topics," by Edmund C. Berkeley,
21/4 (Apr.), 33
Farewell America: "The Central
,
Intelligence Agency: A Short
History to Mid-1963 -- Part
1," by James Hepburn, 21/11
(Nov.), 32
"The Central Intelligence Agency: A Short Hi s tory to
Mid-1963 -- Part 2," by James
Hepburn, 21/12 (Dec.), 34
Film reader, "Japanese Firm Buys
Programmable Film Reader,"
21/8 (Aug.), 45
Fire, "The House Is on Fire,"
by Edmund C. Berkeley: 21/2
(Feb.), 37; 21/8 (Aug.), 38
Floods, "Lessons Learned from
Recent Floods of Computer
Rooms," Computer-Link Corp.,
21/11 (Nov.), 39
"Flores En Fortranes," (Computer
Art), by Thomas J. Huston, 21/
8 (Aug.), 18
Florida, "Poinciana, New Florida
City, Being Planned with Aid
of Computer," McDonnell Douglas
Automation Co., 21/2 (Feb.),
51
"Forty + One Ways To Cut a Coat,"
by Vectors' Staff, 21/3 (Mar.),
22
"Free Computer Training Center
Coming to Harlem, NY," 21/5
(May), 42
"Free Entries for Your Organization in the 1973 Computer Directory and Buyers' Guide Issue -- Notice," 21/6B (Aug.),
176
French, John D., and Leon Davidson, Norman R. Carpenter, Philip Neville, "3400 Organizations Required by Court Order

to Furnish Confidential Data
to IBM," 21/2 (Feb.), 21
"French National Railway Implements Addi tional Computerization To Enhance Profitabili ty," 21/9 (Sept.), 40
The Frenchman Who Was To Kill
Kennedy, "Le Francais Qui Devai t Tuer Kennedy (The Frenchman Who Was To Kill Kennedy),"
by Philippe Bernert and Camille Gilles, 21/12 (Dec.), 38
Fuj itsu, Ltd., "Japanese Firm
Buys Programmable Film Reader," 21/8 (Aug.), 45
Fulbright, J. William, and Richard M. Nixon, and others,
"Poli tical Lies: An Acceptable Level?," 21/4 (Apr.), 44
Futcher, David, "How To Get the
Best Out of a Computer Manufacturer," 21/2 (Feb.), 8
G

G.E. computer, "Swedish Steel
Producer Linked to G.E. Computer in Cleveland," 21/11
(Nov.), 41
G~L Corp., "Characteristics of
Digi tal Computers," 21/6B
(Aug.), 92
Gagnon, Robert A., "Essential
Computer Concepts for Top
Management: IV, Workable,
Sound, Data Processing Decisions," 21/1 (Jan.), 8
Games: "ZINGO -- A New Computer
Game," by Edmund C. Berkeley, 21/2 (Feb.), 32
"ZINGO -- A New Game for Computers and/or People": 21/3
(Mar.), 2; 21/11 (Nov.), 3
Gearing, Harold W.' G., and others, "The Bad Image That Computers Are Earning," 21/4
(Apr.), 29
General science, "Common Sense,
Wisdom, General Science, and
Compu ter s -- II," by Edmund
C. Berkeley, 21/1 (Jan.), 11
"Geographic Roster of Organizations in Computers and Oat a
Processing," 21/6B (Aug.), 51
"Georgia Inaugurates Statewide
Computerized Training Program
in Vocational Technical Schools," 21/8 (Aug.), 44
"Georgia To Release Cash Flow
Sys tern To State and Local Governments at No Cost," 21/9
(Sept.), 42
Gerberick, Dahl A., "Oversupply
of People in the Computer
Field," 21/12 (Dec.), 23
Gerstenhaber, Murray, "Undergraduate Mathematics Training
in 1984 -- Some Predictions,"
21/11 (Nov.), 11
Gillam, Chuck, "Computer Now
Rides Up Front in Police Cruisers," 21/1 (Jan.), 50
Gilles, Camille, and Philippe
Bernert, "Le Francais Qui Devai t Tuer Kennedy (The Frenchman Who Was To Kill Kennedy),"
21/12 (Dec.), 38
Girsdansky, M. B., "Cryptology,
The Computer, and Oats Privacy," 21/4 (Apr.), 12
Glaciers, "Scientists Obtain
First Three-Dimens ional Look
at Glaciers with Help of Computer," 21/3 (Mar.), 39
Gl ass fiber, "Video telephony
Via Glass Fiber," 21/11 (Nov.),
42
Glass, Robert L., '''Computers
Enter the Busing Controversy'
-- Addendum," 21/4 (Apr.), 7
Goes, Rainer M., and Mrs. Ruth
Shapin, Mrs. Lucy Bell, William H. Wynne, Thomas D. Bryant, "Encouragement for the
Pursuit of Truth," 21/11 (Nov,),
38
Goodrich, B. F., "Marriage of
Computers Meets Special Data
Processing Needs of B. F.
Goodrich," by Arthur Wi 11 iams.
21/1 (Jan.), 49
Goodyear Tire & Rubber, '''Debugging System' for Computers
Patented by Goodyear Tire &
Rubber," 21/2 (Feb.), 53
Government: "The CIA: A Visible Government in Indochina,"
by Fred Branfman and Steve
Cohn, 21/2 (Feb.), 41
"A Concerted Campaign To Deny
the American People Essential Knowledge About the Operation of Their Government,"
by Henry Steele Commager,

21/4 (Apr.), 33
"Georgia To Release Cash Flow
System to State and Local
Governments at No Cost,"
21/9 (Sept.), 42
"The Information Industry and
Government Pol icy," by Cl ay
T. Whitehead, 21/4 (Apr.),
24
"North Vietnam and American
Bombing: Six American Government Lies," by Bill Zimmerman, 21/9 (Sept,), 33
"The Present Role of Governments in the World Computer
Industry," by C, W. Spangle,
21/12 (Dec.), 16
Graham, G. M. R., "Computer
Thinking," 21/3 (Mar.), 17
"Gravi ty Effects Studied Under
Compu ter-Controlled Experiments," 21/7 (July), 40
Gray, Stephen Barrat, "Building
Your Own Computer -- Part II,"
21/1 (Jan.), 20
Great Lakes, "Small Computer
'Tracks' Great Lakes Sailors,"
21/9 (Sept.), 41
Grimshaw, William F., "Pontiac
Dealers Use Computer To Track
Car Production for Consumers,"
21/2 (Feb.), 51
Gun numbers, "Marlin Computerized
System for Checking and Recording Gun Numbers," 21/8 (Aug.),
42
H
Hamming, Dr. Richard W., "The
Computer and the Intellectual
Frontier," 21/6 (June), 25
"Harbor Surveillance System Foresees Collisions, Surface Traffic Problems," 21/3 (Mar.), 41
Harlem, NY, "Free Computer Training Center Coming to Harlem,
NY," 21/5 (May), 42
Harper, William W., and Edmund
C. Berkeley, "Correction and
Retraction," 21/12 (Dec.), 21
Harper, William W., and Richard
E. Sprague, "The Assassination
of Senator Robert F. Kennedy:
Proofs of Conspiracy and of Two
Persons Firing," 21/9 (Sept.),
24
Harrison, S. R., "Some Responsibility for Our Chaotic Society,"
21/4 (Apr.), 34
Harvard Uni v., "Chine se Computer
Science More Advanced Than
Expected," 21/10 (Oct.), 45
Hashimoto, Sozo, "Emiss ion-I"
(Computer Art), 21/8 (Aug.), 13
Hatfield Polytechnic, "English
College's Timesharing System
Has 3000 Users," 21/11 (Nov.),
42
Heal th, "Computer Employed in
Inner-City Heal th Program," 21/
8(Aug.),43
"Health and Education of Migrant
Workers Is Being Watched by a
Computer," 21/6 (June), 44
"Helping Out," 21/7 (July), 42
Hepburn, James: "The Central
Intelligence Agency: A Short
History to Mid-1963 -- Part 1,"
21/1 (Nov.), 32
"The Central Intelligence Agency: A Short History to Mid1963 -- Part 2," 21/12 (Dec.),
34
"The High Cost of Vendor's Software Practices: Why?," by Raymond E. Bache, 21/12 (Dec.), 20
Hillsborough Community College,
"Computer Plays Key Role at Hillsborough Communi ty College,"
21/8 (Aug.), 43
Hollom, J. Q., "Computers in
Banking," 21/8 (Aug,), 20
I1oneywell, Inc., "Computer Loaned
to Massachusetts Prisoners,"
21/5 (May), 43
"Horizons and Rebellion," by Edmund C. Berkeley, 21/9 (Sept.),
36
"The House Is on Fire," by Edmund
C. Berkeley: 21/2 (Feb.), 37;
21/8 (Aug.), 38
House of Representatives, "Lead
Poisoning: The Hypocrisy of the
Presidency, and of the Appropriations Committee of the House of
Representatives," by William L.
Clay, 21/8 (Aug.), 7
"How Fiendish Can You Get?," by
Helsingen Sanomat, Ian Low, Judy
Bellin, Bella Abzug, and Edmund
C. Berkeley, 21/5 (May), 31
"How Technolouy Is Freeing the
Secretory," by Evelyn Berezin,
21/10 (uct.), 15

25

Annual Index
"How To Get the Best Out of a
Computer Manufacturer," by
David Futcher, 21/2 (Feb.), 8
Howells, W. W., "The Importance
of Being Human," 21/10 (Oct.),
12
Human, "The Importance of Being
Human," by W. W. Howells, 21/
10 (Oct.), 12
!lumbert, Dr. !lerbert E., "Academic Computer Practices, and
Their Deficiencies," 21/5 (May),
16
"Hurray for the Univac Division
of Sperry Rand," by Edmund C.
Berkeley, 21/1 (Jan.), 6
Huston, Thomas J.: "Flores En
Fortranes," (Computer Art),
21/8 (Aug.), 18
"Sky Lab SVB" (Computer Art),
21/8 (Aug.), 12

Braillemboss Being Used by
Blind IRS Representative," 21/
9 (Sept.), 43
"Internal Revenue Service: Use
of Computers," by William II.
Stewart, Jr., 21/4 (Apr.), 34
"Inventory of the Issues of the
(LA Notebook on Common Sense,
Volume 1," 21/5 (May), 3
"Invisible Phonograph Needle in
Development by Navy," 21/9
(Sept.), 43
Issues, controversial, "Publishing Articles on Issues that
Don't Get the Attention They
Deserve," from M. Egan and Edmund C. Berkeley, 21/10 (Oct.),
38
Italy, "Persuasion -- Ital ian
Style," by Peter Tumi ati, 21/6
(June),41

IBM:

JJ command: "On the JJ Command,"
from Tore Rambol and Edmund
C. Berkeley, 21/10 (Oct.), 37
"The Shortage of Good Typists
-- and the JJ Command," by
Edmund C. Berkeley, 21/6
(June),6
Jaffin, Stanley, and Edmund C.
Berkeley, "Missing Issues of
'Compuers and Automation', tI
21/5 (May), 28
.. Japanese Firm Buys Programmable
Film Reader," 21/8 (Aug.), 45
Jenkins, Gareth, "Who Shot President Kennedy -- or Fac t and
Fable in History," 21/2 (Feb.),
43
Job requirement s, .. Industr i al
Robot Will Automatically Select and Match Actions to Changing Job Requirements," by
Michael M. Meyers, 21/1 (Jan.),
SO
Jobs, "Oversupply of People in
the Computer Field," by Dahl
A. Gerberick, 21/12 (Dec.), 23
John Hopkins Uni v., "Harbor
Surveillance System Foresees
Collisions, Surface Traffic
Problems," 21/3 (Mar.), 41
Johnson, Jim, and Edmund C. Berkeley, "Subscription Errors:
(LA Will Correct," 21/11 (Nov.),
39
Johnson, Lyndon B., "Dallas:
Who, How, Why? Part II," 21/4
(Apr.), 37
"The June 1972 Raid on Democratic Party Headquarters," by
Richard E. Sprague, 21/8 (Aug.),
33
"The June 1972 Raid on Democratic Party Headquarters (The
Watergate Incident) -- Part 2,"
by Richard E. Sprague, 21/10
(Oct.), 18
"The June 1972 Raid on Democratic Party Headquarters (The
Watergate Incident) -- Part 3,"
by Richard E. Sprague, 21/12
(Dec.),24
"Justice Department Interested
in ADAPSO Hearings," 21/3
(Mar.), 41

"CDC vs IBM -- Correction,"
from Frederic O. Parlova
and Edmund C. Berkeley, 21/
4 (Apr.), 32
"3400 Organizations Required
by Court Order to Furnish
Confidential Data to IBM,"
by Leon Davidson, John D.
French, Norman R. Carpenter,
and Philip Neville, 21/2
(Feb.), 21
"3400 Organizations Required
by Court Order to Furni sh
Confidential Data to IBM II," by Richard E. Sprague,
Norman R. Carpenter, and
Business Week, 21/3 (Mar.),
19
"IBM's Powerful Partner: The
Accounting Principles Board,"
from Samson Science Corp.,
21/4 (Apr.), 31
Ihrcr, Fred C., "Benchmarking

vs. Simulation," 21/11 (Nov.),

8
Image, "The Bad Image That Computers Are Earning," from
Harold W. G. Gearing and others, 21/4 (Apr.), 29
"Image Analysis -- Even for Abraham Lincoln," 21/3 (Mar.),
39
"The Impact of the Compu ter on
Society -- Some Comments," by
Joseph Weizenbaum, 21/7 (July),
18
"The Importance of Being Human,"
by W. W. Howells, 21/10 (Oct.),
12
Index, "Annual Index for Volume
20, 1971 and Computer Directory and Buyers' Guide Issue.
Vol. 19, No. 6B of 'Computers
and Automation' ," 21/1 (Jan.),
25
Indochina, "The CIA: A Visible
Government in Indochina," by
Fred Branfman and Steve Cohn,
21/2 (Feb.), 41
"Industrial Robot Will Automatically Select and Match Actions
to Changing Job Requirements,"
by Michael M. Meyers, 21/1
(Jan.), 50
Informatics, Inc., "Toxicology
Research Data Available Via
On-line Nationwide Network,"
21/6 (June), 44
Information engineer, "The Neglect of Significant Subjects,
and the Information Engineer,"

by Peter J. Nyikos and Edmund
C. Berkeley, 21/7 (July), 30
"The Information Industry and
Government Policy," by Clay
T. Whitehead, 21/4 (Apr.), 24
Information Interchange, "Ameri.
can Standard Code for Information Interchange, ASCII," 21/
6B (Aug.), 180
Installations -- see "New Installations"
Instant Transaction, "CashlessSociety Project Reports Progress in N. Y.... 21/7 (July),
41
Insti tutions, "Reducing and Dismantling Science and Research
Institutions, and Social Responsibility," by Andrew G.
Michalitsanos, 21/4 (Apr.), 32
Instrument pool, "Effecti ve Management of an Instrument Pool."
by D. R. Townsend, 21/5 (May).
8
Intellectual Frontier, "The Con,puter and the Intellectual
Frontier," by Dr. Hichard W.
Hamming, 21/6 (June), 25
Internal Revenue Service, "M. 1. T.-

26

K

Kaler, John, and Edmund C. Berkeley, "Unhappy Subscriber to
Satisfied One," 21/7 (July),
38
Kennedy, John F., President:
"Dallas: Who, How, Why? Part
II," by Mikhail Sagatelyna,
21/4 (Apr.), 37
"Le Francais Qui Devai t Tuer
Kennedy (The Frenchman Who
Was To Ki 11 Kennedy)," by
Philippe Bernert and Camill ..
Gilles, 21/12 (Dec.), 38
"Who Shot President Kennedy or Fact and Fable in History,"
by Gareth Jenkins, 21/2
(Feb.),43
Kennedy, Senator Robert F., "The
Assassination of Senator Robert
F. Kennedy: Proofs of Conspiracy and of Two Persons Firing,"
by Richard E. Sprague and William W. Harper, 21/9 (Sept.),
24
Kentucky, Univ. of: "Architecture Students Turning to Computer To Improve Design, Creativity," 21/5 (May), 42
"Dental School Explores Computer-Aided Instruction," 21/
7 (July), 43
"Gravi ty Effects Studied Under

Computer-Controlled Experiments," 21/7 (July), 40
Keyboard, "The Dvoark Simplified
Keyboard: Forty Years of Frustration," by Robert Parkinson,
21/11 (Nov.), 18
King, Martin Luther, "Martin
Luther King Memorial Prize Contest -- Fourth Year," 21/2
(Feb.), 34
Knowledge, "The Mos t Important
of All Branches of Knowledge,"
by Edmund C. Berkeley: 21/1
(Jan.), 36; 21/2 (Feb.), 2;
21/6 (June), 50; 21/7 (July),

7
Kunstler, William M., "Only
People Massed Together Can Alter Systems," 21/9 (Sept.), 28
Kyle, D. F., "Sperry Rand and
RCA Sign Final Agreement,"
21/2 (Feb.), 53

"Lak Gou" (Computer Art), by
Kenneth F. Dunker and Paul
Shao, 21/8 (Aug.), 16
Lamps, "Tiny Lamps that Glow for
100 Years," Western Electric
Company, Inc., 21/2 (Feb.), 53
Lampshades, "Computer Helps Firm
Produce Tiffany-Inspired Lampshades," 21/8 (Aug.), 42
Landgrebe, Dr. David, "Aerial
Photography and Computers Aid
the Battle Against Blight and
Pollution," 21/1 (Jan.), 48
Languages, programming, "Ros ter
of Programming Languages 1972,"
by Jean E. Sammet, 21/6B (Aug.),
123
Larson, W. R., "The Meaning of
an Integrated Data System,"
21/4 (Apr.), 35
Law, "Mississippi's Computerized
Statute System," 21/10 (Oct.),
43
"Le Francais Cui Devait Tua Kennedy (The Frenchman Who Was To
Kill Kennedy)," by Philippe
Bernert and Camille Gilles, 21/
12 (Dec.), 38
"Lead Poisoning: The Hypocrisy
of the Presidency, and of the
Appropriations Commi ttee of
the House of Representatives,"
by William L. Clay, 21/8 (Aug.),
7
Legal: "On the Legal Side: A
Lien on Computer Tapes?," by
Milton R. Wessel, 21/6
(June), 39
"On the Legal Side: The Outside Director," by Mil ton
R. Wessel, 21/4 (Apr.), 7
"Lessons Learned from Recent
Floods of Computer Rooms," Computer-Link Corp .. 21/11 (Nov.),
39
Liberty, personal, "Data Banks
Endangering Personal Liberty:
Report of Debate in Parliament, London, England, April
21, 1972," 21/6 (June), 40
Lies: "North Vietnam and American Bombing: Six American
Governmen t Lie s," by Bi 11
Zimmerman, 21/9 (Sept.), 33
"Political Lies: An Acceptable
Level?," by Richard M. Nixon,
J. William Fulbright, and
others, 21/4 (Apr.), 44
"The Reality Behind the Lies
in South Vietnam," by Dr.

George Wald, 21/12 (Dec.),
31
Lincoln, Abraham, "Image Analysis -- Even for Abraham Lincoln,"
21/3 (Mar.), 39
Lipp, Michael, "Ode in Celebration of RFPs," 21/5 (May), 29
Lipscomb, James, "Adversity"
(Computer Art), 21/8 (Aug.), 9
Litton UHS, "New High-Density
Warehousing System Announced
by Litton OIlS," 21/9 (Sept.),
42
Lovett, Linda Ladd, "Over 2300
Applications of Computers and
Data Processing," 21/6B (Aug.).
137
Low, Ian, and Helsingen Sanomat,
Judy Bellin, Bella Abzug, Edmund C. Berkeley, "How FiendiSh
Can You Get?," 21/5 (May), 31
M

"M.I.T.-Braillemboss Being Used
by Blind IRS Representative,"
21/9 (Sept.), 43

Macdonald, Neil: -- see "Advanced Numbles"
-- see "Monthly Computer Census": 21/1 (Jan.), 54; 21/2
(Feb.), 56; 21/3 (Mar.), 46;
21/4 (Apr.), 48; 21/5 (May),
46; 21/6 (June), 48; 21/7
(July), 46; 21/8 (Aug.), 48;
21/9 (Sept.), 46; 21/10
(Oct.), 48; 21/11 (Nov.), 47;
21/12 (Dec.), 48
-- see "Numbles"

"Eight Photographs of a Bush:
Pictorial Reasoning Tests -Part 7," 21/10 (Oct.), 27
"Pictorial Reasoning Tests -Analysis and Answers," 21/3
(Mar.), 24
"Pictorial Reasoning Tests and
Aptitudes of People -- III,"
21/2 (Feb.), 29
"Pictorial Reasoning Tests -Part 5," 21/4 (Apr.), 26
"Pictorial Reasoning Tests -Part 6," 21/7 (July), 26
"World Computer Census," 21/6B
(Aug.), 133
Machet, Michael, Associates,
"Computer Helps Firm Produce
Tiffany-Inspired Lampshades,"
21/8 (Aug.), 42
Magazine, "The Curse of a Magazine," by Edmund C. Berkeley,
21/2 (Feb.), 6
Management, "Essential Computer
Concepts for Top Management:
IV, Workable, Sound, Data Processing Decisions," by Robert

A. Gagnon, 21/1 (Jan.), 8
"The Management Consultant's
Role in Assessment of Data
Processing Activities," by
James K. McKenna, Jr., 21/10
(Oct.), 9
"Management Information Systems:
The Trouble With Them," by
Colonel T. B. Mancinelli, 21/
7 (July), 11
Mancinelli, Colonel T. B., "Management Information Systems:
The Trouble With Them," 21/7
(July), 11
Maps, "Three Dimensional Maps
from Computer," 21/12 (Dec.),
42
Mariner, "Real-Time Pictures of
Mars by Mariner and by Computer," by Wayne E. Shufelt, 21/
6 (June'), 7
Market information system,
"Bunker-Ramo Activates New
Nationwide Market Data Sys tern,"
21/10 (Oct.), 45
"Marlin Computerized System for
Checking and Recording Gun
Numbers," 21/8 (Aug.), 42
Marlin Firearms Company, "Marlin
Computerized System for Checking and Recording Gun Numbers,"
21/8 (Aug.), 42
"Marriage of Computers Meets
Special Data Processing Needs
of B.F. Goodrich," by Arthur
Williams, 21/1 (Jan.), 49
Mars, "Real-Time Pictures of Mars
by Mariner and by Computer,"
by Wayne E. Shufelt, 21/6
(June),7
Martin, Arthur, and Edmund C.
Berkeley, "Computer-Field Information vs. Social Rag,"
21/7 (July), 36
"Martin Luther King Memorial
Prize Contest -- Fourth Year,"
21/2 (Feb.), 34
"The Master Discriminatory Tool,"
by Douglas Wright, 21/9 (Sept.),
22
Mathematics, "Undergraduate
Mathematics Training in 1984
-- Some Predictions," by Dr.
Murray Gerstenhaber, 21/11
(Nov.), 11
Maturity, "Post-Maturity in the
Computer Field." by Edmund C.
Berkeley, and Montgomery Phister, Jr., 21/12 (Dec.), 6
McDonnell Douglas Automation
Co., "Poinciana, New Florida
City, Being Planned with Aid
of Computer," 21/2 (Feb.), 51
McKenna, James K., Jr., liThe

Management Consultant's Role
in Assessment of Data Processing Activities," 21/10 (Oct.),

9
"The Meaning of an Integrated
Data System," by W. R. Larson,
21/4 (Apr.), 35
Mechanical brains, "Eight Hundred People Interested in Mechanical Brains," by Edmund C.
Berkeley, 21/1 (Jan.), 7
Medical history, "Mini-Based
System Takes Low Cost Patient

Medical History," 21/12 (Dec.),
44
Medicine, Ohio State Univ. College of, "Uni versi ty Computer
Helps Doctors with 'Bedside
Teaching' ," 21/11 (Nov.), 42
Membership, "Computerizing A
Membership Association," by
William R. Pollert, 21/4
(Apr.), 21
"Meri t Computer Network Links
Michigan's Largest Universities," 21/3 (Mar.), 40
Metropolis, New Mexico, "Mythical City Helps Students Learn
Municipal Affairs," 21/12
(Dec.),43
Meyers, Michael M., "Industrial
Robot Will Automatically Select and Match Actions to Changing Job Requirements," 21/1
(Jan.), 50
Michalitsanos, Andrew G., "Reducing and Dismantling Science
and Research Insti tutions, and
Social Responsibility," 21/4
(Apr.), 32
Michigan State Univ.: "Merit
Computer Network Links
Michigan's Largest Universities," 21/3 (Mar.), 40
"Three Dimens ional Maps from
Computer," 21/12 (Dec.), 42
Migrant workers, "Heal th and
Education of Migrant Workers
Is Being Watched by a Computer,"
21/6 (June), 44
"Mini-Based System Takes Low
Cost Patient Medical History,"
21/12 (Dec.), 44
Minori ty group, "Schol arship
Program for Minority Group
Students," 21/12 (Dec.), 44
Minot, Otis, and R. A. Sobieraj,
K. D. Streetman, "Computers,
Ciphers, and Cryptography,"
21/2 (Feb.), 47
"Missing Issues of 'Computers
and Automation'," from Stanley
Jaffin, and Edmund C. Berkeley,
21/5 (May), 28
"Mississippi's Computerized
Statute System," 21/10 (Oct.),
43
Missouri-Columbia, Univ. of,
"Image Analysis -- Even for
Abraham Lincoln," 21/3 (Mar.),
39
Mistakes, "Prevent Mistakes Before They Happen?": 21/7
(July), 8; 21/9 (Sept.), 3;
21/10 (Oct.), 2
Mohr, Manfred, "Combinatorial
Framework of the Ordinal 15"
(Computer Art), 21/8 (Aug.), 14
"Moment of Truth in Vietnam?,"
from Charles A. Wells, 21/10
(Oct.), 39
Monkeys, "Gravity Effects Studied Under Computer, Controlled
Experiments," 21/7 (July), 40
M.lNTHLY COMPUTER CENSUS: 21/1
(Jan.), 54; 21/2 (Feb.), 56;
21/3 (Mar.), 46; 21/4 (Apr.),
48; 21/5 (May), 46; 21/6
(June), 48; 21/7 (July), 46;
21/8 (Aug.), 48; 21/9 (Sept.),
46; 21/10 (Oct.), 48; 21/11
(Nov.), 47; 21/12 (Dec.), 48
Morgantown, West Virginia: "Personal Rapid Transit, Computerized, in Morgantown, West
Virginia, Part I: The Plan,"
by William W. Aston, 21/6
(June), 11
"Personal Rapid Transit, Com-

puterized, in Morgantown,
West Virginia, Part II: The
Compu ter as the Heart of Personal Rapid Transit," by Dr.
Samy E. G. Elias, R. E. Ward,
and Michael Wilson, 21/6
(June), 13
"The Most Important of All Branches of Knowledge," by Edmund
C. Berkeley: 21/1 (Jan.), 36;
21/2 (Feb.), 2; 21/6 (June),
50; 21/7 (July), 7
"Movement of South Dakota Pheasants Tracked by Computer," by
Dr. Donald Progulske, 21/1
(Jan.), 48
Multiplication, "SHARE and the
Mul tiply Carry Bug," by Herb
Bright, 21/2 (Feb.), 50
llunicipal Affairs, "Mythical City
Helps Students Learn Municipal
Affairs," 21/12 (Dec.), 43
llusic, "Computer Music in 1972,"
by Stuart Smith, 21/10 (Oct.),
16
"Mythical City Helps Students
Learn MuniCipal Affairs," 21/
12 (Uec.), 43

j

t

Annual Index
o

N

Name selection, "On the Legal
Side: Company Name Selection"
by Milton R. Wessel, 21/5
(May), 29
Nanas, E., "Faculty Loans to
Black Colleges," 21/2 (Feb.),
52
National Association of Manufacturers, "Computerizing A
Membership Association," by
William R. Pollert, 21/4
(Apr.), 21
National Cash Register Co., "Data Center Services Offered
Smaller Stores Installing
Electronic POS Equipment,"
21/8 (Aug.), 44
Navigational satell ite, "Navy
and Commercial Users Share
Navigational Satellite," 21/
12 (Dec.), 45
Navy, "Invisible Phonograph
Needle in Development by Navy,"
21/9 (Sept.), 43
"Navy and Commercial Users
Share Navigational Satellite."
21/12 (Dec.), 45
"The Neglect of Significant Subjects, and the Information
Engineer," by Peter J. Nyikos
and Edmund C. Berkeley, 21/7
(July),30
Neville, Philip, and Leon Davidson, John D. French, Norman
R. Carpenter, "3400 Organizations Required by Court Order to Furnish Confidential
Data to IBM," 21/2 (Feb.), 21
"New Algebra Option Promises
Breakthrough in Calculator
Programming,." 21/8 (Aug.), 44
"New Computers for United Air
Lines," 21/9 (Sept.), 42
NEW CONTRACTS: 21/1 (Jan.), 52;
21/2 (Feb.), 54; 21/3 (Mar.),
42; 21/4 (Apr.), 46; 21/5
(May), 44; 21/6 (June), 46;
21/7 (July), 44; 21/8 (Aug.),
46; 21/9 (Sept.), 44; 21/10
(Oct.), 46; 21/11 (Nov.), 44;
21/12 (Dec.), 46
"New High-Density Warehousing
Sys tem Announced by Litton
UHS," 21/9 (Sept.), 42
NEW INSTALLATIONS: 21/1 (Jan.),
53; 21/2 (Feb.), 55; 21/3
(Mar.), 43; 21/4 (Apr.), 47;
21/5 (May), 45; 21/6 (June),
47; 21/7 (July), 45; 21/8
(Aug.), 47; 21/9 (Sept.), 45;
21/10 (Oct.), 47; 21/11 (Nov.),
45; 21/12 (Dec.), 47
"New Jersey Correctional Institution Pioneers Data Processing Education for Inmates,"
by G. Thompson Durand, 21/2
(Feb.), 52
New Mexico, Uni v. of, "Computer
Science Is Added to College's
Art Curriculum," 21/3 (,lar.),
40
"Nine Perspective Projections,
(Computer Art), by Kenneth F.
Dunker and Paul Shao, 21/8
(Aug.), 10
1984, "Undergraduate Mathematics
Training in 1984 -- Some Predictions," by Dr. Murray Gerstenhaber, 21/11 (Nov.), 11
Nixon, Richard M., and J. William Fulbright, and others,
"Poli tical Lies: An Acceptable Level?," 21/4 (Apr.), 44
"North Vietnam and American
Bombing: Six American Government Lies," by Bill Zimmerman,
21/9 (Sept.), 33
II

Notre Dame,

Univ~

of, "Computer

To Handle Problems on National
Economy, Power Networks and
Ecology," 21/6 (June), 45
"No.4 ESS Will Triple Toll Call
Capacity," 21/0 (Aug.), 45
Numbles -- see "Advanced Numbles"
NUMBLES: by Neil Macdonald:
1t721 , 21/1 (Jan.), 45; 1t722 ,
21/2 (Feb.), 29; 11'723, 21/3
(Mar.), 45; 1t724, 21/4 (Apr.),
36; 1t725, 21/5 (May), 49;
1t726, 21/6 (June), 23; 11'727,
21/7 (July), 26; 1t728 , 21/8
(Aug.), 50; 1t729, 21/9 (Sept.),
13; lt72lO, 21/10 (Oct.), 50;
1t7211, 21/11 (Nov.), 28; 21/
12 (!Jec.) , 30
Nyikos, Peter J., and Edmund C.
Berkeley, "The Neglect of Significant Subjects, and the
Information Engineer," 21/7
(July), 30

~'Ode

in Celebration of RFPs,"
by Michael Lipp, 21/5 (May),
29
Ohio State Univ. College of Medicine, "University Computer
Helps Doctors with 'Bedside
Teaching'," 21/11 (Nov.), 42
"Ohio State University Probing
Effect of Environmental Changes
On Body," 21/10 Wc t. ), 44
Oil Spi lIs: "Researchers Predict Oil Spill Movements
Using Computer Power," 21/5
(May), 41
"Uon't Die, Ducky, Don't Die
••. ," by Bradley Yaeger &
Associates, 21/8 (Aug,), 40
Oklahoma State Tech College,
"Scholarship Program for Minority Group Students," 21/12
(Dec.), 44
"The Old Brain, The New Brain,
The Giant Brain, and Common
Sense," by Edmund C. Berkeley,
21/4 (Apr.), 6
"On the JJ Command." from TOTf~
Rambol and Edmund C. Berkeiey,
21/10 (Oct.), 37
"On the Legal Side: Company
Name Selection," by Milton R.
Wessel, 21/5 (May). 29
"On the Legal Side: A Lien on
Computer Tapes?," by 'lilton
R. Wessel, 21/6 (June), 39
"On the Legal Side: The Outside
Director," by Milton R. Wessel,
21/4 (Apr.), 7
"Only People Massed Together Can
Alter Systems," by William ,I.
Kunstler, 21/9 (Sept,), 20
"'Operation Bookstrap' Is Helping Johnny To Read," by II, .J.
Peters, 21/1 (Jan.), 49
"Operation Clean Sweep -- A
City's War on Crime," by James
P. Alexander, 21/2 (Feb.), 51
Opportunities Industrialization
Center. "Free Campu ter Trai n-

ing Center Coming to Harlem,
NY," 21/5 Olay) , 42
Organizations: "Geographic
Roster of Organizations in
Computers and Data Processing," 21/6B (Aug.), 51
"Roster of Organiz3tions in

Computers and Data Processing." 21/6B (Aug.), 4
"Over 2300 Applications of Computers and Data Processing,"
by Linda Ladd Lovett, 21/6B
(Aug.), 137
"Oversupply of People in the
Computer Field," by Dahl A.
Gerberick, 21/12 ([Jec.). 23

POS equipment, "Data Center Services Offered Smaller Stores
Installing Electronic pas Equipment." 21/8 (Aug.), 44
"Pacification: The Story of Ba
loi," American Friend:s Service

Committee, 21/7 (July), 37
Papert, Dr. Seymour, "A Computer
Laboratory for Elementary
Schools," 21/6 (June), 19
Parker, Donn B" "The Antisocial
Use of Computers," :.>1/0 (Aug.),

""

Parkinson, Robert, "The Dvorak
Simplified Keyboard: Forty
Years of Frustration," 21/11
(Nov.), 18
Parliament, "Data Banks Endangering Personal Liberty: Report of Debate in Parliament,
London, England, April 21,
1972," 21/6 (June), 40
Parlova, Frederic 0" and Edmund
C. Berkeley, "CDC vs IB~I -Correction," 21/4 (Apr,), 32
"Peacock Courtship" (Computer
Art), by Bharat K. Shah, 21/8
(Aug,), 1
Penney, Wal ter -- see "Problem
Corner"
Pentagon Papers, "A Concerted
Campaign To Deny the American
People Essential Knowledge
About the Operation of Their
Government," by Henry Steele
Commager, 21/4 (Apr.), 33
People, massed together, "Only
People Massed Together Can
Alter Systems," by William M.
Kunstler, 21/9 (Sept.), 28
"Personal Rapid Transit, Computerized, in ,lorgantown, West
Virginia, Part 1: The Plan,"
by William W. Aston, 21/6
(June), 11

"Personal Rapid Transit, Computerized, in Morgantown, West
Virginia, Part 11: The Computer as the Heart of Personal
Rapid Tnnsit," by Dr. Samy
E. G. Elias, II. E, Ward, and
Michael Wilson, 21/6 (June),
13
Personal response, IIAchieving

'Personal' Response from a
Computer," by Edmund C. Berkeley, 21/3 (Mar.), 6
"Persuasion -- Italian Style,"
by Peter Tumiati, 21/6 (June),
41
Peters, H. J., '''Operation BookStrap' Is Helping Johnny To
Read," 21/1 (Jan.), 49
Pheasants, "Movement of South
Dckota Pheasants Tracked by
Computer," by Dr. Donald Progulske, 21/1 (Jan.), 48
Phister, ,Iontgomery, Jr" and
Edmund C. Berkeley, "Post,llaturi ty in the Computer Field,"
21/12 (Dec.), 6
Phonograph needle, "Invisible
Phonograph Needle in Development by Navy," 21/9 (Sept.),
43
Photographs, "Eight Photographs
of a Bush: Pictorial Reasoning Tests -- Part 7," by Nei 1
,Iacdonald, 21/10 (Oct.), :27
Physician training, "CAl (Computer-Aided Instruction) Shortens Physician Learning Process,"
~1/12 (Dec.), 43
Pictorial Heasoning, "Eight
Photognphs of a Bush: Pictorial Reasoning Tests -- Part
7," by Neil ,llacdonald, 21/10
(Oct.). 27
"Pictorial Reasoning Tes ts -Analysis and Answers," by
Neil ,lacdonald, 21/3 Olar.),
"Pictorial Reasoning Test -C&A No, 2," 21/2 (Feb.). 30
"Pictorial Reasoning Test -C&A No.3," 21/2 (Feb,), :11
"Pictorial Reasoning Test: C&A
No, 4," 21/3 (Mar,), 26
"Pictorial Reasoning Test: C&A
No.5," 21/3 Olar.), 27
"Pictorial Reasoning Test: C&A
Nu, 6," :21/4 (Apr.), 27
"Pictorial Reasoning Test: C&A
No.7," 21/7 (July), 27
"Pictorial Reasoning Tests
Part 5," by Neil Macdonald,
21/4 (Apr.), 26
"Pictorial Reasoning Tests -Part 6," by Neil Macdonald,
21/7 (July), 26
"Pictorial Reasoning Tests and
Apti tudes of People -- Ill,"
by Neil Macdonald, 21/2 (Feb.),
29
Pietak, Raymond A., "The Computer and the Communi ty College,"
21/1 (Jan.), 9
Pipeline, "The Alaska Pipeline
Reading Lesson," by Stewart ;~.
Ilrandborg, 21/6 (June), 30
Plot ter, "CalComp Plot ter Purchased for Russian Ministry of
Chemical Industry," 21/8 (Aug.),
<15

"Poinciana, !';ew Florida City,
Being Planned with Aid of Computer," .lcDonnell Douglas Automation Co., 21/2 (Feb.), 51
Poisoning, "Lead Poisoning: The
lIypocrisy of the Presidency,
and of the Appropriations Commi t tee of the 1I0use of Representatives," by William L.
Clay, 21/8 (Aug.), 7
Police cruisers, "Computer Now
Rides Up Front in Police Cruisers," by Chuck Gillam, 21/1
(Jan.),50
"Political Assassination in the
Uni ted States," 21/:; (May), 7
Political behavior, "Computer
Helps Analyze Worldwide Political Behavior," 21/7 (July),
40
"Political Lies: An Acceptable
Leve I?," by Richard M. Nixon,
and J, William Fulbright, and
others, 21/4 (Apr.), 44
Pollert, William R" "Computerizing A Membership Association," 21/4 (Apr,), 21
Pollution: "Aerial Photography
and Computers Aid the Battle
A~ainst Blight and Pollution,"
by Dr. David Landgrebe, 21/1
(Jan.),48
"Air-Pollution Game To Deal
wi th Environmental Problems,"
by Prof. Matthew J. Reilly,
21/1 (Jan.), 50

"Pontiac Dealers Use Computer
To lrack Car Production for
Consumers," by Williom F.
Grimshaw, 21/2 (Feb.), 51
"Post-Maturi ty in the Computer
Field," by Edmund C. Berkeley,
and r,lontgomery Phister, Jr.,
21/12 (Dec.), 6
Power networks I "Computers To
Handle Problems on National
Economy, Power Networks and
Ecology," :.>1/6 (June), 45
"The Present Role of Governments
in the World Computer Industry," by C. W. Spangle, 21/12
(Dec.), 16
President: "The Death of the
Democratic Party Candidate
for the Presidendy, 1972,"
by Edmund C. Berkeley, 21/5
Olay) , 6
"Lead Poisoning: The lIypocri sy of the Pres idency, and
of the Appropriations Commi t tee of the House of Representatives," by William
L. Clay, 21/0 (Aug.), 7
"The Shooting of Governor
George C. Wallace, Candidate
for President," by Edmund
C. Berxeley, 21/7 (July), 10
"The Shooting of Presidential
Candidate George C. Wallace:
A Systems-Analysis Discussion," by Thomas Stamm and
Edmund C. lJerkeley, 21/7
(July),32
"Prevent

~listnkes

Before They

Happen?": 21/7 (July), 8; 21/
9 (Sept.), 3; 21/10 (Oct.), 2
Prisoners, "Computer Loaned to

,Ilassachuset ts Prisoners," 21/5
(,llay), 43
Privacy, "Cryptology, The Computf'r, and UClt8 Privacy," by ,\1.
Il. Girstiansky, 21/,] (Apr.), 12
Probability, "Statistics and
ProiJability: An Introduction
'I hrough Exper imen t s," 21/11
(I'\ov.), 52
PROBLE ~I CORNEl! by Wal ter Penney:
21/1 (Jan.), 59; 21/2 (Feb.),
57; 21/3 Olar.), 49; 21/4
(Apr.), 49; 21/5 Olay) , 26;
21/6 (June), 49; 21/8 (Aug.),
50; 21/9 (Sept.), 50; 21/10
(Oct.), 28; 21/11 (Nov.), 25;
21/12 (Dec.), 23
"Problem 721: A Scheme of Sorts,"
by Walter Penney, 21/1 (Jan.),
59
"Problem 722," by Wal ter Penney,
21/2 (Feb.), 57
"Proulem 723: Behind the Eight
Ball," by Wal ter Penney, 21/3
("Iar.), 49
"Problem 724: Chafing at the
Bit," by Walter Penney: 21/
4 (Apr.), 49
"Problem 725: StUCk-Up StickOns," by Walter Penney, 21/5
(May), 26
"Problem 726: A Popularity
Program," by Walter Penney,
21/6 (June), 49
"Problem 727:

Bi ts Make Hi ts I"

by Wal ter Penney, 21/0 (Aug.),
50
"Problem 729: A Square Problem,"
by Walter Penney, 21/9 (Sept.),
50
"Problem 7210: Bi llet-Doux," by
Walter Penney, 21/10 (Oct.),
28
"Problem 7211: ,\Ionte Carlo,"
by Walter Penney, 21/11 (Nov.),
25
"Problem 7212: No Losers," by
Walter Penney, 21/12 (Dec.),
23
Problems, "Deal ing wi th Today' s
Problems," by John Skowronski,
21/4 (Apr.), 7
Products, "Buyers' Guide to Products and Services in Computers

and Data Processing," 21/6B
(Aug.),63
Profi t, "Sixth Annual Computer
Services Industry Study Shows
Profit for 1971," 21/11 (1';0\,.),
39
Prograrruner's assistant, "'Uo

What 1 Mean': The Programmer's
Assistant," by Warren Teitelman, 21/4 (Apr.), 8
Programming Languages. "Ros te r
of Programming Languages 1972,"
by Jean E. Sammet, 21/6B (Aug.),
123
Progulske, Dr. Donald, "Movement
of South Dakota Pheasants
Tracked by Computer," 21/1
(Jan.), 48
"The Promotion of Domestic Dis-

cord," by Vincent J. Salandria,
21/1 (Jan.), 37

Protection, "BHAINIAC Homeowner's Protective Kit K40," 21/3
(Mar.), 3
"Publishing Articles on Issues
that Don't Get the Attention
They Deserve," from M. Egan
and Edmund C. Berkeley, 21/10
(Oct.),38
"The Pursuit of Truth in Input,
Output, and Process ing," by
Edmund C. Berkeley, 21/8 (Aug.),

6
Q

"Questions and Answers About
'The C&A Notebook'," 21/4
(Apr.), 3
"Questions and Answers about
'The C&A Notebook on Common
Sense, Elementary and Advanced''': 21/1 (Jan.), 2; 21/7
(July), 9

R
RCA, "Sperry Rand and RCA Sign
Final Agreement," by D. F.
Kyle, 21/2 (Feb.), 53
RFPs, "Ode in Celebration of
RFPs," by Michael Lipp, 21/5
(May), 29
Railroad: "Computer Keeps 'Railroad' Running Smoothly," 21/
3 ('Iar.), 40
"French National Railway Implements Additional Computerization To Enhance Profi tabili ty," 21/9 (Sept.), 40
Raiteri. J. ;Iark, "Color Matching by Computer Creates a New
Business," 21/1 (Jan.), 50
Rambol, Tore, and Edmund C. Berkeley, "On the JJ Command,"
21/10 (Oct.), 37
Rapid transit: "Personal Rapid
Transi t, Computerized, in
Morgantown, West Virginia,
Part I: The Plan," by William W. Aston, 21/6 (June), 11
"Personal Rapid Transit, Computerized, in Morgantown,
West Virginia, Part II: The
Computer as the Heart of Personal Rapid Transit," by Dr.

Samy E. G. Elias, R. E. Ward,
and Michael Wilson, 21/6
(June), 13
Reading, '''Operation Bookstrap'
Is Helping Johnny To Read,"
21/1 (Jan.), 49
"The Reali ty Behind the Lies in
South Vietnam." by Dr. George
Wald, 21/12 (Dec.), 31
"Real-Time Pictures of Mars by
Mariner and by Compuier," by
Wayne E. Shufelt, 21/6 (June),
7
Rebellion, "Horizons and Rebellion," by Edmund C. Berkeley,
21/9 (Sept.), 36
"Reducing and Dismantling Science and Research Institutions,
and Social Responsibility," by
Andrew G. Michalitsanos, 21/4
(Apr.),32
Reilly. ,Ilatthew J., "Air-Pollution Game To Deal with Environmental Problems," 21/1 (Jan.),
50
Republ icans, "Walter Sheridan -Democrats' Investigator? or Republicans' Countermeasure?,"

by Richard E. Sprague, 21/11
(Nov.), 29
"Researchers Predict Oil Spill
Movements Using Computer Power,"
21/5 (May), 41
Riordan, Francis J., "Telephone
Rate Structures: A Squeeze for
the Average American," 21/12
(Dec.), 8
Robot: "Industrial Robot Will
Automatically Select and
Match Actions to Changing
Job Requirements," by Michael M. ,Ieyers, 21/1 (Jan.),
50
"The Construction of Living
Robots -- Part 1," by Edmund
C. Berkeley, 21/8 (Aug.), 27
"Roster of College and University
Computer Facili ties," 2l/6B
(Aug.), 149
"Roster of Computer Associations,"
21/6B (Aug.), 160
"Hoster of Computer Users Groups,"
21/(JIJ (Aug.), 177
Ho~ t"r, GeO\lraphic, "Geographic
Host"r of Oqprdzations in ComIlutf'rs :infl Data Processing,"
:.!l/I,H (,\UU.), Sl

"llost,'r of Organizations in Com-

27

Annual Index
puters and Data Processing,"
2l/6B (Aug.), 4
"Roster of Programming Languages 1972," by Jean E. Sammet,
2l/6B (Aug.), 123
Russian Ministry of Chemical
Industry, "CalComp Plotter
Purchased for Russian Ministry of Chemical Industry," 21/
8 (Aug.). 45

Sagatelyan, Mikhail: "Dallas:
Who, How, Why? -- Part 1,"
21/3 (Mar.), 28
"Dallas: Who, How, Why? Part
II," 21/4 (Apr.), 37
"Dallas: Who, How, Why? -Part III," 21/5 (May), 34
"Dallas: Who, How, Why? -IV: Conclusion," 21/6 (June),
34
St. Louis Board of Education,
"Textbook Control System Saves
Dollars for St. Louis Taxpayers," 21/11 (Nov.), 41
Salandria, Vincent J., "The Promotion of Domestic Discord,"
21/1 (Jan.), 37
Sammet, Jean E., "Roster of Programming Languages 1972," 21/
6B (Aug.), 123
Samson Science Corp., "IBM's
Powerful Partner: The Accounting Principles Board," 21/4
(Apr.), 31
Sanford, W. Leon, "EDP Axioms -A Critical Analysis," 21/5
(May), 12
Sanomat, Helsingen, and Ian Low,
Judy Bellin, Bella Abzug, Edmund C. Berkeley, "How Fiendish Can You Get?," 21/5 (May),
31
Santa Marie, CA, "Water Meter
Readings Streamlined by Computer," 21/8 (Aug.), 43
Satellite, "Navy and Commercial
Users Share Navigational Satellite," 21/12 (Dec.), 45
"Satisfaction of Companies with
Services Received from EDP
Service Bureaus," by Michael
J. Cerullo, 21/1 (Jan.), 43
Schmidt, Steven A., "Who-OO-oo00 Is Watching You," (Computer
Art), 21/8 (Aug.), 19
"Scholarship Program for Minority Group Students," 21/12
(Dec.), 44
School computer systems, "DEC's
New School Computer Systems,"
21/12 (Dec.), 44
"Scientists Obtain First ThreeDimensional Look at Glaciers
with Help of Computer," 21/3
(Mar.), 39
Scrivener, R. C., "Computers
and Communicat ions," 21/9
(Sept.), 10
Seaters, Mike, "Columbus Plus
Two" (Computer Art), 21/8
(Aug~), 15
"Secrecy in the Data Processing
Industry," by J. L. Dreyer,
21/8 (Aug.), 24
Secretary, "How Technology Is
Freeing the Secretary," by
Evelyn Berezin, 21/10 (Oct.),
15
Services, "Buyers' Guide to Products and Services in Computers and Data Processing," 21/
6B (Aug.), 63
Sewers, "Baton Rouge Monitors
Sewers with New Computer System," 21/11 (Nov.), 41
Shah, Bharat K.: "Peacock
Courtship" (Computer Art),
21/8 (Aug.), 1
"Sunfis h" (Computer Art), 21/
8 (Aug.), 8
Shanks, J. P., "Educational Television Transmission System
Connects Universities and Industries," 21/1 (Jan.), 49
Shao, Paul, and Kenneth F. Dunker: "Lak Gou" (Computer
Art), 21/8 (Aug.), 16
"Nine Perspective Projections,"
(Computer Art), 21/8 (Aug.),
10
Shapin, Ruth, Mrs .. and Mrs.
Lucy Bell, William H. Wynne,
Rainer M. Goes, Thomas D. Bryant, "Encouragement for the
Pursuit of Truth," 21/11 (Nov.),
38
"SHARE and the Mul tiply Carry
Bug," by Herb Bright, 21/2
(Feb.), 50
Sheridan, Walter, "Wal ter Sheridan -- Democrats' Investigator? or Republicans' Countermeasure?," by Richard E. Sprague, 21/11 (Nov.), 29

28

"The Shooting of Governor George C. Wallace, Candidate for
President," by Edmund C. Berkeley, 21/7 (July), 10
"The Shooting of Presidential
Candidate George C. Wallace:
A Systems-Analysis Discussion,"
by Thomas Stamm and Edmund C.
Berkeley, 21/7 (July), 32
Shufeldt Cadillac, Inc., "Computer Tell s Car Owners When
Maintenance Is Needed," 21/10
(Oct.), 43
Shufel t, Wayne E •• "Real-Time
Pictures of Mars by Mariner
and by Computer," 21/6 (June),
7
Siemens, Germany, "Videotelephony Via Glass Fiber," 21/11
(Nov.), 42
Simis, T. L., "Telephone Service:
The Rules of the Game When the
Game is Changing," 21/12
(Dec.), 13
Simulation, "Benchmarking vs.
Simulation," by Fred C. Ihrer,
21/11 (Nov.), 8
"Sixth Annual Computer Services
Industry Study Shows Profit
for 1971," 21/11 (Nov.), 39
"60 Second Order Processing at
Warehouse Distribution Center,"
21/12 (Dec.), 42
Skowronski, John, "Dealing wi th
Today's Problems," 21/4 (Apr.),
7
"Sky Lab WVB" (Computer Art),
by Thomas J. Huston, 21/8
(Aug.), 12
"Small Computer 'Tracks' Great
Lakes Sailors," 21/9 (Sept.),
41
Smith, Stuart, "Computer Music
in 1972," 21/10 (Oct.), 16
Sobieraj, R. A.. and Otis Minot,
K. D. Streetman, "Computers,
Ciphers, and Cryptography,"
21/2 (Feb.), 47
Social rag, "Computer-Field
Information vs, Social Rag,"
by Arthur Martin and Edmund C.
Berkeley, 21/7 (July), 36
Social respons ibili ty, "Reducing
and Dismantling Science and
Research Insti tutions, and
Social Responsibi Ii ty," by
Andrew G. Michalitsanos, 21/4
(Apr.), 32
Society: "The Impact of the Computer on Society -- Some
Comments," by Joseph Weizenbaum, 21/7 (July), 18
"Some Responsibility for Our
Chaotic Society," by S. R.
Harrison, 21/4 (Apr.), 34
Software practices, "The High
Cost of Vendor's Software Practices: Why?," by Raymond
E. Boche, 21/12 (Dec.), 20
"Some Basic Arithmetical Tables,"
2l/6B (Aug.), 179
"Some Hard Fac ts, and What To
Do About Them," by Edmund C.
Berkeley, 21/10 (Oct.), 3
"Some Responsibility for Our
Chaotic Society." by S. R.
Harrison, 21/4 (Apr.), 34
South Vietnam, "The Real ity Behind the Lies in South Vietnam,"
by Dr. George Wald, 21/12
(Dec.), 31
Southern California, Univ. of,
"Computer Helps Analyze Worldwide Political Behavior," 21/
7 (July), 40
Spangle, C. W., "The Present
Role of Governments in the
World Computer Industry," 21/
12 (Dec.), 16
Spelling, "Computers and Spelling," by Edmund C. Berkeley,
21/11 (Nov.), 6
"Sperry Rand and RCA Sign Final
Agreement," by D. F. Kyle, 21/
2 (Feb.), 53
Sperry Rand, Univac Division,
'~Hurray for the Univac Division of Sperry Rand," by Edmund
C. Berkeley, 21/1 (Jan.), 6
"Spotlight on McGeorge Bundy and
the White House Situation
Room, November 22, 1963," by
Robert B. Cutler, 21/1 (Jan.),
57
Sprague, Richard E.: "The June
1972 Raid on DemocratiC Party Headquarters," 21/8
(Aug.), 33
"The June 1972 Raid on Democratic Party Headquarters
(The Watergate Incident) -Part 2," 21/10 (Oct.), 18
"The June 1972 Raid on Democratic Party Headquarters
(The Watergate Incident) -Part 3," 21/12 (Dec.), 24

"Wal ter Sheridan -- Democrats'
Investigator? or Republ icans'
Countermeasure?," 21/11
(Nov.), 29
Sprague, Richard E., and Norman
R. Carpenter, Business Week,
"3400 Organizations Required
by Court Order to Furnish Confidential Data to IBM - II,"
21/3 (Mar.), 19
Sprague, Richard E., and William
W. Harper, "The Assassination
of Senator Robert F. Kennedy:
Proofs of Conspiracy and of
Two Persons Fir ing," 21/9
(Sept.), 24
Stamm, Thomas, and Edmund C.
Berkeley, "The Shooting of
Presidential Candidate George
C, Wallace: A Systems-Analysis Discussion," 21/7 (July),
32
"Statistics -- A Guide to the
Unknown," by Edmund C. Berkeley,
21/10 (Oct.), 6
"Statistics and Probabili ty: An
Introduction Through Experiments," 21/11 (Nov.), 52
Statute system, "Mississippi's
Computer ized Statute Sys tern, to
21/10 (Oct.), 43
Steel producer, "Swedi sh Stee 1
Producer Linked to G.E. Computer in Cleveland," 21/11
(Nov.). 41
Stewart. William H., Jr., "Internal Revenue Service: Use
of Computers." 21/4 (Apr.), 34
Strassburg, Bernard, "Does Telephone Regulation Protect the
User?," 21/12 (Dec.), 11
Streetman, K. D., and Otis Minot,
R. A. Sobieraj, "Computers,
Ciphers, and Cryptography,"
21/2 (Feb.), 47
Subjects, significant, "The
Neglect of Significant Subjects,
and the Information Engineer,"
by Peter J. Nyikos and Edmund
C. Berkeley, 21/7 (July), 30
Subscriber, "Unhappy Subscriber
to Satisfied One," from John
Kaler and Edmund C. Berkeley.
21/7 (July), 38
"Subscription Errors: C&A Will
Correct," from Jim Johnson and
Edmund C. Berkeley. 21/11
(Nov.), 39
"Sunfish," (Computer Art), by
Bharat K. Shah, 21/8 (Au~.),
"Supertanker Features Computer
System," 21/5 (May), 42
"Swedish Steel Producer Linked
to G.E. Computer in Cleveland,"
21/11 (Nov.), 41
Syosset, N. Y., "Cashless-Society
Project Reports Progress in
N. Y. ," 21/7 (July), 41
Systems, social, "Only People
Massed Together Can Alter Systems," by William M. Kunstler,
21/9 (Sept.), 28
Systems-analysis, "The Shooting
of Presidential Candidate
George C. Wallace: A SystemsAnalysis Discussion," by Thomas
Stamm and Edmund C. Berkeley,
21/7 (July), 32
T

Tactical Air Command, "The Checkerboarding Problem," 21/1
(Jan.), 24
Tanker, "Supertanker Fe atures
Computer System," 21/5 (May),
42
Tapes, computer, "On the Legal
Side: A Lien ·on Computer
Tapes?," by Milton R. Wessel,
21/6 (June), 39
Tax fund act, "World Peace Tax
Fund Act -- Proposed Legislation," by Representative Ronald V. Dellums, 21/10 (Oct.),
36
Teitelman, Warren, '''Do What I
Mean': The Programmer's Assistant," 21/4 (Apr.), 8
le1ephone: "Computer Helps Develop Tomorrow's Telephone
System," 21/9 (Sept.), 41
"Does Telephone Regulation Protest the User?, to by Bernard
Strassburg, 21/12 (Dec.), 11
"Telephone Rate Structures: A
Squeeze for the Average American," by Francis J. Riordan,
21/12 (Dec.), 8
"Telephone Service: The Rules
of the Game When the Game is
Changing," by T. L. Simis, 21/
12 (Dec.), 13

"Telephone-Sized Computer, BR1018, Moves Into Production,"
21/10 (Oct.). 45
Televis ion, educational, "Educational Television Transmission
System Connects Universities
and Industries," by J. P.
Shanks, 21/1 (Jan.), 49
"Tenth Annual Computer Art Contest": 21/5 (May), 40; 21/6
(June), 41; 21/8 (Aug.), 8
Test -- see Pictorial Reasoning
Test
"Business Programmer Exam Announcements and Study Guides
Now Available," 21/9 (Sept.),
42
"Textbook Control SysTem Saves
Dollars for St. Louis Taxpayers," 21/11 (Nov.), 41
Thinking, "Computer Thinking,"
by G. M. R. Graham, 21/3
(Mar.), 17
"Three Dimensional Maps from
Computer," 21/12 (Dec.), 42
"3400 Organizations Required by
Court Order to Furnish Confidential Data to IBM," by Leon
Davidson, John D. French, Norman R. Carpenter, and Philip
Neville, 21/2 (Feb.), 21
"3400 Organizations Required by
Court Order to Furnish Confidential Data t() IBM - II," by
Richard E. Sprague, Norman R.
Carpenter, and Business Week,
21/3 (Mar.), 19
Tiffany lampshades, "Computer
Helps Firm Produce TiffanyInspired Lampshades," 21/8
(Aug.), 42
Timesharing system, "English
College's Timesharing System
Has 3000 Users," 21/11 (Nov.),
42
"Tiny Lamps that Glow for 100
Years," Western Electric Company, Inc .. 21/2 (Feb.), 53
Tirney, Thomas R.. "Education
for Data Processing: Yesterday, Today, Tomorrow," 21/7
(July), 14
Toll calls, "No.4 ESS Will
Triple Toll Call Capacity,"
21/8 (Aug.), 45
Townsend, D. R., "Effective Mana\lement of an I nstrument Pool,"
21/5 (May), B
Toxicology, "TOXICON Service Begins Operations," 21/10 (Oct.),
44
"Toxicol()gy Research Data Available Via On-Line Nationwide
Network," 21/6 (June), 44
"TOXICON Service Begins Operations," 21/10 (Oct.), 44
Traffic problems, "Harbor Surveillance System Foresees Collisions, Surface Traffic Problems," 21/3 (Mar.), 41
Traffic regulation, "Camera Plus
Computer for Traffic Regulation: A New Observing System
for Multi-Purpose Data Gatherin·g," by Stanley E. Wilkes, Jr.,
21/9 (Sept.), 7
Training, "Georgia Inaugurates
Statewide Computerized Training Program in Vocational Technical Schools," 21/8 (Aug.), 44
Training center, "Free Computer
Training Center Coming to Harlem, NY," 21/5 (May), 42
"A Transportation Information System," by Anthony J. D'Anna,
21/9 (Sept.), 14
Tree-care, "Computer Helps a TreeCare Company Schedule and PI an, "
21/6 (June), 44
Truth: "Encouragement for the
Pursuit of Truth," from Mrs.
Ruth Shapin, Mrs. Lucy Bell,
William H. Wynne, Rainer M.
Goes, and Thomas D. Bryant,
21/11 (Nov.), 38
"The Pursuit of Truth in Input,
Output, and Processing," by
Edmund C. Berkeley, 21/8
(Aug.), 6
Tumiati, Peter. "Persuasion -Italian Style," 21/6 (June), 41
"Two Wisconsin Rivers Are Cleaner -- Officials Credit Computer," 21/9 (Sept.), 41
Typewri ting, "The Dvorak Simplified Keyboard: Forty Years of
Frustration," by Robert Parkinson, 21/11 (Nov.), 18
Typists, "The Shortage of Good
Typists -- and the JJ Command,"
by Edmund C. Berkeley, 21/6
(June), 6

u
"Undergraduate Mathematics Training in 1984 -- Some Predictions," by Dr. Murray Gerstenhaber, 21/11 (Nov.), 11
"Unhappy Subscriber to Sati sfied One," from John Kaler and
Edmund C. Berkeley, 21/7
(July),38
Uni ted Air Lines, "New Computers
for United Air Lines," 21/9
(Sept.),42
"The U.S. Center for Computer
Sciences and Technology," by
Ruth M. Davis, 21/3 (Mar.), 7
Uni vac computers, "French National Railway Implements Additional Computerization To
Enhance Profitability," 21/9
(Sept.>, 40
Univac Div., Sperry Rand, "Hurray for the Univac Division
of Sperry Rand," by Edmund C.
Berkeley, 21/1 (Jan.), 6
Uni versi ties, "Roster of College
and Universi ty Computer Facilities," 21/6B (Aug.), 149
"University Computer Helps Doctors wi th 'Bedside Teaching' ,"
21/11 (Nov.), 42
"Unsettling, Disturbing, Critical ... ": 21/4 (Apr.), 34;
21/5 (May), 28; 21/7 (July),
35; 21/9 (Sept.), 35; 21/10
(Oct.), 39; 21/11 (Nov.), 31;
21/12 (Dec.), 33
Users Groups, "Roster of Computer Users Groups," 2l/6B
(Aug.), 177
Utilities: "Does Telephone Regulation Protect the User?,"
by Bernard Strassburg, 21/12
(Dec.), 11
"Telephone Rate Structures:
A Squeeze for the Average
American," by Francis J.
Riordan, 21/12 (Dec.), 8
"Telephone Service: The Rules
of the Game When the Game Is
Changing," by T. L. Simis,
21/12 (Dec.), 13

v
Vectors' Staff, "Forty + One
Ways To Cut a Coat," 21/3
(Mar.), 22
"Videotelephony Via Glass Fiber,"
21/11 (Nov.), 42
Vietnam, "Moment of Truth in
Vietnam?," from Charles A.
Wells, 21/10 (Oct.), 39
Vocational Technical Schools,
"Georgia Inaugurates Statewide
Computerized Training Program
in Vocational Technical Schools,"
21/8 (Aug.), 44

w
Wald, George, "The Reality Behind
the Lies in South Vietnam," 21/
12 (Dec.), 31
Wallace, George C.: "The Shooting of Governor George C.
Wallace Candidate for President," by Edmund C. Berkeley,
21/7 (July). 10
"The Shooting of Presidential
Candidate George C. Wallace:
A Systems-Analysis Discussion," by Thomas Stamm and
Edmund C. Berkeley, 21/7
(July), 32
"Wal ter Sheridan -- Democrats'
Investigator? or Republicans'
Countermeasure?," by Richard
E. Sprague, 21/11 (Nov.), 29
Wang Laboratories, "New Algebra
Option Promises Breakthrough
in Calculator Programming,"
21/8 (Aug.), 44
Ward, R. E., and Dr. Samy E. G.
Elias, Michael Wilson, "Personal Rapid Transit, Computerized, in Morgantown, West Virginia, Part II: The Computer as
the Beart of Personal Rapid
Transit," 21/6 (June), 13
Warehouse distribution, "60 Second Order Processing at Warehouse Distribution Center," 21/
12 (Dec.), 42
Warehousing system. "New HighDensi ty Warehousing System Announced by Litton UIlS," 21/9
(Sept.), 42
Warfare, "How Fiendish Can You
Get?," by Helsingen Sanomat,
Ian Low, Judy Bellin. Bella
Abzug. and Edmund C. Berkeley.
21/5 (May), 31

I,

Annual Index
"Water Meter Readings Streamlined by Computer," 21/8
(Aug.), 43
Watergate incident: "Bernard L.
Barker: Portrait of a Watergate Burglar," by Edmund
C. Berkeley, 21/11 (Nov.),
26
"The June 1972 Raid on Democratic Party Headquarters,"
21/8 (Aug.), 33
"The June 1972 Raid on Democratic Party Headquarters
(The Watergate Incident) -Part 2," by Richard E. Sprague, 21/10 (Oct.), 18
"The June 1972 Raid on Democratic Party Headquarters
(The Watergate Incident) -Part 3," by Richard E.
Sprague, 21/12 (Dec.), 24
Weizenbaum, Joseph, "The Impact
of the Computer on Society -Some Comments," 21/7 (July),
18
Wells, Charles A., "Moment of
Truth in Vietnam?," 21/10
(Oct.), 39

Wessel, Mil ton R.: "Computers
at Crisis," 21/2 (Feb.), 10
"On the Legal Side: Company
Name Selection," 21/5 (May),
29
"On the Legal Side: A Lien on
Computer Tapes?," 21/6
(June), 39
"On the Legal Side: The Outside Director," 21/4 (Apr.),
7
Western Electric Company, Inc.:
"Helping Out," 21/7 (July), 42
"Tiny Lamps that Glow for 100
Years," 21/2 (Feb.), 53
Wetterhuus, Alan, "The Cashless,
Checkless Society: On Its
Way?," 21/11 (Nov.), 14
"What Have Computers Done for
Us Lately?," by Congressman
Jack 8rooks, 21/10 (Oct.), 7
"Whiskered Frisby" (Computer
Art), by Judy Dayhoff, 21/8
(Aug.), 13
Whi te House Si tuation Room,
"Spotlight on McGeorge Bundy
and the White House Situation

Room, November 22, 1963," 21/
1 (Jan.), 57
Whitehead, Clay T., "The Information Industry and Government
Policy," 21/4 (Apr.), 24
"Who Shot President Kennedy -or Fact and Fable in History,"
by Gareth Jenkins, 21/2 (Feb.),
43
"Who-OO-oo-oo Is Watching You"
(Computer Art), by Steven A.
Schmidt, 21/8 (Aug.), 19
"Who's Who in Computers and
Data Process ing": 21/5 (May),
30; 21/6 (June), 2; 21/7
(July), 2; 21/8 (Aug.), 2;
21/10 (Oct.), 30; 21/11 (Nov.),
37; 21/12 (Dec.), 41
Wilkes, Stanley E., Jr., "Camera Plus Computer for Traffic
Regulation: A New Observing
System for Multi-Purpose Data
Gathering," 21/9 (Sept.), 7
Williams, Arthur, "Marriage of
Computers Meets Special Data
Process ing Needs of B. F. Goodrich," 21/1 (Jan.), 49

,\(tlson, Michael, and Dr. Samy E.
G. Elias, R. E. Ward, "Personal Rapid Transit, Computerized, in Morgantown, West
Virginia, Part II: The Comput.er as the Heart of Persona"! 'Rapid Transit," 21/6
(June), 13
"Winner of U.S. Chess Championship," 21/11 (Nov.), 43
Wisconsin rivers, "Two Wisconsin Rivers Are Cleaner -Officials Credit Computer,"
21/9 (Sept.), 41
Wisdom, "Common Sense, Wisdom,
General Science, and Computers -- II," by Edmund C.
Berkeley, 21/1 (Jan.), 11
Wood, William P., III, "Do You
Want To Stop Crime?," 21/4
(Apr.), 31
"World Computer Census," by
Neil Macdonald, 2l/6B (Aug.),
133
"World Peace Tax Fund Act -Proposed Legislation," by
Representative Ronald V. Dellums, 21/10 (Oct.), 36

Wright, Douglas, "The Master
Discriminatory Tool," 21/9
(Sept.),22
Wynne, William H., and Mrs.
Ruth Shapin, Mrs. Lucy Bell,
Rainer M. Goes, Thomas D.
Bryant, "Encouragement for the
Pursuit of Truth," 21/11
(Nov.), 38

XYZ
"X-Rays Air Luggage for Bombs
at High Speed," 21/5 (May),
43
Yaeger, Bradley, and Associates,
"Don't Die, Ducky, Don't Die
...... 21/8 (Aug.), 40
Zimmerman, Bil~, "North Vietnam
and American Bombing: Six
American Government Lies,"
21/9 (Sept.), 33
"ZINGO -- A New Computer Game,"
by Edmund C. Berkeley, 21/2
(Feb.), 32
"ZINGO -- A New Game for Computers and/or People": 21/3
(Mar.), 2; 21/11 (Nov.), 3

Political Assassination in the United States
A Few of the Articles Published in Computers and Automation 1970 - 1971
Titles, Authors, and Summaries

James Earl Ray says he was coerced into
entering a plea of guilty to killing Martin
Luther King •.• and contrary evidence (plus
other evidence) have led to filing of legal
petitions for "post-conviction relief".

May 1970

30 THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY:
THE APPLICATION OF COMPUTERS TO THE PHOTOGRAPHIC
EVIDENCE
by Richard E. Sprague
A reexamination of some of the evidence relating to the assassination of John F. Kennedy
-- with emphasis on the possibilities and
problems of computerized analysis of the
photographic evidence.
August 1970

48 THE ASSASSINATION OF SENATOR ROBERT F. KENNEDY:
48 Preface, by Edmund C. Berkeley
50 Two Men With Guns Drawn at Senator Kennedy's
Assassination: Statement to the Press, by
Theodore Charach
50 Map of the Scene of the Assassination of
Senator Robert Kennedy
51 The Pantry Where Senator Robert Kennedy Was
Assassinated
52 Bullet Holes in the Center Divider of the
Pantry Door
September 1970

,

39 PATTERNS OF POLITICAL ASSASSINATION: How Many
Coincidences Make a Plot?
by Edmund C. Berkeley, Editor, "Computers and
Automation"
How the science of probability and statistics
can be used as an instrument of decision
to determine if a rare event is: 0) within
a reasonable range; (2) unusual or strange
or suspicious; or (3) the result of correlation or cause or conspiracy.
October 1970

52 THE CONSPIRACY TO ASSASSINATE SENATOR ROBERT F.
KENNEDY AND THE SECOND CONSPIRACY TO COVER IT UP
by Richard E. Sprague
A summary of what researchers are uncovering
in their investigation of what appears to be
not one but two conspiracies relating to the
assassination of Senator Robert F. Kennedy.
December 1970

39 THE ASSASSINATION OF REVEREND MARTIN LUTHER
KING, JR., THE ROLE OF JAMES EARL RAY, AND THE
QUESTION OF CONSPIRACY
by Richard E. Sprague

July 1971

51 THE CENTRAL INTELLIGENCE AGENCY AND THE NEW
YORK TIMES
by Samuel F. Thurston, President, Responsive
Information Systems, Newton, Mass.
The issue of systematic suppression of
questions about the assassination of President John F. Kennedy, and a hypothesis.
August 1971

37 JIM GARRISON, DISTRICT ATTORNEY, ORLEANS PARISH,
VS. THE FEDERAL GOVERNMENT
by Bernard Fensterwald, Attorney, Executive
Director, National Committee to Investigate
Assassinations
How District Attorney Jim Garrison of New
Orleans became interested in the New Orleans
phase of the assassination of President Kennedy; and how the Federal government frustrated and blocked his investigation in more
than a dozen ways.
September 1971

26 THE FEDERAL BUREAU OF INVESTIGATION AND THE
ASSASSINATION OF PRESIDENT KENNEDY
by Bernard Fensterwald, Attorney
How J. Edgar Hoover and the FBI withheld
much pertinent information from the Warren
Commission, flooded them with irrelevant information, and altered some important evidence, thus concealing Oswald's connections
with the FBI.
October 1971

41 THE ASSASSINATION OF PRESIDENT KENNEDY -- DECLASSIFICATION OF RELEVANT DOCUMENTS FROM THE
NATIONAL ARCHIVES
by Richard E. Sprague
The titles of the documents and other evidence indicate convincingly that Lee Harvey
Oswald was trained in spy work by the CIA
before his visit to Russia; etc. Like the
Pentagon Papers, these documents should be
declassified.
29

COMPUTER DIRECTORY AND
BUYERS' GUIDE, 1972
18th ANNUAL EDITION
... a special 13th issue of

Computers and Automation is off
the press and being mailed.
The COMPUTER DIRECTORY is:
• an annual comprehensive directory of the firms which offer products and services to
the electronic computing and
data processing industry
• the basic buyers' guide to the
products and services available
for designing, building, and
using electronic computing
and data processing systems
CONTENTS: See at right -~
.~
.
PRICE:
• Price for subscribers to

Computers and Automation
whose present subscription
does not include the Directory (magazine address label
is marked *N) ..... $12.00
• Price for non-subscribers
..... $17.50
NOTE:
The Directory is included in
the $18.50 full annual subscription (13 issues) to

Computers and Automation
(magazine address label is
marked *0)

Computers and Data Processing:
Organizations and Products
Roster of Organizations in Computers and
Data Processing

4

Buyers' Guide to Products and Services in Computers
and Data Processing

63

Geographic Roster of Organizations in Computers and
Data Processing

51

Roster of College and University Computer Facilities

149

Roster of Computer Associations

168

Roster of Computer Users Groups

177

The Computer Industry
Characteristics of Digital Computers
by GML Corp., Lexington, Mass.
Over 2300 Applications of Computers and Data
Processing
by Linda Ladd Lovett
Counting the Number of ~pplications of Computers
by Edmund C. Berkeley

92
137

3

World Computer Census
by Neil Macdonald

133

The Computer Directory and Buyers' Guide,
1973 - Notice

176

Entry Forms for the 1973 Computer Directory and
Buyers' Guide - Notice

178

Computer Programming
Roster of Programming Languages, 1972
123
by Jean E. Sammet, IBM Corp., Cambridge, Mass.

Send prepaid orders to:

Computers, Mathematics, and Computer Codes

cornI?nHE!!!:i!
815 Washington St.
Newtonville, Mass. 02160

Some Basic Arithmetical Tables

179

American Standard Code for Information
Interchange (ASCII)

180

If not satisfactory, the Directory
is returnable in seven days for
full refund.

30

COMPUTERS and AUTOMA nON for January. 1973

EIGHT PHOTOGRAPHS OF A BUSH:

ANSWERSPictorial Reasoning Tests -Part 8

Neil Macdonald
Assistant Editor, Computers and Automation

"There undoubtedly is a place for non-verbal, nonmathematical testing which is not culture-limited,
not occupation-limited, and not background-limited
... and which would enable finding and employing
many useful people -- including programmers -- who
do not have American, middle-class backgrounds."
The pictorial reasoning tests which we have been
publishing since October 1971 require: observation.
perception, comparison, recognition of shapes and
designs, and reasoning. These operations are difficult for a computer program (except for. the reasoning), yet stimulating to a human being. The
techniques needed are those which we as human beings
have had to use (and improve) all our lives.
New Style of Test

In the October issue we published a sample of a
new style of test, Style 6. It consisted of eight
photographs of the same bush taken from time to
time during 1972. The photographs were printed in
a random sequence, and the test consisted of a number of questions about the photographs. The photographs were published on successive odd-numbered
pages of the October issue of "Computers and Automation" so that a reader might cut the eight pictures out of the magazine, place them side by side,
and compare them.
Here we give the answers to the test, with some
explanation of the observations and the reasoning
needed. To understand fully these answers, please
refer to the October issue of "Computers and Automati on", to the eight pictures (labeled A to H)
printed on pages 29, 31, 33, and 35. Except for
the pictures, the following discussion is largely
self-contained and is independent of what was
printed in the October issue.

The introduction to the text contained important
information for answering the set of questions:
Across from our office which is on the north
side of Washington St. in Newtonville, Mass. is
a strong wire link fence. This fence separates
Washington St. from a steep embankment descending to lower ground, occupied by a railroad and
a turnpike. At one place on the steep bank behind the fence grows a vigorous bush which
pushes its branches against and through the
wire fence. The distance between the left end
and the right end of one link in the wire fence
has been measured at 3~ inches.
This information implies that (1) the photographs
were all taken in the same direction, south, and
also (2) gives a scale for measuring what is in
any picture.
Bush. Question 1: What kind of bush is pictured?
Answer: A rose bush. The five petaled flower: showing in picture B (two inches in from the left edge,
and one inch above the pipe) is typically the flower
of..Jl rose.
COMPUTERS and AUTOMATION for January, 1973

Chronological Sequence. Question 2: What is the
correct sequence of the pictures? Answer:
F HE BGCDA
Reasons: (1) The buds and the flowers provide the
key to the first four pictures. In F, the buds compared with the leaves are smallest. In H, the buds
are larger, but there are still no flowers. In E,
there is an open flower. In B, there are more open
flowers, but many petals have fallen off. In G, D,
C, and A, there are no buds and no flowers, and so
we have to look further for more evidence.
(2) The sepals (bud coverings) provide some of
the key for the last four pictures. They are curved
out and backwards in pictures G, D, and C; and they
have all fallen off in picture A, which is therefore
the last.
(3) The tallest and most prominent flower stalk
showing in pictures F, H, and E, about 3 inches in
from the left edge, is missing in. all later pictures. Evidently some one cut it off. The stalk
by itself shows in pictures Band G. In D, the
stalk has put out a shoot, with pale leaves, ~bout
2 or 3 inches long, showing in front of the pIpe and
partially crossing it. In C, the shoot is twice as
big, about 5 inches long (entirely crossing the
pipe), still with pale leaves; and in A the leaves
of the shoot are like the rest of the bush, all of
the same degree of darkness; and the shoot is no
longer clearly distinct.
Time of Day and Compass Direction. Questions 3
and 4: About what time of day were the pictures
taken? and what was the approximate compass direction of the sun?
Answer: The question implies that all the pictures-were taken at about the same time of day. Inspection of the eight pictures shows that this is
reasonable. Picture H shows brightly contrasting
light and shadow; at the bottom, about 3 inches in
from the left edge, the shadow of a stem falls
across the middle of a leaf to the left; therefore,
the sun is at the right. To the right of south is
west (in the Northern Hemisphere). Therefore, the
sun is in the west, and the time of day is the later
part of the afternoon.
Weather. Question 5: For each picture, was the
weather sunny and bright? or hazy and dull?
Answer: D, G, and H show sharp contrasts between
leaves in sun and leaves in shadow; therefore, in
those pictures, the weather was sunny and bright.
For the other five pictures, A, B, C, E, F, the
weather was hazy and dull, with no sharp shadows.
Distance. Questions 6 and 7: What pictures were
taken closest and furthest?
Answer: It is reasonable to assume that all the
pictures were taken with the same kind of camera,
lens, and film. (This was in fact true.) By measuring the size of the fence links, or by counting
the number of links shown in each picture, we can
31

deduce that D was taken closest to the bush and E
was taken furthest away.
Duration. Question 8: What was the approximate
period of time from the earliest picture to the
latest picture?
Answer: About two months (or nine or ten weeks).
Time Intervals between Pictures. Question 9:
What was the approximate interval of time between
one picture and the next one? Were all the intervals about the same?
Answer: The first seven pictures are about a
week apart. The last picture is about three or
four weeks after the next to the last.
Calendar Date. Question 10: Approximately what
calendar date or calendar week was each picture
taken?
This question can probably be answered well only
by someone who actually has uncommon knowledge about
roses, and who can adjust his knowledge to the seasons in the Boston area. Under these condi tions, the
following answer is deducible from the pictures.
Answer: First picture, end of June / Next four pictures, weekly in July / Next two pictures, first
week and second week in August / Last picture, first
or second week in September. -- The actual dates of
the pictures (this of course is not deducible from
the pictures) are: F, June 29; H, July 7; E, July
12; B, July 20; G, July 26; D, Aug. 4; C, Aug. 10;
A, Sept. 8 (1972).
History. Question 11: What were some ten major
events that happened to the bush during the period
of the series of pictures?
Answer: Buds opened into flowers / Flowers
bloomed / Flower petals fell off / Sepals (the bud
coverings) opened / Sepals bent back / Sepals fell
off / Rose haws formed / Rose haws became quite
large / Two major flower stalks were picked / The
stub of one of the flower stalks put forth a shoot
/ The shoot grew vigorously / The pale green leaves
of the ihoot changed to normally dark green leaves.
/ Apparently, between the last two pictures, something happened to the top of the shoot, for its top
does not show in the last picture; one thing that
might have happened is that it withered as a result
of late summer drought.
I showed this test to a friend of mine who
teaches botany: she said "This would be an exce::'lent
test for students in botany and biology classes".
Whether it is as good a test for persons who have
~nly casual acquaintance with plants is open to
question. But there is little doubt in my mind
that Sherlock Holmes, Arthur Conan Doylets famous
detective character, would have done extremely well
on this test -- for he made it his business to be
as observant as possible of details that related to
deducing conclusions about what had happened in relation to crimes or potential crimes.
Perhaps some readers of "Computers and Automation" would like to send us a set of 8 related
photographs (6 is rather few, 10 is rather many) of
a subject, with searching questions in observation
and reasoning; we would be much interested in publishing additional pictorial reasoning tests of this
nature.
Also, does any reader have a computer program
[]
which might attain a good score on this test?
32

NUMBLES
Neil Macdonald
Assistant Editor
Computers and Automation
A "numble" is an arithmetical problem in which: digits
have been replaced by capital letters; and there are two
messages, one which can be read right away and a second
one in the digit cipher. The problem is to solve for the
digits.
Each capital letter in the arithmetical problem stands for
just one digit 0 to 9. A digit may be represented by more
than one letter. The second message, which is expressed in
numerical digits, is to be translated (using the same key)
into letters so that it may be read; but the spelling uses
puns or is otherwise irregular, to discourage cryptanalytic
methods of deciphering.
We invite our readers to send us solutions, together with
human programs or computer programs which will produce
the solutions. This month's Numble was contributed by:
Andrew M. Langer
Newton High School
Newton, Mass.

NUMBLE 731

F 0 R E
x 5 1 G HT
G F E R
oGLG0
P N E N G

P=E
F=R

H E 5 H N

G L N L H

GH5 E NT P 5 1

83270 81294 715

Solution to Numble 7212

In Numble 7212 in the December issue, the digits 0
through 9 are represented by letters as follows:

G=O
R= 1
N=2
L=3
F, E = 4

5=5
C=6
1=7
0=8
A=9

The message is: Life is a dancing girl.
Our thanks to the following individuals for submitting
their solutions - to Numble 7211: Harold Schofield,
Davenport, Ia.; Jack Smock, Palo Alto, Calif. - to Numble
7210: E. A. Finn, Tucson, Ariz. - to Numble 729:
T. M. Kaegi, CH-9500 Wil, Switzerland; M. H. Davies,
Bath, England.
COMPUTERS and AUTOMATION for January. 1973

President Richard M. Nixon, the Bay of Pigs, and
the Watergate Incident
Richard E. Sprague
Hartsdale, N. Y. 10530

"The similarities between the actions of E. Howard Hunt, Jr., James McCord,
Bernard Barker, Frank Sturgis, and others in 1960 planning for the Bay of Pigs
and in 1972 planning for re-election of Richard M. Nixon are very striking."

Introduction

This article is another installment of a continuing report on the Watergate Incident, and its ramifications. The incident consisted of the breaking
in of the offices of the National Committee of the
Democratic Party, on the 6th floor of the Watergate
Office Building, Washington, D.C., and resulting arrests. The forced entry took place around 2:30 a.m.,
Saturday, June 17; five men were arrested by Washington police. They had with them extensive photographic equipment and electronic surveillance devices, and wore rubber surgical gloves. The five
men arrested were:
-James W. McCord; a Lt. Colonel in the U.S.
Air Force Reserve; 19 years service with
the CIA; head of a security agency; on
the payroll of the Committee to Re-elect
the President as late as May 31, 1972; an
organizer of the CIA for the Bay of Pigs
invasion of Cuba in 1961.
-Bernard L. Barker; a Cuban-born Miami business
man; long associated with the CIA; he established secret Guatemalan and Nicaraguan
invasion bases.
-Frank Fiorini (alias Frank Sturgis)
-Eugenio R. Martinez
-Virgilio R. Gonzalez
These men were closely connected with:
the Republican Party,
the White House,
President Richard M. Nixon,
the Central Intelligence Agency, and
the Committee for Re-Election of the President.
COMPUTERS and AUTOMATION for January. 1973

For more information and background, see the
prior articles on this subject, published in
"Computers and Automation", August, October, and
December, 1972.
Questions to President Nixon

The Watergate Incident raised questions during
the election campaign about the relationships between President Richard M. Nixon and the Watergate
invasion team. The President denied any knowledge
of the Watergate affair and issued statements saying
that no one in the White House was connected with
the operation. To test the reliability of Mr.
Nixon's official statements it is necessary to go
back to the campaign of 1960 and the Bay of Pigs.
The Bay of Pigs Invasion

Many citizens of America have forgotten that
Richard Nixon in 1959 and 1960 was Vice President
of the United States. As an old anti-communist
from Alger Hiss and Khrushchev debate days, Nixon was
in the forefront of pressure for the Bay of Pigs
invasion of Cuba. What has not been remembered
is that Nixon was largely responsible for the covert
training of Cuban exiles by the CIA in preparation
for the Bay of Pigs. He so stated in his book
"Six Crises".
Nixon's Lies October 1960

Mr. Nixon's truth-telling capacity during an
election campaign is nowhere more clearly demonstrated than by the deliberate lies he told on
national TV on October 21, 1960. He said in his
book that the lies were told for a patriotic reason,
namely to protect the covert operations planned for
the Bay of Pigs at all costs. The significance of
this is that Mr. Nixon considers patriotism as
covering the protection of plans or the actions of
individuals that he considers are working for the
United States' best interests.
33

The similarities between the actions of.Everette
Howard Hunt, Jr., James McCord, Bernard Barker,
Frank Sturgis, and others in 1960 planning for the
Bay of Pigs and in 1972 planning for the re-election
of Richard M. Nixon are very striking. In both
cases, what the plotters themselves considered to
be patriotic, anti-Communist actions, were involved.
In 1960 the actions were directed against Fidel
Castro, a man they hated as a Communist. In 1972
the actions were directed against Edward Kennedy,
Edmund Muskie, and finally George McGovern. Bernard
Barke~ stated the group's collective belief when
he said after his arrest that, "We believe that an
election of McGovern would be the beginning of a
trend that would lead to socialism and communism
or whatever you want to call it."
'
Nixon admitted lying to the American people to
protect Hunt, Barker, Sturgis, and McCord in 1960.
The likelihood that he lied to protect them again in
1972 seems to be quite good. The likelihood that he
actually hired the same old crew he trusted from the
Bay of Pigs days for the 1972 Watergate and other
espionage activities, also seems to be rather good.
Here are the facts.
Nixon's Statements in "Six Crises"

Richard Nixon stated in "Six Crises,,:l "The covert training of Cuban exiles by the CIA was due in
substantial part, at least, to my efforts. This had
been adopted as a policy as a result of my direct
support." "President Eisenhower had order the CIA
to arm and train the exiles in May of 1960. Nixon
and his advisors wanted the CIA invasion to take
place before the voters went to the polls on November 8, 1960."2
While the Bay of Pigs operation was under the
overall CIA direction of Allen Dulles, Richard M.
Bissell, Jr. was the CIA man in charge, according
to Ross & Wise. 3 Charles Cabell,4 the deputy director of the CIA, and a man with the code name Frank
Bender, were also near the top of the operational
planning. 5
E. Howard Hunt

Everette Howard Hunt, Jr. was in charge of the
actual invasion, using the code name "Eduardo".
Bernard L. Barker, using the code name "Macho,"
worked for Hunt in the CIA Bay of Pigs planning.
James McCord was an organizer for the invasion and
was one of the highest ranking officials in the CIA.
Frank Sturgis, alias Frank Fiorini, was also involved
in the Bay of Pigs operations. Virgilio Gonzales
was a CIA agent active in the Bay of Pigs and so was
Eugenio Martinez. Charles Colson was a former CIA
official who knew McCord and Hunt during the Bay of
Pigs period. 6
Hunt, Barker, McCord, Sturgis, Gonzales, and
Martinez are under indictment for the Watergate
affair. Colson is Nixon's special counsel who handles "touchy" political assignments. According to
Time magazine, Colson brought all of the others
into the re-election committee espionage project at
the request of Nixon. 7
In other words, the same basic group who worked
for Nixon, Bissell and Co. in 1960, were also working for Nixon, Colson and Co. in 1972. They were
all "loyal, patriotic," anti-Communist, anti-Castro
CIA agents with covert (black) espionage training.
They needed Nixon's protection in 1960 and 1972, and
they got it both times.
In 1960 here is how Nixon protected them. 8
34

Kennedy-Nixon Debates, 1960

John Kennedy and Richard Nixon engaged in a series of national TV debates during the 1960 campaign.
Kennedy was briefed by Allen Dulles, head of the CIA
at Eisenhower's request, on secret CIA activities and
international problems, on July 23, 1960. Nixon was
not aware of the briefing contents and was not sure
whether Dulles told Kennedy about the Bay of Pigs
plans. As it turned out Dulles had not mentioned the
plans but had kept his remarks rather general about
Cuba.
On October 6, 1960, Kennedy gave his major speech
on Cuba. He said that events might create an opportunity for the U.S. to bring influence on behalf of
the cause of freedom in Cuba. He called for encouraging those liberty-loving Cubans who were leading the
resistance to Castro.
Nixon became very disturbed about this because he
felt Kennedy was trying to pre-empt a policy which he
claimed as his own. Nixon ordered Fred Seaton, Secretary of the Interior, to call the' White House and
find out whether Dulles had briefed Kennedy on the
Cuban invasion plans. Seaton talked to General
Andrew Goodpaster, Eisenhower's link to the CIA, who
told Seaton that Kennedy did know about the Bay of
Pigs plans.
Attack on Kennedy by Lying

Nixon became incensed. He said, "There was only
one thing I could do. The covert operation had to
be protected at all costs. I must not even suggest
by implication that the U.S. was rendering aid to
rebel forces in and out of Cuba. In fac t, I mus t go
to the other extreme: I must attack the Kennedy
proposal to provide such aid as wrong and irresponsible because it would violate our treaty commitments. ,,9
So Richard M. Nixon, then our Vice President, now
our President, actually went on national TV (ABC) on
October 21, 1960, knowing we were going to invade
Cuba, and lied like a "patriotic" trouper. He said
during the fourth TV debate that Kennedy's proposal
was dangerously irresponsible and that it would violate five treaties between the U.S. and Latin America as well as the United Nations' Charter. lO
On October 22 at Muhlenberg College, Nixon really
turned on the fabrication steam. He said, "Kennedy
called for -- and get this -- the U.S. Government
to support a revolution in Cuba, and I say that this
is the most shockingly reckless proposal ever made
in our history by a presidential candidate during a
campaign -- and I' 11 tell you why. . .. "
The reason we must take with a grain of salt
whatever words the President utters about Watergate
and Donald Segretti 1 s espionage is clearly demonstrated in that October 22, 1960 speech. He not
only fiercely attacked John Kennedy for advocating
a plan that he, Richard Nixon, secretly advocated
but one that he claimed as his own creation. Not
only that, but he later had the sheer gall to brag
about it in his own book as a very patriotic act.
Today, the "patriotic" act is the re-election of
Mr. Nixon, and the prevention of communism from
taking over the White House:'
Protection of Hunt and Co.

How is Nixon protecting Hunt and company now?
He is using the Justice Department and the Republican Congressmen, plus others, to delay and dilute
the prosecution of the Watergate seven. He has
COMPUTERS and AUTOMATION for January. 1973

slowed down. suppressed, and all but stopped six
separate investigations, suits, and trials of the
affair. These are: Wright Patman's House Banking
Committee investigation, the FBI-Justice Department
investigation, a White House investigation by John
Dean, a General Accounting Office investigation, a
suit by the Democratic Party. and a trial in criminal court of the seven invaders. Only two trials or
investigations have a chance of exposing the truth.
One of these. a trial of Bernard Barker in Florida.
has ended with not much help. The other is an investigation promised by Senator Edward Kennedy using
his Senate subcommittee.
So the battle for truth boils down again to a
Nixon vs. a Kennedy. Apparently, the only power or
strength in the U.S. since 1959 able to contest
the power of Richard M. Nixon and his cohorts is the
strength of the Kennedy family and name.

Ethel Jean
Mother's
Totterdale
Maiden Name
Witches Island.
Residence
River Road,
Potomac. Md.
(972)
Pseudonyms
Robert Dietrich.
John Baxter,
Gordon Davis
Occupation
Public Relations
Consultant, author, government
official
Education
AB, Brown University, 1940

Military

Footnotes

,

1. "Six Crises". Richard M. Nixon. Doubleday. 1962.
2. "The Invisible Government". Wise & Ross. Random
House. 1964.
3. Ibid.
4. Brother of Earl Cabell. mayor of Dallas when
Kennedy was assassinated.
5. Ibid.
6. "New York Times" articles on Watergate. June 18
to July 2. 1972.
7. "Time" magazine. September 8. 1972.
8. This episode is related in detail in "The Invisible Government".
9. "Six Crises".
10. "The Invisible Government".

Marital
Status
Children
Career

Appendix 1
E. Howard Hunt

Who is Everette Howard Hunt? His cover identity
as a CIA agent by the name of "Eduardo" during the
Bay of Pigs is well known. His novels about spies.
writing under the pseudonyms of Robert Dietrich.
Gordon Davis. and John Baxter. are also well known.
Apparently Mr. Hunt had teason to disguise his
true identity when he became an author named
Dietrich. At least he seemed to try and mislead the
publishing field. The chart below shows how Mr.
Hunt described himself to both Who's Who in America.
and Contemporary Authors. a publication listing each
year new or recent authors.
It should be remembered that Who's Who does some
checking on the person listed. while Contemporary
Authors does not. Contemporary Authors merely reprints whatever the author sends in. Also. the only
link in the two publications between the two men is
the pseudonym Robert Dietrich listed under Hunt's
biography in Who's Who.

Awards
Clubs

USNR 1940-42,
USAAF 1st Lt ••
Political Officer-Far East
Comd. 1954-56
Married-Dorothy
Wetzel Sept. 7,
1949
Lisa Tiffany.
Kevan. Howard,
David
Movie script writer. editor March
of Time, war correspondent Life
magazine 1943,
screen writer
1947-48. attached
U.S. embassy
Paris, France
1948-49. Vienna.
Austria 1949-50,
Mexico City 195053. Far East Command Tokyo 195456. First Secretary consul Montevideo. Uruguay
1957-60. Dept. of
Defense 1960-65.
Dept. State 196870, Robert Mullen
& Co. 1970-71,
Consultant to the
President 1971-72
Guggenheim fellow
1946
Brown University
(NYC), Army &
Navy. Lakewood
Country Club
Washington, D.C.

Comparison of E. Howard Hunt & Robert Dietrich

Source
Name
Birthdate
Birthplace
Age
Father
Mother

Who's Who in
America 1972
Everette Howard
Hunt, Jr.
October 9. 1918
Hamburg, N. Y.
54
Everette Howard
Hunt
Ethel Jean Hunt

Contemporary
Authors 1963
Robert Salisbury
Dietrich
October 9. 1928
Washington, D.C.
44
Everette Howard
Dietrich
Ethel Jean Dietrich

Writings

Hobbies

Author 1942-72,
Pseudonyms: Robert Dietrich.
John Baxter.
Gordon Davis;
Contributor to
foreign affairs
and poli tical
journals
None listed

Ethel Jean
Totterdale
5029 Millwood Lane,
Washington, D.C.
(963)
Gordon Davis
U.S. Government,
Internal Revenue
Service
CPA George Washington University. 1950;
LLB, George Washington University, 1957
U.S. Army Infantry
1951-53 Is t Lt.,
Bronze Star
None listed
None listed
U.S. Government,
Internal Revenue
Service 1949-51,
private tax
consultant 195363

None lis ted
American Institute
of Accountancy,
Bar Association
District of Columbia. Army &
Navy. Lawyers
Agent: Littauer
& Wilkinson
(NYC), office
Washington Bldg.
Washington. D.C.
11 books listed
under Gordon
Davis

Sailing, shooting.
riding

(Continucd on next page)
COMPUTERS and AUTOMAliON for January, 1973

35

Michie - Continued from page 9

PROBLEM CORNER
Walter Penney, COP
Problem Editor
Computers and Automation

PROBLEM 731: A SIMPLE SOLUTION

Bob had hardly entered the Computer Center when AI
asked him, "Ever have the experience of telling someone
how to solve a problem only to have him say, 'We haven't
had that yet in this course; we can't use that'?"
"Many times," Bob replied. "It's a little like speaking
Basic English. You have to keep thinking of what words
not to use. What brought this up?"
"Joe has a problem in his course which involves finding
the larger of two numbers, using a certain very simple
computer. It can perform only the operations of addition,
subtraction, multiplication, division, and taking the absolute value. Joe's a little puzzled."
.
"Why doesn't he just subtract one from the other and
see whether the result is positive or negative?"
"That was his first thought," AI said. "But 'see
whether the result is positive or negative' is not in the instruction set of his computer."
"Hmm. He might be able to Monte Carlo it. Try all
sorts of random combinations of the five operations
and ... "
"No need to do anything so complicated," Al interrupted. "It's very simple."
How can the larger of two numbers be determined
using only the operations mentioned?

Solution to Problem 7212: No Losers

AI, Bob, and Charlie began with $32, $56, and $74
respectively. After the first game they had $96, $24, and
$42; after the second game, $72, $72, and $18; and after
the third game, $54 each.

Readers are invited to submit problems (and their
solutions) for publication in this column to: Problem
Editor, Computers and Automation, 815 Washington St.,
Newtonville, Mass. 02160.
Sprague (continued from previous page)
Appendix 2
Postscript

Mrs. E. Howard Hunt was unfortunately killed in a
crash of a United Airlines jet at Chicago on December 8, 1972. The crash investigators found in her
purse 100 crisp new $100 bills. When Mr. Hunt was
queried, he claimed she was carrying the money to a
relative in Chicago for a real estate investment.
But it is reasonable to suspect that these bills
bore serial numbers in the same sequential series
as those found on Bernard L. Barker when he was
arrested, and that Mrs. Hunt was transferring "hot
money" to a new location.
0
36

The Future

Although no one has yet begun to apply relational
structure techniques to computer chess, these techniques are currently under vigorous development for
a wide range of other applications. In our own laboratory in Edinburgh R. M. Burstall, H. G. Barrow,
R. J. Popplestone and others have used this approach
for writing a "teachable" program for recognizing ordinary objects viewed through the TV camera, with
special reference to ultra-fast methods for matching
descriptions in the machine and coping with partial
matches in a quantitative fashion. A number of laboratories are exploring the use of relational structures - sometimes called "semantic nets" - for
storing facts about storybook worlds extracted from
English language input. It is a matter of time before the next person to write a chess program avails
himself of the new methodology~
No single technique is going to bring about a
magic transformation. But the consequences of effective methods for representing chess knowledge could
be great. Progr~ms of existing type have knowledge-bases not significantly larger than that of a
chess beginner. If the machine look-ahead speed and
short-term memory (working space) were not better
than human, such programs would necessarily play
like beginners.
But the speed and accuracy of modern computing
hardware, and the large scale of mechanized treesearching operations (Gillogly's program has, at
times, a tree containing up to 500,000 possible
board positions under review), enable these mechanized ignoramuses to play at tournament level. The
"brute force" factor is evidently worth a lot of
points on the USCF scale.
A Much Stronger Strategy

Hence if the knowledge of the chess-master were
built into a computer program we would see not master chess, but something very much stronger. As
with other sectors of machine intelligence, rich rewards await even partial solutions to the representation problem. To capture in a formal descriptive
scheme the game's delicate structure - it is here
that future progress lies, rather than in nanosecond
access times, parallel processing, or mega-mega-bit
memories.
An interesting possibility which arises from the
"brute force" capabil i ti es of contemporary chess programs is the introduction of a new brand of "consultation chess" where the partnership is between man
and machine. The human player would use the program
to do extensive and tricky forward analyses of variations selected by his own chess knowledge and intuition~ and to check out proposed lines of play for
hidden flaws. In this way the worth of the "brute
force" component, which might perhaps be estimated
as lying somewhere in the 500-1000 interval, could
actually be measured on the USCF scale.
A Wager

In 1968 John McCarthy, Seymour Papert and I combined to make a bet with a young computer scientist,
David Levy, now an international chess master. We
wagered £ 1000 that he would be beaten by a chess
program by the year 1978. The former world champion
M. M. Botvinnik has told Levy, "I feel very sorry for
your money," but M. Euwe, also an ex-world champion,
thinks otherwise. Levy's own comment is "Only time
can tell".
0
COMPUTERS and AUTOMATION for January. 1973

The Frenchman Who Was to Kill Kennedy

Phillippe Bernert
Camille Gilles
L 'Aurore, October 2, 1972
Paris
France
translated by
Ann K. Bradley
Computers and Automation
and People

The extraordinary confession revealed in an exclusive interview
to Camille Gilles by a veteran officer of the 1st REP, ex-chief
of the Delta Commandos of the O.A.S., who is now raising
livestock in South America.

On May 31, 1961, from the top of an apartment building
in the Rue de Rivoli or the Champs-Elysees, ex-lieutenant
Romero of the O.A.S. was supposed to shoot down President
Kennedy while pretending to aim at General de Gaulle. The
attempt would have been called a tragic error, due entirely to
internal French problems. And no one would have dreamed
of looking for the real instigators of the plot: Americans.

"Armed with a rifle with an infra-red sight, I
was supposed to miss General de Gaulle and kill
President Kennedy. This, precisely, onMay 31, 1961,
during Kennedy's official visit to France. The
attempt was to take place on the Rue de Rivoli or,
preferably, on the Champs-Elysees. I really didn't
need the infrared sight -- I was considered one of
the best sharpshooters in the French army."
The man who just made this fantastic revelation,
a revelation capable of turning a whole page of
contemporary history upside down, of calling into
question the famous Warren Report and breaking wide
open the investigation into into a plot against
Kennedy at the time of the Dallas assassination
this man's name is Jose Luis Romero.
Nine years after Kennedy's assassination, Romero
has decided to talk. Leaving his hacienda somewhere
in South America, he made a quick trip to Paris to
sign an exclusive contract with Marcel Julian, P.O.
P.O.-G. of PIon and Julliard, publishers. This took
place last Saturday afternoon. In PIon's summer
garden -- they are the editors of General de Gaulle's
"Memoi rs" -- thi s veteran ki ller of the Delta commandos during the war in Algeria began to dictate
his extraordinary confession to my colleague Camille
Gilles, well-known reporter of pied noir origin and
chronicler of the Algerian drama in hi s novel oil sont
les roses de Fouka? (Where are the roses of Fouka?)
COMPUTERS and AUTOMAnON for January. 1973

It was while working on his new book about the
dozen veteran killers who regrouped, in the heart
of the O.A.S., around the celebrated Jesus de Babel-Oued ("Jesus and his apostles") that Camille
Gilles established contact with Jose Luis Romero
and uncovered the story of an earlier secret plot
against Kennedy.
At the heart of the affair was Romero: a big fellow over 6'1", with intensely black eyes, his body
covered with tattoos and with scars from the splinters of a mine that exploded in Indochina. A colossal man whose hair, today, is entirely white. "Late
in 1963, several weeks after I learned of the murder
of Kennedy in Dallas, I woke up one morning with my
hair like this. My moustache was white, and all the
hair on my body had turned White."
But this is the same man who, two and a half
years earlier, had agreed to kill Kennedy "for the
money and the adventure". He was offered two hundred million old francs.
But who is Romero? Born in Madrid ill 1926, son
of a revolutionary hunted by Franco's forces, he
sought refuge with his family in France, spent two
years in a refugee camp at Argeles, near Perpignan,
and then joined the underground resistance with his
father, who was a leader in the F.T.P. Following
37

that he left France for Oran where his father, a
shoemaker, started to produce espadrilles.
When he was twenty, Jose Luis joined the French
Foreign Legion and fought in Indochina, then in Algeria. After serving in the 2nd B.E.P. he became
one of the best officers in the 1st B.E.P. under
Dufour, Sergent, Denoix de Saint-Marc. He found
himself among those responsible for keeping the
Casbah under control. It was around 1958 that Lt.
Romero became friends with a counselor at the
American consulate in Algiers, a friendship founded
on confidence and mutual esteem.
Mysterious Mike

The American, whom we shall call Mike from his
code name, worked visibly for certain U.S. secret
service organizations. But at the same time he
showed himself to be very sympathetic toward elements in the French Army that wanted a French Algeria. He even said one day to Jose Luis (whom
he called "Gt::orge"):
"I know certain U.S. financiers who wouldn't be
unhappy to put their money into Algeria. But in a
French Algeria or, at least, an independent Algeria
that was dominated by European interests."

A Strange Contract

"I didn't have any reason to be suspicious of
Mike's friends, so I agreed. A little later, after
they stopped the car in the forest of Sidi Ferruch,
the spokesman for the two proposed the following
"contract" to me. On May 31, President Kennedy
would be in Paris on an official visit. I was supposed to fake an attempt on the life of General de
Gaulle (an almost classic phenomenon at present:
insurrection in Algeria, trial of Generals Challe
and Zeller in Paris, etc.) and to "accidentally"
kill Kennedy, at the moment when he would be next
to the President of the French Republic."
"My interlocutors knew exactly who they were
talking to. They seemed to know my record as a
sharpshooter, that I hit the bullseye 98 times out
of 100. They offered me $400,000 -- half right
away, the rest once the thing was over."
" -- But you have to make up your mind now.
Drop everything and come with us."

In brief, like Lt. Romero, Mike showed himself
to be violently anti-Gaullist and anti-communist.
And when part of the Army revolted and formed the
O.A.S., Mike kept up hi s contacts wi th Romero and
provided him with information, false passports, money, arms, and explosives.

"I accepted. They took me immediately to the
little port of Bou-Haroun, near Castiglione. There
they gave me a Swi ss passport in the name of Broeger,
issued April 20, 1961 by the Canton of Geneva. Then
they put me on a French trawler that sailed that
night. The sea was rough and I suffered down in
the hold on my air mattress. The whole night the
boat resounded with hammer blows. The next morning we reached the small Spanish port of Andraix di
Porto."

At this time Romero, who had organized the Delta
commandos, had shed his uniform and was strictly a
clandestine operator, going around in cotton knit
shirts, light chinos and string sole shoes, shoes
all the Delta commandos wore because they were ideal
for running and for scaling walls without slipping
and falling.

"Curiously, the trawler was no longer French ~ut
was flying the Spanish flag, with a Spanish maritime
registry number. A Seat, a Spanish-made car, was
waiting for us on the quay. We drove for three long
hours, but it seemed more like centuries to me. Afterwards I found out that the villa they were taking
me to was actually only twelve miles from Andraix."

This is what he was wearing one evening in May,
1961, on his way to a meeting his friend Mike had
arranged with him at a Vietnamese restaurant in
Algiers, the Madrague, not far from the sea. Everything started that night. Here is how Romero told
it Saturday to the man writing this incredible history, the journalist Camille Gilles:

"At the villa I was able to shower, shave and
change clothes. I found a shirt, suit and a pair
of shoes, all in my size, but there was nothing in
any of them to show where they came from. I also
saw my friend Mike again there, but it was for the
last time. The diplomat who had helped us so much
in Algeria greeted me effusively."

"Mike was supposed to bring me some false passports so that some of our men could rejoin Capt.
Sergent, chief of the O.A.S., i,n continental France.
I left my two bodyguards standing outside the restaurant, in front of the door, and slipped my Luger
under my bath towel that I'd left lying on a chair
beside me."
"A few minutes later two men came in and, without hesitating a second, walked over to me and sat
down ,at my table. With their typical walk, as if
they were afraid of breakini eggs, and their black
hats with the wide ribbon, they had to be Yankees.
They came, they told me, from Mike.
"First of all they gave me the passports Mike
had promised me, as well as a plain envelope filled
with bank notes. They said it was for the O.A.S.
We had dinner together. Then t after we had finished t
the bigger one, the one who did the most talking
(the other seemed content with monosyllables) suddenly said to me:
"I want to talk to you seriously. I want you
to get rid of those two gori lIas that are wai ting
for you outside and then we'll go for a ride so I
can explain to you what I have in mind."
38

" -- I knew you'd come I" he said.
"Mike completed my transformation into a Swiss
citizen by giving me a Swiss driver's license in
the name of Broeger, a membership card to a private
club in Geneva, and the number of my bank account
in Lausanne where $100,000 in West German marks had
already been deposited in my name. It had been
agreed that my pay would be entirely in marks."
"And for a start," Mike announced, "We are going
to give you your first $100,000 right now, for your
trip."
Prelude to Dallas

"They gave me a belt that I put on, with the
Deutsch marks in slits on the inside. First I
went to Geneva, where a car was waiting that took
me to Lausanne. The second half of the funds had
already been deposited in my account there. I
withdrew the money and was careful to redeposit it
in a new account. The evening of May 30, I was in
Paris."
"I immediately took a cab to a cafe in the ChampsElysees, 'Le Paris'. There a contact gave me a plan
COMPUTERS and AUTOMATION for January. 1973

that I still have -- in a safe place. The plan offered me three alternatives. The first was to fire
on Kennedy from the top of an apartment house on the
Rue de Rivoli, along the route the presidential motorcade was to take. It gave the addresses of two
apartments, along with the names of their occupants
both of them old people living alone, who could
be locked up in another room while I was taking care
of things at the front window."

give my employers the slip at this point in the
game? The best way, I figured, was just to pretend I was still going through with the whole thing.
So I caught the subway at the George-V station and
got off at the Gare du Nord. There I went up to
the woman selling papers and asked her loudly where
the toilets were."

"The second possibi li ty was to try to shoot Kennedy from one side of the Place de l'Etoile, just as
the two presidents were getting out of their car to
approach the tomb of the Unknown Soldier. Here again,
an apartment had been selected that was on the next
to the last floor and had windows that were well located for our purposes. This was the same tactic
Oswald used two years later in Dallas

"To get my contact, as well as the men following
me, to wait for me by the newsstand, I went off in
the direction of the toilets. But since I knew the
station like the back of my hand, I slipped out as
soon as I could and then ran what must have been a
record hundred meters. Then, figuring I'd given
everyone the slip, Iwent back to the Porte d'Italie.
I didn't even try to stop at the hotel. With my
belt still stuffed with Deutschmarks, I hitched to
Nice. My Swiss passport got me into Italy and from
there I went on to Lausanne."

"The gun I was supposed to use, a Remington carbine 280 wi th an infrared sight, was in a small trunk
in the baggage room at the Gare du Nord. To get the
key to the trunk, I had to go to the Lost and Found
at the station and stand near a particular newsstand,
where a man would give it to me."
"It was up to me to choose the place where I
wanted to shoot, but either way my contacts promised
me a safe escape -- cars would be waiting near each
of the si tes to make sure I got away wi thout a trace."
"I don't know why, but on my way to my hotel in
the Champs-Elysees, to think things over, I suddenly
felt very uneasy. All at once it hit me what a
really shrewd plan my employers had come up with.
The "accidental" murder of Kennedy was to be blamed
on the O.A.S. which, they would say, had decided to
kill de Gaulle but failed. A nice, neat 'secret
plot' story that would cover their own trail perfectly."
"I said to myself that this small group of Americans had chosen me not just for my strong anti-Gaullist feelings, but also so that, if I were ever captured, people would think I was a li ttle "cracked".
I had to have a trepaning operation in Indochina
after I was wounded in a mine explosion. So, if I
started talking in front of police and judges about
a U.S. plot against Kennedy, they would simply fig~
ure I didn't know what I was talking about."
Algiers Intervenes

"And then, almost as if I'd foreseen Oswald's
fate -- to be killed only 24 hours after shooting
Kennedy in Dallas -- I told myself 'This is too big.
They'll never let you live after you finish the job;
they'll have to get rid of you.' Anyway. I was worried enough to ask my commanding officers in the
O.A.S. for their advice."
"As soon as I got back to the hotel I put in a
call to Algiers. I told the O.A.S. staff there
honestly what the situation was. My colonel said,
'I'll call you back in half an hour. Don't make a
move until you hear from us.' Half an hour later
the order came from Algiers. 'Don't touch this
deal. Let the Americans take care of their own
dirty business. The whole thing is likely to backfire on usl' I may be wrong, but I think that General Salan himself was consulted about it and that
he was the one who made the final decision. The
O.A.S. saved Kennedy's life that day."
"My problems were just beginning though, because
I'd felt I was being followed ever since I'd left
the Vietnamese restaurant, "La Madrague", near
Algiers -- guarded, but watched, too. How could I
COMPUTERS and AUTOMATION for January, 1973

Stop

"Once in Lausanne, instead of foolishly putting
in a personal appearance at the bank, I asked to
have my account transferred to another branch. There
I had the bank change the marks in my account into
dollars. Then, with my little bundle safely tu~ked
away, I returned to Rome. Since I was still afraid
of being followed by Mike's friends, I ended up enlisting with a group of mercenaries that were leaving for the Congo. No one was going to find me
fighting in the Congo -- it was the ideal hiding
place. After the Congo business was over, I hit
the road for South America. With the money Mike
had given me, the money that was supposed to pay
for Kennedy's assassination, I finally set myself
up there in a hacienda where I'm now happily rais-,
ing bulls."
"This whole story might sound crazy to you, of
course. I know what it implies -- that from 1961
on there were men trying to eliminate Kennedy by
means of a hired killer. Maybe the same men finally
succeeded two years later in Dallas, with Oswald.
Why did I wait so long to talk? Because my friends
told me the time had come to explain some things,
because my former commanding officers in the O.A.S.
gave me the green light -- and because I decided
when I met Camille Gilles that he was a journalist
who deserved to write this story."
"1 will no doubt be asked to prove what I'm telling you. The proof exists, and the men who contacted me know it. It's now safely in the hands of a
lawyer in Geneva: letters I exchanged with 'Mike't
the American diplomat; the three passports they
gave me; the addresses of the Paris apartments that
were supposed to be used; the names of the people
living there; the actual written plans I got from
the go-betweens, and the little official notebook
they gave me that described in detail the schedule
Kennedy was to follow."
"I'm not talking for money. I'm rich and happy
already.
I spend my life on horseback, in the
middle of my herds. I've had enough of adventure.
But the moment of tr11th always arrives. There are
certain things you can't keep to yourself forever ... "
Saturday evening, ex-lieutenant Romero was back
in South America. He is corresponding by means of
tape recordings with his biographer, Camille Gilles,
and his editor, Marcel Julian. Will we, thanks to
the revelations of this solitary adventurer, finally
be able to penetrate the darkness surrounding the
death of Kennedy in Dallas? Was the attempt that
misfired in Paris nothing but a dress rehearsal
for the tragedy that shook the world?
[]
39

Why I Distrust the Romero Story
Robert P. Smith, Director of Research
Committee to Investigate Assassinations
~927 15th St., N.W.
Washington, D.C. 20005

As Director of Research for the Committee to Investigate Assassinations, I sit at the hub of a
sort of wheel of information. Some may say, perhaps not without cause, that it is a wheel of misinformation. Certainly there are some rickety
spokes to it, and it isn't always easy to keep from
running off the road. After long practice, though,
and after having read and heard a lot of stories, I
think I may have acquired some skill in avoiding the
more obvious ditches.
I. F. Stone, now with the "New York Review" but
whose "Newsletter" was rightly regarded as one of the
best in the country for many years, is said to have
called the efforts to solve the mysteries of President Kennedy's assassination a "swamp of paranoia".
He may be partially right.
But with all deference to psychoanalysis, I submit that the investigation of President Kennedy's
assassination is a good deal more. It is, for one
thing, a serious avocation for some very sincere and
competent people who are trying to find out what
really happened on November 22, 1963. Our Government
has failed to explain it satisfactorily.
Secondly, it is a challenge to a number of dedicated researchers and students of the factual details of the assassination. Some of them are professionals in their own fields, and they find this
case, quite literally and for absolutely objective
and non-neurotic reasons, to be more baffling than
any Sherlock Holmes story ever written. I do not
exaggerate.
Those opinion leaders who believe this case is
solved cannot have tried to grapple with the physical evidence of the case. Their persistence in
pooh-poohing the problems of reconstructing the actual shooting, for example, reflects a kind of paranoid gullibility of their own.
Thirdly, and unfortunately, pursuit of the facts
behind the JFK assassination tends to be an abode
for a certain number of jokers and opportunists who
are out to make a buck by exploiting the gullible.
With these I have lost all patience. They interfere
with the serious things that need to be done, and
they bring ridicule on the genuine efforts at understanding.
In regard to the killing of President John F. Kennedy, it is an unpleasant but very real fact that one
can find in the National Archives many scores of reports about people who said they wanted to kill the
President, or who expected someone to do it, or who
claimed they knew someone who actually planned to do
it. I have read a great many of these reports.
The motives, or implied motives, are allover the
political spectrum. Moreover, some of the stories
were on record before the assassination and were
every bit as plausible, from any standpoint, as the
Romero story. So why should we believe Romero, whose
story didn't come to light until nine years after the
JFK assassination and eleven years after the plot it40

self? He says he was afraid, which may account for
him, but the question is, why should we believe?
There are curious details in Romero's story that
make no sense to me:
Item 1: Why an "infra-red sight" on the rifle
when the assassination is to take place in
broad daylight?
Item 2: Why did Romero, while going to what he
expected was merely a rendezvous with his
"friend" Mike, take along two bodyguards?
Item 3: Why later, at the restaurant, but still
before he knows that anyone besides Mike is
coming, does he place his Luger under a
towel on the next chair?
Item 4: How can he be a "sharpshooter for
ting 98 bull's-eyes out of a hundred",
nothing said about the distance of the
get or any of the other details needed
attach significance to such a figure?

hitwith
tarto

Item 5: Why couldn't Romero have been given the
key to the trunk (containing the special rifle)
in advance, instead of using another man to
give him the key, with the added and unnecessary risks that this implies? (After all, they
had already given him the money and other
papers.)
These dubious details, of which many other examples
could be cited, sound more like melodrama than
reali sm.
There is more to this story -- not Romero's, but
the story about Romero's story. Not all of it is
yet known to me, but I do know that CBS, which is
certainly a large and competent news organization
with offices in Paris, spent a fair amount of time
and money checking it out.
Actually, they were drawn into it by a later embellishment in which Romero purportedly identified
two of the "Watergate Five" as being the two Americans who approached him in 1961. This added sensation involved some intermediaries who, I am convinced, were entirely sincere in their beliefs. But
the end result of all this effort was a flat zero.
The news organization concluded that the whole business was a hoax. I had previously come to the same
belief for the reasons I have stated above.
Does this imply that the CBS investigation was
CIA-controlled, and that the CIA influenced it to
arrive at this conclusion?
The answer is that I don't know. I haven't any
evidence either way. But why should I impugn the
integrity of a large organization involving many
people, in effect assuming that they were Q!l CIA
influenced, in favor of believing the story of one
man who has no corroboration from anybody and who
keeps his supposed evidence locked up in a vault
somewhere? Particularly I cannot believe him when
his story fails to hang together and when I know at
least a half-dozen similar kinds of story (contradictory to Romero's, however) which are just as
"plausible" as his.
Finally, I ought to make one other point that may
appeal to those who insist on reasoning from motives.
I do believe that Romero was (and is) part of a conspiracy. Cui bono? Yes, a good question
and
here's my answer: The conspiracy was one to sell
books I
0
COMPUTERS and AUTOMAliON for January. 1973

ACROSS THE EDITOR'S DESK
Computing and Data Processing Ne,wsletter
Table of Contents
APPLICATIONS

Computerized Feed Mixing Begins at Gooch Mill
Minicomputers Deliver Daily Newspapers
in Fort Worth, Texas

NEW PRODUCTS

41
41

EDUCATION NEWS

. New Prison Arrival Sparks Computer
Programming Studies
General Turtle, Inc. ~ A Small Company
With a Strange Name

Nova Computer Becomes Teacher's Aid in
New Singer Driver Training System
Computer Program Helps in Treatment
of Heart Patients
Risk of Analysis Program Announced by
McDouglas Corp .

43
43
43

42
42

MISCELLANEOUS

SDA Information Sciences, Inc., Elects
President and Chairman of the Board

45

APPLICATIONS

mill such as Gooch, which can produce 700 tons, or
1,400,000 pounds of feed a day.

COMPUTERIZED FEED MIXING
BEGINS AT GOOCH MILL

MINICOMPUTERS DELIVER DAILY
NEWSPAPERS IN FORT WORTH, TEXAS

Mervin Eighmy, Gen. Manager
Millard Farmer, DP Manager
Gooch Feed Mill Corp.
Lincoln, Nebr.

Gooch Feed Mill Corp. has begun using a small computer to control the measuring-in of ingredients for
its animal feeds. Until now the process of compounding numerous ingredients has been largely manually
controlled. The System/7 computer, using predetermined feed formulas stored in its memory, calls out
the precise amount of each of up to 20 ingredients
for any of 20 different feed mixes. The feed formula
itself is determined by another IBM computer based on
the nutrient requirement of the particular animal to
be fed, also taking into account the unit cost of
each ingredieni.
The feed is mixed in three-and-one-half ton mixers. Because there is such wide variation between
the amounts of the several ingredients needed, a
blend may call for a quantity weighing as little as
an ounce and as much as a ton or more. When a particular kind of feed is called for, an operator
merely enters the feed number into the computer. The
computer automatically begins selecting ingredients
stored in any of 50 bins. The System/7 transmits a
signal to the selected bin, which sets in motion an
auger. The auger starts pulling out the selected
ingredient into an enclosed chute which empties on
to a scale. As the ingredient hits the scale, the
computer begins measuring the weight, shutting off
the auger when the precise weight has been reached.
If when selecting the desired bin -- say of soybean meal -- it is empty, the computer signals the
operator that is should be refilled, and goes on to
the next soybean meal bin for its needs. This ensures that the mixing process will not be interrupted
as long as the needed ingredient is available in any
bin to which the computer has access.
Besides more accurate feed mixes, there is better
control of inventory. For the first time Gooch Mill
can track the precise amount of each ingredient from
the time it arrives at the mill until it leaves in
the completed blend. This is a major factor for a
COMPUTERS and AUTOMATION for January. 1973

A. T. Le Ance
Computer Automation, Inc.
18651 Von Karman
Irvine, Calif. 92664

In Fort Worth, Texas, a minicomputer is the heart
of a new Automated Newspaper Delivery System (ANDS).
The ANDS (developed and produced by AVCON, Inc., of
Fort Worth) is a self-contained, on-board system
which guides a delivery truck along a complex route
and tells two men on either side of a specially designed vehicle, when to throw their papers. Accordingto the AVCON people, they never miss.
The system continuously measures the vehicle's
location in relation to a pre-planned route, then
issues audio and visual instructions which guide
the driver and the paper throwers on their appointed
rounds. It even activates the vehicle's turn signals shortly before it is scheduled to make a turn,
giving the driver added warning of the impending
maneuver. In addition, the ANDS detects driver
errors and immediately prescribes appropriate corrective actions.
Because of the system's unique guidance capabilities, neither the driver nor the throwers need maps,
subscriber lists, or prior knowledge of the route.
It is all done by tape and computer memory. First,
a fixed route is divided into segments and a "signature" for each segment is recorded by driving
over the segment with the AVCON system operating
in its mapping mode. Locations of delivery points
are recorded in terms of their distance from the
beginning point, when the driver or an assistant
depresses a switch at each location. For basic
route control, verbal instructions are recorded on
audio tape. To travel over a previously mapped
route, the driver simply starts the route at a
specified point and follows the system's real-time
audio and visual commands.
The paper throwers mounted by open windows on
either side of the van wear earphones that receive
the signals telling them when to hurl their rolledup papers. Lead times for the throwers are auto41

matically adjusted to the speed of the truck, which
may be traveling anywhere from 15 to 30 miles an
hour along its routes.

have amounted to over $700,000 in four years, even
after deducting wages of 50 cents per day paid to
inmates and the costs of keeping a man in prison.

The system hardware is mounted above the truck's
windshield, except for a digital display console
which is mounted atop the dashboard in front of the
driver and provides visual instructions. The ANDS
includes a miniature NAKED MINI 16 digital processing and logic unit (built by Computer Automation,
Inc., Irvine, Calif.), a tape cartridge drive, proprietary sensing devices, control/display console
with message printer, and a variety of annunciator
and actuator devices.

Before installation of the Honeywell Model 55
none of the inmates had seen a computer. They wrote
their programs and keypunched them on cards or coded
them with a Honeywell Key tape (provided by the state
Department of Education) onto magnetic computer tape.
The card decks and tapes were picked up twice a week,
transported to a "client" computer si te where the
programs were run. The results were returned to the
inmates later for corrections. Having their own computer will enable inmates to work on program devel-opment and to tryout their ideas while they are
fresh. There will be greater continuity between
each phase of development, -- and the Walpole programmers will be able to supply their clients with
finished products.

EDUCATION NEWS
NEW PRISON ARRIVAL SPARKS
COMPUTER PROGRAMMING STUDIES

Honeywell Inc.
60 Walnut St.
Wellesley, Mass. 02181

A new "inmate" has been welcomed to Massachusetts
maximum security prison at Walpole, Mass. The new
resident of the prison is a computer to be used by
prisoners who study computer programming. The computer, formerly in Honeywell's custody, is being
loaned permanently to the inmates.
For the past five years, volunteers from the company have been teaching programming courses to a
group of inmates at the Massachusetts Correctional
Institution (MCI) in Walpole in response to an
inmate-initiated request for courses in computer
programming. The career-training program has paid
off in both professional accomplishment and an extremely low recidivism rate for those in the group
who have been paroled -- only 4 1/2 per cent compared to a national rate of 68 per cent.
Malcolm D. Smith, a professional teacher and programmer who was then a Honeywell staff adviser in
programming systems, was in charge of setting up the
program, which he designed to be self-perpetuating.
When students complete their first course, they
teach what they have learned to a new class, at the
same time beginning the second phase of their own
program. Students in the first phase of the program
work at other prison jobs during the morning and attend classes in the afternoon. Those who successfully complete the courses join the group of 12 men
who are fUll-time programmers.
The Walpole programmers have complete responsibility for conducting classes for students in the
first phase of the program, as well as for the professional programming work done for the state and
municipalities. They also attend advanced classes
conducted by Honeywell instructors. According to
Smith, now manager of Honeywell's Conversion Technology Center and still head of the Honeywell group,
"The Walpole instructors have been extremely meticulous in their teaching. The way they have handled
their teaching and programming responsibilities
shows they are very competent professionals."
In addition to these significant personal accomplishments, the Walpole programmers have been doing
professional programming for the state departments
of Education, Natural Resources, and Corporations
and Taxation, and for several cities and towns in
Massachusetts. Estimated savings to thei r "clients"
42

The computer also will permit expansion of the
program to include computer maintenance and operator
training courses. Instructors from HoneywelPs Field
Engineering Division have begun teaching a group of
six inmates the computer maintenance courses. This
program also will be self-perpetuating. Operator
training courses will be conducted by the Walpole
programmers. This course will be aimed at men who
do not have enough prison time left to complete programming courses or who are more interested in computer operation than programming.

GENERAL TURTLE, INC. - A SMALL
COMPANY WITH A STRANGE NAME

General Turtle, Inc.
545 Technology Square
Cambridge, Mass. 02139

A new educational technology has recently become
available from General Turtle Inc. -- a small company with a strange name. General Turtle Inc. has
been formed in response to requests from schools and
research groups for computer-controlled devices similar to those used in the program of Research on
Education conducted by the "LOGO GROUP" of MIT Artificial Intelligence Laboratory.
The set of devices, developed by the new company,
is designed to be compatible with the financial,
technical and computational resources typically
available in schools which already are using a minicomputer or telephone connections to a time-shared
service
The devices have, however, been designed
to serve even better where more computational resources are available -- so that when computer resources grow, these devices will not become obsolete
but will also grow in power.
By means of General Turtle's devices, schools can
extend the range of programming projects to include
generating music, graphics, controlling cybernetic
turtles, and more. The new applications reach more
students and also deepen the intellectual content of
the computer experience. They appeal to "mathephobic" children who find traditional programming "too
mathematical" as well as to "math buffs" who want
something involving more hard core mathematics.
The recommended starter mini-system includes the
following components: turtle with touch sensors;
plotter; music generator; a components kit of motors.
relays and sensors, and a controller to connect the
precending devices to a freestanding or remote
computer.
COMPUTERS and AUTOMATION for January. 1973

The simplest mode of operation of the mini-system
requires no expertise in hardware or systems software and no changes to the operating system or language already in use. Other modes of operation require small changes to the system software. General
Turtle will design configurations to meet individual
needs, plans, and budgets.

NEW PRODUCTS
COMPUTER PROGRAM HELPS IN
TREATMENT OF HEART PATIENTS
Robert A. Morris
Manager of Information
IBM Corporation
Data Processing Division
1133 Westchester Ave.
White Plains, N. Y. 10604

Cardiologists can interpret large volumes of
electrocardiograms -- used in identifying heart
disorders -- faster and more easily with a new
computer program recently announced by IBM Corporation, White Plains, N.Y. Using the IBM Health Care
Support Electrocardiogram (ECG) Analysis program,
cardiologists can significantly reduce the time it
normally takes to analyze ECGs (recordi ngs of the
heart's electrical impulses). They can then speed
their interpretations to attending physicians for
use in dingnosis and treatment of heart patients.
When the new ECG Analysis program, an IBM System/370 or System/360 processes -- in less than a
minute -- the ECG readings which have been recorded
in digital form on magnetic tape. The computer
produces a printed report containing interpretative
statements about the condition of the patient's
heart. Cardiologists can quickly validate the
statements by comparing the printed report with the
strip chart recording, which are then sent to the
patient's doctor.
The Health Care Support Electrocardiogram (ECG)
Analysis program is scheduled to be available in
February 1973, at a monthly charge of $350.
RISK ANALYSIS PROGRAM ANNOUNCED
BY MCDONNELL DOUGLAS CORP.
McDonnell Douglas Corp.
Box 516
St. Louis, Mo. 63166

The construction business, like a poker game,
involves a great many risks. Poker is less a gamble, though, when the odds are known and the hands
played accordingly.
To help take some of the gamble out of the construction business, McDonnell Douglas Automation
Company is marketing and processing a computerized
risk analysis program developed by Decision Sciences Corporation, St. Louis. Called Contractor's
Early Warning System (CEWS), the program helps reduce the risk involved in construction cost bidding
by alerting a contractor to a possible cost overrun
soon enough to allow him to adjust his bid.
Using McDonnell Douglas's IBM Model 195 computers,
5000 simulations can be performed in less than one

COMPUTERS and AUTOMATION for January, 1973
~

I

minute. A wide variety of conditions, including
labor strikes and weather, can be considered to determine the possible effects on the contractor's potential profit on a project. The contractor need
have no knowledge of statistical variations and
standard deviations. He simply identifies those
cost items which can vary by more than one per cent
of the total anticipated profit. The program produces eight management reports which may be used to
examine company risks involved in making a bid.
CEWS is available exclusively through a processing or licensing agreement from McDonnell Douglas
Automation Company, a division of McDonnell Douglas
Corporation.
NOVA COMPUTER BECOMES TEACHER'S AID
IN NEW SINGER DRIVER TRAINING SYSTEM
Data General Corp.
Routes 9 and 495
Southboro, Mass. 01772

From the time Janet Austin began her acrosstown drive to the moment she backed into a parking
space and turned the engine off, everything she
did was meticulously noted and recorded by a small
Nova computer, made by Data General Corporation of
Southboro, Mass. Janet was one of a group of high
school students "dri vi ng" a new LinkGJ Model L-210
simulator, a streamlined driver training device
that looks like the driver's section of a new car.
It has dashboard instruments, steering wheel, gear
selector, and driver's seat. The trainer is made
by The Singer Company's Simulation Products Division, Binghampton, N.Y.
The Nova, mounted in a small cabinet under the
instructor's control console, lets the instructor
monitor the actions of an entire group, part of a
group, or an individual. The instructor can select
percentage levels of achievement at the console,
and the Nova indicates which students fall below
that level.
Students "drive" on a realistic motion picture
roadway projected on a screen at the front of the
room. A binary code track on the film triggers the
Nova, which starts all the automatic functions of
the system, and monitors student responses to various driving situations. Some of the automatic
functions handled by the Nova are:
• checking student responses to filmed situations
• displaying results on the instructor's
console
• indicating when group performance needs improvement
Student errors are classified in five categories
acceleration, speed, braking, steering, and signal. When a student makes a mistake, an indicator
in the simulator lights, and stays on until the
student takes corrective action. The Nova keeps a
running check on the number of checks in each of
the five categories and the number of errors for
each student in each category. When a class is
over, the instructor can determine such information
as total checks by category, total errors for each
student in each category, and the student's score.
An optional package lets the instructor accumulate
student performance over a period of time. In addition, the instructor can override the computer
and make unprogrammed checks into the system.
(please turn to page 45)

43

NEW CONTRACTS
Sanders Associates, Inc.,
Nashua, N.H.

Lockheed-California Co.

Burroughs Corp., Detroit,
Mich.

National Life and Accident
Insurance Co., Nashville,
Tenn.
Swedish State Power Board,
Stockholm, Sweden

TRW Inc., Cleveland, Ohio

Computer Sciences Corp.,
Los Angeles, Calif.

Strategic Air Command (SAC),
Omaha, Neb.

Sperry Univac Div., Sperry
Rand Corp., Blue Bell, Pa.

South African Coal, Oil and
Gas Corp. (SASOL), Sasolburg,
Orange Free State, South
Africa
Safeguard Communications
Agency (SAFCA), Grand Forks,
N. Dak.
Catalina and Cole of California , Inc. , di v. of Kayser-Roth
United States Postal Service

Honeywell, Inc., Tampa,
Fla.

TBS Computer Centers Corp.
(NASDAQ: TBSC) , New York, N.Y.
National Cash Register Co.,
Postal Systems Division, Dayton, Ohio
Intermetrics Inc., Cambridge,
Mass.

North American Rockwell (NR)
Space Div., Downey, Calif.

Autonetics Div., North American
Rockwell Corp. (NR), Anaheim,
Calif •
SYSTEMS Engineering Laboratories, Inc., Fort Lauderdale, Fla.
Varian Data Machines,
Irvine, Calif.

U.S. Department of Transportation
NASA's Manned Spacecraft
Center, Houston, Texas
State Bank of Czechoslovakia,
Prague and Bratislava,
Czechoslovakia

Honeywell, Inc.
Wellesley Hills, Mass.

Australian National Line,
Melbourne, Australia

SYSTEMS Engineering Laboratories, Inc., Fort Lauderdale, Fla.

National Severe Storms Laboratory (NSSL), Norman, Okla.

Optical Scanning Corp.,
Newtown, Pa.

U.S. Navy

Bunker Ramo Corp., Westlake
Village, Calif.
Computer Audit Systems, Inc.,
East Orange, N.J.

Colonial Pipeline Co., Atlanta, Ga.
U.S. Comptroller of Currency

Auerbach Associates, Inc.,
Philadelphia, Pa.

u.S. Department of Commerce,
National Bureau of Standards,
Fire Technology Div.

Bunker Ramo Corp., Electronics
Systems Div., Westlake Village,
Calif.
Computer Sciences Corp.,
Los Angeles, Calif.

McDonnell Douglas Automation
Co., Long Beach and Torrance,
Calif.
National Can Corp., Chicago,

Quantum Science Corp., Palo
Alto, Calif.

State of Israel

44

Ill.

Long lead preparation and startup costs
on second production lot (Lot IV) of accoustic data processors for Navy's new S-3A
carri er-based anti -submari ne warfare a ircra ft
Electronic terminal computers and other
equipment for use in nationwide communications system
A Totally Integrated Data System (TIDAS)
for electrical power production and power
system control; TRW's role includes integration of total system, and design and
fabrication of central data processing system; ASEA is prime contractor for the $15.5
million proj ect
Serving as prime contractor for the integration phase of the 436M program at SAC's
Omaha headquarters; includes supply of all
equipment, computer programs and engineering services
A UNIVAC 1106 system to be used for linear
programming, production statistics and
other general office and general accounting applications
An automated communications circuit-monitoring system

$6 million
(approximate)

3-year renewal of original contract pro ..
viding various data processing services
A number of service test models of the
Postal Service's advanced facer/canceler
machine for high-speed automatic processing of letter mail
A high-level computer programming language,
designated HAL, tailored specifically for
Space Shuttle's flight computers
Studying and defining an air traffic management system for the 1985 and beyond
time period
Dual SYSTEMS 86 computers to be used as
part of dedicated hybrid digital/analog
complex for agency's space shuttle program
Multiple Varian 620/L-IOO minicomputers,
multiplexers, controllers, adapters and
other devices for use in eight bank data
acquisition and communications systems
A Honeywell Series 2000 computer system
to control ANL's central booking office
for its passenger ships, to rationalize internal supply and purchase accounting systems, and monitor container movements in
Austral1lsia
SYSTEMS 86 computer for research methods
program related to weather predicition
and storm notification throughout the
central United States.
Thirty OpScan 17 Optical Scanning systems
for use at Naval Air Training stations to
process pilot evaluation forms
A major expansion to the dual BR-340 computer system.
Installing a customized version of Computer Audit Retrieval System (CARS 2) to
help agency achieve a unified program for
national bank examinations
Designing National Fire Loss Data System
(NFLDS) to serve as central source of data
concerning fire losses, fatalities, and
injuries in U.S.
Development of a factory data entry system
to be installed initially at DAC's Long
Beach and Torrance facilities
Development of a nationwide on-line information system linking more than 40 manufacturing plants with a central computer facility
at NCC's headquarters
A study of Israel's data communications requirements through the mid 1980's -- recommendations on services to be offered, technologies to be used, tariff policies for
communication network

$1.5+ million

$4.5 million
$3 million
(approximate)

$2.1 million

$1.8 million
(approximate)
$1.7 million

$1.3+ million

$1 million
(approximate)
$948,171
$925,000
(approximate)
$810,000+

$750,000

$362,000
(approximate)
$250,000
(approximate)
$175,000+
$67,000

COMPUTERS and AUTOMATION for January. 1973

NEW INSTALLATIONS
Cyber 70 Model 73 system

Philco-Ford Corp., Houston,
Texas
(2 systems)

DECsystem-l055

Plessey Telecommunications,
Liverpool, England

IBM System/3

Braille Institute of America,
Inc., Los Angeles, Calif.

IBM System/7

Cook County, Chicago, Ill.

IBM 360 system

Florida Software Services,
Orlando, Fla.
Present Co., Inc., Rochester, N.Y.
Wilmorite, Inc., Rochester, N.Y.

NCR Century 50 system
NCR Century 101 system
UNIVAC 1106 system

Rochester Germicide Co., Rochester,
N.Y.
Fisher-Price, East Aurora, N.Y.

State Universi~y of New York (SUNY),
Buffalo, N.Y.
UNIVAC 9200 system

UNIVAC 9200-11 system
UNIVAC 9211 system
Xerox Sigma 3 system
Xerox Sigma 5 systems

City of Santa Fe, Santa Fe, New
Mexico
Mr. Insurance, Smyrna, Ga.
Chiltonian Limited, London,
England
Mahoning Valley Joint Vocational
School, Canfield, Ohio
Air Combat Maneuvering Range
(ACMR), Marine Air Station,
Yuma, Ariz.

New inventory control system
Payrolls, accounts payable, and job costing for
firm and two other associated companies
Managing invoicing system
Order entry and order status systems, on-line inquiry for credit and collections, a complete assortment of sales and marketing statistical reports and summaries
(system valued at $1.3 million)
Added capacity permitting improved administrative
computer services; replaces older computer equipment
Payroll, general accounting, paving assessments,
criminal statistics, and a system for municipality's "Model Cities" program
Policy accounting and statistical reports
Sales ledger, sales analysis, stock control and
payroll and an extended management information
system; replaces tabulating equipment
Training students for opportunities in data processing; future use includes administrative tasks
Monitoring pilots' performance in Air Combat Maneuvering Range (ACMR) -- Sigma 3; Missile simulations and computing missile hits and misses -Sigma 5; computing spatial position and interaircraft parameters -- 2nd Sigma 5; and 3rd Sigma
5 will control the other computers as well as two
interactive display systems

Frances Greenberg
SDA Information Sciences, Inc.
1540 Broadwav
New York, N. Y. 10036

SDA Information Sciences, Inc., a publicly held
corporation with stock traded over the counter, conducts market research studies and surveys in many
areas. These have included
toiletries, drugs, foods,
banking, packaging, advertising, household commodities, and airlines. It
supplies interviewing nationwide; study questionnaire and sampling design;
editing, coding, tabulation of data, and preparation of a final printed
report with tables and
analysis.

At a recent meeting of the Board of Directors of
SDA Information Sciences, Inc., Naomi J. Spinner
was elected President and Chairman of the Board.
She succeeds the late Robert E. Spinner. Prior to
her election to these offices, Mrs. Spinner had been
Treasurer of SDA as well as a member of the Board,
and had served actively in the management and operation of the corporation.

The corporation has a
wholly-owned subsidiary, SDA Systems, Inc., a company which specializes in the solution of source
data automation problems. This is done primarily
through the manufacturing and marketing of a portable data collection device called the Porta-Station®
Mrs. Spinner will also act as President of this subsidiary.

Across the Editor's Desk - Continued from page 43

MISCELLANEOUS

SDA INFORMATION SCIENCES, INC. ELECTS
NAOMI J. SPINNER PRESIDENT AND
CHAIRMAN OF THE BOARD

COMPUTERS and AUTOMATION for January, 1973

)

Scientific data processing for the National Aeronautics and Space Administration (NASA); applications include data management of multiple data
bases, data base maintenance, inter-processor communications with NASA's RTCC and processing of
Earth Resources data
Software development, testing and exchange interface integration before installation at international telephone exchange currently under construction in London
"Talking Book" service which helps librarians
gather and mail out tons of recorded books to the
blind; system will eventually handle cassette tape
recordings, Braille books and recorded periodicals
Helping reduce air pollution; monitors pollution
levels in county and spots dangerous pollution
buildups for early corrective action
Providing data processing services to clients

45

CALE,NDAR :OF C'OMING EVENTS
Jan. 17-19, 1973: Hospital Information Systems Sharing Group,
Information Science and the Health Care Institution seminar,
Frontier Hotel, Las Vegas, Nev. / contact: Dean R. Cannon,
P.O. Box 305, Bountiful, UT 84010

April 30-May 2, 1973: 1st Symposium on Computer Software Reliability, Americana Hotel, New York, N.Y. / contact: David
Goldman, IEEE Hdqs., 345 E. 47th St., New York, NY 10017

Jan. 17-19, 1973: 1973 Winter Simulation Conference, San Francisco, Calif. / contact: Robert D. Dickey, Bank of California,
400 California St., San Francisco, CA 94120

May 3-4, 1973:
10th Annual National Information Retrieval
Colloquium, Independence Mall Holiday Inn, 400 Arch St.,
Philadelphia, Pa. / contact: Martin Nussbaum, Computamation,
2955 Kensington Ave., Philadelphia, PA 19134

Jan. 31-Feb. 1, 1973: San Diego Biomedical Symposium, SheratonHarbor Island Hotel, San Diego, Calif. / contact: Dr. Robert H.
Riffenburgh, Program Chmn., San Diego Biomedical Symposium
P.O. Box 965, San Diego, CA 92112

May 13-16, 1973: 1973 International Systems Meeting, Hilton
Hotel, Denver, Colo. / contact: R. B. McCaffrey, Association
for Systems Management, 24587 Bagley Rd., Cleveland, OH
44138

Feb. 20-22, 1973:
Computer Science Conference, Neil House,
Columbus, Ohio / contact: Dr. Marshall Yovits, 101 Caldwell
Lab., 2024 Neil Ave., Ohio State Univ., Columbus, OH 43210
Mar. 4-9, 1973: SHARE Meeting, Denver, Colo. / contact: D.M.
Smith, SHARE, Inc., Suite 750, 25 Broadway, New York, NY
10004
Mar. 7-8, 1973: 1973 Annual Spring Conference of the Association
for Systems Management, Royal York Hotel, Toronto, Ontario /
contact:
Mr. R. H. Crawford, Comptroller's Department,
Imperial Oil Limited, 825 Don Mills Rd., Don Mills, Ontario,
Canada
Mar. 9,
and
and
P.O.

1973: 4th Annual AEDS Conference on the Development
Evaluation of Educational Programs in Computer Science
Data Processing, St. Louis, Mo. / contact: Ralph E. Lee,
Box 951, Rolla, MO 65401

Mar. 7-9, 1973: 6th Annual Simulation Symposium, Tampa, Fla. /
contact:
Annual Simulation Symposium, P.O. Box 22573,
Tampa, FL 33622
Mar. 12-14, 1973:
A Programming Language (APL), Goddard
Space Flight Center, Greenbelt, Md. / contact:
Cyrus J.
Creveling, Code 560, Goddard Space Flight Center, Greenbelt,
MD 20771
Mar. 26-29, 1973: IEEE International Convention (lNTERCON),
Coliseum & New York Hilton Hotel, New York, N.Y. / contact:
J. H. Schumacher, IEEE, 345 E. 47th St., New York, NY 10017
Mar. 27-29, 1973: 1st Conference on Industrial Robot Technology,
University of Nottingham, England / contact: Organising Secretary, CI RT, Dept. of Production Engineering and Production
Management, University of Nottingham, Nottingham NG7 2RD,
England
Mar. 29-31, 1973: 10th Symposium on Biomathematics and Computer Science in the Life Sciences, Houston, Texas / contact:
Office of the Dean, The University of Texas Graduate School of
Biomedical Sciences at Houston, Division of Continuing Education, P.O. Box 20367, Houston, TX 77025
April 2-5, 1973: SOFTWARE ENGINEERING FOR TELECOMMUNICATION SWITCHING SYSTEMS, University of Essex,
Essex, England / contact: Mrs. Penelope Paterson, Institution
of Electrical Engineers Press Office, Savoy Place, London WC2R
OBL, England
April 10-12, 1973:

Datafair 73, Nottingham University, Notting-

h;!m. Fngland ! contact:

John Fow!er & Partners Ltd., 6-8

Emeral St., London WCl N 30A, England
April 10-13, 1973: PROLAMAT '73, Second International Conference on Programming Languages for Numerically Controlled
Machine Tools, Budapest, Hungary / contact: I FIP Prolamat,
'73, Budapest 112, P.O. Box 63, Hungary
April 24-26, 1973:
I.S.A. Joint Spring Conference, Stouffer's
Riverfront Inn, St. Louis, Mo. / contact: William P. Lynes,
c/o Durkin Equipment, 2384 Centerline Ind. Dr., St. Louis, MO
63122

46

May 14-17, 1973: Spring Joint Computer Conference, Convention
Hall, Atlantic City, N.J. / contact: AFIPS Hdqs., 210 Summit
Ave., Montvale, NJ 07645
June 4-6, 1973:
1973 8th PICA Conference, Radisson Hotel,
Minneapolis, Minn. / contact: IEEE Hdqs., Tech. Svcs., 345 E.
47th St., New York, NY 10017
June 4-8, 1973: National Computer Conference and Exposition,
Coliseum, New York, N.Y. / contact: AFIPS Hdqs., 210 Summit Ave., Montvale, NJ 07645
June 22-23, 1973: 11th Annual Computer Personnel Conference,
Univ. of Maryland Conference Center, College Park, Md. / contact: Prof. A. W. Stalnaker, College of Industrial Management,
Georgia Institute of Technology, Atlanta, GA 30332
June 26-28, 1973: Workshop of Computer Architecture, Universiti~ de Grenoble, Grenoble, France / contact: Grenoble Accueil, 9, Boulevard Jean-Pain, 38000, Grenoble, France
June 26-29, 1973: DPMA 1973 International Data Processing Conference & Business Exposition, Conrad Hilton Hotel, Chicago,
III. / contact: Richard H. Torp, DPMA International Hdqs., 505
Busse Highway, Park Ridge, I L
July 20-22, 1973: 1973 International Conference of Computers in
the Humanities, University of Minnesota, Minneapolis, Minn. /
contact: Prof. Jay Leavitt, 114 Main Engineering Bldg., University of Minnesota, Minneapolis, MN 55455
July 23-27, 1973: 3rd Annual International Computer Exposition
for Latin America, Maria Isabel-Sheraton Hotel, Mexico City,
Mexico / contact: Seymour A. Robbins and Associates, 273
Merrison St., Box 566, Teaneck, NJ 07666
Aug. 13-17, 1973: SHARE Meeting, Miami Beach, Fla. / contact:
D. M. Smith, SHARE, Inc., Suite 750, 25 Broadway, New York,
NY 10004
Aug. 20-24, 1973: 3rd International Joint Conference on Artificial
Intelligence, Stanford University, Stanford, Calif. / contact: Dr.
Max B. Clowes, Laboratory of Experimental Psychology, University of Sussex, Brighton, Sussex BNl 90Y, England
Aug. 27-29, 1973: ACM '73, Atlanta, Ga. / contact: Dr. Irwin E.
Perlin, Georgia Institute of Technology, 225 North Ave., N.W.,
Atlanta, GA 30332
Aug. 30-Sept. 1, 1973: International Conference on Systems and
Control, PSG College of Technology, Coimbatore, India / contact: Dr. R. Subbayyan, PSG College of Technology, Coimbatore 641004, Tamil Nadu, India
Sept. 4-7, 1973: !ntcri1~t:onu! Computing Sympo:;:um 1973, Duvo:;,
Switzerland / contact: Dr. H. Lipps, I nternational Computing
Symposium 1973, c/o CERN, CH-1211 Geneva 23, Switzerland
Oct. 2-4, 1973: 2nd International Computer-Aided Design and
Computer-Aided Manufacturing Conf., Detroit Hilton Hotel,
Detroit, Mich. / contact: Public Relations Dept., Society of
Manufacturing Engineers, 20501 Ford Rd., Dearborn, MI 48128
Oct. 8-12, 1973: BUSINESS EQUIPMENT SHOW, Coliseum, New
York, N.Y. / contact: Rudy Lang, Prestige Expositions, Inc.,
60 East 42 St., New York, NY 10017
COMPUTERS and AUTOMATION for January, 1973

MONTHLY COMPUTER CENSUS
Neil Macdonald
Survey Editor
COMPUTERS AND AUTOMATION
The following is a summary made by COMPUTERS AND AUTOMATION of reports and estimates of the number of general purpose electronic digital computers manufactured and installed, or to be manufactured and on
order. These figures are mailed to individual computer manufacturers
from time to time for their information and review, and for any updating or comments they may care to provide. Please note the variation
in dates and reliability of the information. Several important manufacturers refuse to give out, confirm, or comment on any figures.
Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit information for this census. We invite all our readers to submit information that would help make these figures as accurate and complete as
possible.

The following abbreviations apply:
(A) -- authoritative figures, derived essentially from information
sent by the manufacturer directly to COMPUTERS AND
AUTOMATION
C
figure is combined in a total
(D)
acknowledgment is given to DP Focus, Marlboro, Mass., for
their help in estimating many of these figures
E
figure estimated by COMPUTERS AND AUTOMATION
(N)
manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any
way on those numbers stated here
(R) -- figures derived all or in part from information released
indirectly by the manufacturer, or from reports by other
sources likely to be informed
(S)
sale only, and sale (not rental) price is stated
X
no longer in production
information not obtained at press time

Part I of the Monthly Computer Census contains reports for United
States manufacturers. Part I I contains reports for manufacturers
outside of the United States. The two parts are published in alternate months.
SUMMARY AS OF DECEMBER 15, 1972

NAME OF
MANUFACTURER
Part 1. United States Manufacturers
Adage, Inc.
Brighton, Mass.
(A) (11/72)
Autonetics
Anaheim, Calif.
(R) (1/69)
Bailey Meter Co.
Wickliffe, Ohio
(A) (6/72)

Bunker-Ramo Corp.
Westlake Village, Calif.
(A) (12/72)

Burroughs
Detroit, Mich.
(N) (12/72)

Computer Automation, Inc.
Newport, Calif.
(A) (4/71)
Consultronics, Inc.
Garland, Texas
(A) (12/72)
Control Data Corp.
Minneapolis, Minn.
(R) (7/71)

Data General Corp.
Southboro, Mass.
(A) (11/72)

NAME OF
COMPUTER
AGT 10 Series
AGT 100 Series

4/68
1/72

X
100-300

11/58
6/61

X
X

Metrotype
Bailey 750
Bailey 755
Bailey 756
Bailey 855/15
Bailey 855/25
Bailey 855/50
BR-130
BR-133
BR-230
BR-300
BR-330
BR-340
BR-1018
BR-1018C
205
220
BlOO/B500
B2500
B3500
B5500
B5700
B6500
B6700
B7500
B8500
108/208/808
116/216/816

10/57
6/60
11/61
2/65
12/72
4/68
3/72
10/61
5/64
8/63
3/59
12/60
12/63
6/71
9/72
1/54
10/58
7/65
2/67
5/67
3/63

40-200
40-250
200-600
60-400
50-400
100-1000
100-1000
X

DCT-132

NUMBER OF INSTALLATIONS
Outside
In
In
World
U.S.A.
U.S.A.

AVERAGE OR RANGE
OF MJNTHLY RENTAL
$(000)

RECOMP II
RECOMP III

(S)

(S)
(S)
(S)
(S)
(s)
(S)
(S)

X
X
X
X
X

23.0

33.0

4/69
8/67
6/68
3/69

44.0
200.0
5.0
8.0

5/69

0.7

7/55
4/61
12/62
9/56
1/61

X
X
X
X
X

5/60
8/61
1/60
5/66
5/64
5/64
9/65
11/64
8/68
6/63
2/66
8/64
8/64
6/67
12/68

X
X
X

3.8
10-16
13.0
20-38
18.0
25.0
52.0
53.0
58.0
115.0
130.9
235.0

Nova
Supernova
Nova 1200
Nova 800

2/69
5/70
12/71
3/71

9.2
9.6
5.4
6.9

32
8

3
3

35
11

X

30
6

0
0

30
6

X
X

8
37
7
15
0
16
0
160
79
15
18
19
19

0
15
0
12
0
0
0

8
52
7
27
0
16
0

0
0
0
2
2
0
12

3

X
X
X
X
X
X

25-38
28-31

2.8-9.0
4.0
14.0
23.5

2/68

NUMBER OF
UNFILLED
ORDERS

(S)

X
X

GIS
G20
LGP-2l
LGP-30
RPC4000
636/136/046 Series
160/8090 Series
92l/924-A
1604/ A/B
l700/SC
3100/3150
3200
3300
3400
3500
3600
3800
6200/6400/6500
6600
6700
7600

COMPUTERS and AUTOMATION for January. 1973

1

DATE OF
FIRST
INSTALLATION

52-57
45
65-74
1
4
1

(S)
(S)

12
18
7

27-40
30-33

X
X

64-49
62
72-81

117
190
8

4

60
13
5
110
225

1
165
215

10
20

1
175
235

35

65

100

295
20
165
322
75
29
610
29
59
425-475
83-110
55-60
205
15
15
40
20
108
85
5
8

(S)
(S)
(S)
(S)

X
X
X
X
X
X
X
X

0
C
C
C
C
C
C
C
C
C
C
C
Total:
160 E

920
200
2100
310

47

NMlli OF
HANUFACTURER
Data General (cont'd)
Datacraft Corp.
Ft. Lauderdale, Fla.
(A) (11/72)
Digiac Corp.
Plainview, N. Y •
(A) (5/72)
Digi tal Computer Controls, Inc.
Fairfield, N.J.
(A) (11/72)
Digital Equipment Corp.
Haynard, Nass.
(A) (5/72)

Electronic Associates Inc.
West Long Branch, N.J.
(A) (11/72)
EHR Computer
Hinneapolis, Ninn.
(A) (11/72)

General Automation, Inc.
Anaheim, Calif.
(A) (8/72)
General Electric
West Lynn, Hass.
(Process Control Computers)
(A) (10/72)

Hewlett Packard
Cupertino, Calif.
(A) (7/72)
Honeywell Information Systems
Wellesley Hills, Hass.
(R) (6/72)

48

NAHE OF
CO~1PUTER

DATE OF
FIRST
INSTALLATION

AVERAGE OR RANGE
OF HONTHLY RENTAL
$ (000)

Nova 1210/1220
Nova 820
6024/1
6024/3
6024/5
Digiac 3060
Digiac 3080
Digiac 3080C
D-112
D-116

2/72
4/72
5/69
2/70
12/71
1/70
12/64
10/67
8/70
1/72

4.2 ;5. 2
6.4
52-300
33-200
11-80
9.0

PDP-l
PDP-4
PDP-5
PDP-6
PDP-7
PDP-8
PDP-8/1
PDP-8/S
PDP-8/L
PDP-8/E
PDP-8/N
PDP-8/F
PDP-9
PDP-9L
DECSystem-10
PDP-11/20
PDP-11R20
PDP-11/05
PDP-11/45
PDP-12
PDP-IS
LINC-8

11/60

X
X
X
X
X
X
X
X
X

640
8400
PACER 100
EHR 6020
EHR 6040
EHR 6050
ENR 6070
EHR 6130
E}1R 6135
E}1R 6145
E}1R 6140
SPC-12
SPC-16
System 18/30
GE-PAC 3010
GE-PAC 4010
GE-PAC 4020
GE-PAC 4040
GE-PAC 4050
GE-PAC 4060
2114A, 2114B
2115A
2116A, 2116B, 2116C
2100A
G58
G105A
G105B
G105RTS
G115
Gl20
G130
G205
G210
G215
G225
G235
G245
G255 T/S
G265 T/S
G275 T/S
G405
G410 T/S
G415
G420 T/S
G425
G430 T/S
G435
G440 T/S
G615
G625
G635
1I-110
H-115
H-120
H-125
H-200
H-400
H-800
H-1200
H-1250

8/62
9/63
10/64
11/64
4/65
3/68
9/66
11/68

5/72
12/66
11/68
12/67

9/69
2/61
9/66

4/67
7/67
7/72
4/65
7/65
2/66
10/66
8/67

1/68
5/70
7/69
5/70
10/70
2/67
8/64
12/66
6/65
10/68
11/67
11/66
3/71
5/70
6/69
6/69
7/69
4/66
3/69
12/68
6/64
7/60
9/63
4/61
4/64
11/68
10/67
10/65
11/68
2/68
11/69
5/64
6/67
6/64
6/69
9/65
7/69
3/68
4/65
5/65
8/68
6/70
1/66
12/67
3/64
12/61
12/60
2/66
7/68

NilllEER OF INSTALLATIONS
Outside
In
In
World
U.S.A.
U.S.A.
(S)
(S)
(S)
(S)
(S)
(S)

X
X

10.0
10.0

4.9
3.9
3.9

(S)
(S)

0
13
0

100
30

48
40
90

2

50

X

5
10

45
100
23
100
1402
3127
918
3699
3787
365
2
436
40
243
2740
14
0
0
620
545
200
Total:
18456
170
29
30
16
6
17
15
47
41

X
X
X
X
X
X
X
X

(S)
(S)

(S)

17.0

(S)
(S)
(S)
(S)

0
0

0
0

(S)

X

1.2
12.0
1.0
5.4
6.6
9.0
15.0
5.0
2.6
7.2

2.0
6.0
6.0
X

7.0
X

0.25
0.41
0.6
0.5
1.0
1.3
1.4
1.2
2.2
2.9
4.5
X
X
X
X
X
X
X
X
X

6.8
1.0
7.3
23.0
9.6
17.0
14.0
25.0
32.0
X

47.0
2.7
3.5
4.8
7.0
7.5
10.5
30.0
9.8
12.0

2
55
65
8

17
108
28
78
16
8
634
488

X
X

700-3000
10.8
13.8
10.8

535
85
17
121
28
78
16
8
734
518

NilllEER OF
UNFILLED
ORDERS

109
21
12
15
6
15
7
34
36

25
30
200
45
23
18

61
8
18
1
0
2
8
13
5

1
4
60
20
2

1400
800
200
26
34
260
65
25
20
1182
333
1171
2080

200-400

420-680

620-1080

11
35
15
145
40-60
3
15-20
45-60

0
0
1
15
17

11
35
16
160
57-77
3
15-20
60-90
10
15-45

15-30

10-40
70-100

240-400

50-100

20-30

20

23
20-40
180
30
800
150
800
46
58
230
130

X
X

X
X

X

1
0
18
0
0
0
0
0
4
8
0

35
32
32
X

1

X
X
X
X
X
X
X
X
X

240-400
70-130
26

3
3
7
160
220
275
40
15
90
55

26
23-43
255
30
960
370
1075
86
73
320
185

X

0

X
X

COMPUTERS and AUTOMATION for January, 1973

\-.

NANE OF
NANUFACTURER
Honeywell (cont'd)

IBN
Hhite Plains, N.Y.
(N) (D) (12/72)

Interdata
Oceanport, N.J.
(A) (11/72)

Hicrodata Corp.
Santa Ana, Calif.
(A) {11/72)
NCR
Dayton, Ohio
(A) (12/72)

Phil co
Willow Grove, Pa.
(N)
(1/69)

NANE OF
COHPUTER
H-1400
H-1800
H-2200
H-3200
H-4200
H-8200
DDP-24
DDP-116
DDP-124
DDP-224
DDP-316
DDP-416
DDP-516
H112
H632
H1602
H1642
H1644
H1646
H1648
H1648A
• 305
650
1130
1401
1401-G
1401-H
1410
1440
1460
1620 I, II
1800
7010
7030
704
7040
7044
705
7020,
7074
7080
7090
7094-1
7094-II
System/3 Hodel 6
Sys tem/ 3 Hodel 10
System/7
360/20
360/25
360/30
360/40
360/44
360/50
360/65
360/67
360/75
360/85
360/90
360/190
360/195
370/135
370/145
370/155
370/158
370/165
370/168
370/195
Nadell
Nadel 3
Hodel 4
Hodel 5
Hodel 15
Hodel 16
Hodel 18
Hodel 50
Hodel 70
Hodel 80
Hicro 400
Hicro 800
Hicro 1600
304
310
315
315 RHC
390
500
Century 50
Century 100
Century 101
Century 200
Century 300
1000
200-210,211
2000-212

COMPUTERS and AUTOMATION for January, 1973

DATE OF
FIRST
INSTALLATION

AVERAGE OR RANGE
OF HONTHLY RENTAL
$(000)

NUHBER OF INSTALLATIONS
In
Outside
In
Hor1d
U.S.A.
U.S.A.
4
15
125
20
18
10

6
5
60
2
2
3

10
20
185
22
20

1/64
1/64
1/66
2/70
8/68
12/68
5/63
4/65
3/66
3/65
6/69

14.0
50.0
18.0
24.0
32.5
50.0
2.65

9/66
10/69
12/68

1.2
3.2

90
250
250
60
450
350
900
75
12

11/68

12.0

20

X
X
X

0.6
X

12/57
10/67
2/66
9/60
5/64
6/67
11/61
4/63
10/63
9/60
1/66
10/63
5/61
12/55
6/63
6/63
11/55
3/60
3/60
8/61
11/59
9/62
4/64
3/71
1/70
11/71
12/65
1/68
5/65
4/65
7/66
8/65
11/65
10/65
2/66
12/69
11/67
4/71
5/72
9/71
2/71
-/73
5/71
-/73
6/73
12/70
5/67
8/68
11/70
1/69
5/71
6/71
5/72
10/71
10/72
12/70
12/68
12/71
1/60
5/61
5/62
9/65
5/61
10/65
2/71
9/68
12/72
6/69
2/72
6/63
10/58
1/63

3.6
4.8
1.5
5.4
2.3
1.3
17.0
4.1
10.0
4.1
5.1
26.0
160.0
32.0
25.0
36.5
38.0
27.0
35.0
60.0
63.5
75.0
83.0
1.0
1.1
0.35 and up
2.7
5.1
10.3
19.3
11.8
29.1
57.2
133.8
66.9
150.3

232.0
14.4
23.3
48.0
49.5-85.0
98.7
93.0-170.0
190.0-270.0
3.7
8.5
X

20.0
X
X

6.8
6.8
14.9
0.1-0.5
0.2-3.0
0.2-3.0
X
X

7.0
9.0
0.7
1.0
1.6
2.6
3.7
7.0
21.0
X
X
X

NlJ}1BER OF
UNFILLED
ORDERS
X
X

13

40
50
2580
2210
420
180
156
1690
194
285
415
67
4
12
35
28
18
10
44
13
4
10
6
2

15
18
1227
1836
450
140
116
1174
63
186
148
17
1
1
27
13
3
3
26
2
2
4
4

55
68
3807
4046
870
320
272
2864
257
471
563
84
5
13
2
41
21
13
70
15
6
14
10

7161
1112
5487
2454
109
1135
601
57
50
11
5
13

6075
759
2535
1524
57
445
144
6
17
1

13236
1871
8022
3977
166
1580
745
63
67
12
5
15
9

X
X
X
X
X

1780
1287
1363
39
662
562
99
12
55

48

3
1

205

75

270
70
40
1
2
7
207
4
160
1916
263
5
8
255
55
160

115
20
24
5
6
3
49
0
0
700
80
2
0
200
35
325
1750
0
780

llOO
580
1175
50
575
5
16
16
12

330
5

280
200
385
90
64
6
8
10
256
4
125
2616
343
7
8
455
90
485
3650
600
1955
50
905
10

85
X

40
X
X
X
X

21
141
21

X
X

X
X
X

49

NAME OF
MANUFACTURER
Raytheon Data Systems Co.
Norwood, Mass.
(A) (10/72)

Standard Computer Corp.
Los Angeles, Calif.
(A) (6/72)
Systems Engineering Laboratories
Ft. Lauderdale, Fla.
(A) (12/72)

UNIVAC Div. of Sperry Rand
New York, N.Y.
(A) (4/72)

UNIVAC - Series 70
Blue Bell, Pa.
(A) (11/72)

Varian Data Machines
Newport Beach, Calif.
(A) (8/72)

Xerox Data Systems
E1 Segundo, Calif.
(N) (R) (12/72)

DATE OF
AVERAGE OR RANGE
FIRST
OF MONTHLY RENTAL
$(000)
INSTALLATION
12/60
X
250
X
3/64
440
X
520
10/65
10/67
12.5
703
7.2
704
3/70
19.0
5/69
706
IC 4000
12/68
9.0
IC 6000-6000/E
16.0
5/67
IC 7000
17.0
8/70
IC-9000
400.0
5/71
SYSTEMS 810B
2.6
9/68
SYSTEMS 71
0.9
8/72
SYSTEMS 72
1.0
9/71
SYSTEMS 85
6.0
7/72
SYSTEMS 86
10.0
6/70
I & II
X
3/51 & ll/57
III
X
8/62
File Computers
8/56
X
Solid-State 80 I, II,
90, I, II, & Step
X
8/58
418
11.0
6/63
490 Series
12/61
30.0
1004
2/63
1.9
1005
2.4
4/66
1050
9/63
8.5
1100 Series (except
ll07, 1108)
X
12/50
X
1107
10/62
1108
68.0
9/65
9200
1.5
6/67
9300
3.4
9/67
9400
7.0
5/69
LARC
5/60
135.0
301
2/61
7.0
14.0-18.0
501
6/59
14.0-35.0
601
11/62
3301
17.0-35.0
7/64
Spectra 70/15, 25
4.3
9/65
Spectra 70/35
1/67
9.2
Spectra 70/45
22.5
11/65
Spectra 70/46
33.5
Spectra 70/55
34.0
11/66
Spectra 70/60
32.0
11/70
Spectra 70/61
42.0
4/70
16.0
70/2
5/71
70/3
25.0
9/71
25.0
70/6
9/71
12/71
35.0
70/7
X
620
11/65
620i
6/67
X
R-620i
4/69
520/DC, 520i
12/69;10/68
620/f
11/70
620/L
4/71
620/f-l00
6/72
620/L-100
5/72
Varian 73
XDS-92
4/65
1.5
XDS-910
2.0
8/62
XDS-920
9/62
2.9
XDS-925
12/64
3.0
XDS-930
3.4
6/64
XDS-940
14.0
4/66
XDS-9300
8.5
11/64
Sigma 2
12/66
1.8
Sigma 3
2.0
12/69
Sigma 5
6.0
8/67
Sigma 6
12.0
6/70
Sigma 7
12/66
12.0
Sigma 8
2/72
Sigma 9
35.0
NAME OF
COMPUTER

USE ECONOMICAL C&A CLASSI FI ED ADS to buy or sell
your computer and data processing equipment, to offer services to the industry, to offer new business opportunities, to
seek new positions or to fill job vacancies, etc.
Rates for Classifed Ads:

90i per word - minimum, 20 words
First line all capitals - no extra charge
(Ads must be prepaid)
Send Copy to:
COMPUTERS AND AUTOMATION
815 Washington Street
Newtonville, MA 02160
Telephone (617) 332-5453

50

(5)
(5)
(5)

(5)

NUMBER OF INSTALLATIONS
In
Outside
In
U.S.A.
World
U.S.A.
20
115
135
20
26
1
27
175
33
208
260
70
330
15
75
90
0
9
9
3
0
3
4
0
4
1
0
1
168
10
178
14
3
31
23
25
13
210
80
76
1522
617
l36
9
8
103
1106
412
82
2
144
16
3
71
17
102
303
34
15
12
7
58
4
l3
7

43
170
120
15
159
32
25-30
163
13
29

3
1
1

NUMBER OF
UNFILLED
ORDERS
X
X
X
4
30
2
2

17
4
32
31

X
X
X
X

39
14
610
248
59

119
90
2132
865
195

23 E
15

0
3
129
835
62
41
0

9
11
232
1941
474
123
2

X
X
58 E
725
510 E
83 E

75
1300
80
350
201
474
13
21

X

4
10
12
1
14
3
4
36
0
14

30
3

ADVERTISING

72

X

3
114
16
19
12

47
180
132
16
173
35
25-34
199
10
43
37

INDEX

Following is the index of advertisements. Each item contains: name and address of the advertiser / name of the agency, if any / page number where the advertisement appears.

THE C&A NOTEBOOK ON COMMON SENSE, ELEMENTARY AND ADVANCED, published by Computers and
Automation, 815 Washington St., Newtonville, Mass.
02160/ Pages 2, 3
COMPUTERS AND AUTOMATION, 815 Washington St.,
Newtonville, Mass. 02160/ Page 51
WHO'S WHO IN COMPUTERS AND DATA PROCESSING,
jointly published by Quadrangle Books (a New York
Times Company) and Berkeley Enterprises, Inc., 815
Washington St., Newtonville, Mass. 02160/ Page 52
COMPUTERS and AUTOMATION for January. 1973

I

.~

WILL YOU HELP?
Yes, you. It may come as a surprise that you'd be asked
. . . but as a reader of Computers & Automation you are
in a unique position to help us.
NAMES ... people, institutions, companies who
should be interested in 1) the computer industry and/or
2) seeking truth in information are very much needed to
join you as readers of C&A.

Please give us their names and addresses on the
form below or add another sheet of paper. Trim out the
card with scissors and drop it in the mail. We'll gladly
pay the postage to learn of possible new friends. And many
thanks for your help! As a token of our appreciation we'll
send you our ****Reprint .
P.S. If you like you may mail your list separately to:
R. A. Sykes, Circulation Mgr.
Computers & Automation
815 Washington Street
Newtonville, MA 02160

Will you tell us who they are? And perhaps even more, will

cut here and tuck in flap

r--------------------------,

you let us use your name in writing to them? But with or
without your name (we'll only use it if you grant permission)
we need to know those you think might be interested in also
reading C&A.

i

I

/

/

COIT1~!ila~!!£!'

(1) Name

/

cut here

l-

2

·~

al

2'

.~

e

:.!

e

OJ

U

Vl

~

<1l

r
I

l
I

w

::J

..J

(l)

0

a:
a..
a:

~

·c

Q)

Gi

o

DYES

NO

\
\
I

I

YES,

start my subscription to COMPUTERS AND AUTOMATION according to the
instructions checked below.

One Year (including the Computer Directory and
Guide -

13 issues) U.S. only.

0

Buyers'

$18.50

One Year (excluding the Computer Directory and
Guide -

12 issues) U.S. only.

0

Buyers'

$9.50

Name: _ _ _ _ _ _ _ __
Title:
Organization: _ _ _ _ _ _ _ _ _ _ _ __
Address: _ _ _ _ _ _ _ _ _ __
City: _ _ _ _ _ _ __
State: _ _ _ _ _ Zip:

C/)

CII

\
I
I
\

Z

w

" I

\

City _ _ _ _ _ _ _ _ State _ _ _ _ ZI P _____

.~

• c:

V)

,I

\
\

May we use your name?

.~

w
a..

/.

\
\

Please give us your name and address on the form below so we can
" send you your * * * * Reprint. Just cross out the subscription request
/ - unless you also want to enter your new or renewal order.

· f6

a:

~

\

/

/
/
I

~

u.

la

Address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __

/

::E

!:: len

I~

/

en

en
a:

(2) Name _____________________________

Ir+

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Fold here - do not cut

~ en
-

.n;

CD

-

0

Q)

III

I

E

OJ
...J

~

~

~

...J

a..
w

~

~

(l)

u

(l)

c

a:
en
en

~

2

2b

W

Cii

::J

OJ

0.

E

~

00.
0

2

w

~
a..
w
CD

Z

a
~

«
~

:J

«
0
Z

«
en
ex::

~

:J

<:J



c

....e
~

Q)

Z

Payment enclosed
Bill me

OJ

P.O. No.:

o
o

~
III
::I

Renewal

Cl

New subscription

0
Q)

To SPEED the processing of your order, please check the one best
descriptor in each of the two categories below. (ThIS IOforma[1on
will be used for statistical purposes only.)

BUSINESS TYPE
aI-Computer Manufacturer
02-Aerospace / Aircraft
Manufacturer
03-0ther Manufacturing
04-Raw Materials Processing;
(chemical, primary metal,
petroleum, food, etc.)
OS-Mining and Construction
06-Computing & Consulting
07-Finance, Insurance, Pub!',
and Service Organizations
OB-Transportation Companies
09-Public Utilities
la-Research
II-Wholesale, Retail, Sales,
and Marketing Firms
12-Educational; (College,
University, or School)
13-Government and Military
14-Libraries

JOB FUNCTION
l-Technical Management; (computer
installation management, program
management, or engineering mgmU
2-Computer Center Personnel;
(methods & procedure analysts,
and operators)
3-Programming Personnel; (systems,
application & research programmers)
4-Professional: (systems analysts,
mathematicians, operations
researchers, and professors)
5-General Management Executives;
(corporate officers, owners, and
partners)
6-E~gineering Personnel; (systems
.
engineers, research a. development enilneers)
7-Research Personnel
8-Students
9-Library Subscription
10-Subscription in Company Harne
Only

a.
<1l

ti
I


Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Producer                        : Adobe Acrobat 9.1 Paper Capture Plug-in
Modify Date                     : 2009:03:25 00:12:42-07:00
Create Date                     : 2009:03:25 00:12:42-07:00
Metadata Date                   : 2009:03:25 00:12:42-07:00
Format                          : application/pdf
Document ID                     : uuid:35db7505-bf40-44a7-ba1d-af33140608ea
Instance ID                     : uuid:a2896135-9a0e-41c6-8415-2f3d7514bf5c
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 52
EXIF Metadata provided by EXIF.tools

Navigation menu